INTRODUCTION It is undeniable that in cyber world, everyone is able to create a number of personalities that no one could distinguish whether an identity is reliable or not; or, even leave a hole to cyber crimes to carry on internet frauds using different fake identities. Consequently, this circumstance might lead to much confusion and burden in terms of transparency and accountability in social networking. Recently, although some countries and online social networking services such as Facebook and Twitter have tried to have a new regulation of identity verification to avoid potential trouble, they still have to face with a bunch of objection from Internet citizens.
Don’t waste time! Our writers will create an original "Rights to Anonymity in Cyber Crime" essay for youCreate order
What is the reason for their opposition? The answer is despite the proposal of Network real-name system to minimize the negative effects that can be caused by anonymity, a lot of Internet users believe that it is their right to register an identity with fake information will protect their private information better. This point of view becomes a reason of a long-lasting conflict between the identity verification and the right to anonymity. Within the scope of this research paper, our group would like to discuss about these two online identity verification systems by analyzing the advantage and disadvantage of them regard to different legal aspects. Eventually, we will come to a conclusion which one is better to ensure either the security of the cyber world and reasonable right of users or how to balance these two policies to strengthen the cyber law system. Key Words: Social Networking, Transparency, Accountability, Identity Verification, Right of Anonymity, cyber world, cyber crime.
Social networking refers to â€œthe practice of expanding the number of one’s business and/or social contacts by making connections through individualsâ€; more precisely, it is â€œthe activity of sharing information and communicating with groups of people using the internet, especially through websites that are specially designed for this purposeâ€. In a social network, no one could know each other well and it is quite easy to commit a cyber crime or infringement due to share an illegal material without the permission of the author or conduct a fake transaction. In these cases, who will be accountable for the wrong-doing actions and how to recognize him among the cyber identities. To deal with those questions, the definition of accountability and transparency comes first. Accountability is being responsible for someone for actions taken; about being able to explain, clarify and justify actions. For example, the court has a right to know and hold A to account; and that A has a duty to explain and account for his actions. Transparency is about being easy to understand, and being open, frank and honest in all communications, transactions and operations. It is possible to be accountable by providing a lengthy and technical explanation of every detail; however, if this information is not clarified enough for the court and related parties, and if key facts are hidden by the sheer volume of information then the information is not presented in a transparent form. It could be said that the accountability and transparency may go hand-in-hand in social networking because transparency is a necessary part of accountability, but – as defined above – it is not the same as accountability. For instance, in case the court decides to hold a cyber entity accountable for a copyright infringement, it must find out information about that these cyber identities, actions (transparency), but then the court must go to the further step of accountability will get involve to more than just information. It may need action by the courts to hold whether the questioned cyber entity accountable. Thus, transparency seems to be a first component of accountability. In general, the relationship and process of transparency and accountability in social networking is quite complicated that comes to the result of the urgent need to have the Identity Verification system, which can help the court less burden when dealing with cyber world problems.
According to Prof. Aaron P. Smith, â€œcyber identityâ€, also called digital identity, refers to an identity that is established, through participation and decision making, by a user in a digital community, or cyberspace. However, until now there is no generic system for identification in cyberspace. Nowadays, almost websites require the users to sign up with any private information such as name, date of birth, addressâ€¦ and even the bank account in any commercial transaction that make users find it inconvenient and insecure to disclose information, which lead to the tendency of using a pseudonym instead and no one could know about it. They call it as a means of â€œsafetyâ€. Nevertheless, in case their rights and proper benefit are breached or facing to the cyber identity theft, it is impossible for the users who provide fake information to sue a claim or guarantee their reasonable rights. Hence, it plays an important part to have the Identity Verification systems not only for websites to reduce the risks of cyber crimes but also for Internet users to protect themselves. Based on the proposal to have an Internet real-name system, a number of nations tried to put it into practice. South Korea is the vanguard to implement this system under the â€œReal Name Verification Lawâ€. After that, China passed â€œthe Decision on Improving Network Information Protectionâ€. Swiss also issued Convention on Cyber Crime so as to have network regulation more concerted and be able to effectively prevent cyber crimes. Although this system has enforced for a long time, the implementation and effect contain several gaps among countries (will be discussed precisely in the following part). One of the biggest problems arising from the objection of some Internet users would prefer the â€œRight of Anonymityâ€ in cyber world.
â€¦â€œEveryone has the right to respect for his private and family life, his home and his correspondenceâ€… Anonymity is derived from the Greek word â€œanonymiaâ€, meaning â€œwithout a nameâ€, in the common usage it refers to the state of an individualâ€™s personal identity, or personally identifiable information, being publicly unknown. In the modern world of the information society, anonymity is defined as an aspect of informational privacy. Anonymity is also considered as a part of social interaction; that means reducing the disclosure of your identity to certain persons or certain areas of social life and society. It is true that all of web browses leave some vestige of personal information through the huge storage cached in Internet; all these information represents us in the cyberspace and it led to greater support for anonymity appearance. However, as mentioned above, some try to abuse this right to commit crimes on cyber world; thus, in order to establish better monitoring of the Internet and protect the cyber security, certainly it has been observed the high demand of anonymity on the web, but the anonymity is a concept that raising fear in our mind since someone would take illegal actions and cyber crimes. This consideration would meet strong arguments from the Internet participants who support of the human right as freedom of speech and censorship avoidance. Thus, between Identity Verification and Right of Anonymity, which one is better to protect either the security of the cyber world and reasonable right of users? How to balance these two systems? What is the recommendation to strengthen the current cyber law system relating to these on-going arguments? The answer is based on the comparison between the two policies in different legal aspect as below.
 Adrianne Jeffries 2012, â€œFacebook’s fake-name fight grows as users skirt the rulesâ€, available at https://www.theverge.com/2012/9/17/3322436/facebook-fake-name-pseudonym-middle-name, last visited on 11 October 2014.  Park Dong-yeol 2012, â€œReal-names or False-names? How to Best Enforce Internet Etiquetteâ€, The UOS Times, available at https://times.uos.ac.kr/news/articleView.html?idxno=1371, last visited on 11 October 2014.  Margaret Rouse, â€œSocial networkingâ€, available at https://whatis.techtarget.com/definition/social-networking, last visited on 11 October 2014.  Cambridge Dictionary Online, available at https://dictionary.cambridge.org/dictionary/business-english/social-networking, last visited on 11 October 2014. â€œDefining Accountability and Transparency & Key Principlesâ€ (para 1), available at https://www.institute-of-fundraising.org.uk/guidance/code-of-fundraising-practice/guidance/accountability-and-transparency-guidance/defining-accountability-and-transparency-and-key-principles/, last visited on 11 October 2014.  Id, para 2.  Id,.  Id,.  â€œICTs for Government Transparencyâ€, https://www.egov4dev.org/transparency/definitions.shtml,last visited on 11 October 2014.  Aaron P. Smith, â€œReal Vs. Fake: Identity Creation in Cyberspaceâ€. Published by ProQuest Information and Learning Company, 2008. p.6.  Hal Abelson and Lawrence Lessig, â€œDigital Identity in Cyberspaceâ€, White Paper Submitted for 6.805/Law of Cyberspace: Social Protocols, 10 December 1998, p.1.  Nabeth and Thierry, â€œUnderstanding the Identity Concept in the Context of Digital Social Environmentsâ€, FIDIS Deliverables (FIDIS) 2 (2), May 2006, p.74â€“91  Song Guangxing and Yang Pingfang, The Influence of Network Real-name System on the Management of Internet Public Opinion, Public Administration In The Time Of Regional Change (ICPM 2013), 2013, p.48,49.  in the 30th session of the Standing Committee of the 11th National People’s Congress  Id, note 13  The European Convention of Human Rights Art.8(1).  Dirk Voorhoof, â€œInternet and the right of anonymityâ€, in J. SURCULIJA (ed.), Proceedings of the conference Regulating the Internet, Belgrade, 2010, p.2.  Id,.  Pierluigi Paganini, â€œThe right to anonymity on Internet and legal implicationsâ€, available at https://securityaffairs.co/wordpress/6452/intelligence/the-right-to-anonymity-on-internet-and-legal-implications.html, last visited on 12 Oct, 2014  Id,.
We will send an essay sample to you in 2 Hours. If you need help faster you can always use our custom writing service.Get help with my paper