Skip to main content

A Conceptual and Legal Approach to the Cyberspace: The Dilemma Security Versus Freedom

  • Chapter
  • First Online:
Cyberspace
  • 1101 Accesses

Abstract

We should not assume that security and freedom are constantly at war with each other. When a person or a population is considered safe, do they consider themselves free? Usually, the opposite is true. If it is not so, what kind of freedom are we talking about? In fact, insecurity mainly has two key precursors; those with adverse natural, immediate or catastrophic effects, and those that arise from criminal or pre-criminal activities. The former naturally limit or condition us, as we try to limit or reduce their consequences, but we are not able to master them as such. But we cannot forget that there are other aspects which have complicated the picture. The use of computer tools in the Internet environment forces us to work from a much more technical point of view when we analyze crime materials and risk, as well as types of criminals and the use of tests and expert reports. Today, although the problems have not been solved, we have incorporated cyber intelligence activities, which allow us to access open sources via the Internet, or to enter private networks. These actions can be used both for good and for evil, but we have to consider and know them to have a slightly clearer idea of what we are really dealing with today when we are talking about cybercrime and cyber espionage. The current cyberspace world in which we live shows us the disadvantages we have in obtaining this freedom and, therefore, reaching equilibrium with safety, but they are not opposite concepts.

Submitted: 3.10.16; Accepted: 12.12.16.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Some examples about this technological anonymity evolution are the new Virtual Private Networks (VPN), such as Cyberghost VPN, Droid VPN, Free VPN 1.8, and The Onion Router (TOR). All of them are used to hide IP address and their respective origin. Also I2P (routers and tunnels), distributed and dynamic with encryption EIGamal, AES, ST, and PROXIES to hinder the investigations. Other options and tools are VPN clients routing through the Jon Do network (old JAP). For file sharing purposes, they use Freenet, TUVPN, WOT or Duck Duck Go finder.

  2. 2.

    Some examples include: Endomondo, iDoctus, Medisafe, SIG: OruxMaps, QGis, Collector for ArcGIS, Google Maps, OSM, Fulcrum, Waze Social, Couple, Cozi, Facebook, Pplkpr, Swiftkey, Amazon; as well as Magnetoresistive random-access memory.

References

  • Alvarez Caro M (2015) El Derecho al Olvido en Internet. Editorial REUS

    Google Scholar 

  • BBC (2006) Magnetic memory chip unveiled. BBC News, 07 Oct 2006

    Google Scholar 

  • BOE (2015) Código del Derecho al Olvido. BOLETIN OFICIAL DEL ESTADO (last versión 2017/24/01)

    Google Scholar 

  • Brock G (2016) Right to be forgotten. George Brock I.B., Tauris

    Google Scholar 

  • Bueno F (2012) FODERTICS estudios sobre Derecho y nuevas Tecnologías. Editorial Andavira

    Google Scholar 

  • Chadwick R (2014) The right to know and the right not to know. Cambridge University Press, Cambridge

    Google Scholar 

  • Davara MA (2015) Manual de Derecho Informático Thomson Reuters Aranzadi, 11 edn

    Google Scholar 

  • De Salvador Carrasco L (2012) Redes de Anonimización en Internet: Cómo funcionan y cuándo son sus límites. Revista Instituto Español de Estudios Estratégicos N.16 of 2012 ieee.es

    Google Scholar 

  • Touriño, A. (2014). El Derecho al Olvido y a la Intimidad en Internet. La Catarata

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bernardino Cortijo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Cortijo, B. (2017). A Conceptual and Legal Approach to the Cyberspace: The Dilemma Security Versus Freedom. In: Ramírez, J., García-Segura, L. (eds) Cyberspace. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-54975-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-54975-0_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-54974-3

  • Online ISBN: 978-3-319-54975-0

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics