Abstract
Many decisions concerning technological development and related policies in the field of protecting the privacy of individuals and security at the societal level include a perceived trade-off between these two interests. Sometimes, this trade-off is made explicitly, but often it is an implicit choice, driven by external factors. This paper assesses a set of factors acting as drivers or barriers towards the development of technologies for privacy and/or societal security. While some of the individual drivers and barriers do not show a clear bias towards security or privacy technology development, the overview gives a clear indication that some powerful factors are biased towards developing and using security technologies, and some other factors are biased towards hindering the development and use of privacy technologies. This bias may threaten the privacy of individuals on the long run and may obscure potential solutions that enhance both security and privacy.
Chapter PDF
Similar content being viewed by others
References
Solove, D.: Nothing to Hide: The False Tradeoff between Privacy and Security. Yale University Press (2011)
Sempere, C.M.: The European Security Industry: A Research Agenda. Technical report (2010)
Friedewald, M., Wright, D., Wadhwa, K., Gutwirth, S., Lieshout, M., Bodea, G., Raab, C., Szekely, I., Ploeg, I., Skinner, G., Kimpeler, S., Schuhmacher, J., Goos, K., Finn, R., Lagazio, M., Verfaillie, K., Gonzalez Fuster, G., Veenstra, A., Uszkiewicz, E., Pridmore, J., Valkenburg, G.: Central Concepts and Implementation Plan. PRISMS Deliverable 1.1. Technical report (2012)
Warren, S.D., Brandeis, L.D.: Right to Privacy. Harvard Law Review 4(1), 72 (1890)
Westin, A.F.: Privacy and Freedom, vol. 97. Atheneum (1967)
Solove, D.J.: Understanding Privacy. Harvard University Press, Harvard (2010)
Finn, R., Wright, D., Friedewald, M.: Seven Types of Privacy. In: Gutwirth, S. (ed.) European Data Protection: Coming of Age. Number. Springer Science & Business Media, Dordrecht (January 2013)
European Commission: Action Plan Implementing the Stockholm Programme. COM/2010/0171 (2010)
Wright, D., Székely, I., Friedewald, M., Rodrigues, R., Kreissl, R., Johan, C., Raab, C., Wright, D., Beatrix, V., Goos, K., Hallinan, D., Charles, L., Webster, W., Galdon, G.: Surveillance, Fighting Crime and Violence. IRISS Deliverable 1.1. Technical report (2012)
Bennett, C.J.: The Privacy Advocates; resisting the spread of surveillance. MIT Press, Cambridge Massachusetts (2008)
van Lieshout, M., Kool, L., van Schoonhoven, B., Bodea, G., Schlechter, J.: Stimulerende en remmende factoren van Privacy by Design in Nederland. Technical report, TNO, Delft (2012)
European Commission: Security Industrial Policy: Action Plan for an innovative and competitive Security Industry (2012)
European Commission: The EU Internal Security Strategy in Action: Five steps towards a more secure Europe (2010)
European Commission: Commission Staff Working Document on Transport Security (2012)
Cavoukian, A.: Privacy by Design The 7 Foundational Principles. Security, 7–8 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
van Schoonhoven, B., Roosendaal, A., Huijboom, N. (2014). Privacy Versus Collective Security. In: Hansen, M., Hoepman, JH., Leenes, R., Whitehouse, D. (eds) Privacy and Identity Management for Emerging Services and Technologies. Privacy and Identity 2013. IFIP Advances in Information and Communication Technology, vol 421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55137-6_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-55137-6_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-55136-9
Online ISBN: 978-3-642-55137-6
eBook Packages: Computer ScienceComputer Science (R0)