Abstract
Considerable criticism has been levelled against thinking of privacy and security as being placed in a trade-off relation. Accepting this criticism, this paper explores to what use the trade-off model can still be put thereafter. In specific situations, it makes sense to think of privacy and security as simple concepts that are related in the form of a trade-off, even though it has been argued widely that this is a misrepresentation of concepts that are far too complex to be thought of in such a simple structure. As a first step, the sociotechnical analysis in this paper further highlights the complexities of the practice of body scanners installed at airports for security purposes. These complexities contribute additionally to rendering a simple privacy/security trade-off untenable. However, as a second step, the same analysis is thought through again so as to highlight opportunities to use the – deliberately simple – structure of the trade-off model to overcome part of its own shortcomings. At closer look, the empirical inaccuracy of the trade-off model becomes only problematic if it is used as a justification for imposing security measures that encroach privacy: “this small piece of privacy must be sacrificed, as this additional security is indispensable”. However, some right to existence is still retained for the trade-off model. Therefore, instead, it is suggested that the trade-off model be used on the one hand as a heuristic device to trace potential difficulties in the application of a security technology, and on the other hand as a framing that by its simplicity and appeal earns impetus for a particular discourse.
Original language | English |
---|---|
Title of host publication | Reforming European Data Protection Law |
Editors | S Gutwirth, R.E. Leenes, P De Hert |
Publisher | Springer |
Pages | 253-269 |
ISBN (Print) | 978-94-017-9384-1 |
DOIs | |
Publication status | Published - 1 Jan 2015 |
Publication series
Series | Law, Governance and Technology Series |
---|---|
Number | 2352-1902 |
Access to Document
Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver
Valkenburg, G. (2015). Privacy Versus Security: Problems and Possibilities for the Trade-Off Model. In S. Gutwirth, R. E. Leenes, & P. De Hert (Eds.), Reforming European Data Protection Law (pp. 253-269). Springer. Law, Governance and Technology Series No. 2352-1902 https://doi.org/10.1007/978-94-017-9385-8_10
Valkenburg, G. / Privacy Versus Security: Problems and Possibilities for the Trade-Off Model. Reforming European Data Protection Law. editor / S Gutwirth ; R.E. Leenes ; P De Hert. Springer, 2015. pp. 253-269 (Law, Governance and Technology Series; No. 2352-1902).
@inbook{7b4dfeede56e41dca9bfc1d1ae1d13df,
title = "Privacy Versus Security: Problems and Possibilities for the Trade-Off Model",
abstract = "Considerable criticism has been levelled against thinking of privacy and security as being placed in a trade-off relation. Accepting this criticism, this paper explores to what use the trade-off model can still be put thereafter. In specific situations, it makes sense to think of privacy and security as simple concepts that are related in the form of a trade-off, even though it has been argued widely that this is a misrepresentation of concepts that are far too complex to be thought of in such a simple structure. As a first step, the sociotechnical analysis in this paper further highlights the complexities of the practice of body scanners installed at airports for security purposes. These complexities contribute additionally to rendering a simple privacy/security trade-off untenable. However, as a second step, the same analysis is thought through again so as to highlight opportunities to use the – deliberately simple – structure of the trade-off model to overcome part of its own shortcomings. At closer look, the empirical inaccuracy of the trade-off model becomes only problematic if it is used as a justification for imposing security measures that encroach privacy: “this small piece of privacy must be sacrificed, as this additional security is indispensable”. However, some right to existence is still retained for the trade-off model. Therefore, instead, it is suggested that the trade-off model be used on the one hand as a heuristic device to trace potential difficulties in the application of a security technology, and on the other hand as a framing that by its simplicity and appeal earns impetus for a particular discourse.",
author = "G. Valkenburg",
year = "2015",
month = jan,
day = "1",
doi = "10.1007/978-94-017-9385-8_10",
language = "English",
isbn = "978-94-017-9384-1",
series = "Law, Governance and Technology Series",
number = "2352-1902",
pages = "253--269",
editor = "S Gutwirth and R.E. Leenes and {De Hert}, P",
booktitle = "Reforming European Data Protection Law",
publisher = "Springer",
address = "United States",
}
Valkenburg, G 2015, Privacy Versus Security: Problems and Possibilities for the Trade-Off Model. in S Gutwirth, RE Leenes & P De Hert (eds), Reforming European Data Protection Law. Springer, Law, Governance and Technology Series, no. 2352-1902, pp. 253-269. https://doi.org/10.1007/978-94-017-9385-8_10
Privacy Versus Security: Problems and Possibilities for the Trade-Off Model. / Valkenburg, G.
Reforming European Data Protection Law. ed. / S Gutwirth; R.E. Leenes; P De Hert. Springer, 2015. p. 253-269 (Law, Governance and Technology Series; No. 2352-1902).
Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic
TY - CHAP
T1 - Privacy Versus Security: Problems and Possibilities for the Trade-Off Model
AU - Valkenburg, G.
PY - 2015/1/1
Y1 - 2015/1/1
N2 - Considerable criticism has been levelled against thinking of privacy and security as being placed in a trade-off relation. Accepting this criticism, this paper explores to what use the trade-off model can still be put thereafter. In specific situations, it makes sense to think of privacy and security as simple concepts that are related in the form of a trade-off, even though it has been argued widely that this is a misrepresentation of concepts that are far too complex to be thought of in such a simple structure. As a first step, the sociotechnical analysis in this paper further highlights the complexities of the practice of body scanners installed at airports for security purposes. These complexities contribute additionally to rendering a simple privacy/security trade-off untenable. However, as a second step, the same analysis is thought through again so as to highlight opportunities to use the – deliberately simple – structure of the trade-off model to overcome part of its own shortcomings. At closer look, the empirical inaccuracy of the trade-off model becomes only problematic if it is used as a justification for imposing security measures that encroach privacy: “this small piece of privacy must be sacrificed, as this additional security is indispensable”. However, some right to existence is still retained for the trade-off model. Therefore, instead, it is suggested that the trade-off model be used on the one hand as a heuristic device to trace potential difficulties in the application of a security technology, and on the other hand as a framing that by its simplicity and appeal earns impetus for a particular discourse.
AB - Considerable criticism has been levelled against thinking of privacy and security as being placed in a trade-off relation. Accepting this criticism, this paper explores to what use the trade-off model can still be put thereafter. In specific situations, it makes sense to think of privacy and security as simple concepts that are related in the form of a trade-off, even though it has been argued widely that this is a misrepresentation of concepts that are far too complex to be thought of in such a simple structure. As a first step, the sociotechnical analysis in this paper further highlights the complexities of the practice of body scanners installed at airports for security purposes. These complexities contribute additionally to rendering a simple privacy/security trade-off untenable. However, as a second step, the same analysis is thought through again so as to highlight opportunities to use the – deliberately simple – structure of the trade-off model to overcome part of its own shortcomings. At closer look, the empirical inaccuracy of the trade-off model becomes only problematic if it is used as a justification for imposing security measures that encroach privacy: “this small piece of privacy must be sacrificed, as this additional security is indispensable”. However, some right to existence is still retained for the trade-off model. Therefore, instead, it is suggested that the trade-off model be used on the one hand as a heuristic device to trace potential difficulties in the application of a security technology, and on the other hand as a framing that by its simplicity and appeal earns impetus for a particular discourse.
U2 - 10.1007/978-94-017-9385-8_10
DO - 10.1007/978-94-017-9385-8_10
M3 - Chapter
SN - 978-94-017-9384-1
T3 - Law, Governance and Technology Series
SP - 253
EP - 269
BT - Reforming European Data Protection Law
A2 - Gutwirth, S
A2 - Leenes, R.E.
A2 - De Hert, P
PB - Springer
ER -
Valkenburg G. Privacy Versus Security: Problems and Possibilities for the Trade-Off Model. In Gutwirth S, Leenes RE, De Hert P, editors, Reforming European Data Protection Law. Springer. 2015. p. 253-269. (Law, Governance and Technology Series; No. 2352-1902). doi: 10.1007/978-94-017-9385-8_10
FAQs
What is the trade-off between security and privacy? ›
However, some security methods can lead to privacy violations, like a computer security system that might lead to easier data access for certain parties. Generally, developing solutions for processing and storing large amounts of data is the main trade-off of privacy.
What is privacy and security issues? ›In the digital world, security generally refers to the unauthorized access of data, often involving protection against hackers or cyber criminals. Privacy involves your right to manage your personal information, and security is the protection of this information. Both are equally important aspects of cyber safety.
What is the trade-off of security? ›Security trade-offs are the inevitable compromises that security architects have to make when designing and implementing security solutions. They involve balancing the costs, benefits, risks, and opportunities of different security measures, such as performance, usability, scalability, compliance, and innovation.
Which is more important security or privacy? ›Both are equally important because national security protects the country as a whole from other countries whereas privacy protects the individual. If personal privacy of a political person is invaded, it could affect national security. So both are important.
What is an example of a common security trade-off? ›Whether it's trading some additional home security against the inconvenience of having to carry a key around in your pocket and stick it into a door every time you want to get into your house, or trading some security against a particular kind of explosive terrorism on airplanes against the expense and time to search ...
What are the different types of security and privacy? ›There are four different types of privacy protection: physical, virtual, third-party and legislation. Physical types of protection include the use of locks, pass codes or other security tools to restrict access to data or property.
What are 3 privacy issues? ›But the “top 3” privacy issues with most data breaches are “tracking, hacking and trading.” Let's take a closer look at each one and see how it impacts your privacy.
How can privacy and security issues be prevented? ›- Commit to sharing less online. ...
- Use strong, unique passwords and two-factor authentication. ...
- Tighten privacy settings for your online accounts. ...
- Purge unused mobile apps and browser extensions. ...
- Block search engines from tracking you. ...
- Browse online with a secure VPN.
In all computer systems that maintain and process valuable information, or provide services to multiple users concurrently, it is necessary to provide security safeguards against unauthorized access, use, or modifications of any data file. This difficult problem has not yet been solved in the general case.
What are three examples of trade-offs? ›- Money vs Time. ...
- Money vs Time. ...
- Position vs Accountability. ...
- Position vs Accountability. ...
- Job security vs Opportunity. ...
- Job security vs Opportunity. ...
- Travel vs Predictability. ...
- Travel vs Predictability.
What are five example of trade-off? ›
In demography, tradeoff examples may include maturity, fecundity, parental care, parity, senescence, and mate choice. For example, the higher the fecundity (number of offspring), the lower the parental care that each offspring will receive.
What is the risk safety trade-off? ›In simple terms trade-off between safety and risk is the higher the risk higher will be return, and lower the risk, the lower will be return, and investment will be safe.
Can you have privacy without security? ›You can have security without privacy, but you can't have privacy without security. Privacy includes the laws and regulations requiring companies to protect your data, and security is the technical method used to protect that data.
What is the greatest threat to privacy? ›Some of the privacy threats include Digital profiling, cyberstalking, recommendation systems, etc. leading to the disclosure of sensitive data and sharing of data without the consent of the data owner.
What are the benefits of privacy and security? ›Individual data privacy helps both businesses and consumers. For businesses, it means a distinct advantage in terms of trust and brand recognition. And for consumers, it's the safety of being protected from data breaches, fraud, and financial loss.
What is the relationship between privacy and cybersecurity? ›Privacy protection and cyber security should be thought of as interconnected: as more and more personal information is processed or stored online, privacy protection increasingly relies on effective cyber security implementation by organizations to secure personal data both when it is in transit and at rest.
What is the balance between digital privacy and safety security? ›Privacy is crucial for individuals to safeguard their personal information and data, while security measures aim to protect them from harm. However, security often requires access to private information, which can create a conflict with the right to privacy.
What is the trade-off between safety and risk? ›Answer and Explanation:
The trade-off between safety and risk is the potential return which increases with an increase in risk. Using this method, the individual will have a lower level of unpredictability with a low level of returns on the investment to be safe.
The Security Rule protects a subset of information covered by the Privacy Rule, which is all individually identifiable health information a covered entity creates, receives, maintains or transmits in electronic form. The Security Rule calls this information "electronic protected health information" (e-PHI).