Privacy Versus Security: Problems and Possibilities for the Trade-Off Model (2023)

Abstract

Considerable criticism has been levelled against thinking of privacy and security as being placed in a trade-off relation. Accepting this criticism, this paper explores to what use the trade-off model can still be put thereafter. In specific situations, it makes sense to think of privacy and security as simple concepts that are related in the form of a trade-off, even though it has been argued widely that this is a misrepresentation of concepts that are far too complex to be thought of in such a simple structure. As a first step, the sociotechnical analysis in this paper further highlights the complexities of the practice of body scanners installed at airports for security purposes. These complexities contribute additionally to rendering a simple privacy/security trade-off untenable. However, as a second step, the same analysis is thought through again so as to highlight opportunities to use the – deliberately simple – structure of the trade-off model to overcome part of its own shortcomings. At closer look, the empirical inaccuracy of the trade-off model becomes only problematic if it is used as a justification for imposing security measures that encroach privacy: “this small piece of privacy must be sacrificed, as this additional security is indispensable”. However, some right to existence is still retained for the trade-off model. Therefore, instead, it is suggested that the trade-off model be used on the one hand as a heuristic device to trace potential difficulties in the application of a security technology, and on the other hand as a framing that by its simplicity and appeal earns impetus for a particular discourse.

Original languageEnglish
Title of host publicationReforming European Data Protection Law
EditorsS Gutwirth, R.E. Leenes, P De Hert
PublisherSpringer
Pages253-269
ISBN (Print)978-94-017-9384-1
DOIs
Publication statusPublished - 1 Jan 2015

Publication series

SeriesLaw, Governance and Technology Series
Number2352-1902

Access to Document

Cite this

  • APA
  • Author
  • BIBTEX
  • Harvard
  • Standard
  • RIS
  • Vancouver

Valkenburg, G. (2015). Privacy Versus Security: Problems and Possibilities for the Trade-Off Model. In S. Gutwirth, R. E. Leenes, & P. De Hert (Eds.), Reforming European Data Protection Law (pp. 253-269). Springer. Law, Governance and Technology Series No. 2352-1902 https://doi.org/10.1007/978-94-017-9385-8_10

Valkenburg, G. / Privacy Versus Security: Problems and Possibilities for the Trade-Off Model. Reforming European Data Protection Law. editor / S Gutwirth ; R.E. Leenes ; P De Hert. Springer, 2015. pp. 253-269 (Law, Governance and Technology Series; No. 2352-1902).

@inbook{7b4dfeede56e41dca9bfc1d1ae1d13df,

title = "Privacy Versus Security: Problems and Possibilities for the Trade-Off Model",

abstract = "Considerable criticism has been levelled against thinking of privacy and security as being placed in a trade-off relation. Accepting this criticism, this paper explores to what use the trade-off model can still be put thereafter. In specific situations, it makes sense to think of privacy and security as simple concepts that are related in the form of a trade-off, even though it has been argued widely that this is a misrepresentation of concepts that are far too complex to be thought of in such a simple structure. As a first step, the sociotechnical analysis in this paper further highlights the complexities of the practice of body scanners installed at airports for security purposes. These complexities contribute additionally to rendering a simple privacy/security trade-off untenable. However, as a second step, the same analysis is thought through again so as to highlight opportunities to use the – deliberately simple – structure of the trade-off model to overcome part of its own shortcomings. At closer look, the empirical inaccuracy of the trade-off model becomes only problematic if it is used as a justification for imposing security measures that encroach privacy: “this small piece of privacy must be sacrificed, as this additional security is indispensable”. However, some right to existence is still retained for the trade-off model. Therefore, instead, it is suggested that the trade-off model be used on the one hand as a heuristic device to trace potential difficulties in the application of a security technology, and on the other hand as a framing that by its simplicity and appeal earns impetus for a particular discourse.",

author = "G. Valkenburg",

year = "2015",

month = jan,

(Video) The Trade Off: Individual Privacy and National Security

day = "1",

doi = "10.1007/978-94-017-9385-8_10",

language = "English",

isbn = "978-94-017-9384-1",

series = "Law, Governance and Technology Series",

number = "2352-1902",

pages = "253--269",

editor = "S Gutwirth and R.E. Leenes and {De Hert}, P",

booktitle = "Reforming European Data Protection Law",

publisher = "Springer",

address = "United States",

}

Valkenburg, G 2015, Privacy Versus Security: Problems and Possibilities for the Trade-Off Model. in S Gutwirth, RE Leenes & P De Hert (eds), Reforming European Data Protection Law. Springer, Law, Governance and Technology Series, no. 2352-1902, pp. 253-269. https://doi.org/10.1007/978-94-017-9385-8_10

(Video) Security Trade-Off? Implications of Cybersecurity Regulations and International Trade

Privacy Versus Security: Problems and Possibilities for the Trade-Off Model. / Valkenburg, G.
Reforming European Data Protection Law. ed. / S Gutwirth; R.E. Leenes; P De Hert. Springer, 2015. p. 253-269 (Law, Governance and Technology Series; No. 2352-1902).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

TY - CHAP

T1 - Privacy Versus Security: Problems and Possibilities for the Trade-Off Model

AU - Valkenburg, G.

PY - 2015/1/1

Y1 - 2015/1/1

N2 - Considerable criticism has been levelled against thinking of privacy and security as being placed in a trade-off relation. Accepting this criticism, this paper explores to what use the trade-off model can still be put thereafter. In specific situations, it makes sense to think of privacy and security as simple concepts that are related in the form of a trade-off, even though it has been argued widely that this is a misrepresentation of concepts that are far too complex to be thought of in such a simple structure. As a first step, the sociotechnical analysis in this paper further highlights the complexities of the practice of body scanners installed at airports for security purposes. These complexities contribute additionally to rendering a simple privacy/security trade-off untenable. However, as a second step, the same analysis is thought through again so as to highlight opportunities to use the – deliberately simple – structure of the trade-off model to overcome part of its own shortcomings. At closer look, the empirical inaccuracy of the trade-off model becomes only problematic if it is used as a justification for imposing security measures that encroach privacy: “this small piece of privacy must be sacrificed, as this additional security is indispensable”. However, some right to existence is still retained for the trade-off model. Therefore, instead, it is suggested that the trade-off model be used on the one hand as a heuristic device to trace potential difficulties in the application of a security technology, and on the other hand as a framing that by its simplicity and appeal earns impetus for a particular discourse.

AB - Considerable criticism has been levelled against thinking of privacy and security as being placed in a trade-off relation. Accepting this criticism, this paper explores to what use the trade-off model can still be put thereafter. In specific situations, it makes sense to think of privacy and security as simple concepts that are related in the form of a trade-off, even though it has been argued widely that this is a misrepresentation of concepts that are far too complex to be thought of in such a simple structure. As a first step, the sociotechnical analysis in this paper further highlights the complexities of the practice of body scanners installed at airports for security purposes. These complexities contribute additionally to rendering a simple privacy/security trade-off untenable. However, as a second step, the same analysis is thought through again so as to highlight opportunities to use the – deliberately simple – structure of the trade-off model to overcome part of its own shortcomings. At closer look, the empirical inaccuracy of the trade-off model becomes only problematic if it is used as a justification for imposing security measures that encroach privacy: “this small piece of privacy must be sacrificed, as this additional security is indispensable”. However, some right to existence is still retained for the trade-off model. Therefore, instead, it is suggested that the trade-off model be used on the one hand as a heuristic device to trace potential difficulties in the application of a security technology, and on the other hand as a framing that by its simplicity and appeal earns impetus for a particular discourse.

(Video) Data Privacy and Consent | Fred Cate | TEDxIndianaUniversity

U2 - 10.1007/978-94-017-9385-8_10

DO - 10.1007/978-94-017-9385-8_10

M3 - Chapter

SN - 978-94-017-9384-1

T3 - Law, Governance and Technology Series

SP - 253

EP - 269

BT - Reforming European Data Protection Law

A2 - Gutwirth, S

A2 - Leenes, R.E.

A2 - De Hert, P

PB - Springer

ER -

Valkenburg G. Privacy Versus Security: Problems and Possibilities for the Trade-Off Model. In Gutwirth S, Leenes RE, De Hert P, editors, Reforming European Data Protection Law. Springer. 2015. p. 253-269. (Law, Governance and Technology Series; No. 2352-1902). doi: 10.1007/978-94-017-9385-8_10

(Video) 060| Biometrics: Privacy, Problems and Possibilities
(Video) British Debaters: National Security vs Personal Privacy

FAQs

What is the trade-off between security and privacy? ›

However, some security methods can lead to privacy violations, like a computer security system that might lead to easier data access for certain parties. Generally, developing solutions for processing and storing large amounts of data is the main trade-off of privacy.

What is privacy and security issues? ›

In the digital world, security generally refers to the unauthorized access of data, often involving protection against hackers or cyber criminals. Privacy involves your right to manage your personal information, and security is the protection of this information. Both are equally important aspects of cyber safety.

What is the trade-off of security? ›

Security trade-offs are the inevitable compromises that security architects have to make when designing and implementing security solutions. They involve balancing the costs, benefits, risks, and opportunities of different security measures, such as performance, usability, scalability, compliance, and innovation.

Which is more important security or privacy? ›

Both are equally important because national security protects the country as a whole from other countries whereas privacy protects the individual. If personal privacy of a political person is invaded, it could affect national security. So both are important.

What is an example of a common security trade-off? ›

Whether it's trading some additional home security against the inconvenience of having to carry a key around in your pocket and stick it into a door every time you want to get into your house, or trading some security against a particular kind of explosive terrorism on airplanes against the expense and time to search ...

What are the different types of security and privacy? ›

There are four different types of privacy protection: physical, virtual, third-party and legislation. Physical types of protection include the use of locks, pass codes or other security tools to restrict access to data or property.

What are 3 privacy issues? ›

But the “top 3” privacy issues with most data breaches are “tracking, hacking and trading.” Let's take a closer look at each one and see how it impacts your privacy.

How can privacy and security issues be prevented? ›

How To Protect Your Online Privacy
  1. Commit to sharing less online. ...
  2. Use strong, unique passwords and two-factor authentication. ...
  3. Tighten privacy settings for your online accounts. ...
  4. Purge unused mobile apps and browser extensions. ...
  5. Block search engines from tracking you. ...
  6. Browse online with a secure VPN.
Jan 4, 2023

Why is security and privacy an important issue in information system? ›

In all computer systems that maintain and process valuable information, or provide services to multiple users concurrently, it is necessary to provide security safeguards against unauthorized access, use, or modifications of any data file. This difficult problem has not yet been solved in the general case.

What are three examples of trade-offs? ›

Let's look at major trade-offs you will face in your career.
  • Money vs Time. ...
  • Money vs Time. ...
  • Position vs Accountability. ...
  • Position vs Accountability. ...
  • Job security vs Opportunity. ...
  • Job security vs Opportunity. ...
  • Travel vs Predictability. ...
  • Travel vs Predictability.
May 21, 2018

What are five example of trade-off? ›

In demography, tradeoff examples may include maturity, fecundity, parental care, parity, senescence, and mate choice. For example, the higher the fecundity (number of offspring), the lower the parental care that each offspring will receive.

What is the risk safety trade-off? ›

In simple terms trade-off between safety and risk is the higher the risk higher will be return, and lower the risk, the lower will be return, and investment will be safe.

Can you have privacy without security? ›

You can have security without privacy, but you can't have privacy without security. Privacy includes the laws and regulations requiring companies to protect your data, and security is the technical method used to protect that data.

What is the greatest threat to privacy? ›

Some of the privacy threats include Digital profiling, cyberstalking, recommendation systems, etc. leading to the disclosure of sensitive data and sharing of data without the consent of the data owner.

What are the benefits of privacy and security? ›

Individual data privacy helps both businesses and consumers. For businesses, it means a distinct advantage in terms of trust and brand recognition. And for consumers, it's the safety of being protected from data breaches, fraud, and financial loss.

What is the relationship between privacy and cybersecurity? ›

Privacy protection and cyber security should be thought of as interconnected: as more and more personal information is processed or stored online, privacy protection increasingly relies on effective cyber security implementation by organizations to secure personal data both when it is in transit and at rest.

What is the balance between digital privacy and safety security? ›

Privacy is crucial for individuals to safeguard their personal information and data, while security measures aim to protect them from harm. However, security often requires access to private information, which can create a conflict with the right to privacy.

What is the trade-off between safety and risk? ›

Answer and Explanation:

The trade-off between safety and risk is the potential return which increases with an increase in risk. Using this method, the individual will have a lower level of unpredictability with a low level of returns on the investment to be safe.

What do the privacy and security rules deal with? ›

The Security Rule protects a subset of information covered by the Privacy Rule, which is all individually identifiable health information a covered entity creates, receives, maintains or transmits in electronic form. The Security Rule calls this information "electronic protected health information" (e-PHI).

Videos

1. Data Protection issues in AI
(Fieldfisher Data & Privacy Team)
2. When smart devices are always on, vulnerability may be a trade-off of convenience
(PBS NewsHour)
3. Data-driven innovation vs. information security: is there a trade-off? - DAMA AU BNE Branch 18Nov21
(DAMA Australia)
4. Don't Use a VPN...it's not the ultimate security fix you've been told
(All Things Secured)
5. The ethical dilemma of self-driving cars - Patrick Lin
(TED-Ed)
6. FFF Webinar: The Phony Trade-Off between Freedom and Security
(The Future of Freedom Foundation)
Top Articles
Latest Posts
Article information

Author: Carmelo Roob

Last Updated: 01/11/2023

Views: 6100

Rating: 4.4 / 5 (45 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Carmelo Roob

Birthday: 1995-01-09

Address: Apt. 915 481 Sipes Cliff, New Gonzalobury, CO 80176

Phone: +6773780339780

Job: Sales Executive

Hobby: Gaming, Jogging, Rugby, Video gaming, Handball, Ice skating, Web surfing

Introduction: My name is Carmelo Roob, I am a modern, handsome, delightful, comfortable, attractive, vast, good person who loves writing and wants to share my knowledge and understanding with you.