Skip to main content

Words Matter: Privacy, Security, and Related Terms

  • Conference paper
Book cover Protecting Persons While Protecting the People (ISIPS 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5661))

Included in the following conference series:

  • 602 Accesses

Abstract

Both “privacy” and “security” have a variety of meanings that are relevant to ISIPS. Inadvertently mixing these meanings can lead to confusion. We will communicate more effectively, and avoid needless misunderstandings, if we make it clear which meanings we intend in each context. This paper discusses several constellations of meanings and suggests key questions whose answers will more precisely define the kind of “privacy” and the kind of “security” that we are referring to.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brin, D.: The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? Basic Books, New York (1999), http://www.davidbrin.com/transparent.html

    Google Scholar 

  2. Waldo, J., Lin, H.S., Millett, L.I. (eds.): Engaging Privacy and Information Technology in a Digital Age. National Academies Press, Washington (2007)

    Google Scholar 

  3. Goodman, S.E., Lin, H.S. (eds.): Toward a Safer and More Secure Cyberspace. National Academies Press, Washington (2007)

    Google Scholar 

  4. Kent, S.T., Millett, L.I. (eds.): IDs—Not That Easy: Questions About Nationwide Identity Systems. National Academies Press, Washington (2002)

    Google Scholar 

  5. Schneider, F.B. (ed.): Trust in Cyberspace. National Academies Press, Washington (1999)

    Google Scholar 

  6. Horning, J.J.: Nothing is as simple as we hope it will be. Security, http://horning.blogspot.com/search/label/SecurityPrivacy , http://horning.blogspot.com/search/label/Privacy

  7. Infosec Research Council: Hard Problem List (2005), http://www.cyber.st.dhs.gov/docs/IRC_Hard_Problem_List.pdf

  8. Caroll, L.: Through the Looking Glass. Guttenberg. org. (2008), http://www.gutenberg.org/wiki/Main_Page

  9. ISIPS 2007 website (2008), http://www.scils.rutgers.edu/ci/isips/v1_ISIPS_Flyer_02.21.07.htm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Horning, J.J. (2009). Words Matter: Privacy, Security, and Related Terms. In: Gal, C.S., Kantor, P.B., Lesk, M.E. (eds) Protecting Persons While Protecting the People. ISIPS 2008. Lecture Notes in Computer Science, vol 5661. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10233-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10233-2_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10232-5

  • Online ISBN: 978-3-642-10233-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics