Abstract
Both “privacy” and “security” have a variety of meanings that are relevant to ISIPS. Inadvertently mixing these meanings can lead to confusion. We will communicate more effectively, and avoid needless misunderstandings, if we make it clear which meanings we intend in each context. This paper discusses several constellations of meanings and suggests key questions whose answers will more precisely define the kind of “privacy” and the kind of “security” that we are referring to.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Brin, D.: The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? Basic Books, New York (1999), http://www.davidbrin.com/transparent.html
Waldo, J., Lin, H.S., Millett, L.I. (eds.): Engaging Privacy and Information Technology in a Digital Age. National Academies Press, Washington (2007)
Goodman, S.E., Lin, H.S. (eds.): Toward a Safer and More Secure Cyberspace. National Academies Press, Washington (2007)
Kent, S.T., Millett, L.I. (eds.): IDs—Not That Easy: Questions About Nationwide Identity Systems. National Academies Press, Washington (2002)
Schneider, F.B. (ed.): Trust in Cyberspace. National Academies Press, Washington (1999)
Horning, J.J.: Nothing is as simple as we hope it will be. Security, http://horning.blogspot.com/search/label/SecurityPrivacy , http://horning.blogspot.com/search/label/Privacy
Infosec Research Council: Hard Problem List (2005), http://www.cyber.st.dhs.gov/docs/IRC_Hard_Problem_List.pdf
Caroll, L.: Through the Looking Glass. Guttenberg. org. (2008), http://www.gutenberg.org/wiki/Main_Page
ISIPS 2007 website (2008), http://www.scils.rutgers.edu/ci/isips/v1_ISIPS_Flyer_02.21.07.htm
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Horning, J.J. (2009). Words Matter: Privacy, Security, and Related Terms. In: Gal, C.S., Kantor, P.B., Lesk, M.E. (eds) Protecting Persons While Protecting the People. ISIPS 2008. Lecture Notes in Computer Science, vol 5661. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10233-2_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-10233-2_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10232-5
Online ISBN: 978-3-642-10233-2
eBook Packages: Computer ScienceComputer Science (R0)