Skip to main content

Privacy and Security – a Way to Manage the Dilemma

  • Chapter
Book cover ISSE 2009 Securing Electronic Business Processes

Abstract

Privacy and security are often seen as opposites in a zero-sum game. The more you want from one, the less you get from the other. To overcome this dilemma the PRISE project (EU-funded by PASR/DG Enterprise) developed a methodology to establish sets of criteria for privacy enhancing security technologies. These sets of criteria are applicable on different levels (research, development, implementation) and by different actors (research coordinators, industry, policy-makers, public and private users). The use of these criteria is intended to contribute directly to a tangible and demonstrable improvement in security as accepted and acceptable security technologies will be more easily implemented, more widely used and confronted with less rejection by the general public and users of these technologies. A similar set of criteria is used for certification for the European Privacy Seal. Both the privacy by design approach and the certification scheme should increase the competitiveness of European security industries by providing guidance on the provision of widely acceptable security technologies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Weinandy, K., Sicherheitsforschung das Geschäft mit der Angst. Die Rolle der Ökonomie im (Un) Sicherheitsdiskurs – Eine kritische Betrachtung. 2007, Unpublished manuscript: Vienna.

    Google Scholar 

  2. Wikipedia, Security. 2009.

    Google Scholar 

  3. ÖAW, Sicherheitsforschung, Begriffsfassung und Vorgangsweise für Österreich. 2005: Vienna.

    Google Scholar 

  4. NBT, PRISE D2.2 Overview of security technologies v1.1,, EC, Editor. 2007, Norwegian Board of Technology: Oslo.

    Google Scholar 

  5. Ullman, R., Redefining Security. International Security, 1983. 8(1): p. 129–153.

    Article  MathSciNet  Google Scholar 

  6. Owen, T., Challenges and opportunities for defining and measuring human security. HUMAN RIGHTS, HUMAN SECURITY AND DISARMAMENT, Disarmament Forum 2004,, 2004. 3.

    Google Scholar 

  7. Conference on Security and Co-operation in Europe (CSCE), Helsinki Final Act,. 1975.

    Google Scholar 

  8. Tretter, H., ed. KSZE. Die Abschlussdokumente der Konferenz für Sicherheit und Zusammenarbeit in Europa. 1975 und der Nachfolgekonferenzen Belgrad 1978 und Madrid 1983,. 1984: Wien.

    Google Scholar 

  9. Hayes, B., Arming Big Brother – The EU’s Security Research Programme. 2006, Transnational Institute.

    Google Scholar 

  10. Study Group on Europe’s Security Capabilities, A Human Security Doctrine for Europe The Barcelona Report of the Study Group on Europe’s Security Capabilities Presented to EU High Representative for Common Foreign and Security Policy Javier Solana. 2004, Study Group on Europe’s Security Capabilities: Barcelona. p. 35.

    Google Scholar 

  11. Wilfried von Bredow. The Barcelona Report on a Human Security Doctrine for Europe, Overview and Some critical Remarks. in Berlin Symposium on Human Security and EU-Canada Relations Canadian Universities’ Centre Berlin. 2005. Berlin.

    Google Scholar 

  12. European Parliament Resolution of 12 December 2007 on the fight against terrorism. 2007.

    Google Scholar 

  13. Raguse, M., O. Langfeldt, and M. Hansen, PRISE D3.3 Design Proposals, European Commission PASR, Editor. 2008, Unabhängiges Landeszentrum für Datenschutz Schleswig-Holstein: Kiel.

    Google Scholar 

  14. Raguse, M., et al., PRISE D6.2 – Criteria for privacy enhancing security technologies, European Commission PASR, Editor. 2008, Institute of Technology Assessment Austrian Academy of Sciences: Vienna.

    Google Scholar 

  15. Cas, J. and W Peissl, Beeinträchtigung der Privatsphäre in ÖsterreichDatensammlungen über Ös-terreicherInnnen, Bundeskammer für Arbeiter und Angestellte, Editor. 2000, Institut für Technikfolgen-Abschätzung,: Wien.

    Google Scholar 

  16. Cas, J., W Peissl, and T Strohmaier, Datenvermeidung in der Praxis – Individuelle und gesellschaftliche Verantwortung, Bundeskammer für Arbeiter und Angestellte, Editor. 2002, Institut für Technikfolgen-Abschätzung der Österreichischen Akademie der Wissenschaften: Wien.

    Google Scholar 

  17. Klüver, L., Peissl, W, Tennøe, T, Bütschi, D., Cas, J., Deboelpaep, R., Hafskjold, Ch., Leisner, I., Nath, Ch., J., Steyaert, St., Vouilloz, N., ICT and Privacy in Europe – A report on different aspects of privacy based on studies made by EPTA members in 7 European countries. 2006, EPTA. p. 117.

    Google Scholar 

  18. Sterbik-Lamina, J., W Peissl, and J. Cas, Privatsphäre 2.0 (Beeinträchtigung der Privatsphäre in Österreich; Neue Herausforderungen für den Datenschutz), Bundesarbeitskammer, Editor. 2009, Institut für Technikfolgen-Abschätzung der Österreichischen Akademie der Wissenschaften: Wien.

    Google Scholar 

  19. Bennett, CJ. and CD. Raab, The Governance of Privacy. 2003, Aldershot, Hampshire GB: Ashgate. 257.

    Google Scholar 

  20. Jacobi, A. and M. Holst, PRISE D5.8 Synthesis Report – Interview Meetings on Security Technology and Privacy, European Commission PASR, Editor. 2008, Institute of Technology Assessment Austrian Academy of Sciences: Vienna.

    Google Scholar 

  21. Raguse, M., et al, D6.2 – Criteria for privacy enhancing security technologies, Privacy enhancing shaping of security research and technology – A participatory approach to develop acceptable and accepted principles for European Security Industries and Policies European Commission PASR, Editor. 2008, Institute of Technology Assessment Austrian Academy of Sciences: Vienna.

    Google Scholar 

  22. Cas, J., Privatsphäre und Sicherheit Ergebnisse aus dem europäischen TA-Projekt PRISE. TECHNIKFOLGENABSCHÄTZUNG – Theorie und Praxis, 2008. 17(3): p. 79–82.

    Google Scholar 

  23. Bock, K., European privacy Seal – Final report, European Commission – eTEN, Editor. 2009, Unab-haengiges Landeszentrum fuer Datenschutz Schleswig-Holstein (ULD, Independent Centre of Privacy Protection): Kiel. p. 24.

    Google Scholar 

  24. Bock, K., S. Meissner, and K. Storf, Description of EuroPriSe Criteria and Procedures (updated Version 1.1), European Commission – eTEN, Editor. 2009, Unabhaengiges Landeszentrum fuer Datenschutz Schleswig-Holstein (ULD, Independent Centre of Privacy Protection): Kiel. p. 41.

    Google Scholar 

  25. Borking, J.J., The Business Case for PET and the EuroPrise Seal. 2009.

    Google Scholar 

Download references

Authors

Editor information

Norbert Pohlmann Helmut Reimer Wolfgang Schneider

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Vieweg+Teubner | GWV Fachverlage GmbH

About this chapter

Cite this chapter

Peissl, W. (2010). Privacy and Security – a Way to Manage the Dilemma. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2009 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9363-5_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-9363-5_18

  • Publisher Name: Vieweg+Teubner

  • Print ISBN: 978-3-8348-0958-2

  • Online ISBN: 978-3-8348-9363-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics