2013
DOI: 10.1007/s13347-013-0104-0
|View full text |Cite
|
Sign up to set email alerts
|

Balance or Trade-off? Online Security Technologies and Fundamental Rights

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
23
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(23 citation statements)
references
References 21 publications
0
23
0
Order By: Relevance
“…However, gaining access to and capturing data involves exactly the kind of cyber-threats to the privacy of information and confidentiality of communication that the first kind of cybersecurity technologies is designed to protect people from. Hildebrandt (2013) observes that the expression 'to balance' can be used in this context to indicate two very different concepts. In the sense of a trade-off, the concept of a balance implies that it is necessary to curtail, imperfectly realise or narrowly specify a right's content in order to achieve a high enough level of security.…”
Section: Human Rightsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, gaining access to and capturing data involves exactly the kind of cyber-threats to the privacy of information and confidentiality of communication that the first kind of cybersecurity technologies is designed to protect people from. Hildebrandt (2013) observes that the expression 'to balance' can be used in this context to indicate two very different concepts. In the sense of a trade-off, the concept of a balance implies that it is necessary to curtail, imperfectly realise or narrowly specify a right's content in order to achieve a high enough level of security.…”
Section: Human Rightsmentioning
confidence: 99%
“…Cybersecurity, understood broadly, is usually considered as a whole bundle of technologies and policies to protect the cyber-infrastructure. Following Hildebrandt (2013), we can distinguish three main classes of technology for cybersecurity: technologies that ensure confidentiality of information (including authentication of the intended recipients of communication); technologies that detect and counter online threats and vulnerabilities; and technologies that detect and counter cybercrime such as forgery, fraud, child pornography and copyright violations committed in cyberspace. In each of those application domains, different ethical problems emerge.…”
Section: Introductionmentioning
confidence: 99%
“…3 We recognize that there are more expansive notions of privacy and of the right protecting it, which are particularly relevant in the sphere of online interactions. For example, the right to privacy may be considered an all-encompassing right that provides protection to almost all aspects of identity, personhood, and dignity (Hildebrandt 2013). 4 The concept of privacy as access has, however, an important history.…”
Section: Introductionmentioning
confidence: 99%
“…Following the call for smart technologies in our current society (Hildebrandt, 2013) ranging from smart cities to smart medicines and from smart meters to smart carsa relatively new phenomenon in the agricultural sector is the application of smart farming technologies (Reichardt, Jürgens, Klöbe, Hüter, & Moser, 2009). By the integration of smart technology and the internet of thingsin which computers, censoring devices, GPS systems but also robots and even animals communicate with one another and function autonomously in an integrated farm management systemfarmers can reduce farm inputs (fertilizers and pesticides) and increase yields, while reducing emissions to the environment (Bos & Munnichs, 2016).…”
Section: Introductionmentioning
confidence: 99%