2014
DOI: 10.1007/978-1-4471-6530-9_1
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Versus Security… Are We Done Yet?

Abstract: It is often assumed that privacy and security are alternative values, which cannot be pursued together. Hence, the strength of the "nothing-to-hide argument": if you have nothing to hide, you have nothing to fear. Besides, ensuring the security of the network itself is said to actually require a detailed analysis of network flows. Reasonable expectations of privacy should thus progressively disappear in cyberspace. While it is true that enforcement of legal rules is a real challenge when communications are tra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…The ACFE noted that more research is required to be conducted in the context of a particular business organisation with focus on an in-depth understanding of the roles of cross functional management team in preventing IIDTRC. Stalla-Bourdillon (2014) emphasised the need for in-depth understanding of the management roles and their implications in business information system security. Okeke (2015) suggests that studying the management implication is a vital prerequisite for modelling effective IIDTRC prevention strategies, which requires integration of role-based strategies which includes IT security and crime prevention team would enhance prevention IIDTRC crimes.…”
Section: Generic Prevention Model and Software Security Are Not Enoughmentioning
confidence: 99%
“…The ACFE noted that more research is required to be conducted in the context of a particular business organisation with focus on an in-depth understanding of the roles of cross functional management team in preventing IIDTRC. Stalla-Bourdillon (2014) emphasised the need for in-depth understanding of the management roles and their implications in business information system security. Okeke (2015) suggests that studying the management implication is a vital prerequisite for modelling effective IIDTRC prevention strategies, which requires integration of role-based strategies which includes IT security and crime prevention team would enhance prevention IIDTRC crimes.…”
Section: Generic Prevention Model and Software Security Are Not Enoughmentioning
confidence: 99%
“…Public safety and order and the protection of health and morals could be accumulated under the umbrella of public security. 50 However, delineating boundaries cannot be clearly drawn, while the States and Convention organs do not consider these clauses to be mutually exclusive. In this manner, a State would be able to invoke collectively national security and, for instance, public safety.…”
Section: Council Of Europementioning
confidence: 99%