Abstract
Privacy and security are often seen as opposites in a zero-sum game. The more you want from one, the less you get from the other. To overcome this dilemma the PRISE project (EU-funded by PASR/DG Enterprise) developed a methodology to establish sets of criteria for privacy enhancing security technologies. These sets of criteria are applicable on different levels (research, development, implementation) and by different actors (research coordinators, industry, policy-makers, public and private users). The use of these criteria is intended to contribute directly to a tangible and demonstrable improvement in security as accepted and acceptable security technologies will be more easily implemented, more widely used and confronted with less rejection by the general public and users of these technologies. A similar set of criteria is used for certification for the European Privacy Seal. Both the privacy by design approach and the certification scheme should increase the competitiveness of European security industries by providing guidance on the provision of widely acceptable security technologies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Weinandy, K., Sicherheitsforschung das Geschäft mit der Angst. Die Rolle der Ökonomie im (Un) Sicherheitsdiskurs – Eine kritische Betrachtung. 2007, Unpublished manuscript: Vienna.
Wikipedia, Security. 2009.
ÖAW, Sicherheitsforschung, Begriffsfassung und Vorgangsweise für Österreich. 2005: Vienna.
NBT, PRISE D2.2 Overview of security technologies v1.1,, EC, Editor. 2007, Norwegian Board of Technology: Oslo.
Ullman, R., Redefining Security. International Security, 1983. 8(1): p. 129–153.
Owen, T., Challenges and opportunities for defining and measuring human security. HUMAN RIGHTS, HUMAN SECURITY AND DISARMAMENT, Disarmament Forum 2004,, 2004. 3.
Conference on Security and Co-operation in Europe (CSCE), Helsinki Final Act,. 1975.
Tretter, H., ed. KSZE. Die Abschlussdokumente der Konferenz für Sicherheit und Zusammenarbeit in Europa. 1975 und der Nachfolgekonferenzen Belgrad 1978 und Madrid 1983,. 1984: Wien.
Hayes, B., Arming Big Brother – The EU’s Security Research Programme. 2006, Transnational Institute.
Study Group on Europe’s Security Capabilities, A Human Security Doctrine for Europe The Barcelona Report of the Study Group on Europe’s Security Capabilities Presented to EU High Representative for Common Foreign and Security Policy Javier Solana. 2004, Study Group on Europe’s Security Capabilities: Barcelona. p. 35.
Wilfried von Bredow. The Barcelona Report on a Human Security Doctrine for Europe, Overview and Some critical Remarks. in Berlin Symposium on Human Security and EU-Canada Relations Canadian Universities’ Centre Berlin. 2005. Berlin.
European Parliament Resolution of 12 December 2007 on the fight against terrorism. 2007.
Raguse, M., O. Langfeldt, and M. Hansen, PRISE D3.3 Design Proposals, European Commission PASR, Editor. 2008, Unabhängiges Landeszentrum für Datenschutz Schleswig-Holstein: Kiel.
Raguse, M., et al., PRISE D6.2 – Criteria for privacy enhancing security technologies, European Commission PASR, Editor. 2008, Institute of Technology Assessment Austrian Academy of Sciences: Vienna.
Cas, J. and W Peissl, Beeinträchtigung der Privatsphäre in Österreich – Datensammlungen über Ös-terreicherInnnen, Bundeskammer für Arbeiter und Angestellte, Editor. 2000, Institut für Technikfolgen-Abschätzung,: Wien.
Cas, J., W Peissl, and T Strohmaier, Datenvermeidung in der Praxis – Individuelle und gesellschaftliche Verantwortung, Bundeskammer für Arbeiter und Angestellte, Editor. 2002, Institut für Technikfolgen-Abschätzung der Österreichischen Akademie der Wissenschaften: Wien.
Klüver, L., Peissl, W, Tennøe, T, Bütschi, D., Cas, J., Deboelpaep, R., Hafskjold, Ch., Leisner, I., Nath, Ch., J., Steyaert, St., Vouilloz, N., ICT and Privacy in Europe – A report on different aspects of privacy based on studies made by EPTA members in 7 European countries. 2006, EPTA. p. 117.
Sterbik-Lamina, J., W Peissl, and J. Cas, Privatsphäre 2.0 (Beeinträchtigung der Privatsphäre in Österreich; Neue Herausforderungen für den Datenschutz), Bundesarbeitskammer, Editor. 2009, Institut für Technikfolgen-Abschätzung der Österreichischen Akademie der Wissenschaften: Wien.
Bennett, CJ. and CD. Raab, The Governance of Privacy. 2003, Aldershot, Hampshire GB: Ashgate. 257.
Jacobi, A. and M. Holst, PRISE D5.8 Synthesis Report – Interview Meetings on Security Technology and Privacy, European Commission PASR, Editor. 2008, Institute of Technology Assessment Austrian Academy of Sciences: Vienna.
Raguse, M., et al, D6.2 – Criteria for privacy enhancing security technologies, Privacy enhancing shaping of security research and technology – A participatory approach to develop acceptable and accepted principles for European Security Industries and Policies European Commission PASR, Editor. 2008, Institute of Technology Assessment Austrian Academy of Sciences: Vienna.
Cas, J., Privatsphäre und Sicherheit Ergebnisse aus dem europäischen TA-Projekt PRISE. TECHNIKFOLGENABSCHÄTZUNG – Theorie und Praxis, 2008. 17(3): p. 79–82.
Bock, K., European privacy Seal – Final report, European Commission – eTEN, Editor. 2009, Unab-haengiges Landeszentrum fuer Datenschutz Schleswig-Holstein (ULD, Independent Centre of Privacy Protection): Kiel. p. 24.
Bock, K., S. Meissner, and K. Storf, Description of EuroPriSe Criteria and Procedures (updated Version 1.1), European Commission – eTEN, Editor. 2009, Unabhaengiges Landeszentrum fuer Datenschutz Schleswig-Holstein (ULD, Independent Centre of Privacy Protection): Kiel. p. 41.
Borking, J.J., The Business Case for PET and the EuroPrise Seal. 2009.
Editor information
Rights and permissions
Copyright information
© 2010 Vieweg+Teubner | GWV Fachverlage GmbH
About this chapter
Cite this chapter
Peissl, W. (2010). Privacy and Security – a Way to Manage the Dilemma. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2009 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9363-5_18
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9363-5_18
Publisher Name: Vieweg+Teubner
Print ISBN: 978-3-8348-0958-2
Online ISBN: 978-3-8348-9363-5
eBook Packages: Computer ScienceComputer Science (R0)