Skip to main content

2017 | OriginalPaper | Buchkapitel

A Conceptual and Legal Approach to the Cyberspace: The Dilemma Security Versus Freedom

verfasst von : Bernardino Cortijo

Erschienen in: Cyberspace

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We should not assume that security and freedom are constantly at war with each other. When a person or a population is considered safe, do they consider themselves free? Usually, the opposite is true. If it is not so, what kind of freedom are we talking about? In fact, insecurity mainly has two key precursors; those with adverse natural, immediate or catastrophic effects, and those that arise from criminal or pre-criminal activities. The former naturally limit or condition us, as we try to limit or reduce their consequences, but we are not able to master them as such. But we cannot forget that there are other aspects which have complicated the picture. The use of computer tools in the Internet environment forces us to work from a much more technical point of view when we analyze crime materials and risk, as well as types of criminals and the use of tests and expert reports. Today, although the problems have not been solved, we have incorporated cyber intelligence activities, which allow us to access open sources via the Internet, or to enter private networks. These actions can be used both for good and for evil, but we have to consider and know them to have a slightly clearer idea of what we are really dealing with today when we are talking about cybercrime and cyber espionage. The current cyberspace world in which we live shows us the disadvantages we have in obtaining this freedom and, therefore, reaching equilibrium with safety, but they are not opposite concepts.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Some examples about this technological anonymity evolution are the new Virtual Private Networks (VPN), such as Cyberghost VPN, Droid VPN, Free VPN 1.8, and The Onion Router (TOR). All of them are used to hide IP address and their respective origin. Also I2P (routers and tunnels), distributed and dynamic with encryption EIGamal, AES, ST, and PROXIES to hinder the investigations. Other options and tools are VPN clients routing through the Jon Do network (old JAP). For file sharing purposes, they use Freenet, TUVPN, WOT or Duck Duck Go finder.
 
2
Some examples include: Endomondo, iDoctus, Medisafe, SIG: OruxMaps, QGis, Collector for ArcGIS, Google Maps, OSM, Fulcrum, Waze Social, Couple, Cozi, Facebook, Pplkpr, Swiftkey, Amazon; as well as Magnetoresistive random-access memory.
 
Literatur
Zurück zum Zitat Alvarez Caro M (2015) El Derecho al Olvido en Internet. Editorial REUS Alvarez Caro M (2015) El Derecho al Olvido en Internet. Editorial REUS
Zurück zum Zitat BBC (2006) Magnetic memory chip unveiled. BBC News, 07 Oct 2006 BBC (2006) Magnetic memory chip unveiled. BBC News, 07 Oct 2006
Zurück zum Zitat BOE (2015) Código del Derecho al Olvido. BOLETIN OFICIAL DEL ESTADO (last versión 2017/24/01) BOE (2015) Código del Derecho al Olvido. BOLETIN OFICIAL DEL ESTADO (last versión 2017/24/01)
Zurück zum Zitat Brock G (2016) Right to be forgotten. George Brock I.B., Tauris Brock G (2016) Right to be forgotten. George Brock I.B., Tauris
Zurück zum Zitat Bueno F (2012) FODERTICS estudios sobre Derecho y nuevas Tecnologías. Editorial Andavira Bueno F (2012) FODERTICS estudios sobre Derecho y nuevas Tecnologías. Editorial Andavira
Zurück zum Zitat Chadwick R (2014) The right to know and the right not to know. Cambridge University Press, Cambridge Chadwick R (2014) The right to know and the right not to know. Cambridge University Press, Cambridge
Zurück zum Zitat Davara MA (2015) Manual de Derecho Informático Thomson Reuters Aranzadi, 11 edn Davara MA (2015) Manual de Derecho Informático Thomson Reuters Aranzadi, 11 edn
Zurück zum Zitat De Salvador Carrasco L (2012) Redes de Anonimización en Internet: Cómo funcionan y cuándo son sus límites. Revista Instituto Español de Estudios Estratégicos N.16 of 2012 ieee.es De Salvador Carrasco L (2012) Redes de Anonimización en Internet: Cómo funcionan y cuándo son sus límites. Revista Instituto Español de Estudios Estratégicos N.16 of 2012 ieee.es
Zurück zum Zitat Touriño, A. (2014). El Derecho al Olvido y a la Intimidad en Internet. La Catarata Touriño, A. (2014). El Derecho al Olvido y a la Intimidad en Internet. La Catarata
Metadaten
Titel
A Conceptual and Legal Approach to the Cyberspace: The Dilemma Security Versus Freedom
verfasst von
Bernardino Cortijo
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-54975-0_3

Premium Partner