Skip to main content
Top

2017 | OriginalPaper | Chapter

A Conceptual and Legal Approach to the Cyberspace: The Dilemma Security Versus Freedom

Author : Bernardino Cortijo

Published in: Cyberspace

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We should not assume that security and freedom are constantly at war with each other. When a person or a population is considered safe, do they consider themselves free? Usually, the opposite is true. If it is not so, what kind of freedom are we talking about? In fact, insecurity mainly has two key precursors; those with adverse natural, immediate or catastrophic effects, and those that arise from criminal or pre-criminal activities. The former naturally limit or condition us, as we try to limit or reduce their consequences, but we are not able to master them as such. But we cannot forget that there are other aspects which have complicated the picture. The use of computer tools in the Internet environment forces us to work from a much more technical point of view when we analyze crime materials and risk, as well as types of criminals and the use of tests and expert reports. Today, although the problems have not been solved, we have incorporated cyber intelligence activities, which allow us to access open sources via the Internet, or to enter private networks. These actions can be used both for good and for evil, but we have to consider and know them to have a slightly clearer idea of what we are really dealing with today when we are talking about cybercrime and cyber espionage. The current cyberspace world in which we live shows us the disadvantages we have in obtaining this freedom and, therefore, reaching equilibrium with safety, but they are not opposite concepts.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Some examples about this technological anonymity evolution are the new Virtual Private Networks (VPN), such as Cyberghost VPN, Droid VPN, Free VPN 1.8, and The Onion Router (TOR). All of them are used to hide IP address and their respective origin. Also I2P (routers and tunnels), distributed and dynamic with encryption EIGamal, AES, ST, and PROXIES to hinder the investigations. Other options and tools are VPN clients routing through the Jon Do network (old JAP). For file sharing purposes, they use Freenet, TUVPN, WOT or Duck Duck Go finder.
 
2
Some examples include: Endomondo, iDoctus, Medisafe, SIG: OruxMaps, QGis, Collector for ArcGIS, Google Maps, OSM, Fulcrum, Waze Social, Couple, Cozi, Facebook, Pplkpr, Swiftkey, Amazon; as well as Magnetoresistive random-access memory.
 
Literature
go back to reference Alvarez Caro M (2015) El Derecho al Olvido en Internet. Editorial REUS Alvarez Caro M (2015) El Derecho al Olvido en Internet. Editorial REUS
go back to reference BBC (2006) Magnetic memory chip unveiled. BBC News, 07 Oct 2006 BBC (2006) Magnetic memory chip unveiled. BBC News, 07 Oct 2006
go back to reference BOE (2015) Código del Derecho al Olvido. BOLETIN OFICIAL DEL ESTADO (last versión 2017/24/01) BOE (2015) Código del Derecho al Olvido. BOLETIN OFICIAL DEL ESTADO (last versión 2017/24/01)
go back to reference Brock G (2016) Right to be forgotten. George Brock I.B., Tauris Brock G (2016) Right to be forgotten. George Brock I.B., Tauris
go back to reference Bueno F (2012) FODERTICS estudios sobre Derecho y nuevas Tecnologías. Editorial Andavira Bueno F (2012) FODERTICS estudios sobre Derecho y nuevas Tecnologías. Editorial Andavira
go back to reference Chadwick R (2014) The right to know and the right not to know. Cambridge University Press, Cambridge Chadwick R (2014) The right to know and the right not to know. Cambridge University Press, Cambridge
go back to reference Davara MA (2015) Manual de Derecho Informático Thomson Reuters Aranzadi, 11 edn Davara MA (2015) Manual de Derecho Informático Thomson Reuters Aranzadi, 11 edn
go back to reference De Salvador Carrasco L (2012) Redes de Anonimización en Internet: Cómo funcionan y cuándo son sus límites. Revista Instituto Español de Estudios Estratégicos N.16 of 2012 ieee.es De Salvador Carrasco L (2012) Redes de Anonimización en Internet: Cómo funcionan y cuándo son sus límites. Revista Instituto Español de Estudios Estratégicos N.16 of 2012 ieee.es
go back to reference Touriño, A. (2014). El Derecho al Olvido y a la Intimidad en Internet. La Catarata Touriño, A. (2014). El Derecho al Olvido y a la Intimidad en Internet. La Catarata
Metadata
Title
A Conceptual and Legal Approach to the Cyberspace: The Dilemma Security Versus Freedom
Author
Bernardino Cortijo
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-54975-0_3

Premium Partner