Skip to main content
Top

Hint

Swipe to navigate through the chapters of this book

Published in:
Cover of the book

2017 | OriginalPaper | Chapter

Introduction: Privacy, Data Protection and Cybersecurity in Europe

The Conceptual and Factual Field

Authors : Max-Otto Baumann, Wolf J. Schünemann

Published in: Privacy, Data Protection and Cybersecurity in Europe

Publisher: Springer International Publishing

Abstract

Our introduction consists of four steps. In the first, we prepare the field by defining and discussing the core concepts of this book—privacy, data protection and cybersecurity. All three issues come with a distinct research tradition, but in the digitised society, these issues increasingly overlap, which arguably necessitates a fresh scientific approach. In the second step, we try to disentangle the complex net of interests and dynamics around these issues by proposing an actor-based approach, distinguishing three ideal-types of actors: citizens/users, the business sector and the state which we understand as forming a triangular relationship, a “ménage a trois”, where all interests are also related to collective societal values such as security, efficiency, equality and trust. This concept is hardly novel, but it allows us to identify a distinct social science perspective on privacy and data protection as politically contested issues—a perspective which is currently largely missing in the literature. It also offers a framework for comparative studies, as for example societies can be expected to direct their regulatory efforts towards different balances of interests. In the third step, we focus particularly on cybersecurity and suggest on the basis of a literature review that discourse studies offer an interesting avenue for comparative study, advancing new research that goes beyond technicalities and connects cybersecurity with broader societal factors as identified above. In the fourth step, the introduction concludes with a brief overview of the individual contributions that we have organized in three sections.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Directive (EU) 2016/680 of the European Parliament and of the Council of 27 April 2016. The OECD also spells out in its Privacy Guidelines from 1980 a security safeguards principle according to which “Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorised access, destruction, use, modification or disclosure of data.” (OECD 2013: 23).
 
Literature
go back to reference Andress, J., & Winterfeld, S. (2011). Cyber warfare techniques. Tactics and tools for security practitioners. Amsterdam, Heidelberg [u.a.], Waltham, MA: Elsevier Syngress. Andress, J., & Winterfeld, S. (2011). Cyber warfare techniques. Tactics and tools for security practitioners. Amsterdam, Heidelberg [u.a.], Waltham, MA: Elsevier Syngress.
go back to reference Arquilla, J., & Ronfeldt, D. (1997). Cyberwar is coming! In J. Arquilla & D. Ronfeldt (Eds.), In Athena’s camp. Preparing for conflict in the information age (pp. 23–60). Santa Monica, CA: Rand. Arquilla, J., & Ronfeldt, D. (1997). Cyberwar is coming! In J. Arquilla & D. Ronfeldt (Eds.), In Athena’s camp. Preparing for conflict in the information age (pp. 23–60). Santa Monica, CA: Rand.
go back to reference Balzacq, T. (2011). A theory of securitization. Origins, core assumptions, and variants. In T. Balzacq (Ed.), PRIO new security studies. Securitization theory. How security problems emerge and dissolve (1st ed., pp. 1–30). London [u.a.]: Routledge. Balzacq, T. (2011). A theory of securitization. Origins, core assumptions, and variants. In T. Balzacq (Ed.), PRIO new security studies. Securitization theory. How security problems emerge and dissolve (1st ed., pp. 1–30). London [u.a.]: Routledge.
go back to reference Baumann, M.-O. (2015). Privatsphäre als neues digitales Menschenrecht? Ethische Prinzipien und aktuelle Diskussionen. Hamburg: DIVSI Diskussionsbeiträge. Baumann, M.-O. (2015). Privatsphäre als neues digitales Menschenrecht? Ethische Prinzipien und aktuelle Diskussionen. Hamburg: DIVSI Diskussionsbeiträge.
go back to reference Bennett, C. J., & Raab, C. (2006). The governance of privacy. Policy instruments in global perspective. Cambridge: MIT Press. Bennett, C. J., & Raab, C. (2006). The governance of privacy. Policy instruments in global perspective. Cambridge: MIT Press.
go back to reference Bentham, J. (2003 [1791]). Panopticon: or, the inspection-house. Containing the idea of a new principle of construction applicable to any sort of establishment, in which persons of any Description are to be kept under Inspection. and in particular to penitentiary-houses, prisons, Houses of Industry, Work-Houses, Poor-Houses, Manufactories, Mad-Houses, Hospitals, and Schools. With a plan of Management adapted to the Principle. In a series of letters, written in the Year 1787, From Crecheff in White Russia, to a Friend in England. Dublin: Eighteenth Century Collections Online. http://​find.​galegroup.​com/​ecco/​infomark.​do?​&​source=​gale&​prodId=​ECCO&​userGroupName=​heidel&​tabID=​T001&​docId=​CW125793319&​type=​multipage&​contentSet=​ECCOArticles&​version=​1.​0&​docLevel=​FASCIMILE Bentham, J. (2003 [1791]). Panopticon: or, the inspection-house. Containing the idea of a new principle of construction applicable to any sort of establishment, in which persons of any Description are to be kept under Inspection. and in particular to penitentiary-houses, prisons, Houses of Industry, Work-Houses, Poor-Houses, Manufactories, Mad-Houses, Hospitals, and Schools. With a plan of Management adapted to the Principle. In a series of letters, written in the Year 1787, From Crecheff in White Russia, to a Friend in England. Dublin: Eighteenth Century Collections Online. http://​find.​galegroup.​com/​ecco/​infomark.​do?​&​source=​gale&​prodId=​ECCO&​userGroupName=​heidel&​tabID=​T001&​docId=​CW125793319&​type=​multipage&​contentSet=​ECCOArticles&​version=​1.​0&​docLevel=​FASCIMILE
go back to reference Berlinghoff, M. (2013). “Totalerfassung” im “Computerstaat”—Computer und Privatheit in den 1970er und 1980er Jahren. In U. Ackermann (Ed.), Im Sog des Internets. Öffentlichkeit und Privatheit im digitalen Zeitalter (pp. 93–110). Frankfurt am Main: Humanities Online. Berlinghoff, M. (2013). “Totalerfassung” im “Computerstaat”—Computer und Privatheit in den 1970er und 1980er Jahren. In U. Ackermann (Ed.), Im Sog des Internets. Öffentlichkeit und Privatheit im digitalen Zeitalter (pp. 93–110). Frankfurt am Main: Humanities Online.
go back to reference Billo, C. G., & Chang, W. (2004). Cyber warfare. An analysis of the means and motivations of selected nation states. Dartmouth. Billo, C. G., & Chang, W. (2004). Cyber warfare. An analysis of the means and motivations of selected nation states. Dartmouth.
go back to reference Busch, A., & Jakobi, T. (2011). Die Erfindung eines neuen Grundrechts: Zu Konzept und Auswirkungen der “informationellen Selbstbestimmung”. In C. Hönnige, S. Kneip, & A. Lorenz (Eds.), Verfassungswandel im Mehrebenensystem (pp. 297–320). Wiesbaden: VS Verlag für Sozialwissenschaften. CrossRef Busch, A., & Jakobi, T. (2011). Die Erfindung eines neuen Grundrechts: Zu Konzept und Auswirkungen der “informationellen Selbstbestimmung”. In C. Hönnige, S. Kneip, & A. Lorenz (Eds.), Verfassungswandel im Mehrebenensystem (pp. 297–320). Wiesbaden: VS Verlag für Sozialwissenschaften. CrossRef
go back to reference Buzan, B., Waever, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder, CO: Lynne Rienner. Buzan, B., Waever, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder, CO: Lynne Rienner.
go back to reference Capurro, R. (2005). Privacy. An intercultural perspective. Ethics and Information Technology, 7, 37–47. CrossRef Capurro, R. (2005). Privacy. An intercultural perspective. Ethics and Information Technology, 7, 37–47. CrossRef
go back to reference Cate, F. H., & Mayer-Schönberger, V. (2013). Tomorrow’s privacy. Notice and consent in a world of Big Data. International Data Privacy Law, 3(2), 67–73. CrossRef Cate, F. H., & Mayer-Schönberger, V. (2013). Tomorrow’s privacy. Notice and consent in a world of Big Data. International Data Privacy Law, 3(2), 67–73. CrossRef
go back to reference Cohen, J. E. (2013). What privacy is for. Harvard Law Review, 126, 1904–1933. Cohen, J. E. (2013). What privacy is for. Harvard Law Review, 126, 1904–1933.
go back to reference Dunn Cavelty, M. (2013). Der Cyber-Krieg, der (so) nicht kommt: Erzählte Katastrophen als (Nicht)Wissenspraxis. In L. Hempel & M. Bartels (Eds.), Sozialtheorie. Aufbruch ins Unversicherbare. Zum Katastrophendiskurs der Gegenwart (2nd ed., pp. 209–233). Bielefeld: Transcript. Dunn Cavelty, M. (2013). Der Cyber-Krieg, der (so) nicht kommt: Erzählte Katastrophen als (Nicht)Wissenspraxis. In L. Hempel & M. Bartels (Eds.), Sozialtheorie. Aufbruch ins Unversicherbare. Zum Katastrophendiskurs der Gegenwart (2nd ed., pp. 209–233). Bielefeld: Transcript.
go back to reference Easton, D. (1965). A systems analysis of political life. New York: Wiley. Easton, D. (1965). A systems analysis of political life. New York: Wiley.
go back to reference Eckert, C. (2014). IT-Sicherheit: Konzepte, Verfahren, Protokolle, De Gruyter Studium (9th ed.). Oldenbourg: de Gruyter. Eckert, C. (2014). IT-Sicherheit: Konzepte, Verfahren, Protokolle, De Gruyter Studium (9th ed.). Oldenbourg: de Gruyter.
go back to reference Eurobarometer. (2011). Attitudes on data protection and electronic identity in the European Union. Special Eurobarometer 359: Brussels: European Commission. Eurobarometer. (2011). Attitudes on data protection and electronic identity in the European Union. Special Eurobarometer 359: Brussels: European Commission.
go back to reference Foucault, M. (1981). Überwachen und Strafen: Die Geburt des Gefängnisses, Suhrkamp-Taschenbuch Wissenschaft (Vol. 184, 4th ed.). Frankfurt am Main: Suhrkamp. Foucault, M. (1981). Überwachen und Strafen: Die Geburt des Gefängnisses, Suhrkamp-Taschenbuch Wissenschaft (Vol. 184, 4th ed.). Frankfurt am Main: Suhrkamp.
go back to reference Gaycken, S. (2012). Cyberwar. Das Wettrüsten hat längst begonnen. Vom digitalen Angriff zum realen Ausnahmezustand, Goldmann (Vol. 15710). München: Goldmann. Gaycken, S. (2012). Cyberwar. Das Wettrüsten hat längst begonnen. Vom digitalen Angriff zum realen Ausnahmezustand, Goldmann (Vol. 15710). München: Goldmann.
go back to reference Greenleaf, G. (2013). Data protection in a globalised network. In I. Brown (Ed.), Research handbook on governance of the Internet (pp. 221–259). Cheltenham: Edward Elgar. CrossRef Greenleaf, G. (2013). Data protection in a globalised network. In I. Brown (Ed.), Research handbook on governance of the Internet (pp. 221–259). Cheltenham: Edward Elgar. CrossRef
go back to reference Guitton, C. (2013). Cyber insecurity as a national threat: Overreaction from Germany, France and the UK? European Security, 20(1), 21–35. CrossRef Guitton, C. (2013). Cyber insecurity as a national threat: Overreaction from Germany, France and the UK? European Security, 20(1), 21–35. CrossRef
go back to reference Kubieziel, J. (2012). Anonym im Netz: Wie Sie sich und Ihre Daten schützen (3rd). user space. München: Open Source Press. Kubieziel, J. (2012). Anonym im Netz: Wie Sie sich und Ihre Daten schützen (3rd). user space. München: Open Source Press.
go back to reference Neuneck, G. (2013). Assessment of international and regional activities. In J. A. Lewis & G. Neuneck (Eds.), UNIDIR: Vol. 3. The Cyber Index. International Security Trends and Realities (pp. 91–140). Neuneck, G. (2013). Assessment of international and regional activities. In J. A. Lewis & G. Neuneck (Eds.), UNIDIR: Vol. 3. The Cyber Index. International Security Trends and Realities (pp. 91–140).
go back to reference Nissenbaum, H. (1998). Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy, 17(5/6), 559–596. Nissenbaum, H. (1998). Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy, 17(5/6), 559–596.
go back to reference Podesta, J. (2014). Big data: Seizing opportunities, preserving values. Washington, DC: Executive Office of the President. Podesta, J. (2014). Big data: Seizing opportunities, preserving values. Washington, DC: Executive Office of the President.
go back to reference Regan, P. M. (1995). Legislating privacy. Technology, social values, and public policy. Chapel Hill & London: The University of North Carolina Press. Regan, P. M. (1995). Legislating privacy. Technology, social values, and public policy. Chapel Hill & London: The University of North Carolina Press.
go back to reference Rid, T., & Buchanan, B. (2015). Attributing cyber attacks. Journal of Strategic Studies, 38(1–2), 4–37. CrossRef Rid, T., & Buchanan, B. (2015). Attributing cyber attacks. Journal of Strategic Studies, 38(1–2), 4–37. CrossRef
go back to reference Rössler, B. (2001). Der Wert des Privaten. Frankfurt am Main: Suhrkamp. Rössler, B. (2001). Der Wert des Privaten. Frankfurt am Main: Suhrkamp.
go back to reference Rule, J. B., & Greenleaf, G. W. (Eds.). (2008). Global privacy protection: The first generation. Cheltenham: Edward Elgar. Rule, J. B., & Greenleaf, G. W. (Eds.). (2008). Global privacy protection: The first generation. Cheltenham: Edward Elgar.
go back to reference Schermer, B. W., Custers, B., & van der Hof, S. (2014). The crisis of consent: How stronger legal protection may lead to weaker consent in data protection. Ethics and Information Technology, 2, 171–182. Schermer, B. W., Custers, B., & van der Hof, S. (2014). The crisis of consent: How stronger legal protection may lead to weaker consent in data protection. Ethics and Information Technology, 2, 171–182.
go back to reference Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. Oxford: Oxford University Press. (What everyone needs to know). Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. Oxford: Oxford University Press. (What everyone needs to know).
go back to reference Solove, D. J. (2002). Conceptualizing privacy. California Law Review, 90(4), 1087–1155. CrossRef Solove, D. J. (2002). Conceptualizing privacy. California Law Review, 90(4), 1087–1155. CrossRef
go back to reference Westin, A. F. (1970). Privacy and freedom. London: Bodley Head. Westin, A. F. (1970). Privacy and freedom. London: Bodley Head.
Metadata
Title
Introduction: Privacy, Data Protection and Cybersecurity in Europe
Authors
Max-Otto Baumann
Wolf J. Schünemann
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-53634-7_1