Abstract
Considerable criticism has been levelled against thinking of privacy and security as being placed in a trade-off relation. Accepting this criticism, this paper explores to what use the trade-off model can still be put thereafter. In specific situations, it makes sense to think of privacy and security as simple concepts that are related in the form of a trade-off, even though it has been argued widely that this is a misrepresentation of concepts that are far too complex to be thought of in such a simple structure. As a first step, the sociotechnical analysis in this paper further highlights the complexities of the practice of body scanners installed at airports for security purposes. These complexities contribute additionally to rendering a simple privacy/security trade-off untenable. However, as a second step, the same analysis is thought through again so as to highlight opportunities to use the – deliberately simple – structure of the trade-off model to overcome part of its own shortcomings. At closer look, the empirical inaccuracy of the trade-off model becomes only problematic if it is used as a justification for imposing security measures that encroach privacy: “this small piece of privacy must be sacrificed, as this additional security is indispensable”. However, some right to existence is still retained for the trade-off model. Therefore, instead, it is suggested that the trade-off model be used on the one hand as a heuristic device to trace potential difficulties in the application of a security technology, and on the other hand as a framing that by its simplicity and appeal earns impetus for a particular discourse.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Euronews, “Obama Defends ‘Privacy Trade-Off’ for Security,” http://www.euronews.com/2013/06/07/obama-defends-privacy-trade-off-for-security/.
- 2.
Marc van Lieshout et al., “Reconciling Privacy and Security,” Innovation: The European Journal of Social Science Research 26, no. 1–2 (2013).
- 3.
Daniel J. Solove, ““I’ve Got Nothing to Hide” and Other Misunderstandings of Privacy,” (2007); Nothing to Hide: The False Tradeoff between Privacy and Security (New Haven, London: Yale University Press, 2011); Jennifer Chandler, “Privacy Versus National Security: Clarifying the Trade-Off,” in On the Identity Trail: Anonymity, Privacy and Identity in a Networked Society, ed. Ian Kerr, Valerie Steeves, and Carole Lucock (Oxford: Oxford University Press, 2009).
- 4.
George Gaskell et al., “Gm Foods and the Misperception of Risk Perception,” Risk Analysis 24, no. 1 (2004).
- 5.
Louise Amoore, “Biometric Borders: Governing Mobilities in the War on Terror,” Political Geography 25, no. 3 (2006).
- 6.
Solove, Nothing to Hide: The False Tradeoff between Privacy and Security.
- 7.
David Wright et al., “Privacy, Trust and Policy-Making: Challenges and Responses,” Computer Law & Security Review 25, no. 1 (2009).
- 8.
Lauren B. Movius, “U.S. And Eu Privacy Policy: Comparison of Regulatory Approaches,” International Journal of Communication 3(2009).
- 9.
Lee S. Strickland and Laura E. Hunt, “Technology, Security, and Individual Privacy: New Tools, New Threats, and New Public Perceptions,” Journal of the American Society for Information Science and Technology 56, no. 3 (2005).
- 10.
Solove, Nothing to Hide: The False Tradeoff between Privacy and Security.
- 11.
Bruce Schneier, “Protecting Privacy and Liberty. The Events of 11 September Offer a Rare Chance to Rethink Public Security,” Nature 413, no. 25 October 2001 (2001).
- 12.
Gaskell et al., “Gm Foods and the Misperception of Risk Perception.”
- 13.
Chandler, “Privacy Versus National Security: Clarifying the Trade-Off.”
- 14.
Vincenzo Pavone and Sara Degli Esposti, “Public Assessment of New Surveillance-Oriented Security Technologies: Beyond the Trade-Off between Privacy and Security,” Public Understanding of Science 21, no. 5 (2012).
- 15.
Darren W. Davis and Brian D. Silver, “Civil Liberties Vs. Security: Public Opinion in the Context of the Terrorist Attacks on America,” American Journal of Political Science (2004).
- 16.
Movius, “U.S. And Eu Privacy Policy: Comparison of Regulatory Approaches.”
- 17.
Samuel Warren and Louis D. Brandeis, “The Right to Privacy,” Harvard Law Review 193(1890).
- 18.
Rachel L. Finn, David Wright, and Michael Friedewald, “Seven Types of Privacy,” in European Data Protection: Coming of Age, ed. Serge Gutwirth and Yves Poullet (Dordrecht: Springer, 2013).
- 19.
For ‘enactment’, see John Law, “Actor Network Theory and Material Semiotics,” in The New Blackwell Companion to Social Theory, ed. Bryan S. Turner (Chichester: Blackwell, 2009); John Law and John Urry, “Enacting the Social,” Economy and Society 33, no. 3 (2004); John Law, After Method: Mess in Social Science Research (London, New York: Routledge, 2004).
- 20.
Bruno Latour, Science in Action - How to Follow Scientists and Engineers through Society (Cambridge MA: Harvard University Press, 1987); Michel Callon, “Some Elements of a Sociology of Translation: Domestication of the Scallops and the Fishermen of Saint Brieuc Bay,” in Power, Action and Belief: A New Sociology of Knowledge?, ed. John Law (London: Routledge and Kegan Paul, 1986); Madeleine Akrich and Bruno Latour, “A Summary of a Convenient Vocabulary for the Semiotics of Human and Nonhuman Assemblies,” in Shaping Technology, Building Society: Studies in Sociotechnical Change, ed. W. E. Bijker and J. Law (Cambridge, MA: MIT Press, 1992).
- 21.
Ann Cavoukian, Privacy by Design: The 7 Foundational Principles (Toronto, Ontario, Canada: Information and Privacy Commissioner of Ontario, 2009).
- 22.
Harry M. Collins and Robert Evans, “The Third Wave of Science Studies,” Social Studies of Science 32, no. 2 (2002); Brian Wynne, “Seasick on the Third Wave? Subverting the Hegemony of Propositionalism: Response to Collins and Evans (2002),” ibid. 33, no. 3 (2003); Sheila Jasanoff, “Breaking the Waves in Science Studies: Comment on H.M. Collins and Robert Evans, ‘the Third Wave of Science Studies’,” ibid.
- 23.
David Collingridge, The Social Control of Technology (New York: St.-Martin’s Press, 1980).
- 24.
Sarah Spiekermann, “Viewpoint: The Challenges of Privacy by Design,” Communications of the ACM 55, no. 7 (2012).
- 25.
Seda F. Gürses, Carmela Troncoso, and Claudia Diaz, “Engineering Privacy by Design,” Computers, Privacy & Data Protection (2011).
- 26.
Pavone and Esposti, “Public Assessment of New Surveillance-Oriented Security Technologies: Beyond the Trade-Off between Privacy and Security.”
- 27.
Chandler, “Privacy Versus National Security: Clarifying the Trade-Off.”
- 28.
Schneier, “Protecting Privacy and Liberty. The Events of 11 September Offer a Rare Chance to Rethink Public Security.”
- 29.
Michel Callon, Pierre Lascoumes, and Yannick Barthe, Acting in an Uncertain World: An Essay on Technical Democracy (Cambridge MA: The MIT Press, 2009).
- 30.
Wynne, “Seasick on the Third Wave? Subverting the Hegemony of Propositionalism: Response to Collins and Evans (2002).”
Bibliography
Akrich, Madeleine, and Bruno Latour. “A Summary of a Convenient Vocabulary for the Semiotics of Human and Nonhuman Assemblies.” In Shaping Technology, Building Society: Studies in Sociotechnical Change, edited by W. E. Bijker and J. Law, 259–64. Cambridge, MA: MIT Press, 1992.
Amoore, Louise. “Biometric Borders: Governing Mobilities in the War on Terror.” Political Geography 25, no. 3 (2006): 336–51.
Callon, Michel. “Some Elements of a Sociology of Translation: Domestication of the Scallops and the Fishermen of Saint Brieuc Bay.” In Power, Action and Belief: A New Sociology of Knowledge?, edited by John Law, 196–233. London: Routledge and Kegan Paul, 1986.
Callon, Michel, Pierre Lascoumes, and Yannick Barthe. Acting in an Uncertain World: An Essay on Technical Democracy. Cambridge MA: The MIT Press, 2009.
Cavoukian, Ann. Privacy by Design: The 7 Foundational Principles. Toronto, Ontario, Canada: Information and Privacy Commissioner of Ontario, 2009.
Chandler, Jennifer. “Privacy Versus National Security: Clarifying the Trade-Off.” Chap. 7 In On the Identity Trail: Anonymity, Privacy and Identity in a Networked Society, edited by Ian Kerr, Valerie Steeves and Carole Lucock, 121–38. Oxford: Oxford University Press, 2009.
Collingridge, David. The Social Control of Technology. New York: St.-Martin’s Press, 1980.
Collins, Harry M., and Robert Evans. “The Third Wave of Science Studies.” Social Studies of Science 32, no. 2 (2002): 235–96.
Davis, Darren W., and Brian D. Silver. “Civil Liberties Vs. Security: Public Opinion in the Context of the Terrorist Attacks on America.” American Journal of Political Science (2004).
Euronews. “Obama Defends ‘Privacy Trade-Off’ for Security.” http://www.euronews.com/2013/06/07/obama-defends-privacy-trade-off-for-security/.
Finn, Rachel L., David Wright, and Michael Friedewald. “Seven Types of Privacy.” In European Data Protection: Coming of Age, edited by Serge Gutwirth and Yves Poullet. Dordrecht: Springer, 2013.
Gaskell, George, Nick Allum, Wolfgang Wagner, Nicole Kronberger, Helge Torgersen, Juergen Hampel, and Julie Bardes. “Gm Foods and the Misperception of Risk Perception.” Risk Analysis 24, no. 1 (2004).
Gürses, Seda F., Carmela Troncoso, and Claudia Diaz. “Engineering Privacy by Design.” Computers, Privacy & Data Protection (2011).
Jasanoff, Sheila. “Breaking the Waves in Science Studies: Comment on H.M. Collins and Robert Evans, ‘the Third Wave of Science Studies’.” Social Studies of Science 33, no. 3 (2003): 389–400.
Latour, Bruno. Science in Action - How to Follow Scientists and Engineers through Society. Cambridge MA: Harvard University Press, 1987.
Law, John. “Actor Network Theory and Material Semiotics.” In The New Blackwell Companion to Social Theory, edited by Bryan S. Turner, 141–58. Chichester: Blackwell, 2009.
Law, John. After Method: Mess in Social Science Research. London, New York: Routledge, 2004.
Law, John, and John Urry. “Enacting the Social.” Economy and Society 33, no. 3 (2004): 390–410.
Lieshout, Marc van, Michael Friedewald, David Wright, and Serge Gutwirth. “Reconciling Privacy and Security.” Innovation: The European Journal of Social Science Research 26, no. 1–2 (2013): 119–32.
Movius, Lauren B. “U.S. And Eu Privacy Policy: Comparison of Regulatory Approaches.” International Journal of Communication 3 (2009): 169–87.
Pavone, Vincenzo, and Sara Degli Esposti. “Public Assessment of New Surveillance-Oriented Security Technologies: Beyond the Trade-Off between Privacy and Security.” Public Understanding of Science 21, no. 5 (July 1, 2012): 556–72.
Schneier, Bruce. “Protecting Privacy and Liberty. The Events of 11 September Offer a Rare Chance to Rethink Public Security.” Nature 413, no. 25 October 2001 (2001).
Solove, Daniel J. ““I’ve Got Nothing to Hide” and Other Misunderstandings of Privacy.” (2007).
Solove, Daniel J. Nothing to Hide: The False Tradeoff between Privacy and Security. New Haven, London: Yale University Press, 2011.
Spiekermann, Sarah. “Viewpoint: The Challenges of Privacy by Design.” Communications of the ACM 55, no. 7 (2012): 38–40.
Strickland, Lee S., and Laura E. Hunt. “Technology, Security, and Individual Privacy: New Tools, New Threats, and New Public Perceptions.” Journal of the American Society for Information Science and Technology 56, no. 3 (2005): 221–34.
Warren, Samuel, and Louis D. Brandeis. “The Right to Privacy.” Harvard Law Review 193 (1890).
Wright, David, Serge Gutwirth, Michael Friedewald, Paul De Hert, Marc Langheinrich, and Anna Moscibroda. “Privacy, Trust and Policy-Making: Challenges and Responses.” Computer Law & Security Review 25, no. 1 (2009): 69–83.
Wynne, Brian. “Seasick on the Third Wave? Subverting the Hegemony of Propositionalism: Response to Collins & Evans (2002).” Social Studies of Science 33, no. 3 (2003): 401–17.
Acknowledgements
The empirical research underlying this paper was made possible by the ERC 7th Framework Programme, and was part of the PRISMS project (FP7-SEC-2010-285399, www.prismsproject.eu). An early version of the paper was presented and discussed during the Computers, Privacy and Data Protection 2014 conference. The author wishes to thank the volume editors and two anonymous reviewers for their valuable feedback.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Valkenburg, G. (2015). Privacy Versus Security: Problems and Possibilities for the Trade-Off Model. In: Gutwirth, S., Leenes, R., de Hert, P. (eds) Reforming European Data Protection Law. Law, Governance and Technology Series(), vol 20. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-9385-8_10
Download citation
DOI: https://doi.org/10.1007/978-94-017-9385-8_10
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-017-9384-1
Online ISBN: 978-94-017-9385-8
eBook Packages: Humanities, Social Sciences and LawLaw and Criminology (R0)