Skip to main content

Introduction: Privacy, Data Protection and Cybersecurity in Europe

The Conceptual and Factual Field

  • Chapter
  • First Online:
Privacy, Data Protection and Cybersecurity in Europe

Abstract

Our introduction consists of four steps. In the first, we prepare the field by defining and discussing the core concepts of this book—privacy, data protection and cybersecurity. All three issues come with a distinct research tradition, but in the digitised society, these issues increasingly overlap, which arguably necessitates a fresh scientific approach. In the second step, we try to disentangle the complex net of interests and dynamics around these issues by proposing an actor-based approach, distinguishing three ideal-types of actors: citizens/users, the business sector and the state which we understand as forming a triangular relationship, a “ménage a trois”, where all interests are also related to collective societal values such as security, efficiency, equality and trust. This concept is hardly novel, but it allows us to identify a distinct social science perspective on privacy and data protection as politically contested issues—a perspective which is currently largely missing in the literature. It also offers a framework for comparative studies, as for example societies can be expected to direct their regulatory efforts towards different balances of interests. In the third step, we focus particularly on cybersecurity and suggest on the basis of a literature review that discourse studies offer an interesting avenue for comparative study, advancing new research that goes beyond technicalities and connects cybersecurity with broader societal factors as identified above. In the fourth step, the introduction concludes with a brief overview of the individual contributions that we have organized in three sections.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 74.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 99.00
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Directive (EU) 2016/680 of the European Parliament and of the Council of 27 April 2016. The OECD also spells out in its Privacy Guidelines from 1980 a security safeguards principle according to which “Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorised access, destruction, use, modification or disclosure of data.” (OECD 2013: 23).

References

  • Andress, J., & Winterfeld, S. (2011). Cyber warfare techniques. Tactics and tools for security practitioners. Amsterdam, Heidelberg [u.a.], Waltham, MA: Elsevier Syngress.

    Google Scholar 

  • Arquilla, J., & Ronfeldt, D. (1997). Cyberwar is coming! In J. Arquilla & D. Ronfeldt (Eds.), In Athena’s camp. Preparing for conflict in the information age (pp. 23–60). Santa Monica, CA: Rand.

    Google Scholar 

  • Balzacq, T. (2011). A theory of securitization. Origins, core assumptions, and variants. In T. Balzacq (Ed.), PRIO new security studies. Securitization theory. How security problems emerge and dissolve (1st ed., pp. 1–30). London [u.a.]: Routledge.

    Google Scholar 

  • Baumann, M.-O. (2015). Privatsphäre als neues digitales Menschenrecht? Ethische Prinzipien und aktuelle Diskussionen. Hamburg: DIVSI Diskussionsbeiträge.

    Google Scholar 

  • Bennett, C. J., & Raab, C. (2006). The governance of privacy. Policy instruments in global perspective. Cambridge: MIT Press.

    Google Scholar 

  • Bentham, J. (2003 [1791]). Panopticon: or, the inspection-house. Containing the idea of a new principle of construction applicable to any sort of establishment, in which persons of any Description are to be kept under Inspection. and in particular to penitentiary-houses, prisons, Houses of Industry, Work-Houses, Poor-Houses, Manufactories, Mad-Houses, Hospitals, and Schools. With a plan of Management adapted to the Principle. In a series of letters, written in the Year 1787, From Crecheff in White Russia, to a Friend in England. Dublin: Eighteenth Century Collections Online. http://find.galegroup.com/ecco/infomark.do?&source=gale&prodId=ECCO&userGroupName=heidel&tabID=T001&docId=CW125793319&type=multipage&contentSet=ECCOArticles&version=1.0&docLevel=FASCIMILE

  • Berlinghoff, M. (2013). “Totalerfassung” im “Computerstaat”—Computer und Privatheit in den 1970er und 1980er Jahren. In U. Ackermann (Ed.), Im Sog des Internets. Öffentlichkeit und Privatheit im digitalen Zeitalter (pp. 93–110). Frankfurt am Main: Humanities Online.

    Google Scholar 

  • Billo, C. G., & Chang, W. (2004). Cyber warfare. An analysis of the means and motivations of selected nation states. Dartmouth.

    Google Scholar 

  • Busch, A., & Jakobi, T. (2011). Die Erfindung eines neuen Grundrechts: Zu Konzept und Auswirkungen der “informationellen Selbstbestimmung”. In C. Hönnige, S. Kneip, & A. Lorenz (Eds.), Verfassungswandel im Mehrebenensystem (pp. 297–320). Wiesbaden: VS Verlag für Sozialwissenschaften.

    Chapter  Google Scholar 

  • Buzan, B., Waever, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder, CO: Lynne Rienner.

    Google Scholar 

  • Capurro, R. (2005). Privacy. An intercultural perspective. Ethics and Information Technology, 7, 37–47.

    Article  Google Scholar 

  • Cate, F. H., & Mayer-Schönberger, V. (2013). Tomorrow’s privacy. Notice and consent in a world of Big Data. International Data Privacy Law, 3(2), 67–73.

    Article  Google Scholar 

  • Cohen, J. E. (2013). What privacy is for. Harvard Law Review, 126, 1904–1933.

    Google Scholar 

  • Dunn Cavelty, M. (2013). Der Cyber-Krieg, der (so) nicht kommt: Erzählte Katastrophen als (Nicht)Wissenspraxis. In L. Hempel & M. Bartels (Eds.), Sozialtheorie. Aufbruch ins Unversicherbare. Zum Katastrophendiskurs der Gegenwart (2nd ed., pp. 209–233). Bielefeld: Transcript.

    Google Scholar 

  • Easton, D. (1965). A systems analysis of political life. New York: Wiley.

    Google Scholar 

  • Eckert, C. (2014). IT-Sicherheit: Konzepte, Verfahren, Protokolle, De Gruyter Studium (9th ed.). Oldenbourg: de Gruyter.

    Google Scholar 

  • Eurobarometer. (2011). Attitudes on data protection and electronic identity in the European Union. Special Eurobarometer 359: Brussels: European Commission.

    Google Scholar 

  • Foucault, M. (1981). Überwachen und Strafen: Die Geburt des Gefängnisses, Suhrkamp-Taschenbuch Wissenschaft (Vol. 184, 4th ed.). Frankfurt am Main: Suhrkamp.

    Google Scholar 

  • Gaycken, S. (2012). Cyberwar. Das Wettrüsten hat längst begonnen. Vom digitalen Angriff zum realen Ausnahmezustand, Goldmann (Vol. 15710). München: Goldmann.

    Google Scholar 

  • Gorr, D., & Schünemann, W. J. (2013). Creating a secure cyberspace: Securitization in Internet governance discourses and dispositives in Germany and Russia. International Review of Information Ethics, 20(12), 37–51. http://www.i-r-i-e.net/inhalt/020/IRIE-Gorr-Schuenemann.pdf.

  • Greenleaf, G. (2013). Data protection in a globalised network. In I. Brown (Ed.), Research handbook on governance of the Internet (pp. 221–259). Cheltenham: Edward Elgar.

    Chapter  Google Scholar 

  • Guitton, C. (2013). Cyber insecurity as a national threat: Overreaction from Germany, France and the UK? European Security, 20(1), 21–35.

    Article  Google Scholar 

  • Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the copenhagen school. International Studies Quarterly, 53(4), 1155–1175. doi:10.1111/j.1468-2478.2009.00572.x.

    Article  Google Scholar 

  • Kubieziel, J. (2012). Anonym im Netz: Wie Sie sich und Ihre Daten schützen (3rd). user space. München: Open Source Press.

    Google Scholar 

  • Lewis, J. A., & CSIS. (2015). Significant Cyber Incidents Since 2006. Washington, DC. http://csis.org/files/publication/150605_Significant_Cyber_Events_List.pdf

  • Lewis, J. A., & Neuneck, G. (Eds.). (2013). UNIDIR: Vol. 3. The Cyber Index: International Security Trends and Realities. http://www.unidir.org/files/publications/pdfs/cyber-index-2013-en-463.pdf

  • Neuneck, G. (2013). Assessment of international and regional activities. In J. A. Lewis & G. Neuneck (Eds.), UNIDIR: Vol. 3. The Cyber Index. International Security Trends and Realities (pp. 91–140).

    Google Scholar 

  • New York Times Editorial Board. (2015, 4 February). Europe’s Expanding “Right to be Forgotten” (downloaded from http://www.nytimes.com/2015/02/04/opinion/europes-expanding-right-to-be-forgotten.html?_r=2).

  • Nissenbaum, H. (1998). Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy, 17(5/6), 559–596.

    Google Scholar 

  • Nissenbaum, H. (2005). Where computer security meets national security. Ethics and Information Technology, 7(2), 61–73. doi:10.1007/s10676-005-4582-3.

    Article  Google Scholar 

  • OECD. (2013). Exploring data-driven innovation as a new source of growth: Mapping the policy issues raised by “big data”. OECD Digital Economy Papers, No. 222. OECD Publishing, http://dx.doi.org/10.1787/5k47zw3fcp43-en.

  • Podesta, J. (2014). Big data: Seizing opportunities, preserving values. Washington, DC: Executive Office of the President.

    Google Scholar 

  • Regan, P. M. (1995). Legislating privacy. Technology, social values, and public policy. Chapel Hill & London: The University of North Carolina Press.

    Google Scholar 

  • Rid, T. (2012). Cyber war will not take place. Journal of Strategic Studies, 35(1), 5–32. doi:10.1080/01402390.2011.608939.

    Article  Google Scholar 

  • Rid, T., & Buchanan, B. (2015). Attributing cyber attacks. Journal of Strategic Studies, 38(1–2), 4–37.

    Article  Google Scholar 

  • Rössler, B. (2001). Der Wert des Privaten. Frankfurt am Main: Suhrkamp.

    Google Scholar 

  • Rule, J. B., & Greenleaf, G. W. (Eds.). (2008). Global privacy protection: The first generation. Cheltenham: Edward Elgar.

    Google Scholar 

  • Schermer, B. W., Custers, B., & van der Hof, S. (2014). The crisis of consent: How stronger legal protection may lead to weaker consent in data protection. Ethics and Information Technology, 2, 171–182.

    Google Scholar 

  • Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. Oxford: Oxford University Press. (What everyone needs to know).

    Google Scholar 

  • Solove, D. J. (2002). Conceptualizing privacy. California Law Review, 90(4), 1087–1155.

    Article  Google Scholar 

  • Stone, J. (2013). Cyber war will take place! Journal of Strategic Studies, 36(1), 101–108. doi:10.1080/01402390.2012.730485.

    Article  Google Scholar 

  • Valeriano, B., & Maness, R. C. (2014). The dynamics of cyber conflict between rival antagonists, 2001-11. Journal of Peace Research, 51(3), 347–360. doi:10.1177/0022343313518940.

    Article  Google Scholar 

  • Washington Post. (2015, 17 Feb). Obama says that Europeans are using privacy rules to protect their firms against U.S. competition. Is he right? Accessed Dec 6, 2016 from https://www.washingtonpost.com/news/monkey-cage/wp/2015/02/17/obama-says-that-europeans-are-using-privacy-rules-to-protect-their-firms-against-u-s-competition-is-he-right/?utm_term=.11da12667dec

  • Westin, A. F. (1970). Privacy and freedom. London: Bodley Head.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wolf J. Schünemann .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Baumann, MO., Schünemann, W.J. (2017). Introduction: Privacy, Data Protection and Cybersecurity in Europe. In: Schünemann, W., Baumann, MO. (eds) Privacy, Data Protection and Cybersecurity in Europe. Springer, Cham. https://doi.org/10.1007/978-3-319-53634-7_1

Download citation

Publish with us

Policies and ethics