TY - GEN
T1 - The legal conflict between security and privacy in addressing crime and terrorism on the internet
AU - Watney, Murdoch
PY - 2007
Y1 - 2007
N2 - Internet security aimed at addressing terrorism and crime is not only a technological issue, it invariably impacts on the legal system, such as the right to privacy. Many information security professionals focus on security and pay little or no regard to the privacy rights of the Internet user whereas the opposite can be said of privacy activists. Countries face the challenge of applying new approaches to the Internet in the prevention, detection and investigation of crime and terrorism and the prosecution of the perpetrator. Commission of crimes and terrorism as well as securing the Internet against terrorism and other crimes result in a conflict between security, a technical issue and privacy, a legal aspect. A perplexing question is whether an Internet user can expect online privacy and whether globalisation in respect of the use of the Internet and the approaches in combating crime and especially terrorism have not resulted in an online environment that is incompatible with privacy rights.
AB - Internet security aimed at addressing terrorism and crime is not only a technological issue, it invariably impacts on the legal system, such as the right to privacy. Many information security professionals focus on security and pay little or no regard to the privacy rights of the Internet user whereas the opposite can be said of privacy activists. Countries face the challenge of applying new approaches to the Internet in the prevention, detection and investigation of crime and terrorism and the prosecution of the perpetrator. Commission of crimes and terrorism as well as securing the Internet against terrorism and other crimes result in a conflict between security, a technical issue and privacy, a legal aspect. A perplexing question is whether an Internet user can expect online privacy and whether globalisation in respect of the use of the Internet and the approaches in combating crime and especially terrorism have not resulted in an online environment that is incompatible with privacy rights.
UR - http://www.scopus.com/inward/record.url?scp=84883040980&partnerID=8YFLogxK
U2 - 10.1007/978-3-8348-9418-2_3
DO - 10.1007/978-3-8348-9418-2_3
M3 - Conference contribution
AN - SCOPUS:84883040980
SN - 9783834803467
T3 - ISSE/SECURE 2007 - Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe/SECURE 2007 Conference
SP - 26
EP - 37
BT - ISSE/SECURE 2007 - Securing Electronic Business Processes
T2 - 9th Annual Information Security Solutions Europe Conference, ISSE/SECURE 2007
Y2 - 25 September 2007 through 27 September 2007
ER -