Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


Journal

2016 | 2 (24) | 131-145

Article title

The Impossible Trinity of Security, Freedom and Privacy

Authors

Content

Title variants

Languages of publication

EN

Abstracts

EN
In Economics, the Impossible Trinity of free capital movement, an independent monetary policy and a stable foreign exchange rate is well known. There is a similar, though less explored trilemma in modern governance operating with more basic concepts: that of security, freedom and privacy. The aim of the study is to clarify this latter trilemma, as well as to offer a theoretical long-term solution. After expounding the general nature of trilemmas and the three main concepts, the impossible trinity of security, freedom and privacy is examined by taking three extreme scenarios. The scenarios are based on partially hypothetical situations in developed countries, where encryption debates or terrorist attacks took place recently. The study then turns to the solution of the situation. In order to understand the origin of the problem, it takes a step back to the dilemma of security and freedom. The fourth important concept the study operates with is transparency. The study suggests increasing transparency. A mathematical projection of the scenarios is introduced, and the suggested solution is derived in an equation as well.

Keywords

Journal

Year

Issue

Pages

131-145

Physical description

Dates

published
2016-12-31

References

  • Baldwin D.A. (1997), The concept of security, “Review of International Studies” Vol. 23, http://www.princeton.edu/~dbaldwin/selected%20articles/Baldwin%20(1997)%20The%20Concept%20of%20Security.pdf
  • Benczes I., Csáki Gy., Szentes T. (2009), Nemzetközi gazdaságtan (International Economics), Akadémiai Kiadó (Academic Publisher), Budapest
  • Comments on The Causes and Effects of Foreign Aid, Conference Panel, 2016, ISACEEISA Conference – The Politics of International Relations (Ljubljana)
  • Cook T. (2016), A Message to Our Customers, http://www.apple.com/customer-letter/
  • Forssbæck J., Oxelheim L. (2014), The multi-faceted concept of transparency, Research Institute of Industrial Economics, Stockholm, http://www.ifn.se/wfiles/wp/wp1013.pdf
  • Hajnal Zs. (2016), Written and Unwritten Values in the Preamble of the United Nations Charter, International Studies Association, Conference Paper, Ljubljana, http://web.isanet.org/Web/Conferences/CEEISA-ISA-LBJ2016/Archive/ee4a4645-9e55-4315-8eb3-453134dfce09.pdf
  • Mallik A. (2004), Technology and Security in the 21st Century – A Demand-side Perspective, Oxford University Press, Oxford, https://www.sipri.org/sites/default/files/files/RR/SIPRIRR20.pdf
  • McCrie R.D. (2014), A History of Security, in: The Handbook of Security, (ed.)Gill M., Palgrave
  • Macmillan UK, https://he.palgrave.com/resources/Product-Page-Downloads/G/Gill-Handbook-of-Security-2e/0230006809_03_ch02.pdf
  • OECD (2013), Interconnected Economies: Benefiting from Global Value Chains, Paris, https://www.oecd.org/sti/ind/interconnected-economies-GVCs-synthesis.pdf
  • OECD (2015), Trust in government, http://www.oecd.org/gov/trust-in-government.htm
  • Wright R. (2007), Progress is not a zero-sum game, TED talks, https://www.ted.com/talks/robert_wright_on_optimism/transcript?language=en
  • Roy S., Ellis C., Shiva S., Dasgupta D., Shandilya V., Wu Q. (2010), A Survey of Game Theory as Applied to Network Security, University of Memphis, http://ais.cs.memphis.edu/files/papers/Survey.pdf
  • Schmidt D., Brennan J. (2010), Conceptions of Freedom, “Cato Unbound Journal” https://www.cato-unbound.org/2010/03/10/david-schmidtz-jason-brennan/conceptionsfreedom
  • Solove D.J. (2007), ‘I’ve Got Nothing to Hide’ and Other Misunderstandings of Privacy, “San Diego Law Review” Vol. 44GWU Law School Public Law Research Paper No. 289, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565
  • Spijkers O. (2011), The United Nations, the Evolution of Global Values and International Law, Intersentia, Cambridge–Antwerp–Portland
  • The Fund for Peace (2016), Fragile State Index, http://fsi.fundforpeace.org/rankings-2016
  • World Economic Forum (2016), The Global Risks Report 2016, Geneva, http://www3.weforum.org/docs/Media/TheGlobalRisksReport2016.pdf
  • Yadron D., Ackerman S., Thielman S. (2016), Inside the FBI’s encryption battle with Apple, “The Guardian”, http://www.theguardian.com/technology/2016/feb/17/insidethe-fbis-encryption-battle-with-apple

Document Type

Publication order reference

Identifiers

YADDA identifier

bwmeta1.element.desklight-bcb3a831-47da-4168-971d-32d27ed575ba
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.