Refine
Document Type
- Article (1)
- Habilitation (1)
- Report (1)
- Working Paper (1)
Language
- English (4)
Has Fulltext
- yes (4)
Is part of the Bibliography
- no (4)
Keywords
- security (4) (remove)
The sovereignty of the European nation states in the realm of security politics is gradually eroding. At the same time the European integration to a large degree influences the level of direct bilateral police cooperation, since cross-border crime has come to be perceived not as only a national, but as a common problem for the European nation states. At the German-Polish border, "Europe's Rio Grande", these high expectations concerning security policy are put into practice. With Poland's EU accession, Polish and German border guards are no longer spatially separated, but jointly control travellers. Joint patrols and contact points have already existed since 1998. On the one hand, the enforced meeting of German and Polish border policemen may help dismantle mutual prejudices. On the other hand, other cleavages may appear, based on cultural, systemic and institutional factors, which hinder the development of mutual trust and reinforce the asymmetrical relationship between the Schengen member Germany and the "junior partner" Poland.
After a recent spate of terrorist attacks in European and American cities, liberal democracies are reintroducing emergency securitarian measures (ESMs) that curtail rights and/or expand police powers. Political theorists who study ESMs are familiar with how such measures become instruments of discrimination and abuse, but the fundamental conflict ESMs pose for not just civil liberty but also democratic equality still remains insufficiently explored. Such phenomena are usually explained as a function of public panic or fear-mongering in times of crisis, but I show that the tension between security and equality is in fact much deeper and more general. It follows a different logic than the more familiar tension between security and liberty, and it concerns not just the rule of law in protecting liberty but also the role of law in integrating new or previously subjected groups into a democratic community. As liberal-democratic societies become increasingly diverse and multicultural in the present era of mass immigration and global interconnectedness, this tension between security and equality is likely to become more pronounced.
Persons traveling to participate in foreign conflicts by no means constitute a new phenomenon that is intrinsically tied to the ‘Islamic State’ (‘IS’). However, law enforcement agencies all over the world increasingly focus on foreign fighters travelling to Syria and Iraq due to a considerable rise in their number as well as the perceived threat they pose upon their return. Currently, around 650 German residents and citizens have travelled to the region to support jihadist groups such as the ‘IS’.
In order to address security and privacy problems in practice, it is very important to have a solid elicitation of requirements, before trying to address the problem. In this thesis, specific challenges of the areas of social engineering, security management and privacy enhancing technologies are analyzed:
Social Engineering: An overview of existing tools usable for social engineering is provided and defenses against social engineering are analyzed. Serious games are proposed as a more pleasant way to raise employees’ awareness and to train them.
Security Management: Specific requirements for small and medium sized energy providers are analyzed and a set of tools to support them in assessing security risks and improving their security is proposed. Larger enterprises are supported by a method to collect security key performance indicators for different subsidiaries and with a risk assessment method for apps on mobile devices. Furthermore, a method to select a secure cloud provider – the currently most popular form of outsourcing – is provided.
Privacy Enhancing Technologies: Relevant factors for the users’ adoption of privacy enhancing technologies are identified and economic incentives and hindrances for companies are discussed. Privacy by design is applied to integrate privacy into the use cases e-commerce and internet of things.