How to apply privacy by design in OSINT and big data analytics?
Rajamäki, J., & Simola, J. (2019). How to apply privacy by design in OSINT and big data analytics?. In T. Cruz, & P. Simoes (Eds.), ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security (pp. 364-371). Academic Conferences International. Proceedings of the European conference on information warfare and security.
Julkaistu sarjassa
Proceedings of the European conference on information warfare and securityPäivämäärä
2019Tekijänoikeudet
© The Author(s) 2019
In a world where technology grows exponentially, more information is available to us every day. States and their governments have collected information on their citizens for a long time now. On the other hand, people give out more and more personal information voluntarily through social media. Information available on the Internet is easier to analyze with modern technologies and the original source of information is also easier to track down. Information is available to all of us and that information can be used to investigate personal data, defeat competitors in a corporate world, solve crimes or even win wars. This study analyses open source intelligence (OSINT) and big data analytics (BDA) with the emphasis on cyber reconnaissance and how personal security is part of that entity. The main question is how privacy manifests itself as part of OSINT and BDA. At the same time the study analyses how law enforcement authorities can act so that their reconnaissance actions would be publicly approved. The study uses case study methodology by gathering a comprehensive list of sources for the theory section. The theoretical framework consists of Privacy by Design approach and privacy questions with regard to surveillance, and the General Data Protection Regulation (GDPR) and the Directive 2016/680 ‘on the protection of natural persons with regard to the processing of personal data by competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and on the free movement of such data’ act as a legal framework. The empirical case dealing with maritime surveillance, explores OSINT and BDA privacy challenges in the MARISA project. The overall target of the paper is to accelerate the discussion on the serious problem of privacy breach that may lead to restrictions of individual liberty and erosion of our society's foundations of trust.
...
Julkaisija
Academic Conferences InternationalEmojulkaisun ISBN
978-1-912764-28-0Konferenssi
European Conference on Cyber Warfare and SecurityKuuluu julkaisuun
ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and SecurityISSN Hae Julkaisufoorumista
2048-8602Asiasanat
Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/32285588
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
CCTV-Exposure: System for Measuring User’s Privacy Exposure to CCTV Cameras
Turtiainen, Hannu; Costin, Andrei; Hämäläinen, Timo (Springer International Publishing, 2022)In this work, we present CCTV-Exposure – the first CCTV-aware solution to evaluate potential privacy exposure to closed-circuit television (CCTV) cameras. The objective was to develop a toolset for quantifying human exposure ... -
CCTV-FullyAware : toward end-to-end feasible privacy-enhancing and CCTV forensics applications
Turtiainen, Hannu; Costin, Andrei; Hämäläinen, Timo; Lahtinen, Tuomo; Sintonen, Lauri (IEEE, 2022)It is estimated that over 1 billion Closed-Circuit Television (CCTV) cameras are operational worldwide. The advertised main benefits of CCTV cameras have always been the same; physical security, safety, and crime deterrence. ... -
The Impact of Operational Technology Requirements in Maritime Industries
Simola, Jussi; Paavola, Jarkko; Satopää, Piia; Vanharanta, Jani (Academic Conferences International Ltd, 2024)The maritime ecosystem and industry require more efficient and coordinated cybersecurity governance. No common cybersecurity mechanism in the maritime sector may steer the whole supply chain management, for example, in the ... -
Expectations And Mindsets Related To GDPR
Hirvonen, Pauliina (Academic Conferences International Ltd, 2022)The aim of this qualitative case study is to examine the initial expectations and assumptions related to General Data Protection Regulation (GDPR) of the European Union from the perspectives of selected Finnish organizations: ... -
Visualising maritime vessel open data for better situational awareness in ice conditions
Jussila, Jari; Lehtonen, Timo; Laitinen, Jari; Makkonen, Markus; Frank, Lauri (Association for Computing Machinery, 2018)Situational awareness of maritime vessels in ice conditions is important for the operation of supply chains. In the artic sea areas, the ice conditions pose a major challenge for maritime vessels getting stuck in the ice ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.