dc.contributor.author | Rajamäki, Jyri | |
dc.contributor.author | Simola, Jussi | |
dc.contributor.editor | Cruz, Tiago | |
dc.contributor.editor | Simoes, Paulo | |
dc.date.accessioned | 2020-01-07T07:27:32Z | |
dc.date.available | 2020-01-07T07:27:32Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | Rajamäki, J., & Simola, J. (2019). How to apply privacy by design in OSINT and big data analytics?. In T. Cruz, & P. Simoes (Eds.), <i>ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security</i> (pp. 364-371). Academic Conferences International. Proceedings of the European conference on information warfare and security. | |
dc.identifier.other | CONVID_32285588 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/67100 | |
dc.description.abstract | In a world where technology grows exponentially, more information is available to us every day. States and their governments have collected information on their citizens for a long time now. On the other hand, people give out more and more personal information voluntarily through social media. Information available on the Internet is easier to analyze with modern technologies and the original source of information is also easier to track down. Information is available to all of us and that information can be used to investigate personal data, defeat competitors in a corporate world, solve crimes or even win wars. This study analyses open source intelligence (OSINT) and big data analytics (BDA) with the emphasis on cyber reconnaissance and how personal security is part of that entity. The main question is how privacy manifests itself as part of OSINT and BDA. At the same time the study analyses how law enforcement authorities can act so that their reconnaissance actions would be publicly approved. The study uses case study methodology by gathering a comprehensive list of sources for the theory section. The theoretical framework consists of Privacy by Design approach and privacy questions with regard to surveillance, and the General Data Protection Regulation (GDPR) and the Directive 2016/680 ‘on the protection of natural persons with regard to the processing of personal data by competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and on the free movement of such data’ act as a legal framework. The empirical case dealing with maritime surveillance, explores OSINT and BDA privacy challenges in the MARISA project. The overall target of the paper is to accelerate the discussion on the serious problem of privacy breach that may lead to restrictions of individual liberty and erosion of our society's foundations of trust. | en |
dc.format.extent | 884 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Academic Conferences International | |
dc.relation.ispartof | ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security | |
dc.relation.ispartofseries | Proceedings of the European conference on information warfare and security | |
dc.rights | In Copyright | |
dc.subject.other | privacy by design | |
dc.subject.other | OSINT | |
dc.subject.other | big data analytics | |
dc.subject.other | maritime surveillance | |
dc.title | How to apply privacy by design in OSINT and big data analytics? | |
dc.type | conference paper | |
dc.identifier.urn | URN:NBN:fi:jyu-202001071041 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.relation.isbn | 978-1-912764-28-0 | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 364-371 | |
dc.relation.issn | 2048-8602 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © The Author(s) 2019 | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | conferenceObject | |
dc.relation.conference | European Conference on Cyber Warfare and Security | |
dc.subject.yso | big data | |
dc.subject.yso | yksilönvapaus | |
dc.subject.yso | avoin lähdekoodi | |
dc.subject.yso | turvallisuus | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | yksilönsuoja | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27202 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p9166 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p17089 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p7349 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3637 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.type.okm | A4 | |