Skip to main content

Issues of Security and Informational Privacy in Relation to an Environmental Scanning System for Fighting Organized Crime

  • Conference paper
Flexible Query Answering Systems (FQAS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 8132))

Included in the following conference series:

  • 1398 Accesses

Abstract

This paper clarifies privacy challenges related to the EU project, ePOOLICE, which aims at developing a particular kind of open source information filtering system, namely a so-called environmental scanning system, for fighting organized crime by improving law enforcement agencies opportunities for strategic proactive planning in response to emerging organized crime threats. The environmental scanning is carried out on public online data streams, focusing on modus operandi and crime trends, not on individuals. Hence, ethical and technical issues – related to societal security and potential privacy infringements in public online contexts – are being discussed in order to safeguard privacy all through the system design process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Choo, C.W.: The art of scanning the environment. Bulletin of the American Society for information Science and Technology 25(3), 21–24 (1999)

    Article  Google Scholar 

  2. Raguse, M., Meints, M., Langfeldt, O., Peissl, W.: Preparatory action on the enhancement of the european industrial potential in the field of security research. Technical report, PRISE (2008)

    Google Scholar 

  3. Nissenbaum, H.F.: Privacy in context: Technology, policy, and the integrity of social life. Stanford Law & Politics (2010)

    Google Scholar 

  4. Beken, T.V.: Risky business: A risk-based methodology to measure organized crime. Crime, Law and Social Change 41(5), 471–516 (2004)

    Article  Google Scholar 

  5. Ansoff, H.I.: Managing strategic surprise by response to weak signals. California Management Review 18(2), 21–33 (1975)

    Article  Google Scholar 

  6. Delhey, J., Newton, K.: Who trusts?: The origins of social trust in seven societies. European Societies 5(2), 93–137 (2003)

    Article  Google Scholar 

  7. Fukuyama, F.: Social capital and the global economy. Foreign Affairs, 89–103 (1995)

    Google Scholar 

  8. Smith, A.: The theory of moral sentiments. In: Raphael, D.D., Macfie, A.L. (eds.). Clarendon Press, Oxford (1759)

    Google Scholar 

  9. Løgstrup, K.: The ethical demand. University Notre Dame, USA (1997)

    Google Scholar 

  10. Peissl, W.: Surveillance and security: A dodgy relationship. Journal of Contingencies and Crisis Management 11(1), 19–24 (2003)

    Article  Google Scholar 

  11. Regan, P.M.: Legislating privacy: Technology, social values, and public policy. Univ. of North Carolina Press (1995)

    Google Scholar 

  12. Cavoukian, A., et al.: Privacy by design: The 7 foundational principles. Information and Privacy Commissioner of Ontario, Canada (2009)

    Google Scholar 

  13. Benn, S.I.: Privacy, freedom, and respect for persons. In: Pennock, J.R., Chapman, J.W. (eds.) Nomos XIII: Privacy. Atherton Press, New York (1971)

    Google Scholar 

  14. Johnson, D.G.: Computer ethics. Prentice Hall (1994)

    Google Scholar 

  15. Warren, S.D., Brandeis, L.D.: The right to privacy [the implicit made explicit] (1984)

    Google Scholar 

  16. Fried, C.: Privacy. The Yale Law Journal 77(3), 475–493 (1968)

    Article  MathSciNet  Google Scholar 

  17. Rachels, J.: Why privacy is important. Philosophy & Public Affairs 4(4), 323–333 (1975)

    Google Scholar 

  18. Tavani, H.T.: Informational privacy, data mining, and the internet. Ethics and Information Technology 1(2), 137–145 (1999)

    Article  Google Scholar 

  19. Van den Hoven, M.: Privacy and the varieties of moral wrong-doing in the information age. Computers and Society 27, 33–37 (1997)

    Article  Google Scholar 

  20. De Capitani di Vimercati, S., Foresti, S., Livraga, G., Samarati, P.: Data privacy: definitions and techniques. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 20, 793–817 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gerdes, A., Larsen, H.L., Rouces, J. (2013). Issues of Security and Informational Privacy in Relation to an Environmental Scanning System for Fighting Organized Crime. In: Larsen, H.L., Martin-Bautista, M.J., Vila, M.A., Andreasen, T., Christiansen, H. (eds) Flexible Query Answering Systems. FQAS 2013. Lecture Notes in Computer Science(), vol 8132. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40769-7_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40769-7_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40768-0

  • Online ISBN: 978-3-642-40769-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics