Abstract
This paper clarifies privacy challenges related to the EU project, ePOOLICE, which aims at developing a particular kind of open source information filtering system, namely a so-called environmental scanning system, for fighting organized crime by improving law enforcement agencies opportunities for strategic proactive planning in response to emerging organized crime threats. The environmental scanning is carried out on public online data streams, focusing on modus operandi and crime trends, not on individuals. Hence, ethical and technical issues – related to societal security and potential privacy infringements in public online contexts – are being discussed in order to safeguard privacy all through the system design process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Choo, C.W.: The art of scanning the environment. Bulletin of the American Society for information Science and Technology 25(3), 21–24 (1999)
Raguse, M., Meints, M., Langfeldt, O., Peissl, W.: Preparatory action on the enhancement of the european industrial potential in the field of security research. Technical report, PRISE (2008)
Nissenbaum, H.F.: Privacy in context: Technology, policy, and the integrity of social life. Stanford Law & Politics (2010)
Beken, T.V.: Risky business: A risk-based methodology to measure organized crime. Crime, Law and Social Change 41(5), 471–516 (2004)
Ansoff, H.I.: Managing strategic surprise by response to weak signals. California Management Review 18(2), 21–33 (1975)
Delhey, J., Newton, K.: Who trusts?: The origins of social trust in seven societies. European Societies 5(2), 93–137 (2003)
Fukuyama, F.: Social capital and the global economy. Foreign Affairs, 89–103 (1995)
Smith, A.: The theory of moral sentiments. In: Raphael, D.D., Macfie, A.L. (eds.). Clarendon Press, Oxford (1759)
Løgstrup, K.: The ethical demand. University Notre Dame, USA (1997)
Peissl, W.: Surveillance and security: A dodgy relationship. Journal of Contingencies and Crisis Management 11(1), 19–24 (2003)
Regan, P.M.: Legislating privacy: Technology, social values, and public policy. Univ. of North Carolina Press (1995)
Cavoukian, A., et al.: Privacy by design: The 7 foundational principles. Information and Privacy Commissioner of Ontario, Canada (2009)
Benn, S.I.: Privacy, freedom, and respect for persons. In: Pennock, J.R., Chapman, J.W. (eds.) Nomos XIII: Privacy. Atherton Press, New York (1971)
Johnson, D.G.: Computer ethics. Prentice Hall (1994)
Warren, S.D., Brandeis, L.D.: The right to privacy [the implicit made explicit] (1984)
Fried, C.: Privacy. The Yale Law Journal 77(3), 475–493 (1968)
Rachels, J.: Why privacy is important. Philosophy & Public Affairs 4(4), 323–333 (1975)
Tavani, H.T.: Informational privacy, data mining, and the internet. Ethics and Information Technology 1(2), 137–145 (1999)
Van den Hoven, M.: Privacy and the varieties of moral wrong-doing in the information age. Computers and Society 27, 33–37 (1997)
De Capitani di Vimercati, S., Foresti, S., Livraga, G., Samarati, P.: Data privacy: definitions and techniques. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 20, 793–817 (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gerdes, A., Larsen, H.L., Rouces, J. (2013). Issues of Security and Informational Privacy in Relation to an Environmental Scanning System for Fighting Organized Crime. In: Larsen, H.L., Martin-Bautista, M.J., Vila, M.A., Andreasen, T., Christiansen, H. (eds) Flexible Query Answering Systems. FQAS 2013. Lecture Notes in Computer Science(), vol 8132. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40769-7_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-40769-7_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40768-0
Online ISBN: 978-3-642-40769-7
eBook Packages: Computer ScienceComputer Science (R0)