5,384 research outputs found

    Privacy Preserved Centralized Model for Counter Terrorism

    Get PDF
    Privacy preservation is an important aspect in field of counter terrorism. In the present scenario terrorist attacks are biggest problem for the mankind and whole world is under constant threat from these well-planned, sophisticated and coordinated terrorist operations. Now every country is focusing for counter terrorism. Government agencies are collecting the data from various sources and using that data to connect the dots to detect the terrorist group’s activities and prevent the peoples from terrorist attacks. There are some chances that information may be misused by agencies. Different countries are having government agencies which are dealing with the counter terrorism but they are not sharing the data with each other because they don’t want to disclose sensitive data. Alone a country can’t fight against the terrorism. In this paper we are proposing a model so that these agencies can share the information without violation of the privacy

    Algorithmic Jim Crow

    Get PDF
    This Article contends that current immigration- and security-related vetting protocols risk promulgating an algorithmically driven form of Jim Crow. Under the “separate but equal” discrimination of a historic Jim Crow regime, state laws required mandatory separation and discrimination on the front end, while purportedly establishing equality on the back end. In contrast, an Algorithmic Jim Crow regime allows for “equal but separate” discrimination. Under Algorithmic Jim Crow, equal vetting and database screening of all citizens and noncitizens will make it appear that fairness and equality principles are preserved on the front end. Algorithmic Jim Crow, however, will enable discrimination on the back end in the form of designing, interpreting, and acting upon vetting and screening systems in ways that result in a disparate impact

    The Trickle-Down War

    Get PDF
    The history of the European nation-state, wrote political sociologist Charles Tilly, is inextricably bound up with the history of warfare. To oversimplify Tilly’s nuanced and complex arguments, the story goes something like this: As power-holders (originally bandits and local strongmen) sought to expand their power, they needed capital to pay for weapons, soldiers and supplies. The need for capital and new recruits drove the creation of taxation systems and census mechanisms, and the need for more effective systems of taxation and recruitment necessitated better roads, better communications and better record keeping. This in turn enabled the creation of larger and more technologically sophisticated armies. The complexity and expense of maintaining more professionalized standing armies made it increasingly difficult for non-state groups to compete with states, giving centralized states a war-making advantage and enabling them to increasingly monopolize the means of large-scale violence. But the need to recruit, train and sustain ever-larger and more sophisticated armies also put pressure on these states to provide basic services, improving nutrition, education, and so on. Ultimately, we arrive at the late 20th century European welfare state, with its particular trade-offs between the state and its subjects

    Min Max Normalization Based Data Perturbation Method for Privacy Protection

    Get PDF
    Data mining system contain large amount of private and sensitive data such as healthcare, financial and criminal records. These private and sensitive data can not be share to every one, so privacy protection of data is required in data mining system for avoiding privacy leakage of data. Data perturbation is one of the best methods for privacy preserving. We used data perturbation method for preserving privacy as well as accuracy. In this method individual data value are distorted before data mining application. In this paper we present min max normalization transformation based data perturbation. The privacy parameters are used for measurement of privacy protection and the utility measure shows the performance of data mining technique after data distortion. We performed experiment on real life dataset and the result show that min max normalization transformation based data perturbation method is effective to protect confidential information and also maintain the performance of data mining technique after data distortion

    Balancing Security and Democracy: The Politics of Biometric Identification in the European Union

    Get PDF
    What are the relations between security policies and democratic debate, oversight and rights? And what is the role of expertise in shaping such policies and informing the democratic process? The inquiry that follows tries to answer such questions in the context of the European Union and taking the case of biometric identification, an area where security considerations and the possible impacts on fundamental rights and rule of law are at stake, and where expertise is crucial. Some hypotheses are explored through the case study: that 'securitisation' and 'democratisation' are in tension but some hybrid strategies can emerge, that the plurality of 'authoritative actors' influences policy frames and outcomes, and that knowledge is a key asset in defining these authoritative actors. A counter-intuitive conclusion is presented, namely that biometrics-which seems prima facie an excellent candidate for technocratic decision making, sheltered from democratic debate and accountability-is characterised by intense debate by a plurality of actors. Such pluralism is limited to those actors who have the resources-including knowledge-that allow for inclusion in policy making at EU level, but is nevertheless significant in shaping policy. Tragic events were pivotal in pushing for action on grounds of security, but the chosen instruments were in store and specific actors were capable of proposing them as a solution to security problems; in particular, the strong role of executives is a key factor in the vigorous pursuit of biometric identification. However this is not the whole story, and limited pluralism-including plurality of expertise-explains specific features of the development of biometrics in the EU, namely the central role of the metaphor of 'balancing' security and democracy, and the 'competitive cooperation' between new and more consolidated policy areas. The EU is facing another difficult challenge in the attempt of establishing itself as a new security actor and as a supranational democratic polity: important choices are involved to assure that citizens' security is pursued on the basis of rule of law, respect of fundamental rights and democratic accountability.democracy; pluralism; security/internal

    Pixelated flesh

    Get PDF
    The pixel and the technique of pixelating faces belong to a politics of fear and a digital aesthetics of truth which shapes public perceptions of criminality and the threat of otherness. This article will draw on Paul Virilio's account of the pixel in Lost Dimension in order to analyze its specific role and operation in relation to contemporary representations of incarceration. In particular, the article will consider the figure of the incarcerated informant. The incarcerated criminal or informant plays a complex role as both subversive other and purveyor of truth and as such constitutes an important example of the ways in which pixelation functions as a visible signifier of a dangerous truth whilst blurring, erasing and, ultimately, dehumanizing those "speaking" this truth. Our discussion forms part of a larger analysis of the production, framing and circulation of images of otherness, identifying Virilio as key to debates around the violence of the screen

    Anomaly Detection in Streaming Sensor Data

    Full text link
    In this chapter we consider a cell phone network as a set of automatically deployed sensors that records movement and interaction patterns of the population. We discuss methods for detecting anomalies in the streaming data produced by the cell phone network. We motivate this discussion by describing the Wireless Phone Based Emergency Response (WIPER) system, a proof-of-concept decision support system for emergency response managers. We also discuss some of the scientific work enabled by this type of sensor data and the related privacy issues. We describe scientific studies that use the cell phone data set and steps we have taken to ensure the security of the data. We describe the overall decision support system and discuss three methods of anomaly detection that we have applied to the data.Comment: 35 pages. Book chapter to appear in "Intelligent Techniques for Warehousing and Mining Sensor Network Data" (IGI Global), edited by A. Cuzzocre

    New act addresses sexism in the public space

    Get PDF

    Security vs. Privacy

    Get PDF

    Financial inclusion and financial integrity : aligned incentives?

    Full text link
    A large percentage of the population in developing countries saves, remits money or accesses credit using informal financial services. Financial inclusion initiatives aim to expand the reach and attractiveness of formal financial services. Recently, the Financial Action Task Force embraced financial inclusion as complementary to anti-money laundering and counter-terrorist financing as it enhances financial transparency. Analyzing preliminary data from FinScope surveys on eight African countries we argue that an increase in access to formal services does not automatically imply an immediate and corresponding reduction of usage of informal services, especially as many individuals use informal and formal services in parallel. We consider customer trade-offs regarding the use of formal and informal services especially considering transparency as a potential disincentive to use formal services. The alignment of financial inclusion and integrity will fail where customers are apprehensive about increased transparency.<br /
    • 

    corecore