99,392 research outputs found

    Artificial intelligence and UK national security: Policy considerations

    Get PDF
    RUSI was commissioned by GCHQ to conduct an independent research study into the use of artificial intelligence (AI) for national security purposes. The aim of this project is to establish an independent evidence base to inform future policy development regarding national security uses of AI. The findings are based on in-depth consultation with stakeholders from across the UK national security community, law enforcement agencies, private sector companies, academic and legal experts, and civil society representatives. This was complemented by a targeted review of existing literature on the topic of AI and national security. The research has found that AI offers numerous opportunities for the UK national security community to improve efficiency and effectiveness of existing processes. AI methods can rapidly derive insights from large, disparate datasets and identify connections that would otherwise go unnoticed by human operators. However, in the context of national security and the powers given to UK intelligence agencies, use of AI could give rise to additional privacy and human rights considerations which would need to be assessed within the existing legal and regulatory framework. For this reason, enhanced policy and guidance is needed to ensure the privacy and human rights implications of national security uses of AI are reviewed on an ongoing basis as new analysis methods are applied to data

    Understanding Nuances of Privacy and Security in the Context of Information Systems

    Get PDF
    The concepts of privacy and security are interrelated but the underlying meanings behind them may vary across different contexts. As information technology is becoming integrated in our lives, emerging information privacy and security issues have been catching both scholars’ and practitioners’ attention with the aim to address these issues. Examples of such issues include users’ role in information security breaches, online information disclosure and its impact on information privacy, and the collection and use of electronic data for surveillance. These issues are associated with and can be explained by various disciplines, such as psychology, law, business, economics, and information systems. This diversity of disciplines leads to an inclusive approach that subsumes interrelated constructs, such as security, anonymity, and surveillance, as a part of privacy in the current literature. However, privacy and security are distinct concepts. In this paper, we argue that to better understand the role of human factors in the context of information privacy and security, these two concepts need to be examined independently. We examine the two concepts and systematically present various nuances of information privacy and security

    Proactive Privacy Practices In The Trend Of Ubiquitous Services: An Integrative Social Contracts Perspective

    Get PDF
    Privacy is a strategic issue that deserves great attention from enterprises because the convergence of customer information and advanced technologies that they engage in diverse business processes in response to competitive pressure, particularly when businesses promote their traditional e-services to ubiquitous services (u-services). The underlying vision of u-services is to overcome spatial and temporal boundaries in traditional services, such as m-services and e-services. U-services will be the next wave and can be recognized as a logical extension of traditional e-services because u-services are initiated by e-services based on current potential customer pool and further propagated by m-services. In the context of u-services, customers are always connected seamlessly in context-awareness networks so that a higher degree of customized and personalized services can be timely provided. While people are served with more convenience and efficiency, they may also well be aware of privacy threats behind that. Hence, privacy concerns have been recognized as a critical impediment for boosting u-services. Drawing upon integrative social contracts theory, this study undertakes to explore a proactive privacy practices framework that embraces technical and non-technical elements such as human, legal, and economic relevant perspectives. The results of this study are expected to shed light on privacy practices

    Consumer credit information systems: A critical review of the literature. Too little attention paid by lawyers?

    Get PDF
    This paper reviews the existing literature on consumer credit reporting, the most extensively used instrument to overcome information asymmetry and adverse selection problems in credit markets. Despite the copious literature in economics and some research in regulatory policy, the legal community has paid almost no attention to the legal framework of consumer credit information systems, especially within the context of the European Union. Studies on the topic, however, seem particularly relevant in view of the establishment of a single market for consumer credit. This article ultimately calls for further legal research to address consumer protection concerns and inform future legislation

    THE CONSENT OF MAN: AN EXAMINATION OF PRIVACY AWARENESS, SURVEILLANCE, AND PRIVACY POLICY (MIS)USE

    Get PDF
    The problem of privacy is nuanced, pervasive, and requires an elevated approach. Given the lack of consistency with regard to privacy’s conceptualization and operationalization, research is needed that examines variables related to privacy to better understand how privacy operates in the present day. This dissertation aims to better understand nuances of privacy by gauging knowledge of online privacy, technological affordances related to privacy, and knowledge of surveillance. In this study, human subjects from a large southern University were presented with an opportunity to use a privacy-invasive smartphone application. After doing so, they viewed one of three privacy policies. Finally, they answered survey items measuring privacy awareness and surveillance awareness. It was found that there were no significant main effects between modality of privacy policy shown and awareness of privacy nor awareness of surveillance. However, significant individual differences were found between two types of privacy policies. It was also found that a significant and positive relationship existed between awareness of privacy, and awareness of surveillance. It was also found that a relationship existed between awareness of privacy and awareness of the communication affordances of visibility and encryption. The present study concludes with implications that benefit communication theory, social media research, and legal bodies who seek to address issues with present day privacy policies

    "Surveillance vs. Privacy: Assessing the Implications of CCTV Cameras for Crime Prevention on the Right to Privacy in the UK"

    Get PDF
    openThe right to privacy is recognized as a fundamental human right in international human rights law, and is crucial to the protection of personal autonomy and dignity. The concept of privacy has been a long-standing issue in society, and its importance has increased with the advent of new technologies that allow for the collection and analysis of personal data on an unprecedented scale. Technological advancements have led to significant changes in the way privacy is perceived and protected. AI-powered surveillance systems have made it possible to monitor people's movements, activities, and behavior. While these technologies considerably help public and private agencies identify criminals and safeguard public order, they may violate people's privacy in relation to their communications, actions, and other elements. This research study examines the impact of using CCTV cameras for the purpose of crime prevention on the right to privacy in the United Kingdom. With the growing implementation of surveillance technologies, such as CCTV cameras, there is a need to critically assess their implications on individual privacy rights. This research focuses on understanding the balance between enhanced security measures and the potential infringement on privacy rights
    • 

    corecore