Filters








807 Hits in 6.4 sec

The Rise of the Modern Intelligence State [chapter]

John Hardy
2021 Advanced Sciences and Technologies for Security Applications  
The ethical implications of counterterrorism intelligence extend beyond the collection and use of data to the application of predictive modelling to dehumanised patterns of behaviour.  ...  Existing concerns about the ethical collection and use of surveillance data are compounded by three emergent capabilities of the modern intelligence state: persistent data surveillance, pattern-of-life  ...  Similar technologies are problematic for states where the line between criminal actions and thoughts about criminality is being eroded.  ... 
doi:10.1007/978-3-030-90221-6_7 fatcat:4opknaqxafdhhirup52lzaedbu

Promoting Ethical Awareness in Communication Analysis: Investigating Potentials and Limits of Visual Analytics for Intelligence Applications [article]

Maximilian T. Fischer, Simon David Hirsbrunner, Wolfgang Jentner, Matthias Miller, Daniel A. Keim, Paula Helm
2022 arXiv   pre-print
Intelligence analysis of communications data in investigative journalism, criminal intelligence, and law present particularly interesting cases, as they must take into account the often highly sensitive  ...  analytics approaches for communication analysis in intelligence applications in particular.  ...  Sicherheit 2018 -2023" and its announcement "Zivile Sicherheit -Schutz vor organisierter Kriminalität II".  ... 
arXiv:2203.09859v1 fatcat:xvn5zxix25al7i6u23n4d7zvmm

AI in public and private forms of surveillance: Challenging trust in the citizen-government relations [chapter]

2022 Artificial Intelligence and Democracy  
Metadata on the other hand is standardized, mostly numeric, and appropriate to use for quantitative analysis.  ...  ., its ownership transferred), but rather it is licensed for particular or limited uses. (Gartner Glossary, n.d.)  ... 
doi:10.4337/9781788977319.00009 fatcat:32cmhzicwvagbj2sjp5t6r7hgy

Regulatory issues for artificial intelligence in radiology [chapter]

Filippo Pesapane, Matteo B. Suter, Marina Codari, Francesca Patella, Caterina Volonté, Francesco Sardanelli
2020 Precision Medicine for Investigators, Practitioners and Providers  
For example, firms can manipulate other market participants through a fine-tuned understanding of the individual and collective cognitive limitations of consumers. 115 Bots can gain our confidences to  ...  would limit the term to highly 27 There are other private organizations and public labs with considerable acumen in artificial intelligence, including the Allen Institute for AI and the Stanford Research  ... 
doi:10.1016/b978-0-12-819178-1.00052-6 fatcat:zi2cwx7wffgmplilxikln4zhaa

Towards a Linked Information Architecture for Integrated Law Enforcement

Wolfgang Mayer, Markus Stumptner, Pompeu Casanovas, Louis de Koker
2017 International Joint Conference on Artificial Intelligence  
Law enforcement agencies are facing an ever-increasing flood of data to be acquired, stored, assessed and used.  ...  This paper outlines a modular architecture for management of linked data in the law enforcement domain and discusses legal and policy issues related to workflows and information sharing in this context  ...  data integrity and security in a high volume environment, (vii) ensure fair and appropriate use of data analytics, (viii) use appropriate systems for data matching, data integration or federated access  ... 
dblp:conf/ijcai/MayerSCK17 fatcat:cf5oxsiebjcmjkiv2zqlhfj27i

Open Source Intelligence and its Applications in Next Generation Cyber Security - A Literature Review

U. Yogish Pai, K. Krishna Prasad
2021 Zenodo  
The capability of OSINT for intelligent analysis strengthens tightly integrating machine learning and automated reasoning techniques.  ...  framework and methodology for future research.  ...  Nowadays, it is critical to make appropriate use of open source data (OSINT).  ... 
doi:10.5281/zenodo.5171579 fatcat:fp6wodk45zgwtnuxsnnxjnw7oa

Open Source Intelligence and its Applications in Next Generation Cyber Security - A Literature Review

Yogish Pai U., Krishna Prasad K.
2021 International journal of applied engineering and management letters  
The capability of OSINT for intelligent analysis strengthens tightly integrating machine learning and automated reasoning techniques.  ...  framework and methodology for future research.  ...  Nowadays, it is critical to make appropriate use of open source data (OSINT).  ... 
doi:10.47992/ijaeml.2581.7000.0100 fatcat:23qjlrnxdjbpldxivurywnbxoa

Governance of automated image analysis and artificial intelligence analytics in healthcare

C.W.L. Ho, D. Soon, K. Caals, J. Kapur
2019 Clinical Radiology  
the recognition, and removal of biases, engaging the "black box" obstacle, and brokering a new social contract on informational use and security.  ...  In this paper, the nature of AI governance in biomedicine is discussed along with its limitations.  ...  by their devices and to take steps in ensuring that appropriate safeguards are in place.  ... 
doi:10.1016/j.crad.2019.02.005 pmid:30898383 fatcat:xyzexg52k5dehnrnl2qyfxp3rq

OPEN SOURCING EVIDENCE FROM THE INTERNET – THE PROTECTION OF PRIVACY IN CIVILIAN CRIMINAL INVESTIGATIONS USING OSINT (OPEN-SOURCE INTELLIGENCE)

Leonore Ten Hulsen
2020 European journal of life writing  
This paper explores the relationship between open-source intelligence and privacy in the context of civilian criminal investigations.  ...  This research can serve as a guideline when drafting future privacy regulations regarding open-source intelligence and civilian criminal investigations.  ...  Technology Can Make Us Auxiliaries as well as Vigilantes' (2013) 11 IEEE Security & Privacy 56, 60. 158 Isabella Banks and Leonore ten Hulsen, 'Human Rights Weekend: Artificial Intelligence, Big Data &  ... 
doi:10.37974/alf.353 fatcat:d2ylh5qgere57filvc54x3kngy

Should the Intelligence Agencies 'Show More Leg' or Have They Just Been Stripped Naked?

Peter Gill
2013 Information & Security An International Journal  
Newspapers started publishing US National Security Agency (NSA) files in June 2013, as a result of Edward Snowden's declaration that he wanted to start a debate on the current drive for 'total surveillance  ...  This article considers the major issues that have been raised concerning privacy, surveillance and the adequacy or otherwise of political control and oversight over intelligence agencies, particularly  ...  Tor ('the onion router'), for example, is an open source public project used by many to safeguard their on-line anonymity, including dissidents in repressive regimes but also, no doubt, criminals, and  ... 
doi:10.11610/isij.3001 fatcat:ulnyadnli5hjpep63aagxts4mu

Automating Ambiguity: Challenges and Pitfalls of Artificial Intelligence [article]

Abeba Birhane
2022 arXiv   pre-print
for approaching challenges, failures and problems surrounding ML systems as well as alternative ways forward.  ...  Machine learning (ML) and artificial intelligence (AI) tools increasingly permeate every possible social, political, and economic sphere; sorting, taxonomizing and predicting complex human behaviour and  ...  For example, Abdalla and Abdalla [291] argue that big tech sway and influence academic and public discourse using strategies which closely resemble strategies used by Big Tobacco.  ... 
arXiv:2206.04179v1 fatcat:qqln6jaiznctzcshmnsvvv73y4

When Artificial Intelligence and Big Data Collide—How Data Aggregation and Predictive Machines Threaten our Privacy and Autonomy

Alex Alben
2020 AI Ethics Journal  
The challenge for the next decade is to make sure that we harness AI with appropriate safeguards and limitations.  ...  Artificial Intelligence and Big Data represent two profound technology trends.  ...  The challenge for the next decade is to make sure that we harness AI with appropriate safeguards and limitations. for decades.  ... 
doi:10.47289/aiej20201106 fatcat:kgy2ztqfg5hfphxg6qcrowodj4

The effectiveness of surveillance technology: What intelligence officials are saying

Michelle Cayford, Wolter Pieters
2018 The Information Society  
In recent years, Western governments have come under sharp criticism for their use of surveillance technology.  ...  This paper analyzes statements of intelligence officials in the U.S. and U.K. from 2006 to 2016, examines what criteria officials use in their discourse on effectiveness, and investigates how considerations  ...  Acknowledgements The authors wish to acknowledge Pieter van Gelder for his contribution of ideas to this paper.  ... 
doi:10.1080/01972243.2017.1414721 fatcat:acnfkqvwqfblvkjimkmfrea4fi

Response to Office of the Privacy Commissioner of Canada Consultation Proposals pertaining to amendments to PIPEDA relative to Artificial Intelligence [article]

Mirka Snyder Caron
2020 arXiv   pre-print
OPCC consultation proposal for amendments relative to Artificial Intelligence (AI), to the Canadian privacy legislation, the Personal Information Protection and Electronic Documents Act (PIPEDA).  ...  We leave you with three general statements to keep in mind while going through the next pages: 1) AI systems should be used to augment human capacity for meaningful and purposeful connections and associations  ...  If yes, would doing so limit potential societal benefit to be gained from use of AI (artificial intelligence)? If not, what are the alternatives or safeguards to consider?  ... 
arXiv:2006.07025v1 fatcat:a5p4w3cl7bdyzdz6she2d3ctny

Security Issues in Ubiquitous Computing* [chapter]

Frank Stajano
2010 Handbook of Ambient Intelligence and Smart Environments  
Acknowledgements This chapter is based on copyrighted material from my book Security for Ubiquitous Computing (both from the first edition published by Wiley in 2002 and from the draft  ...  Big Stick In more cases than you might at first think, the Big Stick principle (Stajano, 2002) is an appropriate access control policy: Whoever has physical control of the device is allowed to take it  ...  Learning to listen to the user, to understand the user's viewpoint and to think like the user is an essential step for progress towards an intuitive and pleasant to use system that reduces the possibility  ... 
doi:10.1007/978-0-387-93808-0_11 fatcat:avldavvpmrgqhamk6ewpck7k7y
« Previous Showing results 1 — 15 out of 807 results