SlideShare a Scribd company logo
1 of 16
1st SAG / EEG Meeting, VICESSE, Vienna - Austria
INSPEC2T has received funding from the
European Union's Horizon 2020
research and innovation programme
under grant agreement No 653749
INSPEC2T System Security & Privacy Considerations
Rachel Finn
Trilateral Research, UK
INSPEC2T
INS P E
C C T
1st SAG / EEG Meeting, VICESSE, Vienna - Austria
INSPEC2T has received funding from the
European Union’s Horizon 2020
research and innovation programme
under grant agreement No 653749
INSPEC2T system security & privacy considerations
• Privacy and data security are key challenges for the optimal use of social media for community
policing.
• This deliverable will ensure that the INSPEC2T system will follow a Security and Privacy by
Design approach.
o This will include design, development and implementation phases.
• Data security and privacy will become integral to INSPEC2T priorities, objectives, design
processes and planning operations by:
o Safeguarding information
o Ensuring consent of participants through transparency
o Respecting data protection and human rights
• Outcome – one of the main inputs for the design requirements of INSPEC2T and sets principles
for assessment of INSPEC2T.
2
1st SAG / EEG Meeting, VICESSE, Vienna - Austria
INSPEC2T has received funding from the
European Union’s Horizon 2020
research and innovation programme
under grant agreement No 653749
Community policing & social media
• Contextual background – law enforcement in the digital age
o Widespread adoption of social media has led to novel ways of community policing
o Police use social media to engage with citizens and include the public in law enforcement
o Allows for gathering of intelligence
o Many forces have a social media presence – e.g., in the UK, 98% of police forces have corporate Twitter
account with an average of 18,000 followers
3
1st SAG / EEG Meeting, VICESSE, Vienna - Austria
INSPEC2T has received funding from the
European Union’s Horizon 2020
research and innovation programme
under grant agreement No 653749
Community policing & social media
• The privacy and security implications and challenges regarding the use of social media in
community policing.
o Loss of control
o Potential for abuse
o Undermining public trust
4
1st SAG / EEG Meeting, VICESSE, Vienna - Austria
INSPEC2T has received funding from the
European Union’s Horizon 2020
research and innovation programme
under grant agreement No 653749
Privacy and security by design
Privacy and Security by Design
• “The philosophy and approach of embedding privacy directly
into the design and operating specifications of information
technologies and systems”
– Ann Cavoukian, Privacy by Design:
Origins, Meaning, and Prospects for Assuring Privacy and Trust in the Information Era
• Achieved by building on principles of Fair Information
Practices early in the development of the system.
• By building privacy into the design of the system
at an early stage, public trust is enhanced.
5
1st SAG / EEG Meeting, VICESSE, Vienna - Austria
INSPEC2T has received funding from the
European Union’s Horizon 2020
research and innovation programme
under grant agreement No 653749
Outline of the report
D2.3: Security and privacy considerations for the INSPEC2T system
• Identify relevant privacy and data security challenges
• Identify potential technical solutions and processural safeguards to address these challenges
• Assess current police practice
• Make recommendations for the INSPEC2T system
6
1st SAG / EEG Meeting, VICESSE, Vienna - Austria
INSPEC2T has received funding from the
European Union’s Horizon 2020
research and innovation programme
under grant agreement No 653749
Privacy & data security challenges
• Identifying data inaccuracies and measures to correct them
• Ensuring legitimate and proportional use (avoiding surveillance, function creep, etc.)
• Preventing data breaches
7
1st SAG / EEG Meeting, VICESSE, Vienna - Austria
INSPEC2T has received funding from the
European Union’s Horizon 2020
research and innovation programme
under grant agreement No 653749
Challenges – Inaccuracies
• Following bomb in Bangkok, surveillance footage of
suspected bomber released
• Australian actor and fashion blogger living in Bangkok
incorrectly identified by Internet commentators
• Police interviewed him and searched his apartment for
bomb making equipment
“[M]any social media outlets released my photo in Thailand saying that
I was a suspected terrorist as looked like the suspect in question. All
my private information from immigration was leaked online and people
were looking for me – They even knew my home address.”
8
1st SAG / EEG Meeting, VICESSE, Vienna - Austria
INSPEC2T has received funding from the
European Union’s Horizon 2020
research and innovation programme
under grant agreement No 653749
Challenges – Inaccuracies
• Boston Marathon Bombing – several mistakenly identified
suspects
• Sunil Tripathi, whose body was eventually discovered
• “Bag men”, New York Post, who are currently pursuing a
lawsuit against the paper
• This misinformation made it into the media, blogs and to
individuals’ families and employers.
The inter-linkage between social media and crowdsourcing “led to
images stripped of their context being passed around as though
they were confirmed”. New Statesman, 19 April 2013.
9
1st SAG / EEG Meeting, VICESSE, Vienna - Austria
INSPEC2T has received funding from the
European Union’s Horizon 2020
research and innovation programme
under grant agreement No 653749
Challenges - Proportionate and legitimate use
• Allowing local police to keep tabs on #gunfire, #meth, and #protest in their communities.
o Some criminals may tweet about their crimes, but many such tweets are not crime related – e.g., many
#meth tweets relating to Breaking Bad
• Useful as a way to "listen in" on people who would not ordinarily be talking to police.
“Used well, such tools should make police departments more aware of both local problems and complaints about their
own work. Used less than well, it can be a bit creepy, sort of on par with having a kid's uncle listen outside her bedroom
during a slumber party. And used badly, it can make a nice tool for keeping an eye on critics/dissenters.”
- Nate Anderson, ‘How the Cops Watch your Tweets in Real Time’, ars technica.com
10
1st SAG / EEG Meeting, VICESSE, Vienna - Austria
INSPEC2T has received funding from the
European Union’s Horizon 2020
research and innovation programme
under grant agreement No 653749
Challenges - Proportionate and legitimate use
• SketchFactor – an app which would allow users to
report having seen or experienced something “sketchy” in
a particular location.
• These reports would then be geotagged and overlaid on a
Google map, creating a ‘sketchiness’ map.
• The idea was to help urban walkers be more street-smart.
• But subject to criticism that race would be used to profile
neighbourhoods as ‘sketchy’.
• After accusations of racism, the app never recovered.
11
1st SAG / EEG Meeting, VICESSE, Vienna - Austria
INSPEC2T has received funding from the
European Union’s Horizon 2020
research and innovation programme
under grant agreement No 653749
Challenges – Data security
• In UK from 2007 – 2010: 904 police officers and staff subject to disciplinary procedures for
breaching the Data Protection Act.
• Breaches ranged from minor rule-breaks on social media to serious allegations of misconduct
leading to arrests.
12
1st SAG / EEG Meeting, VICESSE, Vienna - Austria
INSPEC2T has received funding from the
European Union’s Horizon 2020
research and innovation programme
under grant agreement No 653749
Potential solutions
Data Security Solutions
• Data collection
o anonymity
o (unrestricted) collection and processing of
personal and sensitive information
o informed consent
13
• Data processing
o authentication
o logging
o minimal granularity
o automated deletion routines
o data validation, etc.
• Data storage and access
o secure storage (physical and cyber-security)
o unauthorised access to or disclosure of data
o technical information security controls
1st SAG / EEG Meeting, VICESSE, Vienna - Austria
INSPEC2T has received funding from the
European Union’s Horizon 2020
research and innovation programme
under grant agreement No 653749
Current police social media practice
Current data practices and privacy considerations in community policing
• What privacy issues are LEAs aware of?
• What privacy issues are LEAs attempting to address?
• What technologies are LEAs using?
• How are they using these technologies?
• What is working?
• What isn’t working?
Based on anonymised information collected from our project partners.
14
1st SAG / EEG Meeting, VICESSE, Vienna - Austria
INSPEC2T has received funding from the
European Union’s Horizon 2020
research and innovation programme
under grant agreement No 653749
Recommendations
• Match the suggested solutions to the specific challenges raised
• Highlight what controls can be built into the design to protect the privacy interests
• Highlight key findings and recommending steps that are required to manage privacy related
challenges in implementing the INSPEC2T platform
15
1st SAG / EEG Meeting, VICESSE, Vienna - Austria
JOIN US
INSPEC2T has received funding from the
European Union’s Horizon 2020
research and innovation programme
under grant agreement No 653749
Thank you for your attention!
16
For more information please contact:
Rachel Finn – rachel.finn@trilateralresearch.com
Jo Simon – joanna.simon@trilateralresearch.com
Kush Wadhwa – kush.wadhwa@trilateralresearch.com

More Related Content

What's hot

MeVer tools for disinformation detection
MeVer tools for disinformation detectionMeVer tools for disinformation detection
MeVer tools for disinformation detectionWeverify
 
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles WardCTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Wardsegughana
 
Privacy for Mobile Sensing Systems
Privacy for Mobile Sensing SystemsPrivacy for Mobile Sensing Systems
Privacy for Mobile Sensing SystemsJason Hong
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDr David Probert
 
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big databis_foresight
 
The European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agendaThe European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agendaEUBrasilCloudFORUM .
 
Akolade data presentation by Paul O'Connor
Akolade data presentation by Paul O'ConnorAkolade data presentation by Paul O'Connor
Akolade data presentation by Paul O'ConnorPaul O'Connor
 
Privacy by design for startups: legal and technology
Privacy by design for startups: legal and technologyPrivacy by design for startups: legal and technology
Privacy by design for startups: legal and technologyIshay Tentser
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johansonsegughana
 
Oxford cluster overview 160414
Oxford cluster overview 160414Oxford cluster overview 160414
Oxford cluster overview 160414Stewart Benger
 
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010Dr David Probert
 
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Jason Hong
 
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)Abbie Barbir
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet GovernanceKenny Huang Ph.D.
 
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter BurnettCTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnettsegughana
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureDr David Probert
 
Big Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingBig Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingAbzetdin Adamov
 
Cyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Cyber Vardzia - Integrated Physical and Cyber Security Systems for GeorgiaCyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Cyber Vardzia - Integrated Physical and Cyber Security Systems for GeorgiaDr David Probert
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...DATA SECURITY SOLUTIONS
 

What's hot (20)

MeVer tools for disinformation detection
MeVer tools for disinformation detectionMeVer tools for disinformation detection
MeVer tools for disinformation detection
 
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles WardCTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Ward
 
Privacy for Mobile Sensing Systems
Privacy for Mobile Sensing SystemsPrivacy for Mobile Sensing Systems
Privacy for Mobile Sensing Systems
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and Organisation
 
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big data
 
The European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agendaThe European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agenda
 
Akolade data presentation by Paul O'Connor
Akolade data presentation by Paul O'ConnorAkolade data presentation by Paul O'Connor
Akolade data presentation by Paul O'Connor
 
Privacy by design for startups: legal and technology
Privacy by design for startups: legal and technologyPrivacy by design for startups: legal and technology
Privacy by design for startups: legal and technology
 
Itu ics-pii
Itu ics-piiItu ics-pii
Itu ics-pii
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johanson
 
Oxford cluster overview 160414
Oxford cluster overview 160414Oxford cluster overview 160414
Oxford cluster overview 160414
 
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
 
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
 
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter BurnettCTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnett
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
Big Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingBig Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision Making
 
Cyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Cyber Vardzia - Integrated Physical and Cyber Security Systems for GeorgiaCyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Cyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...
 

Viewers also liked

TRACE - The role of technology in human trafficking.
TRACE - The role of technology in human trafficking.TRACE - The role of technology in human trafficking.
TRACE - The role of technology in human trafficking.Trilateral Research
 
ENERGIC-OD workshop zaragoza, 12-14.09.2016
ENERGIC-OD workshop zaragoza, 12-14.09.2016ENERGIC-OD workshop zaragoza, 12-14.09.2016
ENERGIC-OD workshop zaragoza, 12-14.09.2016Trilateral Research
 
PULSE results of stakeholder engagement, April 2016.
PULSE results of stakeholder engagement, April 2016.PULSE results of stakeholder engagement, April 2016.
PULSE results of stakeholder engagement, April 2016.Trilateral Research
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKTrilateral Research
 
Trace presentation final eu hague_ad_march2016
Trace presentation final eu hague_ad_march2016Trace presentation final eu hague_ad_march2016
Trace presentation final eu hague_ad_march2016Trilateral Research
 
Proteus scenarios and KPIs development
Proteus  scenarios and KPIs developmentProteus  scenarios and KPIs development
Proteus scenarios and KPIs developmentTrilateral Research
 
Phaedra II Technology foresight, 17 Nov 2016
Phaedra II Technology foresight, 17 Nov 2016Phaedra II Technology foresight, 17 Nov 2016
Phaedra II Technology foresight, 17 Nov 2016Trilateral Research
 
Overview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOPOverview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOPTrilateral Research
 
BYTE bdva Valencia Summit November 2016
BYTE bdva Valencia Summit November 2016BYTE bdva Valencia Summit November 2016
BYTE bdva Valencia Summit November 2016Trilateral Research
 

Viewers also liked (13)

TRACE - The role of technology in human trafficking.
TRACE - The role of technology in human trafficking.TRACE - The role of technology in human trafficking.
TRACE - The role of technology in human trafficking.
 
ENERGIC-OD workshop zaragoza, 12-14.09.2016
ENERGIC-OD workshop zaragoza, 12-14.09.2016ENERGIC-OD workshop zaragoza, 12-14.09.2016
ENERGIC-OD workshop zaragoza, 12-14.09.2016
 
PULSE results of stakeholder engagement, April 2016.
PULSE results of stakeholder engagement, April 2016.PULSE results of stakeholder engagement, April 2016.
PULSE results of stakeholder engagement, April 2016.
 
ENERGIC-OD workshop GWF 2016
ENERGIC-OD workshop GWF 2016ENERGIC-OD workshop GWF 2016
ENERGIC-OD workshop GWF 2016
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACK
 
Trace presentation final eu hague_ad_march2016
Trace presentation final eu hague_ad_march2016Trace presentation final eu hague_ad_march2016
Trace presentation final eu hague_ad_march2016
 
Satori WP1 slides
Satori WP1 slidesSatori WP1 slides
Satori WP1 slides
 
CRISP WP3 stakeholder workshop
CRISP WP3 stakeholder workshopCRISP WP3 stakeholder workshop
CRISP WP3 stakeholder workshop
 
Proteus scenarios and KPIs development
Proteus  scenarios and KPIs developmentProteus  scenarios and KPIs development
Proteus scenarios and KPIs development
 
Phaedra II Technology foresight, 17 Nov 2016
Phaedra II Technology foresight, 17 Nov 2016Phaedra II Technology foresight, 17 Nov 2016
Phaedra II Technology foresight, 17 Nov 2016
 
iTrack WP3 workshop
iTrack WP3 workshopiTrack WP3 workshop
iTrack WP3 workshop
 
Overview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOPOverview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOP
 
BYTE bdva Valencia Summit November 2016
BYTE bdva Valencia Summit November 2016BYTE bdva Valencia Summit November 2016
BYTE bdva Valencia Summit November 2016
 

Similar to Privacy & security considerations for social media policing system

Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesSocial Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesTrilateral Research
 
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceEvolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceTrilateral Research
 
WeVerify at NILC - May 2019.pptx
WeVerify at NILC - May 2019.pptxWeVerify at NILC - May 2019.pptx
WeVerify at NILC - May 2019.pptxWeverify
 
DHPOL INSPEC2T presentation at CEPOL
DHPOL INSPEC2T presentation at CEPOLDHPOL INSPEC2T presentation at CEPOL
DHPOL INSPEC2T presentation at CEPOLINSPEC2T Project
 
User privacy in mobility data
User privacy in mobility data User privacy in mobility data
User privacy in mobility data Chiara Renso
 
Fintech and Insurance case studies digitally transforming Europe's future
Fintech and Insurance case studies digitally transforming Europe's futureFintech and Insurance case studies digitally transforming Europe's future
Fintech and Insurance case studies digitally transforming Europe's futureBig Data Value Association
 
Keynote at HEAL TAC April 2020
Keynote at HEAL TAC April 2020Keynote at HEAL TAC April 2020
Keynote at HEAL TAC April 2020Weverify
 
Approaches for Tackling Online Misinformation.
Approaches for Tackling Online Misinformation.Approaches for Tackling Online Misinformation.
Approaches for Tackling Online Misinformation.Weverify
 
Presentation "Understanding Online Misinformation: Major Challenges Ahead" by...
Presentation "Understanding Online Misinformation: Major Challenges Ahead" by...Presentation "Understanding Online Misinformation: Major Challenges Ahead" by...
Presentation "Understanding Online Misinformation: Major Challenges Ahead" by...Weverify
 
TOOP project: Once Only Principle
TOOP project: Once Only PrincipleTOOP project: Once Only Principle
TOOP project: Once Only PrincipleSamos2019Summit
 
A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...
A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...
A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...ATMOSPHERE .
 
TTO Keynote 08 10 2021
TTO Keynote 08 10 2021TTO Keynote 08 10 2021
TTO Keynote 08 10 2021Weverify
 
Understanding Online Misinformation: Major Challenges Ahead, Rome,
Understanding Online Misinformation: Major Challenges Ahead, Rome, Understanding Online Misinformation: Major Challenges Ahead, Rome,
Understanding Online Misinformation: Major Challenges Ahead, Rome, Weverify
 
Qurator keynote berlin 2101 2020
Qurator keynote berlin 2101 2020Qurator keynote berlin 2101 2020
Qurator keynote berlin 2101 2020Weverify
 
Session 1 - Cluster Analysis - Academia
Session 1 - Cluster Analysis - AcademiaSession 1 - Cluster Analysis - Academia
Session 1 - Cluster Analysis - AcademiaPhilip O'Reilly
 
Technological Approaches to Online Misinformation: Major Challenges Ahead
Technological Approaches to Online Misinformation: Major Challenges AheadTechnological Approaches to Online Misinformation: Major Challenges Ahead
Technological Approaches to Online Misinformation: Major Challenges AheadWeverify
 
Participatory processes for air quality measurements through hackAIR
Participatory processes for air quality measurements through hackAIRParticipatory processes for air quality measurements through hackAIR
Participatory processes for air quality measurements through hackAIROpen Knowledge Belgium
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)GrittyCC
 
OCARIoT - Concertation Meeting EUBrasilCloudFORUM
OCARIoT - Concertation Meeting EUBrasilCloudFORUMOCARIoT - Concertation Meeting EUBrasilCloudFORUM
OCARIoT - Concertation Meeting EUBrasilCloudFORUMEUBrasilCloudFORUM .
 
UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015Jerry Fishenden
 

Similar to Privacy & security considerations for social media policing system (20)

Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesSocial Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
 
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceEvolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
 
WeVerify at NILC - May 2019.pptx
WeVerify at NILC - May 2019.pptxWeVerify at NILC - May 2019.pptx
WeVerify at NILC - May 2019.pptx
 
DHPOL INSPEC2T presentation at CEPOL
DHPOL INSPEC2T presentation at CEPOLDHPOL INSPEC2T presentation at CEPOL
DHPOL INSPEC2T presentation at CEPOL
 
User privacy in mobility data
User privacy in mobility data User privacy in mobility data
User privacy in mobility data
 
Fintech and Insurance case studies digitally transforming Europe's future
Fintech and Insurance case studies digitally transforming Europe's futureFintech and Insurance case studies digitally transforming Europe's future
Fintech and Insurance case studies digitally transforming Europe's future
 
Keynote at HEAL TAC April 2020
Keynote at HEAL TAC April 2020Keynote at HEAL TAC April 2020
Keynote at HEAL TAC April 2020
 
Approaches for Tackling Online Misinformation.
Approaches for Tackling Online Misinformation.Approaches for Tackling Online Misinformation.
Approaches for Tackling Online Misinformation.
 
Presentation "Understanding Online Misinformation: Major Challenges Ahead" by...
Presentation "Understanding Online Misinformation: Major Challenges Ahead" by...Presentation "Understanding Online Misinformation: Major Challenges Ahead" by...
Presentation "Understanding Online Misinformation: Major Challenges Ahead" by...
 
TOOP project: Once Only Principle
TOOP project: Once Only PrincipleTOOP project: Once Only Principle
TOOP project: Once Only Principle
 
A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...
A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...
A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...
 
TTO Keynote 08 10 2021
TTO Keynote 08 10 2021TTO Keynote 08 10 2021
TTO Keynote 08 10 2021
 
Understanding Online Misinformation: Major Challenges Ahead, Rome,
Understanding Online Misinformation: Major Challenges Ahead, Rome, Understanding Online Misinformation: Major Challenges Ahead, Rome,
Understanding Online Misinformation: Major Challenges Ahead, Rome,
 
Qurator keynote berlin 2101 2020
Qurator keynote berlin 2101 2020Qurator keynote berlin 2101 2020
Qurator keynote berlin 2101 2020
 
Session 1 - Cluster Analysis - Academia
Session 1 - Cluster Analysis - AcademiaSession 1 - Cluster Analysis - Academia
Session 1 - Cluster Analysis - Academia
 
Technological Approaches to Online Misinformation: Major Challenges Ahead
Technological Approaches to Online Misinformation: Major Challenges AheadTechnological Approaches to Online Misinformation: Major Challenges Ahead
Technological Approaches to Online Misinformation: Major Challenges Ahead
 
Participatory processes for air quality measurements through hackAIR
Participatory processes for air quality measurements through hackAIRParticipatory processes for air quality measurements through hackAIR
Participatory processes for air quality measurements through hackAIR
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
OCARIoT - Concertation Meeting EUBrasilCloudFORUM
OCARIoT - Concertation Meeting EUBrasilCloudFORUMOCARIoT - Concertation Meeting EUBrasilCloudFORUM
OCARIoT - Concertation Meeting EUBrasilCloudFORUM
 
UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015
 

More from Trilateral Research

Designing Security Across Boundaries: mapping disperse data to collaborative...
Designing Security Across Boundaries:  mapping disperse data to collaborative...Designing Security Across Boundaries:  mapping disperse data to collaborative...
Designing Security Across Boundaries: mapping disperse data to collaborative...Trilateral Research
 
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Trilateral Research
 
Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Trilateral Research
 
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...Trilateral Research
 
Ethics and technology in humanitarian setting
Ethics and technology in humanitarian settingEthics and technology in humanitarian setting
Ethics and technology in humanitarian settingTrilateral Research
 
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectTrilateral Research
 
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Trilateral Research
 
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Trilateral Research
 
CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.Trilateral Research
 
Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Trilateral Research
 
Examining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceExamining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceTrilateral Research
 
A stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceA stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceTrilateral Research
 
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Trilateral Research
 
ENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationTrilateral Research
 
Esports in the UK - privacy risks
Esports in the UK - privacy risksEsports in the UK - privacy risks
Esports in the UK - privacy risksTrilateral Research
 
Enhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelEnhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelTrilateral Research
 
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...Trilateral Research
 
Key Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectKey Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectTrilateral Research
 

More from Trilateral Research (20)

Star II sme hotline 21.01.20
Star II sme hotline 21.01.20Star II sme hotline 21.01.20
Star II sme hotline 21.01.20
 
Designing Security Across Boundaries: mapping disperse data to collaborative...
Designing Security Across Boundaries:  mapping disperse data to collaborative...Designing Security Across Boundaries:  mapping disperse data to collaborative...
Designing Security Across Boundaries: mapping disperse data to collaborative...
 
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
 
Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...
 
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
 
Ethics and technology in humanitarian setting
Ethics and technology in humanitarian settingEthics and technology in humanitarian setting
Ethics and technology in humanitarian setting
 
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
 
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
 
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
 
Overview of CLARITY project
Overview of CLARITY projectOverview of CLARITY project
Overview of CLARITY project
 
CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.
 
Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis
 
Examining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceExamining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster Resilience
 
A stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceA stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilience
 
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
 
ENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentation
 
Esports in the UK - privacy risks
Esports in the UK - privacy risksEsports in the UK - privacy risks
Esports in the UK - privacy risks
 
Enhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelEnhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national level
 
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
 
Key Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectKey Outputs of the E-CRIME project
Key Outputs of the E-CRIME project
 

Recently uploaded

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Privacy & security considerations for social media policing system

  • 1. 1st SAG / EEG Meeting, VICESSE, Vienna - Austria INSPEC2T has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 653749 INSPEC2T System Security & Privacy Considerations Rachel Finn Trilateral Research, UK INSPEC2T INS P E C C T
  • 2. 1st SAG / EEG Meeting, VICESSE, Vienna - Austria INSPEC2T has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 653749 INSPEC2T system security & privacy considerations • Privacy and data security are key challenges for the optimal use of social media for community policing. • This deliverable will ensure that the INSPEC2T system will follow a Security and Privacy by Design approach. o This will include design, development and implementation phases. • Data security and privacy will become integral to INSPEC2T priorities, objectives, design processes and planning operations by: o Safeguarding information o Ensuring consent of participants through transparency o Respecting data protection and human rights • Outcome – one of the main inputs for the design requirements of INSPEC2T and sets principles for assessment of INSPEC2T. 2
  • 3. 1st SAG / EEG Meeting, VICESSE, Vienna - Austria INSPEC2T has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 653749 Community policing & social media • Contextual background – law enforcement in the digital age o Widespread adoption of social media has led to novel ways of community policing o Police use social media to engage with citizens and include the public in law enforcement o Allows for gathering of intelligence o Many forces have a social media presence – e.g., in the UK, 98% of police forces have corporate Twitter account with an average of 18,000 followers 3
  • 4. 1st SAG / EEG Meeting, VICESSE, Vienna - Austria INSPEC2T has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 653749 Community policing & social media • The privacy and security implications and challenges regarding the use of social media in community policing. o Loss of control o Potential for abuse o Undermining public trust 4
  • 5. 1st SAG / EEG Meeting, VICESSE, Vienna - Austria INSPEC2T has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 653749 Privacy and security by design Privacy and Security by Design • “The philosophy and approach of embedding privacy directly into the design and operating specifications of information technologies and systems” – Ann Cavoukian, Privacy by Design: Origins, Meaning, and Prospects for Assuring Privacy and Trust in the Information Era • Achieved by building on principles of Fair Information Practices early in the development of the system. • By building privacy into the design of the system at an early stage, public trust is enhanced. 5
  • 6. 1st SAG / EEG Meeting, VICESSE, Vienna - Austria INSPEC2T has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 653749 Outline of the report D2.3: Security and privacy considerations for the INSPEC2T system • Identify relevant privacy and data security challenges • Identify potential technical solutions and processural safeguards to address these challenges • Assess current police practice • Make recommendations for the INSPEC2T system 6
  • 7. 1st SAG / EEG Meeting, VICESSE, Vienna - Austria INSPEC2T has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 653749 Privacy & data security challenges • Identifying data inaccuracies and measures to correct them • Ensuring legitimate and proportional use (avoiding surveillance, function creep, etc.) • Preventing data breaches 7
  • 8. 1st SAG / EEG Meeting, VICESSE, Vienna - Austria INSPEC2T has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 653749 Challenges – Inaccuracies • Following bomb in Bangkok, surveillance footage of suspected bomber released • Australian actor and fashion blogger living in Bangkok incorrectly identified by Internet commentators • Police interviewed him and searched his apartment for bomb making equipment “[M]any social media outlets released my photo in Thailand saying that I was a suspected terrorist as looked like the suspect in question. All my private information from immigration was leaked online and people were looking for me – They even knew my home address.” 8
  • 9. 1st SAG / EEG Meeting, VICESSE, Vienna - Austria INSPEC2T has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 653749 Challenges – Inaccuracies • Boston Marathon Bombing – several mistakenly identified suspects • Sunil Tripathi, whose body was eventually discovered • “Bag men”, New York Post, who are currently pursuing a lawsuit against the paper • This misinformation made it into the media, blogs and to individuals’ families and employers. The inter-linkage between social media and crowdsourcing “led to images stripped of their context being passed around as though they were confirmed”. New Statesman, 19 April 2013. 9
  • 10. 1st SAG / EEG Meeting, VICESSE, Vienna - Austria INSPEC2T has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 653749 Challenges - Proportionate and legitimate use • Allowing local police to keep tabs on #gunfire, #meth, and #protest in their communities. o Some criminals may tweet about their crimes, but many such tweets are not crime related – e.g., many #meth tweets relating to Breaking Bad • Useful as a way to "listen in" on people who would not ordinarily be talking to police. “Used well, such tools should make police departments more aware of both local problems and complaints about their own work. Used less than well, it can be a bit creepy, sort of on par with having a kid's uncle listen outside her bedroom during a slumber party. And used badly, it can make a nice tool for keeping an eye on critics/dissenters.” - Nate Anderson, ‘How the Cops Watch your Tweets in Real Time’, ars technica.com 10
  • 11. 1st SAG / EEG Meeting, VICESSE, Vienna - Austria INSPEC2T has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 653749 Challenges - Proportionate and legitimate use • SketchFactor – an app which would allow users to report having seen or experienced something “sketchy” in a particular location. • These reports would then be geotagged and overlaid on a Google map, creating a ‘sketchiness’ map. • The idea was to help urban walkers be more street-smart. • But subject to criticism that race would be used to profile neighbourhoods as ‘sketchy’. • After accusations of racism, the app never recovered. 11
  • 12. 1st SAG / EEG Meeting, VICESSE, Vienna - Austria INSPEC2T has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 653749 Challenges – Data security • In UK from 2007 – 2010: 904 police officers and staff subject to disciplinary procedures for breaching the Data Protection Act. • Breaches ranged from minor rule-breaks on social media to serious allegations of misconduct leading to arrests. 12
  • 13. 1st SAG / EEG Meeting, VICESSE, Vienna - Austria INSPEC2T has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 653749 Potential solutions Data Security Solutions • Data collection o anonymity o (unrestricted) collection and processing of personal and sensitive information o informed consent 13 • Data processing o authentication o logging o minimal granularity o automated deletion routines o data validation, etc. • Data storage and access o secure storage (physical and cyber-security) o unauthorised access to or disclosure of data o technical information security controls
  • 14. 1st SAG / EEG Meeting, VICESSE, Vienna - Austria INSPEC2T has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 653749 Current police social media practice Current data practices and privacy considerations in community policing • What privacy issues are LEAs aware of? • What privacy issues are LEAs attempting to address? • What technologies are LEAs using? • How are they using these technologies? • What is working? • What isn’t working? Based on anonymised information collected from our project partners. 14
  • 15. 1st SAG / EEG Meeting, VICESSE, Vienna - Austria INSPEC2T has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 653749 Recommendations • Match the suggested solutions to the specific challenges raised • Highlight what controls can be built into the design to protect the privacy interests • Highlight key findings and recommending steps that are required to manage privacy related challenges in implementing the INSPEC2T platform 15
  • 16. 1st SAG / EEG Meeting, VICESSE, Vienna - Austria JOIN US INSPEC2T has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 653749 Thank you for your attention! 16 For more information please contact: Rachel Finn – rachel.finn@trilateralresearch.com Jo Simon – joanna.simon@trilateralresearch.com Kush Wadhwa – kush.wadhwa@trilateralresearch.com

Editor's Notes

  1. Janus faced tool – two sides to the coin. Risks aren’t just for members of the public – also for the police. Media tends to focus only on risks to public, police focus on risks to themselves – reality is that it is both.
  2. Cavoukian, ‘Privacy by Design: Origins, Meaning, and Prospects for Assuring Privacy and Trust in the Information Era’ in Yee, George, O.M., (2012) Privacy Protection Measures and Technologies in Business Organizations, ch 7.
  3. http://thenextweb.com/opinion/2015/08/19/your-kitschy-fb-photos-dont-mean-shit/ Clear examples where both the police and members of the public lost control over information once it was posted on social media.
  4. http://arstechnica.com/tech-policy/2013/09/how-the-cops-watch-your-tweets-in-real-time/
  5. While this is not an example of police use, geo-tagging information on police social media accounts could have similar impacts.