SlideShare uma empresa Scribd logo
1 de 14
Involving citizens in assessing dilemmas of privacy and security Dr Ian Brown
Outline ,[object Object],[object Object],[object Object],[object Object]
EU data privacy concerns Source: Eurobarometer #225 Data Protection in the EU, Feb. 2008 p.8
EU Charter of Fundamental Rights ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Surveillance of personal data Source: Eurobarometer #225 Data Protection in the EU, Feb. 2008 p.48
UK support for ID cards Data: ICM polling for No2ID, 2005-2007
In-depth consultation required ,[object Object],[object Object],[object Object],[object Object]
Transparency ,[object Object],[object Object],[object Object]
Political honesty required ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Efficacy of Identity Scheme ,[object Object],[object Object],[object Object]
Efficacy of Identity Scheme ,[object Object],[object Object]
Security: reality vs theatre ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy standards-setting ,[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

GDPR, DPAs and the Journalistic Media: Walking the Regulatory Tightrope
GDPR, DPAs and the Journalistic Media:  Walking the Regulatory TightropeGDPR, DPAs and the Journalistic Media:  Walking the Regulatory Tightrope
GDPR, DPAs and the Journalistic Media: Walking the Regulatory Tightrope
David Erdos
 

Mais procurados (10)

New Media Internet Expression and European Data Protection
New Media Internet Expression and European Data ProtectionNew Media Internet Expression and European Data Protection
New Media Internet Expression and European Data Protection
 
Opportunities and challenges of managing a globally mobile workforce
Opportunities and challenges of managing a globally mobile workforceOpportunities and challenges of managing a globally mobile workforce
Opportunities and challenges of managing a globally mobile workforce
 
Adaptation and Implementation Challenges for Housing First
Adaptation and Implementation Challenges for Housing FirstAdaptation and Implementation Challenges for Housing First
Adaptation and Implementation Challenges for Housing First
 
Shall we learn how to protect out personal data? An introduction to personal ...
Shall we learn how to protect out personal data? An introduction to personal ...Shall we learn how to protect out personal data? An introduction to personal ...
Shall we learn how to protect out personal data? An introduction to personal ...
 
Post Brexit Update
Post Brexit UpdatePost Brexit Update
Post Brexit Update
 
Critical regulations governing data privacy and data protection 20 dec2018
Critical regulations governing data privacy and data protection 20 dec2018Critical regulations governing data privacy and data protection 20 dec2018
Critical regulations governing data privacy and data protection 20 dec2018
 
Theo's study visit on the fight against cybercrime and
Theo's study visit on the fight against cybercrime andTheo's study visit on the fight against cybercrime and
Theo's study visit on the fight against cybercrime and
 
Schengen-MBegovic-Oct2016
Schengen-MBegovic-Oct2016Schengen-MBegovic-Oct2016
Schengen-MBegovic-Oct2016
 
Guardian Masterclass Investigative Journalism FOI Training 10 Tips
Guardian Masterclass Investigative Journalism FOI Training 10 TipsGuardian Masterclass Investigative Journalism FOI Training 10 Tips
Guardian Masterclass Investigative Journalism FOI Training 10 Tips
 
GDPR, DPAs and the Journalistic Media: Walking the Regulatory Tightrope
GDPR, DPAs and the Journalistic Media:  Walking the Regulatory TightropeGDPR, DPAs and the Journalistic Media:  Walking the Regulatory Tightrope
GDPR, DPAs and the Journalistic Media: Walking the Regulatory Tightrope
 

Destaque

Excel ate my election!
Excel ate my election!Excel ate my election!
Excel ate my election!
blogzilla
 
Privacy as a key system requirement for building trust
Privacy as a key system requirement for building trustPrivacy as a key system requirement for building trust
Privacy as a key system requirement for building trust
blogzilla
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
baoqi
 

Destaque (8)

Malas Maia
Malas MaiaMalas Maia
Malas Maia
 
Pitagoras
PitagorasPitagoras
Pitagoras
 
C. Naturales
C. NaturalesC. Naturales
C. Naturales
 
Mujers Científicas
Mujers CientíficasMujers Científicas
Mujers Científicas
 
Excel ate my election!
Excel ate my election!Excel ate my election!
Excel ate my election!
 
Privacy as a key system requirement for building trust
Privacy as a key system requirement for building trustPrivacy as a key system requirement for building trust
Privacy as a key system requirement for building trust
 
Shortage of Girls in China
Shortage of Girls in ChinaShortage of Girls in China
Shortage of Girls in China
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
 

Semelhante a Involving citizens in assessing dilemmas of privacy and security

Privacy impact assessment
Privacy impact assessmentPrivacy impact assessment
Privacy impact assessment
Springer
 
Outline D
Outline DOutline D
Outline D
butest
 
Seminar Presentation
Seminar PresentationSeminar Presentation
Seminar Presentation
Banji Adenusi
 

Semelhante a Involving citizens in assessing dilemmas of privacy and security (20)

Security technology and democratic legitimacy
Security technology and democratic legitimacySecurity technology and democratic legitimacy
Security technology and democratic legitimacy
 
Making the citizen heard in security research
Making the citizen heard in security researchMaking the citizen heard in security research
Making the citizen heard in security research
 
Privacy impact assessment
Privacy impact assessmentPrivacy impact assessment
Privacy impact assessment
 
Outline D
Outline DOutline D
Outline D
 
Trust, Privacy and Biometrics
Trust, Privacy and BiometricsTrust, Privacy and Biometrics
Trust, Privacy and Biometrics
 
Whistleblowing and the Right to Freedom of Expression and Information under t...
Whistleblowing and the Right to Freedom of Expression and Information under t...Whistleblowing and the Right to Freedom of Expression and Information under t...
Whistleblowing and the Right to Freedom of Expression and Information under t...
 
Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...
 
Privacy in the developing world
Privacy in the developing worldPrivacy in the developing world
Privacy in the developing world
 
Privacy in the Modern World. thesis Leiden University
Privacy in the Modern World. thesis Leiden UniversityPrivacy in the Modern World. thesis Leiden University
Privacy in the Modern World. thesis Leiden University
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
Rosa Arnaldo y Mª Jesús Guerrero, Chairperson and Member of the Board of CIAIAC
Rosa Arnaldo y Mª Jesús Guerrero, Chairperson and Member of the Board of CIAIACRosa Arnaldo y Mª Jesús Guerrero, Chairperson and Member of the Board of CIAIAC
Rosa Arnaldo y Mª Jesús Guerrero, Chairperson and Member of the Board of CIAIAC
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
Un may 28, 2019
Un may 28, 2019Un may 28, 2019
Un may 28, 2019
 
Communications Privacy and the State
Communications Privacy and the StateCommunications Privacy and the State
Communications Privacy and the State
 
12.NP: Anti-terrorism measures - Censoring the web, making us less secure
12.NP: Anti-terrorism measures - Censoring the web, making us less secure12.NP: Anti-terrorism measures - Censoring the web, making us less secure
12.NP: Anti-terrorism measures - Censoring the web, making us less secure
 
Ubicomp challenges for privacy law
Ubicomp challenges for privacy lawUbicomp challenges for privacy law
Ubicomp challenges for privacy law
 
Monitoring and controlling the Internet
Monitoring and controlling the InternetMonitoring and controlling the Internet
Monitoring and controlling the Internet
 
Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)
 
Seminar Presentation
Seminar PresentationSeminar Presentation
Seminar Presentation
 

Mais de blogzilla

Mais de blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloud
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Involving citizens in assessing dilemmas of privacy and security