Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet186/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   182   183   184   185   186   187   188   189   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

182
CHAPTER 14
Social media and Big Data
Data Collection for Crime Prediction and Prevention
To stay on the topic of information acquisition by the law enforcement, there are two 
interesting cases of the collection of Big Data for crime prevention purposes:
The 
first
is the “PredPol” software initially used by the Los Angeles police 
force and now by other police forces in the United States (Palm Beach, Memphis, 
Chicago, Minneapolis and Dallas). Predictive policing, in essence, cross check 
data, places and techniques of recent crimes with disparate sources, analyzing 
them and then using the results to anticipate, prevent and respond more effectively 
to future crime. Even if the software house created by PredPol declares that no 
profiling activities are carried out, it becomes essential to carefully understand the 
technology used to anonymize the personal data acquired by the law enforcement 
database. This type of software is bound to have a major impact in the United 
States on the conception of the protection of rights under the Fourth Amendment, 
and more specifically on concepts such as “probable cause” and “reasonable sus-
picion” which in future may come to depend on an algorithm rather than human 
choice (
Ferguson, 2012
).
The 
second
example is X1 Social Discovery software.
15
This software maps a 
given location, such as a certain block within a city or even an entire particular 
metropolitan area, and searches the entire public Twitter feed to identify any geo-lo-
cated tweets in the past three days (sometimes longer) within that specific area. This 
application can provide particularly useful data for the purpose of social control. 
One can imagine the possibility to have useful elements (e.g., IP address) to identify 
the subjects present in a given area during a serious car accident or a terrorist attack.
Legitimacy
From a strictly legal standpoint, these social control tools may be employed by gath-
ering information from citizens directly due the following principle of public:
“Where someone does an act in public, the observance and recording of that act 
will ordinarily not give rise to an expectation of privacy”.

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   182   183   184   185   186   187   188   189   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish