Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet189/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   185   186   187   188   189   190   191   192   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

184
CHAPTER 14
Social media and Big Data
THE ROLE OF THE E.U. REFORM ON DATA PROTECTION 
IN LIMITING THE RISKS OF SOCIAL SURVEILLANCE
The framework described above shows that modern social control is the result of the 
interaction between the private and public sector. This collaborative model is not 
only based on mandatory disclosure orders issued by courts or administrative bodies, 
but has also extended to a more indefinite grey area of voluntary and proactive col-
laboration by big companies. It is difficult to get detailed information on this second 
model of voluntary collaboration; however, the predominance of U.S. companies in 
the ICT sector, particularly with regard to the Internet and cloud services, increases 
the influence of the U.S. administration on national companies and makes specific 
secret agreements of cooperation in social control easier (
European Parliament, 
2013a; European Parliament, 2012
).
Against this background, the political and strategic value of the European rules 
on data protection emerges. These rules may assume the role of a protective bar-
rier in order to prevent and limit access to the information about European citi-
zens.
19
 In this sense, the E.U. Proposal for a General Data Protection Regulation 
(
European Commission, 2012
) extends its territorial scope (Article 3 (2), 2013) 
through “the processing of personal data of data subjects in the Union by a con-
troller or processor not established in the Union, where the processing activities 
are related to:
(a) 
the offering of goods or services, irrespective of whether a payment of the data 
subject is required, to such data subjects in the Union; or
(b) 
the monitoring of such data subjects”.
20
It should be noted that various commentators consider that the privacy risks
related to Big Data analytics are low, pointing out the large amount of data pro-
cessed by analytics and the de-identified nature of most of this data. This con-
clusion is wrong. Anonymity by de-identification is a difficult goal to achieve, 
as demonstrated in a number of studies (
see
Ohm, 2010; United States General 
Accounting Office, 2011
; See also 
Zang and Bolot, 2011; Golle, 2006; Sweeney, 
2000b; Sweeney, 2000a; Tene and Polonetsky, 2013
). The power of Big Data ana-
lytics to draw unpredictable inference from information undermines many strate-
gies based on de-identification (
Mayer-Schönberger and Cukier, 2013; Schwartz 
and Solove, 2011
). In many cases a reverse process in order to identify individuals 
is possible; it is also possible to identify them using originally anonymous data (
see
Ohm, 2010; United States General Accounting Office, 2011
; See also 
Zang and 
Bolot, 2011; Golle, 2006; Sweeney, 2000b; Sweeney, 2000a; Tene and Polonetsky, 
2013
). Here, it is closer to the truth to affirm that each data is a piece of personal 
information than to assert that it is possible to manage data in a de-identified way.
19 
Although only information regarding natural persons are under the European regulation on data pro-
tection, the data concerning clients, suppliers, employees, shareholders and managers have a relevant 
strategical value in competition.
20 
See also Recital 21, PGDPR and Recital 21, PGDPR-LIBE_1-29.



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   185   186   187   188   189   190   191   192   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish