Law in the Internet Society

View   r14  >  r13  ...
ClementLegrandSecondEssay 14 - 21 Feb 2017 - Main.ClementLegrand
Line: 1 to 1
 
META TOPICPARENT name="SecondEssay"
Line: 7 to 7
 -- By ClementLegrand - 09 Dec 2016

Introduction

Changed:
<
<
In this paper, I will analyze the different theories proposed to ensure the protection of privacy and the the use of big data surveillance. For this purpose, I will briefly set the scene by recalling the Snowden revelations and clarifying what is meant by "big data" and Terrorism".
>
>
In this paper, I will analyze the different theories proposed to ensure the protection of privacy and the the use of big data surveillance. For this purpose, I will briefly set the scene by recalling the Snowden revelations and clarifying what is meant by "big data" (when using the word "terrorism" I refer to its American legal definition). I will then analyze the debate about anonymization of information as a method to protect privacy. Finally I will discuss the proportionnality of the massive surveillance.
 

Big Data Surveillance of "Terrorism"

Changed:
<
<
Tere are many definitions of "[[Big Data]]". In the recent years, surveillance through Big Data is very often associated to the prosecution and prevention of terrorrism. It is
>
>
Tere are many definitions of "[[Big Data]]". The three elements that are classically associated with Big data are the three "V"s, namely, Volume, Velocity and Variety. This means that Big Data involves the processing of an important amount of data (volume), that such data includes different kind of data (vareity) and that big data is characterized by the rapidity of the processing (velocity). Through using Big Data, it is possible to determine patterns of conducts and to make predictive deductions due to the correlation of these patterns. In the recent years, surveillance through Big Data is very often associated to the prosecution and prevention of terrorrism. The Snowden revelation showed that the NSA is collecting huge amount of data and that it monitors online communication through the collaboration with private companies. In the recent years, we have seen examples of how Big data has been used by intelligence services in suspected terrorism case. This use of Big Data is not limited to the American intelligence services.
 

Privacy and Surveillance: Anonymity and secrecy


Revision 14r14 - 21 Feb 2017 - 22:19:59 - ClementLegrand
Revision 13r13 - 21 Feb 2017 - 16:15:32 - ClementLegrand
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM