首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
The developments of technology in communications industry have radically altered the ways in which we communicate and exchange information. Along with the speed, efficiency, and cost-saving benefits of the digital revolution come new challenges to the security and privacy of communications and information traversing the global communications infrastructure. As is with any technology the misuse of technology is noticed similarly the encryption technology. Encryption and other advanced technologies may be used, with direct impact on law enforcement and therefore some restrictions are necessary in the interests of national security. The problem, however, is ensuring that the restriction is legitimate and solely for in the interests of national security, the state not being allowed to interfere and keep a track on individuals' activities and private lives without sufficient cause. The individual needs encryption to protect their personal privacy and confidential data such as medical information, personal financial data, and electronic mail. In a networked environment, such information is increasingly at risk of being stolen or misused. Therefore, encryption is critical to building a secure and trusted global information infrastructure. Digital computers have changed the landscape considerably and the entire issue, at its simplest level, boils down to a form of balancing of interests. The specific legal and rights-related problems arising from the issue of cryptography and privacy in the Indian context are examined in this paper.  相似文献   

2.
《Justice Quarterly》2012,29(1):17-28

Advances in technology have given law enforcement agencies additional capabilities when performing surveillance activities. One area in particular—aerial surveillance—especially demonstrates the possible intrusiveness of police investigatory activity.

One of the most important considerations in the area of aerial surveillance is striking a balance between the necessity of police activities and protections guaranteed by the Fourth Amendment. Cases relating to aerial surveillance have sought to develop guidelines for police agencies in this expanding area of search and seizure inquiry.  相似文献   

3.
《Justice Quarterly》2012,29(2):285-298

This paper deals with the asymmetry in relations between the individual actor and the corporation. In particular the paper focuses on the impact of corporate use of technologies of surveillance, ostensibly to reduce crime and to increase efficiency. A case is made that the use of these technologies to invade citizens' personal privacy in order to procure personal information without consent is a still-unrecognized form of corporate theft. Steps toward a remedy are suggested.  相似文献   

4.
Encryption is essential in today’s information and network age. Encryption policy must facilitate and encourage the use of encryption so that businesses can protect their corporate assets from economic espionage by foreign governments and competitors, so that law enforcement agencies can counter the surveillance activities of organized crime, and so that all organizations and individuals can safeguard sensitive information from criminals and intruders. At the same time, because encryption can be exploited by criminals and terrorists, its completely unfettered proliferation may not be in our national interest. The Clinton administration and National Research Council reached a similar conclusion, although they recommended different approaches.  相似文献   

5.

Computers are a mainstay of most record systems at virtually all levels of government. The vast accumulation of personal information by governments has raised concerns about the erosion of personal privacy caused by the speed and efficiency of computers. For more than 30 years, realistic and sometimes exaggerated concerns about the proper role of computers in society have driven the public policy debate, resulting in a raft of legislation designed to protect the privacy of individuals about whom government keeps records.

But these computer /privacy concerns threaten legitimate public and media access to government records. The dangers to access were underscored by the Supreme Court in a holding that publicly available records regained privacy interests when drawn together in a centralized government computer. In other words, the form in which records were kept rather than their content could control access.

This article suggests that understanding the origin and context of the computer /privacy conflict will better prepare access proponents to deal with attempts to curtail legitimate access to government information because of privacy concerns.  相似文献   

6.
As the 21st century approaches, encryption is presenting a national security dilemma in the US. While the use of strong encryption for computerized data is essential in protecting our nation, widespread, unregulated encryption poses serious problems on two levels: encryption could inhibit the government's ability to enforce the law as well as gather foreign intelligence. As a result, the government has established export controls on encryption products and proposed a 'key recovery' system designed to enable law enforcement officers to access encrypted data in the course of lawful investigations. The export controls have been ineffective and counterproductive policy and are arguably unconstitutional under the First Amendment. However, export controls are the only viable solution to the intelligence gathering problem and will need to survive these political and legal attacks or our national security could be jeopardized. Key recovery will be difficult and costly to implement and has come under attack by civil liberties' groups. Nevertheless, a cost-effective compromise on key recovery is necessary to meet the needs of law enforcement. Such a system, if it mirrored current electronic surveillance law, would effectively balance individual privacy rights and governmental interests and thus should survive constitutional scrutiny. Congress and President Clinton ought to enact key recovery legislation soon before the use of encryption becomes commonplace. A failure to act intelligently and effectively on this critical, cutting-edge issue could compromise our nation's future.  相似文献   

7.
Abstract

The biological aspects of illegal harvests of threatened wildlife are outlined. It is shown that local agriculturalists are beneficiaries of illegal harvesting and that competition from agriculture exacerbates the extinction risk. Illegal harvesting of wildlife is driven by the profitability of the exercise, but law enforcement activity can deter poaching by reducing the associated expected profits. Law enforcement may be unable to limit illegal harvesting to levels threatened populations can sustain as a result of perverse consequences or strategic responses by poachers to law enforcement activity. Poaching activity is sensitive to the beliefs of participants about future prices and the availability of wildlife. Erroneous beliefs result in price collapses being observed. Integrating legal markets with increased local control of wildlife and punitive law enforcement strategies may be the most effective and efficient means to constrain illegal harvests.  相似文献   

8.
ABSTRACT

Supporters of increased surveillance see tremendous potential in the ever increasing creation, collection, and retention of personal data. Most acknowledge that the massive collection of information also creates challenges where the collection outpaces the ability to meaningfully process the data. Increased processing power and more finely tuned algorithms are often portrayed as the solution to this haystack conundrum. While a human may struggle to find the needle in an overflowing haystack of disordered information, powerful computers can take a logical and structured approach that will make the haystack eminently more searchable. This article evaluates this premise from a human rights perspective and considers whether algorithmic surveillance systems can be designed to be compatible with the right to privacy. In addition to assessing the incongruity between traditional safeguards (such as foreseeability and accountability) with algorithmic surveillance, this article also confronts the problem of initial collection and addresses the contention that well-defined algorithmic search can effectively limit the intrusiveness of surveillance. Evolution in the case law of the European Court of Human Rights and the Court of Justice of the European Union will be factored into this analysis.  相似文献   

9.
《Justice Quarterly》2012,29(2):403-430

In recent years, the study of organized crime has been oriented around the enterprise “model.” This model is really an approach to studying organized crime, founded on the notion that legal and illegal businesses are quite similar. This notion provides the method used by enterprise theorists: theories established for studying formal legal organizations are applied to the study of businesses that provide illegal goods and services. The most noteworthy research based on the enterprise approach is that of economist Peter Reuter. Reuter used principles of industrial organization and marketplace dynamics to predict that illegal enterprises will be relatively small and shortlived, and that illegal markets will be characterized by competition, not by collusion. Here I seek to assess the degree to which Reuter's propositions were confirmed or disconfirmed by observations of the numbers gambling industry in New York City in the 1960s. Most of Reuter's propositions were not supported by the data used in this study.  相似文献   

10.
ABSTRACT

While the United Nations (UN) pioneered in recognizing the impact of modern technological developments on (data) privacy as far back as 1968, little has so far been achieved in terms of introducing a truly global data privacy framework. The present UN data privacy framework is by and large a mere patchwork of rules that exhibit a number of weaknesses. This weak structure of the present framework is a result of political and ideological controversies of the Cold War era. This article considers the extent to which the current UN data privacy system provides protection to data privacy and highlights its major limitations. It concludes that the discourse at the UN set in motion, particularly in the aftermath of the Snowden revelations, wields a potential to result in a major reform in the UN data privacy system.  相似文献   

11.
Legal context. Some state legislatures are considering billswhich would require those applying for a driver’s licenceto provide one or more biometric identifiers. The US federalgovernment is tending towards eavesdropping on conversationsand investing in data mining efforts while on the other handanti "big-brother" technologies are also emerging to counterthis trend and protect privacy. The demand for technology toprotect privacy will no doubt increase as the demand for defenceand security spending increases. We also live in a world wherebioterrorist acts are a constant threat and therefore demandfor biological detection devices and nanotechnology is growingdaily. Key points. Current technology advances in biometrics, surveillance,biological detection and nanotechnology can be used both toprotect and to jeopardize the security and privacy of individuals.As such, the importance of intellectual property in these areascannot be underestimated. Practical significance. Companies are advised to ‘go onthe offensive’. All companies should aggressively protecttheir core technology in numerous facets such as patent protection,copyright, trade marks and trade secrets. In the high tech arenathis is especially important because the demand for securityand privacy necessitates the development of advanced applicationsand in turn the quality of protectable IP for the companiesthat develop the technology increases. Additionally, companiesshould also pursue an offensive strategy that includes analyzingemerging standards and competitor focus so that they can acquirea competitive advantage or secure cross-licensing of another’stechnology.  相似文献   

12.
《Justice Quarterly》2012,29(2):391-422

The question of whether the illegal firearms market serving criminals and juveniles can be disrupted has been vigorously debated. Recent research suggests that illegal gun markets consist of both “point sources” (ongoing diversions through scofflaw dealers and trafficking rings) and “diffuse sources” (acquisitions through theft and informal, voluntary sales). To the extent that systematic gun trafficking is an important source of weapons for criminals and youth, focused regulatory and investigative resources may be effective in disrupting the illegal flow. In this research, we use data on traced firearms to examine one aspect of the illegal gun market that holds the most immediate promise for focused supply-side enforcement efforts—close-to-retail diversions. We find that almost one-third of traceable crime guns were recently diverted from legitimate retail firearms commerce and that nearly one-third had two or more indicators of gun trafficking involving dealers, purchasers, and possessors. We discuss the implications of these findings for understanding illegal gun markets and for developing effective supply-side enforcement strategies.  相似文献   

13.
Objectives

We examine the extent to which individuals' knowledge of an advanced police technology (license plate recognition or "LPR") may impact perceptions of police. Technologies with the capacity to track individuals' movements are becoming increasingly common in police practice. Although these technologies may yield positive benefits, their use may also heighten community concerns about increased surveillance, data storage, and data security, thereby potentially negatively impacting community-police relationships.

Methods

We utilize a survey-based experiment with randomized assignment of participants (n=405) to investigate the impact of individuals' knowledge of LPR use on a variety of police perceptions, including trust in police, community approval, respect for citizens, and respect for individual rights.

Results

Most respondents were unaware of LPR use prior to the survey. When compared with a control group, respondents who encountered brief mentions of LPR functions on the survey expressed significantly lower levels of trust in police. Additionally, "strong agreement" with other positive statements about police also appears to have declined in this sample in response to LPR information. Notably, the sample contained high pre-existing levels of trust and support for police, factors which may have moderated the impacts of LPR information.

Conclusions

These results support the hypothesis that awareness of LPR use may negatively impact perceptions of police, including trust in police. More generally, although technologies like LPR represent technological innovations, they may also yield unintended consequences, including the potential to undermine police-community relations if adoption decisions are not accompanied by sufficient transparency or community support.

  相似文献   

14.
Conclusion Gary Marx' Undercover provides a fine basis for fuller sociological analysis of electronic surveillance in the late twentieth century. He is correct that new technology is implicated in a new surveillance, although the interplay between social and technological factors must constantly be in view. Above all it is computers, or, more properly, computers-plus-telecommunications that facilitate the new surveillance. They do so by allowing for the creation of novel categories of personal data, seen especially at present in computer matching. But they may also be enabling anather new departure, the integration of moments of surveillance once the province of quite distinct social institutions.The threat of a maximum security society emerging within the very liberal democratic contexts that cherish (above all economic) liberties is a reality. But fresh social analysis is called for, as the popularly-used and illuminative panoptic concept suffers from a number of basic flaws, and because we have yet to connect satisfactorily the equally pertinent themes of privacy and freedom. Modern social control seems to utilize several different disciplines, often acting in concert but in complex ways. The fact that some of the most potent arise in situations as apparently innocent as buying a restaurant meal with a credit card should not lull us into thinking that they are any less worrisome than certain undercover police tactics.  相似文献   

15.
Abstract

POSTAL CORRESPONDENCE courses were for many years the traditional means to acquire qualifications, gain promotion or change one's career, and thus to get on in life. Radio and television came to play their respective parts in the process, and these in turn have been supplemented although not supplanted by a variety of on‐and off‐line electronic delivery modes. However, the means to learn are delivered, students must study and be assessed, and it is likely to remain necessary to retain a variety of traditional learning, teaching and assessment modes and methods, whilst building on them for the future.

In an era when the process of globalisation operates in a variety of spheres, not least in respect of education and communication, the importance of distance learning is bound to be of continuing and probably increasing importance, and the quality of the teaching delivered and the learning absorbed is crucial.

This paper, based on recent research undertaken by members of the School of Legal Studies at the University of Wolverhampton, set out to investigate some aspects of the effectiveness of law students’ distance learning with particular reference to how they acquire legal knowledge and the extent to which they take a deep or surface approach to that learning.1  相似文献   

16.
The rapid growth of new developments in communication technology has brought electronic monitoring to the forefront of today’s workplace concerns. This is an area that in recent years has drawn considerable attention amongst the media, academia and legal scholars demanding that employers do not intrude into employees’ online privacy via electronic monitoring in the workplace. However, electronic monitoring at work is not one-sided and it is arguable that employers have legitimate reasons to justify their action. This paper aims to examine employers’ justification for conducting electronic monitoring by highlighting the potential risk of financial and legal liabilities that employers may incur as a result of employees’ misuse of online services at work.  相似文献   

17.
Abstract

Various terms have been used to describe the intersection between computing technology and violations of the law-including computer crime, electronic crime, and cybercrime. While there remains little agreement on terminology, most experts agree that the use of electronic devices to commit crime has increased dramatically and is now commonplace. It is the role of the digital investigator to bring cybercriminals to justice. Cybercrime however differs from traditional crime and presents a variety of unique challenges including the variety of electronic devices available, amount of data produced by these devices, the absence of standard practices and guidelines for analyzing that data, the lack qualified personnel to perform investigations and the lack of resources to provide on-going training. This paper examines these challenges  相似文献   

18.
Developments in technology have created the possibility for law enforcement authorities to use for surveillance purposes devices that are in the hands or private premises of individuals (e.g. smart phones, GPS devices, smart meters, etc.). The extent to which these devices interfere with an individual's private sphere might differ. In the European Union, surveillance measures are considered lawful if they have been issued in conformity with the legal rules and the proportionality principle. Taking a fundamental rights approach, this paper focuses on the information needed for adopting proportionate decisions when authorizing the use for surveillance of devices that are not built for surveillance purposes. Since existing methods of privacy assessment of technologies do not offer the required information, this paper suggests the need for a new method of assessing privacy implications of technologies and devices which combines an assessment of privacy aspects with the different dimensions of surveillance.  相似文献   

19.
重庆高考"加分门"事件中,公开违法变更民族身份行为的相关信息自不待言,但公开31名造假考生的名单则必将侵犯考生的隐私权。尽管违法行为的信息是"公共信息",但个人对其中的个人信息依然享有隐私权。在公开违法行为信息的同时也应保护个人隐私。通过区分处理,将其中涉及的足以识别个人身份的个人信息加以隐匿、删除,既可以最大限度地公开违法行为的信息,促进行政机关依法行政,又可以顺应国际潮流,保护个人隐私。  相似文献   

20.
ABSTRACT

Using data collected on Jamaican criminal deportees and data from the U.S. census and the National Household Survey on Drug Abuse, annual remittances losses to Jamaica resulting from deportation are estimated to be $1.9 million. Murders and reported rapes in Jamaica are estimated to be 5% higher due to criminal deportation. We estimate there are 84,749 Jamaican-born illegal aliens in the U.S. and Jamaican-born illegal aliens are 45% less likely to commit crimes than legally admitted aliens. We demonstrate that criminal deportation is unlikely to rise in the near future and U.S. gains from deportation are greater than Jamaican losses.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号