•  
  •  
 

Abstract

Global information and communications technologies create criminal opportunities in which criminal violation and physical proximity are decoupled. As in all our endeavors, the good become the prey of the bad. Murderous and venal exploitation of ICT has followed from the inception of the Internet, threatening all the good it brings and the trust we need so badly as a people. As the work continues to expand the implementation of Smart Cities and the Internet of Things, there will be more opportunities for exploitation of these technologies. We examine the social and liberty risks our data and technology-driven responses may entail.

References

[1] Onsrud, H.J., J. Johnson, and X. Lopez, "Protecting Personal Privacy in Using Geographic Information Systems", Photogrammetric Engineering and Remote Sensing, 1994, LX(9), 1083-1095

[2] George Cho,Geographic information science: mastering the legal issues, John Wiley & Sons, 2005

[3] Goldberg v. Kelly 397 U.S. 254 (1970)

[4] Mathews v. Eldridge, 424 U.S. 319 (1976)

[5] Olmstead v. United States, 277 U.S. 438 (1928)

[6] Katz v. United States, 389 U.S. 347 (1967)

[7] United States v. Jones, 132 S. Ct. 945, 565 U.S. ___ (2012),

[8] Grady v. North Carolina 575 U.S. ___ (2015)

[9] Riley v. California, 573 U.S. ___ (2014)

[10] Illinois v. Lidster, 540 U.S. 419 (2004)

[11] Executive Office of the President of the United States, Big Data: Seizing Opportunities, Preserving Values (2014)

[12] Executive Office of the President of the United States, Big Data: A Report on Algorithmic Systems, Opportunity, and Civil Rights (May 2016)

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.