Abstract
Global information and communications technologies create criminal opportunities in which criminal violation and physical proximity are decoupled. As in all our endeavors, the good become the prey of the bad. Murderous and venal exploitation of ICT has followed from the inception of the Internet, threatening all the good it brings and the trust we need so badly as a people. As the work continues to expand the implementation of Smart Cities and the Internet of Things, there will be more opportunities for exploitation of these technologies. We examine the social and liberty risks our data and technology-driven responses may entail.
References
[1] Onsrud, H.J., J. Johnson, and X. Lopez, "Protecting Personal Privacy in Using Geographic Information Systems", Photogrammetric Engineering and Remote Sensing, 1994, LX(9), 1083-1095
[2] George Cho,Geographic information science: mastering the legal issues, John Wiley & Sons, 2005
[3] Goldberg v. Kelly 397 U.S. 254 (1970)
[4] Mathews v. Eldridge, 424 U.S. 319 (1976)
[5] Olmstead v. United States, 277 U.S. 438 (1928)
[6] Katz v. United States, 389 U.S. 347 (1967)
[7] United States v. Jones, 132 S. Ct. 945, 565 U.S. ___ (2012),
[8] Grady v. North Carolina 575 U.S. ___ (2015)
[9] Riley v. California, 573 U.S. ___ (2014)
[10] Illinois v. Lidster, 540 U.S. 419 (2004)
[11] Executive Office of the President of the United States, Big Data: Seizing Opportunities, Preserving Values (2014)
[12] Executive Office of the President of the United States, Big Data: A Report on Algorithmic Systems, Opportunity, and Civil Rights (May 2016)
Recommended Citation
Losavio, Michael M. and Elmaghraby, Adel Said
(2017)
"Security and the Transnational Information Polity,"
Journal of Digital Forensics, Security and Law: Vol. 12
, Article 8.
DOI: https://doi.org/10.15394/jdfsl.2017.1458
Available at:
https://commons.erau.edu/jdfsl/vol12/iss3/8