Skip to main content
Top

2016 | OriginalPaper | Chapter

Technology for Privacy Assurance

Author : J. C. Smart

Published in: Ethical Reasoning in Big Data

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A government’s ability to quickly collect, analyze, and share information is often considered vital to its national security and public safety. At increasing scale, however, this same information sharing is increasingly placed in tension with the protection of one’s personal liberties. This chapter describes a method for relieving this tension, offering an approach that enables both to be pursued simultaneously. The approach is founded on the concept of an impenetrable “Black Box” in which information can be placed within, but no person can ever access. The operation of this box is defined by encoded policy statements that specify patterns of reasonable suspicion and/or public safety concern. These statements are derived from standard of law and governance guidelines, as interpreted by a duly constituted policy body. The technological approach is specifically designed to only output detection of authorized patterns, but without ever revealing or enabling any sort of access to the information it contains. With no human involvement in the analytic process, substantially higher levels of privacy assurance are believed possible.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
The Hypergraph Transport Protocol (HGTP) under development at Georgetown University is specifically designed for this purpose.
 
2
The ATra language under development at Georgetown University is specifically designed for this purpose.
 
Literature
go back to reference Campos, J. (2014). Civil liberties and national security: The ultimate cybersecurity debate. Homeland Security Today, January 27, 2014. Campos, J. (2014). Civil liberties and national security: The ultimate cybersecurity debate. Homeland Security Today, January 27, 2014.
go back to reference Center for Strategic and International Studies. (2014). Balancing security and civil liberties—Principles for rebuilding trust in intelligence activities, Washington D.C., May 15, 2014. Center for Strategic and International Studies. (2014). Balancing security and civil liberties—Principles for rebuilding trust in intelligence activities, Washington D.C., May 15, 2014.
go back to reference Committee on National Security Systems. (2010). National information assurance (IA) glossary. CNSS Instruction No. 4009, April 26, 2010. Committee on National Security Systems. (2010). National information assurance (IA) glossary. CNSS Instruction No. 4009, April 26, 2010.
go back to reference Gilmore, J. (2014). Balancing homeland security and civil liberties. Washington Times, March 6, 2014. Gilmore, J. (2014). Balancing homeland security and civil liberties. Washington Times, March 6, 2014.
go back to reference ISO/IEC 15408. The common criteria for information technology security evaluation ISO/IEC 15408. The common criteria for information technology security evaluation
go back to reference ISO/IEC 8652. (2012). Ada reference manual—Language and standard libraries, 2012(E). ISO/IEC 8652. (2012). Ada reference manual—Language and standard libraries, 2012(E).
go back to reference Ocampo, J. M., Smart, J. C., et al. (2016). Developing a novel multi-organizational data-sharing method to improve HIV surveillance data for public health action in metropolitan Washington DC. Journal of Medical Internet Research Public Health and Surveillance. Ocampo, J. M., Smart, J. C., et al. (2016). Developing a novel multi-organizational data-sharing method to improve HIV surveillance data for public health action in metropolitan Washington DC. Journal of Medical Internet Research Public Health and Surveillance.
Metadata
Title
Technology for Privacy Assurance
Author
J. C. Smart
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-28422-4_8

Premium Partner