Skip to main content
Erschienen in:
Buchtitelbild

2017 | OriginalPaper | Buchkapitel

1. Introduction

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As the title of this work explicitly reflects, the discussion will mainly deal with two groups of issues: aviation security and privacy, data protection and other human rights. While aviation security is mainly aimed at preventing acts of unlawful interference with civil aviation and relates to the state’s undertakings to protect persons, aircraft, airport facilities and other material assets from harm, there are also various fundamental human rights instruments aimed at protecting not only the right to life, but also other rights and freedoms of individuals.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
It is common to differentiate between two types of aviation: civil aviation and state aviation. Civil aviation mainly refers to commercial and other needs of the citizens and economy. In this research, civil aviation will mainly imply the commercial aspect and will refer to transportation of passengers.
 
2
Used as synonymous.
 
3
People on the ground (non-passengers) may include different persons: those meeting their relatives or friends at the airport arrival halls (they may be subject to a part of security control such as metal detectors at the airport entrance, e.g. in Moscow), airport staff (are usually subject to special control) or just people who can suffer being in the neighbourhood of a terrorist attack (e.g. if the bomb is put in a car near the airport, or if the exploded airplane falls onto civil buildings, etc.). Aviation security certainly endeavours to protect all these people as well. As I will explain in Sect. 4.​5.​3, aviation security covers the airport infrastructure too, thus, it extends to such elements as airport train stations, taxi areas, etc. However, people on the ground are usually subject to a much lesser degree of control/surveillance than passengers.
 
4
E.g. 3.3 billion passengers were transported in 2014 worldwide. See Chap.​ 4.
 
5
Simmons. Searching for Terrorists: Why “Public Safety” is not a Special Need (2009) p. 912.
 
6
Rule 20 Screening of passengers and baggage. United Air Lines, Inc. Contract of Carriage (revised 31 December 2015), https://​www.​united.​com/​web/​format/​pdf/​Contract_​of_​Carriage.​pdf.
 
7
Ghee. Recommendations for airports and airlines to improve baggage, security, immigration, arrivals and more in 2015 (2015).
 
8
IATA. Remarks of Tony Tyler at the IATA Ops Conference in Vienna, 15 April 2013. http://​www.​iata.​org/​pressroom/​speeches/​Pages/​2013-04-15-01.​aspx.
 
9
See, e.g. websites of ACLU: http://​www.​aclu.​org and EPIC: http://​epic.​org.
 
10
McDonagh. Risk, human rights and the bureacratisation of counter-terrorism (2011) p. 10.
 
11
Lyon. Surveillance studies: An overview (2007a) p. 14.
 
12
In the literature, “CCTV” is used as generic term camera surveillance. Although CCTV does not amount to camera surveillance, as explained in Chap. 6, these terms will be used as synonymous in this research.
 
13
All these terms will be elaborated in detail in Chap. 6.
 
14
Wright [et al.] Questioning surveillance. In: Computer Law & Security Review. Vol. 31 (2015) pp. 281–282, Schneier Schneier on security (2008) pp. 8, 69.
 
16
Wright et al. (2015) p. 282.
 
17
Nissenbaum. Privacy in context (2010) p. 3.
 
19
Schneier (2008) p. 69.
 
20
Data and information are used as synonyms in this research.
 
21
Clarke. Information technology and dataveillance. In: Communications of the ACM. Vol. 31 (1988). p. 498–512.
 
22
See Chap. 2.
 
23
E.g. Garfinkel. Database nation: the death of privacy in the 21st century (2000), Rubenfeld. The End of Privacy. In: Stanford law review (2008). In January 2015, Science dedicated its special issue to “The end of privacy”.
 
24
Solove. The end of privacy? In: Scientific American. Vol. 299 (2008b) p. 104.
 
25
See Chap. 2.
 
26
Vermeulen and Bellanova. European ‘smart’surveillance: What’s at stake for data protection, privacy and non-discrimination? In: Security and Human Rights. Vol. 23 (2013) p. 305.
 
27
Poullet. Data protection legislation: What is at stake for our society and democracy? In: Computer Law & Security Review. Vol. 25 (2009) p. 226.
 
28
Vermeulen and Bellanova (2013) p. 305.
 
29
Amicelli. Report on Theoretical Frameworks and Previous Empirical Research (2012a) p. 14.
 
30
See Vienna Declaration and Programme of Action (A/CONF.157/23), adopted by the World Conference on Human Rights, held in Vienna, 14–25 June 1993.
 
31
Schneier (2008) p. 70.
 
32
See Lyon. Surveillance after september 11 (2003a).
 
33
Article 3 of Regulation No 300/2008.
 
34
Lyon. Globalizing Surveillance Comparative and Sociological Perspectives. In: International Sociology. Vol. 19 (2004) p. 137.
 
35
Sagi-Dolev. Manufacturer Perspectives. In: Aviation Security International. Vol. 19 (2013) p. 26.
 
36
Schneier (2008) p. 70.
 
37
Spencer. Security Versus Privacy: Reframing the Debate. In: Denver University Law Review. Vol. 79 (2002) p. 519.
 
38
Aquilina. Public security versus privacy in technology law: A balancing act? In: Computer Law & Security Review. Vol. 26 (2010) p. 135.
 
39
Spencer (2002) p. 519.
 
40
See Chap. 5.
 
41
See Chap. 5.
 
42
See Chaps. 3 and 2 respectively.
 
43
Transfer of air passenger data from airlines to state authorities, with further analysis of these data for security and other purposes. See more details in Chap. 6.
 
44
See more details below.
 
45
Solove. Nothing to hide: The false tradeoff between privacy and security (2011) p. 3.
 
46
Globalization is a multidimensional phenomenon, which involves a deepening and broadening of rapid transboundary exchanges due to developments in technology, communications, and media. Such exchanges create a more interdependent world. See Shelton. Protecting Human Rights in a Globalized World. In: BC Int’l Comp. L. Rev. Vol. 25 (2002) p. 275.
 
47
Whenever possible, the research uses English versions of Russian and Norwegian sources or their official translations into English, with indication of sources. In all other cases, unless specified otherwise, the translations are the author’s.
 
48
See e.g. Ibid.
 
49
Andersen. Edb og ansvar. Jurist-og Økonomforbundets Forlag (1988) p. 29.
 
50
Including post-Soviet states, many “developing” states in Asia, Latin America, and Africa.
 
Literatur
Zurück zum Zitat Andersen, Mads Bryde. Edb og ansvar, Copenhagen: Jurist- og Økonomforbundets Forlag, 1988. Andersen, Mads Bryde. Edb og ansvar, Copenhagen: Jurist- og Økonomforbundets Forlag, 1988.
Zurück zum Zitat Schneier, Bruce. Schneier on security. Indianapolis, Indiana, 2008. Schneier, Bruce. Schneier on security. Indianapolis, Indiana, 2008.
Zurück zum Zitat Spencer, Shaun. “Security Versus Privacy: Reframing the Debate”. Denver University Law Review 79 (2002): 519. Spencer, Shaun. “Security Versus Privacy: Reframing the Debate”. Denver University Law Review 79 (2002): 519.
Zurück zum Zitat Vermeulen, Mathias and Rocco Bellanova. “European ‘smart’ surveillance: What’s at stake for data protection, privacy and non-discrimination?” Security and Human Rights 23 (2013): 297–311.CrossRef Vermeulen, Mathias and Rocco Bellanova. “European ‘smart’ surveillance: What’s at stake for data protection, privacy and non-discrimination?” Security and Human Rights 23 (2013): 297–311.CrossRef
Zurück zum Zitat Wright, David et al. “Questioning surveillance”. Computer Law & Security Review 31 (2015): 280–92.CrossRef Wright, David et al. “Questioning surveillance”. Computer Law & Security Review 31 (2015): 280–92.CrossRef
Metadaten
Titel
Introduction
verfasst von
Olga Mironenko Enerstvedt
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-58139-2_1