Human Rights/Ethics and Security Research Tom Sorell University of Birmingham.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Offender Databases and Familial Searches: Social, Ethical, and Legal Issues Mary Terrell White, PhD Department of Community Health Boonshoft School of.
Thematic Discussion on Human Rights & Resolution 1373 Counter-Terrorism Committee Executive Directorate (CTED) United Nations New York, 7 October 2010.
Chapter Fifteen Order and Civil Liberties. Copyright © Houghton Mifflin Company. All rights reserved The Bill of Rights The failure to include a.
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
By the end of the lesson I should;
Outline What is the precautionary principle? Precautionary principle in the context of DSM Obligation to apply the precautionary approach Precautionary.
STREET LAW Chapter 1: What Is Law.
August 9, 2005UCCSC Converting Policy to Reality Building Campus Security Programs Karl Heins -- Director of IT Audit Services Office of the University.
1 Welcome To Rural Sociology 2225 “Science, Technology and Society” Mary Grigsby Associate Professor of Rural Sociology Division of Applied Social Sciences.
Computer Security: Principles and Practice
Big Brother is watching.  1. Would you ever consider letting a TV crew come into your life to document everything? Why or why not?  Big Brother, Kardashians,
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
Security By: Brad Martin and Nick Mcdowell. History After September 11 th the united states took extreme measures to make sure an event like that would.
The Canadian Charter of Rights and Freedoms
THE POTENTIAL FOR EFFECTIVE WEB CONTENT CONTROL BASED ON CURRENT TECHNOLOGY Carolyn Watters and Michael Shepherd Web Information Filtering Lab Faculty.
Anonymity, Security, Privacy and Civil Liberties
The Universal Declaration of Human Rights
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Ethical and Social...J.M.Kizza 1 Module 12: New Frontiers for Computer Ethics: Cyberspace Introduction Cyberspace and the Concepts of Telepresence and.
Computer Forensics Principles and Practices
”Billboard that looks back”  What is biometric identification? ◦ Biometrics can be defined as the automated use of physiological or behavioral characteristics.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
COM 354 Week 2.1 New Media Ethics. Twitter Updates What accounts to follow? Stories of the week?
Network Perimeter Defense Josef Pojsl, Martin Macháček, Trusted Network Solutions, Inc.
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
Every student you have, just like any citizen in the United States, has a right to privacy  An ethical issue that arises when an individual’s right to.
Some test cases. The student body of Crestwood high school, a took a vote. By a vast majority they voted to conduct a student-led prayer over the public.
12.1—Students explain the fundamental principles and moral values of American principles and moral values of American democracy as expressed in the U.
Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web.
Detecting terrorist activities Presentation on a specialist topic in Data Mining and Text Analytic.
The Right To Be Forgotten In 2006, the European Union and Argentina put the concept of the right to be forgotten into practice. This issue started from.
The Detecter Project. Detecter - Objectives To identify human rights and other legal and moral standards that detection technologies in counter-terrorism.
APS Day 15 Enduring Understanding(s) 1. Procedural democracy focuses on how government decisions are made, while substantive democracy focuses on the results.
The First Amendment and Oregon Student Journalists Allison Marks, Adviser THE FOREST Forest Grove High School.
IS3220 Information Technology Infrastructure Security
MTRS3 Solutions and Services (SME, IL). MTRS in a nutshell  A security consulting company specialising in high risk environments (SME)  Main fields.
 a body of fundamental principles or established precedents according to which a state or other organization is acknowledged to be governed.  the composition.
HUMAN RIGHTS LAW. Ahmed T. Ghandour.. HUMAN RIGHTS IN EUROPE I.
The Role of the United Nations (UN). United Nations (UN) Established in 1945, it has 192 member nations. The UN is not an international government and.
Amity School of Business 1 Amity School of Business BBA, SEMESTER II INDIVIDUAL, SOCIETY AND NATION Divya Goel.
FBI vs Apple Currently, the FBI and Apple are in a battle over an iPhone owned by a domestic terrorist from San Bernardino California. The cell phone could.
Global Acts of Terror. Terrorism Defined Terrorism is the use of violence and threats to intimidate and coerce (force action) for political reasons. Terrorism.
SURVEILLE Prof. Tom Sorell (Dr Katerina Hadjimatheou)
Mission “ A Place Where Every Individual has the POWER to Succeed ” Home of the Tigers WUSD Motto- “Relentlessly Pursuing Excellence”
Human Rights Population. Population: Human Rights WHAT ARE HUMAN RIGHTS? Fundamental rights that belong to every person, simply by being a human being.
OBJECTIVES: Explain what is human rights
Judicial Training on Data Protection and Privacy Rights
Can Egosecure help with your GDPR Actions?
UN vs the Internet Summary
The Global Community Ethical Relativism Fundamental Rights
The Canadian Charter of Rights and Freedoms
Saman Elyahoodayan Wire Taping
AN INTRODUCTION TO EDUCATIONAL RESEARCH.
The Canadian Charter of Rights and Freedoms
The Canadian Charter of Rights and Freedoms
Proportionality and Tracking
– Communication Technology in a Changing World
Rights Respecting Schools Award What is it?
The Issues with Technology in education
Developing a TLP Cyber safety Charter
The Canadian Charter of Rights and Freedoms
LO5 Unit 1: Fundamentals of IT
APK Bellwork Think* Pair* Share
Human rights in the fight against terrorism
Chapter 9 Ethical Aspects of Gerontological Nursing
The Canadian Charter of Rights and Freedoms
Presentation transcript:

Human Rights/Ethics and Security Research Tom Sorell University of Birmingham

Human Rights Limit the powers of states in relation to individuals – Coercion; detention; intrusion Limit the discretion of states in identifying threats (threat to life vs way of life) Limit the discretion of states in adopting means to prevent/counter threats – Threshold for declaring and maintaining emergency – Use of security technology

Detection Technology Any technology that helps to identify terrorists, on-going or imminent terrorist activity, or their weapons CCTV Metal and explosive scanners Tapping and Bugging devices Internet monitoring equipment Data-mining using profiling algorithms

Human Rights risks of detection technologies Tapping and bugging devices, internet monitoring: – Rights to privacy – Free association – Freedom of religion – Freedom of expression Data-mining and profiling – discrimination

Ethics vs HRs Wider than H-Rs (lying) Deeper: explains why violations of rights and other things are wrong Questions HR doctrines of indissolubility and interdependence of rights Questions content of rights formulations Combination of HRs and ethics desirable

Ethics and Detection Technologies What kind of violation of privacy? Detection in public places Zones of privacy: body vs home Ethics answers the question why privacy matters Ethics addresses the question whether privacy matters as much as the prevention of injury

Ethics plus HRs Sample questions: what is an emergency? Is privacy a fundamental right? When is it permissible to let numbers count How much inconvenience is justified by a low risk of a serious attack How far is the right to life in tension or not with the right to privacy

Incorporating Ethics and HRs Specialized ethics and H-R research Expert consultants on technology projects Interactions between tech and ethics/HR projects Empirical security ethics The need for ethics and HR advice over the life- time of projects The possible conflict between public opinion and ethics

Incorporating Ethics and HRs The need for clarity Public opinion and actual uses, powers of detection technologies The possible conflict between public opinion and ethics/HRs Citizen jury methodologies