-> New surveillance technologies allow ever deeper observation of the lives of each individual.-> Security measures are increasingly reliant upon surveillance technologies, based on the claim that more security requires infringements of fundamentalrights.-> Citizens have more nuanced views: although the use of surveillance technologies is not rejected as such, it remains a contested issue. Therefore their utilisation should be limited categorically and strictly regulated and controlled.-> The protection of personal data needs to be improved and ensured, also the case of security technologies. In addition, security should remain a public sector responsibility and social root causes of insecurity need to be addressed and solved.Authors: Johan...
This paper considers the relationship between privacy and security and, in particular, the tradition...
Before the Snowden revelations about the scope of surveillance by the NSA and its partner agencies, ...
Over the last two decades, several large terror attacks have led to increased discussion of the use ...
This volume examines the relationship between privacy, surveillance and security, and the alleged pr...
This volume examines the relationship between privacy, surveillance and security, and the alleged pr...
Surveillance is becoming ubiquitous in our society. We can also see the emergence of "smart" surveil...
This volume examines the relationship between privacy, surveillance and security, and the alleged pr...
In modern societies, surveillance is progressively emerging as a key governing tech- nique of state ...
Surveillance is becoming ubiquitous in our society. We can also see the emergence of "smart" surveil...
It has become cliché to observe that new information technologies endanger privacy. Typically, the ...
As a result of digital technologies and the internet becoming increasingly ubiquitous, security tech...
As a result of digital technologies and the internet becoming increasingly ubiquitous, security tech...
This volume examines the relationship between privacy, surveillance and security, and the alleged pr...
This paper considers the relationship between privacy and security and, in particular, the tradition...
In the aftermath of September 11 2001 security has been at the top of any Government or Enterprise a...
This paper considers the relationship between privacy and security and, in particular, the tradition...
Before the Snowden revelations about the scope of surveillance by the NSA and its partner agencies, ...
Over the last two decades, several large terror attacks have led to increased discussion of the use ...
This volume examines the relationship between privacy, surveillance and security, and the alleged pr...
This volume examines the relationship between privacy, surveillance and security, and the alleged pr...
Surveillance is becoming ubiquitous in our society. We can also see the emergence of "smart" surveil...
This volume examines the relationship between privacy, surveillance and security, and the alleged pr...
In modern societies, surveillance is progressively emerging as a key governing tech- nique of state ...
Surveillance is becoming ubiquitous in our society. We can also see the emergence of "smart" surveil...
It has become cliché to observe that new information technologies endanger privacy. Typically, the ...
As a result of digital technologies and the internet becoming increasingly ubiquitous, security tech...
As a result of digital technologies and the internet becoming increasingly ubiquitous, security tech...
This volume examines the relationship between privacy, surveillance and security, and the alleged pr...
This paper considers the relationship between privacy and security and, in particular, the tradition...
In the aftermath of September 11 2001 security has been at the top of any Government or Enterprise a...
This paper considers the relationship between privacy and security and, in particular, the tradition...
Before the Snowden revelations about the scope of surveillance by the NSA and its partner agencies, ...
Over the last two decades, several large terror attacks have led to increased discussion of the use ...