Issues of Security and Informational Privacy in Relation to an Environmental Scanning System for Fighting Organized Crime

  • Anne Gerdes
  • Henrik Legind Larsen
  • Jacobo Rouces
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8132)


This paper clarifies privacy challenges related to the EU project, ePOOLICE, which aims at developing a particular kind of open source information filtering system, namely a so-called environmental scanning system, for fighting organized crime by improving law enforcement agencies opportunities for strategic proactive planning in response to emerging organized crime threats. The environmental scanning is carried out on public online data streams, focusing on modus operandi and crime trends, not on individuals. Hence, ethical and technical issues – related to societal security and potential privacy infringements in public online contexts – are being discussed in order to safeguard privacy all through the system design process.


informational privacy environmental scanning security ethics 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Choo, C.W.: The art of scanning the environment. Bulletin of the American Society for information Science and Technology 25(3), 21–24 (1999)CrossRefGoogle Scholar
  2. 2.
    Raguse, M., Meints, M., Langfeldt, O., Peissl, W.: Preparatory action on the enhancement of the european industrial potential in the field of security research. Technical report, PRISE (2008)Google Scholar
  3. 3.
    Nissenbaum, H.F.: Privacy in context: Technology, policy, and the integrity of social life. Stanford Law & Politics (2010)Google Scholar
  4. 4.
    Beken, T.V.: Risky business: A risk-based methodology to measure organized crime. Crime, Law and Social Change 41(5), 471–516 (2004)CrossRefGoogle Scholar
  5. 5.
    Ansoff, H.I.: Managing strategic surprise by response to weak signals. California Management Review 18(2), 21–33 (1975)CrossRefGoogle Scholar
  6. 6.
    Delhey, J., Newton, K.: Who trusts?: The origins of social trust in seven societies. European Societies 5(2), 93–137 (2003)CrossRefGoogle Scholar
  7. 7.
    Fukuyama, F.: Social capital and the global economy. Foreign Affairs, 89–103 (1995)Google Scholar
  8. 8.
    Smith, A.: The theory of moral sentiments. In: Raphael, D.D., Macfie, A.L. (eds.). Clarendon Press, Oxford (1759)Google Scholar
  9. 9.
    Løgstrup, K.: The ethical demand. University Notre Dame, USA (1997)Google Scholar
  10. 10.
    Peissl, W.: Surveillance and security: A dodgy relationship. Journal of Contingencies and Crisis Management 11(1), 19–24 (2003)CrossRefGoogle Scholar
  11. 11.
    Regan, P.M.: Legislating privacy: Technology, social values, and public policy. Univ. of North Carolina Press (1995)Google Scholar
  12. 12.
    Cavoukian, A., et al.: Privacy by design: The 7 foundational principles. Information and Privacy Commissioner of Ontario, Canada (2009)Google Scholar
  13. 13.
    Benn, S.I.: Privacy, freedom, and respect for persons. In: Pennock, J.R., Chapman, J.W. (eds.) Nomos XIII: Privacy. Atherton Press, New York (1971)Google Scholar
  14. 14.
    Johnson, D.G.: Computer ethics. Prentice Hall (1994)Google Scholar
  15. 15.
    Warren, S.D., Brandeis, L.D.: The right to privacy [the implicit made explicit] (1984)Google Scholar
  16. 16.
    Fried, C.: Privacy. The Yale Law Journal 77(3), 475–493 (1968)MathSciNetCrossRefGoogle Scholar
  17. 17.
    Rachels, J.: Why privacy is important. Philosophy & Public Affairs 4(4), 323–333 (1975)Google Scholar
  18. 18.
    Tavani, H.T.: Informational privacy, data mining, and the internet. Ethics and Information Technology 1(2), 137–145 (1999)CrossRefGoogle Scholar
  19. 19.
    Van den Hoven, M.: Privacy and the varieties of moral wrong-doing in the information age. Computers and Society 27, 33–37 (1997)CrossRefGoogle Scholar
  20. 20.
    De Capitani di Vimercati, S., Foresti, S., Livraga, G., Samarati, P.: Data privacy: definitions and techniques. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 20, 793–817 (2012)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Anne Gerdes
    • 1
  • Henrik Legind Larsen
    • 1
  • Jacobo Rouces
    • 1
  1. 1.Computational Intelligence and Security Lab., Department of Electronic SystemsAalborg UniversityEsbjergDenmark

Personalised recommendations