Privacy in public spaces: what expectations of privacy do we have in social media intelligence?
In this paper we give an introduction to the transition in contemporary surveillance from top down traditional police surveillance to profiling and “pre-crime” methods. We then review in more detail the rise of open source (OSINT) and social media (SOCMINT) intelligence and its use by law enforcemen...
| Main Authors: | Edwards, Lilian, Urquhart, Lachlan |
|---|---|
| Format: | Article |
| Published: |
Oxford University Press
2016
|
| Online Access: | https://eprints.nottingham.ac.uk/48448/ |
Similar Items
How much privacy we still have on social network?
by: Chewae, Mafaisu, et al.
Published: (2015)
by: Chewae, Mafaisu, et al.
Published: (2015)
From privacy impact assessment to Social Impact Assessment
by: Edwards, Lilian, et al.
Published: (2016)
by: Edwards, Lilian, et al.
Published: (2016)
Dynamic privacy in public surveillance
by: Moncrieff, Simon, et al.
Published: (2009)
by: Moncrieff, Simon, et al.
Published: (2009)
Privacy preserving social network data publication
by: Abawajy, Jemal H., et al.
Published: (2016)
by: Abawajy, Jemal H., et al.
Published: (2016)
Work-family conflict: what intervention options do we have?
by: Ahmad, Aminah
Published: (2006)
by: Ahmad, Aminah
Published: (2006)
Privacy concern and perceived benefits towards privacy and election in Indonesia
by: Lubis, Muharman, et al.
Published: (2014)
by: Lubis, Muharman, et al.
Published: (2014)
Early lung disease in infants and preschool children with cystic fibrosis: What have we learned and what should we do about it?
by: Ranganathan, S., et al.
Published: (2017)
by: Ranganathan, S., et al.
Published: (2017)
Engagement in classroom learning: Ascertaining the proportion of students who have a balance between what they can do and what they are expected to do
by: Cavanagh, Robert
Published: (2012)
by: Cavanagh, Robert
Published: (2012)
Breaking the Privacy Kill Chain: Protecting Individual and Group Privacy Online
by: Kim, J., et al.
Published: (2018)
by: Kim, J., et al.
Published: (2018)
A new conceptual framework within information privacy: Meta privacy
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
Privacy and the Health Industry
by: Carew-Reid, Anne
Published: (2003)
by: Carew-Reid, Anne
Published: (2003)
What We Expect from Digital Libraries
by: Dreher, Heinz, et al.
Published: (2004)
by: Dreher, Heinz, et al.
Published: (2004)
What do we mean when we talk about trust in social media? A systematic review
by: Zhang, Yixuan, et al.
Published: (2023)
by: Zhang, Yixuan, et al.
Published: (2023)
International business education: What we know and what we have yet to develop
by: Klarin, Anton, et al.
Published: (2021)
by: Klarin, Anton, et al.
Published: (2021)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
The Stranger Danger: Exploring Surveillance, Autonomy, and Privacy in Children’s Use of Social Media
by: Nolan, J., et al.
Published: (2011)
by: Nolan, J., et al.
Published: (2011)
An analysis of privacy in the space organisation of traditional Malay houses in peninsular Malaysia
by: Abdul Rahim, Zaiton, et al.
Published: (2017)
by: Abdul Rahim, Zaiton, et al.
Published: (2017)
Utilization of community pharmacy space to enhance privacy: A qualitative study
by: Hattingh, H. Laetitia, et al.
Published: (2015)
by: Hattingh, H. Laetitia, et al.
Published: (2015)
A relook at visual privacy: definition and factors influencing Muslim visual privacy (MVP)
by: Abd Manaf, Azhani, et al.
Published: (2019)
by: Abd Manaf, Azhani, et al.
Published: (2019)
Privacy Impact Assessment (PIA): From management tools towards a privacy culture
by: Zulhuda, Sonny
Published: (2013)
by: Zulhuda, Sonny
Published: (2013)
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems
by: Luo, Entao, et al.
Published: (2018)
by: Luo, Entao, et al.
Published: (2018)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
Do privacy concerns determine online information disclosure? The case of internet addiction
by: Thompson, Nik, et al.
Published: (2021)
by: Thompson, Nik, et al.
Published: (2021)
Are we doing enough : the disable have proven their capabilities by gaining places in public universities.
by: The Star, Simrit Kaur
Published: (2007)
by: The Star, Simrit Kaur
Published: (2007)
Do we have enough clean air to breath?
by: Awang, Muhamad
Published: (2000)
by: Awang, Muhamad
Published: (2000)
What data privacy problems does users face in the big data environment?
by: Zhang, Xiaotong
Published: (2019)
by: Zhang, Xiaotong
Published: (2019)
Privacy in the Converged Communications Platform
by: Gita, Radhakrishna
Published: (2008)
by: Gita, Radhakrishna
Published: (2008)
Techno-Legal Implications Of Privacy
by: Min, Chee Fee
Published: (2002)
by: Min, Chee Fee
Published: (2002)
Cognitive privacy for personal clouds
by: Radenkovic, Milena
Published: (2016)
by: Radenkovic, Milena
Published: (2016)
Technology and the deterioration of right to privacy
by: Wan Mohd Nor, Murni, et al.
Published: (2011)
by: Wan Mohd Nor, Murni, et al.
Published: (2011)
Privacy and technology: implications and challenges
by: Mohammed Jama, Abdi Risaq, et al.
Published: (2009)
by: Mohammed Jama, Abdi Risaq, et al.
Published: (2009)
Privacy and technology: implications and challenges
by: Shuriye, Abdi Omar, et al.
Published: (2008)
by: Shuriye, Abdi Omar, et al.
Published: (2008)
ICT omnipresence and the rights to privacy
by: Abdulkadir, Abdulkadir Bolaji, et al.
Published: (2023)
by: Abdulkadir, Abdulkadir Bolaji, et al.
Published: (2023)
Privacy-respecting digital investigation
by: Dehghantanha, Ali, et al.
Published: (2014)
by: Dehghantanha, Ali, et al.
Published: (2014)
Apartment layout and privacy satisfaction
by: Wahid, Julaihi, et al.
Published: (2008)
by: Wahid, Julaihi, et al.
Published: (2008)
Apartment Layout And Privacy Satisfaction
by: Wahid, Julaihi, et al.
Published: (2008)
by: Wahid, Julaihi, et al.
Published: (2008)
Technology And The Deterioration Of Right
To Privacy
by: Wan Mohd Nor, Murni, et al.
Published: (2011)
by: Wan Mohd Nor, Murni, et al.
Published: (2011)
Privacy under threats: an analysis on the online risks and legal measures in protecting privacy of children online
by: Abd. Jalil, Juriah
Published: (2014)
by: Abd. Jalil, Juriah
Published: (2014)
A Privacy Attack on Multiple Dynamic Match-key based Privacy-Preserving Record Linkage
by: Vidanage, Anushka, et al.
Published: (2020)
by: Vidanage, Anushka, et al.
Published: (2020)
Similar Items
-
How much privacy we still have on social network?
by: Chewae, Mafaisu, et al.
Published: (2015) -
From privacy impact assessment to Social Impact Assessment
by: Edwards, Lilian, et al.
Published: (2016) -
Dynamic privacy in public surveillance
by: Moncrieff, Simon, et al.
Published: (2009) -
Privacy preserving social network data publication
by: Abawajy, Jemal H., et al.
Published: (2016) -
Work-family conflict: what intervention options do we have?
by: Ahmad, Aminah
Published: (2006)