SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Aviation security and protection of individuals: Technologies and legal
principles
New aviation security measures appear every day and are usually introduced under the rubric
of combating terrorism. These technologies include body scanners, camera surveillance,
biometrics, profiling, behaviour analysis, and transfer of air passenger personal data from
airlines to state authorities, among others.
Air-travel security measures cannot be considered mere technical measures related to aviation
security. These measures also have a serious impact on issues of fundamental human rights.
The research focus of this dissertation is on the right to privacy and data protection in the
aviation security context. The main objective of the work is to discuss what can be considered
proportionate security, taking into account concerns of privacy and related human rights
including the right to health, freedom of movement, equal treatment and non-discrimination,
freedom of thought, conscience and religion, and rights of the child.
Aviation security plus privacy
The main thesis of the study is that the ideal model to illustrate the relationship between
aviation security and privacy is aviation security plus privacy rather than aviation security
versus privacy. Both values are important for society; what is needed is to find a way to
ensure both values, without losing one or the other.
The research is based on international and EU law and uses national regimes of the USA, UK,
Norway and Russia as illustrations. The research argues that the selected aviation security
technologies constitute breaches to a number of human rights. Nevertheless, they are arguably
more or less proportionate if violations are compared with the level of threats and security
benefits. However, this does not mean that situation should be status quo. The question of
whether threats and benefits of security measures are proportionate to privacy and other
human rights risks is subject to continuous evaluation.
Regulation and technologies
The issues of interaction between legal regulation and the technologies are central in the
aviation security debate. In theory, if properly developed and applied, they are able to protect
both security and other rights of the individual. However, this is easier said than done. The
study reveals that current processes and tendencies, such as technological developments,
globalization, harmonization of regulation, modernization of existing data privacy regulation,
developing technology-specific regulation and mechanisms of self-regulation, growing use of
Privacy by Design, improving passenger experience, etc. can contribute both to solving the
existing issues and to creating additional problematic issues for the aviation security-privacy
dilemma.
The technological developments can be both positive and negative for both aviation security
and individual rights. Although automatic techniques can be positive for aviation security
since they are effective and reduce time and costs, they may be subject to various failures,
including false negatives or false positives. On the one hand, through technology, privacy
rules can be programmed to be automated, limiting collection and processing of personal data,
etc. On the other hand, digitalisation and automation may lead to leaks of huge amounts of
personal data, function creep, discrimination, and so on.
Future?
Modern trends in aviation security, such as intelligence-led, pro-active and risk-based
approach, global information sharing, and combination of aviation security measures imply
that the intrusive features will apparently be further developed and used. Further new and
more advanced methods may appear with additional human rights concerns. This means that
the emerging mass of security-related data and the corresponding impact on individual
privacy and other human rights are only in the beginning stage of development.
Paramount in importance – after successfully implementing these technologies in aviation – is
that they may then be spread to other areas of transport, to other crowded places, to other new
areas of the public realm. This means that if proper limits on surveillance are not set in the
earlier stages, privacy and other human rights may ultimately be affected to an unforeseeable
extent. This study contributes to the security-privacy debate not only in respect of civil
aviation, but security in a broader sense.

Weitere ähnliche Inhalte

Was ist angesagt?

Engin cloud com2010-v2
Engin cloud com2010-v2Engin cloud com2010-v2
Engin cloud com2010-v2
JobT
 
Environmental Protection Through E-Regulation: Critical and Empirical Perspec...
Environmental Protection Through E-Regulation: Critical and Empirical Perspec...Environmental Protection Through E-Regulation: Critical and Empirical Perspec...
Environmental Protection Through E-Regulation: Critical and Empirical Perspec...
Rónán Kennedy
 

Was ist angesagt? (10)

Engin cloud com2010-v2
Engin cloud com2010-v2Engin cloud com2010-v2
Engin cloud com2010-v2
 
Hannes astok digital_security_2012
Hannes astok digital_security_2012Hannes astok digital_security_2012
Hannes astok digital_security_2012
 
Environmental Protection Through E-Regulation: Critical and Empirical Perspec...
Environmental Protection Through E-Regulation: Critical and Empirical Perspec...Environmental Protection Through E-Regulation: Critical and Empirical Perspec...
Environmental Protection Through E-Regulation: Critical and Empirical Perspec...
 
ABSTRACT
ABSTRACTABSTRACT
ABSTRACT
 
Privacy protecting fitness trackers
Privacy protecting fitness trackersPrivacy protecting fitness trackers
Privacy protecting fitness trackers
 
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
 
Securing Research Data: A Workshop on Emerging Practices in Computation and S...
Securing Research Data: A Workshop on Emerging Practices in Computation and S...Securing Research Data: A Workshop on Emerging Practices in Computation and S...
Securing Research Data: A Workshop on Emerging Practices in Computation and S...
 
Panel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePanel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in Practice
 
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
 

Andere mochten auch

Beyond english direct research
Beyond english direct researchBeyond english direct research
Beyond english direct research
purithem
 
Use of english exam techniques
Use of english exam techniquesUse of english exam techniques
Use of english exam techniques
Alezandr Benit
 
Front page format summer project
Front page format   summer projectFront page format   summer project
Front page format summer project
Nithin Varghese
 
Title Page For Assignment, A sample
Title Page For Assignment, A sampleTitle Page For Assignment, A sample
Title Page For Assignment, A sample
s junaid
 

Andere mochten auch (7)

English- description and drawing
English- description and drawingEnglish- description and drawing
English- description and drawing
 
Beyond english direct research
Beyond english direct researchBeyond english direct research
Beyond english direct research
 
Learning English beyond the classroom by Jack C. Richards 2014
Learning English beyond the classroom by Jack C. Richards 2014Learning English beyond the classroom by Jack C. Richards 2014
Learning English beyond the classroom by Jack C. Richards 2014
 
Use of english exam techniques
Use of english exam techniquesUse of english exam techniques
Use of english exam techniques
 
Front page format summer project
Front page format   summer projectFront page format   summer project
Front page format summer project
 
Title Page For Assignment, A sample
Title Page For Assignment, A sampleTitle Page For Assignment, A sample
Title Page For Assignment, A sample
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 

Ähnlich wie PhD project description English

Outline D
Outline DOutline D
Outline D
butest
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docx
duketjoy27252
 
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
festockton
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
ijcsit
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
AIRCC Publishing Corporation
 
1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s Nam1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s Nam
MerrileeDelvalle969
 
Computers in Pharmaceutical Formulations - Final.pptx
Computers in Pharmaceutical Formulations - Final.pptxComputers in Pharmaceutical Formulations - Final.pptx
Computers in Pharmaceutical Formulations - Final.pptx
MittalGandhi
 
Electronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare OrganizationsElectronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare Organizations
ijtsrd
 
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExAvoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
EADTU
 
Running Head RESEARCH METHODOLOGY .docx
 Running Head RESEARCH METHODOLOGY                               .docx Running Head RESEARCH METHODOLOGY                               .docx
Running Head RESEARCH METHODOLOGY .docx
gertrudebellgrove
 
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTCOMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
ijcisjournal
 
httppro.sagepub.comErgonomics Society Annual Meeting.docx
httppro.sagepub.comErgonomics Society Annual Meeting.docxhttppro.sagepub.comErgonomics Society Annual Meeting.docx
httppro.sagepub.comErgonomics Society Annual Meeting.docx
adkinspaige22
 

Ähnlich wie PhD project description English (20)

Outline D
Outline DOutline D
Outline D
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docx
 
15 hauer making safety management knwledge based
15 hauer making safety management knwledge based15 hauer making safety management knwledge based
15 hauer making safety management knwledge based
 
An ethical approach to data privacy protection
An ethical approach to data privacy protectionAn ethical approach to data privacy protection
An ethical approach to data privacy protection
 
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
 
ISSC451 Cybercrime.docx
ISSC451 Cybercrime.docxISSC451 Cybercrime.docx
ISSC451 Cybercrime.docx
 
Industry program panel - SINCONF ACM
Industry program panel - SINCONF ACMIndustry program panel - SINCONF ACM
Industry program panel - SINCONF ACM
 
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
 
Information Systems Management
Information Systems ManagementInformation Systems Management
Information Systems Management
 
1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s Nam1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s Nam
 
Computers in Pharmaceutical Formulations - Final.pptx
Computers in Pharmaceutical Formulations - Final.pptxComputers in Pharmaceutical Formulations - Final.pptx
Computers in Pharmaceutical Formulations - Final.pptx
 
Electronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare OrganizationsElectronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare Organizations
 
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExAvoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
 
Comments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data PrivacyComments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data Privacy
 
Running Head RESEARCH METHODOLOGY .docx
 Running Head RESEARCH METHODOLOGY                               .docx Running Head RESEARCH METHODOLOGY                               .docx
Running Head RESEARCH METHODOLOGY .docx
 
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTCOMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
 
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTCOMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
 
httppro.sagepub.comErgonomics Society Annual Meeting.docx
httppro.sagepub.comErgonomics Society Annual Meeting.docxhttppro.sagepub.comErgonomics Society Annual Meeting.docx
httppro.sagepub.comErgonomics Society Annual Meeting.docx
 

PhD project description English

  • 1. Aviation security and protection of individuals: Technologies and legal principles New aviation security measures appear every day and are usually introduced under the rubric of combating terrorism. These technologies include body scanners, camera surveillance, biometrics, profiling, behaviour analysis, and transfer of air passenger personal data from airlines to state authorities, among others. Air-travel security measures cannot be considered mere technical measures related to aviation security. These measures also have a serious impact on issues of fundamental human rights. The research focus of this dissertation is on the right to privacy and data protection in the aviation security context. The main objective of the work is to discuss what can be considered proportionate security, taking into account concerns of privacy and related human rights including the right to health, freedom of movement, equal treatment and non-discrimination, freedom of thought, conscience and religion, and rights of the child. Aviation security plus privacy The main thesis of the study is that the ideal model to illustrate the relationship between aviation security and privacy is aviation security plus privacy rather than aviation security versus privacy. Both values are important for society; what is needed is to find a way to ensure both values, without losing one or the other. The research is based on international and EU law and uses national regimes of the USA, UK, Norway and Russia as illustrations. The research argues that the selected aviation security technologies constitute breaches to a number of human rights. Nevertheless, they are arguably more or less proportionate if violations are compared with the level of threats and security benefits. However, this does not mean that situation should be status quo. The question of whether threats and benefits of security measures are proportionate to privacy and other human rights risks is subject to continuous evaluation. Regulation and technologies The issues of interaction between legal regulation and the technologies are central in the aviation security debate. In theory, if properly developed and applied, they are able to protect both security and other rights of the individual. However, this is easier said than done. The study reveals that current processes and tendencies, such as technological developments, globalization, harmonization of regulation, modernization of existing data privacy regulation, developing technology-specific regulation and mechanisms of self-regulation, growing use of Privacy by Design, improving passenger experience, etc. can contribute both to solving the existing issues and to creating additional problematic issues for the aviation security-privacy dilemma. The technological developments can be both positive and negative for both aviation security and individual rights. Although automatic techniques can be positive for aviation security since they are effective and reduce time and costs, they may be subject to various failures,
  • 2. including false negatives or false positives. On the one hand, through technology, privacy rules can be programmed to be automated, limiting collection and processing of personal data, etc. On the other hand, digitalisation and automation may lead to leaks of huge amounts of personal data, function creep, discrimination, and so on. Future? Modern trends in aviation security, such as intelligence-led, pro-active and risk-based approach, global information sharing, and combination of aviation security measures imply that the intrusive features will apparently be further developed and used. Further new and more advanced methods may appear with additional human rights concerns. This means that the emerging mass of security-related data and the corresponding impact on individual privacy and other human rights are only in the beginning stage of development. Paramount in importance – after successfully implementing these technologies in aviation – is that they may then be spread to other areas of transport, to other crowded places, to other new areas of the public realm. This means that if proper limits on surveillance are not set in the earlier stages, privacy and other human rights may ultimately be affected to an unforeseeable extent. This study contributes to the security-privacy debate not only in respect of civil aviation, but security in a broader sense.