SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Security and Legitimacy in a
Web Observatory
Kieron O’Hara, Alistair Sackley, Ian Brown,
Ramine Tinati, Thanassis Tiropanis & Xin Wang
presented at Workshop on Building Web Observatories,
WebSci14, Bloomington, Indiana, 23 June 2014
Complex England & Wales Policing
Context
• 43 regional police forces
• Several specialised national bodies
• E.g. Serious Fraud Office
• Many multi-agency partnerships
• E.g. Integrated Offender Management
• Data only loosely standardised
• Some brought together in national open data
site police.uk
• Police data v performance data
• Extremely sensitive personal data
Policing Requirements
• Highly data (intelligence) driven
• Need to retain legitimacy
• Policing by consent
• Greater scrutiny
• Cost constraints
• Control
• Data protection liability for personal data
• Big IT mindset
• Risk aversion
Data Management Requirements
• Effective
• The right people get the data at the right time
• Safe
• Data subjects (victims, witnesses) not exposed
• Secure
• Investigations not compromised
• Transparent
• Open to democratic scrutiny
Potential for Web Obs Contribution
to Data Management
• Control
• Security
• Privacy
• Discriminating
sharing
Potential for Contribution to
Engagement Strategy
Leigh Park Twitter mention network
(High IMD [index of multiple
deprivation])
Eastleigh Twitter mention network
(Diverse area with pockets of deprivation)
Potential for Contribution to Low-
Level Intelligence Gathering
• NOT surveillance, but understanding
• Only a small Twitter community in Leigh Park
• What are the appropriate sources of online data?
• Engagement means taking part (e.g.
retweeting)
• Placing police data in context of public and
open data
• Opening out some police data/analytics to
community groups, or even making it open
Need to Demonstrate
• Security
• Data protection
• Preservation of data control
• Potential of “safe haven”
• Utility
• Legitimacy
• Low/justified cost
• Compatibility with more traditional data
• Compatibility with workflow

Weitere ähnliche Inhalte

Was ist angesagt?

Tensions between intellectual property and knowledge discovery in the digital...
Tensions between intellectual property and knowledge discovery in the digital...Tensions between intellectual property and knowledge discovery in the digital...
Tensions between intellectual property and knowledge discovery in the digital...LIBER Europe
 
Accessing Online Text-based conversation | Jay Krall | DN2018
Accessing Online Text-based conversation | Jay Krall | DN2018Accessing Online Text-based conversation | Jay Krall | DN2018
Accessing Online Text-based conversation | Jay Krall | DN2018DataconomyGmbH
 
20100417 Hover Bee Ar Dev Camp
20100417 Hover Bee Ar Dev Camp20100417 Hover Bee Ar Dev Camp
20100417 Hover Bee Ar Dev CampHans Overbeek
 
TPL Digital Privacy Initiatives
TPL Digital Privacy InitiativesTPL Digital Privacy Initiatives
TPL Digital Privacy InitiativesPam Ryan
 
Design and Prototyping of a Social Media Observatory
Design and Prototyping of a Social Media ObservatoryDesign and Prototyping of a Social Media Observatory
Design and Prototyping of a Social Media ObservatoryKarissa Rae McKelvey
 
Lizette Lancaster - Institute for Security Studies
Lizette Lancaster - Institute for Security StudiesLizette Lancaster - Institute for Security Studies
Lizette Lancaster - Institute for Security StudiesGeneva Declaration
 
Protecting our privacy: The role of information and library professionals
Protecting our privacy: The role of information and library professionalsProtecting our privacy: The role of information and library professionals
Protecting our privacy: The role of information and library professionalsCILIPScotland
 
Engineering Epistemology
Engineering EpistemologyEngineering Epistemology
Engineering EpistemologyJohn Rauser
 
Profiling information sources and services for discovery
Profiling information sources and services for discoveryProfiling information sources and services for discovery
Profiling information sources and services for discoveryMathieu d'Aquin
 
Data journalism in the second machine age
Data journalism in the second machine ageData journalism in the second machine age
Data journalism in the second machine ageAlexander Howard
 
FSCI Drivers and Barriers to sharing research data
FSCI Drivers and Barriers to sharing research dataFSCI Drivers and Barriers to sharing research data
FSCI Drivers and Barriers to sharing research dataARDC
 
EDF2013: Invited Talk Bríd Dooley: Cross-archival content discovery in the di...
EDF2013: Invited Talk Bríd Dooley: Cross-archival content discovery in the di...EDF2013: Invited Talk Bríd Dooley: Cross-archival content discovery in the di...
EDF2013: Invited Talk Bríd Dooley: Cross-archival content discovery in the di...European Data Forum
 
Jisc R&D work in Research Analytics
Jisc R&D work in Research AnalyticsJisc R&D work in Research Analytics
Jisc R&D work in Research AnalyticsVerena139
 
Open cadastre map innsbruck
Open cadastre map innsbruckOpen cadastre map innsbruck
Open cadastre map innsbruckPeter Laarakker
 
The Great Cryptographic Divide - Enigma 2018
The Great Cryptographic Divide - Enigma 2018The Great Cryptographic Divide - Enigma 2018
The Great Cryptographic Divide - Enigma 2018Jason Truppi
 

Was ist angesagt? (20)

Using social media to address professional issues in LIS
Using social media to address professional issues in LISUsing social media to address professional issues in LIS
Using social media to address professional issues in LIS
 
Research on the Internet @ IDLO
Research on the Internet @ IDLOResearch on the Internet @ IDLO
Research on the Internet @ IDLO
 
Niso library law
Niso library lawNiso library law
Niso library law
 
Tensions between intellectual property and knowledge discovery in the digital...
Tensions between intellectual property and knowledge discovery in the digital...Tensions between intellectual property and knowledge discovery in the digital...
Tensions between intellectual property and knowledge discovery in the digital...
 
Accessing Online Text-based conversation | Jay Krall | DN2018
Accessing Online Text-based conversation | Jay Krall | DN2018Accessing Online Text-based conversation | Jay Krall | DN2018
Accessing Online Text-based conversation | Jay Krall | DN2018
 
20100417 Hover Bee Ar Dev Camp
20100417 Hover Bee Ar Dev Camp20100417 Hover Bee Ar Dev Camp
20100417 Hover Bee Ar Dev Camp
 
TPL Digital Privacy Initiatives
TPL Digital Privacy InitiativesTPL Digital Privacy Initiatives
TPL Digital Privacy Initiatives
 
Design and Prototyping of a Social Media Observatory
Design and Prototyping of a Social Media ObservatoryDesign and Prototyping of a Social Media Observatory
Design and Prototyping of a Social Media Observatory
 
Lizette Lancaster - Institute for Security Studies
Lizette Lancaster - Institute for Security StudiesLizette Lancaster - Institute for Security Studies
Lizette Lancaster - Institute for Security Studies
 
Protecting our privacy: The role of information and library professionals
Protecting our privacy: The role of information and library professionalsProtecting our privacy: The role of information and library professionals
Protecting our privacy: The role of information and library professionals
 
Engineering Epistemology
Engineering EpistemologyEngineering Epistemology
Engineering Epistemology
 
Open data
Open dataOpen data
Open data
 
Todd Carpenter VM#3 Privacy Publisher Systems Introduction
Todd Carpenter VM#3 Privacy Publisher Systems IntroductionTodd Carpenter VM#3 Privacy Publisher Systems Introduction
Todd Carpenter VM#3 Privacy Publisher Systems Introduction
 
Profiling information sources and services for discovery
Profiling information sources and services for discoveryProfiling information sources and services for discovery
Profiling information sources and services for discovery
 
Data journalism in the second machine age
Data journalism in the second machine ageData journalism in the second machine age
Data journalism in the second machine age
 
FSCI Drivers and Barriers to sharing research data
FSCI Drivers and Barriers to sharing research dataFSCI Drivers and Barriers to sharing research data
FSCI Drivers and Barriers to sharing research data
 
EDF2013: Invited Talk Bríd Dooley: Cross-archival content discovery in the di...
EDF2013: Invited Talk Bríd Dooley: Cross-archival content discovery in the di...EDF2013: Invited Talk Bríd Dooley: Cross-archival content discovery in the di...
EDF2013: Invited Talk Bríd Dooley: Cross-archival content discovery in the di...
 
Jisc R&D work in Research Analytics
Jisc R&D work in Research AnalyticsJisc R&D work in Research Analytics
Jisc R&D work in Research Analytics
 
Open cadastre map innsbruck
Open cadastre map innsbruckOpen cadastre map innsbruck
Open cadastre map innsbruck
 
The Great Cryptographic Divide - Enigma 2018
The Great Cryptographic Divide - Enigma 2018The Great Cryptographic Divide - Enigma 2018
The Great Cryptographic Divide - Enigma 2018
 

Andere mochten auch

Mvk 2013-february -health-social-machines
Mvk 2013-february -health-social-machinesMvk 2013-february -health-social-machines
Mvk 2013-february -health-social-machinesSOCIAM Project
 
Towards a classification framework for social machines
Towards a classification  framework for social machinesTowards a classification  framework for social machines
Towards a classification framework for social machinesSOCIAM Project
 
Incentives-driven technology design
Incentives-driven technology designIncentives-driven technology design
Incentives-driven technology designElena Simperl
 
Big Data meets Big Social: Social Machines and the Semantic Web
Big Data meets Big Social: Social Machines and the Semantic WebBig Data meets Big Social: Social Machines and the Semantic Web
Big Data meets Big Social: Social Machines and the Semantic WebDavid De Roure
 
SOCIAM: The Theory and Practice of Social Machines
SOCIAM: The Theory and Practice of Social MachinesSOCIAM: The Theory and Practice of Social Machines
SOCIAM: The Theory and Practice of Social MachinesSOCIAM Project
 
e-Research and the Demise of the Scholarly Article
e-Research and the Demise of the Scholarly Articlee-Research and the Demise of the Scholarly Article
e-Research and the Demise of the Scholarly ArticleDavid De Roure
 
Towards a classification framework for social machines copy
Towards a classification framework for social machines   copyTowards a classification framework for social machines   copy
Towards a classification framework for social machines copySOCIAM Project
 
Social Machines of Science and Scholarship
Social Machines of Science and ScholarshipSocial Machines of Science and Scholarship
Social Machines of Science and ScholarshipDavid De Roure
 

Andere mochten auch (11)

Mvk 2013-february -health-social-machines
Mvk 2013-february -health-social-machinesMvk 2013-february -health-social-machines
Mvk 2013-february -health-social-machines
 
Towards a classification framework for social machines
Towards a classification  framework for social machinesTowards a classification  framework for social machines
Towards a classification framework for social machines
 
Incentives-driven technology design
Incentives-driven technology designIncentives-driven technology design
Incentives-driven technology design
 
Social Machines IIIT
Social Machines IIITSocial Machines IIIT
Social Machines IIIT
 
Big Data meets Big Social: Social Machines and the Semantic Web
Big Data meets Big Social: Social Machines and the Semantic WebBig Data meets Big Social: Social Machines and the Semantic Web
Big Data meets Big Social: Social Machines and the Semantic Web
 
SOCIAM: The Theory and Practice of Social Machines
SOCIAM: The Theory and Practice of Social MachinesSOCIAM: The Theory and Practice of Social Machines
SOCIAM: The Theory and Practice of Social Machines
 
e-Research and the Demise of the Scholarly Article
e-Research and the Demise of the Scholarly Articlee-Research and the Demise of the Scholarly Article
e-Research and the Demise of the Scholarly Article
 
Towards a classification framework for social machines copy
Towards a classification framework for social machines   copyTowards a classification framework for social machines   copy
Towards a classification framework for social machines copy
 
Social Machines of Science and Scholarship
Social Machines of Science and ScholarshipSocial Machines of Science and Scholarship
Social Machines of Science and Scholarship
 
WEBBOX
WEBBOXWEBBOX
WEBBOX
 
Social Machines GSS
Social Machines GSSSocial Machines GSS
Social Machines GSS
 

Ähnlich wie Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, Sharing and Collection in Policing and Justice

Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingRebecca Leitch
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingSecurity Innovation
 
Functional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environmentFunctional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environmentJisc
 
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...Frederick Lane
 
Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?Facundo Mauricio
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?Swaleh Ahmed
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Datarobkitchin
 
COVID-19 and Contact Tracing Apps - What Should Ireland Do? - Webinar
COVID-19 and Contact Tracing Apps - What Should Ireland Do? - WebinarCOVID-19 and Contact Tracing Apps - What Should Ireland Do? - Webinar
COVID-19 and Contact Tracing Apps - What Should Ireland Do? - Webinardri_ireland
 
Online Privacy, the next Battleground
Online Privacy, the next BattlegroundOnline Privacy, the next Battleground
Online Privacy, the next BattlegroundSensePost
 
Use of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issuesUse of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issuesLouise Corti
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Securing your Data, Reporting Recommended Practices
Securing your Data, Reporting Recommended PracticesSecuring your Data, Reporting Recommended Practices
Securing your Data, Reporting Recommended PracticesJohn Martin
 
Reinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security NowadaysReinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security NowadaysGoutama Bachtiar
 
Privacy, Security & Access to Data
Privacy, Security & Access to DataPrivacy, Security & Access to Data
Privacy, Security & Access to DataCybera Inc.
 
Energy Data Privacy Presentation
Energy Data Privacy PresentationEnergy Data Privacy Presentation
Energy Data Privacy PresentationBrian Orion
 
Surveillance and security.pptx
Surveillance and security.pptxSurveillance and security.pptx
Surveillance and security.pptxjohn6938
 

Ähnlich wie Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, Sharing and Collection in Policing and Justice (20)

Do you feel secure online? Beliefs and Attitudes on Security and Privacy
Do you feel secure online? Beliefs and Attitudes on Security and PrivacyDo you feel secure online? Beliefs and Attitudes on Security and Privacy
Do you feel secure online? Beliefs and Attitudes on Security and Privacy
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Functional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environmentFunctional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environment
 
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
 
Data-sharing, individual rights, and the future | Victoria Cetinkaya | Januar...
Data-sharing, individual rights, and the future | Victoria Cetinkaya | Januar...Data-sharing, individual rights, and the future | Victoria Cetinkaya | Januar...
Data-sharing, individual rights, and the future | Victoria Cetinkaya | Januar...
 
Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
 
COVID-19 and Contact Tracing Apps - What Should Ireland Do? - Webinar
COVID-19 and Contact Tracing Apps - What Should Ireland Do? - WebinarCOVID-19 and Contact Tracing Apps - What Should Ireland Do? - Webinar
COVID-19 and Contact Tracing Apps - What Should Ireland Do? - Webinar
 
Online Privacy, the next Battleground
Online Privacy, the next BattlegroundOnline Privacy, the next Battleground
Online Privacy, the next Battleground
 
Use of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issuesUse of data in safe havens: ethics and reproducibility issues
Use of data in safe havens: ethics and reproducibility issues
 
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than EverMarden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Securing your Data, Reporting Recommended Practices
Securing your Data, Reporting Recommended PracticesSecuring your Data, Reporting Recommended Practices
Securing your Data, Reporting Recommended Practices
 
Reinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security NowadaysReinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security Nowadays
 
Privacy, Security & Access to Data
Privacy, Security & Access to DataPrivacy, Security & Access to Data
Privacy, Security & Access to Data
 
Energy Data Privacy Presentation
Energy Data Privacy PresentationEnergy Data Privacy Presentation
Energy Data Privacy Presentation
 
Surveillance and security.pptx
Surveillance and security.pptxSurveillance and security.pptx
Surveillance and security.pptx
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Kürzlich hochgeladen (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, Sharing and Collection in Policing and Justice

  • 1. Security and Legitimacy in a Web Observatory Kieron O’Hara, Alistair Sackley, Ian Brown, Ramine Tinati, Thanassis Tiropanis & Xin Wang presented at Workshop on Building Web Observatories, WebSci14, Bloomington, Indiana, 23 June 2014
  • 2. Complex England & Wales Policing Context • 43 regional police forces • Several specialised national bodies • E.g. Serious Fraud Office • Many multi-agency partnerships • E.g. Integrated Offender Management • Data only loosely standardised • Some brought together in national open data site police.uk • Police data v performance data • Extremely sensitive personal data
  • 3. Policing Requirements • Highly data (intelligence) driven • Need to retain legitimacy • Policing by consent • Greater scrutiny • Cost constraints • Control • Data protection liability for personal data • Big IT mindset • Risk aversion
  • 4. Data Management Requirements • Effective • The right people get the data at the right time • Safe • Data subjects (victims, witnesses) not exposed • Secure • Investigations not compromised • Transparent • Open to democratic scrutiny
  • 5. Potential for Web Obs Contribution to Data Management • Control • Security • Privacy • Discriminating sharing
  • 6. Potential for Contribution to Engagement Strategy Leigh Park Twitter mention network (High IMD [index of multiple deprivation]) Eastleigh Twitter mention network (Diverse area with pockets of deprivation)
  • 7. Potential for Contribution to Low- Level Intelligence Gathering • NOT surveillance, but understanding • Only a small Twitter community in Leigh Park • What are the appropriate sources of online data? • Engagement means taking part (e.g. retweeting) • Placing police data in context of public and open data • Opening out some police data/analytics to community groups, or even making it open
  • 8. Need to Demonstrate • Security • Data protection • Preservation of data control • Potential of “safe haven” • Utility • Legitimacy • Low/justified cost • Compatibility with more traditional data • Compatibility with workflow