The flexible deployment of drones in the public domain, is in this article assessed from a legal philosophical perspective. On the basis of theories of Dworkin and Moore the distinction between individual rights and collective security policy goals is discussed. Mobile cameras in the public domain reflect how innovative technological tools challenge public authorities in new ways to balance between privacy and security. Furthermore, the different dimensions of privacy and the distinction between the three types of the value of privacy are reviewed. On the basis of the case study of the Dutch Drones Act, the article concludes that the flexible deployment of mobile cameras in the public domain is not legitimate from a normative perspective. The legal safeguards in the Netherlands are insufficient to protect the value of privacy. Therefore, further restrictions such as prior judicial review should be considered.
LINK
This study addresses the burgeoning global shortage of healthcare workers and the consequential overburdening of medical professionals, a challenge that is anticipated to intensify by 2030 [1]. It explores the adoption and perceptions of AI-powered mobile medical applications (MMAs) by physicians in the Netherlands, investigating whether doctors discuss or recommend these applications to patients and the frequency of their use in clinical practice. The research reveals a cautious but growing acceptance of MMAs among healthcare providers. Medical mobile applications, with a substantial part of IA-driven applications, are being recognized for their potential to alleviate workload. The findings suggest an emergent trust in AI-driven health technologies, underscored by recommendations from peers, yet tempered by concerns over data security and patient mental health, indicating a need for ongoing assessment and validation of these applications
DOCUMENT
This paper argues online privacy controls are based on a transactional model of privacy, leading to a collective myth of consensual data practices. It proposes an alternative based on the notion of privacy coordination as an alternative vision and realizing this vision as a grand challenge in Ethical UX
DOCUMENT
The maximum capacity of the road infrastructure is being reached due to the number of vehicles that are being introduced on Dutch roads each day. One of the plausible solutions to tackle congestion could be efficient and effective use of road infrastructure using modern technologies such as cooperative mobility. Cooperative mobility relies majorly on big data that is generated potentially by millions of vehicles that are travelling on the road. But how can this data be generated? Modern vehicles already contain a host of sensors that are required for its operation. This data is typically circulated within an automobile via the CAN bus and can in-principle be shared with the outside world considering the privacy aspects of data sharing. The main problem is, however, the difficulty in interpreting this data. This is mainly because the configuration of this data varies between manufacturers and vehicle models and have not been standardized by the manufacturers. Signals from the CAN bus could be manually reverse engineered, but this process is extremely labour-intensive and time-consuming. In this project we investigate if an intelligent tool or specific test procedures could be developed to extract CAN messages and their composition efficiently irrespective of vehicle brand and type. This would lay the foundations that are required to generate big data-sets from in-vehicle data efficiently.
De overheid neemt steeds meer maatregelen in het kader van de veiligheid die tot gevolg hebben dat de privacy van burgers wordt ingeperkt. In hoeverre is de staat gelegitimeerd om dergelijke privacyinperkende maatregelen te nemen?Doel Het doel is om tot een afwegingsmodel te komen waarbij enerzijds wordt gekeken naar de waarde van privacy ten aanzien van de inperking en anderzijds wordt gekeken naar de verschillende factoren van veiligheid (Powell). Het model van Powell ten aanzien van de verschillende factoren van veiligheid is aangepast aan de context van het onderzoek. Daarnaast wordt de theorie van Dworkin ‘Rights as trumps’ gebruikt om tot een juiste afweging te komen. Resultaten Lees het artikel: The Value of Privacy and Surveillance Drones in the Public Domain: Scrutinizing the Dutch Flexible Deployment of Mobile Cameras Act in het Journal of Politics and Law Archives Vol. 10, No. 5 (2017) door Gerdo Kuiper en Quirine Eijkman. Looptijd 01 september 2012 - 01 augustus 2020 Aanpak De verschillende dimensies en waarde van privacy worden bekeken vanuit de geschiedenis van privacy in een Nederlandse en Amerikaanse context. Aan de hand van een historische- en een analytische beschouwing van het concept veiligheid wordt het model van Powell ten aanzien van de factoren veiligheid aangepast aan de context van dit onderzoek.
This project addresses the fundamental societal problem that encryption as a technique is available since decades, but has never been widely adopted, mostly because it is too difficult or cumbersome to use for the public at large. PGP illustrates this point well: it is difficult to set-up and use, mainly because of challenges in cryptographic key management. At the same time, the need for encryption has only been growing over the years, and has become an urgent problem with stringent requirements – for instance for electronic communication between doctors and patients – in the General Data Protection Regulation (GDPR) and with systematic mass surveillance activities of internationally operating intelligence agencies. The interdisciplinary project "Encryption for all" addresses this fundamental problem via a combination of cryptographic design and user experience design. On the cryptographic side it develops identity-based and attribute-based encryption on top of the attribute-based infrastructure provided by the existing IRMA-identity platform. Identity-based encryption (IBE) is a scientifically well-established technique, which addresses the key management problem in an elegant manner, but IBE has found limited application so far. In this project it will be developed to a practically usable level, exploiting the existing IRMA platform for identification and retrieval of private keys. Attribute-based encryption (ABE) has not reached the same level of maturity yet as IBE, and will be a topic of further research in this project, since it opens up attractive new applications: like a teacher encrypting for her students only, or a company encrypting for all employees with a certain role in the company. On the user experience design side, efforts will be focused on making these encryption techniques really usable (i.e., easy to use, effective, efficient, error resistant) for everyone (e.g., also for people with disabilities or limited digital skills). To do so, an iterative, human-centred and inclusive design approach will be adopted. On a fundamental level, scientific questions will be addressed, such as how to promote the use of security and privacy-enhancing technologies through design, and whether and how usability and accessibility affect the acceptance and use of encryption tools. Here, theories of nudging and boosting and the unified theory of technology acceptance and use (known as UTAUT) will serve as a theoretical basis. On a more applied level, standards like ISO 9241-11 on usability and ISO 9241-220 on the human-centred design process will serve as a guideline. Amongst others, interface designs will be developed and focus groups, participatory design sessions, expert reviews and usability evaluations with potential users of various ages and backgrounds will be conducted, in a user experience and observation laboratory available at HAN University of Applied Sciences. In addition to meeting usability goals, ensuring that the developed encryption techniques also meet national and international accessibility standards will be a particular point of focus. With respect to usability and accessibility, the project will build on the (limited) usability design experiences with the mobile IRMA application.