scholarly journals Ecological aspects of visual tracking technology and personal data protection

2020 ◽  
Vol 10 (5) ◽  
pp. 142-144
Author(s):  
E.A. Remmikh ◽  
A.A. Vasiliev ◽  
A.A. Vasiliev

The article deals with the most important problems of protection of human rights in the field of personal data connected with information collection through the visual tracking. The possible risks of using CCTV (closed-circuit television) cameras and the consequences of their improper use are considered. In addition, the authors assessed the relationship between the public security interests and the need to protect the privacy of the individual citizen. This study is related to the widespread digitalization of society and the expansion of application scope regards the face recognition technology.

Author(s):  
Irina Ichim

This chapter explores developments in the protection of human-rights in Kenya post-2002 by examining three interconnected issues: changes in the social and political landscape and how these created or constrained opportunities for activism; changes in the relationship between the state and the human-rights sector, but also within the human-rights sector; and evolving patterns of (non-)state repression of activism. The chapter shows that, against the background of a complex historical experience, and with the help of Kenya’s 2010 Constitution and a reformed judiciary, the human-rights sector in Kenya has grown into a staunch and able defender of civic space in the face of recent government assaults. However, government propaganda and the sector’s institutionalization simultaneously coalesce to disconnect the sector from the public. Coupled with divisions between professional and grassroots defenders, this disconnect risks limiting the sector’s ability to build on the momentum presented by recent achievements.


2021 ◽  
Vol 27 (1) ◽  
pp. 205-219
Author(s):  
Iwona Wiącek

The aim of the following article is to discuss the issues of the power of the prosecutor to reveal information pertaining to ongoing preparatory proceedings in the light of the new regulations determined by Article 12 of the Act of January 28, 2016, the Law on the Prosecutor’s Office. The aforementioned regulation constitutes an important exception to the general rule of confidentiality of preparatory proceedings, which heavily informs the scope of the analysis. Moreover, the author discusses the relationship between Article 12 of the Law on the Prosecutor’s Office and earlier regulations regarding the revealing of information regarding preparatory proceedings included in the following acts: press law, law on access to public information, personal data protection act, supplemented with relevant regulations of the Criminal Code and Code of Criminal Procedure. In addition, the author discusses the consequences of the analyzed regulation for the interest of the criminal justice system, the interest of the public, as well as the interest of the parties in the proceedings, which has allowed her to assess the justification for that regulation and the necessity of implementing it in Polish legal system.


Author(s):  
Karolina Dłuska

The author of the article tries to indicate the relationship between the perceived presence of the Catholic Church in public life and the election preferences of Poles. The subject of the research here is the parliamentary elections in Poland in 2011 in the context of the perception by the electorate of the individual parties of the public presence of the Catholic Church in the selected aspects. Among them, the author points to: the issue of crosses and other religious symbols in public space, including the issue of a cross in the Sejm meeting room. She also recalls such matters as: religion lessons in schools, the religious nature of the military oath, priests appearing on public television, the Church taking a stand on laws passed by the Sejm and priests telling people how to vote in elections. The presented analysis is based on the results of the Polish General Election Study 2011.


Author(s):  
Daniel J. Hemel

This chapter suggests a human rights–based justification for national basic income schemes, contrasting it with justifications based on welfarist principles or notions of entitlement to a share of the global commons. Starting from the premise that a state is a collective enterprise that generates a surplus, it contends that any human being who is an “obedient” member of that state has a right to some share of the surplus. That right—which arises from the relationship between the individual and the state, and is independent of need—could justify the entitlement to a basic income. Such income should be provided in cash, not in kind, because the latter risks depriving the individual of the enjoyment of his share of the surplus—in effect, forcing him to forfeit or transfer it to others if he does not use the public goods or services provided by the state.


2015 ◽  
pp. 1638-1652
Author(s):  
Panagiotis Kitsos ◽  
Aikaterini Yannoukakou

The events of 9/11 along with the bombarding in Madrid and London forced governments to resort to new structures of privacy safeguarding and electronic surveillance under the common denominator of terrorism and transnational crime fighting. Legislation as US PATRIOT Act and EU Data Retention Directive altered fundamentally the collection, processing and sharing methods of personal data, while it granted increased powers to police and law enforcement authorities concerning their jurisdiction in obtaining and processing personal information to an excessive degree. As an aftermath of the resulted opacity and the public outcry, a shift is recorded during the last years towards a more open governance by the implementation of open data and cloud computing practices in order to enhance transparency and accountability from the side of governments, restore the trust between the State and the citizens, and amplify the citizens' participation to the decision-making procedures. However, privacy and personal data protection are major issues in all occasions and, thus, must be safeguarded without sacrificing national security and public interest on one hand, but without crossing the thin line between protection and infringement on the other. Where this delicate balance stands, is the focal point of this paper trying to demonstrate that it is better to be cautious with open practices than hostage of clandestine practices.


2019 ◽  
Vol 49 (2) ◽  
pp. 206-219
Author(s):  
Jonghyun Kim

This article analyzes the formative power of the Korean dawn prayer service to better understand the public and private dimensions of Christian spirituality. It explores the origin of the dawn prayer in the history of Korean Protestantism, and examines an example from a particular church. On the basis of this exploration, it is argued that the dawn prayer service should not be understood as an instrument to strengthen individual spirituality, but rather as a place to participate in God’s redemptive work to and for the world. Both the individual and communal aspects of dawn prayer practice are important, but I will argue that current Korean practice leans too much toward the individual.


1979 ◽  
Vol 38 (3) ◽  
pp. 477-497 ◽  
Author(s):  
Steven E. G. Kemper

AbstractAstrology is a neglected cultural form in the study of South Asian society. It is also one which pays attention to the individual in ways that seem to fly in the face of scholarly understandings of Asian societies as places where individuality has little importance. The ideology of caste, the institution most often taken as an analytical entry to South Asian societies, gathers people into groups on the basis of their gross similarities and fixes a person's condition for life. Astrology treats individuals as distinguished by subtle differences and liable to momentary changes. The paper argues that caste ideology and astrology have a common vocabulary and logic, one which is genealogical and combinatory, and suggests in turn several conclusions about the relationship of individuals and society in South Asian cultures.


2021 ◽  
Vol 14 ◽  
Author(s):  
Dongya Wu ◽  
Xin Li ◽  
Jun Feng

Brain connectivity plays an important role in determining the brain region’s function. Previous researchers proposed that the brain region’s function is characterized by that region’s input and output connectivity profiles. Following this proposal, numerous studies have investigated the relationship between connectivity and function. However, this proposal only utilizes direct connectivity profiles and thus is deficient in explaining individual differences in the brain region’s function. To overcome this problem, we proposed that a brain region’s function is characterized by that region’s multi-hops connectivity profile. To test this proposal, we used multi-hops functional connectivity to predict the individual face activation of the right fusiform face area (rFFA) via a multi-layer graph neural network and showed that the prediction performance is essentially improved. Results also indicated that the two-layer graph neural network is the best in characterizing rFFA’s face activation and revealed a hierarchical network for the face processing of rFFA.


2021 ◽  
Vol 28 (2) ◽  
pp. 205-211
Author(s):  
Stanisław Trociuk

The changes in the broadly conceived criminal procedure which were introduced in recent years refer to the problems which are crucial from the perspective of the protection of human rights, such as the scope of the authority of the services due to operational control which is conducted secretly, the model of the functioning of the public prosecution service or the unlawful acquiring of evidence in a criminal procedure. The evaluation of these changes, conducted by the Ombudsman from the point of view of the constitutional standards of the protection of the rights of the individual is not positive. The new regulations reduce the quality of these standards and they do not contain sufficient guarantees of protection against the arbitrariness of the activities engaged in these terms by the organs of public authority. This phenomenon imposes a particular duty on the courts – which hear criminal cases – to see that the final decision in a criminal case respects the universal standards of the protection of human rights.


Author(s):  
L.V. Zinych

The article deals with features of information security in the Republic of Estonia. It is noted that the main factors that have helped to increase the level of information security in Estonia are the developed information infrastructure, effective cybersecurity policy and reliable protection of personal data. Cybersecurity depends on a combination of cybercrime, provision of critical infrastructure and e-services, and national defense. In the area of personal data protection, it is reasonable to create a private data market where companies and researchers propose to submit a date of use and license / lease / sale related to offers or license, lease, sell or withdraw their data from use. Analyzing the experience of the Republic of Estonia in information security, there are several factors that have become the basis for the creation of a secure information environment. First, only a comprehensive information policy enables the security of enterprises, institutions, organizations and the state as a whole. Secondly, Estonia has made every effort to ensure cybersecurity (as a component of information security) and has created favorable conditions for the arrival of foreign IT companies with significant capital and innovation. Third, in the context of information security, considerable attention in Estonia is given to the protection and use of personal data, which is carried out as transparently as possible, using digital signatures and encrypted messages. Practical recommendations for Ukraine’s acquisition of Estonia’s information security experience are provided. We believe that raising the level of information security will help a number of the following activities: 1) Create a working group with the involvement of international experts to develop the concept of information security and regulatory support for its activities 2) Ensure the creation of a single national electronic information resource in the concept of information security. 3) Enter a unique national ID for the individual. 4) Create a single secure web portal for electronic services with the possibility of creating electronic offices of individuals for receiving administrative services. Keywords: information security, cybersecurity, information infrastructure, personal data.


Sign in / Sign up

Export Citation Format

Share Document