This paper uncovers the risks inherent in facial recognition within law enforcement, exploring multidimensional aspects affecting data protection vs public security within the regulatory frameworks of the General Data Protection Regulation and the Artificial Intelligence Act.
Research articles on PRIVACY & SECURITY
Hacktivism represents a dynamic intersection of technology and activism, where individuals or groups leverage digital tools to advance social or political causes.
This paper delivers a legal analysis that explores whether the privacy labels of the Apple App Store and Google Play Store meet the requirements of the General Data Protection Regulation (GDPR), along with insights into the adoption of app developers to map the extent of the problem.
This paper explores the economics of software vulnerabilities, evaluates three policy alternatives for vulnerability discovery and disclosure and argues that bug bounty programs, which leverage two-sided digital market platforms to connect organisations and ethical hackers, yield the highest effectiveness, legality and trustworthiness impacts.
Over the past fifty years, surveillance practices once considered untenable due to their incompatibility with democratic rights and values have been rebranded as tolerable, neutral, or even desirable.
The article explores the regulatory “grey zones” in the deployment of facial recognition (FRT) in policing in Brazil, and the policy and civic responses to them.
An analysis of the EU data protection legislation and the AI Act proposal to assess, in light of the principle of proportionality, whether or not law enforcement authorities should be prohibited from using these technologies in "real time".
The concept of surveillance is indispensable for understanding the digital age, even as it requires constant inflection.
A “non-user,” as the name suggests, refers to an individual who does not use a given product or system. Critical work on non-use elaborates a range of applications for the term we consider here. The variations of non-use under discussion encompass both voluntary and involuntary cases of non-use.
PIMS typically employ technical, legal and organisational measures for enabling users to manage and control their data.