News and Research articles on Security

Automating security? The redesign of air passenger data connectivity across Europe

Rocco Bellanova, Vrije Universiteit Brussel
Matthias Leese, ETH Zurich
Rosamunde van Brakel, Vrije Universiteit Brussel
Vanessa Ugolini, Vrije Universiteit Brussel

PUBLISHED ON: 26 Feb 2025

This op-ed calls for more scholarly attention on the nexus between automation and European security. Building on recent regulatory developments in algorithmic traveller security, the authors argue that the automation of seemingly mundane practices requires a closer consideration of data connectivity and its societal and regulatory implications.

Navigating the EU data governance labyrinth: A business perspective on data sharing in the financial sector

Eugénie Coche, University of Amsterdam
Ans Kolk, University of Amsterdam
Martijn Dekker, University of Amsterdam
PUBLISHED ON: 12 Feb 2024 DOI: 10.14763/2024.1.1738

This paper offers a business perspective on the EU data governance framework by exposing different elements playing a role in its implementation at the firm level.

The grey-zones of public-private surveillance: Policy tendencies of facial recognition for public security in Brazilian cities

André Ramiro, Alexander von Humboldt Institute for Internet and Society
Luã Cruz, State University of Campinas (Unicamp)
PUBLISHED ON: 31 Mar 2023 DOI: 10.14763/2023.1.1705

The article explores the regulatory “grey zones” in the deployment of facial recognition (FRT) in policing in Brazil, and the policy and civic responses to them.

The passage of Australia’s data retention regime: national security, human rights, and media scrutiny

Nicolas P. Suzor, Queensland University of Technology
Kylie Pappalardo, Queensland University of Technology
Natalie McIntosh, Queensland University of Technology
PUBLISHED ON: 14 Mar 2017 DOI: 10.14763/2017.1.454

This paper is part of Australian internet policy, a special issue of Internet Policy Review guest-edited by Angela Daly and Julian Thomas. Part I: The Data Retention Act In April 2015, the Australian government passed the Telecommunications (Interception and Access) Amendment (Data Retention) Act, which requires Internet Service Providers (ISPs) and telecommunications providers to store information about their subscribers’ online activity for a period of two years. The data retention rules apply to metadata – loosely defined as information that is not the 'content' of a communication. Generally, service providers must keep identifying information about their subscribers, including billing …

Necessary and inherent limits to internet surveillance

Joss Wright, Oxford Internet Institute
PUBLISHED ON: 5 Aug 2013 DOI: 10.14763/2013.3.184

There are significant dangers in surveilling online communications unless the mechanisms and policies of surveillance are subject to strict and legally enforceable standards of transparency, oversight, and control.