D3.1 Report describing the design of the research apparatus.pdf
(
1095 KB
)
Pobierz
FP7-‐SEC-‐2011-‐284725
SURVEILLE
Start date of project: 1.2.2012
Duration: 39 months
SURVEILLE Work Package number and lead: WP03, Professor Coen van Gulijk
Author(s): Lena Sophie Eckert, Professor Hans-‐Helmuth Gander, Professor Coen van Gulijk,
Dr. Sebastian Höhn
Surveillance: Ethical Issues, Legal Limitations, and Efficiency
Collaborative Project
SURVEILLE Deliverable 3.1: Report describing the design of the research apparatus for the
European-‐level study of perceptions.
Due date of deliverable: 31.10.2012
Actual submission date: 31.10.2012
SURVEILLE: Project co-‐funded by the European Commission within the Seventh Framework Programme
PU
PP
RE
CO
Public
Dissemination Level
Restricted to other programme participants (including the Commission Services)
Restricted to a group specified by the consortium (including the Commission Services)
Commission
or members of the consortium (including the Commission Services)
Confidential, only f
Services)
X
SURVEILLE – Deliverable 3.1
2
SURVEILLE – Deliverable 3.1
Executive Summary
This report describes the design of the research apparatus for the European-‐level study of
perceptions. The study will be structured as follows: First, there is the classification of
surveillance technologies (cf. Deliverable 2.1) which will underlie and structure further
research on a fundamental level: Based on the bow-‐tie model, the classification
distinguishes four phases (prevention, protection, incident response, prosecution) and is an
instrument that allows demonstrating that and why perception and acceptance of
surveillance technologies will differ in the different phases. Second, we will lay the
methodological foundations and show that we will particularly draw on already existing
empirical studies in commenting and evaluating them. In doing that, we will refer to a
specific normative framework in order to combine perception and ethical issues. Third, we
will draw up a comprehensive record of EU-‐sponsored research projects, which have dealt
with questions around the issue of surveillance perception. Our evaluation will include both
closed projects and current projects SURVEILLE is cooperating with. Fourth, we will produce
a literature survey of surveillance perception focusing on the latest research in the field of
surveillance perception. Fifth, we will give an overview of effects and side-‐effects of
surveillance technologies with a particular focus on ethical and social aspects. Finally, we will
show that there is a difference between the objective and the perceived effectiveness of
surveillance technologies. This phenomenon will be demonstrated on the basis of empirical
studies.
1
SURVEILLE – Deliverable 3.1
Table of Contents
Design of the Research Apparatus of the European-‐Level Study of Perceptions
of Surveillance
1. Classification of Surveillance Technologies
2. Methodological Foundations
3. EU Projects
3.1 Evaluation of Completed EU Projects
3.2 Consultation with Current EU Projects
4. Survey of Perception of Surveillance
5. Effects and Side-‐Effects of Surveillance
5.1 Surveillance Technologies being Perceived as Threats themselves
5.2 Chilling Effect
5.3 Security Dilemma
5.4 Function Creep
5.5 Self-‐Surveillance and Normalization
6. Perceived Effectiveness of Surveillance Technologies
7. Select Bibliography
2
SURVEILLE – Deliverable 3.1
Design of the Research Apparatus for the European-‐Level Study of
Perceptions of Surveillance
1. Classification of Surveillance Technologies
In SURVEILLE we deal with surveillance technologies used in the field of security. Having
worked closely together with technicians we have decided to develop our classification of
technologies on the basis of the “bow-‐tie model”.
1
The bow-‐tie model is a scientifically
validated method that describes a risk system. The original model is a quantitative risk
analysis (QRA) method that couples fault trees (FT) and events sequence diagrams (ESD).
Today, it is also used as a qualitative model to describe what actions can be taken before a
certain risk materializes and what actions can be taken to mitigate the effects of the risk
materializing.
Figure 1: The bow-‐tie model in relation to other sequencing models (SRMBOK, p. 223)
1
Talbot, Julian/ Jakeman, Miles:
Security Risk Management – Body of Knowledge (SRMBOK),
Hoboken 2009, p.
223.
3
Plik z chomika:
Amiga789
Inne pliki z tego folderu:
D2.1 Survey of Surveillance technologies.pdf
(3285 KB)
D2.2.Paper with Input from End Users.pdf
(756 KB)
D3.4 Design of a research methodology for assessing.pdf
(2587 KB)
D2.3 Paper by Local Authorities End Users.pdf
(674 KB)
D2.4 Paper establishing the classification of technologies on the basis of their intrusiveness into fundamental rights.pdf
(1247 KB)
Inne foldery tego chomika:
IRISS
PRESCIENT
SECILE
SurPRISE
Zgłoś jeśli
naruszono regulamin