Math for Security by Daniel Reilly
Author:Daniel Reilly
Language: eng
Format: mobi, epub
ISBN: 9781718502574
Published: 2023-07-20T00:00:00+00:00
Ethics of Tracking Devices and People
In some ways, criminals have it easy. A criminal doesnât have to consider the ethical or moral implications of their actions. Whether theyâre exposing their target to additional risk is usually not high on their list of concerns. White hats, on the other hand, have ethical, and oftentimes legal, barriers to consider when obtaining or using location information. In the past, Iâve received records similar to the data for this project from company-owned devices via remote administration tools after an employeeâs laptop or cell phone went missing. However, even this seemingly benevolent use is an ethical gray area. Here in the US there isnât a clear line on an employeeâs right to privacy.4 Itâs easy to say, âIf a company owns a system they have the right to track and monitor it,â but what about people who carry their work systems with them during off-hours (something I regularly do myself)? Several companies even require their managers to keep work phones on them during their downtimeâeven on vacation. Thereâs nothing technical to block these companies from tracking their employees during their private time, and the laws are murky and vague, so it becomes purely a question of ethics. When dealing with corporate entities, being forced to trust their ethical behavior scares a lot of people!
Understanding how this technology works, and how to apply it ethically to improve security without hurting privacy, falls to us as researchers and analysts. After reading this chapter, take some time to look up the relevant laws for your area and, perhaps even more importantly, think about what you believe are appropriate and inappropriate uses for this technology.5
For our project, I collected the data on myself using an Android tablet. As the data subject, I was aware of the data collection and gave myself, as the author, permission to use the data in the limited scope of writing this material. The key point here is that the data subject (me) was informed and gave consent. Getting informed consent to perform your analysis can prevent a lot of ethical risk before you even begin. If you apply this type of tracking technology outside the scope of informed consent (such as law enforcement or military applications), you must decide for yourself what ethical doctrine applies.
Now that weâve discussed the ethics of device tracking in general, and more specifically concerning the various potential applications of our project, we can get into the meat of the problem. In the next section weâll take a deeper dive into the OpenCellID API, covering the basics of calling the API, the structure of the data returned, and how we can process this information into relevant shape objects.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Deep Learning with Python by François Chollet(15129)
The Mikado Method by Ola Ellnestam Daniel Brolund(12394)
Hello! Python by Anthony Briggs(12271)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(11617)
Dependency Injection in .NET by Mark Seemann(11416)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10530)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(10230)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(9895)
Grails in Action by Glen Smith Peter Ledbrook(9557)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(9144)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(9078)
Hit Refresh by Satya Nadella(9040)
The Kubernetes Operator Framework Book by Michael Dame(8474)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8460)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8299)
Robo-Advisor with Python by Aki Ranin(8253)
Practical Computer Architecture with Python and ARM by Alan Clements(8227)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8196)
Building Low Latency Applications with C++ by Sourav Ghosh(8102)