2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO) 2022
DOI: 10.23919/mipro55190.2022.9803606
|View full text |Cite
|
Sign up to set email alerts
|

Trustworthy Artificial Intelligence and its use by Law Enforcement Authorities: where do we stand?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…The Internet of Things (IoT) is one of the embodiments of technological developments in Era Society 5.0 with other parameters, namely Artificial Intelligence, Deep Learning, Machine Learning, and Big Data [11][12][13][14][15]. IoT has penetrated various groups, including the settlement of legal cases in Indonesia.…”
Section: Internet Of Things (Iot) For Law Enforcement Processes and C...mentioning
confidence: 99%
“…The Internet of Things (IoT) is one of the embodiments of technological developments in Era Society 5.0 with other parameters, namely Artificial Intelligence, Deep Learning, Machine Learning, and Big Data [11][12][13][14][15]. IoT has penetrated various groups, including the settlement of legal cases in Indonesia.…”
Section: Internet Of Things (Iot) For Law Enforcement Processes and C...mentioning
confidence: 99%
“…To reconstruct a crime, law enforcement authorities (LEAs) must provide enough evidence, make specific observations and interpretations of the digital data, and demonstrate the suspect's unauthorized use of the computer. Continuous monitoring is strongly advised as a component of information security measures in insider risk management when complete network activity protection is required to safeguard sensitive and personal data [25], [26], [27].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Criminal identification is also being aided by biometrics. It is being investigated in a variety of ways as a resource for public safety [26]. Biometric payment method is one of the uses of biometrics in finance.…”
Section: Literature Reviewmentioning
confidence: 99%
“…ESLJP je odredio osam kriterija kao osnovu na temelju koje se procjenjuje zakonitost, osnovanost i svrhovitost provođenja mjera masovnog presretanja telekomunikacija: a) razlozi pod kojima se može dopustiti masovno presretanje; b) okolnosti u kojima se komunikacija pojedinca može presresti; c) postupak koji treba prethoditi davanju odobrenja za presretanje; d) postupci koje treba slijediti za odabir, provjeru i korištenje presretnute komunikacije; e) mjere opreza koje je potrebno poduzeti prilikom dostavljanja presretnute komunikacije trećim osobama; f) ograničenje trajanja presretanja, pohranjivanje presretnutog materijala i okolnosti u kojima se takav materijal mora izbrisati i uništiti; 25 g) postupci i modaliteti za nadzor od strane neovisnog tijela nad poštivanjem gore navedenih zaštitnih mjera i njegove ovlasti u slučaju utvrđenih pogrešaka u postupanju; h) neovisna ex post facto kontrola postupanja i ovlasti povjerenih nadzornom tijelu u rješavanju slučajeva nepoštivanja zaštitnih mjera ( § 361.). 26 Valja istaknuti kako će za sve nacionalne predmete koje uključuju dekripciju Sky ECC-jevih uređaja biti od velike važnosti ishod predmeta pred ESLJPom A. L. v. Francuske i E. J. v. Francuske. 27 Ti se predmeti posebno odnose 24 Schaar, P., ECHR: Mass surveillance by British secret service violated European Convention on Human Rights, u: T. Kahler (ur.…”
Section: Masovni Nadzor Komunikacija I Europski Pravni Standardiunclassified
“…1395-1402. 26 Usp. na infiltraciju francuskih vlasti u šifriranu komunikacijsku mrežu EncroChat i snimanje, kopiranje i analizu podataka pohranjenih i razmijenjenih s uređajima povezanima na tu mrežu.…”
Section: Masovni Nadzor Komunikacija I Europski Pravni Standardiunclassified