Analysing the role of privacy impact assessments in technological development for crisis management

Easton, Catherine Rachel (2017) Analysing the role of privacy impact assessments in technological development for crisis management. Journal of Contingencies and Crisis Management, 25 (1). pp. 7-14. ISSN 0966-0879

[img]
Preview
PDF (Analysing_the_role_of_Privacy_Impact_AssessmentsRevisions)
Analysing_the_role_of_Privacy_Impact_AssessmentsRevisions.pdf - Accepted Version
Available under License Creative Commons Attribution-NonCommercial.

Download (241kB)

Abstract

The ability to harness technology in crisis management has enabled an increase in wide-scale interagency collaboration. This development has occurred alongside a move to accumulate and analyse crowdsourced responses. Given the scale and the nature of the information accessed and collected, there is a pressing need to ensure that technology is developed in a way that protects the interests of end-users and stakeholders. Privacy impact assessments (PIAs) are increasingly used, in certain jurisdictions legally mandated, in projects to foresee risks to privacy and to plan strategies to avoid these. Once implemented, the EU's General Data Protection Regulation will, in certain circumstances, require the need for a PIA. This study focuses upon the PIA process in an EU-funded project with the aim of developing cloud-based disaster response technology. It introduces the project and then gives a background to the PIA process. Insights and observations are then made relating to how the PIA operates, with the aim of drawing conclusions that can both improve the current project and be transferable to other crisis management-focused projects.

Item Type:
Journal Article
Journal or Publication Title:
Journal of Contingencies and Crisis Management
Additional Information:
This is the peer reviewed version of the following article: Easton, C. (2017), Analysing the Role of Privacy Impact Assessments in Technological Development for Crisis Management. J Contingencies Crisis Man, 25: 7–14. doi:10.1111/1468-5973.12140 , which has been published in final form at http://onlinelibrary.wiley.com/doi/10.1111/1468-5973.12140/abstract. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving.
Uncontrolled Keywords:
/dk/atira/pure/subjectarea/asjc/2300/2308
Subjects:
ID Code:
82818
Deposited By:
Deposited On:
06 Dec 2016 09:40
Refereed?:
Yes
Published?:
Published
Last Modified:
26 Sep 2020 04:19