Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Information Policy, Data Mining, and National Security: Fals

No description
by

rebecca mcauley

on 25 October 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Information Policy, Data Mining, and National Security: Fals

Conclusion
Maxwell clearly does not agree with use of data mining in its current state.
Flawed Process
Leaks in the system
The negatives
Privacy Concerns
Systematic Errors
Stereotypes
Terrorist adaptations
Are there positives?
Identify possible terrorist attacks
Identify individuals within terrorist groups
Other uses of data mining
Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives
Overview
Data mining is the gathering and analyzing of data and summarizing it into valuable information. In the case of this article data mining is being used to combat terrorism.
In his article, Terrance Maxwell discusses the implications of data mining and data warehousing on society. Maxwell argues that data mining could be useful if it did not have negative side effects on citizen liberties and privacy.
Data mining has increased since the terrorist attacks of 9/11. There have been many Privacy Acts passed to ensure that while information can be gathered on individuals, privacy is maintained.
The Privacy Act of 1974 also allows individuals to find out what information is being gathered about them.
Where are we now?
Data mining is still considered controversial.
Recently Edward Snowden, a NSA contractor, released confidential and secret information about government surveillance programs.
Many wonder if the government has gone to far after they found out about the secret surveillance program.

In this video clip, Army General Keith Alexander acknowledges changes must be made to the process of surveillance and data mining.
http://www.cnn.com/2013/06/12/politics/nsa-terror-hearing
Full transcript