TY - CHAP
T1 - Prediction and Postdiction
T2 - Real-time data mining and data analytics
AU - Lehr, Peter
N1 - Publisher Copyright:
© Springer International Publishing AG, part of Springer Nature 2019.
PY - 2019
Y1 - 2019
N2 - In this chapter, I focus on data-mining and data analytics. It is obvious that without integrated databases set up for collecting, collating, managing and disseminating data derived from various identification, monitoring and surveillance systems, all efforts in this direction would be in vain – which is why we need to discuss such computerized databases first. But databases are just the beginning: nowadays, computers can tap into the World Wide Web to proactively search all kinds of social media including listen in on phone calls to detect suspicious behaviour, to profile individual terrorists or suspects. This process is known as data mining and acquisition, and similar to what many private companies such as Google or Facebook routinely do ways as well. I argue that currently, the ‘holy grail’ of data-mining and acquisition is to be able to do so in real time, while ‘it’ happens. With a discussion of this current cutting edge of research and the implications for our civil liberties, I conclude this chapter.
AB - In this chapter, I focus on data-mining and data analytics. It is obvious that without integrated databases set up for collecting, collating, managing and disseminating data derived from various identification, monitoring and surveillance systems, all efforts in this direction would be in vain – which is why we need to discuss such computerized databases first. But databases are just the beginning: nowadays, computers can tap into the World Wide Web to proactively search all kinds of social media including listen in on phone calls to detect suspicious behaviour, to profile individual terrorists or suspects. This process is known as data mining and acquisition, and similar to what many private companies such as Google or Facebook routinely do ways as well. I argue that currently, the ‘holy grail’ of data-mining and acquisition is to be able to do so in real time, while ‘it’ happens. With a discussion of this current cutting edge of research and the implications for our civil liberties, I conclude this chapter.
KW - Big data
KW - Civil liberties
KW - Data-Mining
KW - Databases
KW - Digital footprints
KW - Internet of things
KW - Postdiction
KW - Prediction
KW - Profiling
KW - ‘Inspector computer’
UR - http://www.scopus.com/inward/record.url?scp=85075819578&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-90924-0_6
DO - 10.1007/978-3-319-90924-0_6
M3 - Chapter
AN - SCOPUS:85075819578
T3 - Advanced Sciences and Technologies for Security Applications
SP - 81
EP - 99
BT - Advanced Sciences and Technologies for Security Applications
PB - Springer
ER -