Future scenarios of citizen data systems on the horizon 1410 and national security

Document Type : Original Article

Authors

1 Assistant Prof. & Faculty Member of Supreme National Defense University and Strategic Research, Tehran, Iran

2 Ph.D. Student in Futures Studies, Supreme National Defense University and Strategic Research, Tehran, Iran.

Abstract

At present, the production of data related to individuals, companies, and especially the data of citizens and its use, is growing rapidly. Today more than ever on the Internet, travel, leisure, business, and in almost every aspect of daily life, we leave a digital footprint, and this data provides great potential value to consumers, companies, government and security organizations. In the digital age, it is easy to use a wide range of citizens' data and information for broader purposes and subjects that were not anticipated in the past. Unforeseen events in the future, such as the outbreak of Corona, can also have a profound impact on the use and sharing of citizens' data and change public attitudes towards the issue. In the present research, with the statistical community including experts related to the subject and 12 statistical samples, while using the scenario method, four future scenarios about citizen data systems are presented, which express global norms, business models, international laws and governments' approaches to Citizens' data can be developed and made significant changes. In some scenarios, there is convergence in data governance, and data moves more freely around the world. In others, governments take more divergent and often more restrictive approaches, and data is increasingly localized; Therefore, in the atmosphere of future uncertainty, while recognizing that international cooperation is inevitable, national data management is also vital, and we must take the path that best ensures national security and the interests of our country.

Keywords


  •  

    • Beagrie, N., & Houghton, J. (2016). The value and impact of the European bioinformatics institute.
    • Chertoff, M. (2008). The cyber security Challenge, Regulation & Governance. Congressional Research Service (CRS) (2008), Botnets, Cybercrime and Cyber terrorism: Vulnerabilities and Policy Issues for Congress, available at: www.crs.org, (accessed by July 23, 2011).
    • CIGI-Ipsos. (2019). 2019 CIGI-Ipsos Global Survey on Internet Security and Trust.cigionline.org/internet- survey-2019.
    • Deloitte, L. L. P. (2017). Assessing the value of TfL’s open data and digital partnerships.
    • Dunn Cavelty, M., & Brunner, E. (2007). Introduction: Information, Power, and Security: An Outline of Debates and Implications. In Power and security in the information age (pp. 1-18). Ashgate.
    • GOFS, A. (2020). Evidence and scenarios for global data systems, Government office for science Report, UK. https://doi.org/10.1038/d41586-018-02386-3.
    • Li, J., & Mocko, M. (2020). Machine learning for a citizen data scientist: an experience with JMP.
    • Mansted, K., & Logan, S. (2020). Citizen data: a centrepoint for trust in government and Australia’s national security. Fresh Perspectives in Security, 6-12.
    • Noordyke, M. (2020). US state comprehensive privacy law comparison. International association of privacy professionals. [Google Scholar].
    • Rodriguez, Carlos A. (2006). Cyber terrorism, Inter-American Defense College as a prerequisite for the Diploma approved.
    • Scott, M., & Cerulus, L. (2018). Europe’s new data protection rules export privacy standards worldwide. Retrieved March 18, 2018.
    • Tanner, M. S. (2017). Beijing’s New National Intelligence Law: From Defense to Offense. Lawfare, July 20.

    UNCTAD. (2019). Digital Economy Report 2019. Value creation and capture: implications for developing countries. United Nations Conference on Trade and Development.