<> <http://www.w3.org/2000/01/rdf-schema#comment> "The repository administrator has not yet configured an RDF license."^^<http://www.w3.org/2001/XMLSchema#string> .
<> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/1508521> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Article> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://purl.org/dc/terms/title> "Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret - Policy Lessons for Government After the Snowden Leaks"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://purl.org/ontology/bibo/abstract> "Global security concerns, acts of terrorism and organised crime activity have motivated nation states to delve into implementing measures of mass surveillance in cyberspace, the breadth of which was partly revealed by the whistleblower Edward Snowden. But are modern nation states fighting a battle in the wrong space? Is mass surveillance of cyberspace effective and are the conventional metaphors of technology control appropriate for it? Can algorithms detect, classify and decide effectively on what constitutes suspicious activity? We argue that as cyberspace is a construct that has only recently been viewed strategically, let alone indoctrinated (the UKs cyber-security strategy is only four years old), the societal impact of such bulk measures is yet much unclear – as are the assumptions about the fitness of state organisations that are charged with their oversight and the potential for unintended consequences. Recent experiences highlight the role of multiple forms of intelligence inputs, especially human- and community-based, and the need for application of such intrusive measures in a targeted manner. We believe that intrusive measures, where necessary, must be used decoupled from the seductive promises of advanced technology and ought to go hand-in-hand with means that strengthen the affected communities to identify, report and battle extremism and organised crime, in ways that safeguard the fundamental principles of our contemporary democratic Western states."^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://purl.org/dc/terms/date> "2016-07-18" .
<https://discovery.ucl.ac.uk/id/document/256477> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Document> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://purl.org/ontology/bibo/volume> "9750" .
<https://discovery.ucl.ac.uk/id/org/ext-95ee720d515e2c484632090d4f75b881> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Organization> .
<https://discovery.ucl.ac.uk/id/org/ext-95ee720d515e2c484632090d4f75b881> <http://xmlns.com/foaf/0.1/name> "Springer International"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://purl.org/dc/terms/publisher> <https://discovery.ucl.ac.uk/id/org/ext-95ee720d515e2c484632090d4f75b881> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://purl.org/ontology/bibo/status> <http://purl.org/ontology/bibo/status/published> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-fedd284d0408d766e71bc986235a61a7> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/1508521#authors> .
<https://discovery.ucl.ac.uk/id/eprint/1508521#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_1> <https://discovery.ucl.ac.uk/id/person/ext-fedd284d0408d766e71bc986235a61a7> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-8465067461cfb7605e723a6cf2051a97> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/1508521#authors> .
<https://discovery.ucl.ac.uk/id/eprint/1508521#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_2> <https://discovery.ucl.ac.uk/id/person/ext-8465067461cfb7605e723a6cf2051a97> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-66afa7d0921f2399053b2a954bf34e57> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/1508521#authors> .
<https://discovery.ucl.ac.uk/id/eprint/1508521#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_3> <https://discovery.ucl.ac.uk/id/person/ext-66afa7d0921f2399053b2a954bf34e57> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-c0ef149f5dc45acdd35160647a0f7f5c> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/1508521#authors> .
<https://discovery.ucl.ac.uk/id/eprint/1508521#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_4> <https://discovery.ucl.ac.uk/id/person/ext-c0ef149f5dc45acdd35160647a0f7f5c> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://www.loc.gov/loc.terms/relators/EDT> <https://discovery.ucl.ac.uk/id/person/ext-fedd284d0408d766e71bc986235a61a7> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://purl.org/ontology/bibo/editorList> <https://discovery.ucl.ac.uk/id/eprint/1508521#editors> .
<https://discovery.ucl.ac.uk/id/eprint/1508521#editors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_1> <https://discovery.ucl.ac.uk/id/person/ext-fedd284d0408d766e71bc986235a61a7> .
<https://discovery.ucl.ac.uk/id/person/ext-c0ef149f5dc45acdd35160647a0f7f5c> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-c0ef149f5dc45acdd35160647a0f7f5c> <http://xmlns.com/foaf/0.1/givenName> "P"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-c0ef149f5dc45acdd35160647a0f7f5c> <http://xmlns.com/foaf/0.1/familyName> "Andriotis"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-c0ef149f5dc45acdd35160647a0f7f5c> <http://xmlns.com/foaf/0.1/name> "P Andriotis"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-fedd284d0408d766e71bc986235a61a7> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-fedd284d0408d766e71bc986235a61a7> <http://xmlns.com/foaf/0.1/givenName> "T"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-fedd284d0408d766e71bc986235a61a7> <http://xmlns.com/foaf/0.1/familyName> "Tryfonas"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-fedd284d0408d766e71bc986235a61a7> <http://xmlns.com/foaf/0.1/name> "T Tryfonas"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-8465067461cfb7605e723a6cf2051a97> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-8465067461cfb7605e723a6cf2051a97> <http://xmlns.com/foaf/0.1/givenName> "M"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-8465067461cfb7605e723a6cf2051a97> <http://xmlns.com/foaf/0.1/familyName> "Carter"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-8465067461cfb7605e723a6cf2051a97> <http://xmlns.com/foaf/0.1/name> "M Carter"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-66afa7d0921f2399053b2a954bf34e57> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-66afa7d0921f2399053b2a954bf34e57> <http://xmlns.com/foaf/0.1/givenName> "T"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-66afa7d0921f2399053b2a954bf34e57> <http://xmlns.com/foaf/0.1/familyName> "Crick"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-66afa7d0921f2399053b2a954bf34e57> <http://xmlns.com/foaf/0.1/name> "T Crick"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Article> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://purl.org/ontology/bibo/presentedAt> <https://discovery.ucl.ac.uk/id/event/ext-708d0adca0940632ba6b1d4daaff596d> .
<https://discovery.ucl.ac.uk/id/event/ext-708d0adca0940632ba6b1d4daaff596d> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Conference> .
<https://discovery.ucl.ac.uk/id/event/ext-708d0adca0940632ba6b1d4daaff596d> <http://purl.org/dc/terms/title> "HAS 2016: Human Aspects of Information Security, Privacy, and Trust (held as part of HCI International 2016), 17-22 July 2016, Toronto, Canada"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/event/ext-708d0adca0940632ba6b1d4daaff596d> <http://purl.org/NET/c4dm/event.owl#place> <https://discovery.ucl.ac.uk/id/location/ext-948ce72be6c871b84f6d0dab24f209ed> .
<https://discovery.ucl.ac.uk/id/event/ext-708d0adca0940632ba6b1d4daaff596d> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/NET/c4dm/event.owl#Event> .
<https://discovery.ucl.ac.uk/id/event/ext-708d0adca0940632ba6b1d4daaff596d> <http://purl.org/NET/c4dm/event.owl#place> <https://discovery.ucl.ac.uk/id/location/ext-948ce72be6c871b84f6d0dab24f209ed> .
<https://discovery.ucl.ac.uk/id/location/ext-948ce72be6c871b84f6d0dab24f209ed> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://www.w3.org/2003/01/geo/wgs84_pos#SpatialThing> .
<https://discovery.ucl.ac.uk/id/location/ext-948ce72be6c871b84f6d0dab24f209ed> <http://www.w3.org/2000/01/rdf-schema#label> "Toronto"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/EPrint> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/ProceedingsSectionEPrint> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://purl.org/dc/terms/isPartOf> <https://discovery.ucl.ac.uk/id/repository> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/256477> .
<https://discovery.ucl.ac.uk/id/document/256477> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/256477> <http://www.w3.org/2000/01/rdf-schema#label> "Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret - Policy Lessons for Government After the Snowden Leaks (Text)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://purl.org/dc/elements/1.1/hasVersion> <https://discovery.ucl.ac.uk/id/document/256477> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://eprints.org/ontology/hasAccepted> <https://discovery.ucl.ac.uk/id/document/256477> .
<https://discovery.ucl.ac.uk/id/document/256477> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/1508521/1/238_final.pdf> .
<https://discovery.ucl.ac.uk/id/document/256477> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/1508521/1/238_final.pdf> .
<https://discovery.ucl.ac.uk/id/eprint/1508521/1/238_final.pdf> <http://www.w3.org/2000/01/rdf-schema#label> "238_final.pdf"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/256478> .
<https://discovery.ucl.ac.uk/id/document/256478> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/256478> <http://www.w3.org/2000/01/rdf-schema#label> "Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret - Policy Lessons for Government After the Snowden Leaks (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/256478> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/256477> .
<https://discovery.ucl.ac.uk/id/document/256478> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/256477> .
<https://discovery.ucl.ac.uk/id/document/256478> <http://eprints.org/relation/islightboxThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/256477> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/256479> .
<https://discovery.ucl.ac.uk/id/document/256479> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/256479> <http://www.w3.org/2000/01/rdf-schema#label> "Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret - Policy Lessons for Government After the Snowden Leaks (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/256479> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/256477> .
<https://discovery.ucl.ac.uk/id/document/256479> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/256477> .
<https://discovery.ucl.ac.uk/id/document/256479> <http://eprints.org/relation/ispreviewThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/256477> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/256480> .
<https://discovery.ucl.ac.uk/id/document/256480> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/256480> <http://www.w3.org/2000/01/rdf-schema#label> "Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret - Policy Lessons for Government After the Snowden Leaks (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/256480> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/256477> .
<https://discovery.ucl.ac.uk/id/document/256480> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/256477> .
<https://discovery.ucl.ac.uk/id/document/256480> <http://eprints.org/relation/ismediumThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/256477> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/256481> .
<https://discovery.ucl.ac.uk/id/document/256481> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/256481> <http://www.w3.org/2000/01/rdf-schema#label> "Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret - Policy Lessons for Government After the Snowden Leaks (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/256481> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/256477> .
<https://discovery.ucl.ac.uk/id/document/256481> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/256477> .
<https://discovery.ucl.ac.uk/id/document/256481> <http://eprints.org/relation/issmallThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/256477> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/256482> .
<https://discovery.ucl.ac.uk/id/document/256482> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/256482> <http://www.w3.org/2000/01/rdf-schema#label> "Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret - Policy Lessons for Government After the Snowden Leaks (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/256482> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/256477> .
<https://discovery.ucl.ac.uk/id/document/256482> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/256477> .
<https://discovery.ucl.ac.uk/id/document/256482> <http://eprints.org/relation/isIndexCodesVersionOf> <https://discovery.ucl.ac.uk/id/document/256477> .
<https://discovery.ucl.ac.uk/id/eprint/1508521> <http://www.w3.org/2000/01/rdf-schema#seeAlso> <https://discovery.ucl.ac.uk/id/eprint/1508521/> .
<https://discovery.ucl.ac.uk/id/eprint/1508521/> <http://purl.org/dc/elements/1.1/title> "HTML Summary of #1508521 \n\nMass Surveillance in Cyberspace and the Lost Art of Keeping a Secret - Policy Lessons for Government After the Snowden Leaks\n\n" .
<https://discovery.ucl.ac.uk/id/eprint/1508521/> <http://purl.org/dc/elements/1.1/format> "text/html" .
<https://discovery.ucl.ac.uk/id/eprint/1508521/> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/1508521> .