RAQAMLI OCHIQ MANBALARDA TERGOV ETIKASI: MAXFIYLIK MUAMMOLARI VA ENG YAXSHI AMALIYOTLAR

Authors

  • Normurodova Behro'za Xolmo'minovna Toshkent davlat yuridik universiteti Magistratura bosqichi "Kiber huquq" yo'nalishi talabasi Author

Keywords:

The article concludes with detailed recommendations for improving digital investigative ethics.

Abstract

Ushbu maqola raqamli ochiq manbalarda tergov olib borish etikasi, xususan, maxfiylik muammolari va eng yaxshi amaliyotlarni chuqur o'rganadi. Tergov jarayonida shaxsiy ma'lumotlarni himoya qilish va etik normalarni saqlash muhimligini ta'kidlaydi. Tadqiqot usullari sifatida adabiyotlar tahlili, hodisalar tahlili va ekspert intervyulari qo'llanildi. Natijalar shuni ko'rsatadiki, maxfiylik huquqi va jamoat manfaati o'rtasidagi muvozanatni saqlash, shaffoflik va hisobdorlikni ta'minlash, tergovchilarning axloqiy qoidalarga rioya qilishi, hamda ma'lumotlarni anonimlashtirish muhimdir. Shuningdek, raqamli savodxonlikni oshirish va qonun hujjatlarini takomillashtirish zarur. Maqola yakunida raqamli tergov etikasini yaxshilash bo'yicha batafsil tavsiyalar beriladi.

Downloads

Download data is not yet available.

References

Boyd, D., & Crawford, K. (2012). Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon. Information, Communication & Society, 15(5), 662-679.

Cadwalladr, C., & Graham-Harrison, E. (2018, March 17). Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. The Guardian. Retrieved from https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election

Computer Ethics Institute. (2018). The ten commandments of computer ethics. Retrieved from https://computerethicsinstitute.org/publications/tencommandments.html

Diakopoulos, N. (2015). Algorithmic accountability: Journalistic investigation of computational power structures. Digital Journalism, 3(3), 398-415.

Dwork, C. (2008). Differential privacy: A survey of results. In International conference on theory and applications of models of computation (pp. 1-19). Springer.

Greenwald, G. (2014). No place to hide: Edward Snowden, the NSA, and the U.S. surveillance state. Metropolitan Books.

International Consortium of Investigative Journalists (ICIJ). (2017). Paradise Papers: Secrets of the global elite. Retrieved from https://www.icij.org/investigations/paradise-papers/

International Federation of Journalists. (2019). Global charter of ethics for journalists. Retrieved from https://www.ifj.org/who/rules-and-policy/global-charter-of-ethics-for-journalists.html

Livingstone, S. (2004). Media literacy and the challenge of new information and communication technologies. The Communication Review, 7(1), 3-14.

Marwick, A. E., & boyd, d. (2014). Networked privacy: How teenagers negotiate context in social media. New Media & Society, 16(7), 1051-1067.

Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press.

Obermayer, B., & Obermaier, F. (2016). The Panama Papers: Breaking the story of how the rich and powerful hide their money. Oneworld Publications.

Ohm, P. (2010). Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review, 57, 1701-1777.

Solove, D. J. (2011). Nothing to hide: The false tradeoff between privacy and security

Downloads

Published

2024-06-01