Analyzing Risk in Digitalized Border Management Systems: The State of Play

Research output: Contribution to conferenceConference AbstractScientificpeer-review

Abstract

Novel digital infrastructures and other enhanced ICT tools, such as biometrics-enabled e-gates, advanced analytics and predictive modelling transform European border management with increasing intensity. Advanced technologies are claimed to offer border agencies new means to address evolving security threats and growing volumes in trade and travel. However, their development, deployment and application can also contribute to the build-up of new vulnerabilities whose identification may require a change in the approach they are currently being assessed. Present methods of document fraud for example involve high use of advanced technologies, such as 3D printing; and alterations in genuine travel documents or the manufacturing of complete counterfeits may be difficult to detect particularly in automated processes and thus create a serious, unanticipated capability-based system vulnerability. By reviewing current approaches and used analysis methods, this paper discusses the implications for addressing risk in security critical context, where the risks are yet to become known but have most likely already happened.
Original languageEnglish
Publication statusPublished - 8 Nov 2018
MoE publication typeNot Eligible
Event4th SRA (Society for Risk Analysis) Nordic Conference: Exploring the risk, safety, security and resilience nexus - Radisson Blu Atlantic Hotel, Stavanger, Norway
Duration: 8 Nov 20189 Nov 2018
https://www.uis.no/research-and-phd-studies/research-centres/seros-centre-for-risk-management-and-societal-safety/risk2018/

Conference

Conference4th SRA (Society for Risk Analysis) Nordic Conference
Abbreviated titleSRA-E Nordic Chapter
Country/TerritoryNorway
CityStavanger
Period8/11/189/11/18
Internet address

Fingerprint

Dive into the research topics of 'Analyzing Risk in Digitalized Border Management Systems: The State of Play'. Together they form a unique fingerprint.

Cite this