Developing Criteria for Invasion of Privacy by Personal Drone

So Hyeon Park, Kyung Ho Lee

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)

    Abstract

    Recently, concerns have increased over careless accidents and invasion of privacy caused by drones, in proportion to the growth of the consumer drone market. Accordingly, some countries including the US and Japan, and in Europe are establishing regulations and guidelines for drones aviation. However, the rules primarily concern aviation safety, and define broad criteria for invasion of privacy. Lack of specific criteria for invasion of privacy has caused disputes continually. Furthermore, fear of invasion of privacy led some people to take strong measures against drones. In this paper, we conduct a survey on image identifiability determined by resolution, and propose criteria on invasion of privacy induced by aerial drone filming. Based on the criteria, we calculate the range of distance and height where drone-induced invasion of privacy may be prevented. Our research may provide a basis for substantive legal criteria that constitute invasion of privacy, and for preventing disputes related to invasion of privacy.

    Original languageEnglish
    Title of host publication2017 International Conference on Platform Technology and Service, PlatCon 2017 - Proceedings
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    ISBN (Electronic)9781509051403
    DOIs
    Publication statusPublished - 2017 Mar 20
    Event4th International Conference on Platform Technology and Service, PlatCon 2017 - Busan, Korea, Republic of
    Duration: 2017 Feb 132017 Feb 15

    Other

    Other4th International Conference on Platform Technology and Service, PlatCon 2017
    Country/TerritoryKorea, Republic of
    CityBusan
    Period17/2/1317/2/15

    Keywords

    • Aerial drone filming
    • Drones
    • Invasion of privacy
    • Privacy of drone

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Computer Science Applications
    • Hardware and Architecture
    • Education

    Fingerprint

    Dive into the research topics of 'Developing Criteria for Invasion of Privacy by Personal Drone'. Together they form a unique fingerprint.

    Cite this