{"id":5673,"date":"2020-11-11T13:11:15","date_gmt":"2020-11-11T13:11:15","guid":{"rendered":"https:\/\/plumconsulting.co.uk\/privacy-implications-of-an-automated-cyber-security-system-with-or-without-the-human-loop\/"},"modified":"2020-11-12T12:55:24","modified_gmt":"2020-11-12T12:55:24","slug":"privacy-implications-of-an-automated-cyber-security-system-with-or-without-the-human-loop","status":"publish","type":"post","link":"https:\/\/plumconsulting.co.uk\/fr\/privacy-implications-of-an-automated-cyber-security-system-with-or-without-the-human-loop\/","title":{"rendered":"Implications sur la vie priv\u00e9e d\u2019un syst\u00e8me de cybers\u00e9curit\u00e9 automatis\u00e9 &#8211; avec ou sans intervention humaine"},"content":{"rendered":"\n<p> <\/p>\n\n\n\n<p>Star Wars est l\u2019exemple classique d\u2019une relation symbiotique homme-machine. La \u00abforce\u00bb a guid\u00e9 les actions humaines qui ont \u00e9t\u00e9 soutenues par les donn\u00e9es fournies par les \u00abdro\u00efdes\u00bb. \u00catre guid\u00e9 par la \u00abforce\u00bb n\u2019est rien d\u2019autre que la capacit\u00e9 humaine \u00e0 faire preuve d\u2019intuition et de jugement. Bien qu\u2019\u0153uvre de fiction, ce grand classique contient des \u00e9l\u00e9ments de r\u00e9flexion essentiels sur l\u2019avenir de l\u2019interaction homme-machine ! <\/p>\n\n\n\n<p>L\u2019article d\u2019Akhiljeet Kaur intitul\u00e9 \u00abImplications sur la vie priv\u00e9e d\u2019un syst\u00e8me de cybers\u00e9curit\u00e9 automatis\u00e9 &#8211; avec ou sans intervention humaine\u00bb traite des implications des atteintes \u00e0 la vie priv\u00e9e dans les syst\u00e8mes de cybers\u00e9curit\u00e9 automatis\u00e9s &#8211; avec ou sans l\u2019implication de l\u2019Homme. Cet essai, finaliste du Concours des futurs leaders de la SII 2020, met en contraste les points de vue du d\u00e9terminisme technologique et du constructivisme social sur des questions cl\u00e9s d&#8217;un point de vue philosophique, \u00e9thique, social, politique, \u00e9conomique, technologique et environnemental. Il sugg\u00e8re une voie \u00e0 suivre pour \u00e9clairer les politiques publiques et la r\u00e9gulation qui met l&#8217;accent sur le besoin d&#8217;\u00e9quipes multidisciplinaires et de personnes suffisamment qualifi\u00e9es qui ont une compr\u00e9hension holistique des implications des syst\u00e8mes de cybers\u00e9curit\u00e9 sur la vie priv\u00e9e.<\/p>\n\n\n\n<p>L&#8217;essai est disponible en t\u00e9l\u00e9chargement (lien ci-dessous) ou sur le site Web de la SII: <a href=\"https:\/\/www.iicom.org\/feature\/akhiljeet-kaur\/\">https:\/\/www.iicom.org\/feature\/akhiljeet-kaur\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Star Wars est l\u2019exemple classique d\u2019une relation symbiotique homme-machine. La \u00abforce\u00bb a guid\u00e9 les actions humaines qui ont \u00e9t\u00e9 soutenues par les donn\u00e9es fournies par les \u00abdro\u00efdes\u00bb. \u00catre guid\u00e9 par la \u00abforce\u00bb n\u2019est rien d\u2019autre que la capacit\u00e9 humaine \u00e0 faire preuve d\u2019intuition et de jugement. Bien qu\u2019\u0153uvre de fiction, ce grand classique contient des<a href=\"https:\/\/plumconsulting.co.uk\/fr\/privacy-implications-of-an-automated-cyber-security-system-with-or-without-the-human-loop\/\">[&#8230;]<\/a><\/p>\n","protected":false},"author":26,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"Read Akhiljeet Kaur's runner-up essay from the IIC's Future Leaders Competition 2020: Privacy implications of an automated cyber-security system - with or without the human loop","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[160,161,163],"tags":[344,345],"class_list":["post-5673","post","type-post","status-publish","format-standard","hentry","category-telecommunications","category-technologie-et-infrastructure","category-plateformes-numeriques","tag-privacy","tag-cyber-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Implications sur la vie priv\u00e9e d\u2019un syst\u00e8me de cybers\u00e9curit\u00e9 automatis\u00e9 - avec ou sans intervention humaine - Plum Consulting<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/plumconsulting.co.uk\/fr\/privacy-implications-of-an-automated-cyber-security-system-with-or-without-the-human-loop\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Implications sur la vie priv\u00e9e d\u2019un syst\u00e8me de cybers\u00e9curit\u00e9 automatis\u00e9 - avec ou sans intervention humaine - Plum Consulting\" \/>\n<meta property=\"og:description\" content=\"Star Wars est l\u2019exemple classique d\u2019une relation symbiotique homme-machine. La \u00abforce\u00bb a guid\u00e9 les actions humaines qui ont \u00e9t\u00e9 soutenues par les donn\u00e9es fournies par les \u00abdro\u00efdes\u00bb. \u00catre guid\u00e9 par la \u00abforce\u00bb n\u2019est rien d\u2019autre que la capacit\u00e9 humaine \u00e0 faire preuve d\u2019intuition et de jugement. Bien qu\u2019\u0153uvre de fiction, ce grand classique contient des[...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/plumconsulting.co.uk\/fr\/privacy-implications-of-an-automated-cyber-security-system-with-or-without-the-human-loop\/\" \/>\n<meta property=\"og:site_name\" content=\"Plum Consulting\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-11T13:11:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-12T12:55:24+00:00\" \/>\n<meta name=\"author\" content=\"Laura Wilkinson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@plumconsulting\" \/>\n<meta name=\"twitter:site\" content=\"@plumconsulting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Laura Wilkinson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/plumconsulting.co.uk\/fr\/privacy-implications-of-an-automated-cyber-security-system-with-or-without-the-human-loop\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/plumconsulting.co.uk\/fr\/privacy-implications-of-an-automated-cyber-security-system-with-or-without-the-human-loop\/\"},\"author\":{\"name\":\"Laura Wilkinson\",\"@id\":\"https:\/\/plumconsulting.co.uk\/#\/schema\/person\/c6e6f157e513361613e0a1b50c0ac913\"},\"headline\":\"Implications sur la vie priv\u00e9e d\u2019un syst\u00e8me de cybers\u00e9curit\u00e9 automatis\u00e9 &#8211; avec ou sans intervention humaine\",\"datePublished\":\"2020-11-11T13:11:15+00:00\",\"dateModified\":\"2020-11-12T12:55:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/plumconsulting.co.uk\/fr\/privacy-implications-of-an-automated-cyber-security-system-with-or-without-the-human-loop\/\"},\"wordCount\":266,\"keywords\":[\"Privacy\",\"Cyber security\"],\"articleSection\":[\"T\u00e9l\u00e9communications\",\"Technologie et infrastructure\",\"Plateformes num\u00e9riques\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/plumconsulting.co.uk\/fr\/privacy-implications-of-an-automated-cyber-security-system-with-or-without-the-human-loop\/\",\"url\":\"https:\/\/plumconsulting.co.uk\/fr\/privacy-implications-of-an-automated-cyber-security-system-with-or-without-the-human-loop\/\",\"name\":\"Implications sur la vie priv\u00e9e d\u2019un syst\u00e8me de cybers\u00e9curit\u00e9 automatis\u00e9 - avec ou sans intervention humaine - Plum Consulting\",\"isPartOf\":{\"@id\":\"https:\/\/plumconsulting.co.uk\/#website\"},\"datePublished\":\"2020-11-11T13:11:15+00:00\",\"dateModified\":\"2020-11-12T12:55:24+00:00\",\"author\":{\"@id\":\"https:\/\/plumconsulting.co.uk\/#\/schema\/person\/c6e6f157e513361613e0a1b50c0ac913\"},\"breadcrumb\":{\"@id\":\"https:\/\/plumconsulting.co.uk\/fr\/privacy-implications-of-an-automated-cyber-security-system-with-or-without-the-human-loop\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/plumconsulting.co.uk\/fr\/privacy-implications-of-an-automated-cyber-security-system-with-or-without-the-human-loop\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/plumconsulting.co.uk\/fr\/privacy-implications-of-an-automated-cyber-security-system-with-or-without-the-human-loop\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/plumconsulting.co.uk\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Implications sur la vie priv\u00e9e d\u2019un syst\u00e8me de cybers\u00e9curit\u00e9 automatis\u00e9 &#8211; avec ou sans intervention humaine\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/plumconsulting.co.uk\/#website\",\"url\":\"https:\/\/plumconsulting.co.uk\/\",\"name\":\"Plum Consulting\",\"description\":\"We offer strategy, policy and regulatory advice on telecommunications, spectrum, online and media issues.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/plumconsulting.co.uk\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/plumconsulting.co.uk\/#\/schema\/person\/c6e6f157e513361613e0a1b50c0ac913\",\"name\":\"Laura Wilkinson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/plumconsulting.co.uk\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c1b3f3cdac2f971791e4ce6765e6bccb5dab2d62d75b84fbb9e7b4be25019ba2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c1b3f3cdac2f971791e4ce6765e6bccb5dab2d62d75b84fbb9e7b4be25019ba2?s=96&d=mm&r=g\",\"caption\":\"Laura Wilkinson\"},\"url\":\"https:\/\/plumconsulting.co.uk\/fr\/author\/laura-wilkinson\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Implications sur la vie priv\u00e9e d\u2019un syst\u00e8me de cybers\u00e9curit\u00e9 automatis\u00e9 - avec ou sans intervention humaine - Plum Consulting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/plumconsulting.co.uk\/fr\/privacy-implications-of-an-automated-cyber-security-system-with-or-without-the-human-loop\/","og_locale":"fr_FR","og_type":"article","og_title":"Implications sur la vie priv\u00e9e d\u2019un syst\u00e8me de cybers\u00e9curit\u00e9 automatis\u00e9 - avec ou sans intervention humaine - Plum Consulting","og_description":"Star Wars est l\u2019exemple classique d\u2019une relation symbiotique homme-machine. La \u00abforce\u00bb a guid\u00e9 les actions humaines qui ont \u00e9t\u00e9 soutenues par les donn\u00e9es fournies par les \u00abdro\u00efdes\u00bb. \u00catre guid\u00e9 par la \u00abforce\u00bb n\u2019est rien d\u2019autre que la capacit\u00e9 humaine \u00e0 faire preuve d\u2019intuition et de jugement. Bien qu\u2019\u0153uvre de fiction, ce grand classique contient des[...]","og_url":"https:\/\/plumconsulting.co.uk\/fr\/privacy-implications-of-an-automated-cyber-security-system-with-or-without-the-human-loop\/","og_site_name":"Plum Consulting","article_published_time":"2020-11-11T13:11:15+00:00","article_modified_time":"2020-11-12T12:55:24+00:00","author":"Laura Wilkinson","twitter_card":"summary_large_image","twitter_creator":"@plumconsulting","twitter_site":"@plumconsulting","twitter_misc":{"Written by":"Laura Wilkinson","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/plumconsulting.co.uk\/fr\/privacy-implications-of-an-automated-cyber-security-system-with-or-without-the-human-loop\/#article","isPartOf":{"@id":"https:\/\/plumconsulting.co.uk\/fr\/privacy-implications-of-an-automated-cyber-security-system-with-or-without-the-human-loop\/"},"author":{"name":"Laura Wilkinson","@id":"https:\/\/plumconsulting.co.uk\/#\/schema\/person\/c6e6f157e513361613e0a1b50c0ac913"},"headline":"Implications sur la vie priv\u00e9e d\u2019un syst\u00e8me de cybers\u00e9curit\u00e9 automatis\u00e9 &#8211; avec ou sans intervention humaine","datePublished":"2020-11-11T13:11:15+00:00","dateModified":"2020-11-12T12:55:24+00:00","mainEntityOfPage":{"@id":"https:\/\/plumconsulting.co.uk\/fr\/privacy-implications-of-an-automated-cyber-security-system-with-or-without-the-human-loop\/"},"wordCount":266,"keywords":["Privacy","Cyber security"],"articleSection":["T\u00e9l\u00e9communications","Technologie et infrastructure","Plateformes num\u00e9riques"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/plumconsulting.co.uk\/fr\/privacy-implications-of-an-automated-cyber-security-system-with-or-without-the-human-loop\/","url":"https:\/\/plumconsulting.co.uk\/fr\/privacy-implications-of-an-automated-cyber-security-system-with-or-without-the-human-loop\/","name":"Implications sur la vie priv\u00e9e d\u2019un syst\u00e8me de cybers\u00e9curit\u00e9 automatis\u00e9 - avec ou sans intervention humaine - Plum Consulting","isPartOf":{"@id":"https:\/\/plumconsulting.co.uk\/#website"},"datePublished":"2020-11-11T13:11:15+00:00","dateModified":"2020-11-12T12:55:24+00:00","author":{"@id":"https:\/\/plumconsulting.co.uk\/#\/schema\/person\/c6e6f157e513361613e0a1b50c0ac913"},"breadcrumb":{"@id":"https:\/\/plumconsulting.co.uk\/fr\/privacy-implications-of-an-automated-cyber-security-system-with-or-without-the-human-loop\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/plumconsulting.co.uk\/fr\/privacy-implications-of-an-automated-cyber-security-system-with-or-without-the-human-loop\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/plumconsulting.co.uk\/fr\/privacy-implications-of-an-automated-cyber-security-system-with-or-without-the-human-loop\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/plumconsulting.co.uk\/fr\/"},{"@type":"ListItem","position":2,"name":"Implications sur la vie priv\u00e9e d\u2019un syst\u00e8me de cybers\u00e9curit\u00e9 automatis\u00e9 &#8211; avec ou sans intervention humaine"}]},{"@type":"WebSite","@id":"https:\/\/plumconsulting.co.uk\/#website","url":"https:\/\/plumconsulting.co.uk\/","name":"Plum Consulting","description":"We offer strategy, policy and regulatory advice on telecommunications, spectrum, online and media issues.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/plumconsulting.co.uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/plumconsulting.co.uk\/#\/schema\/person\/c6e6f157e513361613e0a1b50c0ac913","name":"Laura Wilkinson","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/plumconsulting.co.uk\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c1b3f3cdac2f971791e4ce6765e6bccb5dab2d62d75b84fbb9e7b4be25019ba2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c1b3f3cdac2f971791e4ce6765e6bccb5dab2d62d75b84fbb9e7b4be25019ba2?s=96&d=mm&r=g","caption":"Laura Wilkinson"},"url":"https:\/\/plumconsulting.co.uk\/fr\/author\/laura-wilkinson\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/plumconsulting.co.uk\/fr\/wp-json\/wp\/v2\/posts\/5673","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/plumconsulting.co.uk\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/plumconsulting.co.uk\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/plumconsulting.co.uk\/fr\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/plumconsulting.co.uk\/fr\/wp-json\/wp\/v2\/comments?post=5673"}],"version-history":[{"count":1,"href":"https:\/\/plumconsulting.co.uk\/fr\/wp-json\/wp\/v2\/posts\/5673\/revisions"}],"predecessor-version":[{"id":5675,"href":"https:\/\/plumconsulting.co.uk\/fr\/wp-json\/wp\/v2\/posts\/5673\/revisions\/5675"}],"wp:attachment":[{"href":"https:\/\/plumconsulting.co.uk\/fr\/wp-json\/wp\/v2\/media?parent=5673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/plumconsulting.co.uk\/fr\/wp-json\/wp\/v2\/categories?post=5673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/plumconsulting.co.uk\/fr\/wp-json\/wp\/v2\/tags?post=5673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}