Possibilities of Applying the Chinese Social Credit System to Combat Terrorism
2011 saw the start of the pilot phase of the Social Credit System. The societies of democratic states interpreted it as an extreme example of human rights violation. In turn, what is usually forgotten is that the SCS is not the first citizen assessment system, because similar systems have been succ...
Guardado en:
Autor principal: | |
---|---|
Formato: | article |
Lenguaje: | EN PL |
Publicado: |
Ksiegarnia Akademicka Publishing
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/4a601a426e50459091fdafaaed9c5507 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
Sumario: | 2011 saw the start of the pilot phase of the Social Credit System. The societies of democratic states interpreted it as an extreme example of human rights violation. In turn, what is usually forgotten is that the SCS is not the first citizen assessment system, because similar systems have been successfully functioning since 1960s in democratic countries. Scientific analyses of SCS operations are usually limited to its negative consequences. There are fewer attempts by governments of democratic states to assess the use of elements of SCS and algorithmic data analysis, for example in order to increase the level of security of citizens. As a result, this article presents the research hypothesis that elements of the SCS may be successfully applied also in democratic states for the purpose of more effective combating of terrorism. With modern methods of analyzing Big Data sets, it is possible, for example, to accelerate recognition of terrorist networks, support identification of sources of radicalization in online communities and increase the effectiveness of anti-terrorist strategies in order to protect citizens against contemporary terrorist threats. For such a system to be as effective as possible, it should take over some assumptions of the SCS which are explained in this article: Firstly, it should be centralized and controlled by the state. Secondly, the information obtained and processed should be used solely for the purposes of the state security policy, i.e. in the scope smaller than in the case of China. Thirdly, the data should be obtained from multiple sources, public and private ones, in order to increase the accuracy of predictions. Fourthly, the violation of the principles of social coexistence might result in specific penalties, and compliance therewith – in rewards.
|
---|