Minds and Machines 29 (4):579-601 (2019)

Risk management is a well-known method to face technological challenges through a win–win combination of protective and proactive approaches, fostering the collaboration of operators, researchers, regulators, and industries for the exploitation of new markets. In the field of autonomous and unmanned aerial systems, or UAS, a considerable amount of work has been devoted to risk analysis, the generation of ground risk maps, and ground risk assessment by estimating the fatality rate. The paper aims to expand this approach with a tool for managing data protection risks raised by drones through the design of flight maps. The tool should allow UAS operators choosing the best air corridor for their drones based on the so-called privacy by design principle pursuant to Article 25 of the EU data protection regulation, the GDPR. Among the manifold applications of this approach, the design of fly zones for drones can be tailored for public authorities in the phase of authorization of new operations, much as for national Data Protection authorities that have to control the lawfulness of personal data processing by UAS operations. The overall aim is to present the first win–win approach to data protection issues, aerospace engineering challenges, and risk management methods for the threats posed by this technology.
Keywords No keywords specified (fix it)
Categories No categories specified
(categorize this paper)
DOI 10.1007/s11023-019-09511-9
Edit this record
Mark as duplicate
Export citation
Find it on Scholar
Request removal from index
Translate to english
Revision history

Download options

PhilArchive copy

Upload a copy of this paper     Check publisher's policy     Papers currently archived: 63,323
External links

Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
Through your library

References found in this work BETA

No references found.

Add more references

Citations of this work BETA

Add more citations

Similar books and articles

Privacy by Design.Peter Schaar - 2010 - Identity in the Information Society 3 (2):267-274.
Cracking Down on Autonomy: Three Challenges to Design in IT Law. [REVIEW]U. Pagallo - 2012 - Ethics and Information Technology 14 (4):319-328.
Privacy-Centered Design for Social Robots.Tanja Heuer, Ina Schiering & Reinhard Gerndt - 2019 - Interaction Studies. Social Behaviour and Communication in Biological and Artificial Systemsinteraction Studies / Social Behaviour and Communication in Biological and Artificial Systemsinteraction Studies 20 (3):509-529.
Issues in Data Management.Sharon S. Krag - 2010 - Science and Engineering Ethics 16 (4):743-748.


Added to PP index

Total views
14 ( #707,768 of 2,448,712 )

Recent downloads (6 months)
1 ( #445,641 of 2,448,712 )

How can I increase my downloads?


My notes