Ubiquitous Surveillance: Difference between revisions

No edit summary
No edit summary
Line 1: Line 1:
[[Image:SurveillanceCover1.jpg|right|318x450px|SurveillanceCover1.jpg]]
[[Image:SurveillanceCover1.jpg|right|318x450px|SurveillanceCover1.jpg]]


''edited by'' David Parry  
''edited by'' [http://www.livingbooksaboutlife.org/books/Ubiquitous_Surveillance/bio David Parry]
__TOC__  
__TOC__  
== [http://www.livingbooksaboutlife.org/books/Surveillance/Introduction Introduction: Ubiquitous Mobile Persistent Surveillance] ==
== [http://www.livingbooksaboutlife.org/books/Surveillance/Introduction Introduction: Ubiquitous Mobile Persistent Surveillance] ==

Revision as of 10:25, 1 October 2011

SurveillanceCover1.jpg
SurveillanceCover1.jpg

edited by David Parry

Introduction: Ubiquitous Mobile Persistent Surveillance

In 1996 when John Perry Bartlow wrote A Cyberspace Independence Declaration, internet pioneers hoped that the online world Bartlow was describing would come to pass. While Bartlow’s rhetoric was admittedly 'grandiose,' his central claim, that the internet was a place of freedom separate from the limits of the physical world, reflected the utopic atmosphere of the time. The technological revolution, in particular the rise of the digital network, seemed to point to a future 'where anyone, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity' (Bartlow, 1996). While not everyone in the late 90s could be characterized as a cyberutopian, the dominant mood harbored a sense that the digital network would bring with it newfound, unregulatable freedoms. (more...)

Knowing Everything: Data Mining

Daniel Gayo-Avello
All Liaisons are Dangerous When All Your Friends Are Known to Us
Sang Hoon Lee
Googling Social Interactions: Web Search Engine Based Social Network Construction
Mahnoosh Khloghi and Mohammadreza Keyvanpour
An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements
Tamer Abuhmed et al.
A Survey on Deep Packet Inspection for Intrusion Detection System

Somebody is Watching You: Video Surveillance

Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba
Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance
Alexander Artikis and Georgios Paliouras
A Logic Programming Approach to Behaviour Recognition
T.P. Pushpavath et al. ; GPRS Video Streaming Surveillance System GVS
Renzo De Nardi et al.
SwarMAV: A Swarm of Miniature Aerial Vehicles

Monitoring Bodies: Surveilling Health

Daniel Chandramohan et al.
Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers
Alireza Taravat Najafabad et al.
Web GIS and Public Health
Stuart Rennie et al.
Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns
Emily Chan et al.
Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance

Judging Privacy: Legal Issues

Samuel D. Warren, Louis D. Brandeis
The Right to Privacy
Daniel J. Solove
Data Mining and the Security-Liberty Debate
Omer Tene
What Google Knows: Privacy and Internet Search Engines
Paul Ohm
The Rise and Fall of Invasive ISP Surveillance

Appendix: How It Works

Emily Steel
A Web Pioneer Profiles Users by Name
The Wall Street Journal
Cracking the Code
Ted Morgan – Location Makes Mobile Mobile
David Bond
Erasing David
Ondi Timoner
We Live in Public

Attributions

Attributions