Ubiquitous Surveillance: Difference between revisions

No edit summary
No edit summary
 
(68 intermediate revisions by 9 users not shown)
Line 1: Line 1:
[[Image:SurveillanceCover1.jpg|right|318x450px|SurveillanceCover1.jpg]]__TOC__
[[Image:SurveillanceCover1.jpg|right|318x450px|SurveillanceCover1.jpg]]  


=== '''Introduction'''  ===
[http://www.livingbooksaboutlife.org/books/ISBN_Numbers ISBN: 978-1-60785-272-8]


Surveillance. -David Parry<br>
''edited by'' [http://www.livingbooksaboutlife.org/books/Ubiquitous_Surveillance/bio David Parry]
__TOC__


=== '''Data Mining'''  ===
=== [http://www.openhumanitiespress.org/surveillance/ Alternative (Geo-location) Table of Contents] ===


[http://arxiv.org/pdf/1012.5913v1 "All Liaisons are Dangerous When All Your Friends Are Known to Us."] -Daniel Gayo-Avello
== [http://www.livingbooksaboutlife.org/books/Surveillance/Introduction Introduction: Ubiquitous Mobile Persistent Surveillance] ==


[http://arxiv.org/pdf/1105.1950v1 "An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements."] -Mahnoosh Khloghi and Mohammadreza Keyvanpour.
In 1996 when John Perry Bartlow wrote ''A Cyberspace Independence Declaration'', internet pioneers hoped that the online world Bartlow was describing would come to pass. While Bartlow’s rhetoric was admittedly 'grandiose,' his central claim, that the internet was a place of freedom separate from the limits of the physical world, reflected the utopic atmosphere of the time. The technological revolution, in particular the rise of the digital network, seemed to point to a future 'where anyone, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity' (Bartlow, 1996). While not everyone in the late 90s could be characterized as a cyberutopian, the dominant mood harbored a sense that the digital network would bring with it newfound, unregulatable freedoms. [http://www.livingbooksaboutlife.org/books/Surveillance/Introduction (more...)]  


[http://www.plosone.org/article/info%3Adoi%2F10.1371%2Fjournal.pone.0011233 "Googling Social Interactions: Web Search Engine Based Social Network Construction."] -Sang Hoon Lee.
== Knowing Everything: Data Mining  ==


[http://arxiv.org/pdf/0803.0037v1 "A Survey on Deep Packet Inspection for Intrusion Detection System."] Tamer Abuhmed et al.
;Daniel Gayo-Avello&nbsp;
:[http://arxiv.org/pdf/1012.5913v1 All Liaisons are Dangerous When All Your Friends Are Known to Us]
;Sang Hoon Lee&nbsp;
:[http://www.plosone.org/article/info:doi/10.1371/journal.pone.0011233 Googling Social Interactions: Web Search Engine Based Social Network Construction]
;Mahnoosh Khloghi and Mohammadreza Keyvanpour&nbsp;
:[http://arxiv.org/pdf/1105.1950v1 An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements]
;Tamer Abuhmed ''et al''.&nbsp;
:[http://arxiv.org/pdf/0803.0037v1 A Survey on Deep Packet Inspection for Intrusion Detection System]


<br>
== Somebody is Watching You: Video Surveillance  ==


=== '''Video'''  ===
;Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba&nbsp;
:[http://downloads.hindawi.com/journals/ivp/2011/163682.pdf Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance]
;Alexander Artikis and Georgios Paliouras&nbsp;
:[http://arxiv.org/pdf/0905.4614v1 A Logic Programming Approach to Behaviour Recognition]
;T.P. Pushpavath et al.&nbsp; : [http://arxiv.org/pdf/1002.3011v1 GPRS Video Streaming Surveillance System GVS]
;Renzo De Nardi et al.&nbsp;
:[http://cogprints.org/5569/1/bristoluav21.pdf SwarMAV: A Swarm of Miniature Aerial Vehicles]


[http://www.hindawi.com/journals/ivp/2011/163682/ "Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance."] -Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba
== Monitoring Bodies: Surveilling Health  ==


[http://arxiv.org/pdf/0905.4614v1 "A Logic Programming Approach to Behaviour Recognition."] -Alexander Artikis and Georgios Paliouras
;Daniel Chandramohan ''et al''.&nbsp;
:[http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.0050057 Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers]
;Alireza Taravat Najafabad ''et al''.&nbsp;
:[http://cogprints.org/6972/1/2009-4-4.pdf Web GIS and Public Health]  
;Stuart Rennie ''et al''.&nbsp;
:[http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.1000004 Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns]
;Emily Chan ''et al''.&nbsp;
:[http://www.plosntds.org/article/info:doi/10.1371/journal.pntd.0001206 Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance]


[http://arxiv.org/pdf/1002.3011v1 "GPRS Video Streaming Surveillance System GVS."]-T.P. Pushpavath et al.
== Judging Privacy: Legal Issues  ==


<br>
;Samuel D. Warren, Louis D. Brandeis&nbsp;
:[http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html The Right to Privacy]
;Daniel J. Solove&nbsp;
:[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=990030 Data Mining and the Security-Liberty Debate]
;Omer Tene&nbsp;
:[http://epubs.utah.edu/index.php/ulr/article/viewArticle/136 What Google Knows: Privacy and Internet Search Engines]
;Paul Ohm&nbsp;
:[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1261344 The Rise and Fall of Invasive ISP Surveillance]


=== '''Surveilling Health''' ===
== Appendix: How It Works ==


[http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.0050057 "Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers."] -Daniel Chandramohan et al.
;Emily Steel&nbsp;
:[http://online.wsj.com/article/SB10001424052702304410504575560243259416072.html A Web Pioneer Profiles Users by Name]
;The Wall Street Journal&nbsp;
:[http://s.wsj.net/public/resources/documents/st_RAPLEAF_20101018.html Cracking the Code]
;Ted Morgan – [http://www.youtube.com/watch?v=bIJyWi9YsYU Location Makes Mobile Mobile]&nbsp;
:<youtube>bIJyWi9YsYU</youtube>
;David Bond&nbsp;
:[http://erasingdavid.com/ Erasing David]
;Ondi Timoner&nbsp;
:[http://www.hulu.com/watch/192218/we-live-in-public We Live in Public]


[http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.1000004 "Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns."] -Stuart Rennie et al.<br>
== [http://www.livingbooksaboutlife.org/books/Surveillance/Attributions Attributions] ==


"[http://www.plosntds.org/article/info:doi/10.1371/journal.pntd.0001206 Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance.]" -Emily Chan et al.
== A 'Frozen' PDF Version of this Living Book ==
 
; [http://livingbooksaboutlife.org/pdfs/bookarchive/UbiquitousSurveillance.pdf Download a 'frozen' PDF version of this book as it appeared on 7th October 2011]
<br>
 
=== '''Legal'''  ===
 
[http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html "The Right to Privacy."] Warren and Brandeis
 
[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=990030 "Data Mining and the Security-Liberty Debate."] Daniel J. Solove
 
[http://epubs.utah.edu/index.php/ulr/article/viewArticle/136 "What Google Knows: Privacy and Internet Search Engines."] -Omer Tene
 
[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1261344 "The Rise and Fall of Invasive ISP Surveillance."] -Paul Ohm
 
<br>
 
=== '''Appendix: How It Works'''  ===
 
[http://online.wsj.com/article/SB10001424052702304410504575560243259416072.html "A Web Pioneer Profiles Users by Name."] &amp; [http://s.wsj.net/public/resources/documents/st_RAPLEAF_20101018.html "Cracking the Code."] -Emily Steel.&nbsp;Wall Street Journal explanation of web based tracking.<br>[http://www.youtube.com/watch?v=bIJyWi9YsYU "Location makes mobile Mobile"] - Ted Morgan.&nbsp;Video presentation on Skyhook location service.<br>

Latest revision as of 13:59, 19 January 2012

SurveillanceCover1.jpg
SurveillanceCover1.jpg

ISBN: 978-1-60785-272-8

edited by David Parry

Alternative (Geo-location) Table of Contents

Introduction: Ubiquitous Mobile Persistent Surveillance

In 1996 when John Perry Bartlow wrote A Cyberspace Independence Declaration, internet pioneers hoped that the online world Bartlow was describing would come to pass. While Bartlow’s rhetoric was admittedly 'grandiose,' his central claim, that the internet was a place of freedom separate from the limits of the physical world, reflected the utopic atmosphere of the time. The technological revolution, in particular the rise of the digital network, seemed to point to a future 'where anyone, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity' (Bartlow, 1996). While not everyone in the late 90s could be characterized as a cyberutopian, the dominant mood harbored a sense that the digital network would bring with it newfound, unregulatable freedoms. (more...)

Knowing Everything: Data Mining

Daniel Gayo-Avello 
All Liaisons are Dangerous When All Your Friends Are Known to Us
Sang Hoon Lee 
Googling Social Interactions: Web Search Engine Based Social Network Construction
Mahnoosh Khloghi and Mohammadreza Keyvanpour 
An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements
Tamer Abuhmed et al
A Survey on Deep Packet Inspection for Intrusion Detection System

Somebody is Watching You: Video Surveillance

Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba 
Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance
Alexander Artikis and Georgios Paliouras 
A Logic Programming Approach to Behaviour Recognition
T.P. Pushpavath et al. 
GPRS Video Streaming Surveillance System GVS
Renzo De Nardi et al. 
SwarMAV: A Swarm of Miniature Aerial Vehicles

Monitoring Bodies: Surveilling Health

Daniel Chandramohan et al
Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers
Alireza Taravat Najafabad et al
Web GIS and Public Health
Stuart Rennie et al
Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns
Emily Chan et al
Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance

Judging Privacy: Legal Issues

Samuel D. Warren, Louis D. Brandeis 
The Right to Privacy
Daniel J. Solove 
Data Mining and the Security-Liberty Debate
Omer Tene 
What Google Knows: Privacy and Internet Search Engines
Paul Ohm 
The Rise and Fall of Invasive ISP Surveillance

Appendix: How It Works

Emily Steel 
A Web Pioneer Profiles Users by Name
The Wall Street Journal 
Cracking the Code
Ted Morgan – Location Makes Mobile Mobile 
David Bond 
Erasing David
Ondi Timoner 
We Live in Public

Attributions

A 'Frozen' PDF Version of this Living Book

Download a 'frozen' PDF version of this book as it appeared on 7th October 2011