Ubiquitous Surveillance: Difference between revisions

No edit summary
No edit summary
Line 11: Line 11:
[http://arxiv.org/pdf/1105.1950v1 "An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements."] -Mahnoosh Khloghi and Mohammadreza Keyvanpour.  
[http://arxiv.org/pdf/1105.1950v1 "An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements."] -Mahnoosh Khloghi and Mohammadreza Keyvanpour.  


[http://www.plosone.org/article/info%3Adoi%2F10.1371%2Fjournal.pone.0011233 "Googling Social Interactions: Web Search Engine Based Social Network Construction."] -Sang Hoon Lee.
[http://www.plosone.org/article/info%3Adoi%2F10.1371%2Fjournal.pone.0011233 "Googling Social Interactions: Web Search Engine Based Social Network Construction."] -Sang Hoon Lee.  


<br>  
<br>  
Line 39: Line 39:
[http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html "The Right to Privacy."] Warren and Brandeis  
[http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html "The Right to Privacy."] Warren and Brandeis  


[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=990030 "Data Mining and the Security-Liberty Debate."] Daniel J. Solove
[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=990030 "Data Mining and the Security-Liberty Debate."] Daniel J. Solove  
 
[http://epubs.utah.edu/index.php/ulr/article/viewArticle/136 "What Google Knows: Privacy and Internet Search Engines."] -Omer Tene
 
[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1261344 "The Rise and Fall of Invasive ISP Surveillance."] -Paul Ohm


<br>  
<br>  

Revision as of 15:24, 27 July 2011

SurveillanceCover1.jpg
SurveillanceCover1.jpg

Introduction

Surveillance. -David Parry

Data Mining

"All Liaisons are Dangerous When All Your Friends Are Known to Us." -Daniel Gayo-Avello

"An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements." -Mahnoosh Khloghi and Mohammadreza Keyvanpour.

"Googling Social Interactions: Web Search Engine Based Social Network Construction." -Sang Hoon Lee.


Video

"Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance." -Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba

"A Logic Programming Approach to Behaviour Recognition." -Alexander Artikis and Georgios Paliouras

"GPRS Video Streaming Surveillance System GVS."-T.P. Pushpavath et al.


Surveilling Health

"Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers." -Daniel Chandramohan et al.

"Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns." -Stuart Rennie et al.

"Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance." -Emily Chan et al.


Legal

"The Right to Privacy." Warren and Brandeis

"Data Mining and the Security-Liberty Debate." Daniel J. Solove

"What Google Knows: Privacy and Internet Search Engines." -Omer Tene

"The Rise and Fall of Invasive ISP Surveillance." -Paul Ohm


Appendix: How It Works

"A Web Pioneer Profiles Users by Name." & "Cracking the Code." -Emily Steel. Wall Street Journal explanation of web based tracking.
"Location makes mobile Mobile" - Ted Morgan. Video presentation on Skyhook location service.