Ubiquitous Surveillance: Difference between revisions

No edit summary
No edit summary
Line 7: Line 7:
Live Surveillance Table of Contents.  
Live Surveillance Table of Contents.  


===  '''Knowing Everything: Data Mining'''   ===
====  ====
 
====   '''Knowing Everything: Data Mining'''    ====


Daniel Gayo-Avello [http://arxiv.org/pdf/1012.5913v1 All Liaisons are Dangerous When All Your Friends Are Known to Us]  
Daniel Gayo-Avello [http://arxiv.org/pdf/1012.5913v1 All Liaisons are Dangerous When All Your Friends Are Known to Us]  
Line 17: Line 19:
Tamer Abuhmed ''et al''. [http://arxiv.org/pdf/0803.0037v1 A Survey on Deep Packet Inspection for Intrusion Detection System]  
Tamer Abuhmed ''et al''. [http://arxiv.org/pdf/0803.0037v1 A Survey on Deep Packet Inspection for Intrusion Detection System]  


<br>


=== ''Somebody is Watching You: Video Surveillance'' ===
 
==== &nbsp;'''Somebody is Watching You: Video Surveillance&nbsp;''' ====


Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba [http://www.hindawi.com/journals/ivp/2011/163682/ Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance]  
Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba [http://www.hindawi.com/journals/ivp/2011/163682/ Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance]  
Line 29: Line 31:
Renzo De Nard ''et al.'' [http://cogprints.org/5569/1/bristoluav21.pdf SwarMAV: A Swarm of Miniature Aerial Vehicles]  
Renzo De Nard ''et al.'' [http://cogprints.org/5569/1/bristoluav21.pdf SwarMAV: A Swarm of Miniature Aerial Vehicles]  


<br>


=== ''Monitoring Bodies: Surveilling Health'' ===
 
==== &nbsp;'''Monitoring Bodies: Surveilling Health&nbsp;''' ====


Daniel Chandramohan ''et al''. [http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.0050057 Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers]  
Daniel Chandramohan ''et al''. [http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.0050057 Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers]  
Line 41: Line 43:
Emily Chan ''et al''. [http://www.plosntds.org/article/info:doi/10.1371/journal.pntd.0001206 Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance]  
Emily Chan ''et al''. [http://www.plosntds.org/article/info:doi/10.1371/journal.pntd.0001206 Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance]  


<br>


=== ''Judging Privacy: Legal Issues'' ===
 
==== &nbsp;'''Judging Privacy: Legal Issues&nbsp;''' ====


Samuel D. Warren, Louis D. Brandeis [http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html The Right to Privacy]  
Samuel D. Warren, Louis D. Brandeis [http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html The Right to Privacy]  
Line 53: Line 55:
Paul Ohm [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1261344 The Rise and Fall of Invasive ISP Surveillance]  
Paul Ohm [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1261344 The Rise and Fall of Invasive ISP Surveillance]  


<br>


=== '''Appendix: How It Works''' ===
 
==== &nbsp;'''Appendix: How It Works&nbsp;''' ====


Emily Steel [http://online.wsj.com/article/SB10001424052702304410504575560243259416072.html A Web Pioneer Profiles Users by Name]  
Emily Steel [http://online.wsj.com/article/SB10001424052702304410504575560243259416072.html A Web Pioneer Profiles Users by Name]  

Revision as of 13:18, 6 September 2011

SurveillanceCover1.jpg
SurveillanceCover1.jpg

   Introduction  

Ubiquitous Mobile Persistent Surveillance. -David Parry

Live Surveillance Table of Contents.

  Knowing Everything: Data Mining  

Daniel Gayo-Avello All Liaisons are Dangerous When All Your Friends Are Known to Us

Sang Hoon Lee Googling Social Interactions: Web Search Engine Based Social Network Construction

Mahnoosh Khloghi and Mohammadreza Keyvanpour An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements

Tamer Abuhmed et al. A Survey on Deep Packet Inspection for Intrusion Detection System


 Somebody is Watching You: Video Surveillance 

Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance

Alexander Artikis and Georgios Paliouras A Logic Programming Approach to Behaviour Recognition

T.P. Pushpavath et al. GPRS Video Streaming Surveillance System GVS

Renzo De Nard et al. SwarMAV: A Swarm of Miniature Aerial Vehicles


 Monitoring Bodies: Surveilling Health 

Daniel Chandramohan et al. Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers

Alireza Taravat Najafabad et al. Web GIS and Public Health

Stuart Rennie et al. Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns

Emily Chan et al. Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance


 Judging Privacy: Legal Issues 

Samuel D. Warren, Louis D. Brandeis The Right to Privacy

Daniel J. Solove Data Mining and the Security-Liberty Debate

Omer Tene What Google Knows: Privacy and Internet Search Engines

Paul Ohm The Rise and Fall of Invasive ISP Surveillance


 Appendix: How It Works 

Emily Steel A Web Pioneer Profiles Users by Name

The Wall Street Journal Cracking the Code

Ted Morgan Location makes mobile Mobile


David Bond Erasing David

Ondi Timoner We Live in Public


Attributions

Attributions