Ubiquitous Surveillance: Difference between revisions

No edit summary
No edit summary
Line 7: Line 7:
In 1996 when John Perry Bartlow wrote ''A Cyberspace Independence Declaration'', internet pioneers hoped that the online world Bartlow was describing would come to pass. While Bartlow’s rhetoric was admittedly 'grandiose,' his central claim, that the internet was a place of freedom separate from the limits of the physical world, reflected the utopic atmosphere of the time. The technological revolution, in particular the rise of the digital network, seemed to point to a future 'where anyone, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity' (Bartlow, 1996). While not everyone in the late 90s could be characterized as a cyberutopian, the dominant mood harbored a sense that the digital network would bring with it newfound, unregulatable freedoms. [http://www.livingbooksaboutlife.org/books/Surveillance/Introduction More] <br> <br>  
In 1996 when John Perry Bartlow wrote ''A Cyberspace Independence Declaration'', internet pioneers hoped that the online world Bartlow was describing would come to pass. While Bartlow’s rhetoric was admittedly 'grandiose,' his central claim, that the internet was a place of freedom separate from the limits of the physical world, reflected the utopic atmosphere of the time. The technological revolution, in particular the rise of the digital network, seemed to point to a future 'where anyone, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity' (Bartlow, 1996). While not everyone in the late 90s could be characterized as a cyberutopian, the dominant mood harbored a sense that the digital network would bring with it newfound, unregulatable freedoms. [http://www.livingbooksaboutlife.org/books/Surveillance/Introduction More] <br> <br>  


<br>
<br>  


====  ====
====  ====
Line 13: Line 13:
==== &nbsp;&nbsp;'''Knowing Everything: Data Mining'''&nbsp;&nbsp;  ====
==== &nbsp;&nbsp;'''Knowing Everything: Data Mining'''&nbsp;&nbsp;  ====


Daniel Gayo-Avello [http://arxiv.org/pdf/1012.5913v1 All Liaisons are Dangerous When All Your Friends Are Known to Us]  
Daniel Gayo-Avello<br> [http://arxiv.org/pdf/1012.5913v1 All Liaisons are Dangerous When All Your Friends Are Known to Us]  


Sang Hoon Lee [http://www.plosone.org/article/info:doi/10.1371/journal.pone.0011233 Googling Social Interactions: Web Search Engine Based Social Network Construction]  
Sang Hoon Lee<br> [http://www.plosone.org/article/info:doi/10.1371/journal.pone.0011233 Googling Social Interactions: Web Search Engine Based Social Network Construction]  


Mahnoosh Khloghi and Mohammadreza Keyvanpour [http://arxiv.org/pdf/1105.1950v1 An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements]  
Mahnoosh Khloghi and Mohammadreza Keyvanpour <br> [http://arxiv.org/pdf/1105.1950v1 An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements]  


Tamer Abuhmed ''et al''. [http://arxiv.org/pdf/0803.0037v1 A Survey on Deep Packet Inspection for Intrusion Detection System]  
Tamer Abuhmed ''et al''. <br> [http://arxiv.org/pdf/0803.0037v1 A Survey on Deep Packet Inspection for Intrusion Detection System]  


<br>  
<br>  
Line 25: Line 25:
==== &nbsp;'''Somebody is Watching You: Video Surveillance&nbsp;'''  ====
==== &nbsp;'''Somebody is Watching You: Video Surveillance&nbsp;'''  ====


Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba [http://www.hindawi.com/journals/ivp/2011/163682/ Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance]  
Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba <br> [http://www.hindawi.com/journals/ivp/2011/163682/ Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance]  


Alexander Artikis and Georgios Paliouras [http://arxiv.org/pdf/0905.4614v1 A Logic Programming Approach to Behaviour Recognition]  
Alexander Artikis and Georgios Paliouras <br> [http://arxiv.org/pdf/0905.4614v1 A Logic Programming Approach to Behaviour Recognition]  


T.P. Pushpavath ''et al''. [http://arxiv.org/pdf/1002.3011v1 GPRS Video Streaming Surveillance System GVS]  
T.P. Pushpavath ''et al''. <br> [http://arxiv.org/pdf/1002.3011v1 GPRS Video Streaming Surveillance System GVS]  


Renzo De Nard ''et al.'' [http://cogprints.org/5569/1/bristoluav21.pdf SwarMAV: A Swarm of Miniature Aerial Vehicles]  
Renzo De Nard ''et al.'' <br> [http://cogprints.org/5569/1/bristoluav21.pdf SwarMAV: A Swarm of Miniature Aerial Vehicles]  


<br>  
<br>  
Line 37: Line 37:
==== &nbsp;'''Monitoring Bodies: Surveilling Health&nbsp;'''  ====
==== &nbsp;'''Monitoring Bodies: Surveilling Health&nbsp;'''  ====


Daniel Chandramohan ''et al''. [http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.0050057 Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers]  
Daniel Chandramohan ''et al''. <br> [http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.0050057 Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers]  


Alireza Taravat Najafabad ''et al''. [http://cogprints.org/6972/1/2009-4-4.pdf Web GIS and Public Health]  
Alireza Taravat Najafabad ''et al''. <br> [http://cogprints.org/6972/1/2009-4-4.pdf Web GIS and Public Health]  


Stuart Rennie ''et al''. [http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.1000004 Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns]  
Stuart Rennie ''et al''. <br> [http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.1000004 Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns]  


Emily Chan ''et al''. [http://www.plosntds.org/article/info:doi/10.1371/journal.pntd.0001206 Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance]  
Emily Chan ''et al''. <br> [http://www.plosntds.org/article/info:doi/10.1371/journal.pntd.0001206 Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance]  


<br>  
<br>  
Line 49: Line 49:
==== &nbsp;'''Judging Privacy: Legal Issues&nbsp;'''  ====
==== &nbsp;'''Judging Privacy: Legal Issues&nbsp;'''  ====


Samuel D. Warren, Louis D. Brandeis [http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html The Right to Privacy]  
Samuel D. Warren, Louis D. Brandeis <br> [http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html The Right to Privacy]  


Daniel J. Solove [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=990030 Data Mining and the Security-Liberty Debate]  
Daniel J. Solove <br> [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=990030 Data Mining and the Security-Liberty Debate]  


Omer Tene [http://epubs.utah.edu/index.php/ulr/article/viewArticle/136 What Google Knows: Privacy and Internet Search Engines]  
Omer Tene <br> [http://epubs.utah.edu/index.php/ulr/article/viewArticle/136 What Google Knows: Privacy and Internet Search Engines]  


Paul Ohm [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1261344 The Rise and Fall of Invasive ISP Surveillance]  
Paul Ohm <br> [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1261344 The Rise and Fall of Invasive ISP Surveillance]  


<br>  
<br>  
Line 61: Line 61:
==== &nbsp;'''Appendix: How It Works&nbsp;'''  ====
==== &nbsp;'''Appendix: How It Works&nbsp;'''  ====


Emily Steel [http://online.wsj.com/article/SB10001424052702304410504575560243259416072.html A Web Pioneer Profiles Users by Name]  
Emily Steel <br> [http://online.wsj.com/article/SB10001424052702304410504575560243259416072.html A Web Pioneer Profiles Users by Name]  


The Wall Street Journal [http://s.wsj.net/public/resources/documents/st_RAPLEAF_20101018.html Cracking the Code]  
The Wall Street Journal<br>  [http://s.wsj.net/public/resources/documents/st_RAPLEAF_20101018.html Cracking the Code]  


Ted Morgan [http://www.youtube.com/watch?v=bIJyWi9YsYU Location makes mobile Mobile] <youtube>bIJyWi9YsYU</youtube>  
Ted Morgan<br>  [http://www.youtube.com/watch?v=bIJyWi9YsYU Location makes mobile Mobile]<br>  <youtube>bIJyWi9YsYU</youtube> <br>  


<br> David Bond [http://erasingdavid.com/ Erasing David]  
David Bond <br> [http://erasingdavid.com/ Erasing David]  


Ondi Timoner [http://www.hulu.com/watch/192218/we-live-in-public We Live in Public]  
Ondi Timoner<br> [http://www.hulu.com/watch/192218/we-live-in-public We Live in Public]  


<br>  
<br>  

Revision as of 21:00, 6 September 2011

SurveillanceCover1.jpg
SurveillanceCover1.jpg

 Edited by David Parry 

 Introduction: Ubiquitous Mobile Persistent Surveillance

In 1996 when John Perry Bartlow wrote A Cyberspace Independence Declaration, internet pioneers hoped that the online world Bartlow was describing would come to pass. While Bartlow’s rhetoric was admittedly 'grandiose,' his central claim, that the internet was a place of freedom separate from the limits of the physical world, reflected the utopic atmosphere of the time. The technological revolution, in particular the rise of the digital network, seemed to point to a future 'where anyone, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity' (Bartlow, 1996). While not everyone in the late 90s could be characterized as a cyberutopian, the dominant mood harbored a sense that the digital network would bring with it newfound, unregulatable freedoms. More


  Knowing Everything: Data Mining  

Daniel Gayo-Avello
All Liaisons are Dangerous When All Your Friends Are Known to Us

Sang Hoon Lee
Googling Social Interactions: Web Search Engine Based Social Network Construction

Mahnoosh Khloghi and Mohammadreza Keyvanpour
An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements

Tamer Abuhmed et al.
A Survey on Deep Packet Inspection for Intrusion Detection System


 Somebody is Watching You: Video Surveillance 

Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba
Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance

Alexander Artikis and Georgios Paliouras
A Logic Programming Approach to Behaviour Recognition

T.P. Pushpavath et al.
GPRS Video Streaming Surveillance System GVS

Renzo De Nard et al.
SwarMAV: A Swarm of Miniature Aerial Vehicles


 Monitoring Bodies: Surveilling Health 

Daniel Chandramohan et al.
Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers

Alireza Taravat Najafabad et al.
Web GIS and Public Health

Stuart Rennie et al.
Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns

Emily Chan et al.
Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance


 Judging Privacy: Legal Issues 

Samuel D. Warren, Louis D. Brandeis
The Right to Privacy

Daniel J. Solove
Data Mining and the Security-Liberty Debate

Omer Tene
What Google Knows: Privacy and Internet Search Engines

Paul Ohm
The Rise and Fall of Invasive ISP Surveillance


 Appendix: How It Works 

Emily Steel
A Web Pioneer Profiles Users by Name

The Wall Street Journal
Cracking the Code

Ted Morgan
Location makes mobile Mobile

David Bond
Erasing David

Ondi Timoner
We Live in Public


 Attributions 

Attributions