Ubiquitous Surveillance: Difference between revisions
Academicdave (talk | contribs) No edit summary |
Academicdave (talk | contribs) No edit summary |
||
Line 3: | Line 3: | ||
=== '''Introduction''' === | === '''Introduction''' === | ||
Surveillance. -David Parry | Surveillance. -David Parry<br> | ||
<br> | |||
=== Data Mining === | === Data Mining === | ||
Line 30: | Line 18: | ||
[http://arxiv.org/pdf/0905.4614v1 "A Logic Programming Approach to Behaviour Recognition."] -Alexander Artikis and Georgios Paliouras | [http://arxiv.org/pdf/0905.4614v1 "A Logic Programming Approach to Behaviour Recognition."] -Alexander Artikis and Georgios Paliouras | ||
=== '''Surveilling Health''' === | === '''Surveilling Health''' === | ||
Line 35: | Line 25: | ||
[http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.0050057 "Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers."] -Daniel Chandramohan et al. | [http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.0050057 "Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers."] -Daniel Chandramohan et al. | ||
[http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.1000004 "Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns."] -Stuart Rennie et al.<br> | [http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.1000004 "Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns."] -Stuart Rennie et al.<br> | ||
"[http://www.plosntds.org/article/info:doi/10.1371/journal.pntd.0001206 Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance.]" -Emily Chan et al. | |||
=== Legal === | === Legal === | ||
Line 43: | Line 35: | ||
[http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html "The Right to Privacy."] Warren and Brandeis | [http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html "The Right to Privacy."] Warren and Brandeis | ||
<br> | |||
=== '''Appendix: How It Works''' === | |||
[http://online.wsj.com/article/SB10001424052702304410504575560243259416072.html "A Web Pioneer Profiles Users by Name."] & [http://s.wsj.net/public/resources/documents/st_RAPLEAF_20101018.html "Cracking the Code."] -Emily Steel. Wall Street Journal explanation of web based tracking.<br>[http://www.youtube.com/watch?v=bIJyWi9YsYU "Location makes mobile Mobile"] - Ted Morgan. Video presentation on Skyhook location service.<br> | |||
"A Web Pioneer Profiles Users by Name." & "Cracking the Code." -Emily Steel. |
Revision as of 14:52, 27 July 2011
Introduction
Surveillance. -David Parry
Data Mining
"All Liaisons are Dangerous When All Your Friends Are Known to Us." -Daniel Gayo-Avello
"An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements." -Mahnoosh Khloghi and Mohammadreza Keyvanpour.
Video
"Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance." -Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba
"A Logic Programming Approach to Behaviour Recognition." -Alexander Artikis and Georgios Paliouras
Surveilling Health
"Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers." -Daniel Chandramohan et al.
"Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns." -Stuart Rennie et al.
"Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance." -Emily Chan et al.
Legal
"The Right to Privacy." Warren and Brandeis
Appendix: How It Works
"A Web Pioneer Profiles Users by Name." & "Cracking the Code." -Emily Steel. Wall Street Journal explanation of web based tracking.
"Location makes mobile Mobile" - Ted Morgan. Video presentation on Skyhook location service.