Ubiquitous Surveillance: Difference between revisions
Academicdave (talk | contribs) No edit summary |
Academicdave (talk | contribs) No edit summary |
||
Line 3: | Line 3: | ||
=== '''Introduction''' === | === '''Introduction''' === | ||
Surveillance. -David Parry<br> | Surveillance. -David Parry<br> | ||
=== Data Mining === | === '''Data Mining''' === | ||
[http://arxiv.org/pdf/1012.5913v1 "All Liaisons are Dangerous When All Your Friends Are Known to Us."] -Daniel Gayo-Avello | [http://arxiv.org/pdf/1012.5913v1 "All Liaisons are Dangerous When All Your Friends Are Known to Us."] -Daniel Gayo-Avello | ||
Line 19: | Line 19: | ||
[http://arxiv.org/pdf/0905.4614v1 "A Logic Programming Approach to Behaviour Recognition."] -Alexander Artikis and Georgios Paliouras | [http://arxiv.org/pdf/0905.4614v1 "A Logic Programming Approach to Behaviour Recognition."] -Alexander Artikis and Georgios Paliouras | ||
<br> | |||
=== '''Surveilling Health''' === | === '''Surveilling Health''' === | ||
Line 29: | Line 29: | ||
"[http://www.plosntds.org/article/info:doi/10.1371/journal.pntd.0001206 Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance.]" -Emily Chan et al. | "[http://www.plosntds.org/article/info:doi/10.1371/journal.pntd.0001206 Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance.]" -Emily Chan et al. | ||
<br> | |||
=== '''Legal''' === | |||
=== Legal === | |||
[http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html "The Right to Privacy."] Warren and Brandeis | [http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html "The Right to Privacy."] Warren and Brandeis |
Revision as of 14:53, 27 July 2011
Introduction
Surveillance. -David Parry
Data Mining
"All Liaisons are Dangerous When All Your Friends Are Known to Us." -Daniel Gayo-Avello
"An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements." -Mahnoosh Khloghi and Mohammadreza Keyvanpour.
Video
"Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance." -Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba
"A Logic Programming Approach to Behaviour Recognition." -Alexander Artikis and Georgios Paliouras
Surveilling Health
"Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers." -Daniel Chandramohan et al.
"Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns." -Stuart Rennie et al.
"Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance." -Emily Chan et al.
Legal
"The Right to Privacy." Warren and Brandeis
Appendix: How It Works
"A Web Pioneer Profiles Users by Name." & "Cracking the Code." -Emily Steel. Wall Street Journal explanation of web based tracking.
"Location makes mobile Mobile" - Ted Morgan. Video presentation on Skyhook location service.