Ubiquitous Surveillance: Difference between revisions

No edit summary
No edit summary
Line 10: Line 10:


[http://arxiv.org/pdf/1105.1950v1 "An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements."] -Mahnoosh Khloghi and Mohammadreza Keyvanpour.  
[http://arxiv.org/pdf/1105.1950v1 "An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements."] -Mahnoosh Khloghi and Mohammadreza Keyvanpour.  
[http://www.plosone.org/article/info%3Adoi%2F10.1371%2Fjournal.pone.0011233 "Googling Social Interactions: Web Search Engine Based Social Network Construction."] -Sang Hoon Lee.


<br>  
<br>  
Line 19: Line 21:
[http://arxiv.org/pdf/0905.4614v1 "A Logic Programming Approach to Behaviour Recognition."] -Alexander Artikis and Georgios Paliouras  
[http://arxiv.org/pdf/0905.4614v1 "A Logic Programming Approach to Behaviour Recognition."] -Alexander Artikis and Georgios Paliouras  


[http://arxiv.org/pdf/1002.3011v1 "GPRS Video Streaming Surveillance System GVS."]-T.P. Pushpavath et al.
[http://arxiv.org/pdf/1002.3011v1 "GPRS Video Streaming Surveillance System GVS."]-T.P. Pushpavath et al.  


<br>  
<br>  
Line 36: Line 38:


[http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html "The Right to Privacy."] Warren and Brandeis  
[http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html "The Right to Privacy."] Warren and Brandeis  
[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=990030 "Data Mining and the Security-Liberty Debate."] Daniel J. Solove


<br>  
<br>  

Revision as of 15:15, 27 July 2011

SurveillanceCover1.jpg
SurveillanceCover1.jpg

Introduction

Surveillance. -David Parry

Data Mining

"All Liaisons are Dangerous When All Your Friends Are Known to Us." -Daniel Gayo-Avello

"An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements." -Mahnoosh Khloghi and Mohammadreza Keyvanpour.

"Googling Social Interactions: Web Search Engine Based Social Network Construction." -Sang Hoon Lee.


Video

"Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance." -Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba

"A Logic Programming Approach to Behaviour Recognition." -Alexander Artikis and Georgios Paliouras

"GPRS Video Streaming Surveillance System GVS."-T.P. Pushpavath et al.


Surveilling Health

"Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers." -Daniel Chandramohan et al.

"Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns." -Stuart Rennie et al.

"Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance." -Emily Chan et al.


Legal

"The Right to Privacy." Warren and Brandeis

"Data Mining and the Security-Liberty Debate." Daniel J. Solove


Appendix: How It Works

"A Web Pioneer Profiles Users by Name." & "Cracking the Code." -Emily Steel. Wall Street Journal explanation of web based tracking.
"Location makes mobile Mobile" - Ted Morgan. Video presentation on Skyhook location service.