Ubiquitous Surveillance: Difference between revisions

No edit summary
No edit summary
Line 12: Line 12:


[http://www.plosone.org/article/info%3Adoi%2F10.1371%2Fjournal.pone.0011233 "Googling Social Interactions: Web Search Engine Based Social Network Construction."] -Sang Hoon Lee.  
[http://www.plosone.org/article/info%3Adoi%2F10.1371%2Fjournal.pone.0011233 "Googling Social Interactions: Web Search Engine Based Social Network Construction."] -Sang Hoon Lee.  
[http://arxiv.org/pdf/0803.0037v1 "A Survey on Deep Packet Inspection for Intrusion Detection System."] Tamer Abuhmed et al.


<br>  
<br>  
Line 41: Line 43:
[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=990030 "Data Mining and the Security-Liberty Debate."] Daniel J. Solove  
[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=990030 "Data Mining and the Security-Liberty Debate."] Daniel J. Solove  


[http://epubs.utah.edu/index.php/ulr/article/viewArticle/136 "What Google Knows: Privacy and Internet Search Engines."] -Omer Tene
[http://epubs.utah.edu/index.php/ulr/article/viewArticle/136 "What Google Knows: Privacy and Internet Search Engines."] -Omer Tene  


[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1261344 "The Rise and Fall of Invasive ISP Surveillance."] -Paul Ohm
[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1261344 "The Rise and Fall of Invasive ISP Surveillance."] -Paul Ohm  


<br>  
<br>  

Revision as of 15:39, 27 July 2011

SurveillanceCover1.jpg
SurveillanceCover1.jpg

Introduction

Surveillance. -David Parry

Data Mining

"All Liaisons are Dangerous When All Your Friends Are Known to Us." -Daniel Gayo-Avello

"An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements." -Mahnoosh Khloghi and Mohammadreza Keyvanpour.

"Googling Social Interactions: Web Search Engine Based Social Network Construction." -Sang Hoon Lee.

"A Survey on Deep Packet Inspection for Intrusion Detection System." Tamer Abuhmed et al.


Video

"Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance." -Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba

"A Logic Programming Approach to Behaviour Recognition." -Alexander Artikis and Georgios Paliouras

"GPRS Video Streaming Surveillance System GVS."-T.P. Pushpavath et al.


Surveilling Health

"Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers." -Daniel Chandramohan et al.

"Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns." -Stuart Rennie et al.

"Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance." -Emily Chan et al.


Legal

"The Right to Privacy." Warren and Brandeis

"Data Mining and the Security-Liberty Debate." Daniel J. Solove

"What Google Knows: Privacy and Internet Search Engines." -Omer Tene

"The Rise and Fall of Invasive ISP Surveillance." -Paul Ohm


Appendix: How It Works

"A Web Pioneer Profiles Users by Name." & "Cracking the Code." -Emily Steel. Wall Street Journal explanation of web based tracking.
"Location makes mobile Mobile" - Ted Morgan. Video presentation on Skyhook location service.