Ubiquitous Surveillance: Difference between revisions

No edit summary
No edit summary
Line 5: Line 5:
Surveillance. -David Parry<br>  
Surveillance. -David Parry<br>  


=== '''Knowing Everything''' ===
=== '''Knowing Everything''' ===


=== [http://arxiv.org/pdf/1012.5913v1 "All Liaisons are Dangerous When All Your Friends Are Known to Us."]<font class="Apple-style-span" size="2"><span class="Apple-style-span" style="font-weight: normal;"> -Daniel Gayo-Avello</span></font> ===
[http://arxiv.org/pdf/1012.5913v1 "All Liaisons are Dangerous When All Your Friends Are Known to Us."] -Daniel Gayo-Avello  


[http://arxiv.org/pdf/1105.1950v1 "An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements."] -Mahnoosh Khloghi and Mohammadreza Keyvanpour.  
[http://arxiv.org/pdf/1105.1950v1 "An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements."] -Mahnoosh Khloghi and Mohammadreza Keyvanpour.  
Line 17: Line 17:
<br>  
<br>  


=== '''Somebody is Watching You''' ===
=== '''Somebody is Watching You''' ===


[http://www.hindawi.com/journals/ivp/2011/163682/ "Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance."] -Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba  
[http://www.hindawi.com/journals/ivp/2011/163682/ "Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance."] -Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba  
Line 41: Line 41:
<br>  
<br>  


=== '''The Legal Issues''' ===
=== '''The Legal Issues''' ===


[http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html "The Right to Privacy."] Warren and Brandeis  
[http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html "The Right to Privacy."] Warren and Brandeis  

Revision as of 15:26, 1 August 2011

SurveillanceCover1.jpg
SurveillanceCover1.jpg

Introduction

Surveillance. -David Parry

Knowing Everything

"All Liaisons are Dangerous When All Your Friends Are Known to Us." -Daniel Gayo-Avello

"An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements." -Mahnoosh Khloghi and Mohammadreza Keyvanpour.

"Googling Social Interactions: Web Search Engine Based Social Network Construction." -Sang Hoon Lee.

"A Survey on Deep Packet Inspection for Intrusion Detection System." Tamer Abuhmed et al.


Somebody is Watching You

"Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance." -Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba

"A Logic Programming Approach to Behaviour Recognition." -Alexander Artikis and Georgios Paliouras

"GPRS Video Streaming Surveillance System GVS."-T.P. Pushpavath et al.

"SwarMAV: A Swarm of Miniature Aerial Vehicles"-Renzo De Nard et al.


Surveilling Health

"Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers." -Daniel Chandramohan et al.

"Web GIS and Public Health."-Alireza Taravat Najafabad et al.

"Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns." -Stuart Rennie et al.

"Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance." -Emily Chan et al.


The Legal Issues

"The Right to Privacy." Warren and Brandeis

"Data Mining and the Security-Liberty Debate." Daniel J. Solove

"What Google Knows: Privacy and Internet Search Engines." -Omer Tene

"The Rise and Fall of Invasive ISP Surveillance." -Paul Ohm


Appendix: How It Works

"A Web Pioneer Profiles Users by Name." & "Cracking the Code." -Emily Steel. Wall Street Journal explanation of web based tracking.
"Location makes mobile Mobile" - Ted Morgan. Video presentation on Skyhook location service.