Ubiquitous Surveillance: Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
[[Image:SurveillanceCover1.jpg|right|318x450px|SurveillanceCover1.jpg]]__TOC__ | [[Image:SurveillanceCover1.jpg|right|318x450px|SurveillanceCover1.jpg]]__TOC__ | ||
=== ''Introduction'' === | === '''Introduction''' === | ||
[http://www.livingbooksaboutlife.org/books/Surveillance/Introduction Ubiquitous Mobile Persistent Surveillance.] -David Parry<br> | [http://www.livingbooksaboutlife.org/books/Surveillance/Introduction Ubiquitous Mobile Persistent Surveillance.] -David Parry<br> | ||
Line 7: | Line 7: | ||
Live Surveillance Table of Contents. | Live Surveillance Table of Contents. | ||
=== ''Knowing Everything: Data Mining'' === | === '''Knowing Everything: Data Mining''' === | ||
Daniel Gayo-Avello | Daniel Gayo-Avello | ||
Line 71: | Line 71: | ||
<br> | <br> | ||
=== ''Appendix: How It Works'' === | === '''Appendix: How It Works''' === | ||
Emily Steel | Emily Steel | ||
[http://online.wsj.com/article/SB10001424052702304410504575560243259416072.html A Web Pioneer Profiles Users by Name] | [http://online.wsj.com/article/SB10001424052702304410504575560243259416072.html A Web Pioneer Profiles Users by Name] | ||
The Wall Street Journal | |||
[http://s.wsj.net/public/resources/documents/st_RAPLEAF_20101018.html Cracking the Code] | [http://s.wsj.net/public/resources/documents/st_RAPLEAF_20101018.html Cracking the Code] | ||
Ted Morgan | |||
[http://www.youtube.com/watch?v=bIJyWi9YsYU Location makes mobile Mobile] | |||
<youtube>bIJyWi9YsYU</youtube> | |||
David Bond | |||
[http://erasingdavid.com/ Erasing David] | |||
Ondi Timoner | |||
[http://www.hulu.com/watch/192218/we-live-in-public We Live in Public] | |||
<br> | <br> | ||
=== '''Attributions''' | === '''Attributions''' === | ||
[http://www.livingbooksaboutlife.org/books/Surveillance/Attributions Attributions] | [http://www.livingbooksaboutlife.org/books/Surveillance/Attributions Attributions] |
Revision as of 13:12, 6 September 2011
Introduction
Ubiquitous Mobile Persistent Surveillance. -David Parry
Live Surveillance Table of Contents.
Knowing Everything: Data Mining
Daniel Gayo-Avello All Liaisons are Dangerous When All Your Friends Are Known to Us
Sang Hoon Lee Googling Social Interactions: Web Search Engine Based Social Network Construction
Mahnoosh Khloghi and Mohammadreza Keyvanpour An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements
Tamer Abuhmed et al. A Survey on Deep Packet Inspection for Intrusion Detection System
Somebody is Watching You: Video Surveillance
Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance
Alexander Artikis and Georgios Paliouras A Logic Programming Approach to Behaviour Recognition
T.P. Pushpavath et al. GPRS Video Streaming Surveillance System GVS
Renzo De Nard et al. SwarMAV: A Swarm of Miniature Aerial Vehicles
Monitoring Bodies: Surveilling Health
Daniel Chandramohan et al. Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers
Alireza Taravat Najafabad et al. Web GIS and Public Health
Stuart Rennie et al. Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns
Emily Chan et al. Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance
Judging Privacy: Legal Issues
Samuel D. Warren, Louis D. Brandeis The Right to Privacy
Daniel J. Solove Data Mining and the Security-Liberty Debate
Omer Tene What Google Knows: Privacy and Internet Search Engines
Paul Ohm The Rise and Fall of Invasive ISP Surveillance
Appendix: How It Works
Emily Steel A Web Pioneer Profiles Users by Name
The Wall Street Journal Cracking the Code
Ted Morgan Location makes mobile Mobile
David Bond
Erasing David
Ondi Timoner We Live in Public