Ubiquitous Surveillance: Difference between revisions
No edit summary  | 
				 (formatted headings)  | 
				||
| Line 1: | Line 1: | ||
[[Image:SurveillanceCover1.jpg|right|318x450px|SurveillanceCover1.jpg]]  | [[Image:SurveillanceCover1.jpg|right|318x450px|SurveillanceCover1.jpg]] ''Edited by'' David Parry    | ||
''Edited by'' David Parry    | |||
__TOC__    | __TOC__    | ||
= [http://www.livingbooksaboutlife.org/books/Surveillance/Introduction '''Introduction: Ubiquitous Mobile Persistent Surveillance'''] =  | |||
In 1996 when John Perry Bartlow wrote ''A Cyberspace Independence Declaration'', internet pioneers hoped that the online world Bartlow was describing would come to pass. While Bartlow’s rhetoric was admittedly 'grandiose,' his central claim, that the internet was a place of freedom separate from the limits of the physical world, reflected the utopic atmosphere of the time. The technological revolution, in particular the rise of the digital network, seemed to point to a future 'where anyone, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity' (Bartlow, 1996). While not everyone in the late 90s could be characterized as a cyberutopian, the dominant mood harbored a sense that the digital network would bring with it newfound, unregulatable freedoms. [http://www.livingbooksaboutlife.org/books/Surveillance/Introduction (more...)] <br><br>    | In 1996 when John Perry Bartlow wrote ''A Cyberspace Independence Declaration'', internet pioneers hoped that the online world Bartlow was describing would come to pass. While Bartlow’s rhetoric was admittedly 'grandiose,' his central claim, that the internet was a place of freedom separate from the limits of the physical world, reflected the utopic atmosphere of the time. The technological revolution, in particular the rise of the digital network, seemed to point to a future 'where anyone, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity' (Bartlow, 1996). While not everyone in the late 90s could be characterized as a cyberutopian, the dominant mood harbored a sense that the digital network would bring with it newfound, unregulatable freedoms. [http://www.livingbooksaboutlife.org/books/Surveillance/Introduction (more...)] <br><br>    | ||
= '''Knowing Everything: Data Mining'''  =  | |||
<br> Daniel Gayo-Avello<br> [http://arxiv.org/pdf/1012.5913v1 All Liaisons are Dangerous When All Your Friends Are Known to Us] <br><br> Sang Hoon Lee<br> [http://www.plosone.org/article/info:doi/10.1371/journal.pone.0011233 Googling Social Interactions: Web Search Engine Based Social Network Construction] <br><br> Mahnoosh Khloghi and Mohammadreza Keyvanpour<br> [http://arxiv.org/pdf/1105.1950v1 An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements] <br><br> Tamer Abuhmed ''et al''.<br> [http://arxiv.org/pdf/0803.0037v1 A Survey on Deep Packet Inspection for Intrusion Detection System] <br><br>    | <br> Daniel Gayo-Avello<br> [http://arxiv.org/pdf/1012.5913v1 All Liaisons are Dangerous When All Your Friends Are Known to Us] <br><br> Sang Hoon Lee<br> [http://www.plosone.org/article/info:doi/10.1371/journal.pone.0011233 Googling Social Interactions: Web Search Engine Based Social Network Construction] <br><br> Mahnoosh Khloghi and Mohammadreza Keyvanpour<br> [http://arxiv.org/pdf/1105.1950v1 An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements] <br><br> Tamer Abuhmed ''et al''.<br> [http://arxiv.org/pdf/0803.0037v1 A Survey on Deep Packet Inspection for Intrusion Detection System] <br><br>    | ||
= '''Somebody is Watching You: Video Surveillance'''  =  | |||
<br> Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba<br> [http://downloads.hindawi.com/journals/ivp/2011/163682.pdf Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance] <br><br> Alexander Artikis and Georgios Paliouras<br> [http://arxiv.org/pdf/0905.4614v1 A Logic Programming Approach to Behaviour Recognition] <br><br> T.P. Pushpavath ''et al''.<br> [http://arxiv.org/pdf/1002.3011v1 GPRS Video Streaming Surveillance System GVS] <br><br> Renzo De Nardi ''et al.''<br> [http://cogprints.org/5569/1/bristoluav21.pdf SwarMAV: A Swarm of Miniature Aerial Vehicles] <br><br>  | <br> Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba<br> [http://downloads.hindawi.com/journals/ivp/2011/163682.pdf Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance] <br><br> Alexander Artikis and Georgios Paliouras<br> [http://arxiv.org/pdf/0905.4614v1 A Logic Programming Approach to Behaviour Recognition] <br><br> T.P. Pushpavath ''et al''.<br> [http://arxiv.org/pdf/1002.3011v1 GPRS Video Streaming Surveillance System GVS] <br><br> Renzo De Nardi ''et al.''<br> [http://cogprints.org/5569/1/bristoluav21.pdf SwarMAV: A Swarm of Miniature Aerial Vehicles] <br><br>    | ||
= '''Monitoring Bodies: Surveilling Health'''  =  | |||
<br> Daniel Chandramohan ''et al''.<br> [http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.0050057 Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers] <br><br> Alireza Taravat Najafabad ''et al''.<br> [http://cogprints.org/6972/1/2009-4-4.pdf Web GIS and Public Health] <br><br> Stuart Rennie ''et al''.<br> [http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.1000004 Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns] <br><br> Emily Chan ''et al''.<br> [http://www.plosntds.org/article/info:doi/10.1371/journal.pntd.0001206 Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance] <br><br>    | <br> Daniel Chandramohan ''et al''.<br> [http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.0050057 Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers] <br><br> Alireza Taravat Najafabad ''et al''.<br> [http://cogprints.org/6972/1/2009-4-4.pdf Web GIS and Public Health] <br><br> Stuart Rennie ''et al''.<br> [http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.1000004 Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns] <br><br> Emily Chan ''et al''.<br> [http://www.plosntds.org/article/info:doi/10.1371/journal.pntd.0001206 Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance] <br><br>    | ||
= '''Judging Privacy: Legal Issues'''  =  | |||
<br> Samuel D. Warren, Louis D. Brandeis <br> [http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html The Right to Privacy] <br><br> Daniel J. Solove <br> [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=990030 Data Mining and the Security-Liberty Debate] <br><br> Omer Tene <br> [http://epubs.utah.edu/index.php/ulr/article/viewArticle/136 What Google Knows: Privacy and Internet Search Engines] <br><br> Paul Ohm <br> [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1261344 The Rise and Fall of Invasive ISP Surveillance] <br><br>    | <br> Samuel D. Warren, Louis D. Brandeis <br> [http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html The Right to Privacy] <br><br> Daniel J. Solove <br> [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=990030 Data Mining and the Security-Liberty Debate] <br><br> Omer Tene <br> [http://epubs.utah.edu/index.php/ulr/article/viewArticle/136 What Google Knows: Privacy and Internet Search Engines] <br><br> Paul Ohm <br> [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1261344 The Rise and Fall of Invasive ISP Surveillance] <br><br>    | ||
= '''Appendix: How It Works'''  =  | |||
<br> Emily Steel<br> [http://online.wsj.com/article/SB10001424052702304410504575560243259416072.html A Web Pioneer Profiles Users by Name] <br><br> The Wall Street Journal<br> [http://s.wsj.net/public/resources/documents/st_RAPLEAF_20101018.html Cracking the Code] <br><br> Ted Morgan<br> [http://www.youtube.com/watch?v=bIJyWi9YsYU Location Makes Mobile Mobile] <br><br> <youtube>bIJyWi9YsYU</youtube> <br><br> David Bond<br> [http://erasingdavid.com/ Erasing David]<br><br> Ondi Timoner<br> [http://www.hulu.com/watch/192218/we-live-in-public We Live in Public] <br>  | |||
= Attributions =  | |||
<br>   | <br> [http://www.livingbooksaboutlife.org/books/Surveillance/Attributions Attributions]<br>  | ||
[http://www.livingbooksaboutlife.org/books/Surveillance/Attributions Attributions]<br>  | |||
Revision as of 09:06, 29 September 2011

Edited by David Parry
Introduction: Ubiquitous Mobile Persistent Surveillance
In 1996 when John Perry Bartlow wrote A Cyberspace Independence Declaration, internet pioneers hoped that the online world Bartlow was describing would come to pass. While Bartlow’s rhetoric was admittedly 'grandiose,' his central claim, that the internet was a place of freedom separate from the limits of the physical world, reflected the utopic atmosphere of the time. The technological revolution, in particular the rise of the digital network, seemed to point to a future 'where anyone, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity' (Bartlow, 1996). While not everyone in the late 90s could be characterized as a cyberutopian, the dominant mood harbored a sense that the digital network would bring with it newfound, unregulatable freedoms. (more...) 
 
Knowing Everything: Data Mining
 Daniel Gayo-Avello
 All Liaisons are Dangerous When All Your Friends Are Known to Us 
 Sang Hoon Lee
 Googling Social Interactions: Web Search Engine Based Social Network Construction 
 Mahnoosh Khloghi and Mohammadreza Keyvanpour
 An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements 
 Tamer Abuhmed et al.
 A Survey on Deep Packet Inspection for Intrusion Detection System 
 
Somebody is Watching You: Video Surveillance
 Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba
 Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance 
 Alexander Artikis and Georgios Paliouras
 A Logic Programming Approach to Behaviour Recognition 
 T.P. Pushpavath et al.
 GPRS Video Streaming Surveillance System GVS 
 Renzo De Nardi et al.
 SwarMAV: A Swarm of Miniature Aerial Vehicles 
 
Monitoring Bodies: Surveilling Health
 Daniel Chandramohan et al.
 Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers 
 Alireza Taravat Najafabad et al.
 Web GIS and Public Health 
 Stuart Rennie et al.
 Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns 
 Emily Chan et al.
 Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance 
 
Judging Privacy: Legal Issues
 Samuel D. Warren, Louis D. Brandeis 
 The Right to Privacy 
 Daniel J. Solove 
 Data Mining and the Security-Liberty Debate 
 Omer Tene 
 What Google Knows: Privacy and Internet Search Engines 
 Paul Ohm 
 The Rise and Fall of Invasive ISP Surveillance 
 
Appendix: How It Works
 Emily Steel
 A Web Pioneer Profiles Users by Name 
 The Wall Street Journal
 Cracking the Code 
 Ted Morgan
 Location Makes Mobile Mobile 
  
 David Bond
 Erasing David
 Ondi Timoner
 We Live in Public