Ubiquitous Surveillance: Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
[[Image:SurveillanceCover1.jpg|right|318x450px|SurveillanceCover1.jpg]]__TOC__ | [[Image:SurveillanceCover1.jpg|right|318x450px|SurveillanceCover1.jpg]]__TOC__ | ||
== | == '''Introduction''' == | ||
[http://www.livingbooksaboutlife.org/books/Surveillance/Introduction Ubiquitous Mobile Persistent Surveillance.] -David Parry<br> | [http://www.livingbooksaboutlife.org/books/Surveillance/Introduction Ubiquitous Mobile Persistent Surveillance.] -David Parry<br> | ||
Line 9: | Line 9: | ||
=== '''Knowing Everything: Data Mining''' === | === '''Knowing Everything: Data Mining''' === | ||
Daniel Gayo-Avello | Daniel Gayo-Avello [http://arxiv.org/pdf/1012.5913v1 All Liaisons are Dangerous When All Your Friends Are Known to Us] | ||
[http://arxiv.org/pdf/1012.5913v1 All Liaisons are Dangerous When All Your Friends Are Known to Us] | |||
Sang Hoon Lee | Sang Hoon Lee [http://www.plosone.org/article/info:doi/10.1371/journal.pone.0011233 Googling Social Interactions: Web Search Engine Based Social Network Construction] | ||
[http://www.plosone.org/article/info:doi/10.1371/journal.pone.0011233 Googling Social Interactions: Web Search Engine Based Social Network Construction] | |||
Mahnoosh Khloghi and Mohammadreza Keyvanpour [http://arxiv.org/pdf/1105.1950v1 An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements] | |||
Mahnoosh Khloghi and Mohammadreza Keyvanpour | |||
[http://arxiv.org/pdf/1105.1950v1 An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements] | Tamer Abuhmed ''et al''. [http://arxiv.org/pdf/0803.0037v1 A Survey on Deep Packet Inspection for Intrusion Detection System] | ||
Tamer Abuhmed ''et al''. | |||
[http://arxiv.org/pdf/0803.0037v1 A Survey on Deep Packet Inspection for Intrusion Detection System] | |||
<br> | <br> | ||
Line 25: | Line 21: | ||
=== ''Somebody is Watching You: Video Surveillance'' === | === ''Somebody is Watching You: Video Surveillance'' === | ||
Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba | Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba [http://www.hindawi.com/journals/ivp/2011/163682/ Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance] | ||
[http://www.hindawi.com/journals/ivp/2011/163682/ Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance] | |||
Alexander Artikis and Georgios Paliouras | Alexander Artikis and Georgios Paliouras [http://arxiv.org/pdf/0905.4614v1 A Logic Programming Approach to Behaviour Recognition] | ||
[http://arxiv.org/pdf/0905.4614v1 A Logic Programming Approach to Behaviour Recognition] | |||
T.P. Pushpavath ''et al''. | T.P. Pushpavath ''et al''. [http://arxiv.org/pdf/1002.3011v1 GPRS Video Streaming Surveillance System GVS] | ||
[http://arxiv.org/pdf/1002.3011v1 GPRS Video Streaming Surveillance System GVS] | |||
Renzo De Nard ''et al.'' | Renzo De Nard ''et al.'' [http://cogprints.org/5569/1/bristoluav21.pdf SwarMAV: A Swarm of Miniature Aerial Vehicles] | ||
[http://cogprints.org/5569/1/bristoluav21.pdf SwarMAV: A Swarm of Miniature Aerial Vehicles] | |||
<br> | <br> | ||
Line 41: | Line 33: | ||
=== ''Monitoring Bodies: Surveilling Health'' === | === ''Monitoring Bodies: Surveilling Health'' === | ||
Daniel Chandramohan ''et al''. | Daniel Chandramohan ''et al''. [http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.0050057 Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers] | ||
[http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.0050057 Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers] | |||
Alireza Taravat Najafabad ''et al''. | Alireza Taravat Najafabad ''et al''. [http://cogprints.org/6972/1/2009-4-4.pdf Web GIS and Public Health] | ||
[http://cogprints.org/6972/1/2009-4-4.pdf Web GIS and Public Health] | |||
Stuart Rennie ''et al''. | Stuart Rennie ''et al''. [http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.1000004 Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns] | ||
[http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.1000004 Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns] | |||
Emily Chan ''et al''. | Emily Chan ''et al''. [http://www.plosntds.org/article/info:doi/10.1371/journal.pntd.0001206 Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance] | ||
[http://www.plosntds.org/article/info:doi/10.1371/journal.pntd.0001206 Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance] | |||
<br> | <br> | ||
Line 57: | Line 45: | ||
=== ''Judging Privacy: Legal Issues'' === | === ''Judging Privacy: Legal Issues'' === | ||
Samuel D. Warren, Louis D. Brandeis | Samuel D. Warren, Louis D. Brandeis [http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html The Right to Privacy] | ||
[http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html The Right to Privacy] | |||
Daniel J. Solove | Daniel J. Solove [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=990030 Data Mining and the Security-Liberty Debate] | ||
[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=990030 Data Mining and the Security-Liberty Debate] | |||
Omer Tene | Omer Tene [http://epubs.utah.edu/index.php/ulr/article/viewArticle/136 What Google Knows: Privacy and Internet Search Engines] | ||
[http://epubs.utah.edu/index.php/ulr/article/viewArticle/136 What Google Knows: Privacy and Internet Search Engines] | |||
Paul Ohm | Paul Ohm [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1261344 The Rise and Fall of Invasive ISP Surveillance] | ||
[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1261344 The Rise and Fall of Invasive ISP Surveillance] | |||
<br> | <br> | ||
Line 73: | Line 57: | ||
=== '''Appendix: How It Works''' === | === '''Appendix: How It Works''' === | ||
Emily Steel | Emily Steel [http://online.wsj.com/article/SB10001424052702304410504575560243259416072.html A Web Pioneer Profiles Users by Name] | ||
[http://online.wsj.com/article/SB10001424052702304410504575560243259416072.html A Web Pioneer Profiles Users by Name | |||
The Wall Street Journal [http://s.wsj.net/public/resources/documents/st_RAPLEAF_20101018.html Cracking the Code] | |||
[http:// | |||
Ted Morgan [http://www.youtube.com/watch?v=bIJyWi9YsYU Location makes mobile Mobile] <youtube>bIJyWi9YsYU</youtube> | |||
David Bond | <br> David Bond [http://erasingdavid.com/ Erasing David] | ||
[http://erasingdavid.com/ Erasing David] | |||
Ondi Timoner | Ondi Timoner [http://www.hulu.com/watch/192218/we-live-in-public We Live in Public] | ||
[http://www.hulu.com/watch/192218/we-live-in-public We Live in Public] | |||
<br> | <br> | ||
=== '''Attributions''' === | === '''Attributions''' === | ||
[http://www.livingbooksaboutlife.org/books/Surveillance/Attributions Attributions] | [http://www.livingbooksaboutlife.org/books/Surveillance/Attributions Attributions] |
Revision as of 13:14, 6 September 2011
Introduction
Ubiquitous Mobile Persistent Surveillance. -David Parry
Live Surveillance Table of Contents.
Knowing Everything: Data Mining
Daniel Gayo-Avello All Liaisons are Dangerous When All Your Friends Are Known to Us
Sang Hoon Lee Googling Social Interactions: Web Search Engine Based Social Network Construction
Mahnoosh Khloghi and Mohammadreza Keyvanpour An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements
Tamer Abuhmed et al. A Survey on Deep Packet Inspection for Intrusion Detection System
Somebody is Watching You: Video Surveillance
Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance
Alexander Artikis and Georgios Paliouras A Logic Programming Approach to Behaviour Recognition
T.P. Pushpavath et al. GPRS Video Streaming Surveillance System GVS
Renzo De Nard et al. SwarMAV: A Swarm of Miniature Aerial Vehicles
Monitoring Bodies: Surveilling Health
Daniel Chandramohan et al. Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers
Alireza Taravat Najafabad et al. Web GIS and Public Health
Stuart Rennie et al. Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns
Emily Chan et al. Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance
Judging Privacy: Legal Issues
Samuel D. Warren, Louis D. Brandeis The Right to Privacy
Daniel J. Solove Data Mining and the Security-Liberty Debate
Omer Tene What Google Knows: Privacy and Internet Search Engines
Paul Ohm The Rise and Fall of Invasive ISP Surveillance
Appendix: How It Works
Emily Steel A Web Pioneer Profiles Users by Name
The Wall Street Journal Cracking the Code
Ted Morgan Location makes mobile Mobile
David Bond Erasing David
Ondi Timoner We Live in Public