Spelling suggestions: "subject:"[een] ELECTRONIC SURVEILLANCE"" "subject:"[enn] ELECTRONIC SURVEILLANCE""
61 |
Understanding Data Practices in Private Corporations : Analysis of Privacy Policies, Cookies Statements and “Dark Patterns”Mendes, Débora January 2022 (has links)
Introduction: We analyse the privacy policies of 15 private corporations to understand if the data handling practices – data collection, storage, and sharing –described in the policies are ethical or unethical. The data we leave behind when we use the Internet are crucial for corporations. The data provides valuable insights into our lives, thus helping corporations improve targeted marketing campaigns and increase their revenue. Method: Extensive literature review of peer-reviewed articles, written between1993 and 2021, to examine how theoretical perspectives and empirical findings evolved over time; combined with empirical research to analyse the privacy policies and “dark patterns” of 15 companies. The companies were chosen at random and belong to different sectors to give a broader understanding of the current privacy and data handling practices. Analysis: Discourse analysis of the privacy policies to evaluate the type of language used, if it is clear, easy to understand, and if the policy informs users about how their data are collected, shared, and stored. But also, a visual analysis to understand if the company is implementing “dark patterns”. Results: The results indicate that most privacy policies use misleading terms, are not fully transparent about the company’s data handling practices, and often implement “dark patterns” to try to influence the users’ decisions. Conclusion: Most companies have privacy policies available on their websites due to a clear influence from the GDPR legislation, however, there appears to be a conflicting relationship between wanting to comply with the GDPR and wanting to gather as much information as possible.
|
62 |
Cicero, money and the challenge of 'new terrorism' : is counter terrorist financing (CTF) a critical inhibitor? : should the emphasis on finance interventions prevail?Parker, Marc January 2014 (has links)
Much of the first generation literature on counter terrorist financing made sweeping generalisations and observations regarding these interventions based on relatively limited case study data. Given that the UK approach to counter terrorism clearly attests to the symbiosis between terrorism and money, this thesis evaluates the contemporary relevance of Cicero's aphorism that “the sinews of war are infinite money.” Drawing on a series of discussions and formal interviews with CTF practitioners into several of the most recent high profile terror attacks in the United Kingdom, it confirms a notable shift in terrorist financing methodology in recent years and underscores the trend towards increasing operational independence and financial autonomy. It thus considers the continuing centrality of money in the terrorism equation and has been framed specifically to examine the financing challenges posed by domestic terror cells in the UK, given the trend towards low cost terrorism with its emphasis on self sufficiency and the emergence of more discreet and ‘criminally sterile' funding methodologies. This thesis is primarily concerned with reviewing the efficacy of the UK counter terrorism-financing (CTF) model as perceived by practitioners, both in policy terms and in the context of operational outcomes. The increasing emphasis on new funding methodologies and the ensuing lack of visibility and opportunities for interdiction at the conspiracy phase of terrorist plots, further highlights the operational challenges posed for practitioners in confronting these ‘new' threats. As such, this research encourages several new perspectives, including a review of UK corporate knowledge on previous CTF interventions and consideration of military ‘threat finance' practice to deliver greater operational impact. In particular, it advocates a new focus on micro CTF interventions to address changes in the ‘economy of terror'. Finally, this thesis strongly attests to the continued relevance of finance or more specifically, the 'financial footprint' to inform and provide intelligence insight for counter terrorism responses generally. In doing so, it also considers the impact on privacy from increasingly intrusive financial and digital data collection and the trade-offs that inevitably emerge when liberty and security collide.
|
63 |
Classifying Pairwise Object Interactions: A Trajectory Analytics ApproachJanmohammadi, Siamak 05 1900 (has links)
We have a huge amount of video data from extensively available surveillance cameras and increasingly growing technology to record the motion of a moving object in the form of trajectory data. With proliferation of location-enabled devices and ongoing growth in smartphone penetration as well as advancements in exploiting image processing techniques, tracking moving objects is more flawlessly achievable. In this work, we explore some domain-independent qualitative and quantitative features in raw trajectory (spatio-temporal) data in videos captured by a fixed single wide-angle view camera sensor in outdoor areas. We study the efficacy of those features in classifying four basic high level actions by employing two supervised learning algorithms and show how each of the features affect the learning algorithms’ overall accuracy as a single factor or confounded with others.
|
64 |
Monitoramento eletrônico de penas e alternativas penais / Penal electronic monitoring and alternative sentencingCorrêa Junior, Alceu 09 April 2012 (has links)
A busca por alternativas à prisão é antiga, e a vigilância eletrônica surgiu como uma solução tecnológica. O contexto cultural dos Estados Unidos no fim do século XX propiciou o surgimento do monitoramento eletrônico, influenciado também pelo utilitarismo e pela cultura do controle do delito. O monitoramento deve respeitar os princípios do Estado Democrático de Direito (dignidade humana) e estar vinculado aos fins preventivos da pena (prevenção especial positiva). Por si só não reduz a população carcerária e não diminui a reincidência, mas as vantagens econômicas e os bons resultados obtidos por outros países não podem ser desprezados. Assim, a experiência estrangeira revela bons resultados no uso da vigilância junto a programas de acompanhamento social. No Brasil, o monitoramento eletrônico foi introduzido por lei na execução penal e como medida cautelar. Interessante seria que fosse estabelecido como modo de execução da prisão (alternativa aos estabelecimentos penitenciários). Poderia ser previsto ainda para a execução das penas restritivas de direitos que demandam fiscalização, consolidando um sistema alternativo de penas capaz de promover a prevenção e substituir o cárcere para delitos menores. O monitoramento eletrônico restringe direitos fundamentais e, assim, deve ser previsto em lei, limitado à restrição imposta, aplicado se necessário e com a menor visibilidade possível. / The search for alternatives to prison is old, and electronic surveillance has emerged as a technological solution. The cultural context of the United States at the end of the twentieth century has propitiated the emergence of electronic monitoring, also influenced by utilitarism and by the culture of offense control. Monitoring should respect the principles of Democratic Rule of Law (human dignity) and to be linked to the preventive purposes of sentence (positive special prevention). By itself it does not decrease the prison population and it does not reduce recidivism, but the economic gains and the good results obtained by other countries can not be ignored. Thus, foreign experience shows good results in the use of surveillance along with programs of social support. In Brazil, the electronic monitoring was introduced by law in criminal enforcement and as a precautionary measure. It would be interesting if it could be established as a way of prison enforcement (alternative to prisons). It could be also expected to enforce restrictive penalties of rights that require monitoring, consolidating an alternative system of penalties that can promote prevention and replace the prison for minor offenses. The electronic monitoring restricts fundamental rights and thus it should be provided by law, limited to the restriction, applied when it is necessary with the least visibility.
|
65 |
Detecção de movimentos suspeitos em seqüências de vídeoSoldera, John 28 February 2007 (has links)
Made available in DSpace on 2015-03-05T13:59:41Z (GMT). No. of bitstreams: 0
Previous issue date: 28 / Hewlett-Packard Brasil Ltda / É proposto neste trabalho novas técnicas para automatizar processos em vigilância eletrônica. A entrada (input) do algoritmo descrito são trajetórias das pessoas capturadas de seqüências de vídeo filmadas, as quais são utilizadas para definição de padrões de comportamentos de pedestres. O modelo proposto se baseia em dois critérios para a definição de comportamentos como usuais ou não-usuais: a ocupação espacial e as relações entre as pessoas. O critério de ocupação espacial inclui um determinado tempo de treinamento onde a cena é avaliada para gerar uma base de dados que contabiliza a ocupação espacial em cada região da cena. Através desta base de dados, novas trajetórias são classificadas como usuais ou não-usuais. As trajetórias usuais são aquelas coerentes com o banco de dados gerado pelo treinamento, correspondendo às áreas mais ocupadas, enquanto que as trajetórias não-usuais são aquelas nas quais andaram em regiões de baixa ocupação espacial. O critério das relações interpessoais utiliza Diagramas de V / It’s proposed in this work new techniques to automate processes in electronic surveillance systems. The input of the algorithm described is the trajectories of people captured from real filmed sequences, which are used to define pedestrian behavior patterns. The proposed model is based in two criteria to define behaviors as usual or unusual: spatial occupancy and relations among people. The spatial occupancy criterion includes a certain training period when the scene is evaluated in order to generate a database which accounts for the spatial occupancy in each scene region. Through this database, new trajectories are classified as usual or unusual. Usual trajectories are those coherent with the training database, corresponding to the most occupied areas; whereas unusual trajectories are those that occur in low spatial occupancy regions. The interpersonal relation analysis criterion employs Voronoi Diagrams in order to evaluate a set of parameters (such as distance between neighbors and other psychosocial char
|
66 |
Spatio-temporal data interpolation for dynamic scene analysisKim, Kihwan 06 January 2012 (has links)
Analysis and visualization of dynamic scenes is often constrained by the amount of spatio-temporal information available from the environment. In most scenarios, we have to account for incomplete information and sparse motion data, requiring us to employ interpolation and approximation methods to fill for the missing information. Scattered data interpolation and approximation techniques have been widely used for solving the problem of completing surfaces and images with incomplete input data. We introduce approaches for such data interpolation and approximation from limited sensors, into the domain of analyzing and visualizing dynamic scenes. Data from dynamic scenes is subject to constraints due to the spatial layout of the scene and/or the configurations of video cameras in use. Such constraints include: (1) sparsely available cameras observing the scene, (2) limited field of view provided by the cameras in use, (3) incomplete motion at a specific moment, and (4) varying frame rates due to different exposures and resolutions.
In this thesis, we establish these forms of incompleteness in the scene, as spatio-temporal uncertainties, and propose solutions for resolving the uncertainties by applying scattered data approximation into a spatio-temporal domain.
The main contributions of this research are as follows: First, we provide an efficient framework to visualize large-scale dynamic scenes from distributed static videos. Second, we adopt Radial Basis Function (RBF) interpolation to the spatio-temporal domain to generate global motion tendency. The tendency, represented by a dense flow field, is used to optimally pan and tilt a video camera. Third, we propose a method to represent motion trajectories using stochastic vector fields. Gaussian Process Regression (GPR) is used to generate a dense vector field and the certainty of each vector in the field. The generated stochastic fields are used for recognizing motion patterns under varying frame-rate and incompleteness of the input videos. Fourth, we also show that the stochastic representation of vector field can also be used for modeling global tendency to detect the region of interests in dynamic scenes with camera motion. We evaluate and demonstrate our approaches in several applications for visualizing virtual cities, automating sports broadcasting, and recognizing traffic patterns in surveillance videos.
|
67 |
Refractive conditions in Arabian Sea and their effects on ESM and airborne radar operationsKhan, Kamran. January 1990 (has links) (PDF)
Thesis (M.S. in Systems Engineering (Electronic Warfare))--Naval Postgraduate School, September 1990. / Thesis Advisor(s): Davidson, Kenneth L. ; Powell, James R. "September 1990." Description based on title screen as viewed on December 29, 2009. DTIC Descriptor(s): Frequency, Electronic Warfare, Aircraft, Airborne, Electronic Equipment, Microwave Equipment, Radar, Profiles, Ducts, Meteorology, Communication And Radio Systems, Refraction, Arabian Sea, Refractometers, Military Operations. DTIC Identifier(s): Radar interference, meteorological phenomena, theses. Author(s) subject terms: Refractivity, Arabian Sea refractive conditions, ESM airborne radar, airborne microwave refractometer (AMR), IREPS, EREPS. Includes bibliographical references (p. 96-97). Also available in print.
|
68 |
Vigil?ncia eletr?nica no trabalho banc?rio: do controle consentido ao totalitarismo corporativoCardoso, Monique Fonseca 06 December 2010 (has links)
Made available in DSpace on 2014-12-17T13:53:30Z (GMT). No. of bitstreams: 1
MoniqueFC_DISSERT.pdf: 1606877 bytes, checksum: e9226e11f44f0f8325e91e1d0a48ca0f (MD5)
Previous issue date: 2010-12-06 / This dissertation addresses the electronic surveillance theme in the banking context. The
research that originated it, which was held in an organization called for the fiction name
Banco Total, started from the following driving question: How do workers at a bank
perceive electronic surveillance at their process of work? The research s main objective
was to comprehend how workers perceive electronic surveillance at their process of work.
The study adopted an interdisciplinary perspective, having Management as the original field,
establishing a dialogue with others disciplines, like Philosophy and Sociology. About its
methodology, it s a qualitative research that addressed its object in oral (interviews with live
history elements) way. . Ten individuals were interviewed. The analytical process utilized the
hermeneutical-dialectics technique.. From the analyses (hermeneutics) of the data, the
following themes have emerged: (i) Acquiescence ; (ii) Monitoring; (iii) Time and Motion;
(iv) Fear; (v) Interdiction; and (vi) Resistance . From the discussion (dialectic) of the results,
this work presents three synthetic propositions that culminate in the following dimensions (i)
control; (ii) acquiescence; (iii) corporative totalitarianism. It can be concluded that electronic
surveillance is one mechanism of control emerged from the apply of technology at Total
Bank; that information technology has been improving the control mechanisms of
management theories; and that the imbrications between management and material
technology control mechanisms at a context where there is acquiescence by workers
contribute for the emergency of corporative totalitarianism components / Esta disserta??o aborda o tema vigil?ncia eletr?nica no contexto do trabalho banc?rio. A
pesquisa que lhe origina, realizada numa organiza??o ficticiamente chamada de Banco Total,
partiu da quest?o mobilizadora: Como os trabalhadores banc?rios percebem a vigil?ncia
eletr?nica em seu processo de trabalho? O objetivo geral da pesquisa foi compreender
como os trabalhadores do Banco Total percebem a vigil?ncia eletr?nica sobre o seu processo
de trabalho. Adotou-se uma perspectiva interdisciplinar, tomando a Administra??o como
campo origin?rio, e estabelecendo di?logo com outros campos, como a Filosofia e a
Sociologia. Metodologicamente, trata-se de uma pesquisa de natureza qualitativa, , para a qual
dez sujeitos foram entrevistados. Quanto ao processo anal?tico, a t?cnica utilizada foi a an?lise
hermen?utico-dial?tica,. Da an?lise (hermen?utica) dos dados, emergiram os seguintes temas:
(i) Aquiesc?ncia ; (ii) Monitoramento; (iii) Tempos e Movimentos; (iv) Medo; (v)
Interdi??o; e (vi) Resist?ncia . Da discuss?o (dial?tica) dos resultados, o trabalho apresenta
tr?s proposi??es sint?ticas, que culminam nas seguintes dimens?es-s?ntese da pesquisa: (i)
controle; (ii) aquiesc?ncia; (iii) totalitarismo corporativo. O trabalho conclui que a vigil?ncia
eletr?nica ? um dos mecanismos de controle, possibilitado pelo emprego da TI no Banco
Total; que a TI atualiza a TO, no que se refere ao controle do trabalho, na medida em que
aperfei?oa os mecanismos de controle; e que a imbrica??o entre os mecanismos de controle
das tecnologias gerenciais e das tecnologias materiais, em um contexto de aquiesc?ncia dos
trabalhadores, contribui para a emerg?ncia de um totalitarismo corporativo
|
69 |
Monitoramento eletrônico de penas e alternativas penais / Penal electronic monitoring and alternative sentencingAlceu Corrêa Junior 09 April 2012 (has links)
A busca por alternativas à prisão é antiga, e a vigilância eletrônica surgiu como uma solução tecnológica. O contexto cultural dos Estados Unidos no fim do século XX propiciou o surgimento do monitoramento eletrônico, influenciado também pelo utilitarismo e pela cultura do controle do delito. O monitoramento deve respeitar os princípios do Estado Democrático de Direito (dignidade humana) e estar vinculado aos fins preventivos da pena (prevenção especial positiva). Por si só não reduz a população carcerária e não diminui a reincidência, mas as vantagens econômicas e os bons resultados obtidos por outros países não podem ser desprezados. Assim, a experiência estrangeira revela bons resultados no uso da vigilância junto a programas de acompanhamento social. No Brasil, o monitoramento eletrônico foi introduzido por lei na execução penal e como medida cautelar. Interessante seria que fosse estabelecido como modo de execução da prisão (alternativa aos estabelecimentos penitenciários). Poderia ser previsto ainda para a execução das penas restritivas de direitos que demandam fiscalização, consolidando um sistema alternativo de penas capaz de promover a prevenção e substituir o cárcere para delitos menores. O monitoramento eletrônico restringe direitos fundamentais e, assim, deve ser previsto em lei, limitado à restrição imposta, aplicado se necessário e com a menor visibilidade possível. / The search for alternatives to prison is old, and electronic surveillance has emerged as a technological solution. The cultural context of the United States at the end of the twentieth century has propitiated the emergence of electronic monitoring, also influenced by utilitarism and by the culture of offense control. Monitoring should respect the principles of Democratic Rule of Law (human dignity) and to be linked to the preventive purposes of sentence (positive special prevention). By itself it does not decrease the prison population and it does not reduce recidivism, but the economic gains and the good results obtained by other countries can not be ignored. Thus, foreign experience shows good results in the use of surveillance along with programs of social support. In Brazil, the electronic monitoring was introduced by law in criminal enforcement and as a precautionary measure. It would be interesting if it could be established as a way of prison enforcement (alternative to prisons). It could be also expected to enforce restrictive penalties of rights that require monitoring, consolidating an alternative system of penalties that can promote prevention and replace the prison for minor offenses. The electronic monitoring restricts fundamental rights and thus it should be provided by law, limited to the restriction, applied when it is necessary with the least visibility.
|
70 |
National Security, Mass Surveillance, and Citizen Rights under Conditions of Protracted WarfareConniry, Krystal Lynn 26 September 2016 (has links)
This paper explores the complex relationship between securing the rights of citizens to privacy and national security priorities under conditions of government mass surveillance. The inquiry examines the conflict between those who support and those who stand in opposition of government surveillance, and is framed around the question of whether changes in technology and the concept of nationalism help inform our understanding of the increase in surveillance post-9/11. From a peace and conflict studies perspective, the work analyzes how the rise of nationalism in the post-9/11 era and the protracted wars against terrorism, in combination with the growth of technological power, have impacted the relationship between state-surveillance and democracy. Findings identify protracted warfare, technology and corporate profits as conflict drivers within the surveillance system, which gives rise to moral dilemmas and structural polarizations in the political culture and institutions of the state and society. The analysis concludes that these dilemmas systematically create an imbalance of power between the citizen to the state, and cannot be fully addressed unless the efficacy of war is critically questioned.
|
Page generated in 0.0311 seconds