ABSTRACT
No abstract available.
- Janet M. Fulton and Marjorie D. Kibby. 2016. Millennials and the normalization on Facebook. Journal of Media & Cultural Studies, Volume 31, issue 2, p. 189-199Google Scholar
- Daniel Trottier. 2012. Interpersonal Surveillance on Social Media. Canadian Journal of Communication Vol 37 (2012), 319-332Google ScholarCross Ref
- H. Kim, Y. Cha, T. Kim and P. Kim. 2020. A Study on the Security Threats and Privacy Policy of Intelligent Video Surveillance System Considering 5G Network Architecture. In: 2020 International Conference on Electronics, Information, and Communication (ICEIC), pp. 1-4. DOI: https://doi.org/10.1109/ICEIC49074.2020.9051302Google ScholarCross Ref
- Robert Muggah. 2021. ‘Smart’ Cities Are Surveilled Cities. Foreign Policy. Retrieved from https://foreignpolicy.com/2021/04/17/smart-cities-surveillance-privacy-digital-threats-internet-of-things-5gGoogle Scholar
- Gemma Galdon-Clavell. 2013. (Not so) smart cities?: The drivers, impact and risks of surveillance-enabled smart environments. In: Science and Public Policy, Volume 40, Issue 6, December 2013, Pages 717–723. DOI: https://doi.org/10.1093/scipol/sct070Google ScholarCross Ref
Index Terms
- Your Shadow
Recommendations
Face Recognition Based Person Specific Identification for Video Surveillance Applications
WCI '15: Proceedings of the Third International Symposium on Women in Computing and InformaticsFace detection is an important aspect for applications like biometrics, video surveillance and human computer interaction. Videos provide abundant information and also that can be leveraged by temporal variations in pose, expression changes and ...
The sensitive nature of facial recognition: Tensions between the Swedish police and regulatory authorities1
Questioning Modern Surveillance Technologies: Ethical and Legal Challenges of Emerging Information and Communication TechnologiesEmerging technologies with artificial intelligence (AI) and machine learning are laying the foundation for surveillance capabilities of a magnitude never seen before. This article focuses on facial recognition, now rapidly introduced in many ...
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
AISec '09: Proceedings of the 2nd ACM workshop on Security and artificial intelligenceSocial networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, ser vices typically provide various privacy "knobs" that the user may adjust to ...
Comments