نتایج جستجو برای: privacy and surveillance

تعداد نتایج: 16846830  

2013
Hosik Sohn Dohyoung Lee Wesley De Neve Konstantinos N. Plataniotis Yong Man Ro

An objective and subjective evaluation of content-based privacy protection of face images in video surveillance systems using JPEG XR Hosik Sohn, Dohyoung Lee, Wesley De Neve, Konstantinos N. Plataniotis, and Yong Man Ro Image and Video Systems Lab, Department of Electrical Engineering, Korea Advanced Institute of Science and Technology (KAIST), Yuseong-gu, Daejeon, 305-701, Korea Multimedia La...

Journal: :international journal of architecture and urban development 0
fatemeh mohammad niay gharaei ph.d. candidate, department of art and architecture, science and research branch, islamic azad university, tehran, iran.

this study investigated cross-cultural differences in the privacy regulation and perception of crowding amongtwo iranian sub-cultures (kurdish and northern women).the primary purpose of this study was to examine whether northern and kurdish women differed in their desired and achieved levels of privacy in parks. the second purpose of this study was to investigate the relationships between the d...

Journal: :international journal of architecture and urban development 2013
fatemeh mohammad niay gharaei

this study investigated cross-cultural differences in the privacy regulation and perception of crowding amongtwo iranian sub-cultures (kurdish and northern women).the primary purpose of this study was to examine whether northern and kurdish women differed in their desired and achieved levels of privacy in parks. the second purpose of this study was to investigate the relationships between the d...

Journal: :The British journal of sociology 2000
K D Haggerty R V Ericson

George Orwell's 'Big Brother' and Michel Foucault's 'panopticon' have dominated discussion of contemporary developments in surveillance. While such metaphors draw our attention to important attributes of surveillance, they also miss some recent dynamics in its operation. The work of Gilles Deleuze and Felix Guattari is used to analyse the convergence of once discrete surveillance systems. The r...

2006
T. Scott Saponas Jonathan Lester Carl Hartung Tadayoshi Kohno

Personal sensing devices are becoming more commonplace in everyday life. Unfortunately, radio transmissions from these devices can create unexpected privacy concerns if not carefully designed. We demonstrate these issues with a widely-available commercial product, the Nike+iPod Sport Kit, which contains a sensor that users put in one of their shoes and a receiver that users attach to their iPod...

2014
Seda Gürses

Industrial-size data spills, leaks about large-scale secret surveillance programs, and personal tragedies due to inappropriate flows of information are guaranteed to have at least one consequence: engineers will be increasingly expected to integrate privacy solutions into the systems they are building or maintaining (see, e.g., [1]. Yet, the task of engineering systems to address privacy concer...

2012
Luca Delgrossi Tao Zhang

vehicle safety communications protocols security and privacy vehicle safety communications security bme-hit vehicle safety communications protocols security and security and privacy for a connected vehicle environment surveillance, privacy and the ethics of vehicle safety surveillance, privacy and the ethics of vehicle safety personal information and the design of vehicle safety vehicle safety ...

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...

Journal: :surveillance and society 2022

In 2015, Edward Snowden recommended that ordinary citizens use adblocking software and an encryption-oriented privacy extension for their web browser to protect against surveillance. This paper critically explores how the development of browsers can be situated in relation advocacy. Privacy advocates are individuals who act on behalf citizenry speak governments corporations about our data colle...

2007
Datong Chen Rong Yan Jie Yang

The conflict between security and privacy has become a growing concern for the public, especially with the recent employment of large-scale video analysis technologies for surveillance purposes. Although researchers have developed many obscuring algorithms to protect the identities of subjects in the surveillance videos, they have rarely addressed the problem of how we can protect a subject’s p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید