نتایج جستجو برای: privacy and surveillance
تعداد نتایج: 16846830 فیلتر نتایج به سال:
An objective and subjective evaluation of content-based privacy protection of face images in video surveillance systems using JPEG XR Hosik Sohn, Dohyoung Lee, Wesley De Neve, Konstantinos N. Plataniotis, and Yong Man Ro Image and Video Systems Lab, Department of Electrical Engineering, Korea Advanced Institute of Science and Technology (KAIST), Yuseong-gu, Daejeon, 305-701, Korea Multimedia La...
this study investigated cross-cultural differences in the privacy regulation and perception of crowding amongtwo iranian sub-cultures (kurdish and northern women).the primary purpose of this study was to examine whether northern and kurdish women differed in their desired and achieved levels of privacy in parks. the second purpose of this study was to investigate the relationships between the d...
this study investigated cross-cultural differences in the privacy regulation and perception of crowding amongtwo iranian sub-cultures (kurdish and northern women).the primary purpose of this study was to examine whether northern and kurdish women differed in their desired and achieved levels of privacy in parks. the second purpose of this study was to investigate the relationships between the d...
George Orwell's 'Big Brother' and Michel Foucault's 'panopticon' have dominated discussion of contemporary developments in surveillance. While such metaphors draw our attention to important attributes of surveillance, they also miss some recent dynamics in its operation. The work of Gilles Deleuze and Felix Guattari is used to analyse the convergence of once discrete surveillance systems. The r...
Personal sensing devices are becoming more commonplace in everyday life. Unfortunately, radio transmissions from these devices can create unexpected privacy concerns if not carefully designed. We demonstrate these issues with a widely-available commercial product, the Nike+iPod Sport Kit, which contains a sensor that users put in one of their shoes and a receiver that users attach to their iPod...
Industrial-size data spills, leaks about large-scale secret surveillance programs, and personal tragedies due to inappropriate flows of information are guaranteed to have at least one consequence: engineers will be increasingly expected to integrate privacy solutions into the systems they are building or maintaining (see, e.g., [1]. Yet, the task of engineering systems to address privacy concer...
vehicle safety communications protocols security and privacy vehicle safety communications security bme-hit vehicle safety communications protocols security and security and privacy for a connected vehicle environment surveillance, privacy and the ethics of vehicle safety surveillance, privacy and the ethics of vehicle safety personal information and the design of vehicle safety vehicle safety ...
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
In 2015, Edward Snowden recommended that ordinary citizens use adblocking software and an encryption-oriented privacy extension for their web browser to protect against surveillance. This paper critically explores how the development of browsers can be situated in relation advocacy. Privacy advocates are individuals who act on behalf citizenry speak governments corporations about our data colle...
The conflict between security and privacy has become a growing concern for the public, especially with the recent employment of large-scale video analysis technologies for surveillance purposes. Although researchers have developed many obscuring algorithms to protect the identities of subjects in the surveillance videos, they have rarely addressed the problem of how we can protect a subject’s p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید