This Article 
 Bibliographic References 
 Add to: 
Dynamic Privacy in Public Surveillance
September 2009 (vol. 42 no. 9)
pp. 22-28
Simon Moncrieff, Curtin University of Technology
Svetha Venkatesh, Curtin University of Technology
Geoff A.W. West, Curtin University of Technology

1. A. Cavallaro, "Privacy in Video Surveillance," IEEE Signal Processing Magazine, Mar. 2007, pp. 168-169.
2. A. Senior et al., "Enabling Video Privacy through Computer Vision," IEEE Security and Privacy, May-June 2005, pp. 50-57.
3. V. Bellotti and A. Sellen, "Design for Privacy in Ubiquitous Computing Environments," Proc. 3rd European Conf. Computer-Supported Cooperative Work (ECSCW 93), Kluwer Academic Publishers, 1993, pp. 77-92.
4. S. Lederer et al., "Personal Privacy through Understanding and Action: Five Pitfalls for Designers," Personal Ubiquitous Computing, Nov. 2004, pp. 440-454.
5. J.T. Lehikoinen, J. Lehikoinen, and P. Huuskonen, "Understanding Privacy Regulation in Ubicomp Interactions," Personal and Ubiquitous Computing, Nov. 2008, pp. 543-553.
6. J.I. Hong and J.A. Landay, "An Architecture for Privacy-Sensitive Ubiquitous Computing," Proc. 2nd Int'l Conf. Mobile Systems, Applications, and Services (MobiSys 04), ACM Press, 2004, pp. 177-189.
7. J. Wickramasuriya et al., "Privacy-Protecting Data Collection in Media Spaces," Proc. 12th Ann. ACM Int'l Conf. Multimedia (Multimedia 04), ACM Press, 2004, pp. 48-55.
8. S. Lederer, A.K. Dey, and J. Mankoff, A Conceptual Model and a Metaphor of Everyday Privacy in Ubiquitous Computing Environments, tech. report UCB/CSD-2-1188, Computer Science Division (EECS), University of California, Berkeley, 2002.
9. X. Jiang, J.I. Hong, and J.A. Landay, "Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing," Proc. 4th Int'l Conf. Ubiquitous Computing (UbiComp 02), LNCS 2498, Springer-Verlag, 2002, pp. 176-193.
10. R. Lucky, "Zero Privacy," IEEE Spectrum, July 2008; internetzero-privacy.
11. Royal Academy of Eng., Dilemmas of Privacy and Surveillance: Challenges of Technological Change, tech. report, Mar. 2007, RAE; .pdf.
12. M. Gill and A. Spriggs, Assessing the Impact of CCTV, Home Office Research Study 292, Home Office Research, Development and Statistics Directorate, 2005; .
13. J. Kiemer et al., "Spybuster—A Community-Based Privacy Tagging Platform," Proc. 10th Int'l Conf. Human Computer Interaction with Mobile Devices and Services (MobileHCI 08) ACM Press, 2008, pp. 491-492.
14. O. Bowcott, "CCTV Boom Has Failed to Slash Crime, Say Police," The Guardian,6 May 2008; .
15. A. Cameron et al., Measuring the Effects of Video Surveillance on Crime in Los Angeles, tech. report CRB-08-007, 5 May 2008, School of Policy, Planning, and Development, Univ. of Southern California;
16. Transport for London, "Live CCTV Boost to Bus Safety,"22 Oct. 2008, Mayor of London; 10118.aspx.
17. P. Hennessy, "CCTV Camera Microphones to Be Axed," The Sunday Telegraph,27 Jan. 2008; .
18. "Video Surveillance," 18 Dec. 2007, Privacy International; www.privacyinternational.orgarticle.shtml?cmd[347]=x-347-559088&als[theme]=Video%20Surveillance .
19. F. Dufaux and T. Ebrahimi, "Scrambling for Video Surveillance with Privacy," Proc. 2006 Conf. Computer Vision and Pattern Recognition Workshop (CVPRW 06), IEEE CS Press, 2006, pp. 160-166.
20. M. Ballard, "Living Room CCTV Feed Encourages 'Inappropriate Watching,'" The Inquirer,30 Jan. 2008; shoreditch-cctv-encourages.

Index Terms:
Security and privacy, ubiquitous computing, Surveillance systems
Simon Moncrieff, Svetha Venkatesh, Geoff A.W. West, "Dynamic Privacy in Public Surveillance," Computer, vol. 42, no. 9, pp. 22-28, Sept. 2009, doi:10.1109/MC.2009.282
Usage of this product signifies your acceptance of the Terms of Use.