The Community for Technology Leaders
RSS Icon
Issue No.09 - September (2009 vol.42)
pp: 22-28
Simon Moncrieff , Curtin University of Technology
Svetha Venkatesh , Curtin University of Technology
Geoff A.W. West , Curtin University of Technology
Security and privacy, ubiquitous computing, Surveillance systems
Simon Moncrieff, Svetha Venkatesh, Geoff A.W. West, "Dynamic Privacy in Public Surveillance", Computer, vol.42, no. 9, pp. 22-28, September 2009, doi:10.1109/MC.2009.282
1. A. Cavallaro, "Privacy in Video Surveillance," IEEE Signal Processing Magazine, Mar. 2007, pp. 168-169.
2. A. Senior et al., "Enabling Video Privacy through Computer Vision," IEEE Security and Privacy, May-June 2005, pp. 50-57.
3. V. Bellotti and A. Sellen, "Design for Privacy in Ubiquitous Computing Environments," Proc. 3rd European Conf. Computer-Supported Cooperative Work (ECSCW 93), Kluwer Academic Publishers, 1993, pp. 77-92.
4. S. Lederer et al., "Personal Privacy through Understanding and Action: Five Pitfalls for Designers," Personal Ubiquitous Computing, Nov. 2004, pp. 440-454.
5. J.T. Lehikoinen, J. Lehikoinen, and P. Huuskonen, "Understanding Privacy Regulation in Ubicomp Interactions," Personal and Ubiquitous Computing, Nov. 2008, pp. 543-553.
6. J.I. Hong and J.A. Landay, "An Architecture for Privacy-Sensitive Ubiquitous Computing," Proc. 2nd Int'l Conf. Mobile Systems, Applications, and Services (MobiSys 04), ACM Press, 2004, pp. 177-189.
7. J. Wickramasuriya et al., "Privacy-Protecting Data Collection in Media Spaces," Proc. 12th Ann. ACM Int'l Conf. Multimedia (Multimedia 04), ACM Press, 2004, pp. 48-55.
8. S. Lederer, A.K. Dey, and J. Mankoff, A Conceptual Model and a Metaphor of Everyday Privacy in Ubiquitous Computing Environments, tech. report UCB/CSD-2-1188, Computer Science Division (EECS), University of California, Berkeley, 2002.
9. X. Jiang, J.I. Hong, and J.A. Landay, "Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing," Proc. 4th Int'l Conf. Ubiquitous Computing (UbiComp 02), LNCS 2498, Springer-Verlag, 2002, pp. 176-193.
10. R. Lucky, "Zero Privacy," IEEE Spectrum, July 2008; internetzero-privacy.
11. Royal Academy of Eng., Dilemmas of Privacy and Surveillance: Challenges of Technological Change, tech. report, Mar. 2007, RAE; .pdf.
12. M. Gill and A. Spriggs, Assessing the Impact of CCTV, Home Office Research Study 292, Home Office Research, Development and Statistics Directorate, 2005; .
13. J. Kiemer et al., "Spybuster—A Community-Based Privacy Tagging Platform," Proc. 10th Int'l Conf. Human Computer Interaction with Mobile Devices and Services (MobileHCI 08) ACM Press, 2008, pp. 491-492.
14. O. Bowcott, "CCTV Boom Has Failed to Slash Crime, Say Police," The Guardian,6 May 2008; .
15. A. Cameron et al., Measuring the Effects of Video Surveillance on Crime in Los Angeles, tech. report CRB-08-007, 5 May 2008, School of Policy, Planning, and Development, Univ. of Southern California;
16. Transport for London, "Live CCTV Boost to Bus Safety,"22 Oct. 2008, Mayor of London; 10118.aspx.
17. P. Hennessy, "CCTV Camera Microphones to Be Axed," The Sunday Telegraph,27 Jan. 2008; .
18. "Video Surveillance," 18 Dec. 2007, Privacy International; www.privacyinternational.orgarticle.shtml?cmd[347]=x-347-559088&als[theme]=Video%20Surveillance .
19. F. Dufaux and T. Ebrahimi, "Scrambling for Video Surveillance with Privacy," Proc. 2006 Conf. Computer Vision and Pattern Recognition Workshop (CVPRW 06), IEEE CS Press, 2006, pp. 160-166.
20. M. Ballard, "Living Room CCTV Feed Encourages 'Inappropriate Watching,'" The Inquirer,30 Jan. 2008; shoreditch-cctv-encourages.
37 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool