Difference between revisions of "Pervasive Surveillance"
(One intermediate revision by one other user not shown) | |||
Line 1: | Line 1: | ||
Pervasive surveillance is the act of capturing small amounts of data from individuals' online activities and storing it to build a profile. | Pervasive surveillance is the act of capturing small amounts of data from individuals' online activities and storing it to build a profile. | ||
− | The surveillance is often carried out by local and federal governments or governmental organisations, such as organizations like the NSA and the FBI, but it may also be carried out by corporations (either on behalf of governments or at their own initiative). | + | The surveillance is often carried out by local and federal governments or governmental organisations, such as organizations like the NSA and the FBI, but it may also be carried out by corporations (either on behalf of governments or at their own initiative).Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. |
+ | |||
+ | Conference Paper: | ||
+ | The pervasive computing paradigm promotes new applications in several scenarios. Among these, domotics is receiving a considerable attention. This work presents an intelligent and pervasive surveillance system for home and corporate security based on the ZigBee protocol which detects and classifies intrusions discarding false positives, also providing remote control and cameras live streaming. Results of tests in different environments show the effectiveness of the proposed system. | ||
+ | |||
Latest revision as of 16:01, 25 March 2019
Pervasive surveillance is the act of capturing small amounts of data from individuals' online activities and storing it to build a profile. The surveillance is often carried out by local and federal governments or governmental organisations, such as organizations like the NSA and the FBI, but it may also be carried out by corporations (either on behalf of governments or at their own initiative).Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies.
Conference Paper: The pervasive computing paradigm promotes new applications in several scenarios. Among these, domotics is receiving a considerable attention. This work presents an intelligent and pervasive surveillance system for home and corporate security based on the ZigBee protocol which detects and classifies intrusions discarding false positives, also providing remote control and cameras live streaming. Results of tests in different environments show the effectiveness of the proposed system.
Case Study: Disease tracking
In 2009 Google published a research paper documenting a method of tracking influenza-like illness's spread in a population by analyzing large numbers of search queries. It was reported that Google could accurately measure the influenza activity in each region of the U.S.A. with a record breaking report lag of one day approximately. The usual reporting lag via the usual method of waiting for clinics to report cases was two weeks.
Case Study: Target
Andrew pole, chief data scientist for retail chain target, successfully implemented an algorithm for detecting whether a customer was pregnant via analyzing data the company collected on their spending habits he was able to identify approximately 25 products that when bought in combination could be used to assign a score to each customer predicting their likelihood of being pregnant. The algorithm could even track individual stages of pregnancy, coupons could then be send enticing customers to buy. At once point the algorithm even predicted that girl was pregnant before even her father knew.