13,884 research outputs found
Recommended from our members
Techno-surveillance of the roads: High impact and low interest
Copyright © 2010 Palgrave Macmillan. This is a post-peer-review, pre-copyedit version of an article published in Crime Prevention and Community Safety. The definitive publisher-authenticated version Crime Prevention and Community Safety 10(1): 1-18 is available online at the link below.Road crashes and road crime are huge international problems produced by global societyâs increasing dependence on motorised transport. To help reduce these crash and crime statistics, roads technology is rapidly developing to prevent the former and deter the latter. This technology largely works by vehicle surveillance, and as with surveillance technology used in other arenas of crime prevention, drawbacks and dangers go along with the safety and security enhancing aspects.
This paper reviews some key emerging roads technologies, the theoretical concerns raised by them and how, through various theoretical frameworks, they could be explored by the discipline of criminology. It urges that the surveillance aspects of road crime prevention and the study of vehicle-related crime more generally would benefit from criminological consideration and be theoretically rewarding. Moreover, in view of the centrality of the roads in contemporary life and the extent of global harm caused there, it contends that criminology should engage with this terrain
Transportation, Terrorism and Crime: Deterrence, Disruption and Resilience
Abstract: Terrorists likely have adopted vehicle ramming as a tactic because it can be carried out by an individual (or âlone wolf terroristâ), and because the skills required are minimal (e.g. the ability to drive a car and determine locations for creating maximum carnage). Studies of terrorist activities against transportation assets have been conducted to help law enforcement agencies prepare their communities, create mitigation measures, conduct effective surveillance and respond quickly to attacks.
This study reviews current research on terrorist tactics against transportation assets, with an emphasis on vehicle ramming attacks. It evaluates some of the current attack strategies, and the possible mitigation or response tactics that may be effective in deterring attacks or saving lives in the event of an attack. It includes case studies that can be used as educational tools for understanding terrorist methodologies, as well as ordinary emergencies that might become a terroristâs blueprint
Disruptive Technologies and the Law
In the past two decades, the concept of disruptive technology has gone from theory, to buzz word, to the captivation of the popular imagination. Disruptive innovation goes beyond improving existing products; it seeks to tap unforeseen markets, create products to solve problems consumers don\u27t know that they have, and ultimately to change the face of industry. We are all the beneficiaries of disruption. Every smartphone carrying, MP3-listening, Netflix-watching consumer is taking advantage of technologies once unimaginable, but that now feel indispensable. Silicon Valley\u27s pursuit of disruption will continue to benefit and delight a world of consumers. But where disruption may once have been the secondary result of innovation, disruption has become a goal in and of itself. Today, I want to urge a cautionary note: The tech community\u27s solipsistic focus on disruption, to the exclusion of human and legal values, can be problematic. We can see these potential problems in the development of three areas: mass surveillance, 3D printing, and driverless cars
A generic model for camera based intelligent road crowd control
Traffic flow control is often a big problem in many big cities in the world, especially during the peak and off-peak hours. Researchers are trying to find the optimal solution to solve this daily problem. Often, the problem is caused by the poor traffic signal light control system. Improper placement of the signal light and timing is the main issue. The problem can be solved by proper time management for the traffic signal through the congested and often over crowded areas. This research proposes a model for intelligent traffic flow control by implementing camera based surveillance and feedback system. A series of cameras are set minimum three signals ahead from the target junction. The complete software system is developed to help integrating the multiple camera on road as feedback to the signal light control systems.Keywords: surveillance; traffic flow; network; vehicles
Public entities driven robotic innovation in urban areas
Cities present new challenges and needs to satisfy and improve lifestyle for their citizens under the concept âSmart Cityâ. In order to achieve this goal in a global manner, new technologies are required as the robotic one. But Public entities unknown the possibilities offered by this technology to get solutions to their needs. In this paper the development of the Innovative Public Procurement instruments is explained, specifically the process PDTI (Public end Users Driven Technological Innovation) as a driving force of robotic research and development and offering a list of robotic urban challenges proposed by European cities that have participated in such a process. In the next phases of the procedure, this fact will provide novel robotic solutions addressed to public demand that are an example to be followed by other Smart Cities.Peer ReviewedPostprint (author's final draft
A MODERN GREAT WALL: PRC SMART CITIES AND THE A2/AD IMPLICATIONS FOR AFSOC
The Peopleâs Republic of Chinaâs (PRC) proliferation of smart citiesâintegrated, government-controlled urban surveillance networksâhas increased the persistent stare of surveillance technologies globally. While the place of smart cities in strategic competition has been studied, the capability of PRC smart cities to achieve military ends like Anti-Access/Area-Denial (A2/AD) has yet to be explored by Air Force Special Operations Command (AFSOC). The structure and capabilities of PRC smart cities reveal potential A2/AD threats and exploitation opportunities for AFSOC. Using the Integrated Air Defense System (IADS) as a model, this study suggests that PRC smart cities can function as IADS-like weapon systems, with a dispersed network of surveillance technologies integrated via a centralized control layer. PRC smart cities could produce at least two A2/AD threats to AFSOC: denial of aircraft entry to airspace and suppression of logistics and sustainment requirements (e.g., electricity and fuel). Conversely, AFSOC can exploit PRC smart cities using cyber-attacksâsuch as distributed denial of service and software manipulationâto preserve access and placement. This thesis concludes that AFSOC should pursue two lines of effort by investing in both: âliving off the gridâ independent of smart city infrastructure and new cyber technologies and tactics for Suppression of Enemy Information Systemsâactions to disturb smart city command and controlâto combat and exploit PRC smart cities.Major, United States Air ForceApproved for public release. Distribution is unlimited
- âŠ