23,410 research outputs found

    Big Brother is Listening to You: Digital Eavesdropping in the Advertising Industry

    Get PDF
    In the Digital Age, information is more accessible than ever. Unfortunately, that accessibility has come at the expense of privacy. Now, more and more personal information is in the hands of corporations and governments, for uses not known to the average consumer. Although these entities have long been able to keep tabs on individuals, with the advent of virtual assistants and “always-listening” technologies, the ease by which a third party may extract information from a consumer has only increased. The stark reality is that lawmakers have left the American public behind. While other countries have enacted consumer privacy protections, the United States has no satisfactory legal framework in place to curb data collection by greedy businesses or to regulate how those companies may use and protect consumer data. This Article contemplates one use of that data: digital advertising. Inspired by stories of suspiciously well-targeted advertisements appearing on social media websites, this Article additionally questions whether companies have been honest about their collection of audio data. To address the potential harms consumers may suffer as a result of this deficient privacy protection, this Article proposes a framework wherein companies must acquire users\u27 consent and the government must ensure that businesses do not use consumer information for harmful purposes

    Review of Person Re-identification Techniques

    Full text link
    Person re-identification across different surveillance cameras with disjoint fields of view has become one of the most interesting and challenging subjects in the area of intelligent video surveillance. Although several methods have been developed and proposed, certain limitations and unresolved issues remain. In all of the existing re-identification approaches, feature vectors are extracted from segmented still images or video frames. Different similarity or dissimilarity measures have been applied to these vectors. Some methods have used simple constant metrics, whereas others have utilised models to obtain optimised metrics. Some have created models based on local colour or texture information, and others have built models based on the gait of people. In general, the main objective of all these approaches is to achieve a higher-accuracy rate and lowercomputational costs. This study summarises several developments in recent literature and discusses the various available methods used in person re-identification. Specifically, their advantages and disadvantages are mentioned and compared.Comment: Published 201

    Camera Surveillance as a Measure of Counterterrorism?

    Get PDF
    Camera surveillance has recently gained prominence in policy proposals on combating terrorism. We evaluate this instrument of counterterrorism as resting on the premise of a deterrence effect. Based on comparative arguments and previous evidence on crime, we expect camera surveillance to have a relatively smaller deterrent effect on terrorism than on other forms of crime. In particular, we emphasize opportunities for substitution (i.e., displacement effects), the interaction with media attention aspired to by terrorists, the limits of real-time interventions, the crowding-out of social surveillance, the risk of misguided profiling, and politico-economic concerns regarding the misuse of the technology.Camera surveillance, closed-circuit television (CCTV), public security, deterrence, terrorism

    Camera Surveillance as a Measure of Counterterrorism?

    Get PDF
    Camera surveillance has recently gained prominence in policy proposals on combating terrorism. We evaluate this instrument of counterterrorism as resting on the premise of a deterrence effect. Based on comparative arguments and previous evidence on crime, we expect camera surveillance to have a relatively smaller deterrent effect on terrorism than on other forms of crime. In particular, we emphasize opportunities for substitution (i.e., displacement effects), the interaction with media attention aspired to by terrorists, the limits of real-time interventions, the crowding-out of social surveillance, the risk of misguided profiling, and politico-economic concerns regarding the misuse of the technology.Camera surveillance, closed-circuit television (CCTV), public security, deterrence, terrorism.

    After the Gold Rush: The Boom of the Internet of Things, and the Busts of Data-Security and Privacy

    Get PDF
    This Article addresses the impact that the lack of oversight of the Internet of Things has on digital privacy. While the Internet of Things is but one vehicle for technological innovation, it has created a broad glimpse into domestic life, thus triggering several privacy issues that the law is attempting to keep pace with. What the Internet of Things can reveal is beyond the control of the individual, as it collects information about every practical aspect of an individual’s life, and provides essentially unfettered access into the mind of its users. This Article proposes that the federal government and the state governments bend toward consumer protection while creating a cogent and predictable body of law surrounding the Internet of Things. Through privacy-by-design or self-help, it is imperative that the Internet of Things—and any of its unforeseen progeny—develop with an eye toward safeguarding individual privacy while allowing technological development

    The death of Jill Meagher: crime and punishment on social media

    Get PDF
    This paper aims to identify and analyse several predominant issues and discourses as they relate to the burgeoning interrelationship between social media, crime and victim. Abstract In this paper we analyse the kidnapping, rape and murder of Jill Meagher as a case study to highlight a range of issues that emerge in relation to criminalisation, crime prevention and policing strategies on social media - issues that, in our opinion, require immediate and thorough theoretical engagement. An in-depth analysis of Jill Meagher’s case and its newsworthiness in terrestrial media is a challenging task that is beyond the scope of this paper; rather, the focus for this particular paper is on the process of agenda-building, particularly via social media, and the impact of the social environment and the capacity of ‘ordinary’ citizens to influence the agenda-defining process. In addition, we outline other issues that emerged in the aftermath of this case, such as the depth of the target audience on social media, the threat of a ‘trial by social media’ and the place of social media in the context of pre-crime and surveillance debates. Through the analysis of research data we establish some preliminary findings and call for more audacious and critical engagement by criminologists and social scientists in addressing the challenges posed by new technologies

    Liberty versus safety: a design review

    Full text link
    It is our contention that when designing against terrorism, it is important to fully understand both terrorist perpetrator techniques and terrorism prevention principles and to establish the myths and realities about ‘fear of terrorism’, before catalyzing new design innovations. This paper assesses the requirement for designers to mediate issues of user liberty versus security. We assess the troublesome design tradeoffs between accommodation of users and exclusion of terrorist misuse and abuse linked to bicycle parking, using the Conjunction of Terrorism Opportunity framework. We include the case study of the Biceberg automated bike parking system in relation to the fitness for purpose versus resistance to terrorism debate
    • 

    corecore