Academic literature on the topic 'Electronic surveillance in art'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Electronic surveillance in art.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Electronic surveillance in art"

1

Piszczek, Martyna. "CRIMINAL LIABILITY RELATED TO THE SYSTEM OF ELECTRONIC SURVEILLANCE AND CIRCUMSTANCES IN WHICH SENTENCED PERSON AVOIDS PERFORMING DUTIES ORDERED BY THE COURT." Probacja 3 (September 30, 2021): 29–70. http://dx.doi.org/10.5604/01.3001.0015.2708.

Full text
Abstract:
The crucial aim of this article is to indicate grounds of legal liability connected with situations in which person sentenced to penalty, punitive measure or safeguard measure, within the system of electronic surveillance, violates certain duties. Considerations concerning the aforementioned issues are preceded by the analysis on the essence of the electronic surveillance, reasons for its implementation into the applicable legal system and means of its usage related to legal instruments of penal reaction to perpetrator’s behavior. Moreover, author of the article analyses legal character of the prison sentence performed with the usage of electronic surveillance. This constitutes starting point for answering practically important question: whether leaving the place of performing prison sentence within the system of electronic surveillance can be qualified as the offence of self-release, determined in art. 242 § 1 of the Criminal Code. At the end of the article, author presents de lege ferenda postulates concerning normative solution related to the legal ground of qualifying behaviors consisting in avoiding electronic surveillance.
APA, Harvard, Vancouver, ISO, and other styles
2

Peter, Johannes Maxmillian. "Electronic Article Surveillance Marker." Journal of the Acoustical Society of America 129, no. 2 (2011): 1134. http://dx.doi.org/10.1121/1.3561527.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Abril-Nieto, Christian Stiven, and Andrés Escobar-Díaz. "Electronic civil surveillance: review oriented to communications for monitoring and a case." Visión electrónica 2, no. 2 (December 6, 2019): 366–80. http://dx.doi.org/10.14483/22484728.18438.

Full text
Abstract:
This article, in the context of documentary research carried out and interpreted for that was taken as baseline in investigations on electronic security and their themes for the ORCA group, it´s describe the state of the art of electronic surveillance focused in communications for monitoring stations. It’s set up chronologically in the last decade, in Latin America, and Colombia particularly. The subject has been categorized and subcategorized in such a way that keys are established sources extraction: university digital repositories, online academic magazines and corporate web page. As a product produced by the review, a particular communication model is presented for a case of a monitoring center and a equipment for tracking people.
APA, Harvard, Vancouver, ISO, and other styles
4

Дундуков, Михаил, and Mikhail Dundukov. "FOREIGN INTELLIGENCE SURVEILLANCE ACT OF 1978 AND MODERN LEGAL STANDARDS IN THE FIELD OF INFORMATION COLLECTION AND ACQUISITION BY U. S. INTELLIGENCE AGENCIES." Journal of Foreign Legislation and Comparative Law 1, no. 4 (October 29, 2015): 0. http://dx.doi.org/10.12737/14314.

Full text
Abstract:
This article reviews the development process for the legislation, regulating the U. S. intelligence agencies’ activities in the field of electronic surveillance. The article displays the reasons which prompted U. S. lawmakers to pass the Foreign Intelligence Surveillance Act of 1978; it analyzes the provisions of the law, governing the conditions and procedures for obtaining judicial order or Attorney General authorization on the implementation of electronic surveillance. Considerable attention is paid to the evolution of legal standards, added to the Foreign Intelligence Surveillance Act after the events of September 11, 2001. In particular, it analyzes amendments and additions to the Foreign Intelligence Surveillance Act, introduced on the basis of the USA Patriot Act of 2001, Intelligence Reform and Terrorism Prevention Act of 2004, Protect America Act of 2007, and other laws. The article also shows the patterns of formation of the legislative balance between the interests of the intelligence services and the need to respect the constitutional rights and liberties of American citizens.
APA, Harvard, Vancouver, ISO, and other styles
5

Schnuch, A., M. Wilkinson, A. Dugonik, B. Dugonik, T. Ganslandt, and W. Uter. "Registries in Clinical Epidemiology: the European Surveillance System on Contact Allergies (ESSCA)." Methods of Information in Medicine 55, no. 02 (2016): 193–99. http://dx.doi.org/10.3414/me15-01-0099.

Full text
Abstract:
SummaryBackground: Disease registries rely on consistent electronic data capturing (EDC) pertinent to their objectives; either by using existing electronic data as far as available, or by implementing specific software solutions.Objectives: To describe the current practice of an international disease registry (European Surveillance System on Contact Allergies, ESSCA, www.essca-dc.org) against different state of the art approaches for EDC.Methods: Since 2002, ESSCA is collecting data, currently from 53 departments in 12 countries. Departmental EDC software ranges from spreadsheets to comprehensive “patch test software” based on a relational database. In the Erlangen data centre, such diverse data is imported, converted to a common format, quality checked and pooled for scientific analyses.Results: Feed-back to participating departments for quality control is provided by standardised reports. Varying author teams publish scientific analyses addressing the objective of contact allergy surveillance.Conclusions: Although ESSCA represents a historically grown, heterogeneous network and not one unified approach to EDC, some of its features have contributed to its viability in the last 12 years and may be useful to consider for similar investigator-initiated networks.
APA, Harvard, Vancouver, ISO, and other styles
6

Rodríguez-Moreno, Itsaso, José María Martínez-Otzeta, Basilio Sierra, Igor Rodriguez, and Ekaitz Jauregi. "Video Activity Recognition: State-of-the-Art." Sensors 19, no. 14 (July 18, 2019): 3160. http://dx.doi.org/10.3390/s19143160.

Full text
Abstract:
Video activity recognition, although being an emerging task, has been the subject of important research efforts due to the importance of its everyday applications. Surveillance by video cameras could benefit greatly by advances in this field. In the area of robotics, the tasks of autonomous navigation or social interaction could also take advantage of the knowledge extracted from live video recording. The aim of this paper is to survey the state-of-the-art techniques for video activity recognition while at the same time mentioning other techniques used for the same task that the research community has known for several years. For each of the analyzed methods, its contribution over previous works and the proposed approach performance are discussed.
APA, Harvard, Vancouver, ISO, and other styles
7

Rojszczak, Marcin. "Extraterritorial Bulk Surveillance after the German BND Act Judgment." European Constitutional Law Review 17, no. 1 (March 2021): 53–77. http://dx.doi.org/10.1017/s1574019621000055.

Full text
Abstract:
Foreign surveillance as a means of circumventing existing legal safeguards – Different perspectives on the problem of the extraterritorial application of fundamental rights in US and EU legal models – The limited usefulness of effective control tests for establishing the responsibility of states for action taken in cyberspace – Judgment of Bundesverfassungsgericht in the BND Act case as an interpretative guideline for the regulation of foreign surveillance in EU member states – Electronic surveillance as a threat to European integration process.
APA, Harvard, Vancouver, ISO, and other styles
8

Giansanti, Daniele, Antonia Pirrera, Paola Meli, Mauro Grigioni, Marta De Santis, and Domenica Taruscio. "Technologies to Support Frailty, Disability, and Rare Diseases: Towards a Monitoring Experience during the COVID-19 Pandemic Emergency." Healthcare 10, no. 2 (January 26, 2022): 235. http://dx.doi.org/10.3390/healthcare10020235.

Full text
Abstract:
This report illustrates the design and results of an activity of surveillance proposed by the National Centre for Innovative Technologies in Public Health and the National Centre for Rare Diseases of the Istituto Superiore di Sanità with the aim of monitoring the state-of-use of technologies by people with frailty, disabilities, and rare diseases. The results of the surveillance activity reported in this report are as follows: (a) An international Webinar; (b) A Full report published by the Istituto Superiore di Sanità (ISS); (c) an electronic survey tool, for periodic monitoring; (d) an initial summary of the survey (15 September–30 November 2020), giving an overall picture relating to the state-of-use of technologies by the interviewed; (e) an understanding of the needs that emerged, causing reflection on the current state-of-the-art and offering important stimuli for all the stakeholders involved.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Tianhao, Waqas Aftab, Lyudmila Mihaylova, Christian Langran-Wheeler, Samuel Rigby, David Fletcher, Steve Maddock, and Garry Bosworth. "Recent Advances in Video Analytics for Rail Network Surveillance for Security, Trespass and Suicide Prevention—A Survey." Sensors 22, no. 12 (June 7, 2022): 4324. http://dx.doi.org/10.3390/s22124324.

Full text
Abstract:
Railway networks systems are by design open and accessible to people, but this presents challenges in the prevention of events such as terrorism, trespass, and suicide fatalities. With the rapid advancement of machine learning, numerous computer vision methods have been developed in closed-circuit television (CCTV) surveillance systems for the purposes of managing public spaces. These methods are built based on multiple types of sensors and are designed to automatically detect static objects and unexpected events, monitor people, and prevent potential dangers. This survey focuses on recently developed CCTV surveillance methods for rail networks, discusses the challenges they face, their advantages and disadvantages and a vision for future railway surveillance systems. State-of-the-art methods for object detection and behaviour recognition applied to rail network surveillance systems are introduced, and the ethics of handling personal data and the use of automated systems are also considered.
APA, Harvard, Vancouver, ISO, and other styles
10

Bloomfield, Brian. "In the Right Place at the Right Time: Electronic Tagging and Problems of Social Order/Disorder." Sociological Review 49, no. 2 (May 2001): 174–201. http://dx.doi.org/10.1111/1467-954x.00251.

Full text
Abstract:
This paper explores the relationship between technology and problems of social order/disorder in the context of discussions of surveillance and ‘virtuality'. The emphasis is on understanding the connections between technology and social relations in areas where issues of social order/disorder are a prominent feature of concern and where one can identify the emergence of new regimes of virtual control which are directed at solving the (supposed) deficits in order or the threats posed to it. Rather than constituting a ‘technical fix’ for the problems of social order/disorder, it is argued that forms of virtual control both presuppose a reconstruction of social order and at the same time aim to effect a suppression of disorder. Focusing in particular on various manifestations of electronic tagging – from prisoners to babies, from retail goods to works of art, from television programmes to Personal Identification Numbers – the paper argues that these share a problematic which interrelates technology, order/disorder, subjects/objects, time, and space. It thus seeks to generalize the concept of electronic tagging, to regard it as a practice rather than a specific set of artefacts. Moreover, in contrast to the negative, panoptic reading of tagging technologies, the paper considers the active public participation in systems of surveillance and thereby the more positive or productive exercises of power which they may be taken to constitute.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Electronic surveillance in art"

1

Margolis, David. "An analysis of electronic surveillance in the USAPATRIOT act." Honors in the Major Thesis, University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/776.

Full text
Abstract:
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf
Bachelors
Health and Public Affairs
Legal Studies
APA, Harvard, Vancouver, ISO, and other styles
2

Edwards, Floyd. "U.S. Individuals' Perceptions of Government Electronic Surveillance After Passage of the USA Patriot Act." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4617.

Full text
Abstract:
Since the implementation of the USA Patriot Act in October 2001, public trust in the U.S. federal government to protect individuals' right to privacy has been affected negatively. Many studies have addressed this topic, but few have delved deeply into the reasons behind the distrust. The purposes of this qualitative study were, to explore the perceptions and attitudes of U.S. citizens regarding the effect of the USA Patriot Act on their right to privacy, to determine whether a loss of trust in the government occurred, and to identify the factors contributing to the lack of trust. The theoretical foundation for this study was Rawl's Social Perspective of Public Trust, Sax's Augmentation of Social Contract Theory, and Ajzen's Theory of Planned Behavior. The central research question pertained to the views of U.S. citizens about the federal government's use of electronic surveillance to monitor their communication without their knowledge. A generic qualitative study design was employed using purposeful, semi-structured interviews of 20 purposely sampled adult male and female U.S. citizens. Data from the interviews were coded and categorized for thematic analysis. When confronted with the lesser known specifics of the electronic surveillance provision of the USA Patriot Act, participants were more likely to reject the government interference as an invasion of privacy. This study can provide guidance for the democratic basis of policymaking designed to protect U.S. citizens. The implication for social change includes providing information to policymakers of both the US and organizations of various sizes regarding the polarized views and lack of trust pertaining to electronic surveillance among U.S. public. This information can be used to implement program or campaign to foster trust.
APA, Harvard, Vancouver, ISO, and other styles
3

Ulkemen, Sinan Bland Robert L. "The impact of surveillance technology on the behaviors of municipal police departments." [Denton, Tex.] : University of North Texas, 2009. http://digital.library.unt.edu/ark:/67531/metadc12209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shashidhara, Shilpa. "Resident Rights and Electronic Monitoring." Thesis, University of North Texas, 2010. https://digital.library.unt.edu/ark:/67531/metadc31546/.

Full text
Abstract:
The purpose of this exploratory study was to examine resident, family member and staff perceptions of electronic monitoring and their effect on resident rights. The sample consisted of 53 nursing home residents, 104 staff and 25 family members, in the Dallas Fort Worth metroplex, from a nursing facility in which residents utilize video cameras in their rooms (Nursing Facility 1), two nursing facilities that have video cameras in their common rooms areas (Nursing Facility 2 and 3) and a nursing facility that does not utilize video cameras (Nursing Facility 4). The interview questions and self-administered surveys were in regard to the participant's perceptions of electronic monitoring, perceived risks and benefits of video cameras, awareness of resident rights and consciousness of potential risks to resident rights. Data were analyzed using a mixed methods approach using both ATLAS t.i and SAS. Study findings revealed that residents, family members and staff are aware of the potential benefits of electronic monitoring in nursing facilities. While respondents are hesitant to have electronic monitoring in resident rooms, they are interested in utilizing electronic monitoring in common areas. While residents and staff believe that electronic monitoring compromises resident rights, family members believe resident rights are protected. Different types of staff have different perceptions of electronic monitoring. Those staff members that are more directly involved in resident care are less accepting of electronic monitoring compared to staff that have episodic visits with residents. Among staff members, nursing facilities with prior experience with electronic monitoring are less accepting of electronic monitoring. Further studies are needed to enhance this research.
APA, Harvard, Vancouver, ISO, and other styles
5

Watt, James Robert. "Electronic workplace surveillance and employee privacy : a comparative analysis of privacy protection in Australia and the United States." Thesis, Queensland University of Technology, 2009. https://eprints.qut.edu.au/26536/1/James_Watt_Thesis.pdf.

Full text
Abstract:
More than a century ago in their definitive work “The Right to Privacy” Samuel D. Warren and Louis D. Brandeis highlighted the challenges posed to individual privacy by advancing technology. Today’s workplace is characterised by its reliance on computer technology, particularly the use of email and the Internet to perform critical business functions. Increasingly these and other workplace activities are the focus of monitoring by employers. There is little formal regulation of electronic monitoring in Australian or United States workplaces. Without reasonable limits or controls, this has the potential to adversely affect employees’ privacy rights. Australia has a history of legislating to protect privacy rights, whereas the United States has relied on a combination of constitutional guarantees, federal and state statutes, and the common law. This thesis examines a number of existing and proposed statutory and other workplace privacy laws in Australia and the United States. The analysis demonstrates that existing measures fail to adequately regulate monitoring or provide employees with suitable remedies where unjustifiable intrusions occur. The thesis ultimately supports the view that enacting uniform legislation at the national level provides a more effective and comprehensive solution for both employers and employees. Chapter One provides a general introduction and briefly discusses issues relevant to electronic monitoring in the workplace. Chapter Two contains an overview of privacy law as it relates to electronic monitoring in Australian and United States workplaces. In Chapter Three there is an examination of the complaint process and remedies available to a hypothetical employee (Mary) who is concerned about protecting her privacy rights at work. Chapter Four provides an analysis of the major themes emerging from the research, and also discusses the draft national uniform legislation. Chapter Five details the proposed legislation in the form of the Workplace Surveillance and Monitoring Act, and Chapter Six contains the conclusion.
APA, Harvard, Vancouver, ISO, and other styles
6

Watt, James Robert. "Electronic workplace surveillance and employee privacy : a comparative analysis of privacy protection in Australia and the United States." Queensland University of Technology, 2009. http://eprints.qut.edu.au/26536/.

Full text
Abstract:
More than a century ago in their definitive work “The Right to Privacy” Samuel D. Warren and Louis D. Brandeis highlighted the challenges posed to individual privacy by advancing technology. Today’s workplace is characterised by its reliance on computer technology, particularly the use of email and the Internet to perform critical business functions. Increasingly these and other workplace activities are the focus of monitoring by employers. There is little formal regulation of electronic monitoring in Australian or United States workplaces. Without reasonable limits or controls, this has the potential to adversely affect employees’ privacy rights. Australia has a history of legislating to protect privacy rights, whereas the United States has relied on a combination of constitutional guarantees, federal and state statutes, and the common law. This thesis examines a number of existing and proposed statutory and other workplace privacy laws in Australia and the United States. The analysis demonstrates that existing measures fail to adequately regulate monitoring or provide employees with suitable remedies where unjustifiable intrusions occur. The thesis ultimately supports the view that enacting uniform legislation at the national level provides a more effective and comprehensive solution for both employers and employees. Chapter One provides a general introduction and briefly discusses issues relevant to electronic monitoring in the workplace. Chapter Two contains an overview of privacy law as it relates to electronic monitoring in Australian and United States workplaces. In Chapter Three there is an examination of the complaint process and remedies available to a hypothetical employee (Mary) who is concerned about protecting her privacy rights at work. Chapter Four provides an analysis of the major themes emerging from the research, and also discusses the draft national uniform legislation. Chapter Five details the proposed legislation in the form of the Workplace Surveillance and Monitoring Act, and Chapter Six contains the conclusion.
APA, Harvard, Vancouver, ISO, and other styles
7

Ozdogan, Ali. "Communication Assistance for Law Enforcement Act of 1994: A Case Study." Thesis, University of North Texas, 2001. https://digital.library.unt.edu/ark:/67531/metadc2877/.

Full text
Abstract:
The purpose of this study is: to explore and analyze the Communication Assistance for Law Enforcement Act of 1994 (CALEA), to identify problems related to CALEA, to identify solutions devised by other countries to overcome problems similar to CALEA's, and to propose feasible solutions to CALEA problems.
APA, Harvard, Vancouver, ISO, and other styles
8

Ulkemen, Sinan. "The Impact of Surveillance Technology on the Behaviors of Municipal Police Departments." Thesis, University of North Texas, 2009. https://digital.library.unt.edu/ark:/67531/metadc12209/.

Full text
Abstract:
Citizen complaints about inappropriate use of force indicate negative police-public relations, unresponsive police services, and the unresponsiveness of police management to citizens' concerns. However, the effective delivery of key policing services depends on the performance of individual police officers. Surveillance technology can monitor and control the behavior of officers, ensuring that police officers provide high quality policing services that meet the needs of citizens. Examples of surveillance technology such as in-car cameras and CCTV can be used as an administrative tool to respond to citizen complaints by police chief executives. This research examines the effect of surveillance technology on the behavior of municipal police departments that is operationalized as the number of citizen complaints that were filed against municipal police departments. This research also examines the impact of surveillance technology on dismissed and sustained complaints by using 511 large municipal police departments in the U.S. from Law Enforcement Management and Administrative Statistics (LEMAS) 2003 dataset. Three different models are developed to evaluate the impact of in-car cameras and CCTV on the citizen complaints and their dispositions. Two ordinary least square regression (OLS) models and a Heckman selection model are used to analyze the data. The Heckman selection model is utilized to correct for selection bias in truncated data for sustained complaints after log transformation. The results suggest that the use of surveillance technology by the police is necessary, but insufficient, in reducing the number of complaints. The finding suggests that videotaped evidence, recorded by surveillance technology, increased the number of convictions of accused officers in municipal police departments. The analysis also suggests that municipal police departments that used CCTV only in 2003 received a higher number of citizen complaints, in comparison to municipal police departments without CCTV, both in 2000 and 2003. No evidence was found to indicate that surveillance technology has a positive impact on the percentage of dismissed complaints.
APA, Harvard, Vancouver, ISO, and other styles
9

Pati, Nishikanta. "Occlusion Tolerant Object Recognition Methods for Video Surveillance and Tracking of Moving Civilian Vehicles." Thesis, University of North Texas, 2007. https://digital.library.unt.edu/ark:/67531/metadc5133/.

Full text
Abstract:
Recently, there is a great interest in moving object tracking in the fields of security and surveillance. Object recognition under partial occlusion is the core of any object tracking system. This thesis presents an automatic and real-time color object-recognition system which is not only robust but also occlusion tolerant. The intended use of the system is to recognize and track external vehicles entered inside a secured area like a school campus or any army base. Statistical morphological skeleton is used to represent the visible shape of the vehicle. Simple curve matching and different feature based matching techniques are used to recognize the segmented vehicle. Features of the vehicle are extracted upon entering the secured area. The vehicle is recognized from either a digital video frame or a static digital image when needed. The recognition engine will help the design of a high performance tracking system meant for remote video surveillance.
APA, Harvard, Vancouver, ISO, and other styles
10

Santiteerakul, Wasana. "Trajectory Analytics." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc801885/.

Full text
Abstract:
The numerous surveillance videos recorded by a single stationary wide-angle-view camera persuade the use of a moving point as the representation of each small-size object in wide video scene. The sequence of the positions of each moving point can be used to generate a trajectory containing both spatial and temporal information of object's movement. In this study, we investigate how the relationship between two trajectories can be used to recognize multi-agent interactions. For this purpose, we present a simple set of qualitative atomic disjoint trajectory-segment relations which can be utilized to represent the relationships between two trajectories. Given a pair of adjacent concurrent trajectories, we segment the trajectory pair to get the ordered sequence of related trajectory-segments. Each pair of corresponding trajectory-segments then is assigned a token associated with the trajectory-segment relation, which leads to the generation of a string called a pairwise trajectory-segment relationship sequence. From a group of pairwise trajectory-segment relationship sequences, we utilize an unsupervised learning algorithm, particularly the k-medians clustering, to detect interesting patterns that can be used to classify lower-level multi-agent activities. We evaluate the effectiveness of the proposed approach by comparing the activity classes predicted by our method to the actual classes from the ground-truth set obtained using the crowdsourcing technique. The results show that the relationships between a pair of trajectories can signify the low-level multi-agent activities.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Electronic surveillance in art"

1

Conspiracy dwellings: Surveillance in contemporary art. Newcastle upon Tyne: Cambridge Scholars, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tortil, Lauren. Lauren Tortil: Une généalogie des grandes oreilles. Nevers: Tombolo presses, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Y, Levin Thomas, Frohne Ursula, Weibel Peter, and Zentrum für Kunst und Medientechnologie Karlsruhe., eds. Ctrl [space]: Rhetorics of surveillance from Bentham to Big Brother. Karlsruhe, Germany: ZKM Center for Art and Media, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Players, Surveillance Camera, ed. We know you are watching: Surveillance Camera Players 1996-2006. [S.l.]: Factory School, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Library of Congress. Congressional Research Service, ed. Wiretapping and electronic surveillance: The Electronic Communications Privacy Act and related matters. [Washington, D.C.]: Congressional Research Service, Library of Congress, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Britain, Great, ed. Surveillance law. London: LexisNexis UK, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vidal, Stéphanie. En fuyant, ils cherchent une arme. Edited by Maison populaire de Montreuil. Centre d'art. Lyon, France: Nouvelles Éditions Scala, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nejat, Ince A., ed. Principles of integrated maritime surveillance systems. Boston: Kluwer Academic, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Loving big brother: Performance, privacy, and surveillance space. London: Routledge, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

United States. Congress. House. Committee on Rules. Providing for consideration of H.R. 5825, Electronic Surveillance Modernization Act: Report (to accompany H. Res. 1052). Washington, D.C: U.S. G.P.O., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Electronic surveillance in art"

1

Bamfield, Joshua. "Electronic Article Surveillance: management learning in curbing theft." In Crime At Work, 156–74. London: Palgrave Macmillan UK, 2005. http://dx.doi.org/10.1007/978-1-349-23551-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Moorlock, Greg. "Electronic Surveillance." In Encyclopedia of Global Bioethics, 1–7. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-05544-2_167-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hollien, Harry. "Electronic Surveillance." In The Acoustics of Crime, 105–25. Boston, MA: Springer US, 1990. http://dx.doi.org/10.1007/978-1-4899-0673-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Weik, Martin H. "electronic surveillance." In Computer Science and Communications Dictionary, 504. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_6007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Moorlock, Greg. "Electronic Surveillance." In Encyclopedia of Global Bioethics, 1088–95. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-09483-0_167.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

ten Have, Henk, and Maria do Céu Patrão Neves. "Electronic Surveillance." In Dictionary of Global Bioethics, 455. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-54161-3_223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

del Carmen, Rolando V., and Jeffery T. Walker. "Electronic Surveillance." In Briefs of Leading Cases in Law Enforcement, 177–86. Tenth edition. | Milton Park, Abingdon, Oxon ; New York, NY : Routledge, 2020.: Routledge, 2019. http://dx.doi.org/10.4324/9780429053139-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Radice, Martha, and Brenden Harvey. "Subverting surveillance." In Public Art Encounters, 15–34. Abingdon, Oxon : New York, NY : Routledge is an imprint of the Taylor & Francis Group, an Informa Business, [2018]: Routledge, 2017. http://dx.doi.org/10.4324/9781315602837-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lowe, David. "Surveillance of electronic communications." In Terrorism, Law and Policy, 147–77. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003195627-13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Daems, Tom. "Electronic Monitoring in a Culture of Surveillance." In Electronic Monitoring, 1–22. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34039-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Electronic surveillance in art"

1

Moll, Joana. "Surveillance through Social Networks along the US-Mexico Border." In Electronic Visualisation and the Arts (EVA 2014). BCS Learning & Development, 2014. http://dx.doi.org/10.14236/ewic/eva2014.37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

MECLEA, Mihai-Alin, Liviu GĂINĂ, and Mircea BOȘCOIANU. "THE CURRENT STATE OF RESEARCH IN ELECTRONIC SURVEILLANCE SYSTEMS MANAGEMENT; JAMMING AND COUNTER JAMMING." In SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE. SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE, 2022. http://dx.doi.org/10.19062/2247-3173.2021.22.6.

Full text
Abstract:
We all saw an important development of weapons containing electronic devices and systems. Not so many years ago, military specialists were considering that precision will make the difference in combat and that precision must be increased using electronics. First, it was stated that augmenting the explosive charge ten times, will increase the effectiveness of the hit only five times. On the other hand, the precision of weapons systems increased 10 times will increase the effectiveness of the hit 100 times. A single surgical shot will be enough to annihilate the target. In the same time, when considering a defensive approach, a very sensitive issue has become the management of electronic surveillance (ES) systems, not only in the military, but also in civilian use. Those ES systems must work properly, at full capacity and in a secured and private environment. In jamming area, new techniques are developed constantly. We witness the integration of AI (artificial intelligence) in ECM (electronic counter measures) systems and the solution to bring the EW (electronic warfare) payload on UCAVs (unmanned combat aerial vehicle). Also new techniques to counter jamming are emerging.
APA, Harvard, Vancouver, ISO, and other styles
3

Bukaty, Michael E. "A Vehicle Identification System For Surveillance Applications." In Machine Vision. Washington, D.C.: Optica Publishing Group, 1987. http://dx.doi.org/10.1364/mv.1987.fa5.

Full text
Abstract:
Many surveillance applications require electronic imagers to provide real time or near real time pictures. An example might involve the security system of a sensitive facility where the monitoring of entering and exiting traffic is important. Since the objects of interest in this scenario are vehicles, it is possible to use a one-dimensional line scanner and let the vehicle self scan via its motion. The resulting image is two-dimensional with the vertical representing a spatial displacement and the horizontal time. The system consists of a Reticon 1 × 128 array, 8-bit Flash A/D, and TMS320 digital signal processor. The amount of light incident on a photodiode and integrated over time determines the value read by the A/D for that pixel. To achieve optimal operating range, the average value of all the pixels in the scan should be at the midpoint of the intensity range. This is accomplished by adjusting the integration time or the amount of time light is allowed to strike the element before it is interrogated. The adjustment procedure involves having two valid reads that occur at a fixed time interval. Between these two valid scans is a “dummy” read which has an adjustable time preceeding the next valid read.
APA, Harvard, Vancouver, ISO, and other styles
4

Dupriest, Fred, Paul Pastusek, Stephen Lai, Bob Best, Michael Behounek, Bryan Cook, Wendell Basarath, et al. "Standardization of Mechanical Specific Energy Equations and Nomenclature." In IADC/SPE International Drilling Conference and Exhibition. SPE, 2022. http://dx.doi.org/10.2118/208777-ms.

Full text
Abstract:
Abstract This paper recommends standardized names and equations for the two most common uses of Mechanical Specific Energy (MSE) concepts: "Total MSE" and "Downhole MSE". These names and their equations should be used uniformly in all applications, including electronic drilling recorder (EDR) pick lists, rig site surveillance, engineering surveillance, data analytics, research, and technical publications. Mechanical Specific Energy, used as a metric for drilling efficiency, is a mathematical calculation of the energy used per volume of rock drilled. The Downhole MSE equation calculates the efficiency of the bit alone, while the Total MSE equation includes both the bit and drill string. Those who use MSE in surveillance or analytics know the negative effects created by the lack of standardization over the years; it is certainly not a new problem. The lack of standardized nomenclature has resulted in the use of the same name for different equations, or different names are given two equations that are identical. This affects the ability of drill teams to engage vendors in redesign of performance limitations or to communicate new operational practices between teams or rigs. In addition, this standard corrects a mathematical error that is common in calculating the Total MSE. The concen with the inconsistencies has increased as MSE has become a key element in many automated optimization schemes. Inconsistencies or uncertainties in the basis of MSE values calculated in real time or shared in large data sets will affect the industry's ablity to develop useful analytics or to automate rig control platforms and data-driven decisions. This paper also includes a discussion of the MSE measurement errors and their effect on calculated values, which is of particular interest to controls engineers and those involved in data analytics. Examples are provided to illustrate how the two different MSE values are used in field operations. Also, a substantial reference list of current and potential future uses of MSE is included to encourage better MSE-based practices to potentially lead to the development of new uses in the future, including automation. This ad hoc MSE Standardization Committee is a volunteer group with representation from operators, rig contractors, service companies, and data acquisition vendors. The guidance given reflects there shared experienec in utilizing MSE in surveillance and analytics, and the recommended equations are technically correct.
APA, Harvard, Vancouver, ISO, and other styles
5

Watson, William, Ysabel Witt-Doerring, Junichi Sugiura, Paul Pastusek, Dustin Daechsel, Laurent Vallet, Mohamed Amish, and Gbenga Oluyemi. "Code Upgrade: Interpretation of Surface and Downhole Data to Support Drilling Forensics." In SPE Annual Technical Conference and Exhibition. SPE, 2022. http://dx.doi.org/10.2118/210243-ms.

Full text
Abstract:
Abstract This paper establishes drilling surveillance interpretation and monitoring techniques for digital drilling data which can be used to support drilling forensics and improve drilling performance. One significant advancement in the last 20 years has been the widespread availability and use of sensors to monitor all aspects of the drilling process. The majority of sensors will take surface and downhole data at several hundred samples per second, process the data and store a record at one sample per second. The data from these sensors are collated and processed using some form of Electronic Data Recording system. The information is subsequently displayed in realtime and stored for offsite transmittal. This paper extensively evaluates the impact on drilling performance due to how data from such sensors are collected, processed and the information displayed. A number of observations are investigated, analyzed and explained identifying how data quality, consistency, frequency, sensor errors and data artefacts can skew the displayed results. This can critically impact the drilling forensic analysis and subsequent interpretation. Failing to account for these data quality issues in realtime may mask drilling dysfunction causing accelerated damage to the drill bit and drilling assembly. This paper also aims to highlight techniques for displaying and interpreting drilling data to enhance drilling performance as well as diagnose dysfunction during reviews of historic wells. Understanding these limitations in advance and incorporating them in a team's surveillance strategy can help with the diagnosis of drilling dysfunction and aid performance improvement. These recommended practices have been developed to offer a foundation for drilling surveillance, interpretation and monitoring as well as training for the industry. They have been created such that they can grow organically and may be used for developing subsequent industry publications. The work described in this paper is part of a joint International Association of Drilling Contactors (IADC) / Society of Petroleum Engineers (SPE) industry effort to revise the IADC dull grade process.
APA, Harvard, Vancouver, ISO, and other styles
6

"[Cover art]." In 2008 IEEE Fifth International Conference on Advanced Video and Signal Based Surveillance. IEEE, 2008. http://dx.doi.org/10.1109/avss.2008.80.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Link, John. "Electronic art history." In the 22nd annual ACM SIGUCCS conference. New York, New York, USA: ACM Press, 1994. http://dx.doi.org/10.1145/196355.196503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pitman, Thea. "Earthing Electronic Art." In ARTECH 2019: 9th International Conference on Digital and Interactive Arts. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3359852.3359915.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"[Cover art]." In 2009 Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS). IEEE, 2009. http://dx.doi.org/10.1109/avss.2009.114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"[Cover art]." In 2012 9th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS). IEEE, 2012. http://dx.doi.org/10.1109/avss.2012.93.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Electronic surveillance in art"

1

Goldstein, Neal. Epidemiology Blog of Neal D. Goldstein, PhD, MBI. Neal D. Goldstein, 2023. http://dx.doi.org/10.17918/goldsteinepi.

Full text
Abstract:
Musings on topics related to epidemiology, epidemiological methods, public and clinical health. Written by Neal D. Goldstein, PhD, MBI. Dr. Goldstein is an Associate Professor of Epidemiology at the Drexel University Dornsife School of Public Health. With a background in biomedical informatics, he focuses on computational approaches in complex data settings, especially electronic health records and disease surveillance, to understand infectious disease transmission. This has been demonstrated through his work with blood borne pathogens (HIV and hepatitis C), COVID-19, vaccine preventable diseases, and healthcare associated infections.
APA, Harvard, Vancouver, ISO, and other styles
2

Vande Griend, Nicholas A. Non-Traditional Intelligence, Reconnaissance, and Surveillance Electronic Intelligence for the Operational Electronic Warfare Officer. Fort Belvoir, VA: Defense Technical Information Center, May 2012. http://dx.doi.org/10.21236/ada564229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tobin, J., B. Chung, K. Moore, S. Yu, A. Schwartz, M. Wall, S. Morton, et al. L1 Report for the Enhanced Surveillance Campaign Experimental Benchmarking of Pu Electronic Structure. Office of Scientific and Technical Information (OSTI), January 2006. http://dx.doi.org/10.2172/900152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Patton, Carl E. Microwave Magnetic Solitons in Ferrite Films - Physics and Devices for Radar, Electronic Countermeasures, and Surveillance. Fort Belvoir, VA: Defense Technical Information Center, December 2001. http://dx.doi.org/10.21236/ada398901.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cassidy, Michael, and Kumares Sinha. An Electronic Surveillance and Control System for Traffic Management on the Borman Expressway, Part I. West Lafayette, IN: Purdue University, 1990. http://dx.doi.org/10.5703/1288284314184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Mu-Han, and Michael Cassidy. An Electronic Surveillance and Control System for the Management of Traffic on the Borman Expressway. West Lafayette, IN: Purdue University, 1996. http://dx.doi.org/10.5703/1288284313138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cassidy, Michael, and Kumares Sinha. An Electronic Surveillance and Control System for Traffic Management on the Borman Expressway, Part I. Purdue University Press, 1990. http://dx.doi.org/10.5703/1288284313426.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cassidy, Michael, and Kumares Sinha. An Electronic Surveillance and Control System for Traffic Management on the Borman Expressway, Part I : Executive Summary. West Lafayette, IN: Purdue University, 1990. http://dx.doi.org/10.5703/1288284314185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

US ARMY ELECTRONIC PROVING GROUND. Safety and Health Evaluation - Command, Control Communication, Computers, Intelligence, Surveillance, Reconnaissance, and Electronic Warfare Equipment. Change 1. Fort Belvoir, VA: Defense Technical Information Center, February 2015. http://dx.doi.org/10.21236/ada621717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

McDonagh, Marian, Andrea C. Skelly, Amy Hermesch, Ellen Tilden, Erika D. Brodt, Tracy Dana, Shaun Ramirez, et al. Cervical Ripening in the Outpatient Setting. Agency for Healthcare Research and Quality (AHRQ), March 2021. http://dx.doi.org/10.23970/ahrqepccer238.

Full text
Abstract:
Objectives. To assess the comparative effectiveness and potential harms of cervical ripening in the outpatient setting (vs. inpatient, vs. other outpatient intervention) and of fetal surveillance when a prostaglandin is used for cervical ripening. Data sources. Electronic databases (Ovid® MEDLINE®, Embase®, CINAHL®, Cochrane Central Register of Controlled Trials, and Cochrane Database of Systematic Reviews) to July 2020; reference lists; and a Federal Register notice. Review methods. Using predefined criteria and dual review, we selected randomized controlled trials (RCTs) and cohort studies of cervical ripening comparing prostaglandins and mechanical methods in outpatient versus inpatient settings; one outpatient method versus another (including placebo or expectant management); and different methods/protocols for fetal surveillance in cervical ripening using prostaglandins. When data from similar study designs, populations, and outcomes were available, random effects using profile likelihood meta-analyses were conducted. Inconsistency (using I2) and small sample size bias (publication bias, if ≥10 studies) were assessed. Strength of evidence (SOE) was assessed. All review methods followed Agency for Healthcare Research and Quality Evidence-based Practice Center methods guidance. Results. We included 30 RCTs and 10 cohort studies (73% fair quality) involving 9,618 women. The evidence is most applicable to women aged 25 to 30 years with singleton, vertex presentation and low-risk pregnancies. No studies on fetal surveillance were found. The frequency of cesarean delivery (2 RCTs, 4 cohort studies) or suspected neonatal sepsis (2 RCTs) was not significantly different using outpatient versus inpatient dinoprostone for cervical ripening (SOE: low). In comparisons of outpatient versus inpatient single-balloon catheters (3 RCTs, 2 cohort studies), differences between groups on cesarean delivery, birth trauma (e.g., cephalohematoma), and uterine infection were small and not statistically significant (SOE: low), and while shoulder dystocia occurred less frequently in the outpatient group (1 RCT; 3% vs. 11%), the difference was not statistically significant (SOE: low). In comparing outpatient catheters and inpatient dinoprostone (1 double-balloon and 1 single-balloon RCT), the difference between groups for both cesarean delivery and postpartum hemorrhage was small and not statistically significant (SOE: low). Evidence on other outcomes in these comparisons and for misoprostol, double-balloon catheters, and hygroscopic dilators was insufficient to draw conclusions. In head to head comparisons in the outpatient setting, the frequency of cesarean delivery was not significantly different between 2.5 mg and 5 mg dinoprostone gel, or latex and silicone single-balloon catheters (1 RCT each, SOE: low). Differences between prostaglandins and placebo for cervical ripening were small and not significantly different for cesarean delivery (12 RCTs), shoulder dystocia (3 RCTs), or uterine infection (7 RCTs) (SOE: low). These findings did not change according to the specific prostaglandin, route of administration, study quality, or gestational age. Small, nonsignificant differences in the frequency of cesarean delivery (6 RCTs) and uterine infection (3 RCTs) were also found between dinoprostone and either membrane sweeping or expectant management (SOE: low). These findings did not change according to the specific prostaglandin or study quality. Evidence on other comparisons (e.g., single-balloon catheter vs. dinoprostone) or other outcomes was insufficient. For all comparisons, there was insufficient evidence on other important outcomes such as perinatal mortality and time from admission to vaginal birth. Limitations of the evidence include the quantity, quality, and sample sizes of trials for specific interventions, particularly rare harm outcomes. Conclusions. In women with low-risk pregnancies, the risk of cesarean delivery and fetal, neonatal, or maternal harms using either dinoprostone or single-balloon catheters was not significantly different for cervical ripening in the outpatient versus inpatient setting, and similar when compared with placebo, expectant management, or membrane sweeping in the outpatient setting. This evidence is low strength, and future studies are needed to confirm these findings.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography