Academic literature on the topic 'Electronic (technical) surveillance'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Electronic (technical) surveillance.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Electronic (technical) surveillance"

1

Tomczyk, Paweł, Daniel Mider, and Józef Grzegorczyk. "Inwigilacja elektroniczna jako metoda pozyskiwania informacji – ewaluacja i prognozy." Studia Politologiczne 2019, no. 54 (November 20, 2019): 258–94. http://dx.doi.org/10.33896/spolit.2019.54.10.

Full text
Abstract:
The text focuses on one of the elements belonging to the surveillance society – surveillance with the use of electronic tools. The authors attempt to answer the following questions. What types of negative phenomena are produced and intensified by electronic surveillance technologies? How deep is the state of the „vulnerability” of modern societies, what are the possibilities of surveillance devices? Is it possible to practically oppose them, how and what are the limits? What is the genesis of these phenomena and what future scenarios can be sketched based on the anticipation of observed trends? A set of research questions defined in this way required both sociological and technical perspectives at the same time. The authors recognize the negative phenomena associated with electronic surveillance: escalation, professionalization, institutionalization and normalization.
APA, Harvard, Vancouver, ISO, and other styles
2

Blatt, Amy J. "Geospatial Applications in Disease Surveillance." International Journal of Applied Geospatial Research 4, no. 2 (April 2013): 1–8. http://dx.doi.org/10.4018/jagr.2013040101.

Full text
Abstract:
Given the current attention on national health care reform and the electronic exchange of health information, this article highlights the major developments in disease surveillance and identifies a number of public health opportunities for geospatial thought leaders to undertake. Issues surrounding spatial data quality and resolution, the legal and ethical issues of volunteered geographical health information, and the technical demands of formulating a synthetic and integrative disease surveillance system represent the types of research questions that only geographers can address successfully.
APA, Harvard, Vancouver, ISO, and other styles
3

Rossheim, Matthew E., Eric K. Soule, Dennis L. Thombs, Tracey E. Barnett, Melvin D. Livingston, Gilbert Gimm, and Ogechikamma C. Emechebe. "Electronic Cigarette Explosion and Burn Injuries." Tobacco Regulatory Science 6, no. 3 (May 1, 2020): 179–86. http://dx.doi.org/10.18001/trs.6.3.2.

Full text
Abstract:
Objectives: E-cigarette explosions have resulted in severe injuries and fatalities. To date, only 2 studies have systematically estimated the prevalence of these injuries. This study updates these national estimates and describes the context of these explosion injuries. Methods: We conducted analyses on cross-sectional data from the US Consumer Product Safety Commission's (CPSC) National Electronic Injury Surveillance System (NEISS). A key word search of case narrative text identified e-cigarette explosion and burn injuries reported by US hospital emergency departments. We applied sampling weights to make national incidence estimates, and reviewed text to identify contextual factors. Results: An estimated 2693 (95% CI 1478 to 3909) e-cigarette explosion and burn injuries were presented to US hospital emergency departments between 2015 and 2018. Case narratives indicated that a notable proportion of explosions occurred while a person was changing or replacing a device's battery. Conclusions: To prevent further injuries and fatalities, there is a need for strengthened regulation and monitoring of e-cigarette devices. The variety of contexts in which e-cigarettes have exploded suggests these devices have poorly understood technical problems that industry should be required to address. In addition, data recording and surveillance of e-cigarette injuries need improvement.
APA, Harvard, Vancouver, ISO, and other styles
4

Kalancha, I. "ELECTRONIC SEGMENT IN THE CRIMINAL PROCEDURE LAW OF THE LATVIA." Criminalistics and Forensics, no. 65 (May 18, 2020): 90–100. http://dx.doi.org/10.33994/kndise.2020.65.09.

Full text
Abstract:
The article deals with the electronic segment in criminal procedural law in Latvia. It analyses both specialized electronic tools of criminal procedure in the form of information system (judicial information system) and non-specialized electronic tools of criminal procedure. The author studies the requirements for electronic recording of specific investigatory actions (interrogation of a juvenile victim and witness, questioning, exhumation, line-up for identification). The research focuses as well on the electronic component of special investigatory actions (correspondence control, communication facilities control, data control in an automated data processing system, content control of the transmitted data, audio or video location control, individual audio control). It provides further evidence for the possibility of implementing procedural actions using technical means (telephone conference, videoconference) if the interests of criminal proceedings so require. It is made clear that it is the duty of individual subjects of criminal proceedings at the request of the person who administers the proceedings to immediately notify in writing postal or e-mail address for managing written communications. The author outlines the terms for sending notifications in criminal proceedings and subpoenas to the individual’s email address. The article also investigates the procedure for publishing electronic images of a detainee, suspect, victim and witness in the media. It studies the regulations for recording the course of a court hearing in full size using audio, video or other technical means, as well as recording the parole by means of electronic surveillance. According to the results of the study, the author proposes to take into account a number regulations in criminal procedural law in Latvia when developing proposals for improving domestic criminal procedural law, including: interrogation of a minor using technical means and a psychologist in another room; the obligation to provide in writing postal or e-mail address for managing written communications and the possibility of sending a notification as for the decision with the enclosed copies to that e-mail address; sending summons to an email address; the procedure for the publication in the media of images of the suspect, victim and witness taken during the proceedings; arranging the parole using electronic surveillance.
APA, Harvard, Vancouver, ISO, and other styles
5

BOROVYK, O., D. BOROVYK, and D. CIMBRIQUE. "SUMMARY REQUIRING REGARDLESS OF CREATION DECISION SUPPORT SYSTEM FOR THE DISTRIBUTION CAPABILITIES TO PROVIDE SUFFICIENT EFFICIENCY OF BORDER REGION OF SYSTEMS FOR OPTO-ELECTRONIC SURVEILLANCE." Computer Systems and Information Technologies 1, no. 1 (September 2, 2020): 81–90. http://dx.doi.org/10.31891/csit-2020-1-11.

Full text
Abstract:
The article is devoted to the substantiation of the choice of the basic methodology for assessing the effectiveness of the optoelectronic surveillance system, which could be taken as the basic model of this system for the distribution of forces and means to ensure a sufficient level of border protection efficiency. taking into account in the specified basic methodology for assessing the effectiveness of the system. As a result of the study it was found that as a basic method of assessing the effectiveness of the optoelectronic surveillance system, it is advisable to adopt a method based on a probabilistic approach to describe the processes that accompany the functioning of the optoelectronic surveillance system. It is also substantiated that the main provisions that need to be taken into account when creating a decision support system for the distribution of forces and means to ensure a sufficient level of border protection in the field of optoelectronic surveillance are: homogeneous in terms of features of technical means of border protection time periods; adequate integrated laws of distribution of time periods, which determine the probability of non-detection of the target to its approach to a given distance by certain technical means of border protection, which are part of the studied system of optoelectronic surveillance; points of "stitching" of various integral laws of distribution at the ends of the specified periods; the impact of weather changes over a period of time, which characterizes the period of the service organization, on the functioning of the system; "Dead" zones, which are dynamically variable depending on the natural and man-made conditions that arise in the area of responsibility.
APA, Harvard, Vancouver, ISO, and other styles
6

Aliabadi, Ali, Abbas Sheikhtaheri, and Hossein Ansari. "Electronic health record–based disease surveillance systems: A systematic literature review on challenges and solutions." Journal of the American Medical Informatics Association 27, no. 12 (September 14, 2020): 1977–86. http://dx.doi.org/10.1093/jamia/ocaa186.

Full text
Abstract:
Abstract Objective Disease surveillance systems are expanding using electronic health records (EHRs). However, there are many challenges in this regard. In the present study, the solutions and challenges of implementing EHR-based disease surveillance systems (EHR-DS) have been reviewed. Materials and Methods We searched the related keywords in ProQuest, PubMed, Web of Science, Cochrane Library, Embase, and Scopus. Then, we assessed and selected articles using the inclusion and exclusion criteria and, finally, classified the identified solutions and challenges. Results Finally, 50 studies were included, and 52 unique solutions and 47 challenges were organized into 6 main themes (policy and regulatory, technical, management, standardization, financial, and data quality). The results indicate that due to the multifaceted nature of the challenges, the implementation of EHR-DS is not low cost and easy to implement and requires a variety of interventions. On the one hand, the most common challenges include the need to invest significant time and resources; the poor data quality in EHRs; difficulty in analyzing, cleaning, and accessing unstructured data; data privacy and security; and the lack of interoperability standards. On the other hand, the most common solutions are the use of natural language processing and machine learning algorithms for unstructured data; the use of appropriate technical solutions for data retrieval, extraction, identification, and visualization; the collaboration of health and clinical departments to access data; standardizing EHR content for public health; and using a unique health identifier for individuals. Conclusions EHR systems have an important role in modernizing disease surveillance systems. However, there are many problems and challenges facing the development and implementation of EHR-DS that need to be appropriately addressed.
APA, Harvard, Vancouver, ISO, and other styles
7

Gamache, Roland, Hadi Kharrazi, and Jonathan Weiner. "Public and Population Health Informatics: The Bridging of Big Data to Benefit Communities." Yearbook of Medical Informatics 27, no. 01 (August 2018): 199–206. http://dx.doi.org/10.1055/s-0038-1667081.

Full text
Abstract:
Objective: To summarize the recent public and population health informatics literature with a focus on the synergistic “bridging” of electronic data to benefit communities and other populations. Methods: The review was primarily driven by a search of the literature from July 1, 2016 to September 30, 2017. The search included articles indexed in PubMed using subject headings with (MeSH) keywords “public health informatics” and “social determinants of health”. The “social determinants of health” search was refined to include articles that contained the keywords “public health”, “population health” or “surveillance”. Results: Several categories were observed in the review focusing on public health's socio-technical infrastructure: evaluation of surveillance practices, surveillance methods, interoperable health information infrastructure, mobile health, social media, and population health. Common trends discussing socio-technical infrastructure included big data platforms, social determinants of health, geographical information systems, novel data sources, and new visualization techniques. A common thread connected these categories of workforce, governance, and sustainability: using clinical resources and data to bridge public and population health. Conclusions: Both medical care providers and public health agencies are increasingly using informatics and big data tools to create and share digital information. The intent of this “bridging” is to proactively identify, monitor, and improve a range of medical, environmental, and social factors relevant to the health of communities. These efforts show a significant growth in a range of population health-centric information exchange and analytics activities.
APA, Harvard, Vancouver, ISO, and other styles
8

David, Matthew, and Jamieson Kirkhope. "New Digital Technologies: Privacy/Property, Globalization, and Law." Perspectives on Global Development and Technology 3, no. 4 (2004): 437–49. http://dx.doi.org/10.1163/1569150042728884.

Full text
Abstract:
AbstractThis paper addresses attempts to locate and dislocate music audiences in the context of global commercial, legal, and technical developments. The 2001 legal decision against Napster in the United States found the file share service company guilty of copyright infringement. This precedent appeared to support the recording industry. However, such legal frames have been bypassed by new softwares. Supporters see such global networks of sharing and distribution as undoing corporate control. The recording industry has responded with parallel claims of having encryption and surveillance technologies capable of globally reregulating property. However, as this article shows, there is no technical necessity and that total freedom and total enforcement are impossible. Just as globalization is reified into an inevitable process of deregulation in one instance and at the next moment it is reified into an indispensable regulatory regime, so new electronic media and global electronic networks promote neither regulation or deregulation, except in so far as the balance of social forces at any one time interprets and enacts them in such ways.
APA, Harvard, Vancouver, ISO, and other styles
9

Bloomfield, Brian. "In the Right Place at the Right Time: Electronic Tagging and Problems of Social Order/Disorder." Sociological Review 49, no. 2 (May 2001): 174–201. http://dx.doi.org/10.1111/1467-954x.00251.

Full text
Abstract:
This paper explores the relationship between technology and problems of social order/disorder in the context of discussions of surveillance and ‘virtuality'. The emphasis is on understanding the connections between technology and social relations in areas where issues of social order/disorder are a prominent feature of concern and where one can identify the emergence of new regimes of virtual control which are directed at solving the (supposed) deficits in order or the threats posed to it. Rather than constituting a ‘technical fix’ for the problems of social order/disorder, it is argued that forms of virtual control both presuppose a reconstruction of social order and at the same time aim to effect a suppression of disorder. Focusing in particular on various manifestations of electronic tagging – from prisoners to babies, from retail goods to works of art, from television programmes to Personal Identification Numbers – the paper argues that these share a problematic which interrelates technology, order/disorder, subjects/objects, time, and space. It thus seeks to generalize the concept of electronic tagging, to regard it as a practice rather than a specific set of artefacts. Moreover, in contrast to the negative, panoptic reading of tagging technologies, the paper considers the active public participation in systems of surveillance and thereby the more positive or productive exercises of power which they may be taken to constitute.
APA, Harvard, Vancouver, ISO, and other styles
10

Galli, Brian J. "Effects on Current Day Technology, Legislation with Respect to Ethical Valuation." International Journal of Responsible Leadership and Ethical Decision-Making 1, no. 1 (January 2019): 1–12. http://dx.doi.org/10.4018/ijrledm.2019010101.

Full text
Abstract:
Edward Snowden is an American who released classified government information to journalists in June 2013. These secrets revealed the existence and purpose of numerous government mass-surveillance programs, which were developed to gather, retain, and analyze electronic information not only on a nationwide scale but also on a global scale. Due to his actions, some would describe Snowden as a villain or traitor, while others would describe him as a hero or patriot. After the release of information about large government surveillance programs, there are varied opinions as to whether this had a reforming effect on our society from a technical and legislative standpoint. However, there has been very little focus on whether the absence or presence of these changes has any correlation or effect on what we think about it ethically. This research is intended to discuss if the results of Edward Snowden's actions had an impact on cybertechnology and legislation due to the ethical considerations surrounding it.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Electronic (technical) surveillance"

1

Knoesen, Andre Leon. "The use of physical surveillance in forensic investigation." Diss., 2012. http://hdl.handle.net/10500/9233.

Full text
Abstract:
The problem that was identified is that physical surveillance is not generally used by general detectives in the South African Police Service as a technique during their investigations. According to the researcher’s experience, this can be due to lack of understanding or experience or may stem from ignorance. A lack of training on the use of physical surveillance as a method to obtain information for the investigation process was also identified as a problem. This study therefore investigated the role and use of physical surveillance within the forensic investigation process. The focus of the research was on basic static (stationary), foot and vehicle surveillance as these types of surveillance are usually conducted in conjunction with each other. An empirical research design was used to conduct the research. A qualitative research approach enabled the researcher to obtain first-hand information from interviews with general detectives. Information was also obtained from a thorough literature study and from the researcher’s own experience on the topic. To conduct effective investigation, it is important for investigators to be familiar with the concept of physical surveillance, its elements, its influence and its values. A physical surveillance operation is a forensic tool used to gather evidence, to recover stolen property, and to identify and arrest the perpetrator. The use of physical surveillance during investigations serves the purpose of gathering evidence and information that can be used as intelligence. Successful forensic investigation requires skill and places extraordinary demands on detectives to utilise all available methods and techniques. The recognition of the use of physical surveillance as a method of evidence gathering is of outmost importance. The research has revealed that general detectives do not acknowledge the importance of physical surveillance as a method to obtain information for the investigation process. It is of vital importance that all detectives be properly trained with the necessary knowledge and skills to make use of this valuable investigative tool.
Police Practice
M. Tech. (Forensic Investigation)
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Electronic (technical) surveillance"

1

Wang luo tong xin jian kong fa lü yu ji shu biao zhun dao du: Guided Reading on Law and Technical Standard of Network Lawful Interception. Beijing Shi: Fa lü chu ban she, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. Federal Aviation Administration, ed. Technical surveillance countermeasures: Information guide (TSCM). [Washington, D.C.?]: U.S. Dept. of Transportation, Federal Aviation Administration, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

A Legal And Law Enforcement Guide To Telephony: Addressing Technical, Legal And Police Issues Relating To The Interface And Interaction With Communication Service Providers. C.C. Thomas, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Molczan, George. A Legal And Law Enforcement Guide To Telephony: Addressing Technical, Legal And Police Issues Relating To The Interface And Interaction With Communication Service Providers. C.C. Thomas, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gerold, Yonas, and Society of Photo-optical Instrumentation Engineers., eds. Peace and wartime applications and technical issues for unattended ground sensors: 22-23 April 1997, Orlando, Florida. Bellingham, Wash., USA: SPIE, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Howard, Philip N. Pax Technica. Yale University Press, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pax Technica: How the Internet of Things May Set Us Free or Lock Us Up. Yale University Press, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Howard, Philip N. Pax Technica: How the Internet of Things May Set Us Free or Lock Us Up. Yale University Press, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Electronic (technical) surveillance"

1

Kleve, Pieter, Richard V. De Mulder, and Kees van Noortwijk. "Surveillance in the 21st Century." In Socioeconomic and Legal Implications of Electronic Intrusion, 195–215. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-204-6.ch012.

Full text
Abstract:
In this chapter, some current technologies for monitoring and surveillance as well as some legal considerations regarding the application of these technologies will be discussed. The application of monitoring technology has developed from the monitoring of mere technical processes and environmental processes to the monitoring of physiological “processes” and now even of everyday human behaviour. Before discussing legal considerations, an explanation of this development is given and it is placed within a broader social perspective. This leads to an examination of the development of technology that made it possible for monitoring technologies to evolve as they did, and an analysis of norms and values resulting in a conceptual model for evaluating law in the “information society”. An overview of technologies for monitoring and surveillance will be presented. From this overview it will become clear that the use of this type of technology is growing fast. At the same time, questions arise regarding its permissibility in the light of legal and constitutions rights, such as the right to privacy. These questions are then addressed in the context of the wider social developments. Finally, it is concluded that with the increasing importance and use of surveillance technology, “monitoring the surveillors” will become essential as well.
APA, Harvard, Vancouver, ISO, and other styles
2

Stein, Michael D., and Sandro Galea. "The New Elderly Surveillance State." In Pained, 183–84. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780197510384.003.0052.

Full text
Abstract:
This chapter studies how technology can help keep the older generation safe and at home. If media commentary on this subject is to be believed, the Internet of Things will carry part of the load of caring for the elders. New, in-home smart systems will reduce caregiver stress through electronic surveillance, allowing doctors to get real-time insights into the health of loved ones, improving their quality of life. Indeed, teams of clinical, economic, security, and technical experts are now at work on a new form of “assisted living.” The model patient will have, in their home, passive environmental sensors, medical devices, wearable technologies, and interactive apps connected to their body and bed, floor and door frames, collecting a fast-moving stream of data. However, will these new, technologically sophisticated homes really tackle the core problems of aging and dementia? Technology by itself will not be the full solution. People have to figure out the role that old-fashioned social networks—humans checking in on humans—will play, and how technology can help augment, not replace, the role that caregivers play in maximizing quality of life for those who can no longer care for themselves. This will require a serious examination of the role of work and obligation, borne by those in middle age, and how this can fit in with the increasing responsibilities they will inevitably bear as the population ages.
APA, Harvard, Vancouver, ISO, and other styles
3

Pang, Les. "Radio Frequency IdentificationTechnology in Digital Government." In Information Security and Ethics, 2623–33. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch174.

Full text
Abstract:
Following technical strides in radio and radar in the 1930s and 1940s, the 1950s were a period of exploration for radio frequency identity (RFID) technology as shown by the landmark development of the long-range transponder systems for the “identification, friend or foe” for aircraft. Commercial use of RFID appeared in the 1960s, such as electronic article surveillance systems in retail stores to prevent theft. The 1970s were characterized by developmental work resulting in applications for animal tracking, vehicle tracking, and factory automation. RFID technology exploded during the 1980s in the areas of transportation and, to a lesser extent, personnel access and animals. Wider deployment of RFID tags for automated toll collection happened in the 1990s. Also, there was growing interest of RFID for logistics and having it work along side with bar codes. In the beginning of the 21st century, the application of RFID technology has been ubiquitous and now it is practically part of everyday life (Landt, 2001).
APA, Harvard, Vancouver, ISO, and other styles
4

Bergkvist, Sofi, and Hanna Pernefeldt. "Primary Care through a Public-Private Partnership." In Advances in Healthcare Information Systems and Administration, 127–53. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-885-2.ch008.

Full text
Abstract:
The primary care delivery model developed by the Health Management and Research Institute (HMRI) in India, integrates innovative technical solutions and process-oriented operations for the provision of healthcare services, while supporting the public health system. Through a public-private partnership with the state government of Andhra Pradesh, HMRI has a unique base to pilot large scale health interventions. The HMRI Model includes components such as a medical helpline, rural outreach health services, a disease surveillance program, a blood bank application, and telemedicine projects. Both clinical and non-clinical procedures are strengthened by technology that enables research, tailored and evidence-based interventions, as well as improves efficiency and quality of healthcare delivery. Health management and decision-making is assisted by the organization’s large database of electronic medical records. Challenges to implementation include implications of large government contracts, funding issues, as well as technical constraints and human resources issues. This chapter describes the Model’s various components and its contextual framework with enabling and constraining factors. HMRI has developed a unique system for preventive and primary care that can serve as a model for low, middle, and high income countries, though external evaluations are critically needed for further assessment of best practices.
APA, Harvard, Vancouver, ISO, and other styles
5

Kaspar, Christian. "RFID Technologies and Applications." In Encyclopedia of Multimedia Technology and Networking, Second Edition, 1232–39. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch167.

Full text
Abstract:
Radio frequency identification (RFID) is a radio-supported identification technology that typically operates by saving a serial number on a radio transponder that contains a microchip for data storage. Via radio waves, the coded information is communicated to a reading device (Jones et al., 2005). RFID does not represent a new development; it was devised by the American military in the 1940s. Since the technology’s clearance for civil use in 1977, RFID has been successfully used for the identification of productive livestock, for electronic immobilizer systems in vehicles, or for the surveillance of building entrances (Srivastava, 2005). Due to decreasing unit costs (especially for passive transponders), RFID technologies now seem increasingly applicable for the labeling of goods and semi-finished products. By this, manual or semi-automatic data entry, for instance through the use of barcodes, can be avoided. This closes the technical gap between the real world (characterized by the lack of distribution transparency of its objects) and the digital world (characterized by logically and physically unambiguous and therefore distribution-transparent objects). In addition, RFID facilitates fully automated simultaneous recognition of more than one transponder without direct line of sight between reader and transponders.
APA, Harvard, Vancouver, ISO, and other styles
6

Kaspar, Christian, Adam Melski, Britta Lietke, Madlen Boslau, and Svenja Hagenhoff. "RFID Technologies and Applications." In Ubiquitous and Pervasive Computing, 44–53. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-960-1.ch005.

Full text
Abstract:
Radio frequency identification (RFID) is a radiosupported identification technology that typically operates by saving a serial number on a radio transponder that contains a microchip for data storage. Via radio waves, the coded information is communicated to a reading device (Jones et al., 2005). RFID does not represent a new development; it was devised by the American military in the 1940s. Since the technology’s clearance for civil use in 1977, RFID has been successfully used for the identification of productive livestock, for electronic immobilizer systems in vehicles, or for the surveillance of building entrances (Srivastava, 2005). Due to decreasing unit costs (especially for passive transponders), RFID technologies now seem increasingly applicable for the labeling of goods and semi-finished products. By this, manual or semi-automatic data entry, for instance through the use of barcodes, can be avoided. This closes the technical gap between the real world (characterized by the lack of distribution transparency of its objects) and the digital world (characterized by logically and physically unambiguous and therefore distribution-transparent objects). In addition, RFID facilitates fully automated simultaneous recognition of more than one transponder without direct line of sight between reader and transponders.
APA, Harvard, Vancouver, ISO, and other styles
7

Dodig-Crnkovic, Gordana, and Virginia Horniak. "Ethics and Privacy of Communications in the E-Polis." In Information Security and Ethics, 2524–30. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch168.

Full text
Abstract:
The electronic networking of physical space promises wide-ranging advances in science, medicine, delivery of services, environmental monitoring and remediation, industrial production and the monitoring of persons and machines. It can also lead to new forms of social interaction. However, without appropriate architecture and regulatory controls, it can also subvert democratic values. Information technology is not, in fact, neutral in its values; we must be intentional about design for democracy (Pottie, 2004). Information and communication technology (ICT) has led to the emergence of global Web societies. The subject of this article is privacy and its protection in the process of urbanization and socialization of the global digital Web society referred to as the e-polis. Privacy is a fundamental human right recognized in all major international agreements regarding human rights, such as Article 12 of the Universal Declaration of Human Rights (United Nations, 1948), and it is discussed in the article “Different Views of Privacy”. Today’s computer network technologies are sociologically founded on hunter-gatherer principles. As a result, common users may be possible subjects of surveillance and sophisticated Internet-based attacks. A user may be completely unaware of such privacy breaches taking place. At the same time, ICT offers the technical possibilities of embedded privacy protection obtained by making technology trustworthy and legitimate by design. This means incorporating options for socially acceptable behavior in technical systems, and making privacy protection rights and responsibilities transparent to the user. The ideals of democratic government must be respected and even further developed in the future e-government. Ethical questions and privacy of communications require careful analysis, as they have far-reaching consequences affecting the basic principles of e-democracy.
APA, Harvard, Vancouver, ISO, and other styles
8

Baecker, Ronald M. "Computers in medicine and health care." In Computers and Society. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198827085.003.0009.

Full text
Abstract:
As with the chapter on learning, we begin our discussion of health applications by examining influential early visions of the possible role of computers in improving health care and medicine. We then look at the great variety of roles played by current digital technologies in this field. We first consider the online availability of health information. There are two possible sources: one from respected centres of expertise, the other from consumers of medical care, that is, patients, who in working together form what may be viewed as communities of care. There is strong evidence that people are using these online medical resources to become more intelligent guardians of their own health and to support themselves when seeking help from physicians. Next, we examine the care improvements promised by personal health and electronic medical records. Progress here has been disappointingly slow; we shall discuss the mix of technical, cultural, administrative, interpersonal, and financial reasons for the sluggishness in development and deployment. Two particularly interesting cases of medical information are data dealing with adverse drug reactions and interactions, commonly known as adverse drug events (ADEs), and the use of big data and social media in epidemic surveillance and control, by which we are becoming better equipped to indicate, predict, and track outbreaks of disease. Computers have made a huge impact on medical education through the development of human body simulators. There also continue to be more and more advanced uses of technology embedded within the human body, either to augment the functioning of organs or to replace body parts that no longer work, which could possibly result in bionic people or androids in the future. We shall present some examples indicating the pace at which these technologies are developing. Recent advances in understanding the human genome have enabled a new form of medicine called precision medicine. The goal is to use genetic screening of patients to enable more specific treatments than were hitherto possible. Precision medicine also enables what some call designer babies. We shall introduce policy and ethical issues raised by this concept.
APA, Harvard, Vancouver, ISO, and other styles
9

Jarvis, Chris, and John Kupiec. "Accessing Public Sector Environmental Data and Information." In Global Information Technologies, 578–86. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-939-7.ch046.

Full text
Abstract:
This chapter highlights the importance that the Environment Agency places on the provision of information and the key part it plays in achieving environmental goals, an importance that is recognised in a range of national, European and international laws and agreements. The Agency is seeking to ensure that it meets the “letter” and, importantly, the spirit of all relevant legislation. To this end, our vision is environmental information freely available to all – quickly and easily, where and when people want it, and in a format to meet particular needs. The opportunities that present themselves in today’s “Information Age” are exciting and the potential to lever environmental benefit is great. The Agency’s track record in this field is already considerable, with five years’ experience of providing key environmental datasets through “What’s in Your Backyard?” – a GIS, Internet based national portal (www.environment-agency.gov.uk). This system has been developed and extended to include a pollution inventory, flood plain maps, landfill sites and a range of other data layers. Members of the public can find information from a national level, right down to their local environment: locating areas of interest by postcode or place name, displaying data to a chosen scale, formulating individual queries on the datasets, gaining background on information of interest, and downloading data for their own use off-line. The key components in establishing such services are people, data and technical infrastructure. The Environment Agency’s National Centre for Environmental Data & Surveillance has developed a conceptual architecture within which these components can be effectively managed and brought to bear on the processes of delivering timely data and information products. This is a challenging task within large administrations where data collection, management and storage are widely distributed both geographically and organisationally. Experience to date has shown the approach to be flexible, reliable and scalable. We have also developed our understanding of why people want information and how they want to access it – and importantly why some people do not see the relevance of environmental information to them. We have therefore formulated a strategy to improve the flexibility and response of the services we provide. This strategy also includes developing highly tailored information services that feed off the same base datasets. The Agency has recently piloted just such a service aimed at residential house purchasers. This is an e-business service accessible by solicitors over the Internet, with individually tailored environmental reports generated and delivered in real time. There is the potential to develop similar tailored services wherever environmental information is, or should be, a key part of business activities and decisions. Future development will therefore not solely be making more information available in an electronic format. Information must be made relevant to particular needs at particular times. Citizens must be made aware of the wider environmental impacts of their consumer choices and the implications to themselves and others. They must also understand the real effect of the environment on their daily lives and why it is in their interest to be interested.
APA, Harvard, Vancouver, ISO, and other styles
10

Jarvis, Chris, and John Kupiec. "Accessing Public Sector Environmental Data and Information." In Information Systems for Sustainable Development, 291–303. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-342-5.ch018.

Full text
Abstract:
This chapter highlights the importance that the Environment Agency places on the provision of information and the key part it plays in achieving environmental goals, an importance that is recognised in a range of national, European and international laws and agreements. The Agency is seeking to ensure that it meets the “letter” and, importantly, the spirit of all relevant legislation. To this end, our vision is environmental information freely available to all – quickly and easily, where and when people want it, and in a format to meet particular needs. The opportunities that present themselves in today’s “Information Age” are exciting and the potential to lever environmental benefit is great. The Agency’s track record in this field is already considerable, with five years’ experience of providing key environmental datasets through “What’s in Your Backyard?” – a GIS, Internet based national portal (www.environment-agency.gov.uk). This system has been developed and extended to include a pollution inventory, flood plain maps, landfill sites and a range of other data layers. Members of the public can find information from a national level, right down to their local environment: locating areas of interest by postcode or place name, displaying data to a chosen scale, formulating individual queries on the datasets, gaining background on information of interest, and downloading data for their own use off-line. The key components in establishing such services are people, data and technical infrastructure. The Environment Agency’s National Centre for Environmental Data & Surveillance has developed a conceptual architecture within which these components can be effectively managed and brought to bear on the processes of delivering timely data and information products. This is a challenging task within large administrations where data collection, management and storage are widely distributed both geographically and organisationally. Experience to date has shown the approach to be flexible, reliable and scalable. We have also developed our understanding of why people want information and how they want to access it – and importantly why some people do not see the relevance of environmental information to them. We have therefore formulated a strategy to improve the flexibility and response of the services we provide. This strategy also includes developing highly tailored information services that feed off the same base datasets. The Agency has recently piloted just such a service aimed at residential house purchasers. This is an e-business service accessible by solicitors over the Internet, with individually tailored environmental reports generated and delivered in real time. There is the potential to develop similar tailored services wherever environmental information is, or should be, a key part of business activities and decisions. Future development will therefore not solely be making more information available in an electronic format. Information must be made relevant to particular needs at particular times. Citizens must be made aware of the wider environmental impacts of their consumer choices and the implications to themselves and others. They must also understand the real effect of the environment on their daily lives and why it is in their interest to be interested.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Electronic (technical) surveillance"

1

Wan, Min, Yan Hou, and Qian Wang. "Research on the Process and Technical System of Space-based Reconnaissance and Surveillance for Maritime Moving Targets." In 2019 IEEE 3rd Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC). IEEE, 2019. http://dx.doi.org/10.1109/imcec46724.2019.8984054.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lao, Weilun, Jungong Han, and Peter H. N. de With. "Automatic surveillance analyzer using trajectory and body-based modeling." In 2009 Digest of Technical Papers International Conference on Consumer Electronics (ICCE). IEEE, 2009. http://dx.doi.org/10.1109/icce.2009.5012362.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Seunghyun Jang, Bonghyuk Park, Seungsik Lee, and Sangsung Choi. "An optical AM video/PTZ data transceiver for a video-based surveillance network." In 2009 Digest of Technical Papers International Conference on Consumer Electronics (ICCE). IEEE, 2009. http://dx.doi.org/10.1109/icce.2009.5012305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kharitonenko, I., Wanqing Li, and C. Weerasinghe. "Novel architecture for surveillance cameras with complementary metal oxide semiconductor image sensors." In 2005 Digest of Technical Papers. International Conference on Consumer Electronics, 2005. ICCE. IEEE, 2005. http://dx.doi.org/10.1109/icce.2005.1429812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chamlawi, Rafiullah, Chang-Tsun Li, Imran Usman, and Asifullah Khan. "Authentication and recovery of digital images: Potential application in video surveillance and remote sensing." In 2009 Digest of Technical Papers International Conference on Consumer Electronics (ICCE). IEEE, 2009. http://dx.doi.org/10.1109/icce.2009.5012340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography