To see the other types of publications on this topic, follow the link: Surveillance technology.

Journal articles on the topic 'Surveillance technology'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Surveillance technology.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Danesh, Valerie, and Terry L. Jones. "Technology-Enhanced Surveillance." Critical Care Medicine 46, no. 7 (2018): 1185–86. http://dx.doi.org/10.1097/ccm.0000000000003168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Haque, Akhlaque. "Information Technology and Surveillance." Social Science Computer Review 23, no. 4 (2005): 480–85. http://dx.doi.org/10.1177/0894439305278874.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Van der Vlist, Fernando N. "Counter-Mapping Surveillance: A Critical Cartography of Mass Surveillance Technology After Snowden." Surveillance & Society 15, no. 1 (2017): 137–57. http://dx.doi.org/10.24908/ss.v15i1.5307.

Full text
Abstract:
This article critically examines mass surveillance technology revealed by Snowden’s disclosures. It addresses that we do not only live in a society where surveillance is deeply inscribed but more urgently, that it is increasingly difficult to study surveillance when its technologies and practices are difficult to distinguish from everyday routines. Considerably, many of the technologies and systems utilised for surveillance purposes were not originally designed as proper surveillance technologies. Instead, they have effectively become surveillance technologies by being enrolled into a particular surveillant assemblage. Three contributions are made towards critical scholarship on surveillance, intelligence, and security. First, a novel empirical cartographic methodology is developed that employs the vocabularies of assemblages and actor–networks. Second, this methodology is applied to critically examine global mass surveillance according to Snowden. Multiple leaked data sources have been utilised to trace actors, their associations amongst each other, and to create several graphical maps and diagrams. These maps provide insights into actor types and dependence relations described in the original disclosed documents. Third, the analytical value of three ordering concepts as well as the logistics of surveillance are explored via notable actors and actor groups. In short, this contribution provides empirical cartographic methods, concepts, and analytical targets for critically examining surveillance technology and its particular compositions. It addresses challenges of resisting mass surveillance and some forms of data activism, and calls for the continuing proliferation of counter-maps to facilitate grounded critique, to raise awareness, and to gain a foothold for meaningful resistance against mass surveillance.
APA, Harvard, Vancouver, ISO, and other styles
4

Venmathi, V., L. Kiruthika L.Kiruthika, P. Megala P.Megala, R. Sripriya R.Sripriya, and C. Subbulakshmi C.Subbulakshmi. "Mobile Surveillance using Wireless Technology." International Journal of Computer Applications 114, no. 16 (2015): 10–13. http://dx.doi.org/10.5120/20061-2094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dorjay, Chawang. "Technology, Surveillance and the Pandemic." Salesian Journal of Humanities and Social Sciences 11, no. 1 (2020): 91–95. http://dx.doi.org/10.51818/sjhss.11.2020.91-95.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kuck, Marc. "Technology Focus: Production Monitoring/Surveillance." Journal of Petroleum Technology 67, no. 03 (2015): 110. http://dx.doi.org/10.2118/0315-0110-jpt.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Barnard-Wills, David, and Helen Wells. "Surveillance, technology and the everyday." Criminology & Criminal Justice 12, no. 3 (2012): 227–37. http://dx.doi.org/10.1177/1748895812446644.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ding, Yi, Yu Hui Li, and Bo Li. "Advances in Intelligent Visual Surveillance Technology." Applied Mechanics and Materials 738-739 (March 2015): 730–33. http://dx.doi.org/10.4028/www.scientific.net/amm.738-739.730.

Full text
Abstract:
With the improvement of people's security requirements,increasing the number of surveillance cameras,video surveillance by human beings is no longer suitable. Hence,intelligent visual surveillance technology emerges and becomes one of the hottest research points. In this paper,the processing of intelligent video surveillance based on human motion was divided into four categories: target detection,target tracking,object classification and recognition,and behavior analysis. Also made a detailed comprehensive review for situation of these parts,and made comprehensively summarized for the problems and difficulties which have to be resolved.
APA, Harvard, Vancouver, ISO, and other styles
9

Doudaki, Vaia, Panos Kompatsiaris, Jim Ingebretsen Carlson, Judith Clares-Gavilán, and Dessislava Boshnakova. "Techno-pessimistic and techno-optimistic visions of surveillance and resistance in Europe." Central European Journal of Communication 17, no. 1(35) (2024): 17–37. http://dx.doi.org/10.51480/1899-5101.17.1(35).696.

Full text
Abstract:
Our study explores peoples’ visions of surveillance and resistance to surveillance, enabled through communication and digital platforms in Europe. The research involves future scenario development and analysis, which allows us to sketch out future outlooks concerning surveillance/resistance in Europe, examining how these visions reflect the main assumptions, fears and hopes about the future of societies in Europe. The analysis, which is anchored in surveillance studies, shows how the visions of surveillance and resistance are informed by people’s dispositions towards technology, which centre around techno-optimism and techno-pessimism, focusing either on the empowering or liberating forces of technology or on technology’s disabling and destructive power. These dispositions instruct ideas about the futures of Europe, seeing Europe as either a regulator or protector of people’s privacy and freedoms or as a surveillant apparatus, curtailing peoples’ freedom and democratic rights.
APA, Harvard, Vancouver, ISO, and other styles
10

Lippert, Randy K., and Jolina Scalia. "Attaching Hollywood to a Surveillant Assemblage: Normalizing Discourses of Video Surveillance." Media and Communication 3, no. 3 (2015): 26–38. http://dx.doi.org/10.17645/mac.v3i3.286.

Full text
Abstract:
This article examines video surveillance images in Hollywood film. It moves beyond previous accounts of video surveillance in relation to film by theoretically situating the use of these surveillance images in a broader “surveillant assemblage”. To this end, scenes from a sample of thirty-five (35) films of several genres are examined to discern dominant discourses and how they lend themselves to normalization of video surveillance. Four discourses are discovered and elaborated by providing examples from Hollywood films. While the films provide video surveillance with a positive associative association it is not without nuance and limitations. Thus, it is found that some forms of resistance to video surveillance are shown while its deterrent effect is not. It is ultimately argued that Hollywood film is becoming attached to a video surveillant assemblage discursively through these normalizing discourses as well as structurally to the extent actual video surveillance technology to produce the images is used.
APA, Harvard, Vancouver, ISO, and other styles
11

Zimmer, Catherine. "Surveillance Cinema: Narrative between Technology and Politics." Surveillance & Society 8, no. 4 (2011): 427–40. http://dx.doi.org/10.24908/ss.v8i4.4180.

Full text
Abstract:
Taking as a starting point the recent surge in film and television narratives constructed around and by surveillance technologies, this essay offers a historical and theoretical reexamination of the manner in which screen narrative has organized political, racial, affective, and even material formations around and through surveillance. The essay demonstrates that even when films are focused on insistently visual deployments of surveillance technologies, the narrative construction around those technologies suggests highly complex dynamics—dynamics that neither psychoanalytic conceptions of voyeurism nor Foucault’s discourse on Bentham’s panopticon can entirely account for. A visual orientation has made it these approaches which have, within the realm of cinema studies, overwhelming served to explain the formations and functions of a variety of disparate surveillance-themed narratives. A more phenomenological reading of the relations between technology and narrative, as well as a more dynamic intersection with political philosophy as is represented in the growing field of surveillance studies, allows us to see how what this essay calls “surveillance cinema” serves to consolidate the stakes of surveillance technologies and practices with greater attention to historical and structural specificity.
APA, Harvard, Vancouver, ISO, and other styles
12

Miller, Patrick. "Technology Focus: Reservoir Surveillance (September 2021)." Journal of Petroleum Technology 73, no. 09 (2021): 36. http://dx.doi.org/10.2118/0921-0036-jpt.

Full text
Abstract:
It is not unusual to compare a team of subsurface professionals to a team of detectives piecing together a sequence of events to solve a crime. To make sense of what is happening in a hydrocarbon reservoir, subsurface teams, like detectives, typically have incomplete, sparse data sets, sampled at different points in time and space. The data only provide a partial picture of what has happened and what is likely to happen in the future. In either case, surveillance is an essential tactic to build a mental model of the situation. Fortunately, both detectives and subsurface teams have growing surveillance toolboxes to help fill information gaps and narrow the range of possible scenarios. In the oil and gas industry, an endless set of questions can be asked to characterize the state and history of a hydrocarbon reservoir. Teams need to understand the capability of the reservoir to store fluids, stresses acting on the reservoir, what fluids exist and how they interact with each other and the rock, and how fluids are moving (or are likely to move) through the reservoir. Information, however, is rarely free, and different surveillance tools provide varying qualities of information, so it is essential for subsurface professionals to choose wisely in terms of which problems to solve and which tools to pull out of the toolbox. Ultimately, we need to apply the right tools to the right problems to maximize the value of the information we gather. In this feature, we will explore innovative approaches to help better understand the stress state of the reservoir, interactions between different fluids and rocks, and how to track the movement of specific fluid components throughout the reservoir. To do so, the authors of the papers highlighted in this month’s feature apply advanced log data analysis, experimental laboratory work, and compositional reservoir simulation, key tools that every subsurface team should have in its toolbox. Recommended additional reading at OnePetro: www.onepetro.org. SPE 201679 - A Fast Method To Estimate the Correlation Between Confining Stresses and Absolute Permeability of Propped Fractures by Faras Al Balushi, The Pennsylvania State University, et al. SPE 202224 - Downhole Surveillance During the Well Lifetime Using Distributed Temperature Sensing by Ludovic Paul Ricard, CSIRO, et al. SPE 201635 - Predicting Reservoir Fluid Properties From Advanced Mud Gas Data by Tao Yang, Equinor, et al.
APA, Harvard, Vancouver, ISO, and other styles
13

Zhao, Zhe Feng, Xiao Jing Cui, and Hui Qiang Zhang. "Cloud Storage Technology in Video Surveillance." Advanced Materials Research 532-533 (June 2012): 1334–38. http://dx.doi.org/10.4028/www.scientific.net/amr.532-533.1334.

Full text
Abstract:
The advantage and potential applications of cloud storage technology in video surveillance, on the basis of the concept and technology character of the cloud storage, have been discussed in the paper. Some important problems of the cloud storage technology applications in video surveillance have also been analyzed.
APA, Harvard, Vancouver, ISO, and other styles
14

Shields, Peter. "Surveillance, Information Technology, and Reconfiguring Borders." Peace Review 21, no. 3 (2009): 385–94. http://dx.doi.org/10.1080/10402650903099476.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Khan, Muhammad Navaid. "Technology Focus: Reservoir Surveillance (September 2024)." Journal of Petroleum Technology 76, no. 09 (2024): 80–81. http://dx.doi.org/10.2118/0924-0080-jpt.

Full text
Abstract:
In today’s oil and gas operations, surveillance technologies have undergone a revolution, reshaping how facilities, wells, and reservoirs are monitored. These advancements not only have increased the scale at which these technologies are deployed but also have led to an unprecedented influx of data. The sheer volume of data, however, poses a significant challenge to traditional analytical methods, overwhelming their capacity to derive actionable insights effectively. To address this challenge, the industry is rapidly advancing toward automated solutions powered by artificial-intelligence (AI) -driven analytics. These systems automate data ingestion and use machine-learning algorithms to sift through massive data sets, identifying anomalies and prioritizing actionable insights. By automating routine surveillance tasks, engineers can focus on critical actions that deliver substantial operational benefits. For example, in paper IPTC 23912, operators successfully optimized production operations by harnessing real-time field data through smart systems, effectively managing operations with complex near-critical fluids. Similarly, in paper SPE 218470, researchers proposed a novel workflow integrating virtual flowmetering and permanent downhole gauge data for pattern recognition to enhance real-time monitoring and decision-making in petroleum and geothermal industries. Nevertheless, ensuring effective surveillance of operational assets requires a strategic approach. A valuable tool in crafting such strategies is the value of information (VOI) assessment. This method systematically evaluates how acquiring specific information can influence decision-making and operational outcomes. For instance, paper SPE 215318 highlights a field operator’s systematic approach to VOI assessment, aiming to optimize daily operations and guide future development activities. In essence, while surveillance technologies have inundated operators with unprecedented data flows, advancements in automation and AI-driven analytics offer the promise of unlocking this data’s true potential. By embracing these technologies, the oil and gas industry can navigate the complexities of the modern energy landscape with greater agility, precision, and cost-effectiveness. Recommended additional reading at OnePetro: www.onepetro.org. SPE 215119 Surveillance, Analysis, and Optimization During Active Drilling Campaign by Yanfen Zhang, Chevron, et al. OTC 35413 New Opportunities in Well and Reservoir Surveillance Using Multiple Downhole Pressure Gauges in Deepwater Injector Wells by Piyush Pankaj, ExxonMobil, et al. OTC 34863 Digital Twin for Oil-Rim Management Using Early Warning System and Exception-Based Surveillance, Offshore Malaysia by M. Mahamad Amir, Petronas, et al.
APA, Harvard, Vancouver, ISO, and other styles
16

Brown, Kenneth, and Marek Korczynski. "When Caring and Surveillance Technology Meet." Work and Occupations 37, no. 3 (2010): 404–32. http://dx.doi.org/10.1177/0730888410373875.

Full text
Abstract:
There is an important research gap regarding how the service triangle in care work is affected by the use of surveillance technology. This article addresses this gap by reporting quantitative and qualitative research undertaken in three U.K. local government home care organizations. Through regression analysis, it is found that discretionary effort is positively related, and organizational commitment negatively related, to information technology as a controlling force and management hindering the delivery of client services. The qualitative research triangulates these findings and offers complementarity by showing that workers continued to give discretionary effort in order to maintain the delivery of meaningful care to clients, even as they lowered their commitment to the organization. The conclusion draws out the implications of these findings for understanding of the social relations of the service triangle in contemporary society.
APA, Harvard, Vancouver, ISO, and other styles
17

DROTT, ERIC A. "Music as a Technology of Surveillance." Journal of the Society for American Music 12, no. 3 (2018): 233–67. http://dx.doi.org/10.1017/s1752196318000196.

Full text
Abstract:
AbstractThis article explores surveillance in cloud-based music streaming. Key catalysts in the transition from ownership- to access-based models of music distribution, services like Spotify, Pandora, or Deezer have positioned themselves as a means of reintegrating listeners into “digital enclosures” over which rights holders exercise greater control. Yet streaming's promise of remonetizing musical commodities demonetized by filesharing has been called into doubt by difficulties in converting users of advertising-based “freemium” services into paying subscribers. In need of alternative means of extracting value from users, streaming platforms have increasingly refashioned themselves as enterprises whose business extends beyond music-related services to encompass the collection, aggregation, and exchange of user data. In pursuing this strategy, streaming platforms place themselves in direct competition with other new media companies trading in user data. In order to distinguish themselves from such competitors, streaming platforms cast music as a particularly valuable source of data, offering privileged access to listeners’ innermost selves. But they also cast music as an ideal tracking device, accompanying individuals across a variety of social, physical and geographical spaces. In this way, the very attributes that make music so powerful a “technology of the self” facilitate its transformation into an equally powerful technology of surveillance.
APA, Harvard, Vancouver, ISO, and other styles
18

Pinner, Robert. "Public Health Surveillance and Information Technology." Emerging Infectious Diseases 4, no. 3 (1998): 462–64. http://dx.doi.org/10.3201/eid0403.980333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Kim, Mun-Cho. "Surveillance Technology, Privacy and Social Control." International Sociology 19, no. 2 (2004): 193–213. http://dx.doi.org/10.1177/0268580904042900.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Miller, Patrick. "Technology Focus: Reservoir Surveillance (September 2022)." Journal of Petroleum Technology 74, no. 09 (2022): 52–53. http://dx.doi.org/10.2118/0922-0052-jpt.

Full text
Abstract:
When it comes to reservoir surveillance, subsurface professionals have a broad array of tools and techniques to understand what is happening in the reservoir. To ensure valuable information is gathered with surveillance, it’s important to first ask “what problem are we trying to solve?” Depending on the problem’s definition and scale, the appropriate surveillance technology will change significantly. Zooming far out, particularly if little data is available for a reservoir, we may be interested in tools and techniques to validate and refine the geological concept for a basin, along with the most likely deposition patterns for sediments. Zooming in to the level of interactions between wells, we need to use a different toolbox that often includes finer-resolution geoscience mapping and engineering methods such as analyzing production, pressure, and fluid-property trends from individual wells. But what’s really exciting is that many new approaches are being developed to understand reservoir behavior and well performance at incredibly high resolution—at the fracture scale or even the pore scale. In this feature, we will examine surveillance technologies that can be applied at the broad scale, midscale, and fine scale. The papers highlighted in this month’s feature apply forward stratigraphic modeling to improve geological models, classical reservoir engineering techniques to understand interwell connectivity in order to optimize waterflooding operations, and exciting new fiber-optic technology to characterize the performance of individual hydraulic fractures in unconventionals. I hope these articles help you to think about “framing” the problem you are trying to solve, like a photographer carefully selecting the right camera settings and lens for a specific shot, in order to select the right tools and methods to add value through surveillance. Recommended additional reading at OnePetro: www.onepetro.org. SPE 202319 - Utilizing Surface Microseismic Monitoring To Improve Understanding of Natural Fractures in Sichuan Shale Gas Play by Cui Jing, Sichuan Changning Natural Gas Development Company, et al. SPE 202837 - Modified Technique To Model Volatile Oil Reservoirs: Implications for Modern Software Programs by Mohamed Ibrahim, Shell Egypt, et al. SPE 201543 - Production Optimization Using a 24/7 Distributed Fiber-Optic DFO Sensing-Based Multiphase Inflow Profiling Capability by Teymur Sadigov, BP, et al.
APA, Harvard, Vancouver, ISO, and other styles
21

Khan, Muhammad Navaid. "Technology Focus: Reservoir Surveillance (September 2023)." Journal of Petroleum Technology 75, no. 09 (2023): 52–53. http://dx.doi.org/10.2118/0923-0052-jpt.

Full text
Abstract:
The energy transition and global geopolitical situation present numerous oil and gas operators with opportunities to accelerate production growth and monetize hydrocarbon resources. While rapid production growth comes with proportional risks, it becomes crucial for reservoir surveillance engineers to quickly identify, derisk, and mitigate subsurface performance uncertainties. In this demanding scenario, the need for high-frequency reservoir performance surveillance is more critical than ever. Fortunately, advanced technologies have emerged as a refuge for subsurface engineers facing these challenges. One such technology is fiber optics, which has matured significantly over the past two decades, allowing for real-time well-performance overviews in various applications. This capability enhances well-management efficiency and enables prompt corrective actions, as demonstrated in papers SPE 200088 and SPE 200806. Along similar lines, the dynamic nature of the industry has also driven subsurface practitioners to think innovatively and apply existing technologies for out-of-the-box solutions. For instance, tracers, traditionally used for understanding subsurface connectivity, are now being used to calibrate surface networks and optimize gas lift injection performance. Such unconventional approaches have been explored in paper SPE 207431, highlighting their effectiveness. In addition to tracers, technologists are turning rock cuttings, often considered mere waste, into valuable information. As demonstrated by paper SPE 206214, these insights aid in elucidating depositional sequences and fluid-migration paths, thereby facilitating better field development decisions. Furthermore, technology groups are working on innovative solutions that use advanced sensing and artificial-intelligence (AI) -based technologies. As a result, interventionless downhole pressure and temperature surveying are no longer distant dreams (paper IPTC 22255). In another example, the power of AI has elevated sensing intuition, optimizing reservoir and fluid characterizing operations and leading to improved drilling-cost efficiency and the quality of well delivery (paper SPE 210091). Embracing advanced technologies is vital for oil and gas operators to optimize production, reduce risks, and make informed decisions in the evolving energy landscape. From real-time fiber optic monitoring to unconventional tracer applications and AI-driven solutions, reservoir surveillance engineers now have an array of tools at their disposal to drive the industry toward a more efficient and sustainable future. Recommended additional reading at OnePetro: www.onepetro.org. SPE 200806 An Industry Overview of Downhole Monitoring Using Distributed Temperature Sensing: Fundamentals and 2 Decades Deployment in Oil and Gas Industries by Mohammad Soroush, RGL Reservoir Management, et al. SPE 206214 Reservoir Architecture and Fluid Connectivity in an Abu Dhabi Oil Accumulation by Erik Tegelaar, Triple EEE, et al. IPTC 22255 Sensor Ball: Field Deployment of Autonomous and Untethered Surveillance by Mohamed Larbi Zeghlache, Saudi Aramco, et al. SPE 211543 The Sensor Ball Revolutionizes Wireline Operations by Nasser M. Al-Hajri, Saudi Aramco, et al.
APA, Harvard, Vancouver, ISO, and other styles
22

Zaia, Mathew. "Exploring Consciousness: The Online Community’s Understanding of Mobile Technology Surveillance." Surveillance & Society 17, no. 3/4 (2019): 533–49. http://dx.doi.org/10.24908/ss.v17i3/4.11934.

Full text
Abstract:
This paper examines subjective understandings and experiences of mobile technology surveillance, an area of surveillance studies literature that is significantly underexplored in North America. Drawing on Ewick and Silbey’s (1998) popular socio-legal conception of legal consciousness, the paper constructs a similar concept in the domain of surveillance. Surveillance consciousness of two mobile surveillance technologies—drones and Stingrays—is explored through online data. Upon analyzing reactions to surveillance, the paper expounds on the complexities found therein, which conform to Ewick and Silbey’s tripartite set of schemas. Such complexities contribute to surveillance studies by addressing whether prevalent theoretical models of surveillance can be sufficiently used to capture the current surveillance society. In its entirety, this paper demonstrates how surveillance and socio-legal studies benefit from greater dialogue and cross-fertilization.
APA, Harvard, Vancouver, ISO, and other styles
23

Kumar, Priya C., Jessica Vitak, Marshini Chetty, and Tamara L. Clegg. "The Platformization of the Classroom: Teachers as Surveillant Consumers." Surveillance & Society 17, no. 1/2 (2019): 145–52. http://dx.doi.org/10.24908/ss.v17i1/2.12926.

Full text
Abstract:
Technology platforms, including learning management systems and monitoring tools, have taken root in schools. While seen as bringing efficiency or innovation into classrooms, they also offer greater capacities for surveillance. Drawing on findings from focus groups with teachers in the US, we explore how teachers’ use of technology platforms produces surveillance. We argue that this positions teachers as surveillant consumers who use monitoring as a way to fulfill their responsibilities to students. We portray two configurations of monitoring in the classroom: tracking student learning and keeping students on task. These configurations reveal how technology platforms orient teachers to see student data as interchangeable with students, which we believe highlights the need for greater scrutiny of technology platforms’ role in the classroom.
APA, Harvard, Vancouver, ISO, and other styles
24

Batycky, Rod P., and Marco R. Thiele. "Technology Update: Mature Flood Surveillance Using Streamlines." Journal of Petroleum Technology 68, no. 05 (2016): 22–25. http://dx.doi.org/10.2118/0516-0022-jpt.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Gregg, Melissa. "Spouse-busting: Intimacy, adultery, and surveillance technology." Surveillance & Society 11, no. 3 (2013): 301–10. http://dx.doi.org/10.24908/ss.v11i3.4514.

Full text
Abstract:
This paper explores emerging practices of intimacy, publicity and privacy evident in online and mobile media applications. It focuses on platforms that facilitate, obscure or reveal adulterous behavior, to understand the surveillance logic underpinning these products. Spouse-busting websites and their accompanying devices are part of a booming industry that renders marital disloyalty open to both amateur and professional surveillance. Promotional testimonies highlight the ease with which monitoring equipment can be deployed, drawing on authenticating 'user-generated' aesthetics to reinforce product credentials. The very need for adultery technologies is symptomatic of a period in which some individuals see few options for intimate support - few visions or practices of community - other than the fulfillment to be gained from a dependent partner. As Laura Kipnis argues, the modern relationship is one in which lovers 'must know everything there is to know about one another' (2003: 162). This accords with broader transformations in intimacy encouraging openness and communication between self-directed individuals. The paper offers an alternative reading to these dominant ideals. It suggests that adultery apps evidence a modest ethics of erasure that might work to decouple the pact between surveillance, transparency and security.
APA, Harvard, Vancouver, ISO, and other styles
26

Sunderam, Saswati, Dmitry M. Kissin, Yujia Zhang, et al. "Assisted Reproductive Technology Surveillance — United States, 2018." MMWR. Surveillance Summaries 71, no. 4 (2022): 1–19. http://dx.doi.org/10.15585/mmwr.ss7104a1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Kuck, Marc. "Technology Focus: Production Monitoring/Surveillance (March 2016)." Journal of Petroleum Technology 68, no. 03 (2016): 72. http://dx.doi.org/10.2118/0316-0072-jpt.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Kuck, Marc. "Technology Focus: Production Monitoring/Surveillance (March 2017)." Journal of Petroleum Technology 69, no. 03 (2017): 55. http://dx.doi.org/10.2118/0317-0055-jpt.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Mittal, Rohit. "Technology Focus: Production Monitoring/Surveillance (March 2018)." Journal of Petroleum Technology 70, no. 03 (2018): 66. http://dx.doi.org/10.2118/0318-0066-jpt.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Sunderam, Saswati, Dmitry M. Kissin, Sara B. Crawford, et al. "Assisted Reproductive Technology Surveillance — United States, 2013." MMWR. Surveillance Summaries 64, no. 11 (2015): 1–25. http://dx.doi.org/10.15585/mmwr.ss6411a1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Sunderam, Saswati, Dmitry M. Kissin, Sara B. Crawford, et al. "Assisted Reproductive Technology Surveillance — United States, 2014." MMWR. Surveillance Summaries 66, no. 6 (2017): 1–24. http://dx.doi.org/10.15585/mmwr.ss6606a1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Sunderam, Saswati, Dmitry M. Kissin, Sara B. Crawford, et al. "Assisted Reproductive Technology Surveillance — United States, 2015." MMWR. Surveillance Summaries 67, no. 3 (2018): 1–28. http://dx.doi.org/10.15585/mmwr.ss6703a1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Sunderam, Saswati, Dmitry M. Kissin, Yujia Zhang, et al. "Assisted Reproductive Technology Surveillance — United States, 2016." MMWR. Surveillance Summaries 68, no. 4 (2019): 1–23. http://dx.doi.org/10.15585/mmwr.ss6804a1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Sunderam, Saswati, Dmitry M. Kissin, Yujia Zhang, et al. "Assisted Reproductive Technology Surveillance — United States, 2017." MMWR. Surveillance Summaries 69, no. 9 (2020): 1–20. http://dx.doi.org/10.15585/mmwr.ss6909a1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Bhattacharya, Sudip, Amarjeet Singh, and Mahbub Hossain. "Strengthening public health surveillance through blockchain technology." AIMS Public Health 6, no. 3 (2019): 326–33. http://dx.doi.org/10.3934/publichealth.2019.3.326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

John Spencer, A. "Oral Health: surveillance, research and information technology." New South Wales Public Health Bulletin 10, no. 8 (1999): 93. http://dx.doi.org/10.1071/nb99041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Sund, Kelly G., and George L. Carlo. "Wireless technology research, L.L.C.’s ongoing surveillance." Human and Ecological Risk Assessment: An International Journal 3, no. 1 (1997): 15–23. http://dx.doi.org/10.1080/10807039709383665.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Hourcade, Juan Pablo. "The perils of next-gen surveillance technology." Interactions 26, no. 4 (2019): 6–7. http://dx.doi.org/10.1145/3339907.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Kleve, Pieter, Richard V. De Mulder, and Kees Van Noortwijk. "Surveillance technology and law: the social impact." International Journal of Intercultural Information Management 1, no. 1 (2007): 2. http://dx.doi.org/10.1504/ijiim.2007.014367.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

He, Fangcheng. "Intelligent Video Surveillance Technology in Intelligent Transportation." Journal of Advanced Transportation 2020 (November 12, 2020): 1–10. http://dx.doi.org/10.1155/2020/8891449.

Full text
Abstract:
Along with the strength of the country’s overall strength, the people’s pockets have become more and more popular, and there have been significant improvements in all aspects of life, especially in terms of travel methods. This reflects the increase in residents’ income, but it also brings huge traffic pressure. In the long run, traffic congestion is not only detrimental to urban development, but frequent traffic accidents threaten residents’ travel safety. Effective monitoring methods are essential to solving these problems, so it is necessary to carry out research on intelligent video monitoring technology in intelligent transportation. The purpose of this article is to solve the current situation of excessive traffic pressure in the city. Through the study of intelligent video surveillance technology in intelligent traffic, the use of constrained least squares algorithm to remove motion blur and apply Kalan filtering to the sharpening process is used to eliminate noise ambiguity and make a brief introduction to various classic moving target detection methods to realize real-time monitoring of intelligent traffic conditions and continuously adjust and verify the monitoring situation, and then establish intelligent video in intelligent traffic monitoring technology research system. The research results show that this kind of intelligent video surveillance technology research in intelligent transportation can effectively increase the awareness of intelligent video surveillance technology and improve the level of intelligent video surveillance technology. The data measurement time has been shortened by one hour, the aggregation time has been changed from three hours to two hours, and the analysis time has been shortened by half. Eased urban traffic road pressure and greatly reduced the incidence of traffic accidents, which is conducive to socialist harmony social construction.
APA, Harvard, Vancouver, ISO, and other styles
41

Bussenius, Hope, Angela M. Zeck, Bryan Williams, and Angela Haynes-Ferere. "Surveillance of Pediatric Hypertension Using Smartphone Technology." Journal of Pediatric Health Care 32, no. 5 (2018): e98-e104. http://dx.doi.org/10.1016/j.pedhc.2018.04.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Woeltje, Keith F., and Kathleen M. McMullen. "Developing information technology for infection prevention surveillance." Critical Care Medicine 38 (August 2010): S399—S404. http://dx.doi.org/10.1097/ccm.0b013e3181e6d11d.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

GRIFFIN, MIKE. "Surveillance, Technology, and American Conceptions of Freedom." Ethnographic Praxis in Industry Conference Proceedings 2017, no. 1 (2017): 34–60. http://dx.doi.org/10.1111/1559-8918.2017.01137.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Younis, E. Abdalla Younis E. Abdalla. "Surveillance System based on Artificial Intelligence Technology." International Journal for Research Trends and Innovation 8, no. 12 (2023): 522–25. https://doi.org/10.5281/zenodo.10428210.

Full text
Abstract:
Obviously, Artificial Intelligence AI over the final decade has progressed exceptionally quickly. And it handled diverse issues in all investigated areas. The security camera gadgets, which permit the investigation of sound and pictures to distinguish individuals, vehicles, objects, occasions and behaviors in genuine time, ended up more solid and more intelligent by utilizing manufactured insights approach. These frameworks are able to act in genuine time, so they are perfect for execution in all sorts of video observation and edge reconnaissance gear.In this proposed extent we offer the (AI) based intelligent surveillance and security framework which examinations and takes the choice promptly by itself based on the display parametric conditions as per the modules prepared. The framework will respond consequently based on the circumstances that happen because it is trained in such different modes.
APA, Harvard, Vancouver, ISO, and other styles
45

Spiesel, Christina. "Now It's All Surveillance." Surveillance & Society 18, no. 3 (2020): 413–17. http://dx.doi.org/10.24908/ss.v18i3.14091.

Full text
Abstract:
This paper extends the discussion of naive realism into the realm of computing. Video surveillance is done by digital technologies. It is crucial to understand the contribution of technology to the construction of meaning in surveillance pictures. Technology shapes data and people interpret it. This article extends the meaning of naive realism into this new realm.
APA, Harvard, Vancouver, ISO, and other styles
46

Vyavhare, Mohini. "Surveillance Drone: Smart Surveillance, A Detailed Study on Drones with Object Recognition Technology." International Journal of Science, Engineering and Technology 13, no. 3 (2025): 1–13. https://doi.org/10.61463/ijset.vol.13.issue3.143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Kim, Han-Kyun. "How tocontrol AI technology-based electronic surveillance in criminal procedure." Korean Association of Criminal Procedure Law 15, no. 2 (2023): 21–46. http://dx.doi.org/10.34222/kdps.2023.15.2.21.

Full text
Abstract:
This study examines the necessity and direction of legal control and human rights protection as electronic surveillance tools in criminal proceedings are expanded based on artificial intelligence technology from a policy and institutional perspective. In particular, the need for control and the search for ways to realize the enhancement of the quality of surveillance contents due to the technological advancement of electronic surveillance techniques should be newly emphasized. The need for criminal procedure control comes from the rule of law, and the direction of control should be to ensure the human rights of citizens. Legal control, including criminal law, should include the improvement of existing relevant legal systems and legislative policies to respond to new problems. As the current electronic surveillance system evolves into an expanded combination of location-tracking electronic devices and fixed video information processing devices (CCTV) as tools for electronic surveillance, the enhanced electronic surveillance system based on artificial intelligence technology will inevitably result in the challenge of reasonable and effective legal and institutional control. The expansion of electronic surveillance tools in criminal proceedings based on A.I. technology should not only reevaluate its effectiveness but also review its legitimacy, as the effectiveness of A.I. technology is overestimated while its risks are underestimated, and it is rapidly being introduced into reality. The urgency is evident in the fact that the expansion of electronic surveillance has not been met with the same level of prudence that has been exercised in the past in relation to drug, sexual violence, and terrorism offenses, as fantasies and expectations of advanced technology can undermine the boundaries of human rights in criminal justice more than fears of crime or the need for safety.
APA, Harvard, Vancouver, ISO, and other styles
48

Harjivandas, Thakkar Snehal Ben. "Cyber Law in India." International Journal of Advance and Applied Research 5, no. 21 (2024): 11–13. https://doi.org/10.5281/zenodo.12703654.

Full text
Abstract:
<strong>Abstract:</strong> In contemporary society, the rapid advancement of surveillance technology has posed complex challenges to cyber law and privacy rights. This research paper explores the intersection of surveillance technology and cyber law, delving into the legal implications, ethical considerations, and societal impacts of surveillance in digital spaces. The paper begins by defining surveillance technology and cyber law, establishing a foundational understanding of key concepts. It then examines various types of surveillance technologies currently in use, such as facial recognition, data analytics, and digital tracking tools, highlighting their capabilities and potential privacy infringements. A critical analysis of the legal framework surrounding surveillance technology follows, encompassing both international and domestic laws that govern its deployment and usage. The research investigates landmark legal cases and regulatory developments shaping the landscape of surveillance in cyber law, emphasizing the balance between security concerns and individual freedoms. Furthermore, the paper explores emerging issues, including the role of artificial intelligence and machine learning in surveillance, and the implications for civil liberties. Ethical considerations are paramount in this discussion, with an exploration of the ethical dilemmas posed by pervasive surveillance. The paper investigates questions of consent, transparency, and accountability in the use of surveillance technology, shedding light on the potential for misuse and abuse. Additionally, societal impacts are assessed, focusing on the implications for marginalized communities, freedom of expression, and democratic governance. In conclusion, this research paper provides a comprehensive overview of surveillance technology in cyber law, emphasizing the urgent need for robust legal protections and ethical guidelines. It calls for a nuanced approach that balances security imperatives with fundamental rights, advocating for transparency, accountability, and democratic oversight in the deployment of surveillance technologies.
APA, Harvard, Vancouver, ISO, and other styles
49

Firmino, Rodrigo Jose, and Fernanda Glória Bruno. "Building a Latin American Agenda for Studies on Surveillance, Technology, and Society." Surveillance & Society 20, no. 4 (2022): 357–63. http://dx.doi.org/10.24908/ss.v20i4.15917.

Full text
Abstract:
It has become inescapable to question the conditions of constitution for sociotechnical surveillance arrangements in different contexts, and with that we have seen an increase in interest in studies dedicated to the understanding of the specificities of the social and historical construction of surveillance in Latin American countries from ontologies and epistemologies that are closest to their realities. This has happened both from the point of view of understanding the processes of use of surveillance by governments and companies in the neoliberal management of bodies and territories, as well as in the organization of resistance to more or less explicit violence operated by technologies of control. In this paper, we describe the circumstances in which a decolonial agenda for Latin American countries has been built by scholars, activists, and artists associated with the Latin American Network of Surveillance, Technology and Society Studies (LAVITS). The work of the network has always benefited from the critical thinking formed in the field of surveillance studies with crucial contributions coming from the Surveillance Studies Network and Surveillance &amp; Society in the past twenty years.
APA, Harvard, Vancouver, ISO, and other styles
50

Xu, Feng. "Applied-Information Technology in Abnormal Detection for Surveillance Systems." Advanced Materials Research 1046 (October 2014): 266–69. http://dx.doi.org/10.4028/www.scientific.net/amr.1046.266.

Full text
Abstract:
In recent years, video surveillance has become more and more important for enhanced security and it is indispensable technology for fighting against all types of crime with the construction of sky-net in China. Abnormal detection is the focus of intelligent video surveillance and the information of abnormal behavior can be used in the investigation of criminal cases, which combines computer vision and artificial intelligence technology and has wide application prospect in public security work. In this paper, first the current research situation of the intelligent surveillance system is introduced. Then the category of abnormal behavior detection is expounded. Finally the function module of abnormal detection system is designed and the key technology of moving target detection, target tracking and abnormality judgment is discussed in view of the actual situation of surveillance system in criminal cases.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!