Littérature scientifique sur le sujet « Electronic (technical) surveillance »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Electronic (technical) surveillance ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Electronic (technical) surveillance"

1

Tomczyk, Paweł, Daniel Mider et Józef Grzegorczyk. « Inwigilacja elektroniczna jako metoda pozyskiwania informacji – ewaluacja i prognozy ». Studia Politologiczne 2019, no 54 (20 novembre 2019) : 258–94. http://dx.doi.org/10.33896/spolit.2019.54.10.

Texte intégral
Résumé :
The text focuses on one of the elements belonging to the surveillance society – surveillance with the use of electronic tools. The authors attempt to answer the following questions. What types of negative phenomena are produced and intensified by electronic surveillance technologies? How deep is the state of the „vulnerability” of modern societies, what are the possibilities of surveillance devices? Is it possible to practically oppose them, how and what are the limits? What is the genesis of these phenomena and what future scenarios can be sketched based on the anticipation of observed trends? A set of research questions defined in this way required both sociological and technical perspectives at the same time. The authors recognize the negative phenomena associated with electronic surveillance: escalation, professionalization, institutionalization and normalization.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Blatt, Amy J. « Geospatial Applications in Disease Surveillance ». International Journal of Applied Geospatial Research 4, no 2 (avril 2013) : 1–8. http://dx.doi.org/10.4018/jagr.2013040101.

Texte intégral
Résumé :
Given the current attention on national health care reform and the electronic exchange of health information, this article highlights the major developments in disease surveillance and identifies a number of public health opportunities for geospatial thought leaders to undertake. Issues surrounding spatial data quality and resolution, the legal and ethical issues of volunteered geographical health information, and the technical demands of formulating a synthetic and integrative disease surveillance system represent the types of research questions that only geographers can address successfully.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Rossheim, Matthew E., Eric K. Soule, Dennis L. Thombs, Tracey E. Barnett, Melvin D. Livingston, Gilbert Gimm et Ogechikamma C. Emechebe. « Electronic Cigarette Explosion and Burn Injuries ». Tobacco Regulatory Science 6, no 3 (1 mai 2020) : 179–86. http://dx.doi.org/10.18001/trs.6.3.2.

Texte intégral
Résumé :
Objectives: E-cigarette explosions have resulted in severe injuries and fatalities. To date, only 2 studies have systematically estimated the prevalence of these injuries. This study updates these national estimates and describes the context of these explosion injuries. Methods: We conducted analyses on cross-sectional data from the US Consumer Product Safety Commission's (CPSC) National Electronic Injury Surveillance System (NEISS). A key word search of case narrative text identified e-cigarette explosion and burn injuries reported by US hospital emergency departments. We applied sampling weights to make national incidence estimates, and reviewed text to identify contextual factors. Results: An estimated 2693 (95% CI 1478 to 3909) e-cigarette explosion and burn injuries were presented to US hospital emergency departments between 2015 and 2018. Case narratives indicated that a notable proportion of explosions occurred while a person was changing or replacing a device's battery. Conclusions: To prevent further injuries and fatalities, there is a need for strengthened regulation and monitoring of e-cigarette devices. The variety of contexts in which e-cigarettes have exploded suggests these devices have poorly understood technical problems that industry should be required to address. In addition, data recording and surveillance of e-cigarette injuries need improvement.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Kalancha, I. « ELECTRONIC SEGMENT IN THE CRIMINAL PROCEDURE LAW OF THE LATVIA ». Criminalistics and Forensics, no 65 (18 mai 2020) : 90–100. http://dx.doi.org/10.33994/kndise.2020.65.09.

Texte intégral
Résumé :
The article deals with the electronic segment in criminal procedural law in Latvia. It analyses both specialized electronic tools of criminal procedure in the form of information system (judicial information system) and non-specialized electronic tools of criminal procedure. The author studies the requirements for electronic recording of specific investigatory actions (interrogation of a juvenile victim and witness, questioning, exhumation, line-up for identification). The research focuses as well on the electronic component of special investigatory actions (correspondence control, communication facilities control, data control in an automated data processing system, content control of the transmitted data, audio or video location control, individual audio control). It provides further evidence for the possibility of implementing procedural actions using technical means (telephone conference, videoconference) if the interests of criminal proceedings so require. It is made clear that it is the duty of individual subjects of criminal proceedings at the request of the person who administers the proceedings to immediately notify in writing postal or e-mail address for managing written communications. The author outlines the terms for sending notifications in criminal proceedings and subpoenas to the individual’s email address. The article also investigates the procedure for publishing electronic images of a detainee, suspect, victim and witness in the media. It studies the regulations for recording the course of a court hearing in full size using audio, video or other technical means, as well as recording the parole by means of electronic surveillance. According to the results of the study, the author proposes to take into account a number regulations in criminal procedural law in Latvia when developing proposals for improving domestic criminal procedural law, including: interrogation of a minor using technical means and a psychologist in another room; the obligation to provide in writing postal or e-mail address for managing written communications and the possibility of sending a notification as for the decision with the enclosed copies to that e-mail address; sending summons to an email address; the procedure for the publication in the media of images of the suspect, victim and witness taken during the proceedings; arranging the parole using electronic surveillance.
Styles APA, Harvard, Vancouver, ISO, etc.
5

BOROVYK, O., D. BOROVYK et D. CIMBRIQUE. « SUMMARY REQUIRING REGARDLESS OF CREATION DECISION SUPPORT SYSTEM FOR THE DISTRIBUTION CAPABILITIES TO PROVIDE SUFFICIENT EFFICIENCY OF BORDER REGION OF SYSTEMS FOR OPTO-ELECTRONIC SURVEILLANCE ». Computer Systems and Information Technologies 1, no 1 (2 septembre 2020) : 81–90. http://dx.doi.org/10.31891/csit-2020-1-11.

Texte intégral
Résumé :
The article is devoted to the substantiation of the choice of the basic methodology for assessing the effectiveness of the optoelectronic surveillance system, which could be taken as the basic model of this system for the distribution of forces and means to ensure a sufficient level of border protection efficiency. taking into account in the specified basic methodology for assessing the effectiveness of the system. As a result of the study it was found that as a basic method of assessing the effectiveness of the optoelectronic surveillance system, it is advisable to adopt a method based on a probabilistic approach to describe the processes that accompany the functioning of the optoelectronic surveillance system. It is also substantiated that the main provisions that need to be taken into account when creating a decision support system for the distribution of forces and means to ensure a sufficient level of border protection in the field of optoelectronic surveillance are: homogeneous in terms of features of technical means of border protection time periods; adequate integrated laws of distribution of time periods, which determine the probability of non-detection of the target to its approach to a given distance by certain technical means of border protection, which are part of the studied system of optoelectronic surveillance; points of "stitching" of various integral laws of distribution at the ends of the specified periods; the impact of weather changes over a period of time, which characterizes the period of the service organization, on the functioning of the system; "Dead" zones, which are dynamically variable depending on the natural and man-made conditions that arise in the area of responsibility.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Aliabadi, Ali, Abbas Sheikhtaheri et Hossein Ansari. « Electronic health record–based disease surveillance systems : A systematic literature review on challenges and solutions ». Journal of the American Medical Informatics Association 27, no 12 (14 septembre 2020) : 1977–86. http://dx.doi.org/10.1093/jamia/ocaa186.

Texte intégral
Résumé :
Abstract Objective Disease surveillance systems are expanding using electronic health records (EHRs). However, there are many challenges in this regard. In the present study, the solutions and challenges of implementing EHR-based disease surveillance systems (EHR-DS) have been reviewed. Materials and Methods We searched the related keywords in ProQuest, PubMed, Web of Science, Cochrane Library, Embase, and Scopus. Then, we assessed and selected articles using the inclusion and exclusion criteria and, finally, classified the identified solutions and challenges. Results Finally, 50 studies were included, and 52 unique solutions and 47 challenges were organized into 6 main themes (policy and regulatory, technical, management, standardization, financial, and data quality). The results indicate that due to the multifaceted nature of the challenges, the implementation of EHR-DS is not low cost and easy to implement and requires a variety of interventions. On the one hand, the most common challenges include the need to invest significant time and resources; the poor data quality in EHRs; difficulty in analyzing, cleaning, and accessing unstructured data; data privacy and security; and the lack of interoperability standards. On the other hand, the most common solutions are the use of natural language processing and machine learning algorithms for unstructured data; the use of appropriate technical solutions for data retrieval, extraction, identification, and visualization; the collaboration of health and clinical departments to access data; standardizing EHR content for public health; and using a unique health identifier for individuals. Conclusions EHR systems have an important role in modernizing disease surveillance systems. However, there are many problems and challenges facing the development and implementation of EHR-DS that need to be appropriately addressed.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Gamache, Roland, Hadi Kharrazi et Jonathan Weiner. « Public and Population Health Informatics : The Bridging of Big Data to Benefit Communities ». Yearbook of Medical Informatics 27, no 01 (août 2018) : 199–206. http://dx.doi.org/10.1055/s-0038-1667081.

Texte intégral
Résumé :
Objective: To summarize the recent public and population health informatics literature with a focus on the synergistic “bridging” of electronic data to benefit communities and other populations. Methods: The review was primarily driven by a search of the literature from July 1, 2016 to September 30, 2017. The search included articles indexed in PubMed using subject headings with (MeSH) keywords “public health informatics” and “social determinants of health”. The “social determinants of health” search was refined to include articles that contained the keywords “public health”, “population health” or “surveillance”. Results: Several categories were observed in the review focusing on public health's socio-technical infrastructure: evaluation of surveillance practices, surveillance methods, interoperable health information infrastructure, mobile health, social media, and population health. Common trends discussing socio-technical infrastructure included big data platforms, social determinants of health, geographical information systems, novel data sources, and new visualization techniques. A common thread connected these categories of workforce, governance, and sustainability: using clinical resources and data to bridge public and population health. Conclusions: Both medical care providers and public health agencies are increasingly using informatics and big data tools to create and share digital information. The intent of this “bridging” is to proactively identify, monitor, and improve a range of medical, environmental, and social factors relevant to the health of communities. These efforts show a significant growth in a range of population health-centric information exchange and analytics activities.
Styles APA, Harvard, Vancouver, ISO, etc.
8

David, Matthew, et Jamieson Kirkhope. « New Digital Technologies : Privacy/Property, Globalization, and Law ». Perspectives on Global Development and Technology 3, no 4 (2004) : 437–49. http://dx.doi.org/10.1163/1569150042728884.

Texte intégral
Résumé :
AbstractThis paper addresses attempts to locate and dislocate music audiences in the context of global commercial, legal, and technical developments. The 2001 legal decision against Napster in the United States found the file share service company guilty of copyright infringement. This precedent appeared to support the recording industry. However, such legal frames have been bypassed by new softwares. Supporters see such global networks of sharing and distribution as undoing corporate control. The recording industry has responded with parallel claims of having encryption and surveillance technologies capable of globally reregulating property. However, as this article shows, there is no technical necessity and that total freedom and total enforcement are impossible. Just as globalization is reified into an inevitable process of deregulation in one instance and at the next moment it is reified into an indispensable regulatory regime, so new electronic media and global electronic networks promote neither regulation or deregulation, except in so far as the balance of social forces at any one time interprets and enacts them in such ways.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Bloomfield, Brian. « In the Right Place at the Right Time : Electronic Tagging and Problems of Social Order/Disorder ». Sociological Review 49, no 2 (mai 2001) : 174–201. http://dx.doi.org/10.1111/1467-954x.00251.

Texte intégral
Résumé :
This paper explores the relationship between technology and problems of social order/disorder in the context of discussions of surveillance and ‘virtuality'. The emphasis is on understanding the connections between technology and social relations in areas where issues of social order/disorder are a prominent feature of concern and where one can identify the emergence of new regimes of virtual control which are directed at solving the (supposed) deficits in order or the threats posed to it. Rather than constituting a ‘technical fix’ for the problems of social order/disorder, it is argued that forms of virtual control both presuppose a reconstruction of social order and at the same time aim to effect a suppression of disorder. Focusing in particular on various manifestations of electronic tagging – from prisoners to babies, from retail goods to works of art, from television programmes to Personal Identification Numbers – the paper argues that these share a problematic which interrelates technology, order/disorder, subjects/objects, time, and space. It thus seeks to generalize the concept of electronic tagging, to regard it as a practice rather than a specific set of artefacts. Moreover, in contrast to the negative, panoptic reading of tagging technologies, the paper considers the active public participation in systems of surveillance and thereby the more positive or productive exercises of power which they may be taken to constitute.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Galli, Brian J. « Effects on Current Day Technology, Legislation with Respect to Ethical Valuation ». International Journal of Responsible Leadership and Ethical Decision-Making 1, no 1 (janvier 2019) : 1–12. http://dx.doi.org/10.4018/ijrledm.2019010101.

Texte intégral
Résumé :
Edward Snowden is an American who released classified government information to journalists in June 2013. These secrets revealed the existence and purpose of numerous government mass-surveillance programs, which were developed to gather, retain, and analyze electronic information not only on a nationwide scale but also on a global scale. Due to his actions, some would describe Snowden as a villain or traitor, while others would describe him as a hero or patriot. After the release of information about large government surveillance programs, there are varied opinions as to whether this had a reforming effect on our society from a technical and legislative standpoint. However, there has been very little focus on whether the absence or presence of these changes has any correlation or effect on what we think about it ethically. This research is intended to discuss if the results of Edward Snowden's actions had an impact on cybertechnology and legislation due to the ethical considerations surrounding it.
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Thèses sur le sujet "Electronic (technical) surveillance"

1

Knoesen, Andre Leon. « The use of physical surveillance in forensic investigation ». Diss., 2012. http://hdl.handle.net/10500/9233.

Texte intégral
Résumé :
The problem that was identified is that physical surveillance is not generally used by general detectives in the South African Police Service as a technique during their investigations. According to the researcher’s experience, this can be due to lack of understanding or experience or may stem from ignorance. A lack of training on the use of physical surveillance as a method to obtain information for the investigation process was also identified as a problem. This study therefore investigated the role and use of physical surveillance within the forensic investigation process. The focus of the research was on basic static (stationary), foot and vehicle surveillance as these types of surveillance are usually conducted in conjunction with each other. An empirical research design was used to conduct the research. A qualitative research approach enabled the researcher to obtain first-hand information from interviews with general detectives. Information was also obtained from a thorough literature study and from the researcher’s own experience on the topic. To conduct effective investigation, it is important for investigators to be familiar with the concept of physical surveillance, its elements, its influence and its values. A physical surveillance operation is a forensic tool used to gather evidence, to recover stolen property, and to identify and arrest the perpetrator. The use of physical surveillance during investigations serves the purpose of gathering evidence and information that can be used as intelligence. Successful forensic investigation requires skill and places extraordinary demands on detectives to utilise all available methods and techniques. The recognition of the use of physical surveillance as a method of evidence gathering is of outmost importance. The research has revealed that general detectives do not acknowledge the importance of physical surveillance as a method to obtain information for the investigation process. It is of vital importance that all detectives be properly trained with the necessary knowledge and skills to make use of this valuable investigative tool.
Police Practice
M. Tech. (Forensic Investigation)
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "Electronic (technical) surveillance"

1

Wang luo tong xin jian kong fa lü yu ji shu biao zhun dao du : Guided Reading on Law and Technical Standard of Network Lawful Interception. Beijing Shi : Fa lü chu ban she, 2013.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

United States. Federal Aviation Administration, dir. Technical surveillance countermeasures : Information guide (TSCM). [Washington, D.C.?] : U.S. Dept. of Transportation, Federal Aviation Administration, 1993.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

A Legal And Law Enforcement Guide To Telephony : Addressing Technical, Legal And Police Issues Relating To The Interface And Interaction With Communication Service Providers. C.C. Thomas, 2005.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Molczan, George. A Legal And Law Enforcement Guide To Telephony : Addressing Technical, Legal And Police Issues Relating To The Interface And Interaction With Communication Service Providers. C.C. Thomas, 2005.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Gerold, Yonas, et Society of Photo-optical Instrumentation Engineers., dir. Peace and wartime applications and technical issues for unattended ground sensors : 22-23 April 1997, Orlando, Florida. Bellingham, Wash., USA : SPIE, 1997.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Howard, Philip N. Pax Technica. Yale University Press, 2015.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Pax Technica : How the Internet of Things May Set Us Free or Lock Us Up. Yale University Press, 2015.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Howard, Philip N. Pax Technica : How the Internet of Things May Set Us Free or Lock Us Up. Yale University Press, 2015.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "Electronic (technical) surveillance"

1

Kleve, Pieter, Richard V. De Mulder et Kees van Noortwijk. « Surveillance in the 21st Century ». Dans Socioeconomic and Legal Implications of Electronic Intrusion, 195–215. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-204-6.ch012.

Texte intégral
Résumé :
In this chapter, some current technologies for monitoring and surveillance as well as some legal considerations regarding the application of these technologies will be discussed. The application of monitoring technology has developed from the monitoring of mere technical processes and environmental processes to the monitoring of physiological “processes” and now even of everyday human behaviour. Before discussing legal considerations, an explanation of this development is given and it is placed within a broader social perspective. This leads to an examination of the development of technology that made it possible for monitoring technologies to evolve as they did, and an analysis of norms and values resulting in a conceptual model for evaluating law in the “information society”. An overview of technologies for monitoring and surveillance will be presented. From this overview it will become clear that the use of this type of technology is growing fast. At the same time, questions arise regarding its permissibility in the light of legal and constitutions rights, such as the right to privacy. These questions are then addressed in the context of the wider social developments. Finally, it is concluded that with the increasing importance and use of surveillance technology, “monitoring the surveillors” will become essential as well.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Stein, Michael D., et Sandro Galea. « The New Elderly Surveillance State ». Dans Pained, 183–84. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780197510384.003.0052.

Texte intégral
Résumé :
This chapter studies how technology can help keep the older generation safe and at home. If media commentary on this subject is to be believed, the Internet of Things will carry part of the load of caring for the elders. New, in-home smart systems will reduce caregiver stress through electronic surveillance, allowing doctors to get real-time insights into the health of loved ones, improving their quality of life. Indeed, teams of clinical, economic, security, and technical experts are now at work on a new form of “assisted living.” The model patient will have, in their home, passive environmental sensors, medical devices, wearable technologies, and interactive apps connected to their body and bed, floor and door frames, collecting a fast-moving stream of data. However, will these new, technologically sophisticated homes really tackle the core problems of aging and dementia? Technology by itself will not be the full solution. People have to figure out the role that old-fashioned social networks—humans checking in on humans—will play, and how technology can help augment, not replace, the role that caregivers play in maximizing quality of life for those who can no longer care for themselves. This will require a serious examination of the role of work and obligation, borne by those in middle age, and how this can fit in with the increasing responsibilities they will inevitably bear as the population ages.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Pang, Les. « Radio Frequency IdentificationTechnology in Digital Government ». Dans Information Security and Ethics, 2623–33. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch174.

Texte intégral
Résumé :
Following technical strides in radio and radar in the 1930s and 1940s, the 1950s were a period of exploration for radio frequency identity (RFID) technology as shown by the landmark development of the long-range transponder systems for the “identification, friend or foe” for aircraft. Commercial use of RFID appeared in the 1960s, such as electronic article surveillance systems in retail stores to prevent theft. The 1970s were characterized by developmental work resulting in applications for animal tracking, vehicle tracking, and factory automation. RFID technology exploded during the 1980s in the areas of transportation and, to a lesser extent, personnel access and animals. Wider deployment of RFID tags for automated toll collection happened in the 1990s. Also, there was growing interest of RFID for logistics and having it work along side with bar codes. In the beginning of the 21st century, the application of RFID technology has been ubiquitous and now it is practically part of everyday life (Landt, 2001).
Styles APA, Harvard, Vancouver, ISO, etc.
4

Bergkvist, Sofi, et Hanna Pernefeldt. « Primary Care through a Public-Private Partnership ». Dans Advances in Healthcare Information Systems and Administration, 127–53. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-885-2.ch008.

Texte intégral
Résumé :
The primary care delivery model developed by the Health Management and Research Institute (HMRI) in India, integrates innovative technical solutions and process-oriented operations for the provision of healthcare services, while supporting the public health system. Through a public-private partnership with the state government of Andhra Pradesh, HMRI has a unique base to pilot large scale health interventions. The HMRI Model includes components such as a medical helpline, rural outreach health services, a disease surveillance program, a blood bank application, and telemedicine projects. Both clinical and non-clinical procedures are strengthened by technology that enables research, tailored and evidence-based interventions, as well as improves efficiency and quality of healthcare delivery. Health management and decision-making is assisted by the organization’s large database of electronic medical records. Challenges to implementation include implications of large government contracts, funding issues, as well as technical constraints and human resources issues. This chapter describes the Model’s various components and its contextual framework with enabling and constraining factors. HMRI has developed a unique system for preventive and primary care that can serve as a model for low, middle, and high income countries, though external evaluations are critically needed for further assessment of best practices.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Kaspar, Christian. « RFID Technologies and Applications ». Dans Encyclopedia of Multimedia Technology and Networking, Second Edition, 1232–39. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch167.

Texte intégral
Résumé :
Radio frequency identification (RFID) is a radio-supported identification technology that typically operates by saving a serial number on a radio transponder that contains a microchip for data storage. Via radio waves, the coded information is communicated to a reading device (Jones et al., 2005). RFID does not represent a new development; it was devised by the American military in the 1940s. Since the technology’s clearance for civil use in 1977, RFID has been successfully used for the identification of productive livestock, for electronic immobilizer systems in vehicles, or for the surveillance of building entrances (Srivastava, 2005). Due to decreasing unit costs (especially for passive transponders), RFID technologies now seem increasingly applicable for the labeling of goods and semi-finished products. By this, manual or semi-automatic data entry, for instance through the use of barcodes, can be avoided. This closes the technical gap between the real world (characterized by the lack of distribution transparency of its objects) and the digital world (characterized by logically and physically unambiguous and therefore distribution-transparent objects). In addition, RFID facilitates fully automated simultaneous recognition of more than one transponder without direct line of sight between reader and transponders.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Kaspar, Christian, Adam Melski, Britta Lietke, Madlen Boslau et Svenja Hagenhoff. « RFID Technologies and Applications ». Dans Ubiquitous and Pervasive Computing, 44–53. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-960-1.ch005.

Texte intégral
Résumé :
Radio frequency identification (RFID) is a radiosupported identification technology that typically operates by saving a serial number on a radio transponder that contains a microchip for data storage. Via radio waves, the coded information is communicated to a reading device (Jones et al., 2005). RFID does not represent a new development; it was devised by the American military in the 1940s. Since the technology’s clearance for civil use in 1977, RFID has been successfully used for the identification of productive livestock, for electronic immobilizer systems in vehicles, or for the surveillance of building entrances (Srivastava, 2005). Due to decreasing unit costs (especially for passive transponders), RFID technologies now seem increasingly applicable for the labeling of goods and semi-finished products. By this, manual or semi-automatic data entry, for instance through the use of barcodes, can be avoided. This closes the technical gap between the real world (characterized by the lack of distribution transparency of its objects) and the digital world (characterized by logically and physically unambiguous and therefore distribution-transparent objects). In addition, RFID facilitates fully automated simultaneous recognition of more than one transponder without direct line of sight between reader and transponders.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Dodig-Crnkovic, Gordana, et Virginia Horniak. « Ethics and Privacy of Communications in the E-Polis ». Dans Information Security and Ethics, 2524–30. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch168.

Texte intégral
Résumé :
The electronic networking of physical space promises wide-ranging advances in science, medicine, delivery of services, environmental monitoring and remediation, industrial production and the monitoring of persons and machines. It can also lead to new forms of social interaction. However, without appropriate architecture and regulatory controls, it can also subvert democratic values. Information technology is not, in fact, neutral in its values; we must be intentional about design for democracy (Pottie, 2004). Information and communication technology (ICT) has led to the emergence of global Web societies. The subject of this article is privacy and its protection in the process of urbanization and socialization of the global digital Web society referred to as the e-polis. Privacy is a fundamental human right recognized in all major international agreements regarding human rights, such as Article 12 of the Universal Declaration of Human Rights (United Nations, 1948), and it is discussed in the article “Different Views of Privacy”. Today’s computer network technologies are sociologically founded on hunter-gatherer principles. As a result, common users may be possible subjects of surveillance and sophisticated Internet-based attacks. A user may be completely unaware of such privacy breaches taking place. At the same time, ICT offers the technical possibilities of embedded privacy protection obtained by making technology trustworthy and legitimate by design. This means incorporating options for socially acceptable behavior in technical systems, and making privacy protection rights and responsibilities transparent to the user. The ideals of democratic government must be respected and even further developed in the future e-government. Ethical questions and privacy of communications require careful analysis, as they have far-reaching consequences affecting the basic principles of e-democracy.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Baecker, Ronald M. « Computers in medicine and health care ». Dans Computers and Society. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198827085.003.0009.

Texte intégral
Résumé :
As with the chapter on learning, we begin our discussion of health applications by examining influential early visions of the possible role of computers in improving health care and medicine. We then look at the great variety of roles played by current digital technologies in this field. We first consider the online availability of health information. There are two possible sources: one from respected centres of expertise, the other from consumers of medical care, that is, patients, who in working together form what may be viewed as communities of care. There is strong evidence that people are using these online medical resources to become more intelligent guardians of their own health and to support themselves when seeking help from physicians. Next, we examine the care improvements promised by personal health and electronic medical records. Progress here has been disappointingly slow; we shall discuss the mix of technical, cultural, administrative, interpersonal, and financial reasons for the sluggishness in development and deployment. Two particularly interesting cases of medical information are data dealing with adverse drug reactions and interactions, commonly known as adverse drug events (ADEs), and the use of big data and social media in epidemic surveillance and control, by which we are becoming better equipped to indicate, predict, and track outbreaks of disease. Computers have made a huge impact on medical education through the development of human body simulators. There also continue to be more and more advanced uses of technology embedded within the human body, either to augment the functioning of organs or to replace body parts that no longer work, which could possibly result in bionic people or androids in the future. We shall present some examples indicating the pace at which these technologies are developing. Recent advances in understanding the human genome have enabled a new form of medicine called precision medicine. The goal is to use genetic screening of patients to enable more specific treatments than were hitherto possible. Precision medicine also enables what some call designer babies. We shall introduce policy and ethical issues raised by this concept.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Jarvis, Chris, et John Kupiec. « Accessing Public Sector Environmental Data and Information ». Dans Global Information Technologies, 578–86. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-939-7.ch046.

Texte intégral
Résumé :
This chapter highlights the importance that the Environment Agency places on the provision of information and the key part it plays in achieving environmental goals, an importance that is recognised in a range of national, European and international laws and agreements. The Agency is seeking to ensure that it meets the “letter” and, importantly, the spirit of all relevant legislation. To this end, our vision is environmental information freely available to all – quickly and easily, where and when people want it, and in a format to meet particular needs. The opportunities that present themselves in today’s “Information Age” are exciting and the potential to lever environmental benefit is great. The Agency’s track record in this field is already considerable, with five years’ experience of providing key environmental datasets through “What’s in Your Backyard?” – a GIS, Internet based national portal (www.environment-agency.gov.uk). This system has been developed and extended to include a pollution inventory, flood plain maps, landfill sites and a range of other data layers. Members of the public can find information from a national level, right down to their local environment: locating areas of interest by postcode or place name, displaying data to a chosen scale, formulating individual queries on the datasets, gaining background on information of interest, and downloading data for their own use off-line. The key components in establishing such services are people, data and technical infrastructure. The Environment Agency’s National Centre for Environmental Data & Surveillance has developed a conceptual architecture within which these components can be effectively managed and brought to bear on the processes of delivering timely data and information products. This is a challenging task within large administrations where data collection, management and storage are widely distributed both geographically and organisationally. Experience to date has shown the approach to be flexible, reliable and scalable. We have also developed our understanding of why people want information and how they want to access it – and importantly why some people do not see the relevance of environmental information to them. We have therefore formulated a strategy to improve the flexibility and response of the services we provide. This strategy also includes developing highly tailored information services that feed off the same base datasets. The Agency has recently piloted just such a service aimed at residential house purchasers. This is an e-business service accessible by solicitors over the Internet, with individually tailored environmental reports generated and delivered in real time. There is the potential to develop similar tailored services wherever environmental information is, or should be, a key part of business activities and decisions. Future development will therefore not solely be making more information available in an electronic format. Information must be made relevant to particular needs at particular times. Citizens must be made aware of the wider environmental impacts of their consumer choices and the implications to themselves and others. They must also understand the real effect of the environment on their daily lives and why it is in their interest to be interested.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Jarvis, Chris, et John Kupiec. « Accessing Public Sector Environmental Data and Information ». Dans Information Systems for Sustainable Development, 291–303. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-342-5.ch018.

Texte intégral
Résumé :
This chapter highlights the importance that the Environment Agency places on the provision of information and the key part it plays in achieving environmental goals, an importance that is recognised in a range of national, European and international laws and agreements. The Agency is seeking to ensure that it meets the “letter” and, importantly, the spirit of all relevant legislation. To this end, our vision is environmental information freely available to all – quickly and easily, where and when people want it, and in a format to meet particular needs. The opportunities that present themselves in today’s “Information Age” are exciting and the potential to lever environmental benefit is great. The Agency’s track record in this field is already considerable, with five years’ experience of providing key environmental datasets through “What’s in Your Backyard?” – a GIS, Internet based national portal (www.environment-agency.gov.uk). This system has been developed and extended to include a pollution inventory, flood plain maps, landfill sites and a range of other data layers. Members of the public can find information from a national level, right down to their local environment: locating areas of interest by postcode or place name, displaying data to a chosen scale, formulating individual queries on the datasets, gaining background on information of interest, and downloading data for their own use off-line. The key components in establishing such services are people, data and technical infrastructure. The Environment Agency’s National Centre for Environmental Data & Surveillance has developed a conceptual architecture within which these components can be effectively managed and brought to bear on the processes of delivering timely data and information products. This is a challenging task within large administrations where data collection, management and storage are widely distributed both geographically and organisationally. Experience to date has shown the approach to be flexible, reliable and scalable. We have also developed our understanding of why people want information and how they want to access it – and importantly why some people do not see the relevance of environmental information to them. We have therefore formulated a strategy to improve the flexibility and response of the services we provide. This strategy also includes developing highly tailored information services that feed off the same base datasets. The Agency has recently piloted just such a service aimed at residential house purchasers. This is an e-business service accessible by solicitors over the Internet, with individually tailored environmental reports generated and delivered in real time. There is the potential to develop similar tailored services wherever environmental information is, or should be, a key part of business activities and decisions. Future development will therefore not solely be making more information available in an electronic format. Information must be made relevant to particular needs at particular times. Citizens must be made aware of the wider environmental impacts of their consumer choices and the implications to themselves and others. They must also understand the real effect of the environment on their daily lives and why it is in their interest to be interested.
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Electronic (technical) surveillance"

1

Wan, Min, Yan Hou et Qian Wang. « Research on the Process and Technical System of Space-based Reconnaissance and Surveillance for Maritime Moving Targets ». Dans 2019 IEEE 3rd Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC). IEEE, 2019. http://dx.doi.org/10.1109/imcec46724.2019.8984054.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Lao, Weilun, Jungong Han et Peter H. N. de With. « Automatic surveillance analyzer using trajectory and body-based modeling ». Dans 2009 Digest of Technical Papers International Conference on Consumer Electronics (ICCE). IEEE, 2009. http://dx.doi.org/10.1109/icce.2009.5012362.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Seunghyun Jang, Bonghyuk Park, Seungsik Lee et Sangsung Choi. « An optical AM video/PTZ data transceiver for a video-based surveillance network ». Dans 2009 Digest of Technical Papers International Conference on Consumer Electronics (ICCE). IEEE, 2009. http://dx.doi.org/10.1109/icce.2009.5012305.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Kharitonenko, I., Wanqing Li et C. Weerasinghe. « Novel architecture for surveillance cameras with complementary metal oxide semiconductor image sensors ». Dans 2005 Digest of Technical Papers. International Conference on Consumer Electronics, 2005. ICCE. IEEE, 2005. http://dx.doi.org/10.1109/icce.2005.1429812.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Chamlawi, Rafiullah, Chang-Tsun Li, Imran Usman et Asifullah Khan. « Authentication and recovery of digital images : Potential application in video surveillance and remote sensing ». Dans 2009 Digest of Technical Papers International Conference on Consumer Electronics (ICCE). IEEE, 2009. http://dx.doi.org/10.1109/icce.2009.5012340.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie