2012 IEEE International Carnahan Conference on Security Technology (ICCST) 2012
DOI: 10.1109/ccst.2012.6393547
|View full text |Cite
|
Sign up to set email alerts
|

A framework for analysis of quotidian exposure in an instrumented world

Abstract: Abstract-For a variety of often reasonable motives such as increased security or increased profit, individuals and organizations fill our world with sensors and data collection systems that sample and track our day-to-day activities. Some people freely invite tracking into their lives. Others are enticed by offers of discounts or even free products and services. But frequently our lives are quietly sampled, unbeknownst to us, by those with the power to do so. As a result, individuals face a rapidly declining f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…It is fitting to conclude with a recent citation by Shay et al [27] of the Cyber Research Center of the United States Military Academy in West Point, New York, which points to the maturation of the term überveillance and the realization of its potential consequences: "Roger Clarke's concept of dataveillance and M.G. Michael and Katina Michael's more recent überveillance serve as important milestones in awareness of the growing threat of our instrumented world.…”
Section: Resultsmentioning
confidence: 88%
“…It is fitting to conclude with a recent citation by Shay et al [27] of the Cyber Research Center of the United States Military Academy in West Point, New York, which points to the maturation of the term überveillance and the realization of its potential consequences: "Roger Clarke's concept of dataveillance and M.G. Michael and Katina Michael's more recent überveillance serve as important milestones in awareness of the growing threat of our instrumented world.…”
Section: Resultsmentioning
confidence: 88%
“…For example, Clarke (2007a) offers varying definitions of the term, suggesting that überveillance can be understood as any of the following: omni-surveillance, an apocalyptic notion that "applies across all space and all time (omnipresent), and supports some organisation that is all-seeing and even all-knowing (omniscient)", which can be achieved through the use of embedded chips for instance (p. 33); exaggerated surveillance, referring to "the extent to which surveillance is undertaken... its justification is exaggerated" (p. 34) ; and/or meta-, supra-, or master-surveillance, which "could involve the consolidation of multiple surveillance threads in order to develop what would be envisaged by its proponents to be superior information" (p. 38). Shay et al (2012) acknowledge:…”
Section: Towards üBerveillancementioning
confidence: 99%
“…As noted in [17], owners, enablers, and information consumers often share similar purposes and so there are countermeasures common to all three of those classes. Those form the "common" category in Table I.…”
Section: A Actorsmentioning
confidence: 99%
“…Note that each day a person can encounter dozens of sensors, so many that we hardly pay any attention to them. In [17] we presented a case study of "Hal," an ordinary citizen going about a very ordinary life; going to the gym, going to work, shopping at a supermarket; who was monitored by at least 20 sensors in an 18-hour period.…”
Section: Componentsmentioning
confidence: 99%
See 1 more Smart Citation