Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Surveillance" wg kryterium: Wszystkie pola


Tytuł:
Surveillance capitalism and privacy. Knowledge and attitudes on surveillance capitalism and online institutional privacy protection practices among adolescents in Poland
Autorzy:
Ptaszek, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/691382.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
institutional privacy, surveillance capitalism, Polish adolescents, online privacy protection practices
Opis:
The purpose of the study was to determine the level of knowledge and attitudes towards surveillance capitalism and online institutional privacy protection practices among adolescents in Poland (aged 18–19), as well as to determine the relationships between these variables. Surveillance capitalism has emerged as a result of internet users’ activities and involves the collection of all data about these users by different entities for specific benefits without letting them know about it. The dominant role in surveillance capitalism is played by hi-tech corporations. The aim of the study was to verify whether knowledge, and what kind of knowledge, on surveillance capitalism translates into practices related to the protection of online institutional privacy. The study was conducted on a sample of 177 adolescents in Poland. The main part of the questionnaire consisted of two scales: the scale of knowledge and attitudes on surveillance capitalism, and the scale of online institutional privacy protection practices. The results of the study, calculated by statistical methods, showed that although the majority of respondents had average knowledge and attitudes about surveillance capitalism, which may result from insufficient knowledge of the subject matter, this participation in specialized activities/workshops influences the level of intensification of online institutional privacy protection practices.
Źródło:
Mediatization Studies; 2018, 2
2451-1188
Pojawia się w:
Mediatization Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
State surveillance as a threat to personal security of individuals
Autorzy:
Czapnik, Sławomir
Powiązania:
https://bibliotekanauki.pl/articles/526999.pdf
Data publikacji:
2015
Wydawca:
Collegium Civitas
Tematy:
surveillance
state apparatus
Ponopticon
National Security Agency
Opis:
Changes in modern society are crucial to individuals. Article starts with analysis of control in nowadays societies. Then author tries to understand useful categories, as "Panopticon", "ban-opticon" and "synopticon". Last part is focused on stete surveillance, i.e. surveillance by American National Security Agency.
Źródło:
Securitologia; 2015, 2 (22); 125-134
1898-4509
Pojawia się w:
Securitologia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Feminist Conspiracies, Security Aunties, and Other Surveillance State Fictions
Autorzy:
Stuelke, Patricia
Powiązania:
https://bibliotekanauki.pl/articles/2076960.pdf
Data publikacji:
2022-06-15
Wydawca:
Wydawnictwo Uniwersytetu Śląskiego
Tematy:
US surveillance state
feminism
antisocial theory
the commons
Aunty work
Opis:
This article investigates two recent fictional representations of the feminized US surveillance state and its “security feminists” (Grewal), with an eye towards limning what visions of social transformation and political life such representations make possible. It first examines Gish Jen’s 2020 novel The Resisters, considering how the novel’s characterization of the US surveillance state as a snoopy suspicious Aunt maintains American liberal fantasies about the value of productive work and institutionally-sanctioned responses to state violence, even as the novel attempts to find grounds for reinvigorating a democratic commons. Jeff Vandermeer’s 2021 novel Hummingbird Salamander, in contrast, is suspicious of democratic visions of the social. Instead, the novel unravels the privatized figure of the “security mom” (Grewal) in order to experiment with how a queer antisocial orientation might confront environmental and institutional collapse and reimagine the idea of “security” itself.
Źródło:
Review of International American Studies; 2022, 15, 1; 51-68
1991-2773
Pojawia się w:
Review of International American Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Seeing Shadows: The FBI Surveillance of Louise Thompson Patterson
Autorzy:
Sample, Kiara
Powiązania:
https://bibliotekanauki.pl/articles/2076962.pdf
Data publikacji:
2022-06-15
Wydawca:
Wydawnictwo Uniwersytetu Śląskiego
Tematy:
Black women's history
FBI surveillance
Black communism
Black women's activism
Opis:
This article explores the ways gender and race influenced the FBI’s surveillance of Black women activists. Previous scholarship has covered the role of surveillance in repressing revolutionary movements and neutralizing radical organizations. Historically, within many social movements, Black women have been marginalized, silenced, or reduced to only their gender because of patriarchal leadership. As a result, the persistence of sexism within these Black movements has affected Black women’s visibility within movement organizations. This piece asks, how does gendered marginalization impact their surveillance by and visibility to the FBI? It seeks to understand the influence of race and gender on the FBI’s surveillance of Louise Thompson Patterson. By examining the language and narrative components of her FBI file, the article provides an analysis across gender and across time to theorize the dynamics of surveillance, race, and gender. Based on a close analysis of Patterson’s FBI file, I argue that the tension between hypervisibility and invisibility deriving from gendered stereotypes resulted in the Bureau’s vague understanding of her personal life and political ideology.
Źródło:
Review of International American Studies; 2022, 15, 1; 89-106
1991-2773
Pojawia się w:
Review of International American Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Surveillance of Blackness in the Kardashians Wellness Empire
Autorzy:
Hussain, Heena
Powiązania:
https://bibliotekanauki.pl/articles/2076964.pdf
Data publikacji:
2022-06-15
Wydawca:
Wydawnictwo Uniwersytetu Śląskiego
Tematy:
Reality Television
Social Media
Health and Wellness
The Kardashians
Surveillance
Opis:
Keeping up with the Kardashians depicts the lives of the Kardashian clan through reality television. The unparalleled success of five sisters managed by their mother has only continued to increase over time along with their participatory self-surveillance through their formidable use of social media. In recent years, a focus on health and wellbeing has led the sisters to endorse products for weight loss and health, using their bodies as spaces of commodification and advertisement online. The family’s interaction with the camera, and the aesthetics of their social media cross-promotions combine to present an open “honest” front promoting the replication of their success and beauty for their audiences. The sisters engage with blackness in a way that bolsters their claims of capacitating and beautifying white feminine subjects, engagements now commonly termed “blackfishing.” This article analyzes how the Kardashians have created an intense regime of self-surveillance, even dabbling self-consciously in the carceral state's techniques for surveilling blackness, to construct themselves as both uncommonly, exotically sexual ('baring all') and respectable enough (white or white passing) to sell various remedies with dubious health value.
Źródło:
Review of International American Studies; 2022, 15, 1; 107-125
1991-2773
Pojawia się w:
Review of International American Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Reliability of data obtained from video systems of traffic surveillance
Autorzy:
Stawowy, M.
Powiązania:
https://bibliotekanauki.pl/articles/393435.pdf
Data publikacji:
2010
Wydawca:
Polskie Stowarzyszenie Telematyki Transportu
Tematy:
telematyka
niezawodność informacji
nadzór ruchu
telematics
information reliability
traffic surveillance
Opis:
The paper presents a way for estimating the reliability of data obtained with video systems of traffic surveillance. It describes the elements of factors determining the reliability of this indicator and presents a method for determining it using a computer simulation. This indicator can be used for assessing the quality of services.
Źródło:
Archives of Transport System Telematics; 2010, 3, 3; 46-51
1899-8208
Pojawia się w:
Archives of Transport System Telematics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Addressing the problem of lack of representativeness on syndromic surveillance schemes
Autorzy:
Natário, Isabel
Lucília Carvalho, M.
Powiązania:
https://bibliotekanauki.pl/articles/729974.pdf
Data publikacji:
2009
Wydawca:
Uniwersytet Zielonogórski. Wydział Matematyki, Informatyki i Ekonometrii
Tematy:
syndromic surveillance
state space models
importance sampling
Opis:
A major concern with some contagious diseases has recently led to an enormous effort to monitor population health status by several different means.
This work presents a modeling approach to overcome this poor data characteristic, allowing its use for the estimation of the true population disease picture. We use a state space model, where we run two processes in parallel - a process describing the non observable states of the population concerning the presence/absence of disease, and an observational process resulting from the monitoring.
We then use resampling importance sampling estimation techniques, in a Bayesian framework, which enables us to estimate the population states and, thus, the corresponding disease incidence curves.
Źródło:
Discussiones Mathematicae Probability and Statistics; 2009, 29, 2; 169-183
1509-9423
Pojawia się w:
Discussiones Mathematicae Probability and Statistics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Gender, Embodiment, and Self-Regulation: Surveillance in Canadian Intercollegiate Women’s Distance Running
Autorzy:
Carey, Christine
Powiązania:
https://bibliotekanauki.pl/articles/2106846.pdf
Data publikacji:
2022-04-30
Wydawca:
Uniwersytet Łódzki. Wydawnictwo Uniwersytetu Łódzkiego
Tematy:
Gender
Running
Surveillance
Embodiment
Foucault
Docile Bodies
Agency
Opis:
This article draws on data collected through semi-structured interviews with intercollegiate cross country and track athletes to investigate how female distance runners experience their sport concerning gender and embodiment. The runners identified gender as affecting their sport by way of shorter distances for women’s races, heightened involvement of coaches in corporeal matters such as diet and weight, as well as sex verification policies. Distance running was also specifically identified as a sport that intensifies societal pressures for women to be thin. Drawing on Foucault’s theory of disciplinary power, this paper explores how dominant discourses on gender and the body are reproduced within distance running through a combination of structural and cultural practices. However, the paper also highlights resistance to cultural ideals among female runners, calling for a more dynamic understanding of disciplinary power that accounts for individual agency.
Źródło:
Qualitative Sociology Review; 2022, 18, 2; 28-47
1733-8077
Pojawia się w:
Qualitative Sociology Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The sea surveillance sonar
Autorzy:
Kremer, K.
Peery, Y.
Powiązania:
https://bibliotekanauki.pl/articles/332340.pdf
Data publikacji:
1999
Wydawca:
Polskie Towarzystwo Akustyczne
Opis:
The main objective of a sea surveillance sonar is the surveillance of marine activities below the waterline in selected areas lite coasts, waterways, naval bases and oil platforms. The sea surveillance sonar can prove to be extremely beneficial in countering illegal activities that can strain a nation's economy. These activities include sabofage, piratism, terrorism, smuggling and illegal immigration. A combined sonar consisting of a low frequency passive system and a high frequency active system can be used to detect, track and classify all subsurface contacts lite submarines, divers and diver delivery vehicles within its assigned coverage area. In case of silent submarines a vertical transmitting array is supporting the detection of these targets in the law frequency range. The system is of a flexible open architecture so that it can easily be tailored too local needs. As operational support a sonar performance prediction system is integrated. The system has been tested. Experimental result will be shown.
Źródło:
Hydroacoustics; 1999, 2; 127-132
1642-1817
Pojawia się w:
Hydroacoustics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
What Does Google Opinion Rewards Require and Get from Users?
Autorzy:
Talay, Ömür
Çelik, Hasan Cem
Powiązania:
https://bibliotekanauki.pl/articles/16729172.pdf
Data publikacji:
2023-10-17
Wydawca:
Polskie Towarzystwo Komunikacji Społecznej
Tematy:
communication
digital surveillance
counter-surveillance
data sharing
mobile apps
Opis:
This article focuses on the mobile app called “Google Opinion Rewards” (GOR), which is used as a data collection tool in market research and academic research. Developed by Google Surveys, GOR deals with voluntary participation of app users in data sharing in return for rewards. In this context, a test account was created in the GOR app to analyze the surveys, the app sent to the account for a period of three years. In-depth interviews were conducted with 12 participants from the USA, the UK and Turkey to gain comprehensive knowledge about the app ecosystem. The aim of the interviews was to understand the motivations of GOR users for using the app, and explore the counter-surveillance strategies users have developed to avoid surveillance. The findings indicate that most GOR users share their information recklessly even if they have security concerns and that users who are actively involved in surveillance, knowingly or unknowingly, and who want to maximise their income develop masking strategies against surveillance.
Źródło:
Central European Journal of Communication; 2023, 16, 1(33); 79-100
1899-5101
Pojawia się w:
Central European Journal of Communication
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
“Now you see me – now you don’t!” – Practices and purposes of hacking online surveillance
Autorzy:
Kaufmann, Mareile
Powiązania:
https://bibliotekanauki.pl/articles/691342.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
Internet, hacking, surveillance, data, obfuscation, politics, play, affect
Opis:
This paper describes how hacking can be the act of redefining what is seen and not seen in the context of online surveillance. Based on a qualitative interview study with 22 hackers, it discusses the many practices and purposes of ‘hacking online surveillance’, with a specific focus on the techniques of disappearing from view while continuing to be online. Not only do these techniques vary in style and the expertise involved, but they all fulfill multiple functions. They are more than just a coded statement against the uneven powers of surveillance, they are tactics of the everyday life, moments of analytical creativity and reflection, instances of pleasure and play, affective encounters, identity work and forms of communication. The paper dedicates space to these sometimes overlapping and sometimes differing conceptualizations of ‘hacking online surveillance’ by using methodologies that consciously seek out the nonlinear and the multiple.
Źródło:
Mediatization Studies; 2018, 2
2451-1188
Pojawia się w:
Mediatization Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Surveillance and Sequestration Issues of Internet of Things (SSIoT)
Autorzy:
Banu, Reshma
Taranum, Ayesha
Powiązania:
https://bibliotekanauki.pl/articles/1193564.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
DDoS Attack
Denial of Service
Internet of Things
RFID
Surveillance
WSN
sequestration
Opis:
A direct interpretation of the term Internet of Things refers to the use of standard Internet protocols for the human-to-thing or thing- to-thing communication in embedded networks. Although the security needs are well-recognized in this domain, it is still not fully understood how existing IP security protocols and architectures can be deployed. In this paper, we discuss the applicability and limitations of existing Inter- net protocols and security architectures in the context of the Internet of Things. First, we give an overview of the deployment model and general security needs. We then present challenges and requirements for IP-based security solutions and highlight technical limitations of standard IP security protocols. Focused on the security loopholes arising out of the information exchange technologies used in Internet of Things. No countermeasure to the security drawbacks has been analyzed in the paper.
Źródło:
World Scientific News; 2016, 41; 171-185
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Sanitary and epidemiological surveillance in Poland from 1945 to 1989 (selected issues)
Autorzy:
Gondek, B.
Semków, P.
Mucha, D.
Karakiewicz, B.
Powiązania:
https://bibliotekanauki.pl/articles/1916660.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Medyczny w Białymstoku
Tematy:
Epidemiological surveillance
history
infectious diseases
Opis:
Introduction: In this article, selected issues concerning sanitary and epidemiological surveillance in post-war Poland (until 1989) have been described. Sanitary problems which occurred in Poland directly after the Second World War and the development of infectious diseases’ epidemiology have been included. Purpose: To summarize the establishment, development and modification of sanitary and epidemiological structures, the introduction of vaccinations as well as other medical means of overcoming infectious diseases, improving people’s living conditions and health situation. Materials and methods: Literature related to the topic and archival materials from the Voivodeship Sanitary-Epidemiological Station in Gdansk were used. Archives included a vaccination programme valid between 1975 and 1989 and a two-week specimen report concerning morbidity rates of infectious diseases and chemical poisoning. Results: Thanks to the archival materials, issues concerning infectious diseases were emphasized. The the utilized literature brought out the National Institute’s for Public Health role as an authority in the cooperation with other healthcare institutions, influenced the formation and organization of sanitary and epidemiological service in Poland. Conclusions: The historical background of this text has been presented as a secondary subject, however, the years 1945-1989 comprising the time-frame of this article were a period of great changes. One of them was the formation of sanitary and epidemiological surveillance.
Źródło:
Progress in Health Sciences; 2014, 4, 2; 88-95
2083-1617
Pojawia się w:
Progress in Health Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Surveillance in the liquid modern times
Inwigilacja w czasach płynnej nowoczesności
Autorzy:
Czapnik, Sławomir
Baraniewicz-Kotasińska, Sabina
Powiązania:
https://bibliotekanauki.pl/articles/462415.pdf
Data publikacji:
2019
Wydawca:
Uniwersytet Opolski
Tematy:
surveillance
facial recognition
Facebook
Google Street View
liquid modern times
Opis:
Surveillance, nowadays especially provided by information and communication technology, is at the core of social control that has been largely commoditised and privatized. Consumer culture gives hope for freedom lives, challenging the social hierarchies that dominated the earlier – in Bauman’s vocabulary, “solid” – phase of modernity. The aim of this paper is to present two of many tools, which are used by biggest IT companies to keep under surveillance the individuals, societies and nations in the Liquid Modern Times. There has been the socio-cultural context of Internet’s development analyzed to find the premises that led to a transformation of cyberspace from a freedom to a surveillance place, and conducted a case study of Facebook’s facial recognition technology and Google Street View practices. Non-reactive research methods have been used in the paper.
Źródło:
Studia Krytyczne/ Critical Studies; 2019, 7; 11-23
2450-9078
Pojawia się w:
Studia Krytyczne/ Critical Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
How Republicans and Democrats Strengthen Secret Surveillance in the United States
Autorzy:
Laidler, Paweł
Powiązania:
https://bibliotekanauki.pl/articles/514659.pdf
Data publikacji:
2019
Wydawca:
Uniwersytet Śląski. Wydział Nauk Społecznych
Tematy:
politics of surveillance
secrecy
transparency
national security
separation of powers
United States
Snowden
Opis:
The purpose of the paper is to assess the relationship between secrecy and transparency in the pre- and post-Snowden eras in the United States. The Author analyzes, from both political and legal perspectives, the sources and outcomes of the U.S. politics of national security with a special focus on domestic and intelligence surveillance measures. The core argument of the paper is that, due to the role of the executive which has always promoted the culture of secrecy, there is no chance for the demanded transparency in national security surveillance, despite the controlling powers of the legislative and judiciary. As the analysis proves, the United States in the post-Snowden era seems to be the most transparent and secretive state, at the same time.
Źródło:
Political Preferences; 2019, 25; 5-20
2449-9064
Pojawia się w:
Political Preferences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
People tracking in video surveillance systems based on artificial intelligence
Autorzy:
Nasry, Abir
Ezzahout, Abderrahmane
Omary, Fouzia
Powiązania:
https://bibliotekanauki.pl/articles/27314232.pdf
Data publikacji:
2023
Wydawca:
Sieć Badawcza Łukasiewicz - Przemysłowy Instytut Automatyki i Pomiarów
Tematy:
person tracking
person detection
person identification
video surveillance
artificial intelligence
Opis:
As security is one of the basic human needs, we need security systems that can prevent crimes from happen‐ ing. In general, surveillance videos are used to observe the environment and human behavior in a given location. However, surveillance videos can only be used to record images or videos, without additional information. There‐ fore, more advanced cameras are needed to obtain other additional information such as the position and move‐ ment of people. This research extracted this information from surveillance video footage using a person tracking, detection, and identification algorithm. The framework for these is based on deep learning algorithms, a popu‐ lar branch of artificial intelligence. In the field of video surveillance, person tracking is considered a challenging task. Many computer vision, machine learning, and deep learning techniques have been developed in recent years. The majority of these techniques are based on frontal view images or video sequences. In this work, we will compare some previous work related to the same topic.
Źródło:
Journal of Automation Mobile Robotics and Intelligent Systems; 2023, 17, 1; 59--68
1897-8649
2080-2145
Pojawia się w:
Journal of Automation Mobile Robotics and Intelligent Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
PERSPECTIVE OF SUSTAINABLE DEVELOPMENT IN POST-PANDEMIC WORLD: SURVEILLANCE CAPITALISM AND HOPES
Autorzy:
RĄB, ŁUKASZ
KETTLER, KAROLINA
Powiązania:
https://bibliotekanauki.pl/articles/1036202.pdf
Data publikacji:
2020-04-07
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
sustainable development
surveillance capitalism
post-pandemic world
utopia
work
humanistic management
Opis:
The current coronavirus pandemic is not only a health/healthcare crisis but to a vast extent it will also influence other spheres of life, including social relations, the shape of economy and working models, and natural environment. Sustainable development that relies on the previously mentioned pillars (economy, society, environment) is going to be strongly affected by the virus outbreak. There is a threat that the process of recovering from the corona crisis will accelerate and legitimize the dynamics of surveillance capitalism. A really interesting case is going to be the labor world, where thanks to modern technologies, suppression of personal freedoms and triumph of total surveillance might be particularly easy. However, good scenarios are also plausible. The first 21st century pandemic of that scale may force societies to redefine their current modus operandi and shift capitalism into a more sustainable, humanistic model.
Źródło:
Society Register; 2020, 4, 2; 159-166
2544-5502
Pojawia się w:
Society Register
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On-water video surveillance: data management for a ship identification system
Autorzy:
Popik, Adrian
Zaniewicz, Grzegorz
Wawrzyniak, Natalia
Powiązania:
https://bibliotekanauki.pl/articles/134912.pdf
Data publikacji:
2019
Wydawca:
Akademia Morska w Szczecinie. Wydawnictwo AMSz
Tematy:
video surveillance
cameras
image
processing
ship identification
River Information Services
Opis:
Video surveillance on both marine and inland waters still only plays a mainly auxiliary role in vessel traffic observation and management. The newest technical achievements in visual systems allow camera images to be used in more sophisticated tasks, such as automatic vessel recognition and identification in observed areas. With the use of deep learning algorithms and other artificial intelligence methods, such as rough sets and fuzzy sets, new functions can be designed and implemented in monitoring systems. In this paper the challenges that were encountered and the technology that has been developed in managing video streams are presented as well as the images needed for tests and proper operation of the designed Ship Recognition and Identification System (SHREC). The current technologies, typical setups and capabilities of cameras, with regard to existing on-water video monitoring systems, are also presented. The aspects of collecting the test data in the Szczecin Water Junction area are also described. The main part of the article focuses on presenting the video data pre-processing, storing and managing procedures that have been developed for the purposes of the SHREC system.
Źródło:
Zeszyty Naukowe Akademii Morskiej w Szczecinie; 2019, 60 (132); 56-63
1733-8670
2392-0378
Pojawia się w:
Zeszyty Naukowe Akademii Morskiej w Szczecinie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Legitimizing pre-emptive data surveillance under the EU law: the case of the PNR Directive
Autorzy:
Wojnowska-Radzińska, Julia
Powiązania:
https://bibliotekanauki.pl/articles/1036826.pdf
Data publikacji:
2021-03-30
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
PNR data
passenger
profiling
mass surveillance
pre-determined criteria
risk assessment
Opis:
The paper analyses the PNR Directive as pre-emptive data surveillance practice. The 2016/681 Directive regulates the use of Passenger Name Record (PNR) data in the EU for the prevention, detection, investigation and prosecution of terrorist offences and serious crime. It obliges airlines to hand national authorities passengers’ data for all flights from third countries to the EU and vice versa, but Member States can also extend it to ‘intra-EU’ ones (i.e. from an EU country to one or more other EU countries), provided that they notify the EU Commission. Thus, PNR Directive affects all passengers who arrive in the territory of one Member State originating from a third country, or who depart from a Member State’s territory to a non-EU country, including any transfer or transit flights. Using PNR data, the individual is profiled and encoded in terms of degrees of risk.
Źródło:
Ruch Prawniczy, Ekonomiczny i Socjologiczny; 2021, 83, 1; 115-127
0035-9629
2543-9170
Pojawia się w:
Ruch Prawniczy, Ekonomiczny i Socjologiczny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Could Pegasus Gate have been prevented? The evolution of the export control regime for cyber-surveillance tools in Israel
Autorzy:
Mielko, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/13948150.pdf
Data publikacji:
2023-02-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyber-surveillance
export control
Wassenaar Arrangement
cyber defence
Opis:
The subject of this article is a discussion of the legal provisions governing the Israeli and international legal systems governing the control of trade in cyber-surveillance tools. A detailed analysis of the current regulations is carried out with a view to classification and pointing out imperfections in the content of the current regulations. The author identifies the transformations in the content of the Wassenaar Arrangement, which resulted in an attempt to regulate this matter more comprehensively in Israeli law in 2016. Using the impact of the international NSO software scandal as an example, the role that an effective export control regime, including international regulation, plays in preventing cyber-surveillance tools from being used in ways that are dangerous to internationally recognized values is demonstrated.
Źródło:
Cybersecurity and Law; 2023, 9, 1; 155-166
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Mapa w geoinformatycznym systemie ochrony portu
A map in the geoinformatics system of port surveillance
Autorzy:
Łubczonek, J.
Powiązania:
https://bibliotekanauki.pl/articles/346839.pdf
Data publikacji:
2015
Wydawca:
Polskie Towarzystwo Informacji Przestrzennej
Tematy:
mapa numeryczna
ochrona portu
system geoinformatyczny
digital map
port surveillance
geoinformatics system
Opis:
W pracy przedstawiono opracowanie mapy dla geoinformatycznego systemu ochrony portu. Proces ten przedstawiono w szerszym ujęciu, z uwzględnieniem tworzenia dedykowanego systemu geoinformatycznego. Dotyczyło to tworzenia mapy w aspekcie opracowana modułu mapowego. W realizowanym projekcie moduł mapowy składał się z trzech głównych aplikacji: do wizualizacji mapy 2D, do wizualizacji mapy 3D oraz aplikacji opracowania geodanych. Stworzona baza danych przestrzennych wraz z aplikacją do wizualizacji mapy tworzyła właściwy system obrazowania informacji przestrzennej, którą była w analizowanym przypadku treść kartograficzna. W pracy przestawiono też główne problemy związane z opracowaniem modułu mapowego oraz jego końcową implementację w postaci stanowiska operacyjnego. Na podstawie zrealizowanego projektu można stwierdzić, że największe problemy związane były z opracowaniem aplikacji do wizualizacji mapy 3D.
The paper presents the development of maps for geoinformatics port security system. This process is discussed in a broader sense, including the creation of a dedicated geoinformatics system. It was related to map creation in relation to development of a map module. In the realized project the map module consisted of three main applications: visualization of 2D maps, 3D maps visualization and applications for geodata elaboration. The created spatial database and the application for visualization of maps created an appropriate system for imaging the spatial information, which, in this case, was cartographic content. The paper also discusses main issues related to the development of a map module and its final implementation in the form of an operating work station. On the basis of the project it can be stated that the main problems were related to development of applications for visualization of 3D maps.
Źródło:
Roczniki Geomatyki; 2015, 13, 4(70); 349-358
1731-5522
2449-8963
Pojawia się w:
Roczniki Geomatyki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
UK electronic surveillance programmes in the context of protection of EU citizens rights after Brexit
Brytyjskie programy inwigilacji elektronicznej a ochrona praw obywateli UE po Brexicie
Autorzy:
Rojszczak, Marcin
Powiązania:
https://bibliotekanauki.pl/articles/485611.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Jagielloński. Instytut Europeistyki
Tematy:
masowa inwigilacja
Brexit
bezpieczeństwo narodowe
ochrona prywatności
dane osobowe
FVEY
GCHQ
Tempora
mass surveillance
bulk surveillance
national security
privacy
data protection
Opis:
Stosowanie rozbudowanych środków inwigilacji elektronicznej jest coraz częściej wskazywane jako jedno z głównych zagrożeń dla ochrony prywatności w cyberprzestrzeni, a w konsekwencji - dla budowy społeczeństwa opartego na informacji i wiedzy. Zagadnienie to jest często wiązane z poszukiwaniem równowagi pomiędzy ochroną praw jednostek (prawo do prywatności) a bezpieczeństwem publicznym (ochrona przed najpoważniejszymi przestępstwami) i kojarzone z działaniami realizowanymi przez amerykańskie służby wywiadowcze. Rozbudowane programy inwigilacyjne są jednak również prowadzone przez niektóre państwa członkowskie UE. Działania te budzą uzasadnione wątpliwości co do ich zgodności z prawem Unii, a także z obowiązkami wynikającymi z EKPC. Szczególne znaczenie mają programy inwigilacji elektronicznej prowadzone przez brytyjskie służby wywiadowcze (zwłaszcza GCHQ). Działania te nie tylko opierają się na hurtowym gromadzeniu danych elektronicznych, ale także na ich przekazywaniu do służb specjalnych państw trzecich. Problem szeroko zakrojonych działań inwigilacyjnych prowadzonych przez władze brytyjskie pozostał nierozwiązany na poziomie prawa UE. Również orzecznictwo ETPC, w którym wskazano na brak proporcjonalności tego typu programów, nie przyczyniło się do zmiany brytyjskiej praktyki. Wyjście Wielkiej Brytanii z Unii Europejskiej i oparcie przyszłych stosunków na wydawanej przez KE decyzji o adekwatności zabezpieczeń otwiera nowe pole dla rozwiązania tego problemu. W artykule omówiono możliwy wpływ Brexitu na ramy prawne brytyjskich programów inwigilacji elektronicznej oraz przedstawiono nowe środki wpływu, które będą dostępne dla europejskich partnerów w celu ograniczenia masowych działań inwigilacyjnych prowadzonych przez władze brytyjskie.
Źródło:
Problemy Współczesnego Prawa Międzynarodowego, Europejskiego i Porównawczego; 2018, 16; 143-160
1730-4504
Pojawia się w:
Problemy Współczesnego Prawa Międzynarodowego, Europejskiego i Porównawczego
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Integrated and deep learning–based social surveillance system : a novel approach
Autorzy:
Litoriya, Ratnesh
Ramchandani, Dev
Moyal, Dhruvansh
Bothra, Dhruv
Powiązania:
https://bibliotekanauki.pl/articles/27314204.pdf
Data publikacji:
2022
Wydawca:
Sieć Badawcza Łukasiewicz - Przemysłowy Instytut Automatyki i Pomiarów
Tematy:
Video Surveillance
object detection
object tracking
YOLO v4 algorithm
OpenCV
Opis:
In industry and research, big data applications are gaining a lot of traction and space. Surveillance videos contribute significantly to big unlabelled data. The aim of visual surveillance is to understand and determine object behavior. It includes static and moving object detection, as well as video tracking to comprehend scene events. Object detection algorithms may be used to identify items in any video scene. Any video surveillance system faces a significant challenge in detecting moving objects and differentiating between objects with same shapes or features. The primary goal of this work is to provide an integrated framework for quick overview of video analysis utilizing deep learning algorithms to detect suspicious activity. In greater applications, the detection method is utilized to determine the region where items are available and the form of objects in each frame. This video analysis also aids in the attainment of security. Security may be characterized in a variety of ways, such as identifying theft or violation of covid protocols. The obtained results are encouraging and superior to existing solutions with 97% accuracy.
Źródło:
Journal of Automation Mobile Robotics and Intelligent Systems; 2022, 16, 3; 30--39
1897-8649
2080-2145
Pojawia się w:
Journal of Automation Mobile Robotics and Intelligent Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Prejudices behind Algorithms: Automated Surveillance Systems as Tools of Segregation and Discrimination
Autorzy:
Gurtowski, Maciej
Waszewski, Jan
Powiązania:
https://bibliotekanauki.pl/articles/1985830.pdf
Data publikacji:
2018-12-31
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
Big Data
data doubles
dataveillance
invisible hand
new surveillance
perverse effect
racism
surveillant assemblages
Opis:
The aim of this paper is to describe the emerging phenomenon of new racism brought by the development of automated surveillance tools. We would like to show that this new system of discrimination is a byproduct of some general transformations in the field of social control. For this purpose, we will refer to invisible hand type of explanation, and the concept of perverse effect in particular. We will also relate widely to some cases and concepts from the “new surveillance” and social control literature and we will try to summarize it.
Źródło:
Kultura i Edukacja; 2018, 4(122); 94-109
1230-266X
Pojawia się w:
Kultura i Edukacja
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Between International Relations and Arms Controls: Understanding Export Controls for Surveillance Technologies1
Autorzy:
Wagner, Ben
Bronowicka, Joanna
Powiązania:
https://bibliotekanauki.pl/articles/616108.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
export controls
surveillance technology
international relations
global governance
kontrola eksportu
technologia nadzoru
stosunki międzynarodowe
Opis:
Kontrole eksportu stają się coraz ważniejszym wymiarem stosunków międzynarodowych. Stale jest jeszcze jednak stosunkowo mało literatury na temat ich wykorzystania i wdrażania. Niniejszy artykuł jest próbą ukazania rozwoju i problemów związanych z kontrolą eksportu w nowym obszarze: technologiach nadzoru, które niedawno zostały włączone do struktur międzynarodowych w zakresie kontroli eksportu, przynosząc ze sobą szereg wyzwań i pytań dla decydentów. Na podstawie przeprowadzonych rozmów z praktykami i kluczowymi ekspertami w tej dziedzinie autorzy artykułu próbują nakreślić najważniejsze pomysły i rozwiązania w tym obszarze, jak również istotne odpowiedzi, które zostały opracowane w kontekście (dostrzegalnych) wyzwań.
Export Controls are becoming an increasingly important dimension of international relations, however there is still relatively little literature on their usage and implementation. The following article attempts to show the development and problems surrounding export controls in a new area: surveillance technologies. These have recently been integrated into international frameworks for export controls, bringing with them a row of challenges and questions for policy makers. Based on extensive conversations with practitioners and key experts in the field, this paper attempts to sketch out key ideas and solutions in this area as well as important responses that have been developed to (perceived) challenges.
Źródło:
Przegląd Politologiczny; 2015, 3; 153-165
1426-8876
Pojawia się w:
Przegląd Politologiczny
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies