Computer surveillance

Results: 1478



#Item
371Sociology / Ethics / French words and phrases / Civil disobedience / Crime prevention / Sousveillance / Steve Mann / Opportunism / Closed-circuit television / Surveillance / National security / Security

The inevitability of the transition from a surveillance-society to a veillance-society: Moral and economic grounding for sousveillance Mir Adnan Ali and Steve Mann Department of Electrical and Computer Engineering Univer

Add to Reading List

Source URL: wearables.blu.org

Language: English - Date: 2013-10-12 01:11:24
372Sociology / Ethics / French words and phrases / Civil disobedience / Crime prevention / Sousveillance / Steve Mann / Opportunism / Closed-circuit television / Surveillance / National security / Security

The inevitability of the transition from a surveillance-society to a veillance-society: Moral and economic grounding for sousveillance Mir Adnan Ali and Steve Mann Department of Electrical and Computer Engineering Univer

Add to Reading List

Source URL: about.eyetap.org

Language: English - Date: 2013-10-12 01:11:24
373Internet / Technology / Internet ethics / Censorship / Computer network security / Content-control software / Google China / Surveillance / Freedom of speech / Ethics / Privacy / Internet censorship

10 Corporate Accountability in Networked Asia Rebecca MacKinnon In 2010, Google’s defiance of Chinese government censorship demands, followed by its decision to remove its Chinese search operations from mainland China,

Add to Reading List

Source URL: oni-access.net

Language: English - Date: 2011-12-09 11:50:32
374Procedural programming languages / Cross-platform software / Information flow / Information theory / C / SPARK / Java / Stack / Surveillance / Computing / Software engineering / Computer programming

Course outline 1.  Language-Based Security: motivation 2.  Language-Based Information-Flow Security: the big picture 3.  Dimensions and principles of declassification 4.  Dynamic vs. static security enforcement

Add to Reading List

Source URL: www.sti.uniurb.it

Language: English - Date: 2014-09-11 02:40:15
375Computer law / Privacy / Law / Surveillance / Human rights / Electronic Communications Privacy Act / Communications Assistance for Law Enforcement Act / Internet privacy / Telecommunications data retention / Privacy law / Privacy of telecommunications / Ethics

GOVERNMENT ACCESS TO DATA April 2012  Current law in privacy from government intrusion does not provide the protections that people reasonably anticipate. Data kept with third parties is treated differently than that

Add to Reading List

Source URL: cdn.ccianet.org

Language: English - Date: 2014-09-06 05:40:50
376Mass surveillance / Law / Regulation of Investigatory Powers Act / Privacy / Privacy of telecommunications / Article 8 of the European Convention on Human Rights / Internet privacy / Telecommunications data retention / Computer law / Privacy law / Surveillance

_____________________________________________________ OPINION ON DRAFT COMMUNICATIONS DATA BILL _____________________________________________________ 1. I am asked to advise the Open Rights Group (‘ORG’) concerning t

Add to Reading List

Source URL: www.openrightsgroup.org

Language: English - Date: 2012-08-24 08:12:12
377Spyware / Employee monitoring / National security / Computing / Software / Computer surveillance in the workplace / Surveillance / Privacy / SpectorSoft

[removed] | www.spectorsoft.com Introduction If a company is considering the purchase of software to conduct a focused investigation of an employee suspected of unethical or illegal activity using company computer

Add to Reading List

Source URL: downloads.spectorsoft.com

Language: English - Date: 2012-08-16 07:10:28
378Government / National security / Auditing / Security guard / Surveillance / Audit committee / Regulatory agency / Computer security / Private security industry in South Africa / Security / Crime prevention / Public safety

Private Security Industry Regulatory Authority (PSiRA) Eco Glades 2 Office Block B 420 Witch-Hazel Avenue Highveld Ext 70, Centurion Private Bag X817

Add to Reading List

Source URL: www.psira.co.za

Language: English - Date: 2014-11-19 03:48:26
379Face recognition / Image processing / Surveillance / Machine learning / Facial recognition system / Feature / Eigenface / Face detection / Pattern recognition / Computer vision / Artificial intelligence / Vision

Biometric Systems: A Face Recognition Approach Erik Hjelmås∗ Department of Informatics University of Oslo P. O. Box 1080 Blindern, 0316 Oslo, Norway email: [removed]

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2004-03-09 04:39:08
380Privacy / Ethics / Workplace surveillance / Workplace privacy / Computer surveillance / National Security Agency / Internet privacy / Legal aspects of computing / Computer surveillance in the workplace / Surveillance / National security / Security

Employer surveillance of employee emails: what are the rules? Dianne Banks, Peter Leonard, James Pomeroy, Grace Keesing and Kim McGuren GILBERT + TOBIN LAWYERS The key rules relating to surveillance of employee emails by

Add to Reading List

Source URL: www.gtlaw.com.au

Language: English - Date: 2013-08-11 20:32:14
UPDATE