Computer surveillance

Results: 1478



#Item
391Imaging / Video processing / Signal processing / Segmentation / Color histogram / Shot transition detection / Difference of Gaussians / Computer vision / Image processing / Digital signal processing

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 9, NO. 2, FEBRUARY[removed]Audio-Visual Event Recognition in Surveillance Video Sequences

Add to Reading List

Source URL: profs.sci.univr.it

Language: English - Date: 2011-10-29 17:57:42
392Radio-frequency identification / Surveillance / Privacy / Wireless / Barcode / Mobile ticketing / Automatic identification and data capture / Technology / Human–computer interaction

COMPANY INSIGHT The art of beginning by Jan Hendrik Croockewit | Photos by Nedap | lay-out by Maya Reus

Add to Reading List

Source URL: www.nedap.com

Language: English - Date: 2014-06-05 03:38:53
393Crime prevention / Computer law / Electronic Privacy Information Center / Marc Rotenberg / Internet privacy / Surveillance / Jerry Kang / Full body scanner / Robert Ellis Smith / Ethics / Privacy / Security

epic in the news “NSA Files: Decoded”

Add to Reading List

Source URL: epic.org

Language: English - Date: 2013-11-20 09:41:18
394Surveillance / Public safety / Safety / Computer network security / Security / Crime prevention / Security guard

Private Security and Public Interest:

Add to Reading List

Source URL: www.anzsoc.org

Language: English - Date: 2009-04-20 00:43:59
395Privacy of telecommunications / Computer law / Privacy law / Human rights / Cyberspace / Legal aspects of computing / Telecommunications data retention / Patriot Act / Internet privacy / Ethics / Law / National security

Uberveillance Ubiquitous online surveillance and computer science – ethical and legal issues David Vaile Co-convenor, Cyberspace Law and Policy Community

Add to Reading List

Source URL: www.cyberlawcentre.org

Language: English - Date: 2014-09-08 12:40:30
396Raidió Teilifís Éireann / Law / Government / Computer law / Mass surveillance / Regulation of Investigatory Powers Act

1 Private Investigators The use of private investigators by councils, public authorities and government departments in the United Kingdom

Add to Reading List

Source URL: www.bigbrotherwatch.org.uk

Language: English - Date: 2013-03-17 04:26:20
397Employee monitoring / Internet privacy / Ethics / Employment / Privacy policy / Employee benefit / Technology / Behavior / Computer surveillance in the workplace / Privacy / Surveillance / Employment compensation

Personal Data (Privacy) Ordinance Privacy Guidelines: Monitoring and Personal Data Privacy at Work

Add to Reading List

Source URL: www.bxai.org

Language: English - Date: 2014-12-29 01:32:34
398Working time / Internet ethics / Email / New media / Scientific revolution / Cyberslacking / Employee handbook / Wavecrest Computing / Computer surveillance in the workplace / Internet / Computing / Technology

Putting the Lid on Pandora’s Box www.bajai.com Suite A 1647 Bank St. Ottawa, Ontario, K1V 7Z1 Canada[removed]

Add to Reading List

Source URL: www.bajai.com

Language: English - Date: 2008-03-07 14:34:15
399Radio-frequency identification / Surveillance / Privacy / Wireless / Barcode / Mobile ticketing / Automatic identification and data capture / Technology / Human–computer interaction

COMPANY INSIGHT The art of beginning by Jan Hendrik Croockewit | Photos by Nedap | lay-out by Maya Reus

Add to Reading List

Source URL: www.nedap.com

Language: English - Date: 2014-06-05 05:02:47
400Law / Computer law / Data Protection Act / Privacy policy / Data Protection Directive / Information privacy / Internet privacy / Personally identifiable information / Surveillance / Privacy / Ethics / Data privacy

Earning Consumer Trust in Big Data: A European Perspective

Add to Reading List

Source URL: www.bcgperspectives.com

Language: English - Date: 2015-04-03 11:18:45
UPDATE