Computer surveillance

Results: 1478



#Item
831Public safety / Public health / Clinical surveillance / Law enforcement / Surveillance / Computer security / Database / Bioterrorism / Security / Crime prevention / National security

Wildlife Disease Association 2007 Annual Conference Aug 12-17, 2007 ♦ Estes Park, CO, USA Wildlife Disease Informatics Symposium: Session Notes from the Comparison/Contrast of International Surveillance

Add to Reading List

Source URL: www.wdin.org

Language: English - Date: 2008-12-19 16:38:48
832Data management / Record linkage / Oncology / Cancer registry / Linkage / Genetic linkage / Pediatric Oncology Group / Medicine / Cancer organizations / Computer algebra

Linkage Between the Children’s Oncology Group and the Minnesota Cancer Surveillance System MCSS Epidemiology Report 01:2 November 2001

Add to Reading List

Source URL: www.health.state.mn.us

Language: English - Date: 2012-12-13 20:47:12
833Imaging / Digital photography / Crime prevention / National security / Privacy / Surveillance / Human–computer interaction / Rendering / Pixel / Computer vision / Image processing / Computer graphics

Seeing is for Humans, and Computers Tsuhan Chen ELECTRICAL AND COMPUTER ENGINEERING

Add to Reading List

Source URL: www.research.cornell.edu

Language: English - Date: 2014-07-31 14:41:17
834Privacy of telecommunications / Computer law / Privacy law / Human rights / Cyberspace / Legal aspects of computing / Telecommunications data retention / Patriot Act / Internet privacy / Ethics / Law / National security

Uberveillance Ubiquitous online surveillance and computer science – ethical and legal issues David Vaile Co-convenor, Cyberspace Law and Policy Community

Add to Reading List

Source URL: www.bakercyberlawcentre.org

Language: English - Date: 2014-09-08 12:40:30
835Methodology / Data collection / Sociology / Market research / Survey methodology / Question / Behavioral Risk Factor Surveillance System / Questionnaire construction / Computer-assisted web interviewing / Research methods / Science / Evaluation methods

Criteria and Procedures for Addition of Data Items Overview Overview The Montana Department of Public Health and Human Services (MT DPHHS) receives funds in a

Add to Reading List

Source URL: 50.57.217.98

Language: English - Date: 2014-08-18 07:01:42
836Crime prevention / Security engineering / Critical infrastructure protection / Closed-circuit television / Surveillance / Computer security / Security / National security / Public safety

CASE STUDY Case Study: Virtual Perimeter Monitoring System Cost-effective Video Surveillance with Video Analytics Challenge: The U.S. Navy wanted to be able to deploy a camera surveillance system that could be easily de

Add to Reading List

Source URL: www.ultra-3eti.com

Language: English - Date: 2013-03-08 15:14:12
837Medical informatics / Data management / Computer algebra / Record linkage / Cancer registry / Whois / Disease registry / Clinical surveillance / Medicine / Data / Information

Chapter 8. Manual and computerized cancer registries R.G. Skeet Herefordshire Health Authority, Victoria House, Hereford HR4 OAN, UK Introduction Superficially, there may appear to be little in common between a small, ma

Add to Reading List

Source URL: www.iarc.fr

Language: English - Date: 2012-04-27 07:12:19
838National security / Computer law / Regulation of Investigatory Powers Act / Crime prevention / Law enforcement / Commissioner / Surveillance / Prime Minister of the United Kingdom / Law / Mass surveillance / Security

Microsoft Word - OSC Annual Report 2013_2014 v9 26 June 14.docx

Add to Reading List

Source URL: osc.independent.gov.uk

Language: English - Date: 2014-09-04 06:39:22
839Mass surveillance / National Security Agency / United States government secrecy / United States Cyber Command / Central Intelligence Agency / United States Intelligence Community / William B. Black /  Jr. / Australian Intelligence Community / United States Department of Defense / National security / Military

William P. Marshall Managing Director Areas of Focus:  Cyber security and Information Assurance  General intelligence community matters  Information Operations and Computer Network Operations

Add to Reading List

Source URL: www.chertoffgroup.com

Language: English - Date: 2014-01-24 09:00:09
840Identification / Surveillance / Access control / Iris recognition / University of Cambridge Computer Laboratory / Fingerprint recognition / Fingerprint / Biometric Consortium / Biometrics / Security / Fingerprints

CITeR IMPACT A compendium of research highlights of the Center for Identification Technology Research (CITeR[removed]Edition v1

Add to Reading List

Source URL: clarkson.edu

Language: English - Date: 2013-03-22 14:25:36
UPDATE