Academia.eduAcademia.edu

Security and Surveillance

description370 papers
group3,062 followers
lightbulbAbout this topic
Security and Surveillance is the study of methods and technologies used to monitor, protect, and ensure the safety of individuals, property, and information. It encompasses the analysis of systems, policies, and practices aimed at preventing unauthorized access, detecting threats, and responding to security incidents in various environments.
lightbulbAbout this topic
Security and Surveillance is the study of methods and technologies used to monitor, protect, and ensure the safety of individuals, property, and information. It encompasses the analysis of systems, policies, and practices aimed at preventing unauthorized access, detecting threats, and responding to security incidents in various environments.

Key research themes

1. How can Internet of Things (IoT) and AI technologies enhance automated intrusion detection and real-time alerting in security surveillance systems?

This research area investigates the integration of IoT devices, sensors, and Artificial Intelligence (AI) algorithms to build smart, cost-effective surveillance systems capable of detecting intrusions autonomously and delivering immediate notifications to users. It focuses on technological implementations employing microcontrollers, camera modules, sensor networks, and AI-driven behavior analysis to improve accuracy, reduce false alarms, and enable remote monitoring in home, public, and commercial security contexts.

Key finding: This study developed an IoT based smart surveillance system that uses a Raspberry Pi coupled with a PIR sensor and camera module to detect motion, capture intruder images, and send automatic email alerts remotely via Wi-Fi.... Read more
Key finding: This research proposed an AI-driven smart surveillance framework that incorporates video and image analysis, including tracking, object detection, classification, and behavioral analysis modules trained via AutoML. The system... Read more
Key finding: The paper introduced a surveillance system leveraging OpenCV and mobile devices for intruder identification, motion filtering, face recognition, and real-time remote notification via SMS, MMS, or email using Twilio API. The... Read more

2. What are the socio-cultural and legal challenges surrounding privacy, public acceptance, and ethical governance of surveillance technologies?

This theme explores the societal implications, legal frameworks, privacy concerns, and public perceptions that arise from the increasing deployment of ubiquitous and networked surveillance technologies. It investigates how surveillance assemblages affect civil liberties, the balance between security and privacy, and the ethical acceptability of surveillance interventions. This research addresses both the cultural narratives around surveillance and the need for regulatory and legal mechanisms to ensure proportionality, transparency, and accountability.

Key finding: This paper critically analyzes the proliferation of surveillance technologies and argues for the necessity of explicit privacy impact assessments to evaluate the proportionality and necessity of surveillance initiatives. It... Read more
Key finding: Drawing on large-scale public engagement via citizen summits, this project revealed that public acceptance of Surveillance-Orientated Security Technologies (SOSTs) varies significantly across European contexts, influenced by... Read more
Key finding: This research examines UK government electronic surveillance policies emphasizing that public acceptance depends on reconciling state interests with individual rights, positioning surveillance as serving law-abiding citizens.... Read more
Key finding: The author argues that national security surveillance in Southern Africa serves capitalist and political power consolidation agendas rather than societal needs, characterized by abuses of intelligence agencies and... Read more

3. How do cultural, political, and infrastructural contexts shape surveillance practices and governance in urban and national environments?

This theme addresses the interpretive role of surveillance technologies as cultural symbols and tools of governance, as well as the infrastructural, policy, and security challenges in implementing and managing surveillance systems in urban and national contexts. It investigates how power dynamics, local political structures, and infrastructural vulnerabilities influence surveillance deployment, from symbolic meanings of CCTV in Mexico to digital authoritarianism and infrastructure protection in diverse geopolitical settings.

Key finding: Through ethnographic analysis of CCTV use in Mexican cities and commercial centers, this study reveals that surveillance technologies operate more as symbolic instruments reinforcing cultural narratives about order and... Read more
Key finding: This paper demonstrates the infrastructural and security challenges posed by vandalism and lack of geospatial data in Nigeria’s telecom networks, proposing integrated telecommunications corridors alongside major... Read more
Key finding: The study traces the diffusion of digital authoritarianism models from China, Russia, and Turkey to Pakistan, examining surveillance, internet censorship, and dis/misinformation practices. It highlights how state-centric... Read more
Key finding: Through comparative analysis of neighborhood surveillance groups in Chile and Mexico, this research shows how localized surveillance initiatives can drift toward varying degrees of vigilantism influenced by state structures... Read more

All papers in Security and Surveillance

Literature Review 1984
Kenya is swiftly establishing itself as a significant technological hub in East Africa, often dubbed “Silicon Savannah” because of its dynamic digital landscape, flourishing startup environment, and robust governmental support for... more
This research work proposes a method for managing, securing, and validating the health data distribution records using a genetic-based hashing algorithm in a decentralized environment. The reason behind choosing blockchain is to secure... more
Laudon Dased his remarks on his book titled 'The Dossier Society' (Columbia University Press). This book is the result of 6 years of effort and is due to be released in June this year. In introducing the lecture as well as the title of... more
In this paper, I explain that the data protection bills presented over the past few years inherit the colonial model where the executive defines threats, interprets laws, and exempts itself from compliance.
The present chapter examines the threat of algorithmic digital surveillance (including AI) in small states by conducting a case study analysis of Cyprus. We develop a theoretical and empirical framework that relates digital surveillance... more
The provision of biometric surveillance systems in cities' administration in Brazil is commonly delegated to private companies, where businesses supply facial recognition technologies (FRTs) to law enforcement entities. These... more
Regulating intelligence services is a challenge for modern societies worldwide. Their very modus operandi relies on tight secrecy protocols for the information gathered, internationally and domestically. Evolving surveillance techniques... more
This research memorandum discusses the concept of placing sensitive business information and data in an irrevocable trust similar to an International Asset Protection Trust. The purpose for such a trust would be to protect and shield... more
It is commonly argued that immigration policies in advanced democracies are consistently more liberal than the restrictionist preferences of publics. In this article, I challenge this view by examining the opinion-policy relationship at... more
La actual situación de vigilancia social masiva está llevando a un control tecnológico, algorítmico y centralizado de la ciudadanía, reduciendo el espacio para la participación democrática y la supervisión. Las preocupaciones sobre el uso... more
False Light: The Rise of Spiritual Operators as Vectors of State Control
In the contemporary era shaped by rapid advancements in internet technologies, the intersection of surveillance and new media has experienced profound transformations in both professional and academic domains. This shift necessitates a... more
Counterintelligence (CI) stands at the critical intersection of national security, intelligence operations, and policy formulation. This paper explores the complex relationship between CI policy frameworks and field-level operational... more
This article examines the legal implications of using both personal and non-personal data in the training of artificial intelligence (AI) systems, focusing in particular on the role of international law and its interaction with domestic... more
Belli bir zaman diliminde toplumun ana unsuru olan fertlerin yaşam tarzlarında, ilişkilerinde, oluşturmuş oldukları kurumlarda, son tahlilde bir bütün olarak sosyal yapıda meydana gelen farklılaşmayı tanımlayan toplumsal değişme, bütün... more
Editors’ acknowledgments: Having finally reached our Ithaca, an honorary volume comprising a plethora of remarkable contributions, we wish to acknowledge everyone who made this journey enjoyable and worthwhile. First and foremost, we... more
Yer küremiz resmi kayıtlara göre yaklaşık 3 yıldan fazla süren bir pandemi süreci yaşadı. Dünya Sağlık Örgütü (DSÖ)’nün verilerine göre 704.753.890 insan Covid-19 virüsüne yakalandı ve bunların 7.010.681’i virüsten veya virüsün neden... more
by Ady Ad
Facial recognition technology has emerged as a vital innovation in the field of biometric identity verification, offering benefits such as enhanced security and user convenience. This paper explores its various applications, including... more
This Article examines Congress's ability to consult its lawyers and other expert staff in conducting oversight. For decades, congressional leaders have acquiesced in the executive branch's insistence that certain intelligence information... more
Insecurity and terrorism in Nigeria have led to widespread vandalization of critical telecommunication and power infrastructure, hindering broadband penetration and compromising national surveillance systems. Road preparations for upgrade... more
The expansion of new technological improvements has generated debates about digital authoritarianism and its diffusion. However, there is negligible discussion about digital authoritarianism and its diffusion. Considering this research... more
Modernism promised us the stars. It gave us skyscrapers, universal truths, and a faith that progress and reason could save us all. Postmodernism broke that promise, laughing in the face of grand narratives and turning the sleek glass... more
Il presente volume viene pubblicato nella Collana Materiali e Studi di diritto pubblico previa positiva valutazione da parte della direzione scientifica condotta attraverso il sistema della peer review. The use of AI neural networks in... more
Diego (SSC San Diego) is to provide network-integrated robotic solutions for Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) applications, serving and partnering with industry, academia,... more
A review of Secret History: State Surveillance in New Zealand, 1900-1956, by Richard S. Hill and Steven Loveridge, arguing that it is a magisterial work providing fascinating insights into the country's hitherto largely unknown... more
Totaliterlik sadece siyasal değil aynı zamanda sosyal ve kültürel alanlarda da önemli bir kavramdır. Vatandaşlar üzerinde toptan (total) iktidar uygulamayı amaçlayan totaliter rejimler genellikle distopik eserlerde resmedilmektedir. Bu... more
In Chile and Mexico there are neighborhood surveillance policies imported from the global North—which are inserted in control dynamics decentralized from the State, eventually leading to hard and soft forms of vigilantism. However, the... more
The book takes a multidisciplinary approach to explore the role national security intelligence agencies played in supporting national governments' response to COVID-19. Spanning the 'Five Eyes' intelligence countries (UK, USA, Canada,... more
Fin dalla sua presentazione, il nuovo regolamento europeo sull’intelligenza artificiale è stato oggetto di riflessioni critiche, soprattutto in ragione di un impianto complessivo giudicato da molti insufficiente a rispondere ai bisogni di... more
The 2016 Olympics should have been the perfect opportunity to herald a sea change in Rio’s urban strategy, but they have ended up driving expansion
It is responsibility of all the institutions of the European Union (hereinafter EU) as well as governments for the benefit of their citizens, to undertake the obligation to take effective measures to combat crime and its causes, with full... more
This paper presents sensor based multilevel security system. It offers three levels of security using PIR sensor, temperature sensor, password based digital lock. It is basically wireless sensor network using Arduino Mega 2560 and GSM... more
All cultures across the world engage in significant public events whether religious, traditional or competitive. Many of these celebrations, small or large, are central to their communities and cultures, bringing people together on common... more
The controversy on the border control system based on biometric information and deep learning in Incheon airport raised thorny questions on conflicts between public data utilization. This paper first lays out the detailed issues against... more
Duncan focuses on the abuse of state intelligence agencies in Southern Africa based on the need for 'national security' as an excuse to infiltrate and thwart social movements. 828 Duncan argues that such abuse maintains unjust social... more
Palestra / conferência proferida no âmbito do Projeto ERASMUS+ "Open Data City Officer – OpenDCO" (2022-1-CY01-KA220-HED-000089196), para a Universidade do Minho, Guimarães. Dia 14 de junho de 2024.
Chargé de recherche, Fondation pour la recherche stratégique COVID-19 et instruments numériques : la délicate gestion des données
The architectural field has performed a central mediating function in the process of formation of the Brazilian State through the formulation of mechanisms for control, ordering, and management of territories and populations. In the... more
Smart surveillance systems, integrating advanced video processing and sensor technologies, have emerged as indispensable tools for enhancing security, privacy, and public safety across various domains. This paper explores the application... more
This review article surveys extensively the current progresses made toward video-based human activity recognition. Three aspects for human activity recognition are addressed including core technology, human activity recognition systems,... more
Pegas is not only the name of a bicycle but also of a very dangerous investigative program in the hands of present governments. With its help, journalists, opposition politicians or simply, disturbing persons might be under permanent... more
This study examines the technical feasibility and financial soundness of the Commission legislative proposals to establish a EU Entry/Exit System (EES) and EU Registered Traveller Programme (RTP) for the external borders of the Union. It... more
This study, commissioned by the European Parliament's Policy Department for Citizens' Rights and Constitutional Affairs at the request of the LIBE Committee, appraises the revised legislative proposals ('package') on EU smart borders... more
En este artículo presentamos los avances de una investigación exploratoria sobre el empleo de nuevas tecnologías de la información y comunicación en el campo del gobierno de la (in)seguridad. Esta exploración inicial aborda el modo en que... more
Download research papers for free!