Academia.eduAcademia.edu

Security and Surveillance

description370 papers
group3,064 followers
lightbulbAbout this topic
Security and Surveillance is the study of methods and technologies used to monitor, protect, and ensure the safety of individuals, property, and information. It encompasses the analysis of systems, policies, and practices aimed at preventing unauthorized access, detecting threats, and responding to security incidents in various environments.
lightbulbAbout this topic
Security and Surveillance is the study of methods and technologies used to monitor, protect, and ensure the safety of individuals, property, and information. It encompasses the analysis of systems, policies, and practices aimed at preventing unauthorized access, detecting threats, and responding to security incidents in various environments.

Key research themes

1. How can Internet of Things (IoT) and AI technologies enhance automated intrusion detection and real-time alerting in security surveillance systems?

This research area investigates the integration of IoT devices, sensors, and Artificial Intelligence (AI) algorithms to build smart, cost-effective surveillance systems capable of detecting intrusions autonomously and delivering immediate notifications to users. It focuses on technological implementations employing microcontrollers, camera modules, sensor networks, and AI-driven behavior analysis to improve accuracy, reduce false alarms, and enable remote monitoring in home, public, and commercial security contexts.

Key finding: This study developed an IoT based smart surveillance system that uses a Raspberry Pi coupled with a PIR sensor and camera module to detect motion, capture intruder images, and send automatic email alerts remotely via Wi-Fi.... Read more
Key finding: This research proposed an AI-driven smart surveillance framework that incorporates video and image analysis, including tracking, object detection, classification, and behavioral analysis modules trained via AutoML. The system... Read more
Key finding: The paper introduced a surveillance system leveraging OpenCV and mobile devices for intruder identification, motion filtering, face recognition, and real-time remote notification via SMS, MMS, or email using Twilio API. The... Read more

2. What are the socio-cultural and legal challenges surrounding privacy, public acceptance, and ethical governance of surveillance technologies?

This theme explores the societal implications, legal frameworks, privacy concerns, and public perceptions that arise from the increasing deployment of ubiquitous and networked surveillance technologies. It investigates how surveillance assemblages affect civil liberties, the balance between security and privacy, and the ethical acceptability of surveillance interventions. This research addresses both the cultural narratives around surveillance and the need for regulatory and legal mechanisms to ensure proportionality, transparency, and accountability.

Key finding: This paper critically analyzes the proliferation of surveillance technologies and argues for the necessity of explicit privacy impact assessments to evaluate the proportionality and necessity of surveillance initiatives. It... Read more
Key finding: Drawing on large-scale public engagement via citizen summits, this project revealed that public acceptance of Surveillance-Orientated Security Technologies (SOSTs) varies significantly across European contexts, influenced by... Read more
Key finding: This research examines UK government electronic surveillance policies emphasizing that public acceptance depends on reconciling state interests with individual rights, positioning surveillance as serving law-abiding citizens.... Read more
Key finding: The author argues that national security surveillance in Southern Africa serves capitalist and political power consolidation agendas rather than societal needs, characterized by abuses of intelligence agencies and... Read more

3. How do cultural, political, and infrastructural contexts shape surveillance practices and governance in urban and national environments?

This theme addresses the interpretive role of surveillance technologies as cultural symbols and tools of governance, as well as the infrastructural, policy, and security challenges in implementing and managing surveillance systems in urban and national contexts. It investigates how power dynamics, local political structures, and infrastructural vulnerabilities influence surveillance deployment, from symbolic meanings of CCTV in Mexico to digital authoritarianism and infrastructure protection in diverse geopolitical settings.

Key finding: Through ethnographic analysis of CCTV use in Mexican cities and commercial centers, this study reveals that surveillance technologies operate more as symbolic instruments reinforcing cultural narratives about order and... Read more
Key finding: This paper demonstrates the infrastructural and security challenges posed by vandalism and lack of geospatial data in Nigeria’s telecom networks, proposing integrated telecommunications corridors alongside major... Read more
Key finding: The study traces the diffusion of digital authoritarianism models from China, Russia, and Turkey to Pakistan, examining surveillance, internet censorship, and dis/misinformation practices. It highlights how state-centric... Read more
Key finding: Through comparative analysis of neighborhood surveillance groups in Chile and Mexico, this research shows how localized surveillance initiatives can drift toward varying degrees of vigilantism influenced by state structures... Read more

All papers in Security and Surveillance

This article examines five common misunderstandings about case-study research: (a) theoretical knowledge is more valuable than practical knowledge; (b) one cannot generalize from a single case, therefore, the single-case study cannot... more
This article presents results from the first statistically significant study of cost escalation in transportation infrastructure projects. Based on a sample of 258 transportation infrastructure projects worth US$90 billion and... more
Back cover text: If the new fin de siècle marks a recurrence of the real, Bent Flyvbjerg’s Rationality and Power epitomizes that development and sets new standards for social and political inquiry. The Danish town of Aalborg is to... more
This article presents results from the first statistically significant study of traffic forecasts in transportation infrastructure projects. The sample used is the largest of its kind, covering 210 projects in 14 nations worth U.S.$59... more
The article first describes characteristics of major infrastructure projects. Second, it documents a much neglected topic in economics: that ex ante estimates of costs and benefits are often very different from actual ex post costs and... more
This article presents the theoretical and methodological considerations behind a research method which the author calls ‘phronetic planning research’. Such research sets out to answer four questions of power and values for specific... more
This paper focuses on problems and their causes and cures in policy and planning for large-infrastructure projects. First, it identifies as the main problem in major infrastructure developments pervasive misinformation about the costs,... more
A major source of risk in project management is inaccurate forecasts of project costs, demand, and other impacts. The paper presents a promising new approach to mitigating such risk, based on theories of decision making under uncertainty... more
Taken together, the works of Jurgen Habermas and Michel Foucault highlight an essential tension in modernity. This is the tension between the normative and the real, between what should be done and what is actually done. Understanding... more
"Over budget, over time, over and over again" appears to be an appropriate slogan for large, complex infrastructure projects. This article explains why cost, benefits, and time forecasts for such projects are systematically... more
This review article surveys extensively the current progresses made toward video-based human activity recognition. Three aspects for human activity recognition are addressed including core technology, human activity recognition systems,... more
In this paper we argue that the use of the communicative theory of Jürgen Habermas in planning theory is problematic because it hampers an understanding of how power shapes planning. We posit an alternative approach based on the power... more
This article provides an answer to what has been called the biggest problem in theorizing and understanding planning: the ambivalence about power found among planning researchers, theorists, and students. The author narrates how he came... more
The Supplementary Green Book Guidance on Optimism Bias (HM Treasury 2003) with reference to the Review of Large Public Procurement in the UK (Mott MacDonald 2002) notes that there is a demonstrated, systematic, tendency for project... more
The Aalborg Project may be interpreted as a metaphor of modern politics, modern administration and planning, and of modernity itself. The basic idea of the project was comprehensive, coherent, and innovative, and it was based on rational... more
2008. 352 pp. r150.00 (hardcover). This volume is intended to explain why major investment projects (the so-called mega-projects) often are not completed on time and cost more than originally budgeted. Drawing from experiences of European... more
Presents a miniature robotic system (“scout”) useful for reconnaissance and surveillance missions. A large number of scout robots are deployed and controlled by humans and/or larger “ranger” robots. The specially designed and constructed... more
During the past three decades sport has assumed an ever greater role within the globalisation process and in the regeneration of national, regional and local identities in the postcolonial and global age. With much of global culture... more
Risk, including economic risk, is increasingly a concern for public policy and management. The possibility of dealing effectively with risk is hampered, however, by lack of a sound empirical basis for risk assessment and management. This... more
This paper explores how theories of the planning fallacy and the outside view may be used to conduct quality control and due diligence in project management. First, a much-neglected issue in project management is identified, namely that... more
Niccolò Machiavelli, the founder of modern political and administrative thought, made clear that an understanding of politics requires distinguishing between formal politics and what later, with Ludwig von Rochau, would become known as... more
Do different types of megaprojects have different cost overruns? This apparently simple question is at the heart of research at the University of Oxford aimed at understanding the characteristics of megaprojects, particularly in terms of... more
We have designed and built a set of miniature robots, called Scouts, and have developed a distributed software system to control them. This paper addresses the fundamental choices we made in the design of the control software, describes... more
To refine wholesale accounts of transnationalism, scholars have cited the amplification of border enforcement and immigration control. Whilst received analysis emphasizes multiple processes whether border militarization, mass deportation... more
The essay reviews the digital emergency measures many governments have adopted in an attempt to curb Covid-19. It argues that those 'virologically legitimized' measures may infringe the human right to privacy and mark the transition into... more
The US national response to the 11 September 2001 terrorist attacks accelerated the adoption and refinement of a new repertoire of protest policing we call ‘strategic incapacitation’ now employed by law enforcement agencies nationwide to... more
Beijing's selection as the host city of the 2008 Summer Olympic Games was reportedly received with joy among Beijing residents. As part of the city's preparation of this mega-event, massive reinvestment in Beijing's urban space was... more
Sport mega-events were very important for Brazil in 2007. The 15th Pan American Games took place in Rio de Janeiro. It was the largest international tournament held in Brazil since the 1950 World Cup and the 1963 Pan American Games. The... more
This paper analyzes the politics of mapping along the US-Mexico border to explore how humanitarian activists wield geospatial technologies in challenging border securitization. In addition to 'bounding' societies within delimited... more
This article addresses three main issues. First, it argues that David Laitin, in a misguided critique of Bent Flyvbjerg’s book Making Social Science Matter for being a surrogate manifesto for Perestroika, misrepresents the book in the... more
Covering location problems aim to find optimal site locations for the placement of systems of facilities, e.g. cellular transmitters, surveillance sensors, military equipment, and weather radar. The aim is to maximise system coverage over... more
This article provides an account of the nuclear test series carried out at the Nevada Test Site (NTS). We examine how practices of security produce publics and make particular forms of embodiment possible. This account focuses on three... more
This article asks how planning scholarship may effectively gain impact in planning practice through media exposure. In liberal democracies, the public sphere is dominated by mass media. Therefore, working with such media is a prerequisite... more
Adaboost is a short for Adaptive Boosting. It is a boosting learning algorithm to combine many weak classifiers into a single powerful classifier. It adaptively changes the weight for weak classifiers from the misclassified data sample.... more
From ubiquitous surveillance to drone strikes that put “warheads onto foreheads,” we live in a world of globalized, individualized targeting. The perils are great. In The Eye of War, Antoine Bousquet provides both a sweeping historical... more
This paper addresses the problem of tracking moving objects of variable appearance in challenging scenes rich with features and texture. Reliable tracking is of pivotal importance in surveillance applications. It is made particularly... more
In this paper we are interested in analyzing behaviour in crowded public places at the level of holistic motion. Our aim is to learn, without user input, strong scene priors or labelled data, the scope of "normal behaviour" for a... more
There is ferment in the social sciences. After years of sustained effort to build a science of society modelled on the natural sciences, that project, long treated with suspicion by some, is now openly being rethought. A critical... more
Purpose – This study aims to explore the ethical and social issues of tattoo recognition technology (TRT) and tattoo similarity detection technology (TSDT), which are expected to be increasingly used by state and local police departments... more
Our aim is to estimate the perspective-effected geometric distortion of a scene from a video feed. In contrast to most related previous work, in this task we are constrained to using low-level, spatio-temporally local motion features... more
Dynamically changing background ("dynamic background") still presents a great challenge to many motion-based video surveillance systems. In the context of event detection, it is a major source of false alarms. There is a strong need from... more
Illumination and pose invariance are the most challenging aspects of face recognition. In this paper we describe a fully automatic face recognition system that uses video information to achieve illumination and pose robustness. In the... more
As a problem of high practical appeal but many outstanding challenges, computer-based face recognition remains a topic of extensive research attention. In this paper we are specifically interested in the task of identifying a person using... more
It is often claimed that surveillance should be proportionate, but it is rarely made clear exactly what proportionate surveillance would look like beyond an intuitive sense of an act being excessive. I argue that surveillance should... more
The purpose of the present chapter is to demonstrate how social scientists may engage with mass media to have their research impact public deliberation, policy and practice. Communicating research to practice is part and parcel of applied... more
The term ‘phronetic social science’ was coined in Making Social Science Matter (Flyvbjerg 2001). However, as pointed out in that volume and by Schram (2006), phronetic social science existed well before this particular articulation of the... more
n both the academic literature and in the media there have been concerns expressed about the level of surveillance technologies used to facilitate security and its effect upon privacy. Government policies in the USA and the UK are... more
Dan Lovallo and Daniel Kahneman must be commended for their clear identification of causes and cures to the planning fallacy in “Delusions of Success: How Optimism Undermines Executives’ Decisions” (July 2003). Their look at overoptimism,... more
Download research papers for free!