home
Camera Surveillance and Privacy:
Legal, Technical & Psychological Considerations
Maynard Riley - December 3, 2006
If you use these ideas, please cite the source!
Abstract
Legal Considerations
Technical Considerations
Psychological Considerations
Conclusions
References
References
  1. Associated Press Los Angeles (June 19, 2006). Los Angeles Police Uses New Surveillance Drone. Retrieved November 2, 2006 from: cbs13.com.
  2. Ball, K & Webster, F. (2003). The Intensification of Surveillance: Crime, Terrorism and Warfare in the Information Age. Sterling, VA: Pluto Press Publishers.
  3. Biegel, S. (2001). Beyond Our Control?: Confronting the Limits of Our Legal System in the Age of Cyberspace. p 93. Cambridge MA: MIT Press Publishers. p 93
  4. .
  5. Clymer, Adam (August 2, 2003). Surveillance Rules Are Needed to Save Privacy, Senators Say. The New York Times Online. Retrieved October 22, 2006 from: nytimes.com.
  6. FRVT (n.d.). Face Recognition Vendor Test. Retrieved October 12, 2006 from: www.frvt.org.
  7. Healy, G. (January 20, 2003). Beware of Total Information Awareness. The CATO Institute Online. Retrieved November 2, 2006 from: www.cato.org.
  8. Hunt, A. R. (n.d.). A Wideband Imaging Radar for Through-the-Wall Surveillance. Akela, Inc. Research paper. Retrieved November 2, 2006 from: www.akelainc.com (pdf).
  9. Levin, A. (August 6, 2006). Safety a concern as drones catch on. USA Today. Retrieved November 2, 2006 from: www.usatoday.com.
  10. Nagel, J. (September 26, 2005). Algorithms and VSLI Architectures for Low-Power-Mobile Face Verification (Doctoral Dissertation, Universite De Neuchatel). Retrieved October 9, 2006 from: rero.ch (pdf).
  11. Natsios, D (August 21, 2006). Reversing the Panopticon. Invited Talk at the 10th USENIX Security Symposium. Retrieved November 22, 2006 from: cartome.org.
  12. Princeton Instruments (2005). Commercial Web-site. Retrieved October 15, 2006 from: www.piacton.com.
  13. Radwanski, G. (October 4, 2001) Privacy Minister of Canada. Letter of Finding on video surveillance by the Royal Canadian Mounted Police in Kelowna, British Columbia. Retrieved October 12, 2006 from: www.politechbot.com.
  14. Regan, P. M. (1995). Legislating Privacy: Technology, Social Values, and Public Policy. Chapel Hill, NC: University of North Carolina Press Publishers.
  15. Riley, T. B. (August 30, 2001). New Technologies: The Changing Nature of Society and the Emergence of New Rights. The Riley Report. August 2001. Retrieved November 2, 2006 from: www.rileyis.com.
  16. Schneier, B. (October 31, 2006). Total Information Awareness Is Back. Schneier on Security WebLog. Retrieved November 23, 2006 from: www.schneier.com.
  17. Shaw, G. A. and Burke, H. K. (2003). Spectral Imaging for Remote Sensing. MIT Lincoln Laboratory Journal, Volume 14, Number 1, 2003, p16. Retrieved November 11, 2006 from: www.ll.mit.edu (pdf).
  18. Stanley, J. (March 22, 2002). Monument Surveillance. The Washington Post Online. Retrieved October 22, 2006 from: www.washingtonpost.com.
  19. University of Missouri-Kansas City School of Law. Exploring Constitutional Conflicts: The Right of Privacy (n.d.). Retrieved October 11, 2006 from: www.law.umkc.edu.
  20. Warriar L., Roberts A. and Lewis J. (2002). An analysis of Jeremy Bentham and Michel Foucault. Middlesex University. Retrieved November 23, 2006 from: www.mdx.ac.uk.
home