Video Surveillance

Author:

Rajpoot Qasim Mahmood1,Jensen Christian Damsgaard1

Affiliation:

1. Technical University of Denmark, Denmark

Abstract

Pervasive usage of video surveillance is rapidly increasing in developed countries. Continuous security threats to public safety demand use of such systems. Contemporary video surveillance systems offer advanced functionalities which threaten the privacy of those recorded in the video. There is a need to balance the usage of video surveillance against its negative impact on privacy. This chapter aims to highlight the privacy issues in video surveillance and provides a model to help identify the privacy requirements in a video surveillance system. The authors make a step in the direction of investigating the existing legal infrastructure for ensuring privacy in video surveillance and suggest guidelines in order to help those who want to deploy video surveillance while least compromising the privacy of people and complying with legal infrastructure.

Publisher

IGI Global

Reference63 articles.

1. Online social networking as participatory surveillance

2. American Management Association. (2007). Electronic Monitoring & Surveillance Survey. Retrieved from http://www.plattgroupllc.com/jun08/2007ElectronicMonitoringSurveillanceSurvey.pdf

3. Global trends in privacy protection: An international survey of privacy, data protection, and surveillance laws and developments.;D.Banisar;Journal of Computer & Information Law,1999

4. Beech, T., Dyer, K., Franklin, S., Messinger, I., Onek, J., & Sloan, V. (2006). Guidelines for public video surveillance: A guide to protecting communities and preserving civil liberties. Retrieved from http://www.constitutionproject.org/pdf/video_Surveillance_Guidelines_Report_w_Model_Legislation4.pdf

5. Beesley, C. (2012). Email, Phone and Social Media Monitoring in the Workplace – Know Your Rights as an Employer. The US Small Business Administration. Retrieved from https://www.sba.gov/blogs/email-phone-and-social-media-monitoring-workplace-know-your-rights-employer

Cited by 12 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. AI Forensics;2023 IEEE International Conference on Assured Autonomy (ICAA);2023-06

2. Coding Unit-Based Region of Interest Encryption in HEVC/H.265 Video;IEEE Access;2023

3. Object Detection Through Computer Vision;Advances in Intelligent Systems and Computing;2022-08-28

4. Controlled Intentional Degradation in Analytical Video Systems;Proceedings of the 2022 International Conference on Management of Data;2022-06-10

5. Evaluation of FMCW Radar for Potential Use in SSM;Advances in Service and Industrial Robotics;2022

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3