Main Article Content
To combat crime and terrorism there is necessity of surveillance. The word “surveillance” originates from French verb, “Surveillar”, which means “To watch over”. Modern surveillance technologies named as Smart Surveillance are being deployed almost everywhere and it is sadly observed that surveillance used for various purposes is also posing threat to privacy and data protection. To combat crime and terrorism, use of smart surveillance should not be so applied that it becomes cause to dishonor privacy and personal data protection. This paper has taken a sincere attempt to review different surveillance techniques and related privacy challenges affecting the society.
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
2. Festinger, Leon. (1957). A Theory of Cognitive Dissonance. Stanford University Press, Stanford, CA.
3. Monahan, T. (2006). Surveillance and Security, Technology Politics and Power in Everyday life. Routledge, New York. 37-56.
4. Merram – Webster Online Dictionary. Available at http://www.merriam-webster.com/ dictionary/surveillance.
5. Jenness, V., Smith, D.A., and Stepan – Norris. (2007). Taking A Look at Surveillance Studies. Contemporary Sociology, A Journal of Reviews, 36 (2), 7-8.
6. Foucault, M. (1955). Discipline and Punish: The Birth of the Prison. Vintage Books, New York. 195.
7. Giddens, A. (1981). Surveillance and the Capitalist State, A Contemporary Critique of Historical Materialism, Macmillan, London, 169-176.
8. Logan, J.R. (2002). The New Chinese City; Globalization and Market Reform. Oxford Blackwell Publisher.
9. Lin, G.S.C., and Wei, Y.H.D. (2002). China’s restless urban Landscapes I: New Challenges for Theoretical Reconstruction, Environment and Planning, 34 (9), 1535-1544.
10. Lin, G.S.C. (2004). The Chinese Globalizing Cities: National Centers of Globalization and Urban Transformation, Progress in Planning, 61, 143-157.
11. Ma, L.J.C. (2002). Urban Transformation in China, 1949-2000: A Review and Research Agenda, Environment and Planning, 33, 1549-1569.
12. Pannel, C.W. (2002). China’s Continuing Urban Transition, Environment and planning. 34(9), 1571-1590.
13. Wu, F. (2001). China’s Recent Urban Development in the Process of Land and Housing Marketization and Economic Globalization, Habitat International, 25, 2073-2089.
14. Wu, F. (2003). The (post) Socialist Entrepreneurial City as a State Project: Shanghai Region globalization in Question, Urban Studies, 40(9), 1673-1698.
15. Wu, F. (2004). Transplanting Cityscapes: The Use of Imagined Globalization in Housing Commodification in Beijing Area, Vol. 36(3), 227-234.
16. Gutwirth, S. (2002). Privacy and Information Age, Rowman and Little Field, Lanham, M.D.
17. Taken from
http://www.edps.europa.eu/EDPSWEB /edps /Home/ Consultation/ Opinions/ OC.2009.
18. Lyon, D. (2007). Surveillance Studies: An Overview, Polity Press, Cambridge, p.39.
19. Select Committee on the Constitution Surveillance (2009). Citizens and the State. 1,1-130.Takenfrom https://publications.parliament.uk/pa/ld200809/ldselect/ldconst/18/18.pdf
20. The Madrid Privacy Declaration: Global Privacy Standards for a Global World. Available at: http://thepublicvoice.org/madrid-declaration.
21. David W., Michael F., Serge G., Marc L., Emilio M. Rocco B., Paul H., Kush W., Didier B. (2010). Sorting out Smart Surveillance, Computer Law and Security Review, 26(4), 1-24.
22. Athow, D. (2009). Personal Privacy Threatened by Snooping video, TV, games, while RFID tags facilitate real-world Councils, It Pro Portal, 10 August 2009.
23. Gill, Martin, and Angela Spriggs. (2005). Assessing the impact of CCTV, Home Office Research and Development and Statistics Directorate, 120-121.
24. Hampapur, A.L, Brown, J., Connell, A., Ekin, N., Hass, M. Lu, H., Merkl and Pankanti, S. (2005). Smart Video Surveillance, IEEE Signal Processing Magazine, 38-51.
25. Phillips, P.J., Sarkar, S., Robledo, I., Grother, P., and Bowyer, K.W. (2002). Baseline Algorithm and Performance for Gait Based Human ID Challenge Problem, Proceedings on International Conference on Pattern Recognition, 1, 385-388.
26. Kerr, I., Binnie, M., and Aoki, C. (2008). Tessling on My Brain: The Future of Lie Detection and Brain Privacy in Criminal Justice System, Canadian Journal of Criminology and Criminal Justice, 50 (3), 367-387.
27. Gasson, M.B., Hutt, I., Goodhew, P., Keyberd, and Warwick, K. (2004). Invasive neural prosthesis for neural signal detection and nerve stimulation, International Journal of Adoptive Control and Signal Processing, 19(5), 365-375.
28. Mc Cullagh, D., and Brache, A. (2006). FBI tops cell phone mic as eavesdropping tool, C Net News.
29. Saenz, A. (2009). Smart Toilets: Doctors in Your Bathroom. Available at https://singularityhub.com/2009/05/12/smart-toilets-doctors-in-your-bathroom/
30. Americans’ privacy put at risk again (2009). Editorial, St. Petersburg Times, 3, October 2009.
31. Bartaman Patrika, 11, April 2015. Available home page http://www.bartamanpatrika.com/
32. Available at EC.COM (2004), 590 final, op.cit.
33. A Secure Europe in a better world – The European Security Strategy (2003). European Council (EC), 12, December 2003.
34. Research for Secure Europe. (2004). Official publication of the European Communities, Luxembourg, 2004.
35. Ananda Bazar Patrika, 4, April 2015. Available home page http://www.anandabazar.com/
36. Cooke, R., Scruggs, K. (2006). Smart Surveillance – Effective Information for Public Safety, 30th Law Enforcement Information Management Conference Paper, 5-9 June 2006 at Graperine.
37. European Court of Human Rights (2008). Case of Liberty and Others Versus United Kingdom vide Application Nos. 30562/04 and 30566/04, 4, December 2008.
38. European Court of Human Rights (2008). Case of S. and Marper Versus United Kingdom vide Application No. 58243 of 2000, 1, July 2008.
39. Travis, A. (2009). Police routinely arresting people to get DNA inquiry claims, The Guardian, 24, November 2009.
40. Taken from www.european-privacy-seal.eu/
41. A privacy standard governing international data transfers. (2009). 31st Annual Conference on Privacy and Data Protection Commissioners, Resolution at Madrid in November 2009.
42. Clarke, R. (2009). Privacy Impact Assessment: Its origins and development, Computer Law and Security Review, 25(2), 123-135.
43. Introna Lucas, D., and Davis Wood. (2004). Picturing Algorithm Surveillance: The Politics of Facial Recognition Systems, Surveillance and Society, 2 (2/3),177-198.
44. Taken from http://didierbigo.com/wp-content/ uploads/ 2016 /03/ Sorting Outsmart Surveillance.pdf
45. Protection of individuals about the processing of personal data by community institutions and bodies and the free movement of such data, Regulation [EC], No. 45/2001, 18, December 2000.
46. De Hert, P., and Gutwirth, S. (2006). Privacy, data protection and law enforcement. Opacity of the individual and transparency of power, Privacy and Criminal law, Intersentia, Antwerp.