Surveillance Threating Privacy and Data Protection: A Review

Main Article Content

Sheshadri Chatterjee
Abstract viewed - 346 times.  PDF downloaded - 171 times.


To combat crime and terrorism there is necessity of surveillance. The word “surveillance” originates from French verb, “Surveillar”, which means “To watch over”. Modern surveillance technologies named as Smart Surveillance are being deployed almost everywhere and it is sadly observed that surveillance used for various purposes is also posing threat to privacy and data protection. To combat crime and terrorism, use of smart surveillance should not be so applied that it becomes cause to dishonor privacy and personal data protection. This paper has taken a sincere attempt to review different surveillance techniques and related privacy challenges affecting the society.


Download data is not yet available.

Article Details

How to Cite
CHATTERJEE, Sheshadri. Surveillance Threating Privacy and Data Protection: A Review. International Journal of Current Trends in Science and Technology, [S.l.], v. 8, n. 03, p. 20583-20590, mar. 2018. ISSN 0976-9730. Available at: <>. Date accessed: 14 dec. 2018. doi:
Engineering and Technology


1. Clarke, R. (1998). Information Technology and Dataveillance. Communications of ACM, 31(5), 498-512.
2. Festinger, Leon. (1957). A Theory of Cognitive Dissonance. Stanford University Press, Stanford, CA.
3. Monahan, T. (2006). Surveillance and Security, Technology Politics and Power in Everyday life. Routledge, New York. 37-56.
4. Merram – Webster Online Dictionary. Available at dictionary/surveillance.
5. Jenness, V., Smith, D.A., and Stepan – Norris. (2007). Taking A Look at Surveillance Studies. Contemporary Sociology, A Journal of Reviews, 36 (2), 7-8.
6. Foucault, M. (1955). Discipline and Punish: The Birth of the Prison. Vintage Books, New York. 195.
7. Giddens, A. (1981). Surveillance and the Capitalist State, A Contemporary Critique of Historical Materialism, Macmillan, London, 169-176.
8. Logan, J.R. (2002). The New Chinese City; Globalization and Market Reform. Oxford Blackwell Publisher.
9. Lin, G.S.C., and Wei, Y.H.D. (2002). China’s restless urban Landscapes I: New Challenges for Theoretical Reconstruction, Environment and Planning, 34 (9), 1535-1544.
10. Lin, G.S.C. (2004). The Chinese Globalizing Cities: National Centers of Globalization and Urban Transformation, Progress in Planning, 61, 143-157.
11. Ma, L.J.C. (2002). Urban Transformation in China, 1949-2000: A Review and Research Agenda, Environment and Planning, 33, 1549-1569.
12. Pannel, C.W. (2002). China’s Continuing Urban Transition, Environment and planning. 34(9), 1571-1590.
13. Wu, F. (2001). China’s Recent Urban Development in the Process of Land and Housing Marketization and Economic Globalization, Habitat International, 25, 2073-2089.
14. Wu, F. (2003). The (post) Socialist Entrepreneurial City as a State Project: Shanghai Region globalization in Question, Urban Studies, 40(9), 1673-1698.
15. Wu, F. (2004). Transplanting Cityscapes: The Use of Imagined Globalization in Housing Commodification in Beijing Area, Vol. 36(3), 227-234.
16. Gutwirth, S. (2002). Privacy and Information Age, Rowman and Little Field, Lanham, M.D.
17. Taken from /edps /Home/ Consultation/ Opinions/ OC.2009.
18. Lyon, D. (2007). Surveillance Studies: An Overview, Polity Press, Cambridge, p.39.
19. Select Committee on the Constitution Surveillance (2009). Citizens and the State. 1,1-130.Takenfrom
20. The Madrid Privacy Declaration: Global Privacy Standards for a Global World. Available at:
21. David W., Michael F., Serge G., Marc L., Emilio M. Rocco B., Paul H., Kush W., Didier B. (2010). Sorting out Smart Surveillance, Computer Law and Security Review, 26(4), 1-24.
22. Athow, D. (2009). Personal Privacy Threatened by Snooping video, TV, games, while RFID tags facilitate real-world Councils, It Pro Portal, 10 August 2009.
23. Gill, Martin, and Angela Spriggs. (2005). Assessing the impact of CCTV, Home Office Research and Development and Statistics Directorate, 120-121.
24. Hampapur, A.L, Brown, J., Connell, A., Ekin, N., Hass, M. Lu, H., Merkl and Pankanti, S. (2005). Smart Video Surveillance, IEEE Signal Processing Magazine, 38-51.
25. Phillips, P.J., Sarkar, S., Robledo, I., Grother, P., and Bowyer, K.W. (2002). Baseline Algorithm and Performance for Gait Based Human ID Challenge Problem, Proceedings on International Conference on Pattern Recognition, 1, 385-388.
26. Kerr, I., Binnie, M., and Aoki, C. (2008). Tessling on My Brain: The Future of Lie Detection and Brain Privacy in Criminal Justice System, Canadian Journal of Criminology and Criminal Justice, 50 (3), 367-387.
27. Gasson, M.B., Hutt, I., Goodhew, P., Keyberd, and Warwick, K. (2004). Invasive neural prosthesis for neural signal detection and nerve stimulation, International Journal of Adoptive Control and Signal Processing, 19(5), 365-375.
28. Mc Cullagh, D., and Brache, A. (2006). FBI tops cell phone mic as eavesdropping tool, C Net News.
29. Saenz, A. (2009). Smart Toilets: Doctors in Your Bathroom. Available at
30. Americans’ privacy put at risk again (2009). Editorial, St. Petersburg Times, 3, October 2009.
31. Bartaman Patrika, 11, April 2015. Available home page
32. Available at EC.COM (2004), 590 final, op.cit.
33. A Secure Europe in a better world – The European Security Strategy (2003). European Council (EC), 12, December 2003.
34. Research for Secure Europe. (2004). Official publication of the European Communities, Luxembourg, 2004.
35. Ananda Bazar Patrika, 4, April 2015. Available home page
36. Cooke, R., Scruggs, K. (2006). Smart Surveillance – Effective Information for Public Safety, 30th Law Enforcement Information Management Conference Paper, 5-9 June 2006 at Graperine.
37. European Court of Human Rights (2008). Case of Liberty and Others Versus United Kingdom vide Application Nos. 30562/04 and 30566/04, 4, December 2008.
38. European Court of Human Rights (2008). Case of S. and Marper Versus United Kingdom vide Application No. 58243 of 2000, 1, July 2008.
39. Travis, A. (2009). Police routinely arresting people to get DNA inquiry claims, The Guardian, 24, November 2009.
40. Taken from
41. A privacy standard governing international data transfers. (2009). 31st Annual Conference on Privacy and Data Protection Commissioners, Resolution at Madrid in November 2009.
42. Clarke, R. (2009). Privacy Impact Assessment: Its origins and development, Computer Law and Security Review, 25(2), 123-135.
43. Introna Lucas, D., and Davis Wood. (2004). Picturing Algorithm Surveillance: The Politics of Facial Recognition Systems, Surveillance and Society, 2 (2/3),177-198.
44. Taken from uploads/ 2016 /03/ Sorting Outsmart Surveillance.pdf
45. Protection of individuals about the processing of personal data by community institutions and bodies and the free movement of such data, Regulation [EC], No. 45/2001, 18, December 2000.
46. De Hert, P., and Gutwirth, S. (2006). Privacy, data protection and law enforcement. Opacity of the individual and transparency of power, Privacy and Criminal law, Intersentia, Antwerp.