Detection and surveillance technologies: privacy-related requirements and protection schemes
by Vasilios Zorkadis
International Journal of Electronic Security and Digital Forensics (IJESDF), Vol. 1, No. 2, 2007

Abstract: Detection, identification, authentication and surveillance technologies are increasingly deployed and at the same time further researched, aiming at countering terrorism and crime, protecting people and goods, and managing working procedures and activities. Although, such technologies may also be applied to secure personal data processing, their wide use raises serious concerns. For instance, when they are used for public security reasons, they led to the creation, collection, storage, communication, interconnection and analysis of huge amounts of personal data, even globally. In this paper, after reviewing relevant developments, mentioning key enabling technologies, discussing relevant risks and mentioning social, ethical, legal and political related aspects, we focus on technological issues, namely privacy-related requirements and protection schemes and techniques, which may respond to human rights and liberties related concerns. Basic building elements of protection measures range from more conventional, such as cryptography, access control and auditing to new ones based on information hiding and privacy-preserving data mining techniques. Also, the active involvement of oversight authorities in data protection schemes may significantly increase their effectiveness.

Online publication date: Sat, 26-Jan-2008

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Electronic Security and Digital Forensics (IJESDF):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com