Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

From CCTV to Biometrics through Mobile Surveillance

From CCTV to Biometrics through Mobile Surveillance
View Sample PDF
Author(s): Jason Gallo (Northwestern University, USA)
Copyright: 2009
Pages: 7
Source title: Mobile Computing: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): David Taniar (Monash University, Australia)
DOI: 10.4018/978-1-60566-054-7.ch090


View From CCTV to Biometrics through Mobile Surveillance on the publisher's website for pricing and purchasing information.


Surveillance is the act or process of observing, tracking, or recording personal details for the purpose of exercising control over the individual or population being watched. Control in this context can mean many things, from directly influencing the behavior of the observed to the use of gathered information for the purpose of management or governance. Mobile surveillance can be defined as two distinct, yet related, practices. The first is the ability to observe the physical movement of an individual through space. This is most often accomplished through documenting their interaction with a surveillance network. The object of surveillance is tracked from one node of the network to another, providing a record of behavior. The second practice is often referred to as dataveillance, or the ability to monitor an individual’s behavior through studying a trail of personally identifiable data, including credit card purchases, mobile phone calls, and health records. Mobile surveillance employs an array of technologies including video and photography cameras, visual recognition software, radio frequency identification (RFID), global positioning receivers (GPS), information and communication technologies (ICTs), and biometrics. Examples of mobile surveillance networks include the dense deployment of closed-circuit television (CCTV), video, and photographic technologies in a distinct geographic space to monitor activity, the tracking of automobiles and mobile phones via GPS, and radio frequency sensing that records motion as identity chips pass through a distributed network of receivers. As these networks proliferate, individuals are the exposed to overlapping layers of surveillance. Although many of these surveillance networks are deployed for limited purposes, the increasing ability to save and store personally identifiable information in searchable databases, and the ability to mine information from multiple sources raises privacy concerns for the individual. This is especially true in advanced capitalist societies that rely on sophisticated data gathering to track, model, and predict consumer behavior, as well as for citizen management.

Related Content

Aysu Altaş. © 2022. 23 pages.
Anusha Thakur. © 2022. 20 pages.
Yigit Yurder, Mehmet Altug Sahin. © 2022. 28 pages.
Anusha Thakur. © 2022. 26 pages.
Ali Yuce. © 2022. 22 pages.
Khouloud Mouihbi, Nedra Bahri-Ammari, Daouda Coulibaly. © 2022. 25 pages.
Anusha Thakur. © 2022. 17 pages.
Body Bottom