In spite of the growing omnipresence of surveillance cameras, not much is known by the general public about their background. While many disciplines have scrutinised the techniques and effects of surveillance, the object itself remains somewhat of a mystery. A design typology of surveillance cameras will be proposed: a) real, functional, visible cameras, b) the non-functional, ‘dummy’, simulated cameras, and c) hidden but functioning, covert cameras. In a brief overview of their uses, several techniques of control are distinguished
Closed Circuit Tele-Vision surveillance systems are frequently the subject of debate. Some parties s...
This paper explores using wearable computing devices to perform \sousveillance " (inverse surve...
It is a pertinent time to reflect upon the use of CCTV. As some areas withdraw funding from their CC...
At present, we are increasingly both the object of surveillance and the observers of images gathered...
Public video surveillance tends to be discussed in either utopian or dystopian terms: proponents mai...
Ex. 1: A UK enterprise offers the possibility to “stream” on-line the images randomly captured by CC...
The increased security risk in society and the availability of low cost sensors and processors has e...
Surveillance is conventionally perceived as a key component of the crime control apparatus. This edi...
Abstract. One of the main characteristics of a video surveillance system is its reliability. To this...
Why do certain security goods become banal (while others do not)? Under what conditions does banalit...
Over the last few a long time, brilliant infrastructure growths were noticed in safety-related troub...
Recent proliferation of surveillance systems is mostly attributed to advances in both image-processi...
The problem of automated visual surveillance has spawned a lively research area, with 2005 seeing th...
Automated security monitoring systems are the wave of the future. These systems provide people a mea...
In the lines of Albrechtlund and Dubbled (2005) and their call for a new direction in Surveillance S...
Closed Circuit Tele-Vision surveillance systems are frequently the subject of debate. Some parties s...
This paper explores using wearable computing devices to perform \sousveillance " (inverse surve...
It is a pertinent time to reflect upon the use of CCTV. As some areas withdraw funding from their CC...
At present, we are increasingly both the object of surveillance and the observers of images gathered...
Public video surveillance tends to be discussed in either utopian or dystopian terms: proponents mai...
Ex. 1: A UK enterprise offers the possibility to “stream” on-line the images randomly captured by CC...
The increased security risk in society and the availability of low cost sensors and processors has e...
Surveillance is conventionally perceived as a key component of the crime control apparatus. This edi...
Abstract. One of the main characteristics of a video surveillance system is its reliability. To this...
Why do certain security goods become banal (while others do not)? Under what conditions does banalit...
Over the last few a long time, brilliant infrastructure growths were noticed in safety-related troub...
Recent proliferation of surveillance systems is mostly attributed to advances in both image-processi...
The problem of automated visual surveillance has spawned a lively research area, with 2005 seeing th...
Automated security monitoring systems are the wave of the future. These systems provide people a mea...
In the lines of Albrechtlund and Dubbled (2005) and their call for a new direction in Surveillance S...
Closed Circuit Tele-Vision surveillance systems are frequently the subject of debate. Some parties s...
This paper explores using wearable computing devices to perform \sousveillance " (inverse surve...
It is a pertinent time to reflect upon the use of CCTV. As some areas withdraw funding from their CC...