Datenschutz und Datensicherheit - DuD

, Volume 37, Issue 7, pp 434–439 | Cite as

Crowdsourcing and cloudsourcing CCTV surveillance

  • Burkhard Schafer
Schwerpunkt
  • 426 Downloads

Abstract

While the continuing proliferation of CCTV surveillance is a cause for concern, its impact on privacy has in the past been mitigated by certain natural limitations on the way CCTV systems operate in practice. In particular, the increased quantity of surveillance data has not been matched by a similar increase in our ability to process and evaluate it. This paper compares different models of technology enabled analysis of CCTV footage, with a focus on the emerging trend of crowdsourced CCTV analysis: in the world of crowdsourced surveillance, “Big Brother is us”.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  1. Clarke, M. (1994), “Blind eye on the street?”, Police Review, August, pp.29–39.Google Scholar
  2. Cohen, L., Felson, M. (1979), “Social change and crime rate trends: a routine activities approach”, American Sociological Review, Vol. 44 pp.588–608CrossRefGoogle Scholar
  3. Davies, A. C., & Velastin, S. A. (2005). A progress review of intelligent CCTV surveillance systems. Proc. IEEE IDAACS, 417–423; for a legal analysis see also Gerrit Hornung und Monika Desoi, „Smart Cameras“ und automatische Verhaltensanalyse, Kommunikation und Recht, 153–158, März 2011.Google Scholar
  4. Davies, G., Thasen, S. (2000), “Closed circuit television: how effective an identification air?”, British Journal of Psychology, Vol. 91 pp.411–426CrossRefGoogle Scholar
  5. Davis, L. (2001), Real Time Computer Surveillance for Crime Detection, National Institute of Justice, Washington, DCGoogle Scholar
  6. Fyfe, N. (1996), “City watching: closed circuit television surveillance in public spaces”, Area, Vol. 28 No.1, pp.37–46.Google Scholar
  7. Gill, M. L., & Mawby, R. I. (1990). A Special Constable: a study of the police reserve. Aldershot: AveburyGoogle Scholar
  8. Groombridge, N., Murji, K. (1994), “As easy as AB and CCTV”, Policing, Vol. 10 No.4, pp.283–290Google Scholar
  9. Guth, D J. (1994). “The Traditional Common Law Constable, 1235–1829: From Bracton to the Fieldings to Canada”. In Macleod, R.C.; Schneiderman, David. Police Powers in Canada: The Evolution and Practice of Authority. Toronto: University of Toronto PressGoogle Scholar
  10. Ickler, H. (2012). Wertschöpfung durch webbasierte kollektive Intelligenz. BoD-Books on Demand.Google Scholar
  11. Kai H. and Juho H. (2012) Defining gamification: a service marketing perspective. In Proceeding of the 16th International Academic MindTrek Conference (MindTrek’ 12). ACM, New York, NY, USAGoogle Scholar
  12. Kanefsky, Bob, Barlow, N. and Gulick, V. (2001) “Can distributed volunteers accomplish massive data analysis tasks.” Lunar and Planetary Science 1Google Scholar
  13. Kelley, P. G. (2010). Conducting usable privacy & security studies with amazon’s mechanical turk. In Symposium on Usable Privacy and Security (SOUPS)(Redmond, WA.Google Scholar
  14. Korshunov, P., Cai, S., & Ebrahimi, T. (2012) Crowdsourcing approach for evaluation of privacy filters in video surveillance. In Proceedings of the ACM multimedia 2012 workshop on Crowdsourcing for multimedia (pp. 35–40). ACM.CrossRefGoogle Scholar
  15. Legrand, P. “European legal systems are not converging.” International and Comparative Law Quarterly 45.01 (1996): 52–81CrossRefGoogle Scholar
  16. Monahan, T, and Mokos, JT, (2013). “Crowdsourcing urban surveillance: The development of homeland security markets for environmental sensor networks.” GeoforumGoogle Scholar
  17. Norris, C., Armstrong, G. (1999), The Maximum Surveillance Society: The Rise of CCTV, Berg, Oxford, p. 210–211Google Scholar
  18. Tinnefeld, M-T./ Rauhofer, J. ‚Whistleblower: Verantwortliche Mitarbeiter oder Denunzianten? Fragen im Feld von Ethikrichtlinien, des Datenschutzes und der Mitbestimmung“ (2008) Datenschutz und Datensicherheit Vol. 32, No. 11, pp. 717–723CrossRefGoogle Scholar
  19. Rawlings, P: Policing before the Police. In T. Newborn, Handbook of Policing, Wilan Publishing, Cullompton, (2009) p. 47–72Google Scholar
  20. Schafer, B. ‚Schlafwandelnd in den überwachungsstaat? ‘(2009) Datenschutz und Datensicherheit Vol. 8 pp 483–489Google Scholar
  21. Schafer, B. ‘All changed, changed utterly? Privacy protection in post-Labour Britain’ (2011) Datenschutz und Datensicherheit Vol 35 pp.634–638Google Scholar
  22. South, N. (1987), “The security and surveillance of the environment”, in Lowman, J., Menzies, R., Pays, T. (Eds), Transcarceration: Essays in the Sociology of Social Control, Gower, Aldershot, pp.129–52.Google Scholar
  23. Surette, R. (1985), “Video street patrol: media technology and street crime”, Journal of Police Science and Administration, Vol. 13 pp.78–85Google Scholar
  24. Surette, R. (2005) “The thinking eye: Pros and cons of second generation CCTV surveillance systems”, Policing: An International Journal of Police Strategies & Management, Vol. 28 Iss: 1, pp.152–173CrossRefGoogle Scholar
  25. Velastin, J. H. Yin, A. C. Davies, M. A. Vicencio-Silva, R. E. Allsop A. Penn, “Automated measurement of crowd density and motion using image processing,” 7th Int. Conf. on Road Traffic Monitoring and Control, London, 1994, pp. 127–132Google Scholar

Copyright information

© Springer Fachmedien Wiesbaden 2013

Authors and Affiliations

  • Burkhard Schafer

There are no affiliations available

Personalised recommendations