{"title":"Blasphemy and Outrage in a Secular State","authors":"Néstor Luis Garrido","doi":"10.4018/978-1-5225-7113-1.ch059","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch059","url":null,"abstract":"In a religious context, blasphemy is defined as a derogatory expression against God or other sacred objects or concepts and is a sin that is defined and punished in theocracies or religious normative frameworks. In secular democracies, some countries, especially those parliamentary kingdoms in Europe, have kept some restrictions to the blasphemous expression in their legal system, but sanctions are never as harsh as in Muslim countries such as Pakistan, where people face death penalty if a judge finds eviction for the crime. In secular regimes, blasphemy is no longer considered a crime or this concept is fading as a punishable fault, but in some countries where a sort of “civil religion” is promoted by the State, outrage—speaking or manifesting contrary, hideous, or disdainful opinion against national symbols or heroes—works as a functional substitute of blasphemy. In this chapter, the authors study the case of Venezuela that could be considered emblematic of a secularist use of religiously inspired notions applied to national symbols in order to justify censorship and control free speech to promote a “forced national consensus.” They discuss the historical roots of these illegitimate restrictions to freedom of speech. The authors also analyze the attempts to use the figure of the deceased president Hugo Chávez to deepen the configuration of a “patriotic religion” in order to curve political dissent and increase social control.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134136855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Airplane Health Surveillance System","authors":"N. Rachana, K. Srinivasa, S. Seema","doi":"10.4018/978-1-5225-7113-1.ch060","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch060","url":null,"abstract":"The Airplane Health Surveillance System is an information system which is designed to guide the pilot to make decision under uncertainty. The system is expected to detect the defect along with cause for the delay and airplane crashes which has high impact on society. The system is capable of detecting and diagnosing the defects which may be initiated during a flight. There by trigger a maintenance procedure to safeguard the airplane from possible odds by analyzing the effects caused by the defect detected. Airplane health surveillance system collects data in real-time from flying fleet and makes it available to ground operations. Ground system aims at incorporating new technical and functional features to provide best in class features for operational and strategic insight. In this work two actors are considered namely supplier (airplane manufacturer who delivers the services) and operator (operates the airplane in day to day life). This is a user friendly though has a very powerful impact on the aerospace division by eliminating the uncertain economic loss.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129248478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Who Is Tracking You?","authors":"Estee Beck","doi":"10.4018/978-1-5225-7113-1.ch015","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch015","url":null,"abstract":"Exchanging information online often involves a degree of assessing the credibility and reliability of websites, which include the authors, sources, and content. This chapter argues for an additional assessment category: evaluating privacy and/or data use statements of websites because of the underlying ideologies, methods of tracking technologies used to collect data, and the need for comprehension of what website terms and conditions mean for the average person. This chapter provides a rhetorical framework as suggested guidelines to follow when evaluating privacy and/or data use statements of websites.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121492297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy Concerns and Customers' Information-Sharing Intentions","authors":"M. Grosso, S. Castaldo","doi":"10.4018/978-1-5225-7113-1.ch005","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch005","url":null,"abstract":"Today companies are more and more interested in collecting personal information from customers in order to deliver goods and services effectively and to improve their Marketing database and CRM efficacy. However, the ease with which data can be acquired and disseminated, also thanks to the digital technologies, has led to many potential customers demonstrating growing concerns and ethical issues about disclosing personal information. On this topic it is difficult to make too many generalizations, since the cultural differences and the different country regulations seem to weigh significantly.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132863736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Intelligent Human Behavior Detection for Video Surveillance","authors":"S. Nigam, Rajiv Singh, A. Misra","doi":"10.4018/978-1-5225-5628-2.CH003","DOIUrl":"https://doi.org/10.4018/978-1-5225-5628-2.CH003","url":null,"abstract":"Computer vision techniques are capable of detecting human behavior from video sequences. Several state-of-the-art techniques have been proposed for human behavior detection and analysis. However, a collective framework is always required for intelligent human behavior analysis. Therefore, in this chapter, the authors provide a comprehensive understanding towards human behavior detection approaches. The framework of this chapter is based on human detection, human tracking, and human activity recognition, as these are the basic steps of human behavior detection process. The authors provide a detailed discussion over the human behavior detection framework and discuss the feature-descriptor-based approach. Furthermore, they have provided qualitative and quantitative analysis for the detection framework and demonstrate the results for human detection, human tracking, and human activity recognition.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134562655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The New Jersey YouTube Experience Survey","authors":"M. Crick","doi":"10.4018/978-1-5225-7113-1.CH099","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.CH099","url":null,"abstract":"YouTube has changed dramatically since 2005, both in look and platform functionality. There have also been many culturally and internationally relevant events that probably would have not received as much attention from the popular press without YouTube's video sharing and distribution power. This chapter presents current and original research on YouTubers' attitudes, behaviors, and beliefs about YouTube, using the research plan and model designed for the Bronx YouTube pilot study in 2009 described in detail in Chapter 7. New research in the areas of surveillance and learning in YouTube offers insight into how research participants (university students in New Jersey) use YouTube and what they think regarding its potential to help them learn. This chapter also offers observations on the research outcomes and potential future research possibilities in a growing body of scholarly work regarding online activity and the relationship between new technologies and people. As in the 2009 Bronx study, this chapter argues that, while YouTubers are aware of YouTube and Google surveillance strategies and are not necessarily in control of those strategies, they are unconcerned about surveillance unless money or email information might be unprotected. More work along the lines of focus groups and randomized experimental studies will provide better evidence from which generalized conclusions can be drawn regarding people and technology in the YouTube digital sphere. The New Jersey YouTube Experience research study focused on how YouTuber's learn and acquire all types of knowledge. The descriptive results indicate that, as suggested in the earlier Bronx study, YouTubers' obtain information from a variety of sources including professional academics, lay people, corporate interests and random commenters. YouTubers' learn at every level and people of all types are participating in transmitting knowledge. Generally, this happens with little immediate financial benefit although for-profit driven education and learning in YouTube is becoming more prevalent. While the knowledge creation in YouTube isn't all accurate, or even relevant, and sometimes comes with strong bias and personal agendas, this is also true in traditional education although many of us would like to think otherwise.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116299524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building a Surveillance Framework for Currency Crises in Indonesia","authors":"D. Wiranatakusuma, Ricky Dwi Apriyono","doi":"10.4018/978-1-5225-7113-1.CH038","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.CH038","url":null,"abstract":"There seems to be no single country that can escape from currency crises. This paper aims to answer: (i) How to determine exchange market pressure (EMP)? and (ii) To what extent the contribution of selected indicators to the prediction of currency crises?. The study adopts indicators developed by Kaminski, et.al (1999) by using signal extraction method as the early warning system (EWS) mechanism. By employing four selected variables, International reserve, real exchange rates, credit growth, and domestic inflation, the findings suggest the periods of crises fluctuated over the observations under various thresholds. The EMP touched the Kaminsky's line only during the Asian and global financial crises. Meanwhile, the Garcia's, Park's and Lestano's line was passed through frequently over the observations, and it implies that the financial system was cyclically under shocks. In conclusion, the currency crises frequently appear attacking Indonesia's financial system so that need to be mitigated by net open position (NOP) as macroprudential instrument.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114439129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy in the Internet of Things","authors":"J. Kanniappan, Babu Rajendiran","doi":"10.4018/978-1-5225-2104-4.CH005","DOIUrl":"https://doi.org/10.4018/978-1-5225-2104-4.CH005","url":null,"abstract":"Internet of Things technology is rapidly gaining popularity, not only in industrial and commercial environments, but also in personal life by means of smart devices at home. The Internet of Things (IoT) spawn new businesses and make buildings, cities and transport smarter. The IoT allows for ubiquitous data collection or tracking, but these useful features are also examples of privacy threats that are already limiting the success of the IoT vision when not implemented correctly. Privacy should be protected in the device, in storage, during communication, and at processing. The privacy of users and their data protection have been identified as one of the important challenges that need to be addressed in the IoT. The chapter presents the IoT technology, the various applications, and privacy issues. Various other issues such as security and performance are also addressed.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132884402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy Aware Access Control","authors":"R. Bhatia, Manpreet Singh Gujral","doi":"10.4018/978-1-5225-7113-1.ch100","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch100","url":null,"abstract":"Due to the ever increasing number of web services available through the Internet, the privacy as a fundamental human right is endangered. Informed consent and collection of information are two important aspects while interacting on the Internet through web services. The ease of data access and the ready availability of it through Internet, made it easier for interested parties to intrude into the individual's privacy in unprecedented ways. The regulatory and technical solutions adopted to curb this have achieved only a limited success. The main culprits in this regard are the incompatibilities in the regulatory measures and standards. This research work focuses on privacy preserving access control for sharing sensitive information in the arena of web services, provides some recent outlooks towards the critical need of privacy aware access control technologies and a comprehensive review of the existing work in this arena. Besides, a novel framework for privacy aware access to web services is also provided.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125022325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Offensive Information Warfare Revisited","authors":"Eli Rohn, C. White, G. Leshem","doi":"10.4018/978-1-5225-7113-1.ch072","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch072","url":null,"abstract":"Socio-technical forecasts that materialized are of particular interest, as they are based on basic principles that must hold true for a long time, and thus worthy of special attention. The exploitation of the Internet as a vehicle for psychological and physical battle has been anticipated ever since the Internet became a world-wide phenomenon. Its potential for abuse by terrorist groups motivated Valeri & Knights to compile a list of key predictions, without the benefit of the hindsight afforded by the post-millennial terrorist attacks on the USA & Europe, and before social media was conceived. This paper evaluates some of their predictions in light of the massive social media and network attacks that occurred in Israel and Syria. Additionally, the paper examines how attacked governments and nations respond. The authors find that some of the key predictions advanced by Valeri and Knights have proven accurate. Offensive information warfare attacks have and will continue to influence policies, budgets and civic voluntary participation to counter such attacks.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127646302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}