IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 9    
Website: http://www.ijser.org
scirp IJSER >> Volume 3,Issue 9,September 2012
Ubiquitous Computing: The Technology for Boundless Surveillance
Full Text(PDF, )  PP.19‐26  
Author(s)
Edem Williams and Bassey Eyo 
KEYWORDS
Ubiquitous computing, technology, surveillance, mainstream,
ABSTRACT
Mainstream and advanced surveillance technologies are limited in terms of their reach in monitoring and tracking people and objects despite the dearth of spatial boundaries. This limitation could possibly be eliminated with the advent of ubiquitous computing. The application of ubiquitous computing in surveillance is such as could take advantage of spatial boundlessness to effect a real time boundless surveillance. This paper suggests that the reach of ubiquitous computing in surveillance cannot be hindered except humans step in to define its delimiters of operation.
References
[1] Abowd, G. and Mydnatt, E. Charting past, present and future research in Ubiquitous Computing. ACM Transactions on Computer-Human Interaction 7 (1), 2000 pp. 29-58

[2] Aarons, J., and Basu, S. Ionospheric Amplitude and Phase Fluctuations at the GPS Frequencies. Proceedings of ION GPS v2, 1994. pp 1569-1578

[3] Bell, G. and Dourish, P. Yesterday’s Tomorrows: Notes on Ubiquitous Computing Dominant Vision. Personal Ubiquitous Computing 2 (2) p141 2007. Available from: http://portal.acm.org/citation.cfm?id=1229069 [accessed 16 November 2010]

[4] Benneth, C. and Crowe, L. Location-based Services and Surveillance of Mobility: An Analysis of Privacy Risk in Canada. A Report to the office of the Privacy Commissioner of Canada. 2005. Available from: http://web.uvic.ca/polisci/bennett/pdf/lbsfinal.pdf [accessed 11 November 2010]

[5] Beresford, A. Locational Privacy in Ubiquitous Computing. Technical Report No. 612, University of Cambridge Computer Laboratory. UCAM-CL-TR-612 ISSN 1476-2986 2005

[6] Cerruti, A. Kintner, P., Gary D., Manmucci, A, Meyer, R., Doherty H., and Coster, A. Effect of intense December 2006 Solar Radio Bursts on GPS Receivers. Space Weather. 2007. doi: 10.1029/2007SW000375

[7] Dodge, M., Batty, M., and Kitchin, R. No Longer Lost in the Crowd: Prospects of Continuous Geosurveillance. Association of American Geographers Conference 2004. Available from: http://www.casa.ucl.ac.uk/martin/aag_geosurveillance.pdf [accessed 16 November 2010]

[8] Garfinkel, S. and Rosenberg, B. (eds). RFID: Application, Security and Privacy. New Jersey, Pearson Educational Inc. 2005 pp 3-36

[9] Greenfield, A. Everyware: The Dawning Age of Ubiquitous Computing. Berkerley, CA New Riders. 2006

[10] Home Search Habit of Ants uncovered. Available from: http://news.bbc.co.uk/1/hi/ england/bristol/8011998.stm [accessed 16 November 2010]

[11] Inlays from SMARTRAC. 2006. Available from: http://www.contactlessnews.com/2006/11/30/contactless-inlays-from-smartrac-ordered-forus-epassport-project. [accessed November 03 2010]

[12] Langheinrich, M. Privacy Invasions in Ubiquitous Computing. 2002. Available from: http://www.vs.inf.ethz.ch/publ/papers/langhein2002-ucpws.pdf [accessed November 03 2010]

[13] Ledvina, B., Makela, J. and Kintner, P. First observations of intensed GPS L1 Amplitude Scintillations at Mid Latitude. Geophy.Res.Lett., 29 (14), 1659, Doi:10.1029/2002GL01, 2002.

[14] Monmonier, M. Spying with Maps: Surveillance Technologies and the Future. Chicago, The University of Chicago Press. 2002

[15] National Probation Service Bulletin. Electronic Monitoring 6. 2006. Available from: http://www.homeoffice.gov.uk/output/Page137.asp#Current%20Programmes

[16] Peterson, A. Understanding Surveillance Technologies: Spy Devices, Privacy, History and Applications. (2nd ed) Boca Raton, Taylor and Francis. 2007 p337

[17] Prince, P. United States sets date for E-passports. 2006. Available from: http://rfidjournal.com/article/articleview/1951/1/132 [accessed 16 November 2010]

[18] Pro Tech. Available from: http://www.ptm.com [accessed 03 November 2010]

[19] Sinha, V.. Commanders and Soldiers’ GPS Receivers. 2003. Available from: http://www.gcn.com/print/22 20/22893-1.html

[20] Soft trail by AEI Technology. Softrail. 2008. Available from: http://www.aeitag.com/aeirfid.html [accessed 03 November 2010] [21] Solutions into Motion. Available from: http://www.trackem.com [accessed 03 November 2010]

[22] Uteck, A. Ubiquitous Computing and Spatial Privacy. In: Ian Kerr, Valerie Steeves, Carole Lucock (eds). Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society. 2009 pp 83-101. Available from: http://www.idtrail.org/files/ID Trail Book/9780195372472.kerr_05.pdf [accessed 17 November 2010]

[23] Weiser, M. The Computer for the 21st Century. Scientific American 265 (3). 1991 p1. Available from:http://www.ubiq.com/hypertext/weiser/SciAmDraft3.html [accessed 30 October 2010]

[24] Weiser, M. “Hot Topics: Ubiquitous Computing" IEEE Computer.1993 p1. Available from:http://www.ubiq.com/hypertext/weiser/UbiCompHotTopics.html. [accessed 03 November 2009]

[25] Welch, G. and Foxlin, E. Motion Tracking: No Silver Bullet, but a respectable Arsenal. IEEE Computer Graphics and Applications 22 (6) 2002. Available from: http://ieeexplore.ieee.org/iel5/38/22427/01046626.pdf [accessed 03 November 2010]

[26] Window Films. 3M Automotive Films. Available from: http://solutions.3m.com/wps /portal/3M/enUS/WF/3MWindowFilms/products/productCatalog/?PC [accessed 16 November 2010]

[27] Windshield. I-Pass Mounting for vehicles with special Windshield features. Available from: http://www.illinoistollway.com/pls/portal/docs/PAGE/TW CONTENT REPOSITOR Y/TW CR IPASS/LPT.SPECIALWINDSHIELD.pdf [accessed 16 November 2010]

[28] Wireless Technologies and Blutooth. Intel Technology Journal 4 n.2 2002. Available from: http://intel.com/technology/itj/archive/2000.htm [accessed November 14 2010]

[29] World Airline News. BAA and Emirates test new baggage tagging Technology. 2008. Available from: http://jetvine.blogspot.com/2008/02/baa-and-emirates-test-new-baggage.html [accessed 17 November 2010]

Untitled Page