Surveillance practices have benefits. The surveillance gadgets are used for security purposes, making it easier for the security personnel to determine who, at what time and how an incident happened. However, surveillance practices have raised issues related to privacy. The government may use the surveillance gadgets to spy on the users. The information recorded by or on the various modes of surveillance can be compiled, disseminated at a high speed, and low cost. In the wrong hands, the information may be used in wrong ways that infringe on people’s security and privacy. Function Creep has greatly harmed the privacy and has resulted in segregation and isolation among different social classes. Why and how it happens, what its implications on the society are and what possible solutions can be used to control it has been discussed in this paper.
Muhammad Safdar, Faizan Ullah, Imran Khan, Farman Ullah, Izaz Ahmad Khan
Surveillance, Data Mining, Privacy, Security, Data Surveillance, Function Creep.
- Alterman, A. (2003). ‘``A piece of yourself'': Ethical issues in biometric identification', Ethics and Information Technology, vol. 5, no. 3, pp. 139-150.
- M. A. Jan, P. Nanda and X. He, “Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN,” in Wired/Wireless Internet Communication, Lecture Notes in Computer Science, pp. 154–167, Springer, Berlin, Germany, 2013.
- M. A. Jan, P. Nanda, X. He and R. P. Liu, “Enhancing lifetime and quality of data in cluster-based hierarchical routing protocol for wireless sensor network”, 2013 IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC & EUC), pp. 1400-1407, 2013.
- M. A. Jan, P. Nanda, X. He and R. P. Liu, “PASCCC: Priority-based application-specific congestion control clustering protocol” Computer Networks, Vol. 74, PP-92-102, 2014.
- Fox, R. (2001) 'Someone to Watch Over Us:: Back to the Panopticon?', Criminology and Criminal Justice, vol. 1, no. 3, pp. 251-276.
- Van, L. & L, Royakkers. (2004) 'Ethical issues in web data mining', Ethics and Information Technology, vol. 6, no. 2, pp. 129-140.
- Mian Ahmad Jan and Muhammad Khan, “A Survey of Cluster-based Hierarchical Routing Protocols”, in IRACST–International Journal of Computer Networks and Wireless Communications (IJCNWC), Vol.3, April. 2013, pp.138-143.
- Mian Ahmad Jan and Muhammad Khan, “Denial of Service Attacks and Their Countermeasures in WSN”, in IRACST–International Journal of Computer Networks and Wireless Communications (IJCNWC), Vol.3, April. 2013.
- M. A. Jan, P. Nanda, X. He and R. P. Liu, “A Sybil Attack Detection Scheme for a Centralized Clustering-based Hierarchical Network” in Trustcom/BigDataSE/ISPA, Vol.1, PP-318-325, 2015, IEEE.
- Wright, D., Friedewald, M., Gutwirth, S., Langheinrich, M., Mordini, E., Bellanova, R., De Hert, P., Wadhwa, K., & Bigo, D., (2010)'Sorting out smart surveillance', Computer Law & Security Review, vol. 26, no. 4, pp. 343-354.
- Hough, M., (2009) 'Keeping it to ourselves: Technology, privacy, and the loss of reserve', Technology in Society, vol. 31, no. 4, pp. 406-413.
- Elahi, S. (2009) 'Privacy and consent in the digital era', Information Security Technical Report, vol. 14, no. 3, pp. 113-118.
- Schneier, B. (2010) 'Security and Function Creep', IEEE Security & Privacy Magazine, vol. 8, no. 1, pp. 88-88.
- Levi, M. & Wall, D. (2004)'Technologies, Security, and Privacy in the Post-9/11 European Information Society', Journal of Law and Society, vol. 31, no. 2, pp.
- M. A. Jan, P. Nanda, X. He, Z. Tan and R. P. Liu, “A robust authentication scheme for observing resources in the internet of things environment” in 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 205-211, 2014, IEEE.
- M. A. Jan, “Energy-efficient routing and secure communication in wireless sensor networks,” Ph.D. dissertation, 2016.
- Donahue, J., Whittemore, N., and Heerman, A. Ethical Issues of Data Surveillance.EthicaPublishing http://www. ethicapublishing.com/ethical/3CH20. pdf.
- Lockton, V. & Rosenberg, R. 'Technologies of surveillance: Evolution and Future Impact'. [Online]. http://www.ccsr.cse.dmu.ac.uk/conferences/ethicomp/ethicomp2005/abstracts/71.html
- Carrigan, M. & Kirkup, M. (2000)Video surveillance research in retailing: ethical issues. International Journal of Retail & Distribution Management, 28 (11), 470-480.
- Clarke, R. (2001). Roger Clarke’s ‘Biometrics and Privacy’. [Online]. Available: http://www.rogerclarke.com/DV/Biometrics.html.
- Smith, T. (2013) “The Impact of Biometrics,” Ph.D dissertation, Dept. Comput. and Elect. Syst., Ohio Univ., Ohio, United States.
- Levi, M. & Wall, D.S. (2008) “Technologies, Security and Privacy” Journal of Law and Society, vol. 31, no. 2, pp. 194-220.
- Watch, G. (2006). Using the Police National DNA Database - under adequate control? [Online].Available:http://www.genewatch.org/uploads/f03c6d66a9b354535738483c1c3d49e4/research_brief_fin.doc.
- Gayton, C. M. (2006)Beyond terrorism: data collection and responsibility for privacy. VINE, 36 (4), 377-394.
|Published in :
||Volume 2 | Issue 2 | March-April - 2016
|Date of Publication
Cite This Article
Muhammad Safdar, Faizan Ullah, Imran Khan, Farman Ullah, Izaz Ahmad Khan, "Function Creep in Surveillance Techniques", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 2, pp.983-988, March-April-2016.
URL : http://ijsrset.com/IJSRSET1622316.php