IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET1622316                                                     

Function Creep in Surveillance Techniques


Muhammad Safdar, Faizan Ullah, Imran Khan, Farman Ullah, Izaz Ahmad Khan
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
Surveillance practices have benefits. The surveillance gadgets are used for security purposes, making it easier for the security personnel to determine who, at what time and how an incident happened. However, surveillance practices have raised issues related to privacy. The government may use the surveillance gadgets to spy on the users. The information recorded by or on the various modes of surveillance can be compiled, disseminated at a high speed, and low cost. In the wrong hands, the information may be used in wrong ways that infringe on people’s security and privacy. Function Creep has greatly harmed the privacy and has resulted in segregation and isolation among different social classes. Why and how it happens, what its implications on the society are and what possible solutions can be used to control it has been discussed in this paper.

Muhammad Safdar, Faizan Ullah, Imran Khan, Farman Ullah, Izaz Ahmad Khan

Surveillance, Data Mining, Privacy, Security, Data Surveillance, Function Creep.

  1. Alterman, A. (2003). ‘``A piece of yourself'': Ethical issues in biometric identification', Ethics and Information Technology, vol. 5, no. 3, pp. 139-150.
  2. M. A. Jan, P. Nanda and X. He, “Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN,”  in Wired/Wireless Internet Communication, Lecture Notes in Computer Science, pp. 154–167, Springer, Berlin, Germany, 2013.
  3. M. A. Jan, P. Nanda, X. He and R. P. Liu, “Enhancing lifetime and quality of data in cluster-based hierarchical routing protocol for wireless sensor network”, 2013 IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC & EUC), pp. 1400-1407, 2013.
  4. M. A. Jan, P. Nanda, X. He and R. P. Liu, “PASCCC: Priority-based application-specific congestion control clustering protocol” Computer Networks, Vol. 74, PP-92-102, 2014.
  5. Fox, R. (2001) 'Someone to Watch Over Us:: Back to the Panopticon?', Criminology and Criminal Justice, vol. 1, no. 3, pp. 251-276.
  6. Van, L. & L, Royakkers. (2004) 'Ethical issues in web data mining', Ethics and Information Technology, vol. 6, no. 2, pp. 129-140.
  7. Mian Ahmad Jan and Muhammad Khan, “A Survey of Cluster-based Hierarchical Routing Protocols”, in IRACST–International Journal of Computer Networks and Wireless Communications (IJCNWC), Vol.3, April. 2013, pp.138-143.
  8. Mian Ahmad Jan and Muhammad Khan, “Denial of Service Attacks and Their Countermeasures in WSN”, in IRACST–International Journal of Computer Networks and Wireless Communications (IJCNWC), Vol.3, April. 2013.
  9.  M. A. Jan, P. Nanda, X. He and R. P. Liu,  “A Sybil Attack Detection Scheme for a Centralized Clustering-based Hierarchical Network” in Trustcom/BigDataSE/ISPA, Vol.1, PP-318-325, 2015, IEEE.
  10. Wright, D., Friedewald, M., Gutwirth, S., Langheinrich, M., Mordini, E., Bellanova, R., De Hert, P., Wadhwa, K., & Bigo, D., (2010)'Sorting out smart surveillance', Computer Law & Security Review, vol. 26, no. 4, pp. 343-354.
  11. Hough, M., (2009) 'Keeping it to ourselves: Technology, privacy, and the loss of reserve', Technology in Society, vol. 31, no. 4, pp. 406-413.
  12. Elahi, S. (2009) 'Privacy and consent in the digital era', Information Security Technical Report, vol. 14, no. 3, pp. 113-118.
  13. Schneier, B. (2010) 'Security and Function Creep', IEEE Security & Privacy Magazine, vol. 8, no. 1, pp. 88-88.
  14. Levi, M. & Wall, D. (2004)'Technologies, Security, and Privacy in the Post-9/11 European Information Society', Journal of Law and Society, vol. 31, no. 2, pp.
  15. M. A. Jan, P. Nanda, X. He, Z. Tan and R. P. Liu, “A robust authentication scheme for observing resources in the internet of things environment” in 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 205-211, 2014, IEEE.
  16. M. A. Jan, “Energy-efficient routing and secure communication in wireless sensor networks,” Ph.D. dissertation, 2016.
  17. Donahue, J., Whittemore, N., and Heerman, A. Ethical Issues of Data Surveillance.EthicaPublishing http://www. ethicapublishing.com/ethical/3CH20. pdf. 
  18. Lockton, V. & Rosenberg, R.  'Technologies of surveillance: Evolution and Future Impact'.  [Online]. http://www.ccsr.cse.dmu.ac.uk/conferences/ethicomp/ethicomp2005/abstracts/71.html
  19. Carrigan, M. & Kirkup, M. (2000)Video surveillance research in retailing: ethical issues. International Journal of Retail & Distribution Management, 28 (11), 470-480.
  20. Clarke, R. (2001). Roger Clarke’s ‘Biometrics and Privacy’. [Online]. Available: http://www.rogerclarke.com/DV/Biometrics.html.
  21. Smith, T. (2013) “The Impact of Biometrics,” Ph.D dissertation, Dept. Comput. and Elect. Syst., Ohio Univ., Ohio, United States.
  22. Levi, M. & Wall, D.S. (2008) “Technologies, Security and Privacy” Journal of Law and Society, vol. 31, no. 2, pp. 194-220.
  23. Watch, G. (2006). Using the Police National DNA Database - under adequate control? [Online].Available:http://www.genewatch.org/uploads/f03c6d66a9b354535738483c1c3d49e4/research_brief_fin.doc.
  24. Gayton, C. M. (2006)Beyond terrorism: data collection and responsibility for privacy. VINE, 36 (4), 377-394.

Publication Details

Published in : Volume 2 | Issue 2 | March-April - 2016
Date of Publication Print ISSN Online ISSN
2016-04-30 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
983-988 IJSRSET1622316   Technoscience Academy

Cite This Article

Muhammad Safdar, Faizan Ullah, Imran Khan, Farman Ullah, Izaz Ahmad Khan, "Function Creep in Surveillance Techniques", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 2, pp.983-988, March-April-2016.
URL : http://ijsrset.com/IJSRSET1622316.php