Research Essay Editorial

IF 0.5 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING International Journal of Information Security and Privacy Pub Date : 2015-10-02 DOI:10.1080/15536548.2015.1105601
Gaurav Gupta, I. Bose
{"title":"Research Essay Editorial","authors":"Gaurav Gupta, I. Bose","doi":"10.1080/15536548.2015.1105601","DOIUrl":null,"url":null,"abstract":"Modern human life resides at the behest of information. Access to information has been attributed to power and control in societies. Jeremy Bentham, in the late 18th century, used the concept of panopticon to explain the perception of control through constant monitoring. The panopticon prison architecture allows monitoring of all inmates from a central location, and the expectation that monitoring affects their behavior. In the book titled In the Age of the Smart Machine: The Future of Work and Power (1988), Shoshana Zuboff uses the same lens to explain the notion of information panopticon. She argues that supervision and surveillance are an inevitable consequence of our dependence on information processing machines (including computers and networked devices). As monitoring and analyzing technologies improve, both, intensity and capability of surveillance shall improve too. Since both overt and covert communications do traverse in varied medium (e.g., internet, telephony) and most of these media are also being shared for public communication, the need for monitoring them simultaneously is implied as necessary for public safety. The emergence of multiple communication platforms with different underlying technologies has increased the cost and complexity of surveillance. Collection of surveillance data from several different sources and their co-analysis poses significant demands on existing technological capabilities too. Expeditious analysis of the collected data and its conversion into actionable intelligence is crucial for surveillance and adds another layer of complexity to this use case. Information and Communication Technology (ICT) has added capabilities to both monitor and connect citizens with the government. Government-backed intelligence agencies worldwide are introducing self-reporting platforms to allow citizens to notify agencies of anomalies in their vicinity. Adoption of these platforms would make citizens a critical component of the state-run physical surveillance framework. Human intelligence is a crucial link in the whole surveillance architecture, and analyzes and interprets the output from other technology-backed surveillance techniques, thus making surveillance actionable. The first article written by Mugavero, Benolli, and Sabato, in this Research Essay special section of the Journal of Information Privacy and Security (JIPS), projects some of these issues concerning challenges posed due to multiple sources of intelligence data. Consequently, these authors present the extant understanding of intelligence and its identification as a process. They provide an introduction of the different sources of intelligence and then present a model for encompassing all existing intelligence products. This","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"470 1","pages":"228 - 229"},"PeriodicalIF":0.5000,"publicationDate":"2015-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Information Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/15536548.2015.1105601","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 0

Abstract

Modern human life resides at the behest of information. Access to information has been attributed to power and control in societies. Jeremy Bentham, in the late 18th century, used the concept of panopticon to explain the perception of control through constant monitoring. The panopticon prison architecture allows monitoring of all inmates from a central location, and the expectation that monitoring affects their behavior. In the book titled In the Age of the Smart Machine: The Future of Work and Power (1988), Shoshana Zuboff uses the same lens to explain the notion of information panopticon. She argues that supervision and surveillance are an inevitable consequence of our dependence on information processing machines (including computers and networked devices). As monitoring and analyzing technologies improve, both, intensity and capability of surveillance shall improve too. Since both overt and covert communications do traverse in varied medium (e.g., internet, telephony) and most of these media are also being shared for public communication, the need for monitoring them simultaneously is implied as necessary for public safety. The emergence of multiple communication platforms with different underlying technologies has increased the cost and complexity of surveillance. Collection of surveillance data from several different sources and their co-analysis poses significant demands on existing technological capabilities too. Expeditious analysis of the collected data and its conversion into actionable intelligence is crucial for surveillance and adds another layer of complexity to this use case. Information and Communication Technology (ICT) has added capabilities to both monitor and connect citizens with the government. Government-backed intelligence agencies worldwide are introducing self-reporting platforms to allow citizens to notify agencies of anomalies in their vicinity. Adoption of these platforms would make citizens a critical component of the state-run physical surveillance framework. Human intelligence is a crucial link in the whole surveillance architecture, and analyzes and interprets the output from other technology-backed surveillance techniques, thus making surveillance actionable. The first article written by Mugavero, Benolli, and Sabato, in this Research Essay special section of the Journal of Information Privacy and Security (JIPS), projects some of these issues concerning challenges posed due to multiple sources of intelligence data. Consequently, these authors present the extant understanding of intelligence and its identification as a process. They provide an introduction of the different sources of intelligence and then present a model for encompassing all existing intelligence products. This
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
研究论文编辑
现代人的生活依赖于信息。获取信息被归因于社会中的权力和控制。18世纪晚期,杰里米·边沁(Jeremy Bentham)用圆形监狱(panopticon)的概念来解释通过不断的监视来控制的感觉。panopticon监狱架构允许从一个中心位置监控所有囚犯,并期望监控影响他们的行为。在《智能机器时代:工作和权力的未来》(1988)一书中,肖莎娜·祖伯夫用同样的视角解释了信息全景监狱的概念。她认为,监督和监视是我们依赖信息处理机器(包括计算机和网络设备)的必然结果。随着监测和分析技术的进步,监测的强度和能力也要提高。由于公开和秘密通信都是通过各种媒介(例如,互联网,电话)进行的,而且这些媒体中的大多数也被用于公共通信,因此同时监控它们的必要性被认为是公共安全的必要条件。使用不同底层技术的多种通信平台的出现增加了监控的成本和复杂性。从几个不同来源收集监测数据并对其进行联合分析也对现有技术能力提出了重大要求。对收集的数据进行快速分析并将其转换为可操作的情报对于监视至关重要,并为该用例增加了另一层复杂性。信息和通信技术(ICT)增加了监控公民和连接公民与政府的能力。世界各地的政府支持的情报机构正在推出自我报告平台,允许公民通知他们附近的异常情况。采用这些平台将使公民成为国家实体监控框架的关键组成部分。人工智能是整个监控体系结构的关键环节,并分析和解释其他技术支持的监控技术的输出,从而使监控具有可操作性。Mugavero、Benolli和Sabato撰写的第一篇文章发表在《信息隐私与安全杂志》(jip)的研究论文特辑中,提出了由于情报数据的多种来源所带来的挑战。因此,这些作者提出了现有的理解智能及其识别作为一个过程。他们介绍了不同的情报来源,然后提出了一个涵盖所有现有情报产品的模型。这
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Information Security and Privacy
International Journal of Information Security and Privacy COMPUTER SCIENCE, SOFTWARE ENGINEERING-
CiteScore
2.50
自引率
0.00%
发文量
73
期刊介绍: As information technology and the Internet become more and more ubiquitous and pervasive in our daily lives, there is an essential need for a more thorough understanding of information security and privacy issues and concerns. The International Journal of Information Security and Privacy (IJISP) creates and fosters a forum where research in the theory and practice of information security and privacy is advanced. IJISP publishes high quality papers dealing with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy, through a balanced mix of theoretical and empirical research articles, case studies, book reviews, tutorials, and editorials. This journal encourages submission of manuscripts that present research frameworks, methods, methodologies, theory development and validation, case studies, simulation results and analysis, technological architectures, infrastructure issues in design, and implementation and maintenance of secure and privacy preserving initiatives.
期刊最新文献
Adaptive Personalized Randomized Response Method Based on Local Differential Privacy A Novel CNN-LSTM Fusion-Based Intrusion Detection Method for Industrial Internet A System Dynamics Approach to Evaluate Advanced Persistent Threat Vectors Trust and Voice Biometrics Authentication for Internet of Things “Every Dog Has His Day”
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1