{"title":"Research Essay Editorial","authors":"Gaurav Gupta, I. Bose","doi":"10.1080/15536548.2015.1105601","DOIUrl":null,"url":null,"abstract":"Modern human life resides at the behest of information. Access to information has been attributed to power and control in societies. Jeremy Bentham, in the late 18th century, used the concept of panopticon to explain the perception of control through constant monitoring. The panopticon prison architecture allows monitoring of all inmates from a central location, and the expectation that monitoring affects their behavior. In the book titled In the Age of the Smart Machine: The Future of Work and Power (1988), Shoshana Zuboff uses the same lens to explain the notion of information panopticon. She argues that supervision and surveillance are an inevitable consequence of our dependence on information processing machines (including computers and networked devices). As monitoring and analyzing technologies improve, both, intensity and capability of surveillance shall improve too. Since both overt and covert communications do traverse in varied medium (e.g., internet, telephony) and most of these media are also being shared for public communication, the need for monitoring them simultaneously is implied as necessary for public safety. The emergence of multiple communication platforms with different underlying technologies has increased the cost and complexity of surveillance. Collection of surveillance data from several different sources and their co-analysis poses significant demands on existing technological capabilities too. Expeditious analysis of the collected data and its conversion into actionable intelligence is crucial for surveillance and adds another layer of complexity to this use case. Information and Communication Technology (ICT) has added capabilities to both monitor and connect citizens with the government. Government-backed intelligence agencies worldwide are introducing self-reporting platforms to allow citizens to notify agencies of anomalies in their vicinity. Adoption of these platforms would make citizens a critical component of the state-run physical surveillance framework. Human intelligence is a crucial link in the whole surveillance architecture, and analyzes and interprets the output from other technology-backed surveillance techniques, thus making surveillance actionable. The first article written by Mugavero, Benolli, and Sabato, in this Research Essay special section of the Journal of Information Privacy and Security (JIPS), projects some of these issues concerning challenges posed due to multiple sources of intelligence data. Consequently, these authors present the extant understanding of intelligence and its identification as a process. They provide an introduction of the different sources of intelligence and then present a model for encompassing all existing intelligence products. This","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"470 1","pages":"228 - 229"},"PeriodicalIF":0.5000,"publicationDate":"2015-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Information Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/15536548.2015.1105601","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 0
Abstract
Modern human life resides at the behest of information. Access to information has been attributed to power and control in societies. Jeremy Bentham, in the late 18th century, used the concept of panopticon to explain the perception of control through constant monitoring. The panopticon prison architecture allows monitoring of all inmates from a central location, and the expectation that monitoring affects their behavior. In the book titled In the Age of the Smart Machine: The Future of Work and Power (1988), Shoshana Zuboff uses the same lens to explain the notion of information panopticon. She argues that supervision and surveillance are an inevitable consequence of our dependence on information processing machines (including computers and networked devices). As monitoring and analyzing technologies improve, both, intensity and capability of surveillance shall improve too. Since both overt and covert communications do traverse in varied medium (e.g., internet, telephony) and most of these media are also being shared for public communication, the need for monitoring them simultaneously is implied as necessary for public safety. The emergence of multiple communication platforms with different underlying technologies has increased the cost and complexity of surveillance. Collection of surveillance data from several different sources and their co-analysis poses significant demands on existing technological capabilities too. Expeditious analysis of the collected data and its conversion into actionable intelligence is crucial for surveillance and adds another layer of complexity to this use case. Information and Communication Technology (ICT) has added capabilities to both monitor and connect citizens with the government. Government-backed intelligence agencies worldwide are introducing self-reporting platforms to allow citizens to notify agencies of anomalies in their vicinity. Adoption of these platforms would make citizens a critical component of the state-run physical surveillance framework. Human intelligence is a crucial link in the whole surveillance architecture, and analyzes and interprets the output from other technology-backed surveillance techniques, thus making surveillance actionable. The first article written by Mugavero, Benolli, and Sabato, in this Research Essay special section of the Journal of Information Privacy and Security (JIPS), projects some of these issues concerning challenges posed due to multiple sources of intelligence data. Consequently, these authors present the extant understanding of intelligence and its identification as a process. They provide an introduction of the different sources of intelligence and then present a model for encompassing all existing intelligence products. This
期刊介绍:
As information technology and the Internet become more and more ubiquitous and pervasive in our daily lives, there is an essential need for a more thorough understanding of information security and privacy issues and concerns. The International Journal of Information Security and Privacy (IJISP) creates and fosters a forum where research in the theory and practice of information security and privacy is advanced. IJISP publishes high quality papers dealing with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy, through a balanced mix of theoretical and empirical research articles, case studies, book reviews, tutorials, and editorials. This journal encourages submission of manuscripts that present research frameworks, methods, methodologies, theory development and validation, case studies, simulation results and analysis, technological architectures, infrastructure issues in design, and implementation and maintenance of secure and privacy preserving initiatives.