Surveillance in the Digital Age

Methods, Opportunities, and Threats

Authored by: Göran Pulkkis

International Handbook of Media Literacy Education

Print publication date:  May  2017
Online publication date:  April  2017

Print ISBN: 9781138645493
eBook ISBN: 9781315628110
Adobe ISBN: 9781317240068

10.4324/9781315628110.ch8

 Download Chapter

 

Abstract

ITC technology offers many surveillance possibilities. Camera surveilled area activities can be digitally recorded/stored for future use. Network traffic analyzers can surveil network communication. Search engine providers can surveil Web usage. Location surveillance is possible through preinstalled sensor networks, GPS services, and devices’ location information. Mobile phones’ calls/SMS can be governmentally surveilled through access to subscribers’ authentication keys in operators’ Authentication Centers. Implanted malware can surveil network and network-connected device usage. Surveillance benefits are in health/elderly care, protection of people/property, air/car/ship traffic security, logistics, etc. Threats are violations of computer/network users’ privacy, theft of digital identities/credentials, cyber criminality/terrorism, etc. Avoidance of, mitigation of, and protection against surveillance threats is outlined.

 Cite
Search for more...
Back to top

Use of cookies on this website

We are using cookies to provide statistics that help us give you the best experience of our site. You can find out more in our Privacy Policy. By continuing to use the site you are agreeing to our use of cookies.