Abuse Prevention of Street Camera Network by Browsing-History Disclosure

Similar documents
The Development of scientific learning material with 3-D

Notice of Privacy Practices

Proceedings of International Symposium on Technology and Social Science Proceedings of

Christina Narensky, Psy.D.

Paola Bailey, PsyD Licensed Clinical Psychologist PSY# 25263

To explore the meaning and use of graffiti as a form of criminal damage and vandalism, particularly in relation to the public transport network.

Graffiti Management Strategy Update

Graduate attributes for a field of study *

Creating a Public Safety Ecosystem

Your information - but is it really yours?

Handwriting Multi-Tablet Application Supporting. Ad Hoc Collaborative Work

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework

A Citizen s Guide. to Big Data and Your Privacy Rights in Nova Scotia. Office of the Information and Privacy Commissioner for Nova Scotia

Graffiti Prevention: Lights, Landscape, Access

Automatic correction of timestamp and location information in digital images

Intellectual Property Ownership and Disposition Policy

ARIES Yearbook Application 2018

PRIVACY IMPACT ASSESSMENT

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: T:Drive. Safeguarding Policy Data Protection Policy

28 TH INTERNATIONAL CONFERENCE OF DATA PROTECTION

Technologies that will make a difference for Canadian Law Enforcement

Welcome. Commercialisation & Intellectual Property. UTS Research Week 7 February 2013

FIPPs Fair Information Practice Principles

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: Safeguarding Policy Data Protection Policy

Counselling Consent. What is counselling all about? How will counselling help? Risks involved in counselling. Values Statement

Personal Data Protection Competency Framework for School Students. Intended to help Educators

Diana Gordick, Ph.D. 150 E Ponce de Leon, Suite 350 Decatur, GA Health Insurance Portability and Accountability Act (HIPAA)

Photography Policy & Procedure

IAB Europe Guidance THE DEFINITION OF PERSONAL DATA. IAB Europe GDPR Implementation Working Group WHITE PAPER

National Civil and Voter Registration, Pg. 11

Wireless Device Location Sensing In a Museum Project

CymbIoT Visual Analytics

Village of Lake Bluff Fire Department Application to become a Volunteer Firefighter or EMS Services Member

REMOTE SENSING AND PRIVACY ISSUES. Lynn Brien Geography 4810G 11/29/07

World Robot Summit Call for Tenders: A Standard Robot Platform in Simulation for Tunnel Disaster Response and Recovery Challenge

Illustrative Mathematics. Alignments to Content Standards: 4.OA.B. Task. Below is a multiplication table for single digit numbers:

This Privacy Policy describes the types of personal information SF Express Co., Ltd. and

Volume 3, Number 3 The Researcher s Toolbox, Part II May 2011

Associate. Application Instructions. Programme

A Simulation System of Experience with a Disaster by Locating Memories on a Virtual Space

1 Enhancement of Intellectual Property-Related Activities at Universities and Public Research Institutes

Policy Contents. Policy Information. Purpose and Summary. Scope. Published on Policies and Procedures (

Gujarat Technological University

Accident prevention and detection using internet of Things (IOT)

Surveillance and Privacy in the Information Age. Image courtesy of Josh Bancroft on flickr. License CC-BY-NC.

Created by Angela Jurgensen 2018

GATEWAY TO LEVEL 2 EXCELLENCE IN SAFEGUARDING

From here, you can create or edit your profile and schedule, reschedule or cancel your exam. This is also where you will go to start your exam.

STUDENT GUIDE Version 1.3 FINAL

Avoid the 5 Biggest DWI Pitfalls Presented by: The Volk & McElroy Law Firm

University of Southern California Guidelines for Assigning Authorship and for Attributing Contributions to Research Products and Creative Works

DEPARTMENT OF PUBLIC SAFETY DIVISION OF FIRE COLUMBUS, OHIO. SOP Revision Social Media Digital Imagery

Development of an Intuitive Interface for PC Mouse Operation Based on Both Arms Gesture

Geo-Located Content in Virtual and Augmented Reality

Working at Weiland s please read this first:

Last week a long-time friend asked what type of law I practice. I was surprised that he didn t know what I do for a

Young Children s Folk Knowledge of Robots

IP and Technology Management for Universities

Prisoner 2 Confess Remain Silent Confess (-5, -5) (0, -20) Remain Silent (-20, 0) (-1, -1)

DataCAD Softlock License Activation and Management

NANNIES ON CALL NANNY APPLICATION

Digital. City < BY TORU ISHIDA >

Interviews. The Four Interview Questions You Must be Able to Answer

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT

CAPTURING PANORAMA IMAGES

Anonymous registration: Supporting survivors of domestic abuse to register to vote

MEDICINE LICENSE TO PUBLISH

DataCAD 18 Softlock. Universal Installer. Installation. Evaluation

Requirements for Description. Japan Patent Office

Ansible Tower Quick Setup Guide

Stitching panorama photographs with Hugin software Dirk Pons, New Zealand

Open Education Resources: open licenses

Privacy by Design: Integrating Technology into Global Privacy Practices

Present Situation and Problems of Technology Education in Japan: With Focusing on Technology Education as General Education

Intellectual Property

Flex Contracts for Full Time and Hourly/Overload Assignments

Exemplar Assignment Brief. Pearson BTEC Level 2 Award for Working as a CCTV Operator (Public Space Surveillance) within the Private Security Industry

Managing Information Systems Seventh Canadian Edition. Laudon, Laudon and Brabston. CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm

Research on an Economic Localization Approach

For more information about how to cite these materials visit

Journal of Technology Law & Policy

Development of Video Chat System Based on Space Sharing and Haptic Communication

Design and Implementation of Distress Prevention System using a Beacon

PRIVACY IMPACT ASSESSMENT CONDUCTING A PRIVACY IMPACT ASSESSMENT ON SURVEILLANCE CAMERA SYSTEMS (CCTV)

A POLICY in REGARDS to INTELLECTUAL PROPERTY. OCTOBER UNIVERSITY for MODERN SCIENCES and ARTS (MSA)

GPS TECHNOLOGY IN COMMUNITY SERVICES

Answer all questions. No marks will be awarded for using brand names of software packages or hardware.

INTERVIEW AND INTERROGATION:

e-government in Korea Ministry of Public Administration and Security

American Bullmastiff Association Inc. Rescue Service - Florida Division

INSTRUCTIONS FOR FILLING UP ONLINE APPLICATIONS

Relationship to theory: This activity involves the motion of bodies under constant velocity.

Autonomous Face Recognition

Automated License Plate Recognition Technology: Social and Security Implications Jordan Nichols IT October,

OPTICAL CIRCULATOR FOR FREE SPACE OPTICAL COMMUNICATION

Research Article Special Issue

Photography policy. Policy history

High School Guitar APP2800

Lewis-Clark State College No Date 2/87 Rev. Policy and Procedures Manual Page 1 of 7

PLA Planner Student Handbook

Transcription:

Points of View Abuse Prevention of Street Camera Network by Browsing-History Disclosure Yusaku Fujii Noriaki Yoshiura Naoya Ohta Akihiro Takita Hiroshi Ueda Koichi Maru Division of Mechanical Science and Technology, Faculty of Science and Technology, Gunma University, Japan. Corresponding Author. fujii@e-jikei.com Department of Information and Computer Science, Graduate School of Science and Engineering, Saitama University, Japan yoshiura@fmx.ics.saitama-u.ac.jp Division of Electronics and Informatics, Faculty of Science and Technology, Gunma University, Japan ohta@cs.gunma-u.ac.jp Division of Mechanical Science and Technology, Faculty of Science and Technology, Gunma University, Japan takita@gunma-u.ac.jp Academic Center for Computing and Media Studies, Kyoto University, Japan. uep@media.kyoto-u.ac.jp Department of Electronics and Information Engineering, Faculty of Engineering, Kagawa University, Japan. maru@eng.kagawa-u.ac.jp A street camera network, in which many street cameras are installed at a high density, similar to street lights throughout a nation, will have a stronger positive effect in suspect tracking and crime deterrence in the near future. On the other hand, it will also have a stronger negative effect related to the violation of privacy of ordinary citizens. In order to make such a stronger surveillance camera system, which forcibly captures the images of passersby for the public interest, be accepted as an essential social infra- Fujii, Y., Yoshiura, N., Ohta, N., Takita, A., Ueda, H., Maru, K. (2016). Abuse Prevention of Street Camera Network by Browsing-History Disclosure. The Journal of Community Informatics, 12 (1), 152 156. Date submitted: 2015-09-16. Date accepted: 2016-02-14. Copyright (C), 2016 (the authors as stated). Licensed under the Creative Commons Attribution- NonCommercial-ShareAlike 2.5. Available at: www.ci-journal.net/index.php/ciej/article/view/1271!152

Introduction structure by a society, it is necessary for this camera system to make ordinary citizens be convinced that it is used only for the public interest. To realize this, a new concept, in which the abuse of a street camera network is deterred by browsing-history disclosure, is proposed. In developed countries in the near future, street camera networks and/or street lights with network camera functionality will be installed at a high density, similar to street lights, in busy and quiet areas. They will be connected using the Internet, and high-speed access to the recorded images will take place. These events will happen owing to the reduction in price of electrical devices and Internet connections. Then, manual or automatic tracking [1] of any suspect will take place with a high efficiency. As for the type of camera, an LED street light camera will be advantageous because the costs associated with the installation of the camera and street lights are similarly high As for the storage of the captured images, it is reasonable to assume that images are to be recorded on the camera itself and transferred as the need arises, because most cameras will be installed in quiet areas, of which there many more than busy areas. At present, many surveillance cameras have been installed at a high density in urban areas in developed countries, such as London [2]. In the near future, a street camera network, as a powerful social infrastructure throughout the nation, will appear by means of the additional installation of cameras at a higher density, the connection to a high-speed network, and the introduction of an automatic tracking system. This infrastructure will have a strong positive effect in the tracking of suspects, kidnapped children, and aged wanderers and also a strong negative effect related to the violation of privacy of ordinary citizens. With this powerful infrastructure, it might be possible that a kidnapped child is rescued [3,4]. First, a child exiting a house is observed by the cameras in front of his/her house. Then, he/ she is tracked by switching the cameras according to his/her motion. Next, his/her present location is known. Finally, police cars are sent to that location to rescue him/her. This can be easily carried out with this powerful infrastructure. With this powerful infrastructure, people can be assured that all criminals are arrested. Then, people who do not want to be arrested will be deterred from committing a crime. Although this belief cannot deter a person who does not care about being arrested from committing a crime, he/she cannot commit another crime again because he/she will be arrested after the first crime. It will be a serious problem if the operators of this powerful system can use the system for private reasons such as stalking and tracking a specific person. In order to make this powerful infrastructure be accepted by society, it is necessary for this system to make the ordinary citizens be convinced that the abuse is perfectly prevented and their privacy is perfectly protected.!153

Proposed concept To realize this, a new concept [5], in which the abuse of a street camera network is deterred by browsing-history disclosure, is proposed. Figure 1 shows an example of the system based on the proposed concept. The system shown in Figure 1 works as follows: (1) The city government operates many cameras, which are installed at a high density, similar to street lights, throughout the city. (2) The manager of the city government publicizes the method of operation of the camera system, i.e., the control condition, and inputs it into the recording server operated by a reliable third party. (3) The operator of the city government starts operation by order with reason code. (4) The operator sends a request code, which consists of the inputs of the browser ID, reason code, camera ID, and time period, to the recording server using the browsing device. (5) The recording server issues a permission code to the browsing device on the basis of the control condition and records all processes as the browsing history. (6) The operator can browse the image files within the permitted range defined by the permission code. (7) The recording server discloses the entire browsing history to everyone throughout the Internet.!154

! The Journal of Community Informatics ISSN: 1721-4441 Figure 1. Example of a system based on the concept of abuse prevention of a street camera network by browsing-history disclosure In the above system, all browsing acts are visualized and verifiable. Abuse of the system is strongly deterred. An ordinary citizen is free from the mental stress by believing that it is very difficult to abuse the system, and their privacy is protected at a sufficient level. Discussion With this concept, people can believe that abuse should be surely revealed. Then, people who do not want to be revealed will be deterred from abuse. Although this belief might not deter a person who does not care about being revealed from abuse, he/she cannot commit another abuse again because he/she will be resigned owing to the first one. To complement this concept, another concept of self-identification using wireless camera communication is proposed [6]. In the second concept, each camera should identify itself to the persons around it using wireless communication. For example, each camera sends URL of the website, in which the operator in charge, the operating method, the above mentioned browsing history are shown, to nearby smartphones using short-distance wireless communication such as Bluetooth. We wish to make possible a society in which no criminal can escape and kidnapped children can be rescued and the privacy of noncriminal citizens is perfectly protected.!155

Acknowledgements This study was supported by the research aid fund of the Research Foundation for Safe Society and the Grant-in-Aid for Scientific Research (B) 15H02887 (KAKENHI 15H02887). References [1] Mazzon, R. & Cavallaro, A. (2013). Multi-camera tracking using a Multi-Goal Social Force Model, Neurocomputing, Vol.100: 41-50. [2] Surveillance road map, A shared approach to the regulation of surveillance in the United Kingdom, Surveillance Camera Commissioner, 2015. https://www.gov.uk/ government/publications/surveillance-road-map [3] Y. Fujii, N. Ohta, H. Ueda, Y. Sugita and K. Maru (2008). New concept regarding management of security cameras, 4 (3). [4] Y. Fujii, K. Maru, K. Kobayashi, N. Yoshiura, N. Ohta, H. Ueda and P. Yupapin. (2010). e-jikei Network using e-jikei Cameras: Community security using considerable number of cheap stand-alone cameras. Safety Science, 48 (7), 921-925. [5] Japanese Patent Application No.2015-167298. [6] Japanese Patent No.5757048.!156