IEEE Organizations related to Dataveillance

Back to Top


Conferences related to Dataveillance

Back to Top

2019 International Carnahan Conference on Security Technology (ICCST)

ICCST is a forum for all aspects of physical, cyber and electronic security research, development, systems engineering, testing, evaluation, operations and sustainment. The ICCST facilitates the exchange of ideas and sharing of information on both new and existing technology and systems. Conference participants are encouraged to consider the impact of their work on society. The ICCST provides a foundation for support to authorities and agencies responsible for security, safety and law enforcement in the use of available and future technology.


2018 10th International Conference on Virtual Worlds and Games for Serious Applications (VS-Games)

VS-GAMES is an interdisciplinary conference on virtual worlds and games for applications with purposes other than mere entertainment. Examples are applications for educational contexts, training, rehabilitation, or telepresence. The conference invites the presentation, discussion and publication of works in this field especially considering novel (1) techniques, (2) applications, (3) methodologies and theoretical underpinnings, and (4) evaluation approaches and according studies.

  • 2017 9th International Conference on Virtual Worlds and Games for Serious Applications (VS-Games)

    The conference will explore games and virtual worlds in relation to:•Novel technologies•Applications•Methodologies, theories and frameworks•Evaluation approaches and studiesTopics of Interest•AI applications for serious games•Serious games methodologies•User-modelling in serious games•Pervasive gaming•Interactivity issues•Game design•Alternate reality games•Virtual environments•Augmented reality•Visualisation techniques•Human-computer interaction•Mobile games•Education and learning•Multimedia gaming•Case studies in serious games and virtual worlds

  • 2016 8th International Conference on Games and Virtual Worlds for Serious Applications (VS-Games)

    The traditional scope of VS-Games is novel research into serious games, games technology and virtual worlds. However, for the 2016 edition, there will be a particular focus on augmented and mixed reality

  • 2015 7th International Conference on Games and Virtual Worlds for Serious Applications (VS-Games)

    VS-Games 2015 aims to meet the challenges of the cross-disciplinary community that work around non-leisure applications of games and game technologies by bringing the community together to share case studies of practice, to present virtual world infrastructure developments, as well as new frameworks, methodologies and theories relevant to our community. As the field has been growing there are more and more reports (scientific as well as more anecdotal) about the use and usefulness of serious games. As a result there is a clear need to consider new frameworks, theories, methods and design strategies for making serious games and virtual world technologies more effective and useful. We anticipate stronger links between the entertainment games industry and the serious games and virtual world communities in the forthcoming years. To what extent have features from entertainment games influenced serious games and how can they be more effectively utilised to reach non-leisure goals?

  • 2014 6th International Conference on Games and Virtual Worlds for Serious Applications (VS-GAMES)

    VS-Games now running in its 6th year, is a conference that targets cross-disciplinary communities with emphasis on the development, technologies and use of virtual worlds and games for serious applications. The conference promotes efforts in all areas of research involving the advancement of the study of games for serious applications, including technologies, design, applications and uses.

  • 2013 5th International Conference on Games and Virtual Worlds for Serious Applications (VS-GAMES)

    The development and deployment of games with a purpose beyond entertainment and with considerable connotations with more serious aims is an exciting area with immense academic but also commercial potential. This potential presents both immediate opportunities but also numerous significant challenges to the interested parties involved, as a result of the relatively recent emergence and popularity of the medium. The VS Games 2013 conference aims to address this variety of relevant contemporary challenges that the increasingly cross-disciplinary communities involved in serious games are currently facing. This will be achieved by, amongst other ways, the comprehensive dissemination of successful case studies and development practices, the sharing of theories, conceptual frameworks and methodologies and, finally, the discussion of evaluation approaches and their resulting studies.

  • 2011 3rd International Conference on Games and Virtual Worlds for Serious Applications (VS-GAMES 2011)

    The third International Conference in Games and Virtual Worlds for Serious Applications (2011) aims to meet the significant challenges of the cross-disciplinary community that work around these serious application areas by bringing the community together to share case studies of practice, to present virtual world infrastructure developments, as well as new frameworks.

  • 2010 2nd International Conference on Games and Virtual Worlds for Serious Applications (VS-GAMES 2010)

    The use of virtual worlds and games for serious applications has emerged as a dominating force in training, education and simulation due to the focus on creating compelling interactive environments at reduced costs by adopting commodity technologies commonly associated with the entertainment industries. This field is informed by theories, methods, applications and the state-of-the-art in a number of areas based on technological principles and innovation, advances in games design, pedagogic methodologies and

  • 2009 International Conference on Games and Virtual Worlds for Serious Applications (VS-GAMES 2009)

    The 1st International Conference in Games and Virtual Worlds for Serious Applications 2009 (technical co-sponsorship with the IEEE Computer Society pending) aims to meet the significant challenges of the cross-disciplinary community that work around these serious application areas by bringing the community together to share case studies of practice, to present new frameworks, methodologies and theories and to begin the process of developing shared cross-disciplinary outputs. In order to achieve this main ai


2018 26th Telecommunications Forum (TELFOR)

TELFOR has the purpose to consider important scientific, engineering, professional, social, economical and legal aspects of Telecommunications and Information Technology. The work of TELFOR is organized through plenary sessions, invited papers, lectures, regular authors and students paper sessions, tutorials, seminars, workshops, technical, information and commercial presentations, exhibitions, etc.

  • 2017 25th Telecommunication Forum (TELFOR)

    ScopeTELFOR intends to consider important scientific, engineering, professional, social, economical and legal aspects of Telecommunications and Information Technology. The work of TELFOR is organized through plenary and special sessions, authors regular and student paper sessions, invited papers, lectures, seminats, workshops, technical, informative and commercial presentations, exhibitions, ...

  • 2016 24th Telecommunications Forum (TELFOR)

    TELFOR intends to consider important scientific, engineering, professional, social, economical and legal aspects of Telecommunications and Information Technology. The work of TELFOR is organized through plenary and special sessions, authors regular and student paper sessions, invited papers, lectures, seminars, workshops, technical, informative and commercial presentations, exhibitions, ...

  • 2015 23rd Telecommunications Forum Telfor (TELFOR)

    TELFOR has the purpose to consider important scientific, engineering, professional, social, economical and legal aspects of Telecommunications and Information Technology. The work of TELFOR is organized through plenary sessions, invited papers, lectures, regular authors and students paper sessions, tutorials, seminars, workshops, technical, information and commercial presentations, exhibitions, etc.

  • 2014 22nd Telecommunications Forum Telfor (TELFOR)

    TELFOR has the purpose to consider important scientific, engineering, professional, social, economical and legal aspects of Telecommunications and Information Technology. The work of TELFOR is organized through plenary sessions, invited papers, presentations, lectures, regular authors' and students' sessions, tutorial, seminars, workshops, technical and commercial presentations, exhibitions, etc.

  • 2013 21st Telecommunications Forum Telfor (TELFOR)

    TELFOR has the purpose to consider important scientific, engineering, professional, social, economical and legal aspects of Telecommunications and Information Technology. The work of TELFOR is organized through plenary sessions, invited papers, presentations, lectures, regular authors' and students' sessions, tutorial, seminars, workshops, technical and commercial presentations, exhibitions, etc.

  • 2012 20th Telecommunications Forum Telfor (TELFOR)

    TELFOR has the purpose to consider important scientific, engineering, professional, social, economical and legal aspects of Telecommunications and Information Technology. The work of TELFOR is organized through plenary sessions, invited papers, presentations, lectures, regular authors' and students' sessions, tutorial, seminars, workshops, technical and commercial presentations, exhibitions, etc.

  • 2011 19th Telecommunications Forum Telfor (TELFOR)

    TELFOR has the purpose to consider important scientific, engineering, professional, social, economical and legal aspects of Telecommunications and Information Technology. The work of TELFOR is organized through plenary sessions, invited papers presentations, lectures, regular authors' and students' sessions, tutorials, seminars, workshops, technical and commercial presentations, exhibitions, etc.


2011 IEEE International Symposium on Technology and Society (ISTAS)

ISTAS is an annual international forum sponsored by the IEEE Society on Social Implications of Technology. ISTAS 2011 is co-sponsored by the ACM Special Interest Group on Computers and Society. ISTAS welcomes engineers; scientists; philosophers; researchers in social sciences, arts, law, and humanities; and policy experts in technology and society.



Periodicals related to Dataveillance

Back to Top

Technology and Society Magazine, IEEE

The impact of technology (as embodied by the fields of interest in IEEE) on society, the impact of society on the engineering profession, the history of the societal aspects of electrotechnology, and professional, social, and economic responsibility in the practice of engineering and its related technology.



Most published Xplore authors for Dataveillance

Back to Top

Xplore Articles related to Dataveillance

Back to Top

Dataveillance and data mining as a technology support to the process of investigation

2011 19thTelecommunications Forum (TELFOR) Proceedings of Papers, 2011

The problems that arise in investigations can be overcome by applying dataveillance and data mining system. An investigation as a legal procedural process largely depend on the data available to them at some stage of the investigation. This paper aims to give guidelines for establishing dataveillance system and the application based on data mining concept for effective investigations.


Dataveillance and Countervailance

"Raw Data" Is an Oxymoron, None

This chapter contains sections titled: The Data Bubble, Data Subjects, Countervailing Engagements, Mirror Worlds, Acknowledgments


A framework for analysis of quotidian exposure in an instrumented world

2012 IEEE International Carnahan Conference on Security Technology (ICCST), 2012

For a variety of often reasonable motives such as increased security or increased profit, individuals and organizations fill our world with sensors and data collection systems that sample and track our day-to-day activities. Some people freely invite tracking into their lives. Others are enticed by offers of discounts or even free products and services. But frequently our lives are quietly ...


CryptoCloak - improvement proposal implementation

2014 22nd Telecommunications Forum Telfor (TELFOR), 2014

In post-Snowden era (after June 2013 and his first revelation) many effort was invested into applications development providing privacy protection in Internet communication area. Secure chat applications, systems for anonymous browsing, steganography applications and similar products became world-wide needed and used in everyday life. CryptoCloak is a secure chat application developed using Java programming language. In this paper, CryptoCloak is ...


Wearables and Lifelogging: The socioethical implications.

IEEE Consumer Electronics Magazine, 2015

In 2009, M.G. Michael and I presented the plenary article ?Teaching Ethics in Wearable Computing: The Social Implications of the New ?Veillance?? [1]. It was the first time that the terms surveillance, dataveillance, sousveillance, and ?berveillance were considered together at a public gathering [2]. We were pondering the intensification of a state of ?berveillance through increasingly pervasive technologies that can ...


More Xplore Articles

Educational Resources on Dataveillance

Back to Top

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Dataveillance"

IEEE-USA E-Books

  • Dataveillance and data mining as a technology support to the process of investigation

    The problems that arise in investigations can be overcome by applying dataveillance and data mining system. An investigation as a legal procedural process largely depend on the data available to them at some stage of the investigation. This paper aims to give guidelines for establishing dataveillance system and the application based on data mining concept for effective investigations.

  • Dataveillance and Countervailance

    This chapter contains sections titled: The Data Bubble, Data Subjects, Countervailing Engagements, Mirror Worlds, Acknowledgments

  • A framework for analysis of quotidian exposure in an instrumented world

    For a variety of often reasonable motives such as increased security or increased profit, individuals and organizations fill our world with sensors and data collection systems that sample and track our day-to-day activities. Some people freely invite tracking into their lives. Others are enticed by offers of discounts or even free products and services. But frequently our lives are quietly sampled, unbeknownst to us, by those with the power to do so. As a result, individuals face a rapidly declining freedom to lead a private life. While significant sampling and tracking occur online, this study focuses on the convergence of sensor systems in the physical world. It explores the privacy implications of sensors found on our person, in our home, in our communities, and while travelling. This paper provides the following contributions: a model of human-targeted sensor systems and a framework for sensor categorization, privacy threat analysis, and countermeasure development. It concludes with a detailed case study that employs the framework to analyze the quotidian exposure encountered in an ordinary citizen's life.

  • CryptoCloak - improvement proposal implementation

    In post-Snowden era (after June 2013 and his first revelation) many effort was invested into applications development providing privacy protection in Internet communication area. Secure chat applications, systems for anonymous browsing, steganography applications and similar products became world-wide needed and used in everyday life. CryptoCloak is a secure chat application developed using Java programming language. In this paper, CryptoCloak is presented and its improvement in the context of reducing time overhead is explained.

  • Wearables and Lifelogging: The socioethical implications.

    In 2009, M.G. Michael and I presented the plenary article ?Teaching Ethics in Wearable Computing: The Social Implications of the New ?Veillance?? [1]. It was the first time that the terms surveillance, dataveillance, sousveillance, and ?berveillance were considered together at a public gathering [2]. We were pondering the intensification of a state of ?berveillance through increasingly pervasive technologies that can provide details from a big-picture satellite view right down to the smallest-common-denominator embedded-sensor view. Veiller means ?to watch,? coming from the Latin vigilare, stemming from vigil, which means to be ?watchful.? The prefixes sur, data, sous, and ?ber alter the ?watching? perspective and meaning. What does it mean to be watched by a closed-circuit television (CCTV) camera, to watch another, to watch oneself? Roger Clarke [3], Steve Mann [4], and M.G. Michael [5] have defined three ?types? of watching in the sociotech literature.

  • Praxistemology: Early childhood education, engineering education in a university, and universal concepts for people of all ages and abilities

    Existential tinkering as a form of inquiry must be brought into the engineering curriculum at the university level, as well as into the education curricula in general, including early childhood education. This paper presents a methodology of education for people of all ages and abilities, including engineering education, through unstructured play, personal involvement (authenticity), expression, and exploration - playful tinkering - as forms of inquiry. Current methods of engineering education have too much emphasis on structure, creating rigidity that destroys the capacity for creativity and radical innovation and invention. We introduce “existinquiry/praxistemology” (existential tinkering as inquiry) as a learning methodology consisting of three parts: learning by thinking, learning by doing, and “learning by being” (existential education). The goal of this learning methodology is to create lateral thinkers who integrate ideas and methodologies normally associated with play, the arts, and the sciences, into the the creative thinking process of engineering and design. Our hope is that (1) existinquiry in engineeing education will create more competitive and versatile thinkers capable of solving more sophisticated problems; and (2) that combining concepts of engineering education with concepts of unstructured play that are normally associated with early childhood education, will result in more groundbreaking inventions. We playfully explore topics of Veillance (surveillance, sousveillance, reciprocal transparency, equiveillance/omniveillance, uberveillance, and dataveillance) and Natural User Interfaces with the fundamental Elements (earth, water, air, etc.). The methodologies are applicable to teaching engineering to children or adults of any age or ability.

  • Owning Identity— One or Many—Do We Have a Choice?

    The rapid growth of databases, biometrics, and RFID has led to an environment where identity-related technologies are approaching a critical mass as a potential means of controlling the population. The essential aspects of these diverse technical advances are the links between identity and accelerating intensification of dataveillance capacities. DNA databases are perhaps the most salient example, but their comprehensive application has yet to materialize on a large scale. The legal infrastructure to expand DNA databases more rapidly is already enabled by recent legislation, but the cost and complication (and indeed vulnerabilities) of building such databases mean that at present we can consider them as simply fresh opportunities for function creep. DNA's high profile potential is dwarfed by the risks inherent in the many other cross-linkages now being enabled. These links may be direct (via formal data matching legislation), or indirect, i.e., the result of rapidly expanded powers to secretly monitor parties on a prospective (trawling) basis by creating assemblies of data from many sources. The links enabled by a "unique identity" are central to both direct and indirect data and physical surveillance. Identity is now commonly treated in legislation as if it were a unique item. This supposition has many ramifications. These effects were either unintentionally emergent or consciously intended; in either case the social impact is not widely appreciated.

  • Towards an Experimental Methodology of Virtual World Research

    This paper presents the features that make virtual worlds particularly well suited for use as experimental environments, particularly, shards, dataveillance, the ability to manipulate the environment, and controlled random samples. It also attempts to identify and provide concrete examples of how researchers can avoid two key points of contention when using virtual worlds as experimental environments. The first point is that virtual worlds are not internally valid, and second is that data from virtual worlds cannot be generalized to draw conclusions about individuals in the real world. Finally, it introduces Greenland, an experimental environment that was developed from June 2008 to February 2009, and examines some early data from the project in hopes of translating it to some useful insights for others and for further development of the project itself.

  • Veilance and reciprocal transparency: Surveillance versus sousveillance, AR glass, lifeglogging, and wearable computing

    This paper explores the interplay between surveillance cameras (cameras affixed to large-entities such as buildings) and sousveillance cameras (cameras affixed to small entities such as individual people), laying contextual groundwork for the social implications of Augmented/Augmediated Reality, Digital Eye Glass, and the wearable camera as a vision and visual memory aid in everyday life. We now live in a society in which we have both “the few watching the many” (surveillance), AND “the many watching the few” (sousveillance). Widespread sousveillance will cause a transition from our one-sided surveillance society back to a situation akin to olden times when the sheriff could see what everyone was doing AND everyone could see what the sheriff was doing. We name this neutral form of watching “veillance” - from the French word “veiller” which means “to watch”. Veillance is a broad concept that includes both surveillance (oversight) and sousveillance (undersight), as well as dataveillance, uberveillance, etc. It follows that: (1) sousveillance (undersight) is necessary to a healthy, fair, and balanced society whenever surveillance (oversight) is already being used; and (2) sousveillance has numerous moral, ethical, socioeconomic, humanistic/humanitarian, and practical justifications that will guarantee its widespread adoption, despite opposing sociopolitical forces.

  • How (Using) the Web (Mindfully) Can Make You Smarter

    This chapter contains sections titled: Digging into Dataveillance, The Public Sphere, Remix Ethics and the Politics of Enclosure, What's a Parent to Do? What's a Parent to Know?, Five Literacies in a Nutshell, Literacy as Lever, as Divide



Standards related to Dataveillance

Back to Top

No standards are currently tagged "Dataveillance"


Jobs related to Dataveillance

Back to Top