No Cover Image

Journal article 1091 views 131 downloads

Surveillance and identity: conceptual framework and formal models

Victoria Wang, John Tucker Orcid Logo

Journal of Cybersecurity, Volume: 3, Issue: 3, Pages: 145 - 158

Swansea University Author: John Tucker Orcid Logo

  • APCCD81CRAZ.pdf

    PDF | Version of Record

    Released under the terms of a Creative Commons Attribution Non-Commercial License (CC-BY-NC).

    Download (261.88KB)

Check full text

DOI (Published version): 10.1093/cybsec/tyx010

Abstract

Surveillance is recognised as a social phenomenon that is commonplace, employed by governments, companies and communities for a wide variety of reasons. Surveillance is fundamental in cybersecurity as it provides tools for prevention and detection; it is also a source of controversies related to pri...

Full description

Published in: Journal of Cybersecurity
ISSN: 2057-2085 2057-2093
Published: Oxford University Press (OUP) 2017
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa37276
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract: Surveillance is recognised as a social phenomenon that is commonplace, employed by governments, companies and communities for a wide variety of reasons. Surveillance is fundamental in cybersecurity as it provides tools for prevention and detection; it is also a source of controversies related to privacy and freedom. Building on general studies of surveillance, we identify and analyse certain concepts that are central to surveillance. To do this we employ formal methods based on elementary algebra. First, we show that disparate forms of surveillance have a common structure and can be unified by abstract mathematical concepts. The model shows that (i) finding identities and (ii) sorting identities into categories are fundamental in conceptualising surveillance. Secondly, we develop a formal model that theorizes identity as abstract data that we call identifiers. The model views identity through the computational lens of the theory of abstract data types. We examine the ways identifiers depend upon each other; and show that the provenance of identifiers depends upon translations between systems of identifiers.
Keywords: surveillance, social sorting, identity, abstract data types, formal methods
College: Faculty of Science and Engineering
Issue: 3
Start Page: 145
End Page: 158