No Cover Image

Journal article 314 views 33 downloads

Surveillance and identity: conceptual framework and formal models / John, Tucker

Journal of Cybersecurity, Volume: 3, Issue: 3, Pages: 145 - 158

Swansea University Author: John, Tucker

  • APCCD81CRAZ.pdf

    PDF | Version of Record

    Released under the terms of a Creative Commons (CC-BY-NC) license.

    Download (261.88KB)

Check full text

DOI (Published version): 10.1093/cybsec/tyx010

Abstract

Surveillance is recognised as a social phenomenon that is commonplace, employed by governments, companies and communities for a wide variety of reasons. Surveillance is fundamental in cybersecurity as it provides tools for prevention and detection; it is also a source of controversies related to pri...

Full description

Published in: Journal of Cybersecurity
ISSN: 2057-2085 2057-2093
Published: Oxford University Press 2017
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa37276
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2017-11-30T04:54:57Z
last_indexed 2019-06-05T10:37:22Z
id cronfa37276
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2019-05-24T10:02:44.6257989</datestamp><bib-version>v2</bib-version><id>37276</id><entry>2017-11-29</entry><title>Surveillance and identity: conceptual framework and formal models</title><swanseaauthors><author><sid>431b3060563ed44cc68c7056ece2f85e</sid><ORCID>0000-0003-4689-8760</ORCID><firstname>John</firstname><surname>Tucker</surname><name>John Tucker</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2017-11-29</date><deptcode>SCS</deptcode><abstract>Surveillance is recognised as a social phenomenon that is commonplace, employed by governments, companies and communities for a wide variety of reasons. Surveillance is fundamental in cybersecurity as it provides tools for prevention and detection; it is also a source of controversies related to privacy and freedom. Building on general studies of surveillance, we identify and analyse certain concepts that are central to surveillance. To do this we employ formal methods based on elementary algebra. First, we show that disparate forms of surveillance have a common structure and can be unified by abstract mathematical concepts. The model shows that (i) finding identities and (ii) sorting identities into categories are fundamental in conceptualising surveillance. Secondly, we develop a formal model that theorizes identity as abstract data that we call identifiers. The model views identity through the computational lens of the theory of abstract data types. We examine the ways identifiers depend upon each other; and show that the provenance of identifiers depends upon translations between systems of identifiers.</abstract><type>Journal Article</type><journal>Journal of Cybersecurity</journal><volume>3</volume><journalNumber>3</journalNumber><paginationStart>145</paginationStart><paginationEnd>158</paginationEnd><publisher>Oxford University Press</publisher><issnPrint>2057-2085</issnPrint><issnElectronic>2057-2093</issnElectronic><keywords>surveillance, social sorting, identity, abstract data types, formal methods</keywords><publishedDay>15</publishedDay><publishedMonth>12</publishedMonth><publishedYear>2017</publishedYear><publishedDate>2017-12-15</publishedDate><doi>10.1093/cybsec/tyx010</doi><url>https://doi.org/10.1093/cybsec/tyx010</url><notes/><college>COLLEGE NANME</college><department>Computer Science</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>SCS</DepartmentCode><institution>Swansea University</institution><sponsorsfunders>RCUK, EP/N028139/1</sponsorsfunders><lastEdited>2019-05-24T10:02:44.6257989</lastEdited><Created>2017-11-29T21:11:53.0529641</Created><path><level id="1">College of Science</level><level id="2">Computer Science</level></path><authors><author><firstname>Victoria</firstname><surname>Wang</surname><order>1</order></author><author><firstname>John</firstname><surname>Tucker</surname><orcid>0000-0003-4689-8760</orcid><order>2</order></author></authors><documents><document><filename>0037276-18012018105801.pdf</filename><originalFilename>APCCD81CRAZ.pdf</originalFilename><uploaded>2018-01-18T10:58:01.7630000</uploaded><type>Output</type><contentLength>276859</contentLength><contentType>application/pdf</contentType><version>Version of Record</version><cronfaStatus>true</cronfaStatus><action/><embargoDate>2018-01-18T00:00:00.0000000</embargoDate><documentNotes>Released under the terms of a Creative Commons (CC-BY-NC) license.</documentNotes><copyrightCorrect>true</copyrightCorrect><language>eng</language></document></documents></rfc1807>
spelling 2019-05-24T10:02:44.6257989 v2 37276 2017-11-29 Surveillance and identity: conceptual framework and formal models 431b3060563ed44cc68c7056ece2f85e 0000-0003-4689-8760 John Tucker John Tucker true false 2017-11-29 SCS Surveillance is recognised as a social phenomenon that is commonplace, employed by governments, companies and communities for a wide variety of reasons. Surveillance is fundamental in cybersecurity as it provides tools for prevention and detection; it is also a source of controversies related to privacy and freedom. Building on general studies of surveillance, we identify and analyse certain concepts that are central to surveillance. To do this we employ formal methods based on elementary algebra. First, we show that disparate forms of surveillance have a common structure and can be unified by abstract mathematical concepts. The model shows that (i) finding identities and (ii) sorting identities into categories are fundamental in conceptualising surveillance. Secondly, we develop a formal model that theorizes identity as abstract data that we call identifiers. The model views identity through the computational lens of the theory of abstract data types. We examine the ways identifiers depend upon each other; and show that the provenance of identifiers depends upon translations between systems of identifiers. Journal Article Journal of Cybersecurity 3 3 145 158 Oxford University Press 2057-2085 2057-2093 surveillance, social sorting, identity, abstract data types, formal methods 15 12 2017 2017-12-15 10.1093/cybsec/tyx010 https://doi.org/10.1093/cybsec/tyx010 COLLEGE NANME Computer Science COLLEGE CODE SCS Swansea University RCUK, EP/N028139/1 2019-05-24T10:02:44.6257989 2017-11-29T21:11:53.0529641 College of Science Computer Science Victoria Wang 1 John Tucker 0000-0003-4689-8760 2 0037276-18012018105801.pdf APCCD81CRAZ.pdf 2018-01-18T10:58:01.7630000 Output 276859 application/pdf Version of Record true 2018-01-18T00:00:00.0000000 Released under the terms of a Creative Commons (CC-BY-NC) license. true eng
title Surveillance and identity: conceptual framework and formal models
spellingShingle Surveillance and identity: conceptual framework and formal models
John, Tucker
title_short Surveillance and identity: conceptual framework and formal models
title_full Surveillance and identity: conceptual framework and formal models
title_fullStr Surveillance and identity: conceptual framework and formal models
title_full_unstemmed Surveillance and identity: conceptual framework and formal models
title_sort Surveillance and identity: conceptual framework and formal models
author_id_str_mv 431b3060563ed44cc68c7056ece2f85e
author_id_fullname_str_mv 431b3060563ed44cc68c7056ece2f85e_***_John, Tucker
author John, Tucker
format Journal article
container_title Journal of Cybersecurity
container_volume 3
container_issue 3
container_start_page 145
publishDate 2017
institution Swansea University
issn 2057-2085
2057-2093
doi_str_mv 10.1093/cybsec/tyx010
publisher Oxford University Press
college_str College of Science
hierarchytype
hierarchy_top_id collegeofscience
hierarchy_top_title College of Science
hierarchy_parent_id collegeofscience
hierarchy_parent_title College of Science
department_str Computer Science{{{_:::_}}}College of Science{{{_:::_}}}Computer Science
url https://doi.org/10.1093/cybsec/tyx010
document_store_str 1
active_str 0
description Surveillance is recognised as a social phenomenon that is commonplace, employed by governments, companies and communities for a wide variety of reasons. Surveillance is fundamental in cybersecurity as it provides tools for prevention and detection; it is also a source of controversies related to privacy and freedom. Building on general studies of surveillance, we identify and analyse certain concepts that are central to surveillance. To do this we employ formal methods based on elementary algebra. First, we show that disparate forms of surveillance have a common structure and can be unified by abstract mathematical concepts. The model shows that (i) finding identities and (ii) sorting identities into categories are fundamental in conceptualising surveillance. Secondly, we develop a formal model that theorizes identity as abstract data that we call identifiers. The model views identity through the computational lens of the theory of abstract data types. We examine the ways identifiers depend upon each other; and show that the provenance of identifiers depends upon translations between systems of identifiers.
published_date 2017-12-15T12:55:30Z
_version_ 1650453727825362944
score 10.867679