Journal article 1190 views 159 downloads
Surveillance and identity: conceptual framework and formal models
Journal of Cybersecurity, Volume: 3, Issue: 3, Pages: 145 - 158
Swansea University Author: John Tucker
-
PDF | Version of Record
Released under the terms of a Creative Commons Attribution Non-Commercial License (CC-BY-NC).
Download (261.88KB)
DOI (Published version): 10.1093/cybsec/tyx010
Abstract
Surveillance is recognised as a social phenomenon that is commonplace, employed by governments, companies and communities for a wide variety of reasons. Surveillance is fundamental in cybersecurity as it provides tools for prevention and detection; it is also a source of controversies related to pri...
Published in: | Journal of Cybersecurity |
---|---|
ISSN: | 2057-2085 2057-2093 |
Published: |
Oxford University Press (OUP)
2017
|
Online Access: |
Check full text
|
URI: | https://cronfa.swan.ac.uk/Record/cronfa37276 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
first_indexed |
2017-11-30T04:54:57Z |
---|---|
last_indexed |
2023-02-09T03:46:04Z |
id |
cronfa37276 |
recordtype |
SURis |
fullrecord |
<?xml version="1.0"?><rfc1807><datestamp>2023-02-08T16:50:01.2316914</datestamp><bib-version>v2</bib-version><id>37276</id><entry>2017-11-29</entry><title>Surveillance and identity: conceptual framework and formal models</title><swanseaauthors><author><sid>431b3060563ed44cc68c7056ece2f85e</sid><ORCID>0000-0003-4689-8760</ORCID><firstname>John</firstname><surname>Tucker</surname><name>John Tucker</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2017-11-29</date><deptcode>SCS</deptcode><abstract>Surveillance is recognised as a social phenomenon that is commonplace, employed by governments, companies and communities for a wide variety of reasons. Surveillance is fundamental in cybersecurity as it provides tools for prevention and detection; it is also a source of controversies related to privacy and freedom. Building on general studies of surveillance, we identify and analyse certain concepts that are central to surveillance. To do this we employ formal methods based on elementary algebra. First, we show that disparate forms of surveillance have a common structure and can be unified by abstract mathematical concepts. The model shows that (i) finding identities and (ii) sorting identities into categories are fundamental in conceptualising surveillance. Secondly, we develop a formal model that theorizes identity as abstract data that we call identifiers. The model views identity through the computational lens of the theory of abstract data types. We examine the ways identifiers depend upon each other; and show that the provenance of identifiers depends upon translations between systems of identifiers.</abstract><type>Journal Article</type><journal>Journal of Cybersecurity</journal><volume>3</volume><journalNumber>3</journalNumber><paginationStart>145</paginationStart><paginationEnd>158</paginationEnd><publisher>Oxford University Press (OUP)</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint>2057-2085</issnPrint><issnElectronic>2057-2093</issnElectronic><keywords>surveillance, social sorting, identity, abstract data types, formal methods</keywords><publishedDay>15</publishedDay><publishedMonth>11</publishedMonth><publishedYear>2017</publishedYear><publishedDate>2017-11-15</publishedDate><doi>10.1093/cybsec/tyx010</doi><url/><notes/><college>COLLEGE NANME</college><department>Computer Science</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>SCS</DepartmentCode><institution>Swansea University</institution><degreesponsorsfunders>RCUK, EP/N028139/1</degreesponsorsfunders><apcterm/><funders/><projectreference/><lastEdited>2023-02-08T16:50:01.2316914</lastEdited><Created>2017-11-29T21:11:53.0529641</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Mathematics and Computer Science - Computer Science</level></path><authors><author><firstname>Victoria</firstname><surname>Wang</surname><order>1</order></author><author><firstname>John</firstname><surname>Tucker</surname><orcid>0000-0003-4689-8760</orcid><order>2</order></author></authors><documents><document><filename>0037276-18012018105801.pdf</filename><originalFilename>APCCD81CRAZ.pdf</originalFilename><uploaded>2018-01-18T10:58:01.7630000</uploaded><type>Output</type><contentLength>276859</contentLength><contentType>application/pdf</contentType><version>Version of Record</version><cronfaStatus>true</cronfaStatus><documentNotes>Released under the terms of a Creative Commons Attribution Non-Commercial License (CC-BY-NC).</documentNotes><copyrightCorrect>true</copyrightCorrect><language>eng</language><licence>http://creativecommons.org/licenses/by-nc/4.0/</licence></document></documents><OutputDurs/></rfc1807> |
spelling |
2023-02-08T16:50:01.2316914 v2 37276 2017-11-29 Surveillance and identity: conceptual framework and formal models 431b3060563ed44cc68c7056ece2f85e 0000-0003-4689-8760 John Tucker John Tucker true false 2017-11-29 SCS Surveillance is recognised as a social phenomenon that is commonplace, employed by governments, companies and communities for a wide variety of reasons. Surveillance is fundamental in cybersecurity as it provides tools for prevention and detection; it is also a source of controversies related to privacy and freedom. Building on general studies of surveillance, we identify and analyse certain concepts that are central to surveillance. To do this we employ formal methods based on elementary algebra. First, we show that disparate forms of surveillance have a common structure and can be unified by abstract mathematical concepts. The model shows that (i) finding identities and (ii) sorting identities into categories are fundamental in conceptualising surveillance. Secondly, we develop a formal model that theorizes identity as abstract data that we call identifiers. The model views identity through the computational lens of the theory of abstract data types. We examine the ways identifiers depend upon each other; and show that the provenance of identifiers depends upon translations between systems of identifiers. Journal Article Journal of Cybersecurity 3 3 145 158 Oxford University Press (OUP) 2057-2085 2057-2093 surveillance, social sorting, identity, abstract data types, formal methods 15 11 2017 2017-11-15 10.1093/cybsec/tyx010 COLLEGE NANME Computer Science COLLEGE CODE SCS Swansea University RCUK, EP/N028139/1 2023-02-08T16:50:01.2316914 2017-11-29T21:11:53.0529641 Faculty of Science and Engineering School of Mathematics and Computer Science - Computer Science Victoria Wang 1 John Tucker 0000-0003-4689-8760 2 0037276-18012018105801.pdf APCCD81CRAZ.pdf 2018-01-18T10:58:01.7630000 Output 276859 application/pdf Version of Record true Released under the terms of a Creative Commons Attribution Non-Commercial License (CC-BY-NC). true eng http://creativecommons.org/licenses/by-nc/4.0/ |
title |
Surveillance and identity: conceptual framework and formal models |
spellingShingle |
Surveillance and identity: conceptual framework and formal models John Tucker |
title_short |
Surveillance and identity: conceptual framework and formal models |
title_full |
Surveillance and identity: conceptual framework and formal models |
title_fullStr |
Surveillance and identity: conceptual framework and formal models |
title_full_unstemmed |
Surveillance and identity: conceptual framework and formal models |
title_sort |
Surveillance and identity: conceptual framework and formal models |
author_id_str_mv |
431b3060563ed44cc68c7056ece2f85e |
author_id_fullname_str_mv |
431b3060563ed44cc68c7056ece2f85e_***_John Tucker |
author |
John Tucker |
author2 |
Victoria Wang John Tucker |
format |
Journal article |
container_title |
Journal of Cybersecurity |
container_volume |
3 |
container_issue |
3 |
container_start_page |
145 |
publishDate |
2017 |
institution |
Swansea University |
issn |
2057-2085 2057-2093 |
doi_str_mv |
10.1093/cybsec/tyx010 |
publisher |
Oxford University Press (OUP) |
college_str |
Faculty of Science and Engineering |
hierarchytype |
|
hierarchy_top_id |
facultyofscienceandengineering |
hierarchy_top_title |
Faculty of Science and Engineering |
hierarchy_parent_id |
facultyofscienceandengineering |
hierarchy_parent_title |
Faculty of Science and Engineering |
department_str |
School of Mathematics and Computer Science - Computer Science{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Mathematics and Computer Science - Computer Science |
document_store_str |
1 |
active_str |
0 |
description |
Surveillance is recognised as a social phenomenon that is commonplace, employed by governments, companies and communities for a wide variety of reasons. Surveillance is fundamental in cybersecurity as it provides tools for prevention and detection; it is also a source of controversies related to privacy and freedom. Building on general studies of surveillance, we identify and analyse certain concepts that are central to surveillance. To do this we employ formal methods based on elementary algebra. First, we show that disparate forms of surveillance have a common structure and can be unified by abstract mathematical concepts. The model shows that (i) finding identities and (ii) sorting identities into categories are fundamental in conceptualising surveillance. Secondly, we develop a formal model that theorizes identity as abstract data that we call identifiers. The model views identity through the computational lens of the theory of abstract data types. We examine the ways identifiers depend upon each other; and show that the provenance of identifiers depends upon translations between systems of identifiers. |
published_date |
2017-11-15T03:46:55Z |
_version_ |
1763752243562020864 |
score |
11.035634 |