No Cover Image

Journal article 547 views 57 downloads

Surveillance and identity: conceptual framework and formal models / Victoria Wang, John Tucker

Journal of Cybersecurity, Volume: 3, Issue: 3, Pages: 145 - 158

Swansea University Author: John Tucker

  • APCCD81CRAZ.pdf

    PDF | Version of Record

    Released under the terms of a Creative Commons Attribution Non-Commercial License (CC-BY-NC).

    Download (261.88KB)

Check full text

DOI (Published version): 10.1093/cybsec/tyx010

Abstract

Surveillance is recognised as a social phenomenon that is commonplace, employed by governments, companies and communities for a wide variety of reasons. Surveillance is fundamental in cybersecurity as it provides tools for prevention and detection; it is also a source of controversies related to pri...

Full description

Published in: Journal of Cybersecurity
ISSN: 2057-2085 2057-2093
Published: Oxford University Press (OUP) 2017
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa37276
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2017-11-30T04:54:57Z
last_indexed 2021-01-29T03:57:19Z
id cronfa37276
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2021-01-28T13:22:54.5830586</datestamp><bib-version>v2</bib-version><id>37276</id><entry>2017-11-29</entry><title>Surveillance and identity: conceptual framework and formal models</title><swanseaauthors><author><sid>431b3060563ed44cc68c7056ece2f85e</sid><ORCID>0000-0003-4689-8760</ORCID><firstname>John</firstname><surname>Tucker</surname><name>John Tucker</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2017-11-29</date><deptcode>SCS</deptcode><abstract>Surveillance is recognised as a social phenomenon that is commonplace, employed by governments, companies and communities for a wide variety of reasons. Surveillance is fundamental in cybersecurity as it provides tools for prevention and detection; it is also a source of controversies related to privacy and freedom. Building on general studies of surveillance, we identify and analyse certain concepts that are central to surveillance. To do this we employ formal methods based on elementary algebra. First, we show that disparate forms of surveillance have a common structure and can be unified by abstract mathematical concepts. The model shows that (i) finding identities and (ii) sorting identities into categories are fundamental in conceptualising surveillance. Secondly, we develop a formal model that theorizes identity as abstract data that we call identifiers. The model views identity through the computational lens of the theory of abstract data types. We examine the ways identifiers depend upon each other; and show that the provenance of identifiers depends upon translations between systems of identifiers.</abstract><type>Journal Article</type><journal>Journal of Cybersecurity</journal><volume>3</volume><journalNumber>3</journalNumber><paginationStart>145</paginationStart><paginationEnd>158</paginationEnd><publisher>Oxford University Press (OUP)</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint>2057-2085</issnPrint><issnElectronic>2057-2093</issnElectronic><keywords>surveillance, social sorting, identity, abstract data types, formal methods</keywords><publishedDay>15</publishedDay><publishedMonth>11</publishedMonth><publishedYear>2017</publishedYear><publishedDate>2017-11-15</publishedDate><doi>10.1093/cybsec/tyx010</doi><url/><notes/><college>COLLEGE NANME</college><department>Computer Science</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>SCS</DepartmentCode><institution>Swansea University</institution><degreesponsorsfunders>RCUK, EP/N028139/1</degreesponsorsfunders><apcterm/><lastEdited>2021-01-28T13:22:54.5830586</lastEdited><Created>2017-11-29T21:11:53.0529641</Created><path><level id="1"/><level id="2"/></path><authors><author><firstname>Victoria</firstname><surname>Wang</surname><order>1</order></author><author><firstname>John</firstname><surname>Tucker</surname><orcid>0000-0003-4689-8760</orcid><order>2</order></author></authors><documents><document><filename>0037276-18012018105801.pdf</filename><originalFilename>APCCD81CRAZ.pdf</originalFilename><uploaded>2018-01-18T10:58:01.7630000</uploaded><type>Output</type><contentLength>276859</contentLength><contentType>application/pdf</contentType><version>Version of Record</version><cronfaStatus>true</cronfaStatus><documentNotes>Released under the terms of a Creative Commons Attribution Non-Commercial License (CC-BY-NC).</documentNotes><copyrightCorrect>true</copyrightCorrect><language>eng</language><licence>http://creativecommons.org/licenses/by-nc/4.0/</licence></document></documents><OutputDurs/></rfc1807>
spelling 2021-01-28T13:22:54.5830586 v2 37276 2017-11-29 Surveillance and identity: conceptual framework and formal models 431b3060563ed44cc68c7056ece2f85e 0000-0003-4689-8760 John Tucker John Tucker true false 2017-11-29 SCS Surveillance is recognised as a social phenomenon that is commonplace, employed by governments, companies and communities for a wide variety of reasons. Surveillance is fundamental in cybersecurity as it provides tools for prevention and detection; it is also a source of controversies related to privacy and freedom. Building on general studies of surveillance, we identify and analyse certain concepts that are central to surveillance. To do this we employ formal methods based on elementary algebra. First, we show that disparate forms of surveillance have a common structure and can be unified by abstract mathematical concepts. The model shows that (i) finding identities and (ii) sorting identities into categories are fundamental in conceptualising surveillance. Secondly, we develop a formal model that theorizes identity as abstract data that we call identifiers. The model views identity through the computational lens of the theory of abstract data types. We examine the ways identifiers depend upon each other; and show that the provenance of identifiers depends upon translations between systems of identifiers. Journal Article Journal of Cybersecurity 3 3 145 158 Oxford University Press (OUP) 2057-2085 2057-2093 surveillance, social sorting, identity, abstract data types, formal methods 15 11 2017 2017-11-15 10.1093/cybsec/tyx010 COLLEGE NANME Computer Science COLLEGE CODE SCS Swansea University RCUK, EP/N028139/1 2021-01-28T13:22:54.5830586 2017-11-29T21:11:53.0529641 Victoria Wang 1 John Tucker 0000-0003-4689-8760 2 0037276-18012018105801.pdf APCCD81CRAZ.pdf 2018-01-18T10:58:01.7630000 Output 276859 application/pdf Version of Record true Released under the terms of a Creative Commons Attribution Non-Commercial License (CC-BY-NC). true eng http://creativecommons.org/licenses/by-nc/4.0/
title Surveillance and identity: conceptual framework and formal models
spellingShingle Surveillance and identity: conceptual framework and formal models
John, Tucker
title_short Surveillance and identity: conceptual framework and formal models
title_full Surveillance and identity: conceptual framework and formal models
title_fullStr Surveillance and identity: conceptual framework and formal models
title_full_unstemmed Surveillance and identity: conceptual framework and formal models
title_sort Surveillance and identity: conceptual framework and formal models
author_id_str_mv 431b3060563ed44cc68c7056ece2f85e
author_id_fullname_str_mv 431b3060563ed44cc68c7056ece2f85e_***_John, Tucker
author John, Tucker
author2 Victoria Wang
John Tucker
format Journal article
container_title Journal of Cybersecurity
container_volume 3
container_issue 3
container_start_page 145
publishDate 2017
institution Swansea University
issn 2057-2085
2057-2093
doi_str_mv 10.1093/cybsec/tyx010
publisher Oxford University Press (OUP)
document_store_str 1
active_str 0
description Surveillance is recognised as a social phenomenon that is commonplace, employed by governments, companies and communities for a wide variety of reasons. Surveillance is fundamental in cybersecurity as it provides tools for prevention and detection; it is also a source of controversies related to privacy and freedom. Building on general studies of surveillance, we identify and analyse certain concepts that are central to surveillance. To do this we employ formal methods based on elementary algebra. First, we show that disparate forms of surveillance have a common structure and can be unified by abstract mathematical concepts. The model shows that (i) finding identities and (ii) sorting identities into categories are fundamental in conceptualising surveillance. Secondly, we develop a formal model that theorizes identity as abstract data that we call identifiers. The model views identity through the computational lens of the theory of abstract data types. We examine the ways identifiers depend upon each other; and show that the provenance of identifiers depends upon translations between systems of identifiers.
published_date 2017-11-15T03:54:12Z
_version_ 1718095606462808064
score 10.84395