ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Ubiquitous Technical Surveillance An Introduction

Journal: International Journal of Trend in Scientific Research and Development (Vol.8, No. 4)

Publication Date:

Authors : ;

Page : 231-239

Keywords : Ubiquitous surveillance; data; metadata; covert; overt; ubiquitous computing; UTS threat vectors; telematics data;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Ubiquitous technical surveillance UTS is the collection and long term storage of data in order to analyze and connect individuals with other people, activities, and organizations. Our data and as well as associated metadata are valuable commodity for commercial organizations who use it to discover what their clients customers want, shape how they market the product, and serve it up in a way that will make you buy it. Metadata is the summary and the description about your data which is used to classify, organize, label, and understand data, making sorting and the searching for data much easier – this makes the huge amounts of data created and collected across an enterprise to be manageable by organizations. Unprotected metadata can be revealed to the wrong person such as hackers, malicious competitors, and cybercriminals. This paper delves into some of the challenges of ubiquitous surveillance and the way forward. Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku "Ubiquitous Technical Surveillance: An Introduction" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-4 , August 2024, URL: https://www.ijtsrd.com/papers/ijtsrd67144.pdf Paper Url: https://www.ijtsrd.com/computer-science/other/67144/ubiquitous-technical-surveillance-an-introduction/paul-a-adekunte

Last modified: 2024-09-18 21:43:31