Difference between revisions of "The Security Vision Database"

From Security Vision
Jump to: navigation, search
 
(44 intermediate revisions by 2 users not shown)
Line 7: Line 7:
 
}}
 
}}
 
-->
 
-->
 
 
<div class="fast-track">
 
<div class="fast-track">
 
 
<div class="card-body start-card">
 
<div class="card-body start-card">
<h4 class="card-title">[[How_to_contribute:_Getting_Started|Getting Started]]</h4>
+
<h4 class="card-title">[https://www.securityvision.io/wiki/index.php/Category:Deployments Deployments]</h4>
 
</div>
 
</div>
  
 +
<div class="card-body dataset-card">
 +
<h4 class="card-title">[https://www.securityvision.io/wiki/index.php/Category:Dataset Datasets]</h4>
 +
</div>
  
<div class="card-body search-card">
+
<div class="card-body inst-card">
<h4 class="card-title">[[Special:Search|Search in the database]]</h4>
+
<h4 class="card-title">[https://www.securityvision.io/wiki/index.php/Category:Institution Institutions]</h4>
 
</div>
 
</div>
  
 +
</div>
  
<div class="card-body dataviz-card">
+
<div class="fast-track">
<h4 class="card-title">[[Data_visualization|3D Dataviz]]</h4>
+
<div class="card-body prod-card">
 +
<h4 class="card-title">[https://www.securityvision.io/wiki/index.php/Category:Products Products]</h4>
 
</div>
 
</div>
  
<div class="card-body account-card">
+
<div class="card-body city-card">
<h4 class="card-title">[[Special:CreateAccount|Create an account]]</h4>
+
<h4 class="card-title">[https://www.securityvision.io/wiki/index.php/Category:City Cities]</h4>
 
</div>
 
</div>
  
 
+
<div class="card-body country-card">
 +
<h4 class="card-title">[https://www.securityvision.io/wiki/index.php/Category:Country Countries]</h4>
 +
</div>
 
</div>
 
</div>
 
 
 
  
 
==== '''What is the Security Vision Database?''' ====  
 
==== '''What is the Security Vision Database?''' ====  
We call "security vision" technologies systems that utilize algorithmic image processing for purposes of security. Images can be visual, but also acoustic, thermal, etc. The most common technologies include for example [[Facial Recognition|facial recognition]], [[Iris Recognition|iris]] and [[Fingerprint Recognition|fingerprint recognition]], [[Object Detection|object detection]], [[Object Tracking|object tracking]], etc. These technologies are deployed for a variety of purposes: [[surveillance]], [[Crime Prevention|crime prevention]], [[Border Control|border control]], [[Health Surveillance|public health surveillance]], [[Traffic Surveillance|traffic control]], but also [[Political Surveillance|political]] or [[Labor Surveillance|labor surveillance]]. The Security Vision Database is an attempt at documenting their existence across the world.
+
The Security Vision Database is an attempt at documenting the existence of what we call "security vision" technologies accross the world. By this, we mean systems that utilize algorithmic image processing for purposes of security. Images can be visual, but also acoustic, thermal, etc. The most common technologies include for example [[Facial Recognition|facial recognition]], [[Iris Recognition|iris]] and [[Fingerprint Recognition|fingerprint recognition]], [[Object Detection|object detection]], [[Object Tracking|object tracking]], etc. These technologies are deployed for a variety of purposes: [[surveillance]], [[Crime Prevention|crime prevention]], [[Border Control|border control]], [[Health Surveillance|public health surveillance]], [[Traffic Surveillance|traffic control]], but also [[Political Surveillance|political]] or [[Labor Surveillance|labor surveillance]]. You can start browsing from any of the categories above, or use the search bar. You can also browse the dataset visually through our graph and map visualisations.
  
==== '''What data is there?''' ====
 
The data collected here is based on original research carried out by Security Vision researchers on openly accessible documents over a period of several months from 2021 to 2024. It also contains data collected by several citizen initiatives such as [https://technopolice.fr/ Technopolice] or [https://atlasofsurveillance.org/ Atlas of Surveillance]. We reference all the sources we used, so all the data can be traced. References are indicated on each deployment page and stored in a [https://www.zotero.org/groups/2801066/security_vision_database_references/library group library on Zotero which is publicly accessible online]. You can find a detailed guide on how we collected data and how we organized it in the database [[Methodology|here]].
 
  
==== '''What are unknowns and uncertains?''' ====
+
<div class="fast-track">
We did our best to collect the most complete information on each aspect of the security vision deployments, but sometimes, the information is just unknown. Either because it's secret, unavailable, inaccessible or just not public. In all the cases in which we encountered missing information, we marked this information as unknown. Similarly, we acknowledge that not all parts of the dataset are equally well documented. Some data points are certain, some are rumors, and some are just speculation based on available data. For each of these cases, we mark the entries clearly as such.  
+
<div class="card-body search-card">
 +
<h4 class="card-title">[https://www.securityvision.io/wiki/index.php?search Search]</h4>
 +
</div>
  
==== '''Can I see the dataset in a visual form?''' ====
 
We have worked to represent our dataset in at least two different forms: in a 3 dimensional graph, and in a geographical map. Each of the visualizations is interactive and allows to create your own journey through the data. We have made sure that the data visualization also represents our concern with incomplete data, and in both visualizations we represent it differently.
 
  
==== '''What is the purpose of this project?''' ====
+
<div class="card-body dataviz-card">
While the researchers who have contributed to this wiki are academic researchers, the objective is to provide and present information that can be useful for the public debate on the uses of AI technologies in the field of security. For this reason, everyone is encouraged to contribute.
+
<h4 class="card-title">[https://www.securityvision.io/viz/sv-3d-06/ Graph & Map] (↗︎)</h4>
 +
</div>
 +
</div>
  
==== '''How can I contribute?''' ====
 
The database is structured as a wiki, which contains both structured data (with a limited number of choices) and descriptive, open text. Everyone is welcome to contribute, editing existing records or adding new ones. In order to meet the standards of academic research, all contributions need to based on published information and are submitted to a review procedure. If this is the first time you are editing this wiki, please make sure you read the [[Help:Getting Started]] on how to import text, quote references and other important rules to follow in order to keep a tidy and coherent wiki.
 
  
==== '''Who created the database?''' ====
+
<!-- Hide "what links here", see Header Footer extension-->
The database has been developed by the team of [http://www.securityvision.io Security Vision], a research project [https://cordis.europa.eu/project/id/866535 funded by the European Research Council] and based in [https://www.universiteitleiden.nl/en/social-behavioural-sciences/political-science Leiden University's Institute of Political Science]. See more on the [[Credits|credits page]] about the exact participants.
 
 
 
==== '''How to cite?''' ====
 
You are welcome to cite the Security Vision Wiki as a source for your research. Please use the following format: "Article Title", ''The Security Vision Wiki'', Security Vision, DATE, Accessible at URL. For example:  “Living Lab International Zone”, ''The Security Vision Wiki'', Security Vision, 01/09/2024, Accessible at https://www.securityvision.io/wiki/index.php/Living_Lab_International_Zone.
 
 
__NOTOC__
 
__NOTOC__
 
<!-- Hide "what links here", see Header Footer extension-->
 
 
__NONSFOOTER__
 
__NONSFOOTER__

Latest revision as of 16:52, 23 April 2024

What is the Security Vision Database?[edit | ]

The Security Vision Database is an attempt at documenting the existence of what we call "security vision" technologies accross the world. By this, we mean systems that utilize algorithmic image processing for purposes of security. Images can be visual, but also acoustic, thermal, etc. The most common technologies include for example facial recognition, iris and fingerprint recognition, object detection, object tracking, etc. These technologies are deployed for a variety of purposes: surveillance, crime prevention, border control, public health surveillance, traffic control, but also political or labor surveillance. You can start browsing from any of the categories above, or use the search bar. You can also browse the dataset visually through our graph and map visualisations.



Graph & Map (↗︎)