Methodology

From Security Vision
Revision as of 15:32, 18 April 2024 by Francesco (talk | contribs)
Jump to: navigation, search

Data Collection[edit | ]

Strategy[edit | ]

Researchers affiliated with the Security Vision project (refer to Credits section for details) have conducted systematic internet queries utilizing pertinent keywords associated with the central theme of the investigation (facial recognition, movement recognition, etc.) across different intervals from 2021 to 2024. The searches were conducted in Arabic, Bosnian/Croatian/Serbian, English, French, Italian, Mandarin Chinese, Russian, Spanish. Starting with initial results, researchers progressively expanded the research corpus through snowball sampling. In this sense, this dataset follows the logic of a wiki. Rather than a comprehensive set of comprehensive data points, it collects the information that is available.

Participatory data collection[edit | ]

After the initial launch of the Security Vision Database, the data is collected through participatory contributions, similarly to Wikipedia. To ensure accuracy and reliability of the information, all submissions are reviewed by Security Vision.

Referencing[edit | ]

All the information contained in this wiki can be traced back to its original source. All references are indicated in the pages, and collected in a Zotero library accessible here.


Data Categorization[edit | ]

In this section, we explain some of the most important choices when categorizing information in our database.

Deployments[edit | ]

  • Information Certainty. We've organized the information we gathered into three tiers of certainty. "Documented" denotes facts solidly supported by reliable sources. "Rumored" encompasses information reported as potentially true but lacking confirmation. Lastly, "Speculative" pertains to deployments inferred from multiple factual pieces but lacking explicit confirmation.
  • Deployment Status. While the categories are self-explanatory, we distinguished "stopped" deployments, which have been interrupted due to the intervention of a court or a watchdog for example, and deployments that have naturally "concluded", either as part of an experimentation, or because they have for example been replaced with other systems.
  • Deployment Purpose. We distinguish the following purposes for which security vision systems are implemented:
    • Access Control: systems used to authenticate individuals who can access an area (whitelist) or who are banned from it (blacklist).
    • Automated Payments: systems using computer vision to connect to payment services.
    • Border Control: systems used to identify travelers at the border.
    • Commercial Surveillance: systems used to collect information and analyze customer behavior with the purpose of impacting sales.
    • Crime Prevention: systems used to prevent or discourage criminal behavior
    • Criminal Investigations: systems used after a crime has taken place in the context of criminal investigation (for example to identify individuals).
    • Crowd Management: systems to gain insights on crowds and collective behaviour of people.
    • Fraud Prevention: systems aimed at preventing fraud.
    • Fugitive Detection: systems aimed at identifying fugitives from prisons.
    • Health Surveillance: systems aimed at detecting diseases (through thermal monitoring) and/or the application of health measures (covid-19 mask detection for example).
    • Labor Surveillance: systems aimed at detecting absenteeism from work.
    • Missing Person Recovery: systems aimed at identifying missing persons.
    • Political Surveillance: systems aimed at exercising political control over specific individuals.
    • Refugee Identification: systems aimed at identifying refugees.
    • Student Surveillance: systems aimed at detecting absenteeism from school or university.
    • Surveillance: systems generally aimed at identifying and tracking individuals.
    • Targeted Advertising: a specific type of commercial surveillance, aimed at serving targeted advertisement to identified individuals.
    • Traffic Surveillance: systems aimed at detecting traffic issues.
    • Voter & ID Registration: systems aimed at identifying citizens or voters as part of national registries.
    • War Operations: systems aimed at identifying individuals or other forms of control in the context of conflicts.
  • Managed by (custodian). The institution in charge of the maintenance of the system.
  • Used by Institutions who have access to the system.
  • Dataset used The dataset used by the system.
  • Software used The specific products used by the system.

Datasets[edit | ]

  • Information Certainty. See above
  • Dataset category. Datasets are divided between datasets mainly used for civilian administration purposes (identity cards, drivers licenses) and law enforcement purposes (registers of known criminals, refugees, etc).
  • Developed by. The institution that has collected the information contained in the dataset and/or has made it available.
  • Contents. Specifies the type of contents available in the dataset (Facial images, fingerprints, etc.)
  • Owned by. Specifies who is the owner of the dataset. Please note that it might be a different organization from the custodian, i.e. the organization in charge of maintaining and running the dataset.
  • Funding. Additional information on the cost of creating the dataset
  • Images. Number of images contained in the dataset
  • Individuals. Number of individuals contained in the dataset. There can be more images from the same individuals, hence the difference.

Institutions[edit | ]

Institution is the generic term we use to define any legal entity that is involved in security vision systems.

  • Institution Type. We distinguish companies (which produce, sell and provide services of security vision systems), public institutions, such as national and local governments, which can be both producers or consumers of such systems, law enforcement bodies who are generally the main users of the systems and NGOs that are involved in different degrees of contestation of the systems.
  • Institution Sector. This defines the general area of operation of the institution. We define sectors as follows:
    • Academic: Universities, research centers, applied science institutions
    • Advocacy: Institutions involved in advocacy: NGOs involved in advocacy campaigns, governmental watchdogs.
    • Administration: Bureaucracies involved in the general administration of public life.
    • Art: Artistic projects or institutions
    • Education: Institutions related to the schooling system.
    • Energy: Institutions involved in the production or regulation of energy (electricity, oil, etc.)
    • Finance: Financial institutions
    • Health: Institutions involved in public health, ministries, hospitals, clinics.
    • Humanitarian: Institutions involved in providing humanitarian aid and support.
    • Retail: Institutions that sell goods and services directly to consumers for personal or household use.
    • Security: Institutions whose primary objective is the provision of security services, be them private or public. Security systems companies, law enforcement agencies, etc. They might sell security technologies, but as part of a broader involved in the security sector. For example: Thales, the Chicago Police Department.
    • Technology. Institutions primarily focused on developing software or hardware applications. While they may offer security technologies, these are typically part of a wider array of technological applications, which can span across several other sectors (health, agriculture, education, etc.). For example: Amazon, Google.
    • Telecom. Institutions involved in the provision or services in or the regulation of telecommunications.
    • Transportation. Institutions involved in the provision or services in or the regulation of transportation: Harbors, airports, etc.

Products[edit | ]

  • Developed by: The institution (company, university, ministry) that developed the product.
  • Technology Type:
    • ANPR: Automated Number Plate Recognition
    • Anomaly Detection:
    • Audio Recognition
    • Control and command center
    • Crowd Management
    • Database software
    • Ear acoustics
    • Emotion Recognition
    • Face Mask Recognition
    • Facial Recognition
    • Facial Recognition - Age Recognition
    • Facial Recognition - Authentication
    • Facial Recognition - Gender Recognition
    • Facial Recognition - Live
    • Facial Recognition - Retrospective
    • Finger Vein Recognition
    • Fingerprint Recognition
    • Gunshot Detection
    • Iris Recognition
    • Movement Recognition
    • Object Detection
    • Object Tracking
    • Pattern Recognition
    • People Tracking
    • Predictive Policing
    • Smartphone App
    • Social Distancing Monitor
    • Social Media Monitoring
    • Thermal Camera
    • Video Analysis
    • Video Summarization
    • Violence Detection
    • Voice Recognition