Home / Technology Policy & Ethics / September 2020

Technology Policy & Ethics: September 2020

Inclusive Privacy Consenting in Public Video Surveillance and Future Directions

Ankur Chattopadhyay, Northern Kentucky University, Jordan Sommer, University of Wisconsin – Green Bay, and Robert Ruska Jr., Northern Kentucky University

Mainstream public video-surveillance systems are not generally designed to provide accommodations for under-privileged and under-represented subjects [1, 2]. These subjects comprise of physically-challenged individuals, visually-impaired people and senior-citizens. With the recent emergence of the GDPR act [3, 4], all surveillance data subjects, including these under-served populations, need to be offered an opportunity to provide consent, according to the Opt-in and Opt-out rule, regarding being recorded on closed-circuit televisions (CCTV) and other security cameras. Research advances in privacy-enhancing innovations [5, 6], and privacy-mediating features [6, 7] have helped visual-surveillance systems evolve towards offering more subject-centric privacy consenting options. However, these present state-of-the-art technologies do not account for the under-served people. In order to be more inclusive in its privacy-mediating design, a video surveillance system needs to address the difficulties posed by technologies to the under-served subjects. In this article, we discuss this potential gap in research work, and explore the need of designing more inclusive privacy consenting functionalities within video-surveillance systems.

Read more.

Cloud technologies: All-Cloud IT Operating Model

Dr. Petar Radanliev and Prof. Dave De Roure, Department of Engineering Sciences, University of Oxford

Why are the IT operational strategies transforming from data centers ownership into an all-cloud subscription?

The traditional IT operating models are slowly becoming obsolete in the new digital age. New ‘all-cloud operations’ emerge from the digital transformation and require a new mindset. In the all-cloud operations, developers and business executives translate the products, services, constraints, and security controls into cloud architectures and data models. As this transformation from capital intensive IT operations is evolving into low-asset, all-cloud digital IT operations, the role of IT operations is also manager is evolving. This will inevitably cause some discomfort, but for those that can embrace these changes, the career opportunities will amplify.

Read more.

Technology Policy and Ethics Editorial Board


Dr. Ali Kashif Bashir
Editor-in-Chief

Dr. Mudassar Ahmad

Dr. Syed Hassan Ahmed

Dr. Onur Alparslan

Dr. Muhammad Bilal

Dr. Syed Ahmad Chan Bukhari

Dr. Syed Hashim Raza Bukhari

Dr. Ankur Chattopadhyay

Dr. Junaid Chaudhry

Dr. Waleed Ejaz

Dr. Mohamed Elhoseny

Dr. Yasir Faheem

Dr. Prasun Ghosal

Dr. Tahir Hameed

Dr. Sinan Hanay

Dr. Shagufta Henna

Dr. Fatima Hussain

Dr. Rasheed Hussain

Dr. Steve Jones

Dr. Mohammad Saud Khan

Dr. Mohammad Khosravi

Olga Kiconco

Dr. Varun G Menon

Dr. Anand Nayyar

Dr. Zeeshan Pervez

Dr. Gunasekaran Manogaran

Dr. Shalli Rani

Dr. Mubashir Husain Rehmani
Dr. Kashif Saleem
Dr. Kathiravan Srinivasan

Dr. Manik Sharma

Dr. Ahmed Toaha Mobashsher