Skip to main content

Table 7 List of primary studies

From: Surveillance and security: protecting electricity utilities and other critical infrastructures

ID

Primary study

Title

S1

[Gulijk et al., 2012]

Survey of surveillance technologies, including their specific identification for further work

S2

[Bellanova & Friedewald, 2011]

Smart Surveillance – State of the Art

S3

[Guelke et al., 2013]

Matrix of Surveillance Technologies

S4

[Schlehahn et al., 2013]

Report on surveillance technology and privacy enhancing design

S5

[Nguyen et al., 2009]

Encountering SenseCam: Personal Recording Technologies in Everyday Life

S6

[Weber, 2006]

The Next Step: Privacy Invasions by Biometrics and ICT Implants

S7

[Thalmann, Salamin, Ott, Gutiérrez, & Vexo, 2006]

Advanced Mixed Reality Technologies for Surveillance and Risk Prevention Applications

S8

[Hampapur et al., 2003]

Smart Surveillance: Applications, Technologies and Implications

S9

[Williams & Eyo]

Ubiquitous Computing: The Technology for Boundless Surveillance

S10

[Mueller & Kuehn, 2013]

Einstein on the Breach: Surveillance Technology, Cybersecurity and Organizational Change

S11

[Sutor & Reda, 2008]

Multi Sensor Technologies Augmenting Video Surveillance: Security and Data Fusion Aspects

S12

[Senior, 2009]

An Introduction to Automatic Video Surveillance

S13

[Meggitt, Roderick, & Cooke, 1999]

Advanced Technologies for Undersea Surveillance of Modern Threats

S14

[Gulzar, Abbasi, Wu, Ozbal, & Yan, 2013]

Surveillance Privacy Protection

S15

[Gong, Loy, & Xiang, 2011]

Security and Surveillance