Darby Galler

My name is Darby and I am a part of the Comp 1102 section WWW class at Georgia Southern University

By the end of this semester I will be an expert contributor to this wiki page about surveillance and mass media. I will be an expert contributor because through class discussions, as well as discussions with other classes, my fellow peers and I will obtain a strong understanding of what surveillance and mass media is. I will be getting all of my information through research done by any means necessary. Whether that be through the internet or the "old school" way through books. At the beginning of this semester all I know about surveillance is what I see in movies, but by the end of the semester I will be able to talk much more extensively about surveillance rather than just referring to different movies. Additionally, with mass media, at the beginning of the semester all I know or think about is advertisements, but by the end of the semester I too will be able to talk extensively about mass media rather than just talk about advertisements seen on TV or especially during the Super Bowl.

Here is my research proposal for my topic:
Darby Galler
Dr. Starnes
Comp 1102 Section: WWW
15 March 2013
Research Proposal

Classification:
My research is about the use of surveillance technologies in the trilogy: The Girl with the Dragon Tattoo, The Girl Who Played with Fire, and The Girl Who Kicked the Hornets’ Nest. The type of surveillance is surveillance technologies. By this I mean the types of technologies like cameras video and photograph, and listening devices and things of that nature. For the movies, all the movies are the Swedish version of the books that were written by Stieg Larsson. All the movies include the main actress, Noomi Rapace who portrays the main character, Lisbeth Salander.

Hashtags:
Surveillance:
#survtech for surveillance technology
#secursurv for security surveillance
Mass Media:
#DragonTatoo for The Girl With The Dragon Tattoo
#PlayedwithFire for The Girl Who Played With Fire
#HornestNest for The Girl Who Kicked The Hornets’ Nest

Narrowed Topic Statement:
For my narrowed topic statement I would like to research surveillance and its progression in relation to the plot of The Girl with the Dragon Tattoo Swedish version trilogy: The Girl with the Dragon Tattoo, The Girl who Played with Fire, and The Girl Who Kicked the Hornets’ Nest. Additionally I would like to take the surveillance technologies used in the movie and see if in reality; they can be used in the same way.

Topic Familiarity:
As far as the information that I already know, there is a lot. I have watched all three movies multiple times. Additionally I have the extended versions of all three movies. I have also watched the commentary on all three movies too. I know the plot of each movie very well. There are a few specific scenes I can think of where surveillance is used, but I will definitely need to watch all three movies again to pin point more occurrences and explain why they are happening in relation to the plot.

Research question:
How do surveillance technologies help Lisbeth, the main character, throughout the trilogy?

Primary Materials:
My primary materials will be the three movies: The Girl with the Dragon Tattoo, The Girl Who Played with Fire, and The Girl Who Kicked the Hornets’ Nest.
Here are three Netflix links to the three movies:
The Girl with the Dragon Tattoo: http://movies.netflix.com/WiMovie/The_Girl_with_the_Dragon_Tattoo/70116686?trkid=2361637
The Girl Who Played with Fire: http://movies.netflix.com/WiMovie/The_Girl_Who_Played_with_Fire/70132756?trkid=2361637
The Girl Who Kicked the Hornets’ Nest: http://movies.netflix.com/WiMovie/The_Girl_Who_Kicked_the_Hornet_s_Nest/70138618?trkid=2361637

So What:
My research could be directed to two audiences. If the audience is viewers and fans of this trilogy then the “so what” would be how the surveillance technology’s progression contributes to the whole story of Lisbeth Salander. If the audience is just regular views that are not huge fans, but only the saw movies, the “so what” would be can these surveillance technologies be used in reality. Actually this could be important to both audiences. To the fans of the trilogy, because that could add or take away from the movies, whether or not the surveillance technologies are real. To the general audience, because it can show whether or not movies accurately portray the surveillance technologies, or if the movie is just fantasy.
To the existing research I am adding a lot. There is not any research on the surveillance used in these trilogy movies. So I will really be adding all this information about what surveillance technologies are used in these trilogy movies and also my depiction on how it contributes to the whole story of Lisbeth Salander.

Bibliography:
Internet Research:

Protociataion:
Kammerer, Dietmar. Surveillance Feature Films. http://www.surveillance-studies.net/. http://www.surveillance-studies.net/SSN/wp-content/uploads/2010/07/List_surveillance_feature_films.pdf.
Rhetorical Summary:
“Surveillance Feature Films” by Dietmar Kammerer, released in Berlin, Germany, is a list of movies having to do with surveillance. Dietmar Kammerer is an associate of the institute for media studies at the University of Marburg in Germany. For each movie the following is listed: title, country released in, year released, director, and a quick summary of each movie. Additionally after each summary a link to each movie is given on both allmovie.com and imdb.com. There is no bias in this list. Simply it is just a list of “Surveillance Feature Films”. This list does not only focus on European films, it has a wide range of films. Found as a PDF file, this list was not meant to be edited. Additionally the years of publication for the movies ranges from late 1920’s to 2009. This range is good because these movies are not just from one time period. This list was created for those looking into movies with surveillance in them. The list was organized and easy for anyone to understand. For my research I could pick a movie or two from this list to watch and find surveillance in them.
Explanation of Contribution:
Before I knew my final mass media this article gave me a great list of possibilities that I could have picked for my mass media.

Protocitation:
Wikipedia. Thriller (genre). Wikipedia. http://en.wikipedia.org/wiki/Thriller_(genre)
Rhetorical Summary:
This is a Wikipedia page about thriller the genre. As most people know, Wikipedia is not the most reliable of sources, but can lead to good sources by using the references. Wikipedia can be used though to get a basic understanding of a topic. Without a known author, this page’s reliability can be questioned. At the bottom of this webpage though, it does say that this Wikipedia page was recently edited on February 13. 2013. It is a good thing to know that the information in current and up to date. The five major topics for this page are: characteristics, history, sub-genres in film, notable contributors to the thriller genre and lastly, television. Under the characteristics section the definition of thriller is discussed. Under the history section the history of thriller in literature and film is discussed. The films range from 1920’s to 2011. It is good that this wide range of films is listed. In my research I can easily find films to watch that include surveillance topics for my research project. Another important category for my research could be the section about notable contributors. In my research I could talk about notable contributors to the thriller genre and see what movies some people have worked on. Additionally I could see if those people are credible to work in this genre. This page on Wikipedia is there for those searching about the genre thriller. People could also use this page to find television shows or movies having to do with this genre. This page was written clearly. Also this page has interest because while reading it I believe most people could relate to it or even find a movie or television show they already know of, which could further spark their interest.
Explanation of Contribution:
Before I knew my mass media this Wikipedia page really helped me understand what the thriller genre was about.

Protocitation:
Kammerer, Dietmar. Video Surveillance in Hollywood Films. http://www.surveillance-studies.net/. http://www.surveillance-and-society.org/articles2(2)/movies.pdf
Rhetorical Summary:
“Video Surveillance in Hollywood Films” by Dietmar Kammerer, is all about CCTV, closed-circuit television. Dietmar Kammerer is an associate of the institute for media studies at the University of Marburg in Germany. The main important part of this article for me was the very end of the article. The end of the article took three movies and did exactly what I am doing. It talked about surveillance in the movies. Found as a PDF file, this list was not meant to be edited. It was a little lengthy, but easily understandable. It also talked about a term that was used in readings for class: panopticon. This article was written to explain CCTV and its use in Hollywood films. For my research, I learned a lot about CCTV from this article.
Explanation of Contribution:
This article was helpful because towards the end it did exactly what I wanted to do with my research. It took three movies and talked about the use of surveillance in those movies.

Protocitation:
Wikipedia. Closed-circuit television. http://en.wikipedia.org/wiki/Closed-circuit_television
Rhetorical Summary:
This is a Wikipedia page about closed-circuit television. Wikipedia is not known to be the most reliable of sources, but I would consider it a good source for obtaining a basic understanding of a topic and that is what I used this page for. In Dietmar Kammerer’s “Video Surveillance in Hollywood Films” he talked about CCTV. I did not know what it was so I searched it came up with this page. Without a known author, this page’s reliability can be questioned. At the bottom of this webpage though, it does say that this Wikipedia page was recently edited on March 2, 2013. It is a good thing to know that the information in current and up to date. The two major topics on this page were: “Uses” and “Technological developments”. Under the “Uses” section the page talks about the uses for closed-circuit television. Some uses for it are: crime prevention, traffic monitoring, and criminal use. Under “Technological developments” section the page talks about the developments of CCTV. One major development is wireless security cameras. This page is there for people learn and get a basic understanding of CCTV. This page was written clearly.
Explanation of Contribution:
This page was helpful because I learned all about CCTV. This term “CCTV” came up a lot in Dietmar Kammerer’s article “Video Surveillance in Hollywood Films” and I did not know what it was. This page gave me a basic understanding of CCTV.

Protocitation:
Wikipedia. Surveillance. http://en.wikipedia.org/wiki/Surveillance#Surveillance_cameras
Rhetorical Summary:
This is a Wikipedia page about surveillance. Wikipedia is not the best for a reliable source, but it is fine for using it as a basic understanding of a topic; which is what I used it for. Without a known author, this page’s reliability can be questioned. At the bottom of this webpage though, it does say that this Wikipedia page was recently edited on March 6. 2013. It is a good thing to know that the information in current and up to date. The major topic on this page is “Types of Surveillance”. In this section a list of fourteen types of surveillance is given. Under each type a basic understanding is portrayed. This page is there for people, like me, to get a basic understanding of what surveillance is. It is a clearly written page, which also includes resources at the bottom which could be used for reliable finite sources. I used this page in my research in the early stages to get a basic understanding of what surveillance is.
Explanation of Contribution:
The page really helped me in the beginning of my research. It helped me narrow down what type of surveillance I would be researching. It also gave me a basic understanding of surveillance.
Scholarly Articles:

Protocitation:
Haering, Niels. The evolution of video surveillance: an overview. Machine & Vision Applications. Ebsco.
Rhetorical Summary:
This article is titled “The evolution of video surveillance: an overview” and was written by Niels Haering. Niels Haering has a PhD in computer science from the University of Central Florida. In this article, video surveillance is the main topic. The advances in video surveillance are also largely talked about in this article. Additionally how the advances lead to the future and its effects. Different types of video surveillance cameras, and video surveillance techniques were stated in this article too; for example, scanning cameras and unusual event detection. Though there were some terms that were a little complex, the overall read was fairly clear. This article is out there for those who want an overview of video surveillance. For my research, I used this article to grasp a basic overview of video surveillance.
Explanation of Contribution:
This source is useful because I have learned how video surveillance has advanced over time. I also now have a better understanding of which video surveillance is used in the movie.

Protocitation:
Martell. Francisco. Design And Development Of A House-Mobile Security System. Engineering 3.12 (2011): 1213-1224. Ebsco.
Rhetorical Summary:
“Design And Development Of A House-Mobile Security System” by Ashraf Elfasakhany, Jorge Hernández, Juan Carlos García, Mario Reyes and, Francisco Martell. This article is all about a proposal for the idea of a house-mobile security system. Just like in the second movie, The Girl Who Played with Fire, this system would be “an alarm system that triggers the alarm and alerts the owner via a mobile text message if the house has been opened or an attempt has been made to open it illegally.” This exact scenario happens in the second movie. This article is important because it shows that, in reality, we are trying to come up with a system that can actually do that. Although there are some terms that are complex, the general idea of this system can be grasped by reading this article.
Explanation of Contribution:
This article is helpful because it describes a type of security system that is similar to one used in the second movie, The Girl Who Played with Fire. The main character has a tight security for her hidden apartment.

Protocitation:
Know Your Lenses. Popular Mechanics. Ebsco.
Rhetorical Summary:
“Know your lenses” written for Popular Mechanics does not have an author that I could find. This is a little concerning. This article was about several types of zoom lenses. This is strictly informational, and simply explains the types of lenses. This article was made for people who want to know more about zoom lenses. For my research, I learned more about zoom lenses, and types that could have been used in the movie.
Explanation of Contribution:
This article taught me the basics about types of lenses used in photography. This is important because photographs are used throughout this trilogy to help out the main character in her own surveillance tactics.

Protocitation:
Blake, Randolph. Binocular Vision. Elsevier Ltd. Ebsco.
Rhetorical Summary:
Randolph Blake wrote “Binocular Vision”. Randolph Blake, a recipient of a PhD from Vanderbilt University in psychology. Additionally he did post doctorate work at Baylor College and the University of Texas also on psychology. “Binocular Vision” is about the major developments in binocular vision. This essay was the most complex of my sources to read. It went into great depth about more information on binocular vision than expected. This essay was most likely written for those who already have a basic understanding of binocular vision and want a more in depth understanding. For my research, I can use the simpler explanations of binocular vision, but I will keep out the more complex details as to not confuse my audience. I want my research to be in laymen’s terms.
Explanation of Contribution:
This article is about binoculars and it’s progression over the past 25 years. This helped me learn about binoculars which are used throughout the trilogy.

Protocitation:
Poindexter, Carlyle. Surveillance Optics. FBI Law Enforcement Bulletin. Ebsco.
Rhetorical Summary:
“Surveillance Optics” written by Carlyle Poindexter was published in March 2001. Although this is a little older, this source is still recent in comparison to some other articles I have found. This article is about the basics of binoculars, including its features, and even purchasing advice for someone who would be interested in investing in binoculars. It is clearly written, and concise. This article was most likely written for those who want a basic understanding in binoculars and also possibly for first time buyers of binoculars. For my research, I will use this article to help me describe how binoculars work.
Explanation of Contribution:
This article is also about binoculars, but about the basics about them. This helps me learn more about them and in a simpler manner.
Book:

Protocitation:
Petersen, Julie. Understanding surveillance technologies: spy devices, their origins & application. Boca Raton, Fla. : CRC Press, c2001. Library.
Explanation of Contribution:
This book is useful because I now have a basic understanding of surveillance technology which helps me recognize the type of surveillance technology used in the movies.
Bunny Trail Sources:

Protocitation:
Cohen, Isaac. Detecting and Tracking Moving Objects for Video Surveillance. University of Southern California. Google Scholar.
Explanation of Contribution:
This article is useful because from it I learned how moving objects are detected on video surveillance. I can use what I learn and explain it to my audience.

Protocitation:
Zhong, Hua. Detecting Unusual Activity in Video. University of Pennsylvania Scholarly Commons. Google Scholar.
Explanation of Contribution:
From this article I learned one technique on how to detect unusual activity in a video from video surveillance. I can use this information to explain to my audience about unusual activity in video.

Protocitation:
Efros, Alexi. Recognizing Action at a Distance. Computer Science Division, UC Berkley. Google Scholar.
Explanation of Contribution:
This article taught me how to recognize, say a human, on video even if the video is extremely pixilated. This will hopefully help me explain video surveillance and how a clear picture is not necessarily needed.

Protocitation:
Boiman, Oren. Detecting Irregularities in Images and in Video. Computer Vision. Google Scholar. Cited By.
Explanation of Contribution:
As well as another article this one taught me more about finding unusual appearances in images and in video from video surveillance. This will hopefully help me explain how the photographs in the first movie were used.

Protocitation:
Morton, Jennie. Strategies for Short-Term Surveillance. Buildings; Jun2011, Vol. 105 Issue 6, p32-32, 1p. Ebsco.
Explanation of Contribution:
This article can hopefully help me explain how temporary surveillance can be used, just like in the movie, but also in reality too.

Protocitation:
Lamberti, Fabrizio. Low-Cost Home Monitoring Using a Java-Based Embedded Computer. Information Technology Applications in Biomedicine. Google Scholar.
Explanation of Contribution:
This article will help me explain how home surveillance can be used in reality.

Protocitation:
Wu, Bing-Fei. A Practical Home Security System via Mobile Phones. National Chaio-Tung University. Google Scholar. Cited By.
Explanation of Contribution:
This article can help me show my audience that the surveillance with mobile phones and home security, similarly to the one that was used in the second movie, can actually be possible in reality.

Protocitation:
Elfasakhany, Ashraf. Design and Development of a House- Mobile Security System. Parque Industrial Bermudez. Google Scholar. Related Articles.
Explanation of Contribution:
This article will allow me to show my audience that the surveillance system used in the second movie for the main character’s apartment is possible, and that designs of it are in the works.

Protocitation:
Mahonen, Petri. Wireless Video Surveillance: System Concepts. Image Analysis and Processing. Google Scholar. Related Articles.
Explanation of Contribution:
This article can help show my audience that there is a next step to just video surveillance, and that is wireless video surveillance.

Protocitation:
Leavitt, Neal. Mobile Phones: The Next Frontier for Hackers? Google Scholar.
Explanation of Contribution:
This article can help show my audience the tricks of hacking. Additionally it can show them the next step into hacking which is now hacking mobile devices.

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License