Monitoring and Intervention: Concepts and Formal Models

01/25/2017 ∙ by Kenneth Johnson, et al. ∙ 0

Our machines, products, utilities, and environments have long been monitored by embedded software systems. Our professional, commercial, social and personal lives are also subject to monitoring as they are mediated by software systems. Data on nearly everything now exists, waiting to be collected and analysed for all sorts of reasons. Given the rising tide of data we pose the questions: What is monitoring? Do diverse and disparate monitoring systems have anything in common? We attempt answer these questions by proposing an abstract conceptual framework for studying monitoring. We argue that it captures a structure common to many different monitoring practices, and that from it detailed formal models can be derived, customised to applications. The framework formalises the idea that monitoring is a process that observes the behaviour of people and objects in a context. The entities and their behaviours are represented by abstract data types and the observable attributes by logics. Since monitoring usually has a specific purpose, we extend the framework with protocols for detecting attributes or events that require interventions and, possibly, a change in behaviour. Our theory is illustrated by a case study from criminal justice, that of electronic tagging.

READ FULL TEXT VIEW PDF
POST COMMENT

Comments

There are no comments yet.

Authors

page 1

page 2

page 3

page 4

This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.

1 Introduction

Our machines, products, utilities, and environments have long been measured and monitored by embedded software systems. Monitoring is fundamental in science and engineering, where instruments are created to observe phenomena inside and outside the laboratory. Monitoring is essential for the proper functioning of manufacturing plant in factories, and the infrastructures of energy, transport, communications and information. The rise of cyberphysical systems – networks of sensors, activators and processors – is transforming industry and its products [18].

However, monitoring is by no means confined to science and engineering. Accounting, insurance and other financial services, with equally long histories, have developed theories and methods to monitor money – algebra began in the service of commerce [36]. Today, our commercial, social, professional and personal lives are mediated by software and so are also subject to monitoring. Data is available about all aspects of our everyday life as individuals, or members of groups, organisations and societies to be collected, analysed, and compared for all sorts of reasons. Monitoring has made surveillance and privacy an international public concern.111For example, in the UK, privacy in monitoring and surveillance has been addressed in the Anderson report to the government [4].

Despite the fact that monitoring practices are ubiquitous, and are the source of data that drives the development of data science, the nature of monitoring has been neglected theoretically. We pose the questions:



What is the nature and purpose of monitoring? Do the diverse and apparently disparate monitoring systems have anything in common?

We attempt to answer these questions by proposing an abstract approach to monitoring that can explore the common structure of many different monitoring systems. The scope of monitoring is colossal. Monitoring examples abound in science, engineering, commerce, manufacturing, infrastructure, healthcare, management, security, and services. By reflecting on many monitoring examples, we have isolated some essential conceptual components of monitoring systems. The case study we choose to use to illustrate our theory is the remote monitoring of offenders in criminal justice jurisdictions.

The analysis results in an abstract conceptual framework that is intended to capture and illuminate a wide spectrum of monitoring practices. From the conceptual framework more detailed formal models can be derived that are customised to particular application domains. From the conceptual framework we derive a general mathematical model of monitoring in which behaviours are modelled by streams, i.e., sequences of data indexed by time. We use the term conceptual framework because it isolates concepts that can be formalised in a number of ways. For example, streams come in several forms: total or partial maps, defined for finite or infinite discrete or continuous time intervals.

It must be emphasised that ours is a theoretical investigation of ideas about monitoring systems, intended to raise and make precise general questions, to enable comparisons to be made, and to develop useful classifications of monitoring systems. Hopefully, our formal models and methods will help the analysis of both technical and sociological issues to do with monitoring. In launching these ideas we have chosen to keep our formal techniques simple, assuming little more than the basic algebraic definitions of abstract data types: see [26, 25] for the basic theory.

The conceptual framework formalises the idea that monitoring is a process that observes properties of the behaviour of people and objects in a context. A context is characterised by entities and their characteristics and behaviours. Monitoring a context begins by choosing attributes to be observed. The contexts are represented by abstract data types and the observation attributes by logical languages. Our conception of monitoring is based upon the following principle: monitoring is confined to the collection, evaluation and recording of observational data; the outputs of a monitoring system are simply records. Thus, a key idea in our analysis is that it is only concerned with data, and we separate the acquisition of the monitoring data from its subsequent use. This separation enables the framework to capture commonalities of diverse domains, and increases the generality of the analysis.

However, the subsequent use of the recorded observations is of importance, since monitoring usually has a specific purpose. We extend the monitoring framework with protocols for detecting special attributes that require attention. The records are inspected and certain attributes allowed to trigger actions that transform the record and can, in turn, change the behaviour of the entity. We call these checks and transformations interventions. Adding this process we define a monitoring system with interventions. The transformed record is communicated to a system independent of the monitoring system.

To complete the description of a monitoring system, we introduce an informal notion of a monitoring infrastructure, which obtains and sends the data representing the behaviour of entities to a monitoring system; and an intervention infrastructure that receives the information from a monitoring system with interventions and initiates various responses and actions on the entities.

We assume that both the monitoring system and the interventions are composed exclusively of data, and we gather the data types into what we call the monitoring and intervention stack. Outside the stack we allow monitoring and intervention to employ any kind of technology and practice. The flow of data is illustrated in Figure 1. There are distinct types of intervention that reflect the purpose of monitoring.

The paper is in three parts. In Section 2 we define the conceptual framework in terms of the main concepts of entity, behaviour, attribute, observation, judgement, and monitoring and interventions. In Section 3 we derive a formal model from the framework by taking behaviours to be modelled by streams of data. Section 4 summarises properties of streams in preparation for the formal specification of attributes and interventions in Section 5. In Section 6 we consider case studies of monitoring in criminal justice to illustrate the conceptual framework and, in Section 7, the stream model. Finally, in Section 8, we make some remarks on future developments.

2 Conceptual Framework of Monitoring and Interventions

Figure 1: The monitoring and intervention architecture of entities within a context

What do diverse examples of monitoring have in common? When we think of monitoring, we think of people and objects in the physical and virtual environments. What is monitored is some data about the behaviour of people and objects in some context and for some purpose. The monitoring of a context is characterised by specifying particular attributes that can be observed and recorded; records are outputs of the monitoring system. The purpose of a monitoring system is reflected in the application of tests that sort the observational records. If certain attributes are recognised and judged significant then notifications are issued. These notifications lead to actions that change the behaviour of the people or objects.

2.1 Monitoring

Context: Entities, Characteristics and Behaviour. Monitoring takes place in a context. A context is composed of entities. The entities have characteristics that define properties that are relevant to the entities in the context. Entities have behaviours that can be observed and are monitored. Behaviour of an entity depends upon the characteristics of the entity. For example, a change in a characteristic implies a change in behaviour: characteristics are a parameter of behaviour.

A context can be specified by three sets and a function. Let be the set of entities. Let be the set of characteristics based upon information about the entities in the context. Let be the set of all possible behaviours of the entities in the context. Define the behaviour mapping

(1)

The map defines the semantics of the entities in the monitoring context.

Observation: Attributes and Judgements. Behaviours have attributes that can be observed. Observation takes the form of making a query about, or testing, the behaviour of an entity for the presence of an attribute and making an evaluation. The evaluation gives rise to a judgement.

In some cases, the attribute will be a property that either holds or does not hold, and the evaluation will be a boolean judgement of or

. In other cases the attribute may be a property that needs assessment using a range of values on a scale; the evaluation will be a grading, measure, or probability. For example, physical measurements with error margins can give judgements that are bands of numerical values. A judgement may be a qualitative assessment based upon bands labelled metaphorically, such as the commonly used traffic light signifiers

.

Let be a set of attributes of behaviours. Let be a set of possible evaluations of the attributes.

We define observation in terms of attributes that can be observed.

Uniform Observation. Consider the observation mapping that examines all behaviours with the same attribute:

(2)

such that for attribute and behaviour ,

Individual Observation. An attribute may vary according to the entity and its characteristics. Thus, we may have a mapping that varies the attribute:

(3)

allowing the dependency . In this case the observation mapping can take the form:

(4)

such that an entity with characteristics , it check attribute on behaviour :

Records. The purpose of monitoring is to make an observation and a record of the observation. First, we define the form of a record: suppose , with characteristics , has a behaviour that is tested for attribute with the result of the evaluation being a judgement . Then the observation is recorded as

.

Thus, the the set of all possible records of the context is

(5)

Monitoring. Observable attributes enable entities and their behaviours to be monitored.

Uniform Monitoring. We define the mapping

(6)

such that

(7)

The record is the output of the monitoring system.

Individual Monitoring. If the attribute depends upon entity and characteristic then we see in place of . The monitor function now becomes

(8)

defined by

(9)

This is an important case as we will see shortly.

2.2 Interventions

The purpose of monitoring is to observe attributes of interest and to record them. It is concerned with the assembly and evaluation of data. To use the monitoring data, properties must be recognised in the records, noted and communicated to infrastructures outside the monitoring system. These communications we call notifications. The infrastructures receiving notifications are called intervention infrastructures. The notification may initiate a response, which may be a series of physical or virtual actions that change an entity’s characteristics and its behaviour. We formalise these stages as follows.

Triggers. A attribute of behaviour is inspected and recognised in a monitoring record by a trigger condition. A trigger condition is mapping of the form

(10)

taking as input an evaluation from and returning a Boolean value to note recognition or not. If judgements are booleans then the condition might simply detect an attribute is true or false, and might be the identity function. If judgements are numbers then the condition might detect that a numerical threshold value is passed. Let be the set of all trigger conditions.

Actions. An inspection of the record leads to an action that is a notification. An action is a mapping of the form

(11)

which changes or updates the characteristics of an entity.

Let be the identity map, the action that does nothing.

Interventions. Triggers decide what should happen; actions change characteristics that makes things happen. An intervention is a rule of the form “if then do else do ”; we write this

.

Let be the set of interventions assigned to the context.

An intervention is applied to a record by the mapping

(12)

defined by

2.3 Architecture of the Framework: Monitoring and Intervention Stack

The conceptual framework is intended to be a high-level architecture that isolates and names conceptual components. We have partially modelled the architecture mathematically to make precise the functions performed by the components. Essentially, there are three components to the framework: (i) a context, (ii) a monitoring system for the context, and (iii) an intervention system for the monitoring system.

Interaction of Components. In summary, the components interact as follows. In a context, given an entity with characteristic , the behaviour in the context is .

Choosing an attribute we observe and judge the entity’s behaviour and produce a record .

The judgement in this record is tested by an intervention and we get the new characteristic .

This may lead to a new behaviour .

Monitoring and Intervention Stack. The components can be combined and modelled using the theory of abstract data types. Focussing on the input-output functions we note the three many sorted algebras:

,

,

Note the algebras are built upon each other and we will call the collection the monitoring and intervention stack. Underneath this stack of three monitoring structures are algebras from which models for etc. can be made. We suppose these algebras are combined to make a single algebra, containing what may be needed to build the stack, that we will call the platform algebra for the monitoring and intervention stack.

The stack and platform can be represented more formally. Strictly speaking, we could express the framework in terms of signatures and simple equations. However, at this early stage of analysing monitoring, it would be premature to apply abstract data type theory – e.g., signatures, equational specifications, loose, initial and final semantics, term rewriting etc. We prefer to introduce monitoring without these prerequisites, and develop a larger catalogue of exemplars; and also to leave open a choice from a wider selection of formalisation methods.

3 Modelling Behaviour as Streams

The general conceptual framework for monitoring in Section 2 can now be refined in a number of ways to create a range of general mathematical models of monitoring and intervention. Clearly, there are different ways to model , different logics to formalise , and different models of computation to analyse monitoring. In this section we focus on behaviour and the idea that it is dynamic, i.e., behaviour changes in time. We use the general framework as a template to build a class of monitoring models for contexts where behaviour is modelled by data streams.

We model a behaviour of an entity changing in time by a stream of data from in time :

for .

There are a number of choices for stream behaviour:

(i) time can be continuous or discrete;

(ii) streams can be finite, infinite or both;

(iii) streams can be always well-defined or partial.

We choose discrete time streams that are infinite and always well-defined.

To help contrast the conceptual framework with the detailed mathematical model, we revert to conventionally concise notations – e.g., becomes etc.

3.1 Monitoring Streams

Time. We model time by a set of data that mark points in time. Commonly, in modelling physical behaviour, time is assumed to be continuous and is represented by a subset of the real numbers , or rational numbers . In modelling computational behaviour, time is assumed to be discrete and is represented by a subset of integers or natural numbers . So, later, we assume that time is discrete, and take examples.

Behaviour. Suppose the behaviour of entities takes place in time, represented by the set . Behaviour is characterised by some data from a set – typically measurements, text, images or audio. Thus, we define a stream of data as a total function mapping time points in to data elements in . The space of all behaviours is the set of streams. In the case of our monitoring examples, the streams are sequences in discrete time of the form:

for .

Contexts: Entities, Characteristics and Behaviour. Let be the set of entities and let be the set of characteristics. We define the behaviour of an entity as a stream of data, generated by the behaviour map, after equation (1).

(13)

such that for entity , with characteristics , at time :

data characterising behaviour of entity with characteristics at time .

Observation: Attributes and Judgements. Behaviours have attributes that can be observed over time. Let be a set of attributes of behaviours. Since behaviour is time dependent, attributes are time dependent; indeed it is common to look for changes over, say, an interval . Let be a set of judgements; often, is a finite set.

Mathematically, we define the act of observing an entity and its characteristics, and making an evaluation, in two ways:

Uniform Observation. Consider the observation mapping that examines all behaviours with the same attribute, after equation (2):

(14)

such that for attribute and stream

a measure of the extent or degree that is a property of the stream

Individual Observation. Suppose an attribute may vary according to the entity and its characteristics, after equation (3) defined by

(15)

In this case the observation mapping follows the form of equation (4)

(16)

and given an entity with characteristics , checks attribute on behaviour :

the extent or degree that is a property of .

Monitoring. Now, we implement monitoring as follows. First, following equation (5), let

(17)

be the set of records.

Uniform Observation. Using equation (6) and equation (7), We define monitoring by the function

(18)

such that

(19)

Individual Monitoring. If the attribute depends upon entity and characteristic then we see in place of . Using equation (8) and equation (9), the monitor function now becomes

(20)

defined by

(21)

3.2 Interventions for streams

Following the general framework, interventions are based upon judgements, they do not involve behaviours directly, and so they are independent of the streams; there are only changes due to substitutions.

Triggers. Trigger conditions accept as input a judgement value , obtained as a result of the observations made by the function , and outputs a truth value. In symbols,

(22)

We denote the set of all trigger functions as . If then is the identity or negation or a constant.

Actions. An action function

(23)

such that performs an update to the information . We denote the set of all action functions by .

Interventions. With both of these functions, we define an intervention of the form , where . We use triggers and action functions to specify the intervention that results from the observation of an entity’s behaviour. Mathematically, for , we define the function

(24)

defined by

4 Platforms for Stream Behaviour

The stream model of behaviour is made from data and time. We will outline the forms of some simple abstract data types for data, time, and streams that could serve as a platform algebra for the monitoring and intervention stack for the stream model.

4.1 Specification of Streams over Data

Data. Data is never without operations and tests. Consider the set of data representing what is observable in the context. For it to be of any use we must suppose there are constants, operations and tests on . Thus, for simplicity, let the set of data be contained in a data type modelled by an algebra with one sort of data together with the Booleans , having the form:

(25)

comprising

  • carriers and ;

  • constants and ;

  • operations and boolean connectives ;

  • tests .

Time. Similarly, consider the set of time points. It, too, must belong to a data type having constants, operations and tests. Since we are assuming discrete time and that , to the set we add the constant , the tick operation , defined by , and equality to form an algebra of the form:

(26)

In calculating with time, other standard arithmetical operators and tests will be needed.

Streams. The streams of data from timed by must also belong to a data type. This leads to a stream algebra that contains and expands the algebras of data and of time with the carrier set and a selection of operations and tests, including the evaluation function

(27)

such that

(28)

Constants and operators typically take the form:

  • stream constants ;

  • stream operations , of the form , for ;

  • stream operations , of the form , for ;

and tests typically take the form

  • stream tests , of the form , for ;

  • stream tests , of the form , for .

4.2 Examples of Stream Algebras

Stream algebras are custom built for applications. For the purpose of illustration, we consider some examples of stream algebras over made by simply choosing operations on streams. In all our examples, time is fixed to be the time algebra defined in (26). Simple examples of constants, operations and tests in that are useful in many situations are the pointwise liftings of the constants, operations and tests on :

  • For a data constant , stream constant defined by for all .

  • For a data operation , stream operation defined by

    for all .

  • For a boolean test on data, stream test operation defined by

    for all .

The operations may return data rather than streams of data, for example:

  • For an operation on data, the operation defined by

    .

    Here we uncurry the operator above.

  • For a boolean test on data, stream test operation defined by

    .

  • For a boolean test on data, stream test operation defined by

    .

Some slightly complex operations include:

  • The operation defined by

  • The operation defined by

  • The operation defined by

5 Specification of Attributes and Interventions

In developing the theory, and in modelling examples, there are four primary components to explore: , , and . We have discussed formalising as streams. What can be expected of formalisations of and – in general and in the stream model? If attributes express properties of streams then their formalisation depends on the basic operations included in a stream algebra (c.f., 4.1).

5.1 Three General Principles

In monitoring, attributes represent properties of the behaviours of entities that we wish to detect. Attributes are a primary component requiring judgements that determine interventions. In the high-level framework, we might expect to apply three principles:

Specification Principle. Attributes are definable in a specification language. The semantics of the specification language is based on judgements.

Reasoning Principle. Attributes can be transformed by means of rules for reasoning in an appropriate logic.

There are several theoretical and practical options for logical languages with which to apply these two design principles; we will discuss some basic choices shortly. Perhaps this third principle is most fundamental:

Computability Principle. So we can observe and test behaviours, the attributes and the judgements of attributes are computable. In short, in the uniform case,

or, in the individual case,

and

are computable. In consequence, monitoring is computable.

We turn first to the Specification and Reasoning Principle and illustrate simple choices for a formal language and logic to define and transform attributes based upon first order logic. Although, its seems somewhat narrow in scope, since attributes are evaluated by booleans, first order logic is serviceable. Our expectations of the semantics of judgements are much wider. We expect that future case studies will introduce temporal and many valued logics – from discrete judgements in three and -valued logics to continuous judgements in fuzzy and probabilistic logics.

5.2 Variants of First Order Logic

Consider specifying and reasoning about attributes (and interventions) with variants of first order logic. Ultimately, the logics will be defined over the platform algebras from which the monitoring stack is built. In the case of a stream model of monitoring the platform will be a stream algebra of some kind.

Let be any -algebra with signature containing symbols for tests that form the atomic predicates of a language based on , denoted . Let be the -algebra of terms.

Quantifier-Free First Order Formulae. The set of quantifier-free first order formulae over the signature with variables in is defined inductively by the rules

(29)

where the ’s are terms in , and and are quantifier-free first order formulae. The semantics is defined on any algebra and is derived from term evaluation.

First Order Formulae. We extend the set of quantifier-free formulae defined by (29) to include the existential and universal symbols to define the set of first order formulae as follows:

(30)

for -terms , atomic propositions and formulae and variable . The semantics is defined on any algebra in the usual way.

Weak Second Order Formulae. Let be an -algebra that adds all finite sequences over to the algebra along with appropriate operations and tests. Defining quantifier-free and first order formulae over yields weak second order languages and that are useful in working with computability and examples [37, 41].

In the case of a stream model of monitoring, the logics are defined by over a stream algebra of some kind, acting as a platform algebra for the monitoring stack.

5.3 Computability

Consider the computability of attributes (and interventions). As with the logics, computability will need to be defined over the platform algebras from which the monitoring stack is built.

There are different theoretical approaches to computability on abstract data types, and hence to applying the third design principle on the computability of monitoring [38]. There are abstract computability theories based on only on abstract data types [37, 41]. There are concrete computability theories based on making finite representations of the abstract data types [34, 35]. Here we choose to use an abstract model of computation to make occasional remarks on computability: the imperative programming model while programs with arrays. These are programs are built form assignments, sequencing, conditionals and iteration augmented by finite unbounded arrays. The model has universal computable functions for which the arrays are necessary. The sets and functions computable by while programs with arrays are the subject of a robust a Generalised Church-Turing Thesis for algorithms based upon abstract data types. The while programs with arrays are the subject of [37, 41].

In the case of a stream model of monitoring, the computability is defined by while programs with arrays over some form of stream algebra, acting as a platform algebra for the monitoring stack.

In both abstract and concrete models of computability, we expect to be able to prove properties of the following form.

Lemma. Attributes defined by quantifier free formulae over signature are computable on the -algebra .

However, not all the usual operators on streams can be taken to be computable. Equality offers standard examples of non-computable operations: if has more than one element, the non-equality stream test defined by

if, and only if,

is only semicomputable since we can search for a time where the streams differ; but the equality stream test defined by

if, and only if, .

is not semicomputable. Computability is substantial topic and whilst some methodologies could be discussed further for the general framework, it would require considerable preparations to tackle stream models of monitoring [39, 40].

5.4 Specification of Observations

Suppose a monitoring system makes finitely many judgements,

.

Suppose, too, that there exists a family of conditions

each of which is a Boolean-valued function. The different conditions lead to different judgements. It is simplest if the judgements and their predicates are disjoint and cover their domain. The predicates should be computable.

Uniform Observation. Using the conceptual framework, we define the uniform observation function for a family of predicates and

Individual Observation. Now suppose that there exists a family of mappings to conditions

(31)

each of which is a Boolean-valued function. We can define the individual observation function for and

In both abstract and concrete models of computability, we expect to be able to prove properties of the following form.

Lemma. If the family of predicates is computable then is computable. In consequence, monitoring is computable.

5.5 Specification of Interventions

The interventions each have the form

boolean-valued trigger condition on judgements

transformative action on characteristics

The discussion on how to specify, reason and compute with these components is similar to that of attributes in the previous section. The triggers are predicates on judgements definable as boolean-valued formulae in a logical or programming language. The actions are functions on characteristics definable in the same or a different logical or programming language. In the simplest case, abstract data types of judgements and characteristics can provide definitions of the triggers and actions as atomic formulae and terms, built from the basic algebraic tests and operations. In designing interventions, attributes and trigger conditions can cooperate and suggest trade-offs.

For example, if monitoring is based on finitely many judgements then the trigger is a map from and issues notifications to the intervention infrastructure as specified by the finite sets

and .

The diversity of monitoring contexts lead to different but more appropriate choices for terminology for these components. The relevance of the terminolgy depends on ideas on what to do in particular situations. Interventions can represent or initiate a definite course of action for the purpose of bringing about some desired result – such as by specifying desired behaviour or merely update data in the characteristics.

For many monitoring applications, the set of interventions can be meaningfully called a policy for the monitoring context. Financial and commercial services come to mind, for which there is a huge collection of examples of “terms and conditions”. With a policy comes the task of detecting when customer behaviour fails to comply with the policy. The triggers detect non-compliance and the actions attempt to bring the entity to a state of compliance. The aim is that the operation of whole system is observed to conform to its user specification, i.e., the policy for customers.

Our reflection on examples have identified these distinct types of intervention that reflect the purpose of monitoring:

(i) access control systems;

(ii) permission systems;

(iii) penalty systems;

(iv) incentive systems

(v) recommendation systems; and

(vi) social support systems.

Currently, we are developing a taxonomy including these types [42].

6 Framework Case Study: Monitoring in Criminal Justice

In this section, we discuss one among many sources of social monitoring systems that can provide examples to illustrate our theory of monitoring: electronic tagging systems used for the remote supervision of offenders. We consider a home detention curfew monitoring system, and a remote alcohol monitoring system.

6.1 Electronic Monitoring

The use of electronic monitoring is firmly established in criminal justice systems and is commonly referred to as electronic tagging [28]. In sentencing, monitoring involves the location of people in space and time, as in confinements and curfews; and the physiological states of people, as in substance abuse cases [29]. The main rationales for the use of electronic monitoring are:

(i) detention, as in house arrest [5],

(ii) restriction, as in exclusion orders [6], and

(iii) surveillance, as in drug rehabilitation [22].

In cases involving confinement, the subject is required to stay in the confines of a particular address for certain hours of the day.

There are many commercial technologies available for monitoring.222For illustration, we will cite occasionally SCRAM Continuous Alcohol Monitoring; SCRAM Remote Breath; SCRAM GPS and SCRAM House Arrest. See: http://www.scramsystems.com/index/scram/products. Most of these monitoring technologies involve some kind of wearable personal identification device (PID) that is locked on to a subject s wrist or ankle with tamper-proof elements to prevent removal.

Monitoring systems can be classified by what, and how frequently, they observe and report. Two types of attribute are commonly monitored:

(i) Spatially aware systems are able to locate the subject’s PID; and

(ii) Condition aware systems are able to evaluate the subject’s physical condition.

Two types of recording are commonly made by monitoring systems ([44]):

(iii)Passive systems in which there is periodic or occasional contact with a subject’s PID (e.g., [11]);

(iv) Active systems in which there is continuous contact with a subject’s PID (e.g., [32]);

An established technology is to fit a home with sensing devices that registers the presence of the PID.333There can also be a miniature video camera that enables officials to see the PID s location and activities [15]. When this PID is out of range, the monitoring service provider will be notified. Typically, if a failure occurs compliance staff will make an intervention, say, by attempting to contact the subject for an explanation. If the explanation is not acceptable, the subject is considered to have violated his/her order. If the violation is significant, the subject could be returned to court and re-sentenced or, in the case of an Home Detention Curfew, he/she will be sent back to prison.

More recently, GPS has been used as the technology that is suited to track a wider range of locations. Of course, GPS can also be grouped into two categories [13]:

(i) active: continuous collection and continuous communication of data;

(ii) passive: continuous collection and periodic communication of data.

To elaborate, active GPS trackers allow the viewing of tracking data in real-time; whilst passive GPS trackers store information, e.g., a subject s movement during a period of time, which can then be transferred to a computer through a batch download.444See: https://www.google.com/patents/US6014080. Restrictions on location and time are enforced through an alert that is triggered if the subject goes into prohibited areas. A subject’s proximity to other individuals can also be regulated if those individuals also wear GPS devices, or are regularly informed of the subject’s location [7].

Mobile condition aware tracking devices, such as breathalyzers, are available to track a person’s location and monitor biochemical characteristics, e.g., blood-alcohol level [10].555See: https://www.google.com/patents/US7341693. Currently, a breathalyzer is built into an alcohol monitoring system. Some of the more advanced versions of alcohol monitoring systems not only detect alcohol, but also record the face and location of the test taker.666See: http://www.scramsystems.com/index/scram/scram-remote-breath.

Technologies are developing, though not without ethical issues. In some special cases, miniature tracking devices can be implanted beneath the subject s skin to track his/her location and monitor his/her physiological signs [7]. In 2002, in the UK, there had been indications that the government may consider the use of surgically implanted devices for convicted paedophiles [9]. Six years later, in 2008, the UK government was planning to implant miniature tracking devices under the skin of thousands of offenders, as part of an expansion of the electronic tagging scheme, to create more space in British prisons [8]. Ethical implications of implanting electronic tagging devices need to be considered seriously before any such developments actually take place [16]. Though recently in the UK, a paedophile has been made to wear a GPS tracker for life [33].

6.2 Framework: Tagging

Tagging systems have much in common – a fact demonstrated by the following classification using our general framework in Section 2. Current electronic tagging systems used in criminal justice are monitoring systems of the following general kind:

  • Context: Remote supervision of an offender under court sentence.

  • Entity: The offender’s PID or tagging device.

  • Identifier: The PID s identifier.

  • Characteristics: The conditions of the sentence of the court, e.g., location, time and personal conditions.

  • Behaviours: The movements and activities of the offender.

  • Attributes: The measurements of location, time and personal conditions.

  • Record: Offender s PID s identifier, conditions of the sentence, evaluation of compliance.

  • Intervention: The triggering condition tests the evaluation of compliance with the court sentences and the action notifies intervention infrastructures.

In the criminal justice system, the court can sentence an offender to conform to a range of constraints on their activities (recalling our overview in Section 6). We will now refine this general description, customising it to particular court sentences and making formal models based on streams and logical formulae.

To adapt the above to more closely describe a home detention curfew monitoring system (either passive and active) only a few changes are needed:

  • Context: Remote supervision of an offender in house arrest.

  • Entity: The offender s PID or tagging device.

  • Identifier: The PID s identifier.

  • Characteristics: The conditions of the house arrest, e.g., remaining in doors for fixed periods 19.00-07.00 of each day.

  • Behaviours: The location of the offender.

  • Attributes: The measurements of location and time.

  • Record: Offender s PID s identifier, location and time restrictions, check on offender s residence.

  • Intervention: Offender absent from home during curfew period triggers investigation.

6.3 Framework: Remote Alcohol Monitoring

The remote alcohol monitoring system enables agencies to accurately monitor individuals’ alcohol levels, as an independent measure or in combination with a restrictive curfew monitoring schedule. Remote alcohol monitoring requires a device that can

(i) test alcohol levels in the subject;

(ii) establish the identity of the subject taking the test;

(iii) create a record containing the identity and alcohol measurement; and

(iv) communicate the record to the supervising service.

The alcohol can be tested via breath or sweat using electro-chemical techniques. Identity can be established by facial recognition techniques. Communication with a supervising service can use the phone system or email. Observations of the subject can be programmed according to a schedule, regular or random, or provide on-demand tests and/or automatic re-testing. Such devices may also include location monitoring (e.g., Scram alcohol monitoring, or 3M s remote alcohol monitoring, which can be passive or active; recall

6.1).

First, we will consider remote alcohol monitoring in terms of our monitoring framework and then describe a formal model using streams and logical formulae.

The concentration of the alcohol in the air in the lungs is directly related to the concentration of the alcohol in the blood. The ratio of breath alcohol to blood alcohol is 2100 to 1 (and called the partition ratio), so the alcohol content of 2100 millilitres of exhaled air will be the same as for 1 millilitre of blood. This leads to blood alcohol readings expressed as a percentage of alcohol in the blood. The partition ratio can vary (between 1700 and 2400) depending upon the individual and local environmental conditions, leading to a breath analysis reporting either a higher or lower calculated blood alcohol reading.

To take one early example of a criminal justice programme, in South Dakota, USA, there is the 24/7 Sobriety Program,777See: http://apps.sd.gov/atg/dui247/. begun in 2005, which attempts to prevent repeat driving while intoxicated (DWI) offenders from drinking through frequent testing.888In many countries, including England and Wales, the alcohol limit for drivers is 80 milligrams of alcohol per 100 millilitres of blood, a blood-alcohol concentration (BAC) of 0.08 %. In Scotland and other European countries the rate is lower. The program required repeat DWI arrestees to submit to twice-daily (7 - 9 a.m. and 7 - 9 p.m.) breath testing as a condition of bail. Failed tests constituted a violation of bond terms and were punishable by immediate 24-hour incarceration; and missed tests led to issuing of an arrest warrant.999See: http://onlinelibrary.wiley.com/doi/10.1111/j.1360-0443.2009.02844.x/epdf

Four testing modalities are used: (i) twice-daily breath testing for alcohol; (ii) ankle bracelets that monitor alcohol consumption continuously with daily remote electronic reporting; (iii) twice-weekly urine testing for drugs; and (iv) sweat patches for drug monitoring (worn for 7 – 10 days and mailed in). Random drug testing was added to alcohol testing to discourage substitution. In the following example, we consider a PID of type (ii):

  • Context: Remote supervision of an individual’s alcohol intake.

  • Entity: The offender’s breathalyzer.

  • Identifier: Tagging breathalyzer’s identifier.

  • Characteristics: The conditions of the sentence of the court, e.g., location, time and personal conditions.

  • Behaviours: The alcohol intake of the offender.

  • Attributes: The measurements of percentage of alcohol in exhaled air.

  • Record: Offender s breathalyzer identifier, blood concentration level less than 0.02%, breathalyser measurement .

  • Intervention: The triggering condition if breathalyser measurement B lies between .

7 Stream Model Case Study: Remote Alcohol Monitoring

To illustrate the use the stream models in subsection 3.1 we make a specification of alcohol monitoring.

Time. Let be a set of time points counting minutes. We will consider monitoring over an interval .

Behaviour. The quality to be monitored is blood alcohol content. Let this be measured as a percentage and so let the scale for blood alcohol be . Over time, a potential variation in measurement of blood alcohol content is represented by a stream

which is a total function

where and for

and

means there was no reading at time . Let be the space of all possible variations in measurements.

Suppose the technology makes a measurement every minutes. Then the offender’s blood alcohol content can be sampled at times

For example, minutes.

Context: Entities, Characteristics and Behaviour. The entities to be monitored are offenders but what are actually monitored are the PIDs attached to them. For simplicity, we identify offenders with their PIDs, which are known by their identifiers (e.g., serial numbers). Let be the set of offenders to be monitored.

The characteristics of an offender consist of data defining

  1. the offenders sentence , and

  2. the status of the offender’s compliance, .

Suppose a sentence is specified by

  1. start time of sentence,

  2. end time of sentence,

  3. sample rate for testing alcohol,

  4. alcohol limit .

A sentence is represented by a 4-tuple . Let be the set of sentences.

Suppose the status of an offender’s compliance is

  • green: offender’s content

  • red: offender’s content

  • amber: offender’s content

  • absent: no measurement; e.g. .

where is an error margin. Let be the set of possible states of offenders.

Using the framework, the set of characteristics is

Using 13, the behaviour is determined by the offender and characteristics

where



Attributes and Observations. Attributes are dependent on entities and characteristics: we are in the case of individual observation. To observe blood content over any period with sample rate , we calculate the number of tests possible

and compute the upper bound over the period:

If any then is not defined.

Compliance with the sentence for the period is observed by the attributes

Notice that we have a family

of Boolean-valued attributes, each of which is a function of the sentence . The four predicates are quantifier-free formulae. The different attributes lead to different judgements, which correspond with status. Thus, let

Using the framework, and especially subsection 5.4, we define



Monitor. The records have the form

Typically, . Using the stream interpretation of the framework, equation 21, we have

and for offender , sentence , status , and parameterised attribute , we have

To complete our illustration of the framework, we turn to interventions.

Interventions. Interventions are needed when the judgement in the monitoring record are red, amber or absent.

The real world intervention begins with updating the status data in the monitoring record. Using the framework, we gave the trigger condition

defined by

The trigger condition causes change in the characteristics of the entity by means of

if then there is no change and

and if then

where .

Computability. It is not difficult to create an appropriate a stream algebra to act as a platform for the monitoring and intervention stack for alcohol monitoring, and to show that monitoring and interventions are computable in, say, an abstract computability model such as while-array programs (using section 5.4).

Extensions. We have made some assumptions that simplify the monitoring model and its explanation. Sentences, monitoring technologies and notification protocols can be more complicated. We note some refinements that affect time. Consider the questions:

  • How long is a sentence?

  • Does it refer to special periods of the day?

  • How frequently are measurements made?

  • How frequently is the offender authenticated?

  • How frequently are measurements evaluated and reported?

Answers to these questions lead to developments of the model: new data and time parameters, and new streams are introduced. To gain an impression, we reflect on the following case.

Suppose a sentence specifies that an offender must remain “dry” for period of days in the sense that his or her blood alcohol content is never more than . Suppose the offender’s content can be measured every minutes, and the measurements evaluated and reported/uploaded at certain fixed times of the day. Suppose the offender is authenticated each time the data is uploaded. New parameters are needed for scheduling old and new features. For instance, suppose the sentence is days and the limit is . Suppose the technology makes measurements every 60 minutes, but the checking of measurements, uploading data, and authentication of the offender takes place every 8 hours at 7:00,15:00 and 23:00. The components of the model presented can be expanded to accommodate these scheduling constraints and more complicated protocols for intervention devised.

8 Concluding Remarks

In this paper, we have (i) given a general conceptual framework for thinking about monitoring; (ii) used it to develop a general mathematical model of monitoring based on modelling behaviour as streams of data; and (iii) illustrated the framework and stream model with case studies from criminal justice. This is the first in a series of papers that aims to develop a general theory of monitoring.

8.1 Monitoring Applications

There are many areas where monitoring is a core activity and where the theory could be developed further and applied. Our original motivation was to provide tools to analyse the role of monitoring in governmental, civic, social and personal contexts. Monitoring is a foundation upon which studies of surveillance, privacy and identity may be built.

However, an obvious area in which to study examples of monitoring is computer systems, where every form of interaction can be recorded. For example, cloud computing services involve several interesting forms of monitoring.101010The different kinds of monitoring activities in the cloud are many and have been broadly categorised in [27] according to two factors: (i) the architectural layer of the cloud that is being observed, and (ii) the purpose for which the monitoring is being performed. A similar categorisation is developed in [1]. In the case where computing resources are rented to customers on a pay-as-you-go basis, the customer’s account with the provider is governed by a service-level agreement (SLAs) that specifies the terms and conditions for the customer and guarantees a quality of service (QoS) to be delivered by the provider [17]. Monitoring of the SLA is needed. From the provider’s perspective, continuous monitoring of the data centre’s hardware and software resources in real-time is important for provisioning cost-effective services. Conversely, the customer monitors the virtual services they use to measure their QoS performance. The observations gathered from monitoring helps the customer decide on changes – e.g., to provision more or less resources – in response to frequently changing user requirements.

Another obvious area is that of eHealth systems. Examples of eHealth monitoring systems are ubiquitous in clinical environments, of course. In addition, there are newer systems that enable rapid patient access to services and information [12, 14, 30].111111There is also medical practice management software [24, 31] used by clinics to organise patient profiles, appointment schedules and billing, and large-scale information systems to manage physical resources and patient care within hospitals, all of which is monitored. The proliferation of mobile devices, such as smart phones and smart watches, means that users outside a clinical environment can regularly monitor and record their health data. eHealth systems are used directly by patients to assist in managing diabetes [23, 20] or record and track heart symptoms [19, 2, 3].

8.2 Technical Developments

The ideas in this paper can be developed in several directions, some of which we have indicated. There are the theoretical developments of

(a) data types of identifiers for entities in contexts;

(b) semantic models of behaviour in time and space (e.g., process theories involving non-determinism and concurrency);

(c) languages and logics for attribute specification;

(d) (non-boolean) data types for making judgements;

(e) safety and liveness properties for interventions;

(f) computability and complexity theories for monitoring;

(g) applications to problems in surveillance such as privacy.

We expect that several of these directions can be developed using existing theoretical models and methods. For example, abstract data type theory can be employed to study identity [43] and the role of space in behaviours [21]. However, to make these theoretical developments we need to collect a large variety of examples of monitoring contexts.

It is also important to clarify the relationship between monitoring and ‘big data’. In both the physical world and virtual world the activities of people, the properties of objects, and the performance of services, systems and machines are represented and modelled by data. With the abundance of methods of data collection varying from sensors operating at fantastically high speeds, through automatic record keeping and mining of customers’ accounts, to slow manual data entry at regular, possibly long, time intervals. Nevertheless, regardless of how it is collected, the data commonly comes from a form of monitoring. We argue that it is the world’s appetite for monitoring that drives its desire for data. For example, the contemporary concerns, technologies and applications of ‘big data’ depend upon monitoring. We believe monitoring systems to be a topic with considerable potential for general theories and diverse applications.

References

  • [1] Giuseppe Aceto, Alessio Botta, Walter De Donato, and Antonio Pescapè. Cloud monitoring: a survey. Computer Networks, 57(9):2093–2115, 2013.
  • [2] D. Albert, B.R. Satchwell, and K.N. Barnett. Wireless, ultrasonic personal health monitoring system, July 5 2012. US Patent App. 13/420,520.
  • [3] AliveCor. Mobile ECG. Retrieved from http://www.alivecor.com.
  • [4] David Anderson. A question of trust: report of the investigatory powers review. Retrieved from https://www.gov.uk/government/publications/a-question-of-trust-report-of-the-investigatory-powers-review, 11 June 2015.
  • [5] K. D. Austin, J. F. Johnson and R. J. Weitzer. Alternatives to the secure detention and confinement of juvenile offenders. Retrieved from https://www.ncjrs.gov/pdffiles1/ojjdp/208804.pdf, September 2005.
  • [6] M. Baber. The criminal justice and court service bill: Probation, community sentences and exclusion orders (Bill 91 of 1999-2000). Retrieved from http://researchbriefings.parliament.uk/ResearchBriefing/Summary/RP00-36#fullreport, 27 March 2000.
  • [7] M. Black and R. G. Smith. Electronic monitoring in the criminal justice system. Retrieved from http://www.aic.gov.au/media_library/publications/tandi2/tandi254.pdf, 2003.
  • [8] B. Brady. Prisoners ‘to be chipped like dogs’. Retrieved from http://www.independent.co.uk/news/uk/politics/prisoners-to-be-chipped-like-dogs-769977.html, 23 October 2011.
  • [9] M. Bright. Surgical tags plan for sex offenders. Retrieved from http://www.theguardian.com/society/2002/nov/17/childrensservices.crime, 17 November 2002.
  • [10] Adam D. Burns and Max A. Neumeyer. Mobile application development: The mobile intoxication assessment tool. Retrieved from http://orzo.union.edu/Archives/SeniorProjects/2012/CS.2012/, 2012.
  • [11] A. H. Crowe. Electronic supervision: From decision-making to implementation. Corrections Today, 64:130–133, 2002.
  • [12] Scott G. Cunningham, Deborah J. Wake, Annalu Waller, and Andrew D. Morris. Definitions of eHealth. In Antonio Gaddi, Fabio Capello, and Marco Manca, editors, eHealth, Care and Quality of Life, pages 15–30. Springer Milan, 2014.
  • [13] K. Deak, G. Gurran and J. Condell. A survey of active and passive indoor localisation systems. Computer Communications, 35(16):1939–1954, 2012.
  • [14] G. Eysenbach. What is e-health? Journal of Medical Internet Research, 3(2), 2001. Retrieved from http://www.jmir.org/2001/2/e20/.
  • [15] T. Fabelo. Technocorrections: Promises and uncertain threats. Retrieved from https://www.ncjrs.gov/pdffiles1/nij/181411.pdf, May 2000.
  • [16] K. R. Foster and J. Jaeger. Ethical implications of implantable radiofrequency identification (RFID) tags in humans. The American Journal of Bioethics, 8(8):44–48, 2008.
  • [17] Andrés García García, Ignacio Blanquer Espert, and Vicente Hernández García. SLA-driven dynamic cloud resource management. Future Generation Computer Systems, 31(0):1 – 11, 2014.
  • [18] German National Academy of Science and Engineering. Securing the future of german manufacturing industry: Recommendations for implementing the strategic initiative industrie 4.0. Retrieved from http://www.acatech.de/fileadmin/user_upload/Baumstruktur_nach_Website/Acatech/root/de/Material_fuer_Sonderseiten/Industrie_4.0/Final_report__Industrie_4.0_accessible.pdf, April 2013.
  • [19] D G Goroso, R R da Silva, L R Battistella, M Odstrcil, and M Paolini. Monitoring heart rate variability online using e-health oriented 3G mobile telephone services. Journal of Physics: Conference Series, 477(1):012036, 2013.
  • [20] J Ignacio Hidalgo, Esther Maqueda, José L Risco-Martín, Alfredo Cuesta, J Manuel Colmenar, and Javier Nobel. glucmodel: a monitoring and modeling system for chronic diseases applied to diabetes. Journal of biomedical informatics, 2014.
  • [21] K Johnson and J V Tucker. The data type of spatial objects. Formal aspects of computing, 25:189–218, 2013.
  • [22] A. Jolin. Drug treatment and electronically monitored home confinement: An evaluation of a community-based sentencing option. Crime & Delinquency, 38(2):158–170, 1992.
  • [23] Ozgur Kafali, Stefano Bromuri, Michal Sindlar, Tom van der Weide, Eduardo Aguilar Pelaez, Ulrich Schaechtle, Bruno Alves, Damien Zufferey, Esther Rodriguez-Villegas, Michael Schumacher, and Kostas Stathis. Commodity: A smart e-health environment for diabetes management. Journal of Ambient Intelligence and Smart Environments, 5(5):479–502, 2013.
  • [24] Kareo. Practice management. Retrieved from http://www.kareo.com/practice-management.
  • [25] J Loeckxs, H-D Ehrich, and M Wolf. Specification of Abstract Data Types. Wiley Teubner, 1996.
  • [26] K. Meinke and J. V. Tucker. Universal algebra. In Handbook of logic in computer science, volume 1, pages 189–368. Oxford University Press, 1992.
  • [27] Jesús Montes, Alberto Sánchez, Bunjamin Memishi, María S. Pérez, and Gabriel Antoniu. GMonE: A complete approach to cloud monitoring. Future Generation Computer Systems, 29(8):2026 – 2040, 2013.
  • [28] M. Nellis. The electronic monitoring of offenders in England and Wales: Recent developments and future prospects. British Journal of Criminology, 31(2):165–185, 1991.
  • [29] M. Nellis. Surveillance and confinement: Explaining and understanding the experience of electronically monitored curfews. European Journal of Probation, 1(1):41–64, 2009.
  • [30] World Health Organization. Atlas eHealth country profiles. Based on the findings of the second global survey on ehealth. http://www.who.int/goe/publications/goe_atlas_2010.pdf, 2011.
  • [31] Practo. Practoray practice management software. Retrieved from https://www.practo.com/ray.
  • [32] V. Rondinelli. Tracking humans: The electronic bracelet in a modern world, August 1997. Criminal Lawyers’ Association Newsletter.
  • [33] B. Russell. Dangerous paedophile must wear GPS tracker for life after assaulting woman he mistook for child. Retrieved from http://www.mirror.co.uk/news/uk-news/dangerous-paedophile-must-wear-gps-3929413, 29 July 2014.
  • [34] V Stoltenberg-Hansen and J V Tucker. Effective algebras. In S Abramsky, D Gabbay, and T Maibaum, editors, Handbook of Logic in Computer Science. Volume IV: Semantic Modelling, pages 357–526. Oxford University Press, 1995.
  • [35] V Stoltenberg-Hansen and J V Tucker. Computable rings and fields. In E Griffor, editor, Handbook of Computability Theory, pages 363–447. Elsevier, 1999.
  • [36] F Swetz and D E Smith. Capitalism and Arithmetic: The New Math of the 15th Century. Open Court, 1987.
  • [37] J V Tucker and J I Zucker. Computable functions and semicomputable sets on many sorted algebras. In S Abramsky, D Gabbay, and T Maibaum, editors, Handbook of Logic in Computer Science. Volume V: Logical and Algebraic Methods. Oxford University Press, 2000.
  • [38] J V Tucker and J I Zucker. Abstract versus concrete computability: The case of countable algebras. In V Stoltenberg-Hansen and J Väänänen, editors, Logic Colloquium ’03, Proceedings of Annual European Summer Meeting of Association for Symbolic Logic, volume 24 of Lecture Notes in Logic, pages 377–408. Association for Symbolic Logic, 2003.
  • [39] J V Tucker and J I Zucker. Continuity of operators on continuous and discrete time streams. Theoretical Computer Science, 412:3378–3403, 2011.
  • [40] J V Tucker and J I Zucker. Computability of operators on continuous and discrete time streams. Computability, 3:9–44, 2014.
  • [41] J V Tucker and J I Zucker. Generalizing computability to abstract algebra. In Giovanni Sommaruga and Thomas Strahm, editors, Turing’s Revolution: The Impact of His Ideas About Computability. Birkhäuser, Springer Basel, 2015.
  • [42] V. Wang and J. V. Tucker. On a general theory of monitoring. 2016.
  • [43] Victoria Wang and John V Tucker. Formalising surveillance and identity. Retrieved from http://arxiv.org/abs/1408.3439, 2014.
  • [44] A. Ward. Sensor-driven Computing. PhD thesis, University of Cambridge, August 1998. Retrieved from http://www.cl.cam.ac.uk/research/dtg/attarchive/bat/sdc.pdf.