Papers by Shaul A Duke
European Journal of Nuclear Medicine and Molecular Imaging, 2024
Bookmarks Related papers MentionsView impact
Surveillance & Society , 2023
The shift to novel forms of artificial intelligence (such as machine learning) has also marked th... more The shift to novel forms of artificial intelligence (such as machine learning) has also marked the shift to industrial-scale surveillance practices, due to these AI tools being extremely data-hungry. This piece examines the linkage between the two phenomena and charts the ethical consequences. It calls for a much more measured way of weighing the benefits of the development of AI tools, against their cost in the form of proliferation of both the means and products of surveillance.
Bookmarks Related papers MentionsView impact
Ethics and Information Technology
Developers are often the engine behind the creation and implementation of new technologies, inclu... more Developers are often the engine behind the creation and implementation of new technologies, including in the artificial intelligence surge that is currently underway. In many cases these new technologies introduce significant risk to affected stakeholders; risks that can be reduced and mitigated by such a dominant party. This is fully recognized by texts that analyze risks in the current AI transformation, which suggest voluntary adoption of ethical standards and imposing ethical standards via regulation and oversight as tools to compel developers to reduce such risks. However, what these texts usually sidestep is the question of how aware developers are to the risks they are creating with these new AI technologies, and what their attitudes are towards such risks. This paper asks to rectify this gap in research, by analyzing an ongoing case study. Focusing on six Israeli AI startups in the field of radiology, I carry out a content analysis of their online material in order to examine these companies’ stances towards the potential threat their automated tools pose to patient safety and to the work-standing of healthcare professionals. Results show that these developers are aware of the risks their AI products pose, but tend to deny their own role in the technological transformation and dismiss or downplay the risks to stakeholders. I conclude by tying these findings back to current risk-reduction recommendations with regards to advanced AI technologies, and suggest which of them hold more promise in light of developers’ attitudes.
Bookmarks Related papers MentionsView impact
Trust and Transparency in an Age of Surveillance, 2022
The term transparency lives a double life. On the one hand it has the clean-cut image – of a univ... more The term transparency lives a double life. On the one hand it has the clean-cut image – of a universal standard of proper forms of operation in a free society – that seems to be accepted by most; yet on the other hand it has a rougher image of a power move that tries to expose its target to scrutiny and undermine some of its actions. My task in this paper is to differentiate between the two and to analyse the dynamics of the much less studied ‘imposed transparency’ strand, which comes into play in cases in which a pre-existing social conflict is present, which in turn dictates a low-level of trust between the relevant parties to begin with. In such situation, when the parties do not trust each other, transparency is almost always forced by one party on the other (via surveillance) and almost never willingly adopted by either party. Among other things I am interested in: the reasons why individuals/organizations turn to imposed transparency as a political strategy, the ways imposed transparency is carried out and the identity of those who tend to use it, the ways the targets of imposed transparency react to it, the degree these targets tend to accept imposed transparency or resist and evade it, the dynamics that mutual attempts of imposed transparency create, the role that power asymmetries and social domination have in such attempts, and the effectiveness of forcing transparency in order to achieve one’s goal.
Bookmarks Related papers MentionsView impact
Surveillance & Society, 2021
This article tackles one of the latest-but nonetheless baffling-displays of public apathy towards... more This article tackles one of the latest-but nonetheless baffling-displays of public apathy towards surveillance: that of much of the Israeli public towards the decision to recruit the Israeli Security Agency (Shin Bet) to do COVID-19 contact tracing during the ongoing coronavirus pandemic. The case of a secretive state agency being authorized to do surveillance on its citizens for a strictly non-security-related matter seems to realize many of the dangers that surveillance/privacy scholars warn about with regards to surveillance expansion, function creep, and the creation of a surveillance state. I contribute to existing literature about apathy towards surveillance and the privacy paradox by offering the term "nontargets" as an explanation. This term suggests that, alongside social groups that are likely to be targeted by a given surveillance application, there are certain recognizable nontargets that most likely will not bear the brunt of the surveillance, at least not in the short-and medium-term, and thus do not fear it. In the case at hand, which is examined using a qualitative context-bound study, I suggest that Jewish-Israelis are such a nontarget group with regards to this novel Shin Bet surveillance, which explains a significant part of their apathy towards it.
Bookmarks Related papers MentionsView impact
Surveillance & Society, 2019
This article offers a definition and explores the dynamics of database-driven empowering surveill... more This article offers a definition and explores the dynamics of database-driven empowering surveillance. That is, it focuses on surveillance from below that is directed at powerful institutions or groups for the benefit of the marginalized, using a database as its main facilitator. By examining six Israeli NGOs working for the protection of Palestinian human rights in the Occupied Palestinian Territories, I am able to break down the database-driven empowering surveillance process of amassing and disseminating information, to identify its mechanism of action, and to highlight its limiting and enabling factors. This scrutiny in turn helps shed light on the capacity of NGOs to effectively monitor powerful institutions: to surveil from below in spaces with pervasive top-down surveillance; to surveil in territories under the control of the surveillance subjects; to impact policy on polarized issues; and to enforce human rights. Empowering surveillance emerges from this article as a process that requires those carrying it out to maintain a delicate balance between using a forceful mechanism against those monitored, and being highly dependent on third parties with coercive power – often from the same organizations being monitored – to exact the desired deterring effect.
Bookmarks Related papers MentionsView impact
Current Sociology, 2018
During his short-lived but highly productive career, C. Wright Mills put forth a vision for how s... more During his short-lived but highly productive career, C. Wright Mills put forth a vision for how sociology should be done. Two central directives can be gleaned from this vision: to tackle macro social theory issues by doing large-scope research; to achieve scholastic independence by doing non-administrative research. One might ask if Mills is sending scholars on a mission impossible. Analysing these two concepts in terms of both their merits and applicability, the present article indeed identifies a conflict between them, highlighted by what emerges as Mills' own failure to realize this vision. After deeming these directives worthy goals, the article seeks to determine whether technological advances in the social sciences have the potential to allow both directives to be fulfilled at once. What is shown is that while the technology is ripe to enable autonomous big studies, its implementation by institutional and individual agents severely impedes the vision's realization.
Bookmarks Related papers MentionsView impact
Critical Sociology, 2016
Contemporary sociology seems to have extreme reservations about the significance of vote-motivate... more Contemporary sociology seems to have extreme reservations about the significance of vote-motivated responsiveness – ordinary people’s reputed influence on policy in democratic settings – both in general and especially when it comes to the masses’ role in endorsing policies with repressive outcomes. Those texts that do acknowledge the masses’ role in policymaking deal almost exclusively with the struggle of the lower-classes for emancipation/equalization, and rarely delve into broad social groups’ contribution to repressive policies. The repressive-responsiveness hypothesis suggested here is used to reexamine the case of internal Jewish ethnic politics in Mandatory Palestine. I argue that ethnic politics of this period can only be thoroughly understood once responsiveness to the majoritarian Ashkenazi workers’ interests is incorporated, thus suggesting that the use of democratic procedures was central to Mizrahi marginalization in that period.
Bookmarks Related papers MentionsView impact
Books by Shaul A Duke
Palgrave, 2017
This book examines a basic assumption behind most of the critical, progressive thinking of our ti... more This book examines a basic assumption behind most of the critical, progressive thinking of our times: that trade unions are necessarily tools for solidarity and are integral to a more equal and just society. Shaul A. Duke assesses the trade union's potential to promote equality in ethnically and racially diverse societies by offering an in-depth look into how unions operate; how power flows between union levels; where inequality originates; and the role of union members in union dynamics. By analyzing the trade union's effects on working-class inequality in Palestine during 1920-1948, this book shifts the conventional emphasis on worker-employer relations to that of worker-worker relations. It offers a conceptualization of how strong union members directed union policy from below in order to eliminate competition, often by excluding marginalized groups. The comparison of the union experiences of Palestinian-Arabs, Jewish-Yemeni immigrants, and Jewish women offers a fresh look into the labor history of Palestine and its social stratification.
Bookmarks Related papers MentionsView impact
Book Reviews by Shaul A Duke
Journal of Ethics and Emerging Technologies, 2022
Bookmarks Related papers MentionsView impact
Surveillance & Society, 2022
Bookmarks Related papers MentionsView impact
Surveillance & Society, 2021
Surveillance scholars are still-to this day and despite surveillance's growing visibility and the... more Surveillance scholars are still-to this day and despite surveillance's growing visibility and the significant body of work that this field has produced-being asked the "so what?" question. That is, we are being questioned over the significant effects that surveillance practices have on people's lives, with a clear insinuation that the effects are mostly absent, neutral, or benign. While surveillance scholars have offered up what can be considered "a list" of effects that these practices have on people's lives, this list has to be constantly updated in order to encompass the variety and depth of ways in which surveillance makes a difference. Digital vigilantism, which is the main term that the book Introducing Vigilant Audiences centers around, is one such significant effect. Digital vigilantism has several possible definitions, one of them being "the process whereby citizens collectively take action, in the online realm, against other citizens they feel offended by or who have opposing views about an issue" (26). This term, and the somewhat overlapping "digilantism" term, are different from common practices of trolling in that the actions here are aimed at promoting values or political goals and are done in cooperation with others, not individualistically. Still, digital vigilantism encompasses quite a wide range of operation, spanning from social media attacks on North American celebrities (25-48) to online combat against hate speech in the US (215-258) and Slovenia (187-213) to exposure and denunciation of school violence in Morocco (161-186) to moral policing of what vigilante attackers consider "social deviance" in Russia (107-127)-to name just some of the examples that this book contains. Indeed, Introducing Vigilant Audiences does a great job of delivering on the promise to introduce the relatively novel topic of digital vigilantism and its breadth of application to contemporary readers. With its twelve chapters and array of authors from across the globe, it is packed with relevant case studies that provide evidence of the recurrent dynamics that such vigilantism creates, and of the diverse forms it may take according to the different contexts in which it is practiced. The richness of empirical examples makes this edited book a fascinating read and reduces the need for prior familiarity with theories in this field (which makes it suitable for undergraduate students). While I believe this book may be interesting for many scholars of racial and ethnic studies, social movements studies, and technology and society, surveillance scholars in particular can benefit from it by learning how surveillance practices are used in order to promote social and political goals.
Bookmarks Related papers MentionsView impact
Teaching Documents by Shaul A Duke
YouTube, 2022
Shoshana Zuboff's 2019 book-The Age of Surveillance Capitalism: The fight for a human future at t... more Shoshana Zuboff's 2019 book-The Age of Surveillance Capitalism: The fight for a human future at the new frontier of power-is one of the most influential books written in the fields of: surveillance studies, privacy studies, and AI studies in the last two decades. Its ambitious aims, insights, and bold statements enticed both scholars and laypeople alike to either skim through it, or read it, in an attempt to get a grasp of our current situation with regards to emerging surveillance technologies and their effect upon society. As such, it deserves close scrutiny that will try to: highlight its strong points, analyze its weak points, and deduce what can be confidently said about surveillance capitalism after the critiques. This three-part analysis is an attempt to offer such critique.
Part one of this critique is dedicated to the strong points and things we should live with.
Bookmarks Related papers MentionsView impact
YouTube, 2022
Shoshana Zuboff's 2019 book-The Age of Surveillance Capitalism: The fight for a human future at t... more Shoshana Zuboff's 2019 book-The Age of Surveillance Capitalism: The fight for a human future at the new frontier of power-is one of the most influential books written in the fields of: surveillance studies, privacy studies, and AI studies in the last two decades. Its ambitious aims, insights, and bold statements enticed both scholars and laypeople alike to either skim through it, or read it, in an attempt to get a grasp of our current situation with regards to emerging surveillance technologies and their effect upon society. As such, it deserves close scrutiny that will try to: highlight its strong points, analyze its weak points, and deduce what can be confidently said about surveillance capitalism after the critiques. This three-part analysis is an attempt to offer such critique.
Part two of this critique is dedicated to the weak points in Zuboff's book.
Bookmarks Related papers MentionsView impact
YouTube, 2022
Shoshana Zuboff's 2019 book-The Age of Surveillance Capitalism: The fight for a human future at t... more Shoshana Zuboff's 2019 book-The Age of Surveillance Capitalism: The fight for a human future at the new frontier of power-is one of the most influential books written in the fields of: surveillance studies, privacy studies, and AI studies in the last two decades. Its ambitious aims, insights, and bold statements enticed both scholars and laypeople alike to either skim through it, or read it, in an attempt to get a grasp of our current situation with regards to emerging surveillance technologies and their effect upon society. As such, it deserves close scrutiny that will try to: highlight its strong points, analyze its weak points, and deduce what can be confidently said about surveillance capitalism after the critiques. This three-part analysis is an attempt to offer such critique.
Part three of this critique is dedicated to the take home points from Zuboff's book, after we internalize the critiques .
Bookmarks Related papers MentionsView impact
Introduction to Surveillance (video course), 2021
This is a learn-from-examples video, and it deals with two major forms of video-driven surveillan... more This is a learn-from-examples video, and it deals with two major forms of video-driven surveillance: closed-circuit TV (CCTV) and empowering surveillance videos. This video explains how each type works; explains what the desired and unintended effects are; goes into the history of both forms of surveillance; and sheds light on what surveillance scholars learned about their respective effectiveness.
Bookmarks Related papers MentionsView impact
Introduction to Surveillance, 2020
This is the first lesson of the ‘Introduction to Surveillance’ video course. Besides giving a sho... more This is the first lesson of the ‘Introduction to Surveillance’ video course. Besides giving a short overview of the surveillance field, and accounting for the popularity of surveillance studies, this video focuses mainly on offering an up-to-date (as of 2020) definition of the term surveillance.
Bookmarks Related papers MentionsView impact
Introduction to Surveillance (video course), 2020
This is a learn-from-examples video, part of an ‘Introduction to Surveillance’ video course, and ... more This is a learn-from-examples video, part of an ‘Introduction to Surveillance’ video course, and it deals with two major and long-lasting forms of top-down database-driven surveillance: credit cards and loyalty cards. This video explains the main features of surveillance that is carried out with the help of databases; connects the technological aspects to the social aspects; reviews some of the history and the insights surrounding credit cards and loyalty cards; and gives a brief overview of some of the critiques that were offered by surveillance scholars with regards to these two types of cards and of electronic surveillance generally.
Bookmarks Related papers MentionsView impact
Drafts by Shaul A Duke
YouTube, 2022
Intuitively the idea that tech giants may actually be vulnerable to social action taken against t... more Intuitively the idea that tech giants may actually be vulnerable to social action taken against them seems mistaken. Tech giants, as the name states explicitly, are giants. Huge corporations, with lots of managers and professionals working diligently to increase the size and reach of the corporation, with obscene amounts of money to spend, with tentacles spread into a variety of economic sectors and revenue streams, and with hundreds of millions of users and customers. If we take all these elements together, taking these giants head on seems more a practice in futility, than anything else. A hopeless cause, and a waste of energies. Still, delving a little bit deeper into the cases of these tech giants reveals a different, more complex picture. While a number of elements make them somewhat immune to social action taken against them, other elements actually make them vulnerable and easy targets. In this video I will assess elements working in both directions, and try to determine if such struggles against tech giant are worthwhile.
Bookmarks Related papers MentionsView impact
YouTube, 2021
The story of WeWork, the company that claimed to reinvent the workplace, and which at one point r... more The story of WeWork, the company that claimed to reinvent the workplace, and which at one point rose to a valuation of a whopping 47 billion dollars, is the story of technological development in the current stratospheric valuation reality. It is what happens when certain innovative companies are assessed as being worth fantastic amounts of money, based on a number of superficial indicators, which nonetheless seem to be agreed upon by many of the dominant investors. Interestingly, instead of WeWork becoming a cautionary tale about how hi-tech companies are being overvalued in our current financial market, it is being framed as a one-off case which thanks to one person's strong charisma and perhaps manipulativeness and an unusual set of circumstances managed to slip through the cracks. This framing seems to ensure that no real lessons will be learned from this case, and that the party of stratospheric valuations will go on.
Bookmarks Related papers MentionsView impact
Uploads
Papers by Shaul A Duke
Books by Shaul A Duke
Book Reviews by Shaul A Duke
Teaching Documents by Shaul A Duke
Part one of this critique is dedicated to the strong points and things we should live with.
Part two of this critique is dedicated to the weak points in Zuboff's book.
Part three of this critique is dedicated to the take home points from Zuboff's book, after we internalize the critiques .
Drafts by Shaul A Duke
Part one of this critique is dedicated to the strong points and things we should live with.
Part two of this critique is dedicated to the weak points in Zuboff's book.
Part three of this critique is dedicated to the take home points from Zuboff's book, after we internalize the critiques .