Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   9  
      Counterterrorism LawCounterterrorism (CT)Counterterrorism policingSurveillance
Prolongeant ses travaux sur la répression, Vanessa Codaccioni analyse et dénonce les ressorts de « la société de vigilance ». Surveillance massive, appel à la délation, légitimation de la répression : une nouvelle servitude volontaire est... more
    • by 
    •   15  
      ResilienceDiscriminationSurveillance StudiesNeoliberalism
Prolongeant ses travaux sur la répression, Vanessa Codaccioni analyse et dénonce les ressorts de « la société de vigilance ». Surveillance massive, appel à la délation, légitimation de la répression : une nouvelle servitude volontaire est... more
    • by 
    •   18  
      Race and RacismResilienceDiscriminationSurveillance Studies
    • by 
    •   7  
      Theatre StudiesPerformance StudiesDiversityDigital Media
[T]he law recognizes that we inherently have to bear the risk of the "tattletale" but draws the line at concluding that we must also bear, as the price of choosing to speak to another human being, the risk of having a permanent electronic... more
    • by 
    •   3  
      Criminal LawSurveillance StudiesSurveillance
This article examines dynamics of financial surveillance and risk-based regulation in the context of ongoing activities to combat money laundering and terrorist financing. Close analysis of the situation in the UK reveals entangled forms... more
    • by 
    •   10  
      International RelationsRegulatory ComplianceCritical Security StudiesInternational Political Economy
While recognizing the need for intelligence gathering and acknowledging that gathering such intelligence may require the adoption of extraordinary measures and approaches, international human rights law ascribes limits to how such... more
    • by 
    •   10  
      TerrorismHuman RightsInternational Human Rights LawIntelligence and Espionage
    • by 
    •   89  
      PrivacyFighting and Preventing Corruption through LawPolitical ScienceSurveillance (Sociology)
We investigate the case of a Microcredit Platform that offers financial services in an impoverished region of Brazil. Through this case, we verify how the intermediation of human microcredit agents is essential to create critical mass... more
    • by 
    •   4  
      SurveillanceMicrocreditDigital PlatformsFintech
This dissertation analyzes the postfeminist tendencies and biopolitics in contemporary media practices by considering the pop culture exemplar, the Kardashian-Jenner family. This dissertation received First Class Honors from Trinity... more
    • by 
    •   96  
      MarketingSociologyCultural StudiesMedia Sociology
Emerald ash borer (EAB), a wood-boring insect native to Asia, was discovered near Detroit in 2002 and has spread and killed millions of ash trees throughout the eastern United States and Canada. EAB causes severe damage in urban areas... more
    • by  and +1
    •   6  
      SurveillanceCanadaUncertaintyStochastic Optimization
Background Prolonged sitting time is a risk factor for chronic disease, yet recent global surveillance is not well described. The aims were to clarify: (i) the countries that have collected country-level data on self-reported sitting... more
    • by 
    •   12  
      EducationSurveillance EpidemiologyPublic Health PolicyPhysical Activity
    • by 
    •   14  
      SociologyPolitical SociologyEuropean StudiesInternational Relations
    • by 
    •   6  
      International SecuritySecuritySurveillance StudiesSurveillance
While players are enjoying casual mobile games like Candy Crush Saga, we also must negotiate elements that have been brought to the forefront by the intersection of networked play environments and casual game technologies. While casual... more
    • by 
    •   12  
      Data MiningPrivacyVideo Games and LearningComputer Games Technology
How does erasure execute knowledge production? The following is a tour through a collection of erasure that provides a glimpse into the many directions that this question may take us, through the lens of a series of artistic... more
    • by 
    •   9  
      AlgorithmsCensorshipContemporary ArtArchives
This is a critical appraisal of a manuscript outlining additional indicators used in the United States to augment traditional disease surveillance tools. The article went through the peer-review process. Therefore, it may be considered as... more
    • by  and +2
    •   3  
      SurveillanceUnited StatesCovid-19
Amazon’s Ring relies on infrastructural obfuscation to hide their infrastructures through urban camouflage (as doorbells, floodlights, sensors) while simultaneously expanding the carceral state and extending the industrial... more
    • by 
    •   9  
      Surveillance StudiesSurveillanceVideo SurveillanceInfrastructure
Abstract How does the multiplicity of surveilling gazes affect the experience of employees subjected to a matrix of domination in organisations? Building on a case study of ultra-religious Jewish women in Israeli high-tech organisations,... more
    • by  and +1
    •   6  
      ReligionGenderSurveillanceIntersectionality
Yirminci yüzyılın son çeyreğinde varlığını ve etkisini göstermeye başlayan küreselleşme, yirmi birinci yüzyılın ilk çeyreğinde etkisini daha da belirginleştirmektedir. Küreselleşme sürecinde iletişime dayalı, ekonomik, kültürel ve siyasal... more
    • by 
    •   6  
      GlobalizationPublic RelationsIdeologyKnowledge and Power
In April 2020, the Young Scholars Initiative of the Institute for New Economic Thinking, the Association for Promotion of Political Economy and Law, the International University College of Turin and Bocconi University, have launched a... more
    • by 
    •   3  
      SurveillanceState of exceptionCOVID-19 PANDEMIC
O primeiro volume da coleção “Ciberdireito e Democracia” conta com doze capítulos inseridos dentro das linhas temáticas propostas pelos organizadores, contando com autores comprometidos com a pesquisa no campo do Direito e da Democracia... more
    • by  and +8
    •   5  
      CyberlawPrivacyE-GovernmentSurveillance
Algorithmic profiling has become increasingly prevalent in many social fields and practices, including finance, marketing, law, cultural consumption and production, and social engagement. Although researchers have begun to investigate... more
    • by  and +1
    •   19  
      SociologyAlgorithmsCommunicationNew Media
    • by 
    •   52  
      Teacher EducationDigital TechnologyDigital CultureSurveillance Studies
Dynamically changing background ("dynamic background") still presents a great challenge to many motion-based video surveillance systems. In the context of event detection, it is a major source of false alarms. There is a strong need from... more
    • by 
    •   93  
      EngineeringElectrical EngineeringElectronic EngineeringComputer Science
Cameras are ubiquitous and increasingly mobile. While CCTV has captured considerable attention by surveillance researchers, the new visibility of police activities is increasingly produced by incidental sousveillance and wearable... more
    • by 
    •   16  
      SociologyCriminologyPolice ScienceVisual Studies
Every technology has its history. What are the beginnings of public television? This article explores the use of police CCTV in West Germany between the 1950s and the 1970s. In these early years, the public police cameras served three... more
    • by 
    •   7  
      CriminologyGerman HistoryCulturePolice
    • by 
    •   23  
      Media StudiesInternet StudiesDigital MediaMusic Video
Este artigo argumenta, assumindo uma perspectiva geopolítica, sobre o papel dos media cinematográficos como arma ideológica, política e cultural durante o período da Guerra Fria. Uma primeira abordagem, pretende esclarecer o conceito de... more
    • by 
    •   17  
      Media StudiesGeopoliticsPropagandaCold War and Culture
We would like to invite you to join this exciting new project as a chapter contributor. Since this is a textbook, a great deal of this chapter entails a survey on the topic under the paradigm of cyber-physical systems, what can be done... more
    • by 
    •   164  
      RoboticsComputer ScienceComputer GraphicsRobotics (Computer Science)
A paper-based disease reporting system has been associated with a number of challenges. These include difficulties to submit hard copies of the disease surveillance forms because of poor road infrastructure, weather conditions or... more
    • by  and +1
    •   3  
      Mobile TechnologySurveillance EpidemiologySurveillance
    • by 
    •   2  
      Surveillance StudiesSurveillance
This article is part Eight of a series exploring the links between evaluation and technologies. It considers the rehabilitation of RCTs as a methodology through a new relationship with big data: one that repurposes the technology of RCTs... more
    • by 
    •   20  
      PsychologyAlgorithmsEthicsTechnology
This contribution asks how the reliance on mass dataveillance of travellers is sustained as a central policy option in the governance of EU border security. It examines this question by analysing a recent initiative of the European... more
    • by 
    •   19  
      European StudiesInternational RelationsEuropean integrationInternational Studies
Neihan Duanzi, literally meaning ‘implied jokes’, was a Chinese mobile app where people posted jokes, satirical videos, spoofs and mashups. It was a product of Toutiao, the owner of one of China’s largest news and information content... more
    • by  and +1
    •   6  
      TechnologyProtestChinaFreedom Of Expression
At its heart, surveillance is an expression of power. As we interact with a host of techniques to monitor and track our every move, we accept both subtle and overt nudges to alter our behavior. Parenting is, in particular, laden with... more
    • by 
    •   6  
      Media StudiesRhetoricTelevision StudiesSurveillance Studies
    • by 
    •   7  
      SexualityGender and SexualityAuthenticityGender
    • by 
    •   16  
      Information SystemsConstitutional LawInformation SecurityFacial Recognition
    • by 
    •   9  
      TechnologyHuman RightsPrivacySurveillance
In the years following the attacks on September 11th, 2001, the American government and other governmental democracies who fall victim to Americentric hegemony have eroded away many of the rights and civil liberties enjoyed by their... more
    • by 
    •   17  
      Constitutional LawRace and RacismReality televisionSurveillance Studies
    • by 
    •   4  
      TeamsSurveillanceCall CenterCall Centers
This work addresses the development of an underwater remotely operated vehicle (ROV), required to obtain reliable visual information, used for surveillance and maintenance of ship shells and underwater structures of Colombian port... more
    • by 
    •   6  
      EngineeringRoboticsSurveillanceMechanical Engineering Design
…It was first proposed in May 2019 by Chairman Eric Schmidt, head of National Security Commission on Artificial Intelligence (NSCAI), a subcommittee of the Department of Defense, to adopt China’s model in the use of AI for mass... more
    • by 
    •   20  
      Artificial IntelligenceDevelopment EconomicsInternational RelationsEthics
Currently, surveillance and control efforts occur within the emergency management paradigm of national security. Within this paradigm, assertions of Indigenous self-determination and jurisdiction are commonly conceptualized as potential... more
    • by  and +1
    •   11  
      Indigenous or Aboriginal StudiesHuman Rights LawGovernmentalitySecurity Studies
    • by 
    •   5  
      SurveillanceÉthiqueLibertéSécurité informatique
Theories of migration deterrence have long posited that border enforcement infrastructure pushes migration routes into more rugged and deadly terrain, driving an increase in migrant mortality. Applying geospatial analysis of landscape and... more
    • by  and +1
    •   11  
      Spatial AnalysisBorder StudiesDeterrenceMigration
The advances in contemporary surveillance techniques have, for the past three decades, been bound with the development of cheap and efficient computational machines. These rapid changes in new media have made the task of theorising... more
    • by 
    •   7  
      New MediaSelf and IdentityGilles DeleuzeMichel Foucault
PurposeThis research analyzed the existing academic and grey literature concerning the technologies and practices of people analytics (PA), to understand how ethical considerations are being discussed by researchers, industry experts and... more
    • by 
    •   20  
      PsychologyEthicsPrivacyHuman Resource Management
    • by 
    •   5  
      SecuritySurveillance StudiesSurveillanceCritical Approaches to Security