Results for ' mass surveillance'

993 found
Order:
  1. Mass Surveillance: A Private Affair?Kevin Macnish - 2020 - Moral Philosophy and Politics 7 (1):9-27.
    Mass surveillance is a more real threat now than at any time in history. Digital communications and automated systems allow for the collection and processing of private information at a scale never seen before. Many argue that mass surveillance entails a significant loss of privacy. Others dispute that there is a loss of privacy if the information is only encountered by automated systems.This paper argues that automated mass surveillance does not involve a significant loss (...)
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  2. Indiscriminate mass surveillance and the public sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  3.  12
    Privacy at Great Cost: An Argument Against Collecting and Storing DNA and Location Data and Other Mass Surveillance.Mark Tunick - 2023 - Washington University Review of Philosophy 3:124-146.
    Mass surveillance involves the collection and storage of vast amounts of information, such as DNA samples from the general population, or location data from cell phones towers, aerial surveillance, and other sources, to then be used when a future crime occurs. For example, DNA from a crime scene could be checked against the database to identify a suspect; location data could identify suspects who were at the scene of a crime. Mass surveillance implicates important privacy (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  56
    Introduction to the Special Issue on the Ethics of State Mass Surveillance.Peter Königs - 2020 - Moral Philosophy and Politics 7 (1):1-8.
    Recent decades have seen an unprecedented proliferation of surveillance programs by government agencies. This development has been driven both by technological progress, which has made large scale surveillance operations relatively cheap and easy, and by the threat of terrorism, organized crime and pandemics, which supplies a ready justification for surveillance. For a long time, mass surveillance programs have been associated with autocratic regimes, most notoriously with the German Democratic Republic and the Stasi, its secret police. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  19
    The Shari’a Approach to Contemporary Problems of Mass Surveillance.Sattam Eid Almutairi - 2020 - Muslim World Journal of Human Rights 17 (1):1-44.
    The phenomenon of mass surveillance has confronted legal systems throughout the world with significant challenges to their fundamental norms and values. These dilemmas have been most extensively studied and discussed in relation to the kind of privacy cultures that exist in Europe and North America. Although mass surveillance creates the same kinds of challenges in Muslim countries, the phenomenon has rarely been discussed from the perspective of Shari’a. This article seeks to demonstrate that this neglect of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  16
    Facial Recognition in War Contexts: Mass Surveillance and Mass Atrocity.Juan Espindola - 2023 - Ethics and International Affairs 37 (2):177-192.
    The use of facial recognition technology (FRT) as a form of intelligence has recently made a prominent public appearance in the theater of war. During the early months of Russia's invasion of Ukraine, Ukrainian authorities relied on FRT as part of the country's defensive activities, harnessing the technology for a variety of purposes, such as unveiling covert Russian agents operating amid the Ukrainian population; revealing the identity of Russian soldiers who committed war crimes; and even identifying dead Russian soldiers. This (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  45
    Elliott D. Cohen, Mass Surveillance and State Control: The Total Information Awareness Project: New York: Palgrave Macmillan, 2010. 252 pp. ISBN 978-0-230-10304-7, $85.00 Hb. [REVIEW]Donna Yarri - 2012 - Journal of Value Inquiry 46 (1):103-105.
  8.  47
    Internet surveillance after Snowden.Christian Fuchs & Daniel Trottier - 2017 - Journal of Information, Communication and Ethics in Society 15 (4):412-444.
    PurposeThis paper aims to present results of a study that focused on the question of how computer and data experts think about Internet and social media surveillance after Edward Snowden’s revelations about the existence of mass-surveillance systems of the Internet such as Prism, XKeyscore and Tempora. Computer and data experts’ views are of particular relevance because they are confronted day by day with questions about the processing of personal data, privacy and data protection.Design/methodology/approachThe authors conducted two focus (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  9.  79
    A Modern Pascal's Wager for Mass Electronic Surveillance.D. Danks - 2014 - Télos 2014 (169):155-161.
    Debates about the moral permissibility of mass electronic surveillance often turn on whether consequentialist considerations legitimately trump relevant deontological rights and principles. In order to establish such overriding consequences, many proponents of mass surveillance employ a modern analogue of Pascal’s wager: they contend that the consequences of no surveillance are so severe that any probability of such outcomes legitimates the abrogation of the relevant rights. In this paper, I briefly review Pascal’s original wager about whether (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  10.  9
    Big data surveillance across fields: Algorithmic governance for policing & regulation.Anthony Amicelle - 2022 - Big Data and Society 9 (2).
    While the academic separation of policing and regulation is still largely operative, points of convergence are more significant than ever in the digital age, starting with concomitant debates about algorithms as a new figure of power. From the policing of illegal activities to the regulation of legal ones, the algorithmization of such critical social ordering practices has been the subject of growing attention. These burgeoning discussions are focused on one common element: big data surveillance. In accordance with such similarities (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  17
    Crowdwashing Surveillance; Crowdsourcing Domination.Tamar Megiddo - 2023 - Law and Ethics of Human Rights 17 (1):67-94.
    Governments regularly rely on citizens’ cooperation in exercising their authority, including the enforcement of rules. This is not only common, but also a necessary practice in a legal system. Technology makes such reliance easier, facilitating increased enforcement of law at little cost. Emergency provides an added legitimizing logic, encouraging citizens’ cooperation and leading them to uncritically follow the government’s lead to reduce the risk to the nation and to themselves. This article considers governments’ crowdsourcing citizens to monitor and surveil other (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  48
    Surveillance in ubiquitous network societies: normative conflicts related to the consumer in-store supermarket experience in the context of the Internet of Things.Jenifer Sunrise Winter - 2014 - Ethics and Information Technology 16 (1):27-41.
    The Internet of Things (IoT) is an emerging global infrastructure that employs wireless sensors to collect, store, and exchange data. Increasingly, applications for marketing and advertising have been articulated as a means to enhance the consumer shopping experience, in addition to improving efficiency. However, privacy advocates have challenged the mass aggregation of personally-identifiable information in databases and geotracking, the use of location-based services to identify one’s precise location over time. This paper employs the framework of contextual integrity related to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  13.  13
    Data Surveillance Since the Snowden Revelations: A Grotian Moment in International Law?Milan Tahraoui - 2022 - Grotiana 43 (1):87-112.
    Mass data surveillance practices have received heightened attention in international law since the Snowden revelations of 2013. In this article, I examine whether that attention has given rise to a “Grotian moment” regarding the regulation of these activities under international law. At the outset, I answer that question in the negative and conclude that no general customary international law rules have emerged. Yet, that is not the end of the story. At a more fundamental and conceptual level, far (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  39
    Les nouvelles technologies de surveillance et de contrôle : un défi éthique.David Boucher - 2014 - Éthique Publique 16 (2).
    La surveillance de masse peut être considérée comme un trait caractéristique des sociétés modernes. Son importance n’a d’égal que les moyens mis en place pour recueillir et amasser des renseignements. Parmi ces moyens, les nouvelles technologies de surveillance et de contrôle et surtout les manières de les déployer soulèvent un certain nombre d’enjeux éthiques qui, en avril 2008, ont fait l’objet d’un avis de la Commission de l’éthique de la science et de la technologie : Viser un juste (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  15.  6
    The Fog of Peace: War on Terror, Surveillance States, and Post-human Governance.Nandita Biswas Mellamphy - 2023 - Washington University Review of Philosophy 3:63-82.
    The War on Terror is an ambiguous term that has been used to circumvent the international laws of warfare. Instead of moving toward peace by way of limited warfare, and instead of preserving the independence of war and peace, War on Terror advances by masking itself in a fog of peace; it proliferates by overlapping the logic of “war-time” and “peace-time” operations. The fog of peace—as it shall herein be called—is a condition wherein the uncertainty qua “fog” of war,2 along (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  14
    JPat Brown; B. C. D. Lipton; Michael Morisy (Editors). Scientists under Surveillance: The FBI Files. Foreword by Steven Aftergood. Introduction by Walter V. Robinson. xix + 443 pp., notes. Cambridge, Mass./London: MIT Press, 2019. $24.95 (paper). ISBN 9780262536882. [REVIEW]Paul Rubinson - 2020 - Isis 111 (2):434-435.
  17.  13
    Under Observation: The Interplay Between eHealth and Surveillance.Samantha Adams, Ronald Leenes & Nadezhda Purtova (eds.) - 2017 - Cham: Imprint: Springer.
    The essays in this book clarify the technical, legal, ethical, and social aspects of the interaction between eHealth technologies and surveillance practices. The book starts out by presenting a theoretical framework on eHealth and surveillance, followed by an introduction to the various ideas on eHealth and surveillance explored in the subsequent chapters. Issues addressed in the chapters include privacy and data protection, social acceptance of eHealth, cost-effective and innovative healthcare, as well as the privacy aspects of employee (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  8
    ‘There is nothing less spectacular than a pestilence’: Picturing the pandemic in Mass Observation's COVID-19 collections.Annebella Pollen - 2023 - History of the Human Sciences 36 (2):71-104.
    What is to be gained by studying visual observation in Mass Observation's COVID-19 collections? What can we see of the pandemic through diarists’ images and words? Visual methods were part of the plural research strategies of social research organisation Mass Observation (MO) in its first phase, when it was established in 1937, but remained marginal in relation to textual research methods. This continues with the post-1981 revival of the Mass Observation Project (MOP), with its emphasis on life (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  14
    Knowing when to act: A call for an open misinformation library to guide actionable surveillance.Kenneth D. Mandl, Amalie Dyda, Maryke Steffens & Adam G. Dunn - 2021 - Big Data and Society 8 (1).
    The design and reporting of data-driven studies seeking to measure misinformation are patchy and inconsistent, and these studies rarely measure associations with, or effects on, behaviour. The consequence is that data-driven misinformation studies are not yet useful as an empirical basis for guiding when to act on emerging misinformation threats, or for deciding when it is more appropriate to do nothing to avoid inadvertently amplifying misinformation. In a narrative review focused on examples of health-related misinformation, we take a critical perspective (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  9
    The old in the new: Voter surveillance in political clientelism and datafied campaigning.Isabel Kusche - 2020 - Big Data and Society 7 (1).
    This article compares political clientelism and datafied campaigning as two modes of relating politicians/parties and voters that are centred around voter surveillance. It contributes to the discussion on consequences of Big Data by showing similarities of datafied campaigns with a type of electoral politics that pre-dates the advent of mass media and is usually regarded as deficient. It thus departs from the predominant perspective on datafication and surveillance, which draws on Foucault, in order to identify the particular (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  18
    Post-panoptic panopticism in docile mass media.Anna Sámelová - 2014 - Human Affairs 24 (4):470-480.
    The main theme of the paper is the role of the mass media in the production, creation, retention, protection and defense of a social order, or in carrying out revisions, or cosmetic and extensive changes to it. In the first section, the author explains the Power of the Mass Media by looking at Foucauldian leprosy/plague management. The second part, Docile Mass Media Producers Under Panoptic Control, deals with the routinization of the mass media craft. Finally, the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  22.  45
    Uninformed consent: Mass screening for prostate cancer.Stewart Justman - 2010 - Bioethics 26 (3):143-148.
    While medicine may agree in principle that cancer screening requires informed consent, such consent is not, in fact, common practice. In the case of prostate-cancer screening this means that men in large numbers undergo PSA testing with little understanding of its liabilities – in particular, that it may or may not decrease mortality, often detects cancer of questionable significance, and may lead to unnecessary surgery. Given that prostate cancer is known to be overtreated and that family history is a risk (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  31
    "Fruit of the Poisonous Tree": Journalistic Ethics and Voice-Mail Surveillance.Cecilia Friend & Donald Challenger - 2001 - Journal of Mass Media Ethics 16 (4):255-272.
    A 1998 Cincinnati Enquirer investigation into the Central American labor practices of Chiquita Brands International was substantiated by the taped words of company officials themselves. Yet, soon after publication, the Enquirer ran a stunning front-page retraction and disavowed the report without challenging its claims. The Gannett Corporation, the paper's owner, paid Chiquita $14 million to avoid a suit. The resultant outcry by journalists was directed not at Gannett, but at lead reporter Michael Gallagher, who had surreptitiously accessed Chiquita voice mail (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  52
    Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.Myriam Dunn Cavelty - 2014 - Science and Engineering Ethics 20 (3):701-715.
    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  25.  4
    The European Union as Guardian of Internet Privacy: The Story of Art 16 TFEU.Hielke Hijmans - 2016 - Cham: Imprint: Springer.
    This book examines the role of the EU in ensuring privacy and data protection on the internet. It describes and demonstrates the importance of privacy and data protection for our democracies and how the enjoyment of these rights is challenged by, particularly, big data and mass surveillance. The book takes the perspective of the EU mandate under Article 16 TFEU. It analyses the contributions of the specific actors and roles within the EU framework: the judiciary, the EU legislator, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  26.  45
    Collective Responsibility Should be Treated as a Virtue.Mandi Astola - 2022 - Royal Institute of Philosophy Supplement 92:27-44.
    We often praise and blame groups of people like companies or governments, just like we praise and blame individual persons. This makes sense. Because some of the most important problems in our society, like climate change or mass surveillance, are not caused by individual people, but by groups. Philosophers have argued that there exists such a thing as group responsibility, which does not boil down to individual responsibility. This type of responsibility can only exist in groups that are (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  27.  20
    Following Snowden around the World.Andrew A. Adams, Kiyoshi Murata, Yasunori Fukuta, Yohko Orito & Ana María Lara Palma - 2017 - Journal of Information, Communication and Ethics in Society 15 (3):311-327.
    Purpose A survey of the attitudes of students in eight countries towards the revelations of mass surveillance by the US’ NSA and the UK’s GCHQ has been described in an introductory paper and seven country-specific papers. This paper aims to present a comparison of the results from these countries and draws conclusions about the similarities and differences noted. Design/methodology/approach A questionnaire was deployed in Germany, Japan, Mexico, New Zealand, The People’s Republic of China, Spain, Sweden and Taiwan. The (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  28.  31
    Spying Through a Glass Darkly: The Ethics of Espionage and Counter-Intelligence.Cécile Fabre - 2022 - Oxford University Press.
    Cécile Fabre draws back the curtain on the ethics of espionage and counterintelligence. In a book rich with historical examples she argues that spying is only justified to protect against ongoing violations of fundamental rights. Blackmail, bribery, mass surveillance, cyberespionage, treason, and other nefarious activities are considered.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  29.  30
    The meaning of Freedom after Covid-19.Mirko Farina & Andrea Lavazza - 2021 - History and Philosophy of the Life Sciences 43 (1):1-5.
    Many governments have seen digital health technologies as promising tools to tackle the current COVID-19 pandemic. A much-talked example in this context involves the recent deluge of digital contact tracing apps aimed at detecting Covid-19 exposure. In this short contribution we look at the bio-political justification of this phenomenon and reflect on whether DCT apps constitute, as it is often argued, a serious potential breach of our right to privacy. Despite praising efforts attempting to develop legal and ethical frameworks for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  30.  34
    Data flows and water woes: The Utah Data Center.Mél Hogan - 2015 - Big Data and Society 2 (2).
    Using a new materialist line of questioning that looks at the agential potentialities of water and its entanglements with Big Data and surveillance, this article explores how the recent Snowden revelations about the National Security Agency have reignited media scholars to engage with the infrastructures that enable intercepting, hosting, and processing immeasurable amounts of data. Focusing on the expansive architecture, location, and resource dependence of the NSA’s Utah Data Center, I demonstrate how surveillance and privacy can never be (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  31. The Public Sphere From Outside the West.Divya Dwivedi & Sanil V. (eds.) - 2015 - Bloomsbury Publishing.
    The Public Sphere from Outside the West brings together established and emerging new voices from philosophy, literature, anthropology, history, migration studies and information technology to address the present reality of the public sphere. In the age where everyone is in the public and everything is visible, this volume creates a delay in which the internet of things, mass surveillance and social media are asked "What is/not the Public?†? The essays bring to attention the formation of geo-politically and historically (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  18
    Machine Learning Against Terrorism: How Big Data Collection and Analysis Influences the Privacy-Security Dilemma.H. M. Verhelst, A. W. Stannat & G. Mecacci - 2020 - Science and Engineering Ethics 26 (6):2975-2984.
    Rapid advancements in machine learning techniques allow mass surveillance to be applied on larger scales and utilize more and more personal data. These developments demand reconsideration of the privacy-security dilemma, which describes the tradeoffs between national security interests and individual privacy concerns. By investigating mass surveillance techniques that use bulk data collection and machine learning algorithms, we show why these methods are unlikely to pinpoint terrorists in order to prevent attacks. The diverse characteristics of terrorist attacks—especially (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  19
    Digital, politics, and algorithms: Governing digital data through the lens of data protection.Rocco Bellanova - 2017 - European Journal of Social Theory 20 (3):329-347.
    Many actors mobilize the cognitive, legal and technical tool-box of data protection when they discuss and address controversial issues such as digital mass surveillance. Yet, critical approaches to the digital only barely explore the politics of data protection in relation to data-driven governance. Building on governmentality studies and Actor-Network-Theory, this article analyses the potential and limits of using data protection to critique the ‘digital age’. Using the conceptual tool of dispositifs, it sketches an analytics of data protection and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  34.  49
    Democratizing cognitive technology: a proactive approach.Marcello Ienca - 2019 - Ethics and Information Technology 21 (4):267-280.
    Cognitive technology is an umbrella term sometimes used to designate the realm of technologies that assist, augment or simulate cognitive processes or that can be used for the achievement of cognitive aims. This technological macro-domain encompasses both devices that directly interface the human brain as well as external systems that use artificial intelligence to simulate or assist (aspects of) human cognition. As they hold the promise of assisting and augmenting human cognitive capabilities both individually and collectively, cognitive technologies could produce, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  35.  25
    Was Snowden virtuous?Clive Harfield - 2021 - Ethics and Information Technology 23 (3):373-383.
    Professor Shannon Vallor’s theoretical framework of technomoral virtue ethics identifies character traits that can be cultivated to foster a future worth wanting in an environment of emerging technologies. Such technologies and increased citizen participation in the new digital environment have reconfigured what is possible in policing and intelligence-gathering more quickly, perhaps, than sober and sensible policy reflection and formulation can keep pace with. Sensational and dramatic, seismic and devastating, the Snowden disclosures represent a particular expression of dissent against American intelligence (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  13
    The needle and the damage done: Of haystacks and anxious panopticons.Sarah Logan - 2017 - Big Data and Society 4 (2).
    How should we understand the surveillance state post Snowden? This paper is concerned with the relationship between increased surveillance capacity and state power. The paper begins by analysing two metaphors used in public post Snowden discourse to describe state surveillance practices: the haystack and the panopticon. It argues that these metaphors share a flawed common entailment regarding surveillance, knowledge and power which cannot accurately capture important aspects of state anxiety generated by mass surveillance in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  37. Dossier Gaialight 2007-2011.Gavin Keeney - manuscript
    Essays and documents in support of the works of Gaialight - DOCUMENTS: The Passion of Jeanne d’Art (2007) - Letter to Gaia (2007) - “Art as Such”: This is Not Pop ... (2008) - Writing Toward Darkness (2009) - Scarlett Words: Light America (2009) - The Darklight Elaboration (2010) - The Darklight Elaboration: Zeitgeist or Episteme? (2010) - Cam Girls (2011) - Brooklyn Buzz (2011) - Brooklyn Buzz: The Semi-divine Metropolis (2011) - Reconnaissance: Light War, Mass Surveillance, Video (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  4
    The Snowden Archive-in-a-Box: A year of travelling experiments in outreach and education.Evan Light - 2016 - Big Data and Society 3 (2).
    The Snowden Archive-in-a-Box is an offline wireless network and web server providing private access to a replica of the Snowden Digital Surveillance Archive. The online version is hosted by Canadian Journalists for Free Expression. A work-in-development since April 2015, the Archive-in-a-Box is both a research tool and a tool for public education on data surveillance. The original version is powered with battery packs and housed in a 1960s spy style briefcase. When it is turned on, anybody in the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  39. Going dark: anonymising technology in cyberspace.Ross W. Bellaby - 2018 - Ethics and Information Technology 20 (3):189-204.
    Anonymising technologies are cyber-tools that protect people from online surveillance, hiding who they are, what information they have stored and what websites they are looking at. Whether it is anonymising online activity through ‘TOR’ and its onion routing, 256-bit encryption on communications sent or smart phone auto-deletes, the user’s identity and activity is protected from the watchful eyes of the intelligence community. This represents a clear challenge to intelligence actors as it prevents them access to information that many would (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  22
    On the need of opening up crowdsourced emergency management systems.Marco Avvenuti, Stefano Cresci, Fabio Del Vigna & Maurizio Tesconi - 2018 - AI and Society 33 (1):55-60.
    Nowadays, social media analysis systems are feeding on user contributed data, either for beneficial purposes, such as emergency management, or for user profiling and mass surveillance. Here, we carry out a discussion about the power and pitfalls of public accessibility to social media-based systems, with specific regards to the emergency management application EARS. We investigate whether opening such systems to the population at large would further strengthen the link between communities of volunteer citizens, intelligent systems, and decision makers, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41.  24
    Rusbridger’s “The Snowden Leaks and the Public” and Mill’s Utilitarianism.Casey Hladik - 2014 - Stance 7 (1):29-40.
    In the wake of the controversial Snowden leaks, Alan Rusbridger observes that the National Security Administration [NSA] and Government Communications Headquarters [GCHQ] maintain that their mass spying is justified because it prevents the world from “going dark.” This paper will explore the meaning and philosophical significance of “going dark” and argue that the NSA and GCHQ’s claim appeals—wittingly or unwittingly—to J.S. Mill’s ethical principle of utility. This paper will therefore critique this argument within Mill’s utilitarian framework to demonstrate that (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  42.  14
    Remapping Race in a Global Context.Ludovica Lorusso & Rasmus Grønfeldt Winther (eds.) - 2021 - Routledge.
    Investigating the reality and significance of racial categories, Remapping Race in a Global Context examines the role of race in human genomics, biomedicine, and struggles for social justice around the world. In this book, biologists, anthropologists, historians, and philosophers inspect critical questions around the biological reality of race and how it has been understood in different national and regional contexts. The essays also examine debates on the usefulness of race in medical and epidemiological studies. With focus on the fields of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  12
    The Islamic and Western Cultures and Values of Privacy.Sattam Eid Almutairi - 2019 - Muslim World Journal of Human Rights 16 (1):51-80.
    The paper provides valuable accounts of the general concepts underlying privacy law in both cultures, and great detail about the impact of criminal procedure and evidence rules on privacy in reality rather than legal theory. It is, in this sense, a “realist” approach to privacy, particularly but not exclusively in relation to sexual activity. The distinction which the article draws between the frameworks within which privacy is conceived broadly, self-determination and limited government in the USA, protection of one’s persona in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  15
    La vidéosurveillance, un mur virtuel.Jean-Amos Lecat-Deschamps - 2012 - Hermès: La Revue Cognition, communication, politique 63 (2):, [ p.].
    Il s’agit ici d’analyser un objet urbain, la caméra de vidéosurveillance, et de saisir de quelle manière cet objet segmente virtuellement – mais effectivement – l’espace urbain et affecte intimement les individus. Dans un contexte de brouillage entre sphère publique et privée, nous montrerons comment les dispositifs de caméras, tout en participant à la dislocation de la masse, peuvent être considérés comme les nouveaux murs de nos individuations.This article analyses an urban object, the video surveillance camera, and attempts to (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  45. How We Became Our Data: A Genealogy of the Informational Person.Colin Koopman - 2019 - Chicago, IL, USA: University of Chicago Press.
    We are now acutely aware, as if all of the sudden, that data matters enormously to how we live. How did information come to be so integral to what we can do? How did we become people who effortlessly present our lives in social media profiles and who are meticulously recorded in state surveillance dossiers and online marketing databases? What is the story behind data coming to matter so much to who we are? -/- In How We Became Our (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  46.  54
    Safe at any scale? Food scares, food regulation, and scaled alternatives.Laura B. DeLind & Philip H. Howard - 2008 - Agriculture and Human Values 25 (3):301-317.
    The 2006 outbreak of E. coli O157:H7, traced to bagged spinach from California, illustrates a number of contradictions. The solutions sought by many politicians and popular food analysts have been to create a centralized federal agency and a uniform set of production standards modeled after those of the animal industry. Such an approach would disproportionately harm smaller-scale producers, whose operations were not responsible for the epidemic, as well as reduce the agroecological diversity that is essential for maintaining healthy human beings (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   23 citations  
  47.  49
    The total archive: Data, subjectivity, universality.Boris Jardine & Matthew Drage - 2018 - History of the Human Sciences 31 (5):3-22.
    The complete system of knowledge is a standard trope of science fiction, a techno-utopian dream and an aesthetic ideal. It is Solomon’s House, the Encyclopaedia and the Museum. It is also an ideology – of Enlightenment, High Modernism and absolute governance. Far from ending the dream of a total archive, 20th-century positivist rationality brought it ever closer. From Paul Otlet’s ‘Mundaneum’ to Mass-Observation, from the Unity of Science movement to Wikipedia, the dream of universal knowledge dies hard. As a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  48.  5
    Making worlds: gender, metaphor, materiality.Susan Hardy Aiken (ed.) - 1998 - Tucson: University of Arizona Press.
    Making Worlds brings together thirty-one distinguished feminist activists, artists, and scholars to address a series of questions that resonate with increasing urgency in our current global environment: How is space imagined, represented, arranged, and distributed? What are the lived consequences of these configurations? And how are these questions affected by gender and other socially constructed categories of "difference"—race, ethnicity, sexuality, class, nationality? How are the symbolic formations of place and space marked by cultural ideologies that carry across into the places (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  49.  8
    A Process Identity.Oana Șerban - 2016 - Balkan Journal of Philosophy 8 (2):165-174.
    The main aim of this article is to analyse the relationship between two innovative concepts—the technoself and process identity—from a perspective inspired by process ontology. The working hypothesis is that industrialized and mass societies entered into a post-industrial or informational sphere of capitalism, becoming networking societies—also known as knowledge-based societies—which closely followed their role in approaching the plural identity of the digital Subject and the surveillance practices exercised in its governance as correspondent models for the changes of the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50. Supermax as a technology of punishment.Lorna A. Rhodes - 2007 - Social Research: An International Quarterly 74 (2):547-566.
    Supermax prisons are often described as "high_tech." Observers seem to mean two things by this. The first is that these "prisons within prisons" are a technology in themselves: hard_edged and brightly lit, the fortress_like supermax clearly signals its specialized purpose of isolation and control. The second is that supermax prisons rely heavily on specialized, relatively new technologies: computerized systems produce new forms of intensive surveillance while special teams armed with electronic shields maintain control over prisoners.But as Leo Marx observed (...)
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 993