Results for ' sousveillance'

15 found
Order:
  1. The concepts of surveillance and sousveillance: A critical analysis.Frej Klem Thomsen - 2019 - Social Science Information 58 (4):701-713.
    The concept of surveillance has recently been complemented by the concept of sousveillance. Neither term, however, has been rigorously defined, and it is particularly unclear how to understand and delimit sousveillance. This article sketches a generic definition of surveillance and proceeds to explore various ways in which we might define sousveillance, including power differentials, surreptitiousness, control, reciprocity, and moral valence. It argues that for each of these ways of defining it, sousveillance either fails to be distinct (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  2.  15
    De la sousveillance.Dominique Quessada - 2010 - Multitudes 40 (1):54.
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  3.  36
    Revisiting the P anopticon: professional regulation, surveillance and sousveillance.Dawn Freshwater, Pamela Fisher & Elizabeth Walsh - 2015 - Nursing Inquiry 22 (1):3-12.
    In this article, we will consider how the regulation of populations is not just a feature of prisons, but of all institutions and organisations that control members though hierarchies, divisions and norms. While nurses and other allied health professionals are considered to be predominantly self‐regulatory, practice is guided by a code of conduct and codes of ethics that act as rules that serve to uphold the safety of the patient, whether they are a sick person in a hospital bed or (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  4.  39
    Challenges and Opportunities of Lifelog Technologies: A Literature Review and Critical Analysis.Tim Jacquemard, Peter Novitzky, Fiachra O’Brolcháin, Alan F. Smeaton & Bert Gordijn - 2014 - Science and Engineering Ethics 20 (2):379-409.
    In a lifelog, data from various sources are combined to form a record from which one can retrieve information about oneself and the environment in which one is situated. It could be considered similar to an automated biography. Lifelog technology is still at an early stage of development. However, the history of lifelogs so far shows a clear academic, corporate and governmental interest. Therefore, a thorough inquiry into the ethical aspects of lifelogs could prove beneficial to the responsible development of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  5.  4
    Introduction to Special Theme Veillance and transparency: A critical examination of mutual watching in the post-Snowden, Big Data era.Andrew McStay, Martina Feilzer & Vian Bakir - 2017 - Big Data and Society 4 (1).
    Introducing the Special Theme on Veillance and Transparency: A Critical Examination of Mutual Watching in the Post-Snowden, Big Data Era, this article presents a series of provocations and practices on veillance and transparency in the context of Big Data in a post-Snowden period. In introducing the theoretical and empirical research papers, artistic, activist and educational provocations and commentaries in this Special Theme, it highlights three central debates. Firstly, concerning theory/practice, it queries how useful theories of veillance and transparency are in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  14
    Public Lab: Community-Based Approaches to Urban and Environmental Health and Justice.Pablo Rey-Mazón, Hagit Keysar, Shannon Dosemagen, Catherine D’Ignazio & Don Blair - 2018 - Science and Engineering Ethics 24 (3):971-997.
    This paper explores three cases of Do-It-Yourself, open-source technologies developed within the diverse array of topics and themes in the communities around the Public Laboratory for Open Technology and Science. These cases focus on aerial mapping, water quality monitoring and civic science practices. The techniques discussed have in common the use of accessible, community-built technologies for acquiring data. They are also concerned with embedding collaborative and open source principles into the objects, tools, social formations and data sharing practices that emerge (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  32
    Liberal luxury: Decentering Snowden, surveillance and privilege.Piro Rexhepi - 2016 - Big Data and Society 3 (2).
    This paper reflects on the continued potency of veillance theories to traverse beyond the taxonomies of surveillance inside liberal democracies. It provides a commentary on the ability of sousveillance to destabilise and disrupt suer/violence by shifting its focus from the centre to the periphery, where Big Data surveillance is tantamount to sur/violence. In these peripheral political spaces, surveillance is not framed by concerns over privacy, democracy and civil society; rather, it is a matter of life and death, a technique (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  8.  13
    Crowd-Sourced Intelligence Agency: Prototyping counterveillance.Derek Curry & Jennifer Gradecki - 2017 - Big Data and Society 4 (1).
    This paper discusses how an interactive artwork, the Crowd-Sourced Intelligence Agency, can contribute to discussions of Big Data intelligence analytics. The CSIA is a publicly accessible Open Source Intelligence system that was constructed using information gathered from technical manuals, research reports, academic papers, leaked documents, and Freedom of Information Act files. Using a visceral heuristic, the CSIA demonstrates how the statistical correlations made by automated classification systems are different from human judgment and can produce false-positives, as well as how the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  9.  4
    Tracing You: How transparent surveillance reveals a desire for visibility.Benjamin Grosser - 2017 - Big Data and Society 4 (1).
    Tracing You is an artwork that presents a website's best attempt to see the world from its visitors’ viewpoints. By cross referencing visitor IP addresses with available online data sources, the work traces each visitor back through the network to its possible origin. The end of that trace is the closest available image that potentially shows the visitor’s physical environment. Sometimes what this image shows is eerily accurate; other times it is wildly dislocated. This computational surveillance system thus makes transparent (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  10.  5
    Big Data is a big lie without little data: Humanistic intelligence as a human right.Steve Mann - 2017 - Big Data and Society 4 (1).
    This article introduces an important concept: Transparency by way of Humanistic Intelligence as a human right, and in particular, Big/little Data and Sur/sous Veillance, where “Little Data” is to sousveillance as “Big Data” is to surveillance. Veillance is a core concept not just in human–human interaction but also in terms of Human–Computer Interaction. In this sense, veillance is the core of Human-in-the-loop Intelligence, leading us to the concept of “Sousveillant Systems” which are forms of Human–Computer Interaction in which internal (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  6
    Reluctant activists? The impact of legislative and structural attempts of surveillance on investigative journalism.Katharine Sarikakis & Anthony Mills - 2016 - Big Data and Society 3 (2).
    If we accept that surveillance by the State and ‘sousveillance’ by the media in Western democracies tend towards a relative equilibrium, or ‘equiveillance’ supported by the function of journalism as a watchdog and that the rule of law largely protects fundamental freedoms, this paper argues that the act of ‘mutual watching’ is undesired by the State and comes at a very high cost to journalists. The combination of technological capacity, legislative change and antidemocratic sentiments of the State, in the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  51
    Privacy in the shadow of nanotechnology.Chris Toumey - 2007 - NanoEthics 1 (3):211-222.
    One of the more salient concerns about nanotechnology is the fear that it will harm privacy by collecting personal information and distributing it. This sentiment is complicated by the fact that the specific nanotechnologies that might affect privacy are located more in the near future than in the present, so our knowledge of them is more speculative than empirical. To come to terms with these issues, we will need both knowledge of the science – what is realistic and what is (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  13.  6
    Eyes on the street: To what end?Anders Bartonek - forthcoming - Philosophy and Social Criticism.
    In contrast to the constantly increasing surveillance of the streets of cities, Jane Jacobs’ theory of the ‘eyes on the street’ offers a theory of a positive form of surveillance and these eyes can thus perhaps take on the role of a counterforce to problematic forms of surveillance. To examine under what conditions Jacobs could help formulate such a counterforce is the main aim in this article. But for this purpose, certain obstacles need to be addressed, for instance, the usage (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  8
    The Turret Room as a Caribbean Heterotopia in Lawrence Scott’s Witchbroom.Laetitia Saint-Loubert - 2022 - Revue D’Études Benthamiennes 22.
    In Caribbean literature, being gazed upon is often part of a larger design of imperial governance, conquest and appropriation, where surveillance is constant and omnipresent, particularly in texts that centre on life on the plantation or are set within the colonial house itself. In his first novel Witchbroom, Trinidadian writer Lawrence Scott presents a family saga through the eyes of the family’s last surviving member, Lavren, a hermaphrodite, trickster-narrator who travels through time to write down the record of his/herstory. To (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  62
    Seizing control?: The experience capture experiments of ringley & Mann. [REVIEW]Jane Bailey & Ian Kerr - 2007 - Ethics and Information Technology 9 (2):129-139.
    Will the proliferation of devices that provide the continuous archival and retrieval of personal experiences (CARPE) improve control over, access to and the record of collective knowledge as Vannevar Bush once predicted with his futuristic memex? Or is it possible that their increasing ubiquity might pose fundamental risks to humanity, as Donald Norman contemplated in his investigation of an imaginary CARPE device he called the “Teddy”? Through an examination of the webcam experiment of Jenni Ringley and the EyeTap experiments of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations