Results for 'State Surveillance'

1000+ found
Order:
  1. Searching Eyes: Privacy, the State, and Disease Surveillance in America – By Amy L. Fairchild, Ronald Bayer, and James Colgrove. [REVIEW]Alan Rubel - 2009 - Review of Policy Research 26:633-634.
    Review of Searching Eyes: Privacy, the State, and Disease Surveillance in America – By Amy L. Fairchild, Ronald Bayer, and James Colgrove.
    Download  
     
    Export citation  
     
    Bookmark  
  2. An Unexceptional Theory of Morally Proportional Surveillance in Exceptional Circumstances.Frej Thomsen - 2023 - In Kevin Macnish & Adam Henschke (eds.), Surveillance Ethics in Times of Emergency. Oxford University Press.
    How much surveillance is morally permissible in the pursuit of a socially desirable goal? The proportionality question has received renewed attention during the 2020 Coronavirus pandemic, because governments in many countries have responded to the pandemic by implementing, redirecting or expanding state surveillance, most controversially in the shape of collection and use of cell-phone location data to support a strategy of contact tracing, testing and containment. Behind the proportionality question lies a further question: in what way does (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Ontological representation of CDC Active Bacterial Core Surveillance Case Reports.Albert Goldfain, Barry Smith & Lindsay G. Cowell - 2014 - Proceedings of the Fifth International Conference on Biomedical Ontology 1327:74-77.
    The Center for Disease Control and Prevention’s Active Bacterial Core Surveillance (CDC ABCs) Program is a collaborative effort betweeen the CDC, state health departments, laboratories, and universities to track invasive bacterial pathogens of particular importance to public health [1]. The year-end surveillance reports produced by this program help to shape public policy and coordinate responses to emerging infectious diseases over time. The ABCs case report form (CRF) data represents an excellent opportunity for data reuse beyond the original (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Moral Implications of Data-Mining, Key-word Searches, and Targeted Electronic Surveillance.Michael Skerker - 2015 - In Bradley J. Strawser, Fritz Allhoff & Adam Henschke (eds.), Binary Bullets.
    This chapter addresses the morality of two types of national security electronic surveillance (SIGINT) programs: the analysis of communication “metadata” and dragnet searches for keywords in electronic communication. The chapter develops a standard for assessing coercive government action based on respect for the autonomy of inhabitants of liberal states and argues that both types of SIGINT can potentially meet this standard. That said, the collection of metadata creates opportunities for abuse of power, and so judgments about the trustworthiness and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. State of the Art on Ethical, Legal, and Social Issues Linked to Audio- and Video-Based AAL Solutions.Alin Ake-Kob, Aurelija Blazeviciene, Liane Colonna, Anto Cartolovni, Carina Dantas, Anton Fedosov, Francisco Florez-Revuelta, Eduard Fosch-Villaronga, Zhicheng He, Andrzej Klimczuk, Maksymilian Kuźmicz, Adrienn Lukacs, Christoph Lutz, Renata Mekovec, Cristina Miguel, Emilio Mordini, Zada Pajalic, Barbara Krystyna Pierscionek, Maria Jose Santofimia Romero, Albert AliSalah, Andrzej Sobecki, Agusti Solanas & Aurelia Tamo-Larrieux - 2021 - Alicante: University of Alicante.
    Ambient assisted living technologies are increasingly presented and sold as essential smart additions to daily life and home environments that will radically transform the healthcare and wellness markets of the future. An ethical approach and a thorough understanding of all ethics in surveillance/monitoring architectures are therefore pressing. AAL poses many ethical challenges raising questions that will affect immediate acceptance and long-term usage. Furthermore, ethical issues emerge from social inequalities and their potential exacerbation by AAL, accentuating the existing access gap (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Care/support, location, and the monitoring/evaluation of HIV/AIDs prevention programs: The case of Southern Senatorial District of Cross River State, Nigeria.Levi Udochukwu Akah, Agnes James Ekpo & Valentine Joseph Owan - 2022 - International Journal of Interdisciplinary Educational Studies 17 (1):115-135.
    This study analyzed the monitoring and evaluation of HIV/AIDS prevention programs in Southern Senatorial District of Cross River State, Nigeria. The study considered different levels of care/support and tested for locational variations in the monitoring/evaluation of HIV/AIDs prevention programs. A descriptive survey research design was utilized. This study covered 596 public health employees (doctors, nurses, pharmacists, and laboratory employees) in the study area. A sample of 239 respondents was chosen using the proportional stratified random sampling procedure. Data was collected (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. Making Better Informed, More Confident COVID-19 Decisions: Vaccine Hesitancy, Its Barriers and Impact Studies: Taking Bayelsa State as an Example.Morufu Olalekan Raimi, Emeka Chisom Lucky, Ebikapaye Okoyen, Angalabiri Clement, Christopher Ogbointuwei & Atoyebi Babatunde - 2021 - International Journal of Vaccines and Immunization 5 (1):1-13.
    Background: Health care practitioners are recognized to have a large influence in shaping uptake of vaccine in new borns, children, adolescents, as well as adults. Parents remain more secure in their decisions when health care practitioners communicate successfully with them about vaccine dangers and benefits, the value as well as necessity for vaccinations, as well as vaccine safety. Thus, immunization remain the foundation of the primary health care system, an indisputable human right as well as a global health and development (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Petition to Include Cephalopods as “Animals” Deserving of Humane Treatment under the Public Health Service Policy on Humane Care and Use of Laboratory Animals.New England Anti-Vivisection Society, American Anti-Vivisection Society, The Physicians Committee for Responsible Medicine, The Humane Society of the United States, Humane Society Legislative Fund, Jennifer Jacquet, Becca Franks, Judit Pungor, Jennifer Mather, Peter Godfrey-Smith, Lori Marino, Greg Barord, Carl Safina, Heather Browning & Walter Veit - forthcoming - Harvard Law School Animal Law and Policy Clinic:1–30.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  9.  39
    Combating Waste in Financing Science and Technology Tasks: Mitigating Lopeholes and Risks.State Audit Reporters - 2023 - Sci-Tech Auditing.
    This article sheds light on managing and utilizing scientific and technological funds (Sci-Tech funds) in Vietnam.
    Download  
     
    Export citation  
     
    Bookmark  
  10. Legal Archetypes and Metadata Collection.Alan Rubel - 2017 - Wisconsin International Law Review 34 (4):823-853.
    In discussions of state surveillance, the values of privacy and security are often set against one another, and people often ask whether privacy is more important than national security.2 I will argue that in one sense privacy is more important than national security. Just what more important means is its own question, though, so I will be more precise. I will argue that national security rationales cannot by themselves justify some kinds of encroachments on individual privacy (including some (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Versus.Bogdan Khmelnitsky Melitopol State Pedagogical University (ed.) - 2013-2017 - Melitopol, Ukraine: Bogdan Khmelnitsky Melitopol State Pedagogical University.
    Scientific journal presented by Bogdan Khmelnitsky Melitopol State Pedagogical University, Ukraine, Melitopol. Main points: 1. Actual Problems of Modern Philosophy 2. Researches in Philosophy connected with natural components, sociological aspects and self - identity development.
    Download  
     
    Export citation  
     
    Bookmark  
  12. Violations of privacy and law : The case of Stalking.John Guelke & Tom Sorell - 2016 - Law, Ethics and Philosophy 4:32-60.
    This paper seeks to identify the distinctive moral wrong of stalking and argues that this wrong is serious enough to criminalize. We draw on psychological literature about stalking, distinguishing types of stalkers, their pathologies, and victims. The victimology is the basis for claims about what is wrong with stalking. Close attention to the experiences of victims often reveals an obsessive preoccupation with the stalker and what he will do next. The kind of harm this does is best understood in relation (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  13. Infopolitics, Biopolitics, Anatomopolitics.Colin Koopman - 2018 - Graduate Faculty Philosophy Journal 39 (1):103-128.
    This paper argues for a distinctive concept of "infopolitics" as a theoretical tool for understanding how new regimes of data are exerting increasing political control of our lives. It seems almost undeniable today that there is a politics at stake in such ubiquitous features of our society as social media interaction, electioneering (and election hacking) through those interactions, cell phone addiction, personal information monetization, the lack of security in personal data markets, and massively-scaled state surveillance. Yet, even if (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  14. Did the NSA and GCHQ Diminish Our Privacy? What the Control Account Should Say.Leonhard Menges - 2020 - Moral Philosophy and Politics 7 (1):29-48.
    A standard account of privacy says that it is essentially a kind of control over personal information. Many privacy scholars have argued against this claim by relying on so-called threatened loss cases. In these cases, personal information about an agent is easily available to another person, but not accessed. Critics contend that control accounts have the implausible implication that the privacy of the relevant agent is diminished in threatened loss cases. Recently, threatened loss cases have become important because Edward Snowden’s (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  15. Cops, Cameras and the Policing of Ethics.Meg Stalcup & Charles Hahn - 2016 - Theoretical Criminology 20 (4):482-501.
    In this article, we explore some of the roles of cameras in policing in the United States. We outline the trajectory of key new media technologies, arguing that cameras and social media together generate the ambient surveillance through which graphic violence is now routinely captured and circulated. Drawing on Michel Foucault, we suggest that there are important intersections between this video footage and police subjectivity, and propose to look at two: recruit training at the Washington state Basic Law (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. The Retrieval of Liberalism in Policing.Luke William Hunt - 2019 - New York, NY, USA: Oxford University Press.
    There is a growing sense that many liberal states are in the midst of a shift in legal and political norms—a shift that is happening slowly and for a variety of reasons relating to security. The internet and tech booms—paving the way for new forms of electronic surveillance—predated the 9/11 attacks by several years, while the police’s vast use of secret informants and deceptive operations began well before that. On the other hand, the recent uptick in reactionary movements—movements in (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  17. The Rights of Foreign Intelligence Targets.Michael Skerker - 2021 - In Seumas Miller, Mitt Regan & Patrick Walsh (eds.), National Security Intelligence and Ethics. Routledge. pp. 89-106.
    I develop a contractualist theory of just intelligence collection based on the collective moral responsibility to deliver security to a community and use the theory to justify certain kinds of signals interception. I also consider the rights of various intelligence targets like intelligence officers, service personnel, government employees, militants, and family members of all of these groups in order to consider how targets' waivers or forfeitures might create the moral space for just surveillance. Even people who are not doing (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  18. Überwachungskapitalistische Biopolitik: Big Tech und die Regierung der Körper.Anna-Verena Nosthoff & Felix Maschewski - forthcoming - Zeitschrift Für Politikwissenschaft.
    The article introduces the concept of "surveillance-capitalist biopolitics" to problematize the recent expansion of "data extractivism" in health care and health research. As we show, this trend has accelerated during the ongoing Covid pandemic and points to a normalization and institutionalization of self-tracking practices, which, drawing on the "quantified self", points to the emergence of a "quantified collective". Referring to Foucault and Zuboff, and by analyzing key examples of the leading "Big Tech" companies (e.g., Alphabet and Apple), we argue (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. When the Face Becomes a Carrier: Biopower, Levinas’s Ethics, and Contagion.Sarah Horton - 2021 - Revista Portuguesa de Filosofia 77 (2-3):715-732.
    In the midst of a pandemic, what does it mean to see the Other as Other and not as a carrier of the virus? I argue that in seeking a Levinasian response to the pandemic, we must be mindful of the implications of the mechanisms of surveillance and control that, presented as ways to protect the Other, operate by controlling the Other and rendering our relation to the Other increasingly impersonal. Subjected to these mechanisms, the Other becomes a dangerous (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Narrow AI Nanny: Reaching Strategic Advantage via Narrow AI to Prevent Creation of the Dangerous Superintelligence.Alexey Turchin - manuscript
    Abstract: As there are no currently obvious ways to create safe self-improving superintelligence, but its emergence is looming, we probably need temporary ways to prevent its creation. The only way to prevent it is to create a special type of AI that is able to control and monitor the entire world. The idea has been suggested by Goertzel in the form of an AI Nanny, but his Nanny is still superintelligent, and is not easy to control. We explore here ways (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. How the Seven Sociopaths Who Rule China are Winning World War Three and Three Ways to Stop Them.Michael Starks - 2020 - In Suicide by Democracy-an Obituary for America and the World 4th edition. Las Vegas, NV, USA: Reality Press. pp. 54-60.
    The first thing we must keep in mind is that when saying that China says this or China does that, we are not speaking of the Chinese people, but of the Sociopaths who control the CCP -- Chinese Communist Party, i.e., the Seven Senile Sociopathic Serial Killers (SSSSK) of the Standing Committee of the CCP or the 25 members of the Politburo etc.. -/- The CCP’s plans for WW3 and total domination are laid out quite clearly in Chinese govt publications (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. september 11th fifteen years after.Eric D. Meyer - 2017 - Blog of the APA.
    Fifteen years after the September 11th terror attacks, the United States still exists in a state of exception or state of emergency, in which the executive branch claims extraordinary powers to carry out bombing strikes or drone attacks in foreign nations and to engage in surveillance against its citizens outside the boundaries of international and constitutional law. This blog-piece argues for a restoration of the constitutional limiuts on sovereign executive powers and a cessation of the war on (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Biopolitics & Probability: Agamben & Kierkegaard.Virgil W. Brower - 2021 - In Antonio Marcos Marcos & Colby Dickinson (eds.), Agamben and the Existentialists. pp. 46-64.
    This project retraces activations of Kierkegaard in the development of polit­ical theology. It suggests alternative modes of states of exception than those attributed to him by Schmitt, Taubes and Agamben. Several Kierkegaardian themes open themselves to 'something like pure potential' in Agamben, namely: living death, animality, criminality, auto-constitution, modification, liturgy, love and certain articulations of improbabilities. Attention is drawn to a modal ontology and auto-constitution at work in Kierkegaard's writings, as well as a complicated and indissociable operation between killing and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Res Publica ex Machina: On Neocybernetic Governance and the End of Politics.Anna-Verena Nosthoff & Felix Maschewski - 2020 - In Let's Get Physical, INC Reader. Amsterdam: pp. 196-211.
    The article critically investigates various approaches to “smart” governance, from algorithmic regulation (O’Reilly), fluid technocracy (P. Khanna), “smart states” (Noveck), nudge theory (Thaler/ Sunstein) and social physics (Alex Pentland). It specifically evaluates the cybernetic origins of these approaches and interprets them as pragmatic actualisations of earlier cybernetic models of the state (Lang, Deutsch) against the current background of surveillance capitalism. The authors argue that cybernetic thinking rests on a reductive model of participation and a limited concept of “the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Algorithms and Posthuman Governance.James Hughes - 2017 - Journal of Posthuman Studies.
    Since the Enlightenment, there have been advocates for the rationalizing efficiency of enlightened sovereigns, bureaucrats, and technocrats. Today these enthusiasms are joined by calls for replacing or augmenting government with algorithms and artificial intelligence, a process already substantially under way. Bureaucracies are in effect algorithms created by technocrats that systematize governance, and their automation simply removes bureaucrats and paper. The growth of algorithmic governance can already be seen in the automation of social services, regulatory oversight, policing, the justice system, and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  26. On the road to losing ourselves: Religious-based immigration tests.Saba Fatima - 2020 - In Bob Fischer (ed.), Ethics, Left and Right: The Moral Issues That Divide Us. New York, NY, USA: pp. 208-232.
    In this chapter, I deal with some of the reasons why the United States should not institute any implicit or explicit religion-based tests as grounds for immigration. I argue it is extremely impractical to formulate and execute a test that would be effective in rooting out extremists. However, even if such a test could be devised, immigration requirements that link religion to belonging inevitably foster an irrational fear of an entire group of people as perpetual outsiders. Furthermore, religion-based immigration tests (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. The Tannhäuser Gate. Architecture in science fiction films of the second half of the 20th and the beginning of the 21st century as a component of utopian and dystopian projections of the future.Cezary Wąs - 2018 - Quart. Kwartalnik Instytutu Historii Sztuki Uniwersytetu Wrocławskiego 49 (3):83-109.
    The Tannhäuser Gate. Architecture in science fiction films of the second half of the 20th and the beginning of the 21st century as a component of utopian and dystopian projections of the future. -/- The films of science fiction genre from the second half of the 20th and early 21st century contained many visions of the future, which were at the same time a reflection on the achievements and deficiencies of modern times. In 1960s, cinematographic works were dominated by optimism (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Profit, plague and poultry: The intra-active worlds of highly pathogenic avian flu.Chris Wilbert - 2006 - Radical Philosophy 139.
    In 2006 we awoke, in Europe at least, to the odd situation in which twitchers – obsessive birdwatchers who spend much of their leisure time on the far-flung edges of countries – are being reinvented as the eyes and ears of the state, helping warn of new border incursions. These incursions are posited as taking an avian form that may bring with it very unwelcome pathogens. Everyday avian observations and knowledges of migratory routes are being reinvented as a kind (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. A Two Level Account of Executive Authority.Michael Skerker - 2019 - In Claire Oakes Finkelstein & Michael Skerker (eds.), Sovereignty and the New Executive Authority. Oxford University Press.
    The suite of secretive national security programs initiated in the US since 9/11 has created debate not only about the merits of targeted killing, torture, secret detention, cyberwar, global signals intercepts, and data-mining, but about the very secrecy in which these programs were conceived, debated by government officials, and implemented. Law must be revealed to those who are expected to comply with its demands. Law is a mere pretext for coercion if the laws permitting the government to coerce people for (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. How to Save Face & the Fourth Amendment: Developing an Algorithmic Auditing and Accountability Industry for Facial Recognition Technology in Law Enforcement.Lin Patrick - 2023 - Albany Law Journal of Science and Technology 33 (2):189-235.
    For more than two decades, police in the United States have used facial recognition to surveil civilians. Local police departments deploy facial recognition technology to identify protestors’ faces while federal law enforcement agencies quietly amass driver’s license and social media photos to build databases containing billions of faces. Yet, despite the widespread use of facial recognition in law enforcement, there are neither federal laws governing the deployment of this technology nor regulations settings standards with respect to its development. To make (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. The Limits of Liberal Inclusivity: How Defining Islamophobia Normalises Anti-Muslim Racism.Rebecca Ruth Gould - forthcoming - Journal of Law and Religion.
    Responding to recent calls made within UK Parliament for a government-backed definition of Islamophobia, this article considers the unanticipated consequences of such proposals. I argue that, considered in the context of related efforts to regulate hate speech, the formulation and implementation of a government-sponsored definition will generate unforeseen harms for the Muslim community. To the extent that such a definition will fail to address the government’s role in propagating Islamophobia through ill-considered legislation that conflates Islamist discourse with hate speech, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Capitalist Realism And The End Of Democracy.Irfan Ajvazi - 2022 - Critique and Dialectics 2:10.
    As civil liberties are shredded and powerful corporate and political force engage in a range of legal illegalities, the state itself becomes a model for corruption and violence. Violence has become not only the foundation of corporate sovereignty, it has also become the ideological scaffolding of common sense. Under casino capitalism, the state has become the enemy of justice and offers a prototype for types of misguided rebellion that mimic the lawlessness enshrined by corporate sovereignty and the repressive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. The Internet as Friend or Foe of Intellectual Freedom.Elizabeth Buchanan - 2004 - International Review of Information Ethics 2.
    What a long strange trip the Internet has had. From its inception and use by the American military to the billions of users world-wide who log on daily, the Internet is both the promise of access to information and the peril of surveillance and a means of curtailing intellectual freedom. This paper will review this continuum, paying close attention to recent developments in the United States that fuel the dichotomous debate surrounding intellectual freedom.
    Download  
     
    Export citation  
     
    Bookmark  
  34. The Ethics of Prescription Drug Monitoring Programs.Ryan Ravanpak - 2023 - Voices in Bioethics 9.
    Prescription Drug Monitoring Programs (PDMPs) contain detailed information about which controlled medications physicians prescribe individuals, including where, when, how much, by whom, and more. The programs allow physicians to glimpse into the life of each patient that visits them — sometimes before a single word is exchanged between them. Every state has a PDMP, and almost all states share the data they collect through it. In this paper, I argue that informed consent should be required for recording of prescriptions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Bagaimana Tujuh Sosiopat yang Memerintah Tiongkok Memenangkan Perang Dunia Tiga dan Tiga Cara untuk Menghentikan Mereka.Michael Richard Starks - 2019 - In Bunuh Diri oleh Demokrasi - Obituari untuk Amerika dan Dunia. Reality Press. pp. 56-60.
    The first thing we must keep in mind is that when saying that China says this or China does that, we are not speaking of the Chinese people, but of the Sociopaths who control the CCP -- Chinese Communist Party, i.e., the Seven Senile Sociopathic Serial Killers (SSSSK) of the Standing Committee of the CCP or the 25 members of the Politburo etc.. -/- The CCP’s plans for WW3 and total domination are laid out quite clearly in Chinese govt publications (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Como os sete sociopaths que governam China estão ganhando a guerra de mundo três e três maneiras de pará-los.Michael Richard Starks - 2019 - In Suicide pela democracia - Um obituário para América e o mundo. Las Vegas, NV USA: Reality Press. pp. 52-56.
    The first thing we must keep in mind is that when saying that China says this or China does that, we are not speaking of the Chinese people, but of the Sociopaths who control the CCP -- Chinese Communist Party, i.e., the Seven Senile Sociopathic Serial Killers (SSSSK) of the Standing Committee of the CCP or the 25 members of the Politburo etc.. -/- The CCP’s plans for WW3 and total domination are laid out quite clearly in Chinese govt publications (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Just Surveillance? Towards a Normative Theory of Surveillance.Kevin Macnish - 2014 - Surveillance and Society 12 (1):142-153.
    Despite recent growth in surveillance capabilities there has been little discussion regarding the ethics of surveillance. Much of the research that has been carried out has tended to lack a coherent structure or fails to address key concerns. I argue that the just war tradition should be used as an ethical framework which is applicable to surveillance, providing the questions which should be asked of any surveillance operation. In this manner, when considering whether to employ (...), one should take into account the reason for the surveillance, the authority of the surveillant, whether or not there has been a declaration of intent, whether surveillance is an act of last resort, what is the likelihood of success of the operation and whether surveillance is a proportionate response. Once underway, the methods of surveillance should be proportionate to the occasion and seek to target appropriate people while limiting surveillance of those deemed inappropriate. By drawing on the just war tradition, ethical questions regarding surveillance can draw on a long and considered discourse while gaining a framework which, I argue, raises all the key concerns and misses none. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  38. Government Surveillance and Why Defining Privacy Matters in a Post‐Snowden World.Kevin Macnish - 2016 - Journal of Applied Philosophy (2).
    There is a long-running debate as to whether privacy is a matter of control or access. This has become more important following revelations made by Edward Snowden in 2013 regarding the collection of vast swathes of data from the Internet by signals intelligence agencies such as NSA and GCHQ. The nature of this collection is such that if the control account is correct then there has been a significant invasion of people's privacy. If, though, the access account is correct then (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  39. Surveillance Capitalism: a Marx-inspired account.Nikhil Venkatesh - 2021 - Philosophy 96 (3):359-385..
    Some of the world's most powerful corporations practise what Shoshana Zuboff (2015; 2019) calls ‘surveillance capitalism’. The core of their business is harvesting, analysing and selling data about the people who use their products. In Zuboff's view, the first corporation to engage in surveillance capitalism was Google, followed by Facebook; recently, firms such as Microsoft and Amazon have pivoted towards such a model. In this paper, I suggest that Karl Marx's analysis of the relations between industrial capitalists and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Transparency is Surveillance.C. Thi Nguyen - 2021 - Philosophy and Phenomenological Research 105 (2):331-361.
    In her BBC Reith Lectures on Trust, Onora O’Neill offers a short, but biting, criticism of transparency. People think that trust and transparency go together but in reality, says O'Neill, they are deeply opposed. Transparency forces people to conceal their actual reasons for action and invent different ones for public consumption. Transparency forces deception. I work out the details of her argument and worsen her conclusion. I focus on public transparency – that is, transparency to the public over expert domains. (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  41. Pandemic surveillance: ethics at the intersection of information, research, and health.Daniel Susser - 2022 - In Pandemic Surveillance: Privacy, Security, and Data Ethics. Cheltenham, UK: Edward Elgar. pp. 187-196.
    This chapter provides a high-level overview of key ethical issues raised by the use of surveillance technologies, such as digital contact tracing, disease surveillance, and vaccine passports, to combat the COVID-19 pandemic. To some extent, these issues are entirely familiar. I argue that they raise old questions in new form and with new urgency, at the intersection of information ethics, research ethics, and public health. Whenever we deal with data-driven technologies, we have to ask how they fare in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Urban Surveillance: The Hidden Costs of Disneyland.Timothy Stanley - 2006 - International Journal of the Humanities 3 (8):117-24.
    Urban centers are being transformed into consumer tourist playgrounds made possible by dense networks of surveillance. The safety and entertainment however, come at an unseen price. One of the historical roots of surveillance can be connected to the modern information base of tracking individuals for economic and political reasons. Though its antecedents can be traced via Foucault's account of panoptic discipline which walled in society's outcasts for rehabilitation, the following essay explores the shift to the urban panopticism of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Indiscriminate mass surveillance and the public sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  44. The concepts of surveillance and sousveillance: A critical analysis.Frej Klem Thomsen - 2019 - Social Science Information 58 (4):701-713.
    The concept of surveillance has recently been complemented by the concept of sousveillance. Neither term, however, has been rigorously defined, and it is particularly unclear how to understand and delimit sousveillance. This article sketches a generic definition of surveillance and proceeds to explore various ways in which we might define sousveillance, including power differentials, surreptitiousness, control, reciprocity, and moral valence. It argues that for each of these ways of defining it, sousveillance either fails to be distinct from (...) or to provide a generally useful concept. As such, the article concludes that academics should avoid the neologism, and simply clarify what sense of surveillance is at stake when necessary. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  45. Living by Algorithm: Smart Surveillance and the Society of Control.Sean Erwin - 2015 - Humanities and Technology Review 34:28-69.
    Foucault’s disciplinary society and his notion of panopticism are often invoked in discussions regarding electronic surveillance. Against this use of Foucault, I argue that contemporary trends in surveillance technology abstract human bodies from their territorial settings, separating them into a series of discrete flows through what Deleuze will term, the surveillant assemblage. The surveillant assemblage and its product, the socially sorted body, aim less at molding, punishing and controlling the body and more at triggering events of in- and (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  46. Too Much Info: Data Surveillance and Reasons to Favor the Control Account of the Right to Privacy.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2020 - Res Publica 27 (2):287-302.
    In this paper, we argue that there is at least a pro tanto reason to favor the control account of the right to privacy over the access account of the right to privacy. This conclusion is of interest due to its relevance for contemporary discussions related to surveillance policies. We discuss several ways in which the two accounts of the right to privacy can be improved significantly by making minor adjustments to their respective definitions. We then test the improved (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  47. Justifying Public Health Surveillance: Basic Interests, Unreasonable Exercise, and Privacy.Alan Rubel - 2012 - Kennedy Institute of Ethics Journal 22 (1):1-33.
    Surveillance plays a crucial role in public health, and for obvious reasons conflicts with individual privacy. This paper argues that the predominant approach to the conflict is problematic, and then offers an alternative. It outlines a Basic Interests Approach to public health measures, and the Unreasonable Exercise Argument, which sets forth conditions under which individuals may justifiably exercise individual privacy claims that conflict with public health goals. The view articulated is compatible with a broad range conceptions of the value (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  48. Big Tech and the Smartification of Agriculture.Anna-Verena Nosthoff & Felix Maschewski - 2022 - Https://Projects.Itforchange.Net/State-of-Big-Tech/Big-Tech-and-the-Smartification-of-Agriculture-a- Critical-Perspective/.
    The paper outlines critical aspects concerning the increasing use of big data in agriculture and farming. In particular, the aim is to shed light on the emerging dominance of the platform economy in the field of agriculture and food production. To analyze those power structures shaping this dynamic, we start with brief observations on the general relationship between digitization and agriculture and explain the platform economy, its general business model, and the proprietary forms of market power emerging from it. Subsequently, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. ‘Personal Health Surveillance’: The Use of mHealth in Healthcare Responsibilisation.Ben Davies - 2021 - Public Health Ethics 14 (3):268-280.
    There is an ongoing increase in the use of mobile health technologies that patients can use to monitor health-related outcomes and behaviours. While the dominant narrative around mHealth focuses on patient empowerment, there is potential for mHealth to fit into a growing push for patients to take personal responsibility for their health. I call the first of these uses ‘medical monitoring’, and the second ‘personal health surveillance’. After outlining two problems which the use of mHealth might seem to enable (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  50.  31
    Предикаты состояния и семантические типы предикатов [States, Events and Predicate Types].Anton Zimmerling - 2022 - In Svetla Koeva, Elena Ivanova, Yovka Tisheva & Anton Zimmerling (eds.), С.Коева, Е. Ю. Иванова, Й. Тишева, А. Циммерлинг (ред.). Онтология на ситуациите за състояние – лингвистично моделиране. Съпоставително изследване за български и руски. Cофия: "Марин Дринов", 2022. [Svetla Koeva, Elena Yu. Ivanova, Yovka Tisheva, Anton Zi. Sofia: Профессор "Марин Дринов" [Professor "Marin Drinov"]. pp. 31-52.
    I discuss the foundations of predicate ontologies based on two model notions – elementary states of affairs and eventualities, i.e. ordered pairs of initial and end states of affairs. Vendlerian classifications are oriented towards elementary states and tense logic, while Davidsonian classifications deal with eventualities and event logic. There are two kinds of atemporal predicates - fact and properties. Facts are propositional arguments of second-order predicates which add a special meaning that the embedded proposition was verified. Properties are atemporal first-order (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000