Results for 'surveillance'

45 found
Order:
  1.  71
    Just Surveillance? Towards a Normative Theory of Surveillance.Kevin Macnish - 2014 - Surveillance and Society 12 (1):142-153.
    Despite recent growth in surveillance capabilities there has been little discussion regarding the ethics of surveillance. Much of the research that has been carried out has tended to lack a coherent structure or fails to address key concerns. I argue that the just war tradition should be used as an ethical framework which is applicable to surveillance, providing the questions which should be asked of any surveillance operation. In this manner, when considering whether to employ (...), one should take into account the reason for the surveillance, the authority of the surveillant, whether or not there has been a declaration of intent, whether surveillance is an act of last resort, what is the likelihood of success of the operation and whether surveillance is a proportionate response. Once underway, the methods of surveillance should be proportionate to the occasion and seek to target appropriate people while limiting surveillance of those deemed inappropriate. By drawing on the just war tradition, ethical questions regarding surveillance can draw on a long and considered discourse while gaining a framework which, I argue, raises all the key concerns and misses none. (shrink)
    Download  
     
    Export citation  
     
    My bibliography   1 citation  
  2. Indiscriminate Mass Surveillance and the Public Sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops (...)
    Download  
     
    Export citation  
     
    My bibliography   3 citations  
  3. Living by Algorithm: Smart Surveillance and the Society of Control.Sean Erwin - 2015 - Humanities and Technology Review 34:28-69.
    Foucault’s disciplinary society and his notion of panopticism are often invoked in discussions regarding electronic surveillance. Against this use of Foucault, I argue that contemporary trends in surveillance technology abstract human bodies from their territorial settings, separating them into a series of discrete flows through what Deleuze will term, the surveillant assemblage. The surveillant assemblage and its product, the socially sorted body, aim less at molding, punishing and controlling the body and more at triggering events of in- and (...)
    Download  
     
    Export citation  
     
    My bibliography  
  4.  75
    Unblinking Eyes: The Ethics of Automating Surveillance.Kevin Macnish - 2012 - Ethics and Information Technology 14 (2):151-167.
    In this paper I critique the ethical implications of automating CCTV surveillance. I consider three modes of CCTV with respect to automation: manual, fully automated, and partially automated. In each of these I examine concerns posed by processing capacity, prejudice towards and profiling of surveilled subjects, and false positives and false negatives. While it might seem as if fully automated surveillance is an improvement over the manual alternative in these areas, I demonstrate that this is not necessarily the (...)
    Download  
     
    Export citation  
     
    My bibliography   4 citations  
  5.  58
    An Eye for an Eye: Proportionality and Surveillance.Kevin Macnish - 2015 - Ethical Theory and Moral Practice 18 (3):529-548.
    It is often claimed that surveillance should be proportionate, but it is rarely made clear exactly what proportionate surveillance would look like beyond an intuitive sense of an act being excessive. I argue that surveillance should indeed be proportionate and draw on Thomas Hurka’s work on proportionality in war to inform the debate on surveillance. After distinguishing between the proportionality of surveillance per se, and surveillance as a particular act, I deal with objections to (...)
    Download  
     
    Export citation  
     
    My bibliography   1 citation  
  6.  25
    Effects and Effectiveness of Surveillance Technologies: Mapping Perceptions, Reducing Harm.Elisa Orrù - 2015 - European University Institute Department of Law Research Papers 39:1-52.
    This paper addresses issues regarding perceptions of surveillance technologies in Europe. It analyses existing studies in order to explore how perceptions of surveillance affect and are affected by the negative effects of surveillance and how perceptions and effectiveness of surveillance technologies relate to each other. The paper identifies 12 negative effects of surveillance including, among others, privacy intrusion, the chilling effect and social exclusion, and classifies them into three groups. It further illustrates the different ways (...)
    Download  
     
    Export citation  
     
    My bibliography  
  7.  14
    Ontological Representation of CDC Active Bacterial Core Surveillance Case Reports.Albert Goldfain, Barry Smith & Lindsay G. Cowell - 2014 - Proceedings of the Fifth International Conference on Biomedical Ontology 1327:74-77.
    The Center for Disease Control and Prevention’s Active Bacterial Core Surveillance (CDC ABCs) Program is a collaborative effort betweeen the CDC, state health departments, laboratories, and universities to track invasive bacterial pathogens of particular importance to public health [1]. The year-end surveillance reports produced by this program help to shape public policy and coordinate responses to emerging infectious diseases over time. The ABCs case report form (CRF) data represents an excellent opportunity for data reuse beyond the original (...) purposes. (shrink)
    Download  
     
    Export citation  
     
    My bibliography  
  8.  27
    Justifying Public Health Surveillance: Basic Interests, Unreasonable Exercise, and Privacy.Alan Rubel - 2012 - Kennedy Institute of Ethics Journal 22 (1):1-33.
    Surveillance plays a crucial role in public health, and for obvious reasons conflicts with individual privacy. This paper argues that the predominant approach to the conflict is problematic, and then offers an alternative. It outlines a Basic Interests Approach to public health measures, and the Unreasonable Exercise Argument, which sets forth conditions under which individuals may justifiably exercise individual privacy claims that conflict with public health goals. The view articulated is compatible with a broad range conceptions of the value (...)
    Download  
     
    Export citation  
     
    My bibliography  
  9.  45
    Government Surveillance and Why Defining Privacy Matters in a Post‐Snowden World.Kevin Macnish - 2016 - Journal of Applied Philosophy (2).
    There is a long-running debate as to whether privacy is a matter of control or access. This has become more important following revelations made by Edward Snowden in 2013 regarding the collection of vast swathes of data from the Internet by signals intelligence agencies such as NSA and GCHQ. The nature of this collection is such that if the control account is correct then there has been a significant invasion of people's privacy. If, though, the access account is correct then (...)
    Download  
     
    Export citation  
     
    My bibliography  
  10.  39
    Domestic Drone Surveillance: The Court’s Epistemic Challenge and Wittgenstein’s Actional Certainty.Robert Greenleaf Brice & Katrina Sifferd - 2017 - Louisiana Law Review 77:805-831.
    This article examines the domestic use of drones by law enforcement to gather information. Although the use of drones for surveillance will undoubtedly provide law enforcement agencies with new means of gathering intelligence, these unmanned aircrafts bring with them a host of legal and epistemic complications. Part I considers the Fourth Amendment and the different legal standards of proof that might apply to law enforcement drone use. Part II explores philosopher Wittgenstein’s notion of actional certainty as a means to (...)
    Download  
     
    Export citation  
     
    My bibliography  
  11.  10
    Privacy in the Face of New Technologies of Surveillance.Mark Tunick - 2000 - Public Affairs Quarterly 14 (3):259-277.
    This article addresses the question of whether an expectation of privacy is reasonable in the face of new technologies of surveillance, by developing a principle that best fits our intuitions. A "no sense enhancement" principle which would rule out searches using technologically sophisticated devices is rejected. The paper instead argues for the "mischance principle," which proscribes uses of technology that reveal what could not plausibly be discovered accidentally without the technology, subject to the proviso that searches that serve a (...)
    Download  
     
    Export citation  
     
    My bibliography   2 citations  
  12.  3
    The Panopticon Factor: Privacy and Surveillance in the Digital Age.Jordanco Sekulovski - 2016 - Project Innovative Ethics 1 (9).
    This paper questions the use of new technologies as tools of modern surveillance in order to: (a) advance the research done by Michel Foucault on panoptic techniques of surveillance and dominance; and (b) give new insights on the way we use these new surveillance technologies in violation of democratic principles and legal norms. Furthermore, it questions Foucault’s statements on the expansion of Bentham’s Panopticon scheme as a universal model of modern-day democratic institutions. Therefore the purpose of this (...)
    Download  
     
    Export citation  
     
    My bibliography  
  13. Cops, Cameras and the Policing of Ethics.Meg Stalcup & Charles Hahn - 2016 - Theoretical Criminology 20 (4):482-501.
    In this article, we explore some of the roles of cameras in policing in the United States. We outline the trajectory of key new media technologies, arguing that cameras and social media together generate the ambient surveillance through which graphic violence is now routinely captured and circulated. Drawing on Michel Foucault, we suggest that there are important intersections between this video footage and police subjectivity, and propose to look at two: recruit training at the Washington state Basic Law Enforcement (...)
    Download  
     
    Export citation  
     
    My bibliography  
  14. Resistance Through Re-Narration: Fanon on De-Constructing Racialized Subjectivities.Cynthia R. Nielsen - 2011 - African Identies 9 (4):363-385.
    Frantz Fanon offers a lucid account of his entrance into the white world where the weightiness of the ‘white gaze’ nearly crushed him. In chapter five of Black Skins, White Masks, he develops his historico-racial and epidermal racial schemata as correctives to Merleau-Ponty’s overly inclusive corporeal schema. Experientially aware of the reality of socially constructed (racialized) subjectivities, Fanon uses his schemata to explain the creation, maintenance, and eventual rigidification of white-scripted ‘blackness’. Through a re-telling of his own experiences of racism, (...)
    Download  
     
    Export citation  
     
    My bibliography  
  15. The Use of Software Tools and Autonomous Bots Against Vandalism: Eroding Wikipedia’s Moral Order?Paul B. de Laat - 2015 - Ethics and Information Technology 17 (3):175-188.
    English - language Wikipedia is constantly being plagued by vandalistic contributions on a massive scale. In order to fight them its volunteer contributors deploy an array of software tools and autonomous bots. After an analysis of their functioning and the ‘ coactivity ’ in use between humans and bots, this research ‘ discloses ’ the moral issues that emerge from the combined patrolling by humans and bots. Administrators provide the stronger tools only to trusted users, thereby creating a new hierarchical (...)
    Download  
     
    Export citation  
     
    My bibliography   1 citation  
  16. Digital Alienation as the Foundation of Online Privacy Concerns.Brandt Dainow - 2015 - Acm Sigcas Computers and Society 45 (3):109-117.
    The term ‘digital alienation’ is used in critical IS research to refer to manifestations of alienation online. This paper explores the difficulties of using a traditional Marxist analysis to account for digital alienation. The problem is that the activity people undertake online does not look coerced or estranged from the creator’s individuality, both of which are typically seen as necessary for the production of alienation. As a result of this apparent difficulty, much of the research has focused on the relationship (...)
    Download  
     
    Export citation  
     
    My bibliography  
  17.  91
    Privacy in Public and the Contextual Conditions of Agency.Maria Brincker - 2017 - In Tjerk Timan, Bert-Jaap Koops & Bryce Newell (eds.), Privacy in Public Space: Conceptual and Regulatory Challenges. Edward Elgar.
    Current technology and surveillance practices make behaviors traceable to persons in unprecedented ways. This causes a loss of anonymity and of many privacy measures relied on in the past. These de facto privacy losses are by many seen as problematic for individual psychology, intimate relations and democratic practices such as free speech and free assembly. I share most of these concerns but propose that an even more fundamental problem might be that our very ability to act as autonomous and (...)
    Download  
     
    Export citation  
     
    My bibliography  
  18. Mrs. Aremac and the Camera: A Response to Ryberg.Annabelle Lever - 2008 - Res Publica 14 (1):35-42.
    In a recent article in Respublica, Jesper Ryberg argues that CCTV can be compared to a little old lady gazing out onto the street below. This article takes issue with the claim that government surveillance can be justified in this manner. Governments have powers and responsibilities that little old ladies lack. Even if CCTV is effective at preventing crime, there may be less intrusive ways of doing so. People have a variety of legitimate interests in privacy, and protection for (...)
    Download  
     
    Export citation  
     
    My bibliography   4 citations  
  19. Privacy, Democracy, and Security.Annabelle Lever - 2013 - The Philosophers' Magazine 63:99-105.
    It is especially hard, at present, to read the newspapers without emitting a howl of anguish and outrage. Philosophy can heal some wounds but, in this case, political action may prove a better remedy than philosophy. It can therefore feel odd trying to think philosophically about surveillance at a time like this, rather than joining with like-minded people to protest the erosion of our civil liberties, the duplicity of our governments, and the failings in our political institutions - including (...)
    Download  
     
    Export citation  
     
    My bibliography  
  20.  70
    The Particularized Judgment Account of Privacy.Alan Rubel - 2011 - Res Publica 17 (3):275-290.
    Questions of privacy have become particularly salient in recent years due, in part, to information-gathering initiatives precipitated by the 2001 World Trade Center attacks, increasing power of surveillance and computing technologies, and massive data collection about individuals for commercial purposes. While privacy is not new to the philosophical and legal literature, there is much to say about the nature and value of privacy. My focus here is on the nature of informational privacy. I argue that the predominant accounts of (...)
    Download  
     
    Export citation  
     
    My bibliography   1 citation  
  21.  28
    The Retrieval of Liberalism in Policing.Luke William Hunt - forthcoming - New York, NY, USA: Oxford University Press.
    There is a growing sense that many liberal states are in the midst of a shift in legal and political norms—a shift that is happening slowly and for a variety of reasons relating to security. The internet and tech booms—paving the way for new forms of electronic surveillance—predated the 9/11 attacks by several years, while the police’s vast use of secret informants and deceptive operations began well before that. On the other hand, the recent uptick in reactionary movements—movements in (...)
    Download  
     
    Export citation  
     
    My bibliography  
  22.  21
    Narrow AI Nanny: Reaching Strategic Advantage Via Narrow AI to Prevent Creation of the Dangerous Superintelligence.Alexey Turchin - manuscript
    Abstract: As there are no currently obvious ways to create safe self-improving superintelligence, but its emergence is looming, we probably need temporary ways to prevent its creation. The only way to prevent it is to create a special type of AI that is able to control and monitor the entire world. The idea has been suggested by Goertzel in the form of an AI Nanny, but his Nanny is still superintelligent, and is not easy to control. We explore here ways (...)
    Download  
     
    Export citation  
     
    My bibliography  
  23. Granny and the Robots: Ethical Issues in Robot Care for the Elderly.Amanda Sharkey & Noel Sharkey - 2012 - Ethics and Information Technology 14 (1):27-40.
    The growing proportion of elderly people in society, together with recent advances in robotics, makes the use of robots in elder care increasingly likely. We outline developments in the areas of robot applications for assisting the elderly and their carers, for monitoring their health and safety, and for providing them with companionship. Despite the possible benefits, we raise and discuss six main ethical concerns associated with: (1) the potential reduction in the amount of human contact; (2) an increase in the (...)
    Download  
     
    Export citation  
     
    My bibliography   25 citations  
  24.  24
    Student Privacy in Learning Analytics: An Information Ethics Perspective.Alan Rubel & Kyle M. L. Jones - 2016 - The Information Society 32 (2):143-159.
    In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for assessment (...)
    Download  
     
    Export citation  
     
    My bibliography  
  25.  86
    Sven Ove Hansson and Elin Palm, Eds., The Ethics of Workplace Privacy Reviewed By.Annabelle Lever - 2006 - Philosophy in Review 26 (5):348-350.
    Download  
     
    Export citation  
     
    My bibliography  
  26. The Quantified Relationship.John Danaher, Sven Nyholm & Brian D. Earp - 2018 - American Journal of Bioethics 18 (2):3-19.
    The growth of self-tracking and personal surveillance has given rise to the Quantified Self movement. Members of this movement seek to enhance their personal well-being, productivity, and self-actualization through the tracking and gamification of personal data. The technologies that make this possible can also track and gamify aspects of our interpersonal, romantic relationships. Several authors have begun to challenge the ethical and normative implications of this development. In this article, we build upon this work to provide a detailed ethical (...)
    Download  
     
    Export citation  
     
    My bibliography  
  27. Resistance is Not Futile: Frederick Douglass on Panoptic Plantations and the Un-Making of Docile Bodies and Enslaved Souls.Cynthia R. Nielsen - 2011 - Philosophy and Literature 35 (2):251-268.
    Frederick Douglass, in his first autobiography, Narrative of the Life of Frederick Douglass, describes how his sociopolitical identity was scripted by the white other and how his spatiotemporal existence was likewise constrained through constant surveillance and disciplinary dispositifs. Even so, Douglass was able to assert his humanity through creative acts of resistance. In this essay, I highlight the ways in which Douglass refused to accept the other-imposed narrative, demonstrating with his life the truth of his being—a human being unwilling (...)
    Download  
     
    Export citation  
     
    My bibliography  
  28.  92
    Hollow Hunt for Harms.Jacob Stegenga - 2016 - Perspectives on Science 24 (5):481-504.
    Harms of medical interventions are systematically underestimated in clinical research. Numerous factors—conceptual, methodological, and social—contribute to this underestimation. I articulate the depth of such underestimation by describing these factors at the various stages of clinical research. Before any evidence is gathered, the ways harms are operationalized in clinical research contributes to their underestimation. Medical interventions are first tested in phase 1 ‘first in human’ trials, but evidence from these trials is rarely published, despite the fact that such trials provide the (...)
    Download  
     
    Export citation  
     
    My bibliography   1 citation  
  29.  42
    Making Drones to Kill Civilians: Is It Ethical?Edmund F. Byrne - 2018 - Journal of Business Ethics 147 (1):81-93.
    A drone industry has emerged in the US, initially funded almost exclusively for military applications. There are now also other uses both governmental and commercial. Many military drones are still being made, however, especially for surveillance and targeted killings. Regarding the latter, this essay calls into question their legality and morality. It recognizes that the issues are complex and controversial, but less so as to the killing of non-combatant civilians. The government using drones for targeted killings maintains secrecy and (...)
    Download  
     
    Export citation  
     
    My bibliography  
  30. Torture Pornopticon: (In)Security Cameras, Self-Governance and Autonomy.Steve Jones - 2015 - In Linnie Blake & Xavier Aldana Reyes (eds.), Digital Horror: Haunted Technologies, Network Panic and the Found Footage Phenomenon. I.B. Tauris. pp. 29-41.
    ‘Torture porn’ films centre on themes of abduction, imprisonment and suffering. Within the subgenre, protagonists are typically placed under relentless surveillance by their captors. CCTV features in more than 45 contemporary torture-themed films (including Captivity, Hunger, and Torture Room). Security cameras signify a bridging point between the captors’ ability to observe and to control their prey. Founded on power-imbalance, torture porn’s prison-spaces are panoptical. Despite failing to encapsulate contemporary surveillance’s complexities (see Haggerty, 2011), the panopticon remains a dominant (...)
    Download  
     
    Export citation  
     
    My bibliography  
  31.  99
    Stillbirths: Economic and Psychosocial Consequences.Alexander E. P. Heazell, Dimitros Siassakos, Hannah Blencowe, Zulfiqar A. Bhutta, Joanne Cacciatore, Nghia Dang, Jai Das, Bicki Flenady, Katherine J. Gold, Olivia K. Mensah, Joseph Millum, Daniel Nuzum, Keelin O'Donoghue, Maggie Redshaw, Arjumand Rizvi, Tracy Roberts, Toyin Saraki, Claire Storey, Aleena M. Wojcieszek & Soo Downe - 2016 - The Lancet 387 (10018):604-16.
    Despite the frequency of stillbirths, the subsequent implications are overlooked and underappreciated. We present findings from comprehensive, systematic literature reviews, and new analyses of published and unpublished data, to establish the effect of stillbirth on parents, families, health-care providers, and societies worldwide. Data for direct costs of this event are sparse but suggest that a stillbirth needs more resources than a livebirth, both in the perinatal period and in additional surveillance during subsequent pregnancies. Indirect and intangible costs of stillbirth (...)
    Download  
     
    Export citation  
     
    My bibliography  
  32. Would You Mind Being Watched by Machines? Privacy Concerns in Data Mining.Vincent C. Müller - 2009 - AI and Society 23 (4):529-544.
    "Data mining is not an invasion of privacy because access to data is only by machines, not by people": this is the argument that is investigated here. The current importance of this problem is developed in a case study of data mining in the USA for counterterrorism and other surveillance purposes. After a clarification of the relevant nature of privacy, it is argued that access by machines cannot warrant the access to further information, since the analysis will have to (...)
    Download  
     
    Export citation  
     
    My bibliography  
  33.  98
    Profiling Vandalism in Wikipedia: A Schauerian Approach to Justification.Paul B. de Laat - 2016 - Ethics and Information Technology 18 (2):131-148.
    In order to fight massive vandalism the English- language Wikipedia has developed a system of surveillance which is carried out by humans and bots, supported by various tools. Central to the selection of edits for inspection is the process of using filters or profiles. Can this profiling be justified? On the basis of a careful reading of Frederick Schauer’s books about rules in general (1991) and profiling in particular (2003) I arrive at several conclusions. The effectiveness, efficiency, and risk-aversion (...)
    Download  
     
    Export citation  
     
    My bibliography  
  34. Considering the Human Implications of New and Emerging Technologies in the Area of Human Security.Emilio Mordini - 2014 - Science and Engineering Ethics 20 (3):617-638.
    This special issue of Science and Engineering Ethics is devoted to the ethical, societal and political implications of new and emerging technologies in the area of Human Security. Its aim is to address the wider implications of an altered security landscape. Specifically, and in accordance with SEE’s main area of interest, contributions to this special issue focus on those ethical considerations warranted by scientific and technological advances in the field of human security. This includes, but is not restricted to, issues (...)
    Download  
     
    Export citation  
     
    My bibliography  
  35. Le Prince et le problème de la corruption : réflexions sur une aporie machiavélienne.Robert Sparling - 2014 - Les ateliers de l'éthique/The Ethics Forum 9 (1):8-27.
    Dans les études sur la corruption politique, on trouve fréquemment des retours au lieu commun que les problèmes d’abus de charge publique en vue d’un intérêt privé ne peuvent être réglés sans la magie du leadership (l’anglicisme malheureux s’impose ici), cette qualité énigmatique de commandement qui saurait mettre en place les dispositifs d’incitatifs, de surveillance et de contrôle nécessaires pour contrer les abus. Mais un tel argument mène à une aporie, car les études qui placent ainsi leur confiance dans (...)
    Download  
    Translate
     
     
    Export citation  
     
    My bibliography  
  36.  22
    September 11th Fifteen Years After.Eric D. Meyer - 2017 - Blog of the APA.
    Fifteen years after the September 11th terror attacks, the United States still exists in a state of exception or state of emergency, in which the executive branch claims extraordinary powers to carry out bombing strikes or drone attacks in foreign nations and to engage in surveillance against its citizens outside the boundaries of international and constitutional law. This blog-piece argues for a restoration of the constitutional limiuts on sovereign executive powers and a cessation of the war on terrorism.
    Download  
     
    Export citation  
     
    My bibliography  
  37. Privacy in Public Places.Mark Tunick - 2009 - Social Theory and Practice 35 (4):597-622.
    New technologies of surveillance such as Global Positioning Systems (GPS) are increasingly used as convenient substitutes for conventional means of observation. Recent court decisions hold that the government may, without a warrant, use a GPS to track a vehicle’s movements in public places without violating the 4th Amendment, as the vehicle is in plain view and no reasonable expectation of privacy is violated. This emerging consensus of opinions fails to distinguish the unreasonable expectation that we not be seen in (...)
    Download  
     
    Export citation  
     
    My bibliography  
  38.  81
    Profit, Plague and Poultry: The Intra-Active Worlds of Highly Pathogenic Avian Flu.Chris Wilbert - 2006 - Radical Philosophy 139.
    In 2006 we awoke, in Europe at least, to the odd situation in which twitchers – obsessive birdwatchers who spend much of their leisure time on the far-flung edges of countries – are being reinvented as the eyes and ears of the state, helping warn of new border incursions. These incursions are posited as taking an avian form that may bring with it very unwelcome pathogens. Everyday avian observations and knowledges of migratory routes are being reinvented as a kind of (...)
    Download  
     
    Export citation  
     
    My bibliography  
  39. Democracy and Security.Annabelle Lever - 2013 - The Philosophers' Magazine 63 (4):99-110.
    It is especially hard, at present, to read the newspapers without emitting a howl of anguish and outrage. Philosophy can heal some wounds but, in this case, political action may prove a better remedy than philosophy. It can therefore feel odd trying to think philosophically about surveillance at a time like this, rather than joining with like-minded people to protest the erosion of our civil liberties, the duplicity of our governments, and the failings in our political institutions - including (...)
    Download  
     
    Export citation  
     
    My bibliography  
  40.  50
    In the Privacy of Our Streets.Carissa Véliz - 2018 - In Bryce Newell, Tjerk Timan & Bert-Jaap Koops (eds.), Surveillance, Privacy and Public Space. pp. 16-32.
    If one lives in a city and wants to be by oneself or have a private conversation with someone else, there are two ways to set about it: either one finds a place of solitude, such as one’s bedroom, or one finds a place crowded enough, public enough, that attention to each person dilutes so much so as to resemble a deserted refuge. Often, one can get more privacy in public places than in the most private of spaces. The home (...)
    Download  
     
    Export citation  
     
    My bibliography  
  41.  66
    Evaluating Future Nanotechnology: The Net Societal Impacts of Atomically Precise Manufacturing.Steven Umbrello & Seth D. Baum - 2018 - Futures 100:63-73.
    Atomically precise manufacturing (APM) is the assembly of materials with atomic precision. APM does not currently exist, and may not be feasible, but if it is feasible, then the societal impacts could be dramatic. This paper assesses the net societal impacts of APM across the full range of important APM sectors: general material wealth, environmental issues, military affairs, surveillance, artificial intelligence, and space travel. Positive effects were found for material wealth, the environment, military affairs (specifically nuclear disarmament), and space (...)
    Download  
     
    Export citation  
     
    My bibliography  
  42. The Internet as Friend or Foe of Intellectual Freedom.Elizabeth Buchanan - 2004 - International Review of Information Ethics 2.
    What a long strange trip the Internet has had. From its inception and use by the American military to the billions of users world-wide who log on daily, the Internet is both the promise of access to information and the peril of surveillance and a means of curtailing intellectual freedom. This paper will review this continuum, paying close attention to recent developments in the United States that fuel the dichotomous debate surrounding intellectual freedom.
    Download  
     
    Export citation  
     
    My bibliography  
  43.  32
    A Review of The Murderer Next Door by David Buss (2005).Starks Michael - 2017 - In Suicidal Utopian Delusions in the 21st Century. pp. 390-397.
    Though this volume is a bit dated, there are few recent popular books dealing specifically with the psychology of murder and it’s a quick overview available for a few dollars, so still well worth the effort. It makes no attempt to be comprehensive and is somewhat superficial in places, with the reader expected to fill in the blanks from his many other books and the vast literature on violence. For an update see e.g., Buss, The Handbook of Evolutionary Psychology 2nd (...)
    Download  
     
    Export citation  
     
    My bibliography  
  44.  32
    The Orbital Space Environment and Space Situational Awareness Domain Ontology – Towards an International Information System for Space Data.Robert J. Rovetto - 2016 Sept - In Proceedings of The Advanced Maui Optical and Space Surveillance Technologies (AMOS) Conference.
    The orbital space environment is home to natural and artificial satellites, debris, and space weather phenomena. As the population of orbital objects grows so do the potential hazards to astronauts, space infrastructure and spaceflight capability. Orbital debris, in particular, is a universal concern. This and other hazards can be minimized by improving global space situational awareness (SSA). By sharing more data and increasing observational coverage of the space environment we stand to achieve that goal, thereby making spaceflight safer and expanding (...)
    Download  
     
    Export citation  
     
    My bibliography  
  45. Dossier Gaialight 2007-2011.Gavin Keeney - manuscript
    Essays and documents in support of the works of Gaialight - DOCUMENTS: The Passion of Jeanne d’Art (2007) - Letter to Gaia (2007) - “Art as Such”: This is Not Pop ... (2008) - Writing Toward Darkness (2009) - Scarlett Words: Light America (2009) - The Darklight Elaboration (2010) - The Darklight Elaboration: Zeitgeist or Episteme? (2010) - Cam Girls (2011) - Brooklyn Buzz (2011) - Brooklyn Buzz: The Semi-divine Metropolis (2011) - Reconnaissance: Light War, Mass Surveillance, Video Games (...)
    Download  
    Translate
     
     
    Export citation  
     
    My bibliography