Academic literature on the topic 'Electronic surveillance – political aspects – united states'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Electronic surveillance – political aspects – united states.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Electronic surveillance – political aspects – united states"

1

Bharucha, Ashok J., Alex John London, David Barnard, Howard Wactlar, Mary Amanda Dew, and Charles F. Reynolds. "Ethical Considerations in the Conduct of Electronic Surveillance Research." Journal of Law, Medicine & Ethics 34, no. 3 (2006): 611–19. http://dx.doi.org/10.1111/j.1748-720x.2006.00075.x.

Full text
Abstract:
Nearly 2.5 million Americans currently reside in nursing homes and assisted living facilities in the United States, accounting for approximately five percent of persons sixty-five and older. The aging of the “Baby Boomer” generation is expected to lead to an exponential growth in the need for some form of long-term care (LTC) for this segment of the population within the next twenty-five years. In light of these sobering demographic shifts, there is an urgency to address the profound concerns that exist about the quality-of-care (QoC) and quality-of-life (QoL) of this frailest segment of our population.
APA, Harvard, Vancouver, ISO, and other styles
2

McAdams, A. James. "Spying on Terrorists: Germany in Comparative Perspective." German Politics and Society 25, no. 3 (September 1, 2007): 70–88. http://dx.doi.org/10.3167/gps.2007.250304.

Full text
Abstract:
Intelligence and law enforcement agencies in western democracies are turning increasingly to electronic surveillance tools in their efforts to identify and combat new terrorist threats. But this does not mean that they are equally equipped to undertake these measures. As the author shows by comparing surveillance activities in three countries—Great Britain, the United States, and Germany—the Federal Republic's more restrictive legal norms and institutions provide its government with much less freedom of maneuver than its allies.
APA, Harvard, Vancouver, ISO, and other styles
3

Serova, Ekaterina. "Military aspects of cooperation between Finland and the USA: challenges for Russia." Scientific and Analytical Herald of IE RAS 35, no. 5 (October 31, 2023): 30–41. http://dx.doi.org/10.15211/vestnikieran520233041.

Full text
Abstract:
The article analyses military and political factors of cooperation between Finland and the United States since 1990s up to the present. The author attempts to show the role Finnish defence forces in the US military reinforcement plans in the Northern European Theater of Operations. The author focuses on the American security interests in Finnish territories, as well as expert views on the US priority in Finland’s foreign policy, including the latest public opinion polls. The aim of US military reinforcement in Finland is twofold. First, to pose a threat to Russia. Second, to help the US military improve surveillance, intelligence and analysis capabilities in real time in north-west Europe and the North Atlantic. Within the context of challenges to Russia’s security, the major institutional arrangements, military trends and consequences of cooperation are discussed. Finally, scenarios for the development of Finnish-US relations within NATO are proposed.
APA, Harvard, Vancouver, ISO, and other styles
4

Frattaroli, Shannon, Keshia M. Pollack, Jessica L. Young, and Jon S. Vernick. "State Health Department Employees, Policy Advocacy, and Political Campaigns: Protections and Limits under the Law." Journal of Law, Medicine & Ethics 43, S1 (2015): 64–68. http://dx.doi.org/10.1111/jlme.12219.

Full text
Abstract:
State health departments are at the core of the United States (U.S.) public health infrastructure. Surveillance to monitor trends in disease and injury; the development, coordination, and delivery of services; and public education are some of the core functions health department employees oversee every day. As such, agencies and their employees are well positioned to inform policy decisions that affect the public’s health. However, little is known about the role of health department staff — a sizeable proportion of the public health workforce — as advocates for public health policies, independent of their agency roles. Anecdotally, some health department employees with whom we have spoken expressed reluctance to engage in policy advocacy for fear of violating little known or understood agency or state rules.
APA, Harvard, Vancouver, ISO, and other styles
5

Francis, Leslie Pickering. "The Physician-Patient Relationship and a National Health Information Network." Journal of Law, Medicine & Ethics 38, no. 1 (2010): 36–49. http://dx.doi.org/10.1111/j.1748-720x.2010.00464.x.

Full text
Abstract:
The United States, like other countries facing rising health care costs, is pursuing a commitment to interoperable electronic health records. Electronic records, it is thought, have the potential to reduce the risks of error, improve care coordination, monitor care quality, enable patients to participate more fully in care management, and provide the data needed for research and surveillance. Interoperable electronic health records on a national scale — the ideal of a national health information network (or NHIN) — seem likely to magnify these advantages. Thus, the recent economic stimulus package contains considerable funding for the development of “health information technology architecture that will support the nationwide electronic exchange and use of health information in a secure, private, and accurate manner.”
APA, Harvard, Vancouver, ISO, and other styles
6

Paterson, Craig. "From offender to victim-oriented monitoring: a comparative analysis of the emergence of electronic monitoring systems in Argentina and England and Wales." urbe. Revista Brasileira de Gestão Urbana 7, no. 2 (August 2015): 155–66. http://dx.doi.org/10.1590/2175-3369.007.002.se01.

Full text
Abstract:
The increasingly psychological terrain of crime and disorder management has had a transformative impact upon the use of electronic monitoring technologies. Surveillance technologies such as electronic monitoring - EM, biometrics, and video surveillance have flourished in commercial environments that market the benefits of asocial technologies in managing disorderly behavior and which, despite often chimerical crime prevention promises, appeal to the ontologically insecure social imagination. The growth of EM in criminal justice has subsequently taken place despite, at best, equivocal evidence that it protects the public and reduces recidivism. Innovative developments in Portugal, Argentina and the United States have re-imagined EM technologies as more personalized devices that can support victims rather than control offenders. These developments represent a re-conceptualization of the use of the technology beyond the neoliberal prism of rational choice theories and offender-oriented thinking that influenced first generation thinking about EM. This paper identifies the socio-political influences that helped conceptualize first generation thinking about EM as, firstly, a community sentence and latterly, as a technique of urban security. The paper reviews attempts to theorize the role and function of EM surveillance technologies within and beyond criminal justice and explores the contribution of victimological perspectives to the use of EM 2.0.
APA, Harvard, Vancouver, ISO, and other styles
7

Titorenko, V. E. "The geopolitical landscape in the Sahara-Sahel zone." Diplomaticheskaja sluzhba (Diplomatic Service), no. 1 (January 31, 2024): 75–86. http://dx.doi.org/10.33920/vne-01-2401-10.

Full text
Abstract:
The article is devoted to the analysis of the geopolitical and regional significance of the Sahara-Sahel zone (SSZ) of Africa in the current coordinate system of international relations, primarily taking into account the increased interest of Russia in this region in the last few years. An assessment of the economic potential of the SSZ is given to determine the feasibility of investments in the development of its countries, including from the point of view of their importance for the strategic and military-political interests of Russia and its main competitors there, primarily France and the United States. The prospect of maintaining Russia's active presence in the region and the cost of this is assessed. The reasons for the curtailment of the French military-political presence in the main countries of this region and the desire of the United States to maintain its intelligence surveillance bases there are explained. Conclusions and suggestions are made regarding what Russia needs to do to ensure its interests in the SSZ with minimal costs.
APA, Harvard, Vancouver, ISO, and other styles
8

Schwebel, David C., and Carl M. Brezausek. "Child Development and Pediatric Sport and Recreational Injuries by Age." Journal of Athletic Training 49, no. 6 (December 1, 2014): 780–85. http://dx.doi.org/10.4085/1062-6050-49.3.41.

Full text
Abstract:
Context: In 2010, 8.6 million children were treated for unintentional injuries in American emergency departments. Child engagement in sports and recreation offers many health benefits but also exposure to injury risks. In this analysis, we consider possible developmental risk factors in a review of age, sex, and incidence of 39 sport and recreational injuries. Objective: To assess (1) how the incidence of 39 sport and recreational injuries changed through each year of child and adolescent development, ages 1 to 18 years, and (2) sex differences. Design Descriptive epidemiology study. Setting: Emergency department visits across the United States, as reported in the 2001–2008 National Electronic Injury Surveillance System database. Patients or Other Participants: Data represent population-wide emergency department visits in the United States. Main Outcome Measure(s) Pediatric sport- and recreation-related injuries requiring treatment in hospital emergency departments. Results: Almost 37 pediatric sport or recreational injuries are treated hourly in the United States. The incidence of sport- and recreation-related injuries peaks at widely different ages. Team-sport injuries tend to peak in the middle teen years, playground injuries peak in the early elementary ages and then drop off slowly, and bicycling injuries peak in the preteen years but are a common cause of injury throughout childhood and adolescence. Bowling injuries peaked at the earliest age (4 years), and injuries linked to camping and personal watercraft peaked at the oldest age (18 years). The 5 most common causes of sport and recreational injuries across development, in order, were basketball, football, bicycling, playgrounds, and soccer. Sex disparities were common in the incidence of pediatric sport and recreational injuries. Conclusions: Both biological and sociocultural factors likely influence the developmental aspects of pediatric sport and recreational injury risk. Biologically, changes in perception, cognition, and motor control might influence injury risk. Socioculturally, decisions must be made about which sport and recreational activities to engage in and how much risk taking occurs while engaging in those activities. Understanding the developmental aspects of injury data trends allows preventionists to target education at specific groups.
APA, Harvard, Vancouver, ISO, and other styles
9

Morozov, V., V. Chukreev, and D. Rizayeva. "Legal regulation of technologically improved people in the United States and China." BRICS Law Journal 9, no. 4 (November 24, 2022): 4–20. http://dx.doi.org/10.21684/2412-2343-2022-9-4-4-20.

Full text
Abstract:
As humanity improves its use of technologies that can replace parts of a biological organism with ones containing mechanical or electronic components, it raises important legal and political issues. For example, the successful implantation of devices in human bodies could lead to the emergence of new cognitive and motor abilities, thereby resulting in the creation of a new class of people. Undoubtedly, this new class of people with extraordinary abilities would require a legal and governmental response. However, the question that arises is what legal rights might be given to these people, considering that they are more similar to machines than to men or women. The following legal aspects are of the utmost importance: the legal rights and responsibilities of cyborgs; the regulation of access to neuroprosthetic devices by third parties; and the limitation of the illegal use of the damaging capabilities of cyborgs. This article examines a number of laws and regulations from various jurisdictions in the United States, the European Union, South Korea and China that apply to cyborg technologies, with a particular focus on a legal doctrine that applies to neuroprostheses.
APA, Harvard, Vancouver, ISO, and other styles
10

Ray, Argha, and Anjali Kaushik. "State transgression on electronic expression: is it for real?" Information & Computer Security 25, no. 4 (October 9, 2017): 382–401. http://dx.doi.org/10.1108/ics-03-2016-0024.

Full text
Abstract:
Purpose Cyberspace is a virtual environment where instantaneous communications are initiated and consumed using computer networks without any natural or artificial boundaries. These communications are not only an exchange of information but also a catharsis on the socio-political environment of the real world. This explosion of electronic expression is often detrimental to the traditional secretive maneuvers of nation states and the exercise of its power. Unable to come to terms with the new reality nation states through legislative action or otherwise attempt to assert its sovereignty in the space that has no political and societal boundaries. This may lead to an encroachment on basic human rights that often have constitutional guarantees in the real world but may be violated in the online milieu. This paper aims to investigate this issue in detail and evaluate whether nation states are using cyber-security as a propaganda tool to transgress on electronic expression. Design/methodology/approach The Website of the UN Office of the High Commissioner for Human Rights states “In December 2013, the United Nations General Assembly adopted resolution 68/167, which expresses deep concern at the negative impact that surveillance and interception of communications may have on human rights”. It further says “The General Assembly called on all States to review their procedures, practices and legislation related to communications surveillance, interception and collection of personal data and emphasized the need for States to ensure the full and effective implementation of their obligations under international human rights law”. With this development, this paper seeks to unravel the role of nation states in using cybersecurity as a propaganda tool by raising the specter of threat to national security and economic wellbeing. The paper is based on exploratory research with data compilation from secondary sources. To collect data, various research papers, books and journals have been referenced and data available in public domain has been accumulated. Findings This paper has tried to unravel state action on cyberspace which often runs counter to the concept of civil liberties. It indicates that in terms of both national security and economic impact, cybercrime represent a very nominal threat vector. Also, cybercrime as compared with other forms of crime is again nominal. Finally, cyber laws and policies of different countries need to be more nuanced such as to allow space for civil liberties. Overall, the propaganda surrounding the malaise of cybercrime seems to be more hype than real. We already have examples of countries who have transgressed into electronic expression in cyber space. Therefore, UN has a valid reason to raise a red flag on this unfolding issue. Originality/value This paper was published at 21st Americas Conference of Information Systems held at Puerto Rico, USA, between August 13-15, 2015 (AMCIS, 2015). The authors of this paper seek review by Editors of the Journal for Republication of original work. The authors have taken cognizance of the Originality Guidelines for Emerald published at this URL www.emeraldgrouppublishing.com/authors/writing/originality.htm
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Electronic surveillance – political aspects – united states"

1

Register, Michael G. "Justifying the means| Electronic domestic surveillance programs before and following the September 11, 2001 terrorist attack on the United States." Thesis, Utica College, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10155656.

Full text
Abstract:

Throughout the years, the United States government and local law enforcement has used electronic domestic surveillance for criminal justice purposes. Shortly after World War II, the government began to abuse the power of electronic domestic surveillance for the purposes of gathering intelligence on American citizens. After the September 11, 2001 terrorist attacks on the United States, electronic domestic surveillance focused heavily on American citizens in the name of national security. The government has a duty to protect the United States and American citizens. The use of electronic domestic surveillance is a method for that purpose; however, the infringement of American’s Fourth Amendment rights has become a conflict for the government while trying to maintain national security. Along with attempting to keep security for American citizens, the United States government has lacked transparency in their electronic domestic surveillance methods, causing controversy with American citizens. It is a question of how much privacy would Americans sacrifice for their security. The research in this paper focuses on the comparison of the electronic domestic surveillance methods, how these processes affected the Fourth Amendment rights of American citizens, and the response to these programs and violations by Americans and the United States government, respectively.

APA, Harvard, Vancouver, ISO, and other styles
2

Soma, Samantha Isabella. "Community, Conversation, and Conflict: a Study of Deliberation and Moderation in a Collaborative Political Weblog." PDXScholar, 2009. https://pdxscholar.library.pdx.edu/open_access_etds/1447.

Full text
Abstract:
Concerns about the feasibility of the Internet as an appropriate venue for deliberation have emerged based on the adverse effects of depersonalization, anonymity, and lack of accountability on the part of online discussants. As in face-to-face communication, participants in online conversations are best situated to determine for themselves what type of communication is appropriate. Earlier research on Usenet groups was not optimistic, but community-administered moderation may provide a valuable tool for online political discussion groups who wish to support and enforce deliberative communication among a diverse or disagreeing membership. This research examines individual comments and their rating and moderation within a week-long "Pie Fight" discussion about community ownership and values in the Daily Kos political blog. Specific components of deliberation were identified and a content analysis was conducted for each. Salient issues included community reputation, agreement and disagreement, meta-communication, and appropriate expression of emotion, humor, and profanity. Data subsets were analyzed in conjunction with the comment ratings given by community members to determine what types of interaction received the most attention, and how the community used the comment ratings system to promote or demote specific comment types. The use of middle versus high or low ratings, the value of varied ratings format, and the use of moderation as a low-impact means of expressing dissent were also explored. The Daily Kos community members effectively used both comments and ratings to mediate conflict, assert their desired kind of community, demonstrate a deliberative self-concept, and support specific conditions of deliberation. The moderation system was used to sanction uncivil or unproductive communication, as intended, and was also shown to facilitate deliberation of disagreement rather than creating an echo chamber of opinion.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Electronic surveillance – political aspects – united states"

1

Jean-Martial, Lefranc, ed. Si les Ricains n'étaient pas là, nous aurions tous une vie privée. Paris: First éditions, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Diffie, Whitfield. Privacy on the line: The politics of wiretapping and encryption. Cambridge, Mass: MIT Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Eva, Landau Susan, ed. Privacy on the line: The politics of wiretapping and encryption. Cambridge, Mass: MIT Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Eva, Landau Susan, ed. Privacy on the line: The politics of wiretapping and encryption. Cambridge, Mass: MIT Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Staples, William G. The culture of surveillance: Discipline and social control in the United States. New York, NY: St. Martin's Press, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Foerstel, Herbert N. Surveillance in the stacks: The FBI's library awareness program. New York: Greenwood Press, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Charns, Alexander. Cloak and gavel: FBI wiretaps, bugs, informers, and the Supreme Court. Urbana: University of Illinois Press, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

P, Murphy Kyle, ed. Eyes on you: Background and issues surrounding surveillance from the sky. New York: Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Selnow, Gary W. Electronic whistle-stops: The impact of the Internet on American politics. Westport, Conn: Praeger, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Grossman, Lawrence K. The electronic republic: Reshaping democracy in the information age. New York: Penguin Books, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Electronic surveillance – political aspects – united states"

1

Baarda, Rachel. "Digital Democracy in Authoritarian Russia." In Advances in Electronic Government, Digital Divide, and Regional Development, 87–100. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-2463-2.ch005.

Full text
Abstract:
Digital media is expected to promote political participation in government. Around the world, from the United States to Europe, governments have been implementing e-government (use of of the Internet to make bureaucracy more efficient) and promising e-democracy (increased political participation by citizens). Does digital media enable citizens to participate more easily in government, or can authoritarian governments interfere with citizens' ability to speak freely and obtain information? This study of digital media in Russia will show that while digital media can be used by Russian citizens to gain information and express opinions, Kremlin ownership of print media, along with censorship laws and Internet surveillance, can stifle the growth of digital democracy. Though digital media appears to hold promise for increasing citizen participation, this study will show that greater consideration needs to be given to the power of authoritarian governments to suppress civic discourse on the Internet.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography