Journal articles on the topic 'Electronic surveillance – political aspects'

To see the other types of publications on this topic, follow the link: Electronic surveillance – political aspects.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Electronic surveillance – political aspects.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Allmer, Thomas. "Critical Surveillance Studies in the Information Society." tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 9, no. 2 (November 2, 2011): 566–92. http://dx.doi.org/10.31269/triplec.v9i2.266.

Full text
Abstract:
The overall aim of this paper is to clarify how we can theorize and systemize economic surveillance. Surveillance studies scholars like David Lyon stress that economic surveillance such as monitoring consumers or the workplace are central aspects of surveillance societies. The approach that is advanced in this work recognizes the importance of the role of the economy in contemporary surveillance societies. The paper at hand constructs theoretically founded typologies in order to systemize the existing literature of surveillance studies and to analyze examples of surveillance. Therefore, it mainly is a theoretical approach combined with illustrative examples. This contribution contains a systematic discussion of the state of the art of surveillance and clarifies how different notions treat economic aspects of surveillance. In this work it is argued that the existing literature is insufficient for studying economic surveillance. In contrast, a typology of surveillance in the modern economy, which is based on foundations of a political economy approach, allows providing a systematic analysis of economic surveillance on the basis of current developments on the Internet. Finally, some political recommendations are drawn in order to overcome economic surveillance. This contribution can be fruitful for scholars who want to undertake a systematic analysis of surveillance in the modern economy and who want to study the field of surveillance critically.
APA, Harvard, Vancouver, ISO, and other styles
2

Allmer, Thomas. "Critical Surveillance Studies in the Information Society." tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 9, no. 2 (November 2, 2011): 566–92. http://dx.doi.org/10.31269/vol9iss2pp566-592.

Full text
Abstract:
The overall aim of this paper is to clarify how we can theorize and systemize economic surveillance. Surveillance studies scholars like David Lyon stress that economic surveillance such as monitoring consumers or the workplace are central aspects of surveillance societies. The approach that is advanced in this work recognizes the importance of the role of the economy in contemporary surveillance societies. The paper at hand constructs theoretically founded typologies in order to systemize the existing literature of surveillance studies and to analyze examples of surveillance. Therefore, it mainly is a theoretical approach combined with illustrative examples. This contribution contains a systematic discussion of the state of the art of surveillance and clarifies how different notions treat economic aspects of surveillance. In this work it is argued that the existing literature is insufficient for studying economic surveillance. In contrast, a typology of surveillance in the modern economy, which is based on foundations of a political economy approach, allows providing a systematic analysis of economic surveillance on the basis of current developments on the Internet. Finally, some political recommendations are drawn in order to overcome economic surveillance. This contribution can be fruitful for scholars who want to undertake a systematic analysis of surveillance in the modern economy and who want to study the field of surveillance critically.
APA, Harvard, Vancouver, ISO, and other styles
3

Kikkas, Toivo. "Surveillance Reports of National Units of the Red Army Political Departments in 1918–1920." Latvijas Universitātes Žurnāls Vēsture, no. 16 (December 22, 2023): 39–55. http://dx.doi.org/10.22364/luzv.16.02.

Full text
Abstract:
While surveillance as a mechanism of political control was a common prac-tice of states even before the First World War, the introduction of the Political Departments to the Red Army in 1918–1920 was a completely new historical-military phenomenon. Surveillance reports submitted by the commissars of the political departments had to provide an overview of the attitudes of soldiers, progress in political education, and the condition of various military aspects, such as the supply of uniforms. Next to nothing is known about surveillance reports compiled by these institutions in national units of the Red Army. This paper summarizes the instructions for compiling surveillance reports, their implementation, and what was actually reported by the Political Departments of Estonian and Latvian national units of the Red Army.
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Hyundong. "A Study on the Status Analysis of Location Tracking Electronic Device System." Yu Gwan sun Research Senter 28, no. 2 (December 31, 2023): 57–82. http://dx.doi.org/10.56475/ygsrc.2023.28.2.57.

Full text
Abstract:
This study examines the legitimacy of the electronic surveillance system in Korea, and hurriedly passed the Electronic Surveillance System Act on September 1, 2008, as violent crimes continue to occur recently. These electronic surveillance systems implement harsh punitive policies aimed at monitoring and isolating certain criminals, but serious debates, effective tests, and side effects were not studied before the law was passed, and even before the electronic surveillance system was implemented, it contributed a lot to reducing social protection and recidivism rates by extending the implementation period and expanding the category of criminals, but despite these positive aspects, legal issues and operational problems have been found to have created negative aspects. In order to increase the efficiency of the electronic monitoring system, problems such as infringement of basic rights under the constitution, double risks, operating budget, and manpower must be resolved first. In addition, the selection of electronic monitoring targets should not only consider systematic secondary crime risk assessment criteria (K-SORAS), but also converge with each government department to achieve the purpose of this law.
APA, Harvard, Vancouver, ISO, and other styles
5

Ball, Mike. "‘The Visual Availability and Local Organisation of Public Surveillance Systems: The Promotion of Social Order in Public Spaces’." Sociological Research Online 5, no. 1 (May 2000): 32–44. http://dx.doi.org/10.5153/sro.359.

Full text
Abstract:
The empirical focus of the research reported in this paper is the recent rapid growth in public surveillance systems. It is now commonplace in Britain for certain “public” spaces to have video surveillance and for some stretches of public highways to have “Gatso” speed cameras located on them. The visual availability of items of material culture such as surveillance systems is introduced as an analytical organising principal for delineating the study of objects within the “seen” world. It is argued that we inhabit a palpable material environment of objects which has consequences for and impinges upon aspects of our practical decision making.
APA, Harvard, Vancouver, ISO, and other styles
6

Lyon, David. "An Electronic Panopticon? A Sociological Critique of Surveillance Theory." Sociological Review 41, no. 4 (November 1993): 653–78. http://dx.doi.org/10.1111/j.1467-954x.1993.tb00896.x.

Full text
Abstract:
The concept of an electronic Panopticon is making increasingly frequent appearances within analyses of electronic surveillance. This paper traces briefly the history of the Panopticon from Jeremy Bentham to Michel Foucault and through a series of case studies shows how the idea seems relevant in the context of computer databases. It is argued that while the Panopticon has some salience to electronic surveillance, particularly through its enhanced capacity for invisible monitoring of personal details, the notion of a ‘societal Panopticon’ is sociologically mistaken. Nonetheless, where vestiges of the Panopticon are present within electronic surveillance, they present a challenge to social analysis and to political practice.
APA, Harvard, Vancouver, ISO, and other styles
7

Rojszczak, Marcin. "EU Criminal Law and Electronic Surveillance: The Pegasus System and Legal Challenges It Poses." European Journal of Crime, Criminal Law and Criminal Justice 29, no. 3-4 (December 22, 2021): 290–316. http://dx.doi.org/10.1163/15718174-bja10027.

Full text
Abstract:
Abstract The introduction of modern forms of communication, such as encrypted messengers or VoIP telephony, has forced law enforcement agencies to use new technologies to carry out surveillance of people facing criminal proceedings. Rather than relying on the interception of communications during transmission, modern surveillance systems are often based on breaking or bypassing the security features of a user’s mobile device – making it possible to conduct various forms of surveillance that include audio and video recording. One example of such a system is Pegasus – a tool that was initially used to pursue national security objectives but is now increasingly applied in criminal surveillance. The introduction of technical innovations in criminal surveillance must include an examination of their compatibility with legal constraints laid down to protect the individual against the risk of arbitrariness and abuse of power. The effectiveness of surveillance should never be the sole determinant for tasks undertaken by public authorities. The aim of this article is to demonstrate that the implementation of modern surveillance measures such as Pegasus must also include a review of existing legal regulations to ensure that the use of these products’ extended capabilities is under proper control and complies with the rule of law.
APA, Harvard, Vancouver, ISO, and other styles
8

Hatteberg, Sarah J. "Under Surveillance: Collegiate Athletics as a Total Institution." Sociology of Sport Journal 35, no. 2 (June 1, 2018): 149–58. http://dx.doi.org/10.1123/ssj.2017-0096.

Full text
Abstract:
Scholars have identified similarities between collegiate athletics and total institutions for profit-athletes, but few examined the relationship for athletes participating in other sports. Drawing on qualitative data collected from a sample of NCAA Division I athletes participating in four different sports, this study examined how collegiate athletics might approximate a total institution according to Goffman’s 1961 conceptualization. Consistent with Goffman’s conceptualization, athletes experienced 1) an absence of barriers between their spheres of life, 2) insularity of the athletic community, 3) strict schedules, and 4) institutional objectives used to justify totalitarian practices. These aspects of the institution helped to facilitate pervasive surveillance and extensive institutional power and control, aspects of the institution that athletes of all sports types perceived as stressful. These findings suggest that structural aspects of collegiate athletics may operate as ambient strains that could have consequences for athlete well-being, a possibility that should be explored in future research.
APA, Harvard, Vancouver, ISO, and other styles
9

Kling, Rob, and David Lyon. "The Electronic Eye: The Rise of the Surveillance Society ." Contemporary Sociology 24, no. 4 (July 1995): 398. http://dx.doi.org/10.2307/2077688.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bharucha, Ashok J., Alex John London, David Barnard, Howard Wactlar, Mary Amanda Dew, and Charles F. Reynolds. "Ethical Considerations in the Conduct of Electronic Surveillance Research." Journal of Law, Medicine & Ethics 34, no. 3 (2006): 611–19. http://dx.doi.org/10.1111/j.1748-720x.2006.00075.x.

Full text
Abstract:
Nearly 2.5 million Americans currently reside in nursing homes and assisted living facilities in the United States, accounting for approximately five percent of persons sixty-five and older. The aging of the “Baby Boomer” generation is expected to lead to an exponential growth in the need for some form of long-term care (LTC) for this segment of the population within the next twenty-five years. In light of these sobering demographic shifts, there is an urgency to address the profound concerns that exist about the quality-of-care (QoC) and quality-of-life (QoL) of this frailest segment of our population.
APA, Harvard, Vancouver, ISO, and other styles
11

Antipov, Aleksei V., and Iurii A. Trusov. "Right to be forgotten: ethical and political aspects." Philosophy Journal 16, no. 3 (2023): 163–77. http://dx.doi.org/10.21146/2072-0726-2023-16-3-163-177.

Full text
Abstract:
Modernity is marked by the advent of technologies capable of storing data almost indefi­nitely. On the other hand, the data collection takes place without the conscious permission of the users. The storage and collection of personal data is a potential problem, since the digital footprint of a person on the Internet has an impact on the social and political rep­resentation of the individual, its perception by other actors. Compromising the content of a digital footprint can expose information that is not intended for others. There is cur­rently an increasing trend of misuse of stored data, both by criminals and by companies that use the data for sale or surveillance. The need to control how data is collected, stored and used leads to the emergence in the academic literature and the legal field of the “right to be forgotten”, which allows a person to actively moderate the process of collecting and storing data, to participate in determining the circle of those to whom they can be accessed, and delete personal data. The adoption of such a right not only allows the state to influence the collection and storage of data, regulating interactions through law-making activities, but also to realize the potential of an autonomous individual. The prospect of legislating the right to be forgotten has sparked debate in the academic and professional community about the destruction of the free marketplace of ideas and the imposition of political censor­ship on the Internet. The article deals with the philosophical, ethical and political founda­tions of the right to be forgotten. The article substantiates the conclusion that the right to be forgotten has a positive heuristic potential, but at the same time it has conceptual flaws, and is also not able to completely correct the current situation of data processing. However, the implementation of the right to be forgotten in the future can have a beneficial effect on the current situation in the field of collection and storage of personal data.
APA, Harvard, Vancouver, ISO, and other styles
12

Martin Ramirez, J., and Camilla Pagani. "Editorial: Towards a Better Understanding of Aggression and Other Related Concepts." Open Psychology Journal 8, no. 1 (January 30, 2015): 1–2. http://dx.doi.org/10.2174/1874350101508010001.

Full text
Abstract:
This special issue entitled “Towards a better understanding of aggression and other related concepts” is a product of the XXXVII CICA International Conference co-organized by two Polish universities: Kazimierz Wielki University of Bydgoszcz and the University of Zielona Góra. It took place from the 22 to the 25 June, 2014 and was attended by about 100 participants from 16 countries [1]. The aim of the Conference was to study the phenomena of aggression and conflict resolution using a comprehensive, integrated and interdisciplinary approach which takes into account both biological and psycho-socio-cultural factors. Several communications dealing with emotions, including anger and fear, and others with behaviors such as aggression, violence and terrorism, have been selected for this issue. A Southafrican practitioner, Tina Lindhard, specialized in transpersonal psychology, suggests that maybe it is time we start studying emotions including anger and fear from "the inside out" by including phenomenology as a method to throw more light on how we experience these states in or through our bodies. Furthermore, she presents the "Living Matrix" model, which owes its origin to Quantum Mechanics and Electronic Biology, as a new complementary way of understanding how the living organism functions [2]. The Italian scholar Dr. Pagani stresses the complexity of violence, presented as a macrosystem of networks and of agents linked and interacting at different interconnected levels. She points out to the difficulty of defining violence, referring it not only to the explorations of the connections between systems taken from different research fields, but also to the theoretical premises and to the aims of the research. She argues that this “holistic” approach could allow a deeper understanding of violence and could lead towards more innovative and effective solutions to the problem of violence itself [3]. Dr. Ramirez, who has dedicated several decades of his research to the analysis of the justification of aggression from a cross-cultural approach across four continents, evaluates the applicability of a specific test (CAMA) in a new cultural context, assessing the structural equivalence of the data obtained in two different German age cohorts with the data previously investigated across the other cultures. Some adaptations concerning the assessment and theoretical models of the justification of aggressive actions in the German cultural context are being discussed [4]. Two academic colleagues from the University of Zielona Góra, Dr. Farnicka & Dr. Grzegorzewska, focus on some more practical aspects of aggression research, if we may say that, leading towards its prevention or therapy in children and adolescents. These Polish psychologists identify and analyse the family determinants for undertaking the aggressor or victim role. The results of their study reveal a number of determinants for people involved in perpetration or victimization, such as the type of relationship with parents (secure or insecure pattern), personal experience of being in the victim or aggressor role, and the level of hostility [5]. Finally, the first president of the Society for Terrorism Research, Dr. LoCicero, recounts some concerns raised by American psychologists, both earlier, in the years following September 11, 2001 (9/11), and more recent changes in the US policy, leading towards the risk for the USA of becoming a police state. According to her paper, engaging in open discussion about the failings of the American policy, the sometimes legitimate grievances of terrorist groups, and the draw of violence as a solution, is likely to put sincere and innocent adults at risk of becoming targets of intensive surveillance and suspicion [6]. It is thus clear that the discussion on aggression and other related concepts is here carried out from various scientific perspectives, which include traditional experimental psychology with a special focus on the role of family relationships and cultural factors, social and political psychology with a special focus on the role of State policies, and other theoretical perspectives which try to integrate their psychological framework with contributions from western and eastern philosophy, the neurosciences, biology, quantum physics, and complexity theory.
APA, Harvard, Vancouver, ISO, and other styles
13

Black, Jennifer, Rachel Hulkower, Walter Suarez, Shreya Patel, and Brandon Elliott. "Public Health Surveillance: Electronic Reporting as a Point of Reference." Journal of Law, Medicine & Ethics 47, S2 (2019): 19–22. http://dx.doi.org/10.1177/1073110519857309.

Full text
Abstract:
Federal, state, and local laws shape the use of health information for public health purposes, such as the mandated collection of data through electronic disease reporting systems. Health professionals can leverage these data to better anticipate and plan for the needs of communities, which is seen in the use of electronic case reporting.
APA, Harvard, Vancouver, ISO, and other styles
14

Xu, Yiwei. "A Comprehensive Analysis of the Political Situation in Russia from the Perspectives of Thucydides, Max Weber, and Michel Foucault." BCP Social Sciences & Humanities 21 (February 15, 2023): 101–7. http://dx.doi.org/10.54691/bcpssh.v21i.3432.

Full text
Abstract:
With the current situation in Europe regarding Russia's invasion of Ukraine, the political situation of Russia has generated high interest. The research topic of this paper is the political situation of Russia. To understand the current political situation, the historical situation of the Russian Federation must be explored first. Both historical and modern situations were explored from the three key aspects of authority, motive, and surveillance. Max Weber's theory on authority and domination was used to analyze the historical authorities within Russia leading up to the 1905 Revolution as well as in the 1917 Civil war and eventually the USSR. Thucydides' account of the Speech of the Athenians was used to explore the true motive behind Russia's various advancements in Europe. Lastly, surveillance throughout Russia's lengthy history was studied with references to Michel Foucault's theory of disciplinary power. The study found that throughout the history of the Russian Empire, ambition has been the main motivator behind its numerous advancements. Mass and extreme surveillance has also been a persistent trend in the nation as well as during the USSR. This may indicate that the modern political situation in Russia mirrors its past situations.
APA, Harvard, Vancouver, ISO, and other styles
15

Cruickshank, Justin. "The Expansion of Prevent: On The Politics of Legibility, Opacity And Decolonial Critique." New Formations 100, no. 100 (June 1, 2020): 43–59. http://dx.doi.org/10.3898/newf:100-101.04.2020.

Full text
Abstract:
It is argued here that the liberal state has authoritarian aspects that are irreducible to the authoritarian aspects of neoliberalism. The argument draws on James Scott's work on modern state ruling through bureaucratic 'legibility', and the decolonial work of S. Sayyid on how a form of political Islam he calls 'Islamism' challenges the west's construction of modernity as an intrinsically western project. The state's need for legibility undermines democracy by seeking to shape political debate and political activity to fit its bureaucratic channels for engagement, and Islamophobia caused by the UK state's reaction to Islamism, shapes how the UK state seeks control via legibility. Prevent expanded in 2011 from focusing on 'violent extremism' to 'extremism', with extremism defined in terms of normative commitments the state takes to be in tension with its conception of 'British values'. The state defined the Muslim population as opaque because they were taken to not be socially integrated. This was used to justify a repressive ubiquitous surveillance based on what is termed here a 'legibility of symptoms'. This was presented, after 2015, as paternalistic 'safeguarding', when workers in public sector bureaucracies became legally obligated to carry out Prevent surveillance. Left-wing and environmental organisations engaged in extra-parliamentary protest are now as defined as potentially extremist. With the expansion of Prevent in 2011, the state created a 'pre-crime' space in civil society that is taken to justify repressive surveillance, presented as paternalistic safeguarding to save individuals 'at risk' of 'radicalisation' from going on to commit criminal acts.
APA, Harvard, Vancouver, ISO, and other styles
16

Morgan, Benjamin. "Planet." Victorian Literature and Culture 51, no. 3 (2023): 483–86. http://dx.doi.org/10.1017/s1060150323000591.

Full text
Abstract:
This essay argues that “planet” has recently become an important concept for scholars of nineteenth-century literature and culture. Whereas concepts such as the “globe” or the “world” portray the Earth as a space subject to surveillance and political power, the concept of the planet emphasizes the alien, nonanthropocentric aspects of the Earth and its history.
APA, Harvard, Vancouver, ISO, and other styles
17

Fonio, Chiara, and Stefano Agnoletto. "Surveillance, Repression and the Welfare State: Aspects of Continuity and Discontinuity in post-Fascist Italy." Surveillance & Society 11, no. 1/2 (May 27, 2013): 74–86. http://dx.doi.org/10.24908/ss.v11i1/2.4449.

Full text
Abstract:
This paper seeks to explore political, cultural, legal and socio-economic legacies of the Fascist regime (1922-1943) in Italy. With the fall of the regime, in fact, the overall surveillance apparatus did not fade away. Former fascists were not purged from political and cultural life and very few were found guilty. The transition to democracy was thus marked by a substantial continuity of men and institutions (Della Porta and Reiter 2004) due to the active involvement of ex-OVRA (Organization of Vigilance and Repression of Anti-Fascism) officers in public institutions (Author 2011). It comes as no surprise that forms of pervasive non-technological social control continued for more than twenty years after the fall of the duce. Moreover, police state surveillance was combined with a meaningful continuity in other areas. For instance, the welfare state immediately after World War II was actually based upon the model built during Fascism. The “Fascist Social State” (Silei, 2000) had a corporative and authoritarian inspiration and was a strategy of social control and a tool to create consensus. In the 1950s and 1960s the institutional features of the Italian social security system remained fundamentally unchanged (Giorgi, 2009; Silei, 2000): an excess of bureaucracy and discretionary power; a system based on specific categories of people needing assistance and not on a more universal approach. The Italian post-fascist experience is a paradigmatic case-study that allows us to deal with ambiguities of the welfare state experience, described either as a tool of social control or as a vector of social justice. This paper is an attempt to analyze “social control strategies” in post-Fascist Italy with a focus both on aspects of continuity and on crucial socio-political discontinuities that are often overlooked in the literature.
APA, Harvard, Vancouver, ISO, and other styles
18

Łyżwa, Aneta. "Electronic supervision as a form of imprisonment." Probacja 3 (September 30, 2022): 103–30. http://dx.doi.org/10.5604/01.3001.0015.9669.

Full text
Abstract:
The article deals with electronic surveillance as one of the forms of imprisonment. The author's intention was to present this institution as serving the realization of statutory goals of imprisonment. In this way, the hypothesis that this supervision is an important element of the contemporary penitentiary policy of our country has been proved. In addition, the aim of the presented study was to present the social aspects of the use of electronic surveillance, including the benefits that the prisoner achieves. The author has described the institution in question and the principles of its functioning. She also formulated a de lege ferenda postulate to limit the possibility of using the supervision in question by convicts serving their sentences in penitentiary institutions. She presented selected results of surveys conducted twice by the Justice Institute and an audit conducted by the Supreme Chamber of Control in 2013 to assess the functioning of electronic supervision. She referred to the opinions of some representatives of doctrine in the aspect of evaluation of the supervision in question, including as a tool of the state's re-socialisation policy. She also formulated a number of conclusions and her own assessments.
APA, Harvard, Vancouver, ISO, and other styles
19

Erokhina, O. V. "Prospects of Electronic Voting in Russia: Technological and Political Aspects." Humanities and Social Sciences. Bulletin of the Financial University 11, no. 3 (August 20, 2021): 55–61. http://dx.doi.org/10.26794/2226-7867-2021-11-3-55-61.

Full text
Abstract:
The main areas of application of digital technologies in the Russian political process are related to the conduct of electronic voting and the use of Internet services for the development of new forms of political participation both at the national level and in the feld of local self-government The growth in the number of Internet users, which has become a steady trend over the past 20 years, creates new conditions for interaction between government structures and society They include both unknown risks of destabilization associated with increased demands on state institutions and reduced confdence in the government, as well as new opportunities for interaction between the state and the public in socially signifcant areas of public administration The implementation in practice of the course outlined by the Digital Economy program and designed to ensure Russia’s competitive advantages, taking into account the global trends of the expectation or the onset (according to various estimates) of the fourth industrial revolution, creates a new context for the development of political processes In these conditions, the author considered electronic voting technologies an integral part of the development of the modern state, and this view is typical, including for a signifcant part of the political elites.
APA, Harvard, Vancouver, ISO, and other styles
20

Jarynowski, A., M. Romanowska, S. Maksymowicz, and V. Belik. "ONE HEALTH MULTIMODAL SURVEILLANCE IN TIME OF CHANGE: LESSONS NOT LEARNT FROM CASE STUDY OF A/H5N1 SPILLOVER TO MAMMALS IN GDAŃSK METROPOLITAN AREA." One Health Journal 2, no. III (July 1, 2024): 45–61. http://dx.doi.org/10.31073/onehealthjournal2024-iii-06.

Full text
Abstract:
This case study of A/H5N1 spillover to mammals in the Gdańsk area underlines the complexities of managing emerging One Health threats in significant political and economic aspects. We compared the relatively successful rapid regional response with the utterly lost battle in communication and cooperation, emphasising the need for improved interdisciplinary regional and international cooperation and robust surveillance systems in an era of anthropogenic and natural change.
APA, Harvard, Vancouver, ISO, and other styles
21

Wilson, Dean Jonathon, and Tanya Serisier. "Video Activism and the ambiguities of counter-surveillance." Surveillance & Society 8, no. 2 (December 18, 2010): 166–80. http://dx.doi.org/10.24908/ss.v8i2.3484.

Full text
Abstract:
This paper examines the use of visual technologies by political activists in protest situations to monitor police conduct. Using interview data with Australian video activists this paper seeks to understand the motivations, techniques and outcomes of video activism, and its relationship to counter-surveillance and police accountability. Our data also indicated that there have been significant transformations in the organization and deployment of counter-surveillance methods since 2000, when there were large-scale protests against the World Economic Forum meeting in Melbourne accompanied by a coordinated campaign that sought to document police misconduct. The paper identifies and examines two inter-related aspects of this; the act of filming and the process of dissemination of this footage. It is noted that technological changes in the last decade have led to a proliferation of visual recording technologies, particularly mobile phone cameras, which have stimulated a corresponding proliferation of images. Analogous innovations in internet communications have stimulated a coterminous proliferation of potential outlets for images.. Video footage provides activists with valuable tools for safety and publicity. Nevertheless, we argue, video activism can have unintended consequences, including exposure to legal risks and the amplification of official surveillance. Activists are also often unable to control the political effects of their footage or the purposes to which it is used. We conclude by assessing the impact that transformations in both protest organization and media technologies might have for counter-surveillance techniques based on visual surveillance.
APA, Harvard, Vancouver, ISO, and other styles
22

Bennett, Colin J. "In Defense of Privacy: The Concept and the Regime." Surveillance & Society 8, no. 4 (March 24, 2011): 485–96. http://dx.doi.org/10.24908/ss.v8i4.4184.

Full text
Abstract:
It has recently become fashionable within the surveillance studies community to subject the concept and regime of “privacy protection” to some very rigorous criticism. “Privacy” and all that it entails is argued to be too narrow, too based on liberal assumptions of subjectivity, too implicated in rights-based theory and discourse, insufficiently sensitive to the social sorting and discriminatory aspects of surveillance, and overly embroiled in spatial metaphors about “invasion” and “intrusion.” As a concept, and as a way to frame the various social and political challenges encountered within “surveillance societies,” it is inadequate. These critiques are important, and to some extent, have set scholarly inquiry on a new, exciting and broader, trajectory than that offered by privacy scholars. On closer examination, however, these critiques are often based on some faulty assumptions about the contemporary framing of the privacy issue, and about the governance of the issue. Privacy, as a concept, regime, a set of policy instruments, and as a way to frame civil society activism, shows an extraordinary resilience. Surveillance scholars must learn to live with it.
APA, Harvard, Vancouver, ISO, and other styles
23

Badra, Rebecca, Alaa Hamdallah, Nour Abu Elizz, Majid Hawawsheh, Heba Mahrous, Amgad Abdalla Elkholy, Abdinasir Abubakar, Mohammad Alhawarat, Lora Alsawalha, and Ghazi Kayali. "Testing the Functionality of Joint Zoonotic Disease Electronic Surveillance and Reporting Systems through a Pandemic Influenza Full-Scale Simulation Exercise in Jordan." Zoonotic Diseases 4, no. 1 (February 29, 2024): 86–96. http://dx.doi.org/10.3390/zoonoticdis4010009.

Full text
Abstract:
Zoonotic disease surveillance and response simulation exercises are an important tool to assess national infrastructures and mechanisms supporting joint zoonotic disease surveillance and information sharing across sectors. In December 2022, the Jordanian Ministries of Health and Agriculture, supported by the World Health Organization Country Office, conducted a 10-day full-scale simulation exercise in Amman, Jordan, to evaluate the linkage between their electronic surveillance and response systems. An exercise management team designed a realistic fictitious scenario of an outbreak of avian influenza on a poultry farm that subsequently led to human infections. The functions and actions tested included all aspects of outbreak management, from initial reporting to conclusion. Debriefings and an after-action review were conducted after the activities were completed. Gaps in both ministries’ surveillance systems, epidemiological investigations, biosafety and biosecurity, sample collection, sample transport, laboratories, interventions, and coordination were identified. This simulation exercise was a unique exercise focusing on multiple technical and operational capacities that related to the joint response to potential zoonotic disease outbreaks and real-time information sharing between the sectors under the One Health approach. This exercise is a step towards the operationalization of the One Health approach in Jordan, building on the coordination mechanisms already in place.
APA, Harvard, Vancouver, ISO, and other styles
24

Wood, Ann Marie. "Omniscient organizations and bodily observations: electronic surveillance in the workplace." International Journal of Sociology and Social Policy 18, no. 5/6 (June 1998): 136–74. http://dx.doi.org/10.1108/01443339810788407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Murakami Wood, David, and C. William R. Webster. "Living in Surveillance Societies: The Normalisation of Surveillance in Europe and the Threat of Britain’s Bad Example." Journal of Contemporary European Research 5, no. 2 (August 19, 2009): 259–73. http://dx.doi.org/10.30950/jcer.v5i2.159.

Full text
Abstract:
This article argues that surveillance is becoming increasingly normalised across Europe and that this is altering the landscape of liberty and security. It identifies this normalisation as a product of the globalisation of surveillance, the domestication of security, the desire of the European Union (EU) to create a distinct leading role in security, and the influence of the 'bad example' of the United Kingdom (UK). The article uses the two very different examples of video-surveillance and electronic public services in the UK to make this case and to argue for both stronger resistance to calls to make human rights more flexible in a risk and security-driven age and more detailed research into the differences between emerging surveillance societies in Europe.
APA, Harvard, Vancouver, ISO, and other styles
26

Dias, João Carlos P. "Ecological aspects of the vectorial control of Chagas' disease in Brazil." Cadernos de Saúde Pública 10, suppl 2 (July 26, 1994): S352—S358. http://dx.doi.org/10.1590/s0102-311x1994000800013.

Full text
Abstract:
The feasibility and most important ecological aspects of vectorial Chagas' disease control are discussed. The spread and maintenance of this disease involve multiple ecological and sociopolitical factors that must be taken into account when control programs are planned, executed and evaluated. In spite of its complexity, Chagas disease can be controlled using methods that target specific mechanisms of transmission, the most important being vectorial and transfusional. Major ecological problems in Chagas' disease control do not exist, even in the case of the chemical control of triatomine vectors. The main challenges for the Brazilian Control Program at this moment are: its maintenance as a political priority; the threat of peridomestic vectors; and the consolidation of permanent horizontal and participative epidemiological surveillance systems against the vector.
APA, Harvard, Vancouver, ISO, and other styles
27

Lao, Weilun, Jungong Han, and Peter H. N. de With. "Flexible Human Behavior Analysis Framework for Video Surveillance Applications." International Journal of Digital Multimedia Broadcasting 2010 (2010): 1–9. http://dx.doi.org/10.1155/2010/920121.

Full text
Abstract:
We study a flexible framework for semantic analysis of human motion from surveillance video. Successful trajectory estimation and human-body modeling facilitate the semantic analysis of human activities in video sequences. Although human motion is widely investigated, we have extended such research in three aspects. By adding a second camera, not only more reliable behavior analysis is possible, but it also enables to map the ongoing scene events onto a 3D setting to facilitate further semantic analysis. The second contribution is the introduction of a 3D reconstruction scheme for scene understanding. Thirdly, we perform a fast scheme to detect different body parts and generate a fitting skeleton model, without using the explicit assumption of upright body posture. The extension of multiple-view fusion improves the event-based semantic analysis by 15%–30%. Our proposed framework proves its effectiveness as it achieves a near real-time performance (13–15 frames/second and 6–8 frames/second) for monocular and two-view video sequences.
APA, Harvard, Vancouver, ISO, and other styles
28

Ogasawara, Midori. "Mainstreaming Colonial Experiences in Surveillance Studies." Surveillance & Society 17, no. 5 (December 10, 2019): 726–29. http://dx.doi.org/10.24908/ss.v17i5.13521.

Full text
Abstract:
Decolonizing surveillance studies is an urgent task, needed to comprehend the unequal impacts of surveillance technologies in the past, present, and future. I discuss three aspects of research in comparison: technological novelty versus past experience, nation building versus colonization, and test versus initial operation of technology. Overall, I argue for the significance of colonial narratives that illustrate the early and severe, often violent experiences of surveillance that tend to be historically underestimated or politically concealed. First, scholarly work has been attracted to technological novelties of digital surveillance. But to grasp the social implications of surveillance, the historical background of technology offers a genealogical thread, and the past awaits as a rich repository to be discovered. Second, previous studies have drawn plural origins of modern surveillance from Western civilization. But modern nation building and colonialism should be examined together in research, rather than separating them and placing nation building as central to modernization while placing colonialism as a side effect or exception of modernization. Such a separation fails to grasp the experiences of modern surveillance as a whole because nation-state is all too often colonial nation-state. Lastly, I question the prevailing concept of a “boomerang effect,” meaning that Western countries first test out harmful techniques on colonies, but soon these techniques come home. This boomerang effect view centers on the West. A “test” of surveillance technology targeted a group of people for its own purpose, and the systematic practice of surveillance left irreversible effects in colonies. Those effects immensely contributed to today’s foundation of global political economy as an ongoing process of technological dominance of the Global North over the South. To decolonize surveillance studies, it would be better to discuss the global experiences of surveillance in the frame of unequal distribution and outcome of technology.
APA, Harvard, Vancouver, ISO, and other styles
29

Regan, Priscilla M., and Fred W. Weingarten. "The National Communications System and Federal Electronic Surveillance Policy." Science, Technology, & Human Values 11, no. 4 (October 1986): 17–30. http://dx.doi.org/10.1177/016224398601100403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Kivotidis, Dimitrios. "Break or Continuity? Friedrich Engels and the Critique of Digital Surveillance." tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 19, no. 1 (November 27, 2020): 97–112. http://dx.doi.org/10.31269/triplec.v19i1.1213.

Full text
Abstract:
This paper is a contribution to the argument that Engels’s work remains topical and may provide us with the analytical tools necessary to approach contemporary manifestations of capitalist contradictions. Based on Engels’s work on political economy (with emphasis on his contribution to the labour theory of value and the articulation of the law on the tendency of the rate of profit to fall) it will critically review the concept of “surveillance capitalism” as developed by Shoshana Zuboff, in order to explain central aspects of the process of digital surveillance. In particular, it will criticise the view expressed by Zuboff that surveillance capitalism constitutes a break with capitalism’s past and can be tamed through an enhancement of democratic accountability and regulation. Marxist contributions to the critique of digital surveillance have already approached this phenomenon in a many-sided manner. This paper builds upon these contributions and suggests that the exponential growth of digital platforms can be explained as a direct result of the development of capitalist contradictions, especially the contradiction between productive forces and relations of production as expressed in the law of the falling rate of profit.
APA, Harvard, Vancouver, ISO, and other styles
31

McGowan, Angela, Michael Schooley, Helen Narvasa, Jocelyn Rankin, and Daniel M. Sosin. "Symposium on Public Health Law Surveillance: The Nexus of Information Technology and Public Health Law." Journal of Law, Medicine & Ethics 31, S4 (2003): 41–42. http://dx.doi.org/10.1111/j.1748-720x.2003.tb00744.x.

Full text
Abstract:
The Centers for Disease Control and Prevention’s (CDC) goal is to develop a surveillance system of public health laws that would both support research and analysis among policymakers and legislators, and support the scientific basis for public health law. This session was convened, in part, to discuss the value of creating an electronic system to track public health legal information. Public health surveillance is the “ongoing, systematic collection, analysis, interpretation, and dissemination of data regarding a health-related event for use in public health action to reduce morbidity and mortality and to improve health. Data disseminated by a public health surveillance system can be used for immediate public health action, program planning and evaluation, and formulating research hypotheses.” There is currently no system available that meets the goals of this definition of “surveillance” for public health laws.
APA, Harvard, Vancouver, ISO, and other styles
32

Brock, Brian. "Seeing through the Data Shadow: Communing with the Saints in a Surveillance Society." Surveillance & Society 16, no. 4 (December 15, 2018): 533–45. http://dx.doi.org/10.24908/ss.v16i4.8085.

Full text
Abstract:
The political theologian Amy Laura Hall has recently suggested that the proliferation of security cameras can be read as an index displaying the quality of a given community’s social fabric. The aim of the paper is to show why this is a plausible reading of the Christian tradition that also helpfully illuminates the various cultural phenomena in western societies that are collectively indicated by the label “surveillance.” The Swedish theologian Ola Sigurdson’s account of modern regimes of perception substantiates this latter claim. An alternative political proposal is then developed around an account of the divine gaze that differs from the panoptic gaze of modernity. This theological positioning of the trusting gaze as ontologically fundamental for human community is paired with an acceptance of the limits of human sight and the multivalence of human knowing. The paper concludes by highlighting the importance of the gaze of the saints in training Christian vision to see beyond the characteristic ways of seeing and participating in the social organism characteristic of modern liberal surveillance societies. This conclusion implies, further, that one of the most important ways that the most denuding aspects of the surveillance society can be resisted is by drawing the gatekeepers who do the watching out in to public converse.
APA, Harvard, Vancouver, ISO, and other styles
33

Gane, Nicholas. "The Governmentalities of Neoliberalism: Panopticism, Post-Panopticism and beyond." Sociological Review 60, no. 4 (November 2012): 611–34. http://dx.doi.org/10.1111/j.1467-954x.2012.02126.x.

Full text
Abstract:
This paper draws on the writings of Michel Foucault, in particular his lectures on biopolitics at the Collège de France from 1978–79, to examine liberalism and neoliberalism as governmental forms that operate through different models of surveillance. First, this paper re-reads Foucault's Discipline and Punish in the light of his analysis of the art of liberal government that is advanced through the course of these lectures. It is argued that the Panopticon is not just an architecture of power centred on discipline and normalization, as is commonly understood, but a normative model of the relation of the state to the market which, for Foucault, is ‘the very formula of liberal government’. Second, the limits of panopticism, and by extension liberal governance, are explored through analysis of Gilles Deleuze's account of the shift from disciplinary to ‘control’ societies, and Zygmunt Bauman's writings on individualization and the ‘Synopticon’. In response to Deleuze and Bauman, the final section of this paper returns to Foucault's lectures on biopolitics to argue that contemporary capitalist society is characterized not simply by the decline of state powers (the control society) or the passing down of responsibilities from the state to the individual (the individualization thesis), but by the neoliberal marketization of the state and its institutions; a development which is underpinned by a specific form of governmentality. In conclusion, a four-fold typology of surveillance is advanced: surveillance as discipline, as control, as interactivity, and as a mechanism for promoting competition. It is argued that while these types of surveillance are not mutually exclusive, they are underpinned by different governmentalities that can be used to address different aspects of the relationship between the state and the market, and with this the social and cultural logics of contemporary forms of market capitalism more broadly.
APA, Harvard, Vancouver, ISO, and other styles
34

Husain, Wahyuni, Muhammad Ashabul, and Intan Soliha Ibrahim. "Absensi Elektronik dan Keterasingan Akademik di Perguruan Tinggi." Ganaya : Jurnal Ilmu Sosial dan Humaniora 7, no. 3 (June 11, 2024): 50–62. http://dx.doi.org/10.37329/ganaya.v7i3.3314.

Full text
Abstract:
This study aims to analyze the implementation of electronic attendance through fingerprinting as a disciplinary instrument for lecturers at IAIN Palopo. This research employs Michael Foucault's theory of power to reveal the model of power relations manifested through the fingerprint mechanism and its impact on lecturers. The methods used in this study include observation, interviews with lecturers, and document analysis. The findings indicate that every lecturer at IAIN Palopo is required to use fingerprint attendance every working day, even if they do not have a teaching schedule every day. This system creates two main mechanisms of power relations. First, hierarchical surveillance is conducted through attendance machines, CCTV, leadership, and the Monthly Lecturer Performance Sheets. Second, the mechanism of performance allowances is paid based on the monthly attendance recap. Surveillance through fingerprinting and CCTV allows the management to strictly monitor lecturers' attendance, ensuring discipline in terms of presence. However, although this system effectively increases attendance, some negative impacts have been identified. Lecturers become more focused on their physical presence rather than on other important tasks such as research and community service. This indicates that the power relations enforced through electronic attendance successfully create discipline in attendance but do not address other aspects of lecturers' duties. Thus, the implementation of electronic attendance through fingerprinting at IAIN Palopo reflects a complex form of power, where discipline is achieved through strict surveillance and financial incentives, but other important elements of academic performance are neglected. This study provides important insights into how technology can be used to regulate behavior in educational settings and the implications of such technology on various aspects of lecturers' performance.
APA, Harvard, Vancouver, ISO, and other styles
35

Sharma, Himani, and Navdeep Kanwal. "Smart surveillance using IoT: a review." Radioelectronic and Computer Systems 2024, no. 1 (February 28, 2024): 116–26. http://dx.doi.org/10.32620/reks.2024.1.10.

Full text
Abstract:
In today’s modern society, video surveillance is a growing trend and it can revolutionize many aspects of technology, especially in future smart cities that will transform traditional surveillance systems into intelligent and interconnected networks. It may be difficult for even well-trained employees to process and respond immediately to monitored data. Moreover, IoT-enabled surveillance systems overcome the challenges and flaws of conventional passive monitoring techniques by offering real-time surveillance and automated notifications for suspicious activity, intrusions, or anomalies. Therefore, the objective of this article is to provide an Internet of Things (IoT)-based smart surveillance system that may successfully connect the ecosystem, resulting in enhanced monitoring for smart city services. The primary goal of this study is to provide a comprehensive review of several IoT-based surveillance techniques used in various smart city applications. The categorization of tasks for each section is as follows: to present the historical context overview; to examine the significance of IoT and its application in smart cities; to present a standardized architecture for IoT-based smart city surveillance; to highlight an authoritative and thorough review of current IoT-based smart surveillance systems; and to identify various research issues. The methods used are: statistical graph or chart approach, schematic, and timeline diagram. Conclusions. This article outlines numerous research challenges for future video surveillance that may be addressed by researchers. In summary, this comprehensive review provides a valuable and streamlined resource for future researchers exploring smart city surveillance through the IoT.
APA, Harvard, Vancouver, ISO, and other styles
36

Almutairi, Sattam Eid. "The Islamic and Western Cultures and Values of Privacy." Muslim World Journal of Human Rights 16, no. 1 (October 25, 2019): 51–80. http://dx.doi.org/10.1515/mwjhr-2019-0004.

Full text
Abstract:
AbstractThe paper provides valuable accounts of the general concepts underlying privacy law in both cultures, and great detail about the impact of criminal procedure and evidence rules on privacy in reality rather than legal theory. It is, in this sense, a “realist” approach to privacy, particularly but not exclusively in relation to sexual activity. The distinction which the article draws between the frameworks within which privacy is conceived broadly, self-determination and limited government in the USA, protection of one’s persona in Europe, and reputation in Islamic law. However, the paper argues that Western and Islamic traditions share many of the same concepts about the tests to be applied when deciding how far an intrusion on privacy is justified and value many of the same interests in doing so. At the same time, it will highlight those areas where they differ which are not ones of crucial importance when deciding, for example, what are the proper limits on mass surveillance. Indirectly, this shows that even though there may be stark differences between the cultures on some points, there is enough agreement on some aspects of privacy to make comparisons in relation to issues such as mass surveillance.
APA, Harvard, Vancouver, ISO, and other styles
37

Yue, Liangwen, and Chunyou Wu. "Research on Disease Monitoring Information System in University Hospitals." World Journal of Innovation and Modern Technology 7, no. 3 (June 28, 2024): 34–56. http://dx.doi.org/10.53469/wjimt.2024.07(03).06.

Full text
Abstract:
Developing effective and efficient surveillance and response systems is important for national, regional and global health security. Furthermore, functioning surveillance systems are necessary for the success of global health initiatives. Objectives: To upgrade health information system in al-azhar university hospitals and maximizing its role in diseases surveillance and utilization of collected data through assessment of the multidimensional aspects of health information system and reinforcing its role in support of diseases surveillance. Subjects and methods: A cross-sectional study was conducted in elhussien and bab-elshearia university hospitals selected randomly from al-azhar university hospitals in cairo. The sample included 56 non-medical personnel which were responsible for diseases surveillance and 360 doctors & nurses selected by stratified random sample from selected departments which are related to notifiable diseases. Results: The results of the present study showed weak functionality levels of data analysis, dissemination of information, feedback and presentation of information. The overall levels of utilization of information, supervision and training in disease surveillance are also weak. All departments send paper forms to the higher levels and don’t use electronic information system in disease surveillance. The majority of the studied doctors and nurses notified the health authorities on notifiable diseases but only about have of them follow the guidelines and ever saw a disease notification form. Recommendations: The study highlighted the need to assign adequate human resources for disease surveillance units within departments and should be equipped with basic information & communication technology equipment. Continuous training for the medical and non-medical staff should be given regularly in a planned manner.
APA, Harvard, Vancouver, ISO, and other styles
38

Maurer, Kathrin. "Visual power: The scopic regime of military drone operations." Media, War & Conflict 10, no. 2 (April 7, 2016): 141–51. http://dx.doi.org/10.1177/1750635216636137.

Full text
Abstract:
This article analyzes how visual scopic regimes of military drones configure violence as a form of man hunting. For the French philosopher Grégoire Chamayou, man hunting embodies a type of cynegetic (hunting related) violence, which military drones can execute by power surveillance. Research often focuses on the political, legal, anthropological, and ethical aspects of this type of violence; the aspects of its visual framing are often underexposed. In order to change this shortcoming, this article draws attention to the medial aspects of this violence by investigating the drone’s scopic regime. The scopic regime refers to the drone’s visual configuration, i.e. its ocular operations of capture, its optical perspective on the target, the visual sensing of the drone pilot, as well as the target’s range of vision. Three scopic dimensions of military drones, namely hypervisibility, visual immersion, and invisibility are investigated. In doing so, this article explores how drones stage, interpret, convey, mediate, and execute violence as man hunting. Excursions to the works of contemporary visual artists are conducted in order to illustrate aesthetic interventions against the drone’s visual superpower.
APA, Harvard, Vancouver, ISO, and other styles
39

Hernández-Santaolalla, Víctor, and Alberto Hermida. "Malicious Social Surveillance and Negative Implications in Romantic Relationships among Undergraduates." Surveillance & Society 18, no. 3 (August 19, 2020): 387–99. http://dx.doi.org/10.24908/ss.v18i3.13149.

Full text
Abstract:
In the process of normalizing some surveillance dynamics in a society that has become increasingly more accustomed to infringements of privacy, citizens have been provided with a series of tools that allow them to control their peers. Thus, this paper relates interpersonal electronic surveillance to the negative implications that social networks may have for romantic relationships in the Spanish university context by analyzing three main aspects of interpersonal electronic surveillance: user perception and awareness, the types of pernicious social networking practices involved, and their consequences for romantic relationships. To achieve these objectives, a mixed methodology was used. Specifically, an in-person survey involving 311 respondents and two focus groups of seven and eight members, respectively, were conducted. All of the participants were undergraduate communication students between the ages of eighteen and twenty-six. Findings from the current study show that the respondents believed that social networks incited jealousy and promoted control and surveillance practices, thus making romantic relationships more conflictive and artificial. However, they tended to blame individual uses more than the inner workings of social networks. For instance, some respondents regretted having resorted to certain practices, while others justified those practices because they had allowed for the detection of infidelity-related behaviors. In short, in a context in which social surveillance is now the norm, the monitoring and control of partner profiles was generally accepted even though the respondents called for more education about social networking in order to curtail these pernicious practices and to maintain healthier romantic relationships.
APA, Harvard, Vancouver, ISO, and other styles
40

Serova, Ekaterina. "Military aspects of cooperation between Finland and the USA: challenges for Russia." Scientific and Analytical Herald of IE RAS 35, no. 5 (October 31, 2023): 30–41. http://dx.doi.org/10.15211/vestnikieran520233041.

Full text
Abstract:
The article analyses military and political factors of cooperation between Finland and the United States since 1990s up to the present. The author attempts to show the role Finnish defence forces in the US military reinforcement plans in the Northern European Theater of Operations. The author focuses on the American security interests in Finnish territories, as well as expert views on the US priority in Finland’s foreign policy, including the latest public opinion polls. The aim of US military reinforcement in Finland is twofold. First, to pose a threat to Russia. Second, to help the US military improve surveillance, intelligence and analysis capabilities in real time in north-west Europe and the North Atlantic. Within the context of challenges to Russia’s security, the major institutional arrangements, military trends and consequences of cooperation are discussed. Finally, scenarios for the development of Finnish-US relations within NATO are proposed.
APA, Harvard, Vancouver, ISO, and other styles
41

Solovov, A. V., and A. A. Menshikova. "Сoronavirus Zigzags of Electronic Distance Learning." Vysshee Obrazovanie v Rossii = Higher Education in Russia 30, no. 6 (July 8, 2021): 60–69. http://dx.doi.org/10.31992/0869-3617-2021-30-6-60-69.

Full text
Abstract:
The coronavirus pandemic in 2020, which has led to a massive and urgent transition to remote forms of learning, has drawn the attention of almost all of humanity to the issue of e-distance learning (EDL). The purpose of this article is to analyze the didactic aspects of the experience of using EDL methods and technological tools during a pandemic, to assess the potential positive and real negativity of this process, to develop recommendations on the rational use of modern virtual learning environments. The study is based on methods of systemic analysis, pedagogical psychology and didacticism, long-term experience of authors in the field of EDL.The analysis of two main didactic approaches in the modern EDL was carried out: classes in a virtual classroom, most of which copy traditional methods of classroom learning, and predominantly independent cognitive activities of students in learning management systems using specially trained digital educational resources. It has been shown that much of the negative aspects of EDL during the coronavirus pandemic are due to attempts to implement rudiments of the usual classroom learning system with the help of innovative electronic technologies.Recommendations have been made on the structure of the electronic distance course in modern learning management systems, which provide for the freedom to choose the time and place of study with them with the necessary regulation of the content and the learning process inherent in formal education institutions.A number of positive aspects of EDL related to its quality, ever-widening application boundaries, educational potential and economic feasibility have been considered. The importance of properly assessing possible negative aspects of EDL is shown. The reason for which is not in electronic tools, but in didacticly incorrect methods of training with them. To create new teaching methods focused on innovative electronic tools, we need research of psychological and didactic aspects of EDL in the areas of student motivation, digital educational resources development, gamification, teacher training, etc.
APA, Harvard, Vancouver, ISO, and other styles
42

Gaskins, Ben. "The Effects of Religious Attendance and Evangelical Identification on Media Perception and Political Knowledge." Politics and Religion 12, no. 02 (March 15, 2019): 346–84. http://dx.doi.org/10.1017/s1755048318000809.

Full text
Abstract:
AbstractScholars have shown that religious activity can prepare individuals for civic activity by endowing them with the skills and motivation to engage in politics. Others, however, assert that religious dogmatism may lead to disengagement with the secular world and politics more generally. These two perspectives have resulted in contradictory findings on a key aspect of civic ability: political knowledge. I argue that while religiosity may indeed increase individuals’ engagement in a wide array of political activities, including some aspects of political knowledge, religious commitment decreases the ability to acquire accurate information about certain types of political facts. This argument is tested with a number of national surveys, and I find that while religion has a mixed effect on knowledge of general political structures and actors, it increases the perception of media hostility, which leads to lower levels of political knowledge about policy-specific surveillance information.
APA, Harvard, Vancouver, ISO, and other styles
43

Jones, Rodney H. "Surveillant landscapes." Linguistic Landscape. An international journal 3, no. 2 (October 6, 2017): 149–86. http://dx.doi.org/10.1075/ll.3.2.03jon.

Full text
Abstract:
Abstract Most linguistic landscape research to date has focused on how people read and write language in the material world. Much less attention has been paid to the way linguistic landscapes sometimes read and write their inhabitants through technologies like CCTV cameras, intruder alarms, and other aspects of the built environment designed to make people ‘visible’ – what I call surveillant landscapes. This article puts forth a framework for analyzing the surveillant nature of linguistic landscapes based on tools from mediated discourse analysis. It sees surveillant landscapes in terms of the way they communicate practices of surveillance to the people who inhabit them (‘discourses in place’), the kinds of social relationships and social identities that they make possible (‘interaction orders’), and the ways architectures of surveillance come to be internalized by citizens, while at the same time aspects of their behaviors and identities come to be sedimented into their environments (‘historical bodies’). I argue that studies of linguistic landscapes should take more account of the agenitive nature of linguistic landscapes and their increasing ability to recognize and to entextualize what takes place within them, and the consequences of this both on situated social interactions and on broader political and economic realities.
APA, Harvard, Vancouver, ISO, and other styles
44

Cheng, Wei, Yong Li, Yi Jiang, and Xipeng Yin. "A Movement-Efficient Deployment Scheme Based on Information Coverage for Mobile Sensor Networks." Journal of Electrical and Computer Engineering 2015 (2015): 1–8. http://dx.doi.org/10.1155/2015/986956.

Full text
Abstract:
Covering the surveillance region is a key task for wireless sensor networks. For mobile sensors, the deployment of sensors at appropriate locations is the key issue for sufficient coverage of surveillance area, and efficient resource management of sensor network. Previous studies most utilize physical coverage model for developing deployment schemes, in that the sensor resources may be wasted during the deployment for coverage. In this paper, a novel movement-efficient deployment scheme for mobile sensor networks is proposed, which adapts the information coverage model and the classical potential field method. The performances of the proposed scheme are evaluated comparing to two other schemes in aspects of coverage rate, coverage hole rate, ideal moving distance, and actual moving distance through extensive simulations. Simulation results show that the proposed scheme performs better than these related schemes in both coverage and movement efficiency.
APA, Harvard, Vancouver, ISO, and other styles
45

Bloomfield, Brian. "In the Right Place at the Right Time: Electronic Tagging and Problems of Social Order/Disorder." Sociological Review 49, no. 2 (May 2001): 174–201. http://dx.doi.org/10.1111/1467-954x.00251.

Full text
Abstract:
This paper explores the relationship between technology and problems of social order/disorder in the context of discussions of surveillance and ‘virtuality'. The emphasis is on understanding the connections between technology and social relations in areas where issues of social order/disorder are a prominent feature of concern and where one can identify the emergence of new regimes of virtual control which are directed at solving the (supposed) deficits in order or the threats posed to it. Rather than constituting a ‘technical fix’ for the problems of social order/disorder, it is argued that forms of virtual control both presuppose a reconstruction of social order and at the same time aim to effect a suppression of disorder. Focusing in particular on various manifestations of electronic tagging – from prisoners to babies, from retail goods to works of art, from television programmes to Personal Identification Numbers – the paper argues that these share a problematic which interrelates technology, order/disorder, subjects/objects, time, and space. It thus seeks to generalize the concept of electronic tagging, to regard it as a practice rather than a specific set of artefacts. Moreover, in contrast to the negative, panoptic reading of tagging technologies, the paper considers the active public participation in systems of surveillance and thereby the more positive or productive exercises of power which they may be taken to constitute.
APA, Harvard, Vancouver, ISO, and other styles
46

McAdams, A. James. "Spying on Terrorists: Germany in Comparative Perspective." German Politics and Society 25, no. 3 (September 1, 2007): 70–88. http://dx.doi.org/10.3167/gps.2007.250304.

Full text
Abstract:
Intelligence and law enforcement agencies in western democracies are turning increasingly to electronic surveillance tools in their efforts to identify and combat new terrorist threats. But this does not mean that they are equally equipped to undertake these measures. As the author shows by comparing surveillance activities in three countries—Great Britain, the United States, and Germany—the Federal Republic's more restrictive legal norms and institutions provide its government with much less freedom of maneuver than its allies.
APA, Harvard, Vancouver, ISO, and other styles
47

Pötzsch, Holger. "Media Matter." tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 15, no. 1 (February 27, 2017): 148–70. http://dx.doi.org/10.31269/triplec.v15i1.819.

Full text
Abstract:
The present contribution maps materialist advances in media studies. Based on the assumption that matter and materiality constitute significant aspects of communication processes and practices, I introduce four fields of inquiry - technology, political economy, ecology, and the body - and argue that these perspectives enable a more comprehensive understanding of the implications of contemporary technologically afforded forms of interaction. The article shows how each perspective can balance apologetic and apocalyptic approaches to the impact of in particular digital technologies, before it demonstrates the applicability of an integrated framework with reference to the techno-politics of NSA surveillance and the counter-practices of WikiLeaks.
APA, Harvard, Vancouver, ISO, and other styles
48

Paul, Prantosh K., and K. S. Shivraj. "Electronic Security Systems in Academic and Industrial Knowledge Hub and Other Information Foundations." Asian Review of Social Sciences 5, no. 1 (May 5, 2016): 28–31. http://dx.doi.org/10.51983/arss-2016.5.1.2570.

Full text
Abstract:
Knowledge and information are most important aspects in today’s age. Knowledge Hub is actually a type of knowledge dealing foundation which are responsible for so many knowledge activities; but out of which information processing and management is treated as most important and valuable. Knowledge Hub is a kind of concept which includes so many knowledge foundations such as information centre, documentation centre, data centre, information networks and even conventional libraries. These centers are dedicated with so many equipments and machinery out of which security a system is most important. In a conventional information foundation security system plays an important role. Apart from manual security system so many electronic system are emerging rapidly. Such type electronic security system is responsible for the alarm notification, entry, charging and discharging, access control, video surveillance and so on.
APA, Harvard, Vancouver, ISO, and other styles
49

Ali, Imran, Yongming Li, and Witold Pedrycz. "Granular Computing Approach to Evaluate Spatio-Temporal Events in Intuitionistic Fuzzy Sets Data through Formal Concept Analysis." Axioms 12, no. 5 (April 22, 2023): 407. http://dx.doi.org/10.3390/axioms12050407.

Full text
Abstract:
Knowledge discovery through spatial and temporal aspects of data related to occurrences of events has many applications in digital forensics. Specifically, in electronic surveillance, it is helpful to construct a timeline to analyze information. The existing techniques only analyze the occurrence and co-occurrence of events; however, in general, there are three aspects of events: occurrences (and co-occurrences), nonoccurrences, and uncertainty of occurrences/non-occurrences with respect to spatial and temporal aspects of data. These three aspects of events have to be considered to better analyze periodicity and predict future events. This study focuses on the spatial and temporal aspects given in intuitionistic fuzzy (IF) datasets using the granular computing (GrC) paradigm; formal concept analysis (FCA) was used to understand the granularity of data. The originality of the proposed approach is to discover the periodicity of events data given in IF sets through FCA and the GrC paradigm that helps to predict future events. An experimental evaluation was also performed to understand the applicability of the proposed methodology.
APA, Harvard, Vancouver, ISO, and other styles
50

Samatas, Minas. "“Austerity Surveillance” in Greece under the Austerity Regime (2010−2014)." Media and Communication 3, no. 3 (October 20, 2015): 68–80. http://dx.doi.org/10.17645/mac.v3i3.301.

Full text
Abstract:
In this article we have tried to analyze “austerity surveillance” (AS), its features, and its functions under the extreme austerity regime in Greece during 2010−2014, before the election of the leftist government. AS<strong> </strong>is a specific kind of coercive neoliberal surveillance, which in the name of fighting tax evasion and corruption is targeting the middle and lower economic strata and not the rich upper classes. It is based mainly on “coveillance,” i.e. citizen-informers’ grassing, public naming, and shaming. Functioning as a domination and disciplinary control mechanism of the entire population, it works within a post-democratic setting without accountability or democratic control. We provide empirical evidence of these features and functions, including some indicative personal testimonies of austerity surveillance subjects. After presenting some cases of electronic surveillance as an indispensable supplement to AS, we then briefly underline the negative personal, and socio-political impact of this surveillance. In conclusion, a tentative assessment is made of AS’ efficiency in the Greek case, comparing it with other types of past and present authoritarian surveillance in Greece and in other current surveillance societies, considering also the prospects for its abolition or its reproduction by the new leftist government.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography