Journal articles on the topic 'Surveillance'

To see the other types of publications on this topic, follow the link: Surveillance.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Surveillance.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Stanley, Vanessa. "Surveillance, Surveillance, Surveillance." Culture and Cosmos 16, no. 1 and 2 (October 2012): 465–75. http://dx.doi.org/10.46472/cc.01216.0279.

Full text
Abstract:
This presentation is a compilation of my three video installations, Your Universe – Inner Dome, Star Dome and Clear Clear Clear Target Star (2009). The collection of video-work shows the hidden and usually unseen aspects of astronomical exploration collected while at the Siding Spring Observatory in New South Wales, Australia. Each video is filmed directly from the monitor screens in the operations room that imaged the inner dome, the sky/star dome and the targeted star while the universe was being surveyed. The videos engender multi-levels of surveillance to become a comment on our need for such surveillance, to take control over what we do not understand, what is intangible and that which is unreachable.
APA, Harvard, Vancouver, ISO, and other styles
2

Green, Nicola, and Nils Zurawski. "Surveillance and Ethnography: Researching Surveillance as Everyday Life." Surveillance & Society 13, no. 1 (January 7, 2015): 27–43. http://dx.doi.org/10.24908/ss.v13i1.5321.

Full text
Abstract:
This article argues for a wider and more nuanced understanding of ethnography’s role in Surveillance Studies than has sometimes historically been the case. The article begins by (briefly) deconstructing some of the ways that the concepts of both ‘surveillance’ and ‘ethnography’ have been deployed in empirical surveillance research over time, in order to set the scene for a critical interrogation of the variety of ethnographic approaches so far used within Surveillance Studies. The paper then goes on to review Surveillance Studies approaches broadly, and a range of qualitative and ethnographically-informed approaches in particular, within interdisciplinary empirical research related to surveillance relations. The ensuing discussion identifies several points where the existing empirical evidence base would benefit from more extensive ethnographic studies, at multiple sites and scales, that methodologically recognize surveillance as situated and meaningful everyday life processes and practices, rather than surveillant activities and relationships in settings defined as ‘surveillance’ in an a priori fashion. The article concludes by suggesting that approaches oriented towards empirically understanding surveillance practices as ‘everyday life’ have a significant future contribution to make, particularly with respect to building and developing our theoretical understandings of surveillant assemblages in everyday life contexts.
APA, Harvard, Vancouver, ISO, and other styles
3

Phadtare, Gauri, and Anushree Goud. "Electronic Surveillance." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 1623–25. http://dx.doi.org/10.31142/ijtsrd14335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Le Mer, Hadrien. "Prendre soin, reprendre en main, ou lâcher prise : trois manières de surveiller la nuit carcérale." Revue française de sociologie Vol. 64, no. 4 (July 26, 2024): 691–723. http://dx.doi.org/10.3917/rfs.644.0691.

Full text
Abstract:
L’un des enjeux principaux de la journée de travail du surveillant pénitentiaire consiste à déléguer le travail de réinsertion et de prise en charge de la vulnérabilité des personnes détenues à d’autres professionnels. La nuit, la prison se vide de ses différents intervenants et ce « sale boulot » s’impose aux seuls surveillants. Cette généralisation d’un « sale boulot » qui n’est plus délégable fait apparaitre une polarisation des attitudes de surveillance. La première, l’attitude statutaire, consiste à refuser le travail de réinsertion au profit d’une préservation de soi et de son sommeil. À l’opposé de ce désengagement professionnel, je distingue deux types de missionnariat. Le premier, le missionnariat sécuritaire, s’élabore contre l’idée d’une population pénale vulnérable et met en avant l’idée d’une dangerosité des personnes détenues qui profiteraient de la nuit pour s’épanouir dans l’illégalité. Le second, le missionnariat du soin, consiste à l’inverse à s’approprier le travail de réinsertion et de prise en charge de la vulnérabilité nocturne au profit d’un anoblissement moral de la mission professionnelle de surveillance. N’étant pas véritablement formés à la mission de réinsertion, les surveillants puisent dans des socialisations préalables pour parvenir à produire une réponse à la fragilité nocturne des personnes détenues et se situer préférentiellement dans l’une de ces trois attitudes. Je m’efforce d’analyser certaines des régularités observables entre passés sociaux des surveillants et attitudes de surveillance adoptées pendant la nuit.
APA, Harvard, Vancouver, ISO, and other styles
5

Topak, Özgün E. "The authoritarian surveillant assemblage: Authoritarian state surveillance in Turkey." Security Dialogue 50, no. 5 (June 26, 2019): 454–72. http://dx.doi.org/10.1177/0967010619850336.

Full text
Abstract:
This article examines Turkey’s authoritarian state surveillance regime by developing the concept of the authoritarian surveillant assemblage (ASA), building on and expanding the concept of the surveillant assemblage (SA). Turkey’s ASA is the outcome of diverse surveillance systems, which continuously expand their reach, form new connections and incorporate new actors. These systems include a protest and dissent surveillance system, an internet surveillance system, a synoptic media surveillance system and an informant–collaborator surveillance system. Turkey’s ASA is controlled by the Turkish state and serves its repressive interests. Although pivotal in emphasizing the complexity of surveillance connections and increasing diversification of and collaboration among surveillance actors, the SA model of surveillance puts the main emphasis on decentralized, uncoordinated and multifaceted forms of surveillance, and does not offer sufficient analytical space to understand how an authoritarian state could coordinate diverse surveillance systems and use it for the overarching purpose of control. The article draws on Michael Mann’s theory of state power and the authoritarian state to address these limitations of the SA and conceptualize the ASA. It shows how the diverse systems of Turkey’s ASA work in concert with one another under the hierarchical command of Erdoğan’s Justice and Development Party (AKP) to control the population and suppress dissent.
APA, Harvard, Vancouver, ISO, and other styles
6

Macnish, Kevin. "Just Surveillance? Towards a Normative Theory of Surveillance." Surveillance & Society 12, no. 1 (March 1, 2014): 142–53. http://dx.doi.org/10.24908/ss.v12i1.4515.

Full text
Abstract:
Despite recent growth in surveillance capabilities there has been little discussion regarding the ethics of surveillance. Much of the research that has been carried out has tended to lack a coherent structure or fails to address key concerns. I argue that the just war tradition should be used as an ethical framework which is applicable to surveillance, providing the questions which should be asked of any surveillance operation. In this manner, when considering whether to employ surveillance, one should take into account the reason for the surveillance, the authority of the surveillant, whether or not there has been a declaration of intent, whether surveillance is an act of last resort, what is the likelihood of success of the operation and whether surveillance is a proportionate response. Once underway, the methods of surveillance should be proportionate to the occasion and seek to target appropriate people while limiting surveillance of those deemed inappropriate. By drawing on the just war tradition, ethical questions regarding surveillance can draw on a long and considered discourse while gaining a framework which, I argue, raises all the key concerns and misses none.
APA, Harvard, Vancouver, ISO, and other styles
7

Ligairi, Josua, Donald Wilson, and Isimeli Tukana. "Existing NCD Monitoring and Surveillance Systems and its adaptability to Fiji’s context: A Systematic Review." Pacific Health Dialog 21, no. 7 (June 22, 2021): 440–48. http://dx.doi.org/10.26635/phd.2021.101.

Full text
Abstract:
Introduction: The United Nations high-level meeting of the General Assembly on the Prevention and Control of Non-communicable Diseases passed a political declaration on Non-Communicable Diseases (NCD) prevention and control in 2011, emphasizing the great need for NCD surveillance including in Low-to-Middle-Income-Countries (LMICs). Method: A review of literature was conducted and set for full text citations published in English dated 1 January, 2007 to 31 August 2019. MESH terms or key words were selected from the following groups of generic terms: the following words “Health surveillance systems” and “NCD monitoring and surveillance system”. The literatures were tabulated according to the authors, date that was published and which journal, the title of the study, the surveillance design and their recommendations. The 13 articles that were identified, only one was conducted in a developing country while the rest were conducted in high income countries. Results: 60% of the NCD surveillace system reviewed use passive surveillance, 30% uses passive assisted sentinel surveillance and 10% use passive assited spatial surveillance. Based on countries surveillance system there was an equal distribution on involvement in policy development (33%), behavioural risk associated aggregates (33%) and intergrated health information System (33%).Through intense review, passive assisted sentinel surveillance was mostly practiced and the use of spatial surveillace in this context for interregional comparisons of specified diseases. Conclusion: There was less evidence on surveillance in LMIC but the following surveillance systems were identified as essential for Fiji’s proposed NCD surveillance system. This study suggest that a probable surveillance system that can be adopted by Fiji is a passive assisted sentinel surveillance system enhanced with Spatial data. Further consultation and a feasibility study can be proposed as a way forward for this study findings.
APA, Harvard, Vancouver, ISO, and other styles
8

Lippert, Randy K., and Jolina Scalia. "Attaching Hollywood to a Surveillant Assemblage: Normalizing Discourses of Video Surveillance." Media and Communication 3, no. 3 (October 20, 2015): 26–38. http://dx.doi.org/10.17645/mac.v3i3.286.

Full text
Abstract:
This article examines video surveillance images in Hollywood film. It moves beyond previous accounts of video surveillance in relation to film by theoretically situating the use of these surveillance images in a broader “surveillant assemblage”. To this end, scenes from a sample of thirty-five (35) films of several genres are examined to discern dominant discourses and how they lend themselves to normalization of video surveillance. Four discourses are discovered and elaborated by providing examples from Hollywood films. While the films provide video surveillance with a positive associative association it is not without nuance and limitations. Thus, it is found that some forms of resistance to video surveillance are shown while its deterrent effect is not. It is ultimately argued that Hollywood film is becoming attached to a video surveillant assemblage discursively through these normalizing discourses as well as structurally to the extent actual video surveillance technology to produce the images is used.
APA, Harvard, Vancouver, ISO, and other styles
9

Kalvaityte, Martyna, and Nicolas Saintonge. "La surveillance sous surveillance." Books N° 94, no. 2 (February 1, 2019): 70–72. http://dx.doi.org/10.3917/books.094.0070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hier, Sean P. "Probing the Surveillant Assemblage: on the dialectics of surveillance practices as processes of social control." Surveillance & Society 1, no. 3 (September 1, 2002): 399–411. http://dx.doi.org/10.24908/ss.v1i3.3347.

Full text
Abstract:
Recent dialogue on the contemporary nature of information and data gathering techniques has incorporated the notion of assemblages to denote an increasing convergence of once discrete systems of surveillance. The rhizomatic expansion of late modern ‘surveillant assemblages’ is purported not only to enable important transformations in the purpose and intention of surveillance practices, but to facilitate a partial democratization of surveillance hierarchies. Seeking to account for the forces and desires which give rise to, and sustain, surveillant assemblages, this paper explicates the workings of a dialectic embedded in many surveillance practices to reveal a polarization effect involving the simultaneous leveling and solidification of hierarchies. Empirical data from the intensification of welfare monitoring are presented to illustrate the dialectics of surveillance practices as processes of social control.
APA, Harvard, Vancouver, ISO, and other styles
11

Kovanič, Martin. "Individual Experiences of Surveillance: Attitudes towards Camera Surveillance in Slovakia." Czech Sociological Review 56, no. 3 (August 25, 2020): 343–61. http://dx.doi.org/10.13060/csr.2020.021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Ciofi, Joy. "The Ambivalent Subject: Reconciling Contradictory Subjective Experiences of Surveillance." Surveillance & Society 18, no. 1 (March 16, 2020): 61–73. http://dx.doi.org/10.24908/ss.v18i1.12783.

Full text
Abstract:
This article discusses the surveillant assemblage operating within the brandscape of two American mega–casinos and the ways in which the mechanisms of this surveillance impact the subjective experiences of older adults who frequent these facilities in retirement. Based on ethnographic fieldwork conducted at these sites from 2015 to 2017, I argue that these immersive and all-inclusive spaces deploy a variety of intensive surveillance methods to ensure profitability but largely avoid many of the negative associations that this level of surveillance engenders in other settings. Older adults present an especially interesting demographic when examining intensive surveillance. While they often benefit from increased oversight and security, they are generally opposed to accessing it through other institutions, such as assisted living or nursing facilities. This apparent contradiction produces ambivalent subjects who dislike the notion of intrusive surveillance but simultaneously appreciate the benefits it can convey. This paper contributes to the ongoing dialogue in surveillance studies about the complexities of surveillant subjects, as well as presents a new perspective on the attitudes of senior citizens towards institutionalized surveillance in private and public space.
APA, Harvard, Vancouver, ISO, and other styles
13

B, Balaji Sakthivel. "IOT Surveillance System." International Journal of Research Publication and Reviews 4, no. 4 (April 27, 2023): 4763–64. http://dx.doi.org/10.55248/gengpi.234.4.36705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Bharadwa, Vishruti, Yatra Bharkhada, Ruchika Jamba, and Prof Sanjay Ranveer. "Intelligent Video Surveillance." International Journal of Research Publication and Reviews 5, no. 4 (April 11, 2024): 3014–18. http://dx.doi.org/10.55248/gengpi.5.0424.1003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Shastri, Nilabh, Chansu Park, and Jian Guan. "Immune surveillance of immune surveillance." Molecular Immunology 150 (October 2022): 2. http://dx.doi.org/10.1016/j.molimm.2022.05.018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Cahill, Susan, and Bryce Newell. "Surveillance Stories: Imagining Surveillance Futures." Surveillance & Society 19, no. 4 (December 13, 2021): 412–13. http://dx.doi.org/10.24908/ss.v19i4.15189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Hudson, Robert J. "Disease Surveillance versus Viral Surveillance." Clinical Infectious Diseases 33, no. 2 (July 15, 2001): 265–66. http://dx.doi.org/10.1086/321822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Gill, O. N., J. R. Weinberg, I. S. T. Fisher, and C. L. R. Bartlett. "Meta-surveillance—safer cyber-surveillance." Lancet 346, no. 8977 (September 1995): 775. http://dx.doi.org/10.1016/s0140-6736(95)91533-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Jowett, Nigel, and David Thompson. "Surveillance electrocardiographique II—Surveillance ambulatoire." Intensive Care Nursing 1, no. 3 (January 1986): 161. http://dx.doi.org/10.1016/0266-612x(86)90111-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Murphy, Talley. "Surveillance as Gesture." TDR: The Drama Review 68, no. 2 (June 2024): 93–111. http://dx.doi.org/10.1017/s1054204324000078.

Full text
Abstract:
Surveillance is gestic, in Bertolt Brecht’s sense: it constitutes and is constituted by a set of practices that police and control the social at the level of gestures. In a surveillant Gestus of the everyday, gestures conscribe bodies as subjects of surveillance, from the touchscreen scroll that operates Amazon’s Neighbors social network to the hands-over-head posture imaged by airport body scanners. Gestures, not digital devices, watch—and enforce—the bounds of a “criminal” human.
APA, Harvard, Vancouver, ISO, and other styles
21

Murakami Wood, David, and Torin Monahan. "Editorial: Platform Surveillance." Surveillance & Society 17, no. 1/2 (March 31, 2019): 1–6. http://dx.doi.org/10.24908/ss.v17i1/2.13237.

Full text
Abstract:
This editorial introduces this special responsive issue on “platform surveillance.” We develop the term platform surveillance to account for the manifold and often insidious ways that digital platforms fundamentally transform social practices and relations, recasting them as surveillant exchanges whose coordination must be technologically mediated and therefore made exploitable as data. In the process, digital platforms become dominant social structures in their own right, subordinating other institutions, conjuring or sedimenting social divisions and inequalities, and setting the terms upon which individuals, organizations, and governments interact. Emergent forms of platform capitalism portend new governmentalities, as they gradually draw existing institutions into alignment or harmonization with the logics of platform surveillance while also engendering subjectivities (e.g., the gig-economy worker) that support those logics. Because surveillance is essential to the operations of digital platforms, because it structures the forms of governance and capital that emerge, the field of surveillance studies is uniquely positioned to investigate and theorize these phenomena.
APA, Harvard, Vancouver, ISO, and other styles
22

Young, Sarah. "Origin Stories, Surveillance, and Digital Alter Egos." Screen Bodies 4, no. 2 (December 1, 2019): 93–110. http://dx.doi.org/10.3167/screen.2019.040207.

Full text
Abstract:
The origin story is an important element for any superhero/villain, as it provides context for a character’s seemingly out-of-this-world abilities. A radioactive spider bit Spiderman, and the Penguin was bullied in his youth. It can also be beneficial for surveillance scholars, inasmuch as it provides context for a once invisible but superhuman body of digital information that circulates as a proxy for us in digital milieus. This body is best understood through contemporary surveillance practices, yet metaphors of the panopticon and George Orwell’s 1984 proliferate in the surveillant imagination. I argue here that mapping an origin story onto a view of our data as a superhuman body not only creates a tangible representation of surveillance, but it also emphasizes and animates alternative surveillance theories useful for circulation in the surveillant imagination.
APA, Harvard, Vancouver, ISO, and other styles
23

Brayne, Sarah. "The Criminal Law and Law Enforcement Implications of Big Data." Annual Review of Law and Social Science 14, no. 1 (October 13, 2018): 293–308. http://dx.doi.org/10.1146/annurev-lawsocsci-101317-030839.

Full text
Abstract:
Law enforcement agencies increasingly use big data analytics in their daily operations. This review outlines how police departments leverage big data and new surveillant technologies in patrol and investigations. It distinguishes between directed surveillance—which involves the surveillance of individuals and places under suspicion—and dragnet surveillance—which involves suspicionless, unparticularized data collection. Law enforcement's adoption of big data analytics far outpaces legal responses to the new surveillant landscape. Therefore, this review highlights open legal questions about data collection, suspicion requirements, and police discretion. It concludes by offering suggestions for future directions for researchers and practitioners.
APA, Harvard, Vancouver, ISO, and other styles
24

Jakubů, Vladislav, and Helena Žemličková. "Surveillance of antibiotic resistance." Hygiena 68, no. 2 (June 30, 2023): 76. http://dx.doi.org/10.21101/hygiena.b0116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Gluck-Thaler, Aaron. "Surveillance Studies and the History of Artificial Intelligence: A Missed Opportunity?" Surveillance & Society 21, no. 3 (September 24, 2023): 259–68. http://dx.doi.org/10.24908/ss.v21i3.16109.

Full text
Abstract:
This research note considers how scholars of surveillance might approach the historical legacies that surveillance through artificial intelligence (AI) is implicated in. Engaging with the relative lack of historical studies within the pages of Surveillance & Society, the note argues that in the context of surveillant AI the stakes of an ahistorical analysis are especially high. Bridging scholarship within the history of science with surveillance studies, the note explores how AI techniques today reanimate a longer history of how scientific knowledge production on classification has been coextensive with the maintenance and production of racial, gender, and social hierarchies. The note briefly examines one genealogy––the history of the field of pattern recognition, its relationship to state surveillance, and its understanding of identification as a problem of classification––to consider how surveillance and AI contingently converged. The note concludes by showing how such histories can help scholars of surveillance critically reassess common understandings of the consequences of AI and AI-adjacent surveillance practices used today.
APA, Harvard, Vancouver, ISO, and other styles
26

Burke, Colin. "Digital Sousveillance: A Network Analysis of the US Surveillant Assemblage." Surveillance & Society 18, no. 1 (March 16, 2020): 74–89. http://dx.doi.org/10.24908/ss.v18i1.12714.

Full text
Abstract:
This paper introduces a new methodological approach to the study of surveillance that I call digital sousveillance— the co-optation of digital data and the use of computational methods and techniques to resituate technologies of control and surveillance of individuals to instead observe the organizational observer. To illustrate the potential of this method, I employ quantitative network analytic methods to trace the changes in and development of the vast network of public and private organizations involved in surveillance operations in the United States—what I term the “US surveillant assemblage”—from the 1970s to the 2000s. The results of the network analyses suggest that the US surveillant assemblage is becoming increasingly privatized and that the line between “public” and “private” is becoming blurred as private organizations are, at an increasing rate, partnering with the US government to engage in mass surveillance.
APA, Harvard, Vancouver, ISO, and other styles
27

Lyon, David. "Surveillance after September 11." Sociological Research Online 6, no. 3 (November 2001): 116–21. http://dx.doi.org/10.5153/sro.643.

Full text
Abstract:
The aftermath of terrorist attacks on September 11 2001 includes widespread tightening of surveillance. The responses are a prism that puts several things in perspective. One, it is premature to see decentralised and commercial surveillance simply supplanting nation-state power. Rather, the nation-state now draws upon an augmented surveillant assemblage for its own purposes. Two, reliance on high tech surveillance methods is undaunted by the low-tech attacks or the failure of high tech security systems already in place. While they may not work to curb terrorism they are likely to impede civil rights for citizens who will be even more profiled and screened. Three, the struggle to make mushrooming surveillance systems more democratically accountable and amenable to ethical scrutiny is being set back by panic regimes following September 11.
APA, Harvard, Vancouver, ISO, and other styles
28

West, Emily. "Amazon: Surveillance as a Service." Surveillance & Society 17, no. 1/2 (March 31, 2019): 27–33. http://dx.doi.org/10.24908/ss.v17i1/2.13008.

Full text
Abstract:
This essay argues that Amazon, the leading e-commerce platform in many parts of the world, uses surveillance not just as a key tool in the platform logic of its growing constellation of businesses but also increasingly as a service to its consumers. In contrast to prevailing assumptions that platforms will obscure the surveillant aspects of their businesses and that users will resist the intrusive nature of corporate surveillance, Amazon’s business practices point to the rapid normalization, and even embrace, of surveillant logics by consumers. Given the importance of consumer data to its operations, Amazon increasingly designs services whose purpose is, at least in part, to collect more data about consumers. The zenith of Amazon’s surveillance capabilities of its customers is no doubt its family of Echo devices enabled by the artificial intelligence interactive-voice service Alexa, which connects to the cloud run by Amazon, itself, through Amazon Web Services. Alexa is similar to competing digital voice assistants like Apple’s Siri and Google’s Assistant, but with more cultural visibility, worldwide market penetration, and greater integration with a host of Internet-of-Things devices produced by a variety of manufacturers. Amazon seeks to make Alexa an indispensable service to consumers, one that sweetens the granular forms of surveillance in more private spaces and situations that it now has the capability to gather, relative to the company’s more established forms of surveillance. While a typical association with surveillance might be the alienation and disempowerment of social control, I suggest that Amazon’s practices of consumer surveillance cultivate a sense of intimacy, borne of being seen between consumer and brand. In other words, I advocate for recognizing the subjectification of contemporary practices of platform surveillance, in addition to its structural elements.
APA, Harvard, Vancouver, ISO, and other styles
29

Juster, A. M. "Surveillance." Hopkins Review 8, no. 4 (2015): 536. http://dx.doi.org/10.1353/thr.2015.0078.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Pfrimmer, Dale M., Maren R. Johnson, Martha L. Guthmiller, Joanna L. Lehman, Vickie K. Ernste, and Lori M. Rhudy. "Surveillance." Dimensions of Critical Care Nursing 36, no. 1 (2017): 45–52. http://dx.doi.org/10.1097/dcc.0000000000000217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Bartlett, C. "Surveillance." Netherlands Journal of Medicine 52, no. 6 (June 1998): 267–70. http://dx.doi.org/10.1016/s0300-2977(98)00042-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Harkin, Natalie. "Surveillance." Wasafiri 31, no. 2 (April 2, 2016): 74. http://dx.doi.org/10.1080/02690055.2016.1145460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Beauchamp, T. "Surveillance." TSQ: Transgender Studies Quarterly 1, no. 1-2 (January 1, 2014): 208–10. http://dx.doi.org/10.1215/23289252-2400037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Lentz, T. J., and T. B. Wenzl. "Surveillance." Journal of Occupational and Environmental Hygiene 3, no. 2 (February 2006): D8—D14. http://dx.doi.org/10.1080/15459620500496715.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Tang, Julian. "Surveillance." Nature 473, no. 7347 (May 2011): 414. http://dx.doi.org/10.1038/473414a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Moore, Dawn. "The benevolent watch: Therapeutic surveillance in drug treatment court." Theoretical Criminology 15, no. 3 (August 2011): 255–68. http://dx.doi.org/10.1177/1362480610396649.

Full text
Abstract:
This article offers an alternative to the traditional, technocentric and control oriented focus of surveillance studies. Drawing on field work in drug treatment courts (DTCs), I theorize the notion of ‘therapeutic surveillance’ as a seemingly benevolent form of monitoring which also troubles the ‘care/control’ dichotomy familiar to surveillance studies and social theory more generally. I look specifically at the roles of judges, treatment workers and DTC participants in constituting a surveillant assemblage which relies on personal relationships, intimate knowledge and pastoral care. I suggest that surveillance studies can move beyond the panopticon by recognizing the varied ways in which surveillance takes place. These strategies can include benevolent acts and intentions alongside (and sometimes coterminous with) coercive manoeuvres.
APA, Harvard, Vancouver, ISO, and other styles
37

Santeufemia, D. A., and G. Miolo. "Cancer survivors: surveillance or not surveillance?" Annals of Oncology 30, no. 9 (September 2019): 1531. http://dx.doi.org/10.1093/annonc/mdz188.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Heymann, David L., and Guénaël Rodier. "Global Surveillance, National Surveillance, and SARS." Emerging Infectious Diseases 10, no. 2 (February 2004): 173–75. http://dx.doi.org/10.3201/eid1002.031038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Blaive, Muriel, and José M. Faraldo. "Surveillance of Culture, Culture of Surveillance." East Central Europe 49, no. 2-3 (October 19, 2022): 145–51. http://dx.doi.org/10.30965/18763308-49020001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Ellen, O’Connor, Kapoor Jada, Teh Jiasian, Lawrentschuk Nathan, and G. Murphy Declan. "Active Surveillance Doing Well Under Surveillance." European Urology Oncology 3, no. 1 (February 2020): 92–93. http://dx.doi.org/10.1016/j.euo.2019.11.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Hong, Sun-ha. "Criticising Surveillance and Surveillance Critique: Why privacy and humanism are necessary but insufficient." Surveillance & Society 15, no. 2 (May 8, 2017): 187–203. http://dx.doi.org/10.24908/ss.v15i2.5441.

Full text
Abstract:
The current debate on surveillance, both academic and public, is constantly tempted towards a ‘negative’ criticism of present surveillance systems. In contrast, a ‘positive’ critique would be one which seeks to present alternative ways of thinking, evaluating, and even undertaking surveillance. Surveillance discourse today propagates a host of normative claims about what is admissible as ‘true’, ‘probable’, ‘efficient’ – based upon which it cannot fail to justify itself. A positive critique questions and subverts this epistemological foundation. It believes that surveillance must be held accountable by terms other than those of its own making. The objective is an open debate not only about ‘surveillance or not’, but the possibility of ‘another surveillance’. To demonstrate the necessity of this shift, I first examine two existing frames of criticism. Privacy and humanism (appeal to human rights, freedoms and decency) are necessary but insufficient tools for positive critique. They implicitly accept surveillance’s bargain of trade-offs: the benefit of security ‘measured’ against the cost of rights. To demonstrate paths towards positive critique, I analyse risk and security: two ‘load-bearing’ concepts that ground existing rationalisations of surveillance – and thus are ‘openings’ for reforming those evaluative paradigms and rigged bargains on offer today.
APA, Harvard, Vancouver, ISO, and other styles
42

Gangneux, Justine. "Diverting and diverted glances at cameras: playful and tactical approaches to surveillance studies." Surveillance & Society 12, no. 3 (June 17, 2014): 443–47. http://dx.doi.org/10.24908/ss.v12i3.4959.

Full text
Abstract:
In the lines of Albrechtlund and Dubbled (2005) and their call for a new direction in Surveillance Studies, this paper discusses the overlapping of surveillance, art and entertainment. Indeed surveillance ought to be considered not only regarding its negative implications (e.g. the infringement of privacy or social sorting) but also regarding ‘the fun features and entertainment value of surveillance’ (Albrechtlund and Dubbled 2005: 216). Drawing on this new direction in the recent years in Surveillance Studies, this paper focuses on the interplay between watcher and watched and the possibility of challenging surveillance through artistic, entertaining or/and playful motives. Play and games within this framework participate both to the active appropriation of the surveillant hegemonic values (and therefore their acceptance) and to the creation of a space of negotiations (and therefore the possibility of resistance). Thus this paper discusses, using several examples, the line between art, entertainment and resistance that has become blurry and has left a wider margin to respond to surveillance processes.
APA, Harvard, Vancouver, ISO, and other styles
43

Van der Vlist, Fernando N. "Counter-Mapping Surveillance: A Critical Cartography of Mass Surveillance Technology After Snowden." Surveillance & Society 15, no. 1 (February 28, 2017): 137–57. http://dx.doi.org/10.24908/ss.v15i1.5307.

Full text
Abstract:
This article critically examines mass surveillance technology revealed by Snowden’s disclosures. It addresses that we do not only live in a society where surveillance is deeply inscribed but more urgently, that it is increasingly difficult to study surveillance when its technologies and practices are difficult to distinguish from everyday routines. Considerably, many of the technologies and systems utilised for surveillance purposes were not originally designed as proper surveillance technologies. Instead, they have effectively become surveillance technologies by being enrolled into a particular surveillant assemblage. Three contributions are made towards critical scholarship on surveillance, intelligence, and security. First, a novel empirical cartographic methodology is developed that employs the vocabularies of assemblages and actor–networks. Second, this methodology is applied to critically examine global mass surveillance according to Snowden. Multiple leaked data sources have been utilised to trace actors, their associations amongst each other, and to create several graphical maps and diagrams. These maps provide insights into actor types and dependence relations described in the original disclosed documents. Third, the analytical value of three ordering concepts as well as the logistics of surveillance are explored via notable actors and actor groups. In short, this contribution provides empirical cartographic methods, concepts, and analytical targets for critically examining surveillance technology and its particular compositions. It addresses challenges of resisting mass surveillance and some forms of data activism, and calls for the continuing proliferation of counter-maps to facilitate grounded critique, to raise awareness, and to gain a foothold for meaningful resistance against mass surveillance.
APA, Harvard, Vancouver, ISO, and other styles
44

C, Aishwarya, Ankita Vyas, and Deepa TP Sowmya MS. "Devices-Smart Electric Surveillance." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 2695–98. http://dx.doi.org/10.31142/ijtsrd14480.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

K, Aravindan, Kanniyappan M, and Karthi R. "Advance Smart Surveillance System." SIJ Transactions on Computer Networks & Communication Engineering 07, no. 04 (August 13, 2019): 07–09. http://dx.doi.org/10.9756/sijcnce/v7i4/05020070102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Lonkar, Bhavesh. "Criminal Action Surveillance System." Paripex - Indian Journal Of Research 2, no. 3 (January 15, 2012): 105–8. http://dx.doi.org/10.15373/22501991/mar2013/39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

P. Beretas, Christos. "Smart Phones Surveillance Methods." Journal of Clinical Oncology Reports 1, no. 1 (January 20, 2023): 01–03. http://dx.doi.org/10.58489/2836-5062/002.

Full text
Abstract:
Smart phone surveillance is a sensitive issue, so topical and important, which is about everyday life of all of us, I am talking about the smart phones, small smart phones, these small but powerful computers that everybody use them every day by doing more internet browsing rather than doing calls. The questions that arise about the security of smart phones are many, for example: may someone watch us? may the government hear what we saying and what messages we send? may they know our location? How much important meta-data is and to what extent it can reveal important information about the subscriber’s identity and how it relates to privacy and personal data. Finally, it is worth mentioning the participation of mobile phone providers in various government monitoring projects of the citizens either with targeted software which is not detectable, or with the direct access to the Servers of the providers for copying sensitive information without of course the consent of the subscribers. Such projects are the Carnivore, Prism, and other projects, and the countries involved in information exchange programs are behind lists identified as 5 Eyes, 9 Eyes, and 14 Eyes.
APA, Harvard, Vancouver, ISO, and other styles
48

Talvitie-Lamberg, Karoliina. "Video Streaming and Internalized Surveillance." Surveillance & Society 16, no. 2 (July 14, 2018): 238–57. http://dx.doi.org/10.24908/ss.v16i2.6407.

Full text
Abstract:
This paper aims to develop knowledge about the complicated ways in which the modern individual uses surveillance (techniques) and the ways surveillance uses the individual. My observational analysis of a videostreaming community reveals the central role that surveillance plays in participating and becoming visible in an online environment. The results show that through disciplinary and lateral surveillance, participants produced context-defined I-narrations and formed themselves following the normative judgment of the environment. The same mechanism may be observed in other videostreaming social media environments and the modern social media-saturated society in general. This is an inconspicuous way to produce surveillant individualism. Contrary to the notion of exploitative participation, this study reveals the productive power of surveillance. My research suggests that disciplinary power is integrated into the everyday in online DIY environments and it creates the space and framework for communication in these environments. Surveillance practices offer empowering means for forming identities.
APA, Harvard, Vancouver, ISO, and other styles
49

Garnier, R. "De la surveillance des expositionà la surveillance médicale :les liens entre ces surveillances, leurs intérêts individuels et collectifs." Archives des Maladies Professionnelles et de l'Environnement 67, no. 2 (May 2006): 157–60. http://dx.doi.org/10.1016/s1775-8785(06)70344-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Cousineau, Matthew. "The Surveillant Simulation of War: Entertainment and Surveillance in the 21st Century." Surveillance & Society 8, no. 4 (April 28, 2011): 517–22. http://dx.doi.org/10.24908/ss.v8i4.4190.

Full text
Abstract:
This paper pulls together some strands in Surveillance Studies to make a case for the analytical advantages of a future direction. Conceptualizing surveillance as entertainment helps sensitize Surveillance Studies to emerging patterns of surveillance in the relationship between the military-industrial complex and entertainment. I describe four examples of this, which include both video game simulations of surveillance as well as actual military surveillance technologies and practices. Army developed video games and simulators designed to recruit, along with unmanned aerial vehicles and sports broadcasting technologies provide contemporary examples of the blurring boundaries between civilians and soldiers, war and entertainment, and work and play. Focusing on surveillance as entertainment, I suggest, furnishes us with several analytical advantages that help make sense of the complex global surveillance realities of the 21st century.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography