Kim, Richard S. Y. (Author)
The dissertation examines the historical development of surveillance, electronic surveillance, and cyber-surveillance from colonial times in the United States to the present. It presents the surveillance laws, technologies and policies as a balance between national security and privacy. To examine more recent developments, the dissertation includes case-studies of three cyber-surveillance tools: Carnivore, Magic Lantern, and NARUS; describing the operational functions, logistics, and search functions, and minimization capacities of these tools. The closing chapters assess the dynamic balance between the achievement of national security and public order and the need to preserve rights and expectations of personal privacy. References References (110)
...MoreDescription Cited in Diss. Abstr. Int. A 71/03 (2010). Pub. no. AAT 3396442.
Thesis
Baesler, John Philipp;
(2009)
Clearer Than Truth: The Polygraph in Cold War America
(/isis/citation/CBB001561078/)
Thesis
Kim, Richard S.Y.;
(2010)
Cyber-Surveillance: A Case Study in Policy and Development
(/isis/citation/CBB001567169/)
Book
Ryan Ellis;
(2020)
Letters, Power Lines, and Other Dangerous Things: The Politics of Infrastructure Security
(/isis/citation/CBB767396346/)
Article
Weiner, Amir;
Rahi-Tamm, Aigi;
(2013)
Getting to Know You: The Soviet Surveillance System, 1939--57
(/isis/citation/CBB001200564/)
Book
Groebner, Valentin;
(2007)
Who Are You? Identification, Deception, and Surveillance in Early Modern Europe
(/isis/citation/CBB000954255/)
Book
Ana Muñiz;
(2022)
Borderland Circuitry: Immigration Surveillance in the United States and Beyond
(/isis/citation/CBB304288480/)
Book
Parenti, Christian;
(2003)
The Soft Cage: Surveillance in America, from Slave Passes to the Patriot Act
(/isis/citation/CBB000830945/)
Book
Gilliom, John;
Monahan, Torin;
(2013)
SuperVision: An Introduction to the Surveillance Society
(/isis/citation/CBB001421286/)
Thesis
Magnet, Shoshana Amielle;
(2008)
Encoding the Body: Critically Assessing the Collection and Uses of Biometric Information
(/isis/citation/CBB001561133/)
Article
Hall, R. Cargill;
(2014)
Reconnaissance Drones: Their First Use in the Cold War
(/isis/citation/CBB001550035/)
Thesis
Michelle Claire Grise;
(2017)
Inside the Nuclear Labyrinth: Science and Security in the Making of Contemporary Pakistan, 1947-1998
(/isis/citation/CBB885985275/)
Book
Michael W. Hankins;
(2021)
Flying Camelot: The F-15, the F-16, and the Weaponization of Fighter Pilot Nostalgia
(/isis/citation/CBB534059302/)
Book
Austin Choi-Fitzpatrick;
(2020)
The good drone: How social movements democratize surveillance
(/isis/citation/CBB075748539/)
Article
Camprubí, Lino;
(2012)
“Frankie the Frog”: The Total Transformation of a River Basin as Totalitarian Technology (Spain, 1946--1961)
(/isis/citation/CBB001210156/)
Article
Schiffer, Michael B.;
(2005)
The Electric Lighthouse in the Nineteenth Century: Aid to Navigation and Political Technology
(/isis/citation/CBB000830406/)
Article
Nathalie Dompnier;
(2015)
Modernizing the vote and rationalizing the state: Computers and voting in France
(/isis/citation/CBB670336236/)
Book
Gonza lez de Bustamante, Celeste;
(2012)
“Muy buenas noches”: Mexico, Television, and the Cold War
(/isis/citation/CBB001202061/)
Article
Sambaluk, Nicholas Michael;
(2014)
US Policymakers Confront Aerospace Doctrine, 1957--59
(/isis/citation/CBB001213828/)
Thesis
Holt, James Louis;
(2005)
View from the Hill: Why the United States Congress Established, then Abolished the Office of Technology Assessment
(/isis/citation/CBB001561880/)
Article
Laprise, John;
(2011)
Kissinger's Computer: National Security Council Computerization, 1969--1972
(/isis/citation/CBB001231722/)
Be the first to comment!