Alexander Trauth-Goik (Author)
Surveillance has become the dominant organizing force of the modern era. A once isolated and limited practice, surveillance now pervades every facet of urban existence in practically all corners of the globe. Contemporary surveillance of the type facilitated by information and communication technologies embodies the logical outcome of a positivist rationality that seeks to reduce all life phenomena to calculation and quantifiable management. The quest for security, risk management, administrative efficiency, and consumer convenience continues to motivate the global expansion of surveillance and facilitates the creation of new types of technologies and regimes. However, as new global actors seek to deploy their own advanced digitized systems, attention must be focused on the unique socio-cultural background against which both overt and covert forms of surveillance are being formulated. [Peer reviewed]
...MoreArticle Roba Abbas; Stephen Marsh; Kristina Milanovic (December 2019) Ethics and System Design in a New Era of Human-Computer Interaction [Guest Editorial]. IEEE Technology and Society Magazine (pp. 32-33).
Book
Brian Hochman;
(2022)
The Listeners: A History of Wiretapping in the United States
(/isis/citation/CBB775086796/)
Thesis
Kim, Richard S.Y.;
(2010)
Cyber-Surveillance: A Case Study in Policy and Development
(/isis/citation/CBB001567169/)
Article
Peter M. Asaro;
(June 2019)
AI Ethics in Predictive Policing: From Models of Threat to an Ethics of Care
(/isis/citation/CBB655687648/)
Book
Rebecca A. Adelman;
(2014)
Beyond the Checkpoint: Visual Practices in America's Global War on Terror
(/isis/citation/CBB832051517/)
Article
Siddique Latif;
Adnan Qayyum;
Muhammad Usama;
Junaid Qadir;
Andrej Zwitter;
Muhammad Shahzad;
(September 2019)
Caveat Emptor: The Risks of Using Big Data for Human Development
(/isis/citation/CBB326485886/)
Article
Weiner, Amir;
Rahi-Tamm, Aigi;
(2013)
Getting to Know You: The Soviet Surveillance System, 1939--57
(/isis/citation/CBB001200564/)
Article
Evan Selinger;
Darrin Durant;
(2022)
Amazon’s Ring: Surveillance as a Slippery Slope Service
(/isis/citation/CBB181826170/)
Book
Francesca Musiani;
Derrick L. Cogburn;
Laura DeNardis;
Nannette S. Levinson;
(2016)
The Turn to Infrastructure in Internet Governance
(/isis/citation/CBB771724730/)
Article
Ben Falchuk;
Shoshana Loeb;
Ralph Neff;
(June 2018)
The Social Metaverse: Battle for Privacy
(/isis/citation/CBB447859564/)
Book
Mark Coeckelbergh;
(2020)
AI Ethics
(/isis/citation/CBB990965100/)
Article
Jeremy Pitt;
Agnieszka Rychwalska;
Magdalena Roszczynska-Kurasinska;
Andrzej Nowak;
(March 2019)
Democratizing Platforms for Social Coordination
(/isis/citation/CBB485378597/)
Book
Gilliom, John;
Monahan, Torin;
(2013)
SuperVision: An Introduction to the Surveillance Society
(/isis/citation/CBB001421286/)
Article
Patrick Petit;
(2020)
‘Everywhere Surveillance’: Global Surveillance Regimes as Techno-Securitization
(/isis/citation/CBB181724884/)
Book
Kevin Macnish;
(2017)
The Ethics of Surveillance: An Introduction
(/isis/citation/CBB701547234/)
Article
Sandra Robinson;
(2018)
Databases and Doppelgängers: New Articulations of Power
(/isis/citation/CBB779695946/)
Article
Rui Costa;
(2018)
The Internet of Moving Things
(/isis/citation/CBB210233176/)
Article
Karin Bijsterveld;
(2021)
Slicing Sound: Speaker Identification and Sonic Skills at the Stasi, 1966–1989
(/isis/citation/CBB388750124/)
Chapter
Sewald, Ronda L.;
(2012)
Forced Listening: The Contested Use of Loudspeakers for Commercial and Political Messages in the Public Soundscape
(/isis/citation/CBB001421321/)
Article
Kristina Milanovic;
(March 2020)
Smart Home Security: How Safe is Your Data?
(/isis/citation/CBB341237675/)
Article
Ons Al-Shamaileh;
(June 2018)
I Have Issues with Facebook: But I Will Keep Using It
(/isis/citation/CBB503279988/)
Be the first to comment!