Article ID: CBB323886145

"Constructing a Culture of Honesty and Integrity": The Evolution of China's Han-centric Surveillance System (December 2019)

unapi

Alexander Trauth-Goik (Author)


IEEE Technology and Society Magazine
Volume: 38
Issue: 4
Pages: 75-81


Publication Date: December 2019
Edition Details: Special issue on Ethics and System Design in a new Era of Human-Computer Interaction
Language: English

Surveillance has become the dominant organizing force of the modern era. A once isolated and limited practice, surveillance now pervades every facet of urban existence in practically all corners of the globe. Contemporary surveillance of the type facilitated by information and communication technologies embodies the logical outcome of a positivist rationality that seeks to reduce all life phenomena to calculation and quantifiable management. The quest for security, risk management, administrative efficiency, and consumer convenience continues to motivate the global expansion of surveillance and facilitates the creation of new types of technologies and regimes. However, as new global actors seek to deploy their own advanced digitized systems, attention must be focused on the unique socio-cultural background against which both overt and covert forms of surveillance are being formulated. [Peer reviewed]

...More
Included in

Article Roba Abbas; Stephen Marsh; Kristina Milanovic (December 2019) Ethics and System Design in a New Era of Human-Computer Interaction [Guest Editorial]. IEEE Technology and Society Magazine (pp. 32-33). unapi

Citation URI
https://data.isiscb.org/isis/citation/CBB323886145/

Similar Citations

Book Brian Hochman; (2022)
The Listeners: A History of Wiretapping in the United States (/isis/citation/CBB775086796/)

Thesis Kim, Richard S.Y.; (2010)
Cyber-Surveillance: A Case Study in Policy and Development (/isis/citation/CBB001567169/)

Article Peter M. Asaro; (June 2019)
AI Ethics in Predictive Policing: From Models of Threat to an Ethics of Care (/isis/citation/CBB655687648/)

Book Rebecca A. Adelman; (2014)
Beyond the Checkpoint: Visual Practices in America's Global War on Terror (/isis/citation/CBB832051517/)

Article Siddique Latif; Adnan Qayyum; Muhammad Usama; Junaid Qadir; Andrej Zwitter; Muhammad Shahzad; (September 2019)
Caveat Emptor: The Risks of Using Big Data for Human Development (/isis/citation/CBB326485886/)

Article Weiner, Amir; Rahi-Tamm, Aigi; (2013)
Getting to Know You: The Soviet Surveillance System, 1939--57 (/isis/citation/CBB001200564/)

Article Evan Selinger; Darrin Durant; (2022)
Amazon’s Ring: Surveillance as a Slippery Slope Service (/isis/citation/CBB181826170/)

Article Ben Falchuk; Shoshana Loeb; Ralph Neff; (June 2018)
The Social Metaverse: Battle for Privacy (/isis/citation/CBB447859564/)

Book Francesca Musiani; Derrick L. Cogburn; Laura DeNardis; Nannette S. Levinson; (2016)
The Turn to Infrastructure in Internet Governance (/isis/citation/CBB771724730/)

Book Mark Coeckelbergh; (2020)
AI Ethics (/isis/citation/CBB990965100/)

Article Jeremy Pitt; Agnieszka Rychwalska; Magdalena Roszczynska-Kurasinska; Andrzej Nowak; (March 2019)
Democratizing Platforms for Social Coordination (/isis/citation/CBB485378597/)

Book Gilliom, John; Monahan, Torin; (2013)
SuperVision: An Introduction to the Surveillance Society (/isis/citation/CBB001421286/)

Article Patrick Petit; (2020)
‘Everywhere Surveillance’: Global Surveillance Regimes as Techno-Securitization (/isis/citation/CBB181724884/)

Book Kevin Macnish; (2017)
The Ethics of Surveillance: An Introduction (/isis/citation/CBB701547234/)

Article Sandra Robinson; (2018)
Databases and Doppelgängers: New Articulations of Power (/isis/citation/CBB779695946/)

Article Karin Bijsterveld; (2021)
Slicing Sound: Speaker Identification and Sonic Skills at the Stasi, 1966–1989 (/isis/citation/CBB388750124/)

Article Rui Costa; (2018)
The Internet of Moving Things (/isis/citation/CBB210233176/)

Article Ons Al-Shamaileh; (June 2018)
I Have Issues with Facebook: But I Will Keep Using It (/isis/citation/CBB503279988/)

Article Kristina Milanovic; (March 2020)
Smart Home Security: How Safe is Your Data? (/isis/citation/CBB341237675/)

Authors & Contributors
Coeckelbergh, Mark
Brian Hochman
Andrej Zwitter
Agnieszka Rychwalska
Adnan Qayyum
Andrzej Nowak
Journals
IEEE Technology and Society Magazine
Science as Culture
Kritika: Explorations in Russian and Eurasian History
Isis: International Review Devoted to the History of Science and Its Cultural Influences
Configurations: A Journal of Literature, Science, and Technology
Publishers
University of Massachusetts Press
University of Chicago Press
Routledge
Palgrave Macmillan
MIT Press
Harvard University Press
Concepts
Privacy
Surveillance
Technology and government
Technology and society
Communication technology
Computers and computing
Time Periods
21st century
20th century
20th century, late
Modern
19th century
18th century
Places
United States
Middle and Near East
Soviet Union
East Germany
Institutions
Facebook (firm)
Amazon (Firm)
United States. National Security Agency
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment