Alexander Trauth-Goik (Author)
Surveillance has become the dominant organizing force of the modern era. A once isolated and limited practice, surveillance now pervades every facet of urban existence in practically all corners of the globe. Contemporary surveillance of the type facilitated by information and communication technologies embodies the logical outcome of a positivist rationality that seeks to reduce all life phenomena to calculation and quantifiable management. The quest for security, risk management, administrative efficiency, and consumer convenience continues to motivate the global expansion of surveillance and facilitates the creation of new types of technologies and regimes. However, as new global actors seek to deploy their own advanced digitized systems, attention must be focused on the unique socio-cultural background against which both overt and covert forms of surveillance are being formulated. [Peer reviewed]
...MoreArticle Roba Abbas; Stephen Marsh; Kristina Milanovic (December 2019) Ethics and System Design in a New Era of Human-Computer Interaction [Guest Editorial]. IEEE Technology and Society Magazine (pp. 32-33).
Thesis
Kim, Richard S.Y.;
(2010)
Cyber-Surveillance: A Case Study in Policy and Development
(/isis/citation/CBB001567169/)
Book
Brian Hochman;
(2022)
The Listeners: A History of Wiretapping in the United States
(/isis/citation/CBB775086796/)
Article
Peter M. Asaro;
(June 2019)
AI Ethics in Predictive Policing: From Models of Threat to an Ethics of Care
(/isis/citation/CBB655687648/)
Book
Rebecca A. Adelman;
(2014)
Beyond the Checkpoint: Visual Practices in America's Global War on Terror
(/isis/citation/CBB832051517/)
Article
Weiner, Amir;
Rahi-Tamm, Aigi;
(2013)
Getting to Know You: The Soviet Surveillance System, 1939--57
(/isis/citation/CBB001200564/)
Article
Siddique Latif;
Adnan Qayyum;
Muhammad Usama;
Junaid Qadir;
Andrej Zwitter;
Muhammad Shahzad;
(September 2019)
Caveat Emptor: The Risks of Using Big Data for Human Development
(/isis/citation/CBB326485886/)
Article
Evan Selinger;
Darrin Durant;
(2022)
Amazon’s Ring: Surveillance as a Slippery Slope Service
(/isis/citation/CBB181826170/)
Book
Francesca Musiani;
Derrick L. Cogburn;
Laura DeNardis;
Nannette S. Levinson;
(2016)
The Turn to Infrastructure in Internet Governance
(/isis/citation/CBB771724730/)
Article
Ben Falchuk;
Shoshana Loeb;
Ralph Neff;
(June 2018)
The Social Metaverse: Battle for Privacy
(/isis/citation/CBB447859564/)
Book
Mark Coeckelbergh;
(2020)
AI Ethics
(/isis/citation/CBB990965100/)
Article
Patrick Petit;
(2020)
‘Everywhere Surveillance’: Global Surveillance Regimes as Techno-Securitization
(/isis/citation/CBB181724884/)
Article
Jeremy Pitt;
Agnieszka Rychwalska;
Magdalena Roszczynska-Kurasinska;
Andrzej Nowak;
(March 2019)
Democratizing Platforms for Social Coordination
(/isis/citation/CBB485378597/)
Book
Gilliom, John;
Monahan, Torin;
(2013)
SuperVision: An Introduction to the Surveillance Society
(/isis/citation/CBB001421286/)
Book
Kevin Macnish;
(2017)
The Ethics of Surveillance: An Introduction
(/isis/citation/CBB701547234/)
Article
Rui Costa;
(2018)
The Internet of Moving Things
(/isis/citation/CBB210233176/)
Article
Sandra Robinson;
(2018)
Databases and Doppelgängers: New Articulations of Power
(/isis/citation/CBB779695946/)
Article
Karin Bijsterveld;
(2021)
Slicing Sound: Speaker Identification and Sonic Skills at the Stasi, 1966–1989
(/isis/citation/CBB388750124/)
Chapter
Sewald, Ronda L.;
(2012)
Forced Listening: The Contested Use of Loudspeakers for Commercial and Political Messages in the Public Soundscape
(/isis/citation/CBB001421321/)
Book
Colin Koopman;
(2019)
How We Became Our Data: A Genealogy of the Informational Person
(/isis/citation/CBB981384434/)
Article
Kristina Milanovic;
(March 2020)
Smart Home Security: How Safe is Your Data?
(/isis/citation/CBB341237675/)
Be the first to comment!