Article ID: CBB323886145

"Constructing a Culture of Honesty and Integrity": The Evolution of China's Han-centric Surveillance System (December 2019)

unapi

Alexander Trauth-Goik (Author)


IEEE Technology and Society Magazine
Volume: 38
Issue: 4
Pages: 75-81


Publication Date: December 2019
Edition Details: Special issue on Ethics and System Design in a new Era of Human-Computer Interaction
Language: English

Surveillance has become the dominant organizing force of the modern era. A once isolated and limited practice, surveillance now pervades every facet of urban existence in practically all corners of the globe. Contemporary surveillance of the type facilitated by information and communication technologies embodies the logical outcome of a positivist rationality that seeks to reduce all life phenomena to calculation and quantifiable management. The quest for security, risk management, administrative efficiency, and consumer convenience continues to motivate the global expansion of surveillance and facilitates the creation of new types of technologies and regimes. However, as new global actors seek to deploy their own advanced digitized systems, attention must be focused on the unique socio-cultural background against which both overt and covert forms of surveillance are being formulated. [Peer reviewed]

...More
Included in

Article Roba Abbas; Stephen Marsh; Kristina Milanovic (December 2019) Ethics and System Design in a New Era of Human-Computer Interaction [Guest Editorial]. IEEE Technology and Society Magazine (pp. 32-33). unapi

Citation URI
https://data.isiscb.org/isis/citation/CBB323886145/

Similar Citations

Thesis Kim, Richard S.Y.; (2010)
Cyber-Surveillance: A Case Study in Policy and Development (/isis/citation/CBB001567169/)

Book Brian Hochman; (2022)
The Listeners: A History of Wiretapping in the United States (/isis/citation/CBB775086796/)

Article Peter M. Asaro; (June 2019)
AI Ethics in Predictive Policing: From Models of Threat to an Ethics of Care (/isis/citation/CBB655687648/)

Book Rebecca A. Adelman; (2014)
Beyond the Checkpoint: Visual Practices in America's Global War on Terror (/isis/citation/CBB832051517/)

Article Weiner, Amir; Rahi-Tamm, Aigi; (2013)
Getting to Know You: The Soviet Surveillance System, 1939--57 (/isis/citation/CBB001200564/)

Article Siddique Latif; Adnan Qayyum; Muhammad Usama; Junaid Qadir; Andrej Zwitter; Muhammad Shahzad; (September 2019)
Caveat Emptor: The Risks of Using Big Data for Human Development (/isis/citation/CBB326485886/)

Article Evan Selinger; Darrin Durant; (2022)
Amazon’s Ring: Surveillance as a Slippery Slope Service (/isis/citation/CBB181826170/)

Book Francesca Musiani; Derrick L. Cogburn; Laura DeNardis; Nannette S. Levinson; (2016)
The Turn to Infrastructure in Internet Governance (/isis/citation/CBB771724730/)

Article Ben Falchuk; Shoshana Loeb; Ralph Neff; (June 2018)
The Social Metaverse: Battle for Privacy (/isis/citation/CBB447859564/)

Book Mark Coeckelbergh; (2020)
AI Ethics (/isis/citation/CBB990965100/)

Article Patrick Petit; (2020)
‘Everywhere Surveillance’: Global Surveillance Regimes as Techno-Securitization (/isis/citation/CBB181724884/)

Article Jeremy Pitt; Agnieszka Rychwalska; Magdalena Roszczynska-Kurasinska; Andrzej Nowak; (March 2019)
Democratizing Platforms for Social Coordination (/isis/citation/CBB485378597/)

Book Gilliom, John; Monahan, Torin; (2013)
SuperVision: An Introduction to the Surveillance Society (/isis/citation/CBB001421286/)

Book Kevin Macnish; (2017)
The Ethics of Surveillance: An Introduction (/isis/citation/CBB701547234/)

Article Rui Costa; (2018)
The Internet of Moving Things (/isis/citation/CBB210233176/)

Article Sandra Robinson; (2018)
Databases and Doppelgängers: New Articulations of Power (/isis/citation/CBB779695946/)

Article Karin Bijsterveld; (2021)
Slicing Sound: Speaker Identification and Sonic Skills at the Stasi, 1966–1989 (/isis/citation/CBB388750124/)

Book Colin Koopman; (2019)
How We Became Our Data: A Genealogy of the Informational Person (/isis/citation/CBB981384434/)

Article Kristina Milanovic; (March 2020)
Smart Home Security: How Safe is Your Data? (/isis/citation/CBB341237675/)

Authors & Contributors
Coeckelbergh, Mark
Brian Hochman
Andrej Zwitter
Agnieszka Rychwalska
Adnan Qayyum
Andrzej Nowak
Concepts
Surveillance
Privacy
Technology and government
Communication technology
Technology and society
Computers and computing
Time Periods
21st century
20th century, late
20th century
Modern
19th century
18th century
Places
United States
Soviet Union
East Germany
Institutions
Amazon (Firm)
Facebook (firm)
United States. National Security Agency
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment