Selinger, Evan (Author)
Durant, Darrin (Author)
Article Kean Birch; Kelly Bronson (2022) Big Tech. Science as Culture (pp. 1-14).
Article
Darren Ellis;
(2020)
Techno-Securitisation of Everyday Life and Cultures of Surveillance-Apatheia
(/p/isis/citation/CBB734944273/)
Book
Brian Hochman;
(2022)
The Listeners: A History of Wiretapping in the United States
(/p/isis/citation/CBB775086796/)
Article
Alexander Trauth-Goik;
(December 2019)
"Constructing a Culture of Honesty and Integrity": The Evolution of China's Han-centric Surveillance System
(/p/isis/citation/CBB323886145/)
Article
Tal Zarsky;
(January 2016)
The Trouble with Algorithmic Decisions: An Analytic Road Map to Examine Efficiency and Fairness in Automated and Opaque Decision Making
(/p/isis/citation/CBB775587512/)
Article
Rebecca J. Hester;
(2020)
Bioveillance: A Techno-security Infrastructure to Preempt the Dangers of Informationalised Biology
(/p/isis/citation/CBB548068287/)
Article
Daniel Neyland;
(January 2016)
Bearing Account-able Witness to the Ethical Algorithmic System
(/p/isis/citation/CBB408589504/)
Article
Karin Bijsterveld;
(2021)
Slicing Sound: Speaker Identification and Sonic Skills at the Stasi, 1966–1989
(/p/isis/citation/CBB388750124/)
Book
Colin Koopman;
(2019)
How We Became Our Data: A Genealogy of the Informational Person
(/p/isis/citation/CBB981384434/)
Article
Carsten Ochs;
Barbara Büttner;
Jörn Lamla;
(May 2021)
Trading Social Visibility for Economic Amenability: Data-based Value Translation on a “Health and Fitness Platform”
(/p/isis/citation/CBB474517087/)
Article
Bruno Oliveira Martins;
(2023)
Security knowledges: Circulation, control, and responsible research and innovation in EU border management
(/p/isis/citation/CBB687707247/)
Book
Duane C. Wilson;
(2021)
Cybersecurity
(/p/isis/citation/CBB201310866/)
Article
Sarah Myers West;
(June 2022)
Cryptography as information control
(/p/isis/citation/CBB869396949/)
Article
Katrin M. Kämpf;
(2020)
Pedophilia Screening in Technosecurity Culture The Construction of Dangerous Sub-populations in the Name of Security
(/p/isis/citation/CBB009060974/)
Article
Patrick Petit;
(2020)
‘Everywhere Surveillance’: Global Surveillance Regimes as Techno-Securitization
(/p/isis/citation/CBB181724884/)
Article
Alessandro Delfanti;
Bronwyn Frey;
(May 2021)
Humanly Extended Automation or the Future of Work Seen through Amazon Patents
(/p/isis/citation/CBB482766792/)
Article
Ben Falchuk;
Shoshana Loeb;
Ralph Neff;
(June 2018)
The Social Metaverse: Battle for Privacy
(/p/isis/citation/CBB447859564/)
Article
Simon Willmetts;
(2018)
Digital Dystopia: Surveillance, Autonomy, and Social Justice in Gary Shteyngart's Super Sad True Love Story
(/p/isis/citation/CBB861324031/)
Book
Andrew J. Stewart;
(2021)
A Vulnerable System: The History of Information Security in the Computer Age
(/p/isis/citation/CBB758382142/)
Book
Francesca Musiani;
Derrick L. Cogburn;
Laura DeNardis;
Nannette S. Levinson;
(2016)
The Turn to Infrastructure in Internet Governance
(/p/isis/citation/CBB771724730/)
Book
Mary F. E. Ebeling;
(2022)
Afterlives of Data: Life and Debt under Capitalist Surveillance
(/p/isis/citation/CBB663965321/)
Be the first to comment!