Results for 'Air transport,Data protection,Surveillance,Terrorist attack'

990 found
Order:
  1.  55
    Airports as data filters: Converging surveillance systems after September 11th.David Lyon - 2003 - Journal of Information, Communication and Ethics in Society 1 (1):13-20.
    Airports are crucial channels of mobility for the global citizens of the twenty‐first century. They are points of entry and exit for tourists, business persons, workers, students and of course, for some refugees as well. The scale of operations is huge ‐ international passenger travel increased twelve‐fold in the second half of the twentieth century (Urry, 2000: 50) and the vast majority of this is accounted for in air travel. In the USA alone there are two million daily airtravelers on (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  7
    5G Security Features, Vulnerabilities, Threats, and Data Protection in IoT and Mobile Devices: A Systematic Review.Alexandre Sousa & Manuel J. C. S. Reis - forthcoming - Evolutionary Studies in Imaginative Culture:414-427.
    The evolution of wireless communications, from the first to the fifth generation, has driven Internet of Things (IoT) advancements. IoT is transforming sectors like agriculture, healthcare, and transportation, but also presents challenges like spectrum bandwidth demand, speed requirements, and security issues. IoT environments, with embedded sensors and actuators, connect to other devices to transmit and receive data over the internet. These data are processed locally or in the cloud, enabling decision-making and automation. Various wireless technologies, including Bluetooth, Zigbee, LoRa, and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  12
    State of urgency: Surveillance, power, and algorithms in France’s state of emergency.Kyle Kubler - 2017 - Big Data and Society 4 (2).
    The recent terrorist attacks and ongoing state of emergency in France have brought questions of police surveillance into the public spotlight, making it increasingly important to understand how police attain data from citizens. Since 2005, the French police have been using IBM’s computer program, i2 Analyst’s Notebook, to aggregate information and craft criminal narratives. This technology serves to quickly connect suspects with crimes, looking for as many associations as possible, ranking and visualizing them based on level of importance. Recently, surveillance (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4. The subjective and objective violence of terrorism: analysing 'British values' in newspaper coverage of the 2017 London Bridge attack.Jack Black - 2019 - Critical Studies on Terrorism 12 (2):228-249.
    This article examines how Žižek’s analysis of “subjective” violence can be used to explore the ways in which media coverage of a terrorist attack is contoured and shaped by less noticeable forms of “objective” (symbolic and systemic) violence. Drawing upon newspaper coverage of the 2017 London Bridge attack, it is noted how examples of “subjective” violence were grounded in the externalization of a clearly identifiable “other”, which symbolically framed the terrorists and the attack as tied to and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  24
    Machine Learning Against Terrorism: How Big Data Collection and Analysis Influences the Privacy-Security Dilemma.H. M. Verhelst, A. W. Stannat & G. Mecacci - 2020 - Science and Engineering Ethics 26 (6):2975-2984.
    Rapid advancements in machine learning techniques allow mass surveillance to be applied on larger scales and utilize more and more personal data. These developments demand reconsideration of the privacy-security dilemma, which describes the tradeoffs between national security interests and individual privacy concerns. By investigating mass surveillance techniques that use bulk data collection and machine learning algorithms, we show why these methods are unlikely to pinpoint terrorists in order to prevent attacks. The diverse characteristics of terrorist attacks—especially when considering lone-wolf terrorism—lead (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  97
    The General Data Protection Regulation in the Age of Surveillance Capitalism.Jane Andrew & Max Baker - 2019 - Journal of Business Ethics 168 (3):565-578.
    Clicks, comments, transactions, and physical movements are being increasingly recorded and analyzed by Big Data processors who use this information to trace the sentiment and activities of markets and voters. While the benefits of Big Data have received considerable attention, it is the potential social costs of practices associated with Big Data that are of interest to us in this paper. Prior research has investigated the impact of Big Data on individual privacy rights, however, there is also growing recognition of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  7. Minimium Harm by Design. Reworking Privacy by Design to Mitigate the Risks of Surveillance.Elisa Orrù - 2017 - In Leenes R. Van Brakel R. Gutwirth S. De Hert P., Computers, Privacy and Data Protection: Invisibilities & Infrastructures. Springer. pp. 107-137.
    Particular applications of Privacy by Design (PbD) have proven to be valuable tools to protect privacy in many technological applications. However, PbD is not as promising when applied to technologies used for surveillance. After specifying how surveillance and privacy are understood in this paper, I will highlight the shortcomings of PbD when applied to surveillance, using a web-scanning system for counter-terrorism purposes as an example. I then suggest reworking PbD into a different approach: the Minimum Harm by Design (MHbD) model. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  8.  11
    Governmental Surveillance and Bureaucratic Accountability: Data Protection Agencies in Western Societies.David H. Flaherty - 1986 - Science, Technology, and Human Values 11 (1):7-18.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  9.  13
    Reloading Data Protection: Multidisciplinary Insights and Contemporary Challenges.Paul De Hert, Serge Gutwirth & Ronald Leenes (eds.) - 2013 - Dordrecht: Imprint: Springer.
    This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. The first section of the book provides an overview of developments in data protection in different parts of the world. The second section focuses on one of the most captivating innovations of the data protection package: how to forget, and the right to be forgotten in a digital world. The third section presents studies on a recurring, and still important (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  10.  54
    Nine principles for assessing whether privacy is protected in a surveillance society.C. N. M. Pounder - 2008 - Identity in the Information Society 1 (1):1-22.
    This paper uses the term “ surveillance ” in its widest sense to include data sharing and the revealing of identity information in the absence of consent of the individual concerned. It argues that the current debate about the nature of a “ surveillance society” needs a new structural framework that allows the benefits of surveillance and the risks to individual privacy to be properly balanced. To this end, the first part of this article sets out the reasons why reliance (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  39
    Health research and systems’ governance are at risk: should the right to data protection override health?C. T. Di Iorio, F. Carinci & J. Oderkirk - 2014 - Journal of Medical Ethics 40 (7):488-492.
    The European Union Data Protection Regulation will have profound implications for public health, health services research and statistics in Europe. The EU Commission's Proposal was a breakthrough in balancing privacy rights and rights to health and healthcare. The European Parliament, however, has proposed extensive amendments. This paper reviews the amendments proposed by the European Parliament Committee on Civil Liberties, Justice and Home Affairs and their implications for health research and statistics. The amendments eliminate most innovations brought by the Proposal. Notably, (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  12.  30
    The Separation Wall and the right to healthcare.Melania Borgo & Mario Picozzi - 2016 - Medicine, Health Care and Philosophy 19 (4):523-529.
    Nowadays, the concepts of soldier and war have changed due to terrorism and the war on terrorism. According to the literature, to prevent terrorism, it is possible to use more violence, but how can we grant the safety of many versus the dignity of a few? In Israel, in order to protect civilians against possible terrorist attacks, Palestinian ambulances that would reach the Israeli hospitals (or the Palestinian hospitals in East Jerusalem) must be quickly controlled. However, many times, at the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  78
    Internet surveillance after Snowden.Christian Fuchs & Daniel Trottier - 2017 - Journal of Information, Communication and Ethics in Society 15 (4):412-444.
    PurposeThis paper aims to present results of a study that focused on the question of how computer and data experts think about Internet and social media surveillance after Edward Snowden’s revelations about the existence of mass-surveillance systems of the Internet such as Prism, XKeyscore and Tempora. Computer and data experts’ views are of particular relevance because they are confronted day by day with questions about the processing of personal data, privacy and data protection.Design/methodology/approachThe authors conducted two focus groups with a (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  14.  22
    Digital, politics, and algorithms: Governing digital data through the lens of data protection.Rocco Bellanova - 2017 - European Journal of Social Theory 20 (3):329-347.
    Many actors mobilize the cognitive, legal and technical tool-box of data protection when they discuss and address controversial issues such as digital mass surveillance. Yet, critical approaches to the digital only barely explore the politics of data protection in relation to data-driven governance. Building on governmentality studies and Actor-Network-Theory, this article analyses the potential and limits of using data protection to critique the ‘digital age’. Using the conceptual tool of dispositifs, it sketches an analytics of data protection and the emergence (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  15.  36
    Towards data justice? The ambiguity of anti-surveillance resistance in political activism.Jonathan Cable, Arne Hintz & Lina Dencik - 2016 - Big Data and Society 3 (2).
    The Snowden leaks, first published in June 2013, provided unprecedented insights into the operations of state-corporate surveillance, highlighting the extent to which everyday communication is integrated into an extensive regime of control that relies on the ‘datafication’ of social life. Whilst such data-driven forms of governance have significant implications for citizenship and society, resistance to surveillance in the wake of the Snowden leaks has predominantly centred on techno-legal responses relating to the development and use of encryption and policy advocacy around (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   17 citations  
  16.  47
    Conference on Pure Land Buddhism in Dialogue with Christian Theology.James Fredericks - 2002 - Buddhist-Christian Studies 22 (1):201-202.
    In lieu of an abstract, here is a brief excerpt of the content:Buddhist-Christian Studies 22 (2002) 201-202 [Access article in PDF] Conference on Pure Land Buddhism in Dialogue with Christian Theology James Fredericks Loyola Marymount University As Charlie Parker devotees will attest, improvisation at its most thrilling, if not its most ingenious, is often the result of careful planning. Cannot something similar be said of interreligious dialogue? All our planning and study are best put to use when they suddenly become (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  17.  41
    COVID-19, Personal Data Protection and Privacy in India.Mohamad Ayub Dar & Shahnawaz Ahmad Wani - 2022 - Asian Bioethics Review 15 (2):125-140.
    The corona pandemic altered many traditional and historical norms of society and law. COVID-19 created a humanitarian crisis in some parts of globe, while pandemic privacy and civil liberties were under threat all over world. To combat the deadly virus, individual liberty and equality were compromised. This paper focuses on how India’s health problem has compromised people’s right to privacy. It will highlight how strict executive policies led to the creation of a massive surveillance system in the name of combating (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  98
    Rethinking Surveillance and Control. Beyond the 'Security vs. Privacy' Debate.Elisa Orrù, Maria Grazia Porcedda & Sebastian Weydner-Volkmann (eds.) - 2017 - Baden-Baden: Nomos.
    This book is based on the premise that the trade-off between privacy and security is both unsound and con-ceals important aspects of surveillance and control. Accordingly, the authors analyse the symbiotic relati-onship between liberty and security, and the emptiness of both concepts when considered in isolation. They explore and contextualise different notions of risk, surveillance practices and the value of the rights to pri-vate life and data protection. Thereby, they show that surveillance and control neither necessarily attain security, nor always (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  19.  32
    Rethinking surveillance and control : beyond the "security versus privacy" debate.Elisa Orrù, Maria-Gracia Porcedda & Sebastian Weydner-Volkmann (eds.) - 2017 - Baden-Baden: Nomos.
    This book is based on the premise that the trade-off between privacy and security is both unsound and conceals important aspects of surveillance and control. Accordingly, the authors analyse the symbiotic relationship between liberty and security, and the emptiness of both concepts when considered in isolation. They explore and contextualise different notions of risk, surveillance practices and the value of the rights to private life and data protection. Thereby, they show that surveillance and control neither necessarily attain security, nor always (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  87
    The Design of GDPR-Abiding Drones Through Flight Operation Maps: A Win–Win Approach to Data Protection, Aerospace Engineering, and Risk Management.Eleonora Bassi, Nicoletta Bloise, Jacopo Dirutigliano, Gian Piero Fici, Ugo Pagallo, Stefano Primatesta & Fulvia Quagliotti - 2019 - Minds and Machines 29 (4):579-601.
    Risk management is a well-known method to face technological challenges through a win–win combination of protective and proactive approaches, fostering the collaboration of operators, researchers, regulators, and industries for the exploitation of new markets. In the field of autonomous and unmanned aerial systems, or UAS, a considerable amount of work has been devoted to risk analysis, the generation of ground risk maps, and ground risk assessment by estimating the fatality rate. The paper aims to expand this approach with a tool (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  21.  48
    The Metaverse: Surveillant Physics, Virtual Realist Governance, and the Missing Commons.Andrew McStay - 2023 - Philosophy and Technology 36 (1):1-26.
    This paper argues that there are value and design-based problems in current ambitions for the Metaverse. With the Metaverse deepening longstanding commercial surveillance practices, the paper focuses on data protection harms from biometric and emotion data, the gauging of first-person perspectives, and sensitivities around profiling of avatars. The paper advances two notions to address harms and data protection: _surveillant physics_ and _virtual realist governance_. _Surveillant physics_ refers to surveillance informing the laws of how that reality operates: this is a useful (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  22.  19
    Robustness Analysis of the Regional and Interregional Components of the Weighted World Air Transportation Network.Issa Moussa Diop, Cherif Diallo, Chantal Cherifi & Hocine Cherifi - 2022 - Complexity 2022:1-17.
    The robustness of a system indicates its ability to withstand disturbances while maintaining its properties, performance, and efficiency. There are plenty of studies on the robustness of air transport networks in the literature. However, few works consider its mesoscopic organization. Building on the recently introduced component structure, we explore the impact of targeted attacks on the weighted world air transportation network on its components. Indeed, it contains five local components covering different regions and one global component linking these regions. We (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23. (1 other version)Civilian immunity in war.Igor Primoratz - 2005 - Philosophical Forum 36 (1):41–58.
    The protection of noncombatants from deadly violence is the centrepiece of any account of ethical and legal constraints on war. It was a major achievement of moral progress from early modern times to World War I. Yet it has been under constant attrition since - perhaps never more so than in our time, with its 'new wars', the spectre of weapons of mass destruction, and the global terrorism alert. -/- Civilian Immunity in War, written in collaboration by eleven authors, provides (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  24.  12
    Civilian Immunity in War.Igor Primoratz (ed.) - 2007 - Oxford University Press UK.
    The protection of noncombatants from deadly violence is the centrepiece of any account of ethical and legal constraints on war. It was a major achievement of moral progress from early modern times to World War I. Yet it has been under constant attrition since - perhaps never more so than in our time, with its 'new wars', the spectre of weapons of mass destruction, and the global terrorism alert. Civilian Immunity in War, written in collaboration by eleven authors, provides the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  25.  58
    Surveillance and the Eye of God.David Lyon - 2014 - Studies in Christian Ethics 27 (1):21-32.
    Surveillance is sometimes spoken of as a God’s eye view of the world. This idea is explored in relation to the ‘objective gaze’ of disengaged reason in the Enlightenment and its technologically-reinforced modes in the twenty-first century. The rise of the eye-centred viewpoint is coincident with the ‘great disembedding’ of individuals from the social. This in turn also prompted the self-disciplines of modernity, which are now key aspects of the power-base of modern institutions. A crucial moment in this shift was (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  26.  45
    Communicable Disease Surveillance Ethics in the Age of Big Data and New Technology.Gwendolyn L. Gilbert, Chris Degeling & Jane Johnson - 2019 - Asian Bioethics Review 11 (2):173-187.
    Surveillance is essential for communicable disease prevention and control. Traditional notification of demographic and clinical information, about individuals with selected infectious diseases, allows appropriate public health action and is protected by public health and privacy legislation, but is slow and insensitive. Big data–based electronic surveillance, by commercial bodies and government agencies, which draws on a plethora of internet- and mobile device–based sources, has been widely accepted, if not universally welcomed. Similar anonymous digital sources also contain syndromic information, which can be (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  27.  14
    The impact of a terrorist attack: Survivors’ health, functioning and need for support following the 2019 Utrecht tram shooting 6 and 18 months post-attack[REVIEW]Mark W. G. Bosmans, Carolien Plevier, Francoise Schutz, Lise E. Stene, C. Joris Yzermans & Michel L. A. Dückers - 2022 - Frontiers in Psychology 13.
    BackgroundExtremely violent events such as terrorist attacks and mass shootings form a severe risk for the health and wellbeing of affected individuals. In this study based on a public health monitor, we focus on the health impact of the Utrecht tram shooting, which took place in the morning of March 18th 2019. A lone gunman opened fire on passengers within a moving tram. Four people died, and six people were injured in this attack. The attack resulted in nationwide (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  15
    (1 other version)La surveillance numérique au travail.Hubert Bouchet - 2009 - Hermès: La Revue Cognition, communication, politique 53 (1):85.
    Avec le salariat et le rassemblement des ouvriers sur les mêmes lieux, dans le même temps et pour une tâche commune, la surveillance est apparue comme plus « nécessaire ». Les techniques se sont naturellement installées dans l'univers de la surveillance au travail, marquant plusieurs étapes. Autrefois, vigiles, contremaîtres et cadres assuraient la surveillance. Une seconde étape a été matérialisée par l'installation des automatismes de première génération, avec les badges notamment. La troisième étape a enrichi les dispositifs du recours à (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  29. Government Surveillance and Why Defining Privacy Matters in a Post‐Snowden World.Kevin Macnish - 2016 - Journal of Applied Philosophy (2).
    There is a long-running debate as to whether privacy is a matter of control or access. This has become more important following revelations made by Edward Snowden in 2013 regarding the collection of vast swathes of data from the Internet by signals intelligence agencies such as NSA and GCHQ. The nature of this collection is such that if the control account is correct then there has been a significant invasion of people's privacy. If, though, the access account is correct then (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   32 citations  
  30.  32
    Big Data in the workplace: Privacy Due Diligence as a human rights-based approach to employee privacy protection.Jeremias Adams-Prassl, Isabelle Wildhaber & Isabel Ebert - 2021 - Big Data and Society 8 (1).
    Data-driven technologies have come to pervade almost every aspect of business life, extending to employee monitoring and algorithmic management. How can employee privacy be protected in the age of datafication? This article surveys the potential and shortcomings of a number of legal and technical solutions to show the advantages of human rights-based approaches in addressing corporate responsibility to respect privacy and strengthen human agency. Based on this notion, we develop a process-oriented model of Privacy Due Diligence to complement existing frameworks (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  31.  64
    Preventive Policing, Surveillance, and European Counter-Terrorism.Tom Sorell - 2011 - Criminal Justice Ethics 30 (1):1-22.
    A European Union counter-terrorism strategy was devised in 2005.1 Of its four strands—prevent, pursue, protect, and respond—only two have a direct connection with policing. Perhaps surprisingly, th...
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  32.  21
    Big data surveillance across fields: Algorithmic governance for policing & regulation.Anthony Amicelle - 2022 - Big Data and Society 9 (2).
    While the academic separation of policing and regulation is still largely operative, points of convergence are more significant than ever in the digital age, starting with concomitant debates about algorithms as a new figure of power. From the policing of illegal activities to the regulation of legal ones, the algorithmization of such critical social ordering practices has been the subject of growing attention. These burgeoning discussions are focused on one common element: big data surveillance. In accordance with such similarities and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  17
    Revocable Anonymisation in Video Surveillance: A ‘Digital Cloak of Invisibility’.Feiten Linus, Sebastian Sester, Christian Zimmermann, Sebastian Weydner-Volkmann, Laura Wehle & Bernd Becker - 2016 - In Feiten Linus, Sebastian Sester, Christian Zimmermann, Sebastian Weydner-Volkmann, Laura Wehle & Bernd Becker, Technology and Intimacy: Choice or Coercion. HCC 2016. IFIP Advances in Information and Communication Technology, vol 474. Cham.: pp. 314-327.
    Video surveillance is an omnipresent phenomenon in today’s metropolitan life. Mainly intended to solve crimes, to prevent them by realtime-monitoring or simply as a deterrent, video surveillance has also become interesting in economical contexts; e.g. to create customer profiles and analyse patterns of their shopping behaviour. The extensive use of video surveillance is challenged by legal claims and societal norms like not putting everybody under generalised suspicion or not recording people without their consent. In this work we propose a technological (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  34.  71
    Highway to (Digital) Surveillance: When Are Clients Coerced to Share Their Data with Insurers?Michele Loi, Christian Hauser & Markus Christen - 2020 - Journal of Business Ethics 175 (1):7-19.
    Clients may feel trapped into sharing their private digital data with insurance companies to get a desired insurance product or premium. However, private insurance must collect some data to offer products and premiums appropriate to the client’s level of risk. This situation creates tension between the value of privacy and common insurance business practice. We argue for three main claims: first, coercion to share private data with insurers is pro tanto wrong because it violates the autonomous choice of a privacy-valuing (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  35.  11
    Restraining the Surveillance State: A Global Right to Privacy.Binoy Kampmark - 2014 - Journal of Global Faultlines 2 (1):1-16.
    Edward Snowden's revelations of massive data collecting surveillance conducted by the U.S. National Security Agency in June 2013 suggest that Franz Kafka's vision of a surveillance state has been globalised. A movement has developed in response to it urging reforms on an international scale. One feature of this debate lies in the idea of a global right to privacy. A global right to privacy suggests a global freedom from unjustified, bulk surveillance beyond the reaches of judicial oversight. While there are (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36. Trust in technology: interlocking trust concepts for privacy respecting video surveillance.Sebastian Weydner-Volkmann & Linus Feiten - 2021 - Journal of Information, Communication and Ethics in Society 19 (4):506-520.
    Purpose The purpose of this paper is to defend the notion of “trust in technology” against the philosophical view that this concept is misled and unsuitable for ethical evaluation. In contrast, it is shown that “trustworthy technology” addresses a critical societal need in the digital age as it is inclusive of IT-security risks not only from a technical but also from a public layperson perspective. Design/methodology/approach From an interdisciplinary perspective between philosophy andIT-security, the authors discuss a potential instantiation of a (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  37.  74
    Observing bodies. Camera surveillance and the significance of the body.Lynsey Dubbeld - 2003 - Ethics and Information Technology 5 (3):151-162.
    At the most mundane level, CCTV observes bodies, and as such attaches great importance to the specific features of the human body. At the same time, however, bodies tend to disappear, as they are represented electronically by the camera monitors and, in the case of image recording, by the computer systems processing data. The roles of bodies(either as targets of surveillance or as translations into flows of disembodied information), however, are not unimportant or inconsequential, but may in fact give rise (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark  
  38.  26
    Sustaining Surveillance: The Importance of Information for Public Health.John G. Francis & Leslie P. Francis - 2021 - Springer Verlag.
    This book presents a comprehensive theory of the ethics and political philosophy of public health surveillance based on reciprocal obligations among surveillers, those under surveillance, and others potentially affected by surveillance practices. Public health surveillance aims to identify emerging health trends, population health trends, treatment efficacy, and methods of health promotion--all apparently laudatory goals. Nonetheless, as with anti-terrorism surveillance, public health surveillance raises complex questions about privacy, political liberty, and justice both of and in data use. Individuals and groups can (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  34
    DNA dataveillance: protecting the innocent?Anna Vartapetiance Salmasi & Lee Gillam - 2010 - Journal of Information, Communication and Ethics in Society 8 (3):270-288.
    PurposeThe purpose of this paper is to discuss the UK National DNA Database and some of the controversies surrounding it with reference to legal and ethical issues, focusing particularly on privacy and human rights. Governance of this database involves specific exemptions from the Data Protection Act, and this gives a rise to concerns regarding both the extent of surveillance on the UK population and the possibility for harm to all citizens. This is of wider importance since every current citizen, and (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  40.  70
    Empowerment or repression? Opening up questions of identification and surveillance in Brazil through a case of ‘identity fraud’.David Murakami Wood & Rodrigo Firmino - 2009 - Identity in the Information Society 2 (3):297-317.
    A real but typical case of identity fraud is used to open up the complex web of identification systems in Brazil. It is argued that identification has two poles related to the nature of citizenship—repression and inclusion—and that reactions from citizens to new identification schemes can be attributed to how they view the purpose of the cards in these terms. In Brazil, a sense of inclusion and citizenship based on a fear of anonymity and exclusion predominates leading to widespread support (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  41.  17
    Under Observation: The Interplay Between eHealth and Surveillance.Samantha Adams, Ronald Leenes & Nadezhda Purtova (eds.) - 2017 - Cham: Imprint: Springer.
    The essays in this book clarify the technical, legal, ethical, and social aspects of the interaction between eHealth technologies and surveillance practices. The book starts out by presenting a theoretical framework on eHealth and surveillance, followed by an introduction to the various ideas on eHealth and surveillance explored in the subsequent chapters. Issues addressed in the chapters include privacy and data protection, social acceptance of eHealth, cost-effective and innovative healthcare, as well as the privacy aspects of employee wellness programs using (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  42. Facing the future: Seeking ethics for everyday surveillance. [REVIEW]David Lyon - 2001 - Ethics and Information Technology 3 (3):171-180.
    Surveillance has become a routine, everyday occurrence ininformational societies. Many agencies have an interest in personal data, and a wide spectrum of them use searchabledatabases to classify and catalogue such data. From policingto welfare to the Internet and e-commerce, personal data havebecome very valuable, economically and administratively. Whilequestions of privacy are indeed raised by such surveillance,the processes described here have as much to do with social sorting,and thus present new problems of automated categorization of datasubjects. Privacy and data protection measures (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  43.  15
    The Tendency of Terrorist Organizations to Explosive Attacks: An Institutional Theory Perspective.Lanjun Luo & Chao Qi - 2022 - Frontiers in Psychology 13:747967.
    Focusing on the tendency of terrorist organizations to explosive attack, this article applied the institutional theory as the basis to explain the inherent logic of attack type similarity from the perspective of mimetic, coercive, and normative isomorphism. Subsequently, the study conducted an empirical analysis of the data onto 1825 terrorist organizations recorded in the Global Terrorism Database with the logistic regression method. The results show that: (1) Terrorist organizations will learn from pre-existing terrorist organizations' experiences, and mimetic isomorphism (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  14
    Computers, Personal Data, and Theories of Technology: Comparative Approaches to Privacy Protection in the 1990s.Colin J. Bennett - 1991 - Science, Technology and Human Values 16 (1):51-69.
    Public policies designed to regulate the use of information technology to protect personal data have been based on different theoretical assumptions in different states, depending on whether the problem is defined in technological, civil libertarian, or bureaucratic terms. However, the rapid development, dispersal, and decentralization of information technology have facilitated a range of new surveillance practices that have in turn rendered the approaches of the 1960s and 1970s obsolete. The networking of the postindustrial state will require a reconceptualization of the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  45. The Business of Double-Effect: The Ethics of Bankruptcy Protection and the Principle of Double-Effect.Henry S. Kuo - 2020 - Journal of Religion and Business Ethics 4 (11):1-25.
    After the terrorist attacks of September 11, 2001, most legacy airlines filed for bankruptcy protection as a way to cut costs drastically, with the exception of American Airlines. This article applies the Principle of Double-Effect to the act of filing for Chapter 11 bankruptcy protection for reasons of management strategy, in particular, cost-cutting. It argues that the Principle can be a useful tool for discerning the ethicality of the action, and demonstrates the usefulness by proposing three double-effect criteria that, when (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46. Privacy, Security, and Government Surveillance: Wikileaks and the New Accountability.Adam Moore - 2011 - Public Affairs Quarterly 25 (2):141-156.
    In times of national crisis, citizens are often asked to trade liberty and privacy for security. And why not, it is argued, if we can obtain a fair amount of security for just a little privacy? The surveillance that enhances security need not be overly intrusive or life altering. It is not as if government agents need to physically search each and every suspect or those connected to a suspect. Advances in digital technology have made such surveillance relatively unobtrusive. Video (...)
    Direct download  
     
    Export citation  
     
    Bookmark   9 citations  
  47.  59
    Management and Legal Issues Regarding Electronic Surveillance of Employees in the Workplace.David Halpern, Patrick J. Reville & Donald Grunewald - 2008 - Journal of Business Ethics 80 (2):175-180.
    Since the attack on the World Trade Center in New York, and on the Pentagon in the United States, concerns over security issues have been at an all-time high in this country. Both state and federal governments continue to discuss legislation on these issues amid much controversy. One key concern of both employers and employees is the extent that employers, espousing a "need to know" mentality, continue to expand their capability and implementation of surveillance of employees in the workplace. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  48.  83
    Introduction to the Special Issue on the Ethics of State Mass Surveillance.Peter Königs - 2020 - Moral Philosophy and Politics 7 (1):1-8.
    Recent decades have seen an unprecedented proliferation of surveillance programs by government agencies. This development has been driven both by technological progress, which has made large scale surveillance operations relatively cheap and easy, and by the threat of terrorism, organized crime and pandemics, which supplies a ready justification for surveillance. For a long time, mass surveillance programs have been associated with autocratic regimes, most notoriously with the German Democratic Republic and the Stasi, its secret police. A more recent case in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49. To Be a Face in the Crowd: Surveillance, Facial Recognition, and a Right to Obscurity.Shawn Kaplan - 2023 - In L. Samuelsson, C. Cocq, S. Gelfgren & J. Enbom, Everyday Life in the Culture of Surveillance. NORDICOM. pp. 45-66.
    This article examines how facial recognition technology reshapes the philosophical debate over the ethics of video surveillance. When video surveillance is augmented with facial recognition, the data collected is no longer anonymous, and the data can be aggregated to produce detailed psychological profiles. I argue that – as this non-anonymous data of people’s mundane activities is collected – unjust risks of harm are imposed upon individuals. In addition, this technology can be used to catalogue all who publicly participate in political, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  41
    B Flach! B Flach!Myroslav Laiuk & Ali Kinsella - 2023 - Common Knowledge 29 (1):1-20.
    Don't tell terrible stories—everyone here has enough of their own. Everyone here has a whole bloody sack of terrible stories, and at the bottom of the sack is a hammer the narrator uses to pound you on the skull the instant you dare not believe your ears. Or to pound you when you do believe. Not long ago I saw a tomboyish girl on Khreshchatyk Street demand money of an elderly woman, threatening to bite her and infect her with syphilis. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 990