Results for ' surveillance studies'

981 found
Order:
  1.  16
    Surveillance Studies: Perspektiven eines Forschungsfeldes.Nils Zurawski (ed.) - 2007 - Farmington Hills [MI]: Budrich.
    Am Beginn des 21. Jahrhunderts sind die gesellschaftlichen Konsequenzen neuer Formen der Sammlung, Verwendung und Vernetzung von Daten zur Überwachung und Beeinflussung von Menschen und Gruppen noch nicht vollends absehbar. Mit den Surveillance Studies können die Bedingungen und Diskurse von Sicherheit, Überwachung und Kontrolle im Rahmen einer interdisziplinären Forschungsinitiative analysiert werden. Verschiedene Pespektiven werden hier einführend dargestellt. Beiträge aus der Rechtswissenschaft, der Kriminologie, der Geographie, Soziologie und Kunstgeschichte zeigen, welche unterschiedlichen Perspektiven es gibt, um die komplexen und folgenreichen (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  2.  13
    The Paradoxes in the Use of the Panopticon as a Theoretical Reference in Urban Video-surveillance Studies: A Case Study of a CCTV System of a Brazilian city.Iafet Leonardi Bricalli - 2019 - Foucault Studies 27 (27):143-160.
    This article aims at introducing the relation between the use of CCTV systems in urban spaces and social control. More specifically, its purpose is to problematize and reaffirm the use of the theoretical background of the panopticon in order to interpret such a relation. In CCTV studies, as a consequence of literal interpretations, as well as the existence of a hegemony in ethnographic studies carried out in control rooms, the theoretical use of the panopticon is then questioned. In (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  11
    Case Study: Covert Video Surveillance in Pediatric Care.Wayne Vaught & Janet Fleetwood - 2002 - Hastings Center Report 32 (6):10.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  27
    Surveillance Cameras & School Safety: A Scale Development Study.Niyazi Özer - 2013 - Journal of Turkish Studies 8:437-448.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  38
    Post-trial period surveillance for randomised controlled cardiovascular studies: submitted protocols, consent forms and the role of the ethics board.M. I. Zia, R. Heslegrave & G. E. Newton - 2011 - Journal of Medical Ethics 37 (12):762-765.
    Background The post-trial period is the time period after the end of study drug administration. It is unclear whether post-trial arrangements for patient surveillance are routinely included in study protocols and consents, and whether research ethics boards (REB) consider the post-trial period. Objectives The objective was to determine whether trial protocols and consent forms reviewed by the REB describe procedures for post-trial period surveillance. Methods An observational study of protocols of randomised trials of chronic therapies for cardiac conditions, (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  6.  36
    Surveillance, Self and Smartphones: Tracking Practices in the Nightlife.Tjerk Timan & Anders Albrechtslund - 2018 - Science and Engineering Ethics 24 (3):853-870.
    This paper is the result of the EMERGING ICT FOR CITIZEN VEILLANCE-workshop organized by the JRC, Ispra, Italy, March 2014. The aim of this paper is to explore how the subject participates in surveillance situations with a particular focus on how users experience everyday tracking technologies and practices. Its theoretical points of departure stem from Surveillance Studies in general and notions of participatory surveillance and empowering exhibitionism :199–215, 2004) in particular. We apply these theoretical notions on (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  11
    Surveillance at workplace and at home.Riikka Vuokko - 2008 - Journal of Information, Communication and Ethics in Society 6 (1):60-75.
    PurposeThe purpose of this paper is to explore how surveillance facilitates new power relationships.Design/methodology/approachThis longitudinal qualitative study is predicated on observations of the home care workers interacting with their managers and clients. The emerging picture was complemented with interviews of the participants. The home care workers were chosen as being crucial in the construction of new everyday relationships, and their interpretations were given most value in presenting how surveillance and monitoring relationships are constructed as embedded mundane practices and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  8.  15
    US Government Surveillance and the Women's Liberation Movement, 1968-1973: A Case Study.Roberta Salper - 2008 - Feminist Studies 34 (3):431-455.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  9.  47
    Internet surveillance after Snowden.Christian Fuchs & Daniel Trottier - 2017 - Journal of Information, Communication and Ethics in Society 15 (4):412-444.
    PurposeThis paper aims to present results of a study that focused on the question of how computer and data experts think about Internet and social media surveillance after Edward Snowden’s revelations about the existence of mass-surveillance systems of the Internet such as Prism, XKeyscore and Tempora. Computer and data experts’ views are of particular relevance because they are confronted day by day with questions about the processing of personal data, privacy and data protection.Design/methodology/approachThe authors conducted two focus groups (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  10.  2
    On Slavery and the Study of Surveillance.Sara-Maria Sorentino - 2018 - Télos 2018 (185):208-211.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  12
    Surveillance of Global Corruption by Transparency International: Construction of a ‘Corrupt’ South and ‘Clean’ North Discourse.Khorshed Alam - forthcoming - Philosophy and Progress:49-76.
    This study looks at how discourses of corruption in Bangladesh are discursively constructed within the official documents of Transparency International (TI), a non-profit organization that monitors corruption worldwide. It explores how an orientalist notion regarding Bangladesh is appropriated in neoliberal global discourse through TI’s corruption surveillance process. A postcolonial analysis of TI’s publications demonstrates a symbiotic relation between orientalism and neoliberalism. TI sets up a binary of ‘corrupt’ global South vs. ‘clean’ global North, reinforcing the uneven power relations between (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  21
    Between surveillance and recognition: Rethinking digital identity in aid.Emrys Schoemaker, Aaron Martin, Margie Cheesman & Keren Weitzberg - 2021 - Big Data and Society 8 (1).
    Identification technologies like biometrics have long been associated with securitisation, coercion and surveillance but have also, in recent years, become constitutive of a politics of empowerment, particularly in contexts of international aid. Aid organisations tend to see digital identification technologies as tools of recognition and inclusion rather than oppressive forms of monitoring, tracking and top-down control. In addition, practices that many critical scholars describe as aiding surveillance are often experienced differently by humanitarian subjects. This commentary examines the fraught (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  13.  14
    Surveillance and Embodiment: Dispositifs of Capture.Gavin J. D. Smith & Martin French - 2016 - Body and Society 22 (2):3-27.
    This article provides an introduction to a special issue of Body & Society that explores the surveillance--embodiment nexus. It accentuates both the prevalence and consequence of bodies being increasingly converted into ‘objects of information’ by surveillance technologies and systems. We begin by regarding the normalcy of body monitoring in contemporary life, illustrating how a plurality of biometric scanners operate to intermediate the physical surfaces and subjective depths of bodies in accordance with various concerns. We focus on everyday experiences (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  14.  5
    Surveillance following Snowden: a major challenge in Spain.Andrew A. Adams, Mario Arias-Oliva, Ana María Lara Palma & Kiyoshi Murata - 2017 - Journal of Information, Communication and Ethics in Society 15 (3):265-282.
    Purpose This study aims to analyse the impacts of Edward Snowden’s revelations in Spain focusing on issues of privacy and state surveillance. This research takes into consideration the Spanish context from a multidimensional perspective: social, cultural, legal and political. Design/methodology/approach The paper reviews the Spanish privacy and state surveillance situation. Responses to a questionnaire were collected from 207 university students studying at Universitat Rovira i Virgili or Burgos University. The quantitative responses to the survey were statistically analysed as (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  15.  75
    Surveillance, security, and AI as technological acceptance.Yong Jin Park & S. Mo Jones-Jang - 2023 - AI and Society 38 (6):2667-2678.
    Public consumption of artificial intelligence (AI) technologies has been rarely investigated from the perspective of data surveillance and security. We show that the technology acceptance model, when properly modified with security and surveillance fears about AI, builds an insight on how individuals begin to use, accept, or evaluate AI and its automated decisions. We conducted two studies, and found positive roles of perceived ease of use (PEOU) and perceived usefulness (PU). AI security concern, however, negatively affected PEOU (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16.  81
    Rethinking Surveillance and Control. Beyond the 'Security vs. Privacy' Debate.Elisa Orrù, Maria Grazia Porcedda & Sebastian Weydner-Volkmann (eds.) - 2017 - Baden-Baden: Nomos.
    This book is based on the premise that the trade-off between privacy and security is both unsound and con-ceals important aspects of surveillance and control. Accordingly, the authors analyse the symbiotic relati-onship between liberty and security, and the emptiness of both concepts when considered in isolation. They explore and contextualise different notions of risk, surveillance practices and the value of the rights to pri-vate life and data protection. Thereby, they show that surveillance and control neither necessarily attain (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17.  22
    Rethinking surveillance and control : beyond the "security versus privacy" debate.Elisa Orrù, Maria-Gracia Porcedda & Sebastian Weydner-Volkmann (eds.) - 2017 - Baden-Baden: Nomos.
    This book is based on the premise that the trade-off between privacy and security is both unsound and conceals important aspects of surveillance and control. Accordingly, the authors analyse the symbiotic relationship between liberty and security, and the emptiness of both concepts when considered in isolation. They explore and contextualise different notions of risk, surveillance practices and the value of the rights to private life and data protection. Thereby, they show that surveillance and control neither necessarily attain (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  2
    La surveillance du maître-nageur sauveteur, une activité qui s’apprend?Yves Depluvrez & Florence Pirard - 2020 - Revue Phronesis 9 (2):39-49.
    Our research investigates the reflexive accompaniment of a novice lifeguard swimmer and its impact on his surveillance activity. The video training device set up in the study consists of three times : (1)immersion with a 360°camera, (2)operating an online platform, (3)pool surveillance. As part of this research, we focus on the third training time through the analysis of a case by trying to identify under what conditions and how reflexive accompaniment allows the trained to regulate itself in order (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  23
    The Ethics of Surveillance: an introduction.Kevin Macnish - 2017 - London: Routledge.
    The Ethics of Surveillance: An Introduction systematically and comprehensively examines the ethical issues surrounding the concept of surveillance. Addressing important questions such as: Is it ever acceptable to spy on one's allies? To what degree should the state be able to intrude into its citizens' private lives in the name of security? Can corporate espionage ever be justified? What are the ethical issues surrounding big data? How far should a journalist go in pursuing information? Is it reasonable to (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  20.  48
    Surveillance in ubiquitous network societies: normative conflicts related to the consumer in-store supermarket experience in the context of the Internet of Things.Jenifer Sunrise Winter - 2014 - Ethics and Information Technology 16 (1):27-41.
    The Internet of Things (IoT) is an emerging global infrastructure that employs wireless sensors to collect, store, and exchange data. Increasingly, applications for marketing and advertising have been articulated as a means to enhance the consumer shopping experience, in addition to improving efficiency. However, privacy advocates have challenged the mass aggregation of personally-identifiable information in databases and geotracking, the use of location-based services to identify one’s precise location over time. This paper employs the framework of contextual integrity related to privacy (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  21.  28
    Trust and the ethical challenges in the use of whole genome sequencing for tuberculosis surveillance: a qualitative study of stakeholder perspectives.Carly Jackson, Jennifer L. Gardy, Hedieh C. Shadiloo & Diego S. Silva - 2019 - BMC Medical Ethics 20 (1):43.
    Emerging genomic technologies promise more efficient infectious disease control. Whole genome sequencing is increasingly being used in tuberculosis diagnosis, surveillance, and epidemiology. However, while the use of WGS by public health agencies may raise ethical, legal, and socio-political concerns, these challenges are poorly understood. Between November 2017 and April 2018, we conducted semi-structured interviews with 22 key stakeholders across the fields of governance and policy, public health, and laboratory sciences representing the major jurisdictions currently using WGS in national TB (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  22.  37
    The Ethics of Surveillance: An Introduction.Kevin Macnish - 2017 - Routledge.
    _The Ethics of Surveillance: An Introduction_ systematically and comprehensively examines the ethical issues surrounding the concept of surveillance. Addressing important questions such as: Is it ever acceptable to spy on one's allies? To what degree should the state be able to intrude into its citizens' private lives in the name of security? Can corporate espionage ever be justified? What are the ethical issues surrounding big data? How far should a journalist go in pursuing information? Is it reasonable to (...)
    Direct download  
     
    Export citation  
     
    Bookmark   8 citations  
  23.  12
    Municipal surveillance regulation and algorithmic accountability.P. M. Krafft, Michael Katell & Meg Young - 2019 - Big Data and Society 6 (2).
    A wave of recent scholarship has warned about the potential for discriminatory harms of algorithmic systems, spurring an interest in algorithmic accountability and regulation. Meanwhile, parallel concerns about surveillance practices have already led to multiple successful regulatory efforts of surveillance technologies—many of which have algorithmic components. Here, we examine municipal surveillance regulation as offering lessons for algorithmic oversight. Taking the 2017 Seattle Surveillance Ordinance as our primary case study and surveying efforts across five other cities, we (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  27
    Surveillance, Governmentality and moving the goalposts: The influence of Ofsted on the work of schools in a post-panoptic era.Jane Perryman, Meg Maguire, Annette Braun & Stephen Ball - 2018 - British Journal of Educational Studies 66 (2):145-163.
  25.  39
    Surveillance and the Eye of God.David Lyon - 2014 - Studies in Christian Ethics 27 (1):21-32.
    Surveillance is sometimes spoken of as a God’s eye view of the world. This idea is explored in relation to the ‘objective gaze’ of disengaged reason in the Enlightenment and its technologically-reinforced modes in the twenty-first century. The rise of the eye-centred viewpoint is coincident with the ‘great disembedding’ of individuals from the social. This in turn also prompted the self-disciplines of modernity, which are now key aspects of the power-base of modern institutions. A crucial moment in this shift (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  26.  12
    Surveillance of Retroelement Expression and Nucleic‐Acid Immunity by Histone Methyltransferase SETDB1.Yong-Kook Kang - 2018 - Bioessays 40 (9):1800058.
    In human cancers, histone methyltransferase SETDB1 (SET domain, bifurcated 1) is frequently overexpressed but its significance in carcinogenesis remains elusive. A recent study shows that SETDB1 downregulation induces de‐repression of retroelements and innate immunity in cancer cells. The possibility of SETDB1 functioning as a surveillant of retroelement expression is discussed in this study: the cytoplasmic presence of retroelement‐derived nucleic acids (RdNAs) drives SETDB1 into the nucleus by the RNA‐interference route, rendering the corresponding retroelement transcriptionally inert. These RdNAs could, therefore, be (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  23
    Surveillance in Capitalism Versus Surveillance Capitalism – Analisis of Contemporary Constraints of Civil Rights in the Context of Dataism and Post-Truth.Marian Zalesko, Aneta Kargol-Wasiluk & Robert Ciborowski - 2022 - Studies in Logic, Grammar and Rhetoric 67 (1):321-334.
    The paper is devoted to the issue of surveillance in capitalism (surveillance capitalism), a phenomenon which has spread in that socio-economic system since the beginning of the 21st century. We attempt to point out the harmfulness of information technologies developing in the wrong direction, carrying the ideas of dataism and post-truth, which increasingly colonize human living space. It turns out that the information (traces) that people leave while operating on the Internet is a source of predicting human behavior (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  17
    Surveillance and Seeing: A New Way of Reading Mark 12:17, 'Give Back to Caesar..'.Nicholas Townsend - 2014 - Studies in Christian Ethics 27 (1):79-90.
    Stoddart writes that the God of Christian faith ‘knew [surveillance’s] gaze [and] suffered its harsh consequences’. That was especially so during the last week of Jesus’ life, when the religious/political leaders engaged him in tension-filled exchanges. Employing Stoddart’s concept of ‘visibility’, I propose a new way of reading the controversy about Roman tax which, taking up insights in Myers’s ‘political’ commentary, shows connections between this text and those immediately preceding it. Jesus makes central in the engagement about tax the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  12
    Under Observation: The Interplay Between eHealth and Surveillance.Samantha Adams, Ronald Leenes & Nadezhda Purtova (eds.) - 2017 - Cham: Imprint: Springer.
    The essays in this book clarify the technical, legal, ethical, and social aspects of the interaction between eHealth technologies and surveillance practices. The book starts out by presenting a theoretical framework on eHealth and surveillance, followed by an introduction to the various ideas on eHealth and surveillance explored in the subsequent chapters. Issues addressed in the chapters include privacy and data protection, social acceptance of eHealth, cost-effective and innovative healthcare, as well as the privacy aspects of employee (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Effects and Effectiveness of Surveillance Technologies: Mapping Perceptions, Reducing Harm.Elisa Orrù - 2015 - European University Institute Department of Law Research Papers 39:1-52.
    This paper addresses issues regarding perceptions of surveillance technologies in Europe. It analyses existing studies in order to explore how perceptions of surveillance affect and are affected by the negative effects of surveillance and how perceptions and effectiveness of surveillance technologies relate to each other. The paper identifies 12 negative effects of surveillance including, among others, privacy intrusion, the chilling effect and social exclusion, and classifies them into three groups. It further illustrates the different (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  50
    Reframing biometric surveillance: from a means of inspection to a form of control.Avi Marciano - 2019 - Ethics and Information Technology 21 (2):127-136.
    This paper reviews the social scientific literature on biometric surveillance, with particular attention to its potential harms. It maps the harms caused by biometric surveillance, traces their theoretical origins, and brings these harms together in one integrative framework to elucidate their cumulative power. Demonstrating these harms with examples from the United States, the European Union, and Israel, I propose that biometric surveillance be addressed, evaluated and reframed as a new form of control rather than simply another means (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  32.  9
    Big data surveillance across fields: Algorithmic governance for policing & regulation.Anthony Amicelle - 2022 - Big Data and Society 9 (2).
    While the academic separation of policing and regulation is still largely operative, points of convergence are more significant than ever in the digital age, starting with concomitant debates about algorithms as a new figure of power. From the policing of illegal activities to the regulation of legal ones, the algorithmization of such critical social ordering practices has been the subject of growing attention. These burgeoning discussions are focused on one common element: big data surveillance. In accordance with such similarities (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  8
    Limits on surveillance: Frictions, fragilities and failures in the operation of camera surveillance.Lynsey Dubbeld - 2004 - Journal of Information, Communication and Ethics in Society 2 (1):9-19.
    Public video surveillance tends to be discussed in either utopian or dystopian terms: proponents maintain that camera surveillance is the perfect tool in the fight against crime, while critics argue that the use of security cameras is central to the development of a panoptic, Orwellian surveillance society. This paper provides an alternative, more nuanced view. On the basis of an empirical case study, the paper explores how camera surveillance applications do not simply augment surveillance capacities, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Who’s watching? Surveillance, big data and applied ethics in the digital age.Adrian Walsh & Sandy C. Boucher - 2022 - Research in Ethical Issues in Organisations 26.
    Editors' Introduction to the special issue of Research in Ethical Issues in Organisations, the proceedings of the 27th Annual Conference of the Australian Association of Professional and Applied Ethics, hosted by the Discipline of Philosophy and Religious Studies at the University of New England in 2020.
     
    Export citation  
     
    Bookmark  
  35.  22
    Assessing the effect of government surveillance on firm supererogation: The case of the U.S. automobile industry.David E. Cavazos, Matthew Rutherford & Shawn L. Berman - 2018 - Business Ethics: A European Review 27 (2):156-163.
    This study builds on prior research investigating the antecedents of firm supererogation. Examining vehicle recalls in the U.S. automobile industry from 1966 to 2010 reveals that surveillance-based government enforcement programs can have widespread industry effects on a specific type of supererogatory action, firm volunteerism. Specifically, increases in government surveillance are associated with firms going beyond what is legally required of them by initiating voluntary product recalls for defects not covered in existing government regulation. Such effects are shown to (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  36.  6
    Trust and transparency in an age of surveillance.Lora Anne Viola & Paweł Laidler (eds.) - 2021 - New York, NY: Routledge.
    Investigating the theoretical and empirical relationships between transparency and trust in the context of surveillance, this volume argues that neither transparency nor trust provides a simple and self-evident path for mitigating the negative political and social consequences of state surveillance practices. Dominant in both the scholarly literature and public debate is the conviction that transparency can promote better-informed decisions, greater oversight, and restore trust damaged by the secrecy of surveillance. The contributions to this volume challenge this conventional (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  37. Multiplying obstetrics: Techniques of surveillance and forms of coordination.Madeleine Akrich & Bernike Pasveer - 2000 - Theoretical Medicine and Bioethics 21 (1):63-83.
    The article argues against the common notion ofdisciplinary medical traditions, i.e. Obstetrics, asmacro-structures that quite unilinearily structure thepractices associated with the discipline. It shows that the various existences of Obstetrics, their relations with practices and vice versa, the entities these obstetrical practices render present and related, and the ways they are connected to experiences, are more complex than the unilinear model suggests. What allows participants to go from one topos to another – from Obstetrics to practice, from practice to politics, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  38.  9
    Capitalizing on transparency: Commercial surveillance and pharmaceutical marketing after the Physician Sunshine Act.Piotr Ozieranski & Shai Mulinari - 2022 - Big Data and Society 9 (1).
    How corporations surveil and influence consumers using big data tools is a major area of research and public debate. However, few studies explore it in relation to physicians in the USA, even though they have been surveilled and targeted by the pharmaceutical industry since at least the 1950s. Indeed, in 2010, concerns about the pharmaceutical industry's undue influence led to the passing of the Physician Sunshine Act, a unique piece of transparency legislation that requires companies to report their financial (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  16
    Situating workplace surveillance: Ethics and computer based performance monitoring.S. Ball Kirstie - 2001 - Ethics and Information Technology 3 (3):209-221.
    This paper examines the study of computer based performance monitoring (CBPM) in the workplace as an issue dominated by questions of ethics. Its central contention paper is that any investigation of ethical monitoring practice is inadequate if it simply applies best practice guidelines to any one context to indicate, whether practice is, on balance, ‘ethical’ or not. The broader social dynamics of access to procedural and distributive justice examined through a fine grained approach to the study of workplace social relations, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  40. Part III: Ethics and Research in the Social Sciences. Introduction / Anne Marie Moulin. Ethics for Research and Use of Medical Products of Human Origin / Jean-Daniel Rainhorn. Ethical Dilemmas Raised by HIV-Related Research in Laos: From Scientific Research to Production of a Radio Program / Pascale Hancart Petitet, Vanphanom Sychareun. Ethics, or a Dialogue of Knowledge: The Case of Tuberculosis Surveillance in Elephants in Laos / Nicolas Laine in collaboration with Khamphan Mahavongsananh. Research Ethics in Health and Social Sciences: Unpacking Key Issues and Controversies from Field Study Experience in South China / Évelyne Micollier. Conclusion - Using this Guide / Anne Marie Moulin. Postface / Paul Brey. Selection of Key Texts on Ethics and Deontology in France and Worldwide. [REVIEW]Marie Baudry de Vaux - 2018 - In Anne Marie Moulin, Bansa Oupathana, Manivanh Souphanthong & Bernard Taverne (eds.), The paths of ethics in research in Laos and the Mekong countries: health, environment, societies. Marseille: Institut de recherche pour le développement.
     
    Export citation  
     
    Bookmark  
  41.  17
    Privacy and surveillance concerns in machine learning fall prediction models: implications for geriatric care and the internet of medical things.Russell Yang - forthcoming - AI and Society:1-5.
    Fall prediction using machine learning has become one of the most fruitful and socially relevant applications of computer vision in gerontological research. Since its inception in the early 2000s, this subfield has proliferated into a robust body of research underpinned by various machine learning algorithms (including neural networks, support vector machines, and decision trees) as well as statistical modeling approaches (Markov chains, Gaussian mixture models, and hidden Markov models). Furthermore, some advancements have been translated into commercial and clinical practice, with (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  42.  15
    Locating the Health Hazard, Surveilling the Gecekondu: The Tuberculosis-Control Pilot Area of Zeytinburnu, Istanbul (1961–1963). [REVIEW]Léa Delmaire - 2023 - Centaurus 65 (1):153-186.
    The stigmatisation of the gecekondu in post-1945 Turkey is a common theme in the literature. However, these studies have drawn little connection with health issues, even though these are known to be important in the mechanisms of stigmatisation. Policies for tuberculosis (TB) control—then Turkey's “number one health issue”—have tended to focus on individual and biological factors, to the detriment of social or environmental ones that could contribute to making TB a matter of politics and not only of policies. A (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  43.  45
    Ethical issues in the use of Covert video surveillance in the diagnosis of munchausen syndrome by proxy: The atlanta study - an ethical challenge for medecine. [REVIEW]Robert Connelly - 2003 - HEC Forum 15 (1):21-41.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  32
    Advancing a Data Justice Framework for Public Health Surveillance.Mara Buchbinder, Eric Juengst, Stuart Rennie, Colleen Blue & David L. Rosen - 2022 - AJOB Empirical Bioethics 13 (3):205-213.
    Background Bioethical debates about privacy, big data, and public health surveillance have not sufficiently engaged the perspectives of those being surveilled. The data justice framework suggests that big data applications have the potential to create disproportionate harm for socially marginalized groups. Using examples from our research on HIV surveillance for individuals incarcerated in jails, we analyze ethical issues in deploying big data in public health surveillance. -/- Methods We conducted qualitative, semi-structured interviews with 24 people living with (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  45.  18
    Nexus between government surveillance on executive compensation and green innovation: Evidence from the type of state‐owned enterprises.Qian Li, Umer Sahil Maqsood & R. M. Ammar Zahid - 2023 - Business Ethics, the Environment and Responsibility 33 (1):94-112.
    The Chinese government capped executive compensation in state-owned enterprises (SOEs) to address income inequality and promote a more equitable distribution of wealth. This study investigates whether regulating top executives' pay alters their motivation for corporate green innovation (GI) initiatives. Using data from 2006 to 2018 for Chinese-listed SOEs, the regression analysis and difference-in-difference methods revealed that government restrictions on executive compensation negatively affect GI. Furthermore, the types of SOE results show that the negative effect of pay restrictions on GI exists (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  2
    Book review: Liquid Surveillance, Moral Blindness: The Loss of Sensitivity in Liquid Modernity. [REVIEW]Robin Vandevoordt - 2014 - Thesis Eleven 123 (1):138-141.
    ‘Tragedy’ is one of those curiously elastic words reserved for life's saddest spheres and events, irrespective of the forms in which they appear. Even though a vast body of genre studies has emerged, however, only a handful of studies have drawn cross-historical comparisons between tragic forms. This essay demonstrates how Walter Benjamin’s reflections on Attic tragedy may contribute to such a line of thought, focusing both on tragedies’ subversive potential and on the social-historical constellations in which they first (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   20 citations  
  47. Taverne sous surveillance : conditions d’émergence de nouveaux espaces de divertissement semi-publics au Québec.Mathieu Perron - 2018 - Lumen: Selected Proceedings From the Canadian Society for Eighteenth-Century Studies 37:215.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48. Trust in technology: interlocking trust concepts for privacy respecting video surveillance.Sebastian Weydner-Volkmann & Linus Feiten - 2021 - Journal of Information, Communication and Ethics in Society 19 (4):506-520.
    Purpose The purpose of this paper is to defend the notion of “trust in technology” against the philosophical view that this concept is misled and unsuitable for ethical evaluation. In contrast, it is shown that “trustworthy technology” addresses a critical societal need in the digital age as it is inclusive of IT-security risks not only from a technical but also from a public layperson perspective. Design/methodology/approach From an interdisciplinary perspective between philosophy andIT-security, the authors discuss a potential instantiation of a (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  49.  16
    The FBI Surveillance of the Women’s International League for Peace and Freedom, 1945-1963.Susan Dion - 1991 - Journal for Peace and Justice Studies 3 (1):1-21.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  50.  24
    Wanting it all – public perceptions of the effectiveness, cost, and privacy of surveillance technology.Michelle Cayford, Wolter Pieters & P. H. A. J. M. van Gelder - 2019 - Journal of Information, Communication and Ethics in Society 18 (1):10-27.
    Purpose This study aims to explore how the public perceives the effectiveness of surveillance technology, and how people’s views on privacy and their views on effectiveness are related. Likewise, it looks at the relation between perceptions of effectiveness and opinions on the acceptable cost of surveillance technology. Design/methodology/approach For this study, surveys of Dutch students and their parents were conducted over three consecutive years. Findings A key finding of this paper is that the public does not engage in (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 981