Results for 'cctv'

31 found
Order:
  1. Privacy rights, crime prevention, CCTV, and the life of mrs aremac.Jesper Ryberg - 2007 - Res Publica 13 (2):127-143.
    Over the past decade the use of closed circuit television (CCTV) as a means of crime prevention has reached unprecedented levels. Though critics of this development do not speak with one voice and have pointed to a number of different problems in the use of CCTV, one argument has played a dominant role in the debate, namely, that CCTV constitutes an unacceptable violation of people’s right to privacy. The purpose of this paper is to examine this argument (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   19 citations  
  2.  61
    The difference between lonely old ladies and CCTV cameras: A response to Ryberg.Benjamin Goold - 2008 - Res Publica 14 (1):43-47.
    This article considers the question of whether it is meaningful to speak of privacy rights in public spaces, and the possibility of such rights framing the basis for regulating or restricting the use of surveillance technologies such as closed circuit television (CCTV). In particular, it responds to a recent article by Jesper Ryberg that suggests that there is little difference between being watched by private individuals and CCTV cameras, and instead argues that state surveillance is qualitatively different from (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  3.  10
    Beijing Olympics and Beijing opera: A multimodal metaphor in a CCTV Olympics commercial.Ning Yu - 2011 - Cognitive Linguistics 22 (3):595-628.
    This paper is a cognitive semantic analysis of a CCTV educational commercial, which is one of a series designed and produced in preparation for, and in celebration of, the Beijing 2008 Olympic Games. Called the “Beijing Opera Episode”, this TV commercial converges on the theme: “To mount the stage of the world, and to put on a show of China”. That is, China sees her hosting of the 2008 Olympics by Beijing as a great opportunity for her to step (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  4.  62
    Privacy rights and public spaces: CCTV and the problem of the “unobservable observer”.Benjamin J. Goold - 2002 - Criminal Justice Ethics 21 (1):21-27.
    (2002). Privacy rights and public spaces: CCTV and the problem of the “unobservable observer”. Criminal Justice Ethics: Vol. 21, No. 1, pp. 21-27. doi: 10.1080/0731129X.2002.9992113.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  5.  14
    The Paradoxes in the Use of the Panopticon as a Theoretical Reference in Urban Video-surveillance Studies: A Case Study of a CCTV System of a Brazilian city.Iafet Leonardi Bricalli - 2019 - Foucault Studies 27 (27):143-160.
    This article aims at introducing the relation between the use of CCTV systems in urban spaces and social control. More specifically, its purpose is to problematize and reaffirm the use of the theoretical background of the panopticon in order to interpret such a relation. In CCTV studies, as a consequence of literal interpretations, as well as the existence of a hegemony in ethnographic studies carried out in control rooms, the theoretical use of the panopticon is then questioned. In (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  16
    Matching identities of familiar and unfamiliar faces caught on CCTV images.Vicki Bruce, Zoë Henderson, Craig Newman & A. Mike Burton - 2001 - Journal of Experimental Psychology: Applied 7 (3):207.
  7.  31
    Open to all? Regulating open street CCTV and the case for “symmetrical surveillance”.Benjamin J. Goold - 2006 - Criminal Justice Ethics 25 (1):3-17.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  8. Mrs. Aremac and the camera: A response to Ryberg.Annabelle Lever - 2008 - Res Publica 14 (1):35-42.
    In a recent article in Respublica, Jesper Ryberg argues that CCTV can be compared to a little old lady gazing out onto the street below. This article takes issue with the claim that government surveillance can be justified in this manner. Governments have powers and responsibilities that little old ladies lack. Even if CCTV is effective at preventing crime, there may be less intrusive ways of doing so. People have a variety of legitimate interests in privacy, and protection (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  9. Unblinking eyes: the ethics of automating surveillance.Kevin Macnish - 2012 - Ethics and Information Technology 14 (2):151-167.
    In this paper I critique the ethical implications of automating CCTV surveillance. I consider three modes of CCTV with respect to automation: manual, fully automated, and partially automated. In each of these I examine concerns posed by processing capacity, prejudice towards and profiling of surveilled subjects, and false positives and false negatives. While it might seem as if fully automated surveillance is an improvement over the manual alternative in these areas, I demonstrate that this is not necessarily the (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  10.  14
    Biometric Identification, Law and Ethics.Marcus Smith & S. R. M. Miller - unknown
    This book undertakes a multifaceted and integrated examination of biometric identification, including the current state of the technology, how it is being used, the key ethical issues, and the implications for law and regulation. The five chapters examine the main forms of contemporary biometrics–fingerprint recognition, facial recognition and DNA identification– as well the integration of biometric data with other forms of personal data, analyses key ethical concepts in play, including privacy, individual autonomy, collective responsibility, and joint ownership rights, and proposes (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  15
    Technology, individual rights and the ethical evaluation of risk.Lanre-Abass Bolatito Asiata - 2010 - Journal of Information, Communication and Ethics in Society 8 (4):308-322.
    PurposeThe purpose of this paper is to examine the risk arising from technological devices, such as closed circuit television and nuclear power plants and the consequent effect on the rights to privacy and security of individuals.Design/methodology/approachThe paper presents critical and conceptual analyses of CCTV, nuclear power plants and the rights of individuals. It also analyses how communitarianism and liberal individualism would respond to right‐infringements and risk‐imposition. It draws on W.D. Ross's prima facie and actual duties to explain the pre‐eminence (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  12.  75
    Public anonymity and the connected world.Tony Doyle & Judy Veranas - 2014 - Ethics and Information Technology 16 (3):207-218.
    We defend public anonymity in the light of the threat posed by digital technology. Once people could reasonably assume that they were fairly anonymous when they left the house. They neither drove nor walked around with GPS devices; they paid their highway tolls in cash; they seldom bought on credit; and no cameras marked their strolls in the park or their walks down the street. Times have changed. We begin with a brief discussion of the concept of anonymity. We then (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  17
    Unethical Morality in "Documenting" Terrorism: Terror at the Mall, Nowhere to Run, Wolves of Westgate.David H. Fleming - 2016 - Substance 45 (3):66-83.
    The enemy must fear us. When this is over, there will be much more fear in the world. […] Give the government an ultimatum. Say, “This was just the trailer. Just wait till you see the rest of the film.”The overhanging statement – which draws attention to troubling links interconnecting action cinema and acts of terrorism – is delivered towards the end of Dan Reed’s Terror in Mumbai, an insightful documentary that unfolds a balanced enquiry into the November 2008 massacre (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  14.  19
    Exploring the ethical, organisational and technological challenges of crime mapping: a critical approach to urban safety technologies.Gemma Galdon Clavell - 2018 - Ethics and Information Technology 20 (4):265-277.
    Technology is pervasive in current police practices, and has been for a long time. From CCTV to crime mapping, databases, biometrics, predictive analytics, open source intelligence, applications and a myriad of other technological solutions take centre stage in urban safety management. But before efficient use of these applications can be made, it is necessary to confront a series of challenges relating to the organizational structures that will be used to manage them, to their technical capacities and expectations, and to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  48
    This has got nothing to do with George.Andrew Oberg - 2014 - Think 13 (37):47-55.
    Security cameras have become a ubiquitous part of everyday life in most major cities, yet each new camera seems to come with cries of foul play by defenders of privacy rights. Our long history with these cameras and CCTV networks does not seem to have alleviated our concerns with being watched, and as we feel ourselves losing privacy in other areas the worry generated by security cameras has remained. Our feelings of disquiet, however, are unnecessary as they stem from (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  16.  6
    Unsettling Perception: Screening Surveillance and the Body in Red Road.Liz Watkins - 2015 - Paragraph 38 (1):101-117.
    The association of colour, sensation and the body, which is noted by Jacqueline Lichtenstein and Merleau-Ponty through their insights on colour as the disturbing of structure and form, offers a way in which to foreground a series of questions about embodiment and the discourse of vision. An analysis of the chromatics of Red Road, which features a female protagonist who works as a surveillance officer in a CCTV control room, offers a way to echo and disrupt the ‘mechanisms and (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17.  20
    Evolving standards and regulation: Exploring the development and provision of closed circuit television in the United Kingdom.C. William R. Webster - 2004 - Knowledge, Technology & Policy 17 (2):82-103.
    This article explores the emergence of standards and regulation associated with the provision of Closed Circuit Television (CCTV) surveillance systems in the United Kingdom. It argues that despite the intrusive and controlling nature of CCTV technology there is limited formal intervention in the form of legislation, governing its introduction and use. Instead government has sought to influence the regulation of the technology indirectly through its ability to shape and govern policy networks in the policy arena. In doing so, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  18.  30
    Development of Pay Television Channels in China.Fanbin Zeng & Wu Heng - 2013 - Asian Culture and History 5 (1):p34.
    In 2003, the State Administration of Radio, Film and Television (SARFT) determine those network development years and released a policy document. This indicates that management is aware of the importance of pay TV and digital TV and hoping to promote the development of network services and system integration, and change the business model of the radio and television industry has long rely solely on advertising. As of July 2009, approved by the State Administration of Radio, Film and Television to set (...)
    No categories
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  19.  41
    On Privacy.Annabelle Lever - 2011 - Routledge.
    This book explores the Janus-faced features of privacy, and looks at their implications for the control of personal information, for sexual and reproductive freedom, and for democratic politics. It asks what, if anything, is wrong with asking women to get licenses in order to have children, given that pregnancy and childbirth can seriously damage your health. It considers whether employers should be able to monitor the friendships and financial affairs of employees, and whether we are entitled to know whenever someone (...)
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  20. Ethical aspects of facial recognition systems in public places.Philip Brey - 2004 - Journal of Information, Communication and Ethics in Society 2 (2):97-109.
    This essay examines ethical aspects of the use of facial recognition technology for surveillance purposes in public and semipublic areas, focusing particularly on the balance between security and privacy and civil liberties. As a case study, the FaceIt facial recognition engine of Identix Corporation will be analyzed, as well as its use in “Smart” video surveillance systems in city centers and airports. The ethical analysis will be based on a careful analysis of current facial recognition technology, of its use in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  21.  58
    Observing bodies. Camera surveillance and the significance of the body.Lynsey Dubbeld - 2003 - Ethics and Information Technology 5 (3):151-162.
    At the most mundane level, CCTV observes bodies, and as such attaches great importance to the specific features of the human body. At the same time, however, bodies tend to disappear, as they are represented electronically by the camera monitors and, in the case of image recording, by the computer systems processing data. The roles of bodies(either as targets of surveillance or as translations into flows of disembodied information), however, are not unimportant or inconsequential, but may in fact give (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark  
  22.  3
    The Way Things Go: An Essay on the Matter of Second Modernism.Aaron Jaffe - 2014 - Univ of Minnesota Press.
    Buffed up to a metallic shine; loose fitting, lopsided, or kludgy; getting in the way or getting lost; collapsing in an explosion of dust caught on the warehouse CCTV. Modern things are going their own ways, and this book attempts to follow them. A course of thought about their comings and goings and cascading side effects, _The Way Things Go_ offers a thesis demonstrated via a century-long countdown of stuff. Modernist critical theory and aesthetic method, it argues, are bound (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  31
    Virtual sites performance and materialization.Linda Matthews - 2010 - Technoetic Arts 8 (1):55-65.
    The imagistic promotion of the iconic city form is increasingly achieved by the deployment of the CCTV webcam system. This not only presents new material to mediate people's engagement with this space, but also offers new ways to materialize its actual three-dimensional form. Recent design-based research conducted at the University of Technology, Sydney, shows that the function of the CCTV Internet cameras can be extended and adapted to provide a type of engagement with urban environments that subverts its (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  24. Torture Pornopticon: (In)security Cameras, Self-Governance and Autonomy.Steve Jones - 2015 - In Linnie Blake & Xavier Aldana Reyes (eds.), Digital Horror: Haunted Technologies, Network Panic and the Found Footage Phenomenon. I.B. Tauris. pp. 29-41.
    ‘Torture porn’ films centre on themes of abduction, imprisonment and suffering. Within the subgenre, protagonists are typically placed under relentless surveillance by their captors. CCTV features in more than 45 contemporary torture-themed films (including Captivity, Hunger, and Torture Room). Security cameras signify a bridging point between the captors’ ability to observe and to control their prey. Founded on power-imbalance, torture porn’s prison-spaces are panoptical. Despite failing to encapsulate contemporary surveillance’s complexities (see Haggerty, 2011), the panopticon remains a dominant paradigm (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25. Vertrauensstiftende Videoüberwachung?Sebastian Weydner-Volkmann & Linus Feiten - 2019 - Digma 19 (4):218-221.
    Um berechtigten Bedenken gegenüber Videoüberwachung zu begegnen, wird ein soziotechnisches Konzept vorgeschlagen, das eine reversible Anonymisierung von Bilddaten mit einer (möglichst zivil eingesetzten) Kontrollinstanz kombiniert, um so technische und interpersonelle Vertrauenskonzepte stimmig zu vermitteln.
     
    Export citation  
     
    Bookmark  
  26.  38
    Support of opportunities for shopfloor involvement through information and communication technologies.John R. Wilson - 2003 - AI and Society 17 (2):114-133.
    More companies are understanding the benefits of designing work to enhance, rather than minimise, the contributions of their employees within human-centred systems. To do this, they require their supportive subsystems (such as training, job, and team design, performance measurement and information) to provide people with the ability, motivation and opportunity to become increasingly involved. Opportunity for involvement will require different communication interfaces, providing data and background information both personally and at the work site or process. In the past few years, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  27.  22
    Torture Pornopticon: security Cameras, Self-Governance and Autonomy.Steve Jones - 2015 - In Linnie Blake & Xavier Aldana Reyes (eds.), Digital Horror: Haunted Technologies, Network Panic and the Found Footage Phenomenon. I.B. Tauris.
    ‘Torture porn’ films centre on themes of abduction, imprisonment and suffering. Within the subgenre, protagonists are typically placed under relentless surveillance by their captors. CCTV features in more than 45 contemporary torture-themed films. Security cameras signify a bridging point between the captors’ ability to observe and to control their prey. Founded on power-imbalance, torture porn’s prison-spaces are panoptical. Despite failing to encapsulate contemporary surveillance’s complexities, the panopticon remains a dominant paradigm within surveillance studies because it captures essential truths about (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  5
    Ciudades, Cámaras de Seguridad y Video-Vigilancia: Estado Del Arte y Perspectivas de Investigación.Vanesa Lio - 2015 - Astrolabio: Nueva Época 15:273-302.
    Durante las últimas décadas, la vinculación entre las imágenes y la seguridad pública se profundizó en dimensiones impensadas. Las políticas de seguridad incorporaron sistemáticamente circuitos cerrados de televisión (CCTV) para monitoreo del espacio público entre sus tecnologías para el control social y la prevención situacional del delito. Producto de la expansión de la video-vigilancia, comenzó a crecer notablemente el interés académico por la temática, sobre todo en Europa y América del Norte. América Latina, por su parte, se ha incorporado (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  22
    The Influence of the Presentation of Camera Surveillance on Cheating and Pro-Social Behavior.Anja M. Jansen, Ellen Giebels, Thomas J. L. van Rompay & Marianne Junger - 2018 - Frontiers in Psychology 9.
    Introduction - This paper is aimed at gaining more insight into the effects of camera-surveillance on behavior. This study investigates the effects of three different ways of ‘framing’ camera presence on cheating behavior and pro-social behavior. First, we explore the effect of presenting the camera as the medium through which an intimidating authority watches the participant. Second, we test the effect of presenting the camera as being a neutral, non-intimidating viewer. Third, we investigate whether a participant watching themselves via a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Privacy, democracy, and security.Annabelle Lever - 2013 - The Philosophers' Magazine 63:99-105.
    It is especially hard, at present, to read the newspapers without emitting a howl of anguish and outrage. Philosophy can heal some wounds but, in this case, political action may prove a better remedy than philosophy. It can therefore feel odd trying to think philosophically about surveillance at a time like this, rather than joining with like-minded people to protest the erosion of our civil liberties, the duplicity of our governments, and the failings in our political institutions - including our (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  53
    The model gap: cognitive systems in security applications and their ethical implications. [REVIEW]Tobias Matzner - 2016 - AI and Society 31 (1):95-102.
    The use of cognitive systems like pattern recognition or video tracking technology in security applications is becoming ever more common. The paper considers cases in which the cognitive systems are meant to assist human tasks by providing information, but the final decision is left to the human. All these systems and their various applications have a common feature: an intrinsic difference in how a situation or an event is assessed by a human being and a cognitive system. This difference, which (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation