Results for 'dataveillance'

22 found
Order:
  1.  30
    Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers’ Online Privacy Concerns.Laurence Ashworth & Clinton Free - 2006 - Journal of Business Ethics 67 (2):107-123.
    Technology used in online marketing has advanced to a state where collection, enhancement and aggregation of information are instantaneous. This proliferation of customer information focused technology brings with it a host of issues surrounding customer privacy. This article makes two key contributions to the debate concerning digital privacy. First, we use theories of justice to help understand the way consumers conceive of, and react to, privacy concerns. Specifically, it is argued that an important component of consumers' privacy concerns relates to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  2.  21
    Caring dataveillance and the construction of “good parenting”: Estonian parents’ and pre-teens’ reflections on the use of tracking technologies.Andra Siibak & Marit Sukk - 2021 - Communications 46 (3):446-467.
    Digital parenting tools, such as child-tracking technologies, play an ever-increasing role in contemporary child rearing. To explore opinions and experiences related to the use of such tracking devices, we conducted Q methodology and a semi-structured individual interview-study with Estonian parents and their 8- to 13-year-old pre-teens. Our aim was to study how such caring dataveillance was rationalized within the families, and to explore the dominant parenting values associated with the practice. Relying upon communication privacy management theory, the issues of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  11
    DNA dataveillance: protecting the innocent?Anna Vartapetiance Salmasi & Lee Gillam - 2010 - Journal of Information, Communication and Ethics in Society 8 (3):270-288.
    PurposeThe purpose of this paper is to discuss the UK National DNA Database and some of the controversies surrounding it with reference to legal and ethical issues, focusing particularly on privacy and human rights. Governance of this database involves specific exemptions from the Data Protection Act, and this gives a rise to concerns regarding both the extent of surveillance on the UK population and the possibility for harm to all citizens. This is of wider importance since every current citizen, and (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  4.  3
    Marketing dataveillance and digital privacy: Using theories of justice to understand consumers' online privacy concerns. [REVIEW]Laurence Ashworth & Clinton Free - 2006 - Journal of Business Ethics 67 (2):107 - 123.
    Technology used in online marketing has advanced to a state where collection, enhancement and aggregation of information are instantaneous. This proliferation of customer information focused technology brings with it a host of issues surrounding customer privacy. This article makes two key contributions to the debate concerning digital privacy. First, we use theories of justice to help understand the way consumers conceive of, and react to, privacy concerns. Specifically, it is argued that an important component of consumers’ privacy concerns relates to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  5.  25
    The Chilling Effects of Digital Dataveillance: A Theoretical Model and an Empirical Research Agenda.Michael Latzer, Noemi Festic & Moritz Büchi - 2022 - Big Data and Society 9 (1).
    People's sense of being subject to digital dataveillance can cause them to restrict their digital communication behavior. Such a chilling effect is essentially a form of self-censorship in everyday digital media use with the attendant risks of undermining individual autonomy and well-being. This article combines the existing theoretical and limited empirical work on surveillance and chilling effects across fields with an analysis of novel data toward a research agenda. The institutional practice of dataveillance—the automated, continuous, and unspecific collection, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  6
    The counter‐control revolution: “silent control” of individuals through dataveillance systems.Yohko Orito - 2011 - Journal of Information, Communication and Ethics in Society 9 (1):5-19.
    PurposeThe purpose of this paper is to examine the social impacts of “silent control” of individuals by means of the architecture of dataveillance systems. It addresses the question whether individuals, in reality, can actually determine autonomously the kinds of information that they can acquire and convey in today's dataveillance environments. The paper argues that there is a risk of a “counter‐control revolution” that may threaten to reverse the “control revolution” described by Shapiro.Design/methodology/approachUsing relevant business cases, this paper describes (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  7.  23
    Researching the Mexico-US border: a tale of dataveillance.Mitxy Mabel Meneses Gutierrez - 2023 - Journal of Global Ethics 19 (3):347-358.
    The Mexico-U.S. border is a space considered `smart´ due to the amount of surveillance technology used for national security purposes. The technological ecology consists of integrated fixed towers, remote video surveillance systems, mobile video surveillance systems, Predator B surveillance drones, mobile X-ray units, automated license plate readers, cell phone tracking towers, implanted motion sensors, biometric data collection, and DNA sampling (Aizeki et al. Citation2021). Whilst these instruments are usually linked to irregular border crossers, transborder commuters, who physically cross the border (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  5
    Stream your brain! Speculative economy of the IoT and its pan-kinetic dataveillance.Sungyong Ahn - 2021 - Big Data and Society 8 (2).
    It is now a common belief that the truths of our lives are hidden in the databases streamed from our interactions in smart environments. In this current hype of big data, the Internet of Things has been suggested as the idea to embed small sensors and actuators everywhere to unfold the truths beneath the surfaces of everything. However, remaining the technology that promises more than it can provide thus far, more important for the IoT’s actual expansion to various social domains (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  9.  26
    Symposium introduction: the ethics of border controls in a digital age.Natasha Saunders & Alex Sager - 2023 - Journal of Global Ethics 19 (3):273-281.
    This symposium brings into conversation normative political theory on migration and critical border/migration studies, with a particular focus on digital border control technology. Normative theorists have long been concerned with questions about the extent and nature of control over migration that the state should exercise, and the balance of rights and duties between states and migrants. To date, however, there has been little reflection among such theorists on digital border control technology. Critical border/migration studies scholars, on the other hand, have (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10.  78
    Bentham, Deleuze and Beyond: An Overview of Surveillance Theories from the Panopticon to Participation.Maša Galič, Tjerk Timan & Bert-Jaap Koops - 2017 - Philosophy and Technology 30 (1):9-37.
    This paper aims to provide an overview of surveillance theories and concepts that can help to understand and debate surveillance in its many forms. As scholars from an increasingly wide range of disciplines are discussing surveillance, this literature review can offer much-needed common ground for the debate. We structure surveillance theory in three roughly chronological/thematic phases. The first two conceptualise surveillance through comprehensive theoretical frameworks which are elaborated in the third phase. The first phase, featuring Bentham and Foucault, offers architectural (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  11.  11
    Digital failure: Unbecoming the “good” data subject through entropic, fugitive, and queer data.Lauren E. Bridges - 2021 - Big Data and Society 8 (1).
    This paper explores the political potential of digital failure as a refusal to work in service of today’s dataveillance society. Moving beyond criticisms of flawed digital systems, this paper traces the moments of digital failure that seek to break, rather than fix, existing systems. Instead, digital failure is characterized by pesky data that sneaks through the cracks of digital capitalism and dissipates into the unproductive; it supports run-away data prone to misidentifications by digital marketers, coders, and content moderators; and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  12. Fichte's Passport - A Philosophy of the Police.Grégoire Chamayou & Kieran Aarons - 2013 - Theory and Event 16 (2). Translated by Kieran Aarons.
    Fichte's philosophy represented one of the first coherent attempts to provide a utopian philosophical foundation for preventative police power, one which anticipated in surprising ways the fundamental logical premises of modern dataveillance or "datapower." This article examines Fichte's proposals for a new system of police passports and the logic of control on which it rests, contextualizing it within the transformation of police practices during his lifetime. It concludes with a discussion of Hegel's criticism of the logical incoherence of securitarian (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  8
    La ineptitud del digital academic: precariedad y salud en el mundo universitario.Francesca Coin - 2019 - Recerca.Revista de Pensament I Anàlisi 24 (1):114-133.
    Inspirado por el trabajo de Deborah Lupton, Inger Mewburn y Pat Thomson, The Digital Academic: Critical Perspectives on Digital Technologies in Higher Education (2017), este artículo examina el yo digital académico contemporáneo. Más allá de la utilidad que pueden tener en cuanto a la interacción, plataformas digitales como Academia.edu, Linkedin, Google Scholar, etc. transforman al académico o académica en un sujeto digital cuyo rendimiento se controla constantemente hasta convertirlo en prisionero de una creciente dataveillance, una vigilancia a través de (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14.  13
    Crowd-Sourced Intelligence Agency: Prototyping counterveillance.Derek Curry & Jennifer Gradecki - 2017 - Big Data and Society 4 (1).
    This paper discusses how an interactive artwork, the Crowd-Sourced Intelligence Agency, can contribute to discussions of Big Data intelligence analytics. The CSIA is a publicly accessible Open Source Intelligence system that was constructed using information gathered from technical manuals, research reports, academic papers, leaked documents, and Freedom of Information Act files. Using a visceral heuristic, the CSIA demonstrates how the statistical correlations made by automated classification systems are different from human judgment and can produce false-positives, as well as how the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  15.  7
    Data and Growth in Education: A Deweyan Analysis.Kevin Taylor - 2023 - Education and Culture 38 (1):8-25.
    Abstract:For Dewey, growth in the educative process means education that enriches and expands one’s experience as it prepares students for not only a vocation but also entry into and transaction with the world. In few places can we see growth, generally understood, to be occurring as fast as in big data technology. This essay begins with an overview of what big data is, specifically what big data looks like in education as understood through learning management system platforms but also data (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  16.  9
    Social data governance: From reflective practices to comparative synthesis.Jing Wang & Jun Liu - 2022 - Big Data and Society 9 (2).
    This special theme brings together reflections and deliberations regarding the design, implementation, and development of data governance. By addressing “social data governance” as the keyword of the special theme, we aim to further the discussion on a contextual understanding of both the governing foundations and effects of data, dataism, and datafication in different societies. Such a discussion reminds us to pay particular attention to—and thus account for—the social dynamics that underpin and contextualize the design, operation, and promotion of quantified governing (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  35
    Between transparency and surveillance.Giovanna Borradori - 2016 - Philosophy and Social Criticism 42 (4-5):456-464.
    The recent wave of whistleblowers and cyber-dissidents, from Julian Assange to Edward Snowden, has declared war against surveillance. In this context, transparency is presented as an attainable political goal that can be delivered in flesh and bones by spectacular and quasi-messianic moments of disclosure. The thesis of this article is that, despite its progressive promise, the project of releasing classified documents is in line with the Orwellian cold war trope of Big Brother rather than with the complex geography of surveillance (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  18.  46
    Between transparency and surveillance: Politics of the secret.David M. Rasmussen, Volker Kaul & Alessandro Ferrara - 2016 - Philosophy and Social Criticism 42 (4-5):456-464.
    The recent wave of whistleblowers and cyber-dissidents, from Julian Assange to Edward Snowden, has declared war against surveillance. In this context, transparency is presented as an attainable political goal that can be delivered in flesh and bones by spectacular and quasi-messianic moments of disclosure. The thesis of this article is that, despite its progressive promise, the project of releasing classified documents is in line with the Orwellian cold war trope of Big Brother rather than with the complex geography of surveillance (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  19.  32
    Big data, surveillance, and migration: a neo-republican account.Alex Sager - 2023 - Journal of Global Ethics 19 (3):335-346.
    Big data, artificial intelligence, and increasingly precise biometric techniques have given state and private organizations unprecedented scope and power for the surveillance and dataveillance of migrants. In many cases, these technologies have evolved faster than our legal, political, and ethical mechanisms. This paper, drawing on current discussions of justice and non-domination, proposes a non-domination-based ethics of digital surveillance and mobility, in which the legitimacy of these technologies depends on their avoidance of the arbitrary use of power. This allows us (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  22
    Public sector engagement with online identity management.D. Barnard-Wills & D. Ashenden - 2010 - Identity in the Information Society 3 (3):657-674.
    The individual management of online identity, as part of a wider politics of personal information, privacy, and dataveillance, is an area where public policy is developing and where the public sector attempts to intervene. This paper attempts to understand the strategies and methods through which the UK government and public sector is engaging in online identity management. The analysis is framed by the analytics of government (Dean 2010 ) and governmentality (Miller and Rose 2008 ). This approach draws attention (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark  
  21.  23
    Children’s digital playgrounds as data assemblages: Problematics of privacy, personalization, and promotional culture.Leslie Regan Shade & Karen Louise Smith - 2018 - Big Data and Society 5 (2).
    Children’s digital playgrounds have evolved from commercialized digital spaces such as websites and games to include an array of convergent digital media consisting of social media platforms, mobile apps, and the internet of toys. In these digital spaces, children’s data is shared with companies for analytics, personalization, and advertising. This article describes children’s digital playgrounds as a data assemblage involving commercial surveillance of children, ages 3–12. The privacy sweep is used as a method to follow the personal information traces that (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  10
    On Arbormosis: Becoming-Cyborg, Machinic Subjection, and the Ethico-Aesthetic of User-Friendly Design.S. L. Revoy - 2018 - Deleuze and Guattari Studies 12 (4):572-593.
    This paper suggests that the imbrication of user-friendly software and the posthuman has increasingly been revealed as an intrinsically arborescent relationship, one premised upon the striation of personal information through different forms of software media and allowing for unprecedented avenues of control and subjective manipulation. My analysis begins with a conceptualisation of user-friendliness, tracing its development as the majoritarian style of software design. In assessing the effects of this process of subjective imbrication with arborescent software technology, it is suggested that (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark