CINXE.COM
Surveillance Studies Research Papers - Academia.edu
<!DOCTYPE html> <html lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" class="wf-loading"> <head prefix="og: https://ogp.me/ns# fb: https://ogp.me/ns/fb# academia: https://ogp.me/ns/fb/academia#"> <meta charset="utf-8"> <meta name=viewport content="width=device-width, initial-scale=1"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <title>Surveillance Studies Research Papers - Academia.edu</title> <!-- _ _ _ | | (_) | | __ _ ___ __ _ __| | ___ _ __ ___ _ __ _ ___ __| |_ _ / _` |/ __/ _` |/ _` |/ _ \ '_ ` _ \| |/ _` | / _ \/ _` | | | | | (_| | (_| (_| | (_| | __/ | | | | | | (_| || __/ (_| | |_| | \__,_|\___\__,_|\__,_|\___|_| |_| |_|_|\__,_(_)___|\__,_|\__,_| We're hiring! See https://www.academia.edu/hiring --> <link href="//a.academia-assets.com/images/favicons/favicon-production.ico" rel="shortcut icon" type="image/vnd.microsoft.icon"> <link rel="apple-touch-icon" sizes="57x57" href="//a.academia-assets.com/images/favicons/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="60x60" href="//a.academia-assets.com/images/favicons/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="72x72" href="//a.academia-assets.com/images/favicons/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="76x76" href="//a.academia-assets.com/images/favicons/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="114x114" href="//a.academia-assets.com/images/favicons/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="120x120" href="//a.academia-assets.com/images/favicons/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="144x144" href="//a.academia-assets.com/images/favicons/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="152x152" href="//a.academia-assets.com/images/favicons/apple-touch-icon-152x152.png"> <link rel="apple-touch-icon" sizes="180x180" href="//a.academia-assets.com/images/favicons/apple-touch-icon-180x180.png"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-194x194.png" sizes="194x194"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/android-chrome-192x192.png" sizes="192x192"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-16x16.png" sizes="16x16"> <link rel="manifest" href="//a.academia-assets.com/images/favicons/manifest.json"> <meta name="msapplication-TileColor" content="#2b5797"> <meta name="msapplication-TileImage" content="//a.academia-assets.com/images/favicons/mstile-144x144.png"> <meta name="theme-color" content="#ffffff"> <script> window.performance && window.performance.measure && window.performance.measure("Time To First Byte", "requestStart", "responseStart"); </script> <script> (function() { if (!window.URLSearchParams || !window.history || !window.history.replaceState) { return; } var searchParams = new URLSearchParams(window.location.search); var paramsToDelete = [ 'fs', 'sm', 'swp', 'iid', 'nbs', 'rcc', // related content category 'rcpos', // related content carousel position 'rcpg', // related carousel page 'rchid', // related content hit id 'f_ri', // research interest id, for SEO tracking 'f_fri', // featured research interest, for SEO tracking (param key without value) 'f_rid', // from research interest directory for SEO tracking 'f_loswp', // from research interest pills on LOSWP sidebar for SEO tracking 'rhid', // referrring hit id ]; if (paramsToDelete.every((key) => searchParams.get(key) === null)) { return; } paramsToDelete.forEach((key) => { searchParams.delete(key); }); var cleanUrl = new URL(window.location.href); cleanUrl.search = searchParams.toString(); history.replaceState({}, document.title, cleanUrl); })(); </script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "by_tag", 'action': "show_one", 'controller_action': 'by_tag#show_one', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script type="text/javascript"> window.sendUserTiming = function(timingName) { if (!(window.performance && window.performance.measure)) return; var entries = window.performance.getEntriesByName(timingName, "measure"); if (entries.length !== 1) return; var timingValue = Math.round(entries[0].duration); gtag('event', 'timing_complete', { name: timingName, value: timingValue, event_category: 'User-centric', }); }; window.sendUserTiming("Time To First Byte"); </script> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="QNWkwzYC2MgpPhWM7Tp3xgXX9mcMoUECqBYpsuocdERYT6h1pE3_fDyElf4LenfX2IJjMO4tAiTSRzKNYkr32Q" /> <link href="/Documents/in/Surveillance_Studies?after=50%2C65836831" rel="next" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&family=Gupter:wght@400;500;700&family=IBM+Plex+Mono:wght@300;400&family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-2b6f90dbd75f5941bc38f4ad716615f3ac449e7398313bb3bc225fba451cd9fa.css" /> <meta name="description" content="View Surveillance Studies Research Papers on Academia.edu for free." /> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs" /> <script> var $controller_name = 'by_tag'; var $action_name = "show_one"; var $rails_env = 'production'; var $app_rev = '6a36834205da247c5c3d1eb03891842b07e5c8ae'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.Aedu = { hit_data: null }; window.Aedu.SiteStats = {"premium_universities_count":14029,"monthly_visitors":"102 million","monthly_visitor_count":102411812,"monthly_visitor_count_in_millions":102,"user_count":283229101,"paper_count":55203019,"paper_count_in_millions":55,"page_count":432000000,"page_count_in_millions":432,"pdf_count":16500000,"pdf_count_in_millions":16}; window.Aedu.serverRenderTime = new Date(1740010417000); window.Aedu.timeDifference = new Date().getTime() - 1740010417000; window.Aedu.isUsingCssV1 = false; window.Aedu.enableLocalization = true; window.Aedu.activateFullstory = false; window.Aedu.serviceAvailability = { status: {"attention_db":"on","bibliography_db":"on","contacts_db":"on","email_db":"on","indexability_db":"on","mentions_db":"on","news_db":"on","notifications_db":"on","offsite_mentions_db":"on","redshift":"on","redshift_exports_db":"on","related_works_db":"on","ring_db":"on","user_tests_db":"on"}, serviceEnabled: function(service) { return this.status[service] === "on"; }, readEnabled: function(service) { return this.serviceEnabled(service) || this.status[service] === "read_only"; }, }; window.Aedu.viewApmTrace = function() { // Check if x-apm-trace-id meta tag is set, and open the trace in APM // in a new window if it is. var apmTraceId = document.head.querySelector('meta[name="x-apm-trace-id"]'); if (apmTraceId) { var traceId = apmTraceId.content; // Use trace ID to construct URL, an example URL looks like: // https://app.datadoghq.com/apm/traces?query=trace_id%31298410148923562634 var apmUrl = 'https://app.datadoghq.com/apm/traces?query=trace_id%3A' + traceId; window.open(apmUrl, '_blank'); } }; </script> <!--[if lt IE 9]> <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.2/html5shiv.min.js"></script> <![endif]--> <link href="https://fonts.googleapis.com/css?family=Roboto:100,100i,300,300i,400,400i,500,500i,700,700i,900,900i" rel="stylesheet"> <link rel="preload" href="//maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css" as="style" onload="this.rel='stylesheet'"> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/libraries-a9675dcb01ec4ef6aa807ba772c7a5a00c1820d3ff661c1038a20f80d06bb4e4.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/academia-40698df34f913bd208bb70f09d2feb7c6286046250be17a4db35bba2c08b0e2f.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system_legacy-056a9113b9a0f5343d013b29ee1929d5a18be35fdcdceb616600b4db8bd20054.css" /> <script src="//a.academia-assets.com/assets/webpack_bundles/runtime-bundle-005434038af4252ca37c527588411a3d6a0eabb5f727fac83f8bbe7fd88d93bb.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/webpack_libraries_and_infrequently_changed.wjs-bundle-a22f75d8519394c21253dae46c8c5d60ad36ea68c7d494347ec64229d8c1cf85.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/core_webpack.wjs-bundle-5708a105dd66b4c7d0ef30b7c094b1048423f0042bd2a7b123f2d99ee3cf46d9.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/sentry.wjs-bundle-5fe03fddca915c8ba0f7edbe64c194308e8ce5abaed7bffe1255ff37549c4808.js"></script> <script> jade = window.jade || {}; jade.helpers = window.$h; jade._ = window._; </script> <!-- Google Tag Manager --> <script id="tag-manager-head-root">(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer_old','GTM-5G9JF7Z');</script> <!-- End Google Tag Manager --> <script> window.gptadslots = []; window.googletag = window.googletag || {}; window.googletag.cmd = window.googletag.cmd || []; </script> <script type="text/javascript"> // TODO(jacob): This should be defined, may be rare load order problem. // Checking if null is just a quick fix, will default to en if unset. // Better fix is to run this immedietely after I18n is set. if (window.I18n != null) { I18n.defaultLocale = "en"; I18n.locale = "en"; I18n.fallbacks = true; } </script> <link rel="canonical" href="https://www.academia.edu/Documents/in/Surveillance_Studies" /> </head> <!--[if gte IE 9 ]> <body class='ie ie9 c-by_tag a-show_one logged_out u-bgColorWhite'> <![endif]--> <!--[if !(IE) ]><!--> <body class='c-by_tag a-show_one logged_out u-bgColorWhite'> <!--<![endif]--> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script><script>window.fbAsyncLoad = function() { // Protection against double calling of this function if (window.FB) { return; } (function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); } if (!window.defer_facebook) { // Autoload if not deferred window.fbAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.fbAsyncLoad(); }, 5000); }</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script><script>window.googleAsyncLoad = function() { // Protection against double calling of this function (function(d) { var js; var id = 'google-jssdk'; var ref = d.getElementsByTagName('script')[0]; if (d.getElementById(id)) { return; } js = d.createElement('script'); js.id = id; js.async = true; js.onload = loadGoogle; js.src = "https://accounts.google.com/gsi/client" ref.parentNode.insertBefore(js, ref); }(document)); } if (!window.defer_google) { // Autoload if not deferred window.googleAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.googleAsyncLoad(); }, 5000); }</script> <div id="tag-manager-body-root"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5G9JF7Z" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Event listeners for analytics --> <script> window.addEventListener('load', function() { if (document.querySelector('input[name="commit"]')) { document.querySelector('input[name="commit"]').addEventListener('click', function() { gtag('event', 'click', { event_category: 'button', event_label: 'Log In' }) }) } }); </script> </div> <script>var _comscore = _comscore || []; _comscore.push({ c1: "2", c2: "26766707" }); (function() { var s = document.createElement("script"), el = document.getElementsByTagName("script")[0]; s.async = true; s.src = (document.location.protocol == "https:" ? "https://sb" : "http://b") + ".scorecardresearch.com/beacon.js"; el.parentNode.insertBefore(s, el); })();</script><img src="https://sb.scorecardresearch.com/p?c1=2&c2=26766707&cv=2.0&cj=1" style="position: absolute; visibility: hidden" /> <div id='react-modal'></div> <div class='DesignSystem'> <a class='u-showOnFocus' href='#site'> Skip to main content </a> </div> <div id="upgrade_ie_banner" style="display: none;"><p>Academia.edu no longer supports Internet Explorer.</p><p>To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to <a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.getElementById('upgrade_ie_banner').style.display = 'block'; }</script> <div class="DesignSystem bootstrap ShrinkableNav no-sm no-md"><div class="navbar navbar-default main-header"><div class="container-wrapper" id="main-header-container"><div class="container"><div class="navbar-header"><div class="nav-left-wrapper u-mt0x"><div class="nav-logo"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="visible-xs-inline-block" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hidden-xs" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a></div><div class="nav-search"><div class="SiteSearch-wrapper select2-no-default-pills"><form class="js-SiteSearch-form DesignSystem" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><i class="SiteSearch-icon fa fa-search u-fw700 u-positionAbsolute u-tcGrayDark"></i><input class="js-SiteSearch-form-input SiteSearch-form-input form-control" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" value="" /></form></div></div></div><div class="nav-right-wrapper pull-right"><ul class="NavLinks js-main-nav list-unstyled"><li class="NavLinks-link"><a class="js-header-login-url Button Button--inverseGray Button--sm u-mb4x" id="nav_log_in" rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="NavLinks-link u-p0x"><a class="Button Button--inverseGray Button--sm u-mb4x" rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li></ul><button class="hidden-lg hidden-md hidden-sm u-ml4x navbar-toggle collapsed" data-target=".js-mobile-header-links" data-toggle="collapse" type="button"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></button></div></div><div class="collapse navbar-collapse js-mobile-header-links"><ul class="nav navbar-nav"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li><li class="u-borderColorGrayLight u-borderBottom1 js-mobile-nav-expand-trigger"><a href="#">more <span class="caret"></span></a></li><li><ul class="js-mobile-nav-expand-section nav navbar-nav u-m0x collapse"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/about">About</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/press">Press</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/documents">Papers</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/hiring"><i class="fa fa-briefcase"></i> We're Hiring!</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://support.academia.edu/hc/en-us"><i class="fa fa-question-circle"></i> Help Center</a></li><li class="js-mobile-nav-collapse-trigger u-borderColorGrayLight u-borderBottom1 dropup" style="display:none"><a href="#">less <span class="caret"></span></a></li></ul></li></ul></div></div></div><script>(function(){ var $moreLink = $(".js-mobile-nav-expand-trigger"); var $lessLink = $(".js-mobile-nav-collapse-trigger"); var $section = $('.js-mobile-nav-expand-section'); $moreLink.click(function(ev){ ev.preventDefault(); $moreLink.hide(); $lessLink.show(); $section.collapse('show'); }); $lessLink.click(function(ev){ ev.preventDefault(); $moreLink.show(); $lessLink.hide(); $section.collapse('hide'); }); })() if ($a.is_logged_in() || false) { new Aedu.NavigationController({ el: '.js-main-nav', showHighlightedNotification: false }); } else { $(".js-header-login-url").attr("href", $a.loginUrlWithRedirect()); } Aedu.autocompleteSearch = new AutocompleteSearch({el: '.js-SiteSearch-form'});</script></div></div> <div id='site' class='fixed'> <div id="content" class="clearfix"> <script>document.addEventListener('DOMContentLoaded', function(){ var $dismissible = $(".dismissible_banner"); $dismissible.click(function(ev) { $dismissible.hide(); }); });</script> <div class="DesignSystem" style="margin-top:-40px"><div class="PageHeader"><div class="container"><div class="row"><style type="text/css">.sor-abstract { display: -webkit-box; overflow: hidden; text-overflow: ellipsis; -webkit-line-clamp: 3; -webkit-box-orient: vertical; }</style><div class="col-xs-12 clearfix"><div class="u-floatLeft"><h1 class="PageHeader-title u-m0x u-fs30">Surveillance Studies</h1><div class="u-tcGrayDark">111,578 Followers</div><div class="u-tcGrayDark u-mt2x">Recent papers in <b>Surveillance Studies</b></div></div></div></div></div></div><div class="TabbedNavigation"><div class="container"><div class="row"><div class="col-xs-12 clearfix"><ul class="nav u-m0x u-p0x list-inline u-displayFlex"><li class="active"><a href="https://www.academia.edu/Documents/in/Surveillance_Studies">Top Papers</a></li><li><a href="https://www.academia.edu/Documents/in/Surveillance_Studies/MostCited">Most Cited Papers</a></li><li><a href="https://www.academia.edu/Documents/in/Surveillance_Studies/MostDownloaded">Most Downloaded Papers</a></li><li><a href="https://www.academia.edu/Documents/in/Surveillance_Studies/MostRecent">Newest Papers</a></li><li><a class="" href="https://www.academia.edu/People/Surveillance_Studies">People</a></li></ul></div><style type="text/css">ul.nav{flex-direction:row}@media(max-width: 567px){ul.nav{flex-direction:column}.TabbedNavigation li{max-width:100%}.TabbedNavigation li.active{background-color:var(--background-grey, #dddde2)}.TabbedNavigation li.active:before,.TabbedNavigation li.active:after{display:none}}</style></div></div></div><div class="container"><div class="row"><div class="col-xs-12"><div class="u-displayFlex"><div class="u-flexGrow1"><div class="works"><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_44971698" data-work_id="44971698" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/44971698/La_soci%C3%A9t%C3%A9_de_vigilance_Auto_surveillance_d%C3%A9lation_et_haines_s%C3%A9curitaires">La société de vigilance. Auto-surveillance, délation et haines sécuritaires</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Prolongeant ses travaux sur la répression, Vanessa Codaccioni analyse et dénonce les ressorts de « la société de vigilance ». Surveillance massive, appel à la délation, légitimation de la répression : une nouvelle servitude volontaire est... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_44971698" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Prolongeant ses travaux sur la répression, Vanessa Codaccioni analyse et dénonce les ressorts de « la société de vigilance ». Surveillance massive, appel à la délation, légitimation de la répression : une nouvelle servitude volontaire est insidieusement imposée aux citoyens qui deviennent des acteurs incontournables de cette dynamique sécuritaire.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/44971698" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="5f3cd5cb6c5914188341a10ccc248f43" rel="nofollow" data-download="{"attachment_id":65507519,"asset_id":44971698,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/65507519/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="37239375" href="https://univ-paris8.academia.edu/VanessaCodaccioni">Vanessa Codaccioni</a><script data-card-contents-for-user="37239375" type="text/json">{"id":37239375,"first_name":"Vanessa","last_name":"Codaccioni","domain_name":"univ-paris8","page_name":"VanessaCodaccioni","display_name":"Vanessa Codaccioni","profile_url":"https://univ-paris8.academia.edu/VanessaCodaccioni?f_ri=7480","photo":"https://0.academia-photos.com/37239375/11146382/12438743/s65_vanessa.codaccioni.jpg_oh_082d6f06d304c59642e3b24f29c22e6a_oe_57196058"}</script></span></span></li><li class="js-paper-rank-work_44971698 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="44971698"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 44971698, container: ".js-paper-rank-work_44971698", }); });</script></li><li class="js-percentile-work_44971698 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 44971698; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_44971698"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_44971698 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="44971698"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 44971698; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=44971698]").text(description); $(".js-view-count-work_44971698").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_44971698").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="44971698"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">15</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="3332" rel="nofollow" href="https://www.academia.edu/Documents/in/Resilience">Resilience</a>, <script data-card-contents-for-ri="3332" type="text/json">{"id":3332,"name":"Resilience","url":"https://www.academia.edu/Documents/in/Resilience?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="6942" rel="nofollow" href="https://www.academia.edu/Documents/in/Discrimination">Discrimination</a>, <script data-card-contents-for-ri="6942" type="text/json">{"id":6942,"name":"Discrimination","url":"https://www.academia.edu/Documents/in/Discrimination?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a>, <script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="12420" rel="nofollow" href="https://www.academia.edu/Documents/in/Neoliberalism">Neoliberalism</a><script data-card-contents-for-ri="12420" type="text/json">{"id":12420,"name":"Neoliberalism","url":"https://www.academia.edu/Documents/in/Neoliberalism?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=44971698]'), work: {"id":44971698,"title":"La société de vigilance. Auto-surveillance, délation et haines sécuritaires","created_at":"2021-01-25T02:14:28.117-08:00","url":"https://www.academia.edu/44971698/La_soci%C3%A9t%C3%A9_de_vigilance_Auto_surveillance_d%C3%A9lation_et_haines_s%C3%A9curitaires?f_ri=7480","dom_id":"work_44971698","summary":"Prolongeant ses travaux sur la répression, Vanessa Codaccioni analyse et dénonce les ressorts de « la société de vigilance ». Surveillance massive, appel à la délation, légitimation de la répression : une nouvelle servitude volontaire est insidieusement imposée aux citoyens qui deviennent des acteurs incontournables de cette dynamique sécuritaire.","downloadable_attachments":[{"id":65507519,"asset_id":44971698,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":37239375,"first_name":"Vanessa","last_name":"Codaccioni","domain_name":"univ-paris8","page_name":"VanessaCodaccioni","display_name":"Vanessa Codaccioni","profile_url":"https://univ-paris8.academia.edu/VanessaCodaccioni?f_ri=7480","photo":"https://0.academia-photos.com/37239375/11146382/12438743/s65_vanessa.codaccioni.jpg_oh_082d6f06d304c59642e3b24f29c22e6a_oe_57196058"}],"research_interests":[{"id":3332,"name":"Resilience","url":"https://www.academia.edu/Documents/in/Resilience?f_ri=7480","nofollow":true},{"id":6942,"name":"Discrimination","url":"https://www.academia.edu/Documents/in/Discrimination?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":12420,"name":"Neoliberalism","url":"https://www.academia.edu/Documents/in/Neoliberalism?f_ri=7480","nofollow":true},{"id":13546,"name":"Resilience (Sustainability)","url":"https://www.academia.edu/Documents/in/Resilience_Sustainability_?f_ri=7480"},{"id":24892,"name":"Surveillance","url":"https://www.academia.edu/Documents/in/Surveillance?f_ri=7480"},{"id":27879,"name":"Racial and ethnic discrimination","url":"https://www.academia.edu/Documents/in/Racial_and_ethnic_discrimination?f_ri=7480"},{"id":30462,"name":"Vigilantism","url":"https://www.academia.edu/Documents/in/Vigilantism?f_ri=7480"},{"id":89709,"name":"Antiterrorism","url":"https://www.academia.edu/Documents/in/Antiterrorism?f_ri=7480"},{"id":136928,"name":"Criminal profiling","url":"https://www.academia.edu/Documents/in/Criminal_profiling?f_ri=7480"},{"id":161715,"name":"Vigilance","url":"https://www.academia.edu/Documents/in/Vigilance?f_ri=7480"},{"id":285921,"name":"Alertness and Vigilance Research","url":"https://www.academia.edu/Documents/in/Alertness_and_Vigilance_Research?f_ri=7480"},{"id":379669,"name":"Profiling","url":"https://www.academia.edu/Documents/in/Profiling?f_ri=7480"},{"id":761870,"name":"Terrorism and Counterterrorism","url":"https://www.academia.edu/Documents/in/Terrorism_and_Counterterrorism?f_ri=7480"},{"id":972807,"name":"Alertness","url":"https://www.academia.edu/Documents/in/Alertness?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_44971727" data-work_id="44971727" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/44971727/La_soci%C3%A9t%C3%A9_vigilante_Auto_surveillance_d%C3%A9lation_et_haines_s%C3%A9curitaires">La société vigilante. Auto-surveillance, délation et haines sécuritaires</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Prolongeant ses travaux sur la répression, Vanessa Codaccioni analyse et dénonce les ressorts de « la société de vigilance ». Surveillance massive, appel à la délation, légitimation de la répression : une nouvelle servitude volontaire est... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_44971727" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Prolongeant ses travaux sur la répression, Vanessa Codaccioni analyse et dénonce les ressorts de « la société de vigilance ». Surveillance massive, appel à la délation, légitimation de la répression : une nouvelle servitude volontaire est insidieusement imposée aux citoyens qui deviennent des acteurs incontournables de cette dynamique sécuritaire.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/44971727" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="fb9e73e07d4406030494a0d4d2764b67" rel="nofollow" data-download="{"attachment_id":65507424,"asset_id":44971727,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/65507424/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="37239375" href="https://univ-paris8.academia.edu/VanessaCodaccioni">Vanessa Codaccioni</a><script data-card-contents-for-user="37239375" type="text/json">{"id":37239375,"first_name":"Vanessa","last_name":"Codaccioni","domain_name":"univ-paris8","page_name":"VanessaCodaccioni","display_name":"Vanessa Codaccioni","profile_url":"https://univ-paris8.academia.edu/VanessaCodaccioni?f_ri=7480","photo":"https://0.academia-photos.com/37239375/11146382/12438743/s65_vanessa.codaccioni.jpg_oh_082d6f06d304c59642e3b24f29c22e6a_oe_57196058"}</script></span></span></li><li class="js-paper-rank-work_44971727 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="44971727"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 44971727, container: ".js-paper-rank-work_44971727", }); });</script></li><li class="js-percentile-work_44971727 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 44971727; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_44971727"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_44971727 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="44971727"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 44971727; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=44971727]").text(description); $(".js-view-count-work_44971727").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_44971727").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="44971727"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">18</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="3277" rel="nofollow" href="https://www.academia.edu/Documents/in/Race_and_Racism">Race and Racism</a>, <script data-card-contents-for-ri="3277" type="text/json">{"id":3277,"name":"Race and Racism","url":"https://www.academia.edu/Documents/in/Race_and_Racism?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="3332" rel="nofollow" href="https://www.academia.edu/Documents/in/Resilience">Resilience</a>, <script data-card-contents-for-ri="3332" type="text/json">{"id":3332,"name":"Resilience","url":"https://www.academia.edu/Documents/in/Resilience?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="6942" rel="nofollow" href="https://www.academia.edu/Documents/in/Discrimination">Discrimination</a>, <script data-card-contents-for-ri="6942" type="text/json">{"id":6942,"name":"Discrimination","url":"https://www.academia.edu/Documents/in/Discrimination?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a><script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=44971727]'), work: {"id":44971727,"title":"La société vigilante. Auto-surveillance, délation et haines sécuritaires","created_at":"2021-01-25T02:17:48.884-08:00","url":"https://www.academia.edu/44971727/La_soci%C3%A9t%C3%A9_vigilante_Auto_surveillance_d%C3%A9lation_et_haines_s%C3%A9curitaires?f_ri=7480","dom_id":"work_44971727","summary":"Prolongeant ses travaux sur la répression, Vanessa Codaccioni analyse et dénonce les ressorts de « la société de vigilance ». Surveillance massive, appel à la délation, légitimation de la répression : une nouvelle servitude volontaire est insidieusement imposée aux citoyens qui deviennent des acteurs incontournables de cette dynamique sécuritaire.","downloadable_attachments":[{"id":65507424,"asset_id":44971727,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":37239375,"first_name":"Vanessa","last_name":"Codaccioni","domain_name":"univ-paris8","page_name":"VanessaCodaccioni","display_name":"Vanessa Codaccioni","profile_url":"https://univ-paris8.academia.edu/VanessaCodaccioni?f_ri=7480","photo":"https://0.academia-photos.com/37239375/11146382/12438743/s65_vanessa.codaccioni.jpg_oh_082d6f06d304c59642e3b24f29c22e6a_oe_57196058"}],"research_interests":[{"id":3277,"name":"Race and Racism","url":"https://www.academia.edu/Documents/in/Race_and_Racism?f_ri=7480","nofollow":true},{"id":3332,"name":"Resilience","url":"https://www.academia.edu/Documents/in/Resilience?f_ri=7480","nofollow":true},{"id":6942,"name":"Discrimination","url":"https://www.academia.edu/Documents/in/Discrimination?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":12420,"name":"Neoliberalism","url":"https://www.academia.edu/Documents/in/Neoliberalism?f_ri=7480"},{"id":20594,"name":"Cyber crime","url":"https://www.academia.edu/Documents/in/Cyber_crime?f_ri=7480"},{"id":24892,"name":"Surveillance","url":"https://www.academia.edu/Documents/in/Surveillance?f_ri=7480"},{"id":27879,"name":"Racial and ethnic discrimination","url":"https://www.academia.edu/Documents/in/Racial_and_ethnic_discrimination?f_ri=7480"},{"id":30462,"name":"Vigilantism","url":"https://www.academia.edu/Documents/in/Vigilantism?f_ri=7480"},{"id":57986,"name":"Radicalisation","url":"https://www.academia.edu/Documents/in/Radicalisation?f_ri=7480"},{"id":89709,"name":"Antiterrorism","url":"https://www.academia.edu/Documents/in/Antiterrorism?f_ri=7480"},{"id":198723,"name":"Sousveillance","url":"https://www.academia.edu/Documents/in/Sousveillance?f_ri=7480"},{"id":205131,"name":"Repression","url":"https://www.academia.edu/Documents/in/Repression?f_ri=7480"},{"id":285921,"name":"Alertness and Vigilance Research","url":"https://www.academia.edu/Documents/in/Alertness_and_Vigilance_Research?f_ri=7480"},{"id":413693,"name":"Community Policing, Crime Prevention and Community Safety, Police Reform","url":"https://www.academia.edu/Documents/in/Community_Policing_Crime_Prevention_and_Community_Safety_Police_Reform?f_ri=7480"},{"id":544471,"name":"Neighborhoods","url":"https://www.academia.edu/Documents/in/Neighborhoods?f_ri=7480"},{"id":761870,"name":"Terrorism and Counterterrorism","url":"https://www.academia.edu/Documents/in/Terrorism_and_Counterterrorism?f_ri=7480"},{"id":972807,"name":"Alertness","url":"https://www.academia.edu/Documents/in/Alertness?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_4453710" data-work_id="4453710" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/4453710/Surveillance_Spectacles_The_Big_Art_Groups_Flicker_and_the_Screened_Body_in_Performance">Surveillance Spectacles: The Big Art Group's Flicker and the Screened Body in Performance</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/4453710" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="d6cea5b1885ca78c58e72d62c5731753" rel="nofollow" data-download="{"attachment_id":31882033,"asset_id":4453710,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/31882033/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="5486190" href="https://umd.academia.edu/JasonFarman">Jason Farman</a><script data-card-contents-for-user="5486190" type="text/json">{"id":5486190,"first_name":"Jason","last_name":"Farman","domain_name":"umd","page_name":"JasonFarman","display_name":"Jason Farman","profile_url":"https://umd.academia.edu/JasonFarman?f_ri=7480","photo":"https://0.academia-photos.com/5486190/2426159/13871940/s65_jason.farman.jpg"}</script></span></span></li><li class="js-paper-rank-work_4453710 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="4453710"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 4453710, container: ".js-paper-rank-work_4453710", }); });</script></li><li class="js-percentile-work_4453710 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4453710; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_4453710"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_4453710 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="4453710"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4453710; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4453710]").text(description); $(".js-view-count-work_4453710").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_4453710").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="4453710"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">7</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="947" rel="nofollow" href="https://www.academia.edu/Documents/in/Theatre_Studies">Theatre Studies</a>, <script data-card-contents-for-ri="947" type="text/json">{"id":947,"name":"Theatre Studies","url":"https://www.academia.edu/Documents/in/Theatre_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2337" rel="nofollow" href="https://www.academia.edu/Documents/in/Performance_Studies">Performance Studies</a>, <script data-card-contents-for-ri="2337" type="text/json">{"id":2337,"name":"Performance Studies","url":"https://www.academia.edu/Documents/in/Performance_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2613" rel="nofollow" href="https://www.academia.edu/Documents/in/Diversity">Diversity</a>, <script data-card-contents-for-ri="2613" type="text/json">{"id":2613,"name":"Diversity","url":"https://www.academia.edu/Documents/in/Diversity?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2869" rel="nofollow" href="https://www.academia.edu/Documents/in/Digital_Media">Digital Media</a><script data-card-contents-for-ri="2869" type="text/json">{"id":2869,"name":"Digital Media","url":"https://www.academia.edu/Documents/in/Digital_Media?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=4453710]'), work: {"id":4453710,"title":"Surveillance Spectacles: The Big Art Group's Flicker and the Screened Body in Performance","created_at":"2013-09-10T04:07:03.727-07:00","url":"https://www.academia.edu/4453710/Surveillance_Spectacles_The_Big_Art_Groups_Flicker_and_the_Screened_Body_in_Performance?f_ri=7480","dom_id":"work_4453710","summary":null,"downloadable_attachments":[{"id":31882033,"asset_id":4453710,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":5486190,"first_name":"Jason","last_name":"Farman","domain_name":"umd","page_name":"JasonFarman","display_name":"Jason Farman","profile_url":"https://umd.academia.edu/JasonFarman?f_ri=7480","photo":"https://0.academia-photos.com/5486190/2426159/13871940/s65_jason.farman.jpg"}],"research_interests":[{"id":947,"name":"Theatre Studies","url":"https://www.academia.edu/Documents/in/Theatre_Studies?f_ri=7480","nofollow":true},{"id":2337,"name":"Performance Studies","url":"https://www.academia.edu/Documents/in/Performance_Studies?f_ri=7480","nofollow":true},{"id":2613,"name":"Diversity","url":"https://www.academia.edu/Documents/in/Diversity?f_ri=7480","nofollow":true},{"id":2869,"name":"Digital Media","url":"https://www.academia.edu/Documents/in/Digital_Media?f_ri=7480","nofollow":true},{"id":5044,"name":"Embodiment","url":"https://www.academia.edu/Documents/in/Embodiment?f_ri=7480"},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480"},{"id":24892,"name":"Surveillance","url":"https://www.academia.edu/Documents/in/Surveillance?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_38574459" data-work_id="38574459" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/38574459/Effetti_geopolitici_del_Datagate_appunti_e_spunti_per_la_geopolitica_della_sorveglianza_globale">Effetti geopolitici del Datagate: appunti e spunti per la geopolitica della sorveglianza globale</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Italian: Il recente caso del Datagate, con la rivelazione da parte di Edward Snowden di informazioni riservate circa i sistemi di sorveglianza elettronica globale utilizzati oggi dagli Stati Uniti anche in Europa, ha mutato radicalmente... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_38574459" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Italian:<br />Il recente caso del Datagate, con la rivelazione da parte di Edward Snowden di informazioni riservate circa i sistemi di sorveglianza elettronica globale utilizzati oggi dagli Stati Uniti anche in Europa, ha mutato radicalmente sia il panorama della sicurezza sia gli equilibri geopolitici mondiali, aprendo nuove prospettive all’idea stessa di privacy del cittadino e di controllo statale. L’Autore ripercorre con dovizia di particolari, in questo articolo, le premesse al caso Datagate e le sue evoluzioni sino ad oggi, con particolare attenzione alle questioni giuridiche e politiche.<br /><br />English:<br />Geopolitical consequences of Datagate: notes and reflections for geopolitics of global surveillance The recent case of Datagate, with the revelation by Edward Snowden of confidential information concerning global electronic surveillance systems used today by the US also in Europe, has radically changed the security landscape and the geopolitical balance of the world, opening up new perspectives about the very idea of privacy of citizens and of state control. The author recounts in great detail in this article the premises to Datagate case and its progress to date, with a focus on legal and policy issues.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/38574459" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="5be0405fe2e1e26502c725d3833d7aed" rel="nofollow" data-download="{"attachment_id":58647399,"asset_id":38574459,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/58647399/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="56244660" href="https://unimi.academia.edu/GabrieleSuffia">Gabriele Suffia</a><script data-card-contents-for-user="56244660" type="text/json">{"id":56244660,"first_name":"Gabriele","last_name":"Suffia","domain_name":"unimi","page_name":"GabrieleSuffia","display_name":"Gabriele Suffia","profile_url":"https://unimi.academia.edu/GabrieleSuffia?f_ri=7480","photo":"https://0.academia-photos.com/56244660/14800512/34652116/s65_gabriele.suffia.jpg"}</script></span></span></li><li class="js-paper-rank-work_38574459 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="38574459"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 38574459, container: ".js-paper-rank-work_38574459", }); });</script></li><li class="js-percentile-work_38574459 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 38574459; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_38574459"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_38574459 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="38574459"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 38574459; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=38574459]").text(description); $(".js-view-count-work_38574459").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_38574459").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="38574459"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">3</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2990" rel="nofollow" href="https://www.academia.edu/Documents/in/Geopolitics">Geopolitics</a>, <script data-card-contents-for-ri="2990" type="text/json">{"id":2990,"name":"Geopolitics","url":"https://www.academia.edu/Documents/in/Geopolitics?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a>, <script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="918782" rel="nofollow" href="https://www.academia.edu/Documents/in/Edward_Snowden">Edward Snowden</a><script data-card-contents-for-ri="918782" type="text/json">{"id":918782,"name":"Edward Snowden","url":"https://www.academia.edu/Documents/in/Edward_Snowden?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=38574459]'), work: {"id":38574459,"title":"Effetti geopolitici del Datagate: appunti e spunti per la geopolitica della sorveglianza globale","created_at":"2019-03-18T08:06:38.306-07:00","url":"https://www.academia.edu/38574459/Effetti_geopolitici_del_Datagate_appunti_e_spunti_per_la_geopolitica_della_sorveglianza_globale?f_ri=7480","dom_id":"work_38574459","summary":"Italian:\nIl recente caso del Datagate, con la rivelazione da parte di Edward Snowden di informazioni riservate circa i sistemi di sorveglianza elettronica globale utilizzati oggi dagli Stati Uniti anche in Europa, ha mutato radicalmente sia il panorama della sicurezza sia gli equilibri geopolitici mondiali, aprendo nuove prospettive all’idea stessa di privacy del cittadino e di controllo statale. L’Autore ripercorre con dovizia di particolari, in questo articolo, le premesse al caso Datagate e le sue evoluzioni sino ad oggi, con particolare attenzione alle questioni giuridiche e politiche.\n\nEnglish:\nGeopolitical consequences of Datagate: notes and reflections for geopolitics of global surveillance The recent case of Datagate, with the revelation by Edward Snowden of confidential information concerning global electronic surveillance systems used today by the US also in Europe, has radically changed the security landscape and the geopolitical balance of the world, opening up new perspectives about the very idea of privacy of citizens and of state control. The author recounts in great detail in this article the premises to Datagate case and its progress to date, with a focus on legal and policy issues.","downloadable_attachments":[{"id":58647399,"asset_id":38574459,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":56244660,"first_name":"Gabriele","last_name":"Suffia","domain_name":"unimi","page_name":"GabrieleSuffia","display_name":"Gabriele Suffia","profile_url":"https://unimi.academia.edu/GabrieleSuffia?f_ri=7480","photo":"https://0.academia-photos.com/56244660/14800512/34652116/s65_gabriele.suffia.jpg"}],"research_interests":[{"id":2990,"name":"Geopolitics","url":"https://www.academia.edu/Documents/in/Geopolitics?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":918782,"name":"Edward Snowden","url":"https://www.academia.edu/Documents/in/Edward_Snowden?f_ri=7480","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_34673096" data-work_id="34673096" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/34673096/Tale_of_the_Tape_Policing_Surreptitious_Recordings_in_the_Workplace_MLJ_40_3_2017_">Tale of the Tape Policing Surreptitious Recordings in the Workplace (MLJ 40.3 2017)</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">[T]he law recognizes that we inherently have to bear the risk of the "tattletale" but draws the line at concluding that we must also bear, as the price of choosing to speak to another human being, the risk of having a permanent electronic... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_34673096" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">[T]he law recognizes that we inherently have to bear the risk of the "tattletale" but draws the line at concluding that we must also bear, as the price of choosing to speak to another human being, the risk of having a permanent electronic recording made of our words. R. v. Duarte (1990), 1 SCR 30 at 48, 53 CCC (3d) 1.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/34673096" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="909bebbd8c1f76d597e884773fd260d4" rel="nofollow" data-download="{"attachment_id":54532445,"asset_id":34673096,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/54532445/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="68664532" href="https://umanitoba.academia.edu/RobsonCrim">Robson Crim</a><script data-card-contents-for-user="68664532" type="text/json">{"id":68664532,"first_name":"Robson","last_name":"Crim","domain_name":"umanitoba","page_name":"RobsonCrim","display_name":"Robson Crim","profile_url":"https://umanitoba.academia.edu/RobsonCrim?f_ri=7480","photo":"https://0.academia-photos.com/68664532/17819400/17838667/s65_robson.crim.jpg"}</script></span></span></li><li class="js-paper-rank-work_34673096 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="34673096"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 34673096, container: ".js-paper-rank-work_34673096", }); });</script></li><li class="js-percentile-work_34673096 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 34673096; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_34673096"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_34673096 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="34673096"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 34673096; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=34673096]").text(description); $(".js-view-count-work_34673096").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_34673096").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="34673096"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">3</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="535" rel="nofollow" href="https://www.academia.edu/Documents/in/Criminal_Law-1">Criminal Law</a>, <script data-card-contents-for-ri="535" type="text/json">{"id":535,"name":"Criminal Law","url":"https://www.academia.edu/Documents/in/Criminal_Law-1?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a>, <script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="24892" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance">Surveillance</a><script data-card-contents-for-ri="24892" type="text/json">{"id":24892,"name":"Surveillance","url":"https://www.academia.edu/Documents/in/Surveillance?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=34673096]'), work: {"id":34673096,"title":"Tale of the Tape Policing Surreptitious Recordings in the Workplace (MLJ 40.3 2017)","created_at":"2017-09-25T09:05:40.366-07:00","url":"https://www.academia.edu/34673096/Tale_of_the_Tape_Policing_Surreptitious_Recordings_in_the_Workplace_MLJ_40_3_2017_?f_ri=7480","dom_id":"work_34673096","summary":"[T]he law recognizes that we inherently have to bear the risk of the \"tattletale\" but draws the line at concluding that we must also bear, as the price of choosing to speak to another human being, the risk of having a permanent electronic recording made of our words. R. v. Duarte (1990), 1 SCR 30 at 48, 53 CCC (3d) 1.","downloadable_attachments":[{"id":54532445,"asset_id":34673096,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":68664532,"first_name":"Robson","last_name":"Crim","domain_name":"umanitoba","page_name":"RobsonCrim","display_name":"Robson Crim","profile_url":"https://umanitoba.academia.edu/RobsonCrim?f_ri=7480","photo":"https://0.academia-photos.com/68664532/17819400/17838667/s65_robson.crim.jpg"}],"research_interests":[{"id":535,"name":"Criminal Law","url":"https://www.academia.edu/Documents/in/Criminal_Law-1?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":24892,"name":"Surveillance","url":"https://www.academia.edu/Documents/in/Surveillance?f_ri=7480","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_24373462" data-work_id="24373462" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/24373462/Towards_a_New_Political_Anatomy_of_Financial_Surveillance">Towards a 'New' Political Anatomy of Financial Surveillance</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This article examines dynamics of financial surveillance and risk-based regulation in the context of ongoing activities to combat money laundering and terrorist financing. Close analysis of the situation in the UK reveals entangled forms... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_24373462" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This article examines dynamics of financial surveillance and risk-based regulation in the context of ongoing activities to combat money laundering and terrorist financing. Close analysis of the situation in the UK reveals entangled forms of co-regulation and ultimately co-production of surveillance that challenge ‘institutional boundaries’ of the state regarding policing and intelligence practices. It is argued that ongoing transformations in the anti-money laundering field reveal a dual movement that combines forms of indirect administration with a process of ‘neoliberal bureaucratization’.The article aims to show how current policies against ‘dirty money’ still paradoxically work on the basis of heterogeneous goals and misapprehensions between ‘professionals of security’ and ‘professionals of finance’.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/24373462" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="a4e9c8dd0e8c2013b254f1f71a0a11c7" rel="nofollow" data-download="{"attachment_id":44705026,"asset_id":24373462,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/44705026/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="36836266" href="https://umontreal.academia.edu/AmicelleAnthony">Amicelle Anthony</a><script data-card-contents-for-user="36836266" type="text/json">{"id":36836266,"first_name":"Amicelle","last_name":"Anthony","domain_name":"umontreal","page_name":"AmicelleAnthony","display_name":"Amicelle Anthony","profile_url":"https://umontreal.academia.edu/AmicelleAnthony?f_ri=7480","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_24373462 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="24373462"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 24373462, container: ".js-paper-rank-work_24373462", }); });</script></li><li class="js-percentile-work_24373462 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 24373462; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_24373462"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_24373462 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="24373462"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 24373462; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=24373462]").text(description); $(".js-view-count-work_24373462").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_24373462").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="24373462"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">10</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="797" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>, <script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1694" rel="nofollow" href="https://www.academia.edu/Documents/in/Regulatory_Compliance">Regulatory Compliance</a>, <script data-card-contents-for-ri="1694" type="text/json">{"id":1694,"name":"Regulatory Compliance","url":"https://www.academia.edu/Documents/in/Regulatory_Compliance?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5535" rel="nofollow" href="https://www.academia.edu/Documents/in/Critical_Security_Studies">Critical Security Studies</a>, <script data-card-contents-for-ri="5535" type="text/json">{"id":5535,"name":"Critical Security Studies","url":"https://www.academia.edu/Documents/in/Critical_Security_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="6276" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Political_Economy">International Political Economy</a><script data-card-contents-for-ri="6276" type="text/json">{"id":6276,"name":"International Political Economy","url":"https://www.academia.edu/Documents/in/International_Political_Economy?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=24373462]'), work: {"id":24373462,"title":"Towards a 'New' Political Anatomy of Financial Surveillance","created_at":"2016-04-13T12:26:45.873-07:00","url":"https://www.academia.edu/24373462/Towards_a_New_Political_Anatomy_of_Financial_Surveillance?f_ri=7480","dom_id":"work_24373462","summary":"This article examines dynamics of financial surveillance and risk-based regulation in the context of ongoing activities to combat money laundering and terrorist financing. Close analysis of the situation in the UK reveals entangled forms of co-regulation and ultimately co-production of surveillance that challenge ‘institutional boundaries’ of the state regarding policing and intelligence practices. It is argued that ongoing transformations in the anti-money laundering field reveal a dual movement that combines forms of indirect administration with a process of ‘neoliberal bureaucratization’.The article aims to show how current policies against ‘dirty money’ still paradoxically work on the basis of heterogeneous goals and misapprehensions between ‘professionals of security’ and ‘professionals of finance’.","downloadable_attachments":[{"id":44705026,"asset_id":24373462,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":36836266,"first_name":"Amicelle","last_name":"Anthony","domain_name":"umontreal","page_name":"AmicelleAnthony","display_name":"Amicelle Anthony","profile_url":"https://umontreal.academia.edu/AmicelleAnthony?f_ri=7480","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=7480","nofollow":true},{"id":1694,"name":"Regulatory Compliance","url":"https://www.academia.edu/Documents/in/Regulatory_Compliance?f_ri=7480","nofollow":true},{"id":5535,"name":"Critical Security Studies","url":"https://www.academia.edu/Documents/in/Critical_Security_Studies?f_ri=7480","nofollow":true},{"id":6276,"name":"International Political Economy","url":"https://www.academia.edu/Documents/in/International_Political_Economy?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480"},{"id":12061,"name":"Risk Management","url":"https://www.academia.edu/Documents/in/Risk_Management?f_ri=7480"},{"id":15181,"name":"Anti-money laundering","url":"https://www.academia.edu/Documents/in/Anti-money_laundering?f_ri=7480"},{"id":24892,"name":"Surveillance","url":"https://www.academia.edu/Documents/in/Surveillance?f_ri=7480"},{"id":46332,"name":"Public Private Partnerships","url":"https://www.academia.edu/Documents/in/Public_Private_Partnerships?f_ri=7480"},{"id":191169,"name":"Anti money laundering and Terrorist Financing","url":"https://www.academia.edu/Documents/in/Anti_money_laundering_and_Terrorist_Financing?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_5086348" data-work_id="5086348" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" rel="nofollow" href="https://www.academia.edu/5086348/_Suspicious_Activity_Report_SAR_">"Suspicious Activity Report" (SAR)</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/5086348" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="5f27ea12e2e40ec449eac95afcfb490b" rel="nofollow" data-download="{"attachment_id":32303506,"asset_id":5086348,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/32303506/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="1875784" rel="nofollow" href="https://berkeley.academia.edu/LisaElkins">Lisa Elkins Goodman</a><script data-card-contents-for-user="1875784" type="text/json">{"id":1875784,"first_name":"Lisa","last_name":"Elkins Goodman","domain_name":"berkeley","page_name":"LisaElkins","display_name":"Lisa Elkins Goodman","profile_url":"https://berkeley.academia.edu/LisaElkins?f_ri=7480","photo":"https://0.academia-photos.com/1875784/636060/789014/s65_lisa.elkins.jpg"}</script></span></span></li><li class="js-paper-rank-work_5086348 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="5086348"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 5086348, container: ".js-paper-rank-work_5086348", }); });</script></li><li class="js-percentile-work_5086348 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 5086348; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_5086348"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_5086348 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="5086348"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 5086348; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=5086348]").text(description); $(".js-view-count-work_5086348").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_5086348").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="5086348"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">59</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="2783" rel="nofollow" href="https://www.academia.edu/Documents/in/Privacy">Privacy</a>, <script data-card-contents-for-ri="2783" type="text/json">{"id":2783,"name":"Privacy","url":"https://www.academia.edu/Documents/in/Privacy?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="3220" rel="nofollow" href="https://www.academia.edu/Documents/in/Fighting_and_Preventing_Corruption_through_Law">Fighting and Preventing Corruption through Law</a>, <script data-card-contents-for-ri="3220" type="text/json">{"id":3220,"name":"Fighting and Preventing Corruption through Law","url":"https://www.academia.edu/Documents/in/Fighting_and_Preventing_Corruption_through_Law?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4486" rel="nofollow" href="https://www.academia.edu/Documents/in/Political_Science">Political Science</a>, <script data-card-contents-for-ri="4486" type="text/json">{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4533" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Sociology_">Surveillance (Sociology)</a><script data-card-contents-for-ri="4533" type="text/json">{"id":4533,"name":"Surveillance (Sociology)","url":"https://www.academia.edu/Documents/in/Surveillance_Sociology_?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=5086348]'), work: {"id":5086348,"title":"\"Suspicious Activity Report\" (SAR)","created_at":"2013-11-13T01:09:05.428-08:00","url":"https://www.academia.edu/5086348/_Suspicious_Activity_Report_SAR_?f_ri=7480","dom_id":"work_5086348","summary":null,"downloadable_attachments":[{"id":32303506,"asset_id":5086348,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":1875784,"first_name":"Lisa","last_name":"Elkins Goodman","domain_name":"berkeley","page_name":"LisaElkins","display_name":"Lisa Elkins Goodman","profile_url":"https://berkeley.academia.edu/LisaElkins?f_ri=7480","photo":"https://0.academia-photos.com/1875784/636060/789014/s65_lisa.elkins.jpg"}],"research_interests":[{"id":2783,"name":"Privacy","url":"https://www.academia.edu/Documents/in/Privacy?f_ri=7480","nofollow":true},{"id":3220,"name":"Fighting and Preventing Corruption through Law","url":"https://www.academia.edu/Documents/in/Fighting_and_Preventing_Corruption_through_Law?f_ri=7480","nofollow":true},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=7480","nofollow":true},{"id":4533,"name":"Surveillance (Sociology)","url":"https://www.academia.edu/Documents/in/Surveillance_Sociology_?f_ri=7480","nofollow":true},{"id":4566,"name":"First Amendment Law (USA)","url":"https://www.academia.edu/Documents/in/First_Amendment_Law_USA_?f_ri=7480"},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480"},{"id":10750,"name":"Corruption (Corruption)","url":"https://www.academia.edu/Documents/in/Corruption_Corruption_?f_ri=7480"},{"id":11789,"name":"First Amendment Education","url":"https://www.academia.edu/Documents/in/First_Amendment_Education?f_ri=7480"},{"id":12914,"name":"Political Corruption","url":"https://www.academia.edu/Documents/in/Political_Corruption?f_ri=7480"},{"id":18485,"name":"Communication Privacy Management","url":"https://www.academia.edu/Documents/in/Communication_Privacy_Management?f_ri=7480"},{"id":21389,"name":"E-Government","url":"https://www.academia.edu/Documents/in/E-Government?f_ri=7480"},{"id":22709,"name":"RFID Security and Privacy","url":"https://www.academia.edu/Documents/in/RFID_Security_and_Privacy?f_ri=7480"},{"id":23506,"name":"Information Security and Privacy","url":"https://www.academia.edu/Documents/in/Information_Security_and_Privacy?f_ri=7480"},{"id":24892,"name":"Surveillance","url":"https://www.academia.edu/Documents/in/Surveillance?f_ri=7480"},{"id":27557,"name":"Privacy (Law)","url":"https://www.academia.edu/Documents/in/Privacy_Law_?f_ri=7480"},{"id":27595,"name":"Security and Privacy","url":"https://www.academia.edu/Documents/in/Security_and_Privacy?f_ri=7480"},{"id":37359,"name":"National Security (Intelligence)","url":"https://www.academia.edu/Documents/in/National_Security_Intelligence_?f_ri=7480"},{"id":54089,"name":"Anti-Corruption","url":"https://www.academia.edu/Documents/in/Anti-Corruption?f_ri=7480"},{"id":60798,"name":"Surveillance, personal data, social sorting, privacy, camera surveillance, identification systems, internet surveillance, biometrics","url":"https://www.academia.edu/Documents/in/Surveillance_personal_data_social_sorting_privacy_camera_surveillance_identification_systems_i?f_ri=7480"},{"id":68542,"name":"State insitutions and religion (such as prison, police or army)","url":"https://www.academia.edu/Documents/in/State_insitutions_and_religion_such_as_prison_police_or_army_?f_ri=7480"},{"id":70422,"name":"Social Networking Security and Privacy","url":"https://www.academia.edu/Documents/in/Social_Networking_Security_and_Privacy?f_ri=7480"},{"id":70927,"name":"Mobile Computing and Wireless Communications, Information Security and Privacy, Digital Enterprises, Digital Governments, Digital Health.","url":"https://www.academia.edu/Documents/in/Mobile_Computing_and_Wireless_Communications_Information_Security_and_Privacy_Digital_Enterprises_?f_ri=7480"},{"id":73699,"name":"Corruption","url":"https://www.academia.edu/Documents/in/Corruption?f_ri=7480"},{"id":80182,"name":"Online Privacy","url":"https://www.academia.edu/Documents/in/Online_Privacy?f_ri=7480"},{"id":92007,"name":"Privacy and data protection","url":"https://www.academia.edu/Documents/in/Privacy_and_data_protection?f_ri=7480"},{"id":92095,"name":"First Amendment/Freedom of Expression issues","url":"https://www.academia.edu/Documents/in/First_Amendment_Freedom_of_Expression_issues?f_ri=7480"},{"id":97061,"name":"Copyright, Media Law, Privacy Law","url":"https://www.academia.edu/Documents/in/Copyright_Media_Law_Privacy_Law?f_ri=7480"},{"id":97108,"name":"Data Privacy","url":"https://www.academia.edu/Documents/in/Data_Privacy?f_ri=7480"},{"id":99804,"name":"Privacy Preserving Data Mining","url":"https://www.academia.edu/Documents/in/Privacy_Preserving_Data_Mining?f_ri=7480"},{"id":115137,"name":"First Amendment","url":"https://www.academia.edu/Documents/in/First_Amendment?f_ri=7480"},{"id":117091,"name":"Corporate Corruption","url":"https://www.academia.edu/Documents/in/Corporate_Corruption?f_ri=7480"},{"id":133601,"name":"Right to privacy","url":"https://www.academia.edu/Documents/in/Right_to_privacy?f_ri=7480"},{"id":137489,"name":"Cloud Computing, Privacy, and Information Rights Law","url":"https://www.academia.edu/Documents/in/Cloud_Computing_Privacy_and_Information_Rights_Law?f_ri=7480"},{"id":173564,"name":"Decentralisation and Political Accountability of Local Government","url":"https://www.academia.edu/Documents/in/Decentralisation_and_Political_Accountability_of_Local_Government?f_ri=7480"},{"id":177461,"name":"Privacy Law","url":"https://www.academia.edu/Documents/in/Privacy_Law?f_ri=7480"},{"id":226916,"name":"Money Laundering and Suspicious Activity Reporting in Financial Sector","url":"https://www.academia.edu/Documents/in/Money_Laundering_and_Suspicious_Activity_Reporting_in_Financial_Sector?f_ri=7480"},{"id":238094,"name":"The Role of Information and Communication Technology (ICT) in Achieving Sustainable Socio-Economic Development (e-Commerce, e-Business \u0026 e-Government)","url":"https://www.academia.edu/Documents/in/The_Role_of_Information_and_Communication_Technology_ICT_in_Achieving_Sustainable_Socio-Economic_D?f_ri=7480"},{"id":253054,"name":"Right to Privacy Law","url":"https://www.academia.edu/Documents/in/Right_to_Privacy_Law?f_ri=7480"},{"id":327586,"name":"Protection from Invasion of Privacy, Privacy Rights, Personal Information","url":"https://www.academia.edu/Documents/in/Protection_from_Invasion_of_Privacy_Privacy_Rights_Personal_Information?f_ri=7480"},{"id":377530,"name":"Government Accountability","url":"https://www.academia.edu/Documents/in/Government_Accountability?f_ri=7480"},{"id":380849,"name":"ACLU","url":"https://www.academia.edu/Documents/in/ACLU?f_ri=7480"},{"id":452226,"name":"Applied Anthropology for Disaster Management, Department of Homeland Security Center of Excellence, CREATE","url":"https://www.academia.edu/Documents/in/Applied_Anthropology_for_Disaster_Management_Department_of_Homeland_Security_Center_of_Excellence_?f_ri=7480"},{"id":458744,"name":"Federal Bureau of Investigations","url":"https://www.academia.edu/Documents/in/Federal_Bureau_of_Investigations?f_ri=7480"},{"id":486766,"name":"Surviellance","url":"https://www.academia.edu/Documents/in/Surviellance?f_ri=7480"},{"id":578499,"name":"Journals of Public Administration in effectiveness nd accountability on public service delivery among local government employees","url":"https://www.academia.edu/Documents/in/Journals_of_Public_Administration_in_effectiveness_nd_accountability_on_public_service_delivery_amon?f_ri=7480"},{"id":610496,"name":"Security and Surveillance","url":"https://www.academia.edu/Documents/in/Security_and_Surveillance?f_ri=7480"},{"id":664571,"name":"Social Network Security and Privacy Survey","url":"https://www.academia.edu/Documents/in/Social_Network_Security_and_Privacy_Survey?f_ri=7480"},{"id":670938,"name":"Government Corruption","url":"https://www.academia.edu/Documents/in/Government_Corruption?f_ri=7480"},{"id":684497,"name":"Fusion Centers","url":"https://www.academia.edu/Documents/in/Fusion_Centers?f_ri=7480"},{"id":829164,"name":"Intelligence and National Security","url":"https://www.academia.edu/Documents/in/Intelligence_and_National_Security?f_ri=7480"},{"id":854997,"name":"American Civil Liberties Union","url":"https://www.academia.edu/Documents/in/American_Civil_Liberties_Union?f_ri=7480"},{"id":939798,"name":"Human Rights and Corruption","url":"https://www.academia.edu/Documents/in/Human_Rights_and_Corruption?f_ri=7480"},{"id":940574,"name":"National Security Agency","url":"https://www.academia.edu/Documents/in/National_Security_Agency?f_ri=7480"},{"id":1007192,"name":"Combating Corruption","url":"https://www.academia.edu/Documents/in/Combating_Corruption?f_ri=7480"},{"id":1117066,"name":"Freedom of Information Act","url":"https://www.academia.edu/Documents/in/Freedom_of_Information_Act?f_ri=7480"},{"id":1140213,"name":"Department of Homeland Security","url":"https://www.academia.edu/Documents/in/Department_of_Homeland_Security?f_ri=7480"},{"id":1183856,"name":"National Security Agency - NSA","url":"https://www.academia.edu/Documents/in/National_Security_Agency_-_NSA?f_ri=7480"},{"id":1183884,"name":"Federal Bureau of Investigation","url":"https://www.academia.edu/Documents/in/Federal_Bureau_of_Investigation?f_ri=7480"},{"id":1183885,"name":"Government Accountability Office Report","url":"https://www.academia.edu/Documents/in/Government_Accountability_Office_Report?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_3727862" data-work_id="3727862" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/3727862/Interpersonal_surveillance_on_social_media">Interpersonal surveillance on social media</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This article examines changing rules and regimes 0/visibility on social media, using Facebook as a case study. Interpersonal social media surveillance warrants a care of the virtual self. Yet this care is complicated by social media's... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_3727862" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This article examines changing rules and regimes 0/visibility on social media, using Facebook as a case study. Interpersonal social media surveillance warrants a care of the virtual self. Yet this care is complicated by social media's rapid growth, and especially Facebook's cross-contextual in/ormation/Iows that publicize otherwise private information. Drawingfrom a series of thirty interviews, this article/octises on how usersperceive and manage their own visibility and take advantage ofthe visibility of other users. These experiences are tied to shifting understandings of private and public information, as well as new terms like "stalking" and "creeping" that frame surveillant practices. RÉSUMÉ Cet article examine l'évolution des règles et des régimes de visibilité sur ¡es médias sociaux, en utilisant Facebook comme une étude de cas. La surveillance interpersonnelle sur les médias sociaux nécessite un soin de l'être virtuel Pourtant, ce soin est compliqué par l'expansion rapide dès médias sociaux, et en particulier la nature inter contextuel de Facebook, qui diffuse de l'in/ormation privé. Tirant d'une série de trente entrevues, cet article concentre sur la manière dont les utilisateurs perçoivent et gèrent leur proper visibilité sur Facebook ainsi que de profiter de la visibilité des autres. Ces expériences sont liées à l'évolution des conceptions de l'in/ormation publique et privée, ainsi que de termes nouveaux comme «harcèlement» et «stalking» qui caractérise la surveillance sur les médias sociaux. MOTS CLÉS Surveillance; La vie privée-. Les médias nouveaux; Les médias sociaux Daniel Trottier is a postdoctoral fellow in the</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/3727862" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="ed12c0d857ac6ee665ca988f0164d5c4" rel="nofollow" data-download="{"attachment_id":31408769,"asset_id":3727862,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/31408769/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="187362" href="https://eur.academia.edu/DanielTrottier">Daniel Trottier</a><script data-card-contents-for-user="187362" type="text/json">{"id":187362,"first_name":"Daniel","last_name":"Trottier","domain_name":"eur","page_name":"DanielTrottier","display_name":"Daniel Trottier","profile_url":"https://eur.academia.edu/DanielTrottier?f_ri=7480","photo":"https://0.academia-photos.com/187362/1896055/2248444/s65_daniel.trottier.png"}</script></span></span></li><li class="js-paper-rank-work_3727862 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="3727862"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 3727862, container: ".js-paper-rank-work_3727862", }); });</script></li><li class="js-percentile-work_3727862 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 3727862; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_3727862"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_3727862 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="3727862"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 3727862; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=3727862]").text(description); $(".js-view-count-work_3727862").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_3727862").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="3727862"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2783" rel="nofollow" href="https://www.academia.edu/Documents/in/Privacy">Privacy</a>, <script data-card-contents-for-ri="2783" type="text/json">{"id":2783,"name":"Privacy","url":"https://www.academia.edu/Documents/in/Privacy?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a>, <script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="9246" rel="nofollow" href="https://www.academia.edu/Documents/in/Social_Media">Social Media</a>, <script data-card-contents-for-ri="9246" type="text/json">{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="17058" rel="nofollow" href="https://www.academia.edu/Documents/in/Peer-to-Peer">Peer-to-Peer</a><script data-card-contents-for-ri="17058" type="text/json">{"id":17058,"name":"Peer-to-Peer","url":"https://www.academia.edu/Documents/in/Peer-to-Peer?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=3727862]'), work: {"id":3727862,"title":"Interpersonal surveillance on social media","created_at":"2013-06-17T00:30:13.033-07:00","url":"https://www.academia.edu/3727862/Interpersonal_surveillance_on_social_media?f_ri=7480","dom_id":"work_3727862","summary":"This article examines changing rules and regimes 0/visibility on social media, using Facebook as a case study. Interpersonal social media surveillance warrants a care of the virtual self. Yet this care is complicated by social media's rapid growth, and especially Facebook's cross-contextual in/ormation/Iows that publicize otherwise private information. Drawingfrom a series of thirty interviews, this article/octises on how usersperceive and manage their own visibility and take advantage ofthe visibility of other users. These experiences are tied to shifting understandings of private and public information, as well as new terms like \"stalking\" and \"creeping\" that frame surveillant practices. RÉSUMÉ Cet article examine l'évolution des règles et des régimes de visibilité sur ¡es médias sociaux, en utilisant Facebook comme une étude de cas. La surveillance interpersonnelle sur les médias sociaux nécessite un soin de l'être virtuel Pourtant, ce soin est compliqué par l'expansion rapide dès médias sociaux, et en particulier la nature inter contextuel de Facebook, qui diffuse de l'in/ormation privé. Tirant d'une série de trente entrevues, cet article concentre sur la manière dont les utilisateurs perçoivent et gèrent leur proper visibilité sur Facebook ainsi que de profiter de la visibilité des autres. Ces expériences sont liées à l'évolution des conceptions de l'in/ormation publique et privée, ainsi que de termes nouveaux comme «harcèlement» et «stalking» qui caractérise la surveillance sur les médias sociaux. MOTS CLÉS Surveillance; La vie privée-. Les médias nouveaux; Les médias sociaux Daniel Trottier is a postdoctoral fellow in the","downloadable_attachments":[{"id":31408769,"asset_id":3727862,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":187362,"first_name":"Daniel","last_name":"Trottier","domain_name":"eur","page_name":"DanielTrottier","display_name":"Daniel Trottier","profile_url":"https://eur.academia.edu/DanielTrottier?f_ri=7480","photo":"https://0.academia-photos.com/187362/1896055/2248444/s65_daniel.trottier.png"}],"research_interests":[{"id":2783,"name":"Privacy","url":"https://www.academia.edu/Documents/in/Privacy?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=7480","nofollow":true},{"id":17058,"name":"Peer-to-Peer","url":"https://www.academia.edu/Documents/in/Peer-to-Peer?f_ri=7480","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_12465355" data-work_id="12465355" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/12465355/Porn_Again_Christian_Mark_Driscoll_Mars_Hill_Church_and_the_Pornification_of_the_Pulpit">Porn Again Christian? Mark Driscoll, Mars Hill Church, and the Pornification of the Pulpit</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">In New Views on Pornography: Sexuality, Politics, and Law, eds. Lynn Comella and Shira Tarrant (Praeger, 2015): 125-145</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/12465355" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="70152a8c49a98267e2f7c6994f073cd7" rel="nofollow" data-download="{"attachment_id":37682605,"asset_id":12465355,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/37682605/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="2601133" href="https://independent.academia.edu/JohnsonJessica">Jessica Johnson</a><script data-card-contents-for-user="2601133" type="text/json">{"id":2601133,"first_name":"Jessica","last_name":"Johnson","domain_name":"independent","page_name":"JohnsonJessica","display_name":"Jessica Johnson","profile_url":"https://independent.academia.edu/JohnsonJessica?f_ri=7480","photo":"https://0.academia-photos.com/2601133/820140/19767694/s65_jessica.johnson.jpg"}</script></span></span></li><li class="js-paper-rank-work_12465355 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="12465355"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 12465355, container: ".js-paper-rank-work_12465355", }); });</script></li><li class="js-percentile-work_12465355 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 12465355; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_12465355"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_12465355 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="12465355"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 12465355; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=12465355]").text(description); $(".js-view-count-work_12465355").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_12465355").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="12465355"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">19</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="188" rel="nofollow" href="https://www.academia.edu/Documents/in/Cultural_Studies">Cultural Studies</a>, <script data-card-contents-for-ri="188" type="text/json">{"id":188,"name":"Cultural Studies","url":"https://www.academia.edu/Documents/in/Cultural_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="696" rel="nofollow" href="https://www.academia.edu/Documents/in/Gender_Studies">Gender Studies</a>, <script data-card-contents-for-ri="696" type="text/json">{"id":696,"name":"Gender Studies","url":"https://www.academia.edu/Documents/in/Gender_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="863" rel="nofollow" href="https://www.academia.edu/Documents/in/Visual_Studies">Visual Studies</a>, <script data-card-contents-for-ri="863" type="text/json">{"id":863,"name":"Visual Studies","url":"https://www.academia.edu/Documents/in/Visual_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="928" rel="nofollow" href="https://www.academia.edu/Documents/in/Media_Studies">Media Studies</a><script data-card-contents-for-ri="928" type="text/json">{"id":928,"name":"Media Studies","url":"https://www.academia.edu/Documents/in/Media_Studies?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=12465355]'), work: {"id":12465355,"title":"Porn Again Christian? Mark Driscoll, Mars Hill Church, and the Pornification of the Pulpit","created_at":"2015-05-19T07:35:51.698-07:00","url":"https://www.academia.edu/12465355/Porn_Again_Christian_Mark_Driscoll_Mars_Hill_Church_and_the_Pornification_of_the_Pulpit?f_ri=7480","dom_id":"work_12465355","summary":"In New Views on Pornography: Sexuality, Politics, and Law, eds. Lynn Comella and Shira Tarrant (Praeger, 2015): 125-145","downloadable_attachments":[{"id":37682605,"asset_id":12465355,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":2601133,"first_name":"Jessica","last_name":"Johnson","domain_name":"independent","page_name":"JohnsonJessica","display_name":"Jessica Johnson","profile_url":"https://independent.academia.edu/JohnsonJessica?f_ri=7480","photo":"https://0.academia-photos.com/2601133/820140/19767694/s65_jessica.johnson.jpg"}],"research_interests":[{"id":188,"name":"Cultural Studies","url":"https://www.academia.edu/Documents/in/Cultural_Studies?f_ri=7480","nofollow":true},{"id":696,"name":"Gender Studies","url":"https://www.academia.edu/Documents/in/Gender_Studies?f_ri=7480","nofollow":true},{"id":863,"name":"Visual Studies","url":"https://www.academia.edu/Documents/in/Visual_Studies?f_ri=7480","nofollow":true},{"id":928,"name":"Media Studies","url":"https://www.academia.edu/Documents/in/Media_Studies?f_ri=7480","nofollow":true},{"id":933,"name":"New Media","url":"https://www.academia.edu/Documents/in/New_Media?f_ri=7480"},{"id":2869,"name":"Digital Media","url":"https://www.academia.edu/Documents/in/Digital_Media?f_ri=7480"},{"id":3059,"name":"Religion and Politics","url":"https://www.academia.edu/Documents/in/Religion_and_Politics?f_ri=7480"},{"id":3369,"name":"Religion and Sexuality","url":"https://www.academia.edu/Documents/in/Religion_and_Sexuality?f_ri=7480"},{"id":3499,"name":"Social and Cultural Anthropology","url":"https://www.academia.edu/Documents/in/Social_and_Cultural_Anthropology?f_ri=7480"},{"id":4917,"name":"Gender and Sexuality","url":"https://www.academia.edu/Documents/in/Gender_and_Sexuality?f_ri=7480"},{"id":6749,"name":"Cultural Politics","url":"https://www.academia.edu/Documents/in/Cultural_Politics?f_ri=7480"},{"id":6995,"name":"Anthropology of Christianity","url":"https://www.academia.edu/Documents/in/Anthropology_of_Christianity?f_ri=7480"},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480"},{"id":13274,"name":"Masculinities","url":"https://www.academia.edu/Documents/in/Masculinities?f_ri=7480"},{"id":15884,"name":"Cultural Political Economy","url":"https://www.academia.edu/Documents/in/Cultural_Political_Economy?f_ri=7480"},{"id":27903,"name":"Affect (Cultural Theory)","url":"https://www.academia.edu/Documents/in/Affect_Cultural_Theory_?f_ri=7480"},{"id":30266,"name":"Religion and Popular Culture","url":"https://www.academia.edu/Documents/in/Religion_and_Popular_Culture?f_ri=7480"},{"id":38576,"name":"Pornography Studies","url":"https://www.academia.edu/Documents/in/Pornography_Studies?f_ri=7480"},{"id":619396,"name":"Anthropology of Religion","url":"https://www.academia.edu/Documents/in/Anthropology_of_Religion?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_1511201" data-work_id="1511201" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/1511201/The_Piracy_Crusade_How_the_Music_Industry_s_War_on_Sharing_Destroys_Markets_and_Erodes_Civil_Liberties">The Piracy Crusade: How the Music Industry’s War on Sharing Destroys Markets and Erodes Civil Liberties</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">"The Piracy Crusade examines the music industry’s overreaction to the threat of digital piracy, and the resulting damage done to our economy, culture and society. It challenges the commonly-accepted myth that piracy is killing the music... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_1511201" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">"The Piracy Crusade examines the music industry’s overreaction to the threat of digital piracy, and the resulting damage done to our economy, culture and society. It challenges the commonly-accepted myth that piracy is killing the music industry, exploring the unheralded benefits of digital sharing, and the “perfect storm” of economic factors – many of them self-inflicted – that burst the industry’s bubble. <br /> <br />The book critiques the premise of digital piracy itself, arguing that today’s file sharers, music bloggers and mashup artists are simply making use of new technologies to recuperate music from its 20th Century status as an entertainment commodity, and returning it to its original role as a medium for interpersonal and group communication. <br /> <br />Finally, The Piracy Crusade reveals how a flood of new laws and policies enacted in the name of combating piracy have undermined free speech, privacy and cultural innovation – all for the sake of protecting an outmoded media cartel."</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/1511201" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="f458b6c979af26b57859c4e1c4b5d919" rel="nofollow" data-download="{"attachment_id":35708330,"asset_id":1511201,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/35708330/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="1387132" href="https://american.academia.edu/AramSinnreich">Aram Sinnreich</a><script data-card-contents-for-user="1387132" type="text/json">{"id":1387132,"first_name":"Aram","last_name":"Sinnreich","domain_name":"american","page_name":"AramSinnreich","display_name":"Aram Sinnreich","profile_url":"https://american.academia.edu/AramSinnreich?f_ri=7480","photo":"https://0.academia-photos.com/1387132/503827/633507/s65_aram.sinnreich.jpg"}</script></span></span></li><li class="js-paper-rank-work_1511201 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="1511201"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 1511201, container: ".js-paper-rank-work_1511201", }); });</script></li><li class="js-percentile-work_1511201 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 1511201; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_1511201"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_1511201 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="1511201"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 1511201; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=1511201]").text(description); $(".js-view-count-work_1511201").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_1511201").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="1511201"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">13</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="671" rel="nofollow" href="https://www.academia.edu/Documents/in/Music">Music</a>, <script data-card-contents-for-ri="671" type="text/json">{"id":671,"name":"Music","url":"https://www.academia.edu/Documents/in/Music?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="724" rel="nofollow" href="https://www.academia.edu/Documents/in/Economics">Economics</a>, <script data-card-contents-for-ri="724" type="text/json">{"id":724,"name":"Economics","url":"https://www.academia.edu/Documents/in/Economics?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="966" rel="nofollow" href="https://www.academia.edu/Documents/in/Censorship">Censorship</a>, <script data-card-contents-for-ri="966" type="text/json">{"id":966,"name":"Censorship","url":"https://www.academia.edu/Documents/in/Censorship?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="967" rel="nofollow" href="https://www.academia.edu/Documents/in/Intellectual_Property">Intellectual Property</a><script data-card-contents-for-ri="967" type="text/json">{"id":967,"name":"Intellectual Property","url":"https://www.academia.edu/Documents/in/Intellectual_Property?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=1511201]'), work: {"id":1511201,"title":"The Piracy Crusade: How the Music Industry’s War on Sharing Destroys Markets and Erodes Civil Liberties","created_at":"2012-04-16T01:28:52.975-07:00","url":"https://www.academia.edu/1511201/The_Piracy_Crusade_How_the_Music_Industry_s_War_on_Sharing_Destroys_Markets_and_Erodes_Civil_Liberties?f_ri=7480","dom_id":"work_1511201","summary":"\"The Piracy Crusade examines the music industry’s overreaction to the threat of digital piracy, and the resulting damage done to our economy, culture and society. It challenges the commonly-accepted myth that piracy is killing the music industry, exploring the unheralded benefits of digital sharing, and the “perfect storm” of economic factors – many of them self-inflicted – that burst the industry’s bubble. \r\n\r\nThe book critiques the premise of digital piracy itself, arguing that today’s file sharers, music bloggers and mashup artists are simply making use of new technologies to recuperate music from its 20th Century status as an entertainment commodity, and returning it to its original role as a medium for interpersonal and group communication.\r\n\r\nFinally, The Piracy Crusade reveals how a flood of new laws and policies enacted in the name of combating piracy have undermined free speech, privacy and cultural innovation – all for the sake of protecting an outmoded media cartel.\"","downloadable_attachments":[{"id":35708330,"asset_id":1511201,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":1387132,"first_name":"Aram","last_name":"Sinnreich","domain_name":"american","page_name":"AramSinnreich","display_name":"Aram Sinnreich","profile_url":"https://american.academia.edu/AramSinnreich?f_ri=7480","photo":"https://0.academia-photos.com/1387132/503827/633507/s65_aram.sinnreich.jpg"}],"research_interests":[{"id":671,"name":"Music","url":"https://www.academia.edu/Documents/in/Music?f_ri=7480","nofollow":true},{"id":724,"name":"Economics","url":"https://www.academia.edu/Documents/in/Economics?f_ri=7480","nofollow":true},{"id":966,"name":"Censorship","url":"https://www.academia.edu/Documents/in/Censorship?f_ri=7480","nofollow":true},{"id":967,"name":"Intellectual Property","url":"https://www.academia.edu/Documents/in/Intellectual_Property?f_ri=7480","nofollow":true},{"id":1125,"name":"Cultural Policy","url":"https://www.academia.edu/Documents/in/Cultural_Policy?f_ri=7480"},{"id":1759,"name":"Internet Studies","url":"https://www.academia.edu/Documents/in/Internet_Studies?f_ri=7480"},{"id":6442,"name":"Creative Commons","url":"https://www.academia.edu/Documents/in/Creative_Commons?f_ri=7480"},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480"},{"id":7685,"name":"Copyright","url":"https://www.academia.edu/Documents/in/Copyright?f_ri=7480"},{"id":10188,"name":"Free Speech","url":"https://www.academia.edu/Documents/in/Free_Speech?f_ri=7480"},{"id":21715,"name":"Technology and culture of sharing","url":"https://www.academia.edu/Documents/in/Technology_and_culture_of_sharing?f_ri=7480"},{"id":23286,"name":"P2p(peer-2-Peer) Networks","url":"https://www.academia.edu/Documents/in/P2p_peer-2-Peer_Networks?f_ri=7480"},{"id":68365,"name":"Digital Piracy/ Filesharing","url":"https://www.academia.edu/Documents/in/Digital_Piracy_Filesharing?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_36811447" data-work_id="36811447" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/36811447/Policing_Black_Lives_State_violence_in_Canada_from_slavery_to_the_present">Policing Black Lives: State violence in Canada from slavery to the present</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Delving behind Canada’s veneer of multiculturalism and tolerance, Policing Black Lives traces the violent realities of anti-blackness from the slave ships to prisons, classrooms and beyond. Robyn Maynard provides readers with the first... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_36811447" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Delving behind Canada’s veneer of multiculturalism and tolerance, Policing Black Lives traces the violent realities of anti-blackness from the slave ships to prisons, classrooms and beyond. Robyn Maynard provides readers with the first comprehensive account of nearly four hundred years of state-sanctioned surveillance, criminalization and punishment of Black lives in Canada.<br /><br />While highlighting the ubiquity of Black resistance, Policing Black Lives traces the still-living legacy of slavery across multiple institutions, shedding light on the state’s role in perpetuating contemporary Black poverty and unemployment, racial profiling, law enforcement violence, incarceration, immigration detention, deportation, exploitative migrant labour practices, disproportionate child removal and low graduation rates.<br /><br />Emerging from a critical race feminist framework that insists that all Black lives matter, Maynard’s intersectional approach to anti-Black racism addresses the unique and understudied impacts of state violence as it is experienced by Black women, Black people with disabilities, as well as queer, trans, and undocumented Black communities.<br /><br />A call-to-action, Policing Black Lives urges readers to work toward dismantling structures of racial domination and re-imagining a more just society.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/36811447" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="74b29b15be9ec9f0c04e318aed01a89b" rel="nofollow" data-download="{"attachment_id":58203931,"asset_id":36811447,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/58203931/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="29202754" href="https://utoronto.academia.edu/RobynMaynard">Robyn Maynard</a><script data-card-contents-for-user="29202754" type="text/json">{"id":29202754,"first_name":"Robyn","last_name":"Maynard","domain_name":"utoronto","page_name":"RobynMaynard","display_name":"Robyn Maynard","profile_url":"https://utoronto.academia.edu/RobynMaynard?f_ri=7480","photo":"https://0.academia-photos.com/29202754/13519943/21186907/s65_robyn.maynard.jpg"}</script></span></span></li><li class="js-paper-rank-work_36811447 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="36811447"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 36811447, container: ".js-paper-rank-work_36811447", }); });</script></li><li class="js-percentile-work_36811447 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 36811447; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_36811447"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_36811447 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="36811447"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 36811447; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=36811447]").text(description); $(".js-view-count-work_36811447").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_36811447").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="36811447"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">16</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="189" rel="nofollow" href="https://www.academia.edu/Documents/in/Criminology">Criminology</a>, <script data-card-contents-for-ri="189" type="text/json">{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="296" rel="nofollow" href="https://www.academia.edu/Documents/in/Black_Studies_Or_African_American_Studies">Black Studies Or African American Studies</a>, <script data-card-contents-for-ri="296" type="text/json">{"id":296,"name":"Black Studies Or African American Studies","url":"https://www.academia.edu/Documents/in/Black_Studies_Or_African_American_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="381" rel="nofollow" href="https://www.academia.edu/Documents/in/Canadian_Studies">Canadian Studies</a>, <script data-card-contents-for-ri="381" type="text/json">{"id":381,"name":"Canadian Studies","url":"https://www.academia.edu/Documents/in/Canadian_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="537" rel="nofollow" href="https://www.academia.edu/Documents/in/Criminal_Justice">Criminal Justice</a><script data-card-contents-for-ri="537" type="text/json">{"id":537,"name":"Criminal Justice","url":"https://www.academia.edu/Documents/in/Criminal_Justice?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=36811447]'), work: {"id":36811447,"title":"Policing Black Lives: State violence in Canada from slavery to the present","created_at":"2018-06-09T04:59:05.570-07:00","url":"https://www.academia.edu/36811447/Policing_Black_Lives_State_violence_in_Canada_from_slavery_to_the_present?f_ri=7480","dom_id":"work_36811447","summary":"Delving behind Canada’s veneer of multiculturalism and tolerance, Policing Black Lives traces the violent realities of anti-blackness from the slave ships to prisons, classrooms and beyond. Robyn Maynard provides readers with the first comprehensive account of nearly four hundred years of state-sanctioned surveillance, criminalization and punishment of Black lives in Canada.\n\nWhile highlighting the ubiquity of Black resistance, Policing Black Lives traces the still-living legacy of slavery across multiple institutions, shedding light on the state’s role in perpetuating contemporary Black poverty and unemployment, racial profiling, law enforcement violence, incarceration, immigration detention, deportation, exploitative migrant labour practices, disproportionate child removal and low graduation rates.\n\nEmerging from a critical race feminist framework that insists that all Black lives matter, Maynard’s intersectional approach to anti-Black racism addresses the unique and understudied impacts of state violence as it is experienced by Black women, Black people with disabilities, as well as queer, trans, and undocumented Black communities.\n\nA call-to-action, Policing Black Lives urges readers to work toward dismantling structures of racial domination and re-imagining a more just society.","downloadable_attachments":[{"id":58203931,"asset_id":36811447,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":29202754,"first_name":"Robyn","last_name":"Maynard","domain_name":"utoronto","page_name":"RobynMaynard","display_name":"Robyn Maynard","profile_url":"https://utoronto.academia.edu/RobynMaynard?f_ri=7480","photo":"https://0.academia-photos.com/29202754/13519943/21186907/s65_robyn.maynard.jpg"}],"research_interests":[{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology?f_ri=7480","nofollow":true},{"id":296,"name":"Black Studies Or African American Studies","url":"https://www.academia.edu/Documents/in/Black_Studies_Or_African_American_Studies?f_ri=7480","nofollow":true},{"id":381,"name":"Canadian Studies","url":"https://www.academia.edu/Documents/in/Canadian_Studies?f_ri=7480","nofollow":true},{"id":537,"name":"Criminal Justice","url":"https://www.academia.edu/Documents/in/Criminal_Justice?f_ri=7480","nofollow":true},{"id":2412,"name":"Canadian History","url":"https://www.academia.edu/Documents/in/Canadian_History?f_ri=7480"},{"id":3277,"name":"Race and Racism","url":"https://www.academia.edu/Documents/in/Race_and_Racism?f_ri=7480"},{"id":6116,"name":"Child Welfare","url":"https://www.academia.edu/Documents/in/Child_Welfare?f_ri=7480"},{"id":6283,"name":"History of Slavery","url":"https://www.academia.edu/Documents/in/History_of_Slavery?f_ri=7480"},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480"},{"id":14412,"name":"Black feminism","url":"https://www.academia.edu/Documents/in/Black_feminism?f_ri=7480"},{"id":15642,"name":"Black Canadian History","url":"https://www.academia.edu/Documents/in/Black_Canadian_History?f_ri=7480"},{"id":18677,"name":"Race and Schooling","url":"https://www.academia.edu/Documents/in/Race_and_Schooling?f_ri=7480"},{"id":27510,"name":"Black Atlantic","url":"https://www.academia.edu/Documents/in/Black_Atlantic?f_ri=7480"},{"id":54342,"name":"Policing","url":"https://www.academia.edu/Documents/in/Policing?f_ri=7480"},{"id":100148,"name":"Prison Abolition","url":"https://www.academia.edu/Documents/in/Prison_Abolition?f_ri=7480"},{"id":178610,"name":"Child Welfare, social justice, Anti-Opression","url":"https://www.academia.edu/Documents/in/Child_Welfare_social_justice_Anti-Opression?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_37588874" data-work_id="37588874" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/37588874/DA_SOCIEDADE_DISCIPLINAR_PARA_A_SOCIEDADE_DE_CONTROLE">DA SOCIEDADE DISCIPLINAR PARA A SOCIEDADE DE CONTROLE</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Atualmente, o deslumbramento tecnológico determinado pelos gigantes da tecnologia, com seus hardwares e softwares e com o discurso de aproximar pessoas, coloca o usuário na condição básica de uso, já que, por esse meio, há garantia de... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_37588874" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Atualmente, o deslumbramento tecnológico determinado pelos gigantes da tecnologia, com seus hardwares e softwares e com o discurso de aproximar pessoas, coloca o usuário na condição básica de uso, já que, por esse meio, há garantia de liberdade. A realidade, porém, é oposta. Quanto maior liberdade de escolha, mais controle tecnológico. Por esse viés, opera-se uma violência que passa despercebida por todos. O progresso tecnológico, aliado à inovação, possibilitou ao homem poder adequar-se aos novos recursos embutidos nos gadgets eletrônicos; uma ferramentaria sempre à mão. A premência no aprendizado é fator crucial de permanência nesse território em contínua atualização. Os utilizadores, que não conseguirem acompanhar esse progresso, tendem a ficar na marginalidade e, consequentemente, serem excluídos. As empresas<br />– cientes dessa condição – apressam-se em dispor no mercado produtos com novidades embutidas que provavelmente nunca serão usadas. Não por culpa delas, mas porque essa modalidade lhes permite acomodar-se e depositar todas as mazelas da vida em aparelhos que possam determinar e garantir seu futuro. Propicia ainda que elas abram mão de seu estado natural e compreendam como valor agregado dos dispositivos o fator segurança, mesmo que sejam vigiadas 24 horas por dia. Qual o limite dessa proposta de autonomia que, ao mesmo tempo em que oferece escolhas, pode esbarrar na liberdade já promovida muito anteriormente por diversos pensadores? Considerando que, quanto mais segurança e justiça asseguradas, menor será a taxa de liberdade. O fascínio promovido e o progresso estipulado/manipulado pelas grandes corporações impõem a sensação de proteção como fator preponderante para a existência e a manutenção da sedação nas pessoas. Com um mundo conturbado por especulações acerca de vigilância, poder e controle, fundamenta-se a pesquisa em autores que justificam a leitura e orientam para a reflexão mais aprofundada acerca do tema proposto. Diante disso, apesar de os usuários comuns exigirem a privacidade, os governos e as corporações violam essa condição para poder exercer o controle de perto. Entretanto, para a microesfera do poder, as informações devem ser cristalinas com o propósito de manter e sustentar a infovigilância sobre os corpos dos seres viventes.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/37588874" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="23744482b88b3d1a8d4521895a36b0b8" rel="nofollow" data-download="{"attachment_id":57569434,"asset_id":37588874,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/57569434/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="15480217" href="https://pucsp.academia.edu/MarioFinottiSilva">Mario Finotti Silva</a><script data-card-contents-for-user="15480217" type="text/json">{"id":15480217,"first_name":"Mario Finotti","last_name":"Silva","domain_name":"pucsp","page_name":"MarioFinottiSilva","display_name":"Mario Finotti Silva","profile_url":"https://pucsp.academia.edu/MarioFinottiSilva?f_ri=7480","photo":"https://0.academia-photos.com/15480217/8802254/9828065/s65_mario_finotti.silva.jpg"}</script></span></span></li><li class="js-paper-rank-work_37588874 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="37588874"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 37588874, container: ".js-paper-rank-work_37588874", }); });</script></li><li class="js-percentile-work_37588874 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37588874; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_37588874"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_37588874 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="37588874"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37588874; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37588874]").text(description); $(".js-view-count-work_37588874").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_37588874").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="37588874"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">3</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="184" rel="nofollow" href="https://www.academia.edu/Documents/in/Sociology">Sociology</a>, <script data-card-contents-for-ri="184" type="text/json">{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a>, <script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="29128" rel="nofollow" href="https://www.academia.edu/Documents/in/Cybercultures">Cybercultures</a><script data-card-contents-for-ri="29128" type="text/json">{"id":29128,"name":"Cybercultures","url":"https://www.academia.edu/Documents/in/Cybercultures?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=37588874]'), work: {"id":37588874,"title":"DA SOCIEDADE DISCIPLINAR PARA A SOCIEDADE DE CONTROLE","created_at":"2018-10-15T10:09:33.363-07:00","url":"https://www.academia.edu/37588874/DA_SOCIEDADE_DISCIPLINAR_PARA_A_SOCIEDADE_DE_CONTROLE?f_ri=7480","dom_id":"work_37588874","summary":"Atualmente, o deslumbramento tecnológico determinado pelos gigantes da tecnologia, com seus hardwares e softwares e com o discurso de aproximar pessoas, coloca o usuário na condição básica de uso, já que, por esse meio, há garantia de liberdade. A realidade, porém, é oposta. Quanto maior liberdade de escolha, mais controle tecnológico. Por esse viés, opera-se uma violência que passa despercebida por todos. O progresso tecnológico, aliado à inovação, possibilitou ao homem poder adequar-se aos novos recursos embutidos nos gadgets eletrônicos; uma ferramentaria sempre à mão. A premência no aprendizado é fator crucial de permanência nesse território em contínua atualização. Os utilizadores, que não conseguirem acompanhar esse progresso, tendem a ficar na marginalidade e, consequentemente, serem excluídos. As empresas\n– cientes dessa condição – apressam-se em dispor no mercado produtos com novidades embutidas que provavelmente nunca serão usadas. Não por culpa delas, mas porque essa modalidade lhes permite acomodar-se e depositar todas as mazelas da vida em aparelhos que possam determinar e garantir seu futuro. Propicia ainda que elas abram mão de seu estado natural e compreendam como valor agregado dos dispositivos o fator segurança, mesmo que sejam vigiadas 24 horas por dia. Qual o limite dessa proposta de autonomia que, ao mesmo tempo em que oferece escolhas, pode esbarrar na liberdade já promovida muito anteriormente por diversos pensadores? Considerando que, quanto mais segurança e justiça asseguradas, menor será a taxa de liberdade. O fascínio promovido e o progresso estipulado/manipulado pelas grandes corporações impõem a sensação de proteção como fator preponderante para a existência e a manutenção da sedação nas pessoas. Com um mundo conturbado por especulações acerca de vigilância, poder e controle, fundamenta-se a pesquisa em autores que justificam a leitura e orientam para a reflexão mais aprofundada acerca do tema proposto. Diante disso, apesar de os usuários comuns exigirem a privacidade, os governos e as corporações violam essa condição para poder exercer o controle de perto. Entretanto, para a microesfera do poder, as informações devem ser cristalinas com o propósito de manter e sustentar a infovigilância sobre os corpos dos seres viventes.\n","downloadable_attachments":[{"id":57569434,"asset_id":37588874,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":15480217,"first_name":"Mario Finotti","last_name":"Silva","domain_name":"pucsp","page_name":"MarioFinottiSilva","display_name":"Mario Finotti Silva","profile_url":"https://pucsp.academia.edu/MarioFinottiSilva?f_ri=7480","photo":"https://0.academia-photos.com/15480217/8802254/9828065/s65_mario_finotti.silva.jpg"}],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":29128,"name":"Cybercultures","url":"https://www.academia.edu/Documents/in/Cybercultures?f_ri=7480","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_36878812" data-work_id="36878812" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/36878812/Dissertation_Keeping_Up_With_the_Kardashians_and_Jenners_An_Analysis_of_Postfeminism_in_Contemporary_Social_Media_Practices">Dissertation: Keeping Up With the Kardashians and Jenners: An Analysis of Postfeminism in Contemporary Social Media Practices</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This dissertation analyzes the postfeminist tendencies and biopolitics in contemporary media practices by considering the pop culture exemplar, the Kardashian-Jenner family. This dissertation received First Class Honors from Trinity... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_36878812" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This dissertation analyzes the postfeminist tendencies and biopolitics in contemporary media practices by considering the pop culture exemplar, the Kardashian-Jenner family. <br /> <br />This dissertation received First Class Honors from Trinity College Dublin. <br />Vanessa graduated with Distinction in B.A. English Literature and Media Studies.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/36878812" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="f3ae7c040785e7c0d7eeada359a2547c" rel="nofollow" data-download="{"attachment_id":62284801,"asset_id":36878812,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/62284801/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="20494557" href="https://tcd.academia.edu/VanessaChen">Vanessa Chen</a><script data-card-contents-for-user="20494557" type="text/json">{"id":20494557,"first_name":"Vanessa","last_name":"Chen","domain_name":"tcd","page_name":"VanessaChen","display_name":"Vanessa Chen","profile_url":"https://tcd.academia.edu/VanessaChen?f_ri=7480","photo":"https://0.academia-photos.com/20494557/5674153/48886514/s65_vanessa.chen.jpg"}</script></span></span></li><li class="js-paper-rank-work_36878812 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="36878812"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 36878812, container: ".js-paper-rank-work_36878812", }); });</script></li><li class="js-percentile-work_36878812 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 36878812; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_36878812"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_36878812 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="36878812"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 36878812; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=36878812]").text(description); $(".js-view-count-work_36878812").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_36878812").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="36878812"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">95</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="39" rel="nofollow" href="https://www.academia.edu/Documents/in/Marketing">Marketing</a>, <script data-card-contents-for-ri="39" type="text/json">{"id":39,"name":"Marketing","url":"https://www.academia.edu/Documents/in/Marketing?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="184" rel="nofollow" href="https://www.academia.edu/Documents/in/Sociology">Sociology</a>, <script data-card-contents-for-ri="184" type="text/json">{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="188" rel="nofollow" href="https://www.academia.edu/Documents/in/Cultural_Studies">Cultural Studies</a>, <script data-card-contents-for-ri="188" type="text/json">{"id":188,"name":"Cultural Studies","url":"https://www.academia.edu/Documents/in/Cultural_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="199" rel="nofollow" href="https://www.academia.edu/Documents/in/Media_Sociology">Media Sociology</a><script data-card-contents-for-ri="199" type="text/json">{"id":199,"name":"Media Sociology","url":"https://www.academia.edu/Documents/in/Media_Sociology?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=36878812]'), work: {"id":36878812,"title":"Dissertation: Keeping Up With the Kardashians and Jenners: An Analysis of Postfeminism in Contemporary Social Media Practices","created_at":"2018-06-20T14:00:04.231-07:00","url":"https://www.academia.edu/36878812/Dissertation_Keeping_Up_With_the_Kardashians_and_Jenners_An_Analysis_of_Postfeminism_in_Contemporary_Social_Media_Practices?f_ri=7480","dom_id":"work_36878812","summary":"This dissertation analyzes the postfeminist tendencies and biopolitics in contemporary media practices by considering the pop culture exemplar, the Kardashian-Jenner family.\r\n\r\nThis dissertation received First Class Honors from Trinity College Dublin.\r\nVanessa graduated with Distinction in B.A. English Literature and Media Studies.","downloadable_attachments":[{"id":62284801,"asset_id":36878812,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":20494557,"first_name":"Vanessa","last_name":"Chen","domain_name":"tcd","page_name":"VanessaChen","display_name":"Vanessa Chen","profile_url":"https://tcd.academia.edu/VanessaChen?f_ri=7480","photo":"https://0.academia-photos.com/20494557/5674153/48886514/s65_vanessa.chen.jpg"}],"research_interests":[{"id":39,"name":"Marketing","url":"https://www.academia.edu/Documents/in/Marketing?f_ri=7480","nofollow":true},{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=7480","nofollow":true},{"id":188,"name":"Cultural Studies","url":"https://www.academia.edu/Documents/in/Cultural_Studies?f_ri=7480","nofollow":true},{"id":199,"name":"Media Sociology","url":"https://www.academia.edu/Documents/in/Media_Sociology?f_ri=7480","nofollow":true},{"id":390,"name":"American Studies","url":"https://www.academia.edu/Documents/in/American_Studies?f_ri=7480"},{"id":696,"name":"Gender Studies","url":"https://www.academia.edu/Documents/in/Gender_Studies?f_ri=7480"},{"id":751,"name":"Labor Economics","url":"https://www.academia.edu/Documents/in/Labor_Economics?f_ri=7480"},{"id":863,"name":"Visual Studies","url":"https://www.academia.edu/Documents/in/Visual_Studies?f_ri=7480"},{"id":928,"name":"Media Studies","url":"https://www.academia.edu/Documents/in/Media_Studies?f_ri=7480"},{"id":933,"name":"New Media","url":"https://www.academia.edu/Documents/in/New_Media?f_ri=7480"},{"id":934,"name":"Media and Cultural Studies","url":"https://www.academia.edu/Documents/in/Media_and_Cultural_Studies?f_ri=7480"},{"id":957,"name":"Cultural Sociology","url":"https://www.academia.edu/Documents/in/Cultural_Sociology?f_ri=7480"},{"id":1192,"name":"Feminist Theory","url":"https://www.academia.edu/Documents/in/Feminist_Theory?f_ri=7480"},{"id":1555,"name":"Film Studies","url":"https://www.academia.edu/Documents/in/Film_Studies?f_ri=7480"},{"id":1568,"name":"Film Theory","url":"https://www.academia.edu/Documents/in/Film_Theory?f_ri=7480"},{"id":1571,"name":"Television Studies","url":"https://www.academia.edu/Documents/in/Television_Studies?f_ri=7480"},{"id":2858,"name":"Popular Culture","url":"https://www.academia.edu/Documents/in/Popular_Culture?f_ri=7480"},{"id":2869,"name":"Digital Media","url":"https://www.academia.edu/Documents/in/Digital_Media?f_ri=7480"},{"id":3225,"name":"Visual Culture","url":"https://www.academia.edu/Documents/in/Visual_Culture?f_ri=7480"},{"id":3277,"name":"Race and Racism","url":"https://www.academia.edu/Documents/in/Race_and_Racism?f_ri=7480"},{"id":3637,"name":"Advertising","url":"https://www.academia.edu/Documents/in/Advertising?f_ri=7480"},{"id":4124,"name":"Feminist Philosophy","url":"https://www.academia.edu/Documents/in/Feminist_Philosophy?f_ri=7480"},{"id":4195,"name":"Cultural Theory","url":"https://www.academia.edu/Documents/in/Cultural_Theory?f_ri=7480"},{"id":4714,"name":"Sexuality","url":"https://www.academia.edu/Documents/in/Sexuality?f_ri=7480"},{"id":4917,"name":"Gender and Sexuality","url":"https://www.academia.edu/Documents/in/Gender_and_Sexuality?f_ri=7480"},{"id":5247,"name":"Critical Race Theory","url":"https://www.academia.edu/Documents/in/Critical_Race_Theory?f_ri=7480"},{"id":5272,"name":"Identity (Culture)","url":"https://www.academia.edu/Documents/in/Identity_Culture_?f_ri=7480"},{"id":5273,"name":"Class","url":"https://www.academia.edu/Documents/in/Class?f_ri=7480"},{"id":5709,"name":"Politics","url":"https://www.academia.edu/Documents/in/Politics?f_ri=7480"},{"id":6223,"name":"English","url":"https://www.academia.edu/Documents/in/English?f_ri=7480"},{"id":6527,"name":"Celebrity Culture","url":"https://www.academia.edu/Documents/in/Celebrity_Culture?f_ri=7480"},{"id":7024,"name":"Gender","url":"https://www.academia.edu/Documents/in/Gender?f_ri=7480"},{"id":7125,"name":"Culture","url":"https://www.academia.edu/Documents/in/Culture?f_ri=7480"},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480"},{"id":8302,"name":"Gilles Deleuze","url":"https://www.academia.edu/Documents/in/Gilles_Deleuze?f_ri=7480"},{"id":8431,"name":"Slavoj Žižek","url":"https://www.academia.edu/Documents/in/Slavoj_%C5%BDi%C5%BEek?f_ri=7480"},{"id":8693,"name":"Pop Culture","url":"https://www.academia.edu/Documents/in/Pop_Culture?f_ri=7480"},{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=7480"},{"id":10453,"name":"Feminism","url":"https://www.academia.edu/Documents/in/Feminism?f_ri=7480"},{"id":11927,"name":"Michel Foucault","url":"https://www.academia.edu/Documents/in/Michel_Foucault?f_ri=7480"},{"id":12420,"name":"Neoliberalism","url":"https://www.academia.edu/Documents/in/Neoliberalism?f_ri=7480"},{"id":12421,"name":"Neoliberal ideologies","url":"https://www.academia.edu/Documents/in/Neoliberal_ideologies?f_ri=7480"},{"id":13258,"name":"Marketing Research","url":"https://www.academia.edu/Documents/in/Marketing_Research?f_ri=7480"},{"id":13958,"name":"Media","url":"https://www.academia.edu/Documents/in/Media?f_ri=7480"},{"id":14162,"name":"Sociology of the Body","url":"https://www.academia.edu/Documents/in/Sociology_of_the_Body?f_ri=7480"},{"id":14412,"name":"Black feminism","url":"https://www.academia.edu/Documents/in/Black_feminism?f_ri=7480"},{"id":15449,"name":"Slavoj Zizek","url":"https://www.academia.edu/Documents/in/Slavoj_Zizek?f_ri=7480"},{"id":16069,"name":"Critical Race Theory and Whiteness theory","url":"https://www.academia.edu/Documents/in/Critical_Race_Theory_and_Whiteness_theory?f_ri=7480"},{"id":16323,"name":"Biopolitics","url":"https://www.academia.edu/Documents/in/Biopolitics?f_ri=7480"},{"id":17447,"name":"American Popular Culture","url":"https://www.academia.edu/Documents/in/American_Popular_Culture?f_ri=7480"},{"id":18181,"name":"Postfeminism","url":"https://www.academia.edu/Documents/in/Postfeminism?f_ri=7480"},{"id":19258,"name":"Cinema","url":"https://www.academia.edu/Documents/in/Cinema?f_ri=7480"},{"id":19915,"name":"Gilles Deleuze and Felix Guattari","url":"https://www.academia.edu/Documents/in/Gilles_Deleuze_and_Felix_Guattari?f_ri=7480"},{"id":23311,"name":"Marketing Strategy","url":"https://www.academia.edu/Documents/in/Marketing_Strategy?f_ri=7480"},{"id":23735,"name":"Branding","url":"https://www.academia.edu/Documents/in/Branding?f_ri=7480"},{"id":24294,"name":"Gender and Race","url":"https://www.academia.edu/Documents/in/Gender_and_Race?f_ri=7480"},{"id":24892,"name":"Surveillance","url":"https://www.academia.edu/Documents/in/Surveillance?f_ri=7480"},{"id":26879,"name":"Social Class","url":"https://www.academia.edu/Documents/in/Social_Class?f_ri=7480"},{"id":29108,"name":"Feminist Literary Theory and Gender Studies","url":"https://www.academia.edu/Documents/in/Feminist_Literary_Theory_and_Gender_Studies?f_ri=7480"},{"id":29366,"name":"Feminism(s)","url":"https://www.academia.edu/Documents/in/Feminism_s_-1?f_ri=7480"},{"id":30439,"name":"Critical Whiteness Studies","url":"https://www.academia.edu/Documents/in/Critical_Whiteness_Studies?f_ri=7480"},{"id":30603,"name":"Social Influence","url":"https://www.academia.edu/Documents/in/Social_Influence?f_ri=7480"},{"id":31048,"name":"White Privilege","url":"https://www.academia.edu/Documents/in/White_Privilege?f_ri=7480"},{"id":34074,"name":"Television","url":"https://www.academia.edu/Documents/in/Television?f_ri=7480"},{"id":34295,"name":"Reality TV","url":"https://www.academia.edu/Documents/in/Reality_TV?f_ri=7480"},{"id":34327,"name":"Intersectionality","url":"https://www.academia.edu/Documents/in/Intersectionality?f_ri=7480"},{"id":36846,"name":"Social Media Marketing","url":"https://www.academia.edu/Documents/in/Social_Media_Marketing?f_ri=7480"},{"id":42298,"name":"Film and Media Studies","url":"https://www.academia.edu/Documents/in/Film_and_Media_Studies?f_ri=7480"},{"id":45036,"name":"Mass media","url":"https://www.academia.edu/Documents/in/Mass_media?f_ri=7480"},{"id":49663,"name":"Women and Gender Studies","url":"https://www.academia.edu/Documents/in/Women_and_Gender_Studies?f_ri=7480"},{"id":52745,"name":"Cinema Studies","url":"https://www.academia.edu/Documents/in/Cinema_Studies?f_ri=7480"},{"id":53852,"name":"TV studies","url":"https://www.academia.edu/Documents/in/TV_studies?f_ri=7480"},{"id":54734,"name":"Media Research","url":"https://www.academia.edu/Documents/in/Media_Research?f_ri=7480"},{"id":68023,"name":"Beauty","url":"https://www.academia.edu/Documents/in/Beauty?f_ri=7480"},{"id":69252,"name":"Postfeminist Popular Culture","url":"https://www.academia.edu/Documents/in/Postfeminist_Popular_Culture?f_ri=7480"},{"id":69253,"name":"Stardom and Celebrity","url":"https://www.academia.edu/Documents/in/Stardom_and_Celebrity?f_ri=7480"},{"id":78690,"name":"Celebrity","url":"https://www.academia.edu/Documents/in/Celebrity?f_ri=7480"},{"id":110388,"name":"Biopower and Biopolitics","url":"https://www.academia.edu/Documents/in/Biopower_and_Biopolitics?f_ri=7480"},{"id":112639,"name":"Critical Race and Whiteness Studies","url":"https://www.academia.edu/Documents/in/Critical_Race_and_Whiteness_Studies?f_ri=7480"},{"id":123261,"name":"Celebrity Studies","url":"https://www.academia.edu/Documents/in/Celebrity_Studies?f_ri=7480"},{"id":130938,"name":"Body studies","url":"https://www.academia.edu/Documents/in/Body_studies?f_ri=7480"},{"id":158823,"name":"Celebrity Endorsement","url":"https://www.academia.edu/Documents/in/Celebrity_Endorsement?f_ri=7480"},{"id":165026,"name":"American Dream","url":"https://www.academia.edu/Documents/in/American_Dream?f_ri=7480"},{"id":219221,"name":"Selfhood","url":"https://www.academia.edu/Documents/in/Selfhood?f_ri=7480"},{"id":236572,"name":"The Sociology of the Body","url":"https://www.academia.edu/Documents/in/The_Sociology_of_the_Body?f_ri=7480"},{"id":256465,"name":"Social Networking \u0026 Social Media","url":"https://www.academia.edu/Documents/in/Social_Networking_and_Social_Media?f_ri=7480"},{"id":263680,"name":"Marketing and Advertising","url":"https://www.academia.edu/Documents/in/Marketing_and_Advertising-2?f_ri=7480"},{"id":430314,"name":"Celebrity Politics","url":"https://www.academia.edu/Documents/in/Celebrity_Politics?f_ri=7480"},{"id":455426,"name":"Cinema and Television","url":"https://www.academia.edu/Documents/in/Cinema_and_Television?f_ri=7480"},{"id":522966,"name":"Keeping Up with the Kardashians","url":"https://www.academia.edu/Documents/in/Keeping_Up_with_the_Kardashians?f_ri=7480"},{"id":716916,"name":"Instagram","url":"https://www.academia.edu/Documents/in/Instagram?f_ri=7480"},{"id":956357,"name":"Body Cultural Studies","url":"https://www.academia.edu/Documents/in/Body_Cultural_Studies?f_ri=7480"},{"id":1134614,"name":"Selfies","url":"https://www.academia.edu/Documents/in/Selfies?f_ri=7480"},{"id":1153018,"name":"Kim Kardashian","url":"https://www.academia.edu/Documents/in/Kim_Kardashian?f_ri=7480"},{"id":1992098,"name":"Influencer Marketing","url":"https://www.academia.edu/Documents/in/Influencer_Marketing?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_34360790" data-work_id="34360790" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/34360790/The_Traditional_Research_Paper_is_Best">The Traditional Research Paper is Best</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Teaching the research paper has been considered a “present controversy” for over fifty years (Saalbach, 1963). Some scholars believe that it prepares students for “generalized academic writing” (Reiff and Bawarshi, 2011; Sutton, 1997;... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_34360790" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Teaching the research paper has been considered a “present controversy” for over fifty years (Saalbach, 1963). Some scholars believe that it prepares students for “generalized academic writing” (Reiff and Bawarshi, 2011; Sutton, 1997; Schwegeler and Shamoon, 1982). However, others have referred to the research paper as a “fossilized,” “pseudo-academic,” “mutt genre” (Nowacek, 2011; Wardle, 2007; Carroll, 1999; Larsen, 1982). This chapter argues that radical openness and information overload--two major features of new media composing environments--compromise the relevance of the traditional research paper. First, the research paper has been praised and blamed for its (in)ability to help students learn the importance of writing from sources (Brent 2013, Rooney 2000). However, the parameters of most research assignments are incapable of matching the scale of data available at any given time. For instance, typical constraints like “use 5-7 sources” for a first-year college writing course seems ridiculous when it takes seconds to retrieve thousands, if not millions, of possible sources. Next, open-access publishing and collaborative authorship have transformed the way that research is conducted and recognized across disciplines. Although teaching students how to crowdsource research makes the most sense in a data deluge, the research paper privileges single authorship. Moreover, the problems of authorship and source attribution implicate the research paper in certain kinds of fraud. For instance, plagiarism and term paper mills are a “built-in” problem of research papers (Howell, 1977). In sum, this chapter focuses on what the term "research" means in a context of too much information. It concludes by offering a brief discussion of literature relevant to this topic.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/34360790" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="08631724b9e36831596430ecac18e568" rel="nofollow" data-download="{"attachment_id":54251257,"asset_id":34360790,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/54251257/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="402794" href="https://spelman.academia.edu/AlexandriaLockett">Alexandria Lockett</a><script data-card-contents-for-user="402794" type="text/json">{"id":402794,"first_name":"Alexandria","last_name":"Lockett","domain_name":"spelman","page_name":"AlexandriaLockett","display_name":"Alexandria Lockett","profile_url":"https://spelman.academia.edu/AlexandriaLockett?f_ri=7480","photo":"https://0.academia-photos.com/402794/126202/27789459/s65_alexandria.lockett.jpg"}</script></span></span></li><li class="js-paper-rank-work_34360790 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="34360790"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 34360790, container: ".js-paper-rank-work_34360790", }); });</script></li><li class="js-percentile-work_34360790 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 34360790; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_34360790"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_34360790 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="34360790"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 34360790; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=34360790]").text(description); $(".js-view-count-work_34360790").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_34360790").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="34360790"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">12</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="37" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>, <script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1210" rel="nofollow" href="https://www.academia.edu/Documents/in/Informatics">Informatics</a>, <script data-card-contents-for-ri="1210" type="text/json">{"id":1210,"name":"Informatics","url":"https://www.academia.edu/Documents/in/Informatics?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2065" rel="nofollow" href="https://www.academia.edu/Documents/in/Research_Methodology">Research Methodology</a>, <script data-card-contents-for-ri="2065" type="text/json">{"id":2065,"name":"Research Methodology","url":"https://www.academia.edu/Documents/in/Research_Methodology?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="3557" rel="nofollow" href="https://www.academia.edu/Documents/in/History_of_Technology">History of Technology</a><script data-card-contents-for-ri="3557" type="text/json">{"id":3557,"name":"History of Technology","url":"https://www.academia.edu/Documents/in/History_of_Technology?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=34360790]'), work: {"id":34360790,"title":"The Traditional Research Paper is Best","created_at":"2017-08-26T07:14:37.771-07:00","url":"https://www.academia.edu/34360790/The_Traditional_Research_Paper_is_Best?f_ri=7480","dom_id":"work_34360790","summary":"Teaching the research paper has been considered a “present controversy” for over fifty years (Saalbach, 1963). Some scholars believe that it prepares students for “generalized academic writing” (Reiff and Bawarshi, 2011; Sutton, 1997; Schwegeler and Shamoon, 1982). However, others have referred to the research paper as a “fossilized,” “pseudo-academic,” “mutt genre” (Nowacek, 2011; Wardle, 2007; Carroll, 1999; Larsen, 1982). This chapter argues that radical openness and information overload--two major features of new media composing environments--compromise the relevance of the traditional research paper. First, the research paper has been praised and blamed for its (in)ability to help students learn the importance of writing from sources (Brent 2013, Rooney 2000). However, the parameters of most research assignments are incapable of matching the scale of data available at any given time. For instance, typical constraints like “use 5-7 sources” for a first-year college writing course seems ridiculous when it takes seconds to retrieve thousands, if not millions, of possible sources. Next, open-access publishing and collaborative authorship have transformed the way that research is conducted and recognized across disciplines. Although teaching students how to crowdsource research makes the most sense in a data deluge, the research paper privileges single authorship. Moreover, the problems of authorship and source attribution implicate the research paper in certain kinds of fraud. For instance, plagiarism and term paper mills are a “built-in” problem of research papers (Howell, 1977). In sum, this chapter focuses on what the term \"research\" means in a context of too much information. It concludes by offering a brief discussion of literature relevant to this topic.","downloadable_attachments":[{"id":54251257,"asset_id":34360790,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":402794,"first_name":"Alexandria","last_name":"Lockett","domain_name":"spelman","page_name":"AlexandriaLockett","display_name":"Alexandria Lockett","profile_url":"https://spelman.academia.edu/AlexandriaLockett?f_ri=7480","photo":"https://0.academia-photos.com/402794/126202/27789459/s65_alexandria.lockett.jpg"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=7480","nofollow":true},{"id":1210,"name":"Informatics","url":"https://www.academia.edu/Documents/in/Informatics?f_ri=7480","nofollow":true},{"id":2065,"name":"Research Methodology","url":"https://www.academia.edu/Documents/in/Research_Methodology?f_ri=7480","nofollow":true},{"id":3557,"name":"History of Technology","url":"https://www.academia.edu/Documents/in/History_of_Technology?f_ri=7480","nofollow":true},{"id":5453,"name":"Race and Ethnicity","url":"https://www.academia.edu/Documents/in/Race_and_Ethnicity?f_ri=7480"},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480"},{"id":12857,"name":"Technology and Society","url":"https://www.academia.edu/Documents/in/Technology_and_Society?f_ri=7480"},{"id":14413,"name":"Womanism","url":"https://www.academia.edu/Documents/in/Womanism?f_ri=7480"},{"id":17282,"name":"English Grammar","url":"https://www.academia.edu/Documents/in/English_Grammar?f_ri=7480"},{"id":25064,"name":"Black Feminist Theory/Thought","url":"https://www.academia.edu/Documents/in/Black_Feminist_Theory_Thought?f_ri=7480"},{"id":50569,"name":"Language Learning","url":"https://www.academia.edu/Documents/in/Language_Learning?f_ri=7480"},{"id":126300,"name":"Big Data","url":"https://www.academia.edu/Documents/in/Big_Data?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_71982581" data-work_id="71982581" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/71982581/Tecnoceno">Tecnoceno</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Chernóbil, la crisis financiera del 2008, los incendios en el Amazonas o la pandemia de coronavirus no son eventos aislados. Son “accidentes normales”, síntomas del crecimiento y la destrucción acelerados que, en menos de 70 años,... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_71982581" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Chernóbil, la crisis financiera del 2008, los incendios en el Amazonas o la pandemia de coronavirus no son eventos aislados. Son “accidentes normales”, síntomas del crecimiento y la destrucción acelerados que, en menos de 70 años, transformó nuestra vida y la del planeta para siempre.<br /><br />En Tecnoceno Flavia Costa delinea con sutileza la trama política y cultural de este mundoambiente alucinatorio cuya virtualidad se sostiene en una red material hecha de cables, satélites y edificios, y por donde desfilan bioartistas, ciencia forense, organizaciones de derechos humanos, sistemas de vigilancia y empresarios transhumanistas. Y advierte sobre el papel clave que cumplen hoy las huellas: las biométricas, las comportamentales y las que dejamos en el suelo, la atmósfera y los océanos. Unas, porque su capitalización ha desatado una feroz batalla geopolítica. Otras, porque de ellas depende el futuro de la Tierra.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/71982581" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="629a345c7de63444b4f56d984d48c7a2" rel="nofollow" data-download="{"attachment_id":81100390,"asset_id":71982581,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/81100390/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="32033821" href="https://conicet.academia.edu/FlaviaCosta">Flavia Costa</a><script data-card-contents-for-user="32033821" type="text/json">{"id":32033821,"first_name":"Flavia","last_name":"Costa","domain_name":"conicet","page_name":"FlaviaCosta","display_name":"Flavia Costa","profile_url":"https://conicet.academia.edu/FlaviaCosta?f_ri=7480","photo":"https://0.academia-photos.com/32033821/43740098/34660553/s65_flavia.costa.jpg"}</script></span></span></li><li class="js-paper-rank-work_71982581 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="71982581"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 71982581, container: ".js-paper-rank-work_71982581", }); });</script></li><li class="js-percentile-work_71982581 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 71982581; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_71982581"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_71982581 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="71982581"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 71982581; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=71982581]").text(description); $(".js-view-count-work_71982581").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_71982581").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="71982581"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">10</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="923" rel="nofollow" href="https://www.academia.edu/Documents/in/Technology">Technology</a>, <script data-card-contents-for-ri="923" type="text/json">{"id":923,"name":"Technology","url":"https://www.academia.edu/Documents/in/Technology?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a>, <script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="16323" rel="nofollow" href="https://www.academia.edu/Documents/in/Biopolitics">Biopolitics</a>, <script data-card-contents-for-ri="16323" type="text/json">{"id":16323,"name":"Biopolitics","url":"https://www.academia.edu/Documents/in/Biopolitics?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="60798" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_personal_data_social_sorting_privacy_camera_surveillance_identification_systems_i">Surveillance, personal data, social sorting, privacy, camera surveillance, identification systems, internet surveillance, biometrics</a><script data-card-contents-for-ri="60798" type="text/json">{"id":60798,"name":"Surveillance, personal data, social sorting, privacy, camera surveillance, identification systems, internet surveillance, biometrics","url":"https://www.academia.edu/Documents/in/Surveillance_personal_data_social_sorting_privacy_camera_surveillance_identification_systems_i?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=71982581]'), work: {"id":71982581,"title":"Tecnoceno","created_at":"2022-02-20T10:07:37.663-08:00","url":"https://www.academia.edu/71982581/Tecnoceno?f_ri=7480","dom_id":"work_71982581","summary":"Chernóbil, la crisis financiera del 2008, los incendios en el Amazonas o la pandemia de coronavirus no son eventos aislados. Son “accidentes normales”, síntomas del crecimiento y la destrucción acelerados que, en menos de 70 años, transformó nuestra vida y la del planeta para siempre.\n\nEn Tecnoceno Flavia Costa delinea con sutileza la trama política y cultural de este mundoambiente alucinatorio cuya virtualidad se sostiene en una red material hecha de cables, satélites y edificios, y por donde desfilan bioartistas, ciencia forense, organizaciones de derechos humanos, sistemas de vigilancia y empresarios transhumanistas. Y advierte sobre el papel clave que cumplen hoy las huellas: las biométricas, las comportamentales y las que dejamos en el suelo, la atmósfera y los océanos. Unas, porque su capitalización ha desatado una feroz batalla geopolítica. Otras, porque de ellas depende el futuro de la Tierra.","downloadable_attachments":[{"id":81100390,"asset_id":71982581,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":32033821,"first_name":"Flavia","last_name":"Costa","domain_name":"conicet","page_name":"FlaviaCosta","display_name":"Flavia Costa","profile_url":"https://conicet.academia.edu/FlaviaCosta?f_ri=7480","photo":"https://0.academia-photos.com/32033821/43740098/34660553/s65_flavia.costa.jpg"}],"research_interests":[{"id":923,"name":"Technology","url":"https://www.academia.edu/Documents/in/Technology?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":16323,"name":"Biopolitics","url":"https://www.academia.edu/Documents/in/Biopolitics?f_ri=7480","nofollow":true},{"id":60798,"name":"Surveillance, personal data, social sorting, privacy, camera surveillance, identification systems, internet surveillance, biometrics","url":"https://www.academia.edu/Documents/in/Surveillance_personal_data_social_sorting_privacy_camera_surveillance_identification_systems_i?f_ri=7480","nofollow":true},{"id":110388,"name":"Biopower and Biopolitics","url":"https://www.academia.edu/Documents/in/Biopower_and_Biopolitics?f_ri=7480"},{"id":222851,"name":"Biopolítica","url":"https://www.academia.edu/Documents/in/Biopol%C3%ADtica?f_ri=7480"},{"id":255608,"name":"Ciencia tecnología y sociedad","url":"https://www.academia.edu/Documents/in/Ciencia_tecnolog%C3%ADa_y_sociedad?f_ri=7480"},{"id":345898,"name":"Arte y tecnología","url":"https://www.academia.edu/Documents/in/Arte_y_tecnologia?f_ri=7480"},{"id":420302,"name":"Technopolitics","url":"https://www.academia.edu/Documents/in/Technopolitics?f_ri=7480"},{"id":1230153,"name":"Tecnopolítica","url":"https://www.academia.edu/Documents/in/Tecnopolitica?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_17044991" data-work_id="17044991" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/17044991/The_Impact_of_Police_Monitored_CCTV_Cameras_on_Crime_Patterns_A_Quasi_Experimental_Study_in_the_Metropolitan_City_of_Bursa_Turkey_MOBESE_Kameralar%C4%B1n%C4%B1n_Etkinli%C4%9Fi_%C3%9Czerine_Metodolojik_Bir_Risk_Analizi">The Impact of Police-Monitored CCTV Cameras on Crime Patterns: A Quasi-Experimental Study in the Metropolitan City of Bursa, Turkey - MOBESE Kameralarının Etkinliği Üzerine Metodolojik Bir Risk Analizi</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Rapid adoption and expansion of the CCTV systems in Turkey as well as all over the world have produced a fair amount of ―technological determinism‖ among many law enforcement officials, which Norris and Armstrong (1999, p. 9) define as... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_17044991" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Rapid adoption and expansion of the CCTV systems in Turkey as well as all over the world have produced a fair amount of ―technological determinism‖ among many law enforcement officials, which Norris and Armstrong (1999, p. 9) define as ―an unquestioning belief in the power of technology‖. As a matter of technological determinism, politicians and the public continue to myopically expect that the exclusive responsibility of preventing crime rest on the police-monitored CCTV cameras. Conversely, policy makers may be better informed if they consider why the law enforcement agencies should invest in the installation of the CCTV cameras in public areas based on the research. In fact, a well-designed evidence based paradigm in the CCTV literature is likely to reveal the truth about the question of ―does it work?‖<br />In addition to all previous methodological efforts, empirical evaluations in the CCTV literature are still needed to account for alternative perspectives to measure their effectiveness in the deterrence of crimes. Therefore, the present study focused on the concepts of environmental criminology, namely "crime risk at place". This research also considered the environmental risk values that might identify ―environmental conditions under which cameras would be most effective‖ (Caplan et al., 2011, p.271). Thus, the concept of ―Environmental risk value" provided a unique methodological approach to the police- monitored CCTV literature.<br />This study examined the impact of the metropolitan city of Bursa‘s city-wide system<br /><br />and certain individual police-monitored CCTV camera‘s views used to scan the landscape, respectively on street level, including aggravated assault, auto theft, thefts from autos, and larceny theft crime incident numbers in a spatial distribution of locations; and analyzed whether the environmental risk value effects on the deterrent effect of police-monitored CCTV cameras on aforementioned crime types. To accomplish that statistical analyses (paired t test, location quotient, and regression models) and risk terrain modeling (RTM) were conducted in this dissertation.<br />Three important findings were found in this study. Firstly, city-wide system effect indicated that larceny thefts and thefts from auto experienced significant reduction. However, aggravated assaults and auto thefts were not. Secondly, the results from assessing the deterrent effect of certain individual police-monitored CCTV cameras on aggravated assaults, larceny thefts, thefts from autos and auto thefts were mixed. Finally, each individual CCTV camera has a unique environment – environmental risk value that influences its deterrent effect on – aggravated assaults, larceny thefts, thefts from autos and autos theft. Further, the affect was discernable and in positive direction for each crime type.<br />Environmental risk value assessments can advance our understanding of the deterrent effect of CCTV cameras at their viewshed areas. So environmental risk sites must be taken into account when the decision process concerning CCTV cameras is made by local and national level policy makers, police agencies and politicians who try to establish where the most appropriate location to install police-monitored CCTV cameras is. In this respect RTM can be considered as a pre intervention tool so that police agencies can measure the deterrent effect of CCTV before installation. Such a pre-evaluation process increases the capacity for effective police management and crime prevention strategies in police agencies.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/17044991" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="d8dad01cb921881d023bc0a4843d329d" rel="nofollow" data-download="{"attachment_id":39318055,"asset_id":17044991,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/39318055/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="34372870" href="https://rutgers.academia.edu/EmirhanDarcanPhD">Emirhan Darcan PhD.</a><script data-card-contents-for-user="34372870" type="text/json">{"id":34372870,"first_name":"Emirhan","last_name":"Darcan PhD.","domain_name":"rutgers","page_name":"EmirhanDarcanPhD","display_name":"Emirhan Darcan PhD.","profile_url":"https://rutgers.academia.edu/EmirhanDarcanPhD?f_ri=7480","photo":"https://0.academia-photos.com/34372870/11075453/37724049/s65_emirhan.darcan_phd..jpeg"}</script></span></span></li><li class="js-paper-rank-work_17044991 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="17044991"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 17044991, container: ".js-paper-rank-work_17044991", }); });</script></li><li class="js-percentile-work_17044991 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 17044991; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_17044991"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_17044991 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="17044991"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 17044991; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=17044991]").text(description); $(".js-view-count-work_17044991").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_17044991").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="17044991"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">24</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="184" rel="nofollow" href="https://www.academia.edu/Documents/in/Sociology">Sociology</a>, <script data-card-contents-for-ri="184" type="text/json">{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="189" rel="nofollow" href="https://www.academia.edu/Documents/in/Criminology">Criminology</a>, <script data-card-contents-for-ri="189" type="text/json">{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1237" rel="nofollow" href="https://www.academia.edu/Documents/in/Social_Sciences">Social Sciences</a>, <script data-card-contents-for-ri="1237" type="text/json">{"id":1237,"name":"Social Sciences","url":"https://www.academia.edu/Documents/in/Social_Sciences?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1362" rel="nofollow" href="https://www.academia.edu/Documents/in/Spatial_Analysis">Spatial Analysis</a><script data-card-contents-for-ri="1362" type="text/json">{"id":1362,"name":"Spatial Analysis","url":"https://www.academia.edu/Documents/in/Spatial_Analysis?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=17044991]'), work: {"id":17044991,"title":"The Impact of Police-Monitored CCTV Cameras on Crime Patterns: A Quasi-Experimental Study in the Metropolitan City of Bursa, Turkey - MOBESE Kameralarının Etkinliği Üzerine Metodolojik Bir Risk Analizi","created_at":"2015-10-20T07:06:31.851-07:00","url":"https://www.academia.edu/17044991/The_Impact_of_Police_Monitored_CCTV_Cameras_on_Crime_Patterns_A_Quasi_Experimental_Study_in_the_Metropolitan_City_of_Bursa_Turkey_MOBESE_Kameralar%C4%B1n%C4%B1n_Etkinli%C4%9Fi_%C3%9Czerine_Metodolojik_Bir_Risk_Analizi?f_ri=7480","dom_id":"work_17044991","summary":"Rapid adoption and expansion of the CCTV systems in Turkey as well as all over the world have produced a fair amount of ―technological determinism‖ among many law enforcement officials, which Norris and Armstrong (1999, p. 9) define as ―an unquestioning belief in the power of technology‖. As a matter of technological determinism, politicians and the public continue to myopically expect that the exclusive responsibility of preventing crime rest on the police-monitored CCTV cameras. Conversely, policy makers may be better informed if they consider why the law enforcement agencies should invest in the installation of the CCTV cameras in public areas based on the research. In fact, a well-designed evidence based paradigm in the CCTV literature is likely to reveal the truth about the question of ―does it work?‖\nIn addition to all previous methodological efforts, empirical evaluations in the CCTV literature are still needed to account for alternative perspectives to measure their effectiveness in the deterrence of crimes. Therefore, the present study focused on the concepts of environmental criminology, namely \"crime risk at place\". This research also considered the environmental risk values that might identify ―environmental conditions under which cameras would be most effective‖ (Caplan et al., 2011, p.271). Thus, the concept of ―Environmental risk value\" provided a unique methodological approach to the police- monitored CCTV literature.\nThis study examined the impact of the metropolitan city of Bursa‘s city-wide system\n\nand certain individual police-monitored CCTV camera‘s views used to scan the landscape, respectively on street level, including aggravated assault, auto theft, thefts from autos, and larceny theft crime incident numbers in a spatial distribution of locations; and analyzed whether the environmental risk value effects on the deterrent effect of police-monitored CCTV cameras on aforementioned crime types. To accomplish that statistical analyses (paired t test, location quotient, and regression models) and risk terrain modeling (RTM) were conducted in this dissertation.\nThree important findings were found in this study. Firstly, city-wide system effect indicated that larceny thefts and thefts from auto experienced significant reduction. However, aggravated assaults and auto thefts were not. Secondly, the results from assessing the deterrent effect of certain individual police-monitored CCTV cameras on aggravated assaults, larceny thefts, thefts from autos and auto thefts were mixed. Finally, each individual CCTV camera has a unique environment – environmental risk value that influences its deterrent effect on – aggravated assaults, larceny thefts, thefts from autos and autos theft. Further, the affect was discernable and in positive direction for each crime type.\nEnvironmental risk value assessments can advance our understanding of the deterrent effect of CCTV cameras at their viewshed areas. So environmental risk sites must be taken into account when the decision process concerning CCTV cameras is made by local and national level policy makers, police agencies and politicians who try to establish where the most appropriate location to install police-monitored CCTV cameras is. In this respect RTM can be considered as a pre intervention tool so that police agencies can measure the deterrent effect of CCTV before installation. Such a pre-evaluation process increases the capacity for effective police management and crime prevention strategies in police agencies.","downloadable_attachments":[{"id":39318055,"asset_id":17044991,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":34372870,"first_name":"Emirhan","last_name":"Darcan PhD.","domain_name":"rutgers","page_name":"EmirhanDarcanPhD","display_name":"Emirhan Darcan PhD.","profile_url":"https://rutgers.academia.edu/EmirhanDarcanPhD?f_ri=7480","photo":"https://0.academia-photos.com/34372870/11075453/37724049/s65_emirhan.darcan_phd..jpeg"}],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=7480","nofollow":true},{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology?f_ri=7480","nofollow":true},{"id":1237,"name":"Social Sciences","url":"https://www.academia.edu/Documents/in/Social_Sciences?f_ri=7480","nofollow":true},{"id":1362,"name":"Spatial Analysis","url":"https://www.academia.edu/Documents/in/Spatial_Analysis?f_ri=7480","nofollow":true},{"id":1363,"name":"Spatial Modeling","url":"https://www.academia.edu/Documents/in/Spatial_Modeling?f_ri=7480"},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480"},{"id":11294,"name":"Policing Studies","url":"https://www.academia.edu/Documents/in/Policing_Studies?f_ri=7480"},{"id":13349,"name":"Geography of Crime","url":"https://www.academia.edu/Documents/in/Geography_of_Crime?f_ri=7480"},{"id":13350,"name":"Spatial Data Analysis","url":"https://www.academia.edu/Documents/in/Spatial_Data_Analysis?f_ri=7480"},{"id":15198,"name":"Spatial Statistics","url":"https://www.academia.edu/Documents/in/Spatial_Statistics?f_ri=7480"},{"id":16742,"name":"Urban Sociology","url":"https://www.academia.edu/Documents/in/Urban_Sociology?f_ri=7480"},{"id":23056,"name":"Geo-spatial analysis with GIS and GPS","url":"https://www.academia.edu/Documents/in/Geo-spatial_analysis_with_GIS_and_GPS?f_ri=7480"},{"id":60798,"name":"Surveillance, personal data, social sorting, privacy, camera surveillance, identification systems, internet surveillance, biometrics","url":"https://www.academia.edu/Documents/in/Surveillance_personal_data_social_sorting_privacy_camera_surveillance_identification_systems_i?f_ri=7480"},{"id":61835,"name":"Urban Design","url":"https://www.academia.edu/Documents/in/Urban_Design?f_ri=7480"},{"id":73908,"name":"Spatial Analysis of Crime","url":"https://www.academia.edu/Documents/in/Spatial_Analysis_of_Crime?f_ri=7480"},{"id":84728,"name":"Spatial Analysis with GIS and Geostatistical Methods","url":"https://www.academia.edu/Documents/in/Spatial_Analysis_with_GIS_and_Geostatistical_Methods?f_ri=7480"},{"id":282681,"name":"Mekansal Analiz","url":"https://www.academia.edu/Documents/in/Mekansal_Analiz?f_ri=7480"},{"id":286413,"name":"Spatial Pattern","url":"https://www.academia.edu/Documents/in/Spatial_Pattern?f_ri=7480"},{"id":507997,"name":"Geo-Spatial Analysis","url":"https://www.academia.edu/Documents/in/Geo-Spatial_Analysis?f_ri=7480"},{"id":587245,"name":"effectiveness of CCTV","url":"https://www.academia.edu/Documents/in/effectiveness_of_CCTV?f_ri=7480"},{"id":1493829,"name":"Risk Analizi","url":"https://www.academia.edu/Documents/in/Risk_Analizi?f_ri=7480"},{"id":1723635,"name":"Public Policy","url":"https://www.academia.edu/Documents/in/Public_Policy?f_ri=7480"},{"id":1983288,"name":"Spatial pattern analysis","url":"https://www.academia.edu/Documents/in/Spatial_pattern_analysis?f_ri=7480"},{"id":2656256,"name":"Risk Terrain Modeling","url":"https://www.academia.edu/Documents/in/Risk_Terrain_Modeling?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_56152541" data-work_id="56152541" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/56152541/The_concept_of_war_in_the_World_of_Warcraft">The concept of war in the World of Warcraft</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/56152541" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="6d30d09f1b8ef74b533ff26702d7b5ea" rel="nofollow" data-download="{"attachment_id":71679179,"asset_id":56152541,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/71679179/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="26414206" href="https://utwente.academia.edu/MNagenborg">Michael Nagenborg</a><script data-card-contents-for-user="26414206" type="text/json">{"id":26414206,"first_name":"Michael","last_name":"Nagenborg","domain_name":"utwente","page_name":"MNagenborg","display_name":"Michael Nagenborg","profile_url":"https://utwente.academia.edu/MNagenborg?f_ri=7480","photo":"https://0.academia-photos.com/26414206/7321252/8234051/s65_michael.nagenborg.jpg"}</script></span></span></li><li class="js-paper-rank-work_56152541 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="56152541"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 56152541, container: ".js-paper-rank-work_56152541", }); });</script></li><li class="js-percentile-work_56152541 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 56152541; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_56152541"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_56152541 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="56152541"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 56152541; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=56152541]").text(description); $(".js-view-count-work_56152541").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_56152541").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="56152541"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">6</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="803" rel="nofollow" href="https://www.academia.edu/Documents/in/Philosophy">Philosophy</a>, <script data-card-contents-for-ri="803" type="text/json">{"id":803,"name":"Philosophy","url":"https://www.academia.edu/Documents/in/Philosophy?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="883" rel="nofollow" href="https://www.academia.edu/Documents/in/Game_studies">Game studies</a>, <script data-card-contents-for-ri="883" type="text/json">{"id":883,"name":"Game studies","url":"https://www.academia.edu/Documents/in/Game_studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5199" rel="nofollow" href="https://www.academia.edu/Documents/in/Video_Games">Video Games</a>, <script data-card-contents-for-ri="5199" type="text/json">{"id":5199,"name":"Video Games","url":"https://www.academia.edu/Documents/in/Video_Games?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a><script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=56152541]'), work: {"id":56152541,"title":"The concept of war in the World of Warcraft","created_at":"2021-10-06T22:33:45.935-07:00","url":"https://www.academia.edu/56152541/The_concept_of_war_in_the_World_of_Warcraft?f_ri=7480","dom_id":"work_56152541","summary":null,"downloadable_attachments":[{"id":71679179,"asset_id":56152541,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":26414206,"first_name":"Michael","last_name":"Nagenborg","domain_name":"utwente","page_name":"MNagenborg","display_name":"Michael Nagenborg","profile_url":"https://utwente.academia.edu/MNagenborg?f_ri=7480","photo":"https://0.academia-photos.com/26414206/7321252/8234051/s65_michael.nagenborg.jpg"}],"research_interests":[{"id":803,"name":"Philosophy","url":"https://www.academia.edu/Documents/in/Philosophy?f_ri=7480","nofollow":true},{"id":883,"name":"Game studies","url":"https://www.academia.edu/Documents/in/Game_studies?f_ri=7480","nofollow":true},{"id":5199,"name":"Video Games","url":"https://www.academia.edu/Documents/in/Video_Games?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":142769,"name":"World of Warcraft","url":"https://www.academia.edu/Documents/in/World_of_Warcraft?f_ri=7480"},{"id":634263,"name":"Game Studies","url":"https://www.academia.edu/Documents/in/Game_Studies-1?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_35871297" data-work_id="35871297" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/35871297/Say_Their_Names_Filmed_Encounters_Between_Black_Americans_and_the_Police">Say Their Names: Filmed Encounters Between Black Americans and the Police</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">There is a line of reasoning shared by police officials, police unions, legislators, and civil rights organizers that supposes that videos of the police behaving badly will naturally lead to reform. This is the logic that fuels expensive... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_35871297" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">There is a line of reasoning shared by police officials, police unions, legislators, and civil rights organizers that supposes that videos of the police behaving badly will naturally lead to reform. This is the logic that fuels expensive body camera programs, like the ones implemented by the NYPD, LAPD, and Department of Justice. However, the idea that surveillance in the hands of the state can be somehow emancipatory is laughable. To equate the footage of Rodney King or Eric Garner with footage taken from police cameras is to fundamentally misunderstand the nuance that images express. Existing social vulnerabilities migrate seamlessly into new technologies, and photography’s dominant mode is to reinforce, not resist, existing structures of power.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/35871297" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="ec97162f6516e6127863dc3cee4709ed" rel="nofollow" data-download="{"attachment_id":55751657,"asset_id":35871297,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/55751657/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="27595117" href="https://upeace.academia.edu/LouiseHo">Louise Ho</a><script data-card-contents-for-user="27595117" type="text/json">{"id":27595117,"first_name":"Louise","last_name":"Ho","domain_name":"upeace","page_name":"LouiseHo","display_name":"Louise Ho","profile_url":"https://upeace.academia.edu/LouiseHo?f_ri=7480","photo":"https://0.academia-photos.com/27595117/11057811/18452530/s65_louise.ho.png"}</script></span></span></li><li class="js-paper-rank-work_35871297 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="35871297"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 35871297, container: ".js-paper-rank-work_35871297", }); });</script></li><li class="js-percentile-work_35871297 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 35871297; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_35871297"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_35871297 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="35871297"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 35871297; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=35871297]").text(description); $(".js-view-count-work_35871297").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_35871297").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="35871297"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">10</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="296" rel="nofollow" href="https://www.academia.edu/Documents/in/Black_Studies_Or_African_American_Studies">Black Studies Or African American Studies</a>, <script data-card-contents-for-ri="296" type="text/json">{"id":296,"name":"Black Studies Or African American Studies","url":"https://www.academia.edu/Documents/in/Black_Studies_Or_African_American_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1555" rel="nofollow" href="https://www.academia.edu/Documents/in/Film_Studies">Film Studies</a>, <script data-card-contents-for-ri="1555" type="text/json">{"id":1555,"name":"Film Studies","url":"https://www.academia.edu/Documents/in/Film_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1568" rel="nofollow" href="https://www.academia.edu/Documents/in/Film_Theory">Film Theory</a>, <script data-card-contents-for-ri="1568" type="text/json">{"id":1568,"name":"Film Theory","url":"https://www.academia.edu/Documents/in/Film_Theory?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4730" rel="nofollow" href="https://www.academia.edu/Documents/in/Mass_Communication">Mass Communication</a><script data-card-contents-for-ri="4730" type="text/json">{"id":4730,"name":"Mass Communication","url":"https://www.academia.edu/Documents/in/Mass_Communication?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=35871297]'), work: {"id":35871297,"title":"Say Their Names: Filmed Encounters Between Black Americans and the Police","created_at":"2018-02-08T08:50:26.529-08:00","url":"https://www.academia.edu/35871297/Say_Their_Names_Filmed_Encounters_Between_Black_Americans_and_the_Police?f_ri=7480","dom_id":"work_35871297","summary":"There is a line of reasoning shared by police officials, police unions, legislators, and civil rights organizers that supposes that videos of the police behaving badly will naturally lead to reform. This is the logic that fuels expensive body camera programs, like the ones implemented by the NYPD, LAPD, and Department of Justice. However, the idea that surveillance in the hands of the state can be somehow emancipatory is laughable. To equate the footage of Rodney King or Eric Garner with footage taken from police cameras is to fundamentally misunderstand the nuance that images express. Existing social vulnerabilities migrate seamlessly into new technologies, and photography’s dominant mode is to reinforce, not resist, existing structures of power. ","downloadable_attachments":[{"id":55751657,"asset_id":35871297,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":27595117,"first_name":"Louise","last_name":"Ho","domain_name":"upeace","page_name":"LouiseHo","display_name":"Louise Ho","profile_url":"https://upeace.academia.edu/LouiseHo?f_ri=7480","photo":"https://0.academia-photos.com/27595117/11057811/18452530/s65_louise.ho.png"}],"research_interests":[{"id":296,"name":"Black Studies Or African American Studies","url":"https://www.academia.edu/Documents/in/Black_Studies_Or_African_American_Studies?f_ri=7480","nofollow":true},{"id":1555,"name":"Film Studies","url":"https://www.academia.edu/Documents/in/Film_Studies?f_ri=7480","nofollow":true},{"id":1568,"name":"Film Theory","url":"https://www.academia.edu/Documents/in/Film_Theory?f_ri=7480","nofollow":true},{"id":4730,"name":"Mass Communication","url":"https://www.academia.edu/Documents/in/Mass_Communication?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480"},{"id":36981,"name":"Police Accountability","url":"https://www.academia.edu/Documents/in/Police_Accountability?f_ri=7480"},{"id":36982,"name":"Police Reform","url":"https://www.academia.edu/Documents/in/Police_Reform?f_ri=7480"},{"id":38704,"name":"Police History","url":"https://www.academia.edu/Documents/in/Police_History?f_ri=7480"},{"id":42298,"name":"Film and Media Studies","url":"https://www.academia.edu/Documents/in/Film_and_Media_Studies?f_ri=7480"},{"id":198723,"name":"Sousveillance","url":"https://www.academia.edu/Documents/in/Sousveillance?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_63902022" data-work_id="63902022" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/63902022/After_Snowden_Rethinking_the_Impact_of_Surveillance">After Snowden: Rethinking the Impact of Surveillance</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Current revelations about the secret US-NSA program, PRISM, have confirmed the large-scale mass surveillance of the telecommunication and electronic messages of governments, companies, and citizens, including the United States' closest... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_63902022" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Current revelations about the secret US-NSA program, PRISM, have confirmed the large-scale mass surveillance of the telecommunication and electronic messages of governments, companies, and citizens, including the United States' closest allies in Europe and Latin America. The transnational ramifications of surveillance call for a re-evaluation of contemporary world politics' practices. The debate cannot be limited to the United States versus the rest of the world or to surveillance versus privacy; much more is at stake. This collective article briefly describes the specificities of cyber mass surveillance, including its mix of the practices of intelligence services and those of private companies providing services around the world. It then investigates the impact of these practices on national security, diplomacy, human rights, democracy, subjectivity, and obedience.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/63902022" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="881d295d2e44eb35aec7acb6b5445cf0" rel="nofollow" data-download="{"attachment_id":76171333,"asset_id":63902022,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/76171333/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="47023996" href="https://independent.academia.edu/DavidLyon9">David Lyon</a><script data-card-contents-for-user="47023996" type="text/json">{"id":47023996,"first_name":"David","last_name":"Lyon","domain_name":"independent","page_name":"DavidLyon9","display_name":"David Lyon","profile_url":"https://independent.academia.edu/DavidLyon9?f_ri=7480","photo":"https://0.academia-photos.com/47023996/105456940/94656865/s65_david.lyon.jpeg"}</script></span></span></li><li class="js-paper-rank-work_63902022 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="63902022"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 63902022, container: ".js-paper-rank-work_63902022", }); });</script></li><li class="js-percentile-work_63902022 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 63902022; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_63902022"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_63902022 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="63902022"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 63902022; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=63902022]").text(description); $(".js-view-count-work_63902022").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_63902022").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="63902022"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">14</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="184" rel="nofollow" href="https://www.academia.edu/Documents/in/Sociology">Sociology</a>, <script data-card-contents-for-ri="184" type="text/json">{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="201" rel="nofollow" href="https://www.academia.edu/Documents/in/Political_Sociology">Political Sociology</a>, <script data-card-contents-for-ri="201" type="text/json">{"id":201,"name":"Political Sociology","url":"https://www.academia.edu/Documents/in/Political_Sociology?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="383" rel="nofollow" href="https://www.academia.edu/Documents/in/European_Studies">European Studies</a>, <script data-card-contents-for-ri="383" type="text/json">{"id":383,"name":"European Studies","url":"https://www.academia.edu/Documents/in/European_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="797" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a><script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=63902022]'), work: {"id":63902022,"title":"After Snowden: Rethinking the Impact of Surveillance","created_at":"2021-12-12T05:16:59.781-08:00","url":"https://www.academia.edu/63902022/After_Snowden_Rethinking_the_Impact_of_Surveillance?f_ri=7480","dom_id":"work_63902022","summary":"Current revelations about the secret US-NSA program, PRISM, have confirmed the large-scale mass surveillance of the telecommunication and electronic messages of governments, companies, and citizens, including the United States' closest allies in Europe and Latin America. The transnational ramifications of surveillance call for a re-evaluation of contemporary world politics' practices. The debate cannot be limited to the United States versus the rest of the world or to surveillance versus privacy; much more is at stake. This collective article briefly describes the specificities of cyber mass surveillance, including its mix of the practices of intelligence services and those of private companies providing services around the world. It then investigates the impact of these practices on national security, diplomacy, human rights, democracy, subjectivity, and obedience.","downloadable_attachments":[{"id":76171333,"asset_id":63902022,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":47023996,"first_name":"David","last_name":"Lyon","domain_name":"independent","page_name":"DavidLyon9","display_name":"David Lyon","profile_url":"https://independent.academia.edu/DavidLyon9?f_ri=7480","photo":"https://0.academia-photos.com/47023996/105456940/94656865/s65_david.lyon.jpeg"}],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=7480","nofollow":true},{"id":201,"name":"Political Sociology","url":"https://www.academia.edu/Documents/in/Political_Sociology?f_ri=7480","nofollow":true},{"id":383,"name":"European Studies","url":"https://www.academia.edu/Documents/in/European_Studies?f_ri=7480","nofollow":true},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=7480","nofollow":true},{"id":1696,"name":"Political Theory","url":"https://www.academia.edu/Documents/in/Political_Theory?f_ri=7480"},{"id":2592,"name":"Human Rights","url":"https://www.academia.edu/Documents/in/Human_Rights?f_ri=7480"},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=7480"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=7480"},{"id":5535,"name":"Critical Security Studies","url":"https://www.academia.edu/Documents/in/Critical_Security_Studies?f_ri=7480"},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480"},{"id":10344,"name":"International Politics","url":"https://www.academia.edu/Documents/in/International_Politics?f_ri=7480"},{"id":24892,"name":"Surveillance","url":"https://www.academia.edu/Documents/in/Surveillance?f_ri=7480"},{"id":70266,"name":"Brazilian Foreign policy","url":"https://www.academia.edu/Documents/in/Brazilian_Foreign_policy?f_ri=7480"},{"id":918782,"name":"Edward Snowden","url":"https://www.academia.edu/Documents/in/Edward_Snowden?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_29924062" data-work_id="29924062" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/29924062/Tomgram_Alfred_McCoy_Surveillance_State_U_S_A_November_12_2009_">Tomgram: Alfred McCoy, Surveillance State, U.S.A. (November 12, 2009)</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/29924062" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="6bf548b44ce18d343857b36cf5745efb" rel="nofollow" data-download="{"attachment_id":50382594,"asset_id":29924062,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/50382594/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="54609288" href="https://wisc.academia.edu/AlfredMcCoy">Alfred W McCoy</a><script data-card-contents-for-user="54609288" type="text/json">{"id":54609288,"first_name":"Alfred","last_name":"McCoy","domain_name":"wisc","page_name":"AlfredMcCoy","display_name":"Alfred W McCoy","profile_url":"https://wisc.academia.edu/AlfredMcCoy?f_ri=7480","photo":"https://0.academia-photos.com/54609288/14401218/15315901/s65_alfred.mccoy.jpg"}</script></span></span></li><li class="js-paper-rank-work_29924062 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="29924062"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 29924062, container: ".js-paper-rank-work_29924062", }); });</script></li><li class="js-percentile-work_29924062 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 29924062; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_29924062"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_29924062 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="29924062"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 29924062; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=29924062]").text(description); $(".js-view-count-work_29924062").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_29924062").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="29924062"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">6</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="3705" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Security">International Security</a>, <script data-card-contents-for-ri="3705" type="text/json">{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4370" rel="nofollow" href="https://www.academia.edu/Documents/in/Security">Security</a>, <script data-card-contents-for-ri="4370" type="text/json">{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a>, <script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="24892" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance">Surveillance</a><script data-card-contents-for-ri="24892" type="text/json">{"id":24892,"name":"Surveillance","url":"https://www.academia.edu/Documents/in/Surveillance?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=29924062]'), work: {"id":29924062,"title":"Tomgram: Alfred McCoy, Surveillance State, U.S.A. (November 12, 2009)","created_at":"2016-11-17T13:12:54.420-08:00","url":"https://www.academia.edu/29924062/Tomgram_Alfred_McCoy_Surveillance_State_U_S_A_November_12_2009_?f_ri=7480","dom_id":"work_29924062","summary":null,"downloadable_attachments":[{"id":50382594,"asset_id":29924062,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":54609288,"first_name":"Alfred","last_name":"McCoy","domain_name":"wisc","page_name":"AlfredMcCoy","display_name":"Alfred W McCoy","profile_url":"https://wisc.academia.edu/AlfredMcCoy?f_ri=7480","photo":"https://0.academia-photos.com/54609288/14401218/15315901/s65_alfred.mccoy.jpg"}],"research_interests":[{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=7480","nofollow":true},{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":24892,"name":"Surveillance","url":"https://www.academia.edu/Documents/in/Surveillance?f_ri=7480","nofollow":true},{"id":30456,"name":"War on Terror","url":"https://www.academia.edu/Documents/in/War_on_Terror?f_ri=7480"},{"id":36487,"name":"U.S. Foreign Policy","url":"https://www.academia.edu/Documents/in/U.S._Foreign_Policy?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_18028812" data-work_id="18028812" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/18028812/Necessary_Force_Art_in_the_Police_State_exhibition_">Necessary Force: Art in the Police State (exhibition)</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">brochure for exhibition co-curated with Kym Pinder, Art Museum of the University of New Mexico, 11 September 2015 - 12 December 2015</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/18028812" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="8e1345b297e198afc4c14fae5cf13690" rel="nofollow" data-download="{"attachment_id":39836898,"asset_id":18028812,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/39836898/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="778255" href="https://cca.academia.edu/KarenFiss">Karen Fiss</a><script data-card-contents-for-user="778255" type="text/json">{"id":778255,"first_name":"Karen","last_name":"Fiss","domain_name":"cca","page_name":"KarenFiss","display_name":"Karen Fiss","profile_url":"https://cca.academia.edu/KarenFiss?f_ri=7480","photo":"https://0.academia-photos.com/778255/263192/3779339/s65_karen.fiss.png"}</script></span></span></li><li class="js-paper-rank-work_18028812 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="18028812"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 18028812, container: ".js-paper-rank-work_18028812", }); });</script></li><li class="js-percentile-work_18028812 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 18028812; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_18028812"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_18028812 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="18028812"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 18028812; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=18028812]").text(description); $(".js-view-count-work_18028812").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_18028812").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="18028812"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">7</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="3051" rel="nofollow" href="https://www.academia.edu/Documents/in/Contemporary_Art">Contemporary Art</a>, <script data-card-contents-for-ri="3051" type="text/json">{"id":3051,"name":"Contemporary Art","url":"https://www.academia.edu/Documents/in/Contemporary_Art?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a>, <script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="14437" rel="nofollow" href="https://www.academia.edu/Documents/in/Civil_Rights_Movement">Civil Rights Movement</a>, <script data-card-contents-for-ri="14437" type="text/json">{"id":14437,"name":"Civil Rights Movement","url":"https://www.academia.edu/Documents/in/Civil_Rights_Movement?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="27665" rel="nofollow" href="https://www.academia.edu/Documents/in/Photography_Visual_Studies_">Photography (Visual Studies)</a><script data-card-contents-for-ri="27665" type="text/json">{"id":27665,"name":"Photography (Visual Studies)","url":"https://www.academia.edu/Documents/in/Photography_Visual_Studies_?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=18028812]'), work: {"id":18028812,"title":"Necessary Force: Art in the Police State (exhibition)","created_at":"2015-11-09T09:17:08.484-08:00","url":"https://www.academia.edu/18028812/Necessary_Force_Art_in_the_Police_State_exhibition_?f_ri=7480","dom_id":"work_18028812","summary":"brochure for exhibition co-curated with Kym Pinder, Art Museum of the University of New Mexico, 11 September 2015 - 12 December 2015","downloadable_attachments":[{"id":39836898,"asset_id":18028812,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":778255,"first_name":"Karen","last_name":"Fiss","domain_name":"cca","page_name":"KarenFiss","display_name":"Karen Fiss","profile_url":"https://cca.academia.edu/KarenFiss?f_ri=7480","photo":"https://0.academia-photos.com/778255/263192/3779339/s65_karen.fiss.png"}],"research_interests":[{"id":3051,"name":"Contemporary Art","url":"https://www.academia.edu/Documents/in/Contemporary_Art?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":14437,"name":"Civil Rights Movement","url":"https://www.academia.edu/Documents/in/Civil_Rights_Movement?f_ri=7480","nofollow":true},{"id":27665,"name":"Photography (Visual Studies)","url":"https://www.academia.edu/Documents/in/Photography_Visual_Studies_?f_ri=7480","nofollow":true},{"id":146308,"name":"Police use of force","url":"https://www.academia.edu/Documents/in/Police_use_of_force?f_ri=7480"},{"id":796821,"name":"Race and Mass Incarceration","url":"https://www.academia.edu/Documents/in/Race_and_Mass_Incarceration?f_ri=7480"},{"id":1901957,"name":"Black Lives Matter","url":"https://www.academia.edu/Documents/in/Black_Lives_Matter?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_9272473" data-work_id="9272473" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/9272473/Casual_Surveillance_Why_We_Should_Pay_Attention_to_Candy_Crush_Saga_and_Other_Casual_Games">Casual Surveillance: Why We Should Pay Attention to Candy Crush Saga and Other Casual Games</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">While players are enjoying casual mobile games like Candy Crush Saga, we also must negotiate elements that have been brought to the forefront by the intersection of networked play environments and casual game technologies. While casual... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_9272473" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">While players are enjoying casual mobile games like Candy Crush Saga, we also must negotiate elements that have been brought to the forefront by the intersection of networked play environments and casual game technologies. While casual games are fun to play and often seemingly banal—provoking questions of why anyone would study Candy Crush academically—they in fact can reveal a whole host of issues worthy of our attention, such as privacy and surveillance; the readability and accessibility of terms of service; and intellectual property issues.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/9272473" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="3f304fe2167c20ce795251c7ba3c764a" rel="nofollow" data-download="{"attachment_id":38420448,"asset_id":9272473,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/38420448/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3847609" href="https://manoa-hawaii.academia.edu/StephanieVie">Stephanie Vie</a><script data-card-contents-for-user="3847609" type="text/json">{"id":3847609,"first_name":"Stephanie","last_name":"Vie","domain_name":"manoa-hawaii","page_name":"StephanieVie","display_name":"Stephanie Vie","profile_url":"https://manoa-hawaii.academia.edu/StephanieVie?f_ri=7480","photo":"https://0.academia-photos.com/3847609/1667136/20663397/s65_stephanie.vie.jpg"}</script></span></span></li><li class="js-paper-rank-work_9272473 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="9272473"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 9272473, container: ".js-paper-rank-work_9272473", }); });</script></li><li class="js-percentile-work_9272473 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 9272473; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_9272473"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_9272473 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="9272473"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 9272473; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=9272473]").text(description); $(".js-view-count-work_9272473").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_9272473").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="9272473"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">11</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="2009" rel="nofollow" href="https://www.academia.edu/Documents/in/Data_Mining">Data Mining</a>, <script data-card-contents-for-ri="2009" type="text/json">{"id":2009,"name":"Data Mining","url":"https://www.academia.edu/Documents/in/Data_Mining?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2783" rel="nofollow" href="https://www.academia.edu/Documents/in/Privacy">Privacy</a>, <script data-card-contents-for-ri="2783" type="text/json">{"id":2783,"name":"Privacy","url":"https://www.academia.edu/Documents/in/Privacy?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4595" rel="nofollow" href="https://www.academia.edu/Documents/in/Video_Games_and_Learning">Video Games and Learning</a>, <script data-card-contents-for-ri="4595" type="text/json">{"id":4595,"name":"Video Games and Learning","url":"https://www.academia.edu/Documents/in/Video_Games_and_Learning?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5006" rel="nofollow" href="https://www.academia.edu/Documents/in/Computer_Games_Technology">Computer Games Technology</a><script data-card-contents-for-ri="5006" type="text/json">{"id":5006,"name":"Computer Games Technology","url":"https://www.academia.edu/Documents/in/Computer_Games_Technology?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=9272473]'), work: {"id":9272473,"title":"Casual Surveillance: Why We Should Pay Attention to Candy Crush Saga and Other Casual Games","created_at":"2014-11-12T08:08:36.628-08:00","url":"https://www.academia.edu/9272473/Casual_Surveillance_Why_We_Should_Pay_Attention_to_Candy_Crush_Saga_and_Other_Casual_Games?f_ri=7480","dom_id":"work_9272473","summary":"While players are enjoying casual mobile games like Candy Crush Saga, we also must negotiate elements that have been brought to the forefront by the intersection of networked play environments and casual game technologies. While casual games are fun to play and often seemingly banal—provoking questions of why anyone would study Candy Crush academically—they in fact can reveal a whole host of issues worthy of our attention, such as privacy and surveillance; the readability and accessibility of terms of service; and intellectual property issues.","downloadable_attachments":[{"id":38420448,"asset_id":9272473,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3847609,"first_name":"Stephanie","last_name":"Vie","domain_name":"manoa-hawaii","page_name":"StephanieVie","display_name":"Stephanie Vie","profile_url":"https://manoa-hawaii.academia.edu/StephanieVie?f_ri=7480","photo":"https://0.academia-photos.com/3847609/1667136/20663397/s65_stephanie.vie.jpg"}],"research_interests":[{"id":2009,"name":"Data Mining","url":"https://www.academia.edu/Documents/in/Data_Mining?f_ri=7480","nofollow":true},{"id":2783,"name":"Privacy","url":"https://www.academia.edu/Documents/in/Privacy?f_ri=7480","nofollow":true},{"id":4595,"name":"Video Games and Learning","url":"https://www.academia.edu/Documents/in/Video_Games_and_Learning?f_ri=7480","nofollow":true},{"id":5006,"name":"Computer Games Technology","url":"https://www.academia.edu/Documents/in/Computer_Games_Technology?f_ri=7480","nofollow":true},{"id":5199,"name":"Video Games","url":"https://www.academia.edu/Documents/in/Video_Games?f_ri=7480"},{"id":5208,"name":"Human-Computer Interaction for Games","url":"https://www.academia.edu/Documents/in/Human-Computer_Interaction_for_Games?f_ri=7480"},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480"},{"id":23661,"name":"Computer Games Education","url":"https://www.academia.edu/Documents/in/Computer_Games_Education?f_ri=7480"},{"id":24892,"name":"Surveillance","url":"https://www.academia.edu/Documents/in/Surveillance?f_ri=7480"},{"id":45182,"name":"Casual Games","url":"https://www.academia.edu/Documents/in/Casual_Games?f_ri=7480"},{"id":70422,"name":"Social Networking Security and Privacy","url":"https://www.academia.edu/Documents/in/Social_Networking_Security_and_Privacy?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_50830741" data-work_id="50830741" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" rel="nofollow" href="https://www.academia.edu/50830741/Introduction_Histories_of_Surveillance_from_Antiquity_to_the_Digital_Era">Introduction: Histories of Surveillance from Antiquity to the Digital Era</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">Introductory chapter to edited research volume on the history of surveillance.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/50830741" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="5287034" href="https://lu.academia.edu/AndreasMarklund">Andreas Marklund</a><script data-card-contents-for-user="5287034" type="text/json">{"id":5287034,"first_name":"Andreas","last_name":"Marklund","domain_name":"lu","page_name":"AndreasMarklund","display_name":"Andreas Marklund","profile_url":"https://lu.academia.edu/AndreasMarklund?f_ri=7480","photo":"https://0.academia-photos.com/5287034/2324999/14221903/s65_andreas.marklund.jpg"}</script></span></span></li><li class="js-paper-rank-work_50830741 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="50830741"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 50830741, container: ".js-paper-rank-work_50830741", }); });</script></li><li class="js-percentile-work_50830741 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 50830741; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_50830741"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_50830741 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="50830741"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 50830741; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=50830741]").text(description); $(".js-view-count-work_50830741").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_50830741").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="50830741"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">8</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="132" rel="nofollow" href="https://www.academia.edu/Documents/in/History_of_Science_and_Technology">History of Science and Technology</a>, <script data-card-contents-for-ri="132" type="text/json">{"id":132,"name":"History of Science and Technology","url":"https://www.academia.edu/Documents/in/History_of_Science_and_Technology?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="3557" rel="nofollow" href="https://www.academia.edu/Documents/in/History_of_Technology">History of Technology</a>, <script data-card-contents-for-ri="3557" type="text/json">{"id":3557,"name":"History of Technology","url":"https://www.academia.edu/Documents/in/History_of_Technology?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a>, <script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="10218" rel="nofollow" href="https://www.academia.edu/Documents/in/History_Of_Information">History Of Information</a><script data-card-contents-for-ri="10218" type="text/json">{"id":10218,"name":"History Of Information","url":"https://www.academia.edu/Documents/in/History_Of_Information?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=50830741]'), work: {"id":50830741,"title":"Introduction: Histories of Surveillance from Antiquity to the Digital Era","created_at":"2021-08-11T08:44:18.334-07:00","url":"https://www.academia.edu/50830741/Introduction_Histories_of_Surveillance_from_Antiquity_to_the_Digital_Era?f_ri=7480","dom_id":"work_50830741","summary":"Introductory chapter to edited research volume on the history of surveillance. ","downloadable_attachments":[],"ordered_authors":[{"id":5287034,"first_name":"Andreas","last_name":"Marklund","domain_name":"lu","page_name":"AndreasMarklund","display_name":"Andreas Marklund","profile_url":"https://lu.academia.edu/AndreasMarklund?f_ri=7480","photo":"https://0.academia-photos.com/5287034/2324999/14221903/s65_andreas.marklund.jpg"}],"research_interests":[{"id":132,"name":"History of Science and Technology","url":"https://www.academia.edu/Documents/in/History_of_Science_and_Technology?f_ri=7480","nofollow":true},{"id":3557,"name":"History of Technology","url":"https://www.academia.edu/Documents/in/History_of_Technology?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":10218,"name":"History Of Information","url":"https://www.academia.edu/Documents/in/History_Of_Information?f_ri=7480","nofollow":true},{"id":11927,"name":"Michel Foucault","url":"https://www.academia.edu/Documents/in/Michel_Foucault?f_ri=7480"},{"id":15848,"name":"History of Communication","url":"https://www.academia.edu/Documents/in/History_of_Communication?f_ri=7480"},{"id":52096,"name":"Foucault power/knowledge - discourse","url":"https://www.academia.edu/Documents/in/Foucault_power_knowledge_-_discourse?f_ri=7480"},{"id":1858440,"name":"History of surveillance","url":"https://www.academia.edu/Documents/in/History_of_surveillance?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_44639587" data-work_id="44639587" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/44639587/Migrant_Workers_Artisanal_Gold_Mining_and_More_Than_Human_Sousveillance_in_South_Africas_Closed_Mines">Migrant Workers, Artisanal Gold Mining, and More-Than-Human Sousveillance in South Africa's Closed Mines</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Informal gold miners in South Africa are not “illegal" because they mine gold. They are criminalized from the start, and mine gold because the substance makes it difficult for police and private industry to forensically track and trace... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_44639587" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Informal gold miners in South Africa are not “illegal" because they mine gold. They are criminalized from the start, and mine gold because the substance makes it difficult for police and private industry to forensically track and trace them. My chapter on “Zama-Zamas” (criminal miners) who take big risks to avoid surveillance, in a new United Nations sponsored book that contains writing from leading experts on crime and corruption inside the global mining industry.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/44639587" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="74ca8c317da9b3e0769d36c053c18dd8" rel="nofollow" data-download="{"attachment_id":74881387,"asset_id":44639587,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/74881387/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="6199946" href="https://chicago.academia.edu/Nesvet">Matthew Nesvet</a><script data-card-contents-for-user="6199946" type="text/json">{"id":6199946,"first_name":"Matthew","last_name":"Nesvet","domain_name":"chicago","page_name":"Nesvet","display_name":"Matthew Nesvet","profile_url":"https://chicago.academia.edu/Nesvet?f_ri=7480","photo":"https://0.academia-photos.com/6199946/4218509/19626632/s65_matthew.nesvet.jpg"}</script></span></span></li><li class="js-paper-rank-work_44639587 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="44639587"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 44639587, container: ".js-paper-rank-work_44639587", }); });</script></li><li class="js-percentile-work_44639587 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 44639587; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_44639587"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_44639587 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="44639587"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 44639587; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=44639587]").text(description); $(".js-view-count-work_44639587").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_44639587").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="44639587"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">6</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2592" rel="nofollow" href="https://www.academia.edu/Documents/in/Human_Rights">Human Rights</a>, <script data-card-contents-for-ri="2592" type="text/json">{"id":2592,"name":"Human Rights","url":"https://www.academia.edu/Documents/in/Human_Rights?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5247" rel="nofollow" href="https://www.academia.edu/Documents/in/Critical_Race_Theory">Critical Race Theory</a>, <script data-card-contents-for-ri="5247" type="text/json">{"id":5247,"name":"Critical Race Theory","url":"https://www.academia.edu/Documents/in/Critical_Race_Theory?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a>, <script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="17817" rel="nofollow" href="https://www.academia.edu/Documents/in/Anthropology_of_Police_and_Policing">Anthropology of Police & Policing</a><script data-card-contents-for-ri="17817" type="text/json">{"id":17817,"name":"Anthropology of Police \u0026 Policing","url":"https://www.academia.edu/Documents/in/Anthropology_of_Police_and_Policing?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=44639587]'), work: {"id":44639587,"title":"Migrant Workers, Artisanal Gold Mining, and More-Than-Human Sousveillance in South Africa's Closed Mines","created_at":"2020-12-04T22:31:37.377-08:00","url":"https://www.academia.edu/44639587/Migrant_Workers_Artisanal_Gold_Mining_and_More_Than_Human_Sousveillance_in_South_Africas_Closed_Mines?f_ri=7480","dom_id":"work_44639587","summary":"Informal gold miners in South Africa are not “illegal\" because they mine gold. They are criminalized from the start, and mine gold because the substance makes it difficult for police and private industry to forensically track and trace them. My chapter on “Zama-Zamas” (criminal miners) who take big risks to avoid surveillance, in a new United Nations sponsored book that contains writing from leading experts on crime and corruption inside the global mining industry.","downloadable_attachments":[{"id":74881387,"asset_id":44639587,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":6199946,"first_name":"Matthew","last_name":"Nesvet","domain_name":"chicago","page_name":"Nesvet","display_name":"Matthew Nesvet","profile_url":"https://chicago.academia.edu/Nesvet?f_ri=7480","photo":"https://0.academia-photos.com/6199946/4218509/19626632/s65_matthew.nesvet.jpg"}],"research_interests":[{"id":2592,"name":"Human Rights","url":"https://www.academia.edu/Documents/in/Human_Rights?f_ri=7480","nofollow":true},{"id":5247,"name":"Critical Race Theory","url":"https://www.academia.edu/Documents/in/Critical_Race_Theory?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":17817,"name":"Anthropology of Police \u0026 Policing","url":"https://www.academia.edu/Documents/in/Anthropology_of_Police_and_Policing?f_ri=7480","nofollow":true},{"id":362556,"name":"Extractive industries","url":"https://www.academia.edu/Documents/in/Extractive_industries?f_ri=7480"},{"id":1744493,"name":"Science and Technology Studies","url":"https://www.academia.edu/Documents/in/Science_and_Technology_Studies?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_64981551" data-work_id="64981551" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/64981551/_Re_Creating_Society_in_Silico_Surveillance_Capitalism_Simulations_and_Subjectivity_in_the_Cambridge_Analytica_Data_Scandal">(Re)Creating "Society in Silico": Surveillance Capitalism, Simulations and Subjectivity in the Cambridge Analytica Data Scandal</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This article provides a different angle to understand the Cambridge Analytica (CA) data scandal. It focuses on the role of models and simulations in the big data campaigning tools CA allegedly used, and their epistemological and... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_64981551" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This article provides a different angle to understand the Cambridge Analytica (CA) data scandal. It focuses on the role of models and simulations in the big data campaigning tools CA allegedly used, and their epistemological and ontological potential to produce and reproduce voters' digital doubles that would first colonise and eventually replace the analogue selves they were related to. By integrating and revising Zuboff's surveillance capitalism framework with Debord's classic theory of the Spectacle, the article argues that the dystopian simulations played as real life experiments by surveillance capitalist firms such as CA have the ultimate goal of replacing analogue humanity with digital humanity – the two kinds are ontologically different albeit dialectically related. The predictive models that these simulations produce are only as good as the capacity of the digital doubles in the simulations to shape the behaviour of analogue selves in line with the simulations' parameters and goals.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/64981551" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="4949f2566eda45ef68510a7235af1f79" rel="nofollow" data-download="{"attachment_id":76765496,"asset_id":64981551,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/76765496/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="365520" href="https://agder.academia.edu/VitoLaterza">Vito Laterza</a><script data-card-contents-for-user="365520" type="text/json">{"id":365520,"first_name":"Vito","last_name":"Laterza","domain_name":"agder","page_name":"VitoLaterza","display_name":"Vito Laterza","profile_url":"https://agder.academia.edu/VitoLaterza?f_ri=7480","photo":"https://0.academia-photos.com/365520/112017/8589667/s65_vito.laterza.jpg"}</script></span></span></li><li class="js-paper-rank-work_64981551 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="64981551"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 64981551, container: ".js-paper-rank-work_64981551", }); });</script></li><li class="js-percentile-work_64981551 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 64981551; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_64981551"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_64981551 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="64981551"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 64981551; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=64981551]").text(description); $(".js-view-count-work_64981551").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_64981551").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="64981551"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">14</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="209" rel="nofollow" href="https://www.academia.edu/Documents/in/Social_Theory">Social Theory</a>, <script data-card-contents-for-ri="209" type="text/json">{"id":209,"name":"Social Theory","url":"https://www.academia.edu/Documents/in/Social_Theory?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="428" rel="nofollow" href="https://www.academia.edu/Documents/in/Algorithms">Algorithms</a>, <script data-card-contents-for-ri="428" type="text/json">{"id":428,"name":"Algorithms","url":"https://www.academia.edu/Documents/in/Algorithms?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="805" rel="nofollow" href="https://www.academia.edu/Documents/in/Ontology">Ontology</a>, <script data-card-contents-for-ri="805" type="text/json">{"id":805,"name":"Ontology","url":"https://www.academia.edu/Documents/in/Ontology?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="815" rel="nofollow" href="https://www.academia.edu/Documents/in/Epistemology">Epistemology</a><script data-card-contents-for-ri="815" type="text/json">{"id":815,"name":"Epistemology","url":"https://www.academia.edu/Documents/in/Epistemology?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=64981551]'), work: {"id":64981551,"title":"(Re)Creating \"Society in Silico\": Surveillance Capitalism, Simulations and Subjectivity in the Cambridge Analytica Data Scandal","created_at":"2021-12-18T06:55:27.448-08:00","url":"https://www.academia.edu/64981551/_Re_Creating_Society_in_Silico_Surveillance_Capitalism_Simulations_and_Subjectivity_in_the_Cambridge_Analytica_Data_Scandal?f_ri=7480","dom_id":"work_64981551","summary":"This article provides a different angle to understand the Cambridge Analytica (CA) data scandal. It focuses on the role of models and simulations in the big data campaigning tools CA allegedly used, and their epistemological and ontological potential to produce and reproduce voters' digital doubles that would first colonise and eventually replace the analogue selves they were related to. By integrating and revising Zuboff's surveillance capitalism framework with Debord's classic theory of the Spectacle, the article argues that the dystopian simulations played as real life experiments by surveillance capitalist firms such as CA have the ultimate goal of replacing analogue humanity with digital humanity – the two kinds are ontologically different albeit dialectically related. The predictive models that these simulations produce are only as good as the capacity of the digital doubles in the simulations to shape the behaviour of analogue selves in line with the simulations' parameters and goals.","downloadable_attachments":[{"id":76765496,"asset_id":64981551,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":365520,"first_name":"Vito","last_name":"Laterza","domain_name":"agder","page_name":"VitoLaterza","display_name":"Vito Laterza","profile_url":"https://agder.academia.edu/VitoLaterza?f_ri=7480","photo":"https://0.academia-photos.com/365520/112017/8589667/s65_vito.laterza.jpg"}],"research_interests":[{"id":209,"name":"Social Theory","url":"https://www.academia.edu/Documents/in/Social_Theory?f_ri=7480","nofollow":true},{"id":428,"name":"Algorithms","url":"https://www.academia.edu/Documents/in/Algorithms?f_ri=7480","nofollow":true},{"id":805,"name":"Ontology","url":"https://www.academia.edu/Documents/in/Ontology?f_ri=7480","nofollow":true},{"id":815,"name":"Epistemology","url":"https://www.academia.edu/Documents/in/Epistemology?f_ri=7480","nofollow":true},{"id":855,"name":"Philosophy of Technology","url":"https://www.academia.edu/Documents/in/Philosophy_of_Technology?f_ri=7480"},{"id":1197,"name":"Digital Humanities","url":"https://www.academia.edu/Documents/in/Digital_Humanities?f_ri=7480"},{"id":1441,"name":"Philosophical Anthropology","url":"https://www.academia.edu/Documents/in/Philosophical_Anthropology?f_ri=7480"},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480"},{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=7480"},{"id":9705,"name":"Capitalism","url":"https://www.academia.edu/Documents/in/Capitalism?f_ri=7480"},{"id":51682,"name":"Digital Democracy","url":"https://www.academia.edu/Documents/in/Digital_Democracy?f_ri=7480"},{"id":54659,"name":"Subjectivity","url":"https://www.academia.edu/Documents/in/Subjectivity?f_ri=7480"},{"id":244928,"name":"Digitalisation","url":"https://www.academia.edu/Documents/in/Digitalisation?f_ri=7480"},{"id":298455,"name":"Digitalization","url":"https://www.academia.edu/Documents/in/Digitalization?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_46918248" data-work_id="46918248" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/46918248/Infrastructural_obfuscation_unpacking_the_carceral_logics_of_the_Ring_surveillant_assemblage">Infrastructural obfuscation: unpacking the carceral logics of the Ring surveillant assemblage</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Amazon’s Ring relies on infrastructural obfuscation to hide their infrastructures through urban camouflage (as doorbells, floodlights, sensors) while simultaneously expanding the carceral state and extending the industrial... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_46918248" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Amazon’s Ring relies on infrastructural obfuscation to hide their<br />infrastructures through urban camouflage (as doorbells,<br />floodlights, sensors) while simultaneously expanding the carceral<br />state and extending the industrial police-surveillant state. Through<br />a critical analysis of the Ring surveillant assemblage, this paper<br />reveals the way Ring and its associated apps produce fear and<br />paranoia of the racialized Other, promote community buy-in that<br />more surveillance will improve safety, while obscuring private<br />partnerships with local law enforcement. I argue Ring cannot be<br />viewed in isolation from its entangled corporate owner, Amazon,<br />which relies on an ever-expanding infrastructural network,<br />including surveillance of their highly prized package delivery<br />service. Ring is more than individual community members<br />installing doorbells with cameras that extend beyond their<br />property into public space; it is the blurring of boundaries<br />between police work and civilian surveillance, the reliance on<br />obscured digital infrastructures that hide to whom and what<br />users are connecting when they install a Ring device, and the<br />expansion of Amazon’s vast infrastructural power. By recentering<br />critique on the infrastructural backbone, made up of discourses<br />and fixtures, this paper argues for the need for infrastructural<br />accountability from companies such as Amazon, who not only<br />profit from fear, but actively reproduce structural violence<br />through their data infrastructures.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/46918248" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="17ed1db56e75e0373a0cc4e60f54148b" rel="nofollow" data-download="{"attachment_id":66288098,"asset_id":46918248,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/66288098/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="40029432" href="https://harvard.academia.edu/LaurenBridges">Lauren E Bridges</a><script data-card-contents-for-user="40029432" type="text/json">{"id":40029432,"first_name":"Lauren","last_name":"Bridges","domain_name":"harvard","page_name":"LaurenBridges","display_name":"Lauren E Bridges","profile_url":"https://harvard.academia.edu/LaurenBridges?f_ri=7480","photo":"https://0.academia-photos.com/40029432/15552034/17312885/s65_lauren.bridges.jpg"}</script></span></span></li><li class="js-paper-rank-work_46918248 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="46918248"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 46918248, container: ".js-paper-rank-work_46918248", }); });</script></li><li class="js-percentile-work_46918248 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 46918248; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_46918248"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_46918248 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="46918248"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 46918248; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=46918248]").text(description); $(".js-view-count-work_46918248").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_46918248").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="46918248"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">8</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a>, <script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="24892" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance">Surveillance</a>, <script data-card-contents-for-ri="24892" type="text/json">{"id":24892,"name":"Surveillance","url":"https://www.academia.edu/Documents/in/Surveillance?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="73673" rel="nofollow" href="https://www.academia.edu/Documents/in/Video_Surveillance">Video Surveillance</a>, <script data-card-contents-for-ri="73673" type="text/json">{"id":73673,"name":"Video Surveillance","url":"https://www.academia.edu/Documents/in/Video_Surveillance?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="77342" rel="nofollow" href="https://www.academia.edu/Documents/in/Infrastructure">Infrastructure</a><script data-card-contents-for-ri="77342" type="text/json">{"id":77342,"name":"Infrastructure","url":"https://www.academia.edu/Documents/in/Infrastructure?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=46918248]'), work: {"id":46918248,"title":"Infrastructural obfuscation: unpacking the carceral logics of the Ring surveillant assemblage","created_at":"2021-04-17T08:05:47.566-07:00","url":"https://www.academia.edu/46918248/Infrastructural_obfuscation_unpacking_the_carceral_logics_of_the_Ring_surveillant_assemblage?f_ri=7480","dom_id":"work_46918248","summary":"Amazon’s Ring relies on infrastructural obfuscation to hide their\ninfrastructures through urban camouflage (as doorbells,\nfloodlights, sensors) while simultaneously expanding the carceral\nstate and extending the industrial police-surveillant state. Through\na critical analysis of the Ring surveillant assemblage, this paper\nreveals the way Ring and its associated apps produce fear and\nparanoia of the racialized Other, promote community buy-in that\nmore surveillance will improve safety, while obscuring private\npartnerships with local law enforcement. I argue Ring cannot be\nviewed in isolation from its entangled corporate owner, Amazon,\nwhich relies on an ever-expanding infrastructural network,\nincluding surveillance of their highly prized package delivery\nservice. Ring is more than individual community members\ninstalling doorbells with cameras that extend beyond their\nproperty into public space; it is the blurring of boundaries\nbetween police work and civilian surveillance, the reliance on\nobscured digital infrastructures that hide to whom and what\nusers are connecting when they install a Ring device, and the\nexpansion of Amazon’s vast infrastructural power. By recentering\ncritique on the infrastructural backbone, made up of discourses\nand fixtures, this paper argues for the need for infrastructural\naccountability from companies such as Amazon, who not only\nprofit from fear, but actively reproduce structural violence\nthrough their data infrastructures.","downloadable_attachments":[{"id":66288098,"asset_id":46918248,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":40029432,"first_name":"Lauren","last_name":"Bridges","domain_name":"harvard","page_name":"LaurenBridges","display_name":"Lauren E Bridges","profile_url":"https://harvard.academia.edu/LaurenBridges?f_ri=7480","photo":"https://0.academia-photos.com/40029432/15552034/17312885/s65_lauren.bridges.jpg"}],"research_interests":[{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":24892,"name":"Surveillance","url":"https://www.academia.edu/Documents/in/Surveillance?f_ri=7480","nofollow":true},{"id":73673,"name":"Video Surveillance","url":"https://www.academia.edu/Documents/in/Video_Surveillance?f_ri=7480","nofollow":true},{"id":77342,"name":"Infrastructure","url":"https://www.academia.edu/Documents/in/Infrastructure?f_ri=7480","nofollow":true},{"id":80016,"name":"Police and Policing","url":"https://www.academia.edu/Documents/in/Police_and_Policing?f_ri=7480"},{"id":452278,"name":"Amazon Web Services","url":"https://www.academia.edu/Documents/in/Amazon_Web_Services?f_ri=7480"},{"id":508065,"name":"Carceral state","url":"https://www.academia.edu/Documents/in/Carceral_state?f_ri=7480"},{"id":1291816,"name":"State Police-private Security Partnership","url":"https://www.academia.edu/Documents/in/State_Police-private_Security_Partnership?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_19901578" data-work_id="19901578" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/19901578/Biovigil%C3%A2ncia_e_governabilidade_nas_sociedades_da_informa%C3%A7%C3%A3o">Biovigilância e governabilidade nas sociedades da informação</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">O combate à criminalidade por via de dispositivos tecnológicos e pela informatização e manuseamento massivo de informação biogenética sobre os cidadãos reflete a expansão, crescentemente global, de aparatos de biovigilância... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_19901578" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">O combate à criminalidade por via de dispositivos tecnológicos e pela informatização e manuseamento massivo de informação biogenética sobre os cidadãos reflete a expansão, crescentemente global, de aparatos de biovigilância burocráticoestatais. Estes, por sua vez, produzem efeitos na governabilidade dos corpos e nos processos culturais identitários de populações "suspeitas" que são alvos preferenciais de recolha de dados pessoais, armazenados e geridos em redes de circulação transfronteiriça. No presente texto, usamos o conceito de governabilidade dos corpos criminais e da criminalidade para discutir os processos de biovigilância nas sociedades da informação. O enfoque no fenómeno da governabilidade da criminalidade é explorado a partir da aceção desenvolvida por Michel Foucault, a propósito da passagem histórica de uma sociedade "disciplinar" para uma sociedade da "segurança" (Foucault, 2004, para uma sistematização desta mudança histórica consultar Cunha, 2009), orientada não para a erradicação do crime mas para uma intervenção necessária e suficiente que torne a criminalidade tolerável e assegure o equilíbrio societal. Essa nova forma de governabilidade, em crescente expansão nas duas últimas décadas, fundamenta-se em práticas de gestão governamental caracterizadas por um "conjunto" formado por instituições, procedimentos, análises e reflexões, em que os cálculos e as táticas que permitem o exercício deste tipo de poder específico e complexo têm a sua populaçãoalvo, a sua principal forma de economia política do conhecimento, e os seus principais meios e aparatos técnicos de segurança (Foucault, 1979 apud Hannah, 2000: 22, tradução dos autores). Esta modalidade de governabilidade legitima-se pelo recrutamento de conhecimentos especializados na área da ciência e do direito e a ordem social segue orientações normativas provenientes desses saberes científico-jurídicos que, por sua vez, se apresentam como ferramentas imprescindíveis para assegurar o progresso da sociedade e a segurança e tranquilidade públicas.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/19901578" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="ee8853e3b809b947febcabb3d727cdca" rel="nofollow" data-download="{"attachment_id":42377387,"asset_id":19901578,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/42377387/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="29319817" href="https://uminho.academia.edu/HelenaMachado">Helena Machado</a><script data-card-contents-for-user="29319817" type="text/json">{"id":29319817,"first_name":"Helena","last_name":"Machado","domain_name":"uminho","page_name":"HelenaMachado","display_name":"Helena Machado","profile_url":"https://uminho.academia.edu/HelenaMachado?f_ri=7480","photo":"https://0.academia-photos.com/29319817/8385444/25940304/s65_helena.machado.jpg"}</script></span></span></li><li class="js-paper-rank-work_19901578 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="19901578"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 19901578, container: ".js-paper-rank-work_19901578", }); });</script></li><li class="js-percentile-work_19901578 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 19901578; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_19901578"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_19901578 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="19901578"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 19901578; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=19901578]").text(description); $(".js-view-count-work_19901578").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_19901578").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="19901578"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i></div><span class="InlineList-item-text u-textTruncate u-pl6x"><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a><script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (false) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=19901578]'), work: {"id":19901578,"title":"Biovigilância e governabilidade nas sociedades da informação","created_at":"2015-12-30T02:14:50.671-08:00","url":"https://www.academia.edu/19901578/Biovigil%C3%A2ncia_e_governabilidade_nas_sociedades_da_informa%C3%A7%C3%A3o?f_ri=7480","dom_id":"work_19901578","summary":"O combate à criminalidade por via de dispositivos tecnológicos e pela informatização e manuseamento massivo de informação biogenética sobre os cidadãos reflete a expansão, crescentemente global, de aparatos de biovigilância burocráticoestatais. Estes, por sua vez, produzem efeitos na governabilidade dos corpos e nos processos culturais identitários de populações \"suspeitas\" que são alvos preferenciais de recolha de dados pessoais, armazenados e geridos em redes de circulação transfronteiriça. No presente texto, usamos o conceito de governabilidade dos corpos criminais e da criminalidade para discutir os processos de biovigilância nas sociedades da informação. O enfoque no fenómeno da governabilidade da criminalidade é explorado a partir da aceção desenvolvida por Michel Foucault, a propósito da passagem histórica de uma sociedade \"disciplinar\" para uma sociedade da \"segurança\" (Foucault, 2004, para uma sistematização desta mudança histórica consultar Cunha, 2009), orientada não para a erradicação do crime mas para uma intervenção necessária e suficiente que torne a criminalidade tolerável e assegure o equilíbrio societal. Essa nova forma de governabilidade, em crescente expansão nas duas últimas décadas, fundamenta-se em práticas de gestão governamental caracterizadas por um \"conjunto\" formado por instituições, procedimentos, análises e reflexões, em que os cálculos e as táticas que permitem o exercício deste tipo de poder específico e complexo têm a sua populaçãoalvo, a sua principal forma de economia política do conhecimento, e os seus principais meios e aparatos técnicos de segurança (Foucault, 1979 apud Hannah, 2000: 22, tradução dos autores). Esta modalidade de governabilidade legitima-se pelo recrutamento de conhecimentos especializados na área da ciência e do direito e a ordem social segue orientações normativas provenientes desses saberes científico-jurídicos que, por sua vez, se apresentam como ferramentas imprescindíveis para assegurar o progresso da sociedade e a segurança e tranquilidade públicas.","downloadable_attachments":[{"id":42377387,"asset_id":19901578,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":29319817,"first_name":"Helena","last_name":"Machado","domain_name":"uminho","page_name":"HelenaMachado","display_name":"Helena Machado","profile_url":"https://uminho.academia.edu/HelenaMachado?f_ri=7480","photo":"https://0.academia-photos.com/29319817/8385444/25940304/s65_helena.machado.jpg"}],"research_interests":[{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_25362439" data-work_id="25362439" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/25362439/Reflections_on_A_Research_Agenda_for_Electronic_Monitoring_in_the_United_States">Reflections on A Research Agenda for Electronic Monitoring in the United States</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">This paper outlines a research agenda for electronic monitoring in the US, a topic that has been woefully understudied and mis-characterized as an alternative to incarceration.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/25362439" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="79f10da434d393f564574bca1ffe389c" rel="nofollow" data-download="{"attachment_id":45663019,"asset_id":25362439,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/45663019/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3181115" href="https://illinois.academia.edu/JamesKilgore">James Kilgore</a><script data-card-contents-for-user="3181115" type="text/json">{"id":3181115,"first_name":"James","last_name":"Kilgore","domain_name":"illinois","page_name":"JamesKilgore","display_name":"James Kilgore","profile_url":"https://illinois.academia.edu/JamesKilgore?f_ri=7480","photo":"https://0.academia-photos.com/3181115/1046263/14072142/s65_james.kilgore.jpg"}</script></span></span></li><li class="js-paper-rank-work_25362439 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="25362439"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 25362439, container: ".js-paper-rank-work_25362439", }); });</script></li><li class="js-percentile-work_25362439 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 25362439; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_25362439"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_25362439 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="25362439"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 25362439; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=25362439]").text(description); $(".js-view-count-work_25362439").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_25362439").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="25362439"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">6</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="537" rel="nofollow" href="https://www.academia.edu/Documents/in/Criminal_Justice">Criminal Justice</a>, <script data-card-contents-for-ri="537" type="text/json">{"id":537,"name":"Criminal Justice","url":"https://www.academia.edu/Documents/in/Criminal_Justice?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7229" rel="nofollow" href="https://www.academia.edu/Documents/in/Critical_Criminology">Critical Criminology</a>, <script data-card-contents-for-ri="7229" type="text/json">{"id":7229,"name":"Critical Criminology","url":"https://www.academia.edu/Documents/in/Critical_Criminology?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a>, <script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="100148" rel="nofollow" href="https://www.academia.edu/Documents/in/Prison_Abolition">Prison Abolition</a><script data-card-contents-for-ri="100148" type="text/json">{"id":100148,"name":"Prison Abolition","url":"https://www.academia.edu/Documents/in/Prison_Abolition?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=25362439]'), work: {"id":25362439,"title":"Reflections on A Research Agenda for Electronic Monitoring in the United States","created_at":"2016-05-16T06:13:08.717-07:00","url":"https://www.academia.edu/25362439/Reflections_on_A_Research_Agenda_for_Electronic_Monitoring_in_the_United_States?f_ri=7480","dom_id":"work_25362439","summary":"This paper outlines a research agenda for electronic monitoring in the US, a topic that has been woefully understudied and mis-characterized as an alternative to incarceration. ","downloadable_attachments":[{"id":45663019,"asset_id":25362439,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3181115,"first_name":"James","last_name":"Kilgore","domain_name":"illinois","page_name":"JamesKilgore","display_name":"James Kilgore","profile_url":"https://illinois.academia.edu/JamesKilgore?f_ri=7480","photo":"https://0.academia-photos.com/3181115/1046263/14072142/s65_james.kilgore.jpg"}],"research_interests":[{"id":537,"name":"Criminal Justice","url":"https://www.academia.edu/Documents/in/Criminal_Justice?f_ri=7480","nofollow":true},{"id":7229,"name":"Critical Criminology","url":"https://www.academia.edu/Documents/in/Critical_Criminology?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":100148,"name":"Prison Abolition","url":"https://www.academia.edu/Documents/in/Prison_Abolition?f_ri=7480","nofollow":true},{"id":446397,"name":"The New Jim Crow","url":"https://www.academia.edu/Documents/in/The_New_Jim_Crow?f_ri=7480"},{"id":688168,"name":"Alternatives to Incarceration","url":"https://www.academia.edu/Documents/in/Alternatives_to_Incarceration?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_36507188" data-work_id="36507188" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/36507188/Racial_Profiling_as_Dressage_A_Social_Control_Regime_">Racial Profiling as Dressage: A Social Control Regime!</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Racial profiling is a unique regime of social control specifically due to its reinvention of blackness as a signifier to criminality. The author argues that the ‘new black’ (or new non-white) is reconstructed under this regime when... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_36507188" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Racial profiling is a unique regime of social control specifically due to its reinvention of blackness as a signifier to criminality. The author argues that the ‘new black’ (or new non-white) is reconstructed under this regime when previous regimes did not necessarily criminalize whole groups. This study employs panopticism, and its critique by Foucault, to argue that racial profiling as dressage aims to increase the visibility of black people – control minorities. Its different practices (like Driving While Black) aim to normalize, assimilate, and rehabilitate everyone to one centre. It is done by means of penetrating the consciousness through continuous surveillance, thereby making the black individual an obedient citizen. The article argues also that the expression of social control in the racial profiling regime is spatial too. This means that space is classified so that some activities are criminal only if they occur in the ghetto, or at the borders of white neighbourhoods. Racial profiling serves as a reminder of the black people’s ‘place’. Thus, it is all about the perpetual visibility of the modern individual. The author argues that racial profiling is designed to enhance this visibility. Racial profiling is not the first regime to occur; it succeeded three preceding social control regimes: slavery, Jim Crow, and mass imprisonment. All these regimes are a manifestation of a fundamental structural fault of modern society: racism and inequality. That is the modern state surveillance function. So, the question addressed here is: how does surveillance through police practices shape the modern subject (how is the subject socially produced)?<br />Keywords: racial profiling; surveillance; Driving While Black; disciplined space; ‘new black’; modern individual; panopticism</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/36507188" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="347152f068b26ee4f4497d617c10b8ac" rel="nofollow" data-download="{"attachment_id":56427377,"asset_id":36507188,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/56427377/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="38763651" href="https://5games.academia.edu/LauraKhoury">لورا الخوري</a><script data-card-contents-for-user="38763651" type="text/json">{"id":38763651,"first_name":"لورا","last_name":"الخوري","domain_name":"5games","page_name":"LauraKhoury","display_name":"لورا الخوري","profile_url":"https://5games.academia.edu/LauraKhoury?f_ri=7480","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_36507188 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="36507188"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 36507188, container: ".js-paper-rank-work_36507188", }); });</script></li><li class="js-percentile-work_36507188 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 36507188; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_36507188"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_36507188 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="36507188"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 36507188; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=36507188]").text(description); $(".js-view-count-work_36507188").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_36507188").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="36507188"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">3</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a>, <script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="12978" rel="nofollow" href="https://www.academia.edu/Documents/in/Muslim_Minorities">Muslim Minorities</a>, <script data-card-contents-for-ri="12978" type="text/json">{"id":12978,"name":"Muslim Minorities","url":"https://www.academia.edu/Documents/in/Muslim_Minorities?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="391715" rel="nofollow" href="https://www.academia.edu/Documents/in/Ethnicity_and_National_Identity">Ethnicity and National Identity</a><script data-card-contents-for-ri="391715" type="text/json">{"id":391715,"name":"Ethnicity and National Identity","url":"https://www.academia.edu/Documents/in/Ethnicity_and_National_Identity?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=36507188]'), work: {"id":36507188,"title":"Racial Profiling as Dressage: A Social Control Regime!","created_at":"2018-04-26T07:13:52.138-07:00","url":"https://www.academia.edu/36507188/Racial_Profiling_as_Dressage_A_Social_Control_Regime_?f_ri=7480","dom_id":"work_36507188","summary":"Racial profiling is a unique regime of social control specifically due to its reinvention of blackness as a signifier to criminality. The author argues that the ‘new black’ (or new non-white) is reconstructed under this regime when previous regimes did not necessarily criminalize whole groups. This study employs panopticism, and its critique by Foucault, to argue that racial profiling as dressage aims to increase the visibility of black people – control minorities. Its different practices (like Driving While Black) aim to normalize, assimilate, and rehabilitate everyone to one centre. It is done by means of penetrating the consciousness through continuous surveillance, thereby making the black individual an obedient citizen. The article argues also that the expression of social control in the racial profiling regime is spatial too. This means that space is classified so that some activities are criminal only if they occur in the ghetto, or at the borders of white neighbourhoods. Racial profiling serves as a reminder of the black people’s ‘place’. Thus, it is all about the perpetual visibility of the modern individual. The author argues that racial profiling is designed to enhance this visibility. Racial profiling is not the first regime to occur; it succeeded three preceding social control regimes: slavery, Jim Crow, and mass imprisonment. All these regimes are a manifestation of a fundamental structural fault of modern society: racism and inequality. That is the modern state surveillance function. So, the question addressed here is: how does surveillance through police practices shape the modern subject (how is the subject socially produced)?\nKeywords: racial profiling; surveillance; Driving While Black; disciplined space; ‘new black’; modern individual; panopticism","downloadable_attachments":[{"id":56427377,"asset_id":36507188,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":38763651,"first_name":"لورا","last_name":"الخوري","domain_name":"5games","page_name":"LauraKhoury","display_name":"لورا الخوري","profile_url":"https://5games.academia.edu/LauraKhoury?f_ri=7480","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":12978,"name":"Muslim Minorities","url":"https://www.academia.edu/Documents/in/Muslim_Minorities?f_ri=7480","nofollow":true},{"id":391715,"name":"Ethnicity and National Identity","url":"https://www.academia.edu/Documents/in/Ethnicity_and_National_Identity?f_ri=7480","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_37025424" data-work_id="37025424" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/37025424/Review_Hoover_s_War_on_Gays_Exposing_the_FBI_s_Sex_Deviates_Program_by_Douglas_M_Charles_Lawrence_University_Press_of_Kansas_2015_xv_453_pp_34_95_cloth_ISBN_978_0_7006_2119_4">Review: Hoover’s War on Gays: Exposing the FBI’s ”Sex Deviates” Program by Douglas M. Charles. Lawrence: University Press of Kansas, 2015. xv + 453 pp. $34.95 (cloth), ISBN 978-0-7006-2119-4</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Hoover’s War on Gays is an excellent and much-needed empirical contribution to our knowledge on twentieth-century surveillance and harassment of a sexual minority, which intensified as that minority became more self-confident and public... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_37025424" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Hoover’s War on Gays is an excellent and much-needed empirical contribution to our knowledge on twentieth-century surveillance and harassment of a sexual minority, which intensified as that minority became more self-confident and public in its demands. Douglas M. Charles has demonstrated amply how intricate documentary histories based on deep and hidden bureaucratic paper trails provide uniquely illuminating details of key episodes of state power and grassroots resistance to it.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/37025424" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="ed1401aad9960c4592cb1ed1074cf7e1" rel="nofollow" data-download="{"attachment_id":56975418,"asset_id":37025424,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/56975418/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="865259" href="https://edinburgh.academia.edu/KateDavison">Kate Davison</a><script data-card-contents-for-user="865259" type="text/json">{"id":865259,"first_name":"Kate","last_name":"Davison","domain_name":"edinburgh","page_name":"KateDavison","display_name":"Kate Davison","profile_url":"https://edinburgh.academia.edu/KateDavison?f_ri=7480","photo":"https://0.academia-photos.com/865259/310385/39048350/s65_kate.davison.jpg"}</script></span></span></li><li class="js-paper-rank-work_37025424 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="37025424"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 37025424, container: ".js-paper-rank-work_37025424", }); });</script></li><li class="js-percentile-work_37025424 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37025424; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_37025424"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_37025424 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="37025424"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37025424; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37025424]").text(description); $(".js-view-count-work_37025424").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_37025424").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="37025424"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">5</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="129" rel="nofollow" href="https://www.academia.edu/Documents/in/American_History">American History</a>, <script data-card-contents-for-ri="129" type="text/json">{"id":129,"name":"American History","url":"https://www.academia.edu/Documents/in/American_History?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4918" rel="nofollow" href="https://www.academia.edu/Documents/in/Gay_And_Lesbian_Studies">Gay And Lesbian Studies</a>, <script data-card-contents-for-ri="4918" type="text/json">{"id":4918,"name":"Gay And Lesbian Studies","url":"https://www.academia.edu/Documents/in/Gay_And_Lesbian_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a>, <script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="35802" rel="nofollow" href="https://www.academia.edu/Documents/in/Cold_War_history">Cold War history</a><script data-card-contents-for-ri="35802" type="text/json">{"id":35802,"name":"Cold War history","url":"https://www.academia.edu/Documents/in/Cold_War_history?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=37025424]'), work: {"id":37025424,"title":"Review: Hoover’s War on Gays: Exposing the FBI’s ”Sex Deviates” Program by Douglas M. Charles. Lawrence: University Press of Kansas, 2015. xv + 453 pp. $34.95 (cloth), ISBN 978-0-7006-2119-4","created_at":"2018-07-11T05:40:58.533-07:00","url":"https://www.academia.edu/37025424/Review_Hoover_s_War_on_Gays_Exposing_the_FBI_s_Sex_Deviates_Program_by_Douglas_M_Charles_Lawrence_University_Press_of_Kansas_2015_xv_453_pp_34_95_cloth_ISBN_978_0_7006_2119_4?f_ri=7480","dom_id":"work_37025424","summary":"Hoover’s War on Gays is an excellent and much-needed empirical contribution to our knowledge on twentieth-century surveillance and harassment of a sexual minority, which intensified as that minority became more self-confident and public in its demands. Douglas M. Charles has demonstrated amply how intricate documentary histories based on deep and hidden bureaucratic paper trails provide uniquely illuminating details of key episodes of state power and grassroots resistance to it.","downloadable_attachments":[{"id":56975418,"asset_id":37025424,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":865259,"first_name":"Kate","last_name":"Davison","domain_name":"edinburgh","page_name":"KateDavison","display_name":"Kate Davison","profile_url":"https://edinburgh.academia.edu/KateDavison?f_ri=7480","photo":"https://0.academia-photos.com/865259/310385/39048350/s65_kate.davison.jpg"}],"research_interests":[{"id":129,"name":"American History","url":"https://www.academia.edu/Documents/in/American_History?f_ri=7480","nofollow":true},{"id":4918,"name":"Gay And Lesbian Studies","url":"https://www.academia.edu/Documents/in/Gay_And_Lesbian_Studies?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":35802,"name":"Cold War history","url":"https://www.academia.edu/Documents/in/Cold_War_history?f_ri=7480","nofollow":true},{"id":498972,"name":"History of Homosexuality","url":"https://www.academia.edu/Documents/in/History_of_Homosexuality?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_33272531" data-work_id="33272531" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/33272531/Wielki_Brat_i_Bracia_Mniejsi_O_p%C5%82ynnej_inwigilacji">Wielki Brat i Bracia Mniejsi. O płynnej inwigilacji</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">[w:] Sławomir Czapnik, Aleksandra Kusztal (red), Płynna nowoczesność. Analiza krytyczna, Wydawnictwo Uniwersytetu Opolskiego, Opole 2016, s. 159-177</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/33272531" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="aba209acc5c054f006993dc895f1aaa9" rel="nofollow" data-download="{"attachment_id":53340976,"asset_id":33272531,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/53340976/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3903523" href="https://opole.academia.edu/SlawomirCzapnik">Slawomir Czapnik</a><script data-card-contents-for-user="3903523" type="text/json">{"id":3903523,"first_name":"Slawomir","last_name":"Czapnik","domain_name":"opole","page_name":"SlawomirCzapnik","display_name":"Slawomir Czapnik","profile_url":"https://opole.academia.edu/SlawomirCzapnik?f_ri=7480","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_33272531 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="33272531"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 33272531, container: ".js-paper-rank-work_33272531", }); });</script></li><li class="js-percentile-work_33272531 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33272531; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_33272531"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_33272531 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="33272531"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33272531; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33272531]").text(description); $(".js-view-count-work_33272531").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_33272531").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="33272531"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">7</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="491" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Technology">Information Technology</a>, <script data-card-contents-for-ri="491" type="text/json">{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="859" rel="nofollow" href="https://www.academia.edu/Documents/in/Communication">Communication</a>, <script data-card-contents-for-ri="859" type="text/json">{"id":859,"name":"Communication","url":"https://www.academia.edu/Documents/in/Communication?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7454" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Communication_Technology">Information Communication Technology</a>, <script data-card-contents-for-ri="7454" type="text/json">{"id":7454,"name":"Information Communication Technology","url":"https://www.academia.edu/Documents/in/Information_Communication_Technology?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a><script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=33272531]'), work: {"id":33272531,"title":"Wielki Brat i Bracia Mniejsi. O płynnej inwigilacji","created_at":"2017-05-31T02:34:02.475-07:00","url":"https://www.academia.edu/33272531/Wielki_Brat_i_Bracia_Mniejsi_O_p%C5%82ynnej_inwigilacji?f_ri=7480","dom_id":"work_33272531","summary":"[w:] Sławomir Czapnik, Aleksandra Kusztal (red), Płynna nowoczesność. Analiza krytyczna, Wydawnictwo Uniwersytetu Opolskiego, Opole 2016, s. 159-177","downloadable_attachments":[{"id":53340976,"asset_id":33272531,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3903523,"first_name":"Slawomir","last_name":"Czapnik","domain_name":"opole","page_name":"SlawomirCzapnik","display_name":"Slawomir Czapnik","profile_url":"https://opole.academia.edu/SlawomirCzapnik?f_ri=7480","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=7480","nofollow":true},{"id":859,"name":"Communication","url":"https://www.academia.edu/Documents/in/Communication?f_ri=7480","nofollow":true},{"id":7454,"name":"Information Communication Technology","url":"https://www.academia.edu/Documents/in/Information_Communication_Technology?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":53848,"name":"Social Control","url":"https://www.academia.edu/Documents/in/Social_Control?f_ri=7480"},{"id":747319,"name":"Inwigilacja","url":"https://www.academia.edu/Documents/in/Inwigilacja?f_ri=7480"},{"id":918782,"name":"Edward Snowden","url":"https://www.academia.edu/Documents/in/Edward_Snowden?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_45613819" data-work_id="45613819" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/45613819/Camilla_Cannon_2021_Non_binary_gender_identity_and_algorithmic_psychometric_marketing_legibility">Camilla Cannon (2021) Non-binary gender identity and algorithmic-psychometric marketing legibility</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Recently, discussions of non-binary gender identity have been increasingly featured in U.S. American mainstream print media, particularly mass market magazines, advertising and business editorials, and marketing reports from consumer... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_45613819" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Recently, discussions of non-binary gender identity have been increasingly featured in U.S. American mainstream print media, particularly mass market magazines, advertising and business editorials, and marketing reports from consumer insight strategy groups. I present a threefold argument relating to this increase in non-binary gender visibility. First, I argue that the media depictions I examine portray non-binary gender identity as a more “authentic” gender identity than cisgender and binary transgender identities, a claim that encourages all consumers to engage in individualized consumptive patterns that transcend hegemonic gender categories in order to attain an authentically gendered self. I frame this media and marketing reification of the supposed affective and consumptive behaviors of non-binary individuals as a result of the parallel evolution of trans respectability politics, targeted marketing techniques, and aspirational economic subjecthood in the U.S. Second, I argue that the departure from these broad, hegemonic consumptive patterns that all consumers are encouraged to adopt enables the development of ever more fine-grained individual consumer data profiles within various algorithmic targeting marketing systems. Finally, I argue that the algorithmic legibility that such discourse encourages renders individuals more vulnerable to the many surveillance systems with which individualized commercial data profiles are often shared.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/45613819" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="c8c039ab5ec30db020c8a085ed533938" rel="nofollow" data-download="{"attachment_id":68868601,"asset_id":45613819,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/68868601/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="187534747" href="https://gwu.academia.edu/CamillaCannon">Cam Cannon</a><script data-card-contents-for-user="187534747" type="text/json">{"id":187534747,"first_name":"Cam","last_name":"Cannon","domain_name":"gwu","page_name":"CamillaCannon","display_name":"Cam Cannon","profile_url":"https://gwu.academia.edu/CamillaCannon?f_ri=7480","photo":"https://0.academia-photos.com/187534747/52356661/144176328/s65_camilla.cannon.jpg"}</script></span></span></li><li class="js-paper-rank-work_45613819 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="45613819"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 45613819, container: ".js-paper-rank-work_45613819", }); });</script></li><li class="js-percentile-work_45613819 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 45613819; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_45613819"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_45613819 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="45613819"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 45613819; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=45613819]").text(description); $(".js-view-count-work_45613819").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_45613819").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="45613819"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">5</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="39" rel="nofollow" href="https://www.academia.edu/Documents/in/Marketing">Marketing</a>, <script data-card-contents-for-ri="39" type="text/json">{"id":39,"name":"Marketing","url":"https://www.academia.edu/Documents/in/Marketing?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2624" rel="nofollow" href="https://www.academia.edu/Documents/in/Transgender_Studies">Transgender Studies</a>, <script data-card-contents-for-ri="2624" type="text/json">{"id":2624,"name":"Transgender Studies","url":"https://www.academia.edu/Documents/in/Transgender_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="3637" rel="nofollow" href="https://www.academia.edu/Documents/in/Advertising">Advertising</a>, <script data-card-contents-for-ri="3637" type="text/json">{"id":3637,"name":"Advertising","url":"https://www.academia.edu/Documents/in/Advertising?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a><script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=45613819]'), work: {"id":45613819,"title":"Camilla Cannon (2021) Non-binary gender identity and algorithmic-psychometric marketing legibility","created_at":"2021-03-25T09:58:59.929-07:00","url":"https://www.academia.edu/45613819/Camilla_Cannon_2021_Non_binary_gender_identity_and_algorithmic_psychometric_marketing_legibility?f_ri=7480","dom_id":"work_45613819","summary":"Recently, discussions of non-binary gender identity have been increasingly featured in U.S. American mainstream print media, particularly mass market magazines, advertising and business editorials, and marketing reports from consumer insight strategy groups. I present a threefold argument relating to this increase in non-binary gender visibility. First, I argue that the media depictions I examine portray non-binary gender identity as a more “authentic” gender identity than cisgender and binary transgender identities, a claim that encourages all consumers to engage in individualized consumptive patterns that transcend hegemonic gender categories in order to attain an authentically gendered self. I frame this media and marketing reification of the supposed affective and consumptive behaviors of non-binary individuals as a result of the parallel evolution of trans respectability politics, targeted marketing techniques, and aspirational economic subjecthood in the U.S. Second, I argue that the departure from these broad, hegemonic consumptive patterns that all consumers are encouraged to adopt enables the development of ever more fine-grained individual consumer data profiles within various algorithmic targeting marketing systems. Finally, I argue that the algorithmic legibility that such discourse encourages renders individuals more vulnerable to the many surveillance systems with which individualized commercial data profiles are often shared.","downloadable_attachments":[{"id":68868601,"asset_id":45613819,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":187534747,"first_name":"Cam","last_name":"Cannon","domain_name":"gwu","page_name":"CamillaCannon","display_name":"Cam Cannon","profile_url":"https://gwu.academia.edu/CamillaCannon?f_ri=7480","photo":"https://0.academia-photos.com/187534747/52356661/144176328/s65_camilla.cannon.jpg"}],"research_interests":[{"id":39,"name":"Marketing","url":"https://www.academia.edu/Documents/in/Marketing?f_ri=7480","nofollow":true},{"id":2624,"name":"Transgender Studies","url":"https://www.academia.edu/Documents/in/Transgender_Studies?f_ri=7480","nofollow":true},{"id":3637,"name":"Advertising","url":"https://www.academia.edu/Documents/in/Advertising?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":184157,"name":"Non-Binary Gender","url":"https://www.academia.edu/Documents/in/Non-Binary_Gender?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_16426678" data-work_id="16426678" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/16426678/Points_of_Departure_the_Culture_of_US_Airport_Screening">Points of Departure: the Culture of US Airport Screening</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Treating the airport checkpoint as part of the new security regime, this article concentrates on three issues. First, it considers the working conditions of Transportation Security Agency (TSA) employees whom the US government pays to... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_16426678" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Treating the airport checkpoint as part of the new security regime, this article concentrates on three issues. First, it considers the working conditions of Transportation Security Agency (TSA) employees whom the US government pays to screen passengers and emphasizes the enduring physicality of their labor despite the technologization of the checkpoint. Second, it explores new techniques of inspection implemented at TSA checkpoints and delineates practices of 'close sensing' that establish continuities between looking and touching. Finally, the article describes the object-oriented visual economy that takes shape at the checkpoint, and suggests that the x-ray sequence ultimately exposes the state's inability to regulate the flow of objects and matter in the age of globalization. Thus the searches, exposures, and probes that define this threshold should not be understood only in terms of individual privacy invasions, but rather as an opportunity to focus on structural changes in federal labor, state surveillance and globalization that have emerged since 9/11. Keywords airport screening G imaging technologies G national security G 9/11 G objects G surveillance G travel journal of visual culture 6(2) Parks Points of Departure: US Airport Screening 185 186 journal of visual culture 6(2)</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/16426678" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="1a410c5681840df3d944e97f94d0718f" rel="nofollow" data-download="{"attachment_id":38989454,"asset_id":16426678,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/38989454/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="35582059" href="https://ucsb.academia.edu/LisaParks">Lisa Parks</a><script data-card-contents-for-user="35582059" type="text/json">{"id":35582059,"first_name":"Lisa","last_name":"Parks","domain_name":"ucsb","page_name":"LisaParks","display_name":"Lisa Parks","profile_url":"https://ucsb.academia.edu/LisaParks?f_ri=7480","photo":"https://0.academia-photos.com/35582059/10324758/11521498/s65_lisa.parks.jpg"}</script></span></span></li><li class="js-paper-rank-work_16426678 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="16426678"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 16426678, container: ".js-paper-rank-work_16426678", }); });</script></li><li class="js-percentile-work_16426678 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 16426678; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_16426678"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_16426678 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="16426678"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 16426678; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=16426678]").text(description); $(".js-view-count-work_16426678").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_16426678").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="16426678"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">5</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="928" rel="nofollow" href="https://www.academia.edu/Documents/in/Media_Studies">Media Studies</a>, <script data-card-contents-for-ri="928" type="text/json">{"id":928,"name":"Media Studies","url":"https://www.academia.edu/Documents/in/Media_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="3225" rel="nofollow" href="https://www.academia.edu/Documents/in/Visual_Culture">Visual Culture</a>, <script data-card-contents-for-ri="3225" type="text/json">{"id":3225,"name":"Visual Culture","url":"https://www.academia.edu/Documents/in/Visual_Culture?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a>, <script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="30456" rel="nofollow" href="https://www.academia.edu/Documents/in/War_on_Terror">War on Terror</a><script data-card-contents-for-ri="30456" type="text/json">{"id":30456,"name":"War on Terror","url":"https://www.academia.edu/Documents/in/War_on_Terror?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=16426678]'), work: {"id":16426678,"title":"Points of Departure: the Culture of US Airport Screening","created_at":"2015-10-03T08:02:54.300-07:00","url":"https://www.academia.edu/16426678/Points_of_Departure_the_Culture_of_US_Airport_Screening?f_ri=7480","dom_id":"work_16426678","summary":"Treating the airport checkpoint as part of the new security regime, this article concentrates on three issues. First, it considers the working conditions of Transportation Security Agency (TSA) employees whom the US government pays to screen passengers and emphasizes the enduring physicality of their labor despite the technologization of the checkpoint. Second, it explores new techniques of inspection implemented at TSA checkpoints and delineates practices of 'close sensing' that establish continuities between looking and touching. Finally, the article describes the object-oriented visual economy that takes shape at the checkpoint, and suggests that the x-ray sequence ultimately exposes the state's inability to regulate the flow of objects and matter in the age of globalization. Thus the searches, exposures, and probes that define this threshold should not be understood only in terms of individual privacy invasions, but rather as an opportunity to focus on structural changes in federal labor, state surveillance and globalization that have emerged since 9/11. Keywords airport screening G imaging technologies G national security G 9/11 G objects G surveillance G travel journal of visual culture 6(2) Parks Points of Departure: US Airport Screening 185 186 journal of visual culture 6(2)","downloadable_attachments":[{"id":38989454,"asset_id":16426678,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":35582059,"first_name":"Lisa","last_name":"Parks","domain_name":"ucsb","page_name":"LisaParks","display_name":"Lisa Parks","profile_url":"https://ucsb.academia.edu/LisaParks?f_ri=7480","photo":"https://0.academia-photos.com/35582059/10324758/11521498/s65_lisa.parks.jpg"}],"research_interests":[{"id":928,"name":"Media Studies","url":"https://www.academia.edu/Documents/in/Media_Studies?f_ri=7480","nofollow":true},{"id":3225,"name":"Visual Culture","url":"https://www.academia.edu/Documents/in/Visual_Culture?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":30456,"name":"War on Terror","url":"https://www.academia.edu/Documents/in/War_on_Terror?f_ri=7480","nofollow":true},{"id":120024,"name":"Airport Security","url":"https://www.academia.edu/Documents/in/Airport_Security?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_59366309 coauthored" data-work_id="59366309" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/59366309/Making_sense_of_algorithmic_profiling_user_perceptions_on_Facebook">Making sense of algorithmic profiling: user perceptions on Facebook</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Algorithmic profiling has become increasingly prevalent in many social fields and practices, including finance, marketing, law, cultural consumption and production, and social engagement. Although researchers have begun to investigate... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_59366309" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Algorithmic profiling has become increasingly prevalent in many social fields and practices, including finance, marketing, law, cultural consumption and production, and social engagement. Although researchers have begun to investigate algorithmic profiling from various perspectives, socio-technical studies of algorithmic profiling that consider users' everyday perceptions are still scarce. In this article, we expand upon existing usercentered research and focus on people's awareness and imaginaries of algorithmic profiling, specifically in the context of social media and targeted advertising. We conducted an online survey geared toward understanding how Facebook users react to and make sense of algorithmic profiling when it is made visible. The methodology relied on qualitative accounts as well as quantitative data from 292 Facebook users in the United States and their reactions to their algorithmically inferred 'Your Interests' and 'Your Categories' sections on Facebook. The results illustrate a broad set of reactions and rationales to Facebook's (public-facing) algorithmic profiling, ranging from shock and surprise, to accounts of how superficialand in some cases, inaccuratethe profiles were. Taken together with the increasing reliance on Facebook as critical social infrastructure, our study highlights a sense of algorithmic disillusionment requiring further research.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/59366309" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="d4491d754d1b00916045613d2962de39" rel="nofollow" data-download="{"attachment_id":73326329,"asset_id":59366309,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/73326329/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="1149114" href="https://bi.academia.edu/ChristophLutz">Christoph Lutz</a><script data-card-contents-for-user="1149114" type="text/json">{"id":1149114,"first_name":"Christoph","last_name":"Lutz","domain_name":"bi","page_name":"ChristophLutz","display_name":"Christoph Lutz","profile_url":"https://bi.academia.edu/ChristophLutz?f_ri=7480","photo":"https://0.academia-photos.com/1149114/404966/15364690/s65_christoph.lutz.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text"> and <span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-59366309">+1</span><div class="hidden js-additional-users-59366309"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://bi.academia.edu/ShruthiVelidi">Shruthi Velidi</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-59366309'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-59366309').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_59366309 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="59366309"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 59366309, container: ".js-paper-rank-work_59366309", }); });</script></li><li class="js-percentile-work_59366309 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 59366309; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_59366309"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_59366309 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="59366309"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 59366309; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=59366309]").text(description); $(".js-view-count-work_59366309").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_59366309").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="59366309"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">19</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="184" rel="nofollow" href="https://www.academia.edu/Documents/in/Sociology">Sociology</a>, <script data-card-contents-for-ri="184" type="text/json">{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="428" rel="nofollow" href="https://www.academia.edu/Documents/in/Algorithms">Algorithms</a>, <script data-card-contents-for-ri="428" type="text/json">{"id":428,"name":"Algorithms","url":"https://www.academia.edu/Documents/in/Algorithms?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="859" rel="nofollow" href="https://www.academia.edu/Documents/in/Communication">Communication</a>, <script data-card-contents-for-ri="859" type="text/json">{"id":859,"name":"Communication","url":"https://www.academia.edu/Documents/in/Communication?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="933" rel="nofollow" href="https://www.academia.edu/Documents/in/New_Media">New Media</a><script data-card-contents-for-ri="933" type="text/json">{"id":933,"name":"New Media","url":"https://www.academia.edu/Documents/in/New_Media?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=59366309]'), work: {"id":59366309,"title":"Making sense of algorithmic profiling: user perceptions on Facebook","created_at":"2021-10-21T13:01:43.247-07:00","url":"https://www.academia.edu/59366309/Making_sense_of_algorithmic_profiling_user_perceptions_on_Facebook?f_ri=7480","dom_id":"work_59366309","summary":"Algorithmic profiling has become increasingly prevalent in many social fields and practices, including finance, marketing, law, cultural consumption and production, and social engagement. Although researchers have begun to investigate algorithmic profiling from various perspectives, socio-technical studies of algorithmic profiling that consider users' everyday perceptions are still scarce. In this article, we expand upon existing usercentered research and focus on people's awareness and imaginaries of algorithmic profiling, specifically in the context of social media and targeted advertising. We conducted an online survey geared toward understanding how Facebook users react to and make sense of algorithmic profiling when it is made visible. The methodology relied on qualitative accounts as well as quantitative data from 292 Facebook users in the United States and their reactions to their algorithmically inferred 'Your Interests' and 'Your Categories' sections on Facebook. The results illustrate a broad set of reactions and rationales to Facebook's (public-facing) algorithmic profiling, ranging from shock and surprise, to accounts of how superficialand in some cases, inaccuratethe profiles were. Taken together with the increasing reliance on Facebook as critical social infrastructure, our study highlights a sense of algorithmic disillusionment requiring further research.","downloadable_attachments":[{"id":73326329,"asset_id":59366309,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":1149114,"first_name":"Christoph","last_name":"Lutz","domain_name":"bi","page_name":"ChristophLutz","display_name":"Christoph Lutz","profile_url":"https://bi.academia.edu/ChristophLutz?f_ri=7480","photo":"https://0.academia-photos.com/1149114/404966/15364690/s65_christoph.lutz.jpg"},{"id":118964567,"first_name":"Shruthi","last_name":"Velidi","domain_name":"bi","page_name":"ShruthiVelidi","display_name":"Shruthi Velidi","profile_url":"https://bi.academia.edu/ShruthiVelidi?f_ri=7480","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=7480","nofollow":true},{"id":428,"name":"Algorithms","url":"https://www.academia.edu/Documents/in/Algorithms?f_ri=7480","nofollow":true},{"id":859,"name":"Communication","url":"https://www.academia.edu/Documents/in/Communication?f_ri=7480","nofollow":true},{"id":933,"name":"New Media","url":"https://www.academia.edu/Documents/in/New_Media?f_ri=7480","nofollow":true},{"id":1237,"name":"Social Sciences","url":"https://www.academia.edu/Documents/in/Social_Sciences?f_ri=7480"},{"id":1759,"name":"Internet Studies","url":"https://www.academia.edu/Documents/in/Internet_Studies?f_ri=7480"},{"id":2783,"name":"Privacy","url":"https://www.academia.edu/Documents/in/Privacy?f_ri=7480"},{"id":5401,"name":"Computer-Mediated Communication","url":"https://www.academia.edu/Documents/in/Computer-Mediated_Communication?f_ri=7480"},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480"},{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=7480"},{"id":9253,"name":"Internet research","url":"https://www.academia.edu/Documents/in/Internet_research?f_ri=7480"},{"id":13872,"name":"Facebook","url":"https://www.academia.edu/Documents/in/Facebook?f_ri=7480"},{"id":16416,"name":"Internet \u0026 Society","url":"https://www.academia.edu/Documents/in/Internet_and_Society?f_ri=7480"},{"id":24892,"name":"Surveillance","url":"https://www.academia.edu/Documents/in/Surveillance?f_ri=7480"},{"id":30947,"name":"The Internet","url":"https://www.academia.edu/Documents/in/The_Internet?f_ri=7480"},{"id":51629,"name":"Survey","url":"https://www.academia.edu/Documents/in/Survey?f_ri=7480"},{"id":59537,"name":"Transparency","url":"https://www.academia.edu/Documents/in/Transparency?f_ri=7480"},{"id":379669,"name":"Profiling","url":"https://www.academia.edu/Documents/in/Profiling?f_ri=7480"},{"id":510271,"name":"Digital Footprint","url":"https://www.academia.edu/Documents/in/Digital_Footprint?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_27295972" data-work_id="27295972" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/27295972/SuperVision_an_introduction_to_the_surveillance_society_pdf">SuperVision an introduction to the surveillance society.pdf</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/27295972" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="4b9a8b58ab3ed6ecde854cc9dfad826c" rel="nofollow" data-download="{"attachment_id":47554217,"asset_id":27295972,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/47554217/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="35488931" href="https://york.academia.edu/RosieSmith">Rosie Smith</a><script data-card-contents-for-user="35488931" type="text/json">{"id":35488931,"first_name":"Rosie","last_name":"Smith","domain_name":"york","page_name":"RosieSmith","display_name":"Rosie Smith","profile_url":"https://york.academia.edu/RosieSmith?f_ri=7480","photo":"https://0.academia-photos.com/35488931/11481111/12805515/s65_rosie.smith.jpg"}</script></span></span></li><li class="js-paper-rank-work_27295972 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="27295972"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 27295972, container: ".js-paper-rank-work_27295972", }); });</script></li><li class="js-percentile-work_27295972 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 27295972; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_27295972"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_27295972 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="27295972"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 27295972; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=27295972]").text(description); $(".js-view-count-work_27295972").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_27295972").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="27295972"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">6</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="184" rel="nofollow" href="https://www.academia.edu/Documents/in/Sociology">Sociology</a>, <script data-card-contents-for-ri="184" type="text/json">{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="491" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Technology">Information Technology</a>, <script data-card-contents-for-ri="491" type="text/json">{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="928" rel="nofollow" href="https://www.academia.edu/Documents/in/Media_Studies">Media Studies</a>, <script data-card-contents-for-ri="928" type="text/json">{"id":928,"name":"Media Studies","url":"https://www.academia.edu/Documents/in/Media_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1439" rel="nofollow" href="https://www.academia.edu/Documents/in/Globalization">Globalization</a><script data-card-contents-for-ri="1439" type="text/json">{"id":1439,"name":"Globalization","url":"https://www.academia.edu/Documents/in/Globalization?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=27295972]'), work: {"id":27295972,"title":"SuperVision an introduction to the surveillance society.pdf","created_at":"2016-07-27T01:27:43.196-07:00","url":"https://www.academia.edu/27295972/SuperVision_an_introduction_to_the_surveillance_society_pdf?f_ri=7480","dom_id":"work_27295972","summary":null,"downloadable_attachments":[{"id":47554217,"asset_id":27295972,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":35488931,"first_name":"Rosie","last_name":"Smith","domain_name":"york","page_name":"RosieSmith","display_name":"Rosie Smith","profile_url":"https://york.academia.edu/RosieSmith?f_ri=7480","photo":"https://0.academia-photos.com/35488931/11481111/12805515/s65_rosie.smith.jpg"}],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=7480","nofollow":true},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=7480","nofollow":true},{"id":928,"name":"Media Studies","url":"https://www.academia.edu/Documents/in/Media_Studies?f_ri=7480","nofollow":true},{"id":1439,"name":"Globalization","url":"https://www.academia.edu/Documents/in/Globalization?f_ri=7480","nofollow":true},{"id":2869,"name":"Digital Media","url":"https://www.academia.edu/Documents/in/Digital_Media?f_ri=7480"},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_36911674" data-work_id="36911674" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/36911674/Experiencing_risk_surveillance_and_prosumption_health_and_physical_education_students_perceptions_of_digitised_health_and_physical_activity_data">Experiencing risk, surveillance, and prosumption: health and physical education students' perceptions of digitised health and physical activity data</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Digital technologies are now considered important in shaping young people's engagement in and with health and physical activity. Recent discussions show that the use of digital technologies to track health and fitness may over-emphasize... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_36911674" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Digital technologies are now considered important in shaping young people's engagement in and with health and physical activity. Recent discussions show that the use of digital technologies to track health and fitness may over-emphasize the linear understanding of the body and health generally underpinned by Western health ideologies such as healthism. Other studies have shown the increased use of digital technologies in teaching Health and Physical Education (HPE) and as a means to enhance health and increase physical activity. Despite the opportunities and risks apparent in these studies, little is known about how HPE students make choices, negotiate, and resist or embrace the digitalisation of physical activity, exercise, and more broadly health. This study examines HPE students' meaning making of risk and surveillance associated with the self-digitisation of exercise. The study further investigates how the concept of 'prosumption'; the production, curation and consumption of self-data within the context of digitised health and physical activity, is understood. Based on the findings, we have constructed a typology of prosumers that can be used as a pedagogical device to illustrate the various kinds of subject positions students take up with digital technology in health and physical activity. This study extends the current understanding of prosumers by identifying the 'ambivalent prosumer'. The results provide insights that have direct pedagogical implications in HPE teacher education specifically in the areas of knowledge production and consumption of knowledge through digital technology in health and physical activity.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/36911674" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="878ac6dfc93d48a1aa242c4b5fc6459f" rel="nofollow" data-download="{"attachment_id":56862636,"asset_id":36911674,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/56862636/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3423688" href="https://edithcowan.academia.edu/ValeriaVarea">Valeria Varea</a><script data-card-contents-for-user="3423688" type="text/json">{"id":3423688,"first_name":"Valeria","last_name":"Varea","domain_name":"edithcowan","page_name":"ValeriaVarea","display_name":"Valeria Varea","profile_url":"https://edithcowan.academia.edu/ValeriaVarea?f_ri=7480","photo":"https://0.academia-photos.com/3423688/1163398/47690959/s65_valeria.varea.jpg"}</script></span></span></li><li class="js-paper-rank-work_36911674 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="36911674"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 36911674, container: ".js-paper-rank-work_36911674", }); });</script></li><li class="js-percentile-work_36911674 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 36911674; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_36911674"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_36911674 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="36911674"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 36911674; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=36911674]").text(description); $(".js-view-count-work_36911674").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_36911674").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="36911674"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">49</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="1601" rel="nofollow" href="https://www.academia.edu/Documents/in/Teacher_Education">Teacher Education</a>, <script data-card-contents-for-ri="1601" type="text/json">{"id":1601,"name":"Teacher Education","url":"https://www.academia.edu/Documents/in/Teacher_Education?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="3611" rel="nofollow" href="https://www.academia.edu/Documents/in/Digital_Technology">Digital Technology</a>, <script data-card-contents-for-ri="3611" type="text/json">{"id":3611,"name":"Digital Technology","url":"https://www.academia.edu/Documents/in/Digital_Technology?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="6865" rel="nofollow" href="https://www.academia.edu/Documents/in/Digital_Culture">Digital Culture</a>, <script data-card-contents-for-ri="6865" type="text/json">{"id":6865,"name":"Digital Culture","url":"https://www.academia.edu/Documents/in/Digital_Culture?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a><script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=36911674]'), work: {"id":36911674,"title":"Experiencing risk, surveillance, and prosumption: health and physical education students' perceptions of digitised health and physical activity data","created_at":"2018-06-25T01:37:59.656-07:00","url":"https://www.academia.edu/36911674/Experiencing_risk_surveillance_and_prosumption_health_and_physical_education_students_perceptions_of_digitised_health_and_physical_activity_data?f_ri=7480","dom_id":"work_36911674","summary":"Digital technologies are now considered important in shaping young people's engagement in and with health and physical activity. Recent discussions show that the use of digital technologies to track health and fitness may over-emphasize the linear understanding of the body and health generally underpinned by Western health ideologies such as healthism. Other studies have shown the increased use of digital technologies in teaching Health and Physical Education (HPE) and as a means to enhance health and increase physical activity. Despite the opportunities and risks apparent in these studies, little is known about how HPE students make choices, negotiate, and resist or embrace the digitalisation of physical activity, exercise, and more broadly health. This study examines HPE students' meaning making of risk and surveillance associated with the self-digitisation of exercise. The study further investigates how the concept of 'prosumption'; the production, curation and consumption of self-data within the context of digitised health and physical activity, is understood. Based on the findings, we have constructed a typology of prosumers that can be used as a pedagogical device to illustrate the various kinds of subject positions students take up with digital technology in health and physical activity. This study extends the current understanding of prosumers by identifying the 'ambivalent prosumer'. The results provide insights that have direct pedagogical implications in HPE teacher education specifically in the areas of knowledge production and consumption of knowledge through digital technology in health and physical activity.","downloadable_attachments":[{"id":56862636,"asset_id":36911674,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3423688,"first_name":"Valeria","last_name":"Varea","domain_name":"edithcowan","page_name":"ValeriaVarea","display_name":"Valeria Varea","profile_url":"https://edithcowan.academia.edu/ValeriaVarea?f_ri=7480","photo":"https://0.academia-photos.com/3423688/1163398/47690959/s65_valeria.varea.jpg"}],"research_interests":[{"id":1601,"name":"Teacher Education","url":"https://www.academia.edu/Documents/in/Teacher_Education?f_ri=7480","nofollow":true},{"id":3611,"name":"Digital Technology","url":"https://www.academia.edu/Documents/in/Digital_Technology?f_ri=7480","nofollow":true},{"id":6865,"name":"Digital Culture","url":"https://www.academia.edu/Documents/in/Digital_Culture?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":24892,"name":"Surveillance","url":"https://www.academia.edu/Documents/in/Surveillance?f_ri=7480"},{"id":25806,"name":"Physical Education","url":"https://www.academia.edu/Documents/in/Physical_Education?f_ri=7480"},{"id":30785,"name":"Physical Education and Sport Pedagogy","url":"https://www.academia.edu/Documents/in/Physical_Education_and_Sport_Pedagogy?f_ri=7480"},{"id":37229,"name":"Human Movement Science","url":"https://www.academia.edu/Documents/in/Human_Movement_Science?f_ri=7480"},{"id":42270,"name":"Prosumer","url":"https://www.academia.edu/Documents/in/Prosumer?f_ri=7480"},{"id":59714,"name":"Educación física, pedagogía, sociología","url":"https://www.academia.edu/Documents/in/Educacion_fisica_pedagogia_sociologia?f_ri=7480"},{"id":60798,"name":"Surveillance, personal data, social sorting, privacy, camera surveillance, identification systems, internet surveillance, biometrics","url":"https://www.academia.edu/Documents/in/Surveillance_personal_data_social_sorting_privacy_camera_surveillance_identification_systems_i?f_ri=7480"},{"id":66942,"name":"Nuevas tecnologías","url":"https://www.academia.edu/Documents/in/Nuevas_tecnolog%C3%ADas?f_ri=7480"},{"id":68309,"name":"Uso pedagógico de las tecnologías de la información y la comunicación","url":"https://www.academia.edu/Documents/in/Uso_pedagogico_de_las_tecnologias_de_la_informacion_y_la_comunicacion?f_ri=7480"},{"id":69367,"name":"Exercise and physical activity for health","url":"https://www.academia.edu/Documents/in/Exercise_and_physical_activity_for_health?f_ri=7480"},{"id":87999,"name":"Health Care, Digital Health","url":"https://www.academia.edu/Documents/in/Health_Care_Digital_Health?f_ri=7480"},{"id":95463,"name":"Health and Physical Education","url":"https://www.academia.edu/Documents/in/Health_and_Physical_Education?f_ri=7480"},{"id":100381,"name":"Tecnologia","url":"https://www.academia.edu/Documents/in/Tecnologia?f_ri=7480"},{"id":107193,"name":"Educación para la salud","url":"https://www.academia.edu/Documents/in/Educaci%C3%B3n_para_la_salud?f_ri=7480"},{"id":134357,"name":"Prosumption","url":"https://www.academia.edu/Documents/in/Prosumption?f_ri=7480"},{"id":162420,"name":"Prosumers","url":"https://www.academia.edu/Documents/in/Prosumers?f_ri=7480"},{"id":179442,"name":"Salud","url":"https://www.academia.edu/Documents/in/Salud?f_ri=7480"},{"id":186951,"name":"Educación Física","url":"https://www.academia.edu/Documents/in/Educaci%C3%B3n_F%C3%ADsica?f_ri=7480"},{"id":193341,"name":"Ciencias Del Deporte","url":"https://www.academia.edu/Documents/in/Ciencias_Del_Deporte?f_ri=7480"},{"id":243866,"name":"Deportes","url":"https://www.academia.edu/Documents/in/Deportes?f_ri=7480"},{"id":256415,"name":"Physical Education and Sports","url":"https://www.academia.edu/Documents/in/Physical_Education_and_Sports?f_ri=7480"},{"id":257011,"name":"Sports Science and Physical Education","url":"https://www.academia.edu/Documents/in/Sports_Science_and_Physical_Education?f_ri=7480"},{"id":272575,"name":"CIENCIAS DE LA SALUD","url":"https://www.academia.edu/Documents/in/CIENCIAS_DE_LA_SALUD?f_ri=7480"},{"id":284644,"name":"Health and Digital Literacy","url":"https://www.academia.edu/Documents/in/Health_and_Digital_Literacy?f_ri=7480"},{"id":310158,"name":"Physical Education and Sport","url":"https://www.academia.edu/Documents/in/Physical_Education_and_Sport?f_ri=7480"},{"id":341506,"name":"Formación del profesorado de Educación Física","url":"https://www.academia.edu/Documents/in/Formacion_del_profesorado_de_Educacion_Fisica?f_ri=7480"},{"id":355847,"name":"Deporte","url":"https://www.academia.edu/Documents/in/Deporte?f_ri=7480"},{"id":374487,"name":"Educación Física - Educación Corporal","url":"https://www.academia.edu/Documents/in/Educacion_Fisica_-_Educacion_Corporal?f_ri=7480"},{"id":374523,"name":"Psicomotricidad y Educación Física","url":"https://www.academia.edu/Documents/in/Psicomotricidad_y_Educacion_Fisica?f_ri=7480"},{"id":388673,"name":"Educación - cuerpo - sociedad - Educación Corporal - Biopolítica - Educación Física","url":"https://www.academia.edu/Documents/in/Educacion_-_cuerpo_-_sociedad_-_Educacion_Corporal_-_Biopolitica_-_Educacion_Fisica?f_ri=7480"},{"id":454233,"name":"educación Física y Educación corporal - talentos deportivos - biopolítica - humanismo","url":"https://www.academia.edu/Documents/in/educacion_Fisica_y_Educacion_corporal_-_talentos_deportivos_-_biopolitica_-_humanismo?f_ri=7480"},{"id":467893,"name":"Physical Education Teacher Education","url":"https://www.academia.edu/Documents/in/Physical_Education_Teacher_Education?f_ri=7480"},{"id":493175,"name":"Human Movement","url":"https://www.academia.edu/Documents/in/Human_Movement?f_ri=7480"},{"id":493870,"name":"Las practicas corporales desde la Educacion Fisica","url":"https://www.academia.edu/Documents/in/Las_practicas_corporales_desde_la_Educacion_Fisica?f_ri=7480"},{"id":520007,"name":"Educacion Fisica","url":"https://www.academia.edu/Documents/in/Educacion_Fisica?f_ri=7480"},{"id":529646,"name":"Ciencias de la Actividad Física y del Deporte","url":"https://www.academia.edu/Documents/in/Ciencias_de_la_Actividad_Fisica_y_del_Deporte?f_ri=7480"},{"id":553108,"name":"Todo Lo Relacionado Al Deporte Educacion Fisica Y Recreacion","url":"https://www.academia.edu/Documents/in/Todo_Lo_Relacionado_Al_Deporte_Educacion_Fisica_Y_Recreacion?f_ri=7480"},{"id":559967,"name":"Physical and health education","url":"https://www.academia.edu/Documents/in/Physical_and_health_education?f_ri=7480"},{"id":583641,"name":"Innovation of Physical Education and Sports","url":"https://www.academia.edu/Documents/in/Innovation_of_Physical_Education_and_Sports?f_ri=7480"},{"id":644410,"name":"Ciencias del deporte y la educación física","url":"https://www.academia.edu/Documents/in/Ciencias_del_deporte_y_la_educacion_fisica?f_ri=7480"},{"id":810449,"name":"Pedagogia En Educacion Fisica","url":"https://www.academia.edu/Documents/in/Pedagogia_En_Educacion_Fisica?f_ri=7480"},{"id":975035,"name":"CORPOREIDAD Y EDUCACIÓN FÍSICA","url":"https://www.academia.edu/Documents/in/CORPOREIDAD_Y_EDUCACION_FISICA?f_ri=7480"},{"id":1249496,"name":"Human Movement Sciences","url":"https://www.academia.edu/Documents/in/Human_Movement_Sciences?f_ri=7480"},{"id":1332777,"name":"Digital Health","url":"https://www.academia.edu/Documents/in/Digital_Health?f_ri=7480"},{"id":1442297,"name":"Educación Fisica","url":"https://www.academia.edu/Documents/in/Educaci%C3%B3n_Fisica?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_24782075" data-work_id="24782075" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/24782075/Technologies_of_Bystanding_Learning_to_See_Like_a_Bystander_2015_">Technologies of Bystanding: Learning to See Like a Bystander (2015)</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/24782075" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="2ef81f7a8d07351d3ef0703d094c7f6b" rel="nofollow" data-download="{"attachment_id":45110608,"asset_id":24782075,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/45110608/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="1874623" href="https://mcgill.academia.edu/CarrieRentschler">Carrie Rentschler</a><script data-card-contents-for-user="1874623" type="text/json">{"id":1874623,"first_name":"Carrie","last_name":"Rentschler","domain_name":"mcgill","page_name":"CarrieRentschler","display_name":"Carrie Rentschler","profile_url":"https://mcgill.academia.edu/CarrieRentschler?f_ri=7480","photo":"https://0.academia-photos.com/1874623/635567/788408/s65_carrie.rentschler.jpg"}</script></span></span></li><li class="js-paper-rank-work_24782075 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="24782075"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 24782075, container: ".js-paper-rank-work_24782075", }); });</script></li><li class="js-percentile-work_24782075 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 24782075; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_24782075"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_24782075 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="24782075"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 24782075; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=24782075]").text(description); $(".js-view-count-work_24782075").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_24782075").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="24782075"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">6</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="928" rel="nofollow" href="https://www.academia.edu/Documents/in/Media_Studies">Media Studies</a>, <script data-card-contents-for-ri="928" type="text/json">{"id":928,"name":"Media Studies","url":"https://www.academia.edu/Documents/in/Media_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a>, <script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="120258" rel="nofollow" href="https://www.academia.edu/Documents/in/Witnessing_Memory_and_Trauma">Witnessing, Memory and Trauma</a>, <script data-card-contents-for-ri="120258" type="text/json">{"id":120258,"name":"Witnessing, Memory and Trauma","url":"https://www.academia.edu/Documents/in/Witnessing_Memory_and_Trauma?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="221269" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyberbullying_and_Bystanders_Witnesses">Cyberbullying and Bystanders/Witnesses</a><script data-card-contents-for-ri="221269" type="text/json">{"id":221269,"name":"Cyberbullying and Bystanders/Witnesses","url":"https://www.academia.edu/Documents/in/Cyberbullying_and_Bystanders_Witnesses?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=24782075]'), work: {"id":24782075,"title":"Technologies of Bystanding: Learning to See Like a Bystander (2015)","created_at":"2016-04-26T13:15:36.618-07:00","url":"https://www.academia.edu/24782075/Technologies_of_Bystanding_Learning_to_See_Like_a_Bystander_2015_?f_ri=7480","dom_id":"work_24782075","summary":null,"downloadable_attachments":[{"id":45110608,"asset_id":24782075,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":1874623,"first_name":"Carrie","last_name":"Rentschler","domain_name":"mcgill","page_name":"CarrieRentschler","display_name":"Carrie Rentschler","profile_url":"https://mcgill.academia.edu/CarrieRentschler?f_ri=7480","photo":"https://0.academia-photos.com/1874623/635567/788408/s65_carrie.rentschler.jpg"}],"research_interests":[{"id":928,"name":"Media Studies","url":"https://www.academia.edu/Documents/in/Media_Studies?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":120258,"name":"Witnessing, Memory and Trauma","url":"https://www.academia.edu/Documents/in/Witnessing_Memory_and_Trauma?f_ri=7480","nofollow":true},{"id":221269,"name":"Cyberbullying and Bystanders/Witnesses","url":"https://www.academia.edu/Documents/in/Cyberbullying_and_Bystanders_Witnesses?f_ri=7480","nofollow":true},{"id":467090,"name":"Bystander","url":"https://www.academia.edu/Documents/in/Bystander?f_ri=7480"},{"id":598811,"name":"Violence and Social Change","url":"https://www.academia.edu/Documents/in/Violence_and_Social_Change?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_18541455" data-work_id="18541455" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/18541455/Technologies_of_attribution_characterizing_the_citizen_consumer_in_surveillance_performance">Technologies of attribution: characterizing the citizen-consumer in surveillance performance</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Many accounts of surveillance and its subjective effects tend to focus on privacy. Along with this focus comes the assumption that surveillance’s objects are simply facts and attributes, straightforwardly ‘mined’ (or stolen) from people’s... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_18541455" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Many accounts of surveillance and its subjective effects tend to focus on privacy. Along with this focus comes the assumption that surveillance’s objects are simply facts and attributes, straightforwardly ‘mined’ (or stolen) from people’s private lives. Yet, the habits and propensities ascribed to individuals through surveillance apparatuses are complex, relational phenomena: co-produced, selected and interpreted with interest by various actors. This essay begins to develop a critical language for surveillance as a form of characterization, by analysing SWAMP's McService (2003), Hasan Elahi’s Tracking Transience (2005–) and Erica Scourti’s Life in AdWords (2012–2013). Following Sara Ahmed, I theorize characterization as a ‘technology of attribution’ that attaches such interpretations of character to people within surveillant scenarios. Drawing from literary studies as well as recent work on the surveillance economy, I analyse the forms of attribution made possible within surveillant scenarios. Within SWAMP, Elahi and Scourti's works, which span a decade between 9/11 and the Snowden revelations, one can trace an evolution of structures through which such attributions manifest: from self as threat, to self as set, to self as product.<br /><br />The full text is available here: <a href="http://www.tandfonline.com/doi/abs/10.1080/14794713.2015.1086134" rel="nofollow">http://www.tandfonline.com/doi/abs/10.1080/14794713.2015.1086134</a><br /><br />For those without free access to T&F Journals, there are a limited number of free copies here: <a href="http://www.tandfonline.com/eprint/JMasTKf8YwaFW852eadH/full" rel="nofollow">http://www.tandfonline.com/eprint/JMasTKf8YwaFW852eadH/full</a></div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/18541455" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="50608269aa1fe4f0601dd68248fedd42" rel="nofollow" data-download="{"attachment_id":49604761,"asset_id":18541455,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/49604761/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3635015" href="https://goldsmiths.academia.edu/EmilyRosamond">Emily Rosamond</a><script data-card-contents-for-user="3635015" type="text/json">{"id":3635015,"first_name":"Emily","last_name":"Rosamond","domain_name":"goldsmiths","page_name":"EmilyRosamond","display_name":"Emily Rosamond","profile_url":"https://goldsmiths.academia.edu/EmilyRosamond?f_ri=7480","photo":"https://0.academia-photos.com/3635015/1276657/13458339/s65_emily.rosamond.png"}</script></span></span></li><li class="js-paper-rank-work_18541455 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="18541455"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 18541455, container: ".js-paper-rank-work_18541455", }); });</script></li><li class="js-percentile-work_18541455 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 18541455; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_18541455"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_18541455 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="18541455"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 18541455; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=18541455]").text(description); $(".js-view-count-work_18541455").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_18541455").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="18541455"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">9</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2783" rel="nofollow" href="https://www.academia.edu/Documents/in/Privacy">Privacy</a>, <script data-card-contents-for-ri="2783" type="text/json">{"id":2783,"name":"Privacy","url":"https://www.academia.edu/Documents/in/Privacy?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="3051" rel="nofollow" href="https://www.academia.edu/Documents/in/Contemporary_Art">Contemporary Art</a>, <script data-card-contents-for-ri="3051" type="text/json">{"id":3051,"name":"Contemporary Art","url":"https://www.academia.edu/Documents/in/Contemporary_Art?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5463" rel="nofollow" href="https://www.academia.edu/Documents/in/Performance_Art">Performance Art</a>, <script data-card-contents-for-ri="5463" type="text/json">{"id":5463,"name":"Performance Art","url":"https://www.academia.edu/Documents/in/Performance_Art?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a><script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=18541455]'), work: {"id":18541455,"title":"Technologies of attribution: characterizing the citizen-consumer in surveillance performance","created_at":"2015-11-17T15:36:20.108-08:00","url":"https://www.academia.edu/18541455/Technologies_of_attribution_characterizing_the_citizen_consumer_in_surveillance_performance?f_ri=7480","dom_id":"work_18541455","summary":"Many accounts of surveillance and its subjective effects tend to focus on privacy. Along with this focus comes the assumption that surveillance’s objects are simply facts and attributes, straightforwardly ‘mined’ (or stolen) from people’s private lives. Yet, the habits and propensities ascribed to individuals through surveillance apparatuses are complex, relational phenomena: co-produced, selected and interpreted with interest by various actors. This essay begins to develop a critical language for surveillance as a form of characterization, by analysing SWAMP's McService (2003), Hasan Elahi’s Tracking Transience (2005–) and Erica Scourti’s Life in AdWords (2012–2013). Following Sara Ahmed, I theorize characterization as a ‘technology of attribution’ that attaches such interpretations of character to people within surveillant scenarios. Drawing from literary studies as well as recent work on the surveillance economy, I analyse the forms of attribution made possible within surveillant scenarios. Within SWAMP, Elahi and Scourti's works, which span a decade between 9/11 and the Snowden revelations, one can trace an evolution of structures through which such attributions manifest: from self as threat, to self as set, to self as product.\n\nThe full text is available here: http://www.tandfonline.com/doi/abs/10.1080/14794713.2015.1086134\n\nFor those without free access to T\u0026F Journals, there are a limited number of free copies here: http://www.tandfonline.com/eprint/JMasTKf8YwaFW852eadH/full","downloadable_attachments":[{"id":49604761,"asset_id":18541455,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3635015,"first_name":"Emily","last_name":"Rosamond","domain_name":"goldsmiths","page_name":"EmilyRosamond","display_name":"Emily Rosamond","profile_url":"https://goldsmiths.academia.edu/EmilyRosamond?f_ri=7480","photo":"https://0.academia-photos.com/3635015/1276657/13458339/s65_emily.rosamond.png"}],"research_interests":[{"id":2783,"name":"Privacy","url":"https://www.academia.edu/Documents/in/Privacy?f_ri=7480","nofollow":true},{"id":3051,"name":"Contemporary Art","url":"https://www.academia.edu/Documents/in/Contemporary_Art?f_ri=7480","nofollow":true},{"id":5463,"name":"Performance Art","url":"https://www.academia.edu/Documents/in/Performance_Art?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":117327,"name":"Propensity","url":"https://www.academia.edu/Documents/in/Propensity?f_ri=7480"},{"id":125342,"name":"Attribution","url":"https://www.academia.edu/Documents/in/Attribution?f_ri=7480"},{"id":166634,"name":"Characterization","url":"https://www.academia.edu/Documents/in/Characterization?f_ri=7480"},{"id":565912,"name":"Pre-emption","url":"https://www.academia.edu/Documents/in/Pre-emption?f_ri=7480"},{"id":1717342,"name":"Algorithmic Culture","url":"https://www.academia.edu/Documents/in/Algorithmic_Culture?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_49239293" data-work_id="49239293" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/49239293/Il_paradosso_della_privacy_Note_su_sorveglianza_e_pulsione_dello_sguardo">Il paradosso della privacy. Note su sorveglianza e pulsione dello sguardo</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/49239293" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="6981bc888d04e0c0461c01f2fd560de7" rel="nofollow" data-download="{"attachment_id":67623404,"asset_id":49239293,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/67623404/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="857721" href="https://unical-it.academia.edu/DeborahDeRosa">Deborah De Rosa</a><script data-card-contents-for-user="857721" type="text/json">{"id":857721,"first_name":"Deborah","last_name":"De Rosa","domain_name":"unical-it","page_name":"DeborahDeRosa","display_name":"Deborah De Rosa","profile_url":"https://unical-it.academia.edu/DeborahDeRosa?f_ri=7480","photo":"https://0.academia-photos.com/857721/305974/34457335/s65_deborah.de_rosa.jpg"}</script></span></span></li><li class="js-paper-rank-work_49239293 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="49239293"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 49239293, container: ".js-paper-rank-work_49239293", }); });</script></li><li class="js-percentile-work_49239293 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 49239293; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_49239293"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_49239293 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="49239293"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 49239293; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=49239293]").text(description); $(".js-view-count-work_49239293").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_49239293").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="49239293"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">7</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="244" rel="nofollow" href="https://www.academia.edu/Documents/in/Psychoanalysis">Psychoanalysis</a>, <script data-card-contents-for-ri="244" type="text/json">{"id":244,"name":"Psychoanalysis","url":"https://www.academia.edu/Documents/in/Psychoanalysis?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a>, <script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="8338" rel="nofollow" href="https://www.academia.edu/Documents/in/Jacques_Lacan">Jacques Lacan</a>, <script data-card-contents-for-ri="8338" type="text/json">{"id":8338,"name":"Jacques Lacan","url":"https://www.academia.edu/Documents/in/Jacques_Lacan?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="8487" rel="nofollow" href="https://www.academia.edu/Documents/in/Sigmund_Freud">Sigmund Freud</a><script data-card-contents-for-ri="8487" type="text/json">{"id":8487,"name":"Sigmund Freud","url":"https://www.academia.edu/Documents/in/Sigmund_Freud?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=49239293]'), work: {"id":49239293,"title":"Il paradosso della privacy. Note su sorveglianza e pulsione dello sguardo","created_at":"2021-06-14T06:41:04.710-07:00","url":"https://www.academia.edu/49239293/Il_paradosso_della_privacy_Note_su_sorveglianza_e_pulsione_dello_sguardo?f_ri=7480","dom_id":"work_49239293","summary":null,"downloadable_attachments":[{"id":67623404,"asset_id":49239293,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":857721,"first_name":"Deborah","last_name":"De Rosa","domain_name":"unical-it","page_name":"DeborahDeRosa","display_name":"Deborah De Rosa","profile_url":"https://unical-it.academia.edu/DeborahDeRosa?f_ri=7480","photo":"https://0.academia-photos.com/857721/305974/34457335/s65_deborah.de_rosa.jpg"}],"research_interests":[{"id":244,"name":"Psychoanalysis","url":"https://www.academia.edu/Documents/in/Psychoanalysis?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":8338,"name":"Jacques Lacan","url":"https://www.academia.edu/Documents/in/Jacques_Lacan?f_ri=7480","nofollow":true},{"id":8487,"name":"Sigmund Freud","url":"https://www.academia.edu/Documents/in/Sigmund_Freud?f_ri=7480","nofollow":true},{"id":92007,"name":"Privacy and data protection","url":"https://www.academia.edu/Documents/in/Privacy_and_data_protection?f_ri=7480"},{"id":126300,"name":"Big Data","url":"https://www.academia.edu/Documents/in/Big_Data?f_ri=7480"},{"id":1310895,"name":"David Lyon","url":"https://www.academia.edu/Documents/in/David_Lyon?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_9776672" data-work_id="9776672" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/9776672/Detection_of_dynamic_background_due_to_swaying_movements_from_motion_features">Detection of dynamic background due to swaying movements from motion features</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Dynamically changing background ("dynamic background") still presents a great challenge to many motion-based video surveillance systems. In the context of event detection, it is a major source of false alarms. There is a strong need from... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_9776672" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Dynamically changing background ("dynamic background") still presents a great challenge to many motion-based video surveillance systems. In the context of event detection, it is a major source of false alarms. There is a strong need from the security industry either to detect and suppress these false alarms, or dampen the effects of background changes, so as to increase the sensitivity to meaningful events of interest. In this paper, we restrict our focus to one of the most common causes of dynamic background changes: that of swaying tree branches and their shadows under windy conditions. Considering the ultimate goal in a video analytics pipeline, we formulate a new dynamic background detection problem as a signal processing alternative to the previously described but unreliable computer vision-based approaches. Within this new framework, we directly reduce the number of false alarms by testing if the detected events are due to characteristic background motions. In addition, we introduce a new dataset suitable for the evaluation of dynamic background detection. It consists of real-world events detected by a commercial surveillance system from two static surveillance cameras. The research question we address is whether dynamic background can be detected reliably and efficiently using simple motion features and in the presence of similar but meaningful events such as loitering. Inspired by the tree aerodynamics theory, we propose a novel method named local variation persistence (LVP), that captures the key characteristics of swaying motions. The method is posed as a convex optimization problem whose variable is the local variation. We derive a computationally efficient algorithm for solving the optimization problem, the solution of which is then used to form a powerful detection statistic. On our newly collected dataset, we demonstrate that the proposed LVP achieves excellent detection results and outperforms the best alternative adapted from existing art in the dynamic background literature.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/9776672" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="2bc2fd047d698311158f2239251dbaa0" rel="nofollow" data-download="{"attachment_id":35954286,"asset_id":9776672,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/35954286/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3275555" href="https://st-andrews.academia.edu/OgnjenArandjelovic">Ognjen Arandjelovic</a><script data-card-contents-for-user="3275555" type="text/json">{"id":3275555,"first_name":"Ognjen","last_name":"Arandjelovic","domain_name":"st-andrews","page_name":"OgnjenArandjelovic","display_name":"Ognjen Arandjelovic","profile_url":"https://st-andrews.academia.edu/OgnjenArandjelovic?f_ri=7480","photo":"https://0.academia-photos.com/3275555/4831927/5562055/s65_ognjen.arandjelovic.jpg"}</script></span></span></li><li class="js-paper-rank-work_9776672 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="9776672"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 9776672, container: ".js-paper-rank-work_9776672", }); });</script></li><li class="js-percentile-work_9776672 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 9776672; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_9776672"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_9776672 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="9776672"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 9776672; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=9776672]").text(description); $(".js-view-count-work_9776672").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_9776672").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="9776672"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">93</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="48" rel="nofollow" href="https://www.academia.edu/Documents/in/Engineering">Engineering</a>, <script data-card-contents-for-ri="48" type="text/json">{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="49" rel="nofollow" href="https://www.academia.edu/Documents/in/Electrical_Engineering">Electrical Engineering</a>, <script data-card-contents-for-ri="49" type="text/json">{"id":49,"name":"Electrical Engineering","url":"https://www.academia.edu/Documents/in/Electrical_Engineering?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="50" rel="nofollow" href="https://www.academia.edu/Documents/in/Electronic_Engineering">Electronic Engineering</a>, <script data-card-contents-for-ri="50" type="text/json">{"id":50,"name":"Electronic Engineering","url":"https://www.academia.edu/Documents/in/Electronic_Engineering?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="422" rel="nofollow" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a><script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=9776672]'), work: {"id":9776672,"title":"Detection of dynamic background due to swaying movements from motion features","created_at":"2014-12-15T04:16:34.507-08:00","url":"https://www.academia.edu/9776672/Detection_of_dynamic_background_due_to_swaying_movements_from_motion_features?f_ri=7480","dom_id":"work_9776672","summary":"Dynamically changing background (\"dynamic background\") still presents a great challenge to many motion-based video surveillance systems. In the context of event detection, it is a major source of false alarms. There is a strong need from the security industry either to detect and suppress these false alarms, or dampen the effects of background changes, so as to increase the sensitivity to meaningful events of interest. In this paper, we restrict our focus to one of the most common causes of dynamic background changes: that of swaying tree branches and their shadows under windy conditions. Considering the ultimate goal in a video analytics pipeline, we formulate a new dynamic background detection problem as a signal processing alternative to the previously described but unreliable computer vision-based approaches. Within this new framework, we directly reduce the number of false alarms by testing if the detected events are due to characteristic background motions. In addition, we introduce a new dataset suitable for the evaluation of dynamic background detection. It consists of real-world events detected by a commercial surveillance system from two static surveillance cameras. The research question we address is whether dynamic background can be detected reliably and efficiently using simple motion features and in the presence of similar but meaningful events such as loitering. Inspired by the tree aerodynamics theory, we propose a novel method named local variation persistence (LVP), that captures the key characteristics of swaying motions. The method is posed as a convex optimization problem whose variable is the local variation. We derive a computationally efficient algorithm for solving the optimization problem, the solution of which is then used to form a powerful detection statistic. On our newly collected dataset, we demonstrate that the proposed LVP achieves excellent detection results and outperforms the best alternative adapted from existing art in the dynamic background literature.","downloadable_attachments":[{"id":35954286,"asset_id":9776672,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3275555,"first_name":"Ognjen","last_name":"Arandjelovic","domain_name":"st-andrews","page_name":"OgnjenArandjelovic","display_name":"Ognjen Arandjelovic","profile_url":"https://st-andrews.academia.edu/OgnjenArandjelovic?f_ri=7480","photo":"https://0.academia-photos.com/3275555/4831927/5562055/s65_ognjen.arandjelovic.jpg"}],"research_interests":[{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering?f_ri=7480","nofollow":true},{"id":49,"name":"Electrical Engineering","url":"https://www.academia.edu/Documents/in/Electrical_Engineering?f_ri=7480","nofollow":true},{"id":50,"name":"Electronic Engineering","url":"https://www.academia.edu/Documents/in/Electronic_Engineering?f_ri=7480","nofollow":true},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=7480","nofollow":true},{"id":428,"name":"Algorithms","url":"https://www.academia.edu/Documents/in/Algorithms?f_ri=7480"},{"id":449,"name":"Software Engineering","url":"https://www.academia.edu/Documents/in/Software_Engineering?f_ri=7480"},{"id":471,"name":"Robotics (Computer Science)","url":"https://www.academia.edu/Documents/in/Robotics_Computer_Science_?f_ri=7480"},{"id":854,"name":"Computer Vision","url":"https://www.academia.edu/Documents/in/Computer_Vision?f_ri=7480"},{"id":892,"name":"Statistics","url":"https://www.academia.edu/Documents/in/Statistics?f_ri=7480"},{"id":1185,"name":"Image Processing","url":"https://www.academia.edu/Documents/in/Image_Processing?f_ri=7480"},{"id":1380,"name":"Computer Engineering","url":"https://www.academia.edu/Documents/in/Computer_Engineering?f_ri=7480"},{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning?f_ri=7480"},{"id":2141,"name":"Signal Processing","url":"https://www.academia.edu/Documents/in/Signal_Processing?f_ri=7480"},{"id":2445,"name":"Statistical Signal Processing","url":"https://www.academia.edu/Documents/in/Statistical_Signal_Processing?f_ri=7480"},{"id":4060,"name":"Applied Statistics","url":"https://www.academia.edu/Documents/in/Applied_Statistics?f_ri=7480"},{"id":4095,"name":"Classification (Machine Learning)","url":"https://www.academia.edu/Documents/in/Classification_Machine_Learning_?f_ri=7480"},{"id":4388,"name":"Computational Statistics","url":"https://www.academia.edu/Documents/in/Computational_Statistics?f_ri=7480"},{"id":4672,"name":"Open Source Software","url":"https://www.academia.edu/Documents/in/Open_Source_Software?f_ri=7480"},{"id":5109,"name":"Pattern Recognition","url":"https://www.academia.edu/Documents/in/Pattern_Recognition?f_ri=7480"},{"id":5112,"name":"Object Recognition (Pattern Recognition)","url":"https://www.academia.edu/Documents/in/Object_Recognition_Pattern_Recognition_?f_ri=7480"},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480"},{"id":9038,"name":"Digital Signal Processing","url":"https://www.academia.edu/Documents/in/Digital_Signal_Processing?f_ri=7480"},{"id":9351,"name":"Image Analysis","url":"https://www.academia.edu/Documents/in/Image_Analysis?f_ri=7480"},{"id":9898,"name":"Soft Computing, Image Processing and Robotics","url":"https://www.academia.edu/Documents/in/Soft_Computing_Image_Processing_and_Robotics?f_ri=7480"},{"id":10005,"name":"Applications of Machine Learning","url":"https://www.academia.edu/Documents/in/Applications_of_Machine_Learning?f_ri=7480"},{"id":10875,"name":"Aerodynamics","url":"https://www.academia.edu/Documents/in/Aerodynamics?f_ri=7480"},{"id":13766,"name":"Motion Analysis","url":"https://www.academia.edu/Documents/in/Motion_Analysis?f_ri=7480"},{"id":14585,"name":"Statistical Modeling","url":"https://www.academia.edu/Documents/in/Statistical_Modeling?f_ri=7480"},{"id":14850,"name":"Pattern recognition (Engineering)","url":"https://www.academia.edu/Documents/in/Pattern_recognition_Engineering_?f_ri=7480"},{"id":15084,"name":"Statistical machine learning","url":"https://www.academia.edu/Documents/in/Statistical_machine_learning?f_ri=7480"},{"id":15198,"name":"Spatial Statistics","url":"https://www.academia.edu/Documents/in/Spatial_Statistics?f_ri=7480"},{"id":15665,"name":"Video Processing","url":"https://www.academia.edu/Documents/in/Video_Processing?f_ri=7480"},{"id":24264,"name":"Aerodynamics, Structures","url":"https://www.academia.edu/Documents/in/Aerodynamics_Structures?f_ri=7480"},{"id":24892,"name":"Surveillance","url":"https://www.academia.edu/Documents/in/Surveillance?f_ri=7480"},{"id":25395,"name":"Matlab","url":"https://www.academia.edu/Documents/in/Matlab?f_ri=7480"},{"id":26817,"name":"Algorithm","url":"https://www.academia.edu/Documents/in/Algorithm?f_ri=7480"},{"id":26870,"name":"Image segmentation","url":"https://www.academia.edu/Documents/in/Image_segmentation?f_ri=7480"},{"id":30664,"name":"Pattern Recognition and Classification","url":"https://www.academia.edu/Documents/in/Pattern_Recognition_and_Classification?f_ri=7480"},{"id":30665,"name":"Image Processing and Analysis","url":"https://www.academia.edu/Documents/in/Image_Processing_and_Analysis?f_ri=7480"},{"id":34150,"name":"Digital Signal processing (Engineering) (Engineering) (Engineering)","url":"https://www.academia.edu/Documents/in/Digital_Signal_processing_Engineering_Engineering_Engineering_?f_ri=7480"},{"id":35938,"name":"Digital Image Processing","url":"https://www.academia.edu/Documents/in/Digital_Image_Processing?f_ri=7480"},{"id":42835,"name":"Video Analysis","url":"https://www.academia.edu/Documents/in/Video_Analysis?f_ri=7480"},{"id":45088,"name":"Data Structures and Algorithms","url":"https://www.academia.edu/Documents/in/Data_Structures_and_Algorithms?f_ri=7480"},{"id":53212,"name":"Matlab, Image Processing","url":"https://www.academia.edu/Documents/in/Matlab_Image_Processing?f_ri=7480"},{"id":53293,"name":"Software","url":"https://www.academia.edu/Documents/in/Software?f_ri=7480"},{"id":56440,"name":"OpenCv or Computer Vision","url":"https://www.academia.edu/Documents/in/OpenCv_or_Computer_Vision?f_ri=7480"},{"id":57644,"name":"Automatic Classification (Machine Learning)","url":"https://www.academia.edu/Documents/in/Automatic_Classification_Machine_Learning_?f_ri=7480"},{"id":59378,"name":"Optical Flow","url":"https://www.academia.edu/Documents/in/Optical_Flow?f_ri=7480"},{"id":61636,"name":"Matlab Programming","url":"https://www.academia.edu/Documents/in/Matlab_Programming?f_ri=7480"},{"id":73673,"name":"Video Surveillance","url":"https://www.academia.edu/Documents/in/Video_Surveillance?f_ri=7480"},{"id":85310,"name":"Science Computer","url":"https://www.academia.edu/Documents/in/Science_Computer?f_ri=7480"},{"id":91364,"name":"Digital Signal and Image Processing","url":"https://www.academia.edu/Documents/in/Digital_Signal_and_Image_Processing?f_ri=7480"},{"id":93036,"name":"Motion Detection","url":"https://www.academia.edu/Documents/in/Motion_Detection?f_ri=7480"},{"id":93093,"name":"Image Processing with OpenCV","url":"https://www.academia.edu/Documents/in/Image_Processing_with_OpenCV?f_ri=7480"},{"id":99614,"name":"Image and Video Processing","url":"https://www.academia.edu/Documents/in/Image_and_Video_Processing?f_ri=7480"},{"id":102621,"name":"Computer Vision, Document Image Analysis, Machine Learning","url":"https://www.academia.edu/Documents/in/Computer_Vision_Document_Image_Analysis_Machine_Learning?f_ri=7480"},{"id":103921,"name":"Signal and Image Processing","url":"https://www.academia.edu/Documents/in/Signal_and_Image_Processing?f_ri=7480"},{"id":121039,"name":"MATLAB code","url":"https://www.academia.edu/Documents/in/MATLAB_code?f_ri=7480"},{"id":125863,"name":"Applied Mathematics and Computational Science","url":"https://www.academia.edu/Documents/in/Applied_Mathematics_and_Computational_Science?f_ri=7480"},{"id":143038,"name":"Machine Learning and Pattern Recognition","url":"https://www.academia.edu/Documents/in/Machine_Learning_and_Pattern_Recognition?f_ri=7480"},{"id":151689,"name":"A novel comprehensive method for real time Video Motion Detection Surveillance","url":"https://www.academia.edu/Documents/in/A_novel_comprehensive_method_for_real_time_Video_Motion_Detection_Surveillance?f_ri=7480"},{"id":154213,"name":"Background Subtraction","url":"https://www.academia.edu/Documents/in/Background_Subtraction?f_ri=7480"},{"id":154216,"name":"Background modeling","url":"https://www.academia.edu/Documents/in/Background_modeling?f_ri=7480"},{"id":154218,"name":"Foreground Detection","url":"https://www.academia.edu/Documents/in/Foreground_Detection?f_ri=7480"},{"id":159178,"name":"Cctv","url":"https://www.academia.edu/Documents/in/Cctv?f_ri=7480"},{"id":171449,"name":"Computer Application","url":"https://www.academia.edu/Documents/in/Computer_Application?f_ri=7480"},{"id":174757,"name":"Wireless Communication, Telecommunications, Signal Processing, Image and Video Processing, Computer Science, Software Engineering.","url":"https://www.academia.edu/Documents/in/Wireless_Communication_Telecommunications_Signal_Processing_Image_and_Video_Processing_Computer_?f_ri=7480"},{"id":186105,"name":"Matlab/Simulink","url":"https://www.academia.edu/Documents/in/Matlab_Simulink?f_ri=7480"},{"id":188474,"name":"Applied Statistics and Statistical Modelling","url":"https://www.academia.edu/Documents/in/Applied_Statistics_and_Statistical_Modelling?f_ri=7480"},{"id":230347,"name":"Computer Graphics and Image Processing","url":"https://www.academia.edu/Documents/in/Computer_Graphics_and_Image_Processing?f_ri=7480"},{"id":247096,"name":"Engineering and Computer Science","url":"https://www.academia.edu/Documents/in/Engineering_and_Computer_Science?f_ri=7480"},{"id":255822,"name":"Electronics Engineering","url":"https://www.academia.edu/Documents/in/Electronics_Engineering?f_ri=7480"},{"id":256975,"name":"Mathematics and Computer Science","url":"https://www.academia.edu/Documents/in/Mathematics_and_Computer_Science?f_ri=7480"},{"id":265402,"name":"Applied Mathematics and Statistics","url":"https://www.academia.edu/Documents/in/Applied_Mathematics_and_Statistics?f_ri=7480"},{"id":300330,"name":"Matlab \u0026 Simulink programming","url":"https://www.academia.edu/Documents/in/Matlab_and_Simulink_programming?f_ri=7480"},{"id":308710,"name":"Computer Applications","url":"https://www.academia.edu/Documents/in/Computer_Applications?f_ri=7480"},{"id":311120,"name":"OpenCV","url":"https://www.academia.edu/Documents/in/OpenCV?f_ri=7480"},{"id":328538,"name":"Computer Science And Engineering","url":"https://www.academia.edu/Documents/in/Computer_Science_And_Engineering?f_ri=7480"},{"id":363173,"name":"Image Processing and Multimedia","url":"https://www.academia.edu/Documents/in/Image_Processing_and_Multimedia?f_ri=7480"},{"id":388873,"name":"Mathematics and Statistics","url":"https://www.academia.edu/Documents/in/Mathematics_and_Statistics?f_ri=7480"},{"id":457721,"name":"Computer Science Engineering","url":"https://www.academia.edu/Documents/in/Computer_Science_Engineering?f_ri=7480"},{"id":460181,"name":"Signal and Image Processing, Pattern Recognition, Machine learning, Feature Extraction and Classification of Biomedical signals, Brain Machine Interface (BMI), and Computational Neuroscience","url":"https://www.academia.edu/Documents/in/Signal_and_Image_Processing_Pattern_Recognition_Machine_learning_Feature_Extraction_and_Classific?f_ri=7480"},{"id":470389,"name":"COMPUTER SCIENCE \u0026 ENGINEERING","url":"https://www.academia.edu/Documents/in/COMPUTER_SCIENCE_and_ENGINEERING-3?f_ri=7480"},{"id":482689,"name":"Applied aerodynamics","url":"https://www.academia.edu/Documents/in/Applied_aerodynamics?f_ri=7480"},{"id":484141,"name":"CCTV technology","url":"https://www.academia.edu/Documents/in/CCTV_technology?f_ri=7480"},{"id":559503,"name":"Machine Learning Big Data","url":"https://www.academia.edu/Documents/in/Machine_Learning_Big_Data?f_ri=7480"},{"id":610496,"name":"Security and Surveillance","url":"https://www.academia.edu/Documents/in/Security_and_Surveillance?f_ri=7480"},{"id":670596,"name":"Automated Video Surveillance Alarm System","url":"https://www.academia.edu/Documents/in/Automated_Video_Surveillance_Alarm_System?f_ri=7480"},{"id":793213,"name":"Video analytics","url":"https://www.academia.edu/Documents/in/Video_analytics?f_ri=7480"},{"id":965056,"name":"Local Features","url":"https://www.academia.edu/Documents/in/Local_Features?f_ri=7480"},{"id":973754,"name":"Segmentación De Imágenes","url":"https://www.academia.edu/Documents/in/Segmentaci%C3%B3n_De_Im%C3%A1genes?f_ri=7480"},{"id":1036243,"name":"Computer Assisted Image Analysis","url":"https://www.academia.edu/Documents/in/Computer_Assisted_Image_Analysis?f_ri=7480"},{"id":1226904,"name":"Computer Science and Engineering","url":"https://www.academia.edu/Documents/in/Computer_Science_and_Engineering-1?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_78622735" data-work_id="78622735" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/78622735/Policing_Made_Visible_Mobile_Technologies_and_the_Importance_of_Point_of_View">Policing Made Visible: Mobile Technologies and the Importance of Point of View</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Cameras are ubiquitous and increasingly mobile. While CCTV has captured considerable attention by surveillance researchers, the new visibility of police activities is increasingly produced by incidental sousveillance and wearable... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_78622735" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Cameras are ubiquitous and increasingly mobile. While CCTV has captured considerable attention by surveillance researchers, the new visibility of police activities is increasingly produced by incidental sousveillance and wearable on-officer camera systems. This article considers advocacy for policing’s new visibility, contrasting that of police accountability activists who film police with designers and early adopters of on-officer cameras. In both accounts, these devices promise accountability by virtue of their mechanical objectivity. However, to each party, accountability functions rather differently. By attending to the social and legal privileging of police officers’ perspectives, the article provides an explanation for design decisions that produced Taser’s AXON Flex on-officer cameras and for why police are embracing these new technologies. Critics of these cameras cite privacy concerns, officer discretion in operating cameras, and department disclosure of footage. Nonetheles...</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/78622735" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="fc4ee56c9a32307fb0ca759897064d2d" rel="nofollow" data-download="{"attachment_id":85606693,"asset_id":78622735,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/85606693/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="96354" href="https://umass.academia.edu/BenBrucato">Ben Brucato</a><script data-card-contents-for-user="96354" type="text/json">{"id":96354,"first_name":"Ben","last_name":"Brucato","domain_name":"umass","page_name":"BenBrucato","display_name":"Ben Brucato","profile_url":"https://umass.academia.edu/BenBrucato?f_ri=7480","photo":"https://0.academia-photos.com/96354/26642/83588457/s65_ben.brucato.png"}</script></span></span></li><li class="js-paper-rank-work_78622735 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="78622735"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 78622735, container: ".js-paper-rank-work_78622735", }); });</script></li><li class="js-percentile-work_78622735 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78622735; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_78622735"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_78622735 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="78622735"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78622735; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78622735]").text(description); $(".js-view-count-work_78622735").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_78622735").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="78622735"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">16</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="184" rel="nofollow" href="https://www.academia.edu/Documents/in/Sociology">Sociology</a>, <script data-card-contents-for-ri="184" type="text/json">{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="189" rel="nofollow" href="https://www.academia.edu/Documents/in/Criminology">Criminology</a>, <script data-card-contents-for-ri="189" type="text/json">{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="538" rel="nofollow" href="https://www.academia.edu/Documents/in/Police_Science">Police Science</a>, <script data-card-contents-for-ri="538" type="text/json">{"id":538,"name":"Police Science","url":"https://www.academia.edu/Documents/in/Police_Science?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="863" rel="nofollow" href="https://www.academia.edu/Documents/in/Visual_Studies">Visual Studies</a><script data-card-contents-for-ri="863" type="text/json">{"id":863,"name":"Visual Studies","url":"https://www.academia.edu/Documents/in/Visual_Studies?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=78622735]'), work: {"id":78622735,"title":"Policing Made Visible: Mobile Technologies and the Importance of Point of View","created_at":"2022-05-06T11:06:16.723-07:00","url":"https://www.academia.edu/78622735/Policing_Made_Visible_Mobile_Technologies_and_the_Importance_of_Point_of_View?f_ri=7480","dom_id":"work_78622735","summary":"Cameras are ubiquitous and increasingly mobile. While CCTV has captured considerable attention by surveillance researchers, the new visibility of police activities is increasingly produced by incidental sousveillance and wearable on-officer camera systems. This article considers advocacy for policing’s new visibility, contrasting that of police accountability activists who film police with designers and early adopters of on-officer cameras. In both accounts, these devices promise accountability by virtue of their mechanical objectivity. However, to each party, accountability functions rather differently. By attending to the social and legal privileging of police officers’ perspectives, the article provides an explanation for design decisions that produced Taser’s AXON Flex on-officer cameras and for why police are embracing these new technologies. Critics of these cameras cite privacy concerns, officer discretion in operating cameras, and department disclosure of footage. Nonetheles...","downloadable_attachments":[{"id":85606693,"asset_id":78622735,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":96354,"first_name":"Ben","last_name":"Brucato","domain_name":"umass","page_name":"BenBrucato","display_name":"Ben Brucato","profile_url":"https://umass.academia.edu/BenBrucato?f_ri=7480","photo":"https://0.academia-photos.com/96354/26642/83588457/s65_ben.brucato.png"}],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=7480","nofollow":true},{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology?f_ri=7480","nofollow":true},{"id":538,"name":"Police Science","url":"https://www.academia.edu/Documents/in/Police_Science?f_ri=7480","nofollow":true},{"id":863,"name":"Visual Studies","url":"https://www.academia.edu/Documents/in/Visual_Studies?f_ri=7480","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=7480"},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480"},{"id":9687,"name":"Wearable Technologies","url":"https://www.academia.edu/Documents/in/Wearable_Technologies?f_ri=7480"},{"id":11294,"name":"Policing Studies","url":"https://www.academia.edu/Documents/in/Policing_Studies?f_ri=7480"},{"id":11895,"name":"Policing \u0026 Technology","url":"https://www.academia.edu/Documents/in/Policing_and_Technology?f_ri=7480"},{"id":24892,"name":"Surveillance","url":"https://www.academia.edu/Documents/in/Surveillance?f_ri=7480"},{"id":59537,"name":"Transparency","url":"https://www.academia.edu/Documents/in/Transparency?f_ri=7480"},{"id":62153,"name":"Mobile Surveillance Technologies","url":"https://www.academia.edu/Documents/in/Mobile_Surveillance_Technologies?f_ri=7480"},{"id":73673,"name":"Video Surveillance","url":"https://www.academia.edu/Documents/in/Video_Surveillance?f_ri=7480"},{"id":131991,"name":"Government transparency","url":"https://www.academia.edu/Documents/in/Government_transparency?f_ri=7480"},{"id":198723,"name":"Sousveillance","url":"https://www.academia.edu/Documents/in/Sousveillance?f_ri=7480"},{"id":3593233,"name":"Surveillance Society","url":"https://www.academia.edu/Documents/in/Surveillance_Society?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_39651136" data-work_id="39651136" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/39651136/Surveillance_capitalism_and_privacy_Knowledge_and_attitudes_on_surveillance_capitalism_and_online_institutional_privacy_protection_practices_among_adolescents_in_Poland">Surveillance capitalism and privacy. Knowledge and attitudes on surveillance capitalism and online institutional privacy protection practices among adolescents in Poland</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The purpose of the study was to determine the level of knowledge and attitudes towards surveillance capitalism and online institutional privacy protection practices among adolescents in Poland (aged 18-19), as well as to determine the... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_39651136" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The purpose of the study was to determine the level of knowledge and attitudes towards surveillance capitalism and online institutional privacy protection practices among adolescents in Poland (aged 18-19), as well as to determine the relationships between these variables. Surveillance capitalism has emerged as a result of internet users' activities and involves the collection of all data about these users by different entities for specific benefits without letting them know about it. The dominant role in surveillance capitalism is played by hi-tech corporations. the aim of the study was to verify whether knowledge, and what kind of knowledge, on surveillance capitalism translates into practices related to the protection of online institutional privacy. the study was conducted on a sample of 177 adolescents in Poland. the main part of the questionnaire consisted of two scales: the scale of knowledge and attitudes on surveillance capitalism, and the scale of online institutional privacy protection practices. the results of the study, calculated by statistical methods, showed that although the majority of respondents had average knowledge and attitudes about surveillance capitalism, which may result from insufficient knowledge of the subject matter, this participation in specialized activities/workshops influences the level of intensification of online institutional privacy protection practices.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/39651136" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="083d650b2176e92fea0188b5a2b3b6be" rel="nofollow" data-download="{"attachment_id":59869786,"asset_id":39651136,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/59869786/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3410678" href="https://agh.academia.edu/GregPtaszek">Grzegorz Ptaszek</a><script data-card-contents-for-user="3410678" type="text/json">{"id":3410678,"first_name":"Grzegorz","last_name":"Ptaszek","domain_name":"agh","page_name":"GregPtaszek","display_name":"Grzegorz Ptaszek","profile_url":"https://agh.academia.edu/GregPtaszek?f_ri=7480","photo":"https://0.academia-photos.com/3410678/1156226/35715951/s65_grzegorz.ptaszek.jpg"}</script></span></span></li><li class="js-paper-rank-work_39651136 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="39651136"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 39651136, container: ".js-paper-rank-work_39651136", }); });</script></li><li class="js-percentile-work_39651136 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 39651136; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_39651136"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_39651136 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="39651136"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 39651136; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=39651136]").text(description); $(".js-view-count-work_39651136").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_39651136").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="39651136"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a>, <script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="8280" rel="nofollow" href="https://www.academia.edu/Documents/in/Media_Literacy">Media Literacy</a>, <script data-card-contents-for-ri="8280" type="text/json">{"id":8280,"name":"Media Literacy","url":"https://www.academia.edu/Documents/in/Media_Literacy?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="15735" rel="nofollow" href="https://www.academia.edu/Documents/in/Media_Literacy_Education">Media Literacy Education</a>, <script data-card-contents-for-ri="15735" type="text/json">{"id":15735,"name":"Media Literacy Education","url":"https://www.academia.edu/Documents/in/Media_Literacy_Education?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="92007" rel="nofollow" href="https://www.academia.edu/Documents/in/Privacy_and_data_protection">Privacy and data protection</a><script data-card-contents-for-ri="92007" type="text/json">{"id":92007,"name":"Privacy and data protection","url":"https://www.academia.edu/Documents/in/Privacy_and_data_protection?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=39651136]'), work: {"id":39651136,"title":"Surveillance capitalism and privacy. Knowledge and attitudes on surveillance capitalism and online institutional privacy protection practices among adolescents in Poland","created_at":"2019-06-21T01:20:42.291-07:00","url":"https://www.academia.edu/39651136/Surveillance_capitalism_and_privacy_Knowledge_and_attitudes_on_surveillance_capitalism_and_online_institutional_privacy_protection_practices_among_adolescents_in_Poland?f_ri=7480","dom_id":"work_39651136","summary":"The purpose of the study was to determine the level of knowledge and attitudes towards surveillance capitalism and online institutional privacy protection practices among adolescents in Poland (aged 18-19), as well as to determine the relationships between these variables. Surveillance capitalism has emerged as a result of internet users' activities and involves the collection of all data about these users by different entities for specific benefits without letting them know about it. The dominant role in surveillance capitalism is played by hi-tech corporations. the aim of the study was to verify whether knowledge, and what kind of knowledge, on surveillance capitalism translates into practices related to the protection of online institutional privacy. the study was conducted on a sample of 177 adolescents in Poland. the main part of the questionnaire consisted of two scales: the scale of knowledge and attitudes on surveillance capitalism, and the scale of online institutional privacy protection practices. the results of the study, calculated by statistical methods, showed that although the majority of respondents had average knowledge and attitudes about surveillance capitalism, which may result from insufficient knowledge of the subject matter, this participation in specialized activities/workshops influences the level of intensification of online institutional privacy protection practices.","downloadable_attachments":[{"id":59869786,"asset_id":39651136,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3410678,"first_name":"Grzegorz","last_name":"Ptaszek","domain_name":"agh","page_name":"GregPtaszek","display_name":"Grzegorz Ptaszek","profile_url":"https://agh.academia.edu/GregPtaszek?f_ri=7480","photo":"https://0.academia-photos.com/3410678/1156226/35715951/s65_grzegorz.ptaszek.jpg"}],"research_interests":[{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":8280,"name":"Media Literacy","url":"https://www.academia.edu/Documents/in/Media_Literacy?f_ri=7480","nofollow":true},{"id":15735,"name":"Media Literacy Education","url":"https://www.academia.edu/Documents/in/Media_Literacy_Education?f_ri=7480","nofollow":true},{"id":92007,"name":"Privacy and data protection","url":"https://www.academia.edu/Documents/in/Privacy_and_data_protection?f_ri=7480","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_37176252 coauthored" data-work_id="37176252" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/37176252/Poetry_and_Secrecy">Poetry and Secrecy</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">In this editorial essay for a special issue of The Journal of British and Irish Innovative Poetry, we introduce the issue’s seven articles, and share some speculations about the nature of the secret in its relation to poetry.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/37176252" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="f33ca4c080d7020a9fb4ef1f5b663b85" rel="nofollow" data-download="{"attachment_id":57127470,"asset_id":37176252,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/57127470/download_file?st=MTc0MDAxMDQxNiw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="2744854" href="https://sussex.academia.edu/JoWalton">Jo Lindsay Walton</a><script data-card-contents-for-user="2744854" type="text/json">{"id":2744854,"first_name":"Jo","last_name":"Lindsay Walton","domain_name":"sussex","page_name":"JoWalton","display_name":"Jo Lindsay Walton","profile_url":"https://sussex.academia.edu/JoWalton?f_ri=7480","photo":"https://0.academia-photos.com/2744854/2536052/2943554/s65_jo.walton.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text"> and <span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-37176252">+1</span><div class="hidden js-additional-users-37176252"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://northumbria.academia.edu/EdLuker">Ed Luker</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-37176252'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-37176252').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_37176252 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="37176252"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 37176252, container: ".js-paper-rank-work_37176252", }); });</script></li><li class="js-percentile-work_37176252 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37176252; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_37176252"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_37176252 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="37176252"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37176252; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37176252]").text(description); $(".js-view-count-work_37176252").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_37176252").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="37176252"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">10</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="2783" rel="nofollow" href="https://www.academia.edu/Documents/in/Privacy">Privacy</a>, <script data-card-contents-for-ri="2783" type="text/json">{"id":2783,"name":"Privacy","url":"https://www.academia.edu/Documents/in/Privacy?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="6662" rel="nofollow" href="https://www.academia.edu/Documents/in/Secrecy">Secrecy</a>, <script data-card-contents-for-ri="6662" type="text/json">{"id":6662,"name":"Secrecy","url":"https://www.academia.edu/Documents/in/Secrecy?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a>, <script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="17917" rel="nofollow" href="https://www.academia.edu/Documents/in/Lyric_poetry">Lyric poetry</a><script data-card-contents-for-ri="17917" type="text/json">{"id":17917,"name":"Lyric poetry","url":"https://www.academia.edu/Documents/in/Lyric_poetry?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=37176252]'), work: {"id":37176252,"title":"Poetry and Secrecy","created_at":"2018-08-03T08:06:58.768-07:00","url":"https://www.academia.edu/37176252/Poetry_and_Secrecy?f_ri=7480","dom_id":"work_37176252","summary":"In this editorial essay for a special issue of The Journal of British and Irish Innovative Poetry, we introduce the issue’s seven articles, and share some speculations about the nature of the secret in its relation to poetry.","downloadable_attachments":[{"id":57127470,"asset_id":37176252,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":2744854,"first_name":"Jo","last_name":"Lindsay Walton","domain_name":"sussex","page_name":"JoWalton","display_name":"Jo Lindsay Walton","profile_url":"https://sussex.academia.edu/JoWalton?f_ri=7480","photo":"https://0.academia-photos.com/2744854/2536052/2943554/s65_jo.walton.jpg"},{"id":11487911,"first_name":"Ed","last_name":"Luker","domain_name":"northumbria","page_name":"EdLuker","display_name":"Ed Luker","profile_url":"https://northumbria.academia.edu/EdLuker?f_ri=7480","photo":"https://0.academia-photos.com/11487911/6905070/7790057/s65_ed.luker.jpg"}],"research_interests":[{"id":2783,"name":"Privacy","url":"https://www.academia.edu/Documents/in/Privacy?f_ri=7480","nofollow":true},{"id":6662,"name":"Secrecy","url":"https://www.academia.edu/Documents/in/Secrecy?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":17917,"name":"Lyric poetry","url":"https://www.academia.edu/Documents/in/Lyric_poetry?f_ri=7480","nofollow":true},{"id":19471,"name":"Contemporary Poetry","url":"https://www.academia.edu/Documents/in/Contemporary_Poetry?f_ri=7480"},{"id":20622,"name":"Avant-Garde","url":"https://www.academia.edu/Documents/in/Avant-Garde?f_ri=7480"},{"id":27258,"name":"Georg Simmel","url":"https://www.academia.edu/Documents/in/Georg_Simmel?f_ri=7480"},{"id":54659,"name":"Subjectivity","url":"https://www.academia.edu/Documents/in/Subjectivity?f_ri=7480"},{"id":60553,"name":"State Secrets","url":"https://www.academia.edu/Documents/in/State_Secrets?f_ri=7480"},{"id":288562,"name":"Secrets","url":"https://www.academia.edu/Documents/in/Secrets?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_188758" data-work_id="188758" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/188758/From_Barcodes_to_RFIDs_Consumer_and_Commercial_Responses_to_Individual_Identification_Technologies">From Barcodes to RFIDs: Consumer and Commercial Responses to Individual Identification Technologies</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Since the 1960’s, commercial surveillance in the form of bar code and RFID technologies have provoked distinctly different responses from businesses and consumers. A comparison of the history of bar codes to the current diffusion of RFIDs... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_188758" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Since the 1960’s, commercial surveillance in the form of bar code and RFID technologies have provoked distinctly different responses from businesses and consumers. A comparison of the history of bar codes to the current diffusion of RFIDs reveals that recent information and communication technology advances have dramatically shifted threats to consumer privacy from the point-of-sale into the realm of mobile surveillance and the dataveillance of networked databases. Businesses, driven by economic competition have aggressively embraced these technologies, while consumers have initially resisted them. Over time however, resistance fades as consumers either accept these technologies as tools of convenience or become accustomed to their pervasive presence. With the introduction and adoption of more advanced commercial surveillance technologies, user groups are confronted with the power of information analysis made possible by computer technology, databases, and the accessibility of data through networks, laying the philosophical foundation for the growth of data crimes.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/188758" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="5d81957c4d07fe634fd46da517c36aed" rel="nofollow" data-download="{"attachment_id":1935508,"asset_id":188758,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/1935508/download_file?st=MTc0MDAxMDQxNyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="60543" href="https://independent.academia.edu/JohnLaprise">John P Laprise</a><script data-card-contents-for-user="60543" type="text/json">{"id":60543,"first_name":"John","last_name":"Laprise","domain_name":"independent","page_name":"JohnLaprise","display_name":"John P Laprise","profile_url":"https://independent.academia.edu/JohnLaprise?f_ri=7480","photo":"https://0.academia-photos.com/60543/17434/1555863/s65_john.laprise.jpg"}</script></span></span></li><li class="js-paper-rank-work_188758 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="188758"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 188758, container: ".js-paper-rank-work_188758", }); });</script></li><li class="js-percentile-work_188758 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 188758; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_188758"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_188758 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="188758"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 188758; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=188758]").text(description); $(".js-view-count-work_188758").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_188758").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="188758"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">8</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="132" rel="nofollow" href="https://www.academia.edu/Documents/in/History_of_Science_and_Technology">History of Science and Technology</a>, <script data-card-contents-for-ri="132" type="text/json">{"id":132,"name":"History of Science and Technology","url":"https://www.academia.edu/Documents/in/History_of_Science_and_Technology?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4252" rel="nofollow" href="https://www.academia.edu/Documents/in/Computer_Networks">Computer Networks</a>, <script data-card-contents-for-ri="4252" type="text/json">{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a>, <script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="9200" rel="nofollow" href="https://www.academia.edu/Documents/in/Science_Technology_and_Society">Science, Technology and Society</a><script data-card-contents-for-ri="9200" type="text/json">{"id":9200,"name":"Science, Technology and Society","url":"https://www.academia.edu/Documents/in/Science_Technology_and_Society?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=188758]'), work: {"id":188758,"title":"From Barcodes to RFIDs: Consumer and Commercial Responses to Individual Identification Technologies","created_at":"2009-08-29T05:49:07.071-07:00","url":"https://www.academia.edu/188758/From_Barcodes_to_RFIDs_Consumer_and_Commercial_Responses_to_Individual_Identification_Technologies?f_ri=7480","dom_id":"work_188758","summary":"Since the 1960’s, commercial surveillance in the form of bar code and RFID technologies have provoked distinctly different responses from businesses and consumers. A comparison of the history of bar codes to the current diffusion of RFIDs reveals that recent information and communication technology advances have dramatically shifted threats to consumer privacy from the point-of-sale into the realm of mobile surveillance and the dataveillance of networked databases. Businesses, driven by economic competition have aggressively embraced these technologies, while consumers have initially resisted them. Over time however, resistance fades as consumers either accept these technologies as tools of convenience or become accustomed to their pervasive presence. With the introduction and adoption of more advanced commercial surveillance technologies, user groups are confronted with the power of information analysis made possible by computer technology, databases, and the accessibility of data through networks, laying the philosophical foundation for the growth of data crimes.","downloadable_attachments":[{"id":1935508,"asset_id":188758,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":60543,"first_name":"John","last_name":"Laprise","domain_name":"independent","page_name":"JohnLaprise","display_name":"John P Laprise","profile_url":"https://independent.academia.edu/JohnLaprise?f_ri=7480","photo":"https://0.academia-photos.com/60543/17434/1555863/s65_john.laprise.jpg"}],"research_interests":[{"id":132,"name":"History of Science and Technology","url":"https://www.academia.edu/Documents/in/History_of_Science_and_Technology?f_ri=7480","nofollow":true},{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":9200,"name":"Science, Technology and Society","url":"https://www.academia.edu/Documents/in/Science_Technology_and_Society?f_ri=7480","nofollow":true},{"id":12857,"name":"Technology and Society","url":"https://www.academia.edu/Documents/in/Technology_and_Society?f_ri=7480"},{"id":27360,"name":"Databases","url":"https://www.academia.edu/Documents/in/Databases?f_ri=7480"},{"id":53293,"name":"Software","url":"https://www.academia.edu/Documents/in/Software?f_ri=7480"},{"id":1744493,"name":"Science and Technology Studies","url":"https://www.academia.edu/Documents/in/Science_and_Technology_Studies?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_4839220" data-work_id="4839220" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/4839220/_Not_so_smart_cities_The_drivers_impact_and_risks_of_surveillance_enabled_smart_environments">(Not so) smart cities?: The drivers, impact and risks of surveillance-enabled smart environments</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The possibility of so-called ‘smart' technologies to improve city life has filled both pages of concern and PR leaflets. While the corporations driving these developments have emphasized how smart technologies can improve efficiency,... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_4839220" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The possibility of so-called ‘smart' technologies to improve city life has filled both pages of concern and PR leaflets. While the corporations driving these developments have emphasized how smart technologies can improve efficiency, critics have warned against the risks associated with the proliferation of smart surveillance. However, a critical discourse about the potential, limits and risks of the proliferation of smart technologies has not yet emerged, and in most instances public officials and decision-makers are ill-equipped to judge both the value and the externalities of the technologies being sold under the label ‘smart cities'. This paper presents a summary of smart solutions and definitions, and draws on the surveillance literature to address issues and risks related to the global drive to outsmart competing cities in a context of global governance. Using a multi-faceted and multi-disciplinary approach, it aims to provide a starting point for a public debate that involves policy-makers, developers and academics.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/4839220" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="2ef535fa5427f70aea37e8a28d58a088" rel="nofollow" data-download="{"attachment_id":43947141,"asset_id":4839220,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/43947141/download_file?st=MTc0MDAxMDQxNyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="141826" href="https://ub.academia.edu/GemmaGaldonClavell">Gemma Galdon Clavell</a><script data-card-contents-for-user="141826" type="text/json">{"id":141826,"first_name":"Gemma","last_name":"Galdon Clavell","domain_name":"ub","page_name":"GemmaGaldonClavell","display_name":"Gemma Galdon Clavell","profile_url":"https://ub.academia.edu/GemmaGaldonClavell?f_ri=7480","photo":"https://0.academia-photos.com/141826/37620/2885017/s65_gemma.galdon_clavell.jpg"}</script></span></span></li><li class="js-paper-rank-work_4839220 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="4839220"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 4839220, container: ".js-paper-rank-work_4839220", }); });</script></li><li class="js-percentile-work_4839220 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4839220; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_4839220"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_4839220 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="4839220"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4839220; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4839220]").text(description); $(".js-view-count-work_4839220").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_4839220").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="4839220"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">5</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2783" rel="nofollow" href="https://www.academia.edu/Documents/in/Privacy">Privacy</a>, <script data-card-contents-for-ri="2783" type="text/json">{"id":2783,"name":"Privacy","url":"https://www.academia.edu/Documents/in/Privacy?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a>, <script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="18886" rel="nofollow" href="https://www.academia.edu/Documents/in/Urban_Policy">Urban Policy</a>, <script data-card-contents-for-ri="18886" type="text/json">{"id":18886,"name":"Urban Policy","url":"https://www.academia.edu/Documents/in/Urban_Policy?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="74871" rel="nofollow" href="https://www.academia.edu/Documents/in/Smart_Cities">Smart Cities</a><script data-card-contents-for-ri="74871" type="text/json">{"id":74871,"name":"Smart Cities","url":"https://www.academia.edu/Documents/in/Smart_Cities?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=4839220]'), work: {"id":4839220,"title":"(Not so) smart cities?: The drivers, impact and risks of surveillance-enabled smart environments","created_at":"2013-10-21T01:14:57.429-07:00","url":"https://www.academia.edu/4839220/_Not_so_smart_cities_The_drivers_impact_and_risks_of_surveillance_enabled_smart_environments?f_ri=7480","dom_id":"work_4839220","summary":"The possibility of so-called ‘smart' technologies to improve city life has filled both pages of concern and PR leaflets. While the corporations driving these developments have emphasized how smart technologies can improve efficiency, critics have warned against the risks associated with the proliferation of smart surveillance. However, a critical discourse about the potential, limits and risks of the proliferation of smart technologies has not yet emerged, and in most instances public officials and decision-makers are ill-equipped to judge both the value and the externalities of the technologies being sold under the label ‘smart cities'. This paper presents a summary of smart solutions and definitions, and draws on the surveillance literature to address issues and risks related to the global drive to outsmart competing cities in a context of global governance. Using a multi-faceted and multi-disciplinary approach, it aims to provide a starting point for a public debate that involves policy-makers, developers and academics. ","downloadable_attachments":[{"id":43947141,"asset_id":4839220,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":141826,"first_name":"Gemma","last_name":"Galdon Clavell","domain_name":"ub","page_name":"GemmaGaldonClavell","display_name":"Gemma Galdon Clavell","profile_url":"https://ub.academia.edu/GemmaGaldonClavell?f_ri=7480","photo":"https://0.academia-photos.com/141826/37620/2885017/s65_gemma.galdon_clavell.jpg"}],"research_interests":[{"id":2783,"name":"Privacy","url":"https://www.academia.edu/Documents/in/Privacy?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":18886,"name":"Urban Policy","url":"https://www.academia.edu/Documents/in/Urban_Policy?f_ri=7480","nofollow":true},{"id":74871,"name":"Smart Cities","url":"https://www.academia.edu/Documents/in/Smart_Cities?f_ri=7480","nofollow":true},{"id":1723635,"name":"Public Policy","url":"https://www.academia.edu/Documents/in/Public_Policy?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_3875619" data-work_id="3875619" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/3875619/A_Guerra_Fria_Cultural_Como_a_Cortina_de_Celul%C3%B3ide_Contribuiu_para_Derrubar_a_Cortina_de_Ferro">A Guerra Fria Cultural: Como a Cortina de Celulóide Contribuiu para Derrubar a Cortina de Ferro</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Este artigo argumenta, assumindo uma perspectiva geopolítica, sobre o papel dos media cinematográficos como arma ideológica, política e cultural durante o período da Guerra Fria. Uma primeira abordagem, pretende esclarecer o conceito de... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_3875619" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Este artigo argumenta, assumindo uma perspectiva geopolítica, sobre o papel dos media cinematográficos como arma ideológica, política e cultural durante o período da Guerra Fria. Uma primeira abordagem, pretende esclarecer o conceito de geopolítica através de quatro dos seus aspectos. O artigo aborda, depois, os formatos e materializações da propaganda americana, nos primeiros anos, com a ascensão dos newsreels e o seu papel como garante psicológico da resistência ao comunismo. <br />De seguida, são analisados os anos da segunda metade da Guerra Fria, revelando a ascensão dos géneros cinematográficos da espionagem e vigilância e o seu papel na formação da identidade nacionalista, na geração do herói americano e na inscrição social da ideologia capitalista. <br />A relação estratégica entre a indústria do cinema de Hollywood e as várias administrações americanas do período da Guerra Fria fica, assim, demonstrada, caracterizando-se como uma verdadeira rede comercial multinacional e com influências em vários países, especialmente na Europa, traduzindo-se na hegemonia cultural americana dos nossos dias. <br /> <br />This article argues, in a geopolitical perspective, on the role of cinematographic media as an ideological, political and cultural weapon during the Cold War period. The first approach tries to clarify the concept of geopolitics through four of its aspects. The article addresses, then, the formats and representations of the American propaganda in the early years, with the rise of newsreels and their role as guarantor of psychological resistance to communism. <br />Next, we analyse the years of the second half of the Cold War, revealing the rise of the film genres of espionage and surveillance and their role in forging nationalist identity, the rise of the American hero and the social inscription of capitalist ideology. <br />The strategic relationship between Hollywood film industry and the various American administrations of the Cold War period is thus demonstrated, being characterised as a true multinational commercial network influencing several countries, mainly in Europe, into nowadays American cultural hegemony.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/3875619" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="025e8049f551606eb7f8001eff600d7a" rel="nofollow" data-download="{"attachment_id":31503901,"asset_id":3875619,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/31503901/download_file?st=MTc0MDAxMDQxNyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="2713895" href="https://iscte-iul.academia.edu/HugoFilipeRamos">Hugo Filipe Ramos</a><script data-card-contents-for-user="2713895" type="text/json">{"id":2713895,"first_name":"Hugo Filipe","last_name":"Ramos","domain_name":"iscte-iul","page_name":"HugoFilipeRamos","display_name":"Hugo Filipe Ramos","profile_url":"https://iscte-iul.academia.edu/HugoFilipeRamos?f_ri=7480","photo":"https://0.academia-photos.com/2713895/873148/14577875/s65_hugo_filipe.ramos.jpg"}</script></span></span></li><li class="js-paper-rank-work_3875619 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="3875619"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 3875619, container: ".js-paper-rank-work_3875619", }); });</script></li><li class="js-percentile-work_3875619 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 3875619; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_3875619"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_3875619 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="3875619"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 3875619; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=3875619]").text(description); $(".js-view-count-work_3875619").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_3875619").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="3875619"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">16</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="928" rel="nofollow" href="https://www.academia.edu/Documents/in/Media_Studies">Media Studies</a>, <script data-card-contents-for-ri="928" type="text/json">{"id":928,"name":"Media Studies","url":"https://www.academia.edu/Documents/in/Media_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2990" rel="nofollow" href="https://www.academia.edu/Documents/in/Geopolitics">Geopolitics</a>, <script data-card-contents-for-ri="2990" type="text/json">{"id":2990,"name":"Geopolitics","url":"https://www.academia.edu/Documents/in/Geopolitics?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="3356" rel="nofollow" href="https://www.academia.edu/Documents/in/Propaganda">Propaganda</a>, <script data-card-contents-for-ri="3356" type="text/json">{"id":3356,"name":"Propaganda","url":"https://www.academia.edu/Documents/in/Propaganda?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="3651" rel="nofollow" href="https://www.academia.edu/Documents/in/Cold_War_and_Culture">Cold War and Culture</a><script data-card-contents-for-ri="3651" type="text/json">{"id":3651,"name":"Cold War and Culture","url":"https://www.academia.edu/Documents/in/Cold_War_and_Culture?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=3875619]'), work: {"id":3875619,"title":"A Guerra Fria Cultural: Como a Cortina de Celulóide Contribuiu para Derrubar a Cortina de Ferro","created_at":"2013-07-05T06:56:50.297-07:00","url":"https://www.academia.edu/3875619/A_Guerra_Fria_Cultural_Como_a_Cortina_de_Celul%C3%B3ide_Contribuiu_para_Derrubar_a_Cortina_de_Ferro?f_ri=7480","dom_id":"work_3875619","summary":"Este artigo argumenta, assumindo uma perspectiva geopolítica, sobre o papel dos media cinematográficos como arma ideológica, política e cultural durante o período da Guerra Fria. Uma primeira abordagem, pretende esclarecer o conceito de geopolítica através de quatro dos seus aspectos. O artigo aborda, depois, os formatos e materializações da propaganda americana, nos primeiros anos, com a ascensão dos newsreels e o seu papel como garante psicológico da resistência ao comunismo.\r\nDe seguida, são analisados os anos da segunda metade da Guerra Fria, revelando a ascensão dos géneros cinematográficos da espionagem e vigilância e o seu papel na formação da identidade nacionalista, na geração do herói americano e na inscrição social da ideologia capitalista.\r\nA relação estratégica entre a indústria do cinema de Hollywood e as várias administrações americanas do período da Guerra Fria fica, assim, demonstrada, caracterizando-se como uma verdadeira rede comercial multinacional e com influências em vários países, especialmente na Europa, traduzindo-se na hegemonia cultural americana dos nossos dias.\r\n\r\nThis article argues, in a geopolitical perspective, on the role of cinematographic media as an ideological, political and cultural weapon during the Cold War period. The first approach tries to clarify the concept of geopolitics through four of its aspects. The article addresses, then, the formats and representations of the American propaganda in the early years, with the rise of newsreels and their role as guarantor of psychological resistance to communism.\r\nNext, we analyse the years of the second half of the Cold War, revealing the rise of the film genres of espionage and surveillance and their role in forging nationalist identity, the rise of the American hero and the social inscription of capitalist ideology.\r\nThe strategic relationship between Hollywood film industry and the various American administrations of the Cold War period is thus demonstrated, being characterised as a true multinational commercial network influencing several countries, mainly in Europe, into nowadays American cultural hegemony.","downloadable_attachments":[{"id":31503901,"asset_id":3875619,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":2713895,"first_name":"Hugo Filipe","last_name":"Ramos","domain_name":"iscte-iul","page_name":"HugoFilipeRamos","display_name":"Hugo Filipe Ramos","profile_url":"https://iscte-iul.academia.edu/HugoFilipeRamos?f_ri=7480","photo":"https://0.academia-photos.com/2713895/873148/14577875/s65_hugo_filipe.ramos.jpg"}],"research_interests":[{"id":928,"name":"Media Studies","url":"https://www.academia.edu/Documents/in/Media_Studies?f_ri=7480","nofollow":true},{"id":2990,"name":"Geopolitics","url":"https://www.academia.edu/Documents/in/Geopolitics?f_ri=7480","nofollow":true},{"id":3356,"name":"Propaganda","url":"https://www.academia.edu/Documents/in/Propaganda?f_ri=7480","nofollow":true},{"id":3651,"name":"Cold War and Culture","url":"https://www.academia.edu/Documents/in/Cold_War_and_Culture?f_ri=7480","nofollow":true},{"id":5214,"name":"Cold War","url":"https://www.academia.edu/Documents/in/Cold_War?f_ri=7480"},{"id":5878,"name":"Nationalism","url":"https://www.academia.edu/Documents/in/Nationalism?f_ri=7480"},{"id":6430,"name":"Newsreels and Cinemagazines","url":"https://www.academia.edu/Documents/in/Newsreels_and_Cinemagazines?f_ri=7480"},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480"},{"id":10422,"name":"National Identity","url":"https://www.academia.edu/Documents/in/National_Identity?f_ri=7480"},{"id":12628,"name":"Intelligence and Espionage","url":"https://www.academia.edu/Documents/in/Intelligence_and_Espionage?f_ri=7480"},{"id":24892,"name":"Surveillance","url":"https://www.academia.edu/Documents/in/Surveillance?f_ri=7480"},{"id":35802,"name":"Cold War history","url":"https://www.academia.edu/Documents/in/Cold_War_history?f_ri=7480"},{"id":44006,"name":"Identity","url":"https://www.academia.edu/Documents/in/Identity?f_ri=7480"},{"id":366969,"name":"Iron Curtain","url":"https://www.academia.edu/Documents/in/Iron_Curtain?f_ri=7480"},{"id":978225,"name":"Frontier/border/limit","url":"https://www.academia.edu/Documents/in/Frontier_border_limit?f_ri=7480"},{"id":978230,"name":"Collective Mentality","url":"https://www.academia.edu/Documents/in/Collective_Mentality?f_ri=7480"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_65836831" data-work_id="65836831" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/65836831/AI_Algorithms_and_Facial_Recognition_Technologies_Should_We_Trust_the_Process">AI Algorithms and Facial Recognition Technologies: Should We Trust the Process?</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Direct human intervention in AI reports and mitigating outcomes within their contest shall be regarded as fundamental factors in this development. The safeguards offered by Article 22 GDPRsupport this view when stating that “the data... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_65836831" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Direct human intervention in AI reports and mitigating outcomes within their contest shall be regarded as fundamental factors in this development. The safeguards offered by Article 22 GDPRsupport this view when stating that “the data subject shall have the right not to be subject to a decision based solely on automated processing”.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/65836831" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="1741fb890622e27a29347da03df660bd" rel="nofollow" data-download="{"attachment_id":77515558,"asset_id":65836831,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/77515558/download_file?st=MTc0MDAxMDQxNyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="15815448" href="https://leidenuniv.academia.edu/MarcoMendola">Marco Mendola</a><script data-card-contents-for-user="15815448" type="text/json">{"id":15815448,"first_name":"Marco","last_name":"Mendola","domain_name":"leidenuniv","page_name":"MarcoMendola","display_name":"Marco Mendola","profile_url":"https://leidenuniv.academia.edu/MarcoMendola?f_ri=7480","photo":"https://0.academia-photos.com/15815448/4288406/75554392/s65_marco.mendola.jpg"}</script></span></span></li><li class="js-paper-rank-work_65836831 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="65836831"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 65836831, container: ".js-paper-rank-work_65836831", }); });</script></li><li class="js-percentile-work_65836831 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 65836831; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_65836831"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_65836831 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="65836831"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 65836831; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=65836831]").text(description); $(".js-view-count-work_65836831").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_65836831").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="65836831"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1791" rel="nofollow" href="https://www.academia.edu/Documents/in/Facial_Recognition">Facial Recognition</a>, <script data-card-contents-for-ri="1791" type="text/json">{"id":1791,"name":"Facial Recognition","url":"https://www.academia.edu/Documents/in/Facial_Recognition?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a>, <script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="74262" rel="nofollow" href="https://www.academia.edu/Documents/in/Philosophy_of_Artificial_Intelligence">Philosophy of Artificial Intelligence</a>, <script data-card-contents-for-ri="74262" type="text/json">{"id":74262,"name":"Philosophy of Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Philosophy_of_Artificial_Intelligence?f_ri=7480","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="92007" rel="nofollow" href="https://www.academia.edu/Documents/in/Privacy_and_data_protection">Privacy and data protection</a><script data-card-contents-for-ri="92007" type="text/json">{"id":92007,"name":"Privacy and data protection","url":"https://www.academia.edu/Documents/in/Privacy_and_data_protection?f_ri=7480","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=65836831]'), work: {"id":65836831,"title":"AI Algorithms and Facial Recognition Technologies: Should We Trust the Process?","created_at":"2021-12-24T04:07:07.083-08:00","url":"https://www.academia.edu/65836831/AI_Algorithms_and_Facial_Recognition_Technologies_Should_We_Trust_the_Process?f_ri=7480","dom_id":"work_65836831","summary":"Direct human intervention in AI reports and mitigating outcomes within their contest shall be regarded as fundamental factors in this development. The safeguards offered by Article 22 GDPRsupport this view when stating that “the data subject shall have the right not to be subject to a decision based solely on automated processing”.","downloadable_attachments":[{"id":77515558,"asset_id":65836831,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":15815448,"first_name":"Marco","last_name":"Mendola","domain_name":"leidenuniv","page_name":"MarcoMendola","display_name":"Marco Mendola","profile_url":"https://leidenuniv.academia.edu/MarcoMendola?f_ri=7480","photo":"https://0.academia-photos.com/15815448/4288406/75554392/s65_marco.mendola.jpg"}],"research_interests":[{"id":1791,"name":"Facial Recognition","url":"https://www.academia.edu/Documents/in/Facial_Recognition?f_ri=7480","nofollow":true},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies?f_ri=7480","nofollow":true},{"id":74262,"name":"Philosophy of Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Philosophy_of_Artificial_Intelligence?f_ri=7480","nofollow":true},{"id":92007,"name":"Privacy and data protection","url":"https://www.academia.edu/Documents/in/Privacy_and_data_protection?f_ri=7480","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div></div><div class="u-taCenter Pagination"><ul class="pagination"><li class="next_page"><a href="/Documents/in/Surveillance_Studies?after=50%2C65836831" rel="next">Next</a></li><li class="last next"><a href="/Documents/in/Surveillance_Studies?page=last">Last »</a></li></ul></div></div><div class="hidden-xs hidden-sm"><div class="u-pl6x"><div style="width: 300px;"><div class="panel panel-flat u-mt7x"><div class="panel-heading u-p5x"><div class="u-tcGrayDark u-taCenter u-fw700 u-textUppercase">Related Topics</div></div><ul class="list-group"><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Surveillance">Surveillance</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="24892">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="24892">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Critical_Security_Studies">Critical Security Studies</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="5535">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="5535">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Privacy">Privacy</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="2783">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="2783">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Michel_Foucault">Michel Foucault</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="11927">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="11927">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Biopolitics">Biopolitics</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="16323">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="16323">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Critical_Theory">Critical Theory</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="8">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="8">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Science_and_Technology_Studies">Science and Technology Studies</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="1744493">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="1744493">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Governmentality">Governmentality</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="3231">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="3231">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Media_Studies">Media Studies</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="928">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="928">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/New_Media">New Media</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="933">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="933">Following</a></div></li></ul></div></div></div></div></div></div><script>// MIT License // Copyright © 2011 Sebastian Tschan, https://blueimp.net // Permission is hereby granted, free of charge, to any person obtaining a copy of // this software and associated documentation files (the "Software"), to deal in // the Software without restriction, including without limitation the rights to // use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of // the Software, and to permit persons to whom the Software is furnished to do so, // subject to the following conditions: // The above copyright notice and this permission notice shall be included in all // copies or substantial portions of the Software. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS // FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR // COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER // IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN // CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. !function(n){"use strict";function d(n,t){var r=(65535&n)+(65535&t);return(n>>16)+(t>>16)+(r>>16)<<16|65535&r}function f(n,t,r,e,o,u){return d((c=d(d(t,n),d(e,u)))<<(f=o)|c>>>32-f,r);var c,f}function l(n,t,r,e,o,u,c){return f(t&r|~t&e,n,t,o,u,c)}function v(n,t,r,e,o,u,c){return f(t&e|r&~e,n,t,o,u,c)}function g(n,t,r,e,o,u,c){return f(t^r^e,n,t,o,u,c)}function m(n,t,r,e,o,u,c){return f(r^(t|~e),n,t,o,u,c)}function i(n,t){var r,e,o,u;n[t>>5]|=128<<t%32,n[14+(t+64>>>9<<4)]=t;for(var c=1732584193,f=-271733879,i=-1732584194,a=271733878,h=0;h<n.length;h+=16)c=l(r=c,e=f,o=i,u=a,n[h],7,-680876936),a=l(a,c,f,i,n[h+1],12,-389564586),i=l(i,a,c,f,n[h+2],17,606105819),f=l(f,i,a,c,n[h+3],22,-1044525330),c=l(c,f,i,a,n[h+4],7,-176418897),a=l(a,c,f,i,n[h+5],12,1200080426),i=l(i,a,c,f,n[h+6],17,-1473231341),f=l(f,i,a,c,n[h+7],22,-45705983),c=l(c,f,i,a,n[h+8],7,1770035416),a=l(a,c,f,i,n[h+9],12,-1958414417),i=l(i,a,c,f,n[h+10],17,-42063),f=l(f,i,a,c,n[h+11],22,-1990404162),c=l(c,f,i,a,n[h+12],7,1804603682),a=l(a,c,f,i,n[h+13],12,-40341101),i=l(i,a,c,f,n[h+14],17,-1502002290),c=v(c,f=l(f,i,a,c,n[h+15],22,1236535329),i,a,n[h+1],5,-165796510),a=v(a,c,f,i,n[h+6],9,-1069501632),i=v(i,a,c,f,n[h+11],14,643717713),f=v(f,i,a,c,n[h],20,-373897302),c=v(c,f,i,a,n[h+5],5,-701558691),a=v(a,c,f,i,n[h+10],9,38016083),i=v(i,a,c,f,n[h+15],14,-660478335),f=v(f,i,a,c,n[h+4],20,-405537848),c=v(c,f,i,a,n[h+9],5,568446438),a=v(a,c,f,i,n[h+14],9,-1019803690),i=v(i,a,c,f,n[h+3],14,-187363961),f=v(f,i,a,c,n[h+8],20,1163531501),c=v(c,f,i,a,n[h+13],5,-1444681467),a=v(a,c,f,i,n[h+2],9,-51403784),i=v(i,a,c,f,n[h+7],14,1735328473),c=g(c,f=v(f,i,a,c,n[h+12],20,-1926607734),i,a,n[h+5],4,-378558),a=g(a,c,f,i,n[h+8],11,-2022574463),i=g(i,a,c,f,n[h+11],16,1839030562),f=g(f,i,a,c,n[h+14],23,-35309556),c=g(c,f,i,a,n[h+1],4,-1530992060),a=g(a,c,f,i,n[h+4],11,1272893353),i=g(i,a,c,f,n[h+7],16,-155497632),f=g(f,i,a,c,n[h+10],23,-1094730640),c=g(c,f,i,a,n[h+13],4,681279174),a=g(a,c,f,i,n[h],11,-358537222),i=g(i,a,c,f,n[h+3],16,-722521979),f=g(f,i,a,c,n[h+6],23,76029189),c=g(c,f,i,a,n[h+9],4,-640364487),a=g(a,c,f,i,n[h+12],11,-421815835),i=g(i,a,c,f,n[h+15],16,530742520),c=m(c,f=g(f,i,a,c,n[h+2],23,-995338651),i,a,n[h],6,-198630844),a=m(a,c,f,i,n[h+7],10,1126891415),i=m(i,a,c,f,n[h+14],15,-1416354905),f=m(f,i,a,c,n[h+5],21,-57434055),c=m(c,f,i,a,n[h+12],6,1700485571),a=m(a,c,f,i,n[h+3],10,-1894986606),i=m(i,a,c,f,n[h+10],15,-1051523),f=m(f,i,a,c,n[h+1],21,-2054922799),c=m(c,f,i,a,n[h+8],6,1873313359),a=m(a,c,f,i,n[h+15],10,-30611744),i=m(i,a,c,f,n[h+6],15,-1560198380),f=m(f,i,a,c,n[h+13],21,1309151649),c=m(c,f,i,a,n[h+4],6,-145523070),a=m(a,c,f,i,n[h+11],10,-1120210379),i=m(i,a,c,f,n[h+2],15,718787259),f=m(f,i,a,c,n[h+9],21,-343485551),c=d(c,r),f=d(f,e),i=d(i,o),a=d(a,u);return[c,f,i,a]}function a(n){for(var t="",r=32*n.length,e=0;e<r;e+=8)t+=String.fromCharCode(n[e>>5]>>>e%32&255);return t}function h(n){var t=[];for(t[(n.length>>2)-1]=void 0,e=0;e<t.length;e+=1)t[e]=0;for(var r=8*n.length,e=0;e<r;e+=8)t[e>>5]|=(255&n.charCodeAt(e/8))<<e%32;return t}function e(n){for(var t,r="0123456789abcdef",e="",o=0;o<n.length;o+=1)t=n.charCodeAt(o),e+=r.charAt(t>>>4&15)+r.charAt(15&t);return e}function r(n){return unescape(encodeURIComponent(n))}function o(n){return a(i(h(t=r(n)),8*t.length));var t}function u(n,t){return function(n,t){var r,e,o=h(n),u=[],c=[];for(u[15]=c[15]=void 0,16<o.length&&(o=i(o,8*n.length)),r=0;r<16;r+=1)u[r]=909522486^o[r],c[r]=1549556828^o[r];return e=i(u.concat(h(t)),512+8*t.length),a(i(c.concat(e),640))}(r(n),r(t))}function t(n,t,r){return t?r?u(t,n):e(u(t,n)):r?o(n):e(o(n))}"function"==typeof define&&define.amd?define(function(){return t}):"object"==typeof module&&module.exports?module.exports=t:n.md5=t}(this);</script><script>window.AbTest = (function() { return { 'ab_test': (uniqueId, test_name, buckets) => { let override = new URLSearchParams(window.location.search).get(`ab_test[${test_name}]`); if ( override ) { return override; } const bucketNames = buckets.map((bucket) => { return typeof bucket === 'string' ? bucket : Object.keys(bucket)[0]; }); const weights = buckets.map((bucket) => { return typeof bucket === 'string' ? 1 : Object.values(bucket)[0]; }); const total = weights.reduce((sum, weight) => sum + weight); const hash = md5(`${uniqueId}${test_name}`); const hashNum = parseInt(hash.slice(-12), 16); let bucketPoint = total * (hashNum % 100000) / 100000; const bucket = bucketNames.find((_, i) => { if (weights[i] > bucketPoint) { return true; } bucketPoint -= weights[i]; return false; }); return bucket; } }; })();</script><div data-auto_select="false" data-client_id="331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b" data-landing_url="https://www.academia.edu/Documents/in/Surveillance_Studies" data-login_uri="https://www.academia.edu/registrations/google_one_tap" data-moment_callback="onGoogleOneTapEvent" id="g_id_onload"></div><script>function onGoogleOneTapEvent(event) { var momentType = event.getMomentType(); var momentReason = null; if (event.isNotDisplayed()) { momentReason = event.getNotDisplayedReason(); } else if (event.isSkippedMoment()) { momentReason = event.getSkippedReason(); } else if (event.isDismissedMoment()) { momentReason = event.getDismissedReason(); } Aedu.arbitraryEvents.write('GoogleOneTapEvent', { moment_type: momentType, moment_reason: momentReason, }); }</script><script>(function() { var auvid = unescape( document.cookie .split(/; ?/) .find((s) => s.startsWith('auvid')) .substring(6)); var bucket = AbTest.ab_test(auvid, 'lo_ri_one_tap_google_sign_on', ['control', 'one_tap_google_sign_on']); if (bucket === 'control') return; var oneTapTag = document.createElement('script') oneTapTag.async = true oneTapTag.defer = true oneTapTag.src = 'https://accounts.google.com/gsi/client' document.body.appendChild(oneTapTag) })();</script></div></div></div> </div> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">×</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; } .sign-in-with-apple-button > div { margin: 0 auto; / This centers the Apple-rendered button horizontally }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span ="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "7afbb07510121849f6c6e8b86a9145baea72c60a12f4738e6bf3869d2be6058e", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="e495EEs4hwJKNlQs9nHZ_LHSNMofllOyP2R-fMTMsTNjFXWm2Xegtl-M1F4QMdntbIehnf0aEJRFNWVDTJoyrg" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://www.academia.edu/Documents/in/Surveillance_Studies" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="VLAB0T1g-Z7M6jVDYk9APQUyZHHxBQ6DT9IE8bJVOM9MKg1nry_eKtlQtTGED0As2GfxJhOJTaU1gx_OOgO7Ug" autocomplete="off" /><p>Enter the email address you signed up with and we'll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><script src="https://recaptcha.net/recaptcha/api.js" async defer></script> <script> var invisibleRecaptchaSubmit = function () { var closestForm = function (ele) { var curEle = ele.parentNode; while (curEle.nodeName !== 'FORM' && curEle.nodeName !== 'BODY'){ curEle = curEle.parentNode; } return curEle.nodeName === 'FORM' ? curEle : null }; var eles = document.getElementsByClassName('g-recaptcha'); if (eles.length > 0) { var form = closestForm(eles[0]); if (form) { form.submit(); } } }; </script> <input type="submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" data-callback="invisibleRecaptchaSubmit" class="g-recaptcha btn btn-primary btn-block" value="Email me a link" value=""/> </form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account? <a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div class="bootstrap" id="footer"><div class="footer-content clearfix text-center padding-top-7x" style="width:100%;"><ul class="footer-links-secondary footer-links-wide list-inline margin-bottom-1x"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/journals">Academia.edu Journals</a></li><li><a rel="nofollow" href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg> <strong>We're Hiring!</strong></a></li><li><a rel="nofollow" href="https://support.academia.edu/hc/en-us"><svg style="width: 12px; height: 12px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg> <strong>Help Center</strong></a></li></ul><ul class="footer-links-tertiary list-inline margin-bottom-1x"><li class="small">Find new research papers in:</li><li class="small"><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul></div></div><div class="DesignSystem" id="credit" style="width:100%;"><ul class="u-pl0x footer-links-legal list-inline"><li><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia ©2025</li></ul></div><script> //<![CDATA[ window.detect_gmtoffset = true; window.Academia && window.Academia.set_gmtoffset && Academia.set_gmtoffset('/gmtoffset'); //]]> </script> <div id='overlay_background'></div> <div id='bootstrap-modal-container' class='bootstrap'></div> <div id='ds-modal-container' class='bootstrap DesignSystem'></div> <div id='full-screen-modal'></div> </div> </body> </html>