Julian E. Zelizer
- Published in print:
- 2012
- Published Online:
- October 2017
- ISBN:
- 9780691150734
- eISBN:
- 9781400841899
- Item type:
- chapter
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691150734.003.0016
- Subject:
- History, American History: early to 18th Century
This chapter examines the politics of U.S. troop withdrawal from Vietnam during the 1960s and 1970s in order to identify the strategies employed by Congress to check an imperial executive and to ...
More
This chapter examines the politics of U.S. troop withdrawal from Vietnam during the 1960s and 1970s in order to identify the strategies employed by Congress to check an imperial executive and to regain its constitutional prerogatives. When the Vietnam War escalated in 1964 and 1965, most policymakers, including Lyndon Johnson, were very sensitive to the role Congress might play in its evolution. During this period, Congress challenged presidential decisions and helped to create the political pressure that led to a drawdown in American troops fighting the war. The chapter first considers how Senator William Fulbright brought the problems with the Vietnam War to the forefront of public debate before discussing the politics of troop withdrawal since the time of Johnson, with particular emphasis on Richard Nixon's Vietnamization and a range of legislative initiatives such as the War Powers Act (1973) and the Foreign Intelligence Surveillance Act (1978).Less
This chapter examines the politics of U.S. troop withdrawal from Vietnam during the 1960s and 1970s in order to identify the strategies employed by Congress to check an imperial executive and to regain its constitutional prerogatives. When the Vietnam War escalated in 1964 and 1965, most policymakers, including Lyndon Johnson, were very sensitive to the role Congress might play in its evolution. During this period, Congress challenged presidential decisions and helped to create the political pressure that led to a drawdown in American troops fighting the war. The chapter first considers how Senator William Fulbright brought the problems with the Vietnam War to the forefront of public debate before discussing the politics of troop withdrawal since the time of Johnson, with particular emphasis on Richard Nixon's Vietnamization and a range of legislative initiatives such as the War Powers Act (1973) and the Foreign Intelligence Surveillance Act (1978).
James B. Rule
- Published in print:
- 2009
- Published Online:
- May 2012
- ISBN:
- 9780195307832
- eISBN:
- 9780199944040
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195307832.003.0002
- Subject:
- Sociology, Law, Crime and Deviance
This chapter discusses government surveillance. It emphasizes that whatever governments can do for their populations, they can also do against them. One good example is using surveillance systems as ...
More
This chapter discusses government surveillance. It emphasizes that whatever governments can do for their populations, they can also do against them. One good example is using surveillance systems as instruments of oppression. From here, the discussion shifts to government surveillance in America, Australia, France, Canada, and Great Britain. It then looks at the coalescence of government surveillance. The chapter also introduces the Patriot Act and the Foreign Intelligence Surveillance Act of 1978 (FISA).Less
This chapter discusses government surveillance. It emphasizes that whatever governments can do for their populations, they can also do against them. One good example is using surveillance systems as instruments of oppression. From here, the discussion shifts to government surveillance in America, Australia, France, Canada, and Great Britain. It then looks at the coalescence of government surveillance. The chapter also introduces the Patriot Act and the Foreign Intelligence Surveillance Act of 1978 (FISA).
Wheeler Winston Dickson
- Published in print:
- 2013
- Published Online:
- September 2013
- ISBN:
- 9780813142173
- eISBN:
- 9780813142555
- Item type:
- book
- Publisher:
- University Press of Kentucky
- DOI:
- 10.5810/kentucky/9780813142173.001.0001
- Subject:
- Film, Television and Radio, Film
Streaming: Movies, Media and Instant Access is distinctive and commercially viable because it examines the most crucial area in moving image studies today; the way that the image is captured, ...
More
Streaming: Movies, Media and Instant Access is distinctive and commercially viable because it examines the most crucial area in moving image studies today; the way that the image is captured, disseminated, and consumed by contemporary audiences, and the manner in which this process, or series of processes, is constantly being revised. Readers will gain from the book a better understanding of the enormous shift that this switch to digital will make in the habits of viewers, who can now see films on everything from cell phones to conventional theatre screens. Streaming: Movies, Media and Instant Access will chart the ways in which the Hollywood model of embracing digital production is spreading around the world, while still maintaining an almost monolithic grip on the international market. Streaming: Movies, Media and Instant Access will thus focus on Hollywood production, as the model that still informs international film production in both a genre and star-based model, but show how this model is now spreading throughout the planet. In addition, Streaming: Movies, Media and Instant Access will examine how the new digital world impacts how we access music, books, and also how digital culture, through surveillance devices and facial recognition systems, documents every facet of our everyday life.Less
Streaming: Movies, Media and Instant Access is distinctive and commercially viable because it examines the most crucial area in moving image studies today; the way that the image is captured, disseminated, and consumed by contemporary audiences, and the manner in which this process, or series of processes, is constantly being revised. Readers will gain from the book a better understanding of the enormous shift that this switch to digital will make in the habits of viewers, who can now see films on everything from cell phones to conventional theatre screens. Streaming: Movies, Media and Instant Access will chart the ways in which the Hollywood model of embracing digital production is spreading around the world, while still maintaining an almost monolithic grip on the international market. Streaming: Movies, Media and Instant Access will thus focus on Hollywood production, as the model that still informs international film production in both a genre and star-based model, but show how this model is now spreading throughout the planet. In addition, Streaming: Movies, Media and Instant Access will examine how the new digital world impacts how we access music, books, and also how digital culture, through surveillance devices and facial recognition systems, documents every facet of our everyday life.
Finn Brunton and Helen Nissenbaum
- Published in print:
- 2015
- Published Online:
- September 2016
- ISBN:
- 9780262029735
- eISBN:
- 9780262331319
- Item type:
- book
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262029735.001.0001
- Subject:
- Information Science, Information Science
This is a book about obfuscation: the production of noise modeled on an existing signal in order to make a collection of data more ambiguous, confusing, harder to exploit, more difficult to act on, ...
More
This is a book about obfuscation: the production of noise modeled on an existing signal in order to make a collection of data more ambiguous, confusing, harder to exploit, more difficult to act on, and therefore less valuable. It is a tool for defending and expanding digital privacy against data surveillance, and protesting the unjust collection or misuse of data. The authors provide strategies and an argument for evasion, noncompliance, refusal, even sabotage, particularly for average users not in a position to opt out or exert control over data about themselves. Obfuscation also has applications for groups -- from software developers to policymakers -- who want to collect and apply data without the possibility of its future misuse. The book offers many examples, case histories, and arguments about the nature, function, and promise of obfuscation: why it is necessary, whether it is justified, how it works, and how it can be integrated with other privacy practices and technologies.Less
This is a book about obfuscation: the production of noise modeled on an existing signal in order to make a collection of data more ambiguous, confusing, harder to exploit, more difficult to act on, and therefore less valuable. It is a tool for defending and expanding digital privacy against data surveillance, and protesting the unjust collection or misuse of data. The authors provide strategies and an argument for evasion, noncompliance, refusal, even sabotage, particularly for average users not in a position to opt out or exert control over data about themselves. Obfuscation also has applications for groups -- from software developers to policymakers -- who want to collect and apply data without the possibility of its future misuse. The book offers many examples, case histories, and arguments about the nature, function, and promise of obfuscation: why it is necessary, whether it is justified, how it works, and how it can be integrated with other privacy practices and technologies.
James Schwoch
- Published in print:
- 2018
- Published Online:
- September 2018
- ISBN:
- 9780252041778
- eISBN:
- 9780252050459
- Item type:
- book
- Publisher:
- University of Illinois Press
- DOI:
- 10.5622/illinois/9780252041778.001.0001
- Subject:
- History, American History: 19th Century
This book is a study of the telegraph in western North America, concentrating on the latter half of the nineteenth century. A number of distinguished books and articles have been written about the ...
More
This book is a study of the telegraph in western North America, concentrating on the latter half of the nineteenth century. A number of distinguished books and articles have been written about the telegraph and the nineteenth-century American experience. For the most part, however, this scholarly work is geographically partial. The standard histories of the American telegraph are stories of the East Coast and the Atlantic Seaboard, the growing Midwest, and service to urban areas. This book looks toward the West. The narrative includes landscapes and ecosystems, meteorology, surveillance, and containment and conflict with Native Americans. Major themes include the high ground, the signal flow, the state secret, and the secure command. Opening with discussion of the first attempts to bring the telegraph to the Trans-Mississippi West, the book concludes with the consolidation of the secure command of electronic communication networks in the White House during the Spanish-American War, detailing the transformation of electronic communication networks from continentalism to globalism. The terrain of the narrative incudes the Great Plains, the Southwest, the Pacific Coast, the Rocky Mountains, the border with Mexico, and the subarctic and arctic areas of North America. This book presents an interpretive approach that centers on environmental, climatological, military, and surveillance issues as key factors in the history of electronic communication networks.Less
This book is a study of the telegraph in western North America, concentrating on the latter half of the nineteenth century. A number of distinguished books and articles have been written about the telegraph and the nineteenth-century American experience. For the most part, however, this scholarly work is geographically partial. The standard histories of the American telegraph are stories of the East Coast and the Atlantic Seaboard, the growing Midwest, and service to urban areas. This book looks toward the West. The narrative includes landscapes and ecosystems, meteorology, surveillance, and containment and conflict with Native Americans. Major themes include the high ground, the signal flow, the state secret, and the secure command. Opening with discussion of the first attempts to bring the telegraph to the Trans-Mississippi West, the book concludes with the consolidation of the secure command of electronic communication networks in the White House during the Spanish-American War, detailing the transformation of electronic communication networks from continentalism to globalism. The terrain of the narrative incudes the Great Plains, the Southwest, the Pacific Coast, the Rocky Mountains, the border with Mexico, and the subarctic and arctic areas of North America. This book presents an interpretive approach that centers on environmental, climatological, military, and surveillance issues as key factors in the history of electronic communication networks.
Steven M. Teutsch
- Published in print:
- 2010
- Published Online:
- September 2010
- ISBN:
- 9780195372922
- eISBN:
- 9780199866090
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195372922.003.0002
- Subject:
- Public Health and Epidemiology, Public Health
This chapter sets the stage for the first half of the book, the principles section. It outlines possible objectives of a system, followed by key steps in system development, data collection, data ...
More
This chapter sets the stage for the first half of the book, the principles section. It outlines possible objectives of a system, followed by key steps in system development, data collection, data management, analyzing and interpreting data, disseminating and communicating information, and evaluating the surveillance system. Each step requires attention to a number of important details, which are introduced and addressed in detail throughout the first section of the book. Application of the principles is illustrated through an example using the National Notifiable Diseases Surveillance System in the United States.Less
This chapter sets the stage for the first half of the book, the principles section. It outlines possible objectives of a system, followed by key steps in system development, data collection, data management, analyzing and interpreting data, disseminating and communicating information, and evaluating the surveillance system. Each step requires attention to a number of important details, which are introduced and addressed in detail throughout the first section of the book. Application of the principles is illustrated through an example using the National Notifiable Diseases Surveillance System in the United States.
Matthew Lockwood
- Published in print:
- 2017
- Published Online:
- January 2018
- ISBN:
- 9780300217063
- eISBN:
- 9780300227864
- Item type:
- book
- Publisher:
- Yale University Press
- DOI:
- 10.12987/yale/9780300217063.001.0001
- Subject:
- History, British and Irish Modern History
The Conquest of Death considers the concepts of violence and state power far more broadly and holistically than previous accounts of state growth by intertwining the national and the local, the ...
More
The Conquest of Death considers the concepts of violence and state power far more broadly and holistically than previous accounts of state growth by intertwining the national and the local, the formal and the informal to illustrate how the management of incidental acts of violence and justice was as important to the monopolization of violence as the creation of the machinery of warfare. It reveals how the creation and operation of everyday bureaucracy built systems of power far exceeding its original intent and allowed a greater centralized surveillance of daily life than ever before. In sum, this book forces us to think about state formation not in terms of the broad strokes of legislative policy and international competition, but rather as a process built by multiple tiny actions, interactions and encroachments which fundamentally redefined the nature of the state and the relationship between government and governed. The Conquest of Death thus provides a new approach to the history of state formation, the history of criminal justice and the history of violence in early modern England. By locating the creation of an effective, permanent monopoly of violence in England in the second-half of the sixteenth century, this book also provides a new chronology of the divide between medieval and modern while divorcing the history of state growth from a linear history of centralization.Less
The Conquest of Death considers the concepts of violence and state power far more broadly and holistically than previous accounts of state growth by intertwining the national and the local, the formal and the informal to illustrate how the management of incidental acts of violence and justice was as important to the monopolization of violence as the creation of the machinery of warfare. It reveals how the creation and operation of everyday bureaucracy built systems of power far exceeding its original intent and allowed a greater centralized surveillance of daily life than ever before. In sum, this book forces us to think about state formation not in terms of the broad strokes of legislative policy and international competition, but rather as a process built by multiple tiny actions, interactions and encroachments which fundamentally redefined the nature of the state and the relationship between government and governed. The Conquest of Death thus provides a new approach to the history of state formation, the history of criminal justice and the history of violence in early modern England. By locating the creation of an effective, permanent monopoly of violence in England in the second-half of the sixteenth century, this book also provides a new chronology of the divide between medieval and modern while divorcing the history of state growth from a linear history of centralization.
Peter Marks
- Published in print:
- 2015
- Published Online:
- September 2017
- ISBN:
- 9781474400190
- eISBN:
- 9781474412339
- Item type:
- book
- Publisher:
- Edinburgh University Press
- DOI:
- 10.3366/edinburgh/9781474400190.001.0001
- Subject:
- Literature, Criticism/Theory
Imagining Surveillance provides the first extensive and intensive study of surveillance as depicted and assessed in literature and film. Focusing on the utopian genre (which includes positive ...
More
Imagining Surveillance provides the first extensive and intensive study of surveillance as depicted and assessed in literature and film. Focusing on the utopian genre (which includes positive eutopias and negative dystopias), this book offers an in-depth account of how creative writers, filmmakers and thinkers have envisioned other worlds in which surveillance operates, for good and ill. It explores how surveillance scholars have utilized these fictional works in understanding the myriad implications of surveillance in the contemporary world. From Thomas More’s Utopia to recent novels and films such as Dave Eggers’ The Circle and Spike Jonze’s Her, Imagining Surveillance traces the long history of surveillance in imaginative texts well before and after George Orwell’s iconic Nineteen Eighty-Four. The book argues that creative texts have long offered subtle, complex and provocative readings of surveillance that investigate the human dimension of this fast-developing, at times invisible, and undoubtedly transformative element of twenty-first century life. Novels and films supply scenarios and narratives that prompt readers and viewers to consider the personal, ethical, social and political questions proliferating surveillance raises. With chapters on the relationships between surveillance and visibility, spaces, identities, technologies, and the shape of things to come, Imagining Surveillance establishes itself at the leading edge of the emerging cultural studies of surveillance.Less
Imagining Surveillance provides the first extensive and intensive study of surveillance as depicted and assessed in literature and film. Focusing on the utopian genre (which includes positive eutopias and negative dystopias), this book offers an in-depth account of how creative writers, filmmakers and thinkers have envisioned other worlds in which surveillance operates, for good and ill. It explores how surveillance scholars have utilized these fictional works in understanding the myriad implications of surveillance in the contemporary world. From Thomas More’s Utopia to recent novels and films such as Dave Eggers’ The Circle and Spike Jonze’s Her, Imagining Surveillance traces the long history of surveillance in imaginative texts well before and after George Orwell’s iconic Nineteen Eighty-Four. The book argues that creative texts have long offered subtle, complex and provocative readings of surveillance that investigate the human dimension of this fast-developing, at times invisible, and undoubtedly transformative element of twenty-first century life. Novels and films supply scenarios and narratives that prompt readers and viewers to consider the personal, ethical, social and political questions proliferating surveillance raises. With chapters on the relationships between surveillance and visibility, spaces, identities, technologies, and the shape of things to come, Imagining Surveillance establishes itself at the leading edge of the emerging cultural studies of surveillance.
Ian G. R. Shaw
- Published in print:
- 2016
- Published Online:
- May 2017
- ISBN:
- 9780816694730
- eISBN:
- 9781452955339
- Item type:
- book
- Publisher:
- University of Minnesota Press
- DOI:
- 10.5749/minnesota/9780816694730.001.0001
- Subject:
- Political Science, Conflict Politics and Policy
This book explores the rise of the Predator Empire, the name for the contemporary “dronified” U.S. national security state. Moving from the Vietnam War to the “war on terror,” it investigates how ...
More
This book explores the rise of the Predator Empire, the name for the contemporary “dronified” U.S. national security state. Moving from the Vietnam War to the “war on terror,” it investigates how changes in military strategy, domestic policing, and state surveillance have come together to enclose the planet in a robotic system of control. It argues that we are witnessing a transition from a labor-intensive “American empire” to a machine-intensive Predator Empire. Following philosophers such as Hannah Arendt and Peter Sloterdijk, the book argues that the nonhuman environment directly influences who we are, and therefore goes beyond considering drone warfare as a purely military concern. The rise of drones present a series of “existential crises” that are reengineering the spaces of violence, domestic policing, and even the character of modern states.Less
This book explores the rise of the Predator Empire, the name for the contemporary “dronified” U.S. national security state. Moving from the Vietnam War to the “war on terror,” it investigates how changes in military strategy, domestic policing, and state surveillance have come together to enclose the planet in a robotic system of control. It argues that we are witnessing a transition from a labor-intensive “American empire” to a machine-intensive Predator Empire. Following philosophers such as Hannah Arendt and Peter Sloterdijk, the book argues that the nonhuman environment directly influences who we are, and therefore goes beyond considering drone warfare as a purely military concern. The rise of drones present a series of “existential crises” that are reengineering the spaces of violence, domestic policing, and even the character of modern states.
Denise Koo, Phyllis A. Wingo, and Charles J. Rothwell
- Published in print:
- 2005
- Published Online:
- September 2009
- ISBN:
- 9780195149289
- eISBN:
- 9780199865130
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195149289.003.0004
- Subject:
- Public Health and Epidemiology, Public Health, Epidemiology
This chapter describes two types of data collection that are critical for monitoring the population's health and generating health statistics: notifications and registrations. Notifications are ...
More
This chapter describes two types of data collection that are critical for monitoring the population's health and generating health statistics: notifications and registrations. Notifications are reports of one or more health-related events that typically require close monitoring by health or other agencies to ensure that they are controlled and do not spread to, or adversely affect, others. Registrations are similar to notifications in that a specific event is the subject of a registration system, but the registration of events is not usually for the immediate control of a specific health problem or hazardous condition. Rather, it is for documenting and tracking events or persons for administrative, legal (e.g., registration of births and marriages), scientific (e.g., to facilitate the identification of a cohort exposed to a hazardous substance for future study), or statistical purposes. The first part of the chapter provides a brief overview of notifications and a detailed description of one notification system—the U.S. National Notifiable Disease Surveillance System—to illustrate the history, practice, and uses of one important example of these systems. The second part of the chapter provides a brief overview of registration systems and then presents detailed descriptions of two registration systems—the U.S. national vital statistics system and the U.S. system of cancer registries—to illustrate the history, practice, and use of registration systems.Less
This chapter describes two types of data collection that are critical for monitoring the population's health and generating health statistics: notifications and registrations. Notifications are reports of one or more health-related events that typically require close monitoring by health or other agencies to ensure that they are controlled and do not spread to, or adversely affect, others. Registrations are similar to notifications in that a specific event is the subject of a registration system, but the registration of events is not usually for the immediate control of a specific health problem or hazardous condition. Rather, it is for documenting and tracking events or persons for administrative, legal (e.g., registration of births and marriages), scientific (e.g., to facilitate the identification of a cohort exposed to a hazardous substance for future study), or statistical purposes. The first part of the chapter provides a brief overview of notifications and a detailed description of one notification system—the U.S. National Notifiable Disease Surveillance System—to illustrate the history, practice, and uses of one important example of these systems. The second part of the chapter provides a brief overview of registration systems and then presents detailed descriptions of two registration systems—the U.S. national vital statistics system and the U.S. system of cancer registries—to illustrate the history, practice, and use of registration systems.
Anita L. Allen
- Published in print:
- 2011
- Published Online:
- January 2012
- ISBN:
- 9780195141375
- eISBN:
- 9780199918126
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195141375.003.0007
- Subject:
- Philosophy, Feminist Philosophy, General
With recent US federal data-protection statutes in mind, along with the climate of indifference to privacy suggested by self-revelatory patterns of online conduct and high-tech personal archiving, ...
More
With recent US federal data-protection statutes in mind, along with the climate of indifference to privacy suggested by self-revelatory patterns of online conduct and high-tech personal archiving, this Chapter argues that liberals need to think about privacy in a new way. Privacy should be thought of as a partly inalienable, foundational good. Informational privacy meets deep needs, whose satisfaction cannot be left to pure, unregulated choice. The tendency and the willingness to throw away privacy are troubling. The value of privacy is not just the opportunity for optional privacy states, but the experience of privacy and the habits of respect for privacy it constitutes. Since the 1970’s when they first began to analyze privacy in earnest, philosophers have linked the experience of privacy with dignity, autonomy, civility and intimacy. They linked it also to repose, self-expression, creativity, reflection. They tied it to the preservation of unique preferences and distinct traditions. The argument that privacy is a right whose normative basis is respect for persons opens the door to the further argument that privacy is also potentially a d uty. To respect oneself may require taking into account the way in which one’s personality and life enterprises could be affected by decisions to dispense with foundational goods that are damaged when one decides to flaunt, expose, and share, rather than to reserve, conceal and keep. The idea that some forms of respecting privacy reflect what Robert Post (citing Erving Goffman and Jeffrey Reiman) called “civility norms” of deference and demeanour similar illuminate why privacy duties and privacy duties of self-care make sense. Helen Nissenbaum’s analysis of privacy by reference to norms of the appropriateness specific behaviours and the distribution of certain information in social and cultural context has similar implications. If people are completely morally and legally free to pick and choose the privacy states they will enter, they are potentially deprived of highly valued states that promote their and their fellows vital interests. We need to restrain choice, if not by law, then somehow. Respect for privacy rights and the ascription of privacy duties must both be a part of a society’s formative project for shaping citizens. Liberals agree that there is something wrong with being watched and investigate d all the time. As Daniel Solove argues, surveillance can lead to “self-censorship and inhibition". Surveillance is a form of social control. Like surveillance, dispensing with one’s privacy is yielding to social control, and that that impacts freedom, too. Realizing this, the notion that some privacy should not be optional, waivable, or alienable should have instant credibility. But the liberal ideal becomes an ironic joke in a society in which people freely choose to be always in others’ lines of sight, much as it is a joke in a society in which they freely chose domination.Less
With recent US federal data-protection statutes in mind, along with the climate of indifference to privacy suggested by self-revelatory patterns of online conduct and high-tech personal archiving, this Chapter argues that liberals need to think about privacy in a new way. Privacy should be thought of as a partly inalienable, foundational good. Informational privacy meets deep needs, whose satisfaction cannot be left to pure, unregulated choice. The tendency and the willingness to throw away privacy are troubling. The value of privacy is not just the opportunity for optional privacy states, but the experience of privacy and the habits of respect for privacy it constitutes. Since the 1970’s when they first began to analyze privacy in earnest, philosophers have linked the experience of privacy with dignity, autonomy, civility and intimacy. They linked it also to repose, self-expression, creativity, reflection. They tied it to the preservation of unique preferences and distinct traditions. The argument that privacy is a right whose normative basis is respect for persons opens the door to the further argument that privacy is also potentially a d uty. To respect oneself may require taking into account the way in which one’s personality and life enterprises could be affected by decisions to dispense with foundational goods that are damaged when one decides to flaunt, expose, and share, rather than to reserve, conceal and keep. The idea that some forms of respecting privacy reflect what Robert Post (citing Erving Goffman and Jeffrey Reiman) called “civility norms” of deference and demeanour similar illuminate why privacy duties and privacy duties of self-care make sense. Helen Nissenbaum’s analysis of privacy by reference to norms of the appropriateness specific behaviours and the distribution of certain information in social and cultural context has similar implications. If people are completely morally and legally free to pick and choose the privacy states they will enter, they are potentially deprived of highly valued states that promote their and their fellows vital interests. We need to restrain choice, if not by law, then somehow. Respect for privacy rights and the ascription of privacy duties must both be a part of a society’s formative project for shaping citizens. Liberals agree that there is something wrong with being watched and investigate d all the time. As Daniel Solove argues, surveillance can lead to “self-censorship and inhibition". Surveillance is a form of social control. Like surveillance, dispensing with one’s privacy is yielding to social control, and that that impacts freedom, too. Realizing this, the notion that some privacy should not be optional, waivable, or alienable should have instant credibility. But the liberal ideal becomes an ironic joke in a society in which people freely choose to be always in others’ lines of sight, much as it is a joke in a society in which they freely chose domination.
Alex Belsey and Alex Belsey
- Published in print:
- 2020
- Published Online:
- September 2020
- ISBN:
- 9781789620290
- eISBN:
- 9781789623574
- Item type:
- chapter
- Publisher:
- Liverpool University Press
- DOI:
- 10.3828/liverpool/9781789620290.003.0004
- Subject:
- Literature, 20th-century and Contemporary Literature
This chapter analyses how, in his wartime journal-writing, Keith Vaughan articulated the social differences and exclusions that he believed were preventing him from fully participating in British ...
More
This chapter analyses how, in his wartime journal-writing, Keith Vaughan articulated the social differences and exclusions that he believed were preventing him from fully participating in British society. In his accounts of failing to connect with those around him, he romanticized his failures and dramatized his distance from others, thereby justifying his exclusion and ultimately ascribing himself the powerful (if lonely) role of observer – a position from which he could assert superiority over his fellow C.O.s and men of lower social class whilst representing them in his sketches, paintings, and bathing pictures. The first section of this chapter considers how Vaughan used the early volumes of his journal to record his difficulties in making contact with his fellow man and reinforce them through self-dramatization. The second section explores the strategies employed by Vaughan to emphasize his difference from other individuals and groups, particularly around his homosexuality and artistic inclinations, and therefore justify and maintain his distance from them. The third section argues that Vaughan constructed an empowering role that made use of his remove from male society: that of the observer, enabling him to laud his own powers of perception whilst evading the problems of social involvement and possible surveillance.Less
This chapter analyses how, in his wartime journal-writing, Keith Vaughan articulated the social differences and exclusions that he believed were preventing him from fully participating in British society. In his accounts of failing to connect with those around him, he romanticized his failures and dramatized his distance from others, thereby justifying his exclusion and ultimately ascribing himself the powerful (if lonely) role of observer – a position from which he could assert superiority over his fellow C.O.s and men of lower social class whilst representing them in his sketches, paintings, and bathing pictures. The first section of this chapter considers how Vaughan used the early volumes of his journal to record his difficulties in making contact with his fellow man and reinforce them through self-dramatization. The second section explores the strategies employed by Vaughan to emphasize his difference from other individuals and groups, particularly around his homosexuality and artistic inclinations, and therefore justify and maintain his distance from them. The third section argues that Vaughan constructed an empowering role that made use of his remove from male society: that of the observer, enabling him to laud his own powers of perception whilst evading the problems of social involvement and possible surveillance.
Joseph W. Campbell
- Published in print:
- 2019
- Published Online:
- May 2020
- ISBN:
- 9781496824721
- eISBN:
- 9781496824776
- Item type:
- chapter
- Publisher:
- University Press of Mississippi
- DOI:
- 10.14325/mississippi/9781496824721.003.0002
- Subject:
- Literature, 20th-century and Contemporary Literature
Chapter 1 proposes a somewhat stitched-together set of theory to help create a tool to assist the reader in the exploration of dystopian works. The theory formed here creates a sort of lens through ...
More
Chapter 1 proposes a somewhat stitched-together set of theory to help create a tool to assist the reader in the exploration of dystopian works. The theory formed here creates a sort of lens through which someone studying dystopian literature in general, but specifically YA dystopian literature, can see how a fictional regime uses surveillance, then rhetorical moves at first, then brute physical power, to have control over the identification moves of an individual.Less
Chapter 1 proposes a somewhat stitched-together set of theory to help create a tool to assist the reader in the exploration of dystopian works. The theory formed here creates a sort of lens through which someone studying dystopian literature in general, but specifically YA dystopian literature, can see how a fictional regime uses surveillance, then rhetorical moves at first, then brute physical power, to have control over the identification moves of an individual.
Joseph W. Campbell
- Published in print:
- 2019
- Published Online:
- May 2020
- ISBN:
- 9781496824721
- eISBN:
- 9781496824776
- Item type:
- chapter
- Publisher:
- University Press of Mississippi
- DOI:
- 10.14325/mississippi/9781496824721.003.0004
- Subject:
- Literature, 20th-century and Contemporary Literature
Chapter 3 gives a history of the utopian/dystopian genre of works over time. This chapter also gives a sampling of theoretical approaches that have been used to study these texts. It specifically ...
More
Chapter 3 gives a history of the utopian/dystopian genre of works over time. This chapter also gives a sampling of theoretical approaches that have been used to study these texts. It specifically shows how the theoretical lens provided in chapter one regarding surveillance, power, subjectivity, and ideology, can be applied to these texts, and give specific examples via close readings of dystopian works intended for young adults.Less
Chapter 3 gives a history of the utopian/dystopian genre of works over time. This chapter also gives a sampling of theoretical approaches that have been used to study these texts. It specifically shows how the theoretical lens provided in chapter one regarding surveillance, power, subjectivity, and ideology, can be applied to these texts, and give specific examples via close readings of dystopian works intended for young adults.
Natasha Tusikov
- Published in print:
- 2016
- Published Online:
- September 2017
- ISBN:
- 9780520291218
- eISBN:
- 9780520965034
- Item type:
- chapter
- Publisher:
- University of California Press
- DOI:
- 10.1525/california/9780520291218.003.0007
- Subject:
- Society and Culture, Technology and Society
The conclusion argues that Internet firms and the U.S. government have common interests in expanding the surveillance economy, which refers to the massive online accumulation of information. It also ...
More
The conclusion argues that Internet firms and the U.S. government have common interests in expanding the surveillance economy, which refers to the massive online accumulation of information. It also considers measures to address the considerable challenges raised by the state-endorsed non-binding enforcement agreements. It explores ways in which states and corporations can use technology to regulate in ways that are fair, proportionate, and accountable. The chapter offers several recommendations. First is the need to cultivate greater public awareness of corporate regulation on the Internet. One way to do so is through industry transparency reports, in which corporate actors participating in the regulation disclose their involvement in regulation, a practice that has become more common following Edward Snowden’s disclosure of Internet firms’ involvement in the U.S. government’s Internet surveillance programs. The book ends with a call to establish digital rights and looks for inspiration to Brazil’s 2014 law, Marco Civil da Internet, which codified a set of digital rights.Less
The conclusion argues that Internet firms and the U.S. government have common interests in expanding the surveillance economy, which refers to the massive online accumulation of information. It also considers measures to address the considerable challenges raised by the state-endorsed non-binding enforcement agreements. It explores ways in which states and corporations can use technology to regulate in ways that are fair, proportionate, and accountable. The chapter offers several recommendations. First is the need to cultivate greater public awareness of corporate regulation on the Internet. One way to do so is through industry transparency reports, in which corporate actors participating in the regulation disclose their involvement in regulation, a practice that has become more common following Edward Snowden’s disclosure of Internet firms’ involvement in the U.S. government’s Internet surveillance programs. The book ends with a call to establish digital rights and looks for inspiration to Brazil’s 2014 law, Marco Civil da Internet, which codified a set of digital rights.
Yasmine Ramadan
- Published in print:
- 2019
- Published Online:
- May 2020
- ISBN:
- 9781474427647
- eISBN:
- 9781474476775
- Item type:
- chapter
- Publisher:
- Edinburgh University Press
- DOI:
- 10.3366/edinburgh/9781474427647.003.0002
- Subject:
- Society and Culture, Middle Eastern Studies
This chapter focuses on the representation of the urban space of Cairo. It examines Sonallah Ibrahim’s Tilka-l-raʾiha (TheSmell of it, 1966), Gamal al-Ghitani’s Waqaʾiʿ harat al-Zaʿfarani (The ...
More
This chapter focuses on the representation of the urban space of Cairo. It examines Sonallah Ibrahim’s Tilka-l-raʾiha (TheSmell of it, 1966), Gamal al-Ghitani’s Waqaʾiʿ harat al-Zaʿfarani (The Zafarani Files, 1976), Ibrahim Aslan’s Malik al-hazin (The Heron, 1981), and Radwa Ashour’s, Faraj (BlueLorries, 2008) reading the novels in opposition to the realist narratives of earlier decades. The shift away from the realist depictions of the urban metropolis as the site of national struggle, or of the alley as the cross-section of Egyptian society, is accompanied by a new representational aesthetics. Through the presentation of the city as the space of incarceration, the reimagination of the alley as a fantastic space, and the turn towards the previously ignored neighborhood of Imbaba, these writers showcase new literary techniques; aspects of magical realism; elements of the fantastic; a turn to hyper-realism, in order to represent the transformation of the urban space of Cairo into one of surveillance and control.Less
This chapter focuses on the representation of the urban space of Cairo. It examines Sonallah Ibrahim’s Tilka-l-raʾiha (TheSmell of it, 1966), Gamal al-Ghitani’s Waqaʾiʿ harat al-Zaʿfarani (The Zafarani Files, 1976), Ibrahim Aslan’s Malik al-hazin (The Heron, 1981), and Radwa Ashour’s, Faraj (BlueLorries, 2008) reading the novels in opposition to the realist narratives of earlier decades. The shift away from the realist depictions of the urban metropolis as the site of national struggle, or of the alley as the cross-section of Egyptian society, is accompanied by a new representational aesthetics. Through the presentation of the city as the space of incarceration, the reimagination of the alley as a fantastic space, and the turn towards the previously ignored neighborhood of Imbaba, these writers showcase new literary techniques; aspects of magical realism; elements of the fantastic; a turn to hyper-realism, in order to represent the transformation of the urban space of Cairo into one of surveillance and control.
Susan V. Donaldson
- Published in print:
- 2018
- Published Online:
- May 2019
- ISBN:
- 9781496814531
- eISBN:
- 9781496814579
- Item type:
- chapter
- Publisher:
- University Press of Mississippi
- DOI:
- 10.14325/mississippi/9781496814531.003.0006
- Subject:
- Literature, American, 20th Century Literature
This essay focuses on introducing students in an American Studies intensive writing freshman seminar on southern women writers to the cultural context of Eudora Welty’s first volume A Curtain of ...
More
This essay focuses on introducing students in an American Studies intensive writing freshman seminar on southern women writers to the cultural context of Eudora Welty’s first volume A Curtain of Green (1942) and its recurring motifs of confinement and rebellion. The course begins with a showing of the film Gone with the Wind and Harriet Jacobs’s slave narrative Incidents in the Life of a Slave Girl to introduce students to the cultural mythology of southern womanhood and its lasting impact upon American culture, from stereotypes of black and white womanhood reified in American culture by Hollywood to revisions and parodies produced by writers ranging from Zora Neale Hurston to Alice Randall and Eudora Welty herself. Hence the course situates Welty’s short stories within a tradition of southern black and white women writers critical of the region’s mythology of womanhood, the color line, and segregation’s hypervisual culture of surveillance.Less
This essay focuses on introducing students in an American Studies intensive writing freshman seminar on southern women writers to the cultural context of Eudora Welty’s first volume A Curtain of Green (1942) and its recurring motifs of confinement and rebellion. The course begins with a showing of the film Gone with the Wind and Harriet Jacobs’s slave narrative Incidents in the Life of a Slave Girl to introduce students to the cultural mythology of southern womanhood and its lasting impact upon American culture, from stereotypes of black and white womanhood reified in American culture by Hollywood to revisions and parodies produced by writers ranging from Zora Neale Hurston to Alice Randall and Eudora Welty herself. Hence the course situates Welty’s short stories within a tradition of southern black and white women writers critical of the region’s mythology of womanhood, the color line, and segregation’s hypervisual culture of surveillance.
Michael Sánchez Rydelski
- Published in print:
- 2004
- Published Online:
- March 2012
- ISBN:
- 9780199265329
- eISBN:
- 9780191699030
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199265329.003.0009
- Subject:
- Law, EU Law
This chapter addresses the State aid provisions of the European Economic Area (EEA) legal framework. It also explores the issues associated to State aid which are specific to the EEA agreement. It ...
More
This chapter addresses the State aid provisions of the European Economic Area (EEA) legal framework. It also explores the issues associated to State aid which are specific to the EEA agreement. It then discusses the tasks of the EFTA Surveillance Authority to control State aid and highlights the limits of the Authority's competence to evaluate State aid to certain sectors, such as fisheries, falling outside the scope of the EEA Agreement. Furthermore, it presents some examples of jurisprudence of the EFTA court in association to State aid cases. The Authority and the EFTA court have over the years assured that the State aid provisions of the EEA are homogenously employed and interpreted, making a level playing field for all economic operators in the EEA.Less
This chapter addresses the State aid provisions of the European Economic Area (EEA) legal framework. It also explores the issues associated to State aid which are specific to the EEA agreement. It then discusses the tasks of the EFTA Surveillance Authority to control State aid and highlights the limits of the Authority's competence to evaluate State aid to certain sectors, such as fisheries, falling outside the scope of the EEA Agreement. Furthermore, it presents some examples of jurisprudence of the EFTA court in association to State aid cases. The Authority and the EFTA court have over the years assured that the State aid provisions of the EEA are homogenously employed and interpreted, making a level playing field for all economic operators in the EEA.
Sun-ha Hong
- Published in print:
- 2020
- Published Online:
- January 2021
- ISBN:
- 9781479860234
- eISBN:
- 9781479855759
- Item type:
- book
- Publisher:
- NYU Press
- DOI:
- 10.18574/nyu/9781479860234.001.0001
- Subject:
- Society and Culture, Technology and Society
What counts as knowledge in the age of big data and smart machines? Technologies of datafication renew the long modern promise of turning bodies into facts. They seek to take human intentions, ...
More
What counts as knowledge in the age of big data and smart machines? Technologies of datafication renew the long modern promise of turning bodies into facts. They seek to take human intentions, emotions, and behavior and to turn these messy realities into discrete and stable truths. But in pursuing better knowledge, technology is reshaping in its image what counts as knowledge. The push for algorithmic certainty sets loose an expansive array of incomplete archives, speculative judgments, and simulated futures. Too often, data generates speculation as much as it does information. Technologies of Speculation traces this twisted symbiosis of knowledge and uncertainty in emerging state and self-surveillance technologies. It tells the story of vast dragnet systems constructed to predict the next terrorist and of how familiar forms of prejudice seep into the data by the back door. In software placeholders, such as “Mohammed Badguy,” the fantasy of pure data collides with the old specter of national purity. It shows how smart machines for ubiquitous, automated self-tracking, manufacturing knowledge, paradoxically lie beyond the human senses. This data is increasingly being taken up by employers, insurers, and courts of law, creating imperfect proxies through which my truth can be overruled. This book argues that as datafication transforms what counts as knowledge, it is dismantling the long-standing link between knowledge and human reason, rational publics, and free individuals. If data promises objective knowledge, then we must ask in return, Knowledge by and for whom; enabling what forms of life for the human subject?Less
What counts as knowledge in the age of big data and smart machines? Technologies of datafication renew the long modern promise of turning bodies into facts. They seek to take human intentions, emotions, and behavior and to turn these messy realities into discrete and stable truths. But in pursuing better knowledge, technology is reshaping in its image what counts as knowledge. The push for algorithmic certainty sets loose an expansive array of incomplete archives, speculative judgments, and simulated futures. Too often, data generates speculation as much as it does information. Technologies of Speculation traces this twisted symbiosis of knowledge and uncertainty in emerging state and self-surveillance technologies. It tells the story of vast dragnet systems constructed to predict the next terrorist and of how familiar forms of prejudice seep into the data by the back door. In software placeholders, such as “Mohammed Badguy,” the fantasy of pure data collides with the old specter of national purity. It shows how smart machines for ubiquitous, automated self-tracking, manufacturing knowledge, paradoxically lie beyond the human senses. This data is increasingly being taken up by employers, insurers, and courts of law, creating imperfect proxies through which my truth can be overruled. This book argues that as datafication transforms what counts as knowledge, it is dismantling the long-standing link between knowledge and human reason, rational publics, and free individuals. If data promises objective knowledge, then we must ask in return, Knowledge by and for whom; enabling what forms of life for the human subject?
Taylor Owen
- Published in print:
- 2015
- Published Online:
- August 2016
- ISBN:
- 9780199363865
- eISBN:
- 9780199363896
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199363865.001.0001
- Subject:
- Political Science, International Relations and Politics, Political Economy
Digital communication technologies have thrust the calculus of global political power into a period of unprecedented complexity. In every aspect of international affairs, digitally enabled actors are ...
More
Digital communication technologies have thrust the calculus of global political power into a period of unprecedented complexity. In every aspect of international affairs, digitally enabled actors are changing the way the world works, and disrupting the institutions that once held a monopoly on power. No area is immune: Humanitarianism, War, Diplomacy, Finance, Activism, or Journalism. In each, the government departments, international organizations and corporations who for a century were in charge, are being challenged by a new breed of international actor. Online, networked and decentralized, these new actors are innovating, for both good and ill, in the austere world of foreign policy. This book will bring these actors to light, explore their methods and tools, and demonstrate how they represent a new form of power. What is it that makes for successful digital international action? What are the tools being used by the actors increasingly controlling international affairs? How does their rise change the way we understand and act in the world? What are the negative consequences of a radically decentralized international system? And how can governments and corporations act to promote positive behaviour in a world of disruptive innovation? Disruptive Power explores the frontier of international affairs, profiles a wide range of emerging actors, and provides a road map for navigating a networked digital world. A world enabled by information technology, and led by disruptive innovators.Less
Digital communication technologies have thrust the calculus of global political power into a period of unprecedented complexity. In every aspect of international affairs, digitally enabled actors are changing the way the world works, and disrupting the institutions that once held a monopoly on power. No area is immune: Humanitarianism, War, Diplomacy, Finance, Activism, or Journalism. In each, the government departments, international organizations and corporations who for a century were in charge, are being challenged by a new breed of international actor. Online, networked and decentralized, these new actors are innovating, for both good and ill, in the austere world of foreign policy. This book will bring these actors to light, explore their methods and tools, and demonstrate how they represent a new form of power. What is it that makes for successful digital international action? What are the tools being used by the actors increasingly controlling international affairs? How does their rise change the way we understand and act in the world? What are the negative consequences of a radically decentralized international system? And how can governments and corporations act to promote positive behaviour in a world of disruptive innovation? Disruptive Power explores the frontier of international affairs, profiles a wide range of emerging actors, and provides a road map for navigating a networked digital world. A world enabled by information technology, and led by disruptive innovators.