Brandon C. Welsh and David P. Farrington
- Published in print:
- 2009
- Published Online:
- May 2012
- ISBN:
- 9780195326215
- eISBN:
- 9780199943999
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195326215.001.0001
- Subject:
- Sociology, Law, Crime and Deviance
The United Kingdom has more than 4.2 million public closed-circuit television (CCTV) cameras—one for every fourteen citizens. Across the United States, hundreds of video-surveillance systems are ...
More
The United Kingdom has more than 4.2 million public closed-circuit television (CCTV) cameras—one for every fourteen citizens. Across the United States, hundreds of video-surveillance systems are being installed in town centers, public transportation facilities, and schools at a cost exceeding $100 million annually, and now other Western countries have begun to experiment with CCTV to prevent crime in public places. In light of this expansion and the associated public expenditure, as well as pressing concerns about privacy rights, there is an acute need for an evidence-based approach to inform policy and practice. This book assesses the effectiveness and social costs of not only CCTV, but also other surveillance methods to prevent crime in public space, such as improved street lighting, security guards, place managers, and defensible space. It goes beyond the question of “Does it work?” and examines the specific conditions and contexts under which these methods may have an effect on crime as well as the mechanisms that bring about a reduction in crime. At a time when cities need cost-effective methods to fight crime and the public gradually awakens to the burdens of sacrificing their privacy and civil rights for security, the authors provide this guide to the most effective and non-invasive uses of surveillance to make public places safer from crime.Less
The United Kingdom has more than 4.2 million public closed-circuit television (CCTV) cameras—one for every fourteen citizens. Across the United States, hundreds of video-surveillance systems are being installed in town centers, public transportation facilities, and schools at a cost exceeding $100 million annually, and now other Western countries have begun to experiment with CCTV to prevent crime in public places. In light of this expansion and the associated public expenditure, as well as pressing concerns about privacy rights, there is an acute need for an evidence-based approach to inform policy and practice. This book assesses the effectiveness and social costs of not only CCTV, but also other surveillance methods to prevent crime in public space, such as improved street lighting, security guards, place managers, and defensible space. It goes beyond the question of “Does it work?” and examines the specific conditions and contexts under which these methods may have an effect on crime as well as the mechanisms that bring about a reduction in crime. At a time when cities need cost-effective methods to fight crime and the public gradually awakens to the burdens of sacrificing their privacy and civil rights for security, the authors provide this guide to the most effective and non-invasive uses of surveillance to make public places safer from crime.
James D. Savage
- Published in print:
- 2007
- Published Online:
- October 2011
- ISBN:
- 9780199238699
- eISBN:
- 9780191696770
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199238699.003.0007
- Subject:
- Political Science, European Union, Political Economy
This chapter considers the question of whether the Maastricht Treaty's surveillance process is sustainable despite member state noncompliant behaviour. The EU's answer to this question is one of ...
More
This chapter considers the question of whether the Maastricht Treaty's surveillance process is sustainable despite member state noncompliant behaviour. The EU's answer to this question is one of reaffirmation and accommodation. During the summer of 2004, two events occurred that significantly affect the Treaty's budgetary surveillance. First, on June 17 and 18, the EU Intergovernmental Council, consisting of the heads of government of the member states and acceding states, unanimously adopted the draft text of the new European Constitution, Europe's latest grand bargain. Second, a similar reaffirmation occurred on July 13, 2004, when the European Court of Justice issued its judgement upholding the EC's claim that the Council of Economic and Finance Ministers exceeded its authority in declaring the Maastricht Treaty's excessive deficit procedure in ‘abeyance’.Less
This chapter considers the question of whether the Maastricht Treaty's surveillance process is sustainable despite member state noncompliant behaviour. The EU's answer to this question is one of reaffirmation and accommodation. During the summer of 2004, two events occurred that significantly affect the Treaty's budgetary surveillance. First, on June 17 and 18, the EU Intergovernmental Council, consisting of the heads of government of the member states and acceding states, unanimously adopted the draft text of the new European Constitution, Europe's latest grand bargain. Second, a similar reaffirmation occurred on July 13, 2004, when the European Court of Justice issued its judgement upholding the EC's claim that the Council of Economic and Finance Ministers exceeded its authority in declaring the Maastricht Treaty's excessive deficit procedure in ‘abeyance’.
Jerome L. Stein
- Published in print:
- 2006
- Published Online:
- May 2006
- ISBN:
- 9780199280575
- eISBN:
- 9780191603501
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/0199280576.003.0007
- Subject:
- Economics and Finance, Financial Economics
Early Warning Signals of a default or debt crisis are derived by drawing upon the stochastic optimal control model of an optimal and excessive short-term debt developed in chapter 2. Operational ...
More
Early Warning Signals of a default or debt crisis are derived by drawing upon the stochastic optimal control model of an optimal and excessive short-term debt developed in chapter 2. Operational benchmarks for optimal foreign debt and a quantitative measure of the maximum debt which will not be defaulted in the event of adverse shocks are established. Insofar as the actual debt exceeds the benchmark, there is an excess debt, the risk of default is increased. Two sets of emerging market countries are considered: one set renegotiated/defaulted and the other set did not. The countries that defaulted/renegotiated had significant excess debt, whereas the countries that did not default/renegotiate did not have significant excess debt. An Early Warning Signal of a debt crisis is the excess debt, and not the level of the debt/GDP ratio per se.Less
Early Warning Signals of a default or debt crisis are derived by drawing upon the stochastic optimal control model of an optimal and excessive short-term debt developed in chapter 2. Operational benchmarks for optimal foreign debt and a quantitative measure of the maximum debt which will not be defaulted in the event of adverse shocks are established. Insofar as the actual debt exceeds the benchmark, there is an excess debt, the risk of default is increased. Two sets of emerging market countries are considered: one set renegotiated/defaulted and the other set did not. The countries that defaulted/renegotiated had significant excess debt, whereas the countries that did not default/renegotiate did not have significant excess debt. An Early Warning Signal of a debt crisis is the excess debt, and not the level of the debt/GDP ratio per se.
William J. Maxwell
- Published in print:
- 2015
- Published Online:
- October 2017
- ISBN:
- 9780691130200
- eISBN:
- 9781400852062
- Item type:
- book
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691130200.001.0001
- Subject:
- Literature, Criticism/Theory
Few institutions seem more opposed than African American literature and J. Edgar Hoover's Federal Bureau of Investigation (FBI). But behind the scenes, the FBI's hostility to black protest was ...
More
Few institutions seem more opposed than African American literature and J. Edgar Hoover's Federal Bureau of Investigation (FBI). But behind the scenes, the FBI's hostility to black protest was energized by fear of and respect for black writing. Drawing on nearly 14,000 pages of newly released FBI files, this book exposes the Bureau's intimate policing of five decades of African American poems, plays, essays, and novels. Starting in 1919, year one of Harlem's renaissance and Hoover's career at the Bureau, secretive FBI “ghostreaders” monitored the latest developments in African American letters. By the time of Hoover's death in 1972, these ghostreaders knew enough to simulate a sinister black literature of their own. The official aim behind the Bureau 's close reading was to anticipate political unrest. Yet, as this book reveals, FBI surveillance came to influence the creation and public reception of African American literature in the heart of the twentieth century. This book details how the FBI threatened the international travels of African American writers and prepared to jail dozens of them in times of national emergency. All the same, it shows that the Bureau's paranoid style could prompt insightful criticism from Hoover's ghostreaders and creative replies from their literary targets. For authors such as Claude McKay, James Baldwin, and Sonia Sanchez, the suspicion that government spy-critics tracked their every word inspired rewarding stylistic experiments as well as disabling self-censorship. Illuminating both the serious harms of state surveillance and the ways in which imaginative writing can withstand and exploit it, this book is a groundbreaking account of a long-hidden dimension of African American literature.Less
Few institutions seem more opposed than African American literature and J. Edgar Hoover's Federal Bureau of Investigation (FBI). But behind the scenes, the FBI's hostility to black protest was energized by fear of and respect for black writing. Drawing on nearly 14,000 pages of newly released FBI files, this book exposes the Bureau's intimate policing of five decades of African American poems, plays, essays, and novels. Starting in 1919, year one of Harlem's renaissance and Hoover's career at the Bureau, secretive FBI “ghostreaders” monitored the latest developments in African American letters. By the time of Hoover's death in 1972, these ghostreaders knew enough to simulate a sinister black literature of their own. The official aim behind the Bureau 's close reading was to anticipate political unrest. Yet, as this book reveals, FBI surveillance came to influence the creation and public reception of African American literature in the heart of the twentieth century. This book details how the FBI threatened the international travels of African American writers and prepared to jail dozens of them in times of national emergency. All the same, it shows that the Bureau's paranoid style could prompt insightful criticism from Hoover's ghostreaders and creative replies from their literary targets. For authors such as Claude McKay, James Baldwin, and Sonia Sanchez, the suspicion that government spy-critics tracked their every word inspired rewarding stylistic experiments as well as disabling self-censorship. Illuminating both the serious harms of state surveillance and the ways in which imaginative writing can withstand and exploit it, this book is a groundbreaking account of a long-hidden dimension of African American literature.
Roberto Rona and Susan Chinn
- Published in print:
- 1999
- Published Online:
- September 2009
- ISBN:
- 9780192629197
- eISBN:
- 9780191723612
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780192629197.001.0001
- Subject:
- Public Health and Epidemiology, Public Health, Epidemiology
The National Study of Health and Growth (NSHG) was a surveillance system of growth in primary school children of England and Scotland from 1972 to 1994. The system included a representative sample ...
More
The National Study of Health and Growth (NSHG) was a surveillance system of growth in primary school children of England and Scotland from 1972 to 1994. The system included a representative sample and an inner city sample. The study was valuable for assessing the possible impact of food welfare policy and social factors on nutritional status, mainly assessed in terms of height. The NSHG was the first study to document an increase in child obesity in the United Kingdom. Although the principal aim of the NHSG was to monitor nutritional status, the study was influential in assessing trends in respiratory illness, especially asthma, and in reporting on the risk factors of obesity, cholesterol levels, blood pressure and physical fitness, and other health complaints such as food intolerance, enuresis, and sleep disturbances. The NSGH was successful in maintaining a high response rate throughout its existence.Less
The National Study of Health and Growth (NSHG) was a surveillance system of growth in primary school children of England and Scotland from 1972 to 1994. The system included a representative sample and an inner city sample. The study was valuable for assessing the possible impact of food welfare policy and social factors on nutritional status, mainly assessed in terms of height. The NSHG was the first study to document an increase in child obesity in the United Kingdom. Although the principal aim of the NHSG was to monitor nutritional status, the study was influential in assessing trends in respiratory illness, especially asthma, and in reporting on the risk factors of obesity, cholesterol levels, blood pressure and physical fitness, and other health complaints such as food intolerance, enuresis, and sleep disturbances. The NSGH was successful in maintaining a high response rate throughout its existence.
Brandon C. Welsh and David P. Farrington
- Published in print:
- 2009
- Published Online:
- May 2012
- ISBN:
- 9780195326215
- eISBN:
- 9780199943999
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195326215.003.0003
- Subject:
- Sociology, Law, Crime and Deviance
This chapter investigates how surveillance measures can reduce crime. It explains that public-area surveillance falls under the category of situational-crime prevention, which stands apart from these ...
More
This chapter investigates how surveillance measures can reduce crime. It explains that public-area surveillance falls under the category of situational-crime prevention, which stands apart from these other strategies by its singular focus on the setting or place in which criminal acts take place, as well as its crime-specific focus. The chapter discusses the core assumption of both opportunity and informal social-control models of prevention that criminal opportunities and risks are influenced by environmental conditions in interaction with resident and offender characteristics. Thus, though street lighting, closed-circuit television (CCTV) cameras, and some physical design changes to buildings and parks do not constitute a physical barrier to crime, they can act as a catalyst to stimulate crime reduction through a change in the perceptions, attitudes, and behavior of residents and potential offenders.Less
This chapter investigates how surveillance measures can reduce crime. It explains that public-area surveillance falls under the category of situational-crime prevention, which stands apart from these other strategies by its singular focus on the setting or place in which criminal acts take place, as well as its crime-specific focus. The chapter discusses the core assumption of both opportunity and informal social-control models of prevention that criminal opportunities and risks are influenced by environmental conditions in interaction with resident and offender characteristics. Thus, though street lighting, closed-circuit television (CCTV) cameras, and some physical design changes to buildings and parks do not constitute a physical barrier to crime, they can act as a catalyst to stimulate crime reduction through a change in the perceptions, attitudes, and behavior of residents and potential offenders.
Brandon C. Welsh and David P. Farrington
- Published in print:
- 2009
- Published Online:
- May 2012
- ISBN:
- 9780195326215
- eISBN:
- 9780199943999
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195326215.003.0008
- Subject:
- Sociology, Law, Crime and Deviance
This chapter explores key policy choices and challenges that U.S. cities face in the use of major forms of public-surveillance approaches such as closed-circuit television (CCTV) surveillance cameras ...
More
This chapter explores key policy choices and challenges that U.S. cities face in the use of major forms of public-surveillance approaches such as closed-circuit television (CCTV) surveillance cameras and improved street lighting to prevent crime in public places. It suggests that not all forms of surveillance are as potentially intrusive, and raises questions about the infringement of civil liberties and other social costs. However, these social costs need to be weighed against any crime-prevention benefits that accrue from the different forms of surveillance.Less
This chapter explores key policy choices and challenges that U.S. cities face in the use of major forms of public-surveillance approaches such as closed-circuit television (CCTV) surveillance cameras and improved street lighting to prevent crime in public places. It suggests that not all forms of surveillance are as potentially intrusive, and raises questions about the infringement of civil liberties and other social costs. However, these social costs need to be weighed against any crime-prevention benefits that accrue from the different forms of surveillance.
Lee A. Bygrave and Terje Michaelsen
- Published in print:
- 2009
- Published Online:
- May 2009
- ISBN:
- 9780199561131
- eISBN:
- 9780191721199
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199561131.003.0004
- Subject:
- Business and Management, Information Technology, Political Economy
This chapter describes the main organizations that are concerned directly with Internet governance. It outlines the relevant responsibilities and agendas of the respective organizations, together ...
More
This chapter describes the main organizations that are concerned directly with Internet governance. It outlines the relevant responsibilities and agendas of the respective organizations, together with their sources of funding and their relationships with each other. Attention is directed mainly at transnational bodies. These include the Internet Society, Internet Architecture Board, Internet Engineering Task Force, World Wide Web Consortium, and Internet Corporation for Assigned Names and Numbers. The remainder of the chapter describes the various roles played by national governments, alone and in concert, in Internet governance. Using the self-governance ideals of ‘digital libertarianism’ as foil, it delineates the growing influence of governments in the field.Less
This chapter describes the main organizations that are concerned directly with Internet governance. It outlines the relevant responsibilities and agendas of the respective organizations, together with their sources of funding and their relationships with each other. Attention is directed mainly at transnational bodies. These include the Internet Society, Internet Architecture Board, Internet Engineering Task Force, World Wide Web Consortium, and Internet Corporation for Assigned Names and Numbers. The remainder of the chapter describes the various roles played by national governments, alone and in concert, in Internet governance. Using the self-governance ideals of ‘digital libertarianism’ as foil, it delineates the growing influence of governments in the field.
Malcolm Ausden
- Published in print:
- 2007
- Published Online:
- January 2008
- ISBN:
- 9780198568728
- eISBN:
- 9780191717529
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780198568728.003.0003
- Subject:
- Biology, Biodiversity / Conservation Biology
This chapter discusses management/site action planning for habitat management: the process for deciding what you want to achieve, how to achieve it, and how to monitor whether you are achieving it. ...
More
This chapter discusses management/site action planning for habitat management: the process for deciding what you want to achieve, how to achieve it, and how to monitor whether you are achieving it. Topics covered include the format of the management action plan, monitoring and surveillance, and agri-environment schemes and conservation programmes.Less
This chapter discusses management/site action planning for habitat management: the process for deciding what you want to achieve, how to achieve it, and how to monitor whether you are achieving it. Topics covered include the format of the management action plan, monitoring and surveillance, and agri-environment schemes and conservation programmes.
James B. Rule
- Published in print:
- 2009
- Published Online:
- May 2012
- ISBN:
- 9780195307832
- eISBN:
- 9780199944040
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195307832.003.0002
- Subject:
- Sociology, Law, Crime and Deviance
This chapter discusses government surveillance. It emphasizes that whatever governments can do for their populations, they can also do against them. One good example is using surveillance systems as ...
More
This chapter discusses government surveillance. It emphasizes that whatever governments can do for their populations, they can also do against them. One good example is using surveillance systems as instruments of oppression. From here, the discussion shifts to government surveillance in America, Australia, France, Canada, and Great Britain. It then looks at the coalescence of government surveillance. The chapter also introduces the Patriot Act and the Foreign Intelligence Surveillance Act of 1978 (FISA).Less
This chapter discusses government surveillance. It emphasizes that whatever governments can do for their populations, they can also do against them. One good example is using surveillance systems as instruments of oppression. From here, the discussion shifts to government surveillance in America, Australia, France, Canada, and Great Britain. It then looks at the coalescence of government surveillance. The chapter also introduces the Patriot Act and the Foreign Intelligence Surveillance Act of 1978 (FISA).
Kenneth H. Craik
- Published in print:
- 2008
- Published Online:
- January 2009
- ISBN:
- 9780195330922
- eISBN:
- 9780199868292
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195330922.003.0002
- Subject:
- Psychology, Social Psychology
This chapter analyzes the ongoing social communication process through which news, observations, and impressions about an individual circulate along that person’s reputational network via chat, ...
More
This chapter analyzes the ongoing social communication process through which news, observations, and impressions about an individual circulate along that person’s reputational network via chat, gossip sessions, occasions of qualified privilege, and more formal means. In the network interpretation of reputation, the daily ebb and flow of information through the media of various forms of communication and discourse will be deemed the “discursive reputation,” referring to what is said about the person. Reputational networks are activated by social communication. In everyday life, we are surrounded by and awash in chat and gossip, and much of it is about specific persons. Much of what we know about most individuals we claim to know is indirect in this sense, derived from everyday, informal surveillance.Less
This chapter analyzes the ongoing social communication process through which news, observations, and impressions about an individual circulate along that person’s reputational network via chat, gossip sessions, occasions of qualified privilege, and more formal means. In the network interpretation of reputation, the daily ebb and flow of information through the media of various forms of communication and discourse will be deemed the “discursive reputation,” referring to what is said about the person. Reputational networks are activated by social communication. In everyday life, we are surrounded by and awash in chat and gossip, and much of it is about specific persons. Much of what we know about most individuals we claim to know is indirect in this sense, derived from everyday, informal surveillance.
Gary T. Marx
- Published in print:
- 2016
- Published Online:
- May 2017
- ISBN:
- 9780226285887
- eISBN:
- 9780226286075
- Item type:
- book
- Publisher:
- University of Chicago Press
- DOI:
- 10.7208/chicago/9780226286075.001.0001
- Subject:
- Sociology, Law, Crime and Deviance
Queen Elizabeth (1503-1633) did not want “to make windows into men’s hearts and secret thoughts.” Yet as ruler she needed information about her subjects. Today’s surveillance society brings the same ...
More
Queen Elizabeth (1503-1633) did not want “to make windows into men’s hearts and secret thoughts.” Yet as ruler she needed information about her subjects. Today’s surveillance society brings the same paradox. This book illustrates how and why surveillance is neither good nor bad, but context and comportment make it so. Explanation and evaluation require a common language and a map for the identification and measurement of surveillance's fundamental properties and contexts. The empirical richness of watching and being watched is disentangled and parsed into basic categories and dimensions. Terms such as surveillance, privacy, secrecy, confidentiality, anonymity, and personal borders are illustrated as well as the basic structures, processes, goals and cultures of surveillance. The book provides a way of conceptualizing and analyzing the new surveillance and draws on Marx’ several decades of empirical and theoretical studies on topics such as covert policing, computer matching and profiling, work monitoring, drug testing, location monitoring, Caller-ID, communication manners and surveillance in art and music. Normative chapters on the ethics of surveillance and techno-fallacies of the information age develop the implications for public policy. Through satirical fiction four distinct contexts of surveillance are illustrated: coercion (government and security), contracts (work), care (children) and that of unprotected “publicly” available data. The ironies, paradoxes, trade-offs and value conflicts which limit the best laid plans and which make the topic so interesting and challenging are identified.Less
Queen Elizabeth (1503-1633) did not want “to make windows into men’s hearts and secret thoughts.” Yet as ruler she needed information about her subjects. Today’s surveillance society brings the same paradox. This book illustrates how and why surveillance is neither good nor bad, but context and comportment make it so. Explanation and evaluation require a common language and a map for the identification and measurement of surveillance's fundamental properties and contexts. The empirical richness of watching and being watched is disentangled and parsed into basic categories and dimensions. Terms such as surveillance, privacy, secrecy, confidentiality, anonymity, and personal borders are illustrated as well as the basic structures, processes, goals and cultures of surveillance. The book provides a way of conceptualizing and analyzing the new surveillance and draws on Marx’ several decades of empirical and theoretical studies on topics such as covert policing, computer matching and profiling, work monitoring, drug testing, location monitoring, Caller-ID, communication manners and surveillance in art and music. Normative chapters on the ethics of surveillance and techno-fallacies of the information age develop the implications for public policy. Through satirical fiction four distinct contexts of surveillance are illustrated: coercion (government and security), contracts (work), care (children) and that of unprotected “publicly” available data. The ironies, paradoxes, trade-offs and value conflicts which limit the best laid plans and which make the topic so interesting and challenging are identified.
Adriana Petryna
- Published in print:
- 2013
- Published Online:
- October 2017
- ISBN:
- 9780691151663
- eISBN:
- 9781400845095
- Item type:
- chapter
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691151663.003.0002
- Subject:
- Anthropology, Social and Cultural Anthropology
This chapter examines the sciences, politics, and international cooperations that informed Soviet state responses to the Chernobyl disaster and how they produced an image of control over ...
More
This chapter examines the sciences, politics, and international cooperations that informed Soviet state responses to the Chernobyl disaster and how they produced an image of control over unpredictable and largely unassessed circumstances of risk. More specifically, it investigates the relationship between individual suffering caused by the Chernobyl accident and the technical measures and scales of expertise used to assess radiation-related biological injury in Ukraine. To this end, the chapter considers the work of international scientific networks in patterning initial Soviet remediation strategies and public health responses. It highlights key aspects of the initial Soviet management of the Chernobyl disaster and shows how ambiguities related to the interpretation of radiation-related physical damage subjected post-Chernobyl state interventions and medical surveillance to a variety of competing scientific and political interests. It also considers the so-called Safe Living Concept regarding radiation dose exposure and Soviet-American bioscientific collaboration report on radioactive fallout.Less
This chapter examines the sciences, politics, and international cooperations that informed Soviet state responses to the Chernobyl disaster and how they produced an image of control over unpredictable and largely unassessed circumstances of risk. More specifically, it investigates the relationship between individual suffering caused by the Chernobyl accident and the technical measures and scales of expertise used to assess radiation-related biological injury in Ukraine. To this end, the chapter considers the work of international scientific networks in patterning initial Soviet remediation strategies and public health responses. It highlights key aspects of the initial Soviet management of the Chernobyl disaster and shows how ambiguities related to the interpretation of radiation-related physical damage subjected post-Chernobyl state interventions and medical surveillance to a variety of competing scientific and political interests. It also considers the so-called Safe Living Concept regarding radiation dose exposure and Soviet-American bioscientific collaboration report on radioactive fallout.
Issa Kohler-Hausmann
- Published in print:
- 2019
- Published Online:
- May 2020
- ISBN:
- 9780691196114
- eISBN:
- 9781400890354
- Item type:
- book
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691196114.001.0001
- Subject:
- Social Work, Crime and Justice
In the early 1990s, New York City launched an initiative under the banner of Broken Windows policing to dramatically expand enforcement against low-level offenses. This is the first book to document ...
More
In the early 1990s, New York City launched an initiative under the banner of Broken Windows policing to dramatically expand enforcement against low-level offenses. This is the first book to document the fates of the hundreds of thousands of people hauled into lower criminal courts as part of this policing experiment. Drawing on three years of fieldwork inside and outside of the courtroom, in-depth interviews, and analysis of trends in arrests and dispositions of misdemeanors going back three decades, the book shows how the lower reaches of our criminal justice system operate as a form of social control and surveillance, often without adjudicating cases or imposing formal punishment. It describes in harrowing detail how the reach of America's penal state extends well beyond the shocking numbers of people incarcerated in prisons or stigmatized by a felony conviction.Less
In the early 1990s, New York City launched an initiative under the banner of Broken Windows policing to dramatically expand enforcement against low-level offenses. This is the first book to document the fates of the hundreds of thousands of people hauled into lower criminal courts as part of this policing experiment. Drawing on three years of fieldwork inside and outside of the courtroom, in-depth interviews, and analysis of trends in arrests and dispositions of misdemeanors going back three decades, the book shows how the lower reaches of our criminal justice system operate as a form of social control and surveillance, often without adjudicating cases or imposing formal punishment. It describes in harrowing detail how the reach of America's penal state extends well beyond the shocking numbers of people incarcerated in prisons or stigmatized by a felony conviction.
Shehzad Nadeem
- Published in print:
- 2011
- Published Online:
- October 2017
- ISBN:
- 9780691147871
- eISBN:
- 9781400836697
- Item type:
- chapter
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691147871.003.0001
- Subject:
- Anthropology, Social and Cultural Anthropology
This book explores the paradoxical effects of globalization on young Indians employed in the outsourcing industry: they are reaping the benefits of the corporate search for cut-rate labor but also ...
More
This book explores the paradoxical effects of globalization on young Indians employed in the outsourcing industry: they are reaping the benefits of the corporate search for cut-rate labor but also shouldering the weight of the global restructuring of work. Drawing on extensive fieldwork in India and the United States, the book highlights the cyclical humiliations and joys of life under transnational capitalism by focusing on factors such as managerial styles, workplace culture, and family and social relations. It argues that while Indian workers receive relatively high wages (in India), they are also subject to what Karl Marx called the “dull compulsion of economic relations,” and the forms of discipline and surveillance issuing thereof. It also considers the culture of the economy and the economy of culture: the strictures and structures by which social life and human creativity are hedged.Less
This book explores the paradoxical effects of globalization on young Indians employed in the outsourcing industry: they are reaping the benefits of the corporate search for cut-rate labor but also shouldering the weight of the global restructuring of work. Drawing on extensive fieldwork in India and the United States, the book highlights the cyclical humiliations and joys of life under transnational capitalism by focusing on factors such as managerial styles, workplace culture, and family and social relations. It argues that while Indian workers receive relatively high wages (in India), they are also subject to what Karl Marx called the “dull compulsion of economic relations,” and the forms of discipline and surveillance issuing thereof. It also considers the culture of the economy and the economy of culture: the strictures and structures by which social life and human creativity are hedged.
William R. Clark
- Published in print:
- 2008
- Published Online:
- September 2008
- ISBN:
- 9780195336634
- eISBN:
- 9780199868568
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195336634.003.0011
- Subject:
- Biology, Disease Ecology / Epidemiology
Cancers arise as a result of mutations in genes controlling cell division. They may well arise in the body on a fairly frequent basis. Most or all cancers display information on their surface that ...
More
Cancers arise as a result of mutations in genes controlling cell division. They may well arise in the body on a fairly frequent basis. Most or all cancers display information on their surface that should make them seem foreign; the rare tumors that emerge have somehow escaped detection by the immune system. Immune surveillance of tumors is largely the job of T cells and a specialized cell called the NK (natural killer) cell. Our improved understanding of the interaction between tumor cells and the immune system has led to promising possibilities for treating cancer in the future, including forms of gene therapy and DNA-based cancer vaccines.Less
Cancers arise as a result of mutations in genes controlling cell division. They may well arise in the body on a fairly frequent basis. Most or all cancers display information on their surface that should make them seem foreign; the rare tumors that emerge have somehow escaped detection by the immune system. Immune surveillance of tumors is largely the job of T cells and a specialized cell called the NK (natural killer) cell. Our improved understanding of the interaction between tumor cells and the immune system has led to promising possibilities for treating cancer in the future, including forms of gene therapy and DNA-based cancer vaccines.
James B. Rule
- Published in print:
- 2009
- Published Online:
- May 2012
- ISBN:
- 9780195307832
- eISBN:
- 9780199944040
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195307832.003.0001
- Subject:
- Sociology, Law, Crime and Deviance
This chapter introduces the concept of privacy, which is defined as the exercise of a genuine option to withhold information on one's self. The discussion is concerned with the question of why people ...
More
This chapter introduces the concept of privacy, which is defined as the exercise of a genuine option to withhold information on one's self. The discussion is concerned with the question of why people struggle to protect their privacy. It examines the tensions of privacy and disclosure and looks at the debates over privacy that reflect long-running ethical and political tensions between individual prerogatives and claims of larger social units. It also studies the struggles to draw a line between private and public, as well as the resulting pressures for surveillance systems to connect and exchange. Finally, the chapter discusses privacy protection and the constraints and countercurrents to mass surveillance.Less
This chapter introduces the concept of privacy, which is defined as the exercise of a genuine option to withhold information on one's self. The discussion is concerned with the question of why people struggle to protect their privacy. It examines the tensions of privacy and disclosure and looks at the debates over privacy that reflect long-running ethical and political tensions between individual prerogatives and claims of larger social units. It also studies the struggles to draw a line between private and public, as well as the resulting pressures for surveillance systems to connect and exchange. Finally, the chapter discusses privacy protection and the constraints and countercurrents to mass surveillance.
Frederic Wakeman
- Published in print:
- 2003
- Published Online:
- March 2012
- ISBN:
- 9780520234079
- eISBN:
- 9780520928763
- Item type:
- book
- Publisher:
- University of California Press
- DOI:
- 10.1525/california/9780520234079.001.0001
- Subject:
- History, Asian History
The most feared man in China, Dai Li, was chief of Chiang Kai-shek's secret service during World War II. This sweeping biography of “China's Himmler”, based on recently opened intelligence archives, ...
More
The most feared man in China, Dai Li, was chief of Chiang Kai-shek's secret service during World War II. This sweeping biography of “China's Himmler”, based on recently opened intelligence archives, traces Dai's rise from obscurity as a rural hooligan and Green Gang blood-brother to commander of the paramilitary units of the Blue Shirts and of the dreaded Military Statistics Bureau: the world's largest spy and counterespionage organization of its time. In addition to exposing the inner workings of the secret police, whose death squads, kidnappings, torture, and omnipresent surveillance terrorized critics of the Nationalist regime, Dai Li's personal story opens a unique window on the clandestine history of China's Republican period. This study uncovers the origins of the Cold War in the interactions of Chinese and American special services operatives who cooperated with Dai Li in the resistance to the Japanese invasion in the 1930s and who laid the groundwork for an ongoing alliance against the Communists during the revolution that followed in the 1940s. The book illustrates how the anti-Communist activities Dai Li led altered the balance of power within the Chinese Communist Party, setting the stage for Mao Zedong's rise to supremacy. It reveals a complex and remarkable personality that masked a dark presence in modern China—one that still pervades the secret services on both sides of the Taiwan Strait. The book illuminates a previously little-understood world as it discloses the details of Chinese secret service trade-craft.Less
The most feared man in China, Dai Li, was chief of Chiang Kai-shek's secret service during World War II. This sweeping biography of “China's Himmler”, based on recently opened intelligence archives, traces Dai's rise from obscurity as a rural hooligan and Green Gang blood-brother to commander of the paramilitary units of the Blue Shirts and of the dreaded Military Statistics Bureau: the world's largest spy and counterespionage organization of its time. In addition to exposing the inner workings of the secret police, whose death squads, kidnappings, torture, and omnipresent surveillance terrorized critics of the Nationalist regime, Dai Li's personal story opens a unique window on the clandestine history of China's Republican period. This study uncovers the origins of the Cold War in the interactions of Chinese and American special services operatives who cooperated with Dai Li in the resistance to the Japanese invasion in the 1930s and who laid the groundwork for an ongoing alliance against the Communists during the revolution that followed in the 1940s. The book illustrates how the anti-Communist activities Dai Li led altered the balance of power within the Chinese Communist Party, setting the stage for Mao Zedong's rise to supremacy. It reveals a complex and remarkable personality that masked a dark presence in modern China—one that still pervades the secret services on both sides of the Taiwan Strait. The book illuminates a previously little-understood world as it discloses the details of Chinese secret service trade-craft.
Frederick Cooper
- Published in print:
- 2012
- Published Online:
- January 2014
- ISBN:
- 9780197265314
- eISBN:
- 9780191760402
- Item type:
- chapter
- Publisher:
- British Academy
- DOI:
- 10.5871/bacad/9780197265314.003.0016
- Subject:
- History, World Modern History
In 1946, the French constitution made colonial subjects in Africa into citizens. Having been content to rule ‘tribes’ via their ‘chiefs’, at that point it had to track individuals entitled to vote ...
More
In 1946, the French constitution made colonial subjects in Africa into citizens. Having been content to rule ‘tribes’ via their ‘chiefs’, at that point it had to track individuals entitled to vote and receive social benefits. The new citizens retained their personal status — regulating marriage, filiation, and inheritance — under Islamic law or local ‘customs’ rather than through the civil code. That posed a dilemma for French officials, for the état-civil did not just record life events, but symbolized the integration of all into a single body of citizens. French officials and legislators — including African representatives — could not agree on whether the multiple status regimes necessitated two états-civils or one. In the end, officials were too torn between their recognition of difference among peoples under French rule and their desire for singularity to put in place a consistent policy of identification, registration, and surveillance. They bequeathed the problem to their successors.Less
In 1946, the French constitution made colonial subjects in Africa into citizens. Having been content to rule ‘tribes’ via their ‘chiefs’, at that point it had to track individuals entitled to vote and receive social benefits. The new citizens retained their personal status — regulating marriage, filiation, and inheritance — under Islamic law or local ‘customs’ rather than through the civil code. That posed a dilemma for French officials, for the état-civil did not just record life events, but symbolized the integration of all into a single body of citizens. French officials and legislators — including African representatives — could not agree on whether the multiple status regimes necessitated two états-civils or one. In the end, officials were too torn between their recognition of difference among peoples under French rule and their desire for singularity to put in place a consistent policy of identification, registration, and surveillance. They bequeathed the problem to their successors.
John C. Avise
- Published in print:
- 2010
- Published Online:
- May 2010
- ISBN:
- 9780195393439
- eISBN:
- 9780199775415
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195393439.003.0003
- Subject:
- Biology, Evolutionary Biology / Genetics
This chapter addresses various gratuitous complexities—inherent in the human genome—that routinely compromise personal health. These range from problems associated with split genes (wherein introns ...
More
This chapter addresses various gratuitous complexities—inherent in the human genome—that routinely compromise personal health. These range from problems associated with split genes (wherein introns are interspersed with exons), to various complications from the Byzantine mechanisms of gene regulation and nucleic acid surveillance, to the peculiarities of genomic imprinting, to the astoundingly bizarre structure and function of mitochondrial DNA. To explain these baroque features and their oft‐deleterious health consequences, explanations from theology and philosophy are contrasted with those that emerge from the evolutionary‐genetic sciences.Less
This chapter addresses various gratuitous complexities—inherent in the human genome—that routinely compromise personal health. These range from problems associated with split genes (wherein introns are interspersed with exons), to various complications from the Byzantine mechanisms of gene regulation and nucleic acid surveillance, to the peculiarities of genomic imprinting, to the astoundingly bizarre structure and function of mitochondrial DNA. To explain these baroque features and their oft‐deleterious health consequences, explanations from theology and philosophy are contrasted with those that emerge from the evolutionary‐genetic sciences.