Surveillance Research Papers - Academia.edu (original) (raw)

Prolongeant ses travaux sur la répression, Vanessa Codaccioni analyse et dénonce les ressorts de « la société de vigilance ». Surveillance massive, appel à la délation, légitimation de la répression : une nouvelle servitude volontaire est... more

Prolongeant ses travaux sur la répression, Vanessa Codaccioni analyse et dénonce les ressorts de « la société de vigilance ». Surveillance massive, appel à la délation, légitimation de la répression : une nouvelle servitude volontaire est insidieusement imposée aux citoyens qui deviennent des acteurs incontournables de cette dynamique sécuritaire.

Prolongeant ses travaux sur la répression, Vanessa Codaccioni analyse et dénonce les ressorts de « la société de vigilance ». Surveillance massive, appel à la délation, légitimation de la répression : une nouvelle servitude volontaire est... more

Prolongeant ses travaux sur la répression, Vanessa Codaccioni analyse et dénonce les ressorts de « la société de vigilance ». Surveillance massive, appel à la délation, légitimation de la répression : une nouvelle servitude volontaire est insidieusement imposée aux citoyens qui deviennent des acteurs incontournables de cette dynamique sécuritaire.

[T]he law recognizes that we inherently have to bear the risk of the "tattletale" but draws the line at concluding that we must also bear, as the price of choosing to speak to another human being, the risk of having a permanent electronic... more

[T]he law recognizes that we inherently have to bear the risk of the "tattletale" but draws the line at concluding that we must also bear, as the price of choosing to speak to another human being, the risk of having a permanent electronic recording made of our words. R. v. Duarte (1990), 1 SCR 30 at 48, 53 CCC (3d) 1.

This article examines dynamics of financial surveillance and risk-based regulation in the context of ongoing activities to combat money laundering and terrorist financing. Close analysis of the situation in the UK reveals entangled forms... more

This article examines dynamics of financial surveillance and risk-based regulation in the context of ongoing activities to combat money laundering and terrorist financing. Close analysis of the situation in the UK reveals entangled forms of co-regulation and ultimately co-production of surveillance that challenge ‘institutional boundaries’ of the state regarding policing and intelligence practices. It is argued that ongoing transformations in the anti-money laundering field reveal a dual movement that combines forms of indirect administration with a process of ‘neoliberal bureaucratization’.The article aims to show how current policies against ‘dirty money’ still paradoxically work on the basis of heterogeneous goals and misapprehensions between ‘professionals of security’ and ‘professionals of finance’.

While recognizing the need for intelligence gathering and acknowledging that gathering such intelligence may require the adoption of extraordinary measures and approaches, international human rights law ascribes limits to how such... more

While recognizing the need for intelligence gathering and acknowledging that gathering such intelligence may require the adoption of extraordinary measures and approaches, international human rights law ascribes limits to how such extraordinary measures can be used. First and foremost, intelligence collection, by its very nature, is likely to infringe aspects of the right to privacy that all individuals enjoy under international human rights law. However, there are six accepted grounds in international law under which it may be acceptable to interfere with an individual’s or group’s privacy: National security, public safety, the economic wellbeing of the country, the prevention of disorder or crime, protection of public health or morals, and the protection of the rights and freedoms of others. All but public health and morals fall squarely within an intelligence service’s purview. While there is a growing body of jurisprudence on the use of so-called Special Investigation Techniques by law enforcement and domestic security agencies – for instance, telephone intercepts, eavesdropping devices, surveillance tools, undercover operations and human source recruitment – there is far less jurisprudence that touches upon the collection of foreign intelligence although perhaps some basic principles can be inferred from court rulings, as well as other international bodies.

We investigate the case of a Microcredit Platform that offers financial services in an impoverished region of Brazil. Through this case, we verify how the intermediation of human microcredit agents is essential to create critical mass... more

We investigate the case of a Microcredit Platform that offers financial services in an impoverished region of Brazil. Through this case, we verify how the intermediation of human microcredit agents is essential to create critical mass that guarantee engagement of potential clients. We critically analyze the role of these agents disseminating microcredit as essential for the outreach of financial services on the edge of the traditional financial system. On the one hand, by collecting information, as well as acting on credit recovery, those microcredit agents reduce the information asymmetry in the process of granting credit to micro-entrepreneurs. On the other hand, acting as brokers to a platform, their role can also be understood as an element intended to connect micro-entrepreneurs to algorithms and to constantly monitor them. With close relationships in the community in which they operate, microcredit agents have an expanded capacity for real-time surveillance.

Emerald ash borer (EAB), a wood-boring insect native to Asia, was discovered near Detroit in 2002 and has spread and killed millions of ash trees throughout the eastern United States and Canada. EAB causes severe damage in urban areas... more

Emerald ash borer (EAB), a wood-boring insect native to Asia, was discovered near Detroit in 2002 and has spread and killed millions of ash trees throughout the eastern United States and Canada. EAB causes severe damage in urban areas where it kills high-value ash trees that shade streets, homes, and parks and costs homeowners and local governments millions of dollars for treatment, removal, and replacement of infested trees. We present a multistage, stochastic, mixed-integer programming model to help decision-makers maximize the public benefits of preserving healthy ash trees in an urban environment. The model allocates resources to surveillance of the ash population and subsequent treatment and removal of infested trees over time. We explore the multistage dynamics of an EAB outbreak with a dispersal mechanism and apply the optimization model to explore surveillance, treatment, and removal options to manage an EAB outbreak in Winnipeg, a city of Manitoba, Canada. Recommendation to Resource Managers • Our approach demonstrates that timely detection and early response are critical factors for maximizing the number of healthy trees in urban areas affected by the pest outbreak.

Background Prolonged sitting time is a risk factor for chronic disease, yet recent global surveillance is not well described. The aims were to clarify: (i) the countries that have collected country-level data on self-reported sitting... more

Background Prolonged sitting time is a risk factor for chronic disease, yet recent global surveillance is not well described. The aims were to clarify: (i) the countries that have collected country-level data on self-reported sitting time; (ii) the single-item tools used to collect these data; and (iii) the duration of sitting time reported across low- to high-income countries. Methods Country-level data collected within the last 10 years using single-item self-report were included. The six-stage methodology: (1) reviewing Global Observatory for Physical Activity! Country Cards; (2–4) country-specific searches of PubMed, the Demographic and Health Survey website and Google; (5) analysing the Eurobarometer 88.4; and (6) country-specific searches for World Health Organization STEPwise reports. Results A total of 7641 records were identified and screened for eligibility. Sixty-two countries (29%) reported sitting time representing 47% of the global adult population. The majority of dat...

While players are enjoying casual mobile games like Candy Crush Saga, we also must negotiate elements that have been brought to the forefront by the intersection of networked play environments and casual game technologies. While casual... more

While players are enjoying casual mobile games like Candy Crush Saga, we also must negotiate elements that have been brought to the forefront by the intersection of networked play environments and casual game technologies. While casual games are fun to play and often seemingly banal—provoking questions of why anyone would study Candy Crush academically—they in fact can reveal a whole host of issues worthy of our attention, such as privacy and surveillance; the readability and accessibility of terms of service; and intellectual property issues.

How does erasure execute knowledge production? The following is a tour through a collection of erasure that provides a glimpse into the many directions that this question may take us, through the lens of a series of artistic... more

How does erasure execute knowledge production? The following is a tour through a collection of erasure that provides a glimpse into the many directions that this question may take us, through the lens of a series of artistic interventions, academic research, experiments and artefacts.

This is a critical appraisal of a manuscript outlining additional indicators used in the United States to augment traditional disease surveillance tools. The article went through the peer-review process. Therefore, it may be considered as... more

This is a critical appraisal of a manuscript outlining additional indicators used in the United States to augment traditional disease surveillance tools. The article went through the peer-review process. Therefore, it may be considered as objective and unbiased. The structure of the article is coherent, and it was published in a journal for digital medicine, health, and health care in the internet age. The article has contributed to the literature and provides a basis for strengthening existing surveillance systems to improve public health outcomes. However, it is suggested that whenever new indicators are being developed, their essential components must be fully defined.

Amazon’s Ring relies on infrastructural obfuscation to hide their infrastructures through urban camouflage (as doorbells, floodlights, sensors) while simultaneously expanding the carceral state and extending the industrial... more

Amazon’s Ring relies on infrastructural obfuscation to hide their
infrastructures through urban camouflage (as doorbells,
floodlights, sensors) while simultaneously expanding the carceral
state and extending the industrial police-surveillant state. Through
a critical analysis of the Ring surveillant assemblage, this paper
reveals the way Ring and its associated apps produce fear and
paranoia of the racialized Other, promote community buy-in that
more surveillance will improve safety, while obscuring private
partnerships with local law enforcement. I argue Ring cannot be
viewed in isolation from its entangled corporate owner, Amazon,
which relies on an ever-expanding infrastructural network,
including surveillance of their highly prized package delivery
service. Ring is more than individual community members
installing doorbells with cameras that extend beyond their
property into public space; it is the blurring of boundaries
between police work and civilian surveillance, the reliance on
obscured digital infrastructures that hide to whom and what
users are connecting when they install a Ring device, and the
expansion of Amazon’s vast infrastructural power. By recentering
critique on the infrastructural backbone, made up of discourses
and fixtures, this paper argues for the need for infrastructural
accountability from companies such as Amazon, who not only
profit from fear, but actively reproduce structural violence
through their data infrastructures.

Abstract How does the multiplicity of surveilling gazes affect the experience of employees subjected to a matrix of domination in organisations? Building on a case study of ultra-religious Jewish women in Israeli high-tech organisations,... more

Abstract
How does the multiplicity of surveilling gazes affect the experience of employees subjected to a matrix of domination in organisations? Building on a case study of ultra-religious Jewish women in Israeli high-tech organisations, the article demonstrates how the intersectionality of gender and religiosity exposed them to a matrix of contradicting visibility regimes—managerial, peers, and religious community. By displaying their compliance with each visibility regime, they were constructed as hyper-subjugated employees, but simultaneously were able to use (in)visibility as a resource. Specifically, by manoeuvring between the various gazes and playing one visibility regime against the other, they challenged some of the organisational and religious norms that served to marginalize them, yet upheld their status as worthy members of both institutions. Juxtaposing theoretical insights from organisational surveillance and gender studies, the paper reveals the role of multiple surveilling gazes in both the reproduction of minorities' marginalization, and their ability to mobilize it to maintain their collective identities.
Keywords: religion and organization, marginalization, power and control, visibility regime, gender in organizations, matrix of domination, intersectionality, identity displays, surveillance and minority groups

Yirminci yüzyılın son çeyreğinde varlığını ve etkisini göstermeye başlayan küreselleşme, yirmi birinci yüzyılın ilk çeyreğinde etkisini daha da belirginleştirmektedir. Küreselleşme sürecinde iletişime dayalı, ekonomik, kültürel ve siyasal... more

Yirminci yüzyılın son çeyreğinde varlığını ve etkisini göstermeye başlayan küreselleşme, yirmi birinci yüzyılın ilk çeyreğinde etkisini daha da belirginleştirmektedir. Küreselleşme sürecinde iletişime dayalı, ekonomik, kültürel ve siyasal etkenler bütünleşerek toplumsal olgulardaki değişim/dönüşüm hızla gerçekleşmektedir. Halkla ilişkiler, yeni iletişim teknolojilerinin kapasitesini etkin kullanarak küreselleşme sürecini hızlandırmakta; buna karşılık, küreselleşme süreci de halkla ilişkiler iletişimini stratejik bağlamda daha etkin olmaya sevk etmektedir. Küreselleşme ve halkla ilişkiler arasındaki ilişkiye odaklanan bu eserde, Foucault'un gözetim, bilgi-iktidar kavramları eksenindeki görüşleri, Hardt ve Negri'nin İmparatorluk kurgusu, Baudrillard'ın simülasyon kuramı, Althusser'in ideoloji kapsamındaki kuramsal yaklaşımı eşliğinde ve güncel verilerin göstergeleriyle bir tartışma geliştirilmektedir. Bu eserin, halkla ilişkilerin kuramsal gelişimine katkı sağlaması hedeflenmektedir.

O primeiro volume da coleção “Ciberdireito e Democracia” conta com doze capítulos inseridos dentro das linhas temáticas propostas pelos organizadores, contando com autores comprometidos com a pesquisa no campo do Direito e da Democracia... more

O primeiro volume da coleção “Ciberdireito e Democracia” conta com doze capítulos inseridos dentro das linhas temáticas propostas pelos organizadores, contando com autores comprometidos com a pesquisa no campo do Direito e da Democracia no Brasil.

Algorithmic profiling has become increasingly prevalent in many social fields and practices, including finance, marketing, law, cultural consumption and production, and social engagement. Although researchers have begun to investigate... more

Algorithmic profiling has become increasingly prevalent in many social fields and practices, including finance, marketing, law, cultural consumption and production, and social engagement. Although researchers have begun to investigate algorithmic profiling from various perspectives, socio-technical studies of algorithmic profiling that consider users' everyday perceptions are still scarce. In this article, we expand upon existing usercentered research and focus on people's awareness and imaginaries of algorithmic profiling, specifically in the context of social media and targeted advertising. We conducted an online survey geared toward understanding how Facebook users react to and make sense of algorithmic profiling when it is made visible. The methodology relied on qualitative accounts as well as quantitative data from 292 Facebook users in the United States and their reactions to their algorithmically inferred 'Your Interests' and 'Your Categories' sections on Facebook. The results illustrate a broad set of reactions and rationales to Facebook's (public-facing) algorithmic profiling, ranging from shock and surprise, to accounts of how superficialand in some cases, inaccuratethe profiles were. Taken together with the increasing reliance on Facebook as critical social infrastructure, our study highlights a sense of algorithmic disillusionment requiring further research.

Dynamically changing background ("dynamic background") still presents a great challenge to many motion-based video surveillance systems. In the context of event detection, it is a major source of false alarms. There is a strong need from... more

Dynamically changing background ("dynamic background") still presents a great challenge to many motion-based video surveillance systems. In the context of event detection, it is a major source of false alarms. There is a strong need from the security industry either to detect and suppress these false alarms, or dampen the effects of background changes, so as to increase the sensitivity to meaningful events of interest. In this paper, we restrict our focus to one of the most common causes of dynamic background changes: that of swaying tree branches and their shadows under windy conditions. Considering the ultimate goal in a video analytics pipeline, we formulate a new dynamic background detection problem as a signal processing alternative to the previously described but unreliable computer vision-based approaches. Within this new framework, we directly reduce the number of false alarms by testing if the detected events are due to characteristic background motions. In addition, we introduce a new dataset suitable for the evaluation of dynamic background detection. It consists of real-world events detected by a commercial surveillance system from two static surveillance cameras. The research question we address is whether dynamic background can be detected reliably and efficiently using simple motion features and in the presence of similar but meaningful events such as loitering. Inspired by the tree aerodynamics theory, we propose a novel method named local variation persistence (LVP), that captures the key characteristics of swaying motions. The method is posed as a convex optimization problem whose variable is the local variation. We derive a computationally efficient algorithm for solving the optimization problem, the solution of which is then used to form a powerful detection statistic. On our newly collected dataset, we demonstrate that the proposed LVP achieves excellent detection results and outperforms the best alternative adapted from existing art in the dynamic background literature.

Cameras are ubiquitous and increasingly mobile. While CCTV has captured considerable attention by surveillance researchers, the new visibility of police activities is increasingly produced by incidental sousveillance and wearable... more

Cameras are ubiquitous and increasingly mobile. While CCTV has captured considerable attention by surveillance researchers, the new visibility of police activities is increasingly produced by incidental sousveillance and wearable on-officer camera systems. This article considers advocacy for policing’s new visibility, contrasting that of police accountability activists who film police with designers and early adopters of on-officer cameras. In both accounts, these devices promise accountability by virtue of their mechanical objectivity. However, to each party, accountability functions rather differently. By attending to the social and legal privileging of police officers’ perspectives, the article provides an explanation for design decisions that produced Taser’s AXON Flex on-officer cameras and for why police are embracing these new technologies. Critics of these cameras cite privacy concerns, officer discretion in operating cameras, and department disclosure of footage. Nonetheles...

Every technology has its history. What are the beginnings of public television? This article explores the use of police CCTV in West Germany between the 1950s and the 1970s. In these early years, the public police cameras served three... more

Every technology has its history. What are the beginnings of public television? This article explores the use of police CCTV in West Germany between the 1950s and the 1970s. In these early years, the public police cameras served three functions: the use of cameras in traffic management; the repressive use of cameras at demonstrations; and the persuasive use of the images. The second part of the paper takes a closer look at the third function: surveillance images as a means of persuading offenders of their guilt. It is argued, that a persuasive force exists and is consciously exploited by the police. But this force also weakens over time, when subjects acquire more and more media competence. The police respond to this problem with the transition from still to moving images – and beyond.

We would like to invite you to join this exciting new project as a chapter contributor. Since this is a textbook, a great deal of this chapter entails a survey on the topic under the paradigm of cyber-physical systems, what can be done... more

We would like to invite you to join this exciting new project as a chapter contributor. Since this is a textbook, a great deal of this chapter entails a survey on the topic under the paradigm of cyber-physical systems, what can be done onboard and remotely, the distributed nature of the system and some exercises on futurology (anticipating trends can shed some light on upcoming designs). IET will bring great visibility to your work. You are welcome to suggest another topic/chapter title if you feel it would be more suitable. Each chapter should be around 20-25 pages each and can be submitted as a Word or Latex File. The IET will send you additional information (formatting, permission form, etc.) with the contributor's agreement once you have agreed to contribute to the book. Visit http:// www.theiet.org/resources/author-hub/books/index.cfm to get all information you need as a contributor to an IET research-level book. Each book is expected to have a total number of 500 printed pages (based on approximately 550 words per page with a 20% allowance for figures and tables). We have included a tentative schedule and list of topics below. If this is something you would consider, please send me the title of your chapter, a short description/abstract of the chapter content, and your full contact details. We will expect original content and new results for this book. You can, of course, reuse published material but the percentage of material reuse for the chapter should be less than 40%. The IET will run a piracy software on the full manuscript to control that you are including original material and will reject chapters who contain a large amount of already-published material so please do take this into consideration.

A paper-based disease reporting system has been associated with a number of challenges. These include difficulties to submit hard copies of the disease surveillance forms because of poor road infrastructure, weather conditions or... more

A paper-based disease reporting system has been associated with a number of challenges. These include difficulties to submit hard copies of the disease surveillance forms because of poor road infrastructure, weather conditions or challenging terrain, particularly in the developing countries. The system demands re-entry of the data at data processing and analysis points, thus making it prone to introduction of errors during this process. All these challenges contribute to delayed acquisition, processing and response to disease events occurring in remote hard to reach areas. Our study piloted the use of mobile phones in order to transmit near to real-time data from remote districts in Tanzania (Ngorongoro and Ngara), Burundi (Muyinga) and Zambia (Kazungula and Sesheke). Two technologies namely, digital and short messaging services were used to capture and transmit disease event data in the animal and human health sectors in the study areas based on a server–client model. Smart phones running the Android operating system (minimum required version: Android 1.6), and which supported open source application, Epicollect, as well as the Open Data Kit application, were used in the study. These phones allowed collection of geo-tagged data, with the opportunity of including static and moving images related to disease events. The project supported routine disease surveillance systems in the ministries responsible for animal and human health in Burundi, Tanzania and Zambia, as well as data collection for researchers at the Sokoine University of Agriculture, Tanzania. During the project implementation period between 2011 and 2013, a total number of 1651 diseases event-related forms were submitted, which allowed reporters to include GPS coordinates and photographs related to the events captured. It was concluded that the new technology-based surveillance system is useful in providing near to real-time data, with potential for enhancing timely response in rural remote areas of Africa. We recommended adoption of the proven technologies to improve disease surveillance, particularly in the developing countries.

This article is part Eight of a series exploring the links between evaluation and technologies. It considers the rehabilitation of RCTs as a methodology through a new relationship with big data: one that repurposes the technology of RCTs... more

This article is part Eight of a series exploring the links between evaluation and technologies. It considers the rehabilitation of RCTs as a methodology through a new relationship with big data: one that repurposes the technology of RCTs to be useful within the lifecycle of the intervention. Reconsidering the application of impact evaluation provides an opportunity to apply the uncanny valley to evaluation contexts to give us a “good enough” view of results.

This contribution asks how the reliance on mass dataveillance of travellers is sustained as a central policy option in the governance of EU border security. It examines this question by analysing a recent initiative of the European... more

This contribution asks how the reliance on mass dataveillance of travellers is sustained as a central policy option in the governance of EU border security. It examines this question by analysing a recent initiative of the European Commission proposing the establishment of EU ‘smart borders’. The analysis draws from a set of thinking tools developed by the sociology of association in the field of science and technology studies. The contribution argues that in order to grasp policy outcomes such as smart borders, security would benefit from adopting a compositional outlook on agency, where action is seen as the effect of associated entities. Looking at the smartening of EU borders, the piece finds that this process is held together by multiple translations and enrolments through which the technical side of dataveillance – platforms, automated gates, matching systems and so forth – has become associated to the processes of policymaking on border security, and sustains the furtherance of mass dataveillance.

Neihan Duanzi, literally meaning ‘implied jokes’, was a Chinese mobile app where people posted jokes, satirical videos, spoofs and mashups. It was a product of Toutiao, the owner of one of China’s largest news and information content... more

Neihan Duanzi, literally meaning ‘implied jokes’, was a Chinese mobile app where people
posted jokes, satirical videos, spoofs and mashups. It was a product of Toutiao, the owner of one of China’s largest news and information content platforms. Once valued at US$20 billion, this privately owned alternative to state-controlled media networks is also one of the country’s fastest-growing tech start-ups.

At its heart, surveillance is an expression of power. As we interact with a host of techniques to monitor and track our every move, we accept both subtle and overt nudges to alter our behavior. Parenting is, in particular, laden with... more

At its heart, surveillance is an expression of power. As we interact with a host of techniques to monitor and track our every move, we accept both subtle and
overt nudges to alter our behavior. Parenting is, in particular, laden with systems of power. Indeed, as hooks (2000) notes, the power relations between parent and child are a place of significant oppression. I draw from theories of surveillance to center the issue of power in Surveiller-Parenting by juxtaposing "Arkangel" with emerging forms of parental surveillance. I argue that Archangel" expresses contemporary anxieties about fragmentary and disparate techniques of surveillance by constructing a future of intensified networks of control which link the families, schools, and corporations under the logic of late capitalism.

In the years following the attacks on September 11th, 2001, the American government and other governmental democracies who fall victim to Americentric hegemony have eroded away many of the rights and civil liberties enjoyed by their... more

In the years following the attacks on September 11th, 2001, the American government and other governmental democracies who fall victim to Americentric hegemony have eroded away many of the rights and civil liberties enjoyed by their respective populaces in the name of increased security. Paramount to the effectiveness of security is surveillance, and surveillance as an institution, not just of our country, but of our world, has more than clearly made its way into our media. With this, we have seen the rise of Surveillance Dependant Media, media which

This work addresses the development of an underwater remotely operated vehicle (ROV), required to obtain reliable visual information, used for surveillance and maintenance of ship shells and underwater structures of Colombian port... more

This work addresses the development of an underwater remotely operated vehicle (ROV), required to obtain reliable visual information, used for surveillance and maintenance of ship shells and underwater structures of Colombian port facilities and oceanographic research. The most relevant design constraints were evaluated considering environmental conditions, dimensional restrictions, hydrostatics, hydrodynamics, degrees of freedom and the availability of instrumentation and control hardware. The mechanical/naval design was performed through an iterative process by using computational tools CAD/CAE/CFD. The hardware architecture was divided in three layers: instrumentation, communications and control. The software was developed using ANSI C with Embedded Linux operating system. The guidance and navigation system used the Kalman filter to estimate the state of the vehicle. The vehicle can operate in manual and semi-automatic modes. In the semi-automatic, the position of a joystick is c...

…It was first proposed in May 2019 by Chairman Eric Schmidt, head of National Security Commission on Artificial Intelligence (NSCAI), a subcommittee of the Department of Defense, to adopt China’s model in the use of AI for mass... more

…It was first proposed in May 2019 by Chairman Eric Schmidt, head of National Security Commission on Artificial Intelligence (NSCAI), a subcommittee of the Department of Defense, to adopt China’s model in the use of AI for mass surveillance and data collection. The vision of this project is meant to ‘strengthen the US economy by implementing AI as a means to compete against China.’ The main issue with this proposal is that it would require the U.S. to adopt a Communist model of draconian measures in order to install new infrastructure. We have seen this occur in the last three months here in the United States. but under different circumstances— COVID-19….

Theories of migration deterrence have long posited that border enforcement infrastructure pushes migration routes into more rugged and deadly terrain, driving an increase in migrant mortality. Applying geospatial analysis of landscape and... more

Theories of migration deterrence have long posited that border enforcement infrastructure pushes migration routes into more rugged and deadly terrain, driving an increase in migrant mortality. Applying geospatial analysis of landscape and human variables in one highly-trafficked corridor of the Arizona / Sonora border, we test whether the expansion of surveillance infrastructure has in fact shifted migrants’ routes toward areas that are more remote and difficult to traverse. We deploy a modeling methodology, typically used in archaeological and military science, to measure the energy expenditure of persons traversing the borderlands. Outcomes of this model are then compared to the changes in border infrastructure and records of fatality locations. Findings show that there is a significant correlation between the location of border surveillance technology, the routes taken by migrants, and the locations of recovered human remains in the southern Arizona desert. Placed in the context of ongoing efforts by the United States to geographically expand and concentrate border surveillance and enforcement infrastructure, we argue that this suggests a third “funnel effect” that has the outcome of maximizing the physiological toll imposed by the landscape on unauthorized migrants, long after migration routes have moved away from traditional urban crossing areas.

The advances in contemporary surveillance techniques have, for the past three decades, been bound with the development of cheap and efficient computational machines. These rapid changes in new media have made the task of theorising... more

The advances in contemporary surveillance techniques have, for the past three decades, been bound with the development of cheap and efficient computational machines. These rapid changes in new media have made the task of theorising surveillance pertinent once again. Michel Foucault’s Discipline and Punish (1995) is a seminal work in this respect. Although Foucault himself focuses on the development of disciplinary techniques in the 18th and 19th centuries, which has led some scholars to declare his model of identity formation to be outdated, his work is nevertheless more relevant than ever. A distinction must be made between Foucault’s historically contingent examples and the generalisable theoretical apparatus he builds on their basis. Both the panoptic principle and disciplinary methods espoused by Foucault can be located at the heart of digitally augmented surveillance (dataveillance) and they have been, moreover, significantly amplified. This does not mean that nothing has changed in the actual practices of surveillance. The panoptic principle no longer depends on architectural enclosures, and has proliferated outwards into public spaces and homes. Disciplinary techniques, too, are far from gone, but there has occurred a shift from the body, as their primary locus of application, to the individual’s ‘digital double’, inhabiting virtual spaces. Moreover, computer databases make possible a new procedure of normalisation by way of forecasting: the individual is not disciplined in real time but is predicted in advance, based on the digital trace left by his activities.

PurposeThis research analyzed the existing academic and grey literature concerning the technologies and practices of people analytics (PA), to understand how ethical considerations are being discussed by researchers, industry experts and... more

PurposeThis research analyzed the existing academic and grey literature concerning the technologies and practices of people analytics (PA), to understand how ethical considerations are being discussed by researchers, industry experts and practitioners, and to identify gaps, priorities and recommendations for ethical practice.Design/methodology/approachAn iterative “scoping review” method was used to capture and synthesize relevant academic and grey literature. This is suited to emerging areas of innovation where formal research lags behind evidence from professional or technical sources.FindingsAlthough the grey literature contains a growing stream of publications aimed at helping PA practitioners to “be ethical,” overall, research on ethical issues in PA is still at an early stage. Optimistic and technocentric perspectives dominate the PA discourse, although key themes seen in the wider literature on digital/data ethics are also evident. Risks and recommendations for PA projects co...