|
|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services > Surveillance services
Police Visibility presents empirically grounded research into how
police officers experience and manage the information politics of
surveillance and visibility generated by the introduction of body
cameras into their daily routines and the increasingly common
experience of being recorded by civilian bystanders. Newell
elucidates how these activities intersect with privacy, free
speech, and access to information law and argues that rather than
being emancipatory systems of police oversight, body-worn cameras
are an evolution in police image work and state surveillance
expansion. Throughout the book, he catalogs how surveillance
generates information, the control of which creates and facilitates
power and potentially fuels state domination. The antidote, he
argues, is robust information law and policy that puts the power to
monitor and regulate the police squarely in the hands of citizens.
What our health data tell American capitalism about our value-and
how that controls our lives. Afterlives of Data follows the curious
and multiple lives that our data live once they escape our control.
Mary F. E. Ebeling's ethnographic investigation shows how
information about our health and the debt that we carry becomes
biopolitical assets owned by healthcare providers, insurers,
commercial data brokers, credit reporting companies, and platforms.
By delving into the oceans of data built from everyday medical and
debt traumas, Ebeling reveals how data about our lives come to
affect our bodies and our life chances and to wholly define us.
Investigations into secretive data collection and breaches of
privacy by the likes of Cambridge Analytica have piqued concerns
among many Americans about exactly what is being done with their
data. From credit bureaus and consumer data brokers like Equifax
and Experian to the secretive military contractor Palantir, this
massive industry has little regulatory oversight for health data
and works to actively obscure how it profits from our data. In this
book, Ebeling traces the health data-medical information extracted
from patients' bodies-that are digitized and repackaged into new
data commodities that have afterlives in database lakes and oceans,
algorithms, and statistical models used to score patients on their
creditworthiness and riskiness. Critical and disturbing, Afterlives
of Data examines how Americans' data about their health and their
debt are used in the service of marketing and capitalist
surveillance.
A practical, user-friendly handbook for understanding and
protecting our personal data and digital privacy. Our Data,
Ourselves addresses a common and crucial question: What can we as
private individuals do to protect our personal information in a
digital world? In this practical handbook, legal expert Jacqueline
D. Lipton guides readers through important issues involving
technology, data collection, and digital privacy as they apply to
our daily lives. Our Data, Ourselves covers a broad range of
everyday privacy concerns with easily digestible, accessible
overviews and real-world examples. Lipton explores the ways we can
protect our personal data and monitor its use by corporations, the
government, and others. She also explains our rights regarding
sensitive personal data like health insurance records and credit
scores, as well as what information retailers can legally gather,
and how. Who actually owns our personal information? Can an
employer legally access personal emails? What privacy rights do we
have on social media? Answering these questions and more, Our Data,
Ourselves provides a strategic approach to assuming control over,
and ultimately protecting, our personal information.
Political discourse on immigration in the United States has largely
focused on what is most visible, including border walls and
detention centers, while the invisible information systems that
undergird immigration enforcement have garnered less attention.
Tracking the evolution of various surveillance-related systems
since the 1980s, Borderland Circuitry investigates how the
deployment of this information infrastructure has shaped
immigration enforcement practices. Ana Muniz illuminates three
phenomena that are becoming increasingly intertwined: digital
surveillance, immigration control, and gang enforcement. Using
ethnography, interviews, and analysis of documents never before
seen, Muniz uncovers how information-sharing partnerships between
local police, state and federal law enforcement, and foreign
partners collide to create multiple digital borderlands. Diving
deep into a select group of information systems, Borderland
Circuitry reveals how those with legal and political power deploy
the specter of violent cross-border criminals to justify intensive
surveillance, detention, brutality, deportation, and the
destruction of land for border militarization.
Threats of terrorism, natural disaster, identity theft, job loss,
illegal immigration, and even biblical apocalypse - all are perils
that trigger alarm in people today. Although there may be a factual
basis for many of these fears, they do not simply represent
objective conditions. Feelings of insecurity are instilled by
politicians and the media, and sustained by urban fortification,
technological surveillance, and economic vulnerability.
""Surveillance in the Time of Insecurity"" fuses advanced
theoretical accounts of state power and neoliberalism with original
research from the social settings in which insecurity dynamics play
out in the new century. Torin Monahan explores the
counterterrorism-themed show ""24"", Rapture fiction, traffic
control centers, security conferences, public housing, and gated
communities, and examines how each manifests complex relationships
of inequality, insecurity, and surveillance. Alleviating insecurity
requires that we confront its mythic dimensions, the politics
inherent in new configurations of security provision, and the
structural obstacles to achieving equality in societies.
 |
The Right to Privacy
(Hardcover)
Samuel D. Warren, Louis D. Brandeis; Foreword by Steven Alan Childress
|
R540
Discovery Miles 5 400
|
Ships in 18 - 22 working days
|
|
|
What limits, if any, should be placed on a government's efforts to
spy on its citizens in the name of national security? Spying on
foreigners has long been regarded as an unseemly but necessary
enterprise. Spying on one's own citizens in a democracy, by
contrast, has historically been subject to various forms of legal
and political restraint. For most of the twentieth century these
regimes were kept distinct. That position is no longer tenable.
Modern threats do not respect national borders. Changes in
technology make it impractical to distinguish between 'foreign' and
'local' communications. And our culture is progressively reducing
the sphere of activity that citizens can reasonably expect to be
kept from government eyes. The main casualty of this transformed
environment will be privacy. Recent battles over privacy have been
dominated by fights over warrantless electronic surveillance and
CCTV; the coming years will see debates over DNA databases, data
mining, and biometric identification. There will be protests and
lawsuits, editorials and elections resisting these attacks on
privacy. Those battles are worthy. But the war will be lost. Modern
threats increasingly require that governments collect such
information, governments are increasingly able to collect it, and
citizens increasingly accept that they will collect it. This book
proposes a move away from questions of whether governments should
collect information and onto more problematic and relevant
questions concerning its use. By reframing the relationship between
privacy and security in the language of a social contract, mediated
by a citizenry who are active participants rather than passive
targets, the book offers a framework to defend freedom without
sacrificing liberty.
Draws together contributions from leading figures in the field of
surveillance to engage in the discussion of the emergence of
accountability as a means to manage threats to privacy. The first
of its kind to enrich the debate about accountability and privacy
by drawing together perspectives from experienced privacy
researchers and policy makers.
The United Kingdom has more than 4.2 million public closed-circuit
television (CCTV) cameras-one for every fourteen citizens. Across
the United States, hundreds of video surveillance systems are being
installed in town centers, public transportation facilities, and
schools at a cost exceeding $100 million annually. And now other
Western countries have begun to experiment with CCTV to prevent
crime in public places. In light of this expansion and the
associated public expenditure, as well as pressing concerns about
privacy rights, there is an acute need for an evidence-based
approach to inform policy and practice.
Drawing on the highest-quality research, criminologists Brandon C.
Welsh and David P. Farrington assess the effectiveness and social
costs of not only CCTV, but also of other important surveillance
methods to prevent crime in public space, such as improved street
lighting, security guards, place managers, and defensible space.
Importantly, the book goes beyond the question of "Does it work?"
and examines the specific conditions and contexts under which these
surveillance methods may have an effect on crime as well as the
mechanisms that bring about a reduction in crime.
At a time when cities need cost-effective methods to fight crime
and the public gradually awakens to the burdens of sacrificing
their privacy and civil rights for security, Welsh and Farrington
provide this timely and reliable guide to the most effective and
non-invasive uses of surveillance to make public places safer from
crime.
Data Borders investigates entrenched and emerging borderland
technology that ensnares all people in an intimate web of
surveillance where data resides and defines citizenship. Detailing
the new trend of biologically mapping undocumented people through
biotechnologies, Melissa Villa-Nicholas shows how surreptitious
monitoring of Latinx immigrants is the focus of and driving force
behind Silicon Valley's growing industry within defense technology
manufacturing. Villa-Nicholas reveals a murky network that gathers
data on marginalized communities for purposes of exploitation and
control that implicates law enforcement, border patrol, and ICE,
but that also pulls in public workers and the general public, often
without their knowledge or consent. Enriched by interviews of
Latinx immigrants living in the borderlands who describe their
daily use of technology and their caution around surveillance, this
book argues that in order to move beyond a heavily surveilled state
that dehumanizes both immigrants and citizens, we must first
understand how our data is being collected, aggregated, correlated,
and weaponized with artificial intelligence and then push for
immigrant and citizen information privacy rights along the border
and throughout the United States.
This book is about explaining surveillance processes and practices
in contemporary society. Surveillance studies is a relatively new
multi-disciplinary enterprise that aims to understand who watches
who, how the watched participate in and sometimes question their
surveillance, why surveillance occurs, and with what effects. This
book brings together some of the world's leading surveillance
scholars to discuss the "why" question. The field has been
dominated, since the groundbreaking work of Michel Foucault, by the
idea of the panopticon and this book explores why this metaphor has
been central to discussions of surveillance, what is fruitful in
the panoptic approach, and what other possible approaches can throw
better light on the phenomena in question. Since the advent of
networked computer databases, and especially since 9/11, questions
of surveillance have come increasingly to the forefront of
democratic, political, and policy debates in the global north (and
to an extent in the glo
Since the 9.11 attacks in North America and the accession of the
Schengen Accord in Europe there has been widespread concern with
international borders, the passage of people and the flow of
information across borders. States have fundamentally changed the
ways in which they police and monitor this mobile population and
its personal data. This book brings together leading authorities in
the field who have been working on the common problem of policing
and surveillance at physical and virtual borders at a time of
increased perceived threat. It is concerned with both theoretical
and empirical aspects of the ways in which the modern state
attempts to control its borders and mobile population. It will be
essential reading for students, practitioners, policy makers.
News headlines about privacy invasions, discrimination, and biases
discovered in the platforms of big technology companies are
commonplace today, and big tech's reluctance to disclose how they
operate counteracts ideals of transparency, openness, and
accountability. This book is for computer science students and
researchers who want to study big tech's corporate surveillance
from an experimental, empirical, or quantitative point of view and
thereby contribute to holding big tech accountable. As a
comprehensive technical resource, it guides readers through the
corporate surveillance landscape and describes in detail how
corporate surveillance works, how it can be studied experimentally,
and what existing studies have found. It provides a thorough
foundation in the necessary research methods and tools, and
introduces the current research landscape along with a wide range
of open issues and challenges. The book also explains how to
consider ethical issues and how to turn research results into
real-world change.
Understand the CCPA (California Consumer Privacy Act) and how to
implement strategies to comply with this privacy regulation.
Established in June 2018, the CCPA was created to remedy the lack
of comprehensive privacy regulation in the state of California.
When it comes into effect on January 1, 2020, the CCPA will give
California residents the right to: Learn what personal data a
business has collected about them Understand who this data has been
disclosed to Find out whether their personal data has been sold to
third parties, and who these third parties are Opt-out of such data
transactions, or request that the data be deleted. Many
organizations that do business in the state of California must
align to the provisions of the CCPA. Much like the EU's GDPR
(General Data Protection Regulation), businesses that fail to
comply with the CCPA will face economic penalties. Prepare your
business for CCPA compliance with our implementation guide that:
Provides the reader with a comprehensive understanding of the
legislation by explaining key terms Explains how a business can
implement strategies to comply with the CCPA Discusses potential
developments of the CCPA to further aid compliance Your guide to
understanding the CCPA and how you can implement a strategy to
comply with this legislation - buy this book today to get the
guidance you need! About the author Preston Bukaty is an attorney
and consultant. He specializes in data privacy GRC projects, from
data inventory audits to gap analyses, contract management, and
remediation planning. His compliance background and experience
operationalizing compliance in a variety of industries give him a
strong understanding of the legal issues presented by international
regulatory frameworks. Having conducted more than 3,000 data
mapping audits, he also understands the practical realities of
project management in operationalizing compliance initiatives.
Preston's legal experience and enthusiasm for technology make him
uniquely suited to understanding the business impact of privacy
regulations such as the GDPR and the CCPA. He has advised more than
250 organizations engaged in businesses as varied as SaaS
platforms, mobile geolocation applications, GNSS/telematics tools,
financial institutions, fleet management software,
architectural/engineering design systems, and web hosting. He also
teaches certification courses on GDPR compliance and ISO 27001
implementation, and writes on data privacy law topics. Preston
lives in Denver, Colorado. Prior to working as a data privacy
consultant, he worked for an international GPS software company,
advising business areas on compliance issues across 140 countries.
Preston holds a juris doctorate from the University of Kansas
School of Law, along with a basketball signed by Hall of Fame coach
Bill Self.
Following the much publicised Mark Kennedy case, the question of
the necessity and proportionality of covert police operations has
been widely debated. At the same time, the use of covert tactics is
becoming more widespread and is a feature of routine as well as
more serious cases. It is a fast changing area of law which is
notoriously opaque and esoteric. This new edition of Covert
Policing: Law and Practice provides clear, up to date guidance on
this complex topic and is an essential resource for practitioners
working on cases involving covert operations. This book provides a
comprehensive review of the law governing covert policing
activities. It sets out the framework within which covert policing
operations should be planned and managed to enable practitioners
working for either the defence or prosecution to critically
consider the legality and propriety of evidence obtained in cases
where covert policing resources have been deployed, including
applications for Public Interest Immunity. The text places
considerable emphasis on the need for a proper methodology of
approach to the Regulation of Investigatory Powers Act 2000 and
other legislation affecting this area. It examines the statutory
and procedural requirements relating to covert policing
deployments, from the interception of communications and directed
and intrusive surveillance resources, through to the use and
conduct of covert human intelligence sources. It examines the
oversight mechanisms that exist to protect those subjected to
invasions of privacy without the proper criminal or civil processes
and covers recent developments arising from the Protection of
Freedoms Act, Data Retention and Investigatory Powers Act, secret
hearings, the Mark Kennedy case and revelations concerning mass
interception. Written in a way that seeks to highlight the effect
of the legislation and the principles emanating out of the case
law, this book is an essential resource for practitioners engaged
in cases where covert policing issues are likely to arise. It will
also be of assistance to those working for the police and other
public authorities authorised under the Regulation of Investigatory
Powers Act 2000 to carry out surveillance and other covert
activities.
|
|