|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services > Surveillance services
Threats of terrorism, natural disaster, identity theft, job loss,
illegal immigration, and even biblical apocalypse - all are perils
that trigger alarm in people today. Although there may be a factual
basis for many of these fears, they do not simply represent
objective conditions. Feelings of insecurity are instilled by
politicians and the media, and sustained by urban fortification,
technological surveillance, and economic vulnerability.
""Surveillance in the Time of Insecurity"" fuses advanced
theoretical accounts of state power and neoliberalism with original
research from the social settings in which insecurity dynamics play
out in the new century. Torin Monahan explores the
counterterrorism-themed show ""24"", Rapture fiction, traffic
control centers, security conferences, public housing, and gated
communities, and examines how each manifests complex relationships
of inequality, insecurity, and surveillance. Alleviating insecurity
requires that we confront its mythic dimensions, the politics
inherent in new configurations of security provision, and the
structural obstacles to achieving equality in societies.
Suicides, excessive overtime, hostility and violence on the factory
floor in China. Drawing on vivid testimonies from rural migrant
workers, student interns, managers and trade union staff, Dying for
an iPhone is a devastating expose of two of the world's most
powerful companies: Foxconn and Apple. As the leading manufacturer
of iPhones, iPads and Kindles, and employing one million workers in
China alone, Taiwanese-invested Foxconn's drive to dominate global
electronics manufacturing has aligned perfectly with China's goal
of becoming the world leader in technology. This book reveals the
human cost of that ambition and what our demands for the newest and
best technology mean for workers. Foxconn workers have repeatedly
demonstrated their power to strike at key nodes of transnational
production, challenge management and the Chinese state, and
confront global tech behemoths. Dying for an iPhone allows us to
assess the impact of global capitalism's deepening crisis on
workers.
 |
1984
(Paperback)
George Orwell
|
R198
R179
Discovery Miles 1 790
Save R19 (10%)
|
Ships in 12 - 17 working days
|
|
This Scholastic Classics edition of George Orwell's classic
dystopian novel is perfect for students and Orwell enthusiasts
alike. Who controls the past controls the future. Who controls the
present controls the past. Winston Smith has always been a dutiful
citizen of Oceania, rewriting history to meet the demands of the
Ministry of Truth. But with each lie that he writes, Winston starts
to resent the totalitarian party that seeks power for its own sake
and punishes those that desire individuality. When Winston begins a
secret relationship with his colleague Julia, he soon realises it's
virtually impossible to escape the watchful eye of Big Brother...
Totalitarianism, identity and independence, repression, power,
language, rebellion, technology and modernisation are some of the
themes that run throughout this novel.
 |
The Right to Privacy
(Hardcover)
Samuel D. Warren, Louis D. Brandeis; Foreword by Steven Alan Childress
|
R580
Discovery Miles 5 800
|
Ships in 10 - 15 working days
|
|
What limits, if any, should be placed on a government's efforts to
spy on its citizens in the name of national security? Spying on
foreigners has long been regarded as an unseemly but necessary
enterprise. Spying on one's own citizens in a democracy, by
contrast, has historically been subject to various forms of legal
and political restraint. For most of the twentieth century these
regimes were kept distinct. That position is no longer tenable.
Modern threats do not respect national borders. Changes in
technology make it impractical to distinguish between 'foreign' and
'local' communications. And our culture is progressively reducing
the sphere of activity that citizens can reasonably expect to be
kept from government eyes. The main casualty of this transformed
environment will be privacy. Recent battles over privacy have been
dominated by fights over warrantless electronic surveillance and
CCTV; the coming years will see debates over DNA databases, data
mining, and biometric identification. There will be protests and
lawsuits, editorials and elections resisting these attacks on
privacy. Those battles are worthy. But the war will be lost. Modern
threats increasingly require that governments collect such
information, governments are increasingly able to collect it, and
citizens increasingly accept that they will collect it. This book
proposes a move away from questions of whether governments should
collect information and onto more problematic and relevant
questions concerning its use. By reframing the relationship between
privacy and security in the language of a social contract, mediated
by a citizenry who are active participants rather than passive
targets, the book offers a framework to defend freedom without
sacrificing liberty.
Draws together contributions from leading figures in the field of
surveillance to engage in the discussion of the emergence of
accountability as a means to manage threats to privacy. The first
of its kind to enrich the debate about accountability and privacy
by drawing together perspectives from experienced privacy
researchers and policy makers.
The United Kingdom has more than 4.2 million public closed-circuit
television (CCTV) cameras-one for every fourteen citizens. Across
the United States, hundreds of video surveillance systems are being
installed in town centers, public transportation facilities, and
schools at a cost exceeding $100 million annually. And now other
Western countries have begun to experiment with CCTV to prevent
crime in public places. In light of this expansion and the
associated public expenditure, as well as pressing concerns about
privacy rights, there is an acute need for an evidence-based
approach to inform policy and practice.
Drawing on the highest-quality research, criminologists Brandon C.
Welsh and David P. Farrington assess the effectiveness and social
costs of not only CCTV, but also of other important surveillance
methods to prevent crime in public space, such as improved street
lighting, security guards, place managers, and defensible space.
Importantly, the book goes beyond the question of "Does it work?"
and examines the specific conditions and contexts under which these
surveillance methods may have an effect on crime as well as the
mechanisms that bring about a reduction in crime.
At a time when cities need cost-effective methods to fight crime
and the public gradually awakens to the burdens of sacrificing
their privacy and civil rights for security, Welsh and Farrington
provide this timely and reliable guide to the most effective and
non-invasive uses of surveillance to make public places safer from
crime.
A powerful and urgent call to action: to improve our lives and our
societies, we must demand open access to data for all. Information
is power, and the time is now for digital liberation. Access Rules
mounts a strong and hopeful argument for how informational tools at
present in the hands of a few could instead become empowering
machines for everyone. By forcing data-hoarding companies to open
access to their data, we can reinvigorate both our economy and our
society. Authors Viktor Mayer-Schoenberger and Thomas Ramge contend
that if we disrupt monopoly power and create a level playing field,
digital innovations can emerge to benefit us all. Over the past
twenty years, Big Tech has managed to centralize the most relevant
data on their servers, as data has become the most important raw
material for innovation. However, dominant oligopolists like
Facebook, Amazon, and Google, in contrast with their reputation as
digital pioneers, are actually slowing down innovation and progress
by withholding data for the benefit of their shareholders--at the
expense of customers, the economy, and society. As Access Rules
compellingly argues, ultimately it is up to us to force information
giants, wherever they are located, to open their treasure troves of
data to others. In order for us to limit global warming, contain a
virus like COVID-19, or successfully fight poverty,
everyone-including citizens and scientists, start-ups and
established companies, as well as the public sector and NGOs-must
have access to data. When everyone has access to the informational
riches of the data age, the nature of digital power will change.
Information technology will find its way back to its original
purpose: empowering all of us to use information so we can thrive
as individuals and as societies.
This book is about explaining surveillance processes and practices
in contemporary society. Surveillance studies is a relatively new
multi-disciplinary enterprise that aims to understand who watches
who, how the watched participate in and sometimes question their
surveillance, why surveillance occurs, and with what effects. This
book brings together some of the world's leading surveillance
scholars to discuss the "why" question. The field has been
dominated, since the groundbreaking work of Michel Foucault, by the
idea of the panopticon and this book explores why this metaphor has
been central to discussions of surveillance, what is fruitful in
the panoptic approach, and what other possible approaches can throw
better light on the phenomena in question. Since the advent of
networked computer databases, and especially since 9/11, questions
of surveillance have come increasingly to the forefront of
democratic, political, and policy debates in the global north (and
to an extent in the glo
Since the 9.11 attacks in North America and the accession of the
Schengen Accord in Europe there has been widespread concern with
international borders, the passage of people and the flow of
information across borders. States have fundamentally changed the
ways in which they police and monitor this mobile population and
its personal data. This book brings together leading authorities in
the field who have been working on the common problem of policing
and surveillance at physical and virtual borders at a time of
increased perceived threat. It is concerned with both theoretical
and empirical aspects of the ways in which the modern state
attempts to control its borders and mobile population. It will be
essential reading for students, practitioners, policy makers.
Understand the CCPA (California Consumer Privacy Act) and how to
implement strategies to comply with this privacy regulation.
Established in June 2018, the CCPA was created to remedy the lack
of comprehensive privacy regulation in the state of California.
When it comes into effect on January 1, 2020, the CCPA will give
California residents the right to: Learn what personal data a
business has collected about them Understand who this data has been
disclosed to Find out whether their personal data has been sold to
third parties, and who these third parties are Opt-out of such data
transactions, or request that the data be deleted. Many
organizations that do business in the state of California must
align to the provisions of the CCPA. Much like the EU's GDPR
(General Data Protection Regulation), businesses that fail to
comply with the CCPA will face economic penalties. Prepare your
business for CCPA compliance with our implementation guide that:
Provides the reader with a comprehensive understanding of the
legislation by explaining key terms Explains how a business can
implement strategies to comply with the CCPA Discusses potential
developments of the CCPA to further aid compliance Your guide to
understanding the CCPA and how you can implement a strategy to
comply with this legislation - buy this book today to get the
guidance you need! About the author Preston Bukaty is an attorney
and consultant. He specializes in data privacy GRC projects, from
data inventory audits to gap analyses, contract management, and
remediation planning. His compliance background and experience
operationalizing compliance in a variety of industries give him a
strong understanding of the legal issues presented by international
regulatory frameworks. Having conducted more than 3,000 data
mapping audits, he also understands the practical realities of
project management in operationalizing compliance initiatives.
Preston's legal experience and enthusiasm for technology make him
uniquely suited to understanding the business impact of privacy
regulations such as the GDPR and the CCPA. He has advised more than
250 organizations engaged in businesses as varied as SaaS
platforms, mobile geolocation applications, GNSS/telematics tools,
financial institutions, fleet management software,
architectural/engineering design systems, and web hosting. He also
teaches certification courses on GDPR compliance and ISO 27001
implementation, and writes on data privacy law topics. Preston
lives in Denver, Colorado. Prior to working as a data privacy
consultant, he worked for an international GPS software company,
advising business areas on compliance issues across 140 countries.
Preston holds a juris doctorate from the University of Kansas
School of Law, along with a basketball signed by Hall of Fame coach
Bill Self.
This volume examines the relationship between privacy, surveillance
and security, and the alleged privacy-security trade-off, focusing
on the citizen's perspective. Recent revelations of mass
surveillance programmes clearly demonstrate the ever-increasing
capabilities of surveillance technologies. The lack of serious
reactions to these activities shows that the political will to
implement them appears to be an unbroken trend. The resulting move
into a surveillance society is, however, contested for many
reasons. Are the resulting infringements of privacy and other human
rights compatible with democratic societies? Is security
necessarily depending on surveillance? Are there alternative ways
to frame security? Is it possible to gain in security by giving up
civil liberties, or is it even necessary to do so, and do citizens
adopt this trade-off? This volume contributes to a better and
deeper understanding of the relation between privacy, surveillance
and security, comprising in-depth investigations and studies of the
common narrative that more security can only come at the expense of
sacrifice of privacy. The book combines theoretical research with a
wide range of empirical studies focusing on the citizen's
perspective. It presents empirical research exploring factors and
criteria relevant for the assessment of surveillance technologies.
The book also deals with the governance of surveillance
technologies. New approaches and instruments for the regulation of
security technologies and measures are presented, and
recommendations for security policies in line with ethics and
fundamental rights are discussed. This book will be of much
interest to students of surveillance studies, critical security
studies, intelligence studies, EU politics and IR in general. A PDF
version of this book is available for free in open access via
www.tandfebooks.com. It has been made available under a Creative
Commons Attribution-Non Commercial 3.0 license.
Following the much publicised Mark Kennedy case, the question of
the necessity and proportionality of covert police operations has
been widely debated. At the same time, the use of covert tactics is
becoming more widespread and is a feature of routine as well as
more serious cases. It is a fast changing area of law which is
notoriously opaque and esoteric. This new edition of Covert
Policing: Law and Practice provides clear, up to date guidance on
this complex topic and is an essential resource for practitioners
working on cases involving covert operations. This book provides a
comprehensive review of the law governing covert policing
activities. It sets out the framework within which covert policing
operations should be planned and managed to enable practitioners
working for either the defence or prosecution to critically
consider the legality and propriety of evidence obtained in cases
where covert policing resources have been deployed, including
applications for Public Interest Immunity. The text places
considerable emphasis on the need for a proper methodology of
approach to the Regulation of Investigatory Powers Act 2000 and
other legislation affecting this area. It examines the statutory
and procedural requirements relating to covert policing
deployments, from the interception of communications and directed
and intrusive surveillance resources, through to the use and
conduct of covert human intelligence sources. It examines the
oversight mechanisms that exist to protect those subjected to
invasions of privacy without the proper criminal or civil processes
and covers recent developments arising from the Protection of
Freedoms Act, Data Retention and Investigatory Powers Act, secret
hearings, the Mark Kennedy case and revelations concerning mass
interception. Written in a way that seeks to highlight the effect
of the legislation and the principles emanating out of the case
law, this book is an essential resource for practitioners engaged
in cases where covert policing issues are likely to arise. It will
also be of assistance to those working for the police and other
public authorities authorised under the Regulation of Investigatory
Powers Act 2000 to carry out surveillance and other covert
activities.
Today, public space has become a fruitful venue for surveillance of
many kinds. Emerging surveillance technologies used by governments,
corporations, and even individual members of the public are
reshaping the very nature of physical public space. Especially in
urban environments, the ability of individuals to remain private or
anonymous is being challenged. Surveillance, Privacy, and Public
Space problematizes our traditional understanding of 'public
space'. The chapter authors explore intertwined concepts to develop
current privacy theory and frame future scholarly debate on the
regulation of surveillance in public spaces. This book also
explores alternative understandings of the impacts that modern
living and technological progress have on the experience of being
in public, as well as the very nature of what public space really
is. Representing a range of disciplines and methods, this book
provides a broad overview of the changing nature of public space
and the complex interactions between emerging forms of surveillance
and personal privacy in these public spaces. It will appeal to
scholars and students in a variety of academic disciplines,
including sociology, surveillance studies, urban studies,
philosophy, law, communication and media studies, political
science, and criminology.
This book shows how surveillance society shapes and interacts with
journalistic practices and discourses. It illustrates not only how
surveillance debates play out in and through mediated discourses,
but also how practices of surveillance inform the stories, everyday
work and the ethics of journalists. The increasing entrenchment of
data collection and surveillance in all kinds of social processes
raises important questions around new threats to journalistic
freedom and political dissent; the responsibilities of media
organizations and state actors; the nature of journalists'
relationship to the state; journalists' ability to protect their
sources and data; and the ways in which media coverage shape public
perceptions of surveillance, to mention just a few areas of
concern. Against this backdrop, the contributions gathered in this
book examine areas including media coverage of surveillance,
encryption and privacy; journalists' views on surveillance and
security; public debate around the power of intelligence agencies,
and the strategies of privacy rights activists. The book raises
fundamental questions around the role of journalism in creating the
conditions for digital citizenship. The chapters in this book were
originally published in a special issue of the journal, Digital
Journalism.
|
You may like...
Run Run Rudie
Babylove & the Van Dangos
CD
R280
Discovery Miles 2 800
Holy Fvck
Demi Lovato
CD
R462
Discovery Miles 4 620
|