|
|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services > Surveillance services
This book shows how surveillance society shapes and interacts with
journalistic practices and discourses. It illustrates not only how
surveillance debates play out in and through mediated discourses,
but also how practices of surveillance inform the stories, everyday
work and the ethics of journalists. The increasing entrenchment of
data collection and surveillance in all kinds of social processes
raises important questions around new threats to journalistic
freedom and political dissent; the responsibilities of media
organizations and state actors; the nature of journalists'
relationship to the state; journalists' ability to protect their
sources and data; and the ways in which media coverage shape public
perceptions of surveillance, to mention just a few areas of
concern. Against this backdrop, the contributions gathered in this
book examine areas including media coverage of surveillance,
encryption and privacy; journalists' views on surveillance and
security; public debate around the power of intelligence agencies,
and the strategies of privacy rights activists. The book raises
fundamental questions around the role of journalism in creating the
conditions for digital citizenship. The chapters in this book were
originally published in a special issue of the journal, Digital
Journalism.
One day in the spring of 2013, a box appeared outside a
fourth-floor apartment door in Brooklyn, New York. The recipient,
who didn't know the sender, only knew she was supposed to bring
this box to a friend, who would ferry it to another friend. This
was Edward Snowden's box-printouts of documents proving that the US
government had built a massive surveillance apparatus and used it
to spy on its own people-and the friend on the end of this chain
was filmmaker Laura Poitras. Thus the biggest national security
leak of the digital era was launched via a remarkably analog
network, the US Postal Service. This is just one of the odd, ironic
details that emerges from the story of how Jessica Bruder and Dale
Maharidge, two experienced journalists but security novices (and
the friends who received and ferried the box) got drawn into the
Snowden story as behind-the-scenes players. Their initially
stumbling, increasingly paranoid, and sometimes comic efforts to
help bring Snowden's leaks to light, and ultimately, to understand
their significance, unfold in an engrossing narrative that includes
emails and diary entries from Poitras. This is an illuminating
essay on the status of transparency, privacy, and trust in the age
of surveillance.
Suicides, excessive overtime, hostility and violence on the factory
floor in China. Drawing on vivid testimonies from rural migrant
workers, student interns, managers and trade union staff, Dying for
an iPhone is a devastating expose of two of the world's most
powerful companies: Foxconn and Apple. As the leading manufacturer
of iPhones, iPads and Kindles, and employing one million workers in
China alone, Taiwanese-invested Foxconn's drive to dominate global
electronics manufacturing has aligned perfectly with China's goal
of becoming the world leader in technology. This book reveals the
human cost of that ambition and what our demands for the newest and
best technology mean for workers. Foxconn workers have repeatedly
demonstrated their power to strike at key nodes of transnational
production, challenge management and the Chinese state, and
confront global tech behemoths. Dying for an iPhone allows us to
assess the impact of global capitalism's deepening crisis on
workers.
This book is about explaining surveillance processes and practices
in contemporary society. Surveillance studies is a relatively new
multi-disciplinary enterprise that aims to understand who watches
who, how the watched participate in and sometimes question their
surveillance, why surveillance occurs, and with what effects. This
book brings together some of the world's leading surveillance
scholars to discuss the why question. The field has been dominated,
since the groundbreaking work of Michel Foucault, by the idea of
the panopticon and this book explores why this metaphor has been
central to discussions of surveillance, what is fruitful in the
panoptic approach, and what other possible approaches can throw
better light on the phenomena in question. Since the advent of
networked computer databases, and especially since 9/11, questions
of surveillance have come increasingly to the forefront of
democratic, political and policy debates in the global north (and
to an extent in the global south). Civil liberties, democratic
participation and privacy are some of the issues that are raised by
these developments. adequate understanding of how, how well and
whether or not surveillance works. This book explores the
theoretical questions in a way that is grounded in and attuned to
empirical realities.
Since the 9.11 attacks in North America and the accession of the
Schengen Accord in Europe there has been widespread concern with
international borders, the passage of people and the flow of
information across borders. States have fundamentally changed the
ways in which they police and monitor this mobile population and
its personal data. This book brings together leading authorities in
the field who have been working on the common problem of policing
and surveillance at physical and virtual borders at a time of
increased perceived threat. It is concerned with both theoretical
and empirical aspects of the ways in which the modern state
attempts to control its borders and mobile population. It will be
essential reading for students, practitioners, policy makers.
Casino and Gaming Resort Investigations addresses the continued and
growing need for gaming security professionals to properly and
successfully investigate the increasing and unique types of crime
they will face in their careers. As the gaming industry has grown,
so has the need for competent and highly skilled investigators who
must be prepared to manage a case of employee theft one day to a
sophisticated sports book scam the next. This book provides the
reader with the fundamental knowledge needed to understand how each
gaming and non-gaming department functions and interacts within the
overall gaming resort, allowing the investigator to determine and
focus on the important elements of any investigation in any area.
Each chapter delivers a background of a department or type of crime
normally seen in the gaming environment, and then discusses what
should be considered important or even critical for the
investigator to know or determine in the course of the
investigation. Likely scenarios, case histories, and tips, as well
as cautions for investigators to be aware of, are used throughout
the book. This book was written for and directed at gaming security
and surveillance professionals, including gaming regulators, and
tribal gaming authorities, who are almost daily confronted by the
ingenious and the most common scams, theft, and frauds that are
perpetrated in the gaming world.
Today, public space has become a fruitful venue for surveillance of
many kinds. Emerging surveillance technologies used by governments,
corporations, and even individual members of the public are
reshaping the very nature of physical public space. Especially in
urban environments, the ability of individuals to remain private or
anonymous is being challenged. Surveillance, Privacy, and Public
Space problematizes our traditional understanding of 'public
space'. The chapter authors explore intertwined concepts to develop
current privacy theory and frame future scholarly debate on the
regulation of surveillance in public spaces. This book also
explores alternative understandings of the impacts that modern
living and technological progress have on the experience of being
in public, as well as the very nature of what public space really
is. Representing a range of disciplines and methods, this book
provides a broad overview of the changing nature of public space
and the complex interactions between emerging forms of surveillance
and personal privacy in these public spaces. It will appeal to
scholars and students in a variety of academic disciplines,
including sociology, surveillance studies, urban studies,
philosophy, law, communication and media studies, political
science, and criminology.
Collect data and build trust. With the rise of data science and
machine learning, companies are awash in customer data and powerful
new ways to gain insight from that data. But in the absence of
regulation and clear guidelines from most federal or state
governments, it's difficult for companies to understand what
qualifies as reasonable use and then determine how to act in the
best interest of their customers. How do they build, not erode,
trust? Customer Data and Privacy: The Insights You Need from
Harvard Business Review brings you today's most essential thinking
on customer data and privacy to help you understand the tangled
interdependencies and complexities of this evolving issue. The
lessons in this book will help you develop strategies that allow
your company to be a good steward, collecting, using, and storing
customer data responsibly. Business is changing. Will you adapt or
be left behind? Get up to speed and deepen your understanding of
the topics that are shaping your company's future with the Insights
You Need from Harvard Business Review series. Featuring HBR's
smartest thinking on fast-moving issues—blockchain,
cybersecurity, AI, and more—each book provides the
foundational introduction and practical case studies your
organization needs to compete today and collects the best research,
interviews, and analysis to get it ready for tomorrow. You can't
afford to ignore how these issues will transform the landscape of
business and society. The Insights You Need series will help you
grasp these critical ideas—and prepare you and your
company for the future.
In the 2020 CBC Massey Lectures, bestselling author and renowned
technology and security expert Ronald J. Deibert exposes the
disturbing influence and impact of the internet on politics, the
economy, the environment, and humanity. Digital technologies have
given rise to a new machine-based civilization that is increasingly
linked to a growing number of social and political maladies.
Accountability is weak and insecurity is endemic, creating
disturbing opportunities for exploitation. Drawing from the
cutting-edge research of the Citizen Lab, the world-renowned
digital security research group which he founded and directs,
Ronald J. Deibert exposes the impacts of this communications
ecosystem on civil society. He tracks a mostly unregulated
surveillance industry, innovations in technologies of remote
control, superpower policing practices, dark PR firms, and highly
profitable hack-for-hire services feeding off rivers of poorly
secured personal data. Deibert also unearths how dependence on
social media and its expanding universe of consumer electronics
creates immense pressure on the natural environment. In order to
combat authoritarian practices, environmental degradation, and
rampant electronic consumerism, he urges restraints on tech
platforms and governments to reclaim the internet for civil
society.
One day in the spring of 2013, a box appeared outside a
fourth-floor apartment door in Brooklyn, New York. The recipient,
who didn't know the sender, only knew she was supposed to bring
this box to a friend, who would ferry it to another friend. This
was Edward Snowden's box-printouts of documents proving that the US
government had built a massive surveillance apparatus and used it
to spy on its own people-and the friend on the end of this chain
was filmmaker Laura Poitras. Thus the biggest national security
leak of the digital era was launched via a remarkably analog
network, the US Postal Service. This is just one of the odd, ironic
details that emerges from the story of how Jessica Bruder and Dale
Maharidge, two experienced journalists but security novices (and
the friends who received and ferried the box) got drawn into the
Snowden story as behind-the-scenes players. Their initially
stumbling, increasingly paranoid, and sometimes comic efforts to
help bring Snowden's leaks to light, and ultimately, to understand
their significance, unfold in an engrossing narrative that includes
emails and diary entries from Poitras. This is an illuminating
essay on the status of transparency, privacy, and trust in the age
of surveillance.
From the highly acclaimed author of WAYS OF BEING. We live in times
of increasing inscrutability. Our news feeds are filled with
unverified, unverifiable speculation, much of it automatically
generated by anonymous software. As a result, we no longer
understand what is happening around us. Underlying all of these
trends is a single idea: the belief that quantitative data can
provide a coherent model of the world, and the efficacy of
computable information to provide us with ways of acting within it.
Yet the sheer volume of information available to us today reveals
less than we hope. Rather, it heralds a new Dark Age: a world of
ever-increasing incomprehension. In his brilliant new work, leading
artist and writer James Bridle offers us a warning against the
future in which the contemporary promise of a new technologically
assisted Enlightenment may just deliver its opposite: an age of
complex uncertainty, predictive algorithms, surveillance, and the
hollowing out of empathy. Surveying the history of art, technology
and information systems he reveals the dark clouds that gather over
discussions of the digital sublime.
News headlines about privacy invasions, discrimination, and biases
discovered in the platforms of big technology companies are
commonplace today, and big tech's reluctance to disclose how they
operate counteracts ideals of transparency, openness, and
accountability. This book is for computer science students and
researchers who want to study big tech's corporate surveillance
from an experimental, empirical, or quantitative point of view and
thereby contribute to holding big tech accountable. As a
comprehensive technical resource, it guides readers through the
corporate surveillance landscape and describes in detail how
corporate surveillance works, how it can be studied experimentally,
and what existing studies have found. It provides a thorough
foundation in the necessary research methods and tools, and
introduces the current research landscape along with a wide range
of open issues and challenges. The book also explains how to
consider ethical issues and how to turn research results into
real-world change.
What our health data tell American capitalism about our value-and
how that controls our lives. Afterlives of Data follows the curious
and multiple lives that our data live once they escape our control.
Mary F. E. Ebeling's ethnographic investigation shows how
information about our health and the debt that we carry becomes
biopolitical assets owned by healthcare providers, insurers,
commercial data brokers, credit reporting companies, and platforms.
By delving into the oceans of data built from everyday medical and
debt traumas, Ebeling reveals how data about our lives come to
affect our bodies and our life chances and to wholly define us.
Investigations into secretive data collection and breaches of
privacy by the likes of Cambridge Analytica have piqued concerns
among many Americans about exactly what is being done with their
data. From credit bureaus and consumer data brokers like Equifax
and Experian to the secretive military contractor Palantir, this
massive industry has little regulatory oversight for health data
and works to actively obscure how it profits from our data. In this
book, Ebeling traces the health data-medical information extracted
from patients' bodies-that are digitized and repackaged into new
data commodities that have afterlives in database lakes and oceans,
algorithms, and statistical models used to score patients on their
creditworthiness and riskiness. Critical and disturbing, Afterlives
of Data examines how Americans' data about their health and their
debt are used in the service of marketing and capitalist
surveillance.
It's a basic human right to feel and be safe in your
community-where you live, work and play. But, few people know or
understand everything it takes to make this possible. Safe City
details the concerted effort and integration of new technology it
takes to make communities safer for everyone. From fire departments
detecting fires within seconds with thermal imaging to police
departments detecting gunfire immediately through gunshot detection
sensors, technology continues to evolve daily. Even surveillance
cameras have taken great strides from the grainy images of years
past, and just one camera can make a difference (read about how
police identified the Boston Marathon bombers through a department
store's video camera inside!). Safe City teaches the public how to
harden targets and protect their homes, businesses, communities,
themselves, and their loved ones. It takes a community effort to
help reduce and prevent crime, and Safe City answers the questions
people have along with pointing out many more that should be asked.
This volume examines the relationship between privacy, surveillance
and security, and the alleged privacy-security trade-off, focusing
on the citizen's perspective. Recent revelations of mass
surveillance programmes clearly demonstrate the ever-increasing
capabilities of surveillance technologies. The lack of serious
reactions to these activities shows that the political will to
implement them appears to be an unbroken trend. The resulting move
into a surveillance society is, however, contested for many
reasons. Are the resulting infringements of privacy and other human
rights compatible with democratic societies? Is security
necessarily depending on surveillance? Are there alternative ways
to frame security? Is it possible to gain in security by giving up
civil liberties, or is it even necessary to do so, and do citizens
adopt this trade-off? This volume contributes to a better and
deeper understanding of the relation between privacy, surveillance
and security, comprising in-depth investigations and studies of the
common narrative that more security can only come at the expense of
sacrifice of privacy. The book combines theoretical research with a
wide range of empirical studies focusing on the citizen's
perspective. It presents empirical research exploring factors and
criteria relevant for the assessment of surveillance technologies.
The book also deals with the governance of surveillance
technologies. New approaches and instruments for the regulation of
security technologies and measures are presented, and
recommendations for security policies in line with ethics and
fundamental rights are discussed. This book will be of much
interest to students of surveillance studies, critical security
studies, intelligence studies, EU politics and IR in general. A PDF
version of this book is available for free in open access via
www.tandfebooks.com. It has been made available under a Creative
Commons Attribution-Non Commercial 3.0 license.
What limits, if any, should be placed on a government's efforts to
spy on its citizens in the interests of national security? Spying
on foreigners has long been regarded as an unseemly but necessary
enterprise. Spying on one's own citizens in a democracy, by
contrast, has historically been subject to various forms of legal
and political restraint. For most of the twentieth century these
regimes were kept distinct. That position is no longer tenable.
Modern threats do not respect national borders. Changes in
technology make it impractical to distinguish between 'foreign' and
'local' communications. And our culture is progressively reducing
the sphere of activity that citizens can reasonably expect to be
kept from government eyes. The main casualty of this transformed
environment will be privacy. Recent battles over privacy have been
dominated by fights over warrantless electronic surveillance or
CCTV; the coming years will see debates over data-mining and
biometric identification. There will be protests and lawsuits,
editorials and elections resisting these attacks on privacy. Those
battles are worthy. But they will all be lost. Modern threats
increasingly require that governments collect such information,
governments are increasingly able to collect it, and citizens
increasingly accept that they will collect it. The point of this
book is to shift focus away from questions of whether governments
should collect information and onto more problematic and relevant
questions concerning its use. By reframing the relationship between
privacy and security in the language of a social contract, mediated
by a citizenry who are active participants rather than passive
targets, the book offers a framework to defend freedom without
sacrificing liberty.
Almost all incidences of cheating, theft, fraud, or loss can be detected through the surveillance of critical transactions, audit observations, and reviews of key metrics. Providing proven-techniques for detecting and mitigating the ever-evolving threats to casino security, this book covers the core skills, knowledge, and techniques needed to protect casino assets, guests, and employees.
Drawing on the authors’ six decades of combined experience in the industry, Casino Security and Gaming Surveillance identifies the most common threats to casino security and provides specific solutions for addressing these threats. From physical security and security management to table and gaming surveillance, it details numerous best practice techniques, strategies, and tactics, in addition to the metrics required to effectively monitor operations. The authors highlight valuable investigation tools, including interview techniques and evidence gathering. They also cover IOU patrol, tri-shot coverage, surveillance audits, threat analysis, card counting, game protection techniques, players’ club theft and fraud, surveillance standard operating procedures, nightclub and bar security, as well as surveillance training.
Complete with a glossary of gaming terms and a resource-rich appendix that includes helpful forms, this book covers everything surveillance and security professionals need to know to avoid high-profile incidents, costly compliance violations and damage to property and revenue.
Table of Contents
Section I: Surveillance in Gaming Operations
Chapter 1: Camera Operational Techniques
Chapter 2: Game Protection
Chapter 3: Internal Theft and Fraud
Chapter 4: Security Surveillance
Chapter 5: Standard Operating Procedures
Chapter 6: Investigations
Chapter 7: Surveillance Training and Education
Chapter 8: Statistical Information and Analysis
Chapter 9: Surveillance in the Future
Section II: Physical Security in Gaming Operations
Chapter 10: The Gaming Security Officer’s Role
Chapter 11: Security Patrols and Assignments in the Gaming Environment
Chapter 12: Alcohol and the Gaming Environment
Chapter 13: Table Game Fills, Credits, Drops, and Money
Chapter 14: Managing and Controlling Incidents
Chapter 15: Removing Undesirables
Chapter 16: Arrests and Detainments
Chapter 17: Theft, Larceny, and Other Property Crimes
Chapter 18: The Major Security Incident
Chapter 19: Training Gaming Security Officers
Chapter 20: Common Casino Scams and Crimes
Chapter 21: Managing Casino Security
Public, Private, Secret explores the roles that photography and
video play in the crafting of identity, and the reconfiguration of
social conventions that define our public and private selves.
Consciously framed by our present era, this collection of essays,
interviews, and reflections assesses how our image-making and
consumption patterns are embedded and implicated in a wider matrix
of online behavior and social codes, which in turn give images a
life of their own. Within this context, our visual creations and
online activities blur and remove conventional delineations between
public and private (and sometimes secret) expression; in fact, they
multiply and expand the number of potential selves in the
contemporary image-centric world. The writings address the various
disruptions, resistances, and subversions that artists propose to
the limited versions of race, gender, sexuality, and autonomy that
populate mainstream popular culture. In so doing, they anticipate a
future for our image-world rich with diversity and alterity, one
that can be shaped and influenced by the agency of self-
representation.
This is a volume of original contributions from scholars in eight
different humanities and social science disciplines. The aim of the
book is to present a range of surveillance technologies used in
everyday life and investigate the politics of their use. It is
truly an interdisciplinary project that will find purchase in
courses on security studies and the sociology of culture and the
sociology of science. Courses on security studies and its impact on
culture can be found in a variety of academic departments including
STS, criminology, sociology, women's studies, anthropology,
political science and justice studies.
|
You may like...
The Kingdom
Jo Nesbo
Paperback
(1)
R371
Discovery Miles 3 710
Monstrosity
Laura Diaz de Arce
Hardcover
R583
Discovery Miles 5 830
Overkill
Sandra Brown
Paperback
R488
R460
Discovery Miles 4 600
Genesis
Chris Carter
Paperback
R425
R377
Discovery Miles 3 770
|