-
1
-
-
23844435126
-
Secured and Sorted Mobilities: Examples from the Airport
-
Adey, P. 2004. Secured and Sorted Mobilities: Examples from the Airport. Surveillance & Society 1 (4): 500–519.
-
(2004)
Surveillance & Society
, vol.1
, Issue.4
, pp. 500-519
-
-
Adey, P.1
-
2
-
-
41849093342
-
Online Social Networking as Participatory Surveillance
-
Albrechtslund, Anders. 2008. Online Social Networking as Participatory Surveillance. First Monday 13 (3). http://firstmonday.org/ojs/index.php/fm/article/view/2142.
-
(2008)
First Monday
, vol.13
, Issue.3
-
-
Albrechtslund, A.1
-
3
-
-
84937618834
-
-
Spiegel Online, 29 December 2013. Accessed June 30, 2014:
-
Appelbaum, Jacob, Judith Horchert, and Christian Stöcker. 2013. Catalog Reveals NSA Has Back Doors for Numerous Devices. Spiegel Online, 29 December 2013. Accessed June 30, 2014: http://www.spiegel.de/international/world/catalog-revealsnsa-has-back-doors-for-numerous-devices-a-940994.html.
-
(2013)
Catalog Reveals NSA has Back Doors for Numerous Devices
-
-
Appelbaum, J.1
Horchert, J.2
Christian, S.3
-
5
-
-
84901508798
-
After Snowden: Rethinking the Impact of Surveillance
-
Bauman, Zygmunt, Didier Bigo, Paulo Esteves, Elspeth Guild, Vivienne Jabri, David Lyon, and R. B. J. Walker. 2014. After Snowden: Rethinking the Impact of Surveillance. International Political Sociology 8 (2): 121–44.
-
(2014)
International Political Sociology
, vol.8
, Issue.2
, pp. 121-144
-
-
Bauman, Z.1
Bigo, D.2
Esteves, P.3
Guild, E.4
Jabri, V.5
Lyon, D.6
Walker, R.B.7
-
6
-
-
84937618835
-
-
De Correspondent. Accessed June 27, 2014:
-
Berger, Lynn. 2014. Zo Kunnen We Beter over Surveillance Praten. De Correspondent. Accessed June 27, 2014: https://decorrespondent.nl/1237/zo-kunnen-we-beter-over-surveillance-praten/41215603-67a22001.
-
(2014)
Zo Kunnen We Beter over Surveillance Praten
-
-
Berger, L.1
-
7
-
-
84937618836
-
-
April 4. Accessed June 30 2014:
-
Berry, David. 2014. Stunlaw: The Antinomies of Computation. April 4. Accessed June 30 2014: http://stunlaw.blogspot.nl/2014/04/the-antinomies-of-computation.html.
-
(2014)
Stunlaw: The Antinomies of Computation
-
-
Berry, D.1
-
8
-
-
84905020793
-
-
Nrc.nl, November 23. Accessed June 27, 2014:
-
Boon, Floor, Deriz, Steven, Modderkolk, Huub. 2014. NSA Infected 50,000 Computer Networks with Malicious Software. Nrc.nl, November 23. Accessed June 27, 2014: http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computernetworks-with-malicious-software/.
-
(2014)
NSA Infected 50,000 Computer Networks with Malicious Software
-
-
Boon, F.1
Deriz, S.2
Modderkolk, H.3
-
9
-
-
77956641656
-
The Post-Panoptic Society? Reassessing Foucault in Surveillance Studies
-
Caluya, Gilbert. 2010. The Post-Panoptic Society? Reassessing Foucault in Surveillance Studies. Social Identities 16 (5): 621–33.
-
(2010)
Social Identities
, vol.16
, Issue.5
, pp. 621-633
-
-
Caluya, G.1
-
11
-
-
84937618837
-
-
Wendy Hui Kyong Chun: Habitual New Media. Barnard College in New York City, October 10. Accessed January 12, 2015:
-
Chun, Wendy, Hui Kyong. 2013. Wendy Hui Kyong Chun: Habitual New Media. Barnard College in New York City, October 10. Accessed January 12, 2015: http://vimeo.com/78287998.
-
(2013)
-
-
Chun, W.1
Kyong, H.2
-
15
-
-
84863113682
-
Locational Privacy in Public Spaces: Media Discourses on Location-Aware Mobile Technologies
-
De Souzae, Silva Adriana, and Jordan Frith. 2010. Locational Privacy in Public Spaces: Media Discourses on Location-Aware Mobile Technologies. Communication, Culture & Critique 3 (4): 503–25.
-
(2010)
Communication, Culture & Critique
, vol.3
, Issue.4
, pp. 503-525
-
-
De, S.1
Adriana, S.2
Frith, J.3
-
17
-
-
84905020648
-
Creative Misuse as Resistance: Surveillance, Mobile Technologies, and Locative Games
-
Farman, Jason. 2014. Creative Misuse as Resistance: Surveillance, Mobile Technologies, and Locative Games. Surveillance & Society 12 (3): 377–88.
-
(2014)
Surveillance & Society
, vol.12
, Issue.3
, pp. 377-388
-
-
Farman, J.1
-
25
-
-
78649238620
-
Profiling the Mobile Customer - Is Industry Self-Regulation Adequate to Protect Consumer Privacy When Behavioural Advertisers Target Mobile Phones? - Part II
-
King, Nancy J., and Pernille Wegener Jessen. 2010. Profiling the Mobile Customer - Is Industry Self-Regulation Adequate to Protect Consumer Privacy When Behavioural Advertisers Target Mobile Phones? - Part II. Computer Law & Security Review 26 (6): 595–612.
-
(2010)
Computer Law & Security Review
, vol.26
, Issue.6
, pp. 595-612
-
-
King, N.J.1
Jessen, P.W.2
-
27
-
-
84881509020
-
Making Sense from Snowden: What’s Significant in the NSA Surveillance Revelations
-
Landau, Susan. 2013. Making Sense from Snowden: What’s Significant in the NSA Surveillance Revelations. IEEE Security & Privacy.
-
(2013)
IEEE Security & Privacy
-
-
Landau, S.1
-
29
-
-
84942517373
-
-
ProPublica (in collaboration with the New York Times). January 27, 2014. Accessed June 27, 2014:
-
Larson, Jeff, James Glanz, Andrew W. Lehren. 2014. Spy Agencies Probe Angry Birds and Other Apps for Personal Data. ProPublica (in collaboration with the New York Times). January 27, 2014. Accessed June 27, 2014: http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data.
-
(2014)
Spy Agencies Probe Angry Birds and Other Apps for Personal Data
-
-
Larson, J.1
Glanz, J.2
Lehren, R.W.3
-
30
-
-
84875530585
-
Smell the Fish: Digital Disneyland and the Right to Oblivion
-
Leistert, Oliver. 2013. Smell the Fish: Digital Disneyland and the Right to Oblivion. First Monday 18 (3).
-
(2013)
First Monday
, vol.18
, Issue.3
-
-
Leistert, O.1
-
32
-
-
84937618842
-
-
Blackwell Publishing Ltd
-
Lovink, Geert and Ned Rossiter. 2012. In Praise of Concept Production. In The International Encyclopedia of Media Studies. Blackwell Publishing Ltd. http://onlinelibrary.wiley.com/doi/10.1002/9781444361506.wbiems142/abstract.
-
(2012)
Praise of Concept Production. In
-
-
Lovink, G.1
Rossiter, N.2
-
34
-
-
0142150513
-
Surveillance as Social Sorting: Privacy, Risk
-
London: Routledge
-
Lyon, David. 2003. Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination. London: Routledge.
-
(2003)
And Digital Discrimination
-
-
Lyon, D.1
-
36
-
-
84894052845
-
Understanding Resistance to Digital Surveillance: Towards a Multi-Disciplinary, Multi-Actor Framework
-
Martin, Aaron K., Rosamunde E. van Brakel, and Daniel J. Bernhard. 2009. Understanding Resistance to Digital Surveillance: Towards a Multi-Disciplinary, Multi-Actor Framework. Surveillance & Society 6 (3): 213–32.
-
(2009)
Surveillance & Society
, vol.6
, Issue.3
, pp. 213-232
-
-
Martin, A.K.1
Van Brakel, R.E.2
Bernhard, D.J.3
-
37
-
-
36849091438
-
Beyond the Panopticon? Foucault and Surveillance Studies
-
eds Jeremy W. Crampton and Stuart Elden. Hampshire: Ashgate
-
Murakami Wood, David. 2007. ‘Beyond the Panopticon’? Foucault and Surveillance Studies. In: Space, Knowledge and Power: Foucault and Geography, eds Jeremy W. Crampton and Stuart Elden. Hampshire: Ashgate.
-
(2007)
Space, Knowledge and Power: Foucault and Geography
-
-
Wood, M.1
-
38
-
-
77949515308
-
What’s New about the ‘new Surveillance’?: Classifying for Change and Continuity. Knowledge
-
Marx, Gary T. 2004. What’s New about the ‘new Surveillance’?: Classifying for Change and Continuity. Knowledge, Technology & Policy 17 (1): 18–37.
-
(2004)
Technology & Policy
, vol.17
, Issue.1
, pp. 18-37
-
-
Marx, G.T.1
-
39
-
-
43249150879
-
Counter-surveillance as Political Intervention?
-
Monahan, Torin. 2006. Counter-surveillance as Political Intervention? Social Semiotics 16 (4): 515-534.
-
(2006)
Social Semiotics
, vol.16
, Issue.4
, pp. 515-534
-
-
Monahan, T.1
-
41
-
-
84937618844
-
-
PEN American Center, April 8. Accessed June 27, 2014:
-
PEN American Center. 2014. PEN Surveillance Metaphor Mapping Project. April 8. Accessed June 27, 2014: http://www.pen.org/infographic/pen-surveillance-metaphor-mapping-project.
-
(2014)
PEN Surveillance Metaphor Mapping Project
-
-
-
42
-
-
84937618845
-
-
Spiegel Online, January 7. Accessed June 30, 2014
-
Poitras, Laura, Marcel Rosenbach, Fidelius Schmid, Holger Stark, and Jonathan Stock. 2013. Cover Story: How the NSA Targets Germany and Europe. Spiegel Online, January 7. Accessed June 30, 2014: http://www.spiegel.de/international/world/secret-documents-nsa-targeted-germany-and-eu-buildings-a-908609.html
-
(2013)
Cover Story: How the NSA Targets Germany and Europe
-
-
Poitras, L.1
Rosenbach, M.2
Schmid, F.3
Stark, H.4
Stock, J.5
-
43
-
-
77958550241
-
The Prüm Regime: Situated Dis/Empowerment in Transnational DNA Profile Exchange
-
Prainsack, Barbara, and Toom, Victor. 2010. The Prüm Regime: Situated Dis/Empowerment in Transnational DNA Profile Exchange. British Journal of Criminology 50 (6): 1117.
-
(2010)
British Journal of Criminology
, vol.50
, Issue.6
, pp. 1117
-
-
Prainsack, B.1
Toom, V.2
-
44
-
-
85076317643
-
Consumer Surveillance: Context, Perspectives and Concerns in the Personal Information Economy
-
edited by Kirstie S. Ball, Kevin D. Haggerty and David Lyon,, LondonRoutledge
-
Pridmore, Jason. Consumer Surveillance: Context, Perspectives and Concerns in the Personal Information Economy. In Routledge Handbook of Surveillance Studies, edited by Kirstie S. Ball, Kevin D. Haggerty and David Lyon, 321–30. London: Routledge.
-
Routledge Handbook of Surveillance Studies
, pp. 321-330
-
-
Pridmore, J.1
-
45
-
-
84900999574
-
Dataveillance and Countervailence
-
edited by Lisa Gitelman. Cambridge, MA: MIT Press
-
Raley, Rita. 2013. Dataveillance and Countervailence. In “Raw Data” Is an Oxymoron, edited by Lisa Gitelman. Cambridge, MA: MIT Press.
-
(2013)
Raw Data is an Oxymoron
-
-
Raley, R.1
-
46
-
-
84900990144
-
Why Data Is Not Enough: Digital Traces as Control of Self and Self-Control
-
Reigeluth, Tyler Butler. 2014. Why Data Is Not Enough: Digital Traces as Control of Self and Self-Control. Surveillance & Society 12 (2): 243–54.
-
(2014)
Surveillance & Society
, vol.12
, Issue.2
, pp. 243-254
-
-
Reigeluth, T.B.1
-
47
-
-
77952487901
-
Post-Demographic Machines
-
Amsterdam: Virtueel Platform
-
Rogers, Richard. 2009. Post-Demographic Machines. Walled Garden, Amsterdam: Virtueel Platform.
-
(2009)
Walled Garden
-
-
Rogers, R.1
-
48
-
-
84937618847
-
-
Slate, July 17, 2013. Accessed January 12, 2015:
-
Rosen, David and Aaron Santesso. 2013. The Eye of Sauron Is the Modern Surveillance State. Slate, July 17, 2013. Accessed January 12, 2015: http://www.slate.com/articles/news_and_politics/jurisprudence/2013/07/tolkien_v_orwell_who_understood_modern_surveillance:best.html.
-
(2013)
The Eye of Sauron is the Modern Surveillance State
-
-
Rosen, D.1
Santesso, A.2
-
49
-
-
34547894714
-
The Coming Crisis of Empirical
-
Savage, Mike and Roger Burrows. 2007. The Coming Crisis of Empirical. Sociology 41 (5): 885–99.
-
(2007)
Sociology
, vol.41
, Issue.5
, pp. 885-899
-
-
Savage, M.1
Burrows, R.2
-
50
-
-
84937618848
-
Attacking Tor: How the NSA Targets Users’ Online Anonymity
-
October 4, sec. World news. Accessed June 30, 2014:
-
Schneier, Bruce. 2013. Attacking Tor: How the NSA Targets Users’ Online Anonymity. The Guardian, October 4, sec. World news. Accessed June 30, 2014: http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity.
-
(2013)
The Guardian
-
-
Schneier, B.1
-
53
-
-
84906707156
-
-
SPIEGEL Staff, Spiegel Online, November 11. Accessed June 30, 2014:
-
SPIEGEL Staff. 2013a. GHCQ Targets Engineers with Fake LinkedIn Pages. Spiegel Online, November 11. Accessed June 30, 2014: http://www.spiegel.de/international/world/ghcq-targets-engineers-with-fake-linkedin-pages-a-932821.html.
-
(2013)
GHCQ Targets Engineers with Fake Linkedin Pages
-
-
-
54
-
-
84937618849
-
-
SPIEGEL Staff, Spiegel Online, December 29. Accessed June 30, 2014:
-
SPIEGEL Staff. 2013b. Inside TAO: Targeting Mexico. Spiegel Online, December 29. Accessed June 30, 2014: http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969-2.html.
-
(2013)
Inside TAO: Targeting Mexico
-
-
-
55
-
-
84944065655
-
Privacy Is Not the Antidote to Surveillance
-
Stalder, Felix. 2002. Privacy Is Not the Antidote to Surveillance. Surveillance & Society 1 (1): 120–24.
-
(2002)
Surveillance & Society
, vol.1
, Issue.1
, pp. 120-124
-
-
Stalder, F.1
-
56
-
-
79960907329
-
Location-Aware Mobile Media and Urban Sociability
-
Sutko, Daniel M. and Adriana de Souza e Silva. 2011. Location-Aware Mobile Media and Urban Sociability. New Media & Society 13(5): 807–823.
-
(2011)
New Media & Society
, vol.13
, Issue.5
, pp. 807-823
-
-
Sutko, D.M.1
De Souza E Silva, A.2
-
57
-
-
84937618850
-
-
The Guardian, October 4, sec. World news. Accessed June 30, 2014:
-
The Guardian. 2013a. ‘Tor Stinks’ Presentation – Read the Full Document. The Guardian, October 4, sec. World news. Accessed June 30, 2014: http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document.
-
(2013)
Tor Stinks Presentation – Read the Full Document
-
-
Guardian, T.1
-
59
-
-
70350004046
-
Beyond Locative Media: Giving Shape to the Internet of Things
-
Tuters, Marc and Kazys Varnelis. 2006. Beyond Locative Media: Giving Shape to the Internet of Things. Leonardo 39 (4): 357–63.
-
(2006)
Leonardo
, vol.39
, Issue.4
, pp. 357-363
-
-
Tuters, M.1
Varnelis, K.2
|