-
2
-
-
82355191258
-
Data derivatives: On the emergence of a security-risk calculus for our times
-
Amoore L, (2011) Data derivatives: On the emergence of a security-risk calculus for our times. Theory, Culture and Society 28: 24–43.
-
(2011)
Theory, Culture and Society
, vol.28
, pp. 24-43
-
-
Amoore, L.1
-
3
-
-
84896541937
-
Security and the claim to privacy
-
Amoore L, (2014) Security and the claim to privacy. International Political Sociology 8(1): 108–112.
-
(2014)
International Political Sociology
, vol.8
, Issue.1
, pp. 108-112
-
-
Amoore, L.1
-
4
-
-
84901041861
-
Big Data surveillance: Introduction
-
Andrejevic M, Gates K, (2014) Big Data surveillance: Introduction. Surveillance & Society 12(2): 185–196.
-
(2014)
Surveillance & Society
, vol.12
, Issue.2
, pp. 185-196
-
-
Andrejevic, M.1
Gates, K.2
-
6
-
-
84922462487
-
Tiny constables and the cost of surveillance: Making cents out of the United States vs Jones
-
January 09, (accessed 19 June 2014)
-
Bankston KS and Soltani A (2014) Tiny constables and the cost of surveillance: Making cents out of the United States vs Jones. Yale Law Journal Online. January 09. Available at: www.yalelawjournal.org/the-yale-law-journal-pocket-part/constitutional-law/tiny-constables-and-the-cost-of-surveillance:-making-cents-out-of-united-states-v.-jones/ (accessed 19 June 2014).
-
(2014)
Yale Law Journal Online.
-
-
Bankston, K.S.1
Soltani, A.2
-
9
-
-
85021878437
-
-
February 25, (accessed 19 June 2014)
-
Bertolucci J (2013) Big Data's new buzzword: Datafication. Information Week. February 25. Available at: www.informationweek.com/big-data/big-data-analytics/big-datas-new-buzzword-datafication/d/d-id/1108797?/ (accessed 19 June 2014).
-
(2013)
Big Data's New Buzzword: Datafication. Information Week
-
-
Bertolucci, J.1
-
10
-
-
84861974217
-
Critical questions for Big Data: Provocations for a cultural, technological and scholarly phenomenon
-
Available at:, accessed 19 June 2014
-
Boyd D and Crawford K (2012) Critical questions for Big Data: Provocations for a cultural, technological and scholarly phenomenon. Information, Communication and Society 15(5): 662–679. Available at: www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878#.UthCMvZA_EV/ (accessed 19 June 2014).
-
(2012)
Information, Communication and Society
, vol.15
, Issue.5
, pp. 662-679
-
-
Boyd, D.1
Crawford, K.2
-
11
-
-
84873655668
-
When Google got flu wrong
-
Available at:, accessed 19 June 2014
-
Butler D (2013) When Google got flu wrong. Nature. 494(7936). Available at: www.nature.com/news/when-google-got-flu-wrong-1.12413/ (accessed 19 June 2014).
-
(2013)
Nature.
, vol.494
, Issue.7936
-
-
Butler, D.1
-
12
-
-
85074200126
-
-
CBC (2014) Canadians’ mental health info routinely shared with FBI, U.S. Customs. : (accessed 19 June 2014
-
CBC (2014) Canadians’ mental health info routinely shared with FBI, U.S. Customs. Available at: www.cbc.ca/news/canada/windsor/canadians-mental-health-info-routinely-shared-with-fbi-u-s-customs-1.2609159/ (accessed 19 June 2014)
-
-
-
-
13
-
-
82555193413
-
New algorithmic identity: Soft biopolitics and the modulation of control
-
Cheney-Lippold J, (2011) New algorithmic identity: Soft biopolitics and the modulation of control. Theory, Culture and Society 28(6): 164–181.
-
(2011)
Theory, Culture and Society
, vol.28
, Issue.6
, pp. 164-181
-
-
Cheney-Lippold, J.1
-
14
-
-
77954749027
-
Technological due process
-
Citron D, (2008) Technological due process. Washington University Law Review 85(6): 1249–1313.
-
(2008)
Washington University Law Review
, vol.85
, Issue.6
, pp. 1249-1313
-
-
Citron, D.1
-
15
-
-
84896500423
-
The politics of privacy in the age of preemptive security
-
de Goede M, (2014) The politics of privacy in the age of preemptive security. International Political Sociology 8(1): 100–104.
-
(2014)
International Political Sociology
, vol.8
, Issue.1
, pp. 100-104
-
-
de Goede, M.1
-
17
-
-
85074208436
-
-
Available at:, accessed 19 June 2014
-
FAS (Federation of American Scientists) (2014) Available at: www.fas.org/irp/budget/index.html?PHPSESSID=70809e6b347db7b2122df1ef24d743e0/ (accessed 19 June 2014).
-
(2014)
-
-
-
18
-
-
85021905816
-
Canada's metadata collection worries critics
-
March 27, (accessed 19 June 2014)
-
Freeze C (2014) Canada's metadata collection worries critics. The Globe and Mail. March 27. Available at: http://m.theglobeandmail.com/news/world/canadas-metadata-collection-worries-critics/article17714407/?service=mobile/ (accessed 19 June 2014).
-
(2014)
The Globe and Mail
-
-
Freeze, C.1
-
19
-
-
85022009378
-
What the NSA can do with “Big Data.”
-
June 11, (accessed 19 June 2014)
-
Gallagher S (2013) What the NSA can do with “Big Data.” Ars Electronica. June 11. Available at: http://arstechnica.com/information-technology/2013/06/what-the-nsa-can-do-with-big-data/ (accessed 19 June 2014).
-
(2013)
Ars Electronica
-
-
Gallagher, S.1
-
21
-
-
84901052468
-
Statistical surveillance: Remote sensing in the digital age
-
Ball K.S., Haggerty K., Lyon D., (eds), London and New York, Routledge, In:, (eds
-
Gandy O, (2012) Statistical surveillance: Remote sensing in the digital age. In: Ball KS, Haggerty K, Lyon D, (eds) Routledge Handbook of Surveillance Studies, London and New York: Routledge, pp. 125–132.
-
(2012)
Routledge Handbook of Surveillance Studies
, pp. 125-132
-
-
Gandy, O.1
-
23
-
-
84888235428
-
US, British intelligence mining data from nine US internet companies in broad secret program
-
June 6, accessed 19 June 2014
-
Gellman B and Poitras L (2013) US, British intelligence mining data from nine US internet companies in broad secret program. The Washington Post. June 6. Available at: www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html (accessed 19 June 2014).
-
(2013)
The Washington Post.
-
-
Gellman, B.1
Poitras, L.2
-
24
-
-
84904131498
-
NSA tracking cellphone locations worldwide, Snowden documents show
-
Available at, (accessed 19 June 2014)
-
Gellman B and Soltani A (2013) NSA tracking cellphone locations worldwide, Snowden documents show. The Washington Post. December 4. Available at: www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html?hpid=z1/ (accessed 19 June 2014).
-
(2013)
The Washington Post. December 4.
-
-
Gellman, B.1
Soltani, A.2
-
25
-
-
77951924788
-
Tense theory: The temporalities of surveillance
-
Lyon D., (ed), Cullompton, Willan, In:, (ed
-
Genosko G, Thompson S, (2006) Tense theory: The temporalities of surveillance. In: Lyon D, (ed) Theorizing Surveillance: The Panopticon and Beyond, Cullompton: Willan, pp. 123–138.
-
(2006)
Theorizing Surveillance: The Panopticon and Beyond
, pp. 123-138
-
-
Genosko, G.1
Thompson, S.2
-
26
-
-
60549098239
-
Detecting influenza epidemics using search engine query data
-
accessed 19 June 2014
-
Ginsberg J, et al. (2009) Detecting influenza epidemics using search engine query data. Nature 457: 1012–1014. Available at: www.nature.com/nature/journal/v457/n7232/full/nature07634.html/ (accessed 19 June 2014).
-
(2009)
Nature
, vol.457
, pp. 1012-1014
-
-
Ginsberg, J.1
-
28
-
-
84940866816
-
National security and double government
-
Available at:, accessed 19 June 2014
-
Glennon NJ (2014) National security and double government. Harvard National Security Journal 5(1). Available at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2376272 (accessed 19 June 2014).
-
(2014)
Harvard National Security Journal
, vol.5
, Issue.1
-
-
Glennon, N.J.1
-
29
-
-
84881572793
-
NSA collecting phone records of millions of Verizon customers daily
-
(accessed 19 June 2014)
-
Greenwald G (2013) NSA collecting phone records of millions of Verizon customers daily. The Guardian. June 6. Available at: www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order/ (accessed 19 June 2014).
-
(2013)
The Guardian
-
-
Greenwald, G.1
-
30
-
-
84897995638
-
Edward Snowden: The whistleblower behind the NSA surveillance revelations
-
June 10., (accessed 19 June 2014)
-
Greenwald G, MacAskill E and Poitras L (2013) Edward Snowden: The whistleblower behind the NSA surveillance revelations. The Guardian. June 10. Available at: www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance/ (accessed 19 June 2014).
-
(2013)
The Guardian.
-
-
Greenwald, G.1
Macaskill, E.2
Poitras, L.3
-
33
-
-
84900551156
-
Prediction, preemption, presumption: How Big Data threatens big picture privacy
-
Available at:, accessed 19 June 2014
-
Kerr I and Earle J (2013) Prediction, preemption, presumption: How Big Data threatens big picture privacy. Stanford Law Review 66(65). Available at: www.stanfordlawreview.org/online/privacy-and-big-data/prediction-preemption-presumption/ (accessed 19 June 2014).
-
(2013)
Stanford Law Review
, vol.66
, Issue.65
-
-
Kerr, I.1
Earle, J.2
-
34
-
-
84975094129
-
Big Data and human geography: Opportunities, challenges and risks
-
Kitchin R, (2014) Big Data and human geography: Opportunities, challenges and risks. Dialogues in Human Geography 3(3): 262–267.
-
(2014)
Dialogues in Human Geography
, vol.3
, Issue.3
, pp. 262-267
-
-
Kitchin, R.1
-
35
-
-
85074197165
-
-
Kitchin R (forthcoming) The Data Revolution: Big Data, Open Data, Data Infrastructures and Their Consequences. London: Sage
-
Kitchin R (forthcoming) The Data Revolution: Big Data, Open Data, Data Infrastructures and Their Consequences. London: Sage
-
-
-
-
36
-
-
85021902732
-
The Snowden files: Why the British public should be worried about GCHQ
-
(accessed 19 June 2014)
-
Lanchester J (2013) The Snowden files: Why the British public should be worried about GCHQ. The Guardian October 3. Available at: www.theguardian.com/world/2013/oct/03/edward-snowden-files-john-lanchester/ (accessed 19 June 2014).
-
(2013)
The Guardian October 3
-
-
Lanchester, J.1
-
37
-
-
84896056107
-
The parable of Google flu: Traps in Big Data analysis
-
(accessed 19 June 2014)
-
Lazer D, Kennedy R, King G, et al. (2014) The parable of Google flu: Traps in Big Data analysis. Science 343: 1203–1205. Available at: www.sciencemag.org/content/343/6176/1203.full/ (accessed 19 June 2014).
-
(2014)
Science
, vol.343
, pp. 1203-1205
-
-
Lazer, D.1
Kennedy, R.2
King, G.3
-
41
-
-
84865810989
-
Neoliberal deviants and surveillance: Welfare Recipients under the watchful eye of Ontario Works
-
Maki K (2011) Neoliberal deviants and surveillance: Welfare Recipients under the watchful eye of Ontario Works. Surveillance & Society 9(1/2): 47–63. Available at: http://library.queensu.ca/ojs/index.php/surveillance-and-society/article/view/deviants (accessed 19 June 2014)
-
(2011)
Surveillance & Society
, vol.9
, Issue.1-2
, pp. 47-63
-
-
Maki, K.1
-
45
-
-
84897507025
-
Why software engineering courses should include ethics coverage
-
Narayanan A, Vallor S, (2014) Why software engineering courses should include ethics coverage. Communications of the ACM 57(3): 23–25.
-
(2014)
Communications of the ACM
, vol.57
, Issue.3
, pp. 23-25
-
-
Narayanan, A.1
Vallor, S.2
-
46
-
-
85074200180
-
-
Newell BC (forthcoming) The massive metadata machine: Liberty, power and mass surveillance in the U.S. and Europe. I/S: A Journal of Law and Policy for the Information Society
-
Newell BC (forthcoming) The massive metadata machine: Liberty, power and mass surveillance in the U.S. and Europe. I/S: A Journal of Law and Policy for the Information Society
-
-
-
-
47
-
-
84900999574
-
Dataveillance and countervailance
-
Gitelman L, Cambridge, MA, MIT Press
-
Raley R (2013) Dataveillance and countervailance. In: Gitelman L (ed.) Raw Data Is an Oxymoron. Cambridge, MA: MIT Press, pp. 121–145.
-
(2013)
Raw Data is an Oxymoron
, pp. 121-145
-
-
Raley, R.1
-
48
-
-
85038232759
-
The data made me do it
-
May 03, (accessed 19 June 2014)
-
Regalado A (2013) The data made me do it. Technology Review May 03. Available at: www.technologyreview.com/news/514346/the-data-made-me-do-it/ (accessed 19 June 2014).
-
(2013)
Technology Review
-
-
Regalado, A.1
-
50
-
-
84867065520
-
The governmental topologies of database devices
-
Ruppert E, (2012) The governmental topologies of database devices. Theory, Culture and Society 29(4–5): 116–136.
-
(2012)
Theory, Culture and Society
, vol.29
, Issue.4-5
, pp. 116-136
-
-
Ruppert, E.1
-
51
-
-
85074189773
-
Digital fields, networks and capital
-
Orton-Johnson K, Prior N, Houndmills, UK, Palgrave Macmillan
-
Savage M (2013) Digital fields, networks and capital. In: Orton-Johnson K and Prior N (eds) Digital Sociology: Critical Perspectives. Houndmills, UK: Palgrave Macmillan.
-
(2013)
Digital Sociology: Critical Perspectives
-
-
Savage, M.1
-
52
-
-
34547894714
-
The coming crisis of empirical sociology
-
Savage M, Burrows R, (2007) The coming crisis of empirical sociology. Sociology 44(5): 885–899.
-
(2007)
Sociology
, vol.44
, Issue.5
, pp. 885-899
-
-
Savage, M.1
Burrows, R.2
-
54
-
-
85074214670
-
-
(accessed 19 June 2014)
-
Schneier B (2014) CSEC analysis of IP and user data. Available at: www.schneier.com/blog/archives/2014/02/csec_surveillan.html/ (accessed 19 June 2014).
-
(2014)
CSEC analysis of IP and user data
-
-
Schneier, B.1
-
55
-
-
84975841813
-
(In)visibility before privacy: A theological ethics of surveillance as social sorting
-
Stoddart E, (2014) (In)visibility before privacy: A theological ethics of surveillance as social sorting. Studies in Christian Ethics 27(1): 33–49.
-
(2014)
Studies in Christian Ethics
, vol.27
, Issue.1
, pp. 33-49
-
-
Stoddart, E.1
-
58
-
-
84901007475
-
Datafication, dataism and dataveillance: Big Data between scientific paradigm and ideology
-
accessed 19 June 2014)
-
van Dijck J (2014) Datafication, dataism and dataveillance: Big Data between scientific paradigm and ideology. Surveillance & Society 12(2). Available at: http://library.queensu.ca/ojs/index.php/surveillance-and-society/article/view/datafication/ (accessed 19 June 2014)
-
(2014)
Surveillance & Society
, vol.12
, Issue.2
-
-
van Dijck, J.1
-
59
-
-
84926154243
-
-
Available at:, accessed 19 June 2014
-
White House (2014) Big Data and the future of privacy. Available at: www.whitehouse.gov/blog/2014/01/23/big-data-and-future-privacy/ (accessed 19 June 2014).
-
(2014)
Big Data and the Future of Privacy
-
-
-
60
-
-
84880297907
-
-
London and New York, Routledge
-
Zedner (2009) Security, London and New York: Routledge.
-
(2009)
Security
-
-
Zedner1
|