826 Hits in 8.0 sec

Escaping the Panopticon Over Time

Ludo Gorzeman, Paulan Korenhof
2016 Philosophy & Technology  
We argue that applying the 'right to be forgotten' to search results is not a question of just 'censoring' search engines, but that seen from a broader perspective we-as society-will inevitably have to  ...  Applying censorship as a means of 'forgetting' in the collective hybrid memory of the Web enables us to counter-at least partially-the functioning of the Web as a 'Panopticon over Time'.  ...  Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (, which permits unrestricted use, distribution  ... 
doi:10.1007/s13347-016-0238-y fatcat:uwkkctxzcbeavinu6o3d3lpi5q

The Embedded Panopticon: Visibility Issues of Remote Diagnostics Surveillance

Katrin Jonsson
2006 Scandinavian Journal of Information Systems  
To the user the direct reminders of surveillance are thus embedded together with the technology, creating an embedded panopticon.  ...  As the users cannot examine possible ethical dilemmas the responsibility remains with the suppliers and challenges them to pick a strategy for how to handle ethical questions.  ...  Thanks are also due to Ulrika H Westergren for the important role she played in collecting the data.  ... 
dblp:journals/sjis/Jonsson06 fatcat:bu5rbrlgt5ckrb33dinfrkqk6y

An Analysis of Chinese Search Engine Filtering [article]

Tao Zhu, Christopher Bronk, Dan S. Wallach
2011 arXiv   pre-print
between the Great Firewall and Chinese search engines.  ...  The imposition of government mandates upon Internet search engine operation is a growing area of interest for both computer science and public policy.  ...  the middle of our data set.  ... 
arXiv:1107.3794v1 fatcat:bvsu2dygpjagni2onc4nwgf5q4

Designing Balance into the Democratic Project: Contrasting Jeffersonian Democracy against Bentham's Panopticon Centralisation in determining ICT adoption

Nada K. Kakabadse, Andrew Kakabadse, Alexander Kouzmin
2007 Problems and Perspectives in Management  
The paper contrasts the Jeffersonian vision of democracy against Bentham's Panopticon dystopia and reviews comparative models of democratic processes.  ...  within the context of Liberal democracy.  ...  As the user gathers information about the product, the company gathers data about its customers (e.g. credit cards, Internet searches, emails, government databases etc.), greatly enhancing its ability  ... 
doaj:10dca5a1d20843b08e36e94dbcf2a5d9 fatcat:u7p6xslnubcszntm2ioaqjnzve

Digital privacy: theory, policies and technologies

Annie I. Anton, Travis D. Breaux, Stefanos Gritzalis, John Mylopoulos
2011 Requirements Engineering  
This special issue of the Springer's Requirements Engineering journal aims at providing researchers and professionals with insights into the state-of-the-art in Digital Privacy from the views of Theory  ...  These risks to privacy include violations of user anonymity during sensitive transactions, unauthorized disclosures of personal data, misuse of personal data for unauthorized purposes, misrepresentation  ...  Robinson, Requirements Engineering Editors-in-Chief, for giving us the opportunity to prepare this special issue.  ... 
doi:10.1007/s00766-011-0117-0 fatcat:ccne2cr3c5fqtoutku2g7oxivy

On the Ethics of Using Publicly-Available Data [chapter]

Antony K. Cooper, Serena Coetzee
2020 Lecture Notes in Computer Science  
Clearly, there are ethical issues concerning the use of such data, particularly the invasion of privacy. A review of the literature has been done to explore these issues.  ...  These types of data include geocoded or geotagged discrete units of communication: messages, posts, tweets, status updates, check-ins, images and the like on a variety of social networking services.  ...  A search engine obviously does some form of Web scraping to locate the content first, before being able to provide the rapid search responses users expect.  ... 
doi:10.1007/978-3-030-45002-1_14 fatcat:ozb6yhmhwjbsbgbqkgnucx7h24

The Right to Be Forgotten Across the Pond

Meg Leta Ambrose, Jef Ausloos
2013 Journal of Information Policy  
at Article 14(b). 36 The data protection framework should not be confused with the broader protection of privacy in Article 8 of the European Convention on Human Rights.  ...  PROPOSED REGULATIONS Scope of the European Union Proposal As mentioned, the European Commission has proposed its long-expected draft revision of the European data protection legal framework. 62 Although  ... 
doi:10.5325/jinfopoli.3.2013.0001 fatcat:rocda753djb3vm4qezc4x57vw4

The Right to Be Forgotten Across the Pond

Meg Leta Ambrose, Jef Ausloos
2012 Social Science Research Network  
at Article 14(b). 36 The data protection framework should not be confused with the broader protection of privacy in Article 8 of the European Convention on Human Rights.  ...  PROPOSED REGULATIONS Scope of the European Union Proposal As mentioned, the European Commission has proposed its long-expected draft revision of the European data protection legal framework. 62 Although  ... 
doi:10.2139/ssrn.2032325 fatcat:2gjydmi32vf5bm3swrfg5z7tmm

The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy

Fiachra O'Brolcháin, Tim Jacquemard, David Monaghan, Noel O'Connor, Peter Novitzky, Bert Gordijn
2015 Science and Engineering Ethics  
The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society.  ...  Given the pace of technological development and the popularity of these new forms of social interaction, this scenario is plausible. However, it brings with it ethical problems.  ...  Acknowledgements The research leading to these results has received funding from the European Community's Seventh Framework Programmes (FP7/2007-2013) under grant agreement no.  ... 
doi:10.1007/s11948-014-9621-1 pmid:25552240 fatcat:ibkoq6fmgrdodom7iuthcngzxe

Big Data, Surveillance, and the Digital Citizen

Jennifer Cobbe
2018 Social Science Research Network  
This thesis provides an analysis of the impact of pervasive online surveillance on the relationship between the digital citizen and corporations, the state, and politics in order to argue that the United  ...  Original contributions to knowledge are as follows: 1) locating the business model of corporations such as Google and Facebook, identified as  ...  Decency Act of 1996, 47 U.S.C. § 230 Data Protection Act 1998 Data Protection Directive (Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals  ... 
doi:10.2139/ssrn.3234984 fatcat:vpxden2levf4zhmlrfs4a245py

Politics of the Internet in the People's Republic of China: Unveiling users' experiences

2019 International Journal of Engineering and Advanced Technology  
Suggested recommendations are the promotion of adequate administrative protection of citizens' interests against arbitrary executive power, and the creation of anonymous fora for policy dialogue on issues  ...  The work explores internet governance in China, via a review of the most recent literature, and through a sociological analysis of users' narratives.  ...  The search of commonalties across, and within transcripts helped organize codes, and collate them into (macro) themes.  ... 
doi:10.35940/ijeat.e1118.0585c19 fatcat:kcysmoxbwndcdmazjijr5dkr7q

Hacking the panopticon: Distributed online surveillance and resistance [chapter]

Benoît Dupont
Surveillance and Governance: Crime Control and Beyond  
Surveillance studies scholars have embraced Foucault's panopticon as a central metaphor in their analysis of online monitoring technologies, despite several architectural incompatibilities between eighteenth  ...  For example, the success of the very popular Google search engine can be attributed to the superior quality of its ranking algorithm, making the results it displays at the top of its page more relevant  ...  Virgil Griffith, the designer of WikiScanner, 16 is one of those talented programmers. His online search engine lets users find out which organizations are the most active Wikipedia editors.  ... 
doi:10.1016/s1521-6136(07)00212-6 fatcat:7njjj5r65rbmrexgyzzyl3pllm

Useful Void: The Art of Forgetting in the Age of Ubiquitous Computing

Viktor Mayer-Schoenberger
2007 Social Science Research Network  
Google saves every search query, and millions of video surveillance cameras retain our movements.  ...  Then I suggest why we may want to worry about the shift, and call for what I term data ecology. In contrast to others I do not call for comprehensive new laws or constitutional adjudication.  ...  in response to public fears of large scale data collection and retention 37 ; in Europe, the European Union (EU) Data Protection Directive, passed in 1995, obligates all twenty-seven member nations of  ... 
doi:10.2139/ssrn.976541 fatcat:7ihnzngyfjd7zb7iiqafxmoaku

Data-inspired co-design for museum and gallery visitor experiences

Dimitrios Paris Darzentas, Harriet R. Cameron, Hanne Gesine Wagner, Peter J. Craigon, Edgar Bodiaj, Jocelyn Spence, Paul Tennent, Steve Benford
2022 Artificial intelligence for engineering design, analysis and manufacturing  
These include the overlay of virtual models on physical exhibits, a smartphone app for creating personalized tours as gifts, visualizations of emotional responses to exhibits, and the data-driven use of  ...  The capture and analysis of diverse data is widely recognized as being vital to the design of new products and services across the digital economy.  ...  A framework for data-inspired co-design in museums.  ... 
doi:10.1017/s0890060421000317 dblp:journals/aiedam/DarzentasCWCBST22 fatcat:7v4vutqqc5hcrmzzpz4673qzom

Responsible Design Through Interdisciplinary Collaboration: Contact Tracing Apps, Surveillance and the Prospect of Building User Trust

Jennifer Keating
2020 IEEE Data Engineering Bulletin  
What specters of surveillance, incursions on privacy or narratives compounding power inequity with already vulnerable populations could have been avoided had Google and Apple designers and engineers intentionally  ...  What features of the application designs could have been developed with a higher prioritization of potential users' trust?  ...  These apps will force citizens to rely on big tech companies -whose business is enabled by monetizing data-to protect the privacy of their sensitive data.  ... 
dblp:journals/debu/Keating20 fatcat:jbg2xhmzqreuzhqujwkuwh7rvq
« Previous Showing results 1 — 15 out of 826 results