A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Escaping the Panopticon Over Time
2016
Philosophy & Technology
We argue that applying the 'right to be forgotten' to search results is not a question of just 'censoring' search engines, but that seen from a broader perspective we-as society-will inevitably have to ...
Applying censorship as a means of 'forgetting' in the collective hybrid memory of the Web enables us to counter-at least partially-the functioning of the Web as a 'Panopticon over Time'. ...
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution ...
doi:10.1007/s13347-016-0238-y
fatcat:uwkkctxzcbeavinu6o3d3lpi5q
The Embedded Panopticon: Visibility Issues of Remote Diagnostics Surveillance
2006
Scandinavian Journal of Information Systems
To the user the direct reminders of surveillance are thus embedded together with the technology, creating an embedded panopticon. ...
As the users cannot examine possible ethical dilemmas the responsibility remains with the suppliers and challenges them to pick a strategy for how to handle ethical questions. ...
Thanks are also due to Ulrika H Westergren for the important role she played in collecting the data. ...
dblp:journals/sjis/Jonsson06
fatcat:bu5rbrlgt5ckrb33dinfrkqk6y
An Analysis of Chinese Search Engine Filtering
[article]
2011
arXiv
pre-print
between the Great Firewall and Chinese search engines. ...
The imposition of government mandates upon Internet search engine operation is a growing area of interest for both computer science and public policy. ...
the middle of our data set. ...
arXiv:1107.3794v1
fatcat:bvsu2dygpjagni2onc4nwgf5q4
Designing Balance into the Democratic Project: Contrasting Jeffersonian Democracy against Bentham's Panopticon Centralisation in determining ICT adoption
2007
Problems and Perspectives in Management
The paper contrasts the Jeffersonian vision of democracy against Bentham's Panopticon dystopia and reviews comparative models of democratic processes. ...
within the context of Liberal democracy. ...
As the user gathers information about the product, the company gathers data about its customers (e.g. credit cards, Internet searches, emails, government databases etc.), greatly enhancing its ability ...
doaj:10dca5a1d20843b08e36e94dbcf2a5d9
fatcat:u7p6xslnubcszntm2ioaqjnzve
Digital privacy: theory, policies and technologies
2011
Requirements Engineering
This special issue of the Springer's Requirements Engineering journal aims at providing researchers and professionals with insights into the state-of-the-art in Digital Privacy from the views of Theory ...
These risks to privacy include violations of user anonymity during sensitive transactions, unauthorized disclosures of personal data, misuse of personal data for unauthorized purposes, misrepresentation ...
Robinson, Requirements Engineering Editors-in-Chief, for giving us the opportunity to prepare this special issue. ...
doi:10.1007/s00766-011-0117-0
fatcat:ccne2cr3c5fqtoutku2g7oxivy
On the Ethics of Using Publicly-Available Data
[chapter]
2020
Lecture Notes in Computer Science
Clearly, there are ethical issues concerning the use of such data, particularly the invasion of privacy. A review of the literature has been done to explore these issues. ...
These types of data include geocoded or geotagged discrete units of communication: messages, posts, tweets, status updates, check-ins, images and the like on a variety of social networking services. ...
A search engine obviously does some form of Web scraping to locate the content first, before being able to provide the rapid search responses users expect. ...
doi:10.1007/978-3-030-45002-1_14
fatcat:ozb6yhmhwjbsbgbqkgnucx7h24
The Right to Be Forgotten Across the Pond
2013
Journal of Information Policy
at Article 14(b). 36 The data protection framework should not be confused with the broader protection of privacy in Article 8 of the European Convention on Human Rights. ...
PROPOSED REGULATIONS
Scope of the European Union Proposal As mentioned, the European Commission has proposed its long-expected draft revision of the European data protection legal framework. 62 Although ...
doi:10.5325/jinfopoli.3.2013.0001
fatcat:rocda753djb3vm4qezc4x57vw4
The Right to Be Forgotten Across the Pond
2012
Social Science Research Network
at Article 14(b). 36 The data protection framework should not be confused with the broader protection of privacy in Article 8 of the European Convention on Human Rights. ...
PROPOSED REGULATIONS
Scope of the European Union Proposal As mentioned, the European Commission has proposed its long-expected draft revision of the European data protection legal framework. 62 Although ...
doi:10.2139/ssrn.2032325
fatcat:2gjydmi32vf5bm3swrfg5z7tmm
The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy
2015
Science and Engineering Ethics
The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society. ...
Given the pace of technological development and the popularity of these new forms of social interaction, this scenario is plausible. However, it brings with it ethical problems. ...
Acknowledgements The research leading to these results has received funding from the European Community's Seventh Framework Programmes (FP7/2007-2013) under grant agreement no. ...
doi:10.1007/s11948-014-9621-1
pmid:25552240
fatcat:ibkoq6fmgrdodom7iuthcngzxe
Big Data, Surveillance, and the Digital Citizen
2018
Social Science Research Network
This thesis provides an analysis of the impact of pervasive online surveillance on the relationship between the digital citizen and corporations, the state, and politics in order to argue that the United ...
Original contributions to knowledge are as follows: 1) locating the business model of corporations such as Google and Facebook, identified as ...
Decency Act of 1996, 47 U.S.C. § 230 Data Protection Act 1998 Data Protection Directive (Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals ...
doi:10.2139/ssrn.3234984
fatcat:vpxden2levf4zhmlrfs4a245py
Politics of the Internet in the People's Republic of China: Unveiling users' experiences
2019
International Journal of Engineering and Advanced Technology
Suggested recommendations are the promotion of adequate administrative protection of citizens' interests against arbitrary executive power, and the creation of anonymous fora for policy dialogue on issues ...
The work explores internet governance in China, via a review of the most recent literature, and through a sociological analysis of users' narratives. ...
The search of commonalties across, and within transcripts helped organize codes, and collate them into (macro) themes. ...
doi:10.35940/ijeat.e1118.0585c19
fatcat:kcysmoxbwndcdmazjijr5dkr7q
Hacking the panopticon: Distributed online surveillance and resistance
[chapter]
Surveillance and Governance: Crime Control and Beyond
Surveillance studies scholars have embraced Foucault's panopticon as a central metaphor in their analysis of online monitoring technologies, despite several architectural incompatibilities between eighteenth ...
For example, the success of the very popular Google search engine can be attributed to the superior quality of its ranking algorithm, making the results it displays at the top of its page more relevant ...
Virgil Griffith, the designer of WikiScanner, 16 is one of those talented programmers. His online search engine lets users find out which organizations are the most active Wikipedia editors. ...
doi:10.1016/s1521-6136(07)00212-6
fatcat:7njjj5r65rbmrexgyzzyl3pllm
Useful Void: The Art of Forgetting in the Age of Ubiquitous Computing
2007
Social Science Research Network
Google saves every search query, and millions of video surveillance cameras retain our movements. ...
Then I suggest why we may want to worry about the shift, and call for what I term data ecology. In contrast to others I do not call for comprehensive new laws or constitutional adjudication. ...
in response to public fears of large scale data collection and retention 37 ; in Europe, the European Union (EU) Data Protection Directive, passed in 1995, obligates all twenty-seven member nations of ...
doi:10.2139/ssrn.976541
fatcat:7ihnzngyfjd7zb7iiqafxmoaku
Data-inspired co-design for museum and gallery visitor experiences
2022
Artificial intelligence for engineering design, analysis and manufacturing
These include the overlay of virtual models on physical exhibits, a smartphone app for creating personalized tours as gifts, visualizations of emotional responses to exhibits, and the data-driven use of ...
The capture and analysis of diverse data is widely recognized as being vital to the design of new products and services across the digital economy. ...
A framework for data-inspired co-design in museums. ...
doi:10.1017/s0890060421000317
dblp:journals/aiedam/DarzentasCWCBST22
fatcat:7v4vutqqc5hcrmzzpz4673qzom
Responsible Design Through Interdisciplinary Collaboration: Contact Tracing Apps, Surveillance and the Prospect of Building User Trust
2020
IEEE Data Engineering Bulletin
What specters of surveillance, incursions on privacy or narratives compounding power inequity with already vulnerable populations could have been avoided had Google and Apple designers and engineers intentionally ...
What features of the application designs could have been developed with a higher prioritization of potential users' trust? ...
These apps will force citizens to rely on big tech companies -whose business is enabled by monetizing data-to protect the privacy of their sensitive data. ...
dblp:journals/debu/Keating20
fatcat:jbg2xhmzqreuzhqujwkuwh7rvq
« Previous
Showing results 1 — 15 out of 826 results