Difference between revisions of "References"
Line 1: | Line 1: | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{. | + | |bibtex=@article{leeseFixingStateVision2020, |
− | title = { | + | title = {Fixing State Vision: Interoperability, Biometrics, and Identity Management in the EU}, |
− | + | volume = {0}, | |
− | } | + | issn = {1465-0045}, |
+ | shorttitle = {Fixing State Vision}, | ||
+ | url = {10.1080/14650045.2020.1830764}, | ||
+ | doi = {10.1080/14650045.2020.1830764}, | ||
+ | abstract = {Building on Scott’s notion of identity as a key concept in early modern statehood, this paper historically contextualises and analyses the current political re-problematisation of identity in the EU. Engaging the recently adopted interoperability initiative that is set to biometrically verify and cross-validate identity records between all European border management, migration, and security databases, it argues that interoperability presents a shift from traditional modes of identity production at the border towards a digital space of identity management. Such identity management is predicated on the establishment of a biometric super-layer structure that cuts across databases without dissolving their legal foundations and introduces a new mode of ‘truth’ production in the form of a dedicated ‘identity confirmation file’ that is supposed to re-introduce a reliable baseline for the government of the Schengen area.}, | ||
+ | number = {0}, | ||
+ | urldate = {2020-11-16}, | ||
+ | journal = {Geopolitics}, | ||
+ | author = {Leese, Matthias}, | ||
+ | month = oct, | ||
+ | year = {2020}, | ||
+ | note = {Publisher: Routledge | ||
+ | \_eprint: https://doi.org/10.1080/14650045.2020.1830764}, | ||
+ | pages = {1--21}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{mirzoeffArtificialVisionWhite2020, | ||
+ | title = {Artificial vision, white space and racial surveillance capitalism}, | ||
+ | issn = {1435-5655}, | ||
+ | url = {10.1007/s00146-020-01095-8}, | ||
+ | doi = {10.1007/s00146-020-01095-8}, | ||
+ | abstract = {This first half of the paper outlines the formation of racial surveillance capitalism across the longue durée of settler colonialism, with special attention to the formation of artificial vision. This artificial vision is deployed in the erased territory, creating a white space in which to see from platforms, ranging from the ship, to the train and today’s drones. The second section examines the Eurodac digital fingerprint database created by the European Union to monitor and control asylum seekers and refugees as an “artificial life system,” to use a phrase coined by its administrators. In this automated form, artificial vision is distributed rather than centralized.}, | ||
+ | language = {en}, | ||
+ | urldate = {2020-11-16}, | ||
+ | journal = {AI \& SOCIETY}, | ||
+ | author = {Mirzoeff, Nicholas}, | ||
+ | month = nov, | ||
+ | year = {2020}, | ||
+ | file = {Springer Full Text PDF:/home/ruben/Zotero/storage/59U2ZT3P/Mirzoeff - 2020 - Artificial vision, white space and racial surveill.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{bonnefonMachineThinkingFast2020, | ||
+ | title = {Machine Thinking, Fast and Slow}, | ||
+ | volume = {24}, | ||
+ | issn = {1364-6613}, | ||
+ | url = {http://www.sciencedirect.com/science/article/pii/S1364661320302229}, | ||
+ | doi = {10.1016/j.tics.2020.09.007}, | ||
+ | abstract = {Machines do not ‘think fast and slow’ in the sense that humans do in dual-process models of cognition. However, the people who create the machines may attempt to emulate or simulate these fast and slow modes of thinking, which will in turn affect the way end users relate to these machines. In this opinion article we consider the complex interplay in the way various stakeholders (engineers, user experience designers, regulators, ethicists, and end users) can be inspired, challenged, or misled by the analogy between the fast and slow thinking of humans and the Fast and Slow Thinking of machines.}, | ||
+ | language = {en}, | ||
+ | number = {12}, | ||
+ | urldate = {2020-11-16}, | ||
+ | journal = {Trends in Cognitive Sciences}, | ||
+ | author = {Bonnefon, Jean-François and Rahwan, Iyad}, | ||
+ | month = dec, | ||
+ | year = {2020}, | ||
+ | keywords = {algorithm aversion, artificial intelligence, dual-process, machine behavior, machine ethics, trust}, | ||
+ | pages = {1019--1027}, | ||
+ | file = {ScienceDirect Snapshot:/home/ruben/Zotero/storage/RENKJF6N/S1364661320302229.html:text/html;ScienceDirect Full Text PDF:/home/ruben/Zotero/storage/XR4UAIBV/Bonnefon and Rahwan - 2020 - Machine Thinking, Fast and Slow.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{OpticalGovernanceRoles, | ||
+ | title = {Optical governance: The Roles of Machine Vision in China’s Epidemic Response}, | ||
+ | shorttitle = {Optical governance}, | ||
+ | url = {https://strelkamag.com/en/article/optical-governance}, | ||
+ | abstract = {Gabriele de Seta on the entanglement of social practices and automated sensing technologies.}, | ||
+ | language = {en}, | ||
+ | urldate = {2020-11-12}, | ||
+ | journal = {Strelka Mag}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{MediasEmotions, | ||
+ | title = {Médias et Emotions}, | ||
+ | isbn = {9791280060716}, | ||
+ | url = {http://romatrepress.uniroma3.it/wp-content/uploads/2020/10/Prismes-n.-2-2020.pdf}, | ||
+ | urldate = {2020-11-09}, | ||
+ | file = {Médias et Emotions:/home/ruben/Zotero/storage/F9AKE2KY/Prismes-n.-2-2020.pdf.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{StudioTransdisciplinaryArts, | ||
+ | title = {2020-11-6/8 Studio for Transdisciplinary Arts Research – Transdisciplinary Arts Research at the Intersections between Art, Science and Culture}, | ||
+ | url = {https://blogs.unsw.edu.au/tiic/}, | ||
+ | language = {en-US}, | ||
+ | urldate = {2020-11-07}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{ResearchersShowThat2020, | ||
+ | title = {Researchers show that computer vision algorithms pretrained on ImageNet exhibit multiple, distressing biases}, | ||
+ | url = {https://venturebeat.com/2020/11/03/researchers-show-that-computer-vision-algorithms-pretrained-on-imagenet-exhibit-multiple-distressing-biases/}, | ||
+ | abstract = {Researchers say they've found evidence of pervasive bias in computer vision algorithms trained on ImageNet, a popular photo dataset.}, | ||
+ | language = {en-US}, | ||
+ | urldate = {2020-11-06}, | ||
+ | journal = {VentureBeat}, | ||
+ | month = nov, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{morseFacialRecognitionUsed, | ||
+ | title = {Facial recognition used to arrest protestor at Trump bible photo op}, | ||
+ | url = {https://mashable.com/article/facial-recognition-arrest-black-lives-matter-protestor-trump-bible-photo-op/}, | ||
+ | abstract = {Law enforcement used images pulled off Twitter, combined with a facial recognition system, to identify a protestor.}, | ||
+ | language = {en}, | ||
+ | urldate = {2020-11-03}, | ||
+ | journal = {Mashable}, | ||
+ | author = {Morse, Jack}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{MITComparativeMedia, | ||
+ | title = {MIT Comparative Media Studies/Writing {\textbar} Critical analysis, collaborative research, and design across media arts, forms, and practices}, | ||
+ | url = {https://cmsw.mit.edu/}, | ||
+ | abstract = {An innovative humanities program that applies critical analysis, collaborative research, and design across media arts, forms, and practices.}, | ||
+ | language = {en-US}, | ||
+ | urldate = {2020-11-03}, | ||
+ | journal = {MIT Comparative Media Studies/Writing}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{SensoryEthnographyLab, | ||
+ | title = {Sensory Ethnography Lab :: Harvard University}, | ||
+ | url = {https://sel.fas.harvard.edu/}, | ||
+ | urldate = {2020-11-03}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{InvestigationsForensicArchitecture, | ||
+ | title = {Investigations ← Forensic Architecture}, | ||
+ | url = {https://forensic-architecture.org/}, | ||
+ | urldate = {2020-11-03}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{PeopleAMLab, | ||
+ | title = {People {\textbar} AMLab}, | ||
+ | url = {https://amlab.science.uva.nl/people/}, | ||
+ | language = {en-US}, | ||
+ | urldate = {2020-11-03}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{StadsnachtwachtUrbanSurveillance, | ||
+ | title = {stadsnachtwacht - urban surveillance research site}, | ||
+ | url = {http://www.stadsnachtwacht.nl/}, | ||
+ | language = {en}, | ||
+ | urldate = {2020-11-03}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{CenterExperimentalEthnography, | ||
+ | title = {The Center for Experimental Ethnography (UPenn)}, | ||
+ | url = {https://www.centerforexperimentalethnography.org/}, | ||
+ | abstract = {The Center for Experimental Ethnography at the University of Pennsylvania seeks to amplify discussions regarding the emerging forms scholarly research is taking in the humanities and social sciences, and to create institutional interventions related to no}, | ||
+ | language = {en}, | ||
+ | urldate = {2020-11-03}, | ||
+ | journal = {centerforexperimentalethnography}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{IndexPhpMb, | ||
+ | title = {index.php of mb.nl}, | ||
+ | url = {http://213.167.241.137/~mb/}, | ||
+ | urldate = {2020-11-03}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{SelectedProjects, | ||
+ | title = {Selected Projects}, | ||
+ | url = {http://www.wardgoes.com/}, | ||
+ | urldate = {2020-11-03}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{zotero-216, | ||
+ | title = {➩ ➪ ➫ ➬ ➭ ➮ ➯ ➱}, | ||
+ | url = {http://pleungremmen.nl/}, | ||
+ | urldate = {2020-11-03}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{AlyarAynetchi, | ||
+ | title = {Alyar Aynetchi}, | ||
+ | url = {https://alyaraynetchi.com}, | ||
+ | abstract = {Alyar Aynetchi is an Art Director and Designer based in Amsterdam.}, | ||
+ | language = {en}, | ||
+ | urldate = {2020-11-03}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{ProjectSupportDesk, |
− | + | title = {Project:Support desk - MediaWiki}, | |
− | + | url = {https://www.mediawiki.org/wiki/Project:Support_desk}, | |
− | } | + | urldate = {2020-11-03}, |
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{SemanticMediaWikiMailing, |
− | + | title = {Semantic MediaWiki / Mailing Lists / Search}, | |
− | + | url = {https://sourceforge.net/p/semediawiki/mailman/search/?mail_list=semediawiki-user}, | |
− | } | + | urldate = {2020-11-03}, |
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{WhyAIGeniuses2020, |
− | + | title = {Why AI Geniuses Haven’t Created True Thinking Machines}, | |
− | + | url = {https://mindmatters.ai/2020/10/why-ai-geniuses-havent-created-true-thinking-machines/}, | |
− | + | abstract = {Quantum computers play by the same rules as digital ones: Meaningful information still requires an interpreter (observer) to relate the map to the territory.}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2020-10-24}, | |
− | + | journal = {Mind Matters}, | |
− | + | month = oct, | |
− | } | + | year = {2020}, |
+ | file = {Snapshot:/home/ruben/Zotero/storage/YY4LFZQ2/why-ai-geniuses-havent-created-true-thinking-machines.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{harveyAllmodelsAiDataset, |
− | + | title = {[allmodels.ai] Dataset Retractions}, | |
− | + | author = {Harvey, Adam}, | |
− | + | file = {allmodils - Dataset Retractions.pdf:/home/ruben/Zotero/storage/FNDDXF86/allmodils - Dataset Retractions.pdf:application/pdf}, | |
− | } | + | } |
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{ochigameInformaticsOppressed, |
− | + | title = {Informatics of the Oppressed}, | |
− | + | url = {https://logicmag.io/care/informatics-of-the-oppressed/}, | |
− | + | abstract = {An inquiry into the rich history of radical experiments to reorganize information.}, | |
− | + | number = {11}, | |
− | + | urldate = {2020-10-21}, | |
− | + | journal = {Logic Magazine}, | |
− | } | + | author = {Ochigame, Rodrigo}, |
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{ChallengesComparingHuman2020, |
− | + | title = {Challenges of Comparing Human and Machine Perception}, | |
− | + | url = {https://thegradient.pub/challenges-of-comparing-human-and-machine-perception/}, | |
− | + | abstract = {On how comparison studies between AI and humans be fruitful -- if care is taken.}, | |
− | } | + | language = {en}, |
+ | urldate = {2020-08-03}, | ||
+ | journal = {The Gradient}, | ||
+ | month = jul, | ||
+ | year = {2020}, | ||
+ | note = {Library Catalog: thegradient.pub}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/N9QBBJSW/challenges-of-comparing-human-and-machine-perception.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{ShortcutsHowNeural2020, |
− | + | title = {Shortcuts: How Neural Networks Love to Cheat}, | |
− | + | shorttitle = {Shortcuts}, | |
− | + | url = {https://thegradient.pub/shortcuts-neural-networks-love-to-cheat/}, | |
− | + | abstract = {On unifying many of deep learning’s problems and with the concepts of "shortcuts", and what we can do to better understand and mitigate shortcut learning.}, | |
− | } | + | language = {en}, |
+ | urldate = {2020-08-03}, | ||
+ | journal = {The Gradient}, | ||
+ | month = jul, | ||
+ | year = {2020}, | ||
+ | note = {Library Catalog: thegradient.pub}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{OpinionWeNow, |
− | + | title = {Opinion {\textbar} We now have evidence of facial recognition’s harm. Time for lawmakers to act.}, | |
− | + | issn = {0190-8286}, | |
− | + | url = {https://www.washingtonpost.com/opinions/we-now-have-evidence-of-facial-recognitions-harm-time-for-lawmakers-to-act/2020/07/05/e62ee8d0-baf8-11ea-80b9-40ece9a701dc_story.html}, | |
− | + | abstract = {Lawmakers must regulate facial recognition technology, or more wrongful arrests are coming.}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2020-07-13}, | |
− | + | journal = {Washington Post}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/TTRBVKGJ/www.washingtonpost.com.html:text/html}, | |
− | + | } | |
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{morsePoliceUseFacialrecognition, |
− | + | title = {Police use facial-recognition tech to arrest another innocent man}, | |
− | + | url = {https://mashable.com/article/arrested-facial-recognition-technology/}, | |
− | + | abstract = {For the second time in less than three weeks, it was revealed that Detroit police used faulty technology to arrest the wrong man.}, | |
− | + | language = {en}, | |
− | + | urldate = {2020-07-13}, | |
− | + | journal = {Mashable}, | |
− | } | + | author = {Morse, Jack}, |
+ | note = {Library Catalog: mashable.com}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/D4KT6GEQ/arrested-facial-recognition-technology.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{ZeroShotLearningDr, |
− | + | title = {Zero-Shot Learning - Dr. Timothy Hospedales - YouTube}, | |
− | + | url = {https://www.youtube.com/watch?v=jBnCcr-3bXc&list=PLd4H06TkjIlBiECoaH85aZRB4XEPmo9LG&index=2&t=0s}, | |
− | + | urldate = {2020-04-19}, | |
− | + | note = {http://web.archive.org/web/20200419092323/https://www.youtube.com/watch?v=jBnCcr-3bXc\&list=PLd4H06TkjIlBiECoaH85aZRB4XEPmo9LG\&index=2\&t=0s}, | |
− | + | file = {Zero-Shot Learning - Dr. Timothy Hospedales - YouTube:/home/ruben/Zotero/storage/SH74WLFV/watch.html:text/html}, | |
− | + | } | |
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
|bibtex=@misc{AIWeeklyCoronavirus2020, | |bibtex=@misc{AIWeeklyCoronavirus2020, | ||
− | + | title = {AI Weekly: Coronavirus, facial recognition, and the future of privacy}, | |
− | + | shorttitle = {AI Weekly}, | |
− | + | url = {https://venturebeat.com/2020/03/06/ai-weekly-coronavirus-facial-recognition-and-the-future-of-privacy/}, | |
− | + | abstract = {China has used AI and surveillance to curb COVID-19, but some argue other nations must respond differently if we are to preserve personal privacies.}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2020-03-15}, | |
− | + | journal = {VentureBeat}, | |
− | chapter = {AI}, | + | month = mar, |
− | journal = { | + | year = {2020}, |
− | language = {en-US} | + | note = {Library Catalog: venturebeat.com |
− | } | + | Section: AI}, |
+ | file = {Snapshot:/home/ruben/Zotero/storage/J2AD6CAY/ai-weekly-coronavirus-facial-recognition-and-the-future-of-privacy.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{boothHaltPublicUse2020, | ||
+ | chapter = {UK news}, | ||
+ | title = {Halt public use of facial recognition tech, says equality watchdog}, | ||
+ | issn = {0261-3077}, | ||
+ | url = {https://www.theguardian.com/uk-news/2020/mar/12/halt-public-use-of-facial-recognition-tech-says-equality-watchdog}, | ||
+ | abstract = {Equalities and Human Rights Commission says mass AFR surveillance is discriminatory and stifles free expression}, | ||
+ | language = {en-GB}, | ||
+ | urldate = {2020-03-15}, | ||
+ | journal = {The Guardian}, | ||
+ | author = {Booth, Robert}, | ||
+ | month = mar, | ||
+ | year = {2020}, | ||
+ | keywords = {Equality and Human Rights Commission (EHRC), Facial recognition, Police, Race, Society, Surveillance, UK news}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/UR2QQCUJ/halt-public-use-of-facial-recognition-tech-says-equality-watchdog.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{cruickshankHopkinsExpertsPresent2020, | ||
+ | title = {Hopkins experts present latest coronavirus information on Capitol Hill}, | ||
+ | url = {https://hub.jhu.edu/2020/03/06/covid-19-coronavirus-expert-testimony-to-congress/}, | ||
+ | abstract = {Experts discuss how COVID-19 is transmitted, how it is being tracked, and how governments, institutions, and individuals can prevent its spread}, | ||
+ | language = {en}, | ||
+ | urldate = {2020-03-12}, | ||
+ | journal = {The Hub}, | ||
+ | author = {Cruickshank, Saralyn and March 7, Katie Pearce / Published}, | ||
+ | month = mar, | ||
+ | year = {2020}, | ||
+ | note = {Library Catalog: hub.jhu.edu}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/FPJWT77A/covid-19-coronavirus-expert-testimony-to-congress.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{gershgornExclusiveLiveFacial2020, | ||
+ | title = {Exclusive: Live Facial Recognition Is Coming to U.S. Police Body Cameras}, | ||
+ | shorttitle = {Exclusive}, | ||
+ | url = {https://onezero.medium.com/exclusive-live-facial-recognition-is-coming-to-u-s-police-body-cameras-bc9036918ae0}, | ||
+ | abstract = {Police cam manufacturer Wolfcom has contracts with 1,500 organizations}, | ||
+ | language = {en}, | ||
+ | urldate = {2020-03-05}, | ||
+ | journal = {Medium}, | ||
+ | author = {Gershgorn, Dave}, | ||
+ | month = mar, | ||
+ | year = {2020}, | ||
+ | note = {http://web.archive.org/web/20200305173758/https://onezero.medium.com/exclusive-live-facial-recognition-is-coming-to-u-s-police-body-cameras-bc9036918ae0}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/5QM2KNUY/exclusive-live-facial-recognition-is-coming-to-u-s-police-body-cameras-bc9036918ae0.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{ClearviewFacialRecognition, | ||
+ | title = {Clearview’s Facial Recognition App Has Been Used By The Justice Department, ICE, Macy’s, Walmart, And The NBA}, | ||
+ | url = {https://www.buzzfeednews.com/article/ryanmac/clearview-ai-fbi-ice-global-law-enforcement}, | ||
+ | abstract = {A BuzzFeed News review of Clearview AI documents has revealed the company is working with more than 2,200 law enforcement agencies, companies, and individuals around the world.}, | ||
+ | language = {en}, | ||
+ | urldate = {2020-02-28}, | ||
+ | journal = {BuzzFeed News}, | ||
+ | note = {http://web.archive.org/web/20200228084853/https://www.buzzfeednews.com/article/ryanmac/clearview-ai-fbi-ice-global-law-enforcement}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/Y7QT2DEJ/clearview-ai-fbi-ice-global-law-enforcement.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{murgiaWhoUsingYour2019, | ||
+ | title = {Who’s using your face? The ugly truth about facial recognition}, | ||
+ | shorttitle = {Who’s using your face?}, | ||
+ | url = {https://www.ft.com/content/cf19b956-60a2-11e9-b285-3acd5d43599e}, | ||
+ | abstract = {Researchers are scraping our images from social media and CCTV. We may not like the consequences}, | ||
+ | language = {en-GB}, | ||
+ | urldate = {2020-02-27}, | ||
+ | author = {Murgia, Madhumita and Harlow, Max}, | ||
+ | month = apr, | ||
+ | year = {2019}, | ||
+ | note = {http://web.archive.org/web/20200227090254/https://www.ft.com/content/cf19b956-60a2-11e9-b285-3acd5d43599e}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/GUJKQRUN/cf19b956-60a2-11e9-b285-3acd5d43599e.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{PaintYourFace, | ||
+ | title = {Paint Your Face Away – Shinji Toya}, | ||
+ | url = {https://shinjitoya.com/paint-your-face-away/}, | ||
+ | language = {en-GB}, | ||
+ | urldate = {2020-02-27}, | ||
+ | note = {http://web.archive.org/web/20200227084817/https://shinjitoya.com/paint-your-face-away/}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/ISPHZ5PN/paint-your-face-away.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{harwellICEHasRun, | ||
+ | title = {ICE has run facial-recognition searches on millions of Maryland drivers}, | ||
+ | url = {https://www.washingtonpost.com/technology/2020/02/26/ice-has-run-facial-recognition-searches-millions-maryland-drivers/}, | ||
+ | abstract = {The direct and largely unlimited access granted to immigration-enforcement officials marks an aggressive new step for the federal agency in regard to Americans’ photos and personal data. It also raises the risk that undocumented immigrants who applied for driver’s licenses under the state’s landmark program could have been targeted.}, | ||
+ | language = {en}, | ||
+ | urldate = {2020-02-27}, | ||
+ | journal = {Washington Post}, | ||
+ | author = {Harwell, Drew}, | ||
+ | note = {http://web.archive.org/web/20200227062735/https://www.washingtonpost.com/technology/2020/02/26/ice-has-run-facial-recognition-searches-millions-maryland-drivers/}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/WQ9BMM4K/ice-has-run-facial-recognition-searches-millions-maryland-drivers.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{gilmerClearviewAIFacialrecognition, | ||
+ | title = {Clearview AI, the facial-recognition company stealing Facebook photos, gets hacked}, | ||
+ | url = {https://mashable.com/article/clearview-ai-client-list-hacked/}, | ||
+ | abstract = {You had one job!}, | ||
+ | language = {en}, | ||
+ | urldate = {2020-02-27}, | ||
+ | journal = {Mashable}, | ||
+ | author = {Gilmer, Marcus}, | ||
+ | note = {http://web.archive.org/web/20200227062724/https://mashable.com/article/clearview-ai-client-list-hacked/}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/DUE95YUX/clearview-ai-client-list-hacked.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{leonardCodeObsessedNovelistBuilds2020, | ||
+ | title = {A Code-Obsessed Novelist Builds a Writing Bot. The Plot Thickens}, | ||
+ | issn = {1059-1028}, | ||
+ | url = {https://www.wired.com/story/code-obsessed-novelist-builds-writing-bot-the-plot-thickens/}, | ||
+ | abstract = {Vikram Chandra, the author of Sacred Games, created Granthika to keep track of complex narratives. It could change the future of storytelling.}, | ||
+ | language = {en}, | ||
+ | urldate = {2020-02-26}, | ||
+ | journal = {Wired}, | ||
+ | author = {Leonard, Andrew}, | ||
+ | month = jun, | ||
+ | year = {2020}, | ||
+ | keywords = {artificial intelligence, longreads}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/I9UGT65T/code-obsessed-novelist-builds-writing-bot-the-plot-thickens.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{researchVideoAnalyticsSystem, | ||
+ | title = {Video Analytics System Market Size, Share, Growth Analysis By Key Players IBM Corporation, Honeywell International Inc., Qognify Inc., BriefCam, Verint, – The NyseNasdaqLive News}, | ||
+ | url = {https://nysenasdaqlive.com/video-analytics-system-market-size-share-growth-analysis-by-key-players-ibm-corporation-honeywell-international-inc-qognify-inc-briefcam-verint/}, | ||
+ | language = {en-US}, | ||
+ | urldate = {2020-02-21}, | ||
+ | author = {Research, Data Bridge Market}, | ||
+ | note = {http://web.archive.org/web/20200221092404/https://nysenasdaqlive.com/video-analytics-system-market-size-share-growth-analysis-by-key-players-ibm-corporation-honeywell-international-inc-qognify-inc-briefcam-verint/}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/GW3UI7HI/video-analytics-system-market-size-share-growth-analysis-by-key-players-ibm-corporation-honeywe.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ReconnaissanceFacialePour2019, | ||
+ | title = {La reconnaissance faciale pour s’identifier en ligne inquiète les défenseurs des libertés numériques}, | ||
+ | url = {https://www.lemonde.fr/societe/article/2019/07/27/la-reconnaissance-faciale-pour-s-identifier-en-ligne-inquiete-les-defenseurs-des-libertes-numeriques_5494076_3224.html}, | ||
+ | abstract = {Un recours a été déposé devant le Conseil d’Etat pour faire annuler le décret autorisant l’application AliceM.}, | ||
+ | language = {fr}, | ||
+ | urldate = {2020-02-20}, | ||
+ | journal = {Le Monde.fr}, | ||
+ | month = jul, | ||
+ | year = {2019}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/ZEE4I5N3/la-reconnaissance-faciale-pour-s-identifier-en-ligne-inquiete-les-defenseurs-des-libertes-numer.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{ReconnaissanceFacialePromesses, | ||
+ | title = {La reconnaissance faciale, des promesses et des risques}, | ||
+ | url = {https://www.instapaper.com/read/1279123996}, | ||
+ | abstract = {A simple tool for saving web pages to read later on your iPhone, iPad, Android, computer, or Kindle.}, | ||
+ | language = {en}, | ||
+ | urldate = {2020-02-20}, | ||
+ | note = {http://web.archive.org/web/20200220133504/https://www.lemonde.fr/idees/article/2020/02/20/promesses-et-risques-de-la-reconnaissance-faciale\_6030160\_3232.html}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/DPRBNU9N/1279123996.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{MarseilleDevantJustice, |
− | + | title = {Marseille devant la justice pour l'installation d'un réseau de "vidéoprotection intelligente"}, | |
− | + | url = {https://www.usine-digitale.fr/article/marseille-devant-la-justice-pour-l-installation-d-un-reseau-de-videoprotection-intelligente.N922079}, | |
− | + | abstract = {La Quadrature du Net et La Ligue des droits de l\&\#39;Homme attaquent la ville de Marseille pour l\&\#39;installation d\&\#39;un r\éseau de \"vid\éoprotection intelligente\" qui \"analyse et fusionne les informations provenant de plusieurs capteurs\" pour aider la police municipale. Selon les deux associations, ce dispositif viole le droit \à la vie priv\ée et ne respecte pas le cadre l\égislatif impos\é pour ce type de projet. | |
− | + | ||
− | + | \ }, | |
− | } | + | urldate = {2020-02-19}, |
+ | journal = {usine-digitale.fr}, | ||
+ | note = {http://web.archive.org/web/20200219080245/https://www.usine-digitale.fr/article/marseille-devant-la-justice-pour-l-installation-d-un-reseau-de-videoprotection-intelligente.N922079}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/93EZR6VW/marseille-devant-la-justice-pour-l-installation-d-un-reseau-de-videoprotection-intelligente.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{herceDeadSlowAhead2016, |
− | + | type = {Documentary, Drama, Horror, Mystery, Sci-Fi}, | |
− | + | title = {Dead Slow Ahead}, | |
− | + | publisher = {El Viaje Films, Nanouk Films}, | |
− | + | author = {Herce, Mauro}, | |
− | } | + | collaborator = {Herce, Mauro and Rivas, Manuel Muñoz}, |
+ | month = oct, | ||
+ | year = {2016}, | ||
+ | note = {IMDb ID: tt4881208 | ||
+ | event-location: Spain}, | ||
+ | keywords = {atlantic ocean, experimental film, ocean, telephone conversation, voice over}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{HotelPoliceMunicipale2020, |
− | + | title = {Un hôtel de Police Municipale flambant neuf avec un CSU dernier cri}, | |
− | + | url = {https://www.roubaixxl.fr/un-hotel-de-police-municipale-flambant-neuf-avec-un-csu-dernier-cri/}, | |
− | + | abstract = {L’hôtel de Police Municipale flambant neuf, rue du maréchal Foch, a été inauguré jeudi 16 janvier. Un équipement spacieux et fonctionnel qui accueille au deuxième étage le très moderne Centre de Supervision Urbain (CSU) et ses écrans high-tech.}, | |
− | + | language = {fr-FR}, | |
− | + | urldate = {2020-02-18}, | |
− | + | journal = {ROUBAIXXL}, | |
− | + | month = jan, | |
− | + | year = {2020}, | |
− | + | note = {http://web.archive.org/web/20200218075616/https://www.roubaixxl.fr/un-hotel-de-police-municipale-flambant-neuf-avec-un-csu-dernier-cri/}, | |
− | } | + | file = {Snapshot:/home/ruben/Zotero/storage/VRUCPM64/un-hotel-de-police-municipale-flambant-neuf-avec-un-csu-dernier-cri.html:text/html}, |
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{riviereVideosurveillanceAutomatiseeNe, |
− | + | title = {Vidéosurveillance automatisée : on ne pourra plus faire un pet de travers - CQFD, mensuel de critique et d'expérimentation sociales}, | |
− | + | shorttitle = {Vidéosurveillance automatisée}, | |
− | + | url = {http://cqfd-journal.org/Videosurveillance-automatisee-on}, | |
− | + | abstract = {CQFD, critique et expérimentation sociales}, | |
− | } | + | language = {fr}, |
+ | urldate = {2020-02-18}, | ||
+ | author = {Rivière, Clair}, | ||
+ | note = {http://web.archive.org/web/20200218075508/http://cqfd-journal.org/Videosurveillance-automatisee-on}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/V52FRBMS/Videosurveillance-automatisee-on.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
|bibtex=@misc{AnnaRidlerCV, | |bibtex=@misc{AnnaRidlerCV, | ||
− | + | title = {Anna Ridler CV}, | |
− | + | url = {http://annaridler.com/c-v}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2020-02-16}, | |
− | + | journal = {ANNA RIDLER}, | |
− | + | note = {http://web.archive.org/web/20200216172849/http://annaridler.com/c-v}, | |
− | } | + | file = {Snapshot:/home/ruben/Zotero/storage/6HK9X3WR/c-v.html:text/html}, |
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@misc{TechTalkAutomated, |
− | + | title = {Tech Talk: Automated citations in Wikipedia: Citoid and the technology behind it}, | |
− | shorttitle = { | + | shorttitle = {Tech Talk}, |
− | + | url = {https://www.youtube.com/watch?v=ltEL-kPURKs}, | |
− | + | abstract = {IRC: \#wikimedia -office | |
− | month = nov, | + | |
− | volume = { | + | Summary: The talk provides a very brief introduction to Marielle Volz's Citoid, the tool providing Wikipedia's new automated citations.I then focus on the technology underlying Citoid, Zotero translators, and discuss how interested users/developers can help improve that functionality to better serve the Wikipedia community. |
− | + | ||
− | + | Speaker: Sebastian Karcher (Syracuse University, Zotero) - http://www.sebastiankarcher.com/ | |
− | issn = { | + | (Sebastian is the Associate Director of the Qualitative Data Repository at Syracuse University.) |
− | + | ||
− | url = {10.1177/ | + | Helpful links: |
− | urldate = {2020- | + | https://www.mediawiki.org/wiki/Citoid... |
− | abstract = {The | + | https://www.mozilla.org/en-US/firefox... |
− | + | https://www.zotero.org/download/ Download | |
− | language = {en}, | + | https://www.zotero.org/support/dev/tr... |
− | + | http://www.sebastiankarcher.com/linkl... | |
− | } | + | https://github.com/zotero/translators/ |
+ | https://github.com/zuphilip/translato...}, | ||
+ | urldate = {2020-02-16}, | ||
+ | note = {http://web.archive.org/web/20200216113124/https://www.youtube.com/watch?v=ltEL-kPURKs}, | ||
+ | keywords = {Tutorials}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{guoMSCeleb1MDatasetBenchmark2016, | ||
+ | title = {MS-Celeb-1M: A Dataset and Benchmark for Large-Scale Face Recognition}, | ||
+ | shorttitle = {MS-Celeb-1M}, | ||
+ | url = {http://arxiv.org/abs/1607.08221}, | ||
+ | abstract = {In this paper, we design a benchmark task and provide the associated datasets for recognizing face images and link them to corresponding entity keys in a knowledge base. More specifically, we propose a benchmark task to recognize one million celebrities from their face images, by using all the possibly collected face images of this individual on the web as training data. The rich information provided by the knowledge base helps to conduct disambiguation and improve the recognition accuracy, and contributes to various real-world applications, such as image captioning and news video analysis. Associated with this task, we design and provide concrete measurement set, evaluation protocol, as well as training data. We also present in details our experiment setup and report promising baseline results. Our benchmark task could lead to one of the largest classification problems in computer vision. To the best of our knowledge, our training dataset, which contains 10M images in version 1, is the largest publicly available one in the world.}, | ||
+ | urldate = {2020-11-18}, | ||
+ | journal = {arXiv:1607.08221 [cs]}, | ||
+ | author = {Guo, Yandong and Zhang, Lei and Hu, Yuxiao and He, Xiaodong and Gao, Jianfeng}, | ||
+ | month = jul, | ||
+ | year = {2016}, | ||
+ | note = {arXiv: 1607.08221}, | ||
+ | keywords = {Computer Science - Computer Vision and Pattern Recognition}, | ||
+ | file = {Guo et al_2016_MS-Celeb-1M.pdf:/home/ruben/Zotero/storage/5ZZ69Q3B/Guo et al_2016_MS-Celeb-1M.pdf:application/pdf;arXiv.org Snapshot:/home/ruben/Zotero/storage/EAJQI2MR/1607.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@inproceedings{wuExploitUnknownGradually2018, | ||
+ | title = {Exploit the Unknown Gradually: One-Shot Video-Based Person Re-identification by Stepwise Learning}, | ||
+ | shorttitle = {Exploit the Unknown Gradually}, | ||
+ | doi = {10.1109/CVPR.2018.00543}, | ||
+ | abstract = {We focus on the one-shot learning for video-based person re-Identification (re-ID). Unlabeled tracklets for the person re-ID tasks can be easily obtained by preprocessing, such as pedestrian detection and tracking. In this paper, we propose an approach to exploiting unlabeled tracklets by gradually but steadily improving the discriminative capability of the Convolutional Neural Network (CNN) feature representation via stepwise learning. We first initialize a CNN model using one labeled tracklet for each identity. Then we update the CNN model by the following two steps iteratively: 1. sample a few candidates with most reliable pseudo labels from unlabeled tracklets; 2. update the CNN model according to the selected data. Instead of the static sampling strategy applied in existing works, we propose a progressive sampling method to increase the number of the selected pseudo-labeled candidates step by step. We systematically investigate the way how we should select pseudo-labeled tracklets into the training set to make the best use of them. Notably, the rank-1 accuracy of our method outperforms the state-of-the-art method by 21.46 points (absolute, i.e., 62.67\% vs. 41.21\%) on the MARS dataset, and 16.53 points on the DukeMTMC-VideoReID dataset.}, | ||
+ | booktitle = {2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition}, | ||
+ | author = {Wu, Y. and Lin, Y. and Dong, X. and Yan, Y. and Ouyang, W. and Yang, Y.}, | ||
+ | month = jun, | ||
+ | year = {2018}, | ||
+ | note = {ISSN: 2575-7075}, | ||
+ | keywords = {Cameras, CNN model, convolution, convolutional neural network, Data models, Estimation, feature extraction, Feature extraction, feedforward neural nets, iterative methods, learning (artificial intelligence), object detection, object tracking, one-shot learning, one-shot video-based person re-identification, pedestrian detection, person re-ID tasks, progressive sampling method, pseudolabeled candidates step, Reliability, sampling methods, static sampling strategy, stepwise learning, Task analysis, tracking, Training, unlabeled tracklets, video signal processing}, | ||
+ | pages = {5177--5186}, | ||
+ | file = {Wu et al_2018_Exploit the Unknown Gradually.pdf:/home/ruben/Zotero/storage/WFIF25VN/Wu et al_2018_Exploit the Unknown Gradually.pdf:application/pdf;IEEE Xplore Abstract Record:/home/ruben/Zotero/storage/5NZDSZHC/8578641.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{hollanekAITransparencyMatter2020a, | ||
+ | title = {AI transparency: a matter of reconciling design with critique}, | ||
+ | issn = {1435-5655}, | ||
+ | shorttitle = {AI transparency}, | ||
+ | url = {10.1007/s00146-020-01110-y}, | ||
+ | doi = {10.1007/s00146-020-01110-y}, | ||
+ | abstract = {In the late 2010s, various international committees, expert groups, and national strategy boards have voiced the demand to ‘open’ the algorithmic black box, to audit, expound, and demystify artificial intelligence. The opening of the algorithmic black box, however, cannot be seen only as an engineering challenge. In this article, I argue that only the sort of transparency that arises from critique—a method of theoretical examination that, by revealing pre-existing power structures, aims to challenge them—can help us produce technological systems that are less deceptive and more just. I relate the question of AI transparency to the broader challenge of responsible making, contending that future action must aim to systematically reconcile design—as a way of concealing—with critique—as a manner of revealing.}, | ||
+ | language = {en}, | ||
+ | urldate = {2020-11-19}, | ||
+ | journal = {AI \& SOCIETY}, | ||
+ | author = {Hollanek, Tomasz}, | ||
+ | month = nov, | ||
+ | year = {2020}, | ||
+ | keywords = {classified}, | ||
+ | file = {Hollanek_2020_AI transparency.pdf:/home/ruben/Zotero/storage/UIXEFACZ/Hollanek_2020_AI transparency.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ragazziGoverningDiasporas2009, | ||
+ | title = {Governing Diasporas}, | ||
+ | volume = {3}, | ||
+ | issn = {1749-5679}, | ||
+ | url = {10.1111/j.1749-5687.2009.00082.x}, | ||
+ | doi = {10.1111/j.1749-5687.2009.00082.x}, | ||
+ | abstract = {Abstract. The study of migration in general and in IR in particular has generally meant the study of immigration. Yet, sending states increasingly manage and go}, | ||
+ | language = {en}, | ||
+ | number = {4}, | ||
+ | urldate = {2020-11-19}, | ||
+ | journal = {International Political Sociology}, | ||
+ | author = {Ragazzi, Francesco}, | ||
+ | month = dec, | ||
+ | year = {2009}, | ||
+ | note = {Publisher: Oxford Academic}, | ||
+ | pages = {378--397}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{uliaszSeeingAlgorithmOperative2020, | ||
+ | title = {Seeing like an algorithm: operative images and emergent subjects}, | ||
+ | issn = {1435-5655}, | ||
+ | shorttitle = {Seeing like an algorithm}, | ||
+ | url = {https://doi.org/10.1007/s00146-020-01067-y}, | ||
+ | doi = {10.1007/s00146-020-01067-y}, | ||
+ | abstract = {Algorithmic vision, the computational process of making meaning from digital images or visual information, has changed the relationship between the image and the human subject. In this paper, I explicate on the role of algorithmic vision as a technique of algorithmic governance, the organization of a population by algorithmic means. With its roots in the United States post-war cybernetic sciences, the ontological status of the computational image undergoes a shift, giving way to the hegemonic use of automated facial recognition technologies towards predatory policing and profiling practices. By way of example, I argue that algorithmic vision reconfigures the philosophical links between vision, image, and truth, paradigmatically changing the way a human subject is represented through imagistic data. With algorithmic vision, the relationship between subject and representation challenges the humanistic discourse around images, calling for a critical displacement of the human subject from the center of an analysis of how computational images make meaning. I will explore the relationship between the operative image, the image that acts but is not seen by human eyes, and what Louise Amoore calls an “emergent subject,” a subject that is made visible through algorithmic techniques (2013). Algorithmic vision reveals subjects to power in a mode that requires a new approach towards analyzing the entanglement and invisiblization of the human in automated decision-making systems.}, | ||
+ | language = {en}, | ||
+ | urldate = {2020-11-23}, | ||
+ | journal = {AI \& SOCIETY}, | ||
+ | author = {Uliasz, Rebecca}, | ||
+ | month = sep, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ruppertDataPolitics2017, | ||
+ | title = {Data politics}, | ||
+ | volume = {4}, | ||
+ | issn = {2053-9517}, | ||
+ | url = {10.1177/2053951717717749}, | ||
+ | doi = {10.1177/2053951717717749}, | ||
+ | abstract = {The commentary raises political questions about the ways in which data has been constituted as an object vested with certain powers, influence, and rationalities. We place the emergence and transformation of professional practices such as ‘data science’, ‘data journalism’, ‘data brokerage’, ‘data mining’, ‘data storage’, and ‘data analysis’ as part of the reconfiguration of a series of fields of power and knowledge in the public and private accumulation of data. Data politics asks questions about the ways in which data has become such an object of power and explores how to critically intervene in its deployment as an object of knowledge. It is concerned with the conditions of possibility of data that involve things (infrastructures of servers, devices, and cables), language (code, programming, and algorithms), and people (scientists, entrepreneurs, engineers, information technologists, designers) that together create new worlds. We define ‘data politics’ as both the articulation of political questions about these worlds and the ways in which they provoke subjects to govern themselves and others by making rights claims. We contend that without understanding these conditions of possibility – of worlds, subjects and rights – it would be difficult to intervene in or shape data politics if by that it is meant the transformation of data subjects into data citizens.}, | ||
+ | language = {en}, | ||
+ | number = {2}, | ||
+ | urldate = {2020-11-23}, | ||
+ | journal = {Big Data \& Society}, | ||
+ | author = {Ruppert, Evelyn and Isin, Engin and Bigo, Didier}, | ||
+ | month = dec, | ||
+ | year = {2017}, | ||
+ | note = {Publisher: SAGE Publications Ltd}, | ||
+ | pages = {2053951717717749}, | ||
+ | file = {Ruppert et al. - 2017 - Data politics.pdf:/home/ruben/Zotero/storage/RJ5BGR5X/Ruppert et al. - 2017 - Data politics.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ruppertDataPolitics2017a, | ||
+ | title = {Data politics}, | ||
+ | volume = {4}, | ||
+ | issn = {2053-9517}, | ||
+ | url = {10.1177/2053951717717749}, | ||
+ | doi = {10.1177/2053951717717749}, | ||
+ | abstract = {The commentary raises political questions about the ways in which data has been constituted as an object vested with certain powers, influence, and rationalities. We place the emergence and transformation of professional practices such as ‘data science’, ‘data journalism’, ‘data brokerage’, ‘data mining’, ‘data storage’, and ‘data analysis’ as part of the reconfiguration of a series of fields of power and knowledge in the public and private accumulation of data. Data politics asks questions about the ways in which data has become such an object of power and explores how to critically intervene in its deployment as an object of knowledge. It is concerned with the conditions of possibility of data that involve things (infrastructures of servers, devices, and cables), language (code, programming, and algorithms), and people (scientists, entrepreneurs, engineers, information technologists, designers) that together create new worlds. We define ‘data politics’ as both the articulation of political questions about these worlds and the ways in which they provoke subjects to govern themselves and others by making rights claims. We contend that without understanding these conditions of possibility – of worlds, subjects and rights – it would be difficult to intervene in or shape data politics if by that it is meant the transformation of data subjects into data citizens.}, | ||
+ | language = {en}, | ||
+ | number = {2}, | ||
+ | urldate = {2020-11-23}, | ||
+ | journal = {Big Data \& Society}, | ||
+ | author = {Ruppert, Evelyn and Isin, Engin and Bigo, Didier}, | ||
+ | month = dec, | ||
+ | year = {2017}, | ||
+ | note = {Publisher: SAGE Publications Ltd}, | ||
+ | pages = {2053951717717749}, | ||
+ | file = {Ruppert et al_2017_Data politics.pdf:/home/ruben/Zotero/storage/YH4RJW9V/Ruppert et al_2017_Data politics.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{neweconomicthinkingThisTimeDifferent2020, | ||
+ | title = {Is This Time Different? Data, Artificial Intelligence \& Robots}, | ||
+ | shorttitle = {Is This Time Different?}, | ||
+ | url = {https://www.youtube.com/watch?v=1mwkJ3QPKGQ}, | ||
+ | abstract = {Are there aspects of modern technology, made possible by unprecedented computing power and connectivity, that make them distinctively different from previous eras? If so, what are the implications? | ||
+ | |||
+ | In this episode of \#FutureofWork Rob Johnson moderates a discussion with Jed Kolko, Shivani Nayyar and Siddharth Suri. They take a close look at modern digital technologies in our era. Are there aspects of modern technology, made possible by a plethora of data, unprecedented computing power and connectivity, that make them distinctively different from previous eras? If so, what are the implications to our societies? | ||
+ | |||
+ | -- | ||
+ | |||
+ | The Future of Work is an INET webinar series that brings together diverse voices to discuss the impact of technology on the economy and society. We host prominent thinkers, policy-makers, and scholars from different backgrounds and countries to present and debate their views. | ||
+ | |||
+ | As technology continues to disrupt industries globally, the nature and future of work will be impacted by decisions and policies being made today. What are the social costs and benefits that technology will bear on economies already transformed by globalization and what are the implications to labor markets and social welfare? Can we get ahead of the next transformational revolution?}, | ||
+ | urldate = {2020-11-23}, | ||
+ | author = {{New Economic Thinking}}, | ||
+ | month = nov, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{thenewcentreforresearchpracticeCollectiveInfrastructuresKnowledge2020, | ||
+ | title = {Collective Infrastructures and Knowledge Production in a Post-Digital Age}, | ||
+ | url = {https://www.youtube.com/watch?v=_KQJp-ICK_A}, | ||
+ | abstract = {The New Centre, Heba Y. Amin and Anthony Downey invite you to participate in an online workshop to test new forms of learning in a post-digital world. Guided by live presentations, this workshop with Mohammad Salemy, Brunella Antomarini, Valentin Golev, Reza Negarestani and Patricia Reed will generate a glossary of terms that will develop as a collective response to the online discussions. By thinking through the limits of computational technologies, the event will encourage users to rethink the conventional infrastructures that inform online learning and, in turn, formulate an experimental approach to shared knowledge production and political action. | ||
+ | |||
+ | The event is introduced by Heba Y. Amin and Anthony Dowey and will be moderated by Mohammad Salemy and Martina Cavalot. | ||
+ | |||
+ | First Session with Brunella Antomarini \& Valentin Golev | ||
+ | |||
+ | Secon Session with Reza Negarestani \& Patricia Reed: https://youtu.be/rVBa1hbPcCM}, | ||
+ | urldate = {2020-11-23}, | ||
+ | author = {{The New Centre for Research \& Practice}}, | ||
+ | month = nov, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{isinBirthSensoryPower2020, | ||
+ | title = {The birth of sensory power: How a pandemic made it visible?}, | ||
+ | volume = {7}, | ||
+ | issn = {2053-9517}, | ||
+ | shorttitle = {The birth of sensory power}, | ||
+ | url = {10.1177/2053951720969208}, | ||
+ | doi = {10.1177/2053951720969208}, | ||
+ | abstract = {Much has been written about data politics in the last decade, which has generated myriad concepts such as ‘surveillance capitalism’, ‘gig economy’, ‘quantified self’, ‘algorithmic governmentality’, ‘data colonialism’, ‘data subjects’ and ‘digital citizens’. Yet, it has been difficult to plot these concepts into an historical series to discern specific continuities and discontinuities since the origins of modern power in its three major forms: sovereign, disciplinary and regulatory. This article argues that the coronavirus pandemic in 2020 brought these three forms of power into sharp relief but made particularly visible a fourth form of power that we name ‘sensory power’, which has been emerging since the 1980s. The article draws on early studies of power by Michel Foucault, subsequent studies on biopower and biopolitics that expanded on them, and studies in the past decade that focused on data produced from apps, devices and platforms. Yet, despite its ambition, the article is inevitably an outline of a much larger project.}, | ||
+ | language = {en}, | ||
+ | number = {2}, | ||
+ | urldate = {2020-11-23}, | ||
+ | journal = {Big Data \& Society}, | ||
+ | author = {Isin, Engin and Ruppert, Evelyn}, | ||
+ | month = jul, | ||
+ | year = {2020}, | ||
+ | note = {Publisher: SAGE Publications Ltd}, | ||
+ | pages = {2053951720969208}, | ||
+ | file = {Isin_Ruppert_2020_The birth of sensory power.pdf:/home/ruben/Zotero/storage/Z4DFQ8SM/Isin_Ruppert_2020_The birth of sensory power.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{maleveDataSetRuins2020, | ||
+ | title = {On the data set’s ruins}, | ||
+ | issn = {1435-5655}, | ||
+ | url = {10.1007/s00146-020-01093-w}, | ||
+ | doi = {10.1007/s00146-020-01093-w}, | ||
+ | abstract = {Computer vision aims to produce an understanding of digital image’s content and the generation or transformation of images through software. Today, a significant amount of computer vision algorithms rely on techniques of machine learning which require large amounts of data assembled in collections, or named data sets. To build these data sets a large population of precarious workers label and classify photographs around the clock at high speed. For computers to learn how to see, a scale articulates macro and micro dimensions: the millions of images culled from the internet with the few milliseconds given to the workers to perform a task for which they are paid a few cents. This paper engages in details with the production of this scale and the labour it relies on: its elaboration. This elaboration does not only require hands and retinas, it also crucially zes mobilises the photographic apparatus. To understand the specific character of the scale created by computer vision scientists, the paper compares it with a previous enterprise of scaling, Malraux’s Le Musée Imaginaire, where photography was used as a device to undo the boundaries of the museum’s collection and open it to an unlimited access to the world’s visual production. Drawing on Douglas Crimp’s argument that the “musée imaginaire”, a hyperbole of the museum, relied simultaneously on the active role of the photographic apparatus for its existence and on its negation, the paper identifies a similar problem in computer vision’s understanding of photography. The double dismissal of the role played by the workers and the agency of the photographic apparatus in the elaboration of computer vision foreground the inherent fragility of the edifice of machine vision and a necessary rethinking of its scale.}, | ||
+ | language = {en}, | ||
+ | urldate = {2020-11-23}, | ||
+ | journal = {AI \& SOCIETY}, | ||
+ | author = {Malevé, Nicolas}, | ||
+ | month = nov, | ||
+ | year = {2020}, | ||
+ | file = {Malevé_2020_On the data set’s ruins.pdf:/home/ruben/Zotero/storage/39JPZ7JB/Malevé_2020_On the data set’s ruins.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{BordersFear, | ||
+ | title = {2020-11-27/29 Borders of Fear}, | ||
+ | url = {https://www.disruptionlab.org/borders-of-fear}, | ||
+ | abstract = {MIGRATION, SECURITY \& CONTROL Live from Studio 1 - Kunstquartier Bethanien - Berlin November 27—29 2020}, | ||
+ | language = {en-US}, | ||
+ | urldate = {2020-11-25}, | ||
+ | journal = {Disruption Network Lab}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{ubcschoolofpublicpolicyandglobalaffairsLiuWebinarSeries2020, | ||
+ | title = {Liu Webinar Series: Silicon Valley and the Future of Capitalism}, | ||
+ | shorttitle = {Liu Webinar Series}, | ||
+ | url = {https://www.youtube.com/watch?v=FYKfi1DBivg}, | ||
+ | abstract = {This event, as a part of the Liu Institute for Global Issues webinar series, occurred on November 17, 2020. | ||
+ | |||
+ | |||
+ | |||
+ | The rapidly growing power of US tech companies to dominate digital markets has alarmed policymakers around the world. Google, Amazon, and Facebook are increasingly compared to the robber barons of the Gilded Age — a time of skyrocketing inequality and corporate overreach. Congressional investigators recently argued that “these firms have too much power, and that power must be reined in and subject to appropriate oversight and enforcement.” Observers are right to be worried. But reining in Big Tech will require us to look beyond digital markets to how capitalism itself has evolved over the past decade. Technology companies have used our smartphones to forge a new frontier of appropriation and exploitation with profound political, social, and ecological implications. | ||
+ | |||
+ | |||
+ | Presenter: Nicole Aschoff | ||
+ | Faculty Host: SPPGA Professor Ramana, Simons Chair in Disarmament, Global and Human Security; Director, Liu Institute for Global Issues, School of Public Policy and Global Affairs, UBC | ||
+ | Student Host: Alexander Howes, Master of Public Policy and Global Affairs, UBC | ||
+ | |||
+ | |||
+ | Bio: Nicole Aschoff is the author of The Smartphone Society and The New Prophets of Capital, the managing editor of the Boston Institute for Nonprofit Journalism, and an editor-at-large at Jacobin magazine. She holds a PhD in sociology from Johns Hopkins University and previously taught at Boston University. She lives in Cambridge, Massachusetts. | ||
+ | |||
+ | |||
+ | For future events, please visit https://sppga.ubc.ca}, | ||
+ | urldate = {2020-12-02}, | ||
+ | author = {{UBC School of Public Policy and Global Affairs}}, | ||
+ | month = nov, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{pressTechnoprecariousMITPress, | ||
+ | title = {Technoprecarious {\textbar} The MIT Press}, | ||
+ | url = {https://mitpress.mit.edu/books/technoprecarious}, | ||
+ | abstract = {An analysis that traces the role of digital technology in multiplying precarity. | ||
+ | |||
+ | Technoprecarious advances a new analytic for tracing how precarity unfolds across disparate geographical sites and cultural practices in the digital age. Digital technologies—whether apps like Uber, built on flexible labor, or platforms like Airbnb that shift accountability to users—have assisted in consolidating the wealth and influence of a small number of players. These platforms have also exacerbated increasingly insecure conditions of work and life for racial, ethnic, and sexual minorities; women; indigenous people; migrants; and peoples in the global south. At the same time, precarity has become increasingly generalized, expanding to include even the creative class and digital producers themselves. This collaboratively authored multigraph analyzes the role of digital technology in multiplying precarity. The authors use the term precarity to characterize those populations disproportionately affected by the forms of inequality and insecurity that digital technologies have generated despite the new affordances and possibilities they offer. The book maps a broad range of digital precarity—from the placement of Palestinian Internet cables to the manufacture of electronics by Navajo women and from the production and deployment of drones on the U.S.–Mexico border to the technocultural productions of Chinese makers. This project contributes to, and helps bridge, ongoing debates on precarity and digital networks in the fields of critical computing, postcolonial studies, visual culture, and information sciences.}, | ||
+ | language = {en}, | ||
+ | urldate = {2020-12-02}, | ||
+ | author = {Press, The MIT}, | ||
+ | note = {Publisher: The MIT Press}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{mitchellAlgorithmicFairnessChoices2021, | ||
+ | title = {Algorithmic Fairness: Choices, Assumptions, and Definitions}, | ||
+ | volume = {8}, | ||
+ | shorttitle = {Algorithmic Fairness}, | ||
+ | url = {10.1146/annurev-statistics-042720-125902}, | ||
+ | doi = {10.1146/annurev-statistics-042720-125902}, | ||
+ | abstract = {A recent wave of research has attempted to define fairness quantitatively. In particular, this work has explored what fairness might mean in the context of decisions based on the predictions of statistical and machine learning models. The rapid growth of this new field has led to wildly inconsistent motivations, terminology, and notation, presenting a serious challenge for cataloging and comparing definitions. This article attempts to bring much-needed order. First, we explicate the various choices and assumptions made—often implicitly—to justify the use of prediction-based decision-making. Next, we show how such choices and assumptions can raise fairness concerns and we present a notationally consistent catalog of fairness definitions from the literature. In doing so, we offer a concise reference for thinking through the choices, assumptions, and fairness considerations of prediction-based decision-making. Expected final online publication date for the Annual Review of Statistics and Its Application, Volume 8 is March 8, 2021. Please see http://www.annualreviews.org/page/journal/pubdates for revised estimates.}, | ||
+ | number = {1}, | ||
+ | urldate = {2020-12-02}, | ||
+ | journal = {Annual Review of Statistics and Its Application}, | ||
+ | author = {Mitchell, Shira and Potash, Eric and Barocas, Solon and D’Amour, Alexander and Lum, Kristian}, | ||
+ | year = {2021}, | ||
+ | note = {\_eprint: https://doi.org/10.1146/annurev-statistics-042720-125902}, | ||
+ | pages = {null}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{oxfordmartinschoolDataWorkHidden2020, | ||
+ | title = {"Data work: the hidden talent and secret logic fuelling artificial intelligence" - Prof Gina Neff}, | ||
+ | shorttitle = {"Data work}, | ||
+ | url = {https://www.youtube.com/watch?v=v5oHhuPzl14}, | ||
+ | abstract = {What happens when new artificial intelligence (AI) tools are integrated into organisations around the world? | ||
+ | |||
+ | For example, digital medicine promises to combine emerging and novel sources of data and new analysis techniques like AI and machine learning to improve diagnosis, care delivery and condition management. But healthcare workers find themselves at the frontlines of figuring out new ways to care for patients through, with - and sometimes despite - their data. Paradoxically, new data-intensive tasks required to make AI work are often seen as of secondary importance. Gina calls these tasks data work, and her team studied how data work is changing in Danish \& US hospitals (Moller, Bossen, Pine, Nielsen and Neff, forthcoming ACM Interactions). | ||
+ | |||
+ | Based on critical data studies and organisational ethnography, this talk will argue that while advances in AI have sparked scholarly and public attention to the challenges of the ethical design of technologies, less attention has been focused on the requirements for their ethical use. Unfortunately, this means that the hidden talents and secret logics that fuel successful AI projects are undervalued and successful AI projects continue to be seen as technological, not social, accomplishments. | ||
+ | |||
+ | In this talk Professor Gina Neff, Oxford Internet Institute and Professor Ian Goldin, Oxford Martin School, will examine publicly known “failures” of AI systems to show how this gap between design and use creates dangerous oversights and to develop a framework to predict where and how these oversights emerge. The resulting framework can help scholars and practitioners to query AI tools to show who and whose goals are being achieved or promised through, what structured performance using what division of labour, under whose control and at whose expense. In this way, data work becomes an analytical lens on the power of social institutions for shaping technologies-in-practice.}, | ||
+ | urldate = {2020-12-02}, | ||
+ | author = {{Oxford Martin School}}, | ||
+ | month = nov, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{hseartanddesignschoolLevManovichArtificial2020, | ||
+ | title = {Lev Manovich ‘Artificial Intelligence, Aesthetics, and Future of Culture’}, | ||
+ | url = {https://www.youtube.com/watch?v=6t6ZpNHYa5M}, | ||
+ | abstract = {While debates on questions such as «will AI replace artists» and «can AI be truly creative» continue, AI has already been shaping contemporary global culture for a number of years. Examples include systems that model our taste and aesthetic preferences, recommending books, music, and movies, enhancing photos, designing websites and data visualizations, writing newspaper articles, making movie trailers, TV scripts, etc. If contemporary culture is organized around templates, conventions, and vocabularies of repeated elements, why its creation has not been automated a long time ago? Is there any data to suggest that AI culture automation will contribute to a decrease in cultural diversity over time? Or does it on the contrary increases cultural diversity? Can we imagine what design, media, and art we will have in 20-30 years? What do you need to learn now to be the leading designer in future decades when AI is more advanced? And what about «general-purpose cultural artificial intelligence» — will it ever be achieved, and what it may look like?}, | ||
+ | urldate = {2020-12-02}, | ||
+ | author = {{HSE ART AND DESIGN SCHOOL}}, | ||
+ | month = nov, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{hornborgMachinesManifestationsGlobal2020, | ||
+ | title = {Machines as manifestations of global systems: Steps toward a sociometabolic ontology of technology}, | ||
+ | issn = {1463-4996}, | ||
+ | shorttitle = {Machines as manifestations of global systems}, | ||
+ | url = {10.1177/1463499620959247}, | ||
+ | doi = {10.1177/1463499620959247}, | ||
+ | abstract = {Anthropologists have generally found it reasonable to understand the Industrial Revolution in Britain as a product of global historical processes including colonialism and the structure of world trade. The extent to which the industrialization of British textile production was contingent on global processes has been illuminated in detail by historians such as Joseph Inikori. Andre Gunder Frank proposed that we should reconceptualize technological development as a ‘world economic process, which took place in and because of the structure of the world economy’. Yet the theoretical implications of understanding industrial technological systems as global and unevenly distributed phenomena have, by and large, not contaminated mainstream conceptions of technologies as politically neutral and fundamentally innocent manifestations of enlightenment, detachable from the societal contexts in which they have emerged. Social theory nevertheless offers perspectives for a radical rethinking of this conventional ontology of modern technology. If the premises of actor–network theory, material culture studies, Marxism and poststructuralist critiques of power and inequalities are combined with the perspectives of ecological economics on global social metabolism, the fossil-fuelled textile factories of 19th-century Britain can be reinterpreted as social instruments for appropriating embodied human labour and natural space from elsewhere in the global system. A renewed ‘anthropology of technology’ might focus on the observation that technology is not simply a matter of putting nature to work, but a strategy of putting other sectors of global society to work.1}, | ||
+ | language = {en}, | ||
+ | urldate = {2020-12-02}, | ||
+ | journal = {Anthropological Theory}, | ||
+ | author = {Hornborg, Alf}, | ||
+ | month = nov, | ||
+ | year = {2020}, | ||
+ | note = {Publisher: SAGE Publications}, | ||
+ | pages = {1463499620959247}, | ||
+ | file = {Hornborg 2020 - Machines as manifestations of global systems.pdf:/home/ruben/Zotero/storage/RAM5MI2K/Hornborg 2020 - Machines as manifestations of global systems.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{blankeMaterialConditionsPlatforms2020, | ||
+ | title = {The Material Conditions of Platforms: Monopolization Through Decentralization}, | ||
+ | volume = {6}, | ||
+ | issn = {2056-3051}, | ||
+ | shorttitle = {The Material Conditions of Platforms}, | ||
+ | url = {10.1177/2056305120971632}, | ||
+ | doi = {10.1177/2056305120971632}, | ||
+ | abstract = {In this article, we add research on technical integration and dependency to the theories of platformization. Our research seeks to understand how platforms have been able to technically integrate themselves into the fabric of the mobile ecosystem, transforming the economic dynamics that allow these largely enclosed entities to compete. We therefore want to consider platforms as service assemblages to account for the material ways in which they have decomposed and recomposed themselves for developers, enabling them to shift the economic dynamics of competition and monopolization in their favor. This article will argue that this shift in the formation of platform monopolies is being brought about by the decentralization of these services, leading to an overall technical integration of the largest digital platform such as Facebook and Google into the source code of almost all apps. We present new digital methodologies to surface these relations and material conditions of platforms. These methodologies offer us a whole new toolkit to investigate how decentralized services depend on each other and how new power relations are formed.}, | ||
+ | language = {en}, | ||
+ | number = {4}, | ||
+ | urldate = {2020-12-02}, | ||
+ | journal = {Social Media + Society}, | ||
+ | author = {Blanke, Tobias and Pybus, Jennifer}, | ||
+ | month = oct, | ||
+ | year = {2020}, | ||
+ | note = {Publisher: SAGE Publications Ltd}, | ||
+ | pages = {2056305120971632}, | ||
+ | file = {Blanke Pybus 2020 - The Material Conditions of Platforms.pdf:/home/ruben/Zotero/storage/94BXKH39/Blanke Pybus 2020 - The Material Conditions of Platforms.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{robergeCulturalLifeMachine2021, | ||
+ | address = {Cham}, | ||
+ | title = {The Cultural Life of Machine Learning: An Incursion into Critical AI Studies}, | ||
+ | isbn = {978-3-030-56285-4 978-3-030-56286-1}, | ||
+ | shorttitle = {The Cultural Life of Machine Learning}, | ||
+ | url = {http://link.springer.com/10.1007/978-3-030-56286-1}, | ||
+ | language = {en}, | ||
+ | urldate = {2020-12-02}, | ||
+ | publisher = {Springer International Publishing}, | ||
+ | editor = {Roberge, Jonathan and Castelle, Michael}, | ||
+ | year = {2021}, | ||
+ | doi = {10.1007/978-3-030-56286-1}, | ||
+ | keywords = {***, FR-Inbox}, | ||
+ | file = {Roberge and Castelle - 2021 - The Cultural Life of Machine Learning An Incursio.pdf:/home/ruben/Zotero/storage/YRIS9DRM/Roberge and Castelle - 2021 - The Cultural Life of Machine Learning An Incursio.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{robergeCulturalLifeMachine2021a, | ||
+ | address = {Cham}, | ||
+ | title = {The Cultural Life of Machine Learning: An Incursion into Critical AI Studies}, | ||
+ | isbn = {978-3-030-56285-4 978-3-030-56286-1}, | ||
+ | shorttitle = {The Cultural Life of Machine Learning}, | ||
+ | url = {http://link.springer.com/10.1007/978-3-030-56286-1}, | ||
+ | language = {en}, | ||
+ | urldate = {2020-12-02}, | ||
+ | publisher = {Springer International Publishing}, | ||
+ | editor = {Roberge, Jonathan and Castelle, Michael}, | ||
+ | year = {2021}, | ||
+ | doi = {10.1007/978-3-030-56286-1}, | ||
+ | file = {Roberge and Castelle - 2021 - The Cultural Life of Machine Learning An Incursio.pdf:/home/ruben/Zotero/storage/DXACM6YK/Roberge and Castelle - 2021 - The Cultural Life of Machine Learning An Incursio.pdf:application/pdf}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
|bibtex=@article{aradauBiopoliticsMultipleMigration2020, | |bibtex=@article{aradauBiopoliticsMultipleMigration2020, | ||
− | + | title = {Biopolitics Multiple: Migration, Extraction, Subtraction}, | |
− | + | volume = {48}, | |
− | + | issn = {0305-8298}, | |
− | + | shorttitle = {Biopolitics Multiple}, | |
− | + | url = {10.1177/0305829819889139}, | |
− | + | doi = {10.1177/0305829819889139}, | |
− | + | abstract = {This article proposes ‘biopolitics multiple’ as an approach to the heterogeneity of biopolitical technologies deployed to govern migration today. Building on work that has started to develop analytical vocabularies to diagnose biopolitical technologies that work neither by fostering life nor by making people die in a necropolitical sense, it conceptualises ‘extraction’ and ‘subtraction’ as two such technologies that take ‘hold’ of migrants’ lives today. Extraction, explored in the article through a focus on borderzones in Greece, captures the imbrication of biopolitics and value through the ‘outside’ creation of the economic conditions of data circulation. Subtraction, which is analysed in this article through a focus on Calais, captures the practices of (partial) non-governing by taking material and legal terrain away from migrants and reconfiguring convoluted geographies of (forced) hyper-mobility. This move allows us to understand the governmentality of migration beyond binary oppositions such as ‘making live/letting die’, biopolitics/necropolitics and inclusion/exclusion., Biopolítica múltiple: migración, extracción, sustracción}, | |
− | + | language = {en}, | |
− | + | number = {2}, | |
− | + | urldate = {2020-12-01}, | |
− | + | journal = {Millennium}, | |
− | + | author = {Aradau, Claudia and Tazzioli, Martina}, | |
− | + | month = jan, | |
− | + | year = {2020}, | |
− | + | note = {Publisher: SAGE Publications Ltd}, | |
− | + | pages = {198--220}, | |
− | } | + | file = {Aradau and Tazzioli - 2020 - Biopolitics Multiple Migration, Extraction, Subtr.pdf:/home/ruben/Zotero/storage/ADBJELCI/Aradau and Tazzioli - 2020 - Biopolitics Multiple Migration, Extraction, Subtr.pdf:application/pdf}, |
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
|bibtex=@misc{aradauTechnologyAgencyCritique2019, | |bibtex=@misc{aradauTechnologyAgencyCritique2019, | ||
− | + | title = {Technology, agency, critique : An interview with Claudia Aradau}, | |
− | + | shorttitle = {Technology, agency, critique}, | |
− | + | url = {https://www.taylorfrancis.com/}, | |
− | + | abstract = {The chapter shows what the effects of those constellations are CAA critical analysis of technology emerges through the diagnosis of effects, particularly as}, | |
− | + | language = {en}, | |
− | + | urldate = {2020-12-01}, | |
− | + | journal = {Technology and Agency in International Relations}, | |
− | doi = {10. | + | author = {Aradau, Claudia and Hoijtink, Marijn and Leese, Matthias and Hoijtink, Marijn and Leese, Matthias}, |
− | url = {https://www. | + | month = apr, |
− | urldate = {2020-12- | + | year = {2019}, |
− | abstract = {The | + | doi = {10.4324/9780429463143-9}, |
− | journal = {Technology and | + | note = {Pages: 188-203 |
− | language = {en} | + | Publisher: Routledge}, |
− | } | + | } |
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{SecurityFlows, | ||
+ | title = {Security flows}, | ||
+ | url = {https://www.kcl.ac.uk/research/security-flows}, | ||
+ | language = {en-GB}, | ||
+ | urldate = {2020-12-01}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{aradauActsDigitalParasitism2019, | ||
+ | title = {Acts of digital parasitism: Hacking, humanitarian apps and platformisation}, | ||
+ | volume = {21}, | ||
+ | issn = {1461-4448}, | ||
+ | shorttitle = {Acts of digital parasitism}, | ||
+ | url = {10.1177/1461444819852589}, | ||
+ | doi = {10.1177/1461444819852589}, | ||
+ | abstract = {The opacity of digital technologies has posed significant challenges for critical research and digital methods. In response, controversy mapping, reverse engineering and hacking have been key methodological devices to grapple with opacity and ‘open the black box’ of digital ecosystems. We take recent developments in digital humanitarianism and the accelerated production of apps for refugees following the 2015 Mediterranean refugee crisis as a site of methodological experimentation to advance hacking as critical methodological interference. Drawing on the work of Michel Serres, we propose to understand digital technologies as ‘parasitic’ and reconceptualise hacking as ‘acts of digital parasitism’. Acts of digital parasitism are interferences that work alongside rather than work against. On one hand, this reworking of hacking advances an agenda for digital methods through reworking hacking for digital humanities and social science research. On the other, it allows us to show how the object of research – humanitarian apps – is configured through platformisation and incorporation within digital parasitic relations.}, | ||
+ | language = {en}, | ||
+ | number = {11-12}, | ||
+ | urldate = {2020-12-01}, | ||
+ | journal = {New Media \& Society}, | ||
+ | author = {Aradau, Claudia and Blanke, Tobias and Greenway, Giles}, | ||
+ | month = nov, | ||
+ | year = {2019}, | ||
+ | note = {Publisher: SAGE Publications}, | ||
+ | pages = {2548--2565}, | ||
+ | file = {Aradau et al_2019_Acts of digital parasitism.pdf:/home/ruben/Zotero/storage/4PY3N7S2/Aradau et al_2019_Acts of digital parasitism.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{SenseLab3eLaboratory, | ||
+ | title = {SenseLab – 3e {\textbar} a laboratory for thought in motion}, | ||
+ | url = {https://senselab.ca/wp2/}, | ||
+ | language = {en-US}, | ||
+ | urldate = {2020-12-07}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{EmergentFuturesCoLab, | ||
+ | title = {Emergent Futures CoLab}, | ||
+ | url = {https://www.urgentemergent.org/}, | ||
+ | abstract = {A Laboratory for Transdisciplinary Experimentation and Collaborative Future-Making}, | ||
+ | urldate = {2020-12-07}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{FullAutomationFallacy2020, | ||
+ | title = {The Full Automation Fallacy}, | ||
+ | url = {https://futuresofwork.co.uk/2020/12/02/the-full-automation-fallacy/}, | ||
+ | abstract = {We are at a critical moment, when digital technologies of automation, often referred to with buzzy vocabulary like “algorithms” and “AI,” are poised to transform work in a “Fourth Industrial Revolu…}, | ||
+ | urldate = {2020-12-07}, | ||
+ | journal = {Futures of Work}, | ||
+ | month = dec, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{ErichHoerlHg, | ||
+ | title = {Erich Hörl (Hg.), Nelly Y. Pinkrah (Hg.), Lotte Warnsholdt (Hg.): Critique and the Digital}, | ||
+ | shorttitle = {Erich Hörl (Hg.), Nelly Y. Pinkrah (Hg.), Lotte Warnsholdt (Hg.)}, | ||
+ | url = {http://www.diaphanes.ch/titel/critique-and-the-digital-6052}, | ||
+ | abstract = {The computerization of today’s world has fundamentally transformed the sites of and for critique, and it challenges the meaning of critique as such. The subject of critique, constituted through the cultural techniques of modernity, now collides with the digital, which, as a condition of contemporary life, can be seen both as a product of modernity and as its very ending. Digitality severely alters the subject of critique and its spacio-temporal relations; it may even deprive the subject of its potentiality to be critical in the first place. The authors of this volume therefore examine the existence of critique in the digital, asking what it might be and in what settings it occurs.}, | ||
+ | language = {de}, | ||
+ | urldate = {2020-12-07}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{bloomsbury.comDigitalVisionEcological, | ||
+ | title = {Digital Vision and the Ecological Aesthetic (1968 - 2018)}, | ||
+ | url = {https://www.bloomsbury.com/us/digital-vision-and-the-ecological-aesthetic-1968-2018-9781350051836/}, | ||
+ | abstract = {Digital technology has transformed the way that we visualise the natural world, the art we create and the stories we tell about our environments. Exploring contemporary digital art and literature through an ecocritical lens, Digital Vision and the Ecological Aesthetic (1968 - 2018) demonstrates the many ways in which critical ideas of the sublime, the pastoral and the picturesque have been renewed and shaped in digital media, from electronic literature to music and the visual arts. The book goes on to explore the ecological implications of these new forms of cultural representation in the digital age and in so doing makes a profound contribution to our understanding of digital art practice in the 21st century.}, | ||
+ | language = {en}, | ||
+ | urldate = {2020-12-07}, | ||
+ | journal = {Bloomsbury Publishing}, | ||
+ | author = {Bloomsbury.com}, | ||
+ | keywords = {Ruben-Inbox}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{campbellScifiSurveillanceEurope2020, | ||
+ | chapter = {World news}, | ||
+ | title = {Sci-fi surveillance: Europe's secretive push into biometric technology}, | ||
+ | issn = {0261-3077}, | ||
+ | shorttitle = {Sci-fi surveillance}, | ||
+ | url = {https://www.theguardian.com/world/2020/dec/10/sci-fi-surveillance-europes-secretive-push-into-biometric-technology}, | ||
+ | abstract = {Millions in EU science funding is being used to develop new tools for policing and security. But who decides how far we need to submit to artificial intelligence?}, | ||
+ | language = {en-GB}, | ||
+ | urldate = {2020-12-14}, | ||
+ | journal = {The Guardian}, | ||
+ | author = {Campbell, Zach}, | ||
+ | month = dec, | ||
+ | year = {2020}, | ||
+ | keywords = {Surveillance, Artificial intelligence (AI), Biometrics, Defence policy, Europe, European Union, Privacy, Technology}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/E859A5JN/sci-fi-surveillance-europes-secretive-push-into-biometric-technology.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{20210603TransversalEntanglement, | ||
+ | title = {2021-06-03 Transversal Entanglement – Artistic Research in Film Conference 2021}, | ||
+ | url = {http://artistic-research-in-film-conference2021.filmuniversitaet.de/en/}, | ||
+ | language = {en-GB}, | ||
+ | urldate = {2021-01-03}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{screenworks2020PointsPresence, | ||
+ | title = {Points of Presence}, | ||
+ | url = {https://screenworks.org.uk/archive/digital-ecologies-and-the-anthropocene/points-of-presence}, | ||
+ | abstract = {Author: Adam Fish Format: Experimental Documentary Duration: 18’ 46” Published: June 2018 https://doi.org/10.37186/swrks/8.2/6 Research Statement Criteria Assess the work as a video that creatively and interpretively maps the internet of the North Atlantic region. Research Questions Media studies scholars who favor empirical fieldwork methodologies encourage users of communication technologies to improve their “infrastuctural literacy” […]}, | ||
+ | language = {en-GB}, | ||
+ | urldate = {2021-01-03}, | ||
+ | journal = {Screenworks}, | ||
+ | author = {Screenworks, 2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{mackenziePlatformSeeingImage2019, | ||
+ | title = {Platform Seeing: Image Ensembles and Their Invisualities}, | ||
+ | volume = {36}, | ||
+ | issn = {0263-2764, 1460-3616}, | ||
+ | shorttitle = {Platform Seeing}, | ||
+ | url = {http://journals.sagepub.com/doi/10.1177/0263276419847508}, | ||
+ | doi = {10.1177/0263276419847508}, | ||
+ | abstract = {How can one ‘see’ the operationalization of contemporary visual culture, given the imperceptibility and apparent automation of so many processes and dimensions of visuality? Seeing – as a position from a singular mode of observation – has become problematic since many visual elements, techniques, and forms of observing are highly distributed through data practices of collection, analysis and prediction. Such practices are subtended by visual cultural techniques that are grounded in the development of image collections, image formatting and hardware design. In this article, we analyze recent transformations in forms of prediction and data analytics associated with spectacular performances of computation. We analyze how transformations in the collection and accumulation of images as ensembles by platforms have a qualitative and material effect on the emergent sociotechnicality of platform ‘life’ and ‘perception’. Reconstructing the visual transformations that allow artificial intelligence assemblages to operate allows some sense of their heteronomous materiality and contingency.}, | ||
+ | language = {en}, | ||
+ | number = {5}, | ||
+ | urldate = {2020-12-28}, | ||
+ | journal = {Theory, Culture \& Society}, | ||
+ | author = {MacKenzie, Adrian and Munster, Anna}, | ||
+ | month = sep, | ||
+ | year = {2019}, | ||
+ | pages = {3--22}, | ||
+ | file = {Full Text:/home/ruben/Zotero/storage/JZ5MNPA9/MacKenzie and Munster - 2019 - Platform Seeing Image Ensembles and Their Invisua.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{mackenziePlatformSeeingImage2019a, | ||
+ | title = {Platform Seeing: Image Ensembles and Their Invisualities}, | ||
+ | volume = {36}, | ||
+ | issn = {0263-2764, 1460-3616}, | ||
+ | shorttitle = {Platform Seeing}, | ||
+ | url = {http://journals.sagepub.com/doi/10.1177/0263276419847508}, | ||
+ | doi = {10.1177/0263276419847508}, | ||
+ | abstract = {How can one ‘see’ the operationalization of contemporary visual culture, given the imperceptibility and apparent automation of so many processes and dimensions of visuality? Seeing – as a position from a singular mode of observation – has become problematic since many visual elements, techniques, and forms of observing are highly distributed through data practices of collection, analysis and prediction. Such practices are subtended by visual cultural techniques that are grounded in the development of image collections, image formatting and hardware design. In this article, we analyze recent transformations in forms of prediction and data analytics associated with spectacular performances of computation. We analyze how transformations in the collection and accumulation of images as ensembles by platforms have a qualitative and material effect on the emergent sociotechnicality of platform ‘life’ and ‘perception’. Reconstructing the visual transformations that allow artificial intelligence assemblages to operate allows some sense of their heteronomous materiality and contingency.}, | ||
+ | language = {en}, | ||
+ | number = {5}, | ||
+ | urldate = {2020-12-28}, | ||
+ | journal = {Theory, Culture \& Society}, | ||
+ | author = {MacKenzie, Adrian and Munster, Anna}, | ||
+ | month = sep, | ||
+ | year = {2019}, | ||
+ | pages = {3--22}, | ||
+ | file = {MacKenzie and Munster - 2019 - Platform Seeing Image Ensembles and Their Invisua.pdf:/home/ruben/Zotero/storage/8GL4V8CR/MacKenzie and Munster - 2019 - Platform Seeing Image Ensembles and Their Invisua.pdf:application/pdf}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@book{dastonObjectivity2010, |
− | + | address = {New York, NY}, | |
− | + | edition = {Paperback ed}, | |
− | year = { | + | title = {Objectivity}, |
− | } | + | isbn = {978-1-890951-79-5}, |
+ | language = {eng}, | ||
+ | publisher = {Zone Books}, | ||
+ | author = {Daston, Lorraine and Galison, Peter}, | ||
+ | year = {2010}, | ||
+ | note = {OCLC: 731595843}, | ||
+ | file = {Table of Contents PDF:/home/ruben/Zotero/storage/WMH6HEVG/Daston and Galison - 2010 - Objectivity.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{turnerEyeMind2016, | ||
+ | address = {Place of publication not identified}, | ||
+ | title = {In the eye's mind.}, | ||
+ | isbn = {978-0-691-63221-6}, | ||
+ | language = {English}, | ||
+ | publisher = {Princeton University Pres}, | ||
+ | author = {Turner, R. S}, | ||
+ | year = {2016}, | ||
+ | note = {OCLC: 938363011}, | ||
+ | file = {Turner - 2016 - In the eye's mind..pdf:/home/ruben/Zotero/storage/JWMRF8BR/Turner - 2016 - In the eye's mind..pdf:application/pdf}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{vertesiSeeingRoverVisualization2012, |
− | + | title = {Seeing like a Rover: Visualization, embodiment, and interaction on the Mars Exploration Rover Mission}, | |
− | + | volume = {42}, | |
− | + | issn = {0306-3127}, | |
− | + | shorttitle = {Seeing like a Rover}, | |
− | + | url = {https://doi.org/10.1177/0306312712444645}, | |
− | + | doi = {10.1177/0306312712444645}, | |
− | + | abstract = {Based on more than 2 years of ethnographic immersion with the Mars Exploration Rover mission, this paper examines the representational work and associated embodied practices through which the science and engineering team makes decisions about how and where to move their robots. Building on prior work in Science and Technology Studies on the importance of embodiment to visualization, the paper posits that such practices also contribute to the production and maintenance of social order within the organizational context of the laboratory. It thus places visualization technologies and techniques in the context of the social organization of scientific work, contributing to our understanding of representation in scientific practice.}, | |
− | + | language = {en}, | |
− | + | number = {3}, | |
− | + | urldate = {2020-12-21}, | |
− | + | journal = {Social Studies of Science}, | |
− | + | author = {Vertesi, Janet}, | |
− | + | month = jun, | |
− | + | year = {2012}, | |
− | + | keywords = {embodiment, human–robot interaction, planetary science, representation, social organization}, | |
− | } | + | pages = {393--414}, |
+ | file = {Vertesi - 2012 - Seeing like a Rover Visualization, embodiment, an.pdf:/home/ruben/Zotero/storage/UMY7NT3J/Vertesi - 2012 - Seeing like a Rover Visualization, embodiment, an.pdf:application/pdf}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
|bibtex=@article{ballesteroTouchingLightHow2019, | |bibtex=@article{ballesteroTouchingLightHow2019, | ||
− | + | title = {Touching with Light, or, How Texture Recasts the Sensing of Underground Water}, | |
− | + | volume = {44}, | |
− | + | issn = {0162-2439}, | |
− | + | url = {https://doi.org/10.1177/0162243919858717}, | |
− | + | doi = {10.1177/0162243919858717}, | |
− | + | abstract = {This paper is an ethnographic examination of the early social life of a project to map Costa Rica’s aquifers using LandSat imagery and a specialized algorithm. The project aims to make subterranean formations accessible for public agencies mediating recent environmental conflicts over underground water, which have been diagnosed as the country’s first “water war.” I analyze the presentation to the public of this project and the technology it uses to show how vision and touch are conceptual resources that people use to describe the technicalities of satellite imagery. Attending to the semiotic and technical power of vision and touch requires a nonessentialist understanding of the senses. It requires moving away from a narrow understanding of sensing as embodied, phenomenological practice. Focusing on the role of texture as that which operates in the interstices of vision and touch, I propose going beyond panoptic imaginaries in order to grasp the diverse social lives that technologies such as satellite imaging have.}, | |
− | + | language = {en}, | |
− | + | number = {5}, | |
− | + | urldate = {2020-12-21}, | |
− | + | journal = {Science, Technology, \& Human Values}, | |
− | + | author = {Ballestero, Andrea}, | |
− | + | month = sep, | |
− | + | year = {2019}, | |
− | language = {en}, | + | keywords = {remote sensing, subterranean, touch, underground, verticality, water}, |
− | number = {5} | + | pages = {762--785}, |
− | } | + | file = {Ballestero - 2019 - Touching with Light, or, How Texture Recasts the S.pdf:/home/ruben/Zotero/storage/I4TSIV7Y/Ballestero - 2019 - Touching with Light, or, How Texture Recasts the S.pdf:application/pdf}, |
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{follisVisionTransterritoryBorders2017, | ||
+ | title = {Vision and Transterritory: The Borders of Europe}, | ||
+ | volume = {42}, | ||
+ | issn = {0162-2439}, | ||
+ | shorttitle = {Vision and Transterritory}, | ||
+ | url = {https://doi.org/10.1177/0162243917715106}, | ||
+ | doi = {10.1177/0162243917715106}, | ||
+ | abstract = {This essay is about the role of visual surveillance technologies in the policing of the external borders of the European Union (EU). Based on an analysis of documents published by EU institutions and independent organizations, I argue that these technological innovations fundamentally alter the nature of national borders. I discuss how new technologies of vision are deployed to transcend the physical limits of territories. In the last twenty years, EU member states and institutions have increasingly relied on various forms of remote tracking, including the use of drones for the purposes of monitoring frontier zones. In combination with other facets of the EU border management regime (such as transnational databases and biometrics), these technologies coalesce into a system of governance that has enabled intervention into neighboring territories and territorial waters of other states to track and target migrants for interception in the “prefrontier.” For jurisdictional reasons, this practice effectively precludes the enforcement of legal human rights obligations, which European states might otherwise have with regard to these persons. This article argues that this technologically mediated expansion of vision has become a key feature of post–cold war governance of borders in Europe. The concept of transterritory is proposed to capture its effects.}, | ||
+ | language = {en}, | ||
+ | number = {6}, | ||
+ | urldate = {2020-12-21}, | ||
+ | journal = {Science, Technology, \& Human Values}, | ||
+ | author = {Follis, Karolina S.}, | ||
+ | month = nov, | ||
+ | year = {2017}, | ||
+ | keywords = {European Union, borders, drones, Eurosur, surveillance}, | ||
+ | pages = {1003--1030}, | ||
+ | file = {Follis - 2017 - Vision and Transterritory The Borders of Europe.pdf:/home/ruben/Zotero/storage/7KQIB9DH/Follis - 2017 - Vision and Transterritory The Borders of Europe.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{garforthVisibilitiesResearchSeeing2012, | ||
+ | title = {In/Visibilities of Research: Seeing and Knowing in STS}, | ||
+ | volume = {37}, | ||
+ | issn = {0162-2439}, | ||
+ | shorttitle = {In/Visibilities of Research}, | ||
+ | url = {https://doi.org/10.1177/0162243911409248}, | ||
+ | doi = {10.1177/0162243911409248}, | ||
+ | abstract = {In science studies the laboratory has been positioned as a privileged place for understanding scientific practice. Laboratory studies foregrounded local spaces of knowledge production in the natural sciences, and in doing so made the laboratory key to social science epistemologies. This article explores how laboratory studies and observational methods have been tied up together in the science and technology studies (STS) project of making scientific practice visible. The author contrasts powerful rhetorics of witnessing and revelation in some significant STS texts with the negotiated and partial ways in which observing science work is done in social science practice. Drawing on empirical material generated with bioscientists and social scientists, the article explores how researchers may resist the observational gaze and mark aspects of knowledge work as private and solitary. The author concludes by arguing that epistemologies of vision point to some unsettling parallels between the study of knowledge-making in STS and audit regimes in contemporary research, and considers how both might devalue invisible work. This analysis suggests that there is a need to reconsider the significance of thinking in the ensemble of knowledge production practices for methodological, epistemological, and strategic reasons.}, | ||
+ | language = {en}, | ||
+ | number = {2}, | ||
+ | urldate = {2020-12-21}, | ||
+ | journal = {Science, Technology, \& Human Values}, | ||
+ | author = {Garforth, Lisa}, | ||
+ | month = mar, | ||
+ | year = {2012}, | ||
+ | keywords = {epistemology, methodologies, methods, space/place/scale dynamics}, | ||
+ | pages = {264--285}, | ||
+ | file = {Garforth - 2012 - InVisibilities of Research Seeing and Knowing in.pdf:/home/ruben/Zotero/storage/HDRMS5QQ/Garforth - 2012 - InVisibilities of Research Seeing and Knowing in.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{castanedaRobotVisions2014, | ||
+ | title = {Robot visions}, | ||
+ | volume = {44}, | ||
+ | issn = {0306-3127}, | ||
+ | url = {https://doi.org/10.1177/0306312713511868}, | ||
+ | doi = {10.1177/0306312713511868}, | ||
+ | abstract = {This article explores the resonating figures of primate, child, and robot in contemporary technoscientific corporealizations of the ‘almost human’. We take as our model (in)organism ‘Lucy the Robot Orangutan’, roboticist Steve Grand’s project to create an artificial life form with a mind of its own. One aspect of Lucy’s figuration by Grand, we argue, which ties her to Haraway’s analysis of the primate, is of the robot as a model for animal, and more specifically (or aspirationally) human, cognition. We follow the trope of ‘model organism’ as it is under discussion within science and technology studies and as an ironic descriptor for our own interest in Lucy as an entity/project through which to illuminate figurations within robotics more widely. Primate and robot together are forms of natureculture that help to clarify how the categories of animal and machine are entangled, while making explicit investments in their differences from one another, and from the third category of the human. We conclude, again following Haraway, by imagining what other possibilities there might be for figuring humans, robots, and their relations if we escape the reiterative imaginary of the robot as proxy for becoming human.}, | ||
+ | language = {en}, | ||
+ | number = {3}, | ||
+ | urldate = {2020-12-21}, | ||
+ | journal = {Social Studies of Science}, | ||
+ | author = {Castañeda, Claudia and Suchman, Lucy}, | ||
+ | month = jun, | ||
+ | year = {2014}, | ||
+ | keywords = {figuration, model organism, primatology, robotics}, | ||
+ | pages = {315--341}, | ||
+ | file = {Castañeda and Suchman - 2014 - Robot visions.pdf:/home/ruben/Zotero/storage/46BPMVSG/Castañeda and Suchman - 2014 - Robot visions.pdf:application/pdf;Castañeda and Suchman - 2014 - Robot visions.pdf:/home/ruben/Zotero/storage/BLCW9YPZ/Castañeda and Suchman - 2014 - Robot visions.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{rothDigitizingLizardsTopology1999, | ||
+ | title = {Digitizing Lizards: The Topology of `Vision' in Ecological Fieldwork}, | ||
+ | volume = {29}, | ||
+ | issn = {0306-3127}, | ||
+ | shorttitle = {Digitizing Lizards}, | ||
+ | url = {https://doi.org/10.1177/030631299029005003}, | ||
+ | doi = {10.1177/030631299029005003}, | ||
+ | abstract = {In this paper, we describe and theorize the topology of `vision' in field ecology, a domain considerably different from laboratory work in the physical sciences, and discuss the temporal extension of data-collection practices. Data collection in this field is characterized by widely varying measurements, measurement dimensions and temporal extension of data collection. We present the ecologists' field laboratory as a perceptual machinery with a heterogeneous and heteromaterial topology as it pertains to measures, precision, replication and other material practices. Because of the complexity of ecological fieldwork, considerable co-ordination and articulation work is necessary. Here, tables, tags and labels are central tools to achieve coherence of inscriptions. We topicalize the work that digitizes measurements conducted on lizards and their habitats, and that therefore imposes signs that lend themselves to mathematical and statistical processes. It is only through these digitizing processes that lizards become visible to other (interested) ecologists, most of whom have not seen this particular animal species in person. We thereby contribute in new ways to discussions of the topography and topology of scientific vision, to the relation of measurement to practice, and to the `adequation' of nature and mathematics.}, | ||
+ | language = {en}, | ||
+ | number = {5}, | ||
+ | urldate = {2020-12-21}, | ||
+ | journal = {Social Studies of Science}, | ||
+ | author = {Roth, Wolff-Michael and Bowen, G. Michael}, | ||
+ | month = oct, | ||
+ | year = {1999}, | ||
+ | pages = {719--764}, | ||
+ | file = {Roth and Bowen - 1999 - Digitizing Lizards The Topology of `Vision' in Ec.pdf:/home/ruben/Zotero/storage/YSIP8YFV/Roth and Bowen - 1999 - Digitizing Lizards The Topology of `Vision' in Ec.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{coopmansFaceValueNew2011, | ||
+ | title = {‘Face value’: New medical imaging software in commercial view}, | ||
+ | volume = {41}, | ||
+ | issn = {0306-3127}, | ||
+ | shorttitle = {‘Face value’}, | ||
+ | url = {https://doi.org/10.1177/0306312710389226}, | ||
+ | doi = {10.1177/0306312710389226}, | ||
+ | abstract = {Based on three ethnographic vignettes describing the engagements of a small start-up company with prospective competitors, partners and customers, this paper shows how commercial considerations are folded into the ways visual images become ‘seeable’. When company members mount demonstrations of prototype mammography software, they seek to generate interest but also to protect their intellectual property. Pivotal to these efforts to manage revelation and concealment is the visual interface, which is variously performed as obstacle and ally in the development of a profitable product. Using the concept of ‘face value’, the paper seeks to develop further insight into contemporary dynamics of seeing and showing by tracing the way techno-visual presentations and commercial considerations become entangled in practice. It also draws attention to the salience and significance of enactments of surface and depth in image-based practices.}, | ||
+ | language = {en}, | ||
+ | number = {2}, | ||
+ | urldate = {2020-12-21}, | ||
+ | journal = {Social Studies of Science}, | ||
+ | author = {Coopmans, Catelijne}, | ||
+ | month = apr, | ||
+ | year = {2011}, | ||
+ | keywords = {commercial relations, ethnography, face value, imaging, software demonstrations}, | ||
+ | pages = {155--176}, | ||
+ | file = {Coopmans - 2011 - ‘Face value’ New medical imaging software in comm.pdf:/home/ruben/Zotero/storage/UAKCA48J/Coopmans - 2011 - ‘Face value’ New medical imaging software in comm.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{forsterThinkingMakingUnmaking, | ||
+ | title = {Thinking Through Making: Unmaking and Remaking the Everyday}, | ||
+ | shorttitle = {Thinking Through Making}, | ||
+ | url = {https://www.academia.edu/18763487/Thinking_Through_Making_Unmaking_and_Remaking_the_Everyday}, | ||
+ | abstract = {Unmaking making: This paper frames two overt suggestions in relation to design and design studies. Firstly, that design itself is the proper area of inquiry for thinking about what can be done with (or without) ideas like creativity and innovation as}, | ||
+ | language = {en}, | ||
+ | urldate = {2020-12-19}, | ||
+ | author = {Forster, Andrew}, | ||
+ | file = {Thinking_Through_Making_Unmaking_and_Rem.pdf:/home/ruben/Zotero/storage/3993YRRM/Thinking_Through_Making_Unmaking_and_Rem.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{ThinkingMakingUnmaking, | ||
+ | title = {Thinking\_Through\_Making\_Unmaking\_and\_Rem.pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{mertiaLivesDataEssays2020, | ||
+ | address = {Amsterdam}, | ||
+ | title = {Lives of Data: Essays on Computational Cultures from India}, | ||
+ | isbn = {978-94-92302-70-0}, | ||
+ | publisher = {Institute of Network Cultures}, | ||
+ | author = {Mertia, Sandeep}, | ||
+ | year = {2020}, | ||
+ | file = {Mertia - 2020 - Lives of Data Essays on Computational Cultures fr.pdf:/home/ruben/Zotero/storage/3WAARFS6/Mertia - 2020 - Lives of Data Essays on Computational Cultures fr.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{2020116DarkEdenProgram1Pdf, | ||
+ | title = {2020-11-6/8 Dark-Eden-Program-1.pdf}, | ||
+ | url = {https://blogs.unsw.edu.au/tiic/files/2020/11/Dark-Eden-Program-1.pdf}, | ||
+ | urldate = {2020-11-07}, | ||
+ | file = {Dark-Eden-Program-1.pdf:/home/ruben/Zotero/storage/AHDS6EXK/Dark-Eden-Program-1.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{20201215EventFuture, | ||
+ | title = {2020-12-15 Event: The Future of AI is Human}, | ||
+ | shorttitle = {Event}, | ||
+ | url = {https://www.universiteitleiden.nl/en/sails/research/webinar-dec-2020-art-society-and-technology}, | ||
+ | abstract = {Where SAILS meets Art, Society and Technology exciting things happen. | ||
+ | Please note: The event location has changed and will now stream from the Leiden University Media Technology channel at You Tube, see link below.}, | ||
+ | language = {en}, | ||
+ | urldate = {2020-12-16}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{InstituteNetworkCultures, |
− | title = { | + | title = {Institute of Network Cultures {\textbar} From Opinions to Images: Essays Towards a Sociology of Affects}, |
− | url = {https:// | + | url = {https://networkcultures.org/blog/publication/tod37-from-opinions-to-images-essays-towards-a-sociology-of-affects/}, |
− | urldate = {2021- | + | urldate = {2021-01-06}, |
− | + | file = {Institute of Network Cultures | From Opinions to Images\: Essays Towards a Sociology of Affects:/home/ruben/Zotero/storage/2TKBM7J4/tod37-from-opinions-to-images-essays-towards-a-sociology-of-affects.html:text/html}, | |
− | } | + | } |
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{grosmanPerspectivesAlgorithmicNormativities2019, | ||
+ | title = {Perspectives on algorithmic normativities: engineers, objects, activities}, | ||
+ | volume = {6}, | ||
+ | issn = {2053-9517}, | ||
+ | shorttitle = {Perspectives on algorithmic normativities}, | ||
+ | url = {https://doi.org/10.1177/2053951719858742}, | ||
+ | doi = {10.1177/2053951719858742}, | ||
+ | abstract = {This contribution aims at proposing a framework for articulating different kinds of “normativities” that are and can be attributed to “algorithmic systems.” The technical normativity manifests itself through the lineage of technical objects. The norm expresses a technical scheme’s becoming as it mutates through, but also resists, inventions. The genealogy of neural networks shall provide a powerful illustration of this dynamic by engaging with their concrete functioning as well as their unsuspected potentialities. The socio-technical normativity accounts for the manners in which engineers, as actors folded into socio-technical networks, willingly or unwittingly, infuse technical objects with values materialized in the system. Surveillance systems’ design will serve here to instantiate the ongoing mediation through which algorithmic systems are endowed with specific capacities. The behavioral normativity is the normative activity, in which both organic and mechanical behaviors are actively participating, undoing the identification of machines with “norm following,” and organisms with “norminstitution”. This proposition productively accounts for the singularity of machine learning algorithms, explored here through the case of recommender systems. The paper will provide substantial discussions of the notions of “normative” by cutting across history and philosophy of science, legal, and critical theory, as well as “algorithmics,” and by confronting our studies led in engineering laboratories with critical algorithm studies.}, | ||
+ | language = {en}, | ||
+ | number = {2}, | ||
+ | urldate = {2021-01-13}, | ||
+ | journal = {Big Data \& Society}, | ||
+ | author = {Grosman, Jérémy and Reigeluth, Tyler}, | ||
+ | month = jul, | ||
+ | year = {2019}, | ||
+ | note = {Publisher: SAGE Publications Ltd}, | ||
+ | keywords = {behavioral normativity, Gilbert Simondon, Machine learning, neural networks, socio-technical normativity, technical normativity}, | ||
+ | pages = {2053951719858742}, | ||
+ | file = {Grosman_Reigeluth_2019_Perspectives on algorithmic normativities.pdf:/home/ruben/Zotero/storage/R3RV4E95/Grosman_Reigeluth_2019_Perspectives on algorithmic normativities.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{jewittExploringMethodologicalInnovation2017, | ||
+ | title = {Exploring methodological innovation in the social sciences: the body in digital environments and the arts}, | ||
+ | volume = {20}, | ||
+ | issn = {1364-5579}, | ||
+ | shorttitle = {Exploring methodological innovation in the social sciences}, | ||
+ | url = {https://doi.org/10.1080/13645579.2015.1129143}, | ||
+ | doi = {10.1080/13645579.2015.1129143}, | ||
+ | abstract = {In this paper we examine methodological innovation in the social sciences through a focus on researching the body in digital environments. There are two strands to our argument as to why this is a useful site to explore methodological innovation in the social sciences. First, researching the body in digital environments places new methodological demands on social science. Second, as an area of interest at the intersection of the social sciences and the arts, it provides a focus for exploring how social science innovation can be informed by engagement with the arts, in this instance how the arts work with the body in digital environments and take up social science ideas in novel ways. We argue that social science engagement with the arts and the relatively unmapped terrain of the body in digital environments has the potential to open up spaces for innovative social science questions and methods: spaces, questions and methods that have potential for more general social science methodological innovation. We draw on the findings of the Methodological Innovation in Digital Arts and Social Sciences (MIDAS) project a multi-site ethnography of the research ecologies of the social sciences and the arts related to the body in digital environments. We propose a continuum of methodological innovation that attends to how methods are moved across research contexts and disciplines, in this instance the social sciences and the digital arts. We illustrate and discuss the innovative potential of expanding and re-situating methods across the social sciences and the arts, the transfer of methods and concepts across disciplinary borders and the interdisciplinary generation of new methods. We discuss the catalysts and challenges for social science methodological innovation in relation to the digital and the arts, with attention to how the social sciences might engage with the arts towards innovative research.}, | ||
+ | number = {1}, | ||
+ | urldate = {2021-01-13}, | ||
+ | journal = {International Journal of Social Research Methodology}, | ||
+ | author = {Jewitt, Carey and Xambo, Anna and Price, Sara}, | ||
+ | month = jan, | ||
+ | year = {2017}, | ||
+ | note = {Publisher: Routledge | ||
+ | \_eprint: https://doi.org/10.1080/13645579.2015.1129143}, | ||
+ | keywords = {arts methods, body, digital technologies, Methodological innovation, social science methods}, | ||
+ | pages = {105--120}, | ||
+ | file = {Jewitt et al_2017_Exploring methodological innovation in the social sciences.pdf:/home/ruben/Zotero/storage/ZCV67AJF/Jewitt et al_2017_Exploring methodological innovation in the social sciences.pdf:application/pdf;Snapshot:/home/ruben/Zotero/storage/GTFSBRRG/13645579.2015.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@phdthesis{musikComputersAbilitySee2014, | ||
+ | address = {wien}, | ||
+ | type = {phd}, | ||
+ | title = {Computers and the ability to see}, | ||
+ | copyright = {All rights reserved}, | ||
+ | url = {http://othes.univie.ac.at/35033/}, | ||
+ | abstract = {Alle Versuche, Maschinen und Computern die Fähigkeit des Sehen beizubringen, sind Versuche, digitale Bilder herzustellen, zu bearbeiten und vor allem ihre Inhalte zu verstehen. Zu diesem Zweck ist es zwingend notwendig, Bildverarbeitungsalgorithmen zu entwickeln und anzuwenden. Bildverarbeitungsalgorithmen werden zu einflussreichen politischen und gesellschaftlichen Akteuren und Entscheidungsträgern. Deshalb ist es wichtig, ein tiefgehendes Verständnis davon zu erreichen, wie genau diese Algorithmen Bilder erzeugen, bearbeiten und vor allem semantisch interpretieren. | ||
+ | “Computers and the Ability to See” basiert auf einem interdisziplinärem Zugang, welcher die akademischen Felder der Wissenschafts- und Technikforschung (STS), der visuellen Kulturstudien und der Überwachungs- und Identifizierungsstudien verbindet. Es ist insbesondere inspiriert von Lucy Suchmans Arbeit zu ‘Human-Machine Reconfigurations’ (Suchman 2007) und dem visuellen STS Zugang der ‘Social Studies of Scientific Imaging and Visualization’ (Burri \& Dumit 2008). Die Dissertation schreibt sich somit in die theoretischen Rahmen des (feministischen) Posthumanismus und der materiellen Semiotik ein. Damit verbunden ist die Entscheidung, die konkreten Praktiken von nichtmenschlichen Entitäten und ihren spezifischen Handlungsfähigkeiten empirisch zu untersuchen (vgl. (Suchman 2007: 1). | ||
+ | Die empirische Analyse von Bildverarbeitungsalgorithmen bettet sich ein in die grundlegenden soziotechnischen Transformationsprozesse, die mit den Begriffen Überwachungsgesellschaft (hier insbesondere das Phänomen der “intelligenten” Videoüberwachung), Digitalisierung, Automatisierung und “Smartisierung” von gesellschaftlichen Praktiken, Artefakten und Geräten zusammengefasst werden können. Auf dieser Grundlage erforschte die Dissertation Mensch-Computer (Re-)Konfigurationen, indem sie die Ausverhandlung und Entwicklung mit Fokus auf die politische und gesellschaftliche Signifikanz von Bildverarbeitungsalgorithmen in unterschiedlichen Situationen und Umgebungen von den Laboren der Bildverarbeitung bis hin zu den Medien in den Blick nahm. Die Forschung folgte unter Einbeziehung eines breiten Methodenspektrums der qualitativen Sozialforschung (Teilnehmende Beobachtung, Gruppendiskussionen, Interviews, Dokumentenanalyse) einer ‘visiographischen’ Strategie und entwickelt darauf aufbauend in den Schlussfolgerungen den konzeptuellen Reflektionsrahmen der “Social Studies of Image Processing Algorithms” (SIPA). Dadurch leistet die Arbeit einen wichtigen Beitrag zu der Frage, wie Gesellschaft und Wissenschaft mit Bildverarbeitungsalgorithmen in ihrer Funktion als ‘politische Ordnungsapparate’ in einem verantwortlichen Weg der Innovation umgehen können. Dabei ermutigt SIPA explizit die Zusammenarbeit von Sozial- und ComputerwissenschaftlerInnen sowie die Einbeziehung weiterer gesellschaftlicher Akteure wie zum Beispiel KünstlerInnen. SIPA beinhaltet also auch Fragen und Ebenen, die sich mit der Steuerung, Regulierung und mit ethischen, rechtlichen und gesellschaftlichen Aspekten von Bildverarbeitungsalgorithmen auseinandersetzen.}, | ||
+ | urldate = {2021-01-13}, | ||
+ | school = {uniwien}, | ||
+ | author = {Musik, Christoph}, | ||
+ | year = {2014}, | ||
+ | file = {Musik_2014_Computers and the ability to see.pdf:/home/ruben/Zotero/storage/TBEWBGYU/Musik_2014_Computers and the ability to see.pdf:application/pdf;Snapshot:/home/ruben/Zotero/storage/EDDWVKIB/35033.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{HowMachineLearns, | ||
+ | title = {How a Machine Learns and Fails – A Grammar of Error for Artificial Intelligence – spheres}, | ||
+ | url = {https://spheres-journal.org/contribution/how-a-machine-learns-and-fails-a-grammar-of-error-for-artificial-intelligence/}, | ||
+ | language = {en-US}, | ||
+ | urldate = {2021-01-13}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/DFCN8HI4/how-a-machine-learns-and-fails-a-grammar-of-error-for-artificial-intelligence.html:text/html;How a Machine Learns and Fails – A Grammar of Error for Artificial Intelligence.pdf:/home/ruben/Zotero/storage/LD4D5ENZ/How a Machine Learns and Fails – A Grammar of Error for Artificial Intelligence.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{xieExplainableDeepLearning2020, | ||
+ | title = {Explainable Deep Learning: A Field Guide for the Uninitiated}, | ||
+ | shorttitle = {Explainable Deep Learning}, | ||
+ | url = {http://arxiv.org/abs/2004.14545}, | ||
+ | abstract = {The deep neural network (DNN) is an indispensable machine learning tool for achieving human-level performance on many learning tasks. Yet, due to its black-box nature, it is inherently difficult to understand which aspects of the input data drive the decisions of the network. There are various real-world scenarios in which humans need to make actionable decisions based on the output of a decision support system that makes use of DNNs. These decision support systems can be found in critical domains, such as legislation, law enforcement, and healthcare. It is important that the humans making high-level decisions can be sure that the DNN decisions are driven by combinations of data features that are appropriate in the context of the deployment of the decision support system and that the decisions made are legally or ethically defensible. Due to the incredible pace at which DNN technology is being developed and adopted, the development of new methods and studies on explaining the decision-making process of DNNs has blossomed into an active research field. A practitioner beginning to study explainable deep learning may be intimidated by the plethora of orthogonal directions the field is taking. This complexity is further exacerbated by the general confusion that exists in defining what it means to be able to explain the actions of a deep learning system and to evaluate a system’s “ability to explain”. To alleviate this problem, this article offers a “field guide” to deep learning explainability for those uninitiated in the field. The field guide: i) Discusses the traits of a deep learning system that researchers enhance in explainability research, ii) places explainability in the context of other related deep learning research areas, and iii) introduces three simple dimensions defining the space of foundational methods that contribute to explainable deep learning. The guide is designed as an easy-to-digest starting point for those just embarking in the field.}, | ||
+ | language = {en}, | ||
+ | urldate = {2021-01-13}, | ||
+ | journal = {arXiv:2004.14545 [cs, stat]}, | ||
+ | author = {Xie, Ning and Ras, Gabrielle and van Gerven, Marcel and Doran, Derek}, | ||
+ | month = apr, | ||
+ | year = {2020}, | ||
+ | note = {arXiv: 2004.14545}, | ||
+ | keywords = {Computer Science - Artificial Intelligence, Computer Science - Machine Learning, Statistics - Machine Learning}, | ||
+ | file = {Xie et al. - 2020 - Explainable Deep Learning A Field Guide for the U.pdf:/home/ruben/Zotero/storage/PNW9B5W3/Xie et al. - 2020 - Explainable Deep Learning A Field Guide for the U.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{lyonsExcavatingExcavatingAI2020, | ||
+ | title = {Excavating "Excavating AI": The Elephant in the Gallery}, | ||
+ | shorttitle = {Excavating "Excavating AI"}, | ||
+ | url = {http://arxiv.org/abs/2009.01215}, | ||
+ | doi = {10.5281/zenodo.4037538}, | ||
+ | abstract = {Two art exhibitions, "Training Humans" and "Making Faces," and the accompanying essay "Excavating AI: The politics of images in machine learning training sets" by Kate Crawford and Trevor Paglen, are making substantial impact on discourse taking place in the social and mass media networks, and some scholarly circles. Critical scrutiny reveals, however, a self-contradictory stance regarding informed consent for the use of facial images, as well as serious flaws in their critique of ML training sets. Our analysis underlines the non-negotiability of informed consent when using human data in artistic and other contexts, and clarifies issues relating to the description of ML training sets.}, | ||
+ | language = {en}, | ||
+ | urldate = {2021-01-13}, | ||
+ | journal = {arXiv:2009.01215 [cs]}, | ||
+ | author = {Lyons, Michael J.}, | ||
+ | month = sep, | ||
+ | year = {2020}, | ||
+ | note = {arXiv: 2009.01215}, | ||
+ | keywords = {Computer Science - Computers and Society, Computer Science - Computer Vision and Pattern Recognition, Computer Science - Artificial Intelligence, Computer Science - Machine Learning, 68T01, Computer Science - Human-Computer Interaction, K.4.0}, | ||
+ | file = {Lyons - 2020 - Excavating Excavating AI The Elephant in the Ga.pdf:/home/ruben/Zotero/storage/Z7S5JZ6S/Lyons - 2020 - Excavating Excavating AI The Elephant in the Ga.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@inproceedings{sultaniRealWorldAnomalyDetection2018, | ||
+ | address = {Salt Lake City, UT}, | ||
+ | title = {Real-World Anomaly Detection in Surveillance Videos}, | ||
+ | isbn = {978-1-5386-6420-9}, | ||
+ | url = {https://ieeexplore.ieee.org/document/8578776/}, | ||
+ | doi = {10.1109/CVPR.2018.00678}, | ||
+ | abstract = {Surveillance videos are able to capture a variety of realistic anomalies. In this paper, we propose to learn anomalies by exploiting both normal and anomalous videos. To avoid annotating the anomalous segments or clips in training videos, which is very time consuming, we propose to learn anomaly through the deep multiple instance ranking framework by leveraging weakly labeled training videos, i.e. the training labels (anomalous or normal) are at videolevel instead of clip-level. In our approach, we consider normal and anomalous videos as bags and video segments as instances in multiple instance learning (MIL), and automatically learn a deep anomaly ranking model that predicts high anomaly scores for anomalous video segments. Furthermore, we introduce sparsity and temporal smoothness constraints in the ranking loss function to better localize anomaly during training.}, | ||
+ | language = {en}, | ||
+ | urldate = {2021-01-13}, | ||
+ | booktitle = {2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition}, | ||
+ | publisher = {IEEE}, | ||
+ | author = {Sultani, Waqas and Chen, Chen and Shah, Mubarak}, | ||
+ | month = jun, | ||
+ | year = {2018}, | ||
+ | pages = {6479--6488}, | ||
+ | file = {Sultani et al. - 2018 - Real-World Anomaly Detection in Surveillance Video.pdf:/home/ruben/Zotero/storage/WQNJMF28/Sultani et al. - 2018 - Real-World Anomaly Detection in Surveillance Video.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{rouvroyAlgorithmicGovernmentalityProspects2013, | ||
+ | title = {Algorithmic governmentality and prospects of emancipation}, | ||
+ | volume = {No 177}, | ||
+ | issn = {0751-7971}, | ||
+ | url = {https://www.cairn-int.info/article-E_RES_177_0163--algorithmic-governmentality-and-prospect.htm}, | ||
+ | abstract = {Algorithmic governmentality is characterized primarily by the following dual movement: a) abandoning all forms of 'scale', 'benchmark', or hierarchy, in favour of an immanent normativity evolving in real time, from which a 'dual statistics' of the world emerges and which seems to do away with the old hierarchies devised by normal or average people; and b) avoiding all confrontation with individuals, whose opportunities for subjectification have become increasingly scarce. This dual movement seems to be the fruit of contemporary statistics' focus on relations. We seek to assess the extent to which these two aspects of the 'algorithmic governmentality' thereby outlined, with its sole reliance on relations, could facilitate, first, processes of individuation through relations (Simondon) and, second, the emergence of new forms of life through the plane of immanence overtaking the plane of organization (Deleuze-Guattari). Through this comparison with the main contemporary philosophies of relations, it thus appears that thinking about the evolution and processes of individuation through relations necessarily pertains to the 'disparate' - a heterogeneity of orders of magnitude, a multiplicity of regimes of existence - which algorithmic governmentality precisely incessantly suppresses by enclosing (digitized) reality on itself. Algorithmic governmentality tends rather to foreclose such emancipation perspectives by centring individuation processes on the subjective monad.}, | ||
+ | language = {en}, | ||
+ | number = {1}, | ||
+ | urldate = {2021-01-13}, | ||
+ | journal = {Reseaux}, | ||
+ | author = {Rouvroy, Antoinette and Berns, Thomas and Libbrecht, Elizabeth}, | ||
+ | month = oct, | ||
+ | year = {2013}, | ||
+ | note = {Publisher: La Découverte}, | ||
+ | pages = {163--196}, | ||
+ | file = {Rouvroy et al_2013_Algorithmic governmentality and prospects of emancipation.pdf:/home/ruben/Zotero/storage/E6WVV9Y9/Rouvroy et al_2013_Algorithmic governmentality and prospects of emancipation.pdf:application/pdf;Snapshot:/home/ruben/Zotero/storage/G38ZPM8I/article-E_RES_177_0163--algorithmic-governmentality-and-prospect.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{mackenzieMachineLearnersArchaeology2017, | ||
+ | title = {Machine Learners: Archaeology of a Data Practice}, | ||
+ | isbn = {978-0-262-34255-1}, | ||
+ | shorttitle = {Machine Learners}, | ||
+ | url = {https://direct.mit.edu/books/book/3129/machine-learnersarchaeology-of-a-data-practice}, | ||
+ | language = {en}, | ||
+ | urldate = {2021-01-13}, | ||
+ | publisher = {The MIT Press}, | ||
+ | author = {Mackenzie, Adrian}, | ||
+ | year = {2017}, | ||
+ | doi = {10.7551/mitpress/10302.001.0001}, | ||
+ | file = {Mackenzie - 2017 - Machine Learners Archaeology of a Data Practice.pdf:/home/ruben/Zotero/storage/VKABMIRC/Mackenzie - 2017 - Machine Learners Archaeology of a Data Practice.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{ImprovisingTheory, | ||
+ | title = {Improvising Theory}, | ||
+ | url = {https://press.uchicago.edu/ucp/books/book/chicago/I/bo5417893.html}, | ||
+ | abstract = {Scholars have long recognized that ethnographic method is bound up with the construction of theory in ways that are difficult to teach. The reason, Allaine Cerwonka and Liisa H. Malkki argue, is that ethnographic theorization is essentially improvisatory in nature, conducted in real time and in necessarily unpredictable social situations. In a unique account of, and critical reflection on, the process of theoretical improvisation in ethnographic research, they demonstrate how both objects of analysis, and our ways of knowing and explaining them, are created and discovered in the give and take of real life, in all its unpredictability and immediacy.Improvising Theory centers on the year-long correspondence between Cerwonka, then a graduate student in political science conducting research in Australia, and her anthropologist mentor, Malkki. Through regular e-mail exchanges, Malkki attempted to teach Cerwonka, then new to the discipline, the basic tools and subtle intuition needed for anthropological fieldwork. The result is a strikingly original dissection of the processual ethics and politics of method in ethnography.}, | ||
+ | urldate = {2021-01-14}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/2SISML8K/bo5417893.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{WarTerrorBirthed, | ||
+ | title = {War On Terror Birthed Pentagon's Automated Biometrics Identification System}, | ||
+ | url = {https://www.npr.org/2021/01/14/956705029/war-on-terror-birthed-pentagons-automated-biometrics-identification-system}, | ||
+ | abstract = {NPR's Steve Inskeep talks to investigative reporter Annie Jacobsen, author of the new book, First Platoon, about how the U.S. has employed the use of biometric data during warfare.}, | ||
+ | language = {en}, | ||
+ | urldate = {2021-01-14}, | ||
+ | journal = {NPR.org}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{cointetjean-philippeNeuronsSpikeBack2018, | ||
+ | title = {Neurons spike back}, | ||
+ | volume = {211}, | ||
+ | language = {French}, | ||
+ | number = {5}, | ||
+ | journal = {Réseaux}, | ||
+ | author = {Cointet, Jean-Philippe, Bilel and Cardon, Dominique and Mazières, Antoine}, | ||
+ | year = {2018}, | ||
+ | note = {OCLC: 1113484407}, | ||
+ | pages = {173--220}, | ||
+ | file = {NeuronsSpikeBack.pdf:/home/ruben/Zotero/storage/6XR3TG2A/NeuronsSpikeBack.pdf:application/pdf}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
|bibtex=@book{benbouzidMachinesPredictives2018, | |bibtex=@book{benbouzidMachinesPredictives2018, | ||
− | + | address = {Paris}, | |
− | + | title = {Machines prédictives}, | |
− | + | isbn = {978-2-348-04068-9}, | |
− | + | language = {French}, | |
− | + | publisher = {Editions La Découverte}, | |
− | + | author = {Benbouzid, Bilel and Cardon, Dominique}, | |
− | + | year = {2018}, | |
− | + | note = {OCLC: 1113484407}, | |
− | } | + | } |
}} | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{FacialRecognitionReveals, | ||
+ | title = {Facial recognition reveals political party in troubling new research}, | ||
+ | url = {https://social.techcrunch.com/2021/01/13/facial-recognition-reveals-political-party-in-troubling-new-research/}, | ||
+ | abstract = {Researchers have created a machine learning system that they claim can determine a person’s political party, with reasonable accuracy, based only on their face. The study, from a group that also showed that sexual preference can seemingly be inferred this way, candidly addresses and carefully…}, | ||
+ | language = {en-US}, | ||
+ | urldate = {2021-01-16}, | ||
+ | journal = {TechCrunch}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{defreitasAlternativeOntologiesNumber2016, | ||
+ | title = {Alternative Ontologies of Number: Rethinking the Quantitative in Computational Culture}, | ||
+ | volume = {16}, | ||
+ | issn = {1532-7086}, | ||
+ | shorttitle = {Alternative Ontologies of Number}, | ||
+ | url = {10.1177/1532708616655759}, | ||
+ | doi = {10.1177/1532708616655759}, | ||
+ | language = {en}, | ||
+ | number = {5}, | ||
+ | urldate = {2021-01-20}, | ||
+ | journal = {Cultural Studies ↔ Critical Methodologies}, | ||
+ | author = {de Freitas, Elizabeth and Dixon-Román, Ezekiel and Lather, Patti}, | ||
+ | month = oct, | ||
+ | year = {2016}, | ||
+ | note = {Publisher: SAGE Publications}, | ||
+ | pages = {431--434}, | ||
+ | file = {de Freitas et al 2016 - Alternative Ontologies of Number.pdf:/home/ruben/Zotero/storage/DRFHMMAP/de Freitas et al 2016 - Alternative Ontologies of Number.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{InheritingPossibility, | ||
+ | type = {Book}, | ||
+ | title = {Inheriting Possibility}, | ||
+ | url = {https://www.upress.umn.edu/book-division/books/inheriting-possibility}, | ||
+ | abstract = {Outstanding Book Award from the American Educational Research Association: From the SAT to social mobility statistics, examining quantitative measurements of human learning and development while rethinking their possibilities}, | ||
+ | language = {en}, | ||
+ | urldate = {2021-01-20}, | ||
+ | journal = {University of Minnesota Press}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/DXMUA4SE/inheriting-possibility.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{gilliardFacialRecognitionTechnology2021, | ||
+ | title = {Facial Recognition Technology Isn’t Good Just Because It’s Used to Arrest Neo-Nazis}, | ||
+ | url = {https://slate.com/technology/2021/01/facial-recognition-technology-capitol-siege.html}, | ||
+ | abstract = {Crisis is often used to increase the reach of surveillance technologies.}, | ||
+ | language = {en}, | ||
+ | urldate = {2021-01-24}, | ||
+ | journal = {Slate Magazine}, | ||
+ | author = {Gilliard, Chris, Joan Donovan}, | ||
+ | month = jan, | ||
+ | year = {2021}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/9ARUZGRV/facial-recognition-technology-capitol-siege.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{knutsonSavingFaceUnconstitutional, | ||
+ | title = {Saving Face; The Unconstitutional Use of Facial Recognition on Undocumented Immigrants and Solutions in IP}, | ||
+ | volume = {10}, | ||
+ | language = {en}, | ||
+ | author = {Knutson, Audrey}, | ||
+ | pages = {14}, | ||
+ | file = {Knutson - Saving Face\; The Unconstitutional Use of Facial Re.pdf:/home/ruben/Zotero/storage/IDBN5KIW/Knutson - Saving Face\; The Unconstitutional Use of Facial Re.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{venturiniThreeMapsThree2014, | ||
+ | title = {Three maps and three misunderstandings: A digital mapping of climate diplomacy}, | ||
+ | volume = {1}, | ||
+ | issn = {2053-9517}, | ||
+ | shorttitle = {Three maps and three misunderstandings}, | ||
+ | url = {https://doi.org/10.1177/2053951714543804}, | ||
+ | doi = {10.1177/2053951714543804}, | ||
+ | abstract = {This article proposes an original analysis of the international debate on climate change through the use of digital methods. Its originality is twofold. First, it examines a corpus of reports covering 18 years of international climate negotiations, a dataset never explored before through digital techniques. This corpus is particularly interesting because it provides the most consistent and detailed reporting of the negotiations of the United Nations Framework Convention on Climate Change. Second, in this paper we test an original approach to text analysis that combines automatic extractions and manual selection of the key issue-terms. Through this mixed approach, we tried to obtain relevant findings without imposing them on our corpus. The originality of our corpus and of our approach encouraged us to question some of the habits of digital research and confront three common misunderstandings about digital methods that we discuss in the first part of the article (section ‘Three misunderstandings on digital methods in social sciences’). In addition to reflecting on methodology, however, we also wanted to offer some substantial contribution to the understanding of UN-framed climate diplomacy. In the second part of the article (section ‘Three maps on climate negotiations’) we will therefore introduce some of the preliminary results of our analysis. By discussing three visualizations, we will analyze the thematic articulation of the climatic negotiations, the rise and fall of these themes over time and the visibility of different countries in the debate.}, | ||
+ | language = {en}, | ||
+ | number = {2}, | ||
+ | urldate = {2021-01-25}, | ||
+ | journal = {Big Data \& Society}, | ||
+ | author = {Venturini, Tommaso and Baya Laffite, Nicolas and Cointet, Jean-Philippe and Gray, Ian and Zabban, Vinciane and De Pryck, Kari}, | ||
+ | month = jul, | ||
+ | year = {2014}, | ||
+ | note = {Publisher: SAGE Publications Ltd}, | ||
+ | keywords = {climate change, climate negotiations, Digital methods, network analysis, science and technology studies, text analysis}, | ||
+ | pages = {2053951714543804}, | ||
+ | file = {Venturini et al_2014_Three maps and three misunderstandings.pdf:/home/ruben/Zotero/storage/VLT6N492/Venturini et al_2014_Three maps and three misunderstandings.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{wiredThisSitePosted2021, | ||
+ | title = {This site posted every face from Parler’s Capitol Hill insurrection videos}, | ||
+ | url = {https://arstechnica.com/tech-policy/2021/01/this-site-posted-every-face-from-parlers-capitol-hill-insurrection-videos/}, | ||
+ | abstract = {Faces of the Riot used open source software to detect, extract, and deduplicate every face.}, | ||
+ | language = {en-us}, | ||
+ | urldate = {2021-01-25}, | ||
+ | journal = {Ars Technica}, | ||
+ | author = {WIRED}, | ||
+ | month = jan, | ||
+ | year = {2021}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{wendtAnarchyWhatStates1992, | ||
+ | title = {Anarchy is what States Make of it: The Social Construction of Power Politics}, | ||
+ | volume = {46}, | ||
+ | issn = {0020-8183}, | ||
+ | shorttitle = {Anarchy is what States Make of it}, | ||
+ | url = {https://www.jstor.org.ezproxy.leidenuniv.nl:2048/stable/2706858}, | ||
+ | abstract = {The claim that international institutions can transform state interests is central to neoliberal challenges to the realist assumption that "process" (interaction and learning among states) cannot fundamentally affect system "structure" (anarchy and the distribution of capabilities). Systematic development of this claim, however, has been hampered by the neoliberals' commitment to rational choice theory, which treats interests as exogenously given and thus offers only a weak form of institutional analysis. A growing body of international relations scholarship points to ways in which the identities and interests of states are socially constructed by knowledgeable practice. This article builds a bridge between this scholarship and neoliberalism by developing a theory of identity- and interest-formation in support of the neoliberal claim that international institutions can transform state interests. Its substantive focus is the realist view that anarchies are necessarily self-help systems, which justifies disinterest in processes of identity- and interest-formation. Self-help is a function not of anarchy but of process and, as such, is itself an institution that determines the meaning of anarchy and the distribution of power for state action. The article concludes with an examination of how this institution can be transformed by practices of sovereignty, by an evolution of cooperation, and by critical strategic practice.}, | ||
+ | number = {2}, | ||
+ | urldate = {2021-01-19}, | ||
+ | journal = {International Organization}, | ||
+ | author = {Wendt, Alexander}, | ||
+ | year = {1992}, | ||
+ | note = {Publisher: [MIT Press, University of Wisconsin Press, Cambridge University Press, International Organization Foundation]}, | ||
+ | pages = {391--425}, | ||
+ | file = {Wendt_1992_Anarchy is what States Make of it.pdf:/home/ruben/Zotero/storage/RKZZ7VV2/Wendt_1992_Anarchy is what States Make of it.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{wendtAnarchyWhatStates1992a, | ||
+ | title = {Anarchy is what States Make of it: The Social Construction of Power Politics}, | ||
+ | volume = {46}, | ||
+ | issn = {0020-8183}, | ||
+ | shorttitle = {Anarchy is what States Make of it}, | ||
+ | url = {https://www.jstor.org.ezproxy.leidenuniv.nl:2048/stable/2706858}, | ||
+ | abstract = {The claim that international institutions can transform state interests is central to neoliberal challenges to the realist assumption that "process" (interaction and learning among states) cannot fundamentally affect system "structure" (anarchy and the distribution of capabilities). Systematic development of this claim, however, has been hampered by the neoliberals' commitment to rational choice theory, which treats interests as exogenously given and thus offers only a weak form of institutional analysis. A growing body of international relations scholarship points to ways in which the identities and interests of states are socially constructed by knowledgeable practice. This article builds a bridge between this scholarship and neoliberalism by developing a theory of identity- and interest-formation in support of the neoliberal claim that international institutions can transform state interests. Its substantive focus is the realist view that anarchies are necessarily self-help systems, which justifies disinterest in processes of identity- and interest-formation. Self-help is a function not of anarchy but of process and, as such, is itself an institution that determines the meaning of anarchy and the distribution of power for state action. The article concludes with an examination of how this institution can be transformed by practices of sovereignty, by an evolution of cooperation, and by critical strategic practice.}, | ||
+ | number = {2}, | ||
+ | urldate = {2021-01-19}, | ||
+ | journal = {International Organization}, | ||
+ | author = {Wendt, Alexander}, | ||
+ | year = {1992}, | ||
+ | note = {Publisher: [MIT Press, University of Wisconsin Press, Cambridge University Press, International Organization Foundation]}, | ||
+ | pages = {391--425}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{wendtAnarchyWhatStates1992b, | ||
+ | title = {Anarchy is what States Make of it: The Social Construction of Power Politics}, | ||
+ | volume = {46}, | ||
+ | issn = {0020-8183}, | ||
+ | shorttitle = {Anarchy is what States Make of it}, | ||
+ | url = {https://www.jstor.org.ezproxy.leidenuniv.nl:2048/stable/2706858}, | ||
+ | abstract = {The claim that international institutions can transform state interests is central to neoliberal challenges to the realist assumption that "process" (interaction and learning among states) cannot fundamentally affect system "structure" (anarchy and the distribution of capabilities). Systematic development of this claim, however, has been hampered by the neoliberals' commitment to rational choice theory, which treats interests as exogenously given and thus offers only a weak form of institutional analysis. A growing body of international relations scholarship points to ways in which the identities and interests of states are socially constructed by knowledgeable practice. This article builds a bridge between this scholarship and neoliberalism by developing a theory of identity- and interest-formation in support of the neoliberal claim that international institutions can transform state interests. Its substantive focus is the realist view that anarchies are necessarily self-help systems, which justifies disinterest in processes of identity- and interest-formation. Self-help is a function not of anarchy but of process and, as such, is itself an institution that determines the meaning of anarchy and the distribution of power for state action. The article concludes with an examination of how this institution can be transformed by practices of sovereignty, by an evolution of cooperation, and by critical strategic practice.}, | ||
+ | number = {2}, | ||
+ | urldate = {2021-01-19}, | ||
+ | journal = {International Organization}, | ||
+ | author = {Wendt, Alexander}, | ||
+ | year = {1992}, | ||
+ | note = {Publisher: [MIT Press, University of Wisconsin Press, Cambridge University Press, International Organization Foundation]}, | ||
+ | pages = {391--425}, | ||
+ | } | ||
+ | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
|bibtex=@incollection{bigoGlobalizedSecurityField2008, | |bibtex=@incollection{bigoGlobalizedSecurityField2008, | ||
− | + | title = {Globalized (in)security: The field and the ban-opticon}, | |
− | + | volume = {20083125}, | |
− | + | isbn = {978-0-415-46628-8 978-0-203-92676-5}, | |
− | + | shorttitle = {Globalized (in)security}, | |
− | + | url = {http://www.crcnetbase.com/doi/abs/10.4324/9780203926765.ch2}, | |
− | + | language = {en}, | |
− | + | urldate = {2021-01-26}, | |
− | + | booktitle = {Terror, Insecurity and Liberty}, | |
− | + | publisher = {Routledge}, | |
− | + | author = {Bigo, Didier}, | |
− | url = { | + | editor = {Tsoukala, Anastassia and Bigo, Didier}, |
− | + | month = jul, | |
− | + | year = {2008}, | |
− | + | doi = {10.4324/9780203926765.ch2}, | |
− | } | + | note = {Series Title: Routledge Studies in Liberty and Security}, |
+ | file = {Bigo - 2008 - Globalized (in)security The field and the ban-opt.pdf:/home/ruben/Zotero/storage/89J6FE34/Bigo - 2008 - Globalized (in)security The field and the ban-opt.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{marresWhyMapIssues2015, | ||
+ | title = {Why Map Issues? On Controversy Analysis as a Digital Method}, | ||
+ | volume = {40}, | ||
+ | issn = {0162-2439}, | ||
+ | shorttitle = {Why Map Issues?}, | ||
+ | url = {10.1177/0162243915574602}, | ||
+ | doi = {10.1177/0162243915574602}, | ||
+ | abstract = {This article takes stock of recent efforts to implement controversy analysis as a digital method in the study of science, technology, and society (STS) and beyond and outlines a distinctive approach to address the problem of digital bias. Digital media technologies exert significant influence on the enactment of controversy in online settings, and this risks undermining the substantive focus of controversy analysis conducted by digital means. To address this problem, I propose a shift in thematic focus from controversy analysis to issue mapping. The article begins by distinguishing between three broad frameworks that currently guide the development of controversy analysis as a digital method, namely, demarcationist, discursive, and empiricist. Each has been adopted in STS, but only the last one offers a digital “move beyond impartiality.” I demonstrate this approach by analyzing issues of Internet governance with the aid of the social media platform Twitter.}, | ||
+ | number = {5}, | ||
+ | urldate = {2021-01-26}, | ||
+ | journal = {Science, Technology \& Human Values}, | ||
+ | author = {Marres, Noortje}, | ||
+ | month = sep, | ||
+ | year = {2015}, | ||
+ | pmid = {26336325}, | ||
+ | pmcid = {PMC4531114}, | ||
+ | pages = {655--686}, | ||
+ | file = {Marres 2015 - Why Map Issues.pdf:/home/ruben/Zotero/storage/D4PSKF3N/Marres 2015 - Why Map Issues.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{harveyMegaPixels, | ||
+ | title = {MegaPixels}, | ||
+ | url = {https://megapixels.cc/}, | ||
+ | abstract = {Face Recognition Datasets}, | ||
+ | urldate = {2021-01-26}, | ||
+ | journal = {MegaPixels}, | ||
+ | author = {Harvey, Adam}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/XC39ZA6L/megapixels.cc.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{SomethingSomethingPlotting, | ||
+ | title = {Something something : Plotting Data}, | ||
+ | url = {http://plottingd.at/a/20bn/}, | ||
+ | urldate = {2021-01-26}, | ||
+ | file = {Something something \: Plotting Data:/home/ruben/Zotero/storage/WQ6ZMBGC/20bn.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{crawfordAnatomyAISystem, | ||
+ | title = {Anatomy of an AI System}, | ||
+ | url = {http://www.anatomyof.ai}, | ||
+ | abstract = {Anatomy of an AI System - The Amazon Echo as an anatomical map of human labor, data and planetary resources. By Kate Crawford and Vladan Joler (2018)}, | ||
+ | language = {en}, | ||
+ | urldate = {2021-01-26}, | ||
+ | publisher = {SHARE Lab; AI Now institute}, | ||
+ | author = {Crawford, Kate and Joler, Vladan}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/V6X2SR67/anatomyof.ai.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{hekkanenFieldsNetworksFinnish, |
− | + | title = {Fields, Networks and Finnish prose: A Comparison of Bourdieusian Field Theory and Actor-Network Theory in Translation Sociology}, | |
− | + | abstract = {This article discusses and compares two sociological theoretical frameworks, Pierre Bourdieu’s field theory and the Actor-Network Theory (ANT) proposed by e.g. Bruno Latour. The former framework has been widely used in Translation Studies, while the latter has been introduced much more recently but is now gaining ground. The two approaches are compared with reference to a specific translation situation, the translation of Finnish prose literature into English in the UK. The comparison shows that the ANT model is better suited for analysing the structural context in which translation activity takes place, while the Bourdieusian model provides better opportunities for analysing individual translators’ practices through the concept of habitus. The most in-depth results can thus be obtained by combining the two approaches.}, | |
− | + | language = {en}, | |
− | + | author = {Hekkanen, Raila}, | |
− | + | pages = {22}, | |
− | + | file = {Hekkanen - Fields, Networks and Finnish prose A Comparison o.pdf:/home/ruben/Zotero/storage/3HA9WCQS/Hekkanen - Fields, Networks and Finnish prose A Comparison o.pdf:application/pdf}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{PeopleAMLaba, |
− | + | title = {People {\textbar} AMLab}, | |
− | + | url = {https://amlab.science.uva.nl/people/}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-01-26}, | |
− | } | + | file = {Snapshot:/home/ruben/Zotero/storage/2ISZVLFI/people.html:text/html}, |
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{molRegionsNetworksFluids1994, |
− | + | title = {Regions, Networks and Fluids: Anaemia and Social Topology}, | |
− | + | volume = {24}, | |
− | + | issn = {0306-3127, 1460-3659}, | |
− | } | + | shorttitle = {Regions, Networks and Fluids}, |
+ | url = {http://journals.sagepub.com/doi/10.1177/030631279402400402}, | ||
+ | doi = {10.1177/030631279402400402}, | ||
+ | language = {en}, | ||
+ | number = {4}, | ||
+ | urldate = {2021-01-26}, | ||
+ | journal = {Social Studies of Science}, | ||
+ | author = {Mol, Annemarie and Law, John}, | ||
+ | month = nov, | ||
+ | year = {1994}, | ||
+ | pages = {641--671}, | ||
+ | file = {Submitted Version:/home/ruben/Zotero/storage/PYZBDI5T/Mol and Law - 1994 - Regions, Networks and Fluids Anaemia and Social T.pdf:application/pdf}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{grommePopulationGeometriesEurope2020, |
− | + | title = {Population Geometries of Europe: The Topologies of Data Cubes and Grids}, | |
− | + | volume = {45}, | |
− | + | issn = {0162-2439, 1552-8251}, | |
− | + | shorttitle = {Population Geometries of Europe}, | |
− | + | url = {http://journals.sagepub.com/doi/10.1177/0162243919835302}, | |
− | + | doi = {10.1177/0162243919835302}, | |
− | + | abstract = {The political integration of the European Union (EU) is fragile for many reasons, not least the reassertion of nationalism. That said, if we examine specific practices and infrastructures, a more complicated story emerges. We juxtapose the political fragility of the EU in relation to the ongoing formation of data infrastructures in official statistics that take part in postnational enactments of Europe’s populations and territories. We develop this argument by analyzing transformations in how European populations are enacted through new technological infrastructures that seek to integrate national census data in “cubes” of cross-tabulated social topics and spatial “grids” of maps. In doing so, these infrastructures give meaning to what “is” Europe in ways that are both old and new. Through standardization and harmonization of social and geographical spaces, “old” geometries of organizing and mapping populations are deployed along with “new” topological arrangements that mix and fold categories of population. Furthermore, we consider how grids and cubes are generative of methodological topologies by closing the distances or differences between methods and making their data equivalent. By paying attention to these practices and infrastructures, we examine how they enable reconfiguring what is known and imagined as Europe and how it is governed.}, | |
− | + | language = {en}, | |
− | } | + | number = {2}, |
+ | urldate = {2021-01-26}, | ||
+ | journal = {Science, Technology, \& Human Values}, | ||
+ | author = {Grommé, Francisca and Ruppert, Evelyn}, | ||
+ | month = mar, | ||
+ | year = {2020}, | ||
+ | pages = {235--261}, | ||
+ | file = {Full Text:/home/ruben/Zotero/storage/HN5AJMTE/Grommé and Ruppert - 2020 - Population Geometries of Europe The Topologies of.pdf:application/pdf}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{cakiciPeoplingEuropeData2020, |
− | + | title = {Peopling Europe through Data Practices: Introduction to the Special Issue}, | |
− | + | volume = {45}, | |
− | + | issn = {0162-2439, 1552-8251}, | |
− | + | shorttitle = {Peopling Europe through Data Practices}, | |
− | + | url = {http://journals.sagepub.com/doi/10.1177/0162243919897822}, | |
− | + | doi = {10.1177/0162243919897822}, | |
− | + | abstract = {Politically, Europe has been unable to address itself to a constituted polity and people as more than an agglomeration of nation-states. From the resurgence of nationalisms to the crisis of the single currency and the unprecedented decision of a member state to leave the European Union (EU), core questions about the future of Europe have been rearticulated: Who are the people of Europe? Is there a European identity? What does it mean to say, “I am European?” Where does Europe begin and end? and Who can legitimately claim to be a part of a “European” people? The special issue (SI) seeks to contest dominant framings of the question “Who are the people of Europe?” as only a matter of government policies, electoral campaigns, or parliamentary debates. Instead, the contributions start from the assumption that answers to this question exist in data practices where people are addressed, framed, known, and governed as European. The central argument of this SI is that it is through data practices that the EU seeks to simultaneously constitute its population as a knowable, governable entity, and as a distinct form of peoplehood where common personhood is more important than differences.}, | |
− | } | + | language = {en}, |
+ | number = {2}, | ||
+ | urldate = {2021-01-26}, | ||
+ | journal = {Science, Technology, \& Human Values}, | ||
+ | author = {Cakici, Baki and Ruppert, Evelyn and Scheel, Stephan}, | ||
+ | month = mar, | ||
+ | year = {2020}, | ||
+ | pages = {199--211}, | ||
+ | file = {Full Text:/home/ruben/Zotero/storage/ZYN6EGKB/Cakici et al. - 2020 - Peopling Europe through Data Practices Introducti.pdf:application/pdf}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
|bibtex=@article{boersmaImaginingSocietyLogics2015, | |bibtex=@article{boersmaImaginingSocietyLogics2015, | ||
− | + | title = {Imagining society: Logics of visualization in images of immigrant integration}, | |
− | + | volume = {33}, | |
− | + | issn = {0263-7758, 1472-3433}, | |
− | + | shorttitle = {Imagining society}, | |
− | + | url = {http://journals.sagepub.com/doi/10.1177/0263775815598153}, | |
− | + | doi = {10.1177/0263775815598153}, | |
− | + | language = {en}, | |
− | + | number = {6}, | |
− | + | urldate = {2021-01-26}, | |
− | + | journal = {Environment and Planning D: Society and Space}, | |
− | + | author = {Boersma, Sanne and Schinkel, Willem}, | |
− | + | month = dec, | |
− | + | year = {2015}, | |
− | + | pages = {1043--1062}, | |
− | } | + | } |
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{davilaDiagramsPowerVisualizing2019, | ||
+ | address = {Eindhoven}, | ||
+ | title = {Diagrams of power. Visualizing, mapping and performing resistance.}, | ||
+ | isbn = {978-94-93148-03-1}, | ||
+ | abstract = {Diagrams of Power' collects contemporary artworks and projects that use data, diagrams, maps and visualizations as ways of challenging dominant narratives and supporting the resilience of marginalized communities.0The artists and designers featured critique conventionalized and established truths that obscure important histories or perpetuate oppressive regimes; they also contribute to positive social change by engaging communities and providing alternative strategies for storytelling, communication and organizing. Historical and contemporary uses of data and visualization in colonization, surveillance and management are problematized through critical interventions that use performance, embodiment and counternarratives. 00Exhibition: Onomatopee, Eindhoven, The Netherlands (09.03.-05.05.2019).}, | ||
+ | language = {English}, | ||
+ | publisher = {Onomatopee}, | ||
+ | author = {Dávila, Patricio}, | ||
+ | year = {2019}, | ||
+ | note = {OCLC: 1102599000}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{universityDataVisualizationModern, | ||
+ | title = {Data Visualization and the Modern Imagination}, | ||
+ | url = {https://exhibits.stanford.edu/dataviz/}, | ||
+ | abstract = {An exhibition that examines the 19th-century roots of information graphics.}, | ||
+ | language = {en}, | ||
+ | urldate = {2021-01-26}, | ||
+ | journal = {Spotlight at Stanford}, | ||
+ | author = {University, © Stanford and {Stanford} and California 94305}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/DKDUC6KZ/dataviz.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{ComputerGotIt, |
− | + | title = {'The Computer Got It Wrong': How Facial Recognition Led To False Arrest Of Black Man}, | |
− | + | shorttitle = {'The Computer Got It Wrong'}, | |
− | + | url = {https://www.npr.org/2020/06/24/882683463/the-computer-got-it-wrong-how-facial-recognition-led-to-a-false-arrest-in-michig}, | |
− | + | abstract = {Robert Williams says his driver's license photo was incorrectly matched with a wanted suspect. He was arrested and detained. Though the case was dropped, Williams says its effect is lasting.}, | |
− | + | language = {en}, | |
− | + | urldate = {2021-01-26}, | |
− | + | journal = {NPR.org}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/A57JGG93/the-computer-got-it-wrong-how-facial-recognition-led-to-a-false-arrest-in-michig.html:text/html}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@techreport{europeancommissionWhitePaperArtificial2020, |
− | + | type = {Text}, | |
− | + | title = {White Paper on Artificial Intelligence: a European approach to excellence and trust}, | |
− | + | shorttitle = {White Paper on Artificial Intelligence}, | |
− | + | url = {https://ec.europa.eu/info/publications/white-paper-artificial-intelligence-european-approach-excellence-and-trust_en}, | |
− | + | abstract = {White Paper on Artificial Intelligence: a European approach to excellence and trust}, | |
− | + | language = {en}, | |
− | + | urldate = {2021-01-26}, | |
− | + | author = {European Commission}, | |
− | + | month = feb, | |
− | + | year = {2020}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/R3QQFGV6/white-paper-artificial-intelligence-european-approach-excellence-and-trust_en.html:text/html;European Commission - 2020 - White Paper on Artificial Intelligence a European.pdf:/home/ruben/Zotero/storage/TCWIWJ95/European Commission - 2020 - White Paper on Artificial Intelligence a European.pdf:application/pdf}, | |
− | + | } | |
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@techreport{nganOngoingFaceRecognition2020, |
− | + | address = {Gaithersburg, MD}, | |
− | + | title = {Ongoing Face Recognition Vendor Test (FRVT) part 6A:: face recognition accuracy with masks using pre-COVID-19 algorithms}, | |
− | + | shorttitle = {Ongoing Face Recognition Vendor Test (FRVT) part 6A}, | |
− | + | url = {https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8311.pdf}, | |
− | + | language = {en}, | |
− | + | number = {NIST IR 8311}, | |
− | } | + | urldate = {2021-01-26}, |
+ | institution = {National Institute of Standards and Technology}, | ||
+ | author = {Ngan, Mei and Grother, Patrick and Hanaoka, Kayee}, | ||
+ | month = jul, | ||
+ | year = {2020}, | ||
+ | doi = {10.6028/NIST.IR.8311}, | ||
+ | pages = {NIST IR 8311}, | ||
+ | file = {Ngan et al. - 2020 - Ongoing Face Recognition Vendor Test (FRVT) part 6.pdf:/home/ruben/Zotero/storage/UXFVFTBS/Ngan et al. - 2020 - Ongoing Face Recognition Vendor Test (FRVT) part 6.pdf:application/pdf}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{AINarratives2020, |
− | + | title = {AI Narratives}, | |
− | + | url = {https://www.ainarratives.com}, | |
− | + | abstract = {GLOBAL AI NARRATIVES exploring the way we talk about AI}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-01-29}, | |
− | + | journal = {AI Narratives}, | |
− | + | year = {2020}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/C7G64HNG/www.ainarratives.com.html:text/html}, | |
− | + | } | |
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{covielloPENSARECONOCCHI, |
− | + | title = {PENSARE CON GLI OCCHI. LA POLITICA DELLE IMMAGINI NELL’OPERA DI HARUN FAROCHI / Videogrammi di guerra. Il lavoro del montaggio e la riemersione del visibile nel cinema di HARUN FAROCKI}, | |
− | + | url = {https://www.academia.edu/29935678/PENSARE_CON_GLI_OCCHI_LA_POLITICA_DELLE_IMMAGINI_NELL_OPERA_DI_HARUN_FAROCHI_Videogrammi_di_guerra_Il_lavoro_del_montaggio_e_la_riemersione_del_visibile_nel_cinema_di_HARUN_FAROCKI}, | |
− | + | language = {en}, | |
− | + | urldate = {2021-01-30}, | |
− | } | + | author = {Coviello, Massimiliano}, |
+ | file = {Snapshot:/home/ruben/Zotero/storage/ELD7S5EY/PENSARE_CON_GLI_OCCHI_LA_POLITICA_DELLE_IMMAGINI_NELL_OPERA_DI_HARUN_FAROCHI_Videogrammi_di_gue.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{harveyExposingAi, |
− | + | title = {Exposing.ai}, | |
− | + | url = {https://exposing.ai/}, | |
− | + | abstract = {Exposing.ai: Check if your photos were used in AI surveillance research projects}, | |
− | + | urldate = {2021-01-31}, | |
− | + | journal = {Exposing.ai}, | |
− | + | author = {Harvey, Adam}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/G3HGTTZK/exposing.ai.html:text/html}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{metzHereWayLearn2021, |
− | + | chapter = {Technology}, | |
− | + | title = {Here’s a Way to Learn if Facial Recognition Systems Used Your Photos}, | |
− | + | issn = {0362-4331}, | |
− | + | url = {https://www.nytimes.com/2021/01/31/technology/facial-recognition-photo-tool.html}, | |
− | + | abstract = {An online tool targets only a small slice of what’s out there, but may open some eyes to how widely artificial intelligence research fed on personal images.}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-01-31}, | |
− | + | journal = {The New York Times}, | |
− | + | author = {Metz, Cade and Hill, Kashmir}, | |
− | + | month = jan, | |
− | + | year = {2021}, | |
− | + | keywords = {Computer Vision, Computers and the Internet, Facial Recognition Software, Flickr, Megvii Technology Ltd, Photography, Privacy, Tabriz, Parisa, University of Washington}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/QDN2VGBB/facial-recognition-photo-tool.html:text/html}, | |
− | } | + | } |
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{kale-lostuvaliTwoSociologiesScience2016, |
− | + | title = {Two Sociologies of Science in Search of Truth: Bourdieu Versus Latour}, | |
− | + | volume = {30}, | |
− | + | issn = {0269-1728}, | |
− | + | shorttitle = {Two Sociologies of Science in Search of Truth}, | |
− | + | url = {https://doi.org/10.1080/02691728.2015.1015062}, | |
− | } | + | doi = {10.1080/02691728.2015.1015062}, |
+ | abstract = {The sociology of science seeks to theorize the social conditioning of science. This theorizing seems to undermine the validity of scientific knowledge and lead to relativism. Bourdieu and Latour both attempt to develop a sociology of science that overcomes relativism but stipulate opposite conditions for the production of scientific truths: while Bourdieu emphasizes autonomy, Latour emphasizes associations. This is because they work with oppositional epistemological and ontological assumptions. In both theories, the notion of truth lacks an independent definition; it is derived from the theorist’s position on rationalism and defined with reference to how it is produced. This interdependence creates a different problem in each case. Bourdieu’s assertion that truths produced in relatively autonomous scientific fields are “trans-historical” remains an epistemological assertion. Latour’s argument that truths are produced through associations fails to capture the different resources, distinctions and boundaries that help build credibility. Ultimately, both theories verge on providing an answer to the question of how science should be organized. Nonetheless, their comparison constitutes useful groundwork for future empirical studies.}, | ||
+ | number = {3}, | ||
+ | urldate = {2021-02-03}, | ||
+ | journal = {Social Epistemology}, | ||
+ | author = {Kale-Lostuvali, Elif}, | ||
+ | month = may, | ||
+ | year = {2016}, | ||
+ | note = {Publisher: Routledge | ||
+ | \_eprint: https://doi.org/10.1080/02691728.2015.1015062}, | ||
+ | keywords = {Actor-network Theory, Relativism, Scientific Field, Sociology of Science, Truth}, | ||
+ | pages = {273--296}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/P8JX4FXS/02691728.2015.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{schinkelSociologicalDiscourseRelational2007, |
− | + | title = {Sociological Discourse of the Relational: The Cases of Bourdieu \& Latour}, | |
− | + | volume = {55}, | |
− | + | issn = {0038-0261}, | |
− | + | shorttitle = {Sociological Discourse of the Relational}, | |
− | + | url = {https://doi.org/10.1111/j.1467-954X.2007.00749.x}, | |
− | + | doi = {10.1111/j.1467-954X.2007.00749.x}, | |
− | + | abstract = {Pierre Bourdieu's approach to sociology has been so widely recognized as being innovative that his innovations can be said to have been academically incorporated to the degree of having-been-innovative. On the other hand, the more recent work of Bruno Latour seems to offer a fresh innovative impetus to sociology. Over against Bourdieu's relational sociology, Latour's relationist sociology overcomes the subject-object dichotomy, and abandons the notions of ‘society’ and ‘the social’. In this contribution, a comparison is made between the ideas of Bourdieu and Latour on the question of what sociology should look like, specifically focusing on their respective ideas on what can be called the relational. A Latourian critique of Bourdieu is provided, as well as a Bourdieusian analysis of Latourian sociology. Rather than ending up with two different ‘paradigms’, an attempt is made on the basis of Foucault's archaeology of discourse to view Bourdieusian and Latourian sociology as distinct positions within a discourse on the relational.}, | |
− | + | language = {en}, | |
− | + | number = {4}, | |
− | + | urldate = {2021-02-03}, | |
− | + | journal = {The Sociological Review}, | |
− | + | author = {Schinkel, Willem}, | |
− | + | month = nov, | |
− | + | year = {2007}, | |
− | + | note = {Publisher: SAGE Publications Ltd}, | |
− | } | + | pages = {707--729}, |
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{20210401UnfoldingIntelligence, |
− | + | title = {2021-04-0 1Unfolding Intelligence Symposium}, | |
− | + | url = {https://mailchi.mp/9bd9e7d5b602/announcing-the-unfolding-intelligence-symposium?e=018299291f}, | |
− | + | urldate = {2021-02-03}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/Y7YZYEXD/announcing-the-unfolding-intelligence-symposium.html:text/html}, | |
− | + | } | |
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@book{braynePredictSurveilData2021, |
− | + | address = {New York, NY}, | |
− | + | title = {Predict and surveil: data, discretion, and the future of policing}, | |
− | + | isbn = {978-0-19-068409-9}, | |
− | + | shorttitle = {Predict and surveil}, | |
− | + | abstract = {"The scope of criminal justice surveillance, from the police to the prisons, has expanded rapidly in recent decades. At the same time, the use of big data has spread across a range of fields, including finance, politics, health, and marketing. While law enforcement's use of big data is hotly contested, very little is known about how the police actually use it in daily operations and with what consequences. This book offers an inside look at how police use big data and new surveillance technologies, leveraging on-the-ground fieldwork with one of the most technologically advanced law enforcement agencies in the world-the Los Angeles Police Department. Drawing on original interviews and ethnographic observations from over two years of fieldwork with the LAPD, the text examines the causes and consequences of big data and algorithmic control. It reveals how the police use predictive analytics and new surveillance technologies to deploy resources, identify criminal suspects, and conduct investigations; how the adoption of big data analytics transforms police organizational practices; and how the police themselves respond to these new data-driven practices. While big data analytics has the potential to reduce bias, increase efficiency, and improve prediction accuracy, the book argues that it also reproduces and deepens existing patterns of inequality, threatens privacy, and challenges civil liberties"--}, | |
− | + | language = {en}, | |
− | + | publisher = {Oxford University Press}, | |
− | + | author = {Brayne, Sarah}, | |
− | } | + | year = {2021}, |
+ | keywords = {California Los Angeles, Crime analysis, Crime forecasting, Criminal behavior, Prediction of, Data processing, Police, Statistical methods}, | ||
+ | file = {Brayne - 2021 - Predict and surveil data, discretion, and the fut.pdf:/home/ruben/Zotero/storage/PLWTVDAL/Brayne - 2021 - Predict and surveil data, discretion, and the fut.pdf:application/pdf}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{PredictSurveilSarah, |
− | + | title = {Predict and Surveil {\textbar} Sarah Brayne {\textbar} download}, | |
− | + | url = {https://b-ok.cc/book/6026592/77c46c}, | |
− | + | urldate = {2021-02-04}, | |
− | + | file = {Predict and Surveil | Sarah Brayne | download:/home/ruben/Zotero/storage/FSYVNJCI/77c46c.html:text/html}, | |
− | + | } | |
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{hvistendahljanuary302021HowLAPDPalantir, |
− | + | title = {How the LAPD and Palantir Use Data to Justify Racist Policing}, | |
− | + | url = {https://theintercept.com/2021/01/30/lapd-palantir-data-driven-policing/}, | |
− | + | abstract = {In a new book, a sociologist who spent months embedded with the LAPD details how data-driven policing techwashes bias.}, | |
− | + | language = {en}, | |
− | + | urldate = {2021-02-04}, | |
− | + | journal = {The Intercept}, | |
− | + | author = {HvistendahlJanuary 30 2021, Mara HvistendahlMara and P.m, 1:00}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/QV5QPFUL/lapd-palantir-data-driven-policing.html:text/html}, | |
− | + | } | |
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
|bibtex=@misc{collectiveTacticalTech, | |bibtex=@misc{collectiveTacticalTech, | ||
− | + | title = {Tactical Tech}, | |
− | + | url = {https://tacticaltech.org/}, | |
− | + | abstract = {Tactical Tech is an international NGO that engages with citizens and civil-society organisations to explore the impacts of technology on society.}, | |
− | + | language = {en}, | |
− | + | urldate = {2021-02-05}, | |
− | language = {en} | + | author = {Collective, Tactical Tech}, |
− | } | + | } |
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ThereAreSpying, | ||
+ | title = {There Are Spying Eyes Everywhere—and Now They Share a Brain}, | ||
+ | issn = {1059-1028}, | ||
+ | url = {https://www.wired.com/story/there-are-spying-eyes-everywhere-and-now-they-share-a-brain/}, | ||
+ | abstract = {Security cameras. License plate readers. Smartphone trackers. Drones. We’re being watched 24/7. What happens when all those data streams fuse into one?}, | ||
+ | language = {en-us}, | ||
+ | urldate = {2021-02-06}, | ||
+ | journal = {Wired}, | ||
+ | keywords = {backchannel, business, intelligence, longreads, privacy, Read, Ruben, surveillance, textbelowleftfullbleed, web}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/7SAUUYVM/there-are-spying-eyes-everywhere-and-now-they-share-a-brain.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{krausScaryRevelations40, |
− | + | title = {9 scary revelations from 40 years of facial recognition research}, | |
− | + | url = {https://mashable.com/article/facial-recognition-databases-privacy-study/}, | |
− | + | abstract = {The largest study of facial recognition databases to date show its revealing origins and flaws.}, | |
− | + | language = {en}, | |
− | + | urldate = {2021-02-07}, | |
− | + | journal = {Mashable}, | |
− | + | author = {Kraus, Rachel}, | |
− | } | + | file = {Snapshot:/home/ruben/Zotero/storage/SA6JE9RW/facial-recognition-databases-privacy-study.html:text/html}, |
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{bunz001AestheticsNew, |
− | + | title = {001: Aesthetics of New AI}, | |
− | + | language = {en}, | |
− | + | author = {Bunz, Mercedes and Khan, Murad and Anamorphisms, New and Khan, Nora N}, | |
− | + | pages = {56}, | |
− | + | file = {Bunz et al. - 001 Aesthetics of New AI.pdf:/home/ruben/Zotero/storage/T7UBXBXX/Bunz et al. - 001 Aesthetics of New AI.pdf:application/pdf}, | |
− | + | } | |
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{rajiFaceSurveyFacial2021a, |
− | + | title = {About Face: A Survey of Facial Recognition Evaluation}, | |
− | + | abstract = {We survey over 100 face datasets constructed between 1976 to 2019 of 145 million images of over 17 million subjects from a range of sources, demographics and conditions. Our historical survey reveals that these datasets are contextually informed - shaped by changes in political motivations, technological capability and current norms. We discuss how such influences mask specific practices - some of which may actually be harmful or otherwise problematic - and make a case for the explicit communication of such details in order to establish a more grounded understanding of the technology’s function in the real world.}, | |
− | + | language = {en}, | |
− | + | author = {Raji, Inioluwa Deborah and Fried, Genevieve}, | |
− | + | year = {2021}, | |
− | + | pages = {11}, | |
− | + | file = {Raji and Fried - About Face A Survey of Facial Recognition Evaluat.pdf:/home/ruben/Zotero/storage/JZRZA43G/Raji and Fried - About Face A Survey of Facial Recognition Evaluat.pdf:application/pdf}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{WorldOrbit2020, |
− | + | title = {World.orbit}, | |
− | + | url = {https://verticalatlas.hetnieuweinstituut.nl/en/worldorbit}, | |
− | + | abstract = {Vertical Atlas – world.orbit is a public research project focusing on a critical and generative engagement with satellite data. In a series of workshops, artists and designers can learn how to find, read, proc...}, | |
− | + | language = {en}, | |
− | } | + | urldate = {2021-02-09}, |
+ | journal = {Vertical Atlas}, | ||
+ | month = oct, | ||
+ | year = {2020}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/I2AD8JVX/worldorbit.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{VisualSensoryApproaches, |
− | + | title = {Visual and Sensory Approaches}, | |
− | + | url = {https://www.4sonline.org/sts-resources/making-and-doing/boston-2017/visual-and-sensory-approaches-2017/}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-02-10}, | |
− | } | + | journal = {Society for Social Studies of Science}, |
+ | file = {Snapshot:/home/ruben/Zotero/storage/YEE3UMVV/visual-and-sensory-approaches-2017.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{MappingMonitoring, |
− | + | title = {Mapping / Monitoring}, | |
− | + | url = {https://www.4sonline.org/sts-resources/making-and-doing/new-orleans-2019/mapping-monitoring/}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-02-10}, | |
− | + | journal = {Society for Social Studies of Science}, | |
− | } | + | file = {Snapshot:/home/ruben/Zotero/storage/BTVIV8KP/mapping-monitoring.html:text/html}, |
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{ExperimentsCollaborationCritical, |
− | + | title = {Experiments in Collaboration and Critical Participation}, | |
− | + | url = {https://www.4sonline.org/sts-resources/making-and-doing/virtual-prague-2020/experiments-in-collaboration-and-critical-participation/}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-02-10}, | |
− | + | journal = {Society for Social Studies of Science}, | |
− | + | } | |
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{VirtualPrague2020, |
− | + | title = {Virtual Prague 2020}, | |
− | + | url = {https://www.4sonline.org/sts-resources/making-and-doing/virtual-prague-2020/}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-02-10}, | |
− | + | journal = {Society for Social Studies of Science}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/PVBF2JXY/virtual-prague-2020.html:text/html}, | |
− | + | } | |
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{PhDRegulationsLeiden, |
− | + | title = {PhD Regulations Leiden University - Leiden University}, | |
− | + | url = {https://www.organisatiegids.universiteitleiden.nl/en/regulations/general/phd-regulations}, | |
− | + | urldate = {2021-02-10}, | |
− | + | file = {PhD Regulations Leiden University - Leiden University:/home/ruben/Zotero/storage/NR9HU7NT/phd-regulations.html:text/html}, | |
− | + | } | |
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{KnotWoodCall, |
− | + | title = {The Knot in the Wood: The Call to Multimodal Anthropology}, | |
− | + | shorttitle = {The Knot in the Wood}, | |
− | + | url = {http://www.americananthropologist.org/2018/06/05/the-knot-in-the-wood-the-call-to-multimodal-anthropology/}, | |
− | + | abstract = {By Roxanne Varzi (University of California, Irvine) What I love most in Samuel Gerald Collins,}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-02-10}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/RIUPQSGZ/the-knot-in-the-wood-the-call-to-multimodal-anthropology.html:text/html}, | |
− | + | } | |
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{FacialRecognitionEurope2019, |
− | + | title = {Facial Recognition in Europe: Security Problem?}, | |
− | + | shorttitle = {Facial Recognition in Europe}, | |
− | + | url = {https://blog-idcuk.com/facial-recognition-in-europe-a-battle-between-privacy-and-surveillance/}, | |
− | + | abstract = {Legislators are exploring ways to control the use of facial recognition in Europe through legislation, which would limit the indiscriminate use of it}, | |
− | + | language = {en-GB}, | |
− | + | urldate = {2021-02-10}, | |
− | + | journal = {IDC UK Blog}, | |
− | + | month = sep, | |
− | + | year = {2019}, | |
− | } | + | keywords = {FR-Inbox}, |
+ | file = {Snapshot:/home/ruben/Zotero/storage/VP7N8Q6A/facial-recognition-in-europe-a-battle-between-privacy-and-surveillance.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{10FacialRecognition, |
− | + | title = {10 facial recognition startups from Europe you should know about in 2019 {\textbar} Silicon Canals}, | |
− | + | url = {https://siliconcanals.com/news/facial-recognition-startups-in-2019/}, | |
− | + | abstract = {European technology news from the startup ecosystem. Founder and publisher: Remco Janssen. Follow us on Twitter: @siliconcanals.}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-02-10}, | |
− | + | note = {Section: News}, | |
− | + | keywords = {FR-Inbox}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/96VJ5LBS/facial-recognition-startups-in-2019.html:text/html}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{FacialRecognitionEU2020, |
− | + | chapter = {Technology}, | |
− | + | title = {Facial recognition: EU considers ban of up to five years}, | |
− | + | shorttitle = {Facial recognition}, | |
− | + | url = {https://www.bbc.com/news/technology-51148501}, | |
− | } | + | abstract = {The European Commission wants time to work out how to prevent the technology being abused.}, |
+ | language = {en-GB}, | ||
+ | urldate = {2021-02-10}, | ||
+ | journal = {BBC News}, | ||
+ | month = jan, | ||
+ | year = {2020}, | ||
+ | keywords = {FR-Inbox}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/XY8ZYRTP/technology-51148501.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{sheadFacialRecognitionTech2020, |
− | + | title = {Facial recognition tech developed by Clearview AI could be illegal in Europe, privacy group says}, | |
− | + | url = {https://www.cnbc.com/2020/06/11/clearview-ai-facial-recognition-europe.html}, | |
− | + | abstract = {The European Data Protection Board warned on Wednesday that Clearview AI's technology is likely to be illegal in Europe.}, | |
− | + | language = {en}, | |
− | + | urldate = {2021-02-10}, | |
− | } | + | journal = {CNBC}, |
+ | author = {Shead, Sam}, | ||
+ | month = jun, | ||
+ | year = {2020}, | ||
+ | note = {Section: Technology}, | ||
+ | keywords = {FR-Inbox}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/T8UZYQM3/clearview-ai-facial-recognition-europe.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{HowFacialRecognition2019, |
− | + | title = {How facial recognition is taking over a French city}, | |
− | + | url = {https://www.politico.eu/article/how-facial-recognition-is-taking-over-a-french-riviera-city/}, | |
− | + | abstract = {European authorities are competing to deploy facial recognition tech. Nice in southern France is in the lead.}, | |
− | + | language = {en-US}, | |
− | } | + | urldate = {2021-02-10}, |
+ | journal = {POLITICO}, | ||
+ | month = sep, | ||
+ | year = {2019}, | ||
+ | keywords = {FR-Inbox}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/MQX7P6FU/how-facial-recognition-is-taking-over-a-french-riviera-city.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{ManyFacesFacial, |
− | + | title = {The many faces of facial recognition in the EU}, | |
− | + | url = {https://edri.org/our-work/the-many-faces-of-facial-recognition-in-the-eu/}, | |
− | + | abstract = {In this second installment of EDRi's facial recognition and fundamental rights series, we look at how different EU Member States, institutions and other countries worldwide are responding to the use of this tech in public spaces.}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-02-10}, | |
− | + | journal = {European Digital Rights (EDRi)}, | |
− | } | + | keywords = {FR-Inbox}, |
+ | file = {Snapshot:/home/ruben/Zotero/storage/2ZBTWMWD/the-many-faces-of-facial-recognition-in-the-eu.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{ActivistsUrgeEU2020, |
− | + | title = {Activists urge EU to ban live facial recognition in public spaces}, | |
− | + | url = {https://www.politico.eu/article/activists-urge-eu-to-ban-live-facial-recognition-in-public-spaces/}, | |
− | + | abstract = {12 organizations join forces to make their voice heard in a debate dominated by the tech industry.}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-02-10}, | |
− | + | journal = {POLITICO}, | |
− | + | month = nov, | |
− | + | year = {2020}, | |
− | + | keywords = {FR-Inbox}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/LY4HQE5Q/activists-urge-eu-to-ban-live-facial-recognition-in-public-spaces.html:text/html}, | |
− | } | + | } |
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
|bibtex=@article{EuropeLimitsGovernment, | |bibtex=@article{EuropeLimitsGovernment, | ||
− | + | title = {Europe Limits Government by Algorithm. The US, Not So Much}, | |
− | + | issn = {1059-1028}, | |
− | + | url = {https://www.wired.com/story/europe-limits-government-algorithm-us-not-much/}, | |
− | + | abstract = {A Dutch court halted a program to identify people more likely to commit benefits fraud. Critics said it discriminated against immigrants and low-income residents.}, | |
− | + | language = {en-us}, | |
− | + | urldate = {2021-02-10}, | |
− | + | journal = {Wired}, | |
− | + | keywords = {algorithms, artificial intelligence, business, europe, facial recognition, FR-Inbox, web}, | |
− | } | + | file = {Snapshot:/home/ruben/Zotero/storage/5JXYLHCC/europe-limits-government-algorithm-us-not-much.html:text/html}, |
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{HowDutchActivists, |
− | + | title = {How Dutch activists got an invasive fraud detection algorithm banned}, | |
− | + | url = {https://algorithmwatch.org/en/story/syri-netherlands-algorithm/}, | |
− | + | abstract = {The Dutch government has been using SyRI, a secret algorithm, to detect possible social welfare fraud. Civil rights activists have taken the matter to court and managed to get public organizations to think about less repressive alternatives.}, | |
− | + | language = {en-US}, | |
− | language = {en- | + | urldate = {2021-02-10}, |
− | } | + | journal = {AlgorithmWatch}, |
+ | keywords = {FR-Inbox}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/UENPICQR/syri-netherlands-algorithm.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{NotesAIFrontier, | ||
+ | title = {Notes from the AI frontier: Tackling Europe’s gap in digital and AI}, | ||
+ | language = {en}, | ||
+ | keywords = {FR-Inbox}, | ||
+ | pages = {60}, | ||
+ | file = {Notes from the AI frontier Tackling Europe’s gap .pdf:/home/ruben/Zotero/storage/44NDX327/Notes from the AI frontier Tackling Europe’s gap .pdf:application/pdf}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{HowEuropeAI2019, |
− | + | title = {How Europe’s AI ecosystem could catch up with China and the U.S.}, | |
− | + | url = {https://venturebeat.com/2019/10/01/how-europes-ai-ecosystem-could-catch-up-with-china-and-the-u-s/}, | |
− | + | abstract = {Europe’s AI ecosystem wants to catch up with the United States and China, and startups, analysts, and business leaders talked about how to do it at TechBBQ.}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-02-10}, | |
− | + | journal = {VentureBeat}, | |
− | + | month = oct, | |
− | + | year = {2019}, | |
− | + | keywords = {FR-Read}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/TWNEUTYZ/how-europes-ai-ecosystem-could-catch-up-with-china-and-the-u-s.html:text/html}, | |
− | + | } | |
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{AmsterdamAlgoritmeregisterHet, |
− | + | title = {Amsterdam Algoritmeregister – Het algoritmeregister is een overzicht van de algoritmes die de gemeente Amsterdam gebruikt bij gemeentelijke dienstverlening. Een algoritme is een vooraf bepaalde set regels of stappen die door de computer gevolgd worden. Per algoritme vindt u eerst algemene informatie over de bedoeling en werking van het algoritme. Daarna vindt u meer gedetailleerde technische informatie. Door feedback te geven helpen kunt u ons helpen om de algoritmes die we gebruiken beter, eerlijker en verantwoorder te maken.}, | |
− | + | url = {https://algoritmeregister.amsterdam.nl/en/ai-register/}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-02-10}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/YMYIZ248/ai-register.html:text/html}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{BelarusProtestersUse, |
− | + | title = {Belarus Protesters Use AI to 'Unmask' Riot Police Wearing Face Coverings}, | |
− | + | url = {https://petapixel.com/2020/09/29/belarus-protesters-use-ai-to-unmask-riot-police-wearing-face-coverings/}, | |
− | + | urldate = {2021-02-10}, | |
− | + | keywords = {FR-Read}, | |
− | + | file = {Belarus Protesters Use AI to 'Unmask' Riot Police Wearing Face Coverings:/home/ruben/Zotero/storage/UN56JTEC/belarus-protesters-use-ai-to-unmask-riot-police-wearing-face-coverings.html:text/html}, | |
− | + | } | |
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{hillWrongfullyAccusedAlgorithm2020, |
− | + | chapter = {Technology}, | |
− | + | title = {Wrongfully Accused by an Algorithm}, | |
− | + | issn = {0362-4331}, | |
− | + | url = {https://www.nytimes.com/2020/06/24/technology/facial-recognition-arrest.html}, | |
− | + | abstract = {In what may be the first known case of its kind, a faulty facial recognition match led to a Michigan man’s arrest for a crime he did not commit.}, | |
− | } | + | language = {en-US}, |
+ | urldate = {2021-02-10}, | ||
+ | journal = {The New York Times}, | ||
+ | author = {Hill, Kashmir}, | ||
+ | month = jun, | ||
+ | year = {2020}, | ||
+ | keywords = {Black People, Detroit (Mich), Discrimination, Facial Recognition Software, False Arrests, Convictions and Imprisonments, FR-Read, Police, Williams, Robert Julian-Borchak}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/KQTN3ARB/facial-recognition-arrest.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{AmsterdamHelsinkiLaunch2020, |
− | + | title = {Amsterdam and Helsinki launch algorithm registries to bring transparency to public deployments of AI}, | |
− | + | url = {https://venturebeat.com/2020/09/28/amsterdam-and-helsinki-launch-algorithm-registries-to-bring-transparency-to-public-deployments-of-ai/}, | |
− | + | abstract = {Amsterdam and Helsinki today launched AI registries to detail how each city uses algorithms to deliver services.}, | |
− | + | language = {en-US}, | |
− | } | + | urldate = {2021-02-10}, |
+ | journal = {VentureBeat}, | ||
+ | month = sep, | ||
+ | year = {2020}, | ||
+ | keywords = {FR-Read}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/KHXWRXPY/amsterdam-and-helsinki-launch-algorithm-registries-to-bring-transparency-to-public-deployments-.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{ComputerGotIta, |
− | + | title = {'The Computer Got It Wrong': How Facial Recognition Led To False Arrest Of Black Man}, | |
− | + | shorttitle = {'The Computer Got It Wrong'}, | |
− | + | url = {https://www.npr.org/2020/06/24/882683463/the-computer-got-it-wrong-how-facial-recognition-led-to-a-false-arrest-in-michig}, | |
− | + | abstract = {Robert Williams says his driver's license photo was incorrectly matched with a wanted suspect. He was arrested and detained. Though the case was dropped, Williams says its effect is lasting.}, | |
− | } | + | language = {en}, |
+ | urldate = {2021-02-10}, | ||
+ | journal = {NPR.org}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/XVKZ4PQI/the-computer-got-it-wrong-how-facial-recognition-led-to-a-false-arrest-in-michig.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{guinnessTechnopoliceCallingOut, |
− | + | title = {Technopolice: calling out so-called "Safe Cities"}, | |
− | + | shorttitle = {Technopolice}, | |
− | + | url = {/v/Camp2019-10329-technopolice_calling_out_so-called_safe_cities}, | |
− | + | abstract = {In many French cities (and beyond), mayors are pushing towards "safe Smart Cities", pushing for technology everywhere. Microphones, video...}, | |
− | } | + | language = {en}, |
+ | urldate = {2021-02-10}, | ||
+ | author = {Guinness}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/UP56JUF3/Camp2019-10329-technopolice_calling_out_so-called_safe_cities.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
|bibtex=@misc{farockiEyeMachine2000, | |bibtex=@misc{farockiEyeMachine2000, | ||
− | + | title = {Eye/Machine}, | |
− | + | url = {https://www.harunfarocki.de/installations/2000s/2000/eye-machine.html}, | |
− | + | author = {Farocki, Harun}, | |
− | + | year = {2000}, | |
− | } | + | } |
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
|bibtex=@misc{farockiEyeMachineII2001, | |bibtex=@misc{farockiEyeMachineII2001, | ||
− | + | title = {Eye/Machine II}, | |
− | + | url = {https://www.harunfarocki.de/installations/2000s/2001/eye-machine-ii.html}, | |
− | + | author = {Farocki, Harun}, | |
− | + | year = {2001}, | |
− | } | + | } |
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
|bibtex=@misc{farockiEyeMachineIII2003, | |bibtex=@misc{farockiEyeMachineIII2003, | ||
− | + | title = {Eye/Machine III}, | |
− | + | url = {https://www.harunfarocki.de/installations/2000s/2003/eye-machine-iii.html}, | |
− | + | author = {Farocki, Harun}, | |
− | + | year = {2003}, | |
− | } | + | } |
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{blockCleaners2018, |
− | + | title = {The Cleaners}, | |
− | + | author = {Block, Hans and Riesewieck, Moritz}, | |
− | + | year = {2018}, | |
− | + | file = {cleaners.jpeg:/home/ruben/Zotero/storage/8EQ7VN96/cleaners.jpeg:image/jpeg}, | |
− | + | } | |
− | + | }} | |
− | + | ||
− | + | {{#scite: | |
− | + | |bibtex=@misc{GoogleWorldBrain2013, | |
− | + | title = {Google \& the world brain}, | |
− | + | year = {2013}, | |
− | + | keywords = {RV-watched}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{levinsonSteelingUrFeelings2019, |
− | + | title = {Steeling Ur Feelings}, | |
− | + | url = {https://stealingurfeelin.gs/}, | |
− | + | author = {Levinson, Noah}, | |
− | + | year = {2019}, | |
− | + | note = {Code at: https://github.com/noahlevenson/stealing-ur-feelings}, | |
− | } | + | keywords = {RV-watched}, |
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{bobkoffYouVeGot2020, |
− | + | title = {You've got Enron Mail}, | |
− | + | url = {https://99percentinvisible.org/episode/youve-got-enron-mail/}, | |
− | + | journal = {99\% Invisible}, | |
− | + | collaborator = {Bobkoff, Dan and Pedulla, Amy and Sigl, Jennifer and Wyman, Sarah}, | |
− | + | month = nov, | |
− | } | + | year = {2020}, |
+ | keywords = {RV-watched}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{kantayyaCodedBias2020, |
− | + | title = {Coded Bias}, | |
− | + | abstract = {CODED BIAS explores the fallout of MIT Media Lab researcher Joy Buolamwini’s startling discovery that facial recognition does not see dark-skinned faces accurately, and her journey to push for the first-ever legislation in the U.S. to govern against bias in the algorithms that impact us all.}, | |
− | + | author = {Kantayya, Shalini}, | |
− | + | year = {2020}, | |
− | + | } | |
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
|bibtex=@article{France.2013, | |bibtex=@article{France.2013, | ||
− | + | title = {Sécurité électronique et cyberguerre}, | |
− | + | author = {France, Radio}, | |
− | + | year = {2013}, | |
− | } | + | } |
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
|bibtex=@article{Free.2012, | |bibtex=@article{Free.2012, | ||
− | + | title = {Religion\_and\_radicalisation.\_Ed\_Hussain\_and\_Mehdi\_Hasan\_discuss\_with\_Iain\_Dale}, | |
− | + | url = {http://lbc.audioagain.com/index.php}, | |
− | + | author = {Free, Iain Dale Bitesize}, | |
− | + | year = {2012}, | |
− | url = {http:// | + | note = {Publisher: LBC Radio}, |
− | } | + | } |
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{Furtado., | ||
+ | title = {Ilha das flores}, | ||
+ | author = {Furtado, Jorge}, | ||
+ | note = {Publisher: Casa de Cinema de Porto Alegre}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{Hammer.2017, | ||
+ | title = {Escape from syria: Rania's odyssey}, | ||
+ | url = {https://www.youtube.com/watch?v=EDHwt-ooAi4}, | ||
+ | author = {Hammer, Anders}, | ||
+ | editor = {Hammer, Anders}, | ||
+ | year = {2017}, | ||
+ | note = {Publisher: The Guardian | ||
+ | tex.address: London}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{Henno.2016, | ||
+ | title = {Koropa}, | ||
+ | author = {Henno, Laura}, | ||
+ | collaborator = {Henno, Laura}, | ||
+ | year = {2016}, | ||
+ | note = {Publisher: Spectre Production}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{Maimbo.2005, | ||
+ | title = {Remittances : development impact and future prospects}, | ||
+ | url = {Input this URL in a browser to get JPEG cover art data. http://firstsearch.oclc.org/WebZ/DCARead?standardNoType=1&standardNo=0821357948:srcdbname=worldcat:fromExternal=true&sessionid=0}, | ||
+ | author = {Maimbo, Samuel Munzele and Ratha, Dilip and {World Bank Group}}, | ||
+ | year = {2005}, | ||
+ | note = {Publisher: World Bank | ||
+ | tex.address: Washington D C}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{Metz.2010, | ||
+ | title = {Armadillo}, | ||
+ | author = {Metz, Janus}, | ||
+ | year = {2010}, | ||
+ | note = {Publisher: Fridthjof Film}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{Mograbi.2008, | ||
+ | title = {Z32}, | ||
+ | author = {Mograbi, Avi}, | ||
+ | collaborator = {Mograbi, Avi}, | ||
+ | year = {2008}, | ||
+ | note = {Publisher: Les Films d'Ici}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{Resnais.1953, | ||
+ | title = {Statues also die}, | ||
+ | author = {Resnais, Alain and Marker, Chris}, | ||
+ | year = {1953}, | ||
+ | note = {Publisher: Présence Africaine}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{Kanagasabapathy.2007, | ||
+ | title = {Post-war identity re-construction in Kilinochchi, Sri Lanka negotiation of gendered identity between the local and diaspora community}, | ||
+ | url = {http://books.google.nl/books?id=U7IpAQAAIAAJ&dq=intitle:Diaspora&hl=&cd=10&source=gbs_api}, | ||
+ | author = {Kanagasabapathy, Manivillie}, | ||
+ | year = {2007}, | ||
+ | note = {Publisher: Library and Archives Canada = Bibliothèque et Archives Canada | ||
+ | tex.address: Ottawa}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{.1983, | ||
+ | title = {Reassemblage: From the firelight to the screen}, | ||
+ | year = {1983}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{Rosi.2016, | ||
+ | title = {Fire at sea (fuocoammare)}, | ||
+ | author = {Rosi, Gianfranco}, | ||
+ | editor = {Rosi, Gianfranco}, | ||
+ | year = {2016}, | ||
+ | note = {Publisher: Stemal Entertainment}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{.2011, | ||
+ | title = {20110401\_Radicalization\_Session5\_128K}, | ||
+ | year = {2011}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{ForensicArchitecture.2011, | ||
+ | title = {Torture in saydnaya prison}, | ||
+ | url = {https://forensic-architecture.org/investigation/saydnaya}, | ||
+ | author = {{Forensic Architecture}}, | ||
+ | collaborator = {{Forensic Architecture}}, | ||
+ | year = {2011}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{.2013, | ||
+ | title = {Wordstat video}, | ||
+ | year = {2013}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{Block.2018, | ||
+ | title = {The cleaners}, | ||
+ | editor = {Block, hans and Riesewieck, Moritz}, | ||
+ | year = {2018}, | ||
+ | note = {Publisher: Gebrueder Beetz Filmproduktion}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{CastaingTaylor.2012, | ||
+ | title = {Leviathan}, | ||
+ | author = {Castaing-Taylor, Lucien and Paravel, Verena}, | ||
+ | collaborator = {Castaing-Taylor, Lucien and Paravel, Verena}, | ||
+ | year = {2012}, | ||
+ | note = {Publisher: Harvard Sensory Lab}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{Asch.1975, | ||
+ | title = {The ax fight}, | ||
+ | author = {Asch, Timothy and Chagnon, Napoleon}, | ||
+ | year = {1975}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{CouncilonForeignRelations.2011b, |
− | + | title = {Radicalisation hearings}, | |
− | + | author = {{Council on Foreign Relations}}, | |
− | + | year = {2011}, | |
− | + | note = {Publisher: Council on Foreign Relations}, | |
− | + | } | |
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{CouncilonForeignRelations.2011, |
− | + | title = {Radicalisation hearings}, | |
− | + | author = {{Council on Foreign Relations}}, | |
− | + | year = {2011}, | |
− | } | + | note = {Publisher: Council on Foreign Relations}, |
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{Curtis.2004, |
− | + | title = {The power of nightmares: The rise of the politics of fear}, | |
− | + | author = {Curtis, Adam}, | |
− | + | collaborator = {Curtis, Adam}, | |
− | + | year = {2004}, | |
− | + | note = {Publisher: British Broadcasting Corporation}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{DerDerian.2010, |
− | + | title = {Human terrain: When war becomes academic (82min)}, | |
− | + | collaborator = {Der Derian, James and Udris, David and Udris, Michael}, | |
− | + | year = {2010}, | |
− | + | note = {Publisher: Udris Film, Global Media Project}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{Derki.2014, |
− | + | title = {Return to homs}, | |
− | + | collaborator = {Derki, Talal}, | |
− | + | year = {2014}, | |
− | + | note = {Publisher: Films Media Group | |
− | + | tex.address: New York}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{Farocki.1988, |
− | + | title = {Images of the World and the Inscription of War}, | |
− | + | author = {Farocki, Harun}, | |
− | + | collaborator = {Farocki, Harun}, | |
− | + | year = {1988}, | |
− | + | note = {Publisher: Harun Farocki Filmproduktion}, | |
− | + | } | |
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{Farocki.20092010, |
− | + | title = {Serious games i-iv}, | |
− | + | author = {Farocki, Harun}, | |
− | + | collaborator = {Farocki, Harun}, | |
− | } | + | year = {2009}, |
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{ForensicArchitecture.2018, |
− | + | title = {Destruction and return in al-Araqib}, | |
− | + | url = {https://forensic-architecture.org/investigation/destruction-and-return-in-al-araqib}, | |
− | + | author = {{Forensic Architecture}}, | |
− | + | editor = {{Forensic Architecture}}, | |
− | + | year = {2018}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{Farocki.2000, |
− | + | title = {Auge/Machine I (Eye/Machine I)}, | |
− | + | author = {Farocki, Harun}, | |
− | + | editor = {Farocki, Harun}, | |
− | + | year = {2000}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{Farocki.20012003, |
− | + | title = {Auge/Machine i-iii (Eye/Machine i-iii)}, | |
− | + | author = {Farocki, Harun}, | |
− | + | editor = {Farocki, Harun}, | |
− | + | year = {2001}, | |
− | + | } | |
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{Rouch.1957, |
− | + | title = {Les maîtres fous (the mad masters)}, | |
− | + | author = {Rouch, Jean}, | |
− | + | collaborator = {Rouch, Jean}, | |
− | + | year = {1957}, | |
− | + | note = {Publisher: Les Films de la Pleiade}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
|bibtex=@article{hallCriticalVisualizationCase2015, | |bibtex=@article{hallCriticalVisualizationCase2015, | ||
− | + | title = {Critical visualization: a case for rethinking how we visualize risk and security}, | |
− | + | volume = {1}, | |
− | + | issn = {2057-2085}, | |
− | + | shorttitle = {Critical visualization}, | |
− | + | url = {https://doi.org/10.1093/cybsec/tyv004}, | |
− | + | doi = {10.1093/cybsec/tyv004}, | |
− | + | abstract = {In an era of high-profile hacks, information leaks and cybercrime, cybersecurity is the focus of much corporate and state-funded research. Data visualization is regarded as an important tool in the detection and prediction of risk and vulnerability in cybersecurity, but discussion tends to remain at the level of the usability of visualization tools and how to reduce the cognitive load on the consumers of the visualizations. This focus is rooted in a desire to simplify the complexity of cybersecurity. This article argues that while usability and simplification are important goals for the designers of visualizations, there is a much wider discussion that needs to take place about the underlying narratives upon which these visualizations are based. The authors take the position that the narratives on which cybersecurity visualizations are based ignore important aspects of cybersecurity and that their visual form causes the producers and users of these visualizations to focus too narrowly on adversarial security issues, ignoring important aspects of social and community-based security. By situating the discussion of security visualization in a larger socio-historical context, the limitations and implications of current ways of seeing risk become more apparent. Cybersecurity might also learn from other disciplines, specifically critiques of artificial intelligence and the discourse and methods of post-war urban planning. In this way, the article follows a humanities tradition of situating the focus of analysis in a broader tradition of scholarship and critiquing current practices from this wider context. The purpose of such critique is to stimulate reflection on underlying principles and the implications of different approaches to operationalizing those principles. Finally, case studies of participatory modelling and crowdsourcing projects are discussed that aim to foster resilience through social and spatial practices. These case studies illustrate the potential for a wider range of visualizations.}, | |
− | + | number = {1}, | |
− | + | urldate = {2021-02-12}, | |
− | + | journal = {Journal of Cybersecurity}, | |
− | + | author = {Hall, Peter and Heath, Claude and Coles-Kemp, Lizzie}, | |
− | + | month = sep, | |
− | + | year = {2015}, | |
− | + | pages = {93--108}, | |
− | } | + | file = {Snapshot:/home/ruben/Zotero/storage/FAYS8WQ9/2366512.html:text/html;Hall et al 2015 - Critical visualization.pdf:/home/ruben/Zotero/storage/LMPJP9Z4/Hall et al 2015 - Critical visualization.pdf:application/pdf}, |
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
|bibtex=@article{hallCriticalVisualizationCase2015a, | |bibtex=@article{hallCriticalVisualizationCase2015a, | ||
− | + | title = {Critical visualization: a case for rethinking how we visualize risk and security}, | |
− | + | volume = {1}, | |
− | + | issn = {2057-2085}, | |
− | + | shorttitle = {Critical visualization}, | |
− | + | url = {https://doi.org/10.1093/cybsec/tyv004}, | |
− | + | doi = {10.1093/cybsec/tyv004}, | |
− | + | abstract = {In an era of high-profile hacks, information leaks and cybercrime, cybersecurity is the focus of much corporate and state-funded research. Data visualization is regarded as an important tool in the detection and prediction of risk and vulnerability in cybersecurity, but discussion tends to remain at the level of the usability of visualization tools and how to reduce the cognitive load on the consumers of the visualizations. This focus is rooted in a desire to simplify the complexity of cybersecurity. This article argues that while usability and simplification are important goals for the designers of visualizations, there is a much wider discussion that needs to take place about the underlying narratives upon which these visualizations are based. The authors take the position that the narratives on which cybersecurity visualizations are based ignore important aspects of cybersecurity and that their visual form causes the producers and users of these visualizations to focus too narrowly on adversarial security issues, ignoring important aspects of social and community-based security. By situating the discussion of security visualization in a larger socio-historical context, the limitations and implications of current ways of seeing risk become more apparent. Cybersecurity might also learn from other disciplines, specifically critiques of artificial intelligence and the discourse and methods of post-war urban planning. In this way, the article follows a humanities tradition of situating the focus of analysis in a broader tradition of scholarship and critiquing current practices from this wider context. The purpose of such critique is to stimulate reflection on underlying principles and the implications of different approaches to operationalizing those principles. Finally, case studies of participatory modelling and crowdsourcing projects are discussed that aim to foster resilience through social and spatial practices. These case studies illustrate the potential for a wider range of visualizations.}, | |
− | + | number = {1}, | |
− | + | urldate = {2021-02-12}, | |
− | + | journal = {Journal of Cybersecurity}, | |
− | + | author = {Hall, Peter and Heath, Claude and Coles-Kemp, Lizzie}, | |
− | + | month = sep, | |
− | + | year = {2015}, | |
− | + | pages = {93--108}, | |
− | } | + | file = {Snapshot:/home/ruben/Zotero/storage/ZAL2XNZG/2366512.html:text/html;Hall et al 2015 - Critical visualization.pdf:/home/ruben/Zotero/storage/JXXLSMP5/Hall et al 2015 - Critical visualization.pdf:application/pdf}, |
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{kublerStateUrgencySurveillance2017, | ||
+ | title = {State of urgency: Surveillance, power, and algorithms in France’s state of emergency}, | ||
+ | volume = {4}, | ||
+ | issn = {2053-9517}, | ||
+ | shorttitle = {State of urgency}, | ||
+ | url = {https://doi.org/10.1177/2053951717736338}, | ||
+ | doi = {10.1177/2053951717736338}, | ||
+ | abstract = {The recent terrorist attacks and ongoing state of emergency in France have brought questions of police surveillance into the public spotlight, making it increasingly important to understand how police attain data from citizens. Since 2005, the French police have been using IBM’s computer program, i2 Analyst’s Notebook, to aggregate information and craft criminal narratives. This technology serves to quickly connect suspects with crimes, looking for as many associations as possible, ranking and visualizing them based on level of importance. Recently, surveillance and state power have been theorized as having shifted to a posthegemonic, order. Drawing from literature on power, surveillance, and identity, this paper considers the various ways that algorithms can impact policing under a state of emergency by comparing the technical protocol of i2 Analyst’s Notebook with the administrative protocol of the French state. Using i2 Analyst’s Notebook as an example, this paper argues that posthegemonic theories of power have their place in determining how algorithms can be used for surveillance, but that they cannot completely explain their use under the state of emergency.}, | ||
+ | language = {en}, | ||
+ | number = {2}, | ||
+ | urldate = {2021-02-12}, | ||
+ | journal = {Big Data \& Society}, | ||
+ | author = {Kubler, Kyle}, | ||
+ | month = dec, | ||
+ | year = {2017}, | ||
+ | note = {Publisher: SAGE Publications Ltd}, | ||
+ | keywords = {Surveillance, algorithm, France, i2 Analyst’s Notebook, police, state of emergency}, | ||
+ | pages = {2053951717736338}, | ||
+ | file = {Kubler 2017 - State of urgency.pdf:/home/ruben/Zotero/storage/SFJRVGCA/Kubler 2017 - State of urgency.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{axonDataPresentationSecurity2020, | ||
+ | title = {Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice}, | ||
+ | volume = {6}, | ||
+ | issn = {2057-2085, 2057-2093}, | ||
+ | shorttitle = {Data presentation in security operations centres}, | ||
+ | url = {https://academic.oup.com/cybersecurity/article/doi/10.1093/cybsec/tyaa004/5766338}, | ||
+ | doi = {10.1093/cybsec/tyaa004}, | ||
+ | abstract = {Security practitioners working in Security Operations Centres (SOCs) are responsible for detecting and mitigating malicious computer network activity. This work requires both automated tools that detect and prevent attacks, and data presentation tools that can present pertinent network security monitoring information to practitioners in an efficient and comprehensible manner. In recent years, advances have been made in the development of visual approaches to data presentation, with some uptake of advanced security visualization tools in SOCs. Sonification in which data are represented as sound, is said to have potential as an approach that could work alongside existing visual data presentation approaches to address some of the unique challenges faced by SOCs. For example, sonification has been shown to enable peripheral monitoring of processes, which could aid practitioners multitasking in busy SOCs. The perspectives of security practitioners on incorporating sonification into their actual working environments have not yet been examined, however. The aim of this article, therefore, is to address this gap by exploring attitudes to using sonification in SOCs and by identifying the data presentation approaches currently used. We report on the results of a study consisting of an online survey (N ¼ 20) and interviews (N ¼ 21) with security practitioners working in a range of different SOCs. Our contributions are (i) a refined appreciation of the contexts in which sonification could aid in SOC working practice, (ii) an understanding of the areas in which sonification may not be beneficial or may even be problematic, (iii) an analysis of the critical requirements for the design of sonification systems and their integration into the SOC setting and (iv) evidence of the visual data presentation techniques currently used and identification of how sonification might work alongside and address challenges to using them. Our findings clarify insights into the potential benefits and challenges of introducing sonification to support work in this vital security monitoring environment. Participants saw potential value in using sonification systems to aid in anomaly detection tasks in SOCs (such as retrospective hunting), as well as in situations in which peripheral monitoring is desirable: while multitasking with multiple work tasks, or while outside of the SOC.}, | ||
+ | language = {en}, | ||
+ | number = {1}, | ||
+ | urldate = {2021-02-12}, | ||
+ | journal = {Journal of Cybersecurity}, | ||
+ | author = {Axon, Louise and AlAhmadi, Bushra A and Nurse, Jason R C and Goldsmith, Michael and Creese, Sadie}, | ||
+ | month = jan, | ||
+ | year = {2020}, | ||
+ | pages = {tyaa004}, | ||
+ | file = {Axon et al. - 2020 - Data presentation in security operations centres .pdf:/home/ruben/Zotero/storage/XYHK8LTE/Axon et al. - 2020 - Data presentation in security operations centres .pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{andersen002AestheticsNew, | ||
+ | title = {002: Aesthetics of New AI Interfaces}, | ||
+ | language = {en}, | ||
+ | author = {Andersen, Christian Ulrik and Pold, Søren and Cameron, Agnes}, | ||
+ | pages = {71}, | ||
+ | file = {Andersen et al. - 002 Aesthetics of New AI Interfaces.pdf:/home/ruben/Zotero/storage/I5I6SB39/Andersen et al. - 002 Aesthetics of New AI Interfaces.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{AestheticsNewAI, | ||
+ | title = {Aesthetics of New AI Interfaces—Panel Discussion}, | ||
+ | url = {https://www.serpentinegalleries.org/whats-on/aesthetics-of-new-ai-interfaces-panel-discussion/}, | ||
+ | abstract = {A panel discussion on machine learning and its art-making interfaces with Christian Ulrik Andersen, Agnes Cameron and Rebecca Fiebrink}, | ||
+ | language = {en-GB}, | ||
+ | urldate = {2021-02-15}, | ||
+ | journal = {Serpentine Galleries}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/CDNDBQI2/aesthetics-of-new-ai-interfaces-panel-discussion.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{adornettoturnerRemembering2020, | ||
+ | title = {Remembering Beyond}, | ||
+ | publisher = {RAI film festival}, | ||
+ | author = {{Adornetto, Turner}}, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{scheitonjehessenIHuman2019, | ||
+ | title = {iHuman}, | ||
+ | url = {https://www.idfa.nl/en/film/456c752f-1791-45f7-af7f-47abd9c4361f/ihuman}, | ||
+ | author = {{Schei, Tonje Hessen}}, | ||
+ | year = {2019}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{mbakamrosine;yameogoeleonore;andvan.dienderenanlastPrisme2021, | ||
+ | title = {Prisme}, | ||
+ | url = {https://whttps://www.anvandienderen.net/prism-2019/ww.anvandienderen.net/lili/}, | ||
+ | author = {{Mbakam, Rosine; Yameogo, Eléonore; and van. Dienderen, An (last)}}, | ||
+ | year = {2021}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{van.dienderenanlastLili2015, | ||
+ | title = {Lili}, | ||
+ | url = {https://www.anvandienderen.net/lili/}, | ||
+ | author = {{van. Dienderen, An (last)}}, | ||
+ | year = {2015}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{fishadamlastInternet2018, | ||
+ | title = {The Internet}, | ||
+ | url = {https://screenworks.org.uk/archive/digital-ecologies-and-the-anthropocene/points-of-presence}, | ||
+ | author = {{Fish, Adam (last)}}, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@techreport{garviePerpetualLineUpUnregulated2016, | ||
+ | title = {The Perpetual Line-Up: Unregulated Police Face Recognition in America}, | ||
+ | url = {https://www.perpetuallineup.org/}, | ||
+ | abstract = {One of two American adults is in a law enforcement face recognition database. An investigation.}, | ||
+ | language = {en}, | ||
+ | urldate = {2021-02-16}, | ||
+ | institution = {Georgetown Law, Center on Privacy \& Technology}, | ||
+ | author = {Garvie, Clare and Bedoya, Alvaro M. and Frankle, Jonathan}, | ||
+ | month = oct, | ||
+ | year = {2016}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/WGZCP6QH/www.perpetuallineup.org.html:text/html;Garvie et al. - UNREGULATED POLICE FACE RECOGNITION IN AMERICA.pdf:/home/ruben/Zotero/storage/3CTC5UG2/Garvie et al. - UNREGULATED POLICE FACE RECOGNITION IN AMERICA.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{garvieUNREGULATEDPOLICEFACE, | ||
+ | title = {UNREGULATED POLICE FACE RECOGNITION IN AMERICA}, | ||
+ | language = {en}, | ||
+ | author = {Garvie, Clare and Bedoya, Alvaro M and Frankle, Jonathan and Daugherty, Moriah and Evans, Katie and George, Edward J and McCubbin, Sabrina and Rudolph, Harrison and Ullman, Ilana and Ainsworth, Sara and Houck, David and Iorio, Megan and Kahn, Matthew and Olson, Eric and Petenko, Jaime and Singleton, Kelly}, | ||
+ | pages = {151}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@incollection{mcmasterTechnologyTransferDiffusion1997, | ||
+ | address = {Boston, MA}, | ||
+ | series = {IFIP Advances in Information and Communication Technology}, | ||
+ | title = {Technology transfer: diffusion or translation?}, | ||
+ | isbn = {978-0-387-35092-9}, | ||
+ | shorttitle = {Technology transfer}, | ||
+ | url = {https://doi.org/10.1007/978-0-387-35092-9_4}, | ||
+ | abstract = {There can be little doubt that over the last three decades diffusion theory has had a major impact on a large number of disciplines. However diffusion theory is but one way of thinking about ‘technology transfer’, and here we present an alternative view — namely the notion of translation embodied in actor-network theory (ANT). We believe ANT offers ways of thinking about transfer problems that diffusion metaphors fail to adequately address. Using a retrospective analysis of a case study, we examine and contrast key concepts of these two approaches to technology transfer.}, | ||
+ | language = {en}, | ||
+ | urldate = {2021-02-16}, | ||
+ | booktitle = {Facilitating Technology Transfer through Partnership: Learning from practice and research}, | ||
+ | publisher = {Springer US}, | ||
+ | author = {McMaster, Tom and Vidgen, R. T. and Wastell, D. G.}, | ||
+ | editor = {McMaster, Tom and Mumford, Enid and Swanson, E. Burton and Warboys, Brian and Wastell, David}, | ||
+ | year = {1997}, | ||
+ | doi = {10.1007/978-0-387-35092-9_4}, | ||
+ | keywords = {Actor-network theory, Diffusion theory, Technology transfer, Translation}, | ||
+ | pages = {64--75}, | ||
+ | file = {McMaster et al 1997 - Technology transfer.pdf:/home/ruben/Zotero/storage/EMTBY9E3/McMaster et al 1997 - Technology transfer.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{QuestioningSecurityDevices, | ||
+ | title = {Questioning security devices: Performativity, resistance, politics - Anthony Amicelle, Claudia Aradau, Julien Jeandesboz, 2015}, | ||
+ | url = {https://journals.sagepub.com/doi/10.1177/0967010615586964}, | ||
+ | urldate = {2021-02-16}, | ||
+ | file = {Questioning security devices\: Performativity, resistance, politics - Anthony Amicelle, Claudia Aradau, Julien Jeandesboz, 2015:/home/ruben/Zotero/storage/ZC6BICQL/0967010615586964.html:text/html}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{bigoGlobalizedSecurityField2006, | ||
+ | title = {Globalized (in)Security: the Field and the Ban-opticon}, | ||
+ | volume = {4}, | ||
+ | language = {en}, | ||
+ | journal = {Traces: A Multilingual Journal of Cultural Theory}, | ||
+ | author = {Bigo, Didier}, | ||
+ | year = {2006}, | ||
+ | pages = {109--157}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{didierbigoSecurityExceptionBan, | ||
+ | title = {Security, exception, ban and surveillance}, | ||
+ | language = {en}, | ||
+ | author = {{Didier Bigo}}, | ||
+ | pages = {46--68}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{waltersDroneStrikesDingpolitik2014, | ||
+ | title = {Drone strikes, dingpolitik and beyond: Furthering the debate on materiality and security}, | ||
+ | volume = {45}, | ||
+ | issn = {0967-0106}, | ||
+ | doi = {10.1177/0967010613519162}, | ||
+ | language = {en}, | ||
+ | number = {2}, | ||
+ | journal = {Security Dialogue}, | ||
+ | author = {Walters, W.}, | ||
+ | year = {2014}, | ||
+ | pages = {101--118}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{foucaultDisciplinePunishBirth1975, | ||
+ | address = {New York}, | ||
+ | title = {Discipline \& Punish: The Birth of the Prison (Vintage)}, | ||
+ | language = {en}, | ||
+ | publisher = {Vintage Books}, | ||
+ | author = {Foucault, Michel}, | ||
+ | year = {1975}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{foucaultFoucaultReader1984, | ||
+ | address = {New York}, | ||
+ | edition = {1st ed}, | ||
+ | title = {The Foucault reader}, | ||
+ | isbn = {0-394-52904-9}, | ||
+ | abstract = {Michael Foucault's writing has shaped the teaching of half a dozen disciplines, ranging from literary criticism to the history of criminology. But none of his books offers a satisfactory introduction to the entire complex body of his work. The Foucault Reader precisely serves that purpose. It contains selections from each area of Foucault's thought, a wealth of previously unpublished writings, and an interview with Foucault during which he discusses his philosophy with unprecedented candor.}, | ||
+ | language = {en}, | ||
+ | publisher = {Pantheon Books}, | ||
+ | author = {Foucault, Michel and Rabinow, Paul}, | ||
+ | year = {1984}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{margareta.paternekNormsNormalizationMichel1987, | ||
+ | title = {Norms and normalization: Michel Foucault's overextended panoptic machine}, | ||
+ | language = {en}, | ||
+ | author = {{Margaret A. Paternek}}, | ||
+ | year = {1987}, | ||
+ | note = {Place: Netherlands | ||
+ | Publisher: Martinus Nijhoff Publishers}, | ||
+ | pages = {98--121}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{neilbrennerFoucaultNewFunctionalism1994, | ||
+ | title = {Foucault's new functionalism}, | ||
+ | language = {en}, | ||
+ | author = {{Neil Brenner}}, | ||
+ | year = {1994}, | ||
+ | pages = {680--709}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{bigoExceptionBanPropos2006, | ||
+ | title = {Exception et ban : à propos de l' « état d'exception »}, | ||
+ | language = {da}, | ||
+ | author = {Bigo, Didier}, | ||
+ | year = {2006}, | ||
+ | pages = {1--20}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{orlikowskiUsingTechnologyConstituting2007, | ||
+ | title = {Using Technology and Constituting Structures A Practice Lens for Studying Technologyin Organizations}, | ||
+ | language = {en}, | ||
+ | author = {Orlikowski, Wanda}, | ||
+ | year = {2007}, | ||
+ | pages = {404--428}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{neilbrennerGlobalisationReterritorialisationRescaling1998, | ||
+ | title = {Globalisation as Reterritorialisation: The Re-scaling of Urban Governance in the European Union}, | ||
+ | language = {en}, | ||
+ | journal = {Urban Studies}, | ||
+ | author = {{Neil Brenner}}, | ||
+ | year = {1998}, | ||
+ | pages = {431--451}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{neilbrennerBrennerTheodore20022002, | ||
+ | title = {Brenner and Theodore 2002 - Cities and the Geographies of “Actually Existing Neoliberalism”}, | ||
+ | language = {en}, | ||
+ | journal = {The Urbanization of Neoberalism}, | ||
+ | author = {{Neil Brenner} and {Nik Theodore}}, | ||
+ | year = {2002}, | ||
+ | pages = {349--379}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{foucaultDITSECRITS195419881954, | ||
+ | title = {DITS ET ÉCRITS 1954-1988 I 1954-1969}, | ||
+ | language = {da}, | ||
+ | author = {Foucault, Michel}, | ||
+ | year = {1954}, | ||
+ | pages = {65--846}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{foucaultDITSECRITS195419881970, | ||
+ | title = {DITS ET ÉCRITS 1954-1988 II 1970-1975}, | ||
+ | language = {da}, | ||
+ | author = {Foucault, Michel}, | ||
+ | year = {1970}, | ||
+ | pages = {7--828}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{orlikowskiGenreRepertoireStructuring1994, | ||
+ | title = {Genre Repertoire: The Structuring of Communicative Practices in Organizations}, | ||
+ | language = {en}, | ||
+ | author = {Orlikowski, Wanda and {JoAnne Yates}}, | ||
+ | year = {1994}, | ||
+ | pages = {541--574}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{howesExpandingFieldSensory2013, | ||
+ | title = {The Expanding Field of Sensory Studies – Sensory Studies}, | ||
+ | url = {https://www.instapaper.com/read/737592347}, | ||
+ | abstract = {A simple tool for saving web pages to read later on your iPhone, iPad, Android, computer, or Kindle.}, | ||
+ | author = {Howes, David}, | ||
+ | year = {2013}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{maillotpEcritureCinematographiqueSociologie, | ||
+ | title = {L’écriture cinématographique de la sociologie filmique. Comment penser en sociologue avec une caméra}, | ||
+ | author = {{Maillot P}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{neilbrennerHenriLefebvreState2009, | ||
+ | title = {Henri Lefebvre on State, Space, Territory}, | ||
+ | issn = {17495679}, | ||
+ | language = {en}, | ||
+ | journal = {International Political Sociology}, | ||
+ | author = {{Neil Brenner} and {Stuart Elden}}, | ||
+ | year = {2009}, | ||
+ | pages = {353--377}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{pinkDoingSensoryEthnography2009, | ||
+ | address = {London}, | ||
+ | title = {Doing sensory ethnography}, | ||
+ | isbn = {978-1-4129-4803-6}, | ||
+ | publisher = {Sage Publications}, | ||
+ | editor = {Pink, Sarah}, | ||
+ | year = {2009}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ogradyDataInterfaceSecurity2015, | ||
+ | title = {Data, interface, security}, | ||
+ | volume = {64}, | ||
+ | issn = {00167185}, | ||
+ | url = {http://ac.els-cdn.com/S0016718515001645/1-s2.0-S0016718515001645-main.pdf?_tid=01711274-efb1-11e6-867e-00000aab0f6c&acdnat=1486745599_ed7d2b2708f72fae06c09be50d5e89b9}, | ||
+ | doi = {10.1016/j.geoforum.2015.06.015}, | ||
+ | journal = {Geoforum}, | ||
+ | author = {O’Grady, Nathaniel}, | ||
+ | year = {2015}, | ||
+ | pages = {130--137}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{amielEsthetiqueMontage2017, | ||
+ | address = {Hauts-de-Seine; Hauts-de-Seine}, | ||
+ | edition = {4e édition, revue et augmentée}, | ||
+ | title = {Esthétique du montage}, | ||
+ | isbn = {2-200-61983-9}, | ||
+ | publisher = {Armand Colin}, | ||
+ | author = {Amiel, Vincent}, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{beckerVisualSociologyDocumentary1995, | ||
+ | title = {Visual sociology, documentary photography, and photojournalism}, | ||
+ | volume = {10}, | ||
+ | issn = {1067-1684}, | ||
+ | doi = {10.1080/14725869508583745}, | ||
+ | number = {1-2}, | ||
+ | journal = {Visual Sociology}, | ||
+ | author = {Becker, Howard Saul}, | ||
+ | year = {1995}, | ||
+ | pages = {5--14}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{macdougallCorporealImage2006, | ||
+ | address = {Princeton}, | ||
+ | title = {The Corporeal Image}, | ||
+ | publisher = {Princeton University Press}, | ||
+ | author = {MacDougall, David}, | ||
+ | year = {2006}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{InternationalEncyclopediaSocial2015, | ||
+ | title = {International Encyclopedia of the Social \& Behavioral Sciences}, | ||
+ | isbn = {978-0-08-097087-5}, | ||
+ | publisher = {Elsevier}, | ||
+ | year = {2015}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{bloemheuvelFoundFootage2012, | ||
+ | address = {EYE Film Institute Netherlands}, | ||
+ | title = {Found Footage}, | ||
+ | publisher = {Amsterdam University Press}, | ||
+ | editor = {Bloemheuvel, Marente and Fossati, Giovanna and Guldemond, Jaap}, | ||
+ | year = {2012}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{MicrosoftWordMurch, | ||
+ | title = {Microsoft Word - Murch- The Dancing Shaddow.docx}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{icdefInternationalCentreDocumentary, | ||
+ | title = {International Centre for Documentary and Experimental Film}, | ||
+ | author = {{Icdef}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{pinkImagesSensesApplications2011, | ||
+ | title = {Images, Senses and Applications}, | ||
+ | volume = {24}, | ||
+ | issn = {0894-9468}, | ||
+ | doi = {10.1080/08949468.2011.604611}, | ||
+ | number = {5}, | ||
+ | journal = {Visual Anthropology}, | ||
+ | author = {Pink, Sarah}, | ||
+ | year = {2011}, | ||
+ | pages = {437--454}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{chionAudiovisionSoundScreen1994, | ||
+ | address = {New York; Chichester}, | ||
+ | title = {Audio-vision. Sound on Screen}, | ||
+ | isbn = {0-231-07898-6}, | ||
+ | language = {eng fre}, | ||
+ | publisher = {Columbia University Press}, | ||
+ | author = {Chion, Michel}, | ||
+ | year = {1994}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{baymanPopularItalianCinema2013, | ||
+ | title = {Popular Italian Cinema}, | ||
+ | editor = {Bayman, Louis and Rigoletto, Sergio}, | ||
+ | year = {2013}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{hockingsWhereTheoryVisual2014, | ||
+ | title = {Where Is the Theory in Visual Anthropology?}, | ||
+ | volume = {27}, | ||
+ | issn = {0894-9468}, | ||
+ | doi = {10.1080/08949468.2014.950155}, | ||
+ | number = {5}, | ||
+ | journal = {Visual Anthropology}, | ||
+ | author = {Hockings, Paul and Tomaselli, Keyan G. and Ruby, Jay and MacDougall, David and Williams, Drid and Piette, Albert and Schwarz, Maureen T. and Carta, Silvio}, | ||
+ | year = {2014}, | ||
+ | pages = {436--456}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{halpernPerceptualMachinesCommunication2013, | ||
+ | title = {Perceptual Machines: Communication, Archiving, and Vision in Post-War American Design}, | ||
+ | volume = {11}, | ||
+ | issn = {1470-4129}, | ||
+ | doi = {10.1177/1470412912455619}, | ||
+ | number = {3}, | ||
+ | journal = {Journal of Visual Culture}, | ||
+ | author = {Halpern, Orit}, | ||
+ | year = {2013}, | ||
+ | pages = {328--351}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{macdougallEthnographicFilmFailure1978, | ||
+ | title = {Ethnographic Film: Failure and Promise}, | ||
+ | volume = {7}, | ||
+ | journal = {Annual Review of Anthropology}, | ||
+ | author = {MacDougall, David}, | ||
+ | year = {1978}, | ||
+ | pages = {405--425}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@incollection{minh-haTotalizingQuestMeaning2012, | ||
+ | address = {New York; London}, | ||
+ | series = {AFI film readers}, | ||
+ | title = {The Totalizing Quest of Meaning}, | ||
+ | isbn = {0-415-90381-5}, | ||
+ | booktitle = {Theorizing documentary}, | ||
+ | publisher = {Routledge}, | ||
+ | author = {Minh-ha, Trinh T}, | ||
+ | editor = {Renov, Michael}, | ||
+ | year = {2012}, | ||
+ | pages = {90--107}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{heuschCinemaSocialScience1988, | ||
+ | title = {The cinema and social science}, | ||
+ | volume = {1}, | ||
+ | issn = {0894-9468}, | ||
+ | doi = {10.1080/08949468.1988.9966467}, | ||
+ | number = {2}, | ||
+ | journal = {Visual Anthropology}, | ||
+ | author = {Heusch, Luc}, | ||
+ | year = {1988}, | ||
+ | pages = {99--156}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{motasantosCameraTendsLie2015, | ||
+ | title = {“The camera tends to lie and the audience tends to believe”. Some implications of the use of film in ethnographic research: the case of the European research project TRESEGY}, | ||
+ | volume = {13}, | ||
+ | journal = {Antropologicas}, | ||
+ | author = {Mota Santos, Paula and Alzetta, Roberto}, | ||
+ | year = {2015}, | ||
+ | pages = {17--22}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{malitskyScienceDocumentaryUnity2013, | ||
+ | title = {Science and Documentary: Unity, Indexicality, Reality}, | ||
+ | volume = {11}, | ||
+ | issn = {1470-4129}, | ||
+ | doi = {10.1177/1470412912455615}, | ||
+ | number = {3}, | ||
+ | journal = {Journal of Visual Culture}, | ||
+ | author = {Malitsky, Joshua}, | ||
+ | year = {2013}, | ||
+ | pages = {237--257}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{voltzenlogelHarunFarocki194420142014, | ||
+ | title = {Harun Farocki (1944-2014), or Dialectics in Images}, | ||
+ | author = {Voltzenlogel, Thomas}, | ||
+ | year = {2014}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{pauwelsVisualSociologyReframed2010, | ||
+ | title = {Visual Sociology Reframed}, | ||
+ | volume = {38}, | ||
+ | issn = {0049-1241}, | ||
+ | doi = {10.1177/0049124110366233}, | ||
+ | number = {4}, | ||
+ | journal = {Sociological Methods \& Research}, | ||
+ | author = {Pauwels, Luc}, | ||
+ | year = {2010}, | ||
+ | pages = {545--581}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{roseVisualMethodologiesIntroduction2001, | ||
+ | address = {London; Thousand Oaks CA; New Dehli}, | ||
+ | title = {Visual Methodologies. An Introduction to the Interpretation of Visual Materials}, | ||
+ | publisher = {Sage Publications}, | ||
+ | author = {Rose, Gillian}, | ||
+ | year = {2001}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{savageEthnographyFilmicPlaces2012, | ||
+ | title = {Towards the Ethnography of Filmic Places. Video-based Research and Found Footage Filmmaking in the Anthropological Investigation of Mexican Migrant Event Video}, | ||
+ | author = {Savage, Rebecca}, | ||
+ | year = {2012}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{wikipediaIndexicality, | ||
+ | title = {Indexicality}, | ||
+ | author = {{Wikipedia}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{taylorIconophobia1996, | ||
+ | title = {Iconophobia}, | ||
+ | volume = {69}, | ||
+ | journal = {Transition}, | ||
+ | author = {Taylor, Lucien}, | ||
+ | year = {1996}, | ||
+ | pages = {64--88}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@incollection{lindstromCargoCults2015, | ||
+ | title = {Cargo Cults}, | ||
+ | isbn = {978-0-08-097087-5}, | ||
+ | booktitle = {International Encyclopedia of the Social \& Behavioral Sciences}, | ||
+ | publisher = {Elsevier}, | ||
+ | author = {Lindstrom, Lamont}, | ||
+ | year = {2015}, | ||
+ | doi = {10.1016/B978-0-08-097086-8.12029-X}, | ||
+ | pages = {139--144}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{mizutalippitTrinhMinhhaWhen1999, | ||
+ | title = {Trinh T. Minh-ha. When the Eye Frames Red (Interview)}, | ||
+ | number = {28}, | ||
+ | journal = {InterCommunication}, | ||
+ | author = {Mizuta Lippit, Akira}, | ||
+ | year = {1999}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{schoppingAudioVisualDisembodiedVoices, | ||
+ | title = {Audio-Visual: Disembodied Voices in Theory}, | ||
+ | author = {Schöpping, Michel}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{obristConversationAdamCurtis, | ||
+ | title = {In Conversation with Adam Curtis, Part I}, | ||
+ | author = {Obrist, Hans Ulrich}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{pringleDocumentaryAnimismMaterial2015, | ||
+ | title = {Documentary Animism: Material Politics and Sensory Ethics in The Act of Killing (2012)}, | ||
+ | journal = {Journal of Film and Video}, | ||
+ | author = {Pringle, Thomas Patrick}, | ||
+ | year = {2015}, | ||
+ | pages = {673--674}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@phdthesis{vanlanckerExperiencingCultures2012, | ||
+ | address = {Gent (Belgium)}, | ||
+ | type = {Ph.D. Thesis}, | ||
+ | title = {Experiencing Cultures}, | ||
+ | school = {Hogeschool Gent,}, | ||
+ | author = {van Lancker, Laurent}, | ||
+ | year = {2012}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{minh-haWhenMoonWaxes1991, | ||
+ | address = {London; New York}, | ||
+ | title = {When the Moon Waxes Red}, | ||
+ | publisher = {Routedge}, | ||
+ | author = {Minh-ha, Trinh T}, | ||
+ | year = {1991}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{bleikerPluralistMethodsVisual2015, | ||
+ | title = {Pluralist Methods for Visual Global Politics}, | ||
+ | volume = {43}, | ||
+ | number = {3}, | ||
+ | journal = {Millennium}, | ||
+ | author = {Bleiker, Roland}, | ||
+ | year = {2015}, | ||
+ | pages = {872--890}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{callahanVisualTurnIR2015, | ||
+ | title = {The visual turn in IR: documentary filmmaking as a critical method}, | ||
+ | volume = {43}, | ||
+ | number = {3}, | ||
+ | journal = {Millennium}, | ||
+ | author = {Callahan, William A.}, | ||
+ | year = {2015}, | ||
+ | pages = {891--910}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{glazzardLosingPlotNarrative2017, | ||
+ | title = {Losing the Plot: Narrative, Counter-Narrative and Violent Extremism}, | ||
+ | author = {Glazzard, Andrew}, | ||
+ | year = {2017}, | ||
+ | note = {Place: The Hague | ||
+ | Publisher: International Centre for Counter-Terrorism - The Hague}, | ||
+ | pages = {21}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{martinielloVisualSociologyApproaches2017, | ||
+ | title = {Visual sociology approaches in migration, ethnic and racial studies}, | ||
+ | volume = {40}, | ||
+ | issn = {0141-9870}, | ||
+ | doi = {10.1080/01419870.2017.1295163}, | ||
+ | number = {8}, | ||
+ | journal = {Ethnic and Racial Studies}, | ||
+ | author = {Martiniello, Marco}, | ||
+ | year = {2017}, | ||
+ | pages = {1184--1190}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{shapiroStudiesTransDisciplinaryMethod2013, | ||
+ | title = {Studies in Trans-Disciplinary Method: After the Aesthetic Turn (Interventions)}, | ||
+ | author = {Shapiro, Michael J.}, | ||
+ | year = {2013}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{bleikerSearchThinkingSpace, | ||
+ | title = {In Search of Thinking Space: Reflections on the Aesthetic Turn in International Political Theory}, | ||
+ | author = {Bleiker, Roland}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{isrDiscourseEmotionsInternational2017, | ||
+ | title = {Discourse and Emotions in International Relations}, | ||
+ | journal = {International Studies Review}, | ||
+ | author = {{Isr}}, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{bleikerVisualAssemblages, | ||
+ | title = {Visual Assemblages}, | ||
+ | author = {Bleiker, Roland}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{shimVisualPoliticsNorth2014, | ||
+ | title = {Visual Politics and North Korea}, | ||
+ | isbn = {978-0-203-74647-9}, | ||
+ | publisher = {Routledge}, | ||
+ | author = {Shim, David}, | ||
+ | year = {2014}, | ||
+ | doi = {10.4324/9780203746479}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{whiteHowReadBarthes2015, | ||
+ | title = {How to Read Barthes' Image-Music-Text}, | ||
+ | isbn = {978-1-84964-722-9}, | ||
+ | publisher = {Pluto Press}, | ||
+ | author = {White, Ed}, | ||
+ | year = {2015}, | ||
+ | doi = {10.2307/j.ctt183p71d}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{hallAffectivePolitics112015, | ||
+ | title = {Affective politics after 9/11}, | ||
+ | journal = {International Organization}, | ||
+ | author = {Hall, T. H. and Ross, A. A.G.}, | ||
+ | year = {2015}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{tomasVertovSnowFarocki2015, | ||
+ | address = {New York}, | ||
+ | title = {Vertov, Snow, Farocki}, | ||
+ | isbn = {978-1-4411-6393-6}, | ||
+ | publisher = {Bloomsbury Academic}, | ||
+ | author = {Tomas, David}, | ||
+ | year = {2015}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{hansenTheorizingImageSecurity2011, | ||
+ | title = {Theorizing the Image for Security Studies:Visual Securitization and the Muhammad Cartoon Crisis}, | ||
+ | volume = {17}, | ||
+ | issn = {1354-0661}, | ||
+ | language = {English}, | ||
+ | number = {1}, | ||
+ | journal = {European Journal of International Relations}, | ||
+ | author = {Hansen, Lene}, | ||
+ | year = {2011}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{borgdorffDebateResearchArts2004, | ||
+ | title = {The debate on research in the arts}, | ||
+ | author = {Borgdorff, Henk}, | ||
+ | year = {2004}, | ||
+ | pages = {22}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{silvermanSpeakingGodard1999, | ||
+ | title = {Speaking about Godard}, | ||
+ | volume = {37}, | ||
+ | issn = {0009-4978}, | ||
+ | doi = {10.5860/CHOICE.37-0206}, | ||
+ | number = {01}, | ||
+ | journal = {Choice Reviews Online}, | ||
+ | author = {Silverman, Kaja and Farocki, Harun}, | ||
+ | year = {1999}, | ||
+ | pages = {37--0206--37--0206}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{elkinsTheorizingVisualStudies2013, | ||
+ | address = {New York}, | ||
+ | title = {Theorizing visual studies}, | ||
+ | isbn = {0-203-12113-9}, | ||
+ | publisher = {Routledge}, | ||
+ | author = {Elkins, James}, | ||
+ | year = {2013}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{andersenRemediatingSecurity2015, | ||
+ | address = {Kbh.}, | ||
+ | edition = {1. oplag}, | ||
+ | series = {Ph.d.-serien / Københavns Universitet, Institut for Statskundskab}, | ||
+ | title = {Remediating security}, | ||
+ | volume = {2015/1}, | ||
+ | isbn = {87-7393-744-4}, | ||
+ | publisher = {Københavns Universitet, Institut for Statskundskab}, | ||
+ | author = {Andersen, Rune Saugmann}, | ||
+ | year = {2015}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{chandlerWorldCausationBig2015, | ||
+ | title = {A World without Causation: Big Data and the Coming of Age of Posthumanism}, | ||
+ | volume = {43}, | ||
+ | issn = {0305-8298}, | ||
+ | doi = {10.1177/0305829815576817}, | ||
+ | number = {3}, | ||
+ | journal = {Millennium: Journal of International Studies}, | ||
+ | author = {Chandler, David}, | ||
+ | year = {2015}, | ||
+ | pages = {833--851}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{barabantsevaEncounteringVulnerabilitiesFilmmaking2015, | ||
+ | title = {Encountering Vulnerabilities through ‘Filmmaking for Fieldwork’}, | ||
+ | volume = {43}, | ||
+ | issn = {0305-8298}, | ||
+ | doi = {10.1177/0305829815583083}, | ||
+ | number = {3}, | ||
+ | journal = {Millennium: Journal of International Studies}, | ||
+ | author = {Barabantseva, Elena and Lawrence, Andy}, | ||
+ | year = {2015}, | ||
+ | pages = {911--930}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{grimshawEthnographicTurnCritical2015, | ||
+ | title = {The ethnographic turn - and after: a critical approach towards the realignment of art and anthropology}, | ||
+ | volume = {23}, | ||
+ | issn = {09640282}, | ||
+ | doi = {10.1111/1469-8676.12218}, | ||
+ | number = {4}, | ||
+ | journal = {Social Anthropology}, | ||
+ | author = {Grimshaw, Anna and Ravetz, Amanda}, | ||
+ | year = {2015}, | ||
+ | pages = {418--434}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ruppertDataPolitics2017b, | ||
+ | title = {Data politics}, | ||
+ | volume = {4}, | ||
+ | issn = {2053-9517}, | ||
+ | doi = {10.1177/2053951717717749}, | ||
+ | number = {2}, | ||
+ | journal = {Big Data \& Society}, | ||
+ | author = {Ruppert, Evelyn and Isin, Engin and Bigo, Didier}, | ||
+ | year = {2017}, | ||
+ | pages = {205395171771774}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{jamesPauloVirilio2007, | ||
+ | title = {Paulo Virilio}, | ||
+ | abstract = {Humanities}, | ||
+ | author = {James, Ian}, | ||
+ | year = {2007}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{markmaguireAnthropologySecurityPerspectives, | ||
+ | title = {The Anthropology of Security: Perspectives From the Frontline of Policing, Counter-terrorism and Border Control}, | ||
+ | author = {Mark Maguire, Nils Zurawski, Catarina Frois}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{tabachnickWieldingCameraPen2011, | ||
+ | title = {Wielding the Camera Pen: Teaching Sociology through Filmmaking}, | ||
+ | volume = {35}, | ||
+ | issn = {0160-5976}, | ||
+ | doi = {10.1177/016059761103500106}, | ||
+ | number = {1-2}, | ||
+ | journal = {Humanity \& Society}, | ||
+ | author = {Tabachnick, David}, | ||
+ | year = {2011}, | ||
+ | pages = {128--148}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{bleikerVisualCulturesInhospitality2014, | ||
+ | title = {Visual Cultures of Inhospitality}, | ||
+ | volume = {26}, | ||
+ | doi = {10.1080/10402659.2014.906884}, | ||
+ | number = {2}, | ||
+ | journal = {Peace Review}, | ||
+ | author = {Bleiker, Roland and Campbell, David and Hutchison, Emma}, | ||
+ | year = {2014}, | ||
+ | pages = {192--200}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{borgdorffConflictFaculties2012, | ||
+ | address = {Leiden}, | ||
+ | title = {The Conflict of the Faculties}, | ||
+ | publisher = {Leiden University Press}, | ||
+ | author = {Borgdorff, Henk}, | ||
+ | year = {2012}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{schwabExpositionArtisticResearch2014, | ||
+ | address = {Leiden}, | ||
+ | title = {The Exposition of artistic research}, | ||
+ | isbn = {978-94-006-0092-8}, | ||
+ | abstract = {The Exposition of Artistic Research: Publishing Art in Academia introduces the pioneering concept of 'expositions' in the context of art and design research, where practice needs to be exposed as research to enter academic discourse. It brings together reflective and methodological approaches to exposition writing from a variety of artistic disciplines including fine art, music and design, which it links to questions of publication and the use of technology. The book proposes a novel relationship to knowledge, where the form in which this knowledge emerges and the mode in which it is communicated makes a difference to what is known. | ||
+ | |||
+ | |||
+ | |||
+ | This book places artistic research in the heart of the academic debate. This book works around terms such as 'exposition', 'artistic research' and 'archiving' which are critical at a time when art is striving to find a place at the academic research table. It offers a new and fascinating view by bringing together reflective and methodological approaches to exposition writing from a variety of artistic disciplines, including design, music and fine art, linking it to questions of publication and the use of technology}, | ||
+ | language = {eng}, | ||
+ | publisher = {Leiden University Press}, | ||
+ | editor = {Schwab, Michael and Borgdorff, Henk}, | ||
+ | year = {2014}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{Eco1992Interpretation, | ||
+ | title = {Eco, U. (1992). Interpretation and Overinterpretation}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{dandoEnhancingGeographicLearning2014, | ||
+ | title = {Enhancing Geographic Learning and Literacy Through Filmmaking}, | ||
+ | volume = {18}, | ||
+ | journal = {Geography and Geology Faculty Publications}, | ||
+ | author = {Dando, Christina E. and Chadwick, Jacob J.}, | ||
+ | year = {2014}, | ||
+ | pages = {1--15}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{hutchisonTheorizingEmotionsWorld2014, | ||
+ | title = {Theorizing emotions in world politics}, | ||
+ | volume = {6}, | ||
+ | issn = {1752-9719}, | ||
+ | doi = {10.1017/S1752971914000232}, | ||
+ | number = {03}, | ||
+ | journal = {International Theory}, | ||
+ | author = {Hutchison, Emma and Bleiker, Roland}, | ||
+ | year = {2014}, | ||
+ | pages = {491--514}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{bleikerIntroductionEmotionsWorld2014, | ||
+ | title = {Introduction: Emotions and world politics}, | ||
+ | volume = {6}, | ||
+ | issn = {1752-9719}, | ||
+ | doi = {10.1017/S1752971914000220}, | ||
+ | number = {03}, | ||
+ | journal = {International Theory}, | ||
+ | author = {Bleiker, Roland and Hutchison, Emma}, | ||
+ | year = {2014}, | ||
+ | pages = {490--491}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{germanoAnalyticFilmmakingNew2014, | ||
+ | title = {Analytic Filmmaking: A New Approach to Research and Publication in the Social Sciences}, | ||
+ | volume = {12}, | ||
+ | issn = {1537-5927}, | ||
+ | doi = {10.1017/S1537592714001649}, | ||
+ | number = {03}, | ||
+ | journal = {Perspectives on Politics}, | ||
+ | author = {Germano, Roy}, | ||
+ | year = {2014}, | ||
+ | pages = {663--676}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{valerianoTeachingIntroductionInternational2013, | ||
+ | title = {Teaching Introduction to International Politics with Film}, | ||
+ | volume = {9}, | ||
+ | issn = {1551-2169}, | ||
+ | doi = {10.1080/15512169.2013.747840}, | ||
+ | number = {1}, | ||
+ | journal = {Journal of Political Science Education}, | ||
+ | author = {Valeriano, Brandon}, | ||
+ | year = {2013}, | ||
+ | pages = {52--72}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{revisor2995fd7c68e04b07ae85948db005d884, | ||
+ | title = {2995fd7c-68e0-4b07-ae85-948db005d884}, | ||
+ | author = {{Revisor}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ragazziTeachingDocumentaryAcademia, | ||
+ | title = {Teaching documentary: Between academia and the media industry}, | ||
+ | author = {Ragazzi, Francesco}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{InternationalRelationsMovies, | ||
+ | title = {International Relations at the Movies: Teaching and Learning about International Politics through Film}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{smithSourcebookExperientialEducation, | ||
+ | title = {Sourcebook of Experiential Education}, | ||
+ | abstract = {Education}, | ||
+ | author = {{Smith} and {Thomas E.} and {Knapp} and {Clifford E.}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{craciunTeachingPoliticalScience, | ||
+ | title = {Teaching Political Science at the Movies}, | ||
+ | author = {Craciun, Claudiu}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@phdthesis{kottovaFilmmakingNewPedagogical2015, | ||
+ | type = {Ph.D Dissertation}, | ||
+ | title = {Filmmaking: A new pedagogical method to explore students’ view of nature of science.}, | ||
+ | school = {University of Victoria}, | ||
+ | author = {Kottova, Alena}, | ||
+ | year = {2015}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{hamenstadt26c562f99c134beea7425ba4f6969f67, | ||
+ | title = {26c562f9-9c13-4bee-a742-5ba4f6969f67}, | ||
+ | author = {Hamenstädt, Ulrich}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{vladKoganPS4920Syllabus, | ||
+ | title = {Kogan\_PS4920\_Syllabus\_Final}, | ||
+ | author = {{Vlad}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ISAFilmsIR, | ||
+ | title = {ISA Films in IR paper}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{jewittExploringMethodologicalInnovation2017a, | ||
+ | title = {Exploring methodological innovation in the social sciences: the body in digital environments and the arts}, | ||
+ | volume = {20}, | ||
+ | issn = {1364-5579}, | ||
+ | doi = {10.1080/13645579.2015.1129143}, | ||
+ | abstract = {International Journal of Social Research Methodology, 2016. doi:10.1080/13645579.2015.1129143}, | ||
+ | number = {1}, | ||
+ | journal = {International Journal of Social Research Methodology}, | ||
+ | author = {Jewitt, Carey and Xambo, Anna and Price, Sara}, | ||
+ | year = {2017}, | ||
+ | pages = {105--120}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{jewittConceptualisingResearchingBody2017, | ||
+ | title = {Conceptualising and researching the body in digital contexts: towards new methodological conversations across the arts and social sciences}, | ||
+ | volume = {17}, | ||
+ | issn = {1468-7941}, | ||
+ | doi = {10.1177/1468794116656036}, | ||
+ | abstract = {Qualitative Research 2017.17:37-53}, | ||
+ | number = {1}, | ||
+ | journal = {Qualitative Research}, | ||
+ | author = {Jewitt, Carey and Price, Sara and Xambo Sedo, Anna}, | ||
+ | year = {2017}, | ||
+ | pages = {37--53}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{broadhurstDigitalBodiesCreativity2017, | ||
+ | address = {London}, | ||
+ | title = {Digital Bodies. Creativity and Technology in the Arts and Humanities}, | ||
+ | publisher = {Palgrave Macmillan}, | ||
+ | editor = {Broadhurst, Susan and Price, Sara}, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{delamontSAGEQualitativeResearch2011, | ||
+ | address = {London}, | ||
+ | series = {SAGE benchmarks in social research methods}, | ||
+ | title = {SAGE qualitative research methods}, | ||
+ | isbn = {1-84920-378-4}, | ||
+ | publisher = {SAGE}, | ||
+ | author = {Delamont, Sara and Atkinson, Paul}, | ||
+ | year = {2011}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{banksVisualMethodsSocial2001, | ||
+ | title = {Visual Methods in Social Research}, | ||
+ | abstract = {Sage Publications Ltd, 2001}, | ||
+ | author = {Banks, Marcus}, | ||
+ | year = {2001}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{robertsEditorPossibilitiesLimitations2018, | ||
+ | title = {From the Editor: The Possibilities and Limitations of Experiential Learning Research in Higher Education}, | ||
+ | volume = {41}, | ||
+ | issn = {1053-8259}, | ||
+ | doi = {10.1177/1053825917751457}, | ||
+ | abstract = {Journal of Experiential Education 2018.41:3-7}, | ||
+ | number = {1}, | ||
+ | journal = {Journal of Experiential Education}, | ||
+ | author = {Roberts, Jay}, | ||
+ | year = {2018}, | ||
+ | pages = {3--7}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{banksSageQualitativeResearch2007, | ||
+ | address = {London}, | ||
+ | title = {The Sage qualitative research kit}, | ||
+ | isbn = {978-0-7619-4982-4}, | ||
+ | language = {eng}, | ||
+ | publisher = {SAGE}, | ||
+ | author = {{Banks} and {Marcus}}, | ||
+ | editor = {Banks, Marcus}, | ||
+ | year = {2007}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{apprichPatternDiscrimination, | ||
+ | title = {Pattern Discrimination}, | ||
+ | abstract = {Algorithmic identity politics reinstate old forms of social segregation—in a digital world, identity politics is pattern discrimination. It is by recognizing patterns in input data that artificial intelligence algorithms create bias and practice racial exclusions thereby inscribing power relations into media. How can we filter information out of data without reinserting racist, sexist, and classist beliefs?}, | ||
+ | author = {Apprich, Clemens}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{hortonJohnOliverPolice2020, | ||
+ | title = {John Oliver on police use of facial recognition: 'We’re about to cross a major line'}, | ||
+ | url = {https://www.theguardian.com/culture/2020/jun/15/john-oliver-police-use-facial-recognition?CMP=Share_iOSApp_Other}, | ||
+ | abstract = {The Last Week Tonight host tracks the chilling expansion of facial recognition technology in the US by law enforcement and the need for regulation}, | ||
+ | urldate = {2020-06-16}, | ||
+ | journal = {The Guardian}, | ||
+ | author = {Horton, Adrian}, | ||
+ | month = jun, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{fowlerBlackLivesMatter2020, | ||
+ | title = {Black Lives Matter could change facial recognition forever — if Big Tech doesn’t stand in the way}, | ||
+ | url = {https://www.washingtonpost.com/technology/2020/06/12/facial-recognition-ban/}, | ||
+ | abstract = {Publicity stunts from IBM, Amazon and Microsoft won’t be enough to stop police from using facial recognition.}, | ||
+ | urldate = {2020-06-22}, | ||
+ | journal = {The Washington Post}, | ||
+ | author = {Fowler, Geoffrey}, | ||
+ | month = jun, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{dorkCriticalInfoVis2013, | ||
+ | title = {Critical InfoVis}, | ||
+ | url = {http://dl.acm.org/citation.cfm?id=2468356}, | ||
+ | doi = {10.1145/2468356.2468739}, | ||
+ | language = {eng}, | ||
+ | author = {Dörk, Marian and Feng, Patrick and Collins, Christopher and Carpendale, Sheelagh}, | ||
+ | year = {2013}, | ||
+ | note = {Place: New York, NY | ||
+ | Publisher: ACM}, | ||
+ | pages = {2189}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{brandomCaliforniaStatehouseConsidering2020, | ||
+ | title = {California’s statehouse is considering a controversial facial recognition bill}, | ||
+ | url = {https://www.theverge.com/2020/6/3/21279539/california-facial-recognition-ab2261-law-privacy-regulation}, | ||
+ | abstract = {The ACLU is squaring off against lawmakers over a bill that would provide a pathway for legal uses of facial recognition, both by police and private sector companies.}, | ||
+ | urldate = {2020-04-06}, | ||
+ | journal = {The Verge}, | ||
+ | author = {Brandom, Russell}, | ||
+ | month = jun, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{coldeweyIBMEndsAll2020, | ||
+ | title = {IBM ends all facial recognition business as CEO calls out bias and inequality}, | ||
+ | url = {https://techcrunch.com/2020/06/08/ibm-ends-all-facial-recognition-work-as-ceo-calls-out-bias-and-inequality/?guccounter=1}, | ||
+ | abstract = {IBM CEO Arvind Krishna announced today that the company would no longer sell facial recognition services, calling for a “national dialogue” on whether it should be used at all. He also voiced support for a new bill aiming to reduce police violence and increase accountability. In a letter reported by CNBC, written in support of […]}, | ||
+ | urldate = {2020-06-22}, | ||
+ | journal = {TechCrunch}, | ||
+ | author = {Coldewey, Devin}, | ||
+ | month = jun, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{WeAsked432020, | ||
+ | title = {We Asked 43 Facial Recognition Companies if They'll Refuse to Work With Cops}, | ||
+ | url = {https://www.vice.com/en_us/article/pkygg7/we-asked-43-facial-recognition-companies-if-theyll-refuse-to-work-with-cops}, | ||
+ | abstract = {After IBM and Amazon pulled access to its facial recognition software from law enforcement, we asked other companies that advertise the technology if they'll follow suit.}, | ||
+ | urldate = {2020-06-22}, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{macMicrosoftPitchedFacial2020, | ||
+ | title = {Microsoft Pitched Facial Recognition To The DEA}, | ||
+ | url = {https://www.buzzfeednews.com/article/ryanmac/microsoft-pitched-facial-recognition-dea-drug-enforcement?scrolla=5eb6d68b7fedc32c19ef33b4}, | ||
+ | abstract = {Last week, Microsoft said it would not sell its facial recognition to police departments. But new documents reveal it was pitching that technology to at least one federal agency as recently as two yea}, | ||
+ | urldate = {2020-06-22}, | ||
+ | journal = {BuzzFeed News}, | ||
+ | author = {Mac, Ryan}, | ||
+ | month = jun, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{hillWrongfullyAccusedAlgorithm2020a, | ||
+ | title = {Wrongfully Accused by an Algorithm}, | ||
+ | issn = {1553-8095}, | ||
+ | url = {https://www.nytimes.com/2020/06/24/technology/facial-recognition-arrest.html}, | ||
+ | abstract = {In what may be the first known case of its kind, a faulty facial recognition match led to a Michigan man’s arrest for a crime he did not commit.}, | ||
+ | urldate = {2020-06-27}, | ||
+ | journal = {The New York Times}, | ||
+ | author = {Hill, Kashmir}, | ||
+ | month = jun, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{GooglePhotosLabeled01, | ||
+ | title = {Google Photos labeled black people 'gorillas'}, | ||
+ | url = {https://eu.usatoday.com/story/tech/2015/07/01/google-apologizes-after-photos-identify-black-people-as-gorillas/29567465/}, | ||
+ | urldate = {2020-06-27}, | ||
+ | journal = {USA TODAY}, | ||
+ | month = jan, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{IBMAbandonsFacial2020, | ||
+ | title = {IBM Abandons Facial Recognition Products, Condemns Racially Biased Surveillance}, | ||
+ | url = {https://www.npr.org/2020/06/09/873298837/ibm-abandons-facial-recognition-products-condemns-racially-biased-surveillance?t=1593274615472}, | ||
+ | abstract = {IBM is the first major technology company to walk away from facial recognition technology amid nationwide protests for racial justice and police reform. Amazon and Microsoft have not followed.}, | ||
+ | urldate = {2020-06-27}, | ||
+ | journal = {NPR}, | ||
+ | month = jun, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{MicrosoftPresidentCalls, | ||
+ | title = {Microsoft president calls for federal regulation of facial recognition technology - CNN}, | ||
+ | url = {https://edition.cnn.com/2020/06/18/tech/brad-smith-microsoft-facial-recognition/}, | ||
+ | urldate = {2020-06-27}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ivanovaWhyFacerecognitionTechnology2020, | ||
+ | title = {Why face-recognition technology has a bias problem}, | ||
+ | url = {https://www.cbsnews.com/news/facial-recognition-systems-racism-protests-police-bias/}, | ||
+ | abstract = {As racial bias in policing becomes a national issue, the focus is turning to the tech that critics say enables it.}, | ||
+ | urldate = {2020-06-27}, | ||
+ | journal = {CBS News}, | ||
+ | author = {Ivanova, Irina}, | ||
+ | month = jun, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{FederalStudyConfirms2019, | ||
+ | title = {Federal study confirms racial bias of many facial-recognition systems, casts doubt on their expanding use}, | ||
+ | url = {https://www.washingtonpost.com/technology/2019/12/19/federal-study-confirms-racial-bias-many-facial-recognition-systems-casts-doubt-their-expanding-use/}, | ||
+ | abstract = {Researchers found that most facial-recognition algorithms exhibit “demographic differentials” that can worsen their accuracy based on a person’s age, gender or race.}, | ||
+ | urldate = {2020-06-27}, | ||
+ | journal = {The Washington Post}, | ||
+ | month = dec, | ||
+ | year = {2019}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{barrettAmazonFacialRecognition2018, | ||
+ | title = {Amazon's Facial Recognition System Mistakes Members of Congress for Mugshots}, | ||
+ | url = {https://www.wired.com/story/amazon-facial-recognition-congress-bias-law-enforcement/}, | ||
+ | abstract = {Amazon has marketed its Rekognition facial recognition system to law enforcement. But in a new ACLU study, the technology confused 28 members of Congress with publicly available arrest photos.}, | ||
+ | urldate = {2020-06-27}, | ||
+ | journal = {WIRED}, | ||
+ | author = {Barrett, Brian}, | ||
+ | month = jul, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{FacescanningCriminalPredictor2020, | ||
+ | title = {Face-scanning 'criminal predictor' sparks bias row}, | ||
+ | url = {https://www.bbc.com/news/technology-53165286}, | ||
+ | abstract = {A university that says it can scan faces to predict if someone is a criminal has come under fire.}, | ||
+ | urldate = {2020-06-27}, | ||
+ | journal = {BBC News}, | ||
+ | month = jun, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{wongWhyFacialRecognition2019, | ||
+ | title = {Why facial recognition's racial bias problem is so hard to crack}, | ||
+ | url = {https://www.cnet.com/news/why-facial-recognitions-racial-bias-problem-is-so-hard-to-crack/}, | ||
+ | abstract = {Good luck if you're a woman or a darker-skinned person.}, | ||
+ | urldate = {2020-06-27}, | ||
+ | journal = {CNET}, | ||
+ | author = {Wong, Queenie}, | ||
+ | month = mar, | ||
+ | year = {2019}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{johnsonCongressMovesFacial2020, | ||
+ | title = {Congress moves toward facial recognition regulation}, | ||
+ | url = {https://venturebeat.com/2020/01/15/congress-moves-toward-facial-recognition-regulation/}, | ||
+ | abstract = {Progressive and conservative members of Congress may introduce legislation to regulate facial recognition use in the "very near future."}, | ||
+ | urldate = {2020-06-27}, | ||
+ | journal = {VentureBeat}, | ||
+ | author = {Johnson, Khari}, | ||
+ | month = jan, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{condittClearviewRelyFirst2020, | ||
+ | title = {Clearview to rely on First Amendment to defend its face-tracking tech}, | ||
+ | url = {https://www.engadget.com/clearview-first-amendment-lawsuit-defense-181859840.html}, | ||
+ | abstract = {The CEO has been banging this drum since the lawsuits starting rolling in.}, | ||
+ | urldate = {2020-08-13}, | ||
+ | journal = {Engadget}, | ||
+ | author = {Conditt, Jessica}, | ||
+ | month = aug, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{WhatHappensWhen2020, | ||
+ | title = {What happens when an algorithm gets it wrong}, | ||
+ | url = {https://www.technologyreview.com/2020/08/12/1006636/face-recognition-algorithm-false-arrest-police-robert-williams/}, | ||
+ | abstract = {The odd thing about Robert William's false arrest wasn't that police used face recognition to ID him. It's that they told him about it.}, | ||
+ | urldate = {2020-08-13}, | ||
+ | journal = {MIT Technology Review}, | ||
+ | month = aug, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{rostonFawkesPhotoTool2020, | ||
+ | title = {Fawkes photo tool lets anyone secretly 'poison' facial recognition systems}, | ||
+ | url = {https://www.slashgear.com/fawkes-photo-tool-lets-anyone-secretly-poison-facial-recognition-systems-12633132/}, | ||
+ | abstract = {The Internet is packed full of billions of photos, many of which are lost into the depths of abandoned accounts and old hosting services. A huge number of this}, | ||
+ | urldate = {2020-08-13}, | ||
+ | journal = {SlashGear}, | ||
+ | author = {Roston, Brittany A.}, | ||
+ | month = aug, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{michiganFacialRecognitionSchools2020, | ||
+ | title = {Facial recognition in schools risks making racism worse}, | ||
+ | url = {https://www.futurity.org/facial-recognition-schools-racism-2421362/}, | ||
+ | abstract = {Deploying the use of facial recognition technology in schools "without understanding its implications would be unethical and dangerous," experts argue.}, | ||
+ | urldate = {2020-08-13}, | ||
+ | journal = {Futurity}, | ||
+ | author = {Michigan, U.}, | ||
+ | month = aug, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{AngelesSheriffDeputies2020, | ||
+ | title = {Los Angeles sheriff's deputies to get body-worn cameras}, | ||
+ | url = {https://apnews.com/1cb2fb54e93c46c392f55cbdc0dd7a05}, | ||
+ | abstract = {LOS ANGELES (AP) — Los Angeles County deputies, who make up the largest sheriff's department in the nation, will begin getting body-worn cameras in October, the sheriff's announced...}, | ||
+ | urldate = {2020-08-13}, | ||
+ | journal = {Associated Press}, | ||
+ | month = aug, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{ECREAComputerVision, | ||
+ | title = {ECREA - ComputerVision}, | ||
+ | url = {https://ecrea.eu/page-18206/9163798}, | ||
+ | urldate = {2020-08-16}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{delvalleHowVideoChat2020, | ||
+ | title = {How video chat fuels the American deportation machine}, | ||
+ | url = {https://www.theverge.com/21408606/ice-immigrant-detention-centers-video-chats-deportation-refugees-asylum}, | ||
+ | abstract = {The Verge’s year-long investigation explores the cruel bureaucracy of ICE’s immigrant detention centers. Reporter Gaby Del Valle follows Samuel, a Cameroonian refugee, tracing his journey through the US’s deliberately confusing process to request asylum.}, | ||
+ | urldate = {2020-10-09}, | ||
+ | journal = {The Verge}, | ||
+ | author = {Del Valle, Gaby}, | ||
+ | month = sep, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{morseFacialRecognitionUsed2020, | ||
+ | title = {Facial recognition used to arrest protestor at Trump bible photo op}, | ||
+ | url = {https://mashable.com/article/facial-recognition-arrest-black-lives-matter-protestor-trump-bible-photo-op/?europe=true}, | ||
+ | abstract = {Law enforcement used images pulled off Twitter, combined with a little known facial recognition system, to identify a protestor.}, | ||
+ | urldate = {2020-03-11}, | ||
+ | journal = {Mashable}, | ||
+ | author = {Morse, Jack}, | ||
+ | month = nov, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{lyonsICEJustSigned2020, | ||
+ | title = {ICE just signed a contract with facial recognition company Clearview AI}, | ||
+ | url = {https://www.theverge.com/2020/8/14/21368930/clearview-ai-ice-contract-privacy-immigration}, | ||
+ | abstract = {Immigration and Customs Enforcement has signed a contract with facial recognition company Clearview AI for “mission support,” government contracting records show.}, | ||
+ | urldate = {2020-08-16}, | ||
+ | journal = {The Verge}, | ||
+ | author = {Lyons, Kim}, | ||
+ | month = aug, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{bonifacicNewYorkCity2020, | ||
+ | title = {New York City says it will reassess police use of facial recognition}, | ||
+ | url = {https://www.engadget.com/new-york-city-facial-recongition-223931035.html?guccounter=1}, | ||
+ | abstract = {The decision comes as cities across the US reevaluate the controversial technology.}, | ||
+ | urldate = {2020-08-18}, | ||
+ | journal = {Engadget}, | ||
+ | author = {Bonifacic, Igor}, | ||
+ | month = aug, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{johnsonAmsterdamHelsinkiLaunch2020, | ||
+ | title = {Amsterdam and Helsinki launch algorithm registries to bring transparency to public deployments of AI}, | ||
+ | url = {https://venturebeat.com/2020/09/28/amsterdam-and-helsinki-launch-algorithm-registries-to-bring-transparency-to-public-deployments-of-ai/}, | ||
+ | abstract = {Amsterdam and Helsinki today launched AI registries to detail how each city uses algorithms to deliver services.}, | ||
+ | urldate = {2020-01-10}, | ||
+ | journal = {VentureBeat}, | ||
+ | author = {Johnson, Khari}, | ||
+ | month = sep, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{BelarusProtestersUsea, | ||
+ | title = {Belarus Protesters Use AI to 'Unmask' Riot Police Wearing Face Coverings}, | ||
+ | url = {https://petapixel.com/2020/09/29/belarus-protesters-use-ai-to-unmask-riot-police-wearing-face-coverings/}, | ||
+ | abstract = {Photography and Camera News, Reviews, and Inspiration}, | ||
+ | urldate = {2020-09-29}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{logicmagazineInformaticsOppressed, | ||
+ | title = {Informatics of the Oppressed}, | ||
+ | url = {https://logicmag.io/care/informatics-of-the-oppressed/}, | ||
+ | urldate = {2020-10-19}, | ||
+ | author = {{Logic Magazine}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{takaragawaBadHabitusAnthropology2019, | ||
+ | title = {Bad Habitus: Anthropology in the Age of the Multimodal}, | ||
+ | volume = {121}, | ||
+ | issn = {00027294}, | ||
+ | doi = {10.1111/aman.13248}, | ||
+ | abstract = {American Anthropologist 2019.121:517-524}, | ||
+ | number = {2}, | ||
+ | journal = {American Anthropologist}, | ||
+ | author = {Takaragawa, Stephanie and Lynn Smith, Trudi and Hennessy, Kate and Alvarez Astacio, Patricia and Chio, Jenny and Nye, Coleman and Shankar, Shalini}, | ||
+ | year = {2019}, | ||
+ | pages = {517--524}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{dattatreyanIntroductionMultimodalAnthropology2019, | ||
+ | title = {Introduction: Multimodal Anthropology and the Politics of Invention}, | ||
+ | volume = {121}, | ||
+ | issn = {00027294}, | ||
+ | doi = {10.1111/aman.13183}, | ||
+ | abstract = {American Anthropologist 0.0:null-null}, | ||
+ | number = {1}, | ||
+ | journal = {American Anthropologist}, | ||
+ | author = {Dattatreyan, Ethiraj Gabriel and Marrero‐Guillamón, Isaac}, | ||
+ | year = {2019}, | ||
+ | keywords = {**** (Fundamental for sub-field)}, | ||
+ | pages = {220--228}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{collinsMultimodalityInvitation2017, | ||
+ | title = {Multimodality: An Invitation}, | ||
+ | volume = {119}, | ||
+ | issn = {00027294}, | ||
+ | doi = {10.1111/aman.12826}, | ||
+ | number = {1}, | ||
+ | journal = {American Anthropologist}, | ||
+ | author = {Collins, Samuel Gerald and Durington, Matthew and Gill, Harjant}, | ||
+ | year = {2017}, | ||
+ | pages = {142--146}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{delckerActivistsUrgeEU2020, | ||
+ | title = {Activists urge EU to ban live facial recognition in public spaces}, | ||
+ | url = {https://www.politico.eu/article/activists-urge-eu-to-ban-live-facial-recognition-in-public-spaces/}, | ||
+ | abstract = {12 organizations join forces to make their voice heard in a debate dominated by the tech industry.}, | ||
+ | urldate = {2021-10-02}, | ||
+ | journal = {POLITICO}, | ||
+ | author = {Delcker, Janosch}, | ||
+ | month = nov, | ||
+ | year = {2020}, | ||
+ | keywords = {artificial intelligence, surveillance, privacy, facial recognition, brussels bubble, industry, regulation, technology}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{riesLeanStartupHow, | ||
+ | title = {The Lean Startup: How Today’s Entrepreneurs Use Continuous Innovation to Create Radically Successful Businesses}, | ||
+ | author = {Ries, Eric}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{plajasInterfacesRelationalityRace, | ||
+ | title = {Interfaces: on the relationality of race, face and, vision. A multimodal intervention.}, | ||
+ | urldate = {2021-01-01}, | ||
+ | author = {Plájás, Ildikó Z.}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{simoniteEuropeLimitsGovernment2020, | ||
+ | title = {Europe Limits Government by Algorithm. The US, Not So Much}, | ||
+ | url = {https://www.wired.com/story/europe-limits-government-algorithm-us-not-much/}, | ||
+ | abstract = {A Dutch court halted a program to identify people more likely to commit benefits fraud. Critics said it discriminated against immigrants and low-income residents.}, | ||
+ | urldate = {2021-10-02}, | ||
+ | journal = {WIRED}, | ||
+ | author = {Simonite, Tom}, | ||
+ | month = feb, | ||
+ | year = {2020}, | ||
+ | keywords = {artificial intelligence, business, web, algorithms, europe, facial recognition}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{FacialRecognitionEU2020a, | ||
+ | title = {Facial recognition: EU considers ban of up to five years}, | ||
+ | url = {https://www.bbc.com/news/technology-51148501}, | ||
+ | abstract = {The European Commission wants time to work out how to prevent the technology being abused.}, | ||
+ | urldate = {2021-02-10}, | ||
+ | journal = {BBC News}, | ||
+ | month = jan, | ||
+ | year = {2020}, | ||
+ | keywords = {technology}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{siliconcanals10FacialRecognition, | ||
+ | title = {10 facial recognition startups from Europe you should know about in 2019 {\textbar} Silicon Canals}, | ||
+ | url = {https://siliconcanals.com/news/facial-recognition-startups-in-2019/}, | ||
+ | abstract = {European technology news from the startup ecosystem. Founder and publisher: Remco Janssen. Follow us on Twitter: @siliconcanals.}, | ||
+ | urldate = {2019-05-11}, | ||
+ | author = {{Silicon Canals}}, | ||
+ | keywords = {europe, startups}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{kayaliHowFacialRecognition2019, | ||
+ | title = {How facial recognition is taking over a French city}, | ||
+ | url = {https://www.politico.eu/article/how-facial-recognition-is-taking-over-a-french-riviera-city/}, | ||
+ | abstract = {European authorities are competing to deploy facial recognition tech. Nice in southern France is in the lead.}, | ||
+ | urldate = {2021-10-02}, | ||
+ | journal = {POLITICO}, | ||
+ | author = {Kayali, Laura}, | ||
+ | month = sep, | ||
+ | year = {2019}, | ||
+ | keywords = {artificial intelligence, surveillance, privacy, regulation, technology, cybersecurity, data, data protection, human rights, law enforcement, nice terror attack, security, terrorism}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{europeandigitalrightsManyFacesFacial, | ||
+ | title = {The many faces of facial recognition in the EU - European Digital Rights (EDRi)}, | ||
+ | url = {https://edri.org/our-work/the-many-faces-of-facial-recognition-in-the-eu/}, | ||
+ | abstract = {In this second installment of EDRi's facial recognition and fundamental rights series, we look at how different EU Member States, institutions and other countries worldwide are responding to the use of this tech in public spaces.}, | ||
+ | urldate = {2020-09-09}, | ||
+ | author = {{European Digital Rights}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{sheadFacialRecognitionTech2020a, | ||
+ | title = {Facial recognition tech developed by Clearview AI could be illegal in Europe, privacy group says}, | ||
+ | url = {https://www.cnbc.com/2020/06/11/clearview-ai-facial-recognition-europe.html}, | ||
+ | abstract = {The European Data Protection Board warned on Wednesday that Clearview AI's technology is likely to be illegal in Europe.}, | ||
+ | urldate = {2021-10-02}, | ||
+ | journal = {CNBC}, | ||
+ | author = {Shead, Sam}, | ||
+ | month = jun, | ||
+ | year = {2020}, | ||
+ | keywords = {privacy, technology, Amazon.com Inc, Application Software, Articles, cnbc, International Business Machines Corp, Microsoft Corp, Politics, source:tagname:CNBC Europe Source}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{OverviewComputerVision, | ||
+ | title = {An Overview to Computer Vision That’s Redefining Surveillance {\textbar} Analytics Steps}, | ||
+ | url = {https://www.instapaper.com/read/1386737517}, | ||
+ | abstract = {A simple tool for saving web pages to read later on your iPhone, iPad, Android, computer, or Kindle.}, | ||
+ | urldate = {2021-12-02}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{cakiciPeoplingEuropeData2020a, | ||
+ | title = {Peopling Europe through Data Practices: Introduction to the Special Issue}, | ||
+ | volume = {45}, | ||
+ | issn = {0162-2439}, | ||
+ | doi = {10.1177/0162243919897822}, | ||
+ | abstract = {Science, Technology, \& Human Values 2020.45:199-211}, | ||
+ | number = {2}, | ||
+ | journal = {Science, Technology, \& Human Values}, | ||
+ | author = {Cakici, Baki and Ruppert, Evelyn and Scheel, Stephan}, | ||
+ | year = {2020}, | ||
+ | keywords = {europe, data practices, enactment}, | ||
+ | pages = {199--211}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{castanedaRobotVisions2014a, | ||
+ | title = {Robot visions}, | ||
+ | volume = {44}, | ||
+ | issn = {0306-3127}, | ||
+ | doi = {10.1177/0306312713511868}, | ||
+ | abstract = {This article explores the resonating figures of primate, child, and robot in contemporary technoscientific corporealizations of the 'almost human'. We take as our model (in)organism 'Lucy the Robot Orangutan', roboticist Steve Grand's project to create an artificial life form with a mind of its own. One aspect of Lucy's figuration by Grand, we argue, which ties her to Haraway's analysis of the primate, is of the robot as a model for animal, and more specifically (or aspirationally) human, cognition. We follow the trope of 'model organism' as it is under discussion within science and technology studies and as an ironic descriptor for our own interest in Lucy as an entity/project through which to illuminate figurations within robotics more widely. Primate and robot together are forms of natureculture that help to clarify how the categories of animal and machine are entangled, while making explicit investments in their differences from one another, and from the third category of the human. We conclude, again following Haraway, by imagining what other possibilities there might be for figuring humans, robots, and their relations if we escape the reiterative imaginary of the robot as proxy for becoming human.}, | ||
+ | language = {eng}, | ||
+ | number = {3}, | ||
+ | journal = {Social studies of science}, | ||
+ | author = {Castañeda, Claudia and Suchman, Lucy}, | ||
+ | year = {2014}, | ||
+ | keywords = {figuration, model organism, primatology, robotics, Animals, Child, Humans, Pongo, Robotics/methods, Sociology}, | ||
+ | pages = {315--341}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{idcukblogFacialRecognitionEurope2019, | ||
+ | title = {Facial Recognition in Europe: Security Problem? {\textbar} IDC UK Blog}, | ||
+ | url = {https://blog-idcuk.com/facial-recognition-in-europe-a-battle-between-privacy-and-surveillance/}, | ||
+ | abstract = {Legislators are exploring ways to control the use of facial recognition in Europe through legislation, which would limit the indiscriminate use of it}, | ||
+ | urldate = {2020-09-06}, | ||
+ | author = {{IDC UK Blog}}, | ||
+ | year = {2019}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{FacialRecognition2021, | ||
+ | title = {Facial Recognition in 2021 (with examples)}, | ||
+ | url = {https://www.thalesgroup.com/en/markets/digital-identity-and-security/government/biometrics/facial-recognition}, | ||
+ | abstract = {Facial recognition is a hot topic and somewhat controversial. Discover 7 trends likely to shape the face recognition landscape for the next 2 years.}, | ||
+ | urldate = {2021-10-02}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{mahmoodFourWaysComputer2019, | ||
+ | title = {Four Ways Computer Vision Is Transforming Physical Security}, | ||
+ | url = {https://www.forbes.com/sites/forbestechcouncil/2019/09/23/four-ways-computer-vision-is-transforming-physical-security/}, | ||
+ | abstract = {By better deriving intent from objects and motions and filtering out the false alarms, computer vision shows enormous potential as a risk reduction tool and an information filter to help security personnel be more effective at their jobs.}, | ||
+ | urldate = {2021-12-02}, | ||
+ | journal = {Forbes}, | ||
+ | author = {Mahmood, Khurram}, | ||
+ | month = sep, | ||
+ | year = {2019}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{coopmansFaceValueNew2011a, | ||
+ | title = {'Face value': new medical imaging software in commercial view}, | ||
+ | volume = {41}, | ||
+ | issn = {0306-3127}, | ||
+ | doi = {10.1177/0306312710389226}, | ||
+ | abstract = {Based on three ethnographic vignettes describing the engagements of a small start-up company with prospective competitors, partners and customers, this paper shows how commercial considerations are folded into the ways visual images become 'seeable'. When company members mount demonstrations of prototype mammography software, they seek to generate interest but also to protect their intellectual property. Pivotal to these efforts to manage revelation and concealment is the visual interface, which is variously performed as obstacle and ally in the development of a profitable product. Using the concept of 'face value', the paper seeks to develop further insight into contemporary dynamics of seeing and showing by tracing the way techno-visual presentations and commercial considerations become entangled in practice. It also draws attention to the salience and significance of enactments of surface and depth in image-based practices.}, | ||
+ | language = {eng}, | ||
+ | number = {2}, | ||
+ | journal = {Social studies of science}, | ||
+ | author = {Coopmans, Catelijne}, | ||
+ | year = {2011}, | ||
+ | keywords = {commercial relations, ethnography, face value, imaging, software demonstrations, Humans, Biomedical Technology, Diagnostic Imaging/instrumentation, Disclosure, Image Processing, Computer-Assisted, Marketing, Software}, | ||
+ | pages = {155--176}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{kale-lostuvaliTwoSociologiesScience2016a, | ||
+ | title = {Two Sociologies of Science in Search of Truth: Bourdieu Versus Latour}, | ||
+ | volume = {30}, | ||
+ | issn = {0269-1728}, | ||
+ | doi = {10.1080/02691728.2015.1015062}, | ||
+ | abstract = {Social Epistemology, 2015. doi:10.1080/02691728.2015.1015062}, | ||
+ | number = {3}, | ||
+ | journal = {Social Epistemology}, | ||
+ | author = {Kale-Lostuvali, Elif}, | ||
+ | year = {2016}, | ||
+ | pages = {273--296}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{aradauActsDigitalParasitism2019a, | ||
+ | title = {Acts of digital parasitism: Hacking, humanitarian apps and platformisation}, | ||
+ | volume = {21}, | ||
+ | issn = {1461-4448}, | ||
+ | doi = {10.1177/1461444819852589}, | ||
+ | number = {11-12}, | ||
+ | journal = {New Media \& Society}, | ||
+ | author = {Aradau, Claudia and Blanke, Tobias and Greenway, Giles}, | ||
+ | year = {2019}, | ||
+ | pages = {2548--2565}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{grommePopulationGeometriesEurope2020a, | ||
+ | title = {Population Geometries of Europe: The Topologies of Data Cubes and Grids}, | ||
+ | volume = {45}, | ||
+ | issn = {0162-2439}, | ||
+ | doi = {10.1177/0162243919835302}, | ||
+ | abstract = {Science, Technology, \& Human Values 2020.45:235-261}, | ||
+ | number = {2}, | ||
+ | journal = {Science, Technology, \& Human Values}, | ||
+ | author = {Grommé, Francisca and Ruppert, Evelyn}, | ||
+ | year = {2020}, | ||
+ | keywords = {census, geometry, infrastructure, population statistics, postnational, topology}, | ||
+ | pages = {235--261}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{follisVisionTransterritory2017, | ||
+ | title = {Vision and Transterritory}, | ||
+ | volume = {42}, | ||
+ | issn = {0162-2439}, | ||
+ | doi = {10.1177/0162243917715106}, | ||
+ | abstract = {Science, Technology, \& Human Values 2017.42:1003-1030}, | ||
+ | number = {6}, | ||
+ | journal = {Science, Technology, \& Human Values}, | ||
+ | author = {Follis, Karolina S.}, | ||
+ | year = {2017}, | ||
+ | keywords = {European Union, borders, drones, Eurosur, surveillance}, | ||
+ | pages = {1003--1030}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{garforthVisibilitiesResearchSeeing2012a, | ||
+ | title = {In/Visibilities of Research: Seeing and Knowing in STS}, | ||
+ | volume = {37}, | ||
+ | issn = {0162-2439}, | ||
+ | doi = {10.1177/0162243911409248}, | ||
+ | abstract = {Science, Technology, \& Human Values 2012.37:264-285}, | ||
+ | number = {2}, | ||
+ | journal = {Science, Technology, \& Human Values}, | ||
+ | author = {Garforth, Lisa}, | ||
+ | year = {2012}, | ||
+ | keywords = {epistemology, methodologies, methods, space/place/scale dynamics}, | ||
+ | pages = {264--285}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{isinBirthSensoryPower2020a, | ||
+ | title = {The birth of sensory power: How a pandemic made it visible?}, | ||
+ | volume = {7}, | ||
+ | issn = {2053-9517}, | ||
+ | doi = {10.1177/2053951720969208}, | ||
+ | abstract = {Big Data \& Society 2020.7:2053951720969208}, | ||
+ | number = {2}, | ||
+ | journal = {Big Data \& Society}, | ||
+ | author = {Isin, Engin and Ruppert, Evelyn}, | ||
+ | year = {2020}, | ||
+ | keywords = {assemblages, coronavirus, Deleuze, Foucault, resistance, Sensory power}, | ||
+ | pages = {205395172096920}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{userFreitas2016Alternative, | ||
+ | title = {de Freitas et al 2016 - Alternative Ontologies of Number}, | ||
+ | author = {User, Adelphi}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{robergeCulturalLifeMachine2021b, | ||
+ | address = {Cham}, | ||
+ | title = {The Cultural Life of Machine Learning}, | ||
+ | isbn = {978-3-030-56285-4}, | ||
+ | publisher = {Springer International Publishing}, | ||
+ | author = {Roberge, Jonathan and Castelle, Michael}, | ||
+ | year = {2021}, | ||
+ | doi = {10.1007/978-3-030-56286-1}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{knutsonSavingFaceUnconstitutionala, | ||
+ | title = {Saving Face; The Unconstitutional Use of Facial Recognition on Undocumented Immigrants and Solutions in IP}, | ||
+ | author = {Knutson, Audrey}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{vertesiSeeingRoverVisualization2012a, | ||
+ | title = {Seeing like a Rover: Visualization, embodiment, and interaction on the Mars Exploration Rover Mission}, | ||
+ | volume = {42}, | ||
+ | issn = {0306-3127}, | ||
+ | doi = {10.1177/0306312712444645}, | ||
+ | abstract = {Soc Stud Sci 2012.42:393-414}, | ||
+ | number = {3}, | ||
+ | journal = {Social Studies of Science}, | ||
+ | author = {Vertesi, Janet}, | ||
+ | year = {2012}, | ||
+ | keywords = {embodiment, human–robot interaction, planetary science, representation, social organization}, | ||
+ | pages = {393--414}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{mackenziePlatformSeeingImage2019b, | ||
+ | title = {Platform Seeing: Image Ensembles and Their Invisualities}, | ||
+ | volume = {36}, | ||
+ | issn = {0263-2764}, | ||
+ | doi = {10.1177/0263276419847508}, | ||
+ | abstract = {Theory, Culture \& Society 2019.36:3-22}, | ||
+ | number = {5}, | ||
+ | journal = {Theory, Culture \& Society}, | ||
+ | author = {MacKenzie, Adrian and Munster, Anna}, | ||
+ | year = {2019}, | ||
+ | keywords = {artificial intelligence architectures, Bergson, image ensembles, invisuality, platform}, | ||
+ | pages = {3--22}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{RajiFriedFace, | ||
+ | title = {Raji and Fried - About Face A Survey of Facial Recognition Evaluat}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{maleveDataSetRuins2020a, | ||
+ | title = {On the data set’s ruins}, | ||
+ | issn = {0951-5666}, | ||
+ | doi = {10.1007/s00146-020-01093-w}, | ||
+ | abstract = {AI \& SOCIETY, https://doi.org/10.1007/s00146-020-01093-w}, | ||
+ | journal = {AI \& SOCIETY}, | ||
+ | author = {Malevé, Nicolas}, | ||
+ | year = {2020}, | ||
+ | keywords = {Photography, Computer vision, Data set, Imageability, ImageNet, Le musée imaginaire, Micro-labour, Scale}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{marcusDesignUserExperience2020, | ||
+ | address = {Cham, Switzerland}, | ||
+ | series = {LNCS sublibrary: SL 3, Information systems and applications, incl. internet/web, and HCI}, | ||
+ | title = {Design, user experience, and usability}, | ||
+ | volume = {12200}, | ||
+ | isbn = {978-3-030-49712-5}, | ||
+ | publisher = {Springer}, | ||
+ | editor = {Marcus, Aaron and Rosenzweig, Elizabeth}, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ecarrollLosingOurSenses2018, | ||
+ | title = {Losing Our Senses Online: Investigating How Aesthetics Might Be Used to Ground People in Cyberspace}, | ||
+ | volume = {37}, | ||
+ | issn = {0278-0097}, | ||
+ | doi = {10.1109/MTS.2018.2857600}, | ||
+ | abstract = {IEEE Technology and Society Magazine;2018;37;3;10.1109/MTS.2018.2857600}, | ||
+ | number = {3}, | ||
+ | journal = {IEEE Technology and Society Magazine}, | ||
+ | author = {éCarroll, Fiona and Webb, Margaret and Cropper, Simon}, | ||
+ | year = {2018}, | ||
+ | pages = {29--37}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{balabanovaS3414582MAThesisImagingandImagingSecurity, | ||
+ | title = {S3414582MAThesisImagingandImagingSecurity}, | ||
+ | author = {Balabanova, Hristina}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{wolff-michaelrothandg.michaelbowenDigitizingLizards, | ||
+ | title = {Digitizing Lizards}, | ||
+ | abstract = {Soc Stud Sci 1999.29:719-764}, | ||
+ | author = {{Wolff-Michael Roth and G. Michael Bowen}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{MolLaw1994, | ||
+ | title = {Mol and Law - 1994 - Regions, Networks and Fluids Anaemia and Social T}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{axonDataPresentationSecurity2020a, | ||
+ | title = {Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice}, | ||
+ | volume = {6}, | ||
+ | issn = {2057-2085}, | ||
+ | doi = {10.1093/cybsec/tyaa004}, | ||
+ | number = {1}, | ||
+ | journal = {Journal of Cybersecurity}, | ||
+ | author = {Axon, Louise and AlAhmadi, Bushra A. and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie}, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{kublerStateUrgencySurveillance2017a, | ||
+ | title = {State of urgency: Surveillance, power, and algorithms in France’s state of emergency}, | ||
+ | volume = {4}, | ||
+ | issn = {2053-9517}, | ||
+ | doi = {10.1177/2053951717736338}, | ||
+ | abstract = {Big Data \& Society 2017.4:2053951717736338}, | ||
+ | number = {2}, | ||
+ | journal = {Big Data \& Society}, | ||
+ | author = {Kubler, Kyle}, | ||
+ | year = {2017}, | ||
+ | keywords = {surveillance, algorithm, France, i2 Analyst’s Notebook, police, state of emergency}, | ||
+ | pages = {205395171773633}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@incollection{hepworthMakeMeCare2020, | ||
+ | address = {Cham, Switzerland}, | ||
+ | series = {LNCS sublibrary: SL 3, Information systems and applications, incl. internet/web, and HCI}, | ||
+ | title = {Make Me Care: Ethical Visualization for Impact in the Sciences and Data Sciences}, | ||
+ | volume = {12200}, | ||
+ | isbn = {978-3-030-49712-5}, | ||
+ | number = {12200}, | ||
+ | booktitle = {Design, user experience, and usability. Interaction design : 9th International Conference, DUXU 2020, held as part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19-24, 2020, Proceedings. Part I / Aaron Marcus, Elizabeth Rosenzweig (eds.)}, | ||
+ | publisher = {Springer}, | ||
+ | author = {Hepworth, Katherine J.}, | ||
+ | editor = {Marcus, Aaron and Rosenzweig, Elizabeth}, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{amooreCloudEthicsAlgorithms2020, | ||
+ | address = {Durham}, | ||
+ | title = {Cloud Ethics: Algorithms and the Attributes of Ourselves and Others}, | ||
+ | isbn = {978-1-4780-0831-6}, | ||
+ | shorttitle = {Cloud Ethics}, | ||
+ | abstract = {In Cloud Ethics Louise Amoore examines how machine learning algorithms are transforming the ethics and politics of contemporary society. Conceptualizing algorithms as ethicopolitical entities that are entangled with the data attributes of people, Amoore outlines how algorithms give incomplete accounts of themselves, learn through relationships with human practices, and exist in the world in ways that exceed their source code. In these ways, algorithms and their relations to people cannot be understood by simply examining their code, nor can ethics be encoded into algorithms. Instead, Amoore locates the ethical responsibility of algorithms in the conditions of partiality and opacity that haunt both human and algorithmic decisions. To this end, she proposes what she calls cloud ethics—an approach to holding algorithms accountable by engaging with the social and technical conditions under which they emerge and operate.}, | ||
+ | language = {English}, | ||
+ | publisher = {Duke University Press Books}, | ||
+ | author = {Amoore, Louise}, | ||
+ | month = may, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{strangeCreativeResearchRadical, | ||
+ | title = {Creative research: A radical subjectivity?}, | ||
+ | author = {Strange, Shane}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{wahlbergDocumentaryTime2008, | ||
+ | address = {Minneapolis}, | ||
+ | series = {Visible evidence}, | ||
+ | title = {Documentary time}, | ||
+ | volume = {21}, | ||
+ | isbn = {0-8166-4969-3}, | ||
+ | abstract = {9780816649686}, | ||
+ | publisher = {University of Minnesota Press}, | ||
+ | author = {Wahlberg, Malin}, | ||
+ | year = {2008}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{wilcoxEmbodyingAlgorithmicWar2017, | ||
+ | title = {Embodying algorithmic war: Gender, race, and the posthuman in drone warfare}, | ||
+ | volume = {48}, | ||
+ | issn = {0967-0106}, | ||
+ | doi = {10.1177/0967010616657947}, | ||
+ | number = {1}, | ||
+ | journal = {Security Dialogue}, | ||
+ | author = {Wilcox, Lauren}, | ||
+ | year = {2017}, | ||
+ | pages = {11--28}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@phdthesis{mansouxSandboxCultureStudy2017, | ||
+ | address = {London}, | ||
+ | title = {Sandbox Culture: A Study of the Application of Free and Open Source Software Licensing Ideas to Art and Cultural Production}, | ||
+ | school = {Goldsmiths College, University of London}, | ||
+ | author = {Mansoux, Aymeric}, | ||
+ | month = feb, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{blipparWhatComputerVision, | ||
+ | title = {What is Computer Vision – Post 5: A Very Quick History - Blog - Blippar}, | ||
+ | author = {{Blippar}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{lahireMondePluriel2012, | ||
+ | address = {Paris}, | ||
+ | series = {La couleur des idées}, | ||
+ | title = {Monde pluriel}, | ||
+ | isbn = {978-2-02-107960-9}, | ||
+ | publisher = {Éditions du Seuil}, | ||
+ | author = {Lahire, Bernard}, | ||
+ | year = {2012}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{bynicholasmirzoeffVisualCultureReader, | ||
+ | title = {The visual culture reader}, | ||
+ | author = {{By Nicholas Mirzoeff}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{millerLAPDEndControversial, | ||
+ | title = {LAPD to end controversial program that aimed to predict crime}, | ||
+ | url = {https://www.latimes.com/california/story/2020-04-21/lapd-ends-predictive-policing-program}, | ||
+ | abstract = {Chief Moore says, due to financial constraints caused by the pandemic, the LAPD will end a program that predicts where property crimes could occur.}, | ||
+ | urldate = {2020-04-21}, | ||
+ | author = {Miller, Leila}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{nathCameraWeaponWays2019, | ||
+ | title = {Camera as weapon: ways of seeing in Kashmir}, | ||
+ | volume = {13}, | ||
+ | issn = {1750-3280}, | ||
+ | doi = {10.1080/17503280.2019.1672922}, | ||
+ | number = {3}, | ||
+ | journal = {Studies in Documentary Film}, | ||
+ | author = {Nath, Anjali}, | ||
+ | year = {2019}, | ||
+ | pages = {268--282}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{boczkowskaMasterNarrativesDIY2019, | ||
+ | title = {From master narratives to DIY stories: on the post-digital sublime and database documentary in two city symphony films}, | ||
+ | issn = {1750-3280}, | ||
+ | doi = {10.1080/17503280.2019.1696147}, | ||
+ | abstract = {Studies in Documentary Film, 2019. doi:10.1080/17503280.2019.1696147}, | ||
+ | journal = {Studies in Documentary Film}, | ||
+ | author = {Boczkowska, Kornelia}, | ||
+ | year = {2019}, | ||
+ | pages = {1--16}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{chananMelancholyPoliticalDocumentarist2019, | ||
+ | title = {The melancholy of a political documentarist}, | ||
+ | volume = {13}, | ||
+ | issn = {1750-3280}, | ||
+ | doi = {10.1080/17503280.2019.1672916}, | ||
+ | number = {3}, | ||
+ | journal = {Studies in Documentary Film}, | ||
+ | author = {Chanan, Michael}, | ||
+ | year = {2019}, | ||
+ | pages = {196--213}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{hamblinSlowCinemaContemplative2019, | ||
+ | title = {Slow cinema and contemplative politics: radical documentary in the twenty-first century}, | ||
+ | volume = {13}, | ||
+ | issn = {1750-3280}, | ||
+ | doi = {10.1080/17503280.2019.1672917}, | ||
+ | abstract = {Studies in Documentary Film, 2019. doi:10.1080/17503280.2019.1672917}, | ||
+ | number = {3}, | ||
+ | journal = {Studies in Documentary Film}, | ||
+ | author = {Hamblin, Sarah}, | ||
+ | year = {2019}, | ||
+ | pages = {214--232}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{jurichPoeticDocumentaryVisual2019, | ||
+ | title = {Poetic documentary as visual ethnography: Liwaa Yazji’s Haunted ( Maskoon ) (2014)}, | ||
+ | issn = {1750-3280}, | ||
+ | doi = {10.1080/17503280.2019.1696146}, | ||
+ | abstract = {Studies in Documentary Film, 2019. doi:10.1080/17503280.2019.1696146}, | ||
+ | journal = {Studies in Documentary Film}, | ||
+ | author = {Jurich, Joscelyn}, | ||
+ | year = {2019}, | ||
+ | pages = {1--18}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{vanstoneThisWouldBe2019, | ||
+ | title = {‘This would be scary to any other culture … but to us it’s so cute!’ The radicalism of Fourth Cinema from Tangata Whenua to Angry Inuk}, | ||
+ | volume = {13}, | ||
+ | issn = {1750-3280}, | ||
+ | doi = {10.1080/17503280.2019.1672919}, | ||
+ | number = {3}, | ||
+ | journal = {Studies in Documentary Film}, | ||
+ | author = {Vanstone, Gail and Winston, Brian}, | ||
+ | year = {2019}, | ||
+ | pages = {233--249}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{watsonInterviewDaleHudson2019, | ||
+ | title = {Interview with Dale Hudson and Patricia R. Zimmermann}, | ||
+ | volume = {13}, | ||
+ | issn = {1750-3280}, | ||
+ | doi = {10.1080/17503280.2019.1672920}, | ||
+ | abstract = {Studies in Documentary Film, 2019. doi:10.1080/17503280.2019.1672920}, | ||
+ | number = {3}, | ||
+ | journal = {Studies in Documentary Film}, | ||
+ | author = {Watson, Ryan}, | ||
+ | year = {2019}, | ||
+ | pages = {250--267}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{genaroHarunFarockiOperador2016, | ||
+ | title = {Harun Farocki: operador de mídias}, | ||
+ | volume = {10}, | ||
+ | issn = {1982-2073}, | ||
+ | doi = {10.11606/issn.1982-8160.v10i2p115-134}, | ||
+ | number = {2}, | ||
+ | journal = {Matrizes}, | ||
+ | author = {Genaro, Ednei}, | ||
+ | year = {2016}, | ||
+ | pages = {115}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{nobleSocialChoiceMachine1978, | ||
+ | title = {Social Choice in Machine Design: The Case of Automatically Controlled Machine Tools, and a Challenge for Labor}, | ||
+ | volume = {8}, | ||
+ | abstract = {Politics \& Society 1978.8:313-347}, | ||
+ | number = {3-4}, | ||
+ | author = {Noble, David F.}, | ||
+ | year = {1978}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{hamblinIntroductionRadicalDocumentary2019, | ||
+ | title = {Introduction: radical documentary today}, | ||
+ | volume = {13}, | ||
+ | issn = {1750-3280}, | ||
+ | doi = {10.1080/17503280.2019.1673967}, | ||
+ | number = {3}, | ||
+ | journal = {Studies in Documentary Film}, | ||
+ | author = {Hamblin, Sarah and Watson, Ryan}, | ||
+ | year = {2019}, | ||
+ | pages = {187--195}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{watsonInterviewSharonDaniel2019, | ||
+ | title = {Interview with Sharon Daniel}, | ||
+ | volume = {13}, | ||
+ | issn = {1750-3280}, | ||
+ | doi = {10.1080/17503280.2019.1672924}, | ||
+ | number = {3}, | ||
+ | journal = {Studies in Documentary Film}, | ||
+ | author = {Watson, Ryan}, | ||
+ | year = {2019}, | ||
+ | pages = {283--289}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{fingasUtahPausesBanjo2020, | ||
+ | title = {Utah pauses Banjo's AI surveillance after learning of owner's racist past}, | ||
+ | url = {https://www.engadget.com/utah-suspends-use-of-banjo-surveillance-205243913.html}, | ||
+ | abstract = {Utah authorities have put use of Banjo's surveillance tech on hold while they investigate for bias due to the owner's racist past.}, | ||
+ | urldate = {2020-04-29}, | ||
+ | journal = {Engadget}, | ||
+ | author = {Fingas, Jon}, | ||
+ | month = apr, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{abu-el-haijaYouTube8MLargeScaleVideo27, | ||
+ | title = {YouTube-8M: A Large-Scale Video Classification Benchmark}, | ||
+ | abstract = {Many recent advancements in Computer Vision are attributed to large datasets. Open-source software packages for Machine Learning and inexpensive commodity hardware have reduced the barrier of entry for exploring novel approaches at scale. It is possible to train models over millions of examples within a few days. Although large-scale datasets exist for image understanding, such as ImageNet, there are no comparable size video classification datasets. In this paper, we introduce YouTube-8M, the largest multi-label video classification dataset, composed of {\textasciitilde}8 million videos (500K hours of video), annotated with a vocabulary of 4800 visual entities. To get the videos and their labels, we used a YouTube video annotation system, which labels videos with their main topics. While the labels are machine-generated, they have high-precision and are derived from a variety of human-based signals including metadata and query click signals. We filtered the video labels (Knowledge Graph entities) using both automated and manual curation strategies, including asking human raters if the labels are visually recognizable. Then, we decoded each video at one-frame-per-second, and used a Deep CNN pre-trained on ImageNet to extract the hidden representation immediately prior to the classification layer. Finally, we compressed the frame features and make both the features and video-level labels available for download. We trained various (modest) classification models on the dataset, evaluated them using popular evaluation metrics, and report them as baselines. Despite the size of the dataset, some of our models train to convergence in less than a day on a single machine using TensorFlow. We plan to release code for training a TensorFlow model and for computing metrics.}, | ||
+ | author = {Abu-El-Haija, Sami and Kothari, Nisarg and Lee, Joonseok and Natsev, Paul and Toderici, George and Varadarajan, Balakrishnan and Vijayanarasimhan, Sudheendra}, | ||
+ | month = sep, | ||
+ | pages = {10}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{broeckmannMachineArtistMyth2019, | ||
+ | title = {The Machine as Artist as Myth}, | ||
+ | volume = {8}, | ||
+ | doi = {10.3390/arts8010025}, | ||
+ | number = {1}, | ||
+ | journal = {Arts}, | ||
+ | author = {Broeckmann, Andreas}, | ||
+ | year = {2019}, | ||
+ | pages = {25}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{pantenburgFarockiGodardFilm2015, | ||
+ | title = {Farocki/Godard: Film as Theory}, | ||
+ | isbn = {978-90-8964-891-4}, | ||
+ | publisher = {Amsterdam University Press}, | ||
+ | author = {Pantenburg, Volker}, | ||
+ | year = {2015}, | ||
+ | doi = {10.5117/9789089648914}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{kristensenTouchingVirginPolitics2014, | ||
+ | title = {Touching the Virgin. On the politics of intimacy in Jean-Luc Godard's Hail Mary}, | ||
+ | volume = {13}, | ||
+ | issn = {17554586}, | ||
+ | doi = {10.1016/j.emospa.2013.12.003}, | ||
+ | abstract = {Emotion, Space and Society, 13 (2014) 134-139. doi:10.1016/j.emospa.2013.12.003}, | ||
+ | journal = {Emotion, Space and Society}, | ||
+ | author = {Kristensen, Stefan}, | ||
+ | year = {2014}, | ||
+ | pages = {134--139}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{bechMerleauPontyManylayeredPresence, | ||
+ | title = {Merleau-Ponty’s many-layered presence in Bourdieu’s thought}, | ||
+ | urldate = {2017-01-01}, | ||
+ | author = {Bech, Josep Maria}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{braeunertSeeBeingSeen, | ||
+ | title = {To See Without Being Seen: Critical Concepts and Curatorial Approaches Informing the Exhibition on Contemporary Art, Drones, and Surveillance}, | ||
+ | journal = {Media-N}, | ||
+ | author = {Braeunert, Svea and Malone, Meredith}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@phdthesis{schonigCinemaMotionForms2017, | ||
+ | address = {Chicago}, | ||
+ | type = {Ph.D.}, | ||
+ | title = {Cinema's Motion Forms: Film Theory, the Digital Turn and the Possibilities of Cinematic Movement}, | ||
+ | school = {University of Chicago}, | ||
+ | author = {Schonig, Jordan}, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{marcoulatosMerleauPontyBourdieuEmbodied2001, | ||
+ | title = {Merleau-Ponty and Bourdieu on Embodied Significance}, | ||
+ | volume = {31}, | ||
+ | number = {1}, | ||
+ | journal = {Journal for the Theory of Social Behaviour}, | ||
+ | author = {Marcoulatos, Iordanis}, | ||
+ | year = {2001}, | ||
+ | pages = {1--27}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{melanconThinkingCorporeallySocially2014, | ||
+ | title = {Thinking Corporeally, Socially, and Politically: Critical Phenomenology after Merleau-Ponty and Bourdieu}, | ||
+ | volume = {8}, | ||
+ | abstract = {Bulletin d’analyse phénoménologique X (2014) 8}, | ||
+ | journal = {Bulletin d’analyse phénoménologique}, | ||
+ | author = {Melançon, Jérme}, | ||
+ | year = {2014}, | ||
+ | pages = {1--28}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@phdthesis{jeandreeExperiencingContingencyPolitical2016, | ||
+ | address = {London}, | ||
+ | type = {Ph.D.}, | ||
+ | title = {Experiencing Contingency: Towards a Political Theory of Images}, | ||
+ | school = {Goldsmiths College, University of London}, | ||
+ | author = {Jeandrée, Philipp}, | ||
+ | year = {2016}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{crossleyPhenomenologicalHabitusIts2001, | ||
+ | title = {The Phenomenological Habitus and Its Construction}, | ||
+ | volume = {30}, | ||
+ | number = {1}, | ||
+ | journal = {Theory and Society}, | ||
+ | author = {Crossley, Nick}, | ||
+ | year = {2001}, | ||
+ | pages = {81--120}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{merleau-pontyPrimacyPerception1964, | ||
+ | address = {Evanston, Ill.}, | ||
+ | series = {Northwestern University studies in phenomenology and existential philosophy}, | ||
+ | title = {The primacy of perception}, | ||
+ | isbn = {978-0-8101-0164-7}, | ||
+ | publisher = {Northwestern Univ. Pr}, | ||
+ | author = {Merleau-Ponty, Maurice}, | ||
+ | year = {1964}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{farockiHarunFarocki2004, | ||
+ | address = {Amsterdam}, | ||
+ | series = {Film culture in transition}, | ||
+ | title = {Harun Farocki}, | ||
+ | isbn = {90-5356-636-8}, | ||
+ | publisher = {Amsterdam University Press}, | ||
+ | author = {Farocki, Harun and Elsaesser, Thomas}, | ||
+ | year = {2004}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{haylesMaterialityInformatics1993, | ||
+ | title = {The Materiality of Informatics}, | ||
+ | volume = {1}, | ||
+ | number = {1}, | ||
+ | journal = {Configurations}, | ||
+ | author = {Hayles, Katherine}, | ||
+ | year = {1993}, | ||
+ | pages = {1--20}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{rancierePartageSensible2000, | ||
+ | address = {Paris}, | ||
+ | title = {Le partage du sensible}, | ||
+ | isbn = {2-913372-05-8}, | ||
+ | publisher = {Fabrique : Diffusion Les Belles Lettres}, | ||
+ | author = {Rancière, Jacques}, | ||
+ | year = {2000}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{benjaminUnderstandingBrecht1998, | ||
+ | address = {London}, | ||
+ | title = {Understanding Brecht}, | ||
+ | isbn = {1-85984-814-1}, | ||
+ | language = {eng ger}, | ||
+ | publisher = {Verso}, | ||
+ | author = {Benjamin, Walter}, | ||
+ | year = {1998}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{ranciereIgnorantSchoolmaster1991, | ||
+ | address = {Stanford Calif.}, | ||
+ | title = {The ignorant schoolmaster}, | ||
+ | isbn = {0-8047-1969-1}, | ||
+ | language = {eng}, | ||
+ | publisher = {Stanford University Press}, | ||
+ | author = {Rancière, Jacques}, | ||
+ | year = {1991}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{benjaminWorkArtAge, | ||
+ | title = {The Work of Art in the Age of Mechanical Reproduction}, | ||
+ | doi = {10.4135/9781446269534.n3}, | ||
+ | author = {Benjamin, Walter}, | ||
+ | pages = {25--33}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{rascaroliEssayFilmProblems2008, | ||
+ | title = {The Essay Film: Problems, Definitions, Textual Commitments}, | ||
+ | volume = {49}, | ||
+ | doi = {10.1353/frm.0.0019}, | ||
+ | number = {2}, | ||
+ | journal = {Framework: The Journal of Cinema and Media}, | ||
+ | author = {Rascaroli, Laura}, | ||
+ | year = {2008}, | ||
+ | pages = {24--47}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{rancierePoliticsAestheticsBloomsbury, | ||
+ | title = {The Politics of Aesthetics (Bloomsbury Revelations)}, | ||
+ | author = {Rancière, Jacques}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@incollection{arendtLaborWorkAction1987, | ||
+ | address = {Boston; Hingham, MA}, | ||
+ | series = {Martinus Nijhoff philosophy library}, | ||
+ | title = {Labor, Work, Action}, | ||
+ | isbn = {978-94-009-3565-5}, | ||
+ | number = {26}, | ||
+ | booktitle = {Amor mundi. Explorations in the faith and thought of Hannah Arendt}, | ||
+ | publisher = {M. Nijhoff}, | ||
+ | author = {Arendt, Hannah}, | ||
+ | editor = {Bernauer, James William}, | ||
+ | year = {1987}, | ||
+ | pages = {167--181}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{derridaArchiveFeverFreudian1995, | ||
+ | title = {Archive Fever: A Freudian Impression}, | ||
+ | volume = {25}, | ||
+ | number = {2}, | ||
+ | journal = {Diacritics}, | ||
+ | author = {Derrida, Jacques}, | ||
+ | year = {1995}, | ||
+ | pages = {9--63}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{mitchellWhatImage1984, | ||
+ | title = {What Is an Image?}, | ||
+ | volume = {15}, | ||
+ | number = {3}, | ||
+ | journal = {New Literary History}, | ||
+ | author = {Mitchell, W. J. Thomas}, | ||
+ | year = {1984}, | ||
+ | pages = {503--537}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{makelaReflectingMakingArtistic2011, | ||
+ | title = {On Reflecting and Making in Artistic Research}, | ||
+ | volume = {7}, | ||
+ | number = {1}, | ||
+ | journal = {Journal of Research Practice}, | ||
+ | author = {Mäkelä, Maarit and Nimkulrat, Nithikul and Dash, D. P. and Nsenga, François-X}, | ||
+ | year = {2011}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{orileyDiscreteContinuityRelation2011, | ||
+ | title = {A Discrete Continuity: On the Relation Between Research and Art Practice}, | ||
+ | volume = {7}, | ||
+ | number = {1}, | ||
+ | journal = {Journal of Research Practice}, | ||
+ | author = {O'Riley, Tim}, | ||
+ | year = {2011}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{alfierCriticalPracticalAnalogy2011, | ||
+ | title = {Critical Practical Analogy: A Research Tool for Reflecting and Making}, | ||
+ | volume = {7}, | ||
+ | number = {1}, | ||
+ | journal = {Journal of Research Practice}, | ||
+ | author = {Alfier, Dino}, | ||
+ | year = {2011}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{lefevre-berthelotAudioVisualDisembodiedVoices2013, | ||
+ | title = {Audio-Visual: Disembodied Voices in Theory}, | ||
+ | volume = {4}, | ||
+ | journal = {InMedia}, | ||
+ | author = {Le Fèvre-Berthelot, Anaïs}, | ||
+ | year = {2013}, | ||
+ | pages = {1--18}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{tomlinsonMillionYearsMusic2015, | ||
+ | address = {New York; Cambridge, Massachusetts; London, England}, | ||
+ | edition = {First paperback edition}, | ||
+ | title = {A million years of music}, | ||
+ | isbn = {978-1-890951-52-5}, | ||
+ | publisher = {Zone Books}, | ||
+ | author = {Tomlinson, Gary}, | ||
+ | year = {2015}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{ranciereEmancipatedSpectatorMagazine2009, | ||
+ | address = {London}, | ||
+ | title = {The emancipated spectator (Magazine Summary)}, | ||
+ | isbn = {978-1-84467-343-8}, | ||
+ | publisher = {Verso}, | ||
+ | author = {Rancière, Jacques}, | ||
+ | year = {2009}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{ranciereEmancipatedSpectator2009, | ||
+ | address = {London}, | ||
+ | title = {The emancipated spectator}, | ||
+ | isbn = {978-1-84467-343-8}, | ||
+ | publisher = {Verso}, | ||
+ | author = {Rancière, Jacques}, | ||
+ | year = {2009}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{reitzWordFilm1988, | ||
+ | title = {Word and Film}, | ||
+ | volume = {46}, | ||
+ | issn = {01622870}, | ||
+ | doi = {10.2307/778679}, | ||
+ | journal = {October}, | ||
+ | author = {Reitz, Edgar and Kluge, Alexander and Reinke, Wilfried and Hansen, Miriam}, | ||
+ | year = {1988}, | ||
+ | pages = {83}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{bucklandConversationsChristianMetz2017, | ||
+ | address = {Amsterdam}, | ||
+ | series = {Film Theory in Media History}, | ||
+ | title = {Conversations with Christian Metz}, | ||
+ | isbn = {978-90-8964-825-9}, | ||
+ | url = {https://ebookcentral.proquest.com/lib/gbv/detail.action?docID=5216299}, | ||
+ | language = {eng}, | ||
+ | publisher = {Amsterdam University Press}, | ||
+ | author = {Buckland, Warren and Fairfax, Daniel}, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{fosterThinkingMakingUnmaking, | ||
+ | title = {Thinking Through Making: Unmaking and Remaking the Everyday}, | ||
+ | urldate = {2015-01-01}, | ||
+ | author = {Foster, Andrew}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{grasseniSkilledVisions2007, | ||
+ | address = {Oxford}, | ||
+ | series = {Learning fields}, | ||
+ | title = {Skilled visions}, | ||
+ | volume = {v. 6}, | ||
+ | isbn = {978-1-84545-210-0}, | ||
+ | publisher = {Berghahn}, | ||
+ | author = {Grasseni, Cristina}, | ||
+ | year = {2007}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{jonasNobilitySight1954, | ||
+ | title = {The Nobility of Sight}, | ||
+ | volume = {14}, | ||
+ | issn = {00318205}, | ||
+ | doi = {10.2307/2103230}, | ||
+ | number = {4}, | ||
+ | journal = {Philosophy and Phenomenological Research}, | ||
+ | author = {Jonas, Hans}, | ||
+ | year = {1954}, | ||
+ | pages = {507}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{deleuzeThreeQuestionsSix2015, | ||
+ | title = {Three questions about Six fois deux}, | ||
+ | volume = {3}, | ||
+ | number = {7}, | ||
+ | journal = {Cinema Comparat/ive Cinema}, | ||
+ | author = {Deleuze, Gilles}, | ||
+ | year = {2015}, | ||
+ | pages = {12--15}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{estalellaExperimentalCollaborations2018, | ||
+ | address = {New York}, | ||
+ | series = {Easa series}, | ||
+ | title = {Experimental collaborations}, | ||
+ | isbn = {978-1-78533-853-3}, | ||
+ | publisher = {Berghahn Books}, | ||
+ | editor = {Estalella, Adolfo and Criado, Tomas Sanchez}, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{castlemanDigitalImageProcessing1996, | ||
+ | address = {Upper Saddle River (New Jersey)}, | ||
+ | title = {Digital image processing}, | ||
+ | isbn = {978-0-13-398058-5}, | ||
+ | publisher = {Prentice Hall}, | ||
+ | author = {Castleman, Kenneth R.}, | ||
+ | year = {1996}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{bogersCriticalMakers2019, | ||
+ | address = {Amsterdam}, | ||
+ | title = {The critical makers}, | ||
+ | isbn = {978-94-92302-36-6}, | ||
+ | publisher = {Amsterdam University of Applied Sciences}, | ||
+ | author = {Bogers, Loes}, | ||
+ | year = {2019}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{halberstamQueerArtFailure2011, | ||
+ | address = {Durham NC}, | ||
+ | title = {The queer art of failure}, | ||
+ | isbn = {978-0-8223-5028-6}, | ||
+ | publisher = {Duke University Press}, | ||
+ | author = {Halberstam, Judith}, | ||
+ | year = {2011}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{ingoldMaking2013, | ||
+ | address = {London; New York}, | ||
+ | title = {Making}, | ||
+ | isbn = {978-0-415-56723-7}, | ||
+ | publisher = {Routledge}, | ||
+ | author = {Ingold, Tim}, | ||
+ | year = {2013}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{antunesMultisensoryFilmExperience2016, | ||
+ | address = {Bristol UK}, | ||
+ | title = {The multisensory film experience}, | ||
+ | isbn = {1-78320-628-4}, | ||
+ | publisher = {Intellect}, | ||
+ | author = {Antunes, Luis Rocha}, | ||
+ | year = {2016}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{rugoPhilosophyPatienceFilm2016, | ||
+ | address = {London}, | ||
+ | title = {Philosophy and the Patience of Film in Cavell and Nancy}, | ||
+ | isbn = {978-1-137-58059-7}, | ||
+ | publisher = {Palgrave Macmillan UK}, | ||
+ | author = {Rugo, Daniele}, | ||
+ | year = {2016}, | ||
+ | doi = {10.1057/978-1-137-58060-3}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{mcdonaldFilmTheory2016, | ||
+ | address = {London}, | ||
+ | series = {The basics}, | ||
+ | title = {Film theory}, | ||
+ | isbn = {978-1-138-79733-8}, | ||
+ | publisher = {Routledge}, | ||
+ | author = {McDonald, Kevin}, | ||
+ | year = {2016}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{201201Godard, | ||
+ | title = {2012.01: Godard et Bourdieu, 1993-2002 - Pour Jean-Luc Godard}, | ||
+ | url = {https://sites.google.com/site/dossierjeanlucgodard/1-varia/2012-01-godard-et-bourdieu-1993-2002}, | ||
+ | abstract = {Dossier sur le cinéaste}, | ||
+ | urldate = {2020-04-23}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{grasseniSkilledVisionApprenticeship2004, | ||
+ | title = {Skilled vision. An apprenticeship in breeding aesthetics}, | ||
+ | volume = {12}, | ||
+ | issn = {0964-0282}, | ||
+ | doi = {10.1017/S0964028204000035}, | ||
+ | number = {1}, | ||
+ | journal = {Social Anthropology}, | ||
+ | author = {Grasseni, Cristina}, | ||
+ | year = {2004}, | ||
+ | pages = {41--55}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{cavellWorldViewed1979, | ||
+ | address = {Cambridge}, | ||
+ | edition = {Enl. ed.}, | ||
+ | title = {The world viewed}, | ||
+ | isbn = {0-674-96196-X}, | ||
+ | publisher = {Harvard University Press}, | ||
+ | author = {Cavell, Stanley}, | ||
+ | year = {1979}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{rothmanReadingCavellWorld2000, | ||
+ | address = {Detroit}, | ||
+ | series = {Contemporary film and television series}, | ||
+ | title = {Reading Cavell's The world viewed}, | ||
+ | isbn = {978-0-8143-2896-5}, | ||
+ | publisher = {Wayne State University Press}, | ||
+ | author = {Rothman, William and Cavell, Stanley and Keane, Marian}, | ||
+ | year = {2000}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{ederImageOperations2016, | ||
+ | address = {Manchester}, | ||
+ | title = {Image operations}, | ||
+ | isbn = {978-1-5261-0721-3}, | ||
+ | publisher = {Manchester University Press}, | ||
+ | author = {Eder, Jens and Klonk, Charlotte}, | ||
+ | year = {2016}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{grasseniSkilledVisionApprenticeship2004a, | ||
+ | title = {Skilled vision. An apprenticeship in breeding aesthetics}, | ||
+ | volume = {12}, | ||
+ | issn = {0964-0282}, | ||
+ | doi = {10.1017/S0964028204000035}, | ||
+ | number = {1}, | ||
+ | journal = {Social Anthropology}, | ||
+ | author = {Grasseni, Cristina}, | ||
+ | year = {2004}, | ||
+ | pages = {41--55}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ngClearviewAISays2020, | ||
+ | title = {Clearview AI says the First Amendment lets it scrape the internet. Lawyers disagree}, | ||
+ | url = {https://www.cnet.com/news/clearview-says-first-amendment-lets-it-scrape-the-internet-lawyers-disagree/?ServiceType=twitter&PostType=link&ftag=COS-05-10aaa0b&TheTime=2020-02-06T13%3A48%3A57&UniqueID=6C4224B6-48E7-11EA-B950-78F2923C408C}, | ||
+ | abstract = {Earlier court cases have permitted data scraping. But never for facial recognition.}, | ||
+ | urldate = {2020-06-27}, | ||
+ | journal = {CNET}, | ||
+ | author = {Ng, Alfred}, | ||
+ | month = feb, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{hillClearviewFacialRecognition2020, | ||
+ | title = {Clearview’s Facial Recognition App Is Identifying Child Victims of Abuse}, | ||
+ | issn = {1553-8095}, | ||
+ | url = {https://www.nytimes.com/2020/02/07/business/clearview-facial-recognition-child-sexual-abuse.html}, | ||
+ | abstract = {Though a breakthrough for law enforcement, the technique could allow the little-known start-up to collect an extraordinarily sensitive set of data and images.}, | ||
+ | urldate = {2020-06-27}, | ||
+ | journal = {The New York Times}, | ||
+ | author = {Hill, Kashmir and J.X., Gabriel}, | ||
+ | month = feb, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ngClearviewAIHit2020, | ||
+ | title = {Clearview AI hit with cease-and-desist from Google, Facebook over facial recognition collection}, | ||
+ | url = {https://www.cnet.com/news/clearview-ai-hit-with-cease-and-desist-from-google-over-facial-recognition-collection/}, | ||
+ | abstract = {In an interview with CBS This Morning, Clearview AI's founder says it's his right to collect photos for the facial recognition app.}, | ||
+ | urldate = {2020-06-27}, | ||
+ | journal = {CNET}, | ||
+ | author = {Ng, Alfred}, | ||
+ | month = feb, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{steeleRecommendedReadingWhen2020, | ||
+ | title = {Recommended Reading: When facial recognition identifies the wrong person}, | ||
+ | url = {https://www.engadget.com/recommended-reading-when-facial-recognition-identifies-the-wrong-person-140009993.html?guccounter=1}, | ||
+ | abstract = {Law enforcement at all levels are employing facial recognition for a variety of things. When the US and countries around the world began to shut down, tech companies of all sizes announced plans to help. The Atlantic explains the motives.}, | ||
+ | urldate = {2020-06-28}, | ||
+ | journal = {Engadget}, | ||
+ | author = {Steele, Billy}, | ||
+ | month = jun, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{foerBigTechPandemic2020, | ||
+ | title = {Big Tech’s Pandemic Power Grab}, | ||
+ | url = {https://www.theatlantic.com/magazine/archive/2020/07/big-tech-pandemic-power-grab/612238/}, | ||
+ | abstract = {The firms are all too eager to help the government manage the coronavirus crisis.}, | ||
+ | urldate = {2020-06-28}, | ||
+ | journal = {The Atlantic}, | ||
+ | author = {Foer, Franklin}, | ||
+ | month = jun, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{simoniteAmazonJoinsMicrosoft2019, | ||
+ | title = {Amazon Joins Microsoft's Call for Rules on Facial Recognition}, | ||
+ | url = {https://www.wired.com/story/amazon-joins-microsofts-call-rules-facial-recognition/}, | ||
+ | abstract = {Amazon, which offers facial recognition services, asks Congress to regulate how the technology can be used appropriately.}, | ||
+ | urldate = {2020-06-27}, | ||
+ | journal = {WIRED}, | ||
+ | author = {Simonite, Tom}, | ||
+ | month = feb, | ||
+ | year = {2019}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{haMicrosoftBradSmith2020, | ||
+ | title = {Microsoft's Brad Smith says company will not sell facial recognition tech to police}, | ||
+ | url = {https://techcrunch.com/2020/06/11/microsofts-brad-smith-says-company-will-not-sell-facial-recognition-tech-to-police/}, | ||
+ | abstract = {Microsoft is joining IBM and Amazon in taking a position against the use of facial recognition technology by law enforcement — at least, until more regulation is in place. During a remote interview at a Washington Post Live event this morning, the company’s president Brad Smith said Microsoft has already been taking a “principled stand” […]}, | ||
+ | urldate = {2020-06-27}, | ||
+ | journal = {TechCrunch}, | ||
+ | author = {Ha, Anthony}, | ||
+ | month = jun, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{hillSecretiveCompanyThat2020, | ||
+ | title = {The Secretive Company That Might End Privacy as We Know It}, | ||
+ | issn = {1553-8095}, | ||
+ | url = {https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-recognition.html}, | ||
+ | abstract = {A little-known start-up helps law enforcement match photos of unknown people to their online images — and “might lead to a dystopian future or something,” a backer says.}, | ||
+ | urldate = {2020-06-27}, | ||
+ | journal = {The New York Times}, | ||
+ | author = {Hill, Kashmir}, | ||
+ | month = jan, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{macClearviewAIOnce2020, | ||
+ | title = {Clearview AI Once Told Cops To “Run Wild” With Its Facial Recognition Tool}, | ||
+ | url = {https://www.buzzfeednews.com/article/ryanmac/clearview-ai-cops-run-wild-facial-recognition-lawsuits}, | ||
+ | abstract = {One of Clearview AI's investors defended the company, “We do not have to be hidden to be free.”}, | ||
+ | urldate = {2020-06-27}, | ||
+ | journal = {BuzzFeed News}, | ||
+ | author = {Mac, Ryan}, | ||
+ | month = jan, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{adamsObjectiveAlgorithmsAre2020, | ||
+ | title = {Objective Algorithms Are a Myth - OneZero}, | ||
+ | url = {https://onezero.medium.com/objective-algorithms-are-a-myth-22b2c3e3d702}, | ||
+ | abstract = {The protests across the U.S. and around the globe in the wake of the murder of George Floyd have raised awareness about structural inequalities. Though the specific focus has been on police…}, | ||
+ | urldate = {2020-01-07}, | ||
+ | journal = {OneZero}, | ||
+ | author = {Adams, Joshua}, | ||
+ | month = jun, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{morsePoliceUseFacialrecognitiona, | ||
+ | title = {Police use facial-recognition tech to arrest another innocent man}, | ||
+ | url = {https://mashable.com/article/arrested-facial-recognition-technology/}, | ||
+ | abstract = {For the second time in less than three weeks, it was revealed that Detroit police used faulty technology to arrest the wrong man.}, | ||
+ | language = {en}, | ||
+ | urldate = {2020-07-13}, | ||
+ | author = {Morse, Jack}, | ||
+ | note = {Publication Title: Mashable}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{OpinionWeNowa, | ||
+ | title = {Opinion {\textbar} We now have evidence of facial recognition’s harm. Time for lawmakers to act}, | ||
+ | issn = {0190-8286}, | ||
+ | url = {https://www.washingtonpost.com/opinions/we-now-have-evidence-of-facial-recognitions-harm-time-for-lawmakers-to-act/2020/07/05/e62ee8d0-baf8-11ea-80b9-40ece9a701dc_story.html}, | ||
+ | abstract = {Lawmakers must regulate facial recognition technology, or more wrongful arrests are coming.}, | ||
+ | language = {en-US}, | ||
+ | urldate = {2020-07-13}, | ||
+ | journal = {Washington Post}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{barbaschowBooyaaaAustralianFederal2020, | ||
+ | title = {'Booyaaa': Australian Federal Police use of Clearview AI detailed}, | ||
+ | url = {https://www.zdnet.com/article/booyaaa-australian-federal-police-use-of-clearview-ai-detailed/}, | ||
+ | author = {Barbaschow, Asha}, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@phdthesis{caineGranualRealism2019, | ||
+ | address = {London}, | ||
+ | title = {Granual Realism}, | ||
+ | school = {Goldsmiths College, University of London}, | ||
+ | author = {Caine, Ariel}, | ||
+ | year = {2019}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{NYLawmakersVote2020, | ||
+ | title = {NY lawmakers vote to pause facial recognition in schools - Business Insider}, | ||
+ | url = {https://www.businessinsider.com/ny-lawmakers-vote-to-pause-facial-recognition-in-schools-2020-7?international=true&r=US&IR=T}, | ||
+ | abstract = {The New York Legislature has passed a two-year moratorium on the use of facial recognition in schools.}, | ||
+ | urldate = {2020-07-27}, | ||
+ | journal = {Business Insider}, | ||
+ | month = jul, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{mcbrideHowSonyFueling2020, | ||
+ | title = {How Sony Is Fueling The Computer Vision Boom}, | ||
+ | url = {https://www.forbes.com/sites/stephenmcbride1/2020/07/30/how-sony-is-fueling-the-computer-vision-boom/}, | ||
+ | abstract = {He didn’t know it at the time, but in 1990 Eric Fossum started a revolution.}, | ||
+ | urldate = {2020-01-08}, | ||
+ | journal = {Forbes}, | ||
+ | author = {McBride, Stephen}, | ||
+ | month = jul, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{crainsnewyorkbusinessMacySuedUse2020, | ||
+ | title = {Macy’s sued over use of Clearview facial-recognition software}, | ||
+ | url = {https://www.crainsnewyork.com/technology/macys-sued-over-use-clearview-facial-recognition-software}, | ||
+ | urldate = {2020-09-08}, | ||
+ | author = {{Crain's New York Business}}, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{perreauBourdieuPhenomenologieTheorie, | ||
+ | title = {Bourdieu et la phénoménologie. Théorie du sujet social (French Edition)}, | ||
+ | author = {Perreau, Laurent}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{josepmariabechDRAFTMerleauPontysmanylayeredpresenceinBourdieusthoughtNOV2017, | ||
+ | title = {DRAFTMerleau-Pontysmany-layeredpresenceinBourdieusthoughtNOV2017}, | ||
+ | author = {{JOSEP MARIA BECH}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{eisensteinNotesFilmCapital1976, | ||
+ | title = {Notes for a Film of "Capital"}, | ||
+ | volume = {2}, | ||
+ | issn = {01622870}, | ||
+ | doi = {10.2307/778416}, | ||
+ | journal = {October}, | ||
+ | author = {Eisenstein, Sergei and Sliwowski, Maciej and Leyda, Jay and Michelson, Annette}, | ||
+ | year = {1976}, | ||
+ | pages = {3}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{vandijckCultureConnectivity2013, | ||
+ | address = {Oxford; New York}, | ||
+ | title = {The culture of connectivity}, | ||
+ | isbn = {978-0-19-997078-0}, | ||
+ | publisher = {Oxford University Press}, | ||
+ | author = {van Dijck, José}, | ||
+ | year = {2013}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{sinnerbrinkNewPhilosophiesFilm2011, | ||
+ | address = {London}, | ||
+ | title = {New philosophies of film}, | ||
+ | isbn = {0-07-143795-9}, | ||
+ | abstract = {The relationship between film and philosophy has become a topic of intense intellectual interest. But how should we understand this relationship? Can philosophy renew our understanding of film? Can film challenge or even transform how we understand philosophy? New Philosophies of Film explores these questions in relation to both analytic and Continental philosophies of film, arguing that the best way to overcome their mutual antagonism is by constructing a more pluralist film-philosophy grounded in detailed engagement with particular films. Sinnerbrink not only provides lucid critical analyses}, | ||
+ | language = {eng}, | ||
+ | publisher = {Continuum}, | ||
+ | author = {Sinnerbrink, Robert}, | ||
+ | year = {2011}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{alterEssaysEssayFilm2017, | ||
+ | address = {New York}, | ||
+ | series = {Film and culture}, | ||
+ | title = {Essays on the essay film}, | ||
+ | isbn = {978-0-231-17267-7}, | ||
+ | url = {https://ebookcentral.proquest.com/lib/gbv/detail.action?docID=5276096}, | ||
+ | abstract = {Intro -- Table of Contents -- Introduction, by Nora M. Alter and Timothy Corrigan -- Part I. Foundations -- 1. âOn the Nature and Form of the Essay,â by Georg Lukács -- 2. The Man Without Qualities, by Robert Musil -- 3. âOn the Essay and Its Prose,â by Max Bense -- 4. âThe Essay as Form,â by Theodor W. Adorno -- 5. âPreface to The Collected Essays of Aldous Huxley,â by Aldous Huxley -- Part II. The Essay Film Through History -- 6. âThe Film Essay: A New Type of Documentary Film,â by Hans Richter -- 7. âThe Future of Cinema,â by Alexandre Astruc -- 8. âBazin on Marker,â by André Bazin -- Part III. Contemporary Positions -- 9. âIn Search of the Centaur: The Essay-Film,â by Phillip Lopate -- 10. âThe Political Im/Perceptible in the Essay Film: Farockiâs Images of the World and the Inscription of War,â by Nora M. Alter -- 11. âEssay Questions,â by Paul Arthur -- 12. âThe Electronic Essay,â by Michael Renov -- 13. âThe Essay Film: Problems, Definitions, Textual Commitments,â by Laura Rascaroli -- 14. âOf the History of the Essay Film: Vertov, to Varda,â by Timothy Corrigan -- 15. âThe Cinema and the Essay as a Way of Thinking,â by Raymond Bellour -- 16. âThe Essay Film: From Film Festival Favorite to Flexible Commodity Form?,â by Thomas Elsaesser -- Part IV. Filmmakers on the Essayistic -- 17. âPerforming Borders: Transnational Video,â by Ursula Biemann -- 18. âProposal for a Tussle,â by Jean-Pierre Gorin -- 19. âThe Essay as Conformism? Some Notes on Global Image Economies,â by Hito Steyerl -- 20. âOn Writing the Film Essay,â by Lynne Sachs -- 21. âTramp Steamer,â by Ross McElwee -- 22. âThe ABCs of the Film Essay,â by Harun Farocki and Christa Blümlinger -- 23. âRiddles as Essay Film,â by Laura Mulvey -- 24. âCertain Obliquenesses,â by Renée Green | ||
+ | |||
+ | |||
+ | |||
+ | 25. âEssay Documentary: The disembodied narrator and an unclaimed image that floats through space and time,â by Rea Tajiri -- 26. âFrom Ten Thousand Waves to Lina Bo Bardi, via Kapital,â by Isaac Julien -- Bibliography -- Contributors -- Permissions -- Index | ||
+ | |||
+ | |||
+ | |||
+ | This anthology of fundamental statements on the essay film offers a range of crucial historical and philosophical perspectives. It provides early critical articulations of the essay film as it evolved through the 1950s and 1960s, key contemporary scholarly essays, and a selection of writings by essay filmmakers. It features texts on the foundations of the essay film by writers such as Hans Richter and André Bazin, contemporary positions by Phillip Lopate and Michael Renov, and original essays by filmmakers themselves, including Laura Mulvey and Isaac Julien}, | ||
+ | language = {eng}, | ||
+ | publisher = {Columbia University Press}, | ||
+ | editor = {Alter, Nora M. and Corrigan, Timothy}, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{godardIntroductionTrueHistory2014, | ||
+ | address = {Montreal}, | ||
+ | edition = {First edition}, | ||
+ | series = {Theory and practice}, | ||
+ | title = {Introduction to a true history of cinema and television}, | ||
+ | isbn = {978-0-9811914-2-3}, | ||
+ | abstract = {In 1978, just before his return to the international stage, the world's most renowned art-film director Jean-Luc Godard improvised a series of fourteen one-hour talks at Concordia University in Montreal. These talks, part of a projected video history of cinema, were published in French in 1980. In this definitive English-language volume, translator Timothy Barnard has worked from the original footage to carefully revise and correct the faulty French transcription. The result is the most extensive and revealing account of Godard's own work, his methods, and his critical opinions. Never has Godard been as loquacious, lucid, and disarmingly frank as he is here. This volume, by the wittiest and most idiosyncratic genius cinema has known and available for the first time in English, is certain to become one of the great classics of film literature. Published by caboose books, Montreal. Distributed worldwide, excluding Canada, by Rutgers University Press.}, | ||
+ | publisher = {Caboose}, | ||
+ | author = {Godard, Jean-Luc}, | ||
+ | year = {2014}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{srnicekTechnologyCapitalism, | ||
+ | title = {Technology after Capitalism}, | ||
+ | author = {Srnicek, Nick}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{kernbauerEstablishingBeliefHarun2010, | ||
+ | title = {Establishing Belief: Harun Farocki and Andrei Ujica, Videograms of a Revolution}, | ||
+ | volume = {41}, | ||
+ | issn = {1526-3819}, | ||
+ | doi = {10.1162/GREY_a_00014}, | ||
+ | journal = {Grey Room}, | ||
+ | author = {Kernbauer, Eva}, | ||
+ | year = {2010}, | ||
+ | pages = {72--87}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{zuboffAgeSurveillanceCapitalism2019, | ||
+ | address = {New York, NY}, | ||
+ | title = {The age of surveillance capitalism}, | ||
+ | isbn = {978-1-61039-569-4}, | ||
+ | publisher = {PublicAffairs}, | ||
+ | author = {Zuboff, Shoshana}, | ||
+ | year = {2019}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{vandijckPlatformSociety2018, | ||
+ | address = {New York}, | ||
+ | title = {The platform society}, | ||
+ | isbn = {978-0-19-088977-7}, | ||
+ | publisher = {Oxford University Press}, | ||
+ | author = {van Dijck, José and Poell, Thomas and Waal, Martijn}, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{nickcouldryandulisesa.mejiasCostsConnection, | ||
+ | title = {The Costs of Connection}, | ||
+ | author = {{Nick Couldry and Ulises A. Mejias}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{barbaschowACLUSuesClearview2020, | ||
+ | title = {ACLU sues Clearview AI claiming the company's tech crosses ethical bounds}, | ||
+ | url = {https://www.zdnet.com/article/aclu-sues-clearview-ai-claiming-the-companys-tech-crosses-ethical-bounds/}, | ||
+ | abstract = {The American Civil Liberties Union has accused Clearview AI's biometric platform of creating a nightmare scenario that many have long feared.}, | ||
+ | urldate = {2020-05-30}, | ||
+ | journal = {ZDNet}, | ||
+ | author = {Barbaschow, Asha}, | ||
+ | month = may, | ||
+ | year = {2020}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{holtPoliticalRadicalizationInternet2015, | ||
+ | title = {Political radicalization on the Internet: Extremist content, government control, and the power of victim and jihad videos}, | ||
+ | volume = {8}, | ||
+ | issn = {1746-7586}, | ||
+ | doi = {10.1080/17467586.2015.1065101}, | ||
+ | number = {2}, | ||
+ | journal = {Dynamics of Asymmetric Conflict}, | ||
+ | author = {Holt, Tom and Freilich, Joshua D. and Chermak, Steven and McCauley, Clark}, | ||
+ | year = {2015}, | ||
+ | pages = {107--120}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{riedyRadicalizationVectorExploring2018, | ||
+ | title = {Radicalization as a Vector: Exploring Non-Violent and Benevolent Processes of Radicalization.}, | ||
+ | number = {14}, | ||
+ | author = {Riedy, Ken}, | ||
+ | year = {2018}, | ||
+ | pages = {249--293}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{MicrosoftWordMarina, | ||
+ | title = {Microsoft Word - Marina\_Shalabi\_Capstone.docx}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{jacobReconnaissanceFacialeImpose2017, | ||
+ | title = {La reconnaissance faciale s’impose peu à peu dans la course à la sécurité}, | ||
+ | journal = {Euractiv.fr}, | ||
+ | author = {Jacob, Maxime}, | ||
+ | month = oct, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{leeInformalCountermessagingPotential2018, | ||
+ | title = {Informal Countermessaging: The Potential and Perils of Informal Online Countermessaging}, | ||
+ | issn = {1057-610X}, | ||
+ | doi = {10.1080/1057610X.2018.1513697}, | ||
+ | journal = {Studies in Conflict \& Terrorism}, | ||
+ | author = {Lee, Benjamin J.}, | ||
+ | year = {2018}, | ||
+ | pages = {1--17}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{kRRNo201809Germany, | ||
+ | title = {RR\_No2018-09\_Germany\%27s\_NetzDG}, | ||
+ | author = {K, Olivia}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{accentureconsultingCCTVNotWe2017, | ||
+ | title = {CCTV But Not as We Know It {\textbar} Accenture}, | ||
+ | abstract = {Learn how James Slessor, Accenture Global Public Safety Managing Director, is focused on policing, intelligence, justice, prisons and rehabilitation to drive innovation for our public safety clients across the globe.}, | ||
+ | author = {{Accenture Consulting}}, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{SouriezVousSerez2017, | ||
+ | title = {Souriez, vous serez filmés en traversant la frontière}, | ||
+ | journal = {La Dernière Heure}, | ||
+ | month = mar, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{bazenetCitoyensCamerasIntelligentes2017, | ||
+ | title = {Des citoyens et des caméras « intelligentes » bientôt au service de la sécurité urbaine}, | ||
+ | journal = {La Tribune}, | ||
+ | author = {Bazenet, Flavien and Périès, Gabriel}, | ||
+ | month = dec, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{derveauxCamerasIntelligentesVont2018, | ||
+ | title = {Les caméras intelligentes vont repérer les actes suspects}, | ||
+ | journal = {Le Parisien}, | ||
+ | author = {Derveaux, Benjamin}, | ||
+ | month = jan, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{lesmeAnyvisionStartupIsraelienne2018, | ||
+ | title = {Anyvision, la start-up israélienne de reconnaissance visuelle qui veut s’imposer en leader}, | ||
+ | url = {https://www.usine-digitale.fr/article/anyvision-la-start-up-israelienne-de-reconnaissance-visuelle-qui-veut-s-imposer-en-leader.N725579}, | ||
+ | journal = {Usinenouvelle.com}, | ||
+ | author = {Lesme, Anthony}, | ||
+ | month = jul, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ladepecheToulousePouvoirCameras, | ||
+ | title = {Toulouse : le pouvoir des caméras de vidéosurveillance}, | ||
+ | author = {{La Dépêche}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{nizetCamerasIntelligentesAux2017, | ||
+ | title = {Les caméras intelligentes aux frontières : opérationnelles cet été}, | ||
+ | journal = {La Capitale}, | ||
+ | author = {Nizet, Pierre}, | ||
+ | month = apr, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{h.90CamerasVont2018, | ||
+ | title = {90 caméras vont quadriller le Brabant wallon d’ici 4 ans}, | ||
+ | journal = {La Meuse}, | ||
+ | author = {H., F.}, | ||
+ | month = feb, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{jonesFactiva2019011912145, | ||
+ | title = {Factiva-20190119-1214-5}, | ||
+ | author = {Jones, Dow}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{pinguelyCamerasIntelligentesInvestissent2018, | ||
+ | title = {Les caméras intelligentes investissent le monde de la surveillance vidéo}, | ||
+ | journal = {Le Matin Dimanche}, | ||
+ | author = {Pinguely, Nicolas}, | ||
+ | month = jun, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ouest-franceMarseilleVegasCameras2017, | ||
+ | title = {Marseille, Las Vegas… Les caméras intelligentes peuventelles prévenir les attaques ?}, | ||
+ | journal = {Ouest-France}, | ||
+ | author = {{Ouest-France}}, | ||
+ | month = oct, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{jonesFactiva201901191214, | ||
+ | title = {Factiva-20190119-1214}, | ||
+ | author = {Jones, Dow}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{emeryMarchePorteurMais2019, | ||
+ | title = {Un marché porteur mais inquiétant}, | ||
+ | author = {Emery, Philippe}, | ||
+ | month = jan, | ||
+ | year = {2019}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{jacobCamerasIntelligentesApres2017, | ||
+ | title = {Des caméras intelligentes après le drame de Magnanville}, | ||
+ | journal = {Le Figaro}, | ||
+ | author = {Jacob, Etienne}, | ||
+ | month = sep, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{pinteNosVillesDeviennent2017, | ||
+ | title = {Nos villes deviennent intelligentes mais cela les rend aussi de plus en plus vulnérables aux attaques}, | ||
+ | journal = {Atlantico}, | ||
+ | author = {Pinte, Jean-Paul}, | ||
+ | month = oct, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{stutzerCCTVTerrorism21March2010, | ||
+ | title = {CCTV\&Terrorism\_21March2010}, | ||
+ | author = {Stutzer, Alois}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{jonesFactiva201901191217, | ||
+ | title = {Factiva-20190119-1217}, | ||
+ | author = {Jones, Dow}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{espinozaStateTerrorismOrientalism2018, | ||
+ | title = {State terrorism: orientalism and the drone programme}, | ||
+ | volume = {11}, | ||
+ | issn = {1753-9153}, | ||
+ | doi = {10.1080/17539153.2018.1456725}, | ||
+ | abstract = {Critical Studies on Terrorism, 2018. doi:10.1080/17539153.2018.1456725}, | ||
+ | number = {2}, | ||
+ | journal = {Critical Studies on Terrorism}, | ||
+ | author = {Espinoza, Marina}, | ||
+ | year = {2018}, | ||
+ | pages = {376--393}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{rigoustePoliceFuturSurveillance2018, | ||
+ | title = {La police du futur. De la surveillance généralisée à l'autocontrôle}, | ||
+ | volume = {2}, | ||
+ | number = {10}, | ||
+ | journal = {Revue du Crieur}, | ||
+ | author = {Rigouste, Matthieu}, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{jonesFactiva2019011912201, | ||
+ | title = {Factiva-20190119-1220-1}, | ||
+ | author = {Jones, Dow}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{alexMicrosoftWordMedia, | ||
+ | title = {Microsoft Word - Media Matter\_final.docx}, | ||
+ | author = {{Alex}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{blundenAIFaceScanners, | ||
+ | title = {AI face scanners will let fans go ticket-free at a London stadium}, | ||
+ | author = {Blunden, Mark}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{aradauSecurityThatMatters2010, | ||
+ | title = {Security That Matters: Critical Infrastructure and Objects of Protection}, | ||
+ | volume = {41}, | ||
+ | issn = {0967-0106}, | ||
+ | doi = {10.1177/0967010610382687}, | ||
+ | number = {5}, | ||
+ | journal = {Security Dialogue}, | ||
+ | author = {Aradau, Claudia}, | ||
+ | year = {2010}, | ||
+ | pages = {491--514}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{aradauBigDatasecurityAssemblage2015, | ||
+ | title = {The (Big) Data-security assemblage: Knowledge and critique}, | ||
+ | volume = {2}, | ||
+ | issn = {2053-9517}, | ||
+ | doi = {10.1177/2053951715609066}, | ||
+ | number = {2}, | ||
+ | journal = {Big Data \& Society}, | ||
+ | author = {Aradau, Claudia and Blanke, Tobias}, | ||
+ | year = {2015}, | ||
+ | pages = {205395171560906}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{fosterVisionVisuality2009, | ||
+ | address = {Seattle}, | ||
+ | edition = {[Nachdr.]}, | ||
+ | series = {Discussions in contemporary culture}, | ||
+ | title = {Vision and visuality}, | ||
+ | volume = {2}, | ||
+ | isbn = {978-1-56584-461-2}, | ||
+ | language = {eng}, | ||
+ | publisher = {Bay Press}, | ||
+ | editor = {Foster, Hal}, | ||
+ | year = {2009}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@incollection{jayScopicRegimesModernity2009, | ||
+ | address = {Seattle}, | ||
+ | edition = {[Nachdr.]}, | ||
+ | series = {Discussions in contemporary culture}, | ||
+ | title = {Scopic regimes of modernity}, | ||
+ | isbn = {978-1-56584-461-2}, | ||
+ | number = {2}, | ||
+ | booktitle = {Vision and visuality}, | ||
+ | publisher = {Bay Press}, | ||
+ | author = {Jay, Martin}, | ||
+ | editor = {Foster, Hal}, | ||
+ | year = {2009}, | ||
+ | pages = {3--23}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{knoblauchVideographyAnalysingVideo2012, | ||
+ | title = {Videography: analysing video data as a ‘focused’ ethnographic and hermeneutical exercise}, | ||
+ | volume = {12}, | ||
+ | issn = {1468-7941}, | ||
+ | doi = {10.1177/1468794111436147}, | ||
+ | number = {3}, | ||
+ | journal = {Qualitative Research}, | ||
+ | author = {Knoblauch, Hubert and Schnettler, Bernt}, | ||
+ | year = {2012}, | ||
+ | pages = {334--356}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{basuComputerVision1993, | ||
+ | title = {Computer vision}, | ||
+ | isbn = {978-981-02-1392-3}, | ||
+ | url = {https://books.google.co.uk/books?id=0006O0IaLT4C}, | ||
+ | publisher = {World Scientific}, | ||
+ | author = {Basu, A. Ed and Li, Xunjing Ed}, | ||
+ | year = {1993}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{kaufmannPoliticsDigital2017, | ||
+ | title = {Politics and ‘the digital’}, | ||
+ | volume = {20}, | ||
+ | issn = {1368-4310}, | ||
+ | doi = {10.1177/1368431016677976}, | ||
+ | abstract = {European Journal of Social Theory 2017.20:309-328}, | ||
+ | number = {3}, | ||
+ | journal = {European Journal of Social Theory}, | ||
+ | author = {Kaufmann, Mareile and Jeandesboz, Julien}, | ||
+ | year = {2017}, | ||
+ | pages = {309--328}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{blanchetteMaterialHistoryBits2011, | ||
+ | title = {A material history of bits}, | ||
+ | volume = {62}, | ||
+ | issn = {15322882}, | ||
+ | doi = {10.1002/asi.21542}, | ||
+ | number = {6}, | ||
+ | journal = {Journal of the American Society for Information Science and Technology}, | ||
+ | author = {Blanchette, Jean-François}, | ||
+ | year = {2011}, | ||
+ | pages = {1042--1057}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{lahireQuoiSertSociologie2006, | ||
+ | address = {Paris}, | ||
+ | edition = {[1. Aufl.,2. Druck]}, | ||
+ | series = {La découverte-poche Sciences humaines et sociales}, | ||
+ | title = {A quoi sert la sociologie?}, | ||
+ | volume = {184}, | ||
+ | isbn = {978-2-7071-4421-8}, | ||
+ | language = {fre}, | ||
+ | publisher = {Editions La Découverte}, | ||
+ | author = {Lahire, Bernard}, | ||
+ | year = {2006}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@incollection{phelippeauSociologieDecision2009, | ||
+ | address = {Paris}, | ||
+ | series = {Cahiers Français}, | ||
+ | title = {Sociologie de la décision}, | ||
+ | booktitle = {La Science Politique}, | ||
+ | publisher = {La Documentation Française}, | ||
+ | author = {Phélippeau, Éric}, | ||
+ | editor = {{La Documentation Française}}, | ||
+ | year = {2009}, | ||
+ | pages = {42--47}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{ladocumentationfrancaiseSciencePolitique2009, | ||
+ | address = {Paris}, | ||
+ | series = {Cahiers Français}, | ||
+ | title = {La Science Politique}, | ||
+ | publisher = {La Documentation Française}, | ||
+ | editor = {{La Documentation Française}}, | ||
+ | year = {2009}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{stritzelSecurityTranslation2011, | ||
+ | title = {Security, the translation}, | ||
+ | volume = {42}, | ||
+ | issn = {0967-0106}, | ||
+ | doi = {10.1177/0967010611418998}, | ||
+ | number = {4-5}, | ||
+ | journal = {Security Dialogue}, | ||
+ | author = {Stritzel, Holger}, | ||
+ | year = {2011}, | ||
+ | pages = {343--355}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{taylorPlayCamera2016, | ||
+ | title = {Play to the camera}, | ||
+ | volume = {22}, | ||
+ | issn = {1354-8565}, | ||
+ | doi = {10.1177/1354856515580282}, | ||
+ | number = {2}, | ||
+ | journal = {Convergence: The International Journal of Research into New Media Technologies}, | ||
+ | author = {Taylor, Nicholas}, | ||
+ | year = {2016}, | ||
+ | pages = {115--130}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{lascoumesSociologieActionPublique2012, | ||
+ | address = {Paris}, | ||
+ | edition = {2e éd}, | ||
+ | series = {128}, | ||
+ | title = {Sociologie de l'action publique}, | ||
+ | isbn = {2-200-25986-7}, | ||
+ | publisher = {A. Colin}, | ||
+ | author = {Lascoumes, Pierre and Le Galès, Patrick}, | ||
+ | year = {2012}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{tannerPoliceWorkNew2015, | ||
+ | title = {Police work and new ‘security devices’: A tale from the beat}, | ||
+ | volume = {46}, | ||
+ | issn = {0967-0106}, | ||
+ | doi = {10.1177/0967010615584256}, | ||
+ | abstract = {Security Dialogue 2015.46:384-400}, | ||
+ | number = {4}, | ||
+ | journal = {Security Dialogue}, | ||
+ | author = {Tanner, Samuel and Meyer, Michaël}, | ||
+ | year = {2015}, | ||
+ | pages = {384--400}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{amicelleNewPoliticalAnatomy2011, | ||
+ | title = {Towards a ‘new’ political anatomy of financial surveillance}, | ||
+ | volume = {42}, | ||
+ | issn = {0967-0106}, | ||
+ | doi = {10.1177/0967010611401472}, | ||
+ | abstract = {Security Dialogue 2011.42:161-178}, | ||
+ | number = {2}, | ||
+ | journal = {Security Dialogue}, | ||
+ | author = {Amicelle, Anthony}, | ||
+ | year = {2011}, | ||
+ | pages = {161--178}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{favarel-garriguesReluctantPartners2011, | ||
+ | title = {Reluctant partners?}, | ||
+ | volume = {42}, | ||
+ | issn = {0967-0106}, | ||
+ | doi = {10.1177/0967010611399615}, | ||
+ | abstract = {Security Dialogue 2011.42:179-196}, | ||
+ | number = {2}, | ||
+ | journal = {Security Dialogue}, | ||
+ | author = {Favarel-Garrigues, Gilles and Godefroy, Thierry and Lascoumes, Pierre}, | ||
+ | year = {2011}, | ||
+ | pages = {179--196}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{orlikowski10SociomaterialityChallenging2008, | ||
+ | title = {10 Sociomateriality: Challenging the Separation of Technology, Work and Organization}, | ||
+ | volume = {2}, | ||
+ | issn = {1941-6520}, | ||
+ | doi = {10.1080/19416520802211644}, | ||
+ | number = {1}, | ||
+ | journal = {The Academy of Management Annals}, | ||
+ | author = {Orlikowski, Wanda J. and Scott, Susan V.}, | ||
+ | year = {2008}, | ||
+ | pages = {433--474}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{zavrsnikDronesUnmannedAerial2016, | ||
+ | address = {Cham}, | ||
+ | title = {Drones and unmanned aerial systems}, | ||
+ | isbn = {978-3-319-23759-6}, | ||
+ | publisher = {Springer}, | ||
+ | editor = {Završnik, Aleš}, | ||
+ | year = {2016}, | ||
+ | doi = {10.1007/978-3-319-23760-2}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{lascoumesGouvernerParInstruments2004, | ||
+ | address = {Paris}, | ||
+ | series = {Gouvernances}, | ||
+ | title = {Gouverner par les instruments}, | ||
+ | isbn = {978-2-7246-0949-3}, | ||
+ | publisher = {Presses de la fondation nationale des sciences politiques}, | ||
+ | author = {Lascoumes, Pierre and Le Galès, Patrick}, | ||
+ | year = {2004}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@incollection{orlikowskiDigitalWorkResearch2016, | ||
+ | address = {Northampton, MA}, | ||
+ | title = {Digital Work: A Research Agenda}, | ||
+ | booktitle = {A Research Agenda for Management and Organization Studies}, | ||
+ | publisher = {Edward Elgar Publishing}, | ||
+ | author = {Orlikowski, Wanda}, | ||
+ | editor = {Czarniawska, Barbara}, | ||
+ | year = {2016}, | ||
+ | pages = {88--96}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{fayardAffordancesPractice2014, | ||
+ | title = {Affordances for practice}, | ||
+ | volume = {24}, | ||
+ | issn = {14717727}, | ||
+ | doi = {10.1016/j.infoandorg.2014.10.001}, | ||
+ | number = {4}, | ||
+ | journal = {Information and Organization}, | ||
+ | author = {Fayard, Anne-Laure and Weeks, John}, | ||
+ | year = {2014}, | ||
+ | pages = {236--249}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@incollection{andrejevicTheorizingDronesDroning2016, | ||
+ | address = {Cham}, | ||
+ | title = {Theorizing Drones and Droning Theory}, | ||
+ | isbn = {978-3-319-23759-6}, | ||
+ | booktitle = {Drones and unmanned aerial systems. Legal and social implications for security and surveillance / Aleš Završnik, editor}, | ||
+ | publisher = {Springer}, | ||
+ | author = {Andrejevic, Mark}, | ||
+ | editor = {Završnik, Aleš}, | ||
+ | year = {2016}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{leonardiWhenFlexibleRoutines2011, | ||
+ | title = {When Flexible Routines Meet Flexible Technologies: Affordance, Constraint, and the Imbrication of Human and Material Agencies}, | ||
+ | volume = {35}, | ||
+ | doi = {10.2307/23043493}, | ||
+ | number = {1}, | ||
+ | journal = {Mis Quarterly}, | ||
+ | author = {Leonardi, Paul M.}, | ||
+ | year = {2011}, | ||
+ | pages = {147}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{andersenChromatologySecurityIntroducing2015, | ||
+ | title = {Chromatology of security: Introducing colours to visual security studies}, | ||
+ | volume = {46}, | ||
+ | issn = {0967-0106}, | ||
+ | doi = {10.1177/0967010615585106}, | ||
+ | abstract = {Security Dialogue 2015.46:440-457}, | ||
+ | number = {5}, | ||
+ | journal = {Security Dialogue}, | ||
+ | author = {Andersen, Rune S. and Vuori, Juha A. and Guillaume, Xavier}, | ||
+ | year = {2015}, | ||
+ | pages = {440--457}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{waltersDroneStrikesDingpolitik2014a, | ||
+ | title = {Drone strikes, dingpolitik and beyond: Furthering the debate on materiality and security}, | ||
+ | volume = {45}, | ||
+ | issn = {0967-0106}, | ||
+ | doi = {10.1177/0967010613519162}, | ||
+ | abstract = {Security Dialogue 2014.45:101-118}, | ||
+ | number = {2}, | ||
+ | journal = {Security Dialogue}, | ||
+ | author = {Walters, William}, | ||
+ | year = {2014}, | ||
+ | pages = {101--118}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{heath-kellyAffectingTerrorismLaughter2017, | ||
+ | title = {Affecting Terrorism: Laughter, Lamentation, and Detestation as Drives to Terrorism Knowledge}, | ||
+ | volume = {11}, | ||
+ | doi = {10.1093/ips/olx007}, | ||
+ | number = {3}, | ||
+ | journal = {International Political Sociology}, | ||
+ | author = {Heath-Kelly, Charlotte and Jarvis, Lee}, | ||
+ | year = {2017}, | ||
+ | pages = {239--256}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{madsenBigDataIssues2016, | ||
+ | title = {Big Data: Issues for an International Political Sociology of Data Practices: Table 1}, | ||
+ | volume = {10}, | ||
+ | issn = {17495679}, | ||
+ | doi = {10.1093/ips/olw010}, | ||
+ | number = {3}, | ||
+ | journal = {International Political Sociology}, | ||
+ | author = {Madsen, Anders Koed and Flyverbom, Mikkel and Hilbert, Martin and Ruppert, Evelyn}, | ||
+ | year = {2016}, | ||
+ | pages = {275--296}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{fisherSituatingBorderControl2018, | ||
+ | title = {Situating Border Control: Unpacking Spain's SIVE border surveillance assemblage}, | ||
+ | volume = {65}, | ||
+ | issn = {09626298}, | ||
+ | doi = {10.1016/j.polgeo.2018.04.005}, | ||
+ | abstract = {Political Geography, 65 (2018) 67-76. doi:10.1016/j.polgeo.2018.04.005}, | ||
+ | journal = {Political Geography}, | ||
+ | author = {Fisher, Daniel X.O.}, | ||
+ | year = {2018}, | ||
+ | pages = {67--76}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{martinIdentifyingPotentialTerrorists2018, | ||
+ | title = {Identifying potential terrorists: Visuality, security and the Channel project}, | ||
+ | volume = {49}, | ||
+ | issn = {0967-0106}, | ||
+ | doi = {10.1177/0967010618770070}, | ||
+ | abstract = {Security Dialogue 2018.49:254-271}, | ||
+ | number = {4}, | ||
+ | journal = {Security Dialogue}, | ||
+ | author = {Martin, Thomas}, | ||
+ | year = {2018}, | ||
+ | pages = {254--271}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{dijstelbloemSurveillanceSeaTransactional2017, | ||
+ | title = {Surveillance at sea: The transactional politics of border control in the Aegean}, | ||
+ | volume = {48}, | ||
+ | issn = {0967-0106}, | ||
+ | doi = {10.1177/0967010617695714}, | ||
+ | abstract = {The relationship between vision and action is a key element of both practices and conceptualizations of border surveillance in Europe. This article engages with what we call the 'operative vision' of surveillance at sea, specifically as performed by the border control apparatus in the Aegean. We analyse the political consequences of this operative vision by elaborating on three examples of fieldwork conducted in the Aegean and on the islands of Chios and Lesbos. One of the main aims is to bring the figure of the migrant back into the study of border technologies. By combining insights from science and technology studies with border, mobility and security studies, the article distinguishes between processes of intervention, mobilization and realization and emphasizes the role of migrants in their encounter with surveillance operations. Two claims are brought forward. First, engaging with recent scholarly work on the visual politics of border surveillance, we circumscribe an ongoing 'transactional politics'. Second, the dynamic interplay between vision and action brings about a situation of 'recalcitrance', in which mobile objects and subjects of various kinds are drawn into securitized relations, for instance in encounters between coast guard boats and migrant boats at sea. Without reducing migrants to epiphenomena of those relations, this recalcitrance typifies the objects of surveillance as both relatable as well as resistant, particularly in the tensions between border control and search and rescue.}, | ||
+ | language = {eng}, | ||
+ | number = {3}, | ||
+ | journal = {Security Dialogue}, | ||
+ | author = {Dijstelbloem, Huub and van Reekum, Rogier and Schinkel, Willem}, | ||
+ | year = {2017}, | ||
+ | pages = {224--240}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{follisVisionTransterritory2017a, | ||
+ | title = {Vision and Transterritory}, | ||
+ | volume = {42}, | ||
+ | issn = {0162-2439}, | ||
+ | doi = {10.1177/0162243917715106}, | ||
+ | abstract = {Science, Technology, \& Human Values 2017.42:1003-1030}, | ||
+ | number = {6}, | ||
+ | journal = {Science, Technology, \& Human Values}, | ||
+ | author = {Follis, Karolina S.}, | ||
+ | year = {2017}, | ||
+ | pages = {1003--1030}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{tazzioliSpyTrackArchive2018, | ||
+ | title = {Spy, track and archive: The temporality of visibility in Eurosur and Jora}, | ||
+ | volume = {49}, | ||
+ | issn = {0967-0106}, | ||
+ | doi = {10.1177/0967010618769812}, | ||
+ | abstract = {Security Dialogue 2018.49:272-288}, | ||
+ | number = {4}, | ||
+ | journal = {Security Dialogue}, | ||
+ | author = {Tazzioli, Martina}, | ||
+ | year = {2018}, | ||
+ | pages = {272--288}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{qaurooniEnhancedWarriorDrone2017, | ||
+ | title = {The “enhanced” warrior: drone warfare and the problematics of separation}, | ||
+ | volume = {16}, | ||
+ | issn = {1568-7759}, | ||
+ | doi = {10.1007/s11097-016-9481-z}, | ||
+ | abstract = {Phenom Cogn Sci, doi:10.1007/s11097-016-9481-z}, | ||
+ | number = {1}, | ||
+ | journal = {Phenomenology and the Cognitive Sciences}, | ||
+ | author = {Qaurooni, Danial and Ekbia, Hamid}, | ||
+ | year = {2017}, | ||
+ | pages = {53--73}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{elseyViolenceWorkEthnomethodological2018, | ||
+ | title = {Violence as work: Ethnomethodological insights into military combat operations}, | ||
+ | volume = {8}, | ||
+ | issn = {2152-0828}, | ||
+ | doi = {10.1037/vio0000173}, | ||
+ | number = {3}, | ||
+ | journal = {Psychology of Violence}, | ||
+ | author = {Elsey, Chris and Mair, Michael and Kolanoski, Martina}, | ||
+ | year = {2018}, | ||
+ | pages = {316--328}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{taylorMovieHasGo2017, | ||
+ | title = {‘The movie has to go forward’: surveying the media–security relationship}, | ||
+ | volume = {41}, | ||
+ | issn = {2380-8985}, | ||
+ | doi = {10.1080/23808985.2017.1288069}, | ||
+ | abstract = {Annals of the International Communication Association, 0000. doi:10.1080/23808985.2017.1288069}, | ||
+ | number = {1}, | ||
+ | journal = {Annals of the International Communication Association}, | ||
+ | author = {Taylor, Bryan C.}, | ||
+ | year = {2017}, | ||
+ | pages = {46--69}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{gregoryEyesSkyBodies2018, | ||
+ | title = {Eyes in the sky – bodies on the ground}, | ||
+ | volume = {6}, | ||
+ | issn = {2162-4887}, | ||
+ | doi = {10.1080/21624887.2018.1432534}, | ||
+ | abstract = {Critical Studies on Security, 2018. doi:10.1080/21624887.2018.1432534}, | ||
+ | number = {3}, | ||
+ | journal = {Critical Studies on Security}, | ||
+ | author = {Gregory, Derek}, | ||
+ | year = {2018}, | ||
+ | pages = {347--358}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{suchmanSituationalAwareness2015, | ||
+ | title = {Situational Awareness}, | ||
+ | volume = {5}, | ||
+ | number = {1}, | ||
+ | journal = {MediaTropes}, | ||
+ | author = {Suchman, Lucy}, | ||
+ | year = {2015}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{bousquetLethalVisionsEye2017, | ||
+ | title = {Lethal visions: the eye as function of the weapon}, | ||
+ | volume = {5}, | ||
+ | issn = {2162-4887}, | ||
+ | doi = {10.1080/21624887.2017.1329471}, | ||
+ | number = {1}, | ||
+ | journal = {Critical Studies on Security}, | ||
+ | author = {Bousquet, Antoine}, | ||
+ | year = {2017}, | ||
+ | pages = {62--80}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{lisleHolidaysDangerZone2016, | ||
+ | address = {Minneapolis}, | ||
+ | series = {Critical war studies}, | ||
+ | title = {Holidays in the danger zone}, | ||
+ | isbn = {978-0-8166-9856-1}, | ||
+ | publisher = {University of Minnesota Press}, | ||
+ | author = {Lisle, Debbie}, | ||
+ | year = {2016}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{crossmFisher2018, | ||
+ | title = {Fisher2018}, | ||
+ | author = {{Crossm}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{chamayouDroneTheory2015, | ||
+ | address = {London}, | ||
+ | title = {Drone theory}, | ||
+ | isbn = {978-0-241-97034-8}, | ||
+ | language = {eng fre}, | ||
+ | publisher = {Hamish Hamilton}, | ||
+ | author = {Chamayou, Grégoire}, | ||
+ | year = {2015}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{mirzoeffHowSeeWorld2016, | ||
+ | address = {New York}, | ||
+ | title = {How to see the world}, | ||
+ | isbn = {0-465-09600-X}, | ||
+ | abstract = {"In How to See the World, visual culture expert Nicholas Mirzoeff offers a sweeping look at history's most famous images--from Velázquez's Las Meninas to the iconic "Blue Marble"--to contextualize and make sense of today's visual world. Drawing on art history, sociology, semiotics, and everyday experience, he teaches us how to close read everything from astronaut selfies to Impressionist self-portraits, from Hitchcock films to videos taken by drones. Mirzoeff takes us on a journey through visual revolutions in the arts and sciences, from new mapping techniques in the seventeenth century to new painting styles in the eighteenth and the creation of film, photography, and x-rays in the nineteenth century. In today's networked world, mobile technology and social media enable us to exercise "visual activism"--the practice of producing and circulating images to drive political and social change. Whether we are looking at pictures showing the effects of climate change on natural and urban landscapes or an fMRI scan demonstrating neurological addiction, Mirzoeff helps us to find meaning in what we see,"--Amazon.com.}, | ||
+ | publisher = {Basic Books a member of the Perseus Books Group}, | ||
+ | author = {Mirzoeff, Nicholas}, | ||
+ | year = {2016}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@phdthesis{musikComputerAbiltySee2014, | ||
+ | address = {Vienna}, | ||
+ | title = {Computer and the Abilty to See}, | ||
+ | school = {University of Vienna}, | ||
+ | author = {Musik, Christoph}, | ||
+ | year = {2014}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{adeyFacingAirportSecurity2009, | ||
+ | title = {Facing Airport Security: Affect, Biopolitics, and the Preemptive Securitisation of the Mobile Body}, | ||
+ | volume = {27}, | ||
+ | doi = {10.1068/d0208}, | ||
+ | abstract = {Environ Plan D 2009.27:274-295}, | ||
+ | journal = {Environment and Planning D: Society and Space}, | ||
+ | author = {Adey, Peter}, | ||
+ | year = {2009}, | ||
+ | pages = {274--295}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{bleikerVisualGlobalPolitics2018, | ||
+ | address = {London}, | ||
+ | edition = {1st}, | ||
+ | series = {Interventions}, | ||
+ | title = {Visual global politics}, | ||
+ | isbn = {978-0-415-72607-8}, | ||
+ | publisher = {Routledge}, | ||
+ | editor = {Bleiker, Roland}, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{musikThinkingEyeOnly2011, | ||
+ | title = {The thinking eye is only half the story: High-level semantic video surveillance}, | ||
+ | volume = {16}, | ||
+ | doi = {10.3233/IP-2011-0252}, | ||
+ | journal = {Information Polity}, | ||
+ | author = {Musik, Christoph}, | ||
+ | year = {2011}, | ||
+ | pages = {339--353}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{egbertDevicesLieDetection2016, | ||
+ | title = {Devices of Lie Detection as Diegetic Technologies in the “War on Terror”}, | ||
+ | doi = {10.1177/0270467616634162}, | ||
+ | journal = {Bulletin of Science, Technology \& Society}, | ||
+ | author = {Egbert, Simon and Paul, Bettina}, | ||
+ | year = {2016}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{tazzioliSightMigrationGovernmentality2016, | ||
+ | title = {The Sight of Migration: Governmentality, Visibility and Europe’s Contested Borders}, | ||
+ | volume = {30}, | ||
+ | issn = {1360-0826}, | ||
+ | doi = {10.1080/13600826.2016.1173018}, | ||
+ | abstract = {Global Society, 2016. doi:10.1080/13600826.2016.1173018}, | ||
+ | number = {3}, | ||
+ | journal = {Global Society}, | ||
+ | author = {Tazzioli, Martina and Walters, William}, | ||
+ | year = {2016}, | ||
+ | pages = {445--464}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{thriftFutureGeography2002, | ||
+ | title = {The future of geography}, | ||
+ | volume = {33}, | ||
+ | issn = {00167185}, | ||
+ | doi = {10.1016/S0016-7185(02)00019-2}, | ||
+ | number = {3}, | ||
+ | journal = {Geoforum}, | ||
+ | author = {Thrift, Nigel}, | ||
+ | year = {2002}, | ||
+ | pages = {291--298}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{birtchnellAutomatingBlackArt2018, | ||
+ | title = {Automating the black art: Creative places for artificial intelligence in audio mastering}, | ||
+ | volume = {96}, | ||
+ | issn = {00167185}, | ||
+ | doi = {10.1016/j.geoforum.2018.08.005}, | ||
+ | abstract = {Geoforum, 96 (2018) 77-86. doi:10.1016/j.geoforum.2018.08.005}, | ||
+ | journal = {Geoforum}, | ||
+ | author = {Birtchnell, Thomas and Elliott, Anthony}, | ||
+ | year = {2018}, | ||
+ | pages = {77--86}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{lallyCrowdsourcedSurveillanceNetworked2017, | ||
+ | title = {Crowdsourced surveillance and networked data}, | ||
+ | volume = {48}, | ||
+ | issn = {0967-0106}, | ||
+ | doi = {10.1177/0967010616664459}, | ||
+ | number = {1}, | ||
+ | journal = {Security Dialogue}, | ||
+ | author = {Lally, Nick}, | ||
+ | year = {2017}, | ||
+ | pages = {63--77}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{mollicchiFlatnessDepthStudy2017, | ||
+ | title = {Flatness versus depth: A study of algorithmically generated camouflage}, | ||
+ | volume = {48}, | ||
+ | issn = {0967-0106}, | ||
+ | doi = {10.1177/0967010616650227}, | ||
+ | abstract = {Security Dialogue 2017.48:78-94}, | ||
+ | number = {1}, | ||
+ | journal = {Security Dialogue}, | ||
+ | author = {Mollicchi, Silvia}, | ||
+ | year = {2017}, | ||
+ | pages = {78--94}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{adamsFutureVideoAnalytics2015, | ||
+ | title = {The future of video analytics for surveillance and its ethical implications}, | ||
+ | volume = {28}, | ||
+ | issn = {0955-1662}, | ||
+ | doi = {10.1057/sj.2012.48}, | ||
+ | number = {3}, | ||
+ | journal = {Security Journal}, | ||
+ | author = {Adams, Andrew A. and Ferryman, James M.}, | ||
+ | year = {2015}, | ||
+ | pages = {272--289}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{pizaCCTVToolEarly2017, | ||
+ | title = {CCTV as a tool for early police intervention: Preliminary lessons from nine case studies}, | ||
+ | volume = {30}, | ||
+ | issn = {0955-1662}, | ||
+ | doi = {10.1057/sj.2014.17}, | ||
+ | number = {1}, | ||
+ | journal = {Security Journal}, | ||
+ | author = {Piza, Eric L. and Caplan, Joel M. and Kennedy, Leslie W.}, | ||
+ | year = {2017}, | ||
+ | pages = {247--265}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{hendricksGroundingVisualExplanations, | ||
+ | title = {Grounding Visual Explanations}, | ||
+ | url = {http://arxiv.org/pdf/1807.09685v2}, | ||
+ | abstract = {Existing visual explanation generating agents learn to fluently justify a class prediction. However, they may mention visual attributes which reflect a strong class prior, although the evidence may not actually be in the image. This is particularly concerning as ultimately such agents fail in building trust with human users. To overcome this limitation, we propose a phrase-critic model to refine generated candidate explanations augmented with flipped phrases which we use as negative examples while training. At inference time, our phrase-critic model takes an image and a candidate explanation as input and outputs a score indicating how well the candidate explanation is grounded in the image. Our explainable AI agent is capable of providing counter arguments for an alternative prediction, i.e. counterfactuals, along with explanations that justify the correct classification decisions. Our model improves the textual explanation quality of fine-grained classification decisions on the CUB dataset by mentioning phrases that are grounded in the image. Moreover, on the FOIL tasks, our agent detects when there is a mistake in the sentence, grounds the incorrect phrase and corrects it significantly better than other models.}, | ||
+ | urldate = {2018-07-25}, | ||
+ | journal = {European Conference on Computer Vision (ECCV)}, | ||
+ | author = {Hendricks, Lisa Anne and Hu, Ronghang and Darrell, Trevor and Akata, Zeynep}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{friedersdorfSpeechThatFacebook, | ||
+ | title = {The Speech That Facebook Plans to Punish}, | ||
+ | author = {Friedersdorf, Conor}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{pizaEffectsMergingProactive2015, | ||
+ | title = {The effects of merging proactive CCTV monitoring with directed police patrol: a randomized controlled trial}, | ||
+ | volume = {11}, | ||
+ | issn = {1573-3750}, | ||
+ | doi = {10.1007/s11292-014-9211-x}, | ||
+ | number = {1}, | ||
+ | journal = {Journal of Experimental Criminology}, | ||
+ | author = {Piza, Eric L. and Caplan, Joel M. and Kennedy, Leslie W. and Gilchrist, Andrew M.}, | ||
+ | year = {2015}, | ||
+ | pages = {43--69}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{greenSurveillanceEthnographyResearching2015, | ||
+ | title = {Surveillance and Ethnography: Researching Surveillance as Everyday Life}, | ||
+ | volume = {13}, | ||
+ | doi = {10.24908/ss.v13i1.5321}, | ||
+ | number = {1}, | ||
+ | journal = {Surveillance \& Society}, | ||
+ | author = {Green, Nicola and Zurawski, Nils}, | ||
+ | year = {2015}, | ||
+ | pages = {27--43}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{parkMultimodalExplanationsJustifying2018, | ||
+ | title = {Multimodal Explanations: Justifying Decisions and Pointing to the Evidence}, | ||
+ | url = {http://arxiv.org/pdf/1802.08129v1}, | ||
+ | abstract = {Deep models that are both effective and explainable are desirable in many settings; prior explainable models have been unimodal, offering either image-based visualization of attention weights or text-based generation of post-hoc justifications. We propose a multimodal approach to explanation, and argue that the two modalities provide complementary explanatory strengths. We collect two new datasets to define and evaluate this task, and propose a novel model which can provide joint textual rationale generation and attention visualization. Our datasets define visual and textual justifications of a classification decision for activity recognition tasks (ACT-X) and for visual question answering tasks (VQA-X). We quantitatively show that training with the textual explanations not only yields better textual justification models, but also better localizes the evidence that supports the decision. We also qualitatively show cases where visual explanation is more insightful than textual explanation, and vice versa, supporting our thesis that multimodal explanation models offer significant benefits over unimodal approaches.}, | ||
+ | author = {Park, Dong Huk and Hendricks, Lisa Anne and Akata, Zeynep and Rohrbach, Anna and Schiele, Bernt and Darrell, Trevor and Rohrbach, Marcus}, | ||
+ | month = feb, | ||
+ | year = {2018}, | ||
+ | pages = {11}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{liBigDataSmart2015, | ||
+ | title = {Big data in smart cities}, | ||
+ | volume = {58}, | ||
+ | issn = {1674-733X}, | ||
+ | doi = {10.1007/s11432-015-5396-5}, | ||
+ | number = {10}, | ||
+ | journal = {Science China Information Sciences}, | ||
+ | author = {Li, DeRen and Cao, JianJun and Yao, Yuan}, | ||
+ | year = {2015}, | ||
+ | pages = {1--12}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{mollicchiFlatnessDepthStudy2017a, | ||
+ | title = {Flatness versus depth: A study of algorithmically generated camouflage}, | ||
+ | volume = {48}, | ||
+ | issn = {0967-0106}, | ||
+ | doi = {10.1177/0967010616650227}, | ||
+ | abstract = {Security Dialogue 2017.48:78-94}, | ||
+ | number = {1}, | ||
+ | journal = {Security Dialogue}, | ||
+ | author = {Mollicchi, Silvia}, | ||
+ | year = {2017}, | ||
+ | pages = {78--94}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{birtchnellAutomatingBlackArt2018a, | ||
+ | title = {Automating the black art: Creative places for artificial intelligence in audio mastering}, | ||
+ | volume = {96}, | ||
+ | issn = {00167185}, | ||
+ | doi = {10.1016/j.geoforum.2018.08.005}, | ||
+ | abstract = {Geoforum, 96 (2018) 77-86. doi:10.1016/j.geoforum.2018.08.005}, | ||
+ | journal = {Geoforum}, | ||
+ | author = {Birtchnell, Thomas and Elliott, Anthony}, | ||
+ | year = {2018}, | ||
+ | pages = {77--86}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{lallyCrowdsourcedSurveillanceNetworked2017a, | ||
+ | title = {Crowdsourced surveillance and networked data}, | ||
+ | volume = {48}, | ||
+ | issn = {0967-0106}, | ||
+ | doi = {10.1177/0967010616664459}, | ||
+ | number = {1}, | ||
+ | journal = {Security Dialogue}, | ||
+ | author = {Lally, Nick}, | ||
+ | year = {2017}, | ||
+ | pages = {63--77}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{forsythComputerVision2012, | ||
+ | address = {Boston}, | ||
+ | edition = {2nd ed.}, | ||
+ | title = {Computer vision}, | ||
+ | isbn = {978-0-13-608592-8}, | ||
+ | abstract = {ExLib==ave4eva}, | ||
+ | publisher = {Pearson}, | ||
+ | author = {Forsyth, David and Ponce, Jean}, | ||
+ | year = {2012}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{anannyEthicsAlgorithms2016, | ||
+ | title = {Toward an Ethics of Algorithms}, | ||
+ | volume = {41}, | ||
+ | issn = {0162-2439}, | ||
+ | doi = {10.1177/0162243915606523}, | ||
+ | number = {1}, | ||
+ | journal = {Science, Technology, \& Human Values}, | ||
+ | author = {Ananny, Mike}, | ||
+ | year = {2016}, | ||
+ | pages = {93--117}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{pizaCCTVToolEarly2016, | ||
+ | title = {CCTV as a Tool for Early Police Intervention: Preliminary Lessons from Nine Case Studies.}, | ||
+ | volume = {30}, | ||
+ | number = {1}, | ||
+ | journal = {Security Journal}, | ||
+ | author = {Piza, Eric L. and Caplan, Joel M. and Kennedy, Leslie W.}, | ||
+ | year = {2016}, | ||
+ | pages = {247--265}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{woodMicrosoftWordEthnography, | ||
+ | title = {Microsoft Word - ethnography.docx}, | ||
+ | author = {Wood, David M.}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{nieddererMappingMeaningKnowledge, | ||
+ | title = {Mapping the meaning of knowledge in design research}, | ||
+ | urldate = {2007-01-01}, | ||
+ | author = {Niedderer, Kristina}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{anannySeeingKnowingLimitations2018, | ||
+ | title = {Seeing without knowing: Limitations of the transparency ideal and its application to algorithmic accountability}, | ||
+ | volume = {20}, | ||
+ | issn = {1461-4448}, | ||
+ | doi = {10.1177/1461444816676645}, | ||
+ | abstract = {New Media \& Society 2018.20:973-989}, | ||
+ | number = {3}, | ||
+ | journal = {New Media \& Society}, | ||
+ | author = {Ananny, Mike and Crawford, Kate}, | ||
+ | year = {2018}, | ||
+ | pages = {973--989}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{pizaEffectsMergingProactive2015a, | ||
+ | title = {The effects of merging proactive CCTV monitoring with directed police patrol: a randomized controlled trial}, | ||
+ | volume = {11}, | ||
+ | issn = {1573-3750}, | ||
+ | doi = {10.1007/s11292-014-9211-x}, | ||
+ | number = {1}, | ||
+ | journal = {Journal of Experimental Criminology}, | ||
+ | author = {Piza, Eric L. and Caplan, Joel M. and Kennedy, Leslie W. and Gilchrist, Andrew M.}, | ||
+ | year = {2015}, | ||
+ | pages = {43--69}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ndfjwScreensDoc, | ||
+ | title = {screens.doc}, | ||
+ | author = {{ndfjw}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{clementResearchingEmotionsInternational2018, | ||
+ | address = {New York}, | ||
+ | series = {Palgrave studies in international relations}, | ||
+ | title = {Researching emotions in international relations}, | ||
+ | isbn = {978-3-319-65574-1}, | ||
+ | publisher = {Palgrave Macmillan}, | ||
+ | editor = {Clément, Maéva and Sangar, Eric}, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{leeVideoEssayEssay2017, | ||
+ | title = {Video essay: The essay film – some thoughts of discontent}, | ||
+ | journal = {Sight \& Sound}, | ||
+ | author = {Lee, Kevin B.}, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{lewisTimothyAschEthnographic2004, | ||
+ | title = {Timothy Asch and Ethnographic Film}, | ||
+ | abstract = {Education, Politics \& IR, Sociology \& Social Policy}, | ||
+ | editor = {Lewis, E. D.}, | ||
+ | year = {2004}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@incollection{billnicholsWhatReallyHappened2004, | ||
+ | title = {What Really Happened. A reassessment of The Ax Fight}, | ||
+ | booktitle = {Timothy Asch and Ethnographic Film}, | ||
+ | author = {{Bill Nichols}}, | ||
+ | editor = {Lewis, E. D.}, | ||
+ | year = {2004}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{bartlettLiteratureReviewSocial2015, | ||
+ | title = {A literature review of social media intelligence capabilities for counterterrorism}, | ||
+ | author = {Bartlett, Jamie}, | ||
+ | year = {2015}, | ||
+ | note = {Publisher: Demos}, | ||
+ | pages = {98}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{tsesisTerroristSpeechSocial2017, | ||
+ | title = {Terrorist Speech on Social Media}, | ||
+ | volume = {70}, | ||
+ | journal = {Vanderbilt Law Review}, | ||
+ | author = {Tsesis, Alexander}, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{vuoriVisualSecurityStudies2018, | ||
+ | title = {Visual Security Studies: Sights and Spectacles of Insecurity and War}, | ||
+ | editor = {Vuori, Juha A. and Andersen, Rune Saugmann}, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{belliPlatformRegulationsHow2017, | ||
+ | title = {Platform Regulations How Platforms are Regulated and How They Regulate Us}, | ||
+ | author = {Belli, Luca and Zingales, Nicolo}, | ||
+ | year = {2017}, | ||
+ | note = {Publisher: United Nations Internet Governance Forum}, | ||
+ | pages = {250}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{klausenTweetingJihadSocial2015, | ||
+ | title = {Tweeting the Jihad : Social Media Networks of Western Foreign Fighters in Syria and Iraq}, | ||
+ | volume = {38}, | ||
+ | issn = {1057-610X}, | ||
+ | doi = {10.1080/1057610X.2014.974948}, | ||
+ | number = {1}, | ||
+ | journal = {Studies in Conflict \& Terrorism}, | ||
+ | author = {Klausen, Jytte}, | ||
+ | year = {2015}, | ||
+ | pages = {1--22}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{alibrahimMediaServiceISIS2018, | ||
+ | title = {The Media in the Service of ISIS Propaganda War}, | ||
+ | volume = {20}, | ||
+ | number = {2}, | ||
+ | journal = {Malaysian Journal of Media Studies}, | ||
+ | author = {Al Ibrahim, Daleen and Shi, Yibin}, | ||
+ | year = {2018}, | ||
+ | pages = {13--21}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{conwayDisruptingDaeshMeasuring2018, | ||
+ | title = {Disrupting Daesh: Measuring Takedown of Online Terrorist Material and Its Impacts}, | ||
+ | issn = {1057-610X}, | ||
+ | doi = {10.1080/1057610X.2018.1513984}, | ||
+ | journal = {Studies in Conflict \& Terrorism}, | ||
+ | author = {Conway, Maura and Khawaja, Moign and Lakhani, Suraj and Reffin, Jeremy and Robertson, Andrew and Weir, David}, | ||
+ | year = {2018}, | ||
+ | pages = {1--20}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{bebeBebeOlivias1429256MIRDThesis2015, | ||
+ | title = {Bebe-Olivia-s1429256-MIRD Thesis-2015}, | ||
+ | author = {Bebe, N. B.}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ltcgbjfsc/jawsA622701, | ||
+ | title = {a622701}, | ||
+ | author = {{Ltc Gb Jfsc/Jaws}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{schmittCountermessagesPreventionPromotion2018, | ||
+ | title = {Counter-messages as Prevention or Promotion of Extremism?! The Potential Role of YouTube}, | ||
+ | volume = {68}, | ||
+ | issn = {0021-9916}, | ||
+ | doi = {10.1093/joc/jqy029}, | ||
+ | number = {4}, | ||
+ | journal = {Journal of Communication}, | ||
+ | author = {Schmitt, Josephine B. and Rieger, Diana and Rutkowski, Olivia and Ernst, Julian}, | ||
+ | year = {2018}, | ||
+ | pages = {780--808}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{radfordSocialMediaRevolution2017, | ||
+ | title = {The Social Media Revolution}, | ||
+ | author = {Radford, Melissa}, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{saltmanWhitePaperRole2014, | ||
+ | title = {White Paper – The Role of Prevent in Countering Online Extremism}, | ||
+ | author = {Saltman, Erin}, | ||
+ | year = {2014}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{cohenDigitalCounterinsurgency2015, | ||
+ | title = {Digital Counterinsurgency}, | ||
+ | journal = {Foreign Affairs}, | ||
+ | author = {Cohen, Jared}, | ||
+ | year = {2015}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{fidlerCounteringIslamicState2015, | ||
+ | title = {Countering Islamic State Exploitation of the Internet}, | ||
+ | author = {Fidler, David}, | ||
+ | year = {2015}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{amooreSecuringAlgorithmsKnowledge2017, | ||
+ | title = {Securing with algorithms: Knowledge, decision, sovereignty}, | ||
+ | volume = {48}, | ||
+ | issn = {0967-0106}, | ||
+ | doi = {10.1177/0967010616680753}, | ||
+ | number = {1}, | ||
+ | journal = {Security Dialogue}, | ||
+ | author = {Amoore, Louise and Raley, Rita}, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{hellerOneHellKilling2013, | ||
+ | title = {'One Hell of a Killing Machine': Signature Strikes and International Law}, | ||
+ | volume = {11}, | ||
+ | issn = {1478-1387}, | ||
+ | doi = {10.1093/jicj/mqs093}, | ||
+ | number = {1}, | ||
+ | journal = {Journal of International Criminal Justice}, | ||
+ | author = {Heller, K. J.}, | ||
+ | year = {2013}, | ||
+ | pages = {89--119}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{haylesRFIDHumanAgency2009, | ||
+ | title = {RFID: Human Agency and Meaning in Information-Intensive Environments}, | ||
+ | volume = {26}, | ||
+ | issn = {0263-2764}, | ||
+ | doi = {10.1177/0263276409103107}, | ||
+ | abstract = {Theory, Culture \& Society 2009.26:47-72}, | ||
+ | number = {2-3}, | ||
+ | journal = {Theory, Culture \& Society}, | ||
+ | author = {Hayles, N. Katherine}, | ||
+ | year = {2009}, | ||
+ | pages = {47--72}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{haylesUnfinishedWork2006, | ||
+ | title = {Unfinished Work}, | ||
+ | volume = {23}, | ||
+ | issn = {0263-2764}, | ||
+ | doi = {10.1177/0263276406069229}, | ||
+ | abstract = {Theory, Culture \& Society 2006.23:159-166}, | ||
+ | number = {7-8}, | ||
+ | journal = {Theory, Culture \& Society}, | ||
+ | author = {Hayles, N. Katherine}, | ||
+ | year = {2006}, | ||
+ | pages = {159--166}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{haylesWritingMachines, | ||
+ | title = {Writing Machines}, | ||
+ | author = {Hayles, N. Katherine}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{LevManovichSoftware, | ||
+ | title = {Lev Manovich - Software culture-Edizioni Olivares}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{manovichLanguageNewMedia, | ||
+ | title = {The Language of New Media (Leonardo)}, | ||
+ | author = {Manovich, Lev}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{haylesUnthought2017, | ||
+ | address = {Chicago; London}, | ||
+ | title = {Unthought}, | ||
+ | isbn = {978-0-226-44788-9}, | ||
+ | publisher = {The University of Chicago Press}, | ||
+ | author = {Hayles, Katherine}, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{haylesComputingHuman2005, | ||
+ | title = {Computing the Human}, | ||
+ | volume = {22}, | ||
+ | issn = {0263-2764}, | ||
+ | doi = {10.1177/0263276405048438}, | ||
+ | abstract = {Theory, Culture \& Society 2005.22:131-151}, | ||
+ | number = {1}, | ||
+ | journal = {Theory, Culture \& Society}, | ||
+ | author = {Hayles, N. Katherine}, | ||
+ | year = {2005}, | ||
+ | pages = {131--151}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{haylesMyMotherWas2005, | ||
+ | address = {Chicago}, | ||
+ | title = {My mother was a computer}, | ||
+ | isbn = {0-226-32148-7}, | ||
+ | abstract = {Image}, | ||
+ | publisher = {University of Chicago Press}, | ||
+ | author = {Hayles, Katherine}, | ||
+ | year = {2005}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{haylesHowWeBecame1999, | ||
+ | title = {How We Became Posthuman}, | ||
+ | isbn = {978-0-226-32146-2}, | ||
+ | publisher = {University of Chicago Press}, | ||
+ | author = {Hayles, N. Katherine}, | ||
+ | year = {1999}, | ||
+ | doi = {10.7208/chicago/9780226321394.001.0001}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{manovichSoftwareTakesCommand2013, | ||
+ | address = {New York; London}, | ||
+ | series = {International texts in critical media aesthetics}, | ||
+ | title = {Software takes command}, | ||
+ | isbn = {978-1-62356-817-7}, | ||
+ | publisher = {Bloomsbury}, | ||
+ | author = {Manovich, Lev}, | ||
+ | year = {2013}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{spencerVisualResearchMethods, | ||
+ | title = {Visual Research Methods in the Social Sciences: Awakening Visions}, | ||
+ | author = {Spencer, Stephen}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{leeInformalCountermessagingPotential2018a, | ||
+ | title = {Informal Countermessaging: The Potential and Perils of Informal Online Countermessaging}, | ||
+ | issn = {1057-610X}, | ||
+ | doi = {10.1080/1057610X.2018.1513697}, | ||
+ | journal = {Studies in Conflict \& Terrorism}, | ||
+ | author = {Lee, Benjamin J.}, | ||
+ | year = {2018}, | ||
+ | pages = {1--17}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@inproceedings{swansonDataHidingVideoinvideo1997, | ||
+ | address = {Santa Barbara, CA, USA}, | ||
+ | title = {Data hiding for video-in-video}, | ||
+ | isbn = {0-8186-8183-7}, | ||
+ | doi = {10.1109/ICIP.1997.638586}, | ||
+ | publisher = {IEEE Comput. Soc}, | ||
+ | author = {Swanson, M. D. and Zhu, Bin and Tewfik, A. H.}, | ||
+ | year = {1997}, | ||
+ | pages = {676--679}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@inproceedings{InternationalConferenceImage1997, | ||
+ | address = {Santa Barbara, CA, USA}, | ||
+ | title = {International conference on image processing}, | ||
+ | isbn = {0-8186-8183-7}, | ||
+ | publisher = {IEEE Comput. Soc}, | ||
+ | year = {1997}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@phdthesis{tanAlgorithmicallySupportedModeration2017, | ||
+ | title = {Algorithmically Supported Moderation in Children’s Online Communities}, | ||
+ | author = {Tan, Flora}, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{klonickNewGovernorsPeople2017, | ||
+ | title = {The new governors: the people, rules, and processes governing online speech}, | ||
+ | volume = {L.1598}, | ||
+ | journal = {Harvard Law Review}, | ||
+ | author = {{Klonick}}, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{hjorthRoutledgeCompanionDigital2017, | ||
+ | address = {New York}, | ||
+ | title = {The Routledge companion to digital ethnography}, | ||
+ | isbn = {978-1-138-94091-8}, | ||
+ | publisher = {Routledge Taylor \& Francis Group}, | ||
+ | author = {{Hjorth} and {Larissa}}, | ||
+ | editor = {Hjorth, Larissa and Horst, Heather A. and Galloway, Anne and Bell, Genevieve}, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@incollection{beaulieuVECTORSFIELDWORKComputational2017, | ||
+ | address = {New York}, | ||
+ | title = {VECTORS FOR FIELDWORK Computational Thinking and New Modes of Ethnography1}, | ||
+ | isbn = {978-1-138-94091-8}, | ||
+ | booktitle = {The Routledge companion to digital ethnography}, | ||
+ | publisher = {Routledge Taylor \& Francis Group}, | ||
+ | author = {Beaulieu, Anne}, | ||
+ | editor = {Hjorth, Larissa and Horst, Heather A. and Galloway, Anne and Bell, Genevieve}, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@incollection{bleikerMethodsMethodologiesStudy2018, | ||
+ | address = {New York}, | ||
+ | series = {Palgrave studies in international relations}, | ||
+ | title = {Methods and Methodologies for the Study of Emotions in World Politics}, | ||
+ | isbn = {978-3-319-65574-1}, | ||
+ | booktitle = {Researching emotions in international relations. Methodological perspectives on the emotional turn}, | ||
+ | publisher = {Palgrave Macmillan}, | ||
+ | author = {Bleiker, Roland and Hutchison, Emma}, | ||
+ | editor = {Clément, Maéva and Sangar, Eric}, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@incollection{reinkedebuitragoGraspingRoleEmotions2018, | ||
+ | address = {New York}, | ||
+ | series = {Palgrave studies in international relations}, | ||
+ | title = {Grasping the Role of Emotions in IR via Qualitative Content Analysis and Visual Analysis}, | ||
+ | isbn = {978-3-319-65574-1}, | ||
+ | booktitle = {Researching emotions in international relations. Methodological perspectives on the emotional turn}, | ||
+ | publisher = {Palgrave Macmillan}, | ||
+ | author = {Reinke de Buitrago, Sybille}, | ||
+ | editor = {Clément, Maéva and Sangar, Eric}, | ||
+ | year = {2018}, | ||
+ | keywords = {** (Poor)}, | ||
+ | pages = {303--324}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{dylanwrayCompaniesCleaningDeepest2018, | ||
+ | title = {The Companies Cleaning the Deepest, Darkest Parts of Social Media}, | ||
+ | journal = {Vice}, | ||
+ | author = {Dylan Wray, Daniel}, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{laatUseSoftwareTools2015, | ||
+ | title = {The use of software tools and autonomous bots against vandalism: eroding Wikipedia’s moral order?}, | ||
+ | volume = {17}, | ||
+ | issn = {1388-1957}, | ||
+ | doi = {10.1007/s10676-015-9366-9}, | ||
+ | abstract = {Ethics and Information Technology, doi:10.1007/s10676-015-9366-9}, | ||
+ | number = {3}, | ||
+ | journal = {Ethics and Information Technology}, | ||
+ | author = {Laat, Paul B.}, | ||
+ | year = {2015}, | ||
+ | pages = {175--188}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{robertsDigitalRefuseCanadian2016, | ||
+ | title = {Digital Refuse: Canadian Garbage, Commercial Content Moderation and the Global Circulation of Social Media’s Waste}, | ||
+ | volume = {14}, | ||
+ | number = {1}, | ||
+ | journal = {Media Studies Publications}, | ||
+ | author = {Roberts, Sarah T.}, | ||
+ | year = {2016}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{gollatzTurnArtificialIntelligence2018, | ||
+ | title = {The Turn to Artificial Intelligence in Governing Communication Online}, | ||
+ | author = {Gollatz, Kirsten and Beer, Felix and Katzenbach, Christian}, | ||
+ | year = {2018}, | ||
+ | doi = {10.31235/osf.io/vwpcz}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{atanasoskiSurrogateHumanityPosthuman2015, | ||
+ | title = {Surrogate Humanity: Posthuman Networks and the (Racialized) Obsolescence of Labor}, | ||
+ | volume = {1}, | ||
+ | issn = {2380-3312}, | ||
+ | doi = {10.28968/cftt.v1i1.28809}, | ||
+ | number = {1}, | ||
+ | journal = {Catalyst: Feminism, Theory, Technoscience}, | ||
+ | author = {Atanasoski, Neda and Vora, Kalindi}, | ||
+ | year = {2015}, | ||
+ | pages = {1--40}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{robertsScreenHiddenDigital2014, | ||
+ | title = {Behind The Screen: The Hidden Digital Labor Of Commercial Content Moderation}, | ||
+ | author = {Roberts, Sarah T.}, | ||
+ | year = {2014}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{saintlaurentDefenceMachineLearning2018, | ||
+ | title = {In Defence of Machine Learning: Debunking the Myths of Artificial Intelligence}, | ||
+ | volume = {14}, | ||
+ | issn = {1841-0413}, | ||
+ | doi = {10.5964/ejop.v14i4.1823}, | ||
+ | abstract = {There has been much hype, over the past few years, about the recent progress of artificial intelligence (AI), especially through machine learning. If one is to believe many of the headlines that have proliferated in the media, as well as in an increasing number of scientific publications, it would seem that AI is now capable of creating and learning in ways that are starting to resemble what humans can do. And so that we should start to hope - or fear - that the creation of fully cognisant machine might be something we will witness in our life time. However, much of these beliefs are based on deep misconceptions about what AI can do, and how. In this paper, I start with a brief introduction to the principles of AI, machine learning, and neural networks, primarily intended for psychologists and social scientists, who often have much to contribute to the debates surrounding AI but lack a clear understanding of what it can currently do and how it works. I then debunk four common myths associated with AI: 1) it can create, 2) it can learn, 3) it is neutral and objective, and 4) it can solve ethically and/or culturally sensitive problems. In a third and last section, I argue that these misconceptions represent four main dangers: 1) avoiding debate, 2) naturalising our biases, 3) deresponsibilising creators and users, and 4) missing out some of the potential uses of machine learning. I finally conclude on the potential benefits of using machine learning in research, and thus on the need to defend machine learning without romanticising what it can actually do.}, | ||
+ | language = {eng}, | ||
+ | number = {4}, | ||
+ | journal = {Europe's journal of psychology}, | ||
+ | author = {Saint Laurent, Constance}, | ||
+ | year = {2018}, | ||
+ | pages = {734--747}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{wakenshawMoneylabReader2018, | ||
+ | address = {Amsterdam}, | ||
+ | series = {INC reader}, | ||
+ | title = {Moneylab reader 2}, | ||
+ | volume = {11}, | ||
+ | isbn = {94-92302-19-5}, | ||
+ | language = {eng}, | ||
+ | publisher = {Institute of Network Cultures}, | ||
+ | author = {{Wakenshaw}}, | ||
+ | editor = {Gloerich, Inte and Lovink, Geert and van der Burgt, Patrice}, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@incollection{gillespieGovernancePlatforms2017, | ||
+ | title = {Governance of and by platforms}, | ||
+ | booktitle = {SAGE Handbook of Social Media}, | ||
+ | author = {Gillespie, Tarleton}, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{knupferWordsLeftUnspoken2016, | ||
+ | title = {Words Left Unspoken: The External Forces Shaping Online Discourse}, | ||
+ | author = {Knüpfer, Curd B.}, | ||
+ | year = {2016}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{robertsDigitalDetritusError2018, | ||
+ | title = {Digital detritus: 'Error' and the logic of opacity in social media content moderation}, | ||
+ | volume = {23}, | ||
+ | number = {3}, | ||
+ | journal = {First Monday}, | ||
+ | author = {Roberts, Sarah T.}, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{crossetInternetPropagandeJihadiste2018, | ||
+ | title = {Internet et propagande jihadiste : la régulation polycentrique du cyberespace}, | ||
+ | volume = {78}, | ||
+ | issn = {1290-7839}, | ||
+ | doi = {10.3917/crii.078.0107}, | ||
+ | number = {1}, | ||
+ | journal = {Critique internationale}, | ||
+ | author = {Crosset, Valentine and Dupont, Benoit}, | ||
+ | year = {2018}, | ||
+ | pages = {107}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{pinkDoingVisualEthnography2013, | ||
+ | address = {Los Angeles}, | ||
+ | edition = {3rd edition}, | ||
+ | title = {Doing visual ethnography}, | ||
+ | isbn = {1-4462-1116-9}, | ||
+ | publisher = {SAGE}, | ||
+ | author = {Pink, Sarah}, | ||
+ | year = {2013}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{FIRSTWORLDWAR, | ||
+ | title = {FROM\_THE\_FIRST\_WORLD\_WAR\_TO\_THE\_PRESENT}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{robertsCommercialContentModeration, | ||
+ | title = {Commercial Content Moderation: Digital Laborers' Dirty Work}, | ||
+ | author = {Roberts, Sarah T.}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{crossetResearchingFarRight2018, | ||
+ | title = {Researching far right groups on Twitter: Methodological challenges 2.0}, | ||
+ | volume = {84}, | ||
+ | issn = {1461-4448}, | ||
+ | doi = {10.1177/1461444818817306}, | ||
+ | abstract = {New Media \& Society 0.0:1461444818817306}, | ||
+ | number = {2}, | ||
+ | journal = {New Media \& Society}, | ||
+ | author = {Crosset, Valentine and Tanner, Samuel and Campana, Aurélie}, | ||
+ | year = {2018}, | ||
+ | pages = {146144481881730}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{roseRelationVisualResearch2014, | ||
+ | title = {On the Relation between ‘Visual Research Methods’ and Contemporary Visual Culture}, | ||
+ | volume = {62}, | ||
+ | issn = {0038-0261}, | ||
+ | doi = {10.1111/1467-954X.12109}, | ||
+ | number = {1}, | ||
+ | journal = {The Sociological Review}, | ||
+ | author = {Rose, Gillian}, | ||
+ | year = {2014}, | ||
+ | pages = {24--46}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{roseVisualityMateriality2012, | ||
+ | address = {Farnham Surrey England; Burlington VT}, | ||
+ | title = {Visuality materiality}, | ||
+ | isbn = {978-1-4094-1223-6}, | ||
+ | publisher = {Ashgate Pub. Ltd}, | ||
+ | editor = {Rose, Gillian and Tolia-Kelly, Divya Praful}, | ||
+ | year = {2012}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@incollection{roseVisualityMaterialityIntroducing2012, | ||
+ | address = {Farnham Surrey England; Burlington VT}, | ||
+ | title = {Visuality/Materiality: introducing a Manifesto for Practice}, | ||
+ | isbn = {978-1-4094-1223-6}, | ||
+ | booktitle = {Visuality materiality. Images, objects and practices}, | ||
+ | publisher = {Ashgate Pub. Ltd}, | ||
+ | author = {Rose, Gillian and Tolia-Kelly, Divya P.}, | ||
+ | editor = {Rose, Gillian and Tolia-Kelly, Divya Praful}, | ||
+ | year = {2012}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{pinkDigitalEthnography2016, | ||
+ | address = {Los Angeles}, | ||
+ | title = {Digital ethnography}, | ||
+ | isbn = {1-4739-0238-X}, | ||
+ | publisher = {SAGE}, | ||
+ | author = {Pink, Sarah and Horst, Heather A. and Postill, John and Hjorth, Larissa and Lewis, Tania and Tacchi, Jo}, | ||
+ | year = {2016}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{christensenEyeTalentTalent2009, | ||
+ | title = {“An Eye for Talent”: Talent Identification and the “Practical Sense” of Top-Level Soccer Coaches}, | ||
+ | volume = {26}, | ||
+ | issn = {0741-1235}, | ||
+ | doi = {10.1123/ssj.26.3.365}, | ||
+ | abstract = {Sociology of Sport Journal 2009.26:365-382}, | ||
+ | number = {3}, | ||
+ | journal = {Sociology of Sport Journal}, | ||
+ | author = {Christensen, Mette Krogh}, | ||
+ | year = {2009}, | ||
+ | pages = {365--382}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{orlikowskiMaterialWorksExploring2005, | ||
+ | title = {Material Works: Exploring the Situated Entanglement of Technological Performativity and Human Agency}, | ||
+ | volume = {1}, | ||
+ | number = {17}, | ||
+ | author = {Orlikowski, Wanda}, | ||
+ | year = {2005}, | ||
+ | pages = {183--186}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{orlikowskiUsingTechnologyConstituting2000, | ||
+ | title = {Using Technology and Constituting Structures: A Practice Lens for Studying Technologyin Organizations}, | ||
+ | volume = {11}, | ||
+ | number = {4}, | ||
+ | journal = {Organization Science}, | ||
+ | author = {Orlikowski, Wanda}, | ||
+ | year = {2000}, | ||
+ | pages = {404--428}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@incollection{jeandesbozSecurityTechnologies2010, | ||
+ | address = {Oxon and New York}, | ||
+ | title = {Security Technologies}, | ||
+ | isbn = {978-0-203-85948-3}, | ||
+ | booktitle = {The Routledge Handbook of New Security Studies}, | ||
+ | publisher = {Routledge}, | ||
+ | author = {Jeandesboz, Julien and Guittet, Emmanuel-Pierre}, | ||
+ | editor = {Burgess, J. Peter}, | ||
+ | year = {2010}, | ||
+ | pages = {229--239}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ingramThreeTraitsIslamic2014, | ||
+ | title = {Three Traits of the Islamic State’s Information Warfare}, | ||
+ | volume = {159}, | ||
+ | issn = {0307-1847}, | ||
+ | doi = {10.1080/03071847.2014.990810}, | ||
+ | number = {6}, | ||
+ | journal = {The RUSI Journal}, | ||
+ | author = {Ingram, Haroro J.}, | ||
+ | year = {2014}, | ||
+ | pages = {4--11}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{mooreCryptopolitikDarknet2016, | ||
+ | title = {Cryptopolitik and the Darknet}, | ||
+ | volume = {58}, | ||
+ | issn = {0039-6338}, | ||
+ | doi = {10.1080/00396338.2016.1142085}, | ||
+ | number = {1}, | ||
+ | journal = {Survival}, | ||
+ | author = {Moore, Daniel and Rid, Thomas}, | ||
+ | year = {2016}, | ||
+ | pages = {7--38}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ingramAnalysisInspireDabiq2017, | ||
+ | title = {An Analysis of Inspire and Dabiq : Lessons from AQAP and Islamic State's Propaganda War}, | ||
+ | volume = {40}, | ||
+ | issn = {1057-610X}, | ||
+ | doi = {10.1080/1057610X.2016.1212551}, | ||
+ | abstract = {Studies in Conflict and Terrorism, 2017. doi:10.1080/1057610X.2016.1212551}, | ||
+ | number = {5}, | ||
+ | journal = {Studies in Conflict \& Terrorism}, | ||
+ | author = {Ingram, Haroro J.}, | ||
+ | year = {2017}, | ||
+ | pages = {357--375}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{orlikowskiGenreRepertoireStructuring1994a, | ||
+ | title = {Genre Repertoire: The Structuring of Communicative Practices in Organizations}, | ||
+ | volume = {39}, | ||
+ | number = {4}, | ||
+ | journal = {Administrative Science Quarterly}, | ||
+ | author = {Orlikowski, Wanda and Yates, JoAnne}, | ||
+ | year = {1994}, | ||
+ | pages = {541--574}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{celsoIslamicStateBoko2015, | ||
+ | title = {The Islamic State and Boko Haram: Fifth Wave Jihadist Terror Groups}, | ||
+ | volume = {59}, | ||
+ | issn = {00304387}, | ||
+ | doi = {10.1016/j.orbis.2015.02.010}, | ||
+ | number = {2}, | ||
+ | journal = {Orbis}, | ||
+ | author = {Celso, Anthony N.}, | ||
+ | year = {2015}, | ||
+ | pages = {249--268}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ingramAnalysisIslamicState2016, | ||
+ | title = {An analysis of Islamic State’s Dabiq magazine}, | ||
+ | volume = {51}, | ||
+ | issn = {1036-1146}, | ||
+ | doi = {10.1080/10361146.2016.1174188}, | ||
+ | abstract = {Australian Journal of Political Science, 2016. doi:10.1080/10361146.2016.1174188}, | ||
+ | number = {3}, | ||
+ | journal = {Australian Journal of Political Science}, | ||
+ | author = {Ingram, Haroro J.}, | ||
+ | year = {2016}, | ||
+ | pages = {458--477}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{macnairMyBrothersWest2017, | ||
+ | title = {“To My Brothers in the West . . .”: A Thematic Analysis of Videos Produced by the Islamic State’s al-Hayat Media Center}, | ||
+ | volume = {33}, | ||
+ | issn = {1043-9862}, | ||
+ | doi = {10.1177/1043986217699313}, | ||
+ | abstract = {Journal of Contemporary Criminal Justice 2017.33:234-253}, | ||
+ | number = {3}, | ||
+ | journal = {Journal of Contemporary Criminal Justice}, | ||
+ | author = {Macnair, Logan and Frank, Richard}, | ||
+ | year = {2017}, | ||
+ | pages = {234--253}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{leanderDigitalCommercialVisibility2017, | ||
+ | title = {Digital/commercial (in)visibility}, | ||
+ | volume = {20}, | ||
+ | issn = {1368-4310}, | ||
+ | doi = {10.1177/1368431016668365}, | ||
+ | abstract = {European Journal of Social Theory 2017.20:348-372}, | ||
+ | number = {3}, | ||
+ | journal = {European Journal of Social Theory}, | ||
+ | author = {Leander, Anna}, | ||
+ | year = {2017}, | ||
+ | pages = {348--372}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{houckUnderstandingWhatMakes2017, | ||
+ | title = {Understanding what makes terrorist groups’ propaganda effective: an integrative complexity analysis of ISIL and Al Qaeda}, | ||
+ | volume = {12}, | ||
+ | doi = {10.1080/18335330.2017.1351032}, | ||
+ | number = {2}, | ||
+ | journal = {Journal of Policing, Intelligence and Counter Terrorism}, | ||
+ | author = {Houck, Shannon C. and Repke, Meredith A. and Conway, Lucian Gideon}, | ||
+ | year = {2017}, | ||
+ | pages = {105--118}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{hamitiWarUSISIS2016, | ||
+ | title = {The War of US against ISIS in Psychological Warfare and Internet as the New Frontline}, | ||
+ | volume = {4}, | ||
+ | issn = {2411-958X}, | ||
+ | doi = {10.26417/ejis.v4i2.p129-134}, | ||
+ | number = {2}, | ||
+ | journal = {European Journal of Interdisciplinary Studies}, | ||
+ | author = {Hamiti, Urtak}, | ||
+ | year = {2016}, | ||
+ | pages = {129}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{raoulSSRNid2851763, | ||
+ | title = {SSRN-id2851763}, | ||
+ | author = {Raoul, Radu}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ISPropagandaWebEnglish, | ||
+ | title = {IS-Propaganda\_Web\_English\_v2}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{lasselleLightYearsAhead2016, | ||
+ | title = {Light Years Ahead: Differences and similarities between Al-Qaeda and Islamic State s Approach to the Global Jihad}, | ||
+ | volume = {12}, | ||
+ | issn = {1305-5208}, | ||
+ | doi = {10.19096/rilp.2016216813}, | ||
+ | number = {2}, | ||
+ | journal = {Review of International Law and Politics}, | ||
+ | author = {Lasselle, Eylem Özkaya}, | ||
+ | year = {2016}, | ||
+ | pages = {1}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{mccabeIslamicStateCaliphate2017, | ||
+ | title = {The Islamic State after the Caliphate - Can IS Go Underground?}, | ||
+ | volume = {11}, | ||
+ | number = {4}, | ||
+ | journal = {Perspectives on Terrorism}, | ||
+ | author = {McCabe, Thomas R.}, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{lakomyCracksOnlineCaliphate2017, | ||
+ | title = {Cracks in the Online “Caliphate”: How the Islamic State is Losing Ground in the Battle for Cyberspace}, | ||
+ | volume = {11}, | ||
+ | number = {3}, | ||
+ | journal = {Perspectives on Terrorism}, | ||
+ | author = {Lakomy, Miron}, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{al-dayelWordsEnemyIslamic2018, | ||
+ | title = {“In the Words of the Enemy”: the Islamic State’s reflexive projection of statehood}, | ||
+ | volume = {11}, | ||
+ | issn = {1753-9153}, | ||
+ | doi = {10.1080/17539153.2017.1338327}, | ||
+ | abstract = {Critical Studies on Terrorism, 2018. doi:10.1080/17539153.2017.1338327}, | ||
+ | number = {1}, | ||
+ | journal = {Critical Studies on Terrorism}, | ||
+ | author = {Al-Dayel, Nadia and Anfinson, Aaron}, | ||
+ | year = {2018}, | ||
+ | pages = {45--64}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{IslamicStateU2019s, | ||
+ | title = {The Islamic State\%u2019s Use of Social Media Terrorism\%u2019s Siren Song in the Digital Age Adam Hoffman}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ISILMediaMilton2, | ||
+ | title = {ISIL Media\_Milton-2.pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{winterDocumentingVirtualCaliphate, | ||
+ | title = {Documenting the Virtual ‘Caliphate’}, | ||
+ | author = {Winter, Charles}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{userSudaneseMahdiyyahComparat, | ||
+ | title = {IS\_and\_the\_Sudanese\_Mahdiyyah\_a\_Comparat}, | ||
+ | author = {{user}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{IslamicStateStrategy, | ||
+ | title = {The\_Islamic\_State\_s\_Strategy\_in\_Cyberspa}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{MicrosoftWordSpeckhard, | ||
+ | title = {Microsoft Word - Speckhard ICSVE 2015 The Hypnotic Power of ISIS Imagery in Recruiting Western Youth.docx}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{CyberJihadUnderstanding, | ||
+ | title = {Cyber\_Jihad\_-\_Understanding\_and\_Countering\_Islamic\_State\_Propaganda}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{loloGupea207739604, | ||
+ | title = {gupea\_2077\_39604\_1}, | ||
+ | author = {{Lolo}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{Dabiq, | ||
+ | title = {Dabiq}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{vranesTerrorismDigitalAge2016, | ||
+ | title = {Terrorism in the digital age: The use of internet and social media by terrorist organisations}, | ||
+ | journal = {Pregledni naučni rad}, | ||
+ | author = {Vranes, Jelena}, | ||
+ | year = {2016}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{mihaelaSupplementNo32015, | ||
+ | title = {Supplement-No.-3-2015}, | ||
+ | author = {{Mihaela}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{herbersMAThesisHerbers, | ||
+ | title = {MA\_Thesis\_Herbers}, | ||
+ | author = {Herbers, Lukas J.}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{buzelinUnexpectedAllies2005, | ||
+ | title = {Unexpected Allies}, | ||
+ | volume = {11}, | ||
+ | issn = {1355-6509}, | ||
+ | doi = {10.1080/13556509.2005.10799198}, | ||
+ | number = {2}, | ||
+ | journal = {The Translator}, | ||
+ | author = {Buzelin, Hélène}, | ||
+ | year = {2005}, | ||
+ | pages = {193--218}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{degoedeNewProfilingAlgorithms, | ||
+ | title = {The new profiling: Algorithms, black boxes, and the failure of anti-discriminatory safeguards in the European Union}, | ||
+ | issn = {0967-0106}, | ||
+ | abstract = {This article argues that with increasingly large databases and computational power, profiling as a key part of security governance is experiencing major changes. Targeting mobile populations in order to enact security via controlling and sifting the good from the bad, profiling techniques accumulate and process personal data. However, as advanced algorithmic analytics enable authorities to make sense of unprecedented amounts of information and derive patterns in a data-driven fashion, the procedures that bring risk into being increasingly differ from those of traditional profiling. While several scholars have dealt with the consequences of black-boxed and invisible algorithmic analytics in terms of privacy and data protection, this article engages the effects of knowledge-generating algorithms on anti-discriminatory safeguards. Using the European-level efforts for the establishment of a Passenger Name Record (PNR) system as an example, and on the theoretical level connecting distinct modes of profiling with Foucauldian thought on governing, the article finds that with pattern-based categorizations in data-driven profiling, safeguards such as the Charter of Fundamental Rights of the European Union or the EU data-protection framework essentially lose their applicability, leading to a diminishing role of the tools of the anti-discrimination framework.}, | ||
+ | journal = {Security Dialogue}, | ||
+ | author = {de Goede, Marieke and Simon, Stephanie and Leese, Matthias}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{mirzoeffIntroductionVisualCulture1999, | ||
+ | address = {London}, | ||
+ | title = {An Introduction to Visual Culture}, | ||
+ | publisher = {Routledge}, | ||
+ | author = {Mirzoeff, Nicholas}, | ||
+ | year = {1999}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{andersenEngagingLimitsVisibility2013, | ||
+ | title = {Engaging the limits of visibility: Photography, security and surveillance}, | ||
+ | volume = {44}, | ||
+ | issn = {0967-0106}, | ||
+ | doi = {10.1177/0967010613484955}, | ||
+ | number = {3}, | ||
+ | journal = {Security Dialogue}, | ||
+ | author = {Andersen, Rune Saugmann and Möller, Frank}, | ||
+ | year = {2013}, | ||
+ | pages = {203--221}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{degoedePreemptionPracticePolitics2014, | ||
+ | address = {London}, | ||
+ | series = {Security dialogue}, | ||
+ | title = {Preemption, practice, politics}, | ||
+ | volume = {vol. 45, no. 5}, | ||
+ | publisher = {SAGE}, | ||
+ | author = {de Goede, Marieke and Simon, Stephanie}, | ||
+ | year = {2014}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{jonesSecrecy2014, | ||
+ | title = {Secrecy}, | ||
+ | volume = {43}, | ||
+ | issn = {0084-6570}, | ||
+ | doi = {10.1146/annurev-anthro-102313-030058}, | ||
+ | number = {1}, | ||
+ | journal = {Annual Review of Anthropology}, | ||
+ | author = {Jones, Graham M.}, | ||
+ | year = {2014}, | ||
+ | pages = {53--69}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@phdthesis{wheelansAnalysesGovernmentResponses2016, | ||
+ | title = {Analyses of Government Responses to Stem the Flow of Foreign Fighters}, | ||
+ | author = {Wheelans, Claire}, | ||
+ | year = {2016}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{hohnsteinDigitaleMedienUnd2017, | ||
+ | address = {Halle (Saale)}, | ||
+ | title = {Digitale Medien und politisch-weltanschaulicher Extremismus im Jugendalter}, | ||
+ | isbn = {978-3-86379-260-2}, | ||
+ | url = {http://nbn-resolving.de/urn:nbn:de:gbv:3:2-89569}, | ||
+ | language = {ger;eng}, | ||
+ | publisher = {Deutsches Jugendinstitut e. V}, | ||
+ | editor = {Hohnstein, Sally and Herding, Maruta}, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{eisnerDifferencesScientificArtistic1981, | ||
+ | title = {On the Differences between Scientific and Artistic Approaches to Qualitative Research}, | ||
+ | volume = {10}, | ||
+ | issn = {0013189X}, | ||
+ | doi = {10.2307/1175121}, | ||
+ | abstract = {Educational Researcher 1981.10:5-9}, | ||
+ | number = {4}, | ||
+ | journal = {Educational Researcher}, | ||
+ | author = {Eisner, Elliot W.}, | ||
+ | year = {1981}, | ||
+ | pages = {5}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{ballAnalyzingVisualData, | ||
+ | title = {Analyzing Visual Data}, | ||
+ | author = {Ball, Michael and Smith, Gregory W. H.}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{vanleeuwenHandbookVisualAnalysis2001, | ||
+ | title = {Handbook of Visual Analysis}, | ||
+ | editor = {van Leeuwen, Theo and Jewitt, Carey}, | ||
+ | year = {2001}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{baroneArtsBasedResearch2012, | ||
+ | address = {Los Angeles}, | ||
+ | title = {Arts Based Research}, | ||
+ | isbn = {978-1-4129-8247-4}, | ||
+ | publisher = {SAGE}, | ||
+ | author = {Barone, Tom and Eisner, Elliot W.}, | ||
+ | year = {2012}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{catherinecassellSAGEHandbookQualitative, | ||
+ | title = {The SAGE Handbook of Qualitative usiness and Management Research Methods}, | ||
+ | author = {{Catherine Cassell} and {Ann L. Cunliffe \& Gina Grandy}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{dicksQualitativeResearchandHypermediaEthnographyfortheDigitalAge, | ||
+ | title = {Qualitative-Research-and-Hypermedia-Ethnography-for-the-Digital-Age}, | ||
+ | author = {Dicks, Bella and Mason, Bruce and Coffey, Amanda and Atkinson, Paul}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ARWEIBooklet, | ||
+ | title = {ARWEI.Booklet}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{weizmanForensicArchitectureViolence2017, | ||
+ | address = {New York}, | ||
+ | title = {Forensic Architecture: Violence at the Threshold of Detectability}, | ||
+ | publisher = {Zone Books (NY)}, | ||
+ | author = {Weizman, Eyal}, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{obradovic-wochnikRevisualisingInternationalRelations2017, | ||
+ | title = {Re-visualising international relations: audio-visual projects and direct encounters with the political in security studies}, | ||
+ | volume = {16}, | ||
+ | issn = {1680-4333}, | ||
+ | doi = {10.1057/eps.2016.21}, | ||
+ | number = {3}, | ||
+ | journal = {European Political Science}, | ||
+ | author = {Obradovic-Wochnik, Jelena and Hayes, Sarah}, | ||
+ | year = {2017}, | ||
+ | pages = {415--429}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{parikhAnalyticFilmmakingPersistence2014, | ||
+ | title = {Analytic Filmmaking and the Persistence of Narrative: A Response to Roy Germano}, | ||
+ | volume = {12}, | ||
+ | issn = {1537-5927}, | ||
+ | doi = {10.1017/S1537592714001650}, | ||
+ | number = {03}, | ||
+ | journal = {Perspectives on Politics}, | ||
+ | author = {Parikh, Sunita}, | ||
+ | year = {2014}, | ||
+ | pages = {677--679}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{eisnerPromisePerilsAlternative, | ||
+ | title = {The Promise and Perils of Alternative Forms of Data Representation}, | ||
+ | abstract = {Educational Researcher 1997.26:4-10}, | ||
+ | author = {Eisner, Elliot W.}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{germanoAnalyticFilmmakingResponse2014, | ||
+ | title = {Analytic Filmmaking: A Response to Critics}, | ||
+ | volume = {12}, | ||
+ | issn = {1537-5927}, | ||
+ | doi = {10.1017/S1537592714001704}, | ||
+ | number = {03}, | ||
+ | journal = {Perspectives on Politics}, | ||
+ | author = {Germano, Roy}, | ||
+ | year = {2014}, | ||
+ | pages = {691--694}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{panagiaCinemaVeriteOntology2014, | ||
+ | title = {Cinéma vérité and the Ontology of Cinema: A Response to Roy Germano}, | ||
+ | volume = {12}, | ||
+ | issn = {1537-5927}, | ||
+ | doi = {10.1017/S1537592714001698}, | ||
+ | number = {03}, | ||
+ | journal = {Perspectives on Politics}, | ||
+ | author = {Panagia, Davide}, | ||
+ | year = {2014}, | ||
+ | pages = {688--690}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{gouldAnalyticFilmmakingSocial2014, | ||
+ | title = {Analytic Filmmaking as Social Scientific Research: A Response to Roy Germano}, | ||
+ | volume = {12}, | ||
+ | issn = {1537-5927}, | ||
+ | doi = {10.1017/S1537592714001674}, | ||
+ | number = {03}, | ||
+ | journal = {Perspectives on Politics}, | ||
+ | author = {Gould, Jeffrey L.}, | ||
+ | year = {2014}, | ||
+ | pages = {684--685}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{andersenVideoAlgorithmsSecurity2017, | ||
+ | title = {Video, algorithms and security: How digital video platforms produce post-sovereign security articulations}, | ||
+ | volume = {48}, | ||
+ | issn = {0967-0106}, | ||
+ | doi = {10.1177/0967010617709875}, | ||
+ | number = {4}, | ||
+ | journal = {Security Dialogue}, | ||
+ | author = {Andersen, Rune Saugmann}, | ||
+ | year = {2017}, | ||
+ | pages = {354--372}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{andersenEpistemicAuthorityLies2013, | ||
+ | title = {Epistemic Authority, Lies, and Video: the Constitution of Knowledge and (in)Security in the Video/Security Nexus}, | ||
+ | volume = {0}, | ||
+ | doi = {10.18573/j.2013.10258}, | ||
+ | number = {4}, | ||
+ | journal = {JOMEC Journal}, | ||
+ | author = {Andersen, Rune Saugmann}, | ||
+ | year = {2013}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{meinesRanCnOnetoone, | ||
+ | title = {ran\_cn\_one-to-one\_digital\_interventions\_berlin\_14-15\_2016\_en}, | ||
+ | author = {Meines, Marije}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{kroftDosDontsInvolving, | ||
+ | title = {dos\_and\_donts\_involving\_formers\_in\_pve\_cve\_work\_bordeaux\_27\_06\_2017\_en}, | ||
+ | author = {Kroft, Floor}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{farrellWoodgrainChessboardResponse2014, | ||
+ | title = {The Woodgrain of the Chessboard: A Response to Roy Germano}, | ||
+ | volume = {12}, | ||
+ | issn = {1537-5927}, | ||
+ | doi = {10.1017/S1537592714001686}, | ||
+ | number = {03}, | ||
+ | journal = {Perspectives on Politics}, | ||
+ | author = {Farrell, Henry}, | ||
+ | year = {2014}, | ||
+ | pages = {686--687}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{yanowAmNotCamera2014, | ||
+ | title = {I Am Not a Camera: On Visual Politics and Method. A Response to Roy Germano}, | ||
+ | volume = {12}, | ||
+ | issn = {1537-5927}, | ||
+ | doi = {10.1017/S1537592714001662}, | ||
+ | number = {03}, | ||
+ | journal = {Perspectives on Politics}, | ||
+ | author = {Yanow, Dvora}, | ||
+ | year = {2014}, | ||
+ | pages = {680--683}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{suhrCanFilmShow2012, | ||
+ | title = {Can Film Show the Invisible?}, | ||
+ | volume = {53}, | ||
+ | issn = {0011-3204}, | ||
+ | doi = {10.1086/664920}, | ||
+ | number = {3}, | ||
+ | journal = {Current Anthropology}, | ||
+ | author = {Suhr, Christian and Willerslev, Rane}, | ||
+ | year = {2012}, | ||
+ | pages = {282--301}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{meinesRanCnWorkshop, | ||
+ | title = {ran\_cn\_workshop\_jihadist\_propaganda\_amsterdam\_3-4\_2016\_en}, | ||
+ | author = {Meines, Marije}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{meinesRanCnDissemination, | ||
+ | title = {ran\_c-n\_dissemination\_strategies\_building\_online\_multi-platform\_networks\_en}, | ||
+ | author = {Meines, Marije}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{RAN10LESSV2, | ||
+ | title = {RAN\_10LESS\_V2}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{radar-groepRanCnCounter, | ||
+ | title = {ran\_c-n\_counter\_and\_alternative\_narratives\_berlin\_10-11122015\_en}, | ||
+ | author = {{Radar-Groep}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{meinesRanChecklistRelevant, | ||
+ | title = {ran\_c\_n\_checklist\_relevant\_mental\_biases\_vienna7-8\_02\_2018\_en}, | ||
+ | author = {Meines, Marije}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{meines201702RanHow, | ||
+ | title = {201702\_ran\_how\_to\_measure\_impact\_of\_online\_campaign\_en}, | ||
+ | author = {Meines, Marije}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{alexanderRanCnInvolving, | ||
+ | title = {ran\_cn\_involving\_young\_people\_counter\_alternative\_narrative\_campaigns\_25042018\_en}, | ||
+ | author = {{Alexander}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{postillSocialMediaEthnography2012, | ||
+ | title = {Social Media Ethnography: The Digital Researcher in a Messy Web}, | ||
+ | volume = {145}, | ||
+ | issn = {1329-878X}, | ||
+ | doi = {10.1177/1329878X1214500114}, | ||
+ | number = {1}, | ||
+ | journal = {Media International Australia}, | ||
+ | author = {Postill, John and Pink, Sarah}, | ||
+ | year = {2012}, | ||
+ | pages = {123--134}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{kniggeGroundedVisualizationIntegrating2006, | ||
+ | title = {Grounded Visualization: Integrating the Analysis of Qualitative and Quantitative Data through Grounded Theory and Visualization}, | ||
+ | volume = {38}, | ||
+ | doi = {10.1068/a37327}, | ||
+ | abstract = {Environ Plan A 2006.38:2021-2037}, | ||
+ | number = {11}, | ||
+ | journal = {Environment and Planning A}, | ||
+ | author = {Knigge, LaDona and Cope, Meghan}, | ||
+ | year = {2006}, | ||
+ | pages = {2021--2037}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{counciloftheeuropeanunionProposalRegulationEuropean2018, | ||
+ | title = {Proposal for a Regulation of the European Parliament and of the Council on preventing the dissemination of terrorist content online - general approach}, | ||
+ | author = {{Council of the European Union}}, | ||
+ | month = dec, | ||
+ | year = {2018}, | ||
+ | note = {Publisher: Council of the European Union}, | ||
+ | pages = {45}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{europeancommissionProposalRegulationEuropean2018, | ||
+ | title = {Proposal for a Regulation of the European Parliament and the Council on preventing the dissemination of terrorist content online}, | ||
+ | author = {{European Commission}}, | ||
+ | month = jun, | ||
+ | year = {2018}, | ||
+ | pages = {35}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{europeanparliamentEuropeanParliamentResolution2017, | ||
+ | title = {European Parliament resolution of 15 June 2017 on online platforms and the digital single market (2016/2276(INI))}, | ||
+ | author = {{European Parliament}}, | ||
+ | year = {2017}, | ||
+ | pages = {14}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{vonbethlenfalvyilonaAnnexesProposal30, | ||
+ | title = {Annexes to proposal 30 August}, | ||
+ | author = {{VON BETHLENFALVY Ilona}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{qinAnalyzingTerrorCampaigns2007, | ||
+ | title = {Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity}, | ||
+ | volume = {65}, | ||
+ | issn = {10715819}, | ||
+ | doi = {10.1016/j.ijhcs.2006.08.012}, | ||
+ | number = {1}, | ||
+ | journal = {International Journal of Human-Computer Studies}, | ||
+ | author = {Qin, Jialun and Zhou, Yilu and Reid, Edna and Lai, Guanpi and Chen, Hsinchun}, | ||
+ | year = {2007}, | ||
+ | pages = {71--84}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{techdirt.comIfYouRe, | ||
+ | title = {If You're Worried About Bad EU Internet Regulation, Just Wait Until You See The New Terrorist Regulation}, | ||
+ | author = {{Techdirt.com}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{lomasUKOutsExtremism, | ||
+ | title = {UK outs extremism blocking tool and could force tech firms to use it}, | ||
+ | author = {Lomas, Nathasha}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{counciloftheeuropeanunionTerroristContentOnline2018, | ||
+ | title = {Terrorist content online: Council adopts negotiating position on new rules to prevent dissemination}, | ||
+ | author = {{Council of the European Union}}, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{framptonNewNetwarCountering2017, | ||
+ | title = {The New Netwar: Countering Extremism Online}, | ||
+ | author = {Frampton, Martyn and Fisher, Ali and Prucha, Nico}, | ||
+ | year = {2017}, | ||
+ | note = {Place: London | ||
+ | Publisher: Policy Exchange}, | ||
+ | pages = {131}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{lomasEuropePushOnehour2018, | ||
+ | title = {Europe to push for one-hour takedown law for terrorist content}, | ||
+ | author = {Lomas, Nathasha}, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{bodoniEUWarnsTech, | ||
+ | title = {EU Warns Tech Giants to Remove Terror Content in 1 Hour—or Else}, | ||
+ | author = {Bodoni, Stephanie}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ignatowPierreBourdieuTheorizing2017, | ||
+ | title = {Pierre Bourdieu: theorizing the digital}, | ||
+ | volume = {20}, | ||
+ | issn = {1369-118X}, | ||
+ | doi = {10.1080/1369118X.2017.1301519}, | ||
+ | abstract = {Information, Communication \& Society, 2017. doi:10.1080/1369118X.2017.1301519}, | ||
+ | number = {7}, | ||
+ | journal = {Information, Communication \& Society}, | ||
+ | author = {Ignatow, Gabe and Robinson, Laura}, | ||
+ | year = {2017}, | ||
+ | pages = {950--966}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{leeseNewMobilitiesParadigm2018, | ||
+ | title = {The new mobilities paradigm and critical security studies: exploring common ground}, | ||
+ | volume = {13}, | ||
+ | issn = {1745-0101}, | ||
+ | doi = {10.1080/17450101.2018.1427016}, | ||
+ | abstract = {Mobilities, 2018. doi:10.1080/17450101.2018.1427016}, | ||
+ | number = {2}, | ||
+ | journal = {Mobilities}, | ||
+ | author = {Leese, Matthias and Wittendorp, Stef}, | ||
+ | year = {2018}, | ||
+ | pages = {171--184}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{bourneLaboratizingBorderProduction2015, | ||
+ | title = {Laboratizing the border: The production, translation and anticipation of security technologies}, | ||
+ | volume = {46}, | ||
+ | issn = {0967-0106}, | ||
+ | doi = {10.1177/0967010615578399}, | ||
+ | abstract = {Security Dialogue 2015.46:307-325}, | ||
+ | number = {4}, | ||
+ | journal = {Security Dialogue}, | ||
+ | author = {Bourne, Mike and Johnson, Heather and Lisle, Debbie}, | ||
+ | year = {2015}, | ||
+ | pages = {307--325}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{greeneTroubleTrustingAI, | ||
+ | title = {The Trouble With Trusting AI to Interpret Police Body-Cam Video}, | ||
+ | author = {Greene, Daniel}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{obradovic-wochnikRevisualisingInternationalRelations2017a, | ||
+ | title = {re-visualising international relations: audio-visual projects and direct encounters with the political in security studies}, | ||
+ | volume = {16}, | ||
+ | issn = {1680-4333}, | ||
+ | doi = {10.1057/eps.2016.21}, | ||
+ | number = {3}, | ||
+ | journal = {European Political Science}, | ||
+ | author = {Obradovic-Wochnik, Jelena and Hayes, Sarah}, | ||
+ | year = {2017}, | ||
+ | pages = {415--429}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{baroneArtsBasedEducationalProjects2004, | ||
+ | title = {Arts-Based Educational Projects and the Redressing of the Political Spectacle}, | ||
+ | volume = {1}, | ||
+ | issn = {1550-5170}, | ||
+ | doi = {10.1080/15505170.2004.10411496}, | ||
+ | number = {2}, | ||
+ | journal = {Journal of Curriculum and Pedagogy}, | ||
+ | author = {Barone, Tom}, | ||
+ | year = {2004}, | ||
+ | pages = {36--43}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{hessBourdieuScienceStudies2011, | ||
+ | title = {Bourdieu and Science Studies: Toward a Reflexive Sociology}, | ||
+ | volume = {49}, | ||
+ | issn = {0026-4695}, | ||
+ | doi = {10.1007/s11024-011-9178-y}, | ||
+ | number = {3}, | ||
+ | journal = {Minerva}, | ||
+ | author = {Hess, David J.}, | ||
+ | year = {2011}, | ||
+ | pages = {333--348}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{kale-lostuvaliTwoSociologiesScience2016b, | ||
+ | title = {Two Sociologies of Science in Search of Truth: Bourdieu Versus Latour}, | ||
+ | volume = {30}, | ||
+ | issn = {0269-1728}, | ||
+ | doi = {10.1080/02691728.2015.1015062}, | ||
+ | abstract = {Social Epistemology, 2015. doi:10.1080/02691728.2015.1015062}, | ||
+ | number = {3}, | ||
+ | journal = {Social Epistemology}, | ||
+ | author = {Kale-Lostuvali, Elif}, | ||
+ | year = {2016}, | ||
+ | pages = {273--296}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{sterneBourdieuTechniqueTechnology2003, | ||
+ | title = {Bourdieu, Technique And Technology}, | ||
+ | volume = {17}, | ||
+ | issn = {0950-2386}, | ||
+ | doi = {10.1080/0950238032000083863a}, | ||
+ | number = {3-4}, | ||
+ | journal = {Cultural Studies}, | ||
+ | author = {Sterne, Jonathan}, | ||
+ | year = {2003}, | ||
+ | pages = {367--389}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@incollection{gingrasFollowingScientistsSociety, | ||
+ | title = {Following Scientists Through Society? Yes, but at arm's length!}, | ||
+ | booktitle = {Scientific Pratice: Theories and stories of doing physics}, | ||
+ | author = {Gingras, Yves}, | ||
+ | pages = {123--146}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{amicelleQuestioningSecurityDevices2015, | ||
+ | title = {Questioning security devices: Performativity, resistance, politics}, | ||
+ | volume = {46}, | ||
+ | issn = {0967-0106}, | ||
+ | doi = {10.1177/0967010615586964}, | ||
+ | abstract = {Security Dialogue 2015.46:293-306}, | ||
+ | number = {4}, | ||
+ | journal = {Security Dialogue}, | ||
+ | author = {Amicelle, Anthony and Aradau, Claudia and Jeandesboz, Julien}, | ||
+ | year = {2015}, | ||
+ | pages = {293--306}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{degoedePerformingPreemption2014, | ||
+ | title = {Performing preemption}, | ||
+ | volume = {45}, | ||
+ | issn = {0967-0106}, | ||
+ | doi = {10.1177/0967010614543585}, | ||
+ | abstract = {Security Dialogue 2014.45:411-422}, | ||
+ | number = {5}, | ||
+ | journal = {Security Dialogue}, | ||
+ | author = {de Goede, Marieke and Simon, Stephanie and Hoijtink, Marijn}, | ||
+ | year = {2014}, | ||
+ | pages = {411--422}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{degoedeChainSecurity2018, | ||
+ | title = {The chain of security}, | ||
+ | volume = {44}, | ||
+ | issn = {0260-2105}, | ||
+ | doi = {10.1017/S0260210517000353}, | ||
+ | number = {01}, | ||
+ | journal = {Review of International Studies}, | ||
+ | author = {de Goede, Marieke}, | ||
+ | year = {2018}, | ||
+ | pages = {24--42}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{cote-boucherOldNewWays2018, | ||
+ | title = {Of “old” and “new” ways: Generations, border control and the temporality of security}, | ||
+ | volume = {22}, | ||
+ | issn = {1362-4806}, | ||
+ | doi = {10.1177/1362480617690800}, | ||
+ | abstract = {Theoretical Criminology 2018.22:149-168}, | ||
+ | number = {2}, | ||
+ | journal = {Theoretical Criminology}, | ||
+ | author = {Côté-Boucher, Karine}, | ||
+ | year = {2018}, | ||
+ | pages = {149--168}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{europeancommissionSecurityUnionCommission2017, | ||
+ | title = {Security Union: Commission steps up efforts to tackle illegal content online}, | ||
+ | url = {http://europa.eu/rapid/press-release_IP-17-3493_en.htm}, | ||
+ | urldate = {2017-09-28}, | ||
+ | author = {{European Commission}}, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{kaufmannPoliticsDigital2017a, | ||
+ | title = {Politics and ‘the digital’}, | ||
+ | volume = {20}, | ||
+ | issn = {1368-4310}, | ||
+ | doi = {10.1177/1368431016677976}, | ||
+ | abstract = {European Journal of Social Theory 2017.20:309-328}, | ||
+ | number = {3}, | ||
+ | journal = {European Journal of Social Theory}, | ||
+ | author = {Kaufmann, Mareile and Jeandesboz, Julien}, | ||
+ | year = {2017}, | ||
+ | pages = {309--328}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{europeancommissionCommunicationCommissionEuropean2017, | ||
+ | title = {Communication from the commission to the European Parliament, the Council, the European economic and social committee and the committee of the regions}, | ||
+ | author = {{European Commission}}, | ||
+ | month = sep, | ||
+ | year = {2017}, | ||
+ | note = {Place: Bruxelles | ||
+ | Publisher: Communication from the commission to the European Parliament, the Council, the European economic and social committee and the committee of the regions}, | ||
+ | pages = {20}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{daniellopez-sanchezCasebasedReasoningResearch2018, | ||
+ | address = {Cham}, | ||
+ | series = {Lecture notes in computer science}, | ||
+ | title = {Case-based reasoning research and development}, | ||
+ | volume = {11156}, | ||
+ | isbn = {978-3-030-01081-2}, | ||
+ | abstract = {Case-Based Reasoning Research and Development, doi:10.1007/978-3-030-01081-2\_15}, | ||
+ | language = {eng}, | ||
+ | publisher = {Springer}, | ||
+ | author = {{Daniel López-Sánchez} and {Juan M. Corchado} and {Angélica González Arrieta}}, | ||
+ | editor = {Cox, Michael T. and Funk, Peter and Begum, Shahina}, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{jeandreePaperIPSA2012, | ||
+ | title = {paper\_IPSA2012}, | ||
+ | author = {Jeandrée, Philipp}, | ||
+ | keywords = {** (Poor)}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{gadClosedCircuitTechnological2013, | ||
+ | title = {A Closed Circuit Technological Vision: On Minority Report, event detection, and enabling technologies}, | ||
+ | volume = {11}, | ||
+ | doi = {10.24908/ss.v11i1/2.4550}, | ||
+ | number = {1/2}, | ||
+ | journal = {Surveillance \& Society}, | ||
+ | author = {Gad, Christopher and Hansen, Lone Koefoed}, | ||
+ | year = {2013}, | ||
+ | pages = {148--162}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{schindelBareLifeEuropean2016, | ||
+ | title = {Bare life at the European borders. Entanglements of technology, society and nature}, | ||
+ | issn = {0886-5655}, | ||
+ | doi = {10.1080/08865655.2016.1174604}, | ||
+ | abstract = {Journal of Borderlands Studies, 2016. doi:10.1080/08865655.2016.1174604}, | ||
+ | journal = {Journal of Borderlands Studies}, | ||
+ | author = {Schindel, Estela}, | ||
+ | year = {2016}, | ||
+ | pages = {1--16}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{NakedSightNaked, | ||
+ | title = {Naked\_sight\_for\_naked\_sites\_The\_producti}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{reutersFacebookTakesTerrorist, | ||
+ | title = {Facebook Takes on Terrorist Content Problem With AI}, | ||
+ | author = {{Reuters}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{bernalAILieDetectors, | ||
+ | title = {AI lie detectors to be tested by the EU at border points}, | ||
+ | author = {Bernal, Natasha}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{dralanj.liptonCriticalAssetProtection, | ||
+ | title = {Critical Asset Protection, Perimeter Monitoring, and Threat Detection Using Automated Video Surveillance}, | ||
+ | author = {{Dr Alan J. Lipton}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{bellanovaPoliticsDisappearanceScanners2013, | ||
+ | title = {Politics of Disappearance: Scanners and (Unobserved) Bodies as Mediators of Security Practices}, | ||
+ | volume = {7}, | ||
+ | issn = {17495679}, | ||
+ | doi = {10.1111/ips.12017}, | ||
+ | number = {2}, | ||
+ | journal = {International Political Sociology}, | ||
+ | author = {Bellanova, Rocco and Fuster, Gloria González}, | ||
+ | year = {2013}, | ||
+ | pages = {188--209}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ArtificialIntelligenceRealBenefitspdf, | ||
+ | title = {ArtificialIntelligenceRealBenefitspdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{greeneTroubleTrustingAIa, | ||
+ | title = {The Trouble With Trusting AI to Interpret Police Body-Cam Video}, | ||
+ | author = {Greene, Daniel}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@misc{LAPDHighlyproducedBody2018, | ||
+ | title = {LAPD's highly-produced body camera video draws scrutiny}, | ||
+ | url = {https://apnews.com/c5354bb0a0714c3792efab28e74db057}, | ||
+ | abstract = {LOS ANGELES (AP) — In the city that's home to Hollywood, even releasing police body camera footage is a high-quality production. Los Angeles police made public body camera video under a new policy that requires the public see footage within 45 days of a "critical incident," which includes all fatal shootings and other police encounters that result in serious injury or the death of a civilian. The video was carefully crafted and narrated so police could tell their "story" of an interaction with a man who died while in custody last month. They would not make the raw, unedited footage available.}, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{europeanparliamentLegislativeTrainSchedule, | ||
+ | title = {Legislative train schedule {\textbar} European Parliament {\textbar} Evernote Web}, | ||
+ | author = {{European Parliament}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{sweetmanRevealingHabitusIlluminating2009, | ||
+ | title = {Revealing Habitus, Illuminating Practice: Bourdieu, Photography and Visual Methods}, | ||
+ | volume = {57}, | ||
+ | issn = {0038-0261}, | ||
+ | doi = {10.1111/j.1467-954X.2009.01851.x}, | ||
+ | number = {3}, | ||
+ | journal = {The Sociological Review}, | ||
+ | author = {Sweetman, Paul}, | ||
+ | year = {2009}, | ||
+ | pages = {491--511}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{pooleEXCESSDESCRIPTIONEthnography2005, | ||
+ | title = {AN EXCESS OF DESCRIPTION: Ethnography, Race, and Visual Technologies}, | ||
+ | volume = {34}, | ||
+ | issn = {0084-6570}, | ||
+ | doi = {10.1146/annurev.anthro.33.070203.144034}, | ||
+ | abstract = {Annu. Rev. Anthropol. 2005.34:159-179}, | ||
+ | number = {1}, | ||
+ | journal = {Annual Review of Anthropology}, | ||
+ | author = {Poole, Deborah}, | ||
+ | year = {2005}, | ||
+ | pages = {159--179}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{pinkWalkingDisciplinesEthnography2010, | ||
+ | title = {Walking across disciplines: from ethnography to arts practice}, | ||
+ | volume = {25}, | ||
+ | issn = {1472-586X}, | ||
+ | doi = {10.1080/14725861003606670}, | ||
+ | number = {1}, | ||
+ | journal = {Visual Studies}, | ||
+ | author = {Pink, Sarah and Hubbard, Phil and O'Neill, Maggie and Radley, Alan}, | ||
+ | year = {2010}, | ||
+ | pages = {1--7}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{scheptSeeingPrisonCountervisual, | ||
+ | title = {(Un)seeing like a prison: Counter-visual ethnography of the carceral state}, | ||
+ | abstract = {Theoretical Criminology 2014.18:198-223}, | ||
+ | author = {Schept, Judah}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{ruppertRethinkingEmpiricalSocial, | ||
+ | title = {Rethinking empirical social sciences}, | ||
+ | abstract = {Dialogues in Human Geography 2013.3:268-273}, | ||
+ | author = {Ruppert, Evelyn}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@incollection{austinBourdieuMediaFilm, | ||
+ | title = {Bourdieu on Media and Film}, | ||
+ | booktitle = {New Uses of Bourdieu in Film and Media Studies}, | ||
+ | author = {Austin, Guy}, | ||
+ | pages = {1--12}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{puwarSensingPostColonialBourdieu2009, | ||
+ | title = {Sensing a Post-Colonial Bourdieu: An Introduction}, | ||
+ | volume = {57}, | ||
+ | issn = {0038-0261}, | ||
+ | doi = {10.1111/j.1467-954X.2009.01856.x}, | ||
+ | abstract = {The Sociological Review 2009.57:371-384}, | ||
+ | number = {3}, | ||
+ | journal = {The Sociological Review}, | ||
+ | author = {Puwar, Nirmal}, | ||
+ | year = {2009}, | ||
+ | pages = {371--384}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{mubibrighentiVisibilitySocialTheory2010, | ||
+ | address = {Basingstoke Hampshire England; New York}, | ||
+ | title = {Visibility in social theory and social research}, | ||
+ | isbn = {0-230-24102-6}, | ||
+ | abstract = {Palgrave Macmillan}, | ||
+ | publisher = {Palgrave Macmillan}, | ||
+ | author = {Mubi Brighenti, Andrea}, | ||
+ | year = {2010}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{halpernBeautifulData2015, | ||
+ | address = {Durham}, | ||
+ | series = {Experimental futures}, | ||
+ | title = {Beautiful data}, | ||
+ | isbn = {978-0-8223-5744-5}, | ||
+ | publisher = {Duke University Press}, | ||
+ | author = {Halpern, Orit}, | ||
+ | year = {2015}, | ||
+ | file = {Halpern_2015_Beautiful data.pdf:/home/ruben/Zotero/storage/4U337SWA/Halpern_2015_Beautiful data.pdf:application/pdf}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{gallowayExcommunication2014, | ||
+ | address = {Chicago; London}, | ||
+ | series = {Trios}, | ||
+ | title = {Excommunication}, | ||
+ | isbn = {0-226-92522-6}, | ||
+ | publisher = {The University of Chicago Press}, | ||
+ | author = {Galloway, Alexander R. and Thacker, Eugene and Wark, McKenzie}, | ||
+ | year = {2014}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{jewittConceptualisingResearchingBody2017a, | ||
+ | title = {Conceptualising and researching the body in digital contexts: towards new methodological conversations across the arts and social sciences}, | ||
+ | volume = {17}, | ||
+ | issn = {1468-7941}, | ||
+ | doi = {10.1177/1468794116656036}, | ||
+ | abstract = {Qualitative Research 2017.17:37-53}, | ||
+ | number = {1}, | ||
+ | journal = {Qualitative Research}, | ||
+ | author = {Jewitt, Carey and Price, Sara and Xambo Sedo, Anna}, | ||
+ | year = {2017}, | ||
+ | pages = {37--53}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{cohenVideoFilmmakingPsychotherapy2015, | ||
+ | address = {New York}, | ||
+ | series = {Advances in mental health research series}, | ||
+ | title = {Video and filmmaking as psychotherapy}, | ||
+ | isbn = {978-1-138-78142-9}, | ||
+ | publisher = {Routledge}, | ||
+ | author = {{Cohen} and {Joshua L.} and {Johnson} and {J. Lauren} and {Orr} and {Penny}}, | ||
+ | editor = {Cohen, Joshua L. and Johnson, J. Lauren}, | ||
+ | year = {2015}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{merleau-pontyPhenomenologyPerception1962, | ||
+ | address = {London; New York}, | ||
+ | title = {Phenomenology of perception}, | ||
+ | isbn = {0-415-04556-8}, | ||
+ | abstract = {Humanities}, | ||
+ | language = {engfre}, | ||
+ | publisher = {Routledge}, | ||
+ | author = {Merleau-Ponty, Maurice}, | ||
+ | year = {1962}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{smithPracticeledResearchResearchled2009, | ||
+ | address = {Edinburgh}, | ||
+ | series = {Research methods for the arts and humanities}, | ||
+ | title = {Practice-led research, research-led practice in the creative arts}, | ||
+ | isbn = {978-0-7486-3630-3}, | ||
+ | url = {http://www.jstor.org/stable/10.3366/j.ctt1g0b594}, | ||
+ | abstract = {Introduction : Practice-led research, research-led practice : towards the iterative cycle web / Hazel Smith and Roger T. Dean -- Making space : the purpose and place of practice-led research / Graeme Sullivan -- New media : the 'first word' in art? / Simon Biggs -- Knowledge unspoken : contemporary dance and the cycle of practice-led research, basic and applied research, and research-led practice / Shirley McKechnie and Catherine Stevens -- Practice as research through performance / Baz Kershaw -- Beachcombing : a fossicker's guide to whiteness and indigenous sovereignty / Anne Brewster -- Integrating creative practice and research in the digital media arts / Andrew R. Brown and Andrew Sorensen -- Mariposa : the story of new work of research/creation, taking shape, taking flight / Kathleen Vaughan -- Sustaining the sustainable? Developing a practice and problem-led new media praxis / Keith Armstrong -- Nightmares in the engine room / Jane Goodall -- Acquiring know-how : research training for practice-led researchers / Brad Haseman and Daniel Mafe -- Asking questions of art : higher education, research and creative practice / Judith Mottram -- The academic mode of production / Sharon Bell | ||
+ | |||
+ | |||
+ | |||
+ | Addresses one of the most exciting and innovative developments within higher education}, | ||
+ | language = {eng}, | ||
+ | publisher = {Edinburgh University Press}, | ||
+ | author = {Smith, Hazel and Dean, R. T.}, | ||
+ | year = {2009}, | ||
+ | doi = {10.3366/j.ctt1g0b594}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{jagodzinskiArtsbasedResearch2013, | ||
+ | address = {Rotterdam; Boston}, | ||
+ | series = {Other Books}, | ||
+ | title = {Arts-based research}, | ||
+ | isbn = {978-94-6209-184-9}, | ||
+ | url = {http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=578377}, | ||
+ | language = {eng}, | ||
+ | publisher = {SensePublishers}, | ||
+ | author = {Jagodzinski, Jan and Wallin, Jason J.}, | ||
+ | year = {2013}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{fosterCollaborativeArtsbasedResearch2016, | ||
+ | address = {London; New York}, | ||
+ | series = {Routledge advances in the medical humanities}, | ||
+ | title = {Collaborative arts-based research for social justice}, | ||
+ | isbn = {978-0-415-65692-4}, | ||
+ | publisher = {Routledge/Taylor \& Francis Group}, | ||
+ | author = {Foster, Victoria}, | ||
+ | year = {2016}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{knightArtsResearchEducation2018, | ||
+ | address = {Cham}, | ||
+ | title = {Arts-Research-Education}, | ||
+ | volume = {1}, | ||
+ | isbn = {978-3-319-61559-2}, | ||
+ | publisher = {Springer International Publishing}, | ||
+ | author = {Knight, Linda and Lasczik Cutcher, Alexandra}, | ||
+ | year = {2018}, | ||
+ | doi = {10.1007/978-3-319-61560-8}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{jewittExploringMethodologicalInnovation2017b, | ||
+ | title = {Exploring methodological innovation in the social sciences: the body in digital environments and the arts}, | ||
+ | volume = {20}, | ||
+ | issn = {1364-5579}, | ||
+ | doi = {10.1080/13645579.2015.1129143}, | ||
+ | abstract = {International Journal of Social Research Methodology, 2016. doi:10.1080/13645579.2015.1129143}, | ||
+ | number = {1}, | ||
+ | journal = {International Journal of Social Research Methodology}, | ||
+ | author = {Jewitt, Carey and Xambo, Anna and Price, Sara}, | ||
+ | year = {2017}, | ||
+ | pages = {105--120}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{rumboldKnowingDifferently2008, | ||
+ | address = {New York}, | ||
+ | title = {Knowing differently}, | ||
+ | isbn = {978-1-60456-378-8}, | ||
+ | url = {http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=368634}, | ||
+ | abstract = {Nova Science Publishers, Inc}, | ||
+ | language = {eng}, | ||
+ | publisher = {Nova Science Publishers}, | ||
+ | author = {Rumbold, Jean and Liamputtong, Pranee}, | ||
+ | year = {2008}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{alloaResistanceSensibleWorld2017, | ||
+ | address = {New York}, | ||
+ | edition = {First edition}, | ||
+ | series = {Perspectives in continental philosophy}, | ||
+ | title = {Resistance of the sensible world}, | ||
+ | isbn = {978-0-8232-7568-7}, | ||
+ | language = {eng fre}, | ||
+ | publisher = {Fordham University Press}, | ||
+ | author = {Alloa, Emmanuel and Todd, Jane Marie}, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{leeMicrosoftWordVisualPrimacy, | ||
+ | title = {Microsoft Word - VisualPrimacy.docx}, | ||
+ | author = {Lee, Lila}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{parrCollaborativeFilmmakingProcess2007, | ||
+ | title = {Collaborative film-making as process, method and text in mental health research}, | ||
+ | volume = {14}, | ||
+ | issn = {1474-4740}, | ||
+ | doi = {10.1177/1474474007072822}, | ||
+ | number = {1}, | ||
+ | journal = {cultural geographies}, | ||
+ | author = {Parr, Hester}, | ||
+ | year = {2007}, | ||
+ | pages = {114--138}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{leavyResearchDesign2017, | ||
+ | address = {New York; London}, | ||
+ | title = {Research design}, | ||
+ | isbn = {978-1-4625-1438-0}, | ||
+ | abstract = {This user-friendly book provides a step-by-step guide to using the five major approaches to research design: quantitative, qualitative, mixed methods, arts-based, and community-based participatory research. Chapters on each approach follow a unique format--they present a template for a research proposal and explain in detail how to conceptualize and fill in every section. Terminology commonly used within each approach is identified, and key moments of ethical decision making are flagged. Interdisciplinary research examples draw on current events and social justice topics.}, | ||
+ | publisher = {Guilford Press}, | ||
+ | author = {Leavy, Patricia}, | ||
+ | year = {2017}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{duxburyThinkingPracticeArt2008, | ||
+ | title = {Thinking through practice. Art as research in the academy}, | ||
+ | publisher = {RMIT Publishing}, | ||
+ | editor = {Duxbury, Lesley and Grierson, Elizabeth and Waite, Dianne}, | ||
+ | year = {2008}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{nelsonPracticeResearchArts, | ||
+ | title = {Practice As Research in the Arts}, | ||
+ | author = {Nelson, Robin}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{garrettDroneMethodologiesTaking2018, | ||
+ | title = {Drone methodologies: Taking flight in human and physical geography}, | ||
+ | volume = {43}, | ||
+ | issn = {00202754}, | ||
+ | doi = {10.1111/tran.12232}, | ||
+ | abstract = {Transactions of the Institute of British Geographers 2018.43:341-359}, | ||
+ | number = {3}, | ||
+ | journal = {Transactions of the Institute of British Geographers}, | ||
+ | author = {Garrett, Bradley and Anderson, Karen}, | ||
+ | year = {2018}, | ||
+ | pages = {341--359}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{nathTouchedDronesScreens2016, | ||
+ | title = {Touched from Below: On Drones, Screens and Navigation}, | ||
+ | volume = {29}, | ||
+ | issn = {0894-9468}, | ||
+ | doi = {10.1080/08949468.2016.1154769}, | ||
+ | abstract = {Visual Anthropology, 2016. doi:10.1080/08949468.2016.1154769}, | ||
+ | number = {3}, | ||
+ | journal = {Visual Anthropology}, | ||
+ | author = {Nath, Anjali}, | ||
+ | year = {2016}, | ||
+ | pages = {315--330}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{weinerEpistemologyEthnographicReality1976, | ||
+ | title = {Epistemology and Ethnographic Reality: A Trobriand Island Case Study}, | ||
+ | volume = {31}, | ||
+ | issn = {00032409}, | ||
+ | doi = {10.1111/j.1365-2044.1976.tb11890.x}, | ||
+ | abstract = {American Anthropologist 1978.80:752-757}, | ||
+ | number = {6}, | ||
+ | journal = {Anaesthesia}, | ||
+ | author = {Weiner, Annette B.}, | ||
+ | year = {1976}, | ||
+ | pages = {813--815}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{metzFilmLanguage1991, | ||
+ | address = {Chicago}, | ||
+ | edition = {University of Chicago Press ed.}, | ||
+ | title = {Film language}, | ||
+ | isbn = {0-226-52130-3}, | ||
+ | language = {eng}, | ||
+ | publisher = {University of Chicago Press}, | ||
+ | author = {Metz, Christian}, | ||
+ | year = {1991}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{pauwelsParticipatoryVisualResearch2015, | ||
+ | title = {‘Participatory’ visual research revisited: A critical-constructive assessment of epistemological, methodological and social activist tenets}, | ||
+ | volume = {16}, | ||
+ | issn = {1466-1381}, | ||
+ | doi = {10.1177/1466138113505023}, | ||
+ | number = {1}, | ||
+ | journal = {Ethnography}, | ||
+ | author = {Pauwels, Luc}, | ||
+ | year = {2015}, | ||
+ | pages = {95--117}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{masonComingOurSenses2009, | ||
+ | title = {Coming to our senses? A critical approach to sensory methodology}, | ||
+ | volume = {9}, | ||
+ | issn = {1468-7941}, | ||
+ | doi = {10.1177/1468794109343628}, | ||
+ | abstract = {Qualitative Research 2009.9:587-603}, | ||
+ | number = {5}, | ||
+ | journal = {Qualitative Research}, | ||
+ | author = {Mason, Jennifer and Davies, Katherine}, | ||
+ | year = {2009}, | ||
+ | pages = {587--603}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{feldResearchableFilmLanguage1975, | ||
+ | title = {Toward a Researchable Film Language}, | ||
+ | volume = {2}, | ||
+ | issn = {01926918}, | ||
+ | doi = {10.1525/var.1975.2.1.25}, | ||
+ | number = {1}, | ||
+ | journal = {Studies in the Anthropology of Visual Communications}, | ||
+ | author = {Feld, Steve and Williams, Carroll}, | ||
+ | year = {1975}, | ||
+ | pages = {25--32}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{eisensteinFilmSense1957, | ||
+ | title = {The Film Sense}, | ||
+ | publisher = {Meridian Books}, | ||
+ | author = {Eisenstein, Sergei}, | ||
+ | year = {1957}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{malimResearchMethodsStatistics1997, | ||
+ | address = {London}, | ||
+ | title = {Research Methods and Statistics}, | ||
+ | isbn = {978-0-333-64439-3}, | ||
+ | publisher = {Macmillan Education UK}, | ||
+ | editor = {Malim, Tony and Birch, Ann}, | ||
+ | year = {1997}, | ||
+ | doi = {10.1007/978-1-349-13865-4}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@incollection{malimResearchMethods1997, | ||
+ | address = {London}, | ||
+ | title = {Research Methods}, | ||
+ | isbn = {978-0-333-64439-3}, | ||
+ | booktitle = {Research Methods and Statistics}, | ||
+ | publisher = {Macmillan Education UK}, | ||
+ | author = {Malim, Tony and Birch, Ann}, | ||
+ | editor = {Malim, Tony and Birch, Ann}, | ||
+ | year = {1997}, | ||
+ | doi = {10.1007/978-1-349-13865-4_2}, | ||
+ | pages = {17--54}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{pearlmanCuttingRhythms2009, | ||
+ | address = {Amsterdam; Boston}, | ||
+ | title = {Cutting rhythms}, | ||
+ | isbn = {0-240-81014-7}, | ||
+ | publisher = {Focal Press/Elsevier}, | ||
+ | author = {Pearlman, Karen}, | ||
+ | year = {2009}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{panofskyGothicArchitectureScholasticism1957, | ||
+ | title = {Gothic Architecture and Scholasticism. An Inquiry into the analogy of the arts, philosophy and religion in the Middle Ages}, | ||
+ | publisher = {Meridian Books}, | ||
+ | author = {Panofsky, Eric}, | ||
+ | year = {1957}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{charlessanderspeirceCollectedPapersCharles, | ||
+ | title = {The Collected Papers of Charles Sanders Peirce}, | ||
+ | author = {{Charles Sanders Peirce}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{godardGodardGodard1986, | ||
+ | address = {New York}, | ||
+ | series = {A Da Capo paperback}, | ||
+ | title = {Godard on Godard}, | ||
+ | isbn = {0-306-80259-7}, | ||
+ | publisher = {Da Capo Press}, | ||
+ | author = {Godard, Jean-Luc and Roud, Richard}, | ||
+ | editor = {Narboni, Jean and Milne, Tom}, | ||
+ | year = {1986}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@book{bazinWhatCinemaVol2005, |
− | title = { | + | address = {Berkeley}, |
− | author = { | + | edition = {[ACLS Humanities E-Book edition]}, |
− | + | title = {What Is Cinema? Vol. I}, | |
− | year = {2017}, | + | isbn = {0-520-24227-0}, |
− | + | url = {http://hdl.handle.net/2027/heb.08209.0001.001}, | |
− | address = { | + | language = {eng}, |
− | url = {https://www. | + | publisher = {University of California Press}, |
− | } | + | author = {Bazin, André}, |
+ | year = {2005}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{mruck116838715PB, | ||
+ | title = {1168-3871-5-PB}, | ||
+ | author = {Mruck, Katja}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{barthesElementsSemiology, | ||
+ | title = {Elements of Semiology}, | ||
+ | abstract = {Semiotics}, | ||
+ | author = {Barthes, Roland}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{jacksonKnowledgeBody1983, | ||
+ | title = {Knowledge of the Body}, | ||
+ | author = {Jackson, Michael}, | ||
+ | year = {1983}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{stollerSensuousScholarship1997, | ||
+ | title = {Sensuous scholarship}, | ||
+ | publisher = {University of Pennsylvania Press}, | ||
+ | author = {Stoller, Paul}, | ||
+ | year = {1997}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{jakobsonFundamentalsLanguage, | ||
+ | title = {Fundamentals of language}, | ||
+ | author = {{Jakobson} and {Roman} and {1896}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{carlose.perezCollectedPapersCharles, | ||
+ | title = {The Collected Papers of Charles Sanders Peirce}, | ||
+ | author = {{Carlos E. Perez}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{panofskyStyleMediumMotion, | ||
+ | title = {Style and Medium in the Motion Pictures}, | ||
+ | author = {Panofsky, Eric}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{afonsoWorkingImages2004, | ||
+ | address = {London; New York}, | ||
+ | title = {Working images}, | ||
+ | isbn = {978-0-415-30654-6}, | ||
+ | url = {http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=116951}, | ||
+ | abstract = {"In Working Images, prominent visual anthropologists and artists explore how old and new visual media can be integrated into contemporary forms of research and representation"--Provided by publisher}, | ||
+ | language = {eng}, | ||
+ | publisher = {Routledge}, | ||
+ | author = {Afonso, Ana Isabel and Kürti, László and Pink, Sarah}, | ||
+ | year = {2004}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{matthewsInteractiveMultimediaEthnography, | ||
+ | title = {Interactive multimedia ethnography: archiving workflow, interface aesthetics and metadata}, | ||
+ | author = {Matthews, Paul}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{thomasSocialInteractionalDimensions, | ||
+ | title = {The Social and Interactional Dimensions of Human–Computer Interfaces}, | ||
+ | author = {{Thomas} and {Peter J.}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{kohnInstagramNaturalizedPropaganda2017, | ||
+ | title = {Instagram as a naturalized propaganda tool}, | ||
+ | volume = {23}, | ||
+ | issn = {1354-8565}, | ||
+ | doi = {10.1177/1354856515592505}, | ||
+ | abstract = {Convergence 2017.23:197-213}, | ||
+ | number = {2}, | ||
+ | journal = {Convergence: The International Journal of Research into New Media Technologies}, | ||
+ | author = {Kohn, Ayelet}, | ||
+ | year = {2017}, | ||
+ | pages = {197--213}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@inproceedings{morrisExtractingNetworkingEmotions, | ||
+ | address = {Odense, Denmark}, | ||
+ | title = {Extracting and Networking Emotions in Extremist Propaganda}, | ||
+ | isbn = {978-1-4673-2358-1}, | ||
+ | doi = {10.1109/EISIC.2012.33}, | ||
+ | abstract = {2012 European Intelligence and Security Informatics Conference}, | ||
+ | publisher = {IEEE}, | ||
+ | author = {Morris, Travis}, | ||
+ | pages = {53--59}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{dovelingRoutledgeHandbookEmotions2011, | ||
+ | address = {London; New York}, | ||
+ | series = {Routledge international handbooks}, | ||
+ | title = {The Routledge handbook of emotions and mass media}, | ||
+ | isbn = {978-0-415-48160-1}, | ||
+ | abstract = {Behavioral Sciences}, | ||
+ | publisher = {Routledge}, | ||
+ | author = {Döveling, Katrin and Scheve, Christian von and Konijn, Elly}, | ||
+ | year = {2011}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{mn1178MicrosoftWordDark, | ||
+ | title = {Microsoft Word - The\_Dark\_Side\_of\_Political\_Marketing.doc}, | ||
+ | author = {{MN1178}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@inproceedings{2015IEEEConference, | ||
+ | address = {Boston, MA, USA}, | ||
+ | title = {2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)}, | ||
+ | isbn = {978-1-4673-6964-0}, | ||
+ | publisher = {IEEE}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{holubReceptionTheory2013, | ||
+ | address = {Hoboken}, | ||
+ | series = {New Accents}, | ||
+ | title = {Reception Theory}, | ||
+ | isbn = {978-0-415-29144-6}, | ||
+ | url = {http://gbv.eblib.com/patron/FullRecord.aspx?p=1222825}, | ||
+ | abstract = {First published in 2002}, | ||
+ | language = {eng}, | ||
+ | publisher = {Taylor and Francis}, | ||
+ | author = {Holub, Robert C.}, | ||
+ | year = {2013}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{eichnerAgencyMediaReception2014, | ||
+ | address = {Wiesbaden}, | ||
+ | title = {Agency and Media Reception}, | ||
+ | isbn = {978-3-658-04672-9}, | ||
+ | publisher = {Springer Fachmedien Wiesbaden}, | ||
+ | author = {Eichner, Susanne}, | ||
+ | year = {2014}, | ||
+ | doi = {10.1007/978-3-658-04673-6}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@inproceedings{2012EuropeanIntelligence, | ||
+ | address = {Odense, Denmark}, | ||
+ | title = {2012 European Intelligence and Security Informatics Conference}, | ||
+ | isbn = {978-1-4673-2358-1}, | ||
+ | publisher = {IEEE}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{sillinceModelSocialEmotional1996, | ||
+ | title = {A model of social, emotional and symbolic aspects of computer-mediated communication within organizations}, | ||
+ | number = {4}, | ||
+ | journal = {Computer Supported Cooperative Work}, | ||
+ | author = {Sillince, John A. A.}, | ||
+ | year = {1996}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{austinNewUsesBourdieu2016, | ||
+ | address = {New York}, | ||
+ | title = {New uses of Bourdieu in film and media studies}, | ||
+ | isbn = {978-1-78533-829-8}, | ||
+ | publisher = {Berghahn}, | ||
+ | author = {Austin, Guy}, | ||
+ | editor = {Austin, Guy}, | ||
+ | year = {2016}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{cambrosioLymphocytesPixelsTechnoVisual2000, | ||
+ | title = {Of Lymphocytes and Pixels: The Techno-Visual Production of Cell Populations}, | ||
+ | volume = {31}, | ||
+ | number = {2}, | ||
+ | journal = {Studies in History and Philosophy of Biological and Biomedical Sciences}, | ||
+ | author = {Cambrosio, Alberto and Keating, Peter}, | ||
+ | year = {2000}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{bousquetEyeWar2018, | ||
+ | address = {Minneapolis}, | ||
+ | title = {The eye of war}, | ||
+ | isbn = {978-1-4529-5805-7}, | ||
+ | abstract = {"This project explores how technologies of perception -- the ability to detect and to avoid detection -- have transformed modern warfare. The book spans from the Renaissance, where the rationalization of vision and space started to influence military strategy, to the present day, where combatants increasingly face off in the perceptual realm of drones and satellites as much the physical battlefield. Each chapter explores a different perceptual theme: sensing, imaging, mapping and hiding"--}, | ||
+ | publisher = {University of Minnesota Press}, | ||
+ | author = {Bousquet, Antoine J.}, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@incollection{bleikerMappingVisualPolitics2018, | ||
+ | address = {London}, | ||
+ | edition = {1st}, | ||
+ | series = {Interventions}, | ||
+ | title = {Mapping Visual Politics}, | ||
+ | isbn = {978-0-415-72607-8}, | ||
+ | booktitle = {Visual global politics}, | ||
+ | publisher = {Routledge}, | ||
+ | author = {Bleiker, Roland}, | ||
+ | editor = {Bleiker, Roland}, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{madsenDataSmartCity2018, | ||
+ | title = {Data in the smart city: How incongruent frames challenge the transition from ideal to practice}, | ||
+ | volume = {5}, | ||
+ | issn = {2053-9517}, | ||
+ | doi = {10.1177/2053951718802321}, | ||
+ | abstract = {Big Data \& Society 2018.5:2053951718802321}, | ||
+ | number = {2}, | ||
+ | journal = {Big Data \& Society}, | ||
+ | author = {Madsen, Anders Koed}, | ||
+ | year = {2018}, | ||
+ | pages = {205395171880232}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@inproceedings{nguyenDeepNeuralNetworks, | ||
+ | address = {Boston, MA, USA}, | ||
+ | title = {Deep neural networks are easily fooled: High confidence predictions for unrecognizable images}, | ||
+ | isbn = {978-1-4673-6964-0}, | ||
+ | doi = {10.1109/CVPR.2015.7298640}, | ||
+ | publisher = {IEEE}, | ||
+ | author = {Nguyen, Anh and Yosinski, Jason and Clune, Jeff}, | ||
+ | pages = {427--436}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@incollection{vuoriIntroductionVisualSecurity2018, | ||
+ | title = {Introduction. Visual Security Studies}, | ||
+ | booktitle = {Visual Security Studies: Sights and Spectacles of Insecurity and War}, | ||
+ | author = {Vuori, Juha A. and Andersen, Rune Saugmann}, | ||
+ | editor = {Vuori, Juha A. and Andersen, Rune Saugmann}, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@incollection{wilcoxDrones2018, | ||
+ | address = {London}, | ||
+ | edition = {1st}, | ||
+ | series = {Interventions}, | ||
+ | title = {Drones}, | ||
+ | isbn = {978-0-415-72607-8}, | ||
+ | booktitle = {Visual global politics}, | ||
+ | publisher = {Routledge}, | ||
+ | author = {Wilcox, Lauren}, | ||
+ | editor = {Bleiker, Roland}, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{kaufmannPredictivePolicingPolitics2018, | ||
+ | title = {Predictive Policing and the Politics of Patterns}, | ||
+ | volume = {48}, | ||
+ | issn = {0007-0955}, | ||
+ | doi = {10.1093/bjc/azy060}, | ||
+ | journal = {The British Journal of Criminology}, | ||
+ | author = {Kaufmann, Mareile and Egbert, Simon and Leese, Matthias}, | ||
+ | year = {2018}, | ||
+ | pages = {1--19}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{amooreDoubtfulAlgorithmsMachine2018, | ||
+ | title = {Doubtful algorithms : of machine learning truths and partial accounts}, | ||
+ | author = {Amoore, Louise}, | ||
+ | year = {2018}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{flyverbomDatastructuringOrganizingCurating2018, | ||
+ | title = {Datastructuring—Organizing and curating digital traces into action}, | ||
+ | volume = {5}, | ||
+ | issn = {2053-9517}, | ||
+ | doi = {10.1177/2053951718799114}, | ||
+ | abstract = {Big Data \& Society 2018.5:2053951718799114}, | ||
+ | number = {2}, | ||
+ | journal = {Big Data \& Society}, | ||
+ | author = {Flyverbom, Mikkel and Murray, John}, | ||
+ | year = {2018}, | ||
+ | pages = {205395171879911}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{aradauAssemblingCredibilityKnowledge2018, | ||
+ | title = {Assembling credibility: Knowledge, method and critique in times of ‘post-truth’}, | ||
+ | volume = {49}, | ||
+ | issn = {0967-0106}, | ||
+ | doi = {10.1177/0967010618788996}, | ||
+ | abstract = {Security Dialogue 0.0:0967010618788996}, | ||
+ | number = {3}, | ||
+ | journal = {Security Dialogue}, | ||
+ | author = {Aradau, Claudia and Huysmans, Jef}, | ||
+ | year = {2018}, | ||
+ | pages = {096701061878899}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{graysonScopicRegimesVisual2018, | ||
+ | title = {Scopic regimes and the visual turn in International Relations: Seeing world politics through the drone}, | ||
+ | volume = {16}, | ||
+ | issn = {1354-0661}, | ||
+ | doi = {10.1177/1354066118781955}, | ||
+ | abstract = {European Journal of International Relations 0.0:1354066118781955}, | ||
+ | number = {3}, | ||
+ | journal = {European Journal of International Relations}, | ||
+ | author = {Grayson, Kyle and Mawdsley, Jocelyn}, | ||
+ | year = {2018}, | ||
+ | pages = {135406611878195}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{feldmanSecurocraticWarsPublic2004, | ||
+ | title = {Securocratic wars of public safety}, | ||
+ | volume = {6}, | ||
+ | issn = {1369-801X}, | ||
+ | doi = {10.1080/1369801042000280005}, | ||
+ | number = {3}, | ||
+ | journal = {Interventions}, | ||
+ | author = {Feldman, Allen}, | ||
+ | year = {2004}, | ||
+ | pages = {330--350}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{veelMakeDataSing2018, | ||
+ | title = {Make data sing: The automation of storytelling}, | ||
+ | volume = {5}, | ||
+ | issn = {2053-9517}, | ||
+ | doi = {10.1177/2053951718756686}, | ||
+ | abstract = {Big Data \& Society 2018.5:2053951718756686}, | ||
+ | number = {1}, | ||
+ | journal = {Big Data \& Society}, | ||
+ | author = {Veel, Kristin}, | ||
+ | year = {2018}, | ||
+ | pages = {205395171875668}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{kirinoNonequilibriumCurrentOne2010, | ||
+ | title = {Nonequilibrium Current in the One Dimensional Hubbard Model at Half-Filling}, | ||
+ | volume = {79}, | ||
+ | issn = {0031-9015}, | ||
+ | url = {http://arxiv.org/pdf/1005.2015v2}, | ||
+ | doi = {10.1143/JPSJ.79.093710}, | ||
+ | abstract = {Nonlinear transport in the one dimensional Hubbard model at half-filling under a finite bias voltage is investigated by the adaptive time-dependent density matrix renormalization group method. For repulsive on-site interaction, dielectric breakdown of the Mott insulating ground state to a current-carrying nonequilibrium steady state is clearly observed when the voltage exceeds the charge gap. It is found that by increasing the voltage further the current-voltage characteristics are scaled only by the charge gap and the scaling curve exhibits almost linear dependence on the voltage whose slope is suppressed by the electron correlation. In the case of attractive interaction the linear conductance is the perfect one \$2e{\textasciicircum}2/h\$ which agrees with the prediction by the Luttinger liquid theory.}, | ||
+ | number = {9}, | ||
+ | urldate = {2010-05-12}, | ||
+ | journal = {Journal of the Physical Society of Japan}, | ||
+ | author = {Kirino, Shunsuke and Ueda, Kazuo}, | ||
+ | year = {2010}, | ||
+ | pages = {093710}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{feddesIncreasingSelfesteemEmpathy2015, | ||
+ | title = {Increasing self-esteem and empathy to prevent violent radicalization: a longitudinal quantitative evaluation of a resilience training focused on adolescents with a dual identity}, | ||
+ | volume = {45}, | ||
+ | issn = {00219029}, | ||
+ | doi = {10.1111/jasp.12307}, | ||
+ | number = {7}, | ||
+ | journal = {Journal of Applied Social Psychology}, | ||
+ | author = {Feddes, Allard R. and Mann, Liesbeth and Doosje, Bertjan}, | ||
+ | year = {2015}, | ||
+ | pages = {400--411}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{danielAutor, | ||
+ | title = {Autor}, | ||
+ | author = {{Daniel}}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{harperMicrosoftWordThesis, | ||
+ | title = {Microsoft Word - Thesis final for pdf.docx}, | ||
+ | author = {Harper, Patti}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{alyMakingNoiseOnline2014, | ||
+ | title = {Making ‘Noise’ Online: An Analysis of the Say No to Terror Online Campaign}, | ||
+ | volume = {8}, | ||
+ | number = {5}, | ||
+ | journal = {Perspectives on Terrorism}, | ||
+ | author = {Aly, Anne and Weimann-Saks, Dana and Weimann, Gabriel}, | ||
+ | year = {2014}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{pinkEthnographyInvisibleEnergy2011, | ||
+ | title = {Ethnography of the invisible: energy in the multisensory home}, | ||
+ | journal = {Ethnologia Europea: Journal of European Ethnology}, | ||
+ | author = {Pink, Sarah}, | ||
+ | year = {2011}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{pauwelsVideoMultimediaarticleMode2002, | ||
+ | title = {The video- and multimedia-article as a mode of scholarly communication: toward scientifically informed expression and aesthetics}, | ||
+ | volume = {17}, | ||
+ | issn = {1472-586X}, | ||
+ | doi = {10.1080/1472586022000032224}, | ||
+ | number = {2}, | ||
+ | journal = {Visual Studies}, | ||
+ | author = {Pauwels, Luc}, | ||
+ | year = {2002}, | ||
+ | pages = {150--159}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{prosserImagebasedResearch1998, | ||
+ | address = {London}, | ||
+ | title = {Image-based Research}, | ||
+ | isbn = {978-0-7507-0706-0}, | ||
+ | url = {https://ebookcentral.proquest.com/lib/gbv/detail.action?docID=241926}, | ||
+ | abstract = {Book Cover -- Half-Title -- Title -- Dedication -- Title -- Copyright -- Contents -- Acknowledgments -- Introduction -- Part 1 A Theoretical Overview of Image-based Research -- Chapter 1 Visual Anthropology: Image, Object and Interpretation1 -- Abstract -- Anthropology and Visual Systems -- The Visual in Anthropology -- Issues -- Material Visions -- Notes -- References -- Chapter 2 An Argument for Visual Sociology -- Abstract -- Visual Ethnography and the Realist Tale -- Visual Sociology and the Realist Tale -- Methodological Critique: New Ethnography -- The Critique, Part Two: Postmodernism and Documentary -- The Critique, Part Three: Cultural Studies and Visual Texts -- Building a Visual Sociology -- Salvaging assumptions from traditional sociology? -- Lessons from the Critique? -- Visual Sociologist as Cultural Critique? -- Notes -- References -- Chapter 3 Film-making and Ethnographic Research -- Abstract -- Claiming the Real: The Status of Ethnographic Film -- Documentation versus the Documentary -- Film and Anthropological Theory -- Film as Ethnography: The Promise of the Future -- Notes -- References -- Chapter 4 'The Camera Never Lies': The Partiality of Photographic Evidence -- Abstract -- Notes -- References -- Chapter 5 Psychology and Photographic Theory -- Abstract -- Introduction -- onal Reaction ... -- ionship to Time ... -- Folk Myth' or a 'Symbolist Folk Myth' ... -- The Meaning of Photographs Arises in a Narrative Context -- Photographs May Draw on Ancient Themes of Unity and Cohesiveness ... -- Our Personal Histories are not only Contained in Family Albums, but They are Created by Them -- Conclusion -- References -- Chapter 6 Visual Sociology, Documentary Photography, and Photojournalism: It's (Almost) All a Matter of Context -- Abstract -- Three Kinds of Photography -- Context -- A Practical Demonstration | ||
+ | |||
+ | |||
+ | |||
+ | Reading a Documentary Picture As Visual Sociology or Photojournalism -- Reading a Sociological Picture as Journalism and as Documentary -- Reading a Journalistic Picture as Visual Sociology and as Documentary -- Conclusion -- Notes -- References -- Chapter 7 The Status of Image-based Research -- Abstract -- Introduction -- What Informs Qualitative Researchers' Views on Image-based Research? -- Historical Influences -- Traditional Methodological Arguments against Image-based Research -- Reflexivity -- Researchers Do Not Live in a Vacuum -- Conclusion -- Notes -- References -- Part 2 Images in the Research Process -- Chapter 8 Photographs within the Sociological Research Process -- Abstract -- Research Design -- Data Collection -- Analysis -- Conclusion -- Notes -- References -- Chapter 9 Remarks on Visual Competence as an Integral Part of Ethnographic Fieldwork Practice: The Visual Availability of Culture -- Abstract -- Introduction -- Ethnography as Description -- Ethnography and the Visual Domain: Cultures Visual Availability -- Ethnographic Analysis and the Visual Availability of Cultural Arrangements -- A Case Study in the Ethnographic Analysis of Stored Visual Materials -- The Ethnographic Context -- A Visual Research Problem -- Preliminary Observations on the Data -- Signs -- The Potential to Analyse a Unit of Data from Different Theoretical Vantages -- References -- Chapter 10 Photocontext -- Abstract -- The Sensitive Eye -- Documenting Instances -- Internal Validity and Reflexivity -- Accounts of Reflexive Photographers -- What to Frame and Questions of Validity -- External Validity -- Conclusion -- Notes -- References -- Chapter 11 Media Convergence and Social Research: The Hathaway Project -- Abstract -- Introduction -- Origins of the Project -- The Hathaway Project -- The Nature of the Resource -- Conclusion -- Note -- References | ||
+ | |||
+ | |||
+ | |||
+ | Chapter 12 The Application of Images in Child Abuse Investigations -- Abstract -- Brief History of Research on Child Witnesses -- The Use of Images in Interviews -- Anatomically Detailed Dolls -- Puppets -- Books -- Drawings -- Other Projective Techniques -- Play Therapy Toys -- Image-based Techniques in the Cognitive Interview -- Conclusion -- References -- Part 3 Image-based Research in Practice -- Chapter 13 Picture This! Class Line-ups, Vernacular Portraits and Lasting Impressions of School -- Abstract -- Introduction -- Constucted Images -- Photography and Narrative -- Revisiting the Family Album -- Teachers as Photographers -- School Photography in Image-based Research -- Note -- References -- Chapter 14 Interpreting Family Photography as Pictorial Communication -- Abstract -- Introduction -- A Social Approach to the Pictorial World -- Locating the Home Mode of Communication -- Searching for an Orienting Question -- Proposing a Descriptive Framework -- Image Communication Events -- Planning Events -- Shooting Events -- Editing Events -- Exhibition Events -- Image Communication Components -- Personal, Social, and Cultural Functions -- Fieldwork Methods for Home Mode Projects -- Conclusion -- Notes -- References -- Chapter 15 Pupils Using Photographs in School Self-evaluation -- Abstract -- What's the Use of Taking Photographs in Evaluation? -- Why Not Think of Life as a Chain of Photographs? -- How to Do Photo-evaluation -- A Short Guide to Photo-evaluation -- Ways of Implementing Photo-evaluation -- Photo-evaluation in the Making -- Teamwork Observed -- First Findings -- What We Have Learned from Observing Discussion, Decision Making and Presentations -- Hints and Warnings -- Getting Hold of the Invisible: Theoretical Annotations -- Islands of Agreement -- Control and Liberation -- Curricular Matters -- Conclusion -- Note -- References | ||
+ | |||
+ | |||
+ | |||
+ | Chapter 16 Cartoons and Teachers: Mediated Visual Images as Data -- Abstract -- Introduction -- Describing a Cartoon -- Content and the Public Context -- Methodology -- Stage 1: Initial Description -- Stage 2: Immediate Connotation -- Stage 3: Systemic Connotation -- Stage 4: Establishing Narrative Threads -- Conclusion -- References -- Chapter 17 Images and Curriculum Development in Health Education -- Abstract -- The Challenge -- The Role of Developmental Psychology -- The Importance of 'Starting Where Children Are' -- Using the Images Children Draw -- The Draw and Write Technique -- Using 'Draw and Write' to Investigate Health-related Issues with Children -- Establishing Draw and Write as a Valid and Reliable Research Tool -- Conclusion -- References -- Chapter 18 Making Meanings in Art Worlds: A Sociological Account of the Career of John Constable and his Oeuvre, with Special Reference to 'The Cornfield' (Homage to Howard Becker) -- Abstract -- Introduction -- Methodology -- Resources -- Conventions -- Distribution -- Aesthetic Rationale -- Editing -- Art and Craft -- Change in Art Worlds -- Reputation -- Notes -- References -- Notes on Contributors -- Index | ||
+ | |||
+ | |||
+ | |||
+ | This text covers an image-based approach to qualitative research theory, and the research process and provides practical examples of how image-based research is applied in the field. Specifically, it covers a range of disciplines (sociology, anthropology, ethnography) and discusses the application of various image-based techniques (photography, film-making, video and cartoon)}, | ||
+ | language = {eng}, | ||
+ | publisher = {Taylor and Francis}, | ||
+ | author = {Prosser, Jon}, | ||
+ | year = {1998}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@incollection{dicksHypermediaMethodsQualitative, | ||
+ | title = {Hypermedia methods for qualitative research}, | ||
+ | booktitle = {The Handbook of Emergent Methods}, | ||
+ | author = {Dicks, Bella and Mason, Bruce}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{schnettlerNotesHistoryDevelopment2013, | ||
+ | title = {Notes on the History and Development of Visual Research Methods}, | ||
+ | doi = {10.2390/INDI-V4-I1-77}, | ||
+ | abstract = {Visual research has been gaining in importance in recent years. This can be seen most clearly in those methods that rely on various forms of visual representation and using photographs, films, or videos as main sources of data. While opening the door to a deeper understanding and interpretation of social realities, visual analysis continues to deliver methodological challenge to the social sciences. This article sheds light on the development of visual analysis and focuses on its relevance for social research. Starting with its first applications following the invention of still and moving cameras, it traces this development up to the current use of audio-visual digital camera technologies in social research, which has made the most noticeable theoretical and methodological progress in the social sciences in the fields of videography and interpretive video analysis.}, | ||
+ | language = {en}, | ||
+ | author = {Schnettler, Bernt}, | ||
+ | year = {2013}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{schulzkeMilitaryVideogamesFuture2017, | ||
+ | title = {Military videogames and the future of ideological warfare}, | ||
+ | volume = {19}, | ||
+ | issn = {1369-1481}, | ||
+ | doi = {10.1177/1369148117704173}, | ||
+ | number = {3}, | ||
+ | journal = {The British Journal of Politics and International Relations}, | ||
+ | author = {Schulzke, Marcus}, | ||
+ | year = {2017}, | ||
+ | pages = {609--626}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{sahyounNeuroimagingFunctionalStructural2010, | ||
+ | title = {Neuroimaging of the Functional and Structural Networks Underlying Visuospatial versus Linguistic Reasoning in High-Functioning Autism}, | ||
+ | volume = {48}, | ||
+ | issn = {0028-3932}, | ||
+ | doi = {10.1016/j.neuropsychologia.2009.08.013}, | ||
+ | abstract = {High-functioning individuals with autism have been found to favor visuospatial processing in the face of typically poor language abilities. We aimed to examine the neurobiological basis of this difference using functional magnetic resonance imaging and diffusion tensor imaging. We compared 12 children with high functioning autism (HFA) to 12 age- and IQ-matched typically developing controls (CTRL) on a pictorial reasoning paradigm under three conditions: V, requiring visuospatial processing, S, requiring language (i.e. semantic) processing, and V+S, a hybrid condition in which language use could facilitate visuospatial transformations. Activated areas in the brain were chosen as endpoints for probabilistic diffusion tractography to examine tract integrity (FA) within the structural network underlying the activation patterns. The two groups showed similar networks, with linguistic processing activating inferior frontal, superior and middle temporal, ventral visual, and temporo-parietal areas, whereas visuospatial processing activated occipital and inferior parietal cortices. However, HFA appeared to activate occipito-parietal and ventral temporal areas, whereas CTRL relied more on frontal and temporal language regions. The increased reliance on visuospatial abilities in HFA was supported by intact connections between the inferior parietal and the ventral temporal ROIs. In contrast, the inferior frontal region showed reduced connectivity to ventral temporal and middle temporal areas in this group, reflecting impaired activation of frontal language areas in autism. The HFA group’s engagement of posterior brain regions along with its weak connections to frontal language areas suggest support for a reliance on visual mediation in autism, even in tasks of higher cognition.}, | ||
+ | language = {eng}, | ||
+ | number = {1}, | ||
+ | journal = {Neuropsychologia}, | ||
+ | author = {Sahyoun, Chérif P. and Belliveau, John W. and Soulières, Isabelle and Schwartz, Shira and Mody, Maria}, | ||
+ | year = {2010}, | ||
+ | pages = {86--95}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@book{arnheimFilmArt2007, | ||
+ | address = {Berkeley, Calif.}, | ||
+ | edition = {2. Dr}, | ||
+ | title = {Film as art}, | ||
+ | isbn = {978-0-520-24837-3}, | ||
+ | abstract = {Hier auch später erschienene Auflagen}, | ||
+ | language = {eng}, | ||
+ | publisher = {Univ. of California Press}, | ||
+ | author = {Arnheim, Rudolf}, | ||
+ | year = {2007}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{EdwardSnowdenReveals, | ||
+ | title = {Edward Snowden reveals U.S., U.K. video game surveillance program - National {\textbar} Globalnews.ca}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{tarantola2018YearAI2018, | ||
+ | title = {2018 is the year AI got its eyes}, | ||
+ | url = {https://www.engadget.com/2018/12/29/2018-is-the-year-ai-got-its-eyes/}, | ||
+ | abstract = {Despite recent progress in generative image modeling, successfully generating high-resolution, diverse samples from complex datasets such as ImageNet remains an elusive goal. To this end, we train Generative Adversarial Networks at the largest scale yet attempted, and study the instabilities specific to such scale. We find that applying orthogonal regularization to the generator renders it amenable to a simple "truncation trick", allowing fine control over the trade-off between sample fidelity and variety by truncating the latent space. Our modifications lead to models which set the new state of the art in class-conditional image synthesis. When trained on ImageNet at 128x128 resolution, our models (BigGANs) achieve an Inception Score (IS) of 166.3 and Frechet Inception Distance (FID) of 9.6, improving over the previous best IS of 52.52 and FID of 18.65.}, | ||
+ | author = {{Tarantola}}, | ||
+ | month = sep, | ||
+ | year = {2018}, | ||
+ | pages = {8}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{bernalAILieDetectorsa, | ||
+ | title = {AI lie detectors to be tested by the EU at border points}, | ||
+ | author = {Bernal, Natasha}, | ||
+ | } | ||
+ | }} | ||
+ | |||
+ | {{#scite: | ||
+ | |bibtex=@article{wiggersRaAIWeeklyCES, | ||
+ | title = {raAI Weekly: CES 2019 to showcase transformative AI}, | ||
+ | author = {Wiggers, Kyle}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{cityuniversityEUFundedProjectUses, |
− | + | title = {EU-Funded project uses artificial intelligence to tackle terrorist cyber-propaganda}, | |
− | + | author = {{City University}}, | |
− | } | + | } |
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{horn-mullerArtAIStorytelling, |
− | + | title = {The Art Of AI Storytelling: How One 30 Under 30 Scientist Is Teaching Devices To Make Assumptions}, | |
− | + | author = {Horn-Muller, Ayurella}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{luxonlineTheoryDefinitionStructural, |
− | + | title = {Theory and Definition of Structural/ Materialist Film}, | |
− | + | author = {{Luxonline}}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{hughesWhoseResponsibilityIt, |
− | + | title = {Whose Responsibility is it to Confront Terrorism Online? - Lawfare}, | |
− | + | author = {Hughes, Seamus}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{darsaIntroductionGermanExpressionist, |
− | + | title = {An Introduction to German Expressionist Films - artnet News}, | |
− | + | author = {Darsa, Alina}, | |
− | + | } | |
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{liaoGoogleWinsDismissal, |
− | + | title = {Google wins dismissal of facial recognition lawsuit over biometric privacy act}, | |
− | + | author = {Liao, Shannon}, | |
− | + | } | |
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{balsamoLAPDHighlyproducedBody, |
− | + | title = {LAPD's highly-produced body camera video draws scrutiny}, | |
− | + | author = {Balsamo, Michael}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{allanSeeIfYou, |
− | + | title = {See If You're Allowed to Access Police Body-Cam Video in Your State}, | |
− | + | author = {Allan, Patrick}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{garciaPentagonPaid500m, |
− | + | title = {The Pentagon paid \$500m to make fake terrorist propaganda videos}, | |
− | + | author = {Garcia, Feliks}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{pauwelsVisuallyResearchingCommunicating, |
− | + | title = {Visually Researching and Communicating the City: A Systematic Assessment of Methods and Resources}, | |
− | + | author = {Pauwels, Luc}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{flyverbomDatastructuringOrganizingCurating2018a, |
− | + | title = {Datastructuring—Organizing and curating digital traces into action}, | |
− | + | volume = {5}, | |
− | + | issn = {2053-9517}, | |
− | + | doi = {10.1177/2053951718799114}, | |
− | + | abstract = {Big Data \& Society 2018.5:2053951718799114}, | |
− | + | number = {2}, | |
− | + | journal = {Big Data \& Society}, | |
− | + | author = {Flyverbom, Mikkel and Murray, John}, | |
− | + | year = {2018}, | |
− | } | + | pages = {205395171879911}, |
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{selwynDoingDataDifferently2018, |
− | + | title = {Doing data differently? Developing personal data tactics and strategies amongst young mobile media users}, | |
− | + | volume = {5}, | |
− | + | issn = {2053-9517}, | |
− | + | doi = {10.1177/2053951718765021}, | |
− | + | abstract = {Big Data \& Society 2018.5:2053951718765021}, | |
− | + | number = {1}, | |
− | + | journal = {Big Data \& Society}, | |
− | } | + | author = {Selwyn, Neil and Pangrazio, Luci}, |
+ | year = {2018}, | ||
+ | pages = {205395171876502}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{lewis-krausFacebookDeadBody, |
− | + | title = {Facebook and the ‘Dead Body’ Problem}, | |
− | + | author = {Lewis-Kraus, Gideon}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{pauwelsParticipatoryVisualResearch2015a, |
− | + | title = {‘Participatory’ visual research revisited: A critical-constructive assessment of epistemological, methodological and social activist tenets}, | |
− | + | volume = {16}, | |
− | + | issn = {1466-1381}, | |
− | + | doi = {10.1177/1466138113505023}, | |
− | + | abstract = {Ethnography 2015.16:95-117}, | |
− | + | number = {1}, | |
− | + | journal = {Ethnography}, | |
− | + | author = {Pauwels, Luc}, | |
− | + | year = {2015}, | |
− | } | + | pages = {95--117}, |
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@book{pauwelsReframingVisualSocial2015, |
− | + | address = {Cambridge}, | |
− | + | title = {Reframing Visual Social Science}, | |
− | + | isbn = {978-1-139-01763-3}, | |
− | + | publisher = {Cambridge University Press}, | |
− | } | + | author = {Pauwels, Luc}, |
+ | year = {2015}, | ||
+ | doi = {10.1017/CBO9781139017633}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{dourishDataficationDataFiction2018, |
− | + | title = {Datafication and data fiction: Narrating data and narrating with data}, | |
− | + | volume = {5}, | |
− | + | issn = {2053-9517}, | |
− | + | doi = {10.1177/2053951718784083}, | |
− | + | abstract = {Big Data \& Society 2018.5:2053951718784083}, | |
− | + | number = {2}, | |
− | + | journal = {Big Data \& Society}, | |
− | } | + | author = {Dourish, Paul and Gómez Cruz, Edgar}, |
+ | year = {2018}, | ||
+ | pages = {205395171878408}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{veelMakeDataSing2018a, |
− | + | title = {Make data sing: The automation of storytelling}, | |
− | + | volume = {5}, | |
− | + | issn = {2053-9517}, | |
− | + | doi = {10.1177/2053951718756686}, | |
− | + | abstract = {Big Data \& Society 2018.5:2053951718756686}, | |
− | + | number = {1}, | |
− | + | journal = {Big Data \& Society}, | |
− | } | + | author = {Veel, Kristin}, |
+ | year = {2018}, | ||
+ | pages = {205395171875668}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{mengGrassrootsResourceMobilization2018, |
− | + | title = {Grassroots resource mobilization through counter-data action}, | |
− | + | volume = {5}, | |
− | + | issn = {2053-9517}, | |
− | + | doi = {10.1177/2053951718796862}, | |
− | } | + | abstract = {Big Data \& Society 2018.5:2053951718796862}, |
+ | number = {2}, | ||
+ | journal = {Big Data \& Society}, | ||
+ | author = {Meng, Amanda and DiSalvo, Carl}, | ||
+ | year = {2018}, | ||
+ | pages = {205395171879686}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{leeUnderstandingPerceptionAlgorithmic2018, |
− | + | title = {Understanding perception of algorithmic decisions: Fairness, trust, and emotion in response to algorithmic management}, | |
− | + | volume = {5}, | |
− | + | issn = {2053-9517}, | |
− | } | + | doi = {10.1177/2053951718756684}, |
+ | abstract = {Big Data \& Society 2018.5:2053951718756684}, | ||
+ | number = {1}, | ||
+ | journal = {Big Data \& Society}, | ||
+ | author = {Lee, Min Kyung}, | ||
+ | year = {2018}, | ||
+ | pages = {205395171875668}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{birtchnellListeningEarsArtificial2018, |
− | + | title = {Listening without ears: Artificial intelligence in audio mastering}, | |
− | + | volume = {5}, | |
− | + | issn = {2053-9517}, | |
− | + | doi = {10.1177/2053951718808553}, | |
− | + | abstract = {Big Data \& Society 2018.5:2053951718808553}, | |
− | + | number = {2}, | |
− | + | journal = {Big Data \& Society}, | |
− | } | + | author = {Birtchnell, Thomas}, |
+ | year = {2018}, | ||
+ | pages = {205395171880855}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{amesDeconstructingAlgorithmicSublime2018, |
− | + | title = {Deconstructing the algorithmic sublime}, | |
− | + | volume = {5}, | |
− | + | issn = {2053-9517}, | |
− | } | + | doi = {10.1177/2053951718779194}, |
+ | abstract = {Big Data \& Society 2018.5:2053951718779194}, | ||
+ | number = {1}, | ||
+ | journal = {Big Data \& Society}, | ||
+ | author = {Ames, Morgan G.}, | ||
+ | year = {2018}, | ||
+ | pages = {205395171877919}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{seaverAlgorithmsCultureTactics2017, |
− | + | title = {Algorithms as culture: Some tactics for the ethnography of algorithmic systems}, | |
− | + | volume = {4}, | |
− | + | issn = {2053-9517}, | |
− | } | + | doi = {10.1177/2053951717738104}, |
+ | abstract = {Big Data \& Society 2017.4:2053951717738104}, | ||
+ | number = {2}, | ||
+ | journal = {Big Data \& Society}, | ||
+ | author = {Seaver, Nick}, | ||
+ | year = {2017}, | ||
+ | pages = {205395171773810}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{ziewitzNotQuiteRandom2017, |
− | + | title = {A not quite random walk: Experimenting with the ethnomethods of the algorithm}, | |
− | + | volume = {4}, | |
− | + | issn = {2053-9517}, | |
− | + | doi = {10.1177/2053951717738105}, | |
− | + | abstract = {Big Data \& Society 2017.4:2053951717738105}, | |
− | + | number = {2}, | |
− | + | journal = {Big Data \& Society}, | |
− | + | author = {Ziewitz, Malte}, | |
− | + | year = {2017}, | |
− | + | pages = {205395171773810}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@book{leavyHandbookArtsBasedResearch2018, |
− | + | address = {New York, London}, | |
− | + | title = {Handbook of Arts-Based Research}, | |
− | + | editor = {Leavy, Patricia}, | |
− | + | year = {2018}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@incollection{harrisEthnocinemaVideoBasedResearch2018, |
− | + | address = {New York, London}, | |
− | + | title = {Ethnocinema and Video-Based Research}, | |
− | + | booktitle = {Handbook of Arts-Based Research}, | |
− | + | author = {Harris, Anne}, | |
− | + | editor = {Leavy, Patricia}, | |
− | + | year = {2018}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@book{harrisVideoMethod2016, |
− | + | title = {Video As Method}, | |
− | + | publisher = {Oxford University Press}, | |
− | + | author = {Harris, Anne M.}, | |
− | + | year = {2016}, | |
− | + | } | |
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@book{heathVideoQualitativeResearch2010, |
− | + | address = {Los Angeles}, | |
− | + | series = {Introducing qualitative methods}, | |
− | + | title = {Video in qualitative research}, | |
− | + | isbn = {978-1-4129-2943-1}, | |
− | } | + | abstract = {Provides practical guidance for both students and academics on how to use video in qualitative research, how to address the problems and issues that arise in undertaking video-based field studies and how to subject video recordings to detailed scrutiny and analysis.}, |
+ | publisher = {SAGE}, | ||
+ | author = {Heath, Christian and Hindmarsh, Jon and Luff, Paul}, | ||
+ | year = {2010}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@incollection{pauwelsVisualFrameworkProducing2019, |
− | + | address = {Budapest}, | |
− | + | title = {A Visual Framework for Producing and Assessing Visual Representations in Scientific Discovery and Communication}, | |
− | + | isbn = {978-963-313-304-0}, | |
− | + | booktitle = {Vision fulfilled : the victory of the pictorial turn}, | |
− | + | publisher = {Budapest : Hungarian Academy of Sciences}, | |
− | + | author = {Pauwels, Luc}, | |
− | } | + | editor = {Benedek, András and Nyíri, Kristóf}, |
+ | year = {2019}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{pinkReenactmentMethodologiesEveryday2014, |
− | + | title = {Re-enactment methodologies for everyday life research: art therapy insights for video ethnography}, | |
− | + | volume = {29}, | |
− | + | issn = {1472-586X}, | |
− | + | doi = {10.1080/1472586X.2014.887266}, | |
− | + | abstract = {Visual Studies, 2014. doi:10.1080/1472586X.2014.887266}, | |
− | } | + | number = {2}, |
+ | journal = {Visual Studies}, | ||
+ | author = {Pink, Sarah and Leder Mackley, Kerstin}, | ||
+ | year = {2014}, | ||
+ | pages = {146--154}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{efTerroristsWillSoon, |
− | + | title = {Terrorists Will Soon Be Able to Fake Any Video}, | |
− | + | author = {{Ef}}, | |
− | + | pages = {2018}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{bipartisanpolicycenterDigitalCounterterrorismFighting2018, |
− | + | title = {Digital Counterterrorism: Fighting Jihadists Online}, | |
− | + | author = {{Bipartisan Policy Center}}, | |
− | + | year = {2018}, | |
− | + | pages = {36}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{bentleyFetishisedDataCounterterrorism2018, |
− | + | title = {Fetishised data: counterterrorism, drone warfare and pilot testimony}, | |
− | + | volume = {11}, | |
− | + | issn = {1753-9153}, | |
− | + | doi = {10.1080/17539153.2017.1399787}, | |
− | + | abstract = {Critical Studies on Terrorism, 2018. doi:10.1080/17539153.2017.1399787}, | |
− | + | number = {1}, | |
− | + | journal = {Critical Studies on Terrorism}, | |
− | + | author = {Bentley, Michelle}, | |
− | + | year = {2018}, | |
− | + | pages = {88--110}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{berkhoutE4e10c58dd5f432c93a123ce7458c52fTPCS173, |
− | + | title = {e4e10c58-dd5f-432c-93a1-23ce7458c52f\_TPCS\_173\_Blommaert}, | |
− | + | author = {Berkhout, Karin}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{millerVisualizingJusticeKevinWalbyRichardJochelsonMichelleBertrandandStevenKohm, |
− | + | title = {VisualizingJusticeKevinWalbyRichardJochelsonMichelleBertrandandStevenKohm}, | |
− | + | author = {Miller, Jared}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{goodwinProfessionalVision1994, |
− | + | title = {Professional Vision}, | |
− | + | volume = {96}, | |
− | + | issn = {00027294}, | |
− | + | number = {3}, | |
− | + | journal = {American Anthropologist}, | |
− | + | author = {Goodwin, Charles}, | |
− | + | year = {1994}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{finsnesWhatAudiovisualJihadi2010, |
− | + | title = {What is audio-visual jihadi propaganda? An overview of the content of FFI’s jihadi video database}, | |
− | + | author = {Finsnes, Cecilie}, | |
− | + | year = {2010}, | |
− | + | note = {Publisher: Norwegian Defence Research Establishment (FFI)}, | |
− | + | pages = {38}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{richardsonDefenseIntelligenceRole2018, |
− | + | title = {Defense, Intelligence And The Role Of Video In Counterterrorism}, | |
− | + | journal = {Community Voice}, | |
− | + | author = {Richardson, Chris}, | |
− | + | year = {2018}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@book{neylandEverydayLifeAlgorithm2019, |
− | + | address = {Cham}, | |
− | + | title = {The Everyday Life of an Algorithm}, | |
− | + | isbn = {978-3-030-00577-1}, | |
− | + | publisher = {Springer International Publishing}, | |
− | + | author = {Neyland, Daniel}, | |
− | + | year = {2019}, | |
− | + | doi = {10.1007/978-3-030-00578-8}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{SensoryEthnographyLaba, |
− | + | title = {Sensory Ethnography Lab :: Harvard University}, | |
− | + | url = {http://sel.fas.harvard.edu/}, | |
− | + | urldate = {2021-02-17}, | |
− | + | file = {Sensory Ethnography Lab \:\: Harvard University:/home/ruben/Zotero/storage/SQHMMNAV/sel.fas.harvard.edu.html:text/html}, | |
− | + | } | |
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{SensatejournalComSE, |
− | + | title = {sensatejournal.com - SE}, | |
− | + | url = {https://sensatejournal.com/}, | |
− | + | abstract = {SE}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-02-17}, | |
− | + | journal = {sensatejournal.com}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/VG5US8C9/sensatejournal.com.html:text/html}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{CriticalMediaPractice, |
− | + | title = {Critical Media Practice}, | |
− | + | url = {http://cmp.gsas.harvard.edu/}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-02-17}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/YLB7DRW9/cmp.gsas.harvard.edu.html:text/html}, | |
− | + | } | |
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{AntoinetteROUVROY, |
− | + | title = {Antoinette ROUVROY}, | |
− | + | url = {https://researchportal.unamur.be/en/persons/antoinette-rouvroy}, | |
− | + | language = {en}, | |
− | + | urldate = {2021-02-17}, | |
− | + | journal = {the Research Portal - University of Namur}, | |
− | } | + | file = {Snapshot:/home/ruben/Zotero/storage/85JNWIMG/antoinette-rouvroy.html:text/html}, |
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{aradauGoverningOthersAnomaly2018, |
− | + | title = {Governing others: Anomaly and the algorithmic subject of security}, | |
− | + | volume = {3}, | |
− | + | issn = {2057-5637, 2057-5645}, | |
− | + | shorttitle = {Governing others}, | |
− | + | url = {https://www.cambridge.org/core/product/identifier/S2057563717000141/type/journal_article}, | |
− | + | doi = {10.1017/eis.2017.14}, | |
− | + | abstract = {As digital technologies and algorithmic rationalities have increasingly reconfigured security practices, critical scholars have drawn attention to their performative effects on the temporality of law, notions of rights, and understandings of subjectivity. This article proposes to explore how the ‘other’ is made knowable in massive amounts of data and how the boundary between self and other is drawn algorithmically. It argues that algorithmic security practices and Big Data technologies have transformed self/other relations. Rather than the enemy or the risky abnormal, the ‘other’ is algorithmically produced as anomaly. Although anomaly has been often used interchangeably with abnormality and pathology, a brief genealogical reading of the concept shows that it works as a supplementary term, which reconfigures the dichotomies of normality/abnormality, friend/enemy, and identity/difference. By engaging with key practices of anomaly detection by intelligence and security agencies, the article analyses the materialisation of anomalies as specific spatial ‘dots’, temporal ‘spikes’ and topological ‘nodes’. We argue that anomaly is not simply indicative of more heterogeneous modes of othering in times of Big Data, but represents a mutation in the logics of security that challenge our extant analytical and critical vocabularies.}, | |
− | + | language = {en}, | |
− | + | number = {1}, | |
− | + | urldate = {2021-02-17}, | |
− | + | journal = {European Journal of International Security}, | |
− | + | author = {Aradau, Claudia and Blanke, Tobias}, | |
− | + | month = feb, | |
− | + | year = {2018}, | |
− | + | pages = {1--21}, | |
− | + | file = {Aradau and Blanke - 2018 - Governing others Anomaly and the algorithmic subj.pdf:/home/ruben/Zotero/storage/PS4CQEB4/Aradau and Blanke - 2018 - Governing others Anomaly and the algorithmic subj.pdf:application/pdf}, | |
− | } | + | } |
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{rockwellCBPReportsAdvances, |
− | + | title = {CBP reports advances in biometrics -}, | |
− | + | url = {https://fcw.com/articles/2017/05/24/biometric-exit-dhs-rockwell.aspx}, | |
− | + | abstract = {After years of searching and tech trials, Customs and Border Protection said it has found a way to make a biometric entry/exit system work with airlines and airports.}, | |
− | + | language = {en}, | |
− | + | urldate = {2021-02-18}, | |
− | + | journal = {FCW}, | |
− | } | + | author = {Rockwell, By Mark and May 24, 2017}, |
+ | file = {Snapshot:/home/ruben/Zotero/storage/UFGQIRV7/biometric-exit-dhs-rockwell.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{hvistendahlfebruary182021ExclusiveHowOracle, |
− | + | title = {Exclusive: How Oracle Sells Repression in China}, | |
− | + | shorttitle = {Exclusive}, | |
− | + | url = {https://theintercept.com/2021/02/18/oracle-china-police-surveillance/}, | |
− | + | abstract = {In its bid for TikTok, Oracle was supposed to prevent data from being passed to Chinese police. Instead, it’s been marketing its own software for their surveillance work.}, | |
− | } | + | language = {en}, |
+ | urldate = {2021-02-19}, | ||
+ | journal = {The Intercept}, | ||
+ | author = {HvistendahlFebruary 18 2021, Mara HvistendahlMara and A.m, 11:20}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/CCRZBAJB/oracle-china-police-surveillance.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{CSCW2021, |
− | + | title = {CSCW 2021}, | |
− | + | url = {https://cscw.acm.org/2021/}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-02-19}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/NLXFLBNW/2021.html:text/html}, | |
− | + | } | |
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{ACMFAccT2021, |
− | + | title = {ACM FAccT - 2021 Home}, | |
− | + | url = {https://facctconference.org/2021/index.html}, | |
− | + | urldate = {2021-02-19}, | |
− | + | file = {ACM FAccT - 2021 Home:/home/ruben/Zotero/storage/3QDFFM5W/index.html:text/html}, | |
− | } | + | } |
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{miceliSubjectivityImpositionPower2020, |
− | + | title = {Between Subjectivity and Imposition: Power Dynamics in Data Annotation for Computer Vision}, | |
− | + | volume = {4}, | |
− | + | shorttitle = {Between Subjectivity and Imposition}, | |
− | + | url = {https://doi.org/10.1145/3415186}, | |
− | + | doi = {10.1145/3415186}, | |
− | + | abstract = {The interpretation of data is fundamental to machine learning. This paper investigates practices of image data annotation as performed in industrial contexts. We define data annotation as a sense-making practice, where annotators assign meaning to data through the use of labels. Previous human-centered investigations have largely focused on annotators? subjectivity as a major cause of biased labels. We propose a wider view on this issue: guided by constructivist grounded theory, we conducted several weeks of fieldwork at two annotation companies. We analyzed which structures, power relations, and naturalized impositions shape the interpretation of data. Our results show that the work of annotators is profoundly informed by the interests, values, and priorities of other actors above their station. Arbitrary classifications are vertically imposed on annotators, and through them, on data. This imposition is largely naturalized. Assigning meaning to data is often presented as a technical matter. This paper shows it is, in fact, an exercise of power with multiple implications for individuals and society.}, | |
− | + | number = {CSCW2}, | |
− | + | urldate = {2021-02-19}, | |
− | + | journal = {Proceedings of the ACM on Human-Computer Interaction}, | |
− | + | author = {Miceli, Milagros and Schuessler, Martin and Yang, Tianling}, | |
− | + | month = oct, | |
− | + | year = {2020}, | |
− | } | + | pages = {115:1--115:25}, |
+ | file = {Miceli et al_2020_Between Subjectivity and Imposition.pdf:/home/ruben/Zotero/storage/QDQHYDLX/Miceli et al_2020_Between Subjectivity and Imposition.pdf:application/pdf}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{HowReclaimYour, |
− | + | title = {How to Reclaim Your Face From Clearview AI}, | |
− | + | url = {https://edri.org/our-work/reclaiming-your-face-from-clearview-ai/}, | |
− | + | abstract = {The Hamburg Data Protection Authority deemed Clearview AI’s biometric photo database illegal in the EU as a result of a complaint Matthias Marx, a member of the Chaos Computer Club (an EDRi member) filed.}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-02-19}, | |
− | + | journal = {European Digital Rights (EDRi)}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/VAUPUS2W/reclaiming-your-face-from-clearview-ai.html:text/html}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@book{goatleyCriticalDataAesthetics2019, |
− | + | title = {Critical Data Aesthetics: Towards a Critically Reflexive Practice of Data Aestheticisation}, | |
− | + | abstract = {This thesis responds to the aesthetic representation of data in multiple cultural contexts, arguing that a critical exploration of these aesthetics is necessary and needs to be elaborated. In this thesis, this is undertaken through three works produced across the duration of this project: Breathing Mephitic Air, an installation that aestheticises air pollution data (exhibited at Somerset House, London); Ground Resistance, an installation that explored data and representation in a smart city system (exhibited at Milton Keynes International Festival 2016); and The Dark Age of Connectionism: Captivity, a sound installation that centered upon the opacity of the Amazon Echo (exhibited at Haunted Machines/Impakt Festival, Utrecht).}, | |
− | + | language = {en}, | |
− | + | author = {Goatley, Wesley}, | |
− | + | year = {2019}, | |
− | + | file = {Goatley - Critical Data Aesthetics Towards a Critically Ref.pdf:/home/ruben/Zotero/storage/4FB95YCD/Goatley - Critical Data Aesthetics Towards a Critically Ref.pdf:application/pdf}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{dignazioWhatRoleDoes2020, |
− | + | title = {What Role Does Emotion Play in Data Visualization?}, | |
− | + | url = {https://immerse.news/what-role-does-emotion-play-in-data-visualization-bf365edf3d53}, | |
− | + | abstract = {This article was adapted from Data Feminism, a book by researchers Catherine D’Ignazio and Lauren F. Klein that explores “a way of…}, | |
− | + | language = {en}, | |
− | + | urldate = {2021-02-19}, | |
− | + | journal = {Medium}, | |
− | } | + | author = {D'Ignazio, Catherine}, |
+ | month = may, | ||
+ | year = {2020}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/7264DD7I/what-role-does-emotion-play-in-data-visualization-bf365edf3d53.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{converusConverusDonatingLie, |
− | + | title = {Converus Donating Lie Detector Tests to Law Enforcement to Screen for Possible Misconduct}, | |
− | + | url = {https://www.prnewswire.com/news-releases/converus-donating-lie-detector-tests-to-law-enforcement-to-screen-for-possible-misconduct-301074718.html}, | |
− | + | abstract = {/PRNewswire/ -- Tech company Converus will help identify cases of misconduct by giving 15 law enforcement agencies free use of EyeDetect to test job applicants...}, | |
− | + | language = {en}, | |
− | + | urldate = {2021-02-19}, | |
− | } | + | author = {Converus}, |
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{Etraces, |
− | + | title = {e-traces -}, | |
− | + | url = {https://etraces.constantvzw.org/informations}, | |
− | + | abstract = {Deze website is gemaakt in het project e-traces verwezenlijkt. Hij presenteert een geheel van geoogste artikelen over verschillende plaatsen van informatie betreffende de beweging die naar een…}, | |
− | + | urldate = {2021-02-19}, | |
− | + | journal = {e-traces}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/JJBDMZNK/informations.html:text/html}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{BaladeDecentraliseeCartographions, |
− | + | title = {Balade décentralisée : "Cartographions la surveillance" - Saint-Gilles}, | |
− | + | shorttitle = {Balade décentralisée}, | |
− | + | url = {https://agenda.collectifs.net/events/1b1a0086-454a-4e5c-bac9-62ce4c26d975}, | |
− | + | abstract = {Le dimanche 28 février, venez cartographier la surveillance à Bruxelles lors de notre balade mensuelle. Cette fois-ci, nous nous rendrons à Saint-Gilles Inscription via --\> https://cryptpad.fr/s…}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-02-19}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/S9M2HDUN/1b1a0086-454a-4e5c-bac9-62ce4c26d975.html:text/html}, | |
− | } | + | } |
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{DesignJusticeNetwork, |
− | + | title = {Design Justice Network}, | |
− | + | url = {https://designjustice.org}, | |
− | + | abstract = {Design justice rethinks design processes, centers people who are normally marginalized by design, and uses collaborative, creative practices to address the deepest challenges our communities face.}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-02-21}, | |
− | + | journal = {Design Justice Network}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/KTMDUEVF/designjustice.org.html:text/html}, | |
− | } | + | } |
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{matternClassMappingField2021, |
− | + | title = {About the Class – Mapping the Field}, | |
− | + | url = {https://mappingthefield.wordsinspace.net/2021/about-the-class/}, | |
− | + | abstract = {Maps reveal, delineate, verify, orient, navigate, anticipate, historicize, conceal, persuade, and, on occasion, even lie. From the earliest spatial representations in cave paintings and on clay tablets, to the predictive climate visualizations and crime maps and mobile cartographic apps of today and tomorrow, maps have offered far more than an objective representation of a stable reality. In this hybrid theory-practice studio we’ll examine maps as artifacts, as texts, as media; and mapping as a method useful in the social sciences, humanities, arts, and design. We’ll explore the past, present, and future – across myriad geographic and cultural contexts – of our techniques and technologies for mapping space and time. In the process, we’ll address various critical frameworks for analyzing the rhetorics, poetics, politics, and epistemologies of spatial and temporal maps. Throughout the semester we’ll also experiment with a variety of critical mapping tools and methods, from techniques of critical cartography to indigenous practices to sensory mapping to time-lining, using both analog and digital approaches. Students are encouraged to use the course, which will be supported by a skilled cartographer teaching assistant, to supplement their fieldwork, to develop their own thesis / dissertation projects, or to advance other personal research and creative pursuits. Course requirements include: individual map critiques; lab exercises; and individual research-based, critical-creative “atlases” composed of maps in a variety of formats.}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-02-22}, | |
− | + | author = {Mattern, Shannon}, | |
− | + | year = {2021}, | |
− | + | keywords = {mapping}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/7KPVCJD5/about-the-class.html:text/html}, | |
− | + | } | |
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{matternWork, |
− | + | title = {Work}, | |
− | + | url = {https://wordsinspace.net/}, | |
− | + | language = {en}, | |
− | + | urldate = {2021-02-22}, | |
− | + | author = {Mattern, Shannon}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/4V84N6HR/work.html:text/html}, | |
− | + | } | |
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{adminbeFichiersBasesRepertoires2015, |
− | + | title = {Fichiers, Bases et Répertoires sociaux - Le dispositif Informatique}, | |
− | + | url = {https://bureaudetudes.org/2015/01/27/fichiers-bases-et-repertoires-sociaux-le-dispositif-informatique/}, | |
− | + | abstract = {Download PDF (french - 4,5Mo)}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-02-22}, | |
− | + | journal = {Bureau d'Etudes}, | |
− | + | author = {{adminBE}}, | |
− | + | month = jan, | |
− | } | + | year = {2015}, |
+ | file = {fichiers-bases-repertoires-sociaux-FR.pdf:/home/ruben/Zotero/storage/B2KM59AG/fichiers-bases-repertoires-sociaux-FR.pdf:application/pdf;Snapshot:/home/ruben/Zotero/storage/7BA7EH4T/fichiers-bases-et-repertoires-sociaux-le-dispositif-informatique.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@book{bonacciniAtlasAgendasMapping, |
− | + | title = {Atlas of agendas – mapping the power, mapping the commons}, | |
− | + | url = {https://bureaudetudes.org/}, | |
− | + | abstract = {Cartography of political, industrial, research, social, power networks.}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-02-22}, | |
− | + | publisher = {Bureau d´études}, | |
− | + | author = {Bonaccini, Léonore and Fourt, Xavier}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@book{holmesAtlasAgendasMapping2015, |
− | + | title = {An atlas of agendas: mapping the power, mapping the commons}, | |
− | + | isbn = {978-94-91677-25-0}, | |
− | + | shorttitle = {An atlas of agendas}, | |
− | + | abstract = {Together, Paris-based artists Léonore Bonaccini and Xavier Fourt make up the artist duo Bureau d'études. For the past several years, this French group has been producing cartographies of contemporary political, social and economic systems which allow people to empower and reposition themselves. Revealing what normally remains invisible, often in the shape of large-sized banners, and contextualizing apparently separate elements within another framework, these visualizations of peoples' interests and relations re-symbolize and actualize an order concealed and unknown.}, | |
− | } | + | language = {English}, |
+ | publisher = {Onomatopee}, | ||
+ | author = {Holmes, Brian and Lomme, Freek}, | ||
+ | editor = {{Bureau d'Études (Artists' group)}}, | ||
+ | year = {2015}, | ||
+ | note = {OCLC: 1046620264}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/4NRCCDWJ/bureaudetudes.org.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@book{wrightDataestheticsReaderHow2007, |
− | + | address = {Frankfurt am Main}, | |
− | + | title = {Dataesthetics reader: how to do things with data ; [Galerija Nova, Zagreb 01/12/2006 - 06/01/2007]}, | |
− | + | isbn = {978-953-6542-85-7 978-3-86588-369-8}, | |
− | + | shorttitle = {Dataesthetics reader}, | |
− | + | language = {en}, | |
− | + | publisher = {Revolver, Archiv für Aktuelle Kunst [u.a.]}, | |
− | + | editor = {Wright, Stephen and Galerija Nova}, | |
− | } | + | year = {2007}, |
+ | note = {Meeting Name: Exhibition | ||
+ | OCLC: 845113975}, | ||
+ | file = {Wright and Galerija Nova - 2007 - Dataesthetics reader how to do things with data \;.pdf:/home/ruben/Zotero/storage/LSTRB79U/Wright and Galerija Nova - 2007 - Dataesthetics reader how to do things with data \;.pdf:application/pdf}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@incollection{donathEthicalIssuesOur2020, |
− | + | title = {Ethical Issues in Our Relationship with Artificial Entities}, | |
− | + | isbn = {978-0-19-006739-7}, | |
− | + | url = {https://oxfordhandbooks.com/view/10.1093/oxfordhb/9780190067397.001.0001/oxfordhb-9780190067397-e-3}, | |
− | + | abstract = {This chapter examines the ethics of human relationships with artificial entities—bots, robots, and other computational systems created to interact with humans as if they were sentient and autonomous individuals. Sentience—the ability to have emotions, to feel pain and want to avoid it—is a core concept here. All currently existing artificial entities are nonsentient, but their interactions and design evoke the impression of a conscious entity with personality and emotion. This impression of consciousness is inherently deceptive. Some artificial entities are beneficial, while others are manipulative and harmful. The chapter then addresses ethical issues in the design and deployment of artificial entities, considering the ethical responsibilities of researchers and designers.}, | |
− | + | language = {en}, | |
− | + | urldate = {2021-02-22}, | |
− | + | booktitle = {The Oxford Handbook of Ethics of AI}, | |
− | } | + | publisher = {Oxford University Press}, |
+ | author = {Donath, Judith}, | ||
+ | editor = {Dubber, Markus D. and Pasquale, Frank and Das, Sunit}, | ||
+ | collaborator = {Donath, Judith}, | ||
+ | month = jul, | ||
+ | year = {2020}, | ||
+ | doi = {10.1093/oxfordhb/9780190067397.013.3}, | ||
+ | pages = {51--73}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@incollection{matternCalculativeCompositionEthics2020, |
− | + | title = {Calculative Composition: The Ethics of Automating Design}, | |
− | + | isbn = {978-0-19-006739-7}, | |
− | + | shorttitle = {Calculative Composition}, | |
− | + | url = {https://oxfordhandbooks.com/view/10.1093/oxfordhb/9780190067397.001.0001/oxfordhb-9780190067397-e-37}, | |
− | + | abstract = {This chapter evaluates the ethical ends and means toward which AI-driven design has been, and perhaps could be, applied. While some designers have committed to applying AI toward more ethical ends, they have paid comparatively less attention toward the ethical means of its application. In order to ensure the ethical application of AI in design, practitioners and managers must make sure that they are both defining responsible design parameters and operationalizing those parameters responsibly. Moreover, designers must consider where they should assert their agency within an automated workflow. The chapter then surveys representative design fields—fashion, product, graphic, and architectural design—to examine what ethical opportunities and risks people might face when AI-driven design practice is programmed to serve the needs and desires of laborers, consumers, and clients.}, | |
− | + | language = {en}, | |
− | + | urldate = {2021-02-22}, | |
− | } | + | booktitle = {The Oxford Handbook of Ethics of AI}, |
+ | publisher = {Oxford University Press}, | ||
+ | author = {Mattern, Shannon}, | ||
+ | editor = {Dubber, Markus D. and Pasquale, Frank and Das, Sunit}, | ||
+ | collaborator = {Mattern, Shannon}, | ||
+ | month = jul, | ||
+ | year = {2020}, | ||
+ | doi = {10.1093/oxfordhb/9780190067397.013.37}, | ||
+ | pages = {569--587}, | ||
+ | file = {Mattern_2020_Calculative Composition.pdf:/home/ruben/Zotero/storage/AXFUEE3T/Mattern_2020_Calculative Composition.pdf:application/pdf}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{braidottiCartographiesPresent2011, |
− | + | address = {Serpentine Galleries}, | |
− | + | title = {Cartographies Of The Present}, | |
− | + | url = {https://vimeo.com/24517619}, | |
− | + | abstract = {This is \"Rosi Braidotti - Cartographies Of The Present\" by Serpentine Galleries on Vimeo, the home for high quality videos and the people who love them.}, | |
− | + | urldate = {2021-02-22}, | |
− | + | author = {Braidotti, Rosi}, | |
− | + | month = jun, | |
− | + | year = {2011}, | |
− | } | + | file = {Snapshot:/home/ruben/Zotero/storage/BBRNNNWL/24517619.html:text/html}, |
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{ArtResearchMap, |
− | + | title = {Art Research Map – Jorinde Voigt ‘Radical relaxation’}, | |
− | + | url = {http://artresearchmap.com/exhibitions/jorinde-voigt-radical-relaxation/}, | |
− | + | abstract = {KÖNIG GALERIE takes great pleasure in presenting its second solo exhibition by the Berlin-based artist Jorinde Voigt (b. 1977).}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-02-22}, | |
− | } | + | journal = {Art Research Map}, |
+ | file = {Snapshot:/home/ruben/Zotero/storage/7DU2W4FN/jorinde-voigt-radical-relaxation.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@book{costanza-chockDesignJusticeCommunityLed2020, |
− | + | address = {Cambridge, MA}, | |
− | + | title = {Design Justice: Community-Led Practices to Build the Worlds We Need}, | |
− | + | isbn = {978-0-262-04345-8}, | |
− | + | shorttitle = {Design Justice}, | |
− | } | + | abstract = {An exploration of how design might be led by marginalized communities, dismantle structural inequality, and advance collective liberation and ecological survival.What is the relationship between design, power, and social justice? “Design justice” is an approach to design that is led by marginalized communities and that aims expilcitly to challenge, rather than reproduce, structural inequalities. It has emerged from a growing community of designers in various fields who work closely with social movements and community-based organizations around the world.This book explores the theory and practice of design justice, demonstrates how universalist design principles and practices erase certain groups of people—specifically, those who are intersectionally disadvantaged or multiply burdened under the matrix of domination (white supremacist heteropatriarchy, ableism, capitalism, and settler colonialism)—and invites readers to “build a better world, a world where many worlds fit; linked worlds of collective liberation and ecological sustainability.” Along the way, the book documents a multitude of real-world community-led design practices, each grounded in a particular social movement. Design Justice goes beyond recent calls for design for good, user-centered design, and employment diversity in the technology and design professions; it connects design to larger struggles for collective liberation and ecological survival.}, |
+ | language = {English}, | ||
+ | publisher = {The MIT Press}, | ||
+ | author = {Costanza-Chock, Sasha}, | ||
+ | month = mar, | ||
+ | year = {2020}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{pressDesignJusticeMIT, |
− | + | title = {Design Justice {\textbar} The MIT Press}, | |
− | + | url = {https://mitpress.mit.edu/books/design-justice}, | |
− | + | abstract = {An exploration of how design might be led by marginalized communities, dismantle structural inequality, and advance collective liberation and ecological survival. | |
− | + | The open access edition of this book was made possible by generous funding from Knowledge Unlatched and the MIT Press Frank Urbanowski Memorial Fund. | |
− | } | + | What is the relationship between design, power, and social justice? “Design justice” is an approach to design that is led by marginalized communities and that aims expilcitly to challenge, rather than reproduce, structural inequalities. It has emerged from a growing community of designers in various fields who work closely with social movements and community-based organizations around the world.This book explores the theory and practice of design justice, demonstrates how universalist design principles and practices erase certain groups of people—specifically, those who are intersectionally disadvantaged or multiply burdened under the matrix of domination (white supremacist heteropatriarchy, ableism, capitalism, and settler colonialism)—and invites readers to “build a better world, a world where many worlds fit; linked worlds of collective liberation and ecological sustainability.” Along the way, the book documents a multitude of real-world community-led design practices, each grounded in a particular social movement. Design Justice goes beyond recent calls for design for good, user-centered design, and employment diversity in the technology and design professions; it connects design to larger struggles for collective liberation and ecological survival.}, |
+ | language = {en}, | ||
+ | urldate = {2021-02-22}, | ||
+ | author = {Press, The MIT}, | ||
+ | note = {Publisher: The MIT Press}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@book{zotero-2004, |
− | + | isbn = {978-0-262-04345-8}, | |
− | + | } | |
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@incollection{dignazioArtCartography2009, |
− | + | address = {Oxford}, | |
− | + | title = {Art and Cartography}, | |
− | + | isbn = {978-0-08-044910-4}, | |
− | } | + | url = {https://www.sciencedirect.com/science/article/pii/B9780080449104000043}, |
+ | abstract = {Art has taken a distinct ‘cartographic turn’ in the last century. This period represents a veritable explosion of artwork that takes on cartography in order to critique, subvert, and reimagine territory. Artists have made maps, subverted maps, performed itineraries, imagined territories, contested borders, charted the invisible, and hacked physical, virtual, and hybrid spaces. There are three loose groupings of important mapping impulses that have characterized the artistic appropriation of cartographic strategies, both literally and metaphorically, from the early twentieth century to present times: (1) symbol saboteurs: artists who use the visual iconography of the map to reference personal, fictional, utopian, or metaphorical places; (2) agents and actors: artists who make maps or engage in situated, locational activities in order to challenge the status quo or change the world; and (3) invisible data mappers: artists who use cartographic metaphors to visualize informational territories, such as the stock market, the Internet, or the human genome. This article outlines and contextualizes these three impulses with numerous examples.}, | ||
+ | language = {en}, | ||
+ | urldate = {2021-02-22}, | ||
+ | booktitle = {International Encyclopedia of Human Geography}, | ||
+ | publisher = {Elsevier}, | ||
+ | author = {D’Ignazio, C.}, | ||
+ | editor = {Kitchin, Rob and Thrift, Nigel}, | ||
+ | month = jan, | ||
+ | year = {2009}, | ||
+ | doi = {10.1016/B978-008044910-4.00004-3}, | ||
+ | pages = {190--206}, | ||
+ | file = {ScienceDirect Snapshot:/home/ruben/Zotero/storage/X4B7SA6J/B9780080449104000043.html:text/html;D’Ignazio_2009_Art and Cartography.pdf:/home/ruben/Zotero/storage/ZH8WC9SW/D’Ignazio_2009_Art and Cartography.pdf:application/pdf}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{Uncharted, |
− | + | title = {Uncharted}, | |
− | + | url = {http://uncharted.ooo}, | |
− | + | language = {en}, | |
− | + | urldate = {2021-02-22}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/25RVK9N3/explore.html:text/html}, | |
− | + | } | |
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{drulheCriticalAtlasInternet2015, |
− | + | title = {Critical Atlas of Internet}, | |
− | + | url = {https://louisedrulhe.fr/internet-atlas/}, | |
− | + | urldate = {2021-02-22}, | |
− | } | + | author = {Drulhe, Louise}, |
+ | year = {2015}, | ||
+ | file = {Critical Atlas of Internet:/home/ruben/Zotero/storage/NZL6TJIA/internet-atlas.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{OYVINDFAHLSTROM, |
− | + | title = {ÓYVIND FAHLSTRÖM}, | |
− | + | url = {https://www.ivam.es/en/oyvind-fahlstrom/}, | |
− | + | abstract = {Red Seesaw, 1968-69 Wood, metal, cardboard and paint 115 × 233.7 × 18.5 cm Óyvind Fahlström (São Paulo, Brasil,…}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-02-22}, | |
− | + | journal = {Ivam}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/VVZHMJLK/oyvind-fahlstrom.html:text/html}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{OyvindFahlstromDunya2016, |
− | + | title = {Öyvind Fahlström Dünya Ticaret Tekeli İçin Plan}, | |
− | + | url = {https://www.istanbulsanatevi.com/sanatcilar/soyadi-f/fahlstrom-oyvind/oyvind-fahlstrom-dunya-ticaret-tekeli-icin-plan/}, | |
− | + | abstract = {Öyvind Fahlström Dünya Ticaret Tekeli için Plan, Tarih: 1970, Teknik: Kağıt üzeri karışık teknik, Boyut: 42 x 35,3 cm, Yer: Museum of Modern}, | |
− | + | language = {tr}, | |
− | + | urldate = {2021-02-22}, | |
− | } | + | journal = {istanbul sanat evi}, |
+ | month = feb, | ||
+ | year = {2016}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/63IBVN2S/oyvind-fahlstrom-dunya-ticaret-tekeli-icin-plan.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{roubanisSwedenAuthorisesUse2019, |
− | + | title = {Sweden authorises the use of facial recognition technology by the police}, | |
− | + | url = {https://www.neweurope.eu/article/sweden-authorises-the-use-of-facial-recognition-technology-by-the-police/}, | |
− | + | abstract = {Sweden’s data protection authority has approved the use of facial recognition technology by the police, to help identify criminal suspects. | |
− | + | ||
− | + | The decision is controversial following successive bans of this technology in US cities. The technology is widely used in China. | |
− | + | ||
− | + | The new application of fa}, | |
− | + | language = {en-US}, | |
− | } | + | urldate = {2021-02-22}, |
+ | journal = {New Europe}, | ||
+ | author = {{roubanis}}, | ||
+ | month = oct, | ||
+ | year = {2019}, | ||
+ | note = {Section: Archive}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/GKAUY52J/sweden-authorises-the-use-of-facial-recognition-technology-by-the-police.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{ControlRoomDi2020, |
− | + | title = {La control room di Venezia e la rete di videosorveglianza urbana • Lumi}, | |
− | + | url = {https://www.lumi4innovation.it/control-room-venezia-videosorveglianza-urbana/}, | |
− | + | abstract = {A Venezia, la smart control room e la rete di sensori e di videosorveglianza urbana garantiscono più sicurezza e un monitoraggio del territorio efficace.}, | |
− | + | language = {it-IT}, | |
− | + | urldate = {2021-02-22}, | |
− | + | journal = {Lumi}, | |
− | } | + | month = dec, |
+ | year = {2020}, | ||
+ | note = {Section: Sicurezza}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/UJMP6AYD/control-room-venezia-videosorveglianza-urbana.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{IntelligentVideoSurveillance2017, |
− | + | title = {Intelligent Video Surveillance: Recent Trends And What Lies Ahead}, | |
− | + | shorttitle = {Intelligent Video Surveillance}, | |
− | + | url = {https://www.alliedtelesis.com/it/blog/intelligent-video-surveillance-recent-trends-and-what-lies-ahead}, | |
− | + | abstract = {This article discusses some reasons for the growth in the use of video surveillance networks and recommends some deployment best practices.}, | |
− | + | language = {it}, | |
− | + | urldate = {2021-02-22}, | |
− | + | journal = {Allied Telesis}, | |
− | + | month = jun, | |
− | } | + | year = {2017}, |
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{oconnellSwedishDPAPolice2021, |
− | + | type = {Text}, | |
− | + | title = {Swedish DPA: Police unlawfully used facial recognition app}, | |
− | + | shorttitle = {Swedish DPA}, | |
− | + | url = {https://edpb.europa.eu/news/national-news/2021/swedish-dpa-police-unlawfully-used-facial-recognition-app_el}, | |
− | + | abstract = {Swedish DPA: Police unlawfully used facial recognition app}, | |
− | + | language = {en}, | |
− | } | + | urldate = {2021-02-22}, |
+ | journal = {ευρωπαϊκό συμβούλιο προστασίας δεδομένων - European Data Protection Board}, | ||
+ | author = {O'CONNELL, Barry}, | ||
+ | month = feb, | ||
+ | year = {2021}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/QTSY2SXR/swedish-dpa-police-unlawfully-used-facial-recognition-app_el.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{colucciniAncheItaliaSi2017, |
− | + | title = {Anche l’Italia si è munita di un sistema di riconoscimento facciale}, | |
− | + | url = {https://medium.com/@ORARiccardo/anche-litalia-si-%C3%A8-munita-di-un-sistema-di-riconoscimento-facciale-4a6f4c4e4f3f}, | |
− | + | abstract = {La polizia scientifica lo vorrebbe utilizzare nelle manifestazioni pubbliche}, | |
− | + | language = {en}, | |
− | } | + | urldate = {2021-02-22}, |
+ | journal = {Medium}, | ||
+ | author = {Coluccini, Riccardo}, | ||
+ | month = nov, | ||
+ | year = {2017}, | ||
+ | keywords = {***}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/XTY9UX8Z/anche-litalia-si-è-munita-di-un-sistema-di-riconoscimento-facciale-4a6f4c4e4f3f.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{RiconoscimentoFaccialeItalia, |
− | + | title = {Il riconoscimento facciale in Italia è un buco nero}, | |
− | + | url = {https://www.vice.com/it/article/g5p83w/riconoscimento-facciale-in-italia}, | |
− | + | abstract = {Da una serie di documenti ottenuti da Motherboard, sembra che i sistemi di sorveglianza sofisticata annunciati dai Comuni negli ultimi anni non siano attivi, perché illegali. Eppure, le telecamere continuano a moltiplicarsi.}, | |
− | + | language = {it}, | |
− | + | urldate = {2021-02-22}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/7VKK9JSN/riconoscimento-facciale-in-italia.html:text/html}, | |
− | + | } | |
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{RiconoscimentoFaccialeItalia2020, |
− | + | title = {Riconoscimento facciale in Italia, cosa dice (e non dice) il Viminale}, | |
− | + | url = {https://www.startmag.it/innovazione/riconoscimento-facciale-in-italia-cosa-dice-e-non-dice-il-viminale/}, | |
− | + | abstract = {Dalla risposta del Viminale non è emerso "nulla su quanto, come e con quali risultati viene usato il sistema" di riconoscimento facciale in Italia}, | |
− | + | language = {it-IT}, | |
− | + | urldate = {2021-02-22}, | |
− | + | journal = {Startmag}, | |
− | + | month = feb, | |
− | + | year = {2020}, | |
− | + | note = {Section: Innovazione}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/WFJPD9ST/riconoscimento-facciale-in-italia-cosa-dice-e-non-dice-il-viminale.html:text/html}, | |
− | + | } | |
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{tg24SariEccoCome, |
− | + | title = {Sari, ecco come funziona il riconoscimento facciale della polizia}, | |
− | + | url = {https://tg24.sky.it/tecnologia/now/2020/02/13/sari-riconoscimento-facciale-polizia-italiana}, | |
− | + | abstract = {Leggi su Sky TG24 l'articolo Sari, ecco come funziona il riconoscimento facciale della polizia}, | |
− | + | language = {it}, | |
− | + | urldate = {2021-02-22}, | |
− | + | author = {TG24, Sky}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/VUVVTBWC/sari-riconoscimento-facciale-polizia-italiana.html:text/html}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{CivilRightsGroups2021, |
− | + | title = {Civil rights groups want Biden to halt government use of facial recognition}, | |
− | + | url = {https://www.dailydot.com/debug/biden-facial-recognition-pressure/}, | |
− | + | abstract = {President Joe Biden is facing pressure from civil rights and tech advocacy groups to halt the use of facial recognition by the government.}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-02-23}, | |
− | } | + | journal = {The Daily Dot}, |
+ | month = feb, | ||
+ | year = {2021}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/UIHRKX4B/biden-facial-recognition-pressure.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{DeepMindResearchersSay2021, |
− | + | title = {DeepMind researchers say AI poses a threat to people who identify as queer}, | |
− | + | url = {https://venturebeat.com/2021/02/18/deepmind-researchers-say-ai-poses-a-threat-to-people-who-identify-as-queer/}, | |
− | + | abstract = {Researchers say the impact of AI on people who identify as queer is underexplored, which poses a threat to their health and privacy.}, | |
− | + | language = {en-US}, | |
− | + | urldate = {2021-02-23}, | |
− | + | journal = {VentureBeat}, | |
− | + | month = feb, | |
− | + | year = {2021}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/DEP7VRC9/deepmind-researchers-say-ai-poses-a-threat-to-people-who-identify-as-queer.html:text/html}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@misc{ | + | |bibtex=@misc{CoalitionLetterPresident, |
− | + | title = {Coalition Letter to President Biden on Use of Facial Recognition Technology}, | |
− | + | url = {https://www.aclu.org/letter/coalition-letter-president-biden-use-facial-recognition-technology}, | |
− | + | language = {en}, | |
− | + | urldate = {2021-02-23}, | |
− | + | journal = {American Civil Liberties Union}, | |
− | } | + | file = {Snapshot:/home/ruben/Zotero/storage/DA8PCAML/coalition-letter-president-biden-use-facial-recognition-technology.html:text/html}, |
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@misc{AnatomyAISystem, |
− | + | title = {Anatomy of an AI System}, | |
− | + | url = {http://www.anatomyof.ai}, | |
− | + | abstract = {Anatomy of an AI System - The Amazon Echo as an anatomical map of human labor, data and planetary resources. By Kate Crawford and Vladan Joler (2018)}, | |
− | + | language = {en}, | |
− | + | urldate = {2021-02-24}, | |
− | + | journal = {Anatomy of an AI System}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/NZ4IG8CX/anatomyof.ai.html:text/html}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{rajiFaceSurveyFacial2021, |
− | + | title = {About Face: A Survey of Facial Recognition Evaluation}, | |
− | + | abstract = {We survey over 100 face datasets constructed between 1976 to 2019 of 145 million images of over 17 million subjects from a range of sources, demographics and conditions. Our historical survey reveals that these datasets are contextually informed - shaped by changes in political motivations, technological capability and current norms. We discuss how such influences mask specific practices - some of which may actually be harmful or otherwise problematic - and make a case for the explicit communication of such details in order to establish a more grounded understanding of the technology’s function in the real world.}, | |
− | + | language = {en}, | |
− | + | author = {Raji, Inioluwa Deborah and Fried, Genevieve}, | |
− | + | year = {2021}, | |
− | + | pages = {11}, | |
− | + | file = {Raji and Fried - 2021 - About Face A Survey of Facial Recognition Evaluat.pdf:/home/ruben/Zotero/storage/MQGBLPGB/Raji and Fried - 2021 - About Face A Survey of Facial Recognition Evaluat.pdf:application/pdf}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{celisbuenoFaceRevisitedUsing2020, |
− | + | title = {The Face Revisited: Using Deleuze and Guattari to Explore the Politics of Algorithmic Face Recognition}, | |
− | + | volume = {37}, | |
− | + | issn = {0263-2764, 1460-3616}, | |
− | + | shorttitle = {The Face Revisited}, | |
− | + | url = {http://journals.sagepub.com/doi/10.1177/0263276419867752}, | |
− | + | doi = {10.1177/0263276419867752}, | |
− | + | abstract = {This article explores the political dimension of algorithmic face recognition through the prism of Gilles Deleuze and Fe´lix Guattari’s notion of faciality. It argues that algorithmic face recognition is a technology that expresses a key aspect of contemporary capitalism: the problematic position of the individual in light of new forms of algorithmic and statistical regimes of power. While there is a clear relation between modern disciplinary mechanisms of individualization and the face as a sign of individuality, in control societies this relation appears more as a contradiction. The article contends that Deleuze and Guattari’s concepts of machinic enslavement and social subjection offer a fruitful perspective from where to identify the power mechanisms behind the problematic position of the individual in the specific case of algorithmic face recognition.}, | |
− | + | language = {en}, | |
− | + | number = {1}, | |
− | + | urldate = {2021-02-24}, | |
− | + | journal = {Theory, Culture \& Society}, | |
− | + | author = {Celis Bueno, Claudio}, | |
− | + | year = {2020}, | |
− | + | pages = {73--91}, | |
− | + | file = {Celis Bueno - 2020 - The Face Revisited Using Deleuze and Guattari to .pdf:/home/ruben/Zotero/storage/5JWD3NKX/Celis Bueno - 2020 - The Face Revisited Using Deleuze and Guattari to .pdf:application/pdf}, | |
− | } | + | } |
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{yarPanopticPowerPathologisation2002, |
− | + | title = {Panoptic Power and the Pathologisation of Vision: Critical Reflections on the Foucauldian Thesis.}, | |
− | + | volume = {1}, | |
− | + | issn = {1477-7487}, | |
− | + | shorttitle = {Panoptic Power and the Pathologisation of Vision}, | |
− | + | url = {https://ojs.library.queensu.ca/index.php/surveillance-and-society/article/view/3340}, | |
− | + | doi = {10.24908/ss.v1i3.3340}, | |
− | + | abstract = {This article attempts to evaluate theoretically the applicability of Foucault’s Panopticon to the practices of public surveillance utilising CCTV technology. The first part maps out three “strands” in the reception of panopticism in surveillance studies, suggesting that it tends to fall into one of three broad kinds: its wholesale appropriation and application; its wholesale rejection as inadequate with respect to a supposedly “post-disciplinary” society; and its qualified acceptance subject to some empirically-dependent limitations. I then attempt in a preliminary way to supplement these three positions. In particular, I question the logical adequacy of equating visual surveillance with effective subjectification and self-discipline by drawing upon a range of philosophical and sociological perspectives. Philosophically, it is suggested that the Foucauldian thesis may well “pathologise” the relationship between subjectivity and visibility, and thereby overlook other dimensions of our experience of vision. Sociologically, it is suggested that the precise relation between surveillance and self-discipline requires us to attend, in ethnomethodological fashion, to the situated sense-making activities of subjects as the go about everyday practical activities in public settings.}, | |
− | + | language = {en}, | |
− | + | number = {3}, | |
− | + | urldate = {2021-02-24}, | |
− | + | journal = {Surveillance \& Society}, | |
− | + | author = {Yar, Majid}, | |
− | + | month = sep, | |
− | + | year = {2002}, | |
− | + | pages = {254--271}, | |
− | + | file = {Yar - 2002 - Panoptic Power and the Pathologisation of Vision .pdf:/home/ruben/Zotero/storage/YMVGQ96T/Yar - 2002 - Panoptic Power and the Pathologisation of Vision .pdf:application/pdf}, | |
− | } | + | } |
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{norvalPublicFacesCritical2017, |
− | + | title = {Public faces? A critical exploration of the diffusion of face recognition technologies in online social networks}, | |
− | + | volume = {19}, | |
− | + | issn = {1461-4448, 1461-7315}, | |
− | + | shorttitle = {Public faces?}, | |
− | + | url = {http://journals.sagepub.com/doi/10.1177/1461444816688896}, | |
− | + | doi = {10.1177/1461444816688896}, | |
− | + | abstract = {In recent years, we have witnessed a rapid spread of biometric technologies from the security domain to commercial and social media applications. In this article, we critically explore the repercussions of this diffusion of face recognition to everyday contexts with an in-depth analysis of Facebook’s “tag suggestions” tool which first introduced the technology to on-line social networks. We use Nissenbaum’s framework of contextual integrity to show how the informational norms associated with biometrics in security and policing - their contexts of emergence - are grafted on-line social networks onto their context of iteration. Our analysis reveals a process that has inadvertently influenced the way users understand face recognition, precluding critical questioning of its wider use. It provides an important deepening of contextually-driven approaches to privacy by showing the process through which contexts are co-constitutive of informational norms. Citizens are also offered a critical tool for understanding the trajectory of biometrics and reflect on the data practices associated with the use of face recognition in social media and society at large.}, | |
− | } | + | language = {en}, |
+ | number = {4}, | ||
+ | urldate = {2021-02-24}, | ||
+ | journal = {New Media \& Society}, | ||
+ | author = {Norval, Aletta and Prasopoulou, Elpida}, | ||
+ | month = apr, | ||
+ | year = {2017}, | ||
+ | pages = {637--654}, | ||
+ | file = {Norval and Prasopoulou - 2017 - Public faces A critical exploration of the diffus.pdf:/home/ruben/Zotero/storage/URRYFCQS/Norval and Prasopoulou - 2017 - Public faces A critical exploration of the diffus.pdf:application/pdf}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{kemberFaceRecognitionEmergence2014, |
− | + | title = {Face Recognition and the Emergence of Smart Photography}, | |
− | + | volume = {13}, | |
− | + | issn = {1470-4129, 1741-2994}, | |
− | + | url = {http://journals.sagepub.com/doi/10.1177/1470412914541767}, | |
− | } | + | doi = {10.1177/1470412914541767}, |
+ | abstract = {This article examines face recognition as a key instance of the emergence of smart photography. Smart photography, drawing on Artificial Intelligence (AI) and Ambient Intelligence (AmI) manifests a ‘habit of mind’ (Karen Barad), or a way of thinking that is humanist in so far as it is predicated on human and machine autonomy, and representationalist in its quest for unmediated objects-in-themselves. Faces are among the objects that smart photography seeks (autonomously) to represent. By examining two of the principal algorithms of face recognition technology, the article will show how ways of seeing allied to ways of thinking that are also, ultimately, discriminatory and essentialist, materialise through software. Finally, if the ‘smart’ in smart photography means learning to discriminate between classes of faces that are fixed, essentialised and ultimately elusive (the stereotypical face of terror is both gendered and racialised) then how could smart be made smarter? This is a question of politics rather than progress.}, | ||
+ | language = {en}, | ||
+ | number = {2}, | ||
+ | urldate = {2021-02-24}, | ||
+ | journal = {Journal of Visual Culture}, | ||
+ | author = {Kember, Sarah}, | ||
+ | year = {2014}, | ||
+ | pages = {182--199}, | ||
+ | file = {Kember - 2014 - Face Recognition and the Emergence of Smart Photog.pdf:/home/ruben/Zotero/storage/PLAAWH8F/Kember - 2014 - Face Recognition and the Emergence of Smart Photog.pdf:application/pdf}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{selvaduraiNotJustFace2015, |
− | + | title = {Not just a face in the crowd: addressing the intrusive potential of the online application of face recognition technologies}, | |
− | + | volume = {23}, | |
− | + | shorttitle = {Not just a face in the crowd}, | |
− | } | + | number = {3}, |
+ | journal = {International Journal of Law and Information Technology}, | ||
+ | author = {Selvadurai, Niloufer}, | ||
+ | year = {2015}, | ||
+ | note = {Publisher: Oxford University Press}, | ||
+ | pages = {187--218}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/SFZYUQF6/783823.html:text/html;Selvadurai 2015 - Not just a face in the crowd.pdf:/home/ruben/Zotero/storage/4ETU8TG4/Selvadurai 2015 - Not just a face in the crowd.pdf:application/pdf}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@incollection{berleCompulsoryVisibility2020, |
− | + | title = {Compulsory Visibility?}, | |
− | + | booktitle = {Face Recognition Technology}, | |
− | + | publisher = {Springer}, | |
− | } | + | author = {Berle, Ian}, |
+ | year = {2020}, | ||
+ | pages = {75--85}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/PD592QRE/978-3-030-36887-6_6.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{haleIdentityCrisisFace2005, |
− | + | title = {Identity crisis: face recognition technology and freedom of the will}, | |
− | + | volume = {8}, | |
− | + | shorttitle = {Identity crisis}, | |
− | + | number = {2}, | |
− | } | + | journal = {Ethics Place and Environment}, |
+ | author = {Hale, Benjamin}, | ||
+ | year = {2005}, | ||
+ | note = {Publisher: Taylor \& Francis}, | ||
+ | pages = {141--158}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/88G7R984/13668790500237047.html:text/html;Hale 2005 - Identity crisis.pdf:/home/ruben/Zotero/storage/WPPCP67S/Hale 2005 - Identity crisis.pdf:application/pdf}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{frettyFacerecognitionSurveillanceMoment2011, |
− | + | title = {Face-recognition surveillance: A moment of truth for fourth amendment rights in public places}, | |
− | + | volume = {16}, | |
− | + | shorttitle = {Face-recognition surveillance}, | |
− | } | + | journal = {Va. JL \& Tech.}, |
+ | author = {Fretty, Douglas A.}, | ||
+ | year = {2011}, | ||
+ | note = {Publisher: HeinOnline}, | ||
+ | pages = {430}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{norvalPublicFacesCritical2017a, |
− | + | title = {Public faces? A critical exploration of the diffusion of face recognition technologies in online social networks}, | |
− | + | volume = {19}, | |
− | + | shorttitle = {Public faces?}, | |
− | + | number = {4}, | |
− | + | journal = {New media \& society}, | |
− | + | author = {Norval, Aletta and Prasopoulou, Elpida}, | |
− | + | year = {2017}, | |
− | + | note = {Publisher: SAGE Publications Sage UK: London, England}, | |
− | + | pages = {637--654}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/BDYAIKEE/1461444816688896.html:text/html;Norval Prasopoulou 2017 - Public faces.pdf:/home/ruben/Zotero/storage/3SZQEWS4/Norval Prasopoulou 2017 - Public faces.pdf:application/pdf}, | |
− | + | } | |
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{hopeFoucaultPanopticismSchool2013, |
− | + | title = {Foucault, panopticism and school surveillance research}, | |
− | + | journal = {Social theory and education research: Understanding Foucault, Habermas, Bourdieu and Derrida}, | |
− | + | author = {Hope, Andrew}, | |
− | + | year = {2013}, | |
− | + | pages = {35--51}, | |
− | + | file = {Hope 2013 - Foucault, panopticism and school surveillance research.pdf:/home/ruben/Zotero/storage/UAT5H8KD/Hope 2013 - Foucault, panopticism and school surveillance research.pdf:application/pdf}, | |
− | + | } | |
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{ferreyraFacialRecognitionLatin2020, |
− | + | title = {Facial recognition in Latin America: Towards a human rights-based legal framework to protect public spaces from mass surveillance}, | |
− | + | shorttitle = {Facial recognition in Latin America}, | |
− | + | author = {Ferreyra, Eduardo}, | |
− | } | + | year = {2020}, |
+ | note = {Publisher: Global Campus of Human Rights}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@book{gatesOurBiometricFuture2011, |
− | + | title = {Our biometric future: Facial recognition technology and the culture of surveillance}, | |
− | + | volume = {2}, | |
− | + | shorttitle = {Our biometric future}, | |
− | + | publisher = {NYU Press}, | |
− | } | + | author = {Gates, Kelly A.}, |
+ | year = {2011}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/4V86B2KW/books.html:text/html}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{chestermanFacingFacialSurveillance2019, |
− | + | title = {Facing Up to Facial Surveillance}, | |
− | + | journal = {Available at SSRN 3498775}, | |
− | + | author = {Chesterman, Simon}, | |
− | + | year = {2019}, | |
− | } | + | } |
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{cramptonPlatformBiometrics2019, |
− | + | title = {Platform biometrics}, | |
− | + | volume = {17}, | |
− | + | number = {1/2}, | |
− | + | journal = {Surveillance \& Society}, | |
− | + | author = {Crampton, Jeremy W.}, | |
− | + | year = {2019}, | |
− | + | pages = {54--62}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/8383DTLL/13111.html:text/html;Crampton 2019 - Platform biometrics.pdf:/home/ruben/Zotero/storage/XLNI4YGI/Crampton 2019 - Platform biometrics.pdf:application/pdf}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{wilsonAustralianBiometricsGlobal2007, |
− | + | title = {Australian biometrics and global surveillance}, | |
− | + | volume = {17}, | |
− | + | number = {3}, | |
− | + | journal = {International Criminal Justice Review}, | |
− | + | author = {Wilson, Dean}, | |
− | + | year = {2007}, | |
− | + | note = {Publisher: Sage Publications Sage CA: Los Angeles, CA}, | |
− | } | + | pages = {207--219}, |
+ | file = {Snapshot:/home/ruben/Zotero/storage/VS9JVDMH/1057567707306650.html:text/html;Wilson 2007 - Australian biometrics and global surveillance.pdf:/home/ruben/Zotero/storage/8PJHSWLD/Wilson 2007 - Australian biometrics and global surveillance.pdf:application/pdf}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{hoodMakingBodyElectric2020, |
− | + | title = {Making the body electric: The politics of body-worn cameras and facial recognition in the United States}, | |
− | + | volume = {18}, | |
− | + | shorttitle = {Making the body electric}, | |
− | + | number = {2}, | |
− | + | journal = {Surveillance \& Society}, | |
− | + | author = {Hood, Jacob}, | |
− | + | year = {2020}, | |
− | } | + | pages = {157--169}, |
+ | file = {Snapshot:/home/ruben/Zotero/storage/IVNH5MWS/13285.html:text/html;Hood 2020 - Making the body electric.pdf:/home/ruben/Zotero/storage/TDHYDG9Q/Hood 2020 - Making the body electric.pdf:application/pdf}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{houwingStopCreepBiometric2020, |
− | + | title = {Stop the Creep of Biometric Surveillance Technology}, | |
− | + | volume = {6}, | |
− | + | journal = {Eur. Data Prot. L. Rev.}, | |
− | + | author = {Houwing, Lotte}, | |
− | + | year = {2020}, | |
− | + | note = {Publisher: HeinOnline}, | |
− | + | pages = {174}, | |
− | + | } | |
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{milliganFacialRecognitionTechnology1999, |
− | + | title = {Facial recognition technology, video surveillance, and privacy}, | |
− | } | + | volume = {9}, |
+ | journal = {S. Cal. Interdisc. LJ}, | ||
+ | author = {Milligan, Christopher S.}, | ||
+ | year = {1999}, | ||
+ | note = {Publisher: HeinOnline}, | ||
+ | pages = {295}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@inproceedings{nesterovaMassDataGathering2020, |
− | + | title = {Mass data gathering and surveillance: the fight against facial recognition technology in the globalized world}, | |
− | + | volume = {74}, | |
− | + | shorttitle = {Mass data gathering and surveillance}, | |
− | + | booktitle = {SHS Web of Conferences}, | |
− | + | publisher = {EDP Sciences}, | |
− | + | author = {Nesterova, Irena}, | |
− | + | year = {2020}, | |
− | + | pages = {03006}, | |
− | } | + | file = {Snapshot:/home/ruben/Zotero/storage/TCK8NASY/shsconf_glob2020_03006.html:text/html;Nesterova 2020 - Mass data gathering and surveillance.pdf:/home/ruben/Zotero/storage/I2DGLLTX/Nesterova 2020 - Mass data gathering and surveillance.pdf:application/pdf}, |
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{mccoyBigBrotherWhere2001, |
− | + | title = {O'Big Brother Where Art Though: The Constitutional use of Facial-Recognition Technology}, | |
− | + | volume = {20}, | |
− | + | shorttitle = {O'Big Brother Where Art Though}, | |
− | + | journal = {J. Marshall J. Computer \& Info. L.}, | |
− | + | author = {McCoy, Susan}, | |
− | + | year = {2001}, | |
− | + | note = {Publisher: HeinOnline}, | |
− | + | pages = {471}, | |
− | } | + | } |
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{wilsonSurveillanceRiskPreemption2008, |
− | + | title = {Surveillance, risk and preemption on the Australian border}, | |
− | + | volume = {5}, | |
− | + | number = {2}, | |
− | + | journal = {Surveillance \& Society}, | |
− | + | author = {Wilson, Dean and Weber, Leanne}, | |
− | + | year = {2008}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/JRJK4288/3431.html:text/html;Wilson Weber 2008 - Surveillance, risk and preemption on the Australian border.pdf:/home/ruben/Zotero/storage/J5VPGQ5V/Wilson Weber 2008 - Surveillance, risk and preemption on the Australian border.pdf:application/pdf}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{lattimerPoliticsSurveillanceRisk2013, |
− | + | title = {The Politics of Surveillance in a Risk Society}, | |
− | + | journal = {E-International Relations. http://www. e-ir. info/2013/09/05/the-politics-of-surveillancein-a-risk-society}, | |
− | + | author = {Lattimer, Connor}, | |
− | + | year = {2013}, | |
− | + | file = {Full Text:/home/ruben/Zotero/storage/K4USN62B/the-politics-of-surveillance-in-a-risk-society.html:text/html}, | |
− | + | } | |
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{grunenbergWearingSomeoneElse2019, |
− | + | title = {Wearing Someone Else’s Face: Biometric Technologies, Anti-spoofing and the Fear of the Unknown}, | |
− | + | shorttitle = {Wearing Someone Else’s Face}, | |
− | + | journal = {Ethnos}, | |
− | + | author = {Grünenberg, Kristina}, | |
− | + | year = {2019}, | |
− | + | note = {Publisher: Taylor \& Francis}, | |
− | + | pages = {1--18}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/TE3BB3CD/00141844.2019.html:text/html;Grünenberg 2019 - Wearing Someone Else’s Face.pdf:/home/ruben/Zotero/storage/SZ8BQCZ9/Grünenberg 2019 - Wearing Someone Else’s Face.pdf:application/pdf}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@incollection{wilsonBiometricsBordersIdeal2006, |
− | + | title = {Biometrics, borders and the ideal suspect}, | |
− | + | booktitle = {Borders, mobility and technologies of control}, | |
− | + | publisher = {Springer}, | |
− | + | author = {Wilson, Dean}, | |
− | + | year = {2006}, | |
− | + | pages = {87--109}, | |
− | + | file = {Snapshot:/home/ruben/Zotero/storage/B65YUYAB/1-4020-4899-8_5.html:text/html;Wilson 2006 - Biometrics, borders and the ideal suspect.pdf:/home/ruben/Zotero/storage/4W9XPRK9/Wilson 2006 - Biometrics, borders and the ideal suspect.pdf:application/pdf}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@incollection{nagenborgTechnosecuritysocietyCatastrophicFutures2020, |
− | + | title = {Technosecuritysociety: Catastrophic futures, pre-emptive security \& mass surveillance}, | |
− | + | shorttitle = {Technosecuritysociety}, | |
− | + | booktitle = {TechnoScienceSociety}, | |
− | + | publisher = {Springer}, | |
− | + | author = {Nagenborg, Michael and Weber, Jutta}, | |
− | } | + | year = {2020}, |
+ | pages = {209--224}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{vannattaRiseRegulationThermal2020, |
− | + | title = {The rise and regulation of thermal facial recognition technology during the COVID-19 pandemic}, | |
− | + | volume = {7}, | |
− | + | number = {1}, | |
− | + | journal = {Journal of Law and the Biosciences}, | |
− | + | author = {Van Natta, Meredith and Chen, Paul and Herbek, Savannah and Jain, Rishabh and Kastelic, Nicole and Katz, Evan and Struble, Micalyn and Vanam, Vineel and Vattikonda, Niharika}, | |
− | } | + | year = {2020}, |
+ | note = {Publisher: Oxford University Press}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{linderSurveillanceCapitalismPlatform2019, |
− | + | title = {Surveillance capitalism and platform policing: The surveillant assemblage-as-a-service}, | |
− | + | volume = {17}, | |
− | + | shorttitle = {Surveillance capitalism and platform policing}, | |
− | + | number = {1/2}, | |
− | + | journal = {Surveillance \& Society}, | |
− | + | author = {Linder, Thomas}, | |
− | } | + | year = {2019}, |
+ | pages = {76--82}, | ||
+ | file = {Snapshot:/home/ruben/Zotero/storage/LRJE78TC/12903.html:text/html;Linder 2019 - Surveillance capitalism and platform policing.pdf:/home/ruben/Zotero/storage/K7EYY5I2/Linder 2019 - Surveillance capitalism and platform policing.pdf:application/pdf}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{froomkinRegulatingMassSurveillance2015, |
− | + | title = {Regulating Mass Surveillance as Privacy Pollution: Learning from Environemntal Impact Statements}, | |
− | + | shorttitle = {Regulating Mass Surveillance as Privacy Pollution}, | |
− | + | journal = {U. Ill. L. Rev.}, | |
− | + | author = {Froomkin, A. Michael}, | |
− | + | year = {2015}, | |
− | + | note = {Publisher: HeinOnline}, | |
− | + | pages = {1713}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{naranjoYourFaceRings2020, |
− | + | title = {Your face rings a bell: How facial recognition poses a threat for human rights}, | |
− | + | shorttitle = {Your face rings a bell}, | |
− | + | author = {Naranjo, Diego}, | |
− | + | year = {2020}, | |
− | + | note = {Publisher: Global Campus of Human Rights}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{wilsonSurveillanceRiskPreemption2008a, |
− | + | title = {Surveillance, risk and preemption on the Australian border}, | |
− | + | volume = {5}, | |
− | + | number = {2}, | |
− | + | journal = {Surveillance \& Society}, | |
− | + | author = {Wilson, Dean and Weber, Leanne}, | |
− | + | year = {2008}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@incollection{poirsonLegalRegulationFacial2021, |
− | + | title = {The Legal Regulation of Facial Recognition}, | |
− | + | booktitle = {The Fourth Industrial Revolution and Its Impact on Ethics}, | |
− | + | publisher = {Springer}, | |
− | + | author = {Poirson, Claire}, | |
− | + | year = {2021}, | |
− | + | pages = {283--302}, | |
− | + | } | |
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{singerMicrosoftUrgesCongress2018, |
− | + | title = {Microsoft Urges Congress to Regulate Use of Facial Recognition}, | |
− | + | journal = {The New York Times}, | |
− | + | author = {Singer, Natasha}, | |
− | + | year = {2018}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{kostyukHightechGovernanceBig2017, |
− | + | title = {High-tech governance through big data surveillance: Tracing the global deployment of mass surveillance infrastructures, 1995 to present}, | |
− | + | shorttitle = {High-tech governance through big data surveillance}, | |
− | + | journal = {Available at SSRN 3030347}, | |
− | + | author = {Kostyuk, Nadiya and Chen, Wei and Das, Vishnupriya and Liang, Fan and Hussain, M. M.}, | |
− | + | year = {2017}, | |
− | + | } | |
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{mordiniNoIdentificationRepresentation2012, |
− | + | title = {No identification without representation: constraints on the use of biometric identification systems}, | |
− | + | volume = {29}, | |
− | + | shorttitle = {No identification without representation}, | |
− | + | number = {1}, | |
− | + | journal = {Review of policy research}, | |
− | + | author = {Mordini, Emilio and Rebera, Andrew P.}, | |
− | + | year = {2012}, | |
− | + | note = {Publisher: Wiley Online Library}, | |
− | + | pages = {5--20}, | |
− | + | } | |
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@article{ | + | |bibtex=@article{learned-millerFACIALRECOGNITIONTECHNOLOGIES2020, |
− | + | title = {FACIAL RECOGNITION TECHNOLOGIES IN THE WILD}, | |
− | + | author = {Learned-Miller, Erik and Ordóñez, Vicente and Morgenstern, Jamie and Buolamwini, Joy}, | |
− | + | year = {2020}, | |
− | + | file = {Learned-Miller et al 2020 - FACIAL RECOGNITION TECHNOLOGIES IN THE WILD.pdf:/home/ruben/Zotero/storage/ZXJU2EIM/Learned-Miller et al 2020 - FACIAL RECOGNITION TECHNOLOGIES IN THE WILD.pdf:application/pdf}, | |
− | + | } | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{balaDangerFacialRecognition2020, |
− | + | title = {The Danger of Facial Recognition in Our Children's Classrooms}, | |
− | + | volume = {18}, | |
− | + | journal = {Duke L. \& Tech. Rev.}, | |
− | + | author = {Bala, Nila}, | |
− | } | + | year = {2020}, |
+ | note = {Publisher: HeinOnline}, | ||
+ | pages = {249}, | ||
+ | } | ||
}} | }} | ||
+ | |||
{{#scite: | {{#scite: | ||
− | |bibtex=@ | + | |bibtex=@article{azetaDesignFaceRecognition2015, |
− | + | title = {Design of A Face Recognition System for Security Control}, | |
− | + | author = {Azeta, Ambrose A. and Omoregbe, Nicholas A. and Adewumi, A. O. and Oguntade, Dolapo}, | |
− | + | year = {2015}, | |
− | } | + | } |
}} | }} |
Revision as of 12:47, 25 February 2021
#scite
did not declare a reference.
#scite
did not declare a reference.
, year = {2005}, note = {Publisher: World Bank tex.address: Washington D C},
}
}}
, year = {1994}, pages = {541--574},
}
}}