Difference between revisions of "References"

From Security Vision
Jump to: navigation, search
Line 8: Line 8:
 
url = {10.1080/14650045.2020.1830764},
 
url = {10.1080/14650045.2020.1830764},
 
doi = {10.1080/14650045.2020.1830764},
 
doi = {10.1080/14650045.2020.1830764},
abstract = {Building on Scott’s notion of identity as a key concept in early modern statehood, this paper historically contextualises and analyses the current political re-problematisation of identity in the EU. Engaging the recently adopted interoperability initiative that is set to biometrically verify and cross-validate identity records between all European border management, migration, and security databases, it argues that interoperability presents a shift from traditional modes of identity production at the border towards a digital space of identity management. Such identity management is predicated on the establishment of a biometric super-layer structure that cuts across databases without dissolving their legal foundations and introduces a new mode of ‘truth’ production in the form of a dedicated ‘identity confirmation file’ that is supposed to re-introduce a reliable baseline for the government of the Schengen area.},
 
 
number = {0},
 
number = {0},
 
urldate = {2020-11-16},
 
urldate = {2020-11-16},
Line 27: Line 26:
 
url = {10.1007/s00146-020-01095-8},
 
url = {10.1007/s00146-020-01095-8},
 
doi = {10.1007/s00146-020-01095-8},
 
doi = {10.1007/s00146-020-01095-8},
abstract = {This first half of the paper outlines the formation of racial surveillance capitalism across the longue durée of settler colonialism, with special attention to the formation of artificial vision. This artificial vision is deployed in the erased territory, creating a white space in which to see from platforms, ranging from the ship, to the train and today’s drones. The second section examines the Eurodac digital fingerprint database created by the European Union to monitor and control asylum seekers and refugees as an “artificial life system,” to use a phrase coined by its administrators. In this automated form, artificial vision is distributed rather than centralized.},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-11-16},
 
urldate = {2020-11-16},
Line 34: Line 32:
 
month = nov,
 
month = nov,
 
year = {2020},
 
year = {2020},
file = {Springer Full Text PDF:/home/ruben/Zotero/storage/59U2ZT3P/Mirzoeff - 2020 - Artificial vision, white space and racial surveill.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 45: Line 42:
 
url = {http://www.sciencedirect.com/science/article/pii/S1364661320302229},
 
url = {http://www.sciencedirect.com/science/article/pii/S1364661320302229},
 
doi = {10.1016/j.tics.2020.09.007},
 
doi = {10.1016/j.tics.2020.09.007},
abstract = {Machines do not ‘think fast and slow’ in the sense that humans do in dual-process models of cognition. However, the people who create the machines may attempt to emulate or simulate these fast and slow modes of thinking, which will in turn affect the way end users relate to these machines. In this opinion article we consider the complex interplay in the way various stakeholders (engineers, user experience designers, regulators, ethicists, and end users) can be inspired, challenged, or misled by the analogy between the fast and slow thinking of humans and the Fast and Slow Thinking of machines.},
 
 
language = {en},
 
language = {en},
 
number = {12},
 
number = {12},
Line 55: Line 51:
 
keywords = {algorithm aversion, artificial intelligence, dual-process, machine behavior, machine ethics, trust},
 
keywords = {algorithm aversion, artificial intelligence, dual-process, machine behavior, machine ethics, trust},
 
pages = {1019--1027},
 
pages = {1019--1027},
file = {ScienceDirect Snapshot:/home/ruben/Zotero/storage/RENKJF6N/S1364661320302229.html:text/html;ScienceDirect Full Text PDF:/home/ruben/Zotero/storage/XR4UAIBV/Bonnefon and Rahwan - 2020 - Machine Thinking, Fast and Slow.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 64: Line 59:
 
shorttitle = {Optical governance},
 
shorttitle = {Optical governance},
 
url = {https://strelkamag.com/en/article/optical-governance},
 
url = {https://strelkamag.com/en/article/optical-governance},
abstract = {Gabriele de Seta on the entanglement of social practices and automated sensing technologies.},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-11-12},
 
urldate = {2020-11-12},
Line 77: Line 71:
 
url = {http://romatrepress.uniroma3.it/wp-content/uploads/2020/10/Prismes-n.-2-2020.pdf},
 
url = {http://romatrepress.uniroma3.it/wp-content/uploads/2020/10/Prismes-n.-2-2020.pdf},
 
urldate = {2020-11-09},
 
urldate = {2020-11-09},
file = {Médias et Emotions:/home/ruben/Zotero/storage/F9AKE2KY/Prismes-n.-2-2020.pdf.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 94: Line 87:
 
title = {Researchers show that computer vision algorithms pretrained on ImageNet exhibit multiple, distressing biases},
 
title = {Researchers show that computer vision algorithms pretrained on ImageNet exhibit multiple, distressing biases},
 
url = {https://venturebeat.com/2020/11/03/researchers-show-that-computer-vision-algorithms-pretrained-on-imagenet-exhibit-multiple-distressing-biases/},
 
url = {https://venturebeat.com/2020/11/03/researchers-show-that-computer-vision-algorithms-pretrained-on-imagenet-exhibit-multiple-distressing-biases/},
abstract = {Researchers say they've found evidence of pervasive bias in computer vision algorithms trained on ImageNet, a popular photo dataset.},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2020-11-06},
 
urldate = {2020-11-06},
Line 107: Line 99:
 
title = {Facial recognition used to arrest protestor at Trump bible photo op},
 
title = {Facial recognition used to arrest protestor at Trump bible photo op},
 
url = {https://mashable.com/article/facial-recognition-arrest-black-lives-matter-protestor-trump-bible-photo-op/},
 
url = {https://mashable.com/article/facial-recognition-arrest-black-lives-matter-protestor-trump-bible-photo-op/},
abstract = {Law enforcement used images pulled off Twitter, combined with a facial recognition system, to identify a protestor.},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-11-03},
 
urldate = {2020-11-03},
Line 119: Line 110:
 
title = {MIT Comparative Media Studies/Writing {\textbar} Critical analysis, collaborative research, and design across media arts, forms, and practices},
 
title = {MIT Comparative Media Studies/Writing {\textbar} Critical analysis, collaborative research, and design across media arts, forms, and practices},
 
url = {https://cmsw.mit.edu/},
 
url = {https://cmsw.mit.edu/},
abstract = {An innovative humanities program that applies critical analysis, collaborative research, and design across media arts, forms, and practices.},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2020-11-03},
 
urldate = {2020-11-03},
Line 164: Line 154:
 
title = {The Center for Experimental Ethnography (UPenn)},
 
title = {The Center for Experimental Ethnography (UPenn)},
 
url = {https://www.centerforexperimentalethnography.org/},
 
url = {https://www.centerforexperimentalethnography.org/},
abstract = {The Center for Experimental Ethnography at the University of Pennsylvania seeks to amplify discussions regarding the emerging forms scholarly research is taking in the humanities and social sciences, and to create institutional interventions related to no},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-11-03},
 
urldate = {2020-11-03},
Line 199: Line 188:
 
title = {Alyar Aynetchi},
 
title = {Alyar Aynetchi},
 
url = {https://alyaraynetchi.com},
 
url = {https://alyaraynetchi.com},
abstract = {Alyar Aynetchi is an Art Director and Designer based in Amsterdam.},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-11-03},
 
urldate = {2020-11-03},
Line 225: Line 213:
 
title = {Why AI Geniuses Haven’t Created True Thinking Machines},
 
title = {Why AI Geniuses Haven’t Created True Thinking Machines},
 
url = {https://mindmatters.ai/2020/10/why-ai-geniuses-havent-created-true-thinking-machines/},
 
url = {https://mindmatters.ai/2020/10/why-ai-geniuses-havent-created-true-thinking-machines/},
abstract = {Quantum computers play by the same rules as digital ones: Meaningful information still requires an interpreter (observer) to relate the map to the territory.},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2020-10-24},
 
urldate = {2020-10-24},
Line 231: Line 218:
 
month = oct,
 
month = oct,
 
year = {2020},
 
year = {2020},
file = {Snapshot:/home/ruben/Zotero/storage/YY4LFZQ2/why-ai-geniuses-havent-created-true-thinking-machines.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 239: Line 225:
 
title = {[allmodels.ai] Dataset Retractions},
 
title = {[allmodels.ai] Dataset Retractions},
 
author = {Harvey, Adam},
 
author = {Harvey, Adam},
file = {allmodils - Dataset Retractions.pdf:/home/ruben/Zotero/storage/FNDDXF86/allmodils - Dataset Retractions.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 247: Line 232:
 
title = {Informatics of the Oppressed},
 
title = {Informatics of the Oppressed},
 
url = {https://logicmag.io/care/informatics-of-the-oppressed/},
 
url = {https://logicmag.io/care/informatics-of-the-oppressed/},
abstract = {An inquiry into the rich history of radical experiments to reorganize information.},
 
 
number = {11},
 
number = {11},
 
urldate = {2020-10-21},
 
urldate = {2020-10-21},
Line 259: Line 243:
 
title = {Challenges of Comparing Human and Machine Perception},
 
title = {Challenges of Comparing Human and Machine Perception},
 
url = {https://thegradient.pub/challenges-of-comparing-human-and-machine-perception/},
 
url = {https://thegradient.pub/challenges-of-comparing-human-and-machine-perception/},
abstract = {On how comparison studies between AI and humans be fruitful -- if care is taken.},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-08-03},
 
urldate = {2020-08-03},
Line 266: Line 249:
 
year = {2020},
 
year = {2020},
 
note = {Library Catalog: thegradient.pub},
 
note = {Library Catalog: thegradient.pub},
file = {Snapshot:/home/ruben/Zotero/storage/N9QBBJSW/challenges-of-comparing-human-and-machine-perception.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 275: Line 257:
 
shorttitle = {Shortcuts},
 
shorttitle = {Shortcuts},
 
url = {https://thegradient.pub/shortcuts-neural-networks-love-to-cheat/},
 
url = {https://thegradient.pub/shortcuts-neural-networks-love-to-cheat/},
abstract = {On unifying many of deep learning’s problems and with the concepts of "shortcuts", and what we can do to better understand and mitigate shortcut learning.},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-08-03},
 
urldate = {2020-08-03},
Line 290: Line 271:
 
issn = {0190-8286},
 
issn = {0190-8286},
 
url = {https://www.washingtonpost.com/opinions/we-now-have-evidence-of-facial-recognitions-harm-time-for-lawmakers-to-act/2020/07/05/e62ee8d0-baf8-11ea-80b9-40ece9a701dc_story.html},
 
url = {https://www.washingtonpost.com/opinions/we-now-have-evidence-of-facial-recognitions-harm-time-for-lawmakers-to-act/2020/07/05/e62ee8d0-baf8-11ea-80b9-40ece9a701dc_story.html},
abstract = {Lawmakers must regulate facial recognition technology, or more wrongful arrests are coming.},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2020-07-13},
 
urldate = {2020-07-13},
 
journal = {Washington Post},
 
journal = {Washington Post},
file = {Snapshot:/home/ruben/Zotero/storage/TTRBVKGJ/www.washingtonpost.com.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 302: Line 281:
 
title = {Police use facial-recognition tech to arrest another innocent man},
 
title = {Police use facial-recognition tech to arrest another innocent man},
 
url = {https://mashable.com/article/arrested-facial-recognition-technology/},
 
url = {https://mashable.com/article/arrested-facial-recognition-technology/},
abstract = {For the second time in less than three weeks, it was revealed that Detroit police used faulty technology to arrest the wrong man.},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-07-13},
 
urldate = {2020-07-13},
Line 308: Line 286:
 
author = {Morse, Jack},
 
author = {Morse, Jack},
 
note = {Library Catalog: mashable.com},
 
note = {Library Catalog: mashable.com},
file = {Snapshot:/home/ruben/Zotero/storage/D4KT6GEQ/arrested-facial-recognition-technology.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 318: Line 295:
 
urldate = {2020-04-19},
 
urldate = {2020-04-19},
 
note = {http://web.archive.org/web/20200419092323/https://www.youtube.com/watch?v=jBnCcr-3bXc\&list=PLd4H06TkjIlBiECoaH85aZRB4XEPmo9LG\&index=2\&t=0s},
 
note = {http://web.archive.org/web/20200419092323/https://www.youtube.com/watch?v=jBnCcr-3bXc\&list=PLd4H06TkjIlBiECoaH85aZRB4XEPmo9LG\&index=2\&t=0s},
file = {Zero-Shot Learning - Dr. Timothy Hospedales - YouTube:/home/ruben/Zotero/storage/SH74WLFV/watch.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 327: Line 303:
 
shorttitle = {AI Weekly},
 
shorttitle = {AI Weekly},
 
url = {https://venturebeat.com/2020/03/06/ai-weekly-coronavirus-facial-recognition-and-the-future-of-privacy/},
 
url = {https://venturebeat.com/2020/03/06/ai-weekly-coronavirus-facial-recognition-and-the-future-of-privacy/},
abstract = {China has used AI and surveillance to curb COVID-19, but some argue other nations must respond differently if we are to preserve personal privacies.},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2020-03-15},
 
urldate = {2020-03-15},
Line 335: Line 310:
 
note = {Library Catalog: venturebeat.com
 
note = {Library Catalog: venturebeat.com
 
Section: AI},
 
Section: AI},
file = {Snapshot:/home/ruben/Zotero/storage/J2AD6CAY/ai-weekly-coronavirus-facial-recognition-and-the-future-of-privacy.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 345: Line 319:
 
issn = {0261-3077},
 
issn = {0261-3077},
 
url = {https://www.theguardian.com/uk-news/2020/mar/12/halt-public-use-of-facial-recognition-tech-says-equality-watchdog},
 
url = {https://www.theguardian.com/uk-news/2020/mar/12/halt-public-use-of-facial-recognition-tech-says-equality-watchdog},
abstract = {Equalities and Human Rights Commission says mass AFR surveillance is discriminatory and stifles free expression},
 
 
language = {en-GB},
 
language = {en-GB},
 
urldate = {2020-03-15},
 
urldate = {2020-03-15},
Line 353: Line 326:
 
year = {2020},
 
year = {2020},
 
keywords = {Equality and Human Rights Commission (EHRC), Facial recognition, Police, Race, Society, Surveillance, UK news},
 
keywords = {Equality and Human Rights Commission (EHRC), Facial recognition, Police, Race, Society, Surveillance, UK news},
file = {Snapshot:/home/ruben/Zotero/storage/UR2QQCUJ/halt-public-use-of-facial-recognition-tech-says-equality-watchdog.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 361: Line 333:
 
title = {Hopkins experts present latest coronavirus information on Capitol Hill},
 
title = {Hopkins experts present latest coronavirus information on Capitol Hill},
 
url = {https://hub.jhu.edu/2020/03/06/covid-19-coronavirus-expert-testimony-to-congress/},
 
url = {https://hub.jhu.edu/2020/03/06/covid-19-coronavirus-expert-testimony-to-congress/},
abstract = {Experts discuss how COVID-19 is transmitted, how it is being tracked, and how governments, institutions, and individuals can prevent its spread},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-03-12},
 
urldate = {2020-03-12},
Line 369: Line 340:
 
year = {2020},
 
year = {2020},
 
note = {Library Catalog: hub.jhu.edu},
 
note = {Library Catalog: hub.jhu.edu},
file = {Snapshot:/home/ruben/Zotero/storage/FPJWT77A/covid-19-coronavirus-expert-testimony-to-congress.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 378: Line 348:
 
shorttitle = {Exclusive},
 
shorttitle = {Exclusive},
 
url = {https://onezero.medium.com/exclusive-live-facial-recognition-is-coming-to-u-s-police-body-cameras-bc9036918ae0},
 
url = {https://onezero.medium.com/exclusive-live-facial-recognition-is-coming-to-u-s-police-body-cameras-bc9036918ae0},
abstract = {Police cam manufacturer Wolfcom has contracts with 1,500 organizations},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-03-05},
 
urldate = {2020-03-05},
Line 386: Line 355:
 
year = {2020},
 
year = {2020},
 
note = {http://web.archive.org/web/20200305173758/https://onezero.medium.com/exclusive-live-facial-recognition-is-coming-to-u-s-police-body-cameras-bc9036918ae0},
 
note = {http://web.archive.org/web/20200305173758/https://onezero.medium.com/exclusive-live-facial-recognition-is-coming-to-u-s-police-body-cameras-bc9036918ae0},
file = {Snapshot:/home/ruben/Zotero/storage/5QM2KNUY/exclusive-live-facial-recognition-is-coming-to-u-s-police-body-cameras-bc9036918ae0.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 394: Line 362:
 
title = {Clearview’s Facial Recognition App Has Been Used By The Justice Department, ICE, Macy’s, Walmart, And The NBA},
 
title = {Clearview’s Facial Recognition App Has Been Used By The Justice Department, ICE, Macy’s, Walmart, And The NBA},
 
url = {https://www.buzzfeednews.com/article/ryanmac/clearview-ai-fbi-ice-global-law-enforcement},
 
url = {https://www.buzzfeednews.com/article/ryanmac/clearview-ai-fbi-ice-global-law-enforcement},
abstract = {A BuzzFeed News review of Clearview AI documents has revealed the company is working with more than 2,200 law enforcement agencies, companies, and individuals around the world.},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-02-28},
 
urldate = {2020-02-28},
 
journal = {BuzzFeed News},
 
journal = {BuzzFeed News},
 
note = {http://web.archive.org/web/20200228084853/https://www.buzzfeednews.com/article/ryanmac/clearview-ai-fbi-ice-global-law-enforcement},
 
note = {http://web.archive.org/web/20200228084853/https://www.buzzfeednews.com/article/ryanmac/clearview-ai-fbi-ice-global-law-enforcement},
file = {Snapshot:/home/ruben/Zotero/storage/Y7QT2DEJ/clearview-ai-fbi-ice-global-law-enforcement.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 408: Line 374:
 
shorttitle = {Who’s using your face?},
 
shorttitle = {Who’s using your face?},
 
url = {https://www.ft.com/content/cf19b956-60a2-11e9-b285-3acd5d43599e},
 
url = {https://www.ft.com/content/cf19b956-60a2-11e9-b285-3acd5d43599e},
abstract = {Researchers are scraping our images from social media and CCTV. We may not like the consequences},
 
 
language = {en-GB},
 
language = {en-GB},
 
urldate = {2020-02-27},
 
urldate = {2020-02-27},
Line 415: Line 380:
 
year = {2019},
 
year = {2019},
 
note = {http://web.archive.org/web/20200227090254/https://www.ft.com/content/cf19b956-60a2-11e9-b285-3acd5d43599e},
 
note = {http://web.archive.org/web/20200227090254/https://www.ft.com/content/cf19b956-60a2-11e9-b285-3acd5d43599e},
file = {Snapshot:/home/ruben/Zotero/storage/GUJKQRUN/cf19b956-60a2-11e9-b285-3acd5d43599e.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 426: Line 390:
 
urldate = {2020-02-27},
 
urldate = {2020-02-27},
 
note = {http://web.archive.org/web/20200227084817/https://shinjitoya.com/paint-your-face-away/},
 
note = {http://web.archive.org/web/20200227084817/https://shinjitoya.com/paint-your-face-away/},
file = {Snapshot:/home/ruben/Zotero/storage/ISPHZ5PN/paint-your-face-away.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 434: Line 397:
 
title = {ICE has run facial-recognition searches on millions of Maryland drivers},
 
title = {ICE has run facial-recognition searches on millions of Maryland drivers},
 
url = {https://www.washingtonpost.com/technology/2020/02/26/ice-has-run-facial-recognition-searches-millions-maryland-drivers/},
 
url = {https://www.washingtonpost.com/technology/2020/02/26/ice-has-run-facial-recognition-searches-millions-maryland-drivers/},
abstract = {The direct and largely unlimited access granted to immigration-enforcement officials marks an aggressive new step for the federal agency in regard to Americans’ photos and personal data. It also raises the risk that undocumented immigrants who applied for driver’s licenses under the state’s landmark program could have been targeted.},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-02-27},
 
urldate = {2020-02-27},
Line 440: Line 402:
 
author = {Harwell, Drew},
 
author = {Harwell, Drew},
 
note = {http://web.archive.org/web/20200227062735/https://www.washingtonpost.com/technology/2020/02/26/ice-has-run-facial-recognition-searches-millions-maryland-drivers/},
 
note = {http://web.archive.org/web/20200227062735/https://www.washingtonpost.com/technology/2020/02/26/ice-has-run-facial-recognition-searches-millions-maryland-drivers/},
file = {Snapshot:/home/ruben/Zotero/storage/WQ9BMM4K/ice-has-run-facial-recognition-searches-millions-maryland-drivers.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 448: Line 409:
 
title = {Clearview AI, the facial-recognition company stealing Facebook photos, gets hacked},
 
title = {Clearview AI, the facial-recognition company stealing Facebook photos, gets hacked},
 
url = {https://mashable.com/article/clearview-ai-client-list-hacked/},
 
url = {https://mashable.com/article/clearview-ai-client-list-hacked/},
abstract = {You had one job!},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-02-27},
 
urldate = {2020-02-27},
Line 454: Line 414:
 
author = {Gilmer, Marcus},
 
author = {Gilmer, Marcus},
 
note = {http://web.archive.org/web/20200227062724/https://mashable.com/article/clearview-ai-client-list-hacked/},
 
note = {http://web.archive.org/web/20200227062724/https://mashable.com/article/clearview-ai-client-list-hacked/},
file = {Snapshot:/home/ruben/Zotero/storage/DUE95YUX/clearview-ai-client-list-hacked.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 463: Line 422:
 
issn = {1059-1028},
 
issn = {1059-1028},
 
url = {https://www.wired.com/story/code-obsessed-novelist-builds-writing-bot-the-plot-thickens/},
 
url = {https://www.wired.com/story/code-obsessed-novelist-builds-writing-bot-the-plot-thickens/},
abstract = {Vikram Chandra, the author of Sacred Games, created Granthika to keep track of complex narratives. It could change the future of storytelling.},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-02-26},
 
urldate = {2020-02-26},
Line 471: Line 429:
 
year = {2020},
 
year = {2020},
 
keywords = {artificial intelligence, longreads},
 
keywords = {artificial intelligence, longreads},
file = {Snapshot:/home/ruben/Zotero/storage/I9UGT65T/code-obsessed-novelist-builds-writing-bot-the-plot-thickens.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 483: Line 440:
 
author = {Research, Data Bridge Market},
 
author = {Research, Data Bridge Market},
 
note = {http://web.archive.org/web/20200221092404/https://nysenasdaqlive.com/video-analytics-system-market-size-share-growth-analysis-by-key-players-ibm-corporation-honeywell-international-inc-qognify-inc-briefcam-verint/},
 
note = {http://web.archive.org/web/20200221092404/https://nysenasdaqlive.com/video-analytics-system-market-size-share-growth-analysis-by-key-players-ibm-corporation-honeywell-international-inc-qognify-inc-briefcam-verint/},
file = {Snapshot:/home/ruben/Zotero/storage/GW3UI7HI/video-analytics-system-market-size-share-growth-analysis-by-key-players-ibm-corporation-honeywe.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 491: Line 447:
 
title = {La reconnaissance faciale pour s’identifier en ligne inquiète les défenseurs des libertés numériques},
 
title = {La reconnaissance faciale pour s’identifier en ligne inquiète les défenseurs des libertés numériques},
 
url = {https://www.lemonde.fr/societe/article/2019/07/27/la-reconnaissance-faciale-pour-s-identifier-en-ligne-inquiete-les-defenseurs-des-libertes-numeriques_5494076_3224.html},
 
url = {https://www.lemonde.fr/societe/article/2019/07/27/la-reconnaissance-faciale-pour-s-identifier-en-ligne-inquiete-les-defenseurs-des-libertes-numeriques_5494076_3224.html},
abstract = {Un recours a été déposé devant le Conseil d’Etat pour faire annuler le décret autorisant l’application AliceM.},
 
 
language = {fr},
 
language = {fr},
 
urldate = {2020-02-20},
 
urldate = {2020-02-20},
Line 497: Line 452:
 
month = jul,
 
month = jul,
 
year = {2019},
 
year = {2019},
file = {Snapshot:/home/ruben/Zotero/storage/ZEE4I5N3/la-reconnaissance-faciale-pour-s-identifier-en-ligne-inquiete-les-defenseurs-des-libertes-numer.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 505: Line 459:
 
title = {La reconnaissance faciale, des promesses et des risques},
 
title = {La reconnaissance faciale, des promesses et des risques},
 
url = {https://www.instapaper.com/read/1279123996},
 
url = {https://www.instapaper.com/read/1279123996},
abstract = {A simple tool for saving web pages to read later on your iPhone, iPad, Android, computer, or Kindle.},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-02-20},
 
urldate = {2020-02-20},
 
note = {http://web.archive.org/web/20200220133504/https://www.lemonde.fr/idees/article/2020/02/20/promesses-et-risques-de-la-reconnaissance-faciale\_6030160\_3232.html},
 
note = {http://web.archive.org/web/20200220133504/https://www.lemonde.fr/idees/article/2020/02/20/promesses-et-risques-de-la-reconnaissance-faciale\_6030160\_3232.html},
file = {Snapshot:/home/ruben/Zotero/storage/DPRBNU9N/1279123996.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 517: Line 469:
 
title = {Marseille devant la justice pour l'installation d'un réseau de "vidéoprotection intelligente"},
 
title = {Marseille devant la justice pour l'installation d'un réseau de "vidéoprotection intelligente"},
 
url = {https://www.usine-digitale.fr/article/marseille-devant-la-justice-pour-l-installation-d-un-reseau-de-videoprotection-intelligente.N922079},
 
url = {https://www.usine-digitale.fr/article/marseille-devant-la-justice-pour-l-installation-d-un-reseau-de-videoprotection-intelligente.N922079},
abstract = {La Quadrature du Net et La Ligue des droits de l\&\#39;Homme attaquent la ville de Marseille pour l\&\#39;installation d\&\#39;un r\éseau de \"vid\éoprotection intelligente\" qui \"analyse et fusionne les informations provenant de plusieurs capteurs\" pour aider la police municipale. Selon les deux associations, ce dispositif viole le droit \à la vie priv\ée et ne respecte pas le cadre l\égislatif impos\é pour ce type de projet.
 
 
\ },
 
 
urldate = {2020-02-19},
 
urldate = {2020-02-19},
 
journal = {usine-digitale.fr},
 
journal = {usine-digitale.fr},
 
note = {http://web.archive.org/web/20200219080245/https://www.usine-digitale.fr/article/marseille-devant-la-justice-pour-l-installation-d-un-reseau-de-videoprotection-intelligente.N922079},
 
note = {http://web.archive.org/web/20200219080245/https://www.usine-digitale.fr/article/marseille-devant-la-justice-pour-l-installation-d-un-reseau-de-videoprotection-intelligente.N922079},
file = {Snapshot:/home/ruben/Zotero/storage/93EZR6VW/marseille-devant-la-justice-pour-l-installation-d-un-reseau-de-videoprotection-intelligente.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 546: Line 494:
 
title = {Un hôtel de Police Municipale flambant neuf avec un CSU dernier cri},
 
title = {Un hôtel de Police Municipale flambant neuf avec un CSU dernier cri},
 
url = {https://www.roubaixxl.fr/un-hotel-de-police-municipale-flambant-neuf-avec-un-csu-dernier-cri/},
 
url = {https://www.roubaixxl.fr/un-hotel-de-police-municipale-flambant-neuf-avec-un-csu-dernier-cri/},
abstract = {L’hôtel de Police Municipale flambant neuf, rue du maréchal Foch, a été inauguré jeudi 16 janvier. Un équipement spacieux et fonctionnel qui accueille au deuxième étage le très moderne Centre de Supervision Urbain (CSU) et ses écrans high-tech.},
 
 
language = {fr-FR},
 
language = {fr-FR},
 
urldate = {2020-02-18},
 
urldate = {2020-02-18},
Line 553: Line 500:
 
year = {2020},
 
year = {2020},
 
note = {http://web.archive.org/web/20200218075616/https://www.roubaixxl.fr/un-hotel-de-police-municipale-flambant-neuf-avec-un-csu-dernier-cri/},
 
note = {http://web.archive.org/web/20200218075616/https://www.roubaixxl.fr/un-hotel-de-police-municipale-flambant-neuf-avec-un-csu-dernier-cri/},
file = {Snapshot:/home/ruben/Zotero/storage/VRUCPM64/un-hotel-de-police-municipale-flambant-neuf-avec-un-csu-dernier-cri.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 562: Line 508:
 
shorttitle = {Vidéosurveillance automatisée},
 
shorttitle = {Vidéosurveillance automatisée},
 
url = {http://cqfd-journal.org/Videosurveillance-automatisee-on},
 
url = {http://cqfd-journal.org/Videosurveillance-automatisee-on},
abstract = {CQFD, critique et expérimentation sociales},
 
 
language = {fr},
 
language = {fr},
 
urldate = {2020-02-18},
 
urldate = {2020-02-18},
 
author = {Rivière, Clair},
 
author = {Rivière, Clair},
 
note = {http://web.archive.org/web/20200218075508/http://cqfd-journal.org/Videosurveillance-automatisee-on},
 
note = {http://web.archive.org/web/20200218075508/http://cqfd-journal.org/Videosurveillance-automatisee-on},
file = {Snapshot:/home/ruben/Zotero/storage/V52FRBMS/Videosurveillance-automatisee-on.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 579: Line 523:
 
journal = {ANNA RIDLER},
 
journal = {ANNA RIDLER},
 
note = {http://web.archive.org/web/20200216172849/http://annaridler.com/c-v},
 
note = {http://web.archive.org/web/20200216172849/http://annaridler.com/c-v},
file = {Snapshot:/home/ruben/Zotero/storage/6HK9X3WR/c-v.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 588: Line 531:
 
shorttitle = {Tech Talk},
 
shorttitle = {Tech Talk},
 
url = {https://www.youtube.com/watch?v=ltEL-kPURKs},
 
url = {https://www.youtube.com/watch?v=ltEL-kPURKs},
abstract = {IRC:  \#wikimedia -office
 
 
Summary: The talk provides a very brief introduction to Marielle Volz's Citoid, the tool providing Wikipedia's new automated citations.I then focus on the technology underlying Citoid, Zotero translators, and discuss how interested users/developers can help improve that functionality to better serve the Wikipedia community.
 
 
Speaker: Sebastian Karcher (Syracuse University, Zotero) - http://www.sebastiankarcher.com/
 
(Sebastian is the Associate Director of the Qualitative Data Repository at Syracuse University.)
 
 
Helpful links:
 
https://www.mediawiki.org/wiki/Citoid...
 
https://www.mozilla.org/en-US/firefox...
 
https://www.zotero.org/download/ Download
 
https://www.zotero.org/support/dev/tr...
 
http://www.sebastiankarcher.com/linkl...
 
https://github.com/zotero/translators/
 
https://github.com/zuphilip/translato...},
 
 
urldate = {2020-02-16},
 
urldate = {2020-02-16},
 
note = {http://web.archive.org/web/20200216113124/https://www.youtube.com/watch?v=ltEL-kPURKs},
 
note = {http://web.archive.org/web/20200216113124/https://www.youtube.com/watch?v=ltEL-kPURKs},
Line 614: Line 542:
 
shorttitle = {MS-Celeb-1M},
 
shorttitle = {MS-Celeb-1M},
 
url = {http://arxiv.org/abs/1607.08221},
 
url = {http://arxiv.org/abs/1607.08221},
abstract = {In this paper, we design a benchmark task and provide the associated datasets for recognizing face images and link them to corresponding entity keys in a knowledge base. More specifically, we propose a benchmark task to recognize one million celebrities from their face images, by using all the possibly collected face images of this individual on the web as training data. The rich information provided by the knowledge base helps to conduct disambiguation and improve the recognition accuracy, and contributes to various real-world applications, such as image captioning and news video analysis. Associated with this task, we design and provide concrete measurement set, evaluation protocol, as well as training data. We also present in details our experiment setup and report promising baseline results. Our benchmark task could lead to one of the largest classification problems in computer vision. To the best of our knowledge, our training dataset, which contains 10M images in version 1, is the largest publicly available one in the world.},
 
 
urldate = {2020-11-18},
 
urldate = {2020-11-18},
 
journal = {arXiv:1607.08221 [cs]},
 
journal = {arXiv:1607.08221 [cs]},
Line 622: Line 549:
 
note = {arXiv: 1607.08221},
 
note = {arXiv: 1607.08221},
 
keywords = {Computer Science - Computer Vision and Pattern Recognition},
 
keywords = {Computer Science - Computer Vision and Pattern Recognition},
file = {Guo et al_2016_MS-Celeb-1M.pdf:/home/ruben/Zotero/storage/5ZZ69Q3B/Guo et al_2016_MS-Celeb-1M.pdf:application/pdf;arXiv.org Snapshot:/home/ruben/Zotero/storage/EAJQI2MR/1607.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 631: Line 557:
 
shorttitle = {Exploit the Unknown Gradually},
 
shorttitle = {Exploit the Unknown Gradually},
 
doi = {10.1109/CVPR.2018.00543},
 
doi = {10.1109/CVPR.2018.00543},
abstract = {We focus on the one-shot learning for video-based person re-Identification (re-ID). Unlabeled tracklets for the person re-ID tasks can be easily obtained by preprocessing, such as pedestrian detection and tracking. In this paper, we propose an approach to exploiting unlabeled tracklets by gradually but steadily improving the discriminative capability of the Convolutional Neural Network (CNN) feature representation via stepwise learning. We first initialize a CNN model using one labeled tracklet for each identity. Then we update the CNN model by the following two steps iteratively: 1. sample a few candidates with most reliable pseudo labels from unlabeled tracklets; 2. update the CNN model according to the selected data. Instead of the static sampling strategy applied in existing works, we propose a progressive sampling method to increase the number of the selected pseudo-labeled candidates step by step. We systematically investigate the way how we should select pseudo-labeled tracklets into the training set to make the best use of them. Notably, the rank-1 accuracy of our method outperforms the state-of-the-art method by 21.46 points (absolute, i.e., 62.67\% vs. 41.21\%) on the MARS dataset, and 16.53 points on the DukeMTMC-VideoReID dataset.},
 
 
booktitle = {2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition},
 
booktitle = {2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition},
 
author = {Wu, Y. and Lin, Y. and Dong, X. and Yan, Y. and Ouyang, W. and Yang, Y.},
 
author = {Wu, Y. and Lin, Y. and Dong, X. and Yan, Y. and Ouyang, W. and Yang, Y.},
Line 639: Line 564:
 
keywords = {Cameras, CNN model, convolution, convolutional neural network, Data models, Estimation, feature extraction, Feature extraction, feedforward neural nets, iterative methods, learning (artificial intelligence), object detection, object tracking, one-shot learning, one-shot video-based person re-identification, pedestrian detection, person re-ID tasks, progressive sampling method, pseudolabeled candidates step, Reliability, sampling methods, static sampling strategy, stepwise learning, Task analysis, tracking, Training, unlabeled tracklets, video signal processing},
 
keywords = {Cameras, CNN model, convolution, convolutional neural network, Data models, Estimation, feature extraction, Feature extraction, feedforward neural nets, iterative methods, learning (artificial intelligence), object detection, object tracking, one-shot learning, one-shot video-based person re-identification, pedestrian detection, person re-ID tasks, progressive sampling method, pseudolabeled candidates step, Reliability, sampling methods, static sampling strategy, stepwise learning, Task analysis, tracking, Training, unlabeled tracklets, video signal processing},
 
pages = {5177--5186},
 
pages = {5177--5186},
file = {Wu et al_2018_Exploit the Unknown Gradually.pdf:/home/ruben/Zotero/storage/WFIF25VN/Wu et al_2018_Exploit the Unknown Gradually.pdf:application/pdf;IEEE Xplore Abstract Record:/home/ruben/Zotero/storage/5NZDSZHC/8578641.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 650: Line 574:
 
url = {10.1007/s00146-020-01110-y},
 
url = {10.1007/s00146-020-01110-y},
 
doi = {10.1007/s00146-020-01110-y},
 
doi = {10.1007/s00146-020-01110-y},
abstract = {In the late 2010s, various international committees, expert groups, and national strategy boards have voiced the demand to ‘open’ the algorithmic black box, to audit, expound, and demystify artificial intelligence. The opening of the algorithmic black box, however, cannot be seen only as an engineering challenge. In this article, I argue that only the sort of transparency that arises from critique—a method of theoretical examination that, by revealing pre-existing power structures, aims to challenge them—can help us produce technological systems that are less deceptive and more just. I relate the question of AI transparency to the broader challenge of responsible making, contending that future action must aim to systematically reconcile design—as a way of concealing—with critique—as a manner of revealing.},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-11-19},
 
urldate = {2020-11-19},
Line 658: Line 581:
 
year = {2020},
 
year = {2020},
 
keywords = {classified},
 
keywords = {classified},
file = {Hollanek_2020_AI transparency.pdf:/home/ruben/Zotero/storage/UIXEFACZ/Hollanek_2020_AI transparency.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 669: Line 591:
 
url = {10.1111/j.1749-5687.2009.00082.x},
 
url = {10.1111/j.1749-5687.2009.00082.x},
 
doi = {10.1111/j.1749-5687.2009.00082.x},
 
doi = {10.1111/j.1749-5687.2009.00082.x},
abstract = {Abstract. The study of migration in general and in IR in particular has generally meant the study of immigration. Yet, sending states increasingly manage and go},
 
 
language = {en},
 
language = {en},
 
number = {4},
 
number = {4},
Line 689: Line 610:
 
url = {https://doi.org/10.1007/s00146-020-01067-y},
 
url = {https://doi.org/10.1007/s00146-020-01067-y},
 
doi = {10.1007/s00146-020-01067-y},
 
doi = {10.1007/s00146-020-01067-y},
abstract = {Algorithmic vision, the computational process of making meaning from digital images or visual information, has changed the relationship between the image and the human subject. In this paper, I explicate on the role of algorithmic vision as a technique of algorithmic governance, the organization of a population by algorithmic means. With its roots in the United States post-war cybernetic sciences, the ontological status of the computational image undergoes a shift, giving way to the hegemonic use of automated facial recognition technologies towards predatory policing and profiling practices. By way of example, I argue that algorithmic vision reconfigures the philosophical links between vision, image, and truth, paradigmatically changing the way a human subject is represented through imagistic data. With algorithmic vision, the relationship between subject and representation challenges the humanistic discourse around images, calling for a critical displacement of the human subject from the center of an analysis of how computational images make meaning. I will explore the relationship between the operative image, the image that acts but is not seen by human eyes, and what Louise Amoore calls an “emergent subject,” a subject that is made visible through algorithmic techniques (2013). Algorithmic vision reveals subjects to power in a mode that requires a new approach towards analyzing the entanglement and invisiblization of the human in automated decision-making systems.},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-11-23},
 
urldate = {2020-11-23},
Line 706: Line 626:
 
url = {10.1177/2053951717717749},
 
url = {10.1177/2053951717717749},
 
doi = {10.1177/2053951717717749},
 
doi = {10.1177/2053951717717749},
abstract = {The commentary raises political questions about the ways in which data has been constituted as an object vested with certain powers, influence, and rationalities. We place the emergence and transformation of professional practices such as ‘data science’, ‘data journalism’, ‘data brokerage’, ‘data mining’, ‘data storage’, and ‘data analysis’ as part of the reconfiguration of a series of fields of power and knowledge in the public and private accumulation of data. Data politics asks questions about the ways in which data has become such an object of power and explores how to critically intervene in its deployment as an object of knowledge. It is concerned with the conditions of possibility of data that involve things (infrastructures of servers, devices, and cables), language (code, programming, and algorithms), and people (scientists, entrepreneurs, engineers, information technologists, designers) that together create new worlds. We define ‘data politics’ as both the articulation of political questions about these worlds and the ways in which they provoke subjects to govern themselves and others by making rights claims. We contend that without understanding these conditions of possibility – of worlds, subjects and rights – it would be difficult to intervene in or shape data politics if by that it is meant the transformation of data subjects into data citizens.},
 
 
language = {en},
 
language = {en},
 
number = {2},
 
number = {2},
Line 716: Line 635:
 
note = {Publisher: SAGE Publications Ltd},
 
note = {Publisher: SAGE Publications Ltd},
 
pages = {2053951717717749},
 
pages = {2053951717717749},
file = {Ruppert et al. - 2017 - Data politics.pdf:/home/ruben/Zotero/storage/RJ5BGR5X/Ruppert et al. - 2017 - Data politics.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 727: Line 645:
 
url = {10.1177/2053951717717749},
 
url = {10.1177/2053951717717749},
 
doi = {10.1177/2053951717717749},
 
doi = {10.1177/2053951717717749},
abstract = {The commentary raises political questions about the ways in which data has been constituted as an object vested with certain powers, influence, and rationalities. We place the emergence and transformation of professional practices such as ‘data science’, ‘data journalism’, ‘data brokerage’, ‘data mining’, ‘data storage’, and ‘data analysis’ as part of the reconfiguration of a series of fields of power and knowledge in the public and private accumulation of data. Data politics asks questions about the ways in which data has become such an object of power and explores how to critically intervene in its deployment as an object of knowledge. It is concerned with the conditions of possibility of data that involve things (infrastructures of servers, devices, and cables), language (code, programming, and algorithms), and people (scientists, entrepreneurs, engineers, information technologists, designers) that together create new worlds. We define ‘data politics’ as both the articulation of political questions about these worlds and the ways in which they provoke subjects to govern themselves and others by making rights claims. We contend that without understanding these conditions of possibility – of worlds, subjects and rights – it would be difficult to intervene in or shape data politics if by that it is meant the transformation of data subjects into data citizens.},
 
 
language = {en},
 
language = {en},
 
number = {2},
 
number = {2},
Line 737: Line 654:
 
note = {Publisher: SAGE Publications Ltd},
 
note = {Publisher: SAGE Publications Ltd},
 
pages = {2053951717717749},
 
pages = {2053951717717749},
file = {Ruppert et al_2017_Data politics.pdf:/home/ruben/Zotero/storage/YH4RJW9V/Ruppert et al_2017_Data politics.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 746: Line 662:
 
shorttitle = {Is This Time Different?},
 
shorttitle = {Is This Time Different?},
 
url = {https://www.youtube.com/watch?v=1mwkJ3QPKGQ},
 
url = {https://www.youtube.com/watch?v=1mwkJ3QPKGQ},
abstract = {Are there aspects of modern technology, made possible by unprecedented computing power and connectivity, that make them distinctively different from previous eras? If so, what are the implications?
 
 
In this episode of \#FutureofWork Rob Johnson moderates a discussion with Jed Kolko, Shivani Nayyar and Siddharth Suri. They take a close look at modern digital technologies in our era. Are there aspects of modern technology, made possible by a plethora of data, unprecedented computing power and connectivity, that make them distinctively different from previous eras? If so, what are the implications to our societies?
 
 
--
 
 
The Future of Work is an INET webinar series that brings together diverse voices to discuss the impact of technology on the economy and society. We host prominent thinkers, policy-makers, and scholars from different backgrounds and countries to present and debate their views.
 
 
As technology continues to disrupt industries globally, the nature and future of work will be impacted by decisions and policies being made today. What are the social costs and benefits that technology will bear on economies already transformed by globalization and what are the implications to labor markets and social welfare? Can we get ahead of the next transformational revolution?},
 
 
urldate = {2020-11-23},
 
urldate = {2020-11-23},
author = {{New Economic Thinking}},
+
author = {New Economic Thinking},
 
month = nov,
 
month = nov,
 
year = {2020},
 
year = {2020},
Line 766: Line 673:
 
title = {Collective Infrastructures and Knowledge Production in a Post-Digital Age},
 
title = {Collective Infrastructures and Knowledge Production in a Post-Digital Age},
 
url = {https://www.youtube.com/watch?v=_KQJp-ICK_A},
 
url = {https://www.youtube.com/watch?v=_KQJp-ICK_A},
abstract = {The New Centre, Heba Y. Amin and Anthony Downey invite you to participate in an online workshop to test new forms of learning in a post-digital world. Guided by live presentations, this workshop with Mohammad Salemy, Brunella Antomarini, Valentin Golev, Reza Negarestani and Patricia Reed will generate a glossary of terms that will develop as a collective response to the online discussions. By thinking through the limits of computational technologies, the event will encourage users to rethink the conventional infrastructures that inform online learning and, in turn, formulate an experimental approach to shared knowledge production and political action.
 
 
The event is introduced by Heba Y. Amin and Anthony Dowey and will be moderated by Mohammad Salemy and Martina Cavalot.
 
 
First Session with Brunella Antomarini \& Valentin Golev
 
 
Secon Session with Reza Negarestani \& Patricia Reed: https://youtu.be/rVBa1hbPcCM},
 
 
urldate = {2020-11-23},
 
urldate = {2020-11-23},
author = {{The New Centre for Research \& Practice}},
+
author = {The New Centre for Research \& Practice},
 
month = nov,
 
month = nov,
 
year = {2020},
 
year = {2020},
Line 788: Line 688:
 
url = {10.1177/2053951720969208},
 
url = {10.1177/2053951720969208},
 
doi = {10.1177/2053951720969208},
 
doi = {10.1177/2053951720969208},
abstract = {Much has been written about data politics in the last decade, which has generated myriad concepts such as ‘surveillance capitalism’, ‘gig economy’, ‘quantified self’, ‘algorithmic governmentality’, ‘data colonialism’, ‘data subjects’ and ‘digital citizens’. Yet, it has been difficult to plot these concepts into an historical series to discern specific continuities and discontinuities since the origins of modern power in its three major forms: sovereign, disciplinary and regulatory. This article argues that the coronavirus pandemic in 2020 brought these three forms of power into sharp relief but made particularly visible a fourth form of power that we name ‘sensory power’, which has been emerging since the 1980s. The article draws on early studies of power by Michel Foucault, subsequent studies on biopower and biopolitics that expanded on them, and studies in the past decade that focused on data produced from apps, devices and platforms. Yet, despite its ambition, the article is inevitably an outline of a much larger project.},
 
 
language = {en},
 
language = {en},
 
number = {2},
 
number = {2},
Line 798: Line 697:
 
note = {Publisher: SAGE Publications Ltd},
 
note = {Publisher: SAGE Publications Ltd},
 
pages = {2053951720969208},
 
pages = {2053951720969208},
file = {Isin_Ruppert_2020_The birth of sensory power.pdf:/home/ruben/Zotero/storage/Z4DFQ8SM/Isin_Ruppert_2020_The birth of sensory power.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 808: Line 706:
 
url = {10.1007/s00146-020-01093-w},
 
url = {10.1007/s00146-020-01093-w},
 
doi = {10.1007/s00146-020-01093-w},
 
doi = {10.1007/s00146-020-01093-w},
abstract = {Computer vision aims to produce an understanding of digital image’s content and the generation or transformation of images through software. Today, a significant amount of computer vision algorithms rely on techniques of machine learning which require large amounts of data assembled in collections, or named data sets. To build these data sets a large population of precarious workers label and classify photographs around the clock at high speed. For computers to learn how to see, a scale articulates macro and micro dimensions: the millions of images culled from the internet with the few milliseconds given to the workers to perform a task for which they are paid a few cents. This paper engages in details with the production of this scale and the labour it relies on: its elaboration. This elaboration does not only require hands and retinas, it also crucially zes mobilises the photographic apparatus. To understand the specific character of the scale created by computer vision scientists, the paper compares it with a previous enterprise of scaling, Malraux’s Le Musée Imaginaire, where photography was used as a device to undo the boundaries of the museum’s collection and open it to an unlimited access to the world’s visual production. Drawing on Douglas Crimp’s argument that the “musée imaginaire”, a hyperbole of the museum, relied simultaneously on the active role of the photographic apparatus for its existence and on its negation, the paper identifies a similar problem in computer vision’s understanding of photography. The double dismissal of the role played by the workers and the agency of the photographic apparatus in the elaboration of computer vision foreground the inherent fragility of the edifice of machine vision and a necessary rethinking of its scale.},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-11-23},
 
urldate = {2020-11-23},
Line 815: Line 712:
 
month = nov,
 
month = nov,
 
year = {2020},
 
year = {2020},
file = {Malevé_2020_On the data set’s ruins.pdf:/home/ruben/Zotero/storage/39JPZ7JB/Malevé_2020_On the data set’s ruins.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 823: Line 719:
 
title = {2020-11-27/29 Borders of Fear},
 
title = {2020-11-27/29 Borders of Fear},
 
url = {https://www.disruptionlab.org/borders-of-fear},
 
url = {https://www.disruptionlab.org/borders-of-fear},
abstract = {MIGRATION, SECURITY \& CONTROL Live from Studio 1 - Kunstquartier Bethanien - Berlin  November 27—29 2020},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2020-11-25},
 
urldate = {2020-11-25},
Line 835: Line 730:
 
shorttitle = {Liu Webinar Series},
 
shorttitle = {Liu Webinar Series},
 
url = {https://www.youtube.com/watch?v=FYKfi1DBivg},
 
url = {https://www.youtube.com/watch?v=FYKfi1DBivg},
abstract = {This event, as a part of the Liu Institute for Global Issues webinar series, occurred on November 17, 2020.
 
 
 
 
The rapidly growing power of US tech companies to dominate digital markets has alarmed policymakers around the world. Google, Amazon, and Facebook are increasingly compared to the robber barons of the Gilded Age — a time of skyrocketing inequality and corporate overreach. Congressional investigators recently argued that “these firms have too much power, and that power must be reined in and subject to appropriate oversight and enforcement.” Observers are right to be worried. But reining in Big Tech will require us to look beyond digital markets to how capitalism itself has evolved over the past decade. Technology companies have used our smartphones to forge a new frontier of appropriation and exploitation with profound political, social, and ecological implications.
 
 
 
Presenter: Nicole Aschoff
 
Faculty Host: SPPGA Professor Ramana, Simons Chair in Disarmament, Global and Human Security; Director, Liu Institute for Global Issues, School of Public Policy and Global Affairs, UBC
 
Student Host: Alexander Howes, Master of Public Policy and Global Affairs, UBC
 
 
 
Bio: Nicole Aschoff is the author of The Smartphone Society and The New Prophets of Capital, the managing editor of the Boston Institute for Nonprofit Journalism, and an editor-at-large at Jacobin magazine. She holds a PhD in sociology from Johns Hopkins University and previously taught at Boston University. She lives in Cambridge, Massachusetts.
 
 
 
For future events, please visit https://sppga.ubc.ca},
 
 
urldate = {2020-12-02},
 
urldate = {2020-12-02},
author = {{UBC School of Public Policy and Global Affairs}},
+
author = {UBC School of Public Policy and Global Affairs},
 
month = nov,
 
month = nov,
 
year = {2020},
 
year = {2020},
Line 862: Line 741:
 
title = {Technoprecarious {\textbar} The MIT Press},
 
title = {Technoprecarious {\textbar} The MIT Press},
 
url = {https://mitpress.mit.edu/books/technoprecarious},
 
url = {https://mitpress.mit.edu/books/technoprecarious},
abstract = {An analysis that traces the role of digital technology in multiplying precarity.
 
               
 
                    Technoprecarious advances a new analytic for tracing how precarity unfolds across disparate geographical sites and cultural practices in the digital age. Digital technologies—whether apps like Uber, built on flexible labor, or platforms like Airbnb that shift accountability to users—have assisted in consolidating the wealth and influence of a small number of players. These platforms have also exacerbated increasingly insecure conditions of work and life for racial, ethnic, and sexual minorities; women; indigenous people; migrants; and peoples in the global south. At the same time, precarity has become increasingly generalized, expanding to include even the creative class and digital producers themselves. This collaboratively authored multigraph analyzes the role of digital technology in multiplying precarity. The authors use the term precarity to characterize those populations disproportionately affected by the forms of inequality and insecurity that digital technologies have generated despite the new affordances and possibilities they offer. The book maps a broad range of digital precarity—from the placement of Palestinian Internet cables to the manufacture of electronics by Navajo women and from the production and deployment of drones on the U.S.–Mexico border to the technocultural productions of Chinese makers. This project contributes to, and helps bridge, ongoing debates on precarity and digital networks in the fields of critical computing, postcolonial studies, visual culture, and information sciences.},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-12-02},
 
urldate = {2020-12-02},
Line 879: Line 755:
 
url = {10.1146/annurev-statistics-042720-125902},
 
url = {10.1146/annurev-statistics-042720-125902},
 
doi = {10.1146/annurev-statistics-042720-125902},
 
doi = {10.1146/annurev-statistics-042720-125902},
abstract = {A recent wave of research has attempted to define fairness quantitatively. In particular, this work has explored what fairness might mean in the context of decisions based on the predictions of statistical and machine learning models. The rapid growth of this new field has led to wildly inconsistent motivations, terminology, and notation, presenting a serious challenge for cataloging and comparing definitions. This article attempts to bring much-needed order. First, we explicate the various choices and assumptions made—often implicitly—to justify the use of prediction-based decision-making. Next, we show how such choices and assumptions can raise fairness concerns and we present a notationally consistent catalog of fairness definitions from the literature. In doing so, we offer a concise reference for thinking through the choices, assumptions, and fairness considerations of prediction-based decision-making. Expected final online publication date for the Annual Review of Statistics and Its Application, Volume 8 is March 8, 2021. Please see http://www.annualreviews.org/page/journal/pubdates for revised estimates.},
 
 
number = {1},
 
number = {1},
 
urldate = {2020-12-02},
 
urldate = {2020-12-02},
Line 895: Line 770:
 
shorttitle = {"Data work},
 
shorttitle = {"Data work},
 
url = {https://www.youtube.com/watch?v=v5oHhuPzl14},
 
url = {https://www.youtube.com/watch?v=v5oHhuPzl14},
abstract = {What happens when new artificial intelligence (AI) tools are integrated into organisations around the world?
 
 
For example, digital medicine promises to combine emerging and novel sources of data and new analysis techniques like AI and machine learning to improve diagnosis, care delivery and condition management. But healthcare workers find themselves at the frontlines of figuring out new ways to care for patients through, with - and sometimes despite - their data. Paradoxically, new data-intensive tasks required to make AI work are often seen as of secondary importance. Gina calls these tasks data work, and her team studied how data work is changing in Danish \& US hospitals (Moller, Bossen, Pine, Nielsen and Neff, forthcoming ACM Interactions).
 
 
Based on critical data studies and organisational ethnography, this talk will argue that while advances in AI have sparked scholarly and public attention to the challenges of the ethical design of technologies, less attention has been focused on the requirements for their ethical use. Unfortunately, this means that the hidden talents and secret logics that fuel successful AI projects are undervalued and successful AI projects continue to be seen as technological, not social, accomplishments.
 
 
In this talk Professor Gina Neff, Oxford Internet Institute and Professor Ian Goldin, Oxford Martin School, will examine publicly known “failures” of AI systems to show how this gap between design and use creates dangerous oversights and to develop a framework to predict where and how these oversights emerge. The resulting framework can help scholars and practitioners to query AI tools to show who and whose goals are being achieved or promised through, what structured performance using what division of labour, under whose control and at whose expense. In this way, data work becomes an analytical lens on the power of social institutions for shaping technologies-in-practice.},
 
 
urldate = {2020-12-02},
 
urldate = {2020-12-02},
author = {{Oxford Martin School}},
+
author = {Oxford Martin School},
 
month = nov,
 
month = nov,
 
year = {2020},
 
year = {2020},
Line 913: Line 781:
 
title = {Lev Manovich ‘Artificial Intelligence, Aesthetics, and Future of Culture’},
 
title = {Lev Manovich ‘Artificial Intelligence, Aesthetics, and Future of Culture’},
 
url = {https://www.youtube.com/watch?v=6t6ZpNHYa5M},
 
url = {https://www.youtube.com/watch?v=6t6ZpNHYa5M},
abstract = {While debates on questions such as «will AI replace artists» and «can AI be truly creative» continue, AI has already been shaping contemporary global culture for a number of years. Examples include systems that model our taste and aesthetic preferences, recommending books, music, and movies, enhancing photos, designing websites and data visualizations, writing newspaper articles, making movie trailers, TV scripts, etc. If contemporary culture is organized around templates, conventions, and vocabularies of repeated elements, why its creation has not been automated a long time ago? Is there any data to suggest that AI culture automation will contribute to a decrease in cultural diversity over time? Or does it on the contrary increases cultural diversity? Can we imagine what design, media, and art we will have in 20-30 years? What do you need to learn now to be the leading designer in future decades when AI is more advanced? And what about «general-purpose cultural artificial intelligence» — will it ever be achieved, and what it may look like?},
 
 
urldate = {2020-12-02},
 
urldate = {2020-12-02},
author = {{HSE ART AND DESIGN SCHOOL}},
+
author = {HSE ART AND DESIGN SCHOOL},
 
month = nov,
 
month = nov,
 
year = {2020},
 
year = {2020},
Line 928: Line 795:
 
url = {10.1177/1463499620959247},
 
url = {10.1177/1463499620959247},
 
doi = {10.1177/1463499620959247},
 
doi = {10.1177/1463499620959247},
abstract = {Anthropologists have generally found it reasonable to understand the Industrial Revolution in Britain as a product of global historical processes including colonialism and the structure of world trade. The extent to which the industrialization of British textile production was contingent on global processes has been illuminated in detail by historians such as Joseph Inikori. Andre Gunder Frank proposed that we should reconceptualize technological development as a ‘world economic process, which took place in and because of the structure of the world economy’. Yet the theoretical implications of understanding industrial technological systems as global and unevenly distributed phenomena have, by and large, not contaminated mainstream conceptions of technologies as politically neutral and fundamentally innocent manifestations of enlightenment, detachable from the societal contexts in which they have emerged. Social theory nevertheless offers perspectives for a radical rethinking of this conventional ontology of modern technology. If the premises of actor–network theory, material culture studies, Marxism and poststructuralist critiques of power and inequalities are combined with the perspectives of ecological economics on global social metabolism, the fossil-fuelled textile factories of 19th-century Britain can be reinterpreted as social instruments for appropriating embodied human labour and natural space from elsewhere in the global system. A renewed ‘anthropology of technology’ might focus on the observation that technology is not simply a matter of putting nature to work, but a strategy of putting other sectors of global society to work.1},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-12-02},
 
urldate = {2020-12-02},
Line 937: Line 803:
 
note = {Publisher: SAGE Publications},
 
note = {Publisher: SAGE Publications},
 
pages = {1463499620959247},
 
pages = {1463499620959247},
file = {Hornborg 2020 - Machines as manifestations of global systems.pdf:/home/ruben/Zotero/storage/RAM5MI2K/Hornborg 2020 - Machines as manifestations of global systems.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 949: Line 814:
 
url = {10.1177/2056305120971632},
 
url = {10.1177/2056305120971632},
 
doi = {10.1177/2056305120971632},
 
doi = {10.1177/2056305120971632},
abstract = {In this article, we add research on technical integration and dependency to the theories of platformization. Our research seeks to understand how platforms have been able to technically integrate themselves into the fabric of the mobile ecosystem, transforming the economic dynamics that allow these largely enclosed entities to compete. We therefore want to consider platforms as service assemblages to account for the material ways in which they have decomposed and recomposed themselves for developers, enabling them to shift the economic dynamics of competition and monopolization in their favor. This article will argue that this shift in the formation of platform monopolies is being brought about by the decentralization of these services, leading to an overall technical integration of the largest digital platform such as Facebook and Google into the source code of almost all apps. We present new digital methodologies to surface these relations and material conditions of platforms. These methodologies offer us a whole new toolkit to investigate how decentralized services depend on each other and how new power relations are formed.},
 
 
language = {en},
 
language = {en},
 
number = {4},
 
number = {4},
Line 959: Line 823:
 
note = {Publisher: SAGE Publications Ltd},
 
note = {Publisher: SAGE Publications Ltd},
 
pages = {2056305120971632},
 
pages = {2056305120971632},
file = {Blanke Pybus 2020 - The Material Conditions of Platforms.pdf:/home/ruben/Zotero/storage/94BXKH39/Blanke Pybus 2020 - The Material Conditions of Platforms.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 977: Line 840:
 
doi = {10.1007/978-3-030-56286-1},
 
doi = {10.1007/978-3-030-56286-1},
 
keywords = {***, FR-Inbox},
 
keywords = {***, FR-Inbox},
file = {Roberge and Castelle - 2021 - The Cultural Life of Machine Learning An Incursio.pdf:/home/ruben/Zotero/storage/YRIS9DRM/Roberge and Castelle - 2021 - The Cultural Life of Machine Learning An Incursio.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 994: Line 856:
 
year = {2021},
 
year = {2021},
 
doi = {10.1007/978-3-030-56286-1},
 
doi = {10.1007/978-3-030-56286-1},
file = {Roberge and Castelle - 2021 - The Cultural Life of Machine Learning An Incursio.pdf:/home/ruben/Zotero/storage/DXACM6YK/Roberge and Castelle - 2021 - The Cultural Life of Machine Learning An Incursio.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,006: Line 867:
 
url = {10.1177/0305829819889139},
 
url = {10.1177/0305829819889139},
 
doi = {10.1177/0305829819889139},
 
doi = {10.1177/0305829819889139},
abstract = {This article proposes ‘biopolitics multiple’ as an approach to the heterogeneity of biopolitical technologies deployed to govern migration today. Building on work that has started to develop analytical vocabularies to diagnose biopolitical technologies that work neither by fostering life nor by making people die in a necropolitical sense, it conceptualises ‘extraction’ and ‘subtraction’ as two such technologies that take ‘hold’ of migrants’ lives today. Extraction, explored in the article through a focus on borderzones in Greece, captures the imbrication of biopolitics and value through the ‘outside’ creation of the economic conditions of data circulation. Subtraction, which is analysed in this article through a focus on Calais, captures the practices of (partial) non-governing by taking material and legal terrain away from migrants and reconfiguring convoluted geographies of (forced) hyper-mobility. This move allows us to understand the governmentality of migration beyond binary oppositions such as ‘making live/letting die’, biopolitics/necropolitics and inclusion/exclusion., Biopolítica múltiple: migración, extracción, sustracción},
 
 
language = {en},
 
language = {en},
 
number = {2},
 
number = {2},
Line 1,016: Line 876:
 
note = {Publisher: SAGE Publications Ltd},
 
note = {Publisher: SAGE Publications Ltd},
 
pages = {198--220},
 
pages = {198--220},
file = {Aradau and Tazzioli - 2020 - Biopolitics Multiple Migration, Extraction, Subtr.pdf:/home/ruben/Zotero/storage/ADBJELCI/Aradau and Tazzioli - 2020 - Biopolitics Multiple Migration, Extraction, Subtr.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,025: Line 884:
 
shorttitle = {Technology, agency, critique},
 
shorttitle = {Technology, agency, critique},
 
url = {https://www.taylorfrancis.com/},
 
url = {https://www.taylorfrancis.com/},
abstract = {The chapter shows what the effects of those constellations are CAA critical analysis of technology emerges through the diagnosis of effects, particularly as},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-12-01},
 
urldate = {2020-12-01},
Line 1,055: Line 913:
 
url = {10.1177/1461444819852589},
 
url = {10.1177/1461444819852589},
 
doi = {10.1177/1461444819852589},
 
doi = {10.1177/1461444819852589},
abstract = {The opacity of digital technologies has posed significant challenges for critical research and digital methods. In response, controversy mapping, reverse engineering and hacking have been key methodological devices to grapple with opacity and ‘open the black box’ of digital ecosystems. We take recent developments in digital humanitarianism and the accelerated production of apps for refugees following the 2015 Mediterranean refugee crisis as a site of methodological experimentation to advance hacking as critical methodological interference. Drawing on the work of Michel Serres, we propose to understand digital technologies as ‘parasitic’ and reconceptualise hacking as ‘acts of digital parasitism’. Acts of digital parasitism are interferences that work alongside rather than work against. On one hand, this reworking of hacking advances an agenda for digital methods through reworking hacking for digital humanities and social science research. On the other, it allows us to show how the object of research – humanitarian apps – is configured through platformisation and incorporation within digital parasitic relations.},
 
 
language = {en},
 
language = {en},
 
number = {11-12},
 
number = {11-12},
Line 1,065: Line 922:
 
note = {Publisher: SAGE Publications},
 
note = {Publisher: SAGE Publications},
 
pages = {2548--2565},
 
pages = {2548--2565},
file = {Aradau et al_2019_Acts of digital parasitism.pdf:/home/ruben/Zotero/storage/4PY3N7S2/Aradau et al_2019_Acts of digital parasitism.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,082: Line 938:
 
title = {Emergent Futures CoLab},
 
title = {Emergent Futures CoLab},
 
url = {https://www.urgentemergent.org/},
 
url = {https://www.urgentemergent.org/},
abstract = {A Laboratory for Transdisciplinary Experimentation and Collaborative Future-Making},
 
 
urldate = {2020-12-07},
 
urldate = {2020-12-07},
 
   }
 
   }
Line 1,091: Line 946:
 
title = {The Full Automation Fallacy},
 
title = {The Full Automation Fallacy},
 
url = {https://futuresofwork.co.uk/2020/12/02/the-full-automation-fallacy/},
 
url = {https://futuresofwork.co.uk/2020/12/02/the-full-automation-fallacy/},
abstract = {We are at a critical moment, when digital technologies of automation, often referred to with buzzy vocabulary like “algorithms” and “AI,” are poised to transform work in a “Fourth Industrial Revolu…},
 
 
urldate = {2020-12-07},
 
urldate = {2020-12-07},
 
journal = {Futures of Work},
 
journal = {Futures of Work},
Line 1,104: Line 958:
 
shorttitle = {Erich Hörl (Hg.), Nelly Y. Pinkrah (Hg.), Lotte Warnsholdt (Hg.)},
 
shorttitle = {Erich Hörl (Hg.), Nelly Y. Pinkrah (Hg.), Lotte Warnsholdt (Hg.)},
 
url = {http://www.diaphanes.ch/titel/critique-and-the-digital-6052},
 
url = {http://www.diaphanes.ch/titel/critique-and-the-digital-6052},
abstract = {The computerization of today’s world has fundamentally transformed the sites of and for critique, and it challenges the meaning of critique as such. The subject of critique, constituted through the cultural techniques of modernity, now collides with the digital, which, as a condition of contemporary life, can be seen both as a product of modernity and as its very ending. Digitality severely alters the subject of critique and its spacio-temporal relations; it may even deprive the subject of its potentiality to be critical in the first place. The authors of this volume therefore examine the existence of critique in the digital, asking what it might be and in what settings it occurs.},
 
 
language = {de},
 
language = {de},
 
urldate = {2020-12-07},
 
urldate = {2020-12-07},
Line 1,114: Line 967:
 
title = {Digital Vision and the Ecological Aesthetic (1968 - 2018)},
 
title = {Digital Vision and the Ecological Aesthetic (1968 - 2018)},
 
url = {https://www.bloomsbury.com/us/digital-vision-and-the-ecological-aesthetic-1968-2018-9781350051836/},
 
url = {https://www.bloomsbury.com/us/digital-vision-and-the-ecological-aesthetic-1968-2018-9781350051836/},
abstract = {Digital technology has transformed the way that we visualise the natural world, the art we create and the stories we tell about our environments. Exploring contemporary digital art and literature through an ecocritical lens, Digital Vision and the Ecological Aesthetic (1968 - 2018) demonstrates the many ways in which critical ideas of the sublime, the pastoral and the picturesque have been renewed and shaped in digital media, from electronic literature to music and the visual arts. The book goes on to explore the ecological implications of these new forms of cultural representation in the digital age and in so doing makes a profound contribution to our understanding of digital art practice in the 21st century.},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-12-07},
 
urldate = {2020-12-07},
Line 1,130: Line 982:
 
shorttitle = {Sci-fi surveillance},
 
shorttitle = {Sci-fi surveillance},
 
url = {https://www.theguardian.com/world/2020/dec/10/sci-fi-surveillance-europes-secretive-push-into-biometric-technology},
 
url = {https://www.theguardian.com/world/2020/dec/10/sci-fi-surveillance-europes-secretive-push-into-biometric-technology},
abstract = {Millions in EU science funding is being used to develop new tools for policing and security. But who decides how far we need to submit to artificial intelligence?},
 
 
language = {en-GB},
 
language = {en-GB},
 
urldate = {2020-12-14},
 
urldate = {2020-12-14},
Line 1,138: Line 989:
 
year = {2020},
 
year = {2020},
 
keywords = {Surveillance, Artificial intelligence (AI), Biometrics, Defence policy, Europe, European Union, Privacy, Technology},
 
keywords = {Surveillance, Artificial intelligence (AI), Biometrics, Defence policy, Europe, European Union, Privacy, Technology},
file = {Snapshot:/home/ruben/Zotero/storage/E859A5JN/sci-fi-surveillance-europes-secretive-push-into-biometric-technology.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 1,155: Line 1,005:
 
title = {Points of Presence},
 
title = {Points of Presence},
 
url = {https://screenworks.org.uk/archive/digital-ecologies-and-the-anthropocene/points-of-presence},
 
url = {https://screenworks.org.uk/archive/digital-ecologies-and-the-anthropocene/points-of-presence},
abstract = {Author: Adam Fish Format: Experimental Documentary Duration: 18’ 46” Published: June 2018 https://doi.org/10.37186/swrks/8.2/6 Research Statement Criteria Assess the work as a video that creatively and interpretively maps the internet of the North Atlantic region. Research Questions Media studies scholars who favor empirical fieldwork methodologies encourage users of communication technologies to improve their “infrastuctural literacy” […]},
 
 
language = {en-GB},
 
language = {en-GB},
 
urldate = {2021-01-03},
 
urldate = {2021-01-03},
Line 1,171: Line 1,020:
 
url = {http://journals.sagepub.com/doi/10.1177/0263276419847508},
 
url = {http://journals.sagepub.com/doi/10.1177/0263276419847508},
 
doi = {10.1177/0263276419847508},
 
doi = {10.1177/0263276419847508},
abstract = {How can one ‘see’ the operationalization of contemporary visual culture, given the imperceptibility and apparent automation of so many processes and dimensions of visuality? Seeing – as a position from a singular mode of observation – has become problematic since many visual elements, techniques, and forms of observing are highly distributed through data practices of collection, analysis and prediction. Such practices are subtended by visual cultural techniques that are grounded in the development of image collections, image formatting and hardware design. In this article, we analyze recent transformations in forms of prediction and data analytics associated with spectacular performances of computation. We analyze how transformations in the collection and accumulation of images as ensembles by platforms have a qualitative and material effect on the emergent sociotechnicality of platform ‘life’ and ‘perception’. Reconstructing the visual transformations that allow artificial intelligence assemblages to operate allows some sense of their heteronomous materiality and contingency.},
 
 
language = {en},
 
language = {en},
 
number = {5},
 
number = {5},
Line 1,180: Line 1,028:
 
year = {2019},
 
year = {2019},
 
pages = {3--22},
 
pages = {3--22},
file = {Full Text:/home/ruben/Zotero/storage/JZ5MNPA9/MacKenzie and Munster - 2019 - Platform Seeing Image Ensembles and Their Invisua.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,192: Line 1,039:
 
url = {http://journals.sagepub.com/doi/10.1177/0263276419847508},
 
url = {http://journals.sagepub.com/doi/10.1177/0263276419847508},
 
doi = {10.1177/0263276419847508},
 
doi = {10.1177/0263276419847508},
abstract = {How can one ‘see’ the operationalization of contemporary visual culture, given the imperceptibility and apparent automation of so many processes and dimensions of visuality? Seeing – as a position from a singular mode of observation – has become problematic since many visual elements, techniques, and forms of observing are highly distributed through data practices of collection, analysis and prediction. Such practices are subtended by visual cultural techniques that are grounded in the development of image collections, image formatting and hardware design. In this article, we analyze recent transformations in forms of prediction and data analytics associated with spectacular performances of computation. We analyze how transformations in the collection and accumulation of images as ensembles by platforms have a qualitative and material effect on the emergent sociotechnicality of platform ‘life’ and ‘perception’. Reconstructing the visual transformations that allow artificial intelligence assemblages to operate allows some sense of their heteronomous materiality and contingency.},
 
 
language = {en},
 
language = {en},
 
number = {5},
 
number = {5},
Line 1,201: Line 1,047:
 
year = {2019},
 
year = {2019},
 
pages = {3--22},
 
pages = {3--22},
file = {MacKenzie and Munster - 2019 - Platform Seeing Image Ensembles and Their Invisua.pdf:/home/ruben/Zotero/storage/8GL4V8CR/MacKenzie and Munster - 2019 - Platform Seeing Image Ensembles and Their Invisua.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,216: Line 1,061:
 
year = {2010},
 
year = {2010},
 
note = {OCLC: 731595843},
 
note = {OCLC: 731595843},
file = {Table of Contents PDF:/home/ruben/Zotero/storage/WMH6HEVG/Daston and Galison - 2010 - Objectivity.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,230: Line 1,074:
 
year = {2016},
 
year = {2016},
 
note = {OCLC: 938363011},
 
note = {OCLC: 938363011},
file = {Turner - 2016 - In the eye's mind..pdf:/home/ruben/Zotero/storage/JWMRF8BR/Turner - 2016 - In the eye's mind..pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,242: Line 1,085:
 
url = {https://doi.org/10.1177/0306312712444645},
 
url = {https://doi.org/10.1177/0306312712444645},
 
doi = {10.1177/0306312712444645},
 
doi = {10.1177/0306312712444645},
abstract = {Based on more than 2 years of ethnographic immersion with the Mars Exploration Rover mission, this paper examines the representational work and associated embodied practices through which the science and engineering team makes decisions about how and where to move their robots. Building on prior work in Science and Technology Studies on the importance of embodiment to visualization, the paper posits that such practices also contribute to the production and maintenance of social order within the organizational context of the laboratory. It thus places visualization technologies and techniques in the context of the social organization of scientific work, contributing to our understanding of representation in scientific practice.},
 
 
language = {en},
 
language = {en},
 
number = {3},
 
number = {3},
Line 1,252: Line 1,094:
 
keywords = {embodiment, human–robot interaction, planetary science, representation, social organization},
 
keywords = {embodiment, human–robot interaction, planetary science, representation, social organization},
 
pages = {393--414},
 
pages = {393--414},
file = {Vertesi - 2012 - Seeing like a Rover Visualization, embodiment, an.pdf:/home/ruben/Zotero/storage/UMY7NT3J/Vertesi - 2012 - Seeing like a Rover Visualization, embodiment, an.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,263: Line 1,104:
 
url = {https://doi.org/10.1177/0162243919858717},
 
url = {https://doi.org/10.1177/0162243919858717},
 
doi = {10.1177/0162243919858717},
 
doi = {10.1177/0162243919858717},
abstract = {This paper is an ethnographic examination of the early social life of a project to map Costa Rica’s aquifers using LandSat imagery and a specialized algorithm. The project aims to make subterranean formations accessible for public agencies mediating recent environmental conflicts over underground water, which have been diagnosed as the country’s first “water war.” I analyze the presentation to the public of this project and the technology it uses to show how vision and touch are conceptual resources that people use to describe the technicalities of satellite imagery. Attending to the semiotic and technical power of vision and touch requires a nonessentialist understanding of the senses. It requires moving away from a narrow understanding of sensing as embodied, phenomenological practice. Focusing on the role of texture as that which operates in the interstices of vision and touch, I propose going beyond panoptic imaginaries in order to grasp the diverse social lives that technologies such as satellite imaging have.},
 
 
language = {en},
 
language = {en},
 
number = {5},
 
number = {5},
Line 1,273: Line 1,113:
 
keywords = {remote sensing, subterranean, touch, underground, verticality, water},
 
keywords = {remote sensing, subterranean, touch, underground, verticality, water},
 
pages = {762--785},
 
pages = {762--785},
file = {Ballestero - 2019 - Touching with Light, or, How Texture Recasts the S.pdf:/home/ruben/Zotero/storage/I4TSIV7Y/Ballestero - 2019 - Touching with Light, or, How Texture Recasts the S.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,285: Line 1,124:
 
url = {https://doi.org/10.1177/0162243917715106},
 
url = {https://doi.org/10.1177/0162243917715106},
 
doi = {10.1177/0162243917715106},
 
doi = {10.1177/0162243917715106},
abstract = {This essay is about the role of visual surveillance technologies in the policing of the external borders of the European Union (EU). Based on an analysis of documents published by EU institutions and independent organizations, I argue that these technological innovations fundamentally alter the nature of national borders. I discuss how new technologies of vision are deployed to transcend the physical limits of territories. In the last twenty years, EU member states and institutions have increasingly relied on various forms of remote tracking, including the use of drones for the purposes of monitoring frontier zones. In combination with other facets of the EU border management regime (such as transnational databases and biometrics), these technologies coalesce into a system of governance that has enabled intervention into neighboring territories and territorial waters of other states to track and target migrants for interception in the “prefrontier.” For jurisdictional reasons, this practice effectively precludes the enforcement of legal human rights obligations, which European states might otherwise have with regard to these persons. This article argues that this technologically mediated expansion of vision has become a key feature of post–cold war governance of borders in Europe. The concept of transterritory is proposed to capture its effects.},
 
 
language = {en},
 
language = {en},
 
number = {6},
 
number = {6},
Line 1,295: Line 1,133:
 
keywords = {European Union, borders, drones, Eurosur, surveillance},
 
keywords = {European Union, borders, drones, Eurosur, surveillance},
 
pages = {1003--1030},
 
pages = {1003--1030},
file = {Follis - 2017 - Vision and Transterritory The Borders of Europe.pdf:/home/ruben/Zotero/storage/7KQIB9DH/Follis - 2017 - Vision and Transterritory The Borders of Europe.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,307: Line 1,144:
 
url = {https://doi.org/10.1177/0162243911409248},
 
url = {https://doi.org/10.1177/0162243911409248},
 
doi = {10.1177/0162243911409248},
 
doi = {10.1177/0162243911409248},
abstract = {In science studies the laboratory has been positioned as a privileged place for understanding scientific practice. Laboratory studies foregrounded local spaces of knowledge production in the natural sciences, and in doing so made the laboratory key to social science epistemologies. This article explores how laboratory studies and observational methods have been tied up together in the science and technology studies (STS) project of making scientific practice visible. The author contrasts powerful rhetorics of witnessing and revelation in some significant STS texts with the negotiated and partial ways in which observing science work is done in social science practice. Drawing on empirical material generated with bioscientists and social scientists, the article explores how researchers may resist the observational gaze and mark aspects of knowledge work as private and solitary. The author concludes by arguing that epistemologies of vision point to some unsettling parallels between the study of knowledge-making in STS and audit regimes in contemporary research, and considers how both might devalue invisible work. This analysis suggests that there is a need to reconsider the significance of thinking in the ensemble of knowledge production practices for methodological, epistemological, and strategic reasons.},
 
 
language = {en},
 
language = {en},
 
number = {2},
 
number = {2},
Line 1,317: Line 1,153:
 
keywords = {epistemology, methodologies, methods, space/place/scale dynamics},
 
keywords = {epistemology, methodologies, methods, space/place/scale dynamics},
 
pages = {264--285},
 
pages = {264--285},
file = {Garforth - 2012 - InVisibilities of Research Seeing and Knowing in.pdf:/home/ruben/Zotero/storage/HDRMS5QQ/Garforth - 2012 - InVisibilities of Research Seeing and Knowing in.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,328: Line 1,163:
 
url = {https://doi.org/10.1177/0306312713511868},
 
url = {https://doi.org/10.1177/0306312713511868},
 
doi = {10.1177/0306312713511868},
 
doi = {10.1177/0306312713511868},
abstract = {This article explores the resonating figures of primate, child, and robot in contemporary technoscientific corporealizations of the ‘almost human’. We take as our model (in)organism ‘Lucy the Robot Orangutan’, roboticist Steve Grand’s project to create an artificial life form with a mind of its own. One aspect of Lucy’s figuration by Grand, we argue, which ties her to Haraway’s analysis of the primate, is of the robot as a model for animal, and more specifically (or aspirationally) human, cognition. We follow the trope of ‘model organism’ as it is under discussion within science and technology studies and as an ironic descriptor for our own interest in Lucy as an entity/project through which to illuminate figurations within robotics more widely. Primate and robot together are forms of natureculture that help to clarify how the categories of animal and machine are entangled, while making explicit investments in their differences from one another, and from the third category of the human. We conclude, again following Haraway, by imagining what other possibilities there might be for figuring humans, robots, and their relations if we escape the reiterative imaginary of the robot as proxy for becoming human.},
 
 
language = {en},
 
language = {en},
 
number = {3},
 
number = {3},
Line 1,338: Line 1,172:
 
keywords = {figuration, model organism, primatology, robotics},
 
keywords = {figuration, model organism, primatology, robotics},
 
pages = {315--341},
 
pages = {315--341},
file = {Castañeda and Suchman - 2014 - Robot visions.pdf:/home/ruben/Zotero/storage/46BPMVSG/Castañeda and Suchman - 2014 - Robot visions.pdf:application/pdf;Castañeda and Suchman - 2014 - Robot visions.pdf:/home/ruben/Zotero/storage/BLCW9YPZ/Castañeda and Suchman - 2014 - Robot visions.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,350: Line 1,183:
 
url = {https://doi.org/10.1177/030631299029005003},
 
url = {https://doi.org/10.1177/030631299029005003},
 
doi = {10.1177/030631299029005003},
 
doi = {10.1177/030631299029005003},
abstract = {In this paper, we describe and theorize the topology of `vision' in field ecology, a domain considerably different from laboratory work in the physical sciences, and discuss the temporal extension of data-collection practices. Data collection in this field is characterized by widely varying measurements, measurement dimensions and temporal extension of data collection. We present the ecologists' field laboratory as a perceptual machinery with a heterogeneous and heteromaterial topology as it pertains to measures, precision, replication and other material practices. Because of the complexity of ecological fieldwork, considerable co-ordination and articulation work is necessary. Here, tables, tags and labels are central tools to achieve coherence of inscriptions. We topicalize the work that digitizes measurements conducted on lizards and their habitats, and that therefore imposes signs that lend themselves to mathematical and statistical processes. It is only through these digitizing processes that lizards become visible to other (interested) ecologists, most of whom have not seen this particular animal species in person. We thereby contribute in new ways to discussions of the topography and topology of scientific vision, to the relation of measurement to practice, and to the `adequation' of nature and mathematics.},
 
 
language = {en},
 
language = {en},
 
number = {5},
 
number = {5},
Line 1,359: Line 1,191:
 
year = {1999},
 
year = {1999},
 
pages = {719--764},
 
pages = {719--764},
file = {Roth and Bowen - 1999 - Digitizing Lizards The Topology of `Vision' in Ec.pdf:/home/ruben/Zotero/storage/YSIP8YFV/Roth and Bowen - 1999 - Digitizing Lizards The Topology of `Vision' in Ec.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,371: Line 1,202:
 
url = {https://doi.org/10.1177/0306312710389226},
 
url = {https://doi.org/10.1177/0306312710389226},
 
doi = {10.1177/0306312710389226},
 
doi = {10.1177/0306312710389226},
abstract = {Based on three ethnographic vignettes describing the engagements of a small start-up company with prospective competitors, partners and customers, this paper shows how commercial considerations are folded into the ways visual images become ‘seeable’. When company members mount demonstrations of prototype mammography software, they seek to generate interest but also to protect their intellectual property. Pivotal to these efforts to manage revelation and concealment is the visual interface, which is variously performed as obstacle and ally in the development of a profitable product. Using the concept of ‘face value’, the paper seeks to develop further insight into contemporary dynamics of seeing and showing by tracing the way techno-visual presentations and commercial considerations become entangled in practice. It also draws attention to the salience and significance of enactments of surface and depth in image-based practices.},
 
 
language = {en},
 
language = {en},
 
number = {2},
 
number = {2},
Line 1,381: Line 1,211:
 
keywords = {commercial relations, ethnography, face value, imaging, software demonstrations},
 
keywords = {commercial relations, ethnography, face value, imaging, software demonstrations},
 
pages = {155--176},
 
pages = {155--176},
file = {Coopmans - 2011 - ‘Face value’ New medical imaging software in comm.pdf:/home/ruben/Zotero/storage/UAKCA48J/Coopmans - 2011 - ‘Face value’ New medical imaging software in comm.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,390: Line 1,219:
 
shorttitle = {Thinking Through Making},
 
shorttitle = {Thinking Through Making},
 
url = {https://www.academia.edu/18763487/Thinking_Through_Making_Unmaking_and_Remaking_the_Everyday},
 
url = {https://www.academia.edu/18763487/Thinking_Through_Making_Unmaking_and_Remaking_the_Everyday},
abstract = {Unmaking making: This paper frames two overt suggestions in relation to design and design studies. Firstly, that design itself is the proper area of inquiry for thinking about what can be done with (or without) ideas like creativity and innovation as},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-12-19},
 
urldate = {2020-12-19},
 
author = {Forster, Andrew},
 
author = {Forster, Andrew},
file = {Thinking_Through_Making_Unmaking_and_Rem.pdf:/home/ruben/Zotero/storage/3993YRRM/Thinking_Through_Making_Unmaking_and_Rem.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,412: Line 1,239:
 
author = {Mertia, Sandeep},
 
author = {Mertia, Sandeep},
 
year = {2020},
 
year = {2020},
file = {Mertia - 2020 - Lives of Data Essays on Computational Cultures fr.pdf:/home/ruben/Zotero/storage/3WAARFS6/Mertia - 2020 - Lives of Data Essays on Computational Cultures fr.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,421: Line 1,247:
 
url = {https://blogs.unsw.edu.au/tiic/files/2020/11/Dark-Eden-Program-1.pdf},
 
url = {https://blogs.unsw.edu.au/tiic/files/2020/11/Dark-Eden-Program-1.pdf},
 
urldate = {2020-11-07},
 
urldate = {2020-11-07},
file = {Dark-Eden-Program-1.pdf:/home/ruben/Zotero/storage/AHDS6EXK/Dark-Eden-Program-1.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,430: Line 1,255:
 
shorttitle = {Event},
 
shorttitle = {Event},
 
url = {https://www.universiteitleiden.nl/en/sails/research/webinar-dec-2020-art-society-and-technology},
 
url = {https://www.universiteitleiden.nl/en/sails/research/webinar-dec-2020-art-society-and-technology},
abstract = {Where SAILS meets Art, Society and Technology exciting things happen.
 
Please note: The event location has changed and will now stream from the Leiden University Media Technology channel at You Tube, see link below.},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-12-16},
 
urldate = {2020-12-16},
Line 1,442: Line 1,265:
 
url = {https://networkcultures.org/blog/publication/tod37-from-opinions-to-images-essays-towards-a-sociology-of-affects/},
 
url = {https://networkcultures.org/blog/publication/tod37-from-opinions-to-images-essays-towards-a-sociology-of-affects/},
 
urldate = {2021-01-06},
 
urldate = {2021-01-06},
file = {Institute of Network Cultures | From Opinions to Images\: Essays Towards a Sociology of Affects:/home/ruben/Zotero/storage/2TKBM7J4/tod37-from-opinions-to-images-essays-towards-a-sociology-of-affects.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 1,454: Line 1,276:
 
url = {https://doi.org/10.1177/2053951719858742},
 
url = {https://doi.org/10.1177/2053951719858742},
 
doi = {10.1177/2053951719858742},
 
doi = {10.1177/2053951719858742},
abstract = {This contribution aims at proposing a framework for articulating different kinds of “normativities” that are and can be attributed to “algorithmic systems.” The technical normativity manifests itself through the lineage of technical objects. The norm expresses a technical scheme’s becoming as it mutates through, but also resists, inventions. The genealogy of neural networks shall provide a powerful illustration of this dynamic by engaging with their concrete functioning as well as their unsuspected potentialities. The socio-technical normativity accounts for the manners in which engineers, as actors folded into socio-technical networks, willingly or unwittingly, infuse technical objects with values materialized in the system. Surveillance systems’ design will serve here to instantiate the ongoing mediation through which algorithmic systems are endowed with specific capacities. The behavioral normativity is the normative activity, in which both organic and mechanical behaviors are actively participating, undoing the identification of machines with “norm following,” and organisms with “norminstitution”. This proposition productively accounts for the singularity of machine learning algorithms, explored here through the case of recommender systems. The paper will provide substantial discussions of the notions of “normative” by cutting across history and philosophy of science, legal, and critical theory, as well as “algorithmics,” and by confronting our studies led in engineering laboratories with critical algorithm studies.},
 
 
language = {en},
 
language = {en},
 
number = {2},
 
number = {2},
Line 1,465: Line 1,286:
 
keywords = {behavioral normativity, Gilbert Simondon, Machine learning, neural networks, socio-technical normativity, technical normativity},
 
keywords = {behavioral normativity, Gilbert Simondon, Machine learning, neural networks, socio-technical normativity, technical normativity},
 
pages = {2053951719858742},
 
pages = {2053951719858742},
file = {Grosman_Reigeluth_2019_Perspectives on algorithmic normativities.pdf:/home/ruben/Zotero/storage/R3RV4E95/Grosman_Reigeluth_2019_Perspectives on algorithmic normativities.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,477: Line 1,297:
 
url = {https://doi.org/10.1080/13645579.2015.1129143},
 
url = {https://doi.org/10.1080/13645579.2015.1129143},
 
doi = {10.1080/13645579.2015.1129143},
 
doi = {10.1080/13645579.2015.1129143},
abstract = {In this paper we examine methodological innovation in the social sciences through a focus on researching the body in digital environments. There are two strands to our argument as to why this is a useful site to explore methodological innovation in the social sciences. First, researching the body in digital environments places new methodological demands on social science. Second, as an area of interest at the intersection of the social sciences and the arts, it provides a focus for exploring how social science innovation can be informed by engagement with the arts, in this instance how the arts work with the body in digital environments and take up social science ideas in novel ways. We argue that social science engagement with the arts and the relatively unmapped terrain of the body in digital environments has the potential to open up spaces for innovative social science questions and methods: spaces, questions and methods that have potential for more general social science methodological innovation. We draw on the findings of the Methodological Innovation in Digital Arts and Social Sciences (MIDAS) project a multi-site ethnography of the research ecologies of the social sciences and the arts related to the body in digital environments. We propose a continuum of methodological innovation that attends to how methods are moved across research contexts and disciplines, in this instance the social sciences and the digital arts. We illustrate and discuss the innovative potential of expanding and re-situating methods across the social sciences and the arts, the transfer of methods and concepts across disciplinary borders and the interdisciplinary generation of new methods. We discuss the catalysts and challenges for social science methodological innovation in relation to the digital and the arts, with attention to how the social sciences might engage with the arts towards innovative research.},
 
 
number = {1},
 
number = {1},
 
urldate = {2021-01-13},
 
urldate = {2021-01-13},
Line 1,488: Line 1,307:
 
keywords = {arts methods, body, digital technologies, Methodological innovation, social science methods},
 
keywords = {arts methods, body, digital technologies, Methodological innovation, social science methods},
 
pages = {105--120},
 
pages = {105--120},
file = {Jewitt et al_2017_Exploring methodological innovation in the social sciences.pdf:/home/ruben/Zotero/storage/ZCV67AJF/Jewitt et al_2017_Exploring methodological innovation in the social sciences.pdf:application/pdf;Snapshot:/home/ruben/Zotero/storage/GTFSBRRG/13645579.2015.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 1,499: Line 1,317:
 
copyright = {All rights reserved},
 
copyright = {All rights reserved},
 
url = {http://othes.univie.ac.at/35033/},
 
url = {http://othes.univie.ac.at/35033/},
abstract = {Alle Versuche, Maschinen und Computern die Fähigkeit des Sehen beizubringen, sind Versuche, digitale Bilder herzustellen, zu bearbeiten und vor allem ihre Inhalte zu verstehen. Zu diesem Zweck ist es zwingend notwendig, Bildverarbeitungsalgorithmen zu entwickeln und anzuwenden. Bildverarbeitungsalgorithmen werden zu einflussreichen politischen und gesellschaftlichen Akteuren und Entscheidungsträgern. Deshalb ist es wichtig, ein tiefgehendes Verständnis davon zu erreichen, wie genau diese Algorithmen Bilder erzeugen, bearbeiten und vor allem semantisch interpretieren.
 
“Computers and the Ability to See” basiert auf einem interdisziplinärem Zugang, welcher die akademischen Felder der Wissenschafts- und Technikforschung (STS), der visuellen Kulturstudien und der Überwachungs- und Identifizierungsstudien verbindet. Es ist insbesondere inspiriert von Lucy Suchmans Arbeit zu ‘Human-Machine Reconfigurations’ (Suchman 2007) und dem visuellen STS Zugang der ‘Social Studies of Scientific Imaging and Visualization’ (Burri \& Dumit 2008). Die Dissertation schreibt sich somit in die theoretischen Rahmen des (feministischen) Posthumanismus und der materiellen Semiotik ein. Damit verbunden ist die Entscheidung, die konkreten Praktiken von nichtmenschlichen Entitäten und ihren spezifischen Handlungsfähigkeiten empirisch zu untersuchen (vgl. (Suchman 2007: 1).
 
Die empirische Analyse von Bildverarbeitungsalgorithmen bettet sich ein in die grundlegenden soziotechnischen Transformationsprozesse, die mit den Begriffen Überwachungsgesellschaft (hier insbesondere das Phänomen der “intelligenten” Videoüberwachung), Digitalisierung, Automatisierung und “Smartisierung” von gesellschaftlichen Praktiken, Artefakten und Geräten zusammengefasst werden können. Auf dieser Grundlage erforschte die Dissertation Mensch-Computer (Re-)Konfigurationen, indem sie die Ausverhandlung und Entwicklung mit Fokus auf die politische und gesellschaftliche Signifikanz von Bildverarbeitungsalgorithmen in unterschiedlichen Situationen und Umgebungen von den Laboren der Bildverarbeitung bis hin zu den Medien in den Blick nahm. Die Forschung folgte unter Einbeziehung eines breiten Methodenspektrums der qualitativen Sozialforschung (Teilnehmende Beobachtung, Gruppendiskussionen, Interviews, Dokumentenanalyse) einer ‘visiographischen’ Strategie und entwickelt darauf aufbauend in den Schlussfolgerungen den konzeptuellen Reflektionsrahmen der “Social Studies of Image Processing Algorithms” (SIPA). Dadurch leistet die Arbeit einen wichtigen Beitrag zu der Frage, wie Gesellschaft und Wissenschaft mit Bildverarbeitungsalgorithmen in ihrer Funktion als ‘politische Ordnungsapparate’ in einem verantwortlichen Weg der Innovation umgehen können. Dabei ermutigt SIPA explizit die Zusammenarbeit von Sozial- und ComputerwissenschaftlerInnen sowie die Einbeziehung weiterer gesellschaftlicher Akteure wie zum Beispiel KünstlerInnen. SIPA beinhaltet also auch Fragen und Ebenen, die sich mit der Steuerung, Regulierung und mit ethischen, rechtlichen und gesellschaftlichen Aspekten von Bildverarbeitungsalgorithmen auseinandersetzen.},
 
 
urldate = {2021-01-13},
 
urldate = {2021-01-13},
 
school = {uniwien},
 
school = {uniwien},
 
author = {Musik, Christoph},
 
author = {Musik, Christoph},
 
year = {2014},
 
year = {2014},
file = {Musik_2014_Computers and the ability to see.pdf:/home/ruben/Zotero/storage/TBEWBGYU/Musik_2014_Computers and the ability to see.pdf:application/pdf;Snapshot:/home/ruben/Zotero/storage/EDDWVKIB/35033.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 1,516: Line 1,330:
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-01-13},
 
urldate = {2021-01-13},
file = {Snapshot:/home/ruben/Zotero/storage/DFCN8HI4/how-a-machine-learns-and-fails-a-grammar-of-error-for-artificial-intelligence.html:text/html;How a Machine Learns and Fails – A Grammar of Error for Artificial Intelligence.pdf:/home/ruben/Zotero/storage/LD4D5ENZ/How a Machine Learns and Fails – A Grammar of Error for Artificial Intelligence.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,525: Line 1,338:
 
shorttitle = {Explainable Deep Learning},
 
shorttitle = {Explainable Deep Learning},
 
url = {http://arxiv.org/abs/2004.14545},
 
url = {http://arxiv.org/abs/2004.14545},
abstract = {The deep neural network (DNN) is an indispensable machine learning tool for achieving human-level performance on many learning tasks. Yet, due to its black-box nature, it is inherently difficult to understand which aspects of the input data drive the decisions of the network. There are various real-world scenarios in which humans need to make actionable decisions based on the output of a decision support system that makes use of DNNs. These decision support systems can be found in critical domains, such as legislation, law enforcement, and healthcare. It is important that the humans making high-level decisions can be sure that the DNN decisions are driven by combinations of data features that are appropriate in the context of the deployment of the decision support system and that the decisions made are legally or ethically defensible. Due to the incredible pace at which DNN technology is being developed and adopted, the development of new methods and studies on explaining the decision-making process of DNNs has blossomed into an active research field. A practitioner beginning to study explainable deep learning may be intimidated by the plethora of orthogonal directions the field is taking. This complexity is further exacerbated by the general confusion that exists in defining what it means to be able to explain the actions of a deep learning system and to evaluate a system’s “ability to explain”. To alleviate this problem, this article offers a “field guide” to deep learning explainability for those uninitiated in the field. The field guide: i) Discusses the traits of a deep learning system that researchers enhance in explainability research, ii) places explainability in the context of other related deep learning research areas, and iii) introduces three simple dimensions defining the space of foundational methods that contribute to explainable deep learning. The guide is designed as an easy-to-digest starting point for those just embarking in the field.},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-01-13},
 
urldate = {2021-01-13},
Line 1,534: Line 1,346:
 
note = {arXiv: 2004.14545},
 
note = {arXiv: 2004.14545},
 
keywords = {Computer Science - Artificial Intelligence, Computer Science - Machine Learning, Statistics - Machine Learning},
 
keywords = {Computer Science - Artificial Intelligence, Computer Science - Machine Learning, Statistics - Machine Learning},
file = {Xie et al. - 2020 - Explainable Deep Learning A Field Guide for the U.pdf:/home/ruben/Zotero/storage/PNW9B5W3/Xie et al. - 2020 - Explainable Deep Learning A Field Guide for the U.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,544: Line 1,355:
 
url = {http://arxiv.org/abs/2009.01215},
 
url = {http://arxiv.org/abs/2009.01215},
 
doi = {10.5281/zenodo.4037538},
 
doi = {10.5281/zenodo.4037538},
abstract = {Two art exhibitions, "Training Humans" and "Making Faces," and the accompanying essay "Excavating AI: The politics of images in machine learning training sets" by Kate Crawford and Trevor Paglen, are making substantial impact on discourse taking place in the social and mass media networks, and some scholarly circles. Critical scrutiny reveals, however, a self-contradictory stance regarding informed consent for the use of facial images, as well as serious flaws in their critique of ML training sets. Our analysis underlines the non-negotiability of informed consent when using human data in artistic and other contexts, and clarifies issues relating to the description of ML training sets.},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-01-13},
 
urldate = {2021-01-13},
Line 1,553: Line 1,363:
 
note = {arXiv: 2009.01215},
 
note = {arXiv: 2009.01215},
 
keywords = {Computer Science - Computers and Society, Computer Science - Computer Vision and Pattern Recognition, Computer Science - Artificial Intelligence, Computer Science - Machine Learning, 68T01, Computer Science - Human-Computer Interaction, K.4.0},
 
keywords = {Computer Science - Computers and Society, Computer Science - Computer Vision and Pattern Recognition, Computer Science - Artificial Intelligence, Computer Science - Machine Learning, 68T01, Computer Science - Human-Computer Interaction, K.4.0},
file = {Lyons - 2020 - Excavating Excavating AI The Elephant in the Ga.pdf:/home/ruben/Zotero/storage/Z7S5JZ6S/Lyons - 2020 - Excavating Excavating AI The Elephant in the Ga.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,564: Line 1,373:
 
url = {https://ieeexplore.ieee.org/document/8578776/},
 
url = {https://ieeexplore.ieee.org/document/8578776/},
 
doi = {10.1109/CVPR.2018.00678},
 
doi = {10.1109/CVPR.2018.00678},
abstract = {Surveillance videos are able to capture a variety of realistic anomalies. In this paper, we propose to learn anomalies by exploiting both normal and anomalous videos. To avoid annotating the anomalous segments or clips in training videos, which is very time consuming, we propose to learn anomaly through the deep multiple instance ranking framework by leveraging weakly labeled training videos, i.e. the training labels (anomalous or normal) are at videolevel instead of clip-level. In our approach, we consider normal and anomalous videos as bags and video segments as instances in multiple instance learning (MIL), and automatically learn a deep anomaly ranking model that predicts high anomaly scores for anomalous video segments. Furthermore, we introduce sparsity and temporal smoothness constraints in the ranking loss function to better localize anomaly during training.},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-01-13},
 
urldate = {2021-01-13},
Line 1,573: Line 1,381:
 
year = {2018},
 
year = {2018},
 
pages = {6479--6488},
 
pages = {6479--6488},
file = {Sultani et al. - 2018 - Real-World Anomaly Detection in Surveillance Video.pdf:/home/ruben/Zotero/storage/WQNJMF28/Sultani et al. - 2018 - Real-World Anomaly Detection in Surveillance Video.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,583: Line 1,390:
 
issn = {0751-7971},
 
issn = {0751-7971},
 
url = {https://www.cairn-int.info/article-E_RES_177_0163--algorithmic-governmentality-and-prospect.htm},
 
url = {https://www.cairn-int.info/article-E_RES_177_0163--algorithmic-governmentality-and-prospect.htm},
abstract = {Algorithmic governmentality is characterized primarily by the following dual movement: a) abandoning all forms of 'scale', 'benchmark', or hierarchy, in favour of an immanent normativity evolving in real time, from which a 'dual statistics' of the world emerges and which seems to do away with the old hierarchies devised by normal or average people; and b) avoiding all confrontation with individuals, whose opportunities for subjectification have become increasingly scarce. This dual movement seems to be the fruit of contemporary statistics' focus on relations. We seek to assess the extent to which these two aspects of the 'algorithmic governmentality' thereby outlined, with its sole reliance on relations, could facilitate, first, processes of individuation through relations (Simondon) and, second, the emergence of new forms of life through the plane of immanence overtaking the plane of organization (Deleuze-Guattari). Through this comparison with the main contemporary philosophies of relations, it thus appears that thinking about the evolution and processes of individuation through relations necessarily pertains to the 'disparate' - a heterogeneity of orders of magnitude, a multiplicity of regimes of existence - which algorithmic governmentality precisely incessantly suppresses by enclosing (digitized) reality on itself. Algorithmic governmentality tends rather to foreclose such emancipation perspectives by centring individuation processes on the subjective monad.},
 
 
language = {en},
 
language = {en},
 
number = {1},
 
number = {1},
Line 1,593: Line 1,399:
 
note = {Publisher: La Découverte},
 
note = {Publisher: La Découverte},
 
pages = {163--196},
 
pages = {163--196},
file = {Rouvroy et al_2013_Algorithmic governmentality and prospects of emancipation.pdf:/home/ruben/Zotero/storage/E6WVV9Y9/Rouvroy et al_2013_Algorithmic governmentality and prospects of emancipation.pdf:application/pdf;Snapshot:/home/ruben/Zotero/storage/G38ZPM8I/article-E_RES_177_0163--algorithmic-governmentality-and-prospect.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 1,609: Line 1,414:
 
year = {2017},
 
year = {2017},
 
doi = {10.7551/mitpress/10302.001.0001},
 
doi = {10.7551/mitpress/10302.001.0001},
file = {Mackenzie - 2017 - Machine Learners Archaeology of a Data Practice.pdf:/home/ruben/Zotero/storage/VKABMIRC/Mackenzie - 2017 - Machine Learners Archaeology of a Data Practice.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,617: Line 1,421:
 
title = {Improvising Theory},
 
title = {Improvising Theory},
 
url = {https://press.uchicago.edu/ucp/books/book/chicago/I/bo5417893.html},
 
url = {https://press.uchicago.edu/ucp/books/book/chicago/I/bo5417893.html},
abstract = {Scholars have long recognized that ethnographic method is bound up with the construction of theory in ways that are difficult to teach. The reason, Allaine Cerwonka and Liisa H. Malkki argue, is that ethnographic theorization is essentially improvisatory in nature, conducted in real time and in necessarily unpredictable social situations. In a unique account of, and critical reflection on, the process of theoretical improvisation in ethnographic research, they demonstrate how both objects of analysis, and our ways of knowing and explaining them, are created and discovered in the give and take of real life, in all its unpredictability and immediacy.Improvising Theory centers on the year-long correspondence between Cerwonka, then a graduate student in political science conducting research in Australia, and her anthropologist mentor, Malkki. Through regular e-mail exchanges, Malkki attempted to teach Cerwonka, then new to the discipline, the basic tools and subtle intuition needed for anthropological fieldwork. The result is a strikingly original dissection of the processual ethics and politics of method in ethnography.},
 
 
urldate = {2021-01-14},
 
urldate = {2021-01-14},
file = {Snapshot:/home/ruben/Zotero/storage/2SISML8K/bo5417893.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 1,627: Line 1,429:
 
title = {War On Terror Birthed Pentagon's Automated Biometrics Identification System},
 
title = {War On Terror Birthed Pentagon's Automated Biometrics Identification System},
 
url = {https://www.npr.org/2021/01/14/956705029/war-on-terror-birthed-pentagons-automated-biometrics-identification-system},
 
url = {https://www.npr.org/2021/01/14/956705029/war-on-terror-birthed-pentagons-automated-biometrics-identification-system},
abstract = {NPR's Steve Inskeep talks to investigative reporter Annie Jacobsen, author of the new book, First Platoon, about how the U.S. has employed the use of biometric data during warfare.},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-01-14},
 
urldate = {2021-01-14},
Line 1,645: Line 1,446:
 
note = {OCLC: 1113484407},
 
note = {OCLC: 1113484407},
 
pages = {173--220},
 
pages = {173--220},
file = {NeuronsSpikeBack.pdf:/home/ruben/Zotero/storage/6XR3TG2A/NeuronsSpikeBack.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,666: Line 1,466:
 
title = {Facial recognition reveals political party in troubling new research},
 
title = {Facial recognition reveals political party in troubling new research},
 
url = {https://social.techcrunch.com/2021/01/13/facial-recognition-reveals-political-party-in-troubling-new-research/},
 
url = {https://social.techcrunch.com/2021/01/13/facial-recognition-reveals-political-party-in-troubling-new-research/},
abstract = {Researchers have created a machine learning system that they claim can determine a person’s political party, with reasonable accuracy, based only on their face. The study, from a group that also showed that sexual preference can seemingly be inferred this way, candidly addresses and carefully…},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-01-16},
 
urldate = {2021-01-16},
Line 1,690: Line 1,489:
 
note = {Publisher: SAGE Publications},
 
note = {Publisher: SAGE Publications},
 
pages = {431--434},
 
pages = {431--434},
file = {de Freitas et al 2016 - Alternative Ontologies of Number.pdf:/home/ruben/Zotero/storage/DRFHMMAP/de Freitas et al 2016 - Alternative Ontologies of Number.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,699: Line 1,497:
 
title = {Inheriting Possibility},
 
title = {Inheriting Possibility},
 
url = {https://www.upress.umn.edu/book-division/books/inheriting-possibility},
 
url = {https://www.upress.umn.edu/book-division/books/inheriting-possibility},
abstract = {Outstanding Book Award from the American Educational Research Association: From the SAT to social mobility statistics, examining quantitative measurements of human learning and development while rethinking their possibilities},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-01-20},
 
urldate = {2021-01-20},
 
journal = {University of Minnesota Press},
 
journal = {University of Minnesota Press},
file = {Snapshot:/home/ruben/Zotero/storage/DXMUA4SE/inheriting-possibility.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 1,711: Line 1,507:
 
title = {Facial Recognition Technology Isn’t Good Just Because It’s Used to Arrest Neo-Nazis},
 
title = {Facial Recognition Technology Isn’t Good Just Because It’s Used to Arrest Neo-Nazis},
 
url = {https://slate.com/technology/2021/01/facial-recognition-technology-capitol-siege.html},
 
url = {https://slate.com/technology/2021/01/facial-recognition-technology-capitol-siege.html},
abstract = {Crisis is often used to increase the reach of surveillance technologies.},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-01-24},
 
urldate = {2021-01-24},
Line 1,718: Line 1,513:
 
month = jan,
 
month = jan,
 
year = {2021},
 
year = {2021},
file = {Snapshot:/home/ruben/Zotero/storage/9ARUZGRV/facial-recognition-technology-capitol-siege.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 1,729: Line 1,523:
 
author = {Knutson, Audrey},
 
author = {Knutson, Audrey},
 
pages = {14},
 
pages = {14},
file = {Knutson - Saving Face\; The Unconstitutional Use of Facial Re.pdf:/home/ruben/Zotero/storage/IDBN5KIW/Knutson - Saving Face\; The Unconstitutional Use of Facial Re.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,741: Line 1,534:
 
url = {https://doi.org/10.1177/2053951714543804},
 
url = {https://doi.org/10.1177/2053951714543804},
 
doi = {10.1177/2053951714543804},
 
doi = {10.1177/2053951714543804},
abstract = {This article proposes an original analysis of the international debate on climate change through the use of digital methods. Its originality is twofold. First, it examines a corpus of reports covering 18 years of international climate negotiations, a dataset never explored before through digital techniques. This corpus is particularly interesting because it provides the most consistent and detailed reporting of the negotiations of the United Nations Framework Convention on Climate Change. Second, in this paper we test an original approach to text analysis that combines automatic extractions and manual selection of the key issue-terms. Through this mixed approach, we tried to obtain relevant findings without imposing them on our corpus. The originality of our corpus and of our approach encouraged us to question some of the habits of digital research and confront three common misunderstandings about digital methods that we discuss in the first part of the article (section ‘Three misunderstandings on digital methods in social sciences’). In addition to reflecting on methodology, however, we also wanted to offer some substantial contribution to the understanding of UN-framed climate diplomacy. In the second part of the article (section ‘Three maps on climate negotiations’) we will therefore introduce some of the preliminary results of our analysis. By discussing three visualizations, we will analyze the thematic articulation of the climatic negotiations, the rise and fall of these themes over time and the visibility of different countries in the debate.},
 
 
language = {en},
 
language = {en},
 
number = {2},
 
number = {2},
Line 1,752: Line 1,544:
 
keywords = {climate change, climate negotiations, Digital methods, network analysis, science and technology studies, text analysis},
 
keywords = {climate change, climate negotiations, Digital methods, network analysis, science and technology studies, text analysis},
 
pages = {2053951714543804},
 
pages = {2053951714543804},
file = {Venturini et al_2014_Three maps and three misunderstandings.pdf:/home/ruben/Zotero/storage/VLT6N492/Venturini et al_2014_Three maps and three misunderstandings.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,760: Line 1,551:
 
title = {This site posted every face from Parler’s Capitol Hill insurrection videos},
 
title = {This site posted every face from Parler’s Capitol Hill insurrection videos},
 
url = {https://arstechnica.com/tech-policy/2021/01/this-site-posted-every-face-from-parlers-capitol-hill-insurrection-videos/},
 
url = {https://arstechnica.com/tech-policy/2021/01/this-site-posted-every-face-from-parlers-capitol-hill-insurrection-videos/},
abstract = {Faces of the Riot used open source software to detect, extract, and deduplicate every face.},
 
 
language = {en-us},
 
language = {en-us},
 
urldate = {2021-01-25},
 
urldate = {2021-01-25},
Line 1,777: Line 1,567:
 
shorttitle = {Anarchy is what States Make of it},
 
shorttitle = {Anarchy is what States Make of it},
 
url = {https://www.jstor.org.ezproxy.leidenuniv.nl:2048/stable/2706858},
 
url = {https://www.jstor.org.ezproxy.leidenuniv.nl:2048/stable/2706858},
abstract = {The claim that international institutions can transform state interests is central to neoliberal challenges to the realist assumption that "process" (interaction and learning among states) cannot fundamentally affect system "structure" (anarchy and the distribution of capabilities). Systematic development of this claim, however, has been hampered by the neoliberals' commitment to rational choice theory, which treats interests as exogenously given and thus offers only a weak form of institutional analysis. A growing body of international relations scholarship points to ways in which the identities and interests of states are socially constructed by knowledgeable practice. This article builds a bridge between this scholarship and neoliberalism by developing a theory of identity- and interest-formation in support of the neoliberal claim that international institutions can transform state interests. Its substantive focus is the realist view that anarchies are necessarily self-help systems, which justifies disinterest in processes of identity- and interest-formation. Self-help is a function not of anarchy but of process and, as such, is itself an institution that determines the meaning of anarchy and the distribution of power for state action. The article concludes with an examination of how this institution can be transformed by practices of sovereignty, by an evolution of cooperation, and by critical strategic practice.},
 
 
number = {2},
 
number = {2},
 
urldate = {2021-01-19},
 
urldate = {2021-01-19},
Line 1,785: Line 1,574:
 
note = {Publisher: [MIT Press, University of Wisconsin Press, Cambridge University Press, International Organization Foundation]},
 
note = {Publisher: [MIT Press, University of Wisconsin Press, Cambridge University Press, International Organization Foundation]},
 
pages = {391--425},
 
pages = {391--425},
file = {Wendt_1992_Anarchy is what States Make of it.pdf:/home/ruben/Zotero/storage/RKZZ7VV2/Wendt_1992_Anarchy is what States Make of it.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,796: Line 1,584:
 
shorttitle = {Anarchy is what States Make of it},
 
shorttitle = {Anarchy is what States Make of it},
 
url = {https://www.jstor.org.ezproxy.leidenuniv.nl:2048/stable/2706858},
 
url = {https://www.jstor.org.ezproxy.leidenuniv.nl:2048/stable/2706858},
abstract = {The claim that international institutions can transform state interests is central to neoliberal challenges to the realist assumption that "process" (interaction and learning among states) cannot fundamentally affect system "structure" (anarchy and the distribution of capabilities). Systematic development of this claim, however, has been hampered by the neoliberals' commitment to rational choice theory, which treats interests as exogenously given and thus offers only a weak form of institutional analysis. A growing body of international relations scholarship points to ways in which the identities and interests of states are socially constructed by knowledgeable practice. This article builds a bridge between this scholarship and neoliberalism by developing a theory of identity- and interest-formation in support of the neoliberal claim that international institutions can transform state interests. Its substantive focus is the realist view that anarchies are necessarily self-help systems, which justifies disinterest in processes of identity- and interest-formation. Self-help is a function not of anarchy but of process and, as such, is itself an institution that determines the meaning of anarchy and the distribution of power for state action. The article concludes with an examination of how this institution can be transformed by practices of sovereignty, by an evolution of cooperation, and by critical strategic practice.},
 
 
number = {2},
 
number = {2},
 
urldate = {2021-01-19},
 
urldate = {2021-01-19},
Line 1,814: Line 1,601:
 
shorttitle = {Anarchy is what States Make of it},
 
shorttitle = {Anarchy is what States Make of it},
 
url = {https://www.jstor.org.ezproxy.leidenuniv.nl:2048/stable/2706858},
 
url = {https://www.jstor.org.ezproxy.leidenuniv.nl:2048/stable/2706858},
abstract = {The claim that international institutions can transform state interests is central to neoliberal challenges to the realist assumption that "process" (interaction and learning among states) cannot fundamentally affect system "structure" (anarchy and the distribution of capabilities). Systematic development of this claim, however, has been hampered by the neoliberals' commitment to rational choice theory, which treats interests as exogenously given and thus offers only a weak form of institutional analysis. A growing body of international relations scholarship points to ways in which the identities and interests of states are socially constructed by knowledgeable practice. This article builds a bridge between this scholarship and neoliberalism by developing a theory of identity- and interest-formation in support of the neoliberal claim that international institutions can transform state interests. Its substantive focus is the realist view that anarchies are necessarily self-help systems, which justifies disinterest in processes of identity- and interest-formation. Self-help is a function not of anarchy but of process and, as such, is itself an institution that determines the meaning of anarchy and the distribution of power for state action. The article concludes with an examination of how this institution can be transformed by practices of sovereignty, by an evolution of cooperation, and by critical strategic practice.},
 
 
number = {2},
 
number = {2},
 
urldate = {2021-01-19},
 
urldate = {2021-01-19},
Line 1,842: Line 1,628:
 
doi = {10.4324/9780203926765.ch2},
 
doi = {10.4324/9780203926765.ch2},
 
note = {Series Title: Routledge Studies in Liberty and Security},
 
note = {Series Title: Routledge Studies in Liberty and Security},
file = {Bigo - 2008 - Globalized (in)security The field and the ban-opt.pdf:/home/ruben/Zotero/storage/89J6FE34/Bigo - 2008 - Globalized (in)security The field and the ban-opt.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,854: Line 1,639:
 
url = {10.1177/0162243915574602},
 
url = {10.1177/0162243915574602},
 
doi = {10.1177/0162243915574602},
 
doi = {10.1177/0162243915574602},
abstract = {This article takes stock of recent efforts to implement controversy analysis as a digital method in the study of science, technology, and society (STS) and beyond and outlines a distinctive approach to address the problem of digital bias. Digital media technologies exert significant influence on the enactment of controversy in online settings, and this risks undermining the substantive focus of controversy analysis conducted by digital means. To address this problem, I propose a shift in thematic focus from controversy analysis to issue mapping. The article begins by distinguishing between three broad frameworks that currently guide the development of controversy analysis as a digital method, namely, demarcationist, discursive, and empiricist. Each has been adopted in STS, but only the last one offers a digital “move beyond impartiality.” I demonstrate this approach by analyzing issues of Internet governance with the aid of the social media platform Twitter.},
 
 
number = {5},
 
number = {5},
 
urldate = {2021-01-26},
 
urldate = {2021-01-26},
Line 1,864: Line 1,648:
 
pmcid = {PMC4531114},
 
pmcid = {PMC4531114},
 
pages = {655--686},
 
pages = {655--686},
file = {Marres 2015 - Why Map Issues.pdf:/home/ruben/Zotero/storage/D4PSKF3N/Marres 2015 - Why Map Issues.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,872: Line 1,655:
 
title = {MegaPixels},
 
title = {MegaPixels},
 
url = {https://megapixels.cc/},
 
url = {https://megapixels.cc/},
abstract = {Face Recognition Datasets},
 
 
urldate = {2021-01-26},
 
urldate = {2021-01-26},
 
journal = {MegaPixels},
 
journal = {MegaPixels},
 
author = {Harvey, Adam},
 
author = {Harvey, Adam},
file = {Snapshot:/home/ruben/Zotero/storage/XC39ZA6L/megapixels.cc.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 1,885: Line 1,666:
 
url = {http://plottingd.at/a/20bn/},
 
url = {http://plottingd.at/a/20bn/},
 
urldate = {2021-01-26},
 
urldate = {2021-01-26},
file = {Something something \: Plotting Data:/home/ruben/Zotero/storage/WQ6ZMBGC/20bn.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 1,893: Line 1,673:
 
title = {Anatomy of an AI System},
 
title = {Anatomy of an AI System},
 
url = {http://www.anatomyof.ai},
 
url = {http://www.anatomyof.ai},
abstract = {Anatomy of an AI System - The Amazon Echo as an anatomical map of human labor, data and planetary resources. By Kate Crawford and Vladan Joler (2018)},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-01-26},
 
urldate = {2021-01-26},
 
publisher = {SHARE Lab; AI Now institute},
 
publisher = {SHARE Lab; AI Now institute},
 
author = {Crawford, Kate and Joler, Vladan},
 
author = {Crawford, Kate and Joler, Vladan},
file = {Snapshot:/home/ruben/Zotero/storage/V6X2SR67/anatomyof.ai.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 1,905: Line 1,683:
 
  |bibtex=@article{hekkanenFieldsNetworksFinnish,
 
  |bibtex=@article{hekkanenFieldsNetworksFinnish,
 
title = {Fields, Networks and Finnish prose: A Comparison of Bourdieusian Field Theory and Actor-Network Theory in Translation Sociology},
 
title = {Fields, Networks and Finnish prose: A Comparison of Bourdieusian Field Theory and Actor-Network Theory in Translation Sociology},
abstract = {This article discusses and compares two sociological theoretical frameworks, Pierre Bourdieu’s field theory and the Actor-Network Theory (ANT) proposed by e.g. Bruno Latour. The former framework has been widely used in Translation Studies, while the latter has been introduced much more recently but is now gaining ground. The two approaches are compared with reference to a specific translation situation, the translation of Finnish prose literature into English in the UK. The comparison shows that the ANT model is better suited for analysing the structural context in which translation activity takes place, while the Bourdieusian model provides better opportunities for analysing individual translators’ practices through the concept of habitus. The most in-depth results can thus be obtained by combining the two approaches.},
 
 
language = {en},
 
language = {en},
 
author = {Hekkanen, Raila},
 
author = {Hekkanen, Raila},
 
pages = {22},
 
pages = {22},
file = {Hekkanen - Fields, Networks and Finnish prose A Comparison o.pdf:/home/ruben/Zotero/storage/3HA9WCQS/Hekkanen - Fields, Networks and Finnish prose A Comparison o.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,919: Line 1,695:
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-01-26},
 
urldate = {2021-01-26},
file = {Snapshot:/home/ruben/Zotero/storage/2ISZVLFI/people.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 1,939: Line 1,714:
 
year = {1994},
 
year = {1994},
 
pages = {641--671},
 
pages = {641--671},
file = {Submitted Version:/home/ruben/Zotero/storage/PYZBDI5T/Mol and Law - 1994 - Regions, Networks and Fluids Anaemia and Social T.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,951: Line 1,725:
 
url = {http://journals.sagepub.com/doi/10.1177/0162243919835302},
 
url = {http://journals.sagepub.com/doi/10.1177/0162243919835302},
 
doi = {10.1177/0162243919835302},
 
doi = {10.1177/0162243919835302},
abstract = {The political integration of the European Union (EU) is fragile for many reasons, not least the reassertion of nationalism. That said, if we examine specific practices and infrastructures, a more complicated story emerges. We juxtapose the political fragility of the EU in relation to the ongoing formation of data infrastructures in official statistics that take part in postnational enactments of Europe’s populations and territories. We develop this argument by analyzing transformations in how European populations are enacted through new technological infrastructures that seek to integrate national census data in “cubes” of cross-tabulated social topics and spatial “grids” of maps. In doing so, these infrastructures give meaning to what “is” Europe in ways that are both old and new. Through standardization and harmonization of social and geographical spaces, “old” geometries of organizing and mapping populations are deployed along with “new” topological arrangements that mix and fold categories of population. Furthermore, we consider how grids and cubes are generative of methodological topologies by closing the distances or differences between methods and making their data equivalent. By paying attention to these practices and infrastructures, we examine how they enable reconfiguring what is known and imagined as Europe and how it is governed.},
 
 
language = {en},
 
language = {en},
 
number = {2},
 
number = {2},
Line 1,960: Line 1,733:
 
year = {2020},
 
year = {2020},
 
pages = {235--261},
 
pages = {235--261},
file = {Full Text:/home/ruben/Zotero/storage/HN5AJMTE/Grommé and Ruppert - 2020 - Population Geometries of Europe The Topologies of.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 1,972: Line 1,744:
 
url = {http://journals.sagepub.com/doi/10.1177/0162243919897822},
 
url = {http://journals.sagepub.com/doi/10.1177/0162243919897822},
 
doi = {10.1177/0162243919897822},
 
doi = {10.1177/0162243919897822},
abstract = {Politically, Europe has been unable to address itself to a constituted polity and people as more than an agglomeration of nation-states. From the resurgence of nationalisms to the crisis of the single currency and the unprecedented decision of a member state to leave the European Union (EU), core questions about the future of Europe have been rearticulated: Who are the people of Europe? Is there a European identity? What does it mean to say, “I am European?” Where does Europe begin and end? and Who can legitimately claim to be a part of a “European” people? The special issue (SI) seeks to contest dominant framings of the question “Who are the people of Europe?” as only a matter of government policies, electoral campaigns, or parliamentary debates. Instead, the contributions start from the assumption that answers to this question exist in data practices where people are addressed, framed, known, and governed as European. The central argument of this SI is that it is through data practices that the EU seeks to simultaneously constitute its population as a knowable, governable entity, and as a distinct form of peoplehood where common personhood is more important than differences.},
 
 
language = {en},
 
language = {en},
 
number = {2},
 
number = {2},
Line 1,981: Line 1,752:
 
year = {2020},
 
year = {2020},
 
pages = {199--211},
 
pages = {199--211},
file = {Full Text:/home/ruben/Zotero/storage/ZYN6EGKB/Cakici et al. - 2020 - Peopling Europe through Data Practices Introducti.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 2,009: Line 1,779:
 
title = {Diagrams of power. Visualizing, mapping and performing resistance.},
 
title = {Diagrams of power. Visualizing, mapping and performing resistance.},
 
isbn = {978-94-93148-03-1},
 
isbn = {978-94-93148-03-1},
abstract = {Diagrams of Power' collects contemporary artworks and projects that use data, diagrams, maps and visualizations as ways of challenging dominant narratives and supporting the resilience of marginalized communities.0The artists and designers featured critique conventionalized and established truths that obscure important histories or perpetuate oppressive regimes; they also contribute to positive social change by engaging communities and providing alternative strategies for storytelling, communication and organizing. Historical and contemporary uses of data and visualization in colonization, surveillance and management are problematized through critical interventions that use performance, embodiment and counternarratives. 00Exhibition: Onomatopee, Eindhoven, The Netherlands (09.03.-05.05.2019).},
 
 
language = {English},
 
language = {English},
 
publisher = {Onomatopee},
 
publisher = {Onomatopee},
Line 2,022: Line 1,791:
 
title = {Data Visualization and the Modern Imagination},
 
title = {Data Visualization and the Modern Imagination},
 
url = {https://exhibits.stanford.edu/dataviz/},
 
url = {https://exhibits.stanford.edu/dataviz/},
abstract = {An exhibition that examines the 19th-century roots of information graphics.},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-01-26},
 
urldate = {2021-01-26},
 
journal = {Spotlight at Stanford},
 
journal = {Spotlight at Stanford},
author = {University, © Stanford and {Stanford} and California 94305},
+
author = {University, © Stanford and Stanford and California 94305},
file = {Snapshot:/home/ruben/Zotero/storage/DKDUC6KZ/dataviz.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,036: Line 1,803:
 
shorttitle = {'The Computer Got It Wrong'},
 
shorttitle = {'The Computer Got It Wrong'},
 
url = {https://www.npr.org/2020/06/24/882683463/the-computer-got-it-wrong-how-facial-recognition-led-to-a-false-arrest-in-michig},
 
url = {https://www.npr.org/2020/06/24/882683463/the-computer-got-it-wrong-how-facial-recognition-led-to-a-false-arrest-in-michig},
abstract = {Robert Williams says his driver's license photo was incorrectly matched with a wanted suspect. He was arrested and detained. Though the case was dropped, Williams says its effect is lasting.},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-01-26},
 
urldate = {2021-01-26},
 
journal = {NPR.org},
 
journal = {NPR.org},
file = {Snapshot:/home/ruben/Zotero/storage/A57JGG93/the-computer-got-it-wrong-how-facial-recognition-led-to-a-false-arrest-in-michig.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,050: Line 1,815:
 
shorttitle = {White Paper on Artificial Intelligence},
 
shorttitle = {White Paper on Artificial Intelligence},
 
url = {https://ec.europa.eu/info/publications/white-paper-artificial-intelligence-european-approach-excellence-and-trust_en},
 
url = {https://ec.europa.eu/info/publications/white-paper-artificial-intelligence-european-approach-excellence-and-trust_en},
abstract = {White Paper on Artificial Intelligence: a European approach to excellence and trust},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-01-26},
 
urldate = {2021-01-26},
Line 2,056: Line 1,820:
 
month = feb,
 
month = feb,
 
year = {2020},
 
year = {2020},
file = {Snapshot:/home/ruben/Zotero/storage/R3QQFGV6/white-paper-artificial-intelligence-european-approach-excellence-and-trust_en.html:text/html;European Commission - 2020 - White Paper on Artificial Intelligence a European.pdf:/home/ruben/Zotero/storage/TCWIWJ95/European Commission - 2020 - White Paper on Artificial Intelligence a European.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 2,075: Line 1,838:
 
doi = {10.6028/NIST.IR.8311},
 
doi = {10.6028/NIST.IR.8311},
 
pages = {NIST IR 8311},
 
pages = {NIST IR 8311},
file = {Ngan et al. - 2020 - Ongoing Face Recognition Vendor Test (FRVT) part 6.pdf:/home/ruben/Zotero/storage/UXFVFTBS/Ngan et al. - 2020 - Ongoing Face Recognition Vendor Test (FRVT) part 6.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 2,083: Line 1,845:
 
title = {AI Narratives},
 
title = {AI Narratives},
 
url = {https://www.ainarratives.com},
 
url = {https://www.ainarratives.com},
abstract = {GLOBAL AI NARRATIVES    exploring the way we talk about AI},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-01-29},
 
urldate = {2021-01-29},
 
journal = {AI Narratives},
 
journal = {AI Narratives},
 
year = {2020},
 
year = {2020},
file = {Snapshot:/home/ruben/Zotero/storage/C7G64HNG/www.ainarratives.com.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,099: Line 1,859:
 
urldate = {2021-01-30},
 
urldate = {2021-01-30},
 
author = {Coviello, Massimiliano},
 
author = {Coviello, Massimiliano},
file = {Snapshot:/home/ruben/Zotero/storage/ELD7S5EY/PENSARE_CON_GLI_OCCHI_LA_POLITICA_DELLE_IMMAGINI_NELL_OPERA_DI_HARUN_FAROCHI_Videogrammi_di_gue.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,107: Line 1,866:
 
title = {Exposing.ai},
 
title = {Exposing.ai},
 
url = {https://exposing.ai/},
 
url = {https://exposing.ai/},
abstract = {Exposing.ai: Check if your photos were used in AI surveillance research projects},
 
 
urldate = {2021-01-31},
 
urldate = {2021-01-31},
 
journal = {Exposing.ai},
 
journal = {Exposing.ai},
 
author = {Harvey, Adam},
 
author = {Harvey, Adam},
file = {Snapshot:/home/ruben/Zotero/storage/G3HGTTZK/exposing.ai.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,121: Line 1,878:
 
issn = {0362-4331},
 
issn = {0362-4331},
 
url = {https://www.nytimes.com/2021/01/31/technology/facial-recognition-photo-tool.html},
 
url = {https://www.nytimes.com/2021/01/31/technology/facial-recognition-photo-tool.html},
abstract = {An online tool targets only a small slice of what’s out there, but may open some eyes to how widely artificial intelligence research fed on personal images.},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-01-31},
 
urldate = {2021-01-31},
Line 2,129: Line 1,885:
 
year = {2021},
 
year = {2021},
 
keywords = {Computer Vision, Computers and the Internet, Facial Recognition Software, Flickr, Megvii Technology Ltd, Photography, Privacy, Tabriz, Parisa, University of Washington},
 
keywords = {Computer Vision, Computers and the Internet, Facial Recognition Software, Flickr, Megvii Technology Ltd, Photography, Privacy, Tabriz, Parisa, University of Washington},
file = {Snapshot:/home/ruben/Zotero/storage/QDN2VGBB/facial-recognition-photo-tool.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,141: Line 1,896:
 
url = {https://doi.org/10.1080/02691728.2015.1015062},
 
url = {https://doi.org/10.1080/02691728.2015.1015062},
 
doi = {10.1080/02691728.2015.1015062},
 
doi = {10.1080/02691728.2015.1015062},
abstract = {The sociology of science seeks to theorize the social conditioning of science. This theorizing seems to undermine the validity of scientific knowledge and lead to relativism. Bourdieu and Latour both attempt to develop a sociology of science that overcomes relativism but stipulate opposite conditions for the production of scientific truths: while Bourdieu emphasizes autonomy, Latour emphasizes associations. This is because they work with oppositional epistemological and ontological assumptions. In both theories, the notion of truth lacks an independent definition; it is derived from the theorist’s position on rationalism and defined with reference to how it is produced. This interdependence creates a different problem in each case. Bourdieu’s assertion that truths produced in relatively autonomous scientific fields are “trans-historical” remains an epistemological assertion. Latour’s argument that truths are produced through associations fails to capture the different resources, distinctions and boundaries that help build credibility. Ultimately, both theories verge on providing an answer to the question of how science should be organized. Nonetheless, their comparison constitutes useful groundwork for future empirical studies.},
 
 
number = {3},
 
number = {3},
 
urldate = {2021-02-03},
 
urldate = {2021-02-03},
Line 2,152: Line 1,906:
 
keywords = {Actor-network Theory, Relativism, Scientific Field, Sociology of Science, Truth},
 
keywords = {Actor-network Theory, Relativism, Scientific Field, Sociology of Science, Truth},
 
pages = {273--296},
 
pages = {273--296},
file = {Snapshot:/home/ruben/Zotero/storage/P8JX4FXS/02691728.2015.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,164: Line 1,917:
 
url = {https://doi.org/10.1111/j.1467-954X.2007.00749.x},
 
url = {https://doi.org/10.1111/j.1467-954X.2007.00749.x},
 
doi = {10.1111/j.1467-954X.2007.00749.x},
 
doi = {10.1111/j.1467-954X.2007.00749.x},
abstract = {Pierre Bourdieu's approach to sociology has been so widely recognized as being innovative that his innovations can be said to have been academically incorporated to the degree of having-been-innovative. On the other hand, the more recent work of Bruno Latour seems to offer a fresh innovative impetus to sociology. Over against Bourdieu's relational sociology, Latour's relationist sociology overcomes the subject-object dichotomy, and abandons the notions of ‘society’ and ‘the social’. In this contribution, a comparison is made between the ideas of Bourdieu and Latour on the question of what sociology should look like, specifically focusing on their respective ideas on what can be called the relational. A Latourian critique of Bourdieu is provided, as well as a Bourdieusian analysis of Latourian sociology. Rather than ending up with two different ‘paradigms’, an attempt is made on the basis of Foucault's archaeology of discourse to view Bourdieusian and Latourian sociology as distinct positions within a discourse on the relational.},
 
 
language = {en},
 
language = {en},
 
number = {4},
 
number = {4},
Line 2,182: Line 1,934:
 
url = {https://mailchi.mp/9bd9e7d5b602/announcing-the-unfolding-intelligence-symposium?e=018299291f},
 
url = {https://mailchi.mp/9bd9e7d5b602/announcing-the-unfolding-intelligence-symposium?e=018299291f},
 
urldate = {2021-02-03},
 
urldate = {2021-02-03},
file = {Snapshot:/home/ruben/Zotero/storage/Y7YZYEXD/announcing-the-unfolding-intelligence-symposium.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,192: Line 1,943:
 
isbn = {978-0-19-068409-9},
 
isbn = {978-0-19-068409-9},
 
shorttitle = {Predict and surveil},
 
shorttitle = {Predict and surveil},
abstract = {"The scope of criminal justice surveillance, from the police to the prisons, has expanded rapidly in recent decades. At the same time, the use of big data has spread across a range of fields, including finance, politics, health, and marketing. While law enforcement's use of big data is hotly contested, very little is known about how the police actually use it in daily operations and with what consequences. This book offers an inside look at how police use big data and new surveillance technologies, leveraging on-the-ground fieldwork with one of the most technologically advanced law enforcement agencies in the world-the Los Angeles Police Department. Drawing on original interviews and ethnographic observations from over two years of fieldwork with the LAPD, the text examines the causes and consequences of big data and algorithmic control. It reveals how the police use predictive analytics and new surveillance technologies to deploy resources, identify criminal suspects, and conduct investigations; how the adoption of big data analytics transforms police organizational practices; and how the police themselves respond to these new data-driven practices. While big data analytics has the potential to reduce bias, increase efficiency, and improve prediction accuracy, the book argues that it also reproduces and deepens existing patterns of inequality, threatens privacy, and challenges civil liberties"--},
 
 
language = {en},
 
language = {en},
 
publisher = {Oxford University Press},
 
publisher = {Oxford University Press},
Line 2,198: Line 1,948:
 
year = {2021},
 
year = {2021},
 
keywords = {California Los Angeles, Crime analysis, Crime forecasting, Criminal behavior, Prediction of, Data processing, Police, Statistical methods},
 
keywords = {California Los Angeles, Crime analysis, Crime forecasting, Criminal behavior, Prediction of, Data processing, Police, Statistical methods},
file = {Brayne - 2021 - Predict and surveil data, discretion, and the fut.pdf:/home/ruben/Zotero/storage/PLWTVDAL/Brayne - 2021 - Predict and surveil data, discretion, and the fut.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 2,207: Line 1,956:
 
url = {https://b-ok.cc/book/6026592/77c46c},
 
url = {https://b-ok.cc/book/6026592/77c46c},
 
urldate = {2021-02-04},
 
urldate = {2021-02-04},
file = {Predict and Surveil | Sarah Brayne | download:/home/ruben/Zotero/storage/FSYVNJCI/77c46c.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,215: Line 1,963:
 
title = {How the LAPD and Palantir Use Data to Justify Racist Policing},
 
title = {How the LAPD and Palantir Use Data to Justify Racist Policing},
 
url = {https://theintercept.com/2021/01/30/lapd-palantir-data-driven-policing/},
 
url = {https://theintercept.com/2021/01/30/lapd-palantir-data-driven-policing/},
abstract = {In a new book, a sociologist who spent months embedded with the LAPD details how data-driven policing techwashes bias.},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-02-04},
 
urldate = {2021-02-04},
 
journal = {The Intercept},
 
journal = {The Intercept},
 
author = {HvistendahlJanuary 30 2021, Mara HvistendahlMara and P.m, 1:00},
 
author = {HvistendahlJanuary 30 2021, Mara HvistendahlMara and P.m, 1:00},
file = {Snapshot:/home/ruben/Zotero/storage/QV5QPFUL/lapd-palantir-data-driven-policing.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,228: Line 1,974:
 
title = {Tactical Tech},
 
title = {Tactical Tech},
 
url = {https://tacticaltech.org/},
 
url = {https://tacticaltech.org/},
abstract = {Tactical Tech is an international NGO that engages with citizens and civil-society organisations to explore the impacts of technology on society.},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-02-05},
 
urldate = {2021-02-05},
Line 2,240: Line 1,985:
 
issn = {1059-1028},
 
issn = {1059-1028},
 
url = {https://www.wired.com/story/there-are-spying-eyes-everywhere-and-now-they-share-a-brain/},
 
url = {https://www.wired.com/story/there-are-spying-eyes-everywhere-and-now-they-share-a-brain/},
abstract = {Security cameras. License plate readers. Smartphone trackers. Drones. We’re being watched 24/7. What happens when all those data streams fuse into one?},
 
 
language = {en-us},
 
language = {en-us},
 
urldate = {2021-02-06},
 
urldate = {2021-02-06},
 
journal = {Wired},
 
journal = {Wired},
 
keywords = {backchannel, business, intelligence, longreads, privacy, Read, Ruben, surveillance, textbelowleftfullbleed, web},
 
keywords = {backchannel, business, intelligence, longreads, privacy, Read, Ruben, surveillance, textbelowleftfullbleed, web},
file = {Snapshot:/home/ruben/Zotero/storage/7SAUUYVM/there-are-spying-eyes-everywhere-and-now-they-share-a-brain.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,253: Line 1,996:
 
title = {9 scary revelations from 40 years of facial recognition research},
 
title = {9 scary revelations from 40 years of facial recognition research},
 
url = {https://mashable.com/article/facial-recognition-databases-privacy-study/},
 
url = {https://mashable.com/article/facial-recognition-databases-privacy-study/},
abstract = {The largest study of facial recognition databases to date show its revealing origins and flaws.},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-02-07},
 
urldate = {2021-02-07},
 
journal = {Mashable},
 
journal = {Mashable},
 
author = {Kraus, Rachel},
 
author = {Kraus, Rachel},
file = {Snapshot:/home/ruben/Zotero/storage/SA6JE9RW/facial-recognition-databases-privacy-study.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,268: Line 2,009:
 
author = {Bunz, Mercedes and Khan, Murad and Anamorphisms, New and Khan, Nora N},
 
author = {Bunz, Mercedes and Khan, Murad and Anamorphisms, New and Khan, Nora N},
 
pages = {56},
 
pages = {56},
file = {Bunz et al. - 001 Aesthetics of New AI.pdf:/home/ruben/Zotero/storage/T7UBXBXX/Bunz et al. - 001 Aesthetics of New AI.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 2,275: Line 2,015:
 
  |bibtex=@article{rajiFaceSurveyFacial2021a,
 
  |bibtex=@article{rajiFaceSurveyFacial2021a,
 
title = {About Face: A Survey of Facial Recognition Evaluation},
 
title = {About Face: A Survey of Facial Recognition Evaluation},
abstract = {We survey over 100 face datasets constructed between 1976 to 2019 of 145 million images of over 17 million subjects from a range of sources, demographics and conditions. Our historical survey reveals that these datasets are contextually informed - shaped by changes in political motivations, technological capability and current norms. We discuss how such influences mask specific practices - some of which may actually be harmful or otherwise problematic - and make a case for the explicit communication of such details in order to establish a more grounded understanding of the technology’s function in the real world.},
 
 
language = {en},
 
language = {en},
 
author = {Raji, Inioluwa Deborah and Fried, Genevieve},
 
author = {Raji, Inioluwa Deborah and Fried, Genevieve},
 
year = {2021},
 
year = {2021},
 
pages = {11},
 
pages = {11},
file = {Raji and Fried - About Face A Survey of Facial Recognition Evaluat.pdf:/home/ruben/Zotero/storage/JZRZA43G/Raji and Fried - About Face A Survey of Facial Recognition Evaluat.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 2,288: Line 2,026:
 
title = {World.orbit},
 
title = {World.orbit},
 
url = {https://verticalatlas.hetnieuweinstituut.nl/en/worldorbit},
 
url = {https://verticalatlas.hetnieuweinstituut.nl/en/worldorbit},
abstract = {Vertical Atlas – world.orbit is a public research project focusing on a critical and generative engagement with satellite data. In a series of workshops, artists and designers can learn how to find, read, proc...},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-02-09},
 
urldate = {2021-02-09},
Line 2,294: Line 2,031:
 
month = oct,
 
month = oct,
 
year = {2020},
 
year = {2020},
file = {Snapshot:/home/ruben/Zotero/storage/I2AD8JVX/worldorbit.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,305: Line 2,041:
 
urldate = {2021-02-10},
 
urldate = {2021-02-10},
 
journal = {Society for Social Studies of Science},
 
journal = {Society for Social Studies of Science},
file = {Snapshot:/home/ruben/Zotero/storage/YEE3UMVV/visual-and-sensory-approaches-2017.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,316: Line 2,051:
 
urldate = {2021-02-10},
 
urldate = {2021-02-10},
 
journal = {Society for Social Studies of Science},
 
journal = {Society for Social Studies of Science},
file = {Snapshot:/home/ruben/Zotero/storage/BTVIV8KP/mapping-monitoring.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,337: Line 2,071:
 
urldate = {2021-02-10},
 
urldate = {2021-02-10},
 
journal = {Society for Social Studies of Science},
 
journal = {Society for Social Studies of Science},
file = {Snapshot:/home/ruben/Zotero/storage/PVBF2JXY/virtual-prague-2020.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,346: Line 2,079:
 
url = {https://www.organisatiegids.universiteitleiden.nl/en/regulations/general/phd-regulations},
 
url = {https://www.organisatiegids.universiteitleiden.nl/en/regulations/general/phd-regulations},
 
urldate = {2021-02-10},
 
urldate = {2021-02-10},
file = {PhD Regulations Leiden University - Leiden University:/home/ruben/Zotero/storage/NR9HU7NT/phd-regulations.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,355: Line 2,087:
 
shorttitle = {The Knot in the Wood},
 
shorttitle = {The Knot in the Wood},
 
url = {http://www.americananthropologist.org/2018/06/05/the-knot-in-the-wood-the-call-to-multimodal-anthropology/},
 
url = {http://www.americananthropologist.org/2018/06/05/the-knot-in-the-wood-the-call-to-multimodal-anthropology/},
abstract = {By Roxanne Varzi (University of California, Irvine) What I love most in Samuel Gerald Collins,},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-02-10},
 
urldate = {2021-02-10},
file = {Snapshot:/home/ruben/Zotero/storage/RIUPQSGZ/the-knot-in-the-wood-the-call-to-multimodal-anthropology.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,367: Line 2,097:
 
shorttitle = {Facial Recognition in Europe},
 
shorttitle = {Facial Recognition in Europe},
 
url = {https://blog-idcuk.com/facial-recognition-in-europe-a-battle-between-privacy-and-surveillance/},
 
url = {https://blog-idcuk.com/facial-recognition-in-europe-a-battle-between-privacy-and-surveillance/},
abstract = {Legislators are exploring ways to control the use of facial recognition in Europe through legislation, which would limit the indiscriminate use of it},
 
 
language = {en-GB},
 
language = {en-GB},
 
urldate = {2021-02-10},
 
urldate = {2021-02-10},
Line 2,374: Line 2,103:
 
year = {2019},
 
year = {2019},
 
keywords = {FR-Inbox},
 
keywords = {FR-Inbox},
file = {Snapshot:/home/ruben/Zotero/storage/VP7N8Q6A/facial-recognition-in-europe-a-battle-between-privacy-and-surveillance.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,382: Line 2,110:
 
title = {10 facial recognition startups from Europe you should know about in 2019 {\textbar} Silicon Canals},
 
title = {10 facial recognition startups from Europe you should know about in 2019 {\textbar} Silicon Canals},
 
url = {https://siliconcanals.com/news/facial-recognition-startups-in-2019/},
 
url = {https://siliconcanals.com/news/facial-recognition-startups-in-2019/},
abstract = {European technology news from the startup ecosystem. Founder and publisher: Remco Janssen. Follow us on Twitter: @siliconcanals.},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-02-10},
 
urldate = {2021-02-10},
 
note = {Section: News},
 
note = {Section: News},
 
keywords = {FR-Inbox},
 
keywords = {FR-Inbox},
file = {Snapshot:/home/ruben/Zotero/storage/96VJ5LBS/facial-recognition-startups-in-2019.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,397: Line 2,123:
 
shorttitle = {Facial recognition},
 
shorttitle = {Facial recognition},
 
url = {https://www.bbc.com/news/technology-51148501},
 
url = {https://www.bbc.com/news/technology-51148501},
abstract = {The European Commission wants time to work out how to prevent the technology being abused.},
 
 
language = {en-GB},
 
language = {en-GB},
 
urldate = {2021-02-10},
 
urldate = {2021-02-10},
Line 2,404: Line 2,129:
 
year = {2020},
 
year = {2020},
 
keywords = {FR-Inbox},
 
keywords = {FR-Inbox},
file = {Snapshot:/home/ruben/Zotero/storage/XY8ZYRTP/technology-51148501.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,412: Line 2,136:
 
title = {Facial recognition tech developed by Clearview AI could be illegal in Europe, privacy group says},
 
title = {Facial recognition tech developed by Clearview AI could be illegal in Europe, privacy group says},
 
url = {https://www.cnbc.com/2020/06/11/clearview-ai-facial-recognition-europe.html},
 
url = {https://www.cnbc.com/2020/06/11/clearview-ai-facial-recognition-europe.html},
abstract = {The European Data Protection Board warned on Wednesday that Clearview AI's technology is likely to be illegal in Europe.},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-02-10},
 
urldate = {2021-02-10},
Line 2,421: Line 2,144:
 
note = {Section: Technology},
 
note = {Section: Technology},
 
keywords = {FR-Inbox},
 
keywords = {FR-Inbox},
file = {Snapshot:/home/ruben/Zotero/storage/T8UZYQM3/clearview-ai-facial-recognition-europe.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,429: Line 2,151:
 
title = {How facial recognition is taking over a French city},
 
title = {How facial recognition is taking over a French city},
 
url = {https://www.politico.eu/article/how-facial-recognition-is-taking-over-a-french-riviera-city/},
 
url = {https://www.politico.eu/article/how-facial-recognition-is-taking-over-a-french-riviera-city/},
abstract = {European authorities are competing to deploy facial recognition tech. Nice in southern France is in the lead.},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-02-10},
 
urldate = {2021-02-10},
Line 2,436: Line 2,157:
 
year = {2019},
 
year = {2019},
 
keywords = {FR-Inbox},
 
keywords = {FR-Inbox},
file = {Snapshot:/home/ruben/Zotero/storage/MQX7P6FU/how-facial-recognition-is-taking-over-a-french-riviera-city.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,444: Line 2,164:
 
title = {The many faces of facial recognition in the EU},
 
title = {The many faces of facial recognition in the EU},
 
url = {https://edri.org/our-work/the-many-faces-of-facial-recognition-in-the-eu/},
 
url = {https://edri.org/our-work/the-many-faces-of-facial-recognition-in-the-eu/},
abstract = {In this second installment of EDRi's facial recognition and fundamental rights series, we look at how different EU Member States, institutions and other countries worldwide are responding to the use of this tech in public spaces.},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-02-10},
 
urldate = {2021-02-10},
 
journal = {European Digital Rights (EDRi)},
 
journal = {European Digital Rights (EDRi)},
 
keywords = {FR-Inbox},
 
keywords = {FR-Inbox},
file = {Snapshot:/home/ruben/Zotero/storage/2ZBTWMWD/the-many-faces-of-facial-recognition-in-the-eu.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,457: Line 2,175:
 
title = {Activists urge EU to ban live facial recognition in public spaces},
 
title = {Activists urge EU to ban live facial recognition in public spaces},
 
url = {https://www.politico.eu/article/activists-urge-eu-to-ban-live-facial-recognition-in-public-spaces/},
 
url = {https://www.politico.eu/article/activists-urge-eu-to-ban-live-facial-recognition-in-public-spaces/},
abstract = {12 organizations join forces to make their voice heard in a debate dominated by the tech industry.},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-02-10},
 
urldate = {2021-02-10},
Line 2,464: Line 2,181:
 
year = {2020},
 
year = {2020},
 
keywords = {FR-Inbox},
 
keywords = {FR-Inbox},
file = {Snapshot:/home/ruben/Zotero/storage/LY4HQE5Q/activists-urge-eu-to-ban-live-facial-recognition-in-public-spaces.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,473: Line 2,189:
 
issn = {1059-1028},
 
issn = {1059-1028},
 
url = {https://www.wired.com/story/europe-limits-government-algorithm-us-not-much/},
 
url = {https://www.wired.com/story/europe-limits-government-algorithm-us-not-much/},
abstract = {A Dutch court halted a program to identify people more likely to commit benefits fraud. Critics said it discriminated against immigrants and low-income residents.},
 
 
language = {en-us},
 
language = {en-us},
 
urldate = {2021-02-10},
 
urldate = {2021-02-10},
 
journal = {Wired},
 
journal = {Wired},
 
keywords = {algorithms, artificial intelligence, business, europe, facial recognition, FR-Inbox, web},
 
keywords = {algorithms, artificial intelligence, business, europe, facial recognition, FR-Inbox, web},
file = {Snapshot:/home/ruben/Zotero/storage/5JXYLHCC/europe-limits-government-algorithm-us-not-much.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,486: Line 2,200:
 
title = {How Dutch activists got an invasive fraud detection algorithm banned},
 
title = {How Dutch activists got an invasive fraud detection algorithm banned},
 
url = {https://algorithmwatch.org/en/story/syri-netherlands-algorithm/},
 
url = {https://algorithmwatch.org/en/story/syri-netherlands-algorithm/},
abstract = {The Dutch government has been using SyRI, a secret algorithm, to detect possible social welfare fraud. Civil rights activists have taken the matter to court and managed to get public organizations to think about less repressive alternatives.},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-02-10},
 
urldate = {2021-02-10},
 
journal = {AlgorithmWatch},
 
journal = {AlgorithmWatch},
 
keywords = {FR-Inbox},
 
keywords = {FR-Inbox},
file = {Snapshot:/home/ruben/Zotero/storage/UENPICQR/syri-netherlands-algorithm.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,501: Line 2,213:
 
keywords = {FR-Inbox},
 
keywords = {FR-Inbox},
 
pages = {60},
 
pages = {60},
file = {Notes from the AI frontier Tackling Europe’s gap .pdf:/home/ruben/Zotero/storage/44NDX327/Notes from the AI frontier Tackling Europe’s gap .pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 2,509: Line 2,220:
 
title = {How Europe’s AI ecosystem could catch up with China and the U.S.},
 
title = {How Europe’s AI ecosystem could catch up with China and the U.S.},
 
url = {https://venturebeat.com/2019/10/01/how-europes-ai-ecosystem-could-catch-up-with-china-and-the-u-s/},
 
url = {https://venturebeat.com/2019/10/01/how-europes-ai-ecosystem-could-catch-up-with-china-and-the-u-s/},
abstract = {Europe’s AI ecosystem wants to catch up with the United States and China, and startups, analysts, and business leaders talked about how to do it at TechBBQ.},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-02-10},
 
urldate = {2021-02-10},
Line 2,516: Line 2,226:
 
year = {2019},
 
year = {2019},
 
keywords = {FR-Read},
 
keywords = {FR-Read},
file = {Snapshot:/home/ruben/Zotero/storage/TWNEUTYZ/how-europes-ai-ecosystem-could-catch-up-with-china-and-the-u-s.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,526: Line 2,235:
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-02-10},
 
urldate = {2021-02-10},
file = {Snapshot:/home/ruben/Zotero/storage/YMYIZ248/ai-register.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,536: Line 2,244:
 
urldate = {2021-02-10},
 
urldate = {2021-02-10},
 
keywords = {FR-Read},
 
keywords = {FR-Read},
file = {Belarus Protesters Use AI to 'Unmask' Riot Police Wearing Face Coverings:/home/ruben/Zotero/storage/UN56JTEC/belarus-protesters-use-ai-to-unmask-riot-police-wearing-face-coverings.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,546: Line 2,253:
 
issn = {0362-4331},
 
issn = {0362-4331},
 
url = {https://www.nytimes.com/2020/06/24/technology/facial-recognition-arrest.html},
 
url = {https://www.nytimes.com/2020/06/24/technology/facial-recognition-arrest.html},
abstract = {In what may be the first known case of its kind, a faulty facial recognition match led to a Michigan man’s arrest for a crime he did not commit.},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-02-10},
 
urldate = {2021-02-10},
Line 2,554: Line 2,260:
 
year = {2020},
 
year = {2020},
 
keywords = {Black People, Detroit (Mich), Discrimination, Facial Recognition Software, False Arrests, Convictions and Imprisonments, FR-Read, Police, Williams, Robert Julian-Borchak},
 
keywords = {Black People, Detroit (Mich), Discrimination, Facial Recognition Software, False Arrests, Convictions and Imprisonments, FR-Read, Police, Williams, Robert Julian-Borchak},
file = {Snapshot:/home/ruben/Zotero/storage/KQTN3ARB/facial-recognition-arrest.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,562: Line 2,267:
 
title = {Amsterdam and Helsinki launch algorithm registries to bring transparency to public deployments of AI},
 
title = {Amsterdam and Helsinki launch algorithm registries to bring transparency to public deployments of AI},
 
url = {https://venturebeat.com/2020/09/28/amsterdam-and-helsinki-launch-algorithm-registries-to-bring-transparency-to-public-deployments-of-ai/},
 
url = {https://venturebeat.com/2020/09/28/amsterdam-and-helsinki-launch-algorithm-registries-to-bring-transparency-to-public-deployments-of-ai/},
abstract = {Amsterdam and Helsinki today launched AI registries to detail how each city uses algorithms to deliver services.},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-02-10},
 
urldate = {2021-02-10},
Line 2,569: Line 2,273:
 
year = {2020},
 
year = {2020},
 
keywords = {FR-Read},
 
keywords = {FR-Read},
file = {Snapshot:/home/ruben/Zotero/storage/KHXWRXPY/amsterdam-and-helsinki-launch-algorithm-registries-to-bring-transparency-to-public-deployments-.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,578: Line 2,281:
 
shorttitle = {'The Computer Got It Wrong'},
 
shorttitle = {'The Computer Got It Wrong'},
 
url = {https://www.npr.org/2020/06/24/882683463/the-computer-got-it-wrong-how-facial-recognition-led-to-a-false-arrest-in-michig},
 
url = {https://www.npr.org/2020/06/24/882683463/the-computer-got-it-wrong-how-facial-recognition-led-to-a-false-arrest-in-michig},
abstract = {Robert Williams says his driver's license photo was incorrectly matched with a wanted suspect. He was arrested and detained. Though the case was dropped, Williams says its effect is lasting.},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-02-10},
 
urldate = {2021-02-10},
 
journal = {NPR.org},
 
journal = {NPR.org},
file = {Snapshot:/home/ruben/Zotero/storage/XVKZ4PQI/the-computer-got-it-wrong-how-facial-recognition-led-to-a-false-arrest-in-michig.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,591: Line 2,292:
 
shorttitle = {Technopolice},
 
shorttitle = {Technopolice},
 
url = {/v/Camp2019-10329-technopolice_calling_out_so-called_safe_cities},
 
url = {/v/Camp2019-10329-technopolice_calling_out_so-called_safe_cities},
abstract = {In many French cities (and beyond), mayors are pushing towards "safe Smart Cities", pushing for technology everywhere. Microphones, video...},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-02-10},
 
urldate = {2021-02-10},
 
author = {Guinness},
 
author = {Guinness},
file = {Snapshot:/home/ruben/Zotero/storage/UP56JUF3/Camp2019-10329-technopolice_calling_out_so-called_safe_cities.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 2,631: Line 2,330:
 
author = {Block, Hans and Riesewieck, Moritz},
 
author = {Block, Hans and Riesewieck, Moritz},
 
year = {2018},
 
year = {2018},
file = {cleaners.jpeg:/home/ruben/Zotero/storage/8EQ7VN96/cleaners.jpeg:image/jpeg},
 
 
   }
 
   }
 
}}
 
}}
Line 2,669: Line 2,367:
 
  |bibtex=@misc{kantayyaCodedBias2020,
 
  |bibtex=@misc{kantayyaCodedBias2020,
 
title = {Coded Bias},
 
title = {Coded Bias},
abstract = {CODED BIAS explores the fallout of MIT Media Lab researcher Joy Buolamwini’s startling discovery that facial recognition does not see dark-skinned faces accurately, and her journey to push for the first-ever legislation in the U.S. to govern against bias in the algorithms that impact us all.},
 
 
author = {Kantayya, Shalini},
 
author = {Kantayya, Shalini},
 
year = {2020},
 
year = {2020},
Line 2,727: Line 2,424:
 
title = {Remittances : development impact and future prospects},
 
title = {Remittances : development impact and future prospects},
 
url = {Input this URL in a browser to get JPEG cover art data. http://firstsearch.oclc.org/WebZ/DCARead?standardNoType=1&standardNo=0821357948:srcdbname=worldcat:fromExternal=true&sessionid=0},
 
url = {Input this URL in a browser to get JPEG cover art data. http://firstsearch.oclc.org/WebZ/DCARead?standardNoType=1&standardNo=0821357948:srcdbname=worldcat:fromExternal=true&sessionid=0},
author = {Maimbo, Samuel Munzele and Ratha, Dilip and {World Bank Group}},
+
author = {Maimbo, Samuel Munzele and Ratha, Dilip and World Bank Group},
 
year = {2005},
 
year = {2005},
 
note = {Publisher: World Bank
 
note = {Publisher: World Bank
Line 2,801: Line 2,498:
 
title = {Torture in saydnaya prison},
 
title = {Torture in saydnaya prison},
 
url = {https://forensic-architecture.org/investigation/saydnaya},
 
url = {https://forensic-architecture.org/investigation/saydnaya},
author = {{Forensic Architecture}},
+
author = {Forensic Architecture},
collaborator = {{Forensic Architecture}},
+
collaborator = {Forensic Architecture},
 
year = {2011},
 
year = {2011},
 
   }
 
   }
Line 2,844: Line 2,541:
 
  |bibtex=@article{CouncilonForeignRelations.2011b,
 
  |bibtex=@article{CouncilonForeignRelations.2011b,
 
title = {Radicalisation hearings},
 
title = {Radicalisation hearings},
author = {{Council on Foreign Relations}},
+
author = {Council on Foreign Relations},
 
year = {2011},
 
year = {2011},
 
note = {Publisher: Council on Foreign Relations},
 
note = {Publisher: Council on Foreign Relations},
Line 2,853: Line 2,550:
 
  |bibtex=@article{CouncilonForeignRelations.2011,
 
  |bibtex=@article{CouncilonForeignRelations.2011,
 
title = {Radicalisation hearings},
 
title = {Radicalisation hearings},
author = {{Council on Foreign Relations}},
+
author = {Council on Foreign Relations},
 
year = {2011},
 
year = {2011},
 
note = {Publisher: Council on Foreign Relations},
 
note = {Publisher: Council on Foreign Relations},
Line 2,911: Line 2,608:
 
title = {Destruction and return in al-Araqib},
 
title = {Destruction and return in al-Araqib},
 
url = {https://forensic-architecture.org/investigation/destruction-and-return-in-al-araqib},
 
url = {https://forensic-architecture.org/investigation/destruction-and-return-in-al-araqib},
author = {{Forensic Architecture}},
+
author = {Forensic Architecture},
editor = {{Forensic Architecture}},
+
editor = {Forensic Architecture},
 
year = {2018},
 
year = {2018},
 
   }
 
   }
Line 2,953: Line 2,650:
 
url = {https://doi.org/10.1093/cybsec/tyv004},
 
url = {https://doi.org/10.1093/cybsec/tyv004},
 
doi = {10.1093/cybsec/tyv004},
 
doi = {10.1093/cybsec/tyv004},
abstract = {In an era of high-profile hacks, information leaks and cybercrime, cybersecurity is the focus of much corporate and state-funded research. Data visualization is regarded as an important tool in the detection and prediction of risk and vulnerability in cybersecurity, but discussion tends to remain at the level of the usability of visualization tools and how to reduce the cognitive load on the consumers of the visualizations. This focus is rooted in a desire to simplify the complexity of cybersecurity. This article argues that while usability and simplification are important goals for the designers of visualizations, there is a much wider discussion that needs to take place about the underlying narratives upon which these visualizations are based. The authors take the position that the narratives on which cybersecurity visualizations are based ignore important aspects of cybersecurity and that their visual form causes the producers and users of these visualizations to focus too narrowly on adversarial security issues, ignoring important aspects of social and community-based security. By situating the discussion of security visualization in a larger socio-historical context, the limitations and implications of current ways of seeing risk become more apparent. Cybersecurity might also learn from other disciplines, specifically critiques of artificial intelligence and the discourse and methods of post-war urban planning. In this way, the article follows a humanities tradition of situating the focus of analysis in a broader tradition of scholarship and critiquing current practices from this wider context. The purpose of such critique is to stimulate reflection on underlying principles and the implications of different approaches to operationalizing those principles. Finally, case studies of participatory modelling and crowdsourcing projects are discussed that aim to foster resilience through social and spatial practices. These case studies illustrate the potential for a wider range of visualizations.},
 
 
number = {1},
 
number = {1},
 
urldate = {2021-02-12},
 
urldate = {2021-02-12},
Line 2,961: Line 2,657:
 
year = {2015},
 
year = {2015},
 
pages = {93--108},
 
pages = {93--108},
file = {Snapshot:/home/ruben/Zotero/storage/FAYS8WQ9/2366512.html:text/html;Hall et al 2015 - Critical visualization.pdf:/home/ruben/Zotero/storage/LMPJP9Z4/Hall et al 2015 - Critical visualization.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 2,973: Line 2,668:
 
url = {https://doi.org/10.1093/cybsec/tyv004},
 
url = {https://doi.org/10.1093/cybsec/tyv004},
 
doi = {10.1093/cybsec/tyv004},
 
doi = {10.1093/cybsec/tyv004},
abstract = {In an era of high-profile hacks, information leaks and cybercrime, cybersecurity is the focus of much corporate and state-funded research. Data visualization is regarded as an important tool in the detection and prediction of risk and vulnerability in cybersecurity, but discussion tends to remain at the level of the usability of visualization tools and how to reduce the cognitive load on the consumers of the visualizations. This focus is rooted in a desire to simplify the complexity of cybersecurity. This article argues that while usability and simplification are important goals for the designers of visualizations, there is a much wider discussion that needs to take place about the underlying narratives upon which these visualizations are based. The authors take the position that the narratives on which cybersecurity visualizations are based ignore important aspects of cybersecurity and that their visual form causes the producers and users of these visualizations to focus too narrowly on adversarial security issues, ignoring important aspects of social and community-based security. By situating the discussion of security visualization in a larger socio-historical context, the limitations and implications of current ways of seeing risk become more apparent. Cybersecurity might also learn from other disciplines, specifically critiques of artificial intelligence and the discourse and methods of post-war urban planning. In this way, the article follows a humanities tradition of situating the focus of analysis in a broader tradition of scholarship and critiquing current practices from this wider context. The purpose of such critique is to stimulate reflection on underlying principles and the implications of different approaches to operationalizing those principles. Finally, case studies of participatory modelling and crowdsourcing projects are discussed that aim to foster resilience through social and spatial practices. These case studies illustrate the potential for a wider range of visualizations.},
 
 
number = {1},
 
number = {1},
 
urldate = {2021-02-12},
 
urldate = {2021-02-12},
Line 2,981: Line 2,675:
 
year = {2015},
 
year = {2015},
 
pages = {93--108},
 
pages = {93--108},
file = {Snapshot:/home/ruben/Zotero/storage/ZAL2XNZG/2366512.html:text/html;Hall et al 2015 - Critical visualization.pdf:/home/ruben/Zotero/storage/JXXLSMP5/Hall et al 2015 - Critical visualization.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 2,993: Line 2,686:
 
url = {https://doi.org/10.1177/2053951717736338},
 
url = {https://doi.org/10.1177/2053951717736338},
 
doi = {10.1177/2053951717736338},
 
doi = {10.1177/2053951717736338},
abstract = {The recent terrorist attacks and ongoing state of emergency in France have brought questions of police surveillance into the public spotlight, making it increasingly important to understand how police attain data from citizens. Since 2005, the French police have been using IBM’s computer program, i2 Analyst’s Notebook, to aggregate information and craft criminal narratives. This technology serves to quickly connect suspects with crimes, looking for as many associations as possible, ranking and visualizing them based on level of importance. Recently, surveillance and state power have been theorized as having shifted to a posthegemonic, order. Drawing from literature on power, surveillance, and identity, this paper considers the various ways that algorithms can impact policing under a state of emergency by comparing the technical protocol of i2 Analyst’s Notebook with the administrative protocol of the French state. Using i2 Analyst’s Notebook as an example, this paper argues that posthegemonic theories of power have their place in determining how algorithms can be used for surveillance, but that they cannot completely explain their use under the state of emergency.},
 
 
language = {en},
 
language = {en},
 
number = {2},
 
number = {2},
Line 3,004: Line 2,696:
 
keywords = {Surveillance, algorithm, France, i2 Analyst’s Notebook, police, state of emergency},
 
keywords = {Surveillance, algorithm, France, i2 Analyst’s Notebook, police, state of emergency},
 
pages = {2053951717736338},
 
pages = {2053951717736338},
file = {Kubler 2017 - State of urgency.pdf:/home/ruben/Zotero/storage/SFJRVGCA/Kubler 2017 - State of urgency.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 3,016: Line 2,707:
 
url = {https://academic.oup.com/cybersecurity/article/doi/10.1093/cybsec/tyaa004/5766338},
 
url = {https://academic.oup.com/cybersecurity/article/doi/10.1093/cybsec/tyaa004/5766338},
 
doi = {10.1093/cybsec/tyaa004},
 
doi = {10.1093/cybsec/tyaa004},
abstract = {Security practitioners working in Security Operations Centres (SOCs) are responsible for detecting and mitigating malicious computer network activity. This work requires both automated tools that detect and prevent attacks, and data presentation tools that can present pertinent network security monitoring information to practitioners in an efficient and comprehensible manner. In recent years, advances have been made in the development of visual approaches to data presentation, with some uptake of advanced security visualization tools in SOCs. Sonification in which data are represented as sound, is said to have potential as an approach that could work alongside existing visual data presentation approaches to address some of the unique challenges faced by SOCs. For example, sonification has been shown to enable peripheral monitoring of processes, which could aid practitioners multitasking in busy SOCs. The perspectives of security practitioners on incorporating sonification into their actual working environments have not yet been examined, however. The aim of this article, therefore, is to address this gap by exploring attitudes to using sonification in SOCs and by identifying the data presentation approaches currently used. We report on the results of a study consisting of an online survey (N ¼ 20) and interviews (N ¼ 21) with security practitioners working in a range of different SOCs. Our contributions are (i) a refined appreciation of the contexts in which sonification could aid in SOC working practice, (ii) an understanding of the areas in which sonification may not be beneficial or may even be problematic, (iii) an analysis of the critical requirements for the design of sonification systems and their integration into the SOC setting and (iv) evidence of the visual data presentation techniques currently used and identification of how sonification might work alongside and address challenges to using them. Our findings clarify insights into the potential benefits and challenges of introducing sonification to support work in this vital security monitoring environment. Participants saw potential value in using sonification systems to aid in anomaly detection tasks in SOCs (such as retrospective hunting), as well as in situations in which peripheral monitoring is desirable: while multitasking with multiple work tasks, or while outside of the SOC.},
 
 
language = {en},
 
language = {en},
 
number = {1},
 
number = {1},
Line 3,025: Line 2,715:
 
year = {2020},
 
year = {2020},
 
pages = {tyaa004},
 
pages = {tyaa004},
file = {Axon et al. - 2020 - Data presentation in security operations centres .pdf:/home/ruben/Zotero/storage/XYHK8LTE/Axon et al. - 2020 - Data presentation in security operations centres .pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 3,035: Line 2,724:
 
author = {Andersen, Christian Ulrik and Pold, Søren and Cameron, Agnes},
 
author = {Andersen, Christian Ulrik and Pold, Søren and Cameron, Agnes},
 
pages = {71},
 
pages = {71},
file = {Andersen et al. - 002 Aesthetics of New AI Interfaces.pdf:/home/ruben/Zotero/storage/I5I6SB39/Andersen et al. - 002 Aesthetics of New AI Interfaces.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 3,043: Line 2,731:
 
title = {Aesthetics of New AI Interfaces—Panel Discussion},
 
title = {Aesthetics of New AI Interfaces—Panel Discussion},
 
url = {https://www.serpentinegalleries.org/whats-on/aesthetics-of-new-ai-interfaces-panel-discussion/},
 
url = {https://www.serpentinegalleries.org/whats-on/aesthetics-of-new-ai-interfaces-panel-discussion/},
abstract = {A panel discussion on machine learning and its art-making interfaces with Christian Ulrik Andersen, Agnes Cameron and Rebecca Fiebrink},
 
 
language = {en-GB},
 
language = {en-GB},
 
urldate = {2021-02-15},
 
urldate = {2021-02-15},
 
journal = {Serpentine Galleries},
 
journal = {Serpentine Galleries},
file = {Snapshot:/home/ruben/Zotero/storage/CDNDBQI2/aesthetics-of-new-ai-interfaces-panel-discussion.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 3,055: Line 2,741:
 
title = {Remembering Beyond},
 
title = {Remembering Beyond},
 
publisher = {RAI film festival},
 
publisher = {RAI film festival},
author = {{Adornetto, Turner}},
+
author = {Adornetto, Turner},
 
year = {2020},
 
year = {2020},
 
   }
 
   }
Line 3,064: Line 2,750:
 
title = {iHuman},
 
title = {iHuman},
 
url = {https://www.idfa.nl/en/film/456c752f-1791-45f7-af7f-47abd9c4361f/ihuman},
 
url = {https://www.idfa.nl/en/film/456c752f-1791-45f7-af7f-47abd9c4361f/ihuman},
author = {{Schei, Tonje Hessen}},
+
author = {Schei, Tonje Hessen},
 
year = {2019},
 
year = {2019},
 
   }
 
   }
Line 3,073: Line 2,759:
 
title = {Prisme},
 
title = {Prisme},
 
url = {https://whttps://www.anvandienderen.net/prism-2019/ww.anvandienderen.net/lili/},
 
url = {https://whttps://www.anvandienderen.net/prism-2019/ww.anvandienderen.net/lili/},
author = {{Mbakam, Rosine; Yameogo, Eléonore; and van. Dienderen, An (last)}},
+
author = {Mbakam, Rosine; Yameogo, Eléonore; and van. Dienderen, An (last)},
 
year = {2021},
 
year = {2021},
 
   }
 
   }
Line 3,082: Line 2,768:
 
title = {Lili},
 
title = {Lili},
 
url = {https://www.anvandienderen.net/lili/},
 
url = {https://www.anvandienderen.net/lili/},
author = {{van. Dienderen, An (last)}},
+
author = {van. Dienderen, An (last)},
 
year = {2015},
 
year = {2015},
 
   }
 
   }
Line 3,091: Line 2,777:
 
title = {The Internet},
 
title = {The Internet},
 
url = {https://screenworks.org.uk/archive/digital-ecologies-and-the-anthropocene/points-of-presence},
 
url = {https://screenworks.org.uk/archive/digital-ecologies-and-the-anthropocene/points-of-presence},
author = {{Fish, Adam (last)}},
+
author = {Fish, Adam (last)},
 
year = {2018},
 
year = {2018},
 
   }
 
   }
Line 3,100: Line 2,786:
 
title = {The Perpetual Line-Up: Unregulated Police Face Recognition in America},
 
title = {The Perpetual Line-Up: Unregulated Police Face Recognition in America},
 
url = {https://www.perpetuallineup.org/},
 
url = {https://www.perpetuallineup.org/},
abstract = {One of two American adults is in a law enforcement face recognition database. An investigation.},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-02-16},
 
urldate = {2021-02-16},
Line 3,107: Line 2,792:
 
month = oct,
 
month = oct,
 
year = {2016},
 
year = {2016},
file = {Snapshot:/home/ruben/Zotero/storage/WGZCP6QH/www.perpetuallineup.org.html:text/html;Garvie et al. - UNREGULATED POLICE FACE RECOGNITION IN AMERICA.pdf:/home/ruben/Zotero/storage/3CTC5UG2/Garvie et al. - UNREGULATED POLICE FACE RECOGNITION IN AMERICA.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 3,128: Line 2,812:
 
shorttitle = {Technology transfer},
 
shorttitle = {Technology transfer},
 
url = {https://doi.org/10.1007/978-0-387-35092-9_4},
 
url = {https://doi.org/10.1007/978-0-387-35092-9_4},
abstract = {There can be little doubt that over the last three decades diffusion theory has had a major impact on a large number of disciplines. However diffusion theory is but one way of thinking about ‘technology transfer’, and here we present an alternative view — namely the notion of translation embodied in actor-network theory (ANT). We believe ANT offers ways of thinking about transfer problems that diffusion metaphors fail to adequately address. Using a retrospective analysis of a case study, we examine and contrast key concepts of these two approaches to technology transfer.},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-02-16},
 
urldate = {2021-02-16},
Line 3,139: Line 2,822:
 
keywords = {Actor-network theory, Diffusion theory, Technology transfer, Translation},
 
keywords = {Actor-network theory, Diffusion theory, Technology transfer, Translation},
 
pages = {64--75},
 
pages = {64--75},
file = {McMaster et al 1997 - Technology transfer.pdf:/home/ruben/Zotero/storage/EMTBY9E3/McMaster et al 1997 - Technology transfer.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 3,148: Line 2,830:
 
url = {https://journals.sagepub.com/doi/10.1177/0967010615586964},
 
url = {https://journals.sagepub.com/doi/10.1177/0967010615586964},
 
urldate = {2021-02-16},
 
urldate = {2021-02-16},
file = {Questioning security devices\: Performativity, resistance, politics - Anthony Amicelle, Claudia Aradau, Julien Jeandesboz, 2015:/home/ruben/Zotero/storage/ZC6BICQL/0967010615586964.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 3,168: Line 2,849:
 
title = {Security, exception, ban and surveillance},
 
title = {Security, exception, ban and surveillance},
 
language = {en},
 
language = {en},
author = {{Didier Bigo}},
+
author = {Didier Bigo},
 
pages = {46--68},
 
pages = {46--68},
 
   }
 
   }
Line 3,205: Line 2,886:
 
title = {The Foucault reader},
 
title = {The Foucault reader},
 
isbn = {0-394-52904-9},
 
isbn = {0-394-52904-9},
abstract = {Michael Foucault's writing has shaped the teaching of half a dozen disciplines, ranging from literary criticism to the history of criminology. But none of his books offers a satisfactory introduction to the entire complex body of his work. The Foucault Reader precisely serves that purpose. It contains selections from each area of Foucault's thought, a wealth of previously unpublished writings, and an interview with Foucault during which he discusses his philosophy with unprecedented candor.},
 
 
language = {en},
 
language = {en},
 
publisher = {Pantheon Books},
 
publisher = {Pantheon Books},
Line 3,217: Line 2,897:
 
title = {Norms and normalization: Michel Foucault's overextended panoptic machine},
 
title = {Norms and normalization: Michel Foucault's overextended panoptic machine},
 
language = {en},
 
language = {en},
author = {{Margaret A. Paternek}},
+
author = {Margaret A. Paternek},
 
year = {1987},
 
year = {1987},
 
note = {Place: Netherlands
 
note = {Place: Netherlands
Line 3,229: Line 2,909:
 
title = {Foucault's new functionalism},
 
title = {Foucault's new functionalism},
 
language = {en},
 
language = {en},
author = {{Neil Brenner}},
+
author = {Neil Brenner},
 
year = {1994},
 
year = {1994},
 
pages = {680--709},
 
pages = {680--709},
Line 3,260: Line 2,940:
 
language = {en},
 
language = {en},
 
journal = {Urban Studies},
 
journal = {Urban Studies},
author = {{Neil Brenner}},
+
author = {Neil Brenner},
 
year = {1998},
 
year = {1998},
 
pages = {431--451},
 
pages = {431--451},
Line 3,271: Line 2,951:
 
language = {en},
 
language = {en},
 
journal = {The Urbanization of Neoberalism},
 
journal = {The Urbanization of Neoberalism},
author = {{Neil Brenner} and {Nik Theodore}},
+
author = {Neil Brenner and Nik Theodore},
 
year = {2002},
 
year = {2002},
 
pages = {349--379},
 
pages = {349--379},
Line 3,301: Line 2,981:
 
title = {Genre Repertoire: The Structuring of Communicative Practices in Organizations},
 
title = {Genre Repertoire: The Structuring of Communicative Practices in Organizations},
 
language = {en},
 
language = {en},
author = {Orlikowski, Wanda and {JoAnne Yates}},
+
author = {Orlikowski, Wanda and JoAnne Yates},
 
year = {1994},
 
year = {1994},
 
pages = {541--574},
 
pages = {541--574},
Line 3,311: Line 2,991:
 
title = {The Expanding Field of Sensory Studies – Sensory Studies},
 
title = {The Expanding Field of Sensory Studies – Sensory Studies},
 
url = {https://www.instapaper.com/read/737592347},
 
url = {https://www.instapaper.com/read/737592347},
abstract = {A simple tool for saving web pages to read later on your iPhone, iPad, Android, computer, or Kindle.},
 
 
author = {Howes, David},
 
author = {Howes, David},
 
year = {2013},
 
year = {2013},
Line 3,320: Line 2,999:
 
  |bibtex=@article{maillotpEcritureCinematographiqueSociologie,
 
  |bibtex=@article{maillotpEcritureCinematographiqueSociologie,
 
title = {L’écriture cinématographique de la sociologie filmique. Comment penser en sociologue avec une caméra},
 
title = {L’écriture cinématographique de la sociologie filmique. Comment penser en sociologue avec une caméra},
author = {{Maillot P}},
+
author = {Maillot P},
 
   }
 
   }
 
}}
 
}}
Line 3,330: Line 3,009:
 
language = {en},
 
language = {en},
 
journal = {International Political Sociology},
 
journal = {International Political Sociology},
author = {{Neil Brenner} and {Stuart Elden}},
+
author = {Neil Brenner and Stuart Elden},
 
year = {2009},
 
year = {2009},
 
pages = {353--377},
 
pages = {353--377},
Line 3,425: Line 3,104:
 
  |bibtex=@misc{icdefInternationalCentreDocumentary,
 
  |bibtex=@misc{icdefInternationalCentreDocumentary,
 
title = {International Centre for Documentary and Experimental Film},
 
title = {International Centre for Documentary and Experimental Film},
author = {{Icdef}},
+
author = {Icdef},
 
   }
 
   }
 
}}
 
}}
Line 3,599: Line 3,278:
 
  |bibtex=@book{wikipediaIndexicality,
 
  |bibtex=@book{wikipediaIndexicality,
 
title = {Indexicality},
 
title = {Indexicality},
author = {{Wikipedia}},
+
author = {Wikipedia},
 
   }
 
   }
 
}}
 
}}
Line 3,750: Line 3,429:
 
title = {Discourse and Emotions in International Relations},
 
title = {Discourse and Emotions in International Relations},
 
journal = {International Studies Review},
 
journal = {International Studies Review},
author = {{Isr}},
+
author = {Isr},
 
year = {2017},
 
year = {2017},
 
   }
 
   }
Line 3,924: Line 3,603:
 
  |bibtex=@book{jamesPauloVirilio2007,
 
  |bibtex=@book{jamesPauloVirilio2007,
 
title = {Paulo Virilio},
 
title = {Paulo Virilio},
abstract = {Humanities},
 
 
author = {James, Ian},
 
author = {James, Ian},
 
year = {2007},
 
year = {2007},
Line 3,979: Line 3,657:
 
title = {The Exposition of artistic research},
 
title = {The Exposition of artistic research},
 
isbn = {978-94-006-0092-8},
 
isbn = {978-94-006-0092-8},
abstract = {The Exposition of Artistic Research: Publishing Art in Academia introduces the pioneering concept of 'expositions' in the context of art and design research, where practice needs to be exposed as research to enter academic discourse. It brings together reflective and methodological approaches to exposition writing from a variety of artistic disciplines including fine art, music and design, which it links to questions of publication and the use of technology. The book proposes a novel relationship to knowledge, where the form in which this knowledge emerges and the mode in which it is communicated makes a difference to what is known.
 
 
 
 
This book places artistic research in the heart of the academic debate. This book works around terms such as 'exposition', 'artistic research' and 'archiving' which are critical at a time when art is striving to find a place at the academic research table. It offers a new and fascinating view by bringing together reflective and methodological approaches to exposition writing from a variety of artistic disciplines, including design, music and fine art, linking it to questions of publication and the use of technology},
 
 
language = {eng},
 
language = {eng},
 
publisher = {Leiden University Press},
 
publisher = {Leiden University Press},
Line 4,067: Line 3,740:
 
  |bibtex=@article{revisor2995fd7c68e04b07ae85948db005d884,
 
  |bibtex=@article{revisor2995fd7c68e04b07ae85948db005d884,
 
title = {2995fd7c-68e0-4b07-ae85-948db005d884},
 
title = {2995fd7c-68e0-4b07-ae85-948db005d884},
author = {{Revisor}},
+
author = {Revisor},
 
   }
 
   }
 
}}
 
}}
Line 4,087: Line 3,760:
 
  |bibtex=@article{smithSourcebookExperientialEducation,
 
  |bibtex=@article{smithSourcebookExperientialEducation,
 
title = {Sourcebook of Experiential Education},
 
title = {Sourcebook of Experiential Education},
abstract = {Education},
+
author = {Smith and Thomas E. and Knapp and Clifford E.},
author = {{Smith} and {Thomas E.} and {Knapp} and {Clifford E.}},
 
 
   }
 
   }
 
}}
 
}}
Line 4,119: Line 3,791:
 
  |bibtex=@article{vladKoganPS4920Syllabus,
 
  |bibtex=@article{vladKoganPS4920Syllabus,
 
title = {Kogan\_PS4920\_Syllabus\_Final},
 
title = {Kogan\_PS4920\_Syllabus\_Final},
author = {{Vlad}},
+
author = {Vlad},
 
   }
 
   }
 
}}
 
}}
Line 4,135: Line 3,807:
 
issn = {1364-5579},
 
issn = {1364-5579},
 
doi = {10.1080/13645579.2015.1129143},
 
doi = {10.1080/13645579.2015.1129143},
abstract = {International Journal of Social Research Methodology, 2016. doi:10.1080/13645579.2015.1129143},
 
 
number = {1},
 
number = {1},
 
journal = {International Journal of Social Research Methodology},
 
journal = {International Journal of Social Research Methodology},
Line 4,150: Line 3,821:
 
issn = {1468-7941},
 
issn = {1468-7941},
 
doi = {10.1177/1468794116656036},
 
doi = {10.1177/1468794116656036},
abstract = {Qualitative Research 2017.17:37-53},
 
 
number = {1},
 
number = {1},
 
journal = {Qualitative Research},
 
journal = {Qualitative Research},
Line 4,184: Line 3,854:
 
  |bibtex=@book{banksVisualMethodsSocial2001,
 
  |bibtex=@book{banksVisualMethodsSocial2001,
 
title = {Visual Methods in Social Research},
 
title = {Visual Methods in Social Research},
abstract = {Sage Publications Ltd, 2001},
 
 
author = {Banks, Marcus},
 
author = {Banks, Marcus},
 
year = {2001},
 
year = {2001},
Line 4,196: Line 3,865:
 
issn = {1053-8259},
 
issn = {1053-8259},
 
doi = {10.1177/1053825917751457},
 
doi = {10.1177/1053825917751457},
abstract = {Journal of Experiential Education 2018.41:3-7},
 
 
number = {1},
 
number = {1},
 
journal = {Journal of Experiential Education},
 
journal = {Journal of Experiential Education},
Line 4,212: Line 3,880:
 
language = {eng},
 
language = {eng},
 
publisher = {SAGE},
 
publisher = {SAGE},
author = {{Banks} and {Marcus}},
+
author = {Banks and Marcus},
 
editor = {Banks, Marcus},
 
editor = {Banks, Marcus},
 
year = {2007},
 
year = {2007},
Line 4,221: Line 3,889:
 
  |bibtex=@article{apprichPatternDiscrimination,
 
  |bibtex=@article{apprichPatternDiscrimination,
 
title = {Pattern Discrimination},
 
title = {Pattern Discrimination},
abstract = {Algorithmic identity politics reinstate old forms of social segregation—in a digital world, identity politics is pattern discrimination. It is by recognizing patterns in input data that artificial intelligence algorithms create bias and practice racial exclusions thereby inscribing power relations into media. How can we filter information out of data without reinserting racist, sexist, and classist beliefs?},
 
 
author = {Apprich, Clemens},
 
author = {Apprich, Clemens},
 
   }
 
   }
Line 4,230: Line 3,897:
 
title = {John Oliver on police use of facial recognition: 'We’re about to cross a major line'},
 
title = {John Oliver on police use of facial recognition: 'We’re about to cross a major line'},
 
url = {https://www.theguardian.com/culture/2020/jun/15/john-oliver-police-use-facial-recognition?CMP=Share_iOSApp_Other},
 
url = {https://www.theguardian.com/culture/2020/jun/15/john-oliver-police-use-facial-recognition?CMP=Share_iOSApp_Other},
abstract = {The Last Week Tonight host tracks the chilling expansion of facial recognition technology in the US by law enforcement and the need for regulation},
 
 
urldate = {2020-06-16},
 
urldate = {2020-06-16},
 
journal = {The Guardian},
 
journal = {The Guardian},
Line 4,243: Line 3,909:
 
title = {Black Lives Matter could change facial recognition forever — if Big Tech doesn’t stand in the way},
 
title = {Black Lives Matter could change facial recognition forever — if Big Tech doesn’t stand in the way},
 
url = {https://www.washingtonpost.com/technology/2020/06/12/facial-recognition-ban/},
 
url = {https://www.washingtonpost.com/technology/2020/06/12/facial-recognition-ban/},
abstract = {Publicity stunts from IBM, Amazon and Microsoft won’t be enough to stop police from using facial recognition.},
 
 
urldate = {2020-06-22},
 
urldate = {2020-06-22},
 
journal = {The Washington Post},
 
journal = {The Washington Post},
Line 4,270: Line 3,935:
 
title = {California’s statehouse is considering a controversial facial recognition bill},
 
title = {California’s statehouse is considering a controversial facial recognition bill},
 
url = {https://www.theverge.com/2020/6/3/21279539/california-facial-recognition-ab2261-law-privacy-regulation},
 
url = {https://www.theverge.com/2020/6/3/21279539/california-facial-recognition-ab2261-law-privacy-regulation},
abstract = {The ACLU is squaring off against lawmakers over a bill that would provide a pathway for legal uses of facial recognition, both by police and private sector companies.},
 
 
urldate = {2020-04-06},
 
urldate = {2020-04-06},
 
journal = {The Verge},
 
journal = {The Verge},
Line 4,283: Line 3,947:
 
title = {IBM ends all facial recognition business as CEO calls out bias and inequality},
 
title = {IBM ends all facial recognition business as CEO calls out bias and inequality},
 
url = {https://techcrunch.com/2020/06/08/ibm-ends-all-facial-recognition-work-as-ceo-calls-out-bias-and-inequality/?guccounter=1},
 
url = {https://techcrunch.com/2020/06/08/ibm-ends-all-facial-recognition-work-as-ceo-calls-out-bias-and-inequality/?guccounter=1},
abstract = {IBM CEO Arvind Krishna announced today that the company would no longer sell facial recognition services, calling for a “national dialogue” on whether it should be used at all. He also voiced support for a new bill aiming to reduce police violence and increase accountability. In a letter reported by CNBC, written in support of […]},
 
 
urldate = {2020-06-22},
 
urldate = {2020-06-22},
 
journal = {TechCrunch},
 
journal = {TechCrunch},
Line 4,296: Line 3,959:
 
title = {We Asked 43 Facial Recognition Companies if They'll Refuse to Work With Cops},
 
title = {We Asked 43 Facial Recognition Companies if They'll Refuse to Work With Cops},
 
url = {https://www.vice.com/en_us/article/pkygg7/we-asked-43-facial-recognition-companies-if-theyll-refuse-to-work-with-cops},
 
url = {https://www.vice.com/en_us/article/pkygg7/we-asked-43-facial-recognition-companies-if-theyll-refuse-to-work-with-cops},
abstract = {After IBM and Amazon pulled access to its facial recognition software from law enforcement, we asked other companies that advertise the technology if they'll follow suit.},
 
 
urldate = {2020-06-22},
 
urldate = {2020-06-22},
 
year = {2020},
 
year = {2020},
Line 4,306: Line 3,968:
 
title = {Microsoft Pitched Facial Recognition To The DEA},
 
title = {Microsoft Pitched Facial Recognition To The DEA},
 
url = {https://www.buzzfeednews.com/article/ryanmac/microsoft-pitched-facial-recognition-dea-drug-enforcement?scrolla=5eb6d68b7fedc32c19ef33b4},
 
url = {https://www.buzzfeednews.com/article/ryanmac/microsoft-pitched-facial-recognition-dea-drug-enforcement?scrolla=5eb6d68b7fedc32c19ef33b4},
abstract = {Last week, Microsoft said it would not sell its facial recognition to police departments. But new documents reveal it was pitching that technology to at least one federal agency as recently as two yea},
 
 
urldate = {2020-06-22},
 
urldate = {2020-06-22},
 
journal = {BuzzFeed News},
 
journal = {BuzzFeed News},
Line 4,320: Line 3,981:
 
issn = {1553-8095},
 
issn = {1553-8095},
 
url = {https://www.nytimes.com/2020/06/24/technology/facial-recognition-arrest.html},
 
url = {https://www.nytimes.com/2020/06/24/technology/facial-recognition-arrest.html},
abstract = {In what may be the first known case of its kind, a faulty facial recognition match led to a Michigan man’s arrest for a crime he did not commit.},
 
 
urldate = {2020-06-27},
 
urldate = {2020-06-27},
 
journal = {The New York Times},
 
journal = {The New York Times},
Line 4,343: Line 4,003:
 
title = {IBM Abandons Facial Recognition Products, Condemns Racially Biased Surveillance},
 
title = {IBM Abandons Facial Recognition Products, Condemns Racially Biased Surveillance},
 
url = {https://www.npr.org/2020/06/09/873298837/ibm-abandons-facial-recognition-products-condemns-racially-biased-surveillance?t=1593274615472},
 
url = {https://www.npr.org/2020/06/09/873298837/ibm-abandons-facial-recognition-products-condemns-racially-biased-surveillance?t=1593274615472},
abstract = {IBM is the first major technology company to walk away from facial recognition technology amid nationwide protests for racial justice and police reform. Amazon and Microsoft have not followed.},
 
 
urldate = {2020-06-27},
 
urldate = {2020-06-27},
 
journal = {NPR},
 
journal = {NPR},
Line 4,363: Line 4,022:
 
title = {Why face-recognition technology has a bias problem},
 
title = {Why face-recognition technology has a bias problem},
 
url = {https://www.cbsnews.com/news/facial-recognition-systems-racism-protests-police-bias/},
 
url = {https://www.cbsnews.com/news/facial-recognition-systems-racism-protests-police-bias/},
abstract = {As racial bias in policing becomes a national issue, the focus is turning to the tech that critics say enables it.},
 
 
urldate = {2020-06-27},
 
urldate = {2020-06-27},
 
journal = {CBS News},
 
journal = {CBS News},
Line 4,376: Line 4,034:
 
title = {Federal study confirms racial bias of many facial-recognition systems, casts doubt on their expanding use},
 
title = {Federal study confirms racial bias of many facial-recognition systems, casts doubt on their expanding use},
 
url = {https://www.washingtonpost.com/technology/2019/12/19/federal-study-confirms-racial-bias-many-facial-recognition-systems-casts-doubt-their-expanding-use/},
 
url = {https://www.washingtonpost.com/technology/2019/12/19/federal-study-confirms-racial-bias-many-facial-recognition-systems-casts-doubt-their-expanding-use/},
abstract = {Researchers found that most facial-recognition algorithms exhibit “demographic differentials” that can worsen their accuracy based on a person’s age, gender or race.},
 
 
urldate = {2020-06-27},
 
urldate = {2020-06-27},
 
journal = {The Washington Post},
 
journal = {The Washington Post},
Line 4,388: Line 4,045:
 
title = {Amazon's Facial Recognition System Mistakes Members of Congress for Mugshots},
 
title = {Amazon's Facial Recognition System Mistakes Members of Congress for Mugshots},
 
url = {https://www.wired.com/story/amazon-facial-recognition-congress-bias-law-enforcement/},
 
url = {https://www.wired.com/story/amazon-facial-recognition-congress-bias-law-enforcement/},
abstract = {Amazon has marketed its Rekognition facial recognition system to law enforcement. But in a new ACLU study, the technology confused 28 members of Congress with publicly available arrest photos.},
 
 
urldate = {2020-06-27},
 
urldate = {2020-06-27},
 
journal = {WIRED},
 
journal = {WIRED},
Line 4,401: Line 4,057:
 
title = {Face-scanning 'criminal predictor' sparks bias row},
 
title = {Face-scanning 'criminal predictor' sparks bias row},
 
url = {https://www.bbc.com/news/technology-53165286},
 
url = {https://www.bbc.com/news/technology-53165286},
abstract = {A university that says it can scan faces to predict if someone is a criminal has come under fire.},
 
 
urldate = {2020-06-27},
 
urldate = {2020-06-27},
 
journal = {BBC News},
 
journal = {BBC News},
Line 4,413: Line 4,068:
 
title = {Why facial recognition's racial bias problem is so hard to crack},
 
title = {Why facial recognition's racial bias problem is so hard to crack},
 
url = {https://www.cnet.com/news/why-facial-recognitions-racial-bias-problem-is-so-hard-to-crack/},
 
url = {https://www.cnet.com/news/why-facial-recognitions-racial-bias-problem-is-so-hard-to-crack/},
abstract = {Good luck if you're a woman or a darker-skinned person.},
 
 
urldate = {2020-06-27},
 
urldate = {2020-06-27},
 
journal = {CNET},
 
journal = {CNET},
Line 4,426: Line 4,080:
 
title = {Congress moves toward facial recognition regulation},
 
title = {Congress moves toward facial recognition regulation},
 
url = {https://venturebeat.com/2020/01/15/congress-moves-toward-facial-recognition-regulation/},
 
url = {https://venturebeat.com/2020/01/15/congress-moves-toward-facial-recognition-regulation/},
abstract = {Progressive and conservative members of Congress may introduce legislation to regulate facial recognition use in the "very near future."},
 
 
urldate = {2020-06-27},
 
urldate = {2020-06-27},
 
journal = {VentureBeat},
 
journal = {VentureBeat},
Line 4,439: Line 4,092:
 
title = {Clearview to rely on First Amendment to defend its face-tracking tech},
 
title = {Clearview to rely on First Amendment to defend its face-tracking tech},
 
url = {https://www.engadget.com/clearview-first-amendment-lawsuit-defense-181859840.html},
 
url = {https://www.engadget.com/clearview-first-amendment-lawsuit-defense-181859840.html},
abstract = {The CEO has been banging this drum since the lawsuits starting rolling in.},
 
 
urldate = {2020-08-13},
 
urldate = {2020-08-13},
 
journal = {Engadget},
 
journal = {Engadget},
Line 4,452: Line 4,104:
 
title = {What happens when an algorithm gets it wrong},
 
title = {What happens when an algorithm gets it wrong},
 
url = {https://www.technologyreview.com/2020/08/12/1006636/face-recognition-algorithm-false-arrest-police-robert-williams/},
 
url = {https://www.technologyreview.com/2020/08/12/1006636/face-recognition-algorithm-false-arrest-police-robert-williams/},
abstract = {The odd thing about Robert William's false arrest wasn't that police used face recognition to ID him. It's that they told him about it.},
 
 
urldate = {2020-08-13},
 
urldate = {2020-08-13},
 
journal = {MIT Technology Review},
 
journal = {MIT Technology Review},
Line 4,464: Line 4,115:
 
title = {Fawkes photo tool lets anyone secretly 'poison' facial recognition systems},
 
title = {Fawkes photo tool lets anyone secretly 'poison' facial recognition systems},
 
url = {https://www.slashgear.com/fawkes-photo-tool-lets-anyone-secretly-poison-facial-recognition-systems-12633132/},
 
url = {https://www.slashgear.com/fawkes-photo-tool-lets-anyone-secretly-poison-facial-recognition-systems-12633132/},
abstract = {The Internet is packed full of billions of photos, many of which are lost into the depths of abandoned accounts and old hosting services. A huge number of this},
 
 
urldate = {2020-08-13},
 
urldate = {2020-08-13},
 
journal = {SlashGear},
 
journal = {SlashGear},
Line 4,477: Line 4,127:
 
title = {Facial recognition in schools risks making racism worse},
 
title = {Facial recognition in schools risks making racism worse},
 
url = {https://www.futurity.org/facial-recognition-schools-racism-2421362/},
 
url = {https://www.futurity.org/facial-recognition-schools-racism-2421362/},
abstract = {Deploying the use of facial recognition technology in schools "without understanding its implications would be unethical and dangerous," experts argue.},
 
 
urldate = {2020-08-13},
 
urldate = {2020-08-13},
 
journal = {Futurity},
 
journal = {Futurity},
Line 4,490: Line 4,139:
 
title = {Los Angeles sheriff's deputies to get body-worn cameras},
 
title = {Los Angeles sheriff's deputies to get body-worn cameras},
 
url = {https://apnews.com/1cb2fb54e93c46c392f55cbdc0dd7a05},
 
url = {https://apnews.com/1cb2fb54e93c46c392f55cbdc0dd7a05},
abstract = {LOS ANGELES (AP) — Los Angeles County deputies, who make up the largest sheriff's department in the nation, will begin getting body-worn cameras in October, the sheriff's announced...},
 
 
urldate = {2020-08-13},
 
urldate = {2020-08-13},
 
journal = {Associated Press},
 
journal = {Associated Press},
Line 4,510: Line 4,158:
 
title = {How video chat fuels the American deportation machine},
 
title = {How video chat fuels the American deportation machine},
 
url = {https://www.theverge.com/21408606/ice-immigrant-detention-centers-video-chats-deportation-refugees-asylum},
 
url = {https://www.theverge.com/21408606/ice-immigrant-detention-centers-video-chats-deportation-refugees-asylum},
abstract = {The Verge’s year-long investigation explores the cruel bureaucracy of ICE’s immigrant detention centers. Reporter Gaby Del Valle follows Samuel, a Cameroonian refugee, tracing his journey through the US’s deliberately confusing process to request asylum.},
 
 
urldate = {2020-10-09},
 
urldate = {2020-10-09},
 
journal = {The Verge},
 
journal = {The Verge},
Line 4,523: Line 4,170:
 
title = {Facial recognition used to arrest protestor at Trump bible photo op},
 
title = {Facial recognition used to arrest protestor at Trump bible photo op},
 
url = {https://mashable.com/article/facial-recognition-arrest-black-lives-matter-protestor-trump-bible-photo-op/?europe=true},
 
url = {https://mashable.com/article/facial-recognition-arrest-black-lives-matter-protestor-trump-bible-photo-op/?europe=true},
abstract = {Law enforcement used images pulled off Twitter, combined with a little known facial recognition system, to identify a protestor.},
 
 
urldate = {2020-03-11},
 
urldate = {2020-03-11},
 
journal = {Mashable},
 
journal = {Mashable},
Line 4,536: Line 4,182:
 
title = {ICE just signed a contract with facial recognition company Clearview AI},
 
title = {ICE just signed a contract with facial recognition company Clearview AI},
 
url = {https://www.theverge.com/2020/8/14/21368930/clearview-ai-ice-contract-privacy-immigration},
 
url = {https://www.theverge.com/2020/8/14/21368930/clearview-ai-ice-contract-privacy-immigration},
abstract = {Immigration and Customs Enforcement has signed a contract with facial recognition company Clearview AI for “mission support,” government contracting records show.},
 
 
urldate = {2020-08-16},
 
urldate = {2020-08-16},
 
journal = {The Verge},
 
journal = {The Verge},
Line 4,549: Line 4,194:
 
title = {New York City says it will reassess police use of facial recognition},
 
title = {New York City says it will reassess police use of facial recognition},
 
url = {https://www.engadget.com/new-york-city-facial-recongition-223931035.html?guccounter=1},
 
url = {https://www.engadget.com/new-york-city-facial-recongition-223931035.html?guccounter=1},
abstract = {The decision comes as cities across the US reevaluate the controversial technology.},
 
 
urldate = {2020-08-18},
 
urldate = {2020-08-18},
 
journal = {Engadget},
 
journal = {Engadget},
Line 4,562: Line 4,206:
 
title = {Amsterdam and Helsinki launch algorithm registries to bring transparency to public deployments of AI},
 
title = {Amsterdam and Helsinki launch algorithm registries to bring transparency to public deployments of AI},
 
url = {https://venturebeat.com/2020/09/28/amsterdam-and-helsinki-launch-algorithm-registries-to-bring-transparency-to-public-deployments-of-ai/},
 
url = {https://venturebeat.com/2020/09/28/amsterdam-and-helsinki-launch-algorithm-registries-to-bring-transparency-to-public-deployments-of-ai/},
abstract = {Amsterdam and Helsinki today launched AI registries to detail how each city uses algorithms to deliver services.},
 
 
urldate = {2020-01-10},
 
urldate = {2020-01-10},
 
journal = {VentureBeat},
 
journal = {VentureBeat},
Line 4,575: Line 4,218:
 
title = {Belarus Protesters Use AI to 'Unmask' Riot Police Wearing Face Coverings},
 
title = {Belarus Protesters Use AI to 'Unmask' Riot Police Wearing Face Coverings},
 
url = {https://petapixel.com/2020/09/29/belarus-protesters-use-ai-to-unmask-riot-police-wearing-face-coverings/},
 
url = {https://petapixel.com/2020/09/29/belarus-protesters-use-ai-to-unmask-riot-police-wearing-face-coverings/},
abstract = {Photography and Camera News, Reviews, and Inspiration},
 
 
urldate = {2020-09-29},
 
urldate = {2020-09-29},
 
   }
 
   }
Line 4,585: Line 4,227:
 
url = {https://logicmag.io/care/informatics-of-the-oppressed/},
 
url = {https://logicmag.io/care/informatics-of-the-oppressed/},
 
urldate = {2020-10-19},
 
urldate = {2020-10-19},
author = {{Logic Magazine}},
+
author = {Logic Magazine},
 
   }
 
   }
 
}}
 
}}
Line 4,595: Line 4,237:
 
issn = {00027294},
 
issn = {00027294},
 
doi = {10.1111/aman.13248},
 
doi = {10.1111/aman.13248},
abstract = {American Anthropologist 2019.121:517-524},
 
 
number = {2},
 
number = {2},
 
journal = {American Anthropologist},
 
journal = {American Anthropologist},
Line 4,610: Line 4,251:
 
issn = {00027294},
 
issn = {00027294},
 
doi = {10.1111/aman.13183},
 
doi = {10.1111/aman.13183},
abstract = {American Anthropologist 0.0:null-null},
 
 
number = {1},
 
number = {1},
 
journal = {American Anthropologist},
 
journal = {American Anthropologist},
Line 4,638: Line 4,278:
 
title = {Activists urge EU to ban live facial recognition in public spaces},
 
title = {Activists urge EU to ban live facial recognition in public spaces},
 
url = {https://www.politico.eu/article/activists-urge-eu-to-ban-live-facial-recognition-in-public-spaces/},
 
url = {https://www.politico.eu/article/activists-urge-eu-to-ban-live-facial-recognition-in-public-spaces/},
abstract = {12 organizations join forces to make their voice heard in a debate dominated by the tech industry.},
 
 
urldate = {2021-10-02},
 
urldate = {2021-10-02},
 
journal = {POLITICO},
 
journal = {POLITICO},
Line 4,667: Line 4,306:
 
title = {Europe Limits Government by Algorithm. The US, Not So Much},
 
title = {Europe Limits Government by Algorithm. The US, Not So Much},
 
url = {https://www.wired.com/story/europe-limits-government-algorithm-us-not-much/},
 
url = {https://www.wired.com/story/europe-limits-government-algorithm-us-not-much/},
abstract = {A Dutch court halted a program to identify people more likely to commit benefits fraud. Critics said it discriminated against immigrants and low-income residents.},
 
 
urldate = {2021-10-02},
 
urldate = {2021-10-02},
 
journal = {WIRED},
 
journal = {WIRED},
Line 4,681: Line 4,319:
 
title = {Facial recognition: EU considers ban of up to five years},
 
title = {Facial recognition: EU considers ban of up to five years},
 
url = {https://www.bbc.com/news/technology-51148501},
 
url = {https://www.bbc.com/news/technology-51148501},
abstract = {The European Commission wants time to work out how to prevent the technology being abused.},
 
 
urldate = {2021-02-10},
 
urldate = {2021-02-10},
 
journal = {BBC News},
 
journal = {BBC News},
Line 4,694: Line 4,331:
 
title = {10 facial recognition startups from Europe you should know about in 2019 {\textbar} Silicon Canals},
 
title = {10 facial recognition startups from Europe you should know about in 2019 {\textbar} Silicon Canals},
 
url = {https://siliconcanals.com/news/facial-recognition-startups-in-2019/},
 
url = {https://siliconcanals.com/news/facial-recognition-startups-in-2019/},
abstract = {European technology news from the startup ecosystem. Founder and publisher: Remco Janssen. Follow us on Twitter: @siliconcanals.},
 
 
urldate = {2019-05-11},
 
urldate = {2019-05-11},
author = {{Silicon Canals}},
+
author = {Silicon Canals},
 
keywords = {europe, startups},
 
keywords = {europe, startups},
 
   }
 
   }
Line 4,705: Line 4,341:
 
title = {How facial recognition is taking over a French city},
 
title = {How facial recognition is taking over a French city},
 
url = {https://www.politico.eu/article/how-facial-recognition-is-taking-over-a-french-riviera-city/},
 
url = {https://www.politico.eu/article/how-facial-recognition-is-taking-over-a-french-riviera-city/},
abstract = {European authorities are competing to deploy facial recognition tech. Nice in southern France is in the lead.},
 
 
urldate = {2021-10-02},
 
urldate = {2021-10-02},
 
journal = {POLITICO},
 
journal = {POLITICO},
Line 4,719: Line 4,354:
 
title = {The many faces of facial recognition in the EU - European Digital Rights (EDRi)},
 
title = {The many faces of facial recognition in the EU - European Digital Rights (EDRi)},
 
url = {https://edri.org/our-work/the-many-faces-of-facial-recognition-in-the-eu/},
 
url = {https://edri.org/our-work/the-many-faces-of-facial-recognition-in-the-eu/},
abstract = {In this second installment of EDRi's facial recognition and fundamental rights series, we look at how different EU Member States, institutions and other countries worldwide are responding to the use of this tech in public spaces.},
 
 
urldate = {2020-09-09},
 
urldate = {2020-09-09},
author = {{European Digital Rights}},
+
author = {European Digital Rights},
 
   }
 
   }
 
}}
 
}}
Line 4,729: Line 4,363:
 
title = {Facial recognition tech developed by Clearview AI could be illegal in Europe, privacy group says},
 
title = {Facial recognition tech developed by Clearview AI could be illegal in Europe, privacy group says},
 
url = {https://www.cnbc.com/2020/06/11/clearview-ai-facial-recognition-europe.html},
 
url = {https://www.cnbc.com/2020/06/11/clearview-ai-facial-recognition-europe.html},
abstract = {The European Data Protection Board warned on Wednesday that Clearview AI's technology is likely to be illegal in Europe.},
 
 
urldate = {2021-10-02},
 
urldate = {2021-10-02},
 
journal = {CNBC},
 
journal = {CNBC},
Line 4,743: Line 4,376:
 
title = {An Overview to Computer Vision That’s Redefining Surveillance {\textbar} Analytics Steps},
 
title = {An Overview to Computer Vision That’s Redefining Surveillance {\textbar} Analytics Steps},
 
url = {https://www.instapaper.com/read/1386737517},
 
url = {https://www.instapaper.com/read/1386737517},
abstract = {A simple tool for saving web pages to read later on your iPhone, iPad, Android, computer, or Kindle.},
 
 
urldate = {2021-12-02},
 
urldate = {2021-12-02},
 
   }
 
   }
Line 4,754: Line 4,386:
 
issn = {0162-2439},
 
issn = {0162-2439},
 
doi = {10.1177/0162243919897822},
 
doi = {10.1177/0162243919897822},
abstract = {Science, Technology, \& Human Values 2020.45:199-211},
 
 
number = {2},
 
number = {2},
 
journal = {Science, Technology, \& Human Values},
 
journal = {Science, Technology, \& Human Values},
Line 4,770: Line 4,401:
 
issn = {0306-3127},
 
issn = {0306-3127},
 
doi = {10.1177/0306312713511868},
 
doi = {10.1177/0306312713511868},
abstract = {This article explores the resonating figures of primate, child, and robot in contemporary technoscientific corporealizations of the 'almost human'. We take as our model (in)organism 'Lucy the Robot Orangutan', roboticist Steve Grand's project to create an artificial life form with a mind of its own. One aspect of Lucy's figuration by Grand, we argue, which ties her to Haraway's analysis of the primate, is of the robot as a model for animal, and more specifically (or aspirationally) human, cognition. We follow the trope of 'model organism' as it is under discussion within science and technology studies and as an ironic descriptor for our own interest in Lucy as an entity/project through which to illuminate figurations within robotics more widely. Primate and robot together are forms of natureculture that help to clarify how the categories of animal and machine are entangled, while making explicit investments in their differences from one another, and from the third category of the human. We conclude, again following Haraway, by imagining what other possibilities there might be for figuring humans, robots, and their relations if we escape the reiterative imaginary of the robot as proxy for becoming human.},
 
 
language = {eng},
 
language = {eng},
 
number = {3},
 
number = {3},
Line 4,785: Line 4,415:
 
title = {Facial Recognition in Europe: Security Problem? {\textbar} IDC UK Blog},
 
title = {Facial Recognition in Europe: Security Problem? {\textbar} IDC UK Blog},
 
url = {https://blog-idcuk.com/facial-recognition-in-europe-a-battle-between-privacy-and-surveillance/},
 
url = {https://blog-idcuk.com/facial-recognition-in-europe-a-battle-between-privacy-and-surveillance/},
abstract = {Legislators are exploring ways to control the use of facial recognition in Europe through legislation, which would limit the indiscriminate use of it},
 
 
urldate = {2020-09-06},
 
urldate = {2020-09-06},
author = {{IDC UK Blog}},
+
author = {IDC UK Blog},
 
year = {2019},
 
year = {2019},
 
   }
 
   }
Line 4,796: Line 4,425:
 
title = {Facial Recognition in 2021 (with examples)},
 
title = {Facial Recognition in 2021 (with examples)},
 
url = {https://www.thalesgroup.com/en/markets/digital-identity-and-security/government/biometrics/facial-recognition},
 
url = {https://www.thalesgroup.com/en/markets/digital-identity-and-security/government/biometrics/facial-recognition},
abstract = {Facial recognition is a hot topic and somewhat controversial. Discover 7 trends likely to shape the face recognition landscape for the next 2 years.},
 
 
urldate = {2021-10-02},
 
urldate = {2021-10-02},
 
   }
 
   }
Line 4,805: Line 4,433:
 
title = {Four Ways Computer Vision Is Transforming Physical Security},
 
title = {Four Ways Computer Vision Is Transforming Physical Security},
 
url = {https://www.forbes.com/sites/forbestechcouncil/2019/09/23/four-ways-computer-vision-is-transforming-physical-security/},
 
url = {https://www.forbes.com/sites/forbestechcouncil/2019/09/23/four-ways-computer-vision-is-transforming-physical-security/},
abstract = {By better deriving intent from objects and motions and filtering out the false alarms, computer vision shows enormous potential as a risk reduction tool and an information filter to help security personnel be more effective at their jobs.},
 
 
urldate = {2021-12-02},
 
urldate = {2021-12-02},
 
journal = {Forbes},
 
journal = {Forbes},
Line 4,820: Line 4,447:
 
issn = {0306-3127},
 
issn = {0306-3127},
 
doi = {10.1177/0306312710389226},
 
doi = {10.1177/0306312710389226},
abstract = {Based on three ethnographic vignettes describing the engagements of a small start-up company with prospective competitors, partners and customers, this paper shows how commercial considerations are folded into the ways visual images become 'seeable'. When company members mount demonstrations of prototype mammography software, they seek to generate interest but also to protect their intellectual property. Pivotal to these efforts to manage revelation and concealment is the visual interface, which is variously performed as obstacle and ally in the development of a profitable product. Using the concept of 'face value', the paper seeks to develop further insight into contemporary dynamics of seeing and showing by tracing the way techno-visual presentations and commercial considerations become entangled in practice. It also draws attention to the salience and significance of enactments of surface and depth in image-based practices.},
 
 
language = {eng},
 
language = {eng},
 
number = {2},
 
number = {2},
Line 4,837: Line 4,463:
 
issn = {0269-1728},
 
issn = {0269-1728},
 
doi = {10.1080/02691728.2015.1015062},
 
doi = {10.1080/02691728.2015.1015062},
abstract = {Social Epistemology, 2015. doi:10.1080/02691728.2015.1015062},
 
 
number = {3},
 
number = {3},
 
journal = {Social Epistemology},
 
journal = {Social Epistemology},
Line 4,866: Line 4,491:
 
issn = {0162-2439},
 
issn = {0162-2439},
 
doi = {10.1177/0162243919835302},
 
doi = {10.1177/0162243919835302},
abstract = {Science, Technology, \& Human Values 2020.45:235-261},
 
 
number = {2},
 
number = {2},
 
journal = {Science, Technology, \& Human Values},
 
journal = {Science, Technology, \& Human Values},
Line 4,882: Line 4,506:
 
issn = {0162-2439},
 
issn = {0162-2439},
 
doi = {10.1177/0162243917715106},
 
doi = {10.1177/0162243917715106},
abstract = {Science, Technology, \& Human Values 2017.42:1003-1030},
 
 
number = {6},
 
number = {6},
 
journal = {Science, Technology, \& Human Values},
 
journal = {Science, Technology, \& Human Values},
Line 4,898: Line 4,521:
 
issn = {0162-2439},
 
issn = {0162-2439},
 
doi = {10.1177/0162243911409248},
 
doi = {10.1177/0162243911409248},
abstract = {Science, Technology, \& Human Values 2012.37:264-285},
 
 
number = {2},
 
number = {2},
 
journal = {Science, Technology, \& Human Values},
 
journal = {Science, Technology, \& Human Values},
Line 4,914: Line 4,536:
 
issn = {2053-9517},
 
issn = {2053-9517},
 
doi = {10.1177/2053951720969208},
 
doi = {10.1177/2053951720969208},
abstract = {Big Data \& Society 2020.7:2053951720969208},
 
 
number = {2},
 
number = {2},
 
journal = {Big Data \& Society},
 
journal = {Big Data \& Society},
Line 4,956: Line 4,577:
 
issn = {0306-3127},
 
issn = {0306-3127},
 
doi = {10.1177/0306312712444645},
 
doi = {10.1177/0306312712444645},
abstract = {Soc Stud Sci 2012.42:393-414},
 
 
number = {3},
 
number = {3},
 
journal = {Social Studies of Science},
 
journal = {Social Studies of Science},
Line 4,972: Line 4,592:
 
issn = {0263-2764},
 
issn = {0263-2764},
 
doi = {10.1177/0263276419847508},
 
doi = {10.1177/0263276419847508},
abstract = {Theory, Culture \& Society 2019.36:3-22},
 
 
number = {5},
 
number = {5},
 
journal = {Theory, Culture \& Society},
 
journal = {Theory, Culture \& Society},
Line 4,993: Line 4,612:
 
issn = {0951-5666},
 
issn = {0951-5666},
 
doi = {10.1007/s00146-020-01093-w},
 
doi = {10.1007/s00146-020-01093-w},
abstract = {AI \& SOCIETY, https://doi.org/10.1007/s00146-020-01093-w},
 
 
journal = {AI \& SOCIETY},
 
journal = {AI \& SOCIETY},
 
author = {Malevé, Nicolas},
 
author = {Malevé, Nicolas},
Line 5,020: Line 4,638:
 
issn = {0278-0097},
 
issn = {0278-0097},
 
doi = {10.1109/MTS.2018.2857600},
 
doi = {10.1109/MTS.2018.2857600},
abstract = {IEEE Technology and Society Magazine;2018;37;3;10.1109/MTS.2018.2857600},
 
 
number = {3},
 
number = {3},
 
journal = {IEEE Technology and Society Magazine},
 
journal = {IEEE Technology and Society Magazine},
Line 5,039: Line 4,656:
 
  |bibtex=@article{wolff-michaelrothandg.michaelbowenDigitizingLizards,
 
  |bibtex=@article{wolff-michaelrothandg.michaelbowenDigitizingLizards,
 
title = {Digitizing Lizards},
 
title = {Digitizing Lizards},
abstract = {Soc Stud Sci 1999.29:719-764},
+
author = {Wolff-Michael Roth and G. Michael Bowen},
author = {{Wolff-Michael Roth and G. Michael Bowen}},
 
 
   }
 
   }
 
}}
 
}}
Line 5,069: Line 4,685:
 
issn = {2053-9517},
 
issn = {2053-9517},
 
doi = {10.1177/2053951717736338},
 
doi = {10.1177/2053951717736338},
abstract = {Big Data \& Society 2017.4:2053951717736338},
 
 
number = {2},
 
number = {2},
 
journal = {Big Data \& Society},
 
journal = {Big Data \& Society},
Line 5,101: Line 4,716:
 
isbn = {978-1-4780-0831-6},
 
isbn = {978-1-4780-0831-6},
 
shorttitle = {Cloud Ethics},
 
shorttitle = {Cloud Ethics},
abstract = {In Cloud Ethics Louise Amoore examines how machine learning algorithms are transforming the ethics and politics of contemporary society. Conceptualizing algorithms as ethicopolitical entities that are entangled with the data attributes of people, Amoore outlines how algorithms give incomplete accounts of themselves, learn through relationships with human practices, and exist in the world in ways that exceed their source code. In these ways, algorithms and their relations to people cannot be understood by simply examining their code, nor can ethics be encoded into algorithms. Instead, Amoore locates the ethical responsibility of algorithms in the conditions of partiality and opacity that haunt both human and algorithmic decisions. To this end, she proposes what she calls cloud ethics—an approach to holding algorithms accountable by engaging with the social and technical conditions under which they emerge and operate.},
 
 
language = {English},
 
language = {English},
 
publisher = {Duke University Press Books},
 
publisher = {Duke University Press Books},
Line 5,124: Line 4,738:
 
volume = {21},
 
volume = {21},
 
isbn = {0-8166-4969-3},
 
isbn = {0-8166-4969-3},
abstract = {9780816649686},
 
 
publisher = {University of Minnesota Press},
 
publisher = {University of Minnesota Press},
 
author = {Wahlberg, Malin},
 
author = {Wahlberg, Malin},
Line 5,159: Line 4,772:
 
  |bibtex=@article{blipparWhatComputerVision,
 
  |bibtex=@article{blipparWhatComputerVision,
 
title = {What is Computer Vision – Post 5: A Very Quick History - Blog - Blippar},
 
title = {What is Computer Vision – Post 5: A Very Quick History - Blog - Blippar},
author = {{Blippar}},
+
author = {Blippar},
 
   }
 
   }
 
}}
 
}}
Line 5,178: Line 4,791:
 
  |bibtex=@article{bynicholasmirzoeffVisualCultureReader,
 
  |bibtex=@article{bynicholasmirzoeffVisualCultureReader,
 
title = {The visual culture reader},
 
title = {The visual culture reader},
author = {{By Nicholas Mirzoeff}},
+
author = {By Nicholas Mirzoeff},
 
   }
 
   }
 
}}
 
}}
Line 5,186: Line 4,799:
 
title = {LAPD to end controversial program that aimed to predict crime},
 
title = {LAPD to end controversial program that aimed to predict crime},
 
url = {https://www.latimes.com/california/story/2020-04-21/lapd-ends-predictive-policing-program},
 
url = {https://www.latimes.com/california/story/2020-04-21/lapd-ends-predictive-policing-program},
abstract = {Chief Moore says, due to financial constraints caused by the pandemic, the LAPD will end a program that predicts where property crimes could occur.},
 
 
urldate = {2020-04-21},
 
urldate = {2020-04-21},
 
author = {Miller, Leila},
 
author = {Miller, Leila},
Line 5,211: Line 4,823:
 
issn = {1750-3280},
 
issn = {1750-3280},
 
doi = {10.1080/17503280.2019.1696147},
 
doi = {10.1080/17503280.2019.1696147},
abstract = {Studies in Documentary Film, 2019. doi:10.1080/17503280.2019.1696147},
 
 
journal = {Studies in Documentary Film},
 
journal = {Studies in Documentary Film},
 
author = {Boczkowska, Kornelia},
 
author = {Boczkowska, Kornelia},
Line 5,239: Line 4,850:
 
issn = {1750-3280},
 
issn = {1750-3280},
 
doi = {10.1080/17503280.2019.1672917},
 
doi = {10.1080/17503280.2019.1672917},
abstract = {Studies in Documentary Film, 2019. doi:10.1080/17503280.2019.1672917},
 
 
number = {3},
 
number = {3},
 
journal = {Studies in Documentary Film},
 
journal = {Studies in Documentary Film},
Line 5,253: Line 4,863:
 
issn = {1750-3280},
 
issn = {1750-3280},
 
doi = {10.1080/17503280.2019.1696146},
 
doi = {10.1080/17503280.2019.1696146},
abstract = {Studies in Documentary Film, 2019. doi:10.1080/17503280.2019.1696146},
 
 
journal = {Studies in Documentary Film},
 
journal = {Studies in Documentary Film},
 
author = {Jurich, Joscelyn},
 
author = {Jurich, Joscelyn},
Line 5,281: Line 4,890:
 
issn = {1750-3280},
 
issn = {1750-3280},
 
doi = {10.1080/17503280.2019.1672920},
 
doi = {10.1080/17503280.2019.1672920},
abstract = {Studies in Documentary Film, 2019. doi:10.1080/17503280.2019.1672920},
 
 
number = {3},
 
number = {3},
 
journal = {Studies in Documentary Film},
 
journal = {Studies in Documentary Film},
Line 5,308: Line 4,916:
 
title = {Social Choice in Machine Design: The Case of Automatically Controlled Machine Tools, and a Challenge for Labor},
 
title = {Social Choice in Machine Design: The Case of Automatically Controlled Machine Tools, and a Challenge for Labor},
 
volume = {8},
 
volume = {8},
abstract = {Politics \& Society 1978.8:313-347},
 
 
number = {3-4},
 
number = {3-4},
 
author = {Noble, David F.},
 
author = {Noble, David F.},
Line 5,347: Line 4,954:
 
title = {Utah pauses Banjo's AI surveillance after learning of owner's racist past},
 
title = {Utah pauses Banjo's AI surveillance after learning of owner's racist past},
 
url = {https://www.engadget.com/utah-suspends-use-of-banjo-surveillance-205243913.html},
 
url = {https://www.engadget.com/utah-suspends-use-of-banjo-surveillance-205243913.html},
abstract = {Utah authorities have put use of Banjo's surveillance tech on hold while they investigate for bias due to the owner's racist past.},
 
 
urldate = {2020-04-29},
 
urldate = {2020-04-29},
 
journal = {Engadget},
 
journal = {Engadget},
Line 5,359: Line 4,965:
 
  |bibtex=@article{abu-el-haijaYouTube8MLargeScaleVideo27,
 
  |bibtex=@article{abu-el-haijaYouTube8MLargeScaleVideo27,
 
title = {YouTube-8M: A Large-Scale Video Classification Benchmark},
 
title = {YouTube-8M: A Large-Scale Video Classification Benchmark},
abstract = {Many recent advancements in Computer Vision are attributed to large datasets. Open-source software packages for Machine Learning and inexpensive commodity hardware have reduced the barrier of entry for exploring novel approaches at scale. It is possible to train models over millions of examples within a few days. Although large-scale datasets exist for image understanding, such as ImageNet, there are no comparable size video classification datasets.  In this paper, we introduce YouTube-8M, the largest multi-label video classification dataset, composed of {\textasciitilde}8 million videos (500K hours of video), annotated with a vocabulary of 4800 visual entities. To get the videos and their labels, we used a YouTube video annotation system, which labels videos with their main topics. While the labels are machine-generated, they have high-precision and are derived from a variety of human-based signals including metadata and query click signals. We filtered the video labels (Knowledge Graph entities) using both automated and manual curation strategies, including asking human raters if the labels are visually recognizable. Then, we decoded each video at one-frame-per-second, and used a Deep CNN pre-trained on ImageNet to extract the hidden representation immediately prior to the classification layer. Finally, we compressed the frame features and make both the features and video-level labels available for download.  We trained various (modest) classification models on the dataset, evaluated them using popular evaluation metrics, and report them as baselines. Despite the size of the dataset, some of our models train to convergence in less than a day on a single machine using TensorFlow. We plan to release code for training a TensorFlow model and for computing metrics.},
 
 
author = {Abu-El-Haija, Sami and Kothari, Nisarg and Lee, Joonseok and Natsev, Paul and Toderici, George and Varadarajan, Balakrishnan and Vijayanarasimhan, Sudheendra},
 
author = {Abu-El-Haija, Sami and Kothari, Nisarg and Lee, Joonseok and Natsev, Paul and Toderici, George and Varadarajan, Balakrishnan and Vijayanarasimhan, Sudheendra},
 
month = sep,
 
month = sep,
Line 5,396: Line 5,001:
 
issn = {17554586},
 
issn = {17554586},
 
doi = {10.1016/j.emospa.2013.12.003},
 
doi = {10.1016/j.emospa.2013.12.003},
abstract = {Emotion, Space and Society, 13 (2014) 134-139. doi:10.1016/j.emospa.2013.12.003},
 
 
journal = {Emotion, Space and Society},
 
journal = {Emotion, Space and Society},
 
author = {Kristensen, Stefan},
 
author = {Kristensen, Stefan},
Line 5,447: Line 5,051:
 
title = {Thinking Corporeally, Socially, and Politically: Critical Phenomenology after Merleau-Ponty and Bourdieu},
 
title = {Thinking Corporeally, Socially, and Politically: Critical Phenomenology after Merleau-Ponty and Bourdieu},
 
volume = {8},
 
volume = {8},
abstract = {Bulletin d’analyse phénoménologique X (2014) 8},
 
 
journal = {Bulletin d’analyse phénoménologique},
 
journal = {Bulletin d’analyse phénoménologique},
 
author = {Melançon, Jérme},
 
author = {Melançon, Jérme},
Line 5,865: Line 5,468:
 
title = {2012.01: Godard et Bourdieu, 1993-2002 - Pour Jean-Luc Godard},
 
title = {2012.01: Godard et Bourdieu, 1993-2002 - Pour Jean-Luc Godard},
 
url = {https://sites.google.com/site/dossierjeanlucgodard/1-varia/2012-01-godard-et-bourdieu-1993-2002},
 
url = {https://sites.google.com/site/dossierjeanlucgodard/1-varia/2012-01-godard-et-bourdieu-1993-2002},
abstract = {Dossier sur le cinéaste},
 
 
urldate = {2020-04-23},
 
urldate = {2020-04-23},
 
   }
 
   }
Line 5,937: Line 5,539:
 
title = {Clearview AI says the First Amendment lets it scrape the internet. Lawyers disagree},
 
title = {Clearview AI says the First Amendment lets it scrape the internet. Lawyers disagree},
 
url = {https://www.cnet.com/news/clearview-says-first-amendment-lets-it-scrape-the-internet-lawyers-disagree/?ServiceType=twitter&PostType=link&ftag=COS-05-10aaa0b&TheTime=2020-02-06T13%3A48%3A57&UniqueID=6C4224B6-48E7-11EA-B950-78F2923C408C},
 
url = {https://www.cnet.com/news/clearview-says-first-amendment-lets-it-scrape-the-internet-lawyers-disagree/?ServiceType=twitter&PostType=link&ftag=COS-05-10aaa0b&TheTime=2020-02-06T13%3A48%3A57&UniqueID=6C4224B6-48E7-11EA-B950-78F2923C408C},
abstract = {Earlier court cases have permitted data scraping. But never for facial recognition.},
 
 
urldate = {2020-06-27},
 
urldate = {2020-06-27},
 
journal = {CNET},
 
journal = {CNET},
Line 5,951: Line 5,552:
 
issn = {1553-8095},
 
issn = {1553-8095},
 
url = {https://www.nytimes.com/2020/02/07/business/clearview-facial-recognition-child-sexual-abuse.html},
 
url = {https://www.nytimes.com/2020/02/07/business/clearview-facial-recognition-child-sexual-abuse.html},
abstract = {Though a breakthrough for law enforcement, the technique could allow the little-known start-up to collect an extraordinarily sensitive set of data and images.},
 
 
urldate = {2020-06-27},
 
urldate = {2020-06-27},
 
journal = {The New York Times},
 
journal = {The New York Times},
Line 5,964: Line 5,564:
 
title = {Clearview AI hit with cease-and-desist from Google, Facebook over facial recognition collection},
 
title = {Clearview AI hit with cease-and-desist from Google, Facebook over facial recognition collection},
 
url = {https://www.cnet.com/news/clearview-ai-hit-with-cease-and-desist-from-google-over-facial-recognition-collection/},
 
url = {https://www.cnet.com/news/clearview-ai-hit-with-cease-and-desist-from-google-over-facial-recognition-collection/},
abstract = {In an interview with CBS This Morning, Clearview AI's founder says it's his right to collect photos for the facial recognition app.},
 
 
urldate = {2020-06-27},
 
urldate = {2020-06-27},
 
journal = {CNET},
 
journal = {CNET},
Line 5,977: Line 5,576:
 
title = {Recommended Reading: When facial recognition identifies the wrong person},
 
title = {Recommended Reading: When facial recognition identifies the wrong person},
 
url = {https://www.engadget.com/recommended-reading-when-facial-recognition-identifies-the-wrong-person-140009993.html?guccounter=1},
 
url = {https://www.engadget.com/recommended-reading-when-facial-recognition-identifies-the-wrong-person-140009993.html?guccounter=1},
abstract = {Law enforcement at all levels are employing facial recognition for a variety of things.  When the US and countries around the world began to shut down, tech companies of all sizes announced plans to help.  The Atlantic explains the motives.},
 
 
urldate = {2020-06-28},
 
urldate = {2020-06-28},
 
journal = {Engadget},
 
journal = {Engadget},
Line 5,990: Line 5,588:
 
title = {Big Tech’s Pandemic Power Grab},
 
title = {Big Tech’s Pandemic Power Grab},
 
url = {https://www.theatlantic.com/magazine/archive/2020/07/big-tech-pandemic-power-grab/612238/},
 
url = {https://www.theatlantic.com/magazine/archive/2020/07/big-tech-pandemic-power-grab/612238/},
abstract = {The firms are all too eager to help the government manage the coronavirus crisis.},
 
 
urldate = {2020-06-28},
 
urldate = {2020-06-28},
 
journal = {The Atlantic},
 
journal = {The Atlantic},
Line 6,003: Line 5,600:
 
title = {Amazon Joins Microsoft's Call for Rules on Facial Recognition},
 
title = {Amazon Joins Microsoft's Call for Rules on Facial Recognition},
 
url = {https://www.wired.com/story/amazon-joins-microsofts-call-rules-facial-recognition/},
 
url = {https://www.wired.com/story/amazon-joins-microsofts-call-rules-facial-recognition/},
abstract = {Amazon, which offers facial recognition services, asks Congress to regulate how the technology can be used appropriately.},
 
 
urldate = {2020-06-27},
 
urldate = {2020-06-27},
 
journal = {WIRED},
 
journal = {WIRED},
Line 6,016: Line 5,612:
 
title = {Microsoft's Brad Smith says company will not sell facial recognition tech to police},
 
title = {Microsoft's Brad Smith says company will not sell facial recognition tech to police},
 
url = {https://techcrunch.com/2020/06/11/microsofts-brad-smith-says-company-will-not-sell-facial-recognition-tech-to-police/},
 
url = {https://techcrunch.com/2020/06/11/microsofts-brad-smith-says-company-will-not-sell-facial-recognition-tech-to-police/},
abstract = {Microsoft is joining IBM and Amazon in taking a position against the use of facial recognition technology by law enforcement — at least, until more regulation is in place. During a remote interview at a Washington Post Live event this morning, the company’s president Brad Smith said Microsoft has already been taking a “principled stand” […]},
 
 
urldate = {2020-06-27},
 
urldate = {2020-06-27},
 
journal = {TechCrunch},
 
journal = {TechCrunch},
Line 6,030: Line 5,625:
 
issn = {1553-8095},
 
issn = {1553-8095},
 
url = {https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-recognition.html},
 
url = {https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-recognition.html},
abstract = {A little-known start-up helps law enforcement match photos of unknown people to their online images — and “might lead to a dystopian future or something,” a backer says.},
 
 
urldate = {2020-06-27},
 
urldate = {2020-06-27},
 
journal = {The New York Times},
 
journal = {The New York Times},
Line 6,043: Line 5,637:
 
title = {Clearview AI Once Told Cops To “Run Wild” With Its Facial Recognition Tool},
 
title = {Clearview AI Once Told Cops To “Run Wild” With Its Facial Recognition Tool},
 
url = {https://www.buzzfeednews.com/article/ryanmac/clearview-ai-cops-run-wild-facial-recognition-lawsuits},
 
url = {https://www.buzzfeednews.com/article/ryanmac/clearview-ai-cops-run-wild-facial-recognition-lawsuits},
abstract = {One of Clearview AI's investors defended the company, “We do not have to be hidden to be free.”},
 
 
urldate = {2020-06-27},
 
urldate = {2020-06-27},
 
journal = {BuzzFeed News},
 
journal = {BuzzFeed News},
Line 6,056: Line 5,649:
 
title = {Objective Algorithms Are a Myth - OneZero},
 
title = {Objective Algorithms Are a Myth - OneZero},
 
url = {https://onezero.medium.com/objective-algorithms-are-a-myth-22b2c3e3d702},
 
url = {https://onezero.medium.com/objective-algorithms-are-a-myth-22b2c3e3d702},
abstract = {The protests across the U.S. and around the globe in the wake of the murder of George Floyd have raised awareness about structural inequalities. Though the specific focus has been on police…},
 
 
urldate = {2020-01-07},
 
urldate = {2020-01-07},
 
journal = {OneZero},
 
journal = {OneZero},
Line 6,069: Line 5,661:
 
title = {Police use facial-recognition tech to arrest another innocent man},
 
title = {Police use facial-recognition tech to arrest another innocent man},
 
url = {https://mashable.com/article/arrested-facial-recognition-technology/},
 
url = {https://mashable.com/article/arrested-facial-recognition-technology/},
abstract = {For the second time in less than three weeks, it was revealed that Detroit police used faulty technology to arrest the wrong man.},
 
 
language = {en},
 
language = {en},
 
urldate = {2020-07-13},
 
urldate = {2020-07-13},
Line 6,082: Line 5,673:
 
issn = {0190-8286},
 
issn = {0190-8286},
 
url = {https://www.washingtonpost.com/opinions/we-now-have-evidence-of-facial-recognitions-harm-time-for-lawmakers-to-act/2020/07/05/e62ee8d0-baf8-11ea-80b9-40ece9a701dc_story.html},
 
url = {https://www.washingtonpost.com/opinions/we-now-have-evidence-of-facial-recognitions-harm-time-for-lawmakers-to-act/2020/07/05/e62ee8d0-baf8-11ea-80b9-40ece9a701dc_story.html},
abstract = {Lawmakers must regulate facial recognition technology, or more wrongful arrests are coming.},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2020-07-13},
 
urldate = {2020-07-13},
Line 6,112: Line 5,702:
 
title = {NY lawmakers vote to pause facial recognition in schools - Business Insider},
 
title = {NY lawmakers vote to pause facial recognition in schools - Business Insider},
 
url = {https://www.businessinsider.com/ny-lawmakers-vote-to-pause-facial-recognition-in-schools-2020-7?international=true&r=US&IR=T},
 
url = {https://www.businessinsider.com/ny-lawmakers-vote-to-pause-facial-recognition-in-schools-2020-7?international=true&r=US&IR=T},
abstract = {The New York Legislature has passed a two-year moratorium on the use of facial recognition in schools.},
 
 
urldate = {2020-07-27},
 
urldate = {2020-07-27},
 
journal = {Business Insider},
 
journal = {Business Insider},
Line 6,124: Line 5,713:
 
title = {How Sony Is Fueling The Computer Vision Boom},
 
title = {How Sony Is Fueling The Computer Vision Boom},
 
url = {https://www.forbes.com/sites/stephenmcbride1/2020/07/30/how-sony-is-fueling-the-computer-vision-boom/},
 
url = {https://www.forbes.com/sites/stephenmcbride1/2020/07/30/how-sony-is-fueling-the-computer-vision-boom/},
abstract = {He didn’t know it at the time, but in 1990 Eric Fossum started a revolution.},
 
 
urldate = {2020-01-08},
 
urldate = {2020-01-08},
 
journal = {Forbes},
 
journal = {Forbes},
Line 6,138: Line 5,726:
 
url = {https://www.crainsnewyork.com/technology/macys-sued-over-use-clearview-facial-recognition-software},
 
url = {https://www.crainsnewyork.com/technology/macys-sued-over-use-clearview-facial-recognition-software},
 
urldate = {2020-09-08},
 
urldate = {2020-09-08},
author = {{Crain's New York Business}},
+
author = {Crain's New York Business},
 
year = {2020},
 
year = {2020},
 
   }
 
   }
Line 6,153: Line 5,741:
 
  |bibtex=@article{josepmariabechDRAFTMerleauPontysmanylayeredpresenceinBourdieusthoughtNOV2017,
 
  |bibtex=@article{josepmariabechDRAFTMerleauPontysmanylayeredpresenceinBourdieusthoughtNOV2017,
 
title = {DRAFTMerleau-Pontysmany-layeredpresenceinBourdieusthoughtNOV2017},
 
title = {DRAFTMerleau-Pontysmany-layeredpresenceinBourdieusthoughtNOV2017},
author = {{JOSEP MARIA BECH}},
+
author = {JOSEP MARIA BECH},
 
   }
 
   }
 
}}
 
}}
Line 6,186: Line 5,774:
 
title = {New philosophies of film},
 
title = {New philosophies of film},
 
isbn = {0-07-143795-9},
 
isbn = {0-07-143795-9},
abstract = {The relationship between film and philosophy has become a topic of intense intellectual interest. But how should we understand this relationship? Can philosophy renew our understanding of film? Can film challenge or even transform how we understand philosophy? New Philosophies of Film explores these questions in relation to both analytic and Continental philosophies of film, arguing that the best way to overcome their mutual antagonism is by constructing a more pluralist film-philosophy grounded in detailed engagement with particular films. Sinnerbrink not only provides lucid critical analyses},
 
 
language = {eng},
 
language = {eng},
 
publisher = {Continuum},
 
publisher = {Continuum},
Line 6,201: Line 5,788:
 
isbn = {978-0-231-17267-7},
 
isbn = {978-0-231-17267-7},
 
url = {https://ebookcentral.proquest.com/lib/gbv/detail.action?docID=5276096},
 
url = {https://ebookcentral.proquest.com/lib/gbv/detail.action?docID=5276096},
abstract = {Intro -- Table of Contents -- Introduction, by Nora M. Alter and Timothy Corrigan -- Part I. Foundations -- 1. â€On the Nature and Form of the Essay,” by Georg Lukács -- 2. The Man Without Qualities, by Robert Musil -- 3. â€On the Essay and Its Prose,” by Max Bense -- 4. â€The Essay as Form,” by Theodor W. Adorno -- 5. â€Preface to The Collected Essays of Aldous Huxley,” by Aldous Huxley -- Part II. The Essay Film Through History -- 6. â€The Film Essay: A New Type of Documentary Film,” by Hans Richter -- 7. â€The Future of Cinema,” by Alexandre Astruc -- 8. â€Bazin on Marker,” by André Bazin -- Part III. Contemporary Positions -- 9. â€In Search of the Centaur: The Essay-Film,” by Phillip Lopate -- 10. â€The Political Im/Perceptible in the Essay Film: Farocki’s Images of the World and the Inscription of War,” by Nora M. Alter -- 11. â€Essay Questions,” by Paul Arthur -- 12. â€The Electronic Essay,” by Michael Renov -- 13. â€The Essay Film: Problems, Definitions, Textual Commitments,” by Laura Rascaroli -- 14. â€Of the History of the Essay Film: Vertov, to Varda,” by Timothy Corrigan -- 15. â€The Cinema and the Essay as a Way of Thinking,” by Raymond Bellour -- 16. â€The Essay Film: From Film Festival Favorite to Flexible Commodity Form?,” by Thomas Elsaesser -- Part IV. Filmmakers on the Essayistic -- 17. â€Performing Borders: Transnational Video,” by Ursula Biemann -- 18. â€Proposal for a Tussle,” by Jean-Pierre Gorin -- 19. â€The Essay as Conformism? Some Notes on Global Image Economies,” by Hito Steyerl -- 20. â€On Writing the Film Essay,” by Lynne Sachs -- 21. â€Tramp Steamer,” by Ross McElwee -- 22. â€The ABCs of the Film Essay,” by Harun Farocki and Christa Blümlinger -- 23. â€Riddles as Essay Film,” by Laura Mulvey -- 24. â€Certain Obliquenesses,” by Renée Green
 
 
 
 
25. â€Essay Documentary: The disembodied narrator and an unclaimed image that floats through space and time,” by Rea Tajiri -- 26. â€From Ten Thousand Waves to Lina Bo Bardi, via Kapital,” by Isaac Julien -- Bibliography -- Contributors -- Permissions -- Index
 
 
 
 
This anthology of fundamental statements on the essay film offers a range of crucial historical and philosophical perspectives. It provides early critical articulations of the essay film as it evolved through the 1950s and 1960s, key contemporary scholarly essays, and a selection of writings by essay filmmakers. It features texts on the foundations of the essay film by writers such as Hans Richter and André Bazin, contemporary positions by Phillip Lopate and Michael Renov, and original essays by filmmakers themselves, including Laura Mulvey and Isaac Julien},
 
 
language = {eng},
 
language = {eng},
 
publisher = {Columbia University Press},
 
publisher = {Columbia University Press},
Line 6,224: Line 5,802:
 
title = {Introduction to a true history of cinema and television},
 
title = {Introduction to a true history of cinema and television},
 
isbn = {978-0-9811914-2-3},
 
isbn = {978-0-9811914-2-3},
abstract = {In 1978, just before his return to the international stage, the world's most renowned art-film director Jean-Luc Godard improvised a series of fourteen one-hour talks at Concordia University in Montreal. These talks, part of a projected video history of cinema, were published in French in 1980. In this definitive English-language volume, translator Timothy Barnard has worked from the original footage to carefully revise and correct the faulty French transcription. The result is the most extensive and revealing account of Godard's own work, his methods, and his critical opinions. Never has Godard been as loquacious, lucid, and disarmingly frank as he is here. This volume, by the wittiest and most idiosyncratic genius cinema has known and available for the first time in English, is certain to become one of the great classics of film literature. Published by caboose books, Montreal. Distributed worldwide, excluding Canada, by Rutgers University Press.},
 
 
publisher = {Caboose},
 
publisher = {Caboose},
 
author = {Godard, Jean-Luc},
 
author = {Godard, Jean-Luc},
Line 6,276: Line 5,853:
 
  |bibtex=@article{nickcouldryandulisesa.mejiasCostsConnection,
 
  |bibtex=@article{nickcouldryandulisesa.mejiasCostsConnection,
 
title = {The Costs of Connection},
 
title = {The Costs of Connection},
author = {{Nick Couldry and Ulises A. Mejias}},
+
author = {Nick Couldry and Ulises A. Mejias},
 
   }
 
   }
 
}}
 
}}
Line 6,284: Line 5,861:
 
title = {ACLU sues Clearview AI claiming the company's tech crosses ethical bounds},
 
title = {ACLU sues Clearview AI claiming the company's tech crosses ethical bounds},
 
url = {https://www.zdnet.com/article/aclu-sues-clearview-ai-claiming-the-companys-tech-crosses-ethical-bounds/},
 
url = {https://www.zdnet.com/article/aclu-sues-clearview-ai-claiming-the-companys-tech-crosses-ethical-bounds/},
abstract = {The American Civil Liberties Union has accused Clearview AI's biometric platform of creating a nightmare scenario that many have long feared.},
 
 
urldate = {2020-05-30},
 
urldate = {2020-05-30},
 
journal = {ZDNet},
 
journal = {ZDNet},
Line 6,355: Line 5,931:
 
  |bibtex=@book{accentureconsultingCCTVNotWe2017,
 
  |bibtex=@book{accentureconsultingCCTVNotWe2017,
 
title = {CCTV But Not as We Know It {\textbar} Accenture},
 
title = {CCTV But Not as We Know It {\textbar} Accenture},
abstract = {Learn how James Slessor, Accenture Global Public Safety Managing Director, is focused on policing, intelligence, justice, prisons and rehabilitation to drive innovation for our public safety clients across the globe.},
+
author = {Accenture Consulting},
author = {{Accenture Consulting}},
 
 
year = {2017},
 
year = {2017},
 
   }
 
   }
Line 6,404: Line 5,979:
 
  |bibtex=@article{ladepecheToulousePouvoirCameras,
 
  |bibtex=@article{ladepecheToulousePouvoirCameras,
 
title = {Toulouse : le pouvoir des caméras de vidéosurveillance},
 
title = {Toulouse : le pouvoir des caméras de vidéosurveillance},
author = {{La Dépêche}},
+
author = {La Dépêche},
 
   }
 
   }
 
}}
 
}}
Line 6,449: Line 6,024:
 
title = {Marseille, Las Vegas… Les caméras intelligentes peuventelles prévenir les attaques ?},
 
title = {Marseille, Las Vegas… Les caméras intelligentes peuventelles prévenir les attaques ?},
 
journal = {Ouest-France},
 
journal = {Ouest-France},
author = {{Ouest-France}},
+
author = {Ouest-France},
 
month = oct,
 
month = oct,
 
year = {2017},
 
year = {2017},
Line 6,511: Line 6,086:
 
issn = {1753-9153},
 
issn = {1753-9153},
 
doi = {10.1080/17539153.2018.1456725},
 
doi = {10.1080/17539153.2018.1456725},
abstract = {Critical Studies on Terrorism, 2018. doi:10.1080/17539153.2018.1456725},
 
 
number = {2},
 
number = {2},
 
journal = {Critical Studies on Terrorism},
 
journal = {Critical Studies on Terrorism},
Line 6,541: Line 6,115:
 
  |bibtex=@article{alexMicrosoftWordMedia,
 
  |bibtex=@article{alexMicrosoftWordMedia,
 
title = {Microsoft Word - Media Matter\_final.docx},
 
title = {Microsoft Word - Media Matter\_final.docx},
author = {{Alex}},
+
author = {Alex},
 
   }
 
   }
 
}}
 
}}
Line 6,643: Line 6,217:
 
issn = {1368-4310},
 
issn = {1368-4310},
 
doi = {10.1177/1368431016677976},
 
doi = {10.1177/1368431016677976},
abstract = {European Journal of Social Theory 2017.20:309-328},
 
 
number = {3},
 
number = {3},
 
journal = {European Journal of Social Theory},
 
journal = {European Journal of Social Theory},
Line 6,689: Line 6,262:
 
publisher = {La Documentation Française},
 
publisher = {La Documentation Française},
 
author = {Phélippeau, Éric},
 
author = {Phélippeau, Éric},
editor = {{La Documentation Française}},
+
editor = {La Documentation Française},
 
year = {2009},
 
year = {2009},
 
pages = {42--47},
 
pages = {42--47},
Line 6,701: Line 6,274:
 
title = {La Science Politique},
 
title = {La Science Politique},
 
publisher = {La Documentation Française},
 
publisher = {La Documentation Française},
editor = {{La Documentation Française}},
+
editor = {La Documentation Française},
 
year = {2009},
 
year = {2009},
 
   }
 
   }
Line 6,753: Line 6,326:
 
issn = {0967-0106},
 
issn = {0967-0106},
 
doi = {10.1177/0967010615584256},
 
doi = {10.1177/0967010615584256},
abstract = {Security Dialogue 2015.46:384-400},
 
 
number = {4},
 
number = {4},
 
journal = {Security Dialogue},
 
journal = {Security Dialogue},
Line 6,768: Line 6,340:
 
issn = {0967-0106},
 
issn = {0967-0106},
 
doi = {10.1177/0967010611401472},
 
doi = {10.1177/0967010611401472},
abstract = {Security Dialogue 2011.42:161-178},
 
 
number = {2},
 
number = {2},
 
journal = {Security Dialogue},
 
journal = {Security Dialogue},
Line 6,783: Line 6,354:
 
issn = {0967-0106},
 
issn = {0967-0106},
 
doi = {10.1177/0967010611399615},
 
doi = {10.1177/0967010611399615},
abstract = {Security Dialogue 2011.42:179-196},
 
 
number = {2},
 
number = {2},
 
journal = {Security Dialogue},
 
journal = {Security Dialogue},
Line 6,889: Line 6,459:
 
issn = {0967-0106},
 
issn = {0967-0106},
 
doi = {10.1177/0967010615585106},
 
doi = {10.1177/0967010615585106},
abstract = {Security Dialogue 2015.46:440-457},
 
 
number = {5},
 
number = {5},
 
journal = {Security Dialogue},
 
journal = {Security Dialogue},
Line 6,904: Line 6,473:
 
issn = {0967-0106},
 
issn = {0967-0106},
 
doi = {10.1177/0967010613519162},
 
doi = {10.1177/0967010613519162},
abstract = {Security Dialogue 2014.45:101-118},
 
 
number = {2},
 
number = {2},
 
journal = {Security Dialogue},
 
journal = {Security Dialogue},
Line 6,946: Line 6,514:
 
issn = {09626298},
 
issn = {09626298},
 
doi = {10.1016/j.polgeo.2018.04.005},
 
doi = {10.1016/j.polgeo.2018.04.005},
abstract = {Political Geography, 65 (2018) 67-76. doi:10.1016/j.polgeo.2018.04.005},
 
 
journal = {Political Geography},
 
journal = {Political Geography},
 
author = {Fisher, Daniel X.O.},
 
author = {Fisher, Daniel X.O.},
Line 6,960: Line 6,527:
 
issn = {0967-0106},
 
issn = {0967-0106},
 
doi = {10.1177/0967010618770070},
 
doi = {10.1177/0967010618770070},
abstract = {Security Dialogue 2018.49:254-271},
 
 
number = {4},
 
number = {4},
 
journal = {Security Dialogue},
 
journal = {Security Dialogue},
Line 6,975: Line 6,541:
 
issn = {0967-0106},
 
issn = {0967-0106},
 
doi = {10.1177/0967010617695714},
 
doi = {10.1177/0967010617695714},
abstract = {The relationship between vision and action is a key element of both practices and conceptualizations of border surveillance in Europe. This article engages with what we call the 'operative vision' of surveillance at sea, specifically as performed by the border control apparatus in the Aegean. We analyse the political consequences of this operative vision by elaborating on three examples of fieldwork conducted in the Aegean and on the islands of Chios and Lesbos. One of the main aims is to bring the figure of the migrant back into the study of border technologies. By combining insights from science and technology studies with border, mobility and security studies, the article distinguishes between processes of intervention, mobilization and realization and emphasizes the role of migrants in their encounter with surveillance operations. Two claims are brought forward. First, engaging with recent scholarly work on the visual politics of border surveillance, we circumscribe an ongoing 'transactional politics'. Second, the dynamic interplay between vision and action brings about a situation of 'recalcitrance', in which mobile objects and subjects of various kinds are drawn into securitized relations, for instance in encounters between coast guard boats and migrant boats at sea. Without reducing migrants to epiphenomena of those relations, this recalcitrance typifies the objects of surveillance as both relatable as well as resistant, particularly in the tensions between border control and search and rescue.},
 
 
language = {eng},
 
language = {eng},
 
number = {3},
 
number = {3},
Line 6,991: Line 6,556:
 
issn = {0162-2439},
 
issn = {0162-2439},
 
doi = {10.1177/0162243917715106},
 
doi = {10.1177/0162243917715106},
abstract = {Science, Technology, \& Human Values 2017.42:1003-1030},
 
 
number = {6},
 
number = {6},
 
journal = {Science, Technology, \& Human Values},
 
journal = {Science, Technology, \& Human Values},
Line 7,006: Line 6,570:
 
issn = {0967-0106},
 
issn = {0967-0106},
 
doi = {10.1177/0967010618769812},
 
doi = {10.1177/0967010618769812},
abstract = {Security Dialogue 2018.49:272-288},
 
 
number = {4},
 
number = {4},
 
journal = {Security Dialogue},
 
journal = {Security Dialogue},
Line 7,021: Line 6,584:
 
issn = {1568-7759},
 
issn = {1568-7759},
 
doi = {10.1007/s11097-016-9481-z},
 
doi = {10.1007/s11097-016-9481-z},
abstract = {Phenom Cogn Sci, doi:10.1007/s11097-016-9481-z},
 
 
number = {1},
 
number = {1},
 
journal = {Phenomenology and the Cognitive Sciences},
 
journal = {Phenomenology and the Cognitive Sciences},
Line 7,050: Line 6,612:
 
issn = {2380-8985},
 
issn = {2380-8985},
 
doi = {10.1080/23808985.2017.1288069},
 
doi = {10.1080/23808985.2017.1288069},
abstract = {Annals of the International Communication Association, 0000. doi:10.1080/23808985.2017.1288069},
 
 
number = {1},
 
number = {1},
 
journal = {Annals of the International Communication Association},
 
journal = {Annals of the International Communication Association},
Line 7,065: Line 6,626:
 
issn = {2162-4887},
 
issn = {2162-4887},
 
doi = {10.1080/21624887.2018.1432534},
 
doi = {10.1080/21624887.2018.1432534},
abstract = {Critical Studies on Security, 2018. doi:10.1080/21624887.2018.1432534},
 
 
number = {3},
 
number = {3},
 
journal = {Critical Studies on Security},
 
journal = {Critical Studies on Security},
Line 7,114: Line 6,674:
 
  |bibtex=@article{crossmFisher2018,
 
  |bibtex=@article{crossmFisher2018,
 
title = {Fisher2018},
 
title = {Fisher2018},
author = {{Crossm}},
+
author = {Crossm},
 
   }
 
   }
 
}}
 
}}
Line 7,135: Line 6,695:
 
title = {How to see the world},
 
title = {How to see the world},
 
isbn = {0-465-09600-X},
 
isbn = {0-465-09600-X},
abstract = {"In How to See the World, visual culture expert Nicholas Mirzoeff offers a sweeping look at history's most famous images--from Velázquez's Las Meninas to the iconic "Blue Marble"--to contextualize and make sense of today's visual world. Drawing on art history, sociology, semiotics, and everyday experience, he teaches us how to close read everything from astronaut selfies to Impressionist self-portraits, from Hitchcock films to videos taken by drones. Mirzoeff takes us on a journey through visual revolutions in the arts and sciences, from new mapping techniques in the seventeenth century to new painting styles in the eighteenth and the creation of film, photography, and x-rays in the nineteenth century. In today's networked world, mobile technology and social media enable us to exercise "visual activism"--the practice of producing and circulating images to drive political and social change. Whether we are looking at pictures showing the effects of climate change on natural and urban landscapes or an fMRI scan demonstrating neurological addiction, Mirzoeff helps us to find meaning in what we see,"--Amazon.com.},
 
 
publisher = {Basic Books a member of the Perseus Books Group},
 
publisher = {Basic Books a member of the Perseus Books Group},
 
author = {Mirzoeff, Nicholas},
 
author = {Mirzoeff, Nicholas},
Line 7,157: Line 6,716:
 
volume = {27},
 
volume = {27},
 
doi = {10.1068/d0208},
 
doi = {10.1068/d0208},
abstract = {Environ Plan D 2009.27:274-295},
 
 
journal = {Environment and Planning D: Society and Space},
 
journal = {Environment and Planning D: Society and Space},
 
author = {Adey, Peter},
 
author = {Adey, Peter},
Line 7,206: Line 6,764:
 
issn = {1360-0826},
 
issn = {1360-0826},
 
doi = {10.1080/13600826.2016.1173018},
 
doi = {10.1080/13600826.2016.1173018},
abstract = {Global Society, 2016. doi:10.1080/13600826.2016.1173018},
 
 
number = {3},
 
number = {3},
 
journal = {Global Society},
 
journal = {Global Society},
Line 7,235: Line 6,792:
 
issn = {00167185},
 
issn = {00167185},
 
doi = {10.1016/j.geoforum.2018.08.005},
 
doi = {10.1016/j.geoforum.2018.08.005},
abstract = {Geoforum, 96 (2018) 77-86. doi:10.1016/j.geoforum.2018.08.005},
 
 
journal = {Geoforum},
 
journal = {Geoforum},
 
author = {Birtchnell, Thomas and Elliott, Anthony},
 
author = {Birtchnell, Thomas and Elliott, Anthony},
Line 7,263: Line 6,819:
 
issn = {0967-0106},
 
issn = {0967-0106},
 
doi = {10.1177/0967010616650227},
 
doi = {10.1177/0967010616650227},
abstract = {Security Dialogue 2017.48:78-94},
 
 
number = {1},
 
number = {1},
 
journal = {Security Dialogue},
 
journal = {Security Dialogue},
Line 7,304: Line 6,859:
 
title = {Grounding Visual Explanations},
 
title = {Grounding Visual Explanations},
 
url = {http://arxiv.org/pdf/1807.09685v2},
 
url = {http://arxiv.org/pdf/1807.09685v2},
abstract = {Existing visual explanation generating agents learn to fluently justify a class prediction. However, they may mention visual attributes which reflect a strong class prior, although the evidence may not actually be in the image. This is particularly concerning as ultimately such agents fail in building trust with human users. To overcome this limitation, we propose a phrase-critic model to refine generated candidate explanations augmented with flipped phrases which we use as negative examples while training. At inference time, our phrase-critic model takes an image and a candidate explanation as input and outputs a score indicating how well the candidate explanation is grounded in the image. Our explainable AI agent is capable of providing counter arguments for an alternative prediction, i.e. counterfactuals, along with explanations that justify the correct classification decisions. Our model improves the textual explanation quality of fine-grained classification decisions on the CUB dataset by mentioning phrases that are grounded in the image. Moreover, on the FOIL tasks, our agent detects when there is a mistake in the sentence, grounds the incorrect phrase and corrects it significantly better than other models.},
 
 
urldate = {2018-07-25},
 
urldate = {2018-07-25},
 
journal = {European Conference on Computer Vision (ECCV)},
 
journal = {European Conference on Computer Vision (ECCV)},
Line 7,349: Line 6,903:
 
title = {Multimodal Explanations: Justifying Decisions and Pointing to the  Evidence},
 
title = {Multimodal Explanations: Justifying Decisions and Pointing to the  Evidence},
 
url = {http://arxiv.org/pdf/1802.08129v1},
 
url = {http://arxiv.org/pdf/1802.08129v1},
abstract = {Deep models that are both effective and explainable are desirable in many settings; prior explainable models have been unimodal, offering either image-based visualization of attention weights or text-based generation of post-hoc justifications. We propose a multimodal approach to explanation, and argue that the two modalities provide complementary explanatory strengths. We collect two new datasets to define and evaluate this task, and propose a novel model which can provide joint textual rationale generation and attention visualization. Our datasets define visual and textual justifications of a classification decision for activity recognition tasks (ACT-X) and for visual question answering tasks (VQA-X). We quantitatively show that training with the textual explanations not only yields better textual justification models, but also better localizes the evidence that supports the decision. We also qualitatively show cases where visual explanation is more insightful than textual explanation, and vice versa, supporting our thesis that multimodal explanation models offer significant benefits over unimodal approaches.},
 
 
author = {Park, Dong Huk and Hendricks, Lisa Anne and Akata, Zeynep and Rohrbach, Anna and Schiele, Bernt and Darrell, Trevor and Rohrbach, Marcus},
 
author = {Park, Dong Huk and Hendricks, Lisa Anne and Akata, Zeynep and Rohrbach, Anna and Schiele, Bernt and Darrell, Trevor and Rohrbach, Marcus},
 
month = feb,
 
month = feb,
Line 7,377: Line 6,930:
 
issn = {0967-0106},
 
issn = {0967-0106},
 
doi = {10.1177/0967010616650227},
 
doi = {10.1177/0967010616650227},
abstract = {Security Dialogue 2017.48:78-94},
 
 
number = {1},
 
number = {1},
 
journal = {Security Dialogue},
 
journal = {Security Dialogue},
Line 7,392: Line 6,944:
 
issn = {00167185},
 
issn = {00167185},
 
doi = {10.1016/j.geoforum.2018.08.005},
 
doi = {10.1016/j.geoforum.2018.08.005},
abstract = {Geoforum, 96 (2018) 77-86. doi:10.1016/j.geoforum.2018.08.005},
 
 
journal = {Geoforum},
 
journal = {Geoforum},
 
author = {Birtchnell, Thomas and Elliott, Anthony},
 
author = {Birtchnell, Thomas and Elliott, Anthony},
Line 7,420: Line 6,971:
 
title = {Computer vision},
 
title = {Computer vision},
 
isbn = {978-0-13-608592-8},
 
isbn = {978-0-13-608592-8},
abstract = {ExLib==ave4eva},
 
 
publisher = {Pearson},
 
publisher = {Pearson},
 
author = {Forsyth, David and Ponce, Jean},
 
author = {Forsyth, David and Ponce, Jean},
Line 7,474: Line 7,024:
 
issn = {1461-4448},
 
issn = {1461-4448},
 
doi = {10.1177/1461444816676645},
 
doi = {10.1177/1461444816676645},
abstract = {New Media \& Society 2018.20:973-989},
 
 
number = {3},
 
number = {3},
 
journal = {New Media \& Society},
 
journal = {New Media \& Society},
Line 7,500: Line 7,049:
 
  |bibtex=@article{ndfjwScreensDoc,
 
  |bibtex=@article{ndfjwScreensDoc,
 
title = {screens.doc},
 
title = {screens.doc},
author = {{ndfjw}},
+
author = {ndfjw},
 
   }
 
   }
 
}}
 
}}
Line 7,528: Line 7,077:
 
  |bibtex=@book{lewisTimothyAschEthnographic2004,
 
  |bibtex=@book{lewisTimothyAschEthnographic2004,
 
title = {Timothy Asch and Ethnographic Film},
 
title = {Timothy Asch and Ethnographic Film},
abstract = {Education, Politics \& IR, Sociology \& Social Policy},
 
 
editor = {Lewis, E. D.},
 
editor = {Lewis, E. D.},
 
year = {2004},
 
year = {2004},
Line 7,538: Line 7,086:
 
title = {What Really Happened. A reassessment of The Ax Fight},
 
title = {What Really Happened. A reassessment of The Ax Fight},
 
booktitle = {Timothy Asch and Ethnographic Film},
 
booktitle = {Timothy Asch and Ethnographic Film},
author = {{Bill Nichols}},
+
author = {Bill Nichols},
 
editor = {Lewis, E. D.},
 
editor = {Lewis, E. D.},
 
year = {2004},
 
year = {2004},
Line 7,630: Line 7,178:
 
  |bibtex=@article{ltcgbjfsc/jawsA622701,
 
  |bibtex=@article{ltcgbjfsc/jawsA622701,
 
title = {a622701},
 
title = {a622701},
author = {{Ltc Gb Jfsc/Jaws}},
+
author = {Ltc Gb Jfsc/Jaws},
 
   }
 
   }
 
}}
 
}}
Line 7,714: Line 7,262:
 
issn = {0263-2764},
 
issn = {0263-2764},
 
doi = {10.1177/0263276409103107},
 
doi = {10.1177/0263276409103107},
abstract = {Theory, Culture \& Society 2009.26:47-72},
 
 
number = {2-3},
 
number = {2-3},
 
journal = {Theory, Culture \& Society},
 
journal = {Theory, Culture \& Society},
Line 7,729: Line 7,276:
 
issn = {0263-2764},
 
issn = {0263-2764},
 
doi = {10.1177/0263276406069229},
 
doi = {10.1177/0263276406069229},
abstract = {Theory, Culture \& Society 2006.23:159-166},
 
 
number = {7-8},
 
number = {7-8},
 
journal = {Theory, Culture \& Society},
 
journal = {Theory, Culture \& Society},
Line 7,775: Line 7,321:
 
issn = {0263-2764},
 
issn = {0263-2764},
 
doi = {10.1177/0263276405048438},
 
doi = {10.1177/0263276405048438},
abstract = {Theory, Culture \& Society 2005.22:131-151},
 
 
number = {1},
 
number = {1},
 
journal = {Theory, Culture \& Society},
 
journal = {Theory, Culture \& Society},
Line 7,789: Line 7,334:
 
title = {My mother was a computer},
 
title = {My mother was a computer},
 
isbn = {0-226-32148-7},
 
isbn = {0-226-32148-7},
abstract = {Image},
 
 
publisher = {University of Chicago Press},
 
publisher = {University of Chicago Press},
 
author = {Hayles, Katherine},
 
author = {Hayles, Katherine},
Line 7,874: Line 7,418:
 
volume = {L.1598},
 
volume = {L.1598},
 
journal = {Harvard Law Review},
 
journal = {Harvard Law Review},
author = {{Klonick}},
+
author = {Klonick},
 
year = {2017},
 
year = {2017},
 
   }
 
   }
Line 7,885: Line 7,429:
 
isbn = {978-1-138-94091-8},
 
isbn = {978-1-138-94091-8},
 
publisher = {Routledge Taylor \& Francis Group},
 
publisher = {Routledge Taylor \& Francis Group},
author = {{Hjorth} and {Larissa}},
+
author = {Hjorth and Larissa},
 
editor = {Hjorth, Larissa and Horst, Heather A. and Galloway, Anne and Bell, Genevieve},
 
editor = {Hjorth, Larissa and Horst, Heather A. and Galloway, Anne and Bell, Genevieve},
 
year = {2017},
 
year = {2017},
Line 7,949: Line 7,493:
 
issn = {1388-1957},
 
issn = {1388-1957},
 
doi = {10.1007/s10676-015-9366-9},
 
doi = {10.1007/s10676-015-9366-9},
abstract = {Ethics and Information Technology, doi:10.1007/s10676-015-9366-9},
 
 
number = {3},
 
number = {3},
 
journal = {Ethics and Information Technology},
 
journal = {Ethics and Information Technology},
Line 8,006: Line 7,549:
 
issn = {1841-0413},
 
issn = {1841-0413},
 
doi = {10.5964/ejop.v14i4.1823},
 
doi = {10.5964/ejop.v14i4.1823},
abstract = {There has been much hype, over the past few years, about the recent progress of artificial intelligence (AI), especially through machine learning. If one is to believe many of the headlines that have proliferated in the media, as well as in an increasing number of scientific publications, it would seem that AI is now capable of creating and learning in ways that are starting to resemble what humans can do. And so that we should start to hope - or fear - that the creation of fully cognisant machine might be something we will witness in our life time. However, much of these beliefs are based on deep misconceptions about what AI can do, and how. In this paper, I start with a brief introduction to the principles of AI, machine learning, and neural networks, primarily intended for psychologists and social scientists, who often have much to contribute to the debates surrounding AI but lack a clear understanding of what it can currently do and how it works. I then debunk four common myths associated with AI: 1) it can create, 2) it can learn, 3) it is neutral and objective, and 4) it can solve ethically and/or culturally sensitive problems. In a third and last section, I argue that these misconceptions represent four main dangers: 1) avoiding debate, 2) naturalising our biases, 3) deresponsibilising creators and users, and 4) missing out some of the potential uses of machine learning. I finally conclude on the potential benefits of using machine learning in research, and thus on the need to defend machine learning without romanticising what it can actually do.},
 
 
language = {eng},
 
language = {eng},
 
number = {4},
 
number = {4},
Line 8,025: Line 7,567:
 
language = {eng},
 
language = {eng},
 
publisher = {Institute of Network Cultures},
 
publisher = {Institute of Network Cultures},
author = {{Wakenshaw}},
+
author = {Wakenshaw},
 
editor = {Gloerich, Inte and Lovink, Geert and van der Burgt, Patrice},
 
editor = {Gloerich, Inte and Lovink, Geert and van der Burgt, Patrice},
 
year = {2018},
 
year = {2018},
Line 8,104: Line 7,646:
 
issn = {1461-4448},
 
issn = {1461-4448},
 
doi = {10.1177/1461444818817306},
 
doi = {10.1177/1461444818817306},
abstract = {New Media \& Society 0.0:1461444818817306},
 
 
number = {2},
 
number = {2},
 
journal = {New Media \& Society},
 
journal = {New Media \& Society},
Line 8,168: Line 7,709:
 
issn = {0741-1235},
 
issn = {0741-1235},
 
doi = {10.1123/ssj.26.3.365},
 
doi = {10.1123/ssj.26.3.365},
abstract = {Sociology of Sport Journal 2009.26:365-382},
 
 
number = {3},
 
number = {3},
 
journal = {Sociology of Sport Journal},
 
journal = {Sociology of Sport Journal},
Line 8,248: Line 7,788:
 
issn = {1057-610X},
 
issn = {1057-610X},
 
doi = {10.1080/1057610X.2016.1212551},
 
doi = {10.1080/1057610X.2016.1212551},
abstract = {Studies in Conflict and Terrorism, 2017. doi:10.1080/1057610X.2016.1212551},
 
 
number = {5},
 
number = {5},
 
journal = {Studies in Conflict \& Terrorism},
 
journal = {Studies in Conflict \& Terrorism},
Line 8,289: Line 7,828:
 
issn = {1036-1146},
 
issn = {1036-1146},
 
doi = {10.1080/10361146.2016.1174188},
 
doi = {10.1080/10361146.2016.1174188},
abstract = {Australian Journal of Political Science, 2016. doi:10.1080/10361146.2016.1174188},
 
 
number = {3},
 
number = {3},
 
journal = {Australian Journal of Political Science},
 
journal = {Australian Journal of Political Science},
Line 8,304: Line 7,842:
 
issn = {1043-9862},
 
issn = {1043-9862},
 
doi = {10.1177/1043986217699313},
 
doi = {10.1177/1043986217699313},
abstract = {Journal of Contemporary Criminal Justice 2017.33:234-253},
 
 
number = {3},
 
number = {3},
 
journal = {Journal of Contemporary Criminal Justice},
 
journal = {Journal of Contemporary Criminal Justice},
Line 8,319: Line 7,856:
 
issn = {1368-4310},
 
issn = {1368-4310},
 
doi = {10.1177/1368431016668365},
 
doi = {10.1177/1368431016668365},
abstract = {European Journal of Social Theory 2017.20:348-372},
 
 
number = {3},
 
number = {3},
 
journal = {European Journal of Social Theory},
 
journal = {European Journal of Social Theory},
Line 8,410: Line 7,946:
 
issn = {1753-9153},
 
issn = {1753-9153},
 
doi = {10.1080/17539153.2017.1338327},
 
doi = {10.1080/17539153.2017.1338327},
abstract = {Critical Studies on Terrorism, 2018. doi:10.1080/17539153.2017.1338327},
 
 
number = {1},
 
number = {1},
 
journal = {Critical Studies on Terrorism},
 
journal = {Critical Studies on Terrorism},
Line 8,441: Line 7,976:
 
  |bibtex=@article{userSudaneseMahdiyyahComparat,
 
  |bibtex=@article{userSudaneseMahdiyyahComparat,
 
title = {IS\_and\_the\_Sudanese\_Mahdiyyah\_a\_Comparat},
 
title = {IS\_and\_the\_Sudanese\_Mahdiyyah\_a\_Comparat},
author = {{user}},
+
author = {user},
 
   }
 
   }
 
}}
 
}}
Line 8,466: Line 8,001:
 
  |bibtex=@article{loloGupea207739604,
 
  |bibtex=@article{loloGupea207739604,
 
title = {gupea\_2077\_39604\_1},
 
title = {gupea\_2077\_39604\_1},
author = {{Lolo}},
+
author = {Lolo},
 
   }
 
   }
 
}}
 
}}
Line 8,488: Line 8,023:
 
  |bibtex=@article{mihaelaSupplementNo32015,
 
  |bibtex=@article{mihaelaSupplementNo32015,
 
title = {Supplement-No.-3-2015},
 
title = {Supplement-No.-3-2015},
author = {{Mihaela}},
+
author = {Mihaela},
 
   }
 
   }
 
}}
 
}}
Line 8,517: Line 8,052:
 
title = {The new profiling: Algorithms, black boxes, and the failure of anti-discriminatory safeguards in the European Union},
 
title = {The new profiling: Algorithms, black boxes, and the failure of anti-discriminatory safeguards in the European Union},
 
issn = {0967-0106},
 
issn = {0967-0106},
abstract = {This article argues that with increasingly large databases and computational power, profiling as a key part of security governance is experiencing major changes. Targeting mobile populations in order to enact security via controlling and sifting the good from the bad, profiling techniques accumulate and process personal data. However, as advanced algorithmic analytics enable authorities to make sense of unprecedented amounts of information and derive patterns in a data-driven fashion, the procedures that bring risk into being increasingly differ from those of traditional profiling. While several scholars have dealt with the consequences of black-boxed and invisible algorithmic analytics in terms of privacy and data protection, this article engages the effects of knowledge-generating algorithms on anti-discriminatory safeguards. Using the European-level efforts for the establishment of a Passenger Name Record (PNR) system as an example, and on the theoretical level connecting distinct modes of profiling with Foucauldian thought on governing, the article finds that with pattern-based categorizations in data-driven profiling, safeguards such as the Charter of Fundamental Rights of the European Union or the EU data-protection framework essentially lose their applicability, leading to a diminishing role of the tools of the anti-discrimination framework.},
 
 
journal = {Security Dialogue},
 
journal = {Security Dialogue},
 
author = {de Goede, Marieke and Simon, Stephanie and Leese, Matthias},
 
author = {de Goede, Marieke and Simon, Stephanie and Leese, Matthias},
Line 8,600: Line 8,134:
 
issn = {0013189X},
 
issn = {0013189X},
 
doi = {10.2307/1175121},
 
doi = {10.2307/1175121},
abstract = {Educational Researcher 1981.10:5-9},
 
 
number = {4},
 
number = {4},
 
journal = {Educational Researcher},
 
journal = {Educational Researcher},
Line 8,638: Line 8,171:
 
  |bibtex=@article{catherinecassellSAGEHandbookQualitative,
 
  |bibtex=@article{catherinecassellSAGEHandbookQualitative,
 
title = {The SAGE Handbook of Qualitative usiness and Management Research Methods},
 
title = {The SAGE Handbook of Qualitative usiness and Management Research Methods},
author = {{Catherine Cassell} and {Ann L. Cunliffe \& Gina Grandy}},
+
author = {Catherine Cassell and Ann L. Cunliffe \& Gina Grandy},
 
   }
 
   }
 
}}
 
}}
Line 8,696: Line 8,229:
 
  |bibtex=@article{eisnerPromisePerilsAlternative,
 
  |bibtex=@article{eisnerPromisePerilsAlternative,
 
title = {The Promise and Perils of Alternative Forms of Data Representation},
 
title = {The Promise and Perils of Alternative Forms of Data Representation},
abstract = {Educational Researcher 1997.26:4-10},
 
 
author = {Eisner, Elliot W.},
 
author = {Eisner, Elliot W.},
 
   }
 
   }
Line 8,848: Line 8,380:
 
  |bibtex=@article{radar-groepRanCnCounter,
 
  |bibtex=@article{radar-groepRanCnCounter,
 
title = {ran\_c-n\_counter\_and\_alternative\_narratives\_berlin\_10-11122015\_en},
 
title = {ran\_c-n\_counter\_and\_alternative\_narratives\_berlin\_10-11122015\_en},
author = {{Radar-Groep}},
+
author = {Radar-Groep},
 
   }
 
   }
 
}}
 
}}
Line 8,869: Line 8,401:
 
  |bibtex=@article{alexanderRanCnInvolving,
 
  |bibtex=@article{alexanderRanCnInvolving,
 
title = {ran\_cn\_involving\_young\_people\_counter\_alternative\_narrative\_campaigns\_25042018\_en},
 
title = {ran\_cn\_involving\_young\_people\_counter\_alternative\_narrative\_campaigns\_25042018\_en},
author = {{Alexander}},
+
author = {Alexander},
 
   }
 
   }
 
}}
 
}}
Line 8,892: Line 8,424:
 
volume = {38},
 
volume = {38},
 
doi = {10.1068/a37327},
 
doi = {10.1068/a37327},
abstract = {Environ Plan A 2006.38:2021-2037},
 
 
number = {11},
 
number = {11},
 
journal = {Environment and Planning A},
 
journal = {Environment and Planning A},
Line 8,904: Line 8,435:
 
  |bibtex=@article{counciloftheeuropeanunionProposalRegulationEuropean2018,
 
  |bibtex=@article{counciloftheeuropeanunionProposalRegulationEuropean2018,
 
title = {Proposal for a Regulation of the European Parliament and of the Council on preventing the dissemination of terrorist content online - general approach},
 
title = {Proposal for a Regulation of the European Parliament and of the Council on preventing the dissemination of terrorist content online - general approach},
author = {{Council of the European Union}},
+
author = {Council of the European Union},
 
month = dec,
 
month = dec,
 
year = {2018},
 
year = {2018},
Line 8,915: Line 8,446:
 
  |bibtex=@article{europeancommissionProposalRegulationEuropean2018,
 
  |bibtex=@article{europeancommissionProposalRegulationEuropean2018,
 
title = {Proposal for a Regulation of the European Parliament and the Council on preventing the dissemination of terrorist content online},
 
title = {Proposal for a Regulation of the European Parliament and the Council on preventing the dissemination of terrorist content online},
author = {{European Commission}},
+
author = {European Commission},
 
month = jun,
 
month = jun,
 
year = {2018},
 
year = {2018},
Line 8,925: Line 8,456:
 
  |bibtex=@misc{europeanparliamentEuropeanParliamentResolution2017,
 
  |bibtex=@misc{europeanparliamentEuropeanParliamentResolution2017,
 
title = {European Parliament resolution of 15 June 2017 on online platforms and the digital single market (2016/2276(INI))},
 
title = {European Parliament resolution of 15 June 2017 on online platforms and the digital single market (2016/2276(INI))},
author = {{European Parliament}},
+
author = {European Parliament},
 
year = {2017},
 
year = {2017},
 
pages = {14},
 
pages = {14},
Line 8,934: Line 8,465:
 
  |bibtex=@article{vonbethlenfalvyilonaAnnexesProposal30,
 
  |bibtex=@article{vonbethlenfalvyilonaAnnexesProposal30,
 
title = {Annexes to proposal 30 August},
 
title = {Annexes to proposal 30 August},
author = {{VON BETHLENFALVY Ilona}},
+
author = {VON BETHLENFALVY Ilona},
 
   }
 
   }
 
}}
 
}}
Line 8,955: Line 8,486:
 
  |bibtex=@article{techdirt.comIfYouRe,
 
  |bibtex=@article{techdirt.comIfYouRe,
 
title = {If You're Worried About Bad EU Internet Regulation, Just Wait Until You See The New Terrorist Regulation},
 
title = {If You're Worried About Bad EU Internet Regulation, Just Wait Until You See The New Terrorist Regulation},
author = {{Techdirt.com}},
+
author = {Techdirt.com},
 
   }
 
   }
 
}}
 
}}
Line 8,969: Line 8,500:
 
  |bibtex=@misc{counciloftheeuropeanunionTerroristContentOnline2018,
 
  |bibtex=@misc{counciloftheeuropeanunionTerroristContentOnline2018,
 
title = {Terrorist content online: Council adopts negotiating position on new rules to prevent dissemination},
 
title = {Terrorist content online: Council adopts negotiating position on new rules to prevent dissemination},
author = {{Council of the European Union}},
+
author = {Council of the European Union},
 
year = {2018},
 
year = {2018},
 
   }
 
   }
Line 9,006: Line 8,537:
 
issn = {1369-118X},
 
issn = {1369-118X},
 
doi = {10.1080/1369118X.2017.1301519},
 
doi = {10.1080/1369118X.2017.1301519},
abstract = {Information, Communication \& Society, 2017. doi:10.1080/1369118X.2017.1301519},
 
 
number = {7},
 
number = {7},
 
journal = {Information, Communication \& Society},
 
journal = {Information, Communication \& Society},
Line 9,021: Line 8,551:
 
issn = {1745-0101},
 
issn = {1745-0101},
 
doi = {10.1080/17450101.2018.1427016},
 
doi = {10.1080/17450101.2018.1427016},
abstract = {Mobilities, 2018. doi:10.1080/17450101.2018.1427016},
 
 
number = {2},
 
number = {2},
 
journal = {Mobilities},
 
journal = {Mobilities},
Line 9,036: Line 8,565:
 
issn = {0967-0106},
 
issn = {0967-0106},
 
doi = {10.1177/0967010615578399},
 
doi = {10.1177/0967010615578399},
abstract = {Security Dialogue 2015.46:307-325},
 
 
number = {4},
 
number = {4},
 
journal = {Security Dialogue},
 
journal = {Security Dialogue},
Line 9,100: Line 8,628:
 
issn = {0269-1728},
 
issn = {0269-1728},
 
doi = {10.1080/02691728.2015.1015062},
 
doi = {10.1080/02691728.2015.1015062},
abstract = {Social Epistemology, 2015. doi:10.1080/02691728.2015.1015062},
 
 
number = {3},
 
number = {3},
 
journal = {Social Epistemology},
 
journal = {Social Epistemology},
Line 9,138: Line 8,665:
 
issn = {0967-0106},
 
issn = {0967-0106},
 
doi = {10.1177/0967010615586964},
 
doi = {10.1177/0967010615586964},
abstract = {Security Dialogue 2015.46:293-306},
 
 
number = {4},
 
number = {4},
 
journal = {Security Dialogue},
 
journal = {Security Dialogue},
Line 9,153: Line 8,679:
 
issn = {0967-0106},
 
issn = {0967-0106},
 
doi = {10.1177/0967010614543585},
 
doi = {10.1177/0967010614543585},
abstract = {Security Dialogue 2014.45:411-422},
 
 
number = {5},
 
number = {5},
 
journal = {Security Dialogue},
 
journal = {Security Dialogue},
Line 9,182: Line 8,707:
 
issn = {1362-4806},
 
issn = {1362-4806},
 
doi = {10.1177/1362480617690800},
 
doi = {10.1177/1362480617690800},
abstract = {Theoretical Criminology 2018.22:149-168},
 
 
number = {2},
 
number = {2},
 
journal = {Theoretical Criminology},
 
journal = {Theoretical Criminology},
Line 9,196: Line 8,720:
 
url = {http://europa.eu/rapid/press-release_IP-17-3493_en.htm},
 
url = {http://europa.eu/rapid/press-release_IP-17-3493_en.htm},
 
urldate = {2017-09-28},
 
urldate = {2017-09-28},
author = {{European Commission}},
+
author = {European Commission},
 
year = {2017},
 
year = {2017},
 
   }
 
   }
Line 9,207: Line 8,731:
 
issn = {1368-4310},
 
issn = {1368-4310},
 
doi = {10.1177/1368431016677976},
 
doi = {10.1177/1368431016677976},
abstract = {European Journal of Social Theory 2017.20:309-328},
 
 
number = {3},
 
number = {3},
 
journal = {European Journal of Social Theory},
 
journal = {European Journal of Social Theory},
Line 9,219: Line 8,742:
 
  |bibtex=@article{europeancommissionCommunicationCommissionEuropean2017,
 
  |bibtex=@article{europeancommissionCommunicationCommissionEuropean2017,
 
title = {Communication from the commission to the European Parliament, the Council, the European economic and social committee and the committee of the regions},
 
title = {Communication from the commission to the European Parliament, the Council, the European economic and social committee and the committee of the regions},
author = {{European Commission}},
+
author = {European Commission},
 
month = sep,
 
month = sep,
 
year = {2017},
 
year = {2017},
Line 9,235: Line 8,758:
 
volume = {11156},
 
volume = {11156},
 
isbn = {978-3-030-01081-2},
 
isbn = {978-3-030-01081-2},
abstract = {Case-Based Reasoning Research and Development, doi:10.1007/978-3-030-01081-2\_15},
 
 
language = {eng},
 
language = {eng},
 
publisher = {Springer},
 
publisher = {Springer},
author = {{Daniel López-Sánchez} and {Juan M. Corchado} and {Angélica González Arrieta}},
+
author = {Daniel López-Sánchez and Juan M. Corchado and Angélica González Arrieta},
 
editor = {Cox, Michael T. and Funk, Peter and Begum, Shahina},
 
editor = {Cox, Michael T. and Funk, Peter and Begum, Shahina},
 
year = {2018},
 
year = {2018},
Line 9,270: Line 8,792:
 
issn = {0886-5655},
 
issn = {0886-5655},
 
doi = {10.1080/08865655.2016.1174604},
 
doi = {10.1080/08865655.2016.1174604},
abstract = {Journal of Borderlands Studies, 2016. doi:10.1080/08865655.2016.1174604},
 
 
journal = {Journal of Borderlands Studies},
 
journal = {Journal of Borderlands Studies},
 
author = {Schindel, Estela},
 
author = {Schindel, Estela},
Line 9,287: Line 8,808:
 
  |bibtex=@article{reutersFacebookTakesTerrorist,
 
  |bibtex=@article{reutersFacebookTakesTerrorist,
 
title = {Facebook Takes on Terrorist Content Problem With AI},
 
title = {Facebook Takes on Terrorist Content Problem With AI},
author = {{Reuters}},
+
author = {Reuters},
 
   }
 
   }
 
}}
 
}}
Line 9,301: Line 8,822:
 
  |bibtex=@article{dralanj.liptonCriticalAssetProtection,
 
  |bibtex=@article{dralanj.liptonCriticalAssetProtection,
 
title = {Critical Asset Protection, Perimeter Monitoring, and Threat Detection Using Automated Video Surveillance},
 
title = {Critical Asset Protection, Perimeter Monitoring, and Threat Detection Using Automated Video Surveillance},
author = {{Dr Alan J. Lipton}},
+
author = {Dr Alan J. Lipton},
 
   }
 
   }
 
}}
 
}}
Line 9,336: Line 8,857:
 
title = {LAPD's highly-produced body camera video draws scrutiny},
 
title = {LAPD's highly-produced body camera video draws scrutiny},
 
url = {https://apnews.com/c5354bb0a0714c3792efab28e74db057},
 
url = {https://apnews.com/c5354bb0a0714c3792efab28e74db057},
abstract = {LOS ANGELES (AP) — In the city that's home to Hollywood, even releasing police body camera footage is a high-quality production. Los Angeles police made public body camera video under a new policy that requires the public see footage within 45 days of a "critical incident," which includes all fatal shootings and other police encounters that result in serious injury or the death of a civilian. The video  was carefully crafted and narrated so police could tell their "story" of an interaction with a man who died while in custody last month. They would not make the raw, unedited footage available.},
 
 
year = {2018},
 
year = {2018},
 
   }
 
   }
Line 9,344: Line 8,864:
 
  |bibtex=@article{europeanparliamentLegislativeTrainSchedule,
 
  |bibtex=@article{europeanparliamentLegislativeTrainSchedule,
 
title = {Legislative train schedule {\textbar} European Parliament {\textbar} Evernote Web},
 
title = {Legislative train schedule {\textbar} European Parliament {\textbar} Evernote Web},
author = {{European Parliament}},
+
author = {European Parliament},
 
   }
 
   }
 
}}
 
}}
Line 9,368: Line 8,888:
 
issn = {0084-6570},
 
issn = {0084-6570},
 
doi = {10.1146/annurev.anthro.33.070203.144034},
 
doi = {10.1146/annurev.anthro.33.070203.144034},
abstract = {Annu. Rev. Anthropol. 2005.34:159-179},
 
 
number = {1},
 
number = {1},
 
journal = {Annual Review of Anthropology},
 
journal = {Annual Review of Anthropology},
Line 9,394: Line 8,913:
 
  |bibtex=@article{scheptSeeingPrisonCountervisual,
 
  |bibtex=@article{scheptSeeingPrisonCountervisual,
 
title = {(Un)seeing like a prison: Counter-visual ethnography of the carceral state},
 
title = {(Un)seeing like a prison: Counter-visual ethnography of the carceral state},
abstract = {Theoretical Criminology 2014.18:198-223},
 
 
author = {Schept, Judah},
 
author = {Schept, Judah},
 
   }
 
   }
Line 9,402: Line 8,920:
 
  |bibtex=@article{ruppertRethinkingEmpiricalSocial,
 
  |bibtex=@article{ruppertRethinkingEmpiricalSocial,
 
title = {Rethinking empirical social sciences},
 
title = {Rethinking empirical social sciences},
abstract = {Dialogues in Human Geography 2013.3:268-273},
 
 
author = {Ruppert, Evelyn},
 
author = {Ruppert, Evelyn},
 
   }
 
   }
Line 9,422: Line 8,939:
 
issn = {0038-0261},
 
issn = {0038-0261},
 
doi = {10.1111/j.1467-954X.2009.01856.x},
 
doi = {10.1111/j.1467-954X.2009.01856.x},
abstract = {The Sociological Review 2009.57:371-384},
 
 
number = {3},
 
number = {3},
 
journal = {The Sociological Review},
 
journal = {The Sociological Review},
Line 9,436: Line 8,952:
 
title = {Visibility in social theory and social research},
 
title = {Visibility in social theory and social research},
 
isbn = {0-230-24102-6},
 
isbn = {0-230-24102-6},
abstract = {Palgrave Macmillan},
 
 
publisher = {Palgrave Macmillan},
 
publisher = {Palgrave Macmillan},
 
author = {Mubi Brighenti, Andrea},
 
author = {Mubi Brighenti, Andrea},
Line 9,452: Line 8,967:
 
author = {Halpern, Orit},
 
author = {Halpern, Orit},
 
year = {2015},
 
year = {2015},
file = {Halpern_2015_Beautiful data.pdf:/home/ruben/Zotero/storage/4U337SWA/Halpern_2015_Beautiful data.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 9,474: Line 8,988:
 
issn = {1468-7941},
 
issn = {1468-7941},
 
doi = {10.1177/1468794116656036},
 
doi = {10.1177/1468794116656036},
abstract = {Qualitative Research 2017.17:37-53},
 
 
number = {1},
 
number = {1},
 
journal = {Qualitative Research},
 
journal = {Qualitative Research},
Line 9,490: Line 9,003:
 
isbn = {978-1-138-78142-9},
 
isbn = {978-1-138-78142-9},
 
publisher = {Routledge},
 
publisher = {Routledge},
author = {{Cohen} and {Joshua L.} and {Johnson} and {J. Lauren} and {Orr} and {Penny}},
+
author = {Cohen and Joshua L. and Johnson and J. Lauren and Orr and Penny},
 
editor = {Cohen, Joshua L. and Johnson, J. Lauren},
 
editor = {Cohen, Joshua L. and Johnson, J. Lauren},
 
year = {2015},
 
year = {2015},
Line 9,501: Line 9,014:
 
title = {Phenomenology of perception},
 
title = {Phenomenology of perception},
 
isbn = {0-415-04556-8},
 
isbn = {0-415-04556-8},
abstract = {Humanities},
 
 
language = {engfre},
 
language = {engfre},
 
publisher = {Routledge},
 
publisher = {Routledge},
Line 9,516: Line 9,028:
 
isbn = {978-0-7486-3630-3},
 
isbn = {978-0-7486-3630-3},
 
url = {http://www.jstor.org/stable/10.3366/j.ctt1g0b594},
 
url = {http://www.jstor.org/stable/10.3366/j.ctt1g0b594},
abstract = {Introduction : Practice-led research, research-led practice : towards the iterative cycle web / Hazel Smith and Roger T. Dean -- Making space : the purpose and place of practice-led research / Graeme Sullivan -- New media : the 'first word' in art? / Simon Biggs -- Knowledge unspoken : contemporary dance and the cycle of practice-led research, basic and applied research, and research-led practice / Shirley McKechnie and Catherine Stevens -- Practice as research through performance / Baz Kershaw -- Beachcombing : a fossicker's guide to whiteness and indigenous sovereignty / Anne Brewster -- Integrating creative practice and research in the digital media arts / Andrew R. Brown and Andrew Sorensen -- Mariposa : the story of new work of research/creation, taking shape, taking flight / Kathleen Vaughan -- Sustaining the sustainable? Developing a practice and problem-led new media praxis / Keith Armstrong -- Nightmares in the engine room / Jane Goodall -- Acquiring know-how : research training for practice-led researchers / Brad Haseman and Daniel Mafe -- Asking questions of art : higher education, research and creative practice / Judith Mottram -- The academic mode of production / Sharon Bell
 
 
 
 
Addresses one of the most exciting and innovative developments within higher education},
 
 
language = {eng},
 
language = {eng},
 
publisher = {Edinburgh University Press},
 
publisher = {Edinburgh University Press},
Line 9,574: Line 9,081:
 
issn = {1364-5579},
 
issn = {1364-5579},
 
doi = {10.1080/13645579.2015.1129143},
 
doi = {10.1080/13645579.2015.1129143},
abstract = {International Journal of Social Research Methodology, 2016. doi:10.1080/13645579.2015.1129143},
 
 
number = {1},
 
number = {1},
 
journal = {International Journal of Social Research Methodology},
 
journal = {International Journal of Social Research Methodology},
Line 9,589: Line 9,095:
 
isbn = {978-1-60456-378-8},
 
isbn = {978-1-60456-378-8},
 
url = {http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=368634},
 
url = {http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=368634},
abstract = {Nova Science Publishers, Inc},
 
 
language = {eng},
 
language = {eng},
 
publisher = {Nova Science Publishers},
 
publisher = {Nova Science Publishers},
Line 9,637: Line 9,142:
 
title = {Research design},
 
title = {Research design},
 
isbn = {978-1-4625-1438-0},
 
isbn = {978-1-4625-1438-0},
abstract = {This user-friendly book provides a step-by-step guide to using the five major approaches to research design: quantitative, qualitative, mixed methods, arts-based, and community-based participatory research. Chapters on each approach follow a unique format--they present a template for a research proposal and explain in detail how to conceptualize and fill in every section. Terminology commonly used within each approach is identified, and key moments of ethical decision making are flagged. Interdisciplinary research examples draw on current events and social justice topics.},
 
 
publisher = {Guilford Press},
 
publisher = {Guilford Press},
 
author = {Leavy, Patricia},
 
author = {Leavy, Patricia},
Line 9,666: Line 9,170:
 
issn = {00202754},
 
issn = {00202754},
 
doi = {10.1111/tran.12232},
 
doi = {10.1111/tran.12232},
abstract = {Transactions of the Institute of British Geographers 2018.43:341-359},
 
 
number = {3},
 
number = {3},
 
journal = {Transactions of the Institute of British Geographers},
 
journal = {Transactions of the Institute of British Geographers},
Line 9,681: Line 9,184:
 
issn = {0894-9468},
 
issn = {0894-9468},
 
doi = {10.1080/08949468.2016.1154769},
 
doi = {10.1080/08949468.2016.1154769},
abstract = {Visual Anthropology, 2016. doi:10.1080/08949468.2016.1154769},
 
 
number = {3},
 
number = {3},
 
journal = {Visual Anthropology},
 
journal = {Visual Anthropology},
Line 9,696: Line 9,198:
 
issn = {00032409},
 
issn = {00032409},
 
doi = {10.1111/j.1365-2044.1976.tb11890.x},
 
doi = {10.1111/j.1365-2044.1976.tb11890.x},
abstract = {American Anthropologist 1978.80:752-757},
 
 
number = {6},
 
number = {6},
 
journal = {Anaesthesia},
 
journal = {Anaesthesia},
Line 9,738: Line 9,239:
 
issn = {1468-7941},
 
issn = {1468-7941},
 
doi = {10.1177/1468794109343628},
 
doi = {10.1177/1468794109343628},
abstract = {Qualitative Research 2009.9:587-603},
 
 
number = {5},
 
number = {5},
 
journal = {Qualitative Research},
 
journal = {Qualitative Research},
Line 9,820: Line 9,320:
 
  |bibtex=@book{charlessanderspeirceCollectedPapersCharles,
 
  |bibtex=@book{charlessanderspeirceCollectedPapersCharles,
 
title = {The Collected Papers of Charles Sanders Peirce},
 
title = {The Collected Papers of Charles Sanders Peirce},
author = {{Charles Sanders Peirce}},
+
author = {Charles Sanders Peirce},
 
   }
 
   }
 
}}
 
}}
Line 9,861: Line 9,361:
 
  |bibtex=@article{barthesElementsSemiology,
 
  |bibtex=@article{barthesElementsSemiology,
 
title = {Elements of Semiology},
 
title = {Elements of Semiology},
abstract = {Semiotics},
 
 
author = {Barthes, Roland},
 
author = {Barthes, Roland},
 
   }
 
   }
Line 9,886: Line 9,385:
 
  |bibtex=@article{jakobsonFundamentalsLanguage,
 
  |bibtex=@article{jakobsonFundamentalsLanguage,
 
title = {Fundamentals of language},
 
title = {Fundamentals of language},
author = {{Jakobson} and {Roman} and {1896}},
+
author = {Jakobson and Roman and 1896},
 
   }
 
   }
 
}}
 
}}
Line 9,893: Line 9,392:
 
  |bibtex=@article{carlose.perezCollectedPapersCharles,
 
  |bibtex=@article{carlose.perezCollectedPapersCharles,
 
title = {The Collected Papers of Charles Sanders Peirce},
 
title = {The Collected Papers of Charles Sanders Peirce},
author = {{Carlos E.  Perez}},
+
author = {Carlos E.  Perez},
 
   }
 
   }
 
}}
 
}}
Line 9,910: Line 9,409:
 
isbn = {978-0-415-30654-6},
 
isbn = {978-0-415-30654-6},
 
url = {http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=116951},
 
url = {http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=116951},
abstract = {"In Working Images, prominent visual anthropologists and artists explore how old and new visual media can be integrated into contemporary forms of research and representation"--Provided by publisher},
 
 
language = {eng},
 
language = {eng},
 
publisher = {Routledge},
 
publisher = {Routledge},
Line 9,928: Line 9,426:
 
  |bibtex=@article{thomasSocialInteractionalDimensions,
 
  |bibtex=@article{thomasSocialInteractionalDimensions,
 
title = {The Social and Interactional Dimensions of Human–Computer Interfaces},
 
title = {The Social and Interactional Dimensions of Human–Computer Interfaces},
author = {{Thomas} and {Peter J.}},
+
author = {Thomas and Peter J.},
 
   }
 
   }
 
}}
 
}}
Line 9,938: Line 9,436:
 
issn = {1354-8565},
 
issn = {1354-8565},
 
doi = {10.1177/1354856515592505},
 
doi = {10.1177/1354856515592505},
abstract = {Convergence 2017.23:197-213},
 
 
number = {2},
 
number = {2},
 
journal = {Convergence: The International Journal of Research into New Media Technologies},
 
journal = {Convergence: The International Journal of Research into New Media Technologies},
Line 9,953: Line 9,450:
 
isbn = {978-1-4673-2358-1},
 
isbn = {978-1-4673-2358-1},
 
doi = {10.1109/EISIC.2012.33},
 
doi = {10.1109/EISIC.2012.33},
abstract = {2012 European Intelligence and Security Informatics Conference},
 
 
publisher = {IEEE},
 
publisher = {IEEE},
 
author = {Morris, Travis},
 
author = {Morris, Travis},
Line 9,966: Line 9,462:
 
title = {The Routledge handbook of emotions and mass media},
 
title = {The Routledge handbook of emotions and mass media},
 
isbn = {978-0-415-48160-1},
 
isbn = {978-0-415-48160-1},
abstract = {Behavioral Sciences},
 
 
publisher = {Routledge},
 
publisher = {Routledge},
 
author = {Döveling, Katrin and Scheve, Christian von and Konijn, Elly},
 
author = {Döveling, Katrin and Scheve, Christian von and Konijn, Elly},
Line 9,976: Line 9,471:
 
  |bibtex=@article{mn1178MicrosoftWordDark,
 
  |bibtex=@article{mn1178MicrosoftWordDark,
 
title = {Microsoft Word - The\_Dark\_Side\_of\_Political\_Marketing.doc},
 
title = {Microsoft Word - The\_Dark\_Side\_of\_Political\_Marketing.doc},
author = {{MN1178}},
+
author = {MN1178},
 
   }
 
   }
 
}}
 
}}
Line 9,996: Line 9,491:
 
isbn = {978-0-415-29144-6},
 
isbn = {978-0-415-29144-6},
 
url = {http://gbv.eblib.com/patron/FullRecord.aspx?p=1222825},
 
url = {http://gbv.eblib.com/patron/FullRecord.aspx?p=1222825},
abstract = {First published in 2002},
 
 
language = {eng},
 
language = {eng},
 
publisher = {Taylor and Francis},
 
publisher = {Taylor and Francis},
Line 10,063: Line 9,557:
 
title = {The eye of war},
 
title = {The eye of war},
 
isbn = {978-1-4529-5805-7},
 
isbn = {978-1-4529-5805-7},
abstract = {"This project explores how technologies of perception -- the ability to detect and to avoid detection -- have transformed modern warfare. The book spans from the Renaissance, where the rationalization of vision and space started to influence military strategy, to the present day, where combatants increasingly face off in the perceptual realm of drones and satellites as much the physical battlefield. Each chapter explores a different perceptual theme: sensing, imaging, mapping and hiding"--},
 
 
publisher = {University of Minnesota Press},
 
publisher = {University of Minnesota Press},
 
author = {Bousquet, Antoine J.},
 
author = {Bousquet, Antoine J.},
Line 10,091: Line 9,584:
 
issn = {2053-9517},
 
issn = {2053-9517},
 
doi = {10.1177/2053951718802321},
 
doi = {10.1177/2053951718802321},
abstract = {Big Data \& Society 2018.5:2053951718802321},
 
 
number = {2},
 
number = {2},
 
journal = {Big Data \& Society},
 
journal = {Big Data \& Society},
Line 10,164: Line 9,656:
 
issn = {2053-9517},
 
issn = {2053-9517},
 
doi = {10.1177/2053951718799114},
 
doi = {10.1177/2053951718799114},
abstract = {Big Data \& Society 2018.5:2053951718799114},
 
 
number = {2},
 
number = {2},
 
journal = {Big Data \& Society},
 
journal = {Big Data \& Society},
Line 10,179: Line 9,670:
 
issn = {0967-0106},
 
issn = {0967-0106},
 
doi = {10.1177/0967010618788996},
 
doi = {10.1177/0967010618788996},
abstract = {Security Dialogue 0.0:0967010618788996},
 
 
number = {3},
 
number = {3},
 
journal = {Security Dialogue},
 
journal = {Security Dialogue},
Line 10,194: Line 9,684:
 
issn = {1354-0661},
 
issn = {1354-0661},
 
doi = {10.1177/1354066118781955},
 
doi = {10.1177/1354066118781955},
abstract = {European Journal of International Relations 0.0:1354066118781955},
 
 
number = {3},
 
number = {3},
 
journal = {European Journal of International Relations},
 
journal = {European Journal of International Relations},
Line 10,223: Line 9,712:
 
issn = {2053-9517},
 
issn = {2053-9517},
 
doi = {10.1177/2053951718756686},
 
doi = {10.1177/2053951718756686},
abstract = {Big Data \& Society 2018.5:2053951718756686},
 
 
number = {1},
 
number = {1},
 
journal = {Big Data \& Society},
 
journal = {Big Data \& Society},
Line 10,239: Line 9,727:
 
url = {http://arxiv.org/pdf/1005.2015v2},
 
url = {http://arxiv.org/pdf/1005.2015v2},
 
doi = {10.1143/JPSJ.79.093710},
 
doi = {10.1143/JPSJ.79.093710},
abstract = {Nonlinear transport in the one dimensional Hubbard model at half-filling under a finite bias voltage is investigated by the adaptive time-dependent density matrix renormalization group method. For repulsive on-site interaction, dielectric breakdown of the Mott insulating ground state to a current-carrying nonequilibrium steady state is clearly observed when the voltage exceeds the charge gap. It is found that by increasing the voltage further the current-voltage characteristics are scaled only by the charge gap and the scaling curve exhibits almost linear dependence on the voltage whose slope is suppressed by the electron correlation. In the case of attractive interaction the linear conductance is the perfect one \$2e{\textasciicircum}2/h\$ which agrees with the prediction by the Luttinger liquid theory.},
 
 
number = {9},
 
number = {9},
 
urldate = {2010-05-12},
 
urldate = {2010-05-12},
Line 10,266: Line 9,753:
 
  |bibtex=@article{danielAutor,
 
  |bibtex=@article{danielAutor,
 
title = {Autor},
 
title = {Autor},
author = {{Daniel}},
+
author = {Daniel},
 
   }
 
   }
 
}}
 
}}
Line 10,317: Line 9,804:
 
isbn = {978-0-7507-0706-0},
 
isbn = {978-0-7507-0706-0},
 
url = {https://ebookcentral.proquest.com/lib/gbv/detail.action?docID=241926},
 
url = {https://ebookcentral.proquest.com/lib/gbv/detail.action?docID=241926},
abstract = {Book Cover -- Half-Title -- Title -- Dedication -- Title -- Copyright -- Contents -- Acknowledgments -- Introduction -- Part 1  A Theoretical Overview of Image-based Research -- Chapter 1  Visual Anthropology: Image, Object and Interpretation1 -- Abstract -- Anthropology and Visual Systems -- The Visual in Anthropology -- Issues -- Material Visions -- Notes -- References -- Chapter 2  An Argument for Visual Sociology -- Abstract -- Visual Ethnography and the Realist Tale -- Visual Sociology and the Realist Tale -- Methodological Critique: New Ethnography -- The Critique, Part Two: Postmodernism and Documentary -- The Critique, Part Three: Cultural Studies and Visual Texts -- Building a Visual Sociology -- Salvaging assumptions from traditional sociology? -- Lessons from the Critique? -- Visual Sociologist as Cultural Critique? -- Notes -- References -- Chapter 3  Film-making and Ethnographic Research -- Abstract -- Claiming the Real: The Status of Ethnographic Film -- Documentation versus the Documentary -- Film and Anthropological Theory -- Film as Ethnography: The Promise of the Future -- Notes -- References -- Chapter 4  'The Camera Never Lies': The Partiality of Photographic Evidence -- Abstract -- Notes -- References -- Chapter 5  Psychology and Photographic Theory -- Abstract -- Introduction -- onal Reaction ... -- ionship to Time ... -- Folk Myth' or a 'Symbolist Folk Myth' ... -- The Meaning of Photographs Arises in a Narrative Context -- Photographs May Draw on Ancient Themes of Unity and Cohesiveness ... -- Our Personal Histories are not only Contained in Family Albums, but They are Created by Them -- Conclusion -- References -- Chapter 6 Visual Sociology, Documentary Photography, and Photojournalism: It's (Almost) All a Matter of Context -- Abstract -- Three Kinds of Photography -- Context -- A Practical Demonstration
 
 
 
 
Reading a Documentary Picture As Visual Sociology or Photojournalism -- Reading a Sociological Picture as Journalism and as Documentary -- Reading a Journalistic Picture as Visual Sociology and as Documentary -- Conclusion -- Notes -- References -- Chapter 7  The Status of Image-based Research -- Abstract -- Introduction -- What Informs Qualitative Researchers' Views on Image-based Research? -- Historical Influences -- Traditional Methodological Arguments against Image-based Research -- Reflexivity -- Researchers Do Not Live in a Vacuum -- Conclusion -- Notes -- References -- Part 2  Images in the Research Process -- Chapter 8  Photographs within the Sociological Research Process -- Abstract -- Research Design -- Data Collection -- Analysis -- Conclusion -- Notes -- References -- Chapter 9 Remarks on Visual Competence as an Integral Part of Ethnographic Fieldwork Practice: The Visual Availability of Culture -- Abstract -- Introduction -- Ethnography as Description -- Ethnography and the Visual Domain: Cultures Visual Availability -- Ethnographic Analysis and the Visual Availability of Cultural Arrangements -- A Case Study in the Ethnographic Analysis of Stored Visual Materials -- The Ethnographic Context -- A Visual Research Problem -- Preliminary Observations on the Data -- Signs -- The Potential to Analyse a Unit of Data from Different Theoretical Vantages -- References -- Chapter 10  Photocontext -- Abstract -- The Sensitive Eye -- Documenting Instances -- Internal Validity and Reflexivity -- Accounts of Reflexive Photographers -- What to Frame and Questions of Validity -- External Validity -- Conclusion -- Notes -- References -- Chapter 11  Media Convergence and Social Research: The Hathaway Project -- Abstract -- Introduction -- Origins of the Project -- The Hathaway Project -- The Nature of the Resource -- Conclusion -- Note -- References
 
 
 
 
Chapter 12  The Application of Images in Child Abuse Investigations -- Abstract -- Brief History of Research on Child Witnesses -- The Use of Images in Interviews -- Anatomically Detailed Dolls -- Puppets -- Books -- Drawings -- Other Projective Techniques -- Play Therapy Toys -- Image-based Techniques in the Cognitive Interview -- Conclusion -- References -- Part 3  Image-based Research in Practice -- Chapter 13 Picture This! Class Line-ups, Vernacular Portraits and Lasting Impressions of School -- Abstract -- Introduction -- Constucted Images -- Photography and Narrative -- Revisiting the Family Album -- Teachers as Photographers -- School Photography in Image-based Research -- Note -- References -- Chapter 14  Interpreting Family Photography as Pictorial Communication -- Abstract -- Introduction -- A Social Approach to the Pictorial World -- Locating the Home Mode of Communication -- Searching for an Orienting Question -- Proposing a Descriptive Framework -- Image Communication Events -- Planning Events -- Shooting Events -- Editing Events -- Exhibition Events -- Image Communication Components -- Personal, Social, and Cultural Functions -- Fieldwork Methods for Home Mode Projects -- Conclusion -- Notes -- References -- Chapter 15 Pupils Using Photographs in School Self-evaluation -- Abstract -- What's the Use of Taking Photographs in Evaluation? -- Why Not Think of Life as a Chain of Photographs? -- How to Do Photo-evaluation -- A Short Guide to Photo-evaluation -- Ways of Implementing Photo-evaluation -- Photo-evaluation in the Making -- Teamwork Observed -- First Findings -- What We Have Learned from Observing Discussion, Decision Making and Presentations -- Hints and Warnings -- Getting Hold of the Invisible: Theoretical Annotations -- Islands of Agreement -- Control and Liberation -- Curricular Matters -- Conclusion -- Note -- References
 
 
 
 
Chapter 16  Cartoons and Teachers: Mediated Visual Images as Data -- Abstract -- Introduction -- Describing a Cartoon -- Content and the Public Context -- Methodology -- Stage 1:  Initial Description -- Stage 2:  Immediate Connotation -- Stage 3:  Systemic Connotation -- Stage 4:  Establishing Narrative Threads -- Conclusion -- References -- Chapter 17  Images and Curriculum Development in Health Education -- Abstract -- The Challenge -- The Role of Developmental Psychology -- The Importance of 'Starting Where Children Are' -- Using the Images Children Draw -- The Draw and Write Technique -- Using 'Draw and Write' to Investigate Health-related Issues with Children -- Establishing Draw and Write as a Valid and Reliable Research Tool -- Conclusion -- References -- Chapter 18 Making Meanings in Art Worlds: A Sociological Account of the Career of John Constable and his Oeuvre, with Special Reference to 'The Cornfield' (Homage to Howard Becker) -- Abstract -- Introduction -- Methodology -- Resources -- Conventions -- Distribution -- Aesthetic Rationale -- Editing -- Art and Craft -- Change in Art Worlds -- Reputation -- Notes -- References -- Notes on Contributors -- Index
 
 
 
 
This text covers an image-based approach to qualitative research theory, and the research process and provides practical examples of how image-based research is applied in the field. Specifically, it covers a range of disciplines (sociology, anthropology, ethnography) and discusses the application of various image-based techniques (photography, film-making, video and cartoon)},
 
 
language = {eng},
 
language = {eng},
 
publisher = {Taylor and Francis},
 
publisher = {Taylor and Francis},
Line 10,353: Line 9,823:
 
title = {Notes on the History and Development of Visual Research Methods},
 
title = {Notes on the History and Development of Visual Research Methods},
 
doi = {10.2390/INDI-V4-I1-77},
 
doi = {10.2390/INDI-V4-I1-77},
abstract = {Visual research has been gaining in importance in recent years. This can be seen most clearly in those methods that rely on various forms of visual representation and using photographs, films, or videos as main sources of data. While opening the door to a deeper understanding and interpretation of social realities, visual analysis continues to deliver methodological challenge to the social sciences. This article sheds light on the development of visual analysis and focuses on its relevance for social research. Starting with its first applications following the invention of still and moving cameras, it traces this development up to the current use of audio-visual digital camera technologies in social research, which has made the most noticeable theoretical and methodological progress in the social sciences in the fields of videography and interpretive video analysis.},
 
 
language = {en},
 
language = {en},
 
author = {Schnettler, Bernt},
 
author = {Schnettler, Bernt},
Line 10,380: Line 9,849:
 
issn = {0028-3932},
 
issn = {0028-3932},
 
doi = {10.1016/j.neuropsychologia.2009.08.013},
 
doi = {10.1016/j.neuropsychologia.2009.08.013},
abstract = {High-functioning individuals with autism have been found to favor visuospatial processing in the face of typically poor language abilities. We aimed to examine the neurobiological basis of this difference using functional magnetic resonance imaging and diffusion tensor imaging. We compared 12 children with high functioning autism (HFA) to 12 age- and IQ-matched typically developing controls (CTRL) on a pictorial reasoning paradigm under three conditions: V, requiring visuospatial processing, S, requiring language (i.e. semantic) processing, and V+S, a hybrid condition in which language use could facilitate visuospatial transformations. Activated areas in the brain were chosen as endpoints for probabilistic diffusion tractography to examine tract integrity (FA) within the structural network underlying the activation patterns. The two groups showed similar networks, with linguistic processing activating inferior frontal, superior and middle temporal, ventral visual, and temporo-parietal areas, whereas visuospatial processing activated occipital and inferior parietal cortices. However, HFA appeared to activate occipito-parietal and ventral temporal areas, whereas CTRL relied more on frontal and temporal language regions. The increased reliance on visuospatial abilities in HFA was supported by intact connections between the inferior parietal and the ventral temporal ROIs. In contrast, the inferior frontal region showed reduced connectivity to ventral temporal and middle temporal areas in this group, reflecting impaired activation of frontal language areas in autism. The HFA group’s engagement of posterior brain regions along with its weak connections to frontal language areas suggest support for a reliance on visual mediation in autism, even in tasks of higher cognition.},
 
 
language = {eng},
 
language = {eng},
 
number = {1},
 
number = {1},
Line 10,396: Line 9,864:
 
title = {Film as art},
 
title = {Film as art},
 
isbn = {978-0-520-24837-3},
 
isbn = {978-0-520-24837-3},
abstract = {Hier auch später erschienene Auflagen},
 
 
language = {eng},
 
language = {eng},
 
publisher = {Univ. of California Press},
 
publisher = {Univ. of California Press},
Line 10,414: Line 9,881:
 
title = {2018 is the year AI got its eyes},
 
title = {2018 is the year AI got its eyes},
 
url = {https://www.engadget.com/2018/12/29/2018-is-the-year-ai-got-its-eyes/},
 
url = {https://www.engadget.com/2018/12/29/2018-is-the-year-ai-got-its-eyes/},
abstract = {Despite recent progress in generative image modeling, successfully generating high-resolution, diverse samples from complex datasets such as ImageNet remains an elusive goal. To this end, we train Generative Adversarial Networks at the largest scale yet attempted, and study the instabilities specific to such scale. We find that applying orthogonal regularization to the generator renders it amenable to a simple "truncation trick", allowing fine control over the trade-off between sample fidelity and variety by truncating the latent space. Our modifications lead to models which set the new state of the art in class-conditional image synthesis. When trained on ImageNet at 128x128 resolution, our models (BigGANs) achieve an Inception Score (IS) of 166.3 and Frechet Inception Distance (FID) of 9.6, improving over the previous best IS of 52.52 and FID of 18.65.},
+
author = {Tarantola},
author = {{Tarantola}},
 
 
month = sep,
 
month = sep,
 
year = {2018},
 
year = {2018},
Line 10,439: Line 9,905:
 
  |bibtex=@article{cityuniversityEUFundedProjectUses,
 
  |bibtex=@article{cityuniversityEUFundedProjectUses,
 
title = {EU-Funded project uses artificial intelligence to tackle terrorist cyber-propaganda},
 
title = {EU-Funded project uses artificial intelligence to tackle terrorist cyber-propaganda},
author = {{City University}},
+
author = {City University},
 
   }
 
   }
 
}}
 
}}
Line 10,453: Line 9,919:
 
  |bibtex=@article{luxonlineTheoryDefinitionStructural,
 
  |bibtex=@article{luxonlineTheoryDefinitionStructural,
 
title = {Theory and Definition of Structural/ Materialist Film},
 
title = {Theory and Definition of Structural/ Materialist Film},
author = {{Luxonline}},
+
author = {Luxonline},
 
   }
 
   }
 
}}
 
}}
Line 10,512: Line 9,978:
 
issn = {2053-9517},
 
issn = {2053-9517},
 
doi = {10.1177/2053951718799114},
 
doi = {10.1177/2053951718799114},
abstract = {Big Data \& Society 2018.5:2053951718799114},
 
 
number = {2},
 
number = {2},
 
journal = {Big Data \& Society},
 
journal = {Big Data \& Society},
Line 10,527: Line 9,992:
 
issn = {2053-9517},
 
issn = {2053-9517},
 
doi = {10.1177/2053951718765021},
 
doi = {10.1177/2053951718765021},
abstract = {Big Data \& Society 2018.5:2053951718765021},
 
 
number = {1},
 
number = {1},
 
journal = {Big Data \& Society},
 
journal = {Big Data \& Society},
Line 10,549: Line 10,013:
 
issn = {1466-1381},
 
issn = {1466-1381},
 
doi = {10.1177/1466138113505023},
 
doi = {10.1177/1466138113505023},
abstract = {Ethnography 2015.16:95-117},
 
 
number = {1},
 
number = {1},
 
journal = {Ethnography},
 
journal = {Ethnography},
Line 10,576: Line 10,039:
 
issn = {2053-9517},
 
issn = {2053-9517},
 
doi = {10.1177/2053951718784083},
 
doi = {10.1177/2053951718784083},
abstract = {Big Data \& Society 2018.5:2053951718784083},
 
 
number = {2},
 
number = {2},
 
journal = {Big Data \& Society},
 
journal = {Big Data \& Society},
Line 10,591: Line 10,053:
 
issn = {2053-9517},
 
issn = {2053-9517},
 
doi = {10.1177/2053951718756686},
 
doi = {10.1177/2053951718756686},
abstract = {Big Data \& Society 2018.5:2053951718756686},
 
 
number = {1},
 
number = {1},
 
journal = {Big Data \& Society},
 
journal = {Big Data \& Society},
Line 10,606: Line 10,067:
 
issn = {2053-9517},
 
issn = {2053-9517},
 
doi = {10.1177/2053951718796862},
 
doi = {10.1177/2053951718796862},
abstract = {Big Data \& Society 2018.5:2053951718796862},
 
 
number = {2},
 
number = {2},
 
journal = {Big Data \& Society},
 
journal = {Big Data \& Society},
Line 10,621: Line 10,081:
 
issn = {2053-9517},
 
issn = {2053-9517},
 
doi = {10.1177/2053951718756684},
 
doi = {10.1177/2053951718756684},
abstract = {Big Data \& Society 2018.5:2053951718756684},
 
 
number = {1},
 
number = {1},
 
journal = {Big Data \& Society},
 
journal = {Big Data \& Society},
Line 10,636: Line 10,095:
 
issn = {2053-9517},
 
issn = {2053-9517},
 
doi = {10.1177/2053951718808553},
 
doi = {10.1177/2053951718808553},
abstract = {Big Data \& Society 2018.5:2053951718808553},
 
 
number = {2},
 
number = {2},
 
journal = {Big Data \& Society},
 
journal = {Big Data \& Society},
Line 10,651: Line 10,109:
 
issn = {2053-9517},
 
issn = {2053-9517},
 
doi = {10.1177/2053951718779194},
 
doi = {10.1177/2053951718779194},
abstract = {Big Data \& Society 2018.5:2053951718779194},
 
 
number = {1},
 
number = {1},
 
journal = {Big Data \& Society},
 
journal = {Big Data \& Society},
Line 10,666: Line 10,123:
 
issn = {2053-9517},
 
issn = {2053-9517},
 
doi = {10.1177/2053951717738104},
 
doi = {10.1177/2053951717738104},
abstract = {Big Data \& Society 2017.4:2053951717738104},
 
 
number = {2},
 
number = {2},
 
journal = {Big Data \& Society},
 
journal = {Big Data \& Society},
Line 10,681: Line 10,137:
 
issn = {2053-9517},
 
issn = {2053-9517},
 
doi = {10.1177/2053951717738105},
 
doi = {10.1177/2053951717738105},
abstract = {Big Data \& Society 2017.4:2053951717738105},
 
 
number = {2},
 
number = {2},
 
journal = {Big Data \& Society},
 
journal = {Big Data \& Society},
Line 10,725: Line 10,180:
 
title = {Video in qualitative research},
 
title = {Video in qualitative research},
 
isbn = {978-1-4129-2943-1},
 
isbn = {978-1-4129-2943-1},
abstract = {Provides practical guidance for both students and academics on how to use video in qualitative research, how to address the problems and issues that arise in undertaking video-based field studies and how to subject video recordings to detailed scrutiny and analysis.},
 
 
publisher = {SAGE},
 
publisher = {SAGE},
 
author = {Heath, Christian and Hindmarsh, Jon and Luff, Paul},
 
author = {Heath, Christian and Hindmarsh, Jon and Luff, Paul},
Line 10,751: Line 10,205:
 
issn = {1472-586X},
 
issn = {1472-586X},
 
doi = {10.1080/1472586X.2014.887266},
 
doi = {10.1080/1472586X.2014.887266},
abstract = {Visual Studies, 2014. doi:10.1080/1472586X.2014.887266},
 
 
number = {2},
 
number = {2},
 
journal = {Visual Studies},
 
journal = {Visual Studies},
Line 10,763: Line 10,216:
 
  |bibtex=@article{efTerroristsWillSoon,
 
  |bibtex=@article{efTerroristsWillSoon,
 
title = {Terrorists Will Soon Be Able to Fake Any Video},
 
title = {Terrorists Will Soon Be Able to Fake Any Video},
author = {{Ef}},
+
author = {Ef},
 
pages = {2018},
 
pages = {2018},
 
   }
 
   }
Line 10,771: Line 10,224:
 
  |bibtex=@article{bipartisanpolicycenterDigitalCounterterrorismFighting2018,
 
  |bibtex=@article{bipartisanpolicycenterDigitalCounterterrorismFighting2018,
 
title = {Digital Counterterrorism: Fighting Jihadists Online},
 
title = {Digital Counterterrorism: Fighting Jihadists Online},
author = {{Bipartisan Policy Center}},
+
author = {Bipartisan Policy Center},
 
year = {2018},
 
year = {2018},
 
pages = {36},
 
pages = {36},
Line 10,783: Line 10,236:
 
issn = {1753-9153},
 
issn = {1753-9153},
 
doi = {10.1080/17539153.2017.1399787},
 
doi = {10.1080/17539153.2017.1399787},
abstract = {Critical Studies on Terrorism, 2018. doi:10.1080/17539153.2017.1399787},
 
 
number = {1},
 
number = {1},
 
journal = {Critical Studies on Terrorism},
 
journal = {Critical Studies on Terrorism},
Line 10,854: Line 10,306:
 
url = {http://sel.fas.harvard.edu/},
 
url = {http://sel.fas.harvard.edu/},
 
urldate = {2021-02-17},
 
urldate = {2021-02-17},
file = {Sensory Ethnography Lab \:\: Harvard University:/home/ruben/Zotero/storage/SQHMMNAV/sel.fas.harvard.edu.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 10,862: Line 10,313:
 
title = {sensatejournal.com - SE},
 
title = {sensatejournal.com - SE},
 
url = {https://sensatejournal.com/},
 
url = {https://sensatejournal.com/},
abstract = {SE},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-02-17},
 
urldate = {2021-02-17},
 
journal = {sensatejournal.com},
 
journal = {sensatejournal.com},
file = {Snapshot:/home/ruben/Zotero/storage/VG5US8C9/sensatejournal.com.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 10,876: Line 10,325:
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-02-17},
 
urldate = {2021-02-17},
file = {Snapshot:/home/ruben/Zotero/storage/YLB7DRW9/cmp.gsas.harvard.edu.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 10,887: Line 10,335:
 
urldate = {2021-02-17},
 
urldate = {2021-02-17},
 
journal = {the Research Portal - University of Namur},
 
journal = {the Research Portal - University of Namur},
file = {Snapshot:/home/ruben/Zotero/storage/85JNWIMG/antoinette-rouvroy.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 10,899: Line 10,346:
 
url = {https://www.cambridge.org/core/product/identifier/S2057563717000141/type/journal_article},
 
url = {https://www.cambridge.org/core/product/identifier/S2057563717000141/type/journal_article},
 
doi = {10.1017/eis.2017.14},
 
doi = {10.1017/eis.2017.14},
abstract = {As digital technologies and algorithmic rationalities have increasingly reconfigured security practices, critical scholars have drawn attention to their performative effects on the temporality of law, notions of rights, and understandings of subjectivity. This article proposes to explore how the ‘other’ is made knowable in massive amounts of data and how the boundary between self and other is drawn algorithmically. It argues that algorithmic security practices and Big Data technologies have transformed self/other relations. Rather than the enemy or the risky abnormal, the ‘other’ is algorithmically produced as anomaly. Although anomaly has been often used interchangeably with abnormality and pathology, a brief genealogical reading of the concept shows that it works as a supplementary term, which reconfigures the dichotomies of normality/abnormality, friend/enemy, and identity/difference. By engaging with key practices of anomaly detection by intelligence and security agencies, the article analyses the materialisation of anomalies as specific spatial ‘dots’, temporal ‘spikes’ and topological ‘nodes’. We argue that anomaly is not simply indicative of more heterogeneous modes of othering in times of Big Data, but represents a mutation in the logics of security that challenge our extant analytical and critical vocabularies.},
 
 
language = {en},
 
language = {en},
 
number = {1},
 
number = {1},
Line 10,908: Line 10,354:
 
year = {2018},
 
year = {2018},
 
pages = {1--21},
 
pages = {1--21},
file = {Aradau and Blanke - 2018 - Governing others Anomaly and the algorithmic subj.pdf:/home/ruben/Zotero/storage/PS4CQEB4/Aradau and Blanke - 2018 - Governing others Anomaly and the algorithmic subj.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 10,916: Line 10,361:
 
title = {CBP reports advances in biometrics -},
 
title = {CBP reports advances in biometrics -},
 
url = {https://fcw.com/articles/2017/05/24/biometric-exit-dhs-rockwell.aspx},
 
url = {https://fcw.com/articles/2017/05/24/biometric-exit-dhs-rockwell.aspx},
abstract = {After years of searching and tech trials, Customs and Border Protection said it has found a way to make a biometric entry/exit system work with airlines and airports.},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-02-18},
 
urldate = {2021-02-18},
 
journal = {FCW},
 
journal = {FCW},
 
author = {Rockwell, By Mark and May 24, 2017},
 
author = {Rockwell, By Mark and May 24, 2017},
file = {Snapshot:/home/ruben/Zotero/storage/UFGQIRV7/biometric-exit-dhs-rockwell.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 10,930: Line 10,373:
 
shorttitle = {Exclusive},
 
shorttitle = {Exclusive},
 
url = {https://theintercept.com/2021/02/18/oracle-china-police-surveillance/},
 
url = {https://theintercept.com/2021/02/18/oracle-china-police-surveillance/},
abstract = {In its bid for TikTok, Oracle was supposed to prevent data from being passed to Chinese police. Instead, it’s been marketing its own software for their surveillance work.},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-02-19},
 
urldate = {2021-02-19},
 
journal = {The Intercept},
 
journal = {The Intercept},
 
author = {HvistendahlFebruary 18 2021, Mara HvistendahlMara and A.m, 11:20},
 
author = {HvistendahlFebruary 18 2021, Mara HvistendahlMara and A.m, 11:20},
file = {Snapshot:/home/ruben/Zotero/storage/CCRZBAJB/oracle-china-police-surveillance.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 10,945: Line 10,386:
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-02-19},
 
urldate = {2021-02-19},
file = {Snapshot:/home/ruben/Zotero/storage/NLXFLBNW/2021.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 10,954: Line 10,394:
 
url = {https://facctconference.org/2021/index.html},
 
url = {https://facctconference.org/2021/index.html},
 
urldate = {2021-02-19},
 
urldate = {2021-02-19},
file = {ACM FAccT - 2021 Home:/home/ruben/Zotero/storage/3QDFFM5W/index.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 10,965: Line 10,404:
 
url = {https://doi.org/10.1145/3415186},
 
url = {https://doi.org/10.1145/3415186},
 
doi = {10.1145/3415186},
 
doi = {10.1145/3415186},
abstract = {The interpretation of data is fundamental to machine learning. This paper investigates practices of image data annotation as performed in industrial contexts. We define data annotation as a sense-making practice, where annotators assign meaning to data through the use of labels. Previous human-centered investigations have largely focused on annotators? subjectivity as a major cause of biased labels. We propose a wider view on this issue: guided by constructivist grounded theory, we conducted several weeks of fieldwork at two annotation companies. We analyzed which structures, power relations, and naturalized impositions shape the interpretation of data. Our results show that the work of annotators is profoundly informed by the interests, values, and priorities of other actors above their station. Arbitrary classifications are vertically imposed on annotators, and through them, on data. This imposition is largely naturalized. Assigning meaning to data is often presented as a technical matter. This paper shows it is, in fact, an exercise of power with multiple implications for individuals and society.},
 
 
number = {CSCW2},
 
number = {CSCW2},
 
urldate = {2021-02-19},
 
urldate = {2021-02-19},
Line 10,973: Line 10,411:
 
year = {2020},
 
year = {2020},
 
pages = {115:1--115:25},
 
pages = {115:1--115:25},
file = {Miceli et al_2020_Between Subjectivity and Imposition.pdf:/home/ruben/Zotero/storage/QDQHYDLX/Miceli et al_2020_Between Subjectivity and Imposition.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 10,981: Line 10,418:
 
title = {How to Reclaim Your Face From Clearview AI},
 
title = {How to Reclaim Your Face From Clearview AI},
 
url = {https://edri.org/our-work/reclaiming-your-face-from-clearview-ai/},
 
url = {https://edri.org/our-work/reclaiming-your-face-from-clearview-ai/},
abstract = {The Hamburg Data Protection Authority deemed Clearview AI’s biometric photo database illegal in the EU as a result of a complaint Matthias Marx, a member of the Chaos Computer Club (an EDRi member) filed.},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-02-19},
 
urldate = {2021-02-19},
 
journal = {European Digital Rights (EDRi)},
 
journal = {European Digital Rights (EDRi)},
file = {Snapshot:/home/ruben/Zotero/storage/VAUPUS2W/reclaiming-your-face-from-clearview-ai.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 10,992: Line 10,427:
 
  |bibtex=@book{goatleyCriticalDataAesthetics2019,
 
  |bibtex=@book{goatleyCriticalDataAesthetics2019,
 
title = {Critical Data Aesthetics: Towards a Critically Reflexive Practice of Data Aestheticisation},
 
title = {Critical Data Aesthetics: Towards a Critically Reflexive Practice of Data Aestheticisation},
abstract = {This thesis responds to the aesthetic representation of data in multiple cultural contexts, arguing that a critical exploration of these aesthetics is necessary and needs to be elaborated. In this thesis, this is undertaken through three works produced across the duration of this project: Breathing Mephitic Air, an installation that aestheticises air pollution data (exhibited at Somerset House, London); Ground Resistance, an installation that explored data and representation in a smart city system (exhibited at Milton Keynes International Festival 2016); and The Dark Age of Connectionism: Captivity, a sound installation that centered upon the opacity of the Amazon Echo (exhibited at Haunted Machines/Impakt Festival, Utrecht).},
 
 
language = {en},
 
language = {en},
 
author = {Goatley, Wesley},
 
author = {Goatley, Wesley},
 
year = {2019},
 
year = {2019},
file = {Goatley - Critical Data Aesthetics Towards a Critically Ref.pdf:/home/ruben/Zotero/storage/4FB95YCD/Goatley - Critical Data Aesthetics Towards a Critically Ref.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 11,004: Line 10,437:
 
title = {What Role Does Emotion Play in Data Visualization?},
 
title = {What Role Does Emotion Play in Data Visualization?},
 
url = {https://immerse.news/what-role-does-emotion-play-in-data-visualization-bf365edf3d53},
 
url = {https://immerse.news/what-role-does-emotion-play-in-data-visualization-bf365edf3d53},
abstract = {This article was adapted from Data Feminism, a book by researchers Catherine D’Ignazio and Lauren F. Klein that explores “a way of…},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-02-19},
 
urldate = {2021-02-19},
Line 11,011: Line 10,443:
 
month = may,
 
month = may,
 
year = {2020},
 
year = {2020},
file = {Snapshot:/home/ruben/Zotero/storage/7264DD7I/what-role-does-emotion-play-in-data-visualization-bf365edf3d53.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,019: Line 10,450:
 
title = {Converus Donating Lie Detector Tests to Law Enforcement to Screen for Possible Misconduct},
 
title = {Converus Donating Lie Detector Tests to Law Enforcement to Screen for Possible Misconduct},
 
url = {https://www.prnewswire.com/news-releases/converus-donating-lie-detector-tests-to-law-enforcement-to-screen-for-possible-misconduct-301074718.html},
 
url = {https://www.prnewswire.com/news-releases/converus-donating-lie-detector-tests-to-law-enforcement-to-screen-for-possible-misconduct-301074718.html},
abstract = {/PRNewswire/ -- Tech company Converus will help identify cases of misconduct by giving 15 law enforcement agencies free use of EyeDetect to test job applicants...},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-02-19},
 
urldate = {2021-02-19},
Line 11,030: Line 10,460:
 
title = {e-traces -},
 
title = {e-traces -},
 
url = {https://etraces.constantvzw.org/informations},
 
url = {https://etraces.constantvzw.org/informations},
abstract = {Deze website is gemaakt in het project e-traces verwezenlijkt. Hij presenteert een geheel van geoogste artikelen over verschillende plaatsen van informatie betreffende de beweging die naar een…},
 
 
urldate = {2021-02-19},
 
urldate = {2021-02-19},
 
journal = {e-traces},
 
journal = {e-traces},
file = {Snapshot:/home/ruben/Zotero/storage/JJBDMZNK/informations.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,042: Line 10,470:
 
shorttitle = {Balade décentralisée},
 
shorttitle = {Balade décentralisée},
 
url = {https://agenda.collectifs.net/events/1b1a0086-454a-4e5c-bac9-62ce4c26d975},
 
url = {https://agenda.collectifs.net/events/1b1a0086-454a-4e5c-bac9-62ce4c26d975},
abstract = {Le dimanche 28 février, venez cartographier la surveillance à Bruxelles lors de notre balade mensuelle. Cette fois-ci, nous nous rendrons à Saint-Gilles    Inscription via --\> https://cryptpad.fr/s…},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-02-19},
 
urldate = {2021-02-19},
file = {Snapshot:/home/ruben/Zotero/storage/S9M2HDUN/1b1a0086-454a-4e5c-bac9-62ce4c26d975.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,053: Line 10,479:
 
title = {Design Justice Network},
 
title = {Design Justice Network},
 
url = {https://designjustice.org},
 
url = {https://designjustice.org},
abstract = {Design justice rethinks design processes, centers people who are normally marginalized by design, and uses collaborative, creative practices to address the deepest challenges our communities face.},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-02-21},
 
urldate = {2021-02-21},
 
journal = {Design Justice Network},
 
journal = {Design Justice Network},
file = {Snapshot:/home/ruben/Zotero/storage/KTMDUEVF/designjustice.org.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,065: Line 10,489:
 
title = {About the Class – Mapping the Field},
 
title = {About the Class – Mapping the Field},
 
url = {https://mappingthefield.wordsinspace.net/2021/about-the-class/},
 
url = {https://mappingthefield.wordsinspace.net/2021/about-the-class/},
abstract = {Maps reveal, delineate, verify, orient, navigate, anticipate, historicize, conceal, persuade, and, on occasion, even lie. From the earliest spatial representations in cave paintings and on clay tablets, to the predictive climate visualizations and crime maps and mobile cartographic apps of today and tomorrow, maps have offered far more than an objective representation of a stable reality. In this hybrid theory-practice studio we’ll examine maps as artifacts, as texts, as media; and mapping as a method useful in the social sciences, humanities, arts, and design. We’ll explore the past, present, and future – across myriad geographic and cultural contexts – of our techniques and technologies for mapping space and time. In the process, we’ll address various critical frameworks for analyzing the rhetorics, poetics, politics, and epistemologies of spatial and temporal maps. Throughout the semester we’ll also experiment with a variety of critical mapping tools and methods, from techniques of critical cartography to indigenous practices to sensory mapping to time-lining, using both analog and digital approaches. Students are encouraged to use the course, which will be supported by a skilled cartographer teaching assistant, to supplement their fieldwork, to develop their own thesis / dissertation projects, or to advance other personal research and creative pursuits. Course requirements include: individual map critiques; lab exercises; and individual research-based, critical-creative “atlases” composed of maps in a variety of formats.},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-02-22},
 
urldate = {2021-02-22},
Line 11,071: Line 10,494:
 
year = {2021},
 
year = {2021},
 
keywords = {mapping},
 
keywords = {mapping},
file = {Snapshot:/home/ruben/Zotero/storage/7KPVCJD5/about-the-class.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,082: Line 10,504:
 
urldate = {2021-02-22},
 
urldate = {2021-02-22},
 
author = {Mattern, Shannon},
 
author = {Mattern, Shannon},
file = {Snapshot:/home/ruben/Zotero/storage/4V84N6HR/work.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,090: Line 10,511:
 
title = {Fichiers, Bases et Répertoires sociaux - Le dispositif Informatique},
 
title = {Fichiers, Bases et Répertoires sociaux - Le dispositif Informatique},
 
url = {https://bureaudetudes.org/2015/01/27/fichiers-bases-et-repertoires-sociaux-le-dispositif-informatique/},
 
url = {https://bureaudetudes.org/2015/01/27/fichiers-bases-et-repertoires-sociaux-le-dispositif-informatique/},
abstract = {Download PDF (french - 4,5Mo)},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-02-22},
 
urldate = {2021-02-22},
 
journal = {Bureau d'Etudes},
 
journal = {Bureau d'Etudes},
author = {{adminBE}},
+
author = {adminBE},
 
month = jan,
 
month = jan,
 
year = {2015},
 
year = {2015},
file = {fichiers-bases-repertoires-sociaux-FR.pdf:/home/ruben/Zotero/storage/B2KM59AG/fichiers-bases-repertoires-sociaux-FR.pdf:application/pdf;Snapshot:/home/ruben/Zotero/storage/7BA7EH4T/fichiers-bases-et-repertoires-sociaux-le-dispositif-informatique.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,105: Line 10,524:
 
title = {Atlas of agendas – mapping the power, mapping the commons},
 
title = {Atlas of agendas – mapping the power, mapping the commons},
 
url = {https://bureaudetudes.org/},
 
url = {https://bureaudetudes.org/},
abstract = {Cartography of political, industrial, research, social, power networks.},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-02-22},
 
urldate = {2021-02-22},
Line 11,118: Line 10,536:
 
isbn = {978-94-91677-25-0},
 
isbn = {978-94-91677-25-0},
 
shorttitle = {An atlas of agendas},
 
shorttitle = {An atlas of agendas},
abstract = {Together, Paris-based artists Léonore Bonaccini and Xavier Fourt make up the artist duo Bureau d'études. For the past several years, this French group has been producing cartographies of contemporary political, social and economic systems which allow people to empower and reposition themselves. Revealing what normally remains invisible, often in the shape of large-sized banners, and contextualizing apparently separate elements within another framework, these visualizations of peoples' interests and relations re-symbolize and actualize an order concealed and unknown.},
 
 
language = {English},
 
language = {English},
 
publisher = {Onomatopee},
 
publisher = {Onomatopee},
 
author = {Holmes, Brian and Lomme, Freek},
 
author = {Holmes, Brian and Lomme, Freek},
editor = {{Bureau d'Études (Artists' group)}},
+
editor = {Bureau d'Études (Artists' group)},
 
year = {2015},
 
year = {2015},
 
note = {OCLC: 1046620264},
 
note = {OCLC: 1046620264},
file = {Snapshot:/home/ruben/Zotero/storage/4NRCCDWJ/bureaudetudes.org.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,141: Line 10,557:
 
note = {Meeting Name: Exhibition
 
note = {Meeting Name: Exhibition
 
OCLC: 845113975},
 
OCLC: 845113975},
file = {Wright and Galerija Nova - 2007 - Dataesthetics reader how to do things with data \;.pdf:/home/ruben/Zotero/storage/LSTRB79U/Wright and Galerija Nova - 2007 - Dataesthetics reader how to do things with data \;.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 11,150: Line 10,565:
 
isbn = {978-0-19-006739-7},
 
isbn = {978-0-19-006739-7},
 
url = {https://oxfordhandbooks.com/view/10.1093/oxfordhb/9780190067397.001.0001/oxfordhb-9780190067397-e-3},
 
url = {https://oxfordhandbooks.com/view/10.1093/oxfordhb/9780190067397.001.0001/oxfordhb-9780190067397-e-3},
abstract = {This chapter examines the ethics of human relationships with artificial entities—bots, robots, and other computational systems created to interact with humans as if they were sentient and autonomous individuals. Sentience—the ability to have emotions, to feel pain and want to avoid it—is a core concept here. All currently existing artificial entities are nonsentient, but their interactions and design evoke the impression of a conscious entity with personality and emotion. This impression of consciousness is inherently deceptive. Some artificial entities are beneficial, while others are manipulative and harmful. The chapter then addresses ethical issues in the design and deployment of artificial entities, considering the ethical responsibilities of researchers and designers.},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-02-22},
 
urldate = {2021-02-22},
Line 11,171: Line 10,585:
 
shorttitle = {Calculative Composition},
 
shorttitle = {Calculative Composition},
 
url = {https://oxfordhandbooks.com/view/10.1093/oxfordhb/9780190067397.001.0001/oxfordhb-9780190067397-e-37},
 
url = {https://oxfordhandbooks.com/view/10.1093/oxfordhb/9780190067397.001.0001/oxfordhb-9780190067397-e-37},
abstract = {This chapter evaluates the ethical ends and means toward which AI-driven design has been, and perhaps could be, applied. While some designers have committed to applying AI toward more ethical ends, they have paid comparatively less attention toward the ethical means of its application. In order to ensure the ethical application of AI in design, practitioners and managers must make sure that they are both defining responsible design parameters and operationalizing those parameters responsibly. Moreover, designers must consider where they should assert their agency within an automated workflow. The chapter then surveys representative design fields—fashion, product, graphic, and architectural design—to examine what ethical opportunities and risks people might face when AI-driven design practice is programmed to serve the needs and desires of laborers, consumers, and clients.},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-02-22},
 
urldate = {2021-02-22},
Line 11,183: Line 10,596:
 
doi = {10.1093/oxfordhb/9780190067397.013.37},
 
doi = {10.1093/oxfordhb/9780190067397.013.37},
 
pages = {569--587},
 
pages = {569--587},
file = {Mattern_2020_Calculative Composition.pdf:/home/ruben/Zotero/storage/AXFUEE3T/Mattern_2020_Calculative Composition.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 11,192: Line 10,604:
 
title = {Cartographies Of The Present},
 
title = {Cartographies Of The Present},
 
url = {https://vimeo.com/24517619},
 
url = {https://vimeo.com/24517619},
abstract = {This is \"Rosi Braidotti - Cartographies Of The Present\" by Serpentine Galleries on Vimeo, the home for high quality videos and the people who love them.},
 
 
urldate = {2021-02-22},
 
urldate = {2021-02-22},
 
author = {Braidotti, Rosi},
 
author = {Braidotti, Rosi},
 
month = jun,
 
month = jun,
 
year = {2011},
 
year = {2011},
file = {Snapshot:/home/ruben/Zotero/storage/BBRNNNWL/24517619.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,205: Line 10,615:
 
title = {Art Research Map – Jorinde Voigt ‘Radical relaxation’},
 
title = {Art Research Map – Jorinde Voigt ‘Radical relaxation’},
 
url = {http://artresearchmap.com/exhibitions/jorinde-voigt-radical-relaxation/},
 
url = {http://artresearchmap.com/exhibitions/jorinde-voigt-radical-relaxation/},
abstract = {KÖNIG GALERIE takes great pleasure in presenting its second solo exhibition by the Berlin-based artist Jorinde Voigt (b. 1977).},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-02-22},
 
urldate = {2021-02-22},
 
journal = {Art Research Map},
 
journal = {Art Research Map},
file = {Snapshot:/home/ruben/Zotero/storage/7DU2W4FN/jorinde-voigt-radical-relaxation.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,219: Line 10,627:
 
isbn = {978-0-262-04345-8},
 
isbn = {978-0-262-04345-8},
 
shorttitle = {Design Justice},
 
shorttitle = {Design Justice},
abstract = {An exploration of how design might be led by marginalized communities, dismantle structural inequality, and advance collective liberation and ecological survival.What is the relationship between design, power, and social justice? “Design justice” is an approach to design that is led by marginalized communities and that aims expilcitly to challenge, rather than reproduce, structural inequalities. It has emerged from a growing community of designers in various fields who work closely with social movements and community-based organizations around the world.This book explores the theory and practice of design justice, demonstrates how universalist design principles and practices erase certain groups of people—specifically, those who are intersectionally disadvantaged or multiply burdened under the matrix of domination (white supremacist heteropatriarchy, ableism, capitalism, and settler colonialism)—and invites readers to “build a better world, a world where many worlds fit; linked worlds of collective liberation and ecological sustainability.” Along the way, the book documents a multitude of real-world community-led design practices, each grounded in a particular social movement. Design Justice goes beyond recent calls for design for good, user-centered design, and employment diversity in the technology and design professions; it connects design to larger struggles for collective liberation and ecological survival.},
 
 
language = {English},
 
language = {English},
 
publisher = {The MIT Press},
 
publisher = {The MIT Press},
Line 11,232: Line 10,639:
 
title = {Design Justice {\textbar} The MIT Press},
 
title = {Design Justice {\textbar} The MIT Press},
 
url = {https://mitpress.mit.edu/books/design-justice},
 
url = {https://mitpress.mit.edu/books/design-justice},
abstract = {An exploration of how design might be led by marginalized communities, dismantle structural inequality, and advance collective liberation and ecological survival.
 
                The open access edition of this book was made possible by generous funding from Knowledge Unlatched and the MIT Press Frank Urbanowski Memorial Fund.
 
                    What is the relationship between design, power, and social justice? “Design justice” is an approach to design that is led by marginalized communities and that aims expilcitly to challenge, rather than reproduce, structural inequalities. It has emerged from a growing community of designers in various fields who work closely with social movements and community-based organizations around the world.This book explores the theory and practice of design justice, demonstrates how universalist design principles and practices erase certain groups of people—specifically, those who are intersectionally disadvantaged or multiply burdened under the matrix of domination (white supremacist heteropatriarchy, ableism, capitalism, and settler colonialism)—and invites readers to “build a better world, a world where many worlds fit; linked worlds of collective liberation and ecological sustainability.” Along the way, the book documents a multitude of real-world community-led design practices, each grounded in a particular social movement. Design Justice goes beyond recent calls for design for good, user-centered design, and employment diversity in the technology and design professions; it connects design to larger struggles for collective liberation and ecological survival.},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-02-22},
 
urldate = {2021-02-22},
Line 11,254: Line 10,658:
 
isbn = {978-0-08-044910-4},
 
isbn = {978-0-08-044910-4},
 
url = {https://www.sciencedirect.com/science/article/pii/B9780080449104000043},
 
url = {https://www.sciencedirect.com/science/article/pii/B9780080449104000043},
abstract = {Art has taken a distinct ‘cartographic turn’ in the last century. This period represents a veritable explosion of artwork that takes on cartography in order to critique, subvert, and reimagine territory. Artists have made maps, subverted maps, performed itineraries, imagined territories, contested borders, charted the invisible, and hacked physical, virtual, and hybrid spaces. There are three loose groupings of important mapping impulses that have characterized the artistic appropriation of cartographic strategies, both literally and metaphorically, from the early twentieth century to present times: (1) symbol saboteurs: artists who use the visual iconography of the map to reference personal, fictional, utopian, or metaphorical places; (2) agents and actors: artists who make maps or engage in situated, locational activities in order to challenge the status quo or change the world; and (3) invisible data mappers: artists who use cartographic metaphors to visualize informational territories, such as the stock market, the Internet, or the human genome. This article outlines and contextualizes these three impulses with numerous examples.},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-02-22},
 
urldate = {2021-02-22},
Line 11,265: Line 10,668:
 
doi = {10.1016/B978-008044910-4.00004-3},
 
doi = {10.1016/B978-008044910-4.00004-3},
 
pages = {190--206},
 
pages = {190--206},
file = {ScienceDirect Snapshot:/home/ruben/Zotero/storage/X4B7SA6J/B9780080449104000043.html:text/html;D’Ignazio_2009_Art and Cartography.pdf:/home/ruben/Zotero/storage/ZH8WC9SW/D’Ignazio_2009_Art and Cartography.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 11,275: Line 10,677:
 
language = {en},
 
language = {en},
 
urldate = {2021-02-22},
 
urldate = {2021-02-22},
file = {Snapshot:/home/ruben/Zotero/storage/25RVK9N3/explore.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,286: Line 10,687:
 
author = {Drulhe, Louise},
 
author = {Drulhe, Louise},
 
year = {2015},
 
year = {2015},
file = {Critical Atlas of Internet:/home/ruben/Zotero/storage/NZL6TJIA/internet-atlas.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,294: Line 10,694:
 
title = {ÓYVIND FAHLSTRÖM},
 
title = {ÓYVIND FAHLSTRÖM},
 
url = {https://www.ivam.es/en/oyvind-fahlstrom/},
 
url = {https://www.ivam.es/en/oyvind-fahlstrom/},
abstract = {Red Seesaw, 1968-69 Wood, metal, cardboard and paint 115 × 233.7 × 18.5 cm   Óyvind Fahlström (São Paulo, Brasil,…},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-02-22},
 
urldate = {2021-02-22},
 
journal = {Ivam},
 
journal = {Ivam},
file = {Snapshot:/home/ruben/Zotero/storage/VVZHMJLK/oyvind-fahlstrom.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,306: Line 10,704:
 
title = {Öyvind Fahlström Dünya Ticaret Tekeli İçin Plan},
 
title = {Öyvind Fahlström Dünya Ticaret Tekeli İçin Plan},
 
url = {https://www.istanbulsanatevi.com/sanatcilar/soyadi-f/fahlstrom-oyvind/oyvind-fahlstrom-dunya-ticaret-tekeli-icin-plan/},
 
url = {https://www.istanbulsanatevi.com/sanatcilar/soyadi-f/fahlstrom-oyvind/oyvind-fahlstrom-dunya-ticaret-tekeli-icin-plan/},
abstract = {Öyvind Fahlström Dünya Ticaret Tekeli için Plan, Tarih: 1970, Teknik: Kağıt üzeri karışık teknik, Boyut: 42 x 35,3 cm, Yer: Museum of Modern},
 
 
language = {tr},
 
language = {tr},
 
urldate = {2021-02-22},
 
urldate = {2021-02-22},
Line 11,312: Line 10,709:
 
month = feb,
 
month = feb,
 
year = {2016},
 
year = {2016},
file = {Snapshot:/home/ruben/Zotero/storage/63IBVN2S/oyvind-fahlstrom-dunya-ticaret-tekeli-icin-plan.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,320: Line 10,716:
 
title = {Sweden authorises the use of facial recognition technology by the police},
 
title = {Sweden authorises the use of facial recognition technology by the police},
 
url = {https://www.neweurope.eu/article/sweden-authorises-the-use-of-facial-recognition-technology-by-the-police/},
 
url = {https://www.neweurope.eu/article/sweden-authorises-the-use-of-facial-recognition-technology-by-the-police/},
abstract = {Sweden’s data protection authority has approved the use of facial recognition technology by the police, to help identify criminal suspects.
 
 
The decision is controversial following successive bans of this technology in US cities. The technology is widely used in China.
 
 
The new application of fa},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-02-22},
 
urldate = {2021-02-22},
 
journal = {New Europe},
 
journal = {New Europe},
author = {{roubanis}},
+
author = {roubanis},
 
month = oct,
 
month = oct,
 
year = {2019},
 
year = {2019},
 
note = {Section: Archive},
 
note = {Section: Archive},
file = {Snapshot:/home/ruben/Zotero/storage/GKAUY52J/sweden-authorises-the-use-of-facial-recognition-technology-by-the-police.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,340: Line 10,730:
 
title = {La control room di Venezia e la rete di videosorveglianza urbana • Lumi},
 
title = {La control room di Venezia e la rete di videosorveglianza urbana • Lumi},
 
url = {https://www.lumi4innovation.it/control-room-venezia-videosorveglianza-urbana/},
 
url = {https://www.lumi4innovation.it/control-room-venezia-videosorveglianza-urbana/},
abstract = {A Venezia, la smart control room e la rete di sensori e di videosorveglianza urbana garantiscono più sicurezza e un monitoraggio del territorio efficace.},
 
 
language = {it-IT},
 
language = {it-IT},
 
urldate = {2021-02-22},
 
urldate = {2021-02-22},
Line 11,347: Line 10,736:
 
year = {2020},
 
year = {2020},
 
note = {Section: Sicurezza},
 
note = {Section: Sicurezza},
file = {Snapshot:/home/ruben/Zotero/storage/UJMP6AYD/control-room-venezia-videosorveglianza-urbana.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,356: Line 10,744:
 
shorttitle = {Intelligent Video Surveillance},
 
shorttitle = {Intelligent Video Surveillance},
 
url = {https://www.alliedtelesis.com/it/blog/intelligent-video-surveillance-recent-trends-and-what-lies-ahead},
 
url = {https://www.alliedtelesis.com/it/blog/intelligent-video-surveillance-recent-trends-and-what-lies-ahead},
abstract = {This article discusses some reasons for the growth in the use of video surveillance networks and recommends some deployment best practices.},
 
 
language = {it},
 
language = {it},
 
urldate = {2021-02-22},
 
urldate = {2021-02-22},
Line 11,371: Line 10,758:
 
shorttitle = {Swedish DPA},
 
shorttitle = {Swedish DPA},
 
url = {https://edpb.europa.eu/news/national-news/2021/swedish-dpa-police-unlawfully-used-facial-recognition-app_el},
 
url = {https://edpb.europa.eu/news/national-news/2021/swedish-dpa-police-unlawfully-used-facial-recognition-app_el},
abstract = {Swedish DPA: Police unlawfully used facial recognition app},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-02-22},
 
urldate = {2021-02-22},
Line 11,378: Line 10,764:
 
month = feb,
 
month = feb,
 
year = {2021},
 
year = {2021},
file = {Snapshot:/home/ruben/Zotero/storage/QTSY2SXR/swedish-dpa-police-unlawfully-used-facial-recognition-app_el.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,386: Line 10,771:
 
title = {Anche l’Italia si è munita di un sistema di riconoscimento facciale},
 
title = {Anche l’Italia si è munita di un sistema di riconoscimento facciale},
 
url = {https://medium.com/@ORARiccardo/anche-litalia-si-%C3%A8-munita-di-un-sistema-di-riconoscimento-facciale-4a6f4c4e4f3f},
 
url = {https://medium.com/@ORARiccardo/anche-litalia-si-%C3%A8-munita-di-un-sistema-di-riconoscimento-facciale-4a6f4c4e4f3f},
abstract = {La polizia scientifica lo vorrebbe utilizzare nelle manifestazioni pubbliche},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-02-22},
 
urldate = {2021-02-22},
Line 11,394: Line 10,778:
 
year = {2017},
 
year = {2017},
 
keywords = {***},
 
keywords = {***},
file = {Snapshot:/home/ruben/Zotero/storage/XTY9UX8Z/anche-litalia-si-è-munita-di-un-sistema-di-riconoscimento-facciale-4a6f4c4e4f3f.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,402: Line 10,785:
 
title = {Il riconoscimento facciale in Italia è un buco nero},
 
title = {Il riconoscimento facciale in Italia è un buco nero},
 
url = {https://www.vice.com/it/article/g5p83w/riconoscimento-facciale-in-italia},
 
url = {https://www.vice.com/it/article/g5p83w/riconoscimento-facciale-in-italia},
abstract = {Da una serie di documenti ottenuti da Motherboard, sembra che i sistemi di sorveglianza sofisticata annunciati dai Comuni negli ultimi anni non siano attivi, perché illegali. Eppure, le telecamere continuano a moltiplicarsi.},
 
 
language = {it},
 
language = {it},
 
urldate = {2021-02-22},
 
urldate = {2021-02-22},
file = {Snapshot:/home/ruben/Zotero/storage/7VKK9JSN/riconoscimento-facciale-in-italia.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,413: Line 10,794:
 
title = {Riconoscimento facciale in Italia, cosa dice (e non dice) il Viminale},
 
title = {Riconoscimento facciale in Italia, cosa dice (e non dice) il Viminale},
 
url = {https://www.startmag.it/innovazione/riconoscimento-facciale-in-italia-cosa-dice-e-non-dice-il-viminale/},
 
url = {https://www.startmag.it/innovazione/riconoscimento-facciale-in-italia-cosa-dice-e-non-dice-il-viminale/},
abstract = {Dalla risposta del Viminale non è emerso "nulla su quanto, come e con quali risultati viene usato il sistema" di riconoscimento facciale in Italia},
 
 
language = {it-IT},
 
language = {it-IT},
 
urldate = {2021-02-22},
 
urldate = {2021-02-22},
Line 11,420: Line 10,800:
 
year = {2020},
 
year = {2020},
 
note = {Section: Innovazione},
 
note = {Section: Innovazione},
file = {Snapshot:/home/ruben/Zotero/storage/WFJPD9ST/riconoscimento-facciale-in-italia-cosa-dice-e-non-dice-il-viminale.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,428: Line 10,807:
 
title = {Sari, ecco come funziona il riconoscimento facciale della polizia},
 
title = {Sari, ecco come funziona il riconoscimento facciale della polizia},
 
url = {https://tg24.sky.it/tecnologia/now/2020/02/13/sari-riconoscimento-facciale-polizia-italiana},
 
url = {https://tg24.sky.it/tecnologia/now/2020/02/13/sari-riconoscimento-facciale-polizia-italiana},
abstract = {Leggi su Sky TG24 l'articolo Sari, ecco come funziona il riconoscimento facciale della polizia},
 
 
language = {it},
 
language = {it},
 
urldate = {2021-02-22},
 
urldate = {2021-02-22},
 
author = {TG24, Sky},
 
author = {TG24, Sky},
file = {Snapshot:/home/ruben/Zotero/storage/VUVVTBWC/sari-riconoscimento-facciale-polizia-italiana.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,440: Line 10,817:
 
title = {Civil rights groups want Biden to halt government use of facial recognition},
 
title = {Civil rights groups want Biden to halt government use of facial recognition},
 
url = {https://www.dailydot.com/debug/biden-facial-recognition-pressure/},
 
url = {https://www.dailydot.com/debug/biden-facial-recognition-pressure/},
abstract = {President Joe Biden is facing pressure from civil rights and tech advocacy groups to halt the use of facial recognition by the government.},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-02-23},
 
urldate = {2021-02-23},
Line 11,446: Line 10,822:
 
month = feb,
 
month = feb,
 
year = {2021},
 
year = {2021},
file = {Snapshot:/home/ruben/Zotero/storage/UIHRKX4B/biden-facial-recognition-pressure.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,454: Line 10,829:
 
title = {DeepMind researchers say AI poses a threat to people who identify as queer},
 
title = {DeepMind researchers say AI poses a threat to people who identify as queer},
 
url = {https://venturebeat.com/2021/02/18/deepmind-researchers-say-ai-poses-a-threat-to-people-who-identify-as-queer/},
 
url = {https://venturebeat.com/2021/02/18/deepmind-researchers-say-ai-poses-a-threat-to-people-who-identify-as-queer/},
abstract = {Researchers say the impact of AI on people who identify as queer is underexplored, which poses a threat to their health and privacy.},
 
 
language = {en-US},
 
language = {en-US},
 
urldate = {2021-02-23},
 
urldate = {2021-02-23},
Line 11,460: Line 10,834:
 
month = feb,
 
month = feb,
 
year = {2021},
 
year = {2021},
file = {Snapshot:/home/ruben/Zotero/storage/DEP7VRC9/deepmind-researchers-say-ai-poses-a-threat-to-people-who-identify-as-queer.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,471: Line 10,844:
 
urldate = {2021-02-23},
 
urldate = {2021-02-23},
 
journal = {American Civil Liberties Union},
 
journal = {American Civil Liberties Union},
file = {Snapshot:/home/ruben/Zotero/storage/DA8PCAML/coalition-letter-president-biden-use-facial-recognition-technology.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,479: Line 10,851:
 
title = {Anatomy of an AI System},
 
title = {Anatomy of an AI System},
 
url = {http://www.anatomyof.ai},
 
url = {http://www.anatomyof.ai},
abstract = {Anatomy of an AI System - The Amazon Echo as an anatomical map of human labor, data and planetary resources. By Kate Crawford and Vladan Joler (2018)},
 
 
language = {en},
 
language = {en},
 
urldate = {2021-02-24},
 
urldate = {2021-02-24},
 
journal = {Anatomy of an AI System},
 
journal = {Anatomy of an AI System},
file = {Snapshot:/home/ruben/Zotero/storage/NZ4IG8CX/anatomyof.ai.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,490: Line 10,860:
 
  |bibtex=@article{rajiFaceSurveyFacial2021,
 
  |bibtex=@article{rajiFaceSurveyFacial2021,
 
title = {About Face: A Survey of Facial Recognition Evaluation},
 
title = {About Face: A Survey of Facial Recognition Evaluation},
abstract = {We survey over 100 face datasets constructed between 1976 to 2019 of 145 million images of over 17 million subjects from a range of sources, demographics and conditions. Our historical survey reveals that these datasets are contextually informed - shaped by changes in political motivations, technological capability and current norms. We discuss how such influences mask specific practices - some of which may actually be harmful or otherwise problematic - and make a case for the explicit communication of such details in order to establish a more grounded understanding of the technology’s function in the real world.},
 
 
language = {en},
 
language = {en},
 
author = {Raji, Inioluwa Deborah and Fried, Genevieve},
 
author = {Raji, Inioluwa Deborah and Fried, Genevieve},
 
year = {2021},
 
year = {2021},
 
pages = {11},
 
pages = {11},
file = {Raji and Fried - 2021 - About Face A Survey of Facial Recognition Evaluat.pdf:/home/ruben/Zotero/storage/MQGBLPGB/Raji and Fried - 2021 - About Face A Survey of Facial Recognition Evaluat.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 11,507: Line 10,875:
 
url = {http://journals.sagepub.com/doi/10.1177/0263276419867752},
 
url = {http://journals.sagepub.com/doi/10.1177/0263276419867752},
 
doi = {10.1177/0263276419867752},
 
doi = {10.1177/0263276419867752},
abstract = {This article explores the political dimension of algorithmic face recognition through the prism of Gilles Deleuze and Fe´lix Guattari’s notion of faciality. It argues that algorithmic face recognition is a technology that expresses a key aspect of contemporary capitalism: the problematic position of the individual in light of new forms of algorithmic and statistical regimes of power. While there is a clear relation between modern disciplinary mechanisms of individualization and the face as a sign of individuality, in control societies this relation appears more as a contradiction. The article contends that Deleuze and Guattari’s concepts of machinic enslavement and social subjection offer a fruitful perspective from where to identify the power mechanisms behind the problematic position of the individual in the specific case of algorithmic face recognition.},
 
 
language = {en},
 
language = {en},
 
number = {1},
 
number = {1},
Line 11,515: Line 10,882:
 
year = {2020},
 
year = {2020},
 
pages = {73--91},
 
pages = {73--91},
file = {Celis Bueno - 2020 - The Face Revisited Using Deleuze and Guattari to .pdf:/home/ruben/Zotero/storage/5JWD3NKX/Celis Bueno - 2020 - The Face Revisited Using Deleuze and Guattari to .pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 11,527: Line 10,893:
 
url = {https://ojs.library.queensu.ca/index.php/surveillance-and-society/article/view/3340},
 
url = {https://ojs.library.queensu.ca/index.php/surveillance-and-society/article/view/3340},
 
doi = {10.24908/ss.v1i3.3340},
 
doi = {10.24908/ss.v1i3.3340},
abstract = {This article attempts to evaluate theoretically the applicability of Foucault’s Panopticon to the practices of public surveillance utilising CCTV technology. The first part maps out three “strands” in the reception of panopticism in surveillance studies, suggesting that it tends to fall into one of three broad kinds: its wholesale appropriation and application; its wholesale rejection as inadequate with respect to a supposedly “post-disciplinary” society; and its qualified acceptance subject to some empirically-dependent limitations. I then attempt in a preliminary way to supplement these three positions. In particular, I question the logical adequacy of equating visual surveillance with effective subjectification and self-discipline by drawing upon a range of philosophical and sociological perspectives. Philosophically, it is suggested that the Foucauldian thesis may well “pathologise” the relationship between subjectivity and visibility, and thereby overlook other dimensions of our experience of vision. Sociologically, it is suggested that the precise relation between surveillance and self-discipline requires us to attend, in ethnomethodological fashion, to the situated sense-making activities of subjects as the go about everyday practical activities in public settings.},
 
 
language = {en},
 
language = {en},
 
number = {3},
 
number = {3},
Line 11,536: Line 10,901:
 
year = {2002},
 
year = {2002},
 
pages = {254--271},
 
pages = {254--271},
file = {Yar - 2002 - Panoptic Power and the Pathologisation of Vision .pdf:/home/ruben/Zotero/storage/YMVGQ96T/Yar - 2002 - Panoptic Power and the Pathologisation of Vision .pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 11,548: Line 10,912:
 
url = {http://journals.sagepub.com/doi/10.1177/1461444816688896},
 
url = {http://journals.sagepub.com/doi/10.1177/1461444816688896},
 
doi = {10.1177/1461444816688896},
 
doi = {10.1177/1461444816688896},
abstract = {In recent years, we have witnessed a rapid spread of biometric technologies from the security domain to commercial and social media applications. In this article, we critically explore the repercussions of this diffusion of face recognition to everyday contexts with an in-depth analysis of Facebook’s “tag suggestions” tool which first introduced the technology to on-line social networks. We use Nissenbaum’s framework of contextual integrity to show how the informational norms associated with biometrics in security and policing - their contexts of emergence - are grafted on-line social networks onto their context of iteration. Our analysis reveals a process that has inadvertently influenced the way users understand face recognition, precluding critical questioning of its wider use. It provides an important deepening of contextually-driven approaches to privacy by showing the process through which contexts are co-constitutive of informational norms. Citizens are also offered a critical tool for understanding the trajectory of biometrics and reflect on the data practices associated with the use of face recognition in social media and society at large.},
 
 
language = {en},
 
language = {en},
 
number = {4},
 
number = {4},
Line 11,557: Line 10,920:
 
year = {2017},
 
year = {2017},
 
pages = {637--654},
 
pages = {637--654},
file = {Norval and Prasopoulou - 2017 - Public faces A critical exploration of the diffus.pdf:/home/ruben/Zotero/storage/URRYFCQS/Norval and Prasopoulou - 2017 - Public faces A critical exploration of the diffus.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 11,568: Line 10,930:
 
url = {http://journals.sagepub.com/doi/10.1177/1470412914541767},
 
url = {http://journals.sagepub.com/doi/10.1177/1470412914541767},
 
doi = {10.1177/1470412914541767},
 
doi = {10.1177/1470412914541767},
abstract = {This article examines face recognition as a key instance of the emergence of smart photography. Smart photography, drawing on Artificial Intelligence (AI) and Ambient Intelligence (AmI) manifests a ‘habit of mind’ (Karen Barad), or a way of thinking that is humanist in so far as it is predicated on human and machine autonomy, and representationalist in its quest for unmediated objects-in-themselves. Faces are among the objects that smart photography seeks (autonomously) to represent. By examining two of the principal algorithms of face recognition technology, the article will show how ways of seeing allied to ways of thinking that are also, ultimately, discriminatory and essentialist, materialise through software. Finally, if the ‘smart’ in smart photography means learning to discriminate between classes of faces that are fixed, essentialised and ultimately elusive (the stereotypical face of terror is both gendered and racialised) then how could smart be made smarter? This is a question of politics rather than progress.},
 
 
language = {en},
 
language = {en},
 
number = {2},
 
number = {2},
Line 11,576: Line 10,937:
 
year = {2014},
 
year = {2014},
 
pages = {182--199},
 
pages = {182--199},
file = {Kember - 2014 - Face Recognition and the Emergence of Smart Photog.pdf:/home/ruben/Zotero/storage/PLAAWH8F/Kember - 2014 - Face Recognition and the Emergence of Smart Photog.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 11,591: Line 10,951:
 
note = {Publisher: Oxford University Press},
 
note = {Publisher: Oxford University Press},
 
pages = {187--218},
 
pages = {187--218},
file = {Snapshot:/home/ruben/Zotero/storage/SFZYUQF6/783823.html:text/html;Selvadurai 2015 - Not just a face in the crowd.pdf:/home/ruben/Zotero/storage/4ETU8TG4/Selvadurai 2015 - Not just a face in the crowd.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 11,603: Line 10,962:
 
year = {2020},
 
year = {2020},
 
pages = {75--85},
 
pages = {75--85},
file = {Snapshot:/home/ruben/Zotero/storage/PD592QRE/978-3-030-36887-6_6.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,618: Line 10,976:
 
note = {Publisher: Taylor \& Francis},
 
note = {Publisher: Taylor \& Francis},
 
pages = {141--158},
 
pages = {141--158},
file = {Snapshot:/home/ruben/Zotero/storage/88G7R984/13668790500237047.html:text/html;Hale 2005 - Identity crisis.pdf:/home/ruben/Zotero/storage/WPPCP67S/Hale 2005 - Identity crisis.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 11,646: Line 11,003:
 
note = {Publisher: SAGE Publications Sage UK: London, England},
 
note = {Publisher: SAGE Publications Sage UK: London, England},
 
pages = {637--654},
 
pages = {637--654},
file = {Snapshot:/home/ruben/Zotero/storage/BDYAIKEE/1461444816688896.html:text/html;Norval Prasopoulou 2017 - Public faces.pdf:/home/ruben/Zotero/storage/3SZQEWS4/Norval Prasopoulou 2017 - Public faces.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 11,657: Line 11,013:
 
year = {2013},
 
year = {2013},
 
pages = {35--51},
 
pages = {35--51},
file = {Hope 2013 - Foucault, panopticism and school surveillance research.pdf:/home/ruben/Zotero/storage/UAT5H8KD/Hope 2013 - Foucault, panopticism and school surveillance research.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 11,679: Line 11,034:
 
author = {Gates, Kelly A.},
 
author = {Gates, Kelly A.},
 
year = {2011},
 
year = {2011},
file = {Snapshot:/home/ruben/Zotero/storage/4V86B2KW/books.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,701: Line 11,055:
 
year = {2019},
 
year = {2019},
 
pages = {54--62},
 
pages = {54--62},
file = {Snapshot:/home/ruben/Zotero/storage/8383DTLL/13111.html:text/html;Crampton 2019 - Platform biometrics.pdf:/home/ruben/Zotero/storage/XLNI4YGI/Crampton 2019 - Platform biometrics.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 11,715: Line 11,068:
 
note = {Publisher: Sage Publications Sage CA: Los Angeles, CA},
 
note = {Publisher: Sage Publications Sage CA: Los Angeles, CA},
 
pages = {207--219},
 
pages = {207--219},
file = {Snapshot:/home/ruben/Zotero/storage/VS9JVDMH/1057567707306650.html:text/html;Wilson 2007 - Australian biometrics and global surveillance.pdf:/home/ruben/Zotero/storage/8PJHSWLD/Wilson 2007 - Australian biometrics and global surveillance.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 11,729: Line 11,081:
 
year = {2020},
 
year = {2020},
 
pages = {157--169},
 
pages = {157--169},
file = {Snapshot:/home/ruben/Zotero/storage/IVNH5MWS/13285.html:text/html;Hood 2020 - Making the body electric.pdf:/home/ruben/Zotero/storage/TDHYDG9Q/Hood 2020 - Making the body electric.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 11,767: Line 11,118:
 
year = {2020},
 
year = {2020},
 
pages = {03006},
 
pages = {03006},
file = {Snapshot:/home/ruben/Zotero/storage/TCK8NASY/shsconf_glob2020_03006.html:text/html;Nesterova 2020 - Mass data gathering and surveillance.pdf:/home/ruben/Zotero/storage/I2DGLLTX/Nesterova 2020 - Mass data gathering and surveillance.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 11,792: Line 11,142:
 
author = {Wilson, Dean and Weber, Leanne},
 
author = {Wilson, Dean and Weber, Leanne},
 
year = {2008},
 
year = {2008},
file = {Snapshot:/home/ruben/Zotero/storage/JRJK4288/3431.html:text/html;Wilson Weber 2008 - Surveillance, risk and preemption on the Australian border.pdf:/home/ruben/Zotero/storage/J5VPGQ5V/Wilson Weber 2008 - Surveillance, risk and preemption on the Australian border.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 11,802: Line 11,151:
 
author = {Lattimer, Connor},
 
author = {Lattimer, Connor},
 
year = {2013},
 
year = {2013},
file = {Full Text:/home/ruben/Zotero/storage/K4USN62B/the-politics-of-surveillance-in-a-risk-society.html:text/html},
 
 
   }
 
   }
 
}}
 
}}
Line 11,815: Line 11,163:
 
note = {Publisher: Taylor \& Francis},
 
note = {Publisher: Taylor \& Francis},
 
pages = {1--18},
 
pages = {1--18},
file = {Snapshot:/home/ruben/Zotero/storage/TE3BB3CD/00141844.2019.html:text/html;Grünenberg 2019 - Wearing Someone Else’s Face.pdf:/home/ruben/Zotero/storage/SZ8BQCZ9/Grünenberg 2019 - Wearing Someone Else’s Face.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 11,827: Line 11,174:
 
year = {2006},
 
year = {2006},
 
pages = {87--109},
 
pages = {87--109},
file = {Snapshot:/home/ruben/Zotero/storage/B65YUYAB/1-4020-4899-8_5.html:text/html;Wilson 2006 - Biometrics, borders and the ideal suspect.pdf:/home/ruben/Zotero/storage/4W9XPRK9/Wilson 2006 - Biometrics, borders and the ideal suspect.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 11,865: Line 11,211:
 
year = {2019},
 
year = {2019},
 
pages = {76--82},
 
pages = {76--82},
file = {Snapshot:/home/ruben/Zotero/storage/LRJE78TC/12903.html:text/html;Linder 2019 - Surveillance capitalism and platform policing.pdf:/home/ruben/Zotero/storage/K7EYY5I2/Linder 2019 - Surveillance capitalism and platform policing.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}
Line 11,951: Line 11,296:
 
author = {Learned-Miller, Erik and Ordóñez, Vicente and Morgenstern, Jamie and Buolamwini, Joy},
 
author = {Learned-Miller, Erik and Ordóñez, Vicente and Morgenstern, Jamie and Buolamwini, Joy},
 
year = {2020},
 
year = {2020},
file = {Learned-Miller et al 2020 - FACIAL RECOGNITION TECHNOLOGIES IN THE WILD.pdf:/home/ruben/Zotero/storage/ZXJU2EIM/Learned-Miller et al 2020 - FACIAL RECOGNITION TECHNOLOGIES IN THE WILD.pdf:application/pdf},
 
 
   }
 
   }
 
}}
 
}}

Revision as of 13:10, 25 February 2021