Difference between revisions of "References"
From Security Vision
Line 18: | Line 18: | ||
pages = {1--21}, | pages = {1--21}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{mirzoeffArtificialVisionWhite2020, | |bibtex=@article{mirzoeffArtificialVisionWhite2020, | ||
title = {Artificial vision, white space and racial surveillance capitalism}, | title = {Artificial vision, white space and racial surveillance capitalism}, | ||
Line 33: | Line 31: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{bonnefonMachineThinkingFast2020, | |bibtex=@article{bonnefonMachineThinkingFast2020, | ||
title = {Machine Thinking, Fast and Slow}, | title = {Machine Thinking, Fast and Slow}, | ||
Line 52: | Line 48: | ||
pages = {1019--1027}, | pages = {1019--1027}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{OpticalGovernanceRoles, | |bibtex=@misc{OpticalGovernanceRoles, | ||
title = {Optical governance: The Roles of Machine Vision in China’s Epidemic Response}, | title = {Optical governance: The Roles of Machine Vision in China’s Epidemic Response}, | ||
Line 63: | Line 57: | ||
journal = {Strelka Mag}, | journal = {Strelka Mag}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{MediasEmotions, | |bibtex=@book{MediasEmotions, | ||
title = {Médias et Emotions}, | title = {Médias et Emotions}, | ||
Line 72: | Line 64: | ||
urldate = {2020-11-09}, | urldate = {2020-11-09}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{StudioTransdisciplinaryArts, | |bibtex=@misc{StudioTransdisciplinaryArts, | ||
title = {2020-11-6/8 Studio for Transdisciplinary Arts Research – Transdisciplinary Arts Research at the Intersections between Art, Science and Culture}, | title = {2020-11-6/8 Studio for Transdisciplinary Arts Research – Transdisciplinary Arts Research at the Intersections between Art, Science and Culture}, | ||
Line 81: | Line 71: | ||
urldate = {2020-11-07}, | urldate = {2020-11-07}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{ResearchersShowThat2020, | |bibtex=@misc{ResearchersShowThat2020, | ||
title = {Researchers show that computer vision algorithms pretrained on ImageNet exhibit multiple, distressing biases}, | title = {Researchers show that computer vision algorithms pretrained on ImageNet exhibit multiple, distressing biases}, | ||
Line 93: | Line 81: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{morseFacialRecognitionUsed, | |bibtex=@misc{morseFacialRecognitionUsed, | ||
title = {Facial recognition used to arrest protestor at Trump bible photo op}, | title = {Facial recognition used to arrest protestor at Trump bible photo op}, | ||
Line 104: | Line 90: | ||
author = {Morse, Jack}, | author = {Morse, Jack}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{MITComparativeMedia, | |bibtex=@misc{MITComparativeMedia, | ||
title = {MIT Comparative Media Studies/Writing {\textbar} Critical analysis, collaborative research, and design across media arts, forms, and practices}, | title = {MIT Comparative Media Studies/Writing {\textbar} Critical analysis, collaborative research, and design across media arts, forms, and practices}, | ||
Line 114: | Line 98: | ||
journal = {MIT Comparative Media Studies/Writing}, | journal = {MIT Comparative Media Studies/Writing}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{SensoryEthnographyLab, | |bibtex=@misc{SensoryEthnographyLab, | ||
title = {Sensory Ethnography Lab :: Harvard University}, | title = {Sensory Ethnography Lab :: Harvard University}, | ||
Line 122: | Line 104: | ||
urldate = {2020-11-03}, | urldate = {2020-11-03}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{InvestigationsForensicArchitecture, | |bibtex=@misc{InvestigationsForensicArchitecture, | ||
title = {Investigations ← Forensic Architecture}, | title = {Investigations ← Forensic Architecture}, | ||
Line 130: | Line 110: | ||
urldate = {2020-11-03}, | urldate = {2020-11-03}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{PeopleAMLab, | |bibtex=@misc{PeopleAMLab, | ||
title = {People {\textbar} AMLab}, | title = {People {\textbar} AMLab}, | ||
Line 139: | Line 117: | ||
urldate = {2020-11-03}, | urldate = {2020-11-03}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{StadsnachtwachtUrbanSurveillance, | |bibtex=@misc{StadsnachtwachtUrbanSurveillance, | ||
title = {stadsnachtwacht - urban surveillance research site}, | title = {stadsnachtwacht - urban surveillance research site}, | ||
Line 148: | Line 124: | ||
urldate = {2020-11-03}, | urldate = {2020-11-03}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{CenterExperimentalEthnography, | |bibtex=@misc{CenterExperimentalEthnography, | ||
title = {The Center for Experimental Ethnography (UPenn)}, | title = {The Center for Experimental Ethnography (UPenn)}, | ||
Line 158: | Line 132: | ||
journal = {centerforexperimentalethnography}, | journal = {centerforexperimentalethnography}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{IndexPhpMb, | |bibtex=@misc{IndexPhpMb, | ||
title = {index.php of mb.nl}, | title = {index.php of mb.nl}, | ||
Line 166: | Line 138: | ||
urldate = {2020-11-03}, | urldate = {2020-11-03}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{SelectedProjects, | |bibtex=@misc{SelectedProjects, | ||
title = {Selected Projects}, | title = {Selected Projects}, | ||
Line 174: | Line 144: | ||
urldate = {2020-11-03}, | urldate = {2020-11-03}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{zotero-216, | |bibtex=@misc{zotero-216, | ||
title = {➩ ➪ ➫ ➬ ➭ ➮ ➯ ➱}, | title = {➩ ➪ ➫ ➬ ➭ ➮ ➯ ➱}, | ||
Line 182: | Line 150: | ||
urldate = {2020-11-03}, | urldate = {2020-11-03}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{AlyarAynetchi, | |bibtex=@misc{AlyarAynetchi, | ||
title = {Alyar Aynetchi}, | title = {Alyar Aynetchi}, | ||
Line 191: | Line 157: | ||
urldate = {2020-11-03}, | urldate = {2020-11-03}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{ProjectSupportDesk, | |bibtex=@misc{ProjectSupportDesk, | ||
title = {Project:Support desk - MediaWiki}, | title = {Project:Support desk - MediaWiki}, | ||
Line 199: | Line 163: | ||
urldate = {2020-11-03}, | urldate = {2020-11-03}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{SemanticMediaWikiMailing, | |bibtex=@misc{SemanticMediaWikiMailing, | ||
title = {Semantic MediaWiki / Mailing Lists / Search}, | title = {Semantic MediaWiki / Mailing Lists / Search}, | ||
Line 207: | Line 169: | ||
urldate = {2020-11-03}, | urldate = {2020-11-03}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{WhyAIGeniuses2020, | |bibtex=@misc{WhyAIGeniuses2020, | ||
title = {Why AI Geniuses Haven’t Created True Thinking Machines}, | title = {Why AI Geniuses Haven’t Created True Thinking Machines}, | ||
Line 219: | Line 179: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{harveyAllmodelsAiDataset, | |bibtex=@misc{harveyAllmodelsAiDataset, | ||
title = {[allmodels.ai] Dataset Retractions}, | title = {[allmodels.ai] Dataset Retractions}, | ||
author = {Harvey, Adam}, | author = {Harvey, Adam}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ochigameInformaticsOppressed, | |bibtex=@article{ochigameInformaticsOppressed, | ||
title = {Informatics of the Oppressed}, | title = {Informatics of the Oppressed}, | ||
Line 237: | Line 193: | ||
author = {Ochigame, Rodrigo}, | author = {Ochigame, Rodrigo}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{ChallengesComparingHuman2020, | |bibtex=@misc{ChallengesComparingHuman2020, | ||
title = {Challenges of Comparing Human and Machine Perception}, | title = {Challenges of Comparing Human and Machine Perception}, | ||
Line 250: | Line 204: | ||
note = {Library Catalog: thegradient.pub}, | note = {Library Catalog: thegradient.pub}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{ShortcutsHowNeural2020, | |bibtex=@misc{ShortcutsHowNeural2020, | ||
title = {Shortcuts: How Neural Networks Love to Cheat}, | title = {Shortcuts: How Neural Networks Love to Cheat}, | ||
Line 264: | Line 216: | ||
note = {Library Catalog: thegradient.pub}, | note = {Library Catalog: thegradient.pub}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{OpinionWeNow, | |bibtex=@article{OpinionWeNow, | ||
title = {Opinion {\textbar} We now have evidence of facial recognition’s harm. Time for lawmakers to act.}, | title = {Opinion {\textbar} We now have evidence of facial recognition’s harm. Time for lawmakers to act.}, | ||
Line 275: | Line 225: | ||
journal = {Washington Post}, | journal = {Washington Post}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{morsePoliceUseFacialrecognition, | |bibtex=@misc{morsePoliceUseFacialrecognition, | ||
title = {Police use facial-recognition tech to arrest another innocent man}, | title = {Police use facial-recognition tech to arrest another innocent man}, | ||
Line 287: | Line 235: | ||
note = {Library Catalog: mashable.com}, | note = {Library Catalog: mashable.com}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{ZeroShotLearningDr, | |bibtex=@misc{ZeroShotLearningDr, | ||
title = {Zero-Shot Learning - Dr. Timothy Hospedales - YouTube}, | title = {Zero-Shot Learning - Dr. Timothy Hospedales - YouTube}, | ||
Line 296: | Line 242: | ||
note = {http://web.archive.org/web/20200419092323/https://www.youtube.com/watch?v=jBnCcr-3bXc\&list=PLd4H06TkjIlBiECoaH85aZRB4XEPmo9LG\&index=2\&t=0s}, | note = {http://web.archive.org/web/20200419092323/https://www.youtube.com/watch?v=jBnCcr-3bXc\&list=PLd4H06TkjIlBiECoaH85aZRB4XEPmo9LG\&index=2\&t=0s}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{AIWeeklyCoronavirus2020, | |bibtex=@misc{AIWeeklyCoronavirus2020, | ||
title = {AI Weekly: Coronavirus, facial recognition, and the future of privacy}, | title = {AI Weekly: Coronavirus, facial recognition, and the future of privacy}, | ||
Line 311: | Line 255: | ||
Section: AI}, | Section: AI}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{boothHaltPublicUse2020, | |bibtex=@article{boothHaltPublicUse2020, | ||
chapter = {UK news}, | chapter = {UK news}, | ||
Line 327: | Line 269: | ||
keywords = {Equality and Human Rights Commission (EHRC), Facial recognition, Police, Race, Society, Surveillance, UK news}, | keywords = {Equality and Human Rights Commission (EHRC), Facial recognition, Police, Race, Society, Surveillance, UK news}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{cruickshankHopkinsExpertsPresent2020, | |bibtex=@misc{cruickshankHopkinsExpertsPresent2020, | ||
title = {Hopkins experts present latest coronavirus information on Capitol Hill}, | title = {Hopkins experts present latest coronavirus information on Capitol Hill}, | ||
Line 341: | Line 281: | ||
note = {Library Catalog: hub.jhu.edu}, | note = {Library Catalog: hub.jhu.edu}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{gershgornExclusiveLiveFacial2020, | |bibtex=@misc{gershgornExclusiveLiveFacial2020, | ||
title = {Exclusive: Live Facial Recognition Is Coming to U.S. Police Body Cameras}, | title = {Exclusive: Live Facial Recognition Is Coming to U.S. Police Body Cameras}, | ||
Line 356: | Line 294: | ||
note = {http://web.archive.org/web/20200305173758/https://onezero.medium.com/exclusive-live-facial-recognition-is-coming-to-u-s-police-body-cameras-bc9036918ae0}, | note = {http://web.archive.org/web/20200305173758/https://onezero.medium.com/exclusive-live-facial-recognition-is-coming-to-u-s-police-body-cameras-bc9036918ae0}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{ClearviewFacialRecognition, | |bibtex=@misc{ClearviewFacialRecognition, | ||
title = {Clearview’s Facial Recognition App Has Been Used By The Justice Department, ICE, Macy’s, Walmart, And The NBA}, | title = {Clearview’s Facial Recognition App Has Been Used By The Justice Department, ICE, Macy’s, Walmart, And The NBA}, | ||
Line 367: | Line 303: | ||
note = {http://web.archive.org/web/20200228084853/https://www.buzzfeednews.com/article/ryanmac/clearview-ai-fbi-ice-global-law-enforcement}, | note = {http://web.archive.org/web/20200228084853/https://www.buzzfeednews.com/article/ryanmac/clearview-ai-fbi-ice-global-law-enforcement}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{murgiaWhoUsingYour2019, | |bibtex=@misc{murgiaWhoUsingYour2019, | ||
title = {Who’s using your face? The ugly truth about facial recognition}, | title = {Who’s using your face? The ugly truth about facial recognition}, | ||
Line 381: | Line 315: | ||
note = {http://web.archive.org/web/20200227090254/https://www.ft.com/content/cf19b956-60a2-11e9-b285-3acd5d43599e}, | note = {http://web.archive.org/web/20200227090254/https://www.ft.com/content/cf19b956-60a2-11e9-b285-3acd5d43599e}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{PaintYourFace, | |bibtex=@misc{PaintYourFace, | ||
title = {Paint Your Face Away – Shinji Toya}, | title = {Paint Your Face Away – Shinji Toya}, | ||
Line 391: | Line 323: | ||
note = {http://web.archive.org/web/20200227084817/https://shinjitoya.com/paint-your-face-away/}, | note = {http://web.archive.org/web/20200227084817/https://shinjitoya.com/paint-your-face-away/}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{harwellICEHasRun, | |bibtex=@misc{harwellICEHasRun, | ||
title = {ICE has run facial-recognition searches on millions of Maryland drivers}, | title = {ICE has run facial-recognition searches on millions of Maryland drivers}, | ||
Line 403: | Line 333: | ||
note = {http://web.archive.org/web/20200227062735/https://www.washingtonpost.com/technology/2020/02/26/ice-has-run-facial-recognition-searches-millions-maryland-drivers/}, | note = {http://web.archive.org/web/20200227062735/https://www.washingtonpost.com/technology/2020/02/26/ice-has-run-facial-recognition-searches-millions-maryland-drivers/}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{gilmerClearviewAIFacialrecognition, | |bibtex=@misc{gilmerClearviewAIFacialrecognition, | ||
title = {Clearview AI, the facial-recognition company stealing Facebook photos, gets hacked}, | title = {Clearview AI, the facial-recognition company stealing Facebook photos, gets hacked}, | ||
Line 415: | Line 343: | ||
note = {http://web.archive.org/web/20200227062724/https://mashable.com/article/clearview-ai-client-list-hacked/}, | note = {http://web.archive.org/web/20200227062724/https://mashable.com/article/clearview-ai-client-list-hacked/}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{leonardCodeObsessedNovelistBuilds2020, | |bibtex=@article{leonardCodeObsessedNovelistBuilds2020, | ||
title = {A Code-Obsessed Novelist Builds a Writing Bot. The Plot Thickens}, | title = {A Code-Obsessed Novelist Builds a Writing Bot. The Plot Thickens}, | ||
Line 430: | Line 356: | ||
keywords = {artificial intelligence, longreads}, | keywords = {artificial intelligence, longreads}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{researchVideoAnalyticsSystem, | |bibtex=@misc{researchVideoAnalyticsSystem, | ||
title = {Video Analytics System Market Size, Share, Growth Analysis By Key Players IBM Corporation, Honeywell International Inc., Qognify Inc., BriefCam, Verint, – The NyseNasdaqLive News}, | title = {Video Analytics System Market Size, Share, Growth Analysis By Key Players IBM Corporation, Honeywell International Inc., Qognify Inc., BriefCam, Verint, – The NyseNasdaqLive News}, | ||
Line 441: | Line 365: | ||
note = {http://web.archive.org/web/20200221092404/https://nysenasdaqlive.com/video-analytics-system-market-size-share-growth-analysis-by-key-players-ibm-corporation-honeywell-international-inc-qognify-inc-briefcam-verint/}, | note = {http://web.archive.org/web/20200221092404/https://nysenasdaqlive.com/video-analytics-system-market-size-share-growth-analysis-by-key-players-ibm-corporation-honeywell-international-inc-qognify-inc-briefcam-verint/}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ReconnaissanceFacialePour2019, | |bibtex=@article{ReconnaissanceFacialePour2019, | ||
title = {La reconnaissance faciale pour s’identifier en ligne inquiète les défenseurs des libertés numériques}, | title = {La reconnaissance faciale pour s’identifier en ligne inquiète les défenseurs des libertés numériques}, | ||
Line 453: | Line 375: | ||
year = {2019}, | year = {2019}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{ReconnaissanceFacialePromesses, | |bibtex=@misc{ReconnaissanceFacialePromesses, | ||
title = {La reconnaissance faciale, des promesses et des risques}, | title = {La reconnaissance faciale, des promesses et des risques}, | ||
Line 463: | Line 383: | ||
note = {http://web.archive.org/web/20200220133504/https://www.lemonde.fr/idees/article/2020/02/20/promesses-et-risques-de-la-reconnaissance-faciale\_6030160\_3232.html}, | note = {http://web.archive.org/web/20200220133504/https://www.lemonde.fr/idees/article/2020/02/20/promesses-et-risques-de-la-reconnaissance-faciale\_6030160\_3232.html}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{MarseilleDevantJustice, | |bibtex=@misc{MarseilleDevantJustice, | ||
title = {Marseille devant la justice pour l'installation d'un réseau de "vidéoprotection intelligente"}, | title = {Marseille devant la justice pour l'installation d'un réseau de "vidéoprotection intelligente"}, | ||
Line 473: | Line 391: | ||
note = {http://web.archive.org/web/20200219080245/https://www.usine-digitale.fr/article/marseille-devant-la-justice-pour-l-installation-d-un-reseau-de-videoprotection-intelligente.N922079}, | note = {http://web.archive.org/web/20200219080245/https://www.usine-digitale.fr/article/marseille-devant-la-justice-pour-l-installation-d-un-reseau-de-videoprotection-intelligente.N922079}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{herceDeadSlowAhead2016, | |bibtex=@misc{herceDeadSlowAhead2016, | ||
type = {Documentary, Drama, Horror, Mystery, Sci-Fi}, | type = {Documentary, Drama, Horror, Mystery, Sci-Fi}, | ||
Line 488: | Line 404: | ||
keywords = {atlantic ocean, experimental film, ocean, telephone conversation, voice over}, | keywords = {atlantic ocean, experimental film, ocean, telephone conversation, voice over}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{HotelPoliceMunicipale2020, | |bibtex=@misc{HotelPoliceMunicipale2020, | ||
title = {Un hôtel de Police Municipale flambant neuf avec un CSU dernier cri}, | title = {Un hôtel de Police Municipale flambant neuf avec un CSU dernier cri}, | ||
Line 501: | Line 415: | ||
note = {http://web.archive.org/web/20200218075616/https://www.roubaixxl.fr/un-hotel-de-police-municipale-flambant-neuf-avec-un-csu-dernier-cri/}, | note = {http://web.archive.org/web/20200218075616/https://www.roubaixxl.fr/un-hotel-de-police-municipale-flambant-neuf-avec-un-csu-dernier-cri/}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{riviereVideosurveillanceAutomatiseeNe, | |bibtex=@misc{riviereVideosurveillanceAutomatiseeNe, | ||
title = {Vidéosurveillance automatisée : on ne pourra plus faire un pet de travers - CQFD, mensuel de critique et d'expérimentation sociales}, | title = {Vidéosurveillance automatisée : on ne pourra plus faire un pet de travers - CQFD, mensuel de critique et d'expérimentation sociales}, | ||
Line 513: | Line 425: | ||
note = {http://web.archive.org/web/20200218075508/http://cqfd-journal.org/Videosurveillance-automatisee-on}, | note = {http://web.archive.org/web/20200218075508/http://cqfd-journal.org/Videosurveillance-automatisee-on}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{AnnaRidlerCV, | |bibtex=@misc{AnnaRidlerCV, | ||
title = {Anna Ridler CV}, | title = {Anna Ridler CV}, | ||
Line 524: | Line 434: | ||
note = {http://web.archive.org/web/20200216172849/http://annaridler.com/c-v}, | note = {http://web.archive.org/web/20200216172849/http://annaridler.com/c-v}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{TechTalkAutomated, | |bibtex=@misc{TechTalkAutomated, | ||
title = {Tech Talk: Automated citations in Wikipedia: Citoid and the technology behind it}, | title = {Tech Talk: Automated citations in Wikipedia: Citoid and the technology behind it}, | ||
Line 535: | Line 443: | ||
keywords = {Tutorials}, | keywords = {Tutorials}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{guoMSCeleb1MDatasetBenchmark2016, | |bibtex=@article{guoMSCeleb1MDatasetBenchmark2016, | ||
title = {MS-Celeb-1M: A Dataset and Benchmark for Large-Scale Face Recognition}, | title = {MS-Celeb-1M: A Dataset and Benchmark for Large-Scale Face Recognition}, | ||
Line 550: | Line 456: | ||
keywords = {Computer Science - Computer Vision and Pattern Recognition}, | keywords = {Computer Science - Computer Vision and Pattern Recognition}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@inproceedings{wuExploitUnknownGradually2018, | |bibtex=@inproceedings{wuExploitUnknownGradually2018, | ||
title = {Exploit the Unknown Gradually: One-Shot Video-Based Person Re-identification by Stepwise Learning}, | title = {Exploit the Unknown Gradually: One-Shot Video-Based Person Re-identification by Stepwise Learning}, | ||
Line 565: | Line 469: | ||
pages = {5177--5186}, | pages = {5177--5186}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{hollanekAITransparencyMatter2020a, | |bibtex=@article{hollanekAITransparencyMatter2020a, | ||
title = {AI transparency: a matter of reconciling design with critique}, | title = {AI transparency: a matter of reconciling design with critique}, | ||
Line 582: | Line 484: | ||
keywords = {classified}, | keywords = {classified}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ragazziGoverningDiasporas2009, | |bibtex=@article{ragazziGoverningDiasporas2009, | ||
title = {Governing Diasporas}, | title = {Governing Diasporas}, | ||
Line 601: | Line 501: | ||
pages = {378--397}, | pages = {378--397}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{uliaszSeeingAlgorithmOperative2020, | |bibtex=@article{uliaszSeeingAlgorithmOperative2020, | ||
title = {Seeing like an algorithm: operative images and emergent subjects}, | title = {Seeing like an algorithm: operative images and emergent subjects}, | ||
Line 617: | Line 515: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ruppertDataPolitics2017, | |bibtex=@article{ruppertDataPolitics2017, | ||
title = {Data politics}, | title = {Data politics}, | ||
Line 636: | Line 532: | ||
pages = {2053951717717749}, | pages = {2053951717717749}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ruppertDataPolitics2017a, | |bibtex=@article{ruppertDataPolitics2017a, | ||
title = {Data politics}, | title = {Data politics}, | ||
Line 655: | Line 549: | ||
pages = {2053951717717749}, | pages = {2053951717717749}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{neweconomicthinkingThisTimeDifferent2020, | |bibtex=@misc{neweconomicthinkingThisTimeDifferent2020, | ||
title = {Is This Time Different? Data, Artificial Intelligence \& Robots}, | title = {Is This Time Different? Data, Artificial Intelligence \& Robots}, | ||
Line 667: | Line 559: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{thenewcentreforresearchpracticeCollectiveInfrastructuresKnowledge2020, | |bibtex=@misc{thenewcentreforresearchpracticeCollectiveInfrastructuresKnowledge2020, | ||
title = {Collective Infrastructures and Knowledge Production in a Post-Digital Age}, | title = {Collective Infrastructures and Knowledge Production in a Post-Digital Age}, | ||
Line 678: | Line 568: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{isinBirthSensoryPower2020, | |bibtex=@article{isinBirthSensoryPower2020, | ||
title = {The birth of sensory power: How a pandemic made it visible?}, | title = {The birth of sensory power: How a pandemic made it visible?}, | ||
Line 698: | Line 586: | ||
pages = {2053951720969208}, | pages = {2053951720969208}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{maleveDataSetRuins2020, | |bibtex=@article{maleveDataSetRuins2020, | ||
title = {On the data set’s ruins}, | title = {On the data set’s ruins}, | ||
Line 713: | Line 599: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{BordersFear, | |bibtex=@misc{BordersFear, | ||
title = {2020-11-27/29 Borders of Fear}, | title = {2020-11-27/29 Borders of Fear}, | ||
Line 723: | Line 607: | ||
journal = {Disruption Network Lab}, | journal = {Disruption Network Lab}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{ubcschoolofpublicpolicyandglobalaffairsLiuWebinarSeries2020, | |bibtex=@misc{ubcschoolofpublicpolicyandglobalaffairsLiuWebinarSeries2020, | ||
title = {Liu Webinar Series: Silicon Valley and the Future of Capitalism}, | title = {Liu Webinar Series: Silicon Valley and the Future of Capitalism}, | ||
Line 735: | Line 617: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{pressTechnoprecariousMITPress, | |bibtex=@misc{pressTechnoprecariousMITPress, | ||
title = {Technoprecarious {\textbar} The MIT Press}, | title = {Technoprecarious {\textbar} The MIT Press}, | ||
Line 746: | Line 626: | ||
note = {Publisher: The MIT Press}, | note = {Publisher: The MIT Press}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{mitchellAlgorithmicFairnessChoices2021, | |bibtex=@article{mitchellAlgorithmicFairnessChoices2021, | ||
title = {Algorithmic Fairness: Choices, Assumptions, and Definitions}, | title = {Algorithmic Fairness: Choices, Assumptions, and Definitions}, | ||
Line 763: | Line 641: | ||
pages = {null}, | pages = {null}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{oxfordmartinschoolDataWorkHidden2020, | |bibtex=@misc{oxfordmartinschoolDataWorkHidden2020, | ||
title = {"Data work: the hidden talent and secret logic fuelling artificial intelligence" - Prof Gina Neff}, | title = {"Data work: the hidden talent and secret logic fuelling artificial intelligence" - Prof Gina Neff}, | ||
Line 775: | Line 651: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{hseartanddesignschoolLevManovichArtificial2020, | |bibtex=@misc{hseartanddesignschoolLevManovichArtificial2020, | ||
title = {Lev Manovich ‘Artificial Intelligence, Aesthetics, and Future of Culture’}, | title = {Lev Manovich ‘Artificial Intelligence, Aesthetics, and Future of Culture’}, | ||
Line 786: | Line 660: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{hornborgMachinesManifestationsGlobal2020, | |bibtex=@article{hornborgMachinesManifestationsGlobal2020, | ||
title = {Machines as manifestations of global systems: Steps toward a sociometabolic ontology of technology}, | title = {Machines as manifestations of global systems: Steps toward a sociometabolic ontology of technology}, | ||
Line 804: | Line 676: | ||
pages = {1463499620959247}, | pages = {1463499620959247}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{blankeMaterialConditionsPlatforms2020, | |bibtex=@article{blankeMaterialConditionsPlatforms2020, | ||
title = {The Material Conditions of Platforms: Monopolization Through Decentralization}, | title = {The Material Conditions of Platforms: Monopolization Through Decentralization}, | ||
Line 824: | Line 694: | ||
pages = {2056305120971632}, | pages = {2056305120971632}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{robergeCulturalLifeMachine2021, | |bibtex=@book{robergeCulturalLifeMachine2021, | ||
address = {Cham}, | address = {Cham}, | ||
Line 841: | Line 709: | ||
keywords = {***, FR-Inbox}, | keywords = {***, FR-Inbox}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{robergeCulturalLifeMachine2021a, | |bibtex=@book{robergeCulturalLifeMachine2021a, | ||
address = {Cham}, | address = {Cham}, | ||
Line 857: | Line 723: | ||
doi = {10.1007/978-3-030-56286-1}, | doi = {10.1007/978-3-030-56286-1}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{aradauBiopoliticsMultipleMigration2020, | |bibtex=@article{aradauBiopoliticsMultipleMigration2020, | ||
title = {Biopolitics Multiple: Migration, Extraction, Subtraction}, | title = {Biopolitics Multiple: Migration, Extraction, Subtraction}, | ||
Line 877: | Line 741: | ||
pages = {198--220}, | pages = {198--220}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{aradauTechnologyAgencyCritique2019, | |bibtex=@misc{aradauTechnologyAgencyCritique2019, | ||
title = {Technology, agency, critique : An interview with Claudia Aradau}, | title = {Technology, agency, critique : An interview with Claudia Aradau}, | ||
Line 894: | Line 756: | ||
Publisher: Routledge}, | Publisher: Routledge}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{SecurityFlows, | |bibtex=@misc{SecurityFlows, | ||
title = {Security flows}, | title = {Security flows}, | ||
Line 903: | Line 763: | ||
urldate = {2020-12-01}, | urldate = {2020-12-01}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{aradauActsDigitalParasitism2019, | |bibtex=@article{aradauActsDigitalParasitism2019, | ||
title = {Acts of digital parasitism: Hacking, humanitarian apps and platformisation}, | title = {Acts of digital parasitism: Hacking, humanitarian apps and platformisation}, | ||
Line 923: | Line 781: | ||
pages = {2548--2565}, | pages = {2548--2565}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{SenseLab3eLaboratory, | |bibtex=@misc{SenseLab3eLaboratory, | ||
title = {SenseLab – 3e {\textbar} a laboratory for thought in motion}, | title = {SenseLab – 3e {\textbar} a laboratory for thought in motion}, | ||
Line 932: | Line 788: | ||
urldate = {2020-12-07}, | urldate = {2020-12-07}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{EmergentFuturesCoLab, | |bibtex=@misc{EmergentFuturesCoLab, | ||
title = {Emergent Futures CoLab}, | title = {Emergent Futures CoLab}, | ||
Line 940: | Line 794: | ||
urldate = {2020-12-07}, | urldate = {2020-12-07}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{FullAutomationFallacy2020, | |bibtex=@misc{FullAutomationFallacy2020, | ||
title = {The Full Automation Fallacy}, | title = {The Full Automation Fallacy}, | ||
Line 951: | Line 803: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{ErichHoerlHg, | |bibtex=@misc{ErichHoerlHg, | ||
title = {Erich Hörl (Hg.), Nelly Y. Pinkrah (Hg.), Lotte Warnsholdt (Hg.): Critique and the Digital}, | title = {Erich Hörl (Hg.), Nelly Y. Pinkrah (Hg.), Lotte Warnsholdt (Hg.): Critique and the Digital}, | ||
Line 961: | Line 811: | ||
urldate = {2020-12-07}, | urldate = {2020-12-07}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{bloomsbury.comDigitalVisionEcological, | |bibtex=@misc{bloomsbury.comDigitalVisionEcological, | ||
title = {Digital Vision and the Ecological Aesthetic (1968 - 2018)}, | title = {Digital Vision and the Ecological Aesthetic (1968 - 2018)}, | ||
Line 973: | Line 821: | ||
keywords = {Ruben-Inbox}, | keywords = {Ruben-Inbox}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{campbellScifiSurveillanceEurope2020, | |bibtex=@article{campbellScifiSurveillanceEurope2020, | ||
chapter = {World news}, | chapter = {World news}, | ||
Line 990: | Line 836: | ||
keywords = {Surveillance, Artificial intelligence (AI), Biometrics, Defence policy, Europe, European Union, Privacy, Technology}, | keywords = {Surveillance, Artificial intelligence (AI), Biometrics, Defence policy, Europe, European Union, Privacy, Technology}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{20210603TransversalEntanglement, | |bibtex=@misc{20210603TransversalEntanglement, | ||
title = {2021-06-03 Transversal Entanglement – Artistic Research in Film Conference 2021}, | title = {2021-06-03 Transversal Entanglement – Artistic Research in Film Conference 2021}, | ||
Line 999: | Line 843: | ||
urldate = {2021-01-03}, | urldate = {2021-01-03}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{screenworks2020PointsPresence, | |bibtex=@misc{screenworks2020PointsPresence, | ||
title = {Points of Presence}, | title = {Points of Presence}, | ||
Line 1,010: | Line 852: | ||
author = {Screenworks, 2020}, | author = {Screenworks, 2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{mackenziePlatformSeeingImage2019, | |bibtex=@article{mackenziePlatformSeeingImage2019, | ||
title = {Platform Seeing: Image Ensembles and Their Invisualities}, | title = {Platform Seeing: Image Ensembles and Their Invisualities}, | ||
Line 1,029: | Line 869: | ||
pages = {3--22}, | pages = {3--22}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{mackenziePlatformSeeingImage2019a, | |bibtex=@article{mackenziePlatformSeeingImage2019a, | ||
title = {Platform Seeing: Image Ensembles and Their Invisualities}, | title = {Platform Seeing: Image Ensembles and Their Invisualities}, | ||
Line 1,048: | Line 886: | ||
pages = {3--22}, | pages = {3--22}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{dastonObjectivity2010, | |bibtex=@book{dastonObjectivity2010, | ||
address = {New York, NY}, | address = {New York, NY}, | ||
Line 1,062: | Line 898: | ||
note = {OCLC: 731595843}, | note = {OCLC: 731595843}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{turnerEyeMind2016, | |bibtex=@book{turnerEyeMind2016, | ||
address = {Place of publication not identified}, | address = {Place of publication not identified}, | ||
Line 1,075: | Line 909: | ||
note = {OCLC: 938363011}, | note = {OCLC: 938363011}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{vertesiSeeingRoverVisualization2012, | |bibtex=@article{vertesiSeeingRoverVisualization2012, | ||
title = {Seeing like a Rover: Visualization, embodiment, and interaction on the Mars Exploration Rover Mission}, | title = {Seeing like a Rover: Visualization, embodiment, and interaction on the Mars Exploration Rover Mission}, | ||
Line 1,095: | Line 927: | ||
pages = {393--414}, | pages = {393--414}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ballesteroTouchingLightHow2019, | |bibtex=@article{ballesteroTouchingLightHow2019, | ||
title = {Touching with Light, or, How Texture Recasts the Sensing of Underground Water}, | title = {Touching with Light, or, How Texture Recasts the Sensing of Underground Water}, | ||
Line 1,114: | Line 944: | ||
pages = {762--785}, | pages = {762--785}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{follisVisionTransterritoryBorders2017, | |bibtex=@article{follisVisionTransterritoryBorders2017, | ||
title = {Vision and Transterritory: The Borders of Europe}, | title = {Vision and Transterritory: The Borders of Europe}, | ||
Line 1,134: | Line 962: | ||
pages = {1003--1030}, | pages = {1003--1030}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{garforthVisibilitiesResearchSeeing2012, | |bibtex=@article{garforthVisibilitiesResearchSeeing2012, | ||
title = {In/Visibilities of Research: Seeing and Knowing in STS}, | title = {In/Visibilities of Research: Seeing and Knowing in STS}, | ||
Line 1,154: | Line 980: | ||
pages = {264--285}, | pages = {264--285}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{castanedaRobotVisions2014, | |bibtex=@article{castanedaRobotVisions2014, | ||
title = {Robot visions}, | title = {Robot visions}, | ||
Line 1,173: | Line 997: | ||
pages = {315--341}, | pages = {315--341}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{rothDigitizingLizardsTopology1999, | |bibtex=@article{rothDigitizingLizardsTopology1999, | ||
title = {Digitizing Lizards: The Topology of `Vision' in Ecological Fieldwork}, | title = {Digitizing Lizards: The Topology of `Vision' in Ecological Fieldwork}, | ||
Line 1,192: | Line 1,014: | ||
pages = {719--764}, | pages = {719--764}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{coopmansFaceValueNew2011, | |bibtex=@article{coopmansFaceValueNew2011, | ||
title = {‘Face value’: New medical imaging software in commercial view}, | title = {‘Face value’: New medical imaging software in commercial view}, | ||
Line 1,212: | Line 1,032: | ||
pages = {155--176}, | pages = {155--176}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{forsterThinkingMakingUnmaking, | |bibtex=@article{forsterThinkingMakingUnmaking, | ||
title = {Thinking Through Making: Unmaking and Remaking the Everyday}, | title = {Thinking Through Making: Unmaking and Remaking the Everyday}, | ||
Line 1,223: | Line 1,041: | ||
author = {Forster, Andrew}, | author = {Forster, Andrew}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{ThinkingMakingUnmaking, | |bibtex=@misc{ThinkingMakingUnmaking, | ||
title = {Thinking\_Through\_Making\_Unmaking\_and\_Rem.pdf}, | title = {Thinking\_Through\_Making\_Unmaking\_and\_Rem.pdf}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{mertiaLivesDataEssays2020, | |bibtex=@book{mertiaLivesDataEssays2020, | ||
address = {Amsterdam}, | address = {Amsterdam}, | ||
Line 1,240: | Line 1,054: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{2020116DarkEdenProgram1Pdf, | |bibtex=@misc{2020116DarkEdenProgram1Pdf, | ||
title = {2020-11-6/8 Dark-Eden-Program-1.pdf}, | title = {2020-11-6/8 Dark-Eden-Program-1.pdf}, | ||
Line 1,248: | Line 1,060: | ||
urldate = {2020-11-07}, | urldate = {2020-11-07}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{20201215EventFuture, | |bibtex=@misc{20201215EventFuture, | ||
title = {2020-12-15 Event: The Future of AI is Human}, | title = {2020-12-15 Event: The Future of AI is Human}, | ||
Line 1,258: | Line 1,068: | ||
urldate = {2020-12-16}, | urldate = {2020-12-16}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{InstituteNetworkCultures, | |bibtex=@misc{InstituteNetworkCultures, | ||
title = {Institute of Network Cultures {\textbar} From Opinions to Images: Essays Towards a Sociology of Affects}, | title = {Institute of Network Cultures {\textbar} From Opinions to Images: Essays Towards a Sociology of Affects}, | ||
Line 1,266: | Line 1,074: | ||
urldate = {2021-01-06}, | urldate = {2021-01-06}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{grosmanPerspectivesAlgorithmicNormativities2019, | |bibtex=@article{grosmanPerspectivesAlgorithmicNormativities2019, | ||
title = {Perspectives on algorithmic normativities: engineers, objects, activities}, | title = {Perspectives on algorithmic normativities: engineers, objects, activities}, | ||
Line 1,287: | Line 1,093: | ||
pages = {2053951719858742}, | pages = {2053951719858742}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{jewittExploringMethodologicalInnovation2017, | |bibtex=@article{jewittExploringMethodologicalInnovation2017, | ||
title = {Exploring methodological innovation in the social sciences: the body in digital environments and the arts}, | title = {Exploring methodological innovation in the social sciences: the body in digital environments and the arts}, | ||
Line 1,308: | Line 1,112: | ||
pages = {105--120}, | pages = {105--120}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@phdthesis{musikComputersAbilitySee2014, | |bibtex=@phdthesis{musikComputersAbilitySee2014, | ||
address = {wien}, | address = {wien}, | ||
Line 1,322: | Line 1,124: | ||
year = {2014}, | year = {2014}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{HowMachineLearns, | |bibtex=@misc{HowMachineLearns, | ||
title = {How a Machine Learns and Fails – A Grammar of Error for Artificial Intelligence – spheres}, | title = {How a Machine Learns and Fails – A Grammar of Error for Artificial Intelligence – spheres}, | ||
Line 1,331: | Line 1,131: | ||
urldate = {2021-01-13}, | urldate = {2021-01-13}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{xieExplainableDeepLearning2020, | |bibtex=@article{xieExplainableDeepLearning2020, | ||
title = {Explainable Deep Learning: A Field Guide for the Uninitiated}, | title = {Explainable Deep Learning: A Field Guide for the Uninitiated}, | ||
Line 1,347: | Line 1,145: | ||
keywords = {Computer Science - Artificial Intelligence, Computer Science - Machine Learning, Statistics - Machine Learning}, | keywords = {Computer Science - Artificial Intelligence, Computer Science - Machine Learning, Statistics - Machine Learning}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{lyonsExcavatingExcavatingAI2020, | |bibtex=@article{lyonsExcavatingExcavatingAI2020, | ||
title = {Excavating "Excavating AI": The Elephant in the Gallery}, | title = {Excavating "Excavating AI": The Elephant in the Gallery}, | ||
Line 1,364: | Line 1,160: | ||
keywords = {Computer Science - Computers and Society, Computer Science - Computer Vision and Pattern Recognition, Computer Science - Artificial Intelligence, Computer Science - Machine Learning, 68T01, Computer Science - Human-Computer Interaction, K.4.0}, | keywords = {Computer Science - Computers and Society, Computer Science - Computer Vision and Pattern Recognition, Computer Science - Artificial Intelligence, Computer Science - Machine Learning, 68T01, Computer Science - Human-Computer Interaction, K.4.0}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@inproceedings{sultaniRealWorldAnomalyDetection2018, | |bibtex=@inproceedings{sultaniRealWorldAnomalyDetection2018, | ||
address = {Salt Lake City, UT}, | address = {Salt Lake City, UT}, | ||
Line 1,382: | Line 1,176: | ||
pages = {6479--6488}, | pages = {6479--6488}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{rouvroyAlgorithmicGovernmentalityProspects2013, | |bibtex=@article{rouvroyAlgorithmicGovernmentalityProspects2013, | ||
title = {Algorithmic governmentality and prospects of emancipation}, | title = {Algorithmic governmentality and prospects of emancipation}, | ||
Line 1,400: | Line 1,192: | ||
pages = {163--196}, | pages = {163--196}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{mackenzieMachineLearnersArchaeology2017, | |bibtex=@book{mackenzieMachineLearnersArchaeology2017, | ||
title = {Machine Learners: Archaeology of a Data Practice}, | title = {Machine Learners: Archaeology of a Data Practice}, | ||
Line 1,415: | Line 1,205: | ||
doi = {10.7551/mitpress/10302.001.0001}, | doi = {10.7551/mitpress/10302.001.0001}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{ImprovisingTheory, | |bibtex=@book{ImprovisingTheory, | ||
title = {Improvising Theory}, | title = {Improvising Theory}, | ||
Line 1,423: | Line 1,211: | ||
urldate = {2021-01-14}, | urldate = {2021-01-14}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{WarTerrorBirthed, | |bibtex=@misc{WarTerrorBirthed, | ||
title = {War On Terror Birthed Pentagon's Automated Biometrics Identification System}, | title = {War On Terror Birthed Pentagon's Automated Biometrics Identification System}, | ||
Line 1,433: | Line 1,219: | ||
journal = {NPR.org}, | journal = {NPR.org}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{cointetjean-philippeNeuronsSpikeBack2018, | |bibtex=@article{cointetjean-philippeNeuronsSpikeBack2018, | ||
title = {Neurons spike back}, | title = {Neurons spike back}, | ||
Line 1,447: | Line 1,231: | ||
pages = {173--220}, | pages = {173--220}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{benbouzidMachinesPredictives2018, | |bibtex=@book{benbouzidMachinesPredictives2018, | ||
address = {Paris}, | address = {Paris}, | ||
Line 1,460: | Line 1,242: | ||
note = {OCLC: 1113484407}, | note = {OCLC: 1113484407}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{FacialRecognitionReveals, | |bibtex=@misc{FacialRecognitionReveals, | ||
title = {Facial recognition reveals political party in troubling new research}, | title = {Facial recognition reveals political party in troubling new research}, | ||
Line 1,470: | Line 1,250: | ||
journal = {TechCrunch}, | journal = {TechCrunch}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{defreitasAlternativeOntologiesNumber2016, | |bibtex=@article{defreitasAlternativeOntologiesNumber2016, | ||
title = {Alternative Ontologies of Number: Rethinking the Quantitative in Computational Culture}, | title = {Alternative Ontologies of Number: Rethinking the Quantitative in Computational Culture}, | ||
Line 1,490: | Line 1,268: | ||
pages = {431--434}, | pages = {431--434}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{InheritingPossibility, | |bibtex=@misc{InheritingPossibility, | ||
type = {Book}, | type = {Book}, | ||
Line 1,501: | Line 1,277: | ||
journal = {University of Minnesota Press}, | journal = {University of Minnesota Press}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{gilliardFacialRecognitionTechnology2021, | |bibtex=@misc{gilliardFacialRecognitionTechnology2021, | ||
title = {Facial Recognition Technology Isn’t Good Just Because It’s Used to Arrest Neo-Nazis}, | title = {Facial Recognition Technology Isn’t Good Just Because It’s Used to Arrest Neo-Nazis}, | ||
Line 1,514: | Line 1,288: | ||
year = {2021}, | year = {2021}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{knutsonSavingFaceUnconstitutional, | |bibtex=@article{knutsonSavingFaceUnconstitutional, | ||
title = {Saving Face; The Unconstitutional Use of Facial Recognition on Undocumented Immigrants and Solutions in IP}, | title = {Saving Face; The Unconstitutional Use of Facial Recognition on Undocumented Immigrants and Solutions in IP}, | ||
Line 1,524: | Line 1,296: | ||
pages = {14}, | pages = {14}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{venturiniThreeMapsThree2014, | |bibtex=@article{venturiniThreeMapsThree2014, | ||
title = {Three maps and three misunderstandings: A digital mapping of climate diplomacy}, | title = {Three maps and three misunderstandings: A digital mapping of climate diplomacy}, | ||
Line 1,545: | Line 1,315: | ||
pages = {2053951714543804}, | pages = {2053951714543804}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{wiredThisSitePosted2021, | |bibtex=@misc{wiredThisSitePosted2021, | ||
title = {This site posted every face from Parler’s Capitol Hill insurrection videos}, | title = {This site posted every face from Parler’s Capitol Hill insurrection videos}, | ||
Line 1,558: | Line 1,326: | ||
year = {2021}, | year = {2021}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{wendtAnarchyWhatStates1992, | |bibtex=@article{wendtAnarchyWhatStates1992, | ||
title = {Anarchy is what States Make of it: The Social Construction of Power Politics}, | title = {Anarchy is what States Make of it: The Social Construction of Power Politics}, | ||
Line 1,575: | Line 1,341: | ||
pages = {391--425}, | pages = {391--425}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{wendtAnarchyWhatStates1992a, | |bibtex=@article{wendtAnarchyWhatStates1992a, | ||
title = {Anarchy is what States Make of it: The Social Construction of Power Politics}, | title = {Anarchy is what States Make of it: The Social Construction of Power Politics}, | ||
Line 1,592: | Line 1,356: | ||
pages = {391--425}, | pages = {391--425}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{wendtAnarchyWhatStates1992b, | |bibtex=@article{wendtAnarchyWhatStates1992b, | ||
title = {Anarchy is what States Make of it: The Social Construction of Power Politics}, | title = {Anarchy is what States Make of it: The Social Construction of Power Politics}, | ||
Line 1,609: | Line 1,371: | ||
pages = {391--425}, | pages = {391--425}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{bigoGlobalizedSecurityField2008, | |bibtex=@incollection{bigoGlobalizedSecurityField2008, | ||
title = {Globalized (in)security: The field and the ban-opticon}, | title = {Globalized (in)security: The field and the ban-opticon}, | ||
Line 1,629: | Line 1,389: | ||
note = {Series Title: Routledge Studies in Liberty and Security}, | note = {Series Title: Routledge Studies in Liberty and Security}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{marresWhyMapIssues2015, | |bibtex=@article{marresWhyMapIssues2015, | ||
title = {Why Map Issues? On Controversy Analysis as a Digital Method}, | title = {Why Map Issues? On Controversy Analysis as a Digital Method}, | ||
Line 1,649: | Line 1,407: | ||
pages = {655--686}, | pages = {655--686}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{harveyMegaPixels, | |bibtex=@misc{harveyMegaPixels, | ||
title = {MegaPixels}, | title = {MegaPixels}, | ||
Line 1,659: | Line 1,415: | ||
author = {Harvey, Adam}, | author = {Harvey, Adam}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{SomethingSomethingPlotting, | |bibtex=@misc{SomethingSomethingPlotting, | ||
title = {Something something : Plotting Data}, | title = {Something something : Plotting Data}, | ||
Line 1,667: | Line 1,421: | ||
urldate = {2021-01-26}, | urldate = {2021-01-26}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{crawfordAnatomyAISystem, | |bibtex=@misc{crawfordAnatomyAISystem, | ||
title = {Anatomy of an AI System}, | title = {Anatomy of an AI System}, | ||
Line 1,678: | Line 1,430: | ||
author = {Crawford, Kate and Joler, Vladan}, | author = {Crawford, Kate and Joler, Vladan}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{hekkanenFieldsNetworksFinnish, | |bibtex=@article{hekkanenFieldsNetworksFinnish, | ||
title = {Fields, Networks and Finnish prose: A Comparison of Bourdieusian Field Theory and Actor-Network Theory in Translation Sociology}, | title = {Fields, Networks and Finnish prose: A Comparison of Bourdieusian Field Theory and Actor-Network Theory in Translation Sociology}, | ||
Line 1,687: | Line 1,437: | ||
pages = {22}, | pages = {22}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{PeopleAMLaba, | |bibtex=@misc{PeopleAMLaba, | ||
title = {People {\textbar} AMLab}, | title = {People {\textbar} AMLab}, | ||
Line 1,696: | Line 1,444: | ||
urldate = {2021-01-26}, | urldate = {2021-01-26}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{molRegionsNetworksFluids1994, | |bibtex=@article{molRegionsNetworksFluids1994, | ||
title = {Regions, Networks and Fluids: Anaemia and Social Topology}, | title = {Regions, Networks and Fluids: Anaemia and Social Topology}, | ||
Line 1,715: | Line 1,461: | ||
pages = {641--671}, | pages = {641--671}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{grommePopulationGeometriesEurope2020, | |bibtex=@article{grommePopulationGeometriesEurope2020, | ||
title = {Population Geometries of Europe: The Topologies of Data Cubes and Grids}, | title = {Population Geometries of Europe: The Topologies of Data Cubes and Grids}, | ||
Line 1,734: | Line 1,478: | ||
pages = {235--261}, | pages = {235--261}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{cakiciPeoplingEuropeData2020, | |bibtex=@article{cakiciPeoplingEuropeData2020, | ||
title = {Peopling Europe through Data Practices: Introduction to the Special Issue}, | title = {Peopling Europe through Data Practices: Introduction to the Special Issue}, | ||
Line 1,753: | Line 1,495: | ||
pages = {199--211}, | pages = {199--211}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{boersmaImaginingSocietyLogics2015, | |bibtex=@article{boersmaImaginingSocietyLogics2015, | ||
title = {Imagining society: Logics of visualization in images of immigrant integration}, | title = {Imagining society: Logics of visualization in images of immigrant integration}, | ||
Line 1,772: | Line 1,512: | ||
pages = {1043--1062}, | pages = {1043--1062}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{davilaDiagramsPowerVisualizing2019, | |bibtex=@book{davilaDiagramsPowerVisualizing2019, | ||
address = {Eindhoven}, | address = {Eindhoven}, | ||
Line 1,785: | Line 1,523: | ||
note = {OCLC: 1102599000}, | note = {OCLC: 1102599000}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{universityDataVisualizationModern, | |bibtex=@misc{universityDataVisualizationModern, | ||
title = {Data Visualization and the Modern Imagination}, | title = {Data Visualization and the Modern Imagination}, | ||
Line 1,796: | Line 1,532: | ||
author = {University, © Stanford and Stanford and California 94305}, | author = {University, © Stanford and Stanford and California 94305}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{ComputerGotIt, | |bibtex=@misc{ComputerGotIt, | ||
title = {'The Computer Got It Wrong': How Facial Recognition Led To False Arrest Of Black Man}, | title = {'The Computer Got It Wrong': How Facial Recognition Led To False Arrest Of Black Man}, | ||
Line 1,807: | Line 1,541: | ||
journal = {NPR.org}, | journal = {NPR.org}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@techreport{europeancommissionWhitePaperArtificial2020, | |bibtex=@techreport{europeancommissionWhitePaperArtificial2020, | ||
type = {Text}, | type = {Text}, | ||
Line 1,821: | Line 1,553: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@techreport{nganOngoingFaceRecognition2020, | |bibtex=@techreport{nganOngoingFaceRecognition2020, | ||
address = {Gaithersburg, MD}, | address = {Gaithersburg, MD}, | ||
Line 1,839: | Line 1,569: | ||
pages = {NIST IR 8311}, | pages = {NIST IR 8311}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{AINarratives2020, | |bibtex=@misc{AINarratives2020, | ||
title = {AI Narratives}, | title = {AI Narratives}, | ||
Line 1,850: | Line 1,578: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{covielloPENSARECONOCCHI, | |bibtex=@article{covielloPENSARECONOCCHI, | ||
title = {PENSARE CON GLI OCCHI. LA POLITICA DELLE IMMAGINI NELL’OPERA DI HARUN FAROCHI / Videogrammi di guerra. Il lavoro del montaggio e la riemersione del visibile nel cinema di HARUN FAROCKI}, | title = {PENSARE CON GLI OCCHI. LA POLITICA DELLE IMMAGINI NELL’OPERA DI HARUN FAROCHI / Videogrammi di guerra. Il lavoro del montaggio e la riemersione del visibile nel cinema di HARUN FAROCKI}, | ||
Line 1,860: | Line 1,586: | ||
author = {Coviello, Massimiliano}, | author = {Coviello, Massimiliano}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{harveyExposingAi, | |bibtex=@misc{harveyExposingAi, | ||
title = {Exposing.ai}, | title = {Exposing.ai}, | ||
Line 1,870: | Line 1,594: | ||
author = {Harvey, Adam}, | author = {Harvey, Adam}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{metzHereWayLearn2021, | |bibtex=@article{metzHereWayLearn2021, | ||
chapter = {Technology}, | chapter = {Technology}, | ||
Line 1,886: | Line 1,608: | ||
keywords = {Computer Vision, Computers and the Internet, Facial Recognition Software, Flickr, Megvii Technology Ltd, Photography, Privacy, Tabriz, Parisa, University of Washington}, | keywords = {Computer Vision, Computers and the Internet, Facial Recognition Software, Flickr, Megvii Technology Ltd, Photography, Privacy, Tabriz, Parisa, University of Washington}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{kale-lostuvaliTwoSociologiesScience2016, | |bibtex=@article{kale-lostuvaliTwoSociologiesScience2016, | ||
title = {Two Sociologies of Science in Search of Truth: Bourdieu Versus Latour}, | title = {Two Sociologies of Science in Search of Truth: Bourdieu Versus Latour}, | ||
Line 1,907: | Line 1,627: | ||
pages = {273--296}, | pages = {273--296}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{schinkelSociologicalDiscourseRelational2007, | |bibtex=@article{schinkelSociologicalDiscourseRelational2007, | ||
title = {Sociological Discourse of the Relational: The Cases of Bourdieu \& Latour}, | title = {Sociological Discourse of the Relational: The Cases of Bourdieu \& Latour}, | ||
Line 1,927: | Line 1,645: | ||
pages = {707--729}, | pages = {707--729}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{20210401UnfoldingIntelligence, | |bibtex=@misc{20210401UnfoldingIntelligence, | ||
title = {2021-04-0 1Unfolding Intelligence Symposium}, | title = {2021-04-0 1Unfolding Intelligence Symposium}, | ||
Line 1,935: | Line 1,651: | ||
urldate = {2021-02-03}, | urldate = {2021-02-03}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{braynePredictSurveilData2021, | |bibtex=@book{braynePredictSurveilData2021, | ||
address = {New York, NY}, | address = {New York, NY}, | ||
Line 1,949: | Line 1,663: | ||
keywords = {California Los Angeles, Crime analysis, Crime forecasting, Criminal behavior, Prediction of, Data processing, Police, Statistical methods}, | keywords = {California Los Angeles, Crime analysis, Crime forecasting, Criminal behavior, Prediction of, Data processing, Police, Statistical methods}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{PredictSurveilSarah, | |bibtex=@misc{PredictSurveilSarah, | ||
title = {Predict and Surveil {\textbar} Sarah Brayne {\textbar} download}, | title = {Predict and Surveil {\textbar} Sarah Brayne {\textbar} download}, | ||
Line 1,957: | Line 1,669: | ||
urldate = {2021-02-04}, | urldate = {2021-02-04}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{hvistendahljanuary302021HowLAPDPalantir, | |bibtex=@misc{hvistendahljanuary302021HowLAPDPalantir, | ||
title = {How the LAPD and Palantir Use Data to Justify Racist Policing}, | title = {How the LAPD and Palantir Use Data to Justify Racist Policing}, | ||
Line 1,968: | Line 1,678: | ||
author = {HvistendahlJanuary 30 2021, Mara HvistendahlMara and P.m, 1:00}, | author = {HvistendahlJanuary 30 2021, Mara HvistendahlMara and P.m, 1:00}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{collectiveTacticalTech, | |bibtex=@misc{collectiveTacticalTech, | ||
title = {Tactical Tech}, | title = {Tactical Tech}, | ||
Line 1,978: | Line 1,686: | ||
author = {Collective, Tactical Tech}, | author = {Collective, Tactical Tech}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ThereAreSpying, | |bibtex=@article{ThereAreSpying, | ||
title = {There Are Spying Eyes Everywhere—and Now They Share a Brain}, | title = {There Are Spying Eyes Everywhere—and Now They Share a Brain}, | ||
Line 1,990: | Line 1,696: | ||
keywords = {backchannel, business, intelligence, longreads, privacy, Read, Ruben, surveillance, textbelowleftfullbleed, web}, | keywords = {backchannel, business, intelligence, longreads, privacy, Read, Ruben, surveillance, textbelowleftfullbleed, web}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{krausScaryRevelations40, | |bibtex=@misc{krausScaryRevelations40, | ||
title = {9 scary revelations from 40 years of facial recognition research}, | title = {9 scary revelations from 40 years of facial recognition research}, | ||
Line 2,001: | Line 1,705: | ||
author = {Kraus, Rachel}, | author = {Kraus, Rachel}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{bunz001AestheticsNew, | |bibtex=@article{bunz001AestheticsNew, | ||
title = {001: Aesthetics of New AI}, | title = {001: Aesthetics of New AI}, | ||
Line 2,010: | Line 1,712: | ||
pages = {56}, | pages = {56}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{rajiFaceSurveyFacial2021a, | |bibtex=@article{rajiFaceSurveyFacial2021a, | ||
title = {About Face: A Survey of Facial Recognition Evaluation}, | title = {About Face: A Survey of Facial Recognition Evaluation}, | ||
Line 2,020: | Line 1,720: | ||
pages = {11}, | pages = {11}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{WorldOrbit2020, | |bibtex=@misc{WorldOrbit2020, | ||
title = {World.orbit}, | title = {World.orbit}, | ||
Line 2,032: | Line 1,730: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{VisualSensoryApproaches, | |bibtex=@misc{VisualSensoryApproaches, | ||
title = {Visual and Sensory Approaches}, | title = {Visual and Sensory Approaches}, | ||
Line 2,042: | Line 1,738: | ||
journal = {Society for Social Studies of Science}, | journal = {Society for Social Studies of Science}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{MappingMonitoring, | |bibtex=@misc{MappingMonitoring, | ||
title = {Mapping / Monitoring}, | title = {Mapping / Monitoring}, | ||
Line 2,052: | Line 1,746: | ||
journal = {Society for Social Studies of Science}, | journal = {Society for Social Studies of Science}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{ExperimentsCollaborationCritical, | |bibtex=@misc{ExperimentsCollaborationCritical, | ||
title = {Experiments in Collaboration and Critical Participation}, | title = {Experiments in Collaboration and Critical Participation}, | ||
Line 2,062: | Line 1,754: | ||
journal = {Society for Social Studies of Science}, | journal = {Society for Social Studies of Science}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{VirtualPrague2020, | |bibtex=@misc{VirtualPrague2020, | ||
title = {Virtual Prague 2020}, | title = {Virtual Prague 2020}, | ||
Line 2,072: | Line 1,762: | ||
journal = {Society for Social Studies of Science}, | journal = {Society for Social Studies of Science}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{PhDRegulationsLeiden, | |bibtex=@misc{PhDRegulationsLeiden, | ||
title = {PhD Regulations Leiden University - Leiden University}, | title = {PhD Regulations Leiden University - Leiden University}, | ||
Line 2,080: | Line 1,768: | ||
urldate = {2021-02-10}, | urldate = {2021-02-10}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{KnotWoodCall, | |bibtex=@misc{KnotWoodCall, | ||
title = {The Knot in the Wood: The Call to Multimodal Anthropology}, | title = {The Knot in the Wood: The Call to Multimodal Anthropology}, | ||
Line 2,090: | Line 1,776: | ||
urldate = {2021-02-10}, | urldate = {2021-02-10}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{FacialRecognitionEurope2019, | |bibtex=@misc{FacialRecognitionEurope2019, | ||
title = {Facial Recognition in Europe: Security Problem?}, | title = {Facial Recognition in Europe: Security Problem?}, | ||
Line 2,104: | Line 1,788: | ||
keywords = {FR-Inbox}, | keywords = {FR-Inbox}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{10FacialRecognition, | |bibtex=@misc{10FacialRecognition, | ||
title = {10 facial recognition startups from Europe you should know about in 2019 {\textbar} Silicon Canals}, | title = {10 facial recognition startups from Europe you should know about in 2019 {\textbar} Silicon Canals}, | ||
Line 2,115: | Line 1,797: | ||
keywords = {FR-Inbox}, | keywords = {FR-Inbox}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{FacialRecognitionEU2020, | |bibtex=@article{FacialRecognitionEU2020, | ||
chapter = {Technology}, | chapter = {Technology}, | ||
Line 2,130: | Line 1,810: | ||
keywords = {FR-Inbox}, | keywords = {FR-Inbox}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{sheadFacialRecognitionTech2020, | |bibtex=@misc{sheadFacialRecognitionTech2020, | ||
title = {Facial recognition tech developed by Clearview AI could be illegal in Europe, privacy group says}, | title = {Facial recognition tech developed by Clearview AI could be illegal in Europe, privacy group says}, | ||
Line 2,145: | Line 1,823: | ||
keywords = {FR-Inbox}, | keywords = {FR-Inbox}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{HowFacialRecognition2019, | |bibtex=@misc{HowFacialRecognition2019, | ||
title = {How facial recognition is taking over a French city}, | title = {How facial recognition is taking over a French city}, | ||
Line 2,158: | Line 1,834: | ||
keywords = {FR-Inbox}, | keywords = {FR-Inbox}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{ManyFacesFacial, | |bibtex=@misc{ManyFacesFacial, | ||
title = {The many faces of facial recognition in the EU}, | title = {The many faces of facial recognition in the EU}, | ||
Line 2,169: | Line 1,843: | ||
keywords = {FR-Inbox}, | keywords = {FR-Inbox}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{ActivistsUrgeEU2020, | |bibtex=@misc{ActivistsUrgeEU2020, | ||
title = {Activists urge EU to ban live facial recognition in public spaces}, | title = {Activists urge EU to ban live facial recognition in public spaces}, | ||
Line 2,182: | Line 1,854: | ||
keywords = {FR-Inbox}, | keywords = {FR-Inbox}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{EuropeLimitsGovernment, | |bibtex=@article{EuropeLimitsGovernment, | ||
title = {Europe Limits Government by Algorithm. The US, Not So Much}, | title = {Europe Limits Government by Algorithm. The US, Not So Much}, | ||
Line 2,194: | Line 1,864: | ||
keywords = {algorithms, artificial intelligence, business, europe, facial recognition, FR-Inbox, web}, | keywords = {algorithms, artificial intelligence, business, europe, facial recognition, FR-Inbox, web}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{HowDutchActivists, | |bibtex=@misc{HowDutchActivists, | ||
title = {How Dutch activists got an invasive fraud detection algorithm banned}, | title = {How Dutch activists got an invasive fraud detection algorithm banned}, | ||
Line 2,205: | Line 1,873: | ||
keywords = {FR-Inbox}, | keywords = {FR-Inbox}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{NotesAIFrontier, | |bibtex=@article{NotesAIFrontier, | ||
title = {Notes from the AI frontier: Tackling Europe’s gap in digital and AI}, | title = {Notes from the AI frontier: Tackling Europe’s gap in digital and AI}, | ||
Line 2,214: | Line 1,880: | ||
pages = {60}, | pages = {60}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{HowEuropeAI2019, | |bibtex=@misc{HowEuropeAI2019, | ||
title = {How Europe’s AI ecosystem could catch up with China and the U.S.}, | title = {How Europe’s AI ecosystem could catch up with China and the U.S.}, | ||
Line 2,227: | Line 1,891: | ||
keywords = {FR-Read}, | keywords = {FR-Read}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{AmsterdamAlgoritmeregisterHet, | |bibtex=@misc{AmsterdamAlgoritmeregisterHet, | ||
title = {Amsterdam Algoritmeregister – Het algoritmeregister is een overzicht van de algoritmes die de gemeente Amsterdam gebruikt bij gemeentelijke dienstverlening. Een algoritme is een vooraf bepaalde set regels of stappen die door de computer gevolgd worden. Per algoritme vindt u eerst algemene informatie over de bedoeling en werking van het algoritme. Daarna vindt u meer gedetailleerde technische informatie. Door feedback te geven helpen kunt u ons helpen om de algoritmes die we gebruiken beter, eerlijker en verantwoorder te maken.}, | title = {Amsterdam Algoritmeregister – Het algoritmeregister is een overzicht van de algoritmes die de gemeente Amsterdam gebruikt bij gemeentelijke dienstverlening. Een algoritme is een vooraf bepaalde set regels of stappen die door de computer gevolgd worden. Per algoritme vindt u eerst algemene informatie over de bedoeling en werking van het algoritme. Daarna vindt u meer gedetailleerde technische informatie. Door feedback te geven helpen kunt u ons helpen om de algoritmes die we gebruiken beter, eerlijker en verantwoorder te maken.}, | ||
Line 2,236: | Line 1,898: | ||
urldate = {2021-02-10}, | urldate = {2021-02-10}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{BelarusProtestersUse, | |bibtex=@misc{BelarusProtestersUse, | ||
title = {Belarus Protesters Use AI to 'Unmask' Riot Police Wearing Face Coverings}, | title = {Belarus Protesters Use AI to 'Unmask' Riot Police Wearing Face Coverings}, | ||
Line 2,245: | Line 1,905: | ||
keywords = {FR-Read}, | keywords = {FR-Read}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{hillWrongfullyAccusedAlgorithm2020, | |bibtex=@article{hillWrongfullyAccusedAlgorithm2020, | ||
chapter = {Technology}, | chapter = {Technology}, | ||
Line 2,261: | Line 1,919: | ||
keywords = {Black People, Detroit (Mich), Discrimination, Facial Recognition Software, False Arrests, Convictions and Imprisonments, FR-Read, Police, Williams, Robert Julian-Borchak}, | keywords = {Black People, Detroit (Mich), Discrimination, Facial Recognition Software, False Arrests, Convictions and Imprisonments, FR-Read, Police, Williams, Robert Julian-Borchak}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{AmsterdamHelsinkiLaunch2020, | |bibtex=@misc{AmsterdamHelsinkiLaunch2020, | ||
title = {Amsterdam and Helsinki launch algorithm registries to bring transparency to public deployments of AI}, | title = {Amsterdam and Helsinki launch algorithm registries to bring transparency to public deployments of AI}, | ||
Line 2,274: | Line 1,930: | ||
keywords = {FR-Read}, | keywords = {FR-Read}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{ComputerGotIta, | |bibtex=@misc{ComputerGotIta, | ||
title = {'The Computer Got It Wrong': How Facial Recognition Led To False Arrest Of Black Man}, | title = {'The Computer Got It Wrong': How Facial Recognition Led To False Arrest Of Black Man}, | ||
Line 2,285: | Line 1,939: | ||
journal = {NPR.org}, | journal = {NPR.org}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{guinnessTechnopoliceCallingOut, | |bibtex=@misc{guinnessTechnopoliceCallingOut, | ||
title = {Technopolice: calling out so-called "Safe Cities"}, | title = {Technopolice: calling out so-called "Safe Cities"}, | ||
Line 2,296: | Line 1,948: | ||
author = {Guinness}, | author = {Guinness}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{farockiEyeMachine2000, | |bibtex=@misc{farockiEyeMachine2000, | ||
title = {Eye/Machine}, | title = {Eye/Machine}, | ||
Line 2,305: | Line 1,955: | ||
year = {2000}, | year = {2000}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{farockiEyeMachineII2001, | |bibtex=@misc{farockiEyeMachineII2001, | ||
title = {Eye/Machine II}, | title = {Eye/Machine II}, | ||
Line 2,314: | Line 1,962: | ||
year = {2001}, | year = {2001}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{farockiEyeMachineIII2003, | |bibtex=@misc{farockiEyeMachineIII2003, | ||
title = {Eye/Machine III}, | title = {Eye/Machine III}, | ||
Line 2,323: | Line 1,969: | ||
year = {2003}, | year = {2003}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{blockCleaners2018, | |bibtex=@misc{blockCleaners2018, | ||
title = {The Cleaners}, | title = {The Cleaners}, | ||
Line 2,331: | Line 1,975: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{GoogleWorldBrain2013, | |bibtex=@misc{GoogleWorldBrain2013, | ||
title = {Google \& the world brain}, | title = {Google \& the world brain}, | ||
Line 2,339: | Line 1,981: | ||
keywords = {RV-watched}, | keywords = {RV-watched}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{levinsonSteelingUrFeelings2019, | |bibtex=@misc{levinsonSteelingUrFeelings2019, | ||
title = {Steeling Ur Feelings}, | title = {Steeling Ur Feelings}, | ||
Line 2,350: | Line 1,990: | ||
keywords = {RV-watched}, | keywords = {RV-watched}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{bobkoffYouVeGot2020, | |bibtex=@misc{bobkoffYouVeGot2020, | ||
title = {You've got Enron Mail}, | title = {You've got Enron Mail}, | ||
Line 2,362: | Line 2,000: | ||
keywords = {RV-watched}, | keywords = {RV-watched}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{kantayyaCodedBias2020, | |bibtex=@misc{kantayyaCodedBias2020, | ||
title = {Coded Bias}, | title = {Coded Bias}, | ||
Line 2,370: | Line 2,006: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{France.2013, | |bibtex=@article{France.2013, | ||
title = {Sécurité électronique et cyberguerre}, | title = {Sécurité électronique et cyberguerre}, | ||
Line 2,378: | Line 2,012: | ||
year = {2013}, | year = {2013}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{Free.2012, | |bibtex=@article{Free.2012, | ||
title = {Religion\_and\_radicalisation.\_Ed\_Hussain\_and\_Mehdi\_Hasan\_discuss\_with\_Iain\_Dale}, | title = {Religion\_and\_radicalisation.\_Ed\_Hussain\_and\_Mehdi\_Hasan\_discuss\_with\_Iain\_Dale}, | ||
Line 2,388: | Line 2,020: | ||
note = {Publisher: LBC Radio}, | note = {Publisher: LBC Radio}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{Furtado., | |bibtex=@misc{Furtado., | ||
title = {Ilha das flores}, | title = {Ilha das flores}, | ||
Line 2,396: | Line 2,026: | ||
note = {Publisher: Casa de Cinema de Porto Alegre}, | note = {Publisher: Casa de Cinema de Porto Alegre}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{Hammer.2017, | |bibtex=@article{Hammer.2017, | ||
title = {Escape from syria: Rania's odyssey}, | title = {Escape from syria: Rania's odyssey}, | ||
Line 2,408: | Line 2,036: | ||
tex.address: London}, | tex.address: London}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{Henno.2016, | |bibtex=@misc{Henno.2016, | ||
title = {Koropa}, | title = {Koropa}, | ||
Line 2,418: | Line 2,044: | ||
note = {Publisher: Spectre Production}, | note = {Publisher: Spectre Production}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{Maimbo.2005, | |bibtex=@article{Maimbo.2005, | ||
title = {Remittances : development impact and future prospects}, | title = {Remittances : development impact and future prospects}, | ||
Line 2,429: | Line 2,053: | ||
tex.address: Washington D C}, | tex.address: Washington D C}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{Metz.2010, | |bibtex=@misc{Metz.2010, | ||
title = {Armadillo}, | title = {Armadillo}, | ||
Line 2,438: | Line 2,060: | ||
note = {Publisher: Fridthjof Film}, | note = {Publisher: Fridthjof Film}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{Mograbi.2008, | |bibtex=@misc{Mograbi.2008, | ||
title = {Z32}, | title = {Z32}, | ||
Line 2,448: | Line 2,068: | ||
note = {Publisher: Les Films d'Ici}, | note = {Publisher: Les Films d'Ici}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{Resnais.1953, | |bibtex=@misc{Resnais.1953, | ||
title = {Statues also die}, | title = {Statues also die}, | ||
Line 2,457: | Line 2,075: | ||
note = {Publisher: Présence Africaine}, | note = {Publisher: Présence Africaine}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{Kanagasabapathy.2007, | |bibtex=@article{Kanagasabapathy.2007, | ||
title = {Post-war identity re-construction in Kilinochchi, Sri Lanka negotiation of gendered identity between the local and diaspora community}, | title = {Post-war identity re-construction in Kilinochchi, Sri Lanka negotiation of gendered identity between the local and diaspora community}, | ||
Line 2,468: | Line 2,084: | ||
tex.address: Ottawa}, | tex.address: Ottawa}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{.1983, | |bibtex=@misc{.1983, | ||
title = {Reassemblage: From the firelight to the screen}, | title = {Reassemblage: From the firelight to the screen}, | ||
year = {1983}, | year = {1983}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{Rosi.2016, | |bibtex=@article{Rosi.2016, | ||
title = {Fire at sea (fuocoammare)}, | title = {Fire at sea (fuocoammare)}, | ||
Line 2,485: | Line 2,097: | ||
note = {Publisher: Stemal Entertainment}, | note = {Publisher: Stemal Entertainment}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{.2011, | |bibtex=@article{.2011, | ||
title = {20110401\_Radicalization\_Session5\_128K}, | title = {20110401\_Radicalization\_Session5\_128K}, | ||
year = {2011}, | year = {2011}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{ForensicArchitecture.2011, | |bibtex=@misc{ForensicArchitecture.2011, | ||
title = {Torture in saydnaya prison}, | title = {Torture in saydnaya prison}, | ||
Line 2,502: | Line 2,110: | ||
year = {2011}, | year = {2011}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{.2013, | |bibtex=@article{.2013, | ||
title = {Wordstat video}, | title = {Wordstat video}, | ||
year = {2013}, | year = {2013}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{Block.2018, | |bibtex=@article{Block.2018, | ||
title = {The cleaners}, | title = {The cleaners}, | ||
Line 2,518: | Line 2,122: | ||
note = {Publisher: Gebrueder Beetz Filmproduktion}, | note = {Publisher: Gebrueder Beetz Filmproduktion}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{CastaingTaylor.2012, | |bibtex=@misc{CastaingTaylor.2012, | ||
title = {Leviathan}, | title = {Leviathan}, | ||
Line 2,528: | Line 2,130: | ||
note = {Publisher: Harvard Sensory Lab}, | note = {Publisher: Harvard Sensory Lab}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{Asch.1975, | |bibtex=@misc{Asch.1975, | ||
title = {The ax fight}, | title = {The ax fight}, | ||
Line 2,536: | Line 2,136: | ||
year = {1975}, | year = {1975}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{CouncilonForeignRelations.2011b, | |bibtex=@article{CouncilonForeignRelations.2011b, | ||
title = {Radicalisation hearings}, | title = {Radicalisation hearings}, | ||
Line 2,545: | Line 2,143: | ||
note = {Publisher: Council on Foreign Relations}, | note = {Publisher: Council on Foreign Relations}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{CouncilonForeignRelations.2011, | |bibtex=@article{CouncilonForeignRelations.2011, | ||
title = {Radicalisation hearings}, | title = {Radicalisation hearings}, | ||
Line 2,554: | Line 2,150: | ||
note = {Publisher: Council on Foreign Relations}, | note = {Publisher: Council on Foreign Relations}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{Curtis.2004, | |bibtex=@misc{Curtis.2004, | ||
title = {The power of nightmares: The rise of the politics of fear}, | title = {The power of nightmares: The rise of the politics of fear}, | ||
Line 2,564: | Line 2,158: | ||
note = {Publisher: British Broadcasting Corporation}, | note = {Publisher: British Broadcasting Corporation}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{DerDerian.2010, | |bibtex=@misc{DerDerian.2010, | ||
title = {Human terrain: When war becomes academic (82min)}, | title = {Human terrain: When war becomes academic (82min)}, | ||
Line 2,573: | Line 2,165: | ||
note = {Publisher: Udris Film, Global Media Project}, | note = {Publisher: Udris Film, Global Media Project}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{Derki.2014, | |bibtex=@misc{Derki.2014, | ||
title = {Return to homs}, | title = {Return to homs}, | ||
Line 2,583: | Line 2,173: | ||
tex.address: New York}, | tex.address: New York}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{Farocki.1988, | |bibtex=@misc{Farocki.1988, | ||
title = {Images of the World and the Inscription of War}, | title = {Images of the World and the Inscription of War}, | ||
Line 2,593: | Line 2,181: | ||
note = {Publisher: Harun Farocki Filmproduktion}, | note = {Publisher: Harun Farocki Filmproduktion}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{Farocki.20092010, | |bibtex=@misc{Farocki.20092010, | ||
title = {Serious games i-iv}, | title = {Serious games i-iv}, | ||
Line 2,602: | Line 2,188: | ||
year = {2009}, | year = {2009}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ForensicArchitecture.2018, | |bibtex=@article{ForensicArchitecture.2018, | ||
title = {Destruction and return in al-Araqib}, | title = {Destruction and return in al-Araqib}, | ||
Line 2,612: | Line 2,196: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{Farocki.2000, | |bibtex=@article{Farocki.2000, | ||
title = {Auge/Machine I (Eye/Machine I)}, | title = {Auge/Machine I (Eye/Machine I)}, | ||
Line 2,621: | Line 2,203: | ||
year = {2000}, | year = {2000}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{Farocki.20012003, | |bibtex=@article{Farocki.20012003, | ||
title = {Auge/Machine i-iii (Eye/Machine i-iii)}, | title = {Auge/Machine i-iii (Eye/Machine i-iii)}, | ||
Line 2,630: | Line 2,210: | ||
year = {2001}, | year = {2001}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{Rouch.1957, | |bibtex=@misc{Rouch.1957, | ||
title = {Les maîtres fous (the mad masters)}, | title = {Les maîtres fous (the mad masters)}, | ||
Line 2,640: | Line 2,218: | ||
note = {Publisher: Les Films de la Pleiade}, | note = {Publisher: Les Films de la Pleiade}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{hallCriticalVisualizationCase2015, | |bibtex=@article{hallCriticalVisualizationCase2015, | ||
title = {Critical visualization: a case for rethinking how we visualize risk and security}, | title = {Critical visualization: a case for rethinking how we visualize risk and security}, | ||
Line 2,658: | Line 2,234: | ||
pages = {93--108}, | pages = {93--108}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{hallCriticalVisualizationCase2015a, | |bibtex=@article{hallCriticalVisualizationCase2015a, | ||
title = {Critical visualization: a case for rethinking how we visualize risk and security}, | title = {Critical visualization: a case for rethinking how we visualize risk and security}, | ||
Line 2,676: | Line 2,250: | ||
pages = {93--108}, | pages = {93--108}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{kublerStateUrgencySurveillance2017, | |bibtex=@article{kublerStateUrgencySurveillance2017, | ||
title = {State of urgency: Surveillance, power, and algorithms in France’s state of emergency}, | title = {State of urgency: Surveillance, power, and algorithms in France’s state of emergency}, | ||
Line 2,697: | Line 2,269: | ||
pages = {2053951717736338}, | pages = {2053951717736338}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{axonDataPresentationSecurity2020, | |bibtex=@article{axonDataPresentationSecurity2020, | ||
title = {Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice}, | title = {Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice}, | ||
Line 2,716: | Line 2,286: | ||
pages = {tyaa004}, | pages = {tyaa004}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{andersen002AestheticsNew, | |bibtex=@article{andersen002AestheticsNew, | ||
title = {002: Aesthetics of New AI Interfaces}, | title = {002: Aesthetics of New AI Interfaces}, | ||
Line 2,725: | Line 2,293: | ||
pages = {71}, | pages = {71}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{AestheticsNewAI, | |bibtex=@misc{AestheticsNewAI, | ||
title = {Aesthetics of New AI Interfaces—Panel Discussion}, | title = {Aesthetics of New AI Interfaces—Panel Discussion}, | ||
Line 2,735: | Line 2,301: | ||
journal = {Serpentine Galleries}, | journal = {Serpentine Galleries}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{adornettoturnerRemembering2020, | |bibtex=@misc{adornettoturnerRemembering2020, | ||
title = {Remembering Beyond}, | title = {Remembering Beyond}, | ||
Line 2,744: | Line 2,308: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{scheitonjehessenIHuman2019, | |bibtex=@misc{scheitonjehessenIHuman2019, | ||
title = {iHuman}, | title = {iHuman}, | ||
Line 2,753: | Line 2,315: | ||
year = {2019}, | year = {2019}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{mbakamrosine;yameogoeleonore;andvan.dienderenanlastPrisme2021, | |bibtex=@misc{mbakamrosine;yameogoeleonore;andvan.dienderenanlastPrisme2021, | ||
title = {Prisme}, | title = {Prisme}, | ||
Line 2,762: | Line 2,322: | ||
year = {2021}, | year = {2021}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{van.dienderenanlastLili2015, | |bibtex=@misc{van.dienderenanlastLili2015, | ||
title = {Lili}, | title = {Lili}, | ||
Line 2,771: | Line 2,329: | ||
year = {2015}, | year = {2015}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{fishadamlastInternet2018, | |bibtex=@misc{fishadamlastInternet2018, | ||
title = {The Internet}, | title = {The Internet}, | ||
Line 2,780: | Line 2,336: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@techreport{garviePerpetualLineUpUnregulated2016, | |bibtex=@techreport{garviePerpetualLineUpUnregulated2016, | ||
title = {The Perpetual Line-Up: Unregulated Police Face Recognition in America}, | title = {The Perpetual Line-Up: Unregulated Police Face Recognition in America}, | ||
Line 2,793: | Line 2,347: | ||
year = {2016}, | year = {2016}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{garvieUNREGULATEDPOLICEFACE, | |bibtex=@article{garvieUNREGULATEDPOLICEFACE, | ||
title = {UNREGULATED POLICE FACE RECOGNITION IN AMERICA}, | title = {UNREGULATED POLICE FACE RECOGNITION IN AMERICA}, | ||
Line 2,802: | Line 2,354: | ||
pages = {151}, | pages = {151}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{mcmasterTechnologyTransferDiffusion1997, | |bibtex=@incollection{mcmasterTechnologyTransferDiffusion1997, | ||
address = {Boston, MA}, | address = {Boston, MA}, | ||
Line 2,823: | Line 2,373: | ||
pages = {64--75}, | pages = {64--75}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{QuestioningSecurityDevices, | |bibtex=@misc{QuestioningSecurityDevices, | ||
title = {Questioning security devices: Performativity, resistance, politics - Anthony Amicelle, Claudia Aradau, Julien Jeandesboz, 2015}, | title = {Questioning security devices: Performativity, resistance, politics - Anthony Amicelle, Claudia Aradau, Julien Jeandesboz, 2015}, | ||
Line 2,831: | Line 2,379: | ||
urldate = {2021-02-16}, | urldate = {2021-02-16}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{bigoGlobalizedSecurityField2006, | |bibtex=@article{bigoGlobalizedSecurityField2006, | ||
title = {Globalized (in)Security: the Field and the Ban-opticon}, | title = {Globalized (in)Security: the Field and the Ban-opticon}, | ||
Line 2,843: | Line 2,389: | ||
pages = {109--157}, | pages = {109--157}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{didierbigoSecurityExceptionBan, | |bibtex=@article{didierbigoSecurityExceptionBan, | ||
title = {Security, exception, ban and surveillance}, | title = {Security, exception, ban and surveillance}, | ||
Line 2,852: | Line 2,396: | ||
pages = {46--68}, | pages = {46--68}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{waltersDroneStrikesDingpolitik2014, | |bibtex=@article{waltersDroneStrikesDingpolitik2014, | ||
title = {Drone strikes, dingpolitik and beyond: Furthering the debate on materiality and security}, | title = {Drone strikes, dingpolitik and beyond: Furthering the debate on materiality and security}, | ||
Line 2,867: | Line 2,409: | ||
pages = {101--118}, | pages = {101--118}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{foucaultDisciplinePunishBirth1975, | |bibtex=@book{foucaultDisciplinePunishBirth1975, | ||
address = {New York}, | address = {New York}, | ||
Line 2,878: | Line 2,418: | ||
year = {1975}, | year = {1975}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{foucaultFoucaultReader1984, | |bibtex=@book{foucaultFoucaultReader1984, | ||
address = {New York}, | address = {New York}, | ||
Line 2,891: | Line 2,429: | ||
year = {1984}, | year = {1984}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{margareta.paternekNormsNormalizationMichel1987, | |bibtex=@article{margareta.paternekNormsNormalizationMichel1987, | ||
title = {Norms and normalization: Michel Foucault's overextended panoptic machine}, | title = {Norms and normalization: Michel Foucault's overextended panoptic machine}, | ||
Line 2,903: | Line 2,439: | ||
pages = {98--121}, | pages = {98--121}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{neilbrennerFoucaultNewFunctionalism1994, | |bibtex=@article{neilbrennerFoucaultNewFunctionalism1994, | ||
title = {Foucault's new functionalism}, | title = {Foucault's new functionalism}, | ||
Line 2,913: | Line 2,447: | ||
pages = {680--709}, | pages = {680--709}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{bigoExceptionBanPropos2006, | |bibtex=@article{bigoExceptionBanPropos2006, | ||
title = {Exception et ban : à propos de l' « état d'exception »}, | title = {Exception et ban : à propos de l' « état d'exception »}, | ||
Line 2,923: | Line 2,455: | ||
pages = {1--20}, | pages = {1--20}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{orlikowskiUsingTechnologyConstituting2007, | |bibtex=@article{orlikowskiUsingTechnologyConstituting2007, | ||
title = {Using Technology and Constituting Structures A Practice Lens for Studying Technologyin Organizations}, | title = {Using Technology and Constituting Structures A Practice Lens for Studying Technologyin Organizations}, | ||
Line 2,933: | Line 2,463: | ||
pages = {404--428}, | pages = {404--428}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{neilbrennerGlobalisationReterritorialisationRescaling1998, | |bibtex=@article{neilbrennerGlobalisationReterritorialisationRescaling1998, | ||
title = {Globalisation as Reterritorialisation: The Re-scaling of Urban Governance in the European Union}, | title = {Globalisation as Reterritorialisation: The Re-scaling of Urban Governance in the European Union}, | ||
Line 2,944: | Line 2,472: | ||
pages = {431--451}, | pages = {431--451}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{neilbrennerBrennerTheodore20022002, | |bibtex=@article{neilbrennerBrennerTheodore20022002, | ||
title = {Brenner and Theodore 2002 - Cities and the Geographies of “Actually Existing Neoliberalism”}, | title = {Brenner and Theodore 2002 - Cities and the Geographies of “Actually Existing Neoliberalism”}, | ||
Line 2,955: | Line 2,481: | ||
pages = {349--379}, | pages = {349--379}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{foucaultDITSECRITS195419881954, | |bibtex=@article{foucaultDITSECRITS195419881954, | ||
title = {DITS ET ÉCRITS 1954-1988 I 1954-1969}, | title = {DITS ET ÉCRITS 1954-1988 I 1954-1969}, | ||
Line 2,965: | Line 2,489: | ||
pages = {65--846}, | pages = {65--846}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{foucaultDITSECRITS195419881970, | |bibtex=@article{foucaultDITSECRITS195419881970, | ||
title = {DITS ET ÉCRITS 1954-1988 II 1970-1975}, | title = {DITS ET ÉCRITS 1954-1988 II 1970-1975}, | ||
Line 2,975: | Line 2,497: | ||
pages = {7--828}, | pages = {7--828}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{orlikowskiGenreRepertoireStructuring1994, | |bibtex=@article{orlikowskiGenreRepertoireStructuring1994, | ||
title = {Genre Repertoire: The Structuring of Communicative Practices in Organizations}, | title = {Genre Repertoire: The Structuring of Communicative Practices in Organizations}, | ||
Line 2,985: | Line 2,505: | ||
pages = {541--574}, | pages = {541--574}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{howesExpandingFieldSensory2013, | |bibtex=@misc{howesExpandingFieldSensory2013, | ||
title = {The Expanding Field of Sensory Studies – Sensory Studies}, | title = {The Expanding Field of Sensory Studies – Sensory Studies}, | ||
Line 2,994: | Line 2,512: | ||
year = {2013}, | year = {2013}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{maillotpEcritureCinematographiqueSociologie, | |bibtex=@article{maillotpEcritureCinematographiqueSociologie, | ||
title = {L’écriture cinématographique de la sociologie filmique. Comment penser en sociologue avec une caméra}, | title = {L’écriture cinématographique de la sociologie filmique. Comment penser en sociologue avec une caméra}, | ||
author = {Maillot P}, | author = {Maillot P}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{neilbrennerHenriLefebvreState2009, | |bibtex=@article{neilbrennerHenriLefebvreState2009, | ||
title = {Henri Lefebvre on State, Space, Territory}, | title = {Henri Lefebvre on State, Space, Territory}, | ||
Line 3,013: | Line 2,527: | ||
pages = {353--377}, | pages = {353--377}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{pinkDoingSensoryEthnography2009, | |bibtex=@book{pinkDoingSensoryEthnography2009, | ||
address = {London}, | address = {London}, | ||
Line 3,024: | Line 2,536: | ||
year = {2009}, | year = {2009}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ogradyDataInterfaceSecurity2015, | |bibtex=@article{ogradyDataInterfaceSecurity2015, | ||
title = {Data, interface, security}, | title = {Data, interface, security}, | ||
Line 3,038: | Line 2,548: | ||
pages = {130--137}, | pages = {130--137}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{amielEsthetiqueMontage2017, | |bibtex=@book{amielEsthetiqueMontage2017, | ||
address = {Hauts-de-Seine; Hauts-de-Seine}, | address = {Hauts-de-Seine; Hauts-de-Seine}, | ||
Line 3,050: | Line 2,558: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{beckerVisualSociologyDocumentary1995, | |bibtex=@article{beckerVisualSociologyDocumentary1995, | ||
title = {Visual sociology, documentary photography, and photojournalism}, | title = {Visual sociology, documentary photography, and photojournalism}, | ||
Line 3,064: | Line 2,570: | ||
pages = {5--14}, | pages = {5--14}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{macdougallCorporealImage2006, | |bibtex=@book{macdougallCorporealImage2006, | ||
address = {Princeton}, | address = {Princeton}, | ||
Line 3,074: | Line 2,578: | ||
year = {2006}, | year = {2006}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{InternationalEncyclopediaSocial2015, | |bibtex=@book{InternationalEncyclopediaSocial2015, | ||
title = {International Encyclopedia of the Social \& Behavioral Sciences}, | title = {International Encyclopedia of the Social \& Behavioral Sciences}, | ||
Line 3,083: | Line 2,585: | ||
year = {2015}, | year = {2015}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{bloemheuvelFoundFootage2012, | |bibtex=@book{bloemheuvelFoundFootage2012, | ||
address = {EYE Film Institute Netherlands}, | address = {EYE Film Institute Netherlands}, | ||
Line 3,093: | Line 2,593: | ||
year = {2012}, | year = {2012}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{MicrosoftWordMurch, | |bibtex=@article{MicrosoftWordMurch, | ||
title = {Microsoft Word - Murch- The Dancing Shaddow.docx}, | title = {Microsoft Word - Murch- The Dancing Shaddow.docx}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{icdefInternationalCentreDocumentary, | |bibtex=@misc{icdefInternationalCentreDocumentary, | ||
title = {International Centre for Documentary and Experimental Film}, | title = {International Centre for Documentary and Experimental Film}, | ||
author = {Icdef}, | author = {Icdef}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{pinkImagesSensesApplications2011, | |bibtex=@article{pinkImagesSensesApplications2011, | ||
title = {Images, Senses and Applications}, | title = {Images, Senses and Applications}, | ||
Line 3,120: | Line 2,614: | ||
pages = {437--454}, | pages = {437--454}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{chionAudiovisionSoundScreen1994, | |bibtex=@book{chionAudiovisionSoundScreen1994, | ||
address = {New York; Chichester}, | address = {New York; Chichester}, | ||
Line 3,132: | Line 2,624: | ||
year = {1994}, | year = {1994}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{baymanPopularItalianCinema2013, | |bibtex=@book{baymanPopularItalianCinema2013, | ||
title = {Popular Italian Cinema}, | title = {Popular Italian Cinema}, | ||
Line 3,140: | Line 2,630: | ||
year = {2013}, | year = {2013}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{hockingsWhereTheoryVisual2014, | |bibtex=@article{hockingsWhereTheoryVisual2014, | ||
title = {Where Is the Theory in Visual Anthropology?}, | title = {Where Is the Theory in Visual Anthropology?}, | ||
Line 3,154: | Line 2,642: | ||
pages = {436--456}, | pages = {436--456}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{halpernPerceptualMachinesCommunication2013, | |bibtex=@article{halpernPerceptualMachinesCommunication2013, | ||
title = {Perceptual Machines: Communication, Archiving, and Vision in Post-War American Design}, | title = {Perceptual Machines: Communication, Archiving, and Vision in Post-War American Design}, | ||
Line 3,168: | Line 2,654: | ||
pages = {328--351}, | pages = {328--351}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{macdougallEthnographicFilmFailure1978, | |bibtex=@article{macdougallEthnographicFilmFailure1978, | ||
title = {Ethnographic Film: Failure and Promise}, | title = {Ethnographic Film: Failure and Promise}, | ||
Line 3,179: | Line 2,663: | ||
pages = {405--425}, | pages = {405--425}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{minh-haTotalizingQuestMeaning2012, | |bibtex=@incollection{minh-haTotalizingQuestMeaning2012, | ||
address = {New York; London}, | address = {New York; London}, | ||
Line 3,194: | Line 2,676: | ||
pages = {90--107}, | pages = {90--107}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{heuschCinemaSocialScience1988, | |bibtex=@article{heuschCinemaSocialScience1988, | ||
title = {The cinema and social science}, | title = {The cinema and social science}, | ||
Line 3,208: | Line 2,688: | ||
pages = {99--156}, | pages = {99--156}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{motasantosCameraTendsLie2015, | |bibtex=@article{motasantosCameraTendsLie2015, | ||
title = {“The camera tends to lie and the audience tends to believe”. Some implications of the use of film in ethnographic research: the case of the European research project TRESEGY}, | title = {“The camera tends to lie and the audience tends to believe”. Some implications of the use of film in ethnographic research: the case of the European research project TRESEGY}, | ||
Line 3,219: | Line 2,697: | ||
pages = {17--22}, | pages = {17--22}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{malitskyScienceDocumentaryUnity2013, | |bibtex=@article{malitskyScienceDocumentaryUnity2013, | ||
title = {Science and Documentary: Unity, Indexicality, Reality}, | title = {Science and Documentary: Unity, Indexicality, Reality}, | ||
Line 3,233: | Line 2,709: | ||
pages = {237--257}, | pages = {237--257}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{voltzenlogelHarunFarocki194420142014, | |bibtex=@misc{voltzenlogelHarunFarocki194420142014, | ||
title = {Harun Farocki (1944-2014), or Dialectics in Images}, | title = {Harun Farocki (1944-2014), or Dialectics in Images}, | ||
Line 3,241: | Line 2,715: | ||
year = {2014}, | year = {2014}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{pauwelsVisualSociologyReframed2010, | |bibtex=@article{pauwelsVisualSociologyReframed2010, | ||
title = {Visual Sociology Reframed}, | title = {Visual Sociology Reframed}, | ||
Line 3,255: | Line 2,727: | ||
pages = {545--581}, | pages = {545--581}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{roseVisualMethodologiesIntroduction2001, | |bibtex=@book{roseVisualMethodologiesIntroduction2001, | ||
address = {London; Thousand Oaks CA; New Dehli}, | address = {London; Thousand Oaks CA; New Dehli}, | ||
Line 3,265: | Line 2,735: | ||
year = {2001}, | year = {2001}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{savageEthnographyFilmicPlaces2012, | |bibtex=@article{savageEthnographyFilmicPlaces2012, | ||
title = {Towards the Ethnography of Filmic Places. Video-based Research and Found Footage Filmmaking in the Anthropological Investigation of Mexican Migrant Event Video}, | title = {Towards the Ethnography of Filmic Places. Video-based Research and Found Footage Filmmaking in the Anthropological Investigation of Mexican Migrant Event Video}, | ||
Line 3,273: | Line 2,741: | ||
year = {2012}, | year = {2012}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{wikipediaIndexicality, | |bibtex=@book{wikipediaIndexicality, | ||
title = {Indexicality}, | title = {Indexicality}, | ||
author = {Wikipedia}, | author = {Wikipedia}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{taylorIconophobia1996, | |bibtex=@article{taylorIconophobia1996, | ||
title = {Iconophobia}, | title = {Iconophobia}, | ||
Line 3,291: | Line 2,755: | ||
pages = {64--88}, | pages = {64--88}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{lindstromCargoCults2015, | |bibtex=@incollection{lindstromCargoCults2015, | ||
title = {Cargo Cults}, | title = {Cargo Cults}, | ||
Line 3,304: | Line 2,766: | ||
pages = {139--144}, | pages = {139--144}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{mizutalippitTrinhMinhhaWhen1999, | |bibtex=@article{mizutalippitTrinhMinhhaWhen1999, | ||
title = {Trinh T. Minh-ha. When the Eye Frames Red (Interview)}, | title = {Trinh T. Minh-ha. When the Eye Frames Red (Interview)}, | ||
Line 3,314: | Line 2,774: | ||
year = {1999}, | year = {1999}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{schoppingAudioVisualDisembodiedVoices, | |bibtex=@article{schoppingAudioVisualDisembodiedVoices, | ||
title = {Audio-Visual: Disembodied Voices in Theory}, | title = {Audio-Visual: Disembodied Voices in Theory}, | ||
author = {Schöpping, Michel}, | author = {Schöpping, Michel}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{obristConversationAdamCurtis, | |bibtex=@article{obristConversationAdamCurtis, | ||
title = {In Conversation with Adam Curtis, Part I}, | title = {In Conversation with Adam Curtis, Part I}, | ||
author = {Obrist, Hans Ulrich}, | author = {Obrist, Hans Ulrich}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{pringleDocumentaryAnimismMaterial2015, | |bibtex=@article{pringleDocumentaryAnimismMaterial2015, | ||
title = {Documentary Animism: Material Politics and Sensory Ethics in The Act of Killing (2012)}, | title = {Documentary Animism: Material Politics and Sensory Ethics in The Act of Killing (2012)}, | ||
Line 3,338: | Line 2,792: | ||
pages = {673--674}, | pages = {673--674}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@phdthesis{vanlanckerExperiencingCultures2012, | |bibtex=@phdthesis{vanlanckerExperiencingCultures2012, | ||
address = {Gent (Belgium)}, | address = {Gent (Belgium)}, | ||
Line 3,349: | Line 2,801: | ||
year = {2012}, | year = {2012}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{minh-haWhenMoonWaxes1991, | |bibtex=@book{minh-haWhenMoonWaxes1991, | ||
address = {London; New York}, | address = {London; New York}, | ||
Line 3,359: | Line 2,809: | ||
year = {1991}, | year = {1991}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{bleikerPluralistMethodsVisual2015, | |bibtex=@article{bleikerPluralistMethodsVisual2015, | ||
title = {Pluralist Methods for Visual Global Politics}, | title = {Pluralist Methods for Visual Global Politics}, | ||
Line 3,371: | Line 2,819: | ||
pages = {872--890}, | pages = {872--890}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{callahanVisualTurnIR2015, | |bibtex=@article{callahanVisualTurnIR2015, | ||
title = {The visual turn in IR: documentary filmmaking as a critical method}, | title = {The visual turn in IR: documentary filmmaking as a critical method}, | ||
Line 3,383: | Line 2,829: | ||
pages = {891--910}, | pages = {891--910}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{glazzardLosingPlotNarrative2017, | |bibtex=@article{glazzardLosingPlotNarrative2017, | ||
title = {Losing the Plot: Narrative, Counter-Narrative and Violent Extremism}, | title = {Losing the Plot: Narrative, Counter-Narrative and Violent Extremism}, | ||
Line 3,394: | Line 2,838: | ||
pages = {21}, | pages = {21}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{martinielloVisualSociologyApproaches2017, | |bibtex=@article{martinielloVisualSociologyApproaches2017, | ||
title = {Visual sociology approaches in migration, ethnic and racial studies}, | title = {Visual sociology approaches in migration, ethnic and racial studies}, | ||
Line 3,408: | Line 2,850: | ||
pages = {1184--1190}, | pages = {1184--1190}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{shapiroStudiesTransDisciplinaryMethod2013, | |bibtex=@article{shapiroStudiesTransDisciplinaryMethod2013, | ||
title = {Studies in Trans-Disciplinary Method: After the Aesthetic Turn (Interventions)}, | title = {Studies in Trans-Disciplinary Method: After the Aesthetic Turn (Interventions)}, | ||
Line 3,416: | Line 2,856: | ||
year = {2013}, | year = {2013}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{bleikerSearchThinkingSpace, | |bibtex=@article{bleikerSearchThinkingSpace, | ||
title = {In Search of Thinking Space: Reflections on the Aesthetic Turn in International Political Theory}, | title = {In Search of Thinking Space: Reflections on the Aesthetic Turn in International Political Theory}, | ||
author = {Bleiker, Roland}, | author = {Bleiker, Roland}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{isrDiscourseEmotionsInternational2017, | |bibtex=@article{isrDiscourseEmotionsInternational2017, | ||
title = {Discourse and Emotions in International Relations}, | title = {Discourse and Emotions in International Relations}, | ||
Line 3,432: | Line 2,868: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{bleikerVisualAssemblages, | |bibtex=@article{bleikerVisualAssemblages, | ||
title = {Visual Assemblages}, | title = {Visual Assemblages}, | ||
author = {Bleiker, Roland}, | author = {Bleiker, Roland}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{shimVisualPoliticsNorth2014, | |bibtex=@book{shimVisualPoliticsNorth2014, | ||
title = {Visual Politics and North Korea}, | title = {Visual Politics and North Korea}, | ||
Line 3,450: | Line 2,882: | ||
doi = {10.4324/9780203746479}, | doi = {10.4324/9780203746479}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{whiteHowReadBarthes2015, | |bibtex=@book{whiteHowReadBarthes2015, | ||
title = {How to Read Barthes' Image-Music-Text}, | title = {How to Read Barthes' Image-Music-Text}, | ||
Line 3,461: | Line 2,891: | ||
doi = {10.2307/j.ctt183p71d}, | doi = {10.2307/j.ctt183p71d}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{hallAffectivePolitics112015, | |bibtex=@article{hallAffectivePolitics112015, | ||
title = {Affective politics after 9/11}, | title = {Affective politics after 9/11}, | ||
Line 3,470: | Line 2,898: | ||
year = {2015}, | year = {2015}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{tomasVertovSnowFarocki2015, | |bibtex=@book{tomasVertovSnowFarocki2015, | ||
address = {New York}, | address = {New York}, | ||
Line 3,481: | Line 2,907: | ||
year = {2015}, | year = {2015}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{hansenTheorizingImageSecurity2011, | |bibtex=@article{hansenTheorizingImageSecurity2011, | ||
title = {Theorizing the Image for Security Studies:Visual Securitization and the Muhammad Cartoon Crisis}, | title = {Theorizing the Image for Security Studies:Visual Securitization and the Muhammad Cartoon Crisis}, | ||
Line 3,494: | Line 2,918: | ||
year = {2011}, | year = {2011}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{borgdorffDebateResearchArts2004, | |bibtex=@article{borgdorffDebateResearchArts2004, | ||
title = {The debate on research in the arts}, | title = {The debate on research in the arts}, | ||
Line 3,503: | Line 2,925: | ||
pages = {22}, | pages = {22}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{silvermanSpeakingGodard1999, | |bibtex=@article{silvermanSpeakingGodard1999, | ||
title = {Speaking about Godard}, | title = {Speaking about Godard}, | ||
Line 3,517: | Line 2,937: | ||
pages = {37--0206--37--0206}, | pages = {37--0206--37--0206}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{elkinsTheorizingVisualStudies2013, | |bibtex=@book{elkinsTheorizingVisualStudies2013, | ||
address = {New York}, | address = {New York}, | ||
Line 3,528: | Line 2,946: | ||
year = {2013}, | year = {2013}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{andersenRemediatingSecurity2015, | |bibtex=@book{andersenRemediatingSecurity2015, | ||
address = {Kbh.}, | address = {Kbh.}, | ||
Line 3,542: | Line 2,958: | ||
year = {2015}, | year = {2015}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{chandlerWorldCausationBig2015, | |bibtex=@article{chandlerWorldCausationBig2015, | ||
title = {A World without Causation: Big Data and the Coming of Age of Posthumanism}, | title = {A World without Causation: Big Data and the Coming of Age of Posthumanism}, | ||
Line 3,556: | Line 2,970: | ||
pages = {833--851}, | pages = {833--851}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{barabantsevaEncounteringVulnerabilitiesFilmmaking2015, | |bibtex=@article{barabantsevaEncounteringVulnerabilitiesFilmmaking2015, | ||
title = {Encountering Vulnerabilities through ‘Filmmaking for Fieldwork’}, | title = {Encountering Vulnerabilities through ‘Filmmaking for Fieldwork’}, | ||
Line 3,570: | Line 2,982: | ||
pages = {911--930}, | pages = {911--930}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{grimshawEthnographicTurnCritical2015, | |bibtex=@article{grimshawEthnographicTurnCritical2015, | ||
title = {The ethnographic turn - and after: a critical approach towards the realignment of art and anthropology}, | title = {The ethnographic turn - and after: a critical approach towards the realignment of art and anthropology}, | ||
Line 3,584: | Line 2,994: | ||
pages = {418--434}, | pages = {418--434}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ruppertDataPolitics2017b, | |bibtex=@article{ruppertDataPolitics2017b, | ||
title = {Data politics}, | title = {Data politics}, | ||
Line 3,598: | Line 3,006: | ||
pages = {205395171771774}, | pages = {205395171771774}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{jamesPauloVirilio2007, | |bibtex=@book{jamesPauloVirilio2007, | ||
title = {Paulo Virilio}, | title = {Paulo Virilio}, | ||
Line 3,606: | Line 3,012: | ||
year = {2007}, | year = {2007}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{markmaguireAnthropologySecurityPerspectives, | |bibtex=@article{markmaguireAnthropologySecurityPerspectives, | ||
title = {The Anthropology of Security: Perspectives From the Frontline of Policing, Counter-terrorism and Border Control}, | title = {The Anthropology of Security: Perspectives From the Frontline of Policing, Counter-terrorism and Border Control}, | ||
author = {Mark Maguire, Nils Zurawski, Catarina Frois}, | author = {Mark Maguire, Nils Zurawski, Catarina Frois}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{tabachnickWieldingCameraPen2011, | |bibtex=@article{tabachnickWieldingCameraPen2011, | ||
title = {Wielding the Camera Pen: Teaching Sociology through Filmmaking}, | title = {Wielding the Camera Pen: Teaching Sociology through Filmmaking}, | ||
Line 3,627: | Line 3,029: | ||
pages = {128--148}, | pages = {128--148}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{bleikerVisualCulturesInhospitality2014, | |bibtex=@article{bleikerVisualCulturesInhospitality2014, | ||
title = {Visual Cultures of Inhospitality}, | title = {Visual Cultures of Inhospitality}, | ||
Line 3,640: | Line 3,040: | ||
pages = {192--200}, | pages = {192--200}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{borgdorffConflictFaculties2012, | |bibtex=@book{borgdorffConflictFaculties2012, | ||
address = {Leiden}, | address = {Leiden}, | ||
Line 3,650: | Line 3,048: | ||
year = {2012}, | year = {2012}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{schwabExpositionArtisticResearch2014, | |bibtex=@book{schwabExpositionArtisticResearch2014, | ||
address = {Leiden}, | address = {Leiden}, | ||
Line 3,662: | Line 3,058: | ||
year = {2014}, | year = {2014}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{Eco1992Interpretation, | |bibtex=@article{Eco1992Interpretation, | ||
title = {Eco, U. (1992). Interpretation and Overinterpretation}, | title = {Eco, U. (1992). Interpretation and Overinterpretation}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{dandoEnhancingGeographicLearning2014, | |bibtex=@article{dandoEnhancingGeographicLearning2014, | ||
title = {Enhancing Geographic Learning and Literacy Through Filmmaking}, | title = {Enhancing Geographic Learning and Literacy Through Filmmaking}, | ||
Line 3,679: | Line 3,071: | ||
pages = {1--15}, | pages = {1--15}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{hutchisonTheorizingEmotionsWorld2014, | |bibtex=@article{hutchisonTheorizingEmotionsWorld2014, | ||
title = {Theorizing emotions in world politics}, | title = {Theorizing emotions in world politics}, | ||
Line 3,693: | Line 3,083: | ||
pages = {491--514}, | pages = {491--514}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{bleikerIntroductionEmotionsWorld2014, | |bibtex=@article{bleikerIntroductionEmotionsWorld2014, | ||
title = {Introduction: Emotions and world politics}, | title = {Introduction: Emotions and world politics}, | ||
Line 3,707: | Line 3,095: | ||
pages = {490--491}, | pages = {490--491}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{germanoAnalyticFilmmakingNew2014, | |bibtex=@article{germanoAnalyticFilmmakingNew2014, | ||
title = {Analytic Filmmaking: A New Approach to Research and Publication in the Social Sciences}, | title = {Analytic Filmmaking: A New Approach to Research and Publication in the Social Sciences}, | ||
Line 3,721: | Line 3,107: | ||
pages = {663--676}, | pages = {663--676}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{valerianoTeachingIntroductionInternational2013, | |bibtex=@article{valerianoTeachingIntroductionInternational2013, | ||
title = {Teaching Introduction to International Politics with Film}, | title = {Teaching Introduction to International Politics with Film}, | ||
Line 3,735: | Line 3,119: | ||
pages = {52--72}, | pages = {52--72}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{revisor2995fd7c68e04b07ae85948db005d884, | |bibtex=@article{revisor2995fd7c68e04b07ae85948db005d884, | ||
title = {2995fd7c-68e0-4b07-ae85-948db005d884}, | title = {2995fd7c-68e0-4b07-ae85-948db005d884}, | ||
author = {Revisor}, | author = {Revisor}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ragazziTeachingDocumentaryAcademia, | |bibtex=@article{ragazziTeachingDocumentaryAcademia, | ||
title = {Teaching documentary: Between academia and the media industry}, | title = {Teaching documentary: Between academia and the media industry}, | ||
author = {Ragazzi, Francesco}, | author = {Ragazzi, Francesco}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{InternationalRelationsMovies, | |bibtex=@article{InternationalRelationsMovies, | ||
title = {International Relations at the Movies: Teaching and Learning about International Politics through Film}, | title = {International Relations at the Movies: Teaching and Learning about International Politics through Film}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{smithSourcebookExperientialEducation, | |bibtex=@article{smithSourcebookExperientialEducation, | ||
title = {Sourcebook of Experiential Education}, | title = {Sourcebook of Experiential Education}, | ||
author = {Smith and Thomas E. and Knapp and Clifford E.}, | author = {Smith and Thomas E. and Knapp and Clifford E.}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{craciunTeachingPoliticalScience, | |bibtex=@article{craciunTeachingPoliticalScience, | ||
title = {Teaching Political Science at the Movies}, | title = {Teaching Political Science at the Movies}, | ||
author = {Craciun, Claudiu}, | author = {Craciun, Claudiu}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@phdthesis{kottovaFilmmakingNewPedagogical2015, | |bibtex=@phdthesis{kottovaFilmmakingNewPedagogical2015, | ||
type = {Ph.D Dissertation}, | type = {Ph.D Dissertation}, | ||
Line 3,779: | Line 3,151: | ||
year = {2015}, | year = {2015}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{hamenstadt26c562f99c134beea7425ba4f6969f67, | |bibtex=@article{hamenstadt26c562f99c134beea7425ba4f6969f67, | ||
title = {26c562f9-9c13-4bee-a742-5ba4f6969f67}, | title = {26c562f9-9c13-4bee-a742-5ba4f6969f67}, | ||
author = {Hamenstädt, Ulrich}, | author = {Hamenstädt, Ulrich}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{vladKoganPS4920Syllabus, | |bibtex=@article{vladKoganPS4920Syllabus, | ||
title = {Kogan\_PS4920\_Syllabus\_Final}, | title = {Kogan\_PS4920\_Syllabus\_Final}, | ||
author = {Vlad}, | author = {Vlad}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ISAFilmsIR, | |bibtex=@article{ISAFilmsIR, | ||
title = {ISA Films in IR paper}, | title = {ISA Films in IR paper}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{jewittExploringMethodologicalInnovation2017a, | |bibtex=@article{jewittExploringMethodologicalInnovation2017a, | ||
title = {Exploring methodological innovation in the social sciences: the body in digital environments and the arts}, | title = {Exploring methodological innovation in the social sciences: the body in digital environments and the arts}, | ||
Line 3,813: | Line 3,177: | ||
pages = {105--120}, | pages = {105--120}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{jewittConceptualisingResearchingBody2017, | |bibtex=@article{jewittConceptualisingResearchingBody2017, | ||
title = {Conceptualising and researching the body in digital contexts: towards new methodological conversations across the arts and social sciences}, | title = {Conceptualising and researching the body in digital contexts: towards new methodological conversations across the arts and social sciences}, | ||
Line 3,827: | Line 3,189: | ||
pages = {37--53}, | pages = {37--53}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{broadhurstDigitalBodiesCreativity2017, | |bibtex=@book{broadhurstDigitalBodiesCreativity2017, | ||
address = {London}, | address = {London}, | ||
Line 3,837: | Line 3,197: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{delamontSAGEQualitativeResearch2011, | |bibtex=@book{delamontSAGEQualitativeResearch2011, | ||
address = {London}, | address = {London}, | ||
Line 3,849: | Line 3,207: | ||
year = {2011}, | year = {2011}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{banksVisualMethodsSocial2001, | |bibtex=@book{banksVisualMethodsSocial2001, | ||
title = {Visual Methods in Social Research}, | title = {Visual Methods in Social Research}, | ||
Line 3,857: | Line 3,213: | ||
year = {2001}, | year = {2001}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{robertsEditorPossibilitiesLimitations2018, | |bibtex=@article{robertsEditorPossibilitiesLimitations2018, | ||
title = {From the Editor: The Possibilities and Limitations of Experiential Learning Research in Higher Education}, | title = {From the Editor: The Possibilities and Limitations of Experiential Learning Research in Higher Education}, | ||
Line 3,871: | Line 3,225: | ||
pages = {3--7}, | pages = {3--7}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{banksSageQualitativeResearch2007, | |bibtex=@book{banksSageQualitativeResearch2007, | ||
address = {London}, | address = {London}, | ||
Line 3,884: | Line 3,236: | ||
year = {2007}, | year = {2007}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{apprichPatternDiscrimination, | |bibtex=@article{apprichPatternDiscrimination, | ||
title = {Pattern Discrimination}, | title = {Pattern Discrimination}, | ||
author = {Apprich, Clemens}, | author = {Apprich, Clemens}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{hortonJohnOliverPolice2020, | |bibtex=@article{hortonJohnOliverPolice2020, | ||
title = {John Oliver on police use of facial recognition: 'We’re about to cross a major line'}, | title = {John Oliver on police use of facial recognition: 'We’re about to cross a major line'}, | ||
Line 3,903: | Line 3,251: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{fowlerBlackLivesMatter2020, | |bibtex=@article{fowlerBlackLivesMatter2020, | ||
title = {Black Lives Matter could change facial recognition forever — if Big Tech doesn’t stand in the way}, | title = {Black Lives Matter could change facial recognition forever — if Big Tech doesn’t stand in the way}, | ||
Line 3,915: | Line 3,261: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{dorkCriticalInfoVis2013, | |bibtex=@article{dorkCriticalInfoVis2013, | ||
title = {Critical InfoVis}, | title = {Critical InfoVis}, | ||
Line 3,929: | Line 3,273: | ||
pages = {2189}, | pages = {2189}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{brandomCaliforniaStatehouseConsidering2020, | |bibtex=@article{brandomCaliforniaStatehouseConsidering2020, | ||
title = {California’s statehouse is considering a controversial facial recognition bill}, | title = {California’s statehouse is considering a controversial facial recognition bill}, | ||
Line 3,941: | Line 3,283: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{coldeweyIBMEndsAll2020, | |bibtex=@article{coldeweyIBMEndsAll2020, | ||
title = {IBM ends all facial recognition business as CEO calls out bias and inequality}, | title = {IBM ends all facial recognition business as CEO calls out bias and inequality}, | ||
Line 3,953: | Line 3,293: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{WeAsked432020, | |bibtex=@misc{WeAsked432020, | ||
title = {We Asked 43 Facial Recognition Companies if They'll Refuse to Work With Cops}, | title = {We Asked 43 Facial Recognition Companies if They'll Refuse to Work With Cops}, | ||
Line 3,962: | Line 3,300: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{macMicrosoftPitchedFacial2020, | |bibtex=@article{macMicrosoftPitchedFacial2020, | ||
title = {Microsoft Pitched Facial Recognition To The DEA}, | title = {Microsoft Pitched Facial Recognition To The DEA}, | ||
Line 3,974: | Line 3,310: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{hillWrongfullyAccusedAlgorithm2020a, | |bibtex=@article{hillWrongfullyAccusedAlgorithm2020a, | ||
title = {Wrongfully Accused by an Algorithm}, | title = {Wrongfully Accused by an Algorithm}, | ||
Line 3,987: | Line 3,321: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{GooglePhotosLabeled01, | |bibtex=@article{GooglePhotosLabeled01, | ||
title = {Google Photos labeled black people 'gorillas'}, | title = {Google Photos labeled black people 'gorillas'}, | ||
Line 3,997: | Line 3,329: | ||
month = jan, | month = jan, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{IBMAbandonsFacial2020, | |bibtex=@article{IBMAbandonsFacial2020, | ||
title = {IBM Abandons Facial Recognition Products, Condemns Racially Biased Surveillance}, | title = {IBM Abandons Facial Recognition Products, Condemns Racially Biased Surveillance}, | ||
Line 4,008: | Line 3,338: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{MicrosoftPresidentCalls, | |bibtex=@misc{MicrosoftPresidentCalls, | ||
title = {Microsoft president calls for federal regulation of facial recognition technology - CNN}, | title = {Microsoft president calls for federal regulation of facial recognition technology - CNN}, | ||
Line 4,016: | Line 3,344: | ||
urldate = {2020-06-27}, | urldate = {2020-06-27}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ivanovaWhyFacerecognitionTechnology2020, | |bibtex=@article{ivanovaWhyFacerecognitionTechnology2020, | ||
title = {Why face-recognition technology has a bias problem}, | title = {Why face-recognition technology has a bias problem}, | ||
Line 4,028: | Line 3,354: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{FederalStudyConfirms2019, | |bibtex=@article{FederalStudyConfirms2019, | ||
title = {Federal study confirms racial bias of many facial-recognition systems, casts doubt on their expanding use}, | title = {Federal study confirms racial bias of many facial-recognition systems, casts doubt on their expanding use}, | ||
Line 4,039: | Line 3,363: | ||
year = {2019}, | year = {2019}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{barrettAmazonFacialRecognition2018, | |bibtex=@article{barrettAmazonFacialRecognition2018, | ||
title = {Amazon's Facial Recognition System Mistakes Members of Congress for Mugshots}, | title = {Amazon's Facial Recognition System Mistakes Members of Congress for Mugshots}, | ||
Line 4,051: | Line 3,373: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{FacescanningCriminalPredictor2020, | |bibtex=@article{FacescanningCriminalPredictor2020, | ||
title = {Face-scanning 'criminal predictor' sparks bias row}, | title = {Face-scanning 'criminal predictor' sparks bias row}, | ||
Line 4,062: | Line 3,382: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{wongWhyFacialRecognition2019, | |bibtex=@article{wongWhyFacialRecognition2019, | ||
title = {Why facial recognition's racial bias problem is so hard to crack}, | title = {Why facial recognition's racial bias problem is so hard to crack}, | ||
Line 4,074: | Line 3,392: | ||
year = {2019}, | year = {2019}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{johnsonCongressMovesFacial2020, | |bibtex=@article{johnsonCongressMovesFacial2020, | ||
title = {Congress moves toward facial recognition regulation}, | title = {Congress moves toward facial recognition regulation}, | ||
Line 4,086: | Line 3,402: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{condittClearviewRelyFirst2020, | |bibtex=@article{condittClearviewRelyFirst2020, | ||
title = {Clearview to rely on First Amendment to defend its face-tracking tech}, | title = {Clearview to rely on First Amendment to defend its face-tracking tech}, | ||
Line 4,098: | Line 3,412: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{WhatHappensWhen2020, | |bibtex=@article{WhatHappensWhen2020, | ||
title = {What happens when an algorithm gets it wrong}, | title = {What happens when an algorithm gets it wrong}, | ||
Line 4,109: | Line 3,421: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{rostonFawkesPhotoTool2020, | |bibtex=@article{rostonFawkesPhotoTool2020, | ||
title = {Fawkes photo tool lets anyone secretly 'poison' facial recognition systems}, | title = {Fawkes photo tool lets anyone secretly 'poison' facial recognition systems}, | ||
Line 4,121: | Line 3,431: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{michiganFacialRecognitionSchools2020, | |bibtex=@article{michiganFacialRecognitionSchools2020, | ||
title = {Facial recognition in schools risks making racism worse}, | title = {Facial recognition in schools risks making racism worse}, | ||
Line 4,133: | Line 3,441: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{AngelesSheriffDeputies2020, | |bibtex=@article{AngelesSheriffDeputies2020, | ||
title = {Los Angeles sheriff's deputies to get body-worn cameras}, | title = {Los Angeles sheriff's deputies to get body-worn cameras}, | ||
Line 4,144: | Line 3,450: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{ECREAComputerVision, | |bibtex=@misc{ECREAComputerVision, | ||
title = {ECREA - ComputerVision}, | title = {ECREA - ComputerVision}, | ||
Line 4,152: | Line 3,456: | ||
urldate = {2020-08-16}, | urldate = {2020-08-16}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{delvalleHowVideoChat2020, | |bibtex=@article{delvalleHowVideoChat2020, | ||
title = {How video chat fuels the American deportation machine}, | title = {How video chat fuels the American deportation machine}, | ||
Line 4,164: | Line 3,466: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{morseFacialRecognitionUsed2020, | |bibtex=@article{morseFacialRecognitionUsed2020, | ||
title = {Facial recognition used to arrest protestor at Trump bible photo op}, | title = {Facial recognition used to arrest protestor at Trump bible photo op}, | ||
Line 4,176: | Line 3,476: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{lyonsICEJustSigned2020, | |bibtex=@article{lyonsICEJustSigned2020, | ||
title = {ICE just signed a contract with facial recognition company Clearview AI}, | title = {ICE just signed a contract with facial recognition company Clearview AI}, | ||
Line 4,188: | Line 3,486: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{bonifacicNewYorkCity2020, | |bibtex=@article{bonifacicNewYorkCity2020, | ||
title = {New York City says it will reassess police use of facial recognition}, | title = {New York City says it will reassess police use of facial recognition}, | ||
Line 4,200: | Line 3,496: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{johnsonAmsterdamHelsinkiLaunch2020, | |bibtex=@article{johnsonAmsterdamHelsinkiLaunch2020, | ||
title = {Amsterdam and Helsinki launch algorithm registries to bring transparency to public deployments of AI}, | title = {Amsterdam and Helsinki launch algorithm registries to bring transparency to public deployments of AI}, | ||
Line 4,212: | Line 3,506: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{BelarusProtestersUsea, | |bibtex=@misc{BelarusProtestersUsea, | ||
title = {Belarus Protesters Use AI to 'Unmask' Riot Police Wearing Face Coverings}, | title = {Belarus Protesters Use AI to 'Unmask' Riot Police Wearing Face Coverings}, | ||
Line 4,220: | Line 3,512: | ||
urldate = {2020-09-29}, | urldate = {2020-09-29}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{logicmagazineInformaticsOppressed, | |bibtex=@misc{logicmagazineInformaticsOppressed, | ||
title = {Informatics of the Oppressed}, | title = {Informatics of the Oppressed}, | ||
Line 4,229: | Line 3,519: | ||
author = {Logic Magazine}, | author = {Logic Magazine}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{takaragawaBadHabitusAnthropology2019, | |bibtex=@article{takaragawaBadHabitusAnthropology2019, | ||
title = {Bad Habitus: Anthropology in the Age of the Multimodal}, | title = {Bad Habitus: Anthropology in the Age of the Multimodal}, | ||
Line 4,243: | Line 3,531: | ||
pages = {517--524}, | pages = {517--524}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{dattatreyanIntroductionMultimodalAnthropology2019, | |bibtex=@article{dattatreyanIntroductionMultimodalAnthropology2019, | ||
title = {Introduction: Multimodal Anthropology and the Politics of Invention}, | title = {Introduction: Multimodal Anthropology and the Politics of Invention}, | ||
Line 4,258: | Line 3,544: | ||
pages = {220--228}, | pages = {220--228}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{collinsMultimodalityInvitation2017, | |bibtex=@article{collinsMultimodalityInvitation2017, | ||
title = {Multimodality: An Invitation}, | title = {Multimodality: An Invitation}, | ||
Line 4,272: | Line 3,556: | ||
pages = {142--146}, | pages = {142--146}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{delckerActivistsUrgeEU2020, | |bibtex=@article{delckerActivistsUrgeEU2020, | ||
title = {Activists urge EU to ban live facial recognition in public spaces}, | title = {Activists urge EU to ban live facial recognition in public spaces}, | ||
Line 4,285: | Line 3,567: | ||
keywords = {artificial intelligence, surveillance, privacy, facial recognition, brussels bubble, industry, regulation, technology}, | keywords = {artificial intelligence, surveillance, privacy, facial recognition, brussels bubble, industry, regulation, technology}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{riesLeanStartupHow, | |bibtex=@article{riesLeanStartupHow, | ||
title = {The Lean Startup: How Today’s Entrepreneurs Use Continuous Innovation to Create Radically Successful Businesses}, | title = {The Lean Startup: How Today’s Entrepreneurs Use Continuous Innovation to Create Radically Successful Businesses}, | ||
author = {Ries, Eric}, | author = {Ries, Eric}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{plajasInterfacesRelationalityRace, | |bibtex=@book{plajasInterfacesRelationalityRace, | ||
title = {Interfaces: on the relationality of race, face and, vision. A multimodal intervention.}, | title = {Interfaces: on the relationality of race, face and, vision. A multimodal intervention.}, | ||
Line 4,300: | Line 3,578: | ||
author = {Plájás, Ildikó Z.}, | author = {Plájás, Ildikó Z.}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{simoniteEuropeLimitsGovernment2020, | |bibtex=@article{simoniteEuropeLimitsGovernment2020, | ||
title = {Europe Limits Government by Algorithm. The US, Not So Much}, | title = {Europe Limits Government by Algorithm. The US, Not So Much}, | ||
Line 4,313: | Line 3,589: | ||
keywords = {artificial intelligence, business, web, algorithms, europe, facial recognition}, | keywords = {artificial intelligence, business, web, algorithms, europe, facial recognition}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{FacialRecognitionEU2020a, | |bibtex=@article{FacialRecognitionEU2020a, | ||
title = {Facial recognition: EU considers ban of up to five years}, | title = {Facial recognition: EU considers ban of up to five years}, | ||
Line 4,325: | Line 3,599: | ||
keywords = {technology}, | keywords = {technology}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{siliconcanals10FacialRecognition, | |bibtex=@misc{siliconcanals10FacialRecognition, | ||
title = {10 facial recognition startups from Europe you should know about in 2019 {\textbar} Silicon Canals}, | title = {10 facial recognition startups from Europe you should know about in 2019 {\textbar} Silicon Canals}, | ||
Line 4,335: | Line 3,607: | ||
keywords = {europe, startups}, | keywords = {europe, startups}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{kayaliHowFacialRecognition2019, | |bibtex=@article{kayaliHowFacialRecognition2019, | ||
title = {How facial recognition is taking over a French city}, | title = {How facial recognition is taking over a French city}, | ||
Line 4,348: | Line 3,618: | ||
keywords = {artificial intelligence, surveillance, privacy, regulation, technology, cybersecurity, data, data protection, human rights, law enforcement, nice terror attack, security, terrorism}, | keywords = {artificial intelligence, surveillance, privacy, regulation, technology, cybersecurity, data, data protection, human rights, law enforcement, nice terror attack, security, terrorism}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{europeandigitalrightsManyFacesFacial, | |bibtex=@misc{europeandigitalrightsManyFacesFacial, | ||
title = {The many faces of facial recognition in the EU - European Digital Rights (EDRi)}, | title = {The many faces of facial recognition in the EU - European Digital Rights (EDRi)}, | ||
Line 4,357: | Line 3,625: | ||
author = {European Digital Rights}, | author = {European Digital Rights}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{sheadFacialRecognitionTech2020a, | |bibtex=@article{sheadFacialRecognitionTech2020a, | ||
title = {Facial recognition tech developed by Clearview AI could be illegal in Europe, privacy group says}, | title = {Facial recognition tech developed by Clearview AI could be illegal in Europe, privacy group says}, | ||
Line 4,370: | Line 3,636: | ||
keywords = {privacy, technology, Amazon.com Inc, Application Software, Articles, cnbc, International Business Machines Corp, Microsoft Corp, Politics, source:tagname:CNBC Europe Source}, | keywords = {privacy, technology, Amazon.com Inc, Application Software, Articles, cnbc, International Business Machines Corp, Microsoft Corp, Politics, source:tagname:CNBC Europe Source}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{OverviewComputerVision, | |bibtex=@misc{OverviewComputerVision, | ||
title = {An Overview to Computer Vision That’s Redefining Surveillance {\textbar} Analytics Steps}, | title = {An Overview to Computer Vision That’s Redefining Surveillance {\textbar} Analytics Steps}, | ||
Line 4,378: | Line 3,642: | ||
urldate = {2021-12-02}, | urldate = {2021-12-02}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{cakiciPeoplingEuropeData2020a, | |bibtex=@article{cakiciPeoplingEuropeData2020a, | ||
title = {Peopling Europe through Data Practices: Introduction to the Special Issue}, | title = {Peopling Europe through Data Practices: Introduction to the Special Issue}, | ||
Line 4,393: | Line 3,655: | ||
pages = {199--211}, | pages = {199--211}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{castanedaRobotVisions2014a, | |bibtex=@article{castanedaRobotVisions2014a, | ||
title = {Robot visions}, | title = {Robot visions}, | ||
Line 4,409: | Line 3,669: | ||
pages = {315--341}, | pages = {315--341}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{idcukblogFacialRecognitionEurope2019, | |bibtex=@misc{idcukblogFacialRecognitionEurope2019, | ||
title = {Facial Recognition in Europe: Security Problem? {\textbar} IDC UK Blog}, | title = {Facial Recognition in Europe: Security Problem? {\textbar} IDC UK Blog}, | ||
Line 4,419: | Line 3,677: | ||
year = {2019}, | year = {2019}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{FacialRecognition2021, | |bibtex=@misc{FacialRecognition2021, | ||
title = {Facial Recognition in 2021 (with examples)}, | title = {Facial Recognition in 2021 (with examples)}, | ||
Line 4,427: | Line 3,683: | ||
urldate = {2021-10-02}, | urldate = {2021-10-02}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{mahmoodFourWaysComputer2019, | |bibtex=@article{mahmoodFourWaysComputer2019, | ||
title = {Four Ways Computer Vision Is Transforming Physical Security}, | title = {Four Ways Computer Vision Is Transforming Physical Security}, | ||
Line 4,439: | Line 3,693: | ||
year = {2019}, | year = {2019}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{coopmansFaceValueNew2011a, | |bibtex=@article{coopmansFaceValueNew2011a, | ||
title = {'Face value': new medical imaging software in commercial view}, | title = {'Face value': new medical imaging software in commercial view}, | ||
Line 4,455: | Line 3,707: | ||
pages = {155--176}, | pages = {155--176}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{kale-lostuvaliTwoSociologiesScience2016a, | |bibtex=@article{kale-lostuvaliTwoSociologiesScience2016a, | ||
title = {Two Sociologies of Science in Search of Truth: Bourdieu Versus Latour}, | title = {Two Sociologies of Science in Search of Truth: Bourdieu Versus Latour}, | ||
Line 4,469: | Line 3,719: | ||
pages = {273--296}, | pages = {273--296}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{aradauActsDigitalParasitism2019a, | |bibtex=@article{aradauActsDigitalParasitism2019a, | ||
title = {Acts of digital parasitism: Hacking, humanitarian apps and platformisation}, | title = {Acts of digital parasitism: Hacking, humanitarian apps and platformisation}, | ||
Line 4,483: | Line 3,731: | ||
pages = {2548--2565}, | pages = {2548--2565}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{grommePopulationGeometriesEurope2020a, | |bibtex=@article{grommePopulationGeometriesEurope2020a, | ||
title = {Population Geometries of Europe: The Topologies of Data Cubes and Grids}, | title = {Population Geometries of Europe: The Topologies of Data Cubes and Grids}, | ||
Line 4,498: | Line 3,744: | ||
pages = {235--261}, | pages = {235--261}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{follisVisionTransterritory2017, | |bibtex=@article{follisVisionTransterritory2017, | ||
title = {Vision and Transterritory}, | title = {Vision and Transterritory}, | ||
Line 4,513: | Line 3,757: | ||
pages = {1003--1030}, | pages = {1003--1030}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{garforthVisibilitiesResearchSeeing2012a, | |bibtex=@article{garforthVisibilitiesResearchSeeing2012a, | ||
title = {In/Visibilities of Research: Seeing and Knowing in STS}, | title = {In/Visibilities of Research: Seeing and Knowing in STS}, | ||
Line 4,528: | Line 3,770: | ||
pages = {264--285}, | pages = {264--285}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{isinBirthSensoryPower2020a, | |bibtex=@article{isinBirthSensoryPower2020a, | ||
title = {The birth of sensory power: How a pandemic made it visible?}, | title = {The birth of sensory power: How a pandemic made it visible?}, | ||
Line 4,543: | Line 3,783: | ||
pages = {205395172096920}, | pages = {205395172096920}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{userFreitas2016Alternative, | |bibtex=@article{userFreitas2016Alternative, | ||
title = {de Freitas et al 2016 - Alternative Ontologies of Number}, | title = {de Freitas et al 2016 - Alternative Ontologies of Number}, | ||
author = {User, Adelphi}, | author = {User, Adelphi}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{robergeCulturalLifeMachine2021b, | |bibtex=@book{robergeCulturalLifeMachine2021b, | ||
address = {Cham}, | address = {Cham}, | ||
Line 4,562: | Line 3,798: | ||
doi = {10.1007/978-3-030-56286-1}, | doi = {10.1007/978-3-030-56286-1}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{knutsonSavingFaceUnconstitutionala, | |bibtex=@article{knutsonSavingFaceUnconstitutionala, | ||
title = {Saving Face; The Unconstitutional Use of Facial Recognition on Undocumented Immigrants and Solutions in IP}, | title = {Saving Face; The Unconstitutional Use of Facial Recognition on Undocumented Immigrants and Solutions in IP}, | ||
author = {Knutson, Audrey}, | author = {Knutson, Audrey}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{vertesiSeeingRoverVisualization2012a, | |bibtex=@article{vertesiSeeingRoverVisualization2012a, | ||
title = {Seeing like a Rover: Visualization, embodiment, and interaction on the Mars Exploration Rover Mission}, | title = {Seeing like a Rover: Visualization, embodiment, and interaction on the Mars Exploration Rover Mission}, | ||
Line 4,584: | Line 3,816: | ||
pages = {393--414}, | pages = {393--414}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{mackenziePlatformSeeingImage2019b, | |bibtex=@article{mackenziePlatformSeeingImage2019b, | ||
title = {Platform Seeing: Image Ensembles and Their Invisualities}, | title = {Platform Seeing: Image Ensembles and Their Invisualities}, | ||
Line 4,599: | Line 3,829: | ||
pages = {3--22}, | pages = {3--22}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{RajiFriedFace, | |bibtex=@article{RajiFriedFace, | ||
title = {Raji and Fried - About Face A Survey of Facial Recognition Evaluat}, | title = {Raji and Fried - About Face A Survey of Facial Recognition Evaluat}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{maleveDataSetRuins2020a, | |bibtex=@article{maleveDataSetRuins2020a, | ||
title = {On the data set’s ruins}, | title = {On the data set’s ruins}, | ||
Line 4,617: | Line 3,843: | ||
keywords = {Photography, Computer vision, Data set, Imageability, ImageNet, Le musée imaginaire, Micro-labour, Scale}, | keywords = {Photography, Computer vision, Data set, Imageability, ImageNet, Le musée imaginaire, Micro-labour, Scale}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{marcusDesignUserExperience2020, | |bibtex=@book{marcusDesignUserExperience2020, | ||
address = {Cham, Switzerland}, | address = {Cham, Switzerland}, | ||
Line 4,630: | Line 3,854: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ecarrollLosingOurSenses2018, | |bibtex=@article{ecarrollLosingOurSenses2018, | ||
title = {Losing Our Senses Online: Investigating How Aesthetics Might Be Used to Ground People in Cyberspace}, | title = {Losing Our Senses Online: Investigating How Aesthetics Might Be Used to Ground People in Cyberspace}, | ||
Line 4,644: | Line 3,866: | ||
pages = {29--37}, | pages = {29--37}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{balabanovaS3414582MAThesisImagingandImagingSecurity, | |bibtex=@article{balabanovaS3414582MAThesisImagingandImagingSecurity, | ||
title = {S3414582MAThesisImagingandImagingSecurity}, | title = {S3414582MAThesisImagingandImagingSecurity}, | ||
author = {Balabanova, Hristina}, | author = {Balabanova, Hristina}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{wolff-michaelrothandg.michaelbowenDigitizingLizards, | |bibtex=@article{wolff-michaelrothandg.michaelbowenDigitizingLizards, | ||
title = {Digitizing Lizards}, | title = {Digitizing Lizards}, | ||
author = {Wolff-Michael Roth and G. Michael Bowen}, | author = {Wolff-Michael Roth and G. Michael Bowen}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{MolLaw1994, | |bibtex=@article{MolLaw1994, | ||
title = {Mol and Law - 1994 - Regions, Networks and Fluids Anaemia and Social T}, | title = {Mol and Law - 1994 - Regions, Networks and Fluids Anaemia and Social T}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{axonDataPresentationSecurity2020a, | |bibtex=@article{axonDataPresentationSecurity2020a, | ||
title = {Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice}, | title = {Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice}, | ||
Line 4,677: | Line 3,891: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{kublerStateUrgencySurveillance2017a, | |bibtex=@article{kublerStateUrgencySurveillance2017a, | ||
title = {State of urgency: Surveillance, power, and algorithms in France’s state of emergency}, | title = {State of urgency: Surveillance, power, and algorithms in France’s state of emergency}, | ||
Line 4,692: | Line 3,904: | ||
pages = {205395171773633}, | pages = {205395171773633}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{hepworthMakeMeCare2020, | |bibtex=@incollection{hepworthMakeMeCare2020, | ||
address = {Cham, Switzerland}, | address = {Cham, Switzerland}, | ||
Line 4,708: | Line 3,918: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{amooreCloudEthicsAlgorithms2020, | |bibtex=@book{amooreCloudEthicsAlgorithms2020, | ||
address = {Durham}, | address = {Durham}, | ||
Line 4,722: | Line 3,930: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{strangeCreativeResearchRadical, | |bibtex=@article{strangeCreativeResearchRadical, | ||
title = {Creative research: A radical subjectivity?}, | title = {Creative research: A radical subjectivity?}, | ||
author = {Strange, Shane}, | author = {Strange, Shane}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{wahlbergDocumentaryTime2008, | |bibtex=@book{wahlbergDocumentaryTime2008, | ||
address = {Minneapolis}, | address = {Minneapolis}, | ||
Line 4,742: | Line 3,946: | ||
year = {2008}, | year = {2008}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{wilcoxEmbodyingAlgorithmicWar2017, | |bibtex=@article{wilcoxEmbodyingAlgorithmicWar2017, | ||
title = {Embodying algorithmic war: Gender, race, and the posthuman in drone warfare}, | title = {Embodying algorithmic war: Gender, race, and the posthuman in drone warfare}, | ||
Line 4,756: | Line 3,958: | ||
pages = {11--28}, | pages = {11--28}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@phdthesis{mansouxSandboxCultureStudy2017, | |bibtex=@phdthesis{mansouxSandboxCultureStudy2017, | ||
address = {London}, | address = {London}, | ||
Line 4,767: | Line 3,967: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{blipparWhatComputerVision, | |bibtex=@article{blipparWhatComputerVision, | ||
title = {What is Computer Vision – Post 5: A Very Quick History - Blog - Blippar}, | title = {What is Computer Vision – Post 5: A Very Quick History - Blog - Blippar}, | ||
author = {Blippar}, | author = {Blippar}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{lahireMondePluriel2012, | |bibtex=@book{lahireMondePluriel2012, | ||
address = {Paris}, | address = {Paris}, | ||
Line 4,786: | Line 3,982: | ||
year = {2012}, | year = {2012}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{bynicholasmirzoeffVisualCultureReader, | |bibtex=@article{bynicholasmirzoeffVisualCultureReader, | ||
title = {The visual culture reader}, | title = {The visual culture reader}, | ||
author = {By Nicholas Mirzoeff}, | author = {By Nicholas Mirzoeff}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{millerLAPDEndControversial, | |bibtex=@misc{millerLAPDEndControversial, | ||
title = {LAPD to end controversial program that aimed to predict crime}, | title = {LAPD to end controversial program that aimed to predict crime}, | ||
Line 4,802: | Line 3,994: | ||
author = {Miller, Leila}, | author = {Miller, Leila}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{nathCameraWeaponWays2019, | |bibtex=@article{nathCameraWeaponWays2019, | ||
title = {Camera as weapon: ways of seeing in Kashmir}, | title = {Camera as weapon: ways of seeing in Kashmir}, | ||
Line 4,816: | Line 4,006: | ||
pages = {268--282}, | pages = {268--282}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{boczkowskaMasterNarrativesDIY2019, | |bibtex=@article{boczkowskaMasterNarrativesDIY2019, | ||
title = {From master narratives to DIY stories: on the post-digital sublime and database documentary in two city symphony films}, | title = {From master narratives to DIY stories: on the post-digital sublime and database documentary in two city symphony films}, | ||
Line 4,828: | Line 4,016: | ||
pages = {1--16}, | pages = {1--16}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{chananMelancholyPoliticalDocumentarist2019, | |bibtex=@article{chananMelancholyPoliticalDocumentarist2019, | ||
title = {The melancholy of a political documentarist}, | title = {The melancholy of a political documentarist}, | ||
Line 4,842: | Line 4,028: | ||
pages = {196--213}, | pages = {196--213}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{hamblinSlowCinemaContemplative2019, | |bibtex=@article{hamblinSlowCinemaContemplative2019, | ||
title = {Slow cinema and contemplative politics: radical documentary in the twenty-first century}, | title = {Slow cinema and contemplative politics: radical documentary in the twenty-first century}, | ||
Line 4,856: | Line 4,040: | ||
pages = {214--232}, | pages = {214--232}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{jurichPoeticDocumentaryVisual2019, | |bibtex=@article{jurichPoeticDocumentaryVisual2019, | ||
title = {Poetic documentary as visual ethnography: Liwaa Yazji’s Haunted ( Maskoon ) (2014)}, | title = {Poetic documentary as visual ethnography: Liwaa Yazji’s Haunted ( Maskoon ) (2014)}, | ||
Line 4,868: | Line 4,050: | ||
pages = {1--18}, | pages = {1--18}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{vanstoneThisWouldBe2019, | |bibtex=@article{vanstoneThisWouldBe2019, | ||
title = {‘This would be scary to any other culture … but to us it’s so cute!’ The radicalism of Fourth Cinema from Tangata Whenua to Angry Inuk}, | title = {‘This would be scary to any other culture … but to us it’s so cute!’ The radicalism of Fourth Cinema from Tangata Whenua to Angry Inuk}, | ||
Line 4,882: | Line 4,062: | ||
pages = {233--249}, | pages = {233--249}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{watsonInterviewDaleHudson2019, | |bibtex=@article{watsonInterviewDaleHudson2019, | ||
title = {Interview with Dale Hudson and Patricia R. Zimmermann}, | title = {Interview with Dale Hudson and Patricia R. Zimmermann}, | ||
Line 4,896: | Line 4,074: | ||
pages = {250--267}, | pages = {250--267}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{genaroHarunFarockiOperador2016, | |bibtex=@article{genaroHarunFarockiOperador2016, | ||
title = {Harun Farocki: operador de mídias}, | title = {Harun Farocki: operador de mídias}, | ||
Line 4,910: | Line 4,086: | ||
pages = {115}, | pages = {115}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{nobleSocialChoiceMachine1978, | |bibtex=@article{nobleSocialChoiceMachine1978, | ||
title = {Social Choice in Machine Design: The Case of Automatically Controlled Machine Tools, and a Challenge for Labor}, | title = {Social Choice in Machine Design: The Case of Automatically Controlled Machine Tools, and a Challenge for Labor}, | ||
Line 4,920: | Line 4,094: | ||
year = {1978}, | year = {1978}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{hamblinIntroductionRadicalDocumentary2019, | |bibtex=@article{hamblinIntroductionRadicalDocumentary2019, | ||
title = {Introduction: radical documentary today}, | title = {Introduction: radical documentary today}, | ||
Line 4,934: | Line 4,106: | ||
pages = {187--195}, | pages = {187--195}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{watsonInterviewSharonDaniel2019, | |bibtex=@article{watsonInterviewSharonDaniel2019, | ||
title = {Interview with Sharon Daniel}, | title = {Interview with Sharon Daniel}, | ||
Line 4,948: | Line 4,118: | ||
pages = {283--289}, | pages = {283--289}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{fingasUtahPausesBanjo2020, | |bibtex=@article{fingasUtahPausesBanjo2020, | ||
title = {Utah pauses Banjo's AI surveillance after learning of owner's racist past}, | title = {Utah pauses Banjo's AI surveillance after learning of owner's racist past}, | ||
Line 4,960: | Line 4,128: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{abu-el-haijaYouTube8MLargeScaleVideo27, | |bibtex=@article{abu-el-haijaYouTube8MLargeScaleVideo27, | ||
title = {YouTube-8M: A Large-Scale Video Classification Benchmark}, | title = {YouTube-8M: A Large-Scale Video Classification Benchmark}, | ||
Line 4,969: | Line 4,135: | ||
pages = {10}, | pages = {10}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{broeckmannMachineArtistMyth2019, | |bibtex=@article{broeckmannMachineArtistMyth2019, | ||
title = {The Machine as Artist as Myth}, | title = {The Machine as Artist as Myth}, | ||
Line 4,982: | Line 4,146: | ||
pages = {25}, | pages = {25}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{pantenburgFarockiGodardFilm2015, | |bibtex=@book{pantenburgFarockiGodardFilm2015, | ||
title = {Farocki/Godard: Film as Theory}, | title = {Farocki/Godard: Film as Theory}, | ||
Line 4,993: | Line 4,155: | ||
doi = {10.5117/9789089648914}, | doi = {10.5117/9789089648914}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{kristensenTouchingVirginPolitics2014, | |bibtex=@article{kristensenTouchingVirginPolitics2014, | ||
title = {Touching the Virgin. On the politics of intimacy in Jean-Luc Godard's Hail Mary}, | title = {Touching the Virgin. On the politics of intimacy in Jean-Luc Godard's Hail Mary}, | ||
Line 5,006: | Line 4,166: | ||
pages = {134--139}, | pages = {134--139}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{bechMerleauPontyManylayeredPresence, | |bibtex=@book{bechMerleauPontyManylayeredPresence, | ||
title = {Merleau-Ponty’s many-layered presence in Bourdieu’s thought}, | title = {Merleau-Ponty’s many-layered presence in Bourdieu’s thought}, | ||
Line 5,014: | Line 4,172: | ||
author = {Bech, Josep Maria}, | author = {Bech, Josep Maria}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{braeunertSeeBeingSeen, | |bibtex=@article{braeunertSeeBeingSeen, | ||
title = {To See Without Being Seen: Critical Concepts and Curatorial Approaches Informing the Exhibition on Contemporary Art, Drones, and Surveillance}, | title = {To See Without Being Seen: Critical Concepts and Curatorial Approaches Informing the Exhibition on Contemporary Art, Drones, and Surveillance}, | ||
Line 5,022: | Line 4,178: | ||
author = {Braeunert, Svea and Malone, Meredith}, | author = {Braeunert, Svea and Malone, Meredith}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@phdthesis{schonigCinemaMotionForms2017, | |bibtex=@phdthesis{schonigCinemaMotionForms2017, | ||
address = {Chicago}, | address = {Chicago}, | ||
Line 5,033: | Line 4,187: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{marcoulatosMerleauPontyBourdieuEmbodied2001, | |bibtex=@article{marcoulatosMerleauPontyBourdieuEmbodied2001, | ||
title = {Merleau-Ponty and Bourdieu on Embodied Significance}, | title = {Merleau-Ponty and Bourdieu on Embodied Significance}, | ||
Line 5,045: | Line 4,197: | ||
pages = {1--27}, | pages = {1--27}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{melanconThinkingCorporeallySocially2014, | |bibtex=@article{melanconThinkingCorporeallySocially2014, | ||
title = {Thinking Corporeally, Socially, and Politically: Critical Phenomenology after Merleau-Ponty and Bourdieu}, | title = {Thinking Corporeally, Socially, and Politically: Critical Phenomenology after Merleau-Ponty and Bourdieu}, | ||
Line 5,056: | Line 4,206: | ||
pages = {1--28}, | pages = {1--28}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@phdthesis{jeandreeExperiencingContingencyPolitical2016, | |bibtex=@phdthesis{jeandreeExperiencingContingencyPolitical2016, | ||
address = {London}, | address = {London}, | ||
Line 5,067: | Line 4,215: | ||
year = {2016}, | year = {2016}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{crossleyPhenomenologicalHabitusIts2001, | |bibtex=@article{crossleyPhenomenologicalHabitusIts2001, | ||
title = {The Phenomenological Habitus and Its Construction}, | title = {The Phenomenological Habitus and Its Construction}, | ||
Line 5,079: | Line 4,225: | ||
pages = {81--120}, | pages = {81--120}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{merleau-pontyPrimacyPerception1964, | |bibtex=@book{merleau-pontyPrimacyPerception1964, | ||
address = {Evanston, Ill.}, | address = {Evanston, Ill.}, | ||
Line 5,091: | Line 4,235: | ||
year = {1964}, | year = {1964}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{farockiHarunFarocki2004, | |bibtex=@book{farockiHarunFarocki2004, | ||
address = {Amsterdam}, | address = {Amsterdam}, | ||
Line 5,103: | Line 4,245: | ||
year = {2004}, | year = {2004}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{haylesMaterialityInformatics1993, | |bibtex=@article{haylesMaterialityInformatics1993, | ||
title = {The Materiality of Informatics}, | title = {The Materiality of Informatics}, | ||
Line 5,115: | Line 4,255: | ||
pages = {1--20}, | pages = {1--20}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{rancierePartageSensible2000, | |bibtex=@book{rancierePartageSensible2000, | ||
address = {Paris}, | address = {Paris}, | ||
Line 5,126: | Line 4,264: | ||
year = {2000}, | year = {2000}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{benjaminUnderstandingBrecht1998, | |bibtex=@book{benjaminUnderstandingBrecht1998, | ||
address = {London}, | address = {London}, | ||
Line 5,138: | Line 4,274: | ||
year = {1998}, | year = {1998}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{ranciereIgnorantSchoolmaster1991, | |bibtex=@book{ranciereIgnorantSchoolmaster1991, | ||
address = {Stanford Calif.}, | address = {Stanford Calif.}, | ||
Line 5,150: | Line 4,284: | ||
year = {1991}, | year = {1991}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{benjaminWorkArtAge, | |bibtex=@article{benjaminWorkArtAge, | ||
title = {The Work of Art in the Age of Mechanical Reproduction}, | title = {The Work of Art in the Age of Mechanical Reproduction}, | ||
Line 5,159: | Line 4,291: | ||
pages = {25--33}, | pages = {25--33}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{rascaroliEssayFilmProblems2008, | |bibtex=@article{rascaroliEssayFilmProblems2008, | ||
title = {The Essay Film: Problems, Definitions, Textual Commitments}, | title = {The Essay Film: Problems, Definitions, Textual Commitments}, | ||
Line 5,172: | Line 4,302: | ||
pages = {24--47}, | pages = {24--47}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{rancierePoliticsAestheticsBloomsbury, | |bibtex=@article{rancierePoliticsAestheticsBloomsbury, | ||
title = {The Politics of Aesthetics (Bloomsbury Revelations)}, | title = {The Politics of Aesthetics (Bloomsbury Revelations)}, | ||
author = {Rancière, Jacques}, | author = {Rancière, Jacques}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{arendtLaborWorkAction1987, | |bibtex=@incollection{arendtLaborWorkAction1987, | ||
address = {Boston; Hingham, MA}, | address = {Boston; Hingham, MA}, | ||
Line 5,195: | Line 4,321: | ||
pages = {167--181}, | pages = {167--181}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{derridaArchiveFeverFreudian1995, | |bibtex=@article{derridaArchiveFeverFreudian1995, | ||
title = {Archive Fever: A Freudian Impression}, | title = {Archive Fever: A Freudian Impression}, | ||
Line 5,207: | Line 4,331: | ||
pages = {9--63}, | pages = {9--63}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{mitchellWhatImage1984, | |bibtex=@article{mitchellWhatImage1984, | ||
title = {What Is an Image?}, | title = {What Is an Image?}, | ||
Line 5,219: | Line 4,341: | ||
pages = {503--537}, | pages = {503--537}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{makelaReflectingMakingArtistic2011, | |bibtex=@article{makelaReflectingMakingArtistic2011, | ||
title = {On Reflecting and Making in Artistic Research}, | title = {On Reflecting and Making in Artistic Research}, | ||
Line 5,230: | Line 4,350: | ||
year = {2011}, | year = {2011}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{orileyDiscreteContinuityRelation2011, | |bibtex=@article{orileyDiscreteContinuityRelation2011, | ||
title = {A Discrete Continuity: On the Relation Between Research and Art Practice}, | title = {A Discrete Continuity: On the Relation Between Research and Art Practice}, | ||
Line 5,241: | Line 4,359: | ||
year = {2011}, | year = {2011}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{alfierCriticalPracticalAnalogy2011, | |bibtex=@article{alfierCriticalPracticalAnalogy2011, | ||
title = {Critical Practical Analogy: A Research Tool for Reflecting and Making}, | title = {Critical Practical Analogy: A Research Tool for Reflecting and Making}, | ||
Line 5,252: | Line 4,368: | ||
year = {2011}, | year = {2011}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{lefevre-berthelotAudioVisualDisembodiedVoices2013, | |bibtex=@article{lefevre-berthelotAudioVisualDisembodiedVoices2013, | ||
title = {Audio-Visual: Disembodied Voices in Theory}, | title = {Audio-Visual: Disembodied Voices in Theory}, | ||
Line 5,263: | Line 4,377: | ||
pages = {1--18}, | pages = {1--18}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{tomlinsonMillionYearsMusic2015, | |bibtex=@book{tomlinsonMillionYearsMusic2015, | ||
address = {New York; Cambridge, Massachusetts; London, England}, | address = {New York; Cambridge, Massachusetts; London, England}, | ||
Line 5,275: | Line 4,387: | ||
year = {2015}, | year = {2015}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{ranciereEmancipatedSpectatorMagazine2009, | |bibtex=@book{ranciereEmancipatedSpectatorMagazine2009, | ||
address = {London}, | address = {London}, | ||
Line 5,286: | Line 4,396: | ||
year = {2009}, | year = {2009}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{ranciereEmancipatedSpectator2009, | |bibtex=@book{ranciereEmancipatedSpectator2009, | ||
address = {London}, | address = {London}, | ||
Line 5,297: | Line 4,405: | ||
year = {2009}, | year = {2009}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{reitzWordFilm1988, | |bibtex=@article{reitzWordFilm1988, | ||
title = {Word and Film}, | title = {Word and Film}, | ||
Line 5,310: | Line 4,416: | ||
pages = {83}, | pages = {83}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{bucklandConversationsChristianMetz2017, | |bibtex=@book{bucklandConversationsChristianMetz2017, | ||
address = {Amsterdam}, | address = {Amsterdam}, | ||
Line 5,324: | Line 4,428: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{fosterThinkingMakingUnmaking, | |bibtex=@book{fosterThinkingMakingUnmaking, | ||
title = {Thinking Through Making: Unmaking and Remaking the Everyday}, | title = {Thinking Through Making: Unmaking and Remaking the Everyday}, | ||
Line 5,332: | Line 4,434: | ||
author = {Foster, Andrew}, | author = {Foster, Andrew}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{grasseniSkilledVisions2007, | |bibtex=@book{grasseniSkilledVisions2007, | ||
address = {Oxford}, | address = {Oxford}, | ||
Line 5,345: | Line 4,445: | ||
year = {2007}, | year = {2007}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{jonasNobilitySight1954, | |bibtex=@article{jonasNobilitySight1954, | ||
title = {The Nobility of Sight}, | title = {The Nobility of Sight}, | ||
Line 5,359: | Line 4,457: | ||
pages = {507}, | pages = {507}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{deleuzeThreeQuestionsSix2015, | |bibtex=@article{deleuzeThreeQuestionsSix2015, | ||
title = {Three questions about Six fois deux}, | title = {Three questions about Six fois deux}, | ||
Line 5,371: | Line 4,467: | ||
pages = {12--15}, | pages = {12--15}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{estalellaExperimentalCollaborations2018, | |bibtex=@book{estalellaExperimentalCollaborations2018, | ||
address = {New York}, | address = {New York}, | ||
Line 5,383: | Line 4,477: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{castlemanDigitalImageProcessing1996, | |bibtex=@book{castlemanDigitalImageProcessing1996, | ||
address = {Upper Saddle River (New Jersey)}, | address = {Upper Saddle River (New Jersey)}, | ||
Line 5,394: | Line 4,486: | ||
year = {1996}, | year = {1996}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{bogersCriticalMakers2019, | |bibtex=@book{bogersCriticalMakers2019, | ||
address = {Amsterdam}, | address = {Amsterdam}, | ||
Line 5,405: | Line 4,495: | ||
year = {2019}, | year = {2019}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{halberstamQueerArtFailure2011, | |bibtex=@book{halberstamQueerArtFailure2011, | ||
address = {Durham NC}, | address = {Durham NC}, | ||
Line 5,416: | Line 4,504: | ||
year = {2011}, | year = {2011}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{ingoldMaking2013, | |bibtex=@book{ingoldMaking2013, | ||
address = {London; New York}, | address = {London; New York}, | ||
Line 5,427: | Line 4,513: | ||
year = {2013}, | year = {2013}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{antunesMultisensoryFilmExperience2016, | |bibtex=@book{antunesMultisensoryFilmExperience2016, | ||
address = {Bristol UK}, | address = {Bristol UK}, | ||
Line 5,438: | Line 4,522: | ||
year = {2016}, | year = {2016}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{rugoPhilosophyPatienceFilm2016, | |bibtex=@book{rugoPhilosophyPatienceFilm2016, | ||
address = {London}, | address = {London}, | ||
Line 5,450: | Line 4,532: | ||
doi = {10.1057/978-1-137-58060-3}, | doi = {10.1057/978-1-137-58060-3}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{mcdonaldFilmTheory2016, | |bibtex=@book{mcdonaldFilmTheory2016, | ||
address = {London}, | address = {London}, | ||
Line 5,462: | Line 4,542: | ||
year = {2016}, | year = {2016}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{201201Godard, | |bibtex=@misc{201201Godard, | ||
title = {2012.01: Godard et Bourdieu, 1993-2002 - Pour Jean-Luc Godard}, | title = {2012.01: Godard et Bourdieu, 1993-2002 - Pour Jean-Luc Godard}, | ||
Line 5,470: | Line 4,548: | ||
urldate = {2020-04-23}, | urldate = {2020-04-23}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{grasseniSkilledVisionApprenticeship2004, | |bibtex=@article{grasseniSkilledVisionApprenticeship2004, | ||
title = {Skilled vision. An apprenticeship in breeding aesthetics}, | title = {Skilled vision. An apprenticeship in breeding aesthetics}, | ||
Line 5,484: | Line 4,560: | ||
pages = {41--55}, | pages = {41--55}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{cavellWorldViewed1979, | |bibtex=@book{cavellWorldViewed1979, | ||
address = {Cambridge}, | address = {Cambridge}, | ||
Line 5,496: | Line 4,570: | ||
year = {1979}, | year = {1979}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{rothmanReadingCavellWorld2000, | |bibtex=@book{rothmanReadingCavellWorld2000, | ||
address = {Detroit}, | address = {Detroit}, | ||
Line 5,508: | Line 4,580: | ||
year = {2000}, | year = {2000}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{ederImageOperations2016, | |bibtex=@book{ederImageOperations2016, | ||
address = {Manchester}, | address = {Manchester}, | ||
Line 5,519: | Line 4,589: | ||
year = {2016}, | year = {2016}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{grasseniSkilledVisionApprenticeship2004a, | |bibtex=@article{grasseniSkilledVisionApprenticeship2004a, | ||
title = {Skilled vision. An apprenticeship in breeding aesthetics}, | title = {Skilled vision. An apprenticeship in breeding aesthetics}, | ||
Line 5,533: | Line 4,601: | ||
pages = {41--55}, | pages = {41--55}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ngClearviewAISays2020, | |bibtex=@article{ngClearviewAISays2020, | ||
title = {Clearview AI says the First Amendment lets it scrape the internet. Lawyers disagree}, | title = {Clearview AI says the First Amendment lets it scrape the internet. Lawyers disagree}, | ||
Line 5,545: | Line 4,611: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{hillClearviewFacialRecognition2020, | |bibtex=@article{hillClearviewFacialRecognition2020, | ||
title = {Clearview’s Facial Recognition App Is Identifying Child Victims of Abuse}, | title = {Clearview’s Facial Recognition App Is Identifying Child Victims of Abuse}, | ||
Line 5,558: | Line 4,622: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ngClearviewAIHit2020, | |bibtex=@article{ngClearviewAIHit2020, | ||
title = {Clearview AI hit with cease-and-desist from Google, Facebook over facial recognition collection}, | title = {Clearview AI hit with cease-and-desist from Google, Facebook over facial recognition collection}, | ||
Line 5,570: | Line 4,632: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{steeleRecommendedReadingWhen2020, | |bibtex=@article{steeleRecommendedReadingWhen2020, | ||
title = {Recommended Reading: When facial recognition identifies the wrong person}, | title = {Recommended Reading: When facial recognition identifies the wrong person}, | ||
Line 5,582: | Line 4,642: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{foerBigTechPandemic2020, | |bibtex=@article{foerBigTechPandemic2020, | ||
title = {Big Tech’s Pandemic Power Grab}, | title = {Big Tech’s Pandemic Power Grab}, | ||
Line 5,594: | Line 4,652: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{simoniteAmazonJoinsMicrosoft2019, | |bibtex=@article{simoniteAmazonJoinsMicrosoft2019, | ||
title = {Amazon Joins Microsoft's Call for Rules on Facial Recognition}, | title = {Amazon Joins Microsoft's Call for Rules on Facial Recognition}, | ||
Line 5,606: | Line 4,662: | ||
year = {2019}, | year = {2019}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{haMicrosoftBradSmith2020, | |bibtex=@article{haMicrosoftBradSmith2020, | ||
title = {Microsoft's Brad Smith says company will not sell facial recognition tech to police}, | title = {Microsoft's Brad Smith says company will not sell facial recognition tech to police}, | ||
Line 5,618: | Line 4,672: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{hillSecretiveCompanyThat2020, | |bibtex=@article{hillSecretiveCompanyThat2020, | ||
title = {The Secretive Company That Might End Privacy as We Know It}, | title = {The Secretive Company That Might End Privacy as We Know It}, | ||
Line 5,631: | Line 4,683: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{macClearviewAIOnce2020, | |bibtex=@article{macClearviewAIOnce2020, | ||
title = {Clearview AI Once Told Cops To “Run Wild” With Its Facial Recognition Tool}, | title = {Clearview AI Once Told Cops To “Run Wild” With Its Facial Recognition Tool}, | ||
Line 5,643: | Line 4,693: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{adamsObjectiveAlgorithmsAre2020, | |bibtex=@article{adamsObjectiveAlgorithmsAre2020, | ||
title = {Objective Algorithms Are a Myth - OneZero}, | title = {Objective Algorithms Are a Myth - OneZero}, | ||
Line 5,655: | Line 4,703: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{morsePoliceUseFacialrecognitiona, | |bibtex=@misc{morsePoliceUseFacialrecognitiona, | ||
title = {Police use facial-recognition tech to arrest another innocent man}, | title = {Police use facial-recognition tech to arrest another innocent man}, | ||
Line 5,666: | Line 4,712: | ||
note = {Publication Title: Mashable}, | note = {Publication Title: Mashable}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{OpinionWeNowa, | |bibtex=@article{OpinionWeNowa, | ||
title = {Opinion {\textbar} We now have evidence of facial recognition’s harm. Time for lawmakers to act}, | title = {Opinion {\textbar} We now have evidence of facial recognition’s harm. Time for lawmakers to act}, | ||
Line 5,677: | Line 4,721: | ||
journal = {Washington Post}, | journal = {Washington Post}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{barbaschowBooyaaaAustralianFederal2020, | |bibtex=@misc{barbaschowBooyaaaAustralianFederal2020, | ||
title = {'Booyaaa': Australian Federal Police use of Clearview AI detailed}, | title = {'Booyaaa': Australian Federal Police use of Clearview AI detailed}, | ||
Line 5,686: | Line 4,728: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@phdthesis{caineGranualRealism2019, | |bibtex=@phdthesis{caineGranualRealism2019, | ||
address = {London}, | address = {London}, | ||
Line 5,696: | Line 4,736: | ||
year = {2019}, | year = {2019}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{NYLawmakersVote2020, | |bibtex=@article{NYLawmakersVote2020, | ||
title = {NY lawmakers vote to pause facial recognition in schools - Business Insider}, | title = {NY lawmakers vote to pause facial recognition in schools - Business Insider}, | ||
Line 5,707: | Line 4,745: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{mcbrideHowSonyFueling2020, | |bibtex=@article{mcbrideHowSonyFueling2020, | ||
title = {How Sony Is Fueling The Computer Vision Boom}, | title = {How Sony Is Fueling The Computer Vision Boom}, | ||
Line 5,719: | Line 4,755: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{crainsnewyorkbusinessMacySuedUse2020, | |bibtex=@misc{crainsnewyorkbusinessMacySuedUse2020, | ||
title = {Macy’s sued over use of Clearview facial-recognition software}, | title = {Macy’s sued over use of Clearview facial-recognition software}, | ||
Line 5,729: | Line 4,763: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{perreauBourdieuPhenomenologieTheorie, | |bibtex=@article{perreauBourdieuPhenomenologieTheorie, | ||
title = {Bourdieu et la phénoménologie. Théorie du sujet social (French Edition)}, | title = {Bourdieu et la phénoménologie. Théorie du sujet social (French Edition)}, | ||
author = {Perreau, Laurent}, | author = {Perreau, Laurent}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{josepmariabechDRAFTMerleauPontysmanylayeredpresenceinBourdieusthoughtNOV2017, | |bibtex=@article{josepmariabechDRAFTMerleauPontysmanylayeredpresenceinBourdieusthoughtNOV2017, | ||
title = {DRAFTMerleau-Pontysmany-layeredpresenceinBourdieusthoughtNOV2017}, | title = {DRAFTMerleau-Pontysmany-layeredpresenceinBourdieusthoughtNOV2017}, | ||
author = {JOSEP MARIA BECH}, | author = {JOSEP MARIA BECH}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{eisensteinNotesFilmCapital1976, | |bibtex=@article{eisensteinNotesFilmCapital1976, | ||
title = {Notes for a Film of "Capital"}, | title = {Notes for a Film of "Capital"}, | ||
Line 5,756: | Line 4,784: | ||
pages = {3}, | pages = {3}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{vandijckCultureConnectivity2013, | |bibtex=@book{vandijckCultureConnectivity2013, | ||
address = {Oxford; New York}, | address = {Oxford; New York}, | ||
Line 5,767: | Line 4,793: | ||
year = {2013}, | year = {2013}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{sinnerbrinkNewPhilosophiesFilm2011, | |bibtex=@book{sinnerbrinkNewPhilosophiesFilm2011, | ||
address = {London}, | address = {London}, | ||
Line 5,779: | Line 4,803: | ||
year = {2011}, | year = {2011}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{alterEssaysEssayFilm2017, | |bibtex=@book{alterEssaysEssayFilm2017, | ||
address = {New York}, | address = {New York}, | ||
Line 5,793: | Line 4,815: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{godardIntroductionTrueHistory2014, | |bibtex=@book{godardIntroductionTrueHistory2014, | ||
address = {Montreal}, | address = {Montreal}, | ||
Line 5,806: | Line 4,826: | ||
year = {2014}, | year = {2014}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{srnicekTechnologyCapitalism, | |bibtex=@article{srnicekTechnologyCapitalism, | ||
title = {Technology after Capitalism}, | title = {Technology after Capitalism}, | ||
author = {Srnicek, Nick}, | author = {Srnicek, Nick}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{kernbauerEstablishingBeliefHarun2010, | |bibtex=@article{kernbauerEstablishingBeliefHarun2010, | ||
title = {Establishing Belief: Harun Farocki and Andrei Ujica, Videograms of a Revolution}, | title = {Establishing Belief: Harun Farocki and Andrei Ujica, Videograms of a Revolution}, | ||
Line 5,826: | Line 4,842: | ||
pages = {72--87}, | pages = {72--87}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{zuboffAgeSurveillanceCapitalism2019, | |bibtex=@book{zuboffAgeSurveillanceCapitalism2019, | ||
address = {New York, NY}, | address = {New York, NY}, | ||
Line 5,837: | Line 4,851: | ||
year = {2019}, | year = {2019}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{vandijckPlatformSociety2018, | |bibtex=@book{vandijckPlatformSociety2018, | ||
address = {New York}, | address = {New York}, | ||
Line 5,848: | Line 4,860: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{nickcouldryandulisesa.mejiasCostsConnection, | |bibtex=@article{nickcouldryandulisesa.mejiasCostsConnection, | ||
title = {The Costs of Connection}, | title = {The Costs of Connection}, | ||
author = {Nick Couldry and Ulises A. Mejias}, | author = {Nick Couldry and Ulises A. Mejias}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{barbaschowACLUSuesClearview2020, | |bibtex=@article{barbaschowACLUSuesClearview2020, | ||
title = {ACLU sues Clearview AI claiming the company's tech crosses ethical bounds}, | title = {ACLU sues Clearview AI claiming the company's tech crosses ethical bounds}, | ||
Line 5,867: | Line 4,875: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{holtPoliticalRadicalizationInternet2015, | |bibtex=@article{holtPoliticalRadicalizationInternet2015, | ||
title = {Political radicalization on the Internet: Extremist content, government control, and the power of victim and jihad videos}, | title = {Political radicalization on the Internet: Extremist content, government control, and the power of victim and jihad videos}, | ||
Line 5,881: | Line 4,887: | ||
pages = {107--120}, | pages = {107--120}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{riedyRadicalizationVectorExploring2018, | |bibtex=@article{riedyRadicalizationVectorExploring2018, | ||
title = {Radicalization as a Vector: Exploring Non-Violent and Benevolent Processes of Radicalization.}, | title = {Radicalization as a Vector: Exploring Non-Violent and Benevolent Processes of Radicalization.}, | ||
Line 5,891: | Line 4,895: | ||
pages = {249--293}, | pages = {249--293}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{MicrosoftWordMarina, | |bibtex=@article{MicrosoftWordMarina, | ||
title = {Microsoft Word - Marina\_Shalabi\_Capstone.docx}, | title = {Microsoft Word - Marina\_Shalabi\_Capstone.docx}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{jacobReconnaissanceFacialeImpose2017, | |bibtex=@article{jacobReconnaissanceFacialeImpose2017, | ||
title = {La reconnaissance faciale s’impose peu à peu dans la course à la sécurité}, | title = {La reconnaissance faciale s’impose peu à peu dans la course à la sécurité}, | ||
Line 5,907: | Line 4,907: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{leeInformalCountermessagingPotential2018, | |bibtex=@article{leeInformalCountermessagingPotential2018, | ||
title = {Informal Countermessaging: The Potential and Perils of Informal Online Countermessaging}, | title = {Informal Countermessaging: The Potential and Perils of Informal Online Countermessaging}, | ||
Line 5,919: | Line 4,917: | ||
pages = {1--17}, | pages = {1--17}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{kRRNo201809Germany, | |bibtex=@article{kRRNo201809Germany, | ||
title = {RR\_No2018-09\_Germany\%27s\_NetzDG}, | title = {RR\_No2018-09\_Germany\%27s\_NetzDG}, | ||
author = {K, Olivia}, | author = {K, Olivia}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{accentureconsultingCCTVNotWe2017, | |bibtex=@book{accentureconsultingCCTVNotWe2017, | ||
title = {CCTV But Not as We Know It {\textbar} Accenture}, | title = {CCTV But Not as We Know It {\textbar} Accenture}, | ||
Line 5,934: | Line 4,928: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{SouriezVousSerez2017, | |bibtex=@article{SouriezVousSerez2017, | ||
title = {Souriez, vous serez filmés en traversant la frontière}, | title = {Souriez, vous serez filmés en traversant la frontière}, | ||
Line 5,943: | Line 4,935: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{bazenetCitoyensCamerasIntelligentes2017, | |bibtex=@article{bazenetCitoyensCamerasIntelligentes2017, | ||
title = {Des citoyens et des caméras « intelligentes » bientôt au service de la sécurité urbaine}, | title = {Des citoyens et des caméras « intelligentes » bientôt au service de la sécurité urbaine}, | ||
Line 5,953: | Line 4,943: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{derveauxCamerasIntelligentesVont2018, | |bibtex=@article{derveauxCamerasIntelligentesVont2018, | ||
title = {Les caméras intelligentes vont repérer les actes suspects}, | title = {Les caméras intelligentes vont repérer les actes suspects}, | ||
Line 5,963: | Line 4,951: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{lesmeAnyvisionStartupIsraelienne2018, | |bibtex=@article{lesmeAnyvisionStartupIsraelienne2018, | ||
title = {Anyvision, la start-up israélienne de reconnaissance visuelle qui veut s’imposer en leader}, | title = {Anyvision, la start-up israélienne de reconnaissance visuelle qui veut s’imposer en leader}, | ||
Line 5,974: | Line 4,960: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ladepecheToulousePouvoirCameras, | |bibtex=@article{ladepecheToulousePouvoirCameras, | ||
title = {Toulouse : le pouvoir des caméras de vidéosurveillance}, | title = {Toulouse : le pouvoir des caméras de vidéosurveillance}, | ||
author = {La Dépêche}, | author = {La Dépêche}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{nizetCamerasIntelligentesAux2017, | |bibtex=@article{nizetCamerasIntelligentesAux2017, | ||
title = {Les caméras intelligentes aux frontières : opérationnelles cet été}, | title = {Les caméras intelligentes aux frontières : opérationnelles cet été}, | ||
Line 5,991: | Line 4,973: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{h.90CamerasVont2018, | |bibtex=@article{h.90CamerasVont2018, | ||
title = {90 caméras vont quadriller le Brabant wallon d’ici 4 ans}, | title = {90 caméras vont quadriller le Brabant wallon d’ici 4 ans}, | ||
Line 6,001: | Line 4,981: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{jonesFactiva2019011912145, | |bibtex=@article{jonesFactiva2019011912145, | ||
title = {Factiva-20190119-1214-5}, | title = {Factiva-20190119-1214-5}, | ||
author = {Jones, Dow}, | author = {Jones, Dow}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{pinguelyCamerasIntelligentesInvestissent2018, | |bibtex=@article{pinguelyCamerasIntelligentesInvestissent2018, | ||
title = {Les caméras intelligentes investissent le monde de la surveillance vidéo}, | title = {Les caméras intelligentes investissent le monde de la surveillance vidéo}, | ||
Line 6,018: | Line 4,994: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ouest-franceMarseilleVegasCameras2017, | |bibtex=@article{ouest-franceMarseilleVegasCameras2017, | ||
title = {Marseille, Las Vegas… Les caméras intelligentes peuventelles prévenir les attaques ?}, | title = {Marseille, Las Vegas… Les caméras intelligentes peuventelles prévenir les attaques ?}, | ||
Line 6,028: | Line 5,002: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{jonesFactiva201901191214, | |bibtex=@article{jonesFactiva201901191214, | ||
title = {Factiva-20190119-1214}, | title = {Factiva-20190119-1214}, | ||
author = {Jones, Dow}, | author = {Jones, Dow}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{emeryMarchePorteurMais2019, | |bibtex=@article{emeryMarchePorteurMais2019, | ||
title = {Un marché porteur mais inquiétant}, | title = {Un marché porteur mais inquiétant}, | ||
Line 6,044: | Line 5,014: | ||
year = {2019}, | year = {2019}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{jacobCamerasIntelligentesApres2017, | |bibtex=@article{jacobCamerasIntelligentesApres2017, | ||
title = {Des caméras intelligentes après le drame de Magnanville}, | title = {Des caméras intelligentes après le drame de Magnanville}, | ||
Line 6,054: | Line 5,022: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{pinteNosVillesDeviennent2017, | |bibtex=@article{pinteNosVillesDeviennent2017, | ||
title = {Nos villes deviennent intelligentes mais cela les rend aussi de plus en plus vulnérables aux attaques}, | title = {Nos villes deviennent intelligentes mais cela les rend aussi de plus en plus vulnérables aux attaques}, | ||
Line 6,064: | Line 5,030: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{stutzerCCTVTerrorism21March2010, | |bibtex=@article{stutzerCCTVTerrorism21March2010, | ||
title = {CCTV\&Terrorism\_21March2010}, | title = {CCTV\&Terrorism\_21March2010}, | ||
author = {Stutzer, Alois}, | author = {Stutzer, Alois}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{jonesFactiva201901191217, | |bibtex=@article{jonesFactiva201901191217, | ||
title = {Factiva-20190119-1217}, | title = {Factiva-20190119-1217}, | ||
author = {Jones, Dow}, | author = {Jones, Dow}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{espinozaStateTerrorismOrientalism2018, | |bibtex=@article{espinozaStateTerrorismOrientalism2018, | ||
title = {State terrorism: orientalism and the drone programme}, | title = {State terrorism: orientalism and the drone programme}, | ||
Line 6,092: | Line 5,052: | ||
pages = {376--393}, | pages = {376--393}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{rigoustePoliceFuturSurveillance2018, | |bibtex=@article{rigoustePoliceFuturSurveillance2018, | ||
title = {La police du futur. De la surveillance généralisée à l'autocontrôle}, | title = {La police du futur. De la surveillance généralisée à l'autocontrôle}, | ||
Line 6,103: | Line 5,061: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{jonesFactiva2019011912201, | |bibtex=@article{jonesFactiva2019011912201, | ||
title = {Factiva-20190119-1220-1}, | title = {Factiva-20190119-1220-1}, | ||
author = {Jones, Dow}, | author = {Jones, Dow}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{alexMicrosoftWordMedia, | |bibtex=@article{alexMicrosoftWordMedia, | ||
title = {Microsoft Word - Media Matter\_final.docx}, | title = {Microsoft Word - Media Matter\_final.docx}, | ||
author = {Alex}, | author = {Alex}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{blundenAIFaceScanners, | |bibtex=@article{blundenAIFaceScanners, | ||
title = {AI face scanners will let fans go ticket-free at a London stadium}, | title = {AI face scanners will let fans go ticket-free at a London stadium}, | ||
author = {Blunden, Mark}, | author = {Blunden, Mark}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{aradauSecurityThatMatters2010, | |bibtex=@article{aradauSecurityThatMatters2010, | ||
title = {Security That Matters: Critical Infrastructure and Objects of Protection}, | title = {Security That Matters: Critical Infrastructure and Objects of Protection}, | ||
Line 6,138: | Line 5,088: | ||
pages = {491--514}, | pages = {491--514}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{aradauBigDatasecurityAssemblage2015, | |bibtex=@article{aradauBigDatasecurityAssemblage2015, | ||
title = {The (Big) Data-security assemblage: Knowledge and critique}, | title = {The (Big) Data-security assemblage: Knowledge and critique}, | ||
Line 6,152: | Line 5,100: | ||
pages = {205395171560906}, | pages = {205395171560906}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{fosterVisionVisuality2009, | |bibtex=@book{fosterVisionVisuality2009, | ||
address = {Seattle}, | address = {Seattle}, | ||
Line 6,167: | Line 5,113: | ||
year = {2009}, | year = {2009}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{jayScopicRegimesModernity2009, | |bibtex=@incollection{jayScopicRegimesModernity2009, | ||
address = {Seattle}, | address = {Seattle}, | ||
Line 6,184: | Line 5,128: | ||
pages = {3--23}, | pages = {3--23}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{knoblauchVideographyAnalysingVideo2012, | |bibtex=@article{knoblauchVideographyAnalysingVideo2012, | ||
title = {Videography: analysing video data as a ‘focused’ ethnographic and hermeneutical exercise}, | title = {Videography: analysing video data as a ‘focused’ ethnographic and hermeneutical exercise}, | ||
Line 6,198: | Line 5,140: | ||
pages = {334--356}, | pages = {334--356}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{basuComputerVision1993, | |bibtex=@book{basuComputerVision1993, | ||
title = {Computer vision}, | title = {Computer vision}, | ||
Line 6,209: | Line 5,149: | ||
year = {1993}, | year = {1993}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{kaufmannPoliticsDigital2017, | |bibtex=@article{kaufmannPoliticsDigital2017, | ||
title = {Politics and ‘the digital’}, | title = {Politics and ‘the digital’}, | ||
Line 6,223: | Line 5,161: | ||
pages = {309--328}, | pages = {309--328}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{blanchetteMaterialHistoryBits2011, | |bibtex=@article{blanchetteMaterialHistoryBits2011, | ||
title = {A material history of bits}, | title = {A material history of bits}, | ||
Line 6,237: | Line 5,173: | ||
pages = {1042--1057}, | pages = {1042--1057}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{lahireQuoiSertSociologie2006, | |bibtex=@book{lahireQuoiSertSociologie2006, | ||
address = {Paris}, | address = {Paris}, | ||
Line 6,252: | Line 5,186: | ||
year = {2006}, | year = {2006}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{phelippeauSociologieDecision2009, | |bibtex=@incollection{phelippeauSociologieDecision2009, | ||
address = {Paris}, | address = {Paris}, | ||
Line 6,266: | Line 5,198: | ||
pages = {42--47}, | pages = {42--47}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{ladocumentationfrancaiseSciencePolitique2009, | |bibtex=@book{ladocumentationfrancaiseSciencePolitique2009, | ||
address = {Paris}, | address = {Paris}, | ||
Line 6,277: | Line 5,207: | ||
year = {2009}, | year = {2009}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{stritzelSecurityTranslation2011, | |bibtex=@article{stritzelSecurityTranslation2011, | ||
title = {Security, the translation}, | title = {Security, the translation}, | ||
Line 6,291: | Line 5,219: | ||
pages = {343--355}, | pages = {343--355}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{taylorPlayCamera2016, | |bibtex=@article{taylorPlayCamera2016, | ||
title = {Play to the camera}, | title = {Play to the camera}, | ||
Line 6,305: | Line 5,231: | ||
pages = {115--130}, | pages = {115--130}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{lascoumesSociologieActionPublique2012, | |bibtex=@book{lascoumesSociologieActionPublique2012, | ||
address = {Paris}, | address = {Paris}, | ||
Line 6,318: | Line 5,242: | ||
year = {2012}, | year = {2012}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{tannerPoliceWorkNew2015, | |bibtex=@article{tannerPoliceWorkNew2015, | ||
title = {Police work and new ‘security devices’: A tale from the beat}, | title = {Police work and new ‘security devices’: A tale from the beat}, | ||
Line 6,332: | Line 5,254: | ||
pages = {384--400}, | pages = {384--400}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{amicelleNewPoliticalAnatomy2011, | |bibtex=@article{amicelleNewPoliticalAnatomy2011, | ||
title = {Towards a ‘new’ political anatomy of financial surveillance}, | title = {Towards a ‘new’ political anatomy of financial surveillance}, | ||
Line 6,346: | Line 5,266: | ||
pages = {161--178}, | pages = {161--178}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{favarel-garriguesReluctantPartners2011, | |bibtex=@article{favarel-garriguesReluctantPartners2011, | ||
title = {Reluctant partners?}, | title = {Reluctant partners?}, | ||
Line 6,360: | Line 5,278: | ||
pages = {179--196}, | pages = {179--196}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{orlikowski10SociomaterialityChallenging2008, | |bibtex=@article{orlikowski10SociomaterialityChallenging2008, | ||
title = {10 Sociomateriality: Challenging the Separation of Technology, Work and Organization}, | title = {10 Sociomateriality: Challenging the Separation of Technology, Work and Organization}, | ||
Line 6,374: | Line 5,290: | ||
pages = {433--474}, | pages = {433--474}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{zavrsnikDronesUnmannedAerial2016, | |bibtex=@book{zavrsnikDronesUnmannedAerial2016, | ||
address = {Cham}, | address = {Cham}, | ||
Line 6,386: | Line 5,300: | ||
doi = {10.1007/978-3-319-23760-2}, | doi = {10.1007/978-3-319-23760-2}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{lascoumesGouvernerParInstruments2004, | |bibtex=@book{lascoumesGouvernerParInstruments2004, | ||
address = {Paris}, | address = {Paris}, | ||
Line 6,398: | Line 5,310: | ||
year = {2004}, | year = {2004}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{orlikowskiDigitalWorkResearch2016, | |bibtex=@incollection{orlikowskiDigitalWorkResearch2016, | ||
address = {Northampton, MA}, | address = {Northampton, MA}, | ||
Line 6,411: | Line 5,321: | ||
pages = {88--96}, | pages = {88--96}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{fayardAffordancesPractice2014, | |bibtex=@article{fayardAffordancesPractice2014, | ||
title = {Affordances for practice}, | title = {Affordances for practice}, | ||
Line 6,425: | Line 5,333: | ||
pages = {236--249}, | pages = {236--249}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{andrejevicTheorizingDronesDroning2016, | |bibtex=@incollection{andrejevicTheorizingDronesDroning2016, | ||
address = {Cham}, | address = {Cham}, | ||
Line 6,438: | Line 5,344: | ||
year = {2016}, | year = {2016}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{leonardiWhenFlexibleRoutines2011, | |bibtex=@article{leonardiWhenFlexibleRoutines2011, | ||
title = {When Flexible Routines Meet Flexible Technologies: Affordance, Constraint, and the Imbrication of Human and Material Agencies}, | title = {When Flexible Routines Meet Flexible Technologies: Affordance, Constraint, and the Imbrication of Human and Material Agencies}, | ||
Line 6,451: | Line 5,355: | ||
pages = {147}, | pages = {147}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{andersenChromatologySecurityIntroducing2015, | |bibtex=@article{andersenChromatologySecurityIntroducing2015, | ||
title = {Chromatology of security: Introducing colours to visual security studies}, | title = {Chromatology of security: Introducing colours to visual security studies}, | ||
Line 6,465: | Line 5,367: | ||
pages = {440--457}, | pages = {440--457}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{waltersDroneStrikesDingpolitik2014a, | |bibtex=@article{waltersDroneStrikesDingpolitik2014a, | ||
title = {Drone strikes, dingpolitik and beyond: Furthering the debate on materiality and security}, | title = {Drone strikes, dingpolitik and beyond: Furthering the debate on materiality and security}, | ||
Line 6,479: | Line 5,379: | ||
pages = {101--118}, | pages = {101--118}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{heath-kellyAffectingTerrorismLaughter2017, | |bibtex=@article{heath-kellyAffectingTerrorismLaughter2017, | ||
title = {Affecting Terrorism: Laughter, Lamentation, and Detestation as Drives to Terrorism Knowledge}, | title = {Affecting Terrorism: Laughter, Lamentation, and Detestation as Drives to Terrorism Knowledge}, | ||
Line 6,492: | Line 5,390: | ||
pages = {239--256}, | pages = {239--256}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{madsenBigDataIssues2016, | |bibtex=@article{madsenBigDataIssues2016, | ||
title = {Big Data: Issues for an International Political Sociology of Data Practices: Table 1}, | title = {Big Data: Issues for an International Political Sociology of Data Practices: Table 1}, | ||
Line 6,506: | Line 5,402: | ||
pages = {275--296}, | pages = {275--296}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{fisherSituatingBorderControl2018, | |bibtex=@article{fisherSituatingBorderControl2018, | ||
title = {Situating Border Control: Unpacking Spain's SIVE border surveillance assemblage}, | title = {Situating Border Control: Unpacking Spain's SIVE border surveillance assemblage}, | ||
Line 6,519: | Line 5,413: | ||
pages = {67--76}, | pages = {67--76}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{martinIdentifyingPotentialTerrorists2018, | |bibtex=@article{martinIdentifyingPotentialTerrorists2018, | ||
title = {Identifying potential terrorists: Visuality, security and the Channel project}, | title = {Identifying potential terrorists: Visuality, security and the Channel project}, | ||
Line 6,533: | Line 5,425: | ||
pages = {254--271}, | pages = {254--271}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{dijstelbloemSurveillanceSeaTransactional2017, | |bibtex=@article{dijstelbloemSurveillanceSeaTransactional2017, | ||
title = {Surveillance at sea: The transactional politics of border control in the Aegean}, | title = {Surveillance at sea: The transactional politics of border control in the Aegean}, | ||
Line 6,548: | Line 5,438: | ||
pages = {224--240}, | pages = {224--240}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{follisVisionTransterritory2017a, | |bibtex=@article{follisVisionTransterritory2017a, | ||
title = {Vision and Transterritory}, | title = {Vision and Transterritory}, | ||
Line 6,562: | Line 5,450: | ||
pages = {1003--1030}, | pages = {1003--1030}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{tazzioliSpyTrackArchive2018, | |bibtex=@article{tazzioliSpyTrackArchive2018, | ||
title = {Spy, track and archive: The temporality of visibility in Eurosur and Jora}, | title = {Spy, track and archive: The temporality of visibility in Eurosur and Jora}, | ||
Line 6,576: | Line 5,462: | ||
pages = {272--288}, | pages = {272--288}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{qaurooniEnhancedWarriorDrone2017, | |bibtex=@article{qaurooniEnhancedWarriorDrone2017, | ||
title = {The “enhanced” warrior: drone warfare and the problematics of separation}, | title = {The “enhanced” warrior: drone warfare and the problematics of separation}, | ||
Line 6,590: | Line 5,474: | ||
pages = {53--73}, | pages = {53--73}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{elseyViolenceWorkEthnomethodological2018, | |bibtex=@article{elseyViolenceWorkEthnomethodological2018, | ||
title = {Violence as work: Ethnomethodological insights into military combat operations}, | title = {Violence as work: Ethnomethodological insights into military combat operations}, | ||
Line 6,604: | Line 5,486: | ||
pages = {316--328}, | pages = {316--328}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{taylorMovieHasGo2017, | |bibtex=@article{taylorMovieHasGo2017, | ||
title = {‘The movie has to go forward’: surveying the media–security relationship}, | title = {‘The movie has to go forward’: surveying the media–security relationship}, | ||
Line 6,618: | Line 5,498: | ||
pages = {46--69}, | pages = {46--69}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{gregoryEyesSkyBodies2018, | |bibtex=@article{gregoryEyesSkyBodies2018, | ||
title = {Eyes in the sky – bodies on the ground}, | title = {Eyes in the sky – bodies on the ground}, | ||
Line 6,632: | Line 5,510: | ||
pages = {347--358}, | pages = {347--358}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{suchmanSituationalAwareness2015, | |bibtex=@article{suchmanSituationalAwareness2015, | ||
title = {Situational Awareness}, | title = {Situational Awareness}, | ||
Line 6,643: | Line 5,519: | ||
year = {2015}, | year = {2015}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{bousquetLethalVisionsEye2017, | |bibtex=@article{bousquetLethalVisionsEye2017, | ||
title = {Lethal visions: the eye as function of the weapon}, | title = {Lethal visions: the eye as function of the weapon}, | ||
Line 6,657: | Line 5,531: | ||
pages = {62--80}, | pages = {62--80}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{lisleHolidaysDangerZone2016, | |bibtex=@book{lisleHolidaysDangerZone2016, | ||
address = {Minneapolis}, | address = {Minneapolis}, | ||
Line 6,669: | Line 5,541: | ||
year = {2016}, | year = {2016}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{crossmFisher2018, | |bibtex=@article{crossmFisher2018, | ||
title = {Fisher2018}, | title = {Fisher2018}, | ||
author = {Crossm}, | author = {Crossm}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{chamayouDroneTheory2015, | |bibtex=@book{chamayouDroneTheory2015, | ||
address = {London}, | address = {London}, | ||
Line 6,688: | Line 5,556: | ||
year = {2015}, | year = {2015}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{mirzoeffHowSeeWorld2016, | |bibtex=@book{mirzoeffHowSeeWorld2016, | ||
address = {New York}, | address = {New York}, | ||
Line 6,699: | Line 5,565: | ||
year = {2016}, | year = {2016}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@phdthesis{musikComputerAbiltySee2014, | |bibtex=@phdthesis{musikComputerAbiltySee2014, | ||
address = {Vienna}, | address = {Vienna}, | ||
Line 6,709: | Line 5,573: | ||
year = {2014}, | year = {2014}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{adeyFacingAirportSecurity2009, | |bibtex=@article{adeyFacingAirportSecurity2009, | ||
title = {Facing Airport Security: Affect, Biopolitics, and the Preemptive Securitisation of the Mobile Body}, | title = {Facing Airport Security: Affect, Biopolitics, and the Preemptive Securitisation of the Mobile Body}, | ||
Line 6,721: | Line 5,583: | ||
pages = {274--295}, | pages = {274--295}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{bleikerVisualGlobalPolitics2018, | |bibtex=@book{bleikerVisualGlobalPolitics2018, | ||
address = {London}, | address = {London}, | ||
Line 6,734: | Line 5,594: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{musikThinkingEyeOnly2011, | |bibtex=@article{musikThinkingEyeOnly2011, | ||
title = {The thinking eye is only half the story: High-level semantic video surveillance}, | title = {The thinking eye is only half the story: High-level semantic video surveillance}, | ||
Line 6,746: | Line 5,604: | ||
pages = {339--353}, | pages = {339--353}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{egbertDevicesLieDetection2016, | |bibtex=@article{egbertDevicesLieDetection2016, | ||
title = {Devices of Lie Detection as Diegetic Technologies in the “War on Terror”}, | title = {Devices of Lie Detection as Diegetic Technologies in the “War on Terror”}, | ||
Line 6,756: | Line 5,612: | ||
year = {2016}, | year = {2016}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{tazzioliSightMigrationGovernmentality2016, | |bibtex=@article{tazzioliSightMigrationGovernmentality2016, | ||
title = {The Sight of Migration: Governmentality, Visibility and Europe’s Contested Borders}, | title = {The Sight of Migration: Governmentality, Visibility and Europe’s Contested Borders}, | ||
Line 6,770: | Line 5,624: | ||
pages = {445--464}, | pages = {445--464}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{thriftFutureGeography2002, | |bibtex=@article{thriftFutureGeography2002, | ||
title = {The future of geography}, | title = {The future of geography}, | ||
Line 6,784: | Line 5,636: | ||
pages = {291--298}, | pages = {291--298}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{birtchnellAutomatingBlackArt2018, | |bibtex=@article{birtchnellAutomatingBlackArt2018, | ||
title = {Automating the black art: Creative places for artificial intelligence in audio mastering}, | title = {Automating the black art: Creative places for artificial intelligence in audio mastering}, | ||
Line 6,797: | Line 5,647: | ||
pages = {77--86}, | pages = {77--86}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{lallyCrowdsourcedSurveillanceNetworked2017, | |bibtex=@article{lallyCrowdsourcedSurveillanceNetworked2017, | ||
title = {Crowdsourced surveillance and networked data}, | title = {Crowdsourced surveillance and networked data}, | ||
Line 6,811: | Line 5,659: | ||
pages = {63--77}, | pages = {63--77}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{mollicchiFlatnessDepthStudy2017, | |bibtex=@article{mollicchiFlatnessDepthStudy2017, | ||
title = {Flatness versus depth: A study of algorithmically generated camouflage}, | title = {Flatness versus depth: A study of algorithmically generated camouflage}, | ||
Line 6,825: | Line 5,671: | ||
pages = {78--94}, | pages = {78--94}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{adamsFutureVideoAnalytics2015, | |bibtex=@article{adamsFutureVideoAnalytics2015, | ||
title = {The future of video analytics for surveillance and its ethical implications}, | title = {The future of video analytics for surveillance and its ethical implications}, | ||
Line 6,839: | Line 5,683: | ||
pages = {272--289}, | pages = {272--289}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{pizaCCTVToolEarly2017, | |bibtex=@article{pizaCCTVToolEarly2017, | ||
title = {CCTV as a tool for early police intervention: Preliminary lessons from nine case studies}, | title = {CCTV as a tool for early police intervention: Preliminary lessons from nine case studies}, | ||
Line 6,853: | Line 5,695: | ||
pages = {247--265}, | pages = {247--265}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{hendricksGroundingVisualExplanations, | |bibtex=@article{hendricksGroundingVisualExplanations, | ||
title = {Grounding Visual Explanations}, | title = {Grounding Visual Explanations}, | ||
Line 6,863: | Line 5,703: | ||
author = {Hendricks, Lisa Anne and Hu, Ronghang and Darrell, Trevor and Akata, Zeynep}, | author = {Hendricks, Lisa Anne and Hu, Ronghang and Darrell, Trevor and Akata, Zeynep}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{friedersdorfSpeechThatFacebook, | |bibtex=@article{friedersdorfSpeechThatFacebook, | ||
title = {The Speech That Facebook Plans to Punish}, | title = {The Speech That Facebook Plans to Punish}, | ||
author = {Friedersdorf, Conor}, | author = {Friedersdorf, Conor}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{pizaEffectsMergingProactive2015, | |bibtex=@article{pizaEffectsMergingProactive2015, | ||
title = {The effects of merging proactive CCTV monitoring with directed police patrol: a randomized controlled trial}, | title = {The effects of merging proactive CCTV monitoring with directed police patrol: a randomized controlled trial}, | ||
Line 6,884: | Line 5,720: | ||
pages = {43--69}, | pages = {43--69}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{greenSurveillanceEthnographyResearching2015, | |bibtex=@article{greenSurveillanceEthnographyResearching2015, | ||
title = {Surveillance and Ethnography: Researching Surveillance as Everyday Life}, | title = {Surveillance and Ethnography: Researching Surveillance as Everyday Life}, | ||
Line 6,897: | Line 5,731: | ||
pages = {27--43}, | pages = {27--43}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{parkMultimodalExplanationsJustifying2018, | |bibtex=@article{parkMultimodalExplanationsJustifying2018, | ||
title = {Multimodal Explanations: Justifying Decisions and Pointing to the Evidence}, | title = {Multimodal Explanations: Justifying Decisions and Pointing to the Evidence}, | ||
Line 6,908: | Line 5,740: | ||
pages = {11}, | pages = {11}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{liBigDataSmart2015, | |bibtex=@article{liBigDataSmart2015, | ||
title = {Big data in smart cities}, | title = {Big data in smart cities}, | ||
Line 6,922: | Line 5,752: | ||
pages = {1--12}, | pages = {1--12}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{mollicchiFlatnessDepthStudy2017a, | |bibtex=@article{mollicchiFlatnessDepthStudy2017a, | ||
title = {Flatness versus depth: A study of algorithmically generated camouflage}, | title = {Flatness versus depth: A study of algorithmically generated camouflage}, | ||
Line 6,936: | Line 5,764: | ||
pages = {78--94}, | pages = {78--94}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{birtchnellAutomatingBlackArt2018a, | |bibtex=@article{birtchnellAutomatingBlackArt2018a, | ||
title = {Automating the black art: Creative places for artificial intelligence in audio mastering}, | title = {Automating the black art: Creative places for artificial intelligence in audio mastering}, | ||
Line 6,949: | Line 5,775: | ||
pages = {77--86}, | pages = {77--86}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{lallyCrowdsourcedSurveillanceNetworked2017a, | |bibtex=@article{lallyCrowdsourcedSurveillanceNetworked2017a, | ||
title = {Crowdsourced surveillance and networked data}, | title = {Crowdsourced surveillance and networked data}, | ||
Line 6,963: | Line 5,787: | ||
pages = {63--77}, | pages = {63--77}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{forsythComputerVision2012, | |bibtex=@book{forsythComputerVision2012, | ||
address = {Boston}, | address = {Boston}, | ||
Line 6,975: | Line 5,797: | ||
year = {2012}, | year = {2012}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{anannyEthicsAlgorithms2016, | |bibtex=@article{anannyEthicsAlgorithms2016, | ||
title = {Toward an Ethics of Algorithms}, | title = {Toward an Ethics of Algorithms}, | ||
Line 6,989: | Line 5,809: | ||
pages = {93--117}, | pages = {93--117}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{pizaCCTVToolEarly2016, | |bibtex=@article{pizaCCTVToolEarly2016, | ||
title = {CCTV as a Tool for Early Police Intervention: Preliminary Lessons from Nine Case Studies.}, | title = {CCTV as a Tool for Early Police Intervention: Preliminary Lessons from Nine Case Studies.}, | ||
Line 7,001: | Line 5,819: | ||
pages = {247--265}, | pages = {247--265}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{woodMicrosoftWordEthnography, | |bibtex=@article{woodMicrosoftWordEthnography, | ||
title = {Microsoft Word - ethnography.docx}, | title = {Microsoft Word - ethnography.docx}, | ||
author = {Wood, David M.}, | author = {Wood, David M.}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{nieddererMappingMeaningKnowledge, | |bibtex=@book{nieddererMappingMeaningKnowledge, | ||
title = {Mapping the meaning of knowledge in design research}, | title = {Mapping the meaning of knowledge in design research}, | ||
Line 7,016: | Line 5,830: | ||
author = {Niedderer, Kristina}, | author = {Niedderer, Kristina}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{anannySeeingKnowingLimitations2018, | |bibtex=@article{anannySeeingKnowingLimitations2018, | ||
title = {Seeing without knowing: Limitations of the transparency ideal and its application to algorithmic accountability}, | title = {Seeing without knowing: Limitations of the transparency ideal and its application to algorithmic accountability}, | ||
Line 7,030: | Line 5,842: | ||
pages = {973--989}, | pages = {973--989}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{pizaEffectsMergingProactive2015a, | |bibtex=@article{pizaEffectsMergingProactive2015a, | ||
title = {The effects of merging proactive CCTV monitoring with directed police patrol: a randomized controlled trial}, | title = {The effects of merging proactive CCTV monitoring with directed police patrol: a randomized controlled trial}, | ||
Line 7,044: | Line 5,854: | ||
pages = {43--69}, | pages = {43--69}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ndfjwScreensDoc, | |bibtex=@article{ndfjwScreensDoc, | ||
title = {screens.doc}, | title = {screens.doc}, | ||
author = {ndfjw}, | author = {ndfjw}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{clementResearchingEmotionsInternational2018, | |bibtex=@book{clementResearchingEmotionsInternational2018, | ||
address = {New York}, | address = {New York}, | ||
Line 7,063: | Line 5,869: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{leeVideoEssayEssay2017, | |bibtex=@article{leeVideoEssayEssay2017, | ||
title = {Video essay: The essay film – some thoughts of discontent}, | title = {Video essay: The essay film – some thoughts of discontent}, | ||
Line 7,072: | Line 5,876: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{lewisTimothyAschEthnographic2004, | |bibtex=@book{lewisTimothyAschEthnographic2004, | ||
title = {Timothy Asch and Ethnographic Film}, | title = {Timothy Asch and Ethnographic Film}, | ||
Line 7,080: | Line 5,882: | ||
year = {2004}, | year = {2004}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{billnicholsWhatReallyHappened2004, | |bibtex=@incollection{billnicholsWhatReallyHappened2004, | ||
title = {What Really Happened. A reassessment of The Ax Fight}, | title = {What Really Happened. A reassessment of The Ax Fight}, | ||
Line 7,090: | Line 5,890: | ||
year = {2004}, | year = {2004}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{bartlettLiteratureReviewSocial2015, | |bibtex=@article{bartlettLiteratureReviewSocial2015, | ||
title = {A literature review of social media intelligence capabilities for counterterrorism}, | title = {A literature review of social media intelligence capabilities for counterterrorism}, | ||
Line 7,100: | Line 5,898: | ||
pages = {98}, | pages = {98}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{tsesisTerroristSpeechSocial2017, | |bibtex=@article{tsesisTerroristSpeechSocial2017, | ||
title = {Terrorist Speech on Social Media}, | title = {Terrorist Speech on Social Media}, | ||
Line 7,110: | Line 5,906: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{vuoriVisualSecurityStudies2018, | |bibtex=@book{vuoriVisualSecurityStudies2018, | ||
title = {Visual Security Studies: Sights and Spectacles of Insecurity and War}, | title = {Visual Security Studies: Sights and Spectacles of Insecurity and War}, | ||
Line 7,118: | Line 5,912: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{belliPlatformRegulationsHow2017, | |bibtex=@article{belliPlatformRegulationsHow2017, | ||
title = {Platform Regulations How Platforms are Regulated and How They Regulate Us}, | title = {Platform Regulations How Platforms are Regulated and How They Regulate Us}, | ||
Line 7,128: | Line 5,920: | ||
pages = {250}, | pages = {250}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{klausenTweetingJihadSocial2015, | |bibtex=@article{klausenTweetingJihadSocial2015, | ||
title = {Tweeting the Jihad : Social Media Networks of Western Foreign Fighters in Syria and Iraq}, | title = {Tweeting the Jihad : Social Media Networks of Western Foreign Fighters in Syria and Iraq}, | ||
Line 7,142: | Line 5,932: | ||
pages = {1--22}, | pages = {1--22}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{alibrahimMediaServiceISIS2018, | |bibtex=@article{alibrahimMediaServiceISIS2018, | ||
title = {The Media in the Service of ISIS Propaganda War}, | title = {The Media in the Service of ISIS Propaganda War}, | ||
Line 7,154: | Line 5,942: | ||
pages = {13--21}, | pages = {13--21}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{conwayDisruptingDaeshMeasuring2018, | |bibtex=@article{conwayDisruptingDaeshMeasuring2018, | ||
title = {Disrupting Daesh: Measuring Takedown of Online Terrorist Material and Its Impacts}, | title = {Disrupting Daesh: Measuring Takedown of Online Terrorist Material and Its Impacts}, | ||
Line 7,166: | Line 5,952: | ||
pages = {1--20}, | pages = {1--20}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{bebeBebeOlivias1429256MIRDThesis2015, | |bibtex=@article{bebeBebeOlivias1429256MIRDThesis2015, | ||
title = {Bebe-Olivia-s1429256-MIRD Thesis-2015}, | title = {Bebe-Olivia-s1429256-MIRD Thesis-2015}, | ||
author = {Bebe, N. B.}, | author = {Bebe, N. B.}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ltcgbjfsc/jawsA622701, | |bibtex=@article{ltcgbjfsc/jawsA622701, | ||
title = {a622701}, | title = {a622701}, | ||
author = {Ltc Gb Jfsc/Jaws}, | author = {Ltc Gb Jfsc/Jaws}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{schmittCountermessagesPreventionPromotion2018, | |bibtex=@article{schmittCountermessagesPreventionPromotion2018, | ||
title = {Counter-messages as Prevention or Promotion of Extremism?! The Potential Role of YouTube}, | title = {Counter-messages as Prevention or Promotion of Extremism?! The Potential Role of YouTube}, | ||
Line 7,194: | Line 5,974: | ||
pages = {780--808}, | pages = {780--808}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{radfordSocialMediaRevolution2017, | |bibtex=@article{radfordSocialMediaRevolution2017, | ||
title = {The Social Media Revolution}, | title = {The Social Media Revolution}, | ||
Line 7,202: | Line 5,980: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{saltmanWhitePaperRole2014, | |bibtex=@article{saltmanWhitePaperRole2014, | ||
title = {White Paper – The Role of Prevent in Countering Online Extremism}, | title = {White Paper – The Role of Prevent in Countering Online Extremism}, | ||
Line 7,210: | Line 5,986: | ||
year = {2014}, | year = {2014}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{cohenDigitalCounterinsurgency2015, | |bibtex=@article{cohenDigitalCounterinsurgency2015, | ||
title = {Digital Counterinsurgency}, | title = {Digital Counterinsurgency}, | ||
Line 7,219: | Line 5,993: | ||
year = {2015}, | year = {2015}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{fidlerCounteringIslamicState2015, | |bibtex=@article{fidlerCounteringIslamicState2015, | ||
title = {Countering Islamic State Exploitation of the Internet}, | title = {Countering Islamic State Exploitation of the Internet}, | ||
Line 7,227: | Line 5,999: | ||
year = {2015}, | year = {2015}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{amooreSecuringAlgorithmsKnowledge2017, | |bibtex=@article{amooreSecuringAlgorithmsKnowledge2017, | ||
title = {Securing with algorithms: Knowledge, decision, sovereignty}, | title = {Securing with algorithms: Knowledge, decision, sovereignty}, | ||
Line 7,240: | Line 6,010: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{hellerOneHellKilling2013, | |bibtex=@article{hellerOneHellKilling2013, | ||
title = {'One Hell of a Killing Machine': Signature Strikes and International Law}, | title = {'One Hell of a Killing Machine': Signature Strikes and International Law}, | ||
Line 7,254: | Line 6,022: | ||
pages = {89--119}, | pages = {89--119}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{haylesRFIDHumanAgency2009, | |bibtex=@article{haylesRFIDHumanAgency2009, | ||
title = {RFID: Human Agency and Meaning in Information-Intensive Environments}, | title = {RFID: Human Agency and Meaning in Information-Intensive Environments}, | ||
Line 7,268: | Line 6,034: | ||
pages = {47--72}, | pages = {47--72}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{haylesUnfinishedWork2006, | |bibtex=@article{haylesUnfinishedWork2006, | ||
title = {Unfinished Work}, | title = {Unfinished Work}, | ||
Line 7,282: | Line 6,046: | ||
pages = {159--166}, | pages = {159--166}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{haylesWritingMachines, | |bibtex=@article{haylesWritingMachines, | ||
title = {Writing Machines}, | title = {Writing Machines}, | ||
author = {Hayles, N. Katherine}, | author = {Hayles, N. Katherine}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{LevManovichSoftware, | |bibtex=@article{LevManovichSoftware, | ||
title = {Lev Manovich - Software culture-Edizioni Olivares}, | title = {Lev Manovich - Software culture-Edizioni Olivares}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{manovichLanguageNewMedia, | |bibtex=@article{manovichLanguageNewMedia, | ||
title = {The Language of New Media (Leonardo)}, | title = {The Language of New Media (Leonardo)}, | ||
author = {Manovich, Lev}, | author = {Manovich, Lev}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{haylesUnthought2017, | |bibtex=@book{haylesUnthought2017, | ||
address = {Chicago; London}, | address = {Chicago; London}, | ||
Line 7,313: | Line 6,069: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{haylesComputingHuman2005, | |bibtex=@article{haylesComputingHuman2005, | ||
title = {Computing the Human}, | title = {Computing the Human}, | ||
Line 7,327: | Line 6,081: | ||
pages = {131--151}, | pages = {131--151}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{haylesMyMotherWas2005, | |bibtex=@book{haylesMyMotherWas2005, | ||
address = {Chicago}, | address = {Chicago}, | ||
Line 7,338: | Line 6,090: | ||
year = {2005}, | year = {2005}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{haylesHowWeBecame1999, | |bibtex=@book{haylesHowWeBecame1999, | ||
title = {How We Became Posthuman}, | title = {How We Became Posthuman}, | ||
Line 7,349: | Line 6,099: | ||
doi = {10.7208/chicago/9780226321394.001.0001}, | doi = {10.7208/chicago/9780226321394.001.0001}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{manovichSoftwareTakesCommand2013, | |bibtex=@book{manovichSoftwareTakesCommand2013, | ||
address = {New York; London}, | address = {New York; London}, | ||
Line 7,361: | Line 6,109: | ||
year = {2013}, | year = {2013}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{spencerVisualResearchMethods, | |bibtex=@article{spencerVisualResearchMethods, | ||
title = {Visual Research Methods in the Social Sciences: Awakening Visions}, | title = {Visual Research Methods in the Social Sciences: Awakening Visions}, | ||
author = {Spencer, Stephen}, | author = {Spencer, Stephen}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{leeInformalCountermessagingPotential2018a, | |bibtex=@article{leeInformalCountermessagingPotential2018a, | ||
title = {Informal Countermessaging: The Potential and Perils of Informal Online Countermessaging}, | title = {Informal Countermessaging: The Potential and Perils of Informal Online Countermessaging}, | ||
Line 7,380: | Line 6,124: | ||
pages = {1--17}, | pages = {1--17}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@inproceedings{swansonDataHidingVideoinvideo1997, | |bibtex=@inproceedings{swansonDataHidingVideoinvideo1997, | ||
address = {Santa Barbara, CA, USA}, | address = {Santa Barbara, CA, USA}, | ||
Line 7,393: | Line 6,135: | ||
pages = {676--679}, | pages = {676--679}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@inproceedings{InternationalConferenceImage1997, | |bibtex=@inproceedings{InternationalConferenceImage1997, | ||
address = {Santa Barbara, CA, USA}, | address = {Santa Barbara, CA, USA}, | ||
Line 7,403: | Line 6,143: | ||
year = {1997}, | year = {1997}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@phdthesis{tanAlgorithmicallySupportedModeration2017, | |bibtex=@phdthesis{tanAlgorithmicallySupportedModeration2017, | ||
title = {Algorithmically Supported Moderation in Children’s Online Communities}, | title = {Algorithmically Supported Moderation in Children’s Online Communities}, | ||
Line 7,411: | Line 6,149: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{klonickNewGovernorsPeople2017, | |bibtex=@article{klonickNewGovernorsPeople2017, | ||
title = {The new governors: the people, rules, and processes governing online speech}, | title = {The new governors: the people, rules, and processes governing online speech}, | ||
Line 7,421: | Line 6,157: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{hjorthRoutledgeCompanionDigital2017, | |bibtex=@book{hjorthRoutledgeCompanionDigital2017, | ||
address = {New York}, | address = {New York}, | ||
Line 7,433: | Line 6,167: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{beaulieuVECTORSFIELDWORKComputational2017, | |bibtex=@incollection{beaulieuVECTORSFIELDWORKComputational2017, | ||
address = {New York}, | address = {New York}, | ||
Line 7,446: | Line 6,178: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{bleikerMethodsMethodologiesStudy2018, | |bibtex=@incollection{bleikerMethodsMethodologiesStudy2018, | ||
address = {New York}, | address = {New York}, | ||
Line 7,460: | Line 6,190: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{reinkedebuitragoGraspingRoleEmotions2018, | |bibtex=@incollection{reinkedebuitragoGraspingRoleEmotions2018, | ||
address = {New York}, | address = {New York}, | ||
Line 7,476: | Line 6,204: | ||
pages = {303--324}, | pages = {303--324}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{dylanwrayCompaniesCleaningDeepest2018, | |bibtex=@article{dylanwrayCompaniesCleaningDeepest2018, | ||
title = {The Companies Cleaning the Deepest, Darkest Parts of Social Media}, | title = {The Companies Cleaning the Deepest, Darkest Parts of Social Media}, | ||
Line 7,485: | Line 6,211: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{laatUseSoftwareTools2015, | |bibtex=@article{laatUseSoftwareTools2015, | ||
title = {The use of software tools and autonomous bots against vandalism: eroding Wikipedia’s moral order?}, | title = {The use of software tools and autonomous bots against vandalism: eroding Wikipedia’s moral order?}, | ||
Line 7,499: | Line 6,223: | ||
pages = {175--188}, | pages = {175--188}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{robertsDigitalRefuseCanadian2016, | |bibtex=@article{robertsDigitalRefuseCanadian2016, | ||
title = {Digital Refuse: Canadian Garbage, Commercial Content Moderation and the Global Circulation of Social Media’s Waste}, | title = {Digital Refuse: Canadian Garbage, Commercial Content Moderation and the Global Circulation of Social Media’s Waste}, | ||
Line 7,510: | Line 6,232: | ||
year = {2016}, | year = {2016}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{gollatzTurnArtificialIntelligence2018, | |bibtex=@book{gollatzTurnArtificialIntelligence2018, | ||
title = {The Turn to Artificial Intelligence in Governing Communication Online}, | title = {The Turn to Artificial Intelligence in Governing Communication Online}, | ||
Line 7,519: | Line 6,239: | ||
doi = {10.31235/osf.io/vwpcz}, | doi = {10.31235/osf.io/vwpcz}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{atanasoskiSurrogateHumanityPosthuman2015, | |bibtex=@article{atanasoskiSurrogateHumanityPosthuman2015, | ||
title = {Surrogate Humanity: Posthuman Networks and the (Racialized) Obsolescence of Labor}, | title = {Surrogate Humanity: Posthuman Networks and the (Racialized) Obsolescence of Labor}, | ||
Line 7,533: | Line 6,251: | ||
pages = {1--40}, | pages = {1--40}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{robertsScreenHiddenDigital2014, | |bibtex=@article{robertsScreenHiddenDigital2014, | ||
title = {Behind The Screen: The Hidden Digital Labor Of Commercial Content Moderation}, | title = {Behind The Screen: The Hidden Digital Labor Of Commercial Content Moderation}, | ||
Line 7,541: | Line 6,257: | ||
year = {2014}, | year = {2014}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{saintlaurentDefenceMachineLearning2018, | |bibtex=@article{saintlaurentDefenceMachineLearning2018, | ||
title = {In Defence of Machine Learning: Debunking the Myths of Artificial Intelligence}, | title = {In Defence of Machine Learning: Debunking the Myths of Artificial Intelligence}, | ||
Line 7,556: | Line 6,270: | ||
pages = {734--747}, | pages = {734--747}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{wakenshawMoneylabReader2018, | |bibtex=@book{wakenshawMoneylabReader2018, | ||
address = {Amsterdam}, | address = {Amsterdam}, | ||
Line 7,571: | Line 6,283: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{gillespieGovernancePlatforms2017, | |bibtex=@incollection{gillespieGovernancePlatforms2017, | ||
title = {Governance of and by platforms}, | title = {Governance of and by platforms}, | ||
Line 7,580: | Line 6,290: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{knupferWordsLeftUnspoken2016, | |bibtex=@article{knupferWordsLeftUnspoken2016, | ||
title = {Words Left Unspoken: The External Forces Shaping Online Discourse}, | title = {Words Left Unspoken: The External Forces Shaping Online Discourse}, | ||
Line 7,588: | Line 6,296: | ||
year = {2016}, | year = {2016}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{robertsDigitalDetritusError2018, | |bibtex=@article{robertsDigitalDetritusError2018, | ||
title = {Digital detritus: 'Error' and the logic of opacity in social media content moderation}, | title = {Digital detritus: 'Error' and the logic of opacity in social media content moderation}, | ||
Line 7,599: | Line 6,305: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{crossetInternetPropagandeJihadiste2018, | |bibtex=@article{crossetInternetPropagandeJihadiste2018, | ||
title = {Internet et propagande jihadiste : la régulation polycentrique du cyberespace}, | title = {Internet et propagande jihadiste : la régulation polycentrique du cyberespace}, | ||
Line 7,613: | Line 6,317: | ||
pages = {107}, | pages = {107}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{pinkDoingVisualEthnography2013, | |bibtex=@book{pinkDoingVisualEthnography2013, | ||
address = {Los Angeles}, | address = {Los Angeles}, | ||
Line 7,625: | Line 6,327: | ||
year = {2013}, | year = {2013}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{FIRSTWORLDWAR, | |bibtex=@article{FIRSTWORLDWAR, | ||
title = {FROM\_THE\_FIRST\_WORLD\_WAR\_TO\_THE\_PRESENT}, | title = {FROM\_THE\_FIRST\_WORLD\_WAR\_TO\_THE\_PRESENT}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{robertsCommercialContentModeration, | |bibtex=@article{robertsCommercialContentModeration, | ||
title = {Commercial Content Moderation: Digital Laborers' Dirty Work}, | title = {Commercial Content Moderation: Digital Laborers' Dirty Work}, | ||
author = {Roberts, Sarah T.}, | author = {Roberts, Sarah T.}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{crossetResearchingFarRight2018, | |bibtex=@article{crossetResearchingFarRight2018, | ||
title = {Researching far right groups on Twitter: Methodological challenges 2.0}, | title = {Researching far right groups on Twitter: Methodological challenges 2.0}, | ||
Line 7,652: | Line 6,348: | ||
pages = {146144481881730}, | pages = {146144481881730}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{roseRelationVisualResearch2014, | |bibtex=@article{roseRelationVisualResearch2014, | ||
title = {On the Relation between ‘Visual Research Methods’ and Contemporary Visual Culture}, | title = {On the Relation between ‘Visual Research Methods’ and Contemporary Visual Culture}, | ||
Line 7,666: | Line 6,360: | ||
pages = {24--46}, | pages = {24--46}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{roseVisualityMateriality2012, | |bibtex=@book{roseVisualityMateriality2012, | ||
address = {Farnham Surrey England; Burlington VT}, | address = {Farnham Surrey England; Burlington VT}, | ||
Line 7,677: | Line 6,369: | ||
year = {2012}, | year = {2012}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{roseVisualityMaterialityIntroducing2012, | |bibtex=@incollection{roseVisualityMaterialityIntroducing2012, | ||
address = {Farnham Surrey England; Burlington VT}, | address = {Farnham Surrey England; Burlington VT}, | ||
Line 7,690: | Line 6,380: | ||
year = {2012}, | year = {2012}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{pinkDigitalEthnography2016, | |bibtex=@book{pinkDigitalEthnography2016, | ||
address = {Los Angeles}, | address = {Los Angeles}, | ||
Line 7,701: | Line 6,389: | ||
year = {2016}, | year = {2016}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{christensenEyeTalentTalent2009, | |bibtex=@article{christensenEyeTalentTalent2009, | ||
title = {“An Eye for Talent”: Talent Identification and the “Practical Sense” of Top-Level Soccer Coaches}, | title = {“An Eye for Talent”: Talent Identification and the “Practical Sense” of Top-Level Soccer Coaches}, | ||
Line 7,715: | Line 6,401: | ||
pages = {365--382}, | pages = {365--382}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{orlikowskiMaterialWorksExploring2005, | |bibtex=@article{orlikowskiMaterialWorksExploring2005, | ||
title = {Material Works: Exploring the Situated Entanglement of Technological Performativity and Human Agency}, | title = {Material Works: Exploring the Situated Entanglement of Technological Performativity and Human Agency}, | ||
Line 7,726: | Line 6,410: | ||
pages = {183--186}, | pages = {183--186}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{orlikowskiUsingTechnologyConstituting2000, | |bibtex=@article{orlikowskiUsingTechnologyConstituting2000, | ||
title = {Using Technology and Constituting Structures: A Practice Lens for Studying Technologyin Organizations}, | title = {Using Technology and Constituting Structures: A Practice Lens for Studying Technologyin Organizations}, | ||
Line 7,738: | Line 6,420: | ||
pages = {404--428}, | pages = {404--428}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{jeandesbozSecurityTechnologies2010, | |bibtex=@incollection{jeandesbozSecurityTechnologies2010, | ||
address = {Oxon and New York}, | address = {Oxon and New York}, | ||
Line 7,752: | Line 6,432: | ||
pages = {229--239}, | pages = {229--239}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ingramThreeTraitsIslamic2014, | |bibtex=@article{ingramThreeTraitsIslamic2014, | ||
title = {Three Traits of the Islamic State’s Information Warfare}, | title = {Three Traits of the Islamic State’s Information Warfare}, | ||
Line 7,766: | Line 6,444: | ||
pages = {4--11}, | pages = {4--11}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{mooreCryptopolitikDarknet2016, | |bibtex=@article{mooreCryptopolitikDarknet2016, | ||
title = {Cryptopolitik and the Darknet}, | title = {Cryptopolitik and the Darknet}, | ||
Line 7,780: | Line 6,456: | ||
pages = {7--38}, | pages = {7--38}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ingramAnalysisInspireDabiq2017, | |bibtex=@article{ingramAnalysisInspireDabiq2017, | ||
title = {An Analysis of Inspire and Dabiq : Lessons from AQAP and Islamic State's Propaganda War}, | title = {An Analysis of Inspire and Dabiq : Lessons from AQAP and Islamic State's Propaganda War}, | ||
Line 7,794: | Line 6,468: | ||
pages = {357--375}, | pages = {357--375}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{orlikowskiGenreRepertoireStructuring1994a, | |bibtex=@article{orlikowskiGenreRepertoireStructuring1994a, | ||
title = {Genre Repertoire: The Structuring of Communicative Practices in Organizations}, | title = {Genre Repertoire: The Structuring of Communicative Practices in Organizations}, | ||
Line 7,806: | Line 6,478: | ||
pages = {541--574}, | pages = {541--574}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{celsoIslamicStateBoko2015, | |bibtex=@article{celsoIslamicStateBoko2015, | ||
title = {The Islamic State and Boko Haram: Fifth Wave Jihadist Terror Groups}, | title = {The Islamic State and Boko Haram: Fifth Wave Jihadist Terror Groups}, | ||
Line 7,820: | Line 6,490: | ||
pages = {249--268}, | pages = {249--268}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ingramAnalysisIslamicState2016, | |bibtex=@article{ingramAnalysisIslamicState2016, | ||
title = {An analysis of Islamic State’s Dabiq magazine}, | title = {An analysis of Islamic State’s Dabiq magazine}, | ||
Line 7,834: | Line 6,502: | ||
pages = {458--477}, | pages = {458--477}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{macnairMyBrothersWest2017, | |bibtex=@article{macnairMyBrothersWest2017, | ||
title = {“To My Brothers in the West . . .”: A Thematic Analysis of Videos Produced by the Islamic State’s al-Hayat Media Center}, | title = {“To My Brothers in the West . . .”: A Thematic Analysis of Videos Produced by the Islamic State’s al-Hayat Media Center}, | ||
Line 7,848: | Line 6,514: | ||
pages = {234--253}, | pages = {234--253}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{leanderDigitalCommercialVisibility2017, | |bibtex=@article{leanderDigitalCommercialVisibility2017, | ||
title = {Digital/commercial (in)visibility}, | title = {Digital/commercial (in)visibility}, | ||
Line 7,862: | Line 6,526: | ||
pages = {348--372}, | pages = {348--372}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{houckUnderstandingWhatMakes2017, | |bibtex=@article{houckUnderstandingWhatMakes2017, | ||
title = {Understanding what makes terrorist groups’ propaganda effective: an integrative complexity analysis of ISIL and Al Qaeda}, | title = {Understanding what makes terrorist groups’ propaganda effective: an integrative complexity analysis of ISIL and Al Qaeda}, | ||
Line 7,875: | Line 6,537: | ||
pages = {105--118}, | pages = {105--118}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{hamitiWarUSISIS2016, | |bibtex=@article{hamitiWarUSISIS2016, | ||
title = {The War of US against ISIS in Psychological Warfare and Internet as the New Frontline}, | title = {The War of US against ISIS in Psychological Warfare and Internet as the New Frontline}, | ||
Line 7,889: | Line 6,549: | ||
pages = {129}, | pages = {129}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{raoulSSRNid2851763, | |bibtex=@article{raoulSSRNid2851763, | ||
title = {SSRN-id2851763}, | title = {SSRN-id2851763}, | ||
author = {Raoul, Radu}, | author = {Raoul, Radu}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ISPropagandaWebEnglish, | |bibtex=@article{ISPropagandaWebEnglish, | ||
title = {IS-Propaganda\_Web\_English\_v2}, | title = {IS-Propaganda\_Web\_English\_v2}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{lasselleLightYearsAhead2016, | |bibtex=@article{lasselleLightYearsAhead2016, | ||
title = {Light Years Ahead: Differences and similarities between Al-Qaeda and Islamic State s Approach to the Global Jihad}, | title = {Light Years Ahead: Differences and similarities between Al-Qaeda and Islamic State s Approach to the Global Jihad}, | ||
Line 7,916: | Line 6,570: | ||
pages = {1}, | pages = {1}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{mccabeIslamicStateCaliphate2017, | |bibtex=@article{mccabeIslamicStateCaliphate2017, | ||
title = {The Islamic State after the Caliphate - Can IS Go Underground?}, | title = {The Islamic State after the Caliphate - Can IS Go Underground?}, | ||
Line 7,927: | Line 6,579: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{lakomyCracksOnlineCaliphate2017, | |bibtex=@article{lakomyCracksOnlineCaliphate2017, | ||
title = {Cracks in the Online “Caliphate”: How the Islamic State is Losing Ground in the Battle for Cyberspace}, | title = {Cracks in the Online “Caliphate”: How the Islamic State is Losing Ground in the Battle for Cyberspace}, | ||
Line 7,938: | Line 6,588: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{al-dayelWordsEnemyIslamic2018, | |bibtex=@article{al-dayelWordsEnemyIslamic2018, | ||
title = {“In the Words of the Enemy”: the Islamic State’s reflexive projection of statehood}, | title = {“In the Words of the Enemy”: the Islamic State’s reflexive projection of statehood}, | ||
Line 7,952: | Line 6,600: | ||
pages = {45--64}, | pages = {45--64}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{IslamicStateU2019s, | |bibtex=@article{IslamicStateU2019s, | ||
title = {The Islamic State\%u2019s Use of Social Media Terrorism\%u2019s Siren Song in the Digital Age Adam Hoffman}, | title = {The Islamic State\%u2019s Use of Social Media Terrorism\%u2019s Siren Song in the Digital Age Adam Hoffman}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ISILMediaMilton2, | |bibtex=@article{ISILMediaMilton2, | ||
title = {ISIL Media\_Milton-2.pdf}, | title = {ISIL Media\_Milton-2.pdf}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{winterDocumentingVirtualCaliphate, | |bibtex=@article{winterDocumentingVirtualCaliphate, | ||
title = {Documenting the Virtual ‘Caliphate’}, | title = {Documenting the Virtual ‘Caliphate’}, | ||
author = {Winter, Charles}, | author = {Winter, Charles}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{userSudaneseMahdiyyahComparat, | |bibtex=@article{userSudaneseMahdiyyahComparat, | ||
title = {IS\_and\_the\_Sudanese\_Mahdiyyah\_a\_Comparat}, | title = {IS\_and\_the\_Sudanese\_Mahdiyyah\_a\_Comparat}, | ||
author = {user}, | author = {user}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{IslamicStateStrategy, | |bibtex=@article{IslamicStateStrategy, | ||
title = {The\_Islamic\_State\_s\_Strategy\_in\_Cyberspa}, | title = {The\_Islamic\_State\_s\_Strategy\_in\_Cyberspa}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{MicrosoftWordSpeckhard, | |bibtex=@article{MicrosoftWordSpeckhard, | ||
title = {Microsoft Word - Speckhard ICSVE 2015 The Hypnotic Power of ISIS Imagery in Recruiting Western Youth.docx}, | title = {Microsoft Word - Speckhard ICSVE 2015 The Hypnotic Power of ISIS Imagery in Recruiting Western Youth.docx}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{CyberJihadUnderstanding, | |bibtex=@article{CyberJihadUnderstanding, | ||
title = {Cyber\_Jihad\_-\_Understanding\_and\_Countering\_Islamic\_State\_Propaganda}, | title = {Cyber\_Jihad\_-\_Understanding\_and\_Countering\_Islamic\_State\_Propaganda}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{loloGupea207739604, | |bibtex=@article{loloGupea207739604, | ||
title = {gupea\_2077\_39604\_1}, | title = {gupea\_2077\_39604\_1}, | ||
author = {Lolo}, | author = {Lolo}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{Dabiq, | |bibtex=@article{Dabiq, | ||
title = {Dabiq}, | title = {Dabiq}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{vranesTerrorismDigitalAge2016, | |bibtex=@article{vranesTerrorismDigitalAge2016, | ||
title = {Terrorism in the digital age: The use of internet and social media by terrorist organisations}, | title = {Terrorism in the digital age: The use of internet and social media by terrorist organisations}, | ||
Line 8,018: | Line 6,646: | ||
year = {2016}, | year = {2016}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{mihaelaSupplementNo32015, | |bibtex=@article{mihaelaSupplementNo32015, | ||
title = {Supplement-No.-3-2015}, | title = {Supplement-No.-3-2015}, | ||
author = {Mihaela}, | author = {Mihaela}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{herbersMAThesisHerbers, | |bibtex=@article{herbersMAThesisHerbers, | ||
title = {MA\_Thesis\_Herbers}, | title = {MA\_Thesis\_Herbers}, | ||
author = {Herbers, Lukas J.}, | author = {Herbers, Lukas J.}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{buzelinUnexpectedAllies2005, | |bibtex=@article{buzelinUnexpectedAllies2005, | ||
title = {Unexpected Allies}, | title = {Unexpected Allies}, | ||
Line 8,046: | Line 6,668: | ||
pages = {193--218}, | pages = {193--218}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{degoedeNewProfilingAlgorithms, | |bibtex=@article{degoedeNewProfilingAlgorithms, | ||
title = {The new profiling: Algorithms, black boxes, and the failure of anti-discriminatory safeguards in the European Union}, | title = {The new profiling: Algorithms, black boxes, and the failure of anti-discriminatory safeguards in the European Union}, | ||
Line 8,055: | Line 6,675: | ||
author = {de Goede, Marieke and Simon, Stephanie and Leese, Matthias}, | author = {de Goede, Marieke and Simon, Stephanie and Leese, Matthias}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{mirzoeffIntroductionVisualCulture1999, | |bibtex=@book{mirzoeffIntroductionVisualCulture1999, | ||
address = {London}, | address = {London}, | ||
Line 8,065: | Line 6,683: | ||
year = {1999}, | year = {1999}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{andersenEngagingLimitsVisibility2013, | |bibtex=@article{andersenEngagingLimitsVisibility2013, | ||
title = {Engaging the limits of visibility: Photography, security and surveillance}, | title = {Engaging the limits of visibility: Photography, security and surveillance}, | ||
Line 8,079: | Line 6,695: | ||
pages = {203--221}, | pages = {203--221}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{degoedePreemptionPracticePolitics2014, | |bibtex=@book{degoedePreemptionPracticePolitics2014, | ||
address = {London}, | address = {London}, | ||
Line 8,091: | Line 6,705: | ||
year = {2014}, | year = {2014}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{jonesSecrecy2014, | |bibtex=@article{jonesSecrecy2014, | ||
title = {Secrecy}, | title = {Secrecy}, | ||
Line 8,105: | Line 6,717: | ||
pages = {53--69}, | pages = {53--69}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@phdthesis{wheelansAnalysesGovernmentResponses2016, | |bibtex=@phdthesis{wheelansAnalysesGovernmentResponses2016, | ||
title = {Analyses of Government Responses to Stem the Flow of Foreign Fighters}, | title = {Analyses of Government Responses to Stem the Flow of Foreign Fighters}, | ||
Line 8,113: | Line 6,723: | ||
year = {2016}, | year = {2016}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{hohnsteinDigitaleMedienUnd2017, | |bibtex=@book{hohnsteinDigitaleMedienUnd2017, | ||
address = {Halle (Saale)}, | address = {Halle (Saale)}, | ||
Line 8,126: | Line 6,734: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{eisnerDifferencesScientificArtistic1981, | |bibtex=@article{eisnerDifferencesScientificArtistic1981, | ||
title = {On the Differences between Scientific and Artistic Approaches to Qualitative Research}, | title = {On the Differences between Scientific and Artistic Approaches to Qualitative Research}, | ||
Line 8,140: | Line 6,746: | ||
pages = {5}, | pages = {5}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{ballAnalyzingVisualData, | |bibtex=@book{ballAnalyzingVisualData, | ||
title = {Analyzing Visual Data}, | title = {Analyzing Visual Data}, | ||
author = {Ball, Michael and Smith, Gregory W. H.}, | author = {Ball, Michael and Smith, Gregory W. H.}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{vanleeuwenHandbookVisualAnalysis2001, | |bibtex=@book{vanleeuwenHandbookVisualAnalysis2001, | ||
title = {Handbook of Visual Analysis}, | title = {Handbook of Visual Analysis}, | ||
Line 8,155: | Line 6,757: | ||
year = {2001}, | year = {2001}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{baroneArtsBasedResearch2012, | |bibtex=@book{baroneArtsBasedResearch2012, | ||
address = {Los Angeles}, | address = {Los Angeles}, | ||
Line 8,166: | Line 6,766: | ||
year = {2012}, | year = {2012}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{catherinecassellSAGEHandbookQualitative, | |bibtex=@article{catherinecassellSAGEHandbookQualitative, | ||
title = {The SAGE Handbook of Qualitative usiness and Management Research Methods}, | title = {The SAGE Handbook of Qualitative usiness and Management Research Methods}, | ||
author = {Catherine Cassell and Ann L. Cunliffe \& Gina Grandy}, | author = {Catherine Cassell and Ann L. Cunliffe \& Gina Grandy}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{dicksQualitativeResearchandHypermediaEthnographyfortheDigitalAge, | |bibtex=@article{dicksQualitativeResearchandHypermediaEthnographyfortheDigitalAge, | ||
title = {Qualitative-Research-and-Hypermedia-Ethnography-for-the-Digital-Age}, | title = {Qualitative-Research-and-Hypermedia-Ethnography-for-the-Digital-Age}, | ||
author = {Dicks, Bella and Mason, Bruce and Coffey, Amanda and Atkinson, Paul}, | author = {Dicks, Bella and Mason, Bruce and Coffey, Amanda and Atkinson, Paul}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ARWEIBooklet, | |bibtex=@article{ARWEIBooklet, | ||
title = {ARWEI.Booklet}, | title = {ARWEI.Booklet}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{weizmanForensicArchitectureViolence2017, | |bibtex=@book{weizmanForensicArchitectureViolence2017, | ||
address = {New York}, | address = {New York}, | ||
Line 8,196: | Line 6,788: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{obradovic-wochnikRevisualisingInternationalRelations2017, | |bibtex=@article{obradovic-wochnikRevisualisingInternationalRelations2017, | ||
title = {Re-visualising international relations: audio-visual projects and direct encounters with the political in security studies}, | title = {Re-visualising international relations: audio-visual projects and direct encounters with the political in security studies}, | ||
Line 8,210: | Line 6,800: | ||
pages = {415--429}, | pages = {415--429}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{parikhAnalyticFilmmakingPersistence2014, | |bibtex=@article{parikhAnalyticFilmmakingPersistence2014, | ||
title = {Analytic Filmmaking and the Persistence of Narrative: A Response to Roy Germano}, | title = {Analytic Filmmaking and the Persistence of Narrative: A Response to Roy Germano}, | ||
Line 8,224: | Line 6,812: | ||
pages = {677--679}, | pages = {677--679}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{eisnerPromisePerilsAlternative, | |bibtex=@article{eisnerPromisePerilsAlternative, | ||
title = {The Promise and Perils of Alternative Forms of Data Representation}, | title = {The Promise and Perils of Alternative Forms of Data Representation}, | ||
author = {Eisner, Elliot W.}, | author = {Eisner, Elliot W.}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{germanoAnalyticFilmmakingResponse2014, | |bibtex=@article{germanoAnalyticFilmmakingResponse2014, | ||
title = {Analytic Filmmaking: A Response to Critics}, | title = {Analytic Filmmaking: A Response to Critics}, | ||
Line 8,245: | Line 6,829: | ||
pages = {691--694}, | pages = {691--694}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{panagiaCinemaVeriteOntology2014, | |bibtex=@article{panagiaCinemaVeriteOntology2014, | ||
title = {Cinéma vérité and the Ontology of Cinema: A Response to Roy Germano}, | title = {Cinéma vérité and the Ontology of Cinema: A Response to Roy Germano}, | ||
Line 8,259: | Line 6,841: | ||
pages = {688--690}, | pages = {688--690}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{gouldAnalyticFilmmakingSocial2014, | |bibtex=@article{gouldAnalyticFilmmakingSocial2014, | ||
title = {Analytic Filmmaking as Social Scientific Research: A Response to Roy Germano}, | title = {Analytic Filmmaking as Social Scientific Research: A Response to Roy Germano}, | ||
Line 8,273: | Line 6,853: | ||
pages = {684--685}, | pages = {684--685}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{andersenVideoAlgorithmsSecurity2017, | |bibtex=@article{andersenVideoAlgorithmsSecurity2017, | ||
title = {Video, algorithms and security: How digital video platforms produce post-sovereign security articulations}, | title = {Video, algorithms and security: How digital video platforms produce post-sovereign security articulations}, | ||
Line 8,287: | Line 6,865: | ||
pages = {354--372}, | pages = {354--372}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{andersenEpistemicAuthorityLies2013, | |bibtex=@article{andersenEpistemicAuthorityLies2013, | ||
title = {Epistemic Authority, Lies, and Video: the Constitution of Knowledge and (in)Security in the Video/Security Nexus}, | title = {Epistemic Authority, Lies, and Video: the Constitution of Knowledge and (in)Security in the Video/Security Nexus}, | ||
Line 8,299: | Line 6,875: | ||
year = {2013}, | year = {2013}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{meinesRanCnOnetoone, | |bibtex=@article{meinesRanCnOnetoone, | ||
title = {ran\_cn\_one-to-one\_digital\_interventions\_berlin\_14-15\_2016\_en}, | title = {ran\_cn\_one-to-one\_digital\_interventions\_berlin\_14-15\_2016\_en}, | ||
author = {Meines, Marije}, | author = {Meines, Marije}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{kroftDosDontsInvolving, | |bibtex=@article{kroftDosDontsInvolving, | ||
title = {dos\_and\_donts\_involving\_formers\_in\_pve\_cve\_work\_bordeaux\_27\_06\_2017\_en}, | title = {dos\_and\_donts\_involving\_formers\_in\_pve\_cve\_work\_bordeaux\_27\_06\_2017\_en}, | ||
author = {Kroft, Floor}, | author = {Kroft, Floor}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{farrellWoodgrainChessboardResponse2014, | |bibtex=@article{farrellWoodgrainChessboardResponse2014, | ||
title = {The Woodgrain of the Chessboard: A Response to Roy Germano}, | title = {The Woodgrain of the Chessboard: A Response to Roy Germano}, | ||
Line 8,327: | Line 6,897: | ||
pages = {686--687}, | pages = {686--687}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{yanowAmNotCamera2014, | |bibtex=@article{yanowAmNotCamera2014, | ||
title = {I Am Not a Camera: On Visual Politics and Method. A Response to Roy Germano}, | title = {I Am Not a Camera: On Visual Politics and Method. A Response to Roy Germano}, | ||
Line 8,341: | Line 6,909: | ||
pages = {680--683}, | pages = {680--683}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{suhrCanFilmShow2012, | |bibtex=@article{suhrCanFilmShow2012, | ||
title = {Can Film Show the Invisible?}, | title = {Can Film Show the Invisible?}, | ||
Line 8,355: | Line 6,921: | ||
pages = {282--301}, | pages = {282--301}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{meinesRanCnWorkshop, | |bibtex=@article{meinesRanCnWorkshop, | ||
title = {ran\_cn\_workshop\_jihadist\_propaganda\_amsterdam\_3-4\_2016\_en}, | title = {ran\_cn\_workshop\_jihadist\_propaganda\_amsterdam\_3-4\_2016\_en}, | ||
author = {Meines, Marije}, | author = {Meines, Marije}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{meinesRanCnDissemination, | |bibtex=@article{meinesRanCnDissemination, | ||
title = {ran\_c-n\_dissemination\_strategies\_building\_online\_multi-platform\_networks\_en}, | title = {ran\_c-n\_dissemination\_strategies\_building\_online\_multi-platform\_networks\_en}, | ||
author = {Meines, Marije}, | author = {Meines, Marije}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{RAN10LESSV2, | |bibtex=@article{RAN10LESSV2, | ||
title = {RAN\_10LESS\_V2}, | title = {RAN\_10LESS\_V2}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{radar-groepRanCnCounter, | |bibtex=@article{radar-groepRanCnCounter, | ||
title = {ran\_c-n\_counter\_and\_alternative\_narratives\_berlin\_10-11122015\_en}, | title = {ran\_c-n\_counter\_and\_alternative\_narratives\_berlin\_10-11122015\_en}, | ||
author = {Radar-Groep}, | author = {Radar-Groep}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{meinesRanChecklistRelevant, | |bibtex=@article{meinesRanChecklistRelevant, | ||
title = {ran\_c\_n\_checklist\_relevant\_mental\_biases\_vienna7-8\_02\_2018\_en}, | title = {ran\_c\_n\_checklist\_relevant\_mental\_biases\_vienna7-8\_02\_2018\_en}, | ||
author = {Meines, Marije}, | author = {Meines, Marije}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{meines201702RanHow, | |bibtex=@article{meines201702RanHow, | ||
title = {201702\_ran\_how\_to\_measure\_impact\_of\_online\_campaign\_en}, | title = {201702\_ran\_how\_to\_measure\_impact\_of\_online\_campaign\_en}, | ||
author = {Meines, Marije}, | author = {Meines, Marije}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{alexanderRanCnInvolving, | |bibtex=@article{alexanderRanCnInvolving, | ||
title = {ran\_cn\_involving\_young\_people\_counter\_alternative\_narrative\_campaigns\_25042018\_en}, | title = {ran\_cn\_involving\_young\_people\_counter\_alternative\_narrative\_campaigns\_25042018\_en}, | ||
author = {Alexander}, | author = {Alexander}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{postillSocialMediaEthnography2012, | |bibtex=@article{postillSocialMediaEthnography2012, | ||
title = {Social Media Ethnography: The Digital Researcher in a Messy Web}, | title = {Social Media Ethnography: The Digital Researcher in a Messy Web}, | ||
Line 8,417: | Line 6,967: | ||
pages = {123--134}, | pages = {123--134}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{kniggeGroundedVisualizationIntegrating2006, | |bibtex=@article{kniggeGroundedVisualizationIntegrating2006, | ||
title = {Grounded Visualization: Integrating the Analysis of Qualitative and Quantitative Data through Grounded Theory and Visualization}, | title = {Grounded Visualization: Integrating the Analysis of Qualitative and Quantitative Data through Grounded Theory and Visualization}, | ||
Line 8,430: | Line 6,978: | ||
pages = {2021--2037}, | pages = {2021--2037}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{counciloftheeuropeanunionProposalRegulationEuropean2018, | |bibtex=@article{counciloftheeuropeanunionProposalRegulationEuropean2018, | ||
title = {Proposal for a Regulation of the European Parliament and of the Council on preventing the dissemination of terrorist content online - general approach}, | title = {Proposal for a Regulation of the European Parliament and of the Council on preventing the dissemination of terrorist content online - general approach}, | ||
Line 8,441: | Line 6,987: | ||
pages = {45}, | pages = {45}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{europeancommissionProposalRegulationEuropean2018, | |bibtex=@article{europeancommissionProposalRegulationEuropean2018, | ||
title = {Proposal for a Regulation of the European Parliament and the Council on preventing the dissemination of terrorist content online}, | title = {Proposal for a Regulation of the European Parliament and the Council on preventing the dissemination of terrorist content online}, | ||
Line 8,451: | Line 6,995: | ||
pages = {35}, | pages = {35}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{europeanparliamentEuropeanParliamentResolution2017, | |bibtex=@misc{europeanparliamentEuropeanParliamentResolution2017, | ||
title = {European Parliament resolution of 15 June 2017 on online platforms and the digital single market (2016/2276(INI))}, | title = {European Parliament resolution of 15 June 2017 on online platforms and the digital single market (2016/2276(INI))}, | ||
Line 8,460: | Line 7,002: | ||
pages = {14}, | pages = {14}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{vonbethlenfalvyilonaAnnexesProposal30, | |bibtex=@article{vonbethlenfalvyilonaAnnexesProposal30, | ||
title = {Annexes to proposal 30 August}, | title = {Annexes to proposal 30 August}, | ||
author = {VON BETHLENFALVY Ilona}, | author = {VON BETHLENFALVY Ilona}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{qinAnalyzingTerrorCampaigns2007, | |bibtex=@article{qinAnalyzingTerrorCampaigns2007, | ||
title = {Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity}, | title = {Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity}, | ||
Line 8,481: | Line 7,019: | ||
pages = {71--84}, | pages = {71--84}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{techdirt.comIfYouRe, | |bibtex=@article{techdirt.comIfYouRe, | ||
title = {If You're Worried About Bad EU Internet Regulation, Just Wait Until You See The New Terrorist Regulation}, | title = {If You're Worried About Bad EU Internet Regulation, Just Wait Until You See The New Terrorist Regulation}, | ||
author = {Techdirt.com}, | author = {Techdirt.com}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{lomasUKOutsExtremism, | |bibtex=@article{lomasUKOutsExtremism, | ||
title = {UK outs extremism blocking tool and could force tech firms to use it}, | title = {UK outs extremism blocking tool and could force tech firms to use it}, | ||
author = {Lomas, Nathasha}, | author = {Lomas, Nathasha}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{counciloftheeuropeanunionTerroristContentOnline2018, | |bibtex=@misc{counciloftheeuropeanunionTerroristContentOnline2018, | ||
title = {Terrorist content online: Council adopts negotiating position on new rules to prevent dissemination}, | title = {Terrorist content online: Council adopts negotiating position on new rules to prevent dissemination}, | ||
Line 8,503: | Line 7,035: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{framptonNewNetwarCountering2017, | |bibtex=@article{framptonNewNetwarCountering2017, | ||
title = {The New Netwar: Countering Extremism Online}, | title = {The New Netwar: Countering Extremism Online}, | ||
Line 8,514: | Line 7,044: | ||
pages = {131}, | pages = {131}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{lomasEuropePushOnehour2018, | |bibtex=@article{lomasEuropePushOnehour2018, | ||
title = {Europe to push for one-hour takedown law for terrorist content}, | title = {Europe to push for one-hour takedown law for terrorist content}, | ||
Line 8,522: | Line 7,050: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{bodoniEUWarnsTech, | |bibtex=@article{bodoniEUWarnsTech, | ||
title = {EU Warns Tech Giants to Remove Terror Content in 1 Hour—or Else}, | title = {EU Warns Tech Giants to Remove Terror Content in 1 Hour—or Else}, | ||
author = {Bodoni, Stephanie}, | author = {Bodoni, Stephanie}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ignatowPierreBourdieuTheorizing2017, | |bibtex=@article{ignatowPierreBourdieuTheorizing2017, | ||
title = {Pierre Bourdieu: theorizing the digital}, | title = {Pierre Bourdieu: theorizing the digital}, | ||
Line 8,543: | Line 7,067: | ||
pages = {950--966}, | pages = {950--966}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{leeseNewMobilitiesParadigm2018, | |bibtex=@article{leeseNewMobilitiesParadigm2018, | ||
title = {The new mobilities paradigm and critical security studies: exploring common ground}, | title = {The new mobilities paradigm and critical security studies: exploring common ground}, | ||
Line 8,557: | Line 7,079: | ||
pages = {171--184}, | pages = {171--184}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{bourneLaboratizingBorderProduction2015, | |bibtex=@article{bourneLaboratizingBorderProduction2015, | ||
title = {Laboratizing the border: The production, translation and anticipation of security technologies}, | title = {Laboratizing the border: The production, translation and anticipation of security technologies}, | ||
Line 8,571: | Line 7,091: | ||
pages = {307--325}, | pages = {307--325}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{greeneTroubleTrustingAI, | |bibtex=@article{greeneTroubleTrustingAI, | ||
title = {The Trouble With Trusting AI to Interpret Police Body-Cam Video}, | title = {The Trouble With Trusting AI to Interpret Police Body-Cam Video}, | ||
author = {Greene, Daniel}, | author = {Greene, Daniel}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{obradovic-wochnikRevisualisingInternationalRelations2017a, | |bibtex=@article{obradovic-wochnikRevisualisingInternationalRelations2017a, | ||
title = {re-visualising international relations: audio-visual projects and direct encounters with the political in security studies}, | title = {re-visualising international relations: audio-visual projects and direct encounters with the political in security studies}, | ||
Line 8,592: | Line 7,108: | ||
pages = {415--429}, | pages = {415--429}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{baroneArtsBasedEducationalProjects2004, | |bibtex=@article{baroneArtsBasedEducationalProjects2004, | ||
title = {Arts-Based Educational Projects and the Redressing of the Political Spectacle}, | title = {Arts-Based Educational Projects and the Redressing of the Political Spectacle}, | ||
Line 8,606: | Line 7,120: | ||
pages = {36--43}, | pages = {36--43}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{hessBourdieuScienceStudies2011, | |bibtex=@article{hessBourdieuScienceStudies2011, | ||
title = {Bourdieu and Science Studies: Toward a Reflexive Sociology}, | title = {Bourdieu and Science Studies: Toward a Reflexive Sociology}, | ||
Line 8,620: | Line 7,132: | ||
pages = {333--348}, | pages = {333--348}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{kale-lostuvaliTwoSociologiesScience2016b, | |bibtex=@article{kale-lostuvaliTwoSociologiesScience2016b, | ||
title = {Two Sociologies of Science in Search of Truth: Bourdieu Versus Latour}, | title = {Two Sociologies of Science in Search of Truth: Bourdieu Versus Latour}, | ||
Line 8,634: | Line 7,144: | ||
pages = {273--296}, | pages = {273--296}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{sterneBourdieuTechniqueTechnology2003, | |bibtex=@article{sterneBourdieuTechniqueTechnology2003, | ||
title = {Bourdieu, Technique And Technology}, | title = {Bourdieu, Technique And Technology}, | ||
Line 8,648: | Line 7,156: | ||
pages = {367--389}, | pages = {367--389}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{gingrasFollowingScientistsSociety, | |bibtex=@incollection{gingrasFollowingScientistsSociety, | ||
title = {Following Scientists Through Society? Yes, but at arm's length!}, | title = {Following Scientists Through Society? Yes, but at arm's length!}, | ||
Line 8,657: | Line 7,163: | ||
pages = {123--146}, | pages = {123--146}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{amicelleQuestioningSecurityDevices2015, | |bibtex=@article{amicelleQuestioningSecurityDevices2015, | ||
title = {Questioning security devices: Performativity, resistance, politics}, | title = {Questioning security devices: Performativity, resistance, politics}, | ||
Line 8,671: | Line 7,175: | ||
pages = {293--306}, | pages = {293--306}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{degoedePerformingPreemption2014, | |bibtex=@article{degoedePerformingPreemption2014, | ||
title = {Performing preemption}, | title = {Performing preemption}, | ||
Line 8,685: | Line 7,187: | ||
pages = {411--422}, | pages = {411--422}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{degoedeChainSecurity2018, | |bibtex=@article{degoedeChainSecurity2018, | ||
title = {The chain of security}, | title = {The chain of security}, | ||
Line 8,699: | Line 7,199: | ||
pages = {24--42}, | pages = {24--42}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{cote-boucherOldNewWays2018, | |bibtex=@article{cote-boucherOldNewWays2018, | ||
title = {Of “old” and “new” ways: Generations, border control and the temporality of security}, | title = {Of “old” and “new” ways: Generations, border control and the temporality of security}, | ||
Line 8,713: | Line 7,211: | ||
pages = {149--168}, | pages = {149--168}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{europeancommissionSecurityUnionCommission2017, | |bibtex=@misc{europeancommissionSecurityUnionCommission2017, | ||
title = {Security Union: Commission steps up efforts to tackle illegal content online}, | title = {Security Union: Commission steps up efforts to tackle illegal content online}, | ||
Line 8,723: | Line 7,219: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{kaufmannPoliticsDigital2017a, | |bibtex=@article{kaufmannPoliticsDigital2017a, | ||
title = {Politics and ‘the digital’}, | title = {Politics and ‘the digital’}, | ||
Line 8,737: | Line 7,231: | ||
pages = {309--328}, | pages = {309--328}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{europeancommissionCommunicationCommissionEuropean2017, | |bibtex=@article{europeancommissionCommunicationCommissionEuropean2017, | ||
title = {Communication from the commission to the European Parliament, the Council, the European economic and social committee and the committee of the regions}, | title = {Communication from the commission to the European Parliament, the Council, the European economic and social committee and the committee of the regions}, | ||
Line 8,749: | Line 7,241: | ||
pages = {20}, | pages = {20}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{daniellopez-sanchezCasebasedReasoningResearch2018, | |bibtex=@book{daniellopez-sanchezCasebasedReasoningResearch2018, | ||
address = {Cham}, | address = {Cham}, | ||
Line 8,764: | Line 7,254: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{jeandreePaperIPSA2012, | |bibtex=@article{jeandreePaperIPSA2012, | ||
title = {paper\_IPSA2012}, | title = {paper\_IPSA2012}, | ||
Line 8,772: | Line 7,260: | ||
keywords = {** (Poor)}, | keywords = {** (Poor)}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{gadClosedCircuitTechnological2013, | |bibtex=@article{gadClosedCircuitTechnological2013, | ||
title = {A Closed Circuit Technological Vision: On Minority Report, event detection, and enabling technologies}, | title = {A Closed Circuit Technological Vision: On Minority Report, event detection, and enabling technologies}, | ||
Line 8,785: | Line 7,271: | ||
pages = {148--162}, | pages = {148--162}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{schindelBareLifeEuropean2016, | |bibtex=@article{schindelBareLifeEuropean2016, | ||
title = {Bare life at the European borders. Entanglements of technology, society and nature}, | title = {Bare life at the European borders. Entanglements of technology, society and nature}, | ||
Line 8,797: | Line 7,281: | ||
pages = {1--16}, | pages = {1--16}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{NakedSightNaked, | |bibtex=@article{NakedSightNaked, | ||
title = {Naked\_sight\_for\_naked\_sites\_The\_producti}, | title = {Naked\_sight\_for\_naked\_sites\_The\_producti}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{reutersFacebookTakesTerrorist, | |bibtex=@article{reutersFacebookTakesTerrorist, | ||
title = {Facebook Takes on Terrorist Content Problem With AI}, | title = {Facebook Takes on Terrorist Content Problem With AI}, | ||
author = {Reuters}, | author = {Reuters}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{bernalAILieDetectors, | |bibtex=@article{bernalAILieDetectors, | ||
title = {AI lie detectors to be tested by the EU at border points}, | title = {AI lie detectors to be tested by the EU at border points}, | ||
author = {Bernal, Natasha}, | author = {Bernal, Natasha}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{dralanj.liptonCriticalAssetProtection, | |bibtex=@article{dralanj.liptonCriticalAssetProtection, | ||
title = {Critical Asset Protection, Perimeter Monitoring, and Threat Detection Using Automated Video Surveillance}, | title = {Critical Asset Protection, Perimeter Monitoring, and Threat Detection Using Automated Video Surveillance}, | ||
author = {Dr Alan J. Lipton}, | author = {Dr Alan J. Lipton}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{bellanovaPoliticsDisappearanceScanners2013, | |bibtex=@article{bellanovaPoliticsDisappearanceScanners2013, | ||
title = {Politics of Disappearance: Scanners and (Unobserved) Bodies as Mediators of Security Practices}, | title = {Politics of Disappearance: Scanners and (Unobserved) Bodies as Mediators of Security Practices}, | ||
Line 8,838: | Line 7,312: | ||
pages = {188--209}, | pages = {188--209}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ArtificialIntelligenceRealBenefitspdf, | |bibtex=@article{ArtificialIntelligenceRealBenefitspdf, | ||
title = {ArtificialIntelligenceRealBenefitspdf}, | title = {ArtificialIntelligenceRealBenefitspdf}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{greeneTroubleTrustingAIa, | |bibtex=@article{greeneTroubleTrustingAIa, | ||
title = {The Trouble With Trusting AI to Interpret Police Body-Cam Video}, | title = {The Trouble With Trusting AI to Interpret Police Body-Cam Video}, | ||
author = {Greene, Daniel}, | author = {Greene, Daniel}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{LAPDHighlyproducedBody2018, | |bibtex=@misc{LAPDHighlyproducedBody2018, | ||
title = {LAPD's highly-produced body camera video draws scrutiny}, | title = {LAPD's highly-produced body camera video draws scrutiny}, | ||
Line 8,859: | Line 7,327: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{europeanparliamentLegislativeTrainSchedule, | |bibtex=@article{europeanparliamentLegislativeTrainSchedule, | ||
title = {Legislative train schedule {\textbar} European Parliament {\textbar} Evernote Web}, | title = {Legislative train schedule {\textbar} European Parliament {\textbar} Evernote Web}, | ||
author = {European Parliament}, | author = {European Parliament}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{sweetmanRevealingHabitusIlluminating2009, | |bibtex=@article{sweetmanRevealingHabitusIlluminating2009, | ||
title = {Revealing Habitus, Illuminating Practice: Bourdieu, Photography and Visual Methods}, | title = {Revealing Habitus, Illuminating Practice: Bourdieu, Photography and Visual Methods}, | ||
Line 8,880: | Line 7,344: | ||
pages = {491--511}, | pages = {491--511}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{pooleEXCESSDESCRIPTIONEthnography2005, | |bibtex=@article{pooleEXCESSDESCRIPTIONEthnography2005, | ||
title = {AN EXCESS OF DESCRIPTION: Ethnography, Race, and Visual Technologies}, | title = {AN EXCESS OF DESCRIPTION: Ethnography, Race, and Visual Technologies}, | ||
Line 8,894: | Line 7,356: | ||
pages = {159--179}, | pages = {159--179}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{pinkWalkingDisciplinesEthnography2010, | |bibtex=@article{pinkWalkingDisciplinesEthnography2010, | ||
title = {Walking across disciplines: from ethnography to arts practice}, | title = {Walking across disciplines: from ethnography to arts practice}, | ||
Line 8,908: | Line 7,368: | ||
pages = {1--7}, | pages = {1--7}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{scheptSeeingPrisonCountervisual, | |bibtex=@article{scheptSeeingPrisonCountervisual, | ||
title = {(Un)seeing like a prison: Counter-visual ethnography of the carceral state}, | title = {(Un)seeing like a prison: Counter-visual ethnography of the carceral state}, | ||
author = {Schept, Judah}, | author = {Schept, Judah}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ruppertRethinkingEmpiricalSocial, | |bibtex=@article{ruppertRethinkingEmpiricalSocial, | ||
title = {Rethinking empirical social sciences}, | title = {Rethinking empirical social sciences}, | ||
author = {Ruppert, Evelyn}, | author = {Ruppert, Evelyn}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{austinBourdieuMediaFilm, | |bibtex=@incollection{austinBourdieuMediaFilm, | ||
title = {Bourdieu on Media and Film}, | title = {Bourdieu on Media and Film}, | ||
Line 8,931: | Line 7,385: | ||
pages = {1--12}, | pages = {1--12}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{puwarSensingPostColonialBourdieu2009, | |bibtex=@article{puwarSensingPostColonialBourdieu2009, | ||
title = {Sensing a Post-Colonial Bourdieu: An Introduction}, | title = {Sensing a Post-Colonial Bourdieu: An Introduction}, | ||
Line 8,945: | Line 7,397: | ||
pages = {371--384}, | pages = {371--384}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{mubibrighentiVisibilitySocialTheory2010, | |bibtex=@book{mubibrighentiVisibilitySocialTheory2010, | ||
address = {Basingstoke Hampshire England; New York}, | address = {Basingstoke Hampshire England; New York}, | ||
Line 8,956: | Line 7,406: | ||
year = {2010}, | year = {2010}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{halpernBeautifulData2015, | |bibtex=@book{halpernBeautifulData2015, | ||
address = {Durham}, | address = {Durham}, | ||
Line 8,968: | Line 7,416: | ||
year = {2015}, | year = {2015}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{gallowayExcommunication2014, | |bibtex=@book{gallowayExcommunication2014, | ||
address = {Chicago; London}, | address = {Chicago; London}, | ||
Line 8,980: | Line 7,426: | ||
year = {2014}, | year = {2014}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{jewittConceptualisingResearchingBody2017a, | |bibtex=@article{jewittConceptualisingResearchingBody2017a, | ||
title = {Conceptualising and researching the body in digital contexts: towards new methodological conversations across the arts and social sciences}, | title = {Conceptualising and researching the body in digital contexts: towards new methodological conversations across the arts and social sciences}, | ||
Line 8,994: | Line 7,438: | ||
pages = {37--53}, | pages = {37--53}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{cohenVideoFilmmakingPsychotherapy2015, | |bibtex=@book{cohenVideoFilmmakingPsychotherapy2015, | ||
address = {New York}, | address = {New York}, | ||
Line 9,007: | Line 7,449: | ||
year = {2015}, | year = {2015}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{merleau-pontyPhenomenologyPerception1962, | |bibtex=@book{merleau-pontyPhenomenologyPerception1962, | ||
address = {London; New York}, | address = {London; New York}, | ||
Line 9,019: | Line 7,459: | ||
year = {1962}, | year = {1962}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{smithPracticeledResearchResearchled2009, | |bibtex=@book{smithPracticeledResearchResearchled2009, | ||
address = {Edinburgh}, | address = {Edinburgh}, | ||
Line 9,034: | Line 7,472: | ||
doi = {10.3366/j.ctt1g0b594}, | doi = {10.3366/j.ctt1g0b594}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{jagodzinskiArtsbasedResearch2013, | |bibtex=@book{jagodzinskiArtsbasedResearch2013, | ||
address = {Rotterdam; Boston}, | address = {Rotterdam; Boston}, | ||
Line 9,048: | Line 7,484: | ||
year = {2013}, | year = {2013}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{fosterCollaborativeArtsbasedResearch2016, | |bibtex=@book{fosterCollaborativeArtsbasedResearch2016, | ||
address = {London; New York}, | address = {London; New York}, | ||
Line 9,060: | Line 7,494: | ||
year = {2016}, | year = {2016}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{knightArtsResearchEducation2018, | |bibtex=@book{knightArtsResearchEducation2018, | ||
address = {Cham}, | address = {Cham}, | ||
Line 9,073: | Line 7,505: | ||
doi = {10.1007/978-3-319-61560-8}, | doi = {10.1007/978-3-319-61560-8}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{jewittExploringMethodologicalInnovation2017b, | |bibtex=@article{jewittExploringMethodologicalInnovation2017b, | ||
title = {Exploring methodological innovation in the social sciences: the body in digital environments and the arts}, | title = {Exploring methodological innovation in the social sciences: the body in digital environments and the arts}, | ||
Line 9,087: | Line 7,517: | ||
pages = {105--120}, | pages = {105--120}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{rumboldKnowingDifferently2008, | |bibtex=@book{rumboldKnowingDifferently2008, | ||
address = {New York}, | address = {New York}, | ||
Line 9,100: | Line 7,528: | ||
year = {2008}, | year = {2008}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{alloaResistanceSensibleWorld2017, | |bibtex=@book{alloaResistanceSensibleWorld2017, | ||
address = {New York}, | address = {New York}, | ||
Line 9,114: | Line 7,540: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{leeMicrosoftWordVisualPrimacy, | |bibtex=@article{leeMicrosoftWordVisualPrimacy, | ||
title = {Microsoft Word - VisualPrimacy.docx}, | title = {Microsoft Word - VisualPrimacy.docx}, | ||
author = {Lee, Lila}, | author = {Lee, Lila}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{parrCollaborativeFilmmakingProcess2007, | |bibtex=@article{parrCollaborativeFilmmakingProcess2007, | ||
title = {Collaborative film-making as process, method and text in mental health research}, | title = {Collaborative film-making as process, method and text in mental health research}, | ||
Line 9,135: | Line 7,557: | ||
pages = {114--138}, | pages = {114--138}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{leavyResearchDesign2017, | |bibtex=@book{leavyResearchDesign2017, | ||
address = {New York; London}, | address = {New York; London}, | ||
Line 9,146: | Line 7,566: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{duxburyThinkingPracticeArt2008, | |bibtex=@book{duxburyThinkingPracticeArt2008, | ||
title = {Thinking through practice. Art as research in the academy}, | title = {Thinking through practice. Art as research in the academy}, | ||
Line 9,155: | Line 7,573: | ||
year = {2008}, | year = {2008}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{nelsonPracticeResearchArts, | |bibtex=@article{nelsonPracticeResearchArts, | ||
title = {Practice As Research in the Arts}, | title = {Practice As Research in the Arts}, | ||
author = {Nelson, Robin}, | author = {Nelson, Robin}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{garrettDroneMethodologiesTaking2018, | |bibtex=@article{garrettDroneMethodologiesTaking2018, | ||
title = {Drone methodologies: Taking flight in human and physical geography}, | title = {Drone methodologies: Taking flight in human and physical geography}, | ||
Line 9,176: | Line 7,590: | ||
pages = {341--359}, | pages = {341--359}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{nathTouchedDronesScreens2016, | |bibtex=@article{nathTouchedDronesScreens2016, | ||
title = {Touched from Below: On Drones, Screens and Navigation}, | title = {Touched from Below: On Drones, Screens and Navigation}, | ||
Line 9,190: | Line 7,602: | ||
pages = {315--330}, | pages = {315--330}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{weinerEpistemologyEthnographicReality1976, | |bibtex=@article{weinerEpistemologyEthnographicReality1976, | ||
title = {Epistemology and Ethnographic Reality: A Trobriand Island Case Study}, | title = {Epistemology and Ethnographic Reality: A Trobriand Island Case Study}, | ||
Line 9,204: | Line 7,614: | ||
pages = {813--815}, | pages = {813--815}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{metzFilmLanguage1991, | |bibtex=@book{metzFilmLanguage1991, | ||
address = {Chicago}, | address = {Chicago}, | ||
Line 9,217: | Line 7,625: | ||
year = {1991}, | year = {1991}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{pauwelsParticipatoryVisualResearch2015, | |bibtex=@article{pauwelsParticipatoryVisualResearch2015, | ||
title = {‘Participatory’ visual research revisited: A critical-constructive assessment of epistemological, methodological and social activist tenets}, | title = {‘Participatory’ visual research revisited: A critical-constructive assessment of epistemological, methodological and social activist tenets}, | ||
Line 9,231: | Line 7,637: | ||
pages = {95--117}, | pages = {95--117}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{masonComingOurSenses2009, | |bibtex=@article{masonComingOurSenses2009, | ||
title = {Coming to our senses? A critical approach to sensory methodology}, | title = {Coming to our senses? A critical approach to sensory methodology}, | ||
Line 9,245: | Line 7,649: | ||
pages = {587--603}, | pages = {587--603}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{feldResearchableFilmLanguage1975, | |bibtex=@article{feldResearchableFilmLanguage1975, | ||
title = {Toward a Researchable Film Language}, | title = {Toward a Researchable Film Language}, | ||
Line 9,259: | Line 7,661: | ||
pages = {25--32}, | pages = {25--32}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{eisensteinFilmSense1957, | |bibtex=@book{eisensteinFilmSense1957, | ||
title = {The Film Sense}, | title = {The Film Sense}, | ||
Line 9,268: | Line 7,668: | ||
year = {1957}, | year = {1957}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{malimResearchMethodsStatistics1997, | |bibtex=@book{malimResearchMethodsStatistics1997, | ||
address = {London}, | address = {London}, | ||
Line 9,280: | Line 7,678: | ||
doi = {10.1007/978-1-349-13865-4}, | doi = {10.1007/978-1-349-13865-4}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{malimResearchMethods1997, | |bibtex=@incollection{malimResearchMethods1997, | ||
address = {London}, | address = {London}, | ||
Line 9,295: | Line 7,691: | ||
pages = {17--54}, | pages = {17--54}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{pearlmanCuttingRhythms2009, | |bibtex=@book{pearlmanCuttingRhythms2009, | ||
address = {Amsterdam; Boston}, | address = {Amsterdam; Boston}, | ||
Line 9,306: | Line 7,700: | ||
year = {2009}, | year = {2009}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{panofskyGothicArchitectureScholasticism1957, | |bibtex=@book{panofskyGothicArchitectureScholasticism1957, | ||
title = {Gothic Architecture and Scholasticism. An Inquiry into the analogy of the arts, philosophy and religion in the Middle Ages}, | title = {Gothic Architecture and Scholasticism. An Inquiry into the analogy of the arts, philosophy and religion in the Middle Ages}, | ||
Line 9,315: | Line 7,707: | ||
year = {1957}, | year = {1957}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{charlessanderspeirceCollectedPapersCharles, | |bibtex=@book{charlessanderspeirceCollectedPapersCharles, | ||
title = {The Collected Papers of Charles Sanders Peirce}, | title = {The Collected Papers of Charles Sanders Peirce}, | ||
author = {Charles Sanders Peirce}, | author = {Charles Sanders Peirce}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{godardGodardGodard1986, | |bibtex=@book{godardGodardGodard1986, | ||
address = {New York}, | address = {New York}, | ||
Line 9,335: | Line 7,723: | ||
year = {1986}, | year = {1986}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{bazinWhatCinemaVol2005, | |bibtex=@book{bazinWhatCinemaVol2005, | ||
address = {Berkeley}, | address = {Berkeley}, | ||
Line 9,349: | Line 7,735: | ||
year = {2005}, | year = {2005}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{mruck116838715PB, | |bibtex=@article{mruck116838715PB, | ||
title = {1168-3871-5-PB}, | title = {1168-3871-5-PB}, | ||
author = {Mruck, Katja}, | author = {Mruck, Katja}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{barthesElementsSemiology, | |bibtex=@article{barthesElementsSemiology, | ||
title = {Elements of Semiology}, | title = {Elements of Semiology}, | ||
author = {Barthes, Roland}, | author = {Barthes, Roland}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{jacksonKnowledgeBody1983, | |bibtex=@article{jacksonKnowledgeBody1983, | ||
title = {Knowledge of the Body}, | title = {Knowledge of the Body}, | ||
Line 9,371: | Line 7,751: | ||
year = {1983}, | year = {1983}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{stollerSensuousScholarship1997, | |bibtex=@book{stollerSensuousScholarship1997, | ||
title = {Sensuous scholarship}, | title = {Sensuous scholarship}, | ||
Line 9,380: | Line 7,758: | ||
year = {1997}, | year = {1997}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{jakobsonFundamentalsLanguage, | |bibtex=@article{jakobsonFundamentalsLanguage, | ||
title = {Fundamentals of language}, | title = {Fundamentals of language}, | ||
author = {Jakobson and Roman and 1896}, | author = {Jakobson and Roman and 1896}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{carlose.perezCollectedPapersCharles, | |bibtex=@article{carlose.perezCollectedPapersCharles, | ||
title = {The Collected Papers of Charles Sanders Peirce}, | title = {The Collected Papers of Charles Sanders Peirce}, | ||
author = {Carlos E. Perez}, | author = {Carlos E. Perez}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{panofskyStyleMediumMotion, | |bibtex=@article{panofskyStyleMediumMotion, | ||
title = {Style and Medium in the Motion Pictures}, | title = {Style and Medium in the Motion Pictures}, | ||
author = {Panofsky, Eric}, | author = {Panofsky, Eric}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{afonsoWorkingImages2004, | |bibtex=@book{afonsoWorkingImages2004, | ||
address = {London; New York}, | address = {London; New York}, | ||
Line 9,414: | Line 7,784: | ||
year = {2004}, | year = {2004}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{matthewsInteractiveMultimediaEthnography, | |bibtex=@article{matthewsInteractiveMultimediaEthnography, | ||
title = {Interactive multimedia ethnography: archiving workflow, interface aesthetics and metadata}, | title = {Interactive multimedia ethnography: archiving workflow, interface aesthetics and metadata}, | ||
author = {Matthews, Paul}, | author = {Matthews, Paul}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{thomasSocialInteractionalDimensions, | |bibtex=@article{thomasSocialInteractionalDimensions, | ||
title = {The Social and Interactional Dimensions of Human–Computer Interfaces}, | title = {The Social and Interactional Dimensions of Human–Computer Interfaces}, | ||
author = {Thomas and Peter J.}, | author = {Thomas and Peter J.}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{kohnInstagramNaturalizedPropaganda2017, | |bibtex=@article{kohnInstagramNaturalizedPropaganda2017, | ||
title = {Instagram as a naturalized propaganda tool}, | title = {Instagram as a naturalized propaganda tool}, | ||
Line 9,442: | Line 7,806: | ||
pages = {197--213}, | pages = {197--213}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@inproceedings{morrisExtractingNetworkingEmotions, | |bibtex=@inproceedings{morrisExtractingNetworkingEmotions, | ||
address = {Odense, Denmark}, | address = {Odense, Denmark}, | ||
Line 9,454: | Line 7,816: | ||
pages = {53--59}, | pages = {53--59}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{dovelingRoutledgeHandbookEmotions2011, | |bibtex=@book{dovelingRoutledgeHandbookEmotions2011, | ||
address = {London; New York}, | address = {London; New York}, | ||
Line 9,466: | Line 7,826: | ||
year = {2011}, | year = {2011}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{mn1178MicrosoftWordDark, | |bibtex=@article{mn1178MicrosoftWordDark, | ||
title = {Microsoft Word - The\_Dark\_Side\_of\_Political\_Marketing.doc}, | title = {Microsoft Word - The\_Dark\_Side\_of\_Political\_Marketing.doc}, | ||
author = {MN1178}, | author = {MN1178}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@inproceedings{2015IEEEConference, | |bibtex=@inproceedings{2015IEEEConference, | ||
address = {Boston, MA, USA}, | address = {Boston, MA, USA}, | ||
Line 9,482: | Line 7,838: | ||
publisher = {IEEE}, | publisher = {IEEE}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{holubReceptionTheory2013, | |bibtex=@book{holubReceptionTheory2013, | ||
address = {Hoboken}, | address = {Hoboken}, | ||
Line 9,496: | Line 7,850: | ||
year = {2013}, | year = {2013}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{eichnerAgencyMediaReception2014, | |bibtex=@book{eichnerAgencyMediaReception2014, | ||
address = {Wiesbaden}, | address = {Wiesbaden}, | ||
Line 9,508: | Line 7,860: | ||
doi = {10.1007/978-3-658-04673-6}, | doi = {10.1007/978-3-658-04673-6}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@inproceedings{2012EuropeanIntelligence, | |bibtex=@inproceedings{2012EuropeanIntelligence, | ||
address = {Odense, Denmark}, | address = {Odense, Denmark}, | ||
Line 9,517: | Line 7,867: | ||
publisher = {IEEE}, | publisher = {IEEE}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{sillinceModelSocialEmotional1996, | |bibtex=@article{sillinceModelSocialEmotional1996, | ||
title = {A model of social, emotional and symbolic aspects of computer-mediated communication within organizations}, | title = {A model of social, emotional and symbolic aspects of computer-mediated communication within organizations}, | ||
Line 9,527: | Line 7,875: | ||
year = {1996}, | year = {1996}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{austinNewUsesBourdieu2016, | |bibtex=@book{austinNewUsesBourdieu2016, | ||
address = {New York}, | address = {New York}, | ||
Line 9,539: | Line 7,885: | ||
year = {2016}, | year = {2016}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{cambrosioLymphocytesPixelsTechnoVisual2000, | |bibtex=@article{cambrosioLymphocytesPixelsTechnoVisual2000, | ||
title = {Of Lymphocytes and Pixels: The Techno-Visual Production of Cell Populations}, | title = {Of Lymphocytes and Pixels: The Techno-Visual Production of Cell Populations}, | ||
Line 9,550: | Line 7,894: | ||
year = {2000}, | year = {2000}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{bousquetEyeWar2018, | |bibtex=@book{bousquetEyeWar2018, | ||
address = {Minneapolis}, | address = {Minneapolis}, | ||
Line 9,561: | Line 7,903: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{bleikerMappingVisualPolitics2018, | |bibtex=@incollection{bleikerMappingVisualPolitics2018, | ||
address = {London}, | address = {London}, | ||
Line 9,576: | Line 7,916: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{madsenDataSmartCity2018, | |bibtex=@article{madsenDataSmartCity2018, | ||
title = {Data in the smart city: How incongruent frames challenge the transition from ideal to practice}, | title = {Data in the smart city: How incongruent frames challenge the transition from ideal to practice}, | ||
Line 9,590: | Line 7,928: | ||
pages = {205395171880232}, | pages = {205395171880232}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@inproceedings{nguyenDeepNeuralNetworks, | |bibtex=@inproceedings{nguyenDeepNeuralNetworks, | ||
address = {Boston, MA, USA}, | address = {Boston, MA, USA}, | ||
Line 9,602: | Line 7,938: | ||
pages = {427--436}, | pages = {427--436}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{vuoriIntroductionVisualSecurity2018, | |bibtex=@incollection{vuoriIntroductionVisualSecurity2018, | ||
title = {Introduction. Visual Security Studies}, | title = {Introduction. Visual Security Studies}, | ||
Line 9,612: | Line 7,946: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{wilcoxDrones2018, | |bibtex=@incollection{wilcoxDrones2018, | ||
address = {London}, | address = {London}, | ||
Line 9,627: | Line 7,959: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{kaufmannPredictivePolicingPolitics2018, | |bibtex=@article{kaufmannPredictivePolicingPolitics2018, | ||
title = {Predictive Policing and the Politics of Patterns}, | title = {Predictive Policing and the Politics of Patterns}, | ||
Line 9,640: | Line 7,970: | ||
pages = {1--19}, | pages = {1--19}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{amooreDoubtfulAlgorithmsMachine2018, | |bibtex=@article{amooreDoubtfulAlgorithmsMachine2018, | ||
title = {Doubtful algorithms : of machine learning truths and partial accounts}, | title = {Doubtful algorithms : of machine learning truths and partial accounts}, | ||
Line 9,648: | Line 7,976: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{flyverbomDatastructuringOrganizingCurating2018, | |bibtex=@article{flyverbomDatastructuringOrganizingCurating2018, | ||
title = {Datastructuring—Organizing and curating digital traces into action}, | title = {Datastructuring—Organizing and curating digital traces into action}, | ||
Line 9,662: | Line 7,988: | ||
pages = {205395171879911}, | pages = {205395171879911}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{aradauAssemblingCredibilityKnowledge2018, | |bibtex=@article{aradauAssemblingCredibilityKnowledge2018, | ||
title = {Assembling credibility: Knowledge, method and critique in times of ‘post-truth’}, | title = {Assembling credibility: Knowledge, method and critique in times of ‘post-truth’}, | ||
Line 9,676: | Line 8,000: | ||
pages = {096701061878899}, | pages = {096701061878899}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{graysonScopicRegimesVisual2018, | |bibtex=@article{graysonScopicRegimesVisual2018, | ||
title = {Scopic regimes and the visual turn in International Relations: Seeing world politics through the drone}, | title = {Scopic regimes and the visual turn in International Relations: Seeing world politics through the drone}, | ||
Line 9,690: | Line 8,012: | ||
pages = {135406611878195}, | pages = {135406611878195}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{feldmanSecurocraticWarsPublic2004, | |bibtex=@article{feldmanSecurocraticWarsPublic2004, | ||
title = {Securocratic wars of public safety}, | title = {Securocratic wars of public safety}, | ||
Line 9,704: | Line 8,024: | ||
pages = {330--350}, | pages = {330--350}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{veelMakeDataSing2018, | |bibtex=@article{veelMakeDataSing2018, | ||
title = {Make data sing: The automation of storytelling}, | title = {Make data sing: The automation of storytelling}, | ||
Line 9,718: | Line 8,036: | ||
pages = {205395171875668}, | pages = {205395171875668}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{kirinoNonequilibriumCurrentOne2010, | |bibtex=@article{kirinoNonequilibriumCurrentOne2010, | ||
title = {Nonequilibrium Current in the One Dimensional Hubbard Model at Half-Filling}, | title = {Nonequilibrium Current in the One Dimensional Hubbard Model at Half-Filling}, | ||
Line 9,734: | Line 8,050: | ||
pages = {093710}, | pages = {093710}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{feddesIncreasingSelfesteemEmpathy2015, | |bibtex=@article{feddesIncreasingSelfesteemEmpathy2015, | ||
title = {Increasing self-esteem and empathy to prevent violent radicalization: a longitudinal quantitative evaluation of a resilience training focused on adolescents with a dual identity}, | title = {Increasing self-esteem and empathy to prevent violent radicalization: a longitudinal quantitative evaluation of a resilience training focused on adolescents with a dual identity}, | ||
Line 9,748: | Line 8,062: | ||
pages = {400--411}, | pages = {400--411}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{danielAutor, | |bibtex=@article{danielAutor, | ||
title = {Autor}, | title = {Autor}, | ||
author = {Daniel}, | author = {Daniel}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{harperMicrosoftWordThesis, | |bibtex=@article{harperMicrosoftWordThesis, | ||
title = {Microsoft Word - Thesis final for pdf.docx}, | title = {Microsoft Word - Thesis final for pdf.docx}, | ||
author = {Harper, Patti}, | author = {Harper, Patti}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{alyMakingNoiseOnline2014, | |bibtex=@article{alyMakingNoiseOnline2014, | ||
title = {Making ‘Noise’ Online: An Analysis of the Say No to Terror Online Campaign}, | title = {Making ‘Noise’ Online: An Analysis of the Say No to Terror Online Campaign}, | ||
Line 9,773: | Line 8,081: | ||
year = {2014}, | year = {2014}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{pinkEthnographyInvisibleEnergy2011, | |bibtex=@article{pinkEthnographyInvisibleEnergy2011, | ||
title = {Ethnography of the invisible: energy in the multisensory home}, | title = {Ethnography of the invisible: energy in the multisensory home}, | ||
Line 9,782: | Line 8,088: | ||
year = {2011}, | year = {2011}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{pauwelsVideoMultimediaarticleMode2002, | |bibtex=@article{pauwelsVideoMultimediaarticleMode2002, | ||
title = {The video- and multimedia-article as a mode of scholarly communication: toward scientifically informed expression and aesthetics}, | title = {The video- and multimedia-article as a mode of scholarly communication: toward scientifically informed expression and aesthetics}, | ||
Line 9,796: | Line 8,100: | ||
pages = {150--159}, | pages = {150--159}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{prosserImagebasedResearch1998, | |bibtex=@book{prosserImagebasedResearch1998, | ||
address = {London}, | address = {London}, | ||
Line 9,809: | Line 8,111: | ||
year = {1998}, | year = {1998}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{dicksHypermediaMethodsQualitative, | |bibtex=@incollection{dicksHypermediaMethodsQualitative, | ||
title = {Hypermedia methods for qualitative research}, | title = {Hypermedia methods for qualitative research}, | ||
Line 9,817: | Line 8,117: | ||
author = {Dicks, Bella and Mason, Bruce}, | author = {Dicks, Bella and Mason, Bruce}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{schnettlerNotesHistoryDevelopment2013, | |bibtex=@article{schnettlerNotesHistoryDevelopment2013, | ||
title = {Notes on the History and Development of Visual Research Methods}, | title = {Notes on the History and Development of Visual Research Methods}, | ||
Line 9,827: | Line 8,125: | ||
year = {2013}, | year = {2013}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{schulzkeMilitaryVideogamesFuture2017, | |bibtex=@article{schulzkeMilitaryVideogamesFuture2017, | ||
title = {Military videogames and the future of ideological warfare}, | title = {Military videogames and the future of ideological warfare}, | ||
Line 9,841: | Line 8,137: | ||
pages = {609--626}, | pages = {609--626}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{sahyounNeuroimagingFunctionalStructural2010, | |bibtex=@article{sahyounNeuroimagingFunctionalStructural2010, | ||
title = {Neuroimaging of the Functional and Structural Networks Underlying Visuospatial versus Linguistic Reasoning in High-Functioning Autism}, | title = {Neuroimaging of the Functional and Structural Networks Underlying Visuospatial versus Linguistic Reasoning in High-Functioning Autism}, | ||
Line 9,856: | Line 8,150: | ||
pages = {86--95}, | pages = {86--95}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{arnheimFilmArt2007, | |bibtex=@book{arnheimFilmArt2007, | ||
address = {Berkeley, Calif.}, | address = {Berkeley, Calif.}, | ||
Line 9,869: | Line 8,161: | ||
year = {2007}, | year = {2007}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{EdwardSnowdenReveals, | |bibtex=@article{EdwardSnowdenReveals, | ||
title = {Edward Snowden reveals U.S., U.K. video game surveillance program - National {\textbar} Globalnews.ca}, | title = {Edward Snowden reveals U.S., U.K. video game surveillance program - National {\textbar} Globalnews.ca}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{tarantola2018YearAI2018, | |bibtex=@article{tarantola2018YearAI2018, | ||
title = {2018 is the year AI got its eyes}, | title = {2018 is the year AI got its eyes}, | ||
Line 9,886: | Line 8,174: | ||
pages = {8}, | pages = {8}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{bernalAILieDetectorsa, | |bibtex=@article{bernalAILieDetectorsa, | ||
title = {AI lie detectors to be tested by the EU at border points}, | title = {AI lie detectors to be tested by the EU at border points}, | ||
author = {Bernal, Natasha}, | author = {Bernal, Natasha}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{wiggersRaAIWeeklyCES, | |bibtex=@article{wiggersRaAIWeeklyCES, | ||
title = {raAI Weekly: CES 2019 to showcase transformative AI}, | title = {raAI Weekly: CES 2019 to showcase transformative AI}, | ||
author = {Wiggers, Kyle}, | author = {Wiggers, Kyle}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{cityuniversityEUFundedProjectUses, | |bibtex=@article{cityuniversityEUFundedProjectUses, | ||
title = {EU-Funded project uses artificial intelligence to tackle terrorist cyber-propaganda}, | title = {EU-Funded project uses artificial intelligence to tackle terrorist cyber-propaganda}, | ||
author = {City University}, | author = {City University}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{horn-mullerArtAIStorytelling, | |bibtex=@article{horn-mullerArtAIStorytelling, | ||
title = {The Art Of AI Storytelling: How One 30 Under 30 Scientist Is Teaching Devices To Make Assumptions}, | title = {The Art Of AI Storytelling: How One 30 Under 30 Scientist Is Teaching Devices To Make Assumptions}, | ||
author = {Horn-Muller, Ayurella}, | author = {Horn-Muller, Ayurella}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{luxonlineTheoryDefinitionStructural, | |bibtex=@article{luxonlineTheoryDefinitionStructural, | ||
title = {Theory and Definition of Structural/ Materialist Film}, | title = {Theory and Definition of Structural/ Materialist Film}, | ||
author = {Luxonline}, | author = {Luxonline}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{hughesWhoseResponsibilityIt, | |bibtex=@article{hughesWhoseResponsibilityIt, | ||
title = {Whose Responsibility is it to Confront Terrorism Online? - Lawfare}, | title = {Whose Responsibility is it to Confront Terrorism Online? - Lawfare}, | ||
author = {Hughes, Seamus}, | author = {Hughes, Seamus}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{darsaIntroductionGermanExpressionist, | |bibtex=@article{darsaIntroductionGermanExpressionist, | ||
title = {An Introduction to German Expressionist Films - artnet News}, | title = {An Introduction to German Expressionist Films - artnet News}, | ||
author = {Darsa, Alina}, | author = {Darsa, Alina}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{liaoGoogleWinsDismissal, | |bibtex=@article{liaoGoogleWinsDismissal, | ||
title = {Google wins dismissal of facial recognition lawsuit over biometric privacy act}, | title = {Google wins dismissal of facial recognition lawsuit over biometric privacy act}, | ||
author = {Liao, Shannon}, | author = {Liao, Shannon}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{balsamoLAPDHighlyproducedBody, | |bibtex=@article{balsamoLAPDHighlyproducedBody, | ||
title = {LAPD's highly-produced body camera video draws scrutiny}, | title = {LAPD's highly-produced body camera video draws scrutiny}, | ||
author = {Balsamo, Michael}, | author = {Balsamo, Michael}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{allanSeeIfYou, | |bibtex=@article{allanSeeIfYou, | ||
title = {See If You're Allowed to Access Police Body-Cam Video in Your State}, | title = {See If You're Allowed to Access Police Body-Cam Video in Your State}, | ||
author = {Allan, Patrick}, | author = {Allan, Patrick}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{garciaPentagonPaid500m, | |bibtex=@article{garciaPentagonPaid500m, | ||
title = {The Pentagon paid \$500m to make fake terrorist propaganda videos}, | title = {The Pentagon paid \$500m to make fake terrorist propaganda videos}, | ||
author = {Garcia, Feliks}, | author = {Garcia, Feliks}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{pauwelsVisuallyResearchingCommunicating, | |bibtex=@article{pauwelsVisuallyResearchingCommunicating, | ||
title = {Visually Researching and Communicating the City: A Systematic Assessment of Methods and Resources}, | title = {Visually Researching and Communicating the City: A Systematic Assessment of Methods and Resources}, | ||
author = {Pauwels, Luc}, | author = {Pauwels, Luc}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{flyverbomDatastructuringOrganizingCurating2018a, | |bibtex=@article{flyverbomDatastructuringOrganizingCurating2018a, | ||
title = {Datastructuring—Organizing and curating digital traces into action}, | title = {Datastructuring—Organizing and curating digital traces into action}, | ||
Line 9,984: | Line 8,246: | ||
pages = {205395171879911}, | pages = {205395171879911}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{selwynDoingDataDifferently2018, | |bibtex=@article{selwynDoingDataDifferently2018, | ||
title = {Doing data differently? Developing personal data tactics and strategies amongst young mobile media users}, | title = {Doing data differently? Developing personal data tactics and strategies amongst young mobile media users}, | ||
Line 9,998: | Line 8,258: | ||
pages = {205395171876502}, | pages = {205395171876502}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{lewis-krausFacebookDeadBody, | |bibtex=@article{lewis-krausFacebookDeadBody, | ||
title = {Facebook and the ‘Dead Body’ Problem}, | title = {Facebook and the ‘Dead Body’ Problem}, | ||
author = {Lewis-Kraus, Gideon}, | author = {Lewis-Kraus, Gideon}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{pauwelsParticipatoryVisualResearch2015a, | |bibtex=@article{pauwelsParticipatoryVisualResearch2015a, | ||
title = {‘Participatory’ visual research revisited: A critical-constructive assessment of epistemological, methodological and social activist tenets}, | title = {‘Participatory’ visual research revisited: A critical-constructive assessment of epistemological, methodological and social activist tenets}, | ||
Line 10,019: | Line 8,275: | ||
pages = {95--117}, | pages = {95--117}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{pauwelsReframingVisualSocial2015, | |bibtex=@book{pauwelsReframingVisualSocial2015, | ||
address = {Cambridge}, | address = {Cambridge}, | ||
Line 10,031: | Line 8,285: | ||
doi = {10.1017/CBO9781139017633}, | doi = {10.1017/CBO9781139017633}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{dourishDataficationDataFiction2018, | |bibtex=@article{dourishDataficationDataFiction2018, | ||
title = {Datafication and data fiction: Narrating data and narrating with data}, | title = {Datafication and data fiction: Narrating data and narrating with data}, | ||
Line 10,045: | Line 8,297: | ||
pages = {205395171878408}, | pages = {205395171878408}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{veelMakeDataSing2018a, | |bibtex=@article{veelMakeDataSing2018a, | ||
title = {Make data sing: The automation of storytelling}, | title = {Make data sing: The automation of storytelling}, | ||
Line 10,059: | Line 8,309: | ||
pages = {205395171875668}, | pages = {205395171875668}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{mengGrassrootsResourceMobilization2018, | |bibtex=@article{mengGrassrootsResourceMobilization2018, | ||
title = {Grassroots resource mobilization through counter-data action}, | title = {Grassroots resource mobilization through counter-data action}, | ||
Line 10,073: | Line 8,321: | ||
pages = {205395171879686}, | pages = {205395171879686}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{leeUnderstandingPerceptionAlgorithmic2018, | |bibtex=@article{leeUnderstandingPerceptionAlgorithmic2018, | ||
title = {Understanding perception of algorithmic decisions: Fairness, trust, and emotion in response to algorithmic management}, | title = {Understanding perception of algorithmic decisions: Fairness, trust, and emotion in response to algorithmic management}, | ||
Line 10,087: | Line 8,333: | ||
pages = {205395171875668}, | pages = {205395171875668}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{birtchnellListeningEarsArtificial2018, | |bibtex=@article{birtchnellListeningEarsArtificial2018, | ||
title = {Listening without ears: Artificial intelligence in audio mastering}, | title = {Listening without ears: Artificial intelligence in audio mastering}, | ||
Line 10,101: | Line 8,345: | ||
pages = {205395171880855}, | pages = {205395171880855}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{amesDeconstructingAlgorithmicSublime2018, | |bibtex=@article{amesDeconstructingAlgorithmicSublime2018, | ||
title = {Deconstructing the algorithmic sublime}, | title = {Deconstructing the algorithmic sublime}, | ||
Line 10,115: | Line 8,357: | ||
pages = {205395171877919}, | pages = {205395171877919}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{seaverAlgorithmsCultureTactics2017, | |bibtex=@article{seaverAlgorithmsCultureTactics2017, | ||
title = {Algorithms as culture: Some tactics for the ethnography of algorithmic systems}, | title = {Algorithms as culture: Some tactics for the ethnography of algorithmic systems}, | ||
Line 10,129: | Line 8,369: | ||
pages = {205395171773810}, | pages = {205395171773810}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ziewitzNotQuiteRandom2017, | |bibtex=@article{ziewitzNotQuiteRandom2017, | ||
title = {A not quite random walk: Experimenting with the ethnomethods of the algorithm}, | title = {A not quite random walk: Experimenting with the ethnomethods of the algorithm}, | ||
Line 10,143: | Line 8,381: | ||
pages = {205395171773810}, | pages = {205395171773810}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{leavyHandbookArtsBasedResearch2018, | |bibtex=@book{leavyHandbookArtsBasedResearch2018, | ||
address = {New York, London}, | address = {New York, London}, | ||
Line 10,152: | Line 8,388: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{harrisEthnocinemaVideoBasedResearch2018, | |bibtex=@incollection{harrisEthnocinemaVideoBasedResearch2018, | ||
address = {New York, London}, | address = {New York, London}, | ||
Line 10,163: | Line 8,397: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{harrisVideoMethod2016, | |bibtex=@book{harrisVideoMethod2016, | ||
title = {Video As Method}, | title = {Video As Method}, | ||
Line 10,172: | Line 8,404: | ||
year = {2016}, | year = {2016}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{heathVideoQualitativeResearch2010, | |bibtex=@book{heathVideoQualitativeResearch2010, | ||
address = {Los Angeles}, | address = {Los Angeles}, | ||
Line 10,184: | Line 8,414: | ||
year = {2010}, | year = {2010}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{pauwelsVisualFrameworkProducing2019, | |bibtex=@incollection{pauwelsVisualFrameworkProducing2019, | ||
address = {Budapest}, | address = {Budapest}, | ||
Line 10,197: | Line 8,425: | ||
year = {2019}, | year = {2019}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{pinkReenactmentMethodologiesEveryday2014, | |bibtex=@article{pinkReenactmentMethodologiesEveryday2014, | ||
title = {Re-enactment methodologies for everyday life research: art therapy insights for video ethnography}, | title = {Re-enactment methodologies for everyday life research: art therapy insights for video ethnography}, | ||
Line 10,211: | Line 8,437: | ||
pages = {146--154}, | pages = {146--154}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{efTerroristsWillSoon, | |bibtex=@article{efTerroristsWillSoon, | ||
title = {Terrorists Will Soon Be Able to Fake Any Video}, | title = {Terrorists Will Soon Be Able to Fake Any Video}, | ||
Line 10,219: | Line 8,443: | ||
pages = {2018}, | pages = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{bipartisanpolicycenterDigitalCounterterrorismFighting2018, | |bibtex=@article{bipartisanpolicycenterDigitalCounterterrorismFighting2018, | ||
title = {Digital Counterterrorism: Fighting Jihadists Online}, | title = {Digital Counterterrorism: Fighting Jihadists Online}, | ||
Line 10,228: | Line 8,450: | ||
pages = {36}, | pages = {36}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{bentleyFetishisedDataCounterterrorism2018, | |bibtex=@article{bentleyFetishisedDataCounterterrorism2018, | ||
title = {Fetishised data: counterterrorism, drone warfare and pilot testimony}, | title = {Fetishised data: counterterrorism, drone warfare and pilot testimony}, | ||
Line 10,242: | Line 8,462: | ||
pages = {88--110}, | pages = {88--110}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{berkhoutE4e10c58dd5f432c93a123ce7458c52fTPCS173, | |bibtex=@article{berkhoutE4e10c58dd5f432c93a123ce7458c52fTPCS173, | ||
title = {e4e10c58-dd5f-432c-93a1-23ce7458c52f\_TPCS\_173\_Blommaert}, | title = {e4e10c58-dd5f-432c-93a1-23ce7458c52f\_TPCS\_173\_Blommaert}, | ||
author = {Berkhout, Karin}, | author = {Berkhout, Karin}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{millerVisualizingJusticeKevinWalbyRichardJochelsonMichelleBertrandandStevenKohm, | |bibtex=@article{millerVisualizingJusticeKevinWalbyRichardJochelsonMichelleBertrandandStevenKohm, | ||
title = {VisualizingJusticeKevinWalbyRichardJochelsonMichelleBertrandandStevenKohm}, | title = {VisualizingJusticeKevinWalbyRichardJochelsonMichelleBertrandandStevenKohm}, | ||
author = {Miller, Jared}, | author = {Miller, Jared}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{goodwinProfessionalVision1994, | |bibtex=@article{goodwinProfessionalVision1994, | ||
title = {Professional Vision}, | title = {Professional Vision}, | ||
Line 10,268: | Line 8,482: | ||
year = {1994}, | year = {1994}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{finsnesWhatAudiovisualJihadi2010, | |bibtex=@article{finsnesWhatAudiovisualJihadi2010, | ||
title = {What is audio-visual jihadi propaganda? An overview of the content of FFI’s jihadi video database}, | title = {What is audio-visual jihadi propaganda? An overview of the content of FFI’s jihadi video database}, | ||
Line 10,278: | Line 8,490: | ||
pages = {38}, | pages = {38}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{richardsonDefenseIntelligenceRole2018, | |bibtex=@article{richardsonDefenseIntelligenceRole2018, | ||
title = {Defense, Intelligence And The Role Of Video In Counterterrorism}, | title = {Defense, Intelligence And The Role Of Video In Counterterrorism}, | ||
Line 10,287: | Line 8,497: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{neylandEverydayLifeAlgorithm2019, | |bibtex=@book{neylandEverydayLifeAlgorithm2019, | ||
address = {Cham}, | address = {Cham}, | ||
Line 10,299: | Line 8,507: | ||
doi = {10.1007/978-3-030-00578-8}, | doi = {10.1007/978-3-030-00578-8}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{SensoryEthnographyLaba, | |bibtex=@misc{SensoryEthnographyLaba, | ||
title = {Sensory Ethnography Lab :: Harvard University}, | title = {Sensory Ethnography Lab :: Harvard University}, | ||
Line 10,307: | Line 8,513: | ||
urldate = {2021-02-17}, | urldate = {2021-02-17}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{SensatejournalComSE, | |bibtex=@misc{SensatejournalComSE, | ||
title = {sensatejournal.com - SE}, | title = {sensatejournal.com - SE}, | ||
Line 10,317: | Line 8,521: | ||
journal = {sensatejournal.com}, | journal = {sensatejournal.com}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{CriticalMediaPractice, | |bibtex=@misc{CriticalMediaPractice, | ||
title = {Critical Media Practice}, | title = {Critical Media Practice}, | ||
Line 10,326: | Line 8,528: | ||
urldate = {2021-02-17}, | urldate = {2021-02-17}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{AntoinetteROUVROY, | |bibtex=@misc{AntoinetteROUVROY, | ||
title = {Antoinette ROUVROY}, | title = {Antoinette ROUVROY}, | ||
Line 10,336: | Line 8,536: | ||
journal = {the Research Portal - University of Namur}, | journal = {the Research Portal - University of Namur}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{aradauGoverningOthersAnomaly2018, | |bibtex=@article{aradauGoverningOthersAnomaly2018, | ||
title = {Governing others: Anomaly and the algorithmic subject of security}, | title = {Governing others: Anomaly and the algorithmic subject of security}, | ||
Line 10,355: | Line 8,553: | ||
pages = {1--21}, | pages = {1--21}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{rockwellCBPReportsAdvances, | |bibtex=@misc{rockwellCBPReportsAdvances, | ||
title = {CBP reports advances in biometrics -}, | title = {CBP reports advances in biometrics -}, | ||
Line 10,366: | Line 8,562: | ||
author = {Rockwell, By Mark and May 24, 2017}, | author = {Rockwell, By Mark and May 24, 2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{hvistendahlfebruary182021ExclusiveHowOracle, | |bibtex=@misc{hvistendahlfebruary182021ExclusiveHowOracle, | ||
title = {Exclusive: How Oracle Sells Repression in China}, | title = {Exclusive: How Oracle Sells Repression in China}, | ||
Line 10,378: | Line 8,572: | ||
author = {HvistendahlFebruary 18 2021, Mara HvistendahlMara and A.m, 11:20}, | author = {HvistendahlFebruary 18 2021, Mara HvistendahlMara and A.m, 11:20}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{CSCW2021, | |bibtex=@misc{CSCW2021, | ||
title = {CSCW 2021}, | title = {CSCW 2021}, | ||
Line 10,387: | Line 8,579: | ||
urldate = {2021-02-19}, | urldate = {2021-02-19}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{ACMFAccT2021, | |bibtex=@misc{ACMFAccT2021, | ||
title = {ACM FAccT - 2021 Home}, | title = {ACM FAccT - 2021 Home}, | ||
Line 10,395: | Line 8,585: | ||
urldate = {2021-02-19}, | urldate = {2021-02-19}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{miceliSubjectivityImpositionPower2020, | |bibtex=@article{miceliSubjectivityImpositionPower2020, | ||
title = {Between Subjectivity and Imposition: Power Dynamics in Data Annotation for Computer Vision}, | title = {Between Subjectivity and Imposition: Power Dynamics in Data Annotation for Computer Vision}, | ||
Line 10,412: | Line 8,600: | ||
pages = {115:1--115:25}, | pages = {115:1--115:25}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{HowReclaimYour, | |bibtex=@misc{HowReclaimYour, | ||
title = {How to Reclaim Your Face From Clearview AI}, | title = {How to Reclaim Your Face From Clearview AI}, | ||
Line 10,422: | Line 8,608: | ||
journal = {European Digital Rights (EDRi)}, | journal = {European Digital Rights (EDRi)}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{goatleyCriticalDataAesthetics2019, | |bibtex=@book{goatleyCriticalDataAesthetics2019, | ||
title = {Critical Data Aesthetics: Towards a Critically Reflexive Practice of Data Aestheticisation}, | title = {Critical Data Aesthetics: Towards a Critically Reflexive Practice of Data Aestheticisation}, | ||
Line 10,431: | Line 8,615: | ||
year = {2019}, | year = {2019}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{dignazioWhatRoleDoes2020, | |bibtex=@misc{dignazioWhatRoleDoes2020, | ||
title = {What Role Does Emotion Play in Data Visualization?}, | title = {What Role Does Emotion Play in Data Visualization?}, | ||
Line 10,444: | Line 8,626: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{converusConverusDonatingLie, | |bibtex=@misc{converusConverusDonatingLie, | ||
title = {Converus Donating Lie Detector Tests to Law Enforcement to Screen for Possible Misconduct}, | title = {Converus Donating Lie Detector Tests to Law Enforcement to Screen for Possible Misconduct}, | ||
Line 10,454: | Line 8,634: | ||
author = {Converus}, | author = {Converus}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{Etraces, | |bibtex=@misc{Etraces, | ||
title = {e-traces -}, | title = {e-traces -}, | ||
Line 10,463: | Line 8,641: | ||
journal = {e-traces}, | journal = {e-traces}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{BaladeDecentraliseeCartographions, | |bibtex=@misc{BaladeDecentraliseeCartographions, | ||
title = {Balade décentralisée : "Cartographions la surveillance" - Saint-Gilles}, | title = {Balade décentralisée : "Cartographions la surveillance" - Saint-Gilles}, | ||
Line 10,473: | Line 8,649: | ||
urldate = {2021-02-19}, | urldate = {2021-02-19}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{DesignJusticeNetwork, | |bibtex=@misc{DesignJusticeNetwork, | ||
title = {Design Justice Network}, | title = {Design Justice Network}, | ||
Line 10,483: | Line 8,657: | ||
journal = {Design Justice Network}, | journal = {Design Justice Network}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{matternClassMappingField2021, | |bibtex=@misc{matternClassMappingField2021, | ||
title = {About the Class – Mapping the Field}, | title = {About the Class – Mapping the Field}, | ||
Line 10,495: | Line 8,667: | ||
keywords = {mapping}, | keywords = {mapping}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{matternWork, | |bibtex=@misc{matternWork, | ||
title = {Work}, | title = {Work}, | ||
Line 10,505: | Line 8,675: | ||
author = {Mattern, Shannon}, | author = {Mattern, Shannon}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{adminbeFichiersBasesRepertoires2015, | |bibtex=@misc{adminbeFichiersBasesRepertoires2015, | ||
title = {Fichiers, Bases et Répertoires sociaux - Le dispositif Informatique}, | title = {Fichiers, Bases et Répertoires sociaux - Le dispositif Informatique}, | ||
Line 10,518: | Line 8,686: | ||
year = {2015}, | year = {2015}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{bonacciniAtlasAgendasMapping, | |bibtex=@book{bonacciniAtlasAgendasMapping, | ||
title = {Atlas of agendas – mapping the power, mapping the commons}, | title = {Atlas of agendas – mapping the power, mapping the commons}, | ||
Line 10,529: | Line 8,695: | ||
author = {Bonaccini, Léonore and Fourt, Xavier}, | author = {Bonaccini, Léonore and Fourt, Xavier}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{holmesAtlasAgendasMapping2015, | |bibtex=@book{holmesAtlasAgendasMapping2015, | ||
title = {An atlas of agendas: mapping the power, mapping the commons}, | title = {An atlas of agendas: mapping the power, mapping the commons}, | ||
Line 10,543: | Line 8,707: | ||
note = {OCLC: 1046620264}, | note = {OCLC: 1046620264}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{wrightDataestheticsReaderHow2007, | |bibtex=@book{wrightDataestheticsReaderHow2007, | ||
address = {Frankfurt am Main}, | address = {Frankfurt am Main}, | ||
Line 10,558: | Line 8,720: | ||
OCLC: 845113975}, | OCLC: 845113975}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{donathEthicalIssuesOur2020, | |bibtex=@incollection{donathEthicalIssuesOur2020, | ||
title = {Ethical Issues in Our Relationship with Artificial Entities}, | title = {Ethical Issues in Our Relationship with Artificial Entities}, | ||
Line 10,577: | Line 8,737: | ||
pages = {51--73}, | pages = {51--73}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{matternCalculativeCompositionEthics2020, | |bibtex=@incollection{matternCalculativeCompositionEthics2020, | ||
title = {Calculative Composition: The Ethics of Automating Design}, | title = {Calculative Composition: The Ethics of Automating Design}, | ||
Line 10,597: | Line 8,755: | ||
pages = {569--587}, | pages = {569--587}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{braidottiCartographiesPresent2011, | |bibtex=@misc{braidottiCartographiesPresent2011, | ||
address = {Serpentine Galleries}, | address = {Serpentine Galleries}, | ||
Line 10,609: | Line 8,765: | ||
year = {2011}, | year = {2011}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{ArtResearchMap, | |bibtex=@misc{ArtResearchMap, | ||
title = {Art Research Map – Jorinde Voigt ‘Radical relaxation’}, | title = {Art Research Map – Jorinde Voigt ‘Radical relaxation’}, | ||
Line 10,619: | Line 8,773: | ||
journal = {Art Research Map}, | journal = {Art Research Map}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{costanza-chockDesignJusticeCommunityLed2020, | |bibtex=@book{costanza-chockDesignJusticeCommunityLed2020, | ||
address = {Cambridge, MA}, | address = {Cambridge, MA}, | ||
Line 10,633: | Line 8,785: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{pressDesignJusticeMIT, | |bibtex=@misc{pressDesignJusticeMIT, | ||
title = {Design Justice {\textbar} The MIT Press}, | title = {Design Justice {\textbar} The MIT Press}, | ||
Line 10,644: | Line 8,794: | ||
note = {Publisher: The MIT Press}, | note = {Publisher: The MIT Press}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{zotero-2004, | |bibtex=@book{zotero-2004, | ||
isbn = {978-0-262-04345-8}, | isbn = {978-0-262-04345-8}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{dignazioArtCartography2009, | |bibtex=@incollection{dignazioArtCartography2009, | ||
address = {Oxford}, | address = {Oxford}, | ||
Line 10,669: | Line 8,815: | ||
pages = {190--206}, | pages = {190--206}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{Uncharted, | |bibtex=@misc{Uncharted, | ||
title = {Uncharted}, | title = {Uncharted}, | ||
Line 10,678: | Line 8,822: | ||
urldate = {2021-02-22}, | urldate = {2021-02-22}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{drulheCriticalAtlasInternet2015, | |bibtex=@misc{drulheCriticalAtlasInternet2015, | ||
title = {Critical Atlas of Internet}, | title = {Critical Atlas of Internet}, | ||
Line 10,688: | Line 8,830: | ||
year = {2015}, | year = {2015}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{OYVINDFAHLSTROM, | |bibtex=@misc{OYVINDFAHLSTROM, | ||
title = {ÓYVIND FAHLSTRÖM}, | title = {ÓYVIND FAHLSTRÖM}, | ||
Line 10,698: | Line 8,838: | ||
journal = {Ivam}, | journal = {Ivam}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{OyvindFahlstromDunya2016, | |bibtex=@misc{OyvindFahlstromDunya2016, | ||
title = {Öyvind Fahlström Dünya Ticaret Tekeli İçin Plan}, | title = {Öyvind Fahlström Dünya Ticaret Tekeli İçin Plan}, | ||
Line 10,710: | Line 8,848: | ||
year = {2016}, | year = {2016}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{roubanisSwedenAuthorisesUse2019, | |bibtex=@misc{roubanisSwedenAuthorisesUse2019, | ||
title = {Sweden authorises the use of facial recognition technology by the police}, | title = {Sweden authorises the use of facial recognition technology by the police}, | ||
Line 10,724: | Line 8,860: | ||
note = {Section: Archive}, | note = {Section: Archive}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{ControlRoomDi2020, | |bibtex=@misc{ControlRoomDi2020, | ||
title = {La control room di Venezia e la rete di videosorveglianza urbana • Lumi}, | title = {La control room di Venezia e la rete di videosorveglianza urbana • Lumi}, | ||
Line 10,737: | Line 8,871: | ||
note = {Section: Sicurezza}, | note = {Section: Sicurezza}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{IntelligentVideoSurveillance2017, | |bibtex=@misc{IntelligentVideoSurveillance2017, | ||
title = {Intelligent Video Surveillance: Recent Trends And What Lies Ahead}, | title = {Intelligent Video Surveillance: Recent Trends And What Lies Ahead}, | ||
Line 10,750: | Line 8,882: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{oconnellSwedishDPAPolice2021, | |bibtex=@misc{oconnellSwedishDPAPolice2021, | ||
type = {Text}, | type = {Text}, | ||
Line 10,765: | Line 8,895: | ||
year = {2021}, | year = {2021}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{colucciniAncheItaliaSi2017, | |bibtex=@misc{colucciniAncheItaliaSi2017, | ||
title = {Anche l’Italia si è munita di un sistema di riconoscimento facciale}, | title = {Anche l’Italia si è munita di un sistema di riconoscimento facciale}, | ||
Line 10,779: | Line 8,907: | ||
keywords = {***}, | keywords = {***}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{RiconoscimentoFaccialeItalia, | |bibtex=@misc{RiconoscimentoFaccialeItalia, | ||
title = {Il riconoscimento facciale in Italia è un buco nero}, | title = {Il riconoscimento facciale in Italia è un buco nero}, | ||
Line 10,788: | Line 8,914: | ||
urldate = {2021-02-22}, | urldate = {2021-02-22}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{RiconoscimentoFaccialeItalia2020, | |bibtex=@misc{RiconoscimentoFaccialeItalia2020, | ||
title = {Riconoscimento facciale in Italia, cosa dice (e non dice) il Viminale}, | title = {Riconoscimento facciale in Italia, cosa dice (e non dice) il Viminale}, | ||
Line 10,801: | Line 8,925: | ||
note = {Section: Innovazione}, | note = {Section: Innovazione}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{tg24SariEccoCome, | |bibtex=@misc{tg24SariEccoCome, | ||
title = {Sari, ecco come funziona il riconoscimento facciale della polizia}, | title = {Sari, ecco come funziona il riconoscimento facciale della polizia}, | ||
Line 10,811: | Line 8,933: | ||
author = {TG24, Sky}, | author = {TG24, Sky}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{CivilRightsGroups2021, | |bibtex=@misc{CivilRightsGroups2021, | ||
title = {Civil rights groups want Biden to halt government use of facial recognition}, | title = {Civil rights groups want Biden to halt government use of facial recognition}, | ||
Line 10,823: | Line 8,943: | ||
year = {2021}, | year = {2021}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{DeepMindResearchersSay2021, | |bibtex=@misc{DeepMindResearchersSay2021, | ||
title = {DeepMind researchers say AI poses a threat to people who identify as queer}, | title = {DeepMind researchers say AI poses a threat to people who identify as queer}, | ||
Line 10,835: | Line 8,953: | ||
year = {2021}, | year = {2021}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{CoalitionLetterPresident, | |bibtex=@misc{CoalitionLetterPresident, | ||
title = {Coalition Letter to President Biden on Use of Facial Recognition Technology}, | title = {Coalition Letter to President Biden on Use of Facial Recognition Technology}, | ||
Line 10,845: | Line 8,961: | ||
journal = {American Civil Liberties Union}, | journal = {American Civil Liberties Union}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@misc{AnatomyAISystem, | |bibtex=@misc{AnatomyAISystem, | ||
title = {Anatomy of an AI System}, | title = {Anatomy of an AI System}, | ||
Line 10,855: | Line 8,969: | ||
journal = {Anatomy of an AI System}, | journal = {Anatomy of an AI System}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{rajiFaceSurveyFacial2021, | |bibtex=@article{rajiFaceSurveyFacial2021, | ||
title = {About Face: A Survey of Facial Recognition Evaluation}, | title = {About Face: A Survey of Facial Recognition Evaluation}, | ||
Line 10,865: | Line 8,977: | ||
pages = {11}, | pages = {11}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{celisbuenoFaceRevisitedUsing2020, | |bibtex=@article{celisbuenoFaceRevisitedUsing2020, | ||
title = {The Face Revisited: Using Deleuze and Guattari to Explore the Politics of Algorithmic Face Recognition}, | title = {The Face Revisited: Using Deleuze and Guattari to Explore the Politics of Algorithmic Face Recognition}, | ||
Line 10,883: | Line 8,993: | ||
pages = {73--91}, | pages = {73--91}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{yarPanopticPowerPathologisation2002, | |bibtex=@article{yarPanopticPowerPathologisation2002, | ||
title = {Panoptic Power and the Pathologisation of Vision: Critical Reflections on the Foucauldian Thesis.}, | title = {Panoptic Power and the Pathologisation of Vision: Critical Reflections on the Foucauldian Thesis.}, | ||
Line 10,902: | Line 9,010: | ||
pages = {254--271}, | pages = {254--271}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{norvalPublicFacesCritical2017, | |bibtex=@article{norvalPublicFacesCritical2017, | ||
title = {Public faces? A critical exploration of the diffusion of face recognition technologies in online social networks}, | title = {Public faces? A critical exploration of the diffusion of face recognition technologies in online social networks}, | ||
Line 10,921: | Line 9,027: | ||
pages = {637--654}, | pages = {637--654}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{kemberFaceRecognitionEmergence2014, | |bibtex=@article{kemberFaceRecognitionEmergence2014, | ||
title = {Face Recognition and the Emergence of Smart Photography}, | title = {Face Recognition and the Emergence of Smart Photography}, | ||
Line 10,938: | Line 9,042: | ||
pages = {182--199}, | pages = {182--199}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{selvaduraiNotJustFace2015, | |bibtex=@article{selvaduraiNotJustFace2015, | ||
title = {Not just a face in the crowd: addressing the intrusive potential of the online application of face recognition technologies}, | title = {Not just a face in the crowd: addressing the intrusive potential of the online application of face recognition technologies}, | ||
Line 10,952: | Line 9,054: | ||
pages = {187--218}, | pages = {187--218}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{berleCompulsoryVisibility2020, | |bibtex=@incollection{berleCompulsoryVisibility2020, | ||
title = {Compulsory Visibility?}, | title = {Compulsory Visibility?}, | ||
Line 10,963: | Line 9,063: | ||
pages = {75--85}, | pages = {75--85}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{haleIdentityCrisisFace2005, | |bibtex=@article{haleIdentityCrisisFace2005, | ||
title = {Identity crisis: face recognition technology and freedom of the will}, | title = {Identity crisis: face recognition technology and freedom of the will}, | ||
Line 10,977: | Line 9,075: | ||
pages = {141--158}, | pages = {141--158}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{frettyFacerecognitionSurveillanceMoment2011, | |bibtex=@article{frettyFacerecognitionSurveillanceMoment2011, | ||
title = {Face-recognition surveillance: A moment of truth for fourth amendment rights in public places}, | title = {Face-recognition surveillance: A moment of truth for fourth amendment rights in public places}, | ||
Line 10,990: | Line 9,086: | ||
pages = {430}, | pages = {430}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{norvalPublicFacesCritical2017a, | |bibtex=@article{norvalPublicFacesCritical2017a, | ||
title = {Public faces? A critical exploration of the diffusion of face recognition technologies in online social networks}, | title = {Public faces? A critical exploration of the diffusion of face recognition technologies in online social networks}, | ||
Line 11,004: | Line 9,098: | ||
pages = {637--654}, | pages = {637--654}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{hopeFoucaultPanopticismSchool2013, | |bibtex=@article{hopeFoucaultPanopticismSchool2013, | ||
title = {Foucault, panopticism and school surveillance research}, | title = {Foucault, panopticism and school surveillance research}, | ||
Line 11,014: | Line 9,106: | ||
pages = {35--51}, | pages = {35--51}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{ferreyraFacialRecognitionLatin2020, | |bibtex=@article{ferreyraFacialRecognitionLatin2020, | ||
title = {Facial recognition in Latin America: Towards a human rights-based legal framework to protect public spaces from mass surveillance}, | title = {Facial recognition in Latin America: Towards a human rights-based legal framework to protect public spaces from mass surveillance}, | ||
Line 11,024: | Line 9,114: | ||
note = {Publisher: Global Campus of Human Rights}, | note = {Publisher: Global Campus of Human Rights}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@book{gatesOurBiometricFuture2011, | |bibtex=@book{gatesOurBiometricFuture2011, | ||
title = {Our biometric future: Facial recognition technology and the culture of surveillance}, | title = {Our biometric future: Facial recognition technology and the culture of surveillance}, | ||
Line 11,035: | Line 9,123: | ||
year = {2011}, | year = {2011}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{chestermanFacingFacialSurveillance2019, | |bibtex=@article{chestermanFacingFacialSurveillance2019, | ||
title = {Facing Up to Facial Surveillance}, | title = {Facing Up to Facial Surveillance}, | ||
Line 11,044: | Line 9,130: | ||
year = {2019}, | year = {2019}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{cramptonPlatformBiometrics2019, | |bibtex=@article{cramptonPlatformBiometrics2019, | ||
title = {Platform biometrics}, | title = {Platform biometrics}, | ||
Line 11,056: | Line 9,140: | ||
pages = {54--62}, | pages = {54--62}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{wilsonAustralianBiometricsGlobal2007, | |bibtex=@article{wilsonAustralianBiometricsGlobal2007, | ||
title = {Australian biometrics and global surveillance}, | title = {Australian biometrics and global surveillance}, | ||
Line 11,069: | Line 9,151: | ||
pages = {207--219}, | pages = {207--219}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{hoodMakingBodyElectric2020, | |bibtex=@article{hoodMakingBodyElectric2020, | ||
title = {Making the body electric: The politics of body-worn cameras and facial recognition in the United States}, | title = {Making the body electric: The politics of body-worn cameras and facial recognition in the United States}, | ||
Line 11,082: | Line 9,162: | ||
pages = {157--169}, | pages = {157--169}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{houwingStopCreepBiometric2020, | |bibtex=@article{houwingStopCreepBiometric2020, | ||
title = {Stop the Creep of Biometric Surveillance Technology}, | title = {Stop the Creep of Biometric Surveillance Technology}, | ||
Line 11,094: | Line 9,172: | ||
pages = {174}, | pages = {174}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{milliganFacialRecognitionTechnology1999, | |bibtex=@article{milliganFacialRecognitionTechnology1999, | ||
title = {Facial recognition technology, video surveillance, and privacy}, | title = {Facial recognition technology, video surveillance, and privacy}, | ||
Line 11,106: | Line 9,182: | ||
pages = {295}, | pages = {295}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@inproceedings{nesterovaMassDataGathering2020, | |bibtex=@inproceedings{nesterovaMassDataGathering2020, | ||
title = {Mass data gathering and surveillance: the fight against facial recognition technology in the globalized world}, | title = {Mass data gathering and surveillance: the fight against facial recognition technology in the globalized world}, | ||
Line 11,119: | Line 9,193: | ||
pages = {03006}, | pages = {03006}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{mccoyBigBrotherWhere2001, | |bibtex=@article{mccoyBigBrotherWhere2001, | ||
title = {O'Big Brother Where Art Though: The Constitutional use of Facial-Recognition Technology}, | title = {O'Big Brother Where Art Though: The Constitutional use of Facial-Recognition Technology}, | ||
Line 11,132: | Line 9,204: | ||
pages = {471}, | pages = {471}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{wilsonSurveillanceRiskPreemption2008, | |bibtex=@article{wilsonSurveillanceRiskPreemption2008, | ||
title = {Surveillance, risk and preemption on the Australian border}, | title = {Surveillance, risk and preemption on the Australian border}, | ||
Line 11,143: | Line 9,213: | ||
year = {2008}, | year = {2008}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{lattimerPoliticsSurveillanceRisk2013, | |bibtex=@article{lattimerPoliticsSurveillanceRisk2013, | ||
title = {The Politics of Surveillance in a Risk Society}, | title = {The Politics of Surveillance in a Risk Society}, | ||
Line 11,152: | Line 9,220: | ||
year = {2013}, | year = {2013}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{grunenbergWearingSomeoneElse2019, | |bibtex=@article{grunenbergWearingSomeoneElse2019, | ||
title = {Wearing Someone Else’s Face: Biometric Technologies, Anti-spoofing and the Fear of the Unknown}, | title = {Wearing Someone Else’s Face: Biometric Technologies, Anti-spoofing and the Fear of the Unknown}, | ||
Line 11,164: | Line 9,230: | ||
pages = {1--18}, | pages = {1--18}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{wilsonBiometricsBordersIdeal2006, | |bibtex=@incollection{wilsonBiometricsBordersIdeal2006, | ||
title = {Biometrics, borders and the ideal suspect}, | title = {Biometrics, borders and the ideal suspect}, | ||
Line 11,175: | Line 9,239: | ||
pages = {87--109}, | pages = {87--109}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{nagenborgTechnosecuritysocietyCatastrophicFutures2020, | |bibtex=@incollection{nagenborgTechnosecuritysocietyCatastrophicFutures2020, | ||
title = {Technosecuritysociety: Catastrophic futures, pre-emptive security \& mass surveillance}, | title = {Technosecuritysociety: Catastrophic futures, pre-emptive security \& mass surveillance}, | ||
Line 11,187: | Line 9,249: | ||
pages = {209--224}, | pages = {209--224}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{vannattaRiseRegulationThermal2020, | |bibtex=@article{vannattaRiseRegulationThermal2020, | ||
title = {The rise and regulation of thermal facial recognition technology during the COVID-19 pandemic}, | title = {The rise and regulation of thermal facial recognition technology during the COVID-19 pandemic}, | ||
Line 11,199: | Line 9,259: | ||
note = {Publisher: Oxford University Press}, | note = {Publisher: Oxford University Press}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{linderSurveillanceCapitalismPlatform2019, | |bibtex=@article{linderSurveillanceCapitalismPlatform2019, | ||
title = {Surveillance capitalism and platform policing: The surveillant assemblage-as-a-service}, | title = {Surveillance capitalism and platform policing: The surveillant assemblage-as-a-service}, | ||
Line 11,212: | Line 9,270: | ||
pages = {76--82}, | pages = {76--82}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{froomkinRegulatingMassSurveillance2015, | |bibtex=@article{froomkinRegulatingMassSurveillance2015, | ||
title = {Regulating Mass Surveillance as Privacy Pollution: Learning from Environemntal Impact Statements}, | title = {Regulating Mass Surveillance as Privacy Pollution: Learning from Environemntal Impact Statements}, | ||
Line 11,224: | Line 9,280: | ||
pages = {1713}, | pages = {1713}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{naranjoYourFaceRings2020, | |bibtex=@article{naranjoYourFaceRings2020, | ||
title = {Your face rings a bell: How facial recognition poses a threat for human rights}, | title = {Your face rings a bell: How facial recognition poses a threat for human rights}, | ||
Line 11,234: | Line 9,288: | ||
note = {Publisher: Global Campus of Human Rights}, | note = {Publisher: Global Campus of Human Rights}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{wilsonSurveillanceRiskPreemption2008a, | |bibtex=@article{wilsonSurveillanceRiskPreemption2008a, | ||
title = {Surveillance, risk and preemption on the Australian border}, | title = {Surveillance, risk and preemption on the Australian border}, | ||
Line 11,245: | Line 9,297: | ||
year = {2008}, | year = {2008}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@incollection{poirsonLegalRegulationFacial2021, | |bibtex=@incollection{poirsonLegalRegulationFacial2021, | ||
title = {The Legal Regulation of Facial Recognition}, | title = {The Legal Regulation of Facial Recognition}, | ||
Line 11,256: | Line 9,306: | ||
pages = {283--302}, | pages = {283--302}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{singerMicrosoftUrgesCongress2018, | |bibtex=@article{singerMicrosoftUrgesCongress2018, | ||
title = {Microsoft Urges Congress to Regulate Use of Facial Recognition}, | title = {Microsoft Urges Congress to Regulate Use of Facial Recognition}, | ||
Line 11,265: | Line 9,313: | ||
year = {2018}, | year = {2018}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{kostyukHightechGovernanceBig2017, | |bibtex=@article{kostyukHightechGovernanceBig2017, | ||
title = {High-tech governance through big data surveillance: Tracing the global deployment of mass surveillance infrastructures, 1995 to present}, | title = {High-tech governance through big data surveillance: Tracing the global deployment of mass surveillance infrastructures, 1995 to present}, | ||
Line 11,275: | Line 9,321: | ||
year = {2017}, | year = {2017}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{mordiniNoIdentificationRepresentation2012, | |bibtex=@article{mordiniNoIdentificationRepresentation2012, | ||
title = {No identification without representation: constraints on the use of biometric identification systems}, | title = {No identification without representation: constraints on the use of biometric identification systems}, | ||
Line 11,289: | Line 9,333: | ||
pages = {5--20}, | pages = {5--20}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{learned-millerFACIALRECOGNITIONTECHNOLOGIES2020, | |bibtex=@article{learned-millerFACIALRECOGNITIONTECHNOLOGIES2020, | ||
title = {FACIAL RECOGNITION TECHNOLOGIES IN THE WILD}, | title = {FACIAL RECOGNITION TECHNOLOGIES IN THE WILD}, | ||
Line 11,297: | Line 9,339: | ||
year = {2020}, | year = {2020}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{balaDangerFacialRecognition2020, | |bibtex=@article{balaDangerFacialRecognition2020, | ||
title = {The Danger of Facial Recognition in Our Children's Classrooms}, | title = {The Danger of Facial Recognition in Our Children's Classrooms}, | ||
Line 11,309: | Line 9,349: | ||
pages = {249}, | pages = {249}, | ||
} | } | ||
− | }} | + | }}{{#scite: |
− | |||
− | {{#scite: | ||
|bibtex=@article{azetaDesignFaceRecognition2015, | |bibtex=@article{azetaDesignFaceRecognition2015, | ||
title = {Design of A Face Recognition System for Security Control}, | title = {Design of A Face Recognition System for Security Control}, |