Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 26 of 26

Full-Text Articles in Social and Behavioral Sciences

From Polygraphs To Truth Machines: Artificial Intelligence In Lie Detection, Jo Ann Oravec Jan 2024

From Polygraphs To Truth Machines: Artificial Intelligence In Lie Detection, Jo Ann Oravec

Critical Humanities

The proliferation of artificial intelligence (AI)-enhanced lie detection tools in business, educational, community, and governmental contexts signals a new era of deception detection. With these AI developments, collections of intimate biometric information such as facial and retinal data, keystroke patterns, brain scans, and physiological changes in the cardiovascular system are combined with personal profiles to produce analyses of a subject’s supposed veracity. This article explores some early lie detection technologies (such as the polygraph) and discusses the influences that lie detection initiatives have had in human interactions through the decades. It addresses the empirical issues of whether specific AI technologies …


Carceral Data: The Limits Of Transparency-As-Accountability In Prison Risk Data, Becka Hudson, Tomas Percival Aug 2023

Carceral Data: The Limits Of Transparency-As-Accountability In Prison Risk Data, Becka Hudson, Tomas Percival

Secrecy and Society

Prison data collection is a labyrinthine infrastructure. This article engages with debates around the political potentials and limitations of transparency as a form of “accountability,” specifically as it relates to carceral management and data gathering. We examine the use of OASys, a widely used risk assessment tool in the British prison system, in order to demonstrate how transparency operates as a means of legitimating prison data collection and ensuing penal management. Prisoner options to resist their file, or “data double,” in this context are considered and the decisive role of OASys as an immediately operationalized technical structure is outlined. We …


Content Moderation As Surveillance, Hannah Bloch-Wehba Oct 2022

Content Moderation As Surveillance, Hannah Bloch-Wehba

Faculty Scholarship

Technology platforms are the new governments, and content moderation is the new law, or so goes a common refrain. As platforms increasingly turn toward new, automated mechanisms of enforcing their rules, the apparent power of the private sector seems only to grow. Yet beneath the surface lies a web of complex relationships between public and private authorities that call into question whether platforms truly possess such unilateral power. Law enforcement and police are exerting influence over platform content rules, giving governments a louder voice in supposedly “private” decisions. At the same time, law enforcement avails itself of the affordances of …


Eyes On The Street: Racialized Bodies And Surveillance In Urban Space, Hana Parker Soule Jan 2022

Eyes On The Street: Racialized Bodies And Surveillance In Urban Space, Hana Parker Soule

Senior Projects Spring 2022

Senior Project submitted to The Division of Arts of Bard College.


Comparing Political Implications Of Punitive Paradigms In Digital Surveillance And Data Driven Algorithms Between The Polities Of The United States Of America And The People's Republic Of China, Shedelande Lily Carpenter Jan 2022

Comparing Political Implications Of Punitive Paradigms In Digital Surveillance And Data Driven Algorithms Between The Polities Of The United States Of America And The People's Republic Of China, Shedelande Lily Carpenter

Senior Projects Spring 2022

Senior Project submitted to The Division of Social Studies of Bard College.


Disruptive Technologies With Applications In Airline & Marine And Defense Industries, Randall K. Nichols, Hans C. Mumm, Wayne Lonstein, Suzanne Sincavage, Candice M. Carter, John-Paul Hood, Randall Mai, Mark Jackson, Bart Shields Feb 2021

Disruptive Technologies With Applications In Airline & Marine And Defense Industries, Randall K. Nichols, Hans C. Mumm, Wayne Lonstein, Suzanne Sincavage, Candice M. Carter, John-Paul Hood, Randall Mai, Mark Jackson, Bart Shields

NPP eBooks

Disruptive Technologies With Applications in Airline, Marine, Defense Industries is our fifth textbook in a series covering the world of Unmanned Vehicle Systems Applications & Operations On Air, Sea, and Land. The authors have expanded their purview beyond UAS / CUAS / UUV systems that we have written extensively about in our previous four textbooks. Our new title shows our concern for the emergence of Disruptive Technologies and how they apply to the Airline, Marine and Defense industries. Emerging technologies are technologies whose development, practical applications, or both are still largely unrealized, such that they are figuratively emerging into prominence …


Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian Jan 2021

Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian

Journal of International Technology and Information Management

Information and Communications technologies (ICT) pervade society. The Internet, wireless communication, and social media are ubiquitous in and indispensable in society today. As they continue to grow and mushroom, there are new and increased calls from various segments of the society such as technologists, activists, sociologists, and legal experts, who issue warnings on the more nefarious and undesirable uses of ICTs, especially by governments. In fact, government control and surveillance using ICTs is not a new phenomenon. By looking at history, we are able to see several instances when ICTs have been used by governments to control, surveil, and infringe …


Digital Authoritarianism In China And Russia: A Comparative Study, Laura H.C. Howells Jan 2020

Digital Authoritarianism In China And Russia: A Comparative Study, Laura H.C. Howells

Honors Projects

Digital authoritarianism is on the rise around the world and threatens the data privacy and rights of both domestic and international Internet users. However, scholarship on digital authoritarianism remains limited in scope and case study selection. This study contributes a new, more comprehensive analytical framework for the study of Internet governance and applies it to the case studies of China and Russia. Special attention is paid to the still understudied Russian Internet governance model. After thorough literature review and novel data collection and analysis, this paper identifies relative centralization of network infrastructure and the extent and pace of change in …


Iran, Diane M. Zorri Jan 2020

Iran, Diane M. Zorri

Publications

Internet access in Iran is characterized by strong censorship, limited access, surveillance, and widespread state-sanctioned propaganda. The regime in Tehran views internet freedom as a critical threat to its national security (Henry, Pettyjohn, and York 2014). Using an index of variables such as obstacles to access, limits on content, and violations of user rights, the nongovernmental organization Freedom House rates Iran’s internet access as “not free” (Freedom House 2018). On a scale of zero to one hundred, where zero is “free” and one hundred is “not free,” Freedom House scores Iran at an eighty-five, making it the least free nation …


Unmanned Aircraft Systems In The Cyber Domain, Randall K. Nichols, Hans C. Mumm, Wayne D. Lonstein, Julie J.C.H. Ryan, Candice Carter, John-Paul Hood Jul 2019

Unmanned Aircraft Systems In The Cyber Domain, Randall K. Nichols, Hans C. Mumm, Wayne D. Lonstein, Julie J.C.H. Ryan, Candice Carter, John-Paul Hood

NPP eBooks

Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; …


What Is Privacy? The Threat Of Surveillance And Blackmail In The 21st Century, Harrison S. Ruprecht Jan 2017

What Is Privacy? The Threat Of Surveillance And Blackmail In The 21st Century, Harrison S. Ruprecht

Senior Independent Study Theses

In an interview published in Wired magazine on November 12, 2013, Steven Levy asked Bill Gates, in virtue of recent NSA revelations, “What is the proper balance of surveillance and security, and where do we go from here?”[1] Gates responded, “Historically, privacy was almost implicit, because it was hard to find and gather information. But in the digital world, whether it's digital cameras or satellites or just what you click on, we need to have more explicit rules - not just for governments but for private companies.”[2] In many ways Gates’ thought anticipates my project. In the pages …


Keeping Pace: The U.S. Supreme Court And Evolving Technology, Brian Thomas Jul 2015

Keeping Pace: The U.S. Supreme Court And Evolving Technology, Brian Thomas

Politics Summer Fellows

Contemporary mainstream discussions of the Supreme Court are often qualified with the warning that the nine justices are out of touch with everyday American life, especially when it comes to the newest and most popular technologies. For instance, during oral argument for City of Ontario v. Quon, a 2010 case that dealt with sexting on government-issued devices, Chief Justice John Roberts famously asked what the difference was “between email and a pager,” and Justice Antonin Scalia wondered if the “spicy little conversations” held via text message could be printed and distributed. While these comments have garnered a great deal of …


Bargaining With The Machine: A Framework For Describing Encounters With Surveillance Technologies, Robert Pallitto Jan 2013

Bargaining With The Machine: A Framework For Describing Encounters With Surveillance Technologies, Robert Pallitto

Political Science Publications

Relationships between surveillance and inequality (e.g., as surveillance is used for domination, as surveillance affects subjects’ life-chances) have been a central concern of surveillance studies scholars. This concern with inequalities that are produced and sustained by surveillance runs parallel to the longstanding interest of many social theorists more generally with the unequal workings of power in nominally free societies. How is inequality sustained without resort to force? Why do people consent to subjugation? Some form of ideology critique is often employed to answer such questions. However, the work of Rosen (1996) and others has cast serious doubt on the ability …


Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke Dec 2012

Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke

Professor Katina Michael

During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …


Bargaining With The Machine: A Framework For Describing Encounters With Surveillance Technologies, Robert M. Pallitto Dec 2012

Bargaining With The Machine: A Framework For Describing Encounters With Surveillance Technologies, Robert M. Pallitto

Robert M Pallitto

Relationships between surveillance and inequality (e.g., as surveillance is used for domination, as surveillance affects subjects’ life-chances) have been a central concern of surveillance studies scholars. This concern with inequalities that are produced and sustained by surveillance runs parallel to the longstanding interest of many social theorists more generally with the unequal workings of power in nominally free societies. How is inequality sustained without resort to force? Why do people consent to subjugation? Some form of ideology critique is often employed to answer such questions. However, the work of Rosen (1996) and others has cast serious doubt on the ability of …


Glogging Your Every Move, Lisa Wachsmuth, Katina Michael Nov 2012

Glogging Your Every Move, Lisa Wachsmuth, Katina Michael

Professor Katina Michael

"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."

"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.

"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."


Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael Oct 2012

Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael

Associate Professor Katina Michael

This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …


Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael Jun 2012

Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael

Professor Katina Michael

Tracking and monitoring people as they operate within their personal networks benefits service providers and their constituents but involves hidden risks and costs.

Automatic identification technologies, CCTV cameras, pervasive and mobile networks, wearable computing, location-based services and social networks have traditionally served distinct purposes. However, we have observed patterns of integration, convergence and coexistence among all these innovations within the information and communication technology industry.1For example, ‘location-based social networking’ can draw on a smart phone's capacity to identify a user uniquely, locate him within 1–2m and share this information across his social network in real time. The resulting ability to …


Citizens’ Perceptions Of Data Protection And Privacy In Europe, Dara Hallinan, Michael Friedewald, Paul Mccarthy Jun 2012

Citizens’ Perceptions Of Data Protection And Privacy In Europe, Dara Hallinan, Michael Friedewald, Paul Mccarthy

Michael Friedewald

Data protection and privacy gain social importance as technology and data flows play an ever greater role in shaping social structure. Despite this, understanding of public opinion on these issues is conspicuously lacking. This article is a meta-analysis of public opinion surveys on data protection and privacy focussed on EU citizens. The article firstly considers the understanding and awareness of the legal framework for protection as a solid manifestation of the complex concepts of data protection and privacy. This is followed by a consideration of perceptions of privacy and data protection in relation to other social goals, focussing on the …


Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt Feb 2012

Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt

Professor Katina Michael

Law disciplines technology, though it does so in a partial and incomplete way as reflected in the old adage that technology outstrips the capacity of law to regulate it. The rise of new technologies poses a significant threat to human rights – the pervasive use of CCTV (and now mobile CCTV), telecommunications interception, and low-cost audio-visual recording and tracking devices (some of these discreetly wearable), extend the power of the state and corporations significantly to intrude into the lives of citizens.


Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke Jan 2012

Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke

Associate Professor Katina Michael

Location tracking and monitoring applications have proliferated with the arrival of smart phones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smart phone user down to 10 metres of accuracy on average. Innovators have been quick to capitalise on this emerging market by introducing novel pedestrian tracking technologies which can denote the geographic path of a mobile user. At the same time there is contention by law enforcement personnel over the need for a warrant process to track an individual in a public space. This paper considers the future of location …


Datenschutzaspekte Smarter Überwachung, Michael Friedewald, Marc Langheinrich Sep 2011

Datenschutzaspekte Smarter Überwachung, Michael Friedewald, Marc Langheinrich

Michael Friedewald

Kurz&bündig Moderne «intelligente» Überwachungssysteme sollen den Bürger besser vor Terrorismus und organisierter Kriminalität schützen, greifen potentiell aber tief in die Privatsphäre des Einzelnen ein. Das EU-Forschungsprojekt SAPIENT untersucht die Risiken solcher intelligenten Überwachungstechniken und erarbeitet Verfahren, um diese im Einklang mit Menschenrechten und unter Beachtung des sozialen und gemeinschaftlichen Zusammenhalts gestalten zu können.


The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael Aug 2011

The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael

M. G. Michael

No abstract provided.


The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael Aug 2011

The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael

Professor Katina Michael

No abstract provided.


Sorting Out Smart Surveillance, David Wright, Michael Friedewald, Serge Gutwirth, Marc Langheinrich, Emilio Mordini, Rocco Bellanova, Paul De Hert, Kush Wadhwa, Didier Bigo Jan 2010

Sorting Out Smart Surveillance, David Wright, Michael Friedewald, Serge Gutwirth, Marc Langheinrich, Emilio Mordini, Rocco Bellanova, Paul De Hert, Kush Wadhwa, Didier Bigo

Michael Friedewald

Surveillance is becoming ubiquitous in our society. We can also see the emergence of “smart” surveillance technologies and the assemblages (or combinations) of such tech- nologies, supposedly to combat crime and terrorism, but in fact used for a variety of purposes, many of which are intrusive upon the privacy of law-abiding citizens. Following the dark days of 9/11, security and surveillance became paramount. More recently, in Europe, there has been a policy commitment to restore privacy to centre stage. This paper examines the legal tools available to ensure that privacy and personal data protection are respected in attempts to ensure …


National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael May 2008

National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael

M. G. Michael

This special issue of Prometheus is dedicated to the theme of the Social Implications of National Security Measures on Citizens and Business. National security measures can be defined as those technical and non-technical measures that have been initiated as a means to curb breaches in national security, irrespective of whether these might occur by nationals or aliens in or from outside the sovereign state. National security includes such government priorities as maintaining border control, safeguarding against pandemic outbreaks, preventing acts of terror, and even discovering and eliminating identification fraud. Governments worldwide are beginning to implement information and communication security techniques …