Open Access. Powered by Scholars. Published by Universities.®
- File Type
Articles 1 - 4 of 4
Full-Text Articles in Law
Kill-Lists And Accountability, Greg Mcneal
Kill-Lists And Accountability, Greg Mcneal
Greg McNeal
This article is a comprehensive examination of the U.S. practice of targeted killings. It is based in part on field research, interviews, and previously unexamined government documents. The article fills a gap in the literature, which to date lacks sustained scholarly analysis of the accountability mechanisms associated with the targeted killing process. The article makes two major contributions: 1) it provides the first qualitative empirical accounting of the targeted killing process, beginning with the creation of kill-lists extending through the execution of targeted strikes; 2) it provides a robust analytical framework for assessing the accountability mechanisms associated with those processes. …
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Professor Katina Michael
During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …
Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski
Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski
David A. Bray
We review three different theories that can inform how researchers can determine the performance of smart business networks, to include: (1) the Theory of Evolution, (2) the Knowledge-Based Theory of the Firm, and (3) research insights into computers and cognition. We suggest that each of these theories demonstrate that to be generally perceived as smart, an organism needs to be self-organizing, communicative, and tool-making. Consequentially, to determine the performance of a smart business network, we suggest that researchers need to determine the degree to which it is self-organizing, communicative, and tool-making. We then relate these findings to the Internet and …
Secrecy And Democratic Decisions, Mark A. Chinen
Secrecy And Democratic Decisions, Mark A. Chinen
Mark A. Chinen
Secrecy to protect intelligence sources and methods appears often in the nation’s discourse about controversial national security matters. Often it is asked whether such secrecy is consistent with the nation’s democratic principles and processes. I argue such principles and processes provide a framework through which we try to answer questions about secrecy and indeed legitimate them, but are often too broad to provide definitive guidance in specific cases. At the same time, the sources and methods argument itself is overbroad because of the nature of the sources and methods themselves; the tentative nature of intelligence assessments derived from those sources …