Location of Repository

CCTV identity management and implications for criminal justice: some considerations.

By M. Carroll-Mayer, 1968- Bernd Carsten Stahl and 1966- N. Ben Fairweather
Publisher: Surveillance Studies Network
Year: 2008
OAI identifier: oai:www.dora.dmu.ac.uk:2086/3248
Journal:

Suggested articles

Preview

Citations

  1. (2001b) Transcaration: A Constitutive Ethnography of Mentally Ill Offenders, doi
  2. 30 th,
  3. (2006). A Report on the Surveillance Carroll-Mayer et al.:
  4. (2003). Airports as Data Filters: Converging Surveillance doi
  5. (2005). An Innocent Man Shot Dead on the London Tube by Police,
  6. (2008). An Innocent Man Shot Dead on the Tube by Police.
  7. (1987). Bentham’s Haunted House. doi
  8. (2007). CameraWatch Launch Report,
  9. (2007). CameraWatch Launch Report, May 30 th,
  10. (2007). Carroll-Mayer et al.: CCTV Identity Management Surveillance &
  11. (2002). CCTV in London, Working Paper No 6 http://www.urbaneye.net/results/ue_wp6.pdf (Last accessed
  12. (1998). Commission on proceedings involving Guy Paul Morin, Toronto: Queen’s Printer For Ontario.
  13. (2005). Community mental health in the UK: restructuring for the 21st century,
  14. (2007). Complaints Commission (IPCC) doi
  15. (1987). Critical Social Science: Liberation and Its Limits, Polity Press Cambridge. doi
  16. (1977). Discipline and Punish: The Birth of A Prison. doi
  17. (2003). Discourse Analysis: Making Complex Methodology Simple.
  18. (2004). Displaced Expertise: Three Constraints on the Policy-Relevance of Criminological Thought, doi
  19. (2008). Downfall of the Silent Witness, Mail on Sunday,
  20. (1977). Ecrits: A Selection. Trans doi
  21. (2003). Face Recognition Vendor Text 2002, Overview and Summary http://biometricinstitute.org/bi/faceRecognitionVendor Test2002.pdf (Last accessed Nov 2 nd,
  22. (2003). Face Recognition Vendor Text 2002, Overview and Summary http://biometricinstitute.org/bi/faceRecognitionVendor Test2002.pdf (Last accessed Nov 2nd,
  23. (2005). Hi tech, High Transport Security?
  24. (2003). How Closed-Circuit Television Surveillance Organises the Social: An Institutional Ethnography, doi
  25. (2003). http://sscnet.ucla.edu/clic/cgoodwin/94prof_vis (Last accessed Nov 2nd 2007) Carroll-Mayer et al.: CCTV Identity Management Surveillance &
  26. (2005). London Tubes To Use High Tech Explosives Scanners, Evening Standard,
  27. (2005). Marconi wins £150 million London Underground Contract,
  28. (2005). Marconi wins £150 million London Underground Contract, 26 th
  29. (2003). Network Based Prevention: Multiservice-Networks for Security http://www.europolice.com/pdf/gerbig.pdf (Last accessed Nov 9th
  30. (2002). Perjury and Perverting the Course of Justice Considered available at http://74.6.146/search/cache?ei=UTF8&p=perverting+course+of+justice+uk+police&rd=r1&u=www.buckingham.ac.uk/publicity/articl es/edwards-paptcojc.pdf&w=perverting.pdf.
  31. (2002). Perjury and Perverting the Course of Justice Considered available at http://74.6.146/search/cache?ei=UTF8&p=perverting+course+of+justice+uk+police&rd=r1&u=www.buckingham.ac.uk/publicity/articl es/edwards-paptcojc.pdf&w=perverting.pdf. Last accessed
  32. (2004). Picturing Algorithmic Surveillance: The Politics of Facial Recognition Systems,
  33. (2003). Potemkin and the Panopticon: Samuel Bentham and the Architecture of Absolutism in Eighteenth Century Russia,
  34. (1994). Professional Vision, doi
  35. (2004). Secured and Sorted Mobilities: Examples from the Airport,
  36. (2004). Security and Privacy: Striking the Right Balance, Centre for Electronic Governance http://www.electronicgov.net/pubs.research_papers/slp/Sec&PrivPaper03y03pdf (Last accessed Nov 11 th,
  37. (2004). Security and Privacy: Striking the Right Balance, Centre for Electronic Governance http://www.electronicgov.net/pubs.research_papers/slp/Sec&PrivPaper03y03pdf (Last accessed Nov 11th,
  38. (1986). Speed and Politics, doi
  39. (2007). Talking CCTV brings voice of authority to streets,
  40. (2007). Talking CCTV brings voice of authority to streets, 4 th
  41. (2004). The Ethics of Critical IS Research,
  42. (2005). The French Connection in Criminology: Rediscovering Crime Law and Social Change. doi
  43. (1914). The History of the Psychoanalytic Movement, translated by A.A. doi
  44. (2004). The Need for Command and Control Instant Message Adaptive Interfaces: Lessons Learned from Tactical Tomahawk Human in the Loop Simulations, Cyber Psychology and Carroll-Mayer et al.: doi
  45. (2004). The Position of Policewomen: A Discourse Analysis Study. Work Employment and Society, BSA publications, 18:1, Sage Publications: Thousand Oaks: doi
  46. (2005). The Wild West: Nanotechnological Weaponry and the Rule of Law on the Battlefield,
  47. (1997). Transcaraceration: Notes on a Psychoanalytically-informed Theory of Social Practice in the Criminal Justice and Mental Health Systems, Crime Law and Social Change: An
  48. (2000). Virtual War: Kosovo and Beyond,

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.