11,730 research outputs found

    Exercise as Labour: Quantified Self and the Transformation of Exercise into Labour

    Get PDF
    The recent increase in the use of digital self-tracking devices has given rise to a range of relations to the self often discussed as quantified self (QS). In popular and academic discourse, this development has been discussed variously as a form of narcissistic self-involvement, an advanced expression of panoptical self-surveillance and a potential new dawn for e-health. This article proposes a previously un-theorised consequence of this large-scale observation and analysis of human behaviour; that exercise activity is in the process of being reconfigured as labour. QS will be briefly introduced, and reflected on, subsequently considering some of its key aspects in relation to how these have so far been interpreted and analysed in academic literature. Secondly, the analysis of scholars of “digital labour” and “immaterial labour” will be considered, which will be discussed in relation to what its analysis of the transformations of work in contemporary advanced capitalism can offer to an interpretation of the promotion and management of the self-tracking of exercise activities. Building on this analysis, it will be proposed that a thermodynamic model of the exploitation of potential energy underlies the interest that corporations have shown in self-tracking and that “gamification” and the promotion of an entrepreneurial selfhood is the ideological frame that informs the strategy through which labour value is extracted without payment. Finally, the potential theoretical and political consequences of these insights will be considered

    Native Milwaukee

    Get PDF

    Arguments Within an Argument: Examining The USA PATRIOT Act

    Get PDF

    From Shelters to Dwellings

    Get PDF
    In Zaatari camp, Jordan, thousands of Syrian refugees were sheltered in tents and caravans, which they steadily appropriated and turned into dwellings that responded to their social and cultural needs. In this book, Ayham Dalal takes a closer look at this remarkable transformation. He draws on the tension between 'the shelter' and 'the dwelling' to unravel how new spaces unfold in between them, where refugees become architects and the camp is dismantled and reassembled. From Shelters to Dwellings is the first study to uniquely combine ethnographic observations with new architectural research methods, to illustrate in detail how refugees inhabit shelters. It is a must-read for anyone interested in understanding how camps and shelters are transformed by the powerful act of dwelling

    Dismantling Detention: International Alternatives to Detaining Immigrants

    Get PDF
    As the harmful effects of immigration detention become more widely known and the appropriateness of detaining migrants is increasingly questioned, governments are looking at alternatives to detention as more humane and rights-respecting approaches to addressing the management of migrants and asylum seekers with unsettled legal status. This report examines alternatives to immigration detention in six countries: Bulgaria, Canada, Republic of Cyprus, Spain, the United Kingdom, and the United States to highlight viable, successful alternatives that countries should implement before resorting to detention. While the report provides an analysis of specific alternatives to detention (often referred to as ATDs) in each country, it is not intended to provide a comprehensive overview of all alternative programs available.Each country featured in this report has taken a different approach to alternatives to detention. Some focus more heavily on surveillance and others on a more person-centered, holistic approach. Ultimately, this report finds alternatives that place the basic needs and dignity of migrants at the forefront of policy, such as community-based case management programs, offer a rights-respecting alternative to detention while simultaneously furthering governments' legitimate immigration enforcement aims

    What impressions do users have after a ride in an automated shuttle? An interview study

    Get PDF
    In the future, automated shuttles may provide on-demand transport and serve as feeders to public transport systems. However, automated shuttles will only become widely used if they are accepted by the public. This paper presents results of an interview study with 30 users of an automated shuttle on the EUREF (EuropĂ€isches Energieforum) campus in Berlin-Schöneberg to obtain in-depth understanding of the acceptance of automated shuttles as feeders to public transport systems. From the interviews, we identified 340 quotes, which were classified into six categories: (1) expectations about the capabilities of the automated shuttle (10% of quotes), (2) evaluation of the shuttle performance (10%), (3) service quality (34%), (4) risk and benefit perception (15%), (5) travel purpose (25%), and (6) trust (6%). The quotes indicated that respondents had idealized expectations about the technological capabilities of the automated shuttle, which may have been fostered by the media. Respondents were positive about the idea of using automated shuttles as feeders to public transport systems but did not believe that the shuttle will allow them to engage in cognitively demanding activities such as working. Furthermore, 20% of respondents indicated to prefer supervision of shuttles via an external control room or steward on board over unsupervised automation. In conclusion, even though the current automated shuttle did not live up to the respondents’ expectations, respondents still perceived automated shuttles as a viable option for feeders to public transport systems.Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-care Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.Transport and PlanningHuman-Robot InteractionIntelligent VehiclesTransport and Plannin

    Electronic data safes as an infrastructure for transformational government? A case study

    Full text link
    This article introduces and explores the potential of an active electronic data safe (AEDS) serving as an infrastructure to achieve transformational government. An AEDS connects individuals and organizations from the private and the public sector to exchange information items related to business processes following the user-managed access paradigm. To realize the transformational government’s vision of user-centricity, fundamental changes in the service provision and collaboration of public and private sector organizations are needed. Findings of a user study with a prototype of an AEDS are used to identify four barriers for the adoption of an AEDS in the light of transformational government: (1.) offering citizens unfamiliar services having the character of experience-goods; (2.) failing to fulfill common service expectations of the customers; (3.) failing to establish contextual integrity for data sharing, and, (4.) failing to establish and run an AEDS as a multi-sided platform providing an attractive business model

    How Do We Get Rid of These Things? Dismantling Excess Weapons While Protecting the Environment

    Get PDF
    The startling successes of contemporary international arms control negotiations call to mind the old aphorism that one should be careful about what one wishes for, because the wish just might come true. Today, disarmament diplomacy has wrought unprecedented triumphs across a wide range of global bargaining issues, producing a series of watershed treaties that offer spectacular new advantages for the security of the United States and for the prospect of enduring world peace. At the same time, however, these unanticipated negotiation breakthroughs have themselves generated unforeseen implementation problems, spawning a host of novel difficulties for which the traditional tools and methods of arms control are ill-prepared or inappropriate. This Article examines one such difficulty: the potential legal and political conflict posed when a dramatic and crucial new arms control agreement, the 1993 Chemical Weapons Convention (CWC), confronts the equally fundamental and pressing dictates of national environmental protection policy. In short, the CWC will mandate the peaceful dismantling of massive national arsenals of now obsolete, but still exceptionally lethal chemical weapons (CW) agents, armaments, and facilities-and the destruction must be accomplished relatively promptly, reliably, and under the supervision of international inspectors. In the United States, however, long-standing environmental legislation, starting with the National Environmental Policy Act of 1969 (NEPA) and continuing through a sequence of resource-specific antipollution enactments, mandates punctilious adherence to procedural safeguards (such as the preparation of disclosive Environmental Impact Statements) and compliance with stringent national and local substantive standards on emissions, hazardous wastes, community participation, and safety

    NASA v. Nelson: The High Court Flying High Above the Right to Informational Privacy

    Get PDF
    In 1977, the U.S. Supreme Court first acknowledged a potential constitutional privacy “interest in avoiding disclosure of personal matters.” Since then, the Court has remained silent on whether there is a right to informational privacy. In the October 2010 term, the Court had another chance to revisit the contours of this potential privacy interest in NASA v. Nelson. But it again refused to define those contours and instead assumed, without deciding, that a constitutional right to informational privacy exists. The Court held that although information that was collected from an employee background-check questionnaire implicated the employees’ putative right to informational privacy, the Privacy Act of 1974 alleviated that privacy concern by providing sufficient protection that prevents the nonconsensual dissemination of information. This Comment argues that, in its reliance on the Privacy Act, the Court improperly ignored the distinction between compelled collection of information and dissemination of information—and how both threaten a right to informational privacy
    • 

    corecore