5,611 research outputs found

    Sounds of the jungle: Re-humanizing the migrant

    Get PDF
    This article examines the cross-border tensions over migrant settlements dubbed ‘The Jungle’ in Calais. The Jungle, strongly associated with the unauthorized movement of migrants, became a physical entity enmeshed in discourses of illegality and violation of white suburbia. British mainstream media have either rendered the migrant voiceless or faceless, appropriating them into discourses of immigration policy and the violent transgression of borders. Through the case study, Calais Migrant Solidarity (CMS), we highlight how new media spaces can re-humanize the migrant, enabling them to tell their stories through narratives, images and vantage points not shown in the mainstream media. This reconstruction of the migrant is an important device in enabling proximity and reconstituting the migrant as real and human. This sharply contrasts with the distance framing techniques of mainstream media, which dehumanize and silence the migrant, locating the phenomenon of migration as a disruptive contaminant in civilized and ordered societies

    Eavesdropping Whilst You're Shopping: Balancing Personalisation and Privacy in Connected Retail Spaces

    Get PDF
    Physical retailers, who once led the way in tracking with loyalty cards and `reverse appends', now lag behind online competitors. Yet we might be seeing these tables turn, as many increasingly deploy technologies ranging from simple sensors to advanced emotion detection systems, even enabling them to tailor prices and shopping experiences on a per-customer basis. Here, we examine these in-store tracking technologies in the retail context, and evaluate them from both technical and regulatory standpoints. We first introduce the relevant technologies in context, before considering privacy impacts, the current remedies individuals might seek through technology and the law, and those remedies' limitations. To illustrate challenging tensions in this space we consider the feasibility of technical and legal approaches to both a) the recent `Go' store concept from Amazon which requires fine-grained, multi-modal tracking to function as a shop, and b) current challenges in opting in or out of increasingly pervasive passive Wi-Fi tracking. The `Go' store presents significant challenges with its legality in Europe significantly unclear and unilateral, technical measures to avoid biometric tracking likely ineffective. In the case of MAC addresses, we see a difficult-to-reconcile clash between privacy-as-confidentiality and privacy-as-control, and suggest a technical framework which might help balance the two. Significant challenges exist when seeking to balance personalisation with privacy, and researchers must work together, including across the boundaries of preferred privacy definitions, to come up with solutions that draw on both technology and the legal frameworks to provide effective and proportionate protection. Retailers, simultaneously, must ensure that their tracking is not just legal, but worthy of the trust of concerned data subjects.Comment: 10 pages, 1 figure, Proceedings of the PETRAS/IoTUK/IET Living in the Internet of Things Conference, London, United Kingdom, 28-29 March 201

    Terror from behind the keyboard: conceptualising faceless detractors and guarantors of security in cyberspace

    Get PDF
    By reflecting on active public-domain government documents and statements, this article seeks to develop securitisation theory’s articulation of the dichotomy between legitimate and illegitimate violence as it is reflected in British government policy. This dichotomy has (re)developed through a process wherein GCHQ and MI5 are portrayed as ‘faceless guarantors’ of security, in Manichean juxtaposition to the discursively-created phantom cyberterrorists, who are presented as ‘faceless detractors’ of security. It has previously been stated that the terrorism discourse associated with the present ‘War on Terror’ is attributed, in part, to mechanics of fantasy. I argue that, within the securitised discourse of cyberterrorism, the limits of fantasy possesses a murky nuance, which in turn, allows for a deeper - or at least more entrenched - securitisation. The official discourse surrounding the intelligence services’ online surveillance apparatus operates with a similar opaque quality, but this is upheld by securitising actors as a strength to be maintained

    Platform Neutrality: Enhancing Freedom of Expression in Spheres of Private Power

    Get PDF
    AbstractTroubling patterns of suppressed speech have emerged on the corporate internet. A large platform may marginalize (or entirely block) potential connections between audiences and speakers. Consumer protection concerns arise, for platforms may be marketing themselves as open, comprehensive, and unbiased, when they are in fact closed, partial, and self-serving. Responding to protests, the accused platform either asserts a right to craft the information environment it desires, or abjures responsibility, claiming to merely reflect the desires and preferences of its user base. Such responses betray an opportunistic commercialism at odds with the platforms’ touted social missions. Large platforms should be developing (and holding themselves to) more ambitious standards for promoting expression online, rather than warring against privacy, competition, and consumer protection laws. These regulations enable a more vibrant public sphere. They also defuse the twin specters of monopolization and total surveillance, which are grave threats to freedom of expression.</jats:p
    • …
    corecore