3,131 research outputs found

    Surveillance and falsification implications for open source intelligence investigations

    Get PDF
    © 2015 ACM. Legitimacy of surveillance is crucial to safeguarding validity of OSINT data as a tool for law-enforcement agencies

    Don't judge a book by its cover. factitious disorder imposed on children-report on 2 cases

    Get PDF
    Factitious Disorder Imposed on Another (FDIA), also known as Munchausen Syndrome by Proxy (MSbP) is a very serious form of child abuse. The perpetrator, usually the mother, invents symptoms or causes real ones in order to make her child appear sick. Usually this is due to a maladaptive disorder or to an excessive of attention-seeking on her part. We report here two new cases of FDIA. The first one is a 9-year-old boy with a history of convulsive episodes, reduced verbal production, mild psychomotor disorder and urological problems who underwent several invasive procedures and hospitalizations before a diagnosis of FDIA was made. The second is a 12 year-old girl with headache, abdominal pain, lipothymic episodes, seizures and a gait impairment, who was hospitalized in several hospitals before an FDIA was diagnosed

    Narcissus to a Man: Lifelogging, Technology and the Normativity of Truth

    No full text
    The growth of the practice of lifelogging, exploiting the capabilities provided by the exponential increase in computer storage, and using technologies such as SenseCam as well as location-based services, Web 2.0, social networking and photo-sharing sites, has led to a growing sense of unease, articulated in books such as Mayer-Schönberger's Delete, that the semi-permanent storage of memories could lead to problematic social consequences. This talk examines the arguments against lifelogging and storage, and argues that they seem less worrying when placed in the context of a wider debate about the nature of mind and memory and their relationship to our environment and the technology we use

    The Rhetoric of Surveillance in Post-Snowden Background Investigation Policy Reform

    Get PDF
    abstract: In June 2013, United States (US) government contractor Edward Snowden arranged for journalists at The Guardian to release classified information detailing US government surveillance programs. While this release caused the public to decry the scope and privacy concerns of these surveillance systems, Snowden's actions also caused the US Congress to critique how Snowden got a security clearance allowing him access to sensitive information in the first place. Using Snowden's actions as a kairotic moment, this study examined congressional policy documents through a qualitative content analysis to identify what Congress suggested could “fix” in the background investigation (BI) process. The study then looked at the same documents to problematize these “solutions” through the terministic screen of surveillance studies. By doing this interdisciplinary rhetorical analysis, the study showed that while Congress encouraged more oversight, standardization, and monitoring for selected steps of the BI process, these suggestions are not neutral solutions without larger implications; they are value-laden choices which have consequences for matters of both national security and social justice. Further, this study illustrates the value of incorporating surveillance as framework in rhetoric, composition, and professional/technical communication research.Dissertation/ThesisDoctoral Dissertation English 201

    Terms of Engagement: When Academe meets Military

    Get PDF

    Politics and the attack on FDR's economists : from the grand alliance to the Cold War

    Get PDF
    US government economists in the later years of the administration of Franklin Roosevelt were urged to treat the Soviet Union as an ally, in the interests of winning World War II and establishing the basis for peaceful cooperation after the war. The onset of the Cold War and the subsequent rise of McCarthyism sullied the reputations of many of them, especially the two most prominent: Lauchlin Currie (chief economist in the White House) and Harry Dexter White (chief economist in the Treasury). Close examination of the parallels between these two seemingly disparate cases reveals that recent attempts to revive the charges are no more firmly based than those of the early 1950s

    Design of Surveillance Technologies and Privacy Concerns

    Get PDF
    Researchers from numerous management, social sciences and psychological disciplines have attempted to investigate the phenomenon of surveillance and the way it influences privacy concerns among individuals. But no study has attempted to interpret the relationship between individuals’ perception of surveillance technologies and the way they react to surveillance and develop their privacy concerns. We conduct a review of 207 prominent IT journals within the Scopus databases to examine and interpret individuals’ perception of different designs of surveillance technologies (non-obtrusive vs. obtrusive) and how such technologies influence privacy concerns at individual, corporate and societal level. Our review suggests that both non-obtrusive (automatic) and obtrusive (self-input) surveillance are used at individual, corporate and societal level differentially. In the light of our findings, we identify research gaps, propose recommendations, and further opportunities for future research that will enrich academic discourse in IS and create value for corporate firms, government and policy makers

    SHOULD THE GOVERNMENT OF BELIZE CONSIDER USING EMERGING TECHNOLOGY AS A BETTER WAY OF MANAGING ITS BORDER?

    Get PDF
    As the world evolves and becomes more complex, border protection has become increasingly crucial for the safety of a nation. Belize’s investment in border security has continuously been a topic of interest since its independence in 1981. This thesis investigates whether the use of emerging technology will assist the government of Belize in creating a better method of managing security at its border. It found that countries using the technology might have advantages countering transnational criminal organizations and managing their borders. Using biometrics and sensors (ground and aerial) to detect and deter cross-border illegalities on Belize’s western border might help to control that border. It is recommended that Belize do further research and analysis into the use of emerging border technology and plan and prepare to implement the technology.Major, ArmyApproved for public release. Distribution is unlimited
    • 

    corecore