Listing 1 - 4 of 4 |
Sort by
|
Choose an application
The ebook edition of this title is Open Access and freely available to read online. The EU-funded PRO-RES Project aimed to produce a guidance framework that helps to deliver Responsible Research and Innovation (RRI). PRO-RES is a Horizon 2020 project coordinated by the European Science Foundation (ESF), involving 14 different partners across Europe. As one of a series of open access products of the Project, Ethical Issues in Covert, Security and Surveillance Research will be placed in the hands of policymakers and their advisors to offer practical and efficient ways to respond to the issues addressed. Understanding that the problem of covert research and surveillance research for security purposes have proven highly challenging for all research ethics appraisal services, the chapters here are valuable resources for expert reviewers, helping further the discussion of these complex ethical issues, and raising the standards applied to the process. Delivering an applied approach, and influencing where it counts, this volume showcases that it is only when the integrity of research is carefully pursued can users of the evidence produced be assured of its value and its ethical credentials.
Electronic surveillance --- Research --- Social Science, Privacy & Surveillance. --- Research methods: general. --- Moral and ethical aspects. --- Research ethics --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Remote sensing --- Research integrity;Covert research;Privacy;Ethical evidence;Ethics appraisal services;Ethical standards
Choose an application
They’ve been listening for longer than you think. A new history reveals how—and why. Wiretapping is nearly as old as electronic communications. Telegraph operators intercepted enemy messages during the Civil War. Law enforcement agencies were listening to private telephone calls as early as 1895. Communications firms have assisted government eavesdropping programs since the early twentieth century—and they have spied on their own customers too. Such breaches of privacy once provoked outrage, but today most Americans have resigned themselves to constant electronic monitoring. How did we get from there to here? In The Listeners, Brian Hochman shows how the wiretap evolved from a specialized intelligence-gathering tool to a mundane fact of life. He explores the origins of wiretapping in military campaigns and criminal confidence games and tracks the use of telephone taps in the US government’s wars on alcohol, communism, terrorism, and crime. While high-profile eavesdropping scandals fueled public debates about national security, crime control, and the rights and liberties of individuals, wiretapping became a routine surveillance tactic for private businesses and police agencies alike. From wayward lovers to foreign spies, from private detectives to public officials, and from the silver screen to the Supreme Court, The Listeners traces the long and surprising history of wiretapping and electronic eavesdropping in the United States. Along the way, Brian Hochman considers how earlier generations of Americans confronted threats to privacy that now seem more urgent than ever.
Electronic surveillance --- Wiretapping --- SOCIAL SCIENCE / Privacy & Surveillance (see also POLITICAL SCIENCE / Privacy & Surveillance) . --- Wire-tapping --- Eavesdropping --- Electronic security systems --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Remote sensing --- History. --- bugging. --- communications privacy. --- electronic eavesdropping. --- electronic espionage. --- electronic privacy. --- electronic surveillance. --- government surveillance. --- history of surveillance. --- snooping. --- spying. --- surveillance state. --- surveillance technology. --- telephone tapping.
Choose an application
Electronic surveillance --- Privacy, Right of. --- Africa, Southern --- Politics and government. --- Invasion of privacy --- Privacy, Right of --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Remote sensing --- Law and legislation
Choose an application
News headlines about privacy invasions, discrimination, and biases discovered in the platforms of big technology companies are commonplace today, and big tech's reluctance to disclose how they operate counteracts ideals of transparency, openness, and accountability. This book is for computer science students and researchers who want to study big tech's corporate surveillance from an experimental, empirical, or quantitative point of view and thereby contribute to holding big tech accountable. As a comprehensive technical resource, it guides readers through the corporate surveillance landscape and describes in detail how corporate surveillance works, how it can be studied experimentally, and what existing studies have found. It provides a thorough foundation in the necessary research methods and tools, and introduces the current research landscape along with a wide range of open issues and challenges. The book also explains how to consider ethical issues and how to turn research results into real-world change.
Data protection. --- Privacy, Right of. --- Electronic surveillance. --- Remote sensing --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Invasion of privacy --- Privacy, Right of --- Right of privacy --- Electronic data processing --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Law and legislation --- Electronic surveillance
Listing 1 - 4 of 4 |
Sort by
|