computer privacy
Recently Published Documents


TOTAL DOCUMENTS

19
(FIVE YEARS 2)

H-INDEX

3
(FIVE YEARS 1)

2019 ◽  
Vol 22 (8) ◽  
pp. 1414-1436 ◽  
Author(s):  
Alex Gekker ◽  
Sam Hind

This article proposes a new model of privacy: infrastructural surveillance. It departs from Agre’s classic distinction between surveillance and capture by examining the sociotechnical claims of connected and autonomous vehicles (CAVs) as requiring totalising surveillance of passengers and environment in order to operate. By doing so, it contributes to the ongoing debate on the commodification and platformisation of life, paying attention to the under-explored infrastructural requirements of certain digital technologies, rather than its business model. The article addresses four distinct characteristics of infrastructural surveillance: the aggregation of data, initialisation of protocols limiting possible actions, the prioritisation of distributed modes of governance and the enclosure of the driver in a personalised bubble of sovereign power. Ultimately, unlike previous modes of computer privacy in which activities are being constructed in real time from a set of institutionally standardised parts specified by a captured ontology, we observe the creation of new ontologies.


Academe ◽  
2004 ◽  
Vol 90 (1) ◽  
pp. 6 ◽  
Author(s):  
Bill Shields
Keyword(s):  

Academe ◽  
2003 ◽  
Vol 89 (5) ◽  
pp. 39
Author(s):  
Martha McCaughey

2001 ◽  
Vol 36 (12) ◽  
pp. 2-32
Author(s):  
Ken Hausman
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document