2013 IEEE International Symposium on Technology and Society (ISTAS): Social Implications of Wearable Computing and Augmediated 2013
DOI: 10.1109/istas.2013.6613126
|View full text |Cite
|
Sign up to set email alerts
|

The inevitability of the transition from a surveillance-society to a veillance-society: Moral and economic grounding for sousveillance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 26 publications
0
6
0
1
Order By: Relevance
“…Sousveillance, loosely defined as the vulnerable watching the powerful, coveillance (côtéveillance or soveillance or sociaveillance or mediaveillance), loosely defined as the side-to-side gaze between peers via social media and the like, and metaveillance, loosely defined as the sensing of sensors and the sensing of their capacity to sense, are relatively recent concepts emerging around the generalized idea of "veillance," which is defined as purposeful sensing (Janzen and Mann 2014;Reynolds 2011;Bakir 2010;Mann 2002;Ali and Mann 2013;Ganascia 2010;Vertegaal and Shell 2008;Michael and Michael 2012;Bakir 2009;Fernback 2013;Reilly 2015;Cardullo 2014;Ali et al 2013a;Nolan, Mann, and Wellman 2008;Ali et al 2013b. Weber 2012a, 2012bMortensen 2014;Quessada 2010;Manders 2013;Cammaerts 2015).…”
Section: Englishmentioning
confidence: 99%
“…Sousveillance, loosely defined as the vulnerable watching the powerful, coveillance (côtéveillance or soveillance or sociaveillance or mediaveillance), loosely defined as the side-to-side gaze between peers via social media and the like, and metaveillance, loosely defined as the sensing of sensors and the sensing of their capacity to sense, are relatively recent concepts emerging around the generalized idea of "veillance," which is defined as purposeful sensing (Janzen and Mann 2014;Reynolds 2011;Bakir 2010;Mann 2002;Ali and Mann 2013;Ganascia 2010;Vertegaal and Shell 2008;Michael and Michael 2012;Bakir 2009;Fernback 2013;Reilly 2015;Cardullo 2014;Ali et al 2013a;Nolan, Mann, and Wellman 2008;Ali et al 2013b. Weber 2012a, 2012bMortensen 2014;Quessada 2010;Manders 2013;Cammaerts 2015).…”
Section: Englishmentioning
confidence: 99%
“…Sousveillance advocates argue for a type of radical transparency (Brin 1997;Ali & Mann 2013). If the problem with big data algorithms is the constant monitoring and surveillance of our activities by economic and political elites, then the solution is to turn the surveillance technology back on those economic and political elites.…”
Section: -Embrace Sousveillance Technologiesmentioning
confidence: 99%
“…Implanted personal computing removes the need to carry so many portable gadgets, reducing the chance of street muggings. Likewise, embedded camera and sound recording technology would further support this, as sousveillence typically reduces extortion [45]. Ubiquitous computing and sensing would be an effective way to reduce terrorist activities and perhaps reduce the impact of successful attacks by aiding recovery and identification of missing persons during disaster scenarios.…”
Section: Technology Opportunitiesmentioning
confidence: 99%