19 results on '"Self-Surveillance"'
Search Results
2. Zuckerberg, get out of my uterus! An examination of fertility apps, data-sharing and remaking the female body as a digitalized reproductive subject
- Author
-
Rachael Louise Healy
- Subjects
business.industry ,media_common.quotation_subject ,05 social sciences ,Internet privacy ,food and beverages ,Health technology ,050109 social psychology ,Subject (documents) ,Fertility ,Self-Surveillance ,Gender Studies ,Data sharing ,Arts and Humanities (miscellaneous) ,Work (electrical) ,050903 gender studies ,mental disorders ,0501 psychology and cognitive sciences ,Sociology ,0509 other social sciences ,business ,Social Sciences (miscellaneous) ,media_common - Abstract
This paper explores the rise of fertility apps and what data-sharing in this arena can mean for app users. The paper offers a brief background of some available fertility apps, how they work and wh...
- Published
- 2020
- Full Text
- View/download PDF
3. ‘There’s only so much data you can handle in your life’: accommodating and resisting self-surveillance in women’s running and fitness tracking practices
- Author
-
Katelyn Esmonde
- Subjects
Health (social science) ,Social Psychology ,Computer science ,business.industry ,Gender relations ,05 social sciences ,Internet privacy ,Physical fitness ,Physical Therapy, Sports Therapy and Rehabilitation ,030229 sport sciences ,Self-Surveillance ,03 medical and health sciences ,0302 clinical medicine ,0502 economics and business ,Tracking (education) ,business ,050212 sport, leisure & tourism - Abstract
The widespread use of Fitbits, Garmins and Apple Watches is emblematic of the ‘Quantified Self’ (QS) movement, where participants utilise digital self-tracking devices to generate a broad range of ...
- Published
- 2019
- Full Text
- View/download PDF
4. Visibility, Visuality, and Mass (Self)Surveillance
- Author
-
William A. Callahan
- Subjects
Computer science ,business.industry ,Visibility (geometry) ,Internet privacy ,business ,Self-Surveillance - Abstract
Chapter 11 addresses a crossover domain in which images and artifacts co-exist in surveillance. It turns the question of visibility around: not just what we see, but how we are seen, including how we are constituted through various gazes. While most analyses of surveillance look to technology and security, this chapter explores the “culture of surveillance,” in which surveillance is an interactive practice of social-ordering and world-ordering. It traces the politics of surveillance through an analysis of historical and social trends in China and Euro-America: the pre-modern society of sovereignty, the modern society of discipline, and the contemporary networked society of control. It thus compares how surveillance provokes censorship, self-discipline, and creative social-ordering. Chapter 11 concludes that these are political rather than technical or cultural issues, and that they pose problems for both democratic societies and authoritarian states. It thus uses non-Western concepts and experiences to explore the sensible politics of visual artifacts.
- Published
- 2020
- Full Text
- View/download PDF
5. Assembling the ‘Fitbit subject’: A Foucauldian-sociomaterialist examination of social class, gender and self-surveillance on Fitbit community message boards
- Author
-
Shannon Jette and Katelyn Esmonde
- Subjects
Male ,Health (social science) ,business.industry ,Internet privacy ,Subject (philosophy) ,Fitness Trackers ,030204 cardiovascular system & hematology ,Social class ,Self-Surveillance ,Power (social and political) ,03 medical and health sciences ,Sex Factors ,0302 clinical medicine ,Social Class ,Work (electrical) ,Humans ,Message board ,Female ,030212 general & internal medicine ,Tracking (education) ,Sedentary Behavior ,business ,Psychology ,Exercise ,Risk management - Abstract
The rise of fitness-tracking devices such as the Fitbit in personal health and wellness is emblematic of the use of data-gathering health and fitness technologies by institutions to create a surveillance regime. Using postings on Fitbit community message boards and the theoretical frames of Michel Foucault and sociomaterialist scholars, the goal of this article is to analyse the experiences of those who choose to self-track using a Fitbit and the constellation of barriers and facilitators (human and non-human) related to social class and gender that enable and constrain one’s ability to use a Fitbit as intended. First, we examine the social class assumptions of Fitbit as a risk management tool in the workplace, illustrating what elements must come together – both human and non-human – to create an environment that enables walking throughout the workday to combat the risks of sedentary work. Second, we explore the ways that Fitbit users ‘confessed’ to their past inactivity and how gendered home labour differently enables and constrains some of the users’ abilities to act on their confessions. Ultimately, one’s ability to engage in the idealized use of the Fitbit in the minds of its users, or what we term the ‘Fitbit subject assemblage’, is structured by numerous material and social factors that must be taken into account when examining the mechanics of power in fitness tracking.
- Published
- 2018
- Full Text
- View/download PDF
6. Survival of the (Data) Fit : Self-Surveillance, Corporate Wellness, and the Platformization of Healthcare
- Author
-
Vassilis Charitsis, Centre for Consumer Society Research, and Helsinki Inequality Initiative (INEQ)
- Subjects
Gerontology ,business.industry ,Survival of the fittest ,05 social sciences ,050801 communication & media studies ,06 humanities and the arts ,217 Medical engineering ,0603 philosophy, ethics and religion ,Self-Surveillance ,3. Good health ,Urban Studies ,0508 media and communications ,Health care ,060301 applied ethics ,512 Business and Management ,business ,Safety Research ,Socioeconomic inequalities - Abstract
© The author(s), 2019. The emergence and proliferation of smart sensor technologies has enabled the self-tracking of everyday life in an unprecedented manner as the logic of quantification and datafication extends to diverse aspects of life, including education, work, and healthcare. This development is epitomized by the numerous corporate wellness programs that are based on the use of self-tracking tools. Faced with increased competition, Fitbit, one of the most popular brands in wearable self-tracking devices, recently launched the Fitbit Care platform. Its aim is to establish itself as the leading actor in employee corporate wellness programs by providing comprehensive offerings that include self-tracking tools, apps, digital interventions, and personalized health coaching. Focusing on the Fitbit Care platform, this paper examines the intersection of self-surveillance, corporate wellness, and healthcare, highlighting the socioeconomic inequalities propagated by the ideology of dataism that privileges those who are able to engage in activities that generate desirable data.
- Published
- 2019
7. The Internet of Things and Self-Surveillance Systems
- Author
-
Steven I. Friedland
- Subjects
Web of Things ,business.product_category ,business.industry ,Internet privacy ,The Internet ,Internet appliance ,business ,Internet of Things ,Self-Surveillance - Published
- 2017
- Full Text
- View/download PDF
8. ‘When This You See’: The (anti) radical time of mobile self-surveillance
- Author
-
Sarah Bay-Cheng
- Subjects
Visual Arts and Performing Arts ,business.industry ,media_common.quotation_subject ,Internet privacy ,Art ,business ,Self-Surveillance ,media_common - Published
- 2014
- Full Text
- View/download PDF
9. (Self-) surveillance and (self-) regulation: living by fat numbers within and beyond a sporting culture
- Author
-
Dawn Penney and Jennifer Ann McMahon
- Subjects
Health (social science) ,Self-management ,Social Psychology ,biology ,Multimedia ,Athletes ,business.industry ,Self ,Physical Therapy, Sports Therapy and Rehabilitation ,Gender studies ,Autoethnography ,biology.organism_classification ,computer.software_genre ,Self-Surveillance ,Power (social and political) ,Medicine ,Narrative ,business ,computer ,Discipline - Abstract
This paper utilises Foucault's theory of disciplinary power and concepts of surveillance, regulation and technologies of the self. The concepts are used to explore practices that we associate with the notion of swimmers ‘living by fat numbers' during their competitive swimming careers as adolescents and post-career as adult women. Extracts from narrative accounts generated via in-depth interviews are presented and analysed utilising some Foucauldian concepts relating to power and surveillance. The paper illustrates the ways in which fat, weight and food numbers are a focus of surveillance and regulation by others and by swimmers themselves. Particular thinking and practices relating to the body, weight, food and performance are shown to become embedded, accepted and normalised within a sporting culture and be sustained beyond it some 10–30 years on. The paper raises issues for those within and beyond sporting cultures to engage with; relating to the enduring long-term impact of the normalisation of body p...
- Published
- 2013
- Full Text
- View/download PDF
10. Vehicle Self-Surveillance
- Author
-
Ian Markwood and Yao Liu
- Subjects
021110 strategic, defence & security studies ,Computer science ,business.industry ,Patrolling ,020208 electrical & electronic engineering ,0211 other engineering and technologies ,02 engineering and technology ,Computer security ,computer.software_genre ,Self-Surveillance ,0202 electrical engineering, electronic engineering, information engineering ,Global Positioning System ,business ,computer - Abstract
Motor vehicles are widely used, quite valuable, and often targeted for theft. Preventive measures include car alarms, proximity control, and physical locks, which can be bypassed if the car is left unlocked, or if the thief obtains the keys. Reactive strategies like cameras, motion detectors, human patrolling, and GPS tracking can monitor a vehicle, but may not detect car thefts in a timely manner. We propose a fast automatic driver recognition system that identifies unauthorized drivers while overcoming the drawbacks of previous approaches. We factor drivers' trips into elemental driving events, from which we extract their driving preference features that cannot be exactly reproduced by a thief driving away in the stolen car. We performed real world evaluation using the driving data collected from 31 volunteers. Experiment results show we can distinguish the current driver as the owner with 97% accuracy, while preventing impersonation 91% of the time.
- Published
- 2016
- Full Text
- View/download PDF
11. Jade the obscure: celebrity death and the mediatised maiden
- Author
-
Amy West and Misha Kavka
- Subjects
Cultural Studies ,Literature ,business.industry ,media_common.quotation_subject ,Taboo ,Media studies ,Art ,Brother ,JADE (particle detector) ,Self-Surveillance ,Reality tv ,Girl ,business ,media_common - Abstract
In early 2009 the British tabloid and broadsheet media were consumed with the impending death of reality TV star Jade Goody. Goody, an under-educated working-class girl transformed into a media personality by UK's Big Brother, had already been at the centre of two major media controversies: one in 2002 for her tabloid vilification and recuperation during Big Brother 3 and again in 2007 for using racist language against a housemate on Celebrity Big Brother. Her medical diagnosis of advanced cervical cancer, however, shifted the controversy in terms of magnitude: filming a reality TV show for Living TV during her treatment and rapid decline, Goody was accused of ‘selling her illness’ to the media and even of intending to die on television, the ultimate taboo. These programmes were widely reviled by commentators as the nadir in Goody's mutually exploitative relationship with celebrity media, but we argue that the Jade series is a structurally groundbreaking programme in which real time and television time be...
- Published
- 2010
- Full Text
- View/download PDF
12. Viewpoint: Keeping a Close Watch – The Rise of Self-Surveillance and the Threat of Digital Exposure
- Author
-
Kingsley L. Dennis
- Subjects
Close watch ,Video recording ,Sociology and Political Science ,business.industry ,Sousveillance ,Virtual space ,Computer security ,computer.software_genre ,Self-Surveillance ,Key (cryptography) ,The Internet ,Sociology ,business ,computer - Abstract
Digital technologies have given rise to increased occurrences of self-surveillance and forms of ‘virtual vigilantism’. This has progressed from key moments such as the video recording of the Rodney King incident, to recording human rights abuses, to citizen grassroots surveillance. From this has emerged the phenomenon known as citizen journalism where recent urban crises have been recorded on mobile phones by the individuals involved. Also on the increase are forms of mob vigilantism, or ‘participatory panopticon’; examples here include phone images spread over the Internet as severe forms of ‘community punishment’. I argue that these unmediated forms of bottom-up surveillance – sousveillance – show the early signs of a new type of civil responsibility that stands unregulated and without restraint. This paper addresses the issues of increased individualised self-surveillance and asks whether this is the consequence of a personalised resistance to an ever increasing surveillance society.
- Published
- 2008
- Full Text
- View/download PDF
13. Cultural Production as Self-Surveillance: Making the Right Impression
- Author
-
Gordon Downie
- Subjects
business.industry ,Materials Chemistry ,Production (economics) ,Public relations ,business ,Psychology ,Self-Surveillance ,Impression - Published
- 2008
- Full Text
- View/download PDF
14. EVMS Self-Surveillance of Remote Handled Low Level Waste (RHLLW) Project
- Author
-
Maxine Johnson, Rick Staten, Doug Parker, Kimberly Case, Michael L. Nelson, Scott taylor, and Linda Hergesheimer
- Subjects
Engineering ,Documentation ,business.industry ,Low-level waste ,Operations management ,Project management ,business ,Self-Surveillance ,Earned value management - Abstract
DOE G 413.3-10A, Section 3.a states: “The Contractor has primary responsibility for implementing and maintaining a surveillance program to ensure continued compliance of the system with ANSI/EIA-748B. DOE O 413.3B requires the FPD to ensure the contractor conducts a Self-Surveillance annually. This annual Self-Surveillance,…should cover all 32 guidelines of the ANSI/EIA748B. Documentation of the Self-Surveillance is sent to the CO and the PMSO (copy to OECM) confirming the continued compliance of their EVMS ANSI/EIA748B...” This review, and the associated report, is deemed to satisfy this requirement.
- Published
- 2013
- Full Text
- View/download PDF
15. Italian Euromelanoma Day Screening Campaign (2005-2007) and the planning of melanoma screening strategies
- Author
-
Stefano Calvieri, Pietro Quaglino, Andrea Peserico, Franco Marsili, Biagio Guarneri, Paolo Valentini, Mara Lombardi, Giampiero Girolomoni, Chiara Ferrari, Giuseppe Micali, Gino A. Vena, Elisa Benati, Claudio Fracchiolla, Stefania Seidenari, Ketty Peris, Anna Lanzoni, Sergio Schiavon, Marcello Santini, Fabio Arcangeli, Giovanni Ponti, Torello Lotti, Paola Tribuzi, Giusto Trevisan, Giovanni Borroni, Annarosa Virgili, Gianfranco Altomare, Antonio Mariotti, Camillo Tonino, Giuseppe Albertini, Giuseppe Gaddoni, Maria Grazia Bernengo, Sergio Chimenti, Aurora Parodi, Stefania Borsari, Nicola Aste, Francesco Cusano, Maria Rita Bongiorno, Seidenari, S, Benati, E, Ponti, G, Borsari, S, Ferrari, C, Albertini, G, Altomare, G, Arcangeli, F, Aste, N, Bernengo, MG, Bongiorno, MR, Borroni, G, Calvieri, S, Chimenti, S, Cusano, F, Fracchiolla, C, Gaddoni, G, Girolomoni, G, Guarneri, B, Lanzoni, A, Lombardi, M, Lotti, T, Mariotti, A, Marsili, F, Micali, G, Parodi, A, Peris, K, Peserico, A, Quaglino, P, Santini, M, Schiavon, S, Tonino, C, Trevisan, G, Tribuzi, P, Valentini, P, Vena, GA, Virgili, A, S., Seidenari, E., Benati, G., Ponti, S., Borsari, C., Ferrari, G., Albertini, G., Altomare, F., Arcangeli, N., Aste, M. G., Bernengo, M. R., Bongiorno, G., Borroni, S., Calvieri, S., Chimenti, F., Cusano, C., Fracchiolla, G., Gaddoni, G., Girolomoni, B., Guarneri, A., Lanzoni, M., Lombardi, T., Lotti, A., Mariotti, F., Marsili, G., Micali, A., Parodi, K., Peri, A., Peserico, P., Quaglino, M., Santini, S., Schiavon, C., Tonino, Trevisan, Giusto, P., Tribuzi, P., Valentini, G., Vena, and A., Virgili
- Subjects
Program evaluation ,Male ,Cancer Research ,Skin Neoplasms ,Time Factors ,Epidemiology ,Basal Cell ,prevention ,Risk Factors ,self-surveillance ,80 and over ,Settore MED/35 - Malattie Cutanee E Veneree ,Medicine ,Mass Screening ,melanoma screening campaign ,Melanoma prevention strategy, Melanoma risk factors, Melanoma screening campaign, Self-surveillance, Skin cancer ,Family history ,Young adult ,Child ,Melanoma ,Aged, 80 and over ,education.field_of_study ,Nevus, Pigmented ,skin cancer ,Middle Aged ,MALIGNANT MELANOMA ,screening ,Prognosis ,Oncology ,Italy ,melanoma ,risk factors ,prognosis ,Child, Preschool ,Carcinoma, Squamous Cell ,Female ,Adult ,medicine.medical_specialty ,Adolescent ,Population ,melanoma prevention strategy ,melanoma risk factors ,Young Adult ,Pigmented ,Humans ,Preschool ,education ,Nevus ,Socioeconomic status ,Mass screening ,Aged ,business.industry ,Carcinoma ,Public Health, Environmental and Occupational Health ,melanoma risk factor ,Infant ,medicine.disease ,Dermatology ,Squamous Cell ,Carcinoma, Basal Cell ,Self-Examination ,Skin cancer ,business ,Program Evaluation - Abstract
Although no study has definitively shown that unfocused screening of skin cancer is effective, many campaigns have been organized with the aim of increasing awareness on melanoma risk factors. The objective of this study was to analyse the results of the Skin Cancer Screening Day in Italy during the period 2005-2007, to determine the priorities for melanoma control plans in a Mediterranean country. A total of 5002 patients were screened by dermatologists in 31 cities. Individuals who considered themselves to have many naevi and those with a family history of melanoma showed a higher number of common and atypical naevi. Ten melanomas, 20 basal cell carcinomas and two squamous cell carcinomas were histopathologically confirmed. Our observations provide the following suggestions for melanoma prevention strategies: (a) an unfocused campaign is suitable to inform the public about the importance of self-examination of the skin, but is not useful to identify a larger number of melanomas; and (b) melanoma screening campaigns should focus on a selected population, which meets rigorous risk criteria to maintain higher cost-effectiveness. The financial support to effective melanoma screening programmes could be increased, especially in southern populations where lower levels of self-surveillance and socioeconomic conditions represent risk factors for late identification of melanoma.
- Published
- 2012
16. Self-surveillance privacy & the Personal Data Guardian
- Author
-
Jerry Kang
- Subjects
Government ,Information privacy ,business.industry ,Emerging technologies ,Internet privacy ,Cloud computing ,Cryptography ,Computer security ,computer.software_genre ,Self-Surveillance ,Corporation ,Guardian ,business ,computer - Abstract
We often see the government or the corporation as the greatest threat to information privacy. But due to a nascent data practice called “self-surveillance,” the greatest threat may actually come from ourselves. Using various existing and emerging technologies, such as GPS-enabled smartphones, we are beginning voluntarily to measure ourselves in granular detail - how long we sleep, where we go, what we breathe, what we eat, how we spend our time. And we are storing these data casually in the “cloud,” and giving third-parties broad access. This practice of self-surveillance will decrease information privacy in troubling ways. To counter this trend, we recommend the creation of the Personal Data Guardian, a new professional who manages Personal Data Vaults, which are repositories for self-surveillance data.
- Published
- 2011
- Full Text
- View/download PDF
17. Self-Surveillance Privacy
- Author
-
Mark Hansen, Jeff Burke, Jerry Kang, Katie Shilton, and Deborah Estrin
- Subjects
Engineering ,Information privacy ,Privacy by Design ,business.industry ,Privacy software ,Privacy policy ,Internet privacy ,Information technology ,Information privacy law ,Computer security ,computer.software_genre ,Trade secret ,information technology ,self-surveillance ,Guardian ,internet privacy ,business ,Law ,computer - Abstract
It has become cliche to observe that new information technologies endanger privacy. Typically, the threat is viewed as coming from Big Brother (the government) or Company Man (the firm). But for a nascent data practice we call "self-surveillance," the threat may actually come from ourselves. Using various existing and emerging technologies, such as GPS-enabled smartphones, we are beginning to measure ourselves in granular detail - how long we sleep, where we drive, what we breathe, what we eat, how we spend our time. And we are storing these data casually, perhaps promiscuously, somewhere in the "cloud," and giving third-parties broad access. This data practice of self-surveillance will decrease information privacy in troubling ways. To counter this trend, we recommend the creation of the Privacy Data Guardian, a new profession that manages Privacy Data Vaults, which are repositories for self-surveillance data. In Part I, we describe the emerging data practice of self-surveillance, which has been enabled by various new measurement and communication technologies. We explain how self-surveillance can produce substantial benefits to both the individual and society, in both intrinsic and instrumental terms. Unfortunately, such benefits may never be achieved without substantial privacy costs. Part II makes threshold clarifications about those privacy costs. It proffers two different metrics by which privacy might be measured and explains why the rise of self-surveillance will entail the net loss of privacy under either metric. We also point out that the problem of self-surveillance (our surveilling us) is, fortunately, more tractable than related privacy problems, such as third-party surveillance of us and our surveillance of third-parties. Having cleared this brush, we turn to our central proposal - the creation of the Personal Data Guardian, a professional whose job it is to maintain a client’s self-surveillance data in a Personal Data Vault. In addition to providing technical specifications of this approach, we outline the specific legal relations, which include a fiduciary relationship, between client and Guardian. In addition, we recommend the creation of an evidentiary privilege, similar to a trade secret privilege, that protects self-surveillance data held by a licensed Guardian. Finally, Part IV answers objections that our solution is implausible or useless. We conclude by pointing out that various legal, technological, and self-regulatory attempts at safeguarding privacy from new digital, interconnected technologies have not been particularly successful. Before self-surveillance becomes a widespread practice, some new innovation is needed. In our view, that innovation is a new "species," the Personal Data Guardian, created through a fusion of law and technology and released into the current information ecosystem.
- Published
- 2010
- Full Text
- View/download PDF
18. (Self-)Surveillance, Anti-Doping, and Health in Non-Elite Road Running
- Author
-
April Henning
- Subjects
medicine.medical_specialty ,biology ,business.industry ,Athletes ,Energy (esotericism) ,Alternative medicine ,Public relations ,biology.organism_classification ,Self-Surveillance ,Urban Studies ,Power (social and political) ,Law ,Elite ,Medicine ,business ,Enforcement ,Safety Research ,Discipline - Abstract
This article explores disciplining effects of current anti-doping surveillance systems on the health consequences of non-elites’ daily behaviors and habits. As they are left out of direct anti-doping testing and enforcement, it is tempting to argue non-elites are unaffected by anti-doping efforts focused on the elite level of their sport. However, it is because they are not subject to anti-doping surveillance systems nor forced to comply with anti-doping regulations that non-elites are implicated within the wider arena of disciplinary power that envelops both elite and non-elite athletes and anti-doping agencies (Foucault 1979). Drawing on data from 28 interviews with non-elite runners I argue these runners do conform to the rules and norms of their sport as far as they understand them, but their knowledge of banned substances is inadequate and many non-elite runners have only a superficial and sometimes incorrect understanding of doping. Many view doping and its associated health risks as a problem only of elite running, as well as a problem limited to only a handful of widely publicized performance enhancing drugs or doping methods. As a result of these misunderstandings non-elite runners are vulnerable to negative health effects of over the counter (OTC) medications and nutritional supplements, which they view as “safe” and part of normal training as a result of the current elite surveillance model of anti-doping. The recent death of a non-elite marathon runner linked to use of the unregulated energy supplement DMAA demonstrates, questionable products are used by runners who may not be fully aware of the risks of use.
19. [Untitled]
- Subjects
History ,020205 medical informatics ,Health management system ,business.industry ,media_common.quotation_subject ,Medicine (miscellaneous) ,02 engineering and technology ,Self-Surveillance ,humanities ,Weighting ,03 medical and health sciences ,0302 clinical medicine ,Law ,Agency (sociology) ,Weight management ,0202 electrical engineering, electronic engineering, information engineering ,Medicine ,030212 general & internal medicine ,Social science ,Domestication ,business ,Function (engineering) ,media_common - Abstract
Histories of late nineteenth- and early twentieth-century medicine emphasise the rise of professional and scientific authority, and suggest a decline in domestic health initiatives. Exploring the example of weight management in Britain, we argue that domestic agency persisted and that new regimes of measurement and weighing were adapted to personal and familial preferences as they entered the household. Drawing on print sources and objects ranging from prescriptive literature to postcards and ‘personal weighing machines’, the article examines changing practices of self-management as cultural norms initially dictated by ideals of body shape and function gradually incorporated quantified targets. In the twentieth century, the domestic management of health—like the medical management of illness—was increasingly technologised and re-focused on quantitative indicators of ‘normal’ or ‘pathological’ embodiment. We ask: in relation to weight, how did quantification permeate the household, and what did this domestication of bodily surveillance mean to lay users?
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.