Second Generation Biometrics and the Future of Geosurveillance: A Minority Report on FAST
暂无分享,去创建一个
[1] David Swanlund,et al. Resisting geosurveillance: A survey of tactics and strategies for spatial privacy , 2019 .
[2] Manuel J. Marín-Jiménez,et al. Automatic Learning of Gait Signatures for People Identification , 2016, IWANN.
[3] F. Keller,et al. Epistemological Foundation of Biometrics , 2012 .
[4] Harrison Smith,et al. In the “Service” of Migrants: The Temporary Resident Biometrics Project and the Economization of Migrant Labor in Canada , 2014 .
[5] Graeme F. Bonham-Carter. Spatial Data Models , 1994 .
[6] Rachel Hall. Of Ziploc Bags and Black Holes: The Aesthetics of Transparency in the War on Terror , 2007 .
[7] Emilio Mordini,et al. Second Generation Biometrics: The Ethical, Legal and Social Context , 2012 .
[8] Hidefumi Nishiyama. Towards a Global Genealogy of Biopolitics: Race, Colonialism, and Biometrics beyond Europe , 2015 .
[9] Sharon Weinberger. Terrorist 'pre-crime' detector field tested in United States , 2011 .
[10] H. Murray. Monstrous Play in Negative Spaces: Illegible Bodies and the Cultural Construction of Biometric Technology , 2007 .
[11] R. Gonzales. Dark matters: on the surveillance of blackness , 2016 .
[12] Shoshana Amielle Magnet,et al. When Biometrics Fail: Gender, Race, and the Technology of Identity , 2011 .
[13] Louise Amoore,et al. Algorithmic War: Everyday Geographies of the War on Terror , 2009 .
[14] I. V. D. Ploeg. Security in the Danger Zone: Normative Issues of Next Generation Biometrics , 2012 .
[15] Louise Amoore,et al. Security and the incalculable , 2014 .
[16] Margit Sutrop,et al. From Identity Verification to Behavior Prediction: Ethical Implications of Second Generation Biometrics , 2012 .
[17] Lucas D. Introna. Algorithms, Governance, and Governmentality , 2016 .
[18] Louise Amoore,et al. Biometric borders: Governing mobilities in the war on terror , 2006 .
[19] Jouni Häkli. Biometric identities , 2007 .
[20] Tara S Rodgers,et al. Stripping for the State , 2012 .
[21] Michael Grüninger,et al. Introduction , 2002, CACM.
[22] M. Amir,et al. In-secure identities: On the securitization of abnormality , 2018 .
[23] Emilio Mordini,et al. The Transparent Body: Medical Information, Physical Privacy and Respect for Body Integrity , 2012 .
[24] T. Mulqueen,et al. Securitizing Gender: Identity, Biometrics, and Transgender Bodies at the Airport , 2011 .
[25] Louise Amoore,et al. Taking People Apart: Digitised Dissection and the Body at the Border , 2009 .
[26] Alejandro Vélez. Insecure Identities. The Approval of a Biometric ID Card in Mexico , 2012 .
[27] Louise Amoore,et al. Smart Borders and Mobilities: Spaces, Zones, Enclosures , 2002 .
[28] Nicole Nguyen,et al. Chokepoint: Regulating US student mobility through biometrics , 2015 .
[29] Tony Doyle,et al. Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy , 2017, Inf. Soc..
[30] David Lyon,et al. Surveillance, Power and Everyday Life , 2009 .
[31] L. S. GODDARD,et al. What is Topology About? , 1964, Nature.
[32] Lauren Martin. Bombs, bodies, and biopolitics: securitizing the subject at the airport security checkpoint , 2010 .