Skip Nav Destination
Close Modal
Search Results for
surveillance
Update search
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Subjects
Journal
Article Type
Date
Availability
1-20 of 206 Search Results for
surveillance
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
1
Sort by
Journal Article
Social Text (2017) 35 (3 (132)): 1–16.
Published: 01 September 2017
...Laurel Ahnert This article interrogates artist Hasan Elahi’s claim that an increased supply of a surveillance commodity will decrease its demand, a premise that led to his web-based artwork Tracking Transience . As a form of “artveillance,” the website archives thousands of images documenting...
Journal Article
Social Text (2005) 23 (2 (83)): 1–19.
Published: 01 June 2005
...Richard Maxwell Richard Maxwell 2005 This content is made freely available by the publisher. It may not be redistributed or altered. All rights reserved. Surveillance: Work, Myth, and Policy
Go back to work...
Journal Article
Social Text (2005) 23 (2 (83)): 21–34.
Published: 01 June 2005
...Michael J. Shapiro Duke University Press 2005 This content is made freely available by the publisher. It may not be redistributed or altered. All rights reserved. Every Move You Make: Bodies, Surveillance, and Media
Every move you make, every vow you take...
Journal Article
Social Text (2005) 23 (2 (83)): 55–69.
Published: 01 June 2005
...Swati Ghosh Duke University Press 2005 Surveillance in Decolonized Social Space
THE CASE OF SEX WORKERS IN BENGAL
In depicting contemporary panopticism, Roy Boyne has identifi ed danger Swati Ghosh...
Journal Article
Social Text (2005) 23 (2 (83)): 71–83.
Published: 01 June 2005
...John Gilliom Duke University Press 2005 This content is made freely available by the publisher. It may not be redistributed or altered. All rights reserved. Resisting Surveillance
If you ever visit the remote hills...
Journal Article
Social Text (2005) 23 (2 (83)): 85–93.
Published: 01 June 2005
...Çağatay Topal Duke University Press 2005 Global Citizens and Local Powers
SURVEILLANCE IN TURKEY
The Basic Characteristics of MERNI˙S Çag˘atay...
Journal Article
Social Text (2023) 41 (1 (154)): 71–97.
Published: 01 March 2023
... of surveillance. The implications of these developments are attended to by interrogating the directions taken by DNA datafication in terms of both surveying and surveilling. At center stage is the question of the modulation of the individual's access—to countries and services—enabled by their datafication. Thus...
FIGURES
Journal Article
Social Text (2011) 29 (2 (107)): 67–97.
Published: 01 June 2011
... ID card since the establishment of Israel and suggests that modern-day ID cards in Palestine/Israel are physical and visible instruments of a widespread low-tech surveillance mechanism to control mobility and a principal means for discriminating, both positively and negatively, subjects' privileges...
Journal Article
Social Text (2014) 32 (3 (120)): 29–48.
Published: 01 September 2014
... serves as a widely recognized touchstone for this revivification of interest in the will. But the marshmallow test is more than a handy synecdoche for the cold new logic behind shrinking public services and the burgeoning apparatus of surveillance and accountability. It also shows how the sciences...
Journal Article
Social Text (2018) 36 (1 (134)): 61–63.
Published: 01 March 2018
...After Globalism Writing Group This essay discusses recent developments in black surveillance studies, science and technology studies (in particular the social life of DNA), and everyday practices of resistance and survival under segregation and policing. References Agard-Jones Vanessa...
Journal Article
Social Text (2018) 36 (3 (136)): 95–110.
Published: 01 September 2018
... not only bears the mark of these origins but also continues to transport its intrinsic antiblack racism and coloniality into new territories and social forms. In the conversation, we suggest that contemporary conceptions of surveillance, access, transparency, and improvement emerge from logistical...
Journal Article
Social Text (2017) 35 (4): 113–152.
Published: 01 December 2017
... the structuring principles of the center itself. Exile and forced domesticity have long linked sovereignty to the power to determine intimate life, and centuries-old practices of house arrest and diplomatic asylum have taken on new forms in recent decades in the wake of emerging surveillance technologies...
FIGURES
| View All (15)
Journal Article
Social Text (2021) 39 (2 (147)): 51–67.
Published: 01 June 2021
... of colonialism and slavery by offering portals into other space‐times. In Water Will (in Melody) , racialized assemblages break down from overuse and from glaring surveillance in the form of illumination. The last few minutes of the piece evoke an ambivalent postapocalyptic space‐time where darkness becomes...
FIGURES
Journal Article
Social Text (2020) 38 (1 (142)): 1–16.
Published: 01 March 2020
... collective work. However, because radical care is inseparable from systemic inequality and power structures, it can also be used to coerce subjects into new forms of surveillance and unpaid labor, to make up for institutional neglect, and even to position some groups against others, determining who is worthy...
Journal Article
Social Text (2020) 38 (1 (142)): 67–88.
Published: 01 March 2020
... confinement constitutes a site of neglect where women must fend for themselves to perform reproductive labor as a way to complete their sentence. This practice reveals new forms of social control and state surveillance in which judges, social workers, and penitentiaries determine which women are appropriate...
Journal Article
Social Text (2005) 23 (2 (83)): np.
Published: 01 June 2005
... 2005 Contents
Surveillance
Dossier Editor Richard Maxwell
Surveillance: Work, Myth, and Policy Richard Maxwell 1
Every Move You Make: Bodies, Surveillance, and Media
Michael J. Shapiro 21...
Journal Article
Social Text (2012) 30 (2 (111)): 1–20.
Published: 01 June 2012
... of images. I first consider a set of images that are
produced as a consequence of the surveillance of international transit in a
conscious attempt to detect the presence of illegalized migrants in places
where they have been excluded and where they cannot readily be seen. In
reading these images I...
Journal Article
Social Text (2010) 28 (4 (105)): 25–44.
Published: 01 December 2010
... of expanding “the use of writing as a
surveillance system.” He describes the chilling effect of such surveillance
on students and the nightmarish, Kafkaesque webs in which one might
be trapped. He also protests that even violent imaginings might have...
Journal Article
Social Text (2005) 23 (2 (83)): 35–53.
Published: 01 June 2005
...
a surveillance-camera video capturing the face of suspected hijacker
Mohamed Atta as he passed through an airport metal detector in Portland,
ME. Even more chilling to many security experts is the fact that, had the
right technology been in place, an image like that might have helped avert...
Journal Article
Social Text (2022) 40 (3 (152)): 37–59.
Published: 01 September 2022
...]), a mobile surveillance camera flutters on the outside of one home in Eastleigh, enabling visual entry through the windows. When the suspects move unexpectedly to a different home, the informant manages to deploy a mobile “fly” inside of this home. Viewers are then privy to the assembly of suspected...
FIGURES
1