To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Since the Reagan era, American economic policy has amounted to self-colonization. Democratic majorities have consistently supported legal regimes that have enabled corporations to extract the lion’s share of the gains from trade from the public. For example, they have supported a corporate law regime that denies the public democratic control over the behavior of corporations and instead gives dictatorial powers to shareholders and managers. The Internet has made it even easier for firms to extract surpluses from consumers through surveillance and algorithmic pricing. One small contribution toward a project of decolonizing the public would be for consumers to obtain a property right in their personal information. This would allow them to claw back some of the surpluses that technology has taken from them.
Use Case 4 in Chapter 7 explores the regulation of MDTs in the context of employment monitoring under the General Data Protection Regulation (GDPR), the Equality Acquis, the Platform Work Directive (PWD), and the Artificial Intelligence Act (AIA). Article 88 GDPR serves as a useful foundation, supported by valuable guidance aimed at protecting employees from unlawful monitoring practices. In theory, most MDT-based practices discussed in this book are already prohibited under the GDPR. Additionally, the EU’s robust equality acquis can effectively address many forms of discrimination in this sector. The AIA reiterates some existing prohibitions related to MDT-based monitoring practices in the workplace. However, a core challenge in employment monitoring lies in ensuring transparency and enforcement. There has long been a call for a lex specialis for data protection in the employment context, which should include a blacklist of prohibited practices or processing operations, akin to the one found in the PWD. Notably, processing and inferring mind data should be included among the practices on this blacklist.
This chapter explores the prehistory of ambivalence as an embodied emotion related to human survival by examining the ambivalent reactions to plague law in Daniel Defoe’s Journal of the Plague Year (1722). Long before the word “ambivalence” appeared in English, Defoe depicts actions and thoughts that we now think of as “ambivalent.” In the face of a deadly plague that resulted in legal regulation enabling government surveillance, Defoe’s narrator shifts loyalties as restlessly as he shifts positions, ambivalently pivoting between loyalty to the larger community as represented by the law and pursuit of his own concerns. The chapter suggests that Defoe presents ambivalence as a mode of resistance to state surveillance and control that avoids the most extreme expression of resistance, that of suicide, or as eighteenth-century law construed it, “self-murder.” Ambivalence, often thought of as a self-defeating emotion, is represented as serving a protective function, creating space for individuals to resist legal authority, neither capitulating to state control nor exercising a fatal form of resistance.
How the Shepherd conceives of human–spirit relations leads me to examine two examples of the consequences of this entanglement of spirit possession and enslavement. I point first to how the holy spirit in the Shepherd functions similarly to the Roman enslaved overseer (vilicus) who represents the physically absent enslaver and surveils other enslaved persons. The Shepherd solves the problem that despotic writers (e.g., Cato, Columella) lament regarding how to guarantee that the vilicus is not mistaken for the absentee enslaver: God becomes both the enslaver and the vilicus, the ever-present surveillance over the enslaved through spirit possession. I also focus on one tricky passage in the Shepherd, a parable about an enslaved person working on a vineyard and its complex layers of interpretations offered by the Shepherd (Similitude 5), to better understand how the Shepherd conceptualizes the relationship between the holy spirit and the flesh that it treats as a vessel. I show how the Shepherd views enslavement to the holy spirit as a necessary risk for the enslaver, since the spirit can be polluted and defiled if the enslaved body in which it dwells is not constantly maintained.
The fast-paced evolution of emotion technology and neurotechnology, along with their commercial potential, raises concerns about the adequacy of existing legal frameworks. International organizations have begun addressing these technologies in policy papers, and initial legislative responses are underway. This book offers a comprehensive legal analysis of EU legislation regulating these technologies. It examines four key use cases frequently discussed in media, civil society, and policy debates: mental health and well-being, commercial advertising, political advertising, and workplace monitoring. The book assesses current legal frameworks, highlighting the gaps and challenges involved. Building on this analysis, it presents potential policy responses, exploring a range of legal instruments to address emerging issues. Ultimately, the book aims to offer valuable insights for legal scholars, policymakers, and other stakeholders, contributing to ongoing governance debates and fostering the responsible development of these technologies.
Electronic monitoring emerged as a common practice in the post pandemic telework. Whereas existing research has mainly focused on the effects of this work model on individual performance and well-being, it has overlooked how specific circumstances, such as new control dynamics, can influence employees’ behaviors. We cover this gap by investigating the relationship between electronic monitoring in telework – including its clarification by the organization and the access to data by employees – and psychological safety, which is associated with key performance behaviors such as learning, voice and knowledge-sharing. Quantitative data collected through an online survey with 382 hybrid and remote workers were analyzed. Results indicate no statistically significant differences in psychological safety levels between monitored and unmonitored groups. However, additional analyses suggest that how monitoring is implemented can be key to keeping psychological safety levels, resulting in actionable recommendations for managers and organizations to enhance telework implementation.
With its assessment of cases involving Oscar Wilde, Cindy Lee Garcia, Arne Svenson, and Hulk Hogan and analysis of authorial inquiries raised by slavery daguerreotypes, surveillance art, paparazzi photographs, revenge porn, and celebrity sex tapes, Chapter 1 identifies and critiques the problematic conflation of copyright’s authorship and fixation requirements that functions to deny performers property interests in creative works. Copyright’s authorship-as-fixation regime rests on a faulty premise, betrays copyright law’s role in recognizing and rewarding creativity, and denies authorial rights to a class of individuals – subjects – who provide significant original contributions to works within copyright’s traditional subject matter. Just as significantly, given the dramatic disparities in capital accumulation and control over the tools of creative production and continuing inequalities in the representation of women and persons of color behind the camera, the authorship-as-fixation doctrine has had far-reaching societal consequences by propertizing the white male gaze and giving legal bite to a system of production and ownership that imbues rightsholders with the power to control representations of female and non-white bodies.
This chapter takes aim at the assumption that affording special legal protections to journalists, beyond those enjoyed by the public, effectively limits law enforcement’s power to interfere with the press function. First, it describes how law enforcement often evades, violates, or simply ignores existing protections, raising questions about their effectiveness. Supporters of special protections from law enforcement might argue that the underinclusiveness of existing rules simply illustrates the need to update and expand these protections. But expanding procedural safeguards is unlikely to adequately protect the press function. Indeed, heightened press-specific rules might actually encourage law enforcement to use other substantive approaches to criminalize journalism and reporting and thus evade procedural protections. Amid broadening efforts to criminalize protest, trespass, and newsgathering, the substantive criminal law offers many possible avenues for law enforcement to crack down on critical reporting, threatening the checking function. This dynamic suggests that the press’s long-standing strategy of seeking procedural or narrow protections against law enforcement is misguided and ineffective. Instead, to ensure its autonomy and independence in the long run, the press should be a more active participant in seeking to limit law enforcement power and authority.
Extensive damage to over 1000 plant species, including food crops, oil and industrial crops, vegetables, fruit trees, ornamentals, fodder species and weeds, has been caused by emerging phytoplasma-mediated diseases, thereby posing significant threat to global food security. Multiple factors, including environmental changes, invasion pathways, vector transmission and the emergence of new pathogen lineages, contribute to the spread of these diseases. Effective management requires stable, long-term strategies to safeguard plant health. Key approaches include comprehensive loss assessments, integration of climate change impacts, predictive modelling, enhanced disease surveillance, and improved detection techniques targeting phytoplasmas. This review highlights phytoplasma-associated plant diseases, emerging pathogen threats, and the factors facilitating their spread, alongside methods for surveillance and detection. In addition, case studies and global collaborative efforts are discussed. Finally, we outline future research priorities aimed at improving the management of phytoplasma-induced plant diseases.
Monkeypox (mpox) has re-emerged as global public health concern including in several non-endemic countries. This study aims to characterize monkeypox virus (MPXV) genomes in Indonesia, to explore viral evolution and transmission. Genomic analysis was conducted on 53 isolates from Indonesian mpox patients between 2023 and 2024. All sequences belonged to Clade IIb, with identified sub-clades including A.1.1, B.1, B.1.3, and C.1 – of which C.1 became dominant during this period. Out of 87 mpox-confirmed cases, 60.9% (53/87) were successfully sequenced and submitted to the Global Initiative on Sharing All Influenza Data (GISAID). The majority of cases in Indonesia occurred among males (95.4%), men who have sex with men (59.8%), and people living with HIV/AIDS (71.3%). Notably, a large portion of cases had no travel history, suggesting local transmission. Initially, only clade IIb (B.1) was detected in October 2022. By August 2023, lineage diversity had increased, with B.1.3 and C.1 emerging as the predominant sub-clades. A time–calibrated phylogenetic tree revealed genetic relatedness and shared ancestry within clade IIb. Integrating genomic and epidemiological data offers valuable insights to improve mpox surveillance and public health response in Indonesia and the broader region
The production of knowledge in public health involves a systematic approach that combines imagination, science, and social justice, based on context, rigorous data collection, analysis, and interpretation to improve health outcomes and save lives. Based on a comprehensive understanding of health trends and risk factors in populations, research priorities are established. Rigorous study design and analysis are critical to establish causal relationships, ensuring that robust evidence-based interventions guide beneficial health policies and practice. Communication through peer-reviewed publications, community outreach, and stakeholder engagement ensures that insights are co-owned by potential beneficiaries. Continuous monitoring and feedback loops are vital to adapt strategies based on emerging outcomes. This dynamic process advances public health knowledge and enables effective interventions. The process of addressing a complex challenge of preventing HIV infection in young women in sub-Saharan Africa, a demographic with the least social power but the highest HIV risk, highlights the importance of inclusion in knowledge generation, enabling social change through impactful science.
This chapter considers the influential argument that there is a formal and substantive complicity between disciplinary surveillance and the novel, specifically the realist novel. Foucauldian readings of literature argue that the nineteenth-century realist novel functioned as a kind of disciplinary power, acting as a complement to the spatial technologies of a disciplinary society. This argument has not been readily acknowledged by the spatial turn in literary studies, but this chapter revisits the disciplinary theme in Dickens’ David Copperfield and compares that novel to Thackeray’s Pendennis. Finding very different treatments of space, surveillance, and the self leads to a reassessment of Foucauldian criticism and the idea that the novel is complicit with disciplinary spatiality. As Bildungsromans, Pendennis and David Copperfield have many similarities, but whereas Dickens plays up the themes of disciplinary introspection and an internalised form of carceral surveillance, Thackeray’s hero remains subject only to a worldly form of discipline, including the business of literature itself. Thackeray moreover suggests that prisons are a microcosm of society rather than that the techniques of the prison extend to a disciplinary spatiality. The chapter concludes that literature exhibits and exemplifies different kinds of spatiality and different versions of the carceral imaginary.
Surveillance by clinical epidemiology teams for invasive fungal infections (IFIs) in healthcare settings can be challenging due to several factors including low sensitivity of noninvasive conventional microbiologic diagnostics, nonspecific clinical presentation, and complex patient populations. Recently, availability of microbial cell-free DNA testing (cfDNA) via the Karius Test has shown promise for increased diagnostic sensitivity of IFIs. However, how to best incorporate cfDNA results into IFI surveillance remains a vexing challenge. Herein, we provide perspectives on the benefits and challenges of use of cfDNA for IFI surveillance.
This chapter illustrates the rise of automated decision-making and surveillance technologies in government, alongside the growing political inequality within Western liberal democracies. It examines the historical development of the use of technology in government, from paper-based systems to increasingly networked electronic systems, culminating in the extensive use of automation and AI in government. It demonstrates the effect of new technologies on vulnerable populations, honing in on social security as a case study. It shows that since the 1970s, the rapid advancements of technologies, combined with the “new public management” ideology, have effected fundamental changes in the processes, structures, staffing levels, and operations of government to an unprecedented extent. To illustrate the significant issues relating to the use of automated government decision-making, the chapter focuses on the government’s use of automation in social security as a case study.
Wildlife health surveillance is a rapidly evolving field. The goal of this commentary is to share the authors perspectives on the evolving expectations of wildlife health surveillance. We describe the basis for developing our opinions using multiple information sources including a narrative literature review, convenience samples of websites and conversations with experts. With increasing prominence of wildlife health, expectations for surveillance have increased. Situational awareness and threat or vulnerability detection were expected outputs. Action expectation themes included knowledge mobilization, reliable action thresholds and evidence-based decision making. Information expectations were broad and included the need for information on social and ecological risk drivers and impacts and evaluation of surveillance systems. Surveillance systems developers should consider: (1) What methods can equivalently and reliably manage the biases, uncertainties and ambiguities of wildlife health information; (2) How surveillance and intelligence systems support acceptable, ethical, efficient and effective actions that do not generate unintended consequences; and (3) How to generate evidence to show that surveillance and intelligence systems lead to decisions affecting vulnerability or resilience to endemic health threats, emerging diseases, climate change and other conservation threats.
This chapter considers how the right to freedom of thought should be viewed in circumstances of injustice. Specifically, we discuss whether the right not to reveal thoughts, the right not to be punished for thoughts, or the right not to have thoughts impermissibly altered, should ever be overridden. Examples include whether histories of genocide can justify surveillance of antisemitic or racist attitudes, whether access to thoughts may be helpful in proving intent to discriminate, and whether internet privacy protections should yield in the face of uses of social media in ways that further structural injustice. The chapter concludes that defences of freedom of thought as an ideal may be less convincing in situations of significant injustice or threats of violence.
The right to freedom of thought is enshrined in Article 32(1) of Kenya’s 2010 Constitution. This right aims to facilitate democratic discourse, critical thinking, and societal progress. However, despite its constitutional protection, the right remains underdeveloped statutorily, in judicial decisions, and in academic literature. Ambiguity persists in defining and qualifying violations of this right, as no court has thus far engaged in a comprehensive analysis to establish its content and scope. Instead, it has been intertwined with discussions on the scope, application, and limitations of freedoms of expression, religion, belief, and opinion, being regarded as the essential inner element necessary for the exercise of these freedoms. This chapter examines the scope of the right to freedom of thought in Kenya and the importance of recognising it as an independent right, despite its interconnectedness with the aforementioned freedoms. Ensuring this recognition allows citizens to develop their own set of ideals and belief systems without facing coercion to disclose their thoughts, punishment for holding certain thoughts, impermissible alteration of their thoughts, or a lack of an enabling environment to hold and express their thoughts. To establish this, the chapter explores the historical and legal framework of the right to freedom of thought in Kenya and examines its interplay with related constitutional rights such as freedom of expression, belief, religion, and opinion. It addresses contemporary issues, including the impact of technology, surveillance, and cancel culture on freedom of thought. Recommendations are then made on its applicability and how courts and academics can navigate the complexities surrounding its scope, content, and limitations.
Early detection and active management of invasive group A Streptococcus (iGAS) infection outbreaks are essential. Here, we describe the changing epidemiology of outbreaks of iGAS in England between 2015 and 2019, a period of increasing incidence of iGAS infection. Data on iGAS infections were extracted from national public health management records and laboratory records. Outbreaks were described in size, duration, setting, and emm type. Overall, 194 outbreaks were identified, and reports increased each year, from 16 outbreaks in 2015 to 61 in 2019. The median outbreak size was 3 cases (n = 37; 19%), with 27% of outbreaks recording 4–10 cases (n = 53) and 7% recording more than 10 cases (n = 13). Outbreak duration ranged from 0 to 170 weeks (median 7). Settings of outbreaks changed over the study period, with increasing numbers observed in multiple settings. This study provides new insights into the changing burden of iGAS infection and outbreaks in England.
System avoidance refers to the tendency of individuals who are concerned about formal social control (e.g., incarceration, immigration enforcement, or the removal of children from their families) to avoid surveilling institutions that engage in recordkeeping. While this research locates concerns about formal social control in an individual’s sanctionable status, the laws, policies, and practices that generate the threat of formal social control vary across space and time. Drawing on theories of legal consciousness, this article posits that spatial and temporal variation in the threat of formal social control has differential associations with whether and to what degree individuals with a sanctionable status report involvement in surveilling institutions. Our empirical case is U.S. immigration policing, which burdens Latinos across citizenship statuses. We link individual-level data on institutional involvement from the American Time Use Survey with administrative data on immigration policing across state-years. Results from double-hurdle models show that Latinos in state-years with higher rates of immigration policing (1) are less likely to report involvement in surveilling institutions but, (2) conditional on any involvement, do not vary in the time reported involved. We evaluate variations by nativity, citizenship status, institution, and the presence of sanctuary policies that circumscribe immigration policing. We conclude that the threat of formal social control across space and time implicates the situational meanings of institutional involvement for subordinated populations.
Validate a public health model identifying patients at high risk for carbapenem-resistant Enterobacterales (CRE) on admission and evaluate performance across a healthcare network.
Design:
Retrospective case-control studies
Participants:
Adults hospitalized with a clinical CRE culture within 3 days of admission (cases) and those hospitalized without a CRE culture (controls).
Methods:
Using public health data from Atlanta, GA (1/1/2016–9/1/2019), we validated a CRE prediction model created in Chicago. We then closely replicated this model using clinical data from a healthcare network in Atlanta (1/1/2015–12/31/2021) (“Public Health Model”) and optimized performance by adding variables from the healthcare system (“Healthcare System Model”). We frequency-matched cases and controls based on year and facility. We evaluated model performance in validation datasets using area under the curve (AUC).
Results:
Using public health data, we matched 181 cases to 764,408 controls, and the Chicago model performed well (AUC 0.85). Using clinical data, we matched 91 cases to 384,013 controls. The Public Health Model included age, prior infection diagnosis, number of and mean length of stays in acute care hospitalizations (ACH) in the prior year. The final Healthcare System Model added Elixhauser score, antibiotic days of therapy in prior year, diabetes, admission to the intensive care unit in prior year and removed prior number of ACH. The AUC increased from 0.68 to 0.73.
Conclusions:
A CRE risk prediction model using prior healthcare exposures performed well in a geographically distinct area and in an academic healthcare network. Adding variables from healthcare networks improved model performance.