To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Digital surveillance technologies using artificial intelligence (AI) tools such as computer vision and facial recognition are becoming cheaper and easier to integrate into governance practices worldwide. Morocco serves as an example of how such technologies are becoming key tools of governance in authoritarian contexts. Based on qualitative fieldwork including semi-structured interviews, observation, and extensive desk reviews, this chapter focusses on the role played by AI-enhanced technology in urban surveillance and the control of migration between the Moroccan–Spanish borders. Two cross-cutting issues emerge: first, while international donors provide funding for urban and border surveillance projects, their role in enforcing transparency mechanisms in their implementation remains limited; second, Morocco’s existing legal framework hinders any kind of public oversight. Video surveillance is treated as the sole prerogative of the security apparatus, and so far public actors have avoided to engage directly with the topic. The lack of institutional oversight and public debate on the matter raise serious concerns on the extent to which the deployment of such technologies affects citizens’ rights. AI-enhanced surveillance is thus an intrinsically transnational challenge in which private interests of economic gain and public interests of national security collide with citizens’ human rights across the Global North/Global South divide.
Ellen Balka, Simon Fraser University, British Columbia,Ina Wagner, Universität Siegen, Germany,Anne Weibert, Universität Siegen, Germany,Volker Wulf, Universität Siegen, Germany
This chapter reflects on some of the challenges surrounding the broader context of design. Strengthening intersectionality in systems design requires data not just concerning women but also gender minorities, that can be shared and analyzed; it requires ‘finding’ those who should be part of research and creating safe spaces for them. A feminist perspective encourages to prioritize the ‘personal’, recognizing it as a political act of resistance. At the heart of gender equality is the collective dimension of women’s citizenship and their social capital. Alliances in support of gender/social justice in design need to be built using strategies such as participatory infrastructuring and ‘institutioning’ but also acknowledging the importance of feminist trade unionism. The final points raised in this chapter are: how to connect with moves to decolonize discourses and practices of IT design; how to take a feminist perspective with regard to teaching; how to get funded and published; and how to challenge the business models of the software industry that undermine technical flexibility and make gender-sensitive design approaches difficult to implement on a larger scale.
This chapter provides an introductory overview of the recent emergence of facial recognition technologies (FRTs) into everyday societal contexts and settings. It provides valuable social, political, and economic context to the legal, ethical, and regulatory issues that surround this fast-growing area of technology development. In particular, the chapter considers a range of emerging ‘pro-social’ applications of FRT that have begun to be introduced across various societal domains - from the application of FRTs in retail and entertainment, through to the growing prevalence of one-to-one ID matching for intimate practices such as unlocking personal devices. In contrast to this seemingly steady acceptance of FRT in everyday life, the chapter makes a case for continuing to pay renewed attention to the everyday harms of these technologies in situ. The chapter argues that FRT remains a technology that should not be considered a benign addition to the current digital landscape. It is technology that requires continued critical attention from scholars working in the social, cultural, and legal domains.
State actors in Europe, in particular security authorities, are increasingly deploying biometric methods such as facial recognition for different purposes, especially in law enforcement, despite a lack of independent validation of the promised benefits to public safety and security. Although some rules such as the General Data Protection Regulation and the Law Enforcement Directive are in force, a concrete legal framework addressing the use of facial recognition technology (FRT) in Europe does not exist so far. Given the fact that FRT is processing extremely sensitive personal data, does not always work reliably, and is associated with risks of unfair discrimination, a general ban on any use of artificial intelligence for automated recognition of human features at least in publicly accessible spaces has been demanded. Against this background, the chapter adopts a fundamental rights perspective, and examines whether and to what extent a government use of FRT can be accepted under European law.
In situations ranging from border control to policing and welfare, governments are using automated facial recognition technology (FRT) to collect taxes, prevent crime, police cities and control immigration. FRT involves the processing of a person's facial image, usually for identification, categorisation or counting. This ambitious handbook brings together a diverse group of legal, computer, communications, and social and political science scholars to shed light on how FRT has been developed, used by public authorities, and regulated in different jurisdictions across five continents. Informed by their experiences working on FRT across the globe, chapter authors analyse the increasing deployment of FRT in public and private life. The collection argues for the passage of new laws, rules, frameworks, and approaches to prevent harms of FRT in the modern state and advances the debate on scrutiny of power and accountability of public authorities which use FRT. This book is also available as Open Access on Cambridge Core.
This book brings together the vast research literature about gender and technology to help designers understand what a gender perspective and a focus on intersectionality can contribute to designing information technology systems and artifacts, and to assist organizations as they work to develop work cultures that are supportive of women and marginalized genders and people. Drawing on empirical and analytical studies of women's work and technology in many parts of the world, the book addresses how to make invisible aspects of work visible; how to recognize women's skills without falling into the trap of gender stereotyping; how to engage in improving working conditions; and how to defend care of life situations and needs against a managerial logic. It addresses challenges for design, including many overlooked and undervalued aspects, such as the complexities involved in human–machine interactions, as well as the need to create safe spaces for research subjects.
Information literacy research is growing in importance, as evidenced by the steady increase in dissertations and research papers in this area. However, significant theoretical gaps remain.
Information Literacy Through Theory provides an approachable introduction to theory development and use within information literacy research. It provides a space for key theorists in the field to discuss, interrogate and reflect on the applicability of theory within information literacy research, as well as the implications for this work within a variety of contexts. Each chapter considers a particular theory as its focal point, from information literacy and the social to information literacy through an equity mindset, and unpacks what assumptions the theory makes about key concepts and the ways in which the theory enables or constrains our understanding of information literacy.
This book will provide a focal point for researchers, practitioners and students interested in the creation and advancement of conceptually rich information literacy research and practice.
The book shows how humor has changed since the advent of the internet: new genres, new contexts, and new audiences. The book provides a guide to such phenomena as memes, video parodies, photobombing, and cringe humor. Included are also in-depth discussions of the humor in phenomena such as Dogecoin, the joke currency, and the use of humor by the alt-right. It also shows how the cognitive mechanisms of humor remain unchanged. Written by a well-known specialist in humor studies, the book is engaging and readable, but also based on extensive scholarship.
This chapter establishes an explicit link between foreign aid inflows and development indicators classified in the multidimensional setting of the SDGs. This linkage is not a black box as it takes advantage of the model’s causal chains describing budget allocations and indicator performance. First, we create counterfactuals by removing aid flows. Hence, we can estimate aid impacts and assess their statistical significance at the indicator or country levels during the first decade of the 21st century. Second, we produce a validation exercise comparing our results with econometric evidence found in a well-known sector-level study (access and sanitation of water) using a subset of our data.
This chapter introduces a model in which a government allocates financial resources across several policy issues (development dimensions), and a set of public servants (or agencies) that, through government programmes, transform public spending into policy outcomes. We start by describing the macro-level dynamics and the relevant equations involved. Then, we introduce a political economy game between the government and its officials (or public servants). First, we describe the public servants’ decision making in an environment of uncertainty through reinforcement learning. Second, we elaborate on the problem of the government (or central authority) and how we can specify its heuristic strategy. Finally, we provide an overview of the entire structure of the model.
This chapter elaborates on the calibration and validation procedures for the model. First, we describe our calibration strategy in which a customised optimisation algorithm makes use of a multi-objective function, preventing the loss of indicator-specific error information. Second, we externally validate our model by replicating two well-known statistical patterns: (1) the skewed distribution of budgetary changes and (2) the negative relationship between development and corruption. Third, we internally validate the model by showing that public servants who receive more positive spillovers tend to be less efficient. Fourth, we analyse the statistical behaviour of the model through different tests: validity of synthetic counterfactuals, parameter recovery, overfitting, and time equivalence. Finally, we make a brief reference to the literature on estimating SDG networks.
This chapter introduces the reader to the problem of policy prioritisation and why quantitative/computational analytic frameworks are much needed. We explain the various academic- and policy-oriented motivations for developing the Policy Priority Inference research programme. We apply this computational framework in the study of the SDGs and the feasibility of the 2030 Agenda of sustainable development.
This chapter formulates an analytical toolkit that incorporates an intricate – yet realistic – chain of causal mechanisms to explain the expenditure–development relationship. First, we explain several reasons why we take a complexity perspective for modelling the expenditure–development link and why we choose agent-based modelling as a suitable tool for assessing policy impacts in sustainable development. Second, we introduce the concept of social mechanisms and explain how we apply them to measure the impact of budgetary allocations when systemic effects are relevant. Third, we compare different concepts of causality and explain the advantages of an account that simulates counterfactual scenarios where policy interventions are absent.