As part of the evaluation of an experimental programme of surveillance of institutions for the semi‐independent and frail elderly using the RAF method, an examination was made of the licensing status, quality of care, and completeness of the surveillance process. Included in the examination were 126 institutions which underwent the surveillance process between 1990 and 1993. Aims to investigate whether the RAF method of surveillance was being implemented in a professional and uniform manner. Concludes that surveyors’ recommendations to grant or not grant a licence were usually based on findings about the quality of care. Nevertheless, in order to reinforce the relationship between licensing and quality of care, it was suggested that surveyors be given clear criteria of quality on which to base their recommendations regarding conditional licensing. It was found that the surveillance process is indeed implemented uniformly in long‐term care institutions of varying quality.
Summarizes the UK′s food chemical surveillance programme. This programme is an extensive series of checks, tests and analyses (approximately 130,000 per annum) designed to monitor the safety and quality of the UK′s food supply. The paper describes the scale of the programme and its management through the Steering Group on Chemical Aspects of Food Surveillance (SGCAFS) and its 11 working parties‐which cover the wide range of food surveillance activities including chemical contaminants, natural toxicants, nutrition, food additives, radionuclides and authenticity. Although the programme′s results are generally reassuring, important information is produced on emerging potential problems. Provides examples where this surveillance has enabled these potential problems to be identified and appropriate remedial action taken. Describes the extensive publication of surveillance data through the Food Surveillance Paper series (HMSO) and reports on the recent Ministerial decision for the rapid publication of the most important food surveillance data.
This chapter provides an analysis of images produced and employed in protests against surveillance in Germany in 2008 and 2009. For this purpose, a method of visual…
This chapter provides an analysis of images produced and employed in protests against surveillance in Germany in 2008 and 2009. For this purpose, a method of visual analysis is developed that draws mainly on semiotics and art history. Following this method, the contribution examines a selection of images (pictures and graphic design) from the anti-surveillance protests in three steps: description of components, detection of conventional signs, and contextual analysis. Furthermore, the analysis compares the images of the two major currents of the protest (liberal and radical left) in order to elucidate the context in which images are created and used. The analysis shows that images do not merely illustrate existing political messages but contribute to movements’ systems of meaning creation and transportation. The two currents in the protests communicate their point of view through the images both strategically and expressively. The images play a crucial role in formulating groups’ different strategies as well as worldviews and identities. In addition, the analysis shows that the meaning of images is contested and contextual. Images are produced and received in specific national as well as issue contexts. Future research should address the issue of context and reception in greater depth in order to further explore the effects of visual language on mobilization. Overall, the contribution demonstrates that systematic visual analysis allows our understanding of social movements’ aims, strategy, and collective identity to be deepened. In addition, visual analysis may provide activists with a tool to critically assess their visual communication.
Scholarship on the state control of social movements has predominately focused on overt repression, resulting in comparatively less attention to more covert forms of…
Scholarship on the state control of social movements has predominately focused on overt repression, resulting in comparatively less attention to more covert forms of control. Researchers have suggested that government surveillance of social movement organizations (SMOs) has become increasingly widespread and routinized in the post-September 11, 2001 era, but this hypothesis has remained untested. Since contemporary surveillance is grounded in a logic of information gathering that has diffused across law enforcement agencies since the September 11 attacks, government actors now cast a wide net and monitor a large variety of groups. This study shows that a result, traditional factors predicting surveillance, such as contentious behavior, have less explanatory power. Using a database of 409 SMOs active in Philadelphia between January 1996 and October 2009, the research asked who and why particular groups are monitored by the Pennsylvania Office of Homeland Security (PA-OHS) between November 2009 and September 2010. Bayesian logistic regression analysis is used to examine the variables predicting surveillance. Findings show that 23% of the SMOs in the sample were targets of surveillance. Organizational ideology was the strongest predictor and there was little evidence that history of contentious protests or previous conflict with the police influenced coming under surveillance. However, groups with less visibility in traditional media sources were more likely to be monitored.
The global financial crisis has magnified the role of Financial Sector Surveillance (FSS) in the International Monetary Fund's activities. This chapter surveys the various steps and initiatives through which the Fund has increasingly deepened its involvement in FSS. Overall, this process can be characterised by a preliminary stage and two main phases. The preliminary stage dates back to the 1980s and early 1990s, and was mainly related to the Fund's research and technical assistance activities within the process of monetary and financial deregulation embraced by several member countries. The first ‘official’ phase of the Fund's involvement in FSS started in the aftermath of the Mexican crisis, and relates to the international call to include financial sector issues among the core areas of Fund surveillance. The second phase focuses on the objectives of bringing the coverage of financial sector issues ‘up-to-par’ with the coverage of other traditional core areas of surveillance, and of integrating financial analysis into the Fund's analytical macroeconomic framework. By urging the Fund to give greater attention to its member countries' financial systems, the international community's response to the global crisis may mark the beginning of a new phase of FSS. The Fund's financial sector surveillance, particularly on advanced economies, is of paramount importance for emerging market and developing countries, as they are vulnerable to spillover effects from crises originated in advanced economies. Emerging market and developing economies, which constitute the majority of the Fund's 187 members, are currently the recipients of over 50 programmes of financial support from the Fund (including those of a precautionary nature), totalling over $250 billion.
An industry of description and interpretation has developed around the growth of surveillance, accelerated by: the development of the internet; volatile international relations since the collapse of communism; demographic mobility, segregation by class and ethnicity in the rich and poor worlds, sharpening inequalities, and post 9/11 fears of terrorism. Influential narratives have emphasised the diminishing power of sovereign nation-states in a marketised and globalised world. This chapter challenges the notion that coercive, sovereign modes of rule are a monarchical survival in decline. Rather, sovereign technologies of rule, in which surveillance is central involves strategies of governance from below as well as from above. They combine coercive with rhetorical, metaphorical communication and other ‘soft’ modes of rule. These make thinkable the nation-state as a discrete, defensible entity. Political communication translates between the complex technical expertise of evolving surveillance and security technologies and language intelligible to the public. Though surveillance technologies and information can be produced by commercial and other non-state sites of governance, metaphorically, much surveillance can be viewed as the extension of the eye of the sovereign. Although we are all targets of surveillance, those seen as threatening to the majority help to constitute and reproduce the social collectivity.
A compliance support system (CSS) aims to support employees' voluntary compliance activities, however, it requires a different approach from the continuous usage of other…
A compliance support system (CSS) aims to support employees' voluntary compliance activities, however, it requires a different approach from the continuous usage of other general information systems. This study first set up a research model based on information system (IS) continuance model to investigate the mechanism of continuance intention to use CSS. Then, this study aims to propose that the surveillance concern will undermine the process of forming beliefs and attitudes toward using CSS, consequently hindering continuance intention to use the system.
A questionnaire survey was conducted for the employees of a major Korean energy company that has run their own CSS for about three years. A total of 720 valid responses were analyzed by using partial least squares-based structural model technique. The respondents are classified into two groups: a high level and a low level of surveillance concern group.
The findings showed that continuance intention of using CSS is basically consistent with the IS continuance model. However, the relationship between satisfaction and continuance intention was found to be insignificant in a high surveillance concern group. In addition, multigroup analysis showed that surveillance concern negatively moderates certain relationships among variables, especially weakening the beliefs and attitudes toward using CSS.
This study has academic significance of broadening the domain of factors affecting continuance intention of using CSS by deeply delving into factors discouraging continuous use of a system. Furthermore, the findings of this study may serve as a practical guideline of alleviating surveillance concern, thereby encouraging employees to use CSS more actively and voluntarily.
Surveillance studies scholars have embraced Foucault's panopticon as a central metaphor in their analysis of online monitoring technologies, despite several architectural…
Surveillance studies scholars have embraced Foucault's panopticon as a central metaphor in their analysis of online monitoring technologies, despite several architectural incompatibilities between eighteenth and nineteenth century prisons and twenty-first century computer networks. I highlight a number of Internet features that highlight the limits of the electronic panopticon. I examine two trends that have been considerably underestimated by surveillance scholars: (1) the democratization of surveillance, where the distributed structure of the Internet and the availability of observation technologies has blurred the distinction between those who watch and those who are being watched, allowing individuals or marginalized groups to deploy sophisticated surveillance technologies against the state or large corporations; and (2) the resistance strategies that Internet users are adopting to curb the surveillance of their online activities, through blocking moves such as the use of cryptography, or masking moves that are designed to feed meaningless data to monitoring tools. I conclude that these two trends are neglected by a majority of surveillance scholars because of biases that make them dismiss the initiative displayed by ordinary users, assess positive and negative outcomes differently, and confuse what is possible and what is probable.
This chapter demonstrates that while in most late modern societies there is a neoliberal hegemony to expand police Closed-Circuit Television (CCTV) surveillance for crime…
This chapter demonstrates that while in most late modern societies there is a neoliberal hegemony to expand police Closed-Circuit Television (CCTV) surveillance for crime control and antiterrorism, in Greece there is serious controversy and resistance against the post-Olympic use of more than 1,200 Olympic CCTV cameras. Drawing on the interesting politics of CCTV expansion and resistance, the chapter traces the reasons why, in the Greek context, this very expensive Olympic surveillance “dowry” has been opposed, even for traffic control. It critically attributes Greek citizens’ fear and mistrust primarily to their past police-state experience of authoritarian, thought-control surveillance.
We live in an age of unparalleled access to personal data. Technological advances that seem second nature today allow for the mass accumulation of personal information by…
We live in an age of unparalleled access to personal data. Technological advances that seem second nature today allow for the mass accumulation of personal information by even the smallest of companies. The same technology also can be used directly by the state to accumulate mass information on its citizens. In the hands of government law enforcement officials, these surveillance advances also can be used to greatly enhance the state’s ability to exercise social control – a circumstance that has both positive and negative connotations. This chapter discusses the increasingly important confluence of privacy rights, surveillance, and social control as seen from a constitutional standpoint.
After years of limiting the expectations of privacy that citizens may have in their day-to-day lives, several recent Supreme Court decisions have attempted to take account of the privacy expectations held by individuals in today’s ever-evolving technological world, and in doing so have limited the ability of law enforcement to engage in surveillance without first obtaining a warrant. Yet more needs to be done. Specifically, the author argues that the law of standing must be updated to permit judicial claims by individuals who challenge the legality and constitutionality of comprehensive surveillance programs.