The Intensification of Surveillance : (Record no. 87461)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 11314nam a22005533i 4500 |
001 - CONTROL NUMBER | |
control field | EBC3386368 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | MiAaPQ |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240729125417.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d | |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240724s2003 xx o ||||0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781849641746 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9780745319957 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (MiAaPQ)EBC3386368 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (Au-PeEL)EBL3386368 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (CaPaEBR)ebr10479914 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (CaONFJC)MIL987828 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)53977689 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | MiAaPQ |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | MiAaPQ |
Modifying agency | MiAaPQ |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | JC596 -- .I58 2003eb |
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 363.25/2 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Ball, Kirstie. |
245 14 - TITLE STATEMENT | |
Title | The Intensification of Surveillance : |
Remainder of title | Crime, Terrorism and Warfare in the Information Age. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | London : |
Name of producer, publisher, distributor, manufacturer | Pluto Press, |
Date of production, publication, distribution, manufacture, or copyright notice | 2003. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Date of production, publication, distribution, manufacture, or copyright notice | ©2003. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (180 pages) |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Intro -- Contents -- 1 The Intensification of Surveillance -- Kirstie Ball and Frank Webster 2 Surveillance after September 11, 2001 -- David Lyon 3 Data Mining and Surveillance in the Post- 9/ -- Environment -- Oscar H. Gandy 4 Joined- up Surveillance: The Challenge to Privacy -- Charles D. Raab 5 They Don t Even Know We re There : The Electronic Monitoring of Offenders in England and Wales -- Mike Nellis 6 Information Warfare, Surveillance and Human Rights -- Frank Webster 7 Mapping out Cybercrimes in a Cyberspatial Surveillant Assemblage -- David S. Wall 8 The Constant State of Emergency? : Surveillance after 9/ 11 -- David Wood, Eli Konvitz and Kirstie Ball Notes on Contributors -- Bibliography -- Index -- Abrams, P. 16-17 -- Accrue 33 -- ACLU 148 -- advertising, and data mining techniques -- 30 -- 34 -- 38-9 -- Afghanistan -- 94 -- 102 -- 103 -- 104 -- 105 -- 106 -- 108 -- airport security -- 16 -- 18 -- 142-3 -- al-Qaeda 99 -- Amnesty International 107 -- Amoco 40-1 -- Amsterdam airport 18 -- anti-terrorist legislation -- 16 -- 17-18 -- 21-2 -- 35 -- 60 -- APACS [Association for Payment Clearing Services] 133 -- Arendt, Hannah 17 -- arms manufacturers, and civilian market 145-6 -- ARPANET 145 -- Association of Chief Officers of Probation [ACOP] 65 -- asylum seekers, ID cards -- 18 -- 142 -- Automated Socio-Technical Environments [ASTEs] 142 -- aviation accidents, analysis of 31 -- AWACS aircraft -- 90 -- 104 -- Balkans War [1999] -- 94 -- 102 -- 103 -- 107-8 -- Baudrillard, J. -- 23 -- 105 -- Bauman, Z. -- 17 -- 72 -- 144 -- Bentham, Jeremy -- 5 -- 112 -- bin Laden, Osama -- 16 -- 99 -- biometric ID -- 59 -- 142 -- Blair, Tony 108 -- Bloomfield, B. -- 78-9 -- 81 -- Bogard, W. 23 -- Booth, Cherie 9 -- Boothby, Robert 97 -- Bosnia 107 -- Brain Fingerprinting 143 -- Braverman, H. 9-10 -- Brenner, S. 113 -- Bulger, Jamie, murder of 141. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | C3I [command, control, communi-cations and intelligence] 101 -- Cambodia 94 -- Cameron, James 94 -- Canada 17-18 -- Canadian Immigration Card 18 -- CARNIVORE 18 -- Castells, M. 102 -- categorical care -- 7 -- 8 -- categorical exposure -- 7 -- 8-9 -- categorical seduction -- 7 -- 8 -- categorical suspicion -- 7-8 -- 22 -- CCTV -- 9 -- 16 -- 19 -- 20 -- 22 -- 23 -- 77 -- 144 -- 148 -- change in emphasis -- 73-4 -- 81 -- 83 -- and civic disqualification 74 -- and managerialism 74 -- and managerialism 81 -- see also electronic monitoring [EM] of offenders Computer Assisted Passenger Pre-Screening [CAPPS] 143 -- Cherkasky, M.G. 18 -- Cherry, Claire 40 -- Chile -- 94 -- 109 -- China -- 10 -- 108 -- Chubb 70 -- CIA 143 -- civil liberties -- 15 -- 61 -- 72 -- Clementine Service 33 -- Clinton, Bill -- 9 -- 107 -- Committee on Women's Imprisonment 69-70 -- Communications Security Establishment, Canada 17-18 -- Communism, collapse of -- 92 -- 97 -- 102 -- 107 -- Communities of Practice 149 -- community penalties -- 67 -- 69-70 -- 73-6 -- 79 -- Computer Emergency Response Team [CERT] 131 -- Conservative government, and electronic monitoring of offenders -- 62 -- 64 -- 65 -- Convict.Net 129 -- credit card transactions -- 1-2 -- 28 -- 30 -- crime -- 2-3 -- and impact of Internet 114-16 -- and impact of Internet 117-18 -- law enforce-ment Crime and Disorder Act 50 -- law enforce-ment Crime and Disorder Act 51 -- organized 8 -- organized 114 -- traditional 118-19 -- cross-selling 33 -- Crovitz, L. 36 -- curfew orders -- 64 -- 65 -- 66 -- 67 -- 69 -- 74 -- Custodial Care National Training Organisation 71 -- customer relationship management [CRM] 33-4 -- cyber-terrorism -- 115 -- 116 -- 117 -- 120 -- 121 -- cybercrimes -- 112-13 -- 121 -- 132 -- 140-1 -- analysis of behaviours 114-16 -- and multi-directional information flow 119-30. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | and multi-directional information flow 135 -- and multiple information flows 130-2 -- and multiple information flows 135 -- and prosecution 121 -- and prosecution 131 -- and prosecution 132 -- and reliable data about 132-3 -- and reliable data about 135 -- and traditional crimes 118-19 -- and trans-jurisdictionality 119 -- and trans-jurisdictionality 122-3 -- and trans-jurisdictionality 126 -- characteristics of offenders 120 -- computer security breaches 131-2 -- definitions of 113-14 -- definitions of 134 -- matrix of 115 -- media sensitization 132-4 -- policing 46-8 -- policing 121-2 -- policing 130-2 -- public perceptions of 123 -- public perceptions of 132-3 -- reporting of 131-2 -- types of 117-18 -- victimization 120-1 -- victimization 135 -- Daily Mail 9 -- Data Protection Act -- 51 -- data see personal data data mining -- 26-41 -- 138 -- and discrimination 31-2 -- and discrimination 36-9 -- and discrimination 40-1 -- and discrimination 138 -- and prevention of terrorism 3-4 -- and prevention of terrorism 34-5 -- and prevention of terrorism 41 -- and prevention of terrorism 138 -- and privacy 27 -- and privacy 28 -- and privacy 40 -- and privacy 41 -- and privacy 138 -- associative rules 29-31 -- customer segmentation 33 -- customer segmentation 38-40 -- goals of 29-32 -- increased demand for applica-tions 34-6 -- of celebrities' tax returns 135 -- risk minimization 30-1 -- risk minimization 138 -- social implications of 36-41 -- software 27 -- software 33-4 -- technology of 32-3 -- data-sharing in criminal justice system -- 45-52 -- 58 -- and privacy 42-3 -- and privacy 44-5 -- De Landa, M. 145 -- Dectel -- 147 -- 148 -- Defence Evaluation and Research Agency [DERA] 145 -- Deleuze, G. 20 -- Dennis, S. 9 -- Detention and Training Orders -- 67 -- 75 -- digiMine 33 -- Digital Silhouettes 38. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | disease registers, and informed consent 58 -- DNA databanks 19 -- DoubleClick -- 27 -- 38-9 -- Douglas, M. 142 -- drivers, data on -- 31-2 -- classification of text 29 -- e-mail address lists 124-5 -- interception 17 -- Echelon 90 -- Economist 101 -- electronic monitoring [EM] of offenders -- 62-84 -- 139-40 -- acceptance of 69-70 -- administering companies 70-1 -- administering companies 139 -- and civil liberties 72 -- and community penalties 67 -- and community penalties 69-70 -- and community penalties 73-6 -- and community penalties 79 -- and community penalties 81-2 -- and early release 66 -- and early release 139 -- and exclusion orders 67-8 -- and exclusion orders 74 -- and managerialism 79-80 -- and managerialism 84 -- and post-release supervision 68 -- and seamless sentences 75-6 -- and sex offenders 68 -- and tracking technology 68 -- and women 69-70 -- as punishment 72-3 -- as punishment 79 -- as punishment 83 -- as punishment 139 -- as solution to prison overcrowd-ing 66 -- as solution to prison overcrowd-ing 69 -- as solution to prison overcrowd-ing 72 -- creation of digital personae 78 -- curfeworders 64 -- curfeworders 65 -- curfeworders 66 -- curfeworders 67 -- curfeworders 69 -- curfeworders 74 -- dream of omniperception 76-7 -- dream of omniperception 80-1 -- dream of omniperception 83-4 -- failures of 82 -- introduction into Britain 64-6 -- monitoring staff 71 -- monitoring staff 76 -- monitoring staff 139 -- of bailees 64 -- of bailees 67 -- of bailees 72 -- of bailees 79 -- opposition to 64-5 -- opposition to 72-3 -- opposition to 79 -- opposition to 139 -- press reaction to 72 -- press reaction to 79 -- press reaction to 81 -- public debate 68-73 -- Elegant, R. 95 -- Ellison, L. 18 -- Ellul, J. 19 -- encryption 59 -- Ericson, R.V. -- 77 -- 122. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | European Union and computer crime -- 48 -- ID cards 142 -- regulation of UBEs 126 -- Europol 48 -- exclusion orders -- 67-8 -- 74 -- Experian -- 131 -- 133 -- FaceIT -- 147 -- 148 -- facial recognition technologies -- 19 -- 147-8 -- FBI -- 20 -- 34 -- 35 -- 41 -- 143 -- Federal Probation 83 -- Federal Trade Commission [FTC] 39 -- Feeley, M. 82 -- Fionda, J. 80 -- Fischer-Hubner, S. 12-13 -- Fisk, Robert 94 -- Fletcher, H. 68 -- Foreign Intelligence Surveillance Court 41 -- Foucault, M. -- 6 -- 20 -- 22 -- 112 -- fundamentalism 98-9 -- Gandy, O. 6 -- Garland, D. 81 -- Geografix 70 -- Giddens, A. -- 98 -- 99 -- globalization -- 91-2 -- and democracy and human rights 97 -- and democracy and human rights 107 -- and growth of fundamentalism 98-9 -- and inequalities 98 -- and military surveillance 145 -- and nation state 91-2 -- and nation state 96-9 -- and nation state 107 -- and peace and conflict 98-9 -- effect of economic matters 97-8 -- of media 2 -- of media 92-6 -- of media 106 -- Gnutella 134 -- Goffman, E. 15 -- Goldenberg, S. 94 -- governments, and data mining applications 34-6 -- GPS 68 -- Greek, C. 83 -- Group 4 Falke 70-1 -- GSSC Europe 71 -- Guardian 94 -- Guattari, F. 20 -- Gulf War [1991] -- 101 -- 102-3 -- 105 -- Gulf War [2003] -- 102 -- 103 -- hacking/cracking -- 115 -- 117 -- 120 -- 132 -- Haggerty, K. -- 77 -- 122 -- Halliday, J. -- 75-6 -- 79 -- Hardy, Bert 94 -- Havel, Václav -- 108 -- 109 -- health and welfare services -- 8 -- 28-9 -- 58 -- Heath, Edward 5 -- Hersh, Seymour 94 -- Home Detention Curfew Scheme [HDC] -- 66 -- 69 -- 76 -- 82 -- Howard League -- 64 -- 139 -- Huber, P. 137 -- Hughes, T.P. 143 -- human rights and facial recognition technology -- 148 -- and intervention 107-9 -- and media 106-7 -- see also privacy protection Human Rights Watch 107 -- ID cards -- 18 -- 58 -- 141-2 -- ID numbers -- 7 -- 59. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | identity 13-15. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | A shocking expose of surveillance methods. |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Description based on publisher supplied metadata and other sources. |
590 ## - LOCAL NOTE (RLIN) | |
Local note | Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Privacy, Right of. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Electronic surveillance -- Social aspects. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Social control. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | War on Terrorism, 2001-2009. |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Webster, Frank. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Main entry heading | Ball, Kirstie |
Title | The Intensification of Surveillance |
Place, publisher, and date of publication | London : Pluto Press,c2003 |
International Standard Book Number | 9780745319957 |
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN) | |
Corporate name or jurisdiction name as entry element | ProQuest (Firm) |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=3386368">https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=3386368</a> |
Public note | Click to View |
No items available.