Skip to main content
Religious groups existing on the fringes of US Society can quickly find themselves pushed outside the borders of acceptability by the onset of war, especially if they hold pacifist convictions and an avid desire to proselytise. Gary... more
    • by 
    •   12  
      New Religious MovementsNationalismMillenarianismAnti-War
Mass surveillance is blessing and curse for our life. Modern Day surveillance has made our life risk free and at the same time our privacy is compromised. In the Book, 1984, the writer assumed a surveillance state where each and every... more
    • by 
    •   3  
      Information SecurityPrivacy and data protectionSurveilance
(together with Normann Witzleb),  UNSW Law Journal Vol 37 (2), 748–783
    • by  and +1
    •   3  
      Comparative Constitutional LawData PrivacySurveilance
    • by 
    •   8  
      Internet & SocietyAlgorithmic ArtSurveilancePRISM
What does home mean to you? Relief as you walk in the door after a long day of work? Peace when you lie on the couch on a cosy Sunday afternoon? Perhaps above all it's the place where the outside world is left behind. But today the home... more
    • by 
    •   3  
      PrivacySmart Home TechnologySurveilance
In this paper, I argue that careful attention needs to be paid to the handling of urban CCTV digital data. Since the early 1990s, CCTV has left an indelible mark on UK cities, and beyond. CCTV is a crime-reduction strategy, and its... more
    • by 
    • Surveilance
Surveillance is an important component of secure infrastructure. People need to ensure that their properties, homes, friends, families, and valuables are protected from intruders. In this article, we developed an enhanced background... more
    • by  and +1
    •   3  
      Embedded SystemsComputer SecuritySurveilance
    • by 
    •   31  
      Cultural StudiesEducationEducational TechnologyConsumers & Consumption
This article explores how Internet surveillance in the name of counter-terrorism challenges privacy. In the Part II, the article analyses the international dimension of counter-terrorism measures and the conceptualisation of data... more
    • by 
    •   5  
      LawPolitical ScienceComparative Constitutional LawData Privacy
Surveillance is part of the Muslim New Yorker experience, and informants, almost always Muslim themselves, are part of their communities. It is in this context that Muslim New Yorkers partly rely on Islamic theology to question their... more
    • by 
    •   12  
      Race and EthnicitySurveillance StudiesMinority StudiesIslamic Studies
    • by 
    •   8  
      GeographyUrban PlanningPolicing StudiesOlympics and Olympism
    • by 
    •   139  
      European HistorySociologyEconomic SociologyPolitical Sociology
The digital world is a field of information and entertainment for users and a field of extraction of the most valuable good of recent years: personal data. How much of a threat to privacy is the collection and processing of data by third... more
    • by 
    •   10  
      PrivacySocial CapitalSocial MediaAttitudes (Social Psychology)
    • by 
    • Surveilance
En genel tanımıyla “bilgi” parçası anlamına gelen enformasyon, edinilme şeklinden, hakikâtinin aranışına; öğrenilmesinden, yayılmasına kadar pek çok tartışmaya konu olmaktadır. Dijital teknolojilerle birlikte, toplum giderek... more
    • by 
    •   10  
      Information TechnologyZygmunt BaumanDigital ActivismDigital Society
Following the ECJ decision that declared the Data Retention Directive invalid, the Data Retention and Investigatory Powers Act 2014 (DRIP) has been enacted. It is not indisputable whether the DRIP gives more powers to the intelligence... more
    • by 
    •   32  
      Comparative LawCivil LawInformation SecurityEuropean Law
Many new media technologies, such as the internet, serve both as a tool for organizing public commons and as a tool for surveilling private lives. This paper addresses the manner in which such technological innovations have enabled a... more
    • by 
    •   5  
      Public RelationsSurveillance StudiesThe InternetSurveilance
The digital world is a field of information and entertainment for users and a field of extraction of the most valuable good of recent years: personal data. How much of a threat to privacy is the collection and processing of data by third... more
    • by  and +1
    •   7  
      PrivacySocial CapitalSocial MediaInternet & Society
    • by 
    •   13  
      NursingHealth CommunicationEpidemiologyPublic Opinion
Field-X was first discovered in 1979, comprising of saturated oil reservoirs with several shallower non-associated gas reservoirs. Field-X is currently producing from several oil producers. X8 well was recently drilled, completed, and... more
    • by 
    •   4  
      SurveilancePetrophysics and Well LoggingWell InterventionWell Integrity Management
Background: The neonatal mortality rate (NMR) is considered amongst the most important socioeconomic and health indicators of a community development. Globally, it has been reported that the daily mortality rate during the neonatal period... more
    • by 
    •   9  
      Infectious disease epidemiologyCommunity HealthPublic HealthMedicine
    • by 
    •   48  
      Critical TheorySocial MovementsTerrorismInternational Terrorism
    • by 
    •   38  
      Critical TheorySocial MovementsPeace and Conflict StudiesSocial Movement
The digital world is a field of information and entertainment for users and a field of extraction of the most valuable good of recent years: personal data. How much of a threat to privacy is the collection and processing of data by third... more
    • by 
    •   11  
      PrivacySocial CapitalSocial MediaAttitudes (Social Psychology)
Sürveyans sistemleri ve filyasyon çalışmalarının, bulaşıcı hastalıkları önleme, tedavi ve korumada hayati bir fonksiyonu vardır. Sürveyans vakalara ilişkin ya da problemlere yönelik öncelikler belirleme, amaç, strateji ve hastalığa... more
    • by 
    •   6  
      FiliationSurveilanceSurveillance SystemSürveyans
This article explores how Internet surveillance in the name of counter-terrorism challenges privacy. In the Part II, the article analyses the international dimension of counter-terrorism measures and the conceptualisation of data... more
    • by 
    •   4  
      LawComparative Constitutional LawData PrivacySurveilance
...One of the beautiful aspects of the American judicial system is the notion that defendants are ‘innocent until proven guilty,’ that it is the responsibility of the State to prove guilt, not the accused to prove innocence. This places... more
    • by 
    •   90  
      Critical TheoryCriminologyPolitical SociologySocial Movements
One day after the 9/11 attacks, Congressman Greg Walden stated in a speech to Congress that the Earth Liberation Front (ELF), a movement that has never injured or killed a single person, was a threat “no less heinous then what we saw... more
    • by 
    •   35  
      Critical TheorySocial MovementsCriminal LawCriminal Justice
Environment is protected from radioactive release to prevent the emission, taking socio-economic factors into account using best available technique and technologies, using safer alternatives and obtaining payment from polluter. In all... more
    • by 
    •   21  
      Environmental EngineeringEnvironmental ScienceEnvironmental StudiesTurkey