Surveillance Technology, the solution to {insert issue here}
Cybercrimeology1 Aug 2022

Surveillance Technology, the solution to {insert issue here}

About our Guests:

Dr David Lyon

https://www.sscqueens.org/people/david-lyon

Vanessa Henri

https://www.linkedin.com/in/vanessahenri

Papers or resources mentioned in this episode:

Beyond Big Data Surveillance: Freedom and Fairness

https://www.sscqueens.org/news/beyond-big-data-surveillance-report-released

David Lyon (1994) Electronic Eye: The Rise of Surveillance Society

https://www.goodreads.com/book/show/237851.Electronic_Eye

David Lyon (2001) Surveillance Society: Monitoring Everyday Life

https://www.goodreads.com/book/show/237855.Surveillance_Society

David Lyon (2018) The Culture of Surveillance: Watching as a Way of Life

https://www.goodreads.com/book/show/36739405-the-culture-of-surveillance

David Lyon (2022) Pandemic Surveillance

https://www.politybooks.com/bookdetail?book_slug=pandemic-surveillance--9781509550302

Michel Foucault (1975) Discipline and Punish: The Birth of the Prison

https://www.goodreads.com/book/show/80369.Discipline_and_Punish

Smith, Richard Angus (2015) Spying and Surveillance in Shakespeare’s Dramatic Courts (Ph.D Thesis)

https://ses.library.usyd.edu.au/handle/2123/11591

Other:

History of Henry V

Act 2, Scene 2

DUKE OF BEDFORD:

The king hath note of all that they intend,

By interception which they dream not of.

https://www.opensourceshakespeare.org/views/plays/play_view.php?WorkID=henry5&Act=2&Scene=2&Scope=scene

The Tragedy of Hamlet, Prince of Denmark

Act 3, Scene 1

KING CLAUDIUS:

Her father and myself, lawful espials,
Will so bestow ourselves that, seeing, unseen,
We may of their encounter frankly judge,
And gather by him, as he is behaved,
If 't be the affliction of his love or no
That thus he suffers for.

http://shakespeare.mit.edu/hamlet/hamlet.3.1.html

Avsnitt(129)

Public Interest Technology: Making Sense of Security in an AI World

Public Interest Technology: Making Sense of Security in an AI World

Notes: The conversation begins with his path into teaching public policy, despite never having planned a conventional academic career, and why translating technical subjects for non-technical studen...

1 Maj 34min

Who You Gonna Call?: Cybercrime Types and Expectations of Police Response

Who You Gonna Call?: Cybercrime Types and Expectations of Police Response

Notes: Cybercrime is often treated as a distinct phenomenon, but there are strong continuities with offline crime that are frequently overlooked. Digital technologies change behaviour and scale, bu...

1 Apr 30min

Disordered Sense-Making: Conflict Narratives in the Digital Era

Disordered Sense-Making: Conflict Narratives in the Digital Era

Notes: Dr Samuel Tanner began his doctoral research examining war crimes and armed militias involved in mass violence in the Balkans, conducting extensive fieldwork and interviews with participants ...

1 Mars 36min

Beyond “The Cybercriminal”: Understanding Diversity in Cyber Offenders

Beyond “The Cybercriminal”: Understanding Diversity in Cyber Offenders

Notes:Dr Bekkers describes his academic pathway from psychology to criminology and explains why his research focus has consistently been on offenders and their behaviour rather than on offences or tec...

1 Feb 25min

Systematically Improving Cybersecurity Training

Systematically Improving Cybersecurity Training

Notes:Julia Prümmer describes her transition from legal psychology into cybersecurity research and how psychological methods shape her approach to cybersecurity training.The discussion explores the ro...

1 Jan 49min

The Human beneath the Hoodie: Profiling pathways into cybercrime

The Human beneath the Hoodie: Profiling pathways into cybercrime

otes:Melissa completed her PhD after two decades of operational work, bringing a pracademic perspective to cyber profiling and offender pathways.Her research focuses on understanding the human behind ...

1 Dec 202533min

Courses, Clicks and Consequences: Empiricizing Enterprise Security

Courses, Clicks and Consequences: Empiricizing Enterprise Security

Episode Notes:Dr Ho describes an empirical research agenda focused on how security actually operates in organisations. He explains his experience with getting this research off the ground to allow the...

1 Nov 20251h 4min

The many minds of MITRE: building multidisciplinary human insider-risk research

The many minds of MITRE: building multidisciplinary human insider-risk research

Trigger warning: This episode includes discussion of suicide in the context of researching measurable predictive indicators and the lack thereof in the context of cyber. Episode NotesDr Caputo's path ...

1 Okt 202544min

Populärt inom Utbildning

historiepodden-se
rss-bara-en-till-om-missbruk-medberoende-2
det-skaver
nu-blir-det-historia
harrisons-dramatiska-historia
not-fanny-anymore
rss-viktmedicinpodden
johannes-hansen-podcast
allt-du-velat-veta
rss-foraldramotet-bring-lagercrantz
sektledare
roda-vita-rosen
i-vantan-pa-katastrofen
sa-in-i-sjalen
rss-max-tant-med-max-villman
rss-sjalsligt-avkladd
rikatillsammans-om-privatekonomi-rikedom-i-livet
sex-pa-riktigt-med-marika-smith
rss-relationsrevolutionen
rss-pa-insidan-med-bjorn-rudman