Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Refine search results

Journals help
Authors help
Years help

Results found: 51

first rewind previous Page / 3 next fast forward last

Search results

Search:
in the keywords:  surveillance
help Sort By:

help Limit search:
first rewind previous Page / 3 next fast forward last
EN
The article is regarding surveillance of Polish general consulate in Kiev by bodies NKWD in April 1938. Above all introducing methods to the functioning of the operation Soviet secret police in former Communist countries is aimed. Apart from that, an everyday day and members are also portraying Polish diplomats in the USSR. of Poland because the consular office remained under permanent observation of officers the NKWD. Even though she was led in the way not entirely professional, how contents are showing the text, brought certain effects. Simultaneously however he is showing that a Polish diplomatic post in that time didn’t constitute the priority in action NKWD. However it is first effort of portraying activity of Soviet officers towards the Polish consulate based on their own secret reports.
2
Content available remote

Modern Forms of Surveillance and Control

100%
EN
In todays advanced society, there is rising concern for data privacy and the diminution thereof on the internet. I argue from the position that for one to enjoy privacy, one must be able to effectively exercise autonomous action. I offer in this paper a survey of the many ways in which persons autonomy is severely limited due to a variety of privacy invasions that come not only through the use of modern technological apparatuses, but as well simply by existing in an advanced technological society. I conclude that regarding the majority of persons whose privacy is violated, such a violations are actually initiated and upheld by the users of modern technology themselves, and that ultimately, most disruptions of privacy that occur are self-levied.
EN
Changes in modern society are crucial to individuals. Article starts with analysis of control in nowadays societies. Then author tries to understand useful categories, as "Panopticon", "ban-opticon" and "synopticon". Last part is focused on stete surveillance, i.e. surveillance by American National Security Agency.
4
100%
EN
In todays advanced society, there is rising concern for data privacy and the diminution thereof on the internet. I argue from the position that for one to enjoy privacy, one must be able to effectively exercise autonomous action. I offer in this paper a survey of the many ways in which persons autonomy is severely limited due to a variety of privacy invasions that come not only through the use of modern technological apparatuses, but as well simply by existing in an advanced technological society. I conclude that regarding the majority of persons whose privacy is violated, such a violations are actually initiated and upheld by the users of modern technology themselves, and that ultimately, most disruptions of privacy that occur are self-levied.
EN
Global capitalism of surveillance is mainly based on technologies that collect and process data: both digital, as well as one being a mixture of what is real and virtual, and which undergo clustering, commercialization, and instrumentalization. Operations done on extracted information are unsettling and cause concerns connected with leaving behind digital traces and the thought of being watched, but also with secret functioning and ways of using data. Above-mentioned fears are foundations for introduced and analysed strategies and techniques used by the participants of the media-ruled world in order to cover the trails and generate the digital noise.
EN
Operation work of the Polish Police was regulated for the first time in the Act of 1791, then in 1983. Currently, an Act issued on April 6, 1990, which has been amended several times, in being in operation. Over the last 28 years the scope of the Police legitimation has been extended many times to secret surveillance, expanding the catalog of methods and the range of crimes in which you can use offensive methods of operation. The introduction of judicial control in 2001 over the most radical methods of operational work was very beneficial.
EN
The article examines the figure of the spy-alongside themes related to espionage-as employed in two books by the Northern Irish writer Ciaran Carson (1948–2019): the volume of poems For All We Know (2008) and the novel Exchange Place (2012). Carson’s oeuvre is permeated with the Troubles and he has been hailed one of key writers to convey the experience of living in a modern surveillance state. His depiction of Belfast thematizes questions of terrorism, the insecurity and anxiety it causes in everyday life, as well as the unceasing games of appearances and the different ways of verifying or revising identities. In Carson’s later work, however, these aspects acquire greater philosophical depth as the author uses the themes of doubles, spies, and makeshift identities to discuss writing itself, the construction of subjectivity, and the dialogic relationship with the other. Taking a cue from Paul Ricoeur’s and Julia Kristeva’s conceptions of “oneself as another,” the article examines how Carson’s spy-figures can be read as metaphors for processes of self-discovery and identity-formation, tied to the notion of “self-othering.” Carson employs the figure of the spy-who juggles identities by “donning” different clothes or languages-to scrutinize how one ventures into the dangerous territory of writing, translation and love, as well as to reconsider notions of originality and self-mastery. Ultimately, Carson conceptualizes literature as specially marked by deceptions and metamorphoses, defining in these terms the human condition.
Cybersecurity and Law
|
2021
|
vol. 6
|
issue 2
193-205
EN
The importance of the problem of surveillance carried out by state authorities, especially in recent years, in connection with the growing threat of terrorism is indisputable. State authorities sometimes take measures, which involve restricting human rights, especially the right to privacy, justifying them by the need to ensure security of both the state and its citizens. The objective of this article is to outline the standpoint of the European Court of Human Rights (under Article 8 of the European Convention on Human Rights) on the so-called strategic monitoring, i.e. mass interception of data transferred via telecommunications networks and their subsequent analysis with a view to acquiring specific information.
EN
After the fall of the communist regime, Slovakia saw the introduction and subsequent rapid growth of camera surveillance, particularly around the turn of the millennium. These developments occurred in a specific political, cultural, and historical context, which affects perceptions of and reactions to surveillance by individual citizens. The post-communist context is characterised by relatively low levels of resistance to the introduction of various technological surveillance mechanisms, including the rapid introduction of Closed-Circuit Television (CCTV) in public spaces. However, individuals who are under surveillance (surveilled subjects) are not passive. They are aware of the surveillance and its mechanisms, they interact with the surveillance devices, and they self-manage their digital image in various surveillance contexts. Using semi-structured qualitative interviews this article examines experiences of and individual attitudes towards the camera surveillance of Slovak citizens against the wider backdrop of the characteristics of post-communist surveillance culture. It is based on an analysis of individual stories of attitudes towards and personal experiences with CCTV in private, semi-private, and public places. The analysis of individual-level interactions reveals that citizens are aware of the presence of cameras and react to them in various ways, ranging from compliance and various strategies of negotiation with surveillance systems right up to some forms of resistance.
10
88%
EN
Surveillance, nowadays especially provided by information and communication technology, is at the core of social control that has been largely commoditised and privatized. Consumer culture gives hope for freedom lives, challenging the social hierarchies that dominated the earlier – in Bauman’s vocabulary, “solid” – phase of modernity. The aim of this paper is to present two of many tools, which are used by biggest IT companies to keep under surveillance the individuals, societies and nations in the Liquid Modern Times. There has been the socio-cultural context of Internet’s development analyzed to find the premises that led to a transformation of cyberspace from a freedom to a surveillance place, and conducted a case study of Facebook’s facial recognition technology and Google Street View practices. Non-reactive research methods have been used in the paper.
EN
We live, increasingly, in a state of extraction. My thesis is that we have not yet figured out the implications of a primary or fundamental logic of state extraction. We have not figured out its implications for our own predicament-for the predicament, that is, not of state functionaries as such, not of extractors and surveyors, which is a predicament of domination, but the predicament of those who would rather not be dominated, and who understand that giving up on domination is the logical price to be paid. These latter figures, those who refuse domination, those who prefer not to be dominated, hence not to dominate, they might in fact constitute the “borders of the border,” that fantastic fringe territory of the human this conference has decided to thematize and, in some sense, to honor. Let me then reserve that theoretical position, the position of border or hyperborder dwellers, to develop what follows. I will claim that the border of the border is today the site where information will not be shared-an opaque site of silence and secrecy, a place of radical reticence concerning unconcealment.
EN
The material scope of the analysis presented in this paper refers to special powers held by the Polish special services with respect to the surveillance of foreign nationals in connection with terrorist threats and terrorist offenses. This paper connects the issue of anti-terrorist measures with the assessment of the effectiveness of the Polish special services and with the assessment of potential social costs, which are related to the increase in the powers held by these services in the field of surveillance of Polish citizens and foreign nationals. The analysis of the powers of the special services focuses on the powers of one of the counterintelligence services, i.e. theInternal Security Agency (Polish: ABW).The purpose of this paper is to indicate the consequences of the introduction of legal changes concerning the powers held by the special services in the scope of applying particular types ofsurveillance activities (operational-and-intelligence activities). It poses the following research questions: (1) To what extent can mechanisms in Polish law influence the effectiveness of combating terrorism by the Polish special services? (2) To what extent can mechanisms in Polish law in the field of combating terrorism violate the rights and freedoms of Polish citizens andforeign nationals? In order to answer the research questions, the activities and powers of Polish special services were analyzed from a legal and institutional point of view. On the other hand,to analyze legal regulations related to surveillance, the author applied a dogmatic and doctrinal interpretation and a pro-constitutional interpretation of the provisions of criminal law.
EN
Due to their strategic importance, the railways were subject to particular surveillance by the state security apparatus of the Polish People’s Republic. Since 1957, the related tasks were carried out by department III of the Security Service (Służba Bezpieczeństwa), which centered its operations on broadly understood economy issues. In 1970 and from then on, the activities of the Security Service were systematized through establishing the so-called “unit cases” for the key organizational units of the railways.
EN
The article focuses on the exercise of the right to correspondence by persons held in penitentiaries. The author’s analysis of the latest changes in this respect not only is based on the national regulations but is also performed in terms of their compliance with the standards of the European Convention on Human Rights and the case law of the European Court of Human Rights. A particular emphasis is put on the admissible restrictions in prisoners’ or detainees’ correspondence with their lawyers, public authorities, court authorities, legislators, law enforcement agencies and international organisations for the protection of human rights.
EN
This paper offers a sketch of the complicated conflicts which arise—and metastasize seemingly daily—in the era of Big Data. Given the public’s ubiquitous-yet-ostensibly- voluntarydatasurrender,andindustry’subiquitous-yet-ostensibly-anodynecollectionof the same, inaction is not an option for any near-just society. By revisiting the philosophical basis for Panoptic apparatus (via Bentham and Foucault), sketching the tumultuous history of US contract law trying to protect the public from itself (from Lochner to Carpenter), and comparing existing industry codes for similarly-situated—read: terrifyingly invasive—fields (e.g., physicians, therapists, attorneys, accountants), the paper will provide a preliminary framework for identifying and confronting the galaxy of problems associated with data analytics.
16
Publication available in full text mode
Content available

Światy równoległe

75%
PL
Artykuł w ogólnej formule porusza zagadnienia związane z bezpieczeństwem informacji. Próby przechwytywania informacji wojskowych, handlowych i innych są codziennością, a dzisiaj już rozszerzają się na całe społeczeństwa. Zmieniają się zatem środki i zakres kontroli nad informacją. Warto o tym pamiętać za każdym razem, kiedy włączamy komputer, prowadzimy rozmowę telefoniczną lub wysyłamy fax.
EN
This article in general talk about security of information. Attempts to capture the military, commercial and others information are commonplace, but today already extend to the whole of society. The measures and scope of control over information are changing. Worth to remember this when you want turn on your computer, talk on the phone or send a fax.
17
Publication available in full text mode
Content available

Kryptonim "Podżegacze"

75%
EN
The article aims to show analogies between three literary works: Bartleby, the Scrivener: A Story of Wall Street by Herman Melville, My Year of Rest and Relaxation by Ottessa Mosfegh and The New Me by Halle Butler. I will focus on the following points of convergence in these texts: surveillance, the nature of work and the eectiveness of the protagonists' coping strategies. I will draw on some of the existing literature on Bartleby, the works of Francesco Berardi and David Graeber on work, Barbara L. Fredrikson and Tomi-Ann Roberts' paper on the objectication of female body as well as Michel Foucault's study of surveillance and Jonathan Crary's book on sleep.
EN
Since 2015, the Social Credit System - an initiative of the government of the People’s Republic of China which aims to strengthen trustworthiness of the business entities and citizens, promote obedience to law and customs, and develop the Communist Party of China’s control over social trends and potential threats to the political stability - has been attracting worldwide attention. International media portrays the System as a mechanism which leads China to totalitarianism and destroys hope for development of the Chinese democratic movement. Therefore, interests of both sides, the West and China, are seen as contradictory. Harmful beliefs like the one that Chinese still export products of poor quality and on the Chinese side that the Western ideals lead to demoralization are common thanks to some sort of Occidental and Oriental propaganda. That is why it is necessary to compile and analyze the known facts regarding the Social Credit System, which in contrast to the media narration turns out to be a tool with interesting capabilities, not necessarily contradictory to the other major civilizations’ values.
EN
Surveillance and communist repression of the Church in Wadowice based on selected documents of the Security Service of 1961.
first rewind previous Page / 3 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.