OUR HUMANITY EXPOSED Predictive Modelling in a Legal Context

Total Page:16

File Type:pdf, Size:1020Kb

Load more

!"#! #$%#&'$( $')'' * +* "#+ # ,$-) " "" ) ! "" + + # ! + " ! #!)## " "# + # " # # + "# # ! #) #! " " " ). # ! # " # ) " # # "" +"#! ) # # + " ! # ) !# " ) " # +" " # !# "" # ) " + + + #" " + + " " ! ) # #! " # +" " # ) # " + /! ) 0# " " " #+ # # " " # )" # + 1 0# " 2#3 40235 * 3# 4*35 " ! 0# " 40 5) # + 6" 7# ) " " #+ " ! " # ) # " # "8 ! " &'$( "9::#)!): 8#;#9!99#9 $-$<=( .>?(1?$(<-?(-1( .>?(1?$(<-?(-?- +$'<?$ OUR HUMANITY EXPOSED Predictive Modelling in a Legal Context Stanley Greenstein Our Humanity Exposed Predictive Modelling in a Legal Context Stanley Greenstein ©Stanley Greenstein, Stockholm University 2017 ISBN printed 978-91-7649-748-7 ISBN PDF 978-91-7649-749-4 Cover image: Simon Dobrzynski and Indra Jungkvist Photo of the author: Staffan Westerlund Printed by Universitetsservice US-AB, Stockholm 2017 Distributor: Department of Law, Stockholm University To my family - Anna, Levi, Nomie and Jonah. Acknowledgements I have heard that writing a thesis is like running a marathon. Having run two marathons I feel that I am in a position to comment. There are similarities in that both are long, they require lots of training and endurance and they both have many ups and downs. However, there are some major differences. A marathon has race officials to show the way, the finish line is clearly demar- cated and it is not a team effort. This is definitely not the case when writing a thesis. I would therefore like to take this opportunity to thank my thesis team. I would like to start by extending my appreciation to my supervisor, Peter Wahlgren (Professor in Law and Information Technology), who provided the legal perspective and who was always available to discuss both legal and tech- nical developments. A big thank you also to my deputy supervisor Jussi Karlgren (Adjunct Professor in Language Technology), who provided the technical perspective and who was able to explain the intricate complexities of technical phenomena in an understandable manner. Thank you both also for translating this thesis into Swedish. During the second to last year of writ- ing, the three of us would meet regularly to discuss what I had written and plan the way forward. These meetings were insightful in that I experienced what it is like to review a text with a lawyer on one side and a computer sci- entist on the other. It was motivating, it was informative, it was frustrating but most of all it was fun! Thank you! I would also like to express my gratitude to Cecilia Magnusson Sjöberg (Professor in Law and Information Technology). Thank you for your patience over the years for all those occasions I barged into your office without warning in order to get advice on one matter or another. Most of all thank you for giving me the freedom and space during these past six months so that I could focus entirely on completing this thesis. I am fully aware that this could not have been easy considering your responsibilities for making sure that all lec- turing and examination duties were covered. I would like to thank Peter Seipel (Professor Emeritus in Law and Infor- mation Technology), who took an interest in my project early on and, as a pioneer in the field of legal informatics, made the path easier for the rest of us, in this the most interesting and relevant field of law. A special thank you also to my present colleagues at the Swedish Law and Informatics Research Insti- tute (IRI): Liane Colonna, Maeve Dion, Mårten Edenroth, Ängla Eklund, Al- exandra Sackemark, Madeleine Sandberg and Christine Storr. Thank you for making sure that the daily existence as a doctoral student was not as lonely as it sometimes is made out to be. A special thank you also to Mark Klamberg for taking on the role of ‘op- ponent’ at my final seminar, for providing me with all the feedback and con- structive criticism, especially within the area of international law and for tak- ing the time to address all my follow-up queries. This thesis would not have been possible without the support of the Faculty of Law, Stockholm University. After receiving the opportunity to embark on doctoral studies, the Faculty of Law allowed me to pursue my doctoral studies within my appointment as an Adjunkt, in effect financing this project. Many thanks also to the Stiftelsen av den 28 oktober 1982 for the generous yearly book grant, allowing me to purchase the necessary reading material. Many thanks must also be given to a number of individuals at the Faculty of Law, Stockholm University. First, my appreciation to Åsa Hellstadius, for providing suggestions regarding the structuring of this thesis, for assisting me with the thesis template and most of all for reassuring me that the time was ripe to proceed with the opposition of this thesis. Also, considering that this thesis delved into areas of law that I am not a specialist in, I would like to thank Helene Andersson, Antonina Bakardjieva-Engelbrekt, Claes Granmar, Jaan Paju, Martin Ratcovich, Pål Wrange, Torben Spaak and Mauro Zamboni. In addition, many thanks to Bengt Baeckmark, Laura Carlson, Jonas Ekfeldt, Ulf Färjare, Agita Akule Larsson, Lydia Lundstedt, Grant McWilliams, Dan Olsson, Panagiotis Papapetrou, Christina Ramberg, Ida Söderberg Tah, Staf- fan Westerlund and Roger Persson-Österman. You have all helped me in some way or another and at some point in time. You have all been generous with your time, support and words of encouragement. Thank you! A special thank you also to Lee Bygrave of the Senter for rettsinformatikk, Department of Private Law, Oslo University. We would meet at the annual Nordic Conference on Law and IT where you would always show an interest in my progress, offer valuable insights and most importantly not hold back as far as providing words of encouragement was concerned. Tusen takk! In addition, the cover of this thesis would be blank were it not for the cre- ative efforts of Simon Dobrzynski and Indra Jungkvist. Thank you both for all the time spent on enhancing the graphic impression of this thesis. A huge thank you also to Laura Chadwick, who on extremely short notice agreed to proof read my thesis, providing valuable input and improving the overall im- pression of the text markedly. Your assistance with this thesis was invaluable! All mistakes in this text should be attributed to changes made by me after it was proof read. I would also like to thank the staff of the Stockholm University libarary for helping with the production of this thesis. On a more personal note, I would like to thank my in-laws, Kalle and Eva- Lii, for making life a lot easier in many respects since I moved to Sweden. Many thanks also to Indra and Simon for the warmth you have both shown over the years. Finally, a special thank you to my wife and soulmate Anna, for the love and companionship over the years. You have always been positive about this project even when faced with a partner that has on occasion been ‘a little less positive’. Thank you for polishing the cover texts and Swedish trans- lation – when it comes to working with text, you are in a class of your own. Thank you also for bearing the major load of family life during the run up to the completion of this thesis. Finally, I would probably not have survived this excruciating process were it not for my children Levi, Nomie and Jonah. Your mere existence has constantly put things into perspective and reminded me that this is just a thesis, nothing more! Stockholm, 24th April 2017. Stanley Greenstein Contents 1 Introduction .................................................................................. 21 1.1 Problem Identification............................................................................. 22 1.2 Overall Objectives ................................................................................... 26 1.3 Research Questions ................................................................................. 29 1.4 Method and Material ............................................................................... 30 1.5 Definitions ................................................................................................. 41 1.6 Perspectives ............................................................................................. 48 1.7 Scope and Delimitation .......................................................................... 52 1.8 Previous Research ................................................................................... 55 1.9 Positive Aspects of Predictive Modelling .............................................. 61 1.10 The Dangers Associated with Predictive Modelling ...................... 64 1.11 Structural Overview ........................................................................... 68 2 ‘The Black Box’ ............................................................................. 69 2.1 Introductory Remarks ............................................................................. 69 2.2 The Predictive Modelling Process Outlined .......................................... 70 2.3 The Development of Technology .......................................................... 74 2.3.1 The Features of Data ...................................................................
Recommended publications
  • I Facebook and Panopticism: Healthy Curiosity Or Stalking?

    I Facebook and Panopticism: Healthy Curiosity Or Stalking?

    Facebook and Panopticism: Healthy Curiosity or Stalking? A thesis presented to the faculty of the Scripps College of Communication of Ohio University In partial fulfillment of the requirements for the degree Master of Arts Mary Catherine Kennedy November 2009 © 2009. Mary Catherine Kennedy. All Rights Reserved. i This thesis titled Facebook and Panopticism: Healthy Curiosity or Stalking? by MARY CATHERINE KENNEDY has been approved for the School of Media Arts and Studies and the Scripps College of Communication by Karen E. Riggs Professor of Media Arts and Studies Gregory J. Shepherd Dean, Scripps College of Communication ii ABSTRACT KENNEDY, MARY C., M.A., November 2009, Telecommunications Facebook and Panopticism: Healthy Curiosity or Stalking? (108 pp.) Director of Thesis: Karen E. Riggs This study deepens existing knowledge concerning social networking sites, with specific interest in the social networking site Facebook and the phenomenon, “Facebook stalking”. By providing insights into lesser-known studies concerning user curiosity and surveillance online, the present research reveals that the terms ‘monitoring’ and ‘keeping up with’ or ‘keeping in touch with’ are most commonly used when referring to social searches within social networks; only when asked to think about surveillance in terms of stalking did interview participants refer to it as such. The present study aims to discover Facebook users’ perception of their friends’ disclosure while delving into the idea of “Facebook stalking”, specifically with regard to how users define it. Facebook’s evolution and prominence in the public sphere is dependent upon user satisfaction with and general understanding of the functionality of social networking websites. A discussion of these issues is beneficial to understanding how Facebook is used as a modern-day panopticon.
  • The End of Forgetting: Strategic Agency Beyond the Panopticon

    The End of Forgetting: Strategic Agency Beyond the Panopticon

    1 Running Head: THE END OF FORGETTING Title The end of forgetting: Strategic agency beyond the Panopticon Authors Jonah Bossewitch Communications Doctoral Program, Columbia University, USA Aram Sinnreich School of Communication and Information, Rutgers University, USA Abstract The rapid explosion of information technologies in recent years has contributed to a substantive change in the social dimensions of information sharing, and is forcing us to revise substantially our old assumptions regarding the knowledge/power dynamic. In this article, we discuss a range of strategic information-management options available to individuals and institutions in the networked society, and contrast these ‘blueprints’ to Foucault’s well-known Panopticon model. We organize these observations and analyses within a new conceptual framework based on the geometry of ‘information flux,’ or the premise that the net flow of information between an individual and a network is as relevant to power dynamics as the nature or volume of that information. Based on this geometrical model, we aim to develop a lexicon for the design, description, and critique of socio-technical systems. Keywords surveillance, privacy, transparency, sousveillance, panopticon, memory, new media, software studies, identity, quantified self Author Bios Jonah Bossewitch is a doctoral candidate in communications at Columbia University and a Technical Architect at the Columbia Center for New Media Teaching and Learning. He writes about surveillance and madness, and is investigating the politics of memory at the intersection of corruption in psychiatry and the pharmaceutical industry. He blogs at http://alchemicalmusings.org. Aram Sinnreich is an Assistant Professor at the Rutgers University School of Communication and Information.
  • Archons (Commanders) [NOTICE: They Are NOT Anlien Parasites], and Then, in a Mirror Image of the Great Emanations of the Pleroma, Hundreds of Lesser Angels

    Archons (Commanders) [NOTICE: They Are NOT Anlien Parasites], and Then, in a Mirror Image of the Great Emanations of the Pleroma, Hundreds of Lesser Angels

    A R C H O N S HIDDEN RULERS THROUGH THE AGES A R C H O N S HIDDEN RULERS THROUGH THE AGES WATCH THIS IMPORTANT VIDEO UFOs, Aliens, and the Question of Contact MUST-SEE THE OCCULT REASON FOR PSYCHOPATHY Organic Portals: Aliens and Psychopaths KNOWLEDGE THROUGH GNOSIS Boris Mouravieff - GNOSIS IN THE BEGINNING ...1 The Gnostic core belief was a strong dualism: that the world of matter was deadening and inferior to a remote nonphysical home, to which an interior divine spark in most humans aspired to return after death. This led them to an absorption with the Jewish creation myths in Genesis, which they obsessively reinterpreted to formulate allegorical explanations of how humans ended up trapped in the world of matter. The basic Gnostic story, which varied in details from teacher to teacher, was this: In the beginning there was an unknowable, immaterial, and invisible God, sometimes called the Father of All and sometimes by other names. “He” was neither male nor female, and was composed of an implicitly finite amount of a living nonphysical substance. Surrounding this God was a great empty region called the Pleroma (the fullness). Beyond the Pleroma lay empty space. The God acted to fill the Pleroma through a series of emanations, a squeezing off of small portions of his/its nonphysical energetic divine material. In most accounts there are thirty emanations in fifteen complementary pairs, each getting slightly less of the divine material and therefore being slightly weaker. The emanations are called Aeons (eternities) and are mostly named personifications in Greek of abstract ideas.
  • Contemporary Irish Perspectives Kenny Doyle1

    Contemporary Irish Perspectives Kenny Doyle1

    Surveillance Privacy and Technology: 13Contemporary Irish Perspectives Kenny Doyle1 Abstract urveillance is typically envisaged as the act of a person being physically Swatched, their movements and behaviour monitored in a given space and time. While this type of watching undoubtedly takes place, there is also the more subtle and pervasive monitoring of people through the data they accumulate in their daily lives. Contemporary Irish society is mediated by digital technology; the daily life of the typical person creates a mass of data which can offer many telling clues as to the type of life they lead. This form of surveillance is called dataveillance (Clarke, 1988). It is unclear however exactly how much citizens know about these practices and how they negotiate with and respond to surveillance systems. This study aimed -by conducting focused interviews with Irish citizens – to explore the levels of knowledge regarding surveillance and privacy and to ascertain the importance placed on these concepts. Using Harper’s (2011) typology of subject positions, a further aim was to uncover any discursive repertoires used when defining or speaking about these concepts. It was found that widely used conceptions of privacy and surveillance are inadequate to describe contemporary reality; and that forms of sociality have changed with the widespread use of information and communication technologies (ICT). Keywords: surveillance, technology, privacy, Ireland, dataveillance the internet, social networking, ICT. 1. Waterford Institute of Technology, Waterford, Ireland; [email protected] How to cite this chapter: Doyle, K. (2013). Surveillance Privacy and Technology: Contemporary Irish Perspectives. In C. Fowley, C. English, & S. Thouësny (Eds.), Internet Research, Theory, and Practice: Perspectives from Ireland (pp.
  • 2006 November Family Room Schedule

    2006 November Family Room Schedule

    NOVEMBER 2006 PROGRAMMING SCHEDULE FAMILY ROOM Time 10/30/06 - Mon 10/31/06 - Tue 11/01/06 - Wed 11/02/06 - Thu 11/03/06 - Fri 11/04/06 - Sat 11/05/06 - Sun Time THE LIVING FOREST FLIPPER 6:00 AM CONT'D (4:50 AM) DARK HORSE KAYLA CONT'D (5:45 AM) RADIO FLYER 6:00 AM TV-PG CONT'D (5:40 AM) CONT'D (5:40 AM) TV-G CONT'D (5:30 AM) FLIPPER UFO A DOLPHIN IN TIME 6:30 AM A QUESTION OF PRIORITIES 6:15 AM 6:30 AM 6:15 AM G 7:00 AM PG MAGIC OF THE GOLDEN BEAR: GOLDY III 7:00 AM TRADING MOM TV-PG TV-PG 6:40 AM TV-PG THE THUNDERBIRDS THE THUNDERBIRDS THE THUNDERBIRDS 7:30 AM 7:05 AM TRAPPED IN THE SKY PIT OR PERIL SUN PROBE 7:30 AM 7:20 AM 7:20 AM 7:25 AM 8:00 AM 8:00 AM TV-G PG TV-PG TV-PG TV-PG FLIPPER FLIPPER AND THE FUGITIVE (1) UFO THE THUNDERBIRDS UFO 8:30 AM 8:30 AM STOLEN SUMMER THE RESPONSIBILITY SEAT CITY OF FIRE COURT MARTIAL 8:30 AM TV-G 8:15 AM 8:15 AM 8:25 AM 8:15 AM FLIPPER FLIPPER AND THE FUGITIVE (2) 9:00 AM 8:55 AM TV-PG TV-Y7-FV 9:00 AM TV-G OLD SETTLERTV-PG HAMMERBOY UFO 9:30 AM THE LIVING FOREST TV-G 9:05 AM THE SQUARE TRIANGLE 9:05 AM 9:30 AM FLIPPER MOST EXPENSIVE SARDINE IN THE WORLD 9:20 AM 9:50 AM 9:20 AM 10:00 AM TV-G TV-G 10:00 AM FLIPPER FLIPPER AND THE SEAL 10:15 AM TV-G LIL ABNER TV-G FLIPPER FLIPPER DOLPHINS DON'T SLEEP THE FIRING LINE (1) 10:30 AM PG 10:30 AM 10:10 AM 10:20 AM 10:30 AM TV-PG DARK HORSE TV-G TV-G FLIPPER FLIPPER THE THUNDERBIRDS AUNT MARTHA THE FIRING LINE (2) 11:00 AM OPERATION CRASH DIVE 10:40 AM 11:00 AM 10:50 AM 11:00 AM 10:45 AM TV-PG-V TV-PG THE THUNDERBIRDS 11:30 AM TV-PG KAYLA SUN PROBE 11:30
  • Social Control and Surveillance in the Society of Consumers

    Social Control and Surveillance in the Society of Consumers

    International Journal of Sociology and Anthropology Vol. 3(6) pp. 180-188, June 2011 Available online http://www.academicjournals.org/ijsa ISSN 2006-988x ©2011 Academic Journals Review Social control and surveillance in the society of consumers Massimo Ragnedda Dipartimento di Economia Istituzioni e Società (DEIS), Facoltà di Lettere e Filosofia, Università degli Studi di Sassari, Piazza Conte di Moriana 8, 07100 Sassari, Italy. E-mail: [email protected]. Tel: +39 079229654. Fax: +39 079229660 Accepted January 21, 2011 The new Information and Communication Technologies (ICTs) introduced a highly automated and much cheaper systematic observation of personal data. ICTs advance the intensification and the extension of surveillance, such that an expanding quantity of data can now be collected, tabulated and cross- referenced more rapidly and more accurately than old paper files. This process contributes to the building a "new electronic cage" constraining the individual, on the basis of his e-profile and data- matching. Especially two agents of surveillance are interested in collecting and using such data: government authorities and private corporations. Massive stores of personal data held on ordinary people are now vital to both public services and private business purposes. The new electronic cage is more all-encompassing and complete, being able to produce a complete profile of citizens and consumers in real time. Both public and private information agencies rely on one another for creating and modelling the profiles of good citizens/consumers who, by definition, are well integrated into social life, exhibiting predictable behaviour that conforms to the general needs of contemporary consumer/ oriented social relations.
  • Your Post Has Been Removed

    Your Post Has Been Removed

    Frederik Stjernfelt & Anne Mette Lauritzen YOUR POST HAS BEEN REMOVED Tech Giants and Freedom of Speech Your Post has been Removed Frederik Stjernfelt Anne Mette Lauritzen Your Post has been Removed Tech Giants and Freedom of Speech Frederik Stjernfelt Anne Mette Lauritzen Humanomics Center, Center for Information and Communication/AAU Bubble Studies Aalborg University University of Copenhagen Copenhagen København S, København SV, København, Denmark København, Denmark ISBN 978-3-030-25967-9 ISBN 978-3-030-25968-6 (eBook) https://doi.org/10.1007/978-3-030-25968-6 © The Editor(s) (if applicable) and The Author(s) 2020. This book is an open access publication. Open Access This book is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/ by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made. The images or other third party material in this book are included in the book’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the book’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permit- ted use, you will need to obtain permission directly from the copyright holder. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
  • Nato Standard Atp/Mtp-57 the Submarine Search and Rescue Manual

    Nato Standard Atp/Mtp-57 the Submarine Search and Rescue Manual

    NATO STANDARD ATP/MTP-57 THE SUBMARINE SEARCH AND RESCUE MANUAL Edition C Version 2 NOVEMBER 2015 NORTH ATLANTIC TREATY ORGANIZATION ALLIED/MULTINATIONAL TACTICAL PUBLICATION Published by the NATO STANDARDIZATION OFFICE (NSO) © NATO/OTAN INTENTIONALLY BLANK NORTH ATLANTIC TREATY ORGANISATION (NATO) NATO STANDARDIZATION OFFICE (NSO) NATO LETTER OF PROMULGATION 25 November 2015 1. The enclosed Allied/Multinational Tactical Publication, ATP/MTP-57, Edition C, Version 2, THE SUBMARINE SEARCH AND RESCUE MANUAL, has been approved by the nations in the Military Committee Maritime Standardization Board and is promulgated herewith. The agreement of nations to use this publication is recorded in STANAG 1390. 2. ATP/MTP-57, Edition C, Version 2, is effective upon receipt and supersedes ATP-57; Edition C, Version 1 which shall be destroyed in accordance with the local procedure for the destruction of documents. 3. No part of this publication may be reproduced , stored in a retrieval system, used commercially, adapted, or transmitted in any form or by any means, electronic, mechanical, photo-copying, recording or otherwise, without the prior permission of the publisher. With the exception of commercial sales, this does not apply to member or partner nations, or NATO commands and bodies. 4. This publication shall be handled in accordance with C-M (2002)60. Edvardas MAZEIKIS Major General, LTUAF Director, NATO Standardization Office INTENTIONALLY BLANK ATP/MTP-57 RESERVED FOR NATIONAL LETTER OF PROMULGATION Edition (C) Version (2) I ATP/MTP-57 INTENTIONALLY BLANK Edition (C) Version (2) II ATP/MTP-57 RECORD OF RESERVATIONS CHAPTER RECORD OF RESERVATION BY NATIONS 1-7 TURKEY 2 ESTONIA 1-7 LATVIA Note: The reservations listed on this page include only those that were recorded at time of promulgation and may not be complete.
  • The Folklore of UFO Narratives

    The Folklore of UFO Narratives

    Utah State University DigitalCommons@USU All Graduate Plan B and other Reports Graduate Studies 5-2012 Saucers and the Sacred: The Folklore of UFO Narratives Preston C. Copeland Utah State University Follow this and additional works at: https://digitalcommons.usu.edu/gradreports Part of the American Studies Commons Recommended Citation Copeland, Preston C., "Saucers and the Sacred: The Folklore of UFO Narratives" (2012). All Graduate Plan B and other Reports. 149. https://digitalcommons.usu.edu/gradreports/149 This Thesis is brought to you for free and open access by the Graduate Studies at DigitalCommons@USU. It has been accepted for inclusion in All Graduate Plan B and other Reports by an authorized administrator of DigitalCommons@USU. For more information, please contact [email protected]. Utah State University DigitalCommons@USU All Graduate Plan B and other Reports Graduate Studies, School of 1-1-2012 Saucers and the Sacred: The olF klore of UFO Narratives Preston C. Copeland Utah State University Recommended Citation Copeland, Preston C., "Saucers and the Sacred: The oF lklore of UFO Narratives" (2012). All Graduate Plan B and other Reports. Paper 149. http://digitalcommons.usu.edu/gradreports/149 This Thesis is brought to you for free and open access by the Graduate Studies, School of at DigitalCommons@USU. It has been accepted for inclusion in All Graduate Plan B and other Reports by an authorized administrator of DigitalCommons@USU. For more information, please contact [email protected]. SAUCERS AND THE SACRED: THE FOLKLORE OF UFO NARRATIVES By Preston C. Copeland A thesis submitted in partial fulfillment of the requirements for the degree Of MASTER OF SCIENCE In AMERICAN STUDIES UTAH STATE UNIVERSITY Logan, Utah 2012 1 PRESTON COPELAND RATIONAL UFOLOGY: THE RITES OF PASSAGE IN ALIEN ABDUCTION NARRATIVES.
  • Ufo Investigations in Cold War America, 1947-1977 Kate Dorsch University of Pennsylvania, Kate.Dorsch.Hps@Gmail.Com

    Ufo Investigations in Cold War America, 1947-1977 Kate Dorsch University of Pennsylvania, [email protected]

    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations 2019 Reliable Witnesses, Crackpot Science: Ufo Investigations In Cold War America, 1947-1977 Kate Dorsch University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the United States History Commons Recommended Citation Dorsch, Kate, "Reliable Witnesses, Crackpot Science: Ufo Investigations In Cold War America, 1947-1977" (2019). Publicly Accessible Penn Dissertations. 3231. https://repository.upenn.edu/edissertations/3231 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/3231 For more information, please contact [email protected]. Reliable Witnesses, Crackpot Science: Ufo Investigations In Cold War America, 1947-1977 Abstract This dissertation explores efforts to design and execute scientific tuds ies of unidentified flying objects (UFOs) in the United States in the midst of the Cold War as a means of examining knowledge creation and the construction of scientific uthora ity and credibility around controversial subjects. I begin by placing officially- sanctioned, federally-funded UFO studies in their appropriate context as a Cold War national security project, specifically a project of surveillance and observation, built on traditional arrangements within the military- industrial-academic complex. I then show how non-traditional elements of the investigations – the reliance on non-expert witnesses to report transient phenomena – created space for dissent, both within the scientific establishment and among the broader American public. By placing this dissent within the larger social and political instability of the mid-20th century, this dissertation highlights the deep ties between scientific knowledge production and the social value and valence of professional expertise, as well as the power of experiential expertise in challenging formal, hegemonic institutions.
  • Koolhaas' Revision of Foucault's Panopticon

    Koolhaas' Revision of Foucault's Panopticon

    Koolhaas’ revision of foucault’s panopticon; or, how architecture and philosophy just met ANDRÉ PATRÃO 1. To ask about the interactions between philosophy and architecture Architecture and philosophy have engaged with one other, directly, marginally, or just simply implicitly, in the works and discourse of academics, practitioners, and critics, most evidently in architectural modernism and postmodernism, but most intensively in the reactions to both. Philosophy has been avidly sought by architects to help question, disclose reveal, systematize, express, and expand the understanding of architectural works, the world upon which they intervene, the discipline itself, and the role of its practitioners and theoreticians. Architecture, in turn, has grown within philosophy from a passing example or an illustrative metaphor of some other matter, or a generally misfit artform within an aesthetic theory, into a topic in its own right—as testified by the recent development of a ‘philosophy of architecture.’ The particularly acute multiplication and radicalization of interactions between philosophy and architecture throughout the 20th century produced a number of well-known cases in which an author, work, school, movement, or approach from one discipline had a direct decisive effect the other. Famously, Norberg-Schulz relied heavily on Martin Heidegger’s philosophical writings to elaborate his own distinctive architectural phenomenological isparchitecture.com theories. Kenneth Frampton, also well-read in the German philosopher’s writings, was never shy about the effect Hannah Arendt exerted on him. At times philosophers and architects collaborated, such as in 1985 when Bernard Tschumi invited Jacques Derrida and Peter Eisenman to design a garden pavilion in Parc de la Villette (1982-1998), or when discussions between Jean Baudrillard and Jean Nouvel were published as the book The Singular Objects of Architecture (2002).
  • Which Side Are You On? a New Panopticon Vs

    Which Side Are You On? a New Panopticon Vs

    Which Side Are You On? A New Panopticon vs. Privacy Miltiadis Kandias, Lilian Mitrou, Vasilis Stavrou and Dimitris Gritzalis Information Security & Critical Infrastructure Protection Research Laboratory, Dept. of Informatics, Athens University of Economics & Business, 76 Patission Ave., GR-10434, Athens, Greece Keywords: Awareness, Panopticon, Privacy, Social Media, Surveillance, User Profiling, YouTube. Abstract: Social media and Web 2.0 have enabled internet users to contribute online content, which may be crawled and utilized for a variety of reasons, from personalized advertising to behaviour prediction/profiling. One negative case scenario is the political affiliation profiling. Our hypothesis is that this scenario is nowadays realistic, applicable to social media, and violates civil rights, privacy and freedom. To demonstrate this, we developed a horror story, i.e., a Panopticon method, in order to reveal this threat and contribute in raising the social awareness over it. The Panopticon relies on data/opinion mining techniques; hence it classifies comments, videos and playlists, collected from the popular social medium YouTube. Afterwards, it aggre- gates these classifications in order to decide over the users’ political affiliation. The experimental test case of the Panopticon is an extensive Greek community of YouTube users. In order to demonstrate our case, we performed an extensive graph theoretical and content analysis of the collected dataset and show how and what kind of personal data (e.g. political attitude) can be derived via data mining on publicly available YouTube data. Then, we provide the reader with an analysis of the legal means that are available today, to a citizen or a society as a whole, so as to effectively be prevented from such a threat.