Publication Cover
The Information Society
An International Journal
Volume 32, 2016 - Issue 4
1,510
Views
26
CrossRef citations to date
0
Altmetric
Articles

Built to lie: Investigating technologies of deception, surveillance, and control

Pages 229-240 | Received 19 Oct 2015, Accepted 11 Feb 2016, Published online: 31 May 2016

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (4)

Roderic Crooks & Morgan Currie. (2021) Numbers will not save us: Agonistic data practices. The Information Society 37:4, pages 201-213.
Read now
Michelle Cayford & Wolter Pieters. (2020) Effectiveness fettered by bureaucracy : why surveillance technology is not evaluated. Intelligence and National Security 35:7, pages 1026-1041.
Read now
Torin Monahan. (2018) Ways of being seen: surveillance art and the interpellation of viewing subjects. Cultural Studies 32:4, pages 560-581.
Read now
Michelle Cayford & Wolter Pieters. (2018) The effectiveness of surveillance technology: What intelligence officials are saying. The Information Society 34:2, pages 88-103.
Read now

Articles from other publishers (22)

Isabel Ebert & Florian Wettstein. (2024) Menschenrechtliche Herausforderungen und Lösungsansätze in der digitalisierten Wirtschaft aus der Perspektive von Business and Human Rights und integrativer Wirtschaftsethik. Sozialer Fortschritt 73:3, pages 171-194.
Crossref
Sille Obelitz Søe & Jens-Erik Mai. (2022) Data identity: privacy and the construction of self. Synthese 200:6.
Crossref
Torin Monahan. 2022. Crisis Vision. Crisis Vision 179 204 .
Torin Monahan. 2022. Crisis Vision. Crisis Vision 147 178 .
Torin Monahan. 2022. Crisis Vision. Crisis Vision 139 146 .
Torin Monahan. 2022. Crisis Vision. Crisis Vision 115 138 .
Torin Monahan. 2022. Crisis Vision. Crisis Vision 90 114 .
Torin Monahan. 2022. Crisis Vision. Crisis Vision 69 89 .
Torin Monahan. 2022. Crisis Vision. Crisis Vision 43 68 .
Torin Monahan. 2022. Crisis Vision. Crisis Vision 21 42 .
Torin Monahan. 2022. Crisis Vision. Crisis Vision 1 20 .
Awsan R. Rassam, Kamal Tammim, Hussein Mohammed Esmail Abualrejal, Fathey Mohammed, Nabil Hasan Al-kumaim & Yousef Fazea. 2022. Proceedings of International Conference on Emerging Technologies and Intelligent Systems. Proceedings of International Conference on Emerging Technologies and Intelligent Systems 638 645 .
Isabel Ebert, Isabelle Wildhaber & Jeremias Adams-Prassl. (2021) Big Data in the workplace: Privacy Due Diligence as a human rights-based approach to employee privacy protection. Big Data & Society 8:1, pages 205395172110130.
Crossref
Jessica MegarryJessica Megarry. 2020. The Limitations of Social Media Feminism. The Limitations of Social Media Feminism 35 85 .
Zaheer AllamZaheer Allam. 2020. Cities and the Digital Revolution. Cities and the Digital Revolution 1 29 .
Kathy Dobson. (2019) Welfare Fraud 2.0? Using Big Data to Surveil, Stigmatize, and Criminalize the Poor. Canadian Journal of Communication 44:3, pages 331-342.
Crossref
Nora A Draper & Joseph Turow. (2019) The corporate cultivation of digital resignation. New Media & Society 21:8, pages 1824-1839.
Crossref
Yubo Kou, Xinning Gui, Yunan Chen & Bonnie Nardi. (2019) Turn to the Self in Human-Computer Interaction. Turn to the Self in Human-Computer Interaction.
Richard K. MouleJr.Jr., Bryanna Hahn Fox & Megan M. Parry. (2018) The Long Shadow of Ferguson: Legitimacy, Legal Cynicism, and Public Perceptions of Police Militarization. Crime & Delinquency 65:2, pages 151-182.
Crossref
Brendan McQuade. (2018) Windows into the Soul or the Clouded Glass of Surveillance Studies . Critical Sociology 44:4-5, pages 815-824.
Crossref
Frederick W. Turner II & Bryanna FoxFrederick W. TurnerIIII & Bryanna Fox. 2018. Police Militarization. Police Militarization 31 35 .
Aaron Plasek. (2016) On the Cruelty of Really Writing a History of Machine Learning. IEEE Annals of the History of Computing 38:4, pages 6-8.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.