This month, I rewrote my second-year project proposal for the third and fourth times. (First and second iterations happened in January and February). Each complete rewrite brought with it a new or expanded set of literature. I also spent ten days traveling to DrupalCon Nashville and the Computing Research Association’s Grad Women’s Cohort.
The semester is over (!!) though I still have many tasks remaining.
Below is a list of books and articles I read this month.
Adey, P. (2009). Facing Airport Security: Affect, Biopolitics, and the Preemptive Securitisation of the Mobile Body. Environment and Planning D: Society and Space, 27(2), 274–295. https://doi.org/10.1068/d0208
Albrechtslund, A. (2008). Online social networking as participatory surveillance. First Monday, 13(3). Retrieved from http://journals.uic.edu/ojs/index.php/fm/article/view/2142
boyd, danah, & Crawford, K. (2012). CRITICAL QUESTIONS FOR BIG DATA. Information, Communication and Society., 15(5), 662–679.
Brock, A. (2018). Critical technocultural discourse analysis. New Media & Society, 20(3), 1012–1030. https://doi.org/10.1177/1461444816677532
Could Fitbit Data Be Used to Deny Health Coverage? (n.d.). Retrieved April 26, 2018, from https://www.usnews.com/news/national-news/articles/2017-02-17/could-fitbit-data-be-used-to-deny-health-insurance-coverage
Draper, K. (2018, March 13). Madison Square Garden Has Used Face-Scanning Technology on Customers. The New York Times. Retrieved from https://www.nytimes.com/2018/03/13/sports/facial-recognition-madison-square-garden.html
Duhigg, C. (2012, February 16). How Companies Learn Your Secrets. The New York Times. Retrieved from https://www.nytimes.com/2012/02/19/magazine/shopping-habits.html
February 27, M. B. P., & 2018. (2018, February 27). Prehistoric Puppy May Be Earliest Evidence of Pet-Human Bonding. Retrieved February 27, 2018, from https://news.nationalgeographic.com/2018/02/ancient-pet-puppy-oberkassel-stone-age-dog/
Gillen, J., & Petersen, A. (Eds.). (2004). Discourse Analysis. In Research Methods in the Social Sciences (1 edition, pp. 146–153). London ; Thousand Oaks, Calif: SAGE Publications Ltd.
Glaser, A. (2018, April 4). No Matter What Facebook Says, You Can’t Clean Up a Data Spill. Retrieved April 4, 2018, from https://slate.com/technology/2018/04/facebook-cant-clean-up-its-data-spill.html
Grand View Research. (2016, February). Pet Wearable Market Size To Reach $2.36 Billion By 2022. Retrieved April 17, 2018, from https://www.grandviewresearch.com/press-release/global-pet-wearable-market
Haggerty, K. D., & Ericson, R. V. (2000). The Surveillant Assemblage. The British Journal of Sociology, 51(4), 605–622. https://doi.org/10.1080/00071310020015280
Hassan, D. (2016). Surveillance by Proxy: Sport and Security in a Modern Age. American Behavioral Scientist, 60(9), 1043–1056. https://doi.org/10.1177/0002764216632840
Iliadis, A., & Russo, F. (2016). Critical data studies: An introduction. Big Data & Society, 3(2), 2053951716674238. https://doi.org/10.1177/2053951716674238
Kitchin, R., & Lauriault, T. (2014). Towards Critical Data Studies: Charting and Unpacking Data Assemblages and Their Work (SSRN Scholarly Paper No. ID 2474112). Rochester, NY: Social Science Research Network. Retrieved from https://papers-ssrn-com.ezproxy1.lib.asu.edu/abstract=2474112
Lawson, S., Kirman, B., Linehan, C., Feltwell, T., & Hopkins, L. (2015). Problematising Upstream Technology Through Speculative Design: The Case of Quantified Cats and Dogs. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 2663–2672). New York, NY, USA: ACM. https://doi.org/10.1145/2702123.2702260
Lente, H. van, Swierstra, T., & Joly, P.-B. (2017). Responsible innovation as a critique of technology assessment. Journal of Responsible Innovation, 4(2), 254–261. https://doi.org/10.1080/23299460.2017.1326261
Lupton, D. (2016). Digital companion species and eating data: Implications for theorising digital data–human assemblages. Big Data & Society, 3(1), 2053951715619947. https://doi.org/10.1177/2053951715619947
Mäkinen, L. A. (2016). Surveillance On/Off: Examining Home Surveillance Systems From The User’s Perspective. Surveillance & Society, 14(1), 59–77.
Michael, K. (2015). Sousveillance: Implications for Privacy, Security, Trust, and the Law. IEEE Consumer Electronics Magazine, 4(2), 92–94. https://doi.org/10.1109/MCE.2015.2393006
Michael, K. (2017). Are You Addicted to Your Smartphone, Social Media, and More?: The New AntiSocial App Could Help. IEEE Consumer Electronics Magazine, 6(4), 116–121. https://doi.org/10.1109/MCE.2017.2714421
Neff, G., & Nafus, D. (2016). Self-Tracking. Cambridge, Massachusetts: The MIT Press.
Newman, K. (2018, January 29). Fitness App Reveals Remote Military Bases. Retrieved April 18, 2018, from https://www.usnews.com/news/world/articles/2018-01-29/fitness-app-strava-reveals-military-security-oversight
Noble, S. U. (2018). Algorithms of Oppression: How Search Engines Reinforce Racism. New York: NYU Press.
Oudheusden, M. van. (2014). Where are the politics in responsible innovation? European governance, technology assessments, and beyond. Journal of Responsible Innovation, 1(1), 67–86. https://doi.org/10.1080/23299460.2014.882097
Richards, N. (2013). The Dangers of Surveillance. Retrieved April 1, 2018, from https://harvardlawreview.org/2013/05/the-dangers-of-surveillance/
Ritvo, S. E., & Allison, R. S. (2017). Designing for the exceptional user: Nonhuman animal-computer interaction (ACI). Computers in Human Behavior, 70, 222–233. https://doi.org/10.1016/j.chb.2016.12.062
Seneviratne, S., Seneviratne, A., Mohapatra, P., & Mahanti, A. (2014). Your installed apps reveal your gender and more! In Proceedings of the ACM MobiCom workshop on Security and privacy in mobile environments (pp. 1–6). ACM.
Weiss, G. M., Nathan, A., Kropp, J. B., & Lockhart, J. W. (2013). WagTag: A Dog Collar Accessory for Monitoring Canine Activity Levels. In Proceedings of the 2013 ACM Conference on Pervasive and Ubiquitous Computing Adjunct Publication (pp. 405–414). New York, NY, USA: ACM. https://doi.org/10.1145/2494091.2495972
What Is a Telematics Device? | Allstate. (n.d.). Retrieved April 26, 2018, from https://www.allstate.com/tools-and-resources/car-insurance/telematics-device.aspx
Yeshi. (2018, April 4). An Open Letter to Facebook from the Data for Black Lives Movement. Retrieved April 5, 2018, from https://medium.com/@YESHICAN/an-open-letter-to-facebook-from-the-data-for-black-lives-movement-81e693c6b46c
Ziewitz, M. (2016). Governing Algorithms: Myth, Mess, and Methods. Science, Technology & Human Values, 41(1), 3–16. https://doi.org/10.1177/0162243915608948