diff options
author | Silvio Rhatto <rhatto@riseup.net> | 2024-05-08 21:46:14 -0300 |
---|---|---|
committer | Silvio Rhatto <rhatto@riseup.net> | 2024-05-08 21:46:14 -0300 |
commit | 7bbf4c6cbe40e3db0ec5022c498ab98619bcfa55 (patch) | |
tree | 2b2ed2489e9e35500487198a26b9b3dc342cdae7 /surveillance.bib | |
parent | 9530d9fef9e12180e3b3b5ae613d086178a636dd (diff) | |
download | biblio-7bbf4c6cbe40e3db0ec5022c498ab98619bcfa55.tar.gz biblio-7bbf4c6cbe40e3db0ec5022c498ab98619bcfa55.tar.bz2 |
Misc additions
Diffstat (limited to 'surveillance.bib')
-rw-r--r-- | surveillance.bib | 13 |
1 files changed, 13 insertions, 0 deletions
diff --git a/surveillance.bib b/surveillance.bib index f7996ca..68581fe 100644 --- a/surveillance.bib +++ b/surveillance.bib @@ -122,3 +122,16 @@ url = "https://www.forbes.com/sites/kashmirhill/2013/07/24/blueprints-of-nsa-data-center-in-utah-suggest-its-storage-capacity-is-less-impressive-than-thought/?sh=701cc9807457", note = "Acessado em 07/04/2024", } + +@article{brunton2011, + title = {Vernacular resistance to data collection and analysis: A political theory of obfuscation}, + author = {Brunton, Finn and Nissenbaum, Helen}, + year = {2011}, + journal = {First Monday}, + number = {5}, + month = {Apr.}, + volume = {16}, + url = {https://firstmonday.org/ojs/index.php/fm/article/view/3493}, + doi = {10.5210/fm.v16i5.3493}, + abstract = {Computer-enabled data collection, aggregation, and mining dramatically change the nature of contemporary surveillance. Refusal is not a practical option, as data collection is an inherent condition of many essential societal transactions. We present one vernacular response to this regime of everyday surveillance, a tactic we call obfuscation. With a variety of possible motivations, actors engage in obfuscation by producing misleading, false, or ambiguous data with the intention of confusing an adversary or simply adding to the time or cost of separating bad data from good. Our paper develops a political theory of obfuscation, linking contemporary and historical cases to develop a descriptive account of obfuscation that is able to capture key commonalities in systems from radar chaff to BitTorrent.}, +} |