{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:20:04Z","timestamp":1761664804198,"version":"3.40.3"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031844591"},{"type":"electronic","value":"9783031844607"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-84460-7_42","type":"book-chapter","created":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T04:01:49Z","timestamp":1741233709000},"page":"657-677","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Rethinking the Rhetoric of Surveillance in Public Safety: A Critical Discourse Analysis"],"prefix":"10.1007","author":[{"given":"Kem-Laurin","family":"Lubin","sequence":"first","affiliation":[]},{"given":"Lai-Tze","family":"Fan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,7]]},"reference":[{"key":"42_CR1","unstructured":"Heikkil\u00e4, M.: United Nations Commissioner Warns of AI Threats to Privacy. Politico (2021)"},{"key":"42_CR2","unstructured":"CPO Magazine: The European Union\u2019s AI Act: Restrictions on Surveillance Technologies. CPO Magazine (2023)"},{"key":"42_CR3","unstructured":"OHCHR: Volker T\u00fcrk: AI and the Risk of Authoritarianism. UN Office of the High Commissioner for Human Rights (2022)"},{"key":"42_CR4","unstructured":"Brookings Institution: AI, Surveillance, and Civil Liberties: A Critical Look. Brookings (2023)"},{"key":"42_CR5","doi-asserted-by":"publisher","DOI":"10.1515\/9780822375302","volume-title":"Dark Matters: On the Surveillance of Blackness","author":"S Browne","year":"2015","unstructured":"Browne, S.: Dark Matters: On the Surveillance of Blackness. Duke University Press, Durham (2015)"},{"key":"42_CR6","unstructured":"Althusser, L.: Ideology and Ideological State Apparatuses (Notes towards an Investigation). In: Lenin and Philosophy and Other Essays, pp. 85\u2013126. Monthly Review Press, New York (1971)"},{"key":"42_CR7","unstructured":"Lyon, D.: The Electronic Eye: The Rise of Surveillance Society. Polity Press (1994)"},{"key":"42_CR8","volume-title":"1984","author":"G Orwell","year":"1949","unstructured":"Orwell, G.: 1984. Secker & Warburg, London (1949)"},{"key":"42_CR9","unstructured":"Zuboff, S.: The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power, PublicAffairs (2019)"},{"key":"42_CR10","unstructured":"Buolamwini, J., Gebru, T.: Gender shades: intersectional accuracy disparities in commercial gender classification. In: Proceedings of the 2018 Conference on Fairness, Accountability, and Transparency, pp. 77\u201391. ACM (2018)"},{"key":"42_CR11","unstructured":"CPO Magazine: ACLU Exposes Amazon\u2019s Rekognition Errors in Matching US Congress Members with Mugshots. CPO Magazine (2024)"},{"key":"42_CR12","first-page":"23","volume":"3","author":"KD Haggerty","year":"2006","unstructured":"Haggerty, K.D.: Tear down the walls: on demolishing the panopticon. Surveill. Soc. 3, 23\u201345 (2006)","journal-title":"Surveill. Soc."},{"key":"42_CR13","volume-title":"Discipline and Punish: The Birth of the Prison","author":"M Foucault","year":"1975","unstructured":"Foucault, M.: Discipline and Punish: The Birth of the Prison. Vintage Books, New York (1975)"},{"key":"42_CR14","doi-asserted-by":"crossref","unstructured":"Pearsall, B.: Predictive Policing: The Future of Law Enforcement? Natl. Inst. Just. J. (2010)","DOI":"10.1037\/e596372010-007"},{"key":"42_CR15","doi-asserted-by":"crossref","unstructured":"Perry, W.L.: Predictive Policing: The Role of Crime Forecasting in Law Enforcement Operations. RAND Corporation (2013)","DOI":"10.7249\/RR233"},{"key":"42_CR16","first-page":"35","volume":"89","author":"EE Joh","year":"2013","unstructured":"Joh, E.E.: Policing by numbers: big data and the fourth amendment. Washington Law Rev. 89, 35\u201366 (2013)","journal-title":"Washington Law Rev."},{"key":"42_CR17","doi-asserted-by":"crossref","unstructured":"Brayne, S.: Predict and Surveil: Data, Discretion, and the Future of Policing. Oxford University Press (2021)","DOI":"10.1093\/oso\/9780190684099.001.0001"},{"key":"42_CR18","doi-asserted-by":"crossref","unstructured":"Ferguson, A.G.: The Rise of Big Data Policing: Surveillance, Race, and the Future of Law Enforcement. NYU Press (2017)","DOI":"10.2139\/ssrn.3959202"},{"key":"42_CR19","unstructured":"Angwin, J., Larson, J., Mattu, S., Kirchner, L.: Machine Bias. ProPublica (2016)"},{"key":"42_CR20","unstructured":"Benjamin, R.: Race After Technology: Abolitionist Tools for the New Jim Code. Polity Press (2019)"},{"key":"42_CR21","unstructured":"USA PATRIOT Act (2001)"},{"key":"42_CR22","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1086\/428442","volume":"110","author":"EM Hafner-Burton","year":"2005","unstructured":"Hafner-Burton, E.M., Tsutsui, K.: Human rights in a globalizing world: the paradox of empty promises. Am. J. Sociol. 110, 1373\u20131411 (2005)","journal-title":"Am. J. Sociol."},{"issue":"2","key":"42_CR23","first-page":"481","volume":"24","author":"P Macklem","year":"2002","unstructured":"Macklem, P.: Human rights in international law: three generations or one? Hum. Rights Q. 24(2), 481\u2013507 (2002)","journal-title":"Hum. Rights Q."},{"key":"42_CR24","unstructured":"Norris, C., Armstrong, G.: The maximum surveillance society: the rise of CCTV. Berg (1999)"},{"key":"42_CR25","unstructured":"Office of the Privacy Commissioner of Canada: Guidelines for Video Surveillance (2008)"},{"key":"42_CR26","unstructured":"Canadian Centre for Cyber Security: Canadian Centre for Cyber Security Act (2018)"},{"key":"42_CR27","unstructured":"DHS (Department of Homeland Security): Border Security Report (2020)"},{"key":"42_CR28","unstructured":"Miller, T.: Border Patrol Nation: Dispatches from the Front Lines of Homeland Security. City Lights Publishers (2014)"},{"key":"42_CR29","unstructured":"Government of Canada: COVID Alert: Canada\u2019s Exposure Notification App (2020)"},{"key":"42_CR30","first-page":"67","volume":"45","author":"T Brown","year":"2020","unstructured":"Brown, T.: COVID-19 contact tracing apps: a canadian privacy perspective. J. Law Technol. 45, 67\u201380 (2020)","journal-title":"J. Law Technol."},{"issue":"101","key":"42_CR31","first-page":"85","volume":"25","author":"R Creemers","year":"2016","unstructured":"Creemers, R.: Cyber China: upgrading propaganda, public opinion work and social management for the 21st century. J. Contemp. China 25(101), 85\u2013101 (2016)","journal-title":"J. Contemp. China"},{"key":"42_CR32","unstructured":"Harrell, P.E.: China\u2019s cybersecurity law: an analysis. China Law J. (2018)"},{"key":"42_CR33","unstructured":"Australian Government: Assistance and Access Bill 2018 (2018)"},{"key":"42_CR34","unstructured":"Privacy International: Australia\u2019s Surveillance Legislation Raises Concerns (2018)"},{"key":"42_CR35","unstructured":"Soldatov, A., Borogan, I.: The Red Web: The Struggle Between Russia\u2019s Digital Dictators and the New Online Revolutionaries. PublicAffairs (2015)"},{"key":"42_CR36","unstructured":"Land Transport Authority of Singapore: Intelligent Transport Systems: A Smart Future (2020)"},{"key":"42_CR37","unstructured":"World Bank: Efficient Utility Management for Public Sector Utilities (2016)"},{"key":"42_CR38","unstructured":"EPA: Water Efficiency Guidelines (2018)"},{"key":"42_CR39","unstructured":"O\u2019Neil, C.: Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy. Crown Publishing (2016)"},{"key":"42_CR40","unstructured":"Garvie, C., Bedoya, A., Frankle, J.: The perpetual line-up: unregulated police face recognition in America. In: Georgetown Law Center on Privacy & Technology (2016)"},{"key":"42_CR41","unstructured":"NIST: DNA Analysis Errors in Forensics: Implications for Justice. National Institute of Standards and Technology (2019)"},{"key":"42_CR42","unstructured":"Berry, D.M.: The Philosophy of Software: Code and Mediation in the Digital Age. Palgrave Macmillan (2011)"},{"key":"42_CR43","doi-asserted-by":"crossref","unstructured":"Nielsen, J., Molich, R.: Heuristic evaluation of user interfaces. In: Proceedings of the ACM CHI\u201990 Conference on Human Factors in Computing Systems (1990)","DOI":"10.1145\/97243.97281"},{"key":"42_CR44","unstructured":"Barnard-Wills, D.: Surveillance and identity: discourse, subjectivity and the state. J. Surveillance Stud. (2012)"},{"key":"42_CR45","unstructured":"Cheney-Lippold, J.: We Are Data: Algorithms and the Making of Our Digital Selves. NYU Press (2017)"},{"key":"42_CR46","unstructured":"Dodge, M., Kitchin, R.: The Ethics of Predictive Policing and Urban Surveillance. Routledge (2005)"}],"container-title":["Lecture Notes in Networks and Systems","Advances in Information and Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-84460-7_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T04:02:16Z","timestamp":1741233736000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-84460-7_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031844591","9783031844607"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-84460-7_42","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"7 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FICC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Future of Information and Communication Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Berlin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ficc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/saiconference.com\/FICC","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}