首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 546 毫秒
1.
This article attempts to think citizenship politics in the international security context of a post‐September 11th world. Considering specifically the introduction of biometric technologies, the article reveals the extent to which contemporary citizenship is securitized as a part of the wider post‐September 11th ‘securitization of the inside’. This securitization contributes directly to the intensification of conventional citizenship practice, as biometric technologies are employed to conceal and advance the heightened exclusionary and restrictive practices of contemporary securitized citizenship. The intensified restriction and preservation of particular rights and entitlements, vis‐à‐vis the application of biometric technologies, serves both private and public concerns over ‘securing identity’. This overall move, and the subsequent challenges to conventional notions of citizenship politics and agency, is referred to here as ‘identity management’. To then ask ‘What's left of citizenship?’ sheds light on these highly political transformations, as the restricted aspects of citizenship—that is, its continued obsession with the preservation and regulation/restriction of specific rights and entitlements—are increased, and the instrument of this escalation, biometrics, dramatically alters existing notions of political agency and ‘citizenship/asylum politics’.  相似文献   

2.
In this article, I probe an example of high‐technology medicine as a case study in the problems of the regulation of advancing technology. Specifically, I address the implications of pharmacogenomics—an emerging form of population‐based health care intervention—for public policies designed to eliminate racial disparities in health. Using the case of BiDil, a historical precursor to pharmacogenetic technology, I offer a framework for further studies of high‐technology medicine in which policy analysis is part of a social review based on the justice standard of ex ante mutual advantage. It is the contention in this article that the most just and reasonable deployment of pharmacogenomics is as a compensatory tool to alleviate health disparities.  相似文献   

3.
This article assesses and presents the determinants and directions of Chinese acquisitions of weapons and weapons technology from abroad, focusing on major conventional weapons and their relevant technologies. Following a brief development of historical themes which continue to affect Chinese military‐related imports today, the study considers the principal contemporary domestic and international determinants which contribute to shaping Chinese arms import policies, and the type of foreign arms acquisitions likely to result from those policies. In analysing past and current security policies, weapons development policies, foreign weapons procurement policies, the study reaches four main conclusions. First, a wide range of problems — including prohibitive cost, political and bureaucratic infighting, absorptive capacities, managerial and administrative roadblocks, and supplier controls — stand in the way of a Chinese military modernization strategy based on foreign procurement. Second, with the exception of Sino‐Soviet cooperation in the 1950s, Chinese arms and arms technology acquisitions from abroad have consistently been relatively modest, sporadic, and problematic. Even in the case of current transfers from such suppliers as Israel and Russia, it is unclear the extent to which these countries are willing to part with significant amounts of top‐of‐the‐line systems and technologies. Third, the impact upon international security of the improvement of Chinese military capability through the acquisition of foreign weapons and technology is not likely to manifest itself in violent military disruptiveness, but rather in the nuanced and steady expansion of Chinese power and influence in parts of East Asia around China's periphery. Fourth, the military capabilities of China's arms clients will probably not be significantly improved through the acquisition of foreign weapons and weapons technologies by China. In sum, Chinese military modernization through arms and technology imports will continue to be a slow and painful process.  相似文献   

4.
This article considers the impact of digital technologies on privacy and, specifically, the issues arising from metadata. It takes the 2016 Investigatory Powers Act as an exemplar and argues, by reference to European case law, that while data arising from new technologies undoubtedly fall within the scope of privacy protections, there are questions as to the level of protection awarded. Questions arise from how the nature and intensity of intrusion is understood against a backdrop of ‘dataveillance’, as well as the underlying issue of whether ex post controls—through oversight mechanisms—are sufficient to safeguard privacy.  相似文献   

5.
The central position of this article is that validation and interoperability are paramount for the effective and ethical use of biometrics. Illuminating the relevance for policymakers of the science underlying the security and privacy aspects of biometrics, this article calls for adequate and enforceable performance metrics that can be independently corroborated. Accordingly, the article considers biometrics and forensics for the dual challenges of addressing security and privacy using smart identity management. The discussion revolves around the concepts of “personally identifiable information” (PII) and interoperability with emphasis on quantitative performance analysis and validation for uncontrolled operational settings, variable demographics, and distributed and federated operations. Validation metrics includes expected rates of identification/misidentification, precision, and recall. The complementary concepts of identity and anonymity are addressed in terms of expected performance, functionality, law and ethics, forensics, and statistical learning. Biometrics encompasses appearance, behavior, and cognitive state or intent. Modes of deployment and performance evaluation for biometrics are detailed, with operational and adversarial challenges for both security and privacy described in terms of trustworthiness, vulnerabilities, functional creep, and feasibility of safeguards. The article underscores how lack of interoperability is mostly due to overfitting and tuning to well‐controlled settings, so that validation merely confirms “teaching to the test” rather than preparation for real‐world deployment. Most important for validation is reproducibility of results including full information on the experimental design used, that forensic exclusion is allowed, and that scientific methods for performance evaluation are followed. The article concludes with expected developments regarding technology use and advancements that bear on security and privacy, including data streams and video, de‐anonymization and reidentification, social media analytics and cyber security, and smart camera networks and surveillance.  相似文献   

6.
E‐government uses information and communication technology to provide citizens with information about public services. Less pervasive, e‐democracy offers greater electronic community access to political processes and policy choices. Few studies have examined these twin applications separately, although they are widely discussed in the literature as distinct. The authors, Chung‐pin Lee of Tamkang University and Kaiju Chang and Frances Stokes Berry of Florida State University, empirically analyze factors associated with the relative level of development of e‐government and e‐democracy across 131 countries. Their hypotheses draw on four explanations of policy change—learning, political norms, competition, and citizen pressures. All four explanations are strongly linked to nations where e‐government policy is highly advanced, whereas a country’s e‐democracy development is connected to complex internal factors, such as political norms and citizen pressures.  相似文献   

7.
The Conservative party's recent proposal to introduce compulsory medical examinations for immigrants should it win the upcoming election marks a departure in the politics of immigration and public health. For many years, the public health impact of immigration was kept out of party competition and successive governments pursued a voluntaristic approach to health checks. In this article, I outline the political history of immigration and public health, and consider the implications of attempts to raise the subject onto the public agenda. I argue that recent developments militate against a calm and balanced approach to the genuine public health concerns associated with immigration, which threatens not only to stigmatise immigrants and stoke anti-immigrant popular opinion, but also prevent the development of effective policies. In particular, the introduction of compulsory examinations may create perverse incentives for migrants to circumvent legal channels and thereby actually increase public health risks.  相似文献   

8.
New technologies provide new channels of access to political information and participation in decision‐making processes. This assumption is clearly important in the action plans and policies of International Organizations (World Bank, Organisation for Economic Co‐operation and Development, United Nations), which have assumed a leadership role in the reform of political institutions. Starting from an analysis of the reasons that have brought the state and processes of institution building back into focus, this paper will reconstruct the International Organizations' vision of the transformative potential of new information technologies and their activity in this field. Particular attention will be devoted to e‐democracy and e‐government as policies to build democracy in developing countries.  相似文献   

9.
More than a decade after the first introduction of the e‐government policies, early enthusiasms on its immediate benefits on the quality of democracy have undergone critical review. E‐government implementation worldwide has proved that technology alone does not necessarily provide more access and more participation. Massive technological intervention is not enough for reinventing government online. Hence, other variables should be taken into consideration. Factors concerning political culture, cognitive frames and mentality, administrative traditions, as well as the country‐specific peculiarities play a relevant role in determining if and how e‐gov initiatives can succeed or fail. In this article, it will be argued that any opportunity and push for change and actual influence on administrations, governments, and societies, prompted by the new technologies, should endure important variables of political, social, and cultural nature. The political and socio‐cultural variables then overcome the technological one and we can state that politics (still) determines (e‐)policy.  相似文献   

10.
How can the enforcement of policies in the past influence a society's future adoption of information communication technologies (ICTs)? In this paper, we tackle this question by exploring how past e-governance policies influence citizens' willingness to use the health QR code, which is a COVID-19 tracing app widely used in China's pandemic control. Past policies regarding smart-city development in China involve two aspects: the construction of electronic infrastructure and the applications of specific technologies. Empirical analysis based on a nationwide dataset in China suggests that past policies exhibit persuasive effects and influence citizens' acceptance of the health QR code. Specifically, e-governance applications in cities significantly enhance citizens' acceptance through the demonstration of their usefulness. However, the construction of e-governance infrastructure per se does not have the same impact on citizens' acceptance. By connecting citizens' acceptance of new technology with past e-governance policies, the study illustrates a nuanced policy feedback mechanism through which past policies can substantially reshape public opinion by policy outcomes.  相似文献   

11.
This article examines the cycles of political participation/exclusion in modern history. It juxtaposes three cycles of political participation/exclusion—the imperial subject, national citizenship, and corporate subject—with three cycles in the structure of accumulation—the imperialist/colonialist, nationalist, and globalist structures of accumulation. The article argues that the contemporary system of accumulation has dismantled the nation state as the vehicle of economic development and diluted citizenship through neoliberal policies. With eroding state protection, working class people are subordinated to corporations for jobs, consumption, investment, and culture. In order to counter this situation and to achieve emancipation from the capitalist pursuit of profit and rampant consumerism, it is necessary to create alternatives to the contemporary corporate‐dominated system. The article explores sustainable community development as an alternative.  相似文献   

12.
Information and communications technologies (ICTs) include old technologies—such as the radio and the television—as well as newer technologies—such as the Internet and wireless telephony. This study considers the process that the government of Uganda has used to adopt and implement ICT policy. This study also considers the techniques which the government of Uganda has used to distribute ICTS in public locations such as government offices, schools, and hospitals. In particular, this study attempts to consider the political motivations for distribution. The Ugandan government's attempt to distribute this technology reflects strengths in the area of distribution of artefacts, particularly to rural areas. Information and communications technologies are an important part of the Ugandan economy. In addition, ICTs strengthen the ability of citizens to communicate with each other across regional and language borders through shared access points. Methodologically, this paper uses the case study method. Semi‐structured interviews were conducted with politicians, policy makers, civil society activists, citizens, academics, medical personnel, regional government officials, and business people. This paper argues that politicians use ICTs as a component of a basket of goods and services that they can distribute to witnessing publics. This paper argues that ICT should be viewed as a type of infrastructure, and that as a public good, it can be used as a “club” good or “pork.” Although several authors discuss the potential of ICTs as democratizing, this paper documents that the Ugandan government has employed ICTs in oppressive ways, including for the surveillance of opposition leaders, and for social control.  相似文献   

13.
In this article, we will compare ethical issues raised by first and second generation biometrics. First generation biometrics use characteristics readily visible to the naked eye to ensure that the person identified is the person he claims to be, whereas second generation biometrics focus on behavioral patterns with the aim of predicting suspicious behavior or hostile intentions. While the collection of biometric features for identification is visible to the person involved, capturing biometric features from a distance may go unnoticed. Our study of a range of U.S. and European projects of second generation biometrics, particularly of Future Attribute Screening Technology and Automatic Detection of Abnormal Behaviour and Threats in crowded Spaces, shows that if data subjects are not aware of the processing of their data, and if behavioral patterns are interpreted without any knowledge of the subject's will and motives, there are risks of discrimination and stigmatization. Thus, second generation biometrics raise some new ethical concerns besides issues of integrity, privacy, and data protection and further underscore the importance of the principle of informed consent in order to maintain public trust.  相似文献   

14.
An organization should address ethical issues including privacy before deploying biometric systems. Threats to informational privacy rights related to potential data misuse, function creep, and the data linkage of personal information contained in diverse databases makes possible such unintended consequences as surveillance, profiling, and discrimination. Unlike passwords, biometric data are unique, irrevocable, and variable. Biometric encryption (BE) is highlighted as a prominent example of Privacy by Design, where privacy is embedded as a core functionality in the biometric system. BE binds a digital key to (or extracts the key from) the biometrics. Earlier technical challenges to this new technology, as well as recent advances, are presented. Lastly, an overview is provided of an application using facial recognition (FR) in a watch list scenario, known to be the first and largest successful deployment of BE using FR, in a casino context.  相似文献   

15.
The Bush administration's “Smart Border” accords with Mexico and Canada present a number of important implications for North America's border communities and regions. As part of the plans, new security technologies have emerged as the preferred policy solution to the difficult problem of screening for weapons and terrorist incursions into the United States through its international boundaries while maintaining flows of goods and individuals, key drivers of globalization and hallmarks of the North American Free Trade Agreement (NAFTA) era. These new technological systems have various capabilities, ranging from prescreening cargo to identifying problematic travelers to detecting nuclear material in trucks. Deploying these systems in border communities, however, invokes a range of important economic, social, and political challenges, all of which are under examination in this work. Using a risk‐centered approach to United States border security, this article explores several technologically oriented border control systems: screening, biometrics, and information technology. The research is based on regional field research and a public policy analysis method that uses Birkland's “focusing event” framework, a model that provides insights into the postcrisis policy formation process. The article concludes by offering an initial appraisal of these policies within the context of risk, interdependent border communities, and an open democratic society.  相似文献   

16.
Information is essential to the success of market-oriented policies. Information on health care costs and quality is collected and distributed by state governments through health data organizations (HDOs) to enhance competition and lower costs in the medical industry and to improve consumer choice among medical alternatives. This article examines the information collected, produced, and distributed by state health data organizations in Colorado and Pennsylvania. Findings reveal that information was not the objective determinant of choice and competition as market-oriented policy designers had hoped. Nor did market-oriented bureaucracies produce and distribute data readily accessible for public choice. Instead, information produced and distributed by these HDOs was the result of political and bureaucratic exercises that conform much more to classic interest group policymaking and captured bureaucracies than to contemporary market-oriented government ideals. The findings underscore the extraordinary difficulties facing federal-level policy designers as they contemplate introducing market-oriented health care policies on the national level.  相似文献   

17.
18.
Economic elites regularly seek to exert political influence. But what policies do they support? Many accounts implicitly assume economic elites are homogeneous and that increases in their political power will increase inequality. We shed new light on heterogeneity in economic elites' political preferences, arguing that economic elites from an industry can share distinctive preferences due in part to sharing distinctive predispositions. Consequently, how increases in economic elites' influence affect inequality depends on which industry's elites are gaining influence and which policy issues are at stake. We demonstrate our argument with four original surveys, including the two largest political surveys of American economic elites to date: one of technology entrepreneurs—whose influence is burgeoning—and another of campaign donors. We show that technology entrepreneurs support liberal redistributive, social, and globalistic policies but conservative regulatory policies—a bundle of preferences rare among other economic elites. These differences appear to arise partly from their distinctive predispositions.  相似文献   

19.
This article explores two theoretical possibilities for why personal health may affect political trust: the psychological‐democratic contract theory, and the role of personal experience in opinion formation. It argues that citizens with health impairments are more likely to experience the direct effects of political decisions as they are more dependent on public health services. Negative subjective evaluations of public services can lower trust levels, especially if people's expectations are high. Using European Social Survey data, the association between health and trust in 19 Western European states is analysed. The results indicate that people in poor health exhibit lower levels of trust towards the political system than people in good health. The differences in trust between those in good and poor health are accentuated among citizens with left‐leaning ideological values. The results suggest that welfare issues may constitute a rare context in which personal, rather than collective, experiences affect opinion formation.  相似文献   

20.
Yuxi Zhang 《管理》2020,33(4):897-914
Previous research has attributed the delayed welfare development in China to the government's traditional obsession with GDP growth target as the principal criteria for cadre promotion. Yet why has health‐care provision significantly expanded since the 2000s? This article argues that as central policies adjusted to incorporate health care as a priority, the cadre assessment system subsequently made it a “hard target,” and thus the competition for office has compelled local cadres to implement health‐care expansion. Apart from the importance of local leaders in policy change as the literature suggests, this article elaborates on the pivotal role of technical bureaucrats by innovatively introducing the “promotion tournament 2.0” model, which emphasizes the knowledge–power coalition between these political actors. By investigating the case of health‐care expansion, this article illustrates the local politics of policy change with various forms of data collected from semi‐structured interviews, newspaper archives, political documents, and official statistics.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号