“The snowden revelations about national security agency surveillance; starting in 2013; along with the ambiguous complicity of internet companies and the international controversies that followed provide a perfect segue into con- temporary conundrums of surveillance and big data. attention has shifted from late c20th information technologies and networks to a c21st focus on data; currently crystallized in ‘“big data.”’ big data intensifies certain surveillance trends associated with information technology and networks; and is thus implicated in fresh but fluid configurations. this is considered in three main ways: one; the capacities of big data (including metadata) intensify surveillance by expanding interconnected datasets and analytical tools. existing dynamics of influence; risk-management; and control increase their speed and scope through new techniques; especially predictive analytics. two; while big data appears to be about size; qualitative change in surveillance practices is also perceptible; accenting consequences. important trends persist – the control motif; faith in technology; public-private synergies; and user-involvement – but the future-orientation increasingly severs surveillance from history and memory and the quest for pattern-discovery is used to justify unprecedented access to data. three; the ethical turn becomes more urgent as a mode of critique. modernity’s predilection for certain definitions of privacy betrays the subjects of surveillance who; so far from conforming to the abstract; disembodied image of both computing and legal practices; are engaged and embodied users-in-relation whose activities both fuel and foreclose surveillance.”
Bauman, Z., Bigo, D., Esteves, P., Guild, E., Jabri, V., Lyon, D., & Walker, R. B. J.. (2014). After Snowden: Rethinking the impact of surveillance. International Political Sociology
“Current revelations about the secret us-nsa program, prism, have con-firmed the large-scale mass surveillance of the telecommunication and electronic messages of governments, companies, and citizens, including the united states’ closest allies in europe and latin america. the trans-national ramifications of surveillance call for a re-evaluation of contempo-rary world politics’ practices. the debate cannot be limited to the united states versus the rest of the world or to surveillance versus privacy; much more is at stake. this collective article briefly describes the specificities of cyber mass surveillance, including its mix of the practices of intelligence services and those of private companies providing services around the world. it then investigates the impact of these practices on national secu-rity, diplomacy, human rights, democracy, subjectivity, and obedience.”
Landau, S.. (2013). Making sense from snowden: What’s significant in the NSA surveillance revelations. IEEE Security and Privacy
“Did edward snowden cause irreparable harm, or did he reveal facts that should be publicly examined? what are the facts, anyhow? this article seeks to put the snowden revelations in context, explaining what’s new, why it matters, and what might happen next.”
Preibusch, S.. (2015). Privacy behaviors after Snowden. Communications of the ACM
“The article explores privacy behavior and u.s. public attitudes towards mass media following the release of information on state-surveillance detailed by former national security administration (nsa) contractor edward j. snowden. the author reflects on public knowledge about the prism program and related cyberintelligence initiatives. emphasis is given to a study using the metrics of information seeking, privacy-enhancing configurations, and new webpages. other topics include internet search habits, public interest in privacy services, and the relevance of longitudinal research.”
Hope, A.. (2016). Surveillance after Snowden. Information, Communication & Society
“In 2013, edward snowden revealed that the nsa and its partners had been engaging in warrantless mass surveillance, using the internet and cellphone data, and driven by fear of terrorism under the sign of ’security’. in this compelling account, surveillance expert david lyon guides the reader through snowden’s ongoing disclosures: the technological shifts involved, the steady rise of invisible monitoring of innocent citizens, the collusion of government agencies and for-profit companies and the implications for how we conceive of privacy in a democratic society infused by the lure of big data. lyon discusses the distinct global reactions to snowden and shows why some basic issues must be faced: how we frame surveillance, and the place of the human in a digital world.surveillance after snowden is crucial reading for anyone interested in politics, technology and society.”
</p>
Qin, J.. (2015). Hero on Twitter, Traitor on News: How Social Media and Legacy News Frame Snowden. International Journal of Press/Politics
“Is edward snowden a hero or traitor? in what ways do frames on social media and legacy news differ in covering the incident of >edward snowden? utilizing the approach of semantic network analysis, the study found social media users associated snowden’s case with other whistle-blowers, bipartisan issues, and personal privacy issues, while professional journalists associated the snowden incident with issues of n>ational security and international relations. frames on social media portray edward snowden as a hero while the frames on legacy news make him a trai>tor. the study further identified media frames on social media and legacy news differ in two ways: word selection and word salience. in addition, the study discussed the challenges and opportunities of framing analysis in the context of social media.”
<p>
</p
Rainie, L., & Madden, M.. (2015). Americans’ privacy strategies Post-Snowden. Pew Research Centeran><br< span=””>>
Show/hide publication abstract
tract”>“It has been nearly two years since the first disclosures of government surveillance programs by former natipan>onal security agency contractor edward snowden and americans are still coming to terms with how they feel about the programs and how to live in light of them. the documents leaked by snowden revealed an array of activities in dozens of intelligence programs that collected data from large american technology companies, as well as the buln”>k collection of phone ‘metadata’ from telecommunications companies that officials say are important to protecting national security. the metadata includes information about who phone users call, when they call, and for how long. the documents further detail the collection of web traffic around the globe, and efforts to break the security of mobile phones and web infrastructure. a new survey by the pew research center asked american adults what they think of the programs, the way they are run and monitored, and whether they have altered their communication habits and online activities since learning about the details of the surveillance. the notable findings in this survey fall into two broad categories: 1) the ways people have personally responded in light of their awareness of the government surveillance programs and 2) their views about the way the programs are run and the people who should be targeted by government surveillance.”
</br<>
Intelligence: from secrets to policy. (2013). >Choice Reviews Online
act”>“Mark m. lowenthal’s trusted guide is the go-to resource for understanding how the intelligence community’s history, structure, procedures, and functions affect policy decisions. in this sixth edition, the author highlights new challenges facing the intelligence community, examining nsa programs, uavs, the impact of social media, and the effects of the snowden leaks on collection and congressional oversight. all transnational issues have been updated, especially to rpan>eflect changes in the war on terror. new analytic issues receive attention, including big data, multi-intelligence analysis, and shifting demands on the workfor</span>ce. an expanded chapter on oversight scruan>tinizes the role of the fisa court, omb, and gao. new to this edition: implications of a de-emphasis on the war on terror intelligence implications of the obama administration’s ‘rebalance to the pacific’ ongoing effects of the manning and snowden leaks role of the foreign intelligence surveillance court key features: highlights new challenges facing the intelligence community a new chapter on oversight analytic issues examined”
Ring, T.. (2015). The enemy within. Computer Fraud and Security
Plain numerical DOI: 10.1016/S1361-3723(15)30111-1 DOI URL directSciHub download
[accotextannotation”>rdion c>pan>licktoclose=”true”]
Show/hide publication abstract
efabstract”>“Malicious insiders are the ultimate corporate nightmare: trusted individuals who decide to abuse their status and knowledge to compromise their company. experts are warning that this insider cyber threat is significantly under-estimated and growing. so what can you do to stop employees who are determined to wreak their revenge while hiding their true intent until it is too late? tim ring speaks to threat experts to find the answer. whether you think him a hero or villain, whistltannotation”>eblower edward snowden is the ultimate ‘malicious insider’. a man of impeccable credentials – he volunteered to serve in the iraq war and was one of the cia’s top computer security experts – snan>owden became so disillusioned with the electronic espis=”textannotation”>onage by the us on its citizens that he used his privileged access at the nsa’s office in hawaii to steal over a million confidential documents. in may 2013, he fled to hong kong and began revealing the data cache that led to the unravelling of western government policy on secret mass surveillance.”
[/accordion]
Deibert, R.. (2015). The geopolitics of cyberspace after snowden. journal”>Current History
[accordion clicktoclose=”true”]
Show/hide publication abstract
“The aims of the internet economy and those of state security converge around the same functional needs: collecting, monitoring, and analyzing as much data as possible”
“The nsa’s illegal surveillance techniques are leaked to the public by oclass=”textannotation”>;3″ class=”textannotation”>ne of the agency’s employees, edward snowden, in the form of thousands of classified documents distributed to the press.”
Scheuerman, W. E.. (ss=”refyear”>2014). Whistleblowing as civil disobedience: The case of Edward Snowden. Philosophy and Social Criticism
“The media hoop-la about edward snowden has obscured a less flashy yet more vtation”>ital – and philosophically relevant – part of the story, namely the moral and political seriousness with which he acted to make the hitherto covert scope and scale of nsa surveillance public knowledge. here i argue th>at we should interpret snowden’s actions as meeting most of the demanding tests outlined in sophisticated political thinking about civil disobedience. like thoreau, gandhi, king and countless other (forgotten) grass-roots activists, snowden has in fact articulated a powerful defense of why he was morally obligated to engage in politically motivated law-breaking. he has also undertaken impressive efforts to explain how his actions are distinguishable from ordinary criminality, and why they need not cu</span>lminate in reckless lawlessness. in fact, his example can perhaps help us advance liberal and democratic ideas about civil disobedience. first, it highlights sound reasons why, pace the orthodox view, the acceptance of punishment by those engaging in civil disobedience should not be seen as a precondition of its legitimacy. second, snowden reminds us that ours is an era in which intensified globalization processes directly shape every feature of political existence. defenders of civil disobedience need to update their reflections accordingly.”
Family based QTL mapping, or Family-pedigree based mapping (Linkage and association mapping), involves multiple families instead of a single family. Family based QTL mapping has been the only way for mapping of genes where experimental crosses are difficult to make. However, due to some advantages, now plant geneticists are attempting to incorporate some of the methods pioneered in human genetics.[20] Using family-pedigree based approach has been discussed (Bink et al. 2008). Family-based linkage and association has been successfully implemented (Rosyara et al. 2009)[21]
“A pedigree of the Galton–Darwin–Wedgwood families that was exhibited as a poster at the Third International Congress of Eugenics in 1932 at the American Museum of Natural History has been located in the archives of Truman State University in Kirksville, Missouri. This pedigree was prepared by Harry Hamilton Laughlin, Director of the Eugenics Record Office of the Carnegie Institute. The pedigree shows consanguineous marriages within the three families. A special collection of rare Darwin family photographs assembled by Leonard Darwin has also been found in the Truman State University archives. These photographs were exhibited as a poster alongside the pedigree at the 1932 Eugenics Congress. The poster of the Galton–Darwin–Wedgwood pedigree is published here, together with a tabular version providing ready access to the information contained in the pedigree. Also included are the Darwin family photographs and a biographical sketch of Laughlin.” (Berra, et al., 2010; see references below)
Page 1234
Further References
Berra, T. M., Alvarez, G., & Shannon, K.. (2010). The Galton-Darwin-Wedgwood Pedigree of H.H. Laughlin. Biological Journal of the Linnean Society
“A pedigree of the galton–darwin–wedgwood families that was exhibited as a poster at the third international congress of eugenics in 1932 at the american museum of natural history has been located in the archives of truman state university in kirksville, missouri. this pedigree was prepared by harry hamilton laughlin, director of the eugenics record office of the carnegie institute. the pedigree shows consanguineous marriages within the three families. a special collection of rare darwin family photographs assembled by leonard darwin has also been found in the truman state university archives. these photographs were exhibited as a poster alongside the pedigree at the 1932 eugenics congress. the poster of the galton–darwin–wedgwood pedigree is published here, together with a tabular version providing ready access to the information contained in the pedigree. also included are the darwin family photographs and a biographical sketch of laughlin.”
Berra, T. M., Alvarez, G., & Ceballos, F. C.. (2010). Was the Darwin/Wedgwood Dynasty Adversely Affected by Consanguinity?. BioScience
“Charles darwin, who was married to his first cousin, emma wedgwood, was one of the first experimentalists to demonstrate the adverse effects of inbreeding and to question the consequences of consanguineous mating. he documented the phenomenon of inbreeding depression for numerous plant species, and this caused him to worry about the health of his own children, who were often ill. to determine whether darwin’s fears were justified, we constructed a pedigree of the darwin/wedgwood dynasty from the large quantity of genealogical information published on these families. the inbreeding coefficients (f) computed from the pedigree show that darwin’s children were subject to a moderate level of inbreeding (f 5 0.0630), and the progeny of related families had still higher inbreeding values (e.g., f 5 0.1255 for the progeny of henry wedgwood, emma wedgwood’s brother). the analysis of a sample of 25 darwin/wedgwood families belonging to four consecutive generations shows a statistically significant positive association between child mortality (death at or before the age of 10 years) and inbreeding coefficient detected by means of nonparametric tests (? 5 0.309, p 5 0.040). our findings suggest that the high childhood mortality experienced by the darwin progeny (3 of his 10 children died at age 10 or younger) might be a result of increased homozygosity of deleterious recessive alleles produced by the consanguineous marriages within the darwin/wedgwood dynasty.”
Golubovsky, M.. (2008). Unexplained infertility in Charles Darwin’s family: Genetic aspect. Human Reproduction