To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
During his month-long visit to Cuba in 1965, Allen Ginsberg’s ideals of expressive freedom, sexual openness, and poetic individualism came into direct conflict with the increasingly repressive Castroist regime. Invited by the state organization Casa de las Américas to judge a poetry competition, Ginsberg quickly drew scrutiny from the regime for his outspoken views on homosexuality, drug use, and freedom of expression. His subsequent surveillance by the state’s vice squad, arrest, and deportation underscored the Cuban government’s intolerance for nonconformist expression, especially as it pertained to sexuality and dissent. Ginsberg’s experiences, recorded in his Cuban diaries, letters, and poems, reveal a central paradox of revolutionary politics: While seeking liberation, regimes might deploy repressive mechanisms of censorship and control. Ginsberg’s confrontation with Cold War ideologies – both US and Cuban – solidified his vision of a humanist poetics aimed at disrupting authoritarian systems and expanding consciousness through individuals’ radical self-expression.
This chapter discusses the circumstances of Ginsberg’s arrival and deportation from Czechoslovakia in 1965. Although it is often thought otherwise, Ginsberg did in fact have long-formed plans to travel behind the Iron Curtain, and his expulsion from Cuba only expedited, rather than facilitated, his arrival to Europe. During his stay in Czechoslovakia, Ginsberg had the opportunity to look behind the façade of the Communist Party and observed firsthand that Czechoslovaks lived in an oppressive regime they increasingly tried to challenge through various means, one of them being the publication and performance of Beat poetry. However, he underestimated the surveillance practices of the regime, which only intensified after Ginsberg was elected the King of May in front of a 100,000-strong crowd during May Day celebrations. Ultimately, his often frank discussion of his views and experiences not only placed several of his associates in danger, but also led to his deportation from the country.
Are people already at increased risk for disease more likely to be exposed to the risk factor of interest? Does closer observation of people with a disease lead to a false association? In retrospective studies, do people with a disease recall prior exposures more (or less) that healthier people? Are research interviewers a source of biased data collection? Confounding is an existential threat in biomedical research; here a second factor, which is associated with both the disease and the risk factor being studied, is an actual cause of the disease. If studies cannot fully control for the effect of the second risk factor, residual confounding will bias the risk estimate. Who participates and doesn’t participate in research is another source of bias. How diseases and risk factors are classified and categorized may introduce bias, and changing defined categories is yet another source of bias.
COVID-19 deepened the interface between health and security, making information the decisive currency of collaboration. This paper foregrounds the “confidentiality–utility dilemma”: how health and security communities—each premised on strict secrecy in distinct operational contexts—can share information without undermining the other side’s core values. We argue that purposeful managerial design is both necessary and feasible. First, we address the structural limitations of global rule-making and the concomitant drift toward diversification of sources and strengthened capabilities to uncover hidden information that renders security-sector actors increasingly relevant. Drawing on previous assessments and cases, we reformulate the importance of three managerial levers: (1) organizational and structural interventions including two-tier arrangements; (2) tiered classification and de-identification that embed share-by-design access controls for both health and security data; and (3) joint investigations and co-analysis, exemplified by UN-SGM (United Nations Secretary-General’s Mechanism)-type mechanisms, which can act as clearinghouses by enabling full sharing within the team while preserving external neutrality.
This essay is intended as a sketch of the current literature on the ethics of counterterrorism. It is organized by topic, dealing in turn with whether Just War Theory can accommodate terrorism and counterterrorism or needs to be adjusted in order to do so, definitions of terrorism, methods of interrogation (including torture), the use of drones and targeted killing, methods of surveillance, and some unorthodox views. Perhaps not surprisingly there is a range of views on what measures can be justified in response to terrorism, but the consensus, so far as there is one, seems to be that some version of Just War Theory, possibly updated to give more weight to concerns about the effects of actions, is about right, and that very hawkish responses to terrorism are not usually justified.
Chapter Three provides a thorough exploration of the multifaceted experience of being Qizilbash within the Ottoman realm and the consequential implications of such an identity within the intricate Ottoman–Safavid geopolitical landscape. By scrutinizing a diverse array of Qizilbash texts, artifacts, and ceremonial practices, the chapter elucidates the complex processes entailed in shaping and perpetuating a collective sense of belonging. Additionally, this chapter seeks to integrate a discussion of the Ottoman state’s surveillance strategies into the analysis of Qizilbash subjecthood formation within the empire.
Chapter 3 presents the other side of the coin, namely AI risks and harms. Automated decision systems, chatbots, recommender systems, and other AI-powered software and platforms have been found to cause potential risks or actual harms to affected persons and communities. Such risks and harms include bias and discrimination, surveillance, inaccurate, incorrect and unreliable output, disinformation, misinformation or manipulation, harm to life, livelihood and wellbeing, privacy violations, decline in product and service quality, political polarization, online radicalization and algorithmic censorship, and job replacement. Some of these harms, such as bias and discrimination, have already been experienced frequently, while others, like job replacement, point to future risks. It is also worth noting that AI risks and harms often aggravate existing social and political problems. For example, political polarization and radicalization, while exacerbated by algorithmic curation, appear to have origins in societal divisions. Finally, AI is criticized for causing system-level harm in the form of environmental degradation, exploitation of labor, and market concentration.
For far too long, tech titans peddled promises of disruptive innovation - fabricating benefits and minimizing harms. The promise of quick and easy fixes overpowered a growing chorus of critical voices, driving a sea of private and public investments into increasingly dangerous, misguided, and doomed forms of disruption, with the public paying the price. But what's the alternative? Upgrades - evidence-based, incremental change. Instead of continuing to invest in untested, high-risk innovations, constantly chasing outsized returns, upgraders seek a more proven path to proportional progress. This book dives deep into some of the most disastrous innovations of recent years - the metaverse, cryptocurrency, home surveillance, and AI, to name a few - while highlighting some of the unsung upgraders pushing real progress each day. Timely and corrective, Move Slow and Upgrade pushes us past the baseless promises of innovation, towards realistic hope.
Chapter 6 looks at the failures of educational innovation during the Covid-19 crisis. As schools scrambled to adapt to remote learning, remote proctoring technologies rapidly expanded. They implemented surveillance systems that violated student privacy and disproportionately harmed vulnerable students. Despite claims of maintaining academic integrity, remote proctoring created a stressful, punitive environment that prioritized monitoring over genuine educational support while failing to do nearly enough to address the inequalities at the heart of accessing and using digital resources. Sadly, the rush to innovate missed crucial opportunities to upgrade core educational infrastructure and truly support students during a time of unprecedented challenge. As if this wasn’t bad enough, some schools continue to use remote proctoring software. A pandemic problem has thus become the new normal.
Chapter 5, “The Failed Promise of Covid Innovation,” presents the pandemic as a crucial case study of how innovative thinking let us down at a time of great vulnerability. Simply put, the early days of massive fatalities made COVID-19 a health crisis. But those days also can be seen as a powerful lens for understanding high-tech failure. From contact tracing apps to thermal imaging cameras and digital vaccine passports, there was a fever pitch of government and corporate enthusiasm for innovative solutionism that was predestined to be unreliable and, thus, in context, dangerous. While we acknowledge remarkable breakthroughs like the rapid development of mRNA vaccines, we also make the case that additional effective responses could have come from upgrading existing systems rather than trying to do things entirely new.
Chapter 4 critically examines the fact that sometimes innovations not only fail to solve crucial problems, but are the problem itself. Specifically, it explains why Ring doorbell exemplifies the threat of home surveillance innovation. The billion-dollar Amazon subsidiary sold millions of Americans on the promise of security via surveillance without any credible evidence that its system works. But rather than encouraging people to adopt proven security upgrades, such as better locks and secure package drops, Ring wins customers by making its digital innovation seem essential amid a climate of rising fear. By fighting against boring yet effective alternatives, Ring’s anxiety-inducing features have further normalized intensive networked surveillance and helped turn innocuous neighborly interactions into potential threats.
In Chapter 10, we conclude with an overview of the broader themes seen throughout this work, showcasing the tell-tale signs of innovation failure. These patterns go to the core of our work, lessons learned from past innovations that can help us to avoid repeating similar mistakes in the future. No one, not even the cagiest upgrader, is going to be able to predict every new technology that will succeed or flop. But with this mindset, you can avoid some of the more obvious traps that investors, politicians, and the public continue to fall for, while valuing the evidence-based alternatives we so often neglect.
Suicide is a global phenomenon, with implications for HICs and LMICs alike, bec,ause of interconnectedness. Social injustice increases societies’ suicide risk and it is easily and frequently exported. Suicide is preventable but not always individually. Suicide prediction is difficult or impossible, so those measures that effect everyone work best. Hence assuring good quality, timely mental health coverage for the whole population is important. Those with the least resources must be targeted, as they are at greatest risk..
The Communist Party is building a digitally capable state to remain at the vanguard of social and political development in China. CPC leaders are advancing digitalization forcefully throughout the governance and economic system through various policy initiatives. Informatization serves both better governance and public service, by overcoming previous bottlenecks and spatial challenges in administration. It also enhances the party state’s surveillance and monitoring capabilities. The CPC’s goals for China’s future under its continued rule require a digital infrastructure and economy that is both efficacious and subject to the Party’s control. To this end, the CPC is building out a comprehensive governance architecture for cyberspace, including the world’s most expansive data regulatory regime. The current leadership regards these digital capabilities as a key part of its comprehensive governance model that will enable the CPC to implement its domestic and international vision for China in the coming years.
Evidence is essential to suicide prevention. Delay until the evidence base is complete is not possible, so cautious advice must be given to policy makers on imperfect evidence. This means recognising uncertainty, including the risk that the advice may cause more harm than good. Evaluation during implementation is critical but frequently neglected. The UK has a system of nationwide statistics, supplemented by a National Confidential Inquiry into Suicide and Safety in Mental Health (NCISH) into all apparently suicidal deaths during or after mental health care. In addition, there are recently devised real-time statistics of suspicious deaths. There is a system of self-harm registers, independent of official systems. These systems have generated unusually good information on suicidal deaths and self-harm, leading to tangible improvements. However, like all evidence, it is still imperfect.
The progressive digitalization of industries and services has direct effects on the organization of labor. Telework is foremost a consequence of the general increased use of information technology in our professional and private lives. The organizational changes of labor due to digitalization however challenge the functionality and effectiveness of labor law. The employer’s comprehensible concerns, that teleworkers might pursue private interests at home, serve in practice as a justification for implementation of closed meshed monitoring measures. Hence, we face a significant paradox: even though teleworkers enjoy a putative higher degree of autonomy because they are not present at premise and therefore not subject to the employers’ physical authority, they are exposed to a higher degree of dependency rooted in digital control measures. Data protection acquires increasing importance for workers. Labor protection in many cases cannot be separated from data protection. This chapter argues that this evolution is not sufficiently mirrored by the law, and then analyses in its first part the existing shortcomings and loopholes exemplified by the problem of digital surveillance of telework. In its second part the chapter seeks to identify possible legal mechanisms to create or even foster interaction between labor and data protection law.
This study examines citizens’ support for state surveillance, contingent upon factors related to policy design and the context of implementation. While most people want to live in a secure environment, we argue in this study that the support of policies to reach this goal depends on their necessity, extensiveness and reliability. Results from survey experiments in four European countries show that citizens are ready to approve the introduction of far‐reaching state surveillance that includes measures of facial recognition and motion detection. Public support is further enhanced if these measures are to be targeted at potential criminals, rather than at all citizens (i.e., policy extensiveness), as well as if a safety threat is salient (i.e., policy necessity). Concerns about data security reduce support (i.e., policy reliability). While these conditions matter for the support of specific policies, they do not influence how trustworthy citizens consider government and other political authorities to be.
The technological revolution that began with the Arpanet in the late Sixties has changed the world we live in. The Internet and social media have improved our lives considerably, but the changes came in with a high-price tag attached: our freedom. We now live in a world in which technology has exponentially expanded the power of the State to keep tabs on its citizens (within and across borders). If we continue on this path, democracy as we know it is doomed. Yet the future is not as grey as it might look at first sight. The ubiquity of social media and smartphones and the increasing relevance of the Internet in everyday life have also drastically changed the impact-power of citizens in technologically advanced societies. Understanding these changes is to understand which shape democracy will take in the future.
This study aimed to evaluate the diagnostic and surveillance performance of circulating tumour human papillomavirus DNA for post-treatment monitoring of human papilloma virus–positive oropharyngeal squamous cell carcinoma.
Methods
Systematic review and meta-analysis of prospective studies (2019–2024) identified from PubMed, Web of Science and Scopus. Random-effects models were used to pool circulating tumour human papillomavirus DNA detectability and summarise lead-times to recurrence.
Results
Fifteen studies (n=1,447) were included; 10 cohorts (n=731) entered the quantitative meta-analysis. Pooled baseline detectability was 85.5 per cent (95 per cent confidence interval 78.2–90.6). Circulating tumour human papillomavirus DNA positivity preceded clinical recurrence by a mean of 76.8 days (median 87.5). Specificity and negative predictive value were consistently high, whereas sensitivity varied by assay platform and sampling frequency.
Conclusion
Serial circulating tumour human papilloma virus DNA testing is a reliable adjunct to post-treatment surveillance in HPV-positive oropharyngeal squamous cell carcinoma, offering a clinically meaningful lead-time to recurrence. Standardised assays and multicentre validation are warranted.
Historical tensions over race and nation have bubbled over time and resurfaced again since the Brexit vote in the forms of increased racism and a “hostile environment.” British Muslim identity and belonging has been a complex process of negotiation in the British Isles and beyond. This chapter explores how transnational Muslim identities in Britain form digital interconnections and face disruptions in an increasingly securitized global architecture in which the digital serves as a place of contestation and surveillance. Through summary close readings from selected writings by Kamila Shamsie, Mohsin Hamid, Ayisha Malik, and Zaffar Kunial, this chapter emphasizes how Muslim writers translate the limits of a national English identity for migrant groups after Brexit through new representations of enclosed spaces such as gardens and parks.