You are previewing Uberveillance and the Social Implications of Microchip Implants.
O'Reilly logo
Uberveillance and the Social Implications of Microchip Implants

Book Description

In addition to common forms of spatial units such as satellite imagery and street views, emerging automatic identification technologies are exploring the use of microchip implants in order to further track an individual’s personal data, identity, location, and condition in real time. Uberveillance and the Social Implications of Microchip Implants: Emerging Technologies presents case studies, literature reviews, ethnographies, and frameworks supporting the emerging technologies of RFID implants while also highlighting the current and predicted social implications of human-centric technologies. This book is essential for professionals and researchers engaged in the development of these technologies as well as providing insight and support to the inquiries with embedded micro technologies.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
  5. Editorial Advisory Board
  6. Dedication
  7. Foreword
    1. ONE GENERATION IS ALL THEY NEED
  8. Preface
    1. INTRODUCTION
    2. AUDIENCE
    3. INSPIRATION
    4. OUTLINE
  9. Acknowledgment
  10. Section 1: The Veillances
    1. Chapter 1: Introduction
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. DEFINING UBERVEILLANCE
      5. ON THE FLUIDITY OF UBERVEILLANCE IN COMPETING NARRATIVES
      6. CONCLUSION
      7. APPENDIX
    2. Chapter 2: Veillance
      1. ABSTRACT
      2. INTRODUCTION: SURVEILLANCE
      3. SOUSVEILLANCE
      4. VEILLANCE INTEGRITY AND VEILLANCE HYPOCRISY
      5. THE VEILLANCE CONTRACT ANALOGY: RECIPROCAL RECORDING RIGHTS
      6. DEFINING SUR/SOUSVEILLANCE
      7. DATAVEILLANCE
      8. UBERVEILLANCE
      9. FROM CROWD VEILLANCE TO CLOUD VEILLANCE: GOOVERNANCE OF THE GOOLAG, OR GAOLBROKEN GOOGLASS?
      10. UNTERVEILLANCE
      11. CONCLUSIONS
    3. Chapter 3: Uberveillance
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SURVEILLANCE
      5. SOUSVEILLANCE
      6. DATAVEILLANCE
      7. UBERVEILLANCE
      8. CONCLUSION
  11. Section 2: Applications of Humancentric Implantables
    1. Chapter 4: Practical Experimentation with Human Implants
      1. ABSTRACT
      2. INTRODUCTION
      3. RFID IMPLANTS
      4. RFID IMPLANTS REVISITED
      5. TRACKING AND MONITORING
      6. DEEP BRAIN STIMULATION
      7. MULTI ELECTRODE ARRAY
      8. MAGNETIC IMPLANTS
      9. CONCLUSION
      10. APPENDIX 1
      11. KEY TERMS AND DEFINITIONS
      12. APPENDIX 2
      13. APPENDIX 3
    2. Chapter 5: Knowledge Recovery
      1. ABSTRACT
      2. INTRODUCTION
      3. KNOWLEDGE
      4. KNOWLEDGE BROWSING
      5. KNOWLEDGE RECOVERY: THE CONTEXT OF MEMORY
      6. KNOWLEDGE SHARING
      7. CONCLUSION
  12. Section 3: Adoption of RFID Implants for Humans
    1. Chapter 6: Willingness to Adopt RFID Implants
      1. ABSTRACT
      2. 1 INTRODUCTION
      3. 2 BACKGROUND
      4. 3 A PRELIMINARY STUDY: PERSONALITY DIMENSIONS AND WILLINGNESS TO IMPLANT
      5. 4 RECOMMENDATIONS
      6. 5 FUTURE RESEARCH DIRECTIONS
      7. 6 CONCLUSION
      8. APPENDIX
    2. Chapter 7: Surveilling the Elderly
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE ON THE ELDERLY AND DEMOGRAPHY
      4. RFID TECHNOLOGY AND THE ELDERLY
      5. RFID TECHNOLOGY AND VALUES CONFLICTS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
  13. Section 4: Tracking and Tracing Laws, Directives, Regulations, and Standards
    1. Chapter 8: Towards the Blanket Coverage DNA Profiling and Sampling of Citizens in England, Wales, and Northern Ireland
      1. ABSTRACT
      2. INTRODUCTION
      3. LEGISLATIVE CHANGES BETWEEN 1984 AND 2009
      4. THE NATIONAL DNA DATABASE
      5. WHERE WAS THE NDNAD HEADED?
      6. CONCLUSION
    2. Chapter 9: ID Scanners and Überveillance in the Night-Time Economy
      1. ABSTRACT
      2. INTRODUCTION
      3. TECHNOLOGY, SECURITY AND DIGITAL GOVERNANCE
      4. AUSTRALIAN PRIVACY LAWS
      5. LIQUOR LICENSEES’ VIEWS OF PRIVACY
      6. DISCUSSION AND FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    3. Chapter 10: Global Tracking Systems in the Australian Interstate Trucking Industry
      1. ABSTRACT
      2. INTRODUCTION
      3. CONCLUSION
    4. Chapter 11: Tracking Legislative Developments in Relation to “Do Not Track” Initiatives
      1. ABSTRACT
      2. INTRODUCTION
      3. US LEGISLATIVE DEVELOPMENTS
      4. OTHER JURISDICTIONAL DEVELOPMENTS
      5. AUSTRALIAN DEVELOPMENTS
      6. ANALYSIS AND RECOMMENDATIONS
      7. CONCLUSION
    5. Chapter 12: Uberveillance, Standards, and Anticipation
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. BENEFITS OF NANOBIOSENSORS IN LIVESTOCK TRACEABILITY SYSTEMS
      5. SOCIAL AND ETHICAL DIMENSIONS OF NANOBIOSENSORS IN LIVESTOCK
      6. RECOMMENDATIONS
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
  14. Section 5: Health Implications of Microchipping Living Things
    1. Chapter 13: Microchip-Induced Tumors in Laboratory Rodents and Dogs
      1. ABSTRACT
      2. PROBLEMS WITH MICROCHIP IMPLANTATION – AND WHY THEY MATTER
      3. REVIEW OF STUDIES: MICROCHIP-INDUCED CANCER IN LABORATORY RODENTS AND DOGS: EIGHT STUDIES FROM 1996 TO 2006
      4. MICROCHIP STUDIES IN WHICH NO CANCER WAS FOUND
      5. DISCUSSION, RECOMMENDATIONS, AND CONCLUSION
      6. RECOMMENDATIONS
      7. CONCLUSION
  15. Section 6: Socio-Ethical Implications of RFID Tags and Transponders
    1. Chapter 14: Privacy and Pervasive Surveillance
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. ASSESSING PRIVACY LOSS
      5. PRIVACY AND VALUE
      6. SURVEILLANCE AND THE VALUE OF PRIVACY
      7. FURTHER RESEARCH DIRECTIONS
      8. CONCLUSION
      9. APPENDIX
    2. Chapter 15: Neuroethics and Implanted Brain Machine Interfaces
      1. ABSTRACT
      2. INTRODUCTION
      3. BRAIN COMPUTER INTERFACES
      4. NEED FOR DISCOURSE AND REGULATION
    3. Chapter 16: We Are the Borg! Human Assimilation into Cellular Society
      1. ABSTRACT
      2. INTRODUCTION
      3. THEORY OF CELLULAR SOCIETY
      4. READING BODIES
      5. READING MINDS
      6. RE(B)ORGANIZATION
      7. WHAT IS TO BE DONE?
      8. CONCLUSION
      9. INTERVIEW 16.1: THE SCREEN BUBBLE
    4. Chapter 17: Uberveillance and Faith-Based Organizations
      1. ABSTRACT
      2. INTRODUCTION
      3. WHO ARE THE VULNERABLE NOW?
      4. THE ROLE OF INFORMATION ETHICS
      5. WHERE TO TARGET EFFORTS TO ADDRESS THESE ISSUES?
      6. CONCLUSION
  16. Acronyms and Abbreviations
  17. Compilation of References
  18. About the Contributors