Listing 1 - 10 of 6795 | << page >> |
Sort by
|
Choose an application
In öffentlichen Diskursen seit dem 11. September 2001 lässt sich ein vielschichtiger Sprachgebrauch von Sicherheit beobachten. Der Vermutung, dass mit Sicherheit eine zentrale gesellschaftliche Legitimationsvokabel der jüngeren Vergangenheit vorliegt, geht die vorliegende Studie mit diskurslinguistischen Mitteln der Düsseldorfer Schule nach. In den Diskursen des "11. September 2001", der "Eurokrise" und der "NSA-Affäre" werden die Mechanismen der sprachlichen Etablierung gesellschaftlicher "Sicherheits-Wirklichkeit" analysiert. Die Untersuchung zeigt, wie als "existenziell" perspektivierte Bedrohungsszenarien den Aufstieg von Sicherheit zu einem politischen Schlüsselbegriff ermöglichen. Mit dessen u. a. aus religiöser, staatstheoretischer und anthropologischer Semantik bezogener persuasiver Kraft werden politisch umstrittene Maßnahmen legitimierbar; entsprechend vehement konkurrieren die politischen Akteure um das Mehrheiten verheißende Etikett der "Sicherheitsgewährleistung". Die in den Diskursen beobachtbaren Konzepte gesellschaftlicher Problemlösung zeugen von "Machbarkeit" und "Beherrschbarkeit" und untermauern die gesellschaftliche Bedeutsamkeit der Leitvokabel Sicherheit gerade in als Krisen erlebten Zeiten.
Linguistic analysis (Linguistics) --- 9/11. --- Discourse Analysis. --- Euro Crisis. --- NSA affair. --- Security.
Choose an application
While penning a series of articles on Internet security, author Michael Gurnow noticed there was something odd in the world's response to NSA whistleblower Edward Snowden. The public was evenly divided while diametrically opposed politicians were in strange agreement. Regardless of opinion, the Left, Right, anti-establishment, conspiracy theorist, techno-greek or Washington insider people want to know more about Edward Snowden and the events that led to his disclosures. The narrative begins with Snowden literally growing up in the shadow of the National Security Agency. At a pace that reads like a taut political thriller Gurnow reveals for the first time the dramatic details of how select members of the media broke the story, and the cat and mouse game that followed between the media and the administration. Gurnow goes on to explain in plain language the political, legal and technological implications of the whistleblower's classified data. Sharply written and meticulously researched The Edward Snowden Affair provides a fascinating look at the breaking of the NSA scandal and its implications. A must read --Robert Gleason, Author of End of Days (Forge 2011) and The Nuclear Terrorist (Forge 2014).
Whistle blowing --- Leaks (Disclosure of information) --- Computer crimes --- Electronic surveillance --- Disclosure of information --- Snowden, Edward J., --- United States. --- N.S.A./C.S.S. --- National Security Agency/Central Security Service (U.S.) --- NSA --- NSA/CSS --- United States --- History
Choose an application
Big Data, Social Media, Computational Journalism, Industrie 4.0 - hinter all diesen Chiffren blitzen die Anzeichen des Beginns einer umgreifenden Veränderung der Gesellschaft durch die Möglichkeiten digitaler Datenverarbeitung auf. Welchen Stellenwert hat das zukunftsoffene Experimentieren mit diesen neuen Daten, in deren Gesellschaft wir uns in jedem Moment befinden und die alle unsere Praktiken durchdringen? Und wie ist dies angemessen wissenschaftlich zu beschreiben? Perspektivenreich zeigen die Autorinnen und Autoren des Bandes, darunter Bruno Latour, Karin Knorr Cetina, Christoph Bieber, Christoph Neuberger und Karl-Heinz Ladeur, die Möglichkeiten auf, das theoretische und empirische Inventar der Gesellschaftswissenschaften am Gegenstand der Digitalisierung zu schärfen. »Die einzelnen Beiträge [bestechen] durch ihre unprätentiösen Analysen, welche sich wohltuend von sonstigen vordergründig bedeutungsschweren Abhandlungen zur Digitalisierung abheben.« Robert Steudtner, Jahrbuch Extremismus & Demokratie, 28 (2016) »Insgesamt leistet der Band einen hervorragenden Beitrag zur kritischen Reflexion der Datengesellschaft.« Lothar Mikos, tv diskurs, 20/3 (2016) »Der Sammelband [bietet] einen aufschlussreichen Überblick darüber, wie die ›Gesellschaft der Daten‹ in den unterschiedlichen sozialwissenschaftlichen Bereichen reflektiert wird.« Jan-Felix Schrape, M & K, 2 (2016) »Der Band wird dem eigenen Anspruch gerecht, unterschiedliche theoretische Zugänge zu diesem komplexen Themenverbund zu bieten. Diese inspirieren über Fachgrenzen hinaus.« Dirk Burmester, Portal für Politikwissenschaft, 03.03.2016 Besprochen in: GMK-Newsletter, 12 (2015) Soziologische Revue, 41/1 (2018), Juliane Jarke
Gesellschaftstheorie; Medien; Science and Technology Studies; Internet; NSA; Edward Snowden; Mediensoziologie; Medientheorie; Politische Soziologie; Medienwissenchaft; Soziologie; Social Theory; Media; Nsa; Sociology of Media; Media Theory; Political Sociology; Sociology; --- Edward Snowden. --- Internet. --- Media Theory. --- Media. --- Nsa. --- Political Sociology. --- Science and Technology Studies. --- Sociology of Media. --- Sociology.
Choose an application
Intelligence service --- United States. --- National Security Agency --- NSA --- N.S.A. --- United States --- Electronic surveillance --- Government policy --- Electronic intelligence --- Government information --- Access control --- Data protection
Choose an application
Long description: Biographical note: Kevin D. Mitnick, einst der meistgesuchte Verbrecher der USA, inzwischen rehabilitiert und als Sicherheitsberater unterwegs, gilt nach wie vor weltweit als der Prototyp des Hackers.
Identität --- Datenschutz --- FBI --- Big Data --- Hacker --- IT-Sicherheit --- Datenmissbrauch --- Verschlüsselung --- Anonymität --- NSA --- Tracking --- Big Brother --- Vorratsdatenspeicherung --- Whistleblower --- Mitnick --- Passwortschutz --- Überwachungsstaat --- Passwortsicherheit
Choose an application
Calligraphy, Chinese --- History --- Mingben, --- Ming-pen, --- Myŏngbon Hwasang, --- Myŏngbon Sŏnsa, --- Zhongfeng Mingben, --- Zhongfeng chan shi, --- Tianmu Zhongfeng chan shi, --- Ch'ŏnmok Chungbong, --- 明本, --- 明本 --- 释明本, --- 釋明本, --- 中峰禪師, --- 天目中峰禅師,
Choose an application
Espionage --- Espionnage --- Leaks (Disclosure of information) --- Whistle blowing --- Electronic surveillance --- #SBIB:35H24 --- #SBIB:340H20 --- Disclosure of information --- Informatiemanagement bij de overheid --- Burgerlijk recht --- Snowden, Edward J., --- United States. --- N.S.A./C.S.S. --- National Security Agency/Central Security Service (U.S.) --- NSA --- NSA/CSS --- Privacy, Right of. --- Corruption politique --- Divulgation d'informations --- Alerte professionnelle --- Snowden, Edward --- Snowden, Edward J. --- United States --- History --- Corruption politique. --- Divulgation d'informations. --- Snowden, Edward J., 1983 --- -United States
Choose an application
This description of the application of the RAND Corporation's PortMan portfolio analysis and management method and Delphi consensus-building method for the National Security Agency (NSA) Information Sharing Services (ISS) division highlights how these methods enable the data-driven analysis of project portfolios and the allocation of research and development (R&D) and operations and maintenance (O&M) resources according to value, risk, and cost.
Intelligence service --United States --Management. --- Intelligence service --United States. --- Program budgeting. --- Project management. --- United States. --National Security Agency/Central Security Service. --- Intelligence service --- Project management --- Program budgeting --- Management --- Management. --- United States. --- Performance budget --- Planning-programming-budgeting --- Industrial project management --- Counter intelligence --- Counterespionage --- Counterintelligence --- Intelligence community --- Secret police (Intelligence service) --- N.S.A./C.S.S. --- National Security Agency/Central Security Service (U.S.) --- NSA --- NSA/CSS --- Budget --- Public administration --- Research --- Disinformation --- Secret service
Choose an application
When Edward Snowden began leaking NSA documents in June 2013, his actions sparked impassioned debates about electronic surveillance, national security, and privacy in the digital age. The Snowden Reader looks at Snowden's disclosures and their aftermath. Critical analyses by experts discuss the historical, political, legal, and ethical issues raised by the disclosures. Over forty key documents related to the case are included, with introductory notes explaining their significance: documents leaked by Snowden; responses from the NSA, the Obama administration, and Congress; statements by foreign leaders, their governments, and international organizations; judicial rulings; findings of review committees; and Snowden's own statements. This book provides a valuable introduction and overview for anyone who wants to go beyond the headlines to understand this historic episode.
Computer crimes --- Electronic surveillance --- Domestic intelligence --- Leaks (Disclosure of information) --- Whistle blowing --- Disclosure of information --- Domestic national security intelligence --- Intelligence service --- Snowden, Edward J., --- United States. --- National Security Agency --- NSA --- N.S.A. --- Spies --- Agents, Secret --- Intelligencers (Spies) --- Operatives (Spies) --- Secret agents --- Spooks (Spies) --- Spying --- Subversive activities --- Espionage --- Secret service --- Moral and ethical aspects --- N.S.A./C.S.S. --- National Security Agency/Central Security Service (U.S.) --- NSA/CSS
Choose an application
Edward Snowden's leaks exposed fundamental differences in the ways Americans and Europeans approach the issues of privacy and intelligence gathering. Featuring commentary from leading commentators, scholars and practitioners from both sides of the Atlantic, the book documents and explains these differences, summarized in these terms: Europeans should 'grow up' and Americans should 'obey the law'. The book starts with a collection of chapters acknowledging that Snowden's revelations require us to rethink prevailing theories concerning privacy and intelligence gathering, explaining the differences and uncertainty regarding those aspects. An impressive range of experts reflect on the law and policy of the NSA-Affair, documenting its fundamentally transnational dimension, which is the real location of the transatlantic dialogue on privacy and intelligence gathering. The conclusive chapters explain the dramatic transatlantic differences that emerged from the NSA-Affair with a collection of comparative cultural commentary.
Intelligence service --- Electronic surveillance --- Government information --- Privacy, Right of. --- Data protection --- Leaks (Disclosure of information) --- Disclosure of information --- Whistle blowing --- Habeas data --- Privacy, Right of --- Invasion of privacy --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Right to be forgotten --- Secrecy --- Counter intelligence --- Counterespionage --- Counterintelligence --- Intelligence community --- Secret police (Intelligence service) --- Public administration --- Research --- Disinformation --- Secret service --- Law and legislation. --- International cooperation. --- Access control. --- Law and legislation --- Snowden, Edward J., --- United States. --- N.S.A./C.S.S. --- National Security Agency/Central Security Service (U.S.) --- NSA --- NSA/CSS
Listing 1 - 10 of 6795 | << page >> |
Sort by
|