Chapter
Open Access
32 Infrastructures
-
Miria Grisot
and Elena Parmiggiani
Chapters in this book
- Frontmatter I
- Table of Content V
- An introduction to digital criminology 1
- 1 Abuse 21
- 2 Accessing online communities 29
- 3 Affordances 37
- 4 Agency 45
- 5 Algorithm 53
- 6 App-based textual interviews 61
- 7 Archives 69
- 8 Art as method 79
- 9 Artificial intelligence 83
- 10 Automation 91
- 11 Bias 99
- 12 Big data 107
- 13 Biometric failure 115
- 14 Borders and border control 123
- 15 Categorization and sorting 133
- 16 Computation 141
- 17 Cybercrime 149
- 18 Darknet 157
- 19 Data justice 165
- 20 Databases 173
- 21 Datafication 181
- 22 Digilantism 189
- 23 Digital 197
- 24 DNA / big genome data 205
- 25 Error 215
- 26 Ethics 223
- 27 Facial recognition 233
- 28 Financial crime and surveillance 243
- 29 Hacking 251
- 30 Hate crime and networked hate 261
- 31 Identify theft 269
- 32 Infrastructures 279
- 33 Intelligence 287
- 34 Internet of things 297
- 35 Interviews with digital objects 305
- 36 Labs 315
- 37 Low-tech 323
- 38 Online courts 333
- 39 Online ethnography 343
- 40 Platforms 353
- 41 Policing 363
- 42 Prediction 371
- 43 Privacy and data protection 381
- 44 Privatization 389
- 45 Punishment 399
- 46 Recruitment via social media 409
- 47 Researching online forums 419
- 48 Robots 427
- 49 Sentencing and risk assessment algorithms 435
- 50 Sex work 445
- 51 Smart city 453
- 52 Social media 461
- 53 Surveillance 469
- 54 Synthetic data and generative machine learning 483
- 55 Translation 493
- 56 Victimization 501
- 57 Vulnerability 509
- List of contributors 519
Chapters in this book
- Frontmatter I
- Table of Content V
- An introduction to digital criminology 1
- 1 Abuse 21
- 2 Accessing online communities 29
- 3 Affordances 37
- 4 Agency 45
- 5 Algorithm 53
- 6 App-based textual interviews 61
- 7 Archives 69
- 8 Art as method 79
- 9 Artificial intelligence 83
- 10 Automation 91
- 11 Bias 99
- 12 Big data 107
- 13 Biometric failure 115
- 14 Borders and border control 123
- 15 Categorization and sorting 133
- 16 Computation 141
- 17 Cybercrime 149
- 18 Darknet 157
- 19 Data justice 165
- 20 Databases 173
- 21 Datafication 181
- 22 Digilantism 189
- 23 Digital 197
- 24 DNA / big genome data 205
- 25 Error 215
- 26 Ethics 223
- 27 Facial recognition 233
- 28 Financial crime and surveillance 243
- 29 Hacking 251
- 30 Hate crime and networked hate 261
- 31 Identify theft 269
- 32 Infrastructures 279
- 33 Intelligence 287
- 34 Internet of things 297
- 35 Interviews with digital objects 305
- 36 Labs 315
- 37 Low-tech 323
- 38 Online courts 333
- 39 Online ethnography 343
- 40 Platforms 353
- 41 Policing 363
- 42 Prediction 371
- 43 Privacy and data protection 381
- 44 Privatization 389
- 45 Punishment 399
- 46 Recruitment via social media 409
- 47 Researching online forums 419
- 48 Robots 427
- 49 Sentencing and risk assessment algorithms 435
- 50 Sex work 445
- 51 Smart city 453
- 52 Social media 461
- 53 Surveillance 469
- 54 Synthetic data and generative machine learning 483
- 55 Translation 493
- 56 Victimization 501
- 57 Vulnerability 509
- List of contributors 519