Twitter | Search | |
This is the legacy version of twitter.com. We will be shutting it down on 15 December 2020. Please switch to a supported browser or device. You can see a list of supported browsers in our Help Center.
Search Refresh
Passed Wonder Dec 1
is watching over each other. But this level of seems just a bit
Reply Retweet Like
Level5 SecurityGroup Nov 25
Best wishes to our loyal L5SG customers! Thank you for the opportunity to serve you.
Reply Retweet Like
keep your electric eye on me 16h
OUT NOW! and Security Intelligence. The Canadian Case. Edited by myself and David Lyon, with loads of great authors. UBC Press - HB, PB & eventually, open access.
Reply Retweet Like
Andrew Pakes Dec 3
Just look at this list - when we talk about growth in worker during this is what we mean: keystroke logging, screen monitoring, webcam surveillance. This is a global market & risk to workers' rights
Reply Retweet Like
CPDPconferences Dec 3
goes ONLINE! We are looking forward to welcoming you for thought-provoking conversations on , , , and lots more to be found in our updated programme. Enjoy our early bird rates until 18 December!
Reply Retweet Like
Trilateral Research 21h
Interested in ? Read our publication “Mining social media for effective crisis response: machine learning and disaster response” by as part of & ChiaraFonio
Reply Retweet Like
Selena H Dec 2
Really proud of the work does! Check out their new interactive tool
Reply Retweet Like
Brit Ross Winthereik Dec 2
Shadow are the infrastructures in use beneath or next to formal, gov sanctioned systems tells in salon just now. GP use of WhatsApp. with a price tag called for example
Reply Retweet Like
dysko Nov 27
Interesting read how China's central bank digital currency project has the potential to be a surveillance tool for its citizens and anyone looking to do business in China.
Reply Retweet Like
Digital Reasoning Dec 2
Intentionally or unintentionally mistyped words and obfuscated language can be a challenge for search or use in .
Reply Retweet Like
DYNATRON Dec 1
Reply Retweet Like
Abhilasha Shrestha, PhD, MPH Nov 24
Most people celebrate their birthday with a 🎂 ... I celebrated by collecting a 💩 sample from a lift station!
Reply Retweet Like
Kevin Corbley Dec 1
monitoring and hosted by on December 9. Fusion of , , and AIS ship tracking data.
Reply Retweet Like
Spiros Margaris 22h
Reply Retweet Like
Inspired Technology and Communications, LLC Dec 2
🚪Reopen your office the safe way! Talk to one of our specialists about integrating TOUCHLESS solutions in your buildings!
Reply Retweet Like
Barry Bahadoorsingh Dec 3
Check out our new e-Book: Transforming Surveillance with Always on . It has all the highlights from our recent ENGAGE LIVE virtual conference. Learn how to navigate today’s challenges & prepare for what’s coming next.
Reply Retweet Like
sef : Dec 2
of public services offers opportunities, but carries risks of and . What can be done about it is described by in :
Reply Retweet Like
A. T. #StayHome #RemoteWork Dec 1
Researchers Find Powerful Cellphone Location in Europe, Middle East, Australia - via
Reply Retweet Like
Andrew Pakes Nov 28
“This definitely blurs lines between work & privacy. Should be an open, transparent system - not for employers to monitor staff without their knowledge.” 100% agree with comments from Lucy. We need to get on top of worker . Sign up on the link below
Reply Retweet Like
ECDC Dec 2
We are hiring! Have background? is looking to fill several vacancies in the areas of: ➡️ ➡️ ➡️ & . Apply before 9.12 Read more
Reply Retweet Like