Ales Zavrsnik

Ales Zavrsnik
University of Ljubljana · Institute of Criminology at the Faculty of Law

LL.D.

About

19
Publications
4,366
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
211
Citations
Additional affiliations
January 2016 - August 2016
University of Ljubljana
Position
  • Professor (Associate)
December 2004 - present
Institute of Criminology at the Faculty of Law University of Ljubljana
Position
  • Senior Researcher

Publications

Publications (19)
Chapter
The chapter’s central thesis is that the use of automation tools in social control and politics, erodes some of the basic concepts of the rule of law and changes the knowledge that counts as relevant for policymakers. The authors provide a historical overview of how both the theory and practice of crime and social control have relied on contemporar...
Article
Full-text available
The automation brought about by big data analytics, machine learning and artificial intelligence systems challenges us to reconsider fundamental questions of criminal justice. The article outlines the automation which has taken place in the criminal justice domain and answers the question of what is being automated and who is being replaced thereby...
Article
Full-text available
The article focuses on big data, algorithmic analytics and machine learning in criminal justice settings, where mathematics is offering a new language for understanding and responding to crime. It shows how these new tools are blurring contemporary regulatory boundaries, undercutting the safeguards built into regulatory regimes, and abolishing subj...
Article
Today, at a time when we are witnessing the “multiplication of borders”, borders are occupying new domains. The article focuses on the erection of digital borders by means of biometric technology, which is creating new knowledge through the compilation of large biometric databases in the EU. By “tattooing” borders onto immigrant bodies, disciplinar...
Book
Big data and algorithms are the glue of the digital surveillance capitalism. Software runs in several social domains, which have an impact on our lives: from health care to employment and university enrolment, to bank loans and insurance policy conditions. What makes big data analytics especially appealing for the crime control agencies is the prom...
Article
This paper focuses on the uses and consequences of big data and predictive analytics in social control. After tackling the issue of defining "big data", the paper presents the implications of big data in the production of knowledge. It then focuses on selected domains of informal and formal social control, such as policing and criminal justice syst...
Chapter
The chapter presents the initial definitions of drones and unmanned aerial systems by examining the various areas in which they have been deployed. The range of uses of drones inevitably triggers contradictory reactions, and drone development often comes with an emotional charge as drones tackle important human values. The chapter situates drones i...
Chapter
The chapter takes as its starting point the insight that contemporary surveillance is dynamic and not hierarchically structured and that (supervisory) power also generates resistance to the (same) power. The increasing power of the “new surveillance” therefore not only increases the capacity of the authorities (watchers) to monitor the watched majo...
Article
Mobile devices have become the central node information-communication technology as they include functionalities far surpassing simply making a phone call. Along with the merging of services and functionalities on a single mobile device, the importance of users' perceptions and understanding of cyber security threats has grown substantially. A lack...
Article
Full-text available
The article contextualizes contemporary cyber-surveillance practices in the light of Edward Snowden’s revelations of massive espionage by intelligences services and shows the results of an online survey on the public perceptions of privacy in public telecommunication networks in Slovenia. The results relate to types and frequency of victimization;...
Book
This book tackles the regulatory issues of Unmanned Aerial Systems (UAS) or Remotely-Piloted Aerial Systems (RPAS), which have profound consequences for privacy, security and other fundamental liberties. Collectively known as “drones," they were initially deployed for military purposes: reconnaissance, surveillance and extrajudicial executions. Tod...
Article
This chapter outlines the transformations of surveillance in the Central and Eastern European (CEE) countries occurring as a result of profound economic, social and political change in the post-socialist transition. It begins with the socio-economic framework in which new and historically significant technologically enhanced surveillance practices...
Book
Full-scale political change affects every level of a society, but perhaps nowhere as strikingly as in the areas of crime policy and law enforcement. Over the past two decades, the European nations that have moved from totalitarianism toward democracy have come to embody this trend, yet reliable sources on crime and law enforcement in these countrie...
Article
Full-text available
To an ever-increasing extent, law enforcement agencies work with and rely on information obtained and passed to them by intelligence services. However, in comparison to the police, intelligent services face much less regulation or supervision. Contrasting levels of regulation and supervision pose a problem where the institutional and functional bor...
Article
Cyberbullying usually refers to bullying and harassment of others by means of new electronic technologies, primarily mobile phones and the Internet. The paper presents the results of an on-line cyberbullying victimization survey conducted mostly among students at several Slovene faculties. 441 adults, of whom 246 were aged less than 24 years, 135 a...
Article
Full-text available
The development of microelectronics, databases and computer networks, in connection with an enhanced desire to control through identification, the entertainment culture, the managerial paradigm in public policy, a belief in technical progress, the commercialization of security, a decline of humanistic understanding of the individual and the rise of...
Article
The internet does not have any central, hierarchically established coordinator, able to establish rules of the game from top to bottom. The technical design of the internet has always been technologically resistant to all attempts of control. There was even a widespread belief that the exercise of state sovereignty, resting on the principle of terr...
Article
The introduction of subject into language automatically means a renunciation of violence, since language is an instrument that intervenes as a mediator between people. Conflicts between people are thus entirely ordinary, as are also strategies and techniques of non-violent conflict resolution. Alternative resolution of conflicts, which has attracte...
Article
The abstract for this document is available on CSA Illumina.To view the Abstract, click the Abstract button above the document title.

Network

Cited By