<div dir="auto"><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Call for Papers for an edited volume under contract with the University of Toronto Press</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Tentative Title: </span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Surveillance and the dossier: record keeping, vulnerability and reputational politics</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><br></span><span style="font-size:12pt;font-family:"times new roman";font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Editors:</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><br></span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Cristina Plamadeala, PhD</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><br></span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Rafael de Almeida Evangelista, PhD</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><br></span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Ozgun Topak, PhD</span></p><br><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Overview</span></p><p dir="ltr" style="line-height:1.2;text-align:justify;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">The key objective of this edited collection is to offer new empirical studies, frameworks, and concepts for studying the crucial importance of dossiers in “surveillance societies” (Lyon 1994; Norris & Armstrong 1999), past and present. While interesting work has been carried out on the use of dossiers in the study of past authoritarian regimes as well as in colonial contexts (see, e.g., Los 2004; Epstein 2004; Samatas 2005; Stoler 2010), recent technological developments and political trends warrant a broader inquiry into the contemporary significance of the dossier in surveillance societies. </span></p><p dir="ltr" style="line-height:1.2;text-align:justify;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> </span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">    </span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">The burgeoning field of contemporary authoritarian surveillance studies is beginning to appreciate the historical significance and continuities in dossier surveillance and the use of police, paramilitary groups, informers and collaborators as agents of surveillance (e.g. MacKinnon 2011; Topak 2017; 2019; Ogasawara 2017; Akbari 2020; Plamadeala 2019a, 2019b, 2020). New empirical and conceptual studies on past realities, historical continuities and contemporary manifestations of the dossier can be especially valuable for the examination of the history of surveillance (e.g Boersma <a href="http://et.al">et.al</a> 2014; Thompson 2016; Heynen and van der Meulen 2019) and of contemporary surveillance societies. Toward this purpose, the proposed volume hopes to bring together varying historical, contemporary and international approaches, as well as case studies on the surveillance dossier, be it paper-based or digital; gathered on individuals or groups; deployed by governments, health agencies, schools, corporations, or private individuals; and carried out in a variety of political settings ranging from authoritarian to the liberal democratic. This volume, therefore, aims to make explicit the potential continuities between surveillance practices across rather different political and economic regimes; and, in doing so, it aims to interrogate how surveillance policies increasingly redraw these boundaries between regime types. Accordingly, this book seeks to discover historical parallels to (and perhaps warnings about) our contemporary surveillance culture. </span></p><p dir="ltr" style="line-height:1.2;text-align:justify;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> </span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">    </span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Even though Western media are quick to excoriate China’s fabled “social credit system,” which uses a wide variety of data points to politically and socially “rate” citizens, the COVID-19 pandemic has fueled similar long-developing trends across the globe. In fact, social and political files have a long history of use by intelligence agencies, employers, credit bureaus, and other entities. Today, as social networks function like a repository of investigational resources—and as these resources are increasingly integrated with other data sets for exclusionary purposes—there is a good reason to apply and expand this critical perspective to emerging surveillance practices beyond China. This is especially true in the wake of COVID-19, when many societies have embraced snitch tip-lines, contract tracing, behavior-based corporate blacklists, and other mechanisms of surveillance-based record-keeping.</span></p><p dir="ltr" style="line-height:1.2;text-align:justify;margin-top:0pt;margin-bottom:12pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> </span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">    </span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Furthermore, as a number of scholars have demonstrated (e.g., Marquis 2003; Solove 2004), the concept of the dossier—and more recently, that of ‘dossierveillance’ (Plamadeala 2019a; 2019b, 2020)—provides a useful heuristic for understanding how corporations, security agencies, and other institutions collect and store information for purposes of behavioral management.  Dossierveillance is a type of surveillance wherein the dossier, file (or a series of files), paper-based or virtual, lie at the center of what makes a person afraid or reluctant to act in a certain manner, or to disclose information that, once placed in the file, has the potentiality to be </span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">interpreted</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> in a way deemed or perceived as harmful for the respective person. The dossier in dossierveillance holds power on a person either through its existence or the </span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">possibility</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> of its existence and thus can be </span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">potentially</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> employed in the future in a way that would harm the respective person. The dossier has, as a result, panoptic implications of ‘soul training’: it is the cause of one’s self-surveillance or self-censorship. The person subjected to dossierveillance learns, in the process, to be careful/secretive/reluctant to offer details in respect to the information divulged to a specific authority compiling the dossier or to act in ways that, if taken note of, may not harm the respective person in the future (Plamadeala 2020). </span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">    </span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><br></span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> </span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">    </span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">While Plamadeala’s work on ‘dossierveillance’ and that of other scholars working on past authoritarian regimes (e.g. Los 2004; Epstein 2004) has been employed to analyze political surveillance in totalitarian regimes (Plamadeala 2019a, 2019b), the dossier’s broader applicability to the study of current authoritarian regimes, liberal democratic and corporate surveillance deserves greater attention. Along with its cognate concepts, including the file, the folder, the personal record, and related database technologies, the dossier highlights how the collection and storage of personal information can be used to empower, marginalize, and regulate access to goods, services, political rights, and professional opportunities (Ruppert 2012). This volume, therefore, intends to offer a fuller theorization and broader historical and critical examination of this concept.</span></p><p dir="ltr" style="line-height:1.2;text-align:justify;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Questions asked:</span></p><p dir="ltr" style="line-height:1.2;text-align:justify;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">This edited collection will ask the following questions: What constitutes a dossier? What are the historical continuities and discontinuities that frame the present political state of these surveillance-based files? (These files can private and public, commercial and governmental and are kept on citizens.) What is the role of the dossier in bureaucratic transactions and paperwork within today’s surveillance societies? What conceptual parallels can be drawn between new trends and well-tested mechanisms of surveillance-based political management, such as the dossier? How did the rise of smart technology and algorithmic intelligence provide a new impetus to the classic political tactic of ‘gathering dirt’ on targeted individuals? What is the role of the personal dossier in carrying out the strategies employed to fight the COVID-19 pandemic, such as contact tracing, quarantine tracking, and immunity mapping?</span></p><br><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Chapter topics may include but are</span><span style="font-size:12pt;font-family:"times new roman";font-weight:700;font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> not</span><span style="font-size:12pt;font-family:"times new roman";font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> limited to:</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">The self-generated dossier</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Performativity and the dossier</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">China’s social credit system and the dossier</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Surveillance capitalism and the financial dossier</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Global south, new democracies and the political dossier</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">From slavery to racialized facial recognition systems</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Histories of dossierveillance </span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><br></span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Workplace surveillance and the dossier</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><br></span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Patient-Doctor relations, disease management and the dossier</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><br></span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Data motility, the dossier and the digital archive</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><br></span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Vulnerability, risk and the dossier</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><br></span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Art, surveillance and the dossier</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><br></span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Disease management, disability and the dossier</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><br></span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Policing and the dossier</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><br></span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">The constitution of disability and the dossier</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><br></span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">The dossier and migration (such as border control mechanisms, identification systems, etc.)</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Criminology and the dossier</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Cyber crime and the dossier</span></p><br><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Abstract submissions:</span></p><p dir="ltr" style="line-height:1.2;text-align:justify;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">We encourage submission from scholars in surveillance studies and beyond, whose subject of research may be looked at/reexamined through the lens of the questions asked in this call for papers. We especially encourage submissions that are based on scholarly works that explore themes such as gender, class, immigration, sexuality, illness, disability, and race and racialization.</span></p><br><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Interested contributors should send a 350-550 word abstract and a 150-200 word bio to the following email: </span><a href="mailto:surveillanceandthedossier@gmail.com" style="text-decoration-line:none"><span style="font-size:12pt;font-family:"times new roman";color:rgb(17,85,204);font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">surveillanceandthedossier@gmail.com</span></a><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">.</span></p><br><p dir="ltr" style="line-height:1.2;text-align:justify;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Timeline</span></p><ul style="margin-top:0;margin-bottom:0"><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"noto sans symbols",sans-serif;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Abstracts, written in English, are due before May 30, 2021</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"noto sans symbols",sans-serif;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Short-listed papers will be notified on or around June 15, 2021</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"noto sans symbols",sans-serif;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Papers due October 30, 2021</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"noto sans symbols",sans-serif;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Peer-review and feedback, round 1: due by May 1, 2022</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"noto sans symbols",sans-serif;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Revisions due: September 1, 2022</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"noto sans symbols",sans-serif;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Peer-review and feedback, round 2: December 1, 2022</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"noto sans symbols",sans-serif;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Final papers: due April 2023</span></p></li></ul><br><br><p dir="ltr" style="line-height:1.2;text-align:justify;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Submissions will undergo peer review following the usual procedures of the University of Toronto Press. Please note that the invitation to submit a full chapter, following the submission of abstract, </span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">does not</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> guarantee acceptance for publication. The volume will include up to twelve chapters, between 7,000 and 8000 words each (including endnotes and bibliography). Each chapter may contain up to two illustrations.</span></p><br><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Inquiries:</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> Please address them to Cristina Plamadeala, at </span><a href="mailto:surveillanceandthedossier@gmail.com" style="text-decoration-line:none"><span style="font-size:12pt;font-family:"times new roman";color:rgb(0,0,255);font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">surveillanceandthedossier@gmail.com</span></a></p><br><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"times new roman";font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">References</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 0pt 36pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Akbari A. and Gabdulhakov R. (2019). “Platform Surveillance and Resistance in Iran and Russia: The Case of Telegram. </span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Surveillance & Society</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">, 17 (1/2): 223-231.</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 0pt 36pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Boersma,  K.,  R.  van  Brakel,  C.  Fonio  and  P.  Wagenaar.  (2014) </span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Histories  of  State  Surveillance  in  Europe  and  Beyond.</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">  London: Routledge</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 0pt 36pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Epstein C. (2004). “The Stasi: New Research on the East German Ministry of State Security. </span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Kritika</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> 5(2): 321-348.</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 0pt 36pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Heynen, Robert and Emily van der Meulen, eds. (2019). </span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Making Surveillance States: Transnational Histories</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">. Toronto: University of Toronto Press.</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 0pt 36pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Los, M. (2004). “The Technologies of Total Domination.” </span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Surveillance & Society</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">, 2(1): 15-38.</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 0pt 36pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Lyon, D. (1994). </span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">The Electronic Eye: The Rise of Surveillance Society. </span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Minneapolis: University of Minnesota Press.</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 0pt 36pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">MacKinnon, R. (2011). “China’s ‘Networked Authoritarianism.” </span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Journal of Democracy</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">, 22 (2): 32-46. </span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 0pt 36pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Marquis, Greg (2003). “From the “dossier society” to database networks” in </span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">, David Lyon ed. London: Routledge, pp. 226-248.</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 0pt 36pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Norris, C. & Armstrong, G. (1999). </span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">The Maximum Surveillance Society: The Rise of  CCTV</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">. Oxford: Berg.</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 0pt 36pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Ogasawara, M. (2017). “Surveillance at the Roots of Everyday Interactions: Japan’s Conspiracy Bill and its Totalitarian Effects.” </span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Surveillance & Society</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">, 15 (3/4): 477-485.</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 0pt 36pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Plamadeala, Cristina (2019a).</span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> </span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">“Dossierveillance in Communist Romania: Collaboration with the Securitate, 1945- 1989” in Rob Heynen and Emily van der Meulen, eds. </span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Making Surveillance States: Transnational Histories, </span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">University of Toronto Press, 215-236. </span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 0pt 36pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">_____.2019b</span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">. “</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">The Securitate File as a Record of Psuchegraphy” </span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Biography, </span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Vol. </span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><br></span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> </span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">    </span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">42, Nr. 3</span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">, </span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">special issue on “Biographic Mediation: The Uses of Disclosure in Bureaucracy and Politics”, Vol. 42, Nr. 3, 536-56.</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 0pt 36pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Plamadeala, C.  (2020). The Dossierveillance Project. Available at </span><a href="http://www.dossierveillance.com" style="text-decoration-line:none"><span style="font-size:12pt;font-family:"times new roman";color:rgb(0,0,255);font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">www.dossierveillance.com</span></a><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">, last accessed on February 25, 2021.</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 0pt 36pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Reeves, Joshua (2017). </span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Citizen Spies: The Long Rise of America’s Surveillance Society</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">. New York:  New  York University Press. </span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 0pt 36pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Ruppert, Evelyn (2012). “The Governmental Topologies of Database Devices.” </span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Theory, Culture, and Societ</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">y 29. 4/5 (2012): 116-36. </span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 0pt 36pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Samatas, Minas. “Studying Surveillance in Greece: Methodological and Other Problems Related to an Authoritarian Surveillance Culture,”</span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> Surveillance & Society</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> 3.2/3 (2005): 181-197. </span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 0pt 36pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Solove, Daniel J. (2004). </span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">The Digital Person: Technology and Privacy in the Information Age</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">. New York: New York University Press. </span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 0pt 36pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Stoler, Ann Laura (2008). </span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Along the Archival Grain: Epistemic Anxieties and Colonial Common Sense</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">. Princeton University Press. </span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 0pt 36pt"><span style="font-size:12pt;font-family:"times new roman";color:rgb(20,20,18);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Thompson, Scott. (2016). “Real Canadians: Exclusion, Participation, Belonging, and Male Military Mobilization in Wartime Canada, 1939-45.” </span><span style="font-size:12pt;font-family:"times new roman";color:rgb(20,20,18);font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Journal of Canadian Studies/Revue d’études Canadiennes</span><span style="font-size:12pt;font-family:"times new roman";color:rgb(20,20,18);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">, vol. 50, no. 3, 2016, 691–726</span><span style="font-size:12pt;font-family:"source sans pro";color:rgb(20,20,18);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">.</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 0pt 36pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Topak, O. (2017). “The Making of a Totalitarian Surveillance Machine: Surveillance in Turkey under AKP Rule,” </span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Surveillance & Society</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">, 15 (3/4): 535-542.</span></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt;padding:0pt 0pt 0pt 36pt"><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">_____. (2019). “The Authoritarian Surveillant Assemblage: Authoritarian State Surveillance in Turkey. Sec</span><span style="font-size:12pt;font-family:"times new roman";font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">urity Dialogue</span><span style="font-size:12pt;font-family:"times new roman";font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">, 50 (5): 454-472.</span></p><br><br><br><br><br><div data-smartmail="gmail_signature">Rafael Evangelista<br>Anthropologist, Social Scientist<br>State University of Campinas - Unicamp - Brazil<br>Author of Beyond Machines of Loving Grace: hacker culture, cybernetics and democracy<br><a href="https://books.google.ca/books/about/Beyond_Machines_of_Loving_Grace.html?id=kA9mDwAAQBAJ">https://books.google.ca/books/about/Beyond_Machines_of_Loving_Grace.html?id=kA9mDwAAQBAJ</a></div></div>