To see the other types of publications on this topic, follow the link: Nokia Corporation.

Journal articles on the topic 'Nokia Corporation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 22 journal articles for your research on the topic 'Nokia Corporation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mujtaba, Bahaudin G., Hallie Fisher, Anne-Sophie Friis, Nadine Johnson, Leah Kirkwood, and Gerardo Flores. "Expatriate Performance Appraisal Management: The Use Of A 360-Degree Feedback At Nokia Telecommunications." Journal of Business Case Studies (JBCS) 5, no. 1 (June 24, 2011): 45. http://dx.doi.org/10.19030/jbcs.v5i1.4693.

Full text
Abstract:
Performance management systems are now being used as a comprehensive human resource management tool to evaluate the performance of employees through objective setting, performance appraisal and feedback, continuous training, and career development. The focal point of this article is Nokia Telecommunications, a multinational corporation with extensive experience in sending and receiving people on foreign assignments. The paper discusses performance management systems with a focus on appraisals for expatriates. Given performance appraisal challenges for expatriates, an overview assessment (using Nokia) is offered, a problem is highlighted, and a solution is presented. From the analysis and findings, an alternative performance management system of appraisals is recommended for implementation with Nokia employees working abroad and other expatriates.
APA, Harvard, Vancouver, ISO, and other styles
2

Hien, Duong Thi. "Corporation Social Responsibility: Comparison and Contrast." Journal of Business and Economics 9, no. 5 (May 20, 2018): 447–53. http://dx.doi.org/10.15341/jbe(2155-7950)/05.09.2018/007.

Full text
Abstract:
One of the greatest highlights in the business world nowadays is the participation in corporate social responsibility. With certain purposes, corporate social responsibility plans are run by almost all companies, within service sector as well as manufacturing sector, in developing and advanced based country. One important question is raised at hand is that whether the corporate social responsibility initiatives in all corporations are the same? The answer is “No”. In this paper, the author will use three cases of Nokia, Lenovo and Banco do Brasil to illustrate the distinction amongst corporate social responsibility activities in different industries and economic-based enterprises.
APA, Harvard, Vancouver, ISO, and other styles
3

Laitinen, Erkki K. "Microeconomic analysis of the balanced scorecard: a case of Nokia Corporation." International Journal of Productivity and Performance Management 54, no. 5/6 (July 2005): 325–39. http://dx.doi.org/10.1108/17410400510604502.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mihály, Zoltán. "The Making of Cheap Labour Power: Nokia’s Case in Cluj." Studia Universitatis Babes-Bolyai Sociologia 6, no. 1 (June 1, 2015): 63–82. http://dx.doi.org/10.1515/subbs-2015-0003.

Full text
Abstract:
Abstract This paper describes the procedures that minimized labour costs in a typical offshore factory of a large corporation from the global market: the Nokia factory in Cluj, Romania. Two interrelated factors contributed to this. Firstly, the arrival of neoliberal economic rationality created favourable conditions for transnational capital’s free passage through the country. Secondly, under the imperative of flexibilization, the 2011 Labour Code modifications diminished employee rights and increased employers’ privileges, allowing companies such as Nokia to freely assemble the region’s labour force – engaging it in a complex production process – and disassemble it without any major consequences. Flexibilization permitted the use of outsourced labour power in the form of external employees, partly from rural areas, with short-term contracts and minimum wages.
APA, Harvard, Vancouver, ISO, and other styles
5

Peacocke, Teresa Rosen. "Disclosure against foreign clients and lawyers: lessons for trust lawyers from Kiobel v Cravath Swaine & Moore." Trusts & Trustees 25, no. 8 (July 30, 2019): 818–23. http://dx.doi.org/10.1093/tandt/ttz068.

Full text
Abstract:
Abstract The author highlights two cases in which the courts considered the impact of protective orders, also known as confidentiality clubs, in determining applications for disclosure of the protected material to parties, or for purposes, outside the terms of the orders. In both cases the applications failed. In the New York case of Kiobel v Cravath, Swaine & Moore LLP (2016), the litigation in which the protective order was imposed had closed, but the order was upheld. In HTC Corporation v Nokia Corporation (2013) in London, a party sought disclosure from its opponent that would circumvent the effect of the protective order made when the disclosure was made by a third party. The author considers the usefulness of such orders, notwithstanding certain weaknesses, for domestic and international contentious trust cases.
APA, Harvard, Vancouver, ISO, and other styles
6

Salonen, Anna, and Mika Gabrielsson. "The Challenge of Multinational Corporation (MNC)-Led Growth and Internationalization: The Case of Nokia-Dependent Suppliers." Journal of Business-to-Business Marketing 19, no. 2 (April 2012): 147–73. http://dx.doi.org/10.1080/1051712x.2012.621848.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bhatt, P. R. "HTC Corporation: A Different Kind of Leadership of Cher Wang." South Asian Journal of Business and Management Cases 2, no. 2 (December 2013): 217–28. http://dx.doi.org/10.1177/2277977913509177.

Full text
Abstract:
HTC corporation was started as a manufacturer of personal digital assistants (PDAs) in 1997 and later shifted to manufacturing smartphones for branded handset companies and for service providers such as T-Mobile, Vodafone, Orange, Sprint, Cingular, Verizon and NTT DoCoMo as an original design manufactures (ODMs) in 2002. In 2007, HTC had taken a strategic decision to manufacture branded products and sold smartphones under its own name. The main competitors of HTC in smartphone industry were Apple, Samsung, Research in Motion (RIM), Nokia and Huawei. HTC took a number of distinct paths to drive differentiation of its products which included a superb User Interface (UI) and applications (for e-mailing, screen locking, dialing and picture taking among others) that provided a unique experience to HTC users. Cher Wang believed that the key to creating a powerful brand was to produce cutting-edge smartphones. Cher Wang introduced a new culture, a culture of innovation in the organization. Her vision was to create innovative products that could enrich consumers’ lives. Cher Wang wanted to make HTC global organization to make convergence of internet, mobile, wireless and IT. HTC’s long-term plan was to distinguish itself in the handsets and tablets markets by offering an HTC-specific experience on both Android and Windows phones.
APA, Harvard, Vancouver, ISO, and other styles
8

Jolkkonen, Arja, Pertti Koistinen, and Arja Kurvinen. "Reemployment of Displaced Workers – The Case of a Plant Closing on a Remote Region in Finland." Nordic Journal of Working Life Studies 2, no. 1 (February 24, 2012): 81. http://dx.doi.org/10.19154/njwls.v2i1.2353.

Full text
Abstract:
The aims of this article are to examine the reemployment of displaced workers and individual factors that predict reemployment and education, earnings in new jobs, and paths to reemployment. This article is based on a case study of the closing down of the Perlos Ltd plants in North Karelia in eastern Finland. From the 1990s, the Perlos Corporation grew from a Nokia subcontractor into a globally operating limited company with a global workforce of over 13,000 workers and almost 2,000 workers in North Karelia. In 2007, the corporation closed down all its production activities in Finland. In the case study, various data sources were used but this article is based mainly on the questionnaire conducted in 2008 among 1,217 trade union members. Logistic and multinomial regression analyses are used as analysis methods. Against expectations, the fast reemployment of the displaced workers was a surprise, which can be explained by the good demand and hidden need for labor in other firms in this region. However, the demand was specific and differentiated between the workers’ job opportunities. White-collar workers had better chances of reemployment. Gender, next to the occupational status, was an important predictor for reemployment. On the other hand, education, the willingness to move, and family status were not statistically significant explanatory factors for reemployment. The age of the job seekers was one important factor predicting unemployment.
APA, Harvard, Vancouver, ISO, and other styles
9

Bhatt, P. R. "Internationalisation and Innovation: A Case Study of Nokia." Vision: The Journal of Business Perspective 6, no. 2 (July 2002): 121–29. http://dx.doi.org/10.1177/097226290200600212.

Full text
Abstract:
NOKIA is one of the ‘e-generation’ companies, which relies on the web to conduct their everyday business, demanding richer and more personalized experience. Its objective is ‘to transform the Digital Age to a truly Mobile Age’, giving everyone access to information. Nokia is the undisputed global king of mobile communication. Its strategy is to become a global player in telecommunications through ‘collaboration and innovations'. It has made spectacular innovations in mobile communications. It brought technologies such as General Packet Radio Services (GPRS), Wideband Code Division Multiple Access (CDMA) as the mobile moves third generation (3G). Nokia has established their cutting edge technology and trend settling lifestyle offerings while unveiling their mobile handset products. In 3G services, Nokia will give e-mail, weather information maps, rout planning, traffic information, bank account data, views, travel information, etc. Nokia adopted a strategy of mergers, acquisitions, alliance and collaboration to gain superiority in technology and competitive advantage. While Nokia is the market leader in handset manufacturing with 35.3% share, Ericsson is the king of wireless network equipment with 33% market share. Nokia's performance was impressive during 1996–2000. Nokia's future growth areas include market leadership in security infrastructure for corporates, supplying solutions to help corporations block viruses and intruders at their network gateways.
APA, Harvard, Vancouver, ISO, and other styles
10

"HTC CORPORATION v NOKIA CORPORATION." Reports of Patent, Design and Trade Mark Cases 131, no. 8 (August 1, 2014): 577–90. http://dx.doi.org/10.1093/rpc/rcu041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

"HTC CORPORATION v NOKIA CORPORATION (No. 2)." Reports of Patent, Design and Trade Mark Cases 131, no. 12 (December 1, 2014): 865–87. http://dx.doi.org/10.1093/rpc/rcu061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

"HTC CORPORATION v NOKIA CORPORATION (No. 2)." Reports of Patent, Design and Trade Mark Cases 131, no. 12 (December 1, 2014): 888–98. http://dx.doi.org/10.1093/rpc/rcu062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Varkkey, Biju, and Nutan Samdani. "Employee Unrest at NOKIA India." Indian Institute of Management Ahmedabad, August 22, 2017, 1–17. http://dx.doi.org/10.1108/case.iima.2020.000086.

Full text
Abstract:
Nokia India Pvt Ltd (NIPL) was part of Nokia Corporation, Finland. In March 2013, the Indian Income Tax department accused NIPL of evading taxes amounting to USD 3.5 billion. Simultaneously, the market share of Nokia Corporation declined following increased competition from android devices. In September 2013, Nokia announced the sale of its global Devices and Services division to Microsoft Corporation. The Indian IT department freezed the assets of NIPL, disallowing transfer of assets and Microsoft excluded the Chennai plant of NIPL from the deal. In mid-April 2014, NIPL offered Voluntary Retirement Scheme (VRS) to its workers. Despite efforts by trade unions, the plant finally shut operations on November 1, 2014 leaving 30,000 direct and indirect employees jobless. The case discusses the labour relations impact in global manufacturing chains.
APA, Harvard, Vancouver, ISO, and other styles
14

Woolhouse, Matthew, and Dan Tidhar. "Querying 1.8 Million Music Downloads from 13 Countries." Proceedings of the Annual Conference of CAIS / Actes du congrès annuel de l'ACSI, October 29, 2013. http://dx.doi.org/10.29173/cais676.

Full text
Abstract:
Findings from an international study are reported in which music download data supplied by the Nokia Corporation were analysed from sociocultural perspectives. Novel methods capturing musical diversity and adventurousness were employed for each country in the study. Current research involving download data and Music Information Retrieval are also discussed.Les résultats d’une étude internationale seront discutés. Les données relatives aux téléchargements de musique fournies par Nokia Corporation sont analysées selon une perspective socioculturelle. De nouvelles méthodes de capture de la diversité musicale et du degré d’aventure ont été utilisées pour chaque pays de l’étude. Seront également discutés la recherche actuelle sur le téléchargement de musique et le repérage de l’information musicale.
APA, Harvard, Vancouver, ISO, and other styles
15

"NOKIA CORPORATION v IPCOM GMBH & CO KG." Reports of Patent, Design and Trade Mark Cases 129, no. 7 (July 1, 2012): 480–90. http://dx.doi.org/10.1093/rpc/rcs032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

"NOKIA CORPORATION v IPCOM GMBH & CO KG (No. 2)." Reports of Patent, Design and Trade Mark Cases 129, no. 7 (July 1, 2012): 491–500. http://dx.doi.org/10.1093/rpc/rcs033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

"NOKIA CORPORATION v IPCOM GMBH & CO KG (No. 3)." Reports of Patent, Design and Trade Mark Cases 130, no. 2 (February 1, 2013): 73–117. http://dx.doi.org/10.1093/rpc/rct002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Walker, Russell, and Joanna Wilson. "Nokia's Supply Chain Management." Kellogg School of Management Cases, January 20, 2017, 1–8. http://dx.doi.org/10.1108/case.kellogg.2016.000235.

Full text
Abstract:
In March 2000 a fire broke out at the Royal Philips Electronics plant, damaging its supply of semiconductor chips. Nokia Corporation and Ericsson LM relied on these chips to produce their cell phones; together they received 40 percent of the plant's chip production. Both companies were about to release new cell phone designs that required the chips. At Nokia, word of the setback spread quickly up the chain of command. Nokia's team, which had a crisis plan in place, sprang into action. With an aggressive, multipronged strategy, Nokia avoided any cell phone production loss. In contrast, the low-level technician who received the information at Ericsson did not notify his supervisors about the fire until early April and had to scramble to locate new sources for the chips. This search delayed production and proved a fatal blow to Ericsson's independent production of mobile phones. Nokia's handling of its supply chain disruption provides a dramatic example of how a company's strategic risk management can alleviate financial disaster and lay the groundwork for success in the future. Perturbations in supply chain management are inevitable, and grow harder and harder to assess as the marketplace becomes more globalized.Students will learn the following concepts:
APA, Harvard, Vancouver, ISO, and other styles
19

Lamberg, Juha-Antti, Sandra Lubinaitė, Jari Ojala, and Henrikki Tikkanen. "The curse of agility: The Nokia Corporation and the loss of market dominance in mobile phones, 2003–2013." Business History, June 6, 2019, 1–47. http://dx.doi.org/10.1080/00076791.2019.1593964.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Narytnyk M., Vetoshko I.P., Mykryukov S.A., Saiko V.G., and Sarapulov S.V. "The analytical look of the current technologies of the tropospheric and radio-relay." Visnyk Universytetu “Ukraina”, 2019. http://dx.doi.org/10.36994/2707-4110-2019-2-23-11.

Full text
Abstract:
The relevance of the task of creating a mobile combined station of digital tropospheric and satellite communications of the microwave range, which simultane­ ously operates in 2 modes: horizontal communication and direct visibility, substantiates an analytical review of the current state of tropospheric communication in the world. The technical characteristics of the advanced developments of digital troposphere stations and control systems of foreign companies Comtech Systems, Raytheon Corporation, General Dynamics, Advantech Wireless are presented. It is shown that the RTM-100 tropospheric modem, with a bandwidth of 50 Mbit/s and more, which provides stable communications under multipath conditions when using direct error correction turbocompression (FEC) and supports work with Gigabit Ethernet (GbE) data ports and SNMP protocol is the key Elements for creating a new mobile combined digital troposphere and satellite communications station. The analysis of the current state and development trends of radio-relay communication, as well as the spectrum of widespread use of modern digital radio-relay communication. The OptiX RTN 900, a new generation of IP-based digital radio relay system with a split structure, is one of the first systems to support TDM, packet and hybrid transmission platforms. The system supports communication in 2G networks, voice and data services in 3G networks, broadband data services in LTE networks. Radio relay systems of NEC, NERA, Huawei Technologies, ZTE, Nokia Siemens Networks (former Alcatel-Lucent) companies implement adaptive modulation and coding (Adaptive Coding & Modulation — ACM), which allows you to change the parameters of the radio channel when changing the propagation conditions of radio waves and thereby technology AFM allows the operator to reduce their capital costs during the construction of RRL by installing antennas of smaller diameters or by building longer communication intervals. The bandwidth of digital radio relay stations has grown to 5.5 Gb / s (Ericsson) and for this new sections of the millimeter wave range have been mastered: 71…76 GHz, 81...86 GHz. The development of the terahertz frequency range opens up great op­ por­ tunities for a significant increase in throughput and security and secrecy. An analytical analysis showed the promise of creating a mobile combined station of the digital tropospheric and satellite microwave range, corresponding to the development trends of tropospheric and microwave radio communications, is an urgent task for Ukraine.
APA, Harvard, Vancouver, ISO, and other styles
21

Orozco Toro, Jaime Alberto, and Carme Ferré Pavia. "La fuerza de los stakeholders en el caso de La Noria. Ciudadanía crítica y uso de redes sociales en un análisis de la reputación corporativa." Revista ICONO14. Revista científica de Comunicación y Tecnologías emergentes 10, no. 3 (October 4, 2012). http://dx.doi.org/10.7195/ri14.v10i3.159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Kadivar, Jamileh. "Government Surveillance and Counter-Surveillance on Social and Mobile Media: The Case of Iran (2009)." M/C Journal 18, no. 2 (April 29, 2015). http://dx.doi.org/10.5204/mcj.956.

Full text
Abstract:
Human history has witnessed varied surveillance and counter-surveillance activities from time immemorial. Human beings could not surveille others effectively and accurately without the technology of their era. Technology is a tool that can empower both people and governments. The outcomes are different based on the users’ intentions and aims. 2,500 years ago, Sun Tzu noted that ‘If you know both yourself and your enemy, you can win numerous (literally, "a hundred") battles without jeopardy’. His words still ring true. To be a good surveiller and counter-surveiller it is essential to know both sides, and in order to be good at these activities access to technology is vital. There is no doubt that knowledge is power, and without technology to access the information, it is impossible to be powerful. As we become more expert at technology, we will learn what makes surveillance and counter-surveillance more effective, and will be more powerful.“Surveillance” is one of the most important aspects of living in the convergent media environment. This essay illustrates government surveillance and counter-surveillance during the Iranian Green Movement (2009) on social and mobile media. The Green Movement refers to a non-violent movement that arose after the disputed presidential election on June 2009. After that Iran was facing its most serious political crisis since the 1979 revolution. Claims of vote fraud triggered massive street protests. Many took to the streets with “Green” signs, chanting slogans such as ‘the government lied’, and ‘where is my vote?’ There is no doubt that social and mobile media has played an important role in Iran’s contemporary politics. According to Internet World Stats (IWS) Internet users in 2009 account for approximately 48.5 per cent of the population of Iran. In 2009, Iran had 30.2 million mobile phone users (Freedom House), and 72 cellular subscriptions for every 100 people (World Bank). Today, while Iran has the 19th-largest population in the world, its blogosphere holds the third spot in terms of number of users, just behind the United States and China (Beth Elson et al.). In this essay the use of social and mobile media (technology) is not debated, but the extent of this use, and who, why and how it is used, is clearly scrutinised.Visibility and Surveillance There have been different kinds of surveillance for a very long time. However, all types of surveillance are based on the notion of “visibility”. Previous studies show that visibility is not a new term (Foucault Discipline). The new things in the new era, are its scale, scope and complicated ways to watch others without being watched, which are not limited to a specific time, space and group, and are completely different from previous instruments for watching (Andrejevic). As Meikle and Young (146) have mentioned ‘networked digital media bring with them a new kind of visibility’, based on different kinds of technology. Internet surveillance has important implications in politics to control, protect, and influence (Marx Ethics; Castells; Fuchs Critique). Surveillance has been improved during its long history, and evolved from very simple spying and watching to complicated methods of “iSpy” (Andrejevic). To understand the importance of visibility and its relationship with surveillance, it is essential to study visibility in conjunction with the notion of “panopticon” and its contradictory functions. Foucault uses Bentham's notion of panopticon that carries within itself visibility and transparency to control others. “Gaze” is a central term in Bentham’s view. ‘Bentham thinks of a visibility organised entirely around a dominating, overseeing gaze’ (Foucault Eye). Moreover, Thomson (Visibility 11) notes that we are living in the age of ‘normalizing the power of the gaze’ and it is clear that the influential gaze is based on powerful means to see others.Lyon (Surveillance 2) explains that ‘surveillance is any collection and processing of personal data, whether identifiable or not, for the purpose of influencing or managing those whose data have been granted…’. He mentions that today the most important means of surveillance reside in computer power which allows collected data to be sorted, matched, retrieved, processed, marketed and circulated.Nowadays, the Internet has become ubiquitous in many parts of the world. So, the changes in people’s interactions have influenced their lives. Fuchs (Introduction 15) argues that ‘information technology enables surveillance at a distance…in real time over networks at high transmission speed’. Therefore, visibility touches different aspects of people’s lives and living in a “glasshouse” has caused a lot of fear and anxiety about privacy.Iran’s Green Movement is one of many cases for studying surveillance and counter-surveillance technologies in social and mobile media. Government Surveillance on Social and Mobile Media in Iran, 2009 In 2009 the Iranian government controlled technology that allowed them to monitor, track, and limit access to the Internet, social media and mobiles communication, which has resulted in the surveillance of Green Movement’s activists. The Iranian government had improved its technical capabilities to monitor the people’s behavior on the Internet long before the 2009 election. The election led to an increase in online surveillance. Using social media the Iranian government became even more powerful than it was before the election. Social media was a significant factor in strengthening the government’s power. In the months after the election the virtual atmosphere became considerably more repressive. The intensified filtering of the Internet and implementation of more advanced surveillance systems strengthened the government’s position after the election. The Open Net Initiative revealed that the Internet censorship system in Iran is one of the most comprehensive and sophisticated censorship systems in the world. It emphasized that ‘Advances in domestic technical capacity have contributed to the implementation of a centralized filtering strategy and a reduced reliance on Western technologies’.On the other hand, the authorities attempted to block all access to political blogs (Jaras), either through cyber-security methods or through threats (Tusa). The Centre for Investigating Organized Cyber Crimes, which was founded in 2007 partly ‘to investigate and confront social and economic offenses on the Internet’ (Cyber Police), became increasingly important over the course of 2009 as the government combated the opposition’s online activities (Beth Elson et al. 16). Training of "senior Internet lieutenants" to confront Iran's "virtual enemies online" was another attempt that the Intelligence minister announced following the protests (Iran Media Program).In 2009 the Iranian government enacted the Computer Crime Law (Jaras). According to this law the Committee in Charge of Determining Unauthorized Websites is legally empowered to identify sites that carry forbidden content and report that information to TCI and other major ISPs for blocking (Freedom House). In the late fall of 2009, the government started sending threatening and warning text messages to protesters about their presence in the protests (BBC). Attacking, blocking, hacking and hijacking of the domain names of some opposition websites such as Jaras and Kaleme besides a number of non-Iranian sites such as Twitter were among the other attempts of the Iranian Cyber Army (Jaras).It is also said that the police and security forces arrested dissidents identified through photos and videos posted on the social media that many imagined had empowered them. Furthermore, the online photos of the active protesters were posted on different websites, asking people to identify them (Valizadeh).In late June 2009 the Iranian government was intentionally permitting Internet traffic to and from social networking sites such as Facebook and Twitter so that it could use a sophisticated practice called Deep Packet Inspection (DPI) to collect information about users. It was reportedly also applying the same technology to monitor mobile phone communications (Beth Elson et al. 15).On the other hand, to cut communication between Iranians inside and outside the country, Iran slowed down the Internet dramatically (Jaras). Iran also blocked access to Facebook, YouTube, Wikipedia, Twitter and many blogs before, during and after the protests. Moreover, in 2009, text message services were shut down for over 40 days, and mobile phone subscribers could not send or receive text messages regardless of their mobile carriers. Subsequently it was disrupted on a temporary basis immediately before and during key protests days.It was later discovered that the Nokia Siemens Network provided the government with surveillance technologies (Wagner; Iran Media Program). The Iranian government built a complicated system that enabled it to monitor, track and intercept what was said on mobile phones. Nokia Siemens Network confirmed it supplied Iran with the technology needed to monitor, control, and read local telephone calls [...] The product allowed authorities to monitor any communications across a network, including voice calls, text messaging, instant messages, and web traffic (Cellan-Jones). Media sources also reported that two Chinese companies, Huawei and ZTE, provided surveillance technologies to the government. The Nic Payamak and Saman Payamak websites, that provide mass text messaging services, also reported that operator Hamrah Aval commonly blocked texts with words such as meeting, location, rally, gathering, election and parliament (Iran Media Program). Visibility and Counter-Surveillance The panopticon is not limited to the watchers. Similarly, new kinds of panopticon and visibility are not confined to government surveillance. Foucault points out that ‘the seeing machine was once a sort of dark room into which individuals spied; it has become a transparent building in which the exercise of power may be supervised by society as a whole’ (Discipline 207). What is important is Foucault's recognition that transparency, not only of those who are being observed but also of those who are observing, is central to the notion of the panopticon (Allen) and ‘any member of society will have the right to come and see with his own eyes how schools, hospitals, factories, and prisons function’ (Foucault, Discipline 207). Counter-surveillance is the process of detecting and mitigating hostile surveillance (Burton). Therefore, while the Internet is a surveillance instrument that enables governments to watch people, it also improves the capacity to counter-surveille, and draws public attention to governments’ injustice. As Castells (185) notes the Internet could be used by citizens to watch their government as an instrument of control, information, participation, and even decision-making, from the bottom up.With regards to the role of citizens in counter-surveillance we can draw on Jay Rosen’s view of Internet users as ‘the people formerly known as the audience’. In counter-surveillance it can be said that passive citizens (formerly the audience) have turned into active citizens. And this change was becoming impossible without mobile and social media platforms. These new techniques and technologies have empowered people and given them the opportunity to have new identities. When Thompson wrote ‘the exercise of power in modern societies remains in many ways shrouded in secrecy and hidden from the public gaze’ (Media 125), perhaps he could not imagine that one day people can gaze at the politicians, security forces and the police through the use of the Internet and mobile devices.Furthermore, while access to mobile media allows people to hold authorities accountable for their uses and abuses of power (Breen 183), social media can be used as a means of representation, organization of collective action, mobilization, and drawing attention to police brutality and reasons for political action (Gerbaudo).There is no doubt that having creativity and using alternative platforms are important aspects in counter-surveillance. For example, images of Lt. Pike “Pepper Spray Cop” from the University of California became the symbol of the senselessness of police brutality during the Occupy Movement (Shaw). Iranians’ Counter-Surveillance on Social and Mobile Media, 2009 Iran’s Green movement (2009) triggered a lot of discussions about the role of technology in social movements. In this regard, there are two notable attitudes about the role of technology: techno-optimistic (Shriky and Castells) and techno-pessimistic (Morozov and Gladwell) views should be taken into account. While techno-optimists overrated the role of social media, techno-pessimists underestimated its role. However, there is no doubt that technology has played a great role as a counter-surveillance tool amongst Iranian people in Iran’s contemporary politics.Apart from the academic discussions between techno-optimists and techno-pessimists, there have been numerous debates about the role of new technologies in Iran during the Green Movement. This subject has received interest from different corners of the world, including Western countries, Iranian authorities, opposition groups, and also some NGOs. However, its role as a means of counter-surveillance has not received adequate attention.As the tools of counter-surveillance are more or less the tools of surveillance, protesters learned from the government to use the same techniques to challenge authority on social media.Establishing new websites (such as JARAS, RASA, Kalemeh, and Iran green voice) or strengthening some previous ones (such as Saham, Emrooz, Norooz), also activating different platforms such as Facebook, Twitter, and YouTube accounts to broadcast the voice of the Iranian Green Movement and neutralize the government’s propaganda were the most important ways to empower supporters of Iran’s Green Movement in counter-surveillance.‘Reporters Without Borders issued a statement, saying that ‘the new media, and particularly social networks, have given populations collaborative tools with which they can change the social order’. It is also mentioned that despite efforts by the Iranian government to prevent any reporting of the protests and due to considerable pressure placed on foreign journalists inside Iran, social media played a significant role in sending the messages and images of the movement to the outside world (Axworthy). However, at that moment, many thought that Twitter performed a liberating role for Iranian dissenters. For example, Western media heralded the Green Movement in Iran as a “Twitter revolution” fuelled by information and communication technologies (ICTs) and social media tools (Carrieri et al. 4). “The Revolution Will Be Twittered” was the first in a series of blog posts published by Andrew Sullivan a few hours after the news of the protests was released.According to the researcher’s observation the numbers of Twitter users inside Iran who tweeted was very limited in 2009 and social media was most useful in the dissemination of information, especially from those inside Iran to outsiders. Mobile phones were mostly influential as an instrument firstly used for producing contents (images and videos) and secondly for the organisation of protests. There were many photos and videos that were filmed by very simple mobile cell phones, uploaded by ordinary people onto YouTube and other platforms. The links were shared many times on Twitter and Facebook and released by mainstream media. The most frequently circulated story from the Iranian protests was a video of Neda Agha-Sultan. Her final moments were captured by some bystanders with mobile phone cameras and rapidly spread across the global media and the Internet. It showed that the camera-phone had provided citizens with a powerful means, allowing for the creation and instant sharing of persuasive personalised eyewitness records with mobile and globalised target populations (Anden-Papadopoulos).Protesters used another technique, DDOS (distributed denial of service attacks), for political protest in cyber space. Anonymous people used DDOS to overload a website with fake requests, making it unavailable for users and disrupting the sites set as targets (McMillan) in effect, shutting down the site. DDOS is an important counter-surveillance activity by grassroots activists or hackers. It was a cyber protest that knocked the main Iranian governmental websites off-line and caused crowdsourcing and false trafficking. Amongst them were Mahmoud Ahmadinejad, Iran's supreme leader’s websites and those which belong to or are close to the government or security forces, including news agencies (Fars, IRNA, Press TV…), the Ministry of Foreign Affairs, the Ministry of Justice, the Police, and the Ministry of the Interior.Moreover, as authorities uploaded the pictures of protesters onto different platforms to find and arrest them, in some cities people started to put the pictures, phone numbers and addresses of members of security forces and plain clothes police officers who attacked them during the protests and asked people to identify and report the others. They also wanted people to send information about suspects who infringed human rights. Conclusion To sum up, visibility, surveillance and counter-surveillance are not new phenomena. What is new is the technology, which increased their complexity. As Foucault (Discipline 200) mentioned ‘visibility is a trap’, so being visible would be the weakness of those who are being surveilled in the power struggle. In the convergent era, in order to be more powerful, both surveillance and counter-surveillance activities aim for more visibility. Although both attempt to use the same means (technology) to trap the other side, the differences are in their subjects, objects, goals and results.While in surveillance, visibility of the many by the few is mostly for the purpose of control and influence in undemocratic ways, in counter-surveillance, the visibility of the few by the many is mostly through democratic ways to secure more accountability and transparency from the governments.As mentioned in the case of Iran’s Green Movement, the scale and scope of visibility are different in surveillance and counter-surveillance. The importance of what Shaw wrote about Sydney occupy counter-surveillance, applies to other places, such as Iran. She has stressed that ‘protesters and police engaged in a dance of technology and surveillance with one another. Both had access to technology, but there were uncertainties about the extent of technology and its proficient use…’In Iran (2009), both sides (government and activists) used technology and benefited from digital networked platforms, but their levels of access and domains of influence were different, which was because the sources of power, information and wealth were divided asymmetrically between them. Creativity was important for both sides to make others more visible, and make themselves invisible. Also, sharing information to make the other side visible played an important role in these two areas. References Alen, David. “The Trouble with Transparency: The Challenge of Doing Journalism Ethics in a Surveillance Society.” Journalism Studies 9.3 (2008): 323-40. 8 Dec. 2013 ‹http://www.tandfonline.com/doi/full/10.1080/14616700801997224#.UqRFSuIZsqN›. Anden-Papadopoulos, Kari. “Citizen Camera-Witnessing: Embodied Political Dissent in the Age of ‘Mediated Mass Self-Communication.’” New Media & Society 16.5 (2014). 753-69. 9 Aug. 2014 ‹http://nms.sagepub.com/content/16/5/753.full.pdf+html›. Andrejevic, Mark. iSpy: Surveillance and Power in the Interactive Era. Lawrence, Kan: UP of Kansas, 2007. Axworthy, Micheal. Revolutionary Iran: A History of the Islamic Republic. London: Penguin Books, 2014. Bentham, Jeremy. Panopticon Postscript. London: T. Payne, 1791. Beth Elson, Sara, Douglas Yeung, Parisa Roshan, S.R. Bohandy, and Alireza Nader. Using Social Media to Gauge Iranian Public Opinion and Mood after the 2009 Election. Santa Monica: RAND Corporation, 2012. 1 Aug. 2014 ‹http://www.rand.org/content/dam/rand/pubs/technical_reports/2012/RAND_TR1161.pdf›. Breen, Marcus. Uprising: The Internet’s Unintended Consequences. Champaign, Ill: Common Ground Pub, 2011. Burton, Fred. “The Secrets of Counter-Surveillance.” Stratfor Global Intelligence. 2007. 19 April 2015 ‹https://www.stratfor.com/secrets_countersurveillance›. Carrieri, Matthew, Ali Karimzadeh Bangi, Saad Omar Khan, and Saffron Suud. After the Green Movement Internet Controls in Iran, 2009-2012. OpenNet Initiative, 2013. 17 Dec. 2013 ‹https://opennet.net/sites/opennet.net/files/iranreport.pdf›. Castells, Manuel. The Internet Galaxy: Reflections on the Internet, Business, and Society. Oxford: Oxford UP: 2001. Cellan-Jones, Rory. “Hi-Tech Helps Iranian Monitoring.” BBC, 2009. 26 July 2014 ‹http://news.bbc.co.uk/1/hi/technology/8112550.stm›. “Cyber Crimes’ List.” Iran: Cyber Police, 2009. 17 July 2014 ‹http://www.cyberpolice.ir/page/2551›. Foucault, Michel. Discipline and Punish: The Birth of the Prison. Trans. Alan Sheridan. Harmondsworth: Penguin, 1977. Foucault, Michel. “The Eye of Power.” 1980. 12 Dec. 2013 ‹https://nbrokaw.files.wordpress.com/2010/12/the-eye-of-power.doc›. Freedom House. “Special Report: Iran.” 2009. 14 June 2014 ‹http://www.sssup.it/UploadDocs/4661_8_A_Special_Report_Iran_Feedom_House_01.pdf›. Fuchs, Christian. “Introduction.” Internet and Surveillance: The Challenges of Web 2.0 and Social Media. Ed. Christian Fuchs. London: Routledge, 2012. 1-28. Fuchs, Christian. “Critique of the Political Economy of Web 2.0 Surveillance.” Internet and Surveillance: The Challenges of Web 2.0 and Social Media. Ed. Christian Fuchs. London: Routledge, 2012. 30-70. Gerbaudo, Paolo. Tweets and the Streets: Social Media and Contemporary Activism. London: Pluto, 2012. “Internet: Iran’s New Imaginary Enemy.” Jaras Mar. 2009. 28 June 2014 ‹http://www.rahesabz.net/print/12143›.Iran Media Program. “Text Messaging as Iran's New Filtering Frontier.” 2013. 25 July 2014 ‹http://www.iranmediaresearch.org/en/blog/227/13/04/25/136›. Internet World Stats News. The Internet Hits 1.5 Billion. 2009. 3 July 2014 ‹ http://www.internetworldstats.com/pr/edi038.htm›. Lyon, David. Surveillance Society: Monitoring Everyday Life. Buckingham: Open UP, 2001. Lyon, David. “9/11, Synopticon, and Scopophilia: Watching and Being Watched.” The New Politics of Surveillance and Visibility. Eds. Richard V. Ericson and Kevin D. Haggerty. Toronto: UP of Toronto, 2006. 35-54. Marx, Gary T. “What’s New about the ‘New Surveillance’? Classify for Change and Continuity.” Surveillance & Society 1.1 (2002): 9-29. McMillan, Robert. “With Unrest in Iran, Cyber-Attacks Begin.” PC World 2009. 17 Apr. 2015 ‹http://www.pcworld.com/article/166714/article.html›. Meikle, Graham, and Sherman Young. Media Convergence: Networked Digital Media in Everyday Life. London: Palgrave Macmillan, 2012. Morozov, Evgeny. “How Dictators Watch Us on the Web.” Prospect 2009. 15 June 2014 ‹http://www.prospectmagazine.co.uk/magazine/how-dictators-watch-us-on-the-web/#.U5wU6ZRdU00›.Open Net. “Iran.” 2009. 26 June 2014 ‹https://opennet.net/research/profiles/iran›. Reporters without Borders. “Web 2.0 versus Control 2.0.” 2010. 27 May 2014 ‹http://en.rsf.org/web-2-0-versus-control-2-0-18-03-2010,36697›.Rosen, Jay. The People Formerly Known as the Audience. 2006. 7 Dec. 2013 ‹http://www.huffingtonpost.com/jay-rosen/the-people-formerly-known_1_b_24113.html›. Shaw, Frances. “'Walls of Seeing': Protest Surveillance, Embodied Boundaries, and Counter-Surveillance at Occupy Sydney.” Transformation 23 (2013). 9 Dec. 2013 ‹http://www.transformationsjournal.org/journal/issue_23/article_04.shtml›. “The Warning of the Iranian Revolutionary Guard Corps (IRGC) to the Weblogs and Websites.” BBC, 2009. 27 July 2014 ‹http://www.bbc.co.uk/persian/iran/2009/06/090617_ka_ir88_sepah_internet.shtml›. Thompson, John B. The Media And Modernity: A Social Theory of the Media. Cambridge: Polity Press, 1995. Thompson, John B. “The New Visibility.” Theory, Culture & Society 22.6 (2005): 31-51. 10 Dec. 2013 ‹http://tcs.sagepub.com/content/22/6/31.full.pdf+html›. Tusa, Felix. “How Social Media Can Shape a Protest Movement: The Cases of Egypt in 2011 and Iran in 2009.” Arab Media and Society 17 (Winter 2013). 15 July 2014 ‹http://www.arabmediasociety.com/index.php?article=816&p=0›. Tzu, Sun. Sun Tzu: The Art of War. S.l.: Pax Librorum Pub. H, 2009. Valizadeh, Reza. “Invitation to the Public Shooting with the Camera.” RFI, 2011. 19 June 2014 ‹http://www.persian.rfi.fr/%D8%AF%D8%B9%D9%88%D8%AA-%D8%A8%D9%87-%D8%B4%D9%84%DB%8C%DA%A9-%D8%B9%D9%85%D9%88%D9%85%DB%8C-%D8%A8%D8%A7-%D8%AF%D9%88%D8%B1%D8%A8%DB%8C%D9%86-%D8%B9%DA%A9%D8%A7%D8%B3%DB%8C-20110307/%D8%A7%DB%8C%D8%B1%D8%A7%D9%86›. Wagner, Ben. Exporting Censorship and Surveillance Technology. Netherlands: Humanist Institute for Co-operation with Developing Countries (Hivos), 2012. 7 July 2014 ‹https://hivos.org/sites/default/files/exporting_censorship_and_surveillance_technology_by_ben_wagner.pdf›. World Bank. Mobile Cellular Subscriptions (per 100 People). The World Bank. N.d. 27 June 2014 ‹http://data.worldbank.org/indicator/IT.CEL.SETS.P2›.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography