{"id":1434,"date":"2011-10-24T17:02:07","date_gmt":"2011-10-24T17:02:07","guid":{"rendered":"http:\/\/www.lecreis.org\/?p=1434"},"modified":"2011-10-24T19:22:25","modified_gmt":"2011-10-24T19:22:25","slug":"terminal-n%c2%b0-108-109-les-libertes-a-lepreuve-de-linformatique","status":"publish","type":"post","link":"https:\/\/www.lecreis.org\/?p=1434","title":{"rendered":"Terminal N\u00b0 108-109 Les libert\u00e9s \u00e0 l&rsquo;\u00e9preuve de l&rsquo;informatique"},"content":{"rendered":"<h1>Sommaire du num\u00e9ro 108-109<\/h1>\n<p>Courriel : redaction@revue-terminal.org<\/p>\n<div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.revue-terminal.org\/www\/squelettes-dist\/puce.gif\" alt=\"-\" width=\"8\" height=\"11\" \/> Editorial\u00a0: 15\u00e8me Colloque  <a href=\"http:\/\/www.revue-terminal.org\/www\/articles\/108_109\/EditoT108-109.pdf\">\u00ab\u00a0Les libert\u00e9s \u00e0 l\u2019\u00e9preuve de l\u2019informatique. Fichage et contr\u00f4le social\u00a0\u00bb<\/a> F\u00e9lix Paoletti<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.revue-terminal.org\/www\/squelettes-dist\/puce.gif\" alt=\"-\" width=\"8\" height=\"11\" \/> 1\u00e8re partie\u00a0: <a href=\"http:\/\/www.revue-terminal.org\/www\/articles\/108_109\/introPart1T108-109.pdf\">contr\u00f4le social<\/a><\/p>\n<ul>\n<li> <a href=\"http:\/\/www.revue-terminal.org\/www\/articles\/108_109\/conferenceStefanoRodotaT108-109.pdf\">Le renforcement et le d\u00e9veloppement de nouvelles applications informatiques de surveillance et de contr\u00f4le.<\/a> Sefano Rodota<\/li>\n<li> Le contr\u00f4le social \u00e0 l\u2019heure des technologies de mobilit\u00e9 et de connectivit\u00e9 Dominique Carr\u00e9, Robert Panico<\/li>\n<li> Le passe Navigo anonyme revisit\u00e9 Michel Arnaud<\/li>\n<li> Critique de la notion de \u00ab\u00a0contr\u00f4le\u00a0\u00bb\u00a0: le cas de l\u2019informatisation de  la billetterie dans les transports publics urbains. Julien Mattern<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.revue-terminal.org\/www\/squelettes-dist\/puce.gif\" alt=\"-\" width=\"8\" height=\"11\" \/> 2\u00e8me partie\u00a0: <a href=\"http:\/\/www.revue-terminal.org\/www\/articles\/108_109\/introPart2T108-109.pdf\">les r\u00e9seaux sociaux sur Internet<\/a><\/p>\n<ul>\n<li> Les r\u00e9seaux sociaux menacent-ils nos libert\u00e9s individuelles\u00a0? David Fayon<\/li>\n<li> Un monde de verre\u00a0: Facebook ou les paradoxes de la vie priv\u00e9e (sur)expos\u00e9e. Yannick Estienne<\/li>\n<li> Mon Big Brother \u00e0 moi. Andr\u00e9 Mondoux<\/li>\n<li> L\u2019intrusion de Google dans la vie priv\u00e9e au c\u0153ur des mutations du capitalisme. Eric George<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.revue-terminal.org\/www\/squelettes-dist\/puce.gif\" alt=\"-\" width=\"8\" height=\"11\" \/> 3\u00e8me partie\u00a0: <a href=\"http:\/\/www.revue-terminal.org\/www\/articles\/108_109\/introPart3T108-109.pdf\">donn\u00e9es de sant\u00e9<\/a><\/p>\n<ul>\n<li> Informatique et travail social\u00a0: quand les textes mettent \u00e0 l\u2019\u00e9preuve les ordinateurs. Eric Carton<\/li>\n<li> Controverses autour de l\u2019\u00e9change \u00e9lectronique de donn\u00e9es de sant\u00e9\u00a0: la  question de l\u2019identifiant du patient. V\u00e9ronique Dumont<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.revue-terminal.org\/www\/squelettes-dist\/puce.gif\" alt=\"-\" width=\"8\" height=\"11\" \/> 4\u00e8me partie\u00a0: <a href=\"http:\/\/www.revue-terminal.org\/www\/articles\/108_109\/introPart4T108-109.pdf\">les fichiers de police<\/a><\/p>\n<ul>\n<li> Les fichiers de police\u00a0: une cat\u00e9gorie juridique incertaine\u00a0? David Larbre<\/li>\n<li> L\u2019informatique aux fronti\u00e8res ou \u00ab\u00a0l\u2019Oeil de Sauron\u00a0\u00bb.  Jean-Jacques Lavenue<\/li>\n<li> Le syndrome de la forteresse assi\u00e8g\u00e9e\u00a0: la fonction de l\u2019Oeil de Sauron. Jean-Jacques Lavenue<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.revue-terminal.org\/www\/squelettes-dist\/puce.gif\" alt=\"-\" width=\"8\" height=\"11\" \/> Rep\u00e8res <a href=\"http:\/\/www.revue-terminal.org\/www\/articles\/108_109\/reperesT108-109.pdf\">La vie priv\u00e9e en p\u00e9ril. Des citoyens sous contr\u00f4le.<\/a> David Forest<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.revue-terminal.org\/www\/squelettes-dist\/puce.gif\" alt=\"-\" width=\"8\" height=\"11\" \/> A la m\u00e9moire d\u2019Emmanuel Videcoq<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.revue-terminal.org\/www\/squelettes-dist\/puce.gif\" alt=\"-\" width=\"8\" height=\"11\" \/> <a href=\"http:\/\/www.revue-terminal.org\/www\/articles\/108_109\/Bloc-notesT108-109.pdf\">Bloc-notes<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Sommaire du num\u00e9ro 108-109 <\/p>\n<p>Courriel : redaction@revue-terminal.org<\/p>\n<p> Editorial\u00a0: 15\u00e8me Colloque <a href=\"http:\/\/www.revue-terminal.org\/www\/articles\/108_109\/EditoT108-109.pdf\">\u00ab\u00a0Les libert\u00e9s \u00e0 l\u2019\u00e9preuve de l\u2019informatique. Fichage et contr\u00f4le social\u00a0\u00bb<\/a> F\u00e9lix Paoletti<\/p>\n<p> 1\u00e8re partie\u00a0: <a href=\"http:\/\/www.revue-terminal.org\/www\/articles\/108_109\/introPart1T108-109.pdf\">contr\u00f4le social<\/a><\/p>\n<ul>\n<li> <a href=\"http:\/\/www.revue-terminal.org\/www\/articles\/108_109\/conferenceStefanoRodotaT108-109.pdf\">Le renforcement et le d\u00e9veloppement de nouvelles applications informatiques de surveillance et de contr\u00f4le.<\/a> Sefano Rodota<\/li>\n<li> Le contr\u00f4le social \u00e0 l\u2019heure &hellip;\n<p><a class=\"more-link btn\" href=\"https:\/\/www.lecreis.org\/?p=1434\">Lire la suite<\/a><\/p>\n<\/li>\n<\/ul>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[53,65,45,31],"class_list":["post-1434","post","type-post","status-publish","format-standard","hentry","category-terminal","tag-donnees-personnelles","tag-fichiers","tag-interconnexion-de-fichiers","tag-reseaux-sociaux","item-wrap"],"_links":{"self":[{"href":"https:\/\/www.lecreis.org\/index.php?rest_route=\/wp\/v2\/posts\/1434","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lecreis.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lecreis.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lecreis.org\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lecreis.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1434"}],"version-history":[{"count":4,"href":"https:\/\/www.lecreis.org\/index.php?rest_route=\/wp\/v2\/posts\/1434\/revisions"}],"predecessor-version":[{"id":1437,"href":"https:\/\/www.lecreis.org\/index.php?rest_route=\/wp\/v2\/posts\/1434\/revisions\/1437"}],"wp:attachment":[{"href":"https:\/\/www.lecreis.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1434"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lecreis.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1434"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lecreis.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}