Abstract
Dataveillance, the collection, storage and mining of data and images, is increasing and new emerging technologies seem to inevitably contribute to ever more dataveillance. In this chapter, we outline the key social drivers for dataveillance and illustrate some of the roles emerging technology plays in dataveillance. We then turn to the question of the relationship of technology to its use and how non-neutral outcomes eventuate. Why does new technology seemingly lead to dataveillance rather than empowerment of the citizen, worker and consumer? To unravel this, we develop a social ecological model of technology cooption. In this model, we show how technology cooption is contested at each stage of technology development. Further, we show that the outcome of such contestation is the non-neutrality of the technology. The technology cooption model provides a middle range theory for empirical analysis by identifying the key elements of technology cooption and their proposed links and the role of the stakeholders in such cooption.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Andrejevic, M.: iSpy: surveillance and power in the interactive era. University Press of Kansas, Lawrence (2007)
Bagaric, M.: Privacy is the last thing we need. In: The Age, Fairfax, Melbourne (2007)
Bar, F., Pisani, F., Weber, M.: Mobile technology appropriation in a distant mirror: baroque infiltration, creolization and cannibalism. Prepared for discussion at Seminario sobre Desarrollo Económico, Desarrollo Social y Comunicaciones Móviles en América Latina Convened by Fundación Telefónica in Buenos Aires, April 20-21 (2007)
Bauman, Z.: Does ethics have a chance in a world of consumers? Harvard University Press, Cambridge (2008)
Baumgart, S.: Police watching where you Go. In: Bribane Times. Fairfax, Brisbane (2010)
Beck, U.: Risk Society: Towards a New Modernity. Sage, London (1992)
Beniger, J.R.: The control revolution: Technological and economic origins of the information society. Harvard University Press, Cambridge (1986)
Bennett, C.J., Raab, C.D.: The governance of privacy: Policy instruments in global perspective. Ashgate, Aldershot (2003)
boyd, D.: Facebook’s Privacy Trainwreck: Exposure, Invasion, and Social Convergence. The International Journal of Research into New Media Technologies 14, 13–20 (2008)
Campbell, J.E., Carlson, M.: Panopticon.com: Online Surveillance and the Commodification of Privacy. Journal of Broadcasting & Electronic Media 46, 586–606 (2002)
Carroll, J.: Completing Design in Use: Closing the Appropriation Cycle. In: European Conference on Information Systems (ECIS). Association for Information Systems (2004)
Chaudhry, N.A.: Introduction to Stream Data Management. In: Chaudhry, N.A., Shaw, K., Abdelguerfi, M. (eds.) Stream Data Management, pp. 1–13. Springer, US (2005)
Clarke, R.: Information Technology and Dataveillance. Commununications of the ACM 31, 498–512 (1988)
Clarke, R.: While You Were Sleeping... Surveillance Technologies Arrived. Australian Quarterly 73, 10–14 (2001)
Cohen, J.E.: Examined Lives: Informational Privacy and the Subject as Object Stanford Law Review, vol. 52, pp. 1373–1438 (2000)
Cohen, S.: Visions of social control:crime, punishment, and classification. Polity Press:Blackwell, Cambridge Cambridgeshire Oxford, UK (1985)
Conti, G.: Googling considered harmful. In: Proceedings of the New Security Paradigms Workshop, pp. 67–76. ACM Press, New York (2006)
Cooley, M., Cooley, S.: Architect or bee?: the human/technology relationship. Langley Technical Services, Slough (1980)
Cortes, C., Fisher, K., Pregibon, D., Rodgers, A., Smith, F.: Hancock: A Language for Analyzing Transactional Data Streams. ACM Transactions on Programming Language and Systems 26, 301–338 (2004)
Davenport, T.H., Prusak, L.: Information ecology: mastering the information and knowledge environment. Oxford University Press, New York (1997)
Davis, F.D.: Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly 13, 319–340 (1989)
Dreyfus, H.L.: The Current Relevance of Merleau-Ponty’s Phenomenology of Embodiment. The Electronic Journal of Analytic Philosophy (1996)
Fernback, J.: Selling ourselves? Critical Discourse Studies 4, 311–330 (2007)
Fishman, C.: The Wal-Mart Effect: How the World’s Most Powerful Company Really Works–and How It’s Transforming the American Economy. Penguin (2006)
Foucault, M., Sheridan, A.: Discipline and punish: the birth of the prison. Allen Lane, London (1977)
Froomkin, A.M.: The Death of Privacy? Stanford Law Review 52, 1461–1543 (2000)
Gandy, O.H.: The panoptic sort: A political economy of personal information. Westview Press, Boulder (1993)
Gaver, W.W.: Affordances for interaction: the social is material for design. Interactions 8, 111–129 (1996)
Geddes, L.: Rat in your cellphone. New Scientist 204, 34–37 (2009)
Geddes, L.: Rat in your cellphone. New Scientist, 34–37 (2009)
Gibson, J.J.: The Theory of Affordances. In: Shaw, R.E., Bransford, J. (eds.) Perceiving, acting, and knowing: Toward an ecological psychology, pp. 67–82. Lawrence Erlbaum Associates, Inc., Hillsdale (1977)
Giddens, A.: The nation state and violence. University of California Press, Berkeley (1987)
Golle, P.: Revisiting the uniqueness of simple demographics in the us population. In: WPES 2006: Proceedings of the 5th ACM Workshop on Privacy in Electronic Society, pp. 77–80. ACM, New York (2006)
Habermas, J.: Legitimation Crisis. Beacon, Boston (1975)
Hodgkinson, T.: Why you should beware of Facebook. In: The Guardian (2008)
Innis, H.A.: The bias of communication. University of Toronto Press, Toronto (1951)
Jackson, T.: This Bug in Your PC is a Smart Cookie. Financial Times, 15 (1996)
Kranzberg, M.: Technology and History: “Kranzberg’s Laws”. Technology and Culture 27, 544–560 (1986)
Kreijns, K., Kirschner, P.A.: The Social Affordances of Computer-Supported Collaborative Learning Environments. In: 31st ASEE/IEEE Frontiers in Education Conference, pp. T1F12–T11F-17. IEEE, Reno (2001)
Lambert, D., Pinheiro, J.C.: Mining a stream of transactions for customer patterns. In: Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, San Francisco (2001)
Lefebvre, H.: Everyday life in the modern world. Allen Lane, London (1971)
Lindsay, D.: An exploration of the conceptual basis of privacy and the implications for the future of Australian privacy law. Melbourne University Law Review 29, 131–178 (2005)
Lyon, D.: The electronic eye: the rise of surveillance society. Polity Press, Cambridge (1994)
Lyon, D.: Everyday Surveillance: Personal data and social classifications. Information, Communication & Society 5, 242–257 (2002)
Lyon, D.: Surveillance in cyberspace: the Internet, personal data, and social control. Queen’s Quarterly, pp. 345–357 (2002)
Lyotard, J.-F.: The postmodern condition: a report on knowledge. Manchester University Press, Manchester (1984)
Lyotard J.-F., and Lyotard J.-F.: The postmodern condition : a report on knowledge. Manchester University Press, Manchester (1984)
Mackay, H., Gillespie, G.: Extending the Social Shaping of Technology Approach: Ideology and Appropriation. Social Studies of Science 22, 685–716 (1992)
Marx, G.: The Case of the Omniscient Organization. Harvard Business Review 90, 12–30 (1990)
Marx, G.T.: What’s new about the “New Surveillance"? Classifying for change and continuity. Surveillance and Society 1, 9–29 (2002)
McCullagh, D.: AOL’s disturbing glimpse into users’ lives. In: CNET News (2006)
Merleau-Ponty, M.: Phenomenology of perception. Humanities Press, New York (1962)
Merton, R.K.: Social theory and social structure. Free Press, New York (1968)
Miller, P., Rose, N.: Governing the present: Administering economic, personal and social life. Polity, Cambridge (2008)
Montreal P. M.: ’Mashup’ websites are a dream come true for hackers: privacy and security go out the window when websites are merged to make them more useful. In: New Scientist. pp. 28-30 (2006)
Mount, F.: Living with monsters. London Review of Books 32, 24–26 (2010)
Nardi, B.A., O’Day, V.: Information ecologies: using technology with heart. MIT Press, Cambridge (1999)
Nissenbaum, H.: How Computer Systems Embody Values. Computer, 118–119 (2001)
Nissenbaum, H.: Protecting Privacy in an Information Age: The Problem of Privacy in Public. Law and Philosophy 17, 559–596 (1998)
Norman, D.A.: The design of everyday things / Donald A. Norman Doubleday, New Yoir (1988)
O’Harrow, R.: No place to hide: The terrifying truth about the people who are watching our every move. Penguin Books, London (2006)
Olken, F., Gruenwald, L.: Data Stream Management: Aggregation, Classification, Modeling, and Operator Placement. IEEE Internet Computing 12, 9–12 (2008)
Parenti, C.: The soft cage: Surveillance in America from slavery to the war on terror. Basic Books, New York (2003)
Porter, M.E.: Strategy and the Internet. Harvard Business Review, 63–78 (2001)
Poster, M.: The mode of information: poststructuralism and social context. Polity Press in association with Basil Blackwell, Cambridge (1990)
Rheingold, H.: The virtual community: homesteading on the electronic frontier. Addison-Wesley Pub. Co., Reading (1993)
Romanyshyn, R.D.: Technology as symptom and dream. Routledge, London (1989)
Scarantinoyz, A.: Affordances Explained. Philosophy of Science 70, 949–961 (2003)
Sennett, R.: The corrosion of character: the personal consequences of work in the new capitalism. Norton, New York (1998)
Shah, R.C., Kesan, J.P.: Recipes for cookies: how institutions shape communication technologies. New Media & Society 11, 315–336 (2009)
Steeves, V.: If the Supreme Court were on facebook: evaluating the reasonable expectation of privacy test from a social perspective. Canadian Journal of Criminology and Criminal Justice 50, 331–347 (2008)
Webster, F., Robins, K.: I’ll be watching you: Comment on Sewell and Wilkinson. Sociology 27, 243–252 (1993)
Wen, H.J., Gershuny, P.: Computer-based monitoring in the American workplace: Surveillance technologies and legal challenges. Human Systems Management 24, 165–173 (2005)
Winner, L.: Do artifacts have politics? Daedalus 109 (1980)
Winograd, T.: Bringing design to software. ACM Press, New York (1996)
Zuboff, S.: In the age of the smart machine: the future of work and power. Basic Books, New York (1988)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Coulthard, D., Keller, S. (2011). ICT and Dataveillance. In: Bessis, N., Xhafa, F. (eds) Next Generation Data Technologies for Collective Computational Intelligence. Studies in Computational Intelligence, vol 352. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20344-2_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-20344-2_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20343-5
Online ISBN: 978-3-642-20344-2
eBook Packages: EngineeringEngineering (R0)