Skip to main content

Part of the book series: Studies in Computational Intelligence ((SCI,volume 352))

  • 713 Accesses

Abstract

Dataveillance, the collection, storage and mining of data and images, is increasing and new emerging technologies seem to inevitably contribute to ever more dataveillance. In this chapter, we outline the key social drivers for dataveillance and illustrate some of the roles emerging technology plays in dataveillance. We then turn to the question of the relationship of technology to its use and how non-neutral outcomes eventuate. Why does new technology seemingly lead to dataveillance rather than empowerment of the citizen, worker and consumer? To unravel this, we develop a social ecological model of technology cooption. In this model, we show how technology cooption is contested at each stage of technology development. Further, we show that the outcome of such contestation is the non-neutrality of the technology. The technology cooption model provides a middle range theory for empirical analysis by identifying the key elements of technology cooption and their proposed links and the role of the stakeholders in such cooption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Andrejevic, M.: iSpy: surveillance and power in the interactive era. University Press of Kansas, Lawrence (2007)

    Google Scholar 

  2. Bagaric, M.: Privacy is the last thing we need. In: The Age, Fairfax, Melbourne (2007)

    Google Scholar 

  3. Bar, F., Pisani, F., Weber, M.: Mobile technology appropriation in a distant mirror: baroque infiltration, creolization and cannibalism. Prepared for discussion at Seminario sobre Desarrollo Económico, Desarrollo Social y Comunicaciones Móviles en América Latina Convened by Fundación Telefónica in Buenos Aires, April 20-21 (2007)

    Google Scholar 

  4. Bauman, Z.: Does ethics have a chance in a world of consumers? Harvard University Press, Cambridge (2008)

    Google Scholar 

  5. Baumgart, S.: Police watching where you Go. In: Bribane Times. Fairfax, Brisbane (2010)

    Google Scholar 

  6. Beck, U.: Risk Society: Towards a New Modernity. Sage, London (1992)

    Google Scholar 

  7. Beniger, J.R.: The control revolution: Technological and economic origins of the information society. Harvard University Press, Cambridge (1986)

    Google Scholar 

  8. Bennett, C.J., Raab, C.D.: The governance of privacy: Policy instruments in global perspective. Ashgate, Aldershot (2003)

    Google Scholar 

  9. boyd, D.: Facebook’s Privacy Trainwreck: Exposure, Invasion, and Social Convergence. The International Journal of Research into New Media Technologies 14, 13–20 (2008)

    Article  Google Scholar 

  10. Campbell, J.E., Carlson, M.: Panopticon.com: Online Surveillance and the Commodification of Privacy. Journal of Broadcasting & Electronic Media 46, 586–606 (2002)

    Article  Google Scholar 

  11. Carroll, J.: Completing Design in Use: Closing the Appropriation Cycle. In: European Conference on Information Systems (ECIS). Association for Information Systems (2004)

    Google Scholar 

  12. Chaudhry, N.A.: Introduction to Stream Data Management. In: Chaudhry, N.A., Shaw, K., Abdelguerfi, M. (eds.) Stream Data Management, pp. 1–13. Springer, US (2005)

    Chapter  Google Scholar 

  13. Clarke, R.: Information Technology and Dataveillance. Commununications of the ACM 31, 498–512 (1988)

    Article  Google Scholar 

  14. Clarke, R.: While You Were Sleeping... Surveillance Technologies Arrived. Australian Quarterly 73, 10–14 (2001)

    Google Scholar 

  15. Cohen, J.E.: Examined Lives: Informational Privacy and the Subject as Object Stanford Law Review, vol. 52, pp. 1373–1438 (2000)

    Google Scholar 

  16. Cohen, S.: Visions of social control:crime, punishment, and classification. Polity Press:Blackwell, Cambridge Cambridgeshire Oxford, UK (1985)

    Google Scholar 

  17. Conti, G.: Googling considered harmful. In: Proceedings of the New Security Paradigms Workshop, pp. 67–76. ACM Press, New York (2006)

    Google Scholar 

  18. Cooley, M., Cooley, S.: Architect or bee?: the human/technology relationship. Langley Technical Services, Slough (1980)

    Google Scholar 

  19. Cortes, C., Fisher, K., Pregibon, D., Rodgers, A., Smith, F.: Hancock: A Language for Analyzing Transactional Data Streams. ACM Transactions on Programming Language and Systems 26, 301–338 (2004)

    Article  Google Scholar 

  20. Davenport, T.H., Prusak, L.: Information ecology: mastering the information and knowledge environment. Oxford University Press, New York (1997)

    Google Scholar 

  21. Davis, F.D.: Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly 13, 319–340 (1989)

    Article  Google Scholar 

  22. Dreyfus, H.L.: The Current Relevance of Merleau-Ponty’s Phenomenology of Embodiment. The Electronic Journal of Analytic Philosophy (1996)

    Google Scholar 

  23. Fernback, J.: Selling ourselves? Critical Discourse Studies 4, 311–330 (2007)

    Article  Google Scholar 

  24. Fishman, C.: The Wal-Mart Effect: How the World’s Most Powerful Company Really Works–and How It’s Transforming the American Economy. Penguin (2006)

    Google Scholar 

  25. Foucault, M., Sheridan, A.: Discipline and punish: the birth of the prison. Allen Lane, London (1977)

    Google Scholar 

  26. Froomkin, A.M.: The Death of Privacy? Stanford Law Review 52, 1461–1543 (2000)

    Article  Google Scholar 

  27. Gandy, O.H.: The panoptic sort: A political economy of personal information. Westview Press, Boulder (1993)

    Google Scholar 

  28. Gaver, W.W.: Affordances for interaction: the social is material for design. Interactions 8, 111–129 (1996)

    Google Scholar 

  29. Geddes, L.: Rat in your cellphone. New Scientist 204, 34–37 (2009)

    Article  Google Scholar 

  30. Geddes, L.: Rat in your cellphone. New Scientist, 34–37 (2009)

    Google Scholar 

  31. Gibson, J.J.: The Theory of Affordances. In: Shaw, R.E., Bransford, J. (eds.) Perceiving, acting, and knowing: Toward an ecological psychology, pp. 67–82. Lawrence Erlbaum Associates, Inc., Hillsdale (1977)

    Google Scholar 

  32. Giddens, A.: The nation state and violence. University of California Press, Berkeley (1987)

    Google Scholar 

  33. Golle, P.: Revisiting the uniqueness of simple demographics in the us population. In: WPES 2006: Proceedings of the 5th ACM Workshop on Privacy in Electronic Society, pp. 77–80. ACM, New York (2006)

    Chapter  Google Scholar 

  34. Habermas, J.: Legitimation Crisis. Beacon, Boston (1975)

    Google Scholar 

  35. Hodgkinson, T.: Why you should beware of Facebook. In: The Guardian (2008)

    Google Scholar 

  36. Innis, H.A.: The bias of communication. University of Toronto Press, Toronto (1951)

    Google Scholar 

  37. Jackson, T.: This Bug in Your PC is a Smart Cookie. Financial Times, 15 (1996)

    Google Scholar 

  38. Kranzberg, M.: Technology and History: “Kranzberg’s Laws”. Technology and Culture 27, 544–560 (1986)

    Article  Google Scholar 

  39. Kreijns, K., Kirschner, P.A.: The Social Affordances of Computer-Supported Collaborative Learning Environments. In: 31st ASEE/IEEE Frontiers in Education Conference, pp. T1F12–T11F-17. IEEE, Reno (2001)

    Google Scholar 

  40. Lambert, D., Pinheiro, J.C.: Mining a stream of transactions for customer patterns. In: Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, San Francisco (2001)

    Google Scholar 

  41. Lefebvre, H.: Everyday life in the modern world. Allen Lane, London (1971)

    Google Scholar 

  42. Lindsay, D.: An exploration of the conceptual basis of privacy and the implications for the future of Australian privacy law. Melbourne University Law Review 29, 131–178 (2005)

    Google Scholar 

  43. Lyon, D.: The electronic eye: the rise of surveillance society. Polity Press, Cambridge (1994)

    Google Scholar 

  44. Lyon, D.: Everyday Surveillance: Personal data and social classifications. Information, Communication & Society 5, 242–257 (2002)

    Article  Google Scholar 

  45. Lyon, D.: Surveillance in cyberspace: the Internet, personal data, and social control. Queen’s Quarterly, pp. 345–357 (2002)

    Google Scholar 

  46. Lyotard, J.-F.: The postmodern condition: a report on knowledge. Manchester University Press, Manchester (1984)

    Google Scholar 

  47. Lyotard J.-F., and Lyotard J.-F.: The postmodern condition : a report on knowledge. Manchester University Press, Manchester (1984)

    Google Scholar 

  48. Mackay, H., Gillespie, G.: Extending the Social Shaping of Technology Approach: Ideology and Appropriation. Social Studies of Science 22, 685–716 (1992)

    Article  Google Scholar 

  49. Marx, G.: The Case of the Omniscient Organization. Harvard Business Review 90, 12–30 (1990)

    Google Scholar 

  50. Marx, G.T.: What’s new about the “New Surveillance"? Classifying for change and continuity. Surveillance and Society 1, 9–29 (2002)

    Google Scholar 

  51. McCullagh, D.: AOL’s disturbing glimpse into users’ lives. In: CNET News (2006)

    Google Scholar 

  52. Merleau-Ponty, M.: Phenomenology of perception. Humanities Press, New York (1962)

    Google Scholar 

  53. Merton, R.K.: Social theory and social structure. Free Press, New York (1968)

    Google Scholar 

  54. Miller, P., Rose, N.: Governing the present: Administering economic, personal and social life. Polity, Cambridge (2008)

    Google Scholar 

  55. Montreal P. M.: ’Mashup’ websites are a dream come true for hackers: privacy and security go out the window when websites are merged to make them more useful. In: New Scientist. pp. 28-30 (2006)

    Google Scholar 

  56. Mount, F.: Living with monsters. London Review of Books 32, 24–26 (2010)

    Google Scholar 

  57. Nardi, B.A., O’Day, V.: Information ecologies: using technology with heart. MIT Press, Cambridge (1999)

    Google Scholar 

  58. Nissenbaum, H.: How Computer Systems Embody Values. Computer, 118–119 (2001)

    Google Scholar 

  59. Nissenbaum, H.: Protecting Privacy in an Information Age: The Problem of Privacy in Public. Law and Philosophy 17, 559–596 (1998)

    Google Scholar 

  60. Norman, D.A.: The design of everyday things / Donald A. Norman Doubleday, New Yoir (1988)

    Google Scholar 

  61. O’Harrow, R.: No place to hide: The terrifying truth about the people who are watching our every move. Penguin Books, London (2006)

    Google Scholar 

  62. Olken, F., Gruenwald, L.: Data Stream Management: Aggregation, Classification, Modeling, and Operator Placement. IEEE Internet Computing 12, 9–12 (2008)

    Article  Google Scholar 

  63. Parenti, C.: The soft cage: Surveillance in America from slavery to the war on terror. Basic Books, New York (2003)

    Google Scholar 

  64. Porter, M.E.: Strategy and the Internet. Harvard Business Review, 63–78 (2001)

    Google Scholar 

  65. Poster, M.: The mode of information: poststructuralism and social context. Polity Press in association with Basil Blackwell, Cambridge (1990)

    Google Scholar 

  66. Rheingold, H.: The virtual community: homesteading on the electronic frontier. Addison-Wesley Pub. Co., Reading (1993)

    Google Scholar 

  67. Romanyshyn, R.D.: Technology as symptom and dream. Routledge, London (1989)

    Google Scholar 

  68. Scarantinoyz, A.: Affordances Explained. Philosophy of Science 70, 949–961 (2003)

    Article  Google Scholar 

  69. Sennett, R.: The corrosion of character: the personal consequences of work in the new capitalism. Norton, New York (1998)

    Google Scholar 

  70. Shah, R.C., Kesan, J.P.: Recipes for cookies: how institutions shape communication technologies. New Media & Society 11, 315–336 (2009)

    Article  Google Scholar 

  71. Steeves, V.: If the Supreme Court were on facebook: evaluating the reasonable expectation of privacy test from a social perspective. Canadian Journal of Criminology and Criminal Justice 50, 331–347 (2008)

    Google Scholar 

  72. Webster, F., Robins, K.: I’ll be watching you: Comment on Sewell and Wilkinson. Sociology 27, 243–252 (1993)

    Article  Google Scholar 

  73. Wen, H.J., Gershuny, P.: Computer-based monitoring in the American workplace: Surveillance technologies and legal challenges. Human Systems Management 24, 165–173 (2005)

    Google Scholar 

  74. Winner, L.: Do artifacts have politics? Daedalus 109 (1980)

    Google Scholar 

  75. Winograd, T.: Bringing design to software. ACM Press, New York (1996)

    Google Scholar 

  76. Zuboff, S.: In the age of the smart machine: the future of work and power. Basic Books, New York (1988)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Coulthard, D., Keller, S. (2011). ICT and Dataveillance. In: Bessis, N., Xhafa, F. (eds) Next Generation Data Technologies for Collective Computational Intelligence. Studies in Computational Intelligence, vol 352. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20344-2_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20344-2_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20343-5

  • Online ISBN: 978-3-642-20344-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics