Abstract
The development of networked, mobile devices has made possible anytime, anywhere access to digital information and communication resources. At the same time, thanks to the interactive capability of these devices, pervasive monitoring goes hand-in-hand with pervasive information and computing technology (PICT). As our ability to share data goes mobile, so too does the ability to track a growing range of information about our activities, our movements, our preferences, behaviour and interests. The ability to collect and sort large amounts of data about people leads to changes in the way monitoring and surveillance works. It also marks the convergence between monitoring in contexts ranging from marketing and political campaigning to policing and security. This chapter considers some of the shifts associated with surveillance in the digitally-enhanced era of so-called “big data,” and explores some of the ethical and social concerns it raises. It argues for the importance of several types of control and accountability measures related to the collection and use of personal information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
As of this writing, the proposed Communications Data Bill in the UK was still generating controversy, although it looked likely to be passed into law. The published version of the proposed law would not only allow data to be collected, but to be mined – sifted and sorted for emerging patterns of behavior (Burton 2012).
- 2.
The jargon of “ubiquity” seems to have fallen by the wayside, and perhaps the more accurate term is “pervasive computing,” to describe the forms of anywhere, anytime access made possible by portable, networked devices. If there is a difference between the two terms, it is that ubiquitous computing envisioned a multi-chip world in which memory and interactivity were embedded in the physical infrastructure. Pervasive computing, by contrast, allows users to access remote computing resources wherever they go – and, down the road, to add an interactive overlay upon the physical world (through forms of geographic tagging) without necessarily embedding chips throughout that world (see Chap. 5 for more on PICT and geographical information and Chap. 8 for more on potential unintended consequences of pervasive augmented reality).
- 3.
References
Anderson, C. 2008. The end of theory: The data deluge makes the scientific method obsolete. Wired Magazine 16:07, 23 June: http://www.wired.com/science/discoveries/magazine/16-07/pb_theory. Accessed 12 Mar 2012.
Associated Press. 2003. Bets off on terror futures index, July 29. http://www.wired.com/news/politics/0,1283,59813,00.html. Accessed 28 Dec 2005.
Ayres, Ian. 2007. Super crunchers: How anything can be predicted. London: John Murray.
Baudrillard, J. 1994. Simulacra and simulation. Ann Arbor: University of Michigan Press.
Bilton, N. 2012. A rose-colored view may come standard. The New York Times, April 4. http://www.nytimes.com/2012/04/05/technology/google-offers-look-at-internet-connected-glasses.html. Accessed online 10 Apr 2012.
Bogard, W. 1996. The simulation of surveillance: Hypercontrol in telematic societies. Cambridge: Cambridge University Press.
Bogard, W. 2006. Welcome to the society of control. In The new politics of surveillance and visibility, ed. R. Ericson, 57–68. Toronto: University of Toronto Press.
Burton, G. 2012. Draft communications data bill “more far-reaching than first thought.” Computing.co.uk, July 20. http://www.computing.co.uk/ctg/news/2193180/draft-communications-data-bill-more-farreaching-than-first-thought.
Business Wire. 2012. Adobe digital marketing suite tackles big data with predictive marketing. Press Release, March 21.
Duhigg, C. 2012. How companies learn your secrets. The New York Times, February 16. http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html. Accessed 12 Apr 2012.
ENP Newswire (2012). Scala introduces advanced analytics. Press Release, March 7.
Gandy, G. 1993. The panoptic sort: A political economy of personal information. Boulder: Westview.
Geron, T. 2011. Kaggle’s predictive data contest aims to fix health care. Forbes, April 4. http://www.forbes.com/sites/tomiogeron/2011/04/04/kaggles-predictive-data-contest-aims-to-fix-health-care/. Accessed 12 Apr 2012.
Gladwell, M. 1996. The science of shopping. The New Yorker, November 4. http://www.gladwell.com/1996/1996_11_04_a_shopping.htm. Accessed online 12 Apr 2012.
Hamilton, B. 2011. Misfortune telling – Can the NYPD predict a crime before it happens? A tech guru thinks so. New York Post, April 17, 25.
Lyon, D. (ed.). 2002. Surveillance as social sorting: Privacy, risk and automated discrimination. New York: Routledge.
Marchant, G.E., R. Braden Allenby, and Joseph R. Herkert (eds.). 2011. The growing gap between emerging technologies and legal-ethical framework: The pacing problem. Dordrecht/New York: Springer.
Mulholland, H. and R. Booth. 2012. Plans for greater email and web monitoring powers spark privacy fears. The Guardian (London), April 2. http://www.guardian.co.uk/world/2012/apr/02/email-web-monitoring-powers-privacy. Accessed online Apr 10.
Nolan, R. 2012. Behind the cover story: How much does target know? The New York Times, February 21. http://6thfloor.blogs.nytimes.com/2012/02/21/behind-the-cover-story-how-much-does-target-know/. Accessed 12 Apr 2012.
Pariser, E. 2011. The filter bubble: What the internet is hiding from you. New York: Penguin.
Turow, Joseph. 2006. Niche envy: Marketing discrimination in the digital age. Cambridge: The MIT Press.
Wieser, M. 1991. The computer for the 21st century. Scientific American 265(3): 94–104.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media Dordrecht.
About this chapter
Cite this chapter
Andrejevic, M. (2014). Surveillance in the Big Data Era. In: Pimple, K. (eds) Emerging Pervasive Information and Communication Technologies (PICT). Law, Governance and Technology Series, vol 11. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6833-8_4
Download citation
DOI: https://doi.org/10.1007/978-94-007-6833-8_4
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-6832-1
Online ISBN: 978-94-007-6833-8
eBook Packages: Computer ScienceComputer Science (R0)