Abstract
Our presence on digital platforms generates digital footprint, and our electronic communication is subject to constant surveillance. For example, our phone conversation, web surfing, e-mail, web preferences and habits, credit/debit card information, bank, and insurance records are under surveillance (Baran, 2015). Such pervasive practices made American citizens concerned about the protection of their personal information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Acxiom Annual Report. (2014). Retrieved from http://files.shareholder.com/downloads/ACXM/0x0x763250/A1DBFBD8-E136-4701-B0F2-3DC695E5ED08/acxiom2014_Annual_Report_FINAL_RRD_PDF_.pdf
Albrechtslund, A. (2008). Online social networking as participatory surveillance. First Monday, 13(3).
Allmer, T. (2012). Critical internet surveillance studies and economic surveillance. In C. Fuchs, K. Boersma, A. Albrechtslund, & M. Sandoval (Eds.), Internet and surveillance: The challenges of Web 2.0 and social media (pp. 124–146). New York, NY: Routledge.
Andrejevic, M. (2007). Surveillance in the digital enclosure. The Communication Review, 10(4), 295–317.
Andrejevic, M. (2012). Exploitation in data mine. In C. Fuchs, K. Boersma, A. Albrechtslund, & M. Sandoval (Eds.), Internet and surveillance: The challenges of Web 2.0 and social media (pp. 71–88). New York, NY: Routledge.
Andrejevic, M., & Gates, K. (2014). Big data surveillance: Introduction. Surveillance & Society, 12(2), 185–196.
Baran, S. J. (2015). Introduction to mass communication: Media literacy and culture. New York, NY: McGraw Hill.
Bekkers, V., Edwards, A., & de Kool, D. (2013). Social media monitoring: Responsive governance in the shadow of surveillance? Government Information Quarterly, 30(4), 335–342.
Bennett, W. L., & Segerberg, A. (2013). The logic of connective action: Digital media and the personalization of contentious politics. Cambridge: Cambridge University Press.
Bimber, B., Flanagin, A. J., & Stohl, C. (2005). Reconceptualizing collective action in the contemporary media environment. Communication Theory, 15(4), 365–388.
Bimber, B., Flanagin, A., & Stohl, C. (2012). Collective action in organizations: Interaction and engagement in an era of technological change. Cambridge: Cambridge University Press.
Bogard, W. (2006). Surveillance assemblage and lines of flight. In D. Lyon (Ed.), Theorizing surveillance (pp. 97–122). Portland: Willan.
Castells, M. (2001). The Internet galaxy: Reflections on the Internet, business, and society. Oxford: Oxford University Press.
Castells, M. (2015). The Egyptian revolution. In J. Goodwin & J. M. Jasper (Eds.), The social movement reader (pp. 45–52). Oxford: UK.
Clarke, R. (1988). Information technology and dataveillance. Communications of the ACM, 31(5), 498–512.
Cohen, N. S. (2008). The valorization of surveillance: Towards a political economy of Facebook. Democratic Communique, 22(1), 5–22.
Deleuze, G., & Guattari, F. (1987). A thousand plateaus: Capitalism and schizophrenia (Vol. 2). Minneapolis, MN: University of Minnesota Press.
Electronic Frontier Foundation. (2015). Elusive FinFisher spyware identified and analyzed. Retrieved from https://www.eff.org/deeplinks/2012/07/elusive-finfisher-spyware-identified-and-analyzed
Elmer, G. (1997). Spaces of surveillance: Indexicality and solicitation on the internet. Critical Studies in Media Communication, 14(2), 182–191.
Farinosi, M. (2011). Deconstructing Bentham’s Panopticon: The new metaphors of surveillance in the Web 2.0 environment. tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society, 9(1), 62–76.
Foucault, M. (1995). Discipline and punish: The birth of the prison. New York, NY: Vintage.
Foucault, M. (1995). The history of sexuality (Vol. 1). New York, NY: Vintage.
Foucault, M. (2007). Security, territory, population. New York, NY: Palgrave Macmillan.
Foucault, M. (2008). The birth of biopolitics. New York, NY: Palgrave Macmillan.
Fuchs, C. (2012). Critique of the political economy of Web 2.0 surveillance. In C. Fuchs, K. Boersma, A. Albrechtslund, & M. Sandoval (Eds.), Internet and surveillance: The challenges of Web 2.0 and social media (pp. 31–70). New York, NY: Routledge.
Fuchs, C., Trottier, D. (2015). Towards a theoretical model of social media surveillance in contemporary society, Communications, 40(1), 113–135.
Gandy, O. H. (1993). The panoptic sort: A political economy of personal information. Boulder, CO: Westview.
Garfinkel, S. (2000). Database nation: The death of privacy in the 21st century. New ork, NY: O’Reilly Media, Inc.
Garrett, R. K. (2006). Protest in an information society: A review of literature on social movements and new ICTs. Information, Communication & Society, 9(2), 202–224.
Gerbaudo, P. (2012). Tweets and the streets: Social media and contemporary activism. London: Pluto Press.
Giddens, A. (1990). The consequences of modernity. Cambridge: Polity.
Gordon, D. (1987). The electronic panopticon. Politics and Society, 15(4), 483–511.
Haggerty, K. D., & Ericson, R. V. (2000). The surveillant assemblage. The British Journal of Sociology, 51(4), 605–622.
Hepp, A., Hjarvard, S., & Lundby, K. (2015). Mediatization: Theorizing the interplay between media, culture and society. Media, Culture & Society, 37(2) 314–324.
Hill, D. W. (2012). Jean-François Lyotard and the inhumanity of internet surveillance. In C. Fuchs, K. Boersma, A. Albrechtslund, & M. Sandoval (Eds.), Internet and surveillance: The challenges of Web 2.0 and social media (pp. 106–123). New York, NY: Routledge.
Howard, P. N., & Hussain, M. M. (2013). Democracy’s fourth wave?: Digital media and the Arab Spring. Oxford: Oxford University Press on Demand.
Hypponet. (2013). Mikko Hypponen: How the NSA betrayed the world’s trust-time to act. Retrieved from https://www.youtube.com/watch?v=9CqVYUOjHLw
Jansson, A. (2013). Mediatization and social space: Reconstructing mediatization for the transmedia age. Communication Theory, 23(3), 279–296.
Koopman, M. (2014). Michel Foucault’s critical empiricism today: Concepts and analytics in the critique of biopower and infopower. In J. Faubion (Ed.), Foucault now: current perspectives in Foucault studies (pp. 88–111). Cambridge: Polity Press.
Koskela, H. (2002). Webcams, TV shows and mobile phones: Empowering exhibitionism. Surveillance & Society, 2(2/3), 199–215.
La Boétie, E. (1997). The politics of obedience: The discourse of voluntary servitude. Montréal: Black Rose Books.
Lyon, D. (1994). The electronic eye: The rise of surveillance society. Cambridge: Polity.
Lyon, D. (2003). Surveillance as social sorting: computer codes and mobile bodies. In D. Lyon (Ed.), Surveillance as social sorting (pp. 13–30). New York, NY: Routledge.
Lyon, D. (2015). Surveillance after Snowden. Cambridge: Polity Press.
Marx, G. T. (2002). What’s new about the “new surveillance”? Classifying for change and continuity. Surveillance & Society, 1(1), 9–29.
Mattoni, A., & Treré, E. (2014). Media practices, mediation processes, and mediatization in the study of social movements. Communication Theory, 24(3), 252–271.
Nissenbaum, H. (2009). Privacy in context: Technology, policy, and the integrity of social life. Stanford, CA: Stanford University Press.
Pew Research Center. (2015). Americans’ attitudes about privacy, security and surveillance. Retrieved from http://www.pewinternet.org/2015/05/20/americans-attitudes-about-privacy-security-andsurveillance/
Poster, M. (1990). The mode of information. Cambridge: Polity.
Qiang, X. (2011). The battle for the Chinese Internet. Journal of Democracy, 22(2), 47–61.
Reporters Without Borders. (2012). The enemies of internet. Retrieved from http://surveillance.rsf.org/en/category/state-enemies/
Reporters Without Borders. (2013). The enemies of internet. Retrieved from https://www.reporter-ohnegrenzen.de/fileadmin/docs/enemies_of_the_internet_2013_01.pdf
Reporters Without Borders. (2014). The enemies of internet. Retrieved from http://12mars.rsf.org/wp-content/uploads/EN_RAPPORT_INTERNET_BD.pdf
Romele, A., Emmenegger, C., Gallino, F., & Gorgone, D. (2015, July). Technologies of Voluntary
Servitude (TovS): A post-Foucauldian perspective on social media. In Proceedings of the 2nd European Conference on Social Media 2015: ECSM 2015 (p. 377–381). Academic Conferences Limited.
Soghoian, C. (2012). Why Google won’t protect you from big brother. Retrieved from https://www.youtube.com/watch?v=esA9RFO1Pcw
Tufekci, Z. (2013). “Not This One”: Social movements, the attention economy, and microcelebrity networked activism. American Behavioral Scientist, 57(7), 848–870.
Tufekci, Z. (2014). Social movements and governments in the digital age: Evaluating a complex landscape. Journal of International Affairs, 68(1), 1–18.
Turow, J. (2006). Cracking the consumer code: advertising, anxiety and surveillance in the digital age. In K. J. Hagerty & R. V. Ericson (Eds.), The new politics of surveillance and visibility (pp. 279–307). Toronto: University of Toronto Press.
Weller, T. (2012). The information state: A historical perspective on surveillance. In K. Ball, K. D. Haggerty, & D. Lyon (Eds.), Routledge handbook of surveillance studies (pp. 57–63). New York, NY: Routledge.
Youmans, W. L., & York, J. C. (2012). Social media and the activist toolkit: User agreements, corporate interests, and the information infrastructure of modern social movements. Journal of Communication, 62(2), 315–329.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Sense Publishers
About this chapter
Cite this chapter
Mazid, I. (2016). Negotiating Visibility and Surveillance. In: Lowery, C., Walker, A., Thomas, C. (eds) Un-Democratic Acts. SensePublishers, Rotterdam. https://doi.org/10.1007/978-94-6300-723-8_15
Download citation
DOI: https://doi.org/10.1007/978-94-6300-723-8_15
Publisher Name: SensePublishers, Rotterdam
Online ISBN: 978-94-6300-723-8
eBook Packages: EducationEducation (R0)