SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Downloaden Sie, um offline zu lesen
Everyday  Surveillance:  Personal  
data  and  social  classifica5ons
by	
  David	
  Lyon	
  
	
  
	
  
Yavuz	
  Paksoy	
  
Introduc5on
By	
  myriad	
  forms	
  of	
  agencies,	
  commercial	
  and	
  government	
  
organiza9ons,	
  people’s	
  everyday	
  life	
  is	
  being	
  checked,	
  watched,	
  
recorded	
  and	
  analyzed,	
  so	
  much	
  so	
  that	
  we	
  o?en	
  take	
  for	
  granted	
  the	
  
fact	
  that	
  we	
  leave	
  trails	
  and	
  traces	
  wherever	
  we	
  are	
  and	
  whatever	
  we	
  
do.	
  
Surveillance	
  contributes	
  increasingly	
  to	
  the	
  reproduc9on	
  and	
  
reinforcing	
  of	
  social	
  divisions.	
  
Introduc5on
Surveillance	
  does	
  also	
  raise	
  ques9ons	
  about	
  power,	
  ci9zenship	
  and	
  
technological	
  development,	
  and	
  about	
  informa9on	
  policy,	
  regula9on	
  
and	
  resistance.	
  
It	
  is	
  seen	
  here	
  as	
  a	
  response	
  to	
  the	
  ‘disappearing	
  body’	
  from	
  
integra9ve	
  social	
  rela9onships,	
  enabled	
  by	
  modern	
  means	
  of	
  
communica9on	
  and	
  informa9on-­‐handling.	
  
The	
  rise	
  of	
  invisible	
  informa9on	
  infrastructures	
  that	
  facilitate	
  the	
  
classifica9on	
  and	
  processing	
  of	
  personal	
  data	
  and	
  the	
  increasing	
  
porousness	
  of	
  their	
  storage	
  containers	
  generate	
  dis9nc9ve	
  ques9ons	
  
about	
  everyday	
  surveillance.	
  
Surveillance  Became  So  Central
For	
  most	
  of	
  human	
  history,	
  most	
  social	
  interac9on	
  has	
  been	
  face-­‐to-­‐
face.	
  
Today,	
  communica9on	
  that	
  do	
  not	
  involve	
  co-­‐presence	
  and	
  that	
  are	
  
stretched	
  over	
  space.	
  
It	
  is	
  a	
  key	
  feature	
  of	
  modernity	
  that	
  using	
  new	
  media	
  of	
  
communica9on	
  people	
  can	
  interact	
  and	
  even	
  remain	
  in	
  rela9onships	
  
that	
  are	
  integrated	
  with	
  others	
  despite	
  being	
  divided	
  by	
  distance.	
  
Surveillance  Became  So  Central
It	
  is	
  striking,	
  for	
  example,	
  that	
  neither	
  the	
  telephone	
  nor	
  the	
  Internet	
  
were	
  conceived	
  as	
  means	
  of	
  helping	
  ordinary	
  people	
  to	
  chat	
  with	
  each	
  
other	
  but	
  that	
  is	
  just	
  how	
  they	
  have	
  come	
  to	
  be	
  used.	
  
Author	
  suggests	
  that	
  as	
  new	
  technologies	
  enabled	
  more	
  and	
  more	
  to	
  
be	
  done	
  at	
  a	
  distance,	
  some	
  compensa9ons	
  are	
  sought	
  for	
  the	
  fading	
  
face,	
  the	
  disappearing	
  body.	
  
In	
  earlier	
  9mes,	
  suitable	
  compensa9ons	
  included	
  a	
  signature	
  or	
  a	
  seal	
  
on	
  a	
  leLer	
  to	
  authen9cate	
  its	
  personal	
  origin.	
  But	
  in	
  the	
  increasingly	
  
complex	
  social	
  seMngs	
  of	
  modernity,	
  other	
  tokens	
  of	
  trust	
  were	
  
sought.	
  
	
  
Surveillance  Became  So  Central
Documentary	
  evidence	
  were	
  required	
  for	
  administra9ve	
  and	
  
commercial	
  purposes:	
  
iden9fica9on	
  at	
  school,	
  the	
  workplace	
  or	
  to	
  police	
  
for	
  admission	
  to	
  certain	
  sites	
  
to	
  obtain	
  cash	
  from	
  a	
  bank	
  or	
  to	
  pay	
  for	
  purchases	
  
tokens	
  of	
  trust,	
  worthiness	
  and	
  authen9ca9on	
  
Today	
  our	
  wallets	
  and	
  purses	
  are	
  stuffed	
  with	
  credit	
  cards,	
  
membership	
  numbers,	
  phone	
  cards,	
  social	
  insurance	
  cards,	
  driver’s	
  
licences,	
  library	
  cards,	
  health	
  cards	
  and	
  loyalty	
  club	
  cards	
  that	
  can	
  
either	
  be	
  used	
  when	
  no	
  other	
  body	
  is	
  present	
  for	
  the	
  transac9on	
  
The	
  body	
  has	
  disappeared	
  from	
  these	
  rela9ons	
  but	
  communica9on	
  
con9nues	
  
The  view  of  the  other  way
Personal	
  data	
  may	
  be	
  released	
  –	
  wiMngly	
  or	
  unwiMngly	
  –	
  by	
  those	
  to	
  
whom	
  they	
  refer	
  and	
  communicated	
  to	
  others	
  (the	
  bank,	
  the	
  airline)	
  
who	
  have	
  some	
  interest	
  in	
  them.	
  
What	
  happens	
  to	
  those	
  data	
  as	
  they	
  are	
  processed	
  is	
  largely	
  unknown	
  
by	
  data	
  subjects,	
  although	
  some	
  of	
  it	
  may	
  be	
  guessed	
  when	
  the	
  road-­‐
toll	
  invoice,	
  personalized	
  adver9sing	
  or	
  spam	
  (electronic	
  junk	
  mail)	
  
appears	
  in	
  the	
  mailbox	
  or	
  on	
  the	
  screen.	
  
Paradox
Privacy	
  produces	
  surveillance	
  that,	
  it	
  is	
  said,	
  threatens	
  privacy.	
  
As	
  the	
  more	
  anonymous	
  arrangements	
  of	
  the	
  modern	
  ‘society	
  of	
  
strangers’	
  emerged,	
  and	
  privacy	
  was	
  more	
  valued,	
  so	
  the	
  reciprocal	
  
need	
  for	
  tokens	
  of	
  trust	
  grew	
  as	
  a	
  means	
  of	
  maintaining	
  the	
  integrity	
  of	
  
rela9ons	
  between	
  those	
  strangers.	
  
As	
  the	
  locally-­‐known,	
  embodied	
  person	
  slid	
  from	
  view	
  in	
  the	
  web	
  of	
  
social	
  rela9ons,	
  so	
  the	
  importance	
  of	
  creden9als,	
  iden9fica9on	
  and	
  
other	
  documentary	
  evidence	
  was	
  amplified.	
  
	
  
The  view  of  the  other  way
But	
  not	
  only	
  privacy.	
  As	
  surveillance	
  became	
  a	
  central,	
  cons9tu9ve	
  
component	
  of	
  modernity,	
  so	
  it	
  became	
  increasingly	
  a	
  social	
  ordering	
  
device	
  on	
  a	
  greater	
  scale.	
  
Surveillance	
  depends	
  on	
  informa9on	
  infrastructures,	
  invisible	
  
frameworks	
  that	
  order	
  the	
  data	
  according	
  to	
  certain	
  criteria,	
  purposes	
  
and	
  interests.	
  
The	
  kinds	
  of	
  interests	
  behind	
  social	
  classifica9ons	
  expanded	
  to	
  include	
  
not	
  only	
  government	
  departments	
  and	
  policing	
  or	
  security	
  services,	
  but	
  
also	
  a	
  mul9tude	
  of	
  commercial	
  organiza9ons	
  as	
  well	
  
To	
  take	
  just	
  one	
  example,	
  there	
  is	
  plenty	
  of	
  evidence	
  that	
  insurance	
  
companies	
  contribute	
  strongly	
  to	
  police	
  work	
  in	
  Canada.	
  
The  view  of  the  other  way
Informa9on	
  infrastructures	
  allow	
  for	
  plug-­‐ins	
  from	
  other	
  sorts	
  of	
  
technological	
  devices	
  
video	
  and	
  closed	
  circuit	
  television	
  (CCTV)	
  
biometrics	
  and	
  gene9c	
  surveillance	
  
Without	
  the	
  assistance	
  of	
  complex	
  and	
  sophis9cated	
  data	
  processing	
  
power,	
  these	
  new	
  technologies	
  would	
  remain	
  rela9vely	
  weak	
  as	
  means	
  
of	
  surveillance.	
  
unques9oning	
  acceptance	
  of	
  informa9on	
  and	
  communica9on	
  
technologies	
  is	
  far	
  higher	
  than	
  that	
  of	
  ethical	
  and	
  poli9cal	
  cri9que	
  and	
  
assessment	
  
The  view  of  the  other  way
Given	
  the	
  immense	
  value	
  placed	
  on	
  personal	
  data,	
  both	
  for	
  commercial	
  
exploita9on	
  and	
  for	
  risk	
  management,	
  huge	
  pressure	
  is	
  placed	
  on	
  these	
  
containers	
  to	
  yield	
  their	
  secrets	
  in	
  shareable	
  ways.	
  
Government	
  departments	
  seek	
  ways	
  of	
  assis9ng	
  each	
  other	
  in	
  
obtaining	
  compliance,	
  but	
  commercial	
  organiza9ons	
  also	
  exchange	
  and	
  
trade	
  categorized	
  personal	
  data	
  in	
  an	
  effort	
  to	
  market	
  their	
  wares	
  
more	
  effec9vely.	
  
But	
  personal	
  data	
  on	
  airline	
  passengers	
  may	
  also	
  be	
  exchanged	
  for	
  
security	
  purposes,	
  par9cularly	
  a?er	
  the	
  terrorist	
  aLacks	
  of	
  11	
  	
  
September	
  2001	
  
The  view  of  the  other  way
In	
  2000	
  a	
  defunct	
  company	
  called	
  ToySmart.com	
  tried	
  to	
  sell	
  its	
  
personal	
  data	
  they	
  were	
  challenged,	
  and	
  obliged	
  to	
  sell	
  only	
  the	
  en9re	
  
website,	
  and	
  only	
  to	
  a	
  related	
  company.	
  
Surveillance  Society
Dominant	
  groups	
  determine	
  how	
  and	
  in	
  what	
  interests	
  the	
  material	
  
infrastructure	
  operates	
  
‘CCTV	
  has	
  been	
  implemented	
  not	
  as	
  one	
  pervasive	
  system	
  but	
  as	
  a	
  
series	
  of	
  discrete,	
  localized	
  systems	
  run	
  by	
  a	
  myriad	
  of	
  different	
  
organiza9ons	
  rather	
  than	
  a	
  single	
  state	
  monolith’	
  
“It	
  is	
  augmented	
  not	
  only	
  within	
  hierarchical	
  organiza9ons	
  of	
  the	
  sort	
  
that	
  depict	
  Big	
  Brother	
  overseeing	
  all	
  from	
  the	
  apex	
  or	
  the	
  panop9con	
  
inspector	
  gazing	
  out	
  from	
  the	
  tower,	
  but	
  also,	
  more	
  frequently,	
  within	
  
networks	
  that	
  spread	
  horizontally,	
  reaching	
  out	
  here,	
  contrac9ng	
  
there,	
  but	
  always	
  finding	
  more	
  ways	
  of	
  seeking	
  and	
  processing	
  
personal	
  data	
  with	
  a	
  view	
  to	
  management	
  and	
  influence”	
  
	
  
Surveillance  Society
Only	
  personal	
  fears	
  about	
  privacy	
  distracts	
  us	
  from	
  the	
  public	
  issues	
  
surrounding	
  surveillance	
  
Through	
  social	
  conven9on	
  and	
  custom	
  people	
  accept	
  their	
  place	
  within	
  
the	
  hierarchy	
  or	
  learn	
  to	
  see	
  themselves	
  in	
  rela9on	
  to	
  the	
  status	
  of	
  
others.	
  
Surveillance  Society
Only	
  personal	
  fears	
  about	
  privacy	
  distracts	
  us	
  from	
  the	
  public	
  issues	
  
surrounding	
  surveillance	
  
Through	
  social	
  conven9on	
  and	
  custom	
  people	
  accept	
  their	
  place	
  within	
  
the	
  hierarchy	
  or	
  learn	
  to	
  see	
  themselves	
  in	
  rela9on	
  to	
  the	
  status	
  of	
  
others.	
  
Surveillance  Society
The	
  author	
  is	
  not	
  sugges9ng	
  that	
  classifica9on	
  and	
  surveillance	
  are	
  
socially	
  nega9ve	
  processes.	
  They	
  are	
  necessary	
  aspects	
  of	
  all	
  social	
  
situa9ons	
  and	
  serve	
  social	
  purposes,	
  from	
  the	
  vital	
  to	
  the	
  vicious.	
  The	
  
point	
  is	
  that	
  as	
  powerful	
  means	
  of	
  governance,	
  of	
  social	
  ordering,	
  they	
  
are	
  also	
  increasingly	
  invisible	
  and	
  easily	
  taken-­‐for	
  granted.	
  
Ethical	
  inspec9on	
  is	
  required.	
  
Internet	
  users	
  claim	
  to	
  care	
  about	
  online	
  privacy,	
  it	
  turns	
  out,	
  
paradoxically,	
  that	
  the	
  very	
  same	
  persons	
  key-­‐in	
  PINs	
  and	
  credit	
  card	
  
numbers	
  online!	
  
Mobilizing  Responses
ALempts	
  to	
  create	
  an	
  electronic	
  ‘Australia	
  Card’	
  for	
  all	
  ci9zens	
  in	
  the	
  
mid-­‐1980s	
  spawned	
  a	
  social	
  movement	
  that	
  successfully	
  turned	
  down	
  
the	
  proposal,	
  as	
  did	
  similar,	
  later	
  aLempts	
  in	
  South	
  Korea.	
  
The	
  use	
  of	
  the	
  Internet	
  to	
  mobilize	
  resistance	
  is	
  an	
  important	
  part	
  of	
  
the	
  process.	
  
Physical	
  barriers	
  and	
  constraint	
  within	
  places	
  maLer	
  less	
  today	
  
Genuine	
  benefits	
  gleaned	
  from	
  having	
  surveillance	
  systems	
  in	
  place	
  
tend	
  to	
  deflect	
  aLen9on	
  away	
  from	
  the	
  inequi9es	
  associated	
  with	
  
many	
  discriminatory	
  dimensions	
  of	
  surveillance	
  
Mobilizing  Responses
The	
  law,	
  at	
  best,	
  can	
  only	
  help	
  to	
  create	
  a	
  culture	
  of	
  carefulness	
  about	
  
the	
  processing	
  of	
  personal	
  data,	
  it	
  cannot	
  possibly	
  speak	
  to	
  all	
  issues,	
  
let	
  alone	
  keep	
  up	
  with	
  each	
  development	
  in	
  data	
  mining,	
  pro.	
  ling,	
  
database	
  targe9ng	
  and	
  marke9ng,	
  loca9onal	
  tracking	
  of	
  vehicles	
  or	
  
cellphones,	
  and	
  so	
  on.	
  
Focused	
  ethical	
  aLen9on,	
  along	
  with	
  serious	
  proposals	
  for	
  democra9c	
  
accountability,	
  and	
  educa9onal	
  and	
  awareness-­‐raising	
  ini9a9ves,	
  are	
  
needed	
  if	
  everyday	
  surveillance	
  is	
  properly	
  to	
  be	
  understood,	
  and	
  
when	
  necessary,	
  confronted	
  and	
  challenged.	
  
Discussion  Points
1.  How	
  could	
  it	
  be	
  possible	
  for	
  people	
  both	
  making	
  use	
  of	
  surveillance	
  
systems	
  and	
  protect	
  their	
  privacy?	
  Is	
  it	
  possible?	
  
2.  How	
  should	
  mobilizing	
  responses	
  be	
  formed	
  against	
  surveillance	
  
power	
  of	
  (especially	
  commercial)	
  organiza9ons?	
  

Weitere ähnliche Inhalte

Was ist angesagt?

2014 IE Application- Social Interaction SJW
2014 IE Application- Social Interaction SJW2014 IE Application- Social Interaction SJW
2014 IE Application- Social Interaction SJWSeebas85
 
The Digital Freedom Pass: Emancipation from Digital Slavery. Dennis J. Snower
The Digital Freedom Pass: Emancipation from Digital Slavery.  Dennis J. SnowerThe Digital Freedom Pass: Emancipation from Digital Slavery.  Dennis J. Snower
The Digital Freedom Pass: Emancipation from Digital Slavery. Dennis J. Snowereraser Juan José Calderón
 
Social Media, an overview
Social Media, an overviewSocial Media, an overview
Social Media, an overviewRick Mans
 
The ramifications of digital divide
The ramifications of digital divideThe ramifications of digital divide
The ramifications of digital divideChiara-Jaye Franco
 
Who's Who in Internet Politics
Who's Who in Internet PoliticsWho's Who in Internet Politics
Who's Who in Internet Politicsaugustodefranco .
 
2007 presentation to the exec board of a high street bank - the workplace of...
2007 presentation to the exec board of a high street bank -  the workplace of...2007 presentation to the exec board of a high street bank -  the workplace of...
2007 presentation to the exec board of a high street bank - the workplace of...Jerry Fishenden
 
G0321 lecture 4 the digital age and social media
G0321 lecture 4 the digital age and social mediaG0321 lecture 4 the digital age and social media
G0321 lecture 4 the digital age and social mediaKelvin Ooi
 
Beyond the Internet: Seamless Global Communication
Beyond the Internet: Seamless Global CommunicationBeyond the Internet: Seamless Global Communication
Beyond the Internet: Seamless Global CommunicationJerry Fishenden
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipr_bushlow
 
The Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy InvasionThe Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy Invasioniosrjce
 
Information governance in the Facebook Era
Information governance in the Facebook EraInformation governance in the Facebook Era
Information governance in the Facebook EraJohn Mancini
 
Digital exclusion: coming out from behind closed doors
Digital exclusion: coming out from behind closed doorsDigital exclusion: coming out from behind closed doors
Digital exclusion: coming out from behind closed doorsSue Watling
 
Collaborative Knowledge Networks Market Assessment
Collaborative Knowledge Networks  Market AssessmentCollaborative Knowledge Networks  Market Assessment
Collaborative Knowledge Networks Market AssessmentDon_Johnson
 
The Next IT: A Preview of Tomorrows Innovations and Challenges
The Next IT: A Preview of Tomorrows Innovations and ChallengesThe Next IT: A Preview of Tomorrows Innovations and Challenges
The Next IT: A Preview of Tomorrows Innovations and Challengesnbelarbi
 
Digital Responsibility: towards a new world order ?
Digital Responsibility: towards a new world order ?Digital Responsibility: towards a new world order ?
Digital Responsibility: towards a new world order ?University of Geneva
 
What Should The Public Sector Demand Jerry Fishenden 15.05.2009
What Should The Public Sector Demand   Jerry Fishenden 15.05.2009What Should The Public Sector Demand   Jerry Fishenden 15.05.2009
What Should The Public Sector Demand Jerry Fishenden 15.05.2009Jerry Fishenden
 
The Social Network of Things
The Social Network of ThingsThe Social Network of Things
The Social Network of ThingsSrinivas Koushik
 
Innovating through public sector information
Innovating through public sector informationInnovating through public sector information
Innovating through public sector informationJerry Fishenden
 

Was ist angesagt? (20)

2014 IE Application- Social Interaction SJW
2014 IE Application- Social Interaction SJW2014 IE Application- Social Interaction SJW
2014 IE Application- Social Interaction SJW
 
The Digital Freedom Pass: Emancipation from Digital Slavery. Dennis J. Snower
The Digital Freedom Pass: Emancipation from Digital Slavery.  Dennis J. SnowerThe Digital Freedom Pass: Emancipation from Digital Slavery.  Dennis J. Snower
The Digital Freedom Pass: Emancipation from Digital Slavery. Dennis J. Snower
 
Social Media, an overview
Social Media, an overviewSocial Media, an overview
Social Media, an overview
 
Digital poverty roxana barrantes
Digital poverty roxana barrantesDigital poverty roxana barrantes
Digital poverty roxana barrantes
 
The ramifications of digital divide
The ramifications of digital divideThe ramifications of digital divide
The ramifications of digital divide
 
Who's Who in Internet Politics
Who's Who in Internet PoliticsWho's Who in Internet Politics
Who's Who in Internet Politics
 
2007 presentation to the exec board of a high street bank - the workplace of...
2007 presentation to the exec board of a high street bank -  the workplace of...2007 presentation to the exec board of a high street bank -  the workplace of...
2007 presentation to the exec board of a high street bank - the workplace of...
 
G0321 lecture 4 the digital age and social media
G0321 lecture 4 the digital age and social mediaG0321 lecture 4 the digital age and social media
G0321 lecture 4 the digital age and social media
 
The Impact of the Internet on Institutions in the Future
The Impact of the Internet on Institutions in the FutureThe Impact of the Internet on Institutions in the Future
The Impact of the Internet on Institutions in the Future
 
Beyond the Internet: Seamless Global Communication
Beyond the Internet: Seamless Global CommunicationBeyond the Internet: Seamless Global Communication
Beyond the Internet: Seamless Global Communication
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
The Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy InvasionThe Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy Invasion
 
Information governance in the Facebook Era
Information governance in the Facebook EraInformation governance in the Facebook Era
Information governance in the Facebook Era
 
Digital exclusion: coming out from behind closed doors
Digital exclusion: coming out from behind closed doorsDigital exclusion: coming out from behind closed doors
Digital exclusion: coming out from behind closed doors
 
Collaborative Knowledge Networks Market Assessment
Collaborative Knowledge Networks  Market AssessmentCollaborative Knowledge Networks  Market Assessment
Collaborative Knowledge Networks Market Assessment
 
The Next IT: A Preview of Tomorrows Innovations and Challenges
The Next IT: A Preview of Tomorrows Innovations and ChallengesThe Next IT: A Preview of Tomorrows Innovations and Challenges
The Next IT: A Preview of Tomorrows Innovations and Challenges
 
Digital Responsibility: towards a new world order ?
Digital Responsibility: towards a new world order ?Digital Responsibility: towards a new world order ?
Digital Responsibility: towards a new world order ?
 
What Should The Public Sector Demand Jerry Fishenden 15.05.2009
What Should The Public Sector Demand   Jerry Fishenden 15.05.2009What Should The Public Sector Demand   Jerry Fishenden 15.05.2009
What Should The Public Sector Demand Jerry Fishenden 15.05.2009
 
The Social Network of Things
The Social Network of ThingsThe Social Network of Things
The Social Network of Things
 
Innovating through public sector information
Innovating through public sector informationInnovating through public sector information
Innovating through public sector information
 

Ähnlich wie Everyday surveillance

Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxwebb00704
 
Letter of Intent - Open Society Fellowship
Letter of Intent - Open Society FellowshipLetter of Intent - Open Society Fellowship
Letter of Intent - Open Society FellowshipSloane Joie Trugman
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...Patrick McCormick
 
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...Timothy Holborn
 
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture Agenda
 
David shrier, weige wu, alex pentland mit blockchain
David shrier, weige wu, alex pentland mit blockchainDavid shrier, weige wu, alex pentland mit blockchain
David shrier, weige wu, alex pentland mit blockchainIT Strategy Group
 
Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future Agenda
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadwaiforchi Wagiteerhh
 
https://seranking.com/?ga=2626307&source=link
https://seranking.com/?ga=2626307&source=linkhttps://seranking.com/?ga=2626307&source=link
https://seranking.com/?ga=2626307&source=linkrazaqueali320
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Dave Holland
 
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)Tech and Law Center
 
IRJET- Identity & Relationship Resolution Approach Supported with Sample ...
IRJET-  	  Identity & Relationship Resolution Approach Supported with Sample ...IRJET-  	  Identity & Relationship Resolution Approach Supported with Sample ...
IRJET- Identity & Relationship Resolution Approach Supported with Sample ...IRJET Journal
 
Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01Harsh Tripathi
 

Ähnlich wie Everyday surveillance (20)

Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
 
Letter of Intent - Open Society Fellowship
Letter of Intent - Open Society FellowshipLetter of Intent - Open Society Fellowship
Letter of Intent - Open Society Fellowship
 
E017242431
E017242431E017242431
E017242431
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
 
LIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
LIBRA: IS IT REALLY ABOUT MONEY? Valerie KhanLIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
LIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
 
0001 IoV Presentation
0001 IoV Presentation0001 IoV Presentation
0001 IoV Presentation
 
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
 
David shrier, weige wu, alex pentland mit blockchain
David shrier, weige wu, alex pentland mit blockchainDavid shrier, weige wu, alex pentland mit blockchain
David shrier, weige wu, alex pentland mit blockchain
 
Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
https://seranking.com/?ga=2626307&source=link
https://seranking.com/?ga=2626307&source=linkhttps://seranking.com/?ga=2626307&source=link
https://seranking.com/?ga=2626307&source=link
 
sun editorial
sun editorialsun editorial
sun editorial
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...
 
9th
9th9th
9th
 
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
 
IRJET- Identity & Relationship Resolution Approach Supported with Sample ...
IRJET-  	  Identity & Relationship Resolution Approach Supported with Sample ...IRJET-  	  Identity & Relationship Resolution Approach Supported with Sample ...
IRJET- Identity & Relationship Resolution Approach Supported with Sample ...
 
CBSE Open Textbook English
CBSE Open Textbook EnglishCBSE Open Textbook English
CBSE Open Textbook English
 
Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01
 

Mehr von Yavuz Paksoy

Workshop presentation
Workshop presentationWorkshop presentation
Workshop presentationYavuz Paksoy
 
Deniz_E Lefebvre’s dialectics of edl by Highmore
Deniz_E Lefebvre’s dialectics of edl by HighmoreDeniz_E Lefebvre’s dialectics of edl by Highmore
Deniz_E Lefebvre’s dialectics of edl by HighmoreYavuz Paksoy
 
Deniz_E Plan of the present work by Lefebvre
Deniz_E  Plan of the present work by LefebvreDeniz_E  Plan of the present work by Lefebvre
Deniz_E Plan of the present work by LefebvreYavuz Paksoy
 
Sibel bozdogan modern living itirgungor
Sibel bozdogan modern living itirgungorSibel bozdogan modern living itirgungor
Sibel bozdogan modern living itirgungorYavuz Paksoy
 
Michel de Certeau's Poetics of Everyday Life by Ben Highmore_Guzin Sen
Michel de Certeau's Poetics of Everyday Life by Ben Highmore_Guzin SenMichel de Certeau's Poetics of Everyday Life by Ben Highmore_Guzin Sen
Michel de Certeau's Poetics of Everyday Life by Ben Highmore_Guzin SenYavuz Paksoy
 
Deniz E_Fundamentals of culture-sociology
Deniz E_Fundamentals of culture-sociologyDeniz E_Fundamentals of culture-sociology
Deniz E_Fundamentals of culture-sociologyYavuz Paksoy
 
Guzin Sen_Politics and Culture by Gramsci
Guzin Sen_Politics and Culture by GramsciGuzin Sen_Politics and Culture by Gramsci
Guzin Sen_Politics and Culture by GramsciYavuz Paksoy
 
Dilruba ogur-politicization-of-culture-susan-wright
Dilruba ogur-politicization-of-culture-susan-wrightDilruba ogur-politicization-of-culture-susan-wright
Dilruba ogur-politicization-of-culture-susan-wrightYavuz Paksoy
 
Malinowski scientific theory of culture itirgungor
Malinowski scientific theory of culture itirgungorMalinowski scientific theory of culture itirgungor
Malinowski scientific theory of culture itirgungorYavuz Paksoy
 

Mehr von Yavuz Paksoy (9)

Workshop presentation
Workshop presentationWorkshop presentation
Workshop presentation
 
Deniz_E Lefebvre’s dialectics of edl by Highmore
Deniz_E Lefebvre’s dialectics of edl by HighmoreDeniz_E Lefebvre’s dialectics of edl by Highmore
Deniz_E Lefebvre’s dialectics of edl by Highmore
 
Deniz_E Plan of the present work by Lefebvre
Deniz_E  Plan of the present work by LefebvreDeniz_E  Plan of the present work by Lefebvre
Deniz_E Plan of the present work by Lefebvre
 
Sibel bozdogan modern living itirgungor
Sibel bozdogan modern living itirgungorSibel bozdogan modern living itirgungor
Sibel bozdogan modern living itirgungor
 
Michel de Certeau's Poetics of Everyday Life by Ben Highmore_Guzin Sen
Michel de Certeau's Poetics of Everyday Life by Ben Highmore_Guzin SenMichel de Certeau's Poetics of Everyday Life by Ben Highmore_Guzin Sen
Michel de Certeau's Poetics of Everyday Life by Ben Highmore_Guzin Sen
 
Deniz E_Fundamentals of culture-sociology
Deniz E_Fundamentals of culture-sociologyDeniz E_Fundamentals of culture-sociology
Deniz E_Fundamentals of culture-sociology
 
Guzin Sen_Politics and Culture by Gramsci
Guzin Sen_Politics and Culture by GramsciGuzin Sen_Politics and Culture by Gramsci
Guzin Sen_Politics and Culture by Gramsci
 
Dilruba ogur-politicization-of-culture-susan-wright
Dilruba ogur-politicization-of-culture-susan-wrightDilruba ogur-politicization-of-culture-susan-wright
Dilruba ogur-politicization-of-culture-susan-wright
 
Malinowski scientific theory of culture itirgungor
Malinowski scientific theory of culture itirgungorMalinowski scientific theory of culture itirgungor
Malinowski scientific theory of culture itirgungor
 

Kürzlich hochgeladen

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 

Kürzlich hochgeladen (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

Everyday surveillance

  • 1. Everyday  Surveillance:  Personal   data  and  social  classifica5ons by  David  Lyon       Yavuz  Paksoy  
  • 2. Introduc5on By  myriad  forms  of  agencies,  commercial  and  government   organiza9ons,  people’s  everyday  life  is  being  checked,  watched,   recorded  and  analyzed,  so  much  so  that  we  o?en  take  for  granted  the   fact  that  we  leave  trails  and  traces  wherever  we  are  and  whatever  we   do.   Surveillance  contributes  increasingly  to  the  reproduc9on  and   reinforcing  of  social  divisions.  
  • 3. Introduc5on Surveillance  does  also  raise  ques9ons  about  power,  ci9zenship  and   technological  development,  and  about  informa9on  policy,  regula9on   and  resistance.   It  is  seen  here  as  a  response  to  the  ‘disappearing  body’  from   integra9ve  social  rela9onships,  enabled  by  modern  means  of   communica9on  and  informa9on-­‐handling.   The  rise  of  invisible  informa9on  infrastructures  that  facilitate  the   classifica9on  and  processing  of  personal  data  and  the  increasing   porousness  of  their  storage  containers  generate  dis9nc9ve  ques9ons   about  everyday  surveillance.  
  • 4. Surveillance  Became  So  Central For  most  of  human  history,  most  social  interac9on  has  been  face-­‐to-­‐ face.   Today,  communica9on  that  do  not  involve  co-­‐presence  and  that  are   stretched  over  space.   It  is  a  key  feature  of  modernity  that  using  new  media  of   communica9on  people  can  interact  and  even  remain  in  rela9onships   that  are  integrated  with  others  despite  being  divided  by  distance.  
  • 5. Surveillance  Became  So  Central It  is  striking,  for  example,  that  neither  the  telephone  nor  the  Internet   were  conceived  as  means  of  helping  ordinary  people  to  chat  with  each   other  but  that  is  just  how  they  have  come  to  be  used.   Author  suggests  that  as  new  technologies  enabled  more  and  more  to   be  done  at  a  distance,  some  compensa9ons  are  sought  for  the  fading   face,  the  disappearing  body.   In  earlier  9mes,  suitable  compensa9ons  included  a  signature  or  a  seal   on  a  leLer  to  authen9cate  its  personal  origin.  But  in  the  increasingly   complex  social  seMngs  of  modernity,  other  tokens  of  trust  were   sought.    
  • 6. Surveillance  Became  So  Central Documentary  evidence  were  required  for  administra9ve  and   commercial  purposes:   iden9fica9on  at  school,  the  workplace  or  to  police   for  admission  to  certain  sites   to  obtain  cash  from  a  bank  or  to  pay  for  purchases   tokens  of  trust,  worthiness  and  authen9ca9on   Today  our  wallets  and  purses  are  stuffed  with  credit  cards,   membership  numbers,  phone  cards,  social  insurance  cards,  driver’s   licences,  library  cards,  health  cards  and  loyalty  club  cards  that  can   either  be  used  when  no  other  body  is  present  for  the  transac9on   The  body  has  disappeared  from  these  rela9ons  but  communica9on   con9nues  
  • 7. The  view  of  the  other  way Personal  data  may  be  released  –  wiMngly  or  unwiMngly  –  by  those  to   whom  they  refer  and  communicated  to  others  (the  bank,  the  airline)   who  have  some  interest  in  them.   What  happens  to  those  data  as  they  are  processed  is  largely  unknown   by  data  subjects,  although  some  of  it  may  be  guessed  when  the  road-­‐ toll  invoice,  personalized  adver9sing  or  spam  (electronic  junk  mail)   appears  in  the  mailbox  or  on  the  screen.  
  • 8. Paradox Privacy  produces  surveillance  that,  it  is  said,  threatens  privacy.   As  the  more  anonymous  arrangements  of  the  modern  ‘society  of   strangers’  emerged,  and  privacy  was  more  valued,  so  the  reciprocal   need  for  tokens  of  trust  grew  as  a  means  of  maintaining  the  integrity  of   rela9ons  between  those  strangers.   As  the  locally-­‐known,  embodied  person  slid  from  view  in  the  web  of   social  rela9ons,  so  the  importance  of  creden9als,  iden9fica9on  and   other  documentary  evidence  was  amplified.    
  • 9. The  view  of  the  other  way But  not  only  privacy.  As  surveillance  became  a  central,  cons9tu9ve   component  of  modernity,  so  it  became  increasingly  a  social  ordering   device  on  a  greater  scale.   Surveillance  depends  on  informa9on  infrastructures,  invisible   frameworks  that  order  the  data  according  to  certain  criteria,  purposes   and  interests.   The  kinds  of  interests  behind  social  classifica9ons  expanded  to  include   not  only  government  departments  and  policing  or  security  services,  but   also  a  mul9tude  of  commercial  organiza9ons  as  well   To  take  just  one  example,  there  is  plenty  of  evidence  that  insurance   companies  contribute  strongly  to  police  work  in  Canada.  
  • 10. The  view  of  the  other  way Informa9on  infrastructures  allow  for  plug-­‐ins  from  other  sorts  of   technological  devices   video  and  closed  circuit  television  (CCTV)   biometrics  and  gene9c  surveillance   Without  the  assistance  of  complex  and  sophis9cated  data  processing   power,  these  new  technologies  would  remain  rela9vely  weak  as  means   of  surveillance.   unques9oning  acceptance  of  informa9on  and  communica9on   technologies  is  far  higher  than  that  of  ethical  and  poli9cal  cri9que  and   assessment  
  • 11. The  view  of  the  other  way Given  the  immense  value  placed  on  personal  data,  both  for  commercial   exploita9on  and  for  risk  management,  huge  pressure  is  placed  on  these   containers  to  yield  their  secrets  in  shareable  ways.   Government  departments  seek  ways  of  assis9ng  each  other  in   obtaining  compliance,  but  commercial  organiza9ons  also  exchange  and   trade  categorized  personal  data  in  an  effort  to  market  their  wares   more  effec9vely.   But  personal  data  on  airline  passengers  may  also  be  exchanged  for   security  purposes,  par9cularly  a?er  the  terrorist  aLacks  of  11     September  2001  
  • 12. The  view  of  the  other  way In  2000  a  defunct  company  called  ToySmart.com  tried  to  sell  its   personal  data  they  were  challenged,  and  obliged  to  sell  only  the  en9re   website,  and  only  to  a  related  company.  
  • 13. Surveillance  Society Dominant  groups  determine  how  and  in  what  interests  the  material   infrastructure  operates   ‘CCTV  has  been  implemented  not  as  one  pervasive  system  but  as  a   series  of  discrete,  localized  systems  run  by  a  myriad  of  different   organiza9ons  rather  than  a  single  state  monolith’   “It  is  augmented  not  only  within  hierarchical  organiza9ons  of  the  sort   that  depict  Big  Brother  overseeing  all  from  the  apex  or  the  panop9con   inspector  gazing  out  from  the  tower,  but  also,  more  frequently,  within   networks  that  spread  horizontally,  reaching  out  here,  contrac9ng   there,  but  always  finding  more  ways  of  seeking  and  processing   personal  data  with  a  view  to  management  and  influence”    
  • 14. Surveillance  Society Only  personal  fears  about  privacy  distracts  us  from  the  public  issues   surrounding  surveillance   Through  social  conven9on  and  custom  people  accept  their  place  within   the  hierarchy  or  learn  to  see  themselves  in  rela9on  to  the  status  of   others.  
  • 15. Surveillance  Society Only  personal  fears  about  privacy  distracts  us  from  the  public  issues   surrounding  surveillance   Through  social  conven9on  and  custom  people  accept  their  place  within   the  hierarchy  or  learn  to  see  themselves  in  rela9on  to  the  status  of   others.  
  • 16. Surveillance  Society The  author  is  not  sugges9ng  that  classifica9on  and  surveillance  are   socially  nega9ve  processes.  They  are  necessary  aspects  of  all  social   situa9ons  and  serve  social  purposes,  from  the  vital  to  the  vicious.  The   point  is  that  as  powerful  means  of  governance,  of  social  ordering,  they   are  also  increasingly  invisible  and  easily  taken-­‐for  granted.   Ethical  inspec9on  is  required.   Internet  users  claim  to  care  about  online  privacy,  it  turns  out,   paradoxically,  that  the  very  same  persons  key-­‐in  PINs  and  credit  card   numbers  online!  
  • 17. Mobilizing  Responses ALempts  to  create  an  electronic  ‘Australia  Card’  for  all  ci9zens  in  the   mid-­‐1980s  spawned  a  social  movement  that  successfully  turned  down   the  proposal,  as  did  similar,  later  aLempts  in  South  Korea.   The  use  of  the  Internet  to  mobilize  resistance  is  an  important  part  of   the  process.   Physical  barriers  and  constraint  within  places  maLer  less  today   Genuine  benefits  gleaned  from  having  surveillance  systems  in  place   tend  to  deflect  aLen9on  away  from  the  inequi9es  associated  with   many  discriminatory  dimensions  of  surveillance  
  • 18. Mobilizing  Responses The  law,  at  best,  can  only  help  to  create  a  culture  of  carefulness  about   the  processing  of  personal  data,  it  cannot  possibly  speak  to  all  issues,   let  alone  keep  up  with  each  development  in  data  mining,  pro.  ling,   database  targe9ng  and  marke9ng,  loca9onal  tracking  of  vehicles  or   cellphones,  and  so  on.   Focused  ethical  aLen9on,  along  with  serious  proposals  for  democra9c   accountability,  and  educa9onal  and  awareness-­‐raising  ini9a9ves,  are   needed  if  everyday  surveillance  is  properly  to  be  understood,  and   when  necessary,  confronted  and  challenged.  
  • 19. Discussion  Points 1.  How  could  it  be  possible  for  people  both  making  use  of  surveillance   systems  and  protect  their  privacy?  Is  it  possible?   2.  How  should  mobilizing  responses  be  formed  against  surveillance   power  of  (especially  commercial)  organiza9ons?