Knowledge, Technology & Policy

, Volume 17, Issue 1, pp 18–37 | Cite as

What’s new about the “new surveillance”?: Classifying for change and continuity

  • Gary T. Marx


Personal Information Surveillance Technology Phone Communication Police Surveillance Traditional Surveillance 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Allen, A. (1988). Uneasy Access: Privacy for Women in a Free Society. Totowa, NJ: Rowman and Littlefield.Google Scholar
  2. Beniger, J. (1986). The Control Revolution: The Technological and Economic Origins of the Information Society. Cambridge, MA: Harvard University Press.Google Scholar
  3. Bogard, B. (1996). The Simulation of Surveillance: Hyper Control in Telematic Societies. New York: Cambridge University Press.Google Scholar
  4. Brin, D. (1998). The Transparent Society. Reading, MA: Perseus Books.Google Scholar
  5. Byrne, J., et al. (1992). Smart Sentencing: The Rise of Intermediate Sanctions. Beverly Hills: Sage.Google Scholar
  6. Caplan, J. and Torpey, J. (2001). Documenting Individual Identity. Princeton, NJ: Princeton University Press.Google Scholar
  7. Cole, S. (2001). Suspect Identities. Cambridge, MA: Harvard University Press.Google Scholar
  8. Deflem, M. (2000). “Bureaucratization and Social Control: Historical Foundations of International Police Cooperation,” in Law and Society Review, 34(3): 601–640.CrossRefGoogle Scholar
  9. Ericson, R. and Haggerty, K. (1997). Policing the Risk Society. Toronto: University of Toronto Press.Google Scholar
  10. Etzioni, A. (1999). The Limits of Privacy. New York: Basic Books.Google Scholar
  11. Fijnaut C. and Marx, G. (1995). “The Normalization of Undercover Policing in the West: Historical and Contemporary Perspectives,” in Fijnaut and Marx (eds.) Undercover Police Surveillance in Comparative Perspective. The Hague: Kluwer Law International.Google Scholar
  12. Fogelson, R. (1977). Big-City Police. Cambridge, MA: Harvard University Press.Google Scholar
  13. Foucault, M. (1977). Discipline and Punish: The Birth of the Prison. New York: Pantheon.Google Scholar
  14. Froomkin, M. (2000). “The Death of Privacy?,” in Stanford Law Review, 52(5).Google Scholar
  15. Gabriel Y., (2004). “The Glass Cage: Flexible Work, Fragmented Consumption, Fragile Selves,” in J. Alexander, G. Marx, and C. Williams (eds.), Self, Social Structure, and Beliefs: Essays in Honor of Neil Smelser, University California Press, forthcoming.Google Scholar
  16. Gandy, O. (1993). The Panoptic Sort: A Political Economy of Personal Information. Boulder, CO: Westview.Google Scholar
  17. Garfinkel, S. (2000). Database Nation. Sebastopol, CA: O’Reilly.Google Scholar
  18. Gillom, J. (1994). Surveillance, Privacy, and the Law: Employee Drug Testing and the Politics of Social Control. Ann Arbor: University of Michigan Press.Google Scholar
  19. Gillom, J. (2001). Overseers of the Poor. Chicago: Univ. of Chicago Press.Google Scholar
  20. Laudon, K. (1986). The Dossier Society. New York: Columbia University Press.Google Scholar
  21. Lyon, D. (1994). The Electronic Eye. Cambridge: The Polity Press.Google Scholar
  22. Lyon, D. (2001). Surveillance Society: Monitoring Everyday Life. Buckingham: Open University Press.Google Scholar
  23. Marx, G.T. (1988). Undercover: Police Surveillance in America. Berkeley: University of California Press.Google Scholar
  24. Marx, G.T. (1997). “The Declining Significance of Traditional Borders (and the Appearance of New Borders) in an Age of High Technology,” in P. Droege (ed.) Intelligent Environments. Amsterdam: Elsevier.Google Scholar
  25. Marx, G.T. (1998). “An Ethics for the New Surveillance” in The Information Society, 14(3): 171–185.CrossRefGoogle Scholar
  26. Marx, G.T. (2001). “Murky Conceptual Waters: The Public and the Private,” in Ethics and Information Technology, 3(3): 157–169.CrossRefGoogle Scholar
  27. Marx, G.T. (2003). “A Tack in the Shoe: Neutralizing and Resisting the New Surveillance,” in Journal of Social Issues. (Special issues on technology and privacy), 59(2): 369–390.CrossRefGoogle Scholar
  28. Marx, G.T. and Reichman, N. (1984). “Routinizing the Discovery of Secrets: Computers as Informants,” in American Behavioral Scientist, 27(4).Google Scholar
  29. Nelkin, D. and Tancredi, L. (1994). Dangerous Diagnostics: The Social Power of Biological Information. Chicago: University of Chicago Press.Google Scholar
  30. Nippert-Eng, C. (1997). Home and Work: Negotiating Boundaries Through Everyday Life. Chicago: University of Chicago Press.Google Scholar
  31. Nisbet, R. (1977). Twilight of Authority. New York: Random House.Google Scholar
  32. Regan, P. (1995). Legislating Privacy: Technology, Social Values, and Public Policy. Chapel Hill: University of North Carolina.Google Scholar
  33. Rosen, J. (2000). The Unwanted Gaze. New York: Random House.Google Scholar
  34. Shils, E. (1975). Center and Periphery: Essays in Macro Sociology. Chicago: University of Chicago Press.Google Scholar
  35. Silver, A. (1969). “The Demand for Order in Civil Society: A Review of Some Themes in the History of Urban Crime, Police, and Riots,” in D. Bordua (ed.) The Police. New York: Wiley.Google Scholar
  36. Smelser, N. (1959). Social Change in the Industrial Revolution. Chicago: University of Chicago Press.Google Scholar
  37. Smelser, N. (1997). The Problematics of Sociology: The Georg Simmel Lectures. Berkeley: University of California Press.Google Scholar
  38. Smith, H. J. (1994). Managing Privacy: Information, Technology, and the Corporation. Chapel Hill: University of North Carolina Press.Google Scholar
  39. Smith, R.E. (2000). “Ben Franklin’s Web Site.” Providence, RI: Privacy Journal.Google Scholar
  40. Staples, W. (1997). The Culture of Surveillance. New York: St. Martin’s Press.Google Scholar

Copyright information

© Transaction Publishers 2004

Authors and Affiliations

  • Gary T. Marx

There are no affiliations available

Personalised recommendations