Ethics and Information Technology

, Volume 3, Issue 3, pp 195–208 | Cite as

Cookies, web bugs, webcams and cue cats: Patterns of surveillance on the world wide web

  • Colin J. Bennett


This article addresses the question of whetherpersonal surveillance on the world wide web isdifferent in nature and intensity from that inthe offline world. The article presents aprofile of the ways in which privacy problemswere framed and addressed in the 1970s and1990s. Based on an analysis of privacy newsstories from 1999–2000, it then presents atypology of the kinds of surveillance practicesthat have emerged as a result of Internetcommunications. Five practices are discussedand illustrated: surveillance by glitch,surveillance by default, surveillance bydesign, surveillance by possession, andsurveillance by subject. The article offerssome tentative conclusions about theprogressive latency of tracking devices, aboutthe complexity created by multi-sourcing, aboutthe robustness of clickstream data, and aboutthe erosion of the distinction between themonitor and the monitored. These trendsemphasize the need to reject analysis thatframes our understanding of Internetsurveillance in terms of its “impact” onsociety. Rather the Internet should beregarded as a “form of life” whose evolvingstructure becomes embedded in humanconsciousness and social practice, and whosearchitecture embodies an inherent valence thatis gradually shifting away from the assumptionsof anonymity upon which the Internet wasoriginally designed.


Information System User Interface Social Practice Human Computer Interaction Technology Management 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Colin J. Bennett. Computers, Personal Data and Theories of Technology: Comparative Approaches to Privacy Protection in the 1990s. Science, Technology and Human Values, 16: 51–69, 1999.Google Scholar
  2. Tim Berners-Lee. Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web. San Francisco: Harper, 1999.Google Scholar
  3. Ann Cavoukian and Don Tapscott. Who Knows: Safeguarding your Privacy in a Networked World. Toronto: Random House, 1995.Google Scholar
  4. Roger Clarke. Information Technology and Dataveillance. Communications of the ACM, 31 (5): 498–512, 1998.Google Scholar
  5. Christopher Dandeker. Surveillance, Power and Modernity: Bureaucracy and Discipline from 1700 to the Present Day. Cambridge: Polity Press, 1990.Google Scholar
  6. Michel Foucault. The Subject and Power. In H. Dreyfus and P. Rabinow, editors, Michel Foucault: Beyond Structuralism and Hermeneutics. Chicago: Chicago University Press, 1983.Google Scholar
  7. Simson Garfinkel. Database Nation: The Death of Privacy in the 21st Century. Sebastopol Ca: O'Reilly, 2000.Google Scholar
  8. Tim Jordan. Cyberpower: The Culture and Politics of Cyberspace and the Internet. London: Routledge, 1999.Google Scholar
  9. Lawrence Lessig. Code and Other Laws of Cyberspace. New York: Basic Books, 1999.Google Scholar
  10. David Lyon. The Electronic Eye: The Rise of Surveillance Society. Minneapolis: University of Minnesota Press, 1994.Google Scholar
  11. Gary T. Marx. UnderCover: Police Surveillance in America. Berkeley: University of California Press, 1988.Google Scholar
  12. Ithiel de Sola Pool. Technologies of Freedom: On Free Speech in the Electronic Age. Cambridge: Harvard University Press, 1983.Google Scholar
  13. Joel R. Reidenberg. Resolving Conflicting International Data Privacy Rules in Cyberspace. Stanford Law Review, 52 (5): 1315–1371, 2000.Google Scholar
  14. Joel R. Reidenberg. Lex Informatica: The Formulation of Information Policy Rules through Technology. Texas Law Review, 76 (3): 552–593, 1998.Google Scholar
  15. Marc Rotenberg. Fair Information Practices and the Architecture of Privacy (What Larry Doesn't Get). Stanford Technology Law Review, 2001.Google Scholar
  16. Paul Schwartz. Privacy and Democracy in Cyberspace. Vanderbilt Law Review, 52 (6): 1610–1702, 1999.Google Scholar
  17. Andrew L. Shapiro. The Control Revolution. New York: Century Foundation, 1999.Google Scholar
  18. Richard Smith. Gadgets that Spy. Presentation to the 2001 Computers, Freedom and Privacy conference, Cambridge, MA.Google Scholar
  19. David J. Todd. Politicizing Privacy: Focussing Events and the Dynamics of Conflict. MA Thesis, Department of Political Science, University of Victoria, 2001.Google Scholar
  20. Malcolm Warner and Michael Stone. The Databank Society: Organizations, Computers, and Social Freedom. London: Allen & Unwin, 1970.Google Scholar
  21. Alan F. Westin and Michael Baker. Databanks in a Free Society: Computers, Record-Keeping, and Privacy. New York: Quadrangle Books, 1972.Google Scholar
  22. Alan F. Westin. Introduction. In Donald A. Marchand, editor, The Politics of Privacy, Computers and Criminal Justice Records. Arlington Va: Information Resources Press, 1980.Google Scholar
  23. Langdon Winner. Autonomous Technology: Technics-out-of-Control as a Theme in Political Thought. Cambridge: MIT Press, 1977.Google Scholar
  24. Langdon Winner. The Whale and the Reactor: A Search for Limits in the Age of High Technology. Chicago: University of Chicago Press, 1988.Google Scholar

Copyright information

© Kluwer Academic Publishers 2001

Authors and Affiliations

  • Colin J. Bennett
    • 1
  1. 1.Department of Political ScienceUniversity of VictoriaVictoriaCanada

Personalised recommendations