Surveillance, Persuasion, and Panopticon

  • Julie Leth Jespersen
  • Anders Albrechtslund
  • Peter Øhrstrøm
  • Per Hasle
  • Jørgen Albretsen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4744)


The surveillance in public and private places, both physically and digitally, is increasing for different reasons. In this paper we intend to discuss surveillance and persuasive technology in an ethical perspective with an eye to its historical and cultural context. In section 1, we present some different tendencies of surveillance in society. In section 2, we elaborate on some important historical ideas on surveillance. In section 3, we consider the use of persuasive technology for surveillance purposes. In section 4, we discuss the development towards increasing surveillance in society, at work, in public places etc. In section 5, we draw up some ethical concerns on surveillance, and finally. In section 6, we discuss the question of a possible need for a public and democratic control of the use of surveillance technology.


Captology persuasive technologies Panopticon ethics surveillance and democratic control 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Atkinson, B.: Captology: A Critical  Review. In: IJsselsteijn, W., de Kort, Y., Midden, C., Eggen, B., van den Hoven, E. (eds.) PERSUASIVE 2006. LNCS, vol. 3962, pp. 171–182. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  2. 2.
    Bentham, J., Bozovic, M.: The Panopticon writings, London, New York, Verso (1995)Google Scholar
  3. 3.
    Berdichevsky, D., Neuenschwander, E.: Toward an ethics of persuasive technology. Communication of the ACM (1999)Google Scholar
  4. 4.
    Bertino, E., Nai Fovino, I., Parasiliti Provenza, L.: A Framework for Evaluating Privacy Preserving Data Mining Algorithms. Data Mining and Knowledge Discovery 11, 121–154 (2005)CrossRefMathSciNetGoogle Scholar
  5. 5.
    Domingo-Ferrer, J., Torra, V.: Privacy in Data Mining. Data Mining and Knowledge Discovery 11, 117–119 (2005)CrossRefMathSciNetGoogle Scholar
  6. 6.
    Fogg, B.J.: Persuasive technology – Using computers to change what we think and do. Morgan Kaufmann, San Francisco (2003)Google Scholar
  7. 7.
    Foucault, M.: Surveiller et punir: naissance de la prison, Paris, Gallimard (1975)Google Scholar
  8. 8.
    Foucault, M.: Discipline & Punish. Translated from the French by Alan Sheridan, 195–228 (1977),
  9. 9.
    Fule, P., Roddick, J.: Detecting Privacy and Ethical Sensitivity in Data Mining Results. In: Estivill-Castro, V. (ed.) Conferences in Research and Practice in Information Technology, Australian Computer Society, Inc. (2004)Google Scholar
  10. 10.
    Gandy, O.: The Panoptic Sort: A Political Economy of Personal Information. Westview Press (1993)Google Scholar
  11. 11.
    Gandy, O.: Coming to Terms with the Panoptic Sort. In: Lyon, D., Zureik, E. (eds.) Computers, Surveillance, and Privacy, Minneapolis University Press (1996)Google Scholar
  12. 12.
    Lyon, D.: Bentham’s Panopticon: From Moral Architecture to Electronic Surveillance. Queen’s Quarterly 98, 596–617 (1991)Google Scholar
  13. 13.
    Lyon, D.: Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination, Routledge (2003)Google Scholar
  14. 14.
    Quorion Data Systems (accessed March 28, 2007),
  15. 15.
    Wikipedia 2006a. Image: Panopticon (accessed March 9, 2006), available at the website
  16. 16.
    Wikipedia: 2006b. Data mining (accessed February 27, 2006), available at the website
  17. 17.
    Wikipedia: 2007c. Data dredging (accessed January 30, 2007), available at the website

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Julie Leth Jespersen
    • 1
  • Anders Albrechtslund
    • 1
  • Peter Øhrstrøm
    • 1
  • Per Hasle
    • 1
  • Jørgen Albretsen
    • 1
  1. 1.Aalborg UniversityDenmark

Personalised recommendations