Advertisement

Surveillance in the Big Data Era

  • Mark Andrejevic
Part of the Law, Governance and Technology Series book series (LGTS, volume 11)

Abstract

The development of networked, mobile devices has made possible anytime, anywhere access to digital information and communication resources. At the same time, thanks to the interactive capability of these devices, pervasive monitoring goes hand-in-hand with pervasive information and computing technology (PICT). As our ability to share data goes mobile, so too does the ability to track a growing range of information about our activities, our movements, our preferences, behaviour and interests. The ability to collect and sort large amounts of data about people leads to changes in the way monitoring and surveillance works. It also marks the convergence between monitoring in contexts ranging from marketing and political campaigning to policing and security. This chapter considers some of the shifts associated with surveillance in the digitally-enhanced era of so-called “big data,” and explores some of the ethical and social concerns it raises. It argues for the importance of several types of control and accountability measures related to the collection and use of personal information.

Keywords

Information Environment Ubiquitous Computing Predictive Analytic Generalize Surveillance Commercial Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Anderson, C. 2008. The end of theory: The data deluge makes the scientific method obsolete. Wired Magazine 16:07, 23 June: http://www.wired.com/science/discoveries/magazine/16-07/pb_theory. Accessed 12 Mar 2012.
  2. Associated Press. 2003. Bets off on terror futures index, July 29. http://www.wired.com/news/politics/0,1283,59813,00.html. Accessed 28 Dec 2005.
  3. Ayres, Ian. 2007. Super crunchers: How anything can be predicted. London: John Murray.Google Scholar
  4. Baudrillard, J. 1994. Simulacra and simulation. Ann Arbor: University of Michigan Press.Google Scholar
  5. Bilton, N. 2012. A rose-colored view may come standard. The New York Times, April 4. http://www.nytimes.com/2012/04/05/technology/google-offers-look-at-internet-connected-glasses.html. Accessed online 10 Apr 2012.
  6. Bogard, W. 1996. The simulation of surveillance: Hypercontrol in telematic societies. Cambridge: Cambridge University Press.Google Scholar
  7. Bogard, W. 2006. Welcome to the society of control. In The new politics of surveillance and visibility, ed. R. Ericson, 57–68. Toronto: University of Toronto Press.Google Scholar
  8. Burton, G. 2012. Draft communications data bill “more far-reaching than first thought.” Computing.co.uk, July 20. http://www.computing.co.uk/ctg/news/2193180/draft-communications-data-bill-more-farreaching-than-first-thought.
  9. Business Wire. 2012. Adobe digital marketing suite tackles big data with predictive marketing. Press Release, March 21.Google Scholar
  10. Duhigg, C. 2012. How companies learn your secrets. The New York Times, February 16. http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html. Accessed 12 Apr 2012.
  11. ENP Newswire (2012). Scala introduces advanced analytics. Press Release, March 7.Google Scholar
  12. Gandy, G. 1993. The panoptic sort: A political economy of personal information. Boulder: Westview.Google Scholar
  13. Geron, T. 2011. Kaggle’s predictive data contest aims to fix health care. Forbes, April 4. http://www.forbes.com/sites/tomiogeron/2011/04/04/kaggles-predictive-data-contest-aims-to-fix-health-care/. Accessed 12 Apr 2012.
  14. Gladwell, M. 1996. The science of shopping. The New Yorker, November 4. http://www.gladwell.com/1996/1996_11_04_a_shopping.htm. Accessed online 12 Apr 2012.
  15. Hamilton, B. 2011. Misfortune telling – Can the NYPD predict a crime before it happens? A tech guru thinks so. New York Post, April 17, 25.Google Scholar
  16. Lyon, D. (ed.). 2002. Surveillance as social sorting: Privacy, risk and automated discrimination. New York: Routledge.Google Scholar
  17. Marchant, G.E., R. Braden Allenby, and Joseph R. Herkert (eds.). 2011. The growing gap between emerging technologies and legal-ethical framework: The pacing problem. Dordrecht/New York: Springer.Google Scholar
  18. Mulholland, H. and R. Booth. 2012. Plans for greater email and web monitoring powers spark privacy fears. The Guardian (London), April 2. http://www.guardian.co.uk/world/2012/apr/02/email-web-monitoring-powers-privacy. Accessed online Apr 10.
  19. Nolan, R. 2012. Behind the cover story: How much does target know? The New York Times, February 21. http://6thfloor.blogs.nytimes.com/2012/02/21/behind-the-cover-story-how-much-does-target-know/. Accessed 12 Apr 2012.
  20. Pariser, E. 2011. The filter bubble: What the internet is hiding from you. New York: Penguin.Google Scholar
  21. Turow, Joseph. 2006. Niche envy: Marketing discrimination in the digital age. Cambridge: The MIT Press.Google Scholar
  22. Wieser, M. 1991. The computer for the 21st century. Scientific American 265(3): 94–104.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media Dordrecht. 2014

Authors and Affiliations

  1. 1.Centre for Critical and Cultural StudiesUniversity of QueenslandBrisbaneAustralia

Personalised recommendations