Skip to main content

Surveillance, Persuasion, and Panopticon

  • Conference paper
Persuasive Technology (PERSUASIVE 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4744))

Included in the following conference series:

Abstract

The surveillance in public and private places, both physically and digitally, is increasing for different reasons. In this paper we intend to discuss surveillance and persuasive technology in an ethical perspective with an eye to its historical and cultural context. In section 1, we present some different tendencies of surveillance in society. In section 2, we elaborate on some important historical ideas on surveillance. In section 3, we consider the use of persuasive technology for surveillance purposes. In section 4, we discuss the development towards increasing surveillance in society, at work, in public places etc. In section 5, we draw up some ethical concerns on surveillance, and finally. In section 6, we discuss the question of a possible need for a public and democratic control of the use of surveillance technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Atkinson, B.: Captology: A Critical  Review. In: IJsselsteijn, W., de Kort, Y., Midden, C., Eggen, B., van den Hoven, E. (eds.) PERSUASIVE 2006. LNCS, vol. 3962, pp. 171–182. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  2. Bentham, J., Bozovic, M.: The Panopticon writings, London, New York, Verso (1995)

    Google Scholar 

  3. Berdichevsky, D., Neuenschwander, E.: Toward an ethics of persuasive technology. Communication of the ACM (1999)

    Google Scholar 

  4. Bertino, E., Nai Fovino, I., Parasiliti Provenza, L.: A Framework for Evaluating Privacy Preserving Data Mining Algorithms. Data Mining and Knowledge Discovery 11, 121–154 (2005)

    Article  MathSciNet  Google Scholar 

  5. Domingo-Ferrer, J., Torra, V.: Privacy in Data Mining. Data Mining and Knowledge Discovery 11, 117–119 (2005)

    Article  MathSciNet  Google Scholar 

  6. Fogg, B.J.: Persuasive technology – Using computers to change what we think and do. Morgan Kaufmann, San Francisco (2003)

    Google Scholar 

  7. Foucault, M.: Surveiller et punir: naissance de la prison, Paris, Gallimard (1975)

    Google Scholar 

  8. Foucault, M.: Discipline & Punish. Translated from the French by Alan Sheridan, 195–228 (1977), http://foucault.info/documents/disciplineAndPunish/foucault.disciplineAndPunish.panOpticism.html

  9. Fule, P., Roddick, J.: Detecting Privacy and Ethical Sensitivity in Data Mining Results. In: Estivill-Castro, V. (ed.) Conferences in Research and Practice in Information Technology, Australian Computer Society, Inc. (2004)

    Google Scholar 

  10. Gandy, O.: The Panoptic Sort: A Political Economy of Personal Information. Westview Press (1993)

    Google Scholar 

  11. Gandy, O.: Coming to Terms with the Panoptic Sort. In: Lyon, D., Zureik, E. (eds.) Computers, Surveillance, and Privacy, Minneapolis University Press (1996)

    Google Scholar 

  12. Lyon, D.: Bentham’s Panopticon: From Moral Architecture to Electronic Surveillance. Queen’s Quarterly 98, 596–617 (1991)

    Google Scholar 

  13. Lyon, D.: Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination, Routledge (2003)

    Google Scholar 

  14. Quorion Data Systems (accessed March 28, 2007), www.quorion.de/Cash%20Registers/cash_register_history_types.htm

  15. Wikipedia 2006a. Image: Panopticon (accessed March 9, 2006), available at the website http://en.wikipedia.org/wiki/Image:Panopticon.jpg

  16. Wikipedia: 2006b. Data mining (accessed February 27, 2006), available at the website http://en.wikipedia.org/wiki/Data_mining

  17. Wikipedia: 2007c. Data dredging (accessed January 30, 2007), available at the website http://en.wikipedia.org/wiki/Data_dredging

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yvonne de Kort Wijnand IJsselsteijn Cees Midden Berry Eggen B. J. Fogg

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Leth Jespersen, J., Albrechtslund, A., Øhrstrøm, P., Hasle, P., Albretsen, J. (2007). Surveillance, Persuasion, and Panopticon. In: de Kort, Y., IJsselsteijn, W., Midden, C., Eggen, B., Fogg, B.J. (eds) Persuasive Technology. PERSUASIVE 2007. Lecture Notes in Computer Science, vol 4744. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77006-0_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77006-0_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77005-3

  • Online ISBN: 978-3-540-77006-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics