Abstract
The surveillance in public and private places, both physically and digitally, is increasing for different reasons. In this paper we intend to discuss surveillance and persuasive technology in an ethical perspective with an eye to its historical and cultural context. In section 1, we present some different tendencies of surveillance in society. In section 2, we elaborate on some important historical ideas on surveillance. In section 3, we consider the use of persuasive technology for surveillance purposes. In section 4, we discuss the development towards increasing surveillance in society, at work, in public places etc. In section 5, we draw up some ethical concerns on surveillance, and finally. In section 6, we discuss the question of a possible need for a public and democratic control of the use of surveillance technology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Atkinson, B.: Captology: A Critical Review. In: IJsselsteijn, W., de Kort, Y., Midden, C., Eggen, B., van den Hoven, E. (eds.) PERSUASIVE 2006. LNCS, vol. 3962, pp. 171–182. Springer, Heidelberg (2006)
Bentham, J., Bozovic, M.: The Panopticon writings, London, New York, Verso (1995)
Berdichevsky, D., Neuenschwander, E.: Toward an ethics of persuasive technology. Communication of the ACM (1999)
Bertino, E., Nai Fovino, I., Parasiliti Provenza, L.: A Framework for Evaluating Privacy Preserving Data Mining Algorithms. Data Mining and Knowledge Discovery 11, 121–154 (2005)
Domingo-Ferrer, J., Torra, V.: Privacy in Data Mining. Data Mining and Knowledge Discovery 11, 117–119 (2005)
Fogg, B.J.: Persuasive technology – Using computers to change what we think and do. Morgan Kaufmann, San Francisco (2003)
Foucault, M.: Surveiller et punir: naissance de la prison, Paris, Gallimard (1975)
Foucault, M.: Discipline & Punish. Translated from the French by Alan Sheridan, 195–228 (1977), http://foucault.info/documents/disciplineAndPunish/foucault.disciplineAndPunish.panOpticism.html
Fule, P., Roddick, J.: Detecting Privacy and Ethical Sensitivity in Data Mining Results. In: Estivill-Castro, V. (ed.) Conferences in Research and Practice in Information Technology, Australian Computer Society, Inc. (2004)
Gandy, O.: The Panoptic Sort: A Political Economy of Personal Information. Westview Press (1993)
Gandy, O.: Coming to Terms with the Panoptic Sort. In: Lyon, D., Zureik, E. (eds.) Computers, Surveillance, and Privacy, Minneapolis University Press (1996)
Lyon, D.: Bentham’s Panopticon: From Moral Architecture to Electronic Surveillance. Queen’s Quarterly 98, 596–617 (1991)
Lyon, D.: Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination, Routledge (2003)
Quorion Data Systems (accessed March 28, 2007), www.quorion.de/Cash%20Registers/cash_register_history_types.htm
Wikipedia 2006a. Image: Panopticon (accessed March 9, 2006), available at the website http://en.wikipedia.org/wiki/Image:Panopticon.jpg
Wikipedia: 2006b. Data mining (accessed February 27, 2006), available at the website http://en.wikipedia.org/wiki/Data_mining
Wikipedia: 2007c. Data dredging (accessed January 30, 2007), available at the website http://en.wikipedia.org/wiki/Data_dredging
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Leth Jespersen, J., Albrechtslund, A., Øhrstrøm, P., Hasle, P., Albretsen, J. (2007). Surveillance, Persuasion, and Panopticon. In: de Kort, Y., IJsselsteijn, W., Midden, C., Eggen, B., Fogg, B.J. (eds) Persuasive Technology. PERSUASIVE 2007. Lecture Notes in Computer Science, vol 4744. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77006-0_15
Download citation
DOI: https://doi.org/10.1007/978-3-540-77006-0_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77005-3
Online ISBN: 978-3-540-77006-0
eBook Packages: Computer ScienceComputer Science (R0)