Skip to main content Accessibility help
×
Hostname: page-component-76fb5796d-9pm4c Total loading time: 0 Render date: 2024-04-28T07:03:57.724Z Has data issue: false hasContentIssue false

Chapter 6 - Surveillance

from Part I - Problems Related to Health, Safety, and Security

Published online by Cambridge University Press:  16 March 2018

A. Javier Treviño
Affiliation:
Wheaton College, Massachusetts
Get access

Summary

Surveillance refers to the focused, systematic, and routine monitoring of behavior, activities, or information that provides either tactical or strategic intelligence. Collected information is most often used with the rationale of influencing, supervising, or protecting people. When utilized by law enforcement or government agencies, surveillance is frequently directed toward specific persons or groups that are perceived as threats. Corporations also use sophisticated mechanisms and techniques to survey rival corporations and private individuals. The use of surveillance creates unique social problems that involve violations of privacy, due process, and civil liberties. Although various civil liberties groups and advocates oppose many forms of surveillance, governments continue to increasingly employ it as its technology improves.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2018

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Agre, P. E. 1994. Surveillance and capture: Two models of privacy. The Information Society 10(2):101–27.Google Scholar
Andrejevic, M. 2002. The work of being watched: Interactive media and the exploitation of self-disclosure. Critical Studies in Media Communication 19(2):230–48.Google Scholar
Arya, S., Pratap, N., and Bhatia, K.. 2015. Future of face recognition: A review. Procedia Computer Science 58:578–85.Google Scholar
Atkins, E. 2014. Spying on Americans: At what point does the NSA's collection and searching of metadata violate the Fourth Amendment. Washington Journal of Law, Technology and Arts 10:51.Google Scholar
Basuchoudhary, A., and Razzolini, L.. 2006. Hiding in plain sight – using signals to detect terrorists. Public Choice 128(1–2):245–55.Google Scholar
Bennett, C. J. 2001. Cookies, web bugs, webcams and cue cats: patterns of surveillance on the world wide web. Ethics and Information Technology 3(3):195208.Google Scholar
Campbell, J. E., and Carlson, M.. 2002. Panopticon.com: Online surveillance and the commodification of privacy. Journal of Broadcasting & Electronic Media 46(4):586606.Google Scholar
Carlin, J. P. 2015. United States Assistant Attorney General for National Security John P. Carlin delivers remarks at the American University Business Law Review 2014 symposium. American University Business Law Review 4:1.Google Scholar
Clarke, R. V. 2005. Seven misconceptions of situational crime prevention. In Handbook of Crime Prevention and Community Safety, edited by Tilley, Nick, 3970. Abingdon, UK: Routledge.Google Scholar
Cockfield, A. J. 2003. Who watches the watchers – A law and technology perspective on government and private sector surveillance. Queen's Law Journal 29:364.Google Scholar
Coleman, R. 2004. Images from a neoliberal city: The state, surveillance and social control. Critical Criminology 12(1):2142.CrossRefGoogle Scholar
Costanza, S. E., and Kilburn, J. C. Jr. 2005. Symbolic security, moral panic and public sentiment: Toward a sociology of counterterrorism. Journal of Social and Ecological Boundaries 1(2):106–24.Google Scholar
Costanza-Chock, S. 2004. The whole world is watching: Online surveillance of social movement organizations. In Revisiting Media Ownership, edited by Thomas, Pradip and Nain, Zaharom, 271–92. London: WACC & Southbound.Google Scholar
Curriden, M. 1992. Selective prosecution: Are black officials investigative targets? American Bar Association Journal 78:5457.Google Scholar
Danezis, G., and Wittneben, B.. 2006. The economics of mass surveillance-and the questionable value of anonymous communications. In Proceedings of the Fifth Workshop on the Economics of Information Security, 116. Cambridge: WEIS.Google Scholar
Fabian, B., Bender, B., and Weimann, L.. 2015. E-mail tracking in online marketing–methods, detection, and usage. In Proceedings of the 12th International Conference on Wirtschaftsinformatik, 11001014. Osnabrück, Germany.Google Scholar
Feuer, L. S. 2011. Who is poking around your Facebook profile?: The need to reform the Stored Communications Act to reflect a lack of privacy on social networking websites. Hofstra Law Review 40:473.Google Scholar
Foucault, M. 1977. Discipline and Punish: The Birth of the Prison. New York: Vintage.Google Scholar
Freeman, M. 2006. Terrorism and civil liberties in the United States: How to have both freedom and security. Democracy and Security 2(2):231–61.CrossRefGoogle Scholar
Fuchs, C. 2011. Web 2.0, prosumption, and surveillance. Surveillance & Society 8(3):288309.Google Scholar
Fuchs, C. 2013. Political economy and surveillance theory. Critical Sociology 39(5):671–87.Google Scholar
Giddens, A. 1987. State, Society and Modern History: The Nation-State and Violence. Vol. 2 of A Contemporary Critique of Historical Materialism. Berkeley: University of California Press.Google Scholar
Giddens, A. 1991. Modernity and Self-Identity: Self and Society in the Late Modern Age. Stanford, CA: Stanford University Press.Google Scholar
Gillis, A. R. 1989. Crime and state surveillance in nineteenth-century France. American Journal of Sociology 95(2):307–41.Google Scholar
Greenberg, I. 2015. From surveillance to torture: The evolution of US interrogation practices during the War on Terror. Security Journal 28(2):165–83.Google Scholar
Haggerty, K. D., and Ericson, R. V.. 2000. The surveillant assemblage. The British Journal of Sociology 51(4):605–22.CrossRefGoogle ScholarPubMed
Helms, R., Costanza, S. E., and Johnson, N.. 2012. Crouching tiger or phantom dragon?: Examining the discourse on global cyber-terror. Security Journal 25(1):5775.Google Scholar
Hier, Sean 2003. Probing the surveillant assemblage: On the dialectics of surveillance practices as processes of social control. Surveillance & Society 1(3):399411CrossRefGoogle Scholar
Hier, S., and Greenberg, J.. 2007. The Surveillance Studies Reader. Berkshire, UK: McGraw-Hill Education.Google Scholar
Hosein, G., and Palow, C. W.. 2013. Modern safeguards for modern surveillance: An analysis of innovations in communications surveillance techniques. Ohio State Law Journal 74:1071.Google Scholar
Kelly, E. P., and Erickson, G. S.. 2005. RFID tags: commercial applications v. privacy rights. Industrial Management & Data Systems 105(6):703–13.Google Scholar
Kilburn, J. C., Costanza, S. E., Metchik, E., and Borgeson, K.. 2011. Policing terror threats and false positives: Employing a signal detection model to examine changes in national and local policing strategy between 2001 and 2007. Security Journal 24(1):1936.Google Scholar
Koskela, H. 2000. “The gaze without eyes”: Video-surveillance and the changing nature of urban space. Progress in Human Geography 24(2):243–65.Google Scholar
Lee, N. 2014. Facebook Nation: Total Information Awareness. New York: Springer.Google Scholar
Lyon, D. 1991. Bentham's panopticon: From moral architecture to electronic surveillance. Queen's Quarterly 98(3):596.Google Scholar
Lyon, D. 1998. The world wide web of surveillance: The internet and off-world power-flows. Information, Communication & Society 1(1):91105.Google Scholar
Lyon, D. 2013. The Electronic Eye: The Rise of Surveillance Society. Minneapolis: University of Minnesota Press.Google Scholar
Lyon, D., and Zureik, E., eds. 1996. Computers, Surveillance, and Privacy. Minneapolis: University of Minnesota Press.Google Scholar
Martin-Márquez, S. 2008. Disorientations: Spanish Colonialism in Africa and the Performance of Identity. New Haven, CT: Yale University Press.CrossRefGoogle Scholar
Maynard, S. 1994. Through a hole in the lavatory wall: Homosexual subcultures, police surveillance, and the dialectics of discovery, Toronto, 1890–1930. Journal of the History of Sexuality 5(2):207–42.Google Scholar
McCahill, M. 2013. The Surveillance Web. New York: Routledge.Google Scholar
Nieto, M. 1997. Public Video Surveillance: Is it an Effective Crime Prevention Tool? Sacramento: California Research Bureau, California State Library.Google Scholar
Parenti, C. 2004. The Soft Cage: Surveillance in America from Slavery to the War on Terror. New York: Basic Books.Google Scholar
Pepper, W. 2003. An Act of State: The Execution of Martin Luther King. London: Verso.Google Scholar
Perlroth, N., Larson, J., and Shane, S.. 2013. NSA able to foil basic safeguards of privacy on web. New York Times. September 5. www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html.Google Scholar
Richards, N. M. 2012. The dangers of surveillance. Harvard Law Review. 126:19341965.Google Scholar
Richmond, J. A. 1998. Spies in Ancient Greece. Greece & Rome 45(1):118Google Scholar
Roberts, J. 2001. Corporate governance and the ethics of Narcissus. Business Ethics Quarterly 11(1):109–27.Google Scholar
Roisman, J. 2013. Dealing with the unexpected. International Journal of Intelligence and CounterIntelligence 26(4):838–42.Google Scholar
Rossiter, C. L. 1953. Seedtime of the Republic: The Origin of the American Tradition of Political Liberty. New York: Harcourt-Brace.Google Scholar
Rothfuss, I. F. 2013. An economic perspective on the privacy implications of domestic drone surveillance. Journal of Law, Economy and Policy 10:441.Google Scholar
Sherman, L. W., and Weisburd, D.. 1995. General deterrent effects of police patrol in crime “hot spots”: A randomized, controlled trial. Justice Quarterly 12(4):625–48.Google Scholar
Sherry, Allison. 2013 Poll: Almost half of Americans say feds infringe on civil liberties. The Denver Post. July 10. www.denverpost.com/newsheadlines/ci_23634491/poll-almost-half-americans-say-feds-infringe-civil.Google Scholar
Silverstein, L. 2004. The double edged sword: An examination of the global positioning system, enhanced 911, and the Internet and their relationships to the lives of domestic violence victims and their abusers. Buffalo Women's Law Journal 13:97.Google Scholar
Soghoian, C. 2010. An end to privacy theater: Exposing and discouraging corporate disclosure of user data to the government. Minnesota Journal of Law, Science & Technology 12(1):191237.Google Scholar
Steinbeck, J. 2015. East of Eden. Los Angeles, CA: California Books.Google Scholar
Strossen, N. 2006. Freedom and fear post-9/11: Are we again fearing witches and burning women? Nova Law Review 31:279.Google Scholar
Sykes, C. 1999. The End of Privacy: The Attack on Personal Rights at Home, at Work, On-line, and in Court. Toronto: Farrar, Straus, and Giroux.Google Scholar
Taylor, N. 2002. State surveillance and the right to privacy. Surveillance & Society 1(1):6685.Google Scholar
Tene, O. 2007. What Google knows: Privacy and internet search engines. Utah Law Review 4:1434–92.Google Scholar
Timberg, C., and Miller, G.. 2014. FBI blasts Apple, Google for locking police out of phones. Washington Post. September 25. www.washingtonpost.com/business/technology/2014/09/25/68c4e08e-4344-11e4-9a15-137aa0153527_story.html?utm_term=.1228a4596094.Google Scholar
Tzu, S. 2012. The Illustrated Art of War. San Francisco: Courier Corporation.Google Scholar
Welsh, B. C., and Farrington, D. P.. 2004. Surveillance for crime prevention in public space: Results and policy choices in Britain and America. Criminology & Public Policy 3(3):497526.Google Scholar
Wood, D. 2003. Foucault and panopticism revisited. Surveillance & Society 1(3):234–39.Google Scholar
Woods, M. J. 2015. Data retention requirements and outsourced analysis: Should private entities become government surrogates in the collection of intelligence. American University Business Law Review 4:49.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Surveillance
  • Edited by A. Javier Treviño, Wheaton College, Massachusetts
  • Book: The Cambridge Handbook of Social Problems
  • Online publication: 16 March 2018
  • Chapter DOI: https://doi.org/10.1017/9781108550710.007
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Surveillance
  • Edited by A. Javier Treviño, Wheaton College, Massachusetts
  • Book: The Cambridge Handbook of Social Problems
  • Online publication: 16 March 2018
  • Chapter DOI: https://doi.org/10.1017/9781108550710.007
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Surveillance
  • Edited by A. Javier Treviño, Wheaton College, Massachusetts
  • Book: The Cambridge Handbook of Social Problems
  • Online publication: 16 March 2018
  • Chapter DOI: https://doi.org/10.1017/9781108550710.007
Available formats
×