Back to Main Page | References | Notes
By G.T. Marx
Georg Simmel
Not long ago, one could fit all of those interested in social studies of surveillance into a phone booth –that possibility is gone (along with the phone booth). David Lyon (forthcoming), in a comprehensive overview, observes "…surveillance studies started to emerge as a coherent sub-disciplinary field towards the end of the twentieth century." As both scholar and organizer, Lyon has played a major role in this beginning.
Now there is a vibrant and growing international network of scholars interested in surveillance questions. (Monaghan 2006) There are new journals, special issues of, and many articles in, traditional journals and frequent conferences. 1 Between 1960-69 Sociological Abstracts listed just 6 articles with the word "surveillance". Between 1990-99, 563 articles were listed and if current trends continue, there will be well over 1000 articles for the decade ending 2009. In 2005-06 alone, five significant edited sociological books were published with scores of contributors (Zuriek and Salter 2005, Lace 2005, Haggerty and Ericson 2006, Lyon 2006, Monahan 2006), and many more monographs and edited volumes are on the way. Yet a boom in research does not necessarily mean an equivalent boon.
As in that other famous case, it is premature to conclude "mission accomplished", let alone even consensually identified. This particularly applies to the sociologically tinged versions of the field. In contrast, studies of surveillance from law, economics and geography suggest more coherent disciplinary subfields. 2 The increasing number of surveillance scholars in sociology and related fields such as communications, criminology and cultural studies speaks to the currency of the field.
The field is strongest in its' historical and macro accounts of the emergence and changes of surveillance in modern institutions and in offering an abundance of nominal (if rarely operationalized) concepts. 3 Terms such as surveillance, 4 social control, privacy, anonymity, secrecy and confidentiality tend to be used without precise (or any) definition and are generally not logically linked. There are also case studies, usually at one place and time, involving only one technology and often with a policy evaluation (particularly of CCTV) component. 5
To marketing, law enforcement and national security critics, sociological surveillance research tends to be seen as coming from left field (in both senses). Surveillance writing often shows sympathy for underdogs and suspicion of overdogs, indignation over flagrant violations and concern for the future of personal dignity, equality and democracy. Yet beyond the newsworthy horror stories, 6 we have little quantitative data on the frequency and correlates of abuses or trend data on the individual's overall ability to control personal information. Replicable empirical research and hypothesis testing on contemporary forms lags, (although surprisingly, perhaps less so in Europe than in North America).
For the systematic, comparative, context and empirically focused social analyst, much of the current work, while often elegantly phrased, exploratory 7 and useful in offering background knowledge, raising issues and sounding alarms, remains conceptually undernourished, non-cumulative and non-explanatory (at least in being conventionally falsifiable) and is either unduly abstract and broad, or too descriptive and narrow.
Consider for example the nominal concepts noted in footnote 3. These are each part of the story about the Hindu elephant whose varied, and sometimes conflicting, elements can be hazily seen through the pixilated shadows and fog of the present. However for systematic empirical assessment, naming names is not enough. We need to break down the named into their multi-dimensional components, locate connections among seemingly disparate phenomena and use a more variegated conceptual framework in our data collection and analysis.
Terms such as "the new surveillance" and "surveillance society" (Marx 1985 a,b), which I used to label emerging trends illustrates this problem. These general terms served well in effecting broader climates of public opinion and in calling attention to the issues. 8 Yet we need to get beyond buzzwords and the simple, "just say 'yes' or 'no' Professor" responses desired by the media. In reflecting on just what is new, I identify 27 dimensions by which any surveillance means can be contrasted. I use this as the bases for contrasting the new surveillance with traditional surveillance. 9 (Marx 2004)
A further weakness of the field involves omission. Most studies deal with contexts of conflict, domination and control involving surveillance agents and organizations (almost all of the books chosen for review in this symposium). The extensive use of surveillance in other settings for goals involving protection, management, documentation, strategic planning, ritual or entertainment is ignored. Goals are too often simply assumed. Their frequent lack of clarity and their multiplicity are ignored. 10
The very word surveillance evokes images of conflict spies skulking in the shadows, rather than of cooperation with reassuring life guards or parents in the sunshine. Surveillance as a fundamental social process is about much more than modernism, capitalism, bureaucracy, computer technology and the aftermaths of 9/11, however important those are. A zero-sum, social control, conflict game involving the unilateral, effective and unchallenged power of the hegemons does not define the universe.
Surveillance subjects and uses by individuals (e.g., in a familial contexts or by voyeurs) are neglected, as is the interaction between agents and subjects. 11 Surveillance culture, which so envelops and defines popular consciousness, also tends to be under-studied. 12
The sum of sociological surveillance studies is unfortunately not yet greater than the individual parts.
To take topics studied by the reviewers, it is not initially apparent how research on undercover police, passports (Torpey 2000), political repression (Cunningham 2003), work monitoring (Zureik 2003), mobile telephony (Lyon 2006), constitute a field, let alone studies of welfare eligibility (Gilliom 2001), anonymity (Frankel and Teich 1999, bots (Kerr 2004), the internet and political polls (Howard et al 2005), e-government (Ogura 2006), cardiac patients (Dubbeld 2006), abandoned DNA (Joh 2006) or reality television (Andrejevic 2004). With respect to theory and method, established fields of political sociology, stratification, organizations, social psychology, deviance and social control, science, technology and society and social problems are more helpful than an autonomous surveillance subfield.
A field needs greater agreement (or well articulated disagreements) on what
the central questions and basic concepts are, on what it is that we know empirically
and what needs to known, and on how the empirically documented or documentable can be ordered and explained, let alone some ability to predict the conditions under which future developments are to be expected. Reaching these objectives should be the next steps for the field.
The multi-dimensional nature of personal information and the extensive contextual and situational variation related to this are often found within dynamic settings of social conflict. This rich brew prevents reaching any simple conclusions about how crossing or failing to cross personal informational borders will, or should, be explained and judged. Such complexity may serve us well when it introduces humility and qualification, but not if it immobilizes. An approach that specifies the contingent factors offers us a situational, rather than an absolutist approach. A compass is not a map, but it is better than being lost without one.
Towards A Field Definition
One Marx manifesto every couple of centuries is probably sufficient, although that should not be the case for Marx jokes. Nonetheless, let me offer, in greatly telegraphed form, one way of approaching the new surveillance for the collection of personal information. This approach is tied firmly to our discipline and its historical concerns from Marx, Durkheim, Weber and Simmel and more recent concerns such as those expressed by Shils, Nisbet, Merton and Goffman. It takes systematic account of the variation whose causes, processes and consequence need to be understood.
I suggest a situational or contextual approach which, while not denying some commonalities across surveillance behavior, emphasizes patterned differences. Amidst the sweeping claims (whether of dystopians, utopians, ideologues, single case study over-generalizers, or one trick pony theoretical reductionists), we need to specify. Conclusions, whether explanatory or evaluative, require identifying the dimensions by which the richness of the empirical world can be parsed into dissimilar or fused into similar analytic forms that are systematically studied. To paraphrase a country and western song, "there is too much talk [aka meta-theory] and not enough research".
Among key elements in this approach are:
Central questions within a normative approach are: what are the rules governing the protection and revelation of information, how are they created, what are their consequences and how should they be judged? Who has access to personal information and under what conditions? How do factors such as the type of physical, temporal and cultural border, the type of relationship among actors, the roles played, the type of information involved, the form of its presentation and the characteristics of the means used and the goals sought effect rules about information and the distribution of various surveillance forms? 15 What does surveillance focus onindividuals, groups, organizations, or environments? And, once focused, what does it look for (e.g, rule compliance, eligibility, wanted persons, purity, networks, location) and what actions, if any flow from the activity? How are results assessed, where are the lines drawn, how valid are the instruments used, both in general and as applied in a given context?
What factors condition varying connections between the rules and actual behavior? How do normatively sanctioned and coercively supported data extractions (or data protections) differ from softer, seemingly voluntary (and often seductively elicited) revelations (or protectionse.g., industry favoring self-regulation)? How is information treated once it has been gathered (e.g., security, repurposing, alteration, retention and destruction)?
Borders are central factors for understanding surveillance. They of course may include or exclude as they facilitate or restrict the flow of information, persons, goods, resources and opportunities (Zuriek and Salter 2006, Andreas and Nadelmann 2006). The literal and symbolic role of border surveillants as guardians, gate keepers, spotters, cullers and sorters needs to be better understood, as well as subject responses.
A question I have been concerned with is under what conditions do individuals feel that a personal border has been wrongly crossed, or that there has been a failure in not crossing a personal border re the collection of information? The latter is particularly interesting and neglected, but see Etzioni (1999) and Allen (2003). Re the former I hypothesize that important correlates of a sense of injustice are non-consensual crossing a borderphysical (whether a wall, skin or disaggregation), temporal, or social, presumed to be protective of information, or recording such information. (Marx 1999)
Directionality can also be considered. Most attention is on taking information from the person. But as with Orwell's telescreeen this can be joined (and also needs to be contrasted with) impositions upon the person –whether sound, images, smells or unwanted messages (e.g., much telemarketing and spam). These of course may be joined as when monitoring of internet behavior leads to receipt of spam.
Privacy and publicity are major concepts here as they form polar ends of a continuum involving rules about withholding and disclosing, and seeking or not seeking, information. Depending on the context, social roles and culture, individuals or groups may be required, find it optional, or be prohibited from engaging in these activities, whether as subjects or agents of surveillance and communication.
This approach precludes the automatic equation of surveillance with privacy invasion. Surveillance can invade privacy or protect it. Re the latter, consider authentication systems that restrict access to data or that offer protection from id theft (or the better term identity fraud proposed by Pontell (2003). This distinction also avoids the frequent confusion of the private and the public as adjectives describing the actual empirical status of information (e.g., the Pentagon papers became public or failure of a government official to file a required disclosure statement means that the information remains private) apart from formal proscriptions or prescriptions.
Rules are at the heart of publicity and privacy. When the rules specify that information is not to be available to others (whether the restriction is on the surveillance agent not to discover or less often, on the subject not to reveal or on the means) we can speak of privacy norms.
When the rules specify that the information must be revealed by the subject or sought by the agent and that particular means are to be used, we can speak of publicity norms. The subject has an obligation to reveal and/or the agent has an obligation to discover and to report what is discovered. 16 With publicity norms there is no right to privacy that tells the agent not to seek information, nor that gives the subject discretion regarding revelation.
The conditions for such reporting (whether mandatory revelation by the subject or discovery by the agent) involve important variables such as who is to be told. The audience for mandatory revelation/discovery and communication can vary from a few persons entitled to know (as with buyers and sellers bound by a contract or the reporting of signs of possible child abuse by teachers to social welfare officials), to the public at large (as with conflict of interest statements for those in public office).
A sociology of information approach emphasizing norms offers a way to connect and contrast the highly varied topics studied by surveillance scholars. David Cunningham's welcome call for dissagregation is joined by aggregation. The logic of joining freedom of information and right to know issues with the right to control personal information can be seen in having a single agency responsible for these, as with some European and Canadian commissions (Flahterty 1989, Bennett and Raab 2003). 17
Surveillance Structures and Processes
Surveillance can be further analyzed by identifying some basic structures and processes Organizational surveillance is distinct from the non-organizational surveillance carried about by individuals. The internal constituency surveillance found in organizations (in its most extreme form in total institutions (Goffman 1961) contrasts with external constituency surveillance present when those who are watched have some patterned contact with the organization (e.g., as customers, patients, malefactors or citizens). Note also external non-member constituency surveillance in which organizations monitor their broader environment in watching other organizations, individuals and social trends.
Beyond organizational forms, consider personal surveillance in which an individual watches another individual. Here we can differentiate role relationship surveillance as with family members from non-role relationship surveillance as with the voyeur whose watching is unconnected to a legitimate role. 18
With respect to the roles played we can identify the surveillance agent (watcher/observer/seeker). The person about whom information is sought is a surveillance subject. All persons of course play both roles, although hardly in the same form or degree. This changes depending on the context and over the life cycle. The roles are sometimes blurred and may overlap.
The surveillance function may be central to the role (detectives, spies, investigative reporters and even some sociologists) 19 or peripheral (e.g., check-out clerks who are trained to look for shop lifters, dentists who look for signs of child abuse). A distinction rich with empirical and ethical implications is whether the situation involves those who are a party to the generation and collection of data (direct participants) or instead involves third parties.
Surveillance can also be analyzed with respect to whether it is non-reciprocal or reciprocal. Surveillance that is reciprocal may be asymmetrical or symmetrical. Related to this is the need to contrast contexts of cooperation where goals overlap or are shared, as against those where agents and subjects are in conflict. Consider also agent-initiated surveillance vs. subject-initiated surveillance.
In the books reviewed by Cunningham for example we see governmental organizations engaged in non-reciprocal, asymmetrical, conflictual, agent initiated forms.
Rather than being only static and fixed, surveillance also needs to be viewed as a fluid process involving interaction and strategic calculations over time
Rather than being static and fixed at one point in time, surveillance needs to be viewed as a fluid, ongoing process involving interaction and strategic calculations over time. Among surveillance processes are efforts to create the myth of surveillance, surveillance creep, gallop and contraction and surveillance commodification. Behavioral techniques of neutralization –strategic moves by which subjects of surveillance seek to subvert the collection of personal information can be noted. Among forms that can be observed are: direct refusal, discovery, avoidance, switching, distorting, counter-surveillance, cooperation, blocking and masking. Marx (2003)
Surveillance practices are shaped by manners, organizational policies and laws and by available technologies and counter-technologies. These draw on a number of background value principles and tacit assumptions about the empirical world.. Using criteria such as the nature of the goals, the procedure for creating a surveillance practice, minimization, consideration of alternatives, reciprocity, data protection and security and implications for democratic values, I suggest 20 questions to be asked about any surveillance activity. (Marx 2005) The more these can be answered in a way affirming the underlying values, the more legitimate the surveillance is likely to be.
In anxious, media saturated times we must be especially attentive to public rhetoric that so effortlessly passes for profundity. 20 Consider the stock line that everything changed after 9/11 and we must therefore be prepared to tradeoff liberty or privacy for security. Perhaps. That conclusion should only be reached after careful analysis indicating 1) that the threat has been accurately portrayed 2) that the tradeoff is genuine i.e., that the sacrifice will work 3) it is morally justified and involves an appropriate prioritization of values (i.e., whatever is being traded off is of less worth than what is presumed to be gained) and 4) as Torin Monahan (2006) and his colleagues suggest, tradeoff talk does not lead us to ignore consequences for other important social values such as fairness, equality and personal dignity, let along technologies that bite back. (Tenner 1996)
Social research attentive to empirical and moral complexity may move us closer to the enlightenment promise of our discipline and leave in the realm of fiction, Brecht's observation that the person who smiles is the one who has not yet heard the bad news.
Back to Main Page | Top | Notes
References
Allen, A. 2003. Accountability for Private Life. Lanham: Rowman and Littlefield.
Altheide, D. 2006. Terrorism and the Politics of Fear. Lantham: AltaMira Press
American Management Association, 1999. U.S. Corporations Reduce Reduce Levels of Medical, Drug, and Psychological Testing of Employees. New York: American Management Association.
Andrejevic, M. 2004. Reality TV: The Work of Being Watched. New York: Rowman and Littlefield.
Ball, K. 2002. "Elements of Surveillance: A New Framework and Future Directions." Information, Communication and Society.
Bennett and Raab, 2003. The Governance of Privacy. Brookfield: Ashgate
Bigo, D. 2006. "Globalized (in)security: the Field and the Pan-Opticon." in Traces: A Multilingual Series of Cultural Theory. 4: 34-87.
Block, 1992. "Issues and Theories on Covert Policing." Crime, Law and Social Change. vol. 18, nos. 1-2.
Bogard, B. 1996. The Simulation of Surveillance: Hyper Control in Telematic Societies. New York: Cambridge University Press.
Boyne, R. 2000. "Post-panopticism." Economy and Society. 29: 285-307.
Brodeur J.P. and Leman-Langlois, S. 2006, "Surveillance Fiction or Higher Policing." in K. Haggerty and R. Ericson, The New Politics of Surveillance and Visibility. Toronto, university of Toronto Press.
Calvert, C. 2000. Voyeur Nation. Boulder: Westview Press.
Clarke R 1986. "Information Technology and Dataveillance." Communications of the ACM 31:488
Cunningham, D. 2003. There's Something Happening Here: The New Left, the Kaln, and FBI Counterintelligence. Berkeley: University of California Press
Cohen, S. 1985. Visions of Social Control. Cambridge: Polity Press.
Curry, M. 1997. Digital Places: Living With Geographic Information Systems. London: Routledge.
Dandeker, C. 1990. Surveillance, Power, and Modernity. Cambridge: Polity Press.
Denzin, N. 1995. The Cinematic Society: The Voyeur's Gaze. Thousand Oaks: Sage.
Doyle, A. 2003. Arresting Images. Toronto: University of Toronto Press.
Dubbeld, L. 2006 "Telemonitoring of the Cardiac Patient: User-centered Research as Input for Surveillance Studies." in Lyon (ed.) Theorizing Surveillance: the Panopticon and Beyond. Devon: Willan.
Ericson, R. and Haggerty, K. 1997. Policing the Risk Society. Toronto: University of Toronto Press.
Etzioni, A. 1999. The Limits of Privacy. New York: Basic Books.
Flaherty, D. 1989. Protecting Privacy in Surveillance Societies. Chapel Hill: University of North Carolina Press.
Foucault, M. 1977. Discipline and Punish: The Birth of the Prison. New York: Vintage.
Frankel, M.and Teich A. 1999. "Anonymous Communication on the Internet." The Information Society, Vol.15:2
Froomkin, M. 2000. "The Death of Privacy?" Stanford Law Review, Vol. 52:
Friedenwald, M. Vildjiounaite, E. and Wright, D. 2006. "The Brave New World of Ambient Intelligence." At http://swami.jrc.es
Gabriel, Y. 2004. "The Glass Cage." In eds. J. Alexander, G. Marx, C. Williams, Self, Social Structure, and Beliefs. Berkeley: University of California Press.
Gandy, O. 1993. The Panoptic Sort. Boulder: Westview.
Garland, D. 2001. The Culture of Control. Chicago: University of Chicago.
Giddens, A. 1990. The consequences of Modernity. Cambridge: Polity Press.
Gilliom, J. 2001. Overseers of the Poor. Chicago: University of Chicago Press.
Goffman, E. 1961. Asylums. Garden City, N.J.:Anchor Books.
Greenfield, A. 2006. Everyware The Dawning of the Age of Ubiquitous Computing. Berkeley: Peachpit Press.
Groombridge, N. 2002. "Crime Control or Crime Culture TV?" Surveillance and Society, 1:
Goold, B. 2004. CCTV and Policing: Public Area Surveillance and Police Practices in Britain. Oxford: Oxford University Press.
Graham, S. and Marvin, S. 1996. Telecommunications and the City: Electronic Space, Urban Places. London: Routledge.
Gurstein, R. 1996. The Repeal of Reticence. New York: Hill and Wang.
Frankel, M. and Teich, A. 1999 "Special Issue: Anonymous Communication on the Internet." The Information Society. Vol. 15, no. 2.
Friedenwald M et al, Vildjiounaite, E. and Wright, D. 2006. The Brave New World of Ambient Intelligence. At http://swami.jrc.es
Hardt, M. and Ngri, A. 2000. Empire. Cambridge: Harvard University Press.
Hemple, L. and Topfer, E. 2004. "CCTV in Europe." Working paper 15, Berlin: Center for Technology and Society.
Hermalin, B. and Katz, M. 2004. "Privacy, Property Rights, and Efficiency: The Economics of Privacy as Secrecy." At http://faculty7.haas.berkeley.edu/hermalin/privacy_qme.pdf.
Howard, P., Carr J., Milstein T. 2005. "Digital Technology and the Market for Political Surveillance." Surveillance & Society, 3(1): 59-73
Jermier, J. 1998. "Critical Perspectives on Organizational Control." Administrative Science Quarterly, 43:235-510.
Joh, E. 2006. "Reclaiming 'Abandoned' DNA: The Fourth Amendment and Genetic Privacy." 100 NW. university L. Rev.
Keen, M. 1999. Stalking the Sociological Imagination. Conn.: Greenwood.
Kerr, I. 2004. "Bots, Babes and the Californication of Commerce." 1. University of Ottawa Law and Technology Journal, pp 284-324.
Kemple, T. and Huey, L. 2006. "Observing the Observers: Researching Surveillance and Counter-Surveillance on 'Ski Row'." Surveillance and Society. Vol.3 nos. 2/3
Lace, S. (ed.) 2005. The Glass Consumer: Life in a Surveillance Society. Bristol: Policy Press.
Laudon, K. 1987. The Dossier Society. New York: Columbia University Press.
Leyman-Langlois, S. 2002. "The Myopic Panopticon: The Social Consequences of Policing Through the Lens." Policing and Society, 13:43-58.
Los, M. 2006. "Looking Into the Future: Surveillance, Globalization and the Totalitarian Potential." in Lyon, Theorizing Surveillance: the Panopticon and Beyond. Devon: Willan.
Lyon, D. 1994. The Electronic Eye: The Rise of Surveillance Society. Minneapolis: University of Minnesota Press.
Mack, A. 2001. "Privacy." Social Research, 68.
Mann, S. Nolan, J. and Wellman, B. 2003. "Sousveillance: Inventing and Using Wearable Computing Devices for Data Collection in Surveillance Environments." Surveillance and Society, 1:331-355.
Marguilis, S. 2003. "Privacy as a Social issue and Behavioral Concept." Journal of Social Issues, 51:3.
Marx, G.T. 1972. Muckraking Sociology. New Brunswick: Transaction Books.
Marx, G.T. and Muschert, G. forthcoming "Personal Information, Borders, and the New Surveillance." Annual review of Law and Social Science.
Mathiesen, T. 1997. "The Viewer Society: Michel Foucault's 'Panopticon' Revisted." Theoretical Criminology. 1 (2): 215-233. [OR 34?]
McGrath, J. 2003. Loving Big Brother. Oxford: Routledge.
Monmonier, M. 2002. Spying With Maps. Chicago: University of Chicago Press.
Monaghan, P. 2006 "Watching the Watchers watching you." The Chronicle of Higher Education. 52:28, March 17, 1 and 18-25.
Monahan, T. 2006. "Questioning Surveillance and Security" in T. Monahan (ed.) Surveillance and Security, Devon: Wilan Publishing.
National Research Council, forthcoming. Engaging Privacy and Information Technology in a Digital Age: issues and Insights. Washington D.C.: The National Academies Press.
Newburn, T., Hayman, S. 2002. Policing, Surveillance and Social Control. Devon:Willan.
Noam, E. 1997. Privacy and Self-Regulation: Markets for Electronic Privacy.
Nock, S. 1969. The Costs of Privacy: Surveillance and Reputation in America. New York: De Gruyter.
Nogala, D. 1995. "The Future Role of Technology in Policing." In Brodeur, J.P. (ed.) Comparisons in Policing: An International Perspective. Avebury, UK: Aldershot.
Norris, C., Moran, J. Armstrong, G. 1998. Surveillance, Closed Circuit Television and Social Control. Aldershot: Ashgate.
Ogura, T. 2006 "Electronic Government and Surviellance Oriented Society." in Lyon (ed.) Theorizing Surveillance the Panopticon and Beyond. Devon: Willan.
Palidda, S. 1992. "L'Anamorphose de l'Etat-Nation: Le Cas Italien." Cahieres Internationaux de Sociologie. XCIII, 269-298.
Pecora, V. 2002. "The Culture of Surveillance." Qualitative Sociology. 25:3 345-358.
Pontell, H. 2003.
Poster, M. 1990. The Mode of Information. Chicago: University of Chicago Press.
Price D. 2004. Threatening Anthropology: McCarthyism and the FBI's Surveillance of Activist Anthropologists. Durham: Duke University Press.
Regan, P. 1995. Legislating Privacy: Technology, Social Values, and Public Policy. Chapel Hill: University of North Carolina Press.
Rule, J. 1973. Private Lives and Public Surveillance. London: Allen Lane.
Slobogin C. 2002. "Public Privacy: Camera Surveillance of Public Places and the Right to Anonymity." Mississippi Law Journal, 72:213-298.
Solove, D. 2006. The Digital Person. New York: N.Y.U. Press.
Solove, D. et al. 2005. Information Privacy Law. Aspen Press.
Staples, W. 2000. Everday Surveillance: Vigilance and Visibility in Postmodern Life. Lanham, MD.:Rowan and Littlefield.
Stigler, G. 1980. "An Introduction to Privacy in Economics and Politics." Journal of Legal Studies, 9:623-644.
Surveillance Studies Network. 2006. "A Report on the Surveillance Society. 28th International Data Protection and Privacy Commissioners' Conference, London."
Tenner, E. 1996. Why Things Bite Back: Technology and the Revenge of Unintended Consequences. New York: Knopf.
Torpey, J. 2000. The Invention of the Passport: Surveillance, Citizenship and the State. Cambridge and New York: Cambridge University Press.
Tunnell, K. 2004. Pissing on Demand. New York: N.Y.U. Press.
Turkington R. and Allen, A. 2002. Privacy Law Cases and Materials. West Group Publishing.
Van Harten, D. and Van Est, R. 2003. "Special Issue: Privacy in an Information Society." Journal of Contingencies and Crisis Management. 11:1-36.
Welsh B. and Farrington, D. 2004. "Surveillance for Crime Prevention in Public Space: Results and Policy Choices in Britain and America." Criminology and Public Policy, vol. 3:3 497-526.
Zureik, E. 2003. "Theorizing Surveillance: The Case of the Workplace." In D. Lyon (ed.) Surveillance as Social Sorting. New York: Routledge. Surveillance and Society
Waever, O. 1995. "Securitization and Desecuritization." in R. Lipschultz (ed.) On Security. New York: Columbia University Press.
Back to Main Page | References | Top
Notes
With respect to the free lunch activity of naming, a sampling: the gaze, (Foucault 1977); surveillance society, the new surveillance and maximum security society (Marx 1985 a, b; dossier society ( Laudon 1986); dataveillance (Clarke 1988); super-panopticon, (Poster 1990); l'anamorphose de l'etat-nation (Palida 1992); panoptic sort (Gandy 1993); Waever, 1995); synopticon, (Mathiesen 1997); securitization (Ericson and Haggerty 1997); telematic society (Bogard 1996); techno-policing, (Nogala 1995) Deleuze 199_, Haggerty and Ericson 2000); information empire (Hardt and Negri 2000); post-panopticon, (Boyne 2000); glass cage, (Gabriel 2004); ban-opticon, (Bigo 2006); high policing, (Brodeur and Lehman-Langlois 2006); ubiquitous computing, (Greenfield 2006); ambient intelligence (Friedenwald et al 2006) ); safe society (Lyon, forthcoming).
The Latin roots are sur = super, vidre = to look and vigilare = to keep watch. Super-watching conveys an important strand, but is awkward. For those uncomfortable with to surveil, the English term to survey which can involve either a general overview, or a critical inspection is the best we have. One can also play with prepositions –viewing and contrasting surveillance as looking over, under, above, below, beyond, back, out and for, as these apply to both agents and subjects and to position, time and goals.. In an interesting ethno-table turn, Mann et al (2003) labels his use of videocams to record the behavior of the more powerful sous-surveillance. It is that not only because it is done by those presumably socially below, but also because in probing underneath it may reveal taken for granted social worlds.
Among some of the most important characteristics of the new surveillance: extends the senses, low visibility, involuntary, remote, lesser cost, multiple indicators, strategic, integrated, automated, real time data flows, attention to systems and networks as well as individuals, routinization of surveillance into everyday life, immediate links between data collection and action and emphasis on predicting the future and preventing some forms of it. When not hidden altogether, the new information gathering seeks to be soft, relatively non-invasive, unnoticeable and to avoid direct coercion. (Marx 2006)
An alternative, but compatible, approach views surveillance as consisting of four elements; representation, meaning, manipulation and intermediation which generate “surveillance domains'. (Ball 2002)
A related concept, surveillance slack, can be used to contrast time periods, cultures and contexts with respect to the degree of slack (if any) between the potential for a fully unleashed technology and the extent and form of its actual application Using this measure suggests that we live in relatively benign times and that things may in one sense be getting better all the time, as the potential power of the technology expands much more rapidly than its institutionalization.
Whether because of the almost simultaneous development of means of neutralizing surveillance (e.g., encryption) and the growth of legal and policy restrictions on asking certain kinds of questions some police, security and medical officials and employers are concerned that in particular contexts there is now too much protection of personal information.
The ironies can be striking. In an epilogue to his study of government welfare surveillance (Gilliom 2001) reports on his serendipitous encounter with some involuntary participant observation data, as he became the subject of unwarranted state surveillance. See also Kemple and Huey 2006.
Back to Main Page | References | Notes | Top
We are at any moment those who separate
In its current state the sociological subfield of surveillance studies reminds me of the joke that began an editorial letter of rejection I received as a beginning scholar:
the connected or connect the separate.
A poor man saves and finally manages to buy his first suit of which he is very proud. A rich relative sees him on the street wearing it and says, "that's nice material, have you thought of having a suit made from it?"
The previous reviews suggest the richness and variety of this budding field. There is indeed something happening here! Yet, in calling for better conceptualization the reviewers would no doubt agree with song writer Stephen Sills that "what it is ain't exactly clear." I will elaborate a bit on this and, consistent with brother Georg's observation above, suggest some ways of hopefully making it clearer.
One way of organizing surveillance studies is as part of a broader field of the sociology of information. A major area within that involves the rules about information in general, and personal information, in particular. 14 The nine elements listed above exist within a normative environment in which expectations, policies and laws set conditions around which behavior flows. This approach yields a number of hypotheses about surveillance behavior and the patterning of normative expectations regarding the accessibility and inaccessibility of information. (Marx and Muschert, forthcoming)
You are visitor number to this page since March 14, 2007.