Cookies, web bugs, webcams and cue cats: Patterns of surveillance on the world wide web [Book Review]
David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Ezio Di Nucci
Jack Alan Reynolds
Learn more about PhilPapers
Ethics and Information Technology 3 (3):195-208 (2001)
This article addresses the question of whetherpersonal surveillance on the world wide web isdifferent in nature and intensity from that inthe offline world. The article presents aprofile of the ways in which privacy problemswere framed and addressed in the 1970s and1990s. Based on an analysis of privacy newsstories from 1999–2000, it then presents atypology of the kinds of surveillance practicesthat have emerged as a result of Internetcommunications. Five practices are discussedand illustrated: surveillance by glitch,surveillance by default, surveillance bydesign, surveillance by possession, andsurveillance by subject. The article offerssome tentative conclusions about theprogressive latency of tracking devices, aboutthe complexity created by multi-sourcing, aboutthe robustness of clickstream data, and aboutthe erosion of the distinction between themonitor and the monitored. These trendsemphasize the need to reject analysis thatframes our understanding of Internetsurveillance in terms of its impact onsociety. Rather the Internet should beregarded as a form of life whose evolvingstructure becomes embedded in humanconsciousness and social practice, and whosearchitecture embodies an inherent valence thatis gradually shifting away from the assumptionsof anonymity upon which the Internet wasoriginally designed.
|Keywords||Computer Science Ethics User Interfaces and Human Computer Interaction Management of Computing and Information Systems Library Science Technology Management|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
No references found.
Citations of this work BETA
Irene Pollach (2005). A Typology of Communicative Strategies in Online Privacy Policies: Ethics, Power and Informed Consent. [REVIEW] Journal of Business Ethics 62 (3):221 - 235.
Irene Pollach (2005). A Typology of Communicative Strategies in Online Privacy Policies: Ethics, Power and Informed Consent. Journal of Business Ethics 62 (3):221-235.
Ian Kerr & Jane Bailey (2004). The Implications of Digital Rights Management for Privacy and Freedom of Expression. Journal of Information, Communication and Ethics in Society 2 (2):85-95.
Similar books and articles
David Lyon (2001). Facing the Future: Seeking Ethics for Everyday Surveillance. [REVIEW] Ethics and Information Technology 3 (3):171-180.
P. Francis Leslie, P. Battin Margaret & Charles Smith Jay Jacobson (2009). Syndromic Surveillance and Patients as Victims and Vectors. Journal of Bioethical Inquiry 6 (2).
Jason W. Patton (2000). Protecting Privacy in Public? Surveillance Technologies and the Value of Public Places. Ethics and Information Technology 2 (3):181-187.
Christian Fuchs (2010). studiVZ: Social Networking in the Surveillance Society. [REVIEW] Ethics and Information Technology 12 (2):171-185.
N. Ben Fairweather (1999). Surveillance in Employment: The Case of Teleworking. [REVIEW] Journal of Business Ethics 22 (1):39 - 49.
Benjamin Goold (2008). The Difference Between Lonely Old Ladies and CCTV Cameras: A Response to Ryberg. Res Publica 14 (1):43-47.
Dolores A. Donovan, Informers Revisited: Government Surveillance of Domestic Political Organizations and the Fourth and First Amendments.
Marsha Woodbury (1998). Defining Web Ethics. Science and Engineering Ethics 4 (2):203-212.
Seumas Miller & John Weckert (2000). Privacy, the Workplace and the Internet. Journal of Business Ethics 28 (3):255 - 265.
Added to index2009-01-28
Total downloads36 ( #109,632 of 1,793,059 )
Recent downloads (6 months)9 ( #89,782 of 1,793,059 )
How can I increase my downloads?