Search results

21 – 30 of over 16000
Book part
Publication date: 12 July 2022

Caitlin Rowe

This paper will provide an overview of the contemporary surveillance environment in the age of Big Data and an insight into the complexities and overlap between security, bodily

Abstract

This paper will provide an overview of the contemporary surveillance environment in the age of Big Data and an insight into the complexities and overlap between security, bodily and informational surveillance as well as the subsequent impacts on privacy and democracy. These impacts include the ethical dilemmas facing librarians and information scientists as they endeavour to uphold principles of equality of access to information, and the support of intellectual freedom in private in an increasingly politicised informational environment. If we accept that privacy is integral to the notion of learning, free thought and intellectual exploration and a crucial element in the separation of the state and the individual in democratic society, then the emergence of the data age and the all-encompassing surveillance and exposure of once private acts will undoubtedly lead to the reimagining of the social and political elements of society.

Details

Who's Watching? Surveillance, Big Data and Applied Ethics in the Digital Age
Type: Book
ISBN: 978-1-80382-468-0

Keywords

Open Access
Book part
Publication date: 9 December 2021

David J. Harper, Darren Ellis and Ian Tucker

This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented…

Abstract

This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented which highlight different types of surveillance and different ethical concerns. The first case concerns the use of undercover police to infiltrate political activist groups over a 40-year period in the UK. The second case study examines a joint operation by US and Australian law enforcement agencies: the FBI’s operation Trojan Shield and the AFP’s Operation Ironside. This involved distributing encrypted phone handsets to serious criminal organisations which included a ‘backdoor’ secretly sending encrypted copies of all messages to law enforcement. The third case study analyses the use of emotional artificial intelligence systems in educational digital learning platforms for children where technology companies collect, store and use intrusive personal data in an opaque manner. The authors discuss similarities and differences in the ethical questions raised by these cases, for example, the involvement of the state versus private corporations, the kinds of information gathered and how it is used.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Book part
Publication date: 8 February 2021

Michael Saker and Leighton Evans

This chapter is concerned with examining Pokémon Go in light of the digital economy and surveillance capitalism. The chapter begins by developing the theoretical framework…

Abstract

This chapter is concerned with examining Pokémon Go in light of the digital economy and surveillance capitalism. The chapter begins by developing the theoretical framework underpinning this undertaking, which includes Bauman and Lyon (2013) ‘liquid surveillance’ and Zuboff's (2019) ‘surveillance capitalism’. Following this, we outline the various implications involved in the playing of Pokémon Go, when the production of locative data is not framed as leisure but labour. While Pokémon Go might be suited to the machinations of surveillance capitalism, as we establish, little research has examined this topic from the position of familial locative play or joint-media engagement. As a corollary to this, then, one of the aims of this chapter is to understand how issues of surveillance are perceived by the parents who play this hybrid reality game (HRG) with their children. Consequently, the chapter is driven by the following research questions. First, are families cognisant of the data they produce by playing this HRG, and how these data might be used? Second, do families think critically about the gamic mechanics of this HRG, such as the spawning locations of Pokémon and the reasoning behind these decisions? Third, are participants concerned about the potential application of their gamic data, and if so, how are these concerns reconciled? Fourth, do participants use the familial playing of Pokémon Go as an opportunity to discuss the production of data and its multifaced uses with their children?

Details

Intergenerational Locative Play
Type: Book
ISBN: 978-1-83909-139-1

Article
Publication date: 25 July 2023

Smith Oduro-Marfo

The proliferation of surveillance-enhancing laws, policies and technologies across African countries deepens the risk of privacy rights breaches, as well as the risks of adverse…

Abstract

Purpose

The proliferation of surveillance-enhancing laws, policies and technologies across African countries deepens the risk of privacy rights breaches, as well as the risks of adverse profiling and social sorting. There is a heightened need for dedicated advocacy and activism to consistently demand accountability and transparency from African states, governments and their allies regarding surveillance. The purpose of this paper is to understand the issue frames that accompany anti-surveillance and privacy advocacy in Ghana and the related implications.

Design/methodology/approach

Using a qualitative and interpretivist approach, the author focuses on three different surveillance-oriented incidents/programs in Ghana and analyzes the frames underpinning the related advocacy and narratives of various non-state actors.

Findings

Privacy and anti-surveillance advocacy in Ghana tends to be less framed in the context of privacy rights and is more driven by concerns about corruption and value for money. Such pecuniary emphasis is rational per issue salience calculations as it elevates principles of economic probity, transparency and accountability and pursues a high public shock value and resonance.

Practical implications

Economics-centered critiques of surveillance could be counterproductive as they create a low bar for surveillance promoters and sustains a culture of permissible statist intrusions into citizens’ lives once economic virtues are satisfied.

Originality/value

While anti-surveillance and privacy advocacy is budding across African countries, little is known about its nature, frames and modus compared to such advocacy in European and North American settings. To the best of the author’s knowledge, this is likely the first paper or one of the first dedicated fully to anti-surveillance and advocacy in Africa.

Details

Journal of Information, Communication and Ethics in Society, vol. 21 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 13 April 2023

Preeti Khanna and Sayantan Khanra

Citizens often perceive surveillance by government authorities as oppressive and, hence, demonstrate reluctance in value co-creation from such services. This study aims to…

Abstract

Purpose

Citizens often perceive surveillance by government authorities as oppressive and, hence, demonstrate reluctance in value co-creation from such services. This study aims to investigate the challenges and benefits of citizen empowerment through technology-driven surveillance or “smart surveillance.”

Design/methodology/approach

Guided by Dynamic Capability theory, the authors conduct in-depth interviews with officers in-charge of surveillance in smart cities. Given the contemporary advancements, this approach allows a retrospective and real-time understanding of interviewees’ experiences with smart surveillance.

Findings

The authors develop five propositions for citizen empowerment through smart surveillance to summarize the findings of this study.

Research limitations/implications

This study advances the relevance of Dynamic Capability in public administration.

Practical implications

Smart city authorities and policymakers may leverage the insights provided in this study to design appropriate policies for smart surveillance.

Originality/value

The authors find that factors such as digital technology and infrastructure, information management, skill divide and perceived return on investment may influence citizen empowerment through smart surveillance.

Details

Digital Policy, Regulation and Governance, vol. 25 no. 4
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 11 August 2022

Albena Dzhurova and Arthur Sementelli

This paper examines how contemporary workplace surveillance can simultaneously incentivize and commodify workforce behavior. Specifically, workplace surveillance is…

Abstract

Purpose

This paper examines how contemporary workplace surveillance can simultaneously incentivize and commodify workforce behavior. Specifically, workplace surveillance is reconceptualized as rent-seeking, which offers a framework for analyzing novel employer-employee relationships stemming from alternate views of risk and reward.

Design/methodology/approach

The case of workplace microchipping is studied qualitatively as a backdrop for theorizing emergent labor relations in the context of surveillance capitalism and biopolitics.

Findings

Reconsidering surveillance within the context of personal risk and entrepreneurial lure offers much to 21st century discourse on labor and supervision. It is imperative that the public sector engages in appropriate regulatory protocols to manage emergent behavior in organizations.

Originality/value

This study departs from the popular conceptualization of human microchipping as an intersection of legal and ethical considerations of surveillance. Instead, the authors examine a different aspect of the microchipping phenomenon, taking into account employee creative reactions to employer surveillance in the context of risk and return.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/IJSE-01-2022-0009

Details

International Journal of Social Economics, vol. 50 no. 1
Type: Research Article
ISSN: 0306-8293

Keywords

Article
Publication date: 7 March 2023

Miral Sabry AlAshry

The purpose of this study is to investigate the extent of digital surveillance by Arab authorities, which face risks and threats of surveillance, and how journalists seek to press…

Abstract

Purpose

The purpose of this study is to investigate the extent of digital surveillance by Arab authorities, which face risks and threats of surveillance, and how journalists seek to press freedom by using tools and techniques to communicate securely.

Design/methodology/approach

The study used focus group discussions with 14 journalists from Syria, Saudi Arabia, Libya, Yemen, Oman, Jordan and Egypt. While in Egypt, questionnaires were distributed to 199 journalists from both independent and semi-governmental outlets to investigate how Egyptian journalists interpret the new data protection law and its implications for press freedom.

Findings

The study indicated that journalists from these countries revealed severe censorship by their respective governments, an element inconsistent with the Arab Constitution. The recommendation of the study encourages media organisations to play a more active role in setting policies that make it easier for journalists to adopt and use digital security tools, while Egyptian journalists see the law as a barrier to media independence because it allows the government to exercise greater information control through digital policy and imposes regulatory rules on journalists.

Practical implications

The study identifies practical and theoretical issues in Arab legislation and may reveal practices of interest to scientists researching the balance between data protection, the right of access to information and media research as an example of contemporary government indirect or “soft” censorship methods.

Originality/value

To the best of the authors’ knowledge, this paper is one of the first research contributions to analyse the relationships between Arab authoritarians who used surveillance to restrict freedom of the press after the Arab Spring revolutions of 2011 to keep themselves in power as long as they could. In addition, Egypt's use of surveillance under new laws allowed the regimes to install software on the journalists’ phones that enabled them to read the files and emails and track their locations; accordingly, journalists can be targeted by the cyberattack and can be arrested.

Details

Digital Policy, Regulation and Governance, vol. 25 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 15 June 2015

Sami Kajalo and Arto Lindblom

The purpose of this paper is to analyse how retailers view the links between security problems, investments in formal and informal surveillance, the sense of security felt among…

1033

Abstract

Purpose

The purpose of this paper is to analyse how retailers view the links between security problems, investments in formal and informal surveillance, the sense of security felt among customers and employees, and the competitiveness of the store.

Design/methodology/approach

The study utilizes elements of the theory of Crime Prevention Through Environmental Design (CPTED) in its theoretical approach. Thus, surveillance investments are divided into formal and informal surveillance investments. The theoretical model is tested using structural equation modelling (SEM) with data collected among grocery store retailers.

Findings

The study shows that security problems have a positive impact on investments in formal surveillance but no impact on investments in informal surveillance. Furthermore, retailers perceive that formal surveillance investments have a negative impact on the sense of security felt among customers and employees, whereas informal surveillance investments have a positive impact. In addition, retail entrepreneurs perceive that the sense of security felt among customers and employees has a positive impact on the competitiveness of the store.

Research limitations/implications

The impact of investments in security should also be studied from other viewpoints than just retailers. In addition, conceptual and qualitative empirical studies are needed to obtain a clearer understanding of the effectiveness of surveillance in the store environment.

Practical implications

The paper shows retailers the linkages between different types of surveillance investments and the sense of security felt among consumers and retail employees.

Originality/value

The present research provides empirical evidence on how investments in security are linked to the competitiveness of retail stores.

Details

Property Management, vol. 33 no. 3
Type: Research Article
ISSN: 0263-7472

Keywords

Article
Publication date: 4 April 2008

Riikka Vuokko

The purpose of this paper is to explore how surveillance facilitates new power relationships.

1583

Abstract

Purpose

The purpose of this paper is to explore how surveillance facilitates new power relationships.

Design/methodology/approach

This longitudinal qualitative study is predicated on observations of the home care workers interacting with their managers and clients. The emerging picture was complemented with interviews of the participants. The home care workers were chosen as being crucial in the construction of new everyday relationships, and their interpretations were given most value in presenting how surveillance and monitoring relationships are constructed as embedded mundane practices and as emerging from practical needs.

Findings

The paper discusses an implementation and use case of surveillance capable technology in a social home care setting. The findings suggest discrepancy of how surveillance is being interpreted by different participants depending on their positioning in the context of use.

Originality/value

The study presents a case study where surveillance issues emerge not only at the workplace but also in the domestic sphere. The paper explores the workers' role in defining surveillance at the workplace, and questions the limits of legitimate surveillance in the social care context concerning vulnerable citizens as clients.

Details

Journal of Information, Communication and Ethics in Society, vol. 6 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 1 February 2002

Geoff Watson

Examines the utilisation of e‐mail scanning and surveillance technology by the management consulting business in the UK. Uses a questionnaire of UK management consulting firms to…

2330

Abstract

Examines the utilisation of e‐mail scanning and surveillance technology by the management consulting business in the UK. Uses a questionnaire of UK management consulting firms to determine the uptake and substance of e‐mail policies, and the extent and nature of e‐mail monitoring implementation. Investigates the attitudes of management consulting employees towards e‐mail surveillance in a survey of work colleagues. Also considers e‐mail monitoring issues. Concludes that forms of workplace e‐mail monitoring are becoming more widespread. Awareness of the ramifications for worker privacy is growing, due partly to recent Government legislation. Finds that e‐mail policy adoption rates among management consultancies are comparatively low, as are levels of e‐mail scanning/surveillance software installation. Predicts that maintaining a fair balance between conflicting business and employee interests will be the key to determining the future direction of workplace e‐mail monitoring.

Details

Aslib Proceedings, vol. 54 no. 1
Type: Research Article
ISSN: 0001-253X

Keywords

21 – 30 of over 16000