The counter-control revolution: "silent control" of individuals through dataveillance systems

Purpose – The purpose of this paper is to examine the social impacts of “silent control” of individuals by means of the architecture of dataveillance systems. It addresses the question whether individuals, in reality, can actually determine autonomously the kinds of information that they can acquire and convey in today's dataveillance environments. The paper argues that there is a risk of a “counter‐control revolution” that may threaten to reverse the “control revolution” described by Shapiro.Design/methodology/approach – Using relevant business cases, this paper describes the nature of dataveillance systems, then it examines situations in which the intellectual freedom of individuals is silently constrained by the architecture of such systems. This analysis leads to the conclusion that individuals in today's information society face the risk of a “counter‐control revolution” that can threaten their intellectual freedom. Given this troubling conclusion, the present paper addresses the challenges of establ...

[1]  Thomas Hofmann,et al.  Latent semantic models for collaborative filtering , 2004, TOIS.

[2]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .

[3]  James Surowiecki The wisdom of crowds: Why the many are smarter than the few and how collective wisdom shapes business, economies, societies, and nations Doubleday Books. , 2004 .

[4]  Alexander Halavais,et al.  Search Engine Society , 2008 .

[5]  H. Simon,et al.  Administrative Behavior: A Study of Decision-Making Processes in Administrative Organization. , 1959 .

[6]  D. Lyon Surveillance as social sorting : privacy, risk, and digital discrimination , 2003 .

[7]  John Battelle The Search: How Google and Its Rivals Rewrote the Rules of Business and Transformed Our Culture , 2005 .

[8]  Reginald Whitaker,et al.  The End of Privacy: How Total Surveillance Is Becoming a Reality , 1999 .

[9]  Lucas D. Introna Privacy and the computer: why we need privacy in the information society , 1997 .

[10]  J. Moor What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.

[11]  Richard C. Leone,et al.  The Control Revolution , 1999 .

[12]  Roger A. Clarke,et al.  Information technology and dataveillance , 1988, CACM.

[13]  C. Sunstein Republic.com , 2001 .

[14]  Laurence Ashworth,et al.  Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers’ Online Privacy Concerns , 2006 .

[15]  Michael Zimmer,et al.  The Gaze of the Perfect Search Engine: Google as an Infrastructure of Dataveillance , 2008 .

[16]  N. Ben Fairweather,et al.  Politics and society after de massification of the media , 2005 .

[17]  Helen Nissenbaum,et al.  Shaping the Web: Why the Politics of Search Engines Matters , 2000, Inf. Soc..

[18]  D. Lyon Surveillance society: Monitoring Everyday Life , 2001 .