Assessing Security Technology’s Impact: Old Tools for New Problems

The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for the use of surveillance technologies. These distinctions developed in the physical world and are rooted in a cultural understanding of pre-digital culture. Attempts to capture the problems emerging with the implementation of security technologies using legal reasoning encounter a number of problems since law is by definition oriented backwards, adapting new developments to existing traditions, whereas the intrusion of new technologies in the physical world produces changes and creates fundamentally new problems.

[1]  Daniel J. Solove,et al.  Privacy and Power: Computer Databases and Metaphors for Information Privacy , 2001 .

[2]  B. Glassner The Culture of Fear: Why Americans Are Afraid of the Wrong Things , 1999 .

[3]  Paul Henman,et al.  Alternatives : global, local, political , 2004 .

[4]  Claire Haggett Risk and Responsibility at 30,000 Feet , 2010 .

[5]  P. Badke-Schaub,et al.  Human Factors: Psychologie Sicheren Handelns in Risikobranchen , 2012 .

[6]  N. Luhmann Risk: A Sociological Theory , 1993 .

[7]  A. Giddens The consequences of modernity , 1990 .

[8]  M. Goede,et al.  The Politics of Preemption and the War on Terror in Europe , 2008 .

[9]  Gernot Böhme,et al.  Das Andere der Vernunft : zur Entwicklung von Rationalitätsstrukturen am Beispiel Kants , 1985 .

[10]  Didier Bigo,et al.  Security and Immigration: Toward a Critique of the Governmentality of Unease , 2002 .

[11]  Gary T. Marx Surveillance Studies , 2015 .

[12]  D. Boyd Facebook's Privacy Trainwreck , 2008 .

[13]  David Lyon,et al.  The Electronic Eye: The Rise of Surveillance Society , 1994 .

[14]  T. Abel,et al.  Mind, Self, and Society , 1934 .

[15]  S. Brown The criminology of hybrids , 2006 .

[16]  Michaelis Lianos DANGERIZATION AND THE END OF DEVIANCE The Institutional Environment , 2000 .

[17]  R. Ekins,et al.  The Transgender Phenomenon , 2006 .

[18]  Nikolas Rose,et al.  Foucault and Political Reason: Liberalism, Neo-Liberalism, and Rationalities of Government , 1997 .

[19]  Coen Van Gulijk,et al.  Airport security: An ethnographic study , 2012 .

[20]  A. J. Grimes Normal Accidents: Living with High Risk Technologies , 1985 .

[21]  Julie E. Cohen DRM and privacy , 2003, CACM.

[22]  B. Latour The pasteurization of France , 1988 .

[23]  Ulrich Beck,et al.  World Risk Society , 1999 .

[24]  Lucia Zedner,et al.  Pre-crime and post-criminology? , 2007 .

[25]  B. Buzan,et al.  Security: A New Framework for Analysis , 1997 .

[26]  J. Urry,et al.  Economies of signs and space , 1994 .

[27]  J. Urry Sociology beyond societies : mobilities for the twenty-first century , 2000 .

[28]  Stephen J. Collier,et al.  Global assemblages : technology, politics, and ethics as anthropological problems , 2005 .

[29]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[30]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[31]  Katayoun Baghai,et al.  Privacy as a Human Right: A Sociological Theory , 2012 .

[32]  A. Giddens Modernity and Self-Identity: Self and Society in the Late Modern Age , 1992, The New Social Theory Reader.

[33]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[34]  M. Tomasello Origins of human communication , 2008 .

[35]  Reproductive Freedom, Self-Regulation, and the Government of Impairment in Utero , 2005, Hypatia.

[36]  J. Habermas The Structural Transformation of the Public Sphere , 1962 .

[37]  A. Giddens Risk and Responsibility , 1999 .

[38]  T. Meyer Was ist Politik , 2000 .

[39]  F. Braudel,et al.  Civilization And Capitalism, 15Th-18Th Century , 1981 .

[40]  Josef Foschepoth Überwachtes Deutschland: Post- und Telefonüberwachung in der alten Bundesrepublik , 2014 .

[41]  C. B. Macpherson The Political Theory of Possessive Individualism: Hobbes to Locke , 1962 .

[42]  Julien Offray de la Mettrie,et al.  Machine Man and Other Writings: Contents , 1996 .

[43]  Lucia Zedner Securing Liberty in the Face of Terror: Reflections from Criminal Justice , 2005 .