Empowerment: Analyzing Technologies of Multiple Variable Visibility

This paper notes the emergence of technologies of multiple variable visibility – that is, technologies that render individuals visible to diverse interests simultaneously via the corporate ownership of intimate personal data. Focusing on Facebook, a classic example of technology of this genre, I argue that the various levels of visibility that are facilitated by these technologies cannot and should not be analyzed in isolation from one another. The complex dynamics of power that are mobilized via the strategic employment of multiple visibilities complicates the representation of many surveillance technologies as one-dimensional conduits for empowerment or exploitation. In the context of these technologies, I argue that visibilities (plural) facilitate combined experiences of empowerment and disempowerment, a process that not only speaks to the type of data collection that is enabled through this process but also implies a whole serious of implications specific to their use.

[1]  A. Felt Privacy Protection for Social Networking APIs , 2008 .

[2]  T. Monahan Identity theft vulnerability , 2009 .

[3]  Nothing to Hide, Nothing to Fear? , 2007 .

[4]  DNA identification and surveillance creep , 1999 .

[5]  Andrea Mubi Brighenti,et al.  Visibility A Category for the Social Sciences , 2007 .

[6]  David J. Phillips,et al.  From Privacy to Visibility CONTEXT, IDENTITY, AND POWER IN UBIQUITOUS COMPUTING ENVIRONMENTS , 2005 .

[7]  David Lyon,et al.  The Electronic Eye: The Rise of Surveillance Society , 1994 .

[8]  C. Goodwin Privacy: Recognition of a Consumer Right , 1991 .

[9]  Jennifer R. Whitson,et al.  Identity theft and the care of the virtual self , 2008 .

[10]  Andrés Sanchez,et al.  Facebook Feeding Frenzy: Resistance-through-Distance and Resistance-through-Persistence in the Societied Network , 2009 .

[11]  Celia Lury,et al.  Cultural Rights: Technology, Legality and Personality.@@@The Panoptic Sort: A Political Economy of Personal Information. , 1993 .

[12]  R. Ericson,et al.  The surveillant assemblage. , 2000, The British journal of sociology.

[13]  Mark Andrejevic,et al.  iSpy: Surveillance and Power in the Interactive Era , 2007 .

[14]  Viktor Mayer-Schönberger,et al.  Delete: The Virtue of Forgetting in the Digital Age , 2009 .

[15]  P. Bourdieu,et al.  实践与反思 : 反思社会学导引 = An invitation to reflexive sociology , 1994 .

[16]  Lucas D. Introna,et al.  Picturing Algorithmic Surveillance: The Politics of Facial Recognition Systems , 2002, Surveillance & Society.

[17]  Cliff Lampe,et al.  The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..

[18]  Danah Boyd,et al.  Social network sites: definition, history, and scholarship , 2007, IEEE Engineering Management Review.

[19]  A. Minnaar Balancing public safety and security demands with civil liberties in a new constitutional democracy: The case of post-1994 South Africa and the growth of residential security and surveillance measures , 2010 .

[20]  Andrew McLaughlin The Whale and the Reactor: A Search for Limits in an Age of High Technology , 1987 .

[21]  A. Lenhart,et al.  Teens, privacy and online social networks: How teens manage their online identities and personal information in the age of MySpace , 2007 .

[22]  Bob Pease,et al.  Rethinking Empowerment: A Postmodern Reappraisal for Emancipatory Practice , 2002 .

[23]  Theresa M. Senft Camgirls: Celebrity and Community in the Age of Social Networks , 2008 .

[24]  H. Koskela Webcams, TV Shows and Mobile phones: Empowering Exhibitionism , 2002 .

[25]  D. Lyon Surveillance Studies: An Overview , 2007 .

[26]  Chris Jay Hoofnagle,et al.  Big Brother's Little Helpers: How Choicepoint and Other Commercial Data Brokers Collect, Process, and Package Your Data for Law Enforcement , 2003 .

[27]  John Gilliom,et al.  Overseers of the Poor: Surveillance, Resistance, and the Limits of Privacy , 2001 .

[28]  Stuart Reeves,et al.  Facebook as a political weapon: Information in social networks , 2009 .

[29]  D. Boyd Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life , 2007 .

[30]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[31]  Jason Martin,et al.  Identity construction on Facebook: Digital empowerment in anchored relationships , 2008, Comput. Hum. Behav..

[32]  R. Petty Marketing without Consent: Consumer Choice and Costs, Privacy, and Public Policy , 2000 .

[33]  K. Haggerty,et al.  Surveillance and Democracy , 2010 .

[34]  Kelly Gates,et al.  IDENTIFYING THE 9/11 ‘FACES OF TERROR’ , 2006 .

[35]  Gary T. Marx,et al.  Undercover: Police Surveillance in America , 1988 .

[36]  Lilian Mitrou The impact of communications data retention on fundamental rights and democracy – the case of the EU Data Retention Directive , 2010 .

[37]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[38]  M. Andrejevic Reality TV: The Work of Being Watched , 2003 .

[39]  M. Andrejevic The Work of Watching One Another: Lateral Surveillance, Risk, and Governance , 2002 .