Human beings are routinely aware of their environment, noting the behavior of others nearby. This surveillance occurs in every social system, including on social media websites such as Twitter, Google+, YouTube, and Facebook. The companies providing these services use this data to create profiles that can be used to show users targeted advertisements. This has been enabled by rapid development of computing and communication technologies.
Social media users spend a great deal of time curating online “exhibitions” of different aspects of their identities. This is especially important to young people developing independent identities and peer relationships. The use of social networks is a key part of this process in advanced economies, critical for friendships, social capital, and popularity. Social media surveillance reduces individuals' control over the information they disclose about their attributes in different social contexts, often to powerful actors such as the state or multinational corporations. This limits their ability to regulate their social interactions and identities. It may also have a “chilling effect” on the possibilities for whistle-blowing and democratic activism. More broadly, new surveillance technologies can lead to “social sorting,” where discrimination and privilege are entrenched through the unplanned consequences of data gathering and analysis.
Keywords:
human rights;
identity;
new media;
privacy;
social media;
sousveillance;
surveillance
[1]
D. Lyon.
Surveillance society: Monitoring Everyday Life
,
2001
.
[2]
Jason Nolan,et al.
Sousveillance: Inventing and Using Wearable Computing Devices for Data Collection in Surveillance Environments.
,
2002
.
[3]
Michalis Lianos.
Social Control After Foucault / Le Contrôle Social après Foucault.
,
2002
.
[4]
David Murakami Wood,et al.
Social Control after Foucault.
,
2003
.
[5]
Sonia Livingstone,et al.
Children's Privacy Online: Experimenting with Boundaries Within and Beyond the Family
,
2006,
Computers, Phones, and the Internet.
[6]
A. Joinson,et al.
Self-disclosure, Privacy and the Internet
,
2009
.
[7]
O. Gandy.
Engaging rational discrimination: exploring reasons for placing regulatory constraints on decision support systems
,
2010,
Ethics and Information Technology.
[8]
Questions of Surveillance
,
2009
.
[9]
Keith Guzik,et al.
Discrimination by Design: predictive data mining as security practice in the United States’ ‘war on terrorism’
,
2009
.
[10]
Como podemos definir vigilância
,
2011
.
[11]
D. Lyon,et al.
Introducing surveillance studies
,
2012
.