Big Data Surveillance: Introduction

If conventional definitions of surveillance emphasize its systematic and targeted character (the notion that there is a specific "object" of surveillance), both aspects undergo some significant modifications when the goal is, generally speaking, to capture as much data as possible about everything, all the time, and hold on to it forever. [...]the ambitious scope of such surveillance raises a host of important issues associated with the infrastructure for collecting and storing huge amounts of data as well as the techniques and technologies for putting it to use. What is significant about the big data moment is not simply that it has become possible to store quantities of data that are impossible for any individual to comprehend (The Library of Alexandria did that, as does the night sky, and the human brain), but the fact that this data can be put to use in novel ways-for assessing disease distributions, tracking business trends, mapping crime patterns, analysing web traffic, and predicting everything from the weather to the behavior of the financial markets, to name but a few examples.

[1]  Benoît Demil,et al.  The box : how the shipping container made the world smaller and the world economy bigger , 2006 .

[2]  Shoshana Amielle Magnet,et al.  When Biometrics Fail: Gender, Race, and the Technology of Identity , 2011 .

[3]  Julie E. Cohen,et al.  What Privacy Is For , 2012 .

[4]  R. Ericson,et al.  The surveillant assemblage. , 2000, The British journal of sociology.

[5]  David Murakami Wood What is global surveillance? Towards a relational political economy of the global surveillant assemblage , 2013 .

[6]  Jeremy Packer,et al.  “Epistemology Not Ideology OR Why We Need New Germans” , 2013 .

[7]  Kelly Gates,et al.  Our Biometric Future: Facial Recognition Technology and the Culture of Surveillance , 2011 .

[8]  Sam Lightstone,et al.  Data Mining - Know It All , 2008 .

[9]  Cameron Tonkinwise,et al.  To Save Everything, Click Here: The Folly of Technological Solutionism , 2014 .

[10]  William Bogard,et al.  The Simulation of Surveillance: Hypercontrol in Telematic Societies , 1996 .

[11]  Francisco Klauser Political geographies of surveillance , 2013 .

[12]  Tomas A. Lipinski,et al.  Niche Envy: Marketing Discrimination in the Digital Age , 2009 .

[13]  Mimi Sheller,et al.  Border work: surveillant assemblages, virtual fences, and tactical counter-media , 2013 .

[14]  Roger A. Clarke,et al.  Information technology and dataveillance , 1988, CACM.

[15]  Mark B. Salter,et al.  To Make Move and Let Stop: Mobility and the Assemblage of Circulation , 2013 .

[16]  Eric Gossett,et al.  Big Data: A Revolution That Will Transform How We Live, Work, and Think , 2015 .

[17]  Jeanne G. Harris,et al.  Competing on Analytics: The New Science of Winning , 2007 .