References
- Aas, K. F. 2006. ‘The body does not lie’: Identity, risk and trust in technoculture. Crime, Media, Culture 2 (2):143–58.
- Akrich, M. 1992. The de-scription of technological objects. In Shaping technology/Building society: Studies in sociotechnical change, ed. W. E. Bijker, and John Law, 205–24. Cambridge, MA: The MIT Press.
- Alder, G. S., M. L. Ambrose, and T. W. Noel. 2006. The effect of formal advance notice and justification on Internet monitoring fairness: Much about nothing? Journal of Leadership & Organizational Studies 13 (1):93–107.
- American Civil Liberties Union. 2015. Stingray tracking devices: Who's got them? http://www.aclu.org/map/stingray-tracking-devices-whos-got-them (accessed February 16, 2016).
- Andrejevic, M. 2007. iSpy: Surveillance and power in the interactive era. Lawrence, KS: University Press of Kansas.
- Andrejevic, M. 2013. Infoglut: How too much information is changing the way we think and know. New York, NY: Routledge.
- Arabe, K. C. 2003. “Dummy” thermostats cool down tempers, not temperatures. ThomasNet News, April 11. http://news.thomasnet.com/imt/2003/04/11/dummy_thermosta (accessed August 30, 2015).
- Arditi, D. 2013. iTunes: Breaking barriers and building walls. Popular Music and Society 37 (4):408–24.
- Ball, K. 2010. Workplace surveillance: An overview. Labor History 51 (1):87–106.
- Baral, S. 2012. EcoInsight thermostats reduce Hilton Hotels energy usage by 35%. Greener Ideal, November 19. http://www.greenerideal.com/business/1119-ecoinsight-thermostats-save-hilton-hotels-energy (accessed September 5, 2015).
- Baraniuk, C. 2015. Press me! The buttons that lie to you. BBC.com, April 17. http://www.bbc.com/future/story/20150415-the-buttons-that-do-nothing (accessed August 30, 2015).
- Barrett, D. 2014. Americans' cellphones targeted in secret U.S. Spy program. Wall Street Journal, November 13. http://www.wsj.com/articles/americans-cellphones-targeted-in-secret-u-s-spy-program-1415917533 (accessed September 5, 2015).
- Bowker, G. C., and S. L. Star. 1999. Sorting things out: Classification and its consequences. Cambridge, MA: MIT Press.
- boyd, D., and K. Crawford. 2012. Critical questions for big data. Information, Communication & Society 15 (5):662–79.
- Browne, S. 2015. Dark matters: On the surveillance of blackness. Durham, NC: Duke University Press.
- Brucato, B. 2015. Policing made visible: Mobile technologies and the importance of point of view. Surveillance & Society 13 (3/4):455–73.
- Brunton, F., and H. Nissenbaum. 2011. Vernacular resistance to data collection and analysis: A political theory of obfuscation. First Monday 16 (5). http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/3493/2955 (accessed July 19, 2011).
- Campbell-Dollaghan, K. 2013. Brave new garbage: London's trash cans track you using your smartphone. Gizmodo, August 9. http://gizmodo.com/brave-new-garbage-londons-trash-cans-track-you-using-1071610114 (accessed September 5, 2015).
- Carey, J. W. 1992. Communication as culture: Essays on media and society. New York, NY: Routledge.
- CBS/AP. 2013. U.K. bars trash cans from tracking people with Wi-Fi. August 12. http://www.cbsnews.com/news/uk-bars-trash-cans-from-tracking-people-with-wi-fi (accessed September 5, 2015).
- Chamayou, G. 2012. Manhunts: A philosophical history, trans. S. Rendall. Princeton, NJ: Princeton University Press.
- Cobley, P. 2001. The Routledge companion to semiotics and linguistics. New York, NY: Routledge.
- Cohen, J. E. 2008a. Privacy, visibility, transparency, and exposure. University of Chicago Law Review 75 (1):181–201.
- Cohen, J. E. 2012. Configuring the networked self: Law, code, and the play of everyday practice. New Haven, CT: Yale University Press.
- Cohen, N. S. 2008b. The valorization of surveillance: Towards a political economy of facebook. Democratic Communiqué 22 (1):5–22.
- Cole, S. A., and H. N. Pontell. 2006. “Don't be low hanging fruit”: Identity theft as moral panic. In Surveillance and security: Technological politics and power in everyday life, ed. T. Monahan, 125–47. New York, NY: Routledge.
- Couldry, N. 2003. Media rituals: A critical approach. New York, NY: Routledge.
- CresendoCrook. 2015. TIL: Honeywell thermostats have a function that allows hotels/landlords to misrepresent room temperature up to +/− 3 degrees. Reddit.com. http://www.reddit.com/r/todayilearned/comments/2ru820/til_honeywell_thermostats_have_a_function_that/ (accessed September 5, 2015).
- Cushing, T. 2013. LG smart TV caught collecting data on files stored on connected USB drives. Techdirt, November 20. http://www.techdirt.com/articles/20131119/06503625288/lg-smart-tv-caught-collecting-data-files-stored-connected-usb-drives.shtml (accessed September 5, 2015).
- Doctorow, C. 2014. US marshals raid Florida cops to prevent release of records of “stingray” surveillance. BoingBoing.net, June 4. https://boingboing.net/2014/06/04/us-marshals-raid-florida-cops.html (accessed September 5, 2015).
- Dwoskin, E. 2014. New York city shuts down unauthorized sensors. Wall Street Journal, October 7. http://blogs.wsj.com/digits/2014/10/07/new-york-city-shuts-down-unauthorized-sensors (accessed September 5, 2015).
- Fandos, N. 2015. Justice Dept. to require warrants for some cellphone tracking. New York Times, September 3. http://www.nytimes.com/2015/09/04/us/politics/justice-dept-to-require-warrants-for-some-cellphone-tracking.html (accessed September 5, 2015).
- Farivar, C. 2014. Cities scramble to upgrade “stingray” tracking as end of 2G network looms. Ars Technica, September 1. http://arstechnica.com/tech-policy/2014/09/cities-scramble-to-upgrade-stingray-tracking-as-end-of-2g-network-looms (accessed August 30, 2015).
- Fitchett, J., and M. Lim. 2008. Consumer experiences in the “house of the future”: An enquiry into surveillance-based consumer research techniques. Consumption Markets & Culture 11 (2):137–49.
- Gates, K., and S. Magnet. 2007. Communication research and the study of surveillance. The Communication Review 10 (4):277–93.
- Gilliom, J., and T. Monahan. 2013. SuperVision: An introduction to the surveillance society. Chicago, IL: University of Chicago Press.
- Gillum, J., E. Sullivan, and E. Tucker. 2015. FBI behind mysterious fleet of aircraft conducting surveillance over US cities. June 2. Star Tribune. http://www.startribune.com/fbi-behind-mysterious-surveillance-aircraft-over-us-cities/305793361 (accessed September 5, 2015).
- Gregg, M. 2013. Spousebusting: Intimacy, adultery, and surveillance technology. Surveillance & Society 11 (3):301–10.
- Grochmal, G. 2013. Energy management systems for hotel guest rooms. EcoGreenHotel, October 24. http://www.ecogreenhotel.com/blog/energy-management-systems-for-hotel-guest-rooms (accessed August 30, 2015).
- Haggerty, K. D., and R. V. Ericson. 2000. The surveillant assemblage. British Journal of Sociology 51 (4):605–22.
- Hall, R. 2015. The transparent traveler: The performance and culture of airport security. Durham, NC: Duke University Press.
- Han, B.-C. 2015. The transparency society. Stanford, CA: Stanford University Press.
- Handley, J. 2014. Slip of an officer's tongue suggests police are monitoring #BlackLivesMatter protesters' cell phones. In These Times, December 19. http://inthesetimes.com/article/17476/a_slip_of_an_officers_tongue_suggests_police_are_monitoring_ferguson_protes (accessed August 30, 2015).
- Harris, S. 2015. Your Samsung SmartTV Is spying on you, basically. The Daily Beast, February 5. http://www.thedailybeast.com/articles/2015/02/05/your-samsung-smarttv-is-spying-on-you-basically.html (accessed August 30).
- Hasek, G. 2011. Energy management system suppliers build on proven, money-saving technologies. Green Lodging News, February 7. http://www.greenlodgingnews.com/energy-management-system-suppliers-build-on-proven (accessed September 5, 2015).
- Henry, A. 2013. Override your hotel room thermostat and set it as hot or cold you like. Lifehacker.com, November 12. http://lifehacker.com/override-your-hotel-room-thermostat-and-set-it-as-hot-o-1462595059 (accessed September 5, 2015).
- Hoffelder, N. 2014. Adobe is spying on users, collecting data on their eBook libraries. The Digital Reader, October 6. http://the-digital-reader.com/2014/10/06/adobe-spying-users-collecting-data-ebook-libraries (accessed September 5, 2015).
- Honeywell. 2015. ecoMODE. Inncom.com. http://www.inncom.com/catalog/item/ecomode (accessed September 5, 2015).
- InterGuard. 2015. InterGuard: Employee monitoring software. http://www.interguardsoftware.com (accessed September 5, 2015).
- Introna, L. D. 2000. Workplace surveillance, privacy and distributive justice. Computers and Society 30 (4):33–39.
- Kiser, A. I. T., T. Porter, and D. Vequist. 2010. Employee monitoring and ethics: Can they co-exist? International Journal of Digital Literacy and Digital Competence 1 (3):30–45.
- Kiss, S., and V. Mosco. 2005. Negotiating electronic surveillance in the workplace: A study of collective agreements in Canada. Canadian Journal of Communication 30 (4):549–64.
- Langer, E. J. 1975. The illusion of control. Journal of Personality and Social Psychology 32 (2):311–28.
- Leonardi, P. M. 2012. Car crashes without cars: Lessons about simulation technology and organizational change from automotive design. Cambridge, MA: MIT Press.
- Lyon, D. 2014. Surveillance, Snowden, and big data: Capacities, consequences, critique. Big Data & Society 1 (2):1–13.
- Lyon, D. 2015. Surveillance after Snowden. Malden, MA: Polity.
- Maass, D. 2014. ComputerCOP: The dubious ‘Internet safety software’ that hundreds of police agencies have distributed to families. Electronic Frontier Foundation, October 1. http://www.eff.org/deeplinks/2014/09/computercop-dangerous-internet-safety-software-hundreds-police-agencies (accessed September 5, 2015).
- Marx, G. T., and V. Steeves. 2010. From the beginning: Children as subjects and agents of surveillance. Surveillance & Society 7 (3/4):192–230.
- Mason, C., and S. Magnet. 2012. Surveillance studies and violence against women. Surveillance & Society 10 (2):105–18.
- Mayer-Schönberger, V., and K. Cukier. 2013. Big data: A revolution that will transform how we live, work, and think. Boston, MA: Houghton Mifflin Harcourt.
- Monahan, T. 2009. Identity theft vulnerability: Neoliberal governance through crime construction. Theoretical Criminology 13 (2):155–76.
- Monahan, T. 2010. Surveillance in the time of insecurity. New Brunswick, NJ: Rutgers University Press.
- Monahan, T. 2015. The right to hide? Anti-surveillance camouflage and the aestheticization of resistance. Communication and Critical/Cultural Studies 12 (2):159–78.
- Morozov, E. 2013. Is smart making us dumb? Wall Street Journal, February 23. http://www.wsj.com/articles/SB10001424127887324503204578318462215991802 (accessed June 19, 2015).
- Mosco, V. 2014. To the cloud: Big data in a turbulent world. New York, NY: Paradigm.
- Mumby, D. K. 2005. Theorizing resistance in organization studies: A dialectical approach. Management Communication Quarterly 19 (1):19–44.
- Murakami Wood, D., and K. Ball. 2013. Brandscapes of control? Surveillance, marketing and the co-construction of subjectivity and space in neo-liberal capitalism. Marketing Theory 13 (1):47–67.
- My Team Monitor. 2013a. Employer interface video. http://www.myteammonitor.com (accessed September 5, 2015).
- My Team Monitor. 2013b. Introductory video. http://www.myteammonitor.com (accessed September 5, 2015).
- Oatman, M. 2015. Chilling effect: How air conditioning is making us hotter. Mother Jones, September/October, 66–67.
- Oudshoorn, N. 1999. On masculinities, technologies, and pain: The testing of male contraceptives in the clinic and the media. Science, Technology, and Human Values 24 (2):265–89.
- Owano, N. 2013. SideWays eye-tracking system shown at Paris conference (w/ video). Phys.org, May 1. http://phys.org/news/2013-05-sideways-eye-tracking-shown-paris-conference.html (accessed August 16, 2015).
- Packer, J., and S. B. C. Wiley, eds. 2012. Communication matters: Materialist approaches to media, mobility and networks. New York, NY: Routledge.
- Pasquale, F. 2015. The black box society: The secret algorithms that control money and information. Cambridge, MA: Harvard University Press.
- Pelican Wireless Systems. 2011. Renaissance ClubSport hotel reduces HVAC energy costs by 35%. Pelican Wireless Systems. http://www.pelicanwireless.com/case-studies/clubsport-renaissance-hotel-reduces-hvac-energy-costs-by-35 (accessed September 5, 2015).
- Peters, J. D. 1999. Speaking into the air: A history of the idea of communication. Chicago, IL: University of Chicago Press.
- Pfaffenberger, B. 1992. Technological dramas. Science, Technology, and Human Values 17 (3):282–312.
- Plumer, B. 2015. Volkswagen's appalling clean diesel scandal, explained. Vox.com, September 23. http://www.vox.com/2015/9/21/9365667/volkswagen-clean-diesel-recall-passenger-cars (accessed October 12, 2015).
- Poulter, S. 2012. 24,000 ‘died because of cold homes’ last winter: Fears grow that figure could be higher this year because of spiralling bills. The Daily Mail, November 29. http://www.dailymail.co.uk/news/article-2240716/24-000-died-cold-homes-winter-Fears-grow-figure-higher-year-spiralling-bills.html (accessed August 31, 2015).
- Quintin, C. 2014. What we can learn from the Adobe e-reader mess. Electronic Frontier Foundation, October 31. http://www.eff.org/deeplinks/2014/10/what-we-can-learn-adobe-e-reader-mess (accessed September 5, 2015).
- Ranger, S. 2014. What is Apple iBeacon? Here's what you need to know. ZDNet.com, June 10. http://www.zdnet.com/article/what-is-apple-ibeacon-heres-what-you-need-to-know (accessed September 5, 2015).
- Regan, P. M. 2003. Privacy and commercial use of personal data: Policy developments in the United States. Journal of Contingencies and Crisis Management 11 (1):12–18.
- Rogot, E., P. D. Sorlie, and E. Backlund. 1992. Air-conditioning and mortality in hot weather. American Journal of Epidemiology 136 (1):106–16.
- Rosenthal, E., and A. W. Lehren. 2012. Relief in every window, but global worry too. New York Times. http://www.nytimes.com/2012/06/21/world/asia/global-demand-for-air-conditioning-forces-tough-environmental-choices.html (accessed August 31, 2015).
- RT.com. 2014. Mysterious unidentified spying cell towers found across. Washington, DC: RT.com. http://www.rt.com/usa/189116-washington-dc-spying-phone (accessed September 5, 2015).
- Sandberg, J. 2003. Employees only think they control thermostat. Wall Street Journal, January 15. http://www.wsj.com/articles/SB1042577628591401304 (accessed August 30, 2015).
- Schneider Electric. 2010. Cassia energy management system [promotional brochure]. May. http://www.schneider-electric.com/solutions/au/en/med/4664417/application/pdf/1056-cassia-6pg-promotional-brochure.pdf (accessed September 5, 2015).
- Schneider Electric. 2015. Cassia™ in-room energy management system. Schneider Electric USA. http://www.schneider-electric.us/en/product-range/61302-cassia–in-room-energy-management-system (accessed August 30, 2015).
- Schüll, N. D. 2012. Addiction by design: Machine gambling in Las Vegas. Princeton, NJ: Princeton University Press.
- Sharma, S. 2014. In the meantime: Temporality and cultural politics. Durham, NC: Duke University Press.
- Slack, J. D., and J. M. Wise. 2005. Culture and technology: A primer. New York, NY: Peter Lang.
- Spitzberg, B. H., and W. R. Cupach. 2011a. The dark side of interpersonal communication, 2nd ed. New York, NY: Routledge.
- Spitzberg, B. H., and W. R. Cupach. 2011b. Disentangling the dark side of interpersonal communication. In The dark side of interpersonal communication, ed. B. H. Spitzberg and W. R. Cupach, 3–28. New York, NY: Routledge.
- Staples, W. G. 2014. Everyday surveillance: Vigilance and visibility in postmodern life. 2nd ed. Lanham, MD: Rowman & Littlefield.
- Strohmeyer, R. 2011. How to monitor your employees' PCs without going too far. PC World, March 22. http://www.pcworld.com/article/222169/how_to_monitor_your_employees_without_going_too_far.html (accessed September 5, 2015).
- Taylor, F. W. 1911. The principles of scientific management. New York, NY: Harper & Brothers.
- TeenSafe. 2015. TeenSafe: iPhone tracker and cell phone monitoring. http://www.teensafe.com (accessed August 16, 2015).
- Tobii. 2015. Advertising research and eye tracking. Tobii.com, May 1. http://www.tobii.com/eye-tracking-research/global/research/advertising-research (accessed August 16, 2015).
- Wall, T. 2013. Unmanning the police manhunt: Vertical security as pacification. Socialist Studies 9 (2):32–56.
- Whitson, J. R., and K. D. Haggerty. 2008. Identity theft and the care of the virtual self. Economy and Society 37 (4):572–94.
- Winner, L. 1980. Do artifacts have politics? Daedalus 109:121–36.
- Winner, L. 1986. The whale and the reactor: A search for limits in an age of high technology. Chicago, IL: University of Chicago Press.
- Woolley, J., M. Pritoni, M. Modera, and T. Peffer. 2014. Why occupancy-responsive adaptive thermostats do not always save—and the limits for when they should. Paper read at ACEEE Summer Study on Energy Efficiency in Buildings. aceee.org/files/proceedings/2014/data/papers/3-490.pdf (accessed September 5, 2015).
- Wrege, C. D., and A. G. Perroni. 1974. Taylor's pig-tale: A historical analysis of Frederick W. Taylor's pig-iron experiments. Academy of Management Journal 17 (1):6–27.
- Zetter, K. 2014. U.S. Marshals seize cops' spying records to keep them from the ACLU. Wired.com, June 3. http://www.wired.com/2014/06/feds-seize-stingray-documents (accessed September 5, 2015).