2,619
Views
33
CrossRef citations to date
0
Altmetric
Original Articles

A PLAGUE ON THE PANOPTICON: Surveillance and power in the global information economy

Pages 26-44 | Published online: 02 Dec 2010

REFERENCES

  • Baum an, Z. (1991) Modernity and Ambivalence, Oxford: Polity Press.
  • Bentham,]. (1791) Outline for the Construction of a Panopticon Penitentiary House', in M. Mack (ed.) A Bentham Reader, New York: Pegasus, 1969.
  • Brigham, M. and Corbett, J. (1997) 'E-mail, Power and the Constitution of Organisational Reality', New Technology, Work and Employment 12(1):25-35.
  • Castells, M. (1996) The Rise of the Network Society, Oxford: Blackwell.
  • Clarke, R. (1997), 'Introduction to Dataveillance' and 'Definition of Terms', http://www.anu.edu.au/people/Roger.Clarke/DV/
  • Clegg, S. and Wilson, F. (1991) 'Power, Technology and Flexibility in Organisations', in J. Law (ed.) A Sociology of Monsters, London: Routledge, pp. 223-73.
  • Cox, R.W. (1981), 'Social Forces, State and World Order: Beyond International Relations Theory', Millennium 10(2): 126-65.
  • Dandeker, C. (1990) Surveillance, Power and Modernity, Padstow: Polity Press.
  • Economist (1997) The All-Seeing Eye', November 1:27.
  • Elmer, G. (1997) 'Spaces of Surveillance: Indexicality and Solicitation on the Internet', Critical Studies in Mass Communication 14(1, June): 182-91.
  • Ericson, R. and Haggerty, K. (1997) Policing the Risk Society, Oxford: Clarendon Press.
  • Foucault, M. (1975) Surveiller et punir, t r ans. A. Sheridan, Discipline and Punish, Harmondsworth: Penguin, 1977.
  • Gandy, O. (1993) The Panoptic Sort: A Political Economy of Personal Information, Boulder: Westview.
  • ----- (1996) 'Coming to Terms with the Panoptic Sort', in D. Lyon, and Zureik, E., Computers, Surveillance and Privacy, Minnesota: University of Minnesota Press, pp. 132-55.
  • Giddens, A. (1985) The Nation-State and Violence, Padstow: Polity Press.
  • Gill, S. (1993) 'Epistemology, Ontology and the Italian School', in S. Gill (ed.) G ram sei, Historical Materialism and International Relations, Cambridge: Cambridge University Press, pp. 21-48.
  • ----- (1995) 'The Global Panopticon?The Neoliberal State, Economic Life and Democratic Surveillance', Alternatives 2:1-49.
  • Hewson, M. (1994) 'Surveillance and the Global Political Economy', in E.A. Comor (ed.) The Global Political Economy of Communication, Basingstoke: Macmillan.
  • Ignatius, D. (1989) 'Media Were Actors in the Beijing Tragedy', Washington Post 2 August: B3.
  • Jones, A. (1996) 'Wired World: Communications Technology, Governance and the Democratic Uprising', in E.A. Comor (ed.) The Global Political Economy of Communication, Basingstoke: Macmillan, pp. 145-65.
  • Lyon, D. (1994) The Electronic Eye:The Rise of Surveillance Society, Cambridge: Polity Press.
  • ----- (1998) The World Wide Web of Surveillance: The Internet and Offworld Power-flows', Information, Communication & Society 1(1):91-105.
  • Marx, G. (1985) 'I'll Be Watching You: Reflections on the New Surveillance', Dissent (USA), Winter 1985:26-34.
  • Mulgan, G. (1991) Communication and Control: Networks and the New Economies of Communication, Cambridge: Polity Press.
  • Novek, E., Sinha, N. and Gandy, O. (1991) The Value of Your Name', Media, Culture and Society 12:525-43.
  • Poster, M. (1990) The Mode of Information, Post-Structuralism and Social Context, Padstow: Polity Press.
  • Rule, J.B. (1973) Private Lives and Public Surveillance, London: Alien Lane.
  • Smith, R. (1997) 'Privacy: The Untold Stories', Wired Magazine 5.02.
  • Webster, F. (1995) The Information Society, London: Routledge.
  • Webster, F. and Robins, K. (1986) Information Technology: A Luddite Analysis, New Jersey: Ablex Publishing.
  • Whalen, J. (1997) 'You're Not Paranoid: They Really Are Watching', Wired Magazine 3.03 (http://www.hotwired.eom/wired/3.03/departments /electrosphere/security.html).
  • Zuboff, S. (1988) In the Age of the Smart Machine,Trowbridge: Heinemann.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.