References
- Albrechtslund, A. (2008). Online social networking as participatory surveillance. First Monday, 13(3). Retrieved August 17, 2012, from http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2142/1949/
- Allen, L. (2006). Is ‘reality CCTV’ a step too far? BBC News, 8 May. Retrieved August 17, 2012, from http://news.bbc.co.uk/2/hi/uk_news/4752167.stm
- Amazon Mechanical Turk. (2012). Amazon Mechanical Turk. Retrieved August 17, 2012, from https://www.mturk.com/mturk/welcome
- Ballard, M. (2007, November 11). Home snoop CCTV more popular than Big Brother. The Register. Retrieved January 25, 2013, from http://www.theregister.co.uk/2007/11/11/home_tv_cctv_link/
- Big Brother Watch. (2011a). Facewatch. Retrieved August 17, 2012, from http://www.bigbrotherwatch.org.uk/home/2011/02/facewatch.html
- Big Brother Watch. (2011b). New privacy concerns about Internet Eyes. Retrieved August 17, 2012, from http://www.bigbrotherwatch.org.uk/home/2011/03/new-privacy-concerns-about-internet-eyes.html
- BlueServo. (2012). BlueServo. Retrieved August 17, 2012, from http://www.blueservo.net/
- Blumer, H. (1948). Public opinion and public opinion polling. American Sociological Review, 13(5), 542–549. doi: 10.2307/2087146
- Bolin, G. (2012). The labour of media use. Information, Communication & Society, 15(6), 796–814. doi: 10.1080/1369118X.2012.677052
- Brabham, D. C. (2012). The myth of amateur crowds. Information, Communication & Society, 15(3), 394–410. doi: 10.1080/1369118X.2011.641991
- Brewster, T. (2011). CCTV service internet eyes forced into privacy changes. IT Pro, 14 June. Retrieved August 17, 2012, from http://www.itpro.co.uk/634201/cctv-service-internet-eyes-forced-into-privacy-changes
- Cavoukian, A. (2011). Privacy by design: The 7 foundational principles. Retrieved January 25, 2013, from http://www.privacybydesign.ca/content/uploads/2009/08/7foundationalprinciples.pdf
- Council of Europe. (1987). Recommendation No. R (87) 15 of the committee of ministers to member states regulating the use of personal data in the police sector. Retrieved January 25, 2013, from http://www.un.org/en/sc/ctc/specialmeetings/2011/docs/coe/coe-rec-personaldata.pdf
- Cowan, M. (2012, January 24). Crimestoppers offer £10,000 reward in hunt for killer of Betty Yates. Birmingham Mail.net. Retrieved August 17, 2012, from http://www.birminghammail.net/news/top-stories/2012/01/24/crimestoppers-offer-10-000-reward-in-hunt-for-killer-of-betty-yates-97319-30184915/
- CrimeStoppers. (2012a). Facts and figures. Retrieved August 17, 2012, from http://www.crimestoppers-uk.org/how-we-help/our-achievements/facts-and-figures
- CrimeStoppers. (2012b). How we help. Retrieved August 17, 2012, from http://www.crimestoppers-uk.org/how-we-help
- Davenport, J. (2011, September 23). Online CCTV system goes nationwide after slashing thefts in city. The Evening Standard. Retrieved August 17, 2012, from http://www.standard.co.uk/news/online-cctv-system-goes-nationwide-after-slashing-thefts-in-city-6446660.html
- Davenport, T., & Beck, J. (2001). The attention economy: Understanding the new currency of business. Boston: Harvard Business School Press.
- Deleuze, G. (1995). Postscript on societies of control. October, 59(Winter), 3–7.
- Deterding, S., Sicart, M., Nacke, L., O'Hara, K., & Dixon, D. (2011, May 7–12). Gamification. Using game-design elements in non-gaming contexts. Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. Retrieved August 17, 2012, from http://www.thetimes.co.uk/tto/business/industries/technology/article3074493.ece
- Doyle, A., Lippert, R., & Lyon, D. (Eds.) (2012). Eyes everywhere: The global growth of camera surveillance. New York: Routledge.
- DP Act. (1998). Schedule 1: The data protection principles. Retrieved January 25, 2013, from http://www.legislation.gov.uk/ukpga/1998/29/schedule/1
- DW.de. (2012, February 6). Internet eyes: Community surveillance – shift. Retrieved August 17, 2012, from http://www.dw.de/dw/episode/9798/0,,15676531,00.html
- Facebook. (2012). Internet eyes. Retrieved August 17, 2012, from https://www.facebook.com/pages/Internet-Eyes/108455634071
- Facewatch. (2012a). Join today. Retrieved August 17, 2012, from http://facewatch.co.uk/cms/join-today/
- Facewatch. (2012b). Our vision. Retrieved August 17, 2012, from http://facewatch.co.uk/cms/our-vision/
- Fildes, N. (2011, June 25). Bar owner leads digital drive to foil bag snatchers. The Times. Retrieved August 17, 2012, from http://www.thetimes.co.uk/tto/business/industries/technology/article3074493.ece
- Fishman, M., & Cavender, G. (Eds.) (1998). Entertaining crime: Television reality programs. Hawthorne, NY: Aldine de Gruyter.
- Foucault, M. (1977). Discipline and punish: The birth of the prison. New York: Vintage Books.
- Galloway, A., & Thacker, E. (2007). The exploit: A theory of networks. Minneapolis: University of Minnesota Press.
- Gandy, O. (1993). The panoptic sort: A political economy of personal information. Boulder, CO: Westview.
- Graham, S. (2002). CCTV: The stealthy emergence of a fifth utility? Planning Theory & Practice, 3(2), 237–241. doi: 10.1080/14649350220150116
- Gray, T. (2011, March 15). Norfolk shopkeeper backs out of using internet eyes system. Eastern Daily Press. Retrieved August 17, 2012, from http://www.edp24.co.uk/news/norfolk_shopkeeper_backs_out_of_using_internet_eyes_system_1_829654
- Haggerty, K. D., & Ericson, R. V. (2000). The surveillant assemblage. British Journal of Sociology, 51(4), 605–622.
- Hildebrand Interactive. (2012). About us. Retrieved August 17, 2012, from http://www.hildebrandinteractive.com/aboutus.html
- Hildebrand Initiative. (2012). Eliminating digital exclusion. Retrieved August 17, 2012, from http://hildebrand.co.uk/research-and-innovation/digitalbridge.html
- Howe, J. (2008). Crowdsourcing: Why the power of the crow is driving the future of business. New York: Three Rivers Press.
- ICO. (2008). CCTV code of practice. Retrieved January 25, 2013, from http://www.ico.gov.uk/for_organisations/data_protection/topic_guides/~/media/documents/library/Data_Protection/Detailed_specialist_guides/ICO_CCTVFINAL_2301.ashx
- Internet Eyes. (2012a). Internet eyes. Retrieved August 17, 2012, from http://interneteyes.co.uk/
- Internet Eyes. (2012b). The Internet eyes community. Retrieved August 17, 2012, from http://interneteyes.co.uk//community/
- Internet Eyes. (2012c). Testimonials. Retrieved August 17, 2012, from http://interneteyes.co.uk/business/#IET
- Internet Eyes. (2013). Register interest. Retrieved January 25, 2013, from http://www.interneteyes.co.uk/business-register-interest
- Koskela, H. (2010). Did you spot an alien? Voluntary vigilance, borderwork and the Texas virtual border watch program. Space and Policy, 14(2), 103–121. doi: 10.1080/13562576.2010.505787
- Le Bon, G. (2006). The crowd; study of the popular mind. Minneapolis: Filiquarian.
- Lettice, J. (2005, December 30). London estate broadband offers ‘spot the ASBO suspect' TV channel. The register. Retrieved August 17, 2012, from http://www.theregister.co.uk/2005/12/30/shoreditch_digital_bridge/
- Lewis, P. (2011, March 2). You're being watched: There's one CCTV camera for every 32 people in UK. The Guardian. Retrieved January 25, 2013, from http://www.guardian.co.uk/uk/2011/mar/02/cctv-cameras-watching-surveillance
- Lyon, D. (2007). Surveillance studies: An overview. Cambridge: Polity Press.
- Mann, S., Nolan, J., & Wellman, B. (2003). Sousveillance: Inventing and using wearable computing devices for data collection in surveillance environments. Surveillance & Society, 1(3), 331–355.
- Manzerolle, V., & McGuigan, L. (Eds.). (2013). The audience commodity in a digital age: Revisiting a critical theory of commercial media. Basingstoke: Palgrave Macmillan.
- McGonigal, J. (2008). Engagement economy: The future of massively scaled collaboration and participation. Institute for the Future. Retrieved August 17, 2012, from http://www.iftf.org/node/2306
- Mordini, E., & Rebera, A. P. (2012). No identification without representation: Constraints on the use of biometric identification systems. Review of Policy Research, 29(1), 5–20. doi: 10.1111/j.1541-1338.2011.00535.x
- No CCTV. (2012). Reports. Retrieved August 17, 2012, from http://www.no-cctv.org.uk/caseagainst/reports.asp
- Norris, C. (2003). From personal to digital: CCTV, the panopticon, and the technological mediation of suspicion and and social control. In D. Lyon (Ed.), Surveillance as social sorting: Privacy, risk, and digital discrimination (pp. 249–281). London: Routledge.
- Norris, C., & Armstrong, G. (1999). The maximum surveillance society: The rise of CCTV. New York: Berg Publishers.
- Norris, C., McCahill, M., & Wood, D. (2004). Editorial. The growth of CCTV: A global perspective on the international diffusion of video surveillance in publicly accessible space. Surveillance & Society, 2(2/3), 110–135.
- Poster, M. (2004). Consumption and digital commodities in the everyday. Cultural Studies, 18(2), 409–423. doi: 10.1080/0950238042000201581
- Price, P. (2010, November 27). Who is watching you on CCTV? BBC News. Retrieved August 17, 2012, from http://news.bbc.co.uk/2/hi/programmes/click_online/9232158.stm
- Reynolds, M. (2012, January 14). £10,000 to catch killer of policeman's parents. Express.co.uk. Retrieved August 17, 2012, from http://www.express.co.uk/posts/view/295567
- Salter, L. (2004). Structure and forms of use: A contribution to understanding the ‘effects’ of the internet on deliberative democracy. Information, Communication & Society, 7(2), 185–206. doi: 10.1080/1369118042000232648
- Schneider, C., & Trottier, D. (2012). The 2011 Vancouver Riot and the role of Facebook in crowdsourced policing. BC Studies, 175, 57–72.
- Sims, B. (2011, October 24). Facewatch technology could save retailers “tens of millions of pounds”. IFSECGlobal. Retrieved from www.ifsecglobal.com/document.asp?doc_id=554465
- Smith, G. (2004). Behind the screens: Examining constructions of deviance and informal practices among CCTV control room operators in the UK. Surveillance & Society, 2(2/3), 376–395. Retrieved August 17, 2012, from http://www.surveillance-and-society.org/articles2(2)/screens.pdf
- Smythe, D. (1977). Communications: Blindspot of western Marxism. Canadian Journal of Political and Social Theory, 1(3), 1–28.
- Surowiecki, J. (2004). The wisdom of crowds. New York: Anchor Books.
- Trottier, D. (2012). Policing social media. Canadian Review of Sociology, 49(4), 411–425.
- UbiSurv. (2009). Comment re: Towards open-circuit television. Retrieved January 25, 2013, from http://ubisurv.wordpress.com/2009/10/06/octv/#comment-832
- Welsh, B., & Farrington, D. (2008). Effects of closed circuit television surveillance on crime. Campbell Systematic Reviews. Retrieved January 25, 2013, from www.campbellcollaboration.org/lib/download/243/
- Wright, D. (2012). The state of the art in privacy impact assessment. Computer Law & Security Review, 28(1), 54–61. doi: 10.1016/j.clsr.2011.11.007