6,252
Views
52
CrossRef citations to date
0
Altmetric
Articles

Power, knowledge, and the subjects of privacy: understanding privacy as the ally of surveillance

Pages 1250-1263 | Received 28 Feb 2013, Accepted 15 Apr 2014, Published online: 22 May 2014

References

  • Ariès, P. (1987). Pour une histoire de la vie privée. In P. Ariès & G. Duby (Eds.), Histoire de la vie privée. De la renaissance aux lumières (pp. 7–19). Paris: Seuil.
  • Bennett, C. J. (2008). The privacy advocates: Resisting the spread of surveillance. Cambridge, MA: MIT Press.
  • Bennett, C. J. (2011a). In defence of privacy: The concept and the regime. Surveillance & Society, 8(4), 485–496.
  • Bennett, C. J. (2011b). In further defence of privacy…. Surveillance & Society, 8(4), 513–516.
  • Boltanski, L., & Chiapello, E. (2005). The new spirit of capitalism. London: Verso Books.
  • Bozovic, M. (1995). Introduction: An utterly dark spot. In J. Bentham (Ed.), The panopticon writings (pp. 1–27). London: Verso.
  • Charmaz, K. (2011). Constructing grounded theory: A practical guide through qualitative analysis (Repr.). London: Sage.
  • Chellappa, R. K., & Sin, R. G. (2005). Personalization versus privacy: An empirical examination of the online consumer's dilemma. Information Technology and Management, 6(2–3), 181–202. doi: 10.1007/s10799-005-5879-y
  • Coll, S. (2012a). Le marketing relationnel et le lien marchand : Le cas des cartes de fidélité suisses. In F. Cochoy (Ed.), Du lien marchand: comment le marché fait société (pp. 197–218). Toulouse: Presses Universitaires du Mirail.
  • Coll, S. (2012b). The social dynamics of secrecy: Rethinking information and privacy through Georg Simmel. International Review of Information Ethics, 17, 15–20.
  • Coll, S. (2013). Consumption as biopower: Governing bodies with loyalty cards. Journal of Consumer Culture, 13(3), 201–220. doi: 10.1177/1469540513480159
  • Coll, S. (2014). Surveiller et récompenser: Les cartes de fidélité qui nous gouvernent. Zürich: Seismo.
  • Electronic Privacy Information Center & Privacy International. (2002). Privacy and human rights 2002: An international survey of privacy laws and developments. Washington, DC: Author.
  • Federal Act on Data Protection. (2011). Retrieved February 14, 2013, from http://www.admin.ch/ch/e/rs/2/235.1.en.pdf
  • Foucault, M. (1972). The archaeology of knowledge. New York, NY: Pantheon.
  • Foucault, M. (1978). The history of sexuality vol. 1: An introduction. New York, NY: Pantheon.
  • Foucault, M. (1979). Naissance de la biopolitique. Annuaire du Collège de France, 79, 367–372.
  • Foucault, M. (1985). The history of sexuality vol. 2: The use of pleasure. New York, NY: Vintage.
  • Foucault, M. (1986). The history of sexuality vol. 3: The care of the self. New York, NY: Pantheon.
  • Foucault, M. (2003). Society must be defended : Lectures at the Collège de France, 1975–76. (D. Macey, Trans.). New York: Picador.
  • Foucault, M. (2008). The birth of biopolitics: Lectures at the College de France, 1978–1979 (1st ed.). Basingstoke, NY: Palgrave Macmillan.
  • Gilliom, J. (2001). Overseers of the poor: Surveillance, resistance, and the limits of privacy. Chicago, IL: University of Chicago Press.
  • Gilliom, J. (2011). A response to Bennett's ‘in defence of privacy.’ Surveillance & Society, 8(4), 500–504.
  • Gilliom, J., & Monahan, T. (2012). SuperVision: An introduction to the surveillance society. Chicago, IL: University of Chicago Press.
  • Holvast, J. (2007). History of privacy. In K. M. M. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 737–770). Amsterdam: Elsevier.
  • Jourard, S. (1966). Some psychological aspects of privacy. Law and Contemporary Problems, 31(2), 307–318. doi: 10.2307/1190673
  • Kessous, E. (2012). L'attention au monde: Sociologie des données personnelles à l’ère numérique. Paris: Armand Colin.
  • Kessous, E., & Rey, B. (2007, September). Les traces d'attention entre captation et opportunité. La production conjointe du marché, des services et de la vie privée. In Actes de la conférence RESER, Tampere, Finland.
  • Lyon, D. (2007). Surveillance studies: An overview. Cambridge: Polity Press.
  • Madrid Privacy Declaration. (2009). Retrieved February 14, 2013 from http://thepublicvoice.org/madrid-declaration
  • Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355. doi: 10.1287/isre.1040.0032
  • Mayer-Schönberger, V., & Cukier, K. (2013). Big data: A revolution that will transform how we live, work, and think. Boston, MA: Houghton Mifflin Harcourt.
  • Metzger, M. J. (2006). Effects of site, vendor, and consumer characteristics on web site trust and disclosure. Communication Research, 33(3), 155–179. doi: 10.1177/0093650206287076
  • Millar, J. (2009). Core privacy: A problem for predictive data mining. In I. Kerr, C. Lucock, & V. Steeves (Eds.), Lessons from the identity trail: Anonymity, privacy and identity in a networked society (pp. 103–119). New York, NY: Oxford University Press.
  • Monahan, T. (Ed.). (2006). Surveillance and security: Technological politics and power in everyday life. New York, NY: Routledge.
  • Montreux Declaration. (2005). The protection of personal data and privacy in a globalised world: A universal right respecting diversities. Retrieved November 15, 2013, from http://www.privacyconference2005.org/fileadmin/PDF/montreux_declaration_e.pdf
  • Nissenbaum, H. (2009). Privacy in context: Technology, policy, and the integrity of social life. Stanford, CA: Stanford University Press.
  • Orwell, G. (1949). Nineteen eighty-four. London: Secker & Warburg.
  • Pridmore, J. H. (2008). Loyal subjects?: Consumer surveillance in the personal information economy. Kingston: Department of Sociology, Queens University.
  • Prost, A. (1999). Frontières et espaces du privé. In P. Ariès & G. Duby (Eds.), Histoire de la vie privée. De la première Guerre mondiale à nos jours (pp. 13–132). Paris: Le Seuil.
  • Regan, P. M. (1995). Legislating privacy. Chapel Hill: The University of North Carolina Press.
  • Regan, P. M. (2003). Privacy and commercial use of personal data: Policy developments in the United States. Journal of Contingencies and Crisis Management, 11(1), 12–18. doi: 10.1111/1468-5973.1101003
  • Regan, P. M. (2011). Response to Bennett: Also in defence of privacy. Surveillance & Society, 8(4), 497–499.
  • Rey, B. (2012). La vie privée à l’ère du numérique. Cachan: Lavoisier.
  • Ruebhausen, O. M., & Brim, O. G. (1965). Privacy and behavioral research. Columbia Law Review, 65(7), 1184–1211. doi: 10.2307/1120683
  • Simitis, S. (1987). Reviewing privacy in the information society. University of Pennsylvania Law Review, 135(3), 707–746. doi: 10.2307/3312079
  • Solove, D. J. (2008). Understanding privacy. Cambridge, MA: Harvard University Press.
  • Stalder, F. (2002). Opinion. Privacy is not the antidote to surveillance. Surveillance & Society, 1(1), 120–124.
  • Stalder, F. (2011). Autonomy beyond privacy? A rejoinder to Bennett. Surveillance & Society, 8(4), 508–512.
  • Steeves, V. (2009). Data protection versus privacy: Lessons from Facebook's Beacon. In D. Matheson (Ed.), The contours of privacy (pp. 183–196). Newcastle upon Tyne: Cambridge Scholars Press.
  • Tavani, H. T. (1999). KDD, data mining, and the challenge for normative privacy. Ethics and Information Technology, 1(4), 265–273. doi: 10.1023/A:1010051717305
  • Tocqueville, A. de. (2004). Democracy in America. New York, NY: Library of America.
  • Westin, A. F. (1967). Privacy and freedom. New York, NY: Atheneum.
  • Westin, A. F. (2003). Social and political dimensions of privacy. Journal of Social Issues, 59(2), 431–453. doi: 10.1111/1540-4560.00072

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.