737
Views
5
CrossRef citations to date
0
Altmetric
Articles

Ludic encounters – understanding surveillance through game metaphors

&
Pages 1523-1538 | Received 21 Dec 2014, Accepted 26 Nov 2015, Published online: 28 Dec 2015

References

  • Albrechtslund, A. (2008). Online social networking as participatory surveillance. First Monday, 13. Retrieved from http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2142/1949
  • Albrechtslund, A., & Dubbeld, L. (2005). The plays and arts of surveillance: Studying surveillance as entertainment. Surveillance & Society, 3, 216–221.
  • Ball, K. (2009). Exposure. Exploring the subject of surveillance. Information, Communication & Society, 12, 639–657. doi: 10.1080/13691180802270386
  • Bennett, C. J. (2008). The privacy advocates: Resisting the spread of surveillance. Cambridge: MIT Press.
  • Best, K. (2010). Living in the control society: Surveillance, users and digital screen technologies. International Journal of Cultural Studies, 13, 5–24. doi: 10.1177/1367877909348536
  • Brabham, D. C. (2012). The myth of amateur crowds. Information, Communication & Society, 15, 394–410. doi: 10.1080/1369118X.2011.641991
  • van Brakel, R. (2013). Playing with surveillance: Towards a more generous understanding. In W. Webster, G. Clavell, N. Zurawski, K. Boersma, B. Sagvari, C. Backman, & C. Leleux (Eds.), Living in surveillance societies: The state of surveillance. Proceedings of LISS conference 3 (pp. 281–294). Barcelona. Retrieved from https://www.researchgate.net/publication/236973787_Playing_with_Surveillance_Towards_a_more_generous_understanding
  • Caillois, R. (1958/2001). Man, play and games. Chicago: University of Illinois Press.
  • Calleja, G. (2010). Digital games and escapism. Games and Culture, 5, 335–353. doi: 10.1177/1555412009360412
  • Consalvo, M. (2005). Rule sets, cheating, and magic circles: Studying games and ethics. International Review of Information Ethics, 4, 7–12.
  • Consalvo, M. (2009). There is no magic circle. Games and Culture, 4, 408–417. doi: 10.1177/1555412009343575
  • der Derian, J. (1990). The (s)pace of international relations: Simulation, surveillance, and speed. International Studies Quarterly, 34, 295–310. doi: 10.2307/2600571
  • Deterding, S., Khaled, R., Nacke, L. E., & Dixon, D. (2011). Gamification: Toward a definition. Proceedings of the CHI2011 gamification workshop, May 7, Vancouver, BC, Canada.
  • Ellerbrok, A. (2010). Empowerment: Analysing technologies of multiple variable visibility. Surveillance & Society, 8, 200–220.
  • Ellerbrok, A. (2011). Playful biometrics: Controversial technology through the lens of play. The Sociological Quarterly, 52, 528–547. doi: 10.1111/j.1533-8525.2011.01218.x
  • Fuchs, C. (2011). How can surveillance be defined? MATRIZes, 5, 109–133. doi: 10.11606/issn.1982-8160.v5i1p109-136
  • Fuchs, C., Boersma, K., Albrechtslund, A., & Sandoval, M. (2012). Introduction: Internet and surveillance. In C. Fuchs, K. Boersma, A. Albrechtslund, & M. Sandoval (Eds.), Internet and surveillance: The challenges of web 2.0 and social media (pp. 1–28). New York: Routledge.
  • Gangneux, J. (2014). Diverted and diverting glances at cameras: Playful and tactical approaches to surveillance. Surveillance & Society, 12, 443–447.
  • Haggerty, K. (2006). Tear down the walls: On demolishing the Panopticon. In D. Lyon (Ed.), Theorizing surveillance: The Panopticon and beyond (pp. 23–45). Cullompton: Willan Publishing.
  • Huey, L., Walby, K., & Doyle, A. (2006). Cop watching in the downtown eastside: Exploring the use of (counter)surveillance as a tool of resistance. In T. Monahan (Ed.), Surveillance and security: Technological politics and power in everyday life (pp. 149–165). New York: Routledge.
  • Huizinga, J. (1938/1955). Homo Ludens: A study of the play element in culture. Boston, MA: The Beacon Press.
  • Juul, J. (2011). Half-real: Video games between real rules and fictional worlds. Cambridge: MIT Press.
  • Koskela, H. (2001). Joensuun torialueen kameravalvonnan vaikutus kaupunkilaisten turvallisuuteen [Video surveillance of the Joensuu market square: Influence to the citizens’ safety]. The Police Department of Joensuu and the Association for Urban Development in the City of Joensuu.
  • Koskela, H. (2009). Pelkokierre – pelon politiikka, turvamarkkinat ja kamppailu kaupunkitilasta. [The spiral of fear: Politics of fear, security business, and the struggle over urban space] Helsinki: Gaudeamus.
  • Koskela, H. (2011). ‘Don't mess with Texas!’ Texas virtual border watch program and the (botched) politics of responsibilization. Crime, Media, Culture, 7, 49–65. doi: 10.1177/1741659010369957
  • Los, M. (2006). Looking into the future: Surveillance, globalization and the totalitarian potential. In D. Lyon (Ed.), Theorizing surveillance: The Panopticon and beyond (pp. 69–94). Cullompton: Willan Publishing.
  • Lyon, D. (2001). Surveillance society. Monitoring everyday life. Buckingham: Open University Press.
  • Lyon, D. (2014). The emerging surveillance culture. In A. Jansson & M. Christensen (Eds.), Media, surveillance and identity: Social perspectives (pp. 71–88). New York: Peter Lang Publishing.
  • Mäkinen, L. A., & Koskela, H. (2014). Surveillance as a reality game. In A. Jansson & M. Christensen (Eds.), Media, surveillance and identity: Social perspectives (pp. 183–200). New York: Peter Lang Publishing.
  • Malaby, T. M. (2007). Beyond play: A new approach to games. Games and Culture, 2, 95–113. doi: 10.1177/1555412007299434
  • Marwick, A. E. (2012). The public domain: Social surveillance in everyday life. Surveillance & Society, 9, 378–393.
  • McGrath, J. E. (2004). Loving big brother: Performance, privacy and surveillance space. London: Routledge.
  • McGrath, J. E. (2012). Performing surveillance. In K. Ball, K. D. Haggerty, & D. Lyon (Eds.), Routledge handbook of surveillance studies (pp. 83–90). London: Routledge.
  • Raessens, J. (2006). Playful identities, or the ludification of culture. Games and Culture, 1, 52–57. doi: 10.1177/1555412005281779
  • Schienke, E. W., & IAA. (2002). On the outside looking out: An interview with the Institute for Applied Autonomy (IAA). Surveillance and Society, 1, 102–119.
  • Senft, T. M. (2008). Camgirls: Celebrity & community in the age of social networks. New York: Peter Lang Publishing.
  • Smith, K. L., McPhail, B., Ferenbok, J., Tichine, A., & Clement, A. (2011). Playing with surveillance: The design of a mock RFID-based identification infrastructure for public engagement. Surveillance & Society, 9, 149–166.
  • Steeves, V. (2012). Hide and seek: Surveillance of young people on the internet. In K. Ball, K. D. Haggerty, & D. Lyon (Eds.), Routledge handbook of surveillance studies (pp. 352–359). London: Routledge.
  • Stenros, J., Montola, M., & Mäyrä, F. (2007). Pervasive games in ludic society. Proceedings of the 2007 conference on Future Play, Toronto, 30–37.
  • Tani, S. (2014). Loosening/tightening spaces in the geographies of hanging out. Social & Cultural Geography, 16, 125–145. doi: 10.1080/14649365.2014.952324
  • Taylor, T. L. (2009). The assemblage of play. Games and Culture, 20, 1–9.
  • Trottier, D. (2014). Crowdsourcing CCTV surveillance on the Internet. Information, Communication & Society, 17, 609–626. doi: 10.1080/1369118X.2013.808359
  • Tulloch, R. (2014). The construction of play: Rules, restrictions, and the repressive hypothesis. Games and Culture, 9, 335–350. doi: 10.1177/1555412014542807
  • Viseu, A., Clement, A., & Aspinal, J. (2004). Situating privacy online: Complex perceptions and everyday practices. Information, Communication & Society, 7, 92–114. doi: 10.1080/1369118042000208924
  • Whitson, J. R. (2013). Gaming the quantified self. Surveillance & Society, 11, 163–176.
  • Whitson, J. R., & Simon, B. (2014). Editorial. Game studies meets surveillance studies at the edge of digital culture: An introduction to a special issue on surveillance, games and play. Surveillance & Society, 12, 309–319.
  • Yee, N. (2006). The labor of fun: How video games blur the boundaries of work and play. Games and Culture, 1, 68–71. doi: 10.1177/1555412005281819

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.