Surveillance at the Source

Contemporary discussions concerning surveillance focus predominantly on government activity. These discussions are important for a variety of reasons, but they generally ignore a critical aspect of the surveillance--harm calculus--the source from which government entities derive the information they...

Ausführliche Beschreibung

Gespeichert in:  
Bibliographische Detailangaben
1. VerfasserIn: Thaw, David (VerfasserIn)
Medienart: Elektronisch Buch
Sprache:Englisch
Veröffentlicht: 2015
In:Jahr: 2015
Online-Zugang: Volltext (kostenfrei)
Verfügbarkeit prüfen: HBZ Gateway

MARC

LEADER 00000cam a22000002c 4500
001 1866120581
003 DE-627
005 20250116054850.0
007 cr uuu---uuuuu
008 231018s2015 xx |||||o 00| ||eng c
035 |a (DE-627)1866120581 
035 |a (DE-599)KXP1866120581 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Thaw, David  |e VerfasserIn  |4 aut 
245 1 0 |a Surveillance at the Source 
264 1 |c 2015 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Contemporary discussions concerning surveillance focus predominantly on government activity. These discussions are important for a variety of reasons, but they generally ignore a critical aspect of the surveillance--harm calculus--the source from which government entities derive the information they use. The source of surveillance data is the information gathering activity itself which is where harms like chilling of speech and behavior begin. Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' activities. Private entities operate social networks, instant messaging, e-mail, and other information systems, which now are the predominant means through which people communicate. Private entities likewise control the physical and wireless networks over which these systems communicate. This short Article separates surveillance into information gathering activities and information usage activities and examines the distinct, standalone privacy-harming potential of each. It then argues that while modern government surveillance focuses primarily on usage activities, private corporations engage in information gathering activities and separately use that information in their profitable business activity. Additionally, the fact that they possess such information makes private corporations a logical feed for information used in government surveillance. Profit-making efforts, unlike public functions, must advance the interests of shareholder return, and can only consider privacy or similar concerns to the extent that those concerns are subject to regulation or can be justified as market-competitive. This Article argues that since neither exception is common, the primary incentives of private corporations are to gather and use as much information as possible, thereby increasing the probability of chilling effects. Failure to examine the role of private corporations in surveillance scholarship thus creates both an incomplete discussion of the harms of government surveillance and fails to include an essential element of harm. This Article briefly examines notable examples of contemporary surveillance and argues for the inclusion ofprivate actors in surveillance-harm analysis 
856 4 0 |u https://core.ac.uk/download/232582784.pdf  |x Verlag  |z kostenfrei  |3 Volltext 
935 |a mkri 
951 |a BO 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4391801345 
LOK |0 003 DE-627 
LOK |0 004 1866120581 
LOK |0 005 20231018043629 
LOK |0 008 231018||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)CORE69246879 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a core 
OAS |a 1 
ORI |a SA-MARC-krimdoka001.raw