SlideShare a Scribd company logo
1 of 17
Surveillance and
Expropriation of
Information
JIA HUI DAI
JAMES BRIGHT
Web 2.0 – Prosumption and Surveillance
Focus on - data sharing
- communication
- community
- co-production
It is mass communication and self-sommunication .
Fuchs, C. (2010). Web 2.0, prosumption, and
surveillance. Surveillance & Society, 8(3), 288-309
•Web 2.0” platforms and their economic organisation
•Transformation of the internet - information to communication
•Tim O’Reilly’s definition of “Web 2.0” – “Network as a platform,
spanning all connected devices…”
•Fuch’s different view on “Web 2.0” – claims need to be more
modest?
Google Buzz – directed connected to GMail
Commercial social networking sites - storing, analyzing, and selling individual
and aggregated data about user preferences and user behaviour to advertising
clients in order to accumulate capital
Function- creating postings that are shared with contacts;
sharing of images and videos;
commenting on and evaluating others’ Buzz posts;
forwarding of Twitter messages to a Buzz account;
linking and integrating images uploaded to Flickr or Picasa, videos uploaded to
YouTube, and posts generated on Blogger; and use of Buzz via mobile phones
Google Buzz is part of Google’s empire of economic
surveillance.
It gathers information about user behaviour and user
interests in order to store, assess, and sell this data to
advertising clients.
These surveillance practices are legally guaranteed by the
Buzz privacy policy.
Goggles
An image recognition software that identifies objects that people take pictures
of by mapping these objects with Google’s image database and then provides
information about these objects.
Allows humans to intrude the privacy of others in public spaces through
personal identification
Also allows Google to gather, assess, provide, and potentially sell real time data
about the physical location of millions of people.
Surveillance by nation states and corporations aims at controlling the
behaviour of individuals and groups.
Ogura’s (2006) and Gandy’s (1993) argues that a common
characteristic of surveillance is the management of population based
on capitalism and/or the nation state, we can distinguish between
economic and political surveillance as the two major forms of
surveillance.
How does Web 2.0 make a profit?
Web 2.0 is largely a commercial, profit-oriented machine that
exploits users by commodifying their personal data and usage
behaviour and subjects these data to economic surveillance so that
capital is accumulated with the help of targeted personalized
advertising.
Surveillance in the Digital Enclosure
•Outline of article
•What has been enabled by the introduction of WIFI
•The internet ‘cloud’ – Gmail and Google documents enabled with
large amounts of storage space on Google servers for personal
information
‘Computing is moving off your machine
and into the cloud’ (Tanz, 2007)
“Cloud” computing is one in which users will rely on privatized
communication networks and data storage facilities to access and
manage an array of goods and services, from personal documents
and music files to online shopping and e-mail.
Gmail and Google documents - provide users with large amounts of
storage space on Google’s servers to store their personal documents
and correspondence.
However,
Google reserves the right to mine its rapidly
expanding databases for commercial purposes.
•Collection of information has economic value
•Andrejevic argues that “digital enclosure” is a more appropriate
way to name the internet cloud, as a way of theorising about
the “forms of productivity and monitoring facilitated by
ubiquitous interactivity.”
Digital enclosures:
The model of digital enclosure Is a way of theorizing the forms of productivity
and monitoring facilitated by ubiquitous interactivity. The model of enclosure
traces the relationship between a material, spatial process with two examples:
• Google’s proposed business model for equipping the city of San Francisco with
free wireless internet access,
•Different levels of enclosures operate with varying levels of symmetry and
transparency – e.g. Amazon
• The use of the interactive capability of the internet to enforce increasingly
restrictive intellectual property regimes.
•The end of the article explains how this era of digital enclosure isn’t
based on a loss of privacy but on the expansion in the form of private
control – e.g. telephony
•Private control – Chinese blogger Zhao Jing – blog was taken offline by
government
•Internet – free expression? Or expression reliant on private
cooperation’s?
o The forms of productive data gathering enabled by private
ownership of and control over interactive enclosures, wired or
wireless, that render an increasing array of spaces interactive.
o The model of enclosure highlights the ongoing importance of
structures of ownership and control over productive resources in
determining the role they play.
o A form of exploitation.
References:
Karatani, Kojin. 2005. Transcritique: On Kant and Marx. Cambridge, MA: MIT Press.
Fernback, Jan and Zizi Papacharissi. 2007. Online privacy as legal safeguard: the relationship
among consumer, online portal, and privacy policies. New Media & Society 9 (5): 715-734.
Ogura, Toshimaru. 2006. Electronic government and surveillance-oriented society. In Theorizing
surveillance, ed. David Lyon, 270-295. Portland, OR: Willan
Tanz, J. (2007). Desktop, R.I.P. Wired, 15.04, March. http://www.wired.com/
wired/archive/15.04/wired40_rip.html. Last accessed April 10, 2007
Schiller, D. (1999). Digital capitalism: Networking the global market system. Cambridge, MA: MIT
Press.
Andrejevic, Mark. "Surveillance in the digital enclosure." The Communication Review 10.4
(2007): 295-317.

More Related Content

What's hot

Political hacktivism
Political hacktivismPolitical hacktivism
Political hacktivismEva Sánchez
 
decoding Justice 2.0: tapping into the social network effect
decoding Justice 2.0: tapping into the social network effectdecoding Justice 2.0: tapping into the social network effect
decoding Justice 2.0: tapping into the social network effectPatrick McCormick
 
Web 2.0 6 Big Ideas
Web 2.0 6 Big IdeasWeb 2.0 6 Big Ideas
Web 2.0 6 Big IdeasAaronGemmell
 
Enhancing the Web Experience
Enhancing the Web ExperienceEnhancing the Web Experience
Enhancing the Web ExperienceJohn Breslin
 
Social media - enterprise2.0 - course 2010 2011
Social media - enterprise2.0 - course 2010   2011Social media - enterprise2.0 - course 2010   2011
Social media - enterprise2.0 - course 2010 2011guillaume ereteo
 
P2P government: public purpose and the bounty of the commons
P2P government: public purpose and the bounty of the commonsP2P government: public purpose and the bounty of the commons
P2P government: public purpose and the bounty of the commonsPatrick McCormick
 
Final thesis preso april 2013
Final thesis preso april 2013Final thesis preso april 2013
Final thesis preso april 2013Molly Sauter
 
Web 3.0 presentation
Web 3.0 presentationWeb 3.0 presentation
Web 3.0 presentationmcdowellmike
 
Web 3.0 - Media Theory
Web 3.0 - Media TheoryWeb 3.0 - Media Theory
Web 3.0 - Media TheoryAkshay Iyer
 
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGME-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGMijait
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...Patrick McCormick
 
Technology And Customer Consultation Kieran Lenihan
Technology And Customer Consultation Kieran LenihanTechnology And Customer Consultation Kieran Lenihan
Technology And Customer Consultation Kieran Lenihanklenihan
 
Towards a Future Internet workshop
Towards a Future Internet workshopTowards a Future Internet workshop
Towards a Future Internet workshopblogzilla
 

What's hot (20)

Isa12b
Isa12bIsa12b
Isa12b
 
Political hacktivism
Political hacktivismPolitical hacktivism
Political hacktivism
 
decoding Justice 2.0: tapping into the social network effect
decoding Justice 2.0: tapping into the social network effectdecoding Justice 2.0: tapping into the social network effect
decoding Justice 2.0: tapping into the social network effect
 
Web 2.0 6 Big Ideas
Web 2.0 6 Big IdeasWeb 2.0 6 Big Ideas
Web 2.0 6 Big Ideas
 
Enhancing the Web Experience
Enhancing the Web ExperienceEnhancing the Web Experience
Enhancing the Web Experience
 
Social media - enterprise2.0 - course 2010 2011
Social media - enterprise2.0 - course 2010   2011Social media - enterprise2.0 - course 2010   2011
Social media - enterprise2.0 - course 2010 2011
 
P2P government: public purpose and the bounty of the commons
P2P government: public purpose and the bounty of the commonsP2P government: public purpose and the bounty of the commons
P2P government: public purpose and the bounty of the commons
 
Final thesis preso april 2013
Final thesis preso april 2013Final thesis preso april 2013
Final thesis preso april 2013
 
Web 3.0 presentation
Web 3.0 presentationWeb 3.0 presentation
Web 3.0 presentation
 
Web 3.0 - Media Theory
Web 3.0 - Media TheoryWeb 3.0 - Media Theory
Web 3.0 - Media Theory
 
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGME-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
 
интернет
интернетинтернет
интернет
 
Digital Fault-Lines
Digital Fault-LinesDigital Fault-Lines
Digital Fault-Lines
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
Technology And Customer Consultation Kieran Lenihan
Technology And Customer Consultation Kieran LenihanTechnology And Customer Consultation Kieran Lenihan
Technology And Customer Consultation Kieran Lenihan
 
Open policy making may 2013
Open policy making may 2013Open policy making may 2013
Open policy making may 2013
 
Web 3.0
Web 3.0Web 3.0
Web 3.0
 
Polinter07
Polinter07Polinter07
Polinter07
 
Towards a Future Internet workshop
Towards a Future Internet workshopTowards a Future Internet workshop
Towards a Future Internet workshop
 

Viewers also liked (8)

Expropriation And Partial Taking Article Published Feb 09
Expropriation And Partial Taking Article Published Feb 09Expropriation And Partial Taking Article Published Feb 09
Expropriation And Partial Taking Article Published Feb 09
 
Kolovos alexandros, panel 14, assessing common application of surveillance to...
Kolovos alexandros, panel 14, assessing common application of surveillance to...Kolovos alexandros, panel 14, assessing common application of surveillance to...
Kolovos alexandros, panel 14, assessing common application of surveillance to...
 
Alexandro Faya: Expropriation
Alexandro Faya: ExpropriationAlexandro Faya: Expropriation
Alexandro Faya: Expropriation
 
Rafael Llano: Puntos a tomar en cuenta al preparar una demanda de inversión.
Rafael Llano: Puntos a tomar en cuenta al preparar una demanda de inversión.Rafael Llano: Puntos a tomar en cuenta al preparar una demanda de inversión.
Rafael Llano: Puntos a tomar en cuenta al preparar una demanda de inversión.
 
INTERNATIONAL BUSINESS Chapter 6
INTERNATIONAL BUSINESS Chapter 6INTERNATIONAL BUSINESS Chapter 6
INTERNATIONAL BUSINESS Chapter 6
 
International Marketing - The Political Environment: A Critical Concern
International Marketing - The Political Environment: A Critical ConcernInternational Marketing - The Political Environment: A Critical Concern
International Marketing - The Political Environment: A Critical Concern
 
Political Risk
Political RiskPolitical Risk
Political Risk
 
International Business -notes-complete
International Business -notes-completeInternational Business -notes-complete
International Business -notes-complete
 

Similar to Surveillance and expropriation of information

Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 EditedJuvywen
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SJuvywen
 
A Critique of the Internet Oligopoly
A Critique of the Internet OligopolyA Critique of the Internet Oligopoly
A Critique of the Internet Oligopolysmyrnaios
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxEm Magallon
 
User Privacy and Data Sovereignty
User Privacy and Data SovereigntyUser Privacy and Data Sovereignty
User Privacy and Data SovereigntyLiveplex
 
Empowerment Technology Lesson 1.pptx
Empowerment Technology Lesson 1.pptxEmpowerment Technology Lesson 1.pptx
Empowerment Technology Lesson 1.pptxJoseph Camarote
 
Security-Challenges-in-Implementing-Semantic-Web-Unifying-Logic
Security-Challenges-in-Implementing-Semantic-Web-Unifying-LogicSecurity-Challenges-in-Implementing-Semantic-Web-Unifying-Logic
Security-Challenges-in-Implementing-Semantic-Web-Unifying-LogicNana Kwame(Emeritus) Gyamfi
 
A Comprehensive Guide to Web 3.0 Development Companies.
A Comprehensive Guide to Web 3.0 Development Companies.A Comprehensive Guide to Web 3.0 Development Companies.
A Comprehensive Guide to Web 3.0 Development Companies.Techugo
 
Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docx
Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docxCaroline CabralUSEM 102Professor SchachtDecember 10, 2015.docx
Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docxannandleola
 
Databanking
DatabankingDatabanking
Databankingpubly
 
Hardware/Software Interoperability and Single Point Vulnerability Problems of...
Hardware/Software Interoperability and Single Point Vulnerability Problems of...Hardware/Software Interoperability and Single Point Vulnerability Problems of...
Hardware/Software Interoperability and Single Point Vulnerability Problems of...BRNSS Publication Hub
 
Electronic copy available at httpsssrn.comabstract=28526.docx
Electronic copy available at httpsssrn.comabstract=28526.docxElectronic copy available at httpsssrn.comabstract=28526.docx
Electronic copy available at httpsssrn.comabstract=28526.docxAASTHA76
 
Empowerment Technologies
Empowerment TechnologiesEmpowerment Technologies
Empowerment TechnologiesMichelle Faina
 
Internet Security
Internet SecurityInternet Security
Internet SecurityTom Cryer
 
Social Networking Sites and Equal Opportunity: The Impact of Accessibility
Social Networking Sites and Equal Opportunity: The Impact of AccessibilitySocial Networking Sites and Equal Opportunity: The Impact of Accessibility
Social Networking Sites and Equal Opportunity: The Impact of AccessibilityUltan O'Broin
 

Similar to Surveillance and expropriation of information (20)

Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 Edited
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
A Critique of the Internet Oligopoly
A Critique of the Internet OligopolyA Critique of the Internet Oligopoly
A Critique of the Internet Oligopoly
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptx
 
User Privacy and Data Sovereignty
User Privacy and Data SovereigntyUser Privacy and Data Sovereignty
User Privacy and Data Sovereignty
 
Empowerment Technology Lesson 1.pptx
Empowerment Technology Lesson 1.pptxEmpowerment Technology Lesson 1.pptx
Empowerment Technology Lesson 1.pptx
 
etech.pptx
etech.pptxetech.pptx
etech.pptx
 
unit1-181110135541.pptx
unit1-181110135541.pptxunit1-181110135541.pptx
unit1-181110135541.pptx
 
Security-Challenges-in-Implementing-Semantic-Web-Unifying-Logic
Security-Challenges-in-Implementing-Semantic-Web-Unifying-LogicSecurity-Challenges-in-Implementing-Semantic-Web-Unifying-Logic
Security-Challenges-in-Implementing-Semantic-Web-Unifying-Logic
 
A Comprehensive Guide to Web 3.0 Development Companies.
A Comprehensive Guide to Web 3.0 Development Companies.A Comprehensive Guide to Web 3.0 Development Companies.
A Comprehensive Guide to Web 3.0 Development Companies.
 
Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docx
Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docxCaroline CabralUSEM 102Professor SchachtDecember 10, 2015.docx
Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docx
 
Databanking
DatabankingDatabanking
Databanking
 
Hardware/Software Interoperability and Single Point Vulnerability Problems of...
Hardware/Software Interoperability and Single Point Vulnerability Problems of...Hardware/Software Interoperability and Single Point Vulnerability Problems of...
Hardware/Software Interoperability and Single Point Vulnerability Problems of...
 
Electronic copy available at httpsssrn.comabstract=28526.docx
Electronic copy available at httpsssrn.comabstract=28526.docxElectronic copy available at httpsssrn.comabstract=28526.docx
Electronic copy available at httpsssrn.comabstract=28526.docx
 
Web 3.0
Web 3.0Web 3.0
Web 3.0
 
Empowerment Technologies
Empowerment TechnologiesEmpowerment Technologies
Empowerment Technologies
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Social Networking Sites and Equal Opportunity: The Impact of Accessibility
Social Networking Sites and Equal Opportunity: The Impact of AccessibilitySocial Networking Sites and Equal Opportunity: The Impact of Accessibility
Social Networking Sites and Equal Opportunity: The Impact of Accessibility
 
05_AJMS_08_18_CS.pdf
05_AJMS_08_18_CS.pdf05_AJMS_08_18_CS.pdf
05_AJMS_08_18_CS.pdf
 
05_AJMS_08_18_CS.pdf
05_AJMS_08_18_CS.pdf05_AJMS_08_18_CS.pdf
05_AJMS_08_18_CS.pdf
 

Recently uploaded

Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...makika9823
 
Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...SejarahLokal
 
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...AJHSSR Journal
 
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一ra6e69ou
 
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...baharayali
 
Spotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of FloridaSpotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of Floridajorirz24
 
Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...AJHSSR Journal
 
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comUnlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comSagar Sinha
 
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceCall Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceSapana Sha
 
O9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenO9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenSapana Sha
 
"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's go"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's goSocioCosmos
 
social media for the hospitality industry.
social media for the hospitality industry.social media for the hospitality industry.
social media for the hospitality industry.japie swanepoel
 
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170Komal Khan
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfTirupati Social Media
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer MarketingCut-the-SaaS
 
Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...SocioCosmos
 

Recently uploaded (20)

looking for escort 9953056974 Low Rate Call Girls In Vinod Nagar
looking for escort 9953056974 Low Rate Call Girls In  Vinod Nagarlooking for escort 9953056974 Low Rate Call Girls In  Vinod Nagar
looking for escort 9953056974 Low Rate Call Girls In Vinod Nagar
 
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
 
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
 
Bicycle Safety in Focus: Preventing Fatalities and Seeking Justice
Bicycle Safety in Focus: Preventing Fatalities and Seeking JusticeBicycle Safety in Focus: Preventing Fatalities and Seeking Justice
Bicycle Safety in Focus: Preventing Fatalities and Seeking Justice
 
Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...
 
young call girls in Greater Noida 🔝 9953056974 🔝 Delhi escort Service
young call girls in  Greater Noida 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in  Greater Noida 🔝 9953056974 🔝 Delhi escort Service
young call girls in Greater Noida 🔝 9953056974 🔝 Delhi escort Service
 
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
 
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
 
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
 
Spotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of FloridaSpotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of Florida
 
Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...
 
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comUnlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
 
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceCall Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
 
O9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenO9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking Men
 
"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's go"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's go
 
social media for the hospitality industry.
social media for the hospitality industry.social media for the hospitality industry.
social media for the hospitality industry.
 
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdf
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer Marketing
 
Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...
 

Surveillance and expropriation of information

  • 2. Web 2.0 – Prosumption and Surveillance Focus on - data sharing - communication - community - co-production It is mass communication and self-sommunication .
  • 3. Fuchs, C. (2010). Web 2.0, prosumption, and surveillance. Surveillance & Society, 8(3), 288-309 •Web 2.0” platforms and their economic organisation •Transformation of the internet - information to communication •Tim O’Reilly’s definition of “Web 2.0” – “Network as a platform, spanning all connected devices…” •Fuch’s different view on “Web 2.0” – claims need to be more modest?
  • 4. Google Buzz – directed connected to GMail Commercial social networking sites - storing, analyzing, and selling individual and aggregated data about user preferences and user behaviour to advertising clients in order to accumulate capital Function- creating postings that are shared with contacts; sharing of images and videos; commenting on and evaluating others’ Buzz posts; forwarding of Twitter messages to a Buzz account; linking and integrating images uploaded to Flickr or Picasa, videos uploaded to YouTube, and posts generated on Blogger; and use of Buzz via mobile phones
  • 5. Google Buzz is part of Google’s empire of economic surveillance. It gathers information about user behaviour and user interests in order to store, assess, and sell this data to advertising clients. These surveillance practices are legally guaranteed by the Buzz privacy policy.
  • 6. Goggles An image recognition software that identifies objects that people take pictures of by mapping these objects with Google’s image database and then provides information about these objects. Allows humans to intrude the privacy of others in public spaces through personal identification Also allows Google to gather, assess, provide, and potentially sell real time data about the physical location of millions of people.
  • 7. Surveillance by nation states and corporations aims at controlling the behaviour of individuals and groups. Ogura’s (2006) and Gandy’s (1993) argues that a common characteristic of surveillance is the management of population based on capitalism and/or the nation state, we can distinguish between economic and political surveillance as the two major forms of surveillance.
  • 8. How does Web 2.0 make a profit? Web 2.0 is largely a commercial, profit-oriented machine that exploits users by commodifying their personal data and usage behaviour and subjects these data to economic surveillance so that capital is accumulated with the help of targeted personalized advertising.
  • 9. Surveillance in the Digital Enclosure
  • 10. •Outline of article •What has been enabled by the introduction of WIFI •The internet ‘cloud’ – Gmail and Google documents enabled with large amounts of storage space on Google servers for personal information
  • 11. ‘Computing is moving off your machine and into the cloud’ (Tanz, 2007) “Cloud” computing is one in which users will rely on privatized communication networks and data storage facilities to access and manage an array of goods and services, from personal documents and music files to online shopping and e-mail. Gmail and Google documents - provide users with large amounts of storage space on Google’s servers to store their personal documents and correspondence.
  • 12. However, Google reserves the right to mine its rapidly expanding databases for commercial purposes.
  • 13. •Collection of information has economic value •Andrejevic argues that “digital enclosure” is a more appropriate way to name the internet cloud, as a way of theorising about the “forms of productivity and monitoring facilitated by ubiquitous interactivity.”
  • 14. Digital enclosures: The model of digital enclosure Is a way of theorizing the forms of productivity and monitoring facilitated by ubiquitous interactivity. The model of enclosure traces the relationship between a material, spatial process with two examples: • Google’s proposed business model for equipping the city of San Francisco with free wireless internet access, •Different levels of enclosures operate with varying levels of symmetry and transparency – e.g. Amazon • The use of the interactive capability of the internet to enforce increasingly restrictive intellectual property regimes.
  • 15. •The end of the article explains how this era of digital enclosure isn’t based on a loss of privacy but on the expansion in the form of private control – e.g. telephony •Private control – Chinese blogger Zhao Jing – blog was taken offline by government •Internet – free expression? Or expression reliant on private cooperation’s?
  • 16. o The forms of productive data gathering enabled by private ownership of and control over interactive enclosures, wired or wireless, that render an increasing array of spaces interactive. o The model of enclosure highlights the ongoing importance of structures of ownership and control over productive resources in determining the role they play. o A form of exploitation.
  • 17. References: Karatani, Kojin. 2005. Transcritique: On Kant and Marx. Cambridge, MA: MIT Press. Fernback, Jan and Zizi Papacharissi. 2007. Online privacy as legal safeguard: the relationship among consumer, online portal, and privacy policies. New Media & Society 9 (5): 715-734. Ogura, Toshimaru. 2006. Electronic government and surveillance-oriented society. In Theorizing surveillance, ed. David Lyon, 270-295. Portland, OR: Willan Tanz, J. (2007). Desktop, R.I.P. Wired, 15.04, March. http://www.wired.com/ wired/archive/15.04/wired40_rip.html. Last accessed April 10, 2007 Schiller, D. (1999). Digital capitalism: Networking the global market system. Cambridge, MA: MIT Press. Andrejevic, Mark. "Surveillance in the digital enclosure." The Communication Review 10.4 (2007): 295-317.