Christian Fuchs

Total Page:16

File Type:pdf, Size:1020Kb

Christian Fuchs Social Media a critical introduction 22nd edition CHRISTIAN FUCHS 00_Fuchs_Prelims.indd 3 1/27/2017 4:53:28 PM SAGE Publications Ltd Christian Fuchs 2017 1 Oliver’s Yard 55 City Road First edition published 2014 London EC1Y 1SP This second edition published 2017 SAGE Publications Inc. 2455 Teller Road Apart from any fair dealing for the purposes of research or Thousand Oaks, California 91320 private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act, 1988, this publication SAGE Publications India Pvt Ltd may be reproduced, stored or transmitted in any form, or B 1/I 1 Mohan Cooperative Industrial Area by any means, only with the prior permission in writing of Mathura Road the publishers, or in the case of reprographic reproduction, New Delhi 110 044 in accordance with the terms of licences issued by the Copyright Licensing Agency. Enquiries concerning SAGE Publications Asia-Pacific Pte Ltd reproduction outside those terms should be sent to the 3 Church Street publishers. #10-04 Samsung Hub Singapore 049483 Library of Congress Control Number: 2016949804 British Library Cataloguing in Publication data Editor: Michael Ainsley Editorial assistant: John Nightingale A catalogue record for this book is available from Production editor: Imogen Roome the British Library Copyeditor: Neil Dowden Proofreader: Leigh C. Timmins Indexer: Silvia Benvenuto Marketing manager: Lucia Sweet Cover design: Jen Crisp Typeset by: C&M Digitals (P) Ltd, Chennai, India Printed in the UK ISBN 978-1-4739-6682-6 ISBN 978-1-4739-6683-3 (pbk) At SAGE we take sustainability seriously. Most of our products are printed in the UK using FSC papers and boards. When we print overseas we ensure sustainable papers are used as measured by the PREPS grading system. We undertake an annual audit to monitor our sustainability. 00_Fuchs_Prelims.indd 4 1/27/2017 4:53:28 PM 1 What Is a Critical Introduction to Social Media? 1 1.1 What Is Social about Social Media? 6 1.2 What Is Critical Thinking and Why Does it Matter? 8 1.3 What Is Critical Theory? 11 1.4 Critical Theory Approaches 20 I FOUNDATIONS 31 2 What Are Social Media and Big Data? 33 2.1 Web 2.0 and Social Media 34 2.2 The Need of Social Theory for Understanding Social Media 37 2.3 Explaining Social Media with Durkheim, Weber, Marx and Tönnies 44 2.4 A Model of Social Media Communication 49 2.5 Big Data 52 2.6 Conclusion 61 3 Social Media as Participatory Culture 65 3.1 The Notions of Participation and Participatory Culture 66 3.2 Online Fan Culture and Politics 72 3.3 Social Media and Participatory Culture 74 3.4 Henry Jenkins and Digital Labour 76 3.5 Jenkins’s Response to Criticisms 78 3.6 Conclusion 81 4 Social Media and Communication Power 85 4.1 Social Theory in the Information Age 86 4.2 Communication Power in the Network Society 88 4.3 Communication Power, Social Media and Mass Self-communication 90 4.4 Communication Power in the Arab Spring and the Occupy Movement 98 4.5 Conclusion 110 00_Fuchs_Prelims.indd 5 1/27/2017 4:53:28 PM Contents II APPLICATIONS 119 5 The Power and Political Economy of Social Media 121 5.1 Social Media as Ideology: The Limits of the Participatory Social Media Hypothesis 122 5.2 The Cycle of Capital Accumulation 129 5.3 Capital Accumulation and Social Media 131 5.4 Free Labour and Slave Labour 144 5.5 Conclusion 149 6 Google: Good or Evil Search Engine? 153 6.1 Introduction 154 6.2 Google’s Political Economy 155 6.3 Googology: Google and Ideology 162 6.4 Work at Google 165 6.5 Google: God and Satan in One Company 169 6.6 Google and the State: Monopoly Power and Tax Avoidance 171 6.7 Conclusion 179 7 Facebook: Surveillance in the Age of Edward Snowden 183 7.1 Facebook’s Financial Power 185 7.2 The Notion of Privacy 186 7.3 Facebook and Ideology 190 7.4 Privacy and the Political Economy of Facebook 194 7.5 Edward Snowden and the Surveillance-Industrial Complex 198 7.6 Conclusion 207 8 Twitter and Democracy: A New Public Sphere? 217 8.1 Habermas’s Concept of the Public Sphere 218 8.2 Twitter, Social Media and the Public Sphere 227 8.3 Political Communication on Twitter 231 8.4 Uncivil Communication on Twitter 240 8.5 Twitter’s Political Economy 242 8.6 @JürgenHabermas #Twitter #Publicsphere 244 8.7 Conclusion 246 9 Weibo: Power, Ideology and Social Struggles in Chinese Capitalism 251 9.1 China’s Capitalism 254 9.2 Weibo’s Political Economy 269 9.3 Weibo and Social Media Ideologies 273 9.4 Chinese Social Struggles in the Age of Weibo 277 9.5 Conclusion 279 vi 00_Fuchs_Prelims.indd 6 1/27/2017 4:53:28 PM Contents 10 Airbnb and Uber: The Political Economy of Online Sharing Platforms 283 10.1 Uber: The Pay per Service Sharing Model 284 10.2 Airbnb: The Capitalist Sharing Economy’s Rent-on-Rent Model 292 10.3 The Sharing Economy: A Capitalist Ideology 300 10.4 An Alternative Sharing Economy Beyond Capitalism? 306 10.5 Conclusion 313 11 Wikipedia: A New Democratic Form of Collaborative Work and Production? 317 11.1 The Communist Idea 319 11.2 Communication and Communism 323 11.3 Wikipedia’s Political Economy 325 11.4 Criticisms of Wikipedia 329 11.5 Conclusion 335 III FUTURES 339 12 Conclusion: Social Media and its Alternatives – Towards a Truly Social Media 341 12.1 Social Media Reality: Ideologies and Exploitation 341 12.2 Social Media Alternatives 345 12.3 Towards a Truly Social Media and a New Society 355 References 357 Index 377 vii 00_Fuchs_Prelims.indd 7 1/27/2017 4:53:28 PM 7 Key questions • How does Facebook’s political economy work? • How has Facebook been criticized? • What ideologies exist on and about Facebook? How does Facebook present itself to the world? What is the reality behind Facebook ideologies? • What are the implications of Edward Snowden’s revelation of the existence of a surveillance-industrial complex in the age of social media? • Are there alternatives to Facebook? Key concepts Digital labour Targeted advertising Privacy Instant personalization Social media and privacy Commodification Facebook ideologies Private property Privacy fetishism Alternative social media Privacy policy Surveillance-industrial Opt-out complex Overview Facebook is the most popular social networking site (SNS). SNSs are web-based platforms that integrate different media, information and communication technologies that allow at least the generation of profiles that display information describing the users, the display of connections (connection list), the establishment of connections between users displayed on their connection lists, and communication between users (Fuchs 2009b). 07_Fuchs_Ch 07.indd 183 1/27/2017 4:53:56 PM Facebook 3800 3600 3400 3200 3000 2800 2600 2400 2200 2000 1800 1600 1400 1200 1000 800 600 400 200 0 −200 2007 2008 2009 2010 2011 2012 2013 2014 2015 −138 −56 229 606 1000 53 1500 2940 3688 FIGURE 7.1 The development of Facebook’s profits, 2007–2015, in million US$ Source: Data from SEC filings, Form-S1 Registration Statement: Facebook, Inc., Form 10-K: Annual Reports Mark Zuckerberg, Eduardo Saverin, Dustin Moskovitz and Chris Hughes, who were then Harvard students, founded Facebook in 2004. The movie The Social Network (Columbia Pictures, 2010) describes the history of Facebook as a bunch of talented Harvard students, who because of a good idea made it to be billionaires and realized the American Dream of becoming rich and famous. The movie frames the story in individualistic terms, neglecting to show that it, like most large Silicon Valley tech companies, received millions in venture capital, from Peter Thiel, Accel Partners, Jim Breyer and others, which allowed its expansion as a company. The movie advances the ideological view that in the American Dream a good idea such as Facebook can make anyone famous and popular. In reality, of course only a very small elite has the luck of becoming rich and famous precisely because others are not wealthy. In 2006, Facebook was turned from a college network into a general social network open to everyone. From then on the users of Facebook increased rapidly. This chapter’s task is to discuss the power of Facebook, the role of surveillance and impli- cations for privacy. First, I discuss Facebook’s economic development (section 7.1). Section 7.2 introduces the notion of privacy. Then, I criticize the dominant kind of analysis of Facebook privacy by characterizing it as a form of privacy fetishism (section 7.3). In section 7.4, I analyse Facebook’s political economy. Section 7.5 discusses Edward Snowden’s revelations. Finally, I draw some conclusions and outline strategies for alternative online privacy politics in section 7.6, and the alternative social networking site Diaspora* is introduced. 184 07_Fuchs_Ch 07.indd 184 1/27/2017 4:53:57 PM Facebook 7.1 Facebook’s Financial Power Facebook’s Profits Facebook became a public company on 1 February 2012. Facebook says that it generates “a substantial majority” of its “revenue from advertising”: 98.3 per cent in 2009, 94.6 per cent in 2010, 85 per cent in 2011, 84 per cent in 2012, 89 per cent in 2013, 92 per cent in 2014 and 95 per cent in 2015.1 It says: “We generate a substantial majority of our revenue from advertising. The loss of marketers, or reduction in spending by marketers with Facebook, could seriously harm our business.”2 Facebook’s self-assessment of this risk shows that it is coupled to the broader political economy of capitalism: an advertising-based capital accu- mulation model depends on a constant influx of advertisement investments and the belief of companies that specific forms of advertisement on specific media can increase their profits.
Recommended publications
  • Advancing Technology for Humanity November 2011, Vol. 59, No. 11
    Advancing Technology for Humanity November 2011, Vol. 59, No. 11 New York City’s Marathon covering 26 miles of roads through its five boroughs stands as a test of physical endurance and sheer determination independent of race, creed or color. The picture of the start of the November 7, 2011 race was taken from a TV broadcast To skip more photographs of the 2011 Marathon click here Some 47,000 people enrolled in the New York City’s 41st annual race making it still the most famous Marathon in the world The invincible lot! You give us the inspiration for facing challenges Catch her! New York City Marathon 2011 We, at the New York Section of the IEEE congratulate all who ran the race. You helped our city to continue as unique on this planet! “The important thing is to know how to take all things quietly” – Michael Faraday IEEE New York Monitor November, 2011 Editor: Amitava Dutta-Roy, PhD, Life Fellow CONTENTS Cover page: New York City Marathon, November 5, 2011 Calendar of technical events in and around the NY Section (posted separately, please see the anchor page) A few words from the editor Section activities Election of Section officers for 2012 Election of officers of LMAG for 2012 See the results Election of officers of PES/IAS for 2012 See the results Election of officers of EDS/SSCS for 2012 See the results Activities Leon Knock on continuing education at New York Section. In this article he explains the offerings of In this Section you will find abridged reports of the the continuing education program at the Section activities of chapters and affinity groups within and how to enroll in them.
    [Show full text]
  • The Politics of Social Media. Facebook Control and Resistance
    The Politics of Social Media Facebook: Control and Resistance Master thesis Name: Marc Stumpel Student number: 5850002 Email: [email protected] Date: August 16, 2010 Supervisor: Dr Thomas Poell Second reader: Dr Geert Lovink Institution: University of Amsterdam Department: Media Studies (New Media) Keywords Facebook, Network-making power, Counterpower, Framing, Protocol, Tactical Media, Exploitation, Open-source, Agonistic Pluralism, Neodemocracy Abstract This thesis examines the governance of contemporary social media and the potential of resistance. In particular, it sheds light on several cases in which Facebook has met with resistance in its attempt to exercise control. This social networking site has raised concerns over privacy, the constraints of its software, and the exploitation of user-generated content. By critically analyzing the confrontations over these issues, this thesis aims to provide a framework for thinking about an emerging political field. This thesis argues that discursive processes and (counter)protocological implementations should be regarded as essential political factors in governing the user activities and conditions on large social networking sites. A discourse analysis unveils how Facebook enacts a recurrent pattern of discursive framing and agenda-setting to support the immediate changes it makes to the platform. It shows how contestation leads to the reconfiguration and retraction of certain software implementations. Furthermore, a software study analyzes how the users are affected by Facebook‘s reconfiguration of protocological assemblages. Several tactical media projects are examined in order to demonstrate the mutability of platform‘s software. 2 Foreword My inspiration for this thesis came largely from the thought-provoking discussions in the New Media and the Transformation of Politics course.
    [Show full text]
  • In the Court of Chancery of the State of Delaware Karen Sbriglio, Firemen’S ) Retirement System of St
    EFiled: Aug 06 2021 03:34PM EDT Transaction ID 66784692 Case No. 2018-0307-JRS IN THE COURT OF CHANCERY OF THE STATE OF DELAWARE KAREN SBRIGLIO, FIREMEN’S ) RETIREMENT SYSTEM OF ST. ) LOUIS, CALIFORNIA STATE ) TEACHERS’ RETIREMENT SYSTEM, ) CONSTRUCTION AND GENERAL ) BUILDING LABORERS’ LOCAL NO. ) 79 GENERAL FUND, CITY OF ) BIRMINGHAM RETIREMENT AND ) RELIEF SYSTEM, and LIDIA LEVY, derivatively on behalf of Nominal ) C.A. No. 2018-0307-JRS Defendant FACEBOOK, INC., ) ) Plaintiffs, ) PUBLIC INSPECTION VERSION ) FILED AUGUST 6, 2021 v. ) ) MARK ZUCKERBERG, SHERYL SANDBERG, PEGGY ALFORD, ) ) MARC ANDREESSEN, KENNETH CHENAULT, PETER THIEL, JEFFREY ) ZIENTS, ERSKINE BOWLES, SUSAN ) DESMOND-HELLMANN, REED ) HASTINGS, JAN KOUM, ) KONSTANTINOS PAPAMILTIADIS, ) DAVID FISCHER, MICHAEL ) SCHROEPFER, and DAVID WEHNER ) ) Defendants, ) -and- ) ) FACEBOOK, INC., ) ) Nominal Defendant. ) SECOND AMENDED VERIFIED STOCKHOLDER DERIVATIVE COMPLAINT TABLE OF CONTENTS Page(s) I. SUMMARY OF THE ACTION...................................................................... 5 II. JURISDICTION AND VENUE ....................................................................19 III. PARTIES .......................................................................................................20 A. Plaintiffs ..............................................................................................20 B. Director Defendants ............................................................................26 C. Officer Defendants ..............................................................................28
    [Show full text]
  • Facebook, Social Media Privacy, and the Use and Abuse of Data
    S. HRG. 115–683 FACEBOOK, SOCIAL MEDIA PRIVACY, AND THE USE AND ABUSE OF DATA JOINT HEARING BEFORE THE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION UNITED STATES SENATE AND THE COMMITTEE ON THE JUDICIARY UNITED STATES SENATE ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION APRIL 10, 2018 Serial No. J–115–40 Printed for the use of the Committee on Commerce, Science, and Transportation ( Available online: http://www.govinfo.gov VerDate Nov 24 2008 09:24 Nov 08, 2019 Jkt 000000 PO 00000 Frm 00001 Fmt 6011 Sfmt 6011 S:\GPO\DOCS\37801.TXT JACKIE FACEBOOK, SOCIAL MEDIA PRIVACY, AND THE USE AND ABUSE OF DATA VerDate Nov 24 2008 09:24 Nov 08, 2019 Jkt 000000 PO 00000 Frm 00002 Fmt 6019 Sfmt 6019 S:\GPO\DOCS\37801.TXT JACKIE S. HRG. 115–683 FACEBOOK, SOCIAL MEDIA PRIVACY, AND THE USE AND ABUSE OF DATA JOINT HEARING BEFORE THE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION UNITED STATES SENATE AND THE COMMITTEE ON THE JUDICIARY UNITED STATES SENATE ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION APRIL 10, 2018 Serial No. J–115–40 Printed for the use of the Committee on Commerce, Science, and Transportation ( Available online: http://www.govinfo.gov U.S. GOVERNMENT PUBLISHING OFFICE 37–801 PDF WASHINGTON : 2019 VerDate Nov 24 2008 09:24 Nov 08, 2019 Jkt 000000 PO 00000 Frm 00003 Fmt 5011 Sfmt 5011 S:\GPO\DOCS\37801.TXT JACKIE SENATE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION JOHN THUNE, South Dakota, Chairman ROGER WICKER, Mississippi BILL NELSON, Florida, Ranking ROY BLUNT, Missouri MARIA
    [Show full text]
  • REGULATION’: a PROCESS ONAPROCNOT a TEXT ESSNOTAT Extfacebcreate Working Paper 2020/7
    FACEBOOK FACEBOOK REGULATI‘REGULATION’: A PROCESS ONAPROCNOT A TEXT ESSNOTAT EXTFACEBCREATe Working Paper 2020/7 OOKREGULLEIGHTON ANDREWS ATIONAPR OCESSNOT Facebook ‘Regulation’: a process not a text1 Leighton Andrews2 Abstract Discussions of platform governance frequently focus on issues of platform liability and online harm to the exclusion of other issues; perpetuate the myth that ‘the internet’ is unregulated; reinforce the same internet exceptionalism as the Silicon Valley companies themselves; and, by adopting the language of governance rather than regulation, diminish the role of the state. Over the last three years, UK governments, lawmakers and regulators, with expert advice, have contributed to the development of a broader range of regulatory concerns and options, leading to an emergent political economy of advertiser-funded platforms. These politicians and regulators have engaged in a process of sense-making, building their discursive capacity in a range of technical and novel issues. Studying an ‘actually existing’ regulatory process as it emerges enables us to look afresh at concepts of platform regulation and governance. This working paper has a particular focus on the regulatory approach to Facebook, which is presented as a case study. But it engages more widely with the issues of platform regulation through a careful interpretive analysis of official documentation from the UK government, regulatory and parliamentary bodies, and company reports. The regulatory process uncovered builds on existing regulatory frameworks and illustrates that platform regulation is a process, not a finished text. Introduction There is a recurrent tendency in political commentary about major Big Tech platforms to assert that ‘they must be regulated’, as though they exist in some kind of regulatory limbo.
    [Show full text]
  • Law, Technology, and Public Health in the COVID-19 Crisis
    Privacy in Pandemic: Law, Technology, and Public Health in the COVID-19 Crisis Tiffany C. Li* The COVID-19 pandemic has caused millions of deaths and disastrous consequences around the world, with lasting repercussions for every field of law, including privacy and technology. The unique characteristics of this pandemic have precipitated an increase in use of new technologies, including remote communications platforms, healthcare robots, and medical AI. Public and private actors alike are using new technologies, like heat sensing, and technologically influenced programs, like contact tracing, leading to a rise in government and corporate surveillance in sectors like healthcare, employment, education, and commerce. Advocates have raised the alarm for privacy and civil liberties violations, but the emergency nature of the pandemic has drowned out many concerns. This Article is the first comprehensive account of privacy in pandemic that maps the terrain of privacy impacts related to technology and public health responses to the COVID-19 crisis. Many have written on the general need for better health privacy protections, education privacy protections, consumer privacy protections, and protections against government and corporate surveillance. However, this Article is the first comprehensive article to examine these problems of privacy and technology specifically in light of the pandemic, arguing that the lens of the pandemic exposes the need for both wide-scale and small-scale reform of privacy law. This Article approaches these problems with a focus on technical realities and social * Visiting Clinical Assistant Professor, Boston University School of Law; Fellow, Yale Law School Information Society Project. The author thanks Tally Amir, Chinmayi Arun, Jack M.
    [Show full text]
  • A Deep Dive Into the Technology of Corporate Surveillance
    Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance Author: Bennett Cyphers and Gennie Gebhart ​ A publication of the Electronic Frontier Foundation, 2019. “Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance” is released under a Creative Commons Attribution 4.0 International License (CC BY 4.0). View this report online: https://www.eff.org/wp/behind-the-one-way-mirror ELECTRONIC FRONTIER FOUNDATION 1 Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance Behind the One-Way Mirror A Deep Dive Into the Technology of Corporate Surveillance BENNETT CYPHERS AND GENNIE GEBHART December 2, 2019 ELECTRONIC FRONTIER FOUNDATION 2 Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance Introduction 4 First-party vs. third-party tracking 4 What do they know? 5 Part 1: Whose Data is it Anyway: How Do Trackers Tie Data to People? 6 Identifiers on the Web 8 Identifiers on mobile devices 17 Real-world identifiers 20 Linking identifiers over time 22 Part 2: From bits to Big Data: What do tracking networks look like? 22 Tracking in software: Websites and Apps 23 Passive, real-world tracking 27 Tracking and corporate power 31 Part 3: Data sharing: Targeting, brokers, and real-time bidding 33 Real-time bidding 34 Group targeting and look-alike audiences 39 Data brokers 39 Data consumers 41 Part 4: Fighting back 43 On the web 43 On mobile phones 45 IRL 46 In the legislature 46 ELECTRONIC FRONTIER FOUNDATION 3 Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance Introduction Trackers are hiding in nearly every corner of today’s Internet, which is to say nearly every corner of modern life.
    [Show full text]
  • GAO-20-195G, Cost Estimating and Assessment Guide
    COST ESTIMATING AND ASSESSMENT GUIDE Best Practices for Developing and Managing Program Costs GAO-20-195G March 2020 Contents Preface 1 Introduction 3 Chapter 1 Why Government Programs Need Cost Estimates and the Challenges in Developing Them 8 Cost Estimating Challenges 9 Chapter 2 Cost Analysis and Cost Estimates 17 Types of Cost Estimates 17 Significance of Cost Estimates 22 Cost Estimates in Acquisition 22 The Importance of Cost Estimates in Establishing Budgets 24 Cost Estimates and Affordability 25 Chapter 3 The Characteristics of Credible Cost Estimates and a Reliable Process for Creating Them 31 The Four Characteristics of a Reliable Cost Estimate 31 Best Practices Related to Developing and Maintaining a Reliable Cost Estimate 32 Cost Estimating Best Practices and the Estimating Process 33 Chapter 4 Step 1: Define the Estimate’s Purpose 38 Scope 38 Including All Costs in a Life Cycle Cost Estimate 39 Survey of Step 1 40 Chapter 5 Step 2: Developing the Estimating Plan 41 Team Composition and Organization 41 Study Plan and Schedule 42 Cost Estimating Team 44 Certification and Training for Cost Estimating and EVM Analysis 46 Survey of Step 2 46 Chapter 6 Step 3: Define the Program - Technical Baseline Description 48 Definition and Purpose 48 Process 48 Contents 49 Page i GAO-20-195G Cost Estimating and Assessment Guide Key System Characteristics and Performance Parameters 52 Survey of Step 3 54 Chapter 7 Step 4: Determine the Estimating Structure - Work Breakdown Structure 56 WBS Concepts 56 Common WBS Elements 61 WBS Development
    [Show full text]
  • Social Control and Surveillance in the Society of Consumers
    International Journal of Sociology and Anthropology Vol. 3(6) pp. 180-188, June 2011 Available online http://www.academicjournals.org/ijsa ISSN 2006-988x ©2011 Academic Journals Review Social control and surveillance in the society of consumers Massimo Ragnedda Dipartimento di Economia Istituzioni e Società (DEIS), Facoltà di Lettere e Filosofia, Università degli Studi di Sassari, Piazza Conte di Moriana 8, 07100 Sassari, Italy. E-mail: [email protected]. Tel: +39 079229654. Fax: +39 079229660 Accepted January 21, 2011 The new Information and Communication Technologies (ICTs) introduced a highly automated and much cheaper systematic observation of personal data. ICTs advance the intensification and the extension of surveillance, such that an expanding quantity of data can now be collected, tabulated and cross- referenced more rapidly and more accurately than old paper files. This process contributes to the building a "new electronic cage" constraining the individual, on the basis of his e-profile and data- matching. Especially two agents of surveillance are interested in collecting and using such data: government authorities and private corporations. Massive stores of personal data held on ordinary people are now vital to both public services and private business purposes. The new electronic cage is more all-encompassing and complete, being able to produce a complete profile of citizens and consumers in real time. Both public and private information agencies rely on one another for creating and modelling the profiles of good citizens/consumers who, by definition, are well integrated into social life, exhibiting predictable behaviour that conforms to the general needs of contemporary consumer/ oriented social relations.
    [Show full text]
  • Your Post Has Been Removed
    Frederik Stjernfelt & Anne Mette Lauritzen YOUR POST HAS BEEN REMOVED Tech Giants and Freedom of Speech Your Post has been Removed Frederik Stjernfelt Anne Mette Lauritzen Your Post has been Removed Tech Giants and Freedom of Speech Frederik Stjernfelt Anne Mette Lauritzen Humanomics Center, Center for Information and Communication/AAU Bubble Studies Aalborg University University of Copenhagen Copenhagen København S, København SV, København, Denmark København, Denmark ISBN 978-3-030-25967-9 ISBN 978-3-030-25968-6 (eBook) https://doi.org/10.1007/978-3-030-25968-6 © The Editor(s) (if applicable) and The Author(s) 2020. This book is an open access publication. Open Access This book is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/ by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made. The images or other third party material in this book are included in the book’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the book’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permit- ted use, you will need to obtain permission directly from the copyright holder. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
    [Show full text]
  • Editorial Marketing and the Rise of Commercial Consumer Surveillance
    Marketing and the Rise of Commercial Editorial Consumer Surveillance Jason Pridmore Detlev Zwick The DigIDeas project, Schulich School of Business, Zuyd University, York University, The Netherlands. Canada. [email protected] [email protected] Marketing Transitions With the widespread adoption of Fordist regimes of production and Taylorist regimes of management in early 20th century America (Gramsci 1971; Hardt and Negri 2000, 219-350), supply of commodities began to surpass market demand consistently for the first time in history. The advent of mass production required mass consumption and as a consequence, the profession of marketing management was developed. Though marketing management had its roots in agricultural economics and was characterized initially by pragmatic macro-economic concerns about distribution efficiencies and co-operative marketing of agricultural products (Bartels 1988), it obtained an increasingly dominant function within commercial practices as it focused on selling more of a particular product than the competition. The new priorities set by a nascent corporate capitalism that pitches companies directly against each other for scarce consumer resources produced novel needs for knowledge about the market, including knowledge about consumers. Hence, corporate marketing management developed early forms of market research to produce consumer knowledge that would help outsell any rivals. Early market research led to a view of the consumer as a relatively stable, homogeneous, and immobile set of preferences that could be managed and controlled with mass advertising (Beniger 1986). An understanding of the consumer as a psycho- socially complex and mutable collection of needs, wants, and desires did not emerge until the 1940s (Miller and Rose 1997; Rose 1997).
    [Show full text]
  • Electronic Surveillance in Workplaces and Their Legitimate Usage to Provide Transparency and Accountability Towards Employees
    © 2019 JETIR June 2019, Volume 6, Issue 6 www.jetir.org (ISSN-2349-5162) Electronic surveillance in workplaces and their legitimate usage to provide transparency and accountability towards employees 1Gursimran Singh, 2Dr. Payal Bassi 1Research Scholar, 2Professor, 1 Department of Commerce and Management 1Regional Institute of Management and Technology, Mandi Gobindgarh, India Abstract: Companies used surveillance software’s, CCTV cameras to watch their employees, monitoring their e-mails or the websites content they visit. Sometimes managers used surveillance to provide protection of their companies from legal acquaintances that originates against the wrong doing behavior of their employees such as download of pornography material and provoke able e-mails or messages to other individuals and to provide protection against the inappropriate exposure of exclusive or confidential information on the internet. As the reasons of employers behind these processes can be valid, there are conflicting thoughts of the usage of this technology among the employees. This paper discusses the latest surveillance measures, technologies used by the employer, lawful disputes that can arise from surveillance as well as consequences or problems originate for the management. This paper also discusses some questions about the right of usage of internet or e-mails in the corporations for the personnel motives of the employees and to what extent their can use their right. To what extent the managers or companies lawfully monitor the workplaces or employees behavior on the internet. And about the employees expectations regarding the surveillance used in order to protect their online privacy and the legal options company have provided for them. The paper expresses the ways for further research in surveillance of employees and a more detailed reasoning in improving lawful and policy-making can be analyzed further.
    [Show full text]