Syllabus/achievement requirements

Syllabus (744p.)

  • Kompendium (K)
  • Article downloads (Click on Link)
  • Buy: Lyon, D. (2007) Surveillance Studies: An Overview. Cambridge: Polity.

 

1 Understanding and studying surveillance

Aas K.F., Gundhus H.O. and H.M. Lomell (2009) Introduction: Technologies of (In)security. In: Aas K.F., Gundhus H.O. and H.M. Lomell (eds) Technologies of (In)Security. The Surveillance of Everyday Life. Oxon: Routledge Cavendish. 1-17. (18p.) (K)

Ball, K., Haggerty, K. and D. Lyon (2012) Introducing surveillance studies. In: Ball, K., Haggerty, K. and D. Lyon (eds) Routledge Handbook of Surveillance Studies. Abingdon/ Oxon: Routledge.  1-11. (12p.) (Fronter)

Lyon, D. (2007) Part I: Viewpoints. In: Lyon, D. (ed) Surveillance Studies: An Overview. Cambridge: Polity. 11-70. (59p.)

Rogers, R. (2013) Introduction: Situating Digital Methods. In: Rogers, R. (ed) Digital Methods. Cambridge, MA: MIT Press. 1-17. (18p.) (K)

Salter, M. (2010) Surveillance. In: Burgess, J.P. (ed.) The Routledge Handbook of New Security Studies. London/New York: Routledge. 187-196. (10p.) (K)

Walby, K.T. (2005) Institutional Ethnography and Surveillance Studies: An Outline for Inquiry. Surveillance and Society 3(2/3): 158-172. (15p.)

 

2 The panopticon and beyond

Foucault, M. (1977/2014) Panoptismen. Overv?kning og straff. Gyldendal Akademisk. 171-195. (24p.) (K)

Haggerty, K.D. and R.V. Ericson (2000) The surveillant assemblage. British Journal of Sociology 51(4): 605–622. (18p.)

Lupton, D. (2015) Theorising digital society. In Lupton, D (ed) Digital Sociology. London/ New York: Routledge. 20-41. (22p.) (K)

Smith, G.J.D. (2007) Exploring Relations between Watchers and Watched in Control(led) Systems: Strategies and Tactics. Surveillance and Society: Special Issue on ‘Surveillance and Criminal Justice’ Part 2, 4(4): 280-313. (34p.)

 

3 The role of information and digital surveillance

Bauman, Z. and D. Lyon (2013) Introduction. In: Bauman Z. and D. Lyon (eds) Liquid Surveillance. Cambridge: Polity. 1-17. (18p.) (K)

Coupland, D. (2015) We are data: the future of machine intelligence. Financial times online 16 July 2015. (Accessed 03 January 2017). (15p.)

Kaufmann, M. and J. Jeandesboz (2016) Politics and ‘the digital’: from singularity to specificity. European Journal of Social Theory: 1–20. (21p.)

Lyon, D. (2007) Part II: Vision. In: Lyon, D. (ed): Surveillance Studies: An Overview. Cambridge: Polity. 71-136. (66p.)

 

4 Biometrics and the surveillance of mobility

Aas, K.F. (2006) ‘The Body Does Not Lie’: Identity, Risk and Trust in Technoculture. Crime Media Culture 2: 143-158. (16p.)

Bennet, C.J. and D. Lyon (1999) Playing the ID card: Understanding the significance of identity Card Systems. In: Bennet, C.J. and D. Lyon (eds) Playing the Identity Card. Surveillance, Security and Identification in Global Perspective. London: Routledge. 3-20. (18p.) (K)

Bennett, C.J. and P.M. Regan (2003) Editorial: Surveillance and Mobilities.

Surveillance and Society 1(4): 449-455. (7p.)

Jacobsen, E.K.U. (2012) Unique Identification: Inclusion and Surveillance in the Indian Biometric Assemblage. Security Dialogue 43(5): 457–474. (18p.)

 

5 Vigilantism, lateral surveillance and sousveillance

Andrejevic, M. (2004) The Work of Watching One Another: Lateral Surveillance, Risk, and Governance. Surveillance and Society 2(4): 479-497. (19p.)

Galdon-Clavell, G. (2013) Neighbourhood patrols, vigilantism and counter-vigilantism in Spain. Statewatch: Monitoring the State and Civil Liberties in Europe. Statewatch article Ref No#3312 (Accessed 13 March 2016). (4p.)

Mann, S. and J. Ferenbok (2013) New media and the power politics of sousveillance in a surveillance-dominated world. Surveillance and Society 11(1/2): 18-34. (17p.)

Taddicken, M. (2012) Privacy, Surveillance and Self-Disclosure in the Social Web: Exploring the User’s Perspective via Focus Groups. In: Fuchs, C., Boersma, k., Albrechtslund, A. and M. Sandoval (eds) Internet and Surveillance. The Challenges of Web 2.0 and Social Media. New York/London: Routledge. 255-272. (18p.) (K)

 

6 Big data and algorithmic control

Amoore, L. (2009) Algorithmic War: Everyday Geographies of the War on Terror. Antipode 41(1): 49-69. (21p.)

Andrejevic, M. and K. Gates (2014) Big Data Surveillance: Introduction. Surveillance and Society 12(2): 185-196. (12p.)

Boyd, D. and K. Crawford (2012) Critical Questions for Big Data. Provocations for a cultural, technological, and scholarly phenomenon. Information, Communication and Society 15(5): 662-679. (18p.)

Leese, M. (2014) The new profiling: Algorithms, black boxes, and the failure of anti-discriminatory safeguards in the European Union. Security Dialogue 45(5): 494-511. (18p.)

S?tnan A.R., Lomell H.M. and S. Hammer (2011) Introduction: By the Very Act of Counting – The Mutual Construction of Statistics and Society. In: S?tnan, A.R., Lomell H.M. and S. Hammer (eds) The Mutual Construction of Statistics and Society. New York/London: Routledge. 1-17. (18p.) (K)

 

7 Legal and human rights’ consequences

Amicelle, A. (2015) Surveillance, freedom of movement and discrimination. In: Wright, D. and R. Kreissl (eds) Surveillance in Europe. London: Routledge. 271-276. (6p.) (K)

Bellanova, R. (2017) Digital, politics, and algorithms. Governing digital data through the lens of data protection. European Journal of Social Theory (online first). (19p.)

Boyd, D. (2014) Privacy. Why do youth share so publicly? In: Boyd, D. (ed) It’s complicated. The social lives of networked teens. New Haven/London: Yale University Press. 54-76. (23p.) (K)

Bygrave, L. (2014) Core Principles of Data Privacy Law. In: Bygrave, L. (ed) Data Privacy Law. An International Perspective. Oxford: Oxford University Press. 145-167. (23p.) (K)

Galetta, A. and P.J.A. De Hert (2015) Effects of surveillance on the rule of law, due process and presumption of innocence. In: Wright, D. and R. Kreissl (eds) Surveillance in Europe. London: Routledge. 283-291. (9p.) (K)

Norris, C. (2010) Closed-Circuit Television. A Review of Its Development and Its Implications for Privacy. In: Shoham S.G., Knepper P. and M. Kett (eds) International Handbook of Criminology. Boca Raton/London/New York: CRC Press. 395-423. (29p.) (K)

 

8 Resisting and bypassing surveillance

Dupont, B. (2008) Hacking the Panopticon: Distributed Online Surveillance and Resistance. In: Deflem, M. (ed) Sociology of Crime, Law and Deviance 10: Surveillance and Governance. 259-280. (22p.)

Gilliom, J. (2005) Resisting surveillance. Social Text 23(2): 71-83. (14p.)

Martin, A.K., van Brakel, R.E. and D.J. Bernhard (2009) Understanding resistance to digital surveillance: Towards a multi-disciplinary, multi-actor framework. Surveillance and Society 6(3): 213-232. (20p.)

Raley, R. (2013) Dataveillance and Countervailance. In: Gitelman, L. (ed) “Raw Data” is an Oxymoron. Cambridge, MA: MIT Press. 121-145. (25p.) (K)

Published May 30, 2017 4:35 PM - Last modified May 30, 2017 4:35 PM