Reading: Specific domains of surveillance

In this section we have selected key readings covering the areas of border surveillance, citizenship and identity, consumption, crime and justice, infrastructure and the built environment, medicine, public services, regulation, telecommunication and workplace.

Borders

  • Andreas, P. and Snyder, T. (eds.), The Wall Around the West: State Borders and Immigration Controls in North America and Europe. Lanham MD: Rowman and Littlefield.
  • Bigo, D. and Guild, E. (eds.) (2005) Controlling Frontiers: Free Movement into and within Europe, Aldershot: Ashgate.
  • Salter, M. (2003) Rights of Passage: The Passport in International Relations. Boulder, CO: Lynne Rienner.
  • Torpey, F. (2001) The Invention of the Passport: Surveillance, Citizenship and the State. Cambridge: Cambridge University Press.
  • Zureik, E. and Salter, M.B. (eds.)(2005) Global Surveillance and Policing: Borders, Security, Identity. Cullompton, UK: Willan.

Citizenship and Identity

  • Caplan, J. and Torpey, J. (eds.) (2002) Documenting Individual Identity: The Development of State Practices in the Modern Word, Princeton, NJ: Princeton University Press
  • Garton-Ash, T. (1997) The File: A Personal History. London: Harper Collins.
  • House of Commons Select Committee on Science and Technology (2006) Identity Card Technologies: Scientific Advice, Risk and Evidence, http://www.parliament.uk/parliamentary_committees/science_and_technology_committee/sag.cfm
  • Lyon, D. (2004) ‘Identity cards: social sorting by database,’ OII Internet Issue Brief No. 3 . http://www.oii.ox.ac.uk/research/publications.cfm
  • Solove, D. (2004) The Digital Person: Technology and Privacy in the Information Age. New York: New York University Press.

Consumption

  • Elmer, G. (2004). Profiling Machines: Mapping the Personal Information Economy. Cambridge, MA: The MIT Press.
  • Gandy, O. (1993) The Panoptic Sort: A Political Economy of Personal Information, Boulder, CO: Westview Press.
  • Lace, S. (ed.) (2005) The Glass Consumer: Life in a Surveillance Society, Bristol: The Policy Press.
  • Turow, J. (2006) Niche Envy: Marketing Discrimination in the Digital Age. Cambridge MA: MIT Press.

Crime and Justice

  • Gill, M. and Spriggs, A. (2005) Assessing the impact of CCTV. London, Home Office Research, Development and Statistics Directorate.
  • Goold, B. J. (2004) CCTV and Policing: Public Area Surveillance and Police Practices in Britain. Oxford: Oxford University Press.
  • Newburn, T. and Hayman, S. (2001) Policing, CCTV, and Social Control: Police Surveillance and Suspects in Custody. Collumpton: Willan Publishing.
  • Norris, C., McCahill, M. and Wood, D. (eds.) (2004) The Politics of CCTV in Europe and Beyond. Special Issue of Surveillance and Society, 2(2/3), http://www.surveillance-and-society.org/cctv.htm
  • Painter, K. and Tilley, N. (1999) Surveillance of Public Space: CCTV, Street Lighting and Crime Prevention. Cullompton: Willan.

Infrastructure and Built Environment

  • Coaffee, J. (2003) Terrorism, Risk and the City: The Making of a Contemporary Urban Landscape. Aldershot UK: Ashgate.
  • Graham, S. (ed.) (2004) The Cybercities Reader, London: Routledge.
  • Graham, S. and Marvin, S. (2001) Splintering Urbanism: Networked Infrastructures, Technological Mobilities and the Urban Condition. London: Routledge.
  • Institute for the Future (2004) Infrastructure for the New Geography. Menlo Park: California. IFTF.
  • Kang, J. and Cuff, D. (2005) ‘Pervasive Computing: Embedding the Public Sphere,’ Washington and Lee Law Review 62(1): 93-146.

Medicine

  • Armstrong, D. (1995) ‘The Rise of Surveillance Medicine,’ Sociology of Health and Illness, 17(3): 393-404.
  • Cole, S. (2001) Suspect Identities: A History of Fingerprinting and Criminal Identification, Boston; Harvard University Press.
  • Nelkin, D. and Tancredi, L. (1994) Dangerous Diagnostics. Chicago: University of Chicago Press
  • Laurie, G. (2002) Genetic Privacy: A Challenge to Medico-Legal Norms, Cambridge: Cambridge University Press.
  • Rose, H. (2001) The Commodification of Bioinformation: The Icelandic Health Sector Database, London: The Wellcome Trust.

Public Services

Regulation

  • 6, P. (1998) The Future of Privacy, Volume 1: Private Life and Public Policy, London: Demos.
  • Bennett, C. (1992) Regulating Privacy: Data Protection and Public Policy in Europe and the United States, Ithaca, NY: Cornell University Press.
  • Bennett, C. and Raab, C. (2006) The Governance of Privacy: Policy Instruments in Global Perspective. Cambridge, MA: MIT Press.
  • Flaherty, D. (1989) Protecting Privacy in Surveillance Societies: The Federal Republic of Germany, Sweden, France, Canada, and the United States, Chapel Hill, NC: University of North Carolina Press.
  • Regan, P. (1995) Legislating Privacy: Technology, Social Values, and Public Policy. Chapel Hill: University of North Carolina Press.

Telecommunications

  • Bamford, J. (2001) Body of Secrets: Anatomy of the Ultra-Secret National Security Agency. New York: Random House.
  • Keefe, P.R. (2005) Chatter: Dispatches from the Secret World of Global Eavesdropping. New York: Random House
  • Crampton, J. (2004) The Political Mapping of Cyberspace. Chicago: University of Chicago Press.
  • Diffie, W. and Landau, S. (1998) Privacy on the Line: The Politics of Wiretapping and Encryption, Cambridge, MA: MIT Press.
  • Lessig, L. (1999) Code and Other laws of Cyberspace, New York, NY: Basic Books.

Workplace

  • Ball, K.S. (ed.) (2002) Work. Special issue of Surveillance and Society 1(2), http://www.surveillance-and-society.org/journalv1i2.htm
  • Frenkel, S. et al. (1999) On the Front Line: The Organization of Work in the Information Economy. Ithaca: Cornell University Press
  • Monahan, Torin, and Rodolfo D. Torres, eds. 2010. Schools under Surveillance: Cultures of Control in Public Education. New Brunswick: Rutgers University Press.
  • McKinlay, A. and Starkey, K. (eds.) (1998) Foucault, Management and Organization Theory: From Panopticon to Technologies of Self. London: Sage.
  • Stanton, J.M. and Stam, K.R. (2006) The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Trust. Medford, NJ: Cyberage Books.
  • Zuboff, S (1988) In the Age of the Smart Machine. New York: Basic Books.