Now cookies have transformed the shape of communication and have further advanced the ability of criminals to survey individual user functions on the web.
The web is many things, an environment for "learning, conversing, coordinating and trading" but also "a means of trapping the unwary, of constraining the choices of the unsuspecting" (Lyon, 2002). From cookies web bugs developed, and increasingly other surveillance methods pop up daily. According to Lyons (2002) the web might be considered the "World Wide Web of Surveillance" (p. 345).
Lyons (2002) further defines surveillance as "processing personal data for the purposes of management and influence" and suggests that though ambiguous in nature, computer surveillance is constantly changing (p. 345).
Networked Surveillance
Networked surveillance or trading of names, email addresses and renting of lists that contain consumer information gathered from sites has in the past been considered relatively benign (Lyons, 2002). According to one leader at Sun Microsystems, most people "have zero privacy anyway, get over it" (Lyons, 2002, p. 345). But the problem has become more insidious.
Campbell & Carlson (2002) note that surveillance is often used as a "technique and technology of control" in a society best designed as focused on "information capitalism." (p. 586). In their study, Campbell & Carlson point out that surveillance technologies can be employed for such purposes as more effective and directed marketing and advertising online. Further they suggest that privacy has become a commodity that can be sold to anyone for any purpose at the right price (Campbell & Carlson, 2002).
According to Marx (2003), "the increased prominence of surveillance technologies is pulled by concerns over issues such as crime, terrorism, and economic competitiveness, and is pushed by newly perceived opportunities in electronics, computerization and artificial intelligence" (p. 369). Increased expectations of and protections for privacy have furthered interest in surveillance and even greater technological developments (Marx, 2003).
Marx (2003) also points out that there are many cultural beliefs that support "the legitimacy of surveillance" and notes phrases such as "I have nothing to hide" and "It's for my own good" as evidence to support this notion (p. 369). He goes on to conduct a study where he concludes that 11 forms of surveillance neutralization exist and that the majority of these are forms of 'resistance or noncompliance' (Marx, 2003, p. 369).
Electronic Surveillance in the Workplace
Another area where computer surveillance is increasingly a concern is in the workplace, though the implication for criminal activity in this regard is unclear according to the research available. More and more employees have reason to be concerned about surveillance and privacy issues as they find their employers have the ability to monitor their electronic activity more closely than before (Sinrod, 2001). Employers however argue that they have some valid reasons for monitoring.
According to statistics, a recent survey conducted by the American Management Association revealed that almost 80% of companies use some form of computer surveillance to monitor employee activities (Sinrod, 2001). Among the more common surveillance conducted includes surveillance of Internet use and email messages (Sinrod, 2001).
In certain states laws have been enacted that prevent employers from monitoring employee e-mail, as is the case in California (Sinrod, 2001). Employers however continue to rationalize their activity, noting that computer surveillance helps "combat personal use of the Internet during core business hours" (Sinrod, 2001).
Employers are also looking however to limit "defamatory statements" that employees may be making via electronic communications (Sinrod, 2001).
The issues of privacy rights violation however are legitimate. The primary legislative measure targeted toward electronic privacy in the workplace is the electronic communications privacy act, enacted in 1986, which bars the "intentional interception of any wire, oral or electronic communication, or the unauthorized access of stored communications" (Sinrod, 2001). This act is not without limitations however, and does allow monitoring under "appropriate circumstances" including allowing employers to monitor business calls and communications where employee consent has been acquired (Sinrod, 2001).
Other reasons cited for surveillance include an employee productivity issues, quality of work, employee theft, unlawful activity and other factors "potentially affecting productivity" (Johnson, 1995).
According to Bryant, there are some positions more likely to be monitored than others including: "word processors, data entry, telephone operators, customer service representatives, telemarketers, insurance clerks and bank proof clerks" (Bryant, 1995). Professional and technical workers are also monitored, and electronic mail surveillance of employee activities is common (Bryant, 1995). The exact number of employees affected by surveillance has not been recorded, but estimates suggests that as many as 20 million Americans...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now