Additional Information
Book Details
Abstract
Our public and private lives are under surveillance as never before. Whether we are shopping with a credit card, walking down the street or emailing a colleague at work, our activities are closely monitored.
Since September 11th 2001, surveillance has intensified further. Yet although individuals, groups, governments and states are more closely monitored, our security is not assured.
This book explores the vast range of issues related to increased surveillance. What is going on in an area clouded by secrecy from the state and complacent reassurances from corporations? How do we track suspects and combat crime without also eroding our civil liberties and sacrificing our rights to privacy? Does electronic tagging of prisoners work? What are retailers up to with 'lifestyle profiling'?
Focusing on these and other issues such as paedophilia, money-laundering, information warfare, cybercrime, and related legislation, this book spotlights benefits and costs of surveillance, and suggests how it is likely to develop in the future.
Table of Contents
Section Title | Page | Action | Price |
---|---|---|---|
Contents | vi | ||
1 The Intensification of Surveillance | 1 | ||
Kirstie Ball and Frank Webster 2 Surveillance after September 11, 2001 | 16 | ||
David Lyon 3 Data Mining and Surveillance in the Post- 9/ | 11 | ||
Environment | 26 | ||
Oscar H. Gandy 4 Joined- up Surveillance: The Challenge to Privacy | 42 | ||
Charles D. Raab 5 They Don t Even Know We re There : The Electronic Monitoring of Offenders in England and Wales | 62 | ||
Mike Nellis 6 Information Warfare, Surveillance and Human Rights | 90 | ||
Frank Webster 7 Mapping out Cybercrimes in a Cyberspatial Surveillant Assemblage | 112 | ||
David S. Wall 8 The Constant State of Emergency? : Surveillance after 9/ 11 | 137 | ||
David Wood, Eli Konvitz and Kirstie Ball Notes on Contributors | 151 | ||
Bibliography | 154 | ||
Index | 169 | ||
Abrams, P. 16-17 | 16 | ||
Accrue 33 | 33 | ||
ACLU 148 | 148 | ||
advertising, and data mining techniques | 30 |