Roger Clarke's Web-Site

© Xamax Consultancy Pty Ltd,  1995-2024
Photo of Roger Clarke

Roger Clarke's 'Future Studies, Surveillance Society'

Future Studies: Of What, For Whom, and How?
Examples from Research into the Surveillance Society

Working Notes, in preparation for a conversation with
Prof. Fred Niederman of St Louis University MO

Version of 17 August 2022, revs 5, 20 October 2022

Roger Clarke **

© Xamax Consultancy Pty Ltd, 2022

Available under an AEShareNet Free
for Education licence or a Creative Commons 'Some
Rights Reserved' licence.

This document is at http://rogerclarke.com/DV/FSSS.html


1. Introduction

Academic researchers have a strong desire for legitimacy. But many perceive that it can only be achieved if they value the rigour of their research methods far more highly than the relevance of their research work's outcomes. This leads them to focus on empirical research, and hence on the study of phenomena that exist, are detectable and are stable. This is in many circumstances entirely appropriate - but not where the need is for the study of phenomena that are not yet available for observation, or whose behaviour is volatile. In those circumstances, progress in business, government and society as a whole depends on researchers who are prepared to focus on relevance as the objective, and to treat rigour as a constraint. A research ecology is needed to support researchers who adopt that approach.

This paper conducts a meta-discussion about what has been variously referred to as futurism, future studies, and futures studies. The orientation of such research is not towards vague speculation but rather the useful application of imagination (e.g. Wells 1902, Kahn & Wiener 1967). Research domains in which futurism is a necessary approach exhibit a number of key characteristics. Important among those characteristics are emergent phenomena, culturally variable attitudes and adoption patterns, rapidly evolving forms of technological intervention, and hence instability and even volatility in the domain. I undertook an early foray into this non-conformist world, in the specific context of e-Business, in a Keynote at an IFIP TC8 conference in Salzburg (Clarke 2001c). At the time, IS academics were uncomfortable with the idea of conducting what they saw as 'research into the unresearchable'; and to a considerable extent they still are.

Another blind spot in contemporary research needs to be confronted. In the large majority of reported research in IS, the interests of a single stakeholder are prioritised, and the interests of all other stakeholders are treated as constraints on the achievement of the primary stakeholder's objectives. Further, in the large majority of that large majority, the primary stakeholder is the sponsor of a particular application of information technology (IT) (Clarke & Davison 2020, Clarke et al. 2020).

Stakeholder analysis is widely used to enable the identification of players and their needs (Freeman & Reed 1983). On the other hand, it is common for players to be seriously considered only if they have the Power to prevent the primary stakeholder from achieving its aims. Stakeholders' other attributes, conventionally Legitimacy and Urgency (Mitchell et al. 1997), are largely ignored (Achterkamp & Vos 2008). Futures studies cannot afford to ignore the marginalised players.

2. Surveillance Society

The focus of the discussion in these Notes is on 'the surveillance society'. This is a research domain significant segments of which cannot at this stage be usefully studied using conventional empirical research techniques. For significant contributions to be made, researchers therefore need to apply futures studies techniques.

Surveillance, in this context, is the systematic investigation or monitoring of the actions or communications of one or more persons. In a surveillance society, the monitoring is so pervasive and so intensive that data about each individual's interests, attitudes and past and current actions are available to powerful institutions, and inferences are capable of being drawn about each individual's potential future actions.

From the perspective of each individual, living in a surveillance society makes all forms of non-conformism risky, even perilous. From the perspective of society as a whole, the suppression of behaviour that powerful organisations perceive as being 'deviant' may (but may not) have positive benefits such as lower levels of some kinds of violent crime. On the other hand, it leads to stasis not only in politics - as powerful institutions probably intend - but also in culture, and even in economic terms. This is because innovation depends on new and risky ideas being articulated, and acted upon.

Studies of surveillance society are conducted through lenses offered by theories of political science, sociology, psychology, and various applied social sciences (see, for example, Foucault 1977, Marx 1985, Gandy 1989, Lyon 1994, 2001, 2007, and the journal 'Surveillance & Society'). An approach suitable for adoption in the information systems discipline is to focus on information technologies as interventions into social processes.

Surveillance has been conducted for millennia in a physical context, by spatial, visual and aural monitoring. Increasingly over the centuries, technological means have been developed to augment the human senses of sight and hearing. Surveillance of electronic communications emerged very shortly after the introduction of the telegraph in the 1840s, and expanded dramatically with telephone technology from the late 19th century, and digital data networks from the mid-20th century onwards. Although the various forms of surveillance may be of legitimate interest in IS research, they are not central to it, until and unless the results of the monitoring are recorded as data. That has been the case for the last couple of centuries, however, and the volume of surveillance data has exploded during the last decades of the 20th and the first decades of the 21st centuries. Despite this, surveillance is largely ignored by IS researchers. For example, of >17,000 refereed articles in the AIS eLibrary in August 2022, a search for the term in Titles finds only 8 items, and a search in Abstracts finds only 19. Among the >1700 items in the professional society's journal, Communications (CAIS), searches find 1 in Title and 3 in Abstract.

I coined the term 'dataveillance' in Clarke (1986), to refer to "the systematic monitoring of people's actions or communications through the application of information technology" (Clarke 1988). Key motivations underlying the adoption of dataveillance included the replacement of costly and unreliable human watchers by inexpensive and reliable artefacts, a considerable increase in capabilities and reach, the ready storability of captured data, and hence the ability to conduct retrospective analysis, and the ready transmissibility of captured data, and hence the conduct of surveillance 'in real time' and the prompt pursuit of deviants and even the interdiction of undesirable actions.

Beyond these rational drivers, the rate of adoption of dataveillance by organisations has been driven by the technological imperative ('we can, therefore we must') and by the marketing / fashion / bandwagon imperative ('the salesman says it can, and that everyone else is doing it; so it must be true, and we must do it too'). Mindless and largely unregulated adoption has enabled authoritarian regimes to sustain their power over the populace. Meanwhile, hitherto free nations have been sleepwalking their way into surveillance society (Clarke 2001a).

Since the mid 1980s, it has been necessary to further articulate the basic notion of dataveillance to encompass such notions as the digital persona, location and tracking, biometric identification, and the imposition of identifiers in such forms as chip-embedment in human-carried artefacts (such as mobile phones and anklets) and human-carrying artefacts (such as cars). Chip-embedment directly into people commenced soon after its use in animals, during the late 1990s (Clarke 1994a, 1994b, 2001, Michael & Michael 2009).

Further developments have been apparent, such as the emergence of 'experiential surveillance'. Around the turn of the 21st century, buying printed books, and tickets to events, for cash, reading printed books, watching and listening to human speakers, buying for cash storage media containing moving images, and watching and listening to them, were all rapidly converted from unidentified and unrecorded activities using 'analogue' artefacts, to recorded and identified activities dependent on 'digital' services, such as card-based payments; online-only ticketing; and activity-monitoring in Kindle-style products and on web-sites for text, audio and video. Location and tracking gave rise to the aphorism 'you are where you've been' Clarke & Wigan 2011). That has been joined by 'you are what you've been reading, listening to, and watching.

Another development has been an explosion in 'auto-surveillance', that is to say 'of the self, by the self'. Once-private diary-entries are now published on blogs and gifted to walled-garden 'social media' venues like Facebook. Other means of self-exposure include FitBit-style activity-monitoring, v(ideo-)logging, and mobile-device-carriage, commonly with promiscuous location settings, resulting in the term 'the quantified self' (Lupton 2016). Some of this is innocuous, and some is not. The panopticon effect, be it of Bentham (1791) or Foucault (1977), involves the watched never being sure when the focus of the watcher's gaze is on them. When powerful organisations (e.g. social welfare agencies, licensing agencies, employers) are known to utilise the available data to target penalties at deviants, a widespread, self-disciplinary 'chilling effect' arises. Depending on the context and the observer's worldview, it may be anywhere between highly desirable and highly undesirable that intentional acts by one party have a strong deterrent effect on behaviours of other parties (Schauer 1978, Penney 2016).

A further relevant notion is omni- or supra-surveillance, which refers to the coordinated use of multiple channels of surveillance data. Yet another is 'sousveillance' - literally, monitoring from beneath / sous, rather than above / sur (Mann et al. 2003). In this case, 'the watched watch the watchers'. One somewhat idealistic example involves installing cameras in CCTV-monitoring rooms, training them on the people monitoring the screens, and streaming the resulting video out into the public Internet (Brin 1998). A more familiar instance is the use of wearcams by demonstrators, to transmit and store video of the behaviour of police (Mann 1997). This gives rise to the idea of 'equiveillance', that is to say a balance between authoritarian and democratic use of monitoring technologies (Mann 2005).

This brief overview is sufficient to suggest that the application of powerful and impactful forms of IT may be ushering in a surveillance society with potentially very serious consequences for the next generations of people. If researchers wait until these technological interventions into society have already occurred, and changed or new phenomena are available for observation, the damage will already have been done.

Human society is in the process of losing the ability to choose its futures by permitting surveillance technologies, and the powerful institutions that develop and deploy them, to dictate society's directions. If the public is to retain scope to influence the emergent high-tech, corporatised-government State (Schmidt & Cohen 2014), the 'precautionary principle' needs to be applied. This places the onus on proponents of interventions to demonstrate that the potential impacts are justified and proportionate (Wingspread 1998).

This section has considered the surveillance society as a research domain that is of legitimate interest to IS researchers - despite the attention paid to it to date having been minimal. It is contended, however, that this is merely one of many IS research domains that require the application of futures studies techniques. Where information systems researchers place value on relevance, what research techniques can they use in order to gather understanding in advance about the possible impacts of technological interventions?

3. Futures Research Techniques

A wide range of techniques have been applied to research about the future. The early notions of 'trends', and 'forecasting' by projecting statistical data along a timeline to postulate future time-series data, suffered from the confusion of correlation with causality, and made implicit assumptions about underlying stability of both processes and the environment in which they occurred. The focus switched to modelling, initially in the econometric arena, but this was confronted by challenges of complexity and of obscurity, and the need to discover or invent suitable concepts and constructs. Again, assumptions were implicitly made about some kinds of at least second-order stability. Even modelling that featured multi-layer feedback loops, could not fulfil the needs (Forrester 1961). Gradually, acceptance emerged for less quantitative approaches, and there was increased focus on discontinuities (Drucker 1968) or shifts, shocks and divergence (Toffler 1970, 1980). For one relatively recent view of relevant research methods, see Glenn & Gordon (2009).

This section provides a brief overview of research techniques that have at least some reasonable degree of recognition within the information systems discipline, commencing with conceptual research, and encompassing various forms of quasi-empirical, business case development, and risk and impact assessment tools.

In the absence of a real world that can be subjected to observation, it is common to resort to 'conceptual research' or 'arm-chair reasoning'. When undertaking such work, there is a dire risk of drifting far into speculation. This occurs in works of fiction, most spectacularly, but also most valuably, in the 'sci-fi' genre. It is also evident in some inadequately-grounded work in the social sciences.

Drawing on work of Rob Kling, I coined the expression 'instrumental futurism' to refer to categories of conceptual research that appear capable of delivering informational value (Clarke 1997b). One such approach has been described as 'visionary depiction' (Kling & Lamb 1997). A description of an imagined future is commonly 'utopian' (strongly emphasing 'good' aspects), sometimes 'dystopian' (strongly emphasing 'bad' aspects), and occasionally balanced, ambivalent or intentionally ambiguous. An example of a 'balanced' 'visionary depiction' of a static future situation, in this case of university administrative computing, is in Clarke (1992). (This was a 10-years-ahead snapshot, written overnight for a university committee, shortly before the availability of the Internet for other-than-research, and 6 months before I became aware of, and shifted my focus to, the then-not-quite-usable World Wide Web).

Examples of the primarily dystopian form of 'visionary depiction', applied in a surveillance society context, include analyses of the impacts of the imposed digital persona (Clarke 1994a), of chip-based ID cards (Clarke 1997a), and more recently of AI applications Clarke (2022). However, a great many examples can be found, across many disciplines.

A related technique, with an express 'agenda', is critical theory research. This directly addresses the value-conflict challenge, by recognising the effects of power, and the tendency of some stakeholders' interests to dominate those of other stakeholders (Myers 1997, Alvesson & Deetz 2000, Cecez-Kezmanovic 2005).

Conceptual research can offer a great deal of value, provided that the writer and readers all remember that all propositions are of necessity speculative and untested. It can provide what might be termed 'bootstrap hypotheses', which fall somewhere between 'ad hoc hypotheses' and 'theory-based hypotheses'. It can also underpin the development of research frameworks, which provide structure to themes and issues, including descriptions of fundamental concepts and processes, and of research agendas, which combine a broad conceptual framework, a process model, a set of broad research questions and a research program whereby those broad questions can be further articulated and addressed (Wand & Weber 2002, Ahuja 2002, Avgerou 2008, Newell & Marabelli 2015, Clarke 2019).

Beyond conceptual research approaches, a second cluster can be reasonably described as quasi-empirical techniques. These commence with some more or less formalised model of current circumstances, and some degree of appreciation of the nature of a new technology (including its intended impacts and its apparent affordances). They then postulate the effects that the technological intervention might have, based on previously-observed or theorised processes of political economy, and of social and psychological behaviour. By utilising such empirical base as is available, and placing constraints on the speculative component, the outcomes are less likely to be 'flights of fancy', and more likely to deliver value to the analysis team, to society as a whole - and indeed to system sponsors. Examples of such techniques are:

There are also well-established techniques that are much-used in individual business enterprises and government agencies, including:

However, business-case and RA techniques are myopic, in that they are dedicated to the interests of a single player, with interests of other stakeholders ignored or marginalised, except where they are perceived as threatening the primary player's interests, e.g. through non-adoption, active resistance or even countermeasures. That weakness is serious and even fatal, at least for the purposes of the present discussion. The scope may exist for refining RA, however, in order to deliver an effective Multi-Stakeholder Risk Assessment (MSRA) technique (Clarke 2022).

Finally there are techniques used in public policy contexts, loosely referred to as 'impact assessment'. These evidence multiple flavours, depending on the degree of emphasis on a technology, a project, the impacts, or compliance with particular regulatory requirements. The techniques include:

4. Implications for the IS Discipline

These Notes have considered the role of futures studies approaches to information systems research. Although the focus has been on research in relation to the surveillance society, the discussion has identified a number of attributes of research domains that indicate futures studies as an approach that is at least tenable, potentially valuable and arguably even essential. The key atttributes are emergent phenomena, rapidly evolving forms of technological intervention, culturally variable attitudes and adoption patterns, and hence unstable and even volatile phenomena.

In domains in which those atttributes exist, it is often the case that an organisation that sponsors a technological intervention may lack the power to impose its will, because one or more other stakeholders have the capacity to determine outcomes. This greatly increases the importance of not only conducting stakeholder analysis, but also of enabling multiple parties to participate in analysis, design and implementation, so that they can protect and advance their interests alongside those of the system sponsor. This imposes on researchers the need to shift beyond conventional, single-perspective approaches that privilege the interests of one stakeholder. Dual- and multi-perspective research is challenging; but it is necessary if research work is to provide adequate understanding of the context.

With the growth of IT 's power, and of the reach and scale of its application, a considerable number of information systems research domains may be in need of futurist approaches of the kinds discussed above. There are many circumstances in which two players have important interests, and adequate power to influence outcomes. Supplier-customer relationships within supply chains is one such context, but there are many other dyads for which a win-win approach has advantages, and may even be the only way in which a patricular form of technological intervention may be feasible. Examples include buyers and sellers in balanced markets; traders and the operators of exchanges; service-providers to large government agencies; and powerful regulators taking steps to rein in the behaviour of corporations within a particular industry sector or segment. From the point of view of researchers, dual-perspective approaches can deliver in circumstances in which conventional, single-perspective methods are inadequate and deliver misleading and even harmfully wrong inferences.

The even greater challenge of multi-perspective approaches is needed in win-win-win environments. Some supply chains feature powerful organisations at each step in the chain. No one pair can make arrangements to suit themselves if the predecessor and/or successor organisations are in a position to undermine or even veto the deal. Non-linear arrangements have long been dominant in such sectors as health care and international trade. Economies have been experiencing increasing incidence of network architectures in electronic services, such as online advertising, and the travel and accommodation industries. Similarly, one-with-one outsourcing arrangements are giving way to complex interlinkages among multiple business enterprises and government agencies.

Meanwhile, technological interventions of a public policy nature, in health, social welfare, public infrastructure, energy, and environmental sustainability, are all inherently multi-perspective. In these important contexts, I contend that conventional, single-perspective information systems research is untenable because it is at best of low value and at worst it is harmfully simplistic.

Empirical research featuring the careful application of rigorous methods is highly desirable where phenomena are relatively stable, and technological interventions impact behaviour only at the margin. Some research domains fit those criteria. On the other hand, the important and dynamic domains that have been scanned in this brisk review feature architectural complexity, unstable and even volatile phenomena, and technological interventions that are at least transformative and in many cases disruptive. In those circumstances, researchers who over-commit to empirical rigour can deliver no value.

In these circumstances, future studies techniques need to be adopted if research is to be worth funding by business enterprises and government agencies, or of any societal value. I accordingly contend that the relevance of the discussion in these Notes is not limited to unfamiliar topic-areas such as the surveillance society, but extends across a substantial proportion of the field of view of information systems research.


Reference List

Achterkamp M.C. & Vos J.F.J. (2008) 'Investigating the use of the stakeholder notion in project management literature, a meta-analysis' Int'l J. Project Management 26, 7 (October 2008) 749-757

Ahuja M.K. (2002) 'Women in the information technology profession: a literature review, synthesis and research agenda' European Journal of Information Systems (2002) 11, 20-34, at https://pdfs.semanticscholar.org/5c05/af60eb00cd9364643157398a3bdd1aee2b7f.pdf

Alvesson M. & Deetz S. (2000) 'Doing Critical Management Research' Sage, 2000

Avgerou C. (2008) 'Information systems in developing countries: a critical research review' Journal of Information Technology 23 (2008) 133 - 146, at http://ai2-s2-pdfs.s3.amazonaws.com/c130/a316d37382ba89b05ffbaebfe85c0068e6ad.pdf

Becker H. & Vanclay F. (2003) 'The International Handbook of Social Impact Assessment' Cheltenham: Edward Elgar, 2003

Bentham J. (1791) 'Panopticon; or, the Inspection House', London, 1791

Bradfield R., Wright G., Burt G., Cairns G. & Van Der Heijden K. (2005) 'The origins and evolution of scenario techniques in long range business planning' Futures 37 (2005) 795-812, at http://www.academia.edu/download/46103896/The_origins_and_evolution_of_scenario_te20160531-12850-l6xpls.pdf

Brin D. (1998) 'The Transparent Society' Addison-Wesley, 1998

Brunner J. (1975) 'The Shockwave Rider' Ballantine, 1975

Cecez-Kecmanovic D. (2005) 'Basic assumptions of the critical research perspectives in information systems' Ch. 2 in Howcroft D. & Trauth E.M. (eds) (2005) 'Handbook of Critical Information Systems Research: Theory and Application', pp.19-27, Edward Elgar, 2005

Clarke R. (1986) 'Information Technology and 'Dataveillance' Proc. Symp. on Comp. & Social Responsibility, Macquarie Uni. Dept of Comp. Sci., September 1986

Clarke R. (1988) 'Information Technology and Dataveillance' Commun ACM 31,5 (May 1988) 498-512, PrePrint at http://rogerclarke.com/DV/CACM88.html

Clarke R. (1992) 'A.N.U. Admin. Computing: Status Report of 10 September 2001' Xamax Consultancy Pty Ltd, 10 September 1992, Paper for the A.N.U. Administrative Computing Working Party, at http://www.rogerclarke.com/SOS/UniAdmin2001.html

Clarke R. (1994a) The Digital Persona and its Application to Data Surveillance' The Information Society 10,2 (June 1994) 77-92, PrePrint at http://www.rogerclarke.com/DV/DigPersona.html

Clarke R. (1994b) 'Human Identification in Information Systems: Management Challenges and Public Policy Issues' Information Technology & People 7,4 (December 1994) 6-37, PrePrint at http://www.rogerclarke.com/DV/HumanID.html

Clarke R. (1997a) 'Chip-Based ID: Promise and Peril' Invited Address to a Workshop on 'Identity cards, with or without microprocessors: Efficiency versus confidentiality', at the International Conference on Privacy, Montreal, 23-26 September 1997, PrePrint at http://www.rogerclarke.com/DV/IDCards97.html

Clarke R. (1997b) 'Instrumentalist Futurism: A Tool for Examining I.T. Impacts and Implications' Xamax Consultancy Pty Ltd, 6 October 1997, at http://www.rogerclarke.com/DV/InstFut.html

Clarke R. (2001a) 'While You Were Sleeping ... Surveillance Technologies Arrived' Australian Quarterly 73, 1 (January-February 2001), PrePrint at http://www.rogerclarke.com/DV/AQ2001.html

Clarke R. (2001b) 'Person-Location and Person-Tracking: Technologies, Risks and Policy Implications' Information Technology & People 14, 2 (Summer 2001) 206-231, PrePrint at http://www.rogerclarke.com/DV/PLT.html

Clarke R. (2001c) 'If e-Business is Different, Then So is Research in e-Business' Invited plenary paper for the IFIP TC8 Working Conference on E-Commerce/E-Business, Salzburg, 22-23 June 2001, in Andersen K.V. et al. (eds.) 'Seeking Success in E-Business' Springer, New York, 2003, PrePrint at http://www.rogerclarke.com/EC/EBR0106.html

Clarke R. (2015) 'Quasi-Empirical Scenario Analysis and Its Application to Big Data Quality' Proc. 28th Bled eConference, Slovenia, 7-10 June 2015, PrePrint at http://www.rogerclarke.com/EC/BDSA.html

Clarke R. (2016) 'Big Data, Big Risks' Information Systems Journal 26, 1 (January 2016) 77-90, PrPrint at http://www.rogerclarke.com/EC/BDBR.html

Clarke R. (2021) 'A Simulation Model for COVID-19 Public Health Management: Design and Preliminary Evaluation' Proc. Bled eConference, 27-30 June 2021, PrePrint at http://rogerclarke.com/EC/CVMP.html

Clarke R. (2022) 'Responsible Application of Artificial Intelligence to Surveillance: What Prospects?' Information Polity 27, 2 (Jun 2022) 175-191, Special Issue on 'Questioning Modern Surveillance Technologies', PrePrint at http://rogerclarke.com/DV/AIP-S.html

Clarke R. (2022) 'Evaluating the Impact of Digital Interventions into Social Systems: How to Balance Stakeholder Interests' Presentation on Multi-Stakeholder Risk Assessment (MSRA), to the International Digital Security Forum (IDSF22), Vienna, 1 June 2022, Stream on 'Understanding the Challenges of Digital Societies', at http://rogerclarke.com/DV/MSRA-VIE.html

Clarke R. & Davison R.D. (2020) 'Through Whose Eyes? The Critical Concept of Researcher Perspective' J. Assoc. Infor. Syst. 21, 2 (March-April 2020) 483-501, PrePrint at http://www.anu.edu.au/people/Roger.Clarke/SOS/RP.html

Clarke R., Davison R.M. & Jia W. (2020) 'Researcher Perspective in the IS Discipline: An Empirical Study of Articles in the Basket of 8 Journals' Information Technology & People 33, 6 (October 2020) 1515-1541, PrePrint at http://www.rogerclarke.com/SOS/RPBo8.html

Clarke R. & Wigan M.R. (2011) 'You Are Where You've Been: The Privacy Implications of Location and Tracking Technologies' Journal of Location Based Services 5, 3-4 (December 2011) 138-155, PrePrint at http://www.rogerclarke.com/DV/YAWYB-CWP.html

Drucker P.F. (1968) 'The Age of Discontinuity' Routledge, 1968

EC (2016) 'EU general risk assessment methodology' European Commission, 2656912, June 2016, at https://ec.europa.eu/docsroom/documents/17107/attachments/1/translations/en/renditions/native

EPTA (2017) 'What is Technology Assessment?' European Parliamentary Technology Assessment, 2017, at http://www.eptanetwork.org/about/what-is-ta

Flaherty D.H. (1988) 'The emergence of surveillance societies in the western world: Toward the year 2000' Government Information Quarterly 5, 4 (1988) 377-387

Forrester J. (1961) 'Industrial dynamics' Pegasus Communications, 1961

Foucault M. (1977) 'Discipline and Punish: The Birth of the Prison' Peregrine, London, 1975, trans. 1977

Flaherty D.H. (1989) 'Protecting Privacy in Surveillance Societies' Uni. of North Carolina Press, 1989

Freeman R.E. & Reed D.L. (1983) 'Stockholders and Stakeholders: A New Perspective on Corporate Governance' California Management Review 25, 3 (1983) 88-106

Gandy O.H. (1989) 'The Surveillance Society: Information Technology and Bureaucratic Social Control' Journal of Communication 39, 3 (September 1989) 61-76

Gandy O.H. (1993) 'The Panoptic Sort. Critical Studies in Communication and in the Cultural Industries' Westview, Boulder CO, 1993

Garcia L. (1991) 'The U.S. Office of Technology Assessment' Chapter in Berleur J. & Drumm J. (eds.) 'Information Technology Assessment' North-Holland, 1991, at pp.177-180

Gibson W. (1984) 'Neuromancer' Grafton/Collins, London, 1984

Glenn J.C. & Gordon T.J. (eds) (2009) 'Futures Research Methodology -- Version 3.0' The Millennium Project, April 2009, at https://www.millennium-project.org/publications-2/futures-research-methodology-version-3-0

ISO 27005:2011 'Information technology--Security techniques--Information security risk management' International Standards Organisation, 2011, especially pp. 7-17 and 33-49

Kahn H. & Wiener A.J. (1967) 'The Year 2000: A Framework for Speculation on the Next Thirty-three Years' Macmillan, 1967

Kling R. & Lamb R. (1997) 'Analyzing Visions of Electronic Publishing and Digital Libraries' In Newby G.B. & Peek R.P. (Eds.) 'Scholarly Publishing: The Electronic Frontier' MIT Press, Cambridge Mass., 1997

Lupton D. (2016) 'The Quantified Self' Wiley, 2016

Lyon D. (1994) 'The electronic eye: The rise of surveillance society' Polity Press, 1994

Lyon D. (2001) 'Surveillance society' Open University Press, 2001

Lyon D. (2003) 'Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination' Routledge, 2003

Lyon D. (2007) 'Surveillance studies: An overview' Polity Press, 2007

Mann S. (1997) ''Smart clothing': wearable multimedia computing and 'personal imaging' to restore the technological balance between people and their environments' Proc. 4th ACM Int'l Conf. on Multimedia, February 1997, pp.163-174, at https://dl.acm.org/doi/pdf/10.1145/244130.244184

Mann S. (2005) 'Equiveillance: The equilibrium between Sur-veillance and Sous-veillance' Opening Address, Computers, Freedom and Privacy, 2005, at http://wearcam.org/anonequity.htm

Mann S., Nolan J. & Wellman B. (2003) ' Sousveillance: Inventing and Using Wearable Computing Devices for Data Collection in Surveillance Environments' Surveillance & Society 1, 3 (2003) 331-355, at https://ojs.library.queensu.ca/index.php/surveillance-and-society/article/view/3344/3306

Marx G.T. (1985) 'The Surveillance Society: The Threat Of 1984-Style Techniques' The Futurist, 1985

Michael K. & Michael M.G. (2009) 'Innovative Automatic Identification and Location-Based Services: From Bar Codes to Chip Implants' IGI Global, 2009

Mitchell R.K., Agle B.R. & Wood D.J. (1997) 'Toward a Theory of Stakeholder Identification and Salience: Defining the Principle of Who and What Really Counts' Academy of Management Review 22, 4, 853-886

Morgan R.K. (2012) 'Environmental impact assessment: the state of the art' Impact Assessment and Project Appraisal 30, 1 (2012) 5-14, at https://doi.org/10.1080/14615517.2012.661557

Myers M.D. (1997) 'Qualitative research in information systems' MISQ Discovery, June 1997, at http://www.academia.edu/download/11137785/qualitative%20research%20in%20information%20systems.pdf

Newell S. & Marabelli M. (2015) 'Strategic Opportunities (and Challenges) of Algorithmic Decision-Making: A Call for Action on the Long-Term Societal Effects of 'Datification'' The Journal of Strategic Information Systems 24, 1 (2015) 3-14, at http://marcomarabelli.com/Newell-Marabelli-JSIS-2015.pdf

NIST (2012) 'Guide for Conducting Risk Assessments' US National Institute for Standards and Technology, SP 800-30 Rev. 1 Sept. 2012, pp. 23-36, at https://csrc.nist.gov/publications/detail/sp/800-30/rev-1/final

van Notten P.W.F., Rotmans J., van Asselt M.B.A. & Rothman D.S. (2003) 'An Updated Scenario Typology' Futures 35 (2003) 423-443, at http://ejournal.narotama.ac.id/files/An%20updated%20scenario%20typology.pdf

NSWPC (1977) 'Guidelines for the Operation of Personal Data Systems' N.S.W. Privacy Committee, Sydney, document BP31, April 1977

Okoli C. & Pawlowski S.D. (2004) 'The Delphi Method as a Research Tool: An Example, Design Considerations and Applications' Information & Management 42, 1 (December 2004) 15-29, at http://spectrum.library.concordia.ca/976864/1/OkoliPawlowski2004DelphiPostprint.pdf

Orwell G. (1948) '1984' Penguin, 1948

OTA (1977) 'Technology Assessment in Business and Government' Office of Technology Assessment, NTIS order #PB-273164', January 1977, at http://www.princeton.edu/~ota/disk3/1977/7711_n.html

Penney J.W. (2016) 'Chilling effects: Online surveillance and Wikipedia use' Berkeley Tech. LJ 31, 1 (2016) 117-182, at https://www.btlj.org/data/articles2016/vol31/31_1/0117_0182_Penney_ChillingEffects_WEB.pdf

Postma T.J.B.M. & Leibl F. (2005) 'How to improve scenario analysis as a strategic management tool?' Technological Forecasting & Social Change 72 (2005) 161-173, at https://www.researchgate.net/profile/Theo_Postma/publication/222668211_How_to_improve_scenario_analysis_as_a_strategic_management_tool/links/09e41508117c39a2c7000000.pdf

Sampson H. & Johanessen I.A. (2020) 'Turning on the tap: the benefits of using `real-life' vignettes in qualitative research interviews' Qualitative Research 20, 1 (2020) 56-72, at https://journals.sagepub.com/doi/10.1177/1468794118816618

Schauer F. (1978) 'Fear, Risk and the First Amendment: Unraveling the Chilling Effect' Boston University Law Review 58 (1978) 685-732, at  http://scholarship.law.wm.edu/facpubs/879

Schmidt E. & Cohen J. (2014) 'The New Digital Age: Reshaping the Future of People, Nations and Business' Knopf, 2013

Schmidt M.J. (2005) 'Business Case Essentials: A Guide to Structure and Content' Solution Matrix , 2005, at http://www.solutionmatrix.de/downloads/Business_Case_Essentials.pdf

Schwartz P. (1991) 'The Art of the Long View: Planning for the Future in an Uncertain World' Doubleday, 1991

Toffler A. (1970) 'Future Shock' Pan, 1970

Toffler A. (1980) 'The Third Wave' Pan, 1980

Wack P. (1985) 'Scenarios: Uncharted Waters Ahead' Harv. Bus. Rev. 63, 5 (September-October 1985) 73-89

Wand Y. & Weber R. (2002) 'Research Commentary: Information Systems and Conceptual Modeling-- A Research Agenda' Information Systems Research 13, 4 (December 2002) 363-376, at http://www.cs.northwestern.edu/~paritosh/papers/sketch-to-models/wand-weber-information-systems-and-conceptual-modeling-2002.pdf

Weingarten F.W. (1988) 'Communications Technology: New Challenges to Privacy' J. Marshall L. Rev. 21, 4 (Summer 1988) 735

Wells H.G. (1902) 'The Discovery of the Future' Project Gutenberg, 1902, at https://gutenberg.org/ebooks/44867

Wingspread (1998) 'Wingspread statement on the precautionary principle' Wingspread Conf., 1998, at http://sehn.org/wingspread-conference- on-the-precautionary-principle/

Wright D. & De Hert P. (eds) (2012) 'Privacy Impact Assessments' Springer, 2012

Zamyatin E. (1922) 'We' Penguin, 1922, 1990

Zuboff S. (2015) 'Big other: Surveillance capitalism and the prospects of an information civilization' Journal of Information Technology, 30, 2 (2015) 75-89, at  https://cryptome.org/2015/07/big-other.pdf


Author Affiliations

Roger Clarke is Principal of Xamax Consultancy Pty Ltd, Canberra. He is also a Visiting Professor associated with the Allens Hub for Technology, Law and Innovation in UNSW Law, and a Visiting Professor in the Research School of Computer Science at the Australian National University.



xamaxsmall.gif missing
The content and infrastructure for these community service pages are provided by Roger Clarke through his consultancy company, Xamax.

From the site's beginnings in August 1994 until February 2009, the infrastructure was provided by the Australian National University. During that time, the site accumulated close to 30 million hits. It passed 65 million in early 2021.

Sponsored by the Gallery, Bunhybee Grasslands, the extended Clarke Family, Knights of the Spatchcock and their drummer
Xamax Consultancy Pty Ltd
ACN: 002 360 456
78 Sidaway St, Chapman ACT 2611 AUSTRALIA
Tel: +61 2 6288 6916

Created: 6 July 2022 - Last Amended: 20 October 2022 by Roger Clarke - Site Last Verified: 15 February 2009
This document is at www.rogerclarke.com/DV/FSSS.html
Mail to Webmaster   -    © Xamax Consultancy Pty Ltd, 1995-2022   -    Privacy Policy