Carsten Ochs (Author)
Barbara Büttner (Author)
Jörn Lamla (Author)
Research on privacy practices in digital environments has oftentimes discovered a paradoxical relationship between users’ discursive appraisal of privacy and their actual practices: the “privacy paradox.” The emergence of this paradox prompts us to conduct ethnography of a health and fitness platform in order to flesh out the structural mechanisms generating this paradox. We provide an ethnographic analysis of surveillance capitalism in action that relates front-end practices empirically to the data economy’s back-end operations to show how this material-semiotic setup elicits users’ desire to become self-determined subjects in a way that makes them amenable as objects of behavioral engineering. We combine different ethnographic methods and materials (situational mapping: network overview; discourse analysis: interpellations; autoethnography: practices; technical app analysis: data flow; business model canvas: revenue information) to specify how different types of values are produced and translated on the investigated platform. The latter offers users the values of self-mastery and social visibility. However, the data generated in this process serve to translate these values into the value of economic amenability and thereupon ultimately into economic profit. What gets lost in translation, though, is the front-end promise of self-mastery. It is these structural mechanisms that generate the privacy paradox in the first place.
...More
Book
Mary F. E. Ebeling;
(2022)
Afterlives of Data: Life and Debt under Capitalist Surveillance
(/isis/citation/CBB663965321/)
Book
Colin Koopman;
(2019)
How We Became Our Data: A Genealogy of the Informational Person
(/isis/citation/CBB981384434/)
Article
Evan Selinger;
Darrin Durant;
(2022)
Amazon’s Ring: Surveillance as a Slippery Slope Service
(/isis/citation/CBB181826170/)
Book
Josh Lauer;
Kenneth Lipartito;
(2021)
Surveillance Capitalism in America
(/isis/citation/CBB401959068/)
Article
Sarah Myers West;
(June 2022)
Cryptography as information control
(/isis/citation/CBB869396949/)
Thesis
Kim, Richard S.Y.;
(2010)
Cyber-Surveillance: A Case Study in Policy and Development
(/isis/citation/CBB001567169/)
Article
Ben Falchuk;
Shoshana Loeb;
Ralph Neff;
(June 2018)
The Social Metaverse: Battle for Privacy
(/isis/citation/CBB447859564/)
Book
Brian Hochman;
(2022)
The Listeners: A History of Wiretapping in the United States
(/isis/citation/CBB775086796/)
Book
Andrew J. Stewart;
(2021)
A Vulnerable System: The History of Information Security in the Computer Age
(/isis/citation/CBB758382142/)
Book
Francesca Musiani;
Derrick L. Cogburn;
Laura DeNardis;
Nannette S. Levinson;
(2016)
The Turn to Infrastructure in Internet Governance
(/isis/citation/CBB771724730/)
Article
Alexander Trauth-Goik;
(December 2019)
"Constructing a Culture of Honesty and Integrity": The Evolution of China's Han-centric Surveillance System
(/isis/citation/CBB323886145/)
Article
Darren Ellis;
(2020)
Techno-Securitisation of Everyday Life and Cultures of Surveillance-Apatheia
(/isis/citation/CBB734944273/)
Article
Simon Willmetts;
(2018)
Digital Dystopia: Surveillance, Autonomy, and Social Justice in Gary Shteyngart's Super Sad True Love Story
(/isis/citation/CBB861324031/)
Review
Russell, Andrew;
(2016)
Review of unknown publication
(/isis/citation/CBB100069195/)
Book
Duane C. Wilson;
(2021)
Cybersecurity
(/isis/citation/CBB201310866/)
Article
Aynne Kokas;
(2018)
Platform Patrol: China, the United States, and the Global Battle for Data Security
(/isis/citation/CBB992297943/)
Article
Charles Dupras;
Katie Michelle Saulnier;
Yann Joly;
(October 2019)
Epigenetics, ethics, law and society: A multidisciplinary review of descriptive, instrumental, dialectical and reflexive analyses
(/isis/citation/CBB595581322/)
Article
Tal Zarsky;
(January 2016)
The Trouble with Algorithmic Decisions: An Analytic Road Map to Examine Efficiency and Fairness in Automated and Opaque Decision Making
(/isis/citation/CBB775587512/)
Book
John Cheney-Lippold;
(2017)
We are data : Algorithms and the making of our digital selves
(/isis/citation/CBB593815757/)
Article
Ben Collier;
James Stewart;
(2022)
Privacy Worlds: Exploring Values and Design in the Development of the Tor Anonymity Network
(/isis/citation/CBB749753638/)
Be the first to comment!