Article ID: CBB734944273

Techno-Securitisation of Everyday Life and Cultures of Surveillance-Apatheia (2020)

unapi

As a result of digital technologies and the internet becoming increasingly ubiquitous, security technologies and surveillance systems are progressively encroaching upon peoples’ privacy. Yet concerns about this appear to be relatively muted. Why is this the case? Is the public generally indifferent about it or perhaps silently in agreement with its increased presence? As techno-security systems are becoming increasingly complex, multiple, normative, hardly recognisable, often covert and all encompassing, positioning oneself in relation to them can be a difficult process. Hence the techno-securitisation of everyday life has psychological effects which are multiple and largely unconscious. Indeed, we are all somewhat uncertain about the spin-offs of surveillance technologies and practices – in terms of their capabilities, who has access to the data they produce, and the ways that they might affect subjectivity. Rather than being plainly indifferent or silently consenting to increased techno-securitisation, some participants in this study developed an attitude of surveillance-apatheia. They tended to state that ‘as there is no avoiding these systems and not much one can do about them, why consciously worry about them?’ This attitude is not necessarily a lack of interest, but rather a way of managing associated undesirable affects, feelings and emotions.

...More
Included in

Article Jutta Weber; Katrin M. Kämpf (2020) Technosecurity Cultures: Introduction. Science as Culture (pp. 1-10). unapi

Citation URI
https://data.isiscb.org/isis/citation/CBB734944273/

Similar Citations

Book Brian Hochman; (2022)
The Listeners: A History of Wiretapping in the United States (/isis/citation/CBB775086796/)

Article Evan Selinger; Darrin Durant; (2022)
Amazon’s Ring: Surveillance as a Slippery Slope Service (/isis/citation/CBB181826170/)

Article Patrick Petit; (2020)
‘Everywhere Surveillance’: Global Surveillance Regimes as Techno-Securitization (/isis/citation/CBB181724884/)

Thesis Kim, Richard S.Y.; (2010)
Cyber-Surveillance: A Case Study in Policy and Development (/isis/citation/CBB001567169/)

Article Ben Falchuk; Shoshana Loeb; Ralph Neff; (June 2018)
The Social Metaverse: Battle for Privacy (/isis/citation/CBB447859564/)

Book Mary F. E. Ebeling; (2022)
Afterlives of Data: Life and Debt under Capitalist Surveillance (/isis/citation/CBB663965321/)

Review Russell, Andrew; (2016)
Review of unknown publication (/isis/citation/CBB100069195/)

Book Kevin Macnish; (2017)
The Ethics of Surveillance: An Introduction (/isis/citation/CBB701547234/)

Article Karin Bijsterveld; (2021)
Slicing Sound: Speaker Identification and Sonic Skills at the Stasi, 1966–1989 (/isis/citation/CBB388750124/)

Book Josh Lauer; Kenneth Lipartito; (2021)
Surveillance Capitalism in America (/isis/citation/CBB401959068/)

Book Duane C. Wilson; (2021)
Cybersecurity (/isis/citation/CBB201310866/)

Book Colin Koopman; (2019)
How We Became Our Data: A Genealogy of the Informational Person (/isis/citation/CBB981384434/)

Book Andrew J. Stewart; (2021)
A Vulnerable System: The History of Information Security in the Computer Age (/isis/citation/CBB758382142/)

Article Carsten Ochs; Barbara Büttner; Jörn Lamla; (May 2021)
Trading Social Visibility for Economic Amenability: Data-based Value Translation on a “Health and Fitness Platform” (/isis/citation/CBB474517087/)

Book Francesca Musiani; Derrick L. Cogburn; Laura DeNardis; Nannette S. Levinson; (2016)
The Turn to Infrastructure in Internet Governance (/isis/citation/CBB771724730/)

Article Alexander Trauth-Goik; (December 2019)
"Constructing a Culture of Honesty and Integrity": The Evolution of China's Han-centric Surveillance System (/isis/citation/CBB323886145/)

Article Michelle Spektor; (2020)
Imagining the Biometric Future: Debates Over National Biometric Identification in Israel (/isis/citation/CBB868369028/)

Authors & Contributors
Ebeling, Mary F. E.
Carsten Ochs
Kämpf, Katrin M.
Brian Hochman
Alexander Trauth-Goik
Barbara Büttner
Concepts
Surveillance
Privacy
Technology and society
Security technologies
Technology and government
Communication technology
Time Periods
21st century
20th century, late
Modern
20th century
19th century
18th century
Places
United States
China
Israel
East Germany
Institutions
Amazon (Firm)
United States. National Security Agency
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment