메뉴 건너뛰기




Volumn 10, Issue , 2008, Pages 257-278

Hacking the panopticon: Distributed online surveillance and resistance

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77950695368     PISSN: 15216136     EISSN: None     Source Type: Book Series    
DOI: 10.1016/S1521-6136(07)00212-6     Document Type: Review
Times cited : (21)

References (60)
  • 2
    • 84888245076 scopus 로고    scopus 로고
    • Associated Press. Technology Review, published August 20, 2007, retrieved August 21, 2007, from
    • Associated Press. (2007). New breed of 'compliance software' makes office computer monitoring more sophisticated. Technology Review, published August 20, 2007, retrieved August 21, 2007, from http://www.technologyreview.com/Wire/ 19271/page1/
    • (2007) New Breed of 'Compliance Software' Makes Office Computer Monitoring More Sophisticated
  • 4
    • 35348917823 scopus 로고    scopus 로고
    • 4417749 The New York Times, published August 9, 2006, retrieved September 25, 2007
    • Barbaro, M., &Zeller, T. (2006). A face is exposed for AOL searcher no. 4417749 The New York Times, published August 9, 2006, retrieved September 25, 2007, from http://www.nytimes.com/2006/08/09/technology/09aol.html
    • (2006) A Face Is Exposed for AOL Searcher
    • Barbaro, M.1    Zeller, T.2
  • 6
    • 33748991015 scopus 로고    scopus 로고
    • New Haven, CT: Yale University Press
    • Benkler, Y. (2006). The wealth of networks. New Haven, CT: Yale University Press.
    • (2006) The Wealth of Networks
    • Benkler, Y.1
  • 7
    • 84904777935 scopus 로고    scopus 로고
    • D. Lyon (Ed.) Theorizing surveillance: The panopticon and beyond. Cullompton: Willan Publishing
    • Bogard, W. (2006). Surveillance assemblages and lines of flight. In: D. Lyon (Ed.)), Theorizing surveillance: The panopticon and beyond (pp. 97-122). Cullompton: Willan Publishing
    • (2006) Surveillance Assemblages and Lines of Flight , pp. 97-122
    • Bogard, W.1
  • 8
    • 0000454826 scopus 로고
    • Competition and price dispersion in the U.S. Airline industry
    • Borenstein, S., &Rose, N. (1994). Competition and price dispersion in the U.S. airline industry. The Journal of Political Economy, 102(4), 653-683
    • (1994) The Journal of Political Economy , vol.102 , Issue.4 , pp. 653-683
    • Borenstein, S.1    Rose, N.2
  • 10
    • 27644527244 scopus 로고    scopus 로고
    • Panopticon com: Online surveillance and the commodification of privacy
    • Campbell, E., &Carlson, M. (2002). Panopticon.com: Online surveillance and the commodification of privacy. Journal of Broadcasting &Electronic Media, 46(4), 586-606
    • (2002) Journal of Broadcasting &Electronic Media , vol.46 , Issue.4 , pp. 586-606
    • Campbell, E.1    Carlson, M.2
  • 11
    • 84888241218 scopus 로고    scopus 로고
    • D. Thomas &B. D. Loader (Eds) , Cybercrime: Law enforcement, security and surveillance in the information age London: Routledge
    • Denning, D. E., &Baugh, W. E. (2000). Hiding crimes in cyberspace. In: D. Thomas &B. D. Loader (Eds)), Cybercrime: Law enforcement, security and surveillance in the information age (pp. 105-131). London: Routledge.
    • (2000) Hiding Crimes in Cyberspace , pp. 105-131
    • Denning, D.E.1    Baugh, W.E.2
  • 12
    • 0033475662 scopus 로고    scopus 로고
    • Strategic service pricing and yield management
    • Desiraju, R., &Shugan, S. (1999). Strategic service pricing and yield management. Journal of Marketing, 63(1), 44-56
    • (1999) Journal of Marketing , vol.63 , Issue.1 , pp. 44-56
    • Desiraju, R.1    Shugan, S.2
  • 14
    • 53149114747 scopus 로고    scopus 로고
    • Lawsuits may illuminate methods of spy program
    • Eggen, D. (2007). Lawsuits may illuminate methods of spy program. The Washington Post, August 14, p. A01
    • (2007) The Washington Post, August , vol.14
    • Eggen, D.1
  • 19
    • 84861290223 scopus 로고    scopus 로고
    • W. Kellogg &S. Zhai (Eds) , Proceedings of the SIGCHI conference on human factors in computing systems. New York, NY: ACM Press
    • Garfinkel, S., Margrave, D., Schiller, J., Nordlander, E., &Miller, R. (2005). How to make secure email easier to use. In: W. Kellogg &S. Zhai (Eds)), Proceedings of the SIGCHI conference on human factors in computing systems (pp. 701-710). New York, NY: ACM Press.
    • (2005) How to Make Secure Email Easier to Use , pp. 701-710
    • Garfinkel, S.1    Margrave, D.2    Schiller, J.3    Nordlander, E.4    Miller, R.5
  • 20
    • 48349147668 scopus 로고    scopus 로고
    • Information Week, published September 6, 2007, retrieved September 23, 2007
    • Gaudin, S. (2007). Storm worm botnet more powerful than top supercomputers. Information Week, published September 6, 2007, retrieved September 23, 2007, from http://www.informationweek.com/story/showArticle.jhtml? articleID=201804528
    • (2007) Storm Worm Botnet More Powerful Than Top Supercomputers
    • Gaudin, S.1
  • 21
    • 33745812088 scopus 로고    scopus 로고
    • R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries &G. Olson (Eds) , Proceedings of the SIGCHI conference on human factors in computing systems New York, NY: ACM Press
    • Gaw, S., Felten, E., &Fernandez-Kelly, P. (2006). Secrecy, flagging and paranoia: Adoption criteria in encrypted e-mail. In: R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries &G. Olson (Eds)), Proceedings of the SIGCHI conference on human factors in computing systems (pp. 591-600). New York, NY: ACM Press.
    • (2006) Secrecy, Flagging and Paranoia: Adoption Criteria in Encrypted , pp. 591-600
    • Gaw, S.1    Felten, E.2    Fernandez-Kelly, P.3
  • 22
    • 30744439551 scopus 로고    scopus 로고
    • Internet encyclopedias go head to head
    • Giles, J. (2005). Internet encyclopedias go head to head. Nature, 438(7070), 900-901
    • (2005) Nature , vol.438 , Issue.7070 , pp. 900-901
    • Giles, J.1
  • 23
    • 84967157539 scopus 로고    scopus 로고
    • K.D. Haggerty &R.V. Ericson (Eds) , The new politics of surveillance and visibility. Toronto: University of Toronto Press
    • Gilliom, J. (2006). Struggling with surveillance: Resistance, consciousness, and identity. In: K.D. Haggerty &R.V. Ericson (Eds)), The new politics of surveillance and visibility (pp. 111-129). Toronto: University of Toronto Press.
    • (2006) Struggling with Surveillance: Resistance, Consciousness, and Identity , pp. 111-129
    • Gilliom, J.1
  • 25
    • 84904779819 scopus 로고    scopus 로고
    • D. Lyon (Ed.) Theorizing surveillance: The panopticon and beyond. Cullompton: Willan Publishing
    • Haggerty, K. D. (2006). Tear down the walls: On demolishing the panopticon. In: D. Lyon (Ed.)), Theorizing surveillance: The panopticon and beyond (pp. 23-45). Cullompton: Willan Publishing
    • (2006) Tear Down the Walls: On Demolishing the Panopticon , pp. 23-45
    • Haggerty, K.D.1
  • 27
    • 84967194929 scopus 로고    scopus 로고
    • K. D. Haggerty &R. V. Ericson (Eds) , The new politics of surveillance and visibility. Toronto: University of Toronto Press
    • Haggerty, K. D., &Ericson, R. V. (2006). The new politics of surveillance and visibility. In: K. D. Haggerty &R. V. Ericson (Eds)), The new politics of surveillance and visibility (pp. 3-25). Toronto: University of Toronto Press.
    • (2006) The New Politics of Surveillance and Visibility , pp. 3-25
    • Haggerty, K.D.1    Ericson, R.V.2
  • 28
    • 46449122098 scopus 로고    scopus 로고
    • The Telegraph published January 13, 2007, retrieved September 16, 2007, from
    • Harding, T. (2007). Terrorists 'use Google maps to hit UK troops'. The Telegraph, published January 13, 2007, retrieved September 16, 2007, from http://www.telegraph.co.uk/news/
    • (2007) Terrorists 'Use Google Maps to Hit UK Troops
    • Harding, T.1
  • 29
    • 77949733379 scopus 로고    scopus 로고
    • Jeremy bentham and the new south wales convicts
    • Jackson, R. V. (1998). Jeremy Bentham and the New South Wales convicts. International Journal of Social Economics, 25(2/3/4), 370-379
    • (1998) International Journal of Social Economics , vol.25 , Issue.2-3 , pp. 370-379
    • Jackson, R.V.1
  • 32
    • 33645220540 scopus 로고    scopus 로고
    • The transformation of the web: How emerging comm unities shape the information we consume
    • Kolbitsch, J., &Maurer, H. (2006). The transformation of the web: How emerging comm unities shape the information we consume. Journal of Universal Computer Science, 12(2), 186-213
    • (2006) Journal of Universal Computer Science , vol.12 , Issue.2 , pp. 186-213
    • Kolbitsch, J.1    Maurer, H.2
  • 36
    • 84967104334 scopus 로고    scopus 로고
    • K. D. Haggerty &R. V. Ericson (Eds) , The new politics of surveillance and visibility, . Toronto: University of Toronto Press
    • Lyon, D. (2006). 9/11, synopticon and scopophilia: Watching and being watched. In: K. D. Haggerty &R. V. Ericson (Eds)), The new politics of surveillance and visibility, (pp. 35-54). Toronto: University of Toronto Press.
    • (2006) 9/11, Synopticon and Scopophilia: Watching and Being Watched , pp. 35-54
    • Lyon, D.1
  • 37
    • 0038803998 scopus 로고    scopus 로고
    • A tack in the shoe: Neutralizing and resisting the new surveillance
    • Marx, G. T. (2003). A tack in the shoe: Neutralizing and resisting the new surveillance. Journal of Social Issues, 59(2), 369-390
    • (2003) Journal of Social Issues , vol.59 , Issue.2 , pp. 369-390
    • Marx, G.T.1
  • 38
    • 85055403921 scopus 로고    scopus 로고
    • Rocky Bottoms: Techno-fallacies of an age of information
    • Marx, G. T. (2007). Rocky Bottoms: Techno-fallacies of an age of information. International Political Sociology, 1(1), 83-110
    • (2007) International Political Sociology , vol.1 , Issue.1 , pp. 83-110
    • Marx, G.T.1
  • 39
    • 0039364913 scopus 로고    scopus 로고
    • The viewer society: Michel foucault's 'panopticon' revisited
    • Mathiesen, T. (1997). The viewer society: Michel Foucault's 'Panopticon' revisited. Theoretical Criminology, 1(2), 215-234
    • (1997) Theoretical Criminology , vol.1 , Issue.2 , pp. 215-234
    • Mathiesen, T.1
  • 40
    • 84888271092 scopus 로고    scopus 로고
    • CNET News.com, published September 12, 2006, retrieved September 15, 2007, from
    • Meyer, D. (2006). Google, Microsoft vie for earth domination. CNET News.com, published September 12, 2006, retrieved September 15, 2007, from http://www.news.com/
    • (2006) Google, Microsoft Vie for Earth Domination
    • Meyer, D.1
  • 41
    • 0004255422 scopus 로고
    • Chicago, IL: The University of Chicago Press
    • Monmonier, M. (1991). How to lie with maps. Chicago, IL: The University of Chicago Press.
    • (1991) How to Lie with Maps
    • Monmonier, M.1
  • 42
    • 31244434953 scopus 로고    scopus 로고
    • Is the Internet a US invention? An economic and technological history of computer networking
    • Mowery, D. C., &Simcoe, T. (2002). Is the Internet a US invention? An economic and technological history of computer networking. Research Policy, 31(8-9), 1369-1387
    • (2002) Research Policy , vol.31 , Issue.8-9 , pp. 1369-1387
    • Mowery, D.C.1    Simcoe, T.2
  • 44
    • 77953891458 scopus 로고    scopus 로고
    • University of Colorado Law Legal Studies Research Paper No. 07-14 retrieved September 28, 2007, from
    • Ohm, P. (2007). The myth of the superuser: Fear, risk, and harm online. University of Colorado Law Legal Studies Research Paper No. 07-14, retrieved September 28, 2007, from http://www.ssrn.com/abstract=967372
    • (2007) The Myth of the Superuser: Fear, Risk, and Harm Online
    • Ohm, P.1
  • 45
    • 84993778159 scopus 로고    scopus 로고
    • The limits of coercive surveillance: Social and penal control in the german democratic republic
    • Pfaff, S. (2001). The limits of coercive surveillance: Social and penal control in the German Democratic Republic. Punishment &Society, 3(3)
    • (2001) Punishment &Society , vol.3 , pp. 3
    • Pfaff, S.1
  • 49
    • 85044916411 scopus 로고    scopus 로고
    • Hardt and Negri's information empire: A critical response
    • Poster, M. (2005). Hardt and Negri's information empire: A critical response. Cultural Politics, 1(1), 101-118
    • (2005) Cultural Politics , vol.1 , Issue.1 , pp. 101-118
    • Poster, M.1
  • 50
    • 42149195827 scopus 로고    scopus 로고
    • Reuters. USA Today, published July 16, 2006, retrieved on September 3, 2007, from
    • Reuters. (2006). YouTube serves up 100 million videos a day online. USA Today, published July 16, 2006, retrieved on September 3, 2007, from http://www.usatoday.com/tech/news/2006-07-16-youtube-views-x.htm
    • (2006) YouTube Serves Up 100 Million Videos A Day Online
  • 51
    • 84888256548 scopus 로고    scopus 로고
    • Los Angeles Times, published August 6, 2007, retrieved September 11, 2007, from
    • Rodriguez, G. (2007). YouTube vigilantes. Los Angeles Times, published August 6, 2007, retrieved September 11, 2007, from http://www.latimes.com/news/ opinion/
    • (2007) YouTube Vigilantes
    • Rodriguez, G.1
  • 54
    • 84893144720 scopus 로고    scopus 로고
    • The return of panopticism: Supervision, subjection and the new surveillance
    • Simon, B. (2005). The return of panopticism: Supervision, subjection and the new surveillance. Surveillance and Society, 3(3), 1-20
    • (2005) Surveillance and Society , vol.3 , Issue.3 , pp. 1-20
    • Simon, B.1
  • 57
    • 33644887567 scopus 로고    scopus 로고
    • Cambridge: Cambridge University Press
    • Tilly, C. (2005). Trust and rule. Cambridge: Cambridge University Press.
    • (2005) Trust and Rule
    • Tilly, C.1
  • 59
    • 0002177405 scopus 로고
    • D. Kahneman, P. Slovic &A. Tversky (Eds) , Judgement under uncertainty: Heuristics and biases Cambridge: Cambridge University Press
    • Tversky, A., &Kahneman, D. (1982). Judgement under uncertainty: Heuristics and biases. In: D. Kahneman, P. Slovic &A. Tversky (Eds)), Judgement under uncertainty: Heuristics and biases (pp. 3-20). Cambridge: Cambridge University Press.
    • (1982) Judgement under Uncertainty: Heuristics and Biases , pp. 3-20
    • Tversky, A.1    Kahneman, D.2
  • 60
    • 84882348435 scopus 로고    scopus 로고
    • Wired, published September 10, 2007, retrieved September 25, 2007, from
    • Zetter, K. (2007). Rogue nodes turn to anonymiser's into eavesdropper's paradise. Wired, published September 10, 2007, retrieved September 25, 2007, from http://www.wired.com/politics/security/news/2007/09/embassy-hacks
    • (2007) Rogue Nodes Turn to Anonymiser's into Eavesdropper's Paradise
    • Zetter, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.