Skip to main content
Erschienen in: Journal of Business Ethics 1/2019

18.01.2018 | Commentary

Trust in Surveillance: A Reply to Etzioni

Erschienen in: Journal of Business Ethics | Ausgabe 1/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Etzioni has recently proposed that the success of Internet enabled commerce is surprising due to what I label the “trust in strangers” problem. In here responding to Etzioni, I argue that the “trust in strangers” problem effectively dissolves once it is recognized that current manifestations of Internet commerce are not associated with high levels of anonymity, but rather, with high levels of surveillance. In doing so, I first outline how data capitalism and security considerations have contributed to Internet surveillance being close to ubiquitous. Following this, I differentiate between three types of surveillance—i.e. top-down, bottom-up, networked—that many people who digitally connect rely upon. In concluding, I emphasize my basic argument. Namely, that it is “trust in surveillance”, rather than “trust in strangers”, that supports current manifestations of commerce online.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Web 2.0 is generally thought to have commenced around the start of this century, when the dot-com bubble burst and Web 1.0 came to a halt. Amongst other considerations, Web 1.0 is often thought to have been focused on directly selling products, and/or, acting like a publisher. Web 2.0, on the other hand, has a bigger emphasis on connecting buyers and sellers and enabling access to content. Myers West (2017) and O’Reilly (2007) explore such differences in more detail.
 
Literatur
Zurück zum Zitat Bardhi, F., & Eckhardt, G. M. (2012). Access-based consumption: The case of car sharing. Journal of Consumer Research, 39(4), 881–898.CrossRef Bardhi, F., & Eckhardt, G. M. (2012). Access-based consumption: The case of car sharing. Journal of Consumer Research, 39(4), 881–898.CrossRef
Zurück zum Zitat Etzioni, A. (2003). Introduction: Rights and responsibilities. In A. Etzioni & H. H. Marsh (Eds.), Rights vs. public safety after 9/11: America in the age of terrorism (pp. ix–xviii). Oxford: Rowman & Littlefield. Etzioni, A. (2003). Introduction: Rights and responsibilities. In A. Etzioni & H. H. Marsh (Eds.), Rights vs. public safety after 9/11: America in the age of terrorism (pp. ix–xviii). Oxford: Rowman & Littlefield.
Zurück zum Zitat Foucault, M. (1977). Discipline and punish: The birth of the prison. New York, NY: Random House. Foucault, M. (1977). Discipline and punish: The birth of the prison. New York, NY: Random House.
Zurück zum Zitat Juels, A., Kosba, A., & Shi, E. (2016). The ring of Gyges: Investigating the future of criminal smart contracts. In CCS’16, proceedings of the 2016 ACM SIGSAC conference on computer and communications security, Vienna, Austria, October 24–28 (pp. 283–295) Juels, A., Kosba, A., & Shi, E. (2016). The ring of Gyges: Investigating the future of criminal smart contracts. In CCS’16, proceedings of the 2016 ACM SIGSAC conference on computer and communications security, Vienna, Austria, October 24–28 (pp. 283–295)
Zurück zum Zitat Lyon, D. (1994). The electronic eye: The rise of surveillance society. Cambridge: Polity Press. Lyon, D. (1994). The electronic eye: The rise of surveillance society. Cambridge: Polity Press.
Zurück zum Zitat Mann, S., Nolan, J., & Wellman, B. (2002). Sousveillance: Inventing and using wearable computing devices for data collection in surveillance environments. Surveillance & Society, 1(3), 331–355.CrossRef Mann, S., Nolan, J., & Wellman, B. (2002). Sousveillance: Inventing and using wearable computing devices for data collection in surveillance environments. Surveillance & Society, 1(3), 331–355.CrossRef
Zurück zum Zitat McGrath, J. E. (2004). Loving big brother: Performance, privacy, and surveillance space. London: Routledge.CrossRef McGrath, J. E. (2004). Loving big brother: Performance, privacy, and surveillance space. London: Routledge.CrossRef
Zurück zum Zitat O’Neill, O. (2002). Autonomy and trust in bioethics. Cambridge: Cambridge University Press.CrossRef O’Neill, O. (2002). Autonomy and trust in bioethics. Cambridge: Cambridge University Press.CrossRef
Zurück zum Zitat O’Reilly, T. (2007). What is Web 2.0: Design patterns and business models for the next generation of software. Communications & Strategies, 65(1), 17–37. O’Reilly, T. (2007). What is Web 2.0: Design patterns and business models for the next generation of software. Communications & Strategies, 65(1), 17–37.
Zurück zum Zitat Slee, T. (2015). What’s yours is mine: Against the sharing economy. New York: OR Books. Slee, T. (2015). What’s yours is mine: Against the sharing economy. New York: OR Books.
Zurück zum Zitat Soska, K., & Christin, N. (2015). Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In Proceedings of the 24th USENIX security symposium, Washington, DC, August 12–14 (pp. 33–48). Soska, K., & Christin, N. (2015). Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In Proceedings of the 24th USENIX security symposium, Washington, DC, August 12–14 (pp. 33–48).
Zurück zum Zitat Sundarajan, A. (2016). The sharing economy: The end of employment and the rise of crowd-based capitalism. Cambridge, MA: The MIT Press. Sundarajan, A. (2016). The sharing economy: The end of employment and the rise of crowd-based capitalism. Cambridge, MA: The MIT Press.
Zurück zum Zitat Swan, M. (2015). Blockchain: Blueprint for a new economy. Beijing: O'Reilly. Swan, M. (2015). Blockchain: Blueprint for a new economy. Beijing: O'Reilly.
Zurück zum Zitat Zuboff, S. (2015). Big other: Surveillance capitalism and the prospects of an information civilization. Journal of Information Technology, 30(1), 75–89.CrossRef Zuboff, S. (2015). Big other: Surveillance capitalism and the prospects of an information civilization. Journal of Information Technology, 30(1), 75–89.CrossRef
Metadaten
Titel
Trust in Surveillance: A Reply to Etzioni
Publikationsdatum
18.01.2018
Erschienen in
Journal of Business Ethics / Ausgabe 1/2019
Print ISSN: 0167-4544
Elektronische ISSN: 1573-0697
DOI
https://doi.org/10.1007/s10551-018-3779-4

Weitere Artikel der Ausgabe 1/2019

Journal of Business Ethics 1/2019 Zur Ausgabe

Premium Partner