Show simple item record

[journal article]

dc.contributor.authorParsons, Christopherde
dc.date.accessioned2015-11-10T06:23:49Z
dc.date.available2015-11-10T06:23:49Z
dc.date.issued2015de
dc.identifier.issn2183-2439de
dc.identifier.urihttp://www.ssoar.info/ssoar/handle/document/45266
dc.description.abstractThis article begins by recounting a series of mass surveillance practices conducted by members of the "Five Eyes" spying alliance. While boundary -and intersubjectivity- based theories of privacy register some of the harms linked to such practices I demonstrate how neither are holistically capable of registering these harms. Given these theories' deficiencies I argue that critiques of signals intelligence surveillance practices can be better grounded on why the practices intrude on basic communicative rights, including those related to privacy. The crux of the argument is that pervasive mass surveillance erodes essential boundaries between public and private spheres by compromising populations' abilities to freely communicate with one another and, in the process, erodes the integrity of democratic processes and institutions. Such erosions are captured as privacy violations but, ultimately, are more destructive to the fabric of society than are registered by theories of privacy alone. After demonstrating the value of adopting a communicative rights approach to critique signals intelligence surveillance I conclude by arguing that this approach also lets us clarify the international normative implications of such surveillance, that it provides a novel way of conceptualizing legal harm linked to the surveillance, and that it showcases the overall value of focusing on the implications of interfering with communications first, and as such interferences constituting privacy violations second. Ultimately, by adopting this Habermasian inspired mode of analysis we can develop more holistic ways of conceptualizing harms associated with signals intelligence practices than are provided by either boundary -or intersubjective- based theories of privacy.en
dc.languageende
dc.subject.ddcTechnik, Technologiede
dc.subject.ddcNews media, journalism, publishingen
dc.subject.ddcPolitikwissenschaftde
dc.subject.ddcTechnology (Applied sciences)en
dc.subject.ddcPublizistische Medien, Journalismus,Verlagswesende
dc.subject.ddcPolitical scienceen
dc.titleBeyond privacy: articulating the broader harms of pervasive mass surveillancede
dc.description.reviewbegutachtet (peer reviewed)de
dc.description.reviewpeer revieweden
dc.identifier.urlhttp://www.cogitatiopress.com/ojs/index.php/mediaandcommunication/article/view/263de
dc.source.journalMedia and Communication
dc.source.volume3de
dc.publisher.countryMISC
dc.source.issue3de
dc.subject.classozMedia Politics, Information Politics, Media Lawen
dc.subject.classozPeace and Conflict Research, International Conflicts, Security Policyen
dc.subject.classozBroadcasting, Telecommunicationen
dc.subject.classozTechnology Assessmenten
dc.subject.classozFriedens- und Konfliktforschung, Sicherheitspolitikde
dc.subject.classozTechnikfolgenabschätzungde
dc.subject.classozRundfunk, Telekommunikationde
dc.subject.classozMedienpolitik, Informationspolitik, Medienrechtde
dc.subject.thesozÜberwachungde
dc.subject.thesozmonitoringen
dc.subject.thesozPrivatsphärede
dc.subject.thesozprivacyen
dc.subject.thesozRechtde
dc.subject.thesozlawen
dc.subject.thesoznationale Sicherheitde
dc.subject.thesoznational securityen
dc.subject.thesozDemokratiede
dc.subject.thesozdemocracyen
dc.subject.thesozDatenschutzde
dc.subject.thesozdata protectionen
dc.subject.thesozHabermas, J.de
dc.subject.thesozHabermas, J.en
dc.subject.thesozTelekommunikationde
dc.subject.thesoztelecommunicationen
dc.subject.thesozKritische Theoriede
dc.subject.thesozcritical theoryen
dc.rights.licenceCreative Commons - Namensnennungde
dc.rights.licenceCreative Commons - Attributionen
internal.statusformal und inhaltlich fertig erschlossende
internal.identifier.thesoz10060511
internal.identifier.thesoz10055257
internal.identifier.thesoz10040087
internal.identifier.thesoz10042911
internal.identifier.thesoz10037672
internal.identifier.thesoz10040560
internal.identifier.thesoz10046185
internal.identifier.thesoz10049301
internal.identifier.thesoz10044037
dc.type.stockarticlede
dc.type.documentZeitschriftenartikelde
dc.type.documentjournal articleen
dc.source.pageinfo1-11de
internal.identifier.classoz1080401
internal.identifier.classoz20800
internal.identifier.classoz1080411
internal.identifier.classoz10507
internal.identifier.journal793
internal.identifier.document32
internal.identifier.ddc320
internal.identifier.ddc070
internal.identifier.ddc600
dc.source.issuetopicSurveillance: critical analysis and current challenges (part II)de
dc.identifier.doihttps://doi.org/10.17645/mac.v3i3.263de
dc.description.pubstatusVeröffentlichungsversionde
dc.description.pubstatusPublished Versionen
internal.identifier.licence1
internal.identifier.pubstatus1
internal.identifier.review1
dc.description.miscmediaandcommunication-263de
dc.subject.classhort10800de
dc.subject.classhort10500de
dc.subject.classhort20800de
internal.check.abstractlanguageharmonizerCERTAIN


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record