A day in the digital life: a preliminary sousveillance study

Fletcher, G ORCID: https://orcid.org/0000-0002-3294-0465, Griffiths, M ORCID: https://orcid.org/0000-0002-2040-1077 and Kutar, M ORCID: https://orcid.org/0000-0003-1176-8413 2011, A day in the digital life: a preliminary sousveillance study , in: A Decade in Internet Time Symposium on the Dynamics of the Internet and Society, 21 - 24 September 2011, University of Oxford. (Unpublished)

This is the latest version of this item.

PDF - Updated Version
Download (173kB) | Preview
Access Information: This paper is also available in SSRN (SSRN has again been named the Number 1 Open Access Repository in the World (for July, 2011) by the Ranking Web of World Repositories, repeating our #1 Ranking from January, 2011).


A decade ago, Castells argued that most surveillance would have no directly damaging consequences. He proposed that what should be of more concern were the unpredictable consequences of our over-exposed lives, the lack of explicit rules for on-line behaviour and how this then was interpreted by a ‘multitude of little sisters’ who process and store this information, forever (Castells 2001:180). A decade later, these conjectures are still valid but are now at a critical level as individuals passively volunteer personal information while government and commercial organisations aggressively amass these snippets into correlated data. As boundaries between on-line and off-line blur, and geo-locative applications grow in popularity, we echo Castells by asking, what will be, and what are, the privacy implications of existing in a technologically saturated environment? The human data trail now begins prior to conception and continues after death. We aim to develop a methodology to enable us to quantify this trail and to examine the impact that such amassment of data has on society, communities, and personal identities within the UK. The reality is that the digital footprint is a significant research challenge to identify and then quantify. There is a critical need to capture relevant activities in a holistic and interconnected manner in order to enable understanding of the societal implications. We describe a preliminary study which will be used as a starting point to develop appropriate methods for quantification and analysis of the 21st century digital footprint.

Item Type: Conference or Workshop Item (Paper)
Themes: Media, Digital Technology and the Creative Economy
Schools: Schools > Salford Business School > Salford Business School Research Centre
Refereed: No
Depositing User: Dr Maria Kutar
Date Deposited: 30 Nov 2011 11:14
Last Modified: 15 Feb 2022 18:07
References: Bendle, M. (2002), The Crisis of ‘Identity” in High Modernity, British Journal of Sociology, 53(1): 1-18. Bhargav-Spantzel, A., Squicciarini, A., Young, M. and Bertino, E., (2007), Privacy Requirement identity Management Solutions’ in Editors MJ Smith, G. Salvendy: Human Interface, Part II, HCII 2007, LNCS 4558, 694-702, Springer-Verlag Berlin Heidelberg. Boyd, d. 2010. "Privacy and Publicity in the Context of Big Data." WWW. Raleigh, North Carolina, April 29. Businesswire (2010) Accessed August 2011 at http://www.businesswire.com/news/home/20101006006722/en/Digital-Birth-Online-World Castells, M. (2001), The Internet Galaxy: Reflections on the Internet, Business and Society. Oxford: Oxford University Press. Cecez-Kecmanovic, D. (2001), Doing Critical IS Research: the Question of Methodology. In Qualitative Research in Information Systems: Issues and Trends (Trauth, E. Ed.), pp.142-163, Hershey, PA: Idea Group Publishing. Clarke, R. (1994) The digital persona and its application to data surveillance. The Information Society 10(2), 77-92. Hine, C. (2000) Virtual Ethnography. London: Sage. Johnson, B. (2010), Privacy no longer a social norm, says Facebook founder, The Guardian, accessed in August 2011 from http://www.guardian.co.uk/technology/2010/jan/11/facebook-privacy O’Donnell, A., Jetten, J. and Ryan, M. (2010a), Who is watching over you? The role of shared identity in perceptions of surveillance’, European Journal of Social Psychology, 40, 135-147 O’Donnell, A., Jetten, J. and Ryan, M. (2010), Watching over your own: How surveillance moderates the impact of shared identity on perceptions of leaders and follower behaviour, European Journal of Social Psychology, 49, 1046-1061. Parsell, M. (2008), Pernicious Virtual Communities: Identity, Polarization and the Web 2.0. Ethics and Information Technology, 10:1, 42-56. Rathje, W. and Murphy, C. (2001) ‘Rubbish: The Archaeology of Garbage’, Tuscon : University of Arizona Press. Solove, D. (2004), The Digital Person: Technology and Privacy in the Information Age, New York University Press and London Tavani, H. T., (2011) Ethics and Technology: Controversies, Questions and Strategies for Ethical Computing. 3rd Edition. Wiley Wajcman, J. (2002), Addressing Technological Change: The Challenge to Social Theory, Current Sociology, 50(3): 347-363, London: Sage Publications. Wells, H. and Wills, D. (2009) Individualism and Identity: Resistance to Speed Cameras in the UK. Surveillance and Society 6(3): 259-274. Zittrain, J. (2008), ‘The Future of the Internet and How to Stop It’, Yale Books, Unbound, Yale University Press. Accessed 28-08-2011
URI: http://usir.salford.ac.uk/id/eprint/19059

Available Versions of this Item

Actions (login required)

Edit record (repository staff only) Edit record (repository staff only)