dc.contributor.author | Parsons, Christopher | de |
dc.date.accessioned | 2015-11-10T06:23:49Z | |
dc.date.available | 2015-11-10T06:23:49Z | |
dc.date.issued | 2015 | de |
dc.identifier.issn | 2183-2439 | de |
dc.identifier.uri | http://www.ssoar.info/ssoar/handle/document/45266 | |
dc.description.abstract | This article begins by recounting a series of mass surveillance practices conducted by members of the "Five Eyes" spying alliance. While boundary -and intersubjectivity- based theories of privacy register some of the harms linked to such practices I demonstrate how neither are holistically capable of registering these harms. Given these theories' deficiencies I argue that critiques of signals intelligence surveillance practices can be better grounded on why the practices intrude on basic communicative rights, including those related to privacy. The crux of the argument is that pervasive mass surveillance erodes essential boundaries between public and private spheres by compromising populations' abilities to freely communicate with one another and, in the process, erodes the integrity of democratic processes and institutions. Such erosions are captured as privacy violations but, ultimately, are more destructive to the fabric of society than are registered by theories of privacy alone. After demonstrating the value of adopting a communicative rights approach to critique signals intelligence surveillance I conclude by arguing that this approach also lets us clarify the international normative implications of such surveillance, that it provides a novel way of conceptualizing legal harm linked to the surveillance, and that it showcases the overall value of focusing on the implications of interfering with communications first, and as such interferences constituting privacy violations second. Ultimately, by adopting this Habermasian inspired mode of analysis we can develop more holistic ways of conceptualizing harms associated with signals intelligence practices than are provided by either boundary -or intersubjective- based theories of privacy. | en |
dc.language | en | de |
dc.subject.ddc | Technik, Technologie | de |
dc.subject.ddc | News media, journalism, publishing | en |
dc.subject.ddc | Politikwissenschaft | de |
dc.subject.ddc | Technology (Applied sciences) | en |
dc.subject.ddc | Publizistische Medien, Journalismus,Verlagswesen | de |
dc.subject.ddc | Political science | en |
dc.title | Beyond privacy: articulating the broader harms of pervasive mass surveillance | de |
dc.description.review | begutachtet (peer reviewed) | de |
dc.description.review | peer reviewed | en |
dc.identifier.url | http://www.cogitatiopress.com/ojs/index.php/mediaandcommunication/article/view/263 | de |
dc.source.journal | Media and Communication | |
dc.source.volume | 3 | de |
dc.publisher.country | MISC | |
dc.source.issue | 3 | de |
dc.subject.classoz | Media Politics, Information Politics, Media Law | en |
dc.subject.classoz | Peace and Conflict Research, International Conflicts, Security Policy | en |
dc.subject.classoz | Broadcasting, Telecommunication | en |
dc.subject.classoz | Technology Assessment | en |
dc.subject.classoz | Friedens- und Konfliktforschung, Sicherheitspolitik | de |
dc.subject.classoz | Technikfolgenabschätzung | de |
dc.subject.classoz | Rundfunk, Telekommunikation | de |
dc.subject.classoz | Medienpolitik, Informationspolitik, Medienrecht | de |
dc.subject.thesoz | Überwachung | de |
dc.subject.thesoz | monitoring | en |
dc.subject.thesoz | Privatsphäre | de |
dc.subject.thesoz | privacy | en |
dc.subject.thesoz | Recht | de |
dc.subject.thesoz | law | en |
dc.subject.thesoz | nationale Sicherheit | de |
dc.subject.thesoz | national security | en |
dc.subject.thesoz | Demokratie | de |
dc.subject.thesoz | democracy | en |
dc.subject.thesoz | Datenschutz | de |
dc.subject.thesoz | data protection | en |
dc.subject.thesoz | Habermas, J. | de |
dc.subject.thesoz | Habermas, J. | en |
dc.subject.thesoz | Telekommunikation | de |
dc.subject.thesoz | telecommunication | en |
dc.subject.thesoz | Kritische Theorie | de |
dc.subject.thesoz | critical theory | en |
dc.rights.licence | Creative Commons - Namensnennung | de |
dc.rights.licence | Creative Commons - Attribution | en |
internal.status | formal und inhaltlich fertig erschlossen | de |
internal.identifier.thesoz | 10060511 | |
internal.identifier.thesoz | 10055257 | |
internal.identifier.thesoz | 10040087 | |
internal.identifier.thesoz | 10042911 | |
internal.identifier.thesoz | 10037672 | |
internal.identifier.thesoz | 10040560 | |
internal.identifier.thesoz | 10046185 | |
internal.identifier.thesoz | 10049301 | |
internal.identifier.thesoz | 10044037 | |
dc.type.stock | article | de |
dc.type.document | Zeitschriftenartikel | de |
dc.type.document | journal article | en |
dc.source.pageinfo | 1-11 | de |
internal.identifier.classoz | 1080401 | |
internal.identifier.classoz | 20800 | |
internal.identifier.classoz | 1080411 | |
internal.identifier.classoz | 10507 | |
internal.identifier.journal | 793 | |
internal.identifier.document | 32 | |
internal.identifier.ddc | 320 | |
internal.identifier.ddc | 070 | |
internal.identifier.ddc | 600 | |
dc.source.issuetopic | Surveillance: critical analysis and current challenges (part II) | de |
dc.identifier.doi | https://doi.org/10.17645/mac.v3i3.263 | de |
dc.description.pubstatus | Veröffentlichungsversion | de |
dc.description.pubstatus | Published Version | en |
internal.identifier.licence | 1 | |
internal.identifier.pubstatus | 1 | |
internal.identifier.review | 1 | |
dc.description.misc | mediaandcommunication-263 | de |
dc.subject.classhort | 10800 | de |
dc.subject.classhort | 10500 | de |
dc.subject.classhort | 20800 | de |
internal.check.abstractlanguageharmonizer | CERTAIN | |