Lightfoot, Geoffrey and Wisniewski, Tomasz (2014): Information Asymmetry and Power in a Surveillance Society.
This is the latest version of this item.
Preview |
PDF
MPRA_paper_58726.pdf Download (858kB) | Preview |
Abstract
This paper fuses Lukes’ (1974) three-dimensional view of power with the economic concept of informational asymmetry to explicate how access to information is organized and how power relationships arise from this organization. We argue that many observed asymmetries are deliberate and, drawing from the economics and finance literature, we posit that their outcomes are inevitably detrimental. The paper examines the techniques that foster information imbalances, such as media and propaganda, knowledge production, educational systems, legal and organizational structures, exclusive information networks, and surveillance. We conclude that in the absence of greater transparency, the deleterious effects of unequal access to information will continue and deepen. We further suggest that the analysis of the complexities of the issues warrants a broad, multidisciplinary approach and we suggest what this might include.
Item Type: | MPRA Paper |
---|---|
Original Title: | Information Asymmetry and Power in a Surveillance Society |
English Title: | Information Asymmetry and Power in a Surveillance Society |
Language: | English |
Keywords: | Information Asymmetry; Power; Surveillance; Secrecy |
Subjects: | G - Financial Economics > G3 - Corporate Finance and Governance > G38 - Government Policy and Regulation I - Health, Education, and Welfare > I3 - Welfare, Well-Being, and Poverty > I31 - General Welfare, Well-Being O - Economic Development, Innovation, Technological Change, and Growth > O3 - Innovation ; Research and Development ; Technological Change ; Intellectual Property Rights > O31 - Innovation and Invention: Processes and Incentives Z - Other Special Topics > Z1 - Cultural Economics ; Economic Sociology ; Economic Anthropology > Z13 - Economic Sociology ; Economic Anthropology ; Social and Economic Stratification |
Item ID: | 58726 |
Depositing User: | Dr Geoffrey Lightfoot |
Date Deposited: | 19 Sep 2014 16:16 |
Last Modified: | 28 Sep 2019 04:26 |
References: | Ackerman, S. & Ball, J. (2014) ‘Optic Nerve: Millions of Yahoo Webcam Images Intercepted by GCHQ’, The Guardian, 28th February. Aiello, J. R., & Svec, C. M. (1993) ‘Computer Monitoring of Work Performance: Extending the Social Facilitation Framework to Electronic Presence’, Journal of Applied Social Psychology, Vol. 23 (7), pp. 537-548. Akerlof, G. A. (1970) ‘The Market for 'Lemons': Quality Uncertainty and the Market Mechanism’, Quarterly Journal of Economics, Vol. 84 (3), pp. 488–500. Albrecht, K. & Mcintyre, L. (2005) Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID, Nashville: Thomas Nelson Inc. Albrecht, K. (2007) ‘Microchip-Induced Tumors in Laboratory Rodents and Dogs: A Review of the Literature 1990–2006’, Working Paper, available at http://www.antichips.com/cancer/albrecht-microchip-cancer-full-paper.pdf (last consulted 28 November 2013). Albrecht, K. (2001) ‘Supermarket Cards: The Tip of the Retail Surveillance Iceberg’, Denver University Law Review, Vol. 79 (4), pp. 534–539, 558–565. Alferoff, C. & Knights, D. (2008) ‘Customer Relationship Management in Call Centers: The Uneasy Process of Re (Form)Ing the Subject Through the ‘People-By-Numbers’ Approach’, Information and Organization, Vol. 18 (1), pp. 29-50. Andrews, R. (2013) ‘Microsoft's Xbox One: Always on, Always Watching?’, The Guardian, June 17. Arrow, K. J. (1969) ‘The Organization of Economic Activity: Issues Pertinent to the Choice of Market versus Non-market Allocations’, in Analysis and Evaluation of Public Expenditures: The PPP System, Vol. 1, pp. 47–64. Arulampalam, W., Booth, A. L., & Bryan, M. L. (2007) ‘Is There a Glass Ceiling Over Europe? Exploring the Gender Pay Gap across the Wage Distribution’, Industrial and Labor Relations Review, Vol. 60 (2), pp. 163-186. Arundel, A. (2001) ‘The Relative Effectiveness of Patents and Secrecy for Appropriation’, Research Policy, Vol. 30 (4), pp. 611-624. Ashton, K. (2009) ‘That ‘Internet of Things’ Thing’, RFiD Journal, Vol. 22, pp. 97-114. Athwal, A. (2004) ‘Harold Innis and Comparative Politics: A Critical Assessment’, Canadian Journal of Political Science/Revue canadienne de science politique, Vol. 37(2), pp. 259-280. Atzori, L., Iera, A., & Morabito, G. (2010) ‘The Internet of Things: A Survey’, Computer Networks, Vol. 54 (15), pp. 2787-2805. Bain, P., & Taylor, P. (2000) ‘Entrapped by the ‘Electronic Panopticon’? Worker Resistance in the Call Centre’, New Technology, Work and Employment, Vol. 15 (1), pp. 2-18. Baines, J. (1990) ‘Restricted Knowledge, Hierarchy, and Decorum: Modern Perceptions and Ancient Institutions’, Journal of the American Research Center in Egypt, Vol. 27, pp. 1-23. Ball, J. (2014) ‘Revealed: NSA Gathers 200m Texts a Day’, The Guardian, January 17th. Ball, K. (2010) ‘Workplace Surveillance: An Overview’, Labour History, Vol. 50 (1), pp. 87-106. Bachrach, P., & Baratz, M. S. (1970) Power and Poverty: Theory and Practice, Oxford: Oxford University Press. Barrett, D. (2013) ‘One Surveillance Camera for Every 11 People in Britain, Says CCTV Survey’ The Telegraph, July 10. BBC (2013) ‘Vatican Bank Publishes First Ever Annual Report’, BBC, October 1. Beckford, M (2014) ‘EU to Bug Every Car in UK with Tracker Chips – and Ministers Admit They are Powerless to Stop the Big Brother Technology’ Daily Mail, 10th May. Bennet, W. L. (1988) News: The Politics of Illusion, New York: Longman. Bennett, B. & Phelps, T. M. (2014) ‘Obama, Senate Make Progress on NSA Data-Collection Reform Bill’, Los Angeles Times, July 21st. Bentham, J. (1787) Panopticon: or, The Inspection-house, in a series of letters written in the year 1787, Dublin, Reprinted and sold, London: T. Payne. Bhattacharya, U and Daouk, H. (2002) ‘The World Price of Insider Trading’, Journal of Finance, Vol. 57 (1), pp. 75-108. Bilefsky, D. (2006) ‘Data Transfer Broke Rules, Report Says’, New York Times, September 28th 2006. Blanchard, K. T., Barthel, C., French, J. E., Holden, H. E., Moretz, R., Pack, F. D., Tennant, R. W. & Stoll, R. E. (1999) ‘Transponder-Induced Sarcoma in the Heterozygous p53+/-Mouse’, Toxicologic Pathology, Vol. 27 (5), pp. 519-527. Brand, S. (1987) The Media Lab: Inventing the Future at MIT, Harmondsworth: Viking Penguin. Brehm, J. W. (1972) Responses to the Loss Of Freedom: A Theory of Psychological Reactance, New York: General Learning Press. Brehm, S. S., & Brehm, J. W. (1981) Psychological Reactance: A Theory of Freedom and Control, New York: Academic Press. Brown, S. D. & Lightfoot, G. (2002) ‘Presence, Absence and Accountability: Email and the Mediation of Organization Memory’ in S. Woolgar (ed.) Virtual Society: Technology, Cyberbole, Reality. Oxford: Oxford University Press, pp. 209-29. Bushman, R. M., Piotroski, J. D., & Smith, A. J. (2005) ‘Insider Trading Restrictions and Analysts' Incentives to Follow Firms’, Journal of Finance, Vol. 60 (1), pp. 35-66. Carminato, A., Vascellari, M., Marchioro, W., Melchiotti, E., & Mutinelli, F. (2011) ‘Microchip‐Associated Fibrosarcoma in a Cat’, Veterinary Dermatology, Vol. 22 (6), pp. 565-569. Cauley, L. (2006) ‘NSA has Massive Database of Americans' Phone Calls’ USA Today, 11 May. CBS/AP (2013) ‘NSA can Spy on Offline Computers Wirelessly, Says Security Expert’ CBS News, December 30th. Chalykoff, J., & Kochan, T. A. (1989) ‘Computer‐Aided Monitoring: Its Influence on Employee Job Satisfaction and Turnover’, Personnel Psychology, Vol. 42 (4), pp. 807-834. Chang, C. and Wang, Y. (1996) ‘Human Capital Investment under Asymmetric Information: The Pigovian Conjecture Revisited’, Journal of Labor Economics, Vol. 14 (3), pp. 505-519. Cohen, L., Frazzini, A. & Malloy, C. (2008) ‘The Small World of Investing: Board Connections and Mutual Fund Returns’, Journal of Political Economy, Vol. 16 (5), pp. 951-979. Collinson, D. L. (1999) ‘”Surviving the Rigs”: Safety and Surveillance on North Sea Oil Installations. Organization Studies, Vol. 20 (4), pp. 579-600. Cookson, R. (2013) ‘London’s Ban for Spy Bins Highlights Lure of Big Data to Business’, Financial Times, August 13th. Dahl, R. A. (1957) ‘The Concept of Power’, Behavioral Science, Vol. 2(3), pp. 201-215. Dandeker, C. (1990). Surveillance, Power and Modernity: Bureaucracy and Discipline from 1700 to the Present Day, Cambridge: Polity. Dann, G. E., & Haddow, N. (2008) ‘Just Doing Business or Doing Just Business: Google, Microsoft, Yahoo! and the Business of Censoring China’s Internet’, Journal of Business Ethics, Vol. 79(3), pp. 219-234. Davis, G. F. (2009) Managed by the Markets: How Finance Re-Shaped America, Oxford: Oxford University Press. Delaloye, F. X., Habib, M. A., & Ziegler, A. (2012) ‘Swiss Banking Secrecy: The Stock Market Evidence’, Financial Markets and Portfolio Management, Vol. 26 (1), pp. 143-176. Desouza, K. C. & Vanapalli, G. K. (2005) ‘Securing Knowledge in Organizations: Lessons From the Defense and Intelligence Sectors’, International Journal of Information Management, Vol. 25 (1), pp. 85-98. DHS (2012) ‘Privacy Impact Assessment Update for the Standoff Technology Integration and Demonstration Program: Biometric Optical Surveillance System Tests’ DHS/S&T STIDP/PIA-008(b), Available at http://www.dhs.gov/sites/default/files/publications/privacy/PIAs/privacy_pia_st_stidpboss_dec2012.pdf, last consulted 28 November 2013. Dye, T. R. & Pickering, J. W. (1974) ‘Governmental and Corporate Elites: Convergence and Differentiation’, Journal of Politics, Vol. 36 (4), pp. 900-925. Elcock, L. E., Stuart, B. P., Wahle, B. S., Hoss, H. E., Crabb, K., Millard, D. M., Mueller, R. E., Hastings, T. F. & Lake, S. G. (2001) ‘Tumors in Long-Term Rat Studies Associated with Microchip Animal Identification Devices’, Experimental and Toxicologic Pathology, Vol. 52 (6), pp. 483-491. Fama, E. (1970). ‘Efficient Capital Markets: A Review of Theory and Empirical Work’. Journal of Finance, Vol. 25 (2): 383–417. Fama, E. F., & French, K. R. (2005) ‘Financing Decisions: Who Issues Stock?’, Journal of Financial Economics, Vol. 76 (3), pp. 549-582. Ferguson, N. (2013) ‘On the Teaching of History, Michael Gove is Right’, The Guardian, February 15. Fishman, M. J., & Hagerty, K. M. (1992) ‘Insider Trading and the Efficiency of Stock Prices’, RAND Journal of Economics, Vol. 23 (1), pp. 106-122. Foster, K. R., & Jaeger, J. (2008) ‘Ethical Implications of Implantable Radiofrequency Identification (RFID) Tags in Humans’, The American Journal of Bioethics, Vol. 8 (8), pp. 44-48. Foucault, M. (1977) Discipline and Punish: The Birth of the Prison, (tr. A. Sheridan) London: Allen Lane. Foucault, M. (1979) The History of Sexuality: Volume 1, (tr. R. Hurley), Harmondsworth: Penguin. Francis, J. R., Huang, S., Khurana, I. K., & Pereira, R. (2009) ‘Does Corporate Transparency Contribute to Efficient Resource Allocation?’, Journal of Accounting Research, Vol. 47 (4), pp. 943-989. Francis, J. R., Khurana, I. K., & Pereira, R. (2005) ‘Disclosure Incentives and Effects on Cost of Capital Around the World’, The Accounting Review, Vol. 80 (4), pp. 1125-1162. Friedman, D. D., Landes, W. M., & Posner, R. A. (1991) ‘Some Economics of Trade Secret Law’, The Journal of Economic Perspectives, Vol. 5 (1), pp. 61-72. Garcia-Swartz, D. D., Hahn, R. W., & Layne-Farrar, A. (2006) ‘The Move Toward a Cashless Society: A Closer Look at Payment Instrument Economics’, Review of Network Economics, Vol. 5 (2), pp. 175-198. Gaverta, J. & Cornwall, A. (2008) ‘Power and Knowledge’ in Reason, P. & Bradbury, H. The Sage Handbook of Action Research: Participative Inquiry and Practice (2nd edition), London: Sage. Gellately, R. (1994) ‘NT Wolfe, Policing a Socialist Society: The German Democratic Republic’, Canadian Journal of History, Vol. 29 (1), pp. 235-6. Gilchrist, M., Mooers, D. L., Skrubbeltrang, G. & Vachon, F. (2012) ‘Knowledge Discovery in Databases for Competitive Advantage’, Journal of Management and Strategy, Vol. 3(2), pp. 2-15. Gilbert, A., Tourani-Rad, A., & Wisniewski, T. P. (2006) ‘Do Insiders Crowd Out Analysts?’, Finance Research Letters, Vol. 3 (1), pp. 40-48. Glennerster, R., & Shin, Y. (2008) ‘Does Transparency Pay?’, IMF Staff Papers, Vol. 55 (1), pp. 183-209. Glosten, L. R., & Milgrom, P. R. (1985) ‘Bid, Ask and Transaction Prices in a Specialist Market with Heterogeneously Informed Traders’, Journal of Financial Economics, Vol. 14 (1), pp. 71-100. Goldin, C., & Rouse, C. (2000) ‘Orchestrating Impartiality: The Impact of" Blind" Auditions on Female Musicians’, The American Economic Review, Vol. 90 (4), pp. 715-741. Green, C. F. (1989) ‘Business Ethics in Banking’, Journal of Business Ethics, Vol. 8 (8), pp. 631-634. Hausmann, R., Tyson, L. D. A., & Zahidi, S. (2008) The Global Gender Gap Report 2008, Geneva: World Economic Forum. Hays, C. L. (2004) ‘What They Know About You: An Obsessive Monitor of Consumer Behavior’, New York Times. p. BU1, November 14. Henderson, R., Mahar, D., Saliba, A., Deane, F. & Napier, R. (1998) ‘Electronic Monitoring Systems: An Examination of Physiological Activity and Task Performance Within a Simulated Keystroke Security and Electronic Performance Monitoring System’, International Journal of Human-Computer Studies, Vol. 48 (2), pp. 143-157. Herdt, G. (1990) ‘Secret Societies and Secret Collectives’, Oceania, Vol. 60 (4), pp. 360-381. Herman, E. S. & Chomsky, N. (1994) Manufacturing Consent: The Political Economy of the Mass Media, London: Vintage. Heyer, P. & Crowley, D. (2008) ‘Introduction’ in H. A. Innis, The Bias of Communication (2e) Toronto: University of Toronto Press. Hobbs, J. E. and Plunkett, M. D. (1999) ‘Genetically Modified Foods: Consumer Issues and the Role of Information Asymmetry’, Canadian Journal of Agricultural Economics/Revue canadienne d'agroeconomie, Vol. 47 (4), pp. 445-455. Hope, A. (2005) ‘Panopticism, Play and the Resistance of Surveillance: Case Studies of the Observation of Student Internet Use in UK Schools’, British Journal of Sociology of Education, Vol. 26 (3), pp. 359-373. Horwitz, S. (2014) ‘Ruling against NSA Collection of Phone Data is Appealed’, Washington Post, January 3rd. Hoskin, K. (1996) ‘The ‘Awful Idea of Accountability’: Inscribing People Into the Measurement of Objects.’ In Munro, R. & Mouritsen, J. Accountability: Power, Ethos and the Technologies of Managing. (pp. 265–283). London: Chapman & Hall. Hoskin, K. & Macve, R. H. (1986) ‘Accounting and the Examination: a Genealogy of Disciplinary Power’, Accounting, Organizations and Society, Vol. 11 (2), pp. 105-136. House, P. (1996) ‘’Mafia Link’ Poet in Line for Nobel Prize’ Evening Standard, August 2nd p23. Hume, D. (1742/1987) Essays, Moral, Political, and Literary, E. F. Miller, ed. Indianapolis, IN: Liberty Fund, Library of Economics and Liberty [Online] available from http://www.econlib.org/library/LFBooks/Hume/hmMPL4.html, last accessed 21 January 2014. Innis, H. A. (1999) ‘Media in Ancient Empires’, in Communication in History: Technology, Culture, Society, eds. David Crowley and Paul Heyer. New York: Longman. Innis, H. A. (2008) The Bias of Communication (2e), Toronto: University of Toronto Press. Jensen, J. M., & Raver, J. L. (2012) ‘When Self-Management and Surveillance Collide: Consequences for Employees’ Organizational Citizenship and Counterproductive Work Behaviors’, Group & Organization Management, Vol. 37 (3), pp. 308-346. Jolicoeur, P. M. & Knowles, L. L. (1978) ‘Fraternal Associations and Civil Religion: Scottish Rite Freemasonry’. Review of Religious Research, Vol. 20 (1), pp. 3-22. Jonsson, K. (2006) ‘The Embedded Panopticon: Visibility Issues of Remote Diagnostics Surveillance’, Scandinavian Journal of Information Systems, Vol. 18 (2), pp. 7-28. Kahn, J. M., Katz, R. H., & Pister, K. S. (1999) ‘Next Century Challenges: Mobile Networking for “Smart Dust”. Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 271-278. Knights, D., & McCabe, D. (2000) ‘Ain't Misbehavin'? Opportunities For Resistance Under New Forms of Quality Management’, Sociology, Vol. 34 (3), pp. 421-436. Knights, D., & Willmott, H. (1985) ‘Power and Identity in Theory and Practice’, The Sociological Review, Vol. 33(1), pp. 22-46. Kravets, D. (2012) ‘Tracking School Children with RFID Tags? It’s All About the Benjamins’, Wired 7 September. Kulow, M. D. (2013) ‘Beyond the Paycheck Fairness Act: Mandatory Wage Disclosure Laws – a Necessary Tool for Closing the Residual Gender Wage Gap’, Harvard Journal on Legislation, Vol. 50, pp. 385-513. Landes, W. M., & Posner, R. A. (1989) ‘An Economic Analysis of Copyright Law’, The Journal of Legal Studies, Vol. 18 (2), pp. 325-363. Lawrence, T. B. & Robinson, S. L. (2007) ‘Ain't Misbehavin: Workplace Deviance as Organizational Resistance’, Journal of Management, Vol. 33(3), pp. 378-394. Le Calvez, S., Perron-Lepage, M. F., & Burnett, R. (2006) ‘Subcutaneous Microchip-Associated Tumours in B6C3F1 Mice: a Retrospective Study to Attempt to Determine their Histogenesis’, Experimental and Toxicologic Pathology, Vol. 57 (4), pp. 255-265. Le Carré, J. (1974) Tinker, Tailor, Soldier, Spy, London: Hodder & Stoughton. Lewis, L. (2011) ‘Beijing Plans to Crush Protests by Tracking Millions on Mobile Phone’ The Times, March 4. Li, K., & Zhao, X. (2008) ‘Asymmetric Information and Dividend Policy’, Financial Management, Vol. 37 (4), pp. 673-694. Lohr, S. (2010) ‘Smart Dust? Not Quite, but We’re Getting There’, New York Times, January 31. Lukes, S. (1974) Power: A Radical View, London: Macmillan. Lukes, S. (2005) Power: A Radical View, (2nd Ed.) London: Macmillan. Lyon, D. & Haggerty, K.D. (2012) ‘The Surveillance Legacies of 9/11: Recalling, Reflecting on, and Rethinking Surveillance in the Security Era.’ Canadian Journal of Law and Society, Vol. 27(3), pp. 291-300. Lyon, D. (2007) Surveillance Studies: An Overview, Cambridge: Polity. Manne, H. G. (1966) Insider Trading and the Stock Market, New York: Free Press. Manove, M. (1989) ‘The Harm from Insider Trading and Informed Speculation’, Quarterly Journal of Economics, Vol. 104 (4), pp. 823-845. Marcus, R. L. (1986) ‘The Perils of Privilege: Waiver and the Litigator’, Michigan Law Review, Vol. 84 (8), pp. 1605-1655. Marx, G. T. (2006) ‘Soft Surveillance: The Growth of Mandatory Volunteerism in Collecting Personal Information – “Hey Buddy Can You Spare a DNA?”’ in T. Monahan (ed.) Surveillance and Security: Technological Politics and Power in Everyday Life. London: Routledge, pp. 37-56. Marx, M., Singh, J. and Fleming, L. (2010) ‘Regional Disadvantage? Non-Compete Agreements and Brain Drain’ Available at SSRN: http://ssrn.com/abstract=1654719. Mirowski, P. (2013) Never Let a Serious Crisis Go to Waste, London: Verso. Mollenkamp, C., Pilon, M & Ball, D. (2010) ‘Swiss Clear Path to Name U.S. Clients’, Wall Street Journal, June 16th 2010. Monahan, T. (2006) ‘Questioning Surveillance and Security’ in T. Monahan (ed.) Surveillance and Security: Technological Politics and Power in Everyday Life. London: Routledge, pp. 1-26. Myers, S. C. (1984) ‘The Capital Structure Puzzle’, Journal of Finance, Vol. 39 (3), pp. 574-592. Myers, S. C., & Majluf, N. S. (1984) ‘Corporate Financing and Investment Decisions when Firms have Information that Investors do not have’, Journal of Financial Economics, Vol. 13 (2), pp. 187-221. Nakashima, E. & Marimow, A. E. (2013) ‘Judge: NSA’s Collecting of Phone Records is Probably Unconstitutional’, Washington Post, December 16th. Niederhafner, S. (2012) ‘Germany's Unification Strategy and Korea's Unification Perspectives’, available at http://ssrn.com/abstract=2193877. Oltermann, P. (2014) ‘NSA Tapped German Ex-Chancellor Gerhard Schröder's Phone – Report’, The Guardian, February 4th. O'Neill, J. (2003) ‘The Gender Gap in Wages, circa 2000’, The American Economic Review, 93 (2), pp. 309-314. Orwell, G. (1949/1984) Nineteen Eighty-Four, Oxford: Clarendon Press. Paltrow, S. J. (2013) ‘Unaccountable: the High Cost of the Pentagon’s Bad Bookkeeping’, Reuters Investigates, November 18th. Parker, D. and Hartley, K. (2003) ‘Transaction Costs, Relational Contracting and Public Private Partnerships: a Case Study of UK Defence’, Journal of Purchasing and Supply Management, Vol. 9 (3), pp. 97-108. Perkin, H. (1978) ‘The Recruitment of Elites in British Society since 1800’, Journal of Social History, Vol. 12(2), pp. 222-234. Petrovic, M. & Hamilton, G. (2006) ‘Making Global Markets: Wal-Mart and Its Suppliers’ In Nelson Lichtenstein (Ed.) Wal-Mart: The Face of Twenty-First-Century Capitalism (pp. 102-141), New York: The New Press. Polasik, M., Wisniewski, T. P., & Lightfoot, G. (2012) ‘Modelling Customers' Intentions to Use Contactless Cards’, International Journal of Banking, Accounting and Finance, Vol. 4 (3), pp. 203-231. Rahman, M. A. (1991) ‘The Theoretical Standpoint of PAR’ in Fals Borda, O., & Rahman, M. A., Action and Knowledge: Breaking the Monopoly with Participatory Action-Research, New York: Apex Press. Ray, B. (2012) ‘Smart Meters are 'Massive Surveillance' Tech - Privacy Supremo’ The Register, 11th June. Readings, W. (1996) The University in Ruins, Cambridge, MA.: Harvard University Press. Reider-Gordon, M. & Butler, T. K. (2013) ‘Anti-Money Laundering’, The Year in Review: An Annual Publication of the ABA/Section of International Law, pp. 387-404. Richards, N. M. (2013) ‘The Dangers of Surveillance’, Harvard Law Review, Vol. 126(7), pp. 1934-1965. Rosenthal, L. (1996) ‘Dateline Rome: The New Face of Western Democracy’, Foreign Policy, No. 104, pp. 154-168. Rule, J. B. (1974) Private Lives and Public Surveillance. London: Allen Lane. Sewell, G. & Barker, J. R. (2006) ‘Coercion Versus Care: Using Irony to Make Sense of Organizational Surveillance’ Academy of Management review, Vol. 31 (4), pp. 934-961. Seyhun, H. N. (2000) Investment Intelligence from Insider Trading, Cambridge, MA: MIT Press. Seyhun, H. N. (2008) ‘Insider Trading and the Effectiveness of Chinese Walls in Securities Firms’, Journal of Law, Economics and Policy, Vol. 4 (2), pp. 369-408. Simmel, G. (1906) ‘The Sociology of Secrecy and of Secret Societies’, (tr. A. W. Small). American Journal of Sociology, Vol. 11 (4), pp. 441-498. Simon, H. A. (1957) ‘A Behavioral Model of Rational Choice’, in Models of Man, Social and Rational: Mathematical Essays on Rational Human Behavior in a Social Setting. New York: Wiley. Sirgany, A. (2009) ‘The War on Waste’, CBS News, February 11. Smith, M. J., Carayon, P., Sanders, K. J., Lim, S. Y. & LeGrande, D. (1992) ‘Employee Stress and Health Complaints in Jobs with and Without Electronic Performance Monitoring’, Applied Ergonomics, Vol. 23 (1), pp. 17-27. Smith-Barrow, D. (2013) ‘Where America's Top CEOs Went to School’, US News, May 22nd. Smith-Spark, L. (2013) ‘Germany’s Angela Merkel: Relations With U.S. ‘Severely Shaken’ Over Spying Claims’, CNN, October 24th. Stanton, J. M. (2000) ‘Reactions to Employee Performance Monitoring: Framework, Review, and Research Directions’, Human Performance, Vol. 13 (1), pp. 85-113. Stanton, J. M., & Barnes-Farrell, J. L. (1996) Effects of Electronic Performance Monitoring on Personal Control, Task Satisfaction, and Task Performance’, Journal of Applied Psychology, Vol. 81 (6), pp. 738. Statham, P. (1996) ‘Berlusconi, the Media and the New Right in Italy’, Harvard International Journal of Press/Politics, Vol. 1 (1), pp. 87-105. Stein, M., & Pinto, J. (2011) ‘The Dark Side of Groups: a “Gang at Work” in Enron’, Group & Organization Management, Vol. 36 (6), pp. 692-721. Stigler, G. J. (1961) ‘The Economics of Information’, Journal of Political Economy, Vol. 69 (3), pp. 213–225. Stiglitz, J. E. (2002) ‘Information and the Change in the Paradigm in Economics’, The American Economic Review, Vol. 92 (3), 460-501. Straub, P. G. and Murnighan, J K. (1995) ‘An Experimental Investigation of Ultimatum Games: Information, Fairness, Expectations, and Lowest Acceptable Offers’, Journal of Economic Behavior & Organization, Vol. 27 (3), pp. 345-364. The Economist (2004) ‘The Curse of Nepotism’, January 8th. Timberg, C. & Nakashima, E. (2013) ‘FBI’s Search for ‘Mo,’ Suspect in Bomb Threats, Highlights Use of Malware for Surveillance’, Washington Post, December 6th. U.S. Patent and Trademark Office (2014) U.S. Patent Statistics Report, available at http://www.uspto.gov/web/offices/ac/ido/oeip/taf/us_stat.pdf last accessed 21 July 2014. Useem, M. & Miller, S. M. (1975) ‘Privilege and Domination: The Role of the Upper Class in American Higher Education’, Social Science Information, Vol. 14 (6), pp. 115-145. Useem, M. (1980) ‘Corporations and the Corporate Elite’, Annual Review of Sociology, Vol. 6, pp. 41-77. van Dijk, E. and Grodzka, M. (1992) ‘The Influence of Endowments Asymmetry and Information Level on the Contribution to a Public Step Good’, Journal of Economic Psychology, Vol. 13 (2), pp. 329-342. Vascellari, M., Melchiotti, E., & Mutinelli, F. (2006) ‘Fibrosarcoma with Typical Features of Postinjection Sarcoma at Site of Microchip Implant in a Dog: Histologic and Immunohistochemical Study’, Veterinary Pathology Online, Vol. 43 (4), pp. 545-548. Villasenor, J. (2011) Recording Everything: Digital Storage as an Enabler of Authoritarian Governments. Center for Technology Innovation at Brookings. Walker, T. (2012) ‘Prince Michael of Kent's Freemasons Lodge Faces Legal Action’, The Telegraph, 9th March. Ward, P. & Horne, A. (2012) ‘Interception of Communications’ Standard Note SN/HA/6332. London: House of Commons Warman, M. (2013) ‘Facial Recognition: Inevitable, But will Shoppers Approve?’ The Telegraph, November 9. White, A. ‘EU Data-Retention Law Tramples on Privacy, Top Court Says’, Bloomberg, 8th April. Willey, D. (2013) ‘The Vatican Bank is Rocked by Scandal Again’, BBC, July 18. Wintour, P, Mason, R. & Ball, J. (2014) ‘Cameron Makes Concessions to Rush Through Snooping Law’ The Guardian, July 11th. Wisniewski, T. P. (2004) ‘Reexamination of the Link between Insider Trading and Price Efficiency’, Economic Systems, Vol. 28 (2), pp. 209-228. Zajda, J. and Zajda, R. (2003) ‘The Politics of Rewriting History: New History Textbooks and Curriculum Materials in Russia’, International Review of Education Vol. 49 (3-4), pp. 363-384. Zimbardo, P. (2007) The Lucifer Effect: How Good People Turn Evil, London: Ebury. |
URI: | https://mpra.ub.uni-muenchen.de/id/eprint/58726 |
Available Versions of this Item
-
Information Asymmetry and Power in a Surveillance Society. (deposited 22 Jan 2014 14:36)
- Information Asymmetry and Power in a Surveillance Society. (deposited 19 Sep 2014 16:16) [Currently Displayed]