Summary
Contents
Reader's guide
Entries A-Z
Subject index
Although surveillance hit the headlines with revelations by Edward Snowden that the NSA had been tracking phone calls worldwide, surveillance of citizens by their governments actually has been conducted for centuries. Only now, with the advent of modern technologies, it has exponentially evolved so that today you can barely step out your door without being watched or recorded in some way. In addition to the political and security surveillance unveiled by the Snowden revelations, think about corporate surveillance: each swipe of your ID card to enter your office is recorded, not to mention your internet activity. Or economic surveillance: what you buy online or with a credit card is recorded and your trip to the supermarket is videotaped. Drive through a tollbooth, and your license plate is recorded. Simply walk down a street and your image is recorded again and again and again. Where does this begin and end? In all levels of social structure, from the personal to the political to the economic to the judicial, The SAGE Encyclopedia of Surveillance, Security and Privacy uncovers and explains how surveillance has come to be an integral part of how our contemporary society operates worldwide and how it impacts our security and privacy. Key features include: Approximately 600 signed articles, authored by prominent scholars from around the globe Further Readings and cross-references conclude each article to guide students further as they explore a topic A Reader's Guide organizes entries by broad thematic areas
- Digital Cultures, Cybercommunities, and Simulated Selves
- Hunger Games, The
- Matrix, The
- Minority Report
- Advertising and Marketing Research
- Apple
- ATM Cards
- Big Data
- Botnets
- Cloud Computing
- Cookies
- Creeping
- Cyberbullying
- Cybercities
- Cybermarketing
- Cybermurder
- Cyberprostitution
- Cyberstalking
- Cybertheft
- Data-Doubles
- Dataveillance
- Digital Divide
- Digital Passwords
- Drug Trafficking
- Dumpster Diving
- Electronic Harassment
- Fast Capitalism
- Global Mobility
- Global Village
- Google Earth
- Infotainment
- Internet Pornography
- Jennicam
- Machine Learning
- Myspace
- Narcissism
- News Media
- Online Shopping
- Open Source Computing
- Paparazzi
- Play-Dates and Play-Spaces
- Scandals, Political
- Scanners
- Sexting
- Smartphones
- Social Media
- Spectacle, The
- Stuxnet Virus
- Swatting Hack
- Texting
- Totalitarian Surveillance Societies
- Unregulated Cyber Currencies
- Voyeurism, Digital
- YouTube
- Ethical Issues and Research Directions in Surveillance, Security, and Privacy
- Agency
- Autonomy
- Choice: Security or Civil Liberties
- Citizenship
- Commodification of the Body
- Community
- Cosmopolitanism
- Crime
- Deviance
- Equality
- Ethics
- Fear, Culture of
- Global Justice
- Governing Through Crime
- Knowledge
- Law
- Moral Panic
- Morality
- Politics
- Power
- Privacy
- Punishment
- Researching Cybercrime
- Responsibility
- Risk Society Thesis
- Social Justice
- Social Network Analysis
- Sociality
- Society of Captives Thesis
- Sovereignty
- Subjectivity
- Surveillance Art
- Surveillance, Culture of
- Surveillant Assemblage
- Transparency
- Truth
- History and Philosophy of Surveillance Studies
- Adorno, Theodor W.
- Beck, Ulrech
- Benjamin, Walter
- Bentham, Jeremy
- Bioengineering
- Bioinformatics
- Communication Studies
- Constructivism
- Copenhagen School
- Critical Security Studies
- Cultural Studies
- Deleuze, Gilles, and Félix Guattari
- Fascism
- Foucault, Michel
- Frankfurt School
- Franklin, Benjamin
- Garland, David
- Globalization
- Goffman, Erving
- Gramsci, Antonio
- Hobbes, Thomas
- Hoover, J. Edgar
- International Relations Theory
- Kafka, Franz
- Latour, Bruno
- Locke, John
- Marx, Gary T.
- Marxism
- Modernism
- Nazism
- Neuroscience and Brain Biology
- Orwell, George
- Political Psychology
- Poststructural Theory
- Situationists
- Social Control
- Surveillance, Theories of
- Industries and Institutions of Surveillance and/or Security
- Aerial Reconnaissance and Surveillance
- Alcoholics Anonymous
- Biopolitical Tattooing
- Biosurveillance
- Breathometer and Breathalyzer Machines
- Closed-Circuit Television
- Drones, Commercial Applications of
- Drug Testing Kits
- Emergency Alert Systems
- Eugenics Industrial Complex
- Intelligence Community
- Law and Digital Technology
- Lie Detector Instrumentation
- Life Sciences Surveillance and Security
- Methadone Maintenance
- New Penology
- Offender Reentry Programs
- Parole
- Policing and Society
- Private Law Enforcement
- Private Prisons
- Probation
- Psychological Assessment
- Punishment and Society
- Radio-Frequency Identification Devices
- Sex Offender Registries
- Specialty Courts for Domestic Violence
- Specialty Courts for Mental Health
- Specialty Courts for Substance Abuse
- Threat Assessment
- Victim-Offender Mediation
- Place, Space, and the Body
- Abortion
- Berlin Wall
- Biometrics
- Capital Punishment
- Castration, Chemical
- Castration, Surgical
- Chain Gangs
- Citywide Sweeps of the Homeless
- Concentration Camps
- Death Row
- Disease Model in Psychiatry
- DNA Technology
- Drug Therapy
- Electronic Restraint Devices
- Fingerprints
- Governmentality
- Incapacitation
- Internment Camps
- Life Without Parole
- Mass Incarceration
- Mental Health Inpatient Facilities
- Panopticon, The
- Parental Surveillance
- Plethysmograph
- Prison and Jail Segregation Units
- Prisons and Jails
- Riot Control
- Solitary Confinement
- Stigma
- Substance Abuse Treatment Facilities
- Supermax Prisons
- Surveillance Deterrence
- Synopticon, The
- Tasers and Other Less-Than-Lethal Devices
- Women, Girls, and the Body
- Wrist and Ankle Monitoring Devices
- Youth Detention Centers and Facilities
- Security, Civil Liberties, and the Law
- Brown v. Board of Education (1954)
- Citizens United v. Federal Election Commission (2010)
- Hepting v. AT&T
- Katz v. United States (1967)
- Kyllo v. U.S. (2001)
- Plessy v. Ferguson (1896)
- Tarasoff v. Regents of the University of California (1976)
- United States v. Jones (2012)
- United States v. Miller (1976)
- United States v. Spy Factory, Inc. (1997)
- Adam Walsh Child Protection and Safety Act of 2006
- AMBER Alerts
- American Civil Liberties Union and Electronic Privacy Information Center
- American Protective League
- Amnesty International
- Anarchism
- Anti-Defamation League
- Bill of Rights
- Civil Commitment
- Civil Liberties
- Civil Rights Movement
- Corporate Personhood
- European Convention on Human Rights
- Federal Violent Crime Control and Law Enforcement Act
- Free Speech
- Freedom of Expression
- Freedom of Information Act
- Habeas Corpus
- Hate Crimes
- Home Surveillance
- Insanity
- Intellectual Property Rights
- Jacob Wetterling Crimes Against Children and Sexually Violent Offender Registration Act
- Legal Moralism
- Megan’s Law
- Mental Disability Laws
- Paternalism and Parens Patriae
- Patient Protection and Affordable Care Act of 2010
- Political Action Committees
- Privacy Act of 1974
- Privacy, Internet
- Privacy, Medical
- Privacy, Right to
- Privacy, Types of
- Religious Freedom Restoration Act of 1993
- Search and Seizure
- Sex Offender Laws
- Sex Offender Registries
- Social Contract Theory
- Stand Your Ground Laws
- U.S. Constitution
- Vagrancy Laws
- Violence against Women Act
- Voting
- Warrants
- Security, Governance, and Democracy
- Central Intelligence Agency
- COINTELPRO
- Cybersecurity Legislation
- E-Government
- Eminent Domain
- Federal Bureau of Investigation
- Foreign Intelligence Surveillance Act
- Immigration and Naturalization Service
- INTERPOL
- Iran-Contra Affair
- KGB
- Libertarian Party
- National Security
- National Security Agency
- National Security Agency Leaks
- National Security Council
- PATRIOT Act
- Republican Party
- Secure Fence Act of 2006
- Securities and Exchange Commission
- Securitization
- Spies
- Tea Party
- Traitors
- U.S. Customs and Border Protection
- U.S. Department of Homeland Security
- U.S. Secret Service
- U.S. Transportation Security Administration
- United Nations
- Warrants
- Watergate and White House Tapes
- WikiLeaks
- Surveillance and Everyday Life
- Surveillance & Society
- Airport Security
- Airport Terminal Security Screenings
- Beijing, China, Surveillance in
- Cell Phone Tracking
- Chicago, Illinois, Surveillance in
- Corporate Surveillance
- Drug Testing
- Gated Communities
- Highway and Interstate Surveillance
- Houston, Texas, Surveillance in
- London, England, Surveillance in
- Mountain Surveillance
- Movie Theater Security
- Municipal Surveillance
- New York, New York, Surveillance in
- Parks
- Passenger Data
- Passenger Profiling
- Public Health, Surveillance in
- Security Screenings at Sporting Events
- Shopping Mall Security
- Social Sorting
- Surveillance Investigator
- Synology Surveillance Station
- Telemetric Policing
- Vehicle Tracking Systems
- Surveillance, Identity, and Controlling Populations
- Abu Ghraib
- Al Qaeda
- Ancient Greek Surveillance
- Apartheid
- Berlin Wall
- Biblical Surveillance
- Blockades
- Border Patrol Checkpoints
- Catholic Church and the Sexual Abuse of Minors
- Crime Control
- Crime Mapping
- Cults
- Curfews
- Data Mining and Profiling in Big Data
- Data Mining and Profiling in Social Network Analysis
- Deportation
- Domestic Terrorist Groups
- Global Surveillance
- Guantanamo Bay
- Hamas
- Human Trafficking
- Identity Politics
- Immigration
- McCarthyism
- Neighborhood Watch Programs and Citizen Patrol
- Police State
- Profiling, Racial
- Protection Orders
- Religion
- School Surveillance: College and Universities
- School Surveillance: Primary and Secondary Schools
- Segregation, Residential
- Self-Deportation
- Slave Trade
- Smart Borders
- Stop and Frisk
- Taliban
- Traffic Control
- UFO Surveillance (History, Purpose, Examples)
- Surveillance, Security, and Privacy Around the World
- Tools, Practices, and Decisions of Surveillance and Security Politics
- Monitor Versus Merrimac
- 9/11
- Authoritarianism
- Berlin Wall
- Camp David Accords
- Carrier Pigeons
- Civil War
- Cold War
- Colonialism
- Counterintelligence
- Cuban Missile Crisis
- Cyberwar
- Détente
- Dictators and Dictatorships
- Diplomacy
- Diplomatic Envoys
- Disinformation Campaigns
- Drone Strikes
- Electronic Surveillance
- Embargoes
- Espionage
- Espionage in Ancient Egypt
- Glasnost
- Information Warfare
- International Diplomacy
- Iranian Hostage Crisis (1979)
- Martial Law
- Medieval Castles
- Military Industrial Complex
- Military Intelligence
- North Atlantic Treaty Organization
- Nuclear Treaties
- Nuclear War
- Paramilitarization
- Peace Talks and Peace Agreements
- Perestroika
- Postcolonialism
- Propaganda
- Special Operation Forces
- Surveillance Art
- Surveillance During the Age of Reason
- Surveillance During the Cold War
- Surveillance During World War I and World War II
- Terrorism
- Tet Offensive
- Torture
- Truman Doctrine
- U.N. Peacekeeping and Security Forces
- War on Drugs
- War on Terror
- Weapons of Mass Destruction
- Trade in Surveillance, the Business of Security, and Strategies of Dissent
- Anonymous
- Antiglobalization
- Antinuclear Movement
- Antipsychiatry Movement
- Antiwar Movement, History in the United States
- Antiwar Protest Surveillance, 1960s
- Arab Spring
- Civil Disobedience
- Computer Surveillance
- Copwatch
- Environmental Security
- Federal Trade Commission’s Bureau of Consumer Protection
- Health Management Organizations
- Identity Theft
- Information Security
- International Monetary Fund
- Inverse Surveillance
- Network Security
- New Penology
- Political Dissidents
- Port Security
- Psychotherapy
- Revolutions and Revolts
- Security Theater
- Security, Concepts of
- Smuggling
- Sousveillance
- Technology
- Watchdog Groups
- Whistle-Blowers
- Work Surveillance
- Loading...