{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T11:08:11Z","timestamp":1777547291072,"version":"3.51.4"},"reference-count":67,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2017,11,23]],"date-time":"2017-11-23T00:00:00Z","timestamp":1511395200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JICES"],"published-print":{"date-parts":[[2017,12,8]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>This paper aims to present results of a study that focused on the question of how computer and data experts think about Internet and social media surveillance after Edward Snowden\u2019s revelations about the existence of mass-surveillance systems of the Internet such as Prism, XKeyscore and Tempora. Computer and data experts\u2019 views are of particular relevance because they are confronted day by day with questions about the processing of personal data, privacy and data protection.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>The authors conducted two focus groups with a total of ten experts based in London. As London is considered by some as the surveillance capital of the world, and has a thriving Internet industry, it provided a well-suited context.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>The focus group discussions featured three topics that are of crucial importance for understanding Internet and social media surveillance: the political economy surveillance in general; surveillance in the context of the Snowden revelations; and the question what the best political reactions are to the existence of a surveillance-industrial complex that results in political and economic control of the Internet and social media. The focus groups provided indications that computer and data experts are pre-eminently informed on how Internet surveillance works, are capable of critically assessing its implications for society and have ideas about on what should be done politically.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>Studies of privacy and surveillance after Edward Snowden\u2019s revelations have taken on a new dimension: Large-scale covert surveillance is conducted in a collaborative endeavour of secret services, private communications corporations and security companies. It has become evident that a surveillance-industrial Internet surveillance complex exists, in which capitalist communications and security corporations and state institutions collaborate.<\/jats:p><\/jats:sec>","DOI":"10.1108\/jices-01-2016-0004","type":"journal-article","created":{"date-parts":[[2017,11,23]],"date-time":"2017-11-23T06:20:49Z","timestamp":1511418049000},"page":"412-444","source":"Crossref","is-referenced-by-count":20,"title":["Internet surveillance after Snowden"],"prefix":"10.1108","volume":"15","author":[{"given":"Christian","family":"Fuchs","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Trottier","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2017,11,23]]},"reference":[{"issue":"3","key":"key2021041409394563700_ref001","first-page":"376","article-title":"The view from the gallery: international comparison of attitudes to Snowden\u2019s revelations about the NSA\/GCHQ","volume":"45","year":"2015","journal-title":"ACM Sigcas Computers and Society"},{"key":"key2021041409394563700_ref002","volume-title":"ISpy: Surveillance and Power in the Interactive Era","year":"2007"},{"key":"key2021041409394563700_ref003","volume-title":"Infoglut. How Too Much Information Is Changing the Way We Think and Know","year":"2013"},{"key":"key2021041409394563700_ref004","unstructured":"Angus Reid Institute (2013), \u201cMore Canadians and Britons view Edward Snowden as \u2018hero\u2019 than \u2018traitor\u2019, Americans split\u201d, available at: http:\/\/angusreid.org\/more-canadians-britons-view-edward-snowden-as-hero-than-traitor-americans-split\/ (accessed 6 November 2017)."},{"key":"key2021041409394563700_ref005","unstructured":"Bakir, V., Cable, J., Dencik, L., Hintz, A. and McStay, A. (2015). \u201cPublic feeling on privacy, security and surveillance\u201d, Research Report, Cardiff University, Cardiff."},{"key":"key2021041409394563700_ref006","volume-title":"The Intensification of Surveillance. Crime, Terrorism and Warfare in the Information Age","year":"2003"},{"key":"key2021041409394563700_ref007","volume-title":"Routledge Handbook of Surveillance Studies","year":"2012"},{"key":"key2021041409394563700_ref008","volume-title":"Liquid Modernity","year":"2000"},{"key":"key2021041409394563700_ref009","volume-title":"Liquid Life","year":"2005"},{"key":"key2021041409394563700_ref010","volume-title":"Liquid Surveillance","year":"2013"},{"issue":"2","key":"key2021041409394563700_ref011","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1111\/ips.12048","article-title":"After Snowden: rethinking the impact of Snowden","volume":"8","year":"2014","journal-title":"International Political Sociology"},{"issue":"2","key":"key2021041409394563700_ref012","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1177\/1750481314568544","article-title":"The Edward Snowden Affair: a corpus study of the british press","volume":"9","year":"2015","journal-title":"Discourse & Communication"},{"key":"key2021041409394563700_ref013","volume-title":"Social Research Methods","year":"2012","edition":"4th ed."},{"key":"key2021041409394563700_ref014","unstructured":"Cavoukian, A. (2017), \u201cTransformative technologies deliver both security and privacy: think positive-sum not Zero-Sum\u201d, available at:www.ipc.on.ca\/images\/Resources\/trans-tech.pdf"},{"key":"key2021041409394563700_ref015","first-page":"2420","article-title":"Boundary-drawing power and the renewal of professional news organizations: the case of the guardian and the Edward Snowden national security leak","volume":"8","year":"2014","journal-title":"International Journal of Communication"},{"key":"key2021041409394563700_ref016","volume-title":"9-11: Was There an Alternative?","year":"2011"},{"issue":"1","key":"key2021041409394563700_ref017","doi-asserted-by":"crossref","first-page":"109","DOI":"10.11606\/issn.1982-8160.v5i1p109-136","article-title":"How to define surveillance?","volume":"5","year":"2011","journal-title":"MATRIZes"},{"issue":"5","key":"key2021041409394563700_ref018","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1177\/0896920511435710","article-title":"Political economy and surveillance theory","volume":"39","year":"2013","journal-title":"Critical Sociology"},{"issue":"8","key":"key2021041409394563700_ref019","doi-asserted-by":"crossref","first-page":"1328","DOI":"10.1080\/1369118X.2013.770544","article-title":"Societal and ideological impacts of deep packet inspection (DPI) internet surveillance","volume":"16","year":"2013","journal-title":"Information, Communication and Society"},{"key":"key2021041409394563700_ref020","volume-title":"Digital Labour and Karl Marx","year":"2014"},{"key":"key2021041409394563700_ref021","volume-title":"Social Media: A Critical Introduction","year":"2014"},{"issue":"1","key":"key2021041409394563700_ref022","doi-asserted-by":"crossref","first-page":"57","DOI":"10.31269\/triplec.v12i1.552","article-title":"Social media and the public sphere","volume":"12","year":"2014","journal-title":"TripleC: Communication, Capitalism & Critique"},{"key":"key2021041409394563700_ref023","volume-title":"Culture and Economy in the Age of Social Media","year":"2015"},{"issue":"2","key":"key2021041409394563700_ref024","doi-asserted-by":"crossref","first-page":"6","DOI":"10.17645\/mac.v3i2.207","article-title":"Surveillance and critical theory","volume":"3","year":"2015","journal-title":"Media and Communication"},{"key":"key2021041409394563700_ref025","volume-title":"Critique, Social Media & the Information Society","year":"2014"},{"key":"key2021041409394563700_ref026","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/978-94-007-5170-5_2","article-title":"The Internet as surveilled workplayplace and factory","volume-title":"European Data Protection. Coming of Age","year":"2013"},{"key":"key2021041409394563700_ref027","article-title":"Internet and surveillance","volume-title":"The Challenges of Web 2.0 and Social Media","year":"2012"},{"issue":"2","key":"key2021041409394563700_ref028","doi-asserted-by":"crossref","first-page":"153","DOI":"10.24908\/ss.v13i2.5331","article-title":"Contesting a biopolitics of information and communications: the importance of truth and Sousveillance after Snowden","volume":"13","year":"2015","journal-title":"Surveillance & Society"},{"key":"key2021041409394563700_ref029","volume-title":"No Place to Hide: Edward Snowden, the NSA, and the US surveillance State","year":"2014"},{"key":"key2021041409394563700_ref030","first-page":"227","article-title":"Privacy activism after Snowden: advocacy networks or protest?","volume-title":"Cultures of Privacy","year":"2014"},{"key":"key2021041409394563700_ref031","first-page":"167","article-title":"The surveillance-industrial complex","volume-title":"Routledge Handbook of Surveillance Studies","year":"2012"},{"issue":"2","key":"key2021041409394563700_ref032","first-page":"349","article-title":"Outsourcing surveillance \u2013 privatising policy: communications regulation by commercial intermediaries","volume":"2","year":"2014","journal-title":"Birkbeck Law Review"},{"key":"key2021041409394563700_ref033","volume-title":"Eclipse of Reason","year":"1947"},{"key":"key2021041409394563700_ref034","unstructured":"IAB Europe and EASA (2012), \u201cLetter to Article 29 working party\u201d, available at: www.iabeurope.eu\/download_file\/977\/211 (accessed 17 January 2012)."},{"issue":"2","key":"key2021041409394563700_ref035","doi-asserted-by":"crossref","first-page":"168","DOI":"10.24908\/ss.v13i2.5299","article-title":"Surveillance hegemony","volume":"13","year":"2015","journal-title":"Surveillance & Society"},{"key":"key2021041409394563700_ref036","volume-title":"History and Class Consciousness","year":"1971"},{"key":"key2021041409394563700_ref037","volume-title":"Surveillance After September 11","year":"2003"},{"key":"key2021041409394563700_ref038","volume-title":"Surveillance Studies: An Overview","year":"2007"},{"issue":"2","key":"key2021041409394563700_ref039","article-title":"Surveillance, Snowden, and big data: capacities, consequences, critique","volume":"1","year":"2014","journal-title":"Big Data & Society"},{"key":"key2021041409394563700_ref040","volume-title":"Surveillance after Snowden","year":"2015"},{"issue":"2","key":"key2021041409394563700_ref041","doi-asserted-by":"crossref","first-page":"139","DOI":"10.24908\/ss.v13i2.5363","article-title":"The Snowden stakes: challenges for understanding surveillance today","volume":"13","year":"2015","journal-title":"Surveillance & Society"},{"key":"key2021041409394563700_ref044","volume-title":"The Audience Commodity in a Digital Age. Revisiting a Critical Theory of Commercial Media","year":"2014"},{"key":"key2021041409394563700_ref042","volume-title":"One-Dimensional Man","year":"1964"},{"key":"key2021041409394563700_ref043","volume-title":"Towards a Surveillant Society. The Rise of Surveillance Systems in Europe","year":"2013"},{"key":"key2021041409394563700_ref045","volume-title":"The Power Elite","year":"1956"},{"key":"key2021041409394563700_ref046","volume-title":"To the Cloud: Big Data in a Turbulent World","year":"2014"},{"key":"key2021041409394563700_ref047","volume-title":"Advertising and Society","year":"2014"},{"issue":"1\/2","key":"key2021041409394563700_ref048","article-title":"The state journalism is in: Edward Snowden and the British press","volume":"11","year":"2014","journal-title":"Ethical Space"},{"issue":"2","key":"key2021041409394563700_ref049","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1177\/1940161214566709","article-title":"Hero on twitter, traitor on news: how social media and legacy news frame Snowden","volume":"20","year":"2015","journal-title":"The International Journal of Press\/Politics"},{"key":"key2021041409394563700_ref050","unstructured":"Quellcode entschl\u00fcsselt (2014), \u201cBeweis f\u00fcr NSA-Spionage in Deutschland\u201d, NDR Online, available at: http:\/\/daserste.ndr.de\/panorama\/archiv\/2014\/Quellcode-entschluesselt-Beweis-fuer-NSA-Spionage-in-Deutschland,nsa224.html (accessed 3 July 2014)."},{"key":"key2021041409394563700_ref051","volume-title":"Before and after 9\/11: A Philosophical Examination of Globzliation, Terror, and History","year":"2011"},{"key":"key2021041409394563700_ref052","unstructured":"RT Online (2014), \u201cOne year after Snowden drops NSA bomb, UK citizens demand more privacy\u201d, available at: http:\/\/rt.com\/news\/162496-nsa-gchq-snowden-internet\/ (accessed 6 November 2017)."},{"issue":"7","key":"key2021041409394563700_ref053","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1177\/0191453714537263","article-title":"Whistleblowing as civil disobedience: the case of Edward Snowden","volume":"40","year":"2014","journal-title":"Philosophy and Social Criticism"},{"key":"key2021041409394563700_ref054","unstructured":"Schneier, B. (2013), \u201cAttacking Tor: how the NSA targets users\u2019 online anonymity\u201d, The Guardian, available at: www.theguardian.com\/world\/2013\/oct\/04\/tor-attacks-nsa-users-online-anonymity (accessed 4 October 2014)."},{"issue":"2","key":"key2021041409394563700_ref055","doi-asserted-by":"crossref","first-page":"197","DOI":"10.24908\/ss.v13i2.5296","article-title":"Patterns of surveillance legitimization: the German discourse on the NSA scandal","volume":"13","year":"2015","journal-title":"Surveillance & Society"},{"key":"key2021041409394563700_ref056","unstructured":"The Guardian (2013a), \u201cNSA Prism program taps in to user data of Apple, Google and others\u201d, available at: www.theguardian.com\/world\/2013\/jun\/06\/us-tech-giants-nsa-data (accessed 7 June 2013)."},{"key":"key2021041409394563700_ref057","unstructured":"The Guardian (2013b), \u201cGCHQ taps fibre-optic cables for secret access to world\u2019s communications\u201d, available at: www.theguardian.com\/uk\/2013\/jun\/21\/gchq-cables-secret-world-communications-nsa?guni=Article:in%20body%20link (accessed 21 June 2013)."},{"key":"key2021041409394563700_ref058","unstructured":"The Guardian (2013c), \u201cGCHQ and European spy agencies worked together on mass surveillance\u201d, available at: www.theguardian.com\/uk-news\/2013\/nov\/01\/gchq-europe-spy-agencies-mass-surveillance-snowden (accessed 1 November 2013)."},{"key":"key2021041409394563700_ref059","unstructured":"The Guardian (2014), \u201cTranscript of an Interview with Edward Snowden\u201d, available at: www.theguardian.com\/world\/2014\/jul\/18\/-sp-edward-snowden-nsa-whistleblower-interview-transcript (accessed 18 July 2014)."},{"key":"key2021041409394563700_ref060","unstructured":"The Progressive (2013), \u201cSpying on occupy activists\u201d, available at: http:\/\/progressive.org\/spying-on-ccupy-activists (accessed June 2013)."},{"key":"key2021041409394563700_ref061","volume-title":"Social Media as Surveillance. Rethinking Visibility in a Converging World","year":"2012"},{"key":"key2021041409394563700_ref062","volume-title":"Identity Problems in the Facebook Era","year":"2014"},{"key":"key2021041409394563700_ref063","volume-title":"Social Media, Politics and the State: Protests, Revolutions, Riots, Crime and Policing in the Age of Facebook, Twitter and YouTube","year":"2014"},{"issue":"2","key":"key2021041409394563700_ref064","doi-asserted-by":"crossref","first-page":"182","DOI":"10.24908\/ss.v13i2.5315","article-title":"Leaky apps and data shots: technologies of leakage and insertion in NSA-surveillance","volume":"13","year":"2015","journal-title":"Surveillance & Society"},{"key":"key2021041409394563700_ref065","unstructured":"Washington Post (2017), \u201cA hidden world, growing beyond control\u201d, available at: http:\/\/projects.washingtonpost.com\/top-secret-america\/articles\/a-hidden-world-growing-beyond-control\/"},{"issue":"2","key":"key2021041409394563700_ref066","first-page":"132","article-title":"Surveillance and security intelligence after Snowden","volume":"13","year":"2015","journal-title":"Surveillance & Society"},{"key":"key2021041409394563700_ref067","unstructured":"XKeyscore (2013), \u201cNSA tool collects \u2018nearly everything a user does on the internet\u201d, available at: www.theguardian.com\/world\/2013\/jul\/31\/nsa-top-secret-program-online-data (accessed 31 July 2013)"}],"container-title":["Journal of Information, Communication and Ethics in Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-01-2016-0004\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-01-2016-0004\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:38:05Z","timestamp":1753393085000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jices\/article\/15\/4\/412-444\/217391"}},"subtitle":["A critical empirical study of computer experts\u2019 attitudes on commercial and state surveillance of the Internet and social media post-Edward Snowden"],"short-title":[],"issued":{"date-parts":[[2017,11,23]]},"references-count":67,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2017,11,23]]},"published-print":{"date-parts":[[2017,12,8]]}},"alternative-id":["10.1108\/JICES-01-2016-0004"],"URL":"https:\/\/doi.org\/10.1108\/jices-01-2016-0004","relation":{},"ISSN":["1477-996X"],"issn-type":[{"value":"1477-996X","type":"print"}],"subject":[],"published":{"date-parts":[[2017,11,23]]}}}