{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:44:38Z","timestamp":1777455878886,"version":"3.51.4"},"reference-count":83,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000155","name":"Social Sciences and Humanities Research Council of Canada","doi-asserted-by":"publisher","award":["403-2018-0263"],"award-info":[{"award-number":["403-2018-0263"]}],"id":[{"id":"10.13039\/501100000155","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Big Data &amp; Society"],"published-print":{"date-parts":[[2023,1]]},"abstract":"<jats:p>Zuboff's The Age of Surveillance Capitalism provides a powerful analysis of the emergence of surveillance capitalism as a particular type of informational capitalism. Many of the important impacts of this project of creating larger and more integrated systems of \u2018behavioural surplus\u2019 are captured powerfully by Zuboff; yet as different risk and organisational scholars such as Beck, Perrow, and Vaughan have argued, integrated systems often do not function as intended. While the imperfection of these systems may raise the possibility that surveillance capitalism may not be as bad as Zuboff suggests, there is also a way in which these systems not functioning as intended can make surveillance capitalism an even more dystopian possibility. In this vein, this paper asks: what are the consequences when the tools of a surveillance capitalist society break down? This paper argues that it is by thinking through Zuboff's framework that we can identify the systemic fragility of a surveillance capitalist society. This systemic fragility emerges through how surveillance capitalism generates imperatives towards the maximal collection of data for exploitation, which in turn generates a corresponding imperative to connect all aspects of life. Both of these imperatives, of collect and connect, in turn create an immensely fragile digital system, which has vast ramifications throughout social life, such that small imperfections and gaps in the system can magnify risk throughout society.<\/jats:p>","DOI":"10.1177\/20539517231177621","type":"journal-article","created":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T01:16:38Z","timestamp":1684977398000},"update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":13,"title":["Surveillance capitalism and systemic digital risk: The imperative to collect and connect and the risks of interconnectedness"],"prefix":"10.1177","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8771-1141","authenticated-orcid":false,"given":"Dean","family":"Curran","sequence":"first","affiliation":[{"name":"Sociology, University of Calgary, Faculty of Arts, Calgary, Canada"}]}],"member":"179","published-online":{"date-parts":[[2023,5,24]]},"reference":[{"key":"bibr1-20539517231177621","unstructured":"117\n                        th\n                        Congress\n                      \n                      (2021) Cyber threats in the pipeline: Lessons from the federal response to the Colonial Pipeline ransomware attack. Serial No. 117\u201318. Washington: U.S. Government Publishing House."},{"key":"bibr2-20539517231177621","unstructured":"Al-Heeti A, Ng A (2018) Twitter password bug potentially exposes 330 M users, Jack Dorsey says. May 4. CNET https:\/\/www.cnet.com\/tech\/tech-industry\/twitter-advises-all-users-to-change-passwords-after-glitch-that-exposed-some-in-plain-text\/."},{"key":"bibr3-20539517231177621","doi-asserted-by":"publisher","DOI":"10.1080\/10630732.2014.942092"},{"key":"bibr4-20539517231177621","volume-title":"The Human Condition","author":"Arendt H","year":"1958"},{"key":"bibr5-20539517231177621","volume-title":"Liquid Modernity","author":"Bauman Z","year":"2000"},{"key":"bibr6-20539517231177621","volume-title":"Risk Society: Towards a New Modernity","author":"Beck U","year":"1992"},{"key":"bibr7-20539517231177621","unstructured":"Bogost I (2015) The internet of things you don\u2019t really need. Atlantic 23 June. https:\/\/www.theatlantic.com\/technology\/archive\/2015\/06\/the-internet-of-things-you-dont-really-need\/396485\/."},{"key":"bibr8-20539517231177621","unstructured":"Bradshaw T (2022) \u2018Everything app\u2019 blueprint touted as two decades in the making. Financial Times 6 October: 11."},{"key":"bibr9-20539517231177621","doi-asserted-by":"publisher","DOI":"10.1111\/dech.12588"},{"key":"bibr10-20539517231177621","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-soc-073014-112317"},{"key":"bibr11-20539517231177621","unstructured":"Cherney MA (2020) Twitter stock slides 3% after hackers target high-profile accounts. Barron\u2019s 15 July https:\/\/www.barrons.com\/articles\/twitter-stock-slides-3-after-hackers-target-high-profile-accounts-51594864082."},{"key":"bibr12-20539517231177621","unstructured":"CISA\n                      (2023) Critical infrastructure sectors. https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors."},{"key":"bibr13-20539517231177621","volume-title":"The Fifth Domain","author":"Clarke RA","year":"2019"},{"key":"bibr14-20539517231177621","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v17i1\/2.13144"},{"key":"bibr15-20539517231177621","doi-asserted-by":"publisher","DOI":"10.1515\/9781503609754"},{"key":"bibr16-20539517231177621","volume-title":"24\/7: Late Capitalism and the Ends of Sleep","author":"Crary J","year":"2013"},{"key":"bibr17-20539517231177621","first-page":"1280","volume":"133","author":"Cuellar M","year":"2020","journal-title":"Harvard Law Review"},{"key":"bibr18-20539517231177621","doi-asserted-by":"publisher","DOI":"10.1177\/1368431017710907"},{"key":"bibr19-20539517231177621","doi-asserted-by":"publisher","DOI":"10.1080\/03085147.2020.1718912"},{"key":"bibr20-20539517231177621","doi-asserted-by":"publisher","DOI":"10.1177\/0042098020927855"},{"key":"bibr21-20539517231177621","doi-asserted-by":"crossref","unstructured":"de Bandt O, Hartmann P (2000) Systemic risk: A survey. European Central Bank Working Paper Series, No. 35. https:\/\/EconPapers.repec.org\/RePEc:ecb:ecbwps:200035.","DOI":"10.2139\/ssrn.258430"},{"key":"bibr22-20539517231177621","volume-title":"Global Finance at Risk: The Case for International Regulation","author":"Eatwell J","year":"2000"},{"key":"bibr23-20539517231177621","volume-title":"ENISA Threat Landscape Report 2018: 15 Top Cyberthreats and Trends. January 2019","author":"ENISA","year":"2019"},{"key":"bibr24-20539517231177621","volume-title":"The Year in Review: ENISA Threat Landscape from January 2019 to April 2020","author":"ENISA","year":"2020"},{"key":"bibr25-20539517231177621","unstructured":"ENISA\n                      (2021)\n                      ENISA Threat Landscape 2021: April 2020 to mid-July 2021\n                      . Athens: European Union Agency for Cybersecurity. October 2021."},{"key":"bibr26-20539517231177621","unstructured":"ENISA\n                      (2022)\n                      ENISA Threat Landscape 2022\n                      . Athens: European Union Agency for Cybersecurity. July 2022."},{"key":"bibr27-20539517231177621","unstructured":"Financial Times\n                      (2022) There is an urgent need to reduce systemic cyber risks. Financial Times Aug 24: 20."},{"key":"bibr28-20539517231177621","doi-asserted-by":"publisher","DOI":"10.4324\/9780203422953"},{"key":"bibr29-20539517231177621","unstructured":"Fleishman G (2018) Equifax data breach, one year later: Obvious errors and no real changes, new report says. Fortune 7 September. https:\/\/fortune.com\/2018\/09\/07\/equifax-data-breach-one-year-anniversary\/."},{"key":"bibr30-20539517231177621","volume-title":"Social Media: A Critical Introduction","author":"Fuchs C","year":"2017","edition":"2"},{"issue":"2","key":"bibr31-20539517231177621","first-page":"325","volume":"43","author":"Giddens A","year":"1976","journal-title":"Social Research"},{"key":"bibr32-20539517231177621","volume-title":"Butterfly Defect: How Globalization Creates Systemic Risks, and What to Do about It","author":"Goldin I","year":"2014"},{"key":"bibr33-20539517231177621","unstructured":"Greenberg A (2018) The untold story of NotPetya, the most devastating cyberattack in history. Wired. 22 August. https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/."},{"key":"bibr34-20539517231177621","volume-title":"Radical Technologies","author":"Greenfield A","year":"2017"},{"key":"bibr35-20539517231177621","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/10277.001.0001"},{"key":"bibr36-20539517231177621","volume-title":"Legitimation Crisis","author":"Habermas J","year":"1975"},{"key":"bibr37-20539517231177621","volume-title":"The Theory of Communicative Action, 2 Vols","author":"Habermas J"},{"key":"bibr38-20539517231177621","unstructured":"Haldane A (2009) Rethinking the financial network. Executive Director, Financial Stability, Bank of England, Speech in Amsterdam, 28 April 2009."},{"key":"bibr39-20539517231177621","doi-asserted-by":"publisher","DOI":"10.1038\/nature09659"},{"key":"bibr40-20539517231177621","volume-title":"The Smartness Mandate","author":"Halpern O","year":"2022"},{"key":"bibr41-20539517231177621","volume-title":"The Internet Trap: How the Digital Economy Builds Monopolies and Undermines Democracy","author":"Hindman M","year":"2018"},{"key":"bibr42-20539517231177621","doi-asserted-by":"publisher","DOI":"10.1177\/14614448211019021"},{"key":"bibr43-20539517231177621","unstructured":"Johnson SC (2013) Analysis: false White House tweet exposes instant trading dangers. Reuters 23 April. https:\/\/www.reuters.com\/article\/us-usa-markets-tweet-idUSBRE93M1FD20130423."},{"key":"bibr44-20539517231177621","doi-asserted-by":"publisher","DOI":"10.1080\/03085147.2020.1745428"},{"key":"bibr45-20539517231177621","first-page":"1460","volume":"129","author":"Kapczynski A","year":"2020","journal-title":"Yale Law Journal"},{"key":"bibr46-20539517231177621","unstructured":"Kelly S, Resnick-Ault J (2021) One password allowed hackers to disrupt Colonial Pipeline, CEO tells senators. Reuters 8 June. https:\/\/www.reuters.com\/business\/colonial-pipeline-ceo-tells-senate-cyber-defenses-werecompromised-ahead-hack-2021-06-08\/."},{"key":"bibr47-20539517231177621","doi-asserted-by":"publisher","DOI":"10.1007\/s10708-013-9516-8"},{"key":"bibr48-20539517231177621","doi-asserted-by":"publisher","DOI":"10.1080\/10630732.2017.1408002"},{"key":"bibr49-20539517231177621","unstructured":"Larson S (2017) Massive cyberattack targeting 99 countries causes sweeping havoc. CNN Money. http:\/\/money.cnn.com\/2017\/05\/12\/technology\/ransomware-attack-nsa-microsoft\/index.html."},{"key":"bibr50-20539517231177621","volume-title":"Big Data: A Revolution That Will Transform How We Live, Work, and Think","author":"Mayer-Sch\u00f6nberger V","year":"2013"},{"key":"bibr51-20539517231177621","unstructured":"McGee P (2023) Apple sales driven by Gen Z fear of being ostracised. Financial Times February 24: 10."},{"key":"bibr52-20539517231177621","unstructured":"McMillan R (2019) Capital One breach casts shadow over cloud security. Wall Street Journal. July 30. https:\/\/www.wsj.com\/articles\/capital-one-breach-casts-shadow-over-cloud-security-11564516541."},{"key":"bibr53-20539517231177621","unstructured":"Morozov E (2019) Capitalism\u2019s new clothes. The Baffler 9 February. https:\/\/thebaffler.com\/latest\/capitalisms-new-clothes-morozov."},{"key":"bibr54-20539517231177621","unstructured":"Morrison S (2021) How a major oil pipeline got held for ransom: The largest petroleum pipeline in the country was reportedly breached by a single leaked password. Vox 8 June. https:\/\/www.vox.com\/recode\/22428774\/ransomeware-pipeline-colonial-darkside-gas-prices."},{"key":"bibr55-20539517231177621","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-015-2904-x"},{"key":"bibr56-20539517231177621","doi-asserted-by":"publisher","DOI":"10.4159\/harvard.9780674736061"},{"key":"bibr57-20539517231177621","unstructured":"Perrin C (2010) The danger of complexity: More code, more bugs. TechRepublic. February 1. https:\/\/www.techrepublic.com\/blog\/it-security\/the-danger-of-complexity-more-code-more-bugs\/."},{"key":"bibr58-20539517231177621","volume-title":"Normal Accidents: Living with High-Risk Technologies","author":"Perrow C","year":"1984"},{"key":"bibr59-20539517231177621","volume-title":"The Next Catastrophe: Reducing Our Vulnerabilities to Natural, Industrial, and Terrorist Disasters","author":"Perrow C","year":"2007"},{"key":"bibr60-20539517231177621","volume-title":"Security in Computing","author":"Pfleeger C","year":"2015","edition":"5"},{"key":"bibr61-20539517231177621","volume-title":"The Great Transformation","author":"Polanyi K","year":"1957"},{"key":"bibr62-20539517231177621","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818804772"},{"key":"bibr63-20539517231177621","doi-asserted-by":"publisher","DOI":"10.1038\/srep02759"},{"key":"bibr64-20539517231177621","unstructured":"Sanger DE, Perlroth N (2021) Sanger pipeline attack yields urgent lessons about U.S. cybersecurity. New York Times. May 14, 2021. https:\/\/www.nytimes.com\/2021\/05\/14\/us\/politics\/pipeline-hack.html."},{"issue":"100467","key":"bibr65-20539517231177621","first-page":"1","volume":"44","author":"Schiller E","year":"2022","journal-title":"Computer Science Review"},{"key":"bibr66-20539517231177621","volume-title":"Beyond Fear: Thinking Sensibly about Security in an Uncertain World","author":"Schneier B","year":"2003"},{"key":"bibr67-20539517231177621","doi-asserted-by":"publisher","DOI":"10.1002\/9781119183631"},{"key":"bibr68-20539517231177621","volume-title":"Click Here to Kill Everybody: Security and Survival in a Hyper-connected World","author":"Schneier B","year":"2018"},{"issue":"3","key":"bibr69-20539517231177621","first-page":"1","volume":"1","author":"Smythe DW","year":"1977","journal-title":"Canadian Journal of Political and Social Theory"},{"key":"bibr70-20539517231177621","doi-asserted-by":"publisher","DOI":"10.1007\/s10612-018-9416-9"},{"key":"bibr71-20539517231177621","volume-title":"Platform Capitalism","author":"Srnicek N","year":"2017"},{"key":"bibr72-20539517231177621","unstructured":"Thomas E (2019) Microsoft Windows vulnerability BlueKeep could bring the new WannaCry, so are you safe? ABC News 7 July. https:\/\/www.abc.net.au\/news\/2019-07-08\/microsoft-windows-vulnerability-bluekeep-and-cyber-security-risk\/11277270."},{"key":"bibr73-20539517231177621","volume-title":"Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia","author":"Townshend AM","year":"2013"},{"key":"bibr74-20539517231177621","volume-title":"The Equifax Data Breach: Majority Staff Report 115th Congress","author":"U.S. House of Representatives Committee on Oversight and Government Reform","year":"2018"},{"key":"bibr75-20539517231177621","doi-asserted-by":"publisher","DOI":"10.1525\/9780520948693"},{"key":"bibr76-20539517231177621","volume-title":"Anti-Social Media: How Facebook Disconnects Us and Undermines Democracy","author":"Vaidhyanathan S","year":"2018"},{"key":"bibr77-20539517231177621","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v12i2.4776"},{"key":"bibr78-20539517231177621","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.25.1.271"},{"key":"bibr79-20539517231177621","doi-asserted-by":"publisher","DOI":"10.1038\/464984a"},{"key":"bibr80-20539517231177621","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctv1fx4h9c"},{"key":"bibr81-20539517231177621","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2015.5"},{"key":"bibr82-20539517231177621","volume-title":"The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power","author":"Zuboff S","year":"2019"},{"key":"bibr83-20539517231177621","unstructured":"Zurich and Atlantic Council\n                      (2014) Beyond data breaches: global interconnections of cyber risk. Risk Nexus. https:\/\/www.atlanticcouncil.org\/images\/publications\/Zurich_Cyber_Risk_April_2014.pdf."}],"container-title":["Big Data &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/20539517231177621","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/20539517231177621","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/20539517231177621","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T13:00:27Z","timestamp":1777381227000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/20539517231177621"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1]]},"references-count":83,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["10.1177\/20539517231177621"],"URL":"https:\/\/doi.org\/10.1177\/20539517231177621","relation":{},"ISSN":["2053-9517","2053-9517"],"issn-type":[{"value":"2053-9517","type":"print"},{"value":"2053-9517","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1]]},"article-number":"20539517231177621"}}