SOCIETAL AND IDEOLOGICAL IMPACTS OF DEEP PACKET INSPECTION INTERNET SURVEILLANCE

被引:29
作者
Fuchs, Christian [1 ]
机构
[1] Univ Westminster, Commun & Media Res Inst, London HA1 3TP, England
关键词
political economy; Internet surveillance; Deep Packet Inspection; security industry; surveillance-industrial complex; security-industrial complex;
D O I
10.1080/1369118X.2013.770544
中图分类号
G2 [信息与知识传播];
学科分类号
05 ; 0503 ;
摘要
This paper analyses societal and ideological impacts of Deep Packet Inspection (DPI) technologies. DPI surveillance technologies are communications surveillance tools that are able to monitor the traffic of Internet data, including content data. The analysis presented in this paper is based on product sheets, self-descriptions, and product presentations by 20 European security technology companies that produce and sell DPI technologies, as well as on whitepapers, research papers, news articles, and opinions of privacy advocates, civil society groups, and consumer protection groups. The results show the complexity of societal dimensions of DPI and the importance of the analysis of power and political economy in assessing these implications. They are interpreted in the light of the emergence of a new mode of governmentality, in which the economic interests of the security industry and state interests interact. The analysis also shows that there is a variety of ideological explanations employed by the security industry for justifying its sales of communications surveillance technologies.
引用
收藏
页码:1328 / 1359
页数:32
相关论文
共 53 条
  • [1] [Anonymous], 2009, Coming to Terms with Chance: Engaging Rational Discrimination and Cumulative Disadvantage
  • [2] Babbie E. R., 2021, The Practice of Social Research, V15th ed.
  • [3] Barrow C.J., 2000, Social impact assessment: An introduction
  • [4] The end of the net as we know it? Deep packet inspection and internet governance
    Bendrath, Ralf
    Mueller, Milton
    [J]. NEW MEDIA & SOCIETY, 2011, 13 (07) : 1142 - 1160
  • [5] Bennett Colin., 2006, GOVERNANCE PRIVACY
  • [6] Bigo D, 2010, EUROPE'S 21ST CENTURY CHALLENGE: DELIVERING LIBERTY, P263
  • [7] COHEN S, 1982, DEVIANT BEHAV, V4, P119
  • [8] Comer Douglas., 2004, Computer Networks and Internets with Internet Applications, VFourth
  • [9] Cooper A., 2011, Privacy in America, P139
  • [10] Dekeseredy W., 2011, Contemporary critical criminology