Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-lj6df Total loading time: 0 Render date: 2024-11-08T03:25:17.411Z Has data issue: false hasContentIssue false

32 - Discourse Analysis and Digital Surveillance

from Part VI - Discourses, Publics and Mediatization

Published online by Cambridge University Press:  28 September 2020

Anna De Fina
Affiliation:
Georgetown University, Washington DC
Alexandra Georgakopoulou
Affiliation:
King's College London
Get access

Summary

This chapter explores how tools from discourse analysis can contribute to our understanding of digital surveillance. It lays the groundwork for this exploration by first examining the role of discourse analysis in our understanding of surveillance more generally. It then goes on to discuss the mediated nature of all surveillance and the different affordances and constraints that different media bring to it. Next, it provides an overview of the main discursive processes involved in digital surveillance, including participation, pretexting, entextualization, recontextualization and inferencing, showing how they occur differently when mediated through digital technologies. A range of key issues and ongoing debates around digital surveillance related to discourse analysis are then identified and elaborated upon, specifically identity, agency and power. Finally, the chapter discusses the implications of a discourse analytical approach to digital surveillance for the professional practices of applied and sociolinguists and suggests some future directions for research on discourse and digital surveillance.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2020

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Further Reading

This is one of the few examples in surveillance studies to seriously engage with theories of discourse analysis, exploring how regimes of surveillance discursively construct social identities and relationships between citizens/customers and the state and corporations.

This chapter gives a comprehensive explanation of the impact of different kinds of media on the discursive processes involved in surveillance.

This article looks at digital surveillance from the point of view of users of digital media, reporting on a research project in which participants described their “folk theories” of how algorithms work and reflected on how these theories affect the way they communicate.

Barnard-Wills, D. (2012). Surveillance and Identity: Discourse, Subjectivity and the State. Farnham: Ashgate.Google Scholar
Jones, R. (2017). Surveillant Media: Technology, Language and Control. In Cotter, C. and Perrin, D. (eds.) The Routledge Handbook of Language and Media. London: Routledge. 244–61.Google Scholar
Jones, R. (2019). The Text Is Reading You: Teaching Language in the Age of the Algorithm. Linguistics and Education. (available online at https://doi.org/10.1016/j.linged.2019.100750)Google Scholar

References

Ahmed, S. (2004). Affective Economies. Social Text 22(2): 117–39.Google Scholar
Albrechtslund, A. (2008). Online Social Networking as Participatory Surveillance. First Monday 13(3).Google Scholar
Anderson, C. (2008). The End of Theory: The Data Deluge Makes the Scientific Method Obsolete. Wired Magazine, June 23. www.wired.com/2008/06/pb-theory.Google Scholar
Andrejevic, M. (2015). Foreword. In Dubrofsky, R. E. and Magnet, S. A. (eds.) Feminist Surveillance Studies. Durham, NC: Duke University Press. ixxviii.Google Scholar
Anthamatten, E. (2015). Visibility Is a Trap: Body Cameras and the Panopticon of Police Power. The Mantle, March, 23. www.mantlethought.org/philosophy/visibility-trap.Google Scholar
Ayres, I. (2008). Super Crunchers: How Anything Can Be Predicted. London: Hachette. Barnard-Wills, D. (2012). Surveillance and Identity: Discourse, Subjectivity and the State. Farnham: Ashgate.Google Scholar
Battelle, J. (2005). The Search: How Google and Its Rivals Rewrote the Rules of Business and Transformed Our Culture. New York: Portfolio.Google Scholar
Bauman, R. and Briggs, C. L. (1990). Poetics and Performance as Critical Perspectives on Language and Social Life. Annual Review of Anthropology 19: 5988.Google Scholar
Bell, A. (1984). Language Style as Audience Design. Language in Society 13: 145204.Google Scholar
Berry, D. (2011). The Philosophy of Software: Code and Mediation in the Digital Age. Basingstoke: Palgrave Macmillan.Google Scholar
Blaze, M. (2013). Phew, NSA Is Just Collecting Metadata (You Should Still Worry). Wired, June 19. www.wired.com/2013/06/phew-it-was-just-metadata-not-think-again.Google Scholar
Blommaert, J. and Omoniyi, T. (2006). Email Fraud: Language, Technology, and the Indexicals of Globalisation. Social Semiotics 16(4): 573605.Google Scholar
Bowker, G. C. (2005). Memory Practices in the Sciences. Cambridge, MA: MIT Press.Google Scholar
Boyd, D. (2012). Networked Privacy. Surveillance & Society 10(3/4): 348–50.Google Scholar
Bucher, T. (2017). The Algorithmic Imaginary: Exploring the Ordinary Affects of Facebook Algorithms. Information, Communication & Society 20(1): 3044. https://doi.org/10.1080/1369118X.2016.1154086.Google Scholar
Bucholtz, M. and Hall, K. (2005). Identity and Interaction: A Sociocultural Linguistic Approach. Discourse Studies 7(4–5): 585614. https://doi.org/10.1177/1461445605054407.Google Scholar
Bucholtz, M. and Hall, K. (2016). Embodied Sociolinguistics. In Coupland, N. (ed.) Sociolinguistics.Cambridge: Cambridge University Press. 173–98.Google Scholar
Cheney-Lippold, J. (2017). We Are Data: Algorithms and the Making of Our Digital Selves. New York: New York University Press.Google Scholar
Clarke, R. (1988). Information Technology and Dataveillance. Communications of the ACM 31(5): 498512.Google Scholar
Cole, D. (2014). “We Kill People Based on Metadata.” New York Review of Books, May 10. www.nybooks.com/daily/2014/05/10/we-kill-people-based-metadata.Google Scholar
Deleuze, G., Guattari, F. and Massumi, B. (1987). A Thousand Plateaus: Capitalism and Schizophrenia. Minneapolis: University of Minnesota Press.Google Scholar
Dodge, M. and Kitchin, R. (2005). Codes of Life: Identification Codes and the Machine-Readable World. Environment and Planning D: Society and Space 23(6): 851–81.Google Scholar
Dunbar, R. (1996). Grooming, Gossip and the Evolution of Language. Cambridge, MA: Harvard University Press.Google Scholar
Duranti, A. (2011). Linguistic Anthropology: The Study of Language as a Non-neutral Medium. In Mesthrie, R. (ed.) The Cambridge Handbook of Sociolinguistics. Cambridge: Cambridge University Press. 2846.Google Scholar
Foth, M. and Hearn, G. (2007). Networked Individualism of Urban Residents: Discovering the Communicative Ecology in Inner-City Apartment Buildings. Information, Communication & Society 10(5): 749–72.Google Scholar
Garfinkel, H. (1986). Remarks on Ethnomethodology. In Gumperz, J. J. and Hymes, D. (eds.) Directions in Sociolinguistics: The Ethnography of Communication, 2nd ed. New York: John Wiley & Sons. 301–45.Google Scholar
Giddens, A. (1991). The Consequences of Modernity. Cambridge: Polity Press.Google Scholar
Gitelman, L. (2014). Paper Knowledge: Toward a Media History of Documents. Durham, NC: Duke University Press.Google Scholar
Goffman, E. (1959). The Presentation of Self in Everyday Life. New York: Doubleday.Google Scholar
Goffman, E. (1963). Stigma: Notes on the Management of Spoiled Identity. Englewood Cliffs, NJ: Prentice Hall.Google Scholar
Goffman, E. (1964). The Neglected Situation. American Anthropologist 66(6_PART2): 133–6.Google Scholar
Goffman, E. (1972). Relations in Public: Microstudies of the Public Order. New York: Harper & Row.Google Scholar
Goffman, E. (1981). Forms of Talk. Oxford: Blackwell.Google Scholar
Graham, S. (1998). Spaces of Surveillant Simulation: New Technologies, Digital Representations, and Material Geographies. Environment and Planning D: Society and Space 16(4): 483504.Google Scholar
Graham, S. and Wood, D. (2003). Digitizing Surveillance: Categorization, Space, Inequality. Critical Social Policy 23(2): 227–48.Google Scholar
Grassenger, H. and Krogerus, M. (2017). The Data that Turned the World Upside Down. Vice, January 28. https://motherboard.vice.com/en_us/article/mg9vvn/how-our-likes-helped-trump-win.Google Scholar
Grice, H. P. (1989). Studies in the Way of Words. Cambridge, MA: Harvard University Press.Google Scholar
Hadnagy, C. (2010). Social Engineering: The Art of Human Hacking. Indianapolis, IN: Wiley.Google Scholar
Haggerty, K. D. (2006). Tear Down the Walls: On Demolishing the Panopticon. In Lyon, D. (ed.) Theorizing Surveillance. London: Routledge. 2345.Google Scholar
Haggerty, K. D. and Ericson, R. V. (2000). The Surveillant Assemblage. British Journal of Sociology 51(4): 605–22.Google Scholar
Hayles, N. K. (1993). The Materiality of Informatics. Configurations 1(1): 147–70.Google Scholar
Hess, A. (2014). You Are What You Compute (and What Is Computed for You): Considerations of Digital Rhetorical Identification. Journal of Contemporary Rhetoric 4(1/2): 118.Google Scholar
Hutchby, I. (2001). Conversation and Technology: From the Telephone to the Internet. Cambridge, UK/Malden, MA: Polity.Google Scholar
Hymes, D. (1974). Foundations in Sociolinguistics: An Ethnographic Approach. Philadelphia: University of Pennsylvania Press.Google Scholar
ieeessit. (2017). Ubiquitous Surveillance and Security. Technology and Society, June 29. http://technologyandsociety.org/ubiquitous-surveillance-and-security/.Google Scholar
Introna, L. D. (2011). The Enframing of Code Agency, Originality and the Plagiarist. Theory, Culture & Society 28(6): 113–41.Google Scholar
Johnson, D. G. and Regan, P. M. (2014). Transparency and Surveillance as Sociotechnical Accountability: A House of Mirrors. London: Routledge.Google Scholar
Jones, R. H. (2009). Inter-activity: How New Media Can Help Us Understand Old Media. In Rowe, C. and Wyss, E. (eds.) New Media and Linguistic Change. Cresskill, NJ: Hampton Press. 1129.Google Scholar
Jones, R. H. (2017a). Surveillant Media: Technology, Language and Control. In Colleen, C. and Perrin, D. (eds.) Routledge Handbook of Language and Media. London: Routledge. 244–61.Google Scholar
Jones, R. H. (2017b). “The Text Is Reading You”: Language Teaching in the Age of the Algorithm. Presented at the 18th World Congress of Applied Linguistics, Rio de Janeiro.Google Scholar
Jones, R. H. (2018). GDPR and the Discursive Coercion of Consent. A plenary address presented at the “What’s Up, Switzerland?” Conference: Language, Individuals and Ideologies in Mobile Messaging, University of Zurich, October 1820.Google Scholar
Jones, R. H. (2020). The Rise of the Pragmatic Web: Implications for Rethinking Meaning and Interaction. In Tagg, C. and Evans, M. (eds.) Historicising the Digital. Amsterdam: Mouton de Gruyter 17–37.Google Scholar
Jones, R. H. and Hafner, C. A. (2012). Understanding Digital Literacies: A Practical Introduction. London: Routledge.Google Scholar
Kerr, I., Lucock, C. and Steeves, V. (2009). Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society. Oxford/New York: Oxford University Press.Google Scholar
Khan, K. (2019). Becoming a Citizen: Linguistic Trials and Negotiations in the UK. London/New York: Bloomsbury Academic.Google Scholar
Kim, N. S. (2013). Wrap Contracts: Foundations and Ramifications. Oxford: Oxford University Press.Google Scholar
Kosinski, M., Stillwell, D. and Graepel, T. (2013). Private Traits and Attributes Are Predictable from Digital Records of Human Behavior. Proceedings of the National Academy of Sciences 110(15): 5802–5.Google Scholar
Lanier, J. (2018). Ten Arguments for Deleting Your Social Media Accounts Right Now. New York: Henry Holt and Company.Google Scholar
Latour, B. (2007). Reassembling the Social: An Introduction to Actor-Network-Theory. Oxford/New York: Oxford University Press.Google Scholar
Longford, G. (2005). Pedagogies of Digital Citizenship and the Politics of Code. Techné: Research in Philosophy and Technology 9(1): 68–96.Google Scholar
Lyon, D. (2003). Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination. New York: Psychology Press.Google Scholar
Magnet, S. and Gates, K. (2009). Communicating Surveillance: Examining the Intersections. In Gates, K. and Magnet, S. (eds.) The New Media of Surveillance. London: Routledge.Google Scholar
Marx, G. T. (2012). “Your Papers Please”: Personal and Professional Encounters with Surveillance. In Lyon, D., Ball, K. and Haggerty, K. D. (eds.) The Routledge Handbook of Surveillance Studies. London: Routledge. xxxxxi.Google Scholar
Marx, G. T. (2016). Windows into the Soul: Surveillance and Society in an Age of High Technology. Chicago, IL: University of Chicago Press.Google Scholar
Maryns, K. and Blommaert, J. (2002). Pretextuality and Pretextual Gaps: On Re/defining Linguistic Inequality. Journal of Pragmatics 12(1): 1130.Google Scholar
McGrath, J. (2004). Loving Big Brother: Surveillance Culture and Performance Space. London/New York: Routledge.Google Scholar
MIT Media Lab. (n.d.). Project Overview: On the Re-identifiability of Credit Card Metadata. www.media.mit.edu/projects/on-the-reidentifiability-of-credit-card-metadata/overview.Google Scholar
Nguyen, D. H. and Mynatt, E. D. (2002). Privacy Mirrors: Understanding and Shaping Socio-technical Ubiquitous Computing Systems (Technical Report). Georgia Institute of Technology. https://smartech.gatech.edu/handle/1853/3268.Google Scholar
Nissenbaum, H. (2009). Privacy in Context: Technology, Policy, and the Integrity of Social Life. Palo Alto, CA: Stanford University Press.Google Scholar
Palen, L. and Dourish, P. (2003). Unpacking “Privacy” for a Networked World. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York: ACM. 129–36.Google Scholar
Papacharissi, Z. and Gibson, P. L. (2011). Fifteen Minutes of Privacy: Privacy, Sociality, and Publicity on Social Network Sites. In Trepte, S. and Reinecke, L. (eds.) Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web. Berlin/Heidelberg: Springer. 7589.Google Scholar
Pennycook, A. (2017). Posthumanist Applied Linguistics. London: Routledge.Google Scholar
Phillips, D. J. (2002). Negotiating the Digital Closet: Online Pseudonymity and the Politics of Sexual Identity. Information, Communication & Society 5(3): 406–24.Google Scholar
Reilly, C. (2014). The Metadata Debate: What You Need to Know about Data Retention. CNet, August 13. www.cnet.com/news/what-you-need-to-know-about-data-retention.Google Scholar
Rivest, R. L., Shamir, A. and Adleman, L. (1978). A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communication of the ACM 21(2): 120–6.Google Scholar
Rock, F. (2016). Talking the Ethical Turn: Drawing on Tick-Box Consent in Policing. In Ehrlich, S., Eades, D. and Ainsworth, J. (eds.) Discursive Constructions of Consent in the Legal Process. Oxford: Oxford University Press. 93117.Google Scholar
Ruesch, J. and Bateson, G. (1951). Communication: The Social Matrix of Psychiatry. New York: W.W. Norton.Google Scholar
Scott, J. (1999). Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed. New Haven, CT: Yale University Press.Google Scholar
Shohamy, E. (2014). The Power of Tests: A Critical Perspective on the Uses of Language Tests. London: Routledge.Google Scholar
Slade, S. and Prinsloo, P. (2013). Learning Analytics: Ethical Issues and Dilemmas. American Behavioral Scientist 57(10): 1510–29.Google Scholar
Tagg, C., Seargeant, P. and Brown, A. A. (2017). Taking Offence on Social Media: Conviviality and Communication on Facebook. New York: Palgrave Macmillan.Google Scholar
Tene, O. and Polonetsky, J. (2013). Big Data for All: Privacy and User Control in the Age of Analytics. Northwestern Journal of Technology and Intellectual Property 11(5): 239.Google Scholar
Tiainen, M. (2017). (De)legitimating Electronic Surveillance: A Critical Discourse Analysis of the Finnish News Coverage of the Edward Snowden Revelations. Critical Discourse Studies 14(4): 402–19.Google Scholar
Trottier, D. (2012). Social Media as Surveillance: Rethinking Visibility in a Converging World. Farnham: Ashgate.Google Scholar
Van der Ploeg, I. (2003). Biometrics and Privacy: A Note on the Politics of Theorizing Technology. Information, Communication & Society 6(1): 85104. https://doi.org/10.1080/1369118032000068741.Google Scholar
Wee, L. (2015). Mobilizing Affect in the Linguistic Cyberlandscape: The R-Word Campaign. In Rudby, R. and Ben Said, S. (eds.) Conflict, Exclusion and Dissent in the Linguistic Landscape. Basingstoke: Palgrave Macmillan. 185203.Google Scholar
Widdowson, H. G. (2004). Text, Context, Pretext: Critical Issues in Discourse Analysis. Hoboken, NJ: Wiley-Blackwell.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×