Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-8bhkd Total loading time: 0 Render date: 2024-11-08T00:18:02.946Z Has data issue: false hasContentIssue false

Bibliography

Published online by Cambridge University Press:  27 September 2019

Mikkel Flyverbom
Affiliation:
Copenhagen Business School
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
The Digital Prism
Transparency and Managed Visibilities in a Datafied World
, pp. 155 - 169
Publisher: Cambridge University Press
Print publication year: 2019

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Alaimo, C., & Kallinikos, J. (2017). Computing the everyday: Social media as data platforms. Information Society, 33(4), 175191.Google Scholar
Albergotti, R. (2011). Employee lawsuit accuses Google of “spying program.” Last accessed September 7, 2018. www.theinformation.com/articles/employee-lawsuit-accuses-google-of-spying-program.Google Scholar
Albu, O., & Flyverbom, M. (2016). Organizational transparency: Conceptualizations, conditions, and consequences. Business & Society, 7(3), 4366. https://doi.org/10.1177/0007650316659851.Google Scholar
Amoore, L. (2013). The politics of possibility: Risk and security beyond probability. Durham: Duke University Press.Google Scholar
Amoore, L., & Piotukh, V. (2015). Life beyond big data: Governing with little analytics. Economy and Society, 44(3), 341366.Google Scholar
Anderson, C. (2008). The end of theory: The data deluge makes the scientific method obsolete. WIRED. Last accessed September 7, 2018. http://archive.wired.com/science/discoveries/magazine/16–07/pb_theory.Google Scholar
Andrejevic, M. (2013). Infoglut: How too much information is changing the way we think and know. London: Routledge.CrossRefGoogle Scholar
Andrews, L. (2011). I know who you are and I saw what you did: Social networks and the death of privacy. New York: Free Press.Google Scholar
Annany, M., & Crawford, K. (2018). Seeing without knowing: Limitations of the transparency ideal and its application to algorithmic accountability. New Media & Society, 20(3), 973989.Google Scholar
Austin, J. L. (1962). How to do things with words. Oxford, UK: Clarendon Press.Google Scholar
Axley, S. (1984). Managerial and organizational communication in terms of conduit metaphor. Academy of Management Review, 9(3), 428437. https://doi.org/10.2307/258283.Google Scholar
Barlow, J. P. (1996). A declaration of the independence of cyberspace. Last accessed September 7, 2018. https://projects.eff.org/barlow/Declaration-Final.html.Google Scholar
Barnett, M., & Duvall, R. (2005). Power in global governance. Cambridge: Cambridge University Press.Google Scholar
Bennett, W. L., & Segerberg, A. (2012). The logic of connective action: Digital media and the personalization of contentious politics. Information, Communication & Society, 15(5), 739768.Google Scholar
Berkelaar, B. (2014). Cybervetting, online information, and personnel selection: New transparency expectations and the emergence of a digital social contract. Management Communication Quarterly, 28(4), 479506.Google Scholar
Beyes, T., & Pias, C. (2014). Transparenz und Geheimnis. Zeitschrift für Kulturwissenschaften, 2, 111118.Google Scholar
Birchall, C. (2015). “Data.gov-in-a-box”: Delimiting transparency. European Journal of Social Theory, 18(2), 185202.Google Scholar
Birchall, C. (2016). Managing secrecy. International Journal of Communication, 10, 152163.Google Scholar
Boltanski, L., & Chiapello, E. (2005). The new spirit of capitalism. London: Verso.Google Scholar
Bostrom, N. (2014). Superintelligence: Paths, dangers, strategies. Oxford: Oxford University Press.Google Scholar
Botsman, R. (2017). Big data meets big brother as China moves to rate its citizens. WIRED. Last accessed September 28, 2018. www.wired.co.uk/article/chinese-government-social-credit-score-privacy-invasion.Google Scholar
Bowker, G. C., & Star, S. L. (1999). Sorting things out: Classification and its consequences. Cambridge, MA: MIT Press.Google Scholar
Boyd, D., & Crawford, K. (2012). Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon. Information, Communication & Society, 15(5), 662679.CrossRefGoogle Scholar
Brandeis, L. (1913). What publicity can do. Other People’s Money. Last accessed March 12, 2019. https://archive.org/stream/otherpeoplesmone00bran#page/n5/mode/2up.Google Scholar
Briggs, A., & Burke, P. (2002). A social history of the media: From Gutenberg to the Internet. Cambridge: Polity Press.Google Scholar
Brighenti, A. M. (2007). Visibility: A category for the social sciences. Current Sociology, 55(3), 323342.Google Scholar
Brighenti, A. M. (2010). Visibility in social theory and social research. London: Palgrave Macmillan.CrossRefGoogle Scholar
Brin, D. (1998). The transparent society: Will technology force us to choose between privacy and freedom? New York: Basic Books.Google Scholar
Brin, S., & Page, L. (1998). The anatomy of a large-scale hypertextual web search engine. Seventh International World-Wide Web Conference. Brisbane: April 14–18.Google Scholar
Brunsson, N., & Jacobsson, B. (2002). A world of standards. Oxford: Oxford University Press.Google Scholar
Brunton, F., & Nissenbaum, H. (2015). Obfuscation: A user’s guide for privacy and protest. Cambridge, MA: MIT Press.Google Scholar
Cadwalladr, C. (2016). Google, democracy and the truth about internet search. Last accessed October 5, 2018. www.theguardian.com/technology/2016/dec/04/google-democracy-truth-internet-search-facebook.Google Scholar
Callon, M. (1986). Some elements of a sociology of translation: Domestication of the scallops and the fishermen of St. Brieuc Bay. In Law, J. (Ed.), Power, action and belief: A new sociology of knowledge (pp. 196233). London: Routledge and Kegan Paul.Google Scholar
Cammaerts, Bart (2016). To avoid mistakes like banning the Napalm girl photo, Facebook needs to start acting like social “media.” Last accessed October 5, 2018. www.independent.co.uk/voices/facebook-napalm-girl-vietnam-picture-started-acting-like-media-a7234451.html.Google Scholar
Castells, M. (1996). The rise of the network society. Oxford: Blackwell Publishers.Google Scholar
Castells, M. (1997). The power of identity. Oxford: Blackwell Publishers.Google Scholar
Castells, M. (1998). End of millennium. Oxford: Blackwell Publishers.Google Scholar
Castells, M. (2000). Network society. Oxford: Blackwell Publishers.Google Scholar
Cheney-Lippold, J. (2017). We are data: Algorithms and the making of our digital selves. New York: New York University PressCrossRefGoogle Scholar
Christensen, K. K. (2018). Corporate zones of cyber security. Copenhagen: University of Copenhagen, Faculty of Social Sciences.Google Scholar
Christensen, L. T., & Cheney, G. (2015). Peering into transparency: Challenging ideals, proxies, and organizational practices. Communication Theory, 25(1), 7090.Google Scholar
Clegg, S., & Haugaard, M. (2009). The SAGE handbook of power. London: Sage.Google Scholar
Clinton, B. (2000). Address by Bill Clinton at Johns Hopkins University, 8 March. Last accessed October 29, 2018. www.techlawjournal.com/cong106/pntr/20000308sp.htm.Google Scholar
Cohen, J., & Schmidt, E. (2013). The new digital age: Transforming nations, businesses, and our lives. London: John Murray.Google Scholar
Coombs, T. W., & Holladay, S. J. (2013). The pseudo-panopticon: The illusion created by CSR-related transparency and the Internet. Corporate Communications: An International Journal, 18(1), 212227.Google Scholar
Costas, J., & Grey, C. (2014). Bringing secrecy into the open: Towards a theorization of the social processes of organizational secrecy. Organization Studies, 35(10), 14231447.Google Scholar
Costas, J., & Grey, C. (2016). Secrecy at work: The hidden architecture of organizations. Stanford, CA: Stanford University Press.Google Scholar
Crain, M. (2016). The limits of transparency: Data brokers and commodification. New Media & Society, 20(1), 88104.Google Scholar
Crawford, K. (2016). Can an algorithm be agonistic? Ten scenes from life in calculated publics. Science, Technology & Human Values, 14(1), 7792.Google Scholar
Czarniawska, B. (1998). A narrative approach to organization studies. Thousand Oaks, CA: Sage.Google Scholar
Czarniawska, B., & Sevón, G. (2005). Global ideas: How ideas, objects and practices travel in a global economy. Copenhagen: Copenhagen Business School Press.Google Scholar
Danaher, J., Hogan, M. J., Noone, C., Kennedy, R., Behan, A., Paor, A. De, … Shankar, K. (2017). Algorithmic governance: Developing a research agenda through the power of collective intelligence. Big Data & Society, 4(2), 121.Google Scholar
De Montjoye, Y. A., Radaelli, L., Singh, V. K., & Pentland, A. (2015). Unique in the shopping mall: On the reidentifiability of credit card metadata. Science, 347(6221), 536539.Google Scholar
Dean, M. (1999). Governmentality: Power and rule in modern society. London: Sage.Google Scholar
DeNardis, L., & Musiani, F. (2016). Governance by infrastructure. In Musiani, F., Cogburn, D. L., DeNardis, L., & Levinson, N. S. (Eds.), The turn to infrastructure in internet governance. New York: Palgrave Macmillan.Google Scholar
Desrosières, A. (1998). The politics of large numbers: A history of statistical reasoning. Boston: Harvard University PressGoogle Scholar
DiMaggio, P. J., & Powell, W. W. (1983). The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields. American Sociological Review, 48(2), 147160.Google Scholar
Drummond, D. (2012). Greater transparency around government. Last accessed September 18, 2018. https://googleblog.blogspot.com/2010/04/greater-transparency-around-government.html.Google Scholar
Easterling, K. (2015). Extrastatecraft: The power of infrastructure space. London: Verso.Google Scholar
Economist. (2016). Special report: Companies. Last accessed March 7, 2019. www.economist.com/sites/default/files/20160917_companies.pdf.Google Scholar
Eggers, D. (2014). The circle. New York: Alfred A. Knopf.Google Scholar
Eisenberg, E. M. (1984). Ambiguity as strategy in organizational communication. Communication Monographs, 51(3), 227242.Google Scholar
Etzioni, A. (2010). Is transparency the best disinfectant? Journal of Political Philosophy, 18, 389404.Google Scholar
Facebook. (2013). Q2 2013 earnings call. Last accessed March 7, 2019. https://investor.fb.com/financials/?section=quarterlyearnings.Google Scholar
Fenster, M. (2006). The opacity of transparency. Iowa Law Review, 91(1), 885949.Google Scholar
Fenster, M. (2012). The transparency fix: Advocating legal rights and their alternatives in the pursuit of a visible state. University of Pittsburgh Law Review, 73(1), 433503.Google Scholar
Fenster, M. (2015). Transparency in search of a theory. European Journal of Social Theory, 18(2), 150167.Google Scholar
Flyverbom, M. (2011). The power of networks: Organizing the global politics of the Internet. Cheltenham: Edward Elgar.Google Scholar
Flyverbom, M. (2015). Sunlight in cyberspace? On transparency as a form of ordering. European Journal of Social Theory, 18(2), 168184.Google Scholar
Flyverbom, M. (2016a). Disclosing and concealing: Internet governance, information control and the management of visibility. Internet Policy Review: Journal on Internet Regulation, 5(3). DOI: 10.14763/2016.3.428.Google Scholar
Flyverbom, M. (2016b). Transparency: Mediation and the management of visibilities. International Journal of Communication, 10(1), 110122.Google Scholar
Flyverbom, M. (2017). Datafication, transparency and trust in the digital domain. In Trust at risk? Foresight on the medium-term implications for European research and innovation policies (pp. 6984). Luxembourg: Publications Office of the European Union.Google Scholar
Flyverbom, M., Christensen, L. T., & Hansen, H. K. (2015). The transparency-power nexus: Observational and regularizing control. Management Communication Quarterly, 29(3), 385410.Google Scholar
Flyverbom, M., Leonardi, P., Stohl, M., & Stohl, C. (2016). The management of visibilities in the digital age: Introduction to special section. International Journal of Communication, 10(1), 98106.Google Scholar
Flyverbom, M., & Madsen, A. K. (2016). Sorting data out: Unpacking big data value chains and algorithmic knowledge production. In Süssenguth, F. (Ed.), Die Gesellschaft der Daten: Über die digitale Transformation der sozialen Ordnung (pp. 123144). Bielefeld: Transcript Verlag.Google Scholar
Flyverbom, M., Madsen, A. K., & Rasche, A. (2017). Big data as governmentality in international development: Digital traces, algorithms, and altered visibilities. The Information Society, 33(1), 3542.Google Scholar
Flyverbom, M., & Reinecke, J. (2017). The spectacle and organization studies. Organization Studies, 38(11), 16251643.Google Scholar
Flyverbom, M., & Murray, J. (2018). Datastructuring: Organizing and curating digital traces into action. Big Data & Society. https://doi.org/https://doi.org/10.1177/2053951718799114.Google Scholar
Foer, F. (2017). World without mind: The existential threat of big tech. London: Penguin Press.Google Scholar
Ford, R. (2003). Against cyberspace. In Sarat, A., Douglas, L. & Umphry, M. M. (Eds.), The place of law (pp. 147180). Ann Arbor: University of Michigan Press.Google Scholar
Foucault, M. (1969). The archaeology of knowledge. London: Routledge.Google Scholar
Foucault, M. (1977). Discipline and punish: The birth of the prison. New York: Vintage Books.Google Scholar
Foucault, M. (1979). Governmentality. Ideology and Consciousness, 6, 521.Google Scholar
Foucault, M. (1988). Technologies of the self. In Martin, L. H., Gutman, H., & Hutton, P. H. (Eds.), Technologies of the self: A seminar with Michel Foucault (pp. 1649). London: Tavistock.Google Scholar
Fung, A. G. (2013). Infotopia: Unleashing the democratic power of transparency. Politics & Society, 41(2), 183212.Google Scholar
Fung, A. G., Graham, M., & Weil, D. (2007). Full disclosure: The perils and promise of transparency. Cambridge: Cambridge University Press.Google Scholar
Funk, M. (2016a). Should we see everything a cop sees? New York Times. Last accessed September 7, 2018. www.nytimes.com/2016/10/23/magazine/police-body-cameras.html.Google Scholar
Funk, M. (2016b, November 20). Cambridge Analytica and the secret agenda of a Facebook quiz. New York Times Magazine, p. 5. Last accessed September 7, 2018. www.nytimes.com/2016/11/20/opinion/cambridge-analytica-facebook-quiz.html.Google Scholar
Gabriel, Y. (2015). Glass cages and glass palaces: Images of organization in image-conscious times. Organization, 12(1), 927.CrossRefGoogle Scholar
Galloway, A. R. (2006). Gaming: Essays on algorithmic culture. Minneapolis: University of Minnesota Press.Google Scholar
Ganesh, S. (2016). Managing surveillance: Surveillant individualism in an era of relentless visibility. International Journal of Communication, 10(1), 164177.Google Scholar
Garsten, C., & de Montoya, L., eds. (2008). Transparency in a new global order: Unveiling organizational visions. Celtenham: Edward Elgar.Google Scholar
Gessler, K. (2017). Facebook’s algorithm isn’t surfacing one third of our posts and it’s getting worse. Last accessed September 7, 2018. https://medium.com/@kurtgessler/facebooks-algorithm-isn-t-surfacing-one-third-of-our-posts-and-it-s-getting-worse-68e37ee025a3.Google Scholar
Gillespie, T. (2014). The relevance of algorithms. In Gillespie, T., Boczkowski, P., & Foot, K. (Eds.), Media technologies: Essays on communication, materiality, and society (pp. 167193). Cambridge, MA: MIT Press.Google Scholar
Gillespie, T. (2016). Algorithms, clickworkers, and the befuddled fury around Facebook trends. Last accessed September 18, 2018. www.niemanlab.org/2016/05/algorithms-clickworkers-and-the-befuddled-fury-around-facebook-trends/.Google Scholar
Gillespie, T. (2017a). Algorithmically recognizable: Santorum’s Google problem, and Google’s Santorum problem. Information, Communication & Society, 20(1), 6380.Google Scholar
Gillespie, T. (2017b). Governance of and by platforms. In Burgess, J., Poell, T., & Marwick, A. (Eds.), SAGE handbook of social media (pp. 254279). London: Sage.Google Scholar
Gillespie, T. (2018a). Facebook and YouTube just got more transparent. What do we see? Last accessed September 7, 2018. www.niemanlab.org/2018/05/facebook-and-youtube-just-got-more-transparent-what-do-we-see/.Google Scholar
Gillespie, T. (2018b). Custodians of the Internet: Platforms, content moderation, and the hidden decisions that shape social media. New Haven: Yale University PressGoogle Scholar
Gleick, J. (2011). The Information: A history, a theory, a flood. New York: Pantheon Books.Google Scholar
Goffman, E. (1959). The presentation of self in everyday life. Garden City, NY: Anchor Books.Google Scholar
Goldsmith, A. J. (2010). Policing’s new visibility. British Journal of Criminology, 50(5), 914934.Google Scholar
Good, J. (1965). Speculations concerning the first ultraintelligent machine. Advances in Computers, 6.Google Scholar
Google. (2011). Passion, not perks. Google newsletter. Last accessed September 2018. www.thinkwithgoogle.com/marketing-resources/passion-not-perks/.Google Scholar
Google. (2013). Government requests for user information double over three years. Last accessed September 28, 2018. https://googleblog.blogspot.com/2013/11/government-requests-for-user.html.Google Scholar
Google. (2017). Google transparency report. Last accessed September 29, 2018. www.google.com/transparencyreport/removals/europeprivacy/?hl=en.Google Scholar
Greenberg, A. (2012). This machine kills secrets. New York: Random House.Google Scholar
Hackett, E. J., Amsterdamska, O., Lynch, M., & Wajcman, J. (2008). The handbook of science and technology studies. Cambridge, MA: MIT Press.Google Scholar
Hacking, I. (1990). The taming of chance. Cambridge: Cambridge University PressGoogle Scholar
Haden, J. (2013). Inside a completely transparent company. Last accessed September 18, 2018. www.inc.com/jeff-haden/inside-buffer-company-complete-transparency.html.Google Scholar
Halpern, O. (2014). Beautiful data: A history of vision and reason since 1945. Cheltenham: Edward Elgar.Google Scholar
Hansen, H. K., Christensen, L. T., & Flyverbom, M. (2015). Introduction to special issue. Logics of transparency in late modernity: Paradoxes, mediation and governance. European Journal of Social Theory, 18(2), 117131.Google Scholar
Hansen, H. K., & Flyverbom, M. (2015). The politics of transparency and the calibration of knowledge. Organization, 22(6), 872889.Google Scholar
Hansen, H. K., & Weiskopf, R. (2019). The interplay of transparency matrices. The example of the Chinese Social Credit System, manuscript presented at EGOS conference, Edinburgh.Google Scholar
Hasselbalch, G., & Tranberg, P. (2016). Data ethics: The new competitive advantage. Copenhagen: Publishare.Google Scholar
Hatton, C. (2015). China ‘social credit’: Beijing sets up huge system. Last accessed October 5, 2018. www.bbc.com/news/world-asia-china-34592186.Google Scholar
Haugaard, M. (2010). Power: A “family resemblance” concept. European Journal of Cultural Studies, 13(4), 419438.Google Scholar
Heald, D. (2006). Varieties of transparency. In Hood, & Heald, (Eds.), Transparency: The key to better governance (pp. 2546). Oxford: Oxford University Press.Google Scholar
Heemsbergen, L. (2016). From radical transparency to radical discourse: Reconfiguring (in)voluntary transparency through the management of visibilities. International Journal of Communication, 10(1), 138151.Google Scholar
Helberger, N. (2016). Facebook: A new kind of social editor. Last accessed September 18, 2018. http://blogs.lse.ac.uk/mediapolicyproject/2016/09/15/facebook-is-a-new-breed-of-editor-a-social-editor/.Google Scholar
Hern, A. (2014). World’s most delayed software released after 54 years of development. Last accessed September 18, 2018. www.theguardian.com/technology/2014/jun/06/vapourware-software-54-years-xanadu-ted-nelson-chapman.Google Scholar
Hicken, M. (2013). Data brokers selling lists of rape victims, AIDS patients. Last accessed September 18, 2018. https://money.cnn.com/2013/12/18/pf/data-broker-lists/.Google Scholar
Higgins, V., & Larner, W. (2010). Calculating the social: Standards and the reconfiguration of governing. Basingstoke: Palgrave Macmillan.Google Scholar
Hill, K. (2012). Max Schrems: The Austrian thorn in Facebook’s side. Last accessed September 7, 2018. www.forbes.com/sites/kashmirhill/2012/02/07/the-austrian-thorn-in-facebooks-side/.Google Scholar
Hilts, A., Parsons, C., & Knockel, J. (2016). Every step you fake: A comparative analysis of fitness tracker privacy and security. Open effect report (2016). Last accessed September 28, 2018. https://openeffect.ca/reports/Every_Step_You_Fake.pdf.Google Scholar
Hofmann, J., Katzenbach, C., & Gollatz, K. (2016). Between coordination and regulation: Finding the governance in Internet governance. New Media & Society, 9(19), 14061423.Google Scholar
Hong, S., & Allard-Huver, F. (2016). Governing governments: Discursive contestations of governmentality in the transparency dispositive. In McIlvenny, P., Zhukova Klausen, J., & Lindegaard, L. B. (Eds.), Studies of discourse and governmentality. New perspectives and methods (pp. 149178). Amsterdam: John Benjamins Publishing Company.Google Scholar
Hood, C. & Heald, D., eds. (2006). Transparency: The key to better governance? Oxford: Oxford University Press.Google Scholar
Hosanager, K. (2016). Blame the echo chamber on Facebook. But blame yourself too. WIRED. Last accessed September 7, 2018. www.wired.com/2016/11/facebook-echo-chamber/.Google Scholar
Isin, E., & Ruppert, E. (2015). Being digital citizens. London: Rowman and Littlefield.Google Scholar
Javis, J. (2009). What would Google do? Reverse-engineering the fastest growing company in the history of the world. New York: HarperCollins.Google Scholar
Jeffrey, J. (2008). Networking futures: The movements against corporate globalization. Durham: Duke University Press.Google Scholar
Kallinikos, J. (2013). The allure of big data. Mercury Magazine, 40–43.Google Scholar
Kirkpatrick, D. (2010). The Facebook effect: The inside story of the company that is connecting the world. New York: Simon & Schuster.Google Scholar
Knorr-Cetina, K. (1999). Epistemic cultures: How the sciences make knowledge. Cambridge, MA: Harvard University Press.Google Scholar
Kurzweil, R. (2006). The singularity is near: When humans transcend biology. London: Penguin Books.Google Scholar
Lanier, J. (2014). Who owns the future? New York: Simon & Schuster.Google Scholar
LaShel, S. (2012). Hate speech in Cyberspace: Bitterness without boundaries. Notre Dame Journal of Law, Ethics & Public Policy, 25(1), 279304.Google Scholar
Latour, B. (1986). The powers of association. In Law, J. (Ed.), Power, action and belief: A new sociology of knowledge (pp. 264280). London: Routledge and Kegan Paul.Google Scholar
Latour, B. (1988). Science in action: How to follow scientists and engineers through society. Cambridge, MA: Harvard University Press.Google Scholar
Latour, B. (2005). Reassembling the social: An introduction to actor-network theory. Oxford: Oxford University Press.Google Scholar
Law, J. (1984). On the methods of long-distance control: Vessels, navigation and the Portuguese route to India. Sociological Review, 32(1), 234263.Google Scholar
Lee, K. (2014). The advantages and workflows of fully transparent emails. Last accessed September 18, 2018. https://open.buffer.com/buffer-transparent-email/.Google Scholar
Leonardi, P. (2011). When flexible routines meet flexible technologies: Affordance, constraint and the imbrication of human and material agencies. Management Information Systems Quarterly, 35(1), 147167.Google Scholar
Levy, S. (2011). In the plex: How Google thinks, works, and shapes our lives. New York: Simon & Schuster.Google Scholar
Lippmann, W. (1922). Public opinion. New York: Macmillan.Google Scholar
Lister, M. (2018). Facebook ad-targeting options. Last accessed September 13, 2018. www.wordstream.com/blog/ws/2016/06/27/facebook-ad-targeting-options-infographic.Google Scholar
Lyon, D. (2006). Theorizing surveillance: The panopticon and beyond. Devon: Willan Publishing.Google Scholar
Lyon, D. (2015). Surveillance after Snowden. Cambridge: Polity Press.Google Scholar
Madsen, A. K., Flyverbom, M., Hilbert, M., & Ruppert, E. (2016). Big data: Issues for an international political sociology of data practices. International Political Sociology, 10, 275296.Google Scholar
Majone, G. (1997). The new European agencies: Regulation by information. European Public Policy, 4(2), 262275.Google Scholar
Mann, S., Nolan, J., & Wellman, B. (2003). Sousveillance: Inventing and using wearable computing devices. Surveillance & Society, 1(3), 331355.Google Scholar
Mansell, R. (2017). Our digitally mediated society. In Büllesbach, D., Cillero, M., & Stolz, L. (Eds.), Shifting baselines of Europe: New perspectives beyond neoliberalism and nationalism (pp. 120130). Bielefeld: Transcript Verlag.Google Scholar
Marvin, C. (1988). When old technologies were new: Thinking about electric communication in the late 19th Century. Oxford: Oxford University Press.Google Scholar
Marwick, A. E., & Boyd, D. (2011). To see and been seen: Celebrity practice on Twitter. Convergence, 17(2), 139158.Google Scholar
Marx, G. (1988). The new surveillance. In Undercover: Police surveillance in America (pp. 206233). Berkeley: University of California Press.Google Scholar
Maurer, B. (2015). How money evolved from shells and coins to apps and bitcoin. Last accessed September 7, 2018. https://aeon.co/essays/how-money-evolved-from-shells-and-coins-to-apps-and-bitcoin.Google Scholar
Mayer-Schönberger, V. (2009). Delete: The virtue of forgetting in the digital age. Princeton: Princeton University Press.Google Scholar
Mayer-Schönberger, V., & Cukier, K. (2014). Big data: A revolution that will transform how we live, work and think. New York: Eamon Dolan.Google Scholar
McKenna, K. Y. A. (2009). Through the Internet looking glass: Expressing and validating the true self. In Joinson, A. N., McKenna, K. Y. A., Postmes, T., & Reips, U.-D. (Eds.), Oxford handbook of Internet psychology (pp. 205222). Oxford: Oxford University Press.Google Scholar
Mehrpouya, A., & Djelic, M.-L. (2014). Transparency: From enlightenment to Neoliberalism or when a norm of liberation becomes a tool of governing (No. ACC-2014–1059).Google Scholar
Meikle, G. (2016). Social Media: Communication, Sharing and Visibility. London: Routledge.Google Scholar
Moix, Y. (2010). Wikileaks: La transparence est toujours fasciste [Wikileaks: Transparency is always fascist]. Last accessed September 13, 2018. https://laregledujeu.org/2010/12/10/3872/wikileaks-la-transparence-est-toujours-fasciste/.Google Scholar
Moore, A. (2017). Intellectual property and information control: Philosophic foundations and contemporary issues. New York: Taylor & Francis.Google Scholar
Morozov, E. (2014). To save everything, click here: The folly of technological solutionism. New York: PublicAffairs.Google Scholar
Mueller, M. (2010). Networks and states: The global politics of internet governance. Cambridge, MA: MIT Press.Google Scholar
Mueller, M. L. (2004). Ruling the root: Internet governance and the taming of cyberspace. Cambridge, MA: MIT Press.Google Scholar
Mumby, D. K. (2013). Organizational communication: A critical approach. Thousand Oaks: Sage.Google Scholar
Neher, W. W. (1997). Organizational communication: Challenges of change, diversity and continuity. Boston: Allyn and Bacon.Google Scholar
Newell, B. (2017). Collateral visibility: A socio-legal study of police body camera adoption, privacy, and public disclosure in Washington State. Indiana Law Journal, 92(4), 13291399.Google Scholar
Neyland, D. (2007). Achieving transparency: The visible, invisible and divisible in academic accountability networks. Organization, 14(4), 499516.Google Scholar
Obama, B. (2009). Open government initiative. Last accessed October 5, 2018. https://obamawhitehouse.archives.gov/open.Google Scholar
O’Neill, O. (2006). Transparency and the ethics of communication. In Hood, C. & Heald, D. (Eds.), Transparency: The key to better governance? (pp. 7590). Oxford: Oxford University Press.Google Scholar
O’Neil, C. (2016). Weapons of math destruction: How big data increases inequality and threatens democracy. New York: Crown Publishing Group.Google Scholar
Open government initiative: Transparency, participation, collaboration. (2013). Last accessed September 13, 2018. https://obamawhitehouse.archives.gov/open.Google Scholar
Orlikowski, W., & Scott, S. V. (2008). Sociomateriality: Challenging the separation of technology, work and organization. Academy of Management Annals, 2(1), 433474.Google Scholar
Otter, C. (2008). The Victorian eye: A political history of light and vision in Britain, 1800–1910. Chicago: University of Chicago Press.Google Scholar
Pariser, E. (2011). The filter bubble: What the Internet is hiding from you. New York: Penguin Press.Google Scholar
Parsons, C. (2017). The (in)effectiveness of voluntarily produced transparency reports. Business & Society. https://doi.org/DOI: 10.1177/0007650317717957.Google Scholar
Pasquale, F. (2015). The black box society: The secret algorithms that control money and information. Cambridge, MA: Harvard University Press.Google Scholar
Peters, J. D. (2015). The marvelous clouds: Toward a philosophy of elemental media. Chicago: University of Chicago Press.Google Scholar
Power, M. (1997). The audit society: Rituals of verification. Oxford: Oxford University Press.Google Scholar
Proposal for a Regulation of the European Parliament and of the Council on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data (General Data Protection Regulation). (2012). Last accessed September 7, 2018. https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:52012PC0011&from=EN.Google Scholar
Qualman, E. (2014). What happens in Vegas, stays on YouTube. Cambridge, MA: Equalman Studios.Google Scholar
Ravasi, D., & Schultz, M. (2006). Responding to organizational identity threats: Exploring the role of organizational culture. Academy of Management Journal, 49(3), 433458.Google Scholar
Rawlins, B. (2009). Give the emperor a mirror: Toward developing a stakeholder measurement of organizational transparency. Journal of Public Relations Research, 21, 7199.Google Scholar
Ready, J., & Young, J. (2014). Three myths about police body cams. Last accessed September 7, 2018. www.slate.com/articles/technology/future_tense/2014/09/ferguson_body_cams_myths_about_police_body_worn_recorders.html.Google Scholar
Rheingold, H. (1993). The virtual community: Homesteading on the electronic frontier. Reading: Addison Wesley.Google Scholar
Ricœur, P. (1990). Time and narrative. Chicago, IL: University of Chicago PressGoogle Scholar
Rindova, V. P., Pollock, T. G., & Hayward, L. A. (2006). Celebrity firms: The social construction of market popularity. Academy of Management Review, 31(1), 5071.Google Scholar
Ringel, L. (2018). Unpacking the transparency-secrecy nexus: Frontstage and backstage behaviour in a political party. Organization Studies. https://doi.org/10.1177/0170840618759817.Google Scholar
Roberts, J. (2009). No one is perfect: The limits of transparency and an ethic for “intelligent” accountability. Accounting, Organizations and Society, 34(8), 957970.Google Scholar
Roberts, S. T. (2016). Commercial content moderation: Digital laborers’ dirty work. In Noble, S. U. & Tynes, B. M. (Eds.), The intersectional Internet: Race, sex, Class and Culture Online (pp. 147160). Bern: Peter Lang.Google Scholar
Rogers, E. (1983). Diffusion of innovation. New York: Free Press.Google Scholar
Rubio, F. D., & Baert, P., eds. (2012). The politics of knowledge. London: Routledge.Google Scholar
Ruppert, E. (2011). Population objects: Interpassive subjects. Sociology, 45(2), 218233.Google Scholar
Russell, S., & Norvig, P. (2010). Artificial intelligence: A modern approach. Upper Saddle River, NJ: Pearson Education.Google Scholar
Sahlin-Andersson, K. (1996). Imitating by editing success: The construction of organizational fields. In Czarniawska, B. & Sevon, G. (Eds.), Translating organizational change (pp. 6992). Berlin: de Gruyter.Google Scholar
Schein, E. (1992). Organizational culture and leadership: A dynamic view. San Francisco, CA: Jossey-Bass.Google Scholar
Schnackenberg, A., & Tomlinson, E. (2014). Organizational transparency: A new perspective on managing trust in organization-stakeholder relationships. Journal of Management, 42(7), 17841810.Google Scholar
Schudson, M. (2015). The rise of the right to know: Politics and the culture of transparency, 1945–1975. Cambridge, MA: Harvard University Press.Google Scholar
Scott, C. R. (2013). Anonymous agencies, backstreet businesses, and covert collectives: Rethinking organizations in the 21st century. Stanford: Stanford University Press.Google Scholar
Scott, J. C. (1998). Seeing like a state: How certain schemes to improve the human condition have failed. New Haven: Yale University Press.Google Scholar
Shapiro, G. (2013). Archaeologies of vision: Foucault and Nietzsche on seeing and saying. Chicago: University of Chicago Press.Google Scholar
Seiter, C. (2014). 19 Improvements the buffer team is working on this week. Last accessed September 8, 2017. https://open.buffer.com/buffer-team-improvements/.Google Scholar
Sifry, M. (2011). WikiLeaks and the age of transparency. New York: OR Books.Google Scholar
Singh, J. P., & Flyverbom, M. (2016). Representing participation in ICT4D projects. Telecommunications Policy, 40(7), 692703.Google Scholar
Stohl, C., & Stohl, M. (2011). Secret agencies: The communicative constitution of a clandestine organization. Organization Studies, 32(9), 11971215.Google Scholar
Stohl, C., Stohl, M., & Leonardi, P. (2016). Managing opacity: Information visibility and the paradox of transparency in the digital age. International Journal of Communication, 10, 123137.Google Scholar
Striphas, T. (2015). Algorithmic culture. European Journal of Cultural Studies, 18(4–5), 395412.Google Scholar
Studer, Q. (2009). Straight a leadership: Alignment, action, accountability. Gulf Breeze, FL: Fire Starter.Google Scholar
Taplin, J. (2017). Move fast and break things: How Facebook, Google, and Amazon cornered culture and undermined democracy. Boston: Little, Brown and Co.Google Scholar
Tapscott, D., & Ticoll, D. (2003). The naked corporation: How the age of transparency will revolutionize business. New York: Free Press.Google Scholar
Thiel, P. (2014). Competition is for losers. Last accessed March 7, 2019. www.wsj.com/articles/peter-thiel-competition-is-for-losers-1410535536.Google Scholar
Thompson, J. B. (2005). The new visibility. Theory, Culture & Society, 22(6), 3151.Google Scholar
Thompson, N., & Vogelstein, F. (2018). Inside the two years that shook Facebook – and the world. WIRED. Last accessed September 8, 2018. www.wired.com/story/inside-facebook-mark-zuckerberg-2-years-of-hell/.Google Scholar
Thornborrow, T., & Brown, A. (2009). “Being regimented”: Aspiration, discipline and identity work in the British parachute regiment. Organization Studies, 30(4), 355376.Google Scholar
Toonders, J. (2014). Data is the new oil of the digital economy. WIRED. www.wired.com/insights/2014/07/data-new-oil-digital-economy/.Google Scholar
Tranberg, P., & Hasselbach, G. (2016). Data Ethics: The New Competitive Advantage. Copenhagen: PubliShare.Google Scholar
Treem, J. W., & Leonardi, P. M. (2013). Social media use in organizations: Exploring the affordances of visibility, editability, persistence, and association. Annals of the International Communication Association, 36(1), 143189.Google Scholar
Tsoukas, H. (1997). The tyranny of light: The temptations and paradoxes of the information society. Futures, 29, 827843.CrossRefGoogle Scholar
Turner, F. (2009). Burning man at Google: A cultural infrastructure for new media production. New Media & Society, 11(1–2), 7394.Google Scholar
Turner, F. (2014). The world outside and the pictures in our networks. In Gillespie, T., Boczkowski, P. J., & Foot, K. A. (Eds.), Media technologies: Essays on communication, materiality, and society (pp. 251260). Cambridge, MA: MIT Press.Google Scholar
Vaidhyanathan, S. (2011). The Googlization of everything: (And why we should worry). Berkeley: University of California Press.Google Scholar
van Dijck, J. (2013). “You have one identity”: Performing the self on Facebook and LinkedIn. Media, Culture & Society, 35(2), 199215.Google Scholar
Vanian, J. (2016). Why data is the new oil. Last accessed March 7, 2019. http://fortune.com/2016/07/11/data-oil-brainstorm-tech/.Google Scholar
Walters, W. (2012). Governmentality: Critical encounters. London: Routledge.Google Scholar
Weick, K. E., & Browning, L. D. (1986). Argument and narration in oranizational communication. Journal of Management, 12(2), 243259.Google Scholar
West, S. M. (2017). Data capitalism: Redefining the logics of surveillance and privacy. Business & Society. https://doi.org/10.1177/0007650317718185.Google Scholar
Whitten, A. (2010). Testimony of Dr. Alma Whitten, privacy engineering lead at Google Inc. Hearing on consumer online privacy. Last accessed September 28, 2018. https://static.googleusercontent.com/media/www.google.com/da//googleblogs/pdfs/google_testimony_alma_whitten.pdf.Google Scholar
Widrich, L. (2017). Introducing the Public Buffer Revenue Dashboard: Our real-time numbers for monthly revenue, paying customers and more. Last accessed October 5, 2018. https://open.buffer.com/buffer-public-revenue-dashboard.Google Scholar
Widrich, L. (2018). Why we have paid, paid vacation and give teammates an extra $1,000 to take time off. Last accessed October 5, 2018. https://open.buffer.com/unlimited-paid-vacation/Google Scholar
Zuboff, S. (1985). Automate/informate: The two faces of intelligent technology. Organizational Dynamics, 14(2), 518.Google Scholar
Zuboff, S. (1988). In the age of smart machine: The future of work and power. Oxford: Heinemann.Google Scholar
Zuboff, S. (2015). Big other: Surveillance capitalism and the prospects of an information civilization. Journal of Information, 30, 7589.Google Scholar
Zuboff, S. (2019). The age of surveillance capitalism: The fight for the future at the new frontier of power. London: Profile Books.Google Scholar
Zuckerberg, M. (2018). Facebook content policy guidelines. Last accessed September 13, 2018. www.recode.net/2018/3/22/17150772/mark-zuckerberg-facebook-content-policy-guidelines-hate-free-speech.Google Scholar
Zyglidopoulos, S., & Fleming, P. (2011). Corporate accountability and the politics of visibility in “late modernity.” Organization, 18(5), 691706.Google Scholar
Yegge, S. (2011). Stevey’s Google platforms rant. Last accessed October 5, 2018. https://plus.google.com/+RipRowan/posts/eVeouesvaVX).Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Bibliography
  • Mikkel Flyverbom, Copenhagen Business School
  • Book: The Digital Prism
  • Online publication: 27 September 2019
  • Chapter DOI: https://doi.org/10.1017/9781316442692.008
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Bibliography
  • Mikkel Flyverbom, Copenhagen Business School
  • Book: The Digital Prism
  • Online publication: 27 September 2019
  • Chapter DOI: https://doi.org/10.1017/9781316442692.008
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Bibliography
  • Mikkel Flyverbom, Copenhagen Business School
  • Book: The Digital Prism
  • Online publication: 27 September 2019
  • Chapter DOI: https://doi.org/10.1017/9781316442692.008
Available formats
×