28.12.2013 Views

Theories of the Information Society, Third Edition - Cryptome

Theories of the Information Society, Third Edition - Cryptome

Theories of the Information Society, Third Edition - Cryptome

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

INFORMATION, REFLEXIVITY AND SURVEILLANCE<br />

1<br />

1<br />

1<br />

2<br />

1<br />

1<br />

networks that are readily seen in most towns, and by replacing much self and<br />

neighbourly provision with purchasable goods and services.<br />

One major consequence <strong>of</strong> <strong>the</strong>se trends, which amount to what has been<br />

called <strong>the</strong> ‘incorporation <strong>of</strong> society’ (Trachtenberg, 1982), is that <strong>the</strong>y pose challenges<br />

for managers which, in order to be met effectively, rely upon sound<br />

intelligence being ga<strong>the</strong>red. In short, surveillance <strong>of</strong> much more than <strong>the</strong> shop<br />

floor is nowadays a requirement <strong>of</strong> effective corporate activity. There are many<br />

dimensions <strong>of</strong> this, ranging from monitoring <strong>of</strong> currency fluctuations to political<br />

circumstances in host nations, but here I would centre on <strong>the</strong> development <strong>of</strong><br />

surveillance <strong>of</strong> customers.<br />

The expansion <strong>of</strong> market research, both within and without corporations, is<br />

an index <strong>of</strong> management’s need to know its clientele. Its methods <strong>of</strong> accessing<br />

<strong>the</strong> public are variable, including survey and interview materials, commissioned<br />

public opinion trawls and careful pre-testing <strong>of</strong> goods prior to launch and, indeed,<br />

during <strong>the</strong>ir design and development; <strong>the</strong>y are becoming increasingly sophisticated<br />

as market researchers endeavour to find out more about <strong>the</strong> ‘lifestyles’ <strong>of</strong><br />

potential and actual customers (Martin, 1992). Wal-Mart, for instance, ‘amasses<br />

more data about <strong>the</strong> products it sells and its shoppers’ buying habits than anyone<br />

else’, checking some 100 million customers each week in ways that provide<br />

‘access to information about a broad slice <strong>of</strong> America’ (Hays, 2004). This information<br />

extends from social security and drivers’ licence numbers to aggregated<br />

data about shopping habits (that can be extraordinarily revealing about personal<br />

and intimate life). This contributes towards Wal-Mart being enormously successful<br />

as a retailer, but it also creates huge databases on who buys what, where,<br />

when and how <strong>of</strong>ten.<br />

A close cousin <strong>of</strong> such surveillance is credit-checking agencies which, as well<br />

as enquiring about <strong>the</strong> financial standing <strong>of</strong> customers, <strong>of</strong>ten generate address<br />

lists <strong>of</strong> possible buyers for <strong>the</strong>ir corporate clients. The area within which <strong>the</strong>y<br />

operate is somewhat clouded, but most readers will have received unsolicited<br />

post from companies which have bought <strong>the</strong>ir addresses from ano<strong>the</strong>r organisation.<br />

The reasoning is simple: if a golf club has a membership list, <strong>the</strong>n this<br />

information is very useful to corporations which, say, specialise in golfing holidays<br />

or, more broadly, in sports clothing. Purchase <strong>of</strong> <strong>the</strong> database is a cheap<br />

way <strong>of</strong> gaining access to previously monitored people.<br />

It is important to take cognisance <strong>of</strong> <strong>the</strong> heightening <strong>of</strong> this surveillance that<br />

has accompanied <strong>the</strong> spread <strong>of</strong> versatile electronic technologies. David Burnham<br />

(1983) alerted us to <strong>the</strong> phenomenon <strong>of</strong> ‘transactional information’ years ago, and<br />

it is one with special pertinence for contemporary surveillance. This is a ‘category<br />

<strong>of</strong> information that automatically documents <strong>the</strong> daily lives <strong>of</strong> almost every<br />

person’ (p. 51) as <strong>the</strong>y pick up <strong>the</strong> phone, cash a cheque, use a credit card, buy<br />

some groceries, hire a car or even switch on a cable television set. Transactional<br />

information is that which is recorded routinely in <strong>the</strong> course <strong>of</strong> everyday activities.<br />

It is constructed with scarcely a thought (and frequently automatically,<br />

at <strong>the</strong> flick <strong>of</strong> a switch, or <strong>the</strong> dialling <strong>of</strong> a telephone number). However, when<br />

this ordinary, everyday information comes to be aggregated, it gives corporations<br />

quite detailed pictures <strong>of</strong> clients’ lifestyles – e.g. who, when and for how<br />

225

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!