(Routledge Studies in Science, Technology and Society) Irma Van Der Ploeg, Jason Pridmore (Eds.) - Digitizing Identities - Doing Identity in A Networked World-Routledge (2015)
(Routledge Studies in Science, Technology and Society) Irma Van Der Ploeg, Jason Pridmore (Eds.) - Digitizing Identities - Doing Identity in A Networked World-Routledge (2015)
Digitizing Identities
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
material, and of the authors for their individual chapters, has been asserted
in accordance with sections 77 and 78 of the Copyright, Designs and
Patents Act 1988.
All rights reserved. No part of this book may be reprinted or reproduced or
utilized in any form or by any electronic, mechanical, or other means, now
known or hereafter invented, including photocopying and recording, or in
any information storage or retrieval system, without permission in writing
from the publishers.
Trademark Notice: Product or corporate names may be trademarks or
registered trademarks, and are used only for identification and explanation
without intent to infringe.
Library of Congress Cataloging-in-Publication Data
Names: Ploeg, Irma van der editor. | Pridmore, Jason, editor.
Title: Digitizing identities : doing identity in a networked world / edited
by Irma van der Ploeg and Jason Pridmore.
Description: New York : Routledge, 2016. | Series: Routledge studies in
science, technology and society ; 30 | Includes bibliographical
references and index.
Identifiers: LCCN 2015035987
Subjects: LCSH: Online identities. | Identity (Psychology) | Information
technology—Social aspects. | Identification.
Classification: LCC HM851.D5485 2016 | DDC 303.48/33—dc23
LC record available at http://lccn.loc.gov/2015035987
ISBN: 978-1-138-79463-4 (hbk)
ISBN: 978-1-315-75640-0 (ebk)
Typeset in Sabon
by Apex CoVantage, LLC
Contents
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
List of Figures ix
List of Table xi
Acknowledgements xiii
PART I
Sharing and Connecting: Friends and Consumers
PART II
Growing Up: Children and Guardians
PART III
(Mis)Behaving: Suspects and Deviants
PART IV
On the Move: Migrants and Travellers
Contributors 283
Index 289
Figures
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
Table
This book results from several years of pleasant and fruitful cooperation
among many people. At its origin lies the work we conducted within the
DigIDeas project team, consisting of Vlad Niculescu-Dinca, Karolina La
Fors-Owczynik, Isolde Sprenkels, Jason Pridmore, and Irma van der Ploeg.
In addition, two international workshops, one held in Amsterdam in
November 2011 and one in Maastricht in June 2013, provided us with the
invaluable input of many much-appreciated colleagues, some of whose work
is presented in this volume alongside our own.
All this was made possible by a generous Starting Grant provided by the
European Research Council, and by the COST-Action Network Living in
Surveillance Societies, which we gratefully acknowledge.
Irma van der Ploeg
Jason Pridmore
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
DIGITIZATION OF IDENTITY
defined audiences and little awareness of the potential for secondary use,
surveillance, and other adverse consequences to them. This too qualifies as
construction of digital identities, in the sense that it often involves a careful
and conscious effort to experiment with and shape one’s image to oneself
and others. These technologically enabled new practices have received a lot
of scholarly attention as well, starting with the first seminal studies of still
text-based online social communities like ‘MUDs (multi-user dungeon)’ end
‘MOOs (MUD-object oriented)’ in the 1990s, up to the numerous analyses
of today’s nearly global and ubiquitous online presence of hundreds of mil-
lions of people through platforms such as Facebook, Twitter, Instagram,
Pinterest, LinkedIn, and more.
Posing the question in what ways new information technologies and digi-
tal media mediate and transform identities in the information society, this
book connects with the fact that ‘identity’ is also a key concept in contem-
porary social theory and in contemporary conceptualisations of the relation
between technology and society, ethics, and normativity. Thus, a field of
enquiry emerges at the crossroads of theoretical, technological, and societal
developments, representing opportunities for frontier research.
THEORIZING IDENTITY
Clearly, the phenomena we are describing here have taken on such enor-
mous proportions that they sometimes appear to be defining of our time
and age. Moreover, they seem to affect not only how, where, and when we
establish to others who we are but also how we think about ourselves and
others, how we know ourselves and others know us, how we form and sus-
tain relationships of various kinds, and how we act and enact our plans and
projects. In other words, this wide-ranging digitization touches upon our
very identities in numerous ways.
But which theoretical resources do we need to make sense of it all? Are
we really talking about one phenomenon here, or are there significant dif-
ferences that the much-, if not over-used term ‘identity’ fails to differentiate
sufficiently? What do we mean when we talk about identities and identifica-
tion anyway?
In addition to the public ethical, legal, and political concerns about digital
identification, academic interest from the social sciences and humanities has
4 Irma van der Ploeg and Jason Pridmore
been triggered by the sudden prominence of ‘identity’ in our highly tech-
nologized society as well. Of course, within these scholarly traditions, ‘iden-
tity’ has been a recurring, much-theorized theme predating the ‘information
revolution’ and our current mobile communication-technology-saturated
everyday-life by decades. Psychologists, social theorists and philosophers
have been working on the question what constitutes identity, how it comes
about, and why it matters for a long time and in many different ways.
Much commented upon already is the wide range of angles, disciplines,
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
and traditions that over many years have been brought to bear on under-
standing identity. Unsurprisingly, this now vast literature yielded not one but
a range of more and less diverging concepts of ‘identity.’ During the late 20th
century, for instance, it became central to various strands of social theory,
including post-colonial, feminist, and queer theory, where it got deeply con-
nected with social politics. Next to these strands of social theory, it figures
as a key term in psychology in various ways, including psychoanalysis and
social and developmental psychology. Philosophers, in their attempts to
bring more analytical clarity to the concept, have, paradoxically, contrib-
uted to the proliferation of different understandings of ‘identity’ as well.
All this yields a vast range of different accounts of what ‘identity’ consists
of, how it comes about and is known, and where and to whom it matters.
Over the past decade, the coming together of the digitization of society and
the prominence of issues of identity has opened up a new space for research
on ‘digital identities’ in all the fields mentioned, giving rise to a surge of new,
often interdisciplinary scholarship that builds on these older traditions in
various ways.
We will refrain from attempting to provide a complete overview of the
many approaches to ‘identity’ one finds here but, instead, briefly explain
the ones that played a key role in the research that led to this book. We will
thus briefly explain what ‘identity’ looks like from the respective ‘schools of
thought’ associated with identity management discourse, sociology, surveil-
lance studies, and science and technology studies. But before that, and in
order to better be able to characterize these different takes on identity, we
will highlight three key distinctions we found helpful in understanding these
various approaches and the differences among them.
THREE DISTINCTIONS
Overall, there are three key distinctions that account for many of the differ-
ences one finds among the various notions of ‘identity.’
The first is the distinction between ‘identity’ in a narrow sense and a
broader understanding of it; thus in many contexts, ‘identity’ simply refers to
someone’s name and a few other attributes such as age, gender, and nation-
ality. Knowing someone’s identity can then be achieved by simply taking a
look at that person’s passport, for example. This is the concept of identity
Introduction: Digitizing Identities 5
one finds in law enforcement practices and national ID-card schemes, for
example. In contrast to this stand a notion of identity that encompasses a
much wider range of other elements, including, for example, one’s tastes
and preferences, one’s belief system, one’s lifestyle, profession or position in
society, one’s life story, up to one’s deepest dreams and desires. Getting to
know a person’s identity in this sense involves a lot more then mere checking
of identity papers; in fact, there is hardly a limit to what can be considered
relevant to this notion of identity.
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
nologies have been and are involved in these, ‘identity’ and ‘identification’
often are prominently there, whether one likes it or not.
In this volume, we have gathered a series of contributions that approach
the topic of digital identities in a number of different ways. Within this
diversity, and broadly speaking, four key discursive practices can be found
as informing the notion of identity in each of these; in what follows we will
briefly characterize these.
IDENTITY MANAGEMENT
SOCIOLOGICAL THEORY
Sociological theory has long been concerned with the production of identity,
albeit alternatively discussed as the production of ‘selves’ or ‘subjectivities.’
This is, as indicated in our second distinction, largely done in relation to how
personal identity is understood in relation to the attribution of identity by
others. For instance, Charles Horton Cooley (1902) articulated the ‘looking-
glass self’ as an internalization of others’ perspectives—or at least the per-
sonal interpretation of what those perspectives might be. This was further
reflected in later symbolic interactionist thought, most notably of George
Herbert Mead (1932) and Herbert Blumer (1969), who saw identity—again,
in their case, a notion of self-understanding—as largely a reflective process.
Most importantly, their work began to describe how identity could be seen
as part of a process of meaning making that occurs between individual per-
sons and others in the course of day-to-day social life. The reflective pro-
cesses that this is seen to inherently entail was further developed by Anthony
Giddens in his description of ‘late modern’ identities (1991). For Giddens,
identity is produced through a process of continual self-monitoring in light
Introduction: Digitizing Identities 9
of and in contrast with social structures and practices. In his perspective,
identity is a continual process of reflexivity—though we may retain cer-
tain identifying attributes, sociological theory largely reflects the narrative
production of identity through a broad definition connected to life stories,
beliefs, and personal histories.
This highlights the contrasts between self-knowledge and the external
attribution of identity by others; however, each of these perspectives is predi-
cated on the idea that identity is a product of interactions between persons
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
and social groups. Erving Goffman’s work drew inspiration from symbolic
interactionism, but his dramaturgical focus on social contexts was one of the
most prominent early works to discuss how identities are performed (1959).
By using notions such as ‘face’ and an understanding of selves produced
through ‘scenes,’ Goffman’s flexible conceptualization of identity gained sig-
nificant interest as more essentialized notions of identity became less appeal-
ing in light of more complicated social and political dynamics of the 1960s
and 1970s. Of course, concerns about the performativity of identity were
extended into later work as well, most notably that of Judith Butler. Butler’s
understanding of identity is clearly focused on how performance processes
work together to produce an identity (1990). However, in contrast to Goff-
man, there is no sense of inner desires or propensities to act. Butler describes
(gendered) identities as produced over time through repeated performances.
It is an illusion of identity that is produced in a continual acquiescence to
the workings of power.
Butler’s work is in line with and draws on Foucauldian perspectives on
the production of subjectivity. Both Foucault’s understanding of disciplin-
ary power (1979), the focus of his earlier work, and the focus of his later
work on confessionary technologies of the self (1988) indicate that identity
is largely a by-product of the workings of power upon ‘docile bodies’ in the
first instance and self-reaffirming relationships to power through personal
examination in the second.
Though some sociological theory pays attention to materiality—such as
Goffman’s references to ‘props’ and Foucault and Butler’s concerns with
performances on and of the body—in large measure, these descriptions are
primarily discursive in their focus. The focus in this collection on digital
technologies, however, requires an account of both the material and the
discursive. Though some sociological theory points us in this direction, the
incorporation of materiality in understandings of identity and identification
is more explicit and better accounted for in the next theoretical approaches.
SURVEILLANCE STUDIES
studies have tended to emphasise the way in which ICTs are contributing
to phenomena like social sorting, automated discrimination, categorical
suspicion, and panoptic surveillance (Norris and Armstrong, 1999; Lyon,
2003; Monahan, 2006).
The problem of identity is one of the central issues of surveillance studies
for at least two reasons. One is that many surveillance practices come in the
guise of identification practices and technologies, such as described above,
thus putting the notion of identity centre stage empirically. Another is that
a key insight from its Foucauldian discourse-theoretical roots is that sur-
veillance, through its intricate micropolitical power mechanisms, produces
subjectivities and identities.
How these two lines of thought and research are related, however, is not
a straightforward matter at all. The key terms, ‘surveillance’ and ‘identity,;
tend to have different meanings in each, as well as different levels of abstrac-
tion, different relations to contemporary technological developments, dif-
ferent practical articulations, and different socio-political significance. But
they are related in important and complex ways that are rendered even more
opaque by frequent conflations and shifts of meaning in both academic and
general public discourses on ‘surveillance.’
Nonetheless, with its fast-growing body of both theoretically and empiri-
cally rich and robust descriptions, the field of surveillance studies has
become increasingly influential in focusing academic research, policy, and
various publics on the issues, incidents, and inequalities that have arisen
from the proliferation of digital monitoring and registration practices and
technologies.
Vlad Niculescu-Dinca, Irma van der Ploeg, and Tsjalling Swierstra’s chap-
ter then continues this focus on normative issues by looking at technologi-
cal developments and policy transformations in contemporary policing. For
years now, the Dutch police have prioritized the issue of ‘problem youth,’
and this chapter examines how this increasingly has come to involve moni-
toring and ‘mapping’ of youth groups of concern with geographical infor-
mation systems and social media monitoring technologies. The authors
show how these technological practices play a constitutive role in the ways
in which youth groups are performed as ‘problematic’ and even in the defini-
tion of what counts as a ‘group.’ The authors note that in this context, the
police use the notion of ‘crime displacement’ to explain why they see fewer
‘problematic groups’ on the streets while justifying more intensive monitor-
ing and data collection; thus these practices are seen to perform new forms
of ‘suspects’ and ‘suspicious behaviours.’
Shifting away from the issue of problematic youth, Peter Lauritsen exam-
ines new practices involving the use of CCTV and the identification of
criminal perpetrators. Lauritsen looks at the idea that more crimes will be
solved at a low cost because of the cameras as a ‘folk theory’—something
that, although it lacks empirical support, still serves as an engine for future
action. In his chapter, Lauritsen further questions the effectiveness of CCTV
in police work by using the concept of ‘oligopticon’ to interpret the empiri-
cal findings, noting how the surveillance process envisioned by folk theories
of CCTV is always dependent upon limited and fragile networks. What
emerges from this study of CCTV use is that it does not provide a holistic
view of criminal activity or an effective prevention strategy but is rather
about establishing a vision that occasionally may help the police to identify
a suspect.
Each of these chapters looks at how digital technologies are used to
establish particular persons and groups of persons as suspicious and care-
fully analyses the less-than-straightforward way this happens. ‘Zooming in,’
‘crime displacement,’ and ‘folk theories’ are the concepts used to make sense
of these practices and to highlight their normative implications, given their
significance for police interventions and actions.
Finally, Part IV On the Move: Migrants and Travellers focuses on an area
of digital identification dense with global socio-political, legal, and ethi-
cal tension: (international) mobility. For all the many and diverse reasons
people may travel, be it as tourists, refugees, labor migrants, or displaced
16 Irma van der Ploeg and Jason Pridmore
by natural disasters, governments are exerting themselves to keep track of
their movements. The desire to control cross-border mobility, to know who
enters the territory, and to separate the trustworthy from potential threats,
the ones needing protection and help from the ones requiring to be stopped
and apprehended, has engendered elaborate digital identification and moni-
toring infrastructures.
The chapter by Peter Adey and Philip Kirby starts with a special form
of mobility relatively neglected in the scholarly literature so far: evacuees
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
REFERENCES
Part I
INTRODUCTION
Since the early days of the social Internet in the 1990s, scholars have been
concerned with how we perform identity and make sense of ourselves online.
Observing how communication in online settings is always dependent on
some form of symbolic mediation, usually text and images, it appears that
identity needs to be created and “composed”, as Sherry Turkle has put it (see
2002, 101; see also Albrechtslund, 2010). The idea of multiple, fragmented
identities which online personas permit as something useful and liberating,
undermining many traditional ideas about identity, connects to Donna Har-
away’s famous myth of the cyborg as a hybrid identity in a utopian reality
where people are “not afraid of permanently partial identities and contra-
dictory standpoints” (1991, 154).
However, although Turkle argued for the intimate connection between
what we do online and what we do in real life, she still represents a view on
the Internet, especially prevalent in early Internet studies, which separates
virtuality and reality, when writing, for example: “We can use the virtual
to reflect constructively on the real” (2002, 109). This tradition sees pos-
sibilities for expressing and exploring multiple identities in ‘cyberspace’, the
famous term coined by William Gibson in his novel Neuromancer (1984).
Cyberspace as metaphor designates a frontier-like abstract space, removed
from the real, physical world as we know it, an exotic, mythologized space
where users could be free of the limitations of the body, time, geographical
boundaries, and so on (Finnemann, 2005, 11). Such utopian perceptions
of cyberspace have been criticized from several angles as different Internet
researchers have taken a more nuanced view on cyberspace. For example,
Annette Markham has demonstrated an understanding of the many differ-
ent ways people perceive what it is to be online, identifying a continuum of
experiencing cyberspace as a tool to a place to simply a way of being (1998,
87). Following Markham’s distinctions, we might say that today, the Inter-
net has become a way of being, or perhaps even more accurate, the Internet
has become an integrated element in our way of being and cannot be isolated
in the form of ‘cyberspace’.
22 A. Albrechtslund and A.-M. Albrechtslund
Even though communities and social networks are relatively new phe-
nomena in relation to the Internet, there already exists a large volume of
studies about activities, technologies, services, communication, and criti-
cal issues. These Internet studies are diverse in approach, scope, and focus.
However, most studies share an interest in concrete practices of Internet
users. Our current study connects to this interdisciplinary field, as it draws
on qualitative and analytical methods to investigate online social network-
ing practices. Here, we offer an exploratory and interpretive study focusing
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
on the typical activities related to the use of social media. By analysing these
activities in terms of touristic practices, we hope to contribute to the under-
standing and conception of identity performance via online social network-
ing practices.
In this chapter, we explore and analyse online sociality as a touristic prac-
tice to provide a new way of understanding how identity is produced and
performed in a network of diverse and dynamic actors. Online sociality
mainly unfolds within peer-to-peer social networking services, such as
Facebook, Twitter, and Foursquare, as well as Internet communities centred
on common interests, such as online games, music, or sports. There are at
least two reasons for applying this approach. First, a number of similarities
between practicing online sociality and practicing tourism can be readily
identified. These include both technologies such as the camera and practices
such as ‘postings’ (as in Facebook status updates and postcards, respec-
tively). Second, by exploring these similarities further, our ambition is to
emphasize certain dynamics in online social practices which are otherwise
not immediately recognizable. For instance, the tourist engages in a range
of activities (sightseeing, photographing, sending postcards, etc.) which
appear “in some sense unnecessary” but can be seen as part of a meaning-
ful exchange between everyday life and the vacation (Larsen, 2008; Urry
and Larsen, 2011, 1). Correspondingly, the user of social media typically
performs seemingly unnecessary activities (sharing mundane moments, pho-
tos, thoughts, and links) which nonetheless can be interpreted as a catalys-
ing practice producing meaning and identity (A. M. Albrechtslund, 2011).
This approach can help us better understand the popularity of social media
and the easy incorporation of such practices into everyday living in spite of
the many perceived dangers (e.g. privacy invasion, online predators) and
negative consequences (e.g. time waste, corporate exploitation; A. Albrecht-
slund, 2008). As such, our purpose is to situate social media practices and
the performance of digital identity in existing cultural practices by pointing
out similar dynamics.
In the following, we introduce an analytical framework by character-
izing a number of key features of the dynamics of touristic practices, draw-
ing on insights from the academic literature and observations of tourism in
Paris. The complementarity of online sociality and touristic practice then
forms the basis for our key analytical points. Finally, we use these points
to explore the production and performance of identity across different sites
Performing Identity Online 23
of online sociality, and we conclude with a discussion of some of the issues
emerging from the results of our approach.
The study of modern mass tourism includes a wide variety of theories, con-
cepts and empirical focal points, and in this section, we draw especially on
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
The Sight
Surfacing from the Trocadéro underground metro station in Paris’s 16th
arrondissement, the first thing which catches the eye is a colourful kiosk
selling tourist artefacts, pancakes, and ice cream, surrounded by people
with cameras and faces generally turned in one specific direction; it is
actually possible to see the tourist attraction prior to it appearing before
your eyes. After turning left around one wing of the Palais de Chaillot
onto the crowded paved platform, the Eiffel Tower, more than 500 meters
away, appears as a spectacular and overwhelming sight. A closer look
reveals that many of these people are in fact not looking at the tower but
have their backs turned towards it; they are posing in front of a photog-
rapher who is working to include both the person and the tower in an all-
encompassing picture. As one continues towards the attraction down the
stairs and through the Jardins de Trocadéro, passing more tourists and ice
cream stands, the tower grows before the eyes, and it becomes increasingly
difficult to capture it in a single gaze. Finally, the tourists arrive at the foot
of the Eiffel Tower.
The curious thing is that there is no real inside to visit, as Roland Barthes
concludes (1983). In fact, it might be said that the monument is “utterly use-
less” (238), as it does not serve any reasonable purpose other than to attract
tourists. This has been the case since its construction in the 1880s, when
Gustave Eiffel himself found it necessary to defend the contested usefulness
of the tower, including different kinds of scientific research and meteoro-
logical observations. However reasonable these claims are, “they seem quite
ridiculous alongside the overwhelming myth of the Tower, of the human
meaning which it has assumed throughout the world” (239). In other words,
the Eiffel tower and other sights have no useful function such as a road or an
airport, but this does not imply that the tourist sight is meaningless. The dis-
tinction between usefulness and meaning is important, because it anticipates
24 A. Albrechtslund and A.-M. Albrechtslund
the point that the tourist attraction is more than just an object to see; rather,
the sight is a catalyst for a more complex tourist experience.
This corresponds to John Urry’s characterization of modern mass tour-
ism as essentially unnecessary (Urry and Larsen, 2011). Urry compares the
relation between everyday life and tourism with Michel Foucault’s study of
the relation between normality and illness in The Birth of the Clinic (1973),
where studying deviation at the same time provides a perspective on normal-
ity. In a similar way, the study of tourism—where people are separated from
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
The Tourist
When you enter the Rue des Francs Bourgeois in Paris’s Marais district, it
feels like stepping onto a trail towards something. The intimate, quiet atmo-
sphere of the small streets of this neighbourhood are intersected by more
populated stretches connecting to the Place des Vosges, the oldest square in
Performing Identity Online 25
the city, celebrated for its architectural beauty, its famous historic residents
and literary associations, including Alexandre Dumas’s three musketeers.
People yielding cameras and backpacks are immediately recognizable as
tourists, many studying maps and guidebooks. The tourist trail towards the
Place des Vosges is not an official, designated route to the tourist attraction.
However, the crowds seem to follow some invisible road signs that organize
the Marais into sections that are crowded and others almost left alone by
tourists.
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
The Camera
When one steps onto the Pont de la Tournelle towards the Ile Saint-Louis
between the Latin Quarter and the Marais district, a beautiful view of the
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
Notre Dame cathedral appears. This is a spot where especially tourists stop
to take in the view. It seems as if the bridge has dynamic invisible fields into
which tourists and accidental passers-by try to avoid stepping. These fields
are constituted by the line between a photographer and one or more tour-
ists posing in front of the view towards the attraction. Interestingly, such
invisible fields seem to be generally respected as a private space, indicating
that this is an important moment not to be disrupted. The photographer,
the sight, and the poser(s) are all part of a network performing a ritual con-
sisting of three acts. First, the spectacle is composed, poser(s) are arranged,
and the right angle is found. Second, the photo is taken, mostly including
several clicks, and third, the photographer and poser(s) gather to look at
the picture(s) just taken, as if previewing the vacation photo album in the
making. However, when this ritual has been performed, the invisible field
disappears, and everything moves on again.
Modern mass tourism has been characterized as being a visual culture
(Urry and Larsen, 2011, 14). Thus, photography has always been a central
practice in the tourist experience, with the classic Kodak camera as iconic
device (West, 2000). Like any other technology, the tourist camera has
developed significantly through the decades; however, the change to digital
photography in the last few years has arguably been the most important.
At least, the third act of the ritual mentioned above is only made possible
by the viewing display of the digital camera, just as it generally facilitates
a wide range of sharing and distribution opportunities. Accordingly, the
advent of digital photography in tourism has further emphasized the social
aspect of taking pictures, making it a group activity. Interestingly, the recent
explosion in the use of different types of camera phones and smartphones
has apparently not yet eliminated the classic companion of the tourist, the
single-purpose camera around the neck, although the types of devices are
many, ranging from the semi-professional SLR models to the more compact
pocket versions. This choice of technology seems to be reflected in the prac-
tice of photography, as taking tourist pictures does not seem to have the
light, casual air to it as everyday smartphone use.
The tourist experience in all its phases is filled with pictures: studying
guidebooks, brochures and online resources when planning where to go or
researching the chosen destination. At the vacation spot, personalized pic-
tures of tourist attractions and leisure activities are taken. After returning
home to everyday life, the pictures are arranged and displayed in albums
Performing Identity Online 27
(Larsen, 2005, 431). An obvious question to ask might be: Why take pictures
of tourist attractions that have been photographed countless times already
and are perhaps even on the cover of the brochure that launched the idea
of going in the first place? Susan Sontag (1977) argues that photography
is a way of grasping the world: “To photograph is to appropriate the thing
photographed. It means putting oneself into a certain relation to the world
that feels like knowledge—and, therefore, like power” (4). Taking pictures
of the Notre Dame cathedral is therefore rarely about discovering a novel
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
“Tourist photography and everyday life are not separate worlds but
bridges constantly traversed by photographing tourists on the move. It
is a form of photography intricately bound up with performing social
relations and picturing co-travelling ‘significant others’, which also
means that many otherwise ‘ordinary’ places are transformed into dra-
maturgical landscapes” (Larsen, 2008, 431).
The tourist album is the key element in this bridging between vacation
and everyday life, and, today, it comes in a variety of forms. As another
consequence of the change to digital photography, the photo album can be
shared with selected friends, family, or networks where a co-narration can
take place through comments, shares, and ‘likes’ (Facebook). Accordingly,
the social aspect of tourist photography has been brought to the foreground
by the emergence of online social networks.
The Postcard
Arriving at the Funiculaire Gare Haute, the upper station of the little tram
line that helps you get up the many stairs of the Montmartre, the Sacré-
Coeur Basilica appears on your right hand. The imposing church is one of
the major tourist sights in Paris, but, like the Eiffel Tower, it also attracts
tourists because it offers a great panoramic view of the city. After visiting
this site, many tourists pass along one side of the church and then turn left
on the Rue du Chevalier de la Barre, where a noticeable tourist trail towards
the Place du Tertre begins. This surrounding area is densely packed with
28 A. Albrechtslund and A.-M. Albrechtslund
restaurants and shops selling tourist merchandise, collectibles, souvenirs,
and postcards. Most often, the postcards are displayed on stands outside
the shops and are, thus, a very eye-catching part of what tourists experi-
ence walking in these streets. Some stop to browse through these postcards,
which are mostly inexpensive and can be hand picked from the stands or
bought in preselected packages at a discount.
The postcard is not confined to being a phenomenon of mass tourism, as
it has been an important aspect of modern communication needs since the
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
early 20th century (Rogan, 2005, 3). A postcard is a single piece of paper or
thin cardboard meant to be written and mailed without an envelope. How-
ever, the touristic postcard most often features a glossy photograph of a sight
or location at the destination from which the tourist is mailing the card: for
example, at the Place du Tertre many postcards present a photo of the Sacré
Coeur Basilica. Other postcards feature images more symbolically connected
to the destination, for example by alluding to the city’s colourful past with
reproductions of famous Toulouse-Lautrec posters such as ‘Le chat noir.’
Yet another type of postcard can offer more playful motifs, such as a simple
black background with the generic text ‘Paris by night.’ The postcard is thus
obviously a part of the visual culture of mass tourism but is also distinguished
from photos, souvenirs, and so on by its emphasis on written communication.
As a communicative object, the touristic picture postcard is remarkable
for its blending of private and public spheres. It contains a private message
between a sender and a receiver familiar with each other, usually friends
or family, but the open format makes this message potentially readable for
anyone handling the card between the tourist and the recipient—for exam-
ple, mail workers, other household members, and so forth. Moreover, the
recipient conventionally displays the postcard in the home for guests to see
and even sometimes read, emphasizing the semi-public nature of this type of
communication. Like the tourist experience in general, the postcard is essen-
tially unnecessary. The genre does not invite an intimate correspondence
and, therefore, the content is often generic. However, sending a postcard is
a meaningful action for the tourist as well as the recipient by being mailed
from the vacation spot to friends or family, thus connecting the tourist to his
everyday life and maintaining this relation as a communicative performance.
This location-specific mailing of the postcard is what makes it meaningful,
as the act of conveying the message that the tourist is currently vacationing
and having experiences makes the communication phatic in nature (Jakob-
son, Pomorska, and Rudy, 1987; Rogan, 2005).
In the previous section we studied sights, tourists, cameras, and postcards and
found certain characteristics that prevailed throughout these dynamic tour-
istic practices. As Urry (and Larsen, 2011) has noted, tourism is essentially
Performing Identity Online 29
unnecessary but maintains a complicated and meaningful relationship with
the ‘real’ life of the everyday (1). In this sense, the tourist vacation is not
so much seen as an escape from reality or from what really matters but as
something which is distinguished from but also created by everyday life. The
tourist sight is rarely in itself a meaningful object but rather has a catalysing
function similar to the ‘MacGuffin,’ a narrative plot device used especially
in thrillers and whodunits (Truffaut, Hitchcock, and Scott 1985, 138). In
such stories, this is usually an object desired and pursued by the protagonist;
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
however, the reason for its desirability is rarely explained in detail,1 but it
remains an obligatory object motivating the moving forward of the plot.
Like the Eiffel Tower in Barthes’s analysis, the tourist sight is often in itself a
‘useless’ monument, but it plays a central role as a catalyser for the ‘dream’
in which the tourist wants to participate, that is, the modern mythology or
popular story of Paris as the city of romance, art, and good living.
Just as the film spectator may be aware of the emptiness of the MacGuffin
while still enjoying the thrill of the plot, the tourist often displays a quite
self-conscious and sometimes even playful attitude towards sightseeing and
the sight itself. At the same time, the tourist makes sure to uphold the acts of
the touristic ritual, that is, taking pictures, lingering, and gazing at the view.
Indeed, the photographing activities at the tourist site are rarely connected
to aesthetic ambitions but are part of this catalysing process. Tourist pho-
tography, for instance, can function as a way of reaffirming significant social
relations, both in the act of taking pictures of each other at the destination
and of sharing them after having returned home (Larsen, 2005).
Another characteristic feature of touristic practices is that they serve as
bridging mechanisms between seemingly distinct spheres. The photo album
links the vacation experience with the context of everyday life by being
a medium both for own reminiscence and for communicating the experi-
ence to others. The photo album is thus not only an example of tourism as
constituting a primarily visual culture, it also highlights the social nature of
most touristic practices. Further, the bridging mechanism can also produce
a blending of public and private, as the semi-public nature of the postcard
illustrates. When tourists appropriate attractions by taking personalized pic-
tures, this practice is an example of something public becoming private by
the creation of ‘invisible fields’ between poser and photographer which are
respected as tiny private spheres in an otherwise very public space. These
photos are again made semi-public when the photo album communicates
the private experience to a broader audience through sharing with family,
friends, or a network.
These two mechanisms, catalysing and bridging, are not simply acciden-
tal side effects of tourism but are central to the dynamics of the touristic
practices we have studied and their production of meaning. In the following,
they are used as analytical concepts to explore the practice of performing
identity in online social settings with a special focus on posting, photo shar-
ing, and location check-ins.
30 A. Albrechtslund and A.-M. Albrechtslund
PERFORMING DIGITAL IDENTITIES
by these acts results from a hybridity of physical and virtual space and of
present and absent actors.
The same dynamics can be said to be at work in the practice of online
photo sharing. This activity has become an increasingly significant element
of posting in recent years and is manifesting in various interesting and play-
ful ways, as the rise of services such as Instagram, Pinterest, and Snapchat
show. Sharing personal photos online is thus a key bridging activity and
an important catalyst for meaning production as well. The coalescence of
intimacy and exhibition is similar in the practices of tourist photography
and photo sharing, which are both characterized by transforming “configu-
rations of the fields of cultural production in the context of new media, for
which ‘art’, ‘folk’ and ‘popular’, as well as ‘artist’, ‘professional’ and ‘ama-
teur’ are inadequate” (Burgess, 2007, 29). The creation of photo albums is
at the same time a construction of a personal archive, driven by a sort of
“nostalgia for the present” (Jurgenson, 2011) in which meaning is produced
by “slicing out this moment and freezing it” (Sontag, 1977, 15), and a cen-
tral device in the social dynamics of identity performance, producing and
displaying social relations (Larsen, 2005).
CONCLUSION
NOTES
REFERENCES
URRY, J. & LARSEN, J. (2011) The Tourist Gaze 3.0. London: Sage.
WEST, N. M. (2000) Kodak and the Lens of Nostalgia. Charlottesville: University
of Virginia Press.
2 A Social API for That
Market Devices and the Stabilisation
of Digital Identities
Jason Pridmore
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
INTRODUCTION
The mechanisms for transmitting and receiving data on the Internet have
shifted. While early protocols and the use of hypertext transport protocol
(http) remain in use, web browsers to mobile devices to operating systems
increasingly rely upon applications to function. This chapter focuses on
the process whereby data has been made accessible and usable by exter-
nal applications—that of application programming interfaces (APIs). At the
most basic level, APIs are the means by which different technologies are
enabled to communicate with each other. They have been in use for many
years, as they standardize the protocols for the information that can be
retrieved, used, and amended by applications from an external resource.
In a number of cases, and more importantly for the context of this book,
increasingly this resource comes in the form of social media data. This chap-
ter argues that these relatively obscure and unseen APIs, particularly those
connected with social media, have significant implications for the conceptu-
alization and development of digital ‘identities’ in our contemporary world.
As social media is infusing itself into numerous aspects and domains of
everyday life, these social media APIs are arguably becoming default arbitra-
tors and mediators of ‘identity.’
The increased popularity and availability of social media itself can in
part be attributed to publicly available APIs, or rather, the applications that
have been made to work on or through these interfaces (see Dix, 2011).
The relatively recent orientation to applications, or apps as they are better
known (popularized by a 2009 Apple iPhone advertisement with the phrase
“There’s an app for that”), have received significant attention from consum-
ers and the media. However, the APIs they are based upon have received
significantly less attention, despite the fact that an increasing number of
APIs are available for a divergent number of sites, services, and resources
(see Bodle, 2011). APIs are focused on potentials for interoperability and
include commonly used ‘tools’ such as Google search, resources such as
videos with YouTube or photos with Flickr, or social media like Twitter and
LinkedIn. All of these allow their content or data to be ‘embedded’ onto
38 Jason Pridmore
an independent website or application through the use of their open API.
One of the first and longest-lasting API successes, the Google Map API,
became very popular as it allowed a number of different applications to
integrate Google maps as a resource for their own purposes (Dix, 2011).
More recently, Facebook’s success as a platform (at least in historic terms of
growing its user base and popularity over MySpace) has largely been attrib-
uted to its public API, particularly as it allowed for the implementation of
third-party applications and the more recent development of what they call
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
an ‘Open Graph’ protocol (Bodle, 2011; Jung and Lee, 2010; Dix, 2011).
The shift towards the development and use of social media APIs has hap-
pened more recently (concurrent with the growth of social media). The pre-
dominant use of APIs previously centred on developing tools and games
that relied on data separated to some degree from individual persons. These
include maps, images, and keywords. Yet the increased presence of social
media and their publicly available APIs have allowed for the development
of applications that can extract a variety of more personally identifiable
information. APIs—as market devices (see what follows)—provide access
to data in various forms, from more “transactional” data to “archives of
the everyday” (see Beer and Burrows, 2013). They give certain but easily
measurable and quantifiable sets of attributes, characteristics, practices, and
more of those persons engaged in social media. These are records connected
to a social media ‘profile,’ which can be seen as tantamount to a ‘bricolage’
of digital identity: status updates, relationships, friends, location, tagged
photos, searches, reposts, ‘likes,’ and more are the ‘materials at hand’ in the
intermingling of ‘identity’ production with digital technologies. This con-
nection between identity and technology is inclusive of the idea that at the
very least, identity is seen as some form of a fluctuating collection of attri-
butes (voluntarily) indicated to others and those characteristics attributed
to and expected of us by other agents (see Jenkins, 2008). Identity in this
form is seen as contingent and relational, marking a transition from rather
static notions of identity inherent in identity documents and identity provi-
sions. Instead, social media allow for both indications and attributions to
be collected and analysed in digital form, and it is APIs that have made this
increasingly accessible.
The argument of this chapter is that APIs are market devices that sta-
bilize the dynamic and constantly updated data of social media and serve
to connect a number of different actors. They allow applications to access
significant details about social media users and can act in a person’s place,
extending and amplifying their actions, relevance, and relationships in ways
previously unknown. They make the dynamic constitution of identity mea-
surable and quantifiable and continually updatable. Yet all the while these
APIs remain out of sight and are only hinted at within the confines of a
potentially singular encounter in which a social media participant grants
permission to an application to access their personal profile. The chapter
explores the relationship between the use of APIs and how this connects
A Social API for That 39
with the personal production or performance of identity through applica-
tions. APIs are key components in the socio-technical configuration of per-
sons, social media databases, and applications that define and determine
the technological transfer of data in ways hidden from people that use these
various social media–‘powered’ applications. Though applications are most
often convenient, engaging, and entertaining tools or resources, the rela-
tionship between information available through APIs and the production of
contingent and relational digital identities needs to be made clearer.
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
The following sections in this chapter begin to do just this. First, this
chapter describes APIs as ‘market devices’ that bring together people, activi-
ties, and technologies. Second, the permission process on the side of both
developers and social media users of these market devices is shown to indi-
cate the extent of identifiable data that becomes accessible through a singu-
lar acceptance ‘click.’ Though there are a number of relevant social media
APIs, this section focuses specifically on the permission process by two of
the largest social media providers, those of Facebook and Twitter. Next,
given the availability of data from this process, the chapter highlights some
of the analytical convergence of technology, consumption, social media, and
identity in contemporary discussions. It notes that social media are impor-
tant platforms upon which both self-identified and externally identified cat-
egorisations are created, produced, and imposed. This information yields
a number of (partial) digital ‘identities’ that serve as representations for
particular persons in particular contexts. The chapter then concludes by
arguing that APIs are increasingly important and necessary components in
socio-technical configurations of identity. The stabilize access to continually
shifting and augmented digital ‘identities’ by allowing access to the dynamic
and rich mixture of data and associations of social media participants. These
can be seen as neither fully owned nor controlled by persons or a given sys-
tem. Instead, a digital identity—or perhaps digital identities—are themselves
contingent and relational and enacted in various social and technical ways
that are beyond the range of either human or technical agency.
Social media are objects of consumption, yet their use has significantly
shifted understandings of consumption towards cultural forms being seen as
processes of ‘prosumption.’ This concept is at the very least a reaction that
“the analytic distinction between consumption and production has often
been overdrawn by social scientists” (Beer and Burrows, 2013, 49). Histori-
cally, descriptions of material or cultural production and consumption have
reinforced rather mechanical and binary descriptions of markets—such as
depictions of ‘cultural dupes’ and ‘consumer choice.’ The former—in the
vein of Frankfurt School theorists—have focused attention on culture indus-
tries and the latter—in a more ‘post-modern’ vein—viewed consumption as
40 Jason Pridmore
a means of producing personal identity. These have largely ignored the co-
constitution of consumption subjects and objects (see Miller, 1987) in their
focus either on corporate power (through advertising, for instance) or asser-
tions of consumer expression through the use of goods (in either anticipated
or unanticipated ways). These descriptions have often disregarded the fluid
and nuanced ways in which consumers and producers interact. Prosump-
tion, in part, begins to point out the overlap already present in many areas of
consumption and production, but most specifically it does so in connection
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
exercise routine and the posting of this on a social media. Or a media com-
pany can quantify the number of times a subscriber references their publi-
cations and begin to quantify the spread of a given story. This information
is determined by the classification and categorization of activities deemed
relevant by the social media, and its APIs ‘ascribe’ (see Akrich, 1992) a
particular way in which this information is conceived of and retrieved. This
information is constantly updated and made accessible so that the social
media participant can be assessed historically and dynamically. Additionally,
given their interactive capabilities, APIs similarly ascribe how an application
may produce data on behalf of the user, such as posting updates, from arti-
cles read to exercise activities to personal location. As a marketing device,
the ascription process for an application allows that application to see and
produce “certain (but not all) things very well” (Badje, 80).
As market devices, APIs are objects with agency—these articulate the
means by which applications can act and set the parameters around those
actions (Muniesa et al., 2007, 2). They create an open architecture for
sharing content and data between communities and applications that are
increasingly seen as valuable. More specifically, in a context in which social
media is increasingly integrated into everyday life, APIs stabilize the interac-
tions among organizations, applications, and the dynamic practices of social
media users. They are not simply intermediaries, but devices that determine
the architecture of these interactions. In order to understand a bit better
what this architecture looks like, we will look in the following section more
specifically at the developer options and the permissions process seen by
users.
APIs IN PRACTICE
social media; in fact, most are focused on less ‘social’ data, such as maps or
statistics, for instance (the Google Maps API remains the most widely used
API). However, this chapter focuses on social media and, specifically, two of
the largest social media providers, that of Facebook and Twitter.
While a majority of social media ‘enhanced’ interactions are dependent
upon APIs, some are simply part of the internal social media environment
itself. Along with and integrated into APIs, these tools allow for extended
information gathering and dissemination through social media. They make
it possible to allow people to keep up with the latest trends, information,
products, and services offered by a number of brands, for instance via
the ‘like’ button on Facebook, ‘following’ an organization on Twitter, the
“check in” feature of Foursquare, the ‘pin-it’ feature for Pinterest, and more
generally the ability to share content with others. The information produced
and distributed by these are dependent on the way in which social media
have set up the interface between users and these organizations, but most of
this occurs internally.
However, to access and use relevant data produced by and about social
media participants (including the internal features) beyond the enclosed
social media environment, websites, organizations, and marketers rely on
applications that interface with social media data. The API determines the
mechanics of accessing data.
For most APIs, after an initial agreement, the more ‘technical’ aspects of
the connections among the social media participant, the application, and
the social media provider, quickly disappear. None of the technical complex-
ity that underpins these devices is evident. Once activated, the agreement
to ‘connect’ or ‘log in’ (or other mechanisms that rely on APIs) permits
consumer access to specific branded content, features, and services that are
available both on social media and proprietary websites. In many cases, this
permission process also allows these organizations significant and continual
access to the user’s social media profile and the ability to alter these profiles,
post ‘messages’ or ‘status updates’ for them, geographically locate them, and
more. It is this initial moment of application request and user acceptance
that is of particular interest for this chapter.
The singular ‘click’ that indicates a user accepts the terms and conditions
for the application, including what an application can access or do in rela-
tion to the social media profile, is the initial moment through which software
components and data are enabled to communicate with each other. These
A Social API for That 43
are based on the protocols or rules set out within an API (for further infor-
mation, see 3 Scale 2011: “What is an API? Your Guide to the Internet
(R)evolution” and Anonymous 2014: “API versus Protocol”). For social
media, the relevant data held by providers is connected with external appli-
cations and systems that can make use of this information. The permission
process through which an application can access and produce data is crucial;
from this point forward, applications appear to be seamlessly integrated
with social media resources, and the permission request only appears again
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
or posted for the Twitter user based on data from the following categories,
which contain some 80+ ‘GET’ or ‘POST’ commands: Timelines, Tweets,
Search, Streaming, Direct Messages, Friends & Followers, Users, Sug-
gested Users, Favorites, Lists, Saved Searches, Places & Geo, Trends, Spam
Reporting, OAuth (Open Authorization), and Help. For instance, under the
Friends & Followers category, the GET friends/list request can be used to
return “a cursored collection of user objects for every user the specified user
is following (otherwise known as their ‘friends’)” https://dev.twitter.com/
docs/api/1.1/get/friends/list). That is, information on a limited number (cur-
rently 30) of a Twitter user’s followers can be accessed by an application
once that Twitter user has given permission to the application. Or using the
POST statuses/update allows the application to “update the authenticating
user’s current status, also known as tweeting” (https://dev.twitter.com/docs/
api/1.1/post/statuses/update). This includes the possibility of geolocating
the user if geolocation tags are enabled. For the application developer, the
process of being able to obtain permissions for all of the ‘GET’ resources
or ‘POST’ possibilities (though there is a substantial amount of overlap for
these) appears through a rather simple read/write developer request screen
shown in Figure 2.4.
What is readily visible in Figure 2.4 is the requirement that access tokens
need to be renegotiated if in fact there is a change in the permission requests.
However, if there are no changes to permission requests, once granted,
acceptance on the part of the user is given in perpetuity. One of the biggest
46 Jason Pridmore
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
The above description and figures are indicative of how Facebook and Twit-
ter (differently) organize and standardize access to activities done within their
social media platforms. These categories are made available for application
A Social API for That 47
developers, who then can choose which features of the API they wish to
include for their API. This is the basis for knowledge about personal pro-
files, statuses, connections, and the relevant activities of people who partici-
pate on Facebook and Twitter. Though several of these items are oriented
to more qualitative descriptions than easily quantifiable data (for instance
Facebook’s categories of ‘about me,’ ‘interests,’ ‘religion_politics’), many
of these are oriented toward pre-formulated responses that appear once a
person begins to fill these out in their profile (that they can choose to use or
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
not). Likewise, the GET statuses function for Twitter is likewise qualitatively
oriented, but the GET statues/retweets and GET friends/id can be compiled
and used for more quantitative and systematic purposes. The details about
‘who’ a person is, how they are connected to others and what they deem
worthy of ‘sharing’ can be quite significant here.
However, a brief examination of the application requests of several major
international corporations reveals that a number of these do not request too
many additional permissions from Facebook, with the exception of email
addresses and birthdates. The open possibilities for Twitter as read/write/
access permissions are, however, often present, but these are again connected
to the more public data that is central for Twitter and seem to be rarely used.
This may shift or change, but at present Figures 2.5, 2.6, and 2.7 indicate the
process by which applications ask permissions from users to use their data.
Figure 2.5 indicates a minimal request for data from Facebook, and Figure 2.6
shows a substantial request from the application for Facebook data (the black
square in each figure is where the user’s profile picture is inserted):
Facebook actually notes that “the more permissions an app requests, the
less likely it is that people will use Facebook to log into your app” (see https://
developers.facebook.com/docs/facebook-login/permissions). However, click-
ing on the public profile hyperlink indicates that part of this permission
is to give a somewhat extensive set of data, including your “name, profile
picture, age range, gender, language, country and other public info.” Again,
the preceding two figures only appear when a user chooses to ‘connect with
Facebook’ or ‘sign in with Facebook’ on the website or the application, and
the ‘OK button’ approves the process by which these applications (or sites)
gain initial and then subsequent access to personal and personalized infor-
mation, data, and features. This is the moment at which the data transfer
following what is set out by Facebook’s Open Graph API is begun and con-
tinues until the terms, conditions, or permissions requested change or until
the user changes his or her password.
A Social API for That 49
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
developers are most likely to interface, other social media and services like
LinkedIn, Yahoo, Google, and Microsoft Live alongside Tumblr (owned by
Yahoo), Pinterest, and Instagram (owned by Facebook) also provide these
services. All of these set particular parameters around which social media
participants and their lives can be made ‘known’ and traceable. Further,
these figures are only indications of web-based processes, but applications
are predominantly found in connection with mobile devices, namely phones
and tablets. As numerous applications connect with and rely upon data
derived through both Facebook and Twitter APIs, the significance of these
bits of personal attributes that have been translated into specific attributes
and actions on social media only escalates, particularly in terms of its rela-
tion to ‘markets.’
Given the availability and frequent use of social media, seeing APIs as
market devices allows us to understand how applications connect to the
inner workings of social media and its users in order to gain significant infor-
mation about these users. Precisely how this connects with contemporary
understandings of identity is the focus of the next section.
The request and permissions processes indicated earlier show how catego-
ries of data—predefined by social media—become available to external
applications for both the production and consumption of user data. This is
predicated on APIs. They determine the access of applications to that data.
This data is representative of the lives of social media participants, who use
the platform to communicate and relate to others. They both indicate to oth-
ers ‘who’ they are and are perceived in certain ways by the ‘connections’ the
social media platform has provided for them. In the earlier text, the descrip-
tions of requests and permissions are focused on a social media participant’s
profile, while the more theoretical concerns in the descriptions preceding
this were focused on conceptions of identity. In large measure, the two terms
are used interchangeably in common discussions, but here it is important to
see the profile as a digital collection of attributes and a means of producing
and ‘consuming’ identity. As such, social media are in this sense identity
intensive environments, with profiles as the means for both the production
of identity (or identities) and their consumption.
A Social API for That 51
There have been more than two decades’ worth of work examining the
relationship between technology and the production and consumption of
identity, particularly in an online environment (see Turkle, 1995; Zhao
et al., 2008; Trottier in this volume). This has largely been focused on the
participants—their experiences and practices—rather than on the processes
of how they are identified. Identity, as has been argued, is a central concern
in contemporary life. Zygmunt Bauman suggests that identity is experienced
as the new problematic—that is, it is what we are all focused on in part
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
of the way’ and allow participants to produce and receive this content (see
Madrigal, 2013), becomes relevant for a variety of purposes. Making this
content available, editable, measurable, and quantifiable through and from
social media is what APIs allow. They are important for understanding and
conceptualizing the fluctuating collection of attributes indicated to others
and those characteristics attributed to and expected of us by others within
social media profiles. In consumption terms, “the anthropology of consump-
tion has . . . clearly shown classifying products, positioning them and evalu-
ating them inevitably leads to the classification of the people attached to
those goods” (Callon, Méadel and Rabeharisoa, 2002, 212). By extending
this to more proactive forms of consumption, what gets ‘done’ with social
media is both a production and classification of participants and their con-
tent. Social media profiles are entities in which ‘identity’ is both produced
and provided, and APIs stipulate and enable access to these identities.
Given the understandings of identity noted earlier, from its provision to its
production through social media profiles, what precisely is it that social
media APIs can be seen to ‘do’ in terms of identity? And what is it that these
identities do to APIs? APIs are very much about ‘identities’ in use. They can
be seen to make more accessible the socio-technical productions of iden-
tity in many facets. First, APIs both show and reinforce how applications
have become a central part of people’s everyday practices with technology
and their increased reliance on social media. Second, they reiterate the self-
referential but also contingent processes that are a part of the expression of
identity by producing both flexible and persistent categories and classifica-
tions that connect with personal profiles. Finally, these social media APIs
have made accessible data profiles indicative of the flexible and mutable
identities provided for and produced in relation to social media.
and their lifestyle—all the things they ‘like’ (see Gerlitz and Helmond,
2013)—even as these are being reinforced by those they are connected
to by the algorithmic analyses of social media providers. They both refer
to current self-perceptions and aspirations as well as being placed upon
them from without.2
Social media provide reference points through which others, including
applications, are able to classify and categorize participants. APIs form the
basis by which this content of “circulating references” (see Latour, 1999;
see also Beer and Burrows, 2013) within social media—that is data about
the (selective) content of everyday life—moves from these proprietary sys-
tems to external applications. As such, APIs substantially contribute to and
reinforce forms of digital identity that applications are able to retrieve, but
they also allow the freedom of social media participants to shift and change.
Participants are free to change or emphasize particular associations and
relationships, to follow new people and like different status updates even
as these new choices are producing a ‘new and improved’ version of the
participant’s (altered/updated) identity. These decisions are then integrated
into the social media platforms’ algorithms, and different status updates
or tweets (in the cases of Facebook and Twitter) become more readily vis-
ible and promoted. APIs standardize access to certain social media practices
and categories of information that participants willingly choose to associ-
ate themselves but do not define these further—participants are encouraged
to ‘fill in the spaces’ (see Madrigal, 2013). The data they produce creates
selective biographies of participants in the first instance, but the permis-
sions given by social media participants further allow applications to access,
modify, and build upon these biographies in ways that are seen as relevant
to the participant, even as he or she may pursue new experiences, lifestyles,
relationships, or associations.
tions. Though the data made available by these APIs is rarely requested in
full, the selection of categories of data made available by the likes of Face-
book and Twitter, amongst others, provide a selective and partial ‘under-
standing’ of ‘who’ a social media participant is on an on-going basis. In
terms of identity, this is not something simply voluntary or something sim-
ply classifiable and imposed, but rather an identity that is shaped in rela-
tion to both voluntary choices and categorical assumptions or analyses.
Shifts to different activities, locations, friendships, and other affiliations
are not only possible and anticipated, but these are easily made traceable
through the data provided. This not only serves to stabilize relationships
with identity as an ongoing production but allows these identity profiles
to move beyond the parameters of immediate interaction. As the permis-
sions noted above, a number of these application request the authority
to act on a user’s behalf specifically in relation to the social media. API
interactions (or calls) now number in the billions per day for larger social
media companies (such as Facebook, Twitter, and Google), and there are
others moving in this direction (Microsoft, LinkedIn).3 To be clear, these
API calls are not being initiated every time by social media participants.
Rather, applications are seeking and posting information in an automated
fashion. Arguably the sheer number of these calls can be seen to stabilize
conversations with consumers by making them more or less constant. This
strengthens the durability of consumer audiences, limiting the liabilities
inherent in the “irrational consumption behaviours of individual actors”
(Bauman, 2001, 17).
In the process, social media APIs can be seen to render the complexities
of changing digital identity accessible and stabilize access to this informa-
tion. The significance in the use of social media APIs in their various forms
is that these are distinct means through which observations and/or on-going
‘conversations’ are made embedded into technologies. This is of particular
interest to marketing companies (see Pridmore, 2013) as well as the social
media companies themselves, particularly as they ‘tweak’ their participant
interfaces, and should not be underestimated. Through the acceptance pro-
cess set out by APIs, applications connect social media participants with a
variety of resources and provide services on the basis of standardized sets
of dynamic information. They are a vital part of how a number of different
elements connect—they draw together identity, technology, marketing, and
consumption into a unified market device.
A Social API for That 57
CONCLUSIONS
As social media play an ever more important role in people’s daily routines
and practices, they have become a significant aspect in the development of
personal understandings and presentations of identity. The consumption (or
perhaps ‘prosumption’) of social media has begun to change how identity is
‘made to happen’ in everyday life. The unseen role of APIs allowing for the
collection of rich personal data as well as the modification and alteration of
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
digital profiles suggests that identity remains active beyond the intermittent
interactions, categorizations, and profiles found within digital social media.
There are of course numerous concerns on the part of participants regarding
their own profiles (see Trottier, Chapter 3, this volume), but overall the use
of social media is largely seen as voluntary, as are the choices to use applica-
tions that connect with social media data.
However, there are some significant issues that arise in the ‘one-click’ process
presented by application programming interfaces. First, this raises concerns
about a continual ‘care for the self’ in a Foucauldian vein (Foucault, 1988;
see also Elliott, 2007). There are expectations of a continual engagement
built into social media and into applications that can access these media.
What is interesting is the degree to which applications are able to act on the
behalf of others in posting ‘status updates’ and ‘tweets’ in the social media
cases presented here. The acceptance process makes evident the blurred
boundaries among social media, its participants, softwares and hardwares,
and the expressions of personal identity.
Second, although there is flexibility in content, APIs dictate the types of
data that become accessible in terms of its own categorization. They rein-
force particular norms and limit the complexity of identity by dividing it into
certain attributes and associations its platform is dependent upon. This is of
course necessary to stabilize the production and consumption of ‘identity,’
yet in this way it seems that APIs can increasingly dominate the process by
minimizing opportunities for participants, particularly in decisions involv-
ing the connections of applications with social media.
Finally, the acceptance process for applications enacts a form of visibility
that is less than reciprocal, as the complicated protocols and processes of APIs
are not seen or, by and large, understood by participants on social media (see
Bodle, 2011). There is relatively little understanding of what data are both
available and not in relation to application access. What is clear is that both
marketers and social media platforms are increasingly leveraging these tools
even as consumers increasingly rely on their convenience. Social media may
facilitate participants in the production of personal identity—producing rel-
evant profiles about themselves—but the accessibility of these profiles through
APIs makes visible images and activities which individually may not be of
consequence or value, but in combination with others it, allows patterns to
become visible or associations (even non-obvious ones) to be connected. These
are critical ethical and social concerns given the ubiquity of social media.
58 Jason Pridmore
This chapter has begun to show that although both social media and appli-
cations have become significant technologies in the contemporary world, it
is the connections between them and their users in the relatively obscure
and unseen APIs that are of significance. These have substantial implications
for how ‘identities’ are being both produced and consumed through digital
profiles, as APIs are now important parts of the socio-technical configura-
tion of identity in the contemporary world. This is particularly true in rela-
tion to the use of social media APIs. To begin to understand transitions in
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
NOTES
1. The work of Cooley, Mead, and Goffman, amongst others, focuses on con-
ceptions of the self. In large measure the distinctions between the notion of
‘self’ and that of ‘identity’ overlap significantly, but this discrepancy has raised
several critiques as to the usefulness of the concept of identity (see Brubaker
and Cooper, 2000).
2. This can be seen in terms of governmentality, which would require further
discussion and analysis (see Beckett, 2012).
3. Details and statistics on API usage rates are available at www.programmable
web.com/ or at www.slideshare.net/mashups/web-ap-is.
REFERENCES
3SCALE. (2011) “What Is an API? Your Guide to the Internet Business (R)evolu-
tion.” www.3scale.net/wp-content/uploads/2012/06/What-is-an-API-1.0.pdf.
AKRICH, M. (1992) The De-scription of Technical Objects. In Bijker, W. E. & Law,
J. (eds.) Shaping Technology/Building Society—Studies in Sociotechnical Change.
Cambridge (MA): The MIT Press, 205–224.
ANONYMOUS. (2014) “API Vs Protocol.” Accessed May 15. http://c2.com/cgi/
wiki?ApiVsProtocol.
ARAUJO, L., KJELLBERG, H., & SPENCER, R. (2008) Market Practices and
Forms: Introduction to the Special Issue. Marketing Theory, 8(1). p. 5–14.
BAJDE, D. (2013) Consumer Culture Theory (re)visits Actor-Network Theory: Flat-
tening Consumption Studies. Marketing Theory, 13(2). p. 227–242.
BAUMAN, Z. (2000) Liquid Modernity. Cambridge (UK): Polity Press.
———. (2001) Consuming Life. Journal of Consumer Culture, 1(1). p. 9–29.
———. (2005) Liquid Life. Cambridge (UK): Polity.
BECKETT, A. (2012). Governing the consumer: technologies of consumption. Con-
sumption Markets & Culture, 15(1), 1–18.
BEER, D., & BURROWS, R. (2010) Consumption, Prosumption and Participatory
Web Cultures: An Introduction. Journal of Consumer Culture, 10(1). p. 3–12.
———. (2013) Popular Culture, Digital Archives and the New Social Life of Data.
Theory, Culture & Society. (April) p. 47–71.
BODLE, R. (2011) Regimes of Sharing. Information, Communication & Society,
14(3). p. 320–337.
A Social API for That 59
BRUBAKER, R., & COOPER, F. (2000). Beyond “identity”. Theory and society,
29(1), 1–47.
CALLON, M., MÉADEL, C. & RABEHARISOA, R. (2002) The Economy of Quali-
ties. Economy and Society, 31(2). p. 194–217.
DIX, A. (2011) Living in a World of Data. In Proceedings of the ACM SIGACCESS
Conference on Computers and Accessibility (ASSETS ’11). New York, NY.
ELLIOTT, A. (2007) Concepts of the Self: Second Edition. Cambridge (UK): Polity
Press.
FOUCAULT, M. (1988) The History of Sexuality, Vol. 3: The Care of the Self. New
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
INTRODUCTION
Seven respondents were in the first year of their studies, eight were in their
second year, five were in their third year, seven were in their fourth year,
and three were in their fifth year. Twenty-six respondents were in the fac-
ulty of arts and sciences, three were in health sciences, and one student
was in the faculty of education. This distribution is explained by the fact
that the majority of the student population are enrolled in the faculty
of arts and sciences. Twenty-seven respondents checked their Facebook
account at least once a day. The three that did not perform daily checks
instead received email notifications from Facebook. Interviews focused
on a set of themes, including describing respondents’ Facebook usage
over time, the types of personal information made available to others
and reasons for doing so, the types of personal information acquired
from others through Facebook and reasons for doing so, and perceptions
of information exchange on Facebook. When quoted, respondents are
identified by their program, year of study, and gender. Interviews were
recorded as MP3 audio files, manually transcribed, and coded based on
interview questions as well as additional themes that emerged during the
interviews.
The interviews occurred at a noteworthy moment in Facebook’s growth.
While the platform was still closely linked to university student life in North
America, it had been available to non-students for approximately two years.
These respondents reported using Facebook to socialize with peers on cam-
pus and abroad. However, they were also coming to terms with unwanted
watchers, including parents and employers. Some considered a long-term
presence on Facebook to be a growing concern for when they would enter
the job market, pursue postgraduate studies, or raise children. They antici-
pated that their presence on Facebook could harm these plans.
In the years following these interviews, Facebook’s population grew to
more than one billion users, it experimented with several advertising schemes,
and it is now openly acknowledged to be a source of evidence for police and
other investigative agencies (Omand et al., 2012). Contemporary concerns
that are linked to these developments include how personal information may
be repurposed in ways that users neither anticipate nor endorse (cf. Trot-
tier, 2011). The focus of this chapter predates these developments, yet these
respondents were coming to terms with unanticipated forms of visibility on
Facebook. To be sure, Facebook has changed extensively in the years fol-
lowing these interviews. Its interface processes and displays personal details
differently, and a comparatively vast and heterogeneous user base engages in
62 Daniel Trottier
a broader range of practices. However, a basic distinction remains between
information that is visible to all users and information that is meant for a
sub-set of users. Knowing and maintaining this distinction likely endures as
an element of care for the virtual self on Facebook.
Respondents described their presence on Facebook as a matter of being
both the subject and the agent of targeted scrutiny. In this context, Face-
book stood as an exemplar of social media. Respondents used it to maintain
profiles, upload photographs, and make personal information available to
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
their peers. Facebook shared some features with other social media, such
as the pervasive construction of an online presence populated by personal
information. Yet this presence transcended any specific context, and this
characteristic has become more evident in the years following this study.
Thus, sharing personal details with specific peers was not the extent of the
visibility it offers active users. The fact that invisible and unexpected audi-
ences (boyd, 2008) can also access this information is a risk of social media
use that has grown along with its user population.
Respondent adoption of social media was a form of visibility wherein
some everyday interactions more closely resembled surveillance. Surveil-
lance refers to the covert, sustained, and targeted collection of information
of an individual or group of individuals (Lyon, 2001). Respondents were
aware of this condition, with one respondent noting that through “examples
that happen all the time, you realize like how much some people could
be watching everything you say” (Artsci2F). Surveillance is a broader phe-
nomenon than data collection. It typically relies on asymmetrical relations
of visibility and power and is typically practiced in order to further these
relations. It is a prevailing organizational logic of late modernity. Facebook,
for example, organizes relations between individuals. Not only are inter-
personal social ties mediated on an organizational platform, but interper-
sonal activity becomes asynchronous. Users watch over each other’s profiles,
which may take precedence over directly watching each other. Other kinds
of surveillance take place through Facebook (Trottier, 2011), but peer rela-
tions also become more surveillant in nature.
Facebook can potentially be used as a surveillance tool, for example, by
an individual who stalks a targeted user by monitoring their activity on this
platform. However, a lot of interpersonal activity on this platform does not
strictly fit this description. User activity on Facebook ranges from willingly
publicizing details to attempts to obtain private details from another user
without their awareness or consent. However, respondents note that risk of
the latter shapes their relations for users and their practices on the site. One
respondent posted a link to politically inflammatory content on her profile.
Upon discovering that this reflected poorly on her, she stated, “there are
things that—it’s better just to sort of take care of it [by keeping it] private
overall. And it’s good to stay sort of apolitical on Facebook” (Artsci4W).
Thus, the consequences of visibility on Facebook may contribute to self-
monitoring and a dampening of political speech within this medium. This
Caring for the Virtual Self on Social Media 63
particular response anticipated the risks of unwanted data collection and
exposure linked with the subsequent expansion of the Facebook platform,
as well as other platforms.
Respondents occasionally experienced interpersonal (or peer) surveil-
lance as a violation but also came to regard it as a pervasive condition of
social media, suggesting a further normalization of surveillance practices
(Murakami Wood and Webster, 2009). The intervisibility (Brighenti, 2010)
these individuals exhibit and exploit is a prevalent feature of contemporary
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
sociality. Peer surveillance is also mutual on social media, as users are able
to watch and be watched. Earlier research on user-led surveillance practices
noted that the possibility for users to watch others as well as make themselves
visible adds an empowering dimension to their use of digital media (Koskela,
2004; Albrecthslund, 2008). Yet on Facebook, intentional visibility cannot
be disassociated from unanticipated exposure. One function “creeps” into
another, and information “leaks” to new contexts (Lyon, 2001).
In the context of peer surveillance, Andrejevic describes a media culture
that compels individuals to watch over untrustworthy peers (2005). Para-
doxically, an increased reliance on platforms like Facebook for peer surveil-
lance furthers the risk of exposure and the need to be vigilant. As social
media are intimately tied to both identity and communication, they shape
how we are perceived and how respondents interact with others. The risk of
unwanted exposure and other social harm necessitate a care of the virtual
self, “whereby citizens are encouraged, enticed and occasionally compelled
into bringing components of their fractured and dispersed data double into
regular patterns of contact, scrutiny and management: (Whitson and Hag-
gerty, 2008, 574).
New risks emerge as a result of offloading social processes online. Whit-
son and Haggerty identify initiatives by the financial, law enforcement, and
government sectors to compel individuals to mitigate the risk of identity
fraud. Their prescriptions amount to a generalized project whereby “data
management practices” are located at “the forefront of personal projects of
responsibilized risk management” (ibid., 587). Whereas identity fraud pri-
marily concerns the individual’s financial well-being, personal reputation is
at stake on Facebook. That such self-care would emerge on social media is
not surprising, as Foucault notes that self-care constitutes “an entire activity
of speaking and writing in which the work of oneself on oneself and com-
munication with others were linked together” (1988, 51). Thus, self-care as
an individual project is both devoted to and expressed through social ties.
This care is manifest through the monitoring and more general control over
information flows, a feature that is congruent with the extent to which care
and control intersect in individual and institutional surveillance practices
(Lyon, 2001). Respondents are sorting out responsible use among them-
selves, yet this is an occasionally contradictory project.
Peer monitoring on social media is a product of the domestication of
media technology. Domestication literature (e.g. Silverstone and Haddon,
64 Daniel Trottier
1996) recognizes technology as a lived experience and anticipates a quali-
tative focus on respondent reception of social media for peer surveillance.
Domestication addresses how information and communication technologies
are integrated into everyday life, with a focus on the tensions that emerge
in consequence. The tensions between familiar and unexpected conditions
(ibid.) are observable on a comparatively novel and dynamic platform where
interpersonal relations are mediated. As she was discovering how Facebook
would aggregate user activity—including her own—and display it on the
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
platform’s welcoming page, one respondent noted that she was “freaked
out” (Educ1W). Coming to terms with how Facebook displayed personal
information, she noted “all of a sudden, you can see what other people see.
It’s like you’re there and you know that when other people log in, that’s
what they see and it just brings it all full circle and it’s like ‘Wow, Facebook’s
creepy’” (ibid.). Social media reconfigure familiar relations through unfa-
miliar and often unwanted kinds of exposure as a result of its accumulation
of personal information and social ties. Also, following Whitson and Hag-
gerty, reputations on social and digital media are understood by users as an
individual responsibility, while in practice these exceed individual control.
The following sections are arranged thematically in order to chart respon-
dents’ exposure to, use of, and familiarity with Facebook. The first section
explores how as a result of peer pressure and convenience, joining Facebook
became a de facto decision. The next section addresses how respondents came
to realize that visibility was central to their interpersonal use of Facebook.
They described these practices through terms like “creeping” and “stalking,”
which are described in the third section. The fourth section considers how
these experiences lead to a reconsideration of privacy and publicity. The fifth
section considers how respondents developed a set of tactics to manage more
problematic forms of exposure. The sixth section addresses how respondents
regarded other users as being responsible for caring for their own virtual
selves but also acknowledged the difficulties involved in this task.
Staying on Facebook was seen as “too convenient,” and leaving it was too
costly in terms of the loss of connectivity with peers (cf. Chang and Chen,
2008). Thus, respondents chose to join and maintain a presence because
of social ties with friends, even if they have a negative opinion about the
platform itself. To be sure, this peer connectivity is presented as a desirable
66 Daniel Trottier
feature. However, this connectivity—the manner in which Facebook diffuses
information—is also a source of unwanted exposure for respondents.
I find it kind of weird that I have such insight into her life and I can,
like, basically judge her, like I don’t know, it’s really weird to me. That’s
why I don’t really use it that much, because I feel like all these people
can do the same thing.
(Artsci4W)
Caring for the Virtual Self on Social Media 67
Peer visibility led respondents to guard their own information. Knowing
they were being watched and knowing the extent to which they could watch
others compelled respondents to monitor their online presence for content
they believed others would find objectionable. This kind of self-scrutiny trig-
gered the strategies for impression management detailed later in this chapter.
I guess most people would define the stalking one as more, like, actively
searching, but I guess creeping would be if you’re just bored and you’re
just looking at people’s profiles and you don’t have an active interest or
motive to look at it.
(Artsci4W)
I’ve had like a few people phone me and I’d say, “How’d you get my
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
of the key motivations for using Facebook was to share specific information
with a somewhat amorphous (though occasionally specific) audience.
It’s pretty much all about attention, as far as pictures; taking pictures,
things like that—because everyone can see that. (. . .) It’s almost as if
we’re in a world where we watch a lot of reality TV and there’s [reality]
TV shows like The Hills and things like that, Facebook is our own little
form of entertainment where we can get a glimpse of everyone’s life.
(Artsci3M)
I’d say it’s private in the sense that like your own profile is like, your
own profile and you can control what’s on it because even if somebody
writes on your wall, you can make it invisible kind of thing. So, it’s
totally private because you can have as much information as you want
or as little information as you want, but then it’s public in the sense that
anyone can use it.
(Health1W)
Although social media like Facebook offer new opportunities for public
exposure, respondents had a range of tactics at their disposal to manage
their presence. Caring for the virtual self (Whitson and Haggerty, 2008)
involved restricting information flows and exceeded the range of privacy
features offered by Facebook. In general, respondents made extensive use of
privacy settings. They did this to restrict information from a general public
but also for more targeted purposes like hiding a particular photo album
from specific individuals. The majority of respondents were familiar with
privacy settings. Others found them confusing but maintained a commit-
ment to mastering these settings. Based on prior experiences, respondents
periodically returned to their settings to ensure they were still in order. Upon
joining his school’s academic network, one respondent noticed his personal
information had leaked to a degree he did not anticipate. Following this
incident, he appraised his privacy settings “every so often (. . .) to make sure
that only my friends can see my profile” (Artsci3M). One respondent said
she set her privacy such that other users could not seek her out. In effect, she
had to initiate contact with others.
Another tactic employed by respondents was to maintain dynamic and
contextual privacy settings. Many respondents stated their intention to revise
their settings, with one respondent doing this mid-interview. Respondents
augmented their privacy during job searches, such that potential employers
could not locate their personal content. One person went so far as to cancel
his Facebook account temporarily in recognition of how his position as a
political leader could be compromised by his online presence:
I cancelled Facebook for a little while; it was for quite a long period of
time. It was because I was vice-president of the [youth political group].
Caring for the Virtual Self on Social Media 71
(. . .) I had that leadership position too and, that’s when I realized that
you know, this is my personal life but, it’s publicly . . . like my public
personal life, that could reflect negatively on the [youth political group].
(Artsci1M)
Other respondents logged onto their friends’ accounts to see the extent
to which they were visible. By looking at their presence from another user’s
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
perspective, they had a better sense of how their presence was perceived.
Facebook later integrated this feature into their privacy settings, an acknowl-
edgment that peer visibility matters to respondents.
Respondents also cared for their virtual selves by choosing not to upload
certain information. This self-censorship is described along common-sense
lines, as respondents simply did not share content that they believed would
harm their reputation:
Anything I put out there on the Internet—if I’m afraid of it ever coming
back to haunt me, I won’t put it out there. And I consciously make that
decision for every piece of information that I put out. So I’m not really
worried about stalking or creeping because anything out there on me is
kind of what I’ve already put out.
(Artsci3W)
Anything that you wouldn’t want your parents to know isn’t something
that should be on the Internet.
(Artsci4W)
Respondents felt responsible for their exposure on social media and extended
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
I think just the people who you kind of add, maybe two or three years
ago, who you’ve kind of forgotten about. They’re still on your friends
Caring for the Virtual Self on Social Media 73
list but you may not actually be friends with them in real life and you
may not see them ever or talk to them ever, but you still have access to
their profile and they still have access to yours.
(Artsci4W)
was primarily a public domain, and attempts to limit exposure were futile.
Social media are thus presented as domestic technologies through which
personal information leaked in unanticipated directions. Respondents were
aware that proper conduct on Facebook is based on a contradiction: Indi-
vidual users are expected to be vigilant, but this vigilance will not offset all
potential risk. For these respondents, safe use of social media was necessary
but not sufficient to prevent unwanted exposure to peers and strangers.
The above suggests an acknowledgement of partial futility: If information
is uploaded, it may leak into unanticipated contexts. Indeed, this condition
has likely become more pronounced as Facebook’s user population contin-
ued to grow and as more institutions began to treat the site as a source of
information. Respondents viewed the consequences of Facebook exposure
as a concern, because the platform took on a greater presence in various
social contexts:
Like, Facebook is so new, like, we don’t know what kind of social impli-
cations it’s going to have. And it’s becoming such a momentous force
that I don’t think, like, it’s like people jumped on board before they
knew where it was going.
(Artsci4M)
As this exposure was rooted in the everyday use of social media, the cor-
responding self-care was embedded in mundane practices like un-tagging
photos and choosing not to upload damaging content. These risks were tied
to information flows between previously distinct contexts, and respondents
used privacy settings extensively to ensure these leaks were kept to a mini-
mum. However, some respondents were overwhelmed by Facebook’s oppor-
tunities for public exposure and cited this as a reason to not be diligent:
I’m pretty sure all my private information is already long gone. There’s
no sense of privacy in this modern world and because everything I do
is basically online these days, I feel like there’s little or no safety and,
therefore, I don’t need to curb what I’m doing on Facebook.
(Artsci4W)
This respondent was ambivalent about her comfort with Facebook. She
grew accustomed to being visible, but this was in response to the overwhelming
74 Daniel Trottier
exposure on the site. She actively participated in her visibility, but this was
not necessarily the kind of social media she wanted. From her perspective,
care for the virtual self was understood though—and overshadowed by—a
perception that her control of her personal information had already been
compromised.
CONCLUSION
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
ferent social contexts. From their perspective, these concerns eclipsed other
kinds of scrutiny conducted through Facebook. Subsequent research should
consider these other kinds of social media monitoring. As law enforcement
branches, marketers, employers, and governments take a continued interest
in sites like Facebook, the visibility produced by interpersonal social media
surveillance will undoubtedly augment the scope and capacity of other kinds
of social media surveillance. This research is also limited to digital youth
in a university environment. While this provides specific context for user
concerns, subsequent research should focus on how other populations are
coping with social media platforms and their conditions of intervisibility.
REFERENCES
INTRODUCTION
Market practitioners claim that the ‘kids’ market’ is a difficult and even a vol-
atile one to fully understand (Buckingham, 2007). These practitioners con-
tinuously seek representational conceptions of children, ‘knowledge’ about
their presumed abilities, interests, ‘needs, and wants,’ in order to tune their
marketing communication with these ‘insights.’ These are based on ways in
which they translate (cognitive) developmental theory into various age-based
classification models and on particular market research strategies, employed
to study and translate children’s life worlds into valuable ‘insights.’
Age-Based Categories
Gender, and many other variables such as ethnicity or socio-economic status,
can be used to divide children up into ‘target’ groups, but market practitio-
ners first and foremost divide children up by age. Many of the practitioners
we interviewed and who presented at the conference appear to base their
80 Isolde Sprenkels and Irma van der Ploeg
categorizations on (cognitive) developmental psychology.5 Their practices
rely heavily on developmental stages, relating to children’s presumed cogni-
tive abilities. Such a take can be traced back to the seminal work of devel-
opmental psychologist Jean Piaget (1954), who understood childhood as
a patterned, predictable sequence of stages (Cook, 2004). Various practi-
tioners presenting at the conference on kids and youth marketing talked
about the need to focus on child development from a variety of academic
disciplines. Even though they seemed to lump them all together, their work
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
The target group between 0 and 15 does not exist . . . There are clear
developmental stages, we conducted research together with [a research
agency] . . . 2–3 year olds focus on themselves . . . copy others . . . develop
eye hand coordination, 4–5 year olds are more explorative . . . 6–8 year
olds fantasize and understand more complex stories . . . 9–12 year olds
peer pressure is important . . . how do you aim for that as a brand,
show individual children or groups in our commercials? 13–15 is more
analytical . . .
What types of merchandising do you have to make for which age-
category, what types of toys do you have to make for which age-category?
(Presentation 4, ECX, 2012)
This quote illustrates that for Vic, ‘the kids’ market’ is not a homoge-
neous group of children but consists of separated age-group categories.
These categories are created together by market actors such as Vic, the Bel-
gian (television) entertainment company, and the marketing communication
research agency.
Although Vic talks about ‘clear’ developmental stages, other presenters at
the conference spoke of slightly different age groups and mentioned slightly
different abilities and interests to go with these stages. A couple of weeks
after the conference, we conducted an interview with Cherie, the owner of a
kids and youth communication research agency. Cherie responded to Vic’s
conference presentation, and claimed, “We later went up to [(television)
Entertainment Company] and said that they were wrong, that they had
added two years to every category” (Interview 8, YCRA-3, 2012).
Cherie is working on a model “for the whole development of children”
herself. During her presentation at the conference, she explained this model.
Shaping Children’s Consumer Identity 81
She suggests that between 4 and 6, children are in a magical phase in which
the difference between fantasy and reality is still blurry. Between 7 and 9
they are in a more realistic phase in which they develop friendships, and peer
influence is increased. And between 10 and 12, which she calls ‘tweens,’ a
tension is experienced between becoming an adult and being a child7 (Pre-
sentation 7, YCRA-3, 2012). Cherie claims that the entertainment company
added 2 years to every category, but after doing the maths, her claim doesn’t
seem to match the differences that can be distinguished between the two
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
age-based classification models of Vic and Cherie. Her remark, being precise
in demarcating age ranges, illustrates a literal and very strict application of
stages, while Piaget, for instance, actually stressed the succession of stages
and not exact age-ranges (Ville and Tartas, 2010).
There were also market practitioners who expressed experiencing difficul-
ties relating to children’s abilities and interests within a particular category.
As Deniz, owner of a kids and online digital production agency, mentions:
Some kids’ marketers use the phrase ‘tweens’ to refer to the category of
10–14 year olds. But there are problems with this category: children up
to 12 years of age stick to what they know. But when they are 12 years
and over, they go and look for new things.
(Interview 10, DPA, 2011)
Deniz explains that there are problems with the ‘tween’ category itself, as
according to her own experience, children between 10 and 12 years of age
and children between 12 and 14 years of age differ strongly. This, according
to Deniz’s understanding, would lead to ‘problems’ when market practi-
tioners want to target this tween category, as they will fail to speak to all
children within this category due to the strong differences between them.
The existence of another tween age-range—Cherie, for instance, referred to
10- to 12-year-olds as ‘tweens’—confirms the varieties in age range, indicat-
ing a lack of consensus between practitioners.
Other practitioners point at differences between age-category concepts
among distinct disciplines and argue that classification models and their
categories change over time. Mischa, a senior researcher with a kids and
youth communication research agency, explains:
Our target group is girls between 6–10, though we see younger girls get-
ting interested in brands for older girls, and children over 10 still like the
brand as well, perhaps not the dolls, but other merchandise.
(Presentation 9, TC, 2012)
Traditional research methods will stay, but I think it will be both. I think
it would be great to say to a particular focus group: download this app
and keep track of the following things this week and you will receive
a new push message every day when we have a new assignment . . . I
think youth would enjoy it very much . . . they like to cooperate with
our research because we focus on them, on what they think . . . we often
say to them that they are really helping us and that we are very happy
with that.
(Interview 9, YCRA-4, 2012)
Do you want to involve youth in your organization, then ask them what
you want to know from them! Do you have a vision, an idea, a plan;
present it to youth. Start a conversation with them, organize a creative
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
session, have them talk to each other, brainstorm. What form you use
does not matter, as long as you involve them. Because what could be
more fun than creating value together, and while talking, exploring and
brainstorming, going from ‘them’ to ‘us’!
(YCRA-4)
I think your relationship with your target group is very important for
making really good choices . . . co-creation is the core of our think-
ing . . . it allows us to have children design in ways that really ‘fit’ them,
and by which implicitly you can analyse a lot of research data . . . hav-
ing a child [involved in] design is a way to find out what the core behind
that topic is for a child . . . co-creation is helpful to get to the real per-
ception of things.
(Interview 6, YCRA-1, 2012)
ers claim that “good work [meaning ethical11] and good business go hand
in glove”; they argue “that the same process that allows them to create
effective advertising also ensures that the advertising is ethical and that
age-appropriate advertising is both clearer and more appealing to chil-
dren” (2005, 11).
Meeting children’s ‘needs and desires’ for market practitioners means that
their marketing communication, products, and services ‘add value’ to chil-
dren’s lives. As Pascal, working at kids and youth communication research
agency 1, clearly explained:
Though it is not that I would say that selling candy doesn’t have any
value . . . value is not a judgement about a product, about content, nor
about the services of a client, it is about the desires and needs of youth.
(Interview 6, YCRA-1, 2012)
Jules explains that she can make the world for youth a bit better when
she succeeds in developing marketing communication that fits the ‘needs’ of
youth. At the same time, she distances herself from her industry when she
claims to be able to develop less annoying advertising, implying that there
are others who do not succeed in meeting youth’s needs.12 She expresses her
ambivalence with her industry also in another way, saying it is still selling
to youth, while condoning it at the same time by claiming that it can’t be
changed anymore and that it is what youth want.
In the next section, we use a case study analysis of two exchange practices,
of two commercial online environments for children, to demonstrate that
both depicting representational practices are translated and inscribed into
86 Isolde Sprenkels and Irma van der Ploeg
the design of these online environments in order to serve economic as well
as moral purposes.
In this section, we will first describe how two advergame environments for
children are designed in such a way that they meet particular corporate goals,
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
Building a Relationship
The parents’ section on OLA Ice Age claims that Professor Freeze is “taking
children on an adventure and guides them through the games and activities
on the website” (OLAIJstijd, 2010). In their brochure informing potential
advertisers, they explain that Nickelodeon is like a crazy mentor, taking chil-
dren on an adventure within a secure and trusted environment and bringing
them back home safely afterwards (MTV Networks, 2009). Both Professor
Freeze and lion Max, characters representing the OLA brand, are presented
as mentor or role models, someone to trust. Inviting children to engage in a
trust relationship, building a personal relationship with them, is a strategy
used in marketing targeted at children. Or, as Valerie Steeves states, children
are encouraged to consider brands “as role models for the child to emulate,
in effect embedding the product right into a child’s identity” (Steeves, 2006).
When he’s not on vacation, Professor Freeze drives around in his ice cream
van to copy children’s dreams at night. Back at his ice cave, he turns these
dreams into ice cream by using his ice cream machine. When one enters the
website, an animation is showing Professor Freeze packing his bags, announc-
ing that he is going on a vacation and needs an assistant to operate the ice
machine. Professor Freeze promises that when a child has earned all badges in
the ice cave, he or she can become the assistant that Professor Freeze is looking
for. On the Max Adventures website, children are not ascribed such a role in
order to connect with them, but they are invited to choose either lion Max or
his friend lioness Leena as their avatar when playing the games.18 Pretending
to be either Max or Leena offers children the opportunity to identify with
these characters, their characteristics, and their place in the story line.
to have acquired the ability to critically reflect on, weigh, and refuse an
advertisement. It is not until children have reached this latter stage that tar-
geting advertising to them is considered to be ‘fair’ (Nairn and Hang, 2012).
Given this, the primary way in which market practitioners deflect moral
criticism, claiming their market practices to be ethical, is to argue that they
take children’s (cognitive) developmental abilities into account. They base
their market exchange practices and normalising practices such as their
codes of conduct on children’s cognitive psychological development and
associated interests. But, as we claim in what follows, they appear to do so
selectively.
For instance, the academic discourse on children and advertising and the
age-stage model of consumer socialization has evolved. In this academic
discourse, it is argued that several difficulties exist when using the model
as an ethical yardstick for assessing the ‘fairness’ of advertising to children.
Following the argument, it is generally taken for granted that “those whose
literacy is lower are assumed to be more susceptible to effects”24 and that
“an increase in media or advertising literacy is assumed to reduce suscep-
tibility to media effects” (Livingstone and Helsper, 2006, 564). But Sonia
Livingstone and Ellen Helsper found little empirical evidence for this claim.
They argue that although teenagers are presumed to be more ‘media liter-
ate,’ that does not mean that they are less influenced by advertising than
younger children are. They conclude that “different processes of persua-
sion are effective at different ages, precisely because literacy levels vary by
age” (ibid.). Which means that younger children, being less media literate,
are merely persuaded differently than teenagers are. Younger children tend
to be persuaded by superficial or peripheral features of advertising such
as jingles and colourful and funny images, whereas teenagers tend to be
persuaded by, for instance, strong arguments and references to peer-group
approval (ibid.).25
Another problem with this claim on literacy levels and susceptibility, which
has already led certain academics to reject such a model, has to do with
contemporary marketing communication formats such as OLA Ice Age
and Max Adventures. Livingstone concludes that the age-stage evolution
model of children’s cognitive abilities no longer fits the diversity of the 21st-
century media environment (2009). She claims that the idea of ‘milestones’
related to age is not convincing, “both because there is no universal relation
between understanding and age, and because persuasion occurs, in one way
92 Isolde Sprenkels and Irma van der Ploeg
or another, across the range” (Livingstone, 2009, 172). In saying this, she
follows Agnes Nairn and psychologist Cordelia Fine, who doubt the pos-
sibility of establishing any ‘magical age’ at which children are supposed to
understand and resist persuasion, as contemporary formats often intention-
ally bypass children’s explicit persuasion knowledge and instead persuade
implicitly (2008). They tend to be more covert, as the brand and its corpo-
rate goals are integrated into non-commercial contexts. This challenges not
only younger and older children’s cognitive defences but those of teenag-
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
ers and even adults as well (Moore, 2004; Fielder et al., 2007; Nairn and
Fine, 2008). It indicates that vulnerability depends on both an individual’s
cognitive social resources and the (social or mediated) environment (Living-
stone, 2009). Focusing exclusively on cognitive abilities implies a specific
view of technology, considering it to be inherently neutral. We have argued
elsewhere that the ‘fairness issue’ can be considered as something that is a
function of the set of socio-material relations in which children’s options,
choices, and chances to resist are also shaped by the marketing communica-
tion tactics and formats themselves (Sprenkels and van der Ploeg, 2014).
The specific characteristics of contemporary marketing communication
touch on some of the issues with market practitioners’ codes of conduct.
They argue that they have translated the abovementioned developmental
milestones into normalising practices, into their codes of conduct based on
self-regulation. One example is the Dutch Advertising Code26 and its spe-
cial section on children and advertising,27 which proposes to help children
differentiate content as it prescribes that the distinction between editorial
content and advertising targeting children—defined as a person being 12 or
younger—should always be made recognizable. For instance, television com-
mercials are preferably clustered, and banner and pop-up advertisements on
the internet should be labelled with the word ‘advertisement.’ However, as
mentioned, the age-stage model of consumer socialization is problematic,
and when it comes to contemporary formats such as advergame environ-
ments, the code is not followed because the distinction is not made explicit
in any way at all (Fielder et al., 2007). Not only do such ‘seamless environ-
ments’ (Moore, 2004) fail to follow the code, this form of self-regulation
advocates a strategy that runs exactly counter to what advergames tend to
be about, namely presenting advertisements, and all related market practices
running in the background, as game.
As suggested earlier, market practitioners translate academic theories
on children’s cognitive development into various age-based classification
models. They come up with a variety of age categories in practice, refining
and reducing them to smaller and smaller age groups. It is a continuous
effort to construct and stabilize these ‘stages,’ which they constitute into
being by re-describing them in their own terms. We have demonstrated that
such categories or market segments are contestable constructions, they are
contingent, different according to different actors and within different set-
tings. Market practitioners consider their work to be ethical, as they claim to
Shaping Children’s Consumer Identity 93
follow children’s developmental needs, which they presume to be clear cut,
out there, which as shown, they are not.
The secondary way in which market practitioners consider their mar-
ket practices to be ethical relates to their claim that they take children’s
‘needs and wants’ into account by giving them a voice, empowering them,
including them, using representational practices such as co-creation. But
we have illustrated in the previous sections that those practices tend to be
performative, too, producing what they seek to describe. There appears to
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
CONCLUSION
connections do. It also allows us to take the various digital means them-
selves, used by both children and market practitioners in a digitising soci-
ety, into account. These digital means are not to be considered neutral; for
instance, advergames play an active role in shaping these market practices,
children’s consumer identities, and children’s commercial literacy (see also
the chapter by Sprenkels and Wyatt in this volume), and conversely, they
are actively shaped by market practices and children’s new media use
themselves.
NOTES
12. Amy Henry, who wrote a report on marketers targeting children and their
perspectives on ‘good work’ and US industry leaders’ discomfort with the
label ‘kids’ marketer,’ also found that when it comes to professional ethics,
marketers stressed that they did not engage in unethical work themselves but
expressed their concern that others might do so (2005).
13. Advergames are considered to be a particular form of gamevertising, with
gamevertising in general being the promotional or advertising possibilities
before, within, or after an often already existing console, PC, or Internet game
(Hufen, 2010).
14. In Dutch: OLA IJstijd. The website www.olaijstijd.nl is no longer in use.
15. ‘Professor De Vries’ in Dutch, which is a very common name in the Netherlands.
16. In many other countries such as South Africa, Indonesia, India, New Zealand,
and Australia, Max is known as the Paddle Pop Lion. Similar campaigns run
in those countries. Paddle Pop is, just like Max Adventures is for OLA, a
sub-brand for Streets, the Australian equivalent of OLA. It originates from
a particular Australian ice cream type developed in the 1950s. The ice cream
wrapper contained a cartoon character which was known as the Paddle Pop
lion.
17. www.max-adventures.com/nl-nl/
18. Lion Max has many fellow adventurers besides lioness Leena, as well as sev-
eral enemies, all playing active roles in the series. On the website all the char-
acters of the latest story ‘Dino Terra’ are described. The website shows two
previous series as well: Kombatei and Begins. They are all divided up in 8 to
10 episodes with a duration of 10 to 24 minutes.
19. See endnote 16.
20. Marketing professor Agnes Nairn and market research company director Bar-
bie Clarke stress a line between market research, which according to them
does not seek to alter opinion, and marketing, which according to them does
seek to alter opinion (2012). This chapter clearly argues that such clear distinc-
tions are difficult to uphold.
21. According to Cook, market practitioners tailor messages and design products,
packages, websites, campaigns, and advertisements in such a way that they
appeal to children, designing it to be fun, playful, entertaining (2011).
22. For instance, there is some debate regarding marketing communication target-
ing children in the Netherlands. In reports from consumer organizations (Food-
watch, 2013), governmental institutions (Autoriteit Consument en Markt,
2013), and child and media knowledge centres (Mijn Kind Online, 2008), vari-
ous practices are being criticized.
23. Although, as David Buckingham explains, some studies suggest that this under-
standing is not necessarily used. He claims differences in these estimations are
a consequence of research method (Buckingham, 2009).
24. Advertising effects can be intended by advertisers, such as brand awareness
and buying intent, and non-intended, such as materialism and family conflicts
(Valkenburg, 2002, 140). In this chapter we call intended effects by advertisers
‘goals.’
96 Isolde Sprenkels and Irma van der Ploeg
25. Here Livingstone and Helsper are inspired by Petty and Cacioppo’s elabora-
tion likelihood model of persuasion, which distinguishes two routes of persua-
sion, a central one and the peripheral one.
26. Nederlandse Reclame Code
27. For another example, the Dutch Advertising Code for Foods—Reclamecode
voor Voedingsmiddelen—forbidding targeting of children under 7 years of age
with (commercial) food advertisements and stressing the abstention in target-
ing children between 7 and 12 years of age, view (Sprenkels, forthcoming). It
offers a close analysis of Unilever’s principles for responsible food and bever-
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
age marketing and their motivation of their practices related to OLA Ice Age
and Max Adventures.
REFERENCES
écht bij je merk? Presentation at Brands and Games 2009. The game advertis-
ing network event. March 10, 2009. Retrieved from www.nlgd.nl/fog/pdf/bag09/
BG8.pdf, accessed June 10, 2010.
GRANDCLÉMENT, C. & GAGLIO, G. (2011) Convoking the Consumer in Person:
The Focus Group Effect. In Zwick, D and Cayla, J. (eds.), Inside Marketing: Prac-
tices, Ideologies, Devices. Oxford: Oxford University Press, 87–115.
GRIMES, S. M. (2008) Kid’s Ad Play: Regulating Children’s Advergames in the
Converging Media Context. International Journal of Communications Law and
Policy, (12). p. 161–178.
GRIMES, S. M. & SHADE, L.R. (2005). Neopian Economics of Play: Children’s
Cyberpets and Online Communities as Immersive Advertising in NeoPets.com.
International Journal of Media and Cultural Politics, 1(2). p. 181–198.
GURĂU, C. (2008 The Influence of Advergames on Players’ Behaviour : An Experi-
mental Study. Electronic Markets, 18(2). p. 106–116.
HARRISON, D. & KJELLBERG, H. (2010) Segmenting a Market in the Making:
Industrial Market Segmentation as Construction. Industrial Marketing Manage-
ment, 39(5). p. 784–792.
HEISKANEN, E. (2005) The Performative Nature of Consumer Research: Consum-
ers’ Environmental Awareness as an Example. Journal of Consumer Policy, 28,
179–201.
HENRY, A. (2005) Marketing to Children: Industry Insiders’ Perspectives on
Good Work (p. 1–33). Harvard University, Good Work Project Report Series,
Number 40.
HOUBEN, J. (2009) OLA IJstijd Kids campagne 2009. Presentation at Kids Insights
Day, October 21, 2009. Retrieved from: http://media.mtvnetworks.nl/kidsday/
kidsdayjoosthouben.pdf, accessed June 1, 2010.
HUFEN, B. (2010) Laat met je merk spelen. Games als marketingmiddel. Amster-
dam: Kluwer.
KJELLBERG, H. & HELGESSON, C. F. (2007) On the Nature of Markets and Their
Practices. Marketing Theory, 7(2). p. 137–162.
LATOUR, B. (1987) Science in Action. How to Follow Scientists and Engineers
Through Society. Cambridge (MA): Harvard University Press.
LATOUR, B. (1991) Technology Is Society Made Durable. In Law, J. (ed.), A Soci-
ology of Monsters: Essays on Power, Technology and Domination. New York:
Routledge, 103–131.
LAW, J. (2009) Seeing Like a Survey. Cultural Sociology, 3(2). p. 239–256.
LAW, J., RUPPERT, E. & SAVAGE, M. (2011) The Double Social Life of Methods.
CRESC Working Paper Series. Working Paper No. 95.
LIVINGSTONE, S. (2009) Debating Children’s Susceptibility to Persuasion—Where
Does Fairness Come In? A Commentary on the Nairn and Fine Versus Ambler
Debate. International Journal of Advertising, 28(1). p. 170–174.
LIVINGSTONE, S. & HELSPER, E. J. (2006) Does Advertising Literacy Mediate
the Effects of Advertising on Children? A Critical Examination of Two Linked
Research Literatures in Relation to Obesity and Food Choice. Journal of Com-
munication, 56(3). p. 560–584.
98 Isolde Sprenkels and Irma van der Ploeg
LUNT, P. & LIVINGSTONE, S. (2012) Media Regulation. Governance and the
Interests of Citizens and Consumers. London: Sage Publications.
MACKENZIE, D., MUNIESA, F. & SIU, L. (2007) Introduction. In MacKenzie, D.,
Muniesa, F. & Siu, L. (eds.), Do Economists Make Markets? On the Performativ-
ity of Economics. Princeton: Princeton University Press, 1–19.
MIJNKINDONLINE. (2008) Gratis! (maar niet heus)—dossier over digitale reclame
voor kinderen.
MONTGOMERY, K. C. & CHESTER, J. (2009) Interactive Food and Beverage
Marketing: Targeting Adolescents in the Digital Age. Journal of Adolescent
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
Part II
Growing Up
Children and Guardians
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
Valkenburg
INTRODUCTION
Dutch child-care policy has become increasingly focused on making the lives
of children ‘transparent.’ This is accomplished by connecting multiple digi-
tal databases and aggregating data about children and the persons to which
they are connected. This is to give the most ‘complete picture’ possible of
children who may be at some sort of risk. This is believed to increase the
success rates of interventions made in the lives of these children (Keymolen
and Prins, 2011, 21). The (potential) problems these systems are to address
include abuse and negligence within families, educational problems includ-
ing dropping out of school, and petty criminal behaviour such as shoplifting,
nuisance, and vandalism.
In this chapter, we explore developments in ‘completing the picture’ of
children through the use and development of youth-care–related databases.
First, we argue, these systems are not just a matter of installing the right
software and operating it appropriately. Rather, it requires a lot of work
to make the systems work and literally make them match a rather complex
and ambiguous world. Second, while this work is intended to make the risks
visible, it also inevitably obscures some of the realities it tries to represent,
which in turn entails that some of the risks are ‘constructed’ rather than
merely ‘represented.’ Finally, we observe that the whole logic of the system is
such that it tends to expand: If it fails in some sense, the response is typically
to install more risk assessments, to implement more risk indicators, and to
start the risk identification processes earlier in a child’s life.
It is perhaps not that surprising that a comprehensive approach to youth
risks includes the establishment of the most complete possible set of infor-
mation from a variety of professionals, as this increases the likelihood that a
risk or future wrong is identified in time. One of the explicit aims of national
youth-care policies is that ‘no child should go unseen’ (Inspectie Jeugdzorg,
2008).1 However, we will show that the ever-increasing demand for infor-
mation on a child does not always work out the way it was intended, for
example when stigmatization arguably occurs (Dutch Youth Institute,
reported by NOS, 2010).
104 K. La Fors-Owczynik and G. Valkenburg
Risk and prevention are not simple concepts. On the contrary, in this
context they refer to complex arrangements of children, professionals, insti-
tutions, personal records, data technologies, legal statuses, communication
protocols, and professional routines. Within the Netherlands, youth care
is organized across medical, educational, and law-enforcement institutions.
In practice, this means risks are identified and shared among various youth
healthcare organisations, police departments, schools, judicial institutions
such as the Child Protection Council and the Youth Care Bureau, municipal-
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
Following Dutch youth policy, both youth care and law enforcement have
increasingly become geared towards prevention: problems are to be solved
proactively before they become real. ‘Risks’ and their identification serve to
make problems actionable before they actually occur. Indeed, wordings such
Risk Identities 105
as “making risks visible” or “making the child transparent”2 often appear
in youth policy. This eagerness for making visible the potential problems
of children is reflected by mottos from professional reports: “to establish
a comprehensive approach to children” (Berkeley and Van Uden, 2009),
“to create a complete view of children,” and “no child should go unseen”
(Inspectie Jeugdzorg, 2008). Identifying those who might be responsible for
future crimes provides the rationale of many prevention practices. As one
professional explains:
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
The goal initiating ProKid was to ensure that police officers in the field
work more efficiently. What you see with the police is that normally they
respond to an incident. Only when something happens, the police are
called, and then they arrive to start an investigation. [. . .] The idea was
that you want to know the 5% of people that are responsible for 60%
of all crime incidents. If you know them, you can focus on the 5% of
children who may actually come in contact with the police.
(ProKid professional, city A)
This includes suspected physical abuse, serious illness of the parents, parental
divorce, alcohol abuse by the parents, and teenage pregnancy. Notably, as this
list was found to be too much of a straightjacket, it was replaced by a ‘free
text field’ in the subsequent version (Nederlands Centrum Jeugdgezondheid,
2011, 2013). Although the text field now allows for less specified (‘free’)
descriptions of risk, it remains a significant indicator for risk. Also, while the
‘freedom’ to report increases, it is still only a freedom to report risks, which
entails that the possibilities for a child to become risk profiled grow.
ProKid SI 12-
ProKid SI 12- is a risk-categorization system for children between 0 and
12 years. The child’s address serves as the primary key to the database.
ProKid employs four colour codes to represent risks: white, yellow, orange,
Risk Identities 107
and red, respectively signifying a growing gradation of concern. White sig-
nifies that no risks have been identified as yet, yellow represents a possible
development of risks, orange indicates that problems and even criminal
behaviour have already occurred, and red symbolizes children who have
repeatedly shown criminal behaviour or of whom multiple cases of suspi-
cion have been recorded (Abraham, Buysse, Loef and Van Dijk, 2011). Fol-
lowing a pilot phase, the system has been in operation nation-wide by the
Dutch police as of 2013 (Tweede Kamer, 2012).
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
You see the categories with a red checkmark, with certain families the
screen is almost only red. You still need to read the record [underlying
the checkmarks], and you can relatively quickly figure out what the
problems are. But it is often difficult to fill in the risk assessment form,
or to risk-score children, because there is no clear definition of risks.
For instance, a ‘sleeping problem’ of a child can be just that, but it can
also be a symptom of issues between the parents; or it can be caused
by cultural elements that are just different between one family and
another.
(CB-nurse, city D)
While the meaning of the symbolic representation of the risk may remain
unclear, its presence in a graphic material form seems to express a very clear
urgency for action. Yet if professionals find themselves confronted with this
urgency, they obviously want to be sure that they can tell a sleeping prob-
lem from parental tensions before proceeding to action. While an indicator
is aimed to deliver ‘actionability,’ it also carries ambiguity. This ambigu-
ity entails that different professionals may conclude to different ‘optimal’
solutions.
Within the RI, similar ambiguities occur in the presentation and interpre-
tation of risks. One professional using the RI reports that it often remains
unclear what others mean by particular risk signals. This is owing to the
Risk Identities 109
fact that the contents of children’s records are not shared for privacy and
confidentiality reasons.
Finally, the very definitions of risks within the context of ProKid are
themselves ambiguous. This is remarkable, as ProKid is based on standards
that explicitly describe when a child needs to be scored with a white, yel-
low, orange, or red flag. For example, the orange code is to be attributed to
children
This orange colour code thus represents a rather heterogeneous set of prob-
lems, the complexity and heterogeneity of which remain implicit. Within
the orange class, the distinctions among perpetrators, victims, and witnesses
vanish. Whereas the colour codes were intended to speed up the assessment
of reports by offering a quick summary, the resulting ambiguity compels
police officers to yet investigate the whole background of an issue.
On top of these direct identifications of risks—in the sense that profession-
als explicitly regard something as a risk and enter it into the system—risks
are also constructed indirectly, through what could be called ‘circumstantial
evidence.’ Such construction is particularly facilitated by systems that are
connected to ProKid, such as the BFFI. The following quote shows how a
risk identification emerges in or ‘between’ these systems. It is the result of
observations made by a police officer at a crime scene which are not directly
related to the crime but may be related to a child:
[W]hen our officers are at an address, and find drugs, [. . .] this infor-
mation becomes registered in BFLE. But if they find a baby bottle in
the kitchen, and ask whether there is a baby; and the inhabitants of
the house answer: ‘No, the bottle belongs to my sister who comes here
occasionally.’ If the officer cannot find hard information about whether
we need to seek care for the baby, or who exactly lives there, to what
110 K. La Fors-Owczynik and G. Valkenburg
extent the person makes something up . . . and the officer has a bad feel-
ing [about it], and wants to use the information [about the bottle], he
can register it in BFFI. We, ProKid managers, can see that.
(ProKid manager, city C)
[The DYHR] helps you to create a better problem overview. You can
provide better advice and guidance based on the information it contains.
[. . .] Previously, we had a hand-written ‘integral paper record’ in which
you needed to search for information manually. Now, you click on a
section and it appears immediately before your eyes in a digital format.
Extracting, sharing and analysing data from the digital dossier is much
faster.
(CB-nurse, city D)
Yet communication and distribution of risk assessments are not just that.
They are mechanisms, mobilized to bring a variety of professionals together
and promote communication among them. In the view of one RI manager,
such promotion of communication and the matching of risk signals are ben-
eficial to rendering multiple problems with children visible. The infrastruc-
ture brings those aggregated problems under the attention of professionals.
As the RI manager explains:
The number of [risk signal] matches increases over time. For us, this
indicates that professionals increasingly contact each other over a
child’s case. In 2008, we had 30,000 signals and 2,277 matches. In
2009, we had 30,313 signals and 3,100 matches. Up until now [July
2010], we have had 30,081 signals and 3,500 matches. [. . .] The idea
behind the system was to arrange a child’s case as a point of connection
between professionals. Thus, children with multiple problems would
become visible earlier, [. . .] receive better help, in case they have mul-
tiple problems within a family. Such complexity needs to be addressed
comprehensively, so that a child will not be ‘ping-pong-ed’ between
professionals, each of them needing to start the child’s assessment from
scratch.
(RI manager, city A)
Risk Identities 111
However, this leaves untouched the fact that risk-related data potentially
represent different issues for different professionals. For example, the police
officer managing ProKid reported her difficulty in interpreting what the
colour-coded risks symbolize. For example, concerning one incident, the
police officer explained her hesitation in assessing the gravity of the incident
and reducing it to a single risk indicator:
The problem we encounter with ProKid is that we get our colour lists
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
in Excel each week, but we also need to read all the reports and what
a yellow or a red colour symbolizes. If there is a report about a child,
who has set something on fire, we only know that it has set something
on fire. We do not know whether it has set a newspaper on fire, or a
whole school building, for instance. So, you have to read the reports to
learn the severity of the crime. This is important for your risk analysis.
(ProKid manager, city B)
The professional thus seeks his own way in dealing with colour codes and
looks for ways to include information that would otherwise not fit into the
system. Particularly, information from the social environment of the child is
sought to be incorporated.
Numerous examples exist of when the smooth, digital sharing of infor-
mation obscures rather than improves the view of professionals on children.
For example, the distribution of erroneous information shows a perilous
irreversibility:
Everything I register goes instantly into the computer and can be moni-
tored. [. . .] If someone has filled in something wrong, then I need to
receive an email query whether I would take out the wrong information.
Until then, [the wrong information] remains in the file.
(CB-doctor, city A)
112 K. La Fors-Owczynik and G. Valkenburg
This quote indicates how risks are foregrounded and consolidated by
digital mediation. On the one hand, the registration of data is distributed
in such a way that it becomes instantly visible for professionals in differ-
ent locations. This is supposed to be helpful for the early identification of
risks. On the other hand, erasing these data from files becomes a highly
work-intensive process. Erasure is not automated but involves extensive
e-mail correspondence. This means that, in case of erroneous informa-
tion, the rapid sharing adds confusion rather than clarity, as corrections
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
As we have discussed, the DYHR, RI, and ProKid systems all in some way
manage risk identities of children. Also, each system connects multiple
practices, providing channels among different professions. In this section,
we discuss this identity management across professional boundaries as an
‘ontological practice of selection’ (Hacking, 1986, 1991; Bowker and Leigh
Star, 1999; Law, 2008). Whether something counts as ‘normal’ or ‘abnor-
mal,’ ‘deviant,’ ‘at risk,’ or ‘as risk’ always has consequences for the very
world those attributed classes describe, which makes this ‘description’ also
a performative affair. One intended consequence is that these classes offer
a ground for preventive action. Yet not all consequences are intended or
justified, and we will articulate some of the structural issues that carry unin-
tended consequences.
The dominant idea informing the installation of the risk-assessment
systems is that transparency, visibility, and comprehensiveness are key to
prevention of youth problems (Van der Hof, Leenes and Fennell-van Esch,
2009; Keymolen and Prins, 2011). We approach this ‘making visible’ as an
ontological affair, as risk identification also transforms the problems that are
identified. For sure, there are serious and real problems among youth that
merit intervention by social workers and other professionals. Clearly, these
problems must first be identified, if possible before they actually emerge,
before any intervention can be made. However, the shape in which these
problems are articulated does not stand in a one-to-one, unequivocal rela-
tion to what actually happens in the life of the child. We show that the
Risk Identities 113
DYHR, the RI, and ProKid do indeed identify real problems, but that they
also transform these problems, represent them in non-neutral ways, and
introduce ambiguities of their own.
To identify risks in children and make them actionable, risks are consoli-
dated into indicators: items on which children are scored and which offer
justification for a particular intervention to be made. On the one hand, such
indicators are compact and practical: They reflect the severity of a situation
and instigate interventions. On the other hand, these indicators conceal a
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
lot. A percentage, a colour code or a ‘yes/no’ item hides the work through
which a professional arrives at the indicator. This work includes profes-
sional interpretation and judgment, professional discretion, conversation
with a range of other professionals, intuition, tacit knowledge, contextual
knowledge, and so forth. The necessity of these non-formalized ingredients
is recognized by official reports and guidelines (Inspectie Jeugdzorg, 2008),
yet they are not reflected by the indicator itself. Even if formal standards
are in place that specify how an indicator is to be scored, as with the colour
codes, this formalized part of the assessment is never the whole story (for
otherwise we would not need professionals but only administrative clerks or
even computers to do the assessment).
In addition to identification, the systems are about communication and
distribution of risk assessments. More specifically, communication is to take
place between different practices of youth care, and these practices employ
potentially incompatible approaches. This entails that the identified risks
need to be presented in multiple ways, that they are mobilized for multiple
programmes, that they are to fulfil multiple tasks, and that they will be
imbued with different meanings across situations. Communication in this
sense is not the transparent transport of information but complex work of
translation across boundaries.
The use of indicators as tokens of complex judgments makes such com-
munication possible in the first place. Indicators are ‘mobile’: they are
compact and can be conveniently passed on to another professional. They
are also ‘immutable’: as they are deeply rooted in the practices that estab-
lish them, it becomes hard or even impossible to deny or contest them. As
‘immutable mobiles’ (Latour, 1987), indicators are able to mobilize a wide
range of actors by their alerting characteristic. At the same time, the com-
pactness that allows their mobility entails a continuous need for reinterpre-
tation and adjustment to local knowledge, traditions, codes of conducts,
and objectives.
While crossing disciplinary boundaries, the aforementioned concealment
enables indicators to help keep responsibilities in place. For example, even
though intensive sharing of data between medical and non-medical youth-
care professionals was pursued by connecting the DYHR and the RI, the
Dutch Medical Association KNMG pled for strict limitations on the sharing
of medical information. Obviously, the KNMG held paramount the privacy
and confidentiality of patient data. The ‘best interest’ of the child should be
114 K. La Fors-Owczynik and G. Valkenburg
the touchstone for whether medical data would be shared (KNMG, 2009).
By reducing such complex information to single indicators, exchange of that
information became possible in the first place.
Offering both ‘transport’ and ‘seclusion’ of information, risk indicators
are perfect examples of what have been conceptualized as boundary objects:
entities that are ambiguous and flexible enough to work in different contexts
but also stable enough to meaningfully connect between those contexts (Star
and Griesemer, 1989; Star, 2010). They deliver some of the promises for
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
which the information systems were installed, namely the connection of dif-
ferent professional practices. At the same time, what they actually convey
is not a simple representation of a pre-existing reality but a particular con-
struction of that reality.
Once these indicators are established, they become harder to modify. To
some extent, they start to live a life of their own, not least because the exact
conditions under which they were established become invisible. While they
are supposed to be representations of chances and possibilities for deviance,
deviance also becomes more ‘real’: It ‘exists’ as representations presented by
the systems. The reality of the issues in part consists of a certain irrevers-
ibility once an indicator has been assigned to a child. As one RI manager
explains:
The problem is that the Reference Index at the time of its introduction
was presented as a ‘Concern reporting system,’ similar to the ‘concern
reports’ police write. You know, it created among professionals an idea
of quite a ‘serious and heavy’ system. Hence, professionals are often
afraid of signalling anything in there, although in practice it is just an
alerting system and only contains data from the municipality register.
This fear to signal is a pity.
(RI manager, city D)
[O]h while I am showing you this, I have almost put a risk flag on my
own child, that is something I would absolutely not want as a mother.
(RI manager, city D)
Many professionals who have already been working for years within
youth healthcare, notice for instance, that they cannot register signals
in the system that reflect that things are going well for the child. I find
it to be frustrating that I can only register negative things, only risks,
and not that the kid is doing well. The system only allows you to record
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
case, a similar logic suggests that risks linked to children can be dealt with
better if their registration is more comprehensive and indeed earlier.
We discuss three dimensions of this multiplication of risk indicators.
First, practices of risk assessment increasingly include the family of the child
explicitly in the registration of risks. Second, a similar development is visible
regarding the broader social environment of the child. Third, as suggested,
there is an assumption that earlier identification of risks leads to their being
better manageable. In conclusion, these three developments culminate in the
growth of the number of indicators.
Many times you see, the mother is divorced and has a child, and the child
gets a report. The child is reported as hyperactive. Then, later the mother
starts a new relationship with a man, who moves in at the same address.
If the mother’s new boyfriend, for instance, already has a police record,
or has been involved in domestic violence, this creates a high risk factor
for the child. The child lives at one address with this man. Therefore, the
yellow colour of the address [in the child’s record] will turn into orange
[. . .] Another example is when the mother has been caught with shop-
lifting, and then she explains that she did the shop lifting because of her
severe circumstances, e.g.: ‘otherwise I am not able to feed and take care
of my child.’ This also constitutes a risk factor.
(ProKid manager, city B)
You need to know of possible healthcare risks; whether the parents, for
instance, have a [social or financial] problem. Moreover, if the parents
have problems, the broader picture needs to be looked at, and not only
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
the child. It is possible that you have already noted down issues in the
DMO protocol.5 For example, the parents might be unemployed, have
high debts, or the child has been taken out of the family home, etc.
These issues [. . .] importantly influence the child’s development.
(CB nurse, city D)
You actually need a structural description of the family. I mean all those
relatives with which the child interacts daily. So far, only the biologi-
cal father and mother are registered in the [DYHR] record, but not
the stepfather, stepmother, stepbrothers and stepsisters. Or, if the child
often stays with grandpa or grandma, then the grandparents need to
be registered in the dossier, too. But the system does not allow for such
registration, unfortunately. Nowadays, there are a lot of divorces. We
should also make those family relations visible, I think.
(CB nurse, city D)
fathers also fought, two years ago. I can then connect these things, and
that is the analysis I do.
(ProKid manager, city B)
This shows how multiple profiles, including the profile of the neighbour
or the father, are drawn together in a ProKid-based analysis. From these
combined risk profiles, risk factors to which the child is exposed are identi-
fied and registered more sophisticatedly in the child’s ProKid record.
In addition to familial and social relations, ProKid even brings forward
a child’s relations to animals. ProKid incorporates behavioural-scientific
research findings holding that the way children interact with animals is
indicative of the risks a child might pose to society in the future:
We also have another, somewhat strange risk factor in our list: animal
abuse. If a child abuses an animal at an early age, then, according to the
scientific findings of Radboud University of Nijmegen, that child has a
higher inclination for sexual abuse at a later age. We relied on scientific
explanation to include such a category into the system.
(Police officer responsible for ProKid project, city B)
Also the child’s friends’ risk profiles are made part of risk assessments.
Links between friends’ risk profiles increase the weight attributed to those
profiles:
If I see a child who has a ‘yellow’ or ‘white’ colour code, and although
officially the case is ‘not yet worth’ being sent to the Youth Care Bureau
(YCB),6 but if a friend of that child is ‘red’ in the system, then I share
this extra information [about the ‘yellow’ or ‘white’ colour-coded child]
during the case discussion within YCB.
(ProKid manager, city B)
Extension in Time
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
This passive signalling allows for another professional to use the source
of the passive signal, in order to acquire information from the profes-
sional about the child.
(RI manager, city D)
120 K. La Fors-Owczynik and G. Valkenburg
The constructions of pre-signals and ‘passive’ signals in the RI and the
colour-code classifications of risks in ProKid epitomize the proliferation of
risks in time. Risk indicators accompany a child on a longer time span in prac-
tice, thus offering a longer window of opportunity for preventive intervention.
Modes for identifying and preventing risks in youth care in the Netherlands
are being reconfigured in unprecedented manners. Prevention is performed
by a growing range of youth-care and law enforcement organizations,
Risk Identities 121
systems, and professionals. The problems they face include various forms
of child abuse, anti-social behaviour, and medical problems. Attempts to
solve these problems occur through the use of comprehensive digital means
and the enrolment of ever more socio-technical practices of youth care,
as well as an extension of what is thought to be relevant. Involved prac-
tices currently include the police, healthcare professionals, social workers,
municipality administrators, educational institutions, and debt-counselling
services.
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
Despite this acceptance, our analysis has shown that such negative side
effects are contingent upon particular technological choices, such as the
reduction of complex observations to simple indicators. Side effects include
false positives, the impossibility of indicating that a child is doing well,
and emerging ambiguities of risk indicators that entail misunderstandings
between care practices. Solutions for these effects may not be in finding
better technological solutions, nor would we argue for an abolition of risk
assessments as if they were only bad. Rather, improvement could be sought
in reconsidering how risks are made present and whether technological, pro-
fessional, and organizational elements could be arranged differently, such
that they present those risks in ways that invite reflexivity and awareness of
the side effects showcased in this chapter.
NOTES
REFERENCES
lance as care and control and the complex negotiations that the children
and parents we talked to undertook with respect to both access to and use
of online media. Third, I turn to the panoptic surveillance our participants
experienced at school and explore their perceptions of the impact of this
surveillance on their ability to use networked technologies to enhance their
learning.
As noted, our participants in 2012 to 20132 enjoyed the ways in which net-
worked communications enable a playful engagement and experimentation
with different ways of being online. For example, our 11- and 12-year-old
participants searched for information to learn more about things they would
encounter in the future, like high school and jobs, and saw this as a safe way
to ‘rehearse’ the roles they would play as teens and adults. Our teenaged
participants relied heavily on various media to express themselves, commu-
nicate with friends, explore their interests, keep in touch with family, and
generally figure out who they wanted to be when they grew up.
A large part of the appeal of networked technologies for all age groups
was the visibility they provide. A number of researchers (Peter, Valkenburg
and Fluckiger, 2009; Phillips, 2009; Shade, 2011; Draper, 2012) suggest that,
by monitoring how others respond to their online personas, young people
are able to evaluate their various identity performances. This allows them to
co-produce their subjectivity through their interaction with others who mir-
ror back their performances for them to see (Mead, 1934; Goffman, 1959).
From this perspective, their online identities are fluid (Giddens, 1991) and
tied to an ongoing project of “writing the self into being” (boyd, 2007).
The concept of lateral surveillance (Andrejevic, 2005), in which peers
monitor peers and are monitored in turn, is a particularly important ele-
ment of this kind of reflexive identity construction and performance, espe-
cially for our teenaged participants. Ninety-five percent of the 17-year-olds
we surveyed had a Facebook account, and 72% read or posted on friends’
social network sites at least once a day or once a week. Thirty-nine per-
cent of all survey respondents indicated that they slept with their cell phone
next to them in case they received messages during the night. The teenagers
Swimming in the Fishbowl 127
we interviewed saw this as a way to monitor the ‘drama’ that unfolded
when they were not at school, and indicated that they used their networked
devices to keep an eye on peers throughout the day and night.
Much of this lateral surveillance was playful in nature. Our participants
knowingly slipped in and out of the online gaze to play jokes on each other
and enjoy themselves. Pranking—setting online traps for someone or misdi-
recting them to a joke site—was a common activity,3 especially among boys.
Although pranking was “just for fun” (Steeves, 2012a, 28), it was also a
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
I just don’t take stupid pictures that I know could ruin my reputation,
or something.
(ibid., 33)
Of our survey respondents, 91% reported that they used privacy settings
to block someone from seeing the photos they post, and most of the persons
blocked were known to the respondents. Of the people being blocked, 31%
were friends, 20% were people they had stopped being friends with, and
20% were people they knew but with whom they were not friends.
They also closely monitored their peers’ sites to see how they were being
portrayed by them. Forty-five percent of our survey respondents indicated
that they had asked someone to delete something that person had posted
about them because they did not want someone else—especially friends
(21%)—to see it. The young people we interviewed told us they routinely
‘de-tagged’ photos of themselves so they could retain control over the dis-
tribution of their image. Accordingly, this lateral surveillance enabled them
128 Valerie Steeves
to see how they were being portrayed and to take proactive steps to protect
their online image. As one 15- to 17-year-old boy said,
Keeping something off social network sites and away from the lateral
surveillance of peers was therefore a way of signalling closeness and
trustworthiness.
Lateral surveillance among peers accordingly played a variety of func-
tions. It provided access to an audience for the purposes of identity construc-
tion, in the Meadian sense, and opened up spaces for fun and playful teasing.
Although it magnified the potential consequences of a failed performance,
it also enabled our participants to monitor how they were represented by
others and respond in ways that allowed them to publicly repair their repu-
tations. It further served to demarcate intimacy when images shared with
trusted friends were kept out of the surveillant gaze and stored ‘privately’ on
media such as mobile phones.
notes, a child learns how to enter into trusting relationships with others by
relying on “the good will of others . . . such as parents, caregivers, friends
and strangers in a variety of ways to care for and protect them” (Rooney,
2010, 346). Having opportunities “to trust and be trusted” are an integral
part of learning “how to be with others in a way that supports [children’s]
capacity to live and live in a meaningful way.” Accordingly, children need to
learn to “trust with good judgment,” actively negotiating situations in which
they can rely on others and situations in which distrust may be an appropri-
ate response to some potential harm (Steeves, 2012a, 347). She concludes:
17-year-old girl’s comment that, “My mom keeps on [posting] me, ‘You’re
on Facebook! Get off! Do your homework!’ And I’m like . . . de-friend”
(17), was met with both commiseration and a flurry of stories about evad-
ing the parental gaze online. Even many of our youngest survey respondents
felt that parents should not force their children to friend them on social
media sites (56%) or read their texts (44%)7 and took steps to avoid being
watched. Sharing their passwords was one thing; having their parents con-
stantly looking over their shoulders was another. This is in keeping with
Valentine’s (2004) observation that young people make their own decisions
about risk and disrupt the kinds of controls parents put in place to protect
them from risk.
But concerns about online privacy from parents were particularly acute
for our teenaged participants. Communication with friends was a central
part of their lives, and they enjoyed the way networked tools gave them a
deep sense of connection with their friends (Licoppe, 2004; Shade, 2011).
They also articulated a strong need for autonomy from parents so they could
better explore the “public–private boundaries of the self” (Peter, Valkenburg
and Fluckiger, 2009, 85) and be free to experiment in ways that were dif-
ficult in offline contexts (Livingstone, 2009, 91). They felt that constant con-
nection to parents also made it difficult for them to accomplish the central
tasks of adolescence to
There should be a point where parents will just like, leave you alone and
not have to know every single thing about you. Like I get, the protection
side, but they don’t need to know every single thing about you.
(Steeves, 2012a, 18)
as older siblings or cousins, to monitor their child online and report back
to them, creating a hybrid form of surveillance that was both hierarchical
and lateral.
Although all our parent participants were uncomfortable with this level
of scrutiny, almost all of them felt they had little choice because surveillance
was perceived to be a necessary tool to protect their children from their own
poor judgment. This exchange was typical:
Who was it that said you had spies out there? I have nieces [who] will
write to [my daughter], even call me to say, “uh, tell her to change . . . her
wall, her status, or whatever,” so that’s good.
(Steeves, 2012a, 14)
Others spoke of the need to read every text, every social media posting,
and every email to make sure their child was not in a position to make a mis-
take. Accordingly, just when teenagers were asking for more freedom from
the parental gaze—precisely so they could make their own mistakes—many
parents were increasing the level of online monitoring in order to shut down
any possibility of their child behaving poorly. Parental surveillance accord-
ingly moved from monitoring for protective care of a child at risk of harm
from ill-intentioned others to monitoring for behavioural control of a child
that was a source of risk himself or herself.
From our teenaged participants’ perspective, this kind of surveillance cre-
ated a great deal of conflict and interfered with their family relationships. As
one 15- to 17-year-old said,
“I blocked my little brother, he’s like a little spy for my mother” (18).
And, after cousins of one of our 13 to 14-year-old participants ‘snitched’
on her, she told us, “the same night I go and delete them . . . then [my
mom] gets mad, she’s like ‘don’t delete your family members.’ I’m like,
well, tell them to stop stalking me.”
(18)
My mom trusts me enough to, like, actually bring a guy home, like one
of my guy-friends home? But she doesn’t trust me enough to like, have
him up on Facebook, which kind of makes me depressed.
(19)
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
They told us that this kind of surveillance made it more difficult for
them to express themselves online and explore their various roles as friend,
romantic partner, and emerging adult because online performances for their
peer audience would often unintentionally become visible to their family
audience. This meant they were often held to account for comments that
were taken out of context or seen as more dangerous because they were
made online or by text. This in turn disrupted their “ability to disclose pri-
vate information in appropriate ways and settings” (Peter, Valkenburg and
Fluckiger, 2009, 83), both with their peers and with their family members.
Rooney’s work on trust is particularly relevant here. She argues that young
people must not only learn to trust others; they must also learn how to be
Monitoring at school was pervasive and often posed problems for the young
people we interviewed as they sought to complete their schoolwork. Not
only was certain content blocked, but their online communications with
peers were closely scrutinized, and they were held to account for interactions
they interpreted among themselves as harmless. Moreover, they were given
Swimming in the Fishbowl 135
little to no opportunity to explain themselves if one of the technical controls
indicated they had done something they were not allowed to do.
Our participants were most vituperative about this kind of panoptic con-
trol. They both actively resisted it (e.g. sharing technical fixes to get around
filters) and questioned the school’s need to police their every word, to make
sure they did not ‘swear’ or say something ‘inappropriate.’ From their per-
spective, the school should give them access to networked technologies with-
out placing them under surveillance and, instead, rely on teachers to help
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
But then, again, we’re supposed to write every day everywhere else,
except for school. What’s the big deal if we do exactly what we do
at home, at school? . . . Teachers should be allowed to read what we
write, and if it’s inappropriate, they can make us take it down, but they
shouldn’t just block us out from it, that is our own right.
(Steeves, 2012a, 21)
This form of panoptic surveillance also took away the teachable moments
in which teachers could help students learn to act as good digital citizens. A
teacher from Western Canada put it this way:
It’s not like all of a sudden you hit 18, and now you can have autonomy.
I mean, children do not learn to make good choices by being told what
to do and follow instructions. And, unfortunately, they have to be given
the opportunity to make bad choices as often as good choices. And they
need adults to be the saving, caring allies that we need to be to help them
make [good choices], to learn from their mistakes.
(12)
need to trust you in order to take risks . . . being able to answer ques-
tions and know that if I get a wrong answer, that’s okay, they won’t
laugh or make fun of me. That’s risk taking for some students. That’s
a big risk.
Interestingly, both the young people and the teachers we talked to indi-
cated that the panoptic surveillance they both experienced in school was the
most difficult to negotiate, because they had very little control over the gaze
or input into how their actions were interpreted by the school administra-
tors that monitored the use of the system.
CONCLUSION
Our research findings suggest that the young people and adults we talked
to have a complex relationship with networked technologies and continu-
ally negotiate the degree of monitoring young people are subjected to in the
socio-technical spaces they inhabit. Young people are attracted to networked
spaces because of the visibility they provide, but the monitoring they experi-
ence in these spaces makes it difficult for them to draw lines between their
various audiences and attain the level of privacy they desire. That lack of
privacy also detracts from their ability to enter into relationships of trust—
particularly with parents, teachers, and other family members but also with
friends—which in turn complicates their attempts to meet the developmen-
tal objective of individuating and ‘growing up.’
Moreover, young people’s experiences of monitoring involve different
kinds of surveillant relationships, each of which offers different opportu-
nities for freedom and control. Lateral surveillance among peers is highly
nuanced, both opening up opportunities to reflexively perform a variety
of social roles and potentially magnifying the consequences of failed per-
formances. Self-representations are accordingly carefully crafted on and
through social networks, and young people rely upon friendships within
these networks to help them manage how they are perceived and under-
stood, particularly in these contexts.
Negotiations between young people and parents are particularly com-
plex, as parents seek to balance surveillance as care with surveillance
Swimming in the Fishbowl 137
as control. This balance becomes more challenging when children enter
adolescence—when young people seek a greater degree of privacy from
parents so they can explore their identity outside the family. However, this
is also when many parents feel they should increase the level of monitoring
to ensure that their children do not engage in relationships or practices that
they see as inappropriate or dangerous. Again, failed performances are seen
as more problematic because they take place on networked media and can
be reproduced and distributed widely. In addition, the ubiquity of being
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
NOTES
REFERENCES
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
INTRODUCTION
Children in the Netherlands and elsewhere spend ever more time online
using various new media devices and applications to help them with their
homework, to play games, and to communicate with friends and family.
As Van der Ploeg and Pridmore discuss in the Introduction to this volume,
digitization and automation processes pervade nearly all social, political,
cultural, and economic domains in advanced industrialized societies, affect-
ing people in their various roles as citizens, consumers, and workers. Chil-
dren, as future workers, proto-consumers, and citizens-in-the-making, are
a particular focus of attention. On-going public debates about children’s
use of new media can be divided between those who draw upon discourses
of ‘celebration’ and those who draw upon discourses of ‘concern’ (Drotner,
2011). Kirsten Drotner explains that in the celebratory discourse, children
are perceived as media savvy, as pioneering experts, as digital natives, while
discourses of concern focus on the content-, contact-, and conduct-related
dangers possibly posed by new media (ibid.; see also Livingstone, 2009,
and Hasebrink et al., 2008). This distinction opposes an optimistic image
of children and their relationship with new media technology with a more
pessimistic and fearful image of the role new media technologies play in
children’s lives. Both views contain a dualistic picture of children as being
either media savvy or vulnerable (Buckingham, 2011) and a dualistic view
of new media technology posing either opportunities or risks (Livingstone,
2009). Either way, whether describing savvy or vulnerable children and
portraying technologies as offering opportunities or risks, it is increasingly
seen as necessary to educate children about the possibilities of new media.
In these contexts, new media is either seen as a medium for creative self-
expression, public participation, and cultural heritage or as a means of
encountering harmful or offensive content and people (Lunt and Living-
stone, 2012). This suggests another dualism, one that includes advocates
for empowerment versus those with a more protectionist take on media
education (Hobbs, 2011).
Makers of Media Wisdom 141
While the need for education in itself may be undisputed, these opposing
positions make it less clear which approach should be used and how ‘respon-
sibility’ should be distributed amongst all those involved, including par-
ents, teachers, and librarians as well as those more removed from children’s
daily lives, such as policy makers, private corporations, and the various
non-governmental organizations (NGOs) developing digital material aimed
at children. There are also many terms circulating that attempt to capture
the knowledge and skills assisting people to use, interpret, and produce
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
As described, in the early years of the 21st century, there were already several
terms in circulation, aimed at capturing and addressing the problems faced
by children in learning to use and in using advanced digital technologies.
Nonetheless, in its advisory report to the Dutch government in 2005 titled
Media Wisdom: The Development of New Citizenship (Raad voor Cultuur,
2005), the Dutch Council for Culture (Raad voor Cultuur: RvC) decided
not to use either ‘media education’ or ‘media literacy’ but to use ‘media
wisdom’ instead. According to the RvC, media education in the Netherlands
had been passive, defensive, and narrowly focused on youth and formal
education. It wanted to move away from such a protectionist approach. The
RvC claimed that Dutch society is saturated with media and that citizens
have to be(come) ‘media wise’ in order to be able to participate in various
domains, ranging from healthcare, leisure, and the labour market to poli-
tics, education, and commerce. It defined ‘media wisdom’ as: “The whole of
knowledge, skills, and mentality by which citizens can consciously, critically
and actively move within a complex, dynamic and fundamentally mediated
world” (Raad voor Cultuur, 2005, 2). It further stressed that the purpose
of ‘media wisdom’ is not just dealing with media as such but participating
in wider societal processes (Raad voor Cultuur, 2005). ‘Media wisdom,’ the
RvC argued, would provide a much broader perspective than media educa-
tion. The RvC noted that citizens were dealing with various technological
and societal developments, contributing to new forms and practices of citi-
zenship. It described a move from a welfare state to a society in which the
government increasingly calls upon citizens’ self-reliance in various areas for
which they need to use digital media. In light of such developments, citizens
need “tools and expertise to shape this responsibility in a satisfying way for
themselves and society” (Raad voor Cultuur, 2005, 3). They needed to be
able to participate in the societal process so that social exclusion and the
emergence of a ‘digital divide’ would be prevented, related to differences in
media use and skills. In other words, citizens needed to be ‘media wise’ in
order to fit this ‘new citizenship.’
The RvC stressed that the government has a duty of care for enhancing
such media wisdom in citizens. It did not propose to make media wisdom
obligatory in formal education, but it did suggest that it should be consid-
ered part of a school’s citizenship education and of the curricula for training
teachers. It also recommended that schools could hire media coaches to
promote the coherence of media wisdom within educational programmes, to
146 Isolde Sprenkels and Sally Wyatt
guide other staff members, and to initiate media projects. The RvC empha-
sized that media wisdom should not only be part of formal education but
also of the tasks and practices of public media, cultural organizations, and
public libraries. Prior to this point, initiatives had been made within all these
sectors, but there was no shared policy.
The RvC considered it “of great importance to concentrate on enlarging
media competences, or rather: media wisdom of citizens” (Raad voor Cul-
tuur, 2005, 13), emphasizing the competences and skills needed for media
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
wisdom. The definition provided by the RvC makes this clear: “media wis-
dom is the whole of knowledge, skills and mentality by which citizens can
consciously, critically and actively move within a complex, variable and
fundamentally mediated world” (Raad voor Cultuur, 2005, 18). Knowl-
edge includes that which is “needed to interpret media messages, the aware-
ness that media content is constructed, the ability to detect which interests
or value systems are steering them” (Raad voor Cultuur, 2005, 19). Skills
include “the ability to watch, being able to choose, and to control buttons”
(Raad voor Cultuur, 2005, 20), so that one could not only consume but also
produce media content. Mentality has to do with “citizens’ awareness of the
way they use media, and the effect that has on themselves and others” (Raad
voor Cultuur, 2005, 2).
Most media literacy definitions contain similar items relating to people’s
knowledge and skills, helping them use, interpret, and produce media.
Mentality, on the contrary, is a more specifically Dutch element. The most
striking difference in this RvC document is the use of ‘wisdom,’ wijsheid in
Dutch, instead of the more widespread geletterdheid, the usual translation
of ‘literacy.’ The RvC justifies its choice in a single sentence, which reads,
“the more commonly used media geletterdheid is more suitable, but not
preferred by the RvC due to its linguistic associations” (Raad voor Cultuur,
2005, 18), arising from the analogy with print literacy, namely the ability
to read, write, or produce text. The RvC deliberately chose the term ‘wis-
dom,’ which it felt was broader than literacy. ‘Wisdom’ carries connotations
with various philosophical and religious perspectives dating back to ancient
classical and biblical times, namely “the ability to use your knowledge and
experience to make good decisions and judgements” (Cambridge Dictionar-
ies online). This matches the perspective of the RvC on media wisdom as
an on-going process that citizens continue to develop, in contrast to a more
binary take on literacy in which one can or cannot read and write at a basic
level. Literacy is taught in school from an early age, provided for by the gov-
ernment, through the right to education (United Nations, 1948). This is not
the case for media wisdom, which, we argue, carries a different connotation
in relation to responsibility. Through the education system, the government
is primarily responsible for teaching literacy but not for developing lifelong
media wisdom. As will become clear in the following pages, media wisdom
has not been made compulsory in education. This worries Terry, editor-
in-chief of one of the first Dutch websites on parenting and editor-in-chief
Makers of Media Wisdom 147
at a knowledge centre for youth and (digital) media, focusing on schools,
parents, and the media industry. She claims:
Terry worries about this. She compares media wisdom education with
teaching children how to read and write, and raises concerns about the emer-
gence of an illiterate citizenry and all the concomitant consequences:
Even though the RvC chose ‘wisdom’ and not the Dutch equivalent gelet-
terdheid, Terry associates media wisdom with print literacy on the level of
knowledge and power differences, connecting it with societal disadvantage
and exclusion.
The Dutch government did follow up on some of the recommendations
of the RvC advisory report. In a response to the RvC’s advice, the Minister
of Education, Culture and Science acknowledged the importance of media
wisdom, arguing that a mediated society leads to different relationships
between media and citizens, government and citizens, and citizens and busi-
ness (Hoeven, 2006). The minister advocated cooperation and knowledge
exchange within networks and organizations already dealing with media wis-
dom in one way or another. After the report, numerous initiatives concerning
media wisdom were undertaken, including the development of courses and
teaching material and the organization of workshops. However, the minister
criticized this proliferation of initiatives for its lack of coherence. To address
this, the ministry organized a conference together with the RvC in 2006 in
order to search for “the meaning and impact of the media wisdom concept
which is difficult to grasp” (Ministerie OCW, 2006, 1). It became clear, per-
haps for the first time, that there were some difficulties with the concept, that
it carried many connotations, meanings, interpretations, and practices. The
conference “had people from various sectors and disciplines discuss the topic
at different levels of abstraction in contact with each other” (ibid.).
The Dutch Cabinet published its vision on media wisdom, called Medi-
awijsheid, three years after the RvC’s report (Plasterk and Routvoet, 2008).
It cites the RvC’s broad definition in one of its footnotes, but the notion of
‘media wisdom’ had changed. In the introduction, the cabinet states that
it wants to foster safe and responsible media use by equipping citizens to
take advantage of the opportunities new media are said to offer and to deal
148 Isolde Sprenkels and Sally Wyatt
with the risks they are assumed to pose and to stimulate a safe media envi-
ronment, using self-regulation and a system of complaints for parents and
other carers. Immediately following this, it states that the focus of media
wisdom is no longer on all citizens but on youth, their social environment,
their media use, and positive and negative media effects. The target group for
media wisdom initiatives was narrowed down, and the goals had changed. In
addressing media wisdom, the cabinet took up the RvC’s concept but trans-
lated it in such a manner that the meaning of the concept changed, as did
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
the target group, government policy, and implicated actors. In other words,
a new configuration emerged of practices, policies, social actors in which
media wisdom is enacted into being. Youth and their wider social environ-
ment including parents, teachers, and other carers became top priority. Media
wisdom became connected to media effects and the ways in which parents,
other carers, and media producers play a part in guiding children’s media
use. In a way these actors were turned into guardians of media wisdom. The
government itself also carried out a protectionist-oriented policy, for instance
through its involvement in public broadcasting, providing support for media
self-regulation and rules and regulations to protect (young) media users.4 It
also stimulated research on the topic and supported media users in critical
and conscious media use. The latter would become a task of the media wis-
dom expertise centre the cabinet suggested starting, which had as a goal to
bring together various media wisdom initiatives mainly focusing on support-
ing youth, parents and other carers. According to the cabinet, the mission of
the media wisdom expertise centre was to strengthen media wisdom within
society through first focusing on youth, parents, carers, and teachers in order
to empower youth, to help them use media wisely and actively.
In this section, we have outlined how the concept of ‘media wisdom’
emerged in the Dutch policy landscape, how it changed from being a broad
concept capturing a lifelong process of learning to something aimed primar-
ily at empowering young people by those responsible for their development
and education, as well as protecting them by particular provisions and regu-
lations. In the next section, we turn to the many organizations that took
up the concept in myriad ways, focussing on its empowering connotations,
giving examples from different sectors.
As mentioned in the previous section, one of the initiatives of the Dutch gov-
ernment was to establish a media wisdom expertise centre bringing together
the variety of existing initiatives related to media wisdom. Funded by the
Ministry of Education, Culture and Science, this networking organization,
named Mediawijzer.net, Media Wiser in English, started in 2008 in order to
strengthen media wisdom in society, with a primary focus on youth between
2 and 18 years of age and their carers and teachers.
Makers of Media Wisdom 149
Mason, a colleague of Terry, and director of the knowledge centre on
youth and (digital) media, mentions that “Mediawijzer.net has been initiated
to prevent fragmentation. I have the idea that fragmentation has grown.”
He connects this fragmentation with not making media wisdom obligatory
within the formal education system:
Mediawijzer.net is not to blame for that, they do a terrific job, they also
connected many people together, strengthening the network. A regula-
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
tion to stimulate projects has led to many beautiful initiatives. But the
theme is not being concretized by the government, it is not a compulsory
section of education, so the market can do with it as it likes.
Since its start in 2008, more than 900 network partners (Mediawijzer.net,
2014) are part of Mediawijzer.net, and this keeps increasing. “This network
should form a representative reflection of the breadth of the media wisdom
concept in combination with its target groups” (Mediawijzer.net, 2010b,
28). Anyone can take part, and the variety of organizations is enormous:
primary, secondary, and tertiary education, research organizations, indepen-
dent researchers, companies engaged in consultancy and coaching in edu-
cation and IT, charitable organizations, media companies, communication
bureaus, libraries, cultural organizations including museums, and drama
and art workshop organizers, youth care, youth work. The number of initia-
tives are manifold, yet their link with media wisdom is sometimes tenuous.
For example, there is a reference to ‘autism training’ in the list. Following
the link, it turns out to be a ‘mind academy,’ offering ‘neuro-linguistic pro-
gramming training.’ Terry comments on this pluralism:
relate to the school’s curriculum or to the core goals for primary education
established by the Dutch government, whether it matches students’ needs
at a particular age, and there are no exams (Mediawijzer.net, 2013b). In
teacher training, not much formal attention is yet paid to media wisdom;
rather, those learning to be teachers need to develop their own skills and
learn how to teach media wisdom to children (ibid.). Finally, teachers in
primary education want to be kept up to date and continuously develop
their competences and skills. According to Mediawijzer.net, the learning tool
bank could offer this to them (ibid.). Mediawijzer.net has also developed
a step-plan to integrate or “embed media wisdom structurally in primary
education.”8 It offers its network partners such as libraries, museums, pub-
lishers, cultural organizations, and companies an approach to make their
products and services visible for primary education and suggests possible
activities to reach target groups, such as teachers, school boards, and the
school environment including parents and libraries. Most of its advice con-
nects with Mediawijzer.net initiatives, for instance participating in the incen-
tive funding and using the competence model in developing products.9
As the foregoing indicates, media wisdom is treated as a matter of
education—developing competences. Mediawijzer.net attempts to have this
incorporated into formal education. This time an empowering approach is
followed, contrary to the previous protectionist approach from which the
Dutch Council for Culture advised its government to distance itself. Sonia
Livingstone argues that even if media literacy would be taught in schools,
there would still be difficulties in providing media literacy for all. She starts
by sketching the difficulties relating to continuous technological change and
a need for lifelong learning. Contrary to print literacy, education at a young
age does not last a lifetime; therefore, she also discusses ways to reach adults
and some of the difficulties in doing so. But the biggest challenge she dis-
tinguishes in establishing media literacy for all is not a practical one; it is
“a fundamental point of definition, or to be precise, of mutual definition.
Media design and media literacy can be considered as reverse sides of the
same coin” (2011, 33). She argues that “difficulties experienced by citizens
are being framed as media literacy tasks when an alternative description
would point to failures of design, provision or regulation” (ibid.). She argues
that “the task of acquiring media literacy is unnecessarily burdened by the
insufficient design, planning and provision of media services and providers”
(2011, 32).
154 Isolde Sprenkels and Sally Wyatt
In support of this argument regarding failures of provision or regulation,
we claim that a strong focus on media wisdom in children, empowering or
enabling children in a variety of ways, teaching them to think and act for
themselves risks losing sight on protectionist measures, thinking and act-
ing for children, by for instance regulating media and children’s media use
through legal, social, and technical measures. For a long time, there has been
a debate in the Netherlands among media wisdom practitioners whether
children should be protected or empowered (‘weerbaar maken’). Justine Par-
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
doen, affiliated with one of the first Dutch websites on parenting as well as
a knowledge centre for youth and (digital) media, said in an online column:
technologies are also text, and the institutional purposes and culture, orga-
nizational norms and structures, and communicative design and intent are
all embedded in the very construction of the interface, as is also an implicit
conception of the user—what they know, don’t know, can and cannot do,
take for granted or need to learn. The more impenetrable, opaque or ill-
designed the text or interface . . . the more users will struggle.
(Lunt and Livingstone, 2012, 135)
NOTES
ics’ for older students instead of integrating digital literacy in existing courses.
This digital literacy should focus on ‘basic knowledge,’ ‘use,’ and ‘behaviour.’
10. www.katholiekgezin.nl/index.php?option=com_content&task=view&id=
89&Itemid=110, visited May 8 2014.
11. According to Nelly Oudshoorn and Trevor Pinch, Woolgar “suggested that
how users ‘read’ machines is constrained because the design and the produc-
tion of machines entails a process of configuring the user” (Oudshoorn and
Pinch, 2005, 8).
REFERENCES
Berg, B. & Schermer, B. (Eds.), Minding Minors Wandering the Web: Regulating
Online Child Safety. The Hague: Asser Press, 173–190.
STAR, S. L. (2010) This Is Not a Boundary Object: Reflections on the Origin of a
Concept. Science, Technology & Human Values, 35(5). p. 601–617.
STAR, S. L. & GRIESEMER, J. R. (1989) Institutional Ecology, ‘Translations’ and
Boundary Objects: Amateurs and Professionals in Berkeley’s Museum of Verte-
brate Zoology, 1907–39. Social Studies of Science, 19(3). p. 387–420.
UNITED NATIONS. (1948) United Nations Universal Declaration of Human Rights
1948.
———. (1989) Convention on the Rights of the Child.
UNESCO. (1982) Grunwald Declaration on Media Education. Grunwald, Germany.
———. (2005) Beacons of the Information Society: The Alexandra Proclamation
on Information Literacy and Lifelong Learning. Alexandria, Egypt: UNESCO.
———. (2007) Paris Agenda or 12 Recommendations for Media Education. Paris,
France: UNESCO.
———. (2013) Global Media and Information Literacy Assessment Framework:
Country Readiness and Competencies. Paris, France: UNESCO.
VALKENBURG, P. (2005) Schadelijke Media en Weerbare Jeugd: Een Beleidsvisie
2005–2010. Amsterdam: Amsterdam School of Communications Research.
WIEBENGA, F. et al. (2011) Meten van Mediawijsheid. Een Studie naar een Raam-
werk, Meetmiddelen en Toepassing Hiervan. Amsterdam: Mediawijzer.net.
WILSON, C. et al. (2011) Media and Information Literacy. Curriculum for Teach-
ers. Paris, France: UNESCO.
WYATT, S. (2005) Non-Users Also Matter: The Construction of Users and Non-
Users of the Internet. In Oudshoorn, N. & Pinch, T. (Eds.), How Users Matter.
The Co-construction of Users and Technology. Cambridge (MA): The MIT Press,
67–80.
———. (2008a) Technological Determinism Is Dead; Long Live Technological
Determinism. In Hackett, E., Amsterdamska, O., Lynch, M. & Wajcman, J.
(Eds.), The Handbook of Science & Technology Studies. Cambridge (MA): MIT
Press, 165–180.
———. (2008b) Feminism, Technology and the Information Society. Learning from
the Past, Imagining the Future. Information, Communication & Society, 11(1).
p. 111–130.
WYATT, S. et al. (2005) The Digital Divide, Health Information and Everyday Life.
New Media & Society, 7(2). p. 199–218.
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
Part III
(Mis)Behaving
Suspects and Deviants
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
INTRODUCTION
Situated Improvisations
To be sure, to insist on a critical attitude towards metaphors of vision is
not new.4 Donna Haraway is especially known for her contribution to this
project. In Situated Knowledges (1991), she argues that, with contemporary
visualizing technologies, “Vision in this technological feast becomes unregu-
lated gluttony; all perspective gives way to infinitely mobile vision, which no
longer seems just mythically about the god-trick of seeing everything from
nowhere, but to have put the myth into ordinary practice” (189). Claims
for scientific objectivity are based on a ‘view from nowhere,’ thus creating a
Data Mining ‘Problem Youth’ 167
science that is detached and totalizing. What is needed, Haraway argues, is
a commitment to situated knowledges: knowledges that are understood as
local, embodied, and partial.
Inspired by this body of work, Christopher Gad and Peter Lauritsen (2009)
suggest that social scientists with an interest in surveillance practices such as
digital identification should study them as situated phenomena. To observe
something, actors in the field of surveillance need to draw together bod-
ies of knowledge, artefacts, and human actors at a certain place and time.
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
Surveilled objects thus achieve their status in terms of the relations between
heterogeneous entities (M’charek, 2013).
I use this notion of situatedness to study zooming in as a metaphor com-
parable to Haraway’s vision metaphor of ‘seeing everything from nowhere.’
Goodwin’s work about situated improvisations (1995) provides a point
of departure for understanding how the participants of the Burgcity pilot
zoomed in on youth. Goodwin coined the term to describe how an object of
knowledge emerges through the interplay of screens, common knowledge,
lay theories, everyday artefacts, and professional repertoires (606). Impor-
tantly, with improvisation I do not refer to random actions but to actions
that are informed by bodies of knowledge, artefacts, and emerging priorities
at a certain place and time.
Following Goodwin, I will attend to talk and gestures by which the rela-
tions between these heterogeneous entities were achieved. For instance,
Goodwin describes how marine biologists highlighted the information pre-
sented to them on a screen by pointing at it with a pencil or by making
comments such as “that nice feature again” (262). In his work on archaeol-
ogy, he shows that some of the talk makes some results more relevant than
others; it sets out the conditions of relevance (1996). Furthermore, from
Goodwin’s analysis of the Rodney King trial, we learn that some actors may
use the status of their profession to influence enquiries. This is what he refers
to as professional privilege (1996).
both the company and the city were involved in an experimental activity,
making themselves vulnerable as they treaded uncertain ground.5
The pilot study’s aim, as stated in Data Inc.’s project proposal, was to
develop “more efficient and effective approaches”6 to non-criminal nuisance
and minor criminal offences committed by youth. The use of the Experian
dataset, which contains ‘lifestyle data,’ was advertised as the pilot’s main
innovative feature. ‘Marketing intelligence methods’ were to lead to new
insights into problem youth, their life worlds, and their motivations. If one
knows that the “most troublesome youth” wear Nikes, a new approach in
policy might be to involve Nike stores in a campaign against vandalism, one
of the project’s initiators argued in a 2010 presentation.
The Experian lifestyle dataset incorporates about 1,500 variables on basic
information about household income and age; interests and activities, such
as membership to a sports club; and media usage, such as Internet usage
and newspaper subscriptions. These variables also include pre-set profiles,
referred to as Mosaic groups, such as ‘free spirits,’ ‘mini machos,’ or ‘digital
families.’ The data come from sources such as property or telephone regis-
trations and surveys. Experian datasets are sold for marketing purposes, to
develop strategies for the collection of bills and debts, and to manage finan-
cial risk.
These data were combined with police data about suspects and offences
and with municipality data including variables such as age, income, and
school attendance. A remark about the police dataset is in order here. It
contains records about individuals suspected of one or more offences. Even
if police investigation has pointed out that an individual was not involved
in an incident, he or she remains registered. For the purposes of the pilot,
young suspects were used as an approximation of problem youth, which
raises the obvious issue of whether these data can really help Burgcity learn
about the group it is interested in.
Data mining was expected to help the city understand problems more
“thoroughly and quickly,” understand patterns that characterize problem
youth at neighbourhood level, identify the groups that need attention, and
identify and influence causal relations. Thus, it would allow the city’s policy
makers to “zoom in” on local youth and generate “local theories” (Inter-
view, former CEO Data Inc., November 12, 2010). In policy maker Anna’s
words, it could be another method to “reach out” to Burgcity’s inhabitants
(Interview, September 5, 2011).7
Data Mining ‘Problem Youth’ 169
Pilot Results
Prior to the pilot, Burgcity’s Department of Community Safety had already
considered data mining to improve the city’s ‘information position.’ As the
department’s information specialist put it, “data mining is definitely going to
happen in Burgcity, there is no doubt about it. The head of our department
asks me how data mining is coming along every week” (Interview, April 21,
2011). So when the department head was asked by an innovation platform
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
Surprise
The first story is about Liesbet’s question for the technology. It demon-
strates the particularities of zooming in from the city to the district level.9
Liesbet is the district manager for Molendistrict. It is her job to facilitate
communication between the central city and Molendistrict’s local politi-
cians, interest groups, and case workers. As she puts it, she defends the
district’s interests at city level. Of all the participants in the pilot, she visits
the district most frequently. This is what data mining should answer for
Liesbet:
Liesbet, Mieke and Anna take a good look at the results presented on
the LCD screen. It shows a list of numbers: the number of young sus-
pects in Molendistrict, broken down by neighbourhood. “Neighbour-
hood H, this surprises me,” Liesbet says. “Neighbourhood K makes
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
This tells us that not all results count. A result counts when it is surpris-
ing, as in the case of neighbourhood H. Surprise, in Goodwin’s terms, is a
condition of relevance for data mining. A close view is a view that is reveal-
ing. It provides a look under the surface.
Evoking
The group returns to the question of problem youth’s place of residence at the
end of the meeting. This time they take a different approach. To learn more
about the questions that neighbourhood H raises, they need to know more
about the registered suspects. Therefore, Juriaan creates a frequency table that
shows information about the suspects for offences committed in Molendis-
trict. This table is different from the previous one because it does not present
youth living in Molendistrict but youth that have committed an offence there.
Many of the young suspects come from other districts, Liesbet notes.
She points at the map: “Neighbourhood G, this is quite far away, it is in
another district.” But “distance is not so important to youth,” she adds.
Juriaan agrees: “Youth have a large radius of activity.” They look a little
longer at the list. “These are neighbourhoods with a lot of social hous-
ing,” Liesbet notes. “Indeed, one of these neighbourhoods is a weak
neighbourhood,” Juriaan adds.
(Fieldwork notes, April 7, 2011)
172 Francisca Grommé
So youth travel from other places to Molendistrict. They might come
from neighbourhoods in other districts with fewer facilities, the group adds,
and when they come to Molendistrict, they cause a nuisance.
This is the type of account that was often generated in this pilot: proposi-
tions, statements, descriptions, and explanations that loosely hang together.
An important part of producing an account of Molendistrict’s suspects is
‘evocation’; the data need to come to life and make sense, to be made ‘tel-
lable’ (see also Curry, 2004; Ziewitz, 2011). This first of all required maps.
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
During the same session described in the first fragment, Anna asks Liesbet
to show neighbourhood H on the paper map on the wall. Almost every
meeting room has one of these maps. They are large, about one and a half
meters by one meter, and detailed. They show the borders of the districts and
neighbourhoods as designated by the Dutch central government (National
Statistics Netherlands or CBS).
The map displays what the screen does not: the borders between neigh-
bourhoods, the distances between the neighbourhoods, and a detailed street
plan. The data mining software can plot the results on a digital map, but this
is an oblique map: It does not show borders and specificities. The detailed
paper map helps Liesbet locate the neighbourhood and tie it to her previ-
ous experiences: For instance, neighbourhood H is not known for conflicts
between neighbourhoods. Maps also help to fill in the particulars of the
neighbourhood. They show whether there is a park nearby, or a shopping
mall. Furthermore, they show distances, revealing that youth travel. So
pointing at a map is part of bringing the data to life.
The second, and related, part of making the data come to life is to tie
the results to policy theories, categories, and local knowledge. This might
be policy’s equivalent of what Mariana Valverde refers to as adminis-
trative knowledge in legal practices: “in-between knowledge” used by
officials that is neither scientific nor lay (Valverde, 2003, 20). When they
talk through these policy theories, categories, and local knowledges, the
results on the screen are pieced together. For instance, neither the fre-
quency tables nor the maps give information about social housing, yet
the policy officers apply this characteristic to the area on the map. Subse-
quently, they apply the notion that neighbourhoods with social housing
are poorer, and poorer neighbourhoods are more troublesome. Juriaan’s
additional remark about ‘weak neighbourhoods,’ moreover, pieces the
account together. He refers to the 40 neighbourhoods the national gov-
ernment has pointed out as the most problematic in the country in 2007
(also known as Vogelaarwijken).
My point here is not that the city’s knowledge base is not ‘scientific’
enough. Policy practitioners need at hand knowledge to do their jobs. Rather,
I argue that this mode of improvisation shows that producing such accounts
under the banner of more granularity introduces more general categories. In
this example, moreover, a neighbourhood category invokes judgments about
youth behaviour.
Data Mining ‘Problem Youth’ 173
This is also relevant for the outcome of these sessions: namely, that youth
who commit offences in Molendistrict are not from Molendistrict but from
other, ‘bad’ neighbourhoods. This outcome was partly informed by local
politics. At the time of the pilot, Liesbet was involved in a discussion about
the construction of new facilities in Molendistrict, such as practice rooms
and bars. The dominant notion was that more facilities would help reduce
complaints about youth behaviour, as youth could engage in more activities.
Liesbet reasoned that facilities might in fact cause more complaints because
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
Comparing
At the next meeting, the group returns to the theme of the Molendistrict sus-
pects. The question is how neighbourhoods within Molendistrict differ. Juriaan
performs a ‘profile analysis’—a comparison between young suspects living in
Molendistrict neighbourhoods with all inhabitants of the district. He states:
Now we see that of all persons we are looking at, all 772 [registered sus-
pects aged 23 and younger], 5.3 per cent lives in neighbourhood K. Of all
Molendistrict inhabitants, 3.4 per cent lives in neighbourhood K. This is
a difference, but not dramatically so. The difference in percentage is 1.9.
(Fieldwork notes, April 26, 2011)
“So it must be the case that city youth commit different types of
offences, whereas Molendistrict youth mostly commit vandalism,”
Liesbet argues.
Partly joking, Anna introduces what has been her main question for the
past few meetings:
“Which offences do girls that read Tina commit? Or, in other words,
can we find a relation between offences and the Mosaic [Experian]
data?” When Juriaan does not reply straight away, she rephrases the
question: “So can you say that people who own a Jaguar or whose
parents own a Jaguar are guilty of different offences than youth
whose parents drive a Mini?”
Anna finds what she is looking for: an association between lifestyle and
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
youth crime and nuisance. To be sure, she does not believe this relation to
be causal. In fact, the nature of the relationship is not relevant to her. But
if it would be possible to find a ‘segment’ of Molendistrict problem youth
that could be located in a darts club, that reads Tina, or whose fathers drive
Jaguars, she would know how to reach them (Interview, November 15,
2010).
In the meeting, Anna continues to discuss how these findings could be
used to inform policy. She reasons that, on the basis of these and similar pat-
terns on the neighbourhood level, one could initiate a marketing campaign.
One could address darts associations, for instance, to reduce vandalism.
Anna does not expect this approach to lead to drastic reductions of vandal-
ism rates; however, if offences would decrease from 100 to 80 incidents, this
would be a satisfactory result. “We can ask a marketing intern whether this
is a useful tool for a communicative government,” Anna concludes. (Field-
work notes, April 26, 2011)
Well, in marketing, it’s like this . . . When you are flyering, for instance,
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
Marketing had inspired Anna to think about lifestyles in the first place.
To Juriaan she responded, “It is the same for us, really. I mean, even if one
person is prevented from becoming a suspect or a criminal, this would be a
welcome result.” In terms of the darts club example, even if just one person
matched the darts profile, this could be interesting.
The second way in which the use of small numbers as evidence for pol-
icy was discussed comes from policing. In detective practices, a difference
between 4 and 10 provides a ‘lead.’ It means that one has a starting point
for investigation. For instance, if the profile for pickpocketing is a tennis
player that reads glossy magazines, a detective can start investigating ten-
nis clubs.
At work here are ‘professional regimes of evidence’ (Kahn, 2013): profes-
sional standards for the type of evidence acceptable as a basis for interven-
tion. In this case, the regime of evidence for policy had not yet crystallized.
Juriaan, in his role as analytical expert, had final decision-making power
over the acceptability of the regimes of evidence that were applied. In other
words, he had the professional privilege (Goodwin, 1996) to decide on this,
as he stated in the final pilot project meeting:
The question was put forward by Bart, a member of the innovation plat-
form that supported the pilot. In response to Juriaan’s question, Bart, Anna,
Liesbet, and Mieke all shook their heads.
Crime, Juriaan argued, is too serious a topic to flyer for if one can only
expect the numbers to range from 10 to 20 persons. Moreover, they could
178 Francisca Grommé
not even be certain about the actual relation between the young suspects and
the lifestyle data, as explained. Juriaan furthermore rejected the detective
logic; in the case of the Burgcity pilot, the results were not reliable enough
to justify a visit to the darts club (Interview April 13, 2012).
Zooming Out
In the final meeting, Juriaan and his senior colleague Frank argued that
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
PROBLEM YOUTH
At the outset of the chapter, I proposed that by zooming in with data mining
one, does not obtain a more detailed view of the same object. Rather, zoom-
ing in brings a new object into being. In Burgcity, profiles of problem youth
were never stabilized, that is, accepted by all participants and included in the
end report as an outcome of the pilot study. Yet we observed several tenta-
tive profiles in this case study. In the first instance of zooming in described in
this chapter, for example, problem youth were evoked with crime statistics
Data Mining ‘Problem Youth’ 179
and physical and spatial neighbourhood characteristics, such as the presence
of swimming pools. Later on, we learned how problem youth came into
being by assembling more general categories and aggregates, such as weak
neighbourhoods and city youth. When Data Inc. suggested zooming out,
problem youth were related to youth in similar neighbourhoods in other
cities; they became part of a national trend.
A particularly contentious issue is how corporate data and methods affect
government policies. The ways in which corporations categorize and dif-
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
POLICE OFFICER: Well, I think you can learn from this [the Experian
data]. Those “quiet radio listeners” will be very annoyed by kids
playing soccer outside, and they will surely call the city or the police
and say: “I can’t hear the radio because of the noise.”
LIESBET: I think you should see this as a marketing profile (. . .) It is a
characteristic of the neighbourhood, where residents use the radio
more often than the Internet.
(Fieldwork notes April 26, 2013)
CONCLUSIONS
They were taken to “be where they lived” (Curry, 2004). Because crime
policy is focused on neighbourhoods in Burgcity, categories of good and bad
neighbourhoods already existed. These labels were easily transferred to the
young suspects living in them.
Third, as the previous remark also indicates: Zooming in depended on
the application of more general categories and aggregated data. Problem
youth identities only became more particular by assembling generalities. The
categories and knowledges that were applied were normatively laden them-
selves: They told of good and bad neighbourhoods, and they were mobilized
in relation to local policy discussions about facilities (as these might attract
youth from ‘weak neighbourhoods’). Furthermore, standardized profiles
were introduced from the domain of marketing, thereby equating problem
youth identities with consumer identities. In this pilot, however, these pro-
files did not stabilize. It also needs to be noted that the policy makers did not
accept every standardized profile.
Fourth, establishing a closer look depended on decisions about what
counts as good evidence for policy practice. Two regimes of evidence were
introduced into Burgcity’s policy practice: a detective regime and a market-
ing regime. The marketing regime was appealed most to because it related
to the idea of local government as a ‘communicative government.’ Data
Inc., however, decided that government intervention needs a more ‘scientific
basis.’ Intervention on the basis of small numbers would not be effective or
justifiable. In this case, a corporation reified what it thought of as the ethics
of government intervention.
If anything, these findings point out that improving the use of data min-
ing for a better view of problem youth involves not only decisions about
which digital data to use and how much. Producing knowledge about prob-
lem youth that can inform a fair policy practice will include rethinking the
issues discussed. At the very least, it involves rethinking the relation of policy
knowledge to social science and the corporate sector.
To conclude, a range of metaphors circulates digital identification prac-
tices such as data mining. Aside from zooming in, actors use ‘connecting
the dots’ (Amoore and De Goede, 2008), ‘deep knowledge,’ and ‘obscured
knowledge hidden in the data.’ These metaphors, I suggest, help perform the
seemingly endless analytical possibilities of these technologies. We need to
attend to them as situated practices in order to change the terms by which
digital identities are produced.
182 Francisca Grommé
NOTES
REFERENCES
INTRODUCTION
“We’re thinking that maybe we are running behind [with the short-
listing method]: In some situations we are saying: ‘we cannot find our
youth on the street. The groups are not there anymore. How is that
possible?’ And then she quickly answers herself: “There is much more
contact on the Internet. They play a Playstation game, all that kind of
stuff, online. They play against each other from their own homes. And
they also make more contacts [with other groups]. That’s what I want
to show: the groups are mixing . . .”
I would later find out (see below) that this insight is shared by other police
forces. What seemed to be the view of one officer appears to be spread among
186 Vlad Niculescu-Dinca et al.
more officers and more police forces with implications for their approach
to the phenomenon.
For Officer Bart, the Internet strategist of the police force, not seeing the
groups on the streets is not a reason to let them pass without surveillance
but to put more effort into monitoring them on social media. Even if they
are off the street, he thinks that they merely changed their way of setting up
whatever they used to do:
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
“That’s what you get on the Internet. You do not see that many youths
hanging out on the streets anymore. Normally [the problematic activ-
ity] was brewing: okay, they sit at the bench, talk, and then do it! And
now there’s nobody at the bench. But they’re still making contact, trying
to communicate [through social media]. And that’s the different thing.
Normally, we used to know the group by seeing them: okay, there they
are. But now, where are they?”
“You can’t get a big net on the Internet, 24 hours a day . . . You will
violate privacy; you will violate all legal restrictions. I strongly believe
you shouldn’t do that. It should always be case related.”
“[The solution] lets user A only look at public Facebook profiles and
lets user B, because he has a lot more possibilities from a legal point
of view, get behind the front door of Facebook. This should always be
clear: when does the technology decide to do that and how does the
technology do that; otherwise it’s very scary stuff!”
Together with the views of Anna, Bart, and others and with observa-
tions about officers working on cases of ‘problematic youth groups,’ I take
a closer look at the hidden normativities of these technologically mediated
policing practices.
Sorting (Out) Youth 187
First I provide a more elaborate context, giving an account of policing
‘problematic youth groups’ in the Netherlands and of the evaluation report
of the crackdown approach. The next section outlines the analytical stance
of the chapter. It shows the ways in which actor-network theory (Akrich and
Latour, 1992; Bowker and Star, 1999; Law, 2009) is particularly relevant for
understanding how youth group classifications, their statistics, problematic
character, suspicious behaviour and the very notion of ‘youth group’ are
constructed or performed within technologically mediated practices. The
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
For decades, the issue of ‘problematic youth groups’ has been addressed by
the police in the Netherlands. These youth have been a major source of irri-
tation for many Dutch citizens due to their loud noise, street nuisance, graf-
fiti, disrespectful and intimidating behaviour, and criminal activities. The
terminology and definitions, however, changed over the years. Terms such
as ‘jeugdbendes’ or ‘gangs’ were sometimes used but also avoided. When
avoided, they were criticized for not capturing the variety of behaviour and
for not being adequate for the Dutch situation, bringing too much reference
to stereotypes of American gangs (Frank van Gemert, 2012). Over time, the
issue of definitions had consequences for policies, influencing the view on
the statistics and approach to the phenomenon. For instance, Spergel writes:
“Definitions determine whether we have a large, small, or even no problem,
whether more or fewer gangs and gang members exist, and which agencies
will receive funds” (Spergel, 1990, 177, quoted in Frank van Gemert, 2012).
In the past decade, the more neutral definition of ‘problematic youth groups’
has been adopted in official reports (Bureau Beke, 2009), and since 2009,
all regional police forces in the Netherlands are required to centralize the
statistics from their area.
188 Vlad Niculescu-Dinca et al.
The shortlisting method enables the police to have a more fine-grained
characterization and classification of youth groups, depending on their
street-related behaviour and activities.4 Besides their type, groups are
characterized by the location(s) where they are seen by patrolling officers
(who usually give the group a name based on this location), composition
(size, ethnicity, age range), daily activities, risky habits (alcohol and drug
use), and recent criminal behaviour. This information is fed into forms
by the officers on the beat. To shortlist a group, the method specifies that
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
there must be repeated nuisance on the street, caused by more than two
members, and the groups must be more than ‘virtual groups, active on
the Internet’ (Bureau Beke, 2009, 18). New members or youth that are
seen together with the group are registered as well upon encounters with
the officers on the beat. Once sorted, the police begin registering their
activities with geospatial technologies in order to maintain a view on the
phenomenon.
and Justice (Van Montfoort, Office Alpha and Dutch Youth Institute, 2013)
evaluated the crackdown approach on criminal youth groups. It concludes
that the multi-level approach is generally on a good track. Drawing from the
annual statistics (Bureau Beke, 2013), it reports a decrease in the number of
youth groups that were listed as problematic.
As Figure 9.1 indicates, the report shows a drop in the number of cases
in all categories. Split by category, this is a drop from 92 to 59 ‘criminal’
groups, from 327 to 186 ‘nuisance’ groups, and from 1341 to 731 ‘annoy-
ing’ groups. Despite the drop, the report recommends further measures to
2000
1800
1600
1400
1200
1000
800
600
400
200
0
2009 2010 2011 2012
Classifications not only organize modern life but also lie at the base of
many statistics and surveys of various kinds. Things and people alike are
often categorized and counted at the same time. Statistics based on various
classifications also have normative consequences when taken up in policy
making and translated into action as descriptions of reality. Building also
on Foucault’s practical archaeology, John Law (2009) argues for a perfor-
mative understanding of social science methods. That is to say, rather than
merely describing reality, the methods through which statistical knowledge
is produced also enact these realities into being. Instead of only reporting
on phenomena, the methods make them into ‘realities.’ For instance, in our
case, the police are the ones filling in the forms that entail sorting youth
groups into one category or another and, at the same time, they are the ones
responsible for sorting out problematic behaviour. Their classifications and
conceptualizations produce in a way the phenomena, while the aggregation
of numbers about these classified entities performs them at that level.
Therefore, this section looks more closely to these classification and mapping
practices that precede monitoring. It illustrates the various translations occur-
ring between ‘groups hanging out on the street’ and the entities they work
with on their computer screens, which become the focus of policy making and
intervention. The section draws from interviews and participant observation
sessions with two officers—renamed Dirk and Erwin—in their daily routines.
In policing problematic youth groups, the Dutch Urban Police (DUP)
use a geographic information system to map the incidents in their area. The
system draws from data registered and stored in police databases. Amongst
other possibilities, it allows the registration and visualisation of the groups
and the individual members related to them, representing these groups
with colour-coded icons that correspond with the gravity of their offences
(‘annoying’ with grey, ‘nuisance’ with orange, and ‘criminal’ with red).
When asked about his tasks, officer Dirk explains how youth groups are
represented in their systems and how this helps him get a clear view of the
phenomenon.
“So when I go to the group [Officer Dirk points to an icon on the screen],
what it shows is the location, the last location known, that the officers
Sorting (Out) Youth 193
on the beat put in. I know that mostly they hang out there. [. . .] So the
data they put in is shown here: the name of the group, the sort of group,
whether they are criminal or annoying or nuisance.”
maps can also display hotspots of various crimes, enabling analysts to form
a picture of the phenomenon and potentially relate it to a group’s activity.
“After a while we also identified the group here [Officer Dirk points to
an area on the map designating another department], in the neighbour-
hood of some bars and we saw a pattern of vandalism from here to here
in the same time that they normally gathered here. So, by identifying the
group here and here and knowing the timestamps, you could also iden-
tify them as the probable perpetrators of this vandalism trail . . . With-
out any analyses, we saw that it could probably be the group responsible
for that trail.”
Working in front of his screen when drafting his analysis, Officer Dirk
needs to rely on the information put in by field officers, ‘always bound to
a location,’ and on maps produced by the system. What he visualizes are
the coded entities on his screen. Their mapping is contingent upon a set of
factors that need to be aligned in order for the system to make these groups
visible. This depends on officers on the beat, who translate whatever they
see on the street into program fields; the officers need to have ‘a group,’ ren-
dered as a stable entity; they need to translate the place they saw the group
into the location marked in the system as the field designating the place
they usually hang out. Highlighting this process shows how the phenomena
in the street are translated into other, software-enabled entities visible on
computer screens.
As it turns out, this process faces a set of challenges that give a good
glimpse into the technologically mediated character of this work. The fol-
lowing quote is taken from a participant observation session with Officer
Erwin, who needed to do an analysis of the situation of problematic youth
groups in his area. He was about to issue a report showing a spike in ‘nui-
sance,’ based on generated statistics. After I questioned him on the probable
reasons for the spike, Officer Erwin searched and read the database registra-
tions to try to understand. He soon needed to discard the report after find-
ing that many registrations were categorised as ‘nuisance’ when other codes
were more fitting, designating lower offences:
“It’s good that we looked into that. Now we know. [. . .] They are all
registered as ‘melding overlast jeugd’ (youth nuisance). It’s the same.
You see? He went without a valid ticket [in public transportation].
194 Vlad Niculescu-Dinca et al.
The problem with this kind of thing . . . I bet it’s the same [the officer
checks another set of registrations]. It’s the same. So that’s really a big
issue there. So then in fact you could say: ‘do we have a problem with
“nuisance” here?’ No, I don’t think so. Because all the registrations are
about the tickets, that they don’t buy a ticket. I just want to check the
other ones for 2011. This is another one: ‘Young guy was sitting with
his feet on the opposite chair.’ Not allowed. So they have to find another
incident number to put this in the system, because this is really screw-
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
ing up the numbers like crazy. [. . .] So this really changes our view on
nuisance. Same. [. . .] Oh my God. This means in fact that I can throw
the whole analysis down the drain.”
The quote does not merely highlight that there are challenges in working
with police systems but illustrates how systems enact certain realities. In this
case, the report showing a significant increase of ‘nuisance’ in that area clas-
sified ‘people that go through the gate without a valid ticket’ as ‘nuisance,’
which designates a higher level of criminality than would be appropriate for
free riding. As Officer Erwin mentions, this proved to be a repeated clas-
sification problem and consequently a counting issue, which affected their
view on the phenomenon, performing it in a category that entails the need
for more intense monitoring.
These situations point out some of the contingencies involved in the socio-
technical processes in the police, through which ‘groups’ are classified and
mapped. Without inferring from this reduced set of examples that national
statistics are affected, the section does remind us that what we count are
software-enabled entities, prone to partiality and ambiguity (Gerson and
Star, 1986). And it is these entities that lie at the basis of intervention and
monitoring.
In fact, the Internet monitoring procedure in the DUP force specifies that
‘having a group’ in the GIS is the starting point. Agent Anna, whom we met
in the beginning of this chapter, explains the necessary condition to begin
her monitoring tasks. She has to
“always have the group, like this [she points to an icon of a group on
the screen], always start with a group that’s already in the system.”
Being practiced within a proactive approach, there is no need “to have
criminal offenses, but use it as an information source.”
to changes in the societal structure, but remains the same in volume. The
notion makes officers more prone to translate the absence of criminal activi-
ties into their shifting to other places, times, tactics, or types.5 The quote of
Officer Bart at the beginning of the chapter is indicative of the way in which
the displacement hypothesis is sometimes taken up at an operative level. Not
encountering a certain phenomenon (in this case youth hanging out at the
street corner) leads the officer to use displacement for explaining the change.
The quote performs youth groups as still ‘out there’ setting up their activi-
ties, which continue to be of a criminal nature. Thus the underlying assump-
tion of this theorization of crime dynamics is that crime among these youth
remains a constant. In this way, it becomes an argument to increase the
distribution of resources towards monitoring these youth on social media.
Once engaging with this practice, officers look at individual group mem-
bers to interpret various indicators specific to social media in order to infer
suspect behaviour. For instance, in the following quote, Agent Anna reads
several Twitter messages, pictures, and accounts leading one to the other. The
situation is about a picture of a weapon held by a boy, who reportedly used
the picture to threaten his girlfriend. The officer traced the picture through
various social media accounts to find more pictures. Given their content, the
police decided to bring the young boy to the station for questioning:
“I follow one group on Twitter—and then there was this message about
a boy being arrested for threatening his ex-girlfriend with a weapon. It
was retweeted many times. [. . .] I found it looking into his followers on
Twitter. And then somebody had this picture of a weapon [the officer
points to a picture with a boy holding a gun]. I went to his Twitter and
I found more pictures with weapons. So, on his account I found these
pictures. I called the department and said ‘Look what I found. We have
to interrogate him again because of what I found here.’ And we should
confront him with that because he was this little boy crying and he’s
sorry and didn’t know that it was wrong to have it. But if you take pic-
tures like this, you’re very well aware of that.”
Interviewer: So he’s dangerous now?
“Well, he’s not dangerous, but . . . he deserves the attention, for sure.”
This example shows how officers engaging in SMM not only monitor
youth groups for street-related offences but assign suspicion to new kinds
196 Vlad Niculescu-Dinca et al.
of behaviour or entities. Besides looking for the risky activities specified
by the shortlisting methodology (e.g. graffiti, alcohol and drug use, street
nuisance), officers now need to interpret pictures, social media relations,
or status updates. Depending on the prior knowledge they may have, they
infer suspect behaviour from new entities with their specific normativity:
too-high numbers of ‘followers’ for the declared age, too many messages on
a topic, the clothing in a profile picture, and so forth. This kind of behaviour
is not necessarily problematic according to the shortlisting method, based on
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
which the group was included for monitoring in the first place. Still, being
related to a case legitimizes monitoring.
However, in this research, it became apparent that youth don’t always
continue their problematic behaviour. They also change their behaviour, and
spending time on social media is part of this shift. They engage in gaming,
picture sharing, sending messages, status updates, and chatting instead of
spending time on the street. Even if these activities can also generate prob-
lematic behaviour, they are not necessarily suspect in the sense defined by the
shortlisting methodology. This is also attested by Agent Anna:
“Because they are not out on the streets—or less so—makes their way
of interacting different.”
“[. . .] They are not criminal groups”
“They put everything on here. ‘Eating soup.’ ‘In a moment there will
be the match,’ they put it in there. ‘Finished with internship.’ This one’s
obviously sick, because he says: ‘being sick is the most awful thing,’ but
then with a bad word, there it is. They say they buy things, so it gives
me information about what they do.”
“When they were in a group they usually stayed for a longer time, the
changes were not that big. But now, if I check Twitter, for example, I
look at the Keizerstraat group, 35 people are in [the system] as contacts
of each other. I say: ‘I do not believe that they are really contacts in
the sense of friends.’ So I will go and search for those 35 people on the
Internet and see if I can find whether they are really having contact
through the Internet and whether I can say, because of the messages
they are sending, that they are friends. I dare to say that there are up
to a maximum—and it’s a real maximum—10 people of that group are
really in contact with each other.”
Besides the different group size, the following quotes illustrate that groups
are not well defined and stable but mix and merge. Although the procedure
needs to start from ‘a group,’ officers find connections with other shortlisted
groups.
“They often change more in the way they are constructed as a group.”
“[. . .] Then I saw the retweet and the retweet led me to him. And he
is not part of that group but he belongs to a different group.”
“[. . .] I believe that this group is . . . [officer stops to explain] you have
‘hinderlijk’ (‘annoying’) and overlast (‘nuisance’) . . . it’s one of these
two. The group I follow is called Koningstraat, that’s this one [officer
points to an icon on a screen]. And they are members of Hoogstraat.”
“[. . .] So the groups we had in the past, I think it’s changing. And we
cannot say in a short amount of time that this is that group, depending
on that location. They are less location dependent and the loyalty is dif-
ferent because of the contact through the Internet.”
“[. . .] I think they are dissolving in a way that they are not that loyal
to each other as they were when they were on the streets.”
sition, kinds of relations, their stability or their relation to location are enacted
differently, indicating significant transformations of the police notion of group.
This has implications for the aggregated statistics that are based on these
groups. More mingled relations may mean fewer groups. Thus, the under-
representation of social media relations in the shortlisting method leaves
room for misunderstandings when reading numbers in statistics. This is
especially relevant for the higher number of cases of ‘annoying’ groups. As
the evaluation report shows (Van Montfoort, Office Alpha and Dutch Youth
Institute, 2013), they remain the largest but at the same time the least prob-
lematic category. Their characterization, according to the method, can easily
encompass large numbers of youth that ‘hang around the neighbourhood
and are occasionally noisy or have incidental small arguments, which are
usually finished quickly.’ Their reinforced enactment as ‘problematic’ entails
the need for their further monitoring. In its turn, this practice is gaining
significant breadth and depth when amplified by the technological develop-
ments that afford increasing automation of this process.
AUTOMATING SMM
“It keeps everything. They [the social media monitoring provider] have
380.000 websites in the Netherlands. And that’s a lot. For example, if
there is an author that’s very interesting, I want to make a search for
everything the author said. [Or I can ask the program to] ‘give me a
signal whenever he’s talking ‘house party.’”
Sorting (Out) Youth 199
With such a large amount of Internet resources and power to automate
the searching and analysis, the solution is interesting for the police. But the
license to use it, Officer Bart explains, is expensive for their local police
force, and it also poses a security problem, as they need to send their queries
of interest outside the police domain, to the servers of the provider.
In part for these reasons, the Dutch police chose to develop an Inter-
net/SMM solution themselves with similar functionality. Initially aiming
for investigative purposes, the scope of the solution expanded to enable
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
“So if we get your personal information from your Facebook page and
we have no case or there’s no legal reason for us to keep this informa-
tion, it should be gone after 24 hours. If it’s not related to a case, we are
not allowed to keep it [. . .] There’s no restriction to getting it again the
next day, reanalyse it and draw the same conclusion: we’re not allowed
to keep it and throw it away.
“[. . .] As soon as you suspect that you want to investigate possible
incidents related to bike gangs or whatever, you have a case and you
have defined it as case, even if it’s not related to picking up people and
everything else. It’s just mining information and analysing information
related to a possible incident or whatever. So it’s a case, it’s always a
case.”
Thus, the practice and design of the notion of ‘case’ becomes a crucial
factor regulating what information is legally stored and what’s not. The way
a case’s scope is defined has far-reaching implications for the amount of data
that can be gathered. This is because only data not related to a ‘case’ may
qualify for deletion on a short-term basis (24 hours). The information that is
gathered as part of a case ends up stored for longer periods, and potentially
this is exposed to the scrutiny of officers.
To prevent the exposure of data to a wide range of officers, Officer Cees
mentions that there are restrictions built into the design of the technology.
Police officers are given specific regimes of use, depending on their ‘legal
200 Vlad Niculescu-Dinca et al.
profiles.’ These are specifications that limit the system’s affordances depend-
ing on each type of user:
“Their legal profile decides whether they have all the widgets or just a
few. So you can expect a policeman to have more legal possibilities than
a tax investigator or somebody at a lower government.”
“. . . [The technology will] let user A only look at public Facebook
profiles and user B, because he has a lot more possibilities from a legal
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
“Right now we’re testing on the topic of the Olympics [. . .] to see what
it’s doing with all the information related to the Olympics. I can assure
you that’s a lot, even based on a few keywords. [. . .] All the information
related to the Olympics is stored as a history. But it’s always case related.
We don’t store all the information that is not related to it.”
Interviewer: “What if in the course of a case and its development, the
boundaries of the case are changing because you acquire new insights?”
“That’s very flexible, because the investigators in control can always,
at any moment in time, add new information or add new searches or
add new source material of which they think: hey, we know something.”
CONCLUSION
ACKNOWLEDGMENTS
The research leading to these results has received funding from the Euro-
pean Research Council under the European Union’s Seven Framework
Programme (FP7 2007–2013)/Grant. No. 201853. Besides the support of
the DigIDeas project, the author wants to thank Irma van der Ploeg, Jason
Pridmore, Govert Valkenburg, Annelies Falk, Karolina La Fors, and Isolde
Sprenkels (the members of the Digideas project) and Tsjalling Swierstra for
their useful comments on previous versions of this chapter. Moreover, the
author wants to especially thank the police staff, municipality officials, and
technology developers for their generous collaboration.
NOTES
REFERENCES
De Pauw, E., Ponsaers, P., Vijver, K. V. der & Deelman Piet (eds.) Technology-Led
Policing. Antwerpen: Maklu Cahiers Politiestudies, 163–192.
BUREAU BEKE. (2009) Shortlist Methodology in Seven Steps. Arnhem: Bureau
Beke.
BUREAU BEKE. (2010) Approach to Problematic Youth Groups, Guidelines for Munic-
ipalities. The Hague: Ministerie van Binnenlandse Zaken en Koninkrijksrelaties.
BUREAU BEKE. (2013) Problematic Youth Groups in Netherlands, Extent and
Nature in Autumn 2012. The Hague: Ministerie van Veiligheid en Justitie.
CALLON, M. (1991) Techno-Economic Networks and Irreversibility. In Law, J.
(ed.) A Sociology of Monsters: Essays on Power, Technology and Domination.
London: Routledge, 134–164.
CAVOUKIAN, A. (2009) Privacy by Design: The 7 Foundational Principles. Ontario:
Information and Privacy Commissioner of Ontario.
CHAN, J.B.L. (2001) The Technology Game: How Information Technology Is Trans-
forming Police Practice. Journal of Criminal Justice, 1. p. 139–159.
CHU, J. (2001) Law Enforcement Information Technology: A Managerial, Opera-
tional and Practical Guide. New York: CRC Press LLC.
CLARKE, R. V. & WEISBURD, D. (1994) Diffusion of Crime Control Benefits:
Observations on the Reverse of Displacement. Crime Prevention Studies, 3(2).
p. 165–178.
EUROPEAN COMMISSION. (2010) A Comprehensive Approach on Personal Data
Protection in the European Union. COM(2010)609 final.
VAN GEMERT, F. (2012) Five Decades of Defining Gangs in the Netherlands: The
Eurogang Paradox in Practice. In: Esbensen, F. A. & Maxson, C. L. (eds.) Youth
Gangs in International Perspective: Results from the Eurogang Program of
Research. Dordrecht: Springer. p. 69–83.
GERSON, E. M. & STAR, S. L. (1986) Analyzing Due Process in the Workplace.
ACM Transactions on Information Systems, 4(3). Special Issue: Selected Papers
from the Conference on Office Information Systems.
HAKIM, S. & RENGERT, G. F. (1981) Crime Spillover. Beverly Hills (CA): Sage.
KOOPS, B., et al. (2012) Juridische Scan Openbrononderzoek. Een Analyse Op
Hoofdlijnen Van De Juridische Aspecten Van De Irn/Icolumbo-Infrastructuur
En Hdief-Tools. Tilburg: Tilburg University, TILT—Centrum voor Recht, Tech-
nologie en Samenleving.
LATOUR, B. (1987) Science in Action. Cambridge (MA): Harvard University Press.
LATOUR, B. (1994) On Technological Mediation: Philosophy, Sociology, Geneal-
ogy. Common knowledge, 3(2). p. 29–64.
LAW, J. (2009) Seeing Like a Survey. Cultural Sociology, 3(2). p. 239–256.
LAW, J. & MOL, A. (2001) Situating Technoscience: An Inquiry into Spatialities.
Environment and Planning D: Society and Space, 19(5). p. 609–621.
LEMAN-LANGLOIS, S. (ed.) (2012) Technocrime, Policing, and Surveillance.
Abingdon, Oxon, New York: Routledge.
MANNING, P. (2008) The Technology of Policing: Crime Mapping, Information
Technology, and the Rationality of Crime Control. New York and London: New
York University Press.
Sorting (Out) Youth 205
MCLENNAN, D. & WHITWORTH, A. (2008) Displacement of Crime or Dif-
fusion of Benefit: Evidence from the New Deal for Communities Programme.
London: Communities and Local Government Press.
VAN MONTFOORT, OFFICE ALPHA, AND DUTCH YOUTH INSTITUTE. (2013)
Evaluation of the Approach to Criminal Youth Groups. The Hague: Ministry of
Security and Justice.
OERLEMANS, J. & KOOPS, B. (2012) Surveilleren En Opsporen in Een Inter-
netomgeving. Justitiële verkenningen, 38(5). p. 35–49.
DE PAUW, E., et al. (eds.). (2011) Technology-Led Policing. Journal of Police Stud-
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
INTRODUCTION
Within the last two decades closed-circuit television (CCTV) has become an
integral part of police work in Denmark. It is used to solve a range of crimes
from murder to shoplifting and has made the police develop new ways of
thinking and acquire new competencies. Thus new practices revolving around
the use of CCTV have come into being. When police officers arrive at a crime
scene, they instantly look for surveillance cameras to see if the incident could
have been filmed. With approximately 500,000 surveillance cameras in the
country there is a fair chance that this is in fact the case (SecurityUser no. 5,
2013). At the police station the footage is handed over to technical experts
who are employed by the police and know how to retrieve and handle the
information. If some of the pictures are useful they are included in the further
investigation of the incident, and sometimes the footage is used in court as
a way of presenting what happened before, during, and after the crime was
committed or as a direct means of identification.
This chapter focuses on the actual use of CCTV footage in crime inves-
tigation. This is an interesting area of study because the use of CCTV in
police work is supported by a strong claim that the technology will make
police work much more effective (Lauritsen, 2011). The basic and often-
stated argument is that more crimes will be solved at a low cost because of
the cameras. The article treats this claim as a folk theory (Rip, 2006). Like
other folk theories the theory of CCTV effectiveness is characterized by
two important aspects: (1) It lacks empirical support but (2) still serves as
an engine for future action. Thus many important decisions and debates in
Denmark rest on the theory of the effectiveness of CCTV, and it has become
increasingly difficult for privacy advocates and other concerned citizens to
have their voices heard. If crime can be fought with CCTV, why not use it?
The aim of the chapter is to use an ethnographic study to critically engage
in a discussion of the effectiveness of CCTV in police work. Although it
cannot be concluded that CCTV is never effective, the result is nevertheless
a weakening of the folk theory. Or rather it is a more nuanced theory that
points to CCTV as a valuable tool in police work but also shows how it
often takes skills and hard work to make CCTV productive.
Identifying the Perpetrator 207
Theoretically the chapter uses the concept of oligopticon to interpret the
empirical findings. The oligopticon has its roots in actor-network theory
(ANT) but puts a specific focus on surveillance practices (Latour, 2005;
Latour and Hermant, 2006). In particular, the concept is used to stress the
networked character of surveillance. Thus an important insight is that the
working of surveillance systems depends on a plethora of actors and that it
sometimes can be difficult to align and coordinate these actors. In the pro-
cess, surveillance itself becomes limited and fragile.
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
Folk theories can be more or less explicit; this also depends on whether
or not they are challenged. They are a form of expectations based in
208 Peter Lauritsen
some experience, but not necessarily systematically checked. Their
robustness derives from their being generally accepted, and thus part of
a repertoire current in a group or in our culture more generally.
(ibid., 349)
When it comes to the use of CCTV by the police a particular folk theory
is clearly dominating at least in a Danish context. According to this theory,
CCTV is an effective tool for fighting crime. The claim is not further devel-
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
demanded that the victim gave away his hat, and when he refused, he was
killed. In the following days people tried to cope with the incident. How
could such a thing happen in a country like Denmark, and who was respon-
sible? The media looked for politicians that could be held accountable. A
newspaper asked the Minister of Justice how she would prevent such a thing
from happening again. Her answer was CCTV in public places. Apparently
nobody noticed that surveillance cameras in fact had captured the kill-
ing of the young man without preventing the incident (Dahl and Bolther,
2012). In a matter of days everybody seemed to call for more surveillance
cameras. Mayors, citizens, and members of Parliament all promised that
CCTV would soon be in place in the major Danish cities. Of course CCTV
was already there, for instance at the facades of banks and inside cafes and
shops, but now everybody wanted the whole street to be filmed with new
cameras operated by the police.
The examples clearly illustrate the theory of CCTV as effective. But one
can also see the two opposite interpretations of this effectiveness at work.
In the 1980s, politicians raised concern about the use of CCTV and passed
legislation in order to bring surveillance under control. Almost 30 years later
politicians actively pushed for more surveillance. Now the effectiveness of
the technology was seen as something that should be used in the fight against
crime.
Like other folk theories, the theory of ‘CCTV as effective’ lacks empirical
support. There is, for instance, no empirical evidence that a few cameras in
a small Danish town will lead to an Orwellian surveillance society, just as
there is no evidence that a few more cameras operated by the police will pre-
vent crime and ensure that the police will capture more criminals. However,
as Mads Borup and colleagues state, “In the case of widely shared expecta-
tions [. . .] legitimation is hardly required” (Borup et al., 2006, 289). Also,
the theory is clearly a vehicle for action. In the first example, politicians are
prompted to constrain CCTV. In the other example, they encourage the use
CCTV even more. Finally, it is interesting to note that the folk theory of
surveillance is based on a rather strong technological determinism. Along
these lines it is the cameras, although there are very few of them, which are
seen to drive society in one direction or the other. This focus on technology
has the implication that the context that is decisive for the working of the
technology is left out of the picture. In a more general discussion of tech-
nology and expectations Borup and colleagues state, “Early technological
210 Peter Lauritsen
expectations are in many cases technologically deterministic, downplaying
the many organizational and cultural factors on which a technology’s future
may depend” (Borup et al., 2006, 290). As will become clear in the follow-
ing, this is exactly what happens when it comes to the use of CCTV by the
Danish police.
when the suspect is identified or the case is completed or left unsolved. How
CCTV evidence becomes stronger or weaker through negotiations in court
is an interesting topic, but it is not dealt with here.
The police officers I encountered had a highly nuanced understanding
of CCTV. Nobody believed that CCTV can prevent serious crimes such as
homicide, rape, or physical assault, especially not in the many instances
in which these crimes are committed as an act of passion or desperation.
Neither was it a widespread opinion that CCTV would make the public
feel safer. But the police officers readily shared stories of how CCTV had
helped in solving crime. In some instances, these stories showed how CCTV
provided the police with high-quality “portraits” which made it possible to
solve the case almost immediately:
In this case pictures were used to identify the driver immediately, and the
police could simply pick him up at his home address. However, the typical
impression was that although useful and often described as a “highly valu-
able tool,” the process was often more complicated than this. This can be
seen in the following, in which a police officer presents an example in which
he thinks the use of CCTV was a success.
Whether the use of CCTV falls apart or turns out to be productive depends
on many things, but in the following three important themes are discussed.
The themes are at least partially overlapping, but they are all important to
the police when using CCTV, as they all challenge the identification of the
perpetrator.
How is the quality of the footage? One problem the police often face is
that the surveillance pictures are of low technical quality. Also, cameras are
sometimes out of order, or the incident happened outside the reach of the
cameras and hence there are no pictures at all. A truck, leaves on the trees,
or a marquee can hide the incident. In other situations the cameras may
be old and unable to film at night. It is also a common experience that the
perpetrator wears a hood or a mask and thus tries to avoid identification.
In the same manner, license plates turn out to be stolen, or they are covered
in one way or another.
Although surveillance pictures in low quality undoubtedly threaten the
effectiveness of the surveillance system, one cannot conclude, however, that
this necessarily makes the surveillance pictures useless. An experienced police
officer states,
Take the robbery of [the bank] for example. There you can see how they
crash into the building. They drive a car through the fence and three
people dash in. But the quality [of the CCTV footage] is very bad. But I
improved contrast and lighting on a single picture and things like that.
And then one could see parts of their clothing that matched clothing
found at the place where the robbers shared the plunder.
Thus, surveillance pictures are sometimes used for other purposes than
directly identifying the perpetrator. For example the police can get knowl-
edge about how a sequence of events unfolded or if there were witnesses to
the incident. Sometimes they obtain knowledge about the height and stat-
ure of the perpetrator and the clothes he is wearing. This may not lead to
identification of the perpetrator in itself, but it can be important knowledge
in linking, for instance, the clothes to the scene of crime, which can then
strengthen the evidence found by DNA or other forensic analyses.
How can the footage be used? Even in situations in which the police have
pictures of high quality of the face of the perpetrator, things can be difficult.
Often the police do not know the identity of the person in the picture, and
they have to find out. One option is then to ask the media to publish the
Identifying the Perpetrator 213
picture. However, the police do not do this automatically; this is especially
the case if they are uncertain that the picture in fact shows the perpetrator.
They do not want to blame an innocent person for a serious crime. In other
instances, the media are unwilling to publish a picture because they find
the case too difficult to explain or too small. However, recently the police
have started to distribute surveillance pictures using Twitter, but the impact
of this strategy is still unknown. Another much-used strategy is to publish
the pictures on the intranet of the police. Theoretically this will expose the
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
picture to every police officer in the country, but some police officers admit
that they seldom look at the pictures on the intranet. Knowing this, police
officers with a picture of an unknown suspect often ask specific colleagues if
they know the person. Often they do. Thus, according to the police, a num-
ber of crimes are solved because of the personal knowledge of police officers.
They simply know the perpetrators. However, if the suspect is unknown
things become more difficult. For example, in one instance, the police had
very good pictures from a bank robbery. But after listening to the sound of
the recording the police had reason to believe that the robbers were from a
foreign country. This made the police conclude that the robbery most likely
would not be solved, because it is often difficult to engage police authorities
in other countries in solving crimes committed in Denmark.
How many resources can we invest? A third problem is related to
resources. Often CCTV is discussed as either working or not working, but
in the daily life of police practice, it is a common experience that CCTV in
some situations can be made to work. For example, every gas station has
CCTV capturing the license plates of the cars. Consequently a person driv-
ing away without paying for his or her gasoline can be identified quite easily.
The police simply look up the license plate in the vehicle register and then
call the driver. But if the plates are not clearly visible, or they are stolen from
another vehicle, the police often choose not to investigate the incident. Thus
the surveillance pictures are simply not used. The reason is that it would take
too many resources to solve a rather harmless crime. Or, as a police officer
stated, “You don’t bring in Scotland Yard just because a person has stolen
gasoline worth 300 kroner [40 Euros].” If however the driver continues to
steal gas, an investigation would be opened. Thus when it comes to many
minor crime incidents, CCTV is not ‘working’ because the police choose not
to activate other technologies and personnel in order to make the technology
work. If however a murder or a rape is committed, one can be certain that
every surveillance camera near the crime scene is checked, even if there is only
a remote chance that anything that can help finding the murderer has been
captured on video. One such incident is described in the following:
In this case, as in many others, the police often spend many hours look-
ing at recordings without knowing precisely what they are looking for, but
sometimes they actually find something that can be of help. In this case it is a
gob of spit that enables the police to activate other resources, specifically their
DNA database. It is this plethora of resources that identifies the perpetrator.
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
There is clearly a gap between the way the dominating folk theory and the
ethnographic understanding developed above depict CCTV in police work.
It is also obvious that the kind of surveillance practice described does not
fit neatly into either the concept of Big Brother nor the concept of panoptic
surveillance which dominates many academic discussions of surveillance.
Thus, the practice described above is not about controlling or disciplining
but about identifying subjects. This process of identification is not auto-
matic and smooth running. Often it takes hard and complicated work that
involves different kinds of resources, and still the result is uncertain. In
some situations identifying a person is easy; in others it is difficult or even
impossible.
The concept of oligopticon offers a performative understanding of surveil-
lance that seems to fit much better with the way CCTV is actually used by the
police. In an oligopticon surveillance is situated, specific, and limited, which
at least to some extent puts the oligopticon in opposition to the panopticon:
This article has reported from fieldwork aimed at understanding the way
Danish police use CCTV to identify perpetrators and hence solve crime. It
showed how CCTV can be effective in some instances, but this only happens
if a plethora of devices and actors act together and are coordinated in a cer-
tain way. In other instances CCTV is useless and leads to nothing else than a
waste of resources. In between these extremes are, however, many situations
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
REFERENCES
Part IV
On the Move
Migrants and Travellers
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
INTRODUCTION
In some ways, evacuation seems a poor fit for existing and more famil-
iar categories of mobile subjects, such as ‘the homeless,’ ‘refugees,’ and/or
‘migrants,’ even if evacuation certainly touches upon these subjects. In oth-
ers, including the ways that such categories direct state and non-state inter-
ventions toward certain people, it aligns much more precisely. Evacuation
mobilities, for example, have traditionally been some of the most conten-
tious and ‘unknown’ forms of mobility, demonstrated by the fact that, since
the Second World War, numerous systems of governmental surveillance and
registration have sought to manage their inherent plurality and unpredict-
ability. More recently, ‘the evacuee’ has figured on the agendas of authori-
ties pertaining to public health, transportation and highways, policing and
emergency services, security, intelligence, and counter-terrorism, throughout
the scales of local, state, and federal governance and supranational bodies,
NGOs, and the aid sector, as well as a plethora of private companies. The
evacuee is a subject moved away from harm. But the evacuee is also a mobile
subject constituted as a figure by these various skeins of power, knowledge,
technologies, and practices.
It is becoming increasingly important, therefore, to ask just what is at
stake in the surveillance, categorisation, mobilisation, and treatment of the
evacuated as it is a figure that seems to be moving across different grounds,
approaches, institutions, and understandings, at some pace. Central to this
The Digital Evacuee 223
are the ways in which the evacuee has been subjected to an extensive but
uneven effort to render it as ‘legible’ (Scott, 1999) from its mobile and slip-
pery condition through the administration of different forms of authority,
bureaucracy, and technology. The primary means to do this have been the
application of a series of techniques and technologies that make the evacuee
visible and then sort, order, and manage that subject physically and within
complex and multi-scalar systems of records and databases, accordingly.
Opening up evacuation, then, requires the elaboration of several approaches
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
The current efforts we will explore try to turn the evacuee into a far more
addressable subject through satellite systems, mobile technologies, social
media, and interconnected systems. These advances, relying upon certain
trigger moments, tipping points, or ‘somatic markers’ to facilitate political
capital and technological will, have clearly not just happened on their own
but in a broader and longer historical context. In this section we will draw
something of a partial genealogy of the management and (pre)mediation of
evacuee mobilities from the Second World War.
An Administration of Evacuation
Modern and, importantly, state-led evacuation measures developed in West-
ern Europe in preparation for aerial bomber attack. The evacuation or ‘bil-
leting’ of children from vulnerable urban areas and city centres to rural
The Digital Evacuee 225
communities and the countryside is in many respects unlike the kinds of
evacuation systems this chapter is concerned with. The eventual responsibil-
ity for a state for moving its people out of the way of disaster, however, was
something of a novel thing. Adi Ophir (2007) locates this original interven-
tion in the 1920s, finding that as late as 1900, even a hurricane hitting the
port of Galveston, Texas, did not warrant the resolve of a state to step in in
order to bring relief or defend its citizens from the repercussions of disaster.
As Ophir writes,
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
only at the end of the nineteenth century did the practice of saving lives
become a profession, an art, and a science, as it was developed on the
margins, and as an extension, of medicine, public health, the police,
and the army, and it took a few more decades before this growing body
of knowledge, techniques, and practices was integrated into the state
apparatuses.
(2007, 16)
This is not entirely accurate. The history of the European colonial impe-
rial rivalries could well be a story of state and citizen evacuation follow-
ing successions of territorial disputes overturning colonial outposts and
stations. However, the natural disasters that might require evacuation and
other measures of protection saw states beginning to relate to them no lon-
ger as inevitable catastrophes from which it (and its elites) would evacuate
themselves to somewhere safer (as in the plague). Disaster instead became
a providential moment for a state or sovereign to extend its powers to the
protection of the population from harm.
Modern aerial war threatened populations like never before. In Britain,
pre-war imaginaries heavily informed planning through the inter-war Com-
mittee of Imperial Defence, who were confronted with the first realities of
aerial warfare and the difficulties in protecting the daily routines of a work-
force so essential to public life (Adey, 2010) and the continuation of indus-
trial production and services so essential to fighting a war. The evacuation
of children was considered at length; the enormously complex process of
moving almost 3 million people was coordinated by the Ministry of Health
from vulnerable areas to ‘reception’ areas through a range of scheduled and
organised transport to people’s homes and buildings (O’Brien, 1955). Some
of these were camp-like structures built for the purpose, while others were
requisitioned. Some elderly and vulnerable people also followed in the chil-
dren’s footsteps.
In the United States, where much of this chapter focuses, the largest-scale
evacuations took on quite a different and in some ways far more disturbing
form than the population security intended to remove a valued life to safety.
Instead, the Japanese attack on Pearl Harbor saw the increasing paranoia
towards apparent ‘enemy aliens’ and ‘disloyal citizens’ become more inten-
sively directed at the Japanese (of first- and second-generation migrants,
226 Peter Adey and Philip Kirby
notwithstanding that existing racial tensions already remained and mani-
fested in protests over ‘American’ jobs). 120,000 people or effectively Amer-
icans of Japanese Ancestry under the executive ‘evacuation’ order 9066,
signed by President Roosevelt, were removed from their constitutional and
amendment rights wholesale. Those of Japanese descent were first volun-
tarily and then forcibly moved away from strategic ‘vital’ military exclusion
zones created on America’s West Coast, particularly around LA and San
Francisco, following several very dubious assumptions based on the Census
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
Agents
Just as these approaches receded from military authorship following the
height of Cold War nuclear dispersal planning which had found concrete
form in the structural planning of backyard bunkers, large-scale post-war
suburban development, highway planning, and inner-urban degradation,
other fields took on the mantle of evacuation mobility studies in response
to a wider set of threats, such as natural disasters, chemical accidents, and
Incident
Place
Year
I. Incident.
1. Nature: Natural Accident Exercise
2. Description:
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
IV. Results:
1. Deaths: No Yes Number
2. Injured: No Yes Number
3. After-Incident Report: No Yes Findings
Recommendations
V. Documentation:
Hurricane Katrina formed over the Bahamas on August 23, 2005, and dis-
sipated across the US’s Great Lakes a week later. As has been well docu-
mented, over these 7 days, it inflicted more than $100 billion worth of
damage, devastated New Orleans and parts of other states in its path, and
claimed nearly 2,000 lives (Knabb, Rhome and Brown, 2006.). The storm
also precipitated one of the largest evacuations in US history, with 1.2 mil-
lion residents along the Gulf Coast subject to either voluntary or man-
datory evacuation orders and nearly 800,000 eventually being displaced
(FEMA, 2006). The effects of the hurricane were so devastating that, in
its aftermath, the name ‘Katrina’ was retired by the World Meteorological
Organization at the behest of the US government. Whether this was out of
The Digital Evacuee 231
respect for the victims of the disaster or so that the government could avoid,
rhetorically at least, ‘another Katrina’-style catastrophic policy failure is
debatable. Certainly, the failures of emergency management during Katrina
were manifold, with the paucity of effective evacuee tracking one amongst
many other ways that the evacuee failed to be truly grasped by the different
emergency systems.
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
Grasping Evacuation
By following the evacuee tracking debacle, we can expound the crucial way
Hurricane Katrina has led to sustained yet fragmented production of the
digitally mediated and—especially—tracked evacuee. And through that, we
can unpack how perhaps the failures of Katrina showed the evacuee up in
the terms of what Jenny Edkins (2011) has called the ‘person as such’ as
opposed to the person as a ‘who.’ In other words, the evacuation measures
we will explore, in rendering the evacuee locatable and eventually digital,
have tended to treat the evacuee as abstract coordinates rather than as fleshy,
feeling, and complex mobile subjects.
Of the 1.2 million Americans who were issued with evacuation orders,
only a small proportion were really all that known in any form of record
keeping at the time, with a fuller picture of where this population dispersed
emerging months, even years later (Groen and Polivka, 2008). Whilst, as we
have seen, the US had already tackled certain evacuee issues of ‘tracking’
in earlier decades, the onus was more readily on anticipating and planning
for where they would go and by what means. Being able to account for the
location of evacuees on this scale was unheralded, with many of Katrina’s
victims slipping into the gaps between physical tagging, paper-based records
recorded at ‘rest centres,’ and, more widely, the overlapping jurisdictions
affected by the disaster and, more bluntly, between those who self-evacuated
and those who required assistance and received it.
Paper-based tracking systems given to those who required city and state
aid, the norm at the time, were simply unfit for the purpose (Pate, 2008).
Material tagging like this functioned in theory, but only if persons retained
their paperwork at all times or recalled the information it contained should
the documentation be lost—problems we will examine in more detail below.
Naturally, though, in the confusion after Katrina, what worked well on
paper was less efficacious in practice. Ironically, the monitoring of the hur-
ricane itself and its complex environmental effects was probably far more
successful. Much more was known about the morphology of the hurricane’s
weather system by meteorological radar. The natural disaster itself was far
easier to get a handle on than the social and technological disaster or ‘com-
plex humanitarian disaster’ occurring (and produced) through the imperfect
emergency response (Smith, 2006).
Perhaps the largest single failing pertaining to adequate registration, knowl-
edge, and effective tracking of evacuation occurred during the disaster has
232 Peter Adey and Philip Kirby
been expressed in the strongest possible terms already. Naomi Klein (see
Klein and Smith, 2008) referred to the ‘ethnic cleansing’ of the city by sepa-
ration, as poor, vulnerable black communities were displaced and separated
not merely by the hurricane, but by the practises that sought to manage the
response.
The lack of effective tagging, record keeping, and information sharing
meant that in many instances families who could not self-evacuate were
divided, leaving parents unable to track down lost children and babies and
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
other family members who could not be reunited for days, weeks, and in
some cases months afterwards (Brandenburg, Watkins, Brandenburg and
Schieche, 2007; Lindsay, 2010). Retrospective testimony of the events from
the perspective of the military coordination reveals a certain kind of think-
ing in the ‘heat’ of the emergency moment, which help to explain the limi-
tations of what seems to have been an ‘exceptional’ response, especially
towards the respect of family ties and inter-personal associations, as above
all, life came first (Graham, 2005). Accounts of survivors and local and state
personnel reveal that some of the main problems in evacuating people away
was that social groups, family units, friends, and other group dynamics were
not properly envisaged or provided for in FEMA’s and the city’s emergency
plans. It was as if the evacuee was treated as one of the disembodied agents
in evac simulations or simply a flow to be redirected out of the way, as
opposed to a subject who sustains and is maintained by subtle and vital but
brittle relationships, fractured by the process of evacuation.
When people are evacuated, they often become more vulnerable because
they are separated from formal and informal systems of care. Children sepa-
rated from next of kin, siblings, and parents/guardians remained in a vul-
nerable state in relocation centers like Oklahoma’s Camp Gruber. Those
who were already known as homeless on the National Center for Missing
and Exploited Children (NMEC) needed to be identified, too (Brandenburg
et al., 2007). Patients that were given medical examinations at certain loca-
tions were unable to be treated at others because their diagnoses did not
travel with them (Franco et al., 2006). There is now general consensus that
of the some 1 million people displaced from New Orleans, very few were
able to be effectively tied to their medical records, meaning that treatment,
prescriptions, allergies, and prior medical history could not follow. Some
hospitals taped patients’ personal notes to their forearms before helicopters
evacuated them elsewhere. The Veterans Association was one such excep-
tion, however, because the medical records of their members were electronic,
which meant that those who were moved from Biloxi, Mississippi, and New
Orleans could be effectively tracked as they moved around the country. Fur-
thermore, 10 days after Katrina’s landfall, a system was setup that would
make private pharmacy data (such as those held at a Walmart) about an indi-
vidual’s repeat prescriptions available to doctors through a secure database.
Even those persons in custody within the criminal-justice system, includ-
ing more than 2,000 ‘registered’ sex offenders despite being, perhaps, the
The Digital Evacuee 233
most visible, were just as problematically treated. Some were notably evac-
uated without pertinent judicial authorities being informed at the point of
reception (Arlikatti, Kendra and Clark, 2012). But the prison system also
presents an interesting case, because it is often held up as an area in which
evacuation plans and technologies are usually the most comprehensive.
Except in Katrina’s case, the example of Orleans Parish prison presented
one of the worst cases of the legal abandonment of evacuation plans, pro-
tocols, and civil rights, as the ACLU’s documentary and written evidence
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
has shown, and illustrated numerous abuses. Not to mention the fact that
the Louisiana courts, their personnel, and the wide-spread mobility of the
Louisiana judiciary during Katrina meant that the state was practically
evacuated of its legal system (Guidry, 2009), the ACLU (2006; Metzger,
2006) have illustrated how forms of abandonment were effectively written
into Louisiana law. All persons in custody of the Parish of New Orleans
are to be released for a period of 10 days upon the declaration of emer-
gency, disaster, or evacuation in the US or State or city of New Orleans,
and asked to make their own way out of the disaster or register for city or
state assistance.1
What we see in Katrina was the moment that the evacuee—as constituted
in the various ways discussed—made its inadequacies so visible. Since World
War II, many of the measures designed to track evacuees have concerned
two contradictory populations: those ‘at risk’ (e.g. medical patients) and
those ‘posing risk’ (felons). Whilst ‘vulnerable’ populations such as medical
patients (to illness and special needs) and felons (to escape and potential
reoffending) were subject to special, albeit faltering concern as we saw ear-
lier during Katrina, the hurricane also presented challenges for a much wider
population and long after the event. The existing systems prior to and during
Katrina were unsophisticated by their imagination of the evacuee, who they
were, what they needed, inadequately assessing their mobilities capabili-
ties. Furthermore, they were performed in the almost complete absence of
software or ICT despite the fact that so much of an evacuee’s identity might
have existed within several different sorts of organisations, bureaucracies,
and sectors, from health to social security in electronic form. More often
than not, it proved impossible to unite the actual evacuee fully with the less-
than-fragmented digital imprint of him- or herself.
Since Katrina, and the ensuing political fallout, congressional inquiries
and subsequent changes to the practice of emergency planning and response
within the United States, the onus has been on the broadening of what we
might call specific ‘technologies of address’ (Thrift, 2004, 585) through
the development of different tracking programs. For Thrift, locatable or
location-aware technologies are producing what he calls a “‘technological
unconscious’ whose content is the bending of bodies-with-environments to
a specific set of addresses without the benefit of any cognitive inputs” first
evolving from the military arts of logistics. In evacuation management, this
has meant seeking to produce legible evacuees so that they might be easily
234 Peter Adey and Philip Kirby
and automatically locatable in geographic space as well as within wider
systems of records.
Such technologies have their own particular geographies and may result
in the prioritisation of certain bodies. Like the reaction of the federal govern-
ment to Katrina more broadly, we will explore how tracking after the hur-
ricane was enmeshed in the politics of the mobile body, especially its abilities
and disabilities, its material advantages and disadvantages, and perhaps, in
the case of Texas’ evacuee tracking system, even its ‘racial’ characteristics
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
that have been tied into a broader migration politics of welfare provision
and care.
and their important possessions. This means that all members of a house-
hold, including their things, are tied together in the system. The bands are
then scanned at each site to record the evacuee’s location and their departure/
arrival times. From this information, responders can use the knowledge of
where evacuees are and where they are likely to go to inform decision mak-
ing. Furthermore, the system is designed to red-flag minors who are unac-
companied in order that they might be reported to the correct authorities
and agencies before or during evacuation. The system also records evacuees
with particular medical needs, recording whether they have sufficient medi-
cation and whether they require a caregiver.
In aggregate, NMETS is composed of both manual and computer-based
elements, functioning through paper records, but also “the Internet, hand-
held scanners, laptop computers, tethered USB scanners and/or RFID read-
ers” (FEMA, 2012). NMETS is a technological assemblage that addresses
the evacuee, their body, identity, and correspondent records in a variety
of ways and through a variety of pinch points. The system ultimately tries
to correct the mistakes of Katrina in a way that imagines and records the
evacuee as a potentially mobile body which is not abstracted from the things
and relations they need.
Although FEMA pioneered this national response to the disaster, pro-
grammes like NMETS were also being implemented at lesser scales, and
perhaps for more dubious reasons. Of all the states that received evacu-
ees from New Orleans and the wider Louisiana area, Texas was foremost
amongst them, receiving more than 250,000 persons, mostly in its largest
city, Houston (Godoy, 2006). But the benevolence of the state and city was
rewarded, at least in the opinion of some, by an increase in crime and anti-
social behaviour, with police officers reporting a spike in emergency calls in
those areas densely populated by evacuees, and the latter victims or suspects
in about 20% of the city’s murders, despite being less than 10% of the (new,
total) population (this was reflected in mainstream national and local news
CNN, 2006). As a result,
tion may not be possible as evacuee tracking systems multiply, expand, and
institutionalise themselves into the apparatuses of state and federal gover-
nance over emergencies.
In the wake of these developments, the evolving inter-disciplinary fields
of crisis and disaster informatics are providing other kinds of avenues for
tracking potential evacuees and the displaced through more advanced forms
of the collection and analysis of big data and social media networks. Crowd-
sourcing community sentiment, for example, can provide more effective
early warning of emerging threats or real-time disasters such as an earth-
quake quicker than the seismographs can transmit information (Hughes and
Palen, 2009). They can also prove effective ways to establish where people
are who might in need of evacuation, or, for example, to assess the welfare
and well-being of evacuees once relocated. Unsurprisingly, this is not being
led solely by the state. Civil society and activist groups such as Geeks without
Bounds have proven the value of correlating information gathered through
social media with geographical information system (GIS) –generated maps
in Hurricane Sandy. But the newfound accessibility of people in emergencies
through mobile technology can run up some different sets of questions. For
example, Buscher (2013) has shown that the civilians who could not evacu-
ate Utøya Island in Norway in 2011 became visible to the shooter Anders
Behring Breivik because friends and relatives rang people’s mobile phones
who were hiding. Being locatable, in other words, can have some unlikely
but devastating effects in particular emergencies.
The vulnerability of such bodies may well then be something constructed
by the assemblage of digital technologies, if and when they enter it, as well as
contemporary evacuee tracking systems. After Katrina, many displaced aliens
avoided seeking government assistance, and certainly government tracking
systems, because of their fears that the latter were being yoked together with
the Department of Homeland Security’s immigration databases (see Lindsay,
2011). In this instance, the state was already exercising control over the
mobility and identification of individuals. The state claimed a stake in their
future mobility by arrest, detention, even deportation should they be found
as non-citizens. So we are left with the familiar question (albeit in different
contexts) of what about those people more broadly that, even in emergen-
cies, simply do not wish to be tracked and subjected to the scrutiny that
comes with technologies of address? What if we object to the marking or
‘tagging’ of the body (Aas, 2006) through not only the concerns of privacy
238 Peter Adey and Philip Kirby
and civil liberties advocates but under religious freedoms. These questions
portend to the issues with which evacuee tracking will need to contend in
the future, especially if more far-reaching and compulsory evacuee tracking
systems are promulgated going forward.
As detailed, the onus on evacuation planning appears to be to harmonise
and join up previously distributed but siloed and fragmented databases and
disparate registration systems and piloted tracking programmes held within
a multitude of private providers, contractors, and local and federal govern-
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
ment services. In this sense, the digital evacuee, like the passenger, finds itself
mobile and interoperable across numerous systems of records that are being
made to speak to each other in an albeit piecemeal fashion. In the future,
for example, might it be possible for an airline reservation system to serve
as a digital feeder point for a medical evacuee being transported through
the secured, ordered mobilities of the airport? And how might this integrate
with the myriad other non-governmental actors that provide assistance dur-
ing emergencies, like the shelter registration programmes of the American
Red Cross? To date, the privacy implications of such emergency manage-
ment information systems (EMIS) have been given only limited attention,
but as these systems proliferate and the technology behind them evolves,
such concerns promise to move toward the forefront of critical agendas.
For Buscher, such practices may mean the obstruction or rendering “impos-
sible lived practices of privacy boundary management.” We also don’t have
to look to the United States to find examples of the potential implications of
these practices or, conversely, when regulation intended to protect personal
data is misapplied or abused. For instance, some of the very criticisms of the
response effort to the 2005 7/7 attacks on London were the ways in which
the 1998 Data Protection Act was applied in some cases overzealously that
obstructed the efficient sharing of information about individuals between
different emergency responders and organisations (Armstrong, Ashton and
Thomas, 2007; Buscher, 2013).
CONCLUSION
It is important not to get ahead of ourselves. It is not all that clear how many
of these systems are currently active and how many are dormant, awaiting
the federal and/or state contracts that will warrant their implementation.
At present, most evacuation systems, outside FEMA’s and Texas’ develop-
ments, draw on the kinds of hospital and prison technologies outlined previ-
ously, including low-tech tagging, to make an evacuee visible and readable
via wristband and simple paper records to store their pertinent details and
information. The material cultures of address of the past may be slated for
supersession, but they are still required in current tracking methods. Indeed,
the material dimension of tracking will never be completely lost, in that
chips, cards, and other devices that can be read remotely will continue to be
The Digital Evacuee 239
a part of the evacuee tracking assemblage, even if the records to which such
materials pertain may increasingly become a part of the digital, rather than
physical, landscape.
But even if the digital evacuee can ever perform the automated, interop-
erable, and joined-up dream that seems embedded within the projects of
emergency planners, policy makers, and private industry, the contradiction
always facing these bureaucracies and systems is how the evacuees they are
seeking to address through processes of identification, tracking, and trac-
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
ing evade the records and representations that stand in for them. It is not
simply because the digital double or fragment of the evacuee is somehow
incomplete. Rather, as Edkins has explored, there is a certain homology
between “systems of registration, identification, and control and a process of
objectification—the production of people as nothing but objects of adminis-
tration” (2011, 7). In other words, for Edkins (2011), and as we’ve seen in
evacuation, the intractable ‘messy’ person, with all their idiosyncrasies, their
choices, their motivations, their friendships, and their complex associations
and loves, ‘gets in the way.’
NOTE
REFERENCES
ACLU. (2006) Abandoned and Abused: Orleans Parish Prisoners in the Wake of
Hurricane Katrina. New York: ACLU, National Prisons Project.
AAS, K. F. (2006) “The Body Does Not Lie”: Identity, Risk and Trust in Technocul-
ture. Crime, Media, Culture, 2(2). p. 143–158.
AAS, K. F. (2011) “Crimmigrant” Bodies and Bona Fide Travelers: Surveillance, Citi-
zenship and Global Governance. Theoretical Criminology, 15(3). p. 331–346.
ADEY, P. (2010) Aerial Life: Spaces, Mobilities, Affects. Oxford: Wiley.
AGAMBEN, G. (1998) State of Exception. Chicago: University of Chicago Press.
AGUIAR, M. (2011) Tracking Modernity: India’s Railway and the Culture of Mobil-
ity. Minneapolis: University of Minnesota Press.
ARLIKATTI, S., KENDRA, J. & CLARK, N. A. (2012) Challenges for Multi-sector
Organizations in Tracking and Sheltering Registered Sex Offenders in Disasters.
Journal of Homeland Security and Emergency Management, 9(1). p. 1547–1573.
BARNES, T. J., & FARISH, M. (2006). Between Regions: Science, Militarism, and
American Geography from World War to Cold War. Annals of the Association of
American Geographers, 96 (4). p. 807–826.
BARTLING, H. (2006) Suburbia, Mobility, and Urban Calamities. Space and Cul-
ture, 9(1). p. 60–62.
BRANDENBURG, M. A., WATKINS, S.M, BRANDENBURG, K.L., SCHIECHE, C.
(2007) Operation Child-ID: Reunifying Children with Their Guardians after Hur-
ricane Katrina. Disasters, 31(3). p. 277–287.
BUCHANAN, M. (2010) Katrina Evacuees Found Welcome and Worries in Texas. BBC
News Online. Available from www.bbc.co.uk/news/world-us-canada-11117607
[Accessed 23–11–2014]
240 Peter Adey and Philip Kirby
BUSCHER, M. (2013) A New Manhattan Project?: Interoperability and Ethics in
Emergency Response Systems of Systems. ISCRAM Conference, Baden-Baden,
Germany, 12–15 May 2013.
COLLIER, S. J. & LAKOFF, A. (2008) Distributed Preparedness: The Spatial Logic
of Domestic Security in The United States. Environment and Planning. D, Society
and Space, 26(1). p. 7.
CRESSWELL, T. (2006) On the Move: Mobility in the Modern Western World. New
York: Routledge.
CRESSWELL, T., BERGMANN, S. & SAGER, T. (2008) Understanding Mobility
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
(MA): Polity.
METZGER, P. R. (2006) Doing Katrina Time. Tul. L. Rev., 81. p. 1175.
MONAHAN, T. (2007) “War Rooms” of the Street: Surveillance Practices in Trans-
portation Control Centers. The Communication Review, 10(4) p. 367–389.
NG, W. L. (2002) Japanese American Internment During World War II: A History
and Reference Guide. Westport (CT): Greenwood Press.
O’BRIEN, T. H. (1955) Civil Defence. London: H. M. Stationery Off.
OKUBO, M. (1946) Citizen 13660. Seattle, Washington: University of Washington
Press.
OPHIR, A. (2007) The Two-State Solution: Providence and Catastrophe. Theoreti-
cal Inquiries in Law, 8(1). p. 117–160.
ORR, J. (2006) Panic Diaries: A Genealogy of Panic Disorder. Durham (NC): Duke
University Press.
PACKER, J. (2008) Mobility without Mayhem: Safety, Cars, and Citizenship. Dur-
ham (NC): Duke University Press.
PATE, B. L. (2008) Identifying and Tracking Disaster Victims: State-of-the-art Tech-
nology Review. Family & Community Health, 31(1). p. 23–34.
SCOTT, J. C. (1999) Seeing Like a State: How Certain Schemes to Improve the
Human Condition Have Failed. Cambridge (MA): Yale University Press.
SHELLER, M. (2013) The Islanding Effect: Post-Disaster Mobility Systems and
Humanitarian Logistics in Haiti. Cultural Geographies, 20(2). p. 185–204.
SMITH, N. (2006) There’s No Such Thing As a Natural Disaster. Understanding
Katrina: Perspectives from the Social Sciences, 11.
STROPE, W. E., DEVANEY, J. F. & NEHNĚVAJSA, J. (1975) Importance of Pre-
paratory Measures in Disaster Evacuations. Stanford (CA): Stanford Research
Institute.
THRIFT, N. (2004) Movement-Space: The Changing Domain of Thinking Resulting
from the Development of New Kinds of Spatial Awareness. Economy and Society,
33(4). p. 582–604.
URRY, J. (2007) Mobilities. London: Polity.
VARANO, S. P., SCHAFER, J. A., CANCINO, J. M., DECKER, S. H., & GREENE,
J. R. (2010) A Tale of Three Cities: Crime and Displacement after Hurricane
Katrina. Journal of Criminal Justice, 38(1). p. 42–50.
12 The Datafication of Mobility and
Migration Management
The Mediating State and Its Consequences
Dennis Broeders and Huub Dijstelbloem
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
calls them the ‘others’ in the following quote—that are digitally categorized
essentially ebb and flow with changes in algorithms and the settings of the
system. “One difficulty of such others, in current identification regimes, is
that their ranks may expand at will—or whim—through slight statistical
adjustments expressed in the algorithms controlling for entry and eligibility”
(Lyon, 2009, 148). Political and policy decisions about risks and categoriza-
tions and changes therein cause ripples in the mass of data that is collected
and stored about travellers and migrants once they are translated into the
software. Categories do indeed have politics. Aradau and associates (2008,
152; see also Salter, 2008) underscore the consequences of risk-based data-
base systems: “‘Who decides?’ is supplemented by ‘Who gets to imagine the
future?’ The imagination of the future has become one of the main political
stakes.”
especially. The dangerous water barrier between North Africa and Southern
Europe has attracted many irregular migrants to seek entry to the EU under
very harsh conditions and claimed many of their lives (Carling, 2007; Spi-
jkerboer 2007).
Spain, separated from Africa only by the narrow Straits of Gibraltar, was
one of the first EU countries to turn to new surveillance systems to deal with
(illegal) migration. As early as 2002, Spain began to introduce a maritime
surveillance system, the Integrated External Policing System, for its exter-
nal borders (Sistema Integrado de Vigilancia Exterior, SIVE), to deal with
the rise in illegal immigration (Düvell and Vollmer, 2011, 10). Systems like
the Spanish one were precursors to more encompassing ambitions laid out
by the European Commission in 2008. In that year EU Justice and Home
Affairs Commissioner Franco Frattini launched his so-called ‘border pack-
age,’ a vision for the management of the EU’s external borders (Commission
of the European Communities, 2008). This package consisted of three com-
munications: one on the use of database technology, including the intention
to create the EU–wide Entry/Exit System; one on the future of FRONTEX;
and one Communication examining the establishment of a satellite-based
border surveillance system called Eurosur (Guild et al., 2008). Hobbing con-
siders the border package to be a paradigm shift for the EU:
All that seemed of doubtful value before, such as fully automated border
checks, comprehensive systems of entry-exit control, air passenger sur-
veillance and electronic travel authorisation, hi-tech border installations
including virtual fences, has all of a sudden become part of the EU’s
vision for the 21st century.
(Hobbing, 2010, 68)
After the 2011 Arab Spring and the (in retrospect, small) numbers of
irregular migrants heading for Europe that followed those events, the EU
has pushed forward with the plans for Eurosur and the EU’s smart borders.
In terms of the technological management of migration flows the Eurosur
plan is most interesting, as it aims to create an EU–wide mechanism for the
deployment of surveillance systems ‘at or beyond the geographical exter-
nal borders.’ The plan involves ‘pooling’ all sorts of surveillance technolo-
gies that the member states use at the border and should “ultimately lead
to the establishment of a ‘common monitoring and information sharing
Mobility and Migration Management 249
environment’” under the direction of FRONTEX (EC quoted in Jeandesboz,
2008, 9). The result should be a ‘system of systems.’ So initially, the aim is to
pool national systems such as Spanish SIVE operated by the Guardia Civil
(Carling and Hernandez-Carretero, 2011), for common use. The main aims
are to reduce illegal migration into the EU, to prevent cross-border crime,
and to enhance search and rescue capacity.
Investments in both the hardware of border surveillance as well as in
software and information management systems are steadily growing. The
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
In other words, the data gathering, mining, and analysis under the flag of
Eurosur is wide ranging and may draw on many and relatively unspecified
sources. Even though this data is subject to the EU regime of data protection
and the protection of fundamental rights, it is unclear how oversight on this
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
data gathering is organised. In the run-up to the European Day for Border
Guards 2013, there was a call to industry and researchers to showcase their
wares on the ‘technology exhibition’ that was held in parallel. In addition
to calls for various kinds of surveillance hardware, FRONTEX was also
very interested in ideas and products of technology for ‘information sharing
and interoperability’ and ‘information acquisition and fusion.’ Especially
the latter category, calling for applications that can deal with “real time data
mining for processing vast amounts of heterogeneous data” and the use of
“new sources of information (on line news and social media) for intelligence
gathering” (FRONTEX, 2013) shows a new interest in the datafication of
border management. This datafication goes well beyond the data gathered
by public officials in migration management themselves and seems set to
take in all accessible information that may prove useful. It is a datafication
of the migrants’ and travellers’ environment in the broadest sense. The fact
that EUROSUR will also hook up with the EU–wide Common Information
Sharing Environment as ‘its border control function’ (Hayes and Vermeulen,
2012) underlines that the data gathered here will also reach stretched screens
across Europe that are not involved in migration management directly.
Where the previous section illustrated how the border environment has
become datafied—the ‘situational awareness’ is pieced together from a myr-
iad of sources—this section turns to the datafication of the individual migrant
and traveller. New technology has made it easier and more convenient for
migration control to move away from the actual border and has partially
become ‘remote control’ (Zolberg, 2003). At the border (see previous sec-
tion), the notion of a border is already stretched by using remote sensing
technology and open sources, but within the procedures regulating mobil-
ity and migration this goes double. The aim is “for borders to increasingly
exist de facto in cyberspace, i.e., become ‘virtual borders’” (Hobbing and
Koslowski, 2009, 14). Mobility management in the digital age is preferably
organised in such a way that decisions on entry and eligibility are taken as
far away from the territorial border as possible. Migrants and travellers are
monitored through data, data mining, profiles, and risk calculation. The vast
Mobility and Migration Management 251
numbers of the flows of migration and mobility are increasingly matched by
the vast numbers that are registered, categorised, and data mined. Databases
and the ‘screens’ of the terminals of migration officials everywhere shape the
image of migrants and the opportunities they have or lack (Amoore, 2009;
Lyon, 2009).
In recent years many Western countries have been constructing migra-
tion database systems to register and manage especially three categories
of migrants: asylum seekers, migrants on (short-term) visas, and irregular
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
migrants. In the EU this has translated into a new digital border of the EU
consisting initially of the Schengen Information System (SIS) and the Euro-
dac system. In October 2011 the Visa Information System (VIS) became
operational, and in April 2013 the second generation of the Schengen Sys-
tem (SIS II) went live. Plans for an EU–wide Entry/Exit System and smart
border programmes have been on the EU’s agenda since 2008 (Broeders,
2007, 2009, 2011) and gained renewed traction after the migratory move-
ments in the wake of the Arab Spring in 2011 (Hayes and Vermeulen, 2012).
The EU’s investment in these programmes is considerable. The budget for
Home Affairs 2014 to 2020 reserves 822 million euros for existing large
scale IT programmes. The recently created EU Agency for IT in Justice and
Home Affairs and an unknown portion of 4,648 million euros reserved for
internal security funds are earmarked for the development of new large-scale
IT systems (Comission of the European Communities, 2011, 4). These funds
primarily flow towards both privately contracted and the EU’s own techni-
cal experts, developers, and the operators of data systems working with
mobility-related data flows.
These systems all chart and monitor mobility, store vast amounts of per-
sonal data and biometrics and, in the case of the EU systems, can give insight
into the primary and secondary dispersal of migration flows over the mem-
ber states of the EU. For example, the Eurodac system, a central register of
the fingerprints of all asylum applicants in the EU, charts the distribution of
asylum migration across Europe and detects multiple asylum claims in the
EU. Through the registration of multiple claims—someone has filed a claim
for asylum in various member states at various times—the system also gives
some indication of secondary movement. The VIS (Visa Information System)
connects the EU member states’ immigration authorities and consular posts
all over the world. Its central database details the personal and biometric
information of all visa applicants to the EU and the dates on which visas
were applied for, granted, refused, cancelled, withdrawn, or extended. This
means the VIS will generate aggregated information on shifts and trends
in visa-based mobility from certain countries and regions. The Entry/Exit
system, if and when it will be implemented, will be able to generate even
more information on migration processes in the EU as it registers data on
all travellers entering and exiting the EU (however, see Jeandesbosz et al.,
2013, for a critical analysis of the technological and financial feasibility of
the scheme). The main emphasis in all these systems shifts to identification.
252 Dennis Broeders and Huub Dijstelbloem
All the systems mentioned have become ‘identity technologies’ and revolve
around biometrics—usually fingerprints and/or iris and facial recognition—
as a unique identifier that ties all the data in these systems to one registered
individual (Broeders, 2007). As a result of the use of surveillance technologies
in the adjacent policy terrain of counter-terrorism and mobility, other sys-
tems, data exchanges, and databases such as PNR data exchange, Advance
Passenger Information, and many watch lists, supplement—and sometimes
interact with—the migration surveillance systems (Balzacq, 2008; De Hert
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
and Bellanova, 2011). The closer to national security one gets, the bigger
the data sets available, as we have learned from the recent disclosures about
the American PRISM programme (Bigo et al., 2013), and the more various
sources can and will be combined.
With the bulk of data contained in these various systems, categorisation
becomes a prerequisite for a pre-emptive line of sight in migration policy
(Amoore, 2009). Two trends stand out in the development of migration data-
bases. The first is the shift from reactive to pre-emptive databases. Whereas
the SIS, for example, only registered persons who had ‘done’ something
(violated migration law, for example), most other systems register people
because they may do something in the future (people are registered in Euro-
dac because they applied for asylum but also because they may apply in mul-
tiple countries and may become irregular migrants). This explains why new
and proposed systems—such as the EU’s Entry/Exit system in combination
with biometric passports and automated border controls—aim to register
and fingerprint all travellers that will cross the external border: citizens,
visa-free travellers, and those travelling on a visa alike. The digital hay-
stack is collected to pinpoint the needle later. Lyon (2003) calls this ‘dragnet
policies’ in which large quantities of data on as many people as possible are
stored in order to trace an (infinitely smaller) policy-relevant subpopula-
tion. Overall, the pre-emptive governance of mobility through databases
is organised around the logic of blacklisting, green-listing, and grey-listing
the mobile populations that are heading towards the EU (cf. Broeders and
Hampshire, 2013). Those who are blacklisted should be stopped well before
they reach a territorial border, those who are green-listed are fast-tracked for
easy border passage, and those who are grey-listed are labelled ‘suspect’ and
require further scrutiny at the border or, preferably, before embarking on
their journey. The value attributed to the various data points that make up
a category determines the colour and the shades of grey (for a more detailed
analysis, see Broeders and Hampshire, 2013).
The second trend is that categorisation becomes technologically mediated
and datafied. The classic state view on migration and international mobility
is characterised by countries and visa; the citizens of some countries are sus-
pect in terms of the (perceived) risk of illegal migration, refugee flows (per-
ceived to be bogus or real), and forged identity documents. This view was
based on countries and nationalities, and visa policy is the means to regulate.
New technologies build on this classic view and also go beyond it. The EU’s
Mobility and Migration Management 253
border package, for example, aims to create different flows of people at the
airport on the basis of risk assessment. These flows are organised through
databases and separate systems for registration and passage at the border
itself. The language is important here: The systems and programmes for
fast-track procedures are those for ‘trusted travellers.’ In the original plans
the Commission even used the unfortunately chosen label of ‘bona fide’ trav-
ellers, suggesting that those travelling on a visa were collectively regarded
to be of ‘bad faith’ (Mitsilegas, 2009). The trend in the new systems is to
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
they do.”
cases, the sovereign decisions of the state on entry and non-entry, eligibility
and non-eligibility. As Latour and Woolgar (1979) have shown, central to
the “construction of scientific facts” is the erasing of traces. Facts are con-
structed in long and messy processes, but the trajectory that leads to their
institutionalization is hardly referred to in scientific publications. Similarly,
Brighenti (2007, 338) notes that “the legibility of social phenomena is often
achieved at the expense of the recognition of their richness.” Once consid-
ered a fact, it is presented as a ‘fait accompli.’ Policy decisions require a
similar kind of unequivocal categorization, not in the least in migration pol-
icy, which is ultimately about inclusion and exclusion. ‘Faits accomplis’ are
crucial to socio-technological practices in which decisions have to be taken.
On a more general level, the erasing of traces can be understood as a process
of ‘purification.’ Modernity, according to Latour (1993), is overwhelmingly
inhibited by ‘hybrids’—marriages between subjects and objects, humans and
humans—as is the case in the socio-technological systems which are used for
mobility management and border control. However, hybrids are likely to be
denied a legitimate place in the modern order. Instead, they are brought back
to a binary position. They are either a subject or an object, not anything in
between. The implication is that the erasing of traces serves to mask the
constructed nature of what are supposed to be clear-cut subjects or objects.
A fact can only speak for itself once it is declared independent of human
actions.
In a similar vein, the state’s information management is aimed at the cre-
ation of undisputable facts. Interestingly, the process of datafication starts
off by vastly increasing the hybridization of the available data and informa-
tion. The size of the intake of data from increasingly varied sources is grow-
ing fast—there is a reason the debate is about big data—making the resulting
data set a fuzzy mashup. However, information networks and ‘centers of
calculation’ then transform bits of information by selecting and connect-
ing them and build a workable image of reality, similar to what Deleuze
described as the creation of virtual date doubles, some of which are consid-
ered ‘green,’ some ‘black,’ and some ‘grey,’ with the latter category being
an transit category—that is, being on its way to become at least temporarily
one of the former. However, there is no natural correspondence between
these representations and the outside world. To make them correspond, the
intermediary steps that connect them must be made invisible in the end. If
messy and hybrid, the constructed nature of fact would come to light and
Mobility and Migration Management 257
undermine the rational justification of decisions. The mediating role of the
state, it can be concluded, works out in two directions. On the one hand, it
relates, collects, and transforms all kinds of data and information to gather
them together and turn into robust facts. On the other hand, it evades the
traces of this process to purify the outcome and to present it as an objective,
undisputable ground for decision making.
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
NOTES
REFERENCES
INTRODUCTION
the range of agencies within the chains, such as the Alien Police, the Royal
Military Police, and the Immigration and Naturalization Service (IND).
Whereas terms such as ‘identity,’ ‘prevention,’ and ‘risk’ concerning migrants
suggest a certain self-evidence at first sight, these terms derive their mean-
ing from complex arrangements of local, national, and international institu-
tions, digital technologies, legal settings, and professional practices. This is
also evident in the international commitments. The Netherlands has a broad
range of information exchange tasks, including information on migrants and
travellers. As part of the European Union, the Netherlands is, for instance,
committed to performing policing tasks through using the national database
of the Schengen Information System (SIS2) and exchanging data within the
pan-European law enforcement organization, Europol.3 The Netherlands is
also obliged to enforce the Dublin convention,4 which prescribes member
states to determine whether an asylum seeker has submitted a prior applica-
tion in another member state. As part of these assessments, the fingerprint
database EURODAC5 is consulted. Another obligation for the Dutch govern-
ment is the exchange of visa data on migrants through the Visa Information
System (VIS6). Given that the Dutch sea border also constitutes part of the
EU’s external border, the Netherlands actively participates within the EU’s
border management organization FRONTEX.7 For example, the Dutch also
aggregate and share data on illegal entry through the EU’s border surveillance
system, EUROSUR.8 Beyond these European organizations and systems, a
large variety of national and local organizations exist in the Netherlands that
deploy local border control, immigration, and law enforcement procedures.
The two identification systems, as well as the risk-profiling system analysed
in this chapter, are embedded within these European and Dutch regulatory
and technological settings, yet operated solely in the Netherlands.
These three systems are the following: first, the identification and veri-
fication console of the Dutch Immigration and Naturalisation Service, the
INS console, second the console of the information provision program (in
Dutch: Programma Informatievoorziening Strafrechtsketen) within the Dutch
criminal law chain, the PROGIS console, and the Advanced Passenger
Information-System, the API system. Although they differ significantly, as
they are situated in different practices and operated for different purposes,
this chapter aims to articulate some shared characteristics and implications
of their use. We suggest that all three systems contribute to a shift that
increasingly frames migrants as posing a risk, as opposed to potentially
Migrants at/as Risk 263
being at risk. Moreover, we aim to show how the quest for ‘accurate iden-
tity’ and the technologies used to approach this goal transform the problem
in specific ways and, in the process, create new uncertainties and risks for
those subjected to them. We argue that this happens because of the particu-
lar way problems of identity fraud and illegal entry are translated (Latour,
1987) into specific technological solutions.
To illustrate this dynamic, the next section first introduces the systems
under study and briefly describes how identity verification of certain catego-
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
‘Risk prevention’ with regard to identity fraud, illegal entry, and interna-
tional crime has a high priority in Dutch immigration policy (Ministerie
van Binnenlandse Zaken en Koninkrijksrelaties, 2012a). In the discourse
on improving this prevention, visual metaphors dominate: Migrants and
their associated risks need to be made “more visible” (Prins et al., 2011),
and there is a need for more ‘complete and accurate pictures’ of migrants.
A report by the Dutch Advisory Committee on Alien Affairs, for instance,
describes a need for acquiring a “better view on asylum seekers” (Tweede
Kamer, 2005), and another report from the Ministry for Foreign Affairs sim-
ilarly emphasizes the need for a more “comprehensive picture” of migrants
(Zijderveld et al., 2013). The need for improving this ‘visibility’ is invari-
ably addressed through the introduction of advanced digital technologies
for identity-verification and risk-assessment purposes. The INS console, the
PROGIS console, and the API system exemplify such technologies.
ing migrants involved in human trafficking. While on the one hand being
construed as useful in the protection of potential victims, by identifying
those ‘at risk’ of this and other, related crimes (e.g. prostitution or exploi-
tation of illegal workers), API data are, on the other hand, also considered
useful in identifying those posing a risk, in particular regarding illegal
entry. Our analysis below will indicate how both uses of API profiles can,
in fact, merge into each other, thus casting doubt on the proclaimed affec-
tivity of each.
This quote exemplifies two points. First, ID documents are not checked for
authenticity by PROGIS; instead, professionals must decide whether an ID
document used at enrolment is genuine or fake. Second, the potential problem
of identity fraud is transformed into observable indicators, such as, in this
particular example, the sound of a falling ID card. Thus, a general problem
of identification, one that Roger Clarke (1994) labelled the ‘entry-point para-
dox,’ resurfaces here: the accuracy of each digital identification or verification
system, however sophisticated, is only as strong as its weakest link, which
often lies right at the start of the whole procedure, the authenticity of ‘breeder
documents’ (e.g. IDs, birth certificates). This clearly is an issue in PROGIS,
where its claimed technologically enhanced accuracy, in practice, may depend
upon an improvised trick that is anything but high tech or accurate.
In a similar vein, the INS console is claimed to provide an ‘accurate iden-
tity’ for migrants while also requiring prior ‘identity proof’ from them. A
professional identifying so-called ‘invited refugees’14 via a mobile INS con-
sole in refugee camps explains:
I: How can you be sure that the [undocumented] person you want to
identify with the INS-console is the one he/she claims to be?
P: That you never know. I can give you a basic answer: I can only hope
that the person who said something about him/herself to me, said the
same thing to our UNHCR15 colleagues. It can be two times a lie, but
since I cannot figure this out, I must be satisfied with the consistency
of the refugee’s story.
(INS professional, city D)
The above excerpt indicates once more the ‘clay feet’ of many high-tech
identification and verification systems today. Sometimes all one has to go on
at enrolment is a minimum level of consistency in a claimed identity, life,
or flight story. In the final analysis, it is still the experienced worker ‘in the
field’ whose judgement about the credibility of someone’s personal account
carries weight. Whether this is to be seen as a strength or a weakness—some
may find this remaining human element reassuring—it is a key element in
Migrants at/as Risk 269
the functioning of such systems that is usually left out of the accounts of
technological accuracy and their role in combating identity fraud.
the sense that geographical locations and travelling routes may become part
of a particular risk profile:
Ultimately, you want to focus on every flight, but you need to build this
up gradually. Where does our first priority lie? [. . .] if other partners
also have problems with flights from a given country, than there must
be something wrong with those flights. If 5 professionals from different
organizations say the same about 3 places, than there is something risky
with those flights.
(API professional, city A)
You can discover that [. . .] ‘facts’ about persons traveling from those
risk flagged places are also important, these help you learn the type
of persons you look for. [. . .] you often search for particular men or
women of a certain age, behaviour, clothing or travel companions. I
often check passengers against such indicators.
As indicated earlier, API profiles are also used to prevent illegal entry
connected to international crime like human trafficking. An IND official,
who also manages API, describes how particular instances of this crime are
sometimes spotted through the API profiling:
We did quite well with that profile and stopped many women who were
glad and grateful for what we did. We were also happy we could protect
them from becoming prostitutes. [. . .] The funny thing is that a month
after we started to screen flights against the profile, trafficked women no
longer travelled directly to Madrid, but took the route: Amsterdam—
Paris—Barcelona—Madrid. The change in the route assured us that the
profile was good, and that criminal organizations are well informed.
The API profile [. . .] did well. This allowed us to indicate for the min-
ister the usefulness of API data and the importance of binding several
issues together in one profile.
(API manager, city A)
270 K. La Fors-Owczynik and I. van der Ploeg
Interestingly, this quote illustrates as well how the API system–based pro-
filing may contribute to the convergence, if not conflation, of protecting
migrants at risk (of trafficking and sexual exploitation) with prevention of
travellers posing a risk (of illegal entry). There is no need to doubt the inten-
tions of border guards in any way in order to legitimately raise the question
whether stopping someone at the border casts them as victim or as perpetra-
tor, as it is unclear whether this is followed by sending them back, prosecut-
ing them, or really helping them. The fact of traffickers changing their routes
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
is taken as a sign of success of the profile and could indicate that it is above
all the mere prevention of illegal entry that counts.
It is also clear that professionals do not merely follow standardized pro-
tocols or automated decision processes. Seeing certain attributes of travel-
lers as risk indicators can also be based on tacit knowledge and acquired
experience:
sists of lines. If you put here a magnifying glass, then you see that the
lines consist of stripes and points, that’s a print of a scanned finger-
print. What happens now with the Dactyslip is that the sheets [of the
inked fingerprints] become digitalized and the lines of your fingerprint
are transformed into stripes and points. So, you have a large quality
loss. The moment you scan fingerprints by the INS-console, the qual-
ity becomes in any case higher. A bad digital fingerprint scan is prob-
ably still better than the best photocopy of an original dactyslip.
(INS console operator, city A)
However, the improved quality and matching rates turn out not to be as
straightforward as this. In order to attain the expected accuracy of verifica-
tion, significant workarounds are needed that show how risk assessment
and identity verifications still rely on assessments independent of the system:
What we see in this excerpt is how the accuracy of the system is in fact
something that takes a lot of effort and additional ‘techniques’ to achieve.
More specifically, the system is made to perform well because the actual risk
assessment is done differently and turned out negative (‘no risk’): When her
fingerprints fail to give a match, an asylum-seeking woman from Somalia
is first suspected of perhaps trying to sabotage the verification process by
Migrants at/as Risk 273
mutilating her fingertips because she is Somali (“Somalis do that”). The
specific risk indicator for that type of sabotage (having mutilated fingertips)
is subsequently checked visually by the IND officer (“I checked her fingers
myself”). After satisfying himself this way that no fraud is attempted, the
negative verdict of the system is not believed, and all effort goes into the
production of a better fingerprint scan. The belief in the first assessment is so
strong that even if all this fails, the project manager is asked to step in and
help out to achieve a positive verification.
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
The other side of this is that any reliance on such a system introduces
significant new risks for those whose fate depends on being believed and
whose identity claim of being at risk. That is, a recognised refugee with right
of stay is ‘verified’ this way. Instead of the promised accuracy and certainty
of digitalized biometric identity verification, a number of highly contingent
factors determine whether a person passes this verification test, including
the assessment by the operator, the manager, and the availability of the right
levels of pressure and greasiness of the fingers to be scanned.
But often enough, if a person’s fingerprints turn out to be unreadable
within the configuration of a digital biometric system, this is perceived as an
indicator of potential identity fraud. Consequently, the owner of the finger-
print becomes suspect and changes from a person claiming to be at risk into
one that is perceived as risk. This is the case even though it is known that
there are more problems with the fingerprinting systems.
For example, the PROGIS console, although equally intended to improve
accuracy, is acknowledged to have an in-built risk of failure, stemming from
a weaker predecessor system:
Webfit is the predecessor of PROGIS, and was the first program using
fingerprints that were taken digitally. In Ter Apel, the Alien Police said:
we tried out Webfit, but it did not work for us and it took too much
time to work with it. The program of Webfit was actually installed in
such a way that it always delivered negative results for asylum seekers
when verifying their fingerprints. Webfit turned out to have only been
tested on Dutch fingers [. . .]; despite updates, the basis for PROGIS is
still Webfit.
(INS professional about PROGIS)
With respect to the human bodily features used in biometrics, this means
that there is an assumption of normality that is defined as a range of varia-
tions that constitute ‘the normal.’ Such notions of normality are built into
the equipment: hand scanners have particular shapes and sizes, with des-
ignated places to put the fingers; fingerprint systems are designed for the
registration and comparison of a particular number of fingerprints (most
systems use 1, 2, or 10) and a particular range of ridge definition; cameras
to scan faces are directed at a specific height, and the accompanying face-
recognition software often works best for a particular shade range of skin
colour, and so on. In the case of PROGIS and its underlying legacy software
Webfit, it is this assumed similarity that turns out to be unwarranted and
causing trouble.
The question is, however, for whom it causes trouble. The quote shows
operators disqualifying the system: it does not work for them, and it takes
too much time to operate. The other side of the coin, however, is that an
unsuccessful enrolment or verification may equally well be attributed to the
asylum seeker, casting suspicion on them. In a context in which policy aims
at limiting admittance of refugees, and prevailing distrust of migrants’ iden-
tity claims is the very reason for introducing technologies that come with
the promise of accuracy and certainty, one may wonder who will get the
benefit of doubt in any concrete instance of failed recognition on the work
floor. This is why we suggest that these systems introduce new risks for the
people subjected to them.
In a different way, and for a different set of travellers and migrants, the
API system–based profiles constitute new risks as well. As described earlier,
a traveller can become framed as ‘risk’ if a match emerges between the attri-
butes of this passenger and an API profile:
P: INS is a distant chain partner of the Aliens Police, but not one that
can access the criminal justice database [database for PROGIS-data].
That is separate.
K: Yes, but the INS also does identification.
P: Yes, [. . .] the INS very often contacts the Aliens Police, and explains:
“Listen, we have someone in detention, but we would like to present
him/her [at the embassy].” Then we [Alien Police] start an identity
investigation, but not at the PROGIS-console, but according to our
identity investigation task on aliens within the alien chain. So we
put the whole PROGIS issue aside. As you see cooperation [with the
INS] is there.
(PROGIS professional, city B)
We both have the same goal to prevent identity fraud, and one-time reg-
istration, and multiple use. And then, of course, legislation should also
cooperate in this, a new bill is in progress [. . .]. But now there are two
parallel trajectories and I hope they will meet in the best interest of the
alien. Because currently assessments are done double, and why? Why
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
Dutch efforts to reduce identity fraud and illegal entry in the context of
migration have come to concentrate on prevention in recent years. Policy
makers were calling for a ‘better, more complete picture’ of migrants in
order to enable effective risk assessment of migrants and travelers entering
the country. This led to an increased reliance on information systems and
digital identification. This chapter has focused on three recently introduced
systems for identifying and verifying those posing a risk: the Advanced Pas-
senger Information system for profiling travelers and the biometrics-based
identity verification systems within the alien and law enforcement chains,
the INS console and the PROGIS console.
Migrants at/as Risk 277
Our analysis has highlighted how none of the socio-technical configura-
tions of these technologies delivers the flawless accuracy hoped for. While
in some respects improvements regarding the prevention of identity fraud
and illegal entry by travelers and migrants may have been achieved, a closer
look into the way these systems work in practice has shown how a range
of potential system fallibilities lead to a shift in localization of the problems
rather than a solution.
With the use of the systems, new risk indicators are developed that
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
amount to new norms concerning what a valid identity is and, hence, what
a trustworthy migrant is. Conforming to these new norms is a challenge
also for legitimate migrants and travelers involving aspects trivial outside
the context of digital identification: the ‘machine readability’ and greasi-
ness of one’s fingertips or the age at which one travels a particular route at
a particular moment. The (in)ability to produce readable fingerprints or a
particular combination of rather general attributes such as country of ori-
gin and age/gender may come to inspire distrust in a particular traveller’s
identity claim. This happens despite the fact that most of these systems, to
some extent at least, are built on clay feet: To enter one of the systems for
identity verification, one needs to provide a primary proof of identity, the
validity of which cannot be checked by the system itself. Hence, a range of
tricks, experiential knowledge, and trust comes into play in order to assess
the reference identity proofs on which all later translations and verifications
come to rely.
The consequences of this are twofold. On the one hand, it seriously
undermines the trust put into the technology and the belief that the latest
technology delivers what it promises: accurate and strong verification and
identification of those migrants posing a risk of fraud or becoming illegal
residents. In this sense, these technologies may foster a false sense of control,
security, and successful ‘prevention.’
On the other hand, however, these ‘clay feet’ may cause a failure of pro-
tection of those most in need of it: From being a refugee fleeing from risk
for life and limbs, an asylum seeker confronted with the systems set up to
keep out those deemed non-eligible for the protection offered by asylum
status may find themselves being recast as posing a risk; a failure to enrol
may be met with suspicion of a deliberate attempt to avoid successful reg-
istration; a false negative during subsequent verification may cast them as
identity fraudster. They may chance upon operators, who, for some reason,
and unlike the ones interviewed for this chapter, are little inclined to guide
them carefully through either the enrolment or the later verification pro-
cesses with the range of workarounds required to make the system perform.
In this sense, these systems and the belief in them actually pose new risks for
those coming to our borders for protection against risk.
The Privacy Impact Assessment on the new legislation mentioned above,
with its extensive enumeration of ‘risks’ to migrants’ rights posed by the
increased reliance on and extended use of biometrics throughout the alien
278 K. La Fors-Owczynik and I. van der Ploeg
chain proposed in the new bill within the Netherlands’ legislature, underscores
this view. Even though it includes a range of risk-mitigating measures—for
this issue of false negatives, that is, a failure of the systems to match two sets
of fingerprints from the same person, for example, it proposes a mandatory
check by a dactyloscopic expert in case of mismatch—it remains to be seen
how effective and feasible these will turn out to be. The proliferation of ‘risks’
when using the INS and PROGIS consoles and the API profiles underlines
the pivotal need for all involved to remain reflective about the pitfalls the use
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
of these systems can bring along for the lives of persons assessed by them.
NOTES
BIBLIOGRAPHY
Tsjalling Swierstra studied philosophy and political science and received his
PhD in philosophy in Groningen; he worked at the technical university of
Twente until being appointed full professor in Maastricht, where he now
heads the philosophy department. He is a member of the Maastricht Uni-
versity Science and Technology Studies (MUSTS) research programme.
He is director of the centre for Ethics and Politics of Emerging Technolo-
gies, a member of the Advisory Committee on Health Research, and a
member of the Program Committee of the Responsible Innovation pro-
gram funded by the Dutch Research Council NWO. He has published
widely on the ethics of new and emerging science and technology (NEST
ethics) and on the mutual shaping of science and technology and mor-
als (technomoral change) in numerous books and in journals like Krisis,
Technology and Human Values, Technology in Society, Nano-Ethics, and
Futures.
Actor Network Theory (ANT) 11, 16, border management 2, 8, 16, 243, 246,
40, 155, 187, 191, 207, 215, 250, 261–3, 266, 276
265 boundaries 21, 57, 75, 89, 107, 112–13,
Adey, Peter 16, 221, 225, 227, 242 131, 141, 150, 156, 200, 255,
Advanced Passenger Information 275
System (API) 262, 266, 269, 276 boundary object 14, 114, 141, 150,
advergames 86–90, 92–4 152, 156
advertising 40, 54, 61, 85, 90–2, 228 boundary work 275
agency 11, 14, 39, 41, 72–4, 83, 191, Bowker, Geoff 11, 17, 78–9, 82, 96,
215, 243, 254, 270 112, 123, 181, 187, 191–2, 204
Akrich, Madeleine 11, 17, 41, 58, 79, Broeders, Dennis 16, 242–3, 252, 257
94, 115, 123, 187, 191, 200, Brubaker, Rogers 7, 17
203, 263, 279 Butler, Judith 9, 17, 31, 35
Albrechtslund, Anders 12, 21, 22, 30,
32, 34 Callon, Michel 53, 59, 77–8, 94, 152,
Albrechtslund, Anne-Mette 12, 21–2, 34 157–8, 191, 204, 254, 258
algorithm 2, 55, 107, 164–5, 174, 182, camera 15, 22–8, 206–15, 234, 248,
247 274
Amoore, Louise 181–2, 242–3, 251–2, care of virtual self 57, 60, 63
254, 256 categories 2, 40–50, 53–6, 78, 79–82,
Andrejevic, Mark 63, 75, 127, 138 92, 107–8, 164, 172, 179–81,
application programming interface 226, 246–7, 251–5, 267
(API) 13, 37–9, 41–2, 53 categorization 12–13, 41, 57, 106,
apps 13, 37 246–7, 255–6, 271
ascription 41 centres of calculation 243, 255
assemblage 40, 110, 235–9 children 13–4, 61, 77–94, 224–5,
asylum 243, 251–2, 256, 262; seeker 232; child abuse 118, 121; as
251, 262–4, 272–7 consumers 79, 83; protection of
authentication 1, 46, 273 104, 184, 188
circulating references 55, 254
Barthes, Roland 23–4, 29–30, 35 citizenship 12, 143, 145, 151
Bauman, Zygmunt 51, 56–8, 245, 257 Clarke, Roger 2, 17, 196, 204, 268,
Bentham, Jeremy 207, 216 279
Big Brother 286, 214 classification 184–8, 190–2, 194, 198,
big data 10, 223, 237, 242, 256 201
biometrics 2, 7, 242–4, 251–2, 273–4, close-circuit television (CCTV) 10,
276–7 206–17
border control 244, 247, 250–2, 256, co-creation 31, 84, 86, 93
261–3, 266, 275 cognitive development 78–80, 82, 90–1
290 Index
Cold War 227–8 European Border Surveillance System
constructivism: construction 3, 6, 11, (EUROSUR) 243, 248–50
31, 40, 51–2, 62, 82, 92, 109, European Commission 141, 144, 203,
120–1, 126, 155, 215, 256 248, 251, 261
consumers 19, 40, 77–94, 140–2, 179; European Council 261, 264
identity of 77–94 European Dactyloscopy (EURODAC)
consumption 39–40, 51, 52, 56–7, 251–2, 255, 262, 264
78–9, 86, 163 European Parliament 144, 159, 261
contingency 141, 156 European Union 3, 143, 203, 250, 262
Downloaded by [University of California, San Diego] at 19:23 09 January 2017
state: mediating state 242, 243, 244, Urry, John 23, 24, 25, 28, 223
246, 252, 254–7 users 11, 21–2, 30–1, 38–41, 45, 50,
Steeves, Valerie 77, 87, 125, 127, 130, 52, 60–3, 67, 70, 72, 141–2,
135, 197 148, 152, 154–7, 200
Strathern, Marilyn 164, 166
surveillance 6, 52, 61, 62–3, 75, 89, Valkenburg, Govert 103
126, 129, 132, 134, 137, 167, Valkenburg, Patti 9, 126, 131, 133
185–7, 197–8, 201–2, 206, 214, verification 5, 43, 46, 54, 263–5, 271,
216, 243, 245, 262; cameras 272–4, 277
206, 209, 213; studies 9–10, visa 244, 251–3, 255; Visa Information
207, 222, 223 System (VIS) 251, 255, 262
suspect 168, 171, 173, 176–7, 235, 275 visibility 13, 57, 60, 62, 65, 68, 74–5,
suspicion 15, 107, 122, 201, 202, 210, 126, 136, 263, 271
211, 226, 252, 265; categorical 10 visualization 166, 192, 230, 243–5,
Swierstra, Tsjalling 184 255, 271, 275