Reading List

articles, interviews, books, reports

  • Cavoukian, A. and Tapscott, D. (1995) Who Knows? Safeguarding Your Privacy in a Networked World, Toronto: Random House.
  • Davies, S. (1996) Big Brother: Britain’s Web of Surveillance and the New Technological Order, London: Pan Books.
  • Garfinkel, S. (2001) Database Nation: The Death of Privacy in the 21st Century. Cambridge, MA: O’Reilly.
  • O’Harrow, R. J. (2005) No Place to Hide: Behind the Scenes of Our Emerging Surveillance Society. New York: Free Press.
  • Parenti, C. (2003) The Soft Cage: Surveillance in America from Slave Passes to the War on Terror. New York: Basic Books.
  • Parker, J. (2000) Total Surveillance Investigating the Big Brother world of e-spies, eavesdroppers and CCTV, Piatkus.
  • Rosen, J. (2004) The Naked Crowd: Reclaiming Security and Freedom in an Anxious Age. New York: Random House.
  • Whitaker, R. (1999) The End of Privacy: How Total Surveillance is Becoming a Reality. New York: The New Press.
  • Ball, K. and Webster, F. (eds.) (2003) The Intensification of Surveillance: Crime, Terrorism and Warfare in the Information Era. London: Pluto Press.
  • Gould, B and Neyland, D (eds) (2009) ‘New Directions in Surveillance and Privacy’ Collumpton: Willan
  • Haggerty, K. and Ericson, R. (2006) The New Politics of Surveillance and Visibility, Toronto: University of Toronto Press.
  • Levin, T. Y., Frohe, U. and Weibel, P. (eds.) (2002) CTRL [Space]: Rhetorics of Surveillance from Bentham to Big Brother. Cambridge, MA and London: MIT Press.
  • Lyon, D. (ed.) (2003) Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination, London and New York: Routledge.
  • Lyon, D. and E. Zureik (eds.) (1998) Computers, Surveillance and Privacy. Minneapolis: University of Minnesota Press.
  • Monahan, Torin, ed. 2006. Surveillance and Security: Technological Politics and Power in Everyday Life. New York: Routledge.
GeNeral academic texts
  • Bogard, W. (1996) The Simulation of Surveillance: Hypercontrol in Telematic Societies. Cambridge: Cambridge University Press.
  • Coleman, R. (2004) Reclaiming the Streets: Surveillance, Social Control and the City. Cullompton, UK: Willan.
  • Dandeker, C. (1990) Surveillance, Power and Modernity: Bureaucracy and Discipline from 1700 to the Present Day. Cambridge, MA: Polity Press.
  • Ericson, R. V. and Haggerty, K.D. (1997) Policing the Risk Society. Toronto: University of Toronto Press.
  • Foucault, M. (1977) Discipline and Punish: The Birth of the Prison. New York: Pantheon
  • Garland, D. (2001) The Culture of Control: Crime and Social Order in Contemporary Society. Chicago: University of Chicago Press.
  • Gilliom, J. (2001) Overseers of the Poor: Surveillance, Resistance and the Limits of Privacy. Chicago: University of Chicago Press.
  • Lyon, D. (ed.) (2006) Theorizing Surveillance: The Panopticon and Beyond. Cullompton, UK: Willan
  • Lyon, D. (2003) Surveillance after September 11. Cambridge: Polity Press.
  • Lyon, D. (2001) Surveillance Society: Monitoring Everyday Life. Buckingham: Open University Press
  • Lyon, D. (1994) The Electronic Eye: The Rise of Surveillance Society. Cambridge, MA: Polity Press.
  • McCahill, M. (2002) The Surveillance Web: The rise of visual surveillance in an English city, Cullompton: Willan.
  • McGrath, J. (2004) Loving Big Brother: Performance, Privacy and Surveillance Space. London: Routledge.
  • Marx, G.T. (1988) Undercover: Police Surveillance in America. Berkeley, CA: University of California Press.
  • Monahan, Torin. 2010. Surveillance in the Time of Insecurity. New Brunswick: Rutgers University Press.
  • Monmonier, M. (2004) Spying with Maps: Surveillance Technologies and the Future of Privacy. Chicago: University of Chicago Press.
  • Norris, C. and Armstrong, G. (1999) The Maximum Surveillance Society: The Rise of CCTV, Oxford: Berg.
  • Rigakos, G. (2002) The New Parapolice: Risk Markets and Commodified Social Control. Toronto: University of Toronto Press.
  • Rule, J.B. (1974) Private Lives and Public Surveillance: Social Control in the Computer Age, New York, NY: Schocken Books.
  • Staples, W.G. (2000) Everyday Surveillance: Vigilance and Visibility in Postmodern Life. New York: Rowman and Littlefield.
  • Staples, W.G. (1997) The Culture of Surveillance: Discipline and Social Control in the United States. New York: St. Martin’s Press.
infrastructure and built environment
  • Coaffee, J. (2003) Terrorism, Risk and the City: The Making of a Contemporary Urban Landscape. Aldershot UK: Ashgate.
  • Graham, S. (ed.) (2004) The Cybercities Reader, London: Routledge.
  • Graham, S. and Marvin, S. (2001) Splintering Urbanism: Networked Infrastructures, Technological Mobilities and the Urban Condition. London: Routledge.
  • Institute for the Future (2004) Infrastructure for the New Geography. Menlo Park: California. IFTF.
  • Kang, J. and Cuff, D. (2005) ‘Pervasive Computing: Embedding the Public Sphere,’ Washington and Lee Law Review 62(1): 93-146.
  • Bamford, J. (2001) Body of Secrets: Anatomy of the Ultra-Secret National Security Agency. New York: Random House.
  • Keefe, P.R. (2005) Chatter: Dispatches from the Secret World of Global Eavesdropping. New York: Random House
  • Crampton, J. (2004) The Political Mapping of Cyberspace. Chicago: University of Chicago Press.
  • Diffie, W. and Landau, S. (1998) Privacy on the Line: The Politics of Wiretapping and Encryption, Cambridge, MA: MIT Press.
  • Lessig, L. (1999) Code and Other laws of Cyberspace, New York, NY: Basic Books.

Access a reading list about Surveillance in Education and Ed-tech provided by Dr. Claire Reddleman here


  • Andreas, P. and Snyder, T. (eds.), The Wall Around the West: State Borders and Immigration Controls in North America and Europe. Lanham MD: Rowman and Littlefield.
  • Bigo, D. and Guild, E. (eds.) (2005) Controlling Frontiers: Free Movement into and within Europe, Aldershot: Ashgate.
  • Salter, M. (2003) Rights of Passage: The Passport in International Relations. Boulder, CO: Lynne Rienner.
  • Torpey, F. (2001) The Invention of the Passport: Surveillance, Citizenship and the State. Cambridge: Cambridge University Press.
  • Zureik, E. and Salter, M.B. (eds.)(2005) Global Surveillance and Policing: Borders, Security, Identity. Cullompton, UK: Willan.
citizenship and identity
  • Caplan, J. and Torpey, J. (eds.) (2002) Documenting Individual Identity: The Development of State Practices in the Modern Word, Princeton, NJ: Princeton University Press
  • Garton-Ash, T. (1997) The File: A Personal History. London: Harper Collins.
  • House of Commons Select Committee on Science and Technology (2006) Identity Card Technologies: Scientific Advice, Risk and Evidence
  • Lyon, D. (2004) ‘Identity cards: social sorting by database,’ OII Internet Issue Brief No. 3 .
  • Solove, D. (2004) The Digital Person: Technology and Privacy in the Information Age. New York: New York University Press.



  • Elmer, G. (2004). Profiling Machines: Mapping the Personal Information Economy. Cambridge, MA: The MIT Press.
  • Gandy, O. (1993) The Panoptic Sort: A Political Economy of Personal Information, Boulder, CO: Westview Press.
  • Lace, S. (ed.) (2005) The Glass Consumer: Life in a Surveillance Society, Bristol: The Policy Press.
  • Turow, J. (2006) Niche Envy: Marketing Discrimination in the Digital Age. Cambridge MA: MIT Press.
  • Gill, M. and Spriggs, A. (2005) Assessing the impact of CCTV. London, Home Office Research, Development and Statistics Directorate.
  • Goold, B. J. (2004) CCTV and Policing: Public Area Surveillance and Police Practices in Britain. Oxford: Oxford University Press.
  • Newburn, T. and Hayman, S. (2001) Policing, CCTV, and Social Control: Police Surveillance and Suspects in Custody. Collumpton: Willan Publishing.
  • Norris, C., McCahill, M. and Wood, D. (eds.) (2004) The Politics of CCTV in Europe and Beyond.Special Issue of Surveillance and Society, 2(2/3),
  • Painter, K. and Tilley, N. (1999) Surveillance of Public Space: CCTV, Street Lighting and Crime Prevention. Cullompton: Willan.
  • Armstrong, D. (1995) ‘The Rise of Surveillance Medicine,’ Sociology of Health and Illness, 17(3): 393-404.
  • Cole, S. (2001) Suspect Identities: A History of Fingerprinting and Criminal Identification, Boston; Harvard University Press.
  • Nelkin, D. and Tancredi, L. (1994) Dangerous Diagnostics. Chicago: University of Chicago Press
  • Laurie, G. (2002) Genetic Privacy: A Challenge to Medico-Legal Norms, Cambridge: Cambridge University Press.
  • Rose, H. (2001) The Commodification of Bioinformation: The Icelandic Health Sector Database, London: The Wellcome Trust.

6, P. (1998) The Future of Privacy, Volume 1: Private Life and Public Policy, London: Demos.

  • Bennett, C. (1992) Regulating Privacy: Data Protection and Public Policy in Europe and the United States, Ithaca, NY: Cornell University Press.
  • Bennett, C. and Raab, C. (2006) The Governance of Privacy: Policy Instruments in Global Perspective. Cambridge, MA: MIT Press.
  • Flaherty, D. (1989) Protecting Privacy in Surveillance Societies: The Federal Republic of Germany, Sweden, France, Canada, and the United States, Chapel Hill, NC: University of North Carolina Press.
  • Regan, P. (1995) Legislating Privacy: Technology, Social Values, and Public Policy. Chapel Hill: University of North Carolina Press.
  • Ball, K.S. (ed.) (2002) Work. Special issue of Surveillance and Society 1(2),
  • Frenkel, S. et al. (1999) On the Front Line: The Organization of Work in the Information Economy. Ithaca: Cornell University Press
  • Monahan, Torin, and Rodolfo D. Torres, eds. 2010. Schools under Surveillance: Cultures of Control in Public Education. New Brunswick: Rutgers University Press.
  • McKinlay, A. and Starkey, K. (eds.) (1998) Foucault, Management and Organization Theory: From Panopticon to Technologies of Self. London: Sage.
  • Stanton, J.M. and Stam, K.R. (2006) The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Trust. Medford, NJ: Cyberage Books.
  • Zuboff, S (1988) In the Age of the Smart Machine. New York: Basic Books.