ABSTRACT
Location-based ubiquitous computing systems are entering mainstream society and becoming familiar parts of everyday life. However, the settings in which they are deployed are already suffused with complex social dynamics. We report on a study of parole officers and parolees whose relationships are being transformed by location-based technologies. While parolees are clearly subjects of state discipline, the parole officers also find themselves subject to new responsibilities. This study highlights the complexities of power in sociotechnical systems and what happens when location becomes a tradable, technological object.
- Barkhuus, L., Brown, B., Bell, M., Sherwood, S., Hall, M. and Chalmers, M., From awareness to repartee: Sharing location within social groups. In proceedings of the SIGCHI conference on human factors in computing systems, (Florence, Italy, 2008), ACM. Google ScholarDigital Library
- Bittner, E. The police on skid-row: A study of peace keeping. American Sociological Review, 32 (5). 699--715, 1967.Google ScholarCross Ref
- Bowker, G.C. and Star, S.L. Sorting things out: Classification and its consequences. MIT Press, Cambridge, Mass., 1999. Google ScholarDigital Library
- Brown, B. and Perry, M. Of maps and guidebooks: Designing geographical technologies. In proc. of ACM Conf. Designing Interactive Systems DIS 2002 (London, UK). 246--254, 2002. Google ScholarDigital Library
- Chan, J.B.L. The technological game: How information technology is transforming police practice. Journal of Criminology and Criminal Justice, 1 (2). 139--159, 2001.Google ScholarCross Ref
- Daston, L. and Galison, P. Objectivity. Zone Books, New York, 2007.Google Scholar
- Dearman, D., Varshavsky, A., de Lara, E. and Truong, K. An Exploration of Location Error Estimation. in Proc. of Intl. Conf. on Ubiquitous Computing (UbiComp 2007), Springer, 2007, 181--198. Google ScholarDigital Library
- Dourish, P. and Anderson, K. Collective information practice: Emploring privacy and security as social and cultural phenomena. Human Computer Interaction, 21 (3). 319--342, 2006. Google ScholarDigital Library
- Foucault, M. Discipline and punish: The birth of the prison. Vintage Books, New York, 1977(1995).Google Scholar
- Foucault, M. and Gordon, C. Power/knowledge: Selected interviews and other writings, 1972--1977. Pantheon Books, New York, 1980.Google Scholar
- Gilliom, J. Overseers of the poor: Surveillance, resistance, and the limits of privacy. University of Chicago Press, Chicago, 2001.Google Scholar
- Harper, R.R. The computer game: Detectives, suspects, and technology. British Journal of Criminology, 31 (3). 292--307, 1991.Google ScholarCross Ref
- Hightower, J., Consolvo, S., LaMarca, A., Smith, I. and Hughes, J. Learning and recognizing the places we go. in In proc Intl. Conf. Ubiquitous Computing (UbiComp 2005), 2005, 159--176. Google ScholarDigital Library
- Hong, J., Boriello, G., Landay, J., McDonald, D., Schillit, B. and Tygar, J. Privacy and security in the location-enhanced world wide web. in Proc. Intl. Conf. on Ubiquitous Computing (Ubicomp 2003), Springer, Seattle, WA, 2003.Google Scholar
- Iachello, G., Smith, I., Consolvo, S., Abowd, G.D., Hughes, J., Howard, J., Potter, F., Scott, J., Sohn, T., Hightower, J. and LaMarca, A. Control, deception, and communication: Evaluating the deployment of a location-enhanced messaging service. in Proc. of Intl. Conf. on Ubiquitous Computing (UbiComp 2005), Springer, 2005, 213--231. Google ScholarDigital Library
- Laurier, E. Why people say where they are during mobile phone calls. Environment and Planning D: Society and Space, 19 (4). 485--504, 2001.Google ScholarCross Ref
- Leshed, G., Velden, T., Rieger, O., Kot, B. and Sengers, P., In-car GPS navigation: Engagement with and disengagement from the environment. In proceedings of the conference on Human Factors in Computing Systems, (Florence, Italy, 2008), ACM. Google ScholarDigital Library
- Lipsky, M. Street-level bureaucracy: Dilemmas of the individual in public services. Sage, New York, 1980.Google Scholar
- Manning, P.K. Technological dramas and the police: statement and counterstatement in organizational analysis. Criminology, 30 (3). 327--346, 1992.Google ScholarCross Ref
- Marx, K. Capital: A Critique of Political Economy. Penguin, London, 1867(1976).Google Scholar
- Nguyen, D.H., Kobsa, A. and Hayes, G.R. An empirical investigation of concerns of everyday tracking and recording technologies. in Proc. Intl. Conf. on Ubiquitous Computing (Ubicomp 2008), ACM, New York, 2008. Google ScholarDigital Library
- Orlikowski, W. Improvising organizational transformation over time: A situated change perspective. Information Systems Research, 7 (1). 63--92., 1996.Google ScholarDigital Library
- Orlikowski, W. Using technology and constituting structures: A practice lens for studying technology in organizations. Organizational Science, 11, (4). 404--428, 2000. Google ScholarDigital Library
- Peckenpaugh, J. Controlling Sex Offender Reentry: Jessica's Law Measures in California {Electronic Version}. 2006, Retrieved 04-01-2009, from http://ssrn.com/paper=977263Google Scholar
- Schegloff, E.A. Notes on conversational practice: Formulating place. in Sudnow, D. ed. Studies in Social Interaction, Free Press, New York,, 1971, 75--119.Google Scholar
- Shapin, S. The scientific life: A moral history of a late modern vocation. University of Chicago Press, 2008.Google Scholar
- Sohn, T., Varshavsky, A., LaMarca, A., Chen, M., Choudhury, T., Smith, I., Consolvo, S., Hightower, J., Griswold, W. and de Lara, E. Mobility Detection Using Everyday GSM Traces. in Proc. of Intl. Conf. on Ubiquitous Computing (UbiComp 2006), Springer, 2006, 212--224. Google ScholarDigital Library
- Sorensen, C. and Pica, D. Tales from the police: Rhythms of interaction with mobile technologies. Information and Organization, 15 (2). 125--149, 2005. Google ScholarDigital Library
- Sudnow, D. Normal crimes: Sociological features of the penal code in a public defender office. Social Problems, 12 (3). 255--276, 1965.Google ScholarCross Ref
- Troshynski, E., Lee, C. and Dourish, P. Accountabilities of presence: Reframing location-based systems. in in proc of Conf. on Human Factors in Computing Systems (CHI 2008), ACM, New York, 2008. Google ScholarDigital Library
- Turner, S., Jannetta, J., Hess, J., Myers, R., Shah, R., Werth, R. and Whitby, A. Implementation and early outcomes for the San Diego high risk sex offender (HRSO) GPS pilot program report, CEBC, University of California, Irvine, 2007.Google Scholar
- Van Maanen, J. Police socialization: A longitudinal examination of job attitudes in an urban police department. Administrative Science Quarterly, 20 (2). 207--228, 1975.Google ScholarCross Ref
- Van Maanen, J. The asshole. in Manning, P.K. and Van Maanen, J. eds. Policing: A view from the street, Goodyear, Santa Monica, CA, 1978, 221--238.Google Scholar
- Wieder, D.L. Language and social reality: The case of telling the convict code. Mouton, The Hague, 1974.Google ScholarCross Ref
- Zafiroglu, A. and Chang, M. Digital homes on wheels: Designing for the unimagined home. Personal and Ubiquitous Computing, 11 (5). 395--402, 2007. Google ScholarDigital Library
Index Terms
- The commodification of location: dynamics of power in location-based systems
Recommendations
Pinpointing TomTom location records: A forensic analysis
TomTom GPS navigation devices are one of the most popular kinds of satellite navigation devices in the UK, and are increasingly being examined in criminal cases to identify data of evidential value. This article outlines the format of TomTom location ...
Will Mobile Computing's Future Be Location, Location, Location?
As mobile computing has been more widely adopted in recent years, proponents have said location-based services could have a bright future. However, LBS has failed to take off in the marketplace yet.
Reusable framework for location-aware mobile applications
Mobility '09: Proceedings of the 6th International Conference on Mobile Technology, Application & SystemsA fundamental dilemma in location-aware mobile applications is how to determine their physical location. Because pervasive computing is still immature, and its ubiquitous infrastructure is not set to serve location-aware applications, much research has ...
Comments