The commodification of mobile phone surveillance: an analysis of the consumer spyware industry
This article examines the attempts of "spyware" developers to commodify and market their products to a general audience. While consumers of "spyware" have often been government and law enforcement (Citizen Lab, 2015), there is an increasing attempt to market, sell, and commodify...
Ausführliche Beschreibung
Autor*in: |
Harkin, Diarmaid - 1986- [verfasserIn] Molnar, Adam [verfasserIn] Vowles, Erica [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2020 |
---|
Schlagwörter: |
---|
Anmerkung: |
Literaturverzeichnis |
---|---|
Umfang: |
Illustrationen |
Übergeordnetes Werk: |
Enthalten in: Crime, media, culture - Thousand Oaks, Calif. : Sage, 2005, 16(2020), 1, Seite 33-60 |
---|---|
Übergeordnetes Werk: |
volume:16 ; year:2020 ; number:1 ; pages:33-60 |
Links: |
---|
DOI / URN: |
10.1177/1741659018820562 |
---|
Katalog-ID: |
1858790123 |
---|
LEADER | 01000naa a22002652 4500 | ||
---|---|---|---|
001 | 1858790123 | ||
003 | DE-627 | ||
005 | 20230905111320.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230905s2020 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1177/1741659018820562 |2 doi | |
035 | |a (DE-627)1858790123 | ||
035 | |a (DE-599)KXP1858790123 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Harkin, Diarmaid |d 1986- |e verfasserin |0 (DE-588)1195236557 |0 (DE-627)1677394919 |4 aut | |
245 | 1 | 4 | |a The commodification of mobile phone surveillance: an analysis of the consumer spyware industry |c Diarmaid Harkin, Adam Molnar, and Erica Vowles |
264 | 1 | |c 2020 | |
300 | |b Illustrationen | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Literaturverzeichnis | ||
520 | |a This article examines the attempts of "spyware" developers to commodify and market their products to a general audience. While consumers of "spyware" have often been government and law enforcement (Citizen Lab, 2015), there is an increasing attempt to market, sell, and commodify "spyware" for use by wider audiences. "Spyware" is sold as a security product commonly aimed at businesses, parents, and intimate partners. Pursuant to calls for a "sociology of security consumption" (Goold et al., 2010: 3), this article analyzes how nine prominent spyware vendors attribute meaning to their products. Spyware vendors face particularly fraught marketing challenges as the general deployment of spyware: a) is often utilized in forms of intimate partner abuse; b) is "morally troubling" from the perspective of being corrosive to many forms of social relations (Loader et al., 2014: 469); and c) has limited contexts where it could be deployed without violating surveillance laws. More specifically, this article compares the social meaning that vendors attempt to give to spyware and contrasts this with the powers of surveillance provided by the product, the marketing messages that appear to support non-consensual use, and the lack of guidance for non-consenting spyware targets to have recourse with the vendors. | ||
650 | 4 | |a Family violence | |
650 | 4 | |a privacy | |
650 | 4 | |a private security | |
650 | 4 | |a spyware | |
650 | 4 | |a surveillance | |
700 | 1 | |a Molnar, Adam |e verfasserin |0 (DE-588)1176203843 |0 (DE-627)1047362619 |0 (DE-576)516524038 |4 aut | |
700 | 1 | |a Vowles, Erica |e verfasserin |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Crime, media, culture |d Thousand Oaks, Calif. : Sage, 2005 |g 16(2020), 1, Seite 33-60 |h Online-Ressource |w (DE-627)48361078X |w (DE-600)2183400-3 |w (DE-576)26132540X |x 1741-6604 |7 nnns |
773 | 1 | 8 | |g volume:16 |g year:2020 |g number:1 |g pages:33-60 |
856 | 4 | 0 | |u https://doi.org/10.1177/1741659018820562 |x Resolving-System |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_U | ||
912 | |a GBV_ILN_2002 | ||
912 | |a ISIL_DE-21-110 | ||
912 | |a SYSFLAG_1 | ||
912 | |a GBV_KXP | ||
912 | |a GBV_ILN_11 | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_23 | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_31 | ||
912 | |a GBV_ILN_32 | ||
912 | |a GBV_ILN_39 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_63 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_73 | ||
912 | |a GBV_ILN_74 | ||
912 | |a GBV_ILN_90 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_100 | ||
912 | |a GBV_ILN_101 | ||
912 | |a GBV_ILN_105 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_120 | ||
912 | |a GBV_ILN_121 | ||
912 | |a GBV_ILN_138 | ||
912 | |a GBV_ILN_150 | ||
912 | |a GBV_ILN_151 | ||
912 | |a GBV_ILN_152 | ||
912 | |a GBV_ILN_161 | ||
912 | |a GBV_ILN_165 | ||
912 | |a GBV_ILN_171 | ||
912 | |a GBV_ILN_184 | ||
912 | |a GBV_ILN_187 | ||
912 | |a GBV_ILN_206 | ||
912 | |a GBV_ILN_213 | ||
912 | |a GBV_ILN_224 | ||
912 | |a GBV_ILN_230 | ||
912 | |a GBV_ILN_250 | ||
912 | |a GBV_ILN_281 | ||
912 | |a GBV_ILN_285 | ||
912 | |a GBV_ILN_293 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_374 | ||
912 | |a GBV_ILN_602 | ||
912 | |a GBV_ILN_636 | ||
912 | |a GBV_ILN_647 | ||
912 | |a GBV_ILN_702 | ||
912 | |a GBV_ILN_2001 | ||
912 | |a GBV_ILN_2003 | ||
912 | |a GBV_ILN_2005 | ||
912 | |a GBV_ILN_2006 | ||
912 | |a GBV_ILN_2007 | ||
912 | |a GBV_ILN_2008 | ||
912 | |a GBV_ILN_2009 | ||
912 | |a GBV_ILN_2010 | ||
912 | |a GBV_ILN_2011 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_2015 | ||
912 | |a GBV_ILN_2018 | ||
912 | |a GBV_ILN_2020 | ||
912 | |a GBV_ILN_2021 | ||
912 | |a GBV_ILN_2025 | ||
912 | |a GBV_ILN_2026 | ||
912 | |a GBV_ILN_2027 | ||
912 | |a GBV_ILN_2031 | ||
912 | |a GBV_ILN_2034 | ||
912 | |a GBV_ILN_2036 | ||
912 | |a GBV_ILN_2037 | ||
912 | |a GBV_ILN_2038 | ||
912 | |a GBV_ILN_2039 | ||
912 | |a GBV_ILN_2043 | ||
912 | |a GBV_ILN_2044 | ||
912 | |a GBV_ILN_2048 | ||
912 | |a GBV_ILN_2049 | ||
912 | |a GBV_ILN_2050 | ||
912 | |a GBV_ILN_2055 | ||
912 | |a GBV_ILN_2056 | ||
912 | |a GBV_ILN_2057 | ||
912 | |a GBV_ILN_2059 | ||
912 | |a GBV_ILN_2061 | ||
912 | |a GBV_ILN_2064 | ||
912 | |a GBV_ILN_2065 | ||
912 | |a GBV_ILN_2068 | ||
912 | |a GBV_ILN_2070 | ||
912 | |a GBV_ILN_2086 | ||
912 | |a GBV_ILN_2093 | ||
912 | |a GBV_ILN_2098 | ||
912 | |a GBV_ILN_2106 | ||
912 | |a GBV_ILN_2107 | ||
912 | |a GBV_ILN_2108 | ||
912 | |a GBV_ILN_2110 | ||
912 | |a GBV_ILN_2111 | ||
912 | |a GBV_ILN_2112 | ||
912 | |a GBV_ILN_2113 | ||
912 | |a GBV_ILN_2116 | ||
912 | |a GBV_ILN_2118 | ||
912 | |a GBV_ILN_2119 | ||
912 | |a GBV_ILN_2122 | ||
912 | |a GBV_ILN_2125 | ||
912 | |a GBV_ILN_2129 | ||
912 | |a GBV_ILN_2143 | ||
912 | |a GBV_ILN_2144 | ||
912 | |a GBV_ILN_2145 | ||
912 | |a GBV_ILN_2147 | ||
912 | |a GBV_ILN_2148 | ||
912 | |a GBV_ILN_2152 | ||
912 | |a GBV_ILN_2153 | ||
912 | |a GBV_ILN_2158 | ||
912 | |a GBV_ILN_2190 | ||
912 | |a GBV_ILN_2193 | ||
912 | |a GBV_ILN_2232 | ||
912 | |a GBV_ILN_2336 | ||
912 | |a GBV_ILN_2400 | ||
912 | |a GBV_ILN_2446 | ||
912 | |a GBV_ILN_2470 | ||
912 | |a GBV_ILN_2472 | ||
912 | |a GBV_ILN_2507 | ||
912 | |a GBV_ILN_2522 | ||
912 | |a GBV_ILN_2548 | ||
912 | |a GBV_ILN_2705 | ||
912 | |a GBV_ILN_2889 | ||
912 | |a GBV_ILN_2890 | ||
912 | |a GBV_ILN_4012 | ||
912 | |a GBV_ILN_4035 | ||
912 | |a GBV_ILN_4037 | ||
912 | |a GBV_ILN_4046 | ||
912 | |a GBV_ILN_4112 | ||
912 | |a GBV_ILN_4125 | ||
912 | |a GBV_ILN_4126 | ||
912 | |a GBV_ILN_4242 | ||
912 | |a GBV_ILN_4246 | ||
912 | |a GBV_ILN_4249 | ||
912 | |a GBV_ILN_4251 | ||
912 | |a GBV_ILN_4277 | ||
912 | |a GBV_ILN_4305 | ||
912 | |a GBV_ILN_4306 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4322 | ||
912 | |a GBV_ILN_4323 | ||
912 | |a GBV_ILN_4324 | ||
912 | |a GBV_ILN_4325 | ||
912 | |a GBV_ILN_4326 | ||
912 | |a GBV_ILN_4328 | ||
912 | |a GBV_ILN_4333 | ||
912 | |a GBV_ILN_4335 | ||
912 | |a GBV_ILN_4338 | ||
912 | |a GBV_ILN_4346 | ||
912 | |a GBV_ILN_4367 | ||
912 | |a GBV_ILN_4393 | ||
912 | |a GBV_ILN_4700 | ||
912 | |a GBV_ILN_4753 | ||
951 | |a AR | ||
952 | |d 16 |j 2020 |e 1 |h 33-60 | ||
980 | |2 2002 |1 01 |x DE-21-110 |b 4372794096 |c 00 |f --%%-- |d --%%-- |e --%%-- |j n |y l01 |z 05-09-23 |
author_variant |
d h dh a m am e v ev |
---|---|
matchkey_str |
article:17416604:2020----::hcmoiiainfoiehnsrelacaaayioteo |
hierarchy_sort_str |
2020 |
publishDate |
2020 |
allfields |
10.1177/1741659018820562 doi (DE-627)1858790123 (DE-599)KXP1858790123 DE-627 ger DE-627 rda eng Harkin, Diarmaid 1986- verfasserin (DE-588)1195236557 (DE-627)1677394919 aut The commodification of mobile phone surveillance: an analysis of the consumer spyware industry Diarmaid Harkin, Adam Molnar, and Erica Vowles 2020 Illustrationen Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Literaturverzeichnis This article examines the attempts of "spyware" developers to commodify and market their products to a general audience. While consumers of "spyware" have often been government and law enforcement (Citizen Lab, 2015), there is an increasing attempt to market, sell, and commodify "spyware" for use by wider audiences. "Spyware" is sold as a security product commonly aimed at businesses, parents, and intimate partners. Pursuant to calls for a "sociology of security consumption" (Goold et al., 2010: 3), this article analyzes how nine prominent spyware vendors attribute meaning to their products. Spyware vendors face particularly fraught marketing challenges as the general deployment of spyware: a) is often utilized in forms of intimate partner abuse; b) is "morally troubling" from the perspective of being corrosive to many forms of social relations (Loader et al., 2014: 469); and c) has limited contexts where it could be deployed without violating surveillance laws. More specifically, this article compares the social meaning that vendors attempt to give to spyware and contrasts this with the powers of surveillance provided by the product, the marketing messages that appear to support non-consensual use, and the lack of guidance for non-consenting spyware targets to have recourse with the vendors. Family violence privacy private security spyware surveillance Molnar, Adam verfasserin (DE-588)1176203843 (DE-627)1047362619 (DE-576)516524038 aut Vowles, Erica verfasserin aut Enthalten in Crime, media, culture Thousand Oaks, Calif. : Sage, 2005 16(2020), 1, Seite 33-60 Online-Ressource (DE-627)48361078X (DE-600)2183400-3 (DE-576)26132540X 1741-6604 nnns volume:16 year:2020 number:1 pages:33-60 https://doi.org/10.1177/1741659018820562 Resolving-System lizenzpflichtig Volltext GBV_USEFLAG_U GBV_ILN_2002 ISIL_DE-21-110 SYSFLAG_1 GBV_KXP GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_121 GBV_ILN_138 GBV_ILN_150 GBV_ILN_151 GBV_ILN_152 GBV_ILN_161 GBV_ILN_165 GBV_ILN_171 GBV_ILN_184 GBV_ILN_187 GBV_ILN_206 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_250 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_374 GBV_ILN_602 GBV_ILN_636 GBV_ILN_647 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2018 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2036 GBV_ILN_2037 GBV_ILN_2038 GBV_ILN_2039 GBV_ILN_2043 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2057 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2070 GBV_ILN_2086 GBV_ILN_2093 GBV_ILN_2098 GBV_ILN_2106 GBV_ILN_2107 GBV_ILN_2108 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2116 GBV_ILN_2118 GBV_ILN_2119 GBV_ILN_2122 GBV_ILN_2125 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2144 GBV_ILN_2145 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2158 GBV_ILN_2190 GBV_ILN_2193 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2400 GBV_ILN_2446 GBV_ILN_2470 GBV_ILN_2472 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_2548 GBV_ILN_2705 GBV_ILN_2889 GBV_ILN_2890 GBV_ILN_4012 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4242 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4277 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4328 GBV_ILN_4333 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4346 GBV_ILN_4367 GBV_ILN_4393 GBV_ILN_4700 GBV_ILN_4753 AR 16 2020 1 33-60 2002 01 DE-21-110 4372794096 00 --%%-- --%%-- --%%-- n l01 05-09-23 |
spelling |
10.1177/1741659018820562 doi (DE-627)1858790123 (DE-599)KXP1858790123 DE-627 ger DE-627 rda eng Harkin, Diarmaid 1986- verfasserin (DE-588)1195236557 (DE-627)1677394919 aut The commodification of mobile phone surveillance: an analysis of the consumer spyware industry Diarmaid Harkin, Adam Molnar, and Erica Vowles 2020 Illustrationen Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Literaturverzeichnis This article examines the attempts of "spyware" developers to commodify and market their products to a general audience. While consumers of "spyware" have often been government and law enforcement (Citizen Lab, 2015), there is an increasing attempt to market, sell, and commodify "spyware" for use by wider audiences. "Spyware" is sold as a security product commonly aimed at businesses, parents, and intimate partners. Pursuant to calls for a "sociology of security consumption" (Goold et al., 2010: 3), this article analyzes how nine prominent spyware vendors attribute meaning to their products. Spyware vendors face particularly fraught marketing challenges as the general deployment of spyware: a) is often utilized in forms of intimate partner abuse; b) is "morally troubling" from the perspective of being corrosive to many forms of social relations (Loader et al., 2014: 469); and c) has limited contexts where it could be deployed without violating surveillance laws. More specifically, this article compares the social meaning that vendors attempt to give to spyware and contrasts this with the powers of surveillance provided by the product, the marketing messages that appear to support non-consensual use, and the lack of guidance for non-consenting spyware targets to have recourse with the vendors. Family violence privacy private security spyware surveillance Molnar, Adam verfasserin (DE-588)1176203843 (DE-627)1047362619 (DE-576)516524038 aut Vowles, Erica verfasserin aut Enthalten in Crime, media, culture Thousand Oaks, Calif. : Sage, 2005 16(2020), 1, Seite 33-60 Online-Ressource (DE-627)48361078X (DE-600)2183400-3 (DE-576)26132540X 1741-6604 nnns volume:16 year:2020 number:1 pages:33-60 https://doi.org/10.1177/1741659018820562 Resolving-System lizenzpflichtig Volltext GBV_USEFLAG_U GBV_ILN_2002 ISIL_DE-21-110 SYSFLAG_1 GBV_KXP GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_121 GBV_ILN_138 GBV_ILN_150 GBV_ILN_151 GBV_ILN_152 GBV_ILN_161 GBV_ILN_165 GBV_ILN_171 GBV_ILN_184 GBV_ILN_187 GBV_ILN_206 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_250 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_374 GBV_ILN_602 GBV_ILN_636 GBV_ILN_647 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2018 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2036 GBV_ILN_2037 GBV_ILN_2038 GBV_ILN_2039 GBV_ILN_2043 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2057 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2070 GBV_ILN_2086 GBV_ILN_2093 GBV_ILN_2098 GBV_ILN_2106 GBV_ILN_2107 GBV_ILN_2108 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2116 GBV_ILN_2118 GBV_ILN_2119 GBV_ILN_2122 GBV_ILN_2125 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2144 GBV_ILN_2145 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2158 GBV_ILN_2190 GBV_ILN_2193 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2400 GBV_ILN_2446 GBV_ILN_2470 GBV_ILN_2472 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_2548 GBV_ILN_2705 GBV_ILN_2889 GBV_ILN_2890 GBV_ILN_4012 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4242 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4277 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4328 GBV_ILN_4333 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4346 GBV_ILN_4367 GBV_ILN_4393 GBV_ILN_4700 GBV_ILN_4753 AR 16 2020 1 33-60 2002 01 DE-21-110 4372794096 00 --%%-- --%%-- --%%-- n l01 05-09-23 |
allfields_unstemmed |
10.1177/1741659018820562 doi (DE-627)1858790123 (DE-599)KXP1858790123 DE-627 ger DE-627 rda eng Harkin, Diarmaid 1986- verfasserin (DE-588)1195236557 (DE-627)1677394919 aut The commodification of mobile phone surveillance: an analysis of the consumer spyware industry Diarmaid Harkin, Adam Molnar, and Erica Vowles 2020 Illustrationen Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Literaturverzeichnis This article examines the attempts of "spyware" developers to commodify and market their products to a general audience. While consumers of "spyware" have often been government and law enforcement (Citizen Lab, 2015), there is an increasing attempt to market, sell, and commodify "spyware" for use by wider audiences. "Spyware" is sold as a security product commonly aimed at businesses, parents, and intimate partners. Pursuant to calls for a "sociology of security consumption" (Goold et al., 2010: 3), this article analyzes how nine prominent spyware vendors attribute meaning to their products. Spyware vendors face particularly fraught marketing challenges as the general deployment of spyware: a) is often utilized in forms of intimate partner abuse; b) is "morally troubling" from the perspective of being corrosive to many forms of social relations (Loader et al., 2014: 469); and c) has limited contexts where it could be deployed without violating surveillance laws. More specifically, this article compares the social meaning that vendors attempt to give to spyware and contrasts this with the powers of surveillance provided by the product, the marketing messages that appear to support non-consensual use, and the lack of guidance for non-consenting spyware targets to have recourse with the vendors. Family violence privacy private security spyware surveillance Molnar, Adam verfasserin (DE-588)1176203843 (DE-627)1047362619 (DE-576)516524038 aut Vowles, Erica verfasserin aut Enthalten in Crime, media, culture Thousand Oaks, Calif. : Sage, 2005 16(2020), 1, Seite 33-60 Online-Ressource (DE-627)48361078X (DE-600)2183400-3 (DE-576)26132540X 1741-6604 nnns volume:16 year:2020 number:1 pages:33-60 https://doi.org/10.1177/1741659018820562 Resolving-System lizenzpflichtig Volltext GBV_USEFLAG_U GBV_ILN_2002 ISIL_DE-21-110 SYSFLAG_1 GBV_KXP GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_121 GBV_ILN_138 GBV_ILN_150 GBV_ILN_151 GBV_ILN_152 GBV_ILN_161 GBV_ILN_165 GBV_ILN_171 GBV_ILN_184 GBV_ILN_187 GBV_ILN_206 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_250 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_374 GBV_ILN_602 GBV_ILN_636 GBV_ILN_647 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2018 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2036 GBV_ILN_2037 GBV_ILN_2038 GBV_ILN_2039 GBV_ILN_2043 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2057 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2070 GBV_ILN_2086 GBV_ILN_2093 GBV_ILN_2098 GBV_ILN_2106 GBV_ILN_2107 GBV_ILN_2108 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2116 GBV_ILN_2118 GBV_ILN_2119 GBV_ILN_2122 GBV_ILN_2125 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2144 GBV_ILN_2145 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2158 GBV_ILN_2190 GBV_ILN_2193 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2400 GBV_ILN_2446 GBV_ILN_2470 GBV_ILN_2472 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_2548 GBV_ILN_2705 GBV_ILN_2889 GBV_ILN_2890 GBV_ILN_4012 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4242 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4277 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4328 GBV_ILN_4333 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4346 GBV_ILN_4367 GBV_ILN_4393 GBV_ILN_4700 GBV_ILN_4753 AR 16 2020 1 33-60 2002 01 DE-21-110 4372794096 00 --%%-- --%%-- --%%-- n l01 05-09-23 |
allfieldsGer |
10.1177/1741659018820562 doi (DE-627)1858790123 (DE-599)KXP1858790123 DE-627 ger DE-627 rda eng Harkin, Diarmaid 1986- verfasserin (DE-588)1195236557 (DE-627)1677394919 aut The commodification of mobile phone surveillance: an analysis of the consumer spyware industry Diarmaid Harkin, Adam Molnar, and Erica Vowles 2020 Illustrationen Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Literaturverzeichnis This article examines the attempts of "spyware" developers to commodify and market their products to a general audience. While consumers of "spyware" have often been government and law enforcement (Citizen Lab, 2015), there is an increasing attempt to market, sell, and commodify "spyware" for use by wider audiences. "Spyware" is sold as a security product commonly aimed at businesses, parents, and intimate partners. Pursuant to calls for a "sociology of security consumption" (Goold et al., 2010: 3), this article analyzes how nine prominent spyware vendors attribute meaning to their products. Spyware vendors face particularly fraught marketing challenges as the general deployment of spyware: a) is often utilized in forms of intimate partner abuse; b) is "morally troubling" from the perspective of being corrosive to many forms of social relations (Loader et al., 2014: 469); and c) has limited contexts where it could be deployed without violating surveillance laws. More specifically, this article compares the social meaning that vendors attempt to give to spyware and contrasts this with the powers of surveillance provided by the product, the marketing messages that appear to support non-consensual use, and the lack of guidance for non-consenting spyware targets to have recourse with the vendors. Family violence privacy private security spyware surveillance Molnar, Adam verfasserin (DE-588)1176203843 (DE-627)1047362619 (DE-576)516524038 aut Vowles, Erica verfasserin aut Enthalten in Crime, media, culture Thousand Oaks, Calif. : Sage, 2005 16(2020), 1, Seite 33-60 Online-Ressource (DE-627)48361078X (DE-600)2183400-3 (DE-576)26132540X 1741-6604 nnns volume:16 year:2020 number:1 pages:33-60 https://doi.org/10.1177/1741659018820562 Resolving-System lizenzpflichtig Volltext GBV_USEFLAG_U GBV_ILN_2002 ISIL_DE-21-110 SYSFLAG_1 GBV_KXP GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_121 GBV_ILN_138 GBV_ILN_150 GBV_ILN_151 GBV_ILN_152 GBV_ILN_161 GBV_ILN_165 GBV_ILN_171 GBV_ILN_184 GBV_ILN_187 GBV_ILN_206 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_250 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_374 GBV_ILN_602 GBV_ILN_636 GBV_ILN_647 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2018 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2036 GBV_ILN_2037 GBV_ILN_2038 GBV_ILN_2039 GBV_ILN_2043 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2057 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2070 GBV_ILN_2086 GBV_ILN_2093 GBV_ILN_2098 GBV_ILN_2106 GBV_ILN_2107 GBV_ILN_2108 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2116 GBV_ILN_2118 GBV_ILN_2119 GBV_ILN_2122 GBV_ILN_2125 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2144 GBV_ILN_2145 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2158 GBV_ILN_2190 GBV_ILN_2193 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2400 GBV_ILN_2446 GBV_ILN_2470 GBV_ILN_2472 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_2548 GBV_ILN_2705 GBV_ILN_2889 GBV_ILN_2890 GBV_ILN_4012 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4242 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4277 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4328 GBV_ILN_4333 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4346 GBV_ILN_4367 GBV_ILN_4393 GBV_ILN_4700 GBV_ILN_4753 AR 16 2020 1 33-60 2002 01 DE-21-110 4372794096 00 --%%-- --%%-- --%%-- n l01 05-09-23 |
allfieldsSound |
10.1177/1741659018820562 doi (DE-627)1858790123 (DE-599)KXP1858790123 DE-627 ger DE-627 rda eng Harkin, Diarmaid 1986- verfasserin (DE-588)1195236557 (DE-627)1677394919 aut The commodification of mobile phone surveillance: an analysis of the consumer spyware industry Diarmaid Harkin, Adam Molnar, and Erica Vowles 2020 Illustrationen Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Literaturverzeichnis This article examines the attempts of "spyware" developers to commodify and market their products to a general audience. While consumers of "spyware" have often been government and law enforcement (Citizen Lab, 2015), there is an increasing attempt to market, sell, and commodify "spyware" for use by wider audiences. "Spyware" is sold as a security product commonly aimed at businesses, parents, and intimate partners. Pursuant to calls for a "sociology of security consumption" (Goold et al., 2010: 3), this article analyzes how nine prominent spyware vendors attribute meaning to their products. Spyware vendors face particularly fraught marketing challenges as the general deployment of spyware: a) is often utilized in forms of intimate partner abuse; b) is "morally troubling" from the perspective of being corrosive to many forms of social relations (Loader et al., 2014: 469); and c) has limited contexts where it could be deployed without violating surveillance laws. More specifically, this article compares the social meaning that vendors attempt to give to spyware and contrasts this with the powers of surveillance provided by the product, the marketing messages that appear to support non-consensual use, and the lack of guidance for non-consenting spyware targets to have recourse with the vendors. Family violence privacy private security spyware surveillance Molnar, Adam verfasserin (DE-588)1176203843 (DE-627)1047362619 (DE-576)516524038 aut Vowles, Erica verfasserin aut Enthalten in Crime, media, culture Thousand Oaks, Calif. : Sage, 2005 16(2020), 1, Seite 33-60 Online-Ressource (DE-627)48361078X (DE-600)2183400-3 (DE-576)26132540X 1741-6604 nnns volume:16 year:2020 number:1 pages:33-60 https://doi.org/10.1177/1741659018820562 Resolving-System lizenzpflichtig Volltext GBV_USEFLAG_U GBV_ILN_2002 ISIL_DE-21-110 SYSFLAG_1 GBV_KXP GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_121 GBV_ILN_138 GBV_ILN_150 GBV_ILN_151 GBV_ILN_152 GBV_ILN_161 GBV_ILN_165 GBV_ILN_171 GBV_ILN_184 GBV_ILN_187 GBV_ILN_206 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_250 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_374 GBV_ILN_602 GBV_ILN_636 GBV_ILN_647 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2018 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2036 GBV_ILN_2037 GBV_ILN_2038 GBV_ILN_2039 GBV_ILN_2043 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2057 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2070 GBV_ILN_2086 GBV_ILN_2093 GBV_ILN_2098 GBV_ILN_2106 GBV_ILN_2107 GBV_ILN_2108 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2116 GBV_ILN_2118 GBV_ILN_2119 GBV_ILN_2122 GBV_ILN_2125 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2144 GBV_ILN_2145 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2158 GBV_ILN_2190 GBV_ILN_2193 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2400 GBV_ILN_2446 GBV_ILN_2470 GBV_ILN_2472 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_2548 GBV_ILN_2705 GBV_ILN_2889 GBV_ILN_2890 GBV_ILN_4012 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4242 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4277 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4328 GBV_ILN_4333 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4346 GBV_ILN_4367 GBV_ILN_4393 GBV_ILN_4700 GBV_ILN_4753 AR 16 2020 1 33-60 2002 01 DE-21-110 4372794096 00 --%%-- --%%-- --%%-- n l01 05-09-23 |
language |
English |
source |
Enthalten in Crime, media, culture 16(2020), 1, Seite 33-60 volume:16 year:2020 number:1 pages:33-60 |
sourceStr |
Enthalten in Crime, media, culture 16(2020), 1, Seite 33-60 volume:16 year:2020 number:1 pages:33-60 |
format_phy_str_mv |
Article |
building |
2002:0 |
institution |
findex.gbv.de |
selectbib_iln_str_mv |
2002@01 |
topic_facet |
Family violence privacy private security spyware surveillance |
isfreeaccess_bool |
false |
container_title |
Crime, media, culture |
authorswithroles_txt_mv |
Harkin, Diarmaid @@aut@@ Molnar, Adam @@aut@@ Vowles, Erica @@aut@@ |
publishDateDaySort_date |
2020-01-01T00:00:00Z |
hierarchy_top_id |
48361078X |
id |
1858790123 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000naa a22002652 4500</leader><controlfield tag="001">1858790123</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230905111320.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230905s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1177/1741659018820562</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)1858790123</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KXP1858790123</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Harkin, Diarmaid</subfield><subfield code="d">1986-</subfield><subfield code="e">verfasserin</subfield><subfield code="0">(DE-588)1195236557</subfield><subfield code="0">(DE-627)1677394919</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The commodification of mobile phone surveillance: an analysis of the consumer spyware industry</subfield><subfield code="c">Diarmaid Harkin, Adam Molnar, and Erica Vowles</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturverzeichnis</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This article examines the attempts of "spyware" developers to commodify and market their products to a general audience. While consumers of "spyware" have often been government and law enforcement (Citizen Lab, 2015), there is an increasing attempt to market, sell, and commodify "spyware" for use by wider audiences. "Spyware" is sold as a security product commonly aimed at businesses, parents, and intimate partners. Pursuant to calls for a "sociology of security consumption" (Goold et al., 2010: 3), this article analyzes how nine prominent spyware vendors attribute meaning to their products. Spyware vendors face particularly fraught marketing challenges as the general deployment of spyware: a) is often utilized in forms of intimate partner abuse; b) is "morally troubling" from the perspective of being corrosive to many forms of social relations (Loader et al., 2014: 469); and c) has limited contexts where it could be deployed without violating surveillance laws. More specifically, this article compares the social meaning that vendors attempt to give to spyware and contrasts this with the powers of surveillance provided by the product, the marketing messages that appear to support non-consensual use, and the lack of guidance for non-consenting spyware targets to have recourse with the vendors.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Family violence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">private security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">spyware</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">surveillance</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Molnar, Adam</subfield><subfield code="e">verfasserin</subfield><subfield code="0">(DE-588)1176203843</subfield><subfield code="0">(DE-627)1047362619</subfield><subfield code="0">(DE-576)516524038</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vowles, Erica</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Crime, media, culture</subfield><subfield code="d">Thousand Oaks, Calif. : Sage, 2005</subfield><subfield code="g">16(2020), 1, Seite 33-60</subfield><subfield code="h">Online-Ressource</subfield><subfield code="w">(DE-627)48361078X</subfield><subfield code="w">(DE-600)2183400-3</subfield><subfield code="w">(DE-576)26132540X</subfield><subfield code="x">1741-6604</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:16</subfield><subfield code="g">year:2020</subfield><subfield code="g">number:1</subfield><subfield code="g">pages:33-60</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1177/1741659018820562</subfield><subfield code="x">Resolving-System</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2002</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-21-110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_1</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_KXP</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_32</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_74</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_90</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_100</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_101</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_120</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_121</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_138</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_150</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_152</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_165</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_171</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_184</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_187</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_206</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_224</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_250</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_281</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_374</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_636</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_647</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_702</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2001</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2005</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2006</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2007</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2008</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2009</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2010</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2011</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2018</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2025</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2026</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2027</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2031</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2034</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2036</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2038</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2039</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2043</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2044</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2048</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2049</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2050</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2056</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2057</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2059</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2061</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2064</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2065</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2068</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2070</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2086</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2093</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2098</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2106</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2107</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2108</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2111</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2113</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2116</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2118</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2119</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2122</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2129</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2143</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2144</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2145</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2147</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2148</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2152</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2153</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2158</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2190</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2193</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2232</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2336</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2400</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2446</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2470</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2472</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2507</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2522</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2548</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2705</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2889</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2890</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4035</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4046</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4242</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4246</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4251</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4277</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4328</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4333</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4346</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4393</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4753</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">16</subfield><subfield code="j">2020</subfield><subfield code="e">1</subfield><subfield code="h">33-60</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">2002</subfield><subfield code="1">01</subfield><subfield code="x">DE-21-110</subfield><subfield code="b">4372794096</subfield><subfield code="c">00</subfield><subfield code="f">--%%--</subfield><subfield code="d">--%%--</subfield><subfield code="e">--%%--</subfield><subfield code="j">n</subfield><subfield code="y">l01</subfield><subfield code="z">05-09-23</subfield></datafield></record></collection>
|
standort_str_mv |
--%%-- |
standort_iln_str_mv |
2002:--%%-- DE-21-110:--%%-- |
author |
Harkin, Diarmaid 1986- |
spellingShingle |
Harkin, Diarmaid 1986- misc Family violence misc privacy misc private security misc spyware misc surveillance The commodification of mobile phone surveillance: an analysis of the consumer spyware industry |
authorStr |
Harkin, Diarmaid 1986- |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)48361078X |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut aut |
typewithnormlink_str_mv |
Person@(DE-588)1195236557 DifferentiatedPerson@(DE-588)1195236557 DifferentiatedPerson@(DE-588)1176203843 Person@(DE-588)1176203843 |
collection |
KXP SWB GVK |
remote_str |
true |
last_changed_iln_str_mv |
2002@05-09-23 |
illustrated |
Not Illustrated |
issn |
1741-6604 |
topic_title |
The commodification of mobile phone surveillance: an analysis of the consumer spyware industry Diarmaid Harkin, Adam Molnar, and Erica Vowles Family violence privacy private security spyware surveillance |
topic |
misc Family violence misc privacy misc private security misc spyware misc surveillance |
topic_unstemmed |
misc Family violence misc privacy misc private security misc spyware misc surveillance |
topic_browse |
misc Family violence misc privacy misc private security misc spyware misc surveillance |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
standort_txtP_mv |
--%%-- |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
Crime, media, culture |
normlinkwithtype_str_mv |
(DE-588)1195236557@Person (DE-588)1195236557@DifferentiatedPerson (DE-588)1176203843@DifferentiatedPerson (DE-588)1176203843@Person |
hierarchy_parent_id |
48361078X |
signature |
--%%-- |
signature_str_mv |
--%%-- |
hierarchy_top_title |
Crime, media, culture |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)48361078X (DE-600)2183400-3 (DE-576)26132540X |
normlinkwithrole_str_mv |
(DE-588)1195236557@@aut@@ (DE-588)1176203843@@aut@@ |
title |
The commodification of mobile phone surveillance: an analysis of the consumer spyware industry |
ctrlnum |
(DE-627)1858790123 (DE-599)KXP1858790123 |
title_full |
The commodification of mobile phone surveillance: an analysis of the consumer spyware industry Diarmaid Harkin, Adam Molnar, and Erica Vowles |
author_sort |
Harkin, Diarmaid 1986- |
journal |
Crime, media, culture |
journalStr |
Crime, media, culture |
callnumber-first-code |
- |
lang_code |
eng |
isOA_bool |
false |
recordtype |
marc |
publishDateSort |
2020 |
contenttype_str_mv |
txt |
container_start_page |
33 |
author_browse |
Harkin, Diarmaid Molnar, Adam Vowles, Erica |
selectkey |
2002:l |
container_volume |
16 |
physical |
Illustrationen |
format_se |
Elektronische Aufsätze |
author-letter |
Harkin, Diarmaid |
doi_str_mv |
10.1177/1741659018820562 |
normlink |
1195236557 1677394919 1176203843 1047362619 516524038 |
normlink_prefix_str_mv |
(DE-588)1195236557 (DE-627)1677394919 (DE-588)1176203843 (DE-627)1047362619 (DE-576)516524038 |
author2-role |
verfasserin |
title_sort |
commodification of mobile phone surveillance: an analysis of the consumer spyware industry |
title_auth |
The commodification of mobile phone surveillance: an analysis of the consumer spyware industry |
abstract |
This article examines the attempts of "spyware" developers to commodify and market their products to a general audience. While consumers of "spyware" have often been government and law enforcement (Citizen Lab, 2015), there is an increasing attempt to market, sell, and commodify "spyware" for use by wider audiences. "Spyware" is sold as a security product commonly aimed at businesses, parents, and intimate partners. Pursuant to calls for a "sociology of security consumption" (Goold et al., 2010: 3), this article analyzes how nine prominent spyware vendors attribute meaning to their products. Spyware vendors face particularly fraught marketing challenges as the general deployment of spyware: a) is often utilized in forms of intimate partner abuse; b) is "morally troubling" from the perspective of being corrosive to many forms of social relations (Loader et al., 2014: 469); and c) has limited contexts where it could be deployed without violating surveillance laws. More specifically, this article compares the social meaning that vendors attempt to give to spyware and contrasts this with the powers of surveillance provided by the product, the marketing messages that appear to support non-consensual use, and the lack of guidance for non-consenting spyware targets to have recourse with the vendors. Literaturverzeichnis |
abstractGer |
This article examines the attempts of "spyware" developers to commodify and market their products to a general audience. While consumers of "spyware" have often been government and law enforcement (Citizen Lab, 2015), there is an increasing attempt to market, sell, and commodify "spyware" for use by wider audiences. "Spyware" is sold as a security product commonly aimed at businesses, parents, and intimate partners. Pursuant to calls for a "sociology of security consumption" (Goold et al., 2010: 3), this article analyzes how nine prominent spyware vendors attribute meaning to their products. Spyware vendors face particularly fraught marketing challenges as the general deployment of spyware: a) is often utilized in forms of intimate partner abuse; b) is "morally troubling" from the perspective of being corrosive to many forms of social relations (Loader et al., 2014: 469); and c) has limited contexts where it could be deployed without violating surveillance laws. More specifically, this article compares the social meaning that vendors attempt to give to spyware and contrasts this with the powers of surveillance provided by the product, the marketing messages that appear to support non-consensual use, and the lack of guidance for non-consenting spyware targets to have recourse with the vendors. Literaturverzeichnis |
abstract_unstemmed |
This article examines the attempts of "spyware" developers to commodify and market their products to a general audience. While consumers of "spyware" have often been government and law enforcement (Citizen Lab, 2015), there is an increasing attempt to market, sell, and commodify "spyware" for use by wider audiences. "Spyware" is sold as a security product commonly aimed at businesses, parents, and intimate partners. Pursuant to calls for a "sociology of security consumption" (Goold et al., 2010: 3), this article analyzes how nine prominent spyware vendors attribute meaning to their products. Spyware vendors face particularly fraught marketing challenges as the general deployment of spyware: a) is often utilized in forms of intimate partner abuse; b) is "morally troubling" from the perspective of being corrosive to many forms of social relations (Loader et al., 2014: 469); and c) has limited contexts where it could be deployed without violating surveillance laws. More specifically, this article compares the social meaning that vendors attempt to give to spyware and contrasts this with the powers of surveillance provided by the product, the marketing messages that appear to support non-consensual use, and the lack of guidance for non-consenting spyware targets to have recourse with the vendors. Literaturverzeichnis |
collection_details |
GBV_USEFLAG_U GBV_ILN_2002 ISIL_DE-21-110 SYSFLAG_1 GBV_KXP GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_121 GBV_ILN_138 GBV_ILN_150 GBV_ILN_151 GBV_ILN_152 GBV_ILN_161 GBV_ILN_165 GBV_ILN_171 GBV_ILN_184 GBV_ILN_187 GBV_ILN_206 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_250 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_374 GBV_ILN_602 GBV_ILN_636 GBV_ILN_647 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2018 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2036 GBV_ILN_2037 GBV_ILN_2038 GBV_ILN_2039 GBV_ILN_2043 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2057 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2070 GBV_ILN_2086 GBV_ILN_2093 GBV_ILN_2098 GBV_ILN_2106 GBV_ILN_2107 GBV_ILN_2108 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2116 GBV_ILN_2118 GBV_ILN_2119 GBV_ILN_2122 GBV_ILN_2125 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2144 GBV_ILN_2145 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2158 GBV_ILN_2190 GBV_ILN_2193 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2400 GBV_ILN_2446 GBV_ILN_2470 GBV_ILN_2472 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_2548 GBV_ILN_2705 GBV_ILN_2889 GBV_ILN_2890 GBV_ILN_4012 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4242 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4277 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4328 GBV_ILN_4333 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4346 GBV_ILN_4367 GBV_ILN_4393 GBV_ILN_4700 GBV_ILN_4753 |
container_issue |
1 |
title_short |
The commodification of mobile phone surveillance: an analysis of the consumer spyware industry |
url |
https://doi.org/10.1177/1741659018820562 |
ausleihindikator_str_mv |
2002:- |
rolewithnormlink_str_mv |
@@aut@@(DE-588)1195236557 @@aut@@(DE-588)1176203843 |
remote_bool |
true |
author2 |
Molnar, Adam Vowles, Erica |
author2Str |
Molnar, Adam Vowles, Erica |
ppnlink |
48361078X |
GND_str_mv |
Harkin, Diarmaid M. Harkin, Diarmaid Molnar, Adam |
GND_txt_mv |
Harkin, Diarmaid M. Harkin, Diarmaid Molnar, Adam |
GND_txtF_mv |
Harkin, Diarmaid M. Harkin, Diarmaid Molnar, Adam |
mediatype_str_mv |
c |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1177/1741659018820562 |
callnumber-a |
--%%-- |
up_date |
2024-07-04T12:16:52.488Z |
_version_ |
1803650767248162816 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000naa a22002652 4500</leader><controlfield tag="001">1858790123</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230905111320.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230905s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1177/1741659018820562</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)1858790123</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KXP1858790123</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Harkin, Diarmaid</subfield><subfield code="d">1986-</subfield><subfield code="e">verfasserin</subfield><subfield code="0">(DE-588)1195236557</subfield><subfield code="0">(DE-627)1677394919</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The commodification of mobile phone surveillance: an analysis of the consumer spyware industry</subfield><subfield code="c">Diarmaid Harkin, Adam Molnar, and Erica Vowles</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturverzeichnis</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This article examines the attempts of "spyware" developers to commodify and market their products to a general audience. While consumers of "spyware" have often been government and law enforcement (Citizen Lab, 2015), there is an increasing attempt to market, sell, and commodify "spyware" for use by wider audiences. "Spyware" is sold as a security product commonly aimed at businesses, parents, and intimate partners. Pursuant to calls for a "sociology of security consumption" (Goold et al., 2010: 3), this article analyzes how nine prominent spyware vendors attribute meaning to their products. Spyware vendors face particularly fraught marketing challenges as the general deployment of spyware: a) is often utilized in forms of intimate partner abuse; b) is "morally troubling" from the perspective of being corrosive to many forms of social relations (Loader et al., 2014: 469); and c) has limited contexts where it could be deployed without violating surveillance laws. More specifically, this article compares the social meaning that vendors attempt to give to spyware and contrasts this with the powers of surveillance provided by the product, the marketing messages that appear to support non-consensual use, and the lack of guidance for non-consenting spyware targets to have recourse with the vendors.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Family violence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">private security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">spyware</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">surveillance</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Molnar, Adam</subfield><subfield code="e">verfasserin</subfield><subfield code="0">(DE-588)1176203843</subfield><subfield code="0">(DE-627)1047362619</subfield><subfield code="0">(DE-576)516524038</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vowles, Erica</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Crime, media, culture</subfield><subfield code="d">Thousand Oaks, Calif. : Sage, 2005</subfield><subfield code="g">16(2020), 1, Seite 33-60</subfield><subfield code="h">Online-Ressource</subfield><subfield code="w">(DE-627)48361078X</subfield><subfield code="w">(DE-600)2183400-3</subfield><subfield code="w">(DE-576)26132540X</subfield><subfield code="x">1741-6604</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:16</subfield><subfield code="g">year:2020</subfield><subfield code="g">number:1</subfield><subfield code="g">pages:33-60</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1177/1741659018820562</subfield><subfield code="x">Resolving-System</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2002</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-21-110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_1</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_KXP</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_32</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_74</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_90</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_100</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_101</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_120</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_121</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_138</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_150</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_152</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_165</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_171</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_184</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_187</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_206</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_224</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_250</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_281</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_374</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_636</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_647</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_702</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2001</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2005</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2006</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2007</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2008</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2009</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2010</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2011</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2018</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2025</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2026</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2027</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2031</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2034</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2036</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2038</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2039</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2043</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2044</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2048</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2049</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2050</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2056</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2057</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2059</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2061</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2064</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2065</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2068</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2070</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2086</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2093</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2098</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2106</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2107</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2108</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2111</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2113</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2116</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2118</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2119</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2122</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2129</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2143</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2144</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2145</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2147</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2148</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2152</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2153</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2158</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2190</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2193</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2232</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2336</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2400</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2446</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2470</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2472</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2507</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2522</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2548</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2705</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2889</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2890</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4035</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4046</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4242</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4246</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4251</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4277</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4328</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4333</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4346</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4393</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4753</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">16</subfield><subfield code="j">2020</subfield><subfield code="e">1</subfield><subfield code="h">33-60</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">2002</subfield><subfield code="1">01</subfield><subfield code="x">DE-21-110</subfield><subfield code="b">4372794096</subfield><subfield code="c">00</subfield><subfield code="f">--%%--</subfield><subfield code="d">--%%--</subfield><subfield code="e">--%%--</subfield><subfield code="j">n</subfield><subfield code="y">l01</subfield><subfield code="z">05-09-23</subfield></datafield></record></collection>
|
score |
7.3993254 |