The Cookies’ Quest: Towards Digital Totalitarian Landscape

Authors

Keywords:

Digital Totalitarianism, Surveillance, Capitalism, Commodification, Social Media

Abstract

This study examines the concept of Digital Totalitarianism and Consumerism within the framework of contemporary digital platforms, exploring the role of pleasure in human interactions. The analysis aims to uncover how social media and online markets platforms leverage pleasure and surveillance to reinforce social control via consumption. The primary objective of this research is to investigate the wider societal and individual implications of digital totalitarianism, as well as how these platforms capitalize on user data and behavior control mechanisms. The research highlights significant ethical concerns surrounding digital surveillance, privacy infringement, and the commodification of human experiences. The findings underscore the risks associated with compromising personal freedoms and reducing human experiences to mere commercial transactions.

References

American Library Association (17 January 2006). https://www.ala.org

American Library Association (19 August 2021). https://www.ala.org

Arendt, H. (1951). The origins of totalitarianism. Harcourt Brace & Company.

Barkun, M. (Ed.). (2013). A culture of conspiracy. University of California Press.

Barnes, J. (1994). A pack of lies: Towards a sociology of lying. Cambridge University Press.

Bartlett, J. (2018). The people vs tech: How the internet is killing democracy (and how we save it). Penguin Random House UK.

Baudrillard, J. (1994). Simulacra and simulation. University of Michigan Press.

Baum, S. D., & Tonn, B. E. (2015). Confronting future catastrophic threats to humanity. Futures, 72, 1–3.

Berger, J., & Milkman, K. L. (2012). What makes online content go viral? Journal of

Marketing Research, 49(2), 192–205.

Berridge, K. C., & Kringelbach, M. L. (2015). Pleasure systems in the brain. Neuron, 86(3), 646–664. Boyd, D., & Crawford, K. (2012). Critical questions for Big Data. Information, Communication & Society, 15(5), 662–679.

Boyd, R. (2015, June 11). Man vs. machine: How humans are driving the next age of machinelearning. CRUNCH Network. http://techcrunch.com/2015/06/11/man-vs-machine-how-humans-are-driving-the-next-age-of-machine-learning/#.frrlobk:gSSP

Buolamwini, J., & Gebru, T. (2018). Gender shades: Intersectional accuracy disparities incommercial gender classification. Proceedings of Machine Learning Research, 81, 1–15.

Duggan, M., & Smith, A. (2016, October 25). The political environment on social media. PEW Research Center. https://assets.pewresearch.org/wp-content/uploads/sites/14/2016/10/24160747/PI_2016.10.25_Politics-and-Social- Media_FINAL.pdf

Etzioni, A. (1993). The spirit of community: Rights, responsibilities, and the communitarian agenda. Crown Publishers.

Flint, T., & Turner, P. (2016). Enactive appropriation. AI & Society, 31(1), 41–49.

Gellman, R., & Dixman, P. (2011). Online privacy: A reference handbook. ABC-CLIO.

Geist, E. (2015, March 3). Is artificial intelligence really an existential threat to humanity? The Bulletin of the Atomic Scientists. http://thebulletin.org/artificial-intelligence-really-existential-threat-humanity8577

Gerlitz, C. (2016). Interface methods: Renegotiating relations between digital social research, STS and sociology. The Sociological Review, 64(1), 21–46.

Hayles, K. N. (2017). Unthought: The power of the cognitive non conscious. University of Chicago Press.

Hendricks, V. F., & Hansen, P. G. (2014/2016). Infostorms: Why do we “like”? Explaining individual behavior on the social net (2nd Rev. and expanded ed.). Copernicus Books/Springer Nature.

Hendricks, V. F., & Vestergaard, M. (2019). Reality lost: Markets of attention, misinformation, and manipulation. Springer Nature.

Kahneman, D. (1999). Objective happiness. In D. Kahneman, E. Diener, &N. Schwartz(Eds.), Well-being: The foundation of hedonic psychology (pp. 3–25). Russell Sage Foundation.

Kane, R. (Ed.). (2002). The Oxford handbook of free will. Oxford University Press.

Knight, W. (2015, December 29). What robots and AI learned in 2015. MIT Technology Review. http://www.technologyreview.com/news/544901/what-robots-and-ai-learnedin-2015/

Kringelbach, M. L., Stein, A., & van Hartevelt, T. J. (2012). The functional human neuroanatomy of food pleasure cycles. Physiology & Behavior, 106(3), 307–316.

Kringelbach, M. L., & Berridge, K. C. (2010). The neuroscience of happiness and pleasure. Social Research, 77(2), 659–678.

Lambert, A. D., Parker, M., & Bashir, M. (2015). Library patron privacy in jeopardy: Ananalysis of the privacy policies of digital content vendors. Proceedings of the Association for Information Science and Technology, 52(1), 1–9.

Looney, S., Conway, M., & Watkin, A. L. (2022). Violent extremism and terrorism on linein2021: The year in review. Plymouth Research Commons. https://plymouth.researchcommons.org/cgi/viewcontent.cgi?article=1235&context=scresearch

Lugya, F. K. (2014). What counts as a science and discipline in library and in formation science? Library Review, 63, 138–155.

Marr, B. (2015, December 17). Barbie wants to chat with your child – but is Big Data listening in? Forbes. https://www.forbes.com/sites/bernardmarr/2015/12/17/barbie-wants-to-chat-with-your-child-but-is-big-data-listeningin/#:~:text=Hello%20Barbie%20has%20a%20microphone,all%20in%20under%20a%20second.

Mosher, S. (2019). China’s new ‘social credit system’ is a dystopian nightmare. NewYorkPost. https://nypost.com/2019/05/18/chinas-new-social-credit-system-turns-orwells-1984-into-reality/

Mill, J. S. (1859). On liberty. J.W. Parker and Son.

Naughton, J. (2015, December 6). Should we be worried if our homes are soon smarter thanwe are? The Guardian. http://www.theguardian.com/commentisfree/2015/dec/06/smart-homes-security-risk-internet-of-things

Nicas, J., & Rosenberg, M. (2018, November 15). A look inside the tactics of Definers, Facebook’s attack dog. The New York Times. https://www.nytimes.com/2018/11/15/technology/facebook-definers-oppositionresearch.html

Nisbet, M. (2012, April 30). Obama 2012: The most micro-targeted campaign in history?BigThink. http://bigthink.com/age-of-engagement/obama-2012-the-most-micro-targeted-campaign-in-history

O’Neil, C. (2016). Weapons of math destruction: How big data increases inequalityandthreatens democracy. Crown.

Palmas, K. (2011). Predicting what you’ll do tomorrow: Panspectric surveillance and the contemporary corporation. Surveillance & Society, 8(3), 338–354. Parida, S. K. (2021). Telegram revolution: An analysis of political instability of Belarusin2020. Vital Library. https://vital.lib.tsu.ru/vital/access/services/Download/koha:000723248/SOURCE1

Shera, J. H. (1973). For whom do we conserve, or what can you do with a Gutenberg Bible. In J. H. Shera (Ed.), Knowing books and men: Knowing computers, too (pp. 79–92). Libraries Unlimited.

Simon, H. A. (1971). Designing organizations for an information-rich world. In M. Greenberger (Ed.), Computers, communications, and the public interest (pp. 38–52). John Hopkins Press.

The Responsible Data Forum. (2015, April 10). Ways to practice responsible development data. https://responsibledata.io/ways-to-practice-responsible-development-data/

Zuboff, S. (2016, March 5). The secrets of surveillance capitalism. Frankfurter Allgemeine Zeitung. http://www.faz.net/aktuell/feuilleton/debatten/the-digital-debate/shoshana-zuboff-secrets-of-surveillance-capitalism-14103616.html?printPagedArticle=true

Zuboff, S. (2019). The age of surveillance capitalism: The fight for a human future at the new frontier of power. Public Affairs.

Weltevrede, E., Helmond, A., & Gerlitz, C. (2014). Search engines: The politics of real-time: A device perspective on social media platforms. Theory, Culture &Society, 31(6), 125–150.

Whitehead, J. W., et al. (2002). Forfeiting ‘enduring freedom’ for ‘homeland security:’ A constitutional analysis of the USA Patriot Act and the justice department’s antiterrorism initiatives. American University Law Review, 51(6), 1081–1133.

Wijermars, M., & Lokot, T. (2022). Is Telegram a “harbinger of freedom”? The performance, practices, and perception of platforms as political actors in authoritarian states. Post-Soviet Af airs, 38(4), pp. 267-287. Wolfson, H [chair]. (2016, 19-21st Feb). Technological Displacement of White-collar Employment: Political and Social Implications. [Symposium]. Churchill College, Cambridge.

Downloads

Published

2025-01-11

How to Cite

Sedrat, Y. ., & Sidi Athmane, M. W. (2025). The Cookies’ Quest: Towards Digital Totalitarian Landscape. Journal of Studies in Language, Culture, and Society, 7(2), 182–199. Retrieved from https://univ-bejaia.dz/revue/jslcs/article/view/482