UFCE95-20-3: Information Systems in Society Lecture 8: Theorizing surveillance Reading: –Lyon, 2002, Everyday Surveillance: Personal data and social classifications.

Slides:



Advertisements
Similar presentations
Call Centre Work -Topics 1. Relevance of Labour Process Theory (Braverman) and the McDonaldization thesis (Ritzer) 2. Significance of call centre work.
Advertisements

An ePortfolio System for Life Shane Sutherland ePortfolio Project Director University of Wolverhampton.
Media Sociology S01103 Lecture 5 - Moral Panics. Reading Media Texts workshop after the lecture this week Class Essay workshop after the lecture next.
Organisational diagnosis tools and technique
Governments, States and their relation to media and Media, technology and culture Karlstad University – Spring term 2010 Paola Sartoretto.
Business Power (Chapter 3) Professor Charles H. Smith Summer 2011.
Professor Stanley Marshall Makuza Dean, School of Agricultural Sciences and Technology, Chinhoyi University of Technology.
Police officers’ acceptance of stereotypes about rape and rape victims: A comparison study Dr. Emma Sleath and Professor Ray Bull.
22/10/07Richard Salmon 10 minute micro-teach “An introduction to the key social and cultural issues which have impacted upon the media industries and media.
Ethics What is it, why is it relevant to HCI, why is it important?
Introduction to Sociology of Marketing Communication Zdenek Sloboda SMC_SS-2014
B121 Chapter 7 Investigative Methods. Quantitative data & Qualitative data Quantitative data It describes measurable or countable features of whatever.
MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Definitions  eBusiness The use of computer based information systems for the management and coordination.
Lecture 13 Revision IMS Systems Analysis and Design.
F29IF2 : Databases & Information Systems Lachlan M. MacKinnon The Domain of Information Systems Databases & Information Systems Lachlan M. MacKinnon.
IMS1805 Systems Analysis Topic 1(c): Analysis and Information Systems.
Copyright 2004 Monash University IMS1805 Systems Analysis Week 2(b): Analysis for Information Systems.
© 2005 Pearson Education Canada Inc.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Introduction to Sociology of Marketing Communication Zdenek Sloboda SMC_SS-2012
Chapter 2 Theoretical Perspectives and Methods of Social Research Key Terms.
Design research base in Scotland value circa: £30,000,000 in externally funded research
Identity, privacy and technology: DNA fingerprints, identity cards, and CCTV HI 269 Week 5.
Examining the Partnership for the 21 st Century with a Spotlight on Technology and Humor Copyright [Peter M. Jonas] [2008]. This work is the intellectual.
supported by a local government initiative sharing nationally to improve services locally A-Z & Knowledge Base Project Sheila Apicella.
Felicity Gerry QC USING TECHNOLOGY AND LAW TO COMBAT HUMAN TRAFFICKING.
A Skills and Learning Observatory for Wales Building on best practice A review of Observatory development in the UK and beyond.
D2.TTO.CL4.12 Slide 1. Subject Elements This unit comprises five Elements: 1.Describe the social and cultural impacts of tourism operations 2.Describe.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
The Internet and New Technologies Chapter 2. “We had a choice to enter the country and follow the law. Or we had a choice to not enter the country.” —Eric.
Surveillance After September 11, 2001 David Lyon Lee Jungrye English Language and Literature
Money, Sex and Power Week 12
Pluralism. Growing awareness of the complexity of organization Refinement of interests and preoccupations of organization theorists.
Knowledge Management in a fast changing world Kate Elphick
A good place to start !. Our aim is to develop in students ; Interest in & enjoyment of historical study; Skills for life long learning; The capacity.
B CRIMINAL LAW (FORENSIC PROCEDURES) AMENDMENT BILL WHY WE NEED THIS CRUCIAL LEGISLATION IN SA.
The role of Parthenos for CLARIN ERIC Steven Krauwer CLARIN ERIC Executive Director 1.
Culture and Mass Media Economy1 Media Economics 3. lecture Simona Škarabelová.
Information System Development Courses Figure: ISD Course Structure.
Sociology: a Social Science Outcomes: 1.1 describe the discipline of sociology as a social science through the examination of selected social Issues.
Areas of Study in Sociology. Family Primary function is to reproduce society, either biologically, socially, or both. Primary function is to reproduce.
DATABASES Southern Region CEO Wednesday 13 th October 2010.
Science Teaching & Instructional Technology By: Asma, Melissa & Susan.
Conversation Analysis Introduction to Conversation Analysis 2e Anthony J. Liddicoat, March 2011.
Clash of cultures? Comparative Sociology Week 17.
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
CSE 102 Introduction to Computer Engineering What is Computer Engineering?
Culture and Mass Media Economy1 Media Economics 3. lecture Simona Škarabelová.
Week 2 The lecture for this week is designed to provide students with a general overview of 1) quantitative/qualitative research strategies and 2) 21st.
Chapter 6 Deviance and Criminal Justice Defining Deviance Sociological Theories of Deviance Forms of Deviance Crime and Criminal Justice Deviance and Crime.
A Level ICT has been developed for students who wish to progress to higher education or to the world of work, where understanding how ICT can be used.
Wide Dispersion of Popular Culture Diffusion of popular housing, clothing, and food –Popular housing styles –Rapid diffusion of clothing styles –Popular.
ORGANISATIONAL BEHAVIOUR BACHELOR OF MANAGEMENT STUDIES [LEVEL 200] INTRODUCTION TO ORGANISATIONAL BEHAVIOUR Dr. N. Yaw Oppong School of Business University.
Copyright  2007 McGraw-Hill Pty Ltd PPTs t/a Marketing Research 2e by Lukas, Hair, Bush and Ortinau Slides prepared by Judy Rex 19-1 Chapter Nineteen.
INTRODUCTION TO SOCIOLOGY/ SOCIETY & CULTURE. What is Sociology? Sociology refers to the study of society, focusing on the organisation of social life.
A Theory of Industrial Development Rostow’s Model of Development.
Introduction to Sociology
Journal papers reading
MIGRATING TO NEW TECHNOLOGY
Lecture III Surveillance Society Powerpoint by Miyase Christensen
Computers and Data Collection
What is Administrative Data?
Towards Excellence in Research: Achievements and Visions of
Making a Match.
The Special Characteristics of Travel and Tourism Marketing
Automating Profitable Growth™
What’s in a Place? - Place Profiles Places are defined by a combination of characteristics which change over time. All places possess a number of.
How do we decide what is important to learn about the past?
15-5 Automated Fingerprint Identification System
IT and Society Week 2: Privacy.
Presentation transcript:

UFCE : Information Systems in Society Lecture 8: Theorizing surveillance Reading: –Lyon, 2002, Everyday Surveillance: Personal data and social classifications

Surveillance theory Totalitarianism –1984, Brave New World –20th century fascist and communist states Panopticism –“all-seeing place” –Social discipline through utilitarian social contract –Evidence in growth of workplace and data surveillance The Surveillant Assemblage –Realized as inevitable by-product of ICT diffusion –“Rhizomic surveillance” - information trails and traces –Non-heirarchical and problematic for rulers and ruled –Evidence in ‘disappearing body’, growth of computer use and ‘function creep’.

Panopticon allows seeing without being seen. asymmetry of seeing-without- being-seen is the very essence of power because the power to dominate in the modern world rests on the differential possession of knowledge.

The modern panopticon: Shenzhen city Purpose built for the 2008 Olympics 12.4 million people 2 million CCTVs movements are tracked through national ID cards with scannable computer chips and photos that are instantly uploaded to police databases and linked to their holder's personal data of names, photos, residency information, work history and biometric data.

Panopticon in popular culture Big Brother Truman show The Sims Second Life

The 21st century panopticon What you’ve done –Archived data What you’re doing –Real-time data and media What you’ll do –Profiling

Surveillant Assemblage convergence and integration

Surveillant Assemblage Evidence for anything can be found in the networks Example: From: Jo Moore To: Alun Evans; Mortimer, Robin Date: 11/09/01 14:55:12 Subject: Media Handling Alun It’s now a very good day to get out anything we want to bury. Councillors expenses? Jo CC: Corry, Dan

Surveillance and Control Positive effects: –improved efficiency and effectiveness –increased insight and overview over organisational processes (e.g. Work-flow systems) Negative effects: –“information panopticon” –Surveillance of human behaviour –resistance –Limits of freedom and autonomy –influence on the appropriation of IT –Unpredictable patterns of use can emerge Information systems make activities, events and objects, and - people- more visible

Data Surveillance the systematic use of personal data systems in the investigation or monitoring of the actions or communications of one or more persons. significantly less expensive than physical and electronic surveillance, because it can be automated. the economic constraints on surveillance are diminished, and more individuals, and larger populations, are therefore monitored. possibilities enhanced by digital convergence and integration

Data Surveillance Personal data surveillance Mass data surveillance –both may be used for its deterrent effects. –comprises a wide range of techniques: Front-End Verification. Computer Matching. Profiling

Template created for a particular class of person from past experience Data-holdings are then searched for digital personae with a close fit to that set of characteristics –used by government agencies to construct models of classes of person, eg., deviant or vunerable. –used by corporations to identify markets and consumers, but also staff-members and job-applicants relevant to vacant positions.

Function Creep Definition: –Function Creep occurs when a technology, a system, or personal data is lawfully and systematically expanded for unintended or unforeseen purposes. Often demonstrates Surveillant Assemblage

Function creep example: The UK national DNA Database 1.Originally focused on convictions for murder, burglary, sexual assault and GBH 2.All individuals charged, reported, cautioned or convicted of any recordable offence 3.DNA data to be stored indefinitely, regardless of acquittal or innocence 4.Short - medium term political goal of identifying all individual’s characteristics from DNA