1 / 18

UFCE95-20-3: Information Systems in Society

UFCE95-20-3: Information Systems in Society. Lecture 8: Theorizing surveillance Reading: Lyon, 2002, Everyday Surveillance: Personal data and social classifications. Surveillance theory. Totalitarianism 1984, Brave New World 20th century fascist and communist states Panopticism

milla
Download Presentation

UFCE95-20-3: Information Systems in Society

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. UFCE95-20-3: Information Systems in Society • Lecture 8: Theorizing surveillance • Reading: • Lyon, 2002, Everyday Surveillance: Personal data and social classifications

  2. Surveillance theory • Totalitarianism • 1984, Brave New World • 20th century fascist and communist states • Panopticism • “all-seeing place” • Social discipline through utilitarian social contract • Evidence in growth of workplace and data surveillance • The Surveillant Assemblage • Realized as inevitable by-product of ICT diffusion • “Rhizomic surveillance” - information trails and traces • Non-heirarchical and problematic for rulers and ruled • Evidence in ‘disappearing body’, growth of computer use and ‘function creep’.

  3. Panopticon • allows seeing without being seen. • asymmetry of seeing-without-being-seen is the very essence of power because the power to dominate in the modern world rests on the differential possession of knowledge.

  4. The modern panopticon: Shenzhen city Purpose built for the 2008 Olympics 12.4 million people 2 million CCTVs movements are tracked through national ID cards with scannable computer chips and photos that are instantly uploaded to police databases and linked to their holder's personal data of names, photos, residency information, work history and biometric data.

  5. Panopticon in popular culture Big Brother Truman show The Sims Second Life

  6. The 21st century panopticon • What you’ve done • Archived data • What you’re doing • Real-time data and media • What you’ll do • Profiling

  7. Surveillant Assemblage convergence and integration

  8. Surveillant Assemblage • Evidence for anything can be found in the networks • Example: From: Jo Moore To: Alun Evans; Mortimer, Robin Date: 11/09/01 14:55:12 Subject: Media Handling Alun It’s now a very good day to get out anything we want to bury. Councillors expenses? Jo CC: Corry, Dan

  9. Positive effects: improved efficiency and effectiveness increased insight and overview over organisational processes (e.g. Work-flow systems) Surveillance and Control Information systems make activities, events and objects, and - people- more visible • Negative effects: • “information panopticon” • Surveillance of human behaviour • resistance • Limits of freedom and autonomy • influence on the appropriation of IT • Unpredictable patterns of use can emerge

  10. Data Surveillance • the systematic use of personal data systems in the investigation or monitoring of the actions or communications of one or more persons. • significantly less expensive than physical and electronic surveillance, because it can be automated. • the economic constraints on surveillance are diminished, and more individuals, and larger populations, are therefore monitored. • possibilities enhanced by digital convergence and integration

  11. Data Surveillance • Personal data surveillance • Mass data surveillance • both may be used for its deterrent effects. • comprises a wide range of techniques: • Front-End Verification. • Computer Matching. • Profiling

  12. Profiling • Template created for a particular class of person from past experience • Data-holdings are then searched for digital personae with a close fit to that set of characteristics • used by government agencies to construct models of classes of person, eg., deviant or vunerable. • used by corporations to identify markets and consumers, but also staff-members and job-applicants relevant to vacant positions.

  13. Function Creep • Definition: • Function Creep occurs when a technology, a system, or personal data is lawfully and systematically expanded for unintended or unforeseen purposes. • Often demonstrates Surveillant Assemblage

  14. Function creep example: The UK national DNA Database • Originally focused on convictions for murder, burglary, sexual assault and GBH • All individuals charged, reported, cautioned or convicted of any recordable offence • DNA data to be stored indefinitely, regardless of acquittal or innocence • Short - medium term political goal of identifying all individual’s characteristics from DNA

More Related