Dr. Manuel Vallée University of Auckland Semester

Slides:



Advertisements
Similar presentations
Crime Control or Crime Culture? Closed Circuit Televisions (CCTV)
Advertisements

Development of a Surveillance Society By: Tyler Madden (Comp 1631, Winter 2011)
Power & Discipline in the Postmodern World By Katie Greenberg.
Digital Footprints Where have you been? Where are you going?
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Police 3.6 Politics and Government. DNA Data Collection.
Face Recognition and implications on society By Zubin Singh ICS 131.
Working group discussion 1 Cyber Risk Security, Privacy ?
Section 29.1 Marketing Research
Big Brother is watching.  1. Would you ever consider letting a TV crew come into your life to document everything? Why or why not?  Big Brother, Kardashians,
Identity, privacy and technology: DNA fingerprints, identity cards, and CCTV HI 269 Week 5.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
Z514: Social Aspects of IT Week 13.
No yes Citizenship exam authoritarian extremist.
Similarities of surveillance tactics in 1984 compared to the 21 st century. By: Insia Raza ENG 4UI Mrs.Galasso.
The Surveillance Society and the Digital World. Why Surveillance Society? We are being watched like never before. Techniques include CCTV, monitoring,
BIG BROTHER Is Watching You
Critical Social Policy Governmentality versus choice in contemporary special education By Dr. Angela Morgan Cynthia J. Spence “Going in Circles” California.
Hardware & Software Developments Freedom of Speech & Movement.
 Create a chart of three columns  In column one, list the freedoms you enjoy both at home and in the community.  In column two, list the freedoms you.
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
ISEM 301 Information and Society1 Mike Anderson Mechanical Engineering
Foucault: Discipline & Punish *Remember: Foucault is critiquing philosopies that emerged during the industrial revolution & enlightenment periods about.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
1 Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003 PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING CD5590.
Materials   Pen/pencil   Composition Book Panopticon.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
1 VIDEO SURVEILLANCE (public/private areas) TOMÁŠ MIČO The Office for Personal Data Protection of the Slovak Republic.
Cyber Safety and Digital Citizenship Keeping kids safe from harm.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Presented by Beang Tong ENGL393, Spring’03
CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.
AS/A Level ICT Rising year 12 lesson July ICT is a dynamic subject ICT is always evolving. As technology develops, there are new possibilities for.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
TECHNOLOGY Chapter 11; THE LAST CHAPTER!!!!!!!. Catfish Recap of Chapter 10 Examples of small talk? Nev and Abby Role relationship or close relationship?
Dr Maurice Mullard.  Provide context for greater surveillance of society  Was this about the State of the safeguarding of lives  Reporting and the.
Surveillance Jeff Saunders Dr. Garrison CSCI 101 Thurs. 12:30.
Digital Literacy Presented by: Naomi Baker, Peace Ohide and Zafana Haq.
Totalitarianism. A Government of Total Control Total, Centralized State Control Totalitarianism—government that dominates every aspect of life Totalitarian.
Revision & House Keeping. Instructions NOTE:  Attempt all questions  Marks total 100  Write your answers in the spaces provided  Write as clearly.
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
THE MARKETING RESEARCH PROCESS CHAPTER 29 Mrs. Simone Seaton Marketing Management.
Power & Freedom Michel Foucault The Body of the Condemned (Political Science 506)
Michel Foucault.
Power & Freedom Michel Foucault
SCHOOL MANAGEMENT AND LEARNING SYSTEM. SMLS is designed to comprehensive schools Educational institution of any country can join to SMLS via the Internet.
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
The code to freedom? Techniques & technologies of countersurveillance in cyberspace Kate Milberry, PhD University of Toronto
Judicial Training on Data Protection and Privacy Rights
SOC 102 – BECOMING MODERN: The Social Origins of Modernity
Dr. Manuel Vallée University of Auckland Semester
Critical Organizational Theory
Dr. Manuel Vallée University of Auckland Semester
SOC 102 – BECOMING MODERN: Lecture 12 – The Surveillance Society
Lecture III Surveillance Society Powerpoint by Miyase Christensen
Digital Citizenship Parent Workshop Digital Footprints
Do Now: Complete the War, Civil Liberties, and Security Opinion Poll.
The Panopticon and The Hunger Games
Spy game Imagine you’re a spy and you want to track someone. You have smart computer hackers helping you. What would you tell them to do if you really.
Section 29.1 Marketing Research
April 7, 1999 Privacy in Transition -- and What’s Next? Alan F. Westin Professor of Public Law & Government Emeritus,
Holding surveillant power to account: Democratic problems & solutions
A Gift of Fire Third edition Sara Baase
Surveillance Learning Objective:
Student User Agreement and Policy 2022
IT and Society Week 2: Privacy.
Presentation transcript:

Dr. Manuel Vallée University of Auckland Semester 2 - 2016 SOC 102 – BECOMING MODERN: Controlling the Dangerous Crowds in Modern Democracies Dr. Manuel Vallée University of Auckland Semester 2 - 2016

OUTLINE Announcements - Evals - Final Exam information will be sent next week Recap: Democracy Democracy as a mechanism of control Disciplinary Power

The Dark Side of Democracy

The Dark Side of Democracy 1) Mob rule 2) Equating uninformed opinion with educated ones 3) A lack of participation 4) A vulnerability to demagoguery 5) Democracy and Nationalism = Discrimination & Ethnic Cleansing

Homer Simpson

THE FRENCH REVOLUTION: Liberté, Egalité, et Fraternité

The Reign of Terror

Demagogues: Hitler

Demagogues: Mussolini

Demagogues: Trump

Demagogues

How to control the dangerous crowds in modern democracies?

How to control the dangerous crowds in modern democracies? 1) Creating docile citizens through consumerism

How to control the dangerous crowds in modern democracies? 1) Creating docile citizens through consumerism 2) Disciplinary power…

How to control the dangerous crowds in modern democracies? 1) Creating docile citizens through consumerism 2) Disciplinary power… 3) Techniques of disciplinary power - normalizing judgment… - corrective punishment… such as exercise - gratification-punishment… the carrot/stick method - ranking, which can serve as a reward or a punishment. - the examination… military examination… - constant surveillance - the Panopticon

Foucault: The Panopticon

The Panopticon = Self-Policing

CCTV Camera = Self-Policing

The Surveillance Society?

What is the Surveillance Society? Governments - tracking demographic data - conducting video surveillance of roads - conducting video surveillance of public spaces - tracking individual movements - building personal profiles (screening phone, e-mail, internet, other)

What is the Surveillance Society? Governments - tracking demographic data - conducting video surveillance of roads - conducting video surveillance of public spaces - tracking individual movements - building personal profiles (screening phone, e-mail, internet, other) Corporations - tracking consumer behavior (frequent user cards, internet activity) - monitoring private property - monitoring employees (cameras, internet activity, other)

What is the Surveillance Society? Governments - tracking demographic data - conducting video surveillance of roads - conducting video surveillance of public spaces - tracking individual movements - building personal profiles (screening phone, e-mail, internet, other) Corporations - tracking consumer behavior (frequent user cards, internet activity) - monitoring private property - monitoring employees (cameras, internet activity, other) Parents - tracking their childrens’ activities

RECOMMENDED MATERIALS Kiwis Warned of Online Privacy Issues http://www.nzherald.co.nz/technology/news/article.cfm?c_id=5&objectid=10803015 US spy technology 'tested on NZ public’ http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=10886031 NZ spies sift through digital footprints http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=10886032 Are all our phone calls being recorded by the government? (2 minutes)http://www.guardian.co.uk/commentisfree/2013/may/04/telephone-calls-recorded-fbi-boston Is the Surveillance State Infringing up on Civil Liberties? (Glen Greenwald interview, 11 minutes) http://www.youtube.com/watch?v=nD1oWvfRcAU Clip regarding Boston Bomber Surveillance (2 minutes) http://www.guardian.co.uk/commentisfree/2013/may/04/telephone-calls-recorded-fbi-boston BBC Documentary on the surveillance state (not particularly critical) http://www.youtube.com/watch?v=QXphmb3SwTg British police state (very critical) http://www.youtube.com/watch?v=QNPg0uC54J4&feature=related