Power and discipline Foucault, M. (1979): “Discipline and Punish”, chap 3, Vintage Books, New York, 195-228 Hannemyr, G. (2000): “Foucault I kyberrommet”,

Slides:



Advertisements
Similar presentations
Media, Communications and the Internet The Regulatory Framework by John Corker.
Advertisements

Freedom of Speech (Part 3)
Governments, States and their relation to media and Media, technology and culture Karlstad University – Spring term 2010 Paola Sartoretto.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
IGE105 – Communication Technology in a Changing World Dr. Ken Cosh Week 10.
Digital Content Solutions Digital content management technology has transformed the way to manage content and knowledge, in this knowledge era. Research.
M. Foucault ‘Discipline and Punish: The Birth of the Prison’ Part 4 - Prison.
CptS 401 Adam Carter. Discuss Paper Question 4 Anonymizer.com provides tools and services to A. obtain a new identity. B. send and surf the web.
Challenges to freedom of expression The right to freedom of expression is a “foundation right” in society. It protects the right to: -Express ourselves.
An Endnote on Regulating Cyberspace: Architecture vs Law Author: Graham Greenleaf. Presented by: Oliver Bannatyne, 28 th May 2002.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Computers and Law - Srishti Mehra – Team 2. What is Computer Law? Cross over of a number of legal areas affecting: Design and use of computers and software.
Law for Business and Personal Use
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Tefko Saracevic, Rutgers University1 Libraries, library services & library public Historical perspective & evolutionary trends.
5.1 © 2006 by Prentice Hall Ethical and Social Issues in the Digital Firm.
Ownership of Computer Software Ethical Questions and Concerns.
Copyright © 2008 Pearson Education Canada Inc.
Arguments Against NN - Political Difficulty of designing effective laws Poor legislation may actually cause more harm than good May interfere with existing.
Social and Economic Impacts of IT Professor Matt Thatcher.
Media, Communications and the Internet The Regulatory Framework by John Corker.
Key Issues in Licensing Software and Associated Intellectual Property: Matching Licensing Models to Business Strategies Steve Mutkoski Regional Director,
Health Systems and the Cycle of Health System Reform
 area of law that deals with protecting the rights of those who create original works  Also called as confidential information.  It is called “intellectual”
. 4.1 Understanding ethical and social issues related to systems. 4.2 Ethics in an information society. 4.3 The moral dimensions of information systems.
How Intellectual Property Laws Are Holding Us Back Samantha Spott CIS
WIPO Copyright Sector 1.  Fundamental or constitutional rights or public interest: freedom of speech, access to information, right for education, enjoyment.
Fundamental Principles of American Democracy
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Reducing Crime in Cyberspace: A Privacy Industry View Stephanie Perrin Adam Shostack Zero-Knowledge Systems, Inc.
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
The leaders personal characteristics Leadership style Situational influence Social interaction – the importance of delegation and communication.
CHAPTER 6 NEW MEDIA – NEW THEORY?. DISCUSSING NEW MEDIA When is new theory needed? Fundamental changes in forms of social organization of the media technlogies.
1 Digital Rights Management Dissenting Argument: Users of Digital Media should obey digital rights management systems to guarantee the integrity and protect.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
The Media Landscape… Not just what we watch, listen, play information society: the exchange of information is the predominant economic activity. Producing,
Introduction to Mass Media HISTORY INDUSTRY CONTROVERSY.
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
Methods of Internet Regulation. Areas of Concern National Security –Bomb-making, drugs, terrorism Protection of Minors –Violence, pornography Protection.
1. ______ ______ is the power of the courts to figure out if a law is constitutional or not. 2. The Constitution has a Preamble and ____ Articles. 3. Popular.
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
S. Hashem - Nov Towards A “Safer” Internet for Our Children Dr. Sherif Hashem Executive Vice President IT Industry Development Agency
Computer Ethics Chapter 14 – Computers: Understanding Technology.
1 THE DESIGN OF INTELLECTUAL MOVEMENTS Stuart Umpleby The George Washington University Washington, DC.
The Electronic Generation1 Children & Electronic Media Negative Relation (mostly defined prev.) –Children’s vulnerability exploited –Individuality undermined.
Introduction to Sociology
General Sociological Terms. NORMS Three essential features of a social norm: 1.A rule governing what a particular behavior should or should not be 2.The.
1 “Media and Sovereignty: The Global Information Revolution and Its Challenge to State Power” Monroe E. Price, Ch. 36, pp (Excerpted from Price,
CHAPTER 6 NEW MEDIA – NEW THEORY?. DISCUSSING NEW MEDIA When is new theory needed? Fundamental changes in forms of social organization of the media technlogies.
Copyright © Allyn and Bacon 2007 Chapter 7 Deviance In Conflict and Order: Understanding Society, 11 th edition This multimedia product and its contents.
Book Review The Future of Ideas: The Fate of the Commons in a Connected World By Lawrence Lessig Heather Nodler INF 385Q - KM Systems Dr. Don Turnbull.
The Digital Battery From: Budd, T.A. "Protecting and Managing Electronic Content with a Digital Battery". IEEE Computer (2001) 2-8. Steve Lord.
 Legal Issues-copyright and fair use, privacy, software piracy, acceptable use  Social Issues- digital divide, cyber bullying, online interaction 
Identifiers for a Digital World June 29, 2010 Patricia Payton Senior Director of Publisher Relations & Content Development
Revision Session 6 The Media. So what is the media?
Review to Date… November 8, What is literacy? We defined literacy and different types of literacy on the web. We also defined this in class We did.
Mass communication. process is the process whereby media organizations produce and transmit messages to large publics and, the process by which those.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
Privacy. Some Web Science Issues Kieron O’Hara 29 November 2011.
1 Technologies of Communication Understanding Communication Technologies  Well established systems: From individual to converging technologies Challenges.
Ethical, Social, and Political Issues in E-commerce
A Gift of Fire Third edition Sara Baase
Unit 1 – Crime and Punishment
The Internet and Democracy
– Communication Technology in a Changing World
The Issues with Technology in education
Computer 101 Extra Credit By: Marjorie Jackson.
Presentation transcript:

Power and discipline Foucault, M. (1979): “Discipline and Punish”, chap 3, Vintage Books, New York, Hannemyr, G. (2000): “Foucault I kyberrommet”, in Digital Makt, ed T. Slaata, Gyldendal Akademisk, Oslo, pp 41-63

Foucault on power and discipline Power is usually seen as institutionalized and asymmetric, as some posses powers, others do not Focus on disciplining power: Through political technologies throughout the society –It is exercised, rather than possessed –It is implicit, rather than explicit –It is changing, rather than static –It is distributed, rather than in one particular relation –No great battles fought for the history books – micro-power The pedagogical function of surveillance: From primitive physical power exercises, to sophisticated learning environments – Panopticon

Key arguments of Hannemyr Current changes in the power relations between consumers, industry and authorities –New technologies for reproduction, distribution and transactions through converging medias –The importance and the effects is amplified as our lives gets more and more connected with in the world of digital technologies Conflict between “hackers”, and the industry allied with the authorities

Conflict eruptions DVD-John –2000: 16 years old computer-enthusiast charged for violating the Norwegian laws of data crime –Charged by multiple US and Japanese movie distributors, for the development and spread of a program that grants access to data from DVD movies with other equipment than certified by DVD- CCA (Content Control Association) Eddy Jansson and Mattew Skala –Cracks the codes for the filters being the basis of CyberPatrol – a tool for avoiding children surfing on the net to get in touch with pornography –The lists shows more than filters for pornography: Unions, left wing political activities as well as critiques of filters as CyberPatrol –Threatened by Mattel with a claim of compensation, but accepts a settlement: The right of the program cracking the codes

Hackers Early ideas about the concept of open and available information for everyone – in one big network Open-source –Free of charge –Open: No secret and proprietary formats –Ex: Linux Hackers are trying to destroy certain use of technology moving the centre of power to the unacceptable and unsocial Why is it so that breaking the hindrance in e.g. DVD is a crime, and making the hindrance is not?

Industry The challenge for the industry: Digital content is easy to copy and distribute –Regulating access to objects with technology –Norms have to be established, disciplining technology must be developed, and the legal systems aligned Governments have taken the side of the industry –US: The Digital Millennium Copyright Act –Norway: In strategy for preventing of ICT-crime, it is noted as the use of Linux among youth should be a source of concern

Panopticon in the cyberspace A general increased attention on tracking communication: –Registering our identity, our accessed URL’s, denying the possibility of using cryptography Ease police work in criminal cases,– but also panoptically discipline us by observation, information collection and teaching –People will not access legal pornographic material, or other non-acceptable information –You never know how the information will be used

Implications Increased possibilities to exercise micro- power micro technology The industry have been better at mobilizing support in media and from governments The resistance have been minimal to serve: consumer rights, freedom of speech and privacy The only resistance is by the hackers

Questions for reflection Is this just paranoia and theories of conspiracy: Microsoft VS Hackers? Can and should we as researchers relate these issues to the Scandinavian approach with a focus on democracy? Implication for design and use of information systems?