Skip to main content
United States
Jump To
Support
Register or Log In
Support
Register or Log In
Instructors
Browse Products
Getting Started
Students
Browse Products
Getting Started
Return to Technology & Society: Social Networks, Power, and Inequality 3e Student Resources
Chapter 11 Practice Quiz
The Surveillance Society
Quiz Content
*
not completed
.
________ is credited for developing the concept of the Panopticon.
Marshall McLuhan
correct
incorrect
Jeremy Bentham
correct
incorrect
Michel Foucault
correct
incorrect
Anthony Giddens
correct
incorrect
*
not completed
.
The pervasive behaviour of looking at others' profiles, wall posts, and pictures on social network sites, such as Facebook, which is sometimes compared to stalking offline, is called ________.
stalking
correct
incorrect
peeping
correct
incorrect
creeping
correct
incorrect
surveillance
correct
incorrect
*
not completed
.
There are many ways to look at surveillance. One understanding that is gaining traction views surveillance as unilaterally claiming human experience as free raw material for translation into behavioural data. What concept describes this type of surveillance?
surveillance capitalism
correct
incorrect
data surveillance
correct
incorrect
liquid surveillance
correct
incorrect
sousveillance
correct
incorrect
*
not completed
.
Lyon and Zureik (1996) have identified a number of perspectives that influence our understanding of what surveillance is. ________ is NOT one of these perspectives.
Inequality
correct
incorrect
Capitalism
correct
incorrect
Rationalization
correct
incorrect
Power
correct
incorrect
*
not completed
.
In an analysis of surveillance based on political economic theory, ________.
political practices are the primary motivator for surveillance practices
correct
incorrect
economic factors are the primary motivator for surveillance practices
correct
incorrect
political and economic factors are the primary motivators for surveillance practices
correct
incorrect
socio-economic factors are the primary motivators for surveillance practices
correct
incorrect
*
not completed
.
The fundamental shift in the functioning of society where instead of behaviour relying on kinship ties, tradition, and informal affiliations, it now relies on rules based on rational choice describes which of the following?
hierarchical observation
correct
incorrect
rationalization
correct
incorrect
capitalism
correct
incorrect
enhanced control
correct
incorrect
*
not completed
.
The analysis of prisons by ________ represents perhaps the most compelling and influential theoretical work on surveillance to date.
Max Weber
correct
incorrect
Karl Marx
correct
incorrect
Michel Foucault
correct
incorrect
Anthony Giddens
correct
incorrect
*
not completed
.
What was the acronym of the US spy program that Edward Snowden uncovered?
DVISM
correct
incorrect
PRISM
correct
incorrect
Five Eyes
correct
incorrect
FVEY
correct
incorrect
*
not completed
.
________ is NOT one of the forms of social control identified by Foucault.
Normalizing judgement
correct
incorrect
Hierarchical observation
correct
incorrect
The examination
correct
incorrect
Normative evaluation
correct
incorrect
*
not completed
.
________ describes how control over people can be achieved through surveillance.
the examination
correct
incorrect
hierarchical observation
correct
incorrect
internalization
correct
incorrect
spotlight effect
correct
incorrect
*
not completed
.
Cop Watch, a group that promotes awareness of police brutality against marginalized populations, monitors police activity, and reports police misconduct and unnecessary brutality is an example of:
reflectionism
correct
incorrect
thepanopticon
correct
incorrect
unilateral surveillance
correct
incorrect
visibility of power
correct
incorrect
*
not completed
.
________ is NOT an example of the new surveillance.
keystroke monitoring by employers
correct
incorrect
hidden cameras in banks or stores
correct
incorrect
wiretapping
correct
incorrect
logging onto Facebook
correct
incorrect
*
not completed
.
The online search behaviour of users is often collected by search engines, such as Google. The primary purpose of tracking users' online behaviour is ________.
providing users with better search results and customized ads
correct
incorrect
reporting any illegal or suspicious activities or searches
correct
incorrect
saving processing power by allowing the search engine to locate your computer terminal more quickly
correct
incorrect
recording and selling users' online identities
correct
incorrect
*
not completed
.
In a study of Facebook undergraduate users, Young and Quan-Haase (2009) found ________.
low levels of information revelation
correct
incorrect
high levels of information revelation
correct
incorrect
about the same level of information revelation as in other user groups
correct
incorrect
that many respondents disclosed their cellphone number or IM screen name
correct
incorrect
*
not completed
.
In the textbook, an important distinction was made between ________ privacy threats and future privacy threats.
past
correct
incorrect
localized
correct
incorrect
reoccurring
correct
incorrect
immediate
correct
incorrect
*
not completed
.
A study of undergraduate students found that few participants provided fake or inaccurate information on Facebook. What reason did the study suggest prevented participants from doing so?
participants all knew how to use Facebook privacy settings so providing false information was not necessary
correct
incorrect
participants did not think there was any reason to provide false information on Facebook
correct
incorrect
participants did not think there would be threats in providing accurate personal information on Facebook
correct
incorrect
participants' friends would question the validity of the information and wonder about its meaning
correct
incorrect
*
not completed
.
The hacktivist group ________ is known as a decentralized group that does not follow directives but instead operates on ideas.
WikiLeaks
correct
incorrect
Anonymous
correct
incorrect
Makerspace
correct
incorrect
CopWatch
correct
incorrect
*
not completed
.
Excessive police force against black citizens has led to acts of counter-surveillance and anti-surveillance that appropriate surveillance apparatuses to challenge forms of anti-black surveillance that frame subjects' blackness as inherently suspect. This is termed ________.
inquiry in performance
correct
incorrect
grassrootssousveillance
correct
incorrect
dark sousveillance
#blacklivesmattersousveillance
correct
incorrect
*
not completed
.
Tufekci has referred to the term ________ to describe the increasing trend of surveillance of and by everyone. Through social media we are watched by our families, friends and acquaintances.
peer monitoring
correct
incorrect
close-circle surveillance
correct
incorrect
circular surveillance
correct
incorrect
social-circle monitoring
correct
incorrect
*
not completed
.
________ has been described as a form of counter-surveillance that empowers those subjected to institutional, state, and corporate surveillance practices.
reverse surveillance
correct
incorrect
sousveillance
correct
incorrect
surveillance of the weak
correct
incorrect
surveillance tactics
correct
incorrect
*
not completed
.
The term "surveillance" originates in the French language and means "watching over."
True
correct
incorrect
False
correct
incorrect
*
not completed
.
Hierarchical observation refers to the exertion of power and control simply through surveillance.
True
correct
incorrect
False
correct
incorrect
*
not completed
.
The trend towards rationalization leads to less bureaucratic administration, legal formalism, and industrial capitalism.
True
correct
incorrect
False
correct
incorrect
*
not completed
.
Weber saw rationalization as increasing control in social and work life.
True
correct
incorrect
False
correct
incorrect
*
not completed
.
A good definition of deviant behaviour would be "behaviour that falls outside the bounds of the law and requires official sanction."
True
correct
incorrect
False
correct
incorrect
*
not completed
.
The design or shape of architecture cannot determine power relations in a building, but the way architecture is given social meaning can result in new forms of power.
True
correct
incorrect
False
correct
incorrect
*
not completed
.
The iron cage is a social system based on efficiency, rational decision-making, bureaucratic rules, and individual needs and life histories.
True
correct
incorrect
False
correct
incorrect
*
not completed
.
The setup of the show Big Brother does not resemble the architecture of the Panopticon, but this reality TV show is still a good example of traditional surveillance.
True
correct
incorrect
False
correct
incorrect
*
not completed
.
Traditional definitions of surveillance emphasize using technical means to extract or create personal data.
True
correct
incorrect
False
correct
incorrect
*
not completed
.
From a revolutionary perspective on surveillance, it could be argued that Facebook users grant third-party access to their personal information involuntarily by not being fully aware of their ability to change privacy settings or by not fully understanding the settings.
True
correct
incorrect
False
correct
incorrect
*
not completed
.
Even messages that users start to type on social media but never post are tracked.
True
correct
incorrect
False
correct
incorrect
*
not completed
.
According to a survey conducted by the Pew Internet and American Life Project, the majority of Internet users are not aware that search engines track their online search behaviour.
True
correct
incorrect
False
correct
incorrect
*
not completed
.
Young and Quan-Haase (2009) were surprised to find that students do not seem to be concerned about the potential misuse of their personal data and continue to post a surprising amount of personal information about themselves on social networking sites.
True
correct
incorrect
False
correct
incorrect
*
not completed
.
Inverse surveillance consists of recording, monitoring, analyzing and questioning surveillance technologies and their proponents.
True
correct
incorrect
False
correct
incorrect
*
not completed
.
Interestingly, a study has revealed that many student users provide fake or inaccurate information on Facebook to restrict strangers from accessing their personal information.
True
correct
incorrect
False
correct
incorrect
Previous Question
Submit Quiz
Next Question
Reset
Exit Quiz
Review & Submit
Submit Quiz
Are you sure?
You have some unanswered questions. Do you really want to submit?
Back to top
Printed from , all rights reserved. © Oxford University Press, 2024
Select your Country