The Surveillance Society

Quiz Content

not completed
. ________ is credited for developing the concept of the Panopticon.

not completed
. The pervasive behaviour of looking at others' profiles, wall posts, and pictures on social network sites, such as Facebook, which is sometimes compared to stalking offline, is called ________.

not completed
. There are many ways to look at surveillance. One understanding that is gaining traction views surveillance as unilaterally claiming human experience as free raw material for translation into behavioural data. What concept describes this type of surveillance?

not completed
. Lyon and Zureik (1996) have identified a number of perspectives that influence our understanding of what surveillance is. ________ is NOT one of these perspectives.

not completed
. In an analysis of surveillance based on political economic theory, ________.

not completed
. The fundamental shift in the functioning of society where instead of behaviour relying on kinship ties, tradition, and informal affiliations, it now relies on rules based on rational choice describes which of the following?

not completed
. The analysis of prisons by ________ represents perhaps the most compelling and influential theoretical work on surveillance to date.

not completed
. What was the acronym of the US spy program that Edward Snowden uncovered?

not completed
. ________ is NOT one of the forms of social control identified by Foucault.

not completed
. ________ describes how control over people can be achieved through surveillance.

not completed
. Cop Watch, a group that promotes awareness of police brutality against marginalized populations, monitors police activity, and reports police misconduct and unnecessary brutality is an example of:

not completed
. ________ is NOT an example of the new surveillance.

not completed
. The online search behaviour of users is often collected by search engines, such as Google. The primary purpose of tracking users' online behaviour is ________.

not completed
. In a study of Facebook undergraduate users, Young and Quan-Haase (2009) found ________.

not completed
. In the textbook, an important distinction was made between ________ privacy threats and future privacy threats.

not completed
. A study of undergraduate students found that few participants provided fake or inaccurate information on Facebook. What reason did the study suggest prevented participants from doing so?

not completed
. The hacktivist group ________ is known as a decentralized group that does not follow directives but instead operates on ideas.

not completed
. Excessive police force against black citizens has led to acts of counter-surveillance and anti-surveillance that appropriate surveillance apparatuses to challenge forms of anti-black surveillance that frame subjects' blackness as inherently suspect. This is termed ________.

not completed
. Tufekci has referred to the term ________ to describe the increasing trend of surveillance of and by everyone. Through social media we are watched by our families, friends and acquaintances.

not completed
. ________ has been described as a form of counter-surveillance that empowers those subjected to institutional, state, and corporate surveillance practices.

not completed
. The term "surveillance" originates in the French language and means "watching over."

not completed
. Hierarchical observation refers to the exertion of power and control simply through surveillance.

not completed
. The trend towards rationalization leads to less bureaucratic administration, legal formalism, and industrial capitalism.

not completed
. Weber saw rationalization as increasing control in social and work life.

not completed
. A good definition of deviant behaviour would be "behaviour that falls outside the bounds of the law and requires official sanction."

not completed
. The design or shape of architecture cannot determine power relations in a building, but the way architecture is given social meaning can result in new forms of power.

not completed
. The iron cage is a social system based on efficiency, rational decision-making, bureaucratic rules, and individual needs and life histories.

not completed
. The setup of the show Big Brother does not resemble the architecture of the Panopticon, but this reality TV show is still a good example of traditional surveillance.

not completed
. Traditional definitions of surveillance emphasize using technical means to extract or create personal data.

not completed
. From a revolutionary perspective on surveillance, it could be argued that Facebook users grant third-party access to their personal information involuntarily by not being fully aware of their ability to change privacy settings or by not fully understanding the settings.

not completed
. Even messages that users start to type on social media but never post are tracked.

not completed
. According to a survey conducted by the Pew Internet and American Life Project, the majority of Internet users are not aware that search engines track their online search behaviour.

not completed
. Young and Quan-Haase (2009) were surprised to find that students do not seem to be concerned about the potential misuse of their personal data and continue to post a surprising amount of personal information about themselves on social networking sites.

not completed
. Inverse surveillance consists of recording, monitoring, analyzing and questioning surveillance technologies and their proponents.

not completed
. Interestingly, a study has revealed that many student users provide fake or inaccurate information on Facebook to restrict strangers from accessing their personal information.

Back to top