SlideShare a Scribd company logo
1 of 23
Download to read offline
The Eye of Power 
Michel Foucault
Panopticon
Democracy
Transparent Society
'Each comrade becomes an overseer' 
“Each Comrade becomes an 
overseer.” -Bentham pg 152
Justice Punishment
Justice = Prevention of 
wrongdoing
Disciplinary Society
“Is it surprising that prisons resemble factories, 
schools, barracks, hospitals, which all resemble 
prisons?” 
“All that is then needed is to put an overseer in 
the tower and place in each of the cells a lunatic, 
a patient, a convict, a worker or a schoolboy.”pg147
Power Structures
“Yet it is hard to discern who it is who stands to 
profit from the organised space that Bentham conceived. 
Does society benefit or the elite from surveillance?” 
-Jean-Pierre Barou pg 156
“As long as the government is allowed to collect 
all Internet data, the perceived exigency will 
drive honest civil servants to reach more broadly 
and deeply into our networked live.” 
-Yochai Benkler
“One has the feeling of confronting an 
infernal model that no one, either the watcher 
or the watched, can escape.” 
-Jean-Pierre Barou pg 156
When does surveillance turn 
into malveillence? 
List some situations 
in which it has. List situations in 
which it has benefitted society.
Where do we draw the line between national 
security and information privacy? 
Is it necessary to monitor all citizens all the 
time? What is there to hide if you aren’t doing 
anything wrong? 
Split into two groups and debate this question.
Who will oversee the overseer? 
Discuss some ways in which the 
government can be monitored by a 
network of internet users.
Some would argue that in being monitored by society our 
sense of right and wrong is taken away and delegated to 
the government. Why think of what is right and wrong if 
someone else is doing it for you?

More Related Content

Viewers also liked

Viewers also liked (18)

Michel foucault theoey
Michel foucault theoeyMichel foucault theoey
Michel foucault theoey
 
Discourse Analysis
Discourse AnalysisDiscourse Analysis
Discourse Analysis
 
SociologyExchange.co.uk Shared Resource
SociologyExchange.co.uk Shared ResourceSociologyExchange.co.uk Shared Resource
SociologyExchange.co.uk Shared Resource
 
Power and history
Power and historyPower and history
Power and history
 
Michel foucault
Michel foucaultMichel foucault
Michel foucault
 
The Panopticon
The PanopticonThe Panopticon
The Panopticon
 
Pierre bourdieu
Pierre bourdieuPierre bourdieu
Pierre bourdieu
 
Klass, ekonomi, arbete, status
Klass, ekonomi, arbete, statusKlass, ekonomi, arbete, status
Klass, ekonomi, arbete, status
 
Ppt Motivasi Belajar
Ppt Motivasi BelajarPpt Motivasi Belajar
Ppt Motivasi Belajar
 
Judith Butler - Resource Pack
Judith  Butler  - Resource PackJudith  Butler  - Resource Pack
Judith Butler - Resource Pack
 
Michel Foucault
Michel FoucaultMichel Foucault
Michel Foucault
 
Michel foucault
Michel foucault Michel foucault
Michel foucault
 
Kematian kristus
Kematian kristusKematian kristus
Kematian kristus
 
Renungan Jalan Salib Yesus
Renungan Jalan Salib YesusRenungan Jalan Salib Yesus
Renungan Jalan Salib Yesus
 
Michael foucault
Michael foucaultMichael foucault
Michael foucault
 
Postmodernism (Foucault and Baudrillard)
Postmodernism (Foucault and Baudrillard)Postmodernism (Foucault and Baudrillard)
Postmodernism (Foucault and Baudrillard)
 
Discourse analysis
Discourse analysisDiscourse analysis
Discourse analysis
 
Discourse Analysis ppt
Discourse Analysis pptDiscourse Analysis ppt
Discourse Analysis ppt
 

Similar to The Eye of Power

Participation literacy surveillance&privacy1
Participation literacy surveillance&privacy1Participation literacy surveillance&privacy1
Participation literacy surveillance&privacy1sammyj0sephine
 
Privacy in the age of anti-terrorism
Privacy in the age of anti-terrorismPrivacy in the age of anti-terrorism
Privacy in the age of anti-terrorismblogzilla
 
Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984Christy Davis
 
2600 v23 n2 (summer 2006)
2600 v23 n2 (summer 2006)2600 v23 n2 (summer 2006)
2600 v23 n2 (summer 2006)Felipe Prado
 
Personal, Private, Professional: Surviving Social Media
Personal, Private, Professional: Surviving Social MediaPersonal, Private, Professional: Surviving Social Media
Personal, Private, Professional: Surviving Social MediaMathias Klang
 
2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)Felipe Prado
 
Social media security users guide edited
Social media security users guide  editedSocial media security users guide  edited
Social media security users guide editedSergey Miller
 
Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible? Mathias Klang
 
Panopticon Of Technology
Panopticon Of TechnologyPanopticon Of Technology
Panopticon Of TechnologyPatty Buckley
 
Information talk slides february2011 1-final
Information talk slides february2011 1-finalInformation talk slides february2011 1-final
Information talk slides february2011 1-finalKaisa Schreck
 
Can authoritarianism survive the Internet? Yes it can...
Can authoritarianism survive the Internet? Yes it can...Can authoritarianism survive the Internet? Yes it can...
Can authoritarianism survive the Internet? Yes it can...rmackinnon
 
Failure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human RightsFailure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human RightsMathias Klang
 

Similar to The Eye of Power (15)

Participation literacy surveillance&privacy1
Participation literacy surveillance&privacy1Participation literacy surveillance&privacy1
Participation literacy surveillance&privacy1
 
Digital Surveillance
Digital SurveillanceDigital Surveillance
Digital Surveillance
 
Privacy in the age of anti-terrorism
Privacy in the age of anti-terrorismPrivacy in the age of anti-terrorism
Privacy in the age of anti-terrorism
 
Jillian C. York
Jillian C. YorkJillian C. York
Jillian C. York
 
Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984
 
2600 v23 n2 (summer 2006)
2600 v23 n2 (summer 2006)2600 v23 n2 (summer 2006)
2600 v23 n2 (summer 2006)
 
Klang PSU
Klang PSUKlang PSU
Klang PSU
 
Personal, Private, Professional: Surviving Social Media
Personal, Private, Professional: Surviving Social MediaPersonal, Private, Professional: Surviving Social Media
Personal, Private, Professional: Surviving Social Media
 
2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)
 
Social media security users guide edited
Social media security users guide  editedSocial media security users guide  edited
Social media security users guide edited
 
Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?
 
Panopticon Of Technology
Panopticon Of TechnologyPanopticon Of Technology
Panopticon Of Technology
 
Information talk slides february2011 1-final
Information talk slides february2011 1-finalInformation talk slides february2011 1-final
Information talk slides february2011 1-final
 
Can authoritarianism survive the Internet? Yes it can...
Can authoritarianism survive the Internet? Yes it can...Can authoritarianism survive the Internet? Yes it can...
Can authoritarianism survive the Internet? Yes it can...
 
Failure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human RightsFailure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human Rights
 

Recently uploaded

ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesLumiverse Solutions Pvt Ltd
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 

Recently uploaded (9)

ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best Practices
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 

The Eye of Power

  • 1. The Eye of Power Michel Foucault
  • 2.
  • 4.
  • 7. 'Each comrade becomes an overseer' “Each Comrade becomes an overseer.” -Bentham pg 152
  • 9. Justice = Prevention of wrongdoing
  • 11. “Is it surprising that prisons resemble factories, schools, barracks, hospitals, which all resemble prisons?” “All that is then needed is to put an overseer in the tower and place in each of the cells a lunatic, a patient, a convict, a worker or a schoolboy.”pg147
  • 13. “Yet it is hard to discern who it is who stands to profit from the organised space that Bentham conceived. Does society benefit or the elite from surveillance?” -Jean-Pierre Barou pg 156
  • 14.
  • 15.
  • 16. “As long as the government is allowed to collect all Internet data, the perceived exigency will drive honest civil servants to reach more broadly and deeply into our networked live.” -Yochai Benkler
  • 17. “One has the feeling of confronting an infernal model that no one, either the watcher or the watched, can escape.” -Jean-Pierre Barou pg 156
  • 18.
  • 19.
  • 20. When does surveillance turn into malveillence? List some situations in which it has. List situations in which it has benefitted society.
  • 21. Where do we draw the line between national security and information privacy? Is it necessary to monitor all citizens all the time? What is there to hide if you aren’t doing anything wrong? Split into two groups and debate this question.
  • 22. Who will oversee the overseer? Discuss some ways in which the government can be monitored by a network of internet users.
  • 23. Some would argue that in being monitored by society our sense of right and wrong is taken away and delegated to the government. Why think of what is right and wrong if someone else is doing it for you?