The labors of
                   surveillance




            The ISS Triangle, really
                                   ...
IS strategy --> Biz strategy
    Implementation
                 Biz strategy
                       Systems
             ...
The two axes of panopticism




     Visible                      Unverifiable




      The panoptic process
         Peo...
The bases of panopticism

People behave according to theory X
A corporation’s tools belong to it, not to
employees


    S...
Uses of surveillance
            technologies

 78% of all companies use surveillance IT
 Reviewing computer files: 1 in 3...
Why do we need identity?




Our brain works with models and needs
         ontological security




  Measurement and fac...
Identity and face


 Face is the sign (+/-) of our ID
 Human beings need a positive ID
 We all work very hard at it




We...
Measuring work




  Vertical
Surveillance              Peer
                      surveillance




      The problems of ...
Conclusion
Upcoming SlideShare
Loading in...5
×

IS Undergrads Class 8

356
-1

Published on

Published in: Business, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
356
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
97
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

IS Undergrads Class 8

  1. 1. The labors of surveillance The ISS Triangle, really Biz strategy Org’l strategy IS strategy analysis Implementation Biz strategy Biz strategy Org’l strategy IS strategy Org’l strategy IS strategy
  2. 2. IS strategy --> Biz strategy Implementation Biz strategy Systems thinking Outliars simple measurements Surfacing ? secrets Org’l strategy IS strategy IT and leadership: Metaphor.
  3. 3. The two axes of panopticism Visible Unverifiable The panoptic process People control and police themselves • Unverifiable control places the locus of control within the subject ! mind, not guard • In a perfect panopticon, people are unaware of their domination ! they ascribe their behavior to motivation
  4. 4. The bases of panopticism People behave according to theory X A corporation’s tools belong to it, not to employees Surveillance is included into the employment contract Examples of surveillance technologies Packet sniffers Log files Desktop monitoring programs Phone recording Closed-circuit cameras
  5. 5. Uses of surveillance technologies 78% of all companies use surveillance IT Reviewing computer files: 1 in 3 Video recording: 1 in 8 Reviewing calls: 1 in 9 Reviewing voice mail: 1 in 11 What is identity? Consistent story That we tell ourselves and others About what happened to us and about what he did in the past
  6. 6. Why do we need identity? Our brain works with models and needs ontological security Measurement and face Ooooops!
  7. 7. Identity and face Face is the sign (+/-) of our ID Human beings need a positive ID We all work very hard at it We breed to remain physically alive, we do facework to remain socially alive
  8. 8. Measuring work Vertical Surveillance Peer surveillance The problems of panopticsm Theory X is Compliance, not self-fulfilling commitment
  9. 9. Conclusion

×