Deck 11: The Surveillance Society

Full screen (f)
exit full mode
Question
Who developed the concept of the Panopticon?

A) Marshall McLuhan
B) Michel Foucault
C) Jeremy Bentham
D) Anthony Giddens
Use Space or
up arrow
down arrow
to flip the card.
Question
What was the name of the supranational intelligence gathering organization consisting of an intelligence alliance between Australia, Canada, New Zealand, the United Kingdom, and the United Stats, that operated outside of national regulatory frameworks?

A) SIGINT
B) Security Five
C) Five Eyes
D) Five Alliances
Question
Who leaked highly confidential information on the surveillance practices of the United States government to the media, embarrassing the CIA?

A) Snowden
B) Glover
C) Simpson
D) Zureik
Question
Lyon and Zureik (1996) outlined three main perspectives that influence our understanding of surveillance. What are they?

A) Capitalism, irrationality, and discipline
B) Panopticon, rationalization, and networked capabilities
C) Fear of terrorism, irrationality, and power
D) Capitalism, rationalization, and power
Question
Which of the following is the best example of analysis of surveillance based on political economic theory?

A) Political practices are the primary motivators for surveillance practices.
B) Political and economic factors are the primary motivators for surveillance practices.
C) Economic factors are the primary motivators for surveillance practices.
D) Socio-political factors are the primary motivators for surveillance practices.
Question
Who originally developed the concepts of rationalization and bureaucratization?

A) Weber
B) Marx
C) Durkheim
D) Giddens
Question
Which of the following statements is true with regards to the study of technology and the new surveillance?

A) The cultural approach argues that societies require some element of security and safety in order to operate effectively.
B) The revolutionary approach argues that technological developments have transformed the nature of surveillance and threatened basic privacy rights.
C) The functional approach argues that social and cultural factors moderate how information technology impacts surveillance.
D) The continuous approach argues that the transformations in surveillance are only of degree, not of kind.
Question
___________ range from single individuals to loosely linked networks of people who gather around a target or idea to tightly organized groups.

A) Hacktivist groups
B) WikiLeaks
C) The NSA
D) Institutional privacy
Question
In the study by Quan-Haase and Elueze, what privacy protection strategy did older adults in East York, Toronto who had limited knowledge of social media report employing to actively counter potential privacy threats?

A) Adding only close friends to social media
B) Using pseudonyms
C) Using privacy settings
D) Using only secure social media sites
Question
What is the term for the idea that control over people can be achieved simply through surveillance?

A) Hierarchical observation
B) Examination
C) Internalization
D) The spotlight effect
Question
When someone chooses not to shoplift because they are unsure whether there is a camera watching them, it is an example of which process of control?

A) Internalized discipline
B) Automatization of power
C) Discovery threat
D) Normative behaviour
Question
Which of the following is NOT an example of the new surveillance?

A) Keystroke monitoring by employers
B) Hidden cameras in banks or stores
C) Logging onto Facebook
D) Wiretapping
Question
The case that showed how legal frameworks can make data practices more visible was:

A) Austria vs. Amazon
B) Europe vs. Facebook
C) Canada vs. Netflix
D) Australia vs. Spotify
Question
What did a 2004 study of privacy perceptions by Viseu, Clement, and Aspinall find?

A) For most Internet users, online privacy is always a concern, as they think privacy violation affects them directly.
B) For most Internet users, online privacy is always a concern, as they think privacy violation could happen soon.
C) For most Internet users, online privacy is not a concern, as they do not think privacy violation will affect them directly.
D) For most Internet users, online privacy is not a concern, as they think privacy violations are prevented by the government.
Question
What important distinction does literature on digital surveillance make?

A) Between past and present privacy threats
B) Between immediate and future privacy threats
C) Between localized and global privacy threats
D) Between reoccurring and episodic privacy threats
Question
Safe harbour was ended by the European Court of Justice? What practice describes safe harbour best?

A) A practice where data from European citizens was collected and analyzed for the purpose of surveillance
B) A practice where data from European citizens was transferred to North America
C) A practice where data from European citizens was sold by Facebook to third parties
D) A practice where data from European citizens was used for targeted advertisement
Question
What is the name of the decentralized hacktivist group that does not follow directives but instead operates on ideas?

A) Anonymous
B) WikiLeaks
C) Makerspace
D) CopWatch
Question
What do Singer and Friedman describe as possibly ranging from single individuals, to loosely linked networks of people who gather around a target or idea, to tightly organized groups?

A) Activist groups
B) Innovation groups
C) Hacktivist groups
D) Hacker groups
Question
There is an increasing trend of surveillance of everyone and by everyone on social media. What does Tufekci call this phenomenon?

A) Close circle surveillance
B) Peer monitoring
C) Circular surveillance
D) Social circle monitoring
Question
What is the term for a form of counter-surveillance that empowers those subjected to institutional, state, and corporate surveillance practices?

A) Reverse surveillance
B) Surveillance of the weak
C) Surveillance tactics
D) Sousveillance
Question
The term surveillance originates in the French language and means "fly over."
Question
The National Security Agency (NSA) considers Edward Snowden to be a security threat for leaking top secret information to the media.
Question
Foucault introduced the notion of the iron cage that has two sides: one positive and one negative.
Question
Safe harbour is a practice where data from European citizens was transferred to North America.
Question
Gary T. Marx identifies three distinct views to describe the changes in surveillance practice that result from the information revolution: functional, revolutionary, and cultural.
Question
From a revolutionary perspective on surveillance, it could be argued that Facebook users voluntarily grant third-party access to their personal information by not changing or fully understanding their privacy settings.
Question
An open cubicle is an example of embedding monitoring practices into the workplace.
Question
"The right to be erased" is a law that allows citizens to request personal information to be removed from a search engine's result page.
Question
Institutional privacy is the threat of one's information being mined and used by governments or corporations.
Question
What are the three main perspectives that Lyon and Zureik (1996) identified that influence our current understanding of surveillance?
Question
What is the Panopticon? How does it relate to the study of surveillance in a digital age?
Question
What privacy protection strategies did older adults living in East York, Toronto utilize to protect against privacy threats as outlined in the study by Quan-Haase and Elueze (2018)?
Question
What is meant by the term inquiry-in-performance in surveillance studies?
Question
What are some ways parents make use of technology in their parenting strategies that are discussed in the chapter?
Question
Gary T. Marx discusses the cultural view of surveillance. To what extent is this approach an appropriate way of understanding how surveillance occurs in social networking sites such as Facebook. Define the cultural view of surveillance first and then show its applicability to social networking sites.
Question
Edward Snowden, a former contractor for the NSA, leaked many classified files to the media, exposing massive surveillance practices by the United States government. Do average citizens have a right to know about all of the government's surveillance practices? Why or why not?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/36
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: The Surveillance Society
1
Who developed the concept of the Panopticon?

A) Marshall McLuhan
B) Michel Foucault
C) Jeremy Bentham
D) Anthony Giddens
C
2
What was the name of the supranational intelligence gathering organization consisting of an intelligence alliance between Australia, Canada, New Zealand, the United Kingdom, and the United Stats, that operated outside of national regulatory frameworks?

A) SIGINT
B) Security Five
C) Five Eyes
D) Five Alliances
C
3
Who leaked highly confidential information on the surveillance practices of the United States government to the media, embarrassing the CIA?

A) Snowden
B) Glover
C) Simpson
D) Zureik
A
4
Lyon and Zureik (1996) outlined three main perspectives that influence our understanding of surveillance. What are they?

A) Capitalism, irrationality, and discipline
B) Panopticon, rationalization, and networked capabilities
C) Fear of terrorism, irrationality, and power
D) Capitalism, rationalization, and power
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is the best example of analysis of surveillance based on political economic theory?

A) Political practices are the primary motivators for surveillance practices.
B) Political and economic factors are the primary motivators for surveillance practices.
C) Economic factors are the primary motivators for surveillance practices.
D) Socio-political factors are the primary motivators for surveillance practices.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
6
Who originally developed the concepts of rationalization and bureaucratization?

A) Weber
B) Marx
C) Durkheim
D) Giddens
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following statements is true with regards to the study of technology and the new surveillance?

A) The cultural approach argues that societies require some element of security and safety in order to operate effectively.
B) The revolutionary approach argues that technological developments have transformed the nature of surveillance and threatened basic privacy rights.
C) The functional approach argues that social and cultural factors moderate how information technology impacts surveillance.
D) The continuous approach argues that the transformations in surveillance are only of degree, not of kind.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
8
___________ range from single individuals to loosely linked networks of people who gather around a target or idea to tightly organized groups.

A) Hacktivist groups
B) WikiLeaks
C) The NSA
D) Institutional privacy
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
9
In the study by Quan-Haase and Elueze, what privacy protection strategy did older adults in East York, Toronto who had limited knowledge of social media report employing to actively counter potential privacy threats?

A) Adding only close friends to social media
B) Using pseudonyms
C) Using privacy settings
D) Using only secure social media sites
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
10
What is the term for the idea that control over people can be achieved simply through surveillance?

A) Hierarchical observation
B) Examination
C) Internalization
D) The spotlight effect
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
11
When someone chooses not to shoplift because they are unsure whether there is a camera watching them, it is an example of which process of control?

A) Internalized discipline
B) Automatization of power
C) Discovery threat
D) Normative behaviour
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is NOT an example of the new surveillance?

A) Keystroke monitoring by employers
B) Hidden cameras in banks or stores
C) Logging onto Facebook
D) Wiretapping
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
13
The case that showed how legal frameworks can make data practices more visible was:

A) Austria vs. Amazon
B) Europe vs. Facebook
C) Canada vs. Netflix
D) Australia vs. Spotify
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
14
What did a 2004 study of privacy perceptions by Viseu, Clement, and Aspinall find?

A) For most Internet users, online privacy is always a concern, as they think privacy violation affects them directly.
B) For most Internet users, online privacy is always a concern, as they think privacy violation could happen soon.
C) For most Internet users, online privacy is not a concern, as they do not think privacy violation will affect them directly.
D) For most Internet users, online privacy is not a concern, as they think privacy violations are prevented by the government.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
15
What important distinction does literature on digital surveillance make?

A) Between past and present privacy threats
B) Between immediate and future privacy threats
C) Between localized and global privacy threats
D) Between reoccurring and episodic privacy threats
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
16
Safe harbour was ended by the European Court of Justice? What practice describes safe harbour best?

A) A practice where data from European citizens was collected and analyzed for the purpose of surveillance
B) A practice where data from European citizens was transferred to North America
C) A practice where data from European citizens was sold by Facebook to third parties
D) A practice where data from European citizens was used for targeted advertisement
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
17
What is the name of the decentralized hacktivist group that does not follow directives but instead operates on ideas?

A) Anonymous
B) WikiLeaks
C) Makerspace
D) CopWatch
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
18
What do Singer and Friedman describe as possibly ranging from single individuals, to loosely linked networks of people who gather around a target or idea, to tightly organized groups?

A) Activist groups
B) Innovation groups
C) Hacktivist groups
D) Hacker groups
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
19
There is an increasing trend of surveillance of everyone and by everyone on social media. What does Tufekci call this phenomenon?

A) Close circle surveillance
B) Peer monitoring
C) Circular surveillance
D) Social circle monitoring
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
20
What is the term for a form of counter-surveillance that empowers those subjected to institutional, state, and corporate surveillance practices?

A) Reverse surveillance
B) Surveillance of the weak
C) Surveillance tactics
D) Sousveillance
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
21
The term surveillance originates in the French language and means "fly over."
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
22
The National Security Agency (NSA) considers Edward Snowden to be a security threat for leaking top secret information to the media.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
23
Foucault introduced the notion of the iron cage that has two sides: one positive and one negative.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
24
Safe harbour is a practice where data from European citizens was transferred to North America.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
25
Gary T. Marx identifies three distinct views to describe the changes in surveillance practice that result from the information revolution: functional, revolutionary, and cultural.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
26
From a revolutionary perspective on surveillance, it could be argued that Facebook users voluntarily grant third-party access to their personal information by not changing or fully understanding their privacy settings.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
27
An open cubicle is an example of embedding monitoring practices into the workplace.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
28
"The right to be erased" is a law that allows citizens to request personal information to be removed from a search engine's result page.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
29
Institutional privacy is the threat of one's information being mined and used by governments or corporations.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
30
What are the three main perspectives that Lyon and Zureik (1996) identified that influence our current understanding of surveillance?
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
31
What is the Panopticon? How does it relate to the study of surveillance in a digital age?
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
32
What privacy protection strategies did older adults living in East York, Toronto utilize to protect against privacy threats as outlined in the study by Quan-Haase and Elueze (2018)?
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
33
What is meant by the term inquiry-in-performance in surveillance studies?
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
34
What are some ways parents make use of technology in their parenting strategies that are discussed in the chapter?
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
35
Gary T. Marx discusses the cultural view of surveillance. To what extent is this approach an appropriate way of understanding how surveillance occurs in social networking sites such as Facebook. Define the cultural view of surveillance first and then show its applicability to social networking sites.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
36
Edward Snowden, a former contractor for the NSA, leaked many classified files to the media, exposing massive surveillance practices by the United States government. Do average citizens have a right to know about all of the government's surveillance practices? Why or why not?
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 36 flashcards in this deck.