Week 7 & 8: Community and Technology in Society

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What behavior exemplifies civil inattention in a public space?

  • Engaging in prolonged conversation with strangers
  • Ignoring others completely
  • Glancing at others and quickly averting gaze (correct)
  • Making eye contact and smiling at passersby

How do closed persons signal their unavailability in public?

  • By embodying civil inattention (correct)
  • By making direct eye contact
  • By initiating conversations with strangers
  • By using their phones frequently

Which of the following is considered an 'open' persona?

  • A person who avoids eye contact
  • A public figure engaging with fans (correct)
  • A person reading a book in the park
  • Someone sitting alone at a bar

What was a common public behavior prior to the use of cellphones that demonstrated civil inattention?

<p>Reading newspapers (A)</p> Signup and view all the answers

What was a common reaction to the introduction of the telephone in the 1800s?

<p>Skepticism and fear about surveillance (D)</p> Signup and view all the answers

Which statement best describes the two spheres of technology according to Jonas?

<p>Traditional technologies are stationary and require direct human input. (B)</p> Signup and view all the answers

What concern does Heidegger express regarding modern technology?

<p>It may obscure the reality of its impact on society. (B)</p> Signup and view all the answers

According to Grant, how does technological destiny impact society?

<p>It influences various aspects of society and personal identity. (D)</p> Signup and view all the answers

What is one potential danger of dependence on technology as discussed in the content?

<p>It blurs our perception of technology's dangers and drawbacks. (D)</p> Signup and view all the answers

What is Heidegger's proposed approach towards technology?

<p>Detach ourselves and critically question its purpose in society. (D)</p> Signup and view all the answers

What is a primary characteristic of the hacker mindset?

<p>Mistrust of authority (C)</p> Signup and view all the answers

How do hackers perceive their own activities compared to public perception?

<p>They view themselves as creative problem solvers, unlike the public who sees them as criminals (C)</p> Signup and view all the answers

Which tenet of the hacker philosophy promotes the idea of continuous self-education?

<p>Learn for yourself (C)</p> Signup and view all the answers

What does the hacker community define as a central goal regarding information?

<p>All information should be free (A)</p> Signup and view all the answers

Which approach to problem-solving is typically associated with hackers?

<p>An unorthodox approach that fosters creative solutions (A)</p> Signup and view all the answers

What is a common misconception about hackers?

<p>They engage in illegal activities exclusively for profit (C)</p> Signup and view all the answers

Which aspect of the hacker tenets emphasizes collaboration?

<p>Share your knowledge (D)</p> Signup and view all the answers

What is considered an important factor for evaluating a person's value within the hacker community?

<p>Knowledge and willingness to learn (C)</p> Signup and view all the answers

What is a significant evolution in surveillance practices mentioned?

<p>Data collection and analysis through digital technology (C)</p> Signup and view all the answers

Which phrase best describes the current value of information in society?

<p>Information is the new gold/oil. (C)</p> Signup and view all the answers

What term describes the act of peers monitoring each other's social media activities?

<p>Creeping (A)</p> Signup and view all the answers

Who coined the term 'surveillance capitalism'?

<p>Shoshana Zuboff (C)</p> Signup and view all the answers

What is one consequence of surveillance capitalism?

<p>Monetization of personal data (A)</p> Signup and view all the answers

Which of the following best describes technology's role in surveillance?

<p>It provides tools for collection, storage, and analysis of data. (A)</p> Signup and view all the answers

What is the original meaning of the term 'surveillance'?

<p>Observation or watching over (A)</p> Signup and view all the answers

How do algorithms contribute to surveillance in advertising?

<p>They create predicted advertising based on past behaviors. (D)</p> Signup and view all the answers

What does the term 'actual self' refer to in Higgins' framework?

<p>The self based on one's true physical and social attributes (B)</p> Signup and view all the answers

Which of the following concepts refers to the overlap of different parts of one's life on social media?

<p>Context collapse (C)</p> Signup and view all the answers

What is the significance of 'persistence' in the context of social networking sites?

<p>It means data can be retrieved indefinitely from profiles (D)</p> Signup and view all the answers

How does the concept of 'ideal self' differ from 'ought to be' self?

<p>Ideal self is about personal aspirations; ought to be self reflects moral expectations (D)</p> Signup and view all the answers

What does the term 'online disinhibition effect' describe?

<p>The tendency to disclose more personal feelings online than offline (C)</p> Signup and view all the answers

Which characteristic of social media enhances the ability to find information about others?

<p>Searchability (B)</p> Signup and view all the answers

What does identity play involve in the context of social media?

<p>Experimenting with different versions of the self online (B)</p> Signup and view all the answers

What is a primary way social media influences the concept of friendship?

<p>It allows for the documentation and tracking of relationships over time (D)</p> Signup and view all the answers

What does the phrase 'liquid surveillance' refer to?

<p>Constant and flexible monitoring of individuals in a modern context. (A)</p> Signup and view all the answers

Which agency is known for conducting mass surveillance as revealed by Snowden's leaks?

<p>National Security Agency (NSA) (A)</p> Signup and view all the answers

What is one criticism of the capitalist perspective on surveillance?

<p>It overlooks the social reasons for surveillance. (A)</p> Signup and view all the answers

Which countries are part of the 'Five Eyes' alliance?

<p>Australia, Canada, USA, England, New Zealand (C)</p> Signup and view all the answers

Why do some people welcome surveillance according to the capitalist perspective?

<p>They derive productivity benefits from it. (B)</p> Signup and view all the answers

What did Edward Snowden's leaks primarily expose?

<p>NSA's collection of internet activity without proper authorization. (C)</p> Signup and view all the answers

What is one internal form of surveillance mentioned in the capitalist perspective?

<p>Using assembly lines to track worker efficiency. (B)</p> Signup and view all the answers

In the context of surveillance, what does CSIS primarily focus on?

<p>Gathering intelligence for national and international security. (C)</p> Signup and view all the answers

Flashcards

Hacker Subculture

A subculture characterized by a unique, unconventional approach to problem solving.

Participant Observation

A method of studying a group by actively participating in their activities and observing their behaviors.

Learn by Doing

A core belief within hacker culture that emphasizes learning through hands-on experience and experimentation.

Free Information

A principle in hacker culture suggesting that knowledge should not be restricted and should be freely shared amongst individuals.

Signup and view all the flashcards

Mistrust Authority

A hacker's belief that authority figures should be challenged and scrutinized, as they might not always act in one's best interests.

Signup and view all the flashcards

Hacker

An individual who possesses a deep understanding of how things work and utilizes their knowledge to solve problems creatively.

Signup and view all the flashcards

Desire for Understanding

A key principle in hacker culture of continuously seeking a deeper understanding of how things work.

Signup and view all the flashcards

Knowledge-Based Evaluation

The belief that an individual's value is determined by their knowledge, their ability to learn, and their willingness to share their knowledge.

Signup and view all the flashcards

Civil Inattention

A social norm where individuals in public spaces acknowledge each other's presence but avoid direct interaction to respect personal space.

Signup and view all the flashcards

Closed Person

A person who signals their unavailability for interaction by avoiding eye contact and unnecessary conversation in public spaces.

Signup and view all the flashcards

Open Person

An individual who openly invites engagement with others in public settings, often through verbal cues or body language.

Signup and view all the flashcards

Signaling (Open/Closed)

The use of non-verbal communication, such as body language and facial expressions, to signal openness or closedness to interaction in public.

Signup and view all the flashcards

Early Telephone Skepticism

The telephone's impact on relationships in the early 20th century led to skepticism and fear surrounding the technology, with concerns about its potential for privacy violations.

Signup and view all the flashcards

Online Self Presentation

How someone presents themselves online, often curated to reflect an ideal self.

Signup and view all the flashcards

Actual Self

The self that is based on a person's actual traits and characteristics (who they are in reality).

Signup and view all the flashcards

Ideal Self

The self that someone wants others to perceive them as (how they want to be seen).

Signup and view all the flashcards

Ought to be Self

The self that reflects a person's moral expectations and aspirations for themselves.

Signup and view all the flashcards

Context Collapse

The merging of different social roles and audiences in online spaces, making it difficult to maintain separate identities.

Signup and view all the flashcards

Identity Play

The ability to change your identity or persona online, exploring different versions of yourself.

Signup and view all the flashcards

Online Disinhibition Effect

The tendency to be more open and expressive online, due to the perceived anonymity and lack of social cues.

Signup and view all the flashcards

Social Media Friendship

Friendships formed and experienced online, often blurring traditional boundaries and norms.

Signup and view all the flashcards

Surveillance Society

The increased use of technology in daily life has led to a rise in both public and private surveillance.

Signup and view all the flashcards

Digital Surveillance

Surveillance has evolved from physical observation to data collection and analysis through digital technologies.

Signup and view all the flashcards

Surveillance as a Power Mechanism

Surveillance is a mechanism employed for power and control, warranting careful examination.

Signup and view all the flashcards

Surveillance Capitalism

The monetization of personal data gathered through monitoring individuals' actions and behaviors.

Signup and view all the flashcards

Creeping

The act of closely examining someone else's social media profiles or activity, often without their knowledge.

Signup and view all the flashcards

Predictive Advertising

Algorithm-driven advertising that anticipates your future needs and preferences based on past online behavior.

Signup and view all the flashcards

Behavioral Nudges

The use of technology and data to subtly influence behavior.

Signup and view all the flashcards

Shoshana Zuboff

The author of "The Age of Surveillance Capitalism" and a prominent researcher on the impact of surveillance.

Signup and view all the flashcards

Technological Destiny

A technological perspective suggesting that technology is an inevitable force shaping human existence and constantly evolving, ultimately influencing our choices and destinies.

Signup and view all the flashcards

Traditional vs. Modern Technologies

Traditional technologies are stationary and require direct human input, while Modern technologies are autonomous and actively evolve, potentially leading to greater dependence and blurred boundaries between humans and technology.

Signup and view all the flashcards

Technology's Hidden Reality

Heidegger's perspective on technology's potential to dehumanize us by concealing its true nature and influencing our choices, ultimately making us dependent on its systems.

Signup and view all the flashcards

Technology and Environmental Solutions

The argument that technology's impact on our environment, especially with environmental degradation, should not solely rely on technological solutions but also consider non-tech alternatives like reforestation and consumption reduction.

Signup and view all the flashcards

Detaching from Technology's Grip

Heidegger's suggestion that we detach from technology's control and critically examine its purpose in society, not necessarily rejecting it but understanding its role and impact on human existence.

Signup and view all the flashcards

Intelligence Gathering

Collecting and analyzing information to detect potential threats to national security, such as terrorism and cyberattacks.

Signup and view all the flashcards

Five Eyes Alliance

A partnership between intelligence agencies in Canada, the United States, the United Kingdom, Australia, and New Zealand, sharing intelligence and collaborating on security issues.

Signup and view all the flashcards

Surveillance

The practice of monitoring and collecting data about individuals and their activities, often without their knowledge or consent. This can involve tracking phone calls, internet usage, and even location data.

Signup and view all the flashcards

Liquid Surveillance

A form of surveillance that constantly monitors and tracks data in a complex and changing environment, reflecting the fluidity of modern life and information flow.

Signup and view all the flashcards

Edward Snowden

A former NSA contractor who leaked classified documents in 2013, revealing the extent of government surveillance programs.

Signup and view all the flashcards

Data Commodification

The belief that personal data and information about our behavior is a valuable commodity that can be bought and sold in a digital marketplace.

Signup and view all the flashcards

Capitalist Perspective on Surveillance

A perspective on surveillance that sees it as primarily driven by capitalism and the desire to control and exploit workers for economic gain.

Signup and view all the flashcards

Social Perspective on Surveillance

A perspective on surveillance that considers broader social and ethical implications, acknowledging that people may willingly engage in surveillance for personal or social benefits.

Signup and view all the flashcards

Study Notes

Week 7: Community in the Network Society

  • Communities act as reference groups for understanding self
  • Cooley's "looking-glass self" describes how interactions shape our self-perception
  • Reference groups are those against which individuals evaluate their situation
  • Communities provide normative standards and comparison points for behavior, skills, and achievements
  • Digital technologies challenge traditional community definitions based on physical boundaries
  • Technology facilitates communities across time and space
  • Online echo chambers can limit perspectives due to algorithmic filtering
  • Community is viewed through different lenses: geography, shared interests, and society as a whole
  • Tönnies distinguished between Gemeinschaft (close-knit) and Gesellschaft (loose connections) relationships within communities
  • Tönnies identified three factors of Gemeinschaft

Week 8: Technology-Mediated Social Relationships

  • Technology is increasingly used for building and maintaining relationships
  • Increased time spent digitally interacting has risen since 2003-2022, by 1 hour 39 minutes
  • Loneliness is now considered a significant public health concern in the states.
  • Online interactions, while creating new communities, can still present feelings of loneliness.
  • Relationships formed through technology can replace face-to-face interactions.
  • Civil inattention (treating strangers with politeness, but maintaining a distance) in public spaces is challenged by technology
  • Different perspectives on how technology affects social relationships: saved, enhanced, or liberated communities
  • Ways to signal openness or closeness to others through digital interaction (technology signals the level of interaction with strangers)

Week 9: Surveillance Society

  • Increased public and private surveillance through digital technologies (data collection, analysis, storage)
  • Technology gives tools for surveillance (collection, storage, analysis of data)
  • Surveillance is used to maintain order and comply with existing regulations.
  • Surveillance affects privacy, and raises concerns about how much information about individuals is shared with companies, governments, or personal networks
  • Surveillance is not inherently bad.
  • Surveillance can be used to protect people from threats such as terrorism and cyberattacks
  • People want to be aware of how they are watched (and potentially able to avoid it)
  • 5 Eyes alliance countries (US, UK, Canada, New Zealand, and Australia): collect information
  • Technological surveillance makes society more transparent to others (especially those in positions of power)

Week 10: Ethics & Technology

  • Ethical implications of technology, and its responsible development and deployment.
  • Bias in AI systems
  • Social implications of technology
  • Impact of technological development

Week 11: Ethics & Technology (cont.) & other topics

  • Individuals’ ethical/moral responsibilities and concerns regarding the use of technology and potential societal harms.
  • Impacts of technology on traditional social concepts and relationships (such as friendships and family).
  • Impacts of technology on ethical concepts and moral concerns.
  • How to measure and evaluate the social costs and benefits of technology.
  • Implications of technology on different aspects of society, such as economy, environment, and culture.
  • Ways in which technology is used for exploiting or oppressing vulnerable populations (including the use of technology for hate spread and extremism).
  • Possible future of technology and what it possibly may bring.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Technology Week 7 - 10 PDF

More Like This

Use Quizgecko on...
Browser
Browser