Thursday, April 14, 2011

What is the information panopticon? Discussion with reference to the use of ICT in organization of work


The information panopticon represents a form of centralized power that uses information and communication technology (ICT) as observational tools and control mechanisms. English philosopher and social theorist Jeremy Bentham developed the original architecture of the panopitcon as a prison. The structure consisted of a centralized tower surrounded by a circular building divided into prison cells. Benthams concept was to maximize the number of prisoners that can be observed by one individual within the tower. Within The Information Panopticon, Zuboff uses the architectural strategies of the panopticon as a metaphor to describe how information systems translate, record, and display human behaviorwith a degree of illumation that would have exceeded even Benthams most outlandish fantasies (Zuboff 322). The information panopticon critiques how technological systems use transparency to assert power, control, and authority over users.

Inherent within many new technological and informational devices is the ability to network. Whether it is a personal computer or database systems, these applications often promote forms of interconnectivity that require a centralized control center (Zuboff 328). In early telecommunication experiments by inventors like Alexander Bell and Samuel Morse, the idea of transmission was essentially linear. A message was sent from one location to another, traveling down a wire. As innovation progressed, communication began to operate through various access nodes within a network. The physical locations of the switching and control centers began to operate in very similar ways to the central surveillance tower of the panopticon.

As these ICTs are introduced into the workplace, managers and employees are discovering the hierarchical risks within information authority. Zuboff explains that these information centers help managers in a workplace to revamp their methods of communication, invite feedback, listen, coach, facilitate, manage many objectives, encourage autonomy, provide vision (Zuboff 232). The engagements a manager previously dealt with in a face-to-face setting can now be administered through a system that operates in a ubiquitous way. In other words, technology can be used as a form of power that displays itself automatically and continuously.

In a work setting, this method of control is different to that of the original panopticon because many ICT systems function as transparent architectures. The technological knowledge needed to understand how one is being surveyed is not as apparent as in Benthams prison. The techniques of control within informational and networked systems often appear pragmatic, immediate, and technical (Zuboff 324). This places the employees in a position of passive and obedient, where they no longer know or understand exactly how panoptic power is being enforced. Consequently, the administrative actions within the workplace can appear paranoid and non-specified approaches to security.

The responsibility of this technical authority does begin to question what ethical, social, and professional surveillance is acceptable in response to ICT technology in the workplace. Surveillance in the work place is not necessarily new; it has long been around in the form of corporate policy, collective behavior and social traditions. Zuboff describes how maintaining faith that undergirds imperative control is hard work psychologically demanding, time-consuming, and inevitably prone to ambiguity (Zuboff 360). The capacity of these surveillance systems will accomplish some goals, and create entirely new unresolved problems: what to do with all of this personal data? Similar to the Panoptic prison, the information panopticon does focus on creating a vulnerable, defenseless user. However, the employees are not prisoners, they are not without some sense of control, and certainly should question the business practices. The fight remains within the users, the employees, to not passively participate in surveillance but rather to actively place responsibility on management and administration to effectively organize. As ICTs continue to act as control mechanisms within the workplace, management should tirelessly redevelop systems that respond not only to power but also the emotional, the personal, and complexity of human behaviors.


References,
business-usual-information-panopticon-workplace

By,
A.Praveen Kumar,
CH09B003.












Who is Hacker..??? & Hacker Ethic...

A hacker is a person who breaks into computers and computer networks, either for profit or motivated by the challenge or for the purpose of getting illegitimate access to resources.
Hacker ethic is the generic phrase which describes the values and philosophy that are standard in the hacker community

Hacker Ethic was a “new way of life, with a philosophy, an ethic and a dream”. However, the elements of the Hacker Ethic were not openly debated and discussed; rather they were accepted and silently agreed upon.
The belief that information-sharing is a powerful positive good, and that it is an ethical duty of hackers to share their expertise by writing open-source code and facilitating access to information and to computing resources wherever possible.

2. The belief that system-cracking for fun and exploration is ethically OK as long as the cracker commits no theft, vandalism, or breach of confidentiality.
Both of these normative ethical principles are wide but by no means universally, accepted among hackers. Most hackers act on it by writing and giving away open-source software. A few go further and assert that all information should be free and any proprietary control of it is bad.

Some people consider the act of cracking itself to be unethical, like breaking and entering. But the belief that ‘ethical’ cracking excludes destruction at least moderates.
The most reliable manifestation of either version of the hacker ethic is that almost all hackers are actively willing to share technical tricks, software, and (where possible) computing resources with other hackers.

According to Pfaffenberger, Technology leads a double life, one which conforms to the intentions of designers and interests of power and another which contradicts them — proceeding behind the backs of their architects to yield unintended consequences and unintended possibilities… technologies rarely fulfil the fantasies of their creators.
But, as Pfaffenberger points out, hackers’ ‘outlaw’ or ‘electronic terrorist’ status may be overdrawn; hackers are often hired by the very companies they have sought to electronically break into; many if not most of them are already on a university-paved road to computer science success (though this ethnic and gender profile is slowly changing, along with the penalties for hacking).

References,
Wikipedia,
Google.


By,
A.Praveen Kumar,
CH09B003.


Who is a hacker? Explain what is meant by “the hacker ethic” with the help of a contemporary example.

Hacker is a term used by some to mean "a clever programmer" and by others, especially those in popular media, to mean "someone who tries to break into computer systems.The idea of hacking emerged in 1960's at the Massachusetts Institute of Technology. The primitive form of hacking , phone phreaking started during the late 60's .In the 1970s the cyber frontier was wide open. Hacking was all about exploring and figuring out how the wired world worked. John Draper, a Vietnam vet, makes a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line. Draper discovered the whistle as a give-away in a box of children's cereal. Draper, who later earns the handle "Captain Crunch," is arrested repeatedly for phone tampering throughout the 1970s.Hacking and phone phreaking may well have been founded in the attempt by marginal persons to gain entry to a world that had been denied to them, but once they made it their own, they re- produced its features more or less intact.
Steven Levy, in the book Hackers, talks at length about what he calls the ``hacker ethic.'' This phrase is very misleading. What he has discovered is the Hacker Aesthetic, the standards for art criticism of hacks. For example, when Richard Stallman says that information should be given out freely, his opinion is not based on a notion of property as theft, which (right or wrong) would be an ethical position. His argument is that keeping information secret is inefficient; it leads to anaesthetic duplication of effort.The objective of hackers were not merely to win access to computer systems for themselves, but to make them available to the wider public.Sherry Turkle in her article says that the only art a hacker embraces is music.The hacker listens , not to its sound of music, but to its structure.She also notices that majority of hackers are young men, mostly teenagers, who have found a world within the computer in which they can mold their desires.






Kevin Mitnick is a self-proclaimed "hacker poster boy,"Mitnickwent through a highly publicized pursuit by authorities. His mischief was hyped by the media but his actual offenses may be less notable than his notoriety suggests. The Department of Justice describes him as "the most wanted computer criminal in United States history." His exploits were detailed in two movies: Freedom Downtime and Takedown.
Mitnick had a bit of hacking experience before committing the offenses that made him famous. He started out exploiting the Los Angeles bus punch card system to get free rides. Then, like Apple co-founder Steve Wozniak, dabbled in phone phreaking. Although there were numerous offenses, Mitnick was ultimately convicted for breaking into the Digital Equipment Corporation's computer network and stealing software.
Mitnick's mischief got serious when he went on a two and a half year "coast-to-coast hacking spree." The CNN article, "Legendary computer hacker released from prison," explains that "he hacked into computers, stole corporate secrets, scrambled phone networks and broke into the national defense warning system." He then hacked into computer expert and fellow hacker Tsutomu Shimomura's home computer, which led to his undoing.
Today, Mitnick has been able to move past his role as a black hat hacker and become a productive member of society. He served five years, about 8 months of it in solitary confinement, and is now a computer security consultant, author and speaker.


YASIR CM
CS09B035

The information panopticon


             The information panopticon represents a form of centralized power that uses information and communication technology (ICT) as observational tools and control mechanisms.The idea of information panopticon came from the structure used in prisons to maximize the number of prisoners that can be observed by a single officer.
             In order to maximize the profit computer technologies are introduced in various industries during 1980's. The banking industry is the first major non-militory sector of the world economy to computerize.Shoshana Zuboff examined the data based environment at the brazilian branch of a US bank.On the introduction of computer technology the whole banking system changed.In the words of one manager”Service , excellence and innovation are the only buzz words now. As we push th technology ,people will realize that they have a really valuable tool on the other on their hands .They will be forced to use it.Then we can change the way they think and do their work”.But due to the resistance from senior managers the database environment system did not cause any revolution .

             As these ICTs are introduced into the workplace, managers and employees are discovering the hierarchical risks within information authority. Zuboff explains that these information centers help managers in a workplace to revamp their methods of communication, invite feedback, listen, coach, facilitate, manage many objectives, encourage autonomy, provide vision. The engagements a manager previously dealt with in a face-to-face setting can now be administered through a system that operates in a ubiquitous way. In other words, technology can be used as a form of power that displays itself automatically and continuously.
            In a work setting, this method of control is different to that of the original panopticon because many ICT systems function as transparent architectures. The technological knowledge needed to understand how one is being surveyed is not as apparent as in Benthams prison. The techniques of control within informational and networked systems often appear pragmatic, immediate, and technical. This places the employees in a position of passive and obedient, where they no longer know or understand exactly how panoptic power is being enforced. Consequently, the administrative actions within the workplace can appear paranoid and non-specified approaches to security.
             
            The responsibility of this technical authority does begin to question what ethical, social, and professional surveillance is acceptable in response to ICT technology in the workplace. Surveillance in the work place is not necessarily new; it has long been around in the form of corporate policy, collective behavior and social traditions. Zuboff describes how maintaining faith that undergirds imperative control is hard work psychologically demanding, time-consuming, and inevitably prone to ambiguity. The capacity of these surveillance systems will accomplish some goals, and create entirely new unresolved problems: what to do with all of this personal data? Similar to the Panoptic prison, the information panopticon does focus on creating a vulnerable, defenseless user. However, the employees are not prisoners, they are not without some sense of control, and certainly should question the business practices. The fight remains within the users, the employees, to not passively participate in surveillance but rather to actively place responsibility on management and administration to effectively organize. As ICTs continue to act as control mechanisms within the workplace, management should tirelessly redevelop systems that respond not only to power but also the emotional, the personal, and complexity of human behaviors.

YASIR CM
CS09B035

The supersonic Tupolev TU-144 “Concordski” disaster


             A result of the cold war's technology rivalry when the Soviet Union copied many things the west made including the Concorde and Space Shuttle. The Tupolev TU-144 was one of the Soviets least successful project. Built as a competitor to the Anglo-French Concorde from modified plans stolen from the French it was the first supersonic commercial aircraft beating Concorde by two months.

            In a story leaden with political intrigue, the French did their utmost to wrong-foot the Russians at the Paris Airshow of 1973, including halving the time alloted to them for the demonstration flight of the Tupolev TU-144, otherwise known as “Concordski” over here in the west.

             A name derived in no small part from the fact that the designs for the Tupolev were taken directly from French designs of the real Concorde, as well as the striking similarities between the two aeroplanes.

            Matters worsened when the: “French sent up a Mirage III jet to photograph the TU-144 in flight, but did not tell the Russians.” And it is here that our story of death, destruction and rather a lot of finger-pointing begins.

          Since the two aircraft were in such ridiculously close proximity to each other while in the air, problems were bound to arise. And as the Tupolev and the Mirage both realized that they were on a collision course, the crew of the Tupolev took evasive action, but: “the plane stalled and then when they tried to recover from the stall they overstressed the air frame causing the plane to break-up and crash,…”

            It is speculated that the pilot of the Tupolev pushed the aircraft too hard, which is a reasonable assumption since the whole thing snapped in two. The resulting tangle of airframe, engines and fuselage was hurled into the ground in a searing fireball, obliterating the six people aboard the Tupolev and slaughtering eight people on the ground.

            In total, sixty more people were injured and fifteen houses were utterly destroyed in the carnage and mayhem that ensued this deliciously flame-fueled aeronautical armageddon.

          The civilian duties of the Tupolev TU-144 were forever left like those lives touched by those survivors and relatives of those injured and killed at the Paris Airshow of 1973 - shattered and broken into innumerable shards, never to be a reassembled.
         The sad and miserable moral of this story is that one man’s technology is another man’s poison. Had the Russians stood more closely by one of their own proverbs “keep friends close and enemies closer”, they might have spotted the devil in the details they were stealing from the British and the French engineers…

         The TU-144 flew again in the mid-1990s, when Boeing and  NASA partnered with Tupolev to test supersonic flight. using a heavily modified TU-144D was renamed TU-144LL and set up as a flying test laboratory for future supersonic development. Developed for NASA's High-Speed Civil Transport program it made 32 flights up to 1999 near Moscow. Since then Boeing has shelved plans for a supersonic plane deciding to continue improvements on their 777 series jets. NASA's part in the project has also stopped as their hopes for large scale use of supersonic aircraft had proven too costly.


YASIR CM
CS09B035

The Information Panopticon

The information panopticon represents a form of centralized power that uses information and communication technology (ICT) as observational tools and control mechanisms. English philosopher and social theorist Jeremy Bentham developed the original architecture of the panopitcon as a prison. The structure consisted of a centralized tower surrounded by a circular building divided into prison cells. Benthams concept was to maximize the number of prisoners that can be observed by one individual within the tower. Within The Information Panopticon, Zuboff uses the architectural strategies of the panopticon as a metaphor to describe how information systems translate, record, and display human behavior with a degree of illumation that would have exceeded even Benthams most outlandish fantasies (Zuboff 322). The information panopticon critiques how technological systems use transparency to assert power, control, and authority over users.
            Inherent within many new technological and informational devices is the ability to network. Whether it is a personal computer or database systems, these applications often promote forms of inter connectivity that require a centralized control center (Zuboff 328). In early telecommunication experiments by inventors like Alexander Bell and Samuel Morse, the idea of transmission was essentially linear. A message was sent from one location to another, traveling down a wire. As innovation progressed, communication began to operate through various access nodes within a network. The physical locations of the switching and control centers began to operate in very similar ways to the central surveillance tower of the panopticon.
            As these ICTs are introduced into the workplace, managers and employees are discovering the hierarchical risks within information authority. Zuboff explains that these information centers help managers in a workplace to revamp their methods of communication, invite feedback, listen, coach, facilitate, manage many objectives, encourage autonomy, provide vision (Zuboff 232). The engagements a manager previously dealt with in a face-to-face setting can now be administered through a system that operates in a ubiquitous way. In other words, technology can be used as a form of power that displays itself automatically and continuously
            In a work setting, this method of control is different to that of the original panopticon because many ICT systems function as transparent architectures. The technological knowledge needed to understand how one is being surveyed is not as apparent as in Benthams prison. The techniques of control within informational and networked systems often appear pragmatic, immediate, and technical (Zuboff 324). This places the employees in a position of passive and obedient, where they no longer know or understand exactly how panoptic power is being enforced. Consequently, the administrative actions within the workplace can appear paranoid and non-specified approaches to security.
            The responsibility of this technical authority does begin to question what ethical, social, and professional surveillance is acceptable in response to ICT technology in the workplace. Surveillance in the work place is not necessarily new; it has long been around in the form of corporate policy, collective behavior and social traditions. Zuboff describes how maintaining faith that under girds imperative control is hard work psychologically demanding, time-consuming, and inevitably prone to ambiguity (Zuboff 360). The capacity of these surveillance systems will accomplish some goals, and create entirely new unresolved problems: what to do with all of this personal data? Similar to the Panoptic prison, the information panopticon does focus on creating a vulnerable, defenseless user. However, the employees are not prisoners, they are not without some sense of control, and certainly should question the business practices. The fight remains within the users, the employees, to not passively participate in surveillance but rather to actively place responsibility on management and administration to effectively organize. As ICTs continue to act as control mechanisms within the workplace, management should tirelessly redevelop systems that respond not only to power but also the emotional, the personal, and complexity of human behaviors.

References:
http://www.hastac.org/blogs/jeffkolar/business-usual-information-panopticon-and-workplace
Zuboff S., In the Age of the Smart Machine : The Future of Work and Power, BasicBooks, 1988, pp. 315-361

D Sai Prashanth Reddy
CH09B015

Information panaopticon

INFORMATION PANOPTICON


The information panopticon represents a form of centralized power that uses information and communication technologies (ICTs) as observational tools and control mechanisms. Jeremy Bentham developed the original architecture of the panopticon as a prison. The structure consisted of a centralized tower surrounded by a circular building divided into prison cells. The concept was to maximize the number of prisoners that can be observed by one individual within the tower. Within The Information Panopticon, the  architectural strategies of the panopticon is used as a metaphor to describe how information systems translate, record, and display human behaviour with a degree of illumation that would have exceeded even Benthams most outlandish fantasies . The information panopticon critiques how technological systems use transparency to assert power, control, and authority over users.
           Be it a personal computer or a database system, both promote forms of interconnectivity that require a centralized control centre. The physical location of this centre is analogous to the central surveillance tower of the panopticon .
            As these ICTs are introduced into the workplace, these information centers help managers to revamp their methods of communication, invite feedback, listen, coach, facilitate, manage many objectives, encourage autonomy, provide vision. In other words, technology can be used as a form of power that displays itself automatically and continuously.
The technological knowledge needed to understand how one is being surveyed is not as apparent as in Benthams prison. The techniques of control within informational and networked systems often appear pragmatic, immediate, and technical . This places the employees in a position of passive and obedient, where they no longer know or understand exactly how panoptic power is being enforced. Consequently, the administrative actions within the workplace can appear paranoid and non-specified approaches to security.
The capacity of these surveillance systems will accomplish some goals, and create entirely new unresolved problems: what to do with all of this personal data? Similar to the Panoptic prison, the information panopticon does focus on creating a vulnerable, defenseless user. However, the employees are not prisoners, they are not without some sense of control, and certainly should question the business practices. As ICTs continue to act as control mechanisms within the workplace, management should tirelessly redevelop systems that respond not only to power but also the emotional, the personal, and complexity of human behaviours .

Submitted by ,
Prajul Bagri