SlideShare uma empresa Scribd logo
1 de 17
Wendy Hui Kyong Chun ‘ Control and Freedom’   Power and the paranoia in the age of fiber optics '
  Control Society  F lexibility C odes M odulations Potential health risks Prisoners with more  freedom of movement, more precise tracking   Discipline Society C onfinement Mass individuation M olds P atients Four-walled prison VS
  Control Society User Freedom   Discipline Society Subject Liberty VS
    ,[object Object],[object Object],[object Object]
Key ideas: Control-freedom as techno-determinist critique a. theory-come-true moments
Key ideas:  Control freedom as techno-determinist critique b. technology as solution  to political problems
Key Ideas: Software Myth  ‘Software cannot be physically separated from hardware, only ideologically’ (Chun, 2006: 19)
Key ideas: Software Myth  Kindle example (tethered devices)
Key Ideas: Sexuality Power relations in this control-freedom coupling in the context of fiber-optic networks, for Chun, are often experienced through sexuality. 
Total freedom    Paranoid view of online surveillance
 
National Security Agency (NSA) and  Data-mining Give feeling of freedom    Controling your freedom
Facebook   Do you have a Facebook?
 
Net Neutrality There are always processes of control even when the underlying hardware provides freedom and openness.
[object Object],[object Object],[object Object],[object Object]
DISCUSSION What now?  How can we come up with a useful ratio between power and freedom? Software as ideology  Can we swallow that software doesn't exist?  (a materialist reduction similar to neurobiologists (Heinz von Foerster) and roboticists (Rodney Brooks and Lynn Stein). Freedom-control dynamic debate  -Galloway: the founding principle of the net is control - protocological control – freedom resides in possibility of resistance (counter-protocol) -Chun: openness in these protocols can point towards a certain freedom.  

Mais conteúdo relacionado

Destaque

Blank 9.23
Blank 9.23Blank 9.23
Blank 9.23
kmckim
 
Technical Convergence
Technical ConvergenceTechnical Convergence
Technical Convergence
stevenpwells
 
Reviewing Local Investment Plans - What are the LIP drivers in the new landsc...
Reviewing Local Investment Plans - What are the LIP drivers in the new landsc...Reviewing Local Investment Plans - What are the LIP drivers in the new landsc...
Reviewing Local Investment Plans - What are the LIP drivers in the new landsc...
South West Observatory
 
Where The Hell Is Matt
Where The Hell Is MattWhere The Hell Is Matt
Where The Hell Is Matt
laurenlaura
 

Destaque (17)

New Media Communication: Using Word of Mouth Marketing Online
New Media Communication: Using Word of Mouth Marketing OnlineNew Media Communication: Using Word of Mouth Marketing Online
New Media Communication: Using Word of Mouth Marketing Online
 
Blank 9.23
Blank 9.23Blank 9.23
Blank 9.23
 
Technical Convergence
Technical ConvergenceTechnical Convergence
Technical Convergence
 
Kiosk Marketplace
Kiosk MarketplaceKiosk Marketplace
Kiosk Marketplace
 
Reviewing Local Investment Plans - What are the LIP drivers in the new landsc...
Reviewing Local Investment Plans - What are the LIP drivers in the new landsc...Reviewing Local Investment Plans - What are the LIP drivers in the new landsc...
Reviewing Local Investment Plans - What are the LIP drivers in the new landsc...
 
Python Para Administradores Linux
Python Para Administradores LinuxPython Para Administradores Linux
Python Para Administradores Linux
 
Sofie Ruggieri - The Devon Approach to LEAs
Sofie Ruggieri - The Devon Approach to LEAsSofie Ruggieri - The Devon Approach to LEAs
Sofie Ruggieri - The Devon Approach to LEAs
 
Ch 4 Federalism
Ch 4 FederalismCh 4 Federalism
Ch 4 Federalism
 
2009 UNESCO Sport & Human Rights
2009 UNESCO Sport & Human Rights2009 UNESCO Sport & Human Rights
2009 UNESCO Sport & Human Rights
 
Ancient egypt year 5 class 6 - roman
Ancient egypt year 5   class 6 - romanAncient egypt year 5   class 6 - roman
Ancient egypt year 5 class 6 - roman
 
Social Web 2
Social Web 2Social Web 2
Social Web 2
 
Effective Computing In Today’s World
Effective Computing In Today’s WorldEffective Computing In Today’s World
Effective Computing In Today’s World
 
Tools
ToolsTools
Tools
 
Ch 3 Sec 1
Ch 3 Sec 1Ch 3 Sec 1
Ch 3 Sec 1
 
1.5 Formal Writing
1.5 Formal Writing1.5 Formal Writing
1.5 Formal Writing
 
Where The Hell Is Matt
Where The Hell Is MattWhere The Hell Is Matt
Where The Hell Is Matt
 
A 2 The Key Atomic Bomb Events of the Cold War, class 2, Fall 2011 and Spring...
A 2 The Key Atomic Bomb Events of the Cold War, class 2, Fall 2011 and Spring...A 2 The Key Atomic Bomb Events of the Cold War, class 2, Fall 2011 and Spring...
A 2 The Key Atomic Bomb Events of the Cold War, class 2, Fall 2011 and Spring...
 

Semelhante a Presentation Chun Tim Niels Morgan Kimberley

Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories Presentation
Leslie
 
Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories Presentation
Leslie
 
Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories Presentation
Leslie
 
Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories Presentation
Leslie
 
Networking Theories
Networking TheoriesNetworking Theories
Networking Theories
Leslie
 
Understanding P2P
Understanding P2PUnderstanding P2P
Understanding P2P
urbanlabs
 
Post 1Noah Feldman argues that both politics and religions are k.docx
Post 1Noah Feldman argues that both politics and religions are k.docxPost 1Noah Feldman argues that both politics and religions are k.docx
Post 1Noah Feldman argues that both politics and religions are k.docx
harrisonhoward80223
 
Failure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human RightsFailure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human Rights
Mathias Klang
 
Privacy with Internet
Privacy with InternetPrivacy with Internet
Privacy with Internet
Mathias Klang
 

Semelhante a Presentation Chun Tim Niels Morgan Kimberley (20)

Censorship Regimes On The Chinese Internet
Censorship Regimes On The  Chinese InternetCensorship Regimes On The  Chinese Internet
Censorship Regimes On The Chinese Internet
 
Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories Presentation
 
Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories Presentation
 
Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories Presentation
 
Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories Presentation
 
Networking Updated 4.12.10
Networking Updated 4.12.10Networking Updated 4.12.10
Networking Updated 4.12.10
 
Networking Theories
Networking TheoriesNetworking Theories
Networking Theories
 
Understanding P2P
Understanding P2PUnderstanding P2P
Understanding P2P
 
The Politics of Peer Production
The Politics of Peer ProductionThe Politics of Peer Production
The Politics of Peer Production
 
Post 1Noah Feldman argues that both politics and religions are k.docx
Post 1Noah Feldman argues that both politics and religions are k.docxPost 1Noah Feldman argues that both politics and religions are k.docx
Post 1Noah Feldman argues that both politics and religions are k.docx
 
Kimethics in a world of robots 2013
Kimethics in a world of robots 2013Kimethics in a world of robots 2013
Kimethics in a world of robots 2013
 
Polinter02
Polinter02Polinter02
Polinter02
 
2010 opensciencepeterson
2010 opensciencepeterson2010 opensciencepeterson
2010 opensciencepeterson
 
Philosophy of Technology
Philosophy of TechnologyPhilosophy of Technology
Philosophy of Technology
 
Lightning Talks @ Hacker Dojo | Subhajeet Mukherjee
Lightning Talks @ Hacker Dojo | Subhajeet MukherjeeLightning Talks @ Hacker Dojo | Subhajeet Mukherjee
Lightning Talks @ Hacker Dojo | Subhajeet Mukherjee
 
Failure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human RightsFailure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human Rights
 
Privacy with Internet
Privacy with InternetPrivacy with Internet
Privacy with Internet
 
essay.CLS
essay.CLSessay.CLS
essay.CLS
 
J.M. Díaz Nafría: An informational systems approach to security
J.M. Díaz Nafría: An informational systems approach to securityJ.M. Díaz Nafría: An informational systems approach to security
J.M. Díaz Nafría: An informational systems approach to security
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottier
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Presentation Chun Tim Niels Morgan Kimberley

  • 1. Wendy Hui Kyong Chun ‘ Control and Freedom’ Power and the paranoia in the age of fiber optics '
  • 2.   Control Society F lexibility C odes M odulations Potential health risks Prisoners with more freedom of movement, more precise tracking   Discipline Society C onfinement Mass individuation M olds P atients Four-walled prison VS
  • 3.   Control Society User Freedom   Discipline Society Subject Liberty VS
  • 4.
  • 5. Key ideas: Control-freedom as techno-determinist critique a. theory-come-true moments
  • 6. Key ideas: Control freedom as techno-determinist critique b. technology as solution to political problems
  • 7. Key Ideas: Software Myth ‘Software cannot be physically separated from hardware, only ideologically’ (Chun, 2006: 19)
  • 8. Key ideas: Software Myth Kindle example (tethered devices)
  • 9. Key Ideas: Sexuality Power relations in this control-freedom coupling in the context of fiber-optic networks, for Chun, are often experienced through sexuality. 
  • 10. Total freedom  Paranoid view of online surveillance
  • 11.  
  • 12. National Security Agency (NSA) and Data-mining Give feeling of freedom  Controling your freedom
  • 13. Facebook Do you have a Facebook?
  • 14.  
  • 15. Net Neutrality There are always processes of control even when the underlying hardware provides freedom and openness.
  • 16.
  • 17. DISCUSSION What now? How can we come up with a useful ratio between power and freedom? Software as ideology Can we swallow that software doesn't exist? (a materialist reduction similar to neurobiologists (Heinz von Foerster) and roboticists (Rodney Brooks and Lynn Stein). Freedom-control dynamic debate -Galloway: the founding principle of the net is control - protocological control – freedom resides in possibility of resistance (counter-protocol) -Chun: openness in these protocols can point towards a certain freedom.