SlideShare uma empresa Scribd logo
1 de 17
Wendy Hui Kyong Chun ‘ Control and Freedom’   Power and the paranoia in the age of fiber optics '
  Control Society  F lexibility C odes M odulations Potential health risks Prisoners with more  freedom of movement, more precise tracking   Discipline Society C onfinement Mass individuation M olds P atients Four-walled prison VS
  Control Society User Freedom   Discipline Society Subject Liberty VS
    ,[object Object],[object Object],[object Object]
Key ideas: Control-freedom as techno-determinist critique a. theory-come-true moments
Key ideas:  Control freedom as techno-determinist critique b. technology as solution  to political problems
Key Ideas: Software Myth  ‘Software cannot be physically separated from hardware, only ideologically’ (Chun, 2006: 19)
Key ideas: Software Myth  Kindle example (tethered devices)
Key Ideas: Sexuality Power relations in this control-freedom coupling in the context of fiber-optic networks, for Chun, are often experienced through sexuality. 
Total freedom    Paranoid view of online surveillance
 
National Security Agency (NSA) and  Data-mining Give feeling of freedom    Controling your freedom
Facebook   Do you have a Facebook?
 
Net Neutrality There are always processes of control even when the underlying hardware provides freedom and openness.
[object Object],[object Object],[object Object],[object Object]
DISCUSSION What now?  How can we come up with a useful ratio between power and freedom? Software as ideology  Can we swallow that software doesn't exist?  (a materialist reduction similar to neurobiologists (Heinz von Foerster) and roboticists (Rodney Brooks and Lynn Stein). Freedom-control dynamic debate  -Galloway: the founding principle of the net is control - protocological control – freedom resides in possibility of resistance (counter-protocol) -Chun: openness in these protocols can point towards a certain freedom.  

Mais conteúdo relacionado

Destaque

New Media Communication: Using Word of Mouth Marketing Online
New Media Communication: Using Word of Mouth Marketing OnlineNew Media Communication: Using Word of Mouth Marketing Online
New Media Communication: Using Word of Mouth Marketing OnlineJohn Paul Richards
 
Blank 9.23
Blank 9.23Blank 9.23
Blank 9.23kmckim
 
Technical Convergence
Technical ConvergenceTechnical Convergence
Technical Convergencestevenpwells
 
Kiosk Marketplace
Kiosk MarketplaceKiosk Marketplace
Kiosk Marketplacecburckardt
 
Reviewing Local Investment Plans - What are the LIP drivers in the new landsc...
Reviewing Local Investment Plans - What are the LIP drivers in the new landsc...Reviewing Local Investment Plans - What are the LIP drivers in the new landsc...
Reviewing Local Investment Plans - What are the LIP drivers in the new landsc...South West Observatory
 
Python Para Administradores Linux
Python Para Administradores LinuxPython Para Administradores Linux
Python Para Administradores Linuxguest1eea6537
 
Sofie Ruggieri - The Devon Approach to LEAs
Sofie Ruggieri - The Devon Approach to LEAsSofie Ruggieri - The Devon Approach to LEAs
Sofie Ruggieri - The Devon Approach to LEAsSouth West Observatory
 
2009 UNESCO Sport & Human Rights
2009 UNESCO Sport & Human Rights2009 UNESCO Sport & Human Rights
2009 UNESCO Sport & Human RightsSport in Society
 
Effective Computing In Today’s World
Effective Computing In Today’s WorldEffective Computing In Today’s World
Effective Computing In Today’s WorldTechnecessities
 
Where The Hell Is Matt
Where The Hell Is MattWhere The Hell Is Matt
Where The Hell Is Mattlaurenlaura
 

Destaque (17)

New Media Communication: Using Word of Mouth Marketing Online
New Media Communication: Using Word of Mouth Marketing OnlineNew Media Communication: Using Word of Mouth Marketing Online
New Media Communication: Using Word of Mouth Marketing Online
 
Blank 9.23
Blank 9.23Blank 9.23
Blank 9.23
 
Technical Convergence
Technical ConvergenceTechnical Convergence
Technical Convergence
 
Kiosk Marketplace
Kiosk MarketplaceKiosk Marketplace
Kiosk Marketplace
 
Reviewing Local Investment Plans - What are the LIP drivers in the new landsc...
Reviewing Local Investment Plans - What are the LIP drivers in the new landsc...Reviewing Local Investment Plans - What are the LIP drivers in the new landsc...
Reviewing Local Investment Plans - What are the LIP drivers in the new landsc...
 
Python Para Administradores Linux
Python Para Administradores LinuxPython Para Administradores Linux
Python Para Administradores Linux
 
Sofie Ruggieri - The Devon Approach to LEAs
Sofie Ruggieri - The Devon Approach to LEAsSofie Ruggieri - The Devon Approach to LEAs
Sofie Ruggieri - The Devon Approach to LEAs
 
Ch 4 Federalism
Ch 4 FederalismCh 4 Federalism
Ch 4 Federalism
 
2009 UNESCO Sport & Human Rights
2009 UNESCO Sport & Human Rights2009 UNESCO Sport & Human Rights
2009 UNESCO Sport & Human Rights
 
Ancient egypt year 5 class 6 - roman
Ancient egypt year 5   class 6 - romanAncient egypt year 5   class 6 - roman
Ancient egypt year 5 class 6 - roman
 
Social Web 2
Social Web 2Social Web 2
Social Web 2
 
Effective Computing In Today’s World
Effective Computing In Today’s WorldEffective Computing In Today’s World
Effective Computing In Today’s World
 
Tools
ToolsTools
Tools
 
Ch 3 Sec 1
Ch 3 Sec 1Ch 3 Sec 1
Ch 3 Sec 1
 
1.5 Formal Writing
1.5 Formal Writing1.5 Formal Writing
1.5 Formal Writing
 
Where The Hell Is Matt
Where The Hell Is MattWhere The Hell Is Matt
Where The Hell Is Matt
 
A 2 The Key Atomic Bomb Events of the Cold War, class 2, Fall 2011 and Spring...
A 2 The Key Atomic Bomb Events of the Cold War, class 2, Fall 2011 and Spring...A 2 The Key Atomic Bomb Events of the Cold War, class 2, Fall 2011 and Spring...
A 2 The Key Atomic Bomb Events of the Cold War, class 2, Fall 2011 and Spring...
 

Semelhante a Presentation Chun Tim Niels Morgan Kimberley

Censorship Regimes On The Chinese Internet
Censorship Regimes On The  Chinese InternetCensorship Regimes On The  Chinese Internet
Censorship Regimes On The Chinese InternetAnders Pedersen
 
Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories PresentationLeslie
 
Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories PresentationLeslie
 
Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories PresentationLeslie
 
Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories PresentationLeslie
 
Networking Updated 4.12.10
Networking Updated 4.12.10Networking Updated 4.12.10
Networking Updated 4.12.10Leslie
 
Networking Theories
Networking TheoriesNetworking Theories
Networking TheoriesLeslie
 
Understanding P2P
Understanding P2PUnderstanding P2P
Understanding P2Purbanlabs
 
The Politics of Peer Production
The Politics of Peer ProductionThe Politics of Peer Production
The Politics of Peer Productionmbauwens
 
Post 1Noah Feldman argues that both politics and religions are k.docx
Post 1Noah Feldman argues that both politics and religions are k.docxPost 1Noah Feldman argues that both politics and religions are k.docx
Post 1Noah Feldman argues that both politics and religions are k.docxharrisonhoward80223
 
Kimethics in a world of robots 2013
Kimethics in a world of robots 2013Kimethics in a world of robots 2013
Kimethics in a world of robots 2013AlexandruBuruc
 
Philosophy of Technology
Philosophy of TechnologyPhilosophy of Technology
Philosophy of TechnologyMelanie Swan
 
Lightning Talks @ Hacker Dojo | Subhajeet Mukherjee
Lightning Talks @ Hacker Dojo | Subhajeet MukherjeeLightning Talks @ Hacker Dojo | Subhajeet Mukherjee
Lightning Talks @ Hacker Dojo | Subhajeet MukherjeeSubhajeet Mukherjee
 
Failure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human RightsFailure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human RightsMathias Klang
 
Privacy with Internet
Privacy with InternetPrivacy with Internet
Privacy with InternetMathias Klang
 
J.M. Díaz Nafría: An informational systems approach to security
J.M. Díaz Nafría: An informational systems approach to securityJ.M. Díaz Nafría: An informational systems approach to security
J.M. Díaz Nafría: An informational systems approach to securityJosé Nafría
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottiercitasa
 

Semelhante a Presentation Chun Tim Niels Morgan Kimberley (20)

Censorship Regimes On The Chinese Internet
Censorship Regimes On The  Chinese InternetCensorship Regimes On The  Chinese Internet
Censorship Regimes On The Chinese Internet
 
Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories Presentation
 
Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories Presentation
 
Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories Presentation
 
Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories Presentation
 
Networking Updated 4.12.10
Networking Updated 4.12.10Networking Updated 4.12.10
Networking Updated 4.12.10
 
Networking Theories
Networking TheoriesNetworking Theories
Networking Theories
 
Understanding P2P
Understanding P2PUnderstanding P2P
Understanding P2P
 
The Politics of Peer Production
The Politics of Peer ProductionThe Politics of Peer Production
The Politics of Peer Production
 
Post 1Noah Feldman argues that both politics and religions are k.docx
Post 1Noah Feldman argues that both politics and religions are k.docxPost 1Noah Feldman argues that both politics and religions are k.docx
Post 1Noah Feldman argues that both politics and religions are k.docx
 
Kimethics in a world of robots 2013
Kimethics in a world of robots 2013Kimethics in a world of robots 2013
Kimethics in a world of robots 2013
 
Polinter02
Polinter02Polinter02
Polinter02
 
2010 opensciencepeterson
2010 opensciencepeterson2010 opensciencepeterson
2010 opensciencepeterson
 
Philosophy of Technology
Philosophy of TechnologyPhilosophy of Technology
Philosophy of Technology
 
Lightning Talks @ Hacker Dojo | Subhajeet Mukherjee
Lightning Talks @ Hacker Dojo | Subhajeet MukherjeeLightning Talks @ Hacker Dojo | Subhajeet Mukherjee
Lightning Talks @ Hacker Dojo | Subhajeet Mukherjee
 
Failure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human RightsFailure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human Rights
 
Privacy with Internet
Privacy with InternetPrivacy with Internet
Privacy with Internet
 
essay.CLS
essay.CLSessay.CLS
essay.CLS
 
J.M. Díaz Nafría: An informational systems approach to security
J.M. Díaz Nafría: An informational systems approach to securityJ.M. Díaz Nafría: An informational systems approach to security
J.M. Díaz Nafría: An informational systems approach to security
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottier
 

Último

TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty SecureFemke de Vroome
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 

Último (20)

TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 

Presentation Chun Tim Niels Morgan Kimberley

  • 1. Wendy Hui Kyong Chun ‘ Control and Freedom’ Power and the paranoia in the age of fiber optics '
  • 2.   Control Society F lexibility C odes M odulations Potential health risks Prisoners with more freedom of movement, more precise tracking   Discipline Society C onfinement Mass individuation M olds P atients Four-walled prison VS
  • 3.   Control Society User Freedom   Discipline Society Subject Liberty VS
  • 4.
  • 5. Key ideas: Control-freedom as techno-determinist critique a. theory-come-true moments
  • 6. Key ideas: Control freedom as techno-determinist critique b. technology as solution to political problems
  • 7. Key Ideas: Software Myth ‘Software cannot be physically separated from hardware, only ideologically’ (Chun, 2006: 19)
  • 8. Key ideas: Software Myth Kindle example (tethered devices)
  • 9. Key Ideas: Sexuality Power relations in this control-freedom coupling in the context of fiber-optic networks, for Chun, are often experienced through sexuality. 
  • 10. Total freedom  Paranoid view of online surveillance
  • 11.  
  • 12. National Security Agency (NSA) and Data-mining Give feeling of freedom  Controling your freedom
  • 13. Facebook Do you have a Facebook?
  • 14.  
  • 15. Net Neutrality There are always processes of control even when the underlying hardware provides freedom and openness.
  • 16.
  • 17. DISCUSSION What now? How can we come up with a useful ratio between power and freedom? Software as ideology Can we swallow that software doesn't exist? (a materialist reduction similar to neurobiologists (Heinz von Foerster) and roboticists (Rodney Brooks and Lynn Stein). Freedom-control dynamic debate -Galloway: the founding principle of the net is control - protocological control – freedom resides in possibility of resistance (counter-protocol) -Chun: openness in these protocols can point towards a certain freedom.