is undergrads class 8
DESCRIPTION
TRANSCRIPT
![Page 1: IS Undergrads Class 8](https://reader034.vdocuments.us/reader034/viewer/2022051609/54635a32b4af9f491c8b4a17/html5/thumbnails/1.jpg)
The labors of surveillance
The ISS Triangle, reallyBiz strategy
IS strategyOrg’l strategy
Biz strategy
IS strategyOrg’l strategy
Biz strategy
Org’l strategy IS strategy
analysis Implementation
![Page 2: IS Undergrads Class 8](https://reader034.vdocuments.us/reader034/viewer/2022051609/54635a32b4af9f491c8b4a17/html5/thumbnails/2.jpg)
IS strategy --> Biz strategy
Biz strategy
Org’l strategy IS strategy
Implementation
simplemeasurements
Surfacing secrets
Outliars
Systems thinking
?
IT and leadership: Metaphor.
![Page 3: IS Undergrads Class 8](https://reader034.vdocuments.us/reader034/viewer/2022051609/54635a32b4af9f491c8b4a17/html5/thumbnails/3.jpg)
The two axes of panopticism
Visible Unverifiable
The panoptic process
• Unverifiable control places the locus of control within the subject
! mind, not guard
• In a perfect panopticon, people are unaware of their domination
! they ascribe their behavior to motivation
People control and police themselves
![Page 4: IS Undergrads Class 8](https://reader034.vdocuments.us/reader034/viewer/2022051609/54635a32b4af9f491c8b4a17/html5/thumbnails/4.jpg)
The bases of panopticism
People behave according to theory X
A corporation’s tools belong to it, not to employees
Surveillance is included into the employment contract
Examples of surveillance technologies
Packet sniffers
Log files
Desktop monitoring programs
Phone recording
Closed-circuit cameras
![Page 5: IS Undergrads Class 8](https://reader034.vdocuments.us/reader034/viewer/2022051609/54635a32b4af9f491c8b4a17/html5/thumbnails/5.jpg)
Uses of surveillance technologies
78% of all companies use surveillance IT
Reviewing computer files: 1 in 3
Video recording: 1 in 8
Reviewing calls: 1 in 9
Reviewing voice mail: 1 in 11
What is identity?
Consistent story
That we tell ourselves and others
About what happened to us and about what he did in the past
![Page 6: IS Undergrads Class 8](https://reader034.vdocuments.us/reader034/viewer/2022051609/54635a32b4af9f491c8b4a17/html5/thumbnails/6.jpg)
Why do we need identity?
Our brain works with models and needs ontological security
Measurement and face
Ooooops!
![Page 7: IS Undergrads Class 8](https://reader034.vdocuments.us/reader034/viewer/2022051609/54635a32b4af9f491c8b4a17/html5/thumbnails/7.jpg)
Identity and face
Face is the sign (+/-) of our ID
Human beings need a positive ID
We all work very hard at it
We breed to remain physically alive, we do facework to remain socially
alive
![Page 8: IS Undergrads Class 8](https://reader034.vdocuments.us/reader034/viewer/2022051609/54635a32b4af9f491c8b4a17/html5/thumbnails/8.jpg)
Measuring work
Vertical Surveillance Peer
surveillance
The problems of panopticsm
Theory X is self-fulfilling
Compliance, not commitment
![Page 9: IS Undergrads Class 8](https://reader034.vdocuments.us/reader034/viewer/2022051609/54635a32b4af9f491c8b4a17/html5/thumbnails/9.jpg)
Conclusion