Call Girls in Gomti Nagar - 7388211116 - With room Service
IS Undergrads Class 8
1. The labors of
surveillance
The ISS Triangle, really
Biz strategy
Org’l strategy IS strategy
analysis Implementation
Biz strategy Biz strategy
Org’l strategy IS strategy Org’l strategy IS strategy
2. IS strategy --> Biz strategy
Implementation
Biz strategy
Systems
thinking
Outliars
simple
measurements
Surfacing
? secrets
Org’l strategy IS strategy
IT and leadership: Metaphor.
3. The two axes of panopticism
Visible Unverifiable
The panoptic process
People control and police themselves
• Unverifiable control places the locus of control
within the subject
! mind, not guard
• In a perfect panopticon, people are unaware of
their domination
! they ascribe their behavior to motivation
4. The bases of panopticism
People behave according to theory X
A corporation’s tools belong to it, not to
employees
Surveillance is included into the
employment contract
Examples of surveillance
technologies
Packet sniffers
Log files
Desktop monitoring programs
Phone recording
Closed-circuit cameras
5. Uses of surveillance
technologies
78% of all companies use surveillance IT
Reviewing computer files: 1 in 3
Video recording: 1 in 8
Reviewing calls: 1 in 9
Reviewing voice mail: 1 in 11
What is identity?
Consistent story
That we tell ourselves and others
About what happened to us and
about what he did in the past
6. Why do we need identity?
Our brain works with models and needs
ontological security
Measurement and face
Ooooops!
7. Identity and face
Face is the sign (+/-) of our ID
Human beings need a positive ID
We all work very hard at it
We breed to remain physically alive,
we do facework to remain socially
alive
8. Measuring work
Vertical
Surveillance Peer
surveillance
The problems of panopticsm
Theory X is Compliance, not
self-fulfilling commitment