Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

As we have seen in this course, virtually every generation has felt that the existing threat to its privacy was unprecedented in nature. That said,

As we have seen in this course, virtually every generation has felt that the existing threat to its privacy was unprecedented in nature. That said, the sheer capacity to collect metadata which exists today is without comparison. Ericson and Haggerty refer to it as a 'surveillant assemblage.' According to the authors: "This assemblage operates by abstracting human bodies from their territorial settings and separating them into a series of discrete flows. These flows are then reassembled into distinct 'data doubles' which can be scrutinized and targeted for intervention. In the process, we are witnessing a rhizomatic leveling of the hierarchy of surveillance, such that groups which were previously exempt from routine surveillance are now increasingly being monitored."

Explain what the authors mean by a 'surveillant assemblage' and which articulates your position on the issue. To accomplish this, you are to use the example of 'facial recognition technology' to support your argument. Overall, your paper should capture the core idea behind the surveillant assemblage, and also whether the risks we face to our privacy are truly unprecedented in nature.

A roadmap of your paper, which should include:

Introduction

1. Background/Context to introduce your topic i.e. surveillant assemblage (detailed explanation)

- The hook - how you are going to open your paper

- How will you introduce the topic?

- Talk about and explain the evolution of pre-modern surveillance to contemporary surveillance?

- The rise in technology?

(detailed explanation)

2. Thesis statement re: the surveillant assemblage

- ex. In this paper, I will argue that the surveillant assemblage poses unprecedented threats to our personal privacy using the example of...

Body

Paragraph 1: in this paragraph I will explain/describe the surveillant assemblage (detailed response)

-Include a topic sentence (what is this paragraph about?)

-Explain a few points of the surveillant assemblage, threat surveillant assemblage has on our personal privacy, data double and any relevant information

-Include whatever sources you will use from references below (ex. Ericson and Haggerty)

Paragraph 2: explain/describe your surveillance example (ex. Facial recognition technology) (detailed response)

-Include a topic sentence (what is this paragraph about?)

-Explain what you intend to discuss? What is the surveillance technology you chose? (ex. Facial recognition technology)

-Include whatever sources your will use from references below

Paragraph 3: In this paragraph I will explain/describe Examples of the risks posed by facial recognition technology in the surveillant assemblage and the Risks to Privacy and Civil Liberties (detailed response)

-Include a topic sentence (what is this paragraph about?)

-Explain what you intend to discuss?

-Include whatever sources your will use from references below

Paragraph 4: In this paragraph I will explain/describe The Politics of Resisting Facial Recognition Technology (detailed response)

-Include a topic sentence (what is this paragraph about?)

-Explain what you intend to discuss?

-Include whatever sources your will use from references below

Etc. etc.

References:

- Haggerty, K. D., & Ericson, R. V. (2017). The surveillant assemblage. Surveillance, Crime and Social Control, 605-622. https://doi.org/10.4324/9781315242002-5

- Manokha, I. (2018). Surveillance, panopticism, and self-discipline in the Digital age. Surveillance & Society, 16(2), 219-237. https://doi.org/10.24908/ss.v16i2.8346

- Guariglia, M. (2020, February 17). Facial Recognition Technology is the New Rogues' Gallery. New America. Retrieved February 15, 2023, from https://www.newamerica.org/weekly/facial-recognition-technology-is-the-new-rogues-gallery/

- McMULLAN, J. O. H. N. L. (1998). Social Surveillance and the rise of the `Police Machine'. Theoretical Criminology, 2(1), 93-117. https://doi.org/10.1177/1362480698002001005

- Loftus, B., & Goold, B. (2012). Covert surveillance and the invisibilities of policing. Criminology & Criminal Justice, 12(3), 275-288. https://doi.org/10.1177/1748895811432014

- Dauvergne, P. (2022). Identified, tracked, and profiled the politics of resisting facial recognition technology. Edward Elgar Publishing Ltd.

- Bowyer, K. W. (2004). Face recognition technology: Security versus privacy. IEEE Technology and Society Magazine, 23(1), 9-19. https://doi.org/10.1109/mtas.2004.1273467

- Pang, L. (2022, January 25).Research on the privacy security of face recognition technology. Computational intelligence and neuroscience. Retrieved February 16, 2023, from https://pubmed.ncbi.nlm.nih.gov/35126498/

Step by Step Solution

There are 3 Steps involved in it

Step: 1

Answer In an era characterized by rapid technological advancements the issue of privacy invasion has become increasingly pertinent The evolution of surveillance practices from premodern methods to con... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Economics

Authors: Gregory Mankiw, Mark P. Taylor

5th Edition

1473768543, 978-1473768543

More Books

Students also viewed these Law questions

Question

2. Prevent fights by avoiding crowded work spaces.

Answered: 1 week ago

Question

What is the constrained optimization problem facing firms?

Answered: 1 week ago

Question

What is the inputtransformation output process? Plo8

Answered: 1 week ago