Question
As we have seen in this course, virtually every generation has felt that the existing threat to its privacy was unprecedented in nature. That said,
As we have seen in this course, virtually every generation has felt that the existing threat to its privacy was unprecedented in nature. That said, the sheer capacity to collect metadata which exists today is without comparison. Ericson and Haggerty refer to it as a 'surveillant assemblage.' According to the authors: "This assemblage operates by abstracting human bodies from their territorial settings and separating them into a series of discrete flows. These flows are then reassembled into distinct 'data doubles' which can be scrutinized and targeted for intervention. In the process, we are witnessing a rhizomatic leveling of the hierarchy of surveillance, such that groups which were previously exempt from routine surveillance are now increasingly being monitored."
Explain what the authors mean by a 'surveillant assemblage' and which articulates your position on the issue. To accomplish this, you are to use the example of 'facial recognition technology' to support your argument. Overall, your paper should capture the core idea behind the surveillant assemblage, and also whether the risks we face to our privacy are truly unprecedented in nature.
A roadmap of your paper, which should include:
Introduction
1. Background/Context to introduce your topic i.e. surveillant assemblage (detailed explanation)
- The hook - how you are going to open your paper
- How will you introduce the topic?
- Talk about and explain the evolution of pre-modern surveillance to contemporary surveillance?
- The rise in technology?
(detailed explanation)
2. Thesis statement re: the surveillant assemblage
- ex. In this paper, I will argue that the surveillant assemblage poses unprecedented threats to our personal privacy using the example of...
Body
Paragraph 1: in this paragraph I will explain/describe the surveillant assemblage (detailed response)
-Include a topic sentence (what is this paragraph about?)
-Explain a few points of the surveillant assemblage, threat surveillant assemblage has on our personal privacy, data double and any relevant information
-Include whatever sources you will use from references below (ex. Ericson and Haggerty)
Paragraph 2: explain/describe your surveillance example (ex. Facial recognition technology) (detailed response)
-Include a topic sentence (what is this paragraph about?)
-Explain what you intend to discuss? What is the surveillance technology you chose? (ex. Facial recognition technology)
-Include whatever sources your will use from references below
Paragraph 3: In this paragraph I will explain/describe Examples of the risks posed by facial recognition technology in the surveillant assemblage and the Risks to Privacy and Civil Liberties (detailed response)
-Include a topic sentence (what is this paragraph about?)
-Explain what you intend to discuss?
-Include whatever sources your will use from references below
Paragraph 4: In this paragraph I will explain/describe The Politics of Resisting Facial Recognition Technology (detailed response)
-Include a topic sentence (what is this paragraph about?)
-Explain what you intend to discuss?
-Include whatever sources your will use from references below
Etc. etc.
References:
- Haggerty, K. D., & Ericson, R. V. (2017). The surveillant assemblage. Surveillance, Crime and Social Control, 605-622. https://doi.org/10.4324/9781315242002-5
- Manokha, I. (2018). Surveillance, panopticism, and self-discipline in the Digital age. Surveillance & Society, 16(2), 219-237. https://doi.org/10.24908/ss.v16i2.8346
- Guariglia, M. (2020, February 17). Facial Recognition Technology is the New Rogues' Gallery. New America. Retrieved February 15, 2023, from https://www.newamerica.org/weekly/facial-recognition-technology-is-the-new-rogues-gallery/
- McMULLAN, J. O. H. N. L. (1998). Social Surveillance and the rise of the `Police Machine'. Theoretical Criminology, 2(1), 93-117. https://doi.org/10.1177/1362480698002001005
- Loftus, B., & Goold, B. (2012). Covert surveillance and the invisibilities of policing. Criminology & Criminal Justice, 12(3), 275-288. https://doi.org/10.1177/1748895811432014
- Dauvergne, P. (2022). Identified, tracked, and profiled the politics of resisting facial recognition technology. Edward Elgar Publishing Ltd.
- Bowyer, K. W. (2004). Face recognition technology: Security versus privacy. IEEE Technology and Society Magazine, 23(1), 9-19. https://doi.org/10.1109/mtas.2004.1273467
- Pang, L. (2022, January 25).Research on the privacy security of face recognition technology. Computational intelligence and neuroscience. Retrieved February 16, 2023, from https://pubmed.ncbi.nlm.nih.gov/35126498/
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Answer In an era characterized by rapid technological advancements the issue of privacy invasion has become increasingly pertinent The evolution of surveillance practices from premodern methods to con...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started