IS Undergrads Class 8
-
Upload
joao-cunha -
Category
Business
-
view
664 -
download
1
description
Transcript of IS Undergrads Class 8
The labors of surveillance
The ISS Triangle, reallyBiz strategy
IS strategyOrg’l strategy
Biz strategy
IS strategyOrg’l strategy
Biz strategy
Org’l strategy IS strategy
analysis Implementation
IS strategy --> Biz strategy
Biz strategy
Org’l strategy IS strategy
Implementation
simplemeasurements
Surfacing secrets
Outliars
Systems thinking
?
IT and leadership: Metaphor.
The two axes of panopticism
Visible Unverifiable
The panoptic process
• Unverifiable control places the locus of control within the subject
! mind, not guard
• In a perfect panopticon, people are unaware of their domination
! they ascribe their behavior to motivation
People control and police themselves
The bases of panopticism
People behave according to theory X
A corporation’s tools belong to it, not to employees
Surveillance is included into the employment contract
Examples of surveillance technologies
Packet sniffers
Log files
Desktop monitoring programs
Phone recording
Closed-circuit cameras
Uses of surveillance technologies
78% of all companies use surveillance IT
Reviewing computer files: 1 in 3
Video recording: 1 in 8
Reviewing calls: 1 in 9
Reviewing voice mail: 1 in 11
What is identity?
Consistent story
That we tell ourselves and others
About what happened to us and about what he did in the past
Why do we need identity?
Our brain works with models and needs ontological security
Measurement and face
Ooooops!
Identity and face
Face is the sign (+/-) of our ID
Human beings need a positive ID
We all work very hard at it
We breed to remain physically alive, we do facework to remain socially
alive
Measuring work
Vertical Surveillance Peer
surveillance
The problems of panopticsm
Theory X is self-fulfilling
Compliance, not commitment
Conclusion