:::

詳目顯示

回上一頁
題名:資訊科技與監視宇宙
書刊名:東吳社會學報
作者:王佳煌 引用關係
作者(外文):Wang, Chia-huang
出版日期:2001
卷期:10
頁次:頁1-35
主題關鍵詞:資訊科技監視老大哥圓形監獄網際網路Information technologySurveillanceThe Big BrotherPanopticonInternet
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(3) 博士論文(1) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:3
  • 共同引用共同引用:5
  • 點閱點閱:121
     監視是社會控制的一環。在現代國家與資本主義生產方式當中,監視 更是不可或缺的控制手段之一。然而,現代的監視與中古時代以前的監視不同, 因為它是全面的、有系統的監視,而非片面的、純為政治方面的監視。這種系統 性的全面監視不是資訊科技造成的,得力於資訊科技之處卻甚多,寖假而形成鋪 天蓋地、無所遁逃的監視宇宙。 本文首先澄清有關科技與監視的概念式隱喻,如歐威爾的「老大哥」與、邊沁、 傅柯的「圓形監獄」,繼而論述此一監視宇宙的四個象限,分別是現代國家的監 視、資本主義的生產監視、資本的消費監視,以及混沌監視。現代國家的監視係 為其統治便利,以個人識別碼標誌其國民。生產監視是指資本家與經理階層對勞 工的監視,消費監視則是指資本家為促銷其產品,實現剩餘價值,設法掌握消費 者,吸引其購物。最後是混沌監視,主要是指網際網路上無法確定監視者,以及 無法完全消除上網蹤跡的現象。
     Surveillance is a part of social control. It is also an indispensable means for control in the modern state and capitalist mode of production. However, the modern surveillance differs from the old one before the Middle Age in that it is total and systematic, rather than partial or based on partisan reasons. Information technology does not result in the systematic and total surveillance, but it has made great contribution to the existence of the surveillance universe, which is impossible to escape. The paper clarifies some misconceptions about the relationships between modern technology and surveillance, such as the misunderstanding about George Orwell's "the Big Brother" and Michel Foucault's "panopticon." Then, the paper discusses the four quadrants of the surveillance universe. First, the modern state's surveillance is based on personal identification number, through which the state governs its citizens. Second, the production surveillance results from the need of the capitalists and management to monitor and control their workers. Third, consumer surveillance comes into existence because the capitalists need to realize more surplus value of their commodities to gain profit on the market, which is always characterized by fierce competition. Fourth, the chaotic surveillance appears because of the internet and other types of information technology, which makes it difficult for one to identify the exact subjects who monitor her and clean one's personal information flowing on the net and stored in databases. The conclusion is that no one could escape from the surveillance universe. It is extremely difficult to prevent identity theft and other social troubles pertaining to information technology from happening, and it is not easy to solve at one stroke.
期刊論文
1.熊愛卿(1998)。IC卡的神話與夢魘-從法的觀點審視國民卡計畫的重要爭議。月旦法學,43,52-64。new window  延伸查詢new window
2.行政院研究發展考核委員會(1998)。國民卡專案相關應用之法源基礎與法律爭議說明。月旦法學,43,28-38。new window  延伸查詢new window
3.劉靜怡(19981200)。資訊社會的政府、個人與電子商務--從國民卡計畫的省思出發。月旦法學,43,39-51。new window  延伸查詢new window
4.Lester, Toby(2001)。The Reinvention of Privacy。The Atlantic Monthly \url\http://www.theatlantic.com/issues/2001/03/lester.htm。  new window
5.Luegenbiehl, Heinz C.(1984)。1984 and the Power of Technology。Social Theory and Practice,10(3),289-300。  new window
6.Lyon, David(1994)。An Electronic Panopticon? -A Sociological Critique of Surveillance Theory。The Sociological Review,41(4),653-678。  new window
7.Lyon, David(1998)。The World Wide Web of Surveillance--The Internet and Off-World Power-Flows。Information, Communication & Society,1(1),91-105。  new window
8.Webster, Frank、Robins, Kevin(1989)。Plan and Control—Towards a Cultural History of the Information Society。Theory and Society,18(3),323-51。  new window
9.何全德(1998)。國民卡安全嗎?(上、下)。資訊與電腦,221 ; 222,32-5 ; 32-4。  延伸查詢new window
10.何建明、王大為、黃世昆、莊庭瑞、劉靜怡(1998)。不信良知喚不回:我們針對國民卡計畫提出的共同呼籲。中央研究院計算中心通訊,14(18)。  延伸查詢new window
11.侯如珊(2000)。即時追蹤,即時互動。天下E特刊,4,28-32。  延伸查詢new window
12.張素游(2000)。網路宣告「精確廣告」時代。天下雜誌,228,90-4。  延伸查詢new window
13.蔡宗珍(1998)。國民卡計畫案的合憲性與合法性爭議之探討。律師雜誌,230,21-8。  延伸查詢new window
14.藍麗娟(2000)。從顧客資料庫採礦淘金,即時互動。天下E特刊,4,33-5。  延伸查詢new window
15.Clarke, Roger(1994)。The Digital Persona and Its Application to Data Surveillance。The Information Society,10,77-92。  new window
圖書
1.Burnham, D.(1983)。The Rise of the Computer State。London, UK:Weidenfeld & Nicolson。  new window
2.Marx, Karl(1990)。Capital: A Critique of Political Economy。Penguin Books。  new window
3.Shapiro, Andrew L.(1999)。The Control Revolution—How the Internet is Putting Individuals in Charge and Changing the World We Know。New York, NY:A Century Foundation Book。  new window
4.Giddens, Anthony(1985)。The Nation-State and Violence。Polity Press。  new window
5.Will, Ian(1983)。The Big Brother Society。Harrap。  new window
6.Castells, Manuel(1997)。The Power of Identity。Blackwell。  new window
7.Wallerstein, Immanuel(1974)。The Modern World-System I: Capitalist Agriculture and the Origins of the European World-Economy in the Sixteenth Century。New York:Academic Press。  new window
8.Marx, Karl、Engels, F.(1989)。Collected Works。New York:International Publishers。  new window
9.Zuboff, Shoshana(1988)。In the Age of the Smart Machine: The Future of Work and Power。New York, NY:Basic Books。  new window
10.Vattimo, Gianni、Webb, David(1992)。The Transparent Society。London:Cambridge, England:Polity Press。  new window
11.Foucault, Michel、Rabinow, Paul(1984)。The Foucault Reader。New York:Pantheon Books。  new window
12.Lyon, David(1993)。The Electronic Eye—The Rise of Surveillance Society。Oxford。  new window
13.Poster, Mark(1989)。Critical Theory and Poststructuralism—In Search of a Context。Ithach ; London。  new window
14.Regan, Priscilla M.(1996)。Genetic Testing and Workplace Surveillance: Implications for Privacy。Computers, Surveillance, and Privacy \\ Lyon, David ; Zureik, Elia (eds.)。Minneapolis ; London。  new window
15.Rule, James B.(1996)。High-Tech Workplace Surveillance: Whafs Really New?”。Computers, Surveillance, and Privacy \\ Lyon, David ; Zureik, Elia (eds.)。Minneapolis ; London。  new window
16.Weber, Max、Runciman, W. G.(1978)。Selections in Translation。New York。  new window
17.Weber, Max(1978)。Economy and Society。Berkeley ; Los Angeles ; London。  new window
18.Bennett, Colin J.(1996)。The Public Surveillance of Personal Data: A Cross-National Analysis。Computers, Surveillance, and Privacy \\ Lyon, David ; Zureik, Elia (eds.)。Minneapolis ; London。  new window
19.Bentham, Jeremy、Bozovic, Miran(1995)。The Panopticon Writings。London ; New York。  new window
其他
1.Federal Trade Commission(2000)。Privacy Online: Fair Information Practices in the Electronic Marketplace。  new window
2.Guernsey, Lisa(1999)。The Web: New Ticket to a Pink Slip ; On the Job, the Boss Can Watch Your Every Online Move。  new window
3.Kelly, Tina(1999)。An Expert in Computer Security Finds His Life Is a Wide-Open Book。  new window
4.Parker, Pamela(2000)。Psst! Banner Ads Work。  new window
5.Rosenbaum, David E.(2000)。Seeking Answers, Census is Stirring Privacy Questions。  new window
6.Tillett, Scott(2000)。Software Tracks Web-Buying Trends。  new window
7.李宏麟(1999)。Email廣告點閱率(dickthnmgh)是15%,遠遠超過網頁橫條廣告(bannerad)點閱率的1%,email行銷市場將會越來越大。  延伸查詢new window
8.法新社(2000)。員工上網,公司監控。  延伸查詢new window
9.American Management Association AMA(2000)。Workplace Monitoring and Surveillance。  new window
10.Dern, Michael(1997)。Footprints and Fingerprints in Cyberspace: The Trail You Leave Behind。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top