SlideShare une entreprise Scribd logo
1  sur  17
Wendy Hui Kyong Chun ‘ Control and Freedom’   Power and the paranoia in the age of fiber optics '
  Control Society  F lexibility C odes M odulations Potential health risks Prisoners with more  freedom of movement, more precise tracking   Discipline Society C onfinement Mass individuation M olds P atients Four-walled prison VS
  Control Society User Freedom   Discipline Society Subject Liberty VS
    ,[object Object],[object Object],[object Object]
Key ideas: Control-freedom as techno-determinist critique a. theory-come-true moments
Key ideas:  Control freedom as techno-determinist critique b. technology as solution  to political problems
Key Ideas: Software Myth  ‘Software cannot be physically separated from hardware, only ideologically’ (Chun, 2006: 19)
Key ideas: Software Myth  Kindle example (tethered devices)
Key Ideas: Sexuality Power relations in this control-freedom coupling in the context of fiber-optic networks, for Chun, are often experienced through sexuality. 
Total freedom    Paranoid view of online surveillance
 
National Security Agency (NSA) and  Data-mining Give feeling of freedom    Controling your freedom
Facebook   Do you have a Facebook?
 
Net Neutrality There are always processes of control even when the underlying hardware provides freedom and openness.
[object Object],[object Object],[object Object],[object Object]
DISCUSSION What now?  How can we come up with a useful ratio between power and freedom? Software as ideology  Can we swallow that software doesn't exist?  (a materialist reduction similar to neurobiologists (Heinz von Foerster) and roboticists (Rodney Brooks and Lynn Stein). Freedom-control dynamic debate  -Galloway: the founding principle of the net is control - protocological control – freedom resides in possibility of resistance (counter-protocol) -Chun: openness in these protocols can point towards a certain freedom.  

Contenu connexe

En vedette

New Media Communication: Using Word of Mouth Marketing Online
New Media Communication: Using Word of Mouth Marketing OnlineNew Media Communication: Using Word of Mouth Marketing Online
New Media Communication: Using Word of Mouth Marketing OnlineJohn Paul Richards
 
Blank 9.23
Blank 9.23Blank 9.23
Blank 9.23kmckim
 
Technical Convergence
Technical ConvergenceTechnical Convergence
Technical Convergencestevenpwells
 
Kiosk Marketplace
Kiosk MarketplaceKiosk Marketplace
Kiosk Marketplacecburckardt
 
Reviewing Local Investment Plans - What are the LIP drivers in the new landsc...
Reviewing Local Investment Plans - What are the LIP drivers in the new landsc...Reviewing Local Investment Plans - What are the LIP drivers in the new landsc...
Reviewing Local Investment Plans - What are the LIP drivers in the new landsc...South West Observatory
 
Python Para Administradores Linux
Python Para Administradores LinuxPython Para Administradores Linux
Python Para Administradores Linuxguest1eea6537
 
Sofie Ruggieri - The Devon Approach to LEAs
Sofie Ruggieri - The Devon Approach to LEAsSofie Ruggieri - The Devon Approach to LEAs
Sofie Ruggieri - The Devon Approach to LEAsSouth West Observatory
 
2009 UNESCO Sport & Human Rights
2009 UNESCO Sport & Human Rights2009 UNESCO Sport & Human Rights
2009 UNESCO Sport & Human RightsSport in Society
 
Effective Computing In Today’s World
Effective Computing In Today’s WorldEffective Computing In Today’s World
Effective Computing In Today’s WorldTechnecessities
 
Where The Hell Is Matt
Where The Hell Is MattWhere The Hell Is Matt
Where The Hell Is Mattlaurenlaura
 

En vedette (17)

New Media Communication: Using Word of Mouth Marketing Online
New Media Communication: Using Word of Mouth Marketing OnlineNew Media Communication: Using Word of Mouth Marketing Online
New Media Communication: Using Word of Mouth Marketing Online
 
Blank 9.23
Blank 9.23Blank 9.23
Blank 9.23
 
Technical Convergence
Technical ConvergenceTechnical Convergence
Technical Convergence
 
Kiosk Marketplace
Kiosk MarketplaceKiosk Marketplace
Kiosk Marketplace
 
Reviewing Local Investment Plans - What are the LIP drivers in the new landsc...
Reviewing Local Investment Plans - What are the LIP drivers in the new landsc...Reviewing Local Investment Plans - What are the LIP drivers in the new landsc...
Reviewing Local Investment Plans - What are the LIP drivers in the new landsc...
 
Python Para Administradores Linux
Python Para Administradores LinuxPython Para Administradores Linux
Python Para Administradores Linux
 
Sofie Ruggieri - The Devon Approach to LEAs
Sofie Ruggieri - The Devon Approach to LEAsSofie Ruggieri - The Devon Approach to LEAs
Sofie Ruggieri - The Devon Approach to LEAs
 
Ch 4 Federalism
Ch 4 FederalismCh 4 Federalism
Ch 4 Federalism
 
2009 UNESCO Sport & Human Rights
2009 UNESCO Sport & Human Rights2009 UNESCO Sport & Human Rights
2009 UNESCO Sport & Human Rights
 
Ancient egypt year 5 class 6 - roman
Ancient egypt year 5   class 6 - romanAncient egypt year 5   class 6 - roman
Ancient egypt year 5 class 6 - roman
 
Social Web 2
Social Web 2Social Web 2
Social Web 2
 
Effective Computing In Today’s World
Effective Computing In Today’s WorldEffective Computing In Today’s World
Effective Computing In Today’s World
 
Tools
ToolsTools
Tools
 
Ch 3 Sec 1
Ch 3 Sec 1Ch 3 Sec 1
Ch 3 Sec 1
 
1.5 Formal Writing
1.5 Formal Writing1.5 Formal Writing
1.5 Formal Writing
 
Where The Hell Is Matt
Where The Hell Is MattWhere The Hell Is Matt
Where The Hell Is Matt
 
A 2 The Key Atomic Bomb Events of the Cold War, class 2, Fall 2011 and Spring...
A 2 The Key Atomic Bomb Events of the Cold War, class 2, Fall 2011 and Spring...A 2 The Key Atomic Bomb Events of the Cold War, class 2, Fall 2011 and Spring...
A 2 The Key Atomic Bomb Events of the Cold War, class 2, Fall 2011 and Spring...
 

Similaire à Presentation Chun Tim Niels Morgan Kimberley

Censorship Regimes On The Chinese Internet
Censorship Regimes On The  Chinese InternetCensorship Regimes On The  Chinese Internet
Censorship Regimes On The Chinese InternetAnders Pedersen
 
Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories PresentationLeslie
 
Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories PresentationLeslie
 
Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories PresentationLeslie
 
Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories PresentationLeslie
 
Networking Updated 4.12.10
Networking Updated 4.12.10Networking Updated 4.12.10
Networking Updated 4.12.10Leslie
 
Networking Theories
Networking TheoriesNetworking Theories
Networking TheoriesLeslie
 
Understanding P2P
Understanding P2PUnderstanding P2P
Understanding P2Purbanlabs
 
The Politics of Peer Production
The Politics of Peer ProductionThe Politics of Peer Production
The Politics of Peer Productionmbauwens
 
Post 1Noah Feldman argues that both politics and religions are k.docx
Post 1Noah Feldman argues that both politics and religions are k.docxPost 1Noah Feldman argues that both politics and religions are k.docx
Post 1Noah Feldman argues that both politics and religions are k.docxharrisonhoward80223
 
Kimethics in a world of robots 2013
Kimethics in a world of robots 2013Kimethics in a world of robots 2013
Kimethics in a world of robots 2013AlexandruBuruc
 
Philosophy of Technology
Philosophy of TechnologyPhilosophy of Technology
Philosophy of TechnologyMelanie Swan
 
Lightning Talks @ Hacker Dojo | Subhajeet Mukherjee
Lightning Talks @ Hacker Dojo | Subhajeet MukherjeeLightning Talks @ Hacker Dojo | Subhajeet Mukherjee
Lightning Talks @ Hacker Dojo | Subhajeet MukherjeeSubhajeet Mukherjee
 
Failure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human RightsFailure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human RightsMathias Klang
 
Privacy with Internet
Privacy with InternetPrivacy with Internet
Privacy with InternetMathias Klang
 
J.M. Díaz Nafría: An informational systems approach to security
J.M. Díaz Nafría: An informational systems approach to securityJ.M. Díaz Nafría: An informational systems approach to security
J.M. Díaz Nafría: An informational systems approach to securityJosé Nafría
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottiercitasa
 

Similaire à Presentation Chun Tim Niels Morgan Kimberley (20)

Censorship Regimes On The Chinese Internet
Censorship Regimes On The  Chinese InternetCensorship Regimes On The  Chinese Internet
Censorship Regimes On The Chinese Internet
 
Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories Presentation
 
Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories Presentation
 
Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories Presentation
 
Networking Theories Presentation
Networking Theories PresentationNetworking Theories Presentation
Networking Theories Presentation
 
Networking Updated 4.12.10
Networking Updated 4.12.10Networking Updated 4.12.10
Networking Updated 4.12.10
 
Networking Theories
Networking TheoriesNetworking Theories
Networking Theories
 
Understanding P2P
Understanding P2PUnderstanding P2P
Understanding P2P
 
The Politics of Peer Production
The Politics of Peer ProductionThe Politics of Peer Production
The Politics of Peer Production
 
Post 1Noah Feldman argues that both politics and religions are k.docx
Post 1Noah Feldman argues that both politics and religions are k.docxPost 1Noah Feldman argues that both politics and religions are k.docx
Post 1Noah Feldman argues that both politics and religions are k.docx
 
Kimethics in a world of robots 2013
Kimethics in a world of robots 2013Kimethics in a world of robots 2013
Kimethics in a world of robots 2013
 
Polinter02
Polinter02Polinter02
Polinter02
 
2010 opensciencepeterson
2010 opensciencepeterson2010 opensciencepeterson
2010 opensciencepeterson
 
Philosophy of Technology
Philosophy of TechnologyPhilosophy of Technology
Philosophy of Technology
 
Lightning Talks @ Hacker Dojo | Subhajeet Mukherjee
Lightning Talks @ Hacker Dojo | Subhajeet MukherjeeLightning Talks @ Hacker Dojo | Subhajeet Mukherjee
Lightning Talks @ Hacker Dojo | Subhajeet Mukherjee
 
Failure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human RightsFailure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human Rights
 
Privacy with Internet
Privacy with InternetPrivacy with Internet
Privacy with Internet
 
essay.CLS
essay.CLSessay.CLS
essay.CLS
 
J.M. Díaz Nafría: An informational systems approach to security
J.M. Díaz Nafría: An informational systems approach to securityJ.M. Díaz Nafría: An informational systems approach to security
J.M. Díaz Nafría: An informational systems approach to security
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottier
 

Dernier

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

Dernier (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

Presentation Chun Tim Niels Morgan Kimberley

  • 1. Wendy Hui Kyong Chun ‘ Control and Freedom’ Power and the paranoia in the age of fiber optics '
  • 2.   Control Society F lexibility C odes M odulations Potential health risks Prisoners with more freedom of movement, more precise tracking   Discipline Society C onfinement Mass individuation M olds P atients Four-walled prison VS
  • 3.   Control Society User Freedom   Discipline Society Subject Liberty VS
  • 4.
  • 5. Key ideas: Control-freedom as techno-determinist critique a. theory-come-true moments
  • 6. Key ideas: Control freedom as techno-determinist critique b. technology as solution to political problems
  • 7. Key Ideas: Software Myth ‘Software cannot be physically separated from hardware, only ideologically’ (Chun, 2006: 19)
  • 8. Key ideas: Software Myth Kindle example (tethered devices)
  • 9. Key Ideas: Sexuality Power relations in this control-freedom coupling in the context of fiber-optic networks, for Chun, are often experienced through sexuality. 
  • 10. Total freedom  Paranoid view of online surveillance
  • 11.  
  • 12. National Security Agency (NSA) and Data-mining Give feeling of freedom  Controling your freedom
  • 13. Facebook Do you have a Facebook?
  • 14.  
  • 15. Net Neutrality There are always processes of control even when the underlying hardware provides freedom and openness.
  • 16.
  • 17. DISCUSSION What now? How can we come up with a useful ratio between power and freedom? Software as ideology Can we swallow that software doesn't exist? (a materialist reduction similar to neurobiologists (Heinz von Foerster) and roboticists (Rodney Brooks and Lynn Stein). Freedom-control dynamic debate -Galloway: the founding principle of the net is control - protocological control – freedom resides in possibility of resistance (counter-protocol) -Chun: openness in these protocols can point towards a certain freedom.