IS Undergrads Class 8

Post on 11-Nov-2014

664 views 1 download

description

 

Transcript of IS Undergrads Class 8

The labors of surveillance

The ISS Triangle, reallyBiz strategy

IS strategyOrg’l strategy

Biz strategy

IS strategyOrg’l strategy

Biz strategy

Org’l strategy IS strategy

analysis Implementation

IS strategy --> Biz strategy

Biz strategy

Org’l strategy IS strategy

Implementation

simplemeasurements

Surfacing secrets

Outliars

Systems thinking

?

IT and leadership: Metaphor.

The two axes of panopticism

Visible Unverifiable

The panoptic process

• Unverifiable control places the locus of control within the subject

! mind, not guard

• In a perfect panopticon, people are unaware of their domination

! they ascribe their behavior to motivation

People control and police themselves

The bases of panopticism

People behave according to theory X

A corporation’s tools belong to it, not to employees

Surveillance is included into the employment contract

Examples of surveillance technologies

Packet sniffers

Log files

Desktop monitoring programs

Phone recording

Closed-circuit cameras

Uses of surveillance technologies

78% of all companies use surveillance IT

Reviewing computer files: 1 in 3

Video recording: 1 in 8

Reviewing calls: 1 in 9

Reviewing voice mail: 1 in 11

What is identity?

Consistent story

That we tell ourselves and others

About what happened to us and about what he did in the past

Why do we need identity?

Our brain works with models and needs ontological security

Measurement and face

Ooooops!

Identity and face

Face is the sign (+/-) of our ID

Human beings need a positive ID

We all work very hard at it

We breed to remain physically alive, we do facework to remain socially

alive

Measuring work

Vertical Surveillance Peer

surveillance

The problems of panopticsm

Theory X is self-fulfilling

Compliance, not commitment

Conclusion