The Surveillance Society Ch.11 Test Bank Docx - Test Bank | Tech & Society 3e Quan-Haase by Anabel Quan Haase. DOCX document preview.
Chapter 11
The Surveillance Society
Multiple Choice Questions
- Who developed the concept of the Panopticon?
- Marshall McLuhan
- Michel Foucault
- Jeremy Bentham
- Anthony Giddens
- What was the name of the supranational intelligence gathering organization consisting of an intelligence alliance between Australia, Canada, New Zealand, the United Kingdom, and the United Stats, that operated outside of national regulatory frameworks?
- SIGINT
- Security Five
- Five Eyes
- Five Alliances
- Who leaked highly confidential information on the surveillance practices of the United States government to the media, embarrassing the CIA?
- Snowden
- Glover
- Simpson
- Zureik
- Lyon and Zureik (1996) outlined three main perspectives that influence our understanding of surveillance. What are they?
- Capitalism, irrationality, and discipline
- Panopticon, rationalization, and networked capabilities
- Fear of terrorism, irrationality, and power
- Capitalism, rationalization, and power
- Which of the following is the best example of analysis of surveillance based on political economic theory?
- Political practices are the primary motivators for surveillance practices.
- Political and economic factors are the primary motivators for surveillance practices.
- Economic factors are the primary motivators for surveillance practices.
- Socio-political factors are the primary motivators for surveillance practices.
- Who originally developed the concepts of rationalization and bureaucratization?
- Weber
- Marx
- Durkheim
- Giddens
- Which of the following statements is true with regards to the study of technology and the new surveillance?
- The cultural approach argues that societies require some element of security and safety in order to operate effectively.
- The revolutionary approach argues that technological developments have transformed the nature of surveillance and threatened basic privacy rights.
- The functional approach argues that social and cultural factors moderate how information technology impacts surveillance.
- The continuous approach argues that the transformations in surveillance are only of degree, not of kind.
- ___________ range from single individuals to loosely linked networks of people who gather around a target or idea to tightly organized groups.
- Hacktivist groups
- WikiLeaks
- The NSA
- Institutional privacy
- In the study by Quan-Haase and Elueze, what privacy protection strategy did older adults in East York, Toronto who had limited knowledge of social media report employing to actively counter potential privacy threats?
- Adding only close friends to social media
- Using pseudonyms
- Using privacy settings
- Using only secure social media sites
- What is the term for the idea that control over people can be achieved simply through surveillance?
- Hierarchical observation
- Examination
- Internalization
- The spotlight effect
- When someone chooses not to shoplift because they are unsure whether there is a camera watching them, it is an example of which process of control?
- Internalized discipline
- Automatization of power
- Discovery threat
- Normative behaviour
- Which of the following is NOT an example of the new surveillance?
- Keystroke monitoring by employers
- Hidden cameras in banks or stores
- Logging onto Facebook
- Wiretapping
- The case that showed how legal frameworks can make data practices more visible was:
- Austria vs. Amazon
- Europe vs. Facebook
- Canada vs. Netflix
- Australia vs. Spotify
- What did a 2004 study of privacy perceptions by Viseu, Clement, and Aspinall find?
- For most Internet users, online privacy is always a concern, as they think privacy violation affects them directly.
- For most Internet users, online privacy is always a concern, as they think privacy violation could happen soon.
- For most Internet users, online privacy is not a concern, as they do not think privacy violation will affect them directly.
- For most Internet users, online privacy is not a concern, as they think privacy violations are prevented by the government.
- What important distinction does literature on digital surveillance make?
- Between past and present privacy threats
- Between immediate and future privacy threats
- Between localized and global privacy threats
- Between reoccurring and episodic privacy threats
- Safe harbour was ended by the European Court of Justice? What practice describes safe harbour best?
- A practice where data from European citizens was collected and analyzed for the purpose of surveillance
- A practice where data from European citizens was transferred to North America
- A practice where data from European citizens was sold by Facebook to third parties
- A practice where data from European citizens was used for targeted advertisement
- What is the name of the decentralized hacktivist group that does not follow directives but instead operates on ideas?
- Anonymous
- WikiLeaks
- Makerspace
- CopWatch
- What do Singer and Friedman describe as possibly ranging from single individuals, to loosely linked networks of people who gather around a target or idea, to tightly organized groups?
- Activist groups
- Innovation groups
- Hacktivist groups
- Hacker groups
- There is an increasing trend of surveillance of everyone and by everyone on social media. What does Tufekci call this phenomenon?
- Close circle surveillance
- Peer monitoring
- Circular surveillance
- Social circle monitoring
- What is the term for a form of counter-surveillance that empowers those subjected to institutional, state, and corporate surveillance practices?
- Reverse surveillance
- Surveillance of the weak
- Surveillance tactics
- Sousveillance
True or False Questions
- The term surveillance originates in the French language and means “fly over.”
- The National Security Agency (NSA) considers Edward Snowden to be a security threat for leaking top secret information to the media.
- Foucault introduced the notion of the iron cage that has two sides: one positive and one negative.
- Safe harbour is a practice where data from European citizens was transferred to North America.
- Gary T. Marx identifies three distinct views to describe the changes in surveillance practice that result from the information revolution: functional, revolutionary, and cultural.
- From a revolutionary perspective on surveillance, it could be argued that Facebook users voluntarily grant third-party access to their personal information by not changing or fully understanding their privacy settings.
- An open cubicle is an example of embedding monitoring practices into the workplace.
- “The right to be erased” is a law that allows citizens to request personal information to be removed from a search engine’s result page.
- Institutional privacy is the threat of one’s information being mined and used by governments or corporations.
Short Answer Questions
- What are the three main perspectives that Lyon and Zureik (1996) identified that influence our current understanding of surveillance?
- What is the Panopticon? How does it relate to the study of surveillance in a digital age?
- What privacy protection strategies did older adults living in East York, Toronto utilize to protect against privacy threats as outlined in the study by Quan-Haase and Elueze (2018)?
- What is meant by the term inquiry-in-performance in surveillance studies?
- What are some ways parents make use of technology in their parenting strategies that are discussed in the chapter?
Long Answer Questions
- Gary T. Marx discusses the cultural view of surveillance. To what extent is this approach an appropriate way of understanding how surveillance occurs in social networking sites such as Facebook. Define the cultural view of surveillance first and then show its applicability to social networking sites.
- Edward Snowden, a former contractor for the NSA, leaked many classified files to the media, exposing massive surveillance practices by the United States government. Do average citizens have a right to know about all of the government’s surveillance practices? Why or why not?
Document Information
Connected Book
Explore recommendations drawn directly from what you're reading
Quick Navigation
Benefits
Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party