Ethical Aspects - La sécurité Flashcards
What is the main argument of Hobbes’ Leviathan?
The state, created through a social contract, exists to prevent the chaos of the ‘state of nature’ by holding a monopoly on legitimate violence.
Fill in the blank: In Tocqueville’s view, increasing equality can lead to a passive state control known as ‘____ despotism.’
soft
How does Tocqueville’s ‘soft despotism’ affect society?
It leads individuals to surrender freedoms for security, reducing political engagement and making society vulnerable to state control.
Define totalitarianism according to Roland Quilliot.
A political system where the state controls all aspects of life, including private matters, eliminating individual freedoms.
What is ‘dataveillance’?
Surveillance that relies on collecting and analyzing data from individuals to monitor their behavior.
Fill in the blank: Bentham’s ____ model allows for central observation where individuals alter behavior as if constantly watched.
Panopticon
What is ‘ethics by design’?
A proactive approach in technology development, considering ethical implications during design to prevent misuse or harm.
Explain ‘algorithmic governance’ according to Rouvroy.
A system where decision-making relies on algorithmic data analysis, risking transparency and ethical accountability.
Fill in the blank: Hobbes believed that without a sovereign state, society would fall into a violent ‘state of ____.’
nature
What is ‘sousveillance’?
Mutual surveillance where individuals observe each other, often as a reaction to state or institutional monitoring.
What are the primary motivations for surveillance, according to the document?
Establishing behavioral expectations, data comparison, and influencing observed behavior.
Describe the ethical concern with dual-use technology.
Technologies can serve both beneficial and harmful purposes, requiring ethical foresight to prevent misuse.
What does Tocqueville identify as a risk in democratic societies?
That people may prioritize personal interests over public life, allowing the state to centralize power unopposed.
What is ‘ethics in computing’ as defined by the Computer Ethics Institute’s 10 Commandments?
Guidelines promoting responsible computer use, including respect for privacy, intellectual property, and non-harm.
Fill in the blank: The ____ metaphor in surveillance studies symbolizes how perceived monitoring leads to self-regulation.
Panopticon