skip to main content
10.1145/3472714.3473617acmconferencesArticle/Chapter ViewAbstractPublication PagesdocConference Proceedingsconference-collections
research-article

“Dataveillance” in the Classroom: Advocating for Transparency and Accountability in College Classrooms 

Published:12 October 2021Publication History

ABSTRACT

Surveillance studies have begun to shift from emphasizing privacy and security and towards ethical aspects of “privilege, access, and risk” [1]. The college classroom is one site where power, technology, and bodies intersect. In the classroom, surveillance is normalized through student/instructor engagement of technological interfaces such as Learning Management Systems (LMS). Drawing from a survey of college instructors across the United States, this study uses the metaphor of the Panopticon [1, 2, 3, 4] to analyze the relationship between instructors and students in college classrooms. Of particular interest is the normalization of educational technologies that support surveillance, thereby enhancing institutional disciplinary power and regulation of bodies. We refer to this regulation as “dataveillance,” which “refers to the systematic monitoring of individuals and/or groups through personal data systems in order to regulate or govern behaviours” [3, 5]. Key preliminary takeaways determine that our role as technical communicators is to address and communicate with public audiences such as college instructors, exploring how surveillance strategies may be used to counter or resist rather than compound dominant modes of “dataveillance.”

References

  1. Rachel E. Dubrofsky, & Shoshana Amielle Magnet. (2015). Feminist Surveillance Studies. Durham and London: Duke University PressGoogle ScholarGoogle Scholar
  2. Michel Foucault. (1977). Discipline and punish: The birth of the prison (1st American ed.). Pantheon Books.Google ScholarGoogle Scholar
  3. Selena Nemorin. (2017). Post-panoptic pedagogies: The changing nature of school surveillance in the digital age. Surveillance & Society, 15(2), 239-253. https://doi.org/10.24908/ss.v15i2.6033Google ScholarGoogle ScholarCross RefCross Ref
  4. Marcelo Hoffman. (2014). Chapter Two: Disciplinary Power. In Dianna Taylor (Ed.), Michel Foucault: Key Concepts (pp. 27-39). New York, NY: Taylor and Frances. https://doi.org/10.4324/9781315711478Google ScholarGoogle Scholar
  5. Roger Clarke. (1988). Information technology and dataveillance. Communications of the ACM 31(5), 498–512. https://doi.org/10.1145/42411.42413Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Susan A. Youngblood. (2012). Balancing the rhetorical tension between right-to-know and security in risk communication: Ambiguity and avoidance. Journal of Business and Technical Communication, 26(1), 33-62. https://doi.org/10.1177/1050651911421123Google ScholarGoogle ScholarCross RefCross Ref
  7. Amanda Wray, & Elise Verzosa Hurley. (2016). Feminist Rhetorical Praxis: Everyday Feminism as Public Agora. Res Rhetorica, 2, 37–51. doi:10.17380/rr2016.2.1Google ScholarGoogle Scholar
  8. Sweta Baniya, Les Hutchinson Campos, Ashanka Kumari, Kyle Larson, & Chris Lindgren. (2019). Representing diversity in digital research: Digital feminist ethics and resisting dominant normatives. Computers & Writing. http://hdl.handle.net/10919/96779Google ScholarGoogle Scholar
  9. Shoshana Zuboff. (2019). Age of surveillance capitalism: The fight for a human future at the new frontier of power. PublicAffairs.Google ScholarGoogle Scholar
  10. Virginia Eubanks. (2011). Digital dead end: Fighting for social justice in the information age. MIT Press.Google ScholarGoogle ScholarCross RefCross Ref
  11. Ruha Benjamin. (2019). Race after technology: abolitionist tools for the new jim code. Cambridge, UK; MA: Polity Press.Google ScholarGoogle Scholar
  12. Estee Beck, & Les Hutchinson Campos (Eds). (2021). Privacy matters: Conversations about surveillance within and beyond the classroom. Utah State University Press.Google ScholarGoogle ScholarCross RefCross Ref
  13. Sherene Razack. (1998). Looking white people in the eye: Gender, race, and culture in courtrooms and classrooms. Toronto: University of Toronto Press.Google ScholarGoogle ScholarCross RefCross Ref
  14. Jennifer Slack, David Miller, & Jeffrey Doak. (1993). The technical communicator as author: Meaning, power, authority. Journal of Business and Technical Communication, 7(1), 12-36. doi:10.1177/1050651993007001002Google ScholarGoogle ScholarCross RefCross Ref
  15. Rebecca Walton, Kristen Moore, & Natasha Jones. (2019). Technical communication after the social justice turn: Building coalitions for action. Routledge.Google ScholarGoogle ScholarCross RefCross Ref
  16. Erin A. Frost, & Michelle Eble. (2015). Technical rhetorics: Making specialized persuasion apparent to public audiences. Present Tense, 4(2). Retrieved from  http://www.presenttensejournal.org/wp-content/uploads/2015/04/FrostandEble.pdfGoogle ScholarGoogle Scholar
  17. Jacquelyn J. Royster, & Gesa Kirsch. (2012). Feminist rhetorical practices: New horizons for rhetoric, composition, and literacy studies. Carbondale: Southern Illinois University Press.Google ScholarGoogle Scholar
  18. José Manuel Coronel Llamas. (2006). Technologies of disciplinary power in action: The norm of the 'good student'. Higher Education, 52(4), 665-686. https://doi.org/10.1007/s10734-004-1449-1Google ScholarGoogle ScholarCross RefCross Ref
  19. Stephen J. Ball. (2012). Foucault and education: Disciplines and knowledge. Taylor & Francis Group.Google ScholarGoogle ScholarCross RefCross Ref
  20. U.S. Department of Education, National Center for Education Statistics. (2020). Integrated Postsecondary Education Data System (IPEDS), Spring 2019, Fall Enrollment component. https://nces.ed.gov/programs/coe/indicator_csa.aspGoogle ScholarGoogle Scholar
  21. Beverly J. Moss. (2010). Phenomenal women, collaborative literacies, and community texts in alternative ‘Sista’ spaces. Community Literacy Journal 5(1), 1-24. https://www.muse.jhu.edu/article/471043.Google ScholarGoogle ScholarCross RefCross Ref
  22. Jeffrey T. Grabill & W. Michele Simmons. (1998). Toward a critical rhetoric of risk communication: Producing citizens and the role of technical communicators. Technical Communication Quarterly, 7(4), 415-441.Google ScholarGoogle ScholarCross RefCross Ref
  23. Jamie Manolev, Anna Sullivan, & Roger Slee. (2019). The datafication of discipline: ClassDojo, surveillance and a performative classroom culture. Learning, Media and Technology, 44(1), 36-51. https://doi.org/10.1080/17439884.2018.1558237Google ScholarGoogle ScholarCross RefCross Ref
  24. bell hooks. (1994). Teaching to transgress: Education as the practice of freedom. New York: Routledge. Google ScholarGoogle Scholar
  25. Neil Selwyn. (2015). Data entry: Towards the critical study of digital data and education. Learning, Media and Technology, 40(1), 64-82. https://doi.org/10.1080/17439884.2014.921628Google ScholarGoogle ScholarCross RefCross Ref
  26. Mona Lilja, & Stellan Vinthagen. (2014). Sovereign power, disciplinary power and biopower: Resisting what power with what resistance? Journal of Political Power, 7(1), 107-126. https://doi.org/10.1080/2158379X.2014.889403Google ScholarGoogle ScholarCross RefCross Ref
  27. Keith Gilyard, & Adam Banks. (2018). On african american rhetoric. New York, NY: Taylor and Francis.Google ScholarGoogle ScholarCross RefCross Ref
  28. Michael Adorjan and Rosemary Ricciardelli. (2019). A New Privacy Paradox? Youth Agentic Practices of Privacy Management Despite “Nothing to Hide.” Canadian Review of Sociology, 56, 1 (Jan. 2019), 8-29. DOI: https://doi.org/10.1111/cars.12227Google ScholarGoogle ScholarCross RefCross Ref
  29. Emily January Petersen, & Rebecca Walton. (2018). Bridging analysis and action: How feminist scholarship can inform the social justice turn. Journal of Business and Technical Communication, 32(4), 416–446. https://doi.org/10.1177/1050651918780192Google ScholarGoogle ScholarCross RefCross Ref
  30. Colleen A. Reilly. (2021). Critical digital literacies and online surveillance. In Privacy matters: Conversations about surveillance within and beyond the classroom. Utah State University Press. https://doi.org/10.7330/9781646420315.c001Google ScholarGoogle ScholarCross RefCross Ref
  31. Melody Bowdon. (2004). Technical communication and the role of the public intellectual: A community HIV-prevention case study. Technical Communication Quarterly, 13(3), 325-340.Google ScholarGoogle ScholarCross RefCross Ref
  32. Mark A. Hannah. (2010). Legal literacy: Coproducing the law in technical communication. Technical Communication Quarterly, 20(1), 5-24.Google ScholarGoogle ScholarCross RefCross Ref
  33. Steven B. Katz. (1992). The ethic of expediency: Classical rhetoric, technology, and the holocaust. College English, 54(3), 255–275.Google ScholarGoogle ScholarCross RefCross Ref
  34. Carolyn R. Miller. (1979). A humanistic rationale for technical writing. College English, 40(6), 610–617. doi:10.2307/375964Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    SIGDOC '21: Proceedings of the 39th ACM International Conference on Design of Communication
    October 2021
    402 pages
    ISBN:9781450386289
    DOI:10.1145/3472714

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 12 October 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate355of582submissions,61%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format