ABSTRACT
Surveillance studies have begun to shift from emphasizing privacy and security and towards ethical aspects of “privilege, access, and risk” [1]. The college classroom is one site where power, technology, and bodies intersect. In the classroom, surveillance is normalized through student/instructor engagement of technological interfaces such as Learning Management Systems (LMS). Drawing from a survey of college instructors across the United States, this study uses the metaphor of the Panopticon [1, 2, 3, 4] to analyze the relationship between instructors and students in college classrooms. Of particular interest is the normalization of educational technologies that support surveillance, thereby enhancing institutional disciplinary power and regulation of bodies. We refer to this regulation as “dataveillance,” which “refers to the systematic monitoring of individuals and/or groups through personal data systems in order to regulate or govern behaviours” [3, 5]. Key preliminary takeaways determine that our role as technical communicators is to address and communicate with public audiences such as college instructors, exploring how surveillance strategies may be used to counter or resist rather than compound dominant modes of “dataveillance.”
- Rachel E. Dubrofsky, & Shoshana Amielle Magnet. (2015). Feminist Surveillance Studies. Durham and London: Duke University PressGoogle Scholar
- Michel Foucault. (1977). Discipline and punish: The birth of the prison (1st American ed.). Pantheon Books.Google Scholar
- Selena Nemorin. (2017). Post-panoptic pedagogies: The changing nature of school surveillance in the digital age. Surveillance & Society, 15(2), 239-253. https://doi.org/10.24908/ss.v15i2.6033Google ScholarCross Ref
- Marcelo Hoffman. (2014). Chapter Two: Disciplinary Power. In Dianna Taylor (Ed.), Michel Foucault: Key Concepts (pp. 27-39). New York, NY: Taylor and Frances. https://doi.org/10.4324/9781315711478Google Scholar
- Roger Clarke. (1988). Information technology and dataveillance. Communications of the ACM 31(5), 498–512. https://doi.org/10.1145/42411.42413Google ScholarDigital Library
- Susan A. Youngblood. (2012). Balancing the rhetorical tension between right-to-know and security in risk communication: Ambiguity and avoidance. Journal of Business and Technical Communication, 26(1), 33-62. https://doi.org/10.1177/1050651911421123Google ScholarCross Ref
- Amanda Wray, & Elise Verzosa Hurley. (2016). Feminist Rhetorical Praxis: Everyday Feminism as Public Agora. Res Rhetorica, 2, 37–51. doi:10.17380/rr2016.2.1Google Scholar
- Sweta Baniya, Les Hutchinson Campos, Ashanka Kumari, Kyle Larson, & Chris Lindgren. (2019). Representing diversity in digital research: Digital feminist ethics and resisting dominant normatives. Computers & Writing. http://hdl.handle.net/10919/96779Google Scholar
- Shoshana Zuboff. (2019). Age of surveillance capitalism: The fight for a human future at the new frontier of power. PublicAffairs.Google Scholar
- Virginia Eubanks. (2011). Digital dead end: Fighting for social justice in the information age. MIT Press.Google ScholarCross Ref
- Ruha Benjamin. (2019). Race after technology: abolitionist tools for the new jim code. Cambridge, UK; MA: Polity Press.Google Scholar
- Estee Beck, & Les Hutchinson Campos (Eds). (2021). Privacy matters: Conversations about surveillance within and beyond the classroom. Utah State University Press.Google ScholarCross Ref
- Sherene Razack. (1998). Looking white people in the eye: Gender, race, and culture in courtrooms and classrooms. Toronto: University of Toronto Press.Google ScholarCross Ref
- Jennifer Slack, David Miller, & Jeffrey Doak. (1993). The technical communicator as author: Meaning, power, authority. Journal of Business and Technical Communication, 7(1), 12-36. doi:10.1177/1050651993007001002Google ScholarCross Ref
- Rebecca Walton, Kristen Moore, & Natasha Jones. (2019). Technical communication after the social justice turn: Building coalitions for action. Routledge.Google ScholarCross Ref
- Erin A. Frost, & Michelle Eble. (2015). Technical rhetorics: Making specialized persuasion apparent to public audiences. Present Tense, 4(2). Retrieved from http://www.presenttensejournal.org/wp-content/uploads/2015/04/FrostandEble.pdfGoogle Scholar
- Jacquelyn J. Royster, & Gesa Kirsch. (2012). Feminist rhetorical practices: New horizons for rhetoric, composition, and literacy studies. Carbondale: Southern Illinois University Press.Google Scholar
- José Manuel Coronel Llamas. (2006). Technologies of disciplinary power in action: The norm of the 'good student'. Higher Education, 52(4), 665-686. https://doi.org/10.1007/s10734-004-1449-1Google ScholarCross Ref
- Stephen J. Ball. (2012). Foucault and education: Disciplines and knowledge. Taylor & Francis Group.Google ScholarCross Ref
- U.S. Department of Education, National Center for Education Statistics. (2020). Integrated Postsecondary Education Data System (IPEDS), Spring 2019, Fall Enrollment component. https://nces.ed.gov/programs/coe/indicator_csa.aspGoogle Scholar
- Beverly J. Moss. (2010). Phenomenal women, collaborative literacies, and community texts in alternative ‘Sista’ spaces. Community Literacy Journal 5(1), 1-24. https://www.muse.jhu.edu/article/471043.Google ScholarCross Ref
- Jeffrey T. Grabill & W. Michele Simmons. (1998). Toward a critical rhetoric of risk communication: Producing citizens and the role of technical communicators. Technical Communication Quarterly, 7(4), 415-441.Google ScholarCross Ref
- Jamie Manolev, Anna Sullivan, & Roger Slee. (2019). The datafication of discipline: ClassDojo, surveillance and a performative classroom culture. Learning, Media and Technology, 44(1), 36-51. https://doi.org/10.1080/17439884.2018.1558237Google ScholarCross Ref
- bell hooks. (1994). Teaching to transgress: Education as the practice of freedom. New York: Routledge. Google Scholar
- Neil Selwyn. (2015). Data entry: Towards the critical study of digital data and education. Learning, Media and Technology, 40(1), 64-82. https://doi.org/10.1080/17439884.2014.921628Google ScholarCross Ref
- Mona Lilja, & Stellan Vinthagen. (2014). Sovereign power, disciplinary power and biopower: Resisting what power with what resistance? Journal of Political Power, 7(1), 107-126. https://doi.org/10.1080/2158379X.2014.889403Google ScholarCross Ref
- Keith Gilyard, & Adam Banks. (2018). On african american rhetoric. New York, NY: Taylor and Francis.Google ScholarCross Ref
- Michael Adorjan and Rosemary Ricciardelli. (2019). A New Privacy Paradox? Youth Agentic Practices of Privacy Management Despite “Nothing to Hide.” Canadian Review of Sociology, 56, 1 (Jan. 2019), 8-29. DOI: https://doi.org/10.1111/cars.12227Google ScholarCross Ref
- Emily January Petersen, & Rebecca Walton. (2018). Bridging analysis and action: How feminist scholarship can inform the social justice turn. Journal of Business and Technical Communication, 32(4), 416–446. https://doi.org/10.1177/1050651918780192Google ScholarCross Ref
- Colleen A. Reilly. (2021). Critical digital literacies and online surveillance. In Privacy matters: Conversations about surveillance within and beyond the classroom. Utah State University Press. https://doi.org/10.7330/9781646420315.c001Google ScholarCross Ref
- Melody Bowdon. (2004). Technical communication and the role of the public intellectual: A community HIV-prevention case study. Technical Communication Quarterly, 13(3), 325-340.Google ScholarCross Ref
- Mark A. Hannah. (2010). Legal literacy: Coproducing the law in technical communication. Technical Communication Quarterly, 20(1), 5-24.Google ScholarCross Ref
- Steven B. Katz. (1992). The ethic of expediency: Classical rhetoric, technology, and the holocaust. College English, 54(3), 255–275.Google ScholarCross Ref
- Carolyn R. Miller. (1979). A humanistic rationale for technical writing. College English, 40(6), 610–617. doi:10.2307/375964Google ScholarCross Ref
Recommendations
Research on College Classroom Teaching Evaluation System and Evaluation Method
ICEE '12: Proceedings of the 2012 3rd International Conference on E-Business and E-Government - Volume 04The college classroom teaching is an important part of the quality of undergraduate education teaching, it plays a key role in improving the quality of undergraduate education comprehensively, therefore, it has the important significance to improve ...
How Student Centered is the Computer Science Classroom? A Survey of College Faculty
Student-centered instructional practices structure a class so that students interact with each other, engage deeply with the content, and receive formative feedback. These evidence-based practices benefit all students but are particularly effective with ...
Teaching in flipped classrooms
To effectively promote the student-centered movement, it is important to understand pre-service teacher concerns about teaching in technology-integrated flipped classrooms. This study surveyed more than 470 pre-service teachers' concerns on teaching ...
Comments