Preview

The Internet And Jeremy Bentham's Model Of The Panopticon

Good Essays
Open Document
Open Document
1033 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Internet And Jeremy Bentham's Model Of The Panopticon
Robbery, rape, homicide, etc. are being joined by another threat. The increase in popularity of the Internet over the years has resulted in the creation of a new type of crime, cybercrime. With that, came along a new concern: the need for safety and surveillance on the Internet. This has created a certain type of Panoptic society and displays the way in which people are subject to behave when they know that a higher power such as the Federal Government and even local law enforcement agencies have the ability to access their information via computer systems. Cybercrime can be defined in many ways whether it’s money laundering, bullying, fraud, or stalking. Each of these crimes are especially now more opportune because of the Internet and …show more content…
A central tower, however they are not aware of whom or what is watching them. Michael Focault theorizes that their knowledge of being watched and inability to see who exactly is watching them is what keeps them in order and is why they behave the way they do. “Bentham laid down the principle that power should be visible and unverifiable. Visible the inmate will constantly have before his eyes the tall outline of the central tower from which he is spied upon. Unverifiable; the inmate must never know whether he is being looked at at any one moment; but he must be sure that he may always be so.” (Focault 231) This is similar to our Internet run society today. Although Internet users are not completely aware of who is able to view their account and cannot verify anything when it comes to who is searching through their information, they are aware and can see that someone has access to their information. Some say that the anonymity of the Internet …show more content…
“…power is exercised without division, according to a continuous hierarchal figure, in which each individual is constantly located, examined, and distributed among the living beings, the sick, and the dead-all this constitutes a compact model of the disciplinary mechanism.” (Focault 227) This is seen when dealing with cybercrimes as well. For instance, if a student is scrolling through their Facebook feed and comes across an act of cyber bullying, they are inclined to inform a member of authority. The student informs their school principal. With the laws that are present today the principal is required to inform authorities of this act of harassment. The act is then investigated further by this higher power and is then consequence accordingly. Schools today are very informant and strict when it comes to cybercrimes, especially involving forms of bullying and harassment. Students today are more likely to be more cautious while on the Internet because they know how easy it is to be identified with modern

You May Also Find These Documents Helpful

  • Powerful Essays

    Physical crimes never cease to draw our attention. Victims, bloodiness, drama, motives, psychological issues and conflicts: they are at the heart of most physical crimes. Cyber crimes are not viewed as dramatic and pervasive by many, but its consequences can be even bloodier within seconds: hundreds of millions of victims and billions of dollars can be rapidly caused with two elements, a criminal mind and one computer. We are not safe from either bloody crimes or cyber crimes such as cyberstalking, cyberbullying, and financial theft. In fact, “cybercrime affects everyone-business, governments, and citizens.” (2). Wealth, a safe neighborhood, or bodyguards…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Capstone Analysis

    • 285 Words
    • 1 Page

    Regular stories featured in the media on computer crime include topics covering hacking to viruses, web hackers, to internet pedophiles, sometimes accurately portraying events, sometimes misconceiving the role of technology in such activities. The increase in cybercrime has been documented in the news media. Both the increase in the incidence of criminal activity and the possible emergence of new varieties of criminal activity pose challenges for the legal system, as well as for law enforcement. Some of the things I do to try and prevent falling victim to cybercrime is keeping the latest version of virus software on my computers. Using strong passwords that only my family knows. I do not fall prey to online offers of things like free TVs, or you have won $1,000.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Computer crime is an ongoing issue that we continuously see, and a major problem with this is that most people do not realize the harm that computer crime can cause. Computer crime is also a niche that continues to grow. This is based on the fact that there are many different perceptions about what computer crime is, and the harmful effects it can have. Because there is a gap between traditional views of what cyber crime is and the actual realities of these crimes, it is a criminal offense that will continue to happen.…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Foucault explains we are living in a system where everything we do is survellience, thus we are living in a panopticon. We may feel that we have total privacy, but if we really sit back and observe we will come to an understanding that we are always being surveillance. Everything we do is recorded and monitored just like in the panopticon. We can not go to the store without cameras watching us or drive down the highway freely speeding without fear of getting caught by a police watching us. As similar to the panopticon we do not exactly know when we are being watched, but when we get the feeling we are being watched, we tend to try and behave perfectly. . “The Panopticon is a machine for dissociating the see/being seen dyad: in the peripheric ring, one is totally seen, without ever seeing; in the central tower, one sees everything without ever being seen.”…

    • 879 Words
    • 4 Pages
    Good Essays
  • Good Essays

    FINAL DRAFT CYBERCRIME CJ

    • 667 Words
    • 3 Pages

    Cyberspace has been traditionally defined as the exchange of information and communication from one person to another in completely different geographical locations (Britz, 2013, p.3). According to Britz cyberspace was defined as “the place between places” (Britz, 2013, p.3). Therefore, cyberspace represents the cloud where emails, calls, and, text messages must pass through before making it to its final destination. Cyberspace has been used since traditional communication devices were first introduced (Britz, 2013, p.3). Approximately half of the United States have used the Internet as a medium (Britz, 2013, p.3). However, with the wave of the Internet, criminals found new ways to commit crimes with less risk of getting caught. According to Britz computer crime, computer-related crimes, digital crimes, and cybercrime must be studied in order to understand technological and electronic crimes (Britz, 2013, p.3).…

    • 667 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Because the wide world of technology has developed at such an astounding pace, there are many problems for victims as well as investigators of cyber crime and computer-related crimes. First, we must familiarize ourselves with the definitions of cyber crime and computer-related crime. For this paper, we will define cyber crime as the use of a computer as a tool to commit a crime or as a crime committed where a computer is the target. We will define computer-related crime as a traditional crime where a computer is used to carry out, record actions, or provide evidence of a crime. The beginnings of the problem of investigating cyber crime come in the form of reporting. For many reasons cyber crimes tend to go unreported or severely underreported. Another problem is that law enforcement officials (as well as parents and their children) do not have adequate training, allocation of funds, coordination with other agencies, or proper understanding of applicable laws that pertain to cyber crime. From all angles cyber crime is a difficult problem to tackle, and there is a definite need for law enforcement to catch up with the technology of cyber space, which is quickly becoming a feeding ground for illegal and illicit activity.…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Foucault's Panopticism

    • 937 Words
    • 4 Pages

    “Bentham’s panopticon is the architectural figure of this composition” (Foucault 285). The panopticon’s job “In short reverses the principle of the dungeon; or rather of its three functions- to enclose, to deprive of light, and to hide- it preserves only the first and eliminates the other two”(Foucault 286). The diagram of this containment structure seems to show that the prisoner is completely visible by the authority at hand but the prisoner himself cannot see if the authority is watching him at all times. This is a tremendous example of power because it shows that if one person loses any senses in this case sight, and another person has that sense available it could make you weak thus giving the power to the higher authority. Foucault shows the reader how this structure is used in today’s jail cells stated the “Interior of the penitentiary at Stateville, United States, twentieth century” (Foucault…

    • 937 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Dashora, K. (2011). Cyber Crime in the Society: Problems and Preventions. Journal of Alternative Perscriptives in the Social Sciences, 240-259.…

    • 2090 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Research Paper Outline

    • 423 Words
    • 2 Pages

    Thesis Statement: Cybercrime is an increasing concern among individuals across the U.S. making it necessary to know how to avoid being a victim.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer crimes are criminal activities that involve using a computer and a network to gain unauthorized access with the intent of deleting, altering, or damaging computer data. Due to them being extremely versatile, establishing criminal and noncriminal behavior when in use can be very difficult at times. “According to the U.S. Uniform Crime Reporting Statistics, by 2000 more than 300 million users around the globe accessed the World Wide Web. Of those, at least 1 million were engaged in illegal Internet activities (computer crime or "cyber-crime"). Cyber-crimes include Internet-related forgery, embezzlement, fraud, vandalism, and the disposal of stolen goods. The potential threat to the overall development of e-commerce was serious—so much that online security expenditures were expected to double to $30 billion in 2004” (Computer Crime – Definitions). The four most common categories of computer crimes are infrastructure attacks, technological facilitation, information attacks, and promotion.…

    • 733 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Foucault Panopticism

    • 1799 Words
    • 8 Pages

    The power of sight and observation are two actions that are generally associated with one another. However, what we fail to acknowledge is that these two actions, although associated with the same sense, have different responsibilities to fulfill. Although seeing is a habitual act we perform the second we open our eyes to when we fall asleep, we are not always observing our surroundings. Observation differs from sight due to the fact that when we observe, we are vividly noticing aspects of something or someone in order to gain information whereas sight is simply the faculty, or driving force, of seeing. We are able to obtain more powerful knowledge if we go about our days observing rather than just living a life full of brief sights. Michel Foucault, a French philosopher explores several elements in the ways in which our humanity and social sciences work. In his work, Discipline and Punishment: The Birth of the Prison he uses Jeremy Bentham’s design for a panoptic prison in which prisoners are watched constantly to explore how observation can change an individual’s behavior. Similarly Foucault believed, observation works as a disciplinary tool that forces individuals to act a certain way under constant surveillance, creating permanent effects. Foucault was correct in the sense that surveillance works in the same manner continuously within our society however, although an individual’s behavior is altered by the observation of another person, he is wrong to believe that their actions remain static. An individual’s behavior can be altered in several different circumstances due to the type of audience and the fear of being misjudged.…

    • 1799 Words
    • 8 Pages
    Better Essays
  • Best Essays

    Sony PSN Data Leakage

    • 1598 Words
    • 5 Pages

    This paper was prepared for CCST9029 Cyberspace Crime: Technology and Ethics, taught by Dr. K.P. Chow, tutored by Ms. Vivien Chan.…

    • 1598 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    Computer Forensics

    • 504 Words
    • 3 Pages

    There is little debate that electronic technology including computers and the Internet are one of the most important developments of recent times. Tasks that took days to complete and that demanded hundreds of man hours to effectively execute can now be easily done at the touch of a button. But the growing importance of technology is not without its drawbacks with probably the most major one being internet and computer enabled crime.…

    • 504 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The Internet is a system of interconnected networks able to continually amplify its range of sites surpassing its predecessor, the ARPANET (Advanced Research Projects Agency) which was developed by the American military in the 60’s (Abbate, 2000). It has progressed, with the social and economic aspect of its use becoming complex, with illegal activities reaching even the depths of cyberspace – “cybercrime” and the culprits, the “cybercriminals”, have appeared.…

    • 1677 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Cyber Citizens Partnership’s website identified the following as their 3 categories: using the computer to help an individual commit a crime, focusing on the computer as the victim, and using a computer to harm or steal. However, the Cross Domain Solutions stated people, property and government as their 3 categories of Cybercrimes. Some cybercrimes police must be prepared to deal with in the future are theft/identity theft, hacking, fraud/financial crimes, harassment/stalking, trafficking (human & drugs), child soliciting/abuse, and cyberterrorism. Below show how the different types are divided up into the 3…

    • 712 Words
    • 3 Pages
    Good Essays