Trust, but verify.. Power relations and control practices in a smart working environment

2021 ◽  
pp. 24-50
Author(s):  
Silvia Doria

The world of working is changing and the technological transformations are playing a relevant role in this change. In particular, new technologies are making the physical boundaries of traditional offices increasingly permeable, allowing the diffusion of New Ways of Working (Demerouti et al., 2014; Koops and Helms, 2014), such as smart working. This paper, based on a qualitative research and discursive interviews, intends to reflect on the introduction and top-down management of smart working within a banking institution. At the same time, it aims to grasp the role attributed to and played by technology in its implementation. Starting from the two reconstructed stories, I shall show if and how the innovations introduced whereby technologies enable us to work remotely, are changing existing power relations and what control dynamics emerge from the field.

World ◽  
2020 ◽  
Vol 1 (2) ◽  
pp. 171-190
Author(s):  
Diosey Ramon Lugo-Morin

The world is currently experiencing a pandemic: a virus in the family Coronaviridae is causing serious respiratory infections in humans. The outbreak of novel coronavirus disease (COVID-19) was declared a pandemic by the WHO on 11 March 2020. The outbreak began in December 2019 in Wuhan, China, and has since spread throughout the world. Despite measures taken by governments throughout the world to contain and control the spread, economic disruption at the global level is imminent and will affect all economic sectors, particularly the food sector. In a post-pandemic scenario, the use of new technologies will be decisive in a new model of food commercialization. The production and distribution of food will be configured to make supply chains optimal and safe systems. Against this background, the present study aims to explore and analyze the implications of the COVID-19 pandemic for global food security.


2020 ◽  
pp. 19-43
Author(s):  
Henri Schildt

This chapter examines digitalization as a set of new normative ideals for managing and organizing businesses, enabled by new technologies. The data imperative consists of two mutually reinforcing goals: the pursuit of omniscience—the aspiration of management to capture the world relevant to the company through digital data; and the pursuit of omnipotence—an aspiration of managers to control and optimize activities in real-time and around the world through software. The data imperative model captures a self-reinforcing cycle of four sequential steps: (1) the creation and capture of data, (2) the combination and analysis of data, (3) the redesign of business processes around smart algorithms, and (4) the ability to control the world through digital information flows. The logical end-point of the data imperative is a ‘programmable world’, a conception of society saturated with Internet-connected hardware that is able to capture processes in real time and control them in order to optimize desired outcomes.


Laws ◽  
2021 ◽  
Vol 10 (3) ◽  
pp. 67
Author(s):  
Rubén Rodríguez Elizalde

The world moves and advances very quickly. Production systems and jobs evolve with the world. Occupational risks change as jobs change: The occupational risks of jobs we found two hundred years ago are different from the risks inherent to today’s jobs. The influence of technology is evident in many of today’s companies and, as a consequence, in the work that takes place in them. The recent COVID-19 pandemic, which has so upset the world, has made possible the acceleration in the massive use of certain communication tools that has been linked to the home confinement of a significant part of the population. Lots of workers and companies have been forced to telecommute. In a lot of countries, legislation and regulations were not prepared for these new ways of working: the laws have had to adapt to this new operation. In this area techno-stress has emerged, a new variety of stress derived from the use of new technologies at work, with the consequent negative psychosocial effects for the worker and the people around him, which can, at the same time, be the prelude to many others pathological processes of various nature.


2020 ◽  
Vol 18 (1) ◽  
pp. 90-103
Author(s):  
Thomas N Cooke

Digital privacy tends to be understood as the “top-down” regulation and control of personal information on the behalf of corporate and governmental institutions, realized through various policies and practices. While smartphone manufacturers increasingly innovate and alter their policies and practices to reflect new and ongoing cyber challenges, they tend to emphasize the protection of personal information in the form of content data. On the other hand, there is metadata: the measurements and math of content data. Abundant and ubiquitous in their discrete movements, they are the most precious commodity in the world of big data mobile analytics. Smartphone metadata are also one of the most pressing privacy concerns precisely because it is exceedingly difficult to see, study, and analyze. However, there is another realm through which digital privacy exists: a realm where the inability to see and study metadata is unacceptable. This entirely differently realm is comprised of jailbreakers—a network of hacktivist programmers injecting software-based “tweaks” into Apple mobile devices in ways that reveal metadata to users and allow users to control them. By doing so, jailbreakers allow users to build previously unrealized relationships with metadata and thereby radically distinguishing “top-down” Digital Privacy from “bottom-up” digital privacy. Although Apple has routinely resisted jailbreaking citing fears over device instability, user security vulnerability, and Terms of Use violations, this article reveals that many key privacy-first jailbreaking tweaks undermine Apple’s ability to monopolize metadata flows. Theorised through a cybernetic governmentality, this intervention demonstrates the extents to which Apple goes to reify its profit-first vision of information protection, one which insulates many metadata flows from its users. Through this theoretical approach, we as analysts can critically glean awareness of the politics of the (in)visibility and (il)legibility of metadata and the role they play in the discourse on digital, mobile data protection.


Author(s):  
Manuel Alonso Dos Santos

This chapter introduces and informs the reader about the new technologies used in the world of sports through their actors: players, athletes, teams, and events. The new media’s opportunities are processed, highlighting the way sports organizations make use of the potential of these new communication channels in their marketing strategy to interact and control both the message and content offered to their customers. This chapter also has a section specifically devoted to the use of social networks and virtual communities in the sports sector. Likewise, this chapter draws attention to the problems linked to the indiscriminate use of this technology such as distribution problems, information control, intrusiveness, and the latest studies and advances in sport marketing online strategies.


2017 ◽  
pp. 1070-1082
Author(s):  
Manuel Alonso Dos Santos

This chapter introduces and informs the reader about the new technologies used in the world of sports through their actors: players, athletes, teams, and events. The new media's opportunities are processed, highlighting the way sports organizations make use of the potential of these new communication channels in their marketing strategy to interact and control both the message and content offered to their customers. This chapter also has a section specifically devoted to the use of social networks and virtual communities in the sports sector. Likewise, this chapter draws attention to the problems linked to the indiscriminate use of this technology such as distribution problems, information control, intrusiveness, and the latest studies and advances in sport marketing online strategies.


Organization ◽  
2020 ◽  
pp. 135050842096387
Author(s):  
Mikko Vesa ◽  
Janne Tienari

In this Connexions essay, we focus on intelligent agent programs that are cutting-edge solutions of contemporary artificial intelligence (AI). We explore how these programs become objects of desire that contain a radical promise to change organizing and organizations. We make sense of this condition and its implications through the idea of ‘rationalized unaccountability’ that is an ideological state in which power and control are exerted algorithmically. While populist uses of new technologies receive growing attention in critical organization and management studies, we argue that rationalized unaccountability is the hidden end of a spectrum of populism affecting societies across the world. Rather than populism of the masses, this is a populism of elites. This essay lays out some premises for critical scholars to expose the workings of intelligent agent programs and to call into question the problematic ideological assumptions that they are grounded in.


2017 ◽  
Vol 2 (3) ◽  
pp. 159-161 ◽  
Author(s):  
Juliana Miehle ◽  
Daniel Ostler ◽  
Nadine Gerstenlauer ◽  
Wolfgang Minker

AbstractWith the emergence of new technologies, the surgical working environment becomes increasingly complex and comprises many medical devices that have to be taken cared of. However, the goal is to reduce the workload of the surgical team to allow them to fully focus on the actual surgical procedure. Therefore, new strategies are needed to keep the working environment manageable. Existing research projects in the field of intelligent medical environments mostly concentrate on workflow modeling or single smart features rather than building up a complete intelligent environment. In this article, we present the concept of intelligent digital assistance for clinical operating rooms (IDACO), providing the surgeon assistance in many different situations before and during an ongoing procedure using natural spoken language. The speech interface enables the surgeon to concentrate on the surgery and control the technical environment at the same time, without taking care of how to interact with the system. Furthermore, the system observes the context of the surgery and controls several devices autonomously at the appropriate time during the procedure.


EDIS ◽  
2020 ◽  
Vol 2020 (1) ◽  
pp. 7
Author(s):  
Demian F. Gomez ◽  
Jiri Hulcr ◽  
Daniel Carrillo

Invasive species, those that are nonnative and cause economic damage, are one of the main threats to ecosystems around the world. Ambrosia beetles are some of the most common invasive insects. Currently, severe economic impacts have been increasingly reported for all the invasive shot hole borers in South Africa, California, Israel, and throughout Asia. This 7-page fact sheet written by Demian F. Gomez, Jiri Hulcr, and Daniel Carrillo and published by the School of Forest Resources and Conservation describes shot hole borers and their biology and hosts and lists some strategies for prevention and control of these pests. http://edis.ifas.ufl.edu/fr422


Author(s):  
Y. Arockia Suganthi ◽  
Chitra K. ◽  
J. Magelin Mary

Dengue fever is a painful mosquito-borne infection caused by different types of virus in various localities of the world. There is no particular medicine or vaccine to treat person suffering from dengue fever. Dengue viruses are transmitted by the bite of female Aedes (Ae) mosquitoes. Dengue fever viruses are mainly transmitted by Aedes which can be active in tropical or subtropical climates. Aedes Aegypti is the key step to avoid infection transmission to save millions of people in all over the world. This paper provides a standard guideline in the planning of dengue prevention and control measures. At the same time gives the priorities including clinical management and hospitalized dengue patients have to address essentially.


Sign in / Sign up

Export Citation Format

Share Document