All Academic, Inc. Research Logo

Info/CitationFAQResearchAll Academic Inc.
Document

Freedom of Speech and Segmenting the Citizens
Unformatted Document Text:  ICA-10-10582 11 economic liberalism, it suggests a significant convergence with republican traditions (p.63). Economic liberalism, on the other hand, asks for deregulated markets, individual responsibility and a law that is consistent with the free market notions of property exchange (p.63). However, political liberals recognize that this kind of a system would very likely have a devastating impact on individual liberty. Reflecting this concern, political liberalism has converged with the republican traditions in asking for regulations to enable individuals to control their personal information. More precisely, political liberalism has moved close to republicanism in the sense that it has begun to pursue an egalitarian notion of enforceable rights surrounding the private lives of persons who would otherwise be disadvantaged in their relations with business and government (p.63). It is for these reasons that I suggest that it is economic liberalism that should be identified as a more troubling source of threats to both privacy and pluralism. The investigation of the neoliberal threat to privacy calls for a greater understanding of the relevant characteristics of the neoliberalist model. According to this perspective, the degree to which an individual experiences privacy is a function of their use of self-help techniques (Cohen 2001, p.2041). Ironically, within this perspective, we see that the contemporary risk society is marked by an increased need for surveillance on behalf of institutional actors seeking to minimize their exposure to risk. The minimization of risk is pursued in a variety of often visible means such as through installation of closed circuit cameras on major streets, shopping malls and department stores (Lyon, 2001, p. 53). Less obviously, efforts directed towards the minimization of risk also come in the form of surveillance of consumers’ and citizens’ daily transactions in order to minimize the costs of misdirected appeals (Lyon, 2001, p.61; Norris et al. 1998, p. 259). The synergy between these different methods of surveillance is often ensured through the use of data-mining technologies that combine data from disparate sources. Corporations use such data-mining

Authors: Popescu, Mihaela. and Baruh, Lemi.
first   previous   Page 12 of 26   next   last



background image
ICA-10-10582
11
economic liberalism, it suggests a significant convergence with republican traditions (p.63).
Economic liberalism, on the other hand, asks for deregulated markets, individual
responsibility and a law that is consistent with the free market notions of property exchange
(p.63). However, political liberals recognize that this kind of a system would very likely
have a devastating impact on individual liberty. Reflecting this concern, political liberalism
has converged with the republican traditions in asking for regulations to enable individuals to
control their personal information. More precisely, political liberalism has moved close to
republicanism in the sense that it has begun to pursue an egalitarian notion of enforceable
rights surrounding the private lives of persons who would otherwise be disadvantaged in their
relations with business and government (p.63). It is for these reasons that I suggest that it is
economic liberalism that should be identified as a more troubling source of threats to both
privacy and pluralism.
The investigation of the neoliberal threat to privacy calls for a greater understanding of
the relevant characteristics of the neoliberalist model. According to this perspective, the
degree to which an individual experiences privacy is a function of their use of self-help
techniques (Cohen 2001, p.2041). Ironically, within this perspective, we see that the
contemporary risk society is marked by an increased need for surveillance on behalf of
institutional actors seeking to minimize their exposure to risk. The minimization of risk is
pursued in a variety of often visible means such as through installation of closed circuit
cameras on major streets, shopping malls and department stores (Lyon, 2001, p. 53). Less
obviously, efforts directed towards the minimization of risk also come in the form of
surveillance of consumers’ and citizens’ daily transactions in order to minimize the costs of
misdirected appeals (Lyon, 2001, p.61; Norris et al. 1998, p. 259). The synergy between
these different methods of surveillance is often ensured through the use of data-mining
technologies that combine data from disparate sources. Corporations use such data-mining


Convention
All Academic Convention can solve the abstract management needs for any association's annual meeting.
Submission - Custom fields, multiple submission types, tracks, audio visual, multiple upload formats, automatic conversion to pdf.
Review - Peer Review, Bulk reviewer assignment, bulk emails, ranking, z-score statistics, and multiple worksheets!
Reports - Many standard and custom reports generated while you wait. Print programs with participant indexes, event grids, and more!
Scheduling - Flexible and convenient grid scheduling within rooms and buildings. Conflict checking and advanced filtering.
Communication - Bulk email tools to help your administrators send reminders and responses. Use form letters, a message center, and much more!
Management - Search tools, duplicate people management, editing tools, submission transfers, many tools to manage a variety of conference management headaches!
Click here for more information.

first   previous   Page 12 of 26   next   last

©2012 All Academic, Inc.