controle, vigilância e big data
DESCRIPTION
Artigo apresentado no VI Seminário Internacional Pensamento crítico e VI Congresso Nacional do GT Ética e Cidadania da ANPOF em 2013TRANSCRIPT
![Page 1: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/1.jpg)
![Page 2: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/2.jpg)
![Page 3: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/3.jpg)
![Page 4: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/4.jpg)
![Page 5: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/5.jpg)
![Page 6: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/6.jpg)
![Page 7: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/7.jpg)
![Page 8: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/8.jpg)
![Page 9: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/9.jpg)
![Page 10: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/10.jpg)
![Page 11: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/11.jpg)
![Page 12: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/12.jpg)
![Page 13: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/13.jpg)
![Page 14: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/14.jpg)
![Page 15: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/15.jpg)
![Page 16: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/16.jpg)
![Page 17: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/17.jpg)
![Page 18: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/18.jpg)
![Page 19: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/19.jpg)
![Page 20: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/20.jpg)
![Page 21: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/21.jpg)
![Page 22: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/22.jpg)
![Page 23: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/23.jpg)
![Page 24: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/24.jpg)
![Page 25: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/25.jpg)
![Page 26: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/26.jpg)
![Page 27: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/27.jpg)
![Page 28: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/28.jpg)
![Page 29: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/29.jpg)
![Page 30: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/30.jpg)
![Page 31: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/31.jpg)
![Page 32: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/32.jpg)
![Page 33: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/33.jpg)
![Page 34: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/34.jpg)
![Page 35: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/35.jpg)
http://goo.gl/zGKVnJ
![Page 36: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/36.jpg)
![Page 37: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/37.jpg)
![Page 38: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/38.jpg)
BRUNO, Fernanda. Dispositivos de vigilância no ciberespaço: duplos digitais e identidades simuladas. revista Fronteiras – estudos midiáticos VIII(2): 152-159,
maio/agosto 2006.
CAMMAROSANO, Elenice. Escola da prisão: Espaço de construção da identidade do homem aprisionado?, 2006, Caxambu. Anais da 29° Reunião anual da
ANPEd. p. 1-16.
CARTER, Philip. Big Data analytics: Future architectures, Skills and roadmaps for the CiO. Disponível em: < http://goo.gl/Vljw47> Acesso em: 15 de nov. 2013.
DELEUZE, Gilles. Conversações. 1.ed. São Paulo: Ed. 34, 1992. 232p.
FOUCAULT, Michel. Vigiar e punir: nascimento da prisão. 27.ed. Petrópolis: Vozes, 2006. 288p.
FOUCAULT, Michel. Microfísica do Poder. Rio de Janeiro: Graal, 1979. 295p.
LARROSA, Jorge. Tecnologias do eu e educação. In: Silva, Tomaz Tadeu. O sujeito da educação. Petrópolis: Vozes, 1994, p.35-86.
LEMOS, André. Cibercultura: tecnologia e vida social na cultura contemporânea. 5.ed. Porto Alegra: Sulina, 2010. 295p.
LEMOS, André. Mídias locativas e vigilância: sujeito inseguro, bolhas digitais, paredes virtuais e territórios informacionais, 2009, Curitiba. Anais do evento
Vigilância, Segurança e Controle Social na América Latina. p.621-648.
LÉVY, Pierre. Cibercultura. 1.ed. São Paulo: Ed 34, 1999. 272p.
NASCIMENTO, Liliane. Vigilância nos sites de rede social: apontamentos para o contexto latino-americano a partir do estudo do Facebook.com, 2009, Curitiba.
Anais do evento Vigilância, Segurança e Controle Social na América Latina. p. 564-584.
PALFREY, Jonh e GASSER, Urs. Nascidos na era digital: entendendo a primeira geração de nativos digitais. 1 ed. Porto Alegre: Artemed, 2011. 352p.
PARENTE, André (Org.). Tramas da rede; novas dimensões filosóficas, estéticas e políticas da comunicação. Porto Alegre: Sulina, 2010. 303p.
SANTOS, Claudinei. A ação do controle – do panóptico ao sinóptico. Disponível
em:<http://www.institutodefilosofia.com.br/pdf/SCIENCE%20INSTITUTE/ARTIGOS-IF-2011-III/artigo_claudinei.pdf>. Acesso em: 10 de nov. 2012.
TADEU, Tomaz. Antropologia do ciborgue: as vertigens do pós-humano. Belo Horizonte: Autêntica Editora, 2009. 129p.
SIBILIA, Paula. O show do eu: a intimidade como espetáculo. Rio de Janeiro: Nova Fronteira, 2008.
Referências
![Page 39: Controle, Vigilância e Big data](https://reader034.vdocuments.site/reader034/viewer/2022042713/548c0ce5b47959050d8b63d2/html5/thumbnails/39.jpg)