Chapter 1 Self-Assessment Quiz: What Is Surveillance?
Instructions: This quiz covers the key concepts, definitions, and arguments from Chapter 1. Complete it without consulting the chapter to assess your genuine comprehension. Then check your answers using the chapter content. Aim to score at least 14/20 correct before proceeding to Chapter 2.
Estimated Time: 30–40 minutes
Part A: Multiple Choice (1 point each)
1. According to David Lyon's definition, which of the following is NOT one of the stated purposes of surveillance?
a) Protection b) Entertainment c) Management d) Direction
2. Which term describes the surveillance of people primarily through the collection and processing of data traces — such as purchase histories, browsing records, and location data?
a) Panopticism b) Synopticism c) Dataveillance d) Social sorting
3. Thomas Mathiesen coined the concept of "synopticism" to describe:
a) The few watching the many through hidden cameras b) The many watching the few, as in mass media audiences watching celebrities c) Citizens watching themselves through self-tracking apps d) Government agencies watching commercial corporations
4. "Visibility asymmetry" refers to:
a) The technical difference in image resolution between surveillance cameras b) The structural imbalance between the watcher who has full information and the watched who does not c) The fact that some surveillance systems can see in the dark d) The disparity in how many cameras are installed in wealthy versus poor neighborhoods
5. When the Social Security number, originally created solely for Social Security benefit tracking, became a universal identifier used by banks, employers, and schools, this is an example of:
a) Visibility asymmetry b) Social sorting c) Function creep d) Dataveillance
6. The chapter's five-category taxonomy of surveillance organizes types of surveillance primarily by:
a) The technology used b) The agent — who is doing the watching and in what institutional context c) The legal status of the watching activity d) The geographic scale of the surveillance
7. A 2016 study of Wikipedia traffic following the Snowden revelations found that:
a) People read more about terrorism topics because of increased media coverage b) Traffic to terrorism-related Wikipedia articles increased as people researched surveillance c) Traffic to terrorism-related Wikipedia articles fell approximately 20% after the Snowden revelations, suggesting a chilling effect d) Wikipedia removed terrorism-related articles in response to government pressure
8. Which of the following best exemplifies "self-surveillance"?
a) A government agency tracking a citizen's phone calls b) An employer monitoring an employee's keyboard activity c) A person using a food-logging app to track their daily caloric intake d) A social media platform building a behavioral profile of a user
9. "Social sorting," as used by David Lyon, refers to:
a) The algorithmic arrangement of social media posts in a user's feed b) The use of surveillance data to create and maintain categories that determine differential treatment of populations c) The process by which surveillance systems sort legal from illegal activities d) The arrangement of surveillance cameras in social spaces
10. The "chilling effect" in the context of surveillance means:
a) The cooling of relationships between citizens and governments who surveil them b) The technical effect of cold weather on surveillance equipment performance c) The behavioral modification that occurs when people know they are being or might be watched d) The dampening effect on innovation caused by data regulation
11. Which of the following is the most accurate statement about the history of surveillance?
a) Surveillance is essentially a modern phenomenon enabled by digital technology b) Surveillance originated with the invention of photography in the nineteenth century c) Surveillance has existed as long as power, but digital technology has dramatically changed its scale and persistence d) Surveillance was invented by governments and only later adopted by commercial entities
12. Jordan's warehouse employer tracks their badge location throughout the workday. This is primarily an example of:
a) State surveillance b) Commercial surveillance in a workplace context c) Environmental surveillance d) Domestic surveillance
13. The "consent as fiction" concept addresses the problem that:
a) Surveillance subjects sometimes lie about whether they consented b) Consent buried in long terms-of-service agreements, with no meaningful alternatives, is structurally different from genuine informed consent c) Some surveillance is conducted without any legal consent framework d) Surveillance agencies routinely forge consent documents
14. What distinguishes dataveillance from traditional observation-based surveillance?
a) Dataveillance requires a human observer; traditional surveillance does not b) Dataveillance is always illegal; traditional surveillance is always legal c) Dataveillance operates at greater scale, with persistence, aggregation, and inference capabilities that traditional observation cannot match d) Dataveillance only applies to government surveillance; traditional surveillance includes commercial monitoring
15. In David Brin's "transparent society" proposal, the solution to surveillance asymmetry is:
a) Abolishing all surveillance systems b) Universal mutual transparency — everyone watching everyone, including the powerful c) Encrypting all personal data so it cannot be accessed d) Requiring government licenses for all surveillance activity
Part B: Short Answer (5 points each)
Answer each of the following questions in 3–5 sentences. Be precise and use chapter vocabulary.
16. Explain why the word "routine" in Lyon's definition of surveillance is politically significant. What does it mean for surveillance to be routine, and why does routineness make surveillance harder to contest?
17. The chapter presents three objections to the "nothing to hide, nothing to fear" argument: the Power Objection, the Freedom Objection, and the Equity Objection. Briefly explain each in your own words.
18. What is the difference between panopticism and synopticism? Give one contemporary example of each.
19. Explain the concept of "aggregation" in the context of dataveillance. Why might individually innocuous pieces of data become significant when combined?
20. Jordan's Tuesday included surveillance from at least five different categories. Choose three of the surveillance encounters described in the chapter and, for each, identify: (a) the category of surveillance; (b) the visibility asymmetry present; and (c) one way in which Jordan's consent was nominal rather than meaningful.
Answer Key Notes
(For instructor use — or for self-assessment after completing the quiz)
Part A Answers: 1. b (entertainment is not among Lyon's stated purposes) 2. c (dataveillance) 3. b (many watching the few) 4. b (structural imbalance in information) 5. c (function creep) 6. b (organized by agent/institutional context) 7. c (fell approximately 20%) 8. c (food logging app) 9. b (differential treatment of populations) 10. c (behavioral modification under observation) 11. c (historical continuity + digital change in scale) 12. b (commercial surveillance in workplace context) 13. b (structural difference from genuine consent) 14. c (scale, persistence, aggregation, inference) 15. b (universal mutual transparency)
Part B Guidance: - Question 16 should reference the normalization of surveillance and the difficulty of contesting background conditions - Question 17 should address power (watcher defines wrongness), freedom (chilling effect), and equity (surveillance falls unequally) - Question 18 should clearly distinguish few→many (panoptic) from many→few (synoptic) - Question 19 should explain that innocent data points (name, employer, neighborhood) become revealing when combined - Question 20 should demonstrate ability to apply taxonomy and analyze specific examples from Jordan's day
Chapter 1 | Part 1: Foundations | The Architecture of Surveillance