Chapter 4 Exercises: The Industrial Eye


Level 1: Recall and Comprehension

Exercise 4.1 — Key Figures and Systems (15 minutes)

For each of the following figures or systems, write 2–3 sentences explaining their significance for the history of industrial surveillance:

  1. Frederick Winslow Taylor
  2. The factory clock
  3. The time card
  4. The foreman
  5. Henry Ford's Sociological Department
  6. Alphonse Bertillon
  7. Francis Galton
  8. Frank and Lillian Gilbreth

Exercise 4.2 — Taylor's Problem (10 minutes)

Taylor identified "soldiering" as the central problem of industrial management. Answer: 1. What is soldiering? 2. Why was it rational from the workers' perspective? 3. What solution did Taylor propose? 4. Did his solution work? Why or why not?


Exercise 4.3 — The Piece-Rate System (10 minutes)

Explain how the piece-rate system functioned as behavioral modification through visibility. Address: (a) what made it a surveillance mechanism; (b) what made it a behavioral modification mechanism; and (c) why it ultimately reproduced the soldiering problem it was designed to solve.


Level 2: Application

Exercise 4.4 — The Industrial-Digital Parallel (30 minutes)

The chapter provides a table comparing industrial surveillance tools with their contemporary equivalents. Extend this analysis with a deeper look at one row of the table.

Choose one of the following industrial surveillance technologies and analyze its contemporary equivalent in 300–400 words:

Option A: The time card and contemporary clock-in/clock-out apps Option B: The foreman and algorithmic management dashboards Option C: The time-and-motion study and keystroke logging software Option D: Ford's Sociological Department and social media background checks

Your analysis should address: (a) what makes the contemporary system structurally similar to the industrial original; (b) what is genuinely different about the contemporary system; and (c) whether the differences change the ethical and power analysis.


Exercise 4.5 — Taylor's Primary Source (25 minutes)

Return to the Taylor primary source excerpt in Section 4.3.1. Taylor claims that scientific management replaces "arbitrary power" with "accumulated and carefully investigated fact." He also claims that it benefits both management and workers by expanding the total surplus.

  1. What does Taylor mean by "arbitrary power"? Is the discretion of the individual foreman genuinely arbitrary?
  2. Does replacing foreman discretion with measurement eliminate power asymmetry, or does it relocate it? Who controls the measurement system?
  3. Is Taylor's claim that scientific management benefits workers as well as owners credible? What evidence from the chapter supports or undermines this claim?
  4. Write a response to Taylor from the perspective of a skilled worker in 1911 who is about to have a time-and-motion study conducted on their work.

Exercise 4.6 — Ford's Sociological Department (25 minutes)

Henry Ford's Sociological Department extended employer surveillance from the factory floor into workers' homes and private lives.

  1. Identify three specific elements of the Sociological Department's investigation that you find most concerning from a contemporary privacy perspective, and explain why.
  2. Ford justified the Sociological Department as ensuring workers could responsibly manage higher wages. Evaluate this justification using the paternalism framework introduced in Section 4.5.2.
  3. The contemporary equivalent of the Sociological Department might include: social media background checks, credit checks for non-financial employment, drug testing, and fitness tracking requirements. Which of these do you find most analogous to Ford's home visits? Which seems most different? Why?

Level 3: Analysis

Exercise 4.7 — Deskilling and Dataveillance (30 minutes)

Harry Braverman argued that Taylor's time-and-motion studies were a mechanism for "deskilling" workers — appropriating their craft knowledge and transferring it to management, reducing workers' labor-market power.

Write a 350-word analysis applying this concept to contemporary dataveillance:

Can algorithmic management systems "deskill" knowledge workers? Identify a specific category of skilled work (journalism, software engineering, teaching, nursing, financial analysis) and analyze: what tacit knowledge and skilled judgment does the work require? How does performance monitoring software attempt to measure this work? What aspects of the skill cannot be measured? What happens when only the measurable aspects are monitored and rewarded?


Exercise 4.8 — Labor's Response Analysis (25 minutes)

The chapter identifies several labor responses to industrial surveillance: collective bargaining, soldiering, opacity, and sabotage.

  1. For each response, analyze its effectiveness: does it reduce the surveillance, reduce the harm of the surveillance, or merely create the appearance of compliance while preserving worker autonomy?

  2. The chapter notes that soldiering was both a management problem (from Taylor's perspective) and a form of worker resistance (from the labor historian's perspective). Analyze this dual characterization. Can something be simultaneously rational self-interest and political resistance?

  3. Contemporary equivalents: match each historical labor response to a contemporary equivalent (e.g., the historical time-card manipulation → contemporary mouse jigglers or "idle busters"). For each contemporary equivalent, analyze whether the technology of resistance has kept pace with the technology of surveillance.


Exercise 4.9 — Photography as Identification Surveillance (20 minutes)

The mugshot — the standardized identification photograph — was analyzed as a technology of deindividuation: stripping the subject's self-presentation to impose a format designed for institutional identification.

  1. Compare the mugshot to the selfie. Both are photographic portraits. What is structurally different about the contexts of production, the purpose, the subject's control over the image, and the audience?

  2. Is there a contemporary equivalent to the mugshot in non-criminal contexts? Consider: passport photos, employee ID photos, employee monitoring software screenshots, biometric enrollment photos. How do these compare to the mugshot in terms of the subject's control and the institutional purpose?

  3. Galton's fingerprint classification system was designed for criminal identification but has expanded (through AFIS and NGI) to include millions of non-criminals. Apply the concept of function creep to this expansion. At what point did the function of fingerprinting creep beyond its original stated purpose? Who benefited from each expansion?


Level 4: Synthesis

Exercise 4.10 — The Remote Work Monitor (45 minutes)

You are a consultant hired by a mid-sized technology company that has transitioned to fully remote work. The CEO asks you to recommend a remote work monitoring policy.

The company's concerns: - Ensuring that employees are working during stated hours - Maintaining productivity on projects with deadlines - Managing employees fairly without access to direct observation

Employee concerns (from an internal survey): - Privacy in home environments - Trust — being monitored feels like not being trusted - Stress from constant evaluation - Difficulty separating work and personal life

Drawing on Chapter 4's analysis of industrial surveillance and the research study in Section 4.10, design a monitoring policy that: 1. Addresses the company's legitimate concerns 2. Minimizes the harms to employees 3. Applies the research finding (high-intensity monitoring is counterproductive for complex work) 4. Establishes clear visibility symmetry: employees know exactly what is monitored, how, and for what purpose 5. Builds in employee input and appeals processes

Present your policy as a structured document (500 words) and explicitly justify each element by reference to evidence or principles from this chapter.


Exercise 4.11 — A Genealogy of Performance Management (40 minutes)

Trace the genealogy of one contemporary performance management system from its industrial origins to the present.

Recommended focus: The numerical performance rating system (1 = unsatisfactory, 3 = meets expectations, 5 = exceeds expectations) used in most corporate annual reviews.

Your genealogy should: - Identify the industrial predecessor (Taylor's time-and-motion study; Gantt's production scheduling; piece-rate calculation) - Trace the development through the mid-twentieth century (management by objectives, GE's forced ranking) - Describe the contemporary form - Analyze what has been continuous across each transformation (the quantification of the worker) and what has changed - Assess the genealogy's implications for how we evaluate current performance management practices


Level 5: Evaluation

Exercise 4.12 — Evaluating Scientific Management (40 minutes)

Frederick Taylor's Principles of Scientific Management has been celebrated as a contribution to organizational efficiency and condemned as a tool of labor exploitation. Both judgments have evidence.

Write a 600-word evaluative essay that: 1. Presents the strongest case for Taylor's positive contribution (efficiency, predictability, elimination of arbitrary foreman power) 2. Presents the strongest case for the critical evaluation (deskilling, labor surveillance, extraction of craft knowledge) 3. Assesses what Taylor got empirically right and empirically wrong (draw on the research study in Section 4.10) 4. Reaches your own evaluation: Is Taylorism a net positive development in the history of management, a net negative, or something more complex?


Exercise 4.13 — Ethics of Workplace Monitoring (35 minutes)

Drawing on all four chapters of Part 1, write a 500-word analysis of the ethics of contemporary workplace surveillance.

Your analysis should address: 1. What is the legitimate surveillance interest of employers? (Do employers have a genuine and defensible interest in monitoring employee work?) 2. What are the minimum conditions under which workplace surveillance is ethically acceptable? 3. Where is the line between acceptable monitoring and surveillance that violates employees' fundamental rights or dignity? 4. Does your analysis differ for physical vs. digital workplaces? For hourly vs. salaried workers? For routine vs. creative work? 5. What regulatory framework would best govern workplace surveillance?


Discussion Questions

  1. Taylor claimed that scientific management would benefit workers as well as owners. More than a century later, the descendants of Taylorism — algorithmic management systems — are generating significant worker dissatisfaction and stress. Was Taylor's claim ever credible, or was it always primarily ideological cover for intensified surveillance and control?

  2. The chapter argues that the remote work monitoring software deployed during COVID-19 is "structurally identical" to the industrial engineer with a stopwatch. Is this structurally identical claim persuasive? What is actually identical, and what is different in ways that matter?

  3. Ford's Sociological Department required workers' families and homes to meet Ford's standards of domestic propriety. Contemporary employers conduct social media background checks that examine workers' public online behavior. What is the most significant difference between these two forms of extra-workplace surveillance? Does the difference matter ethically?

  4. Labor's most effective responses to industrial surveillance were collective — unions, collective bargaining, informal quotas enforced through solidarity. What are the prospects for collective responses to digital workplace surveillance? What makes collective action more difficult in gig-economy and remote-work contexts?

  5. The chapter notes that the foreman's arbitrary discretion — the source of racial and ethnic discrimination in industrial workplaces — was partly replaced by measurement systems (Taylor's time-and-motion studies, Ford's Sociological Department investigations). Did systematic measurement eliminate discrimination, reduce it, or reproduce it in different forms? What does contemporary evidence about algorithmic management systems suggest about this question?


Chapter 4 | Part 1: Foundations | The Architecture of Surveillance