• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Using data from items A, B and C and elsewhere, discuss how far methods of social control have become bureaucratised in the last two hundred years.

Extracts from this document...


Michelle Deluce Tutor Joanne Green Criminology Page 1 SOCIAL CONTROL ORGANISATIONS Using data from items A, B and C and elsewhere, discuss how far methods of social control have become bureaucratised in the last two hundred years. From the information provided it shows how different methods of social control have developed over the past two hundred years from public displays of control to the development of early prisons up to present day with CCTV and computerised systems. The post modernist Michel Foucault wrote his book Discipline and Punish (1977) in which he looks at the development of the prison system from 18th century to modern time. He found that two hundred years back, when a person was found guilty of a criminal act, the sovereign or ruler at the time decided their fate. In That time there was no such thing as bureaucracy, there were no files or records on a person in which to retrieve or further document, a decision was made and the outcome was in the form of a public display of punishment by flogging, the stocks or torture and sometimes death. ...read more.


This prison was a basis for the design of other more modern prisons such as Pentonville. The present day has newer more complex methods of control in place and simpler methods have given way to bureaucratisation, our very lives are documented, filed, and can be raised at any time by institutions that may request it to be. Everything we do can be computerised in the form of taxes, credit card transactions, driving licences and employment records as well as many others; we are all socially controlled in one way or another. There is the implement of CCTV's in high streets, office buildings council housing estates and other public places in which we can be watched and viewed at most times in the day or night. We are all entangled in red tape and bureaucracy at sometime in our lives whether we are aware or not and for the justice system there isn't any let off in that there seems to be a system in place for everything, from beginning to end there is a system. ...read more.


only criminals and those doing something they shouldn't be would take the view that CCTV is not in our best interest. Though it does seem to be the natural order of things and as time moves on it becomes almost invisible and unthought-of as we go about our lives often oblivious of being watched from afar. Perhaps its control gone mad or is it for our own safety that such mechanisms are in place, but are they really for our benefit? In the future where will surveillance be? Will our DNA be recorded from birth? All questions to consider. Looking at how far we have come in two hundred years it is easy to wonder what next? And are we really a free society as we are often told by those whom are in power, who make the decisions for us but lead us to believe we are making them for ourselves. It is an endless debate were not everyone will agree on which as always been the case or bureaucracy may never have been born had we all shared the same opinion. Bureaucracy is a safety net for those within institutions enabling them backup when required covering their own backs in any situation. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    Today's date is obtained from the computer's internal clock. Processes: - The computer uses a formula to calculate the age of the employee. This formula will be something along the lines of today's date minus the employee's date of birth. 12. The total price of the rental will be calculated automatically Inputs: - Number of Days, Daily rental price.

  2. Peer reviewed

    Computer Crime

    5 star(s)

    a clever disguise as a game, could access and remotely store: * Address and Contact Book * Safari and Youtube Searches * Consumer's Name and Email Parameters (including login data) * UUID, ICCID, IMSI (IMSI allowing to track although the device has been changed) * Keyboard Cache (equal to key-logging)

  1. The Impact of Mobile Phones on social Interaction

    > State-of-the-art handsets > Personalisation of content Region 2000 2001 2002 2003 2004 2005 North America 0.0 0.1 0.2 0.7 1.8 3.5 Western Europe 0.0 0.1 0.5 1.7 4.6 7.8 Asia 0.4 1.3 2.6 5.0 7.4 9.4 Latin America 0.0 0.0 0.0 0.1 0.2 0.5 Other 0.0 0.0 0.1 0.2

  2. Threats to Data

    This not only reduces the number of opportunities for someone to use the data illegally but reduces the number of suspects should the worse happen. It makes sense therefore to restrict the access to the machines holding the data to those people who need it to do their jobs.

  1. Theory of data communication

    This will need to point out the similarities and differences between the two models. LEARNER INSTRUCTIO The theory of data communications By Olateju Famuyiwa This book gives details of the basics of communication devices and methods of communication used within networking and the internet environment.

  2. Database Analysis & Design

    Logical Data Modelling Within this section I will describe the three different concepts involved within a logical data model, There are three concepts involved, * Data Dictionary * Normalisation * ERD (Entity Relationship Diagram) Data Dictionary A data dictionary is a file or document which defines the whole structure and organisation of a database or data model.

  1. From the e-commerce strategy you gave me earlier I understand that by having a ...

    The act says that you cannot retain information for longer than necessary to fulfil the purpose(s) for which it was intended. The four things you need to consider in relation to principle 5 are:- I. Review how long you keep the data II.

  2. Website Design, Creation and Evaluation

    This option would offer much more freedom, however it would provide very little information on the integrity of the html code. There are several text editors with in-built HTML syntax such as jEdit, or EditPlus. 3.3 Conclusion Before I begin the design of my own website it is important to pin down some specifics.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work