{"id":546,"date":"2020-02-24T17:10:10","date_gmt":"2020-02-24T16:10:10","guid":{"rendered":"http:\/\/www.julienrossi.com\/blog\/?p=546"},"modified":"2020-03-04T11:37:25","modified_gmt":"2020-03-04T10:37:25","slug":"information-et-societes-contemporaines-edition-2020","status":"publish","type":"post","link":"https:\/\/www.julienrossi.com\/blog\/2020\/02\/24\/information-et-societes-contemporaines-edition-2020\/","title":{"rendered":"Information et soci\u00e9t\u00e9s contemporaines, \u00e9dition 2020"},"content":{"rendered":"<p lang=\"fr-FR\"><span style=\"font-size: small;\"><u>Objectif g\u00e9n\u00e9ral du cours<\/u><\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Les flux d\u2019information a toujours ont toujours fait l\u2019objet d\u2019une forme de contr\u00f4le politique. Dans le cadre du capitalisme cognitif contemporain, le contr\u00f4le de l\u2019information et de sa circulation est devenu l\u2019objet d\u2019une attention croissante, tant des autorit\u00e9s publiques que de la soci\u00e9t\u00e9 civile et du secteur priv\u00e9.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">La soci\u00e9t\u00e9 informationnelle dans laquelle nous vivons est \u00e0 la fois la cause et la cons\u00e9quence de la diffusion de nouvelles technologies de l\u2019information et de la communication, qui permettent un traitement automatis\u00e9 et en r\u00e9seau d\u2019informations inscrites sur des supports num\u00e9riques.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">L&#8217;informatique est une affaire d&#8217;informaticiens. Mais pas que. L&#8217;objectif du cours est d&#8217;acqu\u00e9rir les bases th\u00e9oriques dans les diff\u00e9rences sciences sociales pour analyser les transformations \u00e9conomiques et politiques dans la fa\u00e7on de s\u2019informer et de communiquer dans nos soci\u00e9t\u00e9s contemporaines.<\/span><\/p>\n<p lang=\"fr-FR\"><span style=\"font-size: small;\"><u>1. Technologies, communication et soci\u00e9t\u00e9<\/u><\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">La premi\u00e8re s\u00e9ance de trois heures abordera deux th\u00e9matiques\u00a0: d&#8217;abord nous verrons ce que les diff\u00e9rentes sciences sociales ont \u00e0 dire sur la technologie, puis nous aborderons la question de comment l&#8217;informatique transforme les objets et les m\u00e9thodes des sciences sociales en faisant na\u00eetre des projets \u00e9pist\u00e9mologiques nouveaux.<\/span><\/p>\n<p lang=\"fr-FR\"><span style=\"font-size: small;\"><u>2. Informatique, politique et capitalisme informationnel<br \/>\n<\/u><\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">La deuxi\u00e8me s\u00e9ance visera \u00e0 comprendre les liens entre informatique, \u00e9conomie et politique. Nous \u00e9tudierons la relation entre l&#8217;\u00e9volution du milieu technique, et notamment des techniques d&#8217;information et de communication, sur l&#8217;\u00e9volution du capitalisme contemporain, en \u00e9tudiant les th\u00e9ories de la soci\u00e9t\u00e9 en r\u00e9seaux, de la modernit\u00e9 liquide, du capitalisme cognitif et en concluant par une discussion sur le r\u00f4le des plateformes informationnelles dans l&#8217;\u00e9conomie contemporaine.<\/span><\/p>\n<p lang=\"fr-FR\"><span style=\"font-size: small;\"><u>3. Internet est-il ingouvernable ?<\/u><\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">La troisi\u00e8me s\u00e9ance de trois heures posera une question de d\u00e9bat\u00a0: Internet est-il ingouvernable\u00a0?<\/span><\/p>\n<p align=\"justify\"><span style=\"font-size: small;\"><span lang=\"fr-FR\">De la \u00ab\u00a0D\u00e9claration d&#8217;ind\u00e9pendance du Cyberespace\u00a0\u00bb<!-- La mettre en PPT --> aux discours contemporains sur la disruption (des m\u00e9dias, des taxis, de la sant\u00e9 \u2026 ), l&#8217;informatique, et en particulier Internet, semblent \u00e9chapper \u00e0 la r\u00e9gulation.<\/span><\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Cette hypoth\u00e8se souvent reprise dans les discours politiques comme m\u00e9diatiques fera l&#8217;objet d&#8217;une mise \u00e0 l&#8217;\u00e9preuve en \u00e9tudiant diff\u00e9rents domaines de r\u00e9gulation applicables \u00e0 l&#8217;Internet. Le droit \u00e0 la protection des donn\u00e9es \u00e0 caract\u00e8re personnel fera l&#8217;objet d&#8217;une attention particuli\u00e8re.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\">\n<p lang=\"fr-FR\" style=\"text-align: center;\" align=\"justify\">T\u00e9l\u00e9charger le support de cours : <a href=\"http:\/\/www.julienrossi.com\/blog\/wp-content\/uploads\/2020\/02\/ppt-2020-V2.pdf\">ppt 2020 V2<\/a><\/p>\n<p><u><b>Bibliographie<\/b><\/u><\/p>\n<p><a name=\"__DdeLink__21376_1111125361\"><\/a> Acquisti A., Gross R., 2006, \u00ab\u00a0Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook\u00a0\u00bb, <i>Proceedings of the 6th International Conference on Privacy Enhancing Technologies<\/i>, p.\u00a036\u201158.<\/p>\n<p>Alloing C., 2016, \u00ab\u00a0La sousveillance: Vers un renseignement ordinaire\u202f?\u00a0\u00bb, <i>Herm\u00e8s<\/i>, 76, p.\u00a068\u201176.<\/p>\n<p>Bachimont B., 2010, <i>Le sens de la technique: le num\u00e9rique et le calcul<\/i>, Paris, Belles lettres (Encre marine), 185\u00a0p.<\/p>\n<p>Beck U., 2008, <i>La soci\u00e9t\u00e9 du risque<\/i>, Paris, Flammarion.<\/p>\n<p>Bing J., 2009, \u00ab\u00a0Building cyberspace: a brief history of Internet\u00a0\u00bb, dans <i>Internet Governance: Infrastructure and Institutions<\/i>, Oxford, Oxford University Press, p.\u00a08\u201147.<\/p>\n<p>Bird K., 2001, \u00ab\u00a0L\u2019impossible r\u00e9glementation des propos \u00e0 caract\u00e8re raciste aux \u00c9tats-unis\u00a0\u00bb, <i>Revue fran\u00e7aise de droit constitutionnel<\/i>, <i>46<\/i>, 2, p.\u00a0265\u2011287.<\/p>\n<p>Boullier D., 2015, \u00ab\u00a0Les sciences sociales face aux traces du Big Data\u00a0\u00bb, <i>Revue fran\u00e7aise de science politique<\/i>, 5-6, p.\u00a0805\u2011828.<\/p>\n<p>Bourdeloie H., 2014, \u00ab\u00a0Ce que le num\u00e9rique fait aux sciences humaines et sociales. \u00e9pist\u00e9mologie, m\u00e9thodes et outils en questions\u00a0\u00bb, <i>tic&amp;soci\u00e9t\u00e9<\/i>, Vol. 7, N\u00b0 2.<\/p>\n<p>Boyadjian J., 2014, \u00ab\u00a0Twitter, un nouveau \u00ab\u202fbarom\u00e8tre de l\u2019opinion publique\u202f\u00bb\u202f?\u00a0\u00bb, <i>Participations<\/i>, <i>8<\/i>, 1, p.\u00a055.<\/p>\n<p>Bray F., 2007, \u00ab\u00a0Gender and Technology\u00a0\u00bb, <i>Annual Review of Anthropology<\/i>, <i>36<\/i>, 1, p.\u00a037\u201153.<\/p>\n<p>Broca S., 2013, <i>Utopie du logiciel libre\u202f; du bricolage informatique \u00e0 la r\u00e9invention sociale<\/i>, Neuvy-en-Champagne, Le passager clandestin.<\/p>\n<p>Cardon D., 2012, \u00ab\u00a0Le parler priv\u00e9-public des r\u00e9seaux sociaux d\u2019Internet\u00a0\u00bb, dans Proulx S., Millette M., Heaton L. (dirs.), <i>M\u00e9dias sociaux. Enjeux pour la communication<\/i>, Qu\u00e9bec, Presses de l\u2019Universit\u00e9 du Qu\u00e9bec, p.\u00a033\u201145.<\/p>\n<p>Cardon D., Casilli A.A., 2015, <i>Qu\u2019est-ce que le digital labor\u202f?<\/i>, Bry-sur-Marne, INA.<\/p>\n<p>Castells M., 2001, <i>La soci\u00e9t\u00e9 en r\u00e9seaux. Tome 1\u202f: l\u2019\u00e8re de l\u2019information<\/i>, 2e \u00e9dition, Paris, Fayard.<\/p>\n<p>Conseil d<span lang=\"fr-FR\">\u2019\u00c9tat (France), <\/span><span lang=\"fr-FR\">2017.<\/span> <span lang=\"fr-FR\"><i>Puissance publique et plateformes num\u00e9riques\u00a0: accompagner l\u2019\u00ab\u00a0ub\u00e9risation\u00a0\u00bb.<\/i><\/span><span lang=\"fr-FR\"> \u00c9tude annuelle. <\/span><span lang=\"fr-FR\">Paris, <\/span><span lang=\"fr-FR\">D<\/span><span lang=\"fr-FR\">irection de l&#8217;information l\u00e9gale et administrative<\/span><\/p>\n<p>Coslin C., Curien N., 2014, \u00ab\u00a0L\u2019efficacit\u00e9 \u00e0 l\u2019\u00e9tranger des d\u00e9cisions fran\u00e7aises en mati\u00e8re de communication\u00a0: le cas des \u00c9tats-Unis et du Premier Amendement\u00a0\u00bb, <i>LEGICOM<\/i>, <i>52<\/i>, 1, p.\u00a077\u201187.<\/p>\n<p>Couture S., 2012, \u00ab\u00a0L\u2019\u00e9criture collective du code source informatique\u00a0\u00bb, <i>Revue d\u2019anthropologie des connaissances<\/i>, <i>6, n\u00b0 1<\/i>, 1, p.\u00a021\u201142.<\/p>\n<p>Dahlgren P., 1994, \u00ab\u00a0L\u2019espace public et les m\u00e9dias\u202f: une \u00e8re nouvelle\u202f?\u00a0\u00bb, <i>Herm\u00e8s<\/i>, 13\u201114, p.\u00a0243.<\/p>\n<p>Derieux E., 2014, \u00ab\u00a0Une exclusion non l\u00e9galement justifi\u00e9e. Tr\u00e8s favorable aux m\u00e9dias et pr\u00e9judiciable aux victimes d\u2019abus de la libert\u00e9 d\u2019expression\u00a0\u00bb, <i>LEGICOM<\/i>, <i>52<\/i>, 1, p.\u00a015\u201122.<\/p>\n<p>Doty N., Mulligan D.K., 2013, \u00ab\u00a0Internet Multistakeholder Processes and Techno-Policy Standards.\u00a0\u00bb, <i>11<\/i>, p.\u00a0135\u2011184.<\/p>\n<p>Ellul J., 2004, <i>Le syst\u00e8me technicien<\/i>, 2e \u00e9dition, Paris, Cherche Midi.<\/p>\n<p>Flichy P., 2001, <i>L\u2019imaginaire d\u2019Internet<\/i>, Paris, D\u00e9couverte (Sciences et soci\u00e9t\u00e9), 272\u00a0p.<\/p>\n<p>Fran\u00e7ois L., 2014, \u00ab<span style=\"font-size: small;\">\u00a0Les droits nationaux de la libert\u00e9 d\u2019expression et le principe europ\u00e9en de proportionnalit\u00e9\u00a0<\/span>\u00bb, <i>LEGICOM<\/i>, <i>52<\/i>, 1, p.\u00a0101\u2011107.<\/p>\n<p>Ganascia, J-G. 2019. \u00ab Peut-on contenir l<span lang=\"fr-FR\">\u2019intelligence artificielle\u00a0?\u00a0\u00bb, <\/span><span lang=\"fr-FR\"><i>Pouvoirs<\/i><\/span><span lang=\"fr-FR\">, n\u00b0 170, pp. 71-81<\/span><\/p>\n<p>Goupy M., 2014, \u00ab\u00a0La bienveillante neutralit\u00e9 des technologies d\u2019espionnage des communications\u202f: le cas tunisien\u00a0\u00bb, <i>Cultures &amp; Conflits<\/i>, 93, p.\u00a0109\u2011124.<\/p>\n<p>Jaur\u00e9guiberry F., Proulx S., 2011, <i>Usages et enjeux des technologies de communication<\/i>, Toulouse, \u00e9r\u00e8s.<\/p>\n<p>Jones R., Raab C., Sz\u00e9kely I., 2018, \u00ab\u00a0Surveillance and resilience: Relationships, dynamics, and consequences\u00a0\u00bb, <i>Democracy and Security<\/i>, p.\u00a01\u201138.<\/p>\n<p>Kiyindou A., 2009, <i>Les pays en d\u00e9veloppement face \u00e0 la soci\u00e9t\u00e9 de l\u2019information<\/i>, Paris, Harmattan, 267\u00a0p.<\/p>\n<p>Kleinw\u00e4chter W., 2012, \u00ab\u00a0Internet, soci\u00e9t\u00e9s civiles et gouvernements\u202f: cohabitation ou choc des cultures\u202f?\u00a0\u00bb, <i>Politique \u00e9trang\u00e8re<\/i>, <i>Et\u00e9<\/i>, 2, p.\u00a0263\u2011275.<\/p>\n<p>Latouche S., 2012, <i>L\u2019\u00c2ge des limites<\/i>, Paris, Fayard\/Mille et une nuits, 152\u00a0p.<\/p>\n<p>Lessig L., 2000, \u00ab\u00a0Code Is Law\u00a0\u00bb, <i>Harvard Magazine<\/i>.<\/p>\n<p>Loveluck B., 2015, \u00ab\u00a0Internet, une soci\u00e9t\u00e9 contre l\u2019\u00c9tat\u202f?\u00a0\u00bb, <i>R\u00e9seaux<\/i>, 192, p.\u00a0235\u2011270.<\/p>\n<p><span lang=\"fr-FR\">MASSIT-FOLEA, Fran\u00e7oise. <\/span><span lang=\"fr-FR\"><i>La r\u00e9gulation de l\u2019internet : fictions et frictions<\/i><\/span><span lang=\"fr-FR\"> In : <\/span><span lang=\"fr-FR\"><i>Les d\u00e9bats du num\u00e9rique<\/i><\/span><span lang=\"fr-FR\">. Paris:Presses des Mines, 2013<\/span><\/p>\n<p><span lang=\"fr-FR\">Mattatia F.<\/span><span lang=\"fr-FR\">, 2018, <\/span><span lang=\"fr-FR\"><i>RGPD et droit des donn\u00e9es personnelles<\/i><\/span><span lang=\"fr-FR\">, 3e \u00e9dition, Paris, Eyrolles.<\/span><\/p>\n<p>Moulier Boutang Y., 2007, <i>Le capitalisme cognitif. La nouvelle grande transformation.<\/i>, Paris, Editions Amsterdam.<\/p>\n<p>Mumford L., 1964, \u00ab\u00a0Authoritarian and Democratic Technics\u00a0\u00bb, <i>Technology and Culture<\/i>, <i>5<\/i>, 1, p.\u00a01\u20118.<\/p>\n<p>Musiani F., Schafer V., 2011, \u00ab\u00a0Le mod\u00e8le Internet en question (ann\u00e9es 1970-2010)\u00a0\u00bb, <i>Flux<\/i>, <i>n\u00b0 85<\/i>&#8211;<i>86<\/i>, 3, p.\u00a062.<\/p>\n<p>Newman A., 2008, <i>Protectors of Privacy. Regulating Personal Data in the Global Economy<\/i>, Ithaca, Cornell University Press.<\/p>\n<p>Pigeat H., 2003, \u00ab\u00a0Libert\u00e9 de la presse, qualit\u00e9 de l\u2019information. \u00c0 la recherche d\u2019une autor\u00e9gulation\u00a0\u00bb, <i>Commentaire<\/i>, <i>Num\u00e9ro 104<\/i>, 4, p.\u00a0961\u2011968.<\/p>\n<p><span lang=\"fr-FR\">PROULX, Serge, MILLETTE, M\u00e9lanie et HEATON, Lorna (dir.), <\/span><span lang=\"fr-FR\"><i>M\u00e9dias sociaux. Enjeux pour la communication<\/i><\/span><span lang=\"fr-FR\">. Qu\u00e9bec:Presses de l&#8217;Universit\u00e9 du Qu\u00e9bec. 2012<\/span><\/p>\n<p><span lang=\"fr-FR\">Rochelandet F.<\/span><span lang=\"fr-FR\">, 2010, <\/span><span lang=\"fr-FR\"><i>\u00c9conomie des donn\u00e9es personnelles et de la vie priv\u00e9e<\/i><\/span><span lang=\"fr-FR\">, Paris, D\u00e9couverte.<\/span><\/p>\n<p><span lang=\"fr-FR\">Rossi J., 2017, <\/span><span lang=\"fr-FR\">\u00ab\u00a0Les enjeux de l\u2019infrastructure num\u00e9rique dans les politiques de d\u00e9veloppement\u00a0\u00bb, dans <\/span><span lang=\"fr-FR\"><i>Stabilit\u00e9, int\u00e9gration, coop\u00e9ration et d\u00e9veloppement<\/i><\/span><span lang=\"fr-FR\">, Szeged, Centre universitaire francophone (Cahiers du Centre universitaire francophone), p.\u00a0141\u2011166.<\/span><\/p>\n<p><span lang=\"fr-FR\">Rossi J., 2018, <\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">\u00ab\u00a0Qu\u2019est-ce que le droit \u00e0 la protection des donn\u00e9es \u00e0 caract\u00e8re personnel\u202f?\u00a0\u00bb, Working Paper, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Geopolitics of Risk Working Papers<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 1\/2018, Paris, Chaire de g\u00e9opolitique du risque de l\u2019Ecole normale sup\u00e9rieure<\/span><\/span><span lang=\"fr-FR\">.<\/span><\/p>\n<p><span lang=\"fr-FR\">Rouvroy A.<\/span><span lang=\"fr-FR\">, <\/span><span lang=\"fr-FR\">Berns T.<\/span><span lang=\"fr-FR\">, 2013, \u00ab\u00a0Gouvernementalit\u00e9 algorithmique et perspectives d\u2019\u00e9mancipation: Le disparate comme condition d\u2019individuation par la relation\u202f?\u00a0\u00bb, <\/span><span lang=\"fr-FR\"><i>R\u00e9seaux<\/i><\/span><span lang=\"fr-FR\">, <\/span><span lang=\"fr-FR\"><i>177<\/i><\/span><span lang=\"fr-FR\">, 1, p.\u00a0163.<\/span><\/p>\n<p><span lang=\"fr-FR\">Simon B.<\/span><span lang=\"fr-FR\">, 2002, \u00ab\u00a0The Return of Panopticism: Supervision, Subjection and the New Surveillance\u00a0\u00bb, <\/span><span lang=\"fr-FR\"><i>Surveillance &amp; Society<\/i><\/span><span lang=\"fr-FR\">, <\/span><span lang=\"fr-FR\"><i>3<\/i><\/span><span lang=\"fr-FR\">, 1.<\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Sire G.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2017, \u00ab\u00a0Gouverner le HTML\u00a0\u00bb, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>R\u00e9seaux<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 206, p.\u00a037\u201160.<\/span><\/span><\/p>\n<p>Souchier E., 1996, \u00ab\u00a0L\u2019\u00e9crit d\u2019\u00e9cran, pratiques d\u2019\u00e9criture &amp; informatique\u00a0\u00bb, <i>Communication et langages<\/i>, <i>107<\/i>, 1, p.\u00a0105\u2011119.<\/p>\n<p>T\u00fcrk A., 2011, <i>La vie priv\u00e9e en p\u00e9ril: des citoyens sous contr\u00f4le<\/i>, Paris, Odile Jacob, 269\u00a0p.<\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Turner F.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2008, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>From counterculture to cyberculture: Stewart Brand, the Whole Earth Network, and the rise of digital utopianism<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 1. paperback ed, Chicago, Ill., Univ. of Chicago Pr, 327\u00a0p.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Weiss M.-A.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2014, \u00ab\u00a0Libert\u00e9 d\u2019expression sur les r\u00e9seaux sociaux. Regards crois\u00e9s \u00c9tats-Unis\/Europe\u00a0\u00bb, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Documentaliste-Sciences de l\u2019Information<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Vol.\u00a051<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 3, p.\u00a020\u201122.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Winner L.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 1980, \u00ab\u00a0Do Artifacts Have Politics?\u00a0\u00bb, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Daedalus<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>109<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 1, p.\u00a0121\u2011136.<\/span><\/span><\/p>\n<p><span lang=\"fr-FR\">YUDKOWSKY, Eliezer. <\/span><span lang=\"fr-FR\"><i>Staring into the Singularity<\/i><\/span><span lang=\"fr-FR\">. 1996<\/span><\/p>\n<p lang=\"fr-FR\"><span style=\"font-size: small;\"><i>Films<\/i><\/span><\/p>\n<ul>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Citizenfour<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"> (documentaire sur Edward Snowden)<\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>La vie des autres<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"> (film de fiction sur la Stasi)<\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Life of an Agent<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"> (film documentaire sur la formation des agents de la police politique hongroise \u00e0 l&#8217;\u00e9poque de la dictature communiste) (<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Egy \u00fcgyn\u00f6k \u00e9lete magyarul<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">)<\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Pirates of the Silicon Valley<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"> (docufiction, histoire de l&#8217;informatique\u00a0; naissance de Microsoft et d&#8217;Apple)<\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Black Code\u00a0<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">: sur des exemples concrets de surveillance d\u2019\u00c9tat et de ses risques et effets sur la population<\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Nothing to hide\u00a0<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">: documentaire sur <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">la surveillance par les donn\u00e9es contemporaine<\/span><\/span><\/li>\n<\/ul>\n<p lang=\"fr-FR\"><span style=\"font-size: small;\"><i>Vid\u00e9os en ligne<\/i><\/span><\/p>\n<ul>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Richard Stallman\u00a0: \u00ab\u00a0qu&#8217;est-ce que le logiciel libre\u00a0?\u00a0\u00bb (conf\u00e9rence \u00e0 Sciences Po Lille en f\u00e9vrier 2011)\u00a0: <a href=\"http:\/\/www.f.0x2501.org\/p\/rms\/\" target=\"_top\">http:\/\/www.f.0x2501.org\/p\/rms\/<\/a><\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Benjamin Bayart\u00a0: \u00ab\u00a0Internet libre ou le Minitel 2.0\u00a0?\u00a0\u00bb (conf\u00e9rence aux RMLL d&#8217;Amiens en 2007)\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=AoRGoQ76PK8\" target=\"_top\">https:\/\/www.youtube.com\/watch?v=AoRGoQ76PK8<\/a><\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Dominique Cardon\u00a0: \u00ab\u00a0Nos vies \u00e0 l&#8217;heure des big data\u00a0\u00bb (conf\u00e9rence \u00e0 l&#8217;Universit\u00e9 de Nantes de 2010)\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=D_Eyzt2uJZk\" target=\"_top\">https:\/\/www.youtube.com\/watch?v=D_Eyzt2uJZk<\/a><\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Ray Kurzweil at the IMF\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=Vx9RkPYpqag\" target=\"_top\">https:\/\/www.youtube.com\/watch?v=Vx9RkPYpqag<\/a><\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Cha\u00eene Youtube sur les <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>game studies\u00a0<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">: <a href=\"https:\/\/www.youtube.com\/channel\/UCXg4udeWdzZbaL8Y8otOLSw\" target=\"_top\">https:\/\/www.youtube.com\/channel\/UCXg4udeWdzZbaL8Y8otOLSw<\/a><\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Danah boyd\u00a0: \u00ab\u00a0Be careful what you code for\u00a0\u00bb\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=UWBZNxPzoUY\" target=\"_top\">https:\/\/www.youtube.com\/watch?v=UWBZNxPzoUY<\/a><\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Antonio Casilli\u00a0: \u00ab\u00a0Making sense of digital platform labor\u00a0\u00bb (conf\u00e9rence \u00e0 l&#8217;EM Lyon le 21 octobre 2016)\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=hCV1OTSByOQ\" target=\"_top\">https:\/\/www.youtube.com\/watch?v=hCV1OTSByOQ<\/a><\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Yann Moulier-Boutang\u00a0: \u00ab\u00a0R\u00e9gime de la propri\u00e9t\u00e9 dans le capitalisme cognitif\u00a0\u00bb\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=8gXd_YfqtGw\">https:\/\/www.youtube.com\/watch?v=8gXd_YfqtGw<\/a><\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">F\u00e9lix Tr\u00e9guer\u00a0: \u00ab\u00a0Internet et libert\u00e9s publiques\u00a0: ce qui a chang\u00e9 de puis Snowden\u00a0\u00bb\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=FCViX9uaI8E\">https:\/\/www.youtube.com\/watch?v=FCViX9uaI8E<\/a> <\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Ksenia Ermoshina\u00a0: Conf\u00e9rence sur le chiffrement\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=Ka6_gNMILxw\">https:\/\/www.youtube.com\/watch?v=Ka6_gNMILxw<\/a> <\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Guide de la jurisprudence europ\u00e9enne sur la protection des donn\u00e9es\u00a0: <a href=\"http:\/\/www.julienrossi.com\/blog\/wp-content\/uploads\/2018\/10\/guide-de-la-jurisprudence-v0-9-21.pdf\" target=\"_top\">http:\/\/www.julienrossi.com\/blog\/wp-content\/uploads\/2018\/10\/guide-de-la-jurisprudence-v0-9-21.pdf<\/a><\/span><\/span><\/p>\n<p><span lang=\"fr-FR\"><i>Manuel de droit europ\u00e9en en mati\u00e8re de protection des donn\u00e9es \u00e0 caract\u00e8re personnel, <\/i><\/span><span lang=\"fr-FR\">Conseil de l&#8217;Europe, Court Europ\u00e9enne des Droits de l&#8217;Homme et Agence europ\u00e9enne des droits fondamentaux, 2014<\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Disponible en ligne\u00a0: <\/span><\/span><a href=\"http:\/\/www.echr.coe.int\/Documents\/Handbook_data_protection_FRA.pdf\" target=\"_top\"><span style=\"font-size: small;\"><span lang=\"fr-FR\"><u><b>http:\/\/www.echr.coe.int\/Documents\/Handbook_data_protection_FRA.pdf<\/b><\/u><\/span><\/span><\/a><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Mis \u00e0 jour en 2018 (mais disponible uniquement en anglais pour l\u2019instant)\u00a0: <\/span><\/span>Union europ\u00e9enne, Conseil de l\u2019Europe (dirs.), 2018, <i>Handbook on European data protection law<\/i>, 2018 edition, Luxembourg, Publications Office of the European Union (Handbook \/ FRA, European Union Agency for Fundamental Rights), 397\u00a0p.\u00a0<span style=\"font-size: small;\"><span lang=\"fr-FR\">: <\/span><\/span><a href=\"https:\/\/fra.europa.eu\/en\/publication\/2018\/handbook-european-data-protection-law\">https:\/\/fra.europa.eu\/en\/publication\/2018\/handbook-european-data-protection-law<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p lang=\"fr-FR\"><u><b>Pour s&#8217;initier aux aspects techniques<\/b><\/u><\/p>\n<p><span lang=\"fr-FR\">Les meilleurs tutoriels en langue fran\u00e7aise pour s&#8217;initier \u00e0 l&#8217;informatique sont sur le<\/span><span lang=\"fr-FR\">s archives de l\u2019ancien Site du Z\u00e9ro<\/span><span lang=\"fr-FR\">\u00a0: <\/span><a href=\"http:\/\/sdz.tdct.org\/\"><span style=\"color: #000000;\"><span style=\"font-family: Liberation Serif, sans-serif;\"><span style=\"font-size: small;\"><span lang=\"fr-FR\">http:\/\/sdz.tdct.org<\/span><\/span><\/span><\/span><\/a><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Une bonne explication des aspects techniques du r\u00e9seau Internet, par Benjamin Bayart\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=pwT2egqlke4\" target=\"_top\">https:\/\/www.youtube.com\/watch?v=pwT2egqlke4<\/a><\/span><\/span><\/p>\n<p lang=\"fr-FR\"><span style=\"font-size: small;\"><u><b>Pour vous tenir au courant<\/b><\/u><\/span><\/p>\n<p><a href=\"http:\/\/www.zdnet.com\/\" target=\"_top\"><span style=\"font-size: small;\"><span lang=\"fr-FR\"><u><b>www.zdnet.com<\/b><\/u><\/span><\/span><\/a><span style=\"font-size: small;\"><span lang=\"fr-FR\"> \u2192 un journal en ligne sp\u00e9cialis\u00e9 (mais attention \u00e0 la qualit\u00e9 variable des articles)<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Objectif g\u00e9n\u00e9ral du cours Les flux d\u2019information a toujours ont toujours fait l\u2019objet d\u2019une forme de contr\u00f4le politique. Dans le cadre du capitalisme cognitif contemporain, le contr\u00f4le de l\u2019information et de sa circulation est devenu l\u2019objet d\u2019une attention croissante, tant&#8230;<\/p>\n","protected":false},"author":1,"featured_media":448,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[15,29,23,21,24,20,40,17],"class_list":["post-546","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-enseignement","tag-cours","tag-droit","tag-relations-internationales","tag-science-politique","tag-sic","tag-sociologie","tag-technologie","tag-universite-de-szeged"],"_links":{"self":[{"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/posts\/546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/comments?post=546"}],"version-history":[{"count":5,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/posts\/546\/revisions"}],"predecessor-version":[{"id":553,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/posts\/546\/revisions\/553"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/media\/448"}],"wp:attachment":[{"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/media?parent=546"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/categories?post=546"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/tags?post=546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}