{"id":592,"date":"2022-02-21T15:56:56","date_gmt":"2022-02-21T14:56:56","guid":{"rendered":"http:\/\/www.julienrossi.com\/blog\/?p=592"},"modified":"2022-02-21T15:56:56","modified_gmt":"2022-02-21T14:56:56","slug":"information-et-societes-contemporaines-2022","status":"publish","type":"post","link":"https:\/\/www.julienrossi.com\/blog\/2022\/02\/21\/information-et-societes-contemporaines-2022\/","title":{"rendered":"Information et soci\u00e9t\u00e9s contemporaines 2022"},"content":{"rendered":"<p style=\"text-align: left;\" align=\"right\"><span style=\"font-size: small;\"><u>Objectif g\u00e9n\u00e9ral du cours<\/u><\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Nous vivrions, selon l\u2019expression de Manuel Castuells, dans une soci\u00e9t\u00e9 en r\u00e9seaux et dans une \u00e9conomie de capitalisme informationnel. Ces deux expressions font r\u00e9f\u00e9rence \u00e0 la centralit\u00e9 de l\u2019information, de sa circulation et de son contr\u00f4le, dans les soci\u00e9t\u00e9s contemporaines.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">La soci\u00e9t\u00e9 dans laquelle nous vivons est \u00e0 la fois la cause et la cons\u00e9quence de la diffusion de nouvelles technologies de l\u2019information et de la communication, qui permettent un traitement automatis\u00e9 et en r\u00e9seau d\u2019informations inscrites sur des supports num\u00e9riques.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">L&#8217;informatique est une affaire d&#8217;informaticiens. Mais pas que. L&#8217;objectif du cours est d&#8217;acqu\u00e9rir les bases th\u00e9oriques dans les diff\u00e9rences sciences sociales pour analyser les transformations \u00e9conomiques et politiques dans la fa\u00e7on de s\u2019informer et de communiquer dans nos soci\u00e9t\u00e9s contemporaines.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Le cours s\u2019organisera en cinq s\u00e9ances de trois heures.<\/span><\/p>\n<p lang=\"fr-FR\"><span style=\"font-size: small;\"><u>1. L\u2019histoire technopolitique de l\u2019espace public<\/u><\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">De l\u2019invention de l\u2019\u00e9criture aux projets de \u00ab\u00a0M\u00e9tavers\u00a0\u00bb dont l\u2019objectif est de \u00ab\u00a0d\u00e9mocratiser\u00a0\u00bb la r\u00e9alit\u00e9 augment\u00e9e, en passant par l\u2019invention de l\u2019imprimerie, les techniques d\u2019\u00e9critures, de communication et de gestion de l\u2019information ont beaucoup \u00e9volu\u00e9. L\u2019espace public bourgeois lib\u00e9ral th\u00e9oris\u00e9 par J\u00fcrgen Habermas et revisit\u00e9 sous l\u2019\u0153il critique de Nancy Fraser repose sur des \u00e9volutions sociales, d\u2019ordre culturel, \u00e9conomique et politique, mais aussi une infrastructure technique qui permet la circulation de l\u2019information. La forme mat\u00e9rielle de cette infrastructure n\u2019est pas sans incidence sur l\u2019histoire de l\u2019espace public, et sur celle, parall\u00e8le, des luttes pour son contr\u00f4le, que F\u00e9lix Tr\u00e9guer expose dans ses travaux.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\"><i>Lectures conseill\u00e9es<\/i><\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Bourdieu P., 1996, <i>Sur la t\u00e9l\u00e9vision<\/i>, Paris, Raisons d\u2019agir, 95\u00a0p.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Cazenave \u00c9., Ulmann-Mauriat C., 1994, <i>Presse, radio et t\u00e9l\u00e9vision en France de 1631 \u00e0 nos jours<\/i>, Paris, Hachette (Carr\u00e9 histoire), 253\u00a0p.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Eisenstein E.L., 1979, <i>The printing press as an agent of change: communications and cultural transformations in early modern Europe<\/i>, Cambridge [Eng.]\u202f; New York, Cambridge University Press.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Fraser N., 2013, \u00ab\u00a0Repenser la sph\u00e8re publique\u202f: une contribution \u00e0 la critique de la d\u00e9mocratie telle qu\u2019elle existe r\u00e9ellement\u00a0\u00bb, <i>Herm\u00e8s, La Revue<\/i>, 31, traduit par Valenta M., p.\u00a0125\u2011156.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Fraser N., 2007, \u00ab\u00a0Special Section: Transnational Public Sphere: Transnationalizing the Public Sphere: On the Legitimacy and Efficacy of Public Opinion in a Post-Westphalian World\u00a0\u00bb, <i>Theory, Culture &amp; Society<\/i>, <i>24<\/i>, 4, p.\u00a07\u201130.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Goody J., 1979, <i>La raison graphique, la domestication de la pens\u00e9e sauvage<\/i>, Paris, Les \u00e9ditions de minuit.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Habermas J., 1988, <i>L\u2019espace public: arch\u00e9ologie de la publicit\u00e9 comme dimension constitutive de la soci\u00e9t\u00e9 bourgeoise<\/i>, Paris, Payot (Critique de la politique Payot), 324\u00a0p.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Katz E., Lazarsfeld P.F., 2008 [1955], <i>Influence personnelle: Ce que les gens font des m\u00e9dias<\/i>, Paris; Paris, A. Colin\u202f; INA. Institut national de l\u2019audiovisuel.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Katz E., 2009, \u00ab\u00a0The End of Television?\u00a0\u00bb, <i>The ANNALS of the American Academy of Political and Social Science<\/i>, <i>625<\/i>, 1, p.\u00a06\u201118.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Kumar S., 2019, \u00ab\u00a0The algorithmic dance: YouTube\u2019s Adpocalypse and the gatekeeping of cultural content on digital platforms\u00a0\u00bb, <i>Internet Policy Review<\/i>, <i>8<\/i>, 2.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Origgi G., 2013, \u00ab\u00a0Democracy and Trust in the Age of the Social Web\u00a0\u00bb, dans Bovero M. (dir.), <i>Teoria Politica &#8211; Nuova Serie &#8211; Annali III<\/i>, Madrid, Marcial Pons, p.\u00a023\u201138.<\/span><\/p>\n<p lang=\"fr-FR\"><span style=\"font-size: small;\"><u>2. La libert\u00e9 d\u2019expression, de la presse de masse \u00e0 Internet<\/u><\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">La libert\u00e9 d\u2019expression est proclam\u00e9e, entre autres, \u00e0 l\u2019article 10 de la Convention europ\u00e9enne de sauvegarde des droits de l\u2019Homme et des libert\u00e9s fondamentales et, aux \u00c9tats-Unis, par le Premier amendement \u00e0 la Constitution. Les deux textes divergent pourtant sur des points essentiels. Ainsi, m\u00eame au sein des d\u00e9mocraties lib\u00e9rales, la libert\u00e9 d\u2019expression ne va pas de soi. Nous parlerons de l\u2019histoire de cette libert\u00e9 d\u2019expression, de ses fondements juridiques, et nous parlerons des \u00e9volutions juridiques et des controverses politiques contemporaines qui portent sur le contr\u00f4le de l\u2019espace public en ligne.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\"><i>Lectures conseill\u00e9es<\/i><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Badouard R., 2020, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Les nouvelles lois du web: mod\u00e9ration et censure<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, Paris, Seuil.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Bird K., 2001, \u00ab<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">\u00a0L\u2019impossible r\u00e9glementation des propos \u00e0 caract\u00e8re raciste aux \u00c9tats-unis\u00a0\u00bb, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Revue fran\u00e7aise de droit constitutionnel<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>46<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2, p.\u00a0265\u2011287.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Coslin C.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">Curien N.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2014, \u00ab\u00a0L\u2019efficacit\u00e9 \u00e0 l\u2019\u00e9tranger des d\u00e9cisions fran\u00e7aises en mati\u00e8re de communication\u00a0: le cas des \u00c9tats-Unis et du Premier Amendement\u00a0\u00bb, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>LEGICOM<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>52<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 1, p.\u00a077\u201187.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Dahlgren P.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 1994, \u00ab\u00a0L\u2019espace public et les m\u00e9dias\u202f: une \u00e8re nouvelle\u202f?\u00a0\u00bb, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Herm\u00e8s<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 13\u201114, p.\u00a0243.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Derieux E.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2014, \u00ab\u00a0Une exclusion non l\u00e9galement justifi\u00e9e. Tr\u00e8s favorable aux m\u00e9dias et pr\u00e9judiciable aux victimes d\u2019abus de la libert\u00e9 d\u2019expression\u00a0\u00bb, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>LEGICOM<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>52<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 1, p.\u00a015\u201122.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Fran\u00e7ois L., 2014, \u00ab<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">\u00a0Les droits nationaux de la libert\u00e9 d\u2019expression et le principe europ\u00e9en de proportionnalit\u00e9\u00a0<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">\u00bb, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>LEGICOM<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">,<\/span><\/span> <span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>52<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 1, p.\u00a0101\u2011107.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Pigeat H.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2003, \u00ab\u00a0Libert\u00e9 de la presse, qualit\u00e9 de l\u2019information. \u00c0 la recherche d\u2019une autor\u00e9gulation\u00a0\u00bb, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Commentaire<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Num\u00e9ro 104<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 4, p.\u00a0961\u2011968.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Tr\u00e9guer<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"> F., 2019, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>L\u2019utopie d\u00e9chue: une contre-histoire d\u2019Internet, XVe-XXIe si\u00e8cle<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, Paris, Fayard.<\/span><\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Weiss M.-A., 2014, \u00ab\u00a0Libert\u00e9 d\u2019expression sur les r\u00e9seaux sociaux. Regards crois\u00e9s \u00c9tats-Unis\/Europe\u00a0\u00bb, <i>Documentaliste-Sciences de l\u2019Information<\/i>, <i>Vol.\u00a051<\/i>, 3, p.\u00a020\u201122.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\"><u>3. Technologie, \u00e9conomie et soci\u00e9t\u00e9\u00a0: les mutations contemporaines des sciences et du capitalisme<\/u><\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Le milieu technique d\u00e9termine-t-il une soci\u00e9t\u00e9 et sa culture, ou ses derni\u00e8res d\u00e9terminent-elles le milieu technique\u00a0? Difficile de s\u2019extraire de ce dilemme de l\u2019\u0153uf ou de la poule. Nous \u00e9tudierons quelques th\u00e9ories issues de la sociologie et de la philosophie des sciences et des techniques pour comprendre la relation entre technologie et soci\u00e9t\u00e9, puis nous verrons ce que les th\u00e9ories \u00e9conomiques et socio-\u00e9conomiques nous apprennent des mutations du capitalisme contemporain, lesquelles prennent appui sur les (pour partie nouvelles) possibilit\u00e9s offertes par le milieu technique.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\"><i>Lectures conseill\u00e9es<\/i><\/span><\/p>\n<p><span style=\"font-size: small;\">Bachimont B., 2010, <\/span><span style=\"font-size: small;\"><i>Le sens de la technique: le num\u00e9rique et le calcul<\/i><\/span><span style=\"font-size: small;\">, Paris, Belles lettres (Encre marine), 185\u00a0p.<\/span><\/p>\n<p><span style=\"font-size: small;\">Beck U.<\/span><span style=\"font-size: small;\">, 2008, <\/span><span style=\"font-size: small;\"><i>La soci\u00e9t\u00e9 du risque<\/i><\/span><span style=\"font-size: small;\">, Paris, Flammarion.<\/span><\/p>\n<p><span style=\"font-size: small;\">Boullier D., 2015, \u00ab<\/span><span style=\"font-size: small;\">\u00a0Les sciences sociales face aux traces du Big Data\u00a0\u00bb, <\/span><span style=\"font-size: small;\"><i>Revue fran\u00e7aise de science politique<\/i><\/span><span style=\"font-size: small;\">, 5-6, p.\u00a0805\u2011828.<\/span><\/p>\n<p><span style=\"font-size: small;\">Bourdeloie H.<\/span><span style=\"font-size: small;\">, 2014, \u00ab\u00a0Ce que le num\u00e9rique fait aux sciences humaines et sociales. \u00e9pist\u00e9mologie, m\u00e9thodes et outils en questions\u00a0\u00bb, <\/span><span style=\"font-size: small;\"><i>tic&amp;soci\u00e9t\u00e9<\/i><\/span><span style=\"font-size: small;\">, Vol. 7, N\u00b0 2.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Boyadjian J., 2014, \u00ab\u00a0Twitter, un nouveau \u00ab\u202fbarom\u00e8tre de l\u2019opinion publique\u202f\u00bb\u202f?\u00a0\u00bb, <i>Participations<\/i>, 8, 1, p.\u00a055.<\/span><\/p>\n<p><span style=\"font-size: small;\">Cardon D.<\/span><span style=\"font-size: small;\">, <\/span><span style=\"font-size: small;\">Casilli A.A.<\/span><span style=\"font-size: small;\">, 2015, <\/span><span style=\"font-size: small;\"><i>Qu\u2019est-ce que le digital labor\u202f?<\/i><\/span><span style=\"font-size: small;\">, Bry-sur-Marne, INA.<\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Castells M.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2001, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>La soci\u00e9t\u00e9 en r\u00e9seaux. Tome 1\u202f: l\u2019\u00e8re de l\u2019information<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2e \u00e9dition, Paris, Fayard.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Cecere G., Guel F.L., Rochelandet F., 2015, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">\u00ab\u00a0Les mod\u00e8les d\u2019affaires num\u00e9riques sont-ils trop indiscrets\u202f?, Are digital business models too indiscreet?\u00a0\u00bb, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>R\u00e9seaux<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 189, p.\u00a077\u2011101.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Ellul J.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2004, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Le syst\u00e8me technicien<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2e \u00e9dition, Paris, Cherche Midi.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Jaur\u00e9guiberry F.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">Proulx S.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2011, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Usages et enjeux des technologies de communication<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, Toulouse, \u00e9r\u00e8s.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Latouche S., 2012, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>L\u2019\u00c2ge des limites<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, Paris, Fayard\/Mille et une nuits, 152\u00a0p.<\/span><\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Moulier Boutang Y., 2007, Le capitalisme cognitif. La nouvelle grande transformation., Paris, Editions Amsterdam.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Mumford L., 1964, \u00ab\u00a0Authoritarian and Democratic Technics\u00a0\u00bb, <i>Technology and Culture<\/i>, <i>5<\/i>, 1, p.\u00a01\u20118.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Winner L., 1980, \u00ab\u00a0Do Artifacts Have Politics?\u00a0\u00bb, <i>Daedalus<\/i>, <i>109<\/i>, 1, p.\u00a0121\u2011136.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\"><u>4. De la protection des donn\u00e9es \u00e0 caract\u00e8re personnel au droit de l\u2019intelligence artificielle\u00a0?<\/u><\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Le traitement automatis\u00e9 de donn\u00e9es \u00e0 caract\u00e8re personnel, parfois pour alimenter des algorithmes de prise de d\u00e9cision automatis\u00e9e qui peuvent \u00eatre, selon les d\u00e9finitions, des algorithmes dits d\u2019intelligence artificielle, facilite grandement la surveillance et des modalit\u00e9s de contr\u00f4le des individus et des groupes. La gouvernementalit\u00e9 algorithmique, d\u00e9crite par Antoinette Rouvroy et Thomas Berns, et la culture de la surveillance, d\u00e9crite par David Lyon, r\u00e9sultent certes de mutations institutionnelles, politiques et sociales propres \u00e0 la modernit\u00e9 liquide th\u00e9oris\u00e9e par Zygmunt Bauman, qui transforment en profondeur nos fa\u00e7ons de construire la confiance en faisant de plus en plus reposer cette derni\u00e8re sur le calcul et le profilage. La vie priv\u00e9e est-elle pour autant condamn\u00e9e \u00e0 une lente agonie\u00a0? En partant d\u2019une discussion de la d\u00e9finition de la \u00ab\u00a0vie priv\u00e9e\u00a0\u00bb et de son rapport au milieu technique et \u00e0 ses \u00e9volutions, nous verrons comment celle-ci peut \u00eatre con\u00e7ue comme l\u2019objet du droit \u00e0 la vie priv\u00e9e. Cela nous am\u00e8nera \u00e0 \u00e9tudier le droit de la protection des donn\u00e9es \u00e0 caract\u00e8re personnel\u00a0: ses grandes d\u00e9finitions, ses grands principes, les droits des personnes concern\u00e9es, la r\u00e9glementation des transferts, et l\u2019approche dite par le risque.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\"><i>Lectures conseill\u00e9es<\/i><\/span><\/p>\n<p><span style=\"font-size: small;\">Acquisti A.<\/span><span style=\"font-size: small;\">, <\/span><span style=\"font-size: small;\">Gross R.<\/span><span style=\"font-size: small;\">, 2006, \u00ab\u00a0Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook\u00a0\u00bb, <\/span><span style=\"font-size: small;\"><i>Proceedings of the 6th International Conference on Privacy Enhancing Technologies<\/i><\/span><span style=\"font-size: small;\">, p.\u00a036\u201158.<\/span><\/p>\n<p><span style=\"font-size: small;\">Alloing C.<\/span><span style=\"font-size: small;\">, 2016, \u00ab\u00a0La sousveillance: Vers un renseignement ordinaire\u202f?\u00a0\u00bb, <\/span><span style=\"font-size: small;\"><i>Herm\u00e8s<\/i><\/span><span style=\"font-size: small;\">, 76, p.\u00a068\u201176.<\/span><\/p>\n<p><span style=\"font-size: small;\">Cardon D.<\/span><span style=\"font-size: small;\">, 2012, \u00ab\u00a0Le parler priv\u00e9-public des r\u00e9seaux sociaux d\u2019Internet\u00a0\u00bb, dans <\/span><span style=\"font-size: small;\">Proulx S.<\/span><span style=\"font-size: small;\">, <\/span><span style=\"font-size: small;\">Millette M.<\/span><span style=\"font-size: small;\">, <\/span><span style=\"font-size: small;\">Heaton L.<\/span><span style=\"font-size: small;\"> (dirs.), <\/span><span style=\"font-size: small;\"><i>M\u00e9dias sociaux. Enjeux pour la communication<\/i><\/span><span style=\"font-size: small;\">, Qu\u00e9bec, Presses de l\u2019Universit\u00e9 du Qu\u00e9bec, p.\u00a033\u201145.<\/span><\/p>\n<p><span style=\"font-size: small;\">Cl\u00e9ment-Fontaine M., 2017, \u00ab\u00a0L\u2019union du droit \u00e0 la protection des donn\u00e9es \u00e0 caract\u00e8re personnel et du droit \u00e0 la vie priv\u00e9e\u00a0\u00bb, <i>LEGICOM<\/i>, <i>N\u00b0 59<\/i>, 2, p.\u00a061\u201168.<\/span><\/p>\n<p><span style=\"font-size: small;\">Englehardt S.<\/span><span style=\"font-size: small;\">, <\/span><span style=\"font-size: small;\">Narayanan A.<\/span><span style=\"font-size: small;\">, 2016, \u00ab\u00a0Online Tracking:A 1-million-site Measurement and Analysis\u00a0\u00bb, <\/span><span style=\"font-size: small;\"><i>ACM Conference on Computer and Communications Security<\/i><\/span><span style=\"font-size: small;\">, <a href=\"https:\/\/www.cs.princeton.edu\/~arvindn\/publications\/OpenWPM_1_million_site_tracking_measurement.pdf\">https:\/\/www.cs.princeton.edu\/~arvindn\/publications\/OpenWPM_1_million_site_tracking_measurement.pdf<\/a>.<\/span><\/p>\n<p><span style=\"font-size: small;\">Gellert R., 2015, \u00ab\u00a0Data protection: a risk regulation? Between the risk management of everything and the precautionary alternative\u00a0\u00bb, <i>International Data Privacy Law<\/i>, <i>5<\/i>, 1, p.\u00a03\u201119.<\/span><\/p>\n<p><span style=\"font-size: small;\">Gray C.<\/span><span style=\"font-size: small;\">, <\/span><span style=\"font-size: small;\">Santos C.<\/span><span style=\"font-size: small;\">, <\/span><span style=\"font-size: small;\">Bielova N.<\/span><span style=\"font-size: small;\">, <\/span><span style=\"font-size: small;\">Toth M.<\/span><span style=\"font-size: small;\">, <\/span><span style=\"font-size: small;\">Clifford D.<\/span><span style=\"font-size: small;\">, 2021, \u00ab\u00a0Dark Patterns and the Legal Requirements of Consent Banners: An Interaction Criticism Perspective\u00a0\u00bb, <\/span><span style=\"font-size: small;\"><i>ACM CHI Conference on Human Factors in Computing Systems<\/i><\/span><span style=\"font-size: small;\">, <a href=\"https:\/\/hal.inria.fr\/hal-03117307\">https:\/\/hal.inria.fr\/hal-03117307<\/a> .<\/span><\/p>\n<p><span style=\"font-size: small;\">Goupy M.<\/span><span style=\"font-size: small;\">, 2014, \u00ab\u00a0La bienveillante neutralit\u00e9 des technologies d\u2019espionnage des communications\u202f: le cas tunisien\u00a0\u00bb, <\/span><span style=\"font-size: small;\"><i>Cultures &amp; Conflits<\/i><\/span><span style=\"font-size: small;\">, 93, p.\u00a0109\u2011124.<\/span><\/p>\n<p><span style=\"font-size: small;\">Jones R.<\/span><span style=\"font-size: small;\">, <\/span><span style=\"font-size: small;\">Raab C.<\/span><span style=\"font-size: small;\">, <\/span><span style=\"font-size: small;\">Sz\u00e9kely I.<\/span><span style=\"font-size: small;\">, 2018, \u00ab\u00a0Surveillance and resilience: Relationships, dynamics, and consequences\u00a0\u00bb, <\/span><span style=\"font-size: small;\"><i>Democracy and Security<\/i><\/span><span style=\"font-size: small;\">, p.\u00a01\u201138.<\/span><\/p>\n<p><span style=\"font-size: small;\">Khatchatourov A., 2018, \u00ab\u00a0La confiance dans le num\u00e9rique. Des signes ext\u00e9rieurs vers la r\u00e9gulation de soi.\u00a0\u00bb, dans Levallois-Barth C. (dir.), <i>Signes de confiance, l\u2019impact des labels sur la gestion des donn\u00e9es personnelles<\/i>, Paris, Telecom ParisTech (Chaire et Valeurs des Politiques des Informations Personnelles), p.\u00a05\u201120.<\/span><\/p>\n<p><span style=\"font-size: small;\">Luk\u00e1cs A., 2016, \u00ab\u00a0What is Privacy? The History and Definition of Privacy\u00a0\u00bb Keresztes G. (dir.), <i>Tavaszi Sz\u00e9l 2016 Tanulm\u00e1nyk\u00f6tet I.<\/i>, p.\u00a0256\u2011265.<\/span><\/p>\n<p><span style=\"font-size: small;\">Lyon D., 2015, <i>Surveillance After Snowden<\/i>, Cambridge, Mass., Polity Press.<\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Mattatia F.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2018, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>RGPD et droit des donn\u00e9es personnelles<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 3e \u00e9dition, Paris, Eyrolles.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Musiani F.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">Schafer V.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2011, \u00ab\u00a0Le mod\u00e8le Internet en question (ann\u00e9es 1970-2010)\u00a0\u00bb, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Flux<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>n\u00b0 85<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">&#8211;<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>86<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 3, p.\u00a062.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Newman A.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2008, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Protectors of Privacy. Regulating Personal Data in the Global Economy<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, Ithaca, Cornell University Press.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Rochelandet F.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2010, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>\u00c9conomie des donn\u00e9es personnelles et de la vie priv\u00e9e<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, Paris, D\u00e9couverte.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Rossi J., 2018, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">\u00ab\u00a0Qu\u2019est-ce que le droit \u00e0 la protection des donn\u00e9es \u00e0 caract\u00e8re personnel\u202f?\u00a0\u00bb, Working Paper, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Geopolitics of Risk Working Papers<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 1\/2018, Paris, Chaire de g\u00e9opolitique du risque de l\u2019Ecole normale sup\u00e9rieure<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">T\u00fcrk A., 2011, <\/span><span lang=\"fr-FR\"><i>La vie priv\u00e9e en p\u00e9ril: des citoyens sous contr\u00f4le<\/i><\/span><span lang=\"fr-FR\">, Paris, Odile Jacob, 269\u00a0p.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Rouvroy A.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">Berns T.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2013, \u00ab\u00a0Gouvernementalit\u00e9 algorithmique et perspectives d\u2019\u00e9mancipation: Le disparate comme condition d\u2019individuation par la relation\u202f?\u00a0\u00bb, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>R\u00e9seaux<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>177<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 1, p.\u00a0163.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Simon B.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2002, \u00ab\u00a0The Return of Panopticism: Supervision, Subjection and the New Surveillance\u00a0\u00bb, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Surveillance &amp; Society<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>3<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 1.<\/span><\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Vitalis A., Mattelart A., 2014, <i>Le profilage des populations: Du livret ouvrier au cybercontr\u00f4le<\/i>, Paris, La D\u00e9couverte, 156\u00a0p.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\"><u>5. De la gouvernance d\u2019Internet<\/u><\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Internet est-il gouvern\u00e9\u00a0? Souvent, la r\u00e9ponse de sens commun, tr\u00e8s r\u00e9pandue, est de dire que non. Internet serait une zone de non-droit. Le \u00ab\u00a0Dark Web\u00a0\u00bb fait particuli\u00e8rement peur, et diff\u00e9rents \u00c9tats appellent, r\u00e9guli\u00e8rement, \u00e0 reconqu\u00e9rir leur souverainet\u00e9 dans le \u00ab\u00a0cyberespace.\u00a0\u00bb Or, m\u00eame s\u2019il est vrai qu\u2019Internet ne fait pas l\u2019objet d\u2019un <i>gouvernement<\/i>, il fait n\u00e9anmoins l\u2019objet d\u2019une <i>gouvernance<\/i>, multi-niveaux, multi-acteurs. Quels sont les ar\u00e8nes, les acteurs et les instruments de cette gouvernance\u00a0? Nous r\u00e9pondrons \u00e0 ces questions apr\u00e8s avoir, d\u2019abord, pr\u00e9sent\u00e9 les grands principes de fonctionnement d\u2019Internet, dont la compr\u00e9hension est incontournable pour comprendre les enjeux et ma\u00eetriser les instruments de cette gouvernance.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\"><i>Lectures conseill\u00e9es<\/i><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Bing J., 2009, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">\u00ab\u00a0Building cyberspace: a brief history of Internet\u00a0\u00bb, dans <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Internet Governance: Infrastructure and Institutions<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, Oxford, Oxford University Press, p.\u00a08\u201147.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Bray F.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2007, \u00ab\u00a0Gender and Technology\u00a0\u00bb, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Annual Review of Anthropology<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>36<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 1, p.\u00a037\u201153.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\">Broca S., 2013, <\/span><span style=\"font-size: small;\"><i>Utopie du logiciel libre\u202f; du bricolage informatique \u00e0 la r\u00e9invention sociale<\/i><\/span><span style=\"font-size: small;\">, Neuvy-en-Champagne, Le passager clandestin.<\/span><\/p>\n<p align=\"justify\"><span style=\"font-size: small;\">Conseil d<\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">\u2019\u00c9tat (France), <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">2017.<\/span><\/span> <span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Puissance publique et plateformes num\u00e9riques\u00a0: accompagner l\u2019\u00ab\u00a0ub\u00e9risation\u00a0\u00bb.<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"> \u00c9tude annuelle. <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">Paris, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">D<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">irection de l&#8217;information l\u00e9gale et administrative<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Doty N., Mulligan D.K., 2013, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">\u00ab\u00a0Internet Multistakeholder Processes and Techno-Policy Standards.\u00a0\u00bb, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>11<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, p.\u00a0135\u2011184.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Flichy P.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2001, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>L\u2019imaginaire d\u2019Internet<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, Paris, D\u00e9couverte (Sciences et soci\u00e9t\u00e9), 272\u00a0p.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Kleinw\u00e4chter W.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2012, \u00ab\u00a0Internet, soci\u00e9t\u00e9s civiles et gouvernements\u202f: cohabitation ou choc des cultures\u202f?\u00a0\u00bb, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Politique \u00e9trang\u00e8re<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Et\u00e9<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2, p.\u00a0263\u2011275.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Lessig L.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2000, \u00ab\u00a0Code Is Law\u00a0\u00bb, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Harvard Magazine<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, <\/span><\/span><a href=\"http:\/\/harvardmagazine.com\/2000\/01\/code-is-law-html\"><span style=\"font-size: small;\">http:\/\/harvardmagazine.com\/2000\/01\/code-is-law-html<\/span><\/a><span style=\"font-size: small;\"><span lang=\"fr-FR\"> .<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Loveluck B.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2015, \u00ab\u00a0Internet, une soci\u00e9t\u00e9 contre l\u2019\u00c9tat\u202f?\u00a0\u00bb, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>R\u00e9seaux<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 192, p.\u00a0235\u2011270.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Massit<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">&#8211;<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">Folea<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, Fran\u00e7oise. <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>La r\u00e9gulation de l\u2019internet : fictions et frictions<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"> In : <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Les d\u00e9bats du num\u00e9rique<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">. Paris:Presses des Mines, 2013<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Rossi J.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 2020, \u00ab\u00a0What rules the Internet? A study of the troubled relation between web standards and legal instruments in the field of privacy\u00a0\u00bb, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>2020 Annual Giga-Net Symposium<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, <\/span><\/span><a href=\"https:\/\/www.giga-net.org\/2020symposiumPaper\/Rossi.pdf\"><span style=\"font-size: small;\">https:\/\/www.giga-net.org\/2020symposiumPaper\/Rossi.pdf<\/span><\/a> <span style=\"font-size: small;\"><span lang=\"fr-FR\">.<\/span><\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Sire G., 2017, \u00ab\u00a0Gouverner le HTML\u00a0\u00bb, <i>R\u00e9seaux<\/i>, 206, p.\u00a037\u201160.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Timmers, P., 2018, \u00ab\u00a0The European Union\u2019s cybersecurity industrial policy\u00a0\u00bb, <i>Journal of Cyber Policy<\/i>, vol. 3, nr. 3, p. 363 \u2013 384.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Turner F., 2008, <i>From counterculture to cyberculture: Stewart Brand, the Whole Earth Network, and the rise of digital utopianism<\/i>, 1. paperback ed, Chicago, Ill., Univ. of Chicago Pr, 327\u00a0p.<\/span><\/p>\n<p lang=\"fr-FR\"><span style=\"font-size: small;\"><u><b>Evaluation finale<\/b><\/u><\/span><\/p>\n<ul>\n<li>\n<p lang=\"fr-FR\"><span style=\"font-size: small;\">L\u2019\u00e9valuation finale se fera par un devoir sur table qui prendra la forme d\u2019une dissertation.<\/span><\/p>\n<\/li>\n<\/ul>\n<p><span style=\"font-size: small;\"><u><b>Autres r\u00e9f\u00e9rences bibliographiques<\/b><\/u><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Couture S., 2012, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">\u00ab\u00a0L\u2019\u00e9criture collective du code source informatique\u00a0\u00bb, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Revue d\u2019anthropologie des connaissances<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>6, n\u00b0 1<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 1, p.\u00a021\u201142.<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Ganascia, J-G. <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">2019. \u00ab Peut-on contenir l\u2019intelligence artificielle\u00a0?\u00a0\u00bb, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Pouvoirs<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, n\u00b0 170, pp. 71-81<\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Souchier E.<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 1996, \u00ab\u00a0L\u2019\u00e9crit d\u2019\u00e9cran, pratiques d\u2019\u00e9criture &amp; informatique\u00a0\u00bb, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Communication et langages<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>107<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 1, p.\u00a0105\u2011119.<\/span><\/span><\/p>\n<p lang=\"fr-FR\"><span style=\"font-size: small;\"><i>Films<\/i><\/span><\/p>\n<ul>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Citizenfour<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"> (documentaire sur Edward Snowden)<\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>La vie des autres<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"> (film de fiction sur la Stasi)<\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Life of an Agent<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"> (film documentaire sur la formation des agents de la police politique hongroise \u00e0 l&#8217;\u00e9poque de la dictature communiste) (<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Egy \u00fcgyn\u00f6k \u00e9lete magyarul<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">)<\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Pirates of the Silicon Valley<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"> (docufiction, histoire de l&#8217;informatique\u00a0; naissance de Microsoft et d&#8217;Apple)<\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Black Code\u00a0<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">: sur des exemples concrets de surveillance d\u2019\u00c9tat et de ses risques et effets sur la population<\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Nothing to hide\u00a0<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">: documentaire sur <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">la surveillance par les donn\u00e9es contemporaine<\/span><\/span><\/li>\n<\/ul>\n<p lang=\"fr-FR\"><span style=\"font-size: small;\"><i>Vid\u00e9os en ligne<\/i><\/span><\/p>\n<ul>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Richard Stallman\u00a0: \u00ab\u00a0qu&#8217;est-ce que le logiciel libre\u00a0?\u00a0\u00bb (conf\u00e9rence \u00e0 Sciences Po Lille en f\u00e9vrier 2011)\u00a0: <a href=\"http:\/\/www.f.0x2501.org\/p\/rms\/\" target=\"_top\">http:\/\/www.f.0x2501.org\/p\/rms\/<\/a><\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Benjamin Bayart\u00a0: \u00ab\u00a0Internet libre ou le Minitel 2.0\u00a0?\u00a0\u00bb (conf\u00e9rence aux RMLL d&#8217;Amiens en 2007)\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=AoRGoQ76PK8\" target=\"_top\">https:\/\/www.youtube.com\/watch?v=AoRGoQ76PK8<\/a><\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Dominique Cardon\u00a0: \u00ab\u00a0Nos vies \u00e0 l&#8217;heure des big data\u00a0\u00bb (conf\u00e9rence \u00e0 l&#8217;Universit\u00e9 de Nantes de 2010)\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=D_Eyzt2uJZk\" target=\"_top\">https:\/\/www.youtube.com\/watch?v=D_Eyzt2uJZk<\/a><\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Ray Kurzweil at the IMF\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=Vx9RkPYpqag\" target=\"_top\">https:\/\/www.youtube.com\/watch?v=Vx9RkPYpqag<\/a><\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Cha\u00eene Youtube sur les <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>game studies\u00a0<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">: <a href=\"https:\/\/www.youtube.com\/channel\/UCXg4udeWdzZbaL8Y8otOLSw\" target=\"_top\">https:\/\/www.youtube.com\/channel\/UCXg4udeWdzZbaL8Y8otOLSw<\/a><\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Danah boyd\u00a0: \u00ab\u00a0Be careful what you code for\u00a0\u00bb\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=UWBZNxPzoUY\" target=\"_top\">https:\/\/www.youtube.com\/watch?v=UWBZNxPzoUY<\/a><\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Antonio Casilli\u00a0: \u00ab\u00a0Making sense of digital platform labor\u00a0\u00bb (conf\u00e9rence \u00e0 l&#8217;EM Lyon le 21 octobre 2016)\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=hCV1OTSByOQ\" target=\"_top\">https:\/\/www.youtube.com\/watch?v=hCV1OTSByOQ<\/a><\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Yann Moulier-Boutang\u00a0: \u00ab\u00a0R\u00e9gime de la propri\u00e9t\u00e9 dans le capitalisme cognitif\u00a0\u00bb\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=8gXd_YfqtGw\">https:\/\/www.youtube.com\/watch?v=8gXd_YfqtGw<\/a><\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">F\u00e9lix Tr\u00e9guer\u00a0: \u00ab\u00a0Internet et libert\u00e9s publiques\u00a0: ce qui a chang\u00e9 de puis Snowden\u00a0\u00bb\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=FCViX9uaI8E\">https:\/\/www.youtube.com\/watch?v=FCViX9uaI8E<\/a> <\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Ksenia Ermoshina\u00a0: Conf\u00e9rence sur le chiffrement\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=Ka6_gNMILxw\">https:\/\/www.youtube.com\/watch?v=Ka6_gNMILxw<\/a> <\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Guide de la jurisprudence europ\u00e9enne sur la protection des donn\u00e9es\u00a0: <a href=\"http:\/\/www.julienrossi.com\/blog\/wp-content\/uploads\/2018\/10\/guide-de-la-jurisprudence-v0-9-21.pdf\" target=\"_top\">http:\/\/www.julienrossi.com\/blog\/wp-content\/uploads\/2018\/10\/guide-de-la-jurisprudence-v0-9-21.pdf<\/a><\/span><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Manuel de droit europ\u00e9en en mati\u00e8re de protection des donn\u00e9es \u00e0 caract\u00e8re personnel, <\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">Conseil de l&#8217;Europe, Court Europ\u00e9enne des Droits de l&#8217;Homme et Agence europ\u00e9enne des droits fondamentaux, 2014<\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Disponible en ligne\u00a0: <\/span><\/span><a href=\"http:\/\/www.echr.coe.int\/Documents\/Handbook_data_protection_FRA.pdf\" target=\"_top\"><span style=\"font-size: small;\"><span lang=\"fr-FR\"><u><b>http:\/\/www.echr.coe.int\/Documents\/Handbook_data_protection_FRA.pdf<\/b><\/u><\/span><\/span><\/a><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Mis \u00e0 jour en 2018 (mais disponible uniquement en anglais pour l\u2019instant)\u00a0: <\/span><\/span><span style=\"font-size: small;\">Union europ\u00e9enne<\/span><span style=\"font-size: small;\">, <\/span><span style=\"font-size: small;\">Conseil de l\u2019Europe<\/span><span style=\"font-size: small;\"> (dirs.), 2018, <\/span><span style=\"font-size: small;\"><i>Handbook on European data protection law<\/i><\/span><span style=\"font-size: small;\">, 2018 edition, Luxembourg, Publications Office of the European Union (Handbook \/ FRA, European Union Agency for Fundamental Rights), 397\u00a0p.\u00a0<\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">: <\/span><\/span><a href=\"https:\/\/fra.europa.eu\/en\/publication\/2018\/handbook-european-data-protection-law\"><span style=\"font-size: small;\">https:\/\/fra.europa.eu\/en\/publication\/2018\/handbook-european-data-protection-law<\/span><\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p lang=\"fr-FR\"><span style=\"font-size: small;\"><u><b>Pour s&#8217;initier aux aspects techniques<\/b><\/u><\/span><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Les meilleurs tutoriels en langue fran\u00e7aise pour s&#8217;initier \u00e0 l&#8217;informatique sont sur le<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">s archives de l\u2019ancien Site du Z\u00e9ro<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">\u00a0: <\/span><\/span><a href=\"http:\/\/sdz.tdct.org\/\"><span style=\"color: #000000;\"><span style=\"font-family: Liberation Serif, sans-serif;\"><span style=\"font-size: small;\"><span lang=\"fr-FR\">http:\/\/sdz.tdct.org<\/span><\/span><\/span><\/span><\/a><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Une bonne explication des aspects techniques du r\u00e9seau Internet, par Benjamin Bayart\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=pwT2egqlke4\" target=\"_top\">https:\/\/www.youtube.com\/watch?v=pwT2egqlke4<\/a><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Objectif g\u00e9n\u00e9ral du cours Nous vivrions, selon l\u2019expression de Manuel Castuells, dans une soci\u00e9t\u00e9 en r\u00e9seaux et dans une \u00e9conomie de capitalisme informationnel. Ces deux expressions font r\u00e9f\u00e9rence \u00e0 la centralit\u00e9 de l\u2019information, de sa circulation et de son contr\u00f4le,&#8230;<\/p>\n","protected":false},"author":1,"featured_media":578,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[21,24,17],"class_list":["post-592","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-enseignement","tag-science-politique","tag-sic","tag-universite-de-szeged"],"_links":{"self":[{"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/posts\/592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/comments?post=592"}],"version-history":[{"count":1,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/posts\/592\/revisions"}],"predecessor-version":[{"id":593,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/posts\/592\/revisions\/593"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/media\/578"}],"wp:attachment":[{"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/media?parent=592"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/categories?post=592"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/tags?post=592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}