1 / 31

COM 125: Privacy And Surveillance

COM 125: Privacy And Surveillance. Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud. PRIVACY. Ability of an individual or group to keep their lives and personal affairs out of public view, Control the flow of information about themselves. Sometimes related to anonymity

tamma
Télécharger la présentation

COM 125: Privacy And Surveillance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. COM 125:Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud

  2. PRIVACY • Ability of an individual or group to keep their livesand personal affairs out of public view, • Control the flow of information about themselves. • Sometimes related to anonymity • Can be seen as an aspect of security (“Wikipedia: Privacy”, 2007)

  3. PRIVACY • Phishing is an attempt, using fraudulent e- mail or web site pop-ups, to get you to divulge sensitive financial information such as credit card numbers, account numbers, user names, passwords, or social security numbers. • The phisher then uses this information to commit identity theft or other fraud. • Another recent trend is toward pharming, which is when Internet users are misdirected to fraudulent web sites that appear legitimate in attempt to commit identity theft. http://support.onetel.co.uk/index.php?page=230

  4. http://www.privacyinternational.org/article.shtml?cmd%5B347%5D=x-347-545269&als%5Btheme%5D=Privacy%20and%20Human%20Rightshttp://www.privacyinternational.org/article.shtml?cmd%5B347%5D=x-347-545269&als%5Btheme%5D=Privacy%20and%20Human%20Rights

  5. SURVEILLANCE

  6. SURVEILLANCE • The monitoring of behavior usually from a position of higher authority • Traditional surveillance: close observation by a person • New surveillance: scrutiny through the use of technical means to extract or create personal or group data, whether from individuals or contexts (Marx,G., 2004). • Counter surveillance, Inverse Surveillance

  7. COUNTER SURVEILLANCE • Practice of avoiding surveillance • Making surveillance difficult

  8. Inverse Surveillance • Can be referred as sousveillance • Not from a higher authority but ordinary individuals • E.g. Citizen journalism, Rodney King beating (1991)

  9. IMPACT • Use of surveillance in organizations • Personal information is obtained by many small groups and individuals. • Ethical issues in workplace • Phone tapping, computer surveillance

  10. IMPACT • Welcomes ever more powerful surveillance as necessary in today’s world where efficiency is so valued and where there are a multiplicity of dangers and risks. • More pessimistic is the Frankensteinian/ Luddite view: surveillance technology is inhuman, destructive of liberty and untrustworthy.

  11. http://www.privacyinternational.org/article.shtml?cmd%5B347%5D=x-347-545269&als%5Btheme%5D=Privacy%20and%20Human%20Rightshttp://www.privacyinternational.org/article.shtml?cmd%5B347%5D=x-347-545269&als%5Btheme%5D=Privacy%20and%20Human%20Rights

  12. 10 MINUTES BREAK

  13. PRIVACY VERSUS SURVEILLANCE

  14. You, Exposed • Increasing pressure to expose details of our personal lives to strangers in order to win their trust • In turn, we demand these strangers to do the same for us (The Naked Crowd, Rosen, 2004)

  15. You, Exposed Terms • Foucault’s Panopticon: a surveillance house in which the few watched the many • Synopticon: the many watch the few • Omnipticon: the many watch the many (The Naked Crowd, Rosen, 2004)

  16. How? Fromm’s Marketed Self • The easiest way to attract the attention and winning trust of strangers is to establish an emotional connection with them by projecting a consistent, memorable, and trustworthy image (The Naked Crowd, Rosen, 2004) • E.g.: The use of profiles in online social networking sites like Friendster & Myspace

  17. Personal Branding • The Self is constructed as a form of marketed authenticity in which self is turned inside out and then sold to the world • A logical application of marketing technologies to the most intimate aspects of The Self (The Naked Crowd, Rosen, 2004)

  18. Headlines • Hewlett Packard executives hiring private investigators to spy on employees and journalists. • Rep. Mark Foley sending innuendo-laden instant messages – a reminder that digital communication lasts forever and that anonymous sources can be unmasked by clever bloggers from just a few electronic clues. • The federal government allegedly compiling a database of telephone numbers dialed by Americans, and eavesdropping on U.S. callers dialing international calls without obtaining court orders. (Privacy Lost: Does anybody care?, Sullivan, 2006)

  19. “The 21st century equivalent of being naked” (Privacy Lost: Does anybody care?, Sullivan, 2006)

  20. You, The Consumers • Ways you may disclose personal data • Signing up for a membership discount card • EZ-Pass system whereby automobile are electronically tracked • Credit bureaus asking for your bill-paying histories • Multiplier effect –Data is acquired, analyzed, categorized, stored and sold over and over again

  21. You, The Consumers • Government agencies buy or demand details about our lives in the name of keeping us safe • Play video: Privacy rights on the Internet

  22. SOUSVEILLANCE

  23. SOUSVEILLANCE • The term "sousveillance" stems from the contrasting French words sur, meaning "above", and sous, meaning "below“. • “Surveillance“ denotes the "eye-in-the-sky" watching from above, whereas "sousveillance" denotes bringing the camera or other means of observation down to human level, either physically (mounting cameras on people rather than on buildings). (“Wikipedia: Sousveillance”, 2007)

  24. SOUSVEILLANCE • The recording of an activity from the perspective of a participant in the activity(i.e. personal experience capture). • Refers to the recording or monitoring of real or apparent authority figures by others • Steve Mann, who coined the term, describes it as "watchful vigilance from underneath."

  25. Emerging discourse on sousveillancewithin industry is the "personal sousveillance", namely the recordingof an activity by a participant in the activity. (“Wikipedia: Sousveillance”, 2007)

  26. PERSONAL SOUSVEILLANCE • The art, science, and technology ofpersonal experience capture, processing, storage, retrieval, and transmission, such as lifelong audiovisual recording. • For example, technologies like cameraphones and weblogs (tend to build a sense of community).

  27. What happened to Rodney King? • Rodney Glen King is a U.S. citizen and taxi driver who became famous after his violent arrest by officers of the Los Angeles Police Department (LAPD) wasvideotaped by a bystander, George Holliday. (“Wikipedia: Rodney King”, 2007)

  28. The Aftermath • The incident raised a public outcry among people who believed it was racially motivated. • Growing tension between the black community and the LAPD. • Increasing anger over police brutality and more general issues of unemployment, racial tension, and poverty facing the black community in South Central Los Angeles. • The acquittal in a state court of the four officers charged with usingexcessive force in subduing King provided the spark that led to the1992 Los Angeles riots.(“Wikipedia: Rodney King”, 2007)

  29. HIERARCHIAL SOUSVEILLANCE • Refers to citizensphotographing police, shoppers photographing shopkeepers, or taxicabpassengers photographing cab drivers.(“Wikipedia: Sousveillance”, 2007)

  30. THE END

More Related