COM 125: Privacy And Surveillance

1 / 31
About This Presentation
Title:

COM 125: Privacy And Surveillance

Description:

Surveillance denotes the – PowerPoint PPT presentation

Number of Views:22
Avg rating:3.0/5.0

less

Transcript and Presenter's Notes

Title: COM 125: Privacy And Surveillance


1
COM 125Privacy And Surveillance
  • Done By
  • Shamala Devi
  • Siti Nur Aliah
  • Siti Hamimah
  • Dalina Daud

2
(No Transcript)
3
PRIVACY
  • Ability of an individual or group to keep their
    livesand personal affairs out of public view,
  • Control the flow of information about themselves.
  • Sometimes related to anonymity
  • Can be seen as an aspect of security



  • (Wikipedia Privacy, 2007)

4
PRIVACY
  • Phishing is an attempt, using fraudulent e- mail
    or web site pop-ups, to get you to divulge
    sensitive financial information such as credit
    card numbers, account numbers, user names,
    passwords, or social security numbers.
  • The phisher then uses this information to commit
    identity theft or other fraud.
  • Another recent trend is toward pharming, which is
    when Internet users are misdirected to fraudulent
    web sites that appear legitimate in attempt to
    commit identity theft.


  • http//support.onetel.co.uk/in
    dex.php?page230

5
http//www.privacyinternational.org/article.shtml?
cmd5B3475Dx-347-545269als5Btheme5DPrivacy2
0and20Human20Rights
6
SURVEILLANCE
7
SURVEILLANCE
  • The monitoring of behavior usually from a
    position of higher authority
  • Traditional surveillance close observation by a
    person
  • New surveillance scrutiny through the use of
    technical means to extract or create personal or
    group data, whether from individuals or contexts
    (Marx,G., 2004).
  • Counter surveillance, Inverse Surveillance

8
COUNTER SURVEILLANCE
  • Practice of avoiding surveillance
  • Making surveillance difficult

9
Inverse Surveillance
  • Can be referred as sousveillance
  • Not from a higher authority but ordinary
    individuals
  • E.g. Citizen journalism, Rodney King beating
    (1991)

10
IMPACT
  • Use of surveillance in organizations
  • Personal information is obtained by many small
    groups and individuals.
  • Ethical issues in workplace
  • Phone tapping, computer surveillance

11
IMPACT
  • Welcomes ever more powerful surveillance as
    necessary in todays world where efficiency is so
    valued and where there are a multiplicity of
    dangers and risks.
  • More pessimistic is the Frankensteinian/ Luddite
    view surveillance technology is inhuman,
    destructive of liberty and untrustworthy.

12
http//www.privacyinternational.org/article.shtml?
cmd5B3475Dx-347-545269als5Btheme5DPrivacy2
0and20Human20Rights
13
  • 10 MINUTES
  • BREAK

14
PRIVACY VERSUS SURVEILLANCE
15
You, Exposed
  • Increasing pressure to expose details of our
    personal lives to strangers in order to win their
    trust
  • In turn, we demand these strangers to do the same
    for us

  • (The Naked Crowd, Rosen, 2004)

16
You, Exposed
  • Terms
  • Foucaults Panopticon a surveillance house in
    which the few watched the many
  • Synopticon the many watch the few
  • Omnipticon the many watch the many

  • (The Naked Crowd, Rosen, 2004)

17
How?
  • Fromms Marketed Self
  • The easiest way to attract the attention and
    winning trust of strangers is to establish an
    emotional connection with them by projecting a
    consistent, memorable, and trustworthy image



  • (The
    Naked Crowd, Rosen, 2004)
  • E.g. The use of profiles in online social
    networking sites like Friendster Myspace

18
Personal Branding
  • The Self is constructed as a form of marketed
    authenticity in which self is turned inside out
    and then sold to the world
  • A logical application of marketing technologies
    to the most intimate aspects of The Self

  • (The Naked Crowd, Rosen, 2004)

19
Headlines
  • Hewlett Packard executives hiring private
    investigators to spy on employees and
    journalists.
  • Rep. Mark Foley sending innuendo-laden instant
    messages a reminder that digital communication
    lasts forever and that anonymous sources can be
    unmasked by clever bloggers from just a few
    electronic clues.
  • The federal government allegedly compiling a
    database of telephone numbers dialed by
    Americans, and eavesdropping on U.S. callers
    dialing international calls without obtaining
    court orders.

  • (Privacy Lost Does anybody care?, Sullivan,
    2006)

20
  • The 21st century equivalent of being naked


  • (Privacy Lost Does anybody care?, Sullivan,
    2006)


21
You, The Consumers
  • Ways you may disclose personal data
  • Signing up for a membership discount card
  • EZ-Pass system whereby automobile are
    electronically tracked
  • Credit bureaus asking for your bill-paying
    histories
  • Multiplier effect Data is acquired, analyzed,
    categorized, stored and sold over and over again

22
You, The Consumers
  • Government agencies buy or demand details about
    our lives in the name of keeping us safe
  • Play video Privacy rights on the Internet

23
SOUSVEILLANCE
24
SOUSVEILLANCE
  • The term "sousveillance" stems from the
    contrasting French words sur, meaning "above",
    and sous, meaning "below.
  • Surveillance denotes the "eye-in-the-sky"
    watching from above, whereas "sousveillance"
    denotes bringing the camera or other means of
    observation down to human level, either
    physically (mounting cameras on people rather
    than on buildings).

  • (Wikipedia Sousveillance, 2007)

25
SOUSVEILLANCE
  • The recording of an activity from the perspective
    of a participant in the activity(i.e. personal
    experience capture).
  • Refers to the recording or monitoring of real or
    apparent authority figures by others
  • Steve Mann, who coined the term, describes it as
    "watchful vigilance from underneath."

26
  • Emerging discourse on sousveillancewithin
    industry is the "personal sousveillance", namely
    the recordingof an activity by a participant in
    the activity.

  • (Wikipedia Sousveillance, 2007)

27
PERSONAL SOUSVEILLANCE
  • The art, science, and technology ofpersonal
    experience capture, processing, storage,
    retrieval, and transmission, such as lifelong
    audiovisual recording.
  • For example, technologies like cameraphones and
    weblogs (tend to build a sense of community).

28
What happened to Rodney King?
  • Rodney Glen King is a U.S. citizen and taxi
    driver who became famous after his violent arrest
    by officers of the Los Angeles Police Department
    (LAPD) wasvideotaped by a bystander, George
    Holliday.
  • (Wikipedia Rodney
    King, 2007)

29
The Aftermath
  • The incident raised a public outcry among people
    who believed it was racially motivated.
  • Growing tension between the black community and
    the LAPD.
  • Increasing anger over police brutality and more
    general issues of unemployment, racial tension,
    and poverty facing the black community in South
    Central Los Angeles.
  • The acquittal in a state court of the four
    officers charged with usingexcessive force in
    subduing King provided the spark that led to
    the1992 Los Angeles riots.
    (Wikipedia Rodney King,
    2007)

30
HIERARCHIAL SOUSVEILLANCE
  • Refers to citizensphotographing police, shoppers
    photographing shopkeepers, or taxicabpassengers
    photographing cab drivers.
    (Wikipedia Sousveillance, 2007)

31
THE END
Write a Comment
User Comments (0)