COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.

Post on 05-Jan-2016

215 views 1 download

transcript

COM 125:Privacy And Surveillance

Done By:

Shamala Devi

Siti Nur Aliah

Siti Hamimah

Dalina Daud

PRIVACY

- Ability of an individual or group to keep their livesand personal affairs out of public view,

- Control the flow of information about themselves.

- Sometimes related to anonymity

- Can be seen as an aspect of security (“Wikipedia: Privacy”, 2007)

PRIVACY

• Phishing is an attempt, using fraudulent e- mail or web site pop-ups, to get you to divulge sensitive financial information such as credit card numbers, account numbers, user names, passwords, or social security numbers.

• The phisher then uses this information to commit identity theft or other fraud.

• Another recent trend is toward pharming, which is when Internet users are misdirected to fraudulent web sites that appear legitimate in attempt to commit identity theft.

http://support.onetel.co.uk/index.php?page=230

http://www.privacyinternational.org/article.shtml?cmd%5B347%5D=x-347-545269&als%5Btheme%5D=Privacy%20and%20Human%20Rights

SURVEILLANCE

SURVEILLANCE

- The monitoring of behavior usually from a position of higher authority

- Traditional surveillance: close observation by a person

- New surveillance: scrutiny through the use of technical means to extract or create personal or group data, whether from individuals or contexts (Marx,G., 2004).

- Counter surveillance, Inverse Surveillance

COUNTER SURVEILLANCE

• Practice of avoiding surveillance

• Making surveillance difficult

Inverse Surveillance

• Can be referred as sousveillance

• Not from a higher authority but ordinary individuals

• E.g. Citizen journalism, Rodney King beating (1991)

IMPACT

• Use of surveillance in organizations

• Personal information is obtained by many small groups and individuals.

• Ethical issues in workplace

• Phone tapping, computer surveillance

IMPACT

• Welcomes ever more powerful surveillance as necessary in today’s world where efficiency is so valued and where there are a multiplicity of dangers and risks.

• More pessimistic is the Frankensteinian/ Luddite view: surveillance technology is inhuman, destructive of liberty and untrustworthy.

http://www.privacyinternational.org/article.shtml?cmd%5B347%5D=x-347-545269&als%5Btheme%5D=Privacy%20and%20Human%20Rights

10 MINUTES

BREAK

PRIVACY VERSUS SURVEILLANCE

You, Exposed

• Increasing pressure to expose details of our personal lives to strangers in order to win their trust

• In turn, we demand these strangers to do the same for us

(The Naked Crowd, Rosen, 2004)

You, Exposed

Terms

• Foucault’s Panopticon: a surveillance house in which the few watched the many

• Synopticon: the many watch the few

• Omnipticon: the many watch the many (The Naked Crowd, Rosen, 2004)

How?

Fromm’s Marketed Self• The easiest way to attract the attention and

winning trust of strangers is to establish an emotional connection with them by projecting a consistent, memorable, and trustworthy image

(The Naked Crowd, Rosen, 2004)

• E.g.: The use of profiles in online social networking sites like Friendster & Myspace

Personal Branding

• The Self is constructed as a form of marketed authenticity in which self is turned inside out and then sold to the world

• A logical application of marketing technologies to the most intimate aspects of The Self

(The Naked Crowd, Rosen, 2004)

Headlines

• Hewlett Packard executives hiring private investigators to spy on employees and journalists.

• Rep. Mark Foley sending innuendo-laden instant messages – a reminder that digital communication lasts forever and that anonymous sources can be unmasked by clever bloggers from just a few electronic clues.

• The federal government allegedly compiling a database of telephone numbers dialed by Americans, and eavesdropping on U.S. callers dialing international calls without obtaining court orders.

(Privacy Lost: Does anybody care?, Sullivan, 2006)

“The 21st century equivalent of being

naked” (Privacy Lost: Does anybody care?, Sullivan, 2006)

You, The Consumers

• Ways you may disclose personal data1. Signing up for a membership discount card

2. EZ-Pass system whereby automobile are electronically tracked

3. Credit bureaus asking for your bill-paying histories

• Multiplier effect –Data is acquired, analyzed, categorized, stored and sold over and over again

You, The Consumers

• Government agencies buy or demand details about our lives in the name of keeping us safe

• Play video: Privacy rights on the Internet

SOUSVEILLANCE

SOUSVEILLANCE

• The term "sousveillance" stems from the contrasting French words sur, meaning "above", and sous, meaning "below“.

• “Surveillance“ denotes the "eye-in-the-sky" watching from above, whereas "sousveillance" denotes bringing the camera or other means of observation down to human level, either physically (mounting cameras on people rather than on buildings).

(“Wikipedia: Sousveillance”, 2007)

SOUSVEILLANCE

- The recording of an activity from the perspective of a participant in the activity(i.e. personal experience capture).

- Refers to the recording or monitoring of real or apparent authority figures by others

- Steve Mann, who coined the term, describes it as "watchful vigilance from underneath."

Emerging discourse on sousveillance

within industry is the "personal sousveillance", namely the

recordingof an activity by a participant in

the activity. (“Wikipedia:

Sousveillance”, 2007)

PERSONAL SOUSVEILLANCE

• The art, science, and technology ofpersonal experience capture, processing, storage, retrieval, and transmission, such as lifelong audiovisual recording.

• For example, technologies like cameraphones and weblogs (tend to build a sense of community).

What happened to Rodney King?

• Rodney Glen King is a U.S. citizen and taxi driver who became famous after his violent arrest by officers of the Los Angeles Police Department (LAPD) wasvideotaped by a bystander, George Holliday.

(“Wikipedia: Rodney King”, 2007)

The Aftermath• The incident raised a public outcry among people who believed it

was racially motivated.

• Growing tension between the black community and the LAPD.

• Increasing anger over police brutality and more general issues of unemployment, racial tension, and poverty facing the black community in South Central Los Angeles.

• The acquittal in a state court of the four officers charged with usingexcessive force in subduing King provided the spark that led to the1992 Los Angeles riots.

(“Wikipedia: Rodney King”, 2007)

HIERARCHIAL SOUSVEILLANCE

• Refers to citizensphotographing police, shoppers photographing shopkeepers, or taxicabpassengers photographing cab drivers. (“Wikipedia: Sousveillance”, 2007)

THE END