SlideShare une entreprise Scribd logo
1  sur  8
Privacy in the Information Age Presented by: Andrew Wesolek Information Technology Fall, 2009
Panopticism: The Theoretical Foundation Panoptic (all seeing) structure first envisioned by Jeremy Bentham as a perfect prison Foucault takes a more metaphorical approach: Panopticism is not a physical structure, but a social one.   “To maintain order in a democratic and capitalist society, the populace needs to believe that any person could be surveilled at any time.” Quote and Picture taken from: http://www.cla.purdue.edu/English/theory/newhistoricism/modules/foucaultcarceral.html
Concrete Manifestations Facebook: 20% of colleges and universities currently screen applicants’ social networking sites.  Content you share is no longer “yours” "We may use information about you that we collect from other sources, including but not limited to newspapers and Internet sources such as blogs, instant messaging services and other users of Facebook, to supplement your profile” –Facebook privacy policy You cannot remove content from Facebook’s servers “Facebook is able to track the buying habits of its users on affiliated third-party sites even when they are logged out of their account or have opted out of its controversial ‘Beacon’ tracking service”.    - http://www.zdnet.com.au/news/security/soa/Logged-in-or-out-Facebook-is-watching-you/0,130061744,339284281,00.htm
More Concrete Manifestations Google: http://www.criminaljusticeusa.com/blog/2009/25-surprising-things-that-google-knows-about-you/
What is Privacy Anyway? Adam Moore: “A right to control access to and uses of—places, bodies, and personal information” Note the normative and descriptive aspects Also, element of control
Should we really have a Right to Privacy? Some Say no A right to privacy of what? Importance of Intentionality
Back to Foucault On Panopticisim: “It is not that the beautiful totality of the individual is amputated, repressed, altered by our social order, it is rather that the individual is carefully fabricated within it” We might strengthen this statement by postulating that privacy is a necessary condition for freedom
What should we do? Carefully examine costs and benefits of new technology Define a domestic (private) sphere and respect its boundaries Consider and respect the intentionality of our ‘digital actions’ http://www.wired.com/images_blogs/threatlevel/images/2008/08/29/surveillance_screen_peterme.jpg

Contenu connexe

En vedette

Magazine Questionnaire[1]
Magazine Questionnaire[1]Magazine Questionnaire[1]
Magazine Questionnaire[1]
guest282703
 
Barton And Hamilton, Literary Practices
Barton And Hamilton, Literary PracticesBarton And Hamilton, Literary Practices
Barton And Hamilton, Literary Practices
guest22b5aab
 

En vedette (18)

Nice Photos
Nice PhotosNice Photos
Nice Photos
 
Wesolekpresentation 1
Wesolekpresentation 1Wesolekpresentation 1
Wesolekpresentation 1
 
Library2 Presentation
Library2 PresentationLibrary2 Presentation
Library2 Presentation
 
Macpa Claws Of State
Macpa Claws Of StateMacpa Claws Of State
Macpa Claws Of State
 
Mivxan56
Mivxan56Mivxan56
Mivxan56
 
Who Uses this Stuff, Anyway? An investigation into the end-users of the USU D...
Who Uses this Stuff, Anyway? An investigation into the end-users of the USU D...Who Uses this Stuff, Anyway? An investigation into the end-users of the USU D...
Who Uses this Stuff, Anyway? An investigation into the end-users of the USU D...
 
USU DigitalCommons
USU DigitalCommonsUSU DigitalCommons
USU DigitalCommons
 
Magazine Questionnaire[1]
Magazine Questionnaire[1]Magazine Questionnaire[1]
Magazine Questionnaire[1]
 
Norvegiana, hack4no 2016, Hønefoss, okt 2016
Norvegiana, hack4no 2016, Hønefoss, okt 2016Norvegiana, hack4no 2016, Hønefoss, okt 2016
Norvegiana, hack4no 2016, Hønefoss, okt 2016
 
Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging Technologies
 
Right/Wrong in Holden
Right/Wrong in HoldenRight/Wrong in Holden
Right/Wrong in Holden
 
Test presentation private
Test presentation privateTest presentation private
Test presentation private
 
Digitizing Items from Special Collections: The USU Approach
Digitizing Items from Special Collections:The USU ApproachDigitizing Items from Special Collections:The USU Approach
Digitizing Items from Special Collections: The USU Approach
 
Antares Presentation 2011
Antares Presentation 2011Antares Presentation 2011
Antares Presentation 2011
 
USU Policy 535: Open Access to Scholarly Articles. What it is and what it mea...
USU Policy 535: Open Access to Scholarly Articles. What it is and what it mea...USU Policy 535: Open Access to Scholarly Articles. What it is and what it mea...
USU Policy 535: Open Access to Scholarly Articles. What it is and what it mea...
 
Completepresentation
CompletepresentationCompletepresentation
Completepresentation
 
Introduction to The Children's Village
Introduction to The Children's VillageIntroduction to The Children's Village
Introduction to The Children's Village
 
Barton And Hamilton, Literary Practices
Barton And Hamilton, Literary PracticesBarton And Hamilton, Literary Practices
Barton And Hamilton, Literary Practices
 

Similaire à Infotechfinal 1

Online Policy Primer: Facebook
Online Policy Primer: FacebookOnline Policy Primer: Facebook
Online Policy Primer: Facebook
ingridkreidler
 
Online Policy Primer: Facebook
Online Policy Primer: FacebookOnline Policy Primer: Facebook
Online Policy Primer: Facebook
ingridkreidler
 
Online Policy Primer: Facebook
Online Policy Primer: Facebook Online Policy Primer: Facebook
Online Policy Primer: Facebook
ingridkreidler
 
StuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuartMillar_13616005_PIA
StuartMillar_13616005_PIA
Stuart Millar
 
Why Portability matters (full presentation)
Why Portability matters (full presentation)Why Portability matters (full presentation)
Why Portability matters (full presentation)
Ian Forrester
 
The change of_surveillance_and_its_issues_chiara_artini&alessia_vidili
The change of_surveillance_and_its_issues_chiara_artini&alessia_vidiliThe change of_surveillance_and_its_issues_chiara_artini&alessia_vidili
The change of_surveillance_and_its_issues_chiara_artini&alessia_vidili
Vidili
 
Employee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words whEmployee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words wh
TanaMaeskm
 

Similaire à Infotechfinal 1 (20)

Online Policy Primer: Facebook
Online Policy Primer: FacebookOnline Policy Primer: Facebook
Online Policy Primer: Facebook
 
Online Policy Primer
Online Policy PrimerOnline Policy Primer
Online Policy Primer
 
Online Policy Primer: Facebook
Online Policy Primer: FacebookOnline Policy Primer: Facebook
Online Policy Primer: Facebook
 
Online Policy Primer: Facebook
Online Policy Primer: Facebook Online Policy Primer: Facebook
Online Policy Primer: Facebook
 
StuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuartMillar_13616005_PIA
StuartMillar_13616005_PIA
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottier
 
Social Media Vs Privacy - Indonesian Cases
Social Media Vs Privacy - Indonesian CasesSocial Media Vs Privacy - Indonesian Cases
Social Media Vs Privacy - Indonesian Cases
 
Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...
 
Social Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher EducationSocial Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher Education
 
Appreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information SecurityAppreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information Security
 
Why Portability matters (full presentation)
Why Portability matters (full presentation)Why Portability matters (full presentation)
Why Portability matters (full presentation)
 
Rights of Machine
Rights of MachineRights of Machine
Rights of Machine
 
Using social media as a business tool
Using social media as a business toolUsing social media as a business tool
Using social media as a business tool
 
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
The change of_surveillance_and_its_issues_chiara_artini&alessia_vidili
The change of_surveillance_and_its_issues_chiara_artini&alessia_vidiliThe change of_surveillance_and_its_issues_chiara_artini&alessia_vidili
The change of_surveillance_and_its_issues_chiara_artini&alessia_vidili
 
Employee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words whEmployee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words wh
 
Gate-Keeping Theory in the Course Media Theories
Gate-Keeping Theory in the Course Media TheoriesGate-Keeping Theory in the Course Media Theories
Gate-Keeping Theory in the Course Media Theories
 
Social Media and Litigation are Outlining eDiscovery Issues
Social Media and Litigation are Outlining eDiscovery IssuesSocial Media and Litigation are Outlining eDiscovery Issues
Social Media and Litigation are Outlining eDiscovery Issues
 
A great deal has been written about payment gateway for college(1)
A great deal has been written about payment gateway for college(1)A great deal has been written about payment gateway for college(1)
A great deal has been written about payment gateway for college(1)
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Infotechfinal 1

  • 1. Privacy in the Information Age Presented by: Andrew Wesolek Information Technology Fall, 2009
  • 2. Panopticism: The Theoretical Foundation Panoptic (all seeing) structure first envisioned by Jeremy Bentham as a perfect prison Foucault takes a more metaphorical approach: Panopticism is not a physical structure, but a social one. “To maintain order in a democratic and capitalist society, the populace needs to believe that any person could be surveilled at any time.” Quote and Picture taken from: http://www.cla.purdue.edu/English/theory/newhistoricism/modules/foucaultcarceral.html
  • 3. Concrete Manifestations Facebook: 20% of colleges and universities currently screen applicants’ social networking sites. Content you share is no longer “yours” "We may use information about you that we collect from other sources, including but not limited to newspapers and Internet sources such as blogs, instant messaging services and other users of Facebook, to supplement your profile” –Facebook privacy policy You cannot remove content from Facebook’s servers “Facebook is able to track the buying habits of its users on affiliated third-party sites even when they are logged out of their account or have opted out of its controversial ‘Beacon’ tracking service”. - http://www.zdnet.com.au/news/security/soa/Logged-in-or-out-Facebook-is-watching-you/0,130061744,339284281,00.htm
  • 4. More Concrete Manifestations Google: http://www.criminaljusticeusa.com/blog/2009/25-surprising-things-that-google-knows-about-you/
  • 5. What is Privacy Anyway? Adam Moore: “A right to control access to and uses of—places, bodies, and personal information” Note the normative and descriptive aspects Also, element of control
  • 6. Should we really have a Right to Privacy? Some Say no A right to privacy of what? Importance of Intentionality
  • 7. Back to Foucault On Panopticisim: “It is not that the beautiful totality of the individual is amputated, repressed, altered by our social order, it is rather that the individual is carefully fabricated within it” We might strengthen this statement by postulating that privacy is a necessary condition for freedom
  • 8. What should we do? Carefully examine costs and benefits of new technology Define a domestic (private) sphere and respect its boundaries Consider and respect the intentionality of our ‘digital actions’ http://www.wired.com/images_blogs/threatlevel/images/2008/08/29/surveillance_screen_peterme.jpg