SlideShare une entreprise Scribd logo
1  sur  87
Télécharger pour lire hors ligne
Social Media: Behind the Scenes
2013 week 05
Networks’
geopolitics
the internets:
“a series of tubes”
Senator Ted Stevens
Françafrique 2.0
«Surveillance As A Service»
facial recognition
for States
bit.ly/UsyCJZ
Social technologies
for States
Technologies
crunching
privacy (data)
Facial recognition
for marketers
Human + Machine
approach
may 11th 1997
«computer-assisted»
Chess
duo
duo
Visualizing
a hierarchy
understanding
London’s riots
Financial
investigations
Tracking political
opposition
understanding
social relationship
«automated»
approach
predictive technologies
INDECT
Intelligent information system supporting
observation, searching and detection for security
of citizens in urban environment
http://bit.ly/RQ1FlL
anticipate criminal activity
and crisis events
anticipate criminal activity
and crisis events
aggregating surveillance data,
INDECT is an EU-funded research project
which aims to develop ways to
anticipate criminal activity
and crisis events
through the monitoring of “suspicious” or
“abnormal” behaviour, by
aggregating surveillance data,
both online and offline.
INDECT includes a number of
surveillance technologies and techniques,
from face-recognition software, to
search algorithms, data mining techniques,
and even drones
INDECT includes a number of
surveillance technologies and techniques,
from face-recognition software, to
search algorithms, data mining techniques,
and even drones
TrapWire
http://gaw.kr/X29GbL
TrapWire is a unique, predictive software system
designed to detect patterns indicative
of terrorist attacks or criminal operations.
Utilizing a proprietary, rules-based engine,
TrapWire detects, analyzes and alerts
on suspicious events as they are collected
over periods of time
and across multiple locations.
Utilizing a proprietary, rules-based engine,
TrapWire detects, analyzes and alerts
on suspicious events as they are collected
over periods of time
and across multiple locations.
Secret
Utilizing a proprietary, rules-based engine,
TrapWire detects, analyzes and alerts
on suspicious events as they are collected
over periods of time
and across multiple locations.
Regulatory compliance
Utilizing a proprietary, rules-based engine,
TrapWire detects, analyzes and alerts
on suspicious events as they are collected
over periods of time
and across multiple locations.
Real time
TrapWire supports the online reporting
of suspicious behavior
by community members...
Crowdsourced
...such as the iWatch programs in Los Angeles
and Washington DC, and See Something Say Something
in LasVegas and NewYork
Privacy?
Code is Law
becomes
Law is Code
privacy as seen by
http://bit.ly/RWL8Q7
Coding privacy
-
Privacy?

Contenu connexe

Tendances (6)

Towards a Safe, Secure Society - Resilience and IT Risks in Social Infrastruc...
Towards a Safe, Secure Society - Resilience and IT Risks in Social Infrastruc...Towards a Safe, Secure Society - Resilience and IT Risks in Social Infrastruc...
Towards a Safe, Secure Society - Resilience and IT Risks in Social Infrastruc...
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
 
I4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
I4ADA 2019 - presentation Catherine Garcia-van HoogstratenI4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
I4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
 
I4ADA 2019 - Presentation Cedric Wachholz
I4ADA 2019 - Presentation Cedric WachholzI4ADA 2019 - Presentation Cedric Wachholz
I4ADA 2019 - Presentation Cedric Wachholz
 
Carolyn Parnell on Big Data at MHTA
Carolyn Parnell on Big Data at MHTACarolyn Parnell on Big Data at MHTA
Carolyn Parnell on Big Data at MHTA
 
Open cadastre map innsbruck
Open cadastre map innsbruckOpen cadastre map innsbruck
Open cadastre map innsbruck
 

En vedette (11)

Sc po some-02
Sc po some-02Sc po some-02
Sc po some-02
 
Social Technology leveraging during the Arab Spring - Euromed june 2013
Social Technology leveraging during the Arab Spring - Euromed june 2013Social Technology leveraging during the Arab Spring - Euromed june 2013
Social Technology leveraging during the Arab Spring - Euromed june 2013
 
Sc po some-01
Sc po some-01Sc po some-01
Sc po some-01
 
Sc po some-03
Sc po some-03Sc po some-03
Sc po some-03
 
ScPo SoMe week 11
ScPo SoMe week 11ScPo SoMe week 11
ScPo SoMe week 11
 
Sc po some-10-crowds
Sc po some-10-crowdsSc po some-10-crowds
Sc po some-10-crowds
 
Sc po some-09-astroturfing
Sc po some-09-astroturfingSc po some-09-astroturfing
Sc po some-09-astroturfing
 
Keynote BDX i/o
Keynote BDX i/oKeynote BDX i/o
Keynote BDX i/o
 
Sc po2013 atelier-s01
Sc po2013 atelier-s01Sc po2013 atelier-s01
Sc po2013 atelier-s01
 
Unesco - Journée Liberté de la presse à Rabat
Unesco - Journée Liberté de la presse à RabatUnesco - Journée Liberté de la presse à Rabat
Unesco - Journée Liberté de la presse à Rabat
 
Sorbonne astroturfing
Sorbonne astroturfingSorbonne astroturfing
Sorbonne astroturfing
 

Similaire à Sc po some-05

CitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_AnalysisCitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_Analysis
Patrick Floto
 
Intelligenza artificiale: uno yin o uno yang per i diritti umani?
Intelligenza artificiale: uno yin o uno yang per i diritti umani?Intelligenza artificiale: uno yin o uno yang per i diritti umani?
Intelligenza artificiale: uno yin o uno yang per i diritti umani?
Speck&Tech
 
Surveillance Technology
Surveillance TechnologySurveillance Technology
Surveillance Technology
Blake Feldman
 
FINALProject Report for public
FINALProject Report for publicFINALProject Report for public
FINALProject Report for public
Hina Pandya
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
IJECEIAES
 
Ethical Implications of Social Media Data Mining by Police.docx
Ethical Implications of Social Media Data Mining by Police.docxEthical Implications of Social Media Data Mining by Police.docx
Ethical Implications of Social Media Data Mining by Police.docx
theodorelove43763
 

Similaire à Sc po some-05 (20)

Surveillance Software.docx
Surveillance Software.docxSurveillance Software.docx
Surveillance Software.docx
 
CitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_AnalysisCitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_Analysis
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
Intelligenza artificiale: uno yin o uno yang per i diritti umani?
Intelligenza artificiale: uno yin o uno yang per i diritti umani?Intelligenza artificiale: uno yin o uno yang per i diritti umani?
Intelligenza artificiale: uno yin o uno yang per i diritti umani?
 
privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
 
Surveillance Technology
Surveillance TechnologySurveillance Technology
Surveillance Technology
 
J017555559
J017555559J017555559
J017555559
 
Big Data and Social Sciences
Big Data and Social SciencesBig Data and Social Sciences
Big Data and Social Sciences
 
Digital Technologies: Today’s New Crime Fighters
 Digital Technologies: Today’s New Crime Fighters Digital Technologies: Today’s New Crime Fighters
Digital Technologies: Today’s New Crime Fighters
 
Citizen Sensor Data Mining, Social Media Analytics and Development Centric ...
Citizen Sensor Data Mining, Social Media Analytics and Development Centric ...Citizen Sensor Data Mining, Social Media Analytics and Development Centric ...
Citizen Sensor Data Mining, Social Media Analytics and Development Centric ...
 
FINALProject Report for public
FINALProject Report for publicFINALProject Report for public
FINALProject Report for public
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...
 
Modern trends in police force
Modern trends in police forceModern trends in police force
Modern trends in police force
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...
 
Using Data and New Technology for Peacemaking, Preventive Diplomacy, and Peac...
Using Data and New Technology for Peacemaking, Preventive Diplomacy, and Peac...Using Data and New Technology for Peacemaking, Preventive Diplomacy, and Peac...
Using Data and New Technology for Peacemaking, Preventive Diplomacy, and Peac...
 
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
 
Ethical Implications of Social Media Data Mining by Police.docx
Ethical Implications of Social Media Data Mining by Police.docxEthical Implications of Social Media Data Mining by Police.docx
Ethical Implications of Social Media Data Mining by Police.docx
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 

Plus de Fabrice Epelboin

ScPo - SoMe - introduction
ScPo - SoMe - introductionScPo - SoMe - introduction
ScPo - SoMe - introduction
Fabrice Epelboin
 
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
Privacy as identity territoriality  re-conceptualising behaviour in cyberspacePrivacy as identity territoriality  re-conceptualising behaviour in cyberspace
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
Fabrice Epelboin
 
GCHQ - The art of deception / Reputation War
GCHQ - The art of deception / Reputation WarGCHQ - The art of deception / Reputation War
GCHQ - The art of deception / Reputation War
Fabrice Epelboin
 
Sciences Po. Paris - atelier "The internets" 2012 sem10
Sciences Po. Paris - atelier "The internets" 2012 sem10Sciences Po. Paris - atelier "The internets" 2012 sem10
Sciences Po. Paris - atelier "The internets" 2012 sem10
Fabrice Epelboin
 
Bienvenue dans la dictature de la transparence
Bienvenue dans la dictature de la transparenceBienvenue dans la dictature de la transparence
Bienvenue dans la dictature de la transparence
Fabrice Epelboin
 
Mass Interception by Amesys (21 200810 iss-prg-amesys)
Mass Interception by Amesys (21 200810 iss-prg-amesys)Mass Interception by Amesys (21 200810 iss-prg-amesys)
Mass Interception by Amesys (21 200810 iss-prg-amesys)
Fabrice Epelboin
 
IPSOS barometre-nouvelles-fractures
IPSOS barometre-nouvelles-fracturesIPSOS barometre-nouvelles-fractures
IPSOS barometre-nouvelles-fractures
Fabrice Epelboin
 

Plus de Fabrice Epelboin (19)

Enseigner a distance
Enseigner a distance Enseigner a distance
Enseigner a distance
 
HCFDC Noam Chomsky is wrong. At last. Thanks to the internets.
HCFDC Noam Chomsky is wrong. At last. Thanks to the internets.HCFDC Noam Chomsky is wrong. At last. Thanks to the internets.
HCFDC Noam Chomsky is wrong. At last. Thanks to the internets.
 
HCFDC Internet, la petite fabrique du social et du renouveau des confrontations
HCFDC Internet, la petite fabrique du social et du renouveau des confrontationsHCFDC Internet, la petite fabrique du social et du renouveau des confrontations
HCFDC Internet, la petite fabrique du social et du renouveau des confrontations
 
HCFDC Ces algorithmes qui font et défont nos sociétés
HCFDC Ces algorithmes qui font et défont nos sociétésHCFDC Ces algorithmes qui font et défont nos sociétés
HCFDC Ces algorithmes qui font et défont nos sociétés
 
HCFDC progrès & technologies, une mise en perspective
HCFDC progrès & technologies, une mise en perspectiveHCFDC progrès & technologies, une mise en perspective
HCFDC progrès & technologies, une mise en perspective
 
Keynote Devoxx 2016
Keynote Devoxx 2016Keynote Devoxx 2016
Keynote Devoxx 2016
 
Sciences Po. Paris - Social Media Behin the Scenes - Aggregation & disintegra...
Sciences Po. Paris - Social Media Behin the Scenes - Aggregation & disintegra...Sciences Po. Paris - Social Media Behin the Scenes - Aggregation & disintegra...
Sciences Po. Paris - Social Media Behin the Scenes - Aggregation & disintegra...
 
LGP oct '14
LGP oct '14LGP oct '14
LGP oct '14
 
ScPo - SoMe - History
ScPo - SoMe - HistoryScPo - SoMe - History
ScPo - SoMe - History
 
ScPo - SoMe - introduction
ScPo - SoMe - introductionScPo - SoMe - introduction
ScPo - SoMe - introduction
 
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
Privacy as identity territoriality  re-conceptualising behaviour in cyberspacePrivacy as identity territoriality  re-conceptualising behaviour in cyberspace
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
 
GCHQ - The art of deception / Reputation War
GCHQ - The art of deception / Reputation WarGCHQ - The art of deception / Reputation War
GCHQ - The art of deception / Reputation War
 
Medef labcom-bad buzz
Medef labcom-bad buzzMedef labcom-bad buzz
Medef labcom-bad buzz
 
Sc po some-04
Sc po some-04Sc po some-04
Sc po some-04
 
Sciences Po. Paris - atelier "The internets" 2012 sem10
Sciences Po. Paris - atelier "The internets" 2012 sem10Sciences Po. Paris - atelier "The internets" 2012 sem10
Sciences Po. Paris - atelier "The internets" 2012 sem10
 
Bienvenue dans la dictature de la transparence
Bienvenue dans la dictature de la transparenceBienvenue dans la dictature de la transparence
Bienvenue dans la dictature de la transparence
 
Smi2012 Marrakech
Smi2012 MarrakechSmi2012 Marrakech
Smi2012 Marrakech
 
Mass Interception by Amesys (21 200810 iss-prg-amesys)
Mass Interception by Amesys (21 200810 iss-prg-amesys)Mass Interception by Amesys (21 200810 iss-prg-amesys)
Mass Interception by Amesys (21 200810 iss-prg-amesys)
 
IPSOS barometre-nouvelles-fractures
IPSOS barometre-nouvelles-fracturesIPSOS barometre-nouvelles-fractures
IPSOS barometre-nouvelles-fractures
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Sc po some-05