SlideShare une entreprise Scribd logo
1  sur  48
Télécharger pour lire hors ligne
Evil Surveillance or Surveillance of Evil Week 11 CULT1110 A/Prof Marj Kibby
Discipline & Punishment ,[object Object],[object Object],[object Object],[object Object]
Penal Process ,[object Object],[object Object],[object Object],[object Object]
Surveillance ,[object Object],[object Object]
 
Self-surveillance ,[object Object],[object Object],[object Object]
Surveillance ,[object Object],[object Object]
Surveillance Society ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Loyalty cards
Electronic tags
Metadata
ID & Access Cards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Biometrics Biometrics  comprises methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Walt Disney World is the USA's largest single commercial application of biometrics.
Mobile telephony For mobile social networks, texted location information or mobile phone tracking can enable location-based services to enrich social networking. Geolocation on web-based social network services can be IP-based or use hotspot trilateration. Mobile phone tracking  tracks the current position of a mobile phone even on the move, by linking the signal strength or weakness to nearby antenna masts.
Surveillance Process ,[object Object],[object Object],[object Object],[object Object],[object Object]
Social sorting ,[object Object]
Unintentional control ,[object Object],[object Object],[object Object],[object Object]
Data meshing ,[object Object],[object Object],[object Object],[object Object]
Blurring of Public/Private ,[object Object],[object Object],[object Object]
CCTV:You Are Being Watched ,[object Object],[object Object]
 
Surveillance ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
Who is watched? ,[object Object],[object Object],[object Object]
Who is watching? ,[object Object],[object Object],[object Object]
James Bulger Case ,[object Object]
 
Is anyone watching?
Visibility/Invisibility: The Failure of Surveillance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Technology
Peer Surveillance ,[object Object],[object Object]
[object Object]
Privacy Publicity Buzz
Self-surveillance ,[object Object],[object Object],[object Object],[object Object]
Empowering Exhibitionism ,[object Object],[object Object]
Blurring of Boundaries ,[object Object],[object Object],[object Object],[object Object]
Invisible audiences ,[object Object]
Multiple audiences
Convergence ,[object Object],[object Object]
The Evolution of Privacy on Facebook
The Evolution of Privacy on Facebook
The Evolution of Privacy on Facebook
The Evolution of Privacy on Facebook
The Evolution of Privacy on Facebook
The Evolution of Privacy on Facebook
People Sleeping at U of N
 
Empowering exhibitionism

Contenu connexe

En vedette

Role of law enforcement, si as & others
Role of law enforcement, si as & othersRole of law enforcement, si as & others
Role of law enforcement, si as & othersrcorrigan
 
A Personal And Home Defense Strategy Converted
A Personal And Home Defense Strategy ConvertedA Personal And Home Defense Strategy Converted
A Personal And Home Defense Strategy Convertedguest0821b898
 
K-10714 ABHISHEK(AUTOMOBILE SURVEILLANCE)
K-10714 ABHISHEK(AUTOMOBILE SURVEILLANCE)K-10714 ABHISHEK(AUTOMOBILE SURVEILLANCE)
K-10714 ABHISHEK(AUTOMOBILE SURVEILLANCE)shailesh yadav
 
[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-Terrorism[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-TerrorismChallenge:Future
 
ASIS CCCT Workshop: Wireless Security & Surveillance
ASIS CCCT Workshop: Wireless Security & SurveillanceASIS CCCT Workshop: Wireless Security & Surveillance
ASIS CCCT Workshop: Wireless Security & SurveillanceFiretide
 
iPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsiPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsMariano Amartino
 
Forecasting Technological Change (1)
Forecasting Technological Change (1)Forecasting Technological Change (1)
Forecasting Technological Change (1)Paul Schumann
 
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...Keith Harris
 
Surveillance and Notification of Diseases
Surveillance and Notification of DiseasesSurveillance and Notification of Diseases
Surveillance and Notification of DiseasesDr Ghaiath Hussein
 
Introduction to Epidemiology and Surveillance
Introduction to Epidemiology and SurveillanceIntroduction to Epidemiology and Surveillance
Introduction to Epidemiology and SurveillanceGeorge Moulton
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance SocietyKaren Moxley
 

En vedette (16)

lmtp_program
lmtp_programlmtp_program
lmtp_program
 
Role of law enforcement, si as & others
Role of law enforcement, si as & othersRole of law enforcement, si as & others
Role of law enforcement, si as & others
 
DRUG ENFORCEMENT 2
DRUG ENFORCEMENT 2DRUG ENFORCEMENT 2
DRUG ENFORCEMENT 2
 
A Personal And Home Defense Strategy Converted
A Personal And Home Defense Strategy ConvertedA Personal And Home Defense Strategy Converted
A Personal And Home Defense Strategy Converted
 
K-10714 ABHISHEK(AUTOMOBILE SURVEILLANCE)
K-10714 ABHISHEK(AUTOMOBILE SURVEILLANCE)K-10714 ABHISHEK(AUTOMOBILE SURVEILLANCE)
K-10714 ABHISHEK(AUTOMOBILE SURVEILLANCE)
 
[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-Terrorism[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-Terrorism
 
ASIS CCCT Workshop: Wireless Security & Surveillance
ASIS CCCT Workshop: Wireless Security & SurveillanceASIS CCCT Workshop: Wireless Security & Surveillance
ASIS CCCT Workshop: Wireless Security & Surveillance
 
iPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsiPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanisms
 
Forecasting Technological Change (1)
Forecasting Technological Change (1)Forecasting Technological Change (1)
Forecasting Technological Change (1)
 
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
 
Surveillance and Notification of Diseases
Surveillance and Notification of DiseasesSurveillance and Notification of Diseases
Surveillance and Notification of Diseases
 
Introduction to Epidemiology and Surveillance
Introduction to Epidemiology and SurveillanceIntroduction to Epidemiology and Surveillance
Introduction to Epidemiology and Surveillance
 
Surveillance
SurveillanceSurveillance
Surveillance
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 
Surveillance
SurveillanceSurveillance
Surveillance
 
Surveillance
SurveillanceSurveillance
Surveillance
 

Similaire à Surveillance And Power

Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984Christy Davis
 
2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)Felipe Prado
 
Selfies, Surveillance and the Voluntary Panopticon
Selfies, Surveillance and the Voluntary Panopticon Selfies, Surveillance and the Voluntary Panopticon
Selfies, Surveillance and the Voluntary Panopticon piero scaruffi
 
Visual monitoring of people in private spaces. From the “Big Brother” to the...
Visual monitoring of people in private spaces.  From the “Big Brother” to the...Visual monitoring of people in private spaces.  From the “Big Brother” to the...
Visual monitoring of people in private spaces. From the “Big Brother” to the...Francisco (Paco) Florez-Revuelta
 
Living Information Public Life
Living Information Public LifeLiving Information Public Life
Living Information Public LifeMark Deuze
 
Censorship Persuasive Essay.pdf
Censorship Persuasive Essay.pdfCensorship Persuasive Essay.pdf
Censorship Persuasive Essay.pdfCamila Fernandes
 
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוךמצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוךgkurtz
 
Privacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issuePrivacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issueThe PRactice
 
The rise of peep culture
The rise of peep cultureThe rise of peep culture
The rise of peep cultureArief Gunawan
 
Oral Presentation - Cyberbullying.pptx
Oral Presentation - Cyberbullying.pptxOral Presentation - Cyberbullying.pptx
Oral Presentation - Cyberbullying.pptxLilianaMonteiro39
 
Civil Resistance 2.0: 198 Methods Upgraded
Civil Resistance 2.0: 198 Methods UpgradedCivil Resistance 2.0: 198 Methods Upgraded
Civil Resistance 2.0: 198 Methods UpgradedMer Joyce
 
005 kaspersky-digital-amnesia-19.6.15
005 kaspersky-digital-amnesia-19.6.15005 kaspersky-digital-amnesia-19.6.15
005 kaspersky-digital-amnesia-19.6.15Angry Mum
 
Should The Government Surveillance Systems Affect Personal...
Should The Government Surveillance Systems Affect Personal...Should The Government Surveillance Systems Affect Personal...
Should The Government Surveillance Systems Affect Personal...Felicia Barker
 
Self-Assessment Examples - 46 Samp
Self-Assessment Examples - 46 SampSelf-Assessment Examples - 46 Samp
Self-Assessment Examples - 46 SampShelly Martinez
 
Disruptive Technologies Articles -by Yogesh Malik
Disruptive Technologies Articles -by Yogesh MalikDisruptive Technologies Articles -by Yogesh Malik
Disruptive Technologies Articles -by Yogesh MalikYogesh Malik
 
We Media 10 surveillance 1
We Media 10 surveillance 1We Media 10 surveillance 1
We Media 10 surveillance 1chrisianwelch
 
Could COVID-19 Kickstart Surveillance Culture?
Could COVID-19 Kickstart Surveillance Culture?Could COVID-19 Kickstart Surveillance Culture?
Could COVID-19 Kickstart Surveillance Culture?Bennat Berger
 
COMBATTINGFAKENEWS.pdf
COMBATTINGFAKENEWS.pdfCOMBATTINGFAKENEWS.pdf
COMBATTINGFAKENEWS.pdfManong Mele
 

Similaire à Surveillance And Power (19)

Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984
 
Digital Surveillance
Digital SurveillanceDigital Surveillance
Digital Surveillance
 
2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)
 
Selfies, Surveillance and the Voluntary Panopticon
Selfies, Surveillance and the Voluntary Panopticon Selfies, Surveillance and the Voluntary Panopticon
Selfies, Surveillance and the Voluntary Panopticon
 
Visual monitoring of people in private spaces. From the “Big Brother” to the...
Visual monitoring of people in private spaces.  From the “Big Brother” to the...Visual monitoring of people in private spaces.  From the “Big Brother” to the...
Visual monitoring of people in private spaces. From the “Big Brother” to the...
 
Living Information Public Life
Living Information Public LifeLiving Information Public Life
Living Information Public Life
 
Censorship Persuasive Essay.pdf
Censorship Persuasive Essay.pdfCensorship Persuasive Essay.pdf
Censorship Persuasive Essay.pdf
 
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוךמצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
 
Privacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issuePrivacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issue
 
The rise of peep culture
The rise of peep cultureThe rise of peep culture
The rise of peep culture
 
Oral Presentation - Cyberbullying.pptx
Oral Presentation - Cyberbullying.pptxOral Presentation - Cyberbullying.pptx
Oral Presentation - Cyberbullying.pptx
 
Civil Resistance 2.0: 198 Methods Upgraded
Civil Resistance 2.0: 198 Methods UpgradedCivil Resistance 2.0: 198 Methods Upgraded
Civil Resistance 2.0: 198 Methods Upgraded
 
005 kaspersky-digital-amnesia-19.6.15
005 kaspersky-digital-amnesia-19.6.15005 kaspersky-digital-amnesia-19.6.15
005 kaspersky-digital-amnesia-19.6.15
 
Should The Government Surveillance Systems Affect Personal...
Should The Government Surveillance Systems Affect Personal...Should The Government Surveillance Systems Affect Personal...
Should The Government Surveillance Systems Affect Personal...
 
Self-Assessment Examples - 46 Samp
Self-Assessment Examples - 46 SampSelf-Assessment Examples - 46 Samp
Self-Assessment Examples - 46 Samp
 
Disruptive Technologies Articles -by Yogesh Malik
Disruptive Technologies Articles -by Yogesh MalikDisruptive Technologies Articles -by Yogesh Malik
Disruptive Technologies Articles -by Yogesh Malik
 
We Media 10 surveillance 1
We Media 10 surveillance 1We Media 10 surveillance 1
We Media 10 surveillance 1
 
Could COVID-19 Kickstart Surveillance Culture?
Could COVID-19 Kickstart Surveillance Culture?Could COVID-19 Kickstart Surveillance Culture?
Could COVID-19 Kickstart Surveillance Culture?
 
COMBATTINGFAKENEWS.pdf
COMBATTINGFAKENEWS.pdfCOMBATTINGFAKENEWS.pdf
COMBATTINGFAKENEWS.pdf
 

Plus de Marj Kibby

Location based apps and the spatial self
Location based apps and the spatial selfLocation based apps and the spatial self
Location based apps and the spatial selfMarj Kibby
 
Who's read my essay?
Who's read my essay?Who's read my essay?
Who's read my essay?Marj Kibby
 
Flickr And New Media Literacy
Flickr And New Media LiteracyFlickr And New Media Literacy
Flickr And New Media LiteracyMarj Kibby
 
Not Sleeping With The Band
Not Sleeping With The BandNot Sleeping With The Band
Not Sleeping With The BandMarj Kibby
 
Hybrid Teaching
Hybrid TeachingHybrid Teaching
Hybrid TeachingMarj Kibby
 

Plus de Marj Kibby (8)

Location based apps and the spatial self
Location based apps and the spatial selfLocation based apps and the spatial self
Location based apps and the spatial self
 
Who's read my essay?
Who's read my essay?Who's read my essay?
Who's read my essay?
 
PLEs And CMSs
PLEs And CMSsPLEs And CMSs
PLEs And CMSs
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
Flickr And New Media Literacy
Flickr And New Media LiteracyFlickr And New Media Literacy
Flickr And New Media Literacy
 
Pathways
PathwaysPathways
Pathways
 
Not Sleeping With The Band
Not Sleeping With The BandNot Sleeping With The Band
Not Sleeping With The Band
 
Hybrid Teaching
Hybrid TeachingHybrid Teaching
Hybrid Teaching
 

Surveillance And Power