CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.

13
CCT 300: Critical Analysis of Media Class 8: Identity and Privacy

Transcript of CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.

Page 1: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.

CCT 300 Critical Analysis of MediaCCT 300 Critical Analysis of Media

Class 8 Identity and PrivacyClass 8 Identity and Privacy

Identity and PrivacyIdentity and Privacy

bull Mass media - mass audience - isolating perhaps but private

bull New media - emphasis on data structure processing and content manipulation allows for individual expression - but also individual tracking

bull Mass media - mass audience - isolating perhaps but private

bull New media - emphasis on data structure processing and content manipulation allows for individual expression - but also individual tracking

Trust SurveyTrust Surveybull City TV Toronto Star CNN Daily

ShowColbert Report BBC most consulted sources

bull Daily Show most trusted of above () then City Star Colbert BBCCNN

bull Friendsfamily trusted sourcebull Only 4 hoursweek on

newsinformation average ()

bull City TV Toronto Star CNN Daily ShowColbert Report BBC most consulted sources

bull Daily Show most trusted of above () then City Star Colbert BBCCNN

bull Friendsfamily trusted sourcebull Only 4 hoursweek on

newsinformation average ()

Identity and MediaIdentity and Media

bull Mass media - identity constructed in consumer terms often vague

bull Niche media - a bit more structured but also certain identities privileged over others - eg 500 channel universe

bull Mass media - identity constructed in consumer terms often vague

bull Niche media - a bit more structured but also certain identities privileged over others - eg 500 channel universe

Media StereotypingMedia Stereotypingbull Ethnicvisible minoritiesbull (White Male) People of Privilegebull Aboriginal peoplesbull Girls and Womenbull GaysLesbiansbull httpwwwmedia-awarenessca

englishissuesstereotypingindexcfm

bull Ethnicvisible minoritiesbull (White Male) People of Privilegebull Aboriginal peoplesbull Girls and Womenbull GaysLesbiansbull httpwwwmedia-awarenessca

englishissuesstereotypingindexcfm

ActivityActivity

bull What types of stereotypes exist in media portrayal of these groups

bull How do stereotypes influence media representation

bull Examples of stereotype change - how why

bull What types of stereotypes exist in media portrayal of these groups

bull How do stereotypes influence media representation

bull Examples of stereotype change - how why

Identity and New MediaIdentity and New Media

bull Possibility for identity construction and identity play (Turkle)

bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted

bull Possibility for identity construction and identity play (Turkle)

bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted

ButhellipButhellip

bull Stereotypical representations still common

bull Gender stereotypes in video games (similar to comics - Lara Croft ex)

bull Stereotype play in online chat examples

bull Stereotypical representations still common

bull Gender stereotypes in video games (similar to comics - Lara Croft ex)

bull Stereotype play in online chat examples

Privacy and SurveillancePrivacy and Surveillancebull Individuated transactions can be and

are monitored - new media make surveillance more efficient

bull Enforcement haphazard - both panopticon effect and simple logistics

bull Not just government but corporate - workplace surveillance and rights of workers to associate

bull Individuated transactions can be and are monitored - new media make surveillance more efficient

bull Enforcement haphazard - both panopticon effect and simple logistics

bull Not just government but corporate - workplace surveillance and rights of workers to associate

Ex face recognition analysis

Ex face recognition analysis

bull Technologies to scan and detect faces in a crowd

bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence

bull Technologies to scan and detect faces in a crowd

bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence

ProblemsProblemsbull Abuse - who controls information For

what purposes is it collected bull Cross-referencing - links to biometrics

Banking data Advertisingbull Voyeurism from afar - violation of shared

norms of public spacesbull False sense of security - not ldquoneedle in

haystackrdquo technology false positives probability of loopholes

bull Abuse - who controls information For what purposes is it collected

bull Cross-referencing - links to biometrics Banking data Advertising

bull Voyeurism from afar - violation of shared norms of public spaces

bull False sense of security - not ldquoneedle in haystackrdquo technology false positives probability of loopholes

Privacy and 911Privacy and 911bull American reaction to 911 swift and

disturbing - USA Patriot Act Military Commissions Act

bull Surveillance of communication and artefact alike combined with secrecy in name of national security

bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269

bull American reaction to 911 swift and disturbing - USA Patriot Act Military Commissions Act

bull Surveillance of communication and artefact alike combined with secrecy in name of national security

bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269

Next WeekhellipNext Weekhellip

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

  • CCT 300 Critical Analysis of Media
  • Identity and Privacy
  • Trust Survey
  • Identity and Media
  • Media Stereotyping
  • Activity
  • Identity and New Media
  • Buthellip
  • Privacy and Surveillance
  • Ex face recognition analysis
  • Problems
  • Privacy and 911
  • Next Weekhellip
Page 2: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.

Identity and PrivacyIdentity and Privacy

bull Mass media - mass audience - isolating perhaps but private

bull New media - emphasis on data structure processing and content manipulation allows for individual expression - but also individual tracking

bull Mass media - mass audience - isolating perhaps but private

bull New media - emphasis on data structure processing and content manipulation allows for individual expression - but also individual tracking

Trust SurveyTrust Surveybull City TV Toronto Star CNN Daily

ShowColbert Report BBC most consulted sources

bull Daily Show most trusted of above () then City Star Colbert BBCCNN

bull Friendsfamily trusted sourcebull Only 4 hoursweek on

newsinformation average ()

bull City TV Toronto Star CNN Daily ShowColbert Report BBC most consulted sources

bull Daily Show most trusted of above () then City Star Colbert BBCCNN

bull Friendsfamily trusted sourcebull Only 4 hoursweek on

newsinformation average ()

Identity and MediaIdentity and Media

bull Mass media - identity constructed in consumer terms often vague

bull Niche media - a bit more structured but also certain identities privileged over others - eg 500 channel universe

bull Mass media - identity constructed in consumer terms often vague

bull Niche media - a bit more structured but also certain identities privileged over others - eg 500 channel universe

Media StereotypingMedia Stereotypingbull Ethnicvisible minoritiesbull (White Male) People of Privilegebull Aboriginal peoplesbull Girls and Womenbull GaysLesbiansbull httpwwwmedia-awarenessca

englishissuesstereotypingindexcfm

bull Ethnicvisible minoritiesbull (White Male) People of Privilegebull Aboriginal peoplesbull Girls and Womenbull GaysLesbiansbull httpwwwmedia-awarenessca

englishissuesstereotypingindexcfm

ActivityActivity

bull What types of stereotypes exist in media portrayal of these groups

bull How do stereotypes influence media representation

bull Examples of stereotype change - how why

bull What types of stereotypes exist in media portrayal of these groups

bull How do stereotypes influence media representation

bull Examples of stereotype change - how why

Identity and New MediaIdentity and New Media

bull Possibility for identity construction and identity play (Turkle)

bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted

bull Possibility for identity construction and identity play (Turkle)

bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted

ButhellipButhellip

bull Stereotypical representations still common

bull Gender stereotypes in video games (similar to comics - Lara Croft ex)

bull Stereotype play in online chat examples

bull Stereotypical representations still common

bull Gender stereotypes in video games (similar to comics - Lara Croft ex)

bull Stereotype play in online chat examples

Privacy and SurveillancePrivacy and Surveillancebull Individuated transactions can be and

are monitored - new media make surveillance more efficient

bull Enforcement haphazard - both panopticon effect and simple logistics

bull Not just government but corporate - workplace surveillance and rights of workers to associate

bull Individuated transactions can be and are monitored - new media make surveillance more efficient

bull Enforcement haphazard - both panopticon effect and simple logistics

bull Not just government but corporate - workplace surveillance and rights of workers to associate

Ex face recognition analysis

Ex face recognition analysis

bull Technologies to scan and detect faces in a crowd

bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence

bull Technologies to scan and detect faces in a crowd

bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence

ProblemsProblemsbull Abuse - who controls information For

what purposes is it collected bull Cross-referencing - links to biometrics

Banking data Advertisingbull Voyeurism from afar - violation of shared

norms of public spacesbull False sense of security - not ldquoneedle in

haystackrdquo technology false positives probability of loopholes

bull Abuse - who controls information For what purposes is it collected

bull Cross-referencing - links to biometrics Banking data Advertising

bull Voyeurism from afar - violation of shared norms of public spaces

bull False sense of security - not ldquoneedle in haystackrdquo technology false positives probability of loopholes

Privacy and 911Privacy and 911bull American reaction to 911 swift and

disturbing - USA Patriot Act Military Commissions Act

bull Surveillance of communication and artefact alike combined with secrecy in name of national security

bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269

bull American reaction to 911 swift and disturbing - USA Patriot Act Military Commissions Act

bull Surveillance of communication and artefact alike combined with secrecy in name of national security

bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269

Next WeekhellipNext Weekhellip

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

  • CCT 300 Critical Analysis of Media
  • Identity and Privacy
  • Trust Survey
  • Identity and Media
  • Media Stereotyping
  • Activity
  • Identity and New Media
  • Buthellip
  • Privacy and Surveillance
  • Ex face recognition analysis
  • Problems
  • Privacy and 911
  • Next Weekhellip
Page 3: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.

Trust SurveyTrust Surveybull City TV Toronto Star CNN Daily

ShowColbert Report BBC most consulted sources

bull Daily Show most trusted of above () then City Star Colbert BBCCNN

bull Friendsfamily trusted sourcebull Only 4 hoursweek on

newsinformation average ()

bull City TV Toronto Star CNN Daily ShowColbert Report BBC most consulted sources

bull Daily Show most trusted of above () then City Star Colbert BBCCNN

bull Friendsfamily trusted sourcebull Only 4 hoursweek on

newsinformation average ()

Identity and MediaIdentity and Media

bull Mass media - identity constructed in consumer terms often vague

bull Niche media - a bit more structured but also certain identities privileged over others - eg 500 channel universe

bull Mass media - identity constructed in consumer terms often vague

bull Niche media - a bit more structured but also certain identities privileged over others - eg 500 channel universe

Media StereotypingMedia Stereotypingbull Ethnicvisible minoritiesbull (White Male) People of Privilegebull Aboriginal peoplesbull Girls and Womenbull GaysLesbiansbull httpwwwmedia-awarenessca

englishissuesstereotypingindexcfm

bull Ethnicvisible minoritiesbull (White Male) People of Privilegebull Aboriginal peoplesbull Girls and Womenbull GaysLesbiansbull httpwwwmedia-awarenessca

englishissuesstereotypingindexcfm

ActivityActivity

bull What types of stereotypes exist in media portrayal of these groups

bull How do stereotypes influence media representation

bull Examples of stereotype change - how why

bull What types of stereotypes exist in media portrayal of these groups

bull How do stereotypes influence media representation

bull Examples of stereotype change - how why

Identity and New MediaIdentity and New Media

bull Possibility for identity construction and identity play (Turkle)

bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted

bull Possibility for identity construction and identity play (Turkle)

bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted

ButhellipButhellip

bull Stereotypical representations still common

bull Gender stereotypes in video games (similar to comics - Lara Croft ex)

bull Stereotype play in online chat examples

bull Stereotypical representations still common

bull Gender stereotypes in video games (similar to comics - Lara Croft ex)

bull Stereotype play in online chat examples

Privacy and SurveillancePrivacy and Surveillancebull Individuated transactions can be and

are monitored - new media make surveillance more efficient

bull Enforcement haphazard - both panopticon effect and simple logistics

bull Not just government but corporate - workplace surveillance and rights of workers to associate

bull Individuated transactions can be and are monitored - new media make surveillance more efficient

bull Enforcement haphazard - both panopticon effect and simple logistics

bull Not just government but corporate - workplace surveillance and rights of workers to associate

Ex face recognition analysis

Ex face recognition analysis

bull Technologies to scan and detect faces in a crowd

bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence

bull Technologies to scan and detect faces in a crowd

bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence

ProblemsProblemsbull Abuse - who controls information For

what purposes is it collected bull Cross-referencing - links to biometrics

Banking data Advertisingbull Voyeurism from afar - violation of shared

norms of public spacesbull False sense of security - not ldquoneedle in

haystackrdquo technology false positives probability of loopholes

bull Abuse - who controls information For what purposes is it collected

bull Cross-referencing - links to biometrics Banking data Advertising

bull Voyeurism from afar - violation of shared norms of public spaces

bull False sense of security - not ldquoneedle in haystackrdquo technology false positives probability of loopholes

Privacy and 911Privacy and 911bull American reaction to 911 swift and

disturbing - USA Patriot Act Military Commissions Act

bull Surveillance of communication and artefact alike combined with secrecy in name of national security

bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269

bull American reaction to 911 swift and disturbing - USA Patriot Act Military Commissions Act

bull Surveillance of communication and artefact alike combined with secrecy in name of national security

bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269

Next WeekhellipNext Weekhellip

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

  • CCT 300 Critical Analysis of Media
  • Identity and Privacy
  • Trust Survey
  • Identity and Media
  • Media Stereotyping
  • Activity
  • Identity and New Media
  • Buthellip
  • Privacy and Surveillance
  • Ex face recognition analysis
  • Problems
  • Privacy and 911
  • Next Weekhellip
Page 4: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.

Identity and MediaIdentity and Media

bull Mass media - identity constructed in consumer terms often vague

bull Niche media - a bit more structured but also certain identities privileged over others - eg 500 channel universe

bull Mass media - identity constructed in consumer terms often vague

bull Niche media - a bit more structured but also certain identities privileged over others - eg 500 channel universe

Media StereotypingMedia Stereotypingbull Ethnicvisible minoritiesbull (White Male) People of Privilegebull Aboriginal peoplesbull Girls and Womenbull GaysLesbiansbull httpwwwmedia-awarenessca

englishissuesstereotypingindexcfm

bull Ethnicvisible minoritiesbull (White Male) People of Privilegebull Aboriginal peoplesbull Girls and Womenbull GaysLesbiansbull httpwwwmedia-awarenessca

englishissuesstereotypingindexcfm

ActivityActivity

bull What types of stereotypes exist in media portrayal of these groups

bull How do stereotypes influence media representation

bull Examples of stereotype change - how why

bull What types of stereotypes exist in media portrayal of these groups

bull How do stereotypes influence media representation

bull Examples of stereotype change - how why

Identity and New MediaIdentity and New Media

bull Possibility for identity construction and identity play (Turkle)

bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted

bull Possibility for identity construction and identity play (Turkle)

bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted

ButhellipButhellip

bull Stereotypical representations still common

bull Gender stereotypes in video games (similar to comics - Lara Croft ex)

bull Stereotype play in online chat examples

bull Stereotypical representations still common

bull Gender stereotypes in video games (similar to comics - Lara Croft ex)

bull Stereotype play in online chat examples

Privacy and SurveillancePrivacy and Surveillancebull Individuated transactions can be and

are monitored - new media make surveillance more efficient

bull Enforcement haphazard - both panopticon effect and simple logistics

bull Not just government but corporate - workplace surveillance and rights of workers to associate

bull Individuated transactions can be and are monitored - new media make surveillance more efficient

bull Enforcement haphazard - both panopticon effect and simple logistics

bull Not just government but corporate - workplace surveillance and rights of workers to associate

Ex face recognition analysis

Ex face recognition analysis

bull Technologies to scan and detect faces in a crowd

bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence

bull Technologies to scan and detect faces in a crowd

bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence

ProblemsProblemsbull Abuse - who controls information For

what purposes is it collected bull Cross-referencing - links to biometrics

Banking data Advertisingbull Voyeurism from afar - violation of shared

norms of public spacesbull False sense of security - not ldquoneedle in

haystackrdquo technology false positives probability of loopholes

bull Abuse - who controls information For what purposes is it collected

bull Cross-referencing - links to biometrics Banking data Advertising

bull Voyeurism from afar - violation of shared norms of public spaces

bull False sense of security - not ldquoneedle in haystackrdquo technology false positives probability of loopholes

Privacy and 911Privacy and 911bull American reaction to 911 swift and

disturbing - USA Patriot Act Military Commissions Act

bull Surveillance of communication and artefact alike combined with secrecy in name of national security

bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269

bull American reaction to 911 swift and disturbing - USA Patriot Act Military Commissions Act

bull Surveillance of communication and artefact alike combined with secrecy in name of national security

bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269

Next WeekhellipNext Weekhellip

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

  • CCT 300 Critical Analysis of Media
  • Identity and Privacy
  • Trust Survey
  • Identity and Media
  • Media Stereotyping
  • Activity
  • Identity and New Media
  • Buthellip
  • Privacy and Surveillance
  • Ex face recognition analysis
  • Problems
  • Privacy and 911
  • Next Weekhellip
Page 5: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.

Media StereotypingMedia Stereotypingbull Ethnicvisible minoritiesbull (White Male) People of Privilegebull Aboriginal peoplesbull Girls and Womenbull GaysLesbiansbull httpwwwmedia-awarenessca

englishissuesstereotypingindexcfm

bull Ethnicvisible minoritiesbull (White Male) People of Privilegebull Aboriginal peoplesbull Girls and Womenbull GaysLesbiansbull httpwwwmedia-awarenessca

englishissuesstereotypingindexcfm

ActivityActivity

bull What types of stereotypes exist in media portrayal of these groups

bull How do stereotypes influence media representation

bull Examples of stereotype change - how why

bull What types of stereotypes exist in media portrayal of these groups

bull How do stereotypes influence media representation

bull Examples of stereotype change - how why

Identity and New MediaIdentity and New Media

bull Possibility for identity construction and identity play (Turkle)

bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted

bull Possibility for identity construction and identity play (Turkle)

bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted

ButhellipButhellip

bull Stereotypical representations still common

bull Gender stereotypes in video games (similar to comics - Lara Croft ex)

bull Stereotype play in online chat examples

bull Stereotypical representations still common

bull Gender stereotypes in video games (similar to comics - Lara Croft ex)

bull Stereotype play in online chat examples

Privacy and SurveillancePrivacy and Surveillancebull Individuated transactions can be and

are monitored - new media make surveillance more efficient

bull Enforcement haphazard - both panopticon effect and simple logistics

bull Not just government but corporate - workplace surveillance and rights of workers to associate

bull Individuated transactions can be and are monitored - new media make surveillance more efficient

bull Enforcement haphazard - both panopticon effect and simple logistics

bull Not just government but corporate - workplace surveillance and rights of workers to associate

Ex face recognition analysis

Ex face recognition analysis

bull Technologies to scan and detect faces in a crowd

bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence

bull Technologies to scan and detect faces in a crowd

bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence

ProblemsProblemsbull Abuse - who controls information For

what purposes is it collected bull Cross-referencing - links to biometrics

Banking data Advertisingbull Voyeurism from afar - violation of shared

norms of public spacesbull False sense of security - not ldquoneedle in

haystackrdquo technology false positives probability of loopholes

bull Abuse - who controls information For what purposes is it collected

bull Cross-referencing - links to biometrics Banking data Advertising

bull Voyeurism from afar - violation of shared norms of public spaces

bull False sense of security - not ldquoneedle in haystackrdquo technology false positives probability of loopholes

Privacy and 911Privacy and 911bull American reaction to 911 swift and

disturbing - USA Patriot Act Military Commissions Act

bull Surveillance of communication and artefact alike combined with secrecy in name of national security

bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269

bull American reaction to 911 swift and disturbing - USA Patriot Act Military Commissions Act

bull Surveillance of communication and artefact alike combined with secrecy in name of national security

bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269

Next WeekhellipNext Weekhellip

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

  • CCT 300 Critical Analysis of Media
  • Identity and Privacy
  • Trust Survey
  • Identity and Media
  • Media Stereotyping
  • Activity
  • Identity and New Media
  • Buthellip
  • Privacy and Surveillance
  • Ex face recognition analysis
  • Problems
  • Privacy and 911
  • Next Weekhellip
Page 6: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.

ActivityActivity

bull What types of stereotypes exist in media portrayal of these groups

bull How do stereotypes influence media representation

bull Examples of stereotype change - how why

bull What types of stereotypes exist in media portrayal of these groups

bull How do stereotypes influence media representation

bull Examples of stereotype change - how why

Identity and New MediaIdentity and New Media

bull Possibility for identity construction and identity play (Turkle)

bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted

bull Possibility for identity construction and identity play (Turkle)

bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted

ButhellipButhellip

bull Stereotypical representations still common

bull Gender stereotypes in video games (similar to comics - Lara Croft ex)

bull Stereotype play in online chat examples

bull Stereotypical representations still common

bull Gender stereotypes in video games (similar to comics - Lara Croft ex)

bull Stereotype play in online chat examples

Privacy and SurveillancePrivacy and Surveillancebull Individuated transactions can be and

are monitored - new media make surveillance more efficient

bull Enforcement haphazard - both panopticon effect and simple logistics

bull Not just government but corporate - workplace surveillance and rights of workers to associate

bull Individuated transactions can be and are monitored - new media make surveillance more efficient

bull Enforcement haphazard - both panopticon effect and simple logistics

bull Not just government but corporate - workplace surveillance and rights of workers to associate

Ex face recognition analysis

Ex face recognition analysis

bull Technologies to scan and detect faces in a crowd

bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence

bull Technologies to scan and detect faces in a crowd

bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence

ProblemsProblemsbull Abuse - who controls information For

what purposes is it collected bull Cross-referencing - links to biometrics

Banking data Advertisingbull Voyeurism from afar - violation of shared

norms of public spacesbull False sense of security - not ldquoneedle in

haystackrdquo technology false positives probability of loopholes

bull Abuse - who controls information For what purposes is it collected

bull Cross-referencing - links to biometrics Banking data Advertising

bull Voyeurism from afar - violation of shared norms of public spaces

bull False sense of security - not ldquoneedle in haystackrdquo technology false positives probability of loopholes

Privacy and 911Privacy and 911bull American reaction to 911 swift and

disturbing - USA Patriot Act Military Commissions Act

bull Surveillance of communication and artefact alike combined with secrecy in name of national security

bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269

bull American reaction to 911 swift and disturbing - USA Patriot Act Military Commissions Act

bull Surveillance of communication and artefact alike combined with secrecy in name of national security

bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269

Next WeekhellipNext Weekhellip

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

  • CCT 300 Critical Analysis of Media
  • Identity and Privacy
  • Trust Survey
  • Identity and Media
  • Media Stereotyping
  • Activity
  • Identity and New Media
  • Buthellip
  • Privacy and Surveillance
  • Ex face recognition analysis
  • Problems
  • Privacy and 911
  • Next Weekhellip
Page 7: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.

Identity and New MediaIdentity and New Media

bull Possibility for identity construction and identity play (Turkle)

bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted

bull Possibility for identity construction and identity play (Turkle)

bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted

ButhellipButhellip

bull Stereotypical representations still common

bull Gender stereotypes in video games (similar to comics - Lara Croft ex)

bull Stereotype play in online chat examples

bull Stereotypical representations still common

bull Gender stereotypes in video games (similar to comics - Lara Croft ex)

bull Stereotype play in online chat examples

Privacy and SurveillancePrivacy and Surveillancebull Individuated transactions can be and

are monitored - new media make surveillance more efficient

bull Enforcement haphazard - both panopticon effect and simple logistics

bull Not just government but corporate - workplace surveillance and rights of workers to associate

bull Individuated transactions can be and are monitored - new media make surveillance more efficient

bull Enforcement haphazard - both panopticon effect and simple logistics

bull Not just government but corporate - workplace surveillance and rights of workers to associate

Ex face recognition analysis

Ex face recognition analysis

bull Technologies to scan and detect faces in a crowd

bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence

bull Technologies to scan and detect faces in a crowd

bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence

ProblemsProblemsbull Abuse - who controls information For

what purposes is it collected bull Cross-referencing - links to biometrics

Banking data Advertisingbull Voyeurism from afar - violation of shared

norms of public spacesbull False sense of security - not ldquoneedle in

haystackrdquo technology false positives probability of loopholes

bull Abuse - who controls information For what purposes is it collected

bull Cross-referencing - links to biometrics Banking data Advertising

bull Voyeurism from afar - violation of shared norms of public spaces

bull False sense of security - not ldquoneedle in haystackrdquo technology false positives probability of loopholes

Privacy and 911Privacy and 911bull American reaction to 911 swift and

disturbing - USA Patriot Act Military Commissions Act

bull Surveillance of communication and artefact alike combined with secrecy in name of national security

bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269

bull American reaction to 911 swift and disturbing - USA Patriot Act Military Commissions Act

bull Surveillance of communication and artefact alike combined with secrecy in name of national security

bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269

Next WeekhellipNext Weekhellip

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

  • CCT 300 Critical Analysis of Media
  • Identity and Privacy
  • Trust Survey
  • Identity and Media
  • Media Stereotyping
  • Activity
  • Identity and New Media
  • Buthellip
  • Privacy and Surveillance
  • Ex face recognition analysis
  • Problems
  • Privacy and 911
  • Next Weekhellip
Page 8: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.

ButhellipButhellip

bull Stereotypical representations still common

bull Gender stereotypes in video games (similar to comics - Lara Croft ex)

bull Stereotype play in online chat examples

bull Stereotypical representations still common

bull Gender stereotypes in video games (similar to comics - Lara Croft ex)

bull Stereotype play in online chat examples

Privacy and SurveillancePrivacy and Surveillancebull Individuated transactions can be and

are monitored - new media make surveillance more efficient

bull Enforcement haphazard - both panopticon effect and simple logistics

bull Not just government but corporate - workplace surveillance and rights of workers to associate

bull Individuated transactions can be and are monitored - new media make surveillance more efficient

bull Enforcement haphazard - both panopticon effect and simple logistics

bull Not just government but corporate - workplace surveillance and rights of workers to associate

Ex face recognition analysis

Ex face recognition analysis

bull Technologies to scan and detect faces in a crowd

bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence

bull Technologies to scan and detect faces in a crowd

bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence

ProblemsProblemsbull Abuse - who controls information For

what purposes is it collected bull Cross-referencing - links to biometrics

Banking data Advertisingbull Voyeurism from afar - violation of shared

norms of public spacesbull False sense of security - not ldquoneedle in

haystackrdquo technology false positives probability of loopholes

bull Abuse - who controls information For what purposes is it collected

bull Cross-referencing - links to biometrics Banking data Advertising

bull Voyeurism from afar - violation of shared norms of public spaces

bull False sense of security - not ldquoneedle in haystackrdquo technology false positives probability of loopholes

Privacy and 911Privacy and 911bull American reaction to 911 swift and

disturbing - USA Patriot Act Military Commissions Act

bull Surveillance of communication and artefact alike combined with secrecy in name of national security

bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269

bull American reaction to 911 swift and disturbing - USA Patriot Act Military Commissions Act

bull Surveillance of communication and artefact alike combined with secrecy in name of national security

bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269

Next WeekhellipNext Weekhellip

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

  • CCT 300 Critical Analysis of Media
  • Identity and Privacy
  • Trust Survey
  • Identity and Media
  • Media Stereotyping
  • Activity
  • Identity and New Media
  • Buthellip
  • Privacy and Surveillance
  • Ex face recognition analysis
  • Problems
  • Privacy and 911
  • Next Weekhellip
Page 9: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.

Privacy and SurveillancePrivacy and Surveillancebull Individuated transactions can be and

are monitored - new media make surveillance more efficient

bull Enforcement haphazard - both panopticon effect and simple logistics

bull Not just government but corporate - workplace surveillance and rights of workers to associate

bull Individuated transactions can be and are monitored - new media make surveillance more efficient

bull Enforcement haphazard - both panopticon effect and simple logistics

bull Not just government but corporate - workplace surveillance and rights of workers to associate

Ex face recognition analysis

Ex face recognition analysis

bull Technologies to scan and detect faces in a crowd

bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence

bull Technologies to scan and detect faces in a crowd

bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence

ProblemsProblemsbull Abuse - who controls information For

what purposes is it collected bull Cross-referencing - links to biometrics

Banking data Advertisingbull Voyeurism from afar - violation of shared

norms of public spacesbull False sense of security - not ldquoneedle in

haystackrdquo technology false positives probability of loopholes

bull Abuse - who controls information For what purposes is it collected

bull Cross-referencing - links to biometrics Banking data Advertising

bull Voyeurism from afar - violation of shared norms of public spaces

bull False sense of security - not ldquoneedle in haystackrdquo technology false positives probability of loopholes

Privacy and 911Privacy and 911bull American reaction to 911 swift and

disturbing - USA Patriot Act Military Commissions Act

bull Surveillance of communication and artefact alike combined with secrecy in name of national security

bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269

bull American reaction to 911 swift and disturbing - USA Patriot Act Military Commissions Act

bull Surveillance of communication and artefact alike combined with secrecy in name of national security

bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269

Next WeekhellipNext Weekhellip

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

  • CCT 300 Critical Analysis of Media
  • Identity and Privacy
  • Trust Survey
  • Identity and Media
  • Media Stereotyping
  • Activity
  • Identity and New Media
  • Buthellip
  • Privacy and Surveillance
  • Ex face recognition analysis
  • Problems
  • Privacy and 911
  • Next Weekhellip
Page 10: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.

Ex face recognition analysis

Ex face recognition analysis

bull Technologies to scan and detect faces in a crowd

bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence

bull Technologies to scan and detect faces in a crowd

bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence

ProblemsProblemsbull Abuse - who controls information For

what purposes is it collected bull Cross-referencing - links to biometrics

Banking data Advertisingbull Voyeurism from afar - violation of shared

norms of public spacesbull False sense of security - not ldquoneedle in

haystackrdquo technology false positives probability of loopholes

bull Abuse - who controls information For what purposes is it collected

bull Cross-referencing - links to biometrics Banking data Advertising

bull Voyeurism from afar - violation of shared norms of public spaces

bull False sense of security - not ldquoneedle in haystackrdquo technology false positives probability of loopholes

Privacy and 911Privacy and 911bull American reaction to 911 swift and

disturbing - USA Patriot Act Military Commissions Act

bull Surveillance of communication and artefact alike combined with secrecy in name of national security

bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269

bull American reaction to 911 swift and disturbing - USA Patriot Act Military Commissions Act

bull Surveillance of communication and artefact alike combined with secrecy in name of national security

bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269

Next WeekhellipNext Weekhellip

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

  • CCT 300 Critical Analysis of Media
  • Identity and Privacy
  • Trust Survey
  • Identity and Media
  • Media Stereotyping
  • Activity
  • Identity and New Media
  • Buthellip
  • Privacy and Surveillance
  • Ex face recognition analysis
  • Problems
  • Privacy and 911
  • Next Weekhellip
Page 11: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.

ProblemsProblemsbull Abuse - who controls information For

what purposes is it collected bull Cross-referencing - links to biometrics

Banking data Advertisingbull Voyeurism from afar - violation of shared

norms of public spacesbull False sense of security - not ldquoneedle in

haystackrdquo technology false positives probability of loopholes

bull Abuse - who controls information For what purposes is it collected

bull Cross-referencing - links to biometrics Banking data Advertising

bull Voyeurism from afar - violation of shared norms of public spaces

bull False sense of security - not ldquoneedle in haystackrdquo technology false positives probability of loopholes

Privacy and 911Privacy and 911bull American reaction to 911 swift and

disturbing - USA Patriot Act Military Commissions Act

bull Surveillance of communication and artefact alike combined with secrecy in name of national security

bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269

bull American reaction to 911 swift and disturbing - USA Patriot Act Military Commissions Act

bull Surveillance of communication and artefact alike combined with secrecy in name of national security

bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269

Next WeekhellipNext Weekhellip

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

  • CCT 300 Critical Analysis of Media
  • Identity and Privacy
  • Trust Survey
  • Identity and Media
  • Media Stereotyping
  • Activity
  • Identity and New Media
  • Buthellip
  • Privacy and Surveillance
  • Ex face recognition analysis
  • Problems
  • Privacy and 911
  • Next Weekhellip
Page 12: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.

Privacy and 911Privacy and 911bull American reaction to 911 swift and

disturbing - USA Patriot Act Military Commissions Act

bull Surveillance of communication and artefact alike combined with secrecy in name of national security

bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269

bull American reaction to 911 swift and disturbing - USA Patriot Act Military Commissions Act

bull Surveillance of communication and artefact alike combined with secrecy in name of national security

bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269

Next WeekhellipNext Weekhellip

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

  • CCT 300 Critical Analysis of Media
  • Identity and Privacy
  • Trust Survey
  • Identity and Media
  • Media Stereotyping
  • Activity
  • Identity and New Media
  • Buthellip
  • Privacy and Surveillance
  • Ex face recognition analysis
  • Problems
  • Privacy and 911
  • Next Weekhellip
Page 13: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.

Next WeekhellipNext Weekhellip

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

bull A closer look at the potential and the hype around the Internet

bull Proposal feedback

  • CCT 300 Critical Analysis of Media
  • Identity and Privacy
  • Trust Survey
  • Identity and Media
  • Media Stereotyping
  • Activity
  • Identity and New Media
  • Buthellip
  • Privacy and Surveillance
  • Ex face recognition analysis
  • Problems
  • Privacy and 911
  • Next Weekhellip