COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.
-
Upload
neal-mosley -
Category
Documents
-
view
216 -
download
1
Transcript of COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.
![Page 1: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/1.jpg)
COM 125:Privacy And Surveillance
Done By:
Shamala Devi
Siti Nur Aliah
Siti Hamimah
Dalina Daud
![Page 2: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/2.jpg)
![Page 3: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/3.jpg)
PRIVACY
- Ability of an individual or group to keep their livesand personal affairs out of public view,
- Control the flow of information about themselves.
- Sometimes related to anonymity
- Can be seen as an aspect of security (“Wikipedia: Privacy”, 2007)
![Page 4: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/4.jpg)
PRIVACY
• Phishing is an attempt, using fraudulent e- mail or web site pop-ups, to get you to divulge sensitive financial information such as credit card numbers, account numbers, user names, passwords, or social security numbers.
• The phisher then uses this information to commit identity theft or other fraud.
• Another recent trend is toward pharming, which is when Internet users are misdirected to fraudulent web sites that appear legitimate in attempt to commit identity theft.
http://support.onetel.co.uk/index.php?page=230
![Page 5: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/5.jpg)
http://www.privacyinternational.org/article.shtml?cmd%5B347%5D=x-347-545269&als%5Btheme%5D=Privacy%20and%20Human%20Rights
![Page 6: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/6.jpg)
SURVEILLANCE
![Page 7: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/7.jpg)
SURVEILLANCE
- The monitoring of behavior usually from a position of higher authority
- Traditional surveillance: close observation by a person
- New surveillance: scrutiny through the use of technical means to extract or create personal or group data, whether from individuals or contexts (Marx,G., 2004).
- Counter surveillance, Inverse Surveillance
![Page 8: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/8.jpg)
COUNTER SURVEILLANCE
• Practice of avoiding surveillance
• Making surveillance difficult
![Page 9: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/9.jpg)
Inverse Surveillance
• Can be referred as sousveillance
• Not from a higher authority but ordinary individuals
• E.g. Citizen journalism, Rodney King beating (1991)
![Page 10: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/10.jpg)
IMPACT
• Use of surveillance in organizations
• Personal information is obtained by many small groups and individuals.
• Ethical issues in workplace
• Phone tapping, computer surveillance
![Page 11: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/11.jpg)
IMPACT
• Welcomes ever more powerful surveillance as necessary in today’s world where efficiency is so valued and where there are a multiplicity of dangers and risks.
• More pessimistic is the Frankensteinian/ Luddite view: surveillance technology is inhuman, destructive of liberty and untrustworthy.
![Page 12: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/12.jpg)
http://www.privacyinternational.org/article.shtml?cmd%5B347%5D=x-347-545269&als%5Btheme%5D=Privacy%20and%20Human%20Rights
![Page 13: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/13.jpg)
10 MINUTES
BREAK
![Page 14: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/14.jpg)
PRIVACY VERSUS SURVEILLANCE
![Page 15: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/15.jpg)
You, Exposed
• Increasing pressure to expose details of our personal lives to strangers in order to win their trust
• In turn, we demand these strangers to do the same for us
(The Naked Crowd, Rosen, 2004)
![Page 16: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/16.jpg)
You, Exposed
Terms
• Foucault’s Panopticon: a surveillance house in which the few watched the many
• Synopticon: the many watch the few
• Omnipticon: the many watch the many (The Naked Crowd, Rosen, 2004)
![Page 17: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/17.jpg)
How?
Fromm’s Marketed Self• The easiest way to attract the attention and
winning trust of strangers is to establish an emotional connection with them by projecting a consistent, memorable, and trustworthy image
(The Naked Crowd, Rosen, 2004)
• E.g.: The use of profiles in online social networking sites like Friendster & Myspace
![Page 18: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/18.jpg)
Personal Branding
• The Self is constructed as a form of marketed authenticity in which self is turned inside out and then sold to the world
• A logical application of marketing technologies to the most intimate aspects of The Self
(The Naked Crowd, Rosen, 2004)
![Page 19: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/19.jpg)
Headlines
• Hewlett Packard executives hiring private investigators to spy on employees and journalists.
• Rep. Mark Foley sending innuendo-laden instant messages – a reminder that digital communication lasts forever and that anonymous sources can be unmasked by clever bloggers from just a few electronic clues.
• The federal government allegedly compiling a database of telephone numbers dialed by Americans, and eavesdropping on U.S. callers dialing international calls without obtaining court orders.
(Privacy Lost: Does anybody care?, Sullivan, 2006)
![Page 20: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/20.jpg)
“The 21st century equivalent of being
naked” (Privacy Lost: Does anybody care?, Sullivan, 2006)
![Page 21: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/21.jpg)
You, The Consumers
• Ways you may disclose personal data1. Signing up for a membership discount card
2. EZ-Pass system whereby automobile are electronically tracked
3. Credit bureaus asking for your bill-paying histories
• Multiplier effect –Data is acquired, analyzed, categorized, stored and sold over and over again
![Page 22: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/22.jpg)
You, The Consumers
• Government agencies buy or demand details about our lives in the name of keeping us safe
• Play video: Privacy rights on the Internet
![Page 23: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/23.jpg)
SOUSVEILLANCE
![Page 24: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/24.jpg)
SOUSVEILLANCE
• The term "sousveillance" stems from the contrasting French words sur, meaning "above", and sous, meaning "below“.
• “Surveillance“ denotes the "eye-in-the-sky" watching from above, whereas "sousveillance" denotes bringing the camera or other means of observation down to human level, either physically (mounting cameras on people rather than on buildings).
(“Wikipedia: Sousveillance”, 2007)
![Page 25: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/25.jpg)
SOUSVEILLANCE
- The recording of an activity from the perspective of a participant in the activity(i.e. personal experience capture).
- Refers to the recording or monitoring of real or apparent authority figures by others
- Steve Mann, who coined the term, describes it as "watchful vigilance from underneath."
![Page 26: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/26.jpg)
Emerging discourse on sousveillance
within industry is the "personal sousveillance", namely the
recordingof an activity by a participant in
the activity. (“Wikipedia:
Sousveillance”, 2007)
![Page 27: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/27.jpg)
PERSONAL SOUSVEILLANCE
• The art, science, and technology ofpersonal experience capture, processing, storage, retrieval, and transmission, such as lifelong audiovisual recording.
• For example, technologies like cameraphones and weblogs (tend to build a sense of community).
![Page 28: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/28.jpg)
What happened to Rodney King?
• Rodney Glen King is a U.S. citizen and taxi driver who became famous after his violent arrest by officers of the Los Angeles Police Department (LAPD) wasvideotaped by a bystander, George Holliday.
(“Wikipedia: Rodney King”, 2007)
![Page 29: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/29.jpg)
The Aftermath• The incident raised a public outcry among people who believed it
was racially motivated.
• Growing tension between the black community and the LAPD.
• Increasing anger over police brutality and more general issues of unemployment, racial tension, and poverty facing the black community in South Central Los Angeles.
• The acquittal in a state court of the four officers charged with usingexcessive force in subduing King provided the spark that led to the1992 Los Angeles riots.
(“Wikipedia: Rodney King”, 2007)
![Page 30: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/30.jpg)
HIERARCHIAL SOUSVEILLANCE
• Refers to citizensphotographing police, shoppers photographing shopkeepers, or taxicabpassengers photographing cab drivers. (“Wikipedia: Sousveillance”, 2007)
![Page 31: COM 125: Privacy And Surveillance Done By: Shamala Devi Siti Nur Aliah Siti Hamimah Dalina Daud.](https://reader036.fdocuments.us/reader036/viewer/2022070403/56649f2c5503460f94c479f7/html5/thumbnails/31.jpg)
THE END