Claws to the Weak: internet and rights

454 views
322 views

Published on

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
454
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • ninja cat from Robert Couse-Baker cc by
  • OK, who gave the monkey a ray gun_! by Don Solo cc by nc sa
  • H. W. Koch: Illustrierte Geschichte der Kriegszüge im Mittelalter, S. 133, Bechtermünz Verlag, ISBN 3-8289-0321-5 Author Chroniques d’Enguerrand de Monstrelet (early 15th century)
  • The Gutenberg Bible [Bible, Latin Vulgate. Ca. 1455]. Biblia Latina. [Mainz: Johann Gutenberg, ca. 1455]. Rare Books Division. From the Lenox Library Gutenberg Bible by NYC Wanderer (Kevin Eng) CC by sa
  • Untitled by Theresa Thompson CC BY
  • Declaration of the Rights of Man and of the Citizen of 1789. Declaration of the Rights of Man and Citizen of 1793.
  • Written in Gold by Anonymous Account cc by
  • Eleanor Roosevelt and United Nations Universal Declaration of Human Rights in Spanish text. Work in the public domain.
  • Reading A Newspaper By A Wall from garryknight cc by sa
  • Urmia Salt Lake _ دریاچه ی نمک ارومیه by Mehrad.HM cc by nc sa
  • image from Yumiko Hayakawa essay Public Benches Turn ‘Anti-Homeless’ (also recommend Design with Intent) Source http://architectures.danlockton.co.uk/2006/10/05/anti-homeless-benches-in-tokyo/
  • Untitled by Y cc by
  • 1906 Kungliga Telegrafverkets apparater (Royal Telegraph Administration apparatus) at Project Runeberg :1896_ '1896 /0004. :1896] Copyright Expired Image not Licensed under Creative Commons
  • Written in Gold by Anonymous Account cc by Holleriths tabuleringsmaskin användes vid den amerikanska folkräkningen 1890, den förra (1880) tog 8 år att beräkna och man antog att 1890:s skulle ta 13 år. Använde hålkort. Och 1890:s folkräkning tog med Holleriths maskin bara 18 månader att genomföra. Användes av försäkringsbolag mm. Till redovisning. Holleriths företag var ett av urspungen till IBM.
  • This image is (c) by Musée de l'Informatique http://www.flickr.com/photos/museeinformatique/3784821545/
  • Hypertext in the wild - Tim Berners-Lee (1990/91) WWW an open standard
  • anti botox brigade by emdot anti botox brigade from emdot cc by
  • The Items Maczter Carries v2.0 By maczter cc by
  • Sailing by Steve-h cc by sa Webben fick sitt stora genomslag år 1995. Det året hade 2% av den svenska befolkningen tillgång till internet, år 2000 hade den siffran ökat till 50%, och idag är vi uppe i över 88% .
  • 225_365 - Don't Be Shy Now From Helga Weber cc by nd
  • 2001 Wikipedia, Tripadvisor 2002 Linkedin 2003 Pirate Bay, MySpace, Second Life, Wordfeud 2004 Facebook, digg 2005 Youtube 2006 Twitter, Spotify, Slideshare 2007 iPhone 2009 Klout, Farmville, Quora, Foursquare, Kickstarter 2010 Wordfeud, Instagram 2011 Google+
  • Reach from Nick in exsilio cc by nc sa
  • Reading by Kamil Porembiński cc by sa
  • Ready for Take Off from vyxle cc by nc
  • teknologireglering 29 januari 2008 Mathias Klang <klang@informatik.gu.se>
  • XKCD CC BY NC http://xkcd.com/898/
  • Taking The World By Storm from JD Hancock cc by
  • Funny Lass from Tomi Tapio cc by
  • empty suits from paul goyette cc by nc sa
  • I Need to Lose Weight!!! from Benson Kua cc by sa
  • 1.11.09- CHD, here we come! from thedalogs cc by
  • I just couldn’t live with myself... from Eric "Claptøn" Nelsøn cc by nc sa
  • .
  • Mick Stevens' Garden of Eden Cartoon from The New Yorker
  • Big Brother... from 85mm.ch cc by
  • Wednesday, April 17, 2013 Mathias Klang klang@ituniv.se The thing is born… Newhaven Beach 2011 By http-//heatherbuckley.co.uk cc by
  • CSA-2006-08-10-093402 By The U.S. Army cc by No legal protection?
  • Mother to Be By seanmcgrath cc by Direct attack…
  • Rugosity From Evil Erin cc by
  • 241/365 by kennymatic cc by
  • Wednesday, April 17, 2013 Mathias Klang klang@ituniv.se Foucault (1926-1984) & Benthams ( 1748 – 1832) ) model prison – The Panopticon Övervakningsarkitektur This shapes how individuals see themselves and leads them to behave differently than they might if they weren ’ t being observed
  • And what are you doing? from San Diego Shooter cc by nc nd
  • thumbnail By istolethetv cc by
  • Salt pans from dachalan cc by nc sa
  • South Bank Portrait By an untrained eye cc by nc
  • Kansas Jayhawks 2008 NCAA Basketball National Champions--Street Party from M31. cc by
  • bench monday // 3 [explored] By {Charlotte.Morrall} cc by
  • All these images are © but NOT licensed under Creative Commons licenses
  • SMiLE! by Toni Blay cc by nc nd
  • postsecret.blogspot.com - all2 from Foxtongue cc by
  • On July 17, 2009, Amazon.com withdrew certain Kindle titles, Animal Farm and Nineteen Eighty-Four by George Orwell, from sale, refunded the cost to those who had purchased them, and remotely deleted these titles from purchasers' devices after discovering that the publisher lacked rights to publish the titles in question
  • Untitled from iwolkow.de cc by
  • Ready for Chaos by bdgamer cc by nc sa
  • Why, Oh Why... By meddygarnet cc by
  • The King from fueg0 cc by
  • PESSIMISM OF THE INTELLECT, OPTIMISM OF THE WILL by ruSSeLL hiGGs cc by nc sa
  • Winning against graffiti? from Esther Gibbons cc by nd
  • Wordfeud By eldh cc by
  • Eyes ! (Youth from Antikythera!) by agelakis cc by nc sa
  • Claws to the Weak: internet and rights

    1. 1. Claws to the Weak: internet andrightsMathias Klang @klang67
    2. 2. George Orwell: You and the AtomicBomb (1945)Thus, for example, tanks, battleships andbombing planes are inherently tyrannicalweapons, while rifles, muskets, long-bowsand hand-grenades are inherentlydemocratic weapons. A complex weaponmakes the strong stronger, while a simpleweapon--so long as there is no answer to it--gives claws to the weak.
    3. 3. Killer app 1415
    4. 4. Killer app 1455
    5. 5. Chokehold on printers
    6. 6. I disapprove of what you say, but I will defend tothe death your right to say it.
    7. 7. Killer app 1710
    8. 8. Universal declaration of human rights (1948)
    9. 9. Killer app 1948
    10. 10. Lawdemocracy
    11. 11. Killer app 1960
    12. 12. Is teleportation legal?
    13. 13. LawContextual &programmed socialrulesArchitecture
    14. 14. Only technology(spot the ethical dilemma?)
    15. 15. Telecoms revolution
    16. 16. Swedish telephonec:a 1896Graham Bell wasawarded a patent forthe electric telephonein March 1876
    17. 17. Ludicrously brief history ofcomputers
    18. 18. hollerith
    19. 19. Generation 3 (1964-72)
    20. 20. The digital is the original& everything is copy
    21. 21. Killer apps 1995: Browser wars
    22. 22. Everything is miscellaneous
    23. 23. 91 % Access to the Internet at home83 % Access to broadband at home7 % Never used a computerSource: Sweden Statistics 2011 (*Individuals aged 16-74)
    24. 24. Voltaire’s dream? The theoreticallypossiblebecomes the inevitableDigitalizationConnectivityDevicesStorage
    25. 25. Blogger1999Google1999End of communications monopoly
    26. 26. Normalizing the abnormal
    27. 27. Control
    28. 28. The Net interprets censorship asdamage and routes around it.John Gilmor (TIME magazine December 1993)
    29. 29. The other control
    30. 30. Sapir–Whorf hypothesis
    31. 31. Technology makes society
    32. 32. personalization
    33. 33. A Squirrel Dying InYour Front Yard MayBe More Relevant ToYour Interests RightNow Than PeopleDying In AfricaMark Zuckerberg
    34. 34. It will be very hard forpeople to watch orconsume somethingthat has not in somesense been tailored forthem. Eric Schmidt, Google
    35. 35. The internet is shows us what it thinks that wewant to see – not what we need to see Eli Pariser
    36. 36. Identity & Information junk food.
    37. 37. Freedom of Speech
    38. 38. iTunes censor fail
    39. 39. The FacebookElbowbreast
    40. 40. privacy
    41. 41. The Right to PrivacyThe intensity and complexity of life,attendant upon advancing civilization,have rendered necessary some retreatfrom the world…solitude and privacyhave become more essential to theindividual; but modern enterprise andinvention have, through invasions uponhis privacy, subjected him to mental painand distress…Warren and Brandeis The Right to Privacy,4 Harvard Law Review 193 (1890)
    42. 42. "You havezero privacy anyway.Get over it."Scott McNealy (Wired 1999)
    43. 43. “Having two identities for yourselfis an example of a lack of integrity”Mark Zuckerberg (2010)
    44. 44. We leak information
    45. 45. Surveillance: gaze from above
    46. 46. Protection fromthe outer gaze
    47. 47. Autoveillance:performance lifestyle
    48. 48. Compartmentalization
    49. 49. Peerview: social control
    50. 50. “friends”
    51. 51. End of privacy?
    52. 52. The Hive-mind
    53. 53. If you have done nothing wrong,you have nothing to fear
    54. 54. The memory hole
    55. 55. "We have found your account is directly related to anotherwhich has been previously closed for abuse of our policies.As such, your Amazon.co.uk account has been closed andany open orders have been cancelled. Please understandthat the closure of an account is a permanent action. Anysubsequent accounts that are opened will be closed aswell. Thank you for your understanding with our decision."
    56. 56. Closing thoughts
    57. 57. Orwell or Huxley?
    58. 58. The illusion of simplicity
    59. 59. The keepers of algorithms know
    60. 60. We have (theoretical) control overBig Brother
    61. 61. Regulation of technologyis the regulation ofdemocracy
    62. 62. The social construction of claws
    63. 63. THANKS!
    64. 64. Mathias Klangklang@ituniv.se or @klang67www.digital-rights.netImage & licensing info in the notessection of slides.Images at www.flickr.com (orspecifically stated).This ppt licensed: CreativeCommons BY-NC-SADownload presentationwww.slideshare.net/klang

    ×