Your SlideShare is downloading. ×
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Claws to the Weak: internet and rights
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Claws to the Weak: internet and rights

190

Published on

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
190
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • ninja cat from Robert Couse-Baker cc by
  • OK, who gave the monkey a ray gun_! by Don Solo cc by nc sa
  • H. W. Koch: Illustrierte Geschichte der Kriegszüge im Mittelalter, S. 133, Bechtermünz Verlag, ISBN 3-8289-0321-5 Author Chroniques d’Enguerrand de Monstrelet (early 15th century)
  • The Gutenberg Bible [Bible, Latin Vulgate. Ca. 1455]. Biblia Latina. [Mainz: Johann Gutenberg, ca. 1455]. Rare Books Division. From the Lenox Library Gutenberg Bible by NYC Wanderer (Kevin Eng) CC by sa
  • Untitled by Theresa Thompson CC BY
  • Declaration of the Rights of Man and of the Citizen of 1789. Declaration of the Rights of Man and Citizen of 1793.
  • Written in Gold by Anonymous Account cc by
  • Eleanor Roosevelt and United Nations Universal Declaration of Human Rights in Spanish text. Work in the public domain.
  • Reading A Newspaper By A Wall from garryknight cc by sa
  • Urmia Salt Lake _ دریاچه ی نمک ارومیه by Mehrad.HM cc by nc sa
  • image from Yumiko Hayakawa essay Public Benches Turn ‘Anti-Homeless’ (also recommend Design with Intent) Source http://architectures.danlockton.co.uk/2006/10/05/anti-homeless-benches-in-tokyo/
  • Untitled by Y cc by
  • 1906 Kungliga Telegrafverkets apparater (Royal Telegraph Administration apparatus) at Project Runeberg :1896_ '1896 /0004. :1896] Copyright Expired Image not Licensed under Creative Commons
  • Written in Gold by Anonymous Account cc by Holleriths tabuleringsmaskin användes vid den amerikanska folkräkningen 1890, den förra (1880) tog 8 år att beräkna och man antog att 1890:s skulle ta 13 år. Använde hålkort. Och 1890:s folkräkning tog med Holleriths maskin bara 18 månader att genomföra. Användes av försäkringsbolag mm. Till redovisning. Holleriths företag var ett av urspungen till IBM.
  • This image is (c) by Musée de l'Informatique http://www.flickr.com/photos/museeinformatique/3784821545/
  • Hypertext in the wild - Tim Berners-Lee (1990/91) WWW an open standard
  • anti botox brigade by emdot anti botox brigade from emdot cc by
  • The Items Maczter Carries v2.0 By maczter cc by
  • Sailing by Steve-h cc by sa Webben fick sitt stora genomslag år 1995. Det året hade 2% av den svenska befolkningen tillgång till internet, år 2000 hade den siffran ökat till 50%, och idag är vi uppe i över 88% .
  • 225_365 - Don't Be Shy Now From Helga Weber cc by nd
  • 2001 Wikipedia, Tripadvisor 2002 Linkedin 2003 Pirate Bay, MySpace, Second Life, Wordfeud 2004 Facebook, digg 2005 Youtube 2006 Twitter, Spotify, Slideshare 2007 iPhone 2009 Klout, Farmville, Quora, Foursquare, Kickstarter 2010 Wordfeud, Instagram 2011 Google+
  • Reach from Nick in exsilio cc by nc sa
  • Reading by Kamil Porembiński cc by sa
  • Ready for Take Off from vyxle cc by nc
  • teknologireglering 29 januari 2008 Mathias Klang <klang@informatik.gu.se>
  • XKCD CC BY NC http://xkcd.com/898/
  • Taking The World By Storm from JD Hancock cc by
  • Funny Lass from Tomi Tapio cc by
  • empty suits from paul goyette cc by nc sa
  • I Need to Lose Weight!!! from Benson Kua cc by sa
  • 1.11.09- CHD, here we come! from thedalogs cc by
  • I just couldn’t live with myself... from Eric "Claptøn" Nelsøn cc by nc sa
  • .
  • Mick Stevens' Garden of Eden Cartoon from The New Yorker
  • Big Brother... from 85mm.ch cc by
  • Wednesday, April 17, 2013 Mathias Klang klang@ituniv.se The thing is born… Newhaven Beach 2011 By http-//heatherbuckley.co.uk cc by
  • CSA-2006-08-10-093402 By The U.S. Army cc by No legal protection?
  • Mother to Be By seanmcgrath cc by Direct attack…
  • Rugosity From Evil Erin cc by
  • 241/365 by kennymatic cc by
  • Wednesday, April 17, 2013 Mathias Klang klang@ituniv.se Foucault (1926-1984) & Benthams ( 1748 – 1832) ) model prison – The Panopticon Övervakningsarkitektur This shapes how individuals see themselves and leads them to behave differently than they might if they weren ’ t being observed
  • And what are you doing? from San Diego Shooter cc by nc nd
  • thumbnail By istolethetv cc by
  • Salt pans from dachalan cc by nc sa
  • South Bank Portrait By an untrained eye cc by nc
  • Kansas Jayhawks 2008 NCAA Basketball National Champions--Street Party from M31. cc by
  • bench monday // 3 [explored] By {Charlotte.Morrall} cc by
  • All these images are © but NOT licensed under Creative Commons licenses
  • SMiLE! by Toni Blay cc by nc nd
  • postsecret.blogspot.com - all2 from Foxtongue cc by
  • On July 17, 2009, Amazon.com withdrew certain Kindle titles, Animal Farm and Nineteen Eighty-Four by George Orwell, from sale, refunded the cost to those who had purchased them, and remotely deleted these titles from purchasers' devices after discovering that the publisher lacked rights to publish the titles in question
  • Untitled from iwolkow.de cc by
  • Ready for Chaos by bdgamer cc by nc sa
  • Why, Oh Why... By meddygarnet cc by
  • The King from fueg0 cc by
  • PESSIMISM OF THE INTELLECT, OPTIMISM OF THE WILL by ruSSeLL hiGGs cc by nc sa
  • Winning against graffiti? from Esther Gibbons cc by nd
  • Wordfeud By eldh cc by
  • Eyes ! (Youth from Antikythera!) by agelakis cc by nc sa
  • Transcript

    • 1. Claws to the Weak: internet andrightsMathias Klang @klang67
    • 2. George Orwell: You and the AtomicBomb (1945)Thus, for example, tanks, battleships andbombing planes are inherently tyrannicalweapons, while rifles, muskets, long-bowsand hand-grenades are inherentlydemocratic weapons. A complex weaponmakes the strong stronger, while a simpleweapon--so long as there is no answer to it--gives claws to the weak.
    • 3. Killer app 1415
    • 4. Killer app 1455
    • 5. Chokehold on printers
    • 6. I disapprove of what you say, but I will defend tothe death your right to say it.
    • 7. Killer app 1710
    • 8. Universal declaration of human rights (1948)
    • 9. Killer app 1948
    • 10. Lawdemocracy
    • 11. Killer app 1960
    • 12. Is teleportation legal?
    • 13. LawContextual &programmed socialrulesArchitecture
    • 14. Only technology(spot the ethical dilemma?)
    • 15. Telecoms revolution
    • 16. Swedish telephonec:a 1896Graham Bell wasawarded a patent forthe electric telephonein March 1876
    • 17. Ludicrously brief history ofcomputers
    • 18. hollerith
    • 19. Generation 3 (1964-72)
    • 20. The digital is the original& everything is copy
    • 21. Killer apps 1995: Browser wars
    • 22. Everything is miscellaneous
    • 23. 91 % Access to the Internet at home83 % Access to broadband at home7 % Never used a computerSource: Sweden Statistics 2011 (*Individuals aged 16-74)
    • 24. Voltaire’s dream? The theoreticallypossiblebecomes the inevitableDigitalizationConnectivityDevicesStorage
    • 25. Blogger1999Google1999End of communications monopoly
    • 26. Normalizing the abnormal
    • 27. Control
    • 28. The Net interprets censorship asdamage and routes around it.John Gilmor (TIME magazine December 1993)
    • 29. The other control
    • 30. Sapir–Whorf hypothesis
    • 31. Technology makes society
    • 32. personalization
    • 33. A Squirrel Dying InYour Front Yard MayBe More Relevant ToYour Interests RightNow Than PeopleDying In AfricaMark Zuckerberg
    • 34. It will be very hard forpeople to watch orconsume somethingthat has not in somesense been tailored forthem. Eric Schmidt, Google
    • 35. The internet is shows us what it thinks that wewant to see – not what we need to see Eli Pariser
    • 36. Identity & Information junk food.
    • 37. Freedom of Speech
    • 38. iTunes censor fail
    • 39. The FacebookElbowbreast
    • 40. privacy
    • 41. The Right to PrivacyThe intensity and complexity of life,attendant upon advancing civilization,have rendered necessary some retreatfrom the world…solitude and privacyhave become more essential to theindividual; but modern enterprise andinvention have, through invasions uponhis privacy, subjected him to mental painand distress…Warren and Brandeis The Right to Privacy,4 Harvard Law Review 193 (1890)
    • 42. "You havezero privacy anyway.Get over it."Scott McNealy (Wired 1999)
    • 43. “Having two identities for yourselfis an example of a lack of integrity”Mark Zuckerberg (2010)
    • 44. We leak information
    • 45. Surveillance: gaze from above
    • 46. Protection fromthe outer gaze
    • 47. Autoveillance:performance lifestyle
    • 48. Compartmentalization
    • 49. Peerview: social control
    • 50. “friends”
    • 51. End of privacy?
    • 52. The Hive-mind
    • 53. If you have done nothing wrong,you have nothing to fear
    • 54. The memory hole
    • 55. "We have found your account is directly related to anotherwhich has been previously closed for abuse of our policies.As such, your Amazon.co.uk account has been closed andany open orders have been cancelled. Please understandthat the closure of an account is a permanent action. Anysubsequent accounts that are opened will be closed aswell. Thank you for your understanding with our decision."
    • 56. Closing thoughts
    • 57. Orwell or Huxley?
    • 58. The illusion of simplicity
    • 59. The keepers of algorithms know
    • 60. We have (theoretical) control overBig Brother
    • 61. Regulation of technologyis the regulation ofdemocracy
    • 62. The social construction of claws
    • 63. THANKS!
    • 64. Mathias Klangklang@ituniv.se or @klang67www.digital-rights.netImage & licensing info in the notessection of slides.Images at www.flickr.com (orspecifically stated).This ppt licensed: CreativeCommons BY-NC-SADownload presentationwww.slideshare.net/klang

    ×