Your SlideShare is downloading. ×
0
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Social Media & Integrity

533

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
533
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
11
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Came hameháááá! from R'eyes cc by
  • Reach from Nick in exsilio cc by ncsa
  • guns kill by warein.holgado by nc sa
  • OK, who gave the monkey a ray gun_! by Don Solo cc by nc sa
  • starling flock by pastaboy sleeps cc byLangford Winner Autonomous Technology
  • 12-06 by Daniel*1977 cc by nc sa
  • What are you looking at? by Enjoy Surveillance cc by nc sa
  • 1888 - Kodak nr 1 FörstamassproduceradelådkameranEnkelattanvändaBärbarKortexponeringstid
  • Bismarck on his deathbed: Maybe this is the first example of the works of Paperazzi: Max Priester & Willy Wilcke took this picture secretly without consent; the even managed to shift the body so that the face would be more visible and turned the clock back. They sold the pictures until the Bismarck family confiscated the plates. The pictures later appeared in a.o. the Frankfurter Illustrierte
  • A reporter for the New York Daily News, Thomas Howard, sat in the front row as a womannamed Ruth Snyder sat in the electric chair, in Sing Sing, in 1928; he had a concealed camera onhis ankle, and he took a picture of Snyder as the electricity surged through her body. The picturesold an incredible amount of newspapers
  • Louis Brandeis & Samuel Warren "The Right to Privacy," 4 Harvard Law Review 193-220 (1890-91)
  • Archives des députés allemands from hamadryades cc by nc sa
  • Home Computer (by unknown) from Stijn Vogels cc by nc sa
  • Police 1920 from Eridony cc by
  • Protection 4 from Jasmin Cormier cc by nc THIS IMAGE IS USED TWICE ON THE SAME SLIDE
  • business person from Tim Morgan cc by nc sa
  • Pressed into Service from horizontal.integration cc by nc sa
  • I Know I Have Lost from Kevan cc by nc
  • Wilbur Likes Leaves from mommamia cc by nc sa
  • can birds have a dog fight? by threecee cc by ncsa
  • running after pigeons by wrote cc by ncSchoolkid chipping trial 'a success'http://www.theregister.co.uk/2007/10/22/kid_chipping_doncaster_go/
  • http://www.spyshops.ca/trackerbackpack.htm
  • http://www.brickhousesecurity.com/wf200.html
  • LEGO Gears of War Minifigs by Dunechaser by nc sa
  • http://www.dpl-surveillance-equipment.com/100611.html
  • http://www.dpl-surveillance-equipment.com/1006177.html
  • evil cat from gagilas cc by sa
  • AIR travellers will be invited to take part in "virtual strip searches" [X-rays] at Australian airports when the Federal Government begins trials of security screening measures this month. The measures include a body scanner [X-rays] that can see what lies under a person's clothes. The Government says the scanner could detect weapons and explosives, but critics say it is an invasion of privacy. "It provides detailed images of a person's body … which many people might find highly embarrassing," said Stephen Blanks, of the NSW Council for Civil Liberties.http://publik18.blogspot.com/2008/10/privacy-health-fears-over-airport-body.html
  • http://www.infowars.com/exposed-naked-body-scanner-images-of-film-star-printed-circulated-by-airport-staff/
  • 11-23-17 from code poet cc by nc sa
  • Torsdag 3 februari
  • Chinese chess from whitecat singapore cc by nc
  • Orkut Demographics http://www.orkut.com/MembersAllHabbo http://www.sulake.com/habbo/index.html?navi=2.1
  • https://secure.wikimedia.org/wikipedia/en/wiki/List_of_virtual_communities_with_more_than_100_million_users
  • green on green with red from Darwin Bell cc by
  • is he talking to me from Leonard John Matthews cc by nc sa
  • capítulo 1 by atzu cc by nc sa
  • Salt pans from dachalan cc by nc sa
  • Always Look on the Bright Side of... from Jon McGovern cc by nc
  • My manta ray's alright... by dachalan cc by ncsa
  • Looking for gators..... from katieb50 cc by
  • goldfish from a_trotskyite cc by nc sa
  • New Scientist is getting wet from gagilas cc by sa
  • Google automatically scans e-mails to add context-sensitive advertisements to them. Privacy advocates raised concerns that the plan involved scanning their personal, assumed private, e-mails, and that this was a security problem. Allowing e-mail content to be read, even by a computer, raises the risk that the expectation of privacy in e-mail will be reduced. Furthermore, e-mail that non-subscribers choose to send to Gmail accounts is scanned by Gmail as well, even though those senders never agreed to Gmail's terms of service or privacy policy. Google can change its privacy policy unilaterally and Google is technically able to cross-reference cookies across its information-rich product line to make dossiers on individuals. However, most e-mail systems make use of server-side content scanning in order to check for spam.[41][42]Privacy advocates also regard the lack of disclosed data retention and correlation policies as problematic. Google has the ability to combine information contained in a person's e-mail messages with information from Internet searches. Google has not confirmed how long such information is kept or how it can be used. One of the concerns is that it could be of interest to law enforcement agencies. More than 30 privacy and civil liberties organizations have urged Google to suspend Gmail service until these issues are resolved.[43]Gmail's privacy policy contains the clause: "residual copies of deleted messages and accounts may take up to 60 days to be deleted from our active servers and may remain in our offline backup systems". Google points out that Gmail adheres to most industry-wide practices. Google has stated that they will "make reasonable efforts to remove deleted information from our systems as quickly as is practical."[44][45]Google defends its position by citing their use of email-scanning to the user's benefit. Google states that Gmail refrains from displaying ads next to potentially sensitive messages such as those that mention tragedy, catastrophe, or death.[4
  • Consumer Watchdogs Flog Google's Privacy Policy (2008)http://techdailydose.nationaljournal.com/2008/06/consumer-watchdogs-flog-google.phpGoogle originally placed a cookie on each registered user's computer, which can be used to track that person's search history, and that cookie was not set to expire until 2038.[12] As of 2007, Google's cookie now expires in two years but renews itself when a Google service is used.[12] There is no evidence that Google turns over information to the FBI or the NSA, though some users remain anxious about the possibility.[12] In response, Google claims cookies are necessary to maintain user preferences between sessions and offer other search features. Other popular search engines, such as Yahoo! Search and Microsoft's Bing, use cookies with distant expiration dates as well.Privacy International has raised concerns regarding the dangers and privacy implications of having a centrally-located, widely popular data warehouse of millions of Internet users' searches, and how under controversial existing U.S. law, Google can be forced to hand over all such information to the U.S. government[13]. In early 2005, the United States Department of Justice filed a motion in federal court to force Google to comply with a subpoena for, "the text of each search string entered onto Google's search engine over a one-week period (absent any information identifying the person who entered such query)."[14] Google fought the subpoena, due to concerns about users' privacy.[15] In March 2006, the court ruled partially in Google's favor, recognizing the privacy implications of turning over search terms and refusing to grant access.[16]Steve Ballmer[17], Liz Figueroa[18], Mark Rasch[19], and the editors of Google Watch[20] believe the processing of email message content by Google's Gmail service goes beyond proper use. Google claims that mail sent to or from Gmail is never read by a human being beyond the account holder, and is only used to improve relevance of advertisements.[21] Whether Google is the only one doing this or simply the only one who publicly admits it is unknown, since the privacy policies of other popular email services, like Hotmail and Yahoo, allows for collection and utilizing of personal information for ads when using their services, but do not specify precisely what information and which services[22][23].Google's online map service, "Street View" has been accused of taking pictures and coming too close inside people's private homes and/or people who walk down the street not knowing they are being watched on Google's service.[24][25] Aaron and Christine Boring, a Pittsburgh couple, sued Google for "invasion of privacy". They claimed that Street View made a photo of their home available online, and it diminished the value of their house, which was purchased for its privacy.[26] They lost their case in a Pennsylvania court. "While it is easy to imagine that many whose property appears on Google's virtual maps resent the privacy implications, it is hard to believe that any – other than the most exquisitely sensitive – would suffer shame or humiliation," Judge Hay ruled.[27]In its 2007 Consultation Report, Privacy International ranked Google as "Hostile to Privacy", its lowest rating on their report, making Google the only company in the list to receive that ranking.[28][29]Carl Hewitt noted that intimate personal information is a "toxic asset" in Google datacenters because it will lead to government regulation "analogous to nuclear power plants," Consequently, he recommended that Google should perform semantic integration in clients' clouds so that client information in Google datacenters could be decrypted only by using a client's private key.[30][edit] European UnionEuropean Union (EU) data protection officials (the Article 29 working party who advise the EU on privacy policy) have written to Google asking the company to justify its policy of keeping information on individuals’ internet searches for up to two years. The letter questioned whether Google has “fulfilled all the necessary requirements” on the EU laws concerning data protection.[31] The probe by the EU into the data protection issue, As of 24 May 2007 (2007 -05-24)[update] is continuing. On 1 June Google agreed that its privacy policy is vague, and that they are constantly working at making it clearer to users.[32] The resulting modifications to its privacy policies have been met with praise[33].[edit] NorwayThe Data Inspectorate of Norway (Norway is not a member of the EU) has investigated Google (and others) and has stated that the 18- to 24-month period for retaining data proposed by Google was too long.[34]
  • Seamour Sheep + MacBook from Andy Woo cc by nc sa
  • as train goes by... from atzu cc by nc sa
  • secret by MistoAcrilico secret from MistoAcrilico cc by nc
  • 070_365 -- War Is Peace from matthileo cc by nc sa
  • Who Else Has A Bright Idea? by nhuisman cc by nc sa
  • 01 students in anatomy class in lecture hall by blacque_jacques cc by nc sa
  • line by Bright Tal cc by nc sa
  • Lincoln in the light by mr_mayer cc by nc sa
  • Iceberg from sweart cc by nc sa
  • Before you go, can you read my... from YamiPaperDreams!.- cc by nc sa
  • no entry from notsogoodphotography cc by
  • Shop Local from fabbio cc by sa
  • Get thee to a nunnery from kevindooley cc byMaríaJesúsGalán, dubbed 'Sister Internet', had almost 600 Facebook 'friends'at the time of her eviction  Photo: FACEBOOKThe Telegraph http://www.telegraph.co.uk/technology/facebook/8333810/Spanish-nun-expelled-from-order-over-Facebook-usage.html
  • Stella MwangiRita Ormbostad, deputy mayor of Aure County on Norway’s west coast, wrote that she would rather have “Sami, polar bears and muskox” as winners and that “that’s what we should sell, not that we are open to asylum seekers!”Ormbostad later added that she had “sharpened a spear and bought bongo drums” in anticipation of the Eurovision finals where Mwangi will represent Norway. “Maybe I’ll travel to Africa and watch from there, where I can eat wildebeest!”Ormbostad tried to brush off her comments as merely a joke, but also told local newspaper TidensKrav that “I believe something originally Norwegian sells more and is more suitable for the Norwegian Grand Prix than a song that has African tendencies.”
  • the doctor will see you now from CmdrCord cc by ncsa
  • I'm working.(1) by purprin cc by ncsa
  • My tweet was silly, but the police reaction was absurdFor one joke on Twitter I've had my civil liberties trampled on, and have now got a criminal record“Unfortunately,yesterday I was found guilty and ordered to pay £1,000 in fines and legal costs, which I have to find along with my own legal costs of another £1,000. I am considering an appeal, though I have no means, having left my job due to the circumstances.”http://www.guardian.co.uk/commentisfree/libertycentral/2010/may/11/tweet-joke-criminal-record-airport
  • Two Navy instructor pilots from San Diego have been forever stripped of flying status and two student pilots will have to repeat training because of a September incident in which they dipped two $33 million helicopters into Lake Tahoe while trying to take photos for the squadron’s Facebook page, a Navy official said Wednesday.http://www.signonsandiego.com/news/2010/dec/22/no-punishment-navy-pilots-who-dipped-helos-lake-ta/http://www.youtube.com/watch?v=qYExH8hpgXI&feature=player_embedded
  • nuts from Ednaar cc by nd, skrevmannenpåFacebooki en pauspåjobbetpå Volvo iSkövde. Detkostadehonomjobbet. Illojalt, ansåg Volvo ochskickade hem mannendirekt. http://gt.expressen.se/nyheter/1.2275866/kallade-jobb-darhus-mannen-far-sparken
  • I just couldn’t live with myself... from Eric "Claptøn" Nelsøn cc by nc sa
  • Why do you do this every day? from edmittance cc by ncsa
  • Forest For The Nails from Brandon Heyer cc by ncsa
  • Prego from marcodede cc by
  • [قطرةتفاؤل] from [ALHanouf _ Photography's]²º¹¹ cc by
  • Untitled from Kennedy Garrett cc by
  • Barbie And Barbie's Boyfrend Use... from kiewic cc by
  • Eskatol (8 of 12) from Synne Tonidas cc by nc sa
  • Fancy Glasses by RobertFrancis cc by ncsa
  • Graphic by Matt McKeon source http://mattmckeon.com/facebook-privacy/ This image is not CC licensed.
  • Graphic by Matt McKeon source http://mattmckeon.com/facebook-privacy/ This image is not CC licensed.
  • Graphic by Matt McKeon source http://mattmckeon.com/facebook-privacy/ This image is not CC licensed.
  • Graphic by Matt McKeon source http://mattmckeon.com/facebook-privacy/ This image is not CC licensed.
  • Graphic by Matt McKeon source http://mattmckeon.com/facebook-privacy/ This image is not CC licensed.
  • black_face by rent-a-moose cc by ncsa
  • Blyth beach huts from freefotouk cc by nc
  • and in last place by ...tim cc by ncnd
  • Transcript

    • 1. Social Media &amp; Integrity<br />Creating law without <br />controlling infrastructure <br />is #fail<br />
    • 2. Technology brings theoretical rights within practical reach<br />
    • 3. There is an ethical dimension to everything<br />
    • 4. MYTH of NEUTRAL technology<br />Guns don’t kill people…<br />
    • 5. Spot the ethical problem<br />
    • 6. THE MEDIUM... SHAPES AND CONTROLS THE SCALE AND FORM OF HUMAN ASSOCIATION AND ACTION<br />McLuhan, M. (1962) The Gutenberg Galaxy<br />
    • 7. Langford WInner<br />
    • 8. Regulation of technology is the regulation of democracy<br />
    • 9.
    • 10.
    • 11. Integrity &amp; Technology<br />
    • 12.
    • 13.
    • 14. Physical surveillance<br />
    • 15.
    • 16.
    • 17. Paparazzi (1898)<br />
    • 18. Advertising (1902)<br />Robertson v. Rochester Folding Box Co (1902)<br />Domstolen accepterade inte Brandeis &amp; Warrens argument om “common law” rättighet<br />
    • 19. Hidden camera 1928<br />The execution of Ruth Snyder 1928<br />Twitter in TPB case<br />
    • 20.
    • 21. The Right to Privacy<br />That the individual shall have full protection in person and in property is a principle as old as the common law; but it has been necessary from time to time to define anew the exact nature and extent of such protection.<br />Warren and Brandeis The Right to Privacy, 4 Harvard Law Review 193 (1890)<br />
    • 22.
    • 23.
    • 24.
    • 25. LAW<br />
    • 26. UNDHR<br />No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks. (Art 12)<br />
    • 27. Art 8 ECHR<br />1. Everyone has the right to respect for his private and family life, his home and his correspondence.<br />
    • 28. Background<br />Datalagen (1973)<br />Moores Law<br />Data ProtectionDirective (1995)<br />Personuppgiftslagen 1998<br />
    • 29. PERSONUPPGIFTSLAGEN(1998:204)<br />
    • 30. All slags information som direkt eller indirekt kan hänföras till en fysisk person som är vid livet utgör personuppgift.<br />Inte företag<br />Ingen integritet efter döden<br />Personuppgift<br />
    • 31. Samtycke<br />Godtar behandling<br />Viljeyttring<br />Frivillig<br />Särskild<br />Otvetydig<br />Efter information<br />Inga formkrav<br />31<br />
    • 32. Behandling<br />Personuppgifter får behandlas bara för särskilda, uttryckligt angivna ändamål. Uppgifter som man har samlat in för ett visst ändamål får man inte senare behandla på ett sätt som inte är förenligt med ändamålet.<br />
    • 33. Känsliga uppgifter<br />Förbud gäller behandling av:<br />Ras, etniskt ursprung, politiska åsikter, religiös eller filosofisk övertygelse, hälsa, sexualliv, samt medlemskap i fackförening<br />Förbud gäller inte:<br />Uttrycklig samtycke, offentliggjorda uppgifter, nödvändig behandling, inom ideella org., inom hälso- &amp; sjukvård<br />
    • 34. bits of INFORMATION<br />
    • 35.
    • 36. autonomy<br />
    • 37. And what about Manufacturers responsibility?<br />
    • 38. Won’t someone think of the CHILDREN<br />
    • 39.
    • 40. Child Locator GPS Watch<br />
    • 41. Teen arrive alive<br />
    • 42. &amp; other interesting toys<br />
    • 43. Shower AM-FM Mirror Radio  <br />
    • 44. AM/FM Clock radio wireless hidden camera<br />
    • 45. System #fail<br />
    • 46.
    • 47.
    • 48. What is social media?<br />
    • 49.
    • 50.
    • 51. 12 timmar senare<br />
    • 52. Strategy<br />
    • 53. Technology controls how &amp; what we interact, create &amp; THink…<br />
    • 54. Blogger 1999<br />2001<br />2003<br />2005<br />2000<br />2002<br />2004<br />2006<br />Wikipedia<br />Sharing decade<br />
    • 55. My Space<br />Linkedin<br />Blogger 1999<br />2001<br />2003<br />2005<br />2000<br />2002<br />2004<br />2006<br />Second Life<br />Skype<br />Wikipedia<br />Google c:a 1998<br />
    • 56. My Space<br />Digg<br />YouTube<br />Linkedin<br />Blogger 1999<br />2001<br />2003<br />2005<br />2000<br />2002<br />2004<br />2006<br />Ning<br />Second Life<br />Skype<br />Facebook<br />Flickr<br />Wikipedia<br />Google c:a 1998<br />
    • 57. My Space<br />Digg<br />Twitter<br />YouTube<br />Linkedin<br />Blogger 1999<br />2001<br />2003<br />2005<br />2000<br />2002<br />2004<br />2006<br />Ning<br />Second Life<br />Spotify<br />Flickr<br />Skype<br />Facebook<br />Wikipedia<br />Google c:a 1998<br />
    • 58. My Space<br />Digg<br />Twitter<br />iphone<br />YouTube<br />Wikileaks<br />Linkedin<br />Blogger 1999<br />2007<br />2009<br />2001<br />2003<br />2005<br />2000<br />2002<br />2004<br />2006<br />2008<br />Farmville<br />Ning<br />Second Life<br />Spotify<br />Flickr<br />Skype<br />Facebook<br />Wikipedia<br />Google c:a 1998<br />
    • 59.
    • 60. Anything that is in the world when you’re born is normal and ordinary and is just a natural part of the way the world works. Anything that’s invented between when you’re fifteen and thirty-five is new and exciting and revolutionary and you can probably get a career in it. Anything invented after you’re thirty-five is against the natural order of things.<br />
    • 61. 61<br />
    • 62.
    • 63.
    • 64.
    • 65. 2006<br />2007<br />
    • 66. we “leak” INFORMATION<br />
    • 67. …sometimes we shout…<br />
    • 68. We apply strategies of information control<br />
    • 69. COMPARTMENTALIZATION<br />
    • 70.
    • 71. The problem is not that people know things about us but to limit who knows what…<br />
    • 72. &amp;<br />
    • 73. searchability<br />
    • 74. Delete:The Virtue of Forgetting in the Digital Age<br />Viktor Mayer-Schönberger<br />
    • 75. New social norms<br />
    • 76. Convenience is king<br />
    • 77. Enter the age of FREE<br />
    • 78.
    • 79. Sökmotor<br />Reader<br />Maps<br />Kalender<br />Scholar<br />Och mycket mer…<br />GRATIS?<br />
    • 80. The Gmail service includes relevant advertising and related links based on the IP address, content of messages and other information related to your use of Gmail.<br />We provide advertisers only aggregated non-personal information such as the number of times one of their ads was clicked. We do not sell, rent or otherwise share your personal information with any third parties except in the limited circumstances described in the Google Privacy Policy, such as when we believe we are required to do so by law.<br />
    • 81.
    • 82. Leaking &amp; shouting<br />
    • 83. So whats new?<br />
    • 84. If you are not paying for it, you&apos;re not the customer; you&apos;re the product being sold.<br />
    • 85. From Orwell to Huxley<br />
    • 86. Testing a theory<br />
    • 87.
    • 88. interesting resultS<br />
    • 89. “Statisk information”<br />Addresser<br />Telefonnummer<br />Inkomster, ekonomi &amp; deklarationer<br />Utbildning<br />
    • 90.
    • 91.
    • 92.
    • 93.
    • 94. There is a great difference between knowing and understanding: you can know a lot about something and not really understand it.<br />CHARLES KETTERING<br />
    • 95.
    • 96. Understanding others use<br />The misapplication of information<br />
    • 97. Some examples<br />
    • 98.
    • 99.
    • 100. Goodbye Sister MaríaJesúsGalán<br />
    • 101. Norwegian politician<br />
    • 102. Medical staff<br />
    • 103. Parents!<br />
    • 104. Paul Chambers<br />&quot;Crap! Robin Hood airport is closed. You&apos;ve got a week and a bit to get your shit together otherwise I&apos;m blowing the airport sky high!&quot;<br />
    • 105. Navy instructor pilots lose flying status for Lake Tahoe dip<br />
    • 106. &quot;En dag kvaravveckanpådettadårhus&quot;<br />
    • 107. MATS MÜGGE<br />”Jättebrabarnskötare - men textenärinteförenlig med vårverksamhet”<br />
    • 108. Nakenrektor<br />
    • 109. You’ve got mail…<br />En berättelse om GU, <br />Google <br />&amp; studenternas mail<br />
    • 110. Why?<br />
    • 111. The network effect<br />
    • 112. You know you want to…<br />The design effect<br />
    • 113. If you’re not the customer you’re the product<br />
    • 114. Eula trumps rights<br />
    • 115. Purpose of rights?<br />
    • 116. Autonomy!<br />
    • 117. Autonomy without knowledge…<br />
    • 118.
    • 119. © Matt McKeon <br />
    • 120. © Matt McKeon <br />
    • 121. © Matt McKeon <br />
    • 122. © Matt McKeon <br />
    • 123. © Matt McKeon <br />
    • 124. How law fails<br /><ul><li> Analog mindset
    • 125. Respect for Autonomy
    • 126. The lost role of the state</li></li></ul><li>Creating law without controlling infrastructure is #fail<br />
    • 127. Thank you!<br />
    • 128. Information<br />All images from/allabilderfrånwww.flickr.com (unless specifically stated), (omejannatanges)<br />Image &amp; licensing info in the notes section of slides/bild &amp; licensinfofinnsianteckningsdelenförvarje slide<br />Presentation licensed/Presentation licensierad under: Creative Commons BY-NC-SA<br />The presentation can be downloaded from/Presentationenkanladdasnerfrån: www.slideshare.net/klang<br />More information about me/förmer information ommig: www.techrisk.se &amp; www.digital-rights.net<br />

    ×