Privacy with Internet

887 views

Published on

Published in: Technology, News & Politics
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
887
On SlideShare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
43
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide
  • A Paper Bag Story (#95752) from mark sebastian cc by sa
  • Mother to Be By seanmcgrath cc by Direct attack…
  • Hotline from splorp cc by nc nd
  • Blue Lagoon... By christine zenino cc by
  • la salière... from Biscarotte cc by Privacy quote from Wikipedia http://en.wikipedia.org/wiki/Privacy 14 September 2011
  • Untitled from Alain Bachellier cc by nc sa.jpg
  • Louis Brandeis & Samuel Warren "The Right to Privacy," 4 Harvard Law Review 193-220 (1890-91)
  • Monday, October 24, 2011 Mathias Klang klang@ituniv.se I keep to myself, but I love life. from nattu cc by
  • Shocked from Benson Kua cc by sa
  • Abandon ship (No one can escape) from M.Angel Herrero cc by nc sa
  • Lilly Murdock birth record image, 1883 (June 21st ?) from sakraft1 cc by sa
  • 1888 - Kodak nr 1 Första massproducerade lådkameran Enkel att använda Bärbar Kort exponeringstid
  • Bismarck on his deathbed: Maybe this is the first example of the works of Paperazzi: Max Priester & Willy Wilcke took this picture secretly without consent; the even managed to shift the body so that the face would be more visible and turned the clock back. They sold the pictures until the Bismarck family confiscated the plates. The pictures later appeared in a.o. the Frankfurter Illustrierte Monday, October 24, 2011 Mathias Klang klang@ituniv.se
  • A reporter for the New York Daily News, Thomas Howard, sat in the front row as a woman named Ruth Snyder sat in the electric chair, in Sing Sing, in 1928; he had a concealed camera on his ankle, and he took a picture of Snyder as the electricity surged through her body. The picture sold an incredible amount of newspapers Monday, October 24, 2011 Mathias Klang klang@ituniv.se
  • why cameras fail by wrote cc by nc
  • AIR travellers will be invited to take part in "virtual strip searches" [X-rays] at Australian airports when the Federal Government begins trials of security screening measures this month. The measures include a body scanner [X-rays] that can see what lies under a person's clothes. The Government says the scanner could detect weapons and explosives, but critics say it is an invasion of privacy. "It provides detailed images of a person's body … which many people might find highly embarrassing," said Stephen Blanks, of the NSW Council for Civil Liberties. http://publik18.blogspot.com/2008/10/privacy-health-fears-over-airport-body.html Monday, October 24, 2011 Mathias Klang klang@ituniv.se
  • http://www.infowars.com/exposed-naked-body-scanner-images-of-film-star-printed-circulated-by-airport-staff/
  • Zeiss Ikon Super Ikonta III... from alf sigaro cc by sa
  • http://www.spyshops.ca/trackerbackpack.htm Monday, October 24, 2011 Mathias Klang klang@ituniv.se
  • http://www.brickhousesecurity.com/wf200.html Monday, October 24, 2011 Mathias Klang klang@ituniv.se
  • LEGO Gears of War Minifigs by Dunechaser by nc sa Monday, October 24, 2011 Mathias Klang klang@ituniv.se
  • http://www.dpl-surveillance-equipment.com/1006177.html Monday, October 24, 2011 Mathias Klang klang@ituniv.se
  • http://www.dpl-surveillance-equipment.com/100611.html Monday, October 24, 2011 Mathias Klang klang@ituniv.se
  • can birds have a dog fight? by threecee cc by nc sa
  • Après la pluie by Garuna bor-bor Après la pluie from Garuna bor-bor cc by sa
  • Gavel from noyava cc by nc sa
  • http://en.wikipedia.org/wiki/Law Halloween From fabbio cc by sa
  • black angel from sy parrish cc by nc sa
  • Anarchy In The UK from an untrained eye cc by nc
  • Hello Kitty Darth Vader from JD Hancock cc by
  • Iceberg from sweart cc by nc sa The answer is only the tip of the iceberg
  • XKCD CC BY NC http://xkcd.com/898/
  • image from Yumiko Hayakawa essay Public Benches Turn ‘ Anti-Homeless ’ (also recommend Design with Intent ) Source http://architectures.danlockton.co.uk/2006/10/05/anti-homeless-benches-in-tokyo/
  • G2 TECHNICIAN HEAD SYSTEM - Cyberdog - futuristic space fashion, t-shirts, clubwear and other cool stuff. By caseorganic cc by nc
  • Mathias Klang <klang@informatik.gu.se> Handelshögskolan 18 september 2002 Så gott som varje persondator i Sverige bröt mot den gamla datalagen
  • good question from e-magic cc by nd Licenser avskaffas Grundläggande krav på behandling ställs Särskilda regler för känsliga uppgifter Rätten till information Anmälningsplikt eller personombud Skadestånd eller Straff
  • gorilla bones from limonada cc by nc sa
  • Mathias Klang <klang@informatik.gu.se> Handelshögskolan 18 september 2002 Got blood? by drurydrama (Len Radin) cc by nc sa
  • Singin' in the Rain By Duncan~ cc by Ras, etniskt ursprung, politiska åsikter, religiös eller filosofisk övertygelse, hälsa, sexualliv, samt medlemskap i fackförening
  • Somali Boy From Monica's Dad cc by Ramsbrofallet: Högsta domstolen dom i mål B 293-00 meddelad i Stockholm den 12  juni 2001
  • Statue Park by Bill McIntyre cc by nc sa PUL Vi vet hur det var med personuppgiftslagen, PUL. Konfirmandläraren Bodil Lindqvist dömdes av Eksjö tingsrätt såväl som Göta Hovrätt för brott mot PUL och EU:s datadirektiv. Lindqvist hade i skämtsam ton på sin hemsida beskrivet hur kollegan Maritte föll ner från en stege och vrickade foten. Det ansågs som en känslig personuppgift trots att både Maritte och Lindqvist var överens om publiceringen. Media-Sverige ställde sig bakom Bodil Lindqvist
  • X by hidden side cc by nc sa
  • Off Switch from Kyle Slattery cc by nc sa
  • FDR's "Fireside Chats" With America By Tony the Misfit cc by
  • snowbow from jenny downing cc by
  • CSA-2006-08-10-093402 By The U.S. Army cc by
  • Eden WEEE man statue by Ruth Flickr cc by nc sa
  • You Are Not Allowed To Take Photos... from Troy Holden cc by nc sa
  • LESSON #3- ON STARTING SMALL from theshanghaieye cc by sa
  • Sushi from Luciano Meirelles cc by sa
  • Monday, October 24, 2011 Mathias Klang klang@ituniv.se Foucault (1926-1984) & Benthams ( 1748 – 1832) ) model prison – The Panopticon Övervakningsarkitektur This shapes how individuals see themselves and leads them to behave differently than they might if they weren ’ t being observed
  • Archives des députés allemands from hamadryades cc by nc sa
  • 1_365 from SMN cc by nc sa
  • A New Era from JD Hancock cc by
  • Kansas Jayhawks 2008 NCAA Basketball National Champions--Street Party from M31. cc by
  • never to be seen again from *sean cc by Granovetter, M.S. (1983). "The Strength of the Weak Tie: Revisited" [PDF], Sociological Theory, Vol. 1, 201-33.
  • Behind the Red Wall from skycaptaintwo cc by
  • Bathroom Narcissism from Shermeee cc by
  • Split Mirror from PhotoDu.de cc by
  • Past Times... from Steve-h cc by sa
  • Salt pans from dachalan cc by nc sa
  • Generational Fights from Pensiero cc by nc nd
  • And what are you doing? from San Diego Shooter cc by nc nd
  • Not Everybody Understands by Skinned Mink Not Everybody Understands from Skinned Mink cc by sa Wikipedia Narcissism http://en.wikipedia.org/wiki/Narcissism
  • Black and white or white and black? from * Cati Kaoe * cc by nc sa
  • Creepy Kid from sahlgoode cc by sa
  • Face Paint from Alyssa L. Miller cc by
  • Rough days from bayat cc by nc sa
  • All these images are © but NOT licensed under Creative Commons licenses
  • Life from gfpeck cc by nd
  • Canon eos 500d rebel t1i 18-55 mm lens from sveinur45 cc by nc sa
  • Get thee to a nunnery from kevindooley cc by
  • Look into my eyes.... from Johan J.Ingles-Le Nobel cc by
  • PESSIMISM OF THE INTELLECT, OPTIMISM OF THE WILL by ruSSeLL hiGGs cc by nc sa
  • Sales from Nils Geylen cc by sa
  • Flowers in a green field from nhburdick CC by nc sa
  • Oceanic from Έλενα Λαγαρία cc by
  • 1.11.09- CHD, here we come! from thedalogs cc by
  • 1984 from uhhhtanner cc by
  • Facebook Is The Opium Of The People from tacoekkel cc by sa
  • Funny Lass from Tomi Tapio cc by
  • Eyes ! (Youth from Antikythera!) by agelakis cc by nc sa
  • Privacy with Internet

    1. 1. Privacy with Internet <ul><li>Mathias Klang </li></ul>
    2. 2. “ Having two identities for yourself is an example of a lack of integrity” <ul><li>Mark Zuckerberg (2010) </li></ul>
    3. 7. History: how did we get to this?
    4. 8. Privacy?
    5. 9. privacy <ul><li>(from Latin: privatus &quot;separated from the rest, deprived of something, esp. office, participation in the government&quot;, from privo &quot;to deprive&quot;) is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively . (Wikipedia) </li></ul>
    6. 10. Historical & socio-biological construct
    7. 12. The Right to Privacy <ul><li>The intensity and complexity of life, attendant upon advancing civilization, have rendered necessary some retreat from the world…solitude and privacy have become more essential to the individual; but modern enterprise and invention have, through invasions upon his privacy, subjected him to mental pain and distress… </li></ul>Warren and Brandeis The Right to Privacy, 4 Harvard Law Review 193 (1890)
    8. 13. The gaze <ul><li>Data collection Data analysis </li></ul>
    9. 14. Data Spatial
    10. 15. Technology threats
    11. 18. Paparazzi (1898)
    12. 19. <ul><li>The execution of Ruth Snyder 1928 </li></ul>
    13. 23. Democratization of surveillance
    14. 25. Child Locator GPS Watch
    15. 26. Teen arrive alive
    16. 27. & other interesting toys
    17. 28. AM/FM Clock radio wireless hidden camera
    18. 29. Shower AM-FM Mirror Radio 
    19. 30. And what about Manufacturers responsibility?
    20. 31. regulation
    21. 32. The law
    22. 33. Law is a system of rules and guidelines which are enforced… to govern behavior , wherever possible. It shapes … and serves as a social mediator of relations between people .
    23. 34. Norms from above
    24. 35. Power to the people: Democracy
    25. 36. Power of the technocracy
    26. 37. Socio-legal regulation
    27. 38. Law Contextual & programmed social rules Architecture
    28. 39. Technology makes society
    29. 40. Only technology (spot the ethical dilemma?)
    30. 41. Data protection laws
    31. 42. Swedish Datalagen 1973 Data Protection Directive 1995 PUL 1998 1984 1997 Nokia 6120 Mac Classic
    32. 43. Personuppgiftslagen (1998)
    33. 44. All information that directly or indirectly points to a live physical person
    34. 45. Autonomy – user control
    35. 46. Harmless – ordinary – Sensitive data
    36. 47. Ramsbrofallet (2001)
    37. 48. Bodil Lindqvist (2003)
    38. 49. And then…
    39. 50. But first technological change – why it matters
    40. 51. Game changer: storage
    41. 52. Game changer: communication
    42. 53. Digitalization Connectivity Storage Devices
    43. 54. Flickr 2000 2001 2002 2003 2005 2004 2006 Wikipedia Linkedin Blogger 1999 Second Life My Space Skype Digg Facebook Ning YouTube Twitter Spotify Google c:a 1998 2008 2007 2009 Farmville iphone Wikileaks Angry Birds
    44. 55. Theoretical rights become inevitable practice
    45. 56. Technology changing society, but social rules slow to evolve…
    46. 57. Surveillance: A gaze from above
    47. 58. power <ul><li>How is surveillance possible? </li></ul>
    48. 59. The state <ul><li>Information gathering </li></ul>
    49. 62. Sousveillance: A gaze from below
    50. 63. Social ties <ul><li>How is sousveillance possible? </li></ul>
    51. 64. “ friends”
    52. 65. Strength of Weak ties <ul><li>“ Weak ties provide people with access to information and resources beyond those available in their own social circle; but strong ties have greater motivation to be of assistance and are typically more easily available.” (Granovetter, 1983, pp 209) </li></ul>
    53. 66. Autoveillance: a gaze from within
    54. 67. Exhibitionism? <ul><li>How is autoveillance possible? </li></ul>
    55. 68. myself
    56. 69. We leak information
    57. 70. Compartmentalization
    58. 71. Analog social norms
    59. 72. Protection from the outer gaze
    60. 73. Theory? <ul><li>Narcissism is a term with a wide range of meanings, depending on whether it is used to describe a central concept of psychoanalytic theory, a mental illness, a social or cultural problem, or simply a personality trait. Except in the sense of primary narcissism or healthy self-love, &quot;narcissism&quot; usually is used to describe some kind of problem in a person or group's relationships with self and others. (wikipedia) </li></ul>
    61. 74. Data analysis
    62. 75. Eula: Licensing to the weak
    63. 76. Today we have a mix of sur, sous & autoveillance. regulation mainly focuses on surveillance.
    64. 77. End of privacy?
    65. 78. The Hive-mind
    66. 79. If you have done nothing wrong, you have nothing to fear
    67. 80. threats?
    68. 81. Other people <ul><li>Cyberbullying </li></ul><ul><li>Stalking </li></ul><ul><li>Burgulary </li></ul>
    69. 82. Corporations
    70. 83. We have (theoretical) control over Big Brother
    71. 84. If you are not paying for it, you're not the customer; you're the product being sold.
    72. 85. State & Corporations
    73. 86. The filter bubble <ul><li>Eli Pariser </li></ul>
    74. 87. Identity & Information junk food.
    75. 88. The Net delusion <ul><li>Evgeny Morozov </li></ul>
    76. 89. Technology is not inherently democratic
    77. 90. A Squirrel Dying In Your Front Yard May Be More Relevant To Your Interests Right Now Than People Dying In Africa <ul><li>Mark Zuckerberg </li></ul>
    78. 91. Thank you.
    79. 92. Information <ul><li>All images from www.flickr.com (unless specifically stated) </li></ul><ul><li>Image & licensing info in the notes section of slides </li></ul><ul><li>Presentation licensed: Creative Commons BY-NC-SA </li></ul><ul><li>The presentation can be downloaded from: www.slideshare.net/klang </li></ul><ul><li>More information about me: www.techrisk.se & www.digital-rights.net </li></ul><ul><li>Mathias Klang. [email_address] or @klang67 </li></ul>

    ×