SlideShare a Scribd company logo
1 of 7
Pecha Kucha Presentation:
Surveillance, tracking &
mapping
Pecha kucha presentation
Pecha kucha presentation
Pecha kucha presentation
Pecha kucha presentation
Pecha kucha presentation
Pecha kucha presentation

More Related Content

Viewers also liked

Literacy skillslp
Literacy skillslpLiteracy skillslp
Literacy skillslploraalli
 
Pecha kucha presentation
Pecha kucha presentationPecha kucha presentation
Pecha kucha presentationtdolllx
 
The internet in my daily life
The internet in my daily lifeThe internet in my daily life
The internet in my daily lifebpfaller
 
Gsmfentrybooklet13
Gsmfentrybooklet13Gsmfentrybooklet13
Gsmfentrybooklet13loraalli
 
Chapter 8(short)
Chapter 8(short)Chapter 8(short)
Chapter 8(short)loraalli
 
Alligood l policy
Alligood l policyAlligood l policy
Alligood l policyloraalli
 
Alligood l cedp
Alligood l cedpAlligood l cedp
Alligood l cedploraalli
 
1984 vs. Truman Show
1984 vs. Truman Show1984 vs. Truman Show
1984 vs. Truman Showtjkid1
 
COMM consumer profile analysis
COMM consumer profile analysisCOMM consumer profile analysis
COMM consumer profile analysisbpfaller
 

Viewers also liked (10)

Literacy skillslp
Literacy skillslpLiteracy skillslp
Literacy skillslp
 
Pecha kucha presentation
Pecha kucha presentationPecha kucha presentation
Pecha kucha presentation
 
The internet in my daily life
The internet in my daily lifeThe internet in my daily life
The internet in my daily life
 
Gsmfentrybooklet13
Gsmfentrybooklet13Gsmfentrybooklet13
Gsmfentrybooklet13
 
Chapter 8(short)
Chapter 8(short)Chapter 8(short)
Chapter 8(short)
 
Alligood l policy
Alligood l policyAlligood l policy
Alligood l policy
 
Alligood l cedp
Alligood l cedpAlligood l cedp
Alligood l cedp
 
1984 vs. Truman Show
1984 vs. Truman Show1984 vs. Truman Show
1984 vs. Truman Show
 
COMM consumer profile analysis
COMM consumer profile analysisCOMM consumer profile analysis
COMM consumer profile analysis
 
Presentation2
Presentation2Presentation2
Presentation2
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Pecha kucha presentation

Editor's Notes

  1. (Introduction to surveillance-mapping and modelling human behaviour.) Surveillance has huge environmental effects on our lives. Every piece of data gathered from surveillance is available to everyone and if bad could come back to trouble you in the future. GPS, motion sensors and cctv cameras all play in a major role in mapping and modelling human behaviour. From the making of these various other activities have occurred whether it be on the computer or mobile phone to track people around the world.
  2. Movement tracking: Movement tracking can be put onto mobile phones and various other platforms. It follows every movement a person that has the device makes. The beneficial things about movement tracking is that if someone loses a phone there is a possibly they can find out whether it has been stolen or where they left it. The iPhone has an app installed called “find my iPhone” and it is made for anyone that happens to lose their iPhone to have a chance to find it. There is a tracking system on the phone that will locate it whereabouts when you don’t have it. Another beneficial thing about tracking movement is that new technology is turning cameras and smartphones into tracking devices that are capable of following peoplesmovements wherever they are, even inside a store. And surprisingly can even track right down to where you're looking.
  3. Social networking sites: Social networking site tracking is good for mapping your own activities. Timelines are kept on social networking sites that show all of your information every day, every month and also every year. Anyone can find out information about one another through various websites now. This can be good depending on who is searching for the information
  4. Not all movement tracking is considered beneficial though, it can also be problematic. Some people feel as if they have no privacy when it comes to themselves and the police. New technologies have been made which allow the police to (as some people would say) intrude into someone's personal information. A mobile phone security monitor called watchhound is used by police to listen to telephone conversations. This is another way of hacking but is made legal because its being used by authority. Another surveillance device is called stingray, it is mostly used by police in the US. It connects to mobile phones everywhere and collects data and the locations of where it is even when a phone call hasn’t been made. Cellbrite is a device that can download everything from one person’s phone onto another.
  5. I am a big user of social networking sites, especially Twitter and Facebook. All my activities on each site are mapped throughout the day. I think this is good because I can keep track of what I do and who I talk to online. Also if anything was to happen to me authorities could see who I had been talking to that day. I think surbeillace devices and apps are a good thing but I also dislike the fact that authorities can look into everything we do as it feels that I have no privacy even while using my own phone.
  6. Mapping activities on social networking sites also help authorities when it comes to investigations. Even though people may forget, all activity online is monitored. I have looked at various features of social implications regarding surveillance in every day life. Surveillance can be used in the public as a positive thing, its linked to security and keeping the public safe but at the same time it can be seen as a negative thing because it serves for government purposes and used to power over the public.