SlideShare a Scribd company logo
Privacy in the Information AgePresented by: Andrew WesolekInformation TechnologyFall, 2009
Panopticism: The Theoretical FoundationPanoptic (all seeing) structure first envisioned by Jeremy Bentham as a perfect prisonFoucault takes a more metaphorical approach: Panopticism is not a physical structure, but a social one.  “To maintain order in a democratic and capitalist society, the populace needs to believe that any person could be surveilled at any time.”Quote and Picture taken from: http://www.cla.purdue.edu/English/theory/newhistoricism/modules/foucaultcarceral.html
Concrete ManifestationsFacebook:20% of colleges and universities currently screen applicants’ social networking sites. Content you share is no longer “yours”"We may use information about you that we collect from other sources, including but not limited to newspapers and Internet sources such as blogs, instant messaging services and other users of Facebook, to supplement your profile” –Facebook privacy policyYou cannot remove content from Facebook’s servers“Facebook is able to track the buying habits of its users on affiliated third-party sites even when they are logged out of their account or have opted out of its controversial ‘Beacon’ tracking service”.    - http://www.zdnet.com.au/news/security/soa/Logged-in-or-out-Facebook-is-watching-you/0,130061744,339284281,00.htm
More Concrete ManifestationsGoogle:http://www.criminaljusticeusa.com/blog/2009/25-surprising-things-that-google-knows-about-you/
What is Privacy Anyway?Adam Moore: “A right to control access to and uses of—places, bodies, and personal information”Note the normative and descriptive aspectsAlso, element of control
Should we really have a Right to Privacy?Some Say noA right to privacy of what?Importance of Intentionality
Back to FoucaultOn Panopticisim: “It is not that the beautiful totality of the individual is amputated, repressed, altered by our social order, it is rather that the individual is carefully fabricated within it”We might strengthen this statement by postulating that privacy is a necessary condition for freedom
What should we do?Carefully examine costs and benefits of new technologyDefine a domestic (private) sphere and respect its boundariesConsider and respect the intentionality of our ‘digital actions’http://www.wired.com/images_blogs/threatlevel/images/2008/08/29/surveillance_screen_peterme.jpg

More Related Content

PPT
Social media is my business module 3
PPT
Using Social Networking Sites
PPT
User generated content and citizen journalism
PPT
Writing/production for the web - BASIC principles
PPTX
Social Media 101
PPT
Mdia5003 presentation
PPT
Web 2.0 and a Changing World
PPT
Learning spaces
Social media is my business module 3
Using Social Networking Sites
User generated content and citizen journalism
Writing/production for the web - BASIC principles
Social Media 101
Mdia5003 presentation
Web 2.0 and a Changing World
Learning spaces

Viewers also liked (18)

PPS
Nice Photos
PPTX
Wesolekpresentation 1
PPTX
Library2 Presentation
PPT
Macpa Claws Of State
DOC
Mivxan56
PPTX
Who Uses this Stuff, Anyway? An investigation into the end-users of the USU D...
PPT
USU DigitalCommons
PPT
Magazine Questionnaire[1]
PPTX
Norvegiana, hack4no 2016, Hønefoss, okt 2016
PPT
Emerging Technologies
PPT
Right/Wrong in Holden
PPT
Test presentation private
PPTX
Digitizing Items from Special Collections: The USU Approach
PPT
Antares Presentation 2011
PPTX
USU Policy 535: Open Access to Scholarly Articles. What it is and what it mea...
PPTX
Completepresentation
PPT
Introduction to The Children's Village
PPT
Barton And Hamilton, Literary Practices
Nice Photos
Wesolekpresentation 1
Library2 Presentation
Macpa Claws Of State
Mivxan56
Who Uses this Stuff, Anyway? An investigation into the end-users of the USU D...
USU DigitalCommons
Magazine Questionnaire[1]
Norvegiana, hack4no 2016, Hønefoss, okt 2016
Emerging Technologies
Right/Wrong in Holden
Test presentation private
Digitizing Items from Special Collections: The USU Approach
Antares Presentation 2011
USU Policy 535: Open Access to Scholarly Articles. What it is and what it mea...
Completepresentation
Introduction to The Children's Village
Barton And Hamilton, Literary Practices
Ad

Similar to Infotechfinal 1 (20)

PPT
Dan Trottier
PPT
Surveillance And Power
PDF
Selfies, Surveillance and the Voluntary Panopticon
PDF
Embracing Postprivacy: Optimism towards a future where there is "Nothing to h...
PPT
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
PPTX
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
PDF
Social Insecurity Panel, Lee Tien, EFF
PDF
Social Insecurity Panel, Lee Tien, EFF
PPTX
Privacy and education in the internet age
PPTX
Online Policy Primer
PDF
The change of_surveillance_and_its_issues_chiara_artini&alessia_vidili
PPTX
26 November 2012
PPT
Privacy with Internet
PPTX
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
PPTX
Online Policy Primer: Facebook
PDF
Infosecurity2013nl 131103184054-phpapp01
PPT
Off the Grid: Is anonymity possible?
PPT
Med122 the case for privacy 2014
PPTX
Online Policy Primer: Facebook
PDF
Week 7: Privacy-rev2013
Dan Trottier
Surveillance And Power
Selfies, Surveillance and the Voluntary Panopticon
Embracing Postprivacy: Optimism towards a future where there is "Nothing to h...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
Social Insecurity Panel, Lee Tien, EFF
Social Insecurity Panel, Lee Tien, EFF
Privacy and education in the internet age
Online Policy Primer
The change of_surveillance_and_its_issues_chiara_artini&alessia_vidili
26 November 2012
Privacy with Internet
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Online Policy Primer: Facebook
Infosecurity2013nl 131103184054-phpapp01
Off the Grid: Is anonymity possible?
Med122 the case for privacy 2014
Online Policy Primer: Facebook
Week 7: Privacy-rev2013
Ad

Recently uploaded (20)

PDF
KodekX | Application Modernization Development
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Machine learning based COVID-19 study performance prediction
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Modernizing your data center with Dell and AMD
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
Teaching material agriculture food technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Big Data Technologies - Introduction.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
KodekX | Application Modernization Development
Agricultural_Statistics_at_a_Glance_2022_0.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Review of recent advances in non-invasive hemoglobin estimation
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Digital-Transformation-Roadmap-for-Companies.pptx
Machine learning based COVID-19 study performance prediction
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Understanding_Digital_Forensics_Presentation.pptx
Modernizing your data center with Dell and AMD
The Rise and Fall of 3GPP – Time for a Sabbatical?
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Teaching material agriculture food technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Big Data Technologies - Introduction.pptx
A Presentation on Artificial Intelligence
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Building Integrated photovoltaic BIPV_UPV.pdf

Infotechfinal 1

  • 1. Privacy in the Information AgePresented by: Andrew WesolekInformation TechnologyFall, 2009
  • 2. Panopticism: The Theoretical FoundationPanoptic (all seeing) structure first envisioned by Jeremy Bentham as a perfect prisonFoucault takes a more metaphorical approach: Panopticism is not a physical structure, but a social one. “To maintain order in a democratic and capitalist society, the populace needs to believe that any person could be surveilled at any time.”Quote and Picture taken from: http://www.cla.purdue.edu/English/theory/newhistoricism/modules/foucaultcarceral.html
  • 3. Concrete ManifestationsFacebook:20% of colleges and universities currently screen applicants’ social networking sites. Content you share is no longer “yours”"We may use information about you that we collect from other sources, including but not limited to newspapers and Internet sources such as blogs, instant messaging services and other users of Facebook, to supplement your profile” –Facebook privacy policyYou cannot remove content from Facebook’s servers“Facebook is able to track the buying habits of its users on affiliated third-party sites even when they are logged out of their account or have opted out of its controversial ‘Beacon’ tracking service”. - http://www.zdnet.com.au/news/security/soa/Logged-in-or-out-Facebook-is-watching-you/0,130061744,339284281,00.htm
  • 5. What is Privacy Anyway?Adam Moore: “A right to control access to and uses of—places, bodies, and personal information”Note the normative and descriptive aspectsAlso, element of control
  • 6. Should we really have a Right to Privacy?Some Say noA right to privacy of what?Importance of Intentionality
  • 7. Back to FoucaultOn Panopticisim: “It is not that the beautiful totality of the individual is amputated, repressed, altered by our social order, it is rather that the individual is carefully fabricated within it”We might strengthen this statement by postulating that privacy is a necessary condition for freedom
  • 8. What should we do?Carefully examine costs and benefits of new technologyDefine a domestic (private) sphere and respect its boundariesConsider and respect the intentionality of our ‘digital actions’http://www.wired.com/images_blogs/threatlevel/images/2008/08/29/surveillance_screen_peterme.jpg