SlideShare a Scribd company logo
Pecha Kucha
Web 2.0 & Surveillance
What is web 2.0
• Second generation of the WWW
• Ability for people to share information
• Non static
Smartphone revolution
• Collective intelligence moves from desktops to
• Cameras and sensors allow real time
information.
Crowdsourcing
• Collective work created by web users
• Far more effective
• Eg. Ebay, Youtube, Twitter, flickr, facebook
Successful web 2.0 comapny
• Google
• GPS (cell tower)
• Voice recognition (Google microphone)
• Uses most frequent search terms for results
Growing web
• Smarter than in it was
• Search results, locations and voice
recognition.
• Movement to smart phone
• Real time Data
Race for control
• Control over unique data
• Monopoly rents for data usage
The Government and Mass Surveillance is an example of how
computing developments have led to modelling human
behaviour.
The government monitors:
How the Government tracks you
• Code names such as PRISM and XKEYSCORE which are
surveillance systems.
• It is illegal and breaks the law
• NSA surveillance came to light when contractor Edward
Snowden leaked documents.
History of Mass Surveillance
• American founders disagreed with British surveillance
and established the 4th amendment with understanding
that privacy is a basic human right.
• The 4th amendment prevents the government from
tracking personal information unless there is evidence of
a crime.
• The Government is breaking the law
History
• Government surveillance got worse when the US
congress gave Fisa courts more authority to have
surveillance on a large scale, allowing governments to
search a list of people and their crimes including those
with no offences.
• The Government can illegally track internet
users based on search terms on popular
websites, social networks and e-mails.
MARIJUANA
SICK
BURN
The spying of people allows the government to
have complete control over people’s lives which
makes people question free speech, free
association and many more.
• http://broadbandworldforum.wordpress.com/
2013/01/31/lebanons-appetite-for-
smartphones-highlights-the-extent-to-which-
mobile-can-meet-demand-for-internet-
access/

More Related Content

PPT
Legal Research in the Age of Cloud Computing
PPT
Open Data, Open Government
PPT
Digital Sovereigns or Consent of the Networked
PPTX
Privacy and Freedom of Expression
PPTX
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
PPTX
Privacy law and policy 2 - LIS550
PPTX
The Internet State Filter
DOCX
80223977 school surveillance
Legal Research in the Age of Cloud Computing
Open Data, Open Government
Digital Sovereigns or Consent of the Networked
Privacy and Freedom of Expression
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
Privacy law and policy 2 - LIS550
The Internet State Filter
80223977 school surveillance

What's hot (20)

PPTX
Political hacktivism
PDF
Individual and Technology
PPTX
State of the Internet
DOCX
Smartphone Encryption and the FBI Demystified
PPT
Net Neutrality and The FCC
PPTX
GOOGLE and privacy regulations
PPT
#DCI11 Access to Information
PPT
Freedom or Control in Virtual Worlds
PPTX
Content pirates
PDF
PDF
10-22-13 Presentation on Google Glass and Privacy Challenges
PPTX
Privacy reconsidered
PPTX
Internet privacy and laws
PPTX
PPT
Media & Limits To Free Speech in the 21st Century
PPT
J O U R 3340 Sept 17 Online Journalism
ODP
Infoactivism - Michł Mach
PPTX
Internet of Things
PDF
Internetregulationjapan
PPTX
Isa12b
Political hacktivism
Individual and Technology
State of the Internet
Smartphone Encryption and the FBI Demystified
Net Neutrality and The FCC
GOOGLE and privacy regulations
#DCI11 Access to Information
Freedom or Control in Virtual Worlds
Content pirates
10-22-13 Presentation on Google Glass and Privacy Challenges
Privacy reconsidered
Internet privacy and laws
Media & Limits To Free Speech in the 21st Century
J O U R 3340 Sept 17 Online Journalism
Infoactivism - Michł Mach
Internet of Things
Internetregulationjapan
Isa12b
Ad

Similar to Web 2.0 and surveillance slides (20)

PPT
Pecha Kucha Script
PPTX
Surveillance and expropriation of information
PDF
B2B2-Chapter-2.pdf
PPTX
Pecha kucha on_surveillance (1)
PPT
Privacy in the age of surveillance
PDF
Electronic Communication Privacy Act 1986
PPTX
Surveillance Society
PDF
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
PDF
User Privacy and Data Sovereignty
PPTX
Privacy isdeadgetoveritredux 10.12.2014
PDF
Infosecurity2013nl 131103184054-phpapp01
PPTX
The internet, privacy
PPT
Week 5: Dataveillance
PDF
Online Privacy, the next Battleground
PPTX
Unit 1 Surveillence technology (Computer science engineering)
PPT
ALPSP Web 2 Intro2010
PPTX
Surveillance and Expropriation of Information
PPT
Alpsp Web 2 Intro
PPTX
Reining in the Data ITAG tech360 Penn State Great Valley 2015
PDF
On line footprint @upc
Pecha Kucha Script
Surveillance and expropriation of information
B2B2-Chapter-2.pdf
Pecha kucha on_surveillance (1)
Privacy in the age of surveillance
Electronic Communication Privacy Act 1986
Surveillance Society
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
User Privacy and Data Sovereignty
Privacy isdeadgetoveritredux 10.12.2014
Infosecurity2013nl 131103184054-phpapp01
The internet, privacy
Week 5: Dataveillance
Online Privacy, the next Battleground
Unit 1 Surveillence technology (Computer science engineering)
ALPSP Web 2 Intro2010
Surveillance and Expropriation of Information
Alpsp Web 2 Intro
Reining in the Data ITAG tech360 Penn State Great Valley 2015
On line footprint @upc
Ad

Recently uploaded (20)

PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
master seminar digital applications in india
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Computing-Curriculum for Schools in Ghana
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Pharma ospi slides which help in ospi learning
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
master seminar digital applications in india
human mycosis Human fungal infections are called human mycosis..pptx
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Computing-Curriculum for Schools in Ghana
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Final Presentation General Medicine 03-08-2024.pptx
O7-L3 Supply Chain Operations - ICLT Program
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
Pharma ospi slides which help in ospi learning
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Microbial disease of the cardiovascular and lymphatic systems
VCE English Exam - Section C Student Revision Booklet
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Complications of Minimal Access Surgery at WLH
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx

Web 2.0 and surveillance slides