Sx1009 rights in the digital society l.jpg
This presentation is the property of its rightful owner.
Sponsored Links
1 / 21

SX1009 Rights in the Digital Society PowerPoint PPT Presentation

SX1009 Rights in the Digital Society Wendy Moncur Dept. of Computing Science Rights in the Digital Society Freedom of expression and privacy: civil rights in a digital society Ownership in a digital world Cyber-crime, cyber-terrorism and cyber-bullying

Download Presentation

SX1009 Rights in the Digital Society

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Sx1009 rights in the digital society l.jpg

SX1009 Rights in the Digital Society

Wendy Moncur

Dept. of Computing Science


Rights in the digital society l.jpg

Rights in the Digital Society

  • Freedom of expression and privacy: civil rights in a digital society

  • Ownership in a digital world

  • Cyber-crime, cyber-terrorism and cyber-bullying

  • Information credibility and authority in a Web2.0 world

  • Details of assessment


The extent of the digital society l.jpg

The extent of the Digital Society

  • Recording everything, forgetting nothing

  • Where?

    • Internet

    • Mobile phones

    • Cameras

    • Smart appliances

    • Buildings

    • Furniture

    • Vehicles

    • clothing

    • .......


The extent of the digital society4 l.jpg

The extent of the Digital Society

“By year end 2012, physical sensors will create 20% of non-video internet traffic.”

Gartner Group

www.gartner.com/it/page.jsp?id=876512


Civil rights freedom of expression l.jpg

Civil rights: Freedom of expression

http://news.bbc.co.uk/1/hi/technology/5020788.stm


Civil rights freedom of expression6 l.jpg

Civil rights: Freedom of expression


Civil rights privacy l.jpg

Civil rights: Privacy

  • Who stores our data?

  • Where?

  • Who can access it?

  • What does this data say about us?


Civil rights privacy8 l.jpg

Civil rights: Privacy

  • MPs expenses scandal triggered by info on FaceBook


Ownership in a digital world l.jpg

Ownership in a digital world

  • Who ‘owns’ this photo?

  • Who can delete it?

  • What is your impression of these people?

  • Would you employ them?


Ownership in a digital world10 l.jpg

Ownership in a digital world


Cyber crime l.jpg

Cyber-crime

“...the use of any computer network for crime” British Police

  • financial scams

  • computer hacking

  • downloading pornographic images from the internet

  • virus attacks

  • stalking by e-mail

  • creating websites that promote racial hatred

  • ..... and more.....


Cyber crime a big problem l.jpg

Cyber-crime: a big problem

  • 90% of US companies detected computer security breaches in the previous year

  • 74% acknowledged financial losses as a result of the breaches of security

  • 273 organisations quantified their financial losses: the total bill came to $265m.

  • 25% of respondents detected penetration from outside their company

  • 79% detected employee abuse of the internet, for example downloading pornography or pirated software

  • 85% detected computer viruses

http://news.bbc.co.uk/hi/english/static/in_depth/uk/2001/life_of_crime/cybercrime.stm


Cyber terrorism l.jpg

Cyber-terrorism

“Terrorist groups are increasingly using new information technology and the Internet to formulate plans, raise funds, spread propaganda, and engage in secure communications.

Cyberterrorism-–meaning the use of cyber tools to shut down critical national infrastructures (such as energy, transportation, or government operations) for the purpose of coercing or intimidating a government or civilian population–-is clearly an emerging threat.”

Dale L. Watson, Executive Assistant Director, Counterterrorism/Counterintelligence Division, FBI

http://www2.fbi.gov/congress/congress02/watson020602.htm


Cyber bullying l.jpg

Cyber-bullying

  • What constitutes cyber-bullying?


Information credibility l.jpg

Information credibility

  • Data is not perfect

  • Whose fault was this accident?


Information credibility16 l.jpg

Information credibility

http://www.sexoffendertrackerapp.com/

Publicly available app.

  • Sense of safety, or greater fear?

  • Is the information correct?

  • Does this app incite illegal vigilante activity?

“Sex Offender Tracker App is a new mobile app that provides users with access to the location of registered sex offenders through the lens of augmented reality.”

http://www.sexoffendertrackerapp.com/


A balancing act l.jpg

A Balancing Act

Information credibility and authority in a Web2.0 world

Ownership of online materials

Right to Privacy

Freedom of expression

Cyber-crime, cyber-terrorism

Cyber-bullying


Assessment 1 l.jpg

Assessment (1)

In the practical, you will be randomly assigned to a group, and to one of the following topics:

  • Google StreetView (and similar applications)

  • Sensors to monitor elderly people in their homes

  • Activist websites – eg- environmental, political. Choose at least one specific example.

  • UK use of CCTV

  • Wikileaks Iraq War logs


Assessment 2 l.jpg

Assessment (2)

  • You will take part in an online debate about your allocated topic.

  • You will either put forward arguments about the advantages or disadvantages of the debate topic, depending on your group.


Assessment 3 what to debate l.jpg

Assessment (3): What to debate?

  • Arguments should cover relevant aspects of:

    • Civil rights in a  digital society

    • Ownership in a digital society

    • Cyber-crime/ cyber-terrorism/ cyber-bullying

    • Information credibility and authority in a Web 2.0 world


Some rules l.jpg

Some rules....

  • You should only argue your allocated side of the argument, even if you do not really agree with it.

  • You are expected to use grammatically correct English. No text-speak please.

  • Your arguments should be well thought through, and based in the research that you do on your topic.

  • Your arguments should only be about the topic. They should be courteous, even if you disagree strongly with someone else's opinion.

  • You will be marked both on your individual contribution to the debate, and on your support of other students who are taking the same stance as you (ie - positive or negative). Marks will be given for the number and content of your arguments.


  • Login