Download
sx1009 rights in the digital society n.
Skip this Video
Loading SlideShow in 5 Seconds..
SX1009 Rights in the Digital Society PowerPoint Presentation
Download Presentation
SX1009 Rights in the Digital Society

SX1009 Rights in the Digital Society

322 Views Download Presentation
Download Presentation

SX1009 Rights in the Digital Society

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. SX1009 Rights in the Digital Society Wendy Moncur Dept. of Computing Science

  2. Rights in the Digital Society • Freedom of expression and privacy: civil rights in a digital society • Ownership in a digital world • Cyber-crime, cyber-terrorism and cyber-bullying • Information credibility and authority in a Web2.0 world • Details of assessment

  3. The extent of the Digital Society • Recording everything, forgetting nothing • Where? • Internet • Mobile phones • Cameras • Smart appliances • Buildings • Furniture • Vehicles • clothing • .......

  4. The extent of the Digital Society “By year end 2012, physical sensors will create 20% of non-video internet traffic.” Gartner Group www.gartner.com/it/page.jsp?id=876512

  5. Civil rights: Freedom of expression http://news.bbc.co.uk/1/hi/technology/5020788.stm

  6. Civil rights: Freedom of expression

  7. Civil rights: Privacy • Who stores our data? • Where? • Who can access it? • What does this data say about us?

  8. Civil rights: Privacy • MPs expenses scandal triggered by info on FaceBook

  9. Ownership in a digital world • Who ‘owns’ this photo? • Who can delete it? • What is your impression of these people? • Would you employ them?

  10. Ownership in a digital world

  11. Cyber-crime “...the use of any computer network for crime” British Police • financial scams • computer hacking • downloading pornographic images from the internet • virus attacks • stalking by e-mail • creating websites that promote racial hatred • ..... and more.....

  12. Cyber-crime: a big problem • 90% of US companies detected computer security breaches in the previous year • 74% acknowledged financial losses as a result of the breaches of security • 273 organisations quantified their financial losses: the total bill came to $265m. • 25% of respondents detected penetration from outside their company • 79% detected employee abuse of the internet, for example downloading pornography or pirated software • 85% detected computer viruses http://news.bbc.co.uk/hi/english/static/in_depth/uk/2001/life_of_crime/cybercrime.stm

  13. Cyber-terrorism “Terrorist groups are increasingly using new information technology and the Internet to formulate plans, raise funds, spread propaganda, and engage in secure communications. Cyberterrorism-–meaning the use of cyber tools to shut down critical national infrastructures (such as energy, transportation, or government operations) for the purpose of coercing or intimidating a government or civilian population–-is clearly an emerging threat.” Dale L. Watson, Executive Assistant Director, Counterterrorism/Counterintelligence Division, FBI http://www2.fbi.gov/congress/congress02/watson020602.htm

  14. Cyber-bullying • What constitutes cyber-bullying?

  15. Information credibility • Data is not perfect • Whose fault was this accident?

  16. Information credibility http://www.sexoffendertrackerapp.com/ Publicly available app. • Sense of safety, or greater fear? • Is the information correct? • Does this app incite illegal vigilante activity? “Sex Offender Tracker App is a new mobile app that provides users with access to the location of registered sex offenders through the lens of augmented reality.” http://www.sexoffendertrackerapp.com/

  17. A Balancing Act Information credibility and authority in a Web2.0 world Ownership of online materials Right to Privacy Freedom of expression Cyber-crime, cyber-terrorism Cyber-bullying

  18. Assessment (1) In the practical, you will be randomly assigned to a group, and to one of the following topics: • Google StreetView (and similar applications) • Sensors to monitor elderly people in their homes • Activist websites – eg- environmental, political. Choose at least one specific example. • UK use of CCTV • Wikileaks Iraq War logs

  19. Assessment (2) • You will take part in an online debate about your allocated topic. • You will either put forward arguments about the advantages or disadvantages of the debate topic, depending on your group.

  20. Assessment (3): What to debate? • Arguments should cover relevant aspects of: • Civil rights in a  digital society • Ownership in a digital society • Cyber-crime/ cyber-terrorism/ cyber-bullying • Information credibility and authority in a Web 2.0 world

  21. Some rules.... • You should only argue your allocated side of the argument, even if you do not really agree with it. • You are expected to use grammatically correct English. No text-speak please. • Your arguments should be well thought through, and based in the research that you do on your topic. • Your arguments should only be about the topic. They should be courteous, even if you disagree strongly with someone else's opinion. • You will be marked both on your individual contribution to the debate, and on your support of other students who are taking the same stance as you (ie - positive or negative). Marks will be given for the number and content of your arguments.