Seminar Synopsis Ryan Schlimmer October 6, 2005

Slides:



Advertisements
Similar presentations
Offender Databases and Familial Searches: Social, Ethical, and Legal Issues Mary Terrell White, PhD Department of Community Health Boonshoft School of.
Advertisements

Surveillance and Social Control - 2 How monitored are we? Is Britain a Big Brother society?
Developing a Questionnaire. Goals Discuss asking the right questions in the right way as part of an epidemiologic study. Review the steps for creating.
3 Ethics and Privacy.
LEARNING PERSONALITY, MORALITY, AND EMOTIONS Sociology – Chapter 3 – Mrs. Madison.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Objective 9/23/15 Today we will be completing our research methods unit & begin reviewing for the upcoming unit assessment 9/25. Agenda: -Turn in all homework.
Forensic Victimology 2nd Edition Chapter Six: Victim Lifestyle Exposure.
Formulating the Research Design
Unit one CONCEPT OF HEALTH IN COMMUNITY HEALTH NURSING Lecture (1) 1.
Using Race to Make Sense of Athletic Performance
Dr Eleanor Bantry White University College Cork, Ireland
Organizational Culture
Judicial Training on Data Protection and Privacy Rights
Qualitative Research Methodology
By : Miss Mandeep Kaur Assistant Prof.
J-SUP Municipal Court Representation
MGMT 452 Corporate Social Responsibility
Equality and Human Rights Exchange Network
Classroom Assessment A Practical Guide for Educators by Craig A
Interpretation and Perception
teacher-centered supervision
Equality and diversity – session 2
Chapter 4 Attitudes.
Aaker, Kumar, Day Ninth Edition Instructor’s Presentation Slides
RESEARCH METHODS Lecture 39
EDU704 – Assessment and Evaluation
Sport Studies Seminar: QUANTITATIVE APPROACHES
Research & Writing in CJ
INVESTIGATION PROCESS AND TECHNIQUE
Perspective on Consumer Behavior Chapter 4
Chapter 4 Probation: How Most Offenders Are Punished
Perception “is” Reality
ENGL 219 Innovative Education--snaptutorial.com
Literature Response Papers
Chapter 11: Stereotyping, Prejudice, and Discrimination
Putting Knowledge into Practice
Planning a Learning Unit
Perception “is” Reality
A Gift of Fire Third edition Sara Baase
Youngwummin: Ethics and Data Collection Methods
Privacy=Secret CHIHUA WANG.
Counsel a Subordinate LP 150-IMT-7003
Ch. 2: Basic Marketing Concepts
Obj. 2.2 Discuss considerations involved before, during and after an interview To view this presentation, first, turn up your volume and second, launch.
Target Setting for Student Progress
A Gift of Fire Third edition Sara Baase
Quantitative vs. Qualitative Research Method Issues
SIS20510 Certificate II in Sport Coaching
Research Question 4 How can the most vulnerable children be reached/included by data collection systems and instruments?
Learn About Children Chapter 1.
‘Be it resolved that Canada should practice profiling at the border given the reduction in border costs and the increase in security’. Sean Aitken.
The Decision Making Model
Types of Research in Sociology
Review Session: Chapter 2.
Presented to <name>
Chapter 13 MOTIVATION AND EMOTION
Family Functioning and Social Life Regulation among Adolescents
An Introduction to Correlational Research
How To conduct a thesis 1- Define the problem
Surveillance Learning Objective:
Starter: Self-Report Describe the words on the cards without using the words. Note any terms of which you are unsure.
How To conduct a thesis 1- Define the problem
Curriculum and Standards
Human Subjects Research
Inclusion and Ethics Professor Simon Rogerson
Gardner’s Research on Cognition
Communication Ethics 1 1.
IT and Society Week 2: Privacy.
Presentation transcript:

Seminar Synopsis Ryan Schlimmer October 6, 2005

Observing bodies. Camera surveillance and the significance of the body Lynsey Dubbeld Ethics and Information Technology Volume 5, Issue 3 Pages 151 - 162 September 2003

General Outline Thesis Conducted studies Asymmetrical relationship Ethical problems Effects on the innocent Summary Conclusion

Thesis Ethical and social issues arise from the use of Closed-Circuit Televisions in surveillance

Studies Past studies This paper Examine the effectiveness in public and privacy protections Fail at making sure ethical issues do not arise while during effectiveness This paper Focuses on the roles the body plays

Changes in Surveillance From direct observation into virtual through new technologies Research on effectiveness vs. privacy in public Information and Communication Technologies and ethical issues

The Paradox Increased by new technologies Records our bodies, actions, and behavior Turned into virtual representations The body is the focus of attention while also being lost through virtual representations

Ethical Examples Categorization and classification Physical characteristics Behavioral changes

Conducted Studies Disproportionate targeting Norris and Armstrong British town centre CCTV schemes Categorized based on the standards of the operators Normative categories Moral convictions Operation based on assessment, categorization, and evaluation of the body Flagged by certain actions or bodily characteristics

Conducted Studies Cont. Categories: youth, known and potential shoplifters, and homeless Example: close monitoring of young black men for long periods of time Ways to approach cameras to get different amounts of attention Attention with provoking behavior Can appear as a passive subject Example: resistance of observation

Asymmetrical Relationship Relationship between the watchers and the watched Electronic monitoring is not neutral Embodiment Visibility Knowledge

Embodiment Operators are beyond scrutiny due to physical separation Operators are physically involved Examples: camera monitoring, deployment, profile setup Observed people only play a disembodied role

Visibility The observed have little means to find out who is watching them Operators are under different scrutiny compared to the observed population Operators are not exposed and can not be watched back

Knowledge People may not know if they are even being watched Operators have technologies at their disposal Organizations posses more information, instruments, and techniques for processing

Effects on People Positive Negative Feeling of protection Censoring of actions and illegal behavior Negative Intrusion of life Feelings related to self-image, self-determination, self-respect, freedom, etc. Shapes individuals not doing wrong Brief and concise behavior

Risk of Democratic Rights Racial discrimination Studies found that ethnicity was one of the major criteria groups used Presumption of innocence Scrutinized and judged based on bodily appearance Unreasonable search A “fishing expedition,” intruding upon peoples lives to catch the few minor offenders

Privacy and Surveillance Stanley I. Benn Argued that people deserve consideration in their life plans and choices Jeff Johnson “immunity from the judgment of others.” CCTV surveillance Categorization of people and therefore an intrusion of privacy

Effects Ethnicity and other discriminatory factors used to categorize people Flagged without the ability to defend Destruction of anonymities in public Haggerty and Ericson “The disappearance of disappearance.” Example: Tampa, Florida football game

Privacy Protection Different ways to protect the privacy of the observed Protect personal information Be left alone

Summary Positive and negative effects The person is lost Categorizing of bodily characteristics Discrimination based on appearance Observed by elements of the operator Intrusion upon lives

Possible Solution Explicitly define what privacy is in relation to Close-Circuit television surveillance

Questions?