Citizenship & Technology are you happy that Big Brother is watching you? You decide….. Kevin Doyle Chris Wallace Praminda Caleb-Solly Delia FairburnBig.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Surveillance and Social Control - 2 How monitored are we? Is Britain a Big Brother society?
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Development of a Surveillance Society By: Tyler Madden (Comp 1631, Winter 2011)
CCTV TECHNOLOGY AND PRIVACY CONCERNS Susan F. Brinkley, Ph.D. University of Tampa.
Big Brother Might be Watching. Agenda: US Patriot Act Copyright Infringement Social Media Packets.
Hard Technology of Crime Prevention Professor Byrne Lecture: October 7 th, 2009.
Closed Circuit Television - CCTV. In your jotter put the heading “CCTV”. Write down the full name of CCTV CCTV = Closed Circuit Television. Write this.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
Department of Computer Science City College of New York City College of New York Spring 2006 Copyright © 2006 by Abbe Mowshowitz CSc 375 SOCIAL ISSUES.
Face Recognition and implications on society By Zubin Singh ICS 131.
3 Ethics and Privacy.
Facial Recognition Facial recognition software - based on the ability to recognize a face and then measure the various features of the face. Each human.
Big Brother is watching.  1. Would you ever consider letting a TV crew come into your life to document everything? Why or why not?  Big Brother, Kardashians,
Technology advancements technology has greatly changed the core of photography. Going back past ten years and photography was still analogue based by reliant.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Citizenship We belong to many communities: We belong to many communities:  Neighborhood  (Zhangjiang)  City (Shanghai)  Country (China) Citizenship.
Standard Grade Modern Studies Enquiry Skills - Investigating Questions -
Z514: Social Aspects of IT Week 13.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
The Social Effect of Information System
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
Hardware & Software Developments Freedom of Speech & Movement.
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
Privacy Scenarios Set 1 Class Work.
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.
National Government I will: Discuss the benefits of living in a democratic society and the importance of voting. Know how a government is elected and run.
Where our country is going PUBLIC POLICY. Public policy What is public policy? The things our country focuses on. These decisions are made by the government.
Data and You. Computer Crime Less Cash money Credit cards types credit, debit, cash cards, and checks ATMs.
Privacy: Do We Need It? Mike Gurski Senior Policy & Technology Advisor Information & Privacy Commission, Ontario Canada JetNet September 25, 2001 Ottawa.
SX1009 & SX1509 Rights in the Digital Society Wendy Moncur / Phil Marston Dept. of Computing Science.
Governments of Europe.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
China All Seeing Eye. The Beginning Since 2006 over 200,000 cameras installed in a single Chinese city, Shenzhen. Cameras appear in public places sometimes.
Welcome to Week 3 in the Mrs. DeRita’s computer lab!
6 Ethics and Privacy.
* Read the “Types of Government” packet with your partner or group. Be sure to read the section titled “Which is the best form of government?” * When you.
AS/A Level ICT Rising year 12 lesson July ICT is a dynamic subject ICT is always evolving. As technology develops, there are new possibilities for.
CCTV By: Alifya, Bianka, Jasmijn, Joudy. What is a CCTV? A CCTV is a Closed-Circuit Television. Its is a camera that records specific actions of people.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
6 Ethics and Privacy.
E-Safety. A great place… Image by: Shutterstock/nasirkhan As we have discussed over the last few lessons, the Internet is a great tool for sharing information,
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Mohammad Dastbaz, Eddie Halpin, Steve Wright Chapter 10 - Emerging Technologies and the Human Rights Challenge.
Youth, Crime and Media MEP Surveillance, CCTV and media.
APPLICATION TO SPECIFIC SCENARIOS An Overview of Strand 2.
The Impact of Communication Technology CMT 11 Fundamentals.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 11 Democracy and the Internet Privacy.
Julie Latham Digital Citizenship: An Informational Guide.
Impact of ICT On society. This presentation covers How the world of ICT has impacted on society.
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Chapter 16 – Technological Development Technological Development Employees, managers and organisations, as well as the population in general, take for.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Over the past 40 years, IT has influenced and really changed the way we live out lives. It’s fair to say that we love our gadgets; with most of us owning.
Individual Activity: After reading the article, “Facial Recognition Technology” answer the questions on the assigned worksheet.
Types of Information Ms Bentil1. Types of Information  There are basically five (5) types of information: a) Public Domain Information b)Private Information.
AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM
Active Citizens How Governments are formed and laws are made in Wales.
Foreign policy is the conduct of one nation towards another nation Domestic policy is the government’s actions within the borders of its own country.
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
Viseum iVOS FaceRec HOW IT WORKS
Do Now: Complete the War, Civil Liberties, and Security Opinion Poll.
Targeted surveillance
Chapter 3 Sections 3 and 4 3- Duties and Responsibilities of American Citizens 4- Forms of Government.
Viseum UK iVOS FaceRec Viseum UK iVOS FaceRec
Moral, legal and ethical Issues
Presentation transcript:

Citizenship & Technology are you happy that Big Brother is watching you? You decide….. Kevin Doyle Chris Wallace Praminda Caleb-Solly Delia FairburnBig Brother

Definitions of Citizenship: A person is normally a citizen of the country in which they are born (and have not renounced or lost citizenship of) or naturalized and to which that person owes allegiance and by which he or she is entitled to be protected. Citizenship is membership in a political community (originally a city but now usually a state), and carries with it rights to political participation; a person having such membership is a citizen.... en.wikipedia.org/wiki/Citizenship en.wikipedia.org/wiki/Citizenship

Some IS related Citizen Concerns Healthcare: EPR, Medical Informatics:- Choose and Book Education: Digital Literacy, CAL, Web based IS Social Welfare: CSA, Tax Credits Law and Order: PITO, NAFIS, Electronic Surveillance Employment: Globalization, New Working Practices, Outsourcing, Foreign Policy: 'War Against Terror': Propaganda, Software, Electronic Warfare

Question Where do you get information from in order to have an informed opinion about these topics/issues/dilemmas?

Where do we get our information from? Don't bother First Hand Experience Newspapers & Magazines Radio & Television: News/Current Affairs/Special Features/Satirical Reviews Academic & Professional Journals The Web: Websites, eJournals, electronic databases Each other: Conversations, Chatrooms, Blogs, Wikis There are issues of truthfulness, bias, completeness and responsibility for getting it right e.g. dontdatehimgirl.com dontdatehimgirl.com

Electronic Surveillance “Big Brother is watching: Not in 1984 but in 2002” Source: html html

Entitlement to Protection: Big Brother will look after us Police and security and intelligence services are increasingly turning toward video surveillance technology as the answer to terrorist threats and the public's demand for security. There has been a surge in the number of surveillance cameras in Britain in the last couple of years (now one camera for every twelve people). In most cases, cameras are hidden from view or disguised so as to be undetected by those being filmed. Many are privately operated Some cameras can swivel to locate you and zoom in for a closer view.

You are watched at work

You are watched in public places “This image is a still taken from a shopping centre CCTV camera in It was released by the shopping centre to the police and the public in the hunt for Jamie Bulger's killers. It is contended to be in the public domain.” Jamie Bulger Source: r-cctv-jpg r-cctv-jpg

Sometimes you set out to be watched Picture: Jess Hurd/ reportdigital.co.uk reportdigital.co.uk Source:

You are watched in your car Britain is about to enhance its reputation as the surveillance capital of the West with a global first: recording as many as 50 million car movements a day and storing details in a vast databank with date, time, and location stamps. A network of thousands of cameras harnessed to software will read car license plates, check them against a central database, and alert police to suspected criminals or terrorists. The system will also check that the vehicle is properly taxed, insured and MOT’d as well as helping to catch drivers using mobile phones or failing to wear a seat belt. In regional trial runs, the number of arrests per officer increased by a factor of ten. Source: CSM>World>Europe January

It’s not just number plates that can be recognized. The Police Information Technology Organisation aims to create a national database of still and video facial images, tattoos, and other imagery linked to criminal biographical information. They are also looking into how they can incorporate facial recognition software into the mugshot database for the police forces of England, Scotland, and Wales. Source: (Jan. 16, 2006) Source: Information Technology Organisation The British national identity card is to be introduced in 2008, under the provisions of the Identity Cards Act 2006 Source: national identity card

Do you want to be labelled, tagged and recorded? The organizations and individuals cited by Privacy International as doing the most to erode personal privacy in 2004 included MP Margaret Hodge, the NHS and the Office of National Statistics.doing the most to erode personal privacy

Surveillance at School In Santee, California, college officials have instituted an extensive system of camera monitors that can track over 2000 students as they move around the college. They have recently added face recognition capabilities to the system so that their computer systems can automatically detect when people are in places they are not authorized to be by reference to the student database.

Have Your Say Imagine that your school/college is considering the adoption of a similar system, in order to improve the safety and security of students, staff and university property. What do you think about the idea? If you support the use of surveillance systems in schools and colleges – raise your hand.

How to text your views to the SMS Whiteboard Text SAY followed by a space and your view The WhiteboardWhiteboard The PollPoll

Some Food for Thought As citizens of a modern, democratic first world information economy our movements and activities are watched, recorded and catalogued more closely than in most totalitarian states. We also have the potential, through the tools and technologies of electronic democracy to participate in politics and to influence the decisions that affect us in any and every aspect of our everyday lives. Technology is useful, but we must not lose sight of the ethical issues in the context of its use.

Further Information If you are interested in studying Information Systems visit CEMS StudentsOnline Information Systems CEMS StudentsOnline