Big Brother is watching.  1. Would you ever consider letting a TV crew come into your life to document everything? Why or why not?  Big Brother, Kardashians,

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Development of a Surveillance Society By: Tyler Madden (Comp 1631, Winter 2011)
BUSINESSES AND THEIR EMPLOYEES 11 April. Employers survey, track, or record all or certain aspects of employee’s behavior or performance Workplace Monitoring.
COMP6005 An Introduction to Computing An Introduction to Computing Privacy and Ethical Issues.
Can I See You Now?. What would it take to know everything? Today’s possibility - Pizza demoPizza demo Tomorrow’s - A life recorder? 200 Gb/year for audio,
Working group discussion 1 Cyber Risk Security, Privacy ?
3 Ethics and Privacy.
© 2005 by Nelson, a division of Thomson Canada Limited. 1 Business Ethics and Technology Search the Web If you are interested in ethics conversations.
1 Business Ethics and Technology Chapter 9 Professor Craig Diamond BA 385 October 28, 2009.
8.02 Discuss considerations for safety and security.
Standard 29 CFR Part Access to Employee Exposure and Medical Records Training.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
The Social Effect of Information System
Similarities of surveillance tactics in 1984 compared to the 21 st century. By: Insia Raza ENG 4UI Mrs.Galasso.
Review. Definition Big Brother is the term used for a person or organization exercising total control over people’s lives.
BIG BROTHER Is Watching You
© 2005 by Nelson, a division of Thomson Canada Limited. 1 Business Ethics and Technology Search the Web If you are interested in ethics conversations.
 Create a chart of three columns  In column one, list the freedoms you enjoy both at home and in the community.  In column two, list the freedoms you.
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.
Business and Society: Ethics and Stakeholder Management, 5E Carroll & Buchholtz Copyright ©2003 by South-Western, a division of Thomson Learning. All.
Electronic Health Records Dimitar Hristovski, Ph.D. Institute of Biomedical Informatics.
1 Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003 PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING CD5590.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Private and Personal Information Common Sense Unit l – Lesson 2 (Cross-Curricular Categories) Privacy and Security Information Literacy.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Miriam’s Vision: A Response to the 2005 London Bombings Citizenship Different Needs, Common Ground Human Rights & Surveillance.
China All Seeing Eye. The Beginning Since 2006 over 200,000 cameras installed in a single Chinese city, Shenzhen. Cameras appear in public places sometimes.
6 Ethics and Privacy.
A PowerPoint Presentation by Helen Chelan Johnson.
MONITORING ETHICS KABIRU AHMED. 44% of businesses monitor outgoing employee .
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
AS/A Level ICT Rising year 12 lesson July ICT is a dynamic subject ICT is always evolving. As technology develops, there are new possibilities for.
COM 354 Week 2.1 New Media Ethics. Twitter Updates What accounts to follow? Stories of the week?
Surveillance Jeff Saunders Dr. Garrison CSCI 101 Thurs. 12:30.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
6 Ethics and Privacy.
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
What is Privacy?. 3 Types of Privacy 1.Accessibility Privacy 2.Decisional Privacy 3.Informational Privacy.
Surveillance and More Porsha J. Rice. Surveillance Cameras Nowadays surveillance cameras are virtually everywhere and in places such as: Schools Stores.
BETTER SAFE THAN SORRY Unit 6. Which item do you think is the most/least useful? How often do you/your parents use these items? What other pieces of equipment.
The Before….. And After Story The first prototype of magnetic stripe card created by IBM in the late 1960s Today’s Cards.
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
. There are 2 ways in which Cable Ties can use the technicians smartphone to track their current location. 1. GPS – uses satellites to triangulate the.
Monitoring By Krystal Thousand. What is Monitoring in the Workplace? record and review their employees' communications and activities on the job, including.
AUGMENTED REALITY Arthur Lockman, Ethan Prihar, Phil Baumann, Robert McKenna.
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
Personal Privacy: Limited Disclosure using Cryptographic Techniques Mark Shaneck Karthikeyan Mahadevan SCLab.
Step Forward Step Back 1.Those who would exchange freedom for security deserve neither. 2.To assure our country’s freedom, the government should be able.
Managing Technology Chapter 10 Families For Today.
Managing False Information NiiBen C. A. Ayivorh AML/CFT Consultant Nii-Int’l L.L.C.
RACIAL DISPARITIES IN THE LAW Created by: Cathi, Nicole, Eunice and Jeanell.
SURVEILLE Prof. Tom Sorell (Dr Katerina Hadjimatheou)
Advantage of Security Systems.  Today security camera is a much needed thing to protect us and to preserve valuable properties.  Along with the home.
Interactive TV 1. Interactive Television A.K.A: Two-Way-TV Allows viewers to take part. A new way to view Television. A big part of Digital TV 2.
Social and environmental impact
MGMT 452 Corporate Social Responsibility
To spy or not to spy; that is the question
Unit 2 – Data Collection & Problem Solving
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Unit 2 – Data Collection & Problem Solving
Lecture III Surveillance Society Powerpoint by Miyase Christensen
Do Now: Complete the War, Civil Liberties, and Security Opinion Poll.
Chapter 10: Privacy, Security, and Ethics
Ubiquitous Computing Go to the O drive, ICT, BTEC, BTEC 2013, Unit 1, LA A, Ubiquitous Computing.
Risk Management and Human Relations
Big Brother Camera’s Brittany Todd.
8.02 Discuss considerations for safety and security.
Presentation transcript:

Big Brother is watching

 1. Would you ever consider letting a TV crew come into your life to document everything? Why or why not?  Big Brother, Kardashians, The Real World,  These shows film everything from births, addiction, divorce, plastic surgery, etc.  How – if at all - do these shows feed our desire for news / entertainment?  Where do / would you draw the line regarding your privacy?

ORWELL’S 1984  Telescreens are everywhere, except where the Proles (lower class) live & work  Workplace monitoring – you can’t look at a note or document for too long  Thought Police interpret people’s actions & ideas  ch?v=Z4rBDUJTnNU 1984 movie trailor ch?v=Z4rBDUJTnNU TODAY  FBI surveillance  Corporations collect data, Internet privacy issues  Drug testing at the workplace or school  Employer’s monitoring employees’ s, phone calls, or facial expressions & voice intonations  Spies 2. How have ideas about privacy changed over time?

 3. In your opinion, what is the most ethically concerning privacy-related issue in today’s society? Pick one & explain why  Optional issues to consider: ▪ Stalker websites ▪ Cookies on websites ▪ Racial profiling ▪ Search & seizure ▪ Identity theft

 4. Rate your support for the following 10 actions on a scale of 1 – 5 (1 meaning ‘completely unacceptable’ & 5 meaning ‘more than acceptable’)  A. A storewide security camera videotapes you shopping  B. You must walk through a metal detector to enter a court house  C. Your luggage is scanned using X-ray equipment before you board a plane  D. Secret, hidden cameras record your actions in public spaces, including traffic intersections & public parks

 E. A telephone trace provides information about your location to a 911 operator in an emergency  F. An ID badge that you swipe informs your school as to when you enter/leave campus  G. An ID card carried on your body allows medical personnel to access your medical records  H. A microchip implanted under your skin allows your school to track your movements  I. Microchips implanted under former prison inmates’ skins allows parole officers to monitor their actions

 5. Discuss this new “911” Technology   6. Discuss the Medical Microchip technology 

 7. Should the gov’t, schools, a hospital, or any other institution be able to collect & record electronic data on individuals without their express permission? Why or why not? Are there any exceptions? Explain.  8. Would you support an implanted chip, ID badge or some other form of surveillance for school use? Explain.  How might these tools be designed to help students/parents/teachers/administrators?  What kinds of useful information could it be engineered to carry?  Could students modify the cards?  What responsibility – if any – do schools have if students are abducted from school property?  (school tracking)