COM 354 Week 2.1 New Media Ethics. Twitter Updates What accounts to follow? Stories of the week?

Slides:



Advertisements
Similar presentations
On-line media tools for strategic communications purposes When using media tools for communication we try to use the latest technologies such us blogging,
Advertisements

The Internet and the Web
 A significant 90% of marketers indicate that social media is important for their business  Video marketing on the rise: A significant 77% of marketers.
Our Digital World Second Edition
Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
So much alike! What is Personal Branding? 1. Make a clear, specific, and consistent image of yourself on the internet that reflects who YOU are. 2. Make.
NHnetWORKS December 14,  Facebook is a global Social Networking website that is operated and privately owned by Facebook, Inc.  Users can add.
Google Docs is a free, web-based office suite offered by Google within its Google Drive service. It was formerly a storage service as well, but has since.
Online Privacy and Codes of Conduct Peter Fleischer Global Privacy Counsel my personal blog:
Ethical Issues concerning Internet Privacy 1.  Personal information on the Internet has become a hot commodity because it can be collected, exchanged,
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Web 2.0: Concepts and Applications 5 Connecting People.
Web 2.0: Concepts and Applications 5 Connecting People.
Marketing Communications Services Hayward, WI.
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Google Account Basics: Getting Started with free Google applications.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
How To Protect Your Privacy and Avoid Identity Theft Online.
© 2012 Microsoft Corporation. All rights reserved. Amazing apps. Windows 8 comes with built-in apps for the things you do most to help get your favorite.
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
Skills: none Concepts: information we give up voluntarily, information we reveal as a by-product of using the Internet, use of information “signals,” data.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
PRIVACY BOOTCAMP YpJU.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Why I LIKE the Facebook Database… Sharon Viente May 2010.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Ian Reeves. A few facebook facts  1bn+ active global users  250m+ mobile users  31m UK users  130 friends on average per user  Average user creates.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
The Internet CSC September 30, History of the Internet Developed for secure military communications Evolved from Advanced Research Projects.
Getting Started Copyright 2010 Peoplemovers.com, All rights reserved.
Jeopardy $100 Are YOU Caught In The Web? Luke, this is the media section... Specialized Reserach Everything from your home at your office Tea And Biscuit.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
Internet Privacy: What’s Yours and What Never Was 14 April 2011 Ms. Foster and Ms. McCabe Street Law.
COM 354 New Media Ethics Robert Bodle IR11 - GöteborgGöteborg.
Privacy and Data Mining What Do “They” Know About You?
Facebook for Beginners One Session Class. What will you learn today? What can you do on Facebook? Creating a profile Privacy Connecting with friends Sending.
Social Media Roundup Google+: The basics. Social Media RoundupAgenda This week’s Social Media Roundup examines Google+ and its impact on the social media.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
and Internet Explorer.  The transmission of messages and files via a computer network  Messages can consist of simple text or can contain attachments,
COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Chapter 8 Data Privacy. Data Collection IP addresses Visited urls Anonymized? If so, supposed to prevent personal identification Europe considers IP address.
Digital & Internet Safety. Understanding your personal data Defining “Big Data” Protecting your data, computer & devices Avoiding identity theft.
AN INTRODUCTION TO FACEBOOK. Learning Objectives A brief introduction to the social networking site Facebook. Instructions to create an account. How to.
CS 115: COMPUTING FOR THE SOCIO-TECHNO WEB TECHNOLOGIES FOR PRIVATE (AND NOT-SO-PRIVATE) COMMUNICATIONS.
Facebook privacy policy
Transforming PowerPoints with Google Docs
Internet Identity, Safety, & Security
Class 2 - Transitional Internet Basics
The Internet Industry Week Two.
MICROSOFT OUTLOOK and Outlook service Provider
Latest Updates on BlackHawk Mines Music : Privacy Policy
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
HOW DO I KEEP MY COMPUTER SAFE?
ICT Communications Lesson 3: Internet Life and Privacy
Ethical and Social Issues in Information Systems
Privacy and Data Mining
The Rapid Loss of Privacy in the Era of the Internet
Personal Privacy and the Public Internet
Presentation transcript:

COM 354 Week 2.1 New Media Ethics

Twitter Updates What accounts to follow? Stories of the week?

OUTLINE Privacy in the digital age Privacy and democratic freedom Case studies (Google, Facebook) Privacy and ethics (discussion) Small group activity

Privacy in the digital age Surveillance capacities have grown exponentially Increased ability for companies to sort, sift, profile, categorize, classify And collect = big data

Privacy in the digital age automated surveillance not embodied persons watching each other less obvious and overt more systematic and subtle factual fragments abstracted from individuals yet tied to individual identities...

Privacy in the digital age Digital dossiers filled w/ Actions , cell phone, movements, Web search, browser history, credit cards, ATMs, grocery shopping, libraries, health visits, Information name, address, phone number, age, income, location, types of credit cards, vehicles, browsing and purchasing habits, entertainment tastes, health status

Privacy in the digital age implications Social control, compliance Discrimination Targeting (“soft cage”) Identify theft, fraud Loss of political freedom

Privacy in general Three views of privacy (Tavani) 1. Accessibility – let alone, free from intrusion in one's physical space 2. Decisional – freedom from interference in one's choices and decisions 3. Informational – control over flow of personal information

Privacy in general Intrinsic and extrinsic goods Intrinsic good - valuable in and of itself Extrinsic good – valuable as a means for another good

Privacy and political freedom Extrinsic goods Anonymity – freedom from interference in holding political beliefs - “A shield from the tyranny of the majority” Autonomy – freedom from interference in -developing opinions- ability to make decisions based on one’s own opinions, beliefs (free of coercion)

Privacy and political freedom Extrinsic goods Anonymity – freedom from interference in holding political beliefs - “A shield from the tyranny of the majority” Autonomy – freedom from interference in -developing opinions- ability to make decisions based on one’s own opinions, beliefs (free of coercion)

Privacy: a Comparative View EU - deontologicalUS - utilitarian statutory protectionsstatutory protections, privacy policies enforceable by lawmostly self-regulated and unenforceable Responsibility placed on governments and industry Responsibility placed largely on the user

Case Study – Google Search engines under scrutiny privacy watchdog groups brought increased scrutiny to leading search engine practices: cookie life server logs targeted ads Google declared worst in protecting user privacy!

Case Study – Google yourself (now) What Google knows about us Search data Clickstream data Different media sources Cloud computing services

Google and user search data Server logs: – 25/Mar/ :15:32 – – Firefox 1.07; Windows NT 5.1 – ce2123e969 Internet Protocol addressInternet Protocol address (unique ID, identifies the computer) – xxx (Google redacts the fourth octet after 9 months) Date and time of query Requested page (including term searched) Browser and operating system used Persistent and unique cookie ID

Google also records Clickstream data What search results and ad links a user clicks Records different kinds of data searched Images News stories Videos (Youtube) Blog posts Book Search

Cloud Computing and Google Google combines user search data with info collected in the Google cloud! A suite of over 45 products and services: Google Mail (stores ) Google Calendar (organizes events) Google Docs (documents, spreadsheets, and presentations) Google Mobile (Search, Maps, Gmail, YouTube and other Google products on mobile device) Account-based used to track user activity across products and services

Case Study - Google Philosophical considerations What kind of privacy does Google violate? (accessibility, decisional, informational)

Case Study - Google Framing a moral question Is this monitoring of personal information justified? What kind of ethical argument are you offering? (utilitarian, deontological,etc) Which argument is most persuasive?

Case Study - Facebook What does Facebook know? Social graph – sum total of connections, profile data, wall posts, preferences, recommendations

Case Study - Facebook 'blow forward' or 'here now, privacy later' Social games Beacon December changes (your networks and friends, everyone) Open Graph (like don't take it personal!)

Case Study - Facebook Philosophical considerations Is this monitoring of personal information justified? What kind of ethical argument are you offering? (utilitarian, deontological,etc) Which argument is most persuasive?

Case Study - Government Surveillance for national security USA Patriot Act

Case Study - Government Philosophical considerations Is this surveillance justified? What kind of ethical argument are you offering? (utilitarian, deontological,etc) What about political freedom?

HWK (Due Tuesday 1/29) Journal #2 (on Wiki) Read Chapter 3