Lemi Baruh & Levent Soysal Kadir Has University. Background & Problem  Rise of social media:  “Empowering” individuals to express themselves  Prerequisite:

Slides:



Advertisements
Similar presentations
Internet Bullying Social Networking Site Security Potential to Law Infringement Let us do something more.
Advertisements

Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Opening the black box: The social construction of search engines Astrid Mager HUMlab, Umeå University/ Sweden Wits School of Arts, University.
Political Culture and Political Socialization
Socialization and the Life Cycle
Social Context of Computing Chapter 7. Digital Divide  Technological inequalities  Impact of communication technologies  Radio  Television  Press.
The Ostrich effect: Social representations of Immigrants’ identity by native adolescents and by immigrants from Ethiopian and the former USSR Adi Mana.
Social Networking Team Q Sara Roggie Laura Augustin Brittany Edic Joel Patterson Daniela Lanni.
UTEPComputer Science Dept.1 University of Texas at El Paso Privacy in Statistical Databases Dr. Luc Longpré Computer Science Department Spring 2006.
Digital Footprints Where have you been? Where are you going?
Aristotle International Integrity™ Age and ID Verification Presentation to ISTTF September 23, 2008 Aristotle’s Integrity™ ISTTF Presentation 9/23/2008.
Computer Concepts 5th Edition Parsons/Oja Page 492 CHAPTER 10 File And Database Concepts Section A PARSONS/OJA Databases.
Ethnography. In ethnography, the researcher  Participates in people's daily lives for an extended period of time  Watches everyday happenings  Listens.
Personal Selling and the Marketing Concept
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Mutual Intercultural Relations in Plural Societies John W. Berry Queen’s University, Kingston, Canada National Research University, Higher School of Economics.
Understanding Families
Serbian Network of Knowledge. Context Statistical Information In the past 10 years, the number of highly educated people leaving Serbia has been approximately.
COMPUTING AT CARNEGIE MELLON SECTION I2 Privacy. Introduction Lauren Milisits.
Internal Auditing and Outsourcing
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
UNIT 2: CONTEXT. Chapter 3: Ethics & Social Responsibility.
Mapping Out New Policy Directions for Young Women in Korea Women's Worlds 2005 : 9th International Interdisciplinary Congress on Women Won, Mi-Hye Seoul.
Privacy and Security Risks in Higher Education
The Impact of Social Media on the Workplace Peter Harwood Chief Conciliator, Acas.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
School of Health and Social Care Changing constructions of informed consent: qualitative research & ICTs Mary Boulton, Health & Social Care Tina Miller,
SOCIAL INTERACTION & GROUPS, ORGANIZATIONS, BEAURACRACIES.
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
 BUS 430 Summer 2013 Dr. Rajiv Krishnan Kozhikode.
CHAPTER 6 NEW MEDIA – NEW THEORY?. DISCUSSING NEW MEDIA When is new theory needed? Fundamental changes in forms of social organization of the media technlogies.
1 Beyond Positive & Negative: The Reality of MXit Mania Ramon Thomas.
SOCIAL INTERACTION & GROUPS, ORGANIZATIONS, BEAURACRACIES.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Unit 3- Introduction to Computer Ethics
Attorney-Client Privilege Issues
KYLE GEORGE JULY 3 RD 2014 EDU-384. DO NOT SHARE ANY PERSONAL INFORMATION ONLINE: NAME, ADDRESS, CITY, STATE OR PHONE NUMBER SOCIAL SECURTIY NUMBER ANY.
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks S. Creese, M. Goldsmith, J. Nurse, E.
1 Activity 5.3 – Statement 2, page 135 Lise Auffray Ray Reid and Lee Purves.
Complying with Acceptable Use Policies.  AUP  Code of Conduct for Internet Use  Used by Organizations and Businesses  Outlines agreement in writing.
Cultural Displacement or Disaffection? Reassessing Young Citizens, New Media and Civic Engagement Brian D. Loader University of York, UK.
Opening the black box of search engines Astrid Mager HUMlab, Umeå University/ Sweden HUMlab, April 6, 2011.
3.2 Notes Crime Scene Reconstruction, Forensic Databases.
LECTURE III Social structure and social institutions.
Twelve Guiding Principles for the Regulation of Surveillance Camera Systems Presented by: Alastair Thomas Date: 23 rd October 2013.
Private Information Protection based on User-Trusted Program Institute of Systems and Information Engineering/KYUSHU Ken ’ ichi Takahashi.
1 Becoming more like friends: the significance of personal media in social networking processes Article is intended to be part of my thesis: Young people.
Copyright © 2013, 2010, 2007 Pearson Education, Inc. All Rights Reserved.
Learning Objectives 1.Recognise the shortcomings of social networking via mobile apps and hold a cautious attitude towards online social activities. 2.Equip.
1 The Subject Is Organizations I. What is a Formal Organization? Special type of secondary group designated to allow a relatively large number of people.
1/29/ Ask Matt - November 2011 – FERPA – Surveillance Video and Emergencies Matt Carver, J.D., Director of Legal Services tel fax.
Lecture 7 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS 1.
Web Databases Vast information provider. Offers information about jobs, photos, movies, weather, sporting events, etc. Shop for any product/service, buy/sell.
AUGMENTED REALITY Arthur Lockman, Ethan Prihar, Phil Baumann, Robert McKenna.
Protection of confidential sources Training workshop on media and freedom of expression law.
Quality Is in the Eye of the Beholder: Meeting Users ’ Requirements for Internet Quality of Service Anna Bouch, Allan Kuchinsky, Nina Bhatti HP Labs Technical.
Chapter 1 Sociology: An Introduction The Sociological Imagination Sociology, The Human Science From Social Thought to Social Science Major Sociological.
Chapter 11 Implementing Social Commerce Systems. Learning Objectives 1.Describe the major issues in the social commerce implementation landscape. 2.Discuss.
For more course tutorials visit COM 310 Entire Course COM 310 Week 1 Individual Assignment Communication Introduction Worksheet COM 310.
The Surveillance Society COM 327 February 5, 2013.
The Ethical Issues on Social Media
BRANDING AND NETWORKING
Chapter 9 Control, security and audit
Ambient Intelligence.
Common Ethical Considerations in Pharmaceutical Care Practice
Interactive media.
Presentation transcript:

Lemi Baruh & Levent Soysal Kadir Has University

Background & Problem  Rise of social media:  “Empowering” individuals to express themselves  Prerequisite: disclosure of intimate details  Discussions regarding threats to individual privacy  Control over identification information  Fraud & data security  Protection of underage users’ privacy (from sexual predators)  Institutions snooping around  Kansas University penalizes students after perusing Facebook photos of dorm parties.  Microsoft checks Facebook pages of potential employees. 2

Background & Problem  Most studies on privacy implications of social media adopted a piecemeal approach:  In isolation from each other and the broader context of a changing regime of surveillance  Purpose:  Investigate two related trends and their relationship to social media  Rise of personal, intimate and the subjective as a social currency  Evolving nature of automated surveillance 3

The New Individual: Image Laborer  Ulrich Beck’s Reflexive Modernity:  The self became the primary agent of meaning.  Objective, institution driven information loses credence as the currency of information derived from subjective & personal experience increases.  Phantasmagoric Workplace*  The individual is responsible for maintaining his/her own image constantly.  Having a unique image, being recognized is a crucial prerequisite of success in contemporary capitalism 5 “Professionals in pursuit of image” *Hearn, Alison 'John, a 20-year old Boston native with a great sense of humour': on the spectacularization of the 'self' and the incorporation of identity in the age of reality television. International Journal of Media and Cultural Politics 2 (2):

5 4 The New Individual: Image Laborer

6 The New Individual: Image 6

Modular Identity of the New Individual  Introversive Publicity  Individuals with introversive personality are characterized as being introspective.  Self expression of subjective experience in social media, despite its public nature, is introspective.  It is part of the image labor, and hence it is an act of publicity.  This does not mean it is intended to mislead  It is modular  This does not mean it is incoherent.  Each component added helps create and communicate a unique identity.  The introversive is temporary, incomplete and fleeting 7

Self Disclosure & Privacy Rights  In an environment of extensive surveillance, self-disclosure is seen as the only viable way for individuals to actively participate in the creation of images about themselves*  Example: Dr. Hasan Elahi ( 9 *Groombridge, N. (2002). Crime control or crime culture TV?. Surveillance and Society, 1, *Koskela, H. (2004). Webcams, TV shows and mobile phones: Empowering exhibitionism. Surveillance & Society, 2(2/3),

Contemporary Surveillance  Data intensive. Social and other forms of interactive media provide an increasingly larger share of data.  Data mining – algorithm based detection of deviations from the base statistic*  Three innocuous acts combined, who knows if they are a threat?  The components of the modular self are taken out of their context. 10 *Andrejevic, M. (2007). iSpy: Surveillance and Power in the Interactive Era. Lawrence: University Press of Kansas

From Panopticon to… 11  The panopticon’s disciplinary function is partly dependent on uncertainty  “Chilling effect”

Kafkaesque Surveillance* 12 *Solove, D. J. (2001). Privacy and power: Computer databases and metaphors for information privacy. Stanford Law Review, 53,

Kafkaesque Surveillance*  Permanency of data  Aura of Objectivity: Rationalization of surveillance through automated mining  “...figure of the vicious tyrant is replaced by that of the indifferent bureaucrat.”**  Automated data-mining dehumanizes and consequently “removes human bias”.  The automated surveillant is indifferent and hence its inferences are “objective”  Reliance on statistical evidence adds to this aura of objectivity 15 *Solove, D. J. (2001). Privacy and power: Computer databases and metaphors for information privacy. Stanford Law Review, 53, **Mark Andrejevic. iSpy: Surveillance and Power in the Interactive Era. Lawrence: University Press of Kansas, 2007