Download presentation
Presentation is loading. Please wait.
Published byGeorgina Dean Modified over 9 years ago
1
SX1009 & SX1509 Rights in the Digital Society Wendy Moncur / Phil Marston Dept. of Computing Science
2
Rights in the Digital Society Freedom of expression and privacy: civil rights in a digital society Ownership in a digital world Cyber-crime, cyber-terrorism and cyber-bullying Information credibility and authority in a Web2.0 world Details of assessment
3
The extent of the Digital Society Recording everything, forgetting nothing Where? – Internet – Mobile phones – Cameras – Smart appliances – Buildings – Furniture – Vehicles – clothing –.......
4
The extent of the Digital Society “By year end 2012, physical sensors will create 20% of non-video internet traffic.” Gartner Group www.gartner.com/it/page.jsp?id=876512
5
Civil rights: Freedom of expression http://news.bbc.co.uk/1/hi/technology/5020788.stm
6
Civil rights: Freedom of expression
7
Civil rights: Privacy Who stores our data? Where? Who can access it? What does this data say about us?
8
Civil rights: Privacy MPs expenses scandal triggered by info on FaceBook
9
Ownership in a digital world Who ‘owns’ this photo? Who can delete it? What is your impression of these people? Would you employ them?
10
Ownership in a digital world
11
Cyber-crime financial scams computer hacking downloading pornographic images from the internet virus attacks stalking by e-mail creating websites that promote racial hatred..... and more..... “...the use of any computer network for crime” British Police
12
Cyber-crime: a big problem 90% of US companies detected computer security breaches in the previous year 74% acknowledged financial losses as a result of the breaches of security 273 organisations quantified their financial losses: the total bill came to $265m. 25% of respondents detected penetration from outside their company 79% detected employee abuse of the internet, for example downloading pornography or pirated software 85% detected computer viruses http://news.bbc.co.uk/hi/english/static/in_depth/uk/2001/life_of_crime/cybercrime.stm
13
Cyber-terrorism “Terrorist groups are increasingly using new information technology and the Internet to formulate plans, raise funds, spread propaganda, and engage in secure communications. Cyberterrorism-–meaning the use of cyber tools to shut down critical national infrastructures (such as energy, transportation, or government operations) for the purpose of coercing or intimidating a government or civilian population– -is clearly an emerging threat.” Dale L. Watson, Executive Assistant Director, Counterterrorism/Counterintelligence Division, FBI http://www2.fbi.gov/congress/congress02/watson020602.htm
14
Cyber-bullying What constitutes cyber-bullying?
15
Information credibility Data is not perfect Whose fault was this accident?
16
http://www.sexoffendertrackerapp.com/ Information credibility Publicly available app. Sense of safety, or greater fear? Is the information correct? Does this app incite illegal vigilante activity? “Sex Offender Tracker App is a new mobile app that provides users with access to the location of registered sex offenders through the lens of augmented reality.” http://www.sexoffendertrackerapp.com/
17
A Balancing Act Information credibility and authority in a Web2.0 world Freedom of expression Right to Privacy Ownership of online materials Cyber-crime, cyber-terrorism Cyber-bullying
18
Assessment (1) In the practical, you will be randomly assigned to a group, and to one of the following topics: A.Google StreetView (and similar applications) B.Sensors to monitor elderly people in their homes C.Activist websites – eg- environmental, political. Choose at least one specific example. D.UK use of CCTV E.Wikileaks Iraq War logs
19
Assessment (2) You will take part in an online debate about your allocated topic. You will either put forward arguments about the advantages or disadvantages of the debate topic, depending on your group.
20
Assessment (3): What to debate? Arguments should cover relevant aspects of: – Civil rights in a digital society – Ownership in a digital society – Cyber-crime/ cyber-terrorism/ cyber-bullying – Information credibility and authority in a Web 2.0 world
21
Some rules.... You should only argue your allocated side of the argument, even if you do not really agree with it. You are expected to use grammatically correct English. No text-speak please. Your arguments should be well thought through, and based in the research that you do on your topic. Your arguments should only be about the topic. They should be courteous, even if you disagree strongly with someone else's opinion. You will be marked both on your individual contribution to the debate, and on your support of other students who are taking the same stance as you (ie - positive or negative). Marks will be given for the number and content of your arguments.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.