Professional Documents
Culture Documents
Communication and
information technologies (II)
2
1. Introduction [1]
• Surveillance Society Debate: What are your reactions
when you see the signs below?
5
2. Defining privacy, surveillance and
the surveillance society [3]
• privacy as self-determination: we might consider some of our
behavior private in that it is ‘up to us’ and no business of others
(where those ‘others’ may range from the state to our
employers);
• privacy as freedom to be ‘left alone’, to go about our business
6
2. Defining privacy, surveillance and
the surveillance society [4]
• These various forms of privacy can potentially clash with a number
of values. Each has to be weighed against one or more of the
following:
• accountability for personal or official actions;
• the need for crime prevention and detection and for security
generally: our desire to be able to engage in our personal affairs
11
3. Opportunities for surveillance [1]
• This section is concerned with identifying the opportunities
for surveillance offered by modern technology through its
devices and services.
• The introduction of a video surveillance system using closed
circuit television (CCTV) in 1961 at a London train station
12
3. Opportunities for surveillance [2]
• There are three features of this form of surveillance that create a
series of social, political and technical dilemmas:
• First, it is citizens in public spaces who are the objects of surveillance.
This threatens to destroy the ‘public privacy’ previously enjoyed by
anonymous citizens in a public space.
• Second, citizens are in no position to agree to or reject surveillance.
15
3. Opportunities for surveillance [5]
• Many modern surveillance systems can instead be thought of
as ‘public webcams’.
• Although most surveillance cameras do not broadcast to the
Web, and are therefore not webcams as such, the way that
they function makes them very similar to webcams.
16
3. Opportunities for surveillance [6]
• Surveillance Advancements:
• RFID (Radio Frequency Identification): tags that are small
wireless devices that provide unique identifiers which can be read
by remote sensors.
• The original aim of these small low cost devices was to enable
22
4. Identity and identity theft [4]
• But while this all sounds very scary in theory, does it really
happen in practice? How easy is it to acquire enough
information about you to start to steal your identity?
• The answers are yes, and ‘very easy’ – if you know where to
look!!
23
4. Identity and identity theft [5]
• This ability to intrude into an individual’s life using
information found solely online is unprecedented and is a
relatively recent phenomenon.
• Five years ago citizens did not face this situation.
• So what has changed in this period?
25
4.1 Profiling [2]
• Profiling can also lead to differences in how customers
are dealt with
• Those who have been profiled as potential high spenders could
receive enhanced service to the detriment of those who haven’t.
• Call centers now rank order customer accounts according
26
4.2 Identity theft [1]
• Identity theft is the act of deliberately assuming
the identity of another person for fraudulent
purposes.
• Usually this is for some financial gain such as
31
5. Large scale database systems [4]
• Traffic Light System
• green – the underlying system appears basically sound, without
any insuperable legal problem, although there may be aspects of
governance and management that need improvement;
• amber – the system demonstrates significant, worrying failings,
36
5. Large scale database systems [11]
• Nevertheless, there are many benefits, both to
society and to individuals, from these mass
collections of personal data
• They can provide speedy access to services,