You are on page 1of 22

Social

Revolution
Social revolutions are sudden changes
in the structure and nature of society.
These revolutions are usually
recognized as having transformed in
society, culture, philosophy, and
technology much more than political
systems.
THE SOCIAL REVOLUTIONS
Hunter-Gatherers
The hunter-gatherer way of life is based on the
consumption of wild plants and wild animals.
Consequently, hunter-gatherers are often
mobile, and groups of hunter-gatherers

Pastoralism
In a pastoralist society, the primary means of
subsistence are domesticated animals
(livestock).
Horticulturalist Societies
In horticulturalist societies, the primary means of
subsistence is the cultivation of crops using hand
tools.
Agrarian Societies
In agrarian societies, the primary means of
subsistence is the cultivation of crops using a
mixture of human and non-human means, like
animals and machinery.
Industrialization
In an industrial society, the primary means of
subsistence is industry, which is a system of
production based on the mechanized manufacture
of goods.

Post-Industrial
In a post-industrial society, the primary means of
subsistence is derived from service-oriented work,
as opposed to agriculture or industry.
CONCEPTIONS
OF PRIVACY
AND THE
VALUE OF
PRIVACY
Privacy is not simply a way to extricate individuals
from social control, as it is itself a form of social
control that emerges from the norms and values of
society. We protect individual privacy as a society
because we recognize that a good society protects
against excessive intrusion and nosiness into
people's lives.
When something is private to a person, it usually
means that something is inherently special or
sensitive to them. The domain of privacy partially
overlaps with security, which can include the
concepts of appropriate use, as well as protection
of information. Privacy may also take the form of
bodily integrity. The right not to be subjected to
unsanctioned invasions of privacy by the government,
corporations or individuals is part of many countries‘
privacy laws, and in some cases, constitutions.
In the business world, a person may volunteer
personal details, including for advertising, in order
to receive some sort of benefit. Public figures may
be subject to rules on the public interest. Personal
information which is voluntarily shared but
subsequently stolen or misused can lead to
Identity theft.
The concept of universal individual privacy is a
modern construct primarily associated with
Western culture, British and North American in
particular, and remained virtually unknown in
some cultures until recent times. Most cultures,
however, recognize the ability of individuals to
withhold certain parts of their personal
information from wider society, such as closing
the door to one's home.
VALUE OF PRIVACY

Privacy helps people protect themselves from


these troublesome judgments. People establish
boundaries from others in society. These
boundaries are both physical and informational.
We need places of solitude to retreat to, places
where we are free of the gaze of others in order to
relax and feel.
Privacy protects us from abuses by those in
power, even if we're doing nothing wrong at the
time of surveillance. We do nothing wrong when
we make love or go to the bathroom. We are not
deliberately hiding anything when we seek out
private places for reflection or conversation. We
keep private journals, sing in the privacy of the
shower, and write letters to secret lovers and then
burn them. Privacy is a basic human need.
THE IMPACT OF
INFORMATION
TECHNOLOGY
ON PRIVACY
“Information technology”
refers to automated systems for storing,
processing, and distributing information. Typically,
this involves the use of computers and
communication networks.
The Internet, originally conceived in the 1960s and
developed in the 1980s as a scientific network for
exchanging information, was not designed for the
purpose of separating information flows (Michener
1999).
Social network sites emerged for use within a
community of people who knew each other in real
life – at first, mostly in academic settings – rather
than being developed for a worldwide community
of users (Ellison 2007).

Social Media
Social network sites invite the user to
generate more data, to increase the value of the site
Users are tempted to exchange their personal data for
the benefits of using services, and provide both this
data and their attention as payment for the services.
Big data
Users generate loads of data when online. This is
not only data explicitly entered by the user, but
also numerous statistics on user behaviour: sites
visited, links clicked, search terms entered, etc.
Big data may be used in profiling the user
(Hildebrandt 2008), creating patterns of typical
combinations of user properties, which can then
be used to predict interests and behaviour. An
innocent application is “you may also like …”, but,
depending on the available data, more sensitive
derivations may be made, such as most probable
religion or sexual preference
Mobile devices
As users increasingly own
networked devices such as smart phones, mobile
devices collect and send more and more data.
These devices typically contain a range of data
generating sensors, including GPS (location),
movement sensors, and cameras, and may
transmit the resulting data via the Internet or other
networks.
E-Government
Government and public administration have
undergone radical transformations as a result of
the availability of advanced IT systems as well.
Examples of these changes are biometric
passports, online e-government services, voting
systems, a variety of online citizen participation
tools and platforms or online access to recordings
of sessions of parliament and government
committee meetings
Surveillance Information technology is used for all
kinds of surveillance tasks. It can be used to
augment and extend traditional surveillance
systems such as CCTV and other camera systems,
for example to identify specific individuals in
crowds, using face recognition techniques, or to
monitor specific places for unwanted behaviour.
1. Helps people to protect themselves from
troublesome judgements.
2-6. The 6 social evolutions
7. Refers to the automated system for storing,
processing and distributing information.
8-11. Give 4 Impacts of Information Technology
12. Users generate loads of data when online
13. As users increasingly own networked devices such as
smart phones, mobile devices collect and send more and
more data.
14. The primary means of subsistence is
derived from service-oriented work, as
opposed to agriculture or industry.
15. A way of life is based on the consumption
of wild plants and wild animals.
16-20. Difference between privacy and
security.
21-25. Why is it important to have a privacy in
this generation?

You might also like