Top Banner
Computers and the Surveillance Society Introduction to Computing Catherine Dwyer Dept. of Information Technology Seidenberg School Spring 2014 1
13

Computers and the Surveillance Society

Jan 06, 2016

Download

Documents

zavad

Computers and the Surveillance Society. Introduction to Computing Catherine Dwyer Dept. of Information Technology Seidenberg School Spring 2014. Computers and Surveillance. “Our chapter … is written in light - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Computers and the Surveillance Society

1

Computers and the Surveillance SocietyIntroduction to ComputingCatherine DwyerDept. of Information TechnologySeidenberg SchoolSpring 2014

Page 2: Computers and the Surveillance Society

2

Computers and Surveillance“Our chapter … is written in lightof the fact that computer-enabled data collection, aggregation and mining dramatically change the nature of contemporary surveillance.” Finn Brunton and Helen Nissenbaum, in Privacy, Due Process, and the Computational Turn, 2013

Page 3: Computers and the Surveillance Society

3

Critical functionalities for surveillanceData collectionAggregationMining

Page 4: Computers and the Surveillance Society

4

Role of computingSoftware code – allows data

collection to be automatedNetworks – allows separate data

sources to be collected and integrated

Mining – “Big Data” uses advanced algorithms and statistical modeling to extract information from unstructured sources

Page 5: Computers and the Surveillance Society

5

CIS ComponentsMaterial on BlackboardIntroduction to coding

(JavaScript)Data analysis (Excel)Internet and Web (HTML)

Page 6: Computers and the Surveillance Society

6

Internet of Things

Page 7: Computers and the Surveillance Society

7

Facebook app permissions

“record audio at any time without your confirmation”

“read your contacts”

“take pictures and video without your confirmation”

“read your text messages (SMS or MMS)”

“directly call phone numbers”“read call log”

“write (modify) call log”

Page 8: Computers and the Surveillance Society

8

Page 9: Computers and the Surveillance Society

9

Friday, January 24 – 2:15 pm

Page 10: Computers and the Surveillance Society

10

At 2:25 pm

At 2:20 pm

Page 11: Computers and the Surveillance Society

11

2:30 pm gmail down becomes a meme

Page 12: Computers and the Surveillance Society

12

And a marketing opportunity

Page 13: Computers and the Surveillance Society

13

For next classRead Introduction in JavaScript

text