Top Banner
Privacy & Privacy & Surveillance Surveillance COM125B COM125B
30

Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

Jan 02, 2016

Download

Documents

Jack Johns
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

Privacy & SurveillancePrivacy & Surveillance

COM125BCOM125B

Page 2: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

IntroductionIntroduction

• Privacy• Online Identity Theft• Prevention of ID Theft• Surveillance• Sousveillance

Page 3: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

PrivacyPrivacy

• “freedom from unauthorized intrusion : state of being let alone and able to keep certain esp. personal matters to oneself”

Page 4: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

Types of Privacy

• Bodily

• Political

• Medical

• Genetic

• Internet

• From corporations

• From government interference

Page 5: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

We lose our privacy when…We lose our privacy when…

• Entering sweepstakes / competitions• In order to have a chance of winning a prize• Giving personal information to potential

employers• We use the Internet

- leave trails of information - computer can reveal web browser’s history, cache or logs- websites also have own logs showing IP address and other demographic data

Page 6: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

Cons of giving up Privacy

• Details might be sold to other companies

• Information voluntarily shared is later stolen or misused

- Identity Theft

Page 7: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

According to 2 studies in July 2003, (Gartner Research and Harris Interactive),

approximately 7 million people became victims of identity theft in the prior 12 months.

That equals 19,178 per day, 799 per hour, 13.3 per minute.

Source: Identity Theft Resource Center

Page 8: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

Identity TheftIdentity Theft

• Crimes in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain.

• Personal data (Social Security Number, Bank account, credit card, telephone calling card number, etc) are unlink finger print which can be used easily.

Page 9: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

Identity TheftIdentity Theft• Some criminals engage in

– Shoulder surfing– Dumpster driving

• Recently, the Internet has been the most appealing place for criminals to obtain identifying data such as “Password, Banking information”

• Online Identity Theft – Phishing: bogus website addresses in

spam email

Page 10: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

Identity TheftIdentity Theft

• Online Identity Theft- Pharming - Vishing: Getting details through telephone calls- Spoof Page: voluntary giving out of information- Keystroke Logging- Screen Scrapers

Source: Readers Digest

Page 11: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

Identity TheftIdentity Theft• In 1998 , Congress passed this law and made it as a

federal crime subject to as many as 15 years imprisonment.

• In 2006, according to the Central District Court of California– a man was indicted ,pleaded guilty to federal

charges and was sentenced to 27 months for obtaining private bank account information about a insurance company’s policy holders and using this information to deposits $764,000 in counterfeit checks into a bank account he established .

Page 12: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

Identity Theft PreventionIdentity Theft Prevention

• Don’t give your personal information unless you have reason to trust them

• If you have a credit or debit card, check whether you have been receiving the list of transactions for the most recent month or reporting period

• Maintain careful records of your banking and financial account

Page 13: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

BREAK

Page 14: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

SurveillanceSurveillance

• “The act of monitoring behaviour”

• Maybe covert or overt

Page 15: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

Types of SurveillanceTypes of Surveillance• Clinical

– Occurrences of infectious diseases

• Computer– Spyware

• Natural– Prevention of crime

• Counter– Deleting a file

• Government– Carnivore– Echelon Spy System

• Inverse (also known as Sousveillance)Source: http://en.wikipedia.org/wiki/Surveillance

Page 16: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

SousveillanceSousveillance

“The watched become the watcher”

Page 17: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

What is “sousveillance”?What is “sousveillance”?

• “Sous” – “watching from below” – derived from a contrasting French word, “sur” - surveillance “watching from above” (Wikipedia, 2006)

• Recording an activity by a participant in the activity

• Originated from Steve Mann, a University of Toronto computer engineering professor famous for turning himself into a cyborg.

Page 18: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

What is “sousveillance”?What is “sousveillance”?

• Bringing the camera down to the human level– Physically: cameras

on people not building

– Hierarchically: ordinary citizen taking photos of police

Page 19: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

Sousveillance Today?Sousveillance Today?

• Citizen journalism – enable one to contribute one’s voices and views to the world’s knowledge

• Examples:– “Global Viral” from

ABC

Page 20: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

Sousveillance Today?Sousveillance Today?

• Examples:

– “Virtual China”

Page 21: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

Sousveillance Today?Sousveillance Today?

• Examples:- The Straits Times’ STOMP- Hybrid- “ We want STOMP to become a forum of lively discussions - whether the topics are weighty national issues or where to get the best bak chor mee."

Image from www.stomp.com.sg

Page 22: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

Sousveillance Today?Sousveillance Today?

• Inverse Sousveillance – hierarchical sousveillance

• Examples:– citizens

photographing police abuse

Image: http://www.takingitglobal.org/understanding/socialjustice/abuseofpower

Page 23: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

Why “sousveillance”?Why “sousveillance”?

• To hold authorities to account• To gather evidence for friends involved in

confrontations with officials• To give people a sense of control over the

constant oversight that take place in the public spaces

• To document one’s life from one’s perspective

Source: New Scientist. (2006, June 24). Reed Business Information UK. Vol. 190. I.2557

Page 24: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

How “Sousveillance” developed?How “Sousveillance” developed?

• The development of portable digital personal gadgets– Camera phone– Electronic eyeglasses

– “eyetap”

• The growth of “gift economy”

Page 25: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

EyeTap Development PastEyeTap Development Past

Page 26: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

Development of EyeTap - TodayDevelopment of EyeTap - Today

Page 27: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

New Trends of “Sousveillance”New Trends of “Sousveillance”

• World Sousveillance Day• CARPE 2004

Page 28: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.

Presented by:Charlotte Ng

Liu Jia Wen, Carol

Nashrin Banu

Raihana Omar

Siti Zawiyah

Thu Ha Vo

Page 29: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.
Page 30: Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance.