SlideShare uma empresa Scribd logo
1 de 30
Surveillance
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Downer declares Wikipedia 'anti-government' By Steve Larkin ( news .com.au) August 24, 2007 03:41pm Article from: AAP THE online encyclopedia Wikipedia is anti-government, Foreign Affairs Minister Alexander Downer says. "My sort of recollection of Wikipedia sites is they are a bit, sort of, a bit anti-government, they are sort of a bit negative about people in the government," Mr Downer said today.  http://www.news.com.au/story/0,23599,22300570-29277,00.html#
http://www.australianit.news.com.au/story/0,24897,22317999-15306,00.html Tax gets tough on privacy Ben Woodhead |  August 28, 2007   FRAUD detection systems have uncovered a rash of privacy breaches at the Australian Taxation Office as employees flout tough data protection rules despite ongoing monitoring and training. The sweeps of data access logs led to three sackings during the 2007 financial year and another nine staff resigned after the ATO detected unauthorised access to taxpayer records.
Student cracks Government's $84m porn filter Article from: By Nick Higginbottom and Ben Packham August 26, 2007 12:30am A MELBOURNE schoolboy has cracked the Federal Government's new $84 million internet porn filter in minutes. Tom Wood, 16, said it took him just over 30 minutes to bypass the Government's filter, released on Tuesday.  Tom, a year 10 student at a southeast Melbourne private school, showed the  Herald Sun  how to deactivate the filter in a handful of clicks.  http://www.news.com.au/heraldsun/story/0,21985,22304224-662,00.html
Hackers steal data from Monster.com users Article from: Agence France-Presse August 23, 2007 12:00am HACKERS have stolen personal details of hundreds of thousands of users of US jobs website Monster.com, according to internet security firm Symantec.   A total of 1.6 million entries, including information such as names, postal addresses and telephone numbers were stolen, the firm said.   http://www.news.com.au/heraldsun/story/0,21985,22293044-11869,00.html
Hi-tech research outpaces law Bernard Lane |  August 22, 2007   RESEARCHERS riding the wave of hi-tech collaboration may leave lawyers and policymakers in their wake, commentators have warned following what is believed to be the first survey of legal issues raised by e-research. http://www.theaustralian.news.com.au/story/0,24897,22285146-12332,00.html
Uni plagiarists risk degrees Brendan O'Keefe |  August 22, 2007   THE University of New England will consider stripping students of their degrees if they are found to have cheated, following a spate of plagiarism in one of its masters programs. http://www.theaustralian.news.com.au/story/0,25197,22285283-12332,00.html
 
Menwith Hill, Photo: Duncan Campbell   http://cyberdelix.net/parvati/6929.html Echelon Echelon is a system used by the United States National Security Agency (NSA) to intercept and process international communications passing via communications satellites.
[object Object]
Image: courtesy University College London Library Jeremy Bentham’s  Panopticon
 
 
 
 
>>   [project proposal] - a live terror service
The panopticon project aims to widen the lens of the electronic eye on the street,  testing the boundaries and invasive nature of surveillance technologies,  questioning if privacy really can exist in the digital age.
 
http://www.efa.org.au/
 
http://www.disinfo.com/site/ http://www.notbored.org/the-scp.html Alternative news organisations and performance groups utilise online spaces and audiences.
Welcome to the Cyber Activists Network - AUSTRALIA Cyber Activism  - What is Cyber Activism?, well it's not being a Hacker or Cracker.  A Hacker  - is someone who maliciously breaks or tampers with things, … merely to disrupt and damage private property . A Cracker  - is someone who employs electronic means … with  intent to breach the security and profit or gain in some way by their actions. A Cyber Activist  -is none of these things previously mentioned. Quite simply a Cyber Activist is merely a description for the method of his/hers form of activism . Through the use of electronic media and communications, Cyber Activists attempt to be heard through e-mails, web sites, data and online communities working cohesively or independently to achieve social change.
Slapper Software , have constructed this web site to facilitate an  Online Cyber Activist's Network , which can greatly assist you in your efforts to bring about  social change . Please visit the Activist's Tools & Download Sections of this web site to learn more about how we can assist you. Internet Resources Activist’s Tools To prepare you better (Cyber Activists), we have provided information about issues such as security, personal privacy and how to automate repetitive tasks…and can greatly improve effectiveness and reduce the amount of time it takes. There are many resources used by a well prepared Cyber Activist, below is a list of these tools and how they can assist you. http://senatorslapper.netfirms.com/tools.htm
Electronic Disturbance Theatre  “ When we do a performance, our performance or our actions are considered symbolic gestures; we are trying to bring attention to a particular event or cause – we are not trying to do any criminal activity”. Conan, N. (2001).  Hacktivism.  The Connection. National Public Radio. Boston July 30.
Chapter 1. Introduction: The Virtual Condition  Chapter 2. Nomadic Power and Cultural Resistance  Chapter 3. Video and Resistance: Against Documentaries  Chapter 4. The Recombinant Theater and the  Performative  Matrix  Chapter 5. Utopian Plagiarism,  Hypertextuality , and Electronic Cultural Production   Chapter 6. Fragments on the Problem of Time   Chapter 7. Paradoxes and Contradictions   This book may be freely pirated and quoted.  The authors and publisher, however, would like to be so informed at the address below. http://www.critical-art.net/books/ted/
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],City of Perth  - recently installed surveillance cameras
http://www.landonline.com.au/
www.deportation.com

Mais conteúdo relacionado

Mais procurados

Civic Technology on the Front Lines
Civic Technology on the Front LinesCivic Technology on the Front Lines
Civic Technology on the Front LinesChristopher Whitaker
 
Big Tech, Privacy, and Power
Big Tech, Privacy, and Power Big Tech, Privacy, and Power
Big Tech, Privacy, and Power Dharmendra Rama
 
Bodies and buildings nyu itp 4 8 2013
Bodies and buildings nyu itp 4 8 2013Bodies and buildings nyu itp 4 8 2013
Bodies and buildings nyu itp 4 8 2013Jennifer van der Meer
 
Ch12.global culture
Ch12.global cultureCh12.global culture
Ch12.global cultureBill Kovarik
 
The Future of the Internet
The Future of the InternetThe Future of the Internet
The Future of the Internetsagecast
 
Essay 3 annotated bibliography rough draft 18 july 2012
Essay 3 annotated bibliography rough draft 18 july 2012Essay 3 annotated bibliography rough draft 18 july 2012
Essay 3 annotated bibliography rough draft 18 july 2012rclambert
 
201102 gov 2.0 in australian government
201102   gov 2.0 in australian government201102   gov 2.0 in australian government
201102 gov 2.0 in australian governmentCraig Thomler
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsJyrki Kasvi
 
Public engagement. Public empowerment.
Public engagement. Public empowerment.Public engagement. Public empowerment.
Public engagement. Public empowerment.Stephen Collins
 
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityMetanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityDoug Thompson
 

Mais procurados (20)

Group 1 Project
Group 1 Project Group 1 Project
Group 1 Project
 
Alade
AladeAlade
Alade
 
Civic Technology on the Front Lines
Civic Technology on the Front LinesCivic Technology on the Front Lines
Civic Technology on the Front Lines
 
Big Tech, Privacy, and Power
Big Tech, Privacy, and Power Big Tech, Privacy, and Power
Big Tech, Privacy, and Power
 
Bodies and buildings nyu itp 4 8 2013
Bodies and buildings nyu itp 4 8 2013Bodies and buildings nyu itp 4 8 2013
Bodies and buildings nyu itp 4 8 2013
 
Ch12.global culture
Ch12.global cultureCh12.global culture
Ch12.global culture
 
The Future of the Internet
The Future of the InternetThe Future of the Internet
The Future of the Internet
 
Essay 3 annotated bibliography rough draft 18 july 2012
Essay 3 annotated bibliography rough draft 18 july 2012Essay 3 annotated bibliography rough draft 18 july 2012
Essay 3 annotated bibliography rough draft 18 july 2012
 
10flatteners.20082009
10flatteners.2008200910flatteners.20082009
10flatteners.20082009
 
10flatteners.20082009
10flatteners.2008200910flatteners.20082009
10flatteners.20082009
 
Future Of Internet IV | AAAS
Future Of Internet IV | AAASFuture Of Internet IV | AAAS
Future Of Internet IV | AAAS
 
201102 gov 2.0 in australian government
201102   gov 2.0 in australian government201102   gov 2.0 in australian government
201102 gov 2.0 in australian government
 
5th manheim
5th manheim5th manheim
5th manheim
 
History of the Internet
History of the InternetHistory of the Internet
History of the Internet
 
Polinter11
Polinter11Polinter11
Polinter11
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual Worlds
 
DOPA presentation
DOPA presentationDOPA presentation
DOPA presentation
 
5th Estate at Rhodes House-2012
5th Estate at Rhodes House-20125th Estate at Rhodes House-2012
5th Estate at Rhodes House-2012
 
Public engagement. Public empowerment.
Public engagement. Public empowerment.Public engagement. Public empowerment.
Public engagement. Public empowerment.
 
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityMetanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
 

Destaque

Philosophy and Social Media 1: I Tweet, Therefore I Am
Philosophy and Social Media 1: I Tweet, Therefore I AmPhilosophy and Social Media 1: I Tweet, Therefore I Am
Philosophy and Social Media 1: I Tweet, Therefore I AmTimothy Rayner
 
Surveillance And Power
Surveillance And PowerSurveillance And Power
Surveillance And PowerMarj Kibby
 
Surveillance, copyright, freedom and privacy:opportunity and risk of video sh...
Surveillance, copyright, freedom and privacy:opportunity and risk of video sh...Surveillance, copyright, freedom and privacy:opportunity and risk of video sh...
Surveillance, copyright, freedom and privacy:opportunity and risk of video sh...Daniele Montemale
 
Protecting Privacy From Aerial Surveillance
Protecting Privacy From Aerial SurveillanceProtecting Privacy From Aerial Surveillance
Protecting Privacy From Aerial Surveillance- Mark - Fullbright
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentationaxnv
 
Postmodernism lesson 3
Postmodernism lesson 3Postmodernism lesson 3
Postmodernism lesson 3MissConnell
 
Surveillance and privacy panel
Surveillance and privacy panelSurveillance and privacy panel
Surveillance and privacy panelNewsquare
 
You Are Watched
You Are WatchedYou Are Watched
You Are WatchedMark Deuze
 
What Is Technocultures
What Is TechnoculturesWhat Is Technocultures
What Is Technoculturespsimm
 
What's Panopticism? Exploring Digital Cultures
What's Panopticism? Exploring Digital CulturesWhat's Panopticism? Exploring Digital Cultures
What's Panopticism? Exploring Digital CulturesNicola Giusto
 
Prof. Hendrik Speck - Privacy and Social Networks
Prof. Hendrik Speck - Privacy and Social NetworksProf. Hendrik Speck - Privacy and Social Networks
Prof. Hendrik Speck - Privacy and Social NetworksHendrik Speck
 
Trust and Reputation on the Social Web
Trust and Reputation on the Social WebTrust and Reputation on the Social Web
Trust and Reputation on the Social WebTimothy Rayner
 
Selfies, Surveillance and the Voluntary Panopticon
Selfies, Surveillance and the Voluntary Panopticon Selfies, Surveillance and the Voluntary Panopticon
Selfies, Surveillance and the Voluntary Panopticon piero scaruffi
 
The digital divide in the post-Snowden era
The digital divide in the post-Snowden eraThe digital divide in the post-Snowden era
The digital divide in the post-Snowden eraIan Clark
 
9 Punishment HANDOUT
9 Punishment HANDOUT9 Punishment HANDOUT
9 Punishment HANDOUTmattyp99
 
social networking sites
social networking sitessocial networking sites
social networking sitesAnant Agarwal
 
Social networking PPT
Social networking PPTSocial networking PPT
Social networking PPTvarun0912
 

Destaque (20)

Philosophy and Social Media 1: I Tweet, Therefore I Am
Philosophy and Social Media 1: I Tweet, Therefore I AmPhilosophy and Social Media 1: I Tweet, Therefore I Am
Philosophy and Social Media 1: I Tweet, Therefore I Am
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
Surveillance And Power
Surveillance And PowerSurveillance And Power
Surveillance And Power
 
Surveillance, copyright, freedom and privacy:opportunity and risk of video sh...
Surveillance, copyright, freedom and privacy:opportunity and risk of video sh...Surveillance, copyright, freedom and privacy:opportunity and risk of video sh...
Surveillance, copyright, freedom and privacy:opportunity and risk of video sh...
 
Protecting Privacy From Aerial Surveillance
Protecting Privacy From Aerial SurveillanceProtecting Privacy From Aerial Surveillance
Protecting Privacy From Aerial Surveillance
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
 
Postmodernism lesson 3
Postmodernism lesson 3Postmodernism lesson 3
Postmodernism lesson 3
 
Surveillance and privacy panel
Surveillance and privacy panelSurveillance and privacy panel
Surveillance and privacy panel
 
You Are Watched
You Are WatchedYou Are Watched
You Are Watched
 
What Is Technocultures
What Is TechnoculturesWhat Is Technocultures
What Is Technocultures
 
What's Panopticism? Exploring Digital Cultures
What's Panopticism? Exploring Digital CulturesWhat's Panopticism? Exploring Digital Cultures
What's Panopticism? Exploring Digital Cultures
 
Prof. Hendrik Speck - Privacy and Social Networks
Prof. Hendrik Speck - Privacy and Social NetworksProf. Hendrik Speck - Privacy and Social Networks
Prof. Hendrik Speck - Privacy and Social Networks
 
Trust and Reputation on the Social Web
Trust and Reputation on the Social WebTrust and Reputation on the Social Web
Trust and Reputation on the Social Web
 
Selfies, Surveillance and the Voluntary Panopticon
Selfies, Surveillance and the Voluntary Panopticon Selfies, Surveillance and the Voluntary Panopticon
Selfies, Surveillance and the Voluntary Panopticon
 
The digital divide in the post-Snowden era
The digital divide in the post-Snowden eraThe digital divide in the post-Snowden era
The digital divide in the post-Snowden era
 
9 Punishment HANDOUT
9 Punishment HANDOUT9 Punishment HANDOUT
9 Punishment HANDOUT
 
social networking sites
social networking sitessocial networking sites
social networking sites
 
Social networking
Social networkingSocial networking
Social networking
 
Social networking PPT
Social networking PPTSocial networking PPT
Social networking PPT
 
Brand New World
Brand New WorldBrand New World
Brand New World
 

Semelhante a LECTURE 5 - Cyberculture

A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethicsUltraUploader
 
051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics TranscriptRemedy Communications
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingCiarán Mc Mahon
 
'Internet' - lecture for MECO 1002
'Internet' - lecture for MECO 1002'Internet' - lecture for MECO 1002
'Internet' - lecture for MECO 1002University of Sydney
 
Freedom in the Days of the Internet
Freedom in the Days of the InternetFreedom in the Days of the Internet
Freedom in the Days of the Internetthinkingeurope2011
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillancecfeutlinske
 
Internet Presentation
Internet PresentationInternet Presentation
Internet Presentationadriana ahner
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policyChris Marsden
 
Short and Long of Data Driven Innovation
Short and Long of Data Driven InnovationShort and Long of Data Driven Innovation
Short and Long of Data Driven InnovationDavid De Roure
 
Essay Writing For Elementary Students. Online assignment writing service.
Essay Writing For Elementary Students. Online assignment writing service.Essay Writing For Elementary Students. Online assignment writing service.
Essay Writing For Elementary Students. Online assignment writing service.Finni Rice
 
Openness and innovation in the information society
Openness and innovation in the information societyOpenness and innovation in the information society
Openness and innovation in the information societyblogzilla
 
Using Data for Science Journalism
Using Data for Science JournalismUsing Data for Science Journalism
Using Data for Science JournalismLiliana Bounegru
 
Using Data for Science Journalism
Using Data for Science JournalismUsing Data for Science Journalism
Using Data for Science JournalismJonathan Gray
 
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Bodyspacesociety Blog
 
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...FecomercioSP
 

Semelhante a LECTURE 5 - Cyberculture (20)

A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 
051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
 
'Internet' - lecture for MECO 1002
'Internet' - lecture for MECO 1002'Internet' - lecture for MECO 1002
'Internet' - lecture for MECO 1002
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
Freedom in the Days of the Internet
Freedom in the Days of the InternetFreedom in the Days of the Internet
Freedom in the Days of the Internet
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
 
Internet Presentation
Internet PresentationInternet Presentation
Internet Presentation
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policy
 
Short and Long of Data Driven Innovation
Short and Long of Data Driven InnovationShort and Long of Data Driven Innovation
Short and Long of Data Driven Innovation
 
Cyber security issues part a
Cyber security issues  part a Cyber security issues  part a
Cyber security issues part a
 
Essay Writing For Elementary Students. Online assignment writing service.
Essay Writing For Elementary Students. Online assignment writing service.Essay Writing For Elementary Students. Online assignment writing service.
Essay Writing For Elementary Students. Online assignment writing service.
 
Openness and innovation in the information society
Openness and innovation in the information societyOpenness and innovation in the information society
Openness and innovation in the information society
 
Using Data for Science Journalism
Using Data for Science JournalismUsing Data for Science Journalism
Using Data for Science Journalism
 
Using Data for Science Journalism
Using Data for Science JournalismUsing Data for Science Journalism
Using Data for Science Journalism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
 
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
 

Mais de Kim Flintoff

TIDES-Education-PowerPoint-WAEDCONNECT2022-.pptx
TIDES-Education-PowerPoint-WAEDCONNECT2022-.pptxTIDES-Education-PowerPoint-WAEDCONNECT2022-.pptx
TIDES-Education-PowerPoint-WAEDCONNECT2022-.pptxKim Flintoff
 
Taking Learning Beyond the School Gate
Taking Learning Beyond the School GateTaking Learning Beyond the School Gate
Taking Learning Beyond the School GateKim Flintoff
 
UN SDG PRIORITIES IN EDUCATION
UN SDG PRIORITIES IN EDUCATIONUN SDG PRIORITIES IN EDUCATION
UN SDG PRIORITIES IN EDUCATIONKim Flintoff
 
Learning with Purpose
Learning with PurposeLearning with Purpose
Learning with PurposeKim Flintoff
 
Student-directed engagement in community-linked STEM integration through coll...
Student-directed engagement in community-linked STEM integration through coll...Student-directed engagement in community-linked STEM integration through coll...
Student-directed engagement in community-linked STEM integration through coll...Kim Flintoff
 
TEDxUWASalon: Symbiosis - Learning with Purpose
TEDxUWASalon: Symbiosis - Learning with PurposeTEDxUWASalon: Symbiosis - Learning with Purpose
TEDxUWASalon: Symbiosis - Learning with PurposeKim Flintoff
 
Schools Innovation Projects
Schools Innovation ProjectsSchools Innovation Projects
Schools Innovation ProjectsKim Flintoff
 
Establishing global connections and being a global educator
Establishing global connections and being a global educatorEstablishing global connections and being a global educator
Establishing global connections and being a global educatorKim Flintoff
 
Challenge-based Learning
Challenge-based LearningChallenge-based Learning
Challenge-based LearningKim Flintoff
 
Learners as Creators
Learners as CreatorsLearners as Creators
Learners as CreatorsKim Flintoff
 
Designing for Global equality
Designing for Global equalityDesigning for Global equality
Designing for Global equalityKim Flintoff
 
Schools Innovation Projects Initiative
Schools Innovation Projects InitiativeSchools Innovation Projects Initiative
Schools Innovation Projects InitiativeKim Flintoff
 
Balance of the Planet
Balance of the PlanetBalance of the Planet
Balance of the PlanetKim Flintoff
 
Learning Futures Network
Learning Futures NetworkLearning Futures Network
Learning Futures NetworkKim Flintoff
 
Future Landscapes for Educational Technology
Future Landscapes for Educational TechnologyFuture Landscapes for Educational Technology
Future Landscapes for Educational TechnologyKim Flintoff
 
Black Swans and the Future of Education
Black Swans and the Future of EducationBlack Swans and the Future of Education
Black Swans and the Future of EducationKim Flintoff
 
Where to from here - GSG closing plenary
Where to from here - GSG closing plenaryWhere to from here - GSG closing plenary
Where to from here - GSG closing plenaryKim Flintoff
 
Transforming learning for relevance and sustainability
Transforming learning for relevance and sustainabilityTransforming learning for relevance and sustainability
Transforming learning for relevance and sustainabilityKim Flintoff
 
Schools Innovation Symposium-2018
Schools Innovation Symposium-2018Schools Innovation Symposium-2018
Schools Innovation Symposium-2018Kim Flintoff
 
Education and Emerging Futures Children's Week 2018
Education and Emerging Futures Children's Week 2018Education and Emerging Futures Children's Week 2018
Education and Emerging Futures Children's Week 2018Kim Flintoff
 

Mais de Kim Flintoff (20)

TIDES-Education-PowerPoint-WAEDCONNECT2022-.pptx
TIDES-Education-PowerPoint-WAEDCONNECT2022-.pptxTIDES-Education-PowerPoint-WAEDCONNECT2022-.pptx
TIDES-Education-PowerPoint-WAEDCONNECT2022-.pptx
 
Taking Learning Beyond the School Gate
Taking Learning Beyond the School GateTaking Learning Beyond the School Gate
Taking Learning Beyond the School Gate
 
UN SDG PRIORITIES IN EDUCATION
UN SDG PRIORITIES IN EDUCATIONUN SDG PRIORITIES IN EDUCATION
UN SDG PRIORITIES IN EDUCATION
 
Learning with Purpose
Learning with PurposeLearning with Purpose
Learning with Purpose
 
Student-directed engagement in community-linked STEM integration through coll...
Student-directed engagement in community-linked STEM integration through coll...Student-directed engagement in community-linked STEM integration through coll...
Student-directed engagement in community-linked STEM integration through coll...
 
TEDxUWASalon: Symbiosis - Learning with Purpose
TEDxUWASalon: Symbiosis - Learning with PurposeTEDxUWASalon: Symbiosis - Learning with Purpose
TEDxUWASalon: Symbiosis - Learning with Purpose
 
Schools Innovation Projects
Schools Innovation ProjectsSchools Innovation Projects
Schools Innovation Projects
 
Establishing global connections and being a global educator
Establishing global connections and being a global educatorEstablishing global connections and being a global educator
Establishing global connections and being a global educator
 
Challenge-based Learning
Challenge-based LearningChallenge-based Learning
Challenge-based Learning
 
Learners as Creators
Learners as CreatorsLearners as Creators
Learners as Creators
 
Designing for Global equality
Designing for Global equalityDesigning for Global equality
Designing for Global equality
 
Schools Innovation Projects Initiative
Schools Innovation Projects InitiativeSchools Innovation Projects Initiative
Schools Innovation Projects Initiative
 
Balance of the Planet
Balance of the PlanetBalance of the Planet
Balance of the Planet
 
Learning Futures Network
Learning Futures NetworkLearning Futures Network
Learning Futures Network
 
Future Landscapes for Educational Technology
Future Landscapes for Educational TechnologyFuture Landscapes for Educational Technology
Future Landscapes for Educational Technology
 
Black Swans and the Future of Education
Black Swans and the Future of EducationBlack Swans and the Future of Education
Black Swans and the Future of Education
 
Where to from here - GSG closing plenary
Where to from here - GSG closing plenaryWhere to from here - GSG closing plenary
Where to from here - GSG closing plenary
 
Transforming learning for relevance and sustainability
Transforming learning for relevance and sustainabilityTransforming learning for relevance and sustainability
Transforming learning for relevance and sustainability
 
Schools Innovation Symposium-2018
Schools Innovation Symposium-2018Schools Innovation Symposium-2018
Schools Innovation Symposium-2018
 
Education and Emerging Futures Children's Week 2018
Education and Emerging Futures Children's Week 2018Education and Emerging Futures Children's Week 2018
Education and Emerging Futures Children's Week 2018
 

Último

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 

Último (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 

LECTURE 5 - Cyberculture

  • 2.
  • 3.
  • 4. Downer declares Wikipedia 'anti-government' By Steve Larkin ( news .com.au) August 24, 2007 03:41pm Article from: AAP THE online encyclopedia Wikipedia is anti-government, Foreign Affairs Minister Alexander Downer says. "My sort of recollection of Wikipedia sites is they are a bit, sort of, a bit anti-government, they are sort of a bit negative about people in the government," Mr Downer said today. http://www.news.com.au/story/0,23599,22300570-29277,00.html#
  • 5. http://www.australianit.news.com.au/story/0,24897,22317999-15306,00.html Tax gets tough on privacy Ben Woodhead | August 28, 2007 FRAUD detection systems have uncovered a rash of privacy breaches at the Australian Taxation Office as employees flout tough data protection rules despite ongoing monitoring and training. The sweeps of data access logs led to three sackings during the 2007 financial year and another nine staff resigned after the ATO detected unauthorised access to taxpayer records.
  • 6. Student cracks Government's $84m porn filter Article from: By Nick Higginbottom and Ben Packham August 26, 2007 12:30am A MELBOURNE schoolboy has cracked the Federal Government's new $84 million internet porn filter in minutes. Tom Wood, 16, said it took him just over 30 minutes to bypass the Government's filter, released on Tuesday. Tom, a year 10 student at a southeast Melbourne private school, showed the Herald Sun how to deactivate the filter in a handful of clicks. http://www.news.com.au/heraldsun/story/0,21985,22304224-662,00.html
  • 7. Hackers steal data from Monster.com users Article from: Agence France-Presse August 23, 2007 12:00am HACKERS have stolen personal details of hundreds of thousands of users of US jobs website Monster.com, according to internet security firm Symantec.   A total of 1.6 million entries, including information such as names, postal addresses and telephone numbers were stolen, the firm said. http://www.news.com.au/heraldsun/story/0,21985,22293044-11869,00.html
  • 8. Hi-tech research outpaces law Bernard Lane | August 22, 2007 RESEARCHERS riding the wave of hi-tech collaboration may leave lawyers and policymakers in their wake, commentators have warned following what is believed to be the first survey of legal issues raised by e-research. http://www.theaustralian.news.com.au/story/0,24897,22285146-12332,00.html
  • 9. Uni plagiarists risk degrees Brendan O'Keefe | August 22, 2007 THE University of New England will consider stripping students of their degrees if they are found to have cheated, following a spate of plagiarism in one of its masters programs. http://www.theaustralian.news.com.au/story/0,25197,22285283-12332,00.html
  • 10.  
  • 11. Menwith Hill, Photo: Duncan Campbell http://cyberdelix.net/parvati/6929.html Echelon Echelon is a system used by the United States National Security Agency (NSA) to intercept and process international communications passing via communications satellites.
  • 12.
  • 13. Image: courtesy University College London Library Jeremy Bentham’s Panopticon
  • 14.  
  • 15.  
  • 16.  
  • 17.  
  • 18. >> [project proposal] - a live terror service
  • 19. The panopticon project aims to widen the lens of the electronic eye on the street, testing the boundaries and invasive nature of surveillance technologies, questioning if privacy really can exist in the digital age.
  • 20.  
  • 22.  
  • 23. http://www.disinfo.com/site/ http://www.notbored.org/the-scp.html Alternative news organisations and performance groups utilise online spaces and audiences.
  • 24. Welcome to the Cyber Activists Network - AUSTRALIA Cyber Activism - What is Cyber Activism?, well it's not being a Hacker or Cracker. A Hacker - is someone who maliciously breaks or tampers with things, … merely to disrupt and damage private property . A Cracker - is someone who employs electronic means … with intent to breach the security and profit or gain in some way by their actions. A Cyber Activist -is none of these things previously mentioned. Quite simply a Cyber Activist is merely a description for the method of his/hers form of activism . Through the use of electronic media and communications, Cyber Activists attempt to be heard through e-mails, web sites, data and online communities working cohesively or independently to achieve social change.
  • 25. Slapper Software , have constructed this web site to facilitate an Online Cyber Activist's Network , which can greatly assist you in your efforts to bring about social change . Please visit the Activist's Tools & Download Sections of this web site to learn more about how we can assist you. Internet Resources Activist’s Tools To prepare you better (Cyber Activists), we have provided information about issues such as security, personal privacy and how to automate repetitive tasks…and can greatly improve effectiveness and reduce the amount of time it takes. There are many resources used by a well prepared Cyber Activist, below is a list of these tools and how they can assist you. http://senatorslapper.netfirms.com/tools.htm
  • 26. Electronic Disturbance Theatre “ When we do a performance, our performance or our actions are considered symbolic gestures; we are trying to bring attention to a particular event or cause – we are not trying to do any criminal activity”. Conan, N. (2001). Hacktivism. The Connection. National Public Radio. Boston July 30.
  • 27. Chapter 1. Introduction: The Virtual Condition Chapter 2. Nomadic Power and Cultural Resistance Chapter 3. Video and Resistance: Against Documentaries Chapter 4. The Recombinant Theater and the Performative Matrix Chapter 5. Utopian Plagiarism, Hypertextuality , and Electronic Cultural Production Chapter 6. Fragments on the Problem of Time Chapter 7. Paradoxes and Contradictions This book may be freely pirated and quoted. The authors and publisher, however, would like to be so informed at the address below. http://www.critical-art.net/books/ted/
  • 28.