SlideShare uma empresa Scribd logo
1 de 24
Social Networking Sites:  A Surveillance Studies Primer Daniel Trottier – PhD Candidate Department of Sociology Queen’s University, Canada CITASA - Mini-Conference 3.0 Sunday, August 12th, 2007
Purpose / Disclaimer ,[object Object],[object Object],[object Object]
Outline: In the next 9 minutes, I will… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],1. Lyon, D. 2002.  Surveillance as Social Sorting . London: Routledge. p.14
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
1. Gender is presented as a binary, although the user can refrain from filling in the category. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1. Poster, M. 1996. Databases as Discourse, or, Electronic Interpellations.  Computers, Surveillance, and Privacy . D. Lyon and E. Zureik (eds.). Minneapolis, University of Minnesota Press: 175-92
[object Object],[object Object],[object Object],[object Object],1. Haggerty, K., and R. Ericson. 2000.The Surveillant Assemblage .   British Journal of Sociology  51(4): 605-22, p.606 2. Patton, P. 1994. MetamorphoLogic: Bodies and Powers in  A Thousand Plateaus .  Journal of the British Society for Phenomenology  25(2): 157–69, p.158
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],1. Andrejevic, M. 2005. The Work of Watching One Another: Lateral Surveillance, Risk, and Governance.  Surveillance and Society  2(4): 479-97, p.488
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],1.  Koskela, H. 2004. Webcams, TV shows and mobile phones. Empowering exhibitionism.  Surveillance and Society , 2(2/3): 199–215.
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You! Daniel Trottier dan.trottier @ gmail.com

Mais conteúdo relacionado

Mais procurados

The View from Here and Here: Making the Invisible Visible in the Hypertextual...
The View from Here and Here: Making the Invisible Visible in the Hypertextual...The View from Here and Here: Making the Invisible Visible in the Hypertextual...
The View from Here and Here: Making the Invisible Visible in the Hypertextual...Michelle Ferrier
 
The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...guest636475b
 
Ben Sheniderman, Technology-Mediated Social Computing
Ben Sheniderman, Technology-Mediated Social ComputingBen Sheniderman, Technology-Mediated Social Computing
Ben Sheniderman, Technology-Mediated Social ComputingAngela Brandt
 
Citizen Sensor Data Mining, Social Media Analytics and Development Centric ...
Citizen Sensor Data Mining, Social Media Analytics and Development Centric ...Citizen Sensor Data Mining, Social Media Analytics and Development Centric ...
Citizen Sensor Data Mining, Social Media Analytics and Development Centric ...Artificial Intelligence Institute at UofSC
 
Participant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataParticipant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataAnsgar Koene
 
The Networked Creativity in the Censored Web 2.0
The Networked Creativity in the Censored Web 2.0The Networked Creativity in the Censored Web 2.0
The Networked Creativity in the Censored Web 2.0Weiai Wayne Xu
 
Social Media as a Record for Public Services and Utilities in a Disaster
Social Media as a Record for Public Services and Utilities in a DisasterSocial Media as a Record for Public Services and Utilities in a Disaster
Social Media as a Record for Public Services and Utilities in a DisasterAndrew Steinitz
 
What Actor-Network Theory (ANT) and digital methods can do for data journalis...
What Actor-Network Theory (ANT) and digital methods can do for data journalis...What Actor-Network Theory (ANT) and digital methods can do for data journalis...
What Actor-Network Theory (ANT) and digital methods can do for data journalis...Liliana Bounegru
 
Data Journalism and the Remaking of Data Infrastructures
Data Journalism and the Remaking of Data InfrastructuresData Journalism and the Remaking of Data Infrastructures
Data Journalism and the Remaking of Data InfrastructuresLiliana Bounegru
 
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesUnderstanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesJessica Vitak
 
A review for the online social networks literature
A review for the online social networks literatureA review for the online social networks literature
A review for the online social networks literatureAlexander Decker
 
Policy Primer: Censorship
Policy Primer: Censorship Policy Primer: Censorship
Policy Primer: Censorship BronteMaddison1
 
Ignorance and Epistemic Harm Lessons for Digital and Information Literacy
Ignorance and Epistemic Harm Lessons for Digital and Information LiteracyIgnorance and Epistemic Harm Lessons for Digital and Information Literacy
Ignorance and Epistemic Harm Lessons for Digital and Information LiteracyQueen's University Belfast
 
Facebook in the Information Literacy Classroom: Framework and Strategies
Facebook in the Information Literacy Classroom: Framework and Strategies Facebook in the Information Literacy Classroom: Framework and Strategies
Facebook in the Information Literacy Classroom: Framework and Strategies Donna Witek
 

Mais procurados (19)

The Birth of Social Media Methods
The Birth of Social Media MethodsThe Birth of Social Media Methods
The Birth of Social Media Methods
 
Social media and ethics
Social media and ethicsSocial media and ethics
Social media and ethics
 
The View from Here and Here: Making the Invisible Visible in the Hypertextual...
The View from Here and Here: Making the Invisible Visible in the Hypertextual...The View from Here and Here: Making the Invisible Visible in the Hypertextual...
The View from Here and Here: Making the Invisible Visible in the Hypertextual...
 
Just Google it! [slides]
Just Google it! [slides]Just Google it! [slides]
Just Google it! [slides]
 
The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...
 
Social Network Theory
Social Network Theory Social Network Theory
Social Network Theory
 
Ben Sheniderman, Technology-Mediated Social Computing
Ben Sheniderman, Technology-Mediated Social ComputingBen Sheniderman, Technology-Mediated Social Computing
Ben Sheniderman, Technology-Mediated Social Computing
 
Citizen Sensor Data Mining, Social Media Analytics and Development Centric ...
Citizen Sensor Data Mining, Social Media Analytics and Development Centric ...Citizen Sensor Data Mining, Social Media Analytics and Development Centric ...
Citizen Sensor Data Mining, Social Media Analytics and Development Centric ...
 
Participant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataParticipant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived data
 
The Networked Creativity in the Censored Web 2.0
The Networked Creativity in the Censored Web 2.0The Networked Creativity in the Censored Web 2.0
The Networked Creativity in the Censored Web 2.0
 
Social Media as a Record for Public Services and Utilities in a Disaster
Social Media as a Record for Public Services and Utilities in a DisasterSocial Media as a Record for Public Services and Utilities in a Disaster
Social Media as a Record for Public Services and Utilities in a Disaster
 
What Actor-Network Theory (ANT) and digital methods can do for data journalis...
What Actor-Network Theory (ANT) and digital methods can do for data journalis...What Actor-Network Theory (ANT) and digital methods can do for data journalis...
What Actor-Network Theory (ANT) and digital methods can do for data journalis...
 
Data Journalism and the Remaking of Data Infrastructures
Data Journalism and the Remaking of Data InfrastructuresData Journalism and the Remaking of Data Infrastructures
Data Journalism and the Remaking of Data Infrastructures
 
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesUnderstanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
 
A review for the online social networks literature
A review for the online social networks literatureA review for the online social networks literature
A review for the online social networks literature
 
How to get started with Data Journalism
How to get started with Data JournalismHow to get started with Data Journalism
How to get started with Data Journalism
 
Policy Primer: Censorship
Policy Primer: Censorship Policy Primer: Censorship
Policy Primer: Censorship
 
Ignorance and Epistemic Harm Lessons for Digital and Information Literacy
Ignorance and Epistemic Harm Lessons for Digital and Information LiteracyIgnorance and Epistemic Harm Lessons for Digital and Information Literacy
Ignorance and Epistemic Harm Lessons for Digital and Information Literacy
 
Facebook in the Information Literacy Classroom: Framework and Strategies
Facebook in the Information Literacy Classroom: Framework and Strategies Facebook in the Information Literacy Classroom: Framework and Strategies
Facebook in the Information Literacy Classroom: Framework and Strategies
 

Semelhante a Dan Trottier

Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networksHarshitha Reddy
 
Social surveillance
Social surveillanceSocial surveillance
Social surveillancerooneys27
 
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Bodyspacesociety Blog
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
 
Identification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social NetworksIdentification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social Networkseditorjournal
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineBrenden Brown
 
New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012Michael Zimmer
 
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
Privacy as identity territoriality  re-conceptualising behaviour in cyberspacePrivacy as identity territoriality  re-conceptualising behaviour in cyberspace
Privacy as identity territoriality re-conceptualising behaviour in cyberspaceFabrice Epelboin
 
Detecting fake news_with_weak_social_supervision
Detecting fake news_with_weak_social_supervisionDetecting fake news_with_weak_social_supervision
Detecting fake news_with_weak_social_supervisionSuresh S
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...ijsptm
 
Web Science Session 2: Social Media
Web Science Session 2: Social MediaWeb Science Session 2: Social Media
Web Science Session 2: Social MediaStefanie Panke
 
The International Encyclopedia of Digital Communication and Society - 2014 - ...
The International Encyclopedia of Digital Communication and Society - 2014 - ...The International Encyclopedia of Digital Communication and Society - 2014 - ...
The International Encyclopedia of Digital Communication and Society - 2014 - ...WindaDwiAstutiZebua
 
Older people and Social Networking Sites
Older people and Social Networking SitesOlder people and Social Networking Sites
Older people and Social Networking SitesMichael Hardey
 
The Filter Bubble: a threat for plural information?
The Filter Bubble: a threat for plural information?The Filter Bubble: a threat for plural information?
The Filter Bubble: a threat for plural information?Pietro De Nicolao
 
Studying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & BiasStudying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & Biasgloriakt
 
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...UKSG: connecting the knowledge community
 
Privacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challengePrivacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challengedmcmenemy
 
Veillant Media & Emotiveillance
Veillant Media & Emotiveillance  Veillant Media & Emotiveillance
Veillant Media & Emotiveillance Andrew_McStay
 

Semelhante a Dan Trottier (20)

Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
 
Social surveillance
Social surveillanceSocial surveillance
Social surveillance
 
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
 
Order 32740459
Order 32740459Order 32740459
Order 32740459
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
Identification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social NetworksIdentification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social Networks
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
 
New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012
 
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
Privacy as identity territoriality  re-conceptualising behaviour in cyberspacePrivacy as identity territoriality  re-conceptualising behaviour in cyberspace
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
 
Detecting fake news_with_weak_social_supervision
Detecting fake news_with_weak_social_supervisionDetecting fake news_with_weak_social_supervision
Detecting fake news_with_weak_social_supervision
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
 
Web Science Session 2: Social Media
Web Science Session 2: Social MediaWeb Science Session 2: Social Media
Web Science Session 2: Social Media
 
The International Encyclopedia of Digital Communication and Society - 2014 - ...
The International Encyclopedia of Digital Communication and Society - 2014 - ...The International Encyclopedia of Digital Communication and Society - 2014 - ...
The International Encyclopedia of Digital Communication and Society - 2014 - ...
 
Myisha Hines-Allen COMM 303
Myisha Hines-Allen COMM 303Myisha Hines-Allen COMM 303
Myisha Hines-Allen COMM 303
 
Older people and Social Networking Sites
Older people and Social Networking SitesOlder people and Social Networking Sites
Older people and Social Networking Sites
 
The Filter Bubble: a threat for plural information?
The Filter Bubble: a threat for plural information?The Filter Bubble: a threat for plural information?
The Filter Bubble: a threat for plural information?
 
Studying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & BiasStudying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & Bias
 
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
 
Privacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challengePrivacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challenge
 
Veillant Media & Emotiveillance
Veillant Media & Emotiveillance  Veillant Media & Emotiveillance
Veillant Media & Emotiveillance
 

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Dan Trottier

  • 1. Social Networking Sites: A Surveillance Studies Primer Daniel Trottier – PhD Candidate Department of Sociology Queen’s University, Canada CITASA - Mini-Conference 3.0 Sunday, August 12th, 2007
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Thank You! Daniel Trottier dan.trottier @ gmail.com