SlideShare uma empresa Scribd logo
1 de 127
Baixar para ler offline
Social Media & Integrity,[object Object],Creating law without ,[object Object],controlling infrastructure ,[object Object],is #fail,[object Object]
Technology brings theoretical rights within practical reach,[object Object]
There is an ethical dimension to everything,[object Object]
MYTH of NEUTRAL technology,[object Object],Guns don’t kill people…,[object Object]
Spot the ethical problem,[object Object]
THE MEDIUM... SHAPES AND CONTROLS THE SCALE AND FORM OF HUMAN ASSOCIATION AND ACTION,[object Object],McLuhan, M. (1962) The Gutenberg Galaxy,[object Object]
Langford WInner,[object Object]
Regulation of technology is the regulation of democracy,[object Object]
Social Media & Integrity
Social Media & Integrity
Integrity & Technology,[object Object]
Social Media & Integrity
Social Media & Integrity
Physical surveillance,[object Object]
Social Media & Integrity
Social Media & Integrity
Paparazzi (1898),[object Object]
Advertising (1902),[object Object],Robertson v. Rochester Folding Box Co (1902),[object Object],Domstolen accepterade inte Brandeis & Warrens argument om “common law” rättighet,[object Object]
Hidden camera 1928,[object Object],The execution of Ruth Snyder 1928,[object Object],Twitter in TPB case,[object Object]
Social Media & Integrity
The Right to Privacy,[object Object],That the individual shall have full protection in person and in property is a principle as old as the common law; but it has been necessary from time to time to define anew the exact nature and extent of such protection.,[object Object],Warren and Brandeis The Right to Privacy, 4 Harvard Law Review 193 (1890),[object Object]
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
LAW,[object Object]
UNDHR,[object Object],No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks. (Art 12),[object Object]
Art 8 ECHR,[object Object],1. Everyone has the right to respect for his private and family life, his home and his correspondence.,[object Object]
Background,[object Object],Datalagen (1973),[object Object],Moores Law,[object Object],Data ProtectionDirective (1995),[object Object],Personuppgiftslagen 1998,[object Object]
PERSONUPPGIFTSLAGEN(1998:204),[object Object]
All slags information som direkt eller indirekt kan hänföras till en fysisk person som är vid livet utgör personuppgift.,[object Object],Inte företag,[object Object],Ingen integritet efter döden,[object Object],Personuppgift,[object Object]
Samtycke,[object Object],Godtar behandling,[object Object],Viljeyttring,[object Object],Frivillig,[object Object],Särskild,[object Object],Otvetydig,[object Object],Efter information,[object Object],Inga formkrav,[object Object],31,[object Object]
Behandling,[object Object],Personuppgifter får behandlas bara för särskilda, uttryckligt angivna ändamål. Uppgifter som man har samlat in för ett visst ändamål får man inte senare behandla på ett sätt som inte är förenligt med ändamålet.,[object Object]
Känsliga uppgifter,[object Object],Förbud gäller behandling av:,[object Object],Ras, etniskt ursprung, politiska åsikter, religiös eller filosofisk övertygelse, hälsa, sexualliv, samt medlemskap i fackförening,[object Object],Förbud gäller inte:,[object Object],Uttrycklig samtycke, offentliggjorda uppgifter, nödvändig behandling, inom ideella org., inom hälso- & sjukvård,[object Object]
bits of INFORMATION,[object Object]
Social Media & Integrity
autonomy,[object Object]
And what about Manufacturers responsibility?,[object Object]
Won’t someone think of the CHILDREN,[object Object]
Social Media & Integrity
Child Locator GPS Watch,[object Object]
Teen arrive alive,[object Object]
& other interesting toys,[object Object]
Shower AM-FM Mirror Radio  ,[object Object]
AM/FM Clock radio wireless hidden camera,[object Object]
System #fail,[object Object]
Social Media & Integrity
Social Media & Integrity
What is social media?,[object Object]
Social Media & Integrity
Social Media & Integrity
12 timmar senare,[object Object]
Strategy,[object Object]
Technology	controls how & what we interact, create & THink…,[object Object]
Blogger 1999,[object Object],2001,[object Object],2003,[object Object],2005,[object Object],2000,[object Object],2002,[object Object],2004,[object Object],2006,[object Object],Wikipedia,[object Object],Sharing decade,[object Object]
My Space,[object Object],Linkedin,[object Object],Blogger 1999,[object Object],2001,[object Object],2003,[object Object],2005,[object Object],2000,[object Object],2002,[object Object],2004,[object Object],2006,[object Object],Second Life,[object Object],Skype,[object Object],Wikipedia,[object Object],Google c:a 1998,[object Object]
My Space,[object Object],Digg,[object Object],YouTube,[object Object],Linkedin,[object Object],Blogger 1999,[object Object],2001,[object Object],2003,[object Object],2005,[object Object],2000,[object Object],2002,[object Object],2004,[object Object],2006,[object Object],Ning,[object Object],Second Life,[object Object],Skype,[object Object],Facebook,[object Object],Flickr,[object Object],Wikipedia,[object Object],Google c:a 1998,[object Object]
My Space,[object Object],Digg,[object Object],Twitter,[object Object],YouTube,[object Object],Linkedin,[object Object],Blogger 1999,[object Object],2001,[object Object],2003,[object Object],2005,[object Object],2000,[object Object],2002,[object Object],2004,[object Object],2006,[object Object],Ning,[object Object],Second Life,[object Object],Spotify,[object Object],Flickr,[object Object],Skype,[object Object],Facebook,[object Object],Wikipedia,[object Object],Google c:a 1998,[object Object]
My Space,[object Object],Digg,[object Object],Twitter,[object Object],iphone,[object Object],YouTube,[object Object],Wikileaks,[object Object],Linkedin,[object Object],Blogger 1999,[object Object],2007,[object Object],2009,[object Object],2001,[object Object],2003,[object Object],2005,[object Object],2000,[object Object],2002,[object Object],2004,[object Object],2006,[object Object],2008,[object Object],Farmville,[object Object],Ning,[object Object],Second Life,[object Object],Spotify,[object Object],Flickr,[object Object],Skype,[object Object],Facebook,[object Object],Wikipedia,[object Object],Google c:a 1998,[object Object]
Social Media & Integrity
Anything that is in the world when you’re born is normal and ordinary and is just a natural part of the way the world works. Anything that’s invented between when you’re fifteen and thirty-five is new and exciting and revolutionary and you can probably get a career in it. Anything invented after you’re thirty-five is against the natural order of things.,[object Object]
61,[object Object]
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
2006,[object Object],2007,[object Object]
we “leak” INFORMATION,[object Object]
…sometimes we shout…,[object Object]
We apply strategies of information control,[object Object]
COMPARTMENTALIZATION,[object Object]
Social Media & Integrity
The problem is not that people know things about us but to limit who knows what…,[object Object]
&,[object Object]
searchability,[object Object]
Delete:The Virtue of Forgetting in the Digital Age,[object Object],Viktor Mayer-Schönberger,[object Object]
New social norms,[object Object]
Convenience is king,[object Object]
Enter the age of FREE,[object Object]
Social Media & Integrity
Sökmotor,[object Object],Reader,[object Object],Maps,[object Object],Kalender,[object Object],Scholar,[object Object],Och mycket mer…,[object Object],GRATIS?,[object Object]
The Gmail service includes relevant advertising and related links based on the IP address, content of messages and other information related to your use of Gmail.,[object Object],We provide advertisers only aggregated non-personal information such as the number of times one of their ads was clicked. We do not sell, rent or otherwise share your personal information with any third parties except in the limited circumstances described in the Google Privacy Policy, such as when we believe we are required to do so by law.,[object Object]
Social Media & Integrity
Leaking & shouting,[object Object]
So whats new?,[object Object]
If you are not paying for it, you're not the customer; you're the product being sold.,[object Object]
From Orwell to Huxley,[object Object]
Testing a theory,[object Object]
Social Media & Integrity
interesting resultS,[object Object]
“Statisk information”,[object Object],Addresser,[object Object],Telefonnummer,[object Object],Inkomster, ekonomi & deklarationer,[object Object],Utbildning,[object Object]
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
Social Media & Integrity
There is a great difference between knowing and understanding: you can know a lot about something and not really understand it.,[object Object],CHARLES KETTERING,[object Object]
Social Media & Integrity
Understanding others use,[object Object],The misapplication of information,[object Object]
Some examples,[object Object]
Social Media & Integrity
Social Media & Integrity
Goodbye Sister MaríaJesúsGalán,[object Object]
Norwegian politician,[object Object]
Medical staff,[object Object]
Parents!,[object Object]
Paul Chambers,[object Object],"Crap! Robin Hood airport is closed. You've got a week and a bit to get your shit together otherwise I'm blowing the airport sky high!",[object Object]
Navy instructor pilots lose flying status for Lake Tahoe dip,[object Object]
"En dag kvaravveckanpådettadårhus",[object Object]
MATS MÜGGE,[object Object],”Jättebrabarnskötare - men textenärinteförenlig med vårverksamhet”,[object Object]
Nakenrektor,[object Object]
You’ve got mail…,[object Object],En berättelse om GU, ,[object Object],Google ,[object Object],& studenternas mail,[object Object]
Why?,[object Object]
The network effect,[object Object]
You know you want to…,[object Object],The design effect,[object Object]
If you’re not the customer you’re the product,[object Object]
Eula trumps rights,[object Object]
Purpose of rights?,[object Object]
Autonomy!,[object Object]
Autonomy without knowledge…,[object Object]
Social Media & Integrity
© Matt McKeon ,[object Object]
© Matt McKeon ,[object Object]
© Matt McKeon ,[object Object]
© Matt McKeon ,[object Object]
© Matt McKeon ,[object Object]
How law fails,[object Object],[object Object]
 Respect for Autonomy
 The lost role of the state,[object Object]
Thank you!,[object Object]

Mais conteúdo relacionado

Semelhante a Social Media & Integrity

Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
Personal Privacy In Big Brother
Personal Privacy In Big BrotherPersonal Privacy In Big Brother
Personal Privacy In Big BrotherLorri Bynes
 
2600 v21 n3 (autumn 2004)
2600 v21 n3 (autumn 2004)2600 v21 n3 (autumn 2004)
2600 v21 n3 (autumn 2004)Felipe Prado
 
Privacy with Internet
Privacy with InternetPrivacy with Internet
Privacy with InternetMathias Klang
 
2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)Felipe Prado
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Ryland Sherman
 
Privacy Is The Primary Guideline For The Privacy
Privacy Is The Primary Guideline For The PrivacyPrivacy Is The Primary Guideline For The Privacy
Privacy Is The Primary Guideline For The PrivacyNicole Kathol
 
National Security Vs. Personal Privacy
National Security Vs. Personal PrivacyNational Security Vs. Personal Privacy
National Security Vs. Personal PrivacyKimberly Haynes
 
How Has The Internet Changed Personal Privacy
How Has The Internet Changed Personal PrivacyHow Has The Internet Changed Personal Privacy
How Has The Internet Changed Personal PrivacyMia Malone
 
Pros And Cons Of Government Surveillance
Pros And Cons Of Government SurveillancePros And Cons Of Government Surveillance
Pros And Cons Of Government SurveillanceLorri Bynes
 
2600 v21 n4 (winter 2004)
2600 v21 n4 (winter 2004)2600 v21 n4 (winter 2004)
2600 v21 n4 (winter 2004)Felipe Prado
 
WHISTLE-BLOWING
WHISTLE-BLOWINGWHISTLE-BLOWING
WHISTLE-BLOWINGAjeesh Mk
 
Alla vet allt om dig
Alla vet allt om digAlla vet allt om dig
Alla vet allt om digMathias Klang
 
Policy, Media, and Power.ppt
Policy, Media, and Power.pptPolicy, Media, and Power.ppt
Policy, Media, and Power.pptJohnny Schaefer
 
1984 Personal Privacy Analysis
1984 Personal Privacy Analysis1984 Personal Privacy Analysis
1984 Personal Privacy AnalysisAlison Carias
 
Persuasive Paper On Privacy And Privacy
Persuasive Paper On Privacy And PrivacyPersuasive Paper On Privacy And Privacy
Persuasive Paper On Privacy And PrivacyElizabeth Brooks
 
Invasion Of Privacy In The United States
Invasion Of Privacy In The United StatesInvasion Of Privacy In The United States
Invasion Of Privacy In The United StatesLaura Martin
 
Privacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issuePrivacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issueThe PRactice
 
Whistleblowers Research Paper
Whistleblowers Research PaperWhistleblowers Research Paper
Whistleblowers Research PaperGina Alfaro
 

Semelhante a Social Media & Integrity (20)

Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
Personal Privacy In Big Brother
Personal Privacy In Big BrotherPersonal Privacy In Big Brother
Personal Privacy In Big Brother
 
2600 v21 n3 (autumn 2004)
2600 v21 n3 (autumn 2004)2600 v21 n3 (autumn 2004)
2600 v21 n3 (autumn 2004)
 
Privacy with Internet
Privacy with InternetPrivacy with Internet
Privacy with Internet
 
2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316
 
Privacy Is The Primary Guideline For The Privacy
Privacy Is The Primary Guideline For The PrivacyPrivacy Is The Primary Guideline For The Privacy
Privacy Is The Primary Guideline For The Privacy
 
National Security Vs. Personal Privacy
National Security Vs. Personal PrivacyNational Security Vs. Personal Privacy
National Security Vs. Personal Privacy
 
How Has The Internet Changed Personal Privacy
How Has The Internet Changed Personal PrivacyHow Has The Internet Changed Personal Privacy
How Has The Internet Changed Personal Privacy
 
Pros And Cons Of Government Surveillance
Pros And Cons Of Government SurveillancePros And Cons Of Government Surveillance
Pros And Cons Of Government Surveillance
 
2600 v21 n4 (winter 2004)
2600 v21 n4 (winter 2004)2600 v21 n4 (winter 2004)
2600 v21 n4 (winter 2004)
 
WHISTLE-BLOWING
WHISTLE-BLOWINGWHISTLE-BLOWING
WHISTLE-BLOWING
 
whistleblowing
whistleblowingwhistleblowing
whistleblowing
 
Alla vet allt om dig
Alla vet allt om digAlla vet allt om dig
Alla vet allt om dig
 
Policy, Media, and Power.ppt
Policy, Media, and Power.pptPolicy, Media, and Power.ppt
Policy, Media, and Power.ppt
 
1984 Personal Privacy Analysis
1984 Personal Privacy Analysis1984 Personal Privacy Analysis
1984 Personal Privacy Analysis
 
Persuasive Paper On Privacy And Privacy
Persuasive Paper On Privacy And PrivacyPersuasive Paper On Privacy And Privacy
Persuasive Paper On Privacy And Privacy
 
Invasion Of Privacy In The United States
Invasion Of Privacy In The United StatesInvasion Of Privacy In The United States
Invasion Of Privacy In The United States
 
Privacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issuePrivacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issue
 
Whistleblowers Research Paper
Whistleblowers Research PaperWhistleblowers Research Paper
Whistleblowers Research Paper
 

Mais de Mathias Klang

Surveillance in the Simulacrum
Surveillance in the SimulacrumSurveillance in the Simulacrum
Surveillance in the SimulacrumMathias Klang
 
Web of Introverts and Selfie Culture
Web of Introverts and Selfie CultureWeb of Introverts and Selfie Culture
Web of Introverts and Selfie CultureMathias Klang
 
Screens & Maps: Is seeing believing?
Screens & Maps: Is seeing believing?Screens & Maps: Is seeing believing?
Screens & Maps: Is seeing believing?Mathias Klang
 
Sharing, oversharing and selfies
Sharing, oversharing and selfiesSharing, oversharing and selfies
Sharing, oversharing and selfiesMathias Klang
 
Copyright & Licensing: The progress of science & useful arts
Copyright & Licensing: The progress of science & useful arts Copyright & Licensing: The progress of science & useful arts
Copyright & Licensing: The progress of science & useful arts Mathias Klang
 
Academic Writing: Things to think about.
Academic Writing: Things to think about. Academic Writing: Things to think about.
Academic Writing: Things to think about. Mathias Klang
 
Civil Disobedience & Technology
Civil Disobedience & TechnologyCivil Disobedience & Technology
Civil Disobedience & TechnologyMathias Klang
 
Regulating Online Public/Private Spaces
Regulating Online Public/Private Spaces Regulating Online Public/Private Spaces
Regulating Online Public/Private Spaces Mathias Klang
 
Public/Private Spaces: Pulling things together
Public/Private Spaces: Pulling things togetherPublic/Private Spaces: Pulling things together
Public/Private Spaces: Pulling things togetherMathias Klang
 
Digital Divides and Net Neutrality
Digital Divides and Net NeutralityDigital Divides and Net Neutrality
Digital Divides and Net NeutralityMathias Klang
 
Design and Access to the city
Design and Access to the cityDesign and Access to the city
Design and Access to the cityMathias Klang
 
Cities, Suburbs & Design
Cities, Suburbs & DesignCities, Suburbs & Design
Cities, Suburbs & DesignMathias Klang
 
Technologies of control & desire
Technologies of control & desireTechnologies of control & desire
Technologies of control & desireMathias Klang
 
Introduction to Civic Media com371
Introduction to Civic Media com371Introduction to Civic Media com371
Introduction to Civic Media com371Mathias Klang
 
Platforms of Restraint: News aggregators, open webs & community
Platforms of Restraint: News aggregators, open webs & communityPlatforms of Restraint: News aggregators, open webs & community
Platforms of Restraint: News aggregators, open webs & communityMathias Klang
 
Is that your book? On content & carriers
Is that your book? On content & carriersIs that your book? On content & carriers
Is that your book? On content & carriersMathias Klang
 

Mais de Mathias Klang (20)

Surveillance in the Simulacrum
Surveillance in the SimulacrumSurveillance in the Simulacrum
Surveillance in the Simulacrum
 
Web of Introverts and Selfie Culture
Web of Introverts and Selfie CultureWeb of Introverts and Selfie Culture
Web of Introverts and Selfie Culture
 
Klang PSU
Klang PSUKlang PSU
Klang PSU
 
Screens & Maps: Is seeing believing?
Screens & Maps: Is seeing believing?Screens & Maps: Is seeing believing?
Screens & Maps: Is seeing believing?
 
Sharing, oversharing and selfies
Sharing, oversharing and selfiesSharing, oversharing and selfies
Sharing, oversharing and selfies
 
Copyright & Licensing: The progress of science & useful arts
Copyright & Licensing: The progress of science & useful arts Copyright & Licensing: The progress of science & useful arts
Copyright & Licensing: The progress of science & useful arts
 
FOSS & Society
FOSS & SocietyFOSS & Society
FOSS & Society
 
Academic Writing: Things to think about.
Academic Writing: Things to think about. Academic Writing: Things to think about.
Academic Writing: Things to think about.
 
Civil Disobedience & Technology
Civil Disobedience & TechnologyCivil Disobedience & Technology
Civil Disobedience & Technology
 
Regulating Online Public/Private Spaces
Regulating Online Public/Private Spaces Regulating Online Public/Private Spaces
Regulating Online Public/Private Spaces
 
Public/Private Spaces: Pulling things together
Public/Private Spaces: Pulling things togetherPublic/Private Spaces: Pulling things together
Public/Private Spaces: Pulling things together
 
Digital Divides and Net Neutrality
Digital Divides and Net NeutralityDigital Divides and Net Neutrality
Digital Divides and Net Neutrality
 
Design and Access to the city
Design and Access to the cityDesign and Access to the city
Design and Access to the city
 
Cities, Suburbs & Design
Cities, Suburbs & DesignCities, Suburbs & Design
Cities, Suburbs & Design
 
Control by design
Control by designControl by design
Control by design
 
Technologies of control & desire
Technologies of control & desireTechnologies of control & desire
Technologies of control & desire
 
Introduction to Civic Media com371
Introduction to Civic Media com371Introduction to Civic Media com371
Introduction to Civic Media com371
 
Image by Wikipedia?
Image by Wikipedia?Image by Wikipedia?
Image by Wikipedia?
 
Platforms of Restraint: News aggregators, open webs & community
Platforms of Restraint: News aggregators, open webs & communityPlatforms of Restraint: News aggregators, open webs & community
Platforms of Restraint: News aggregators, open webs & community
 
Is that your book? On content & carriers
Is that your book? On content & carriersIs that your book? On content & carriers
Is that your book? On content & carriers
 

Social Media & Integrity

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 11.
  • 14.
  • 17.
  • 18.
  • 19.
  • 21.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 36.
  • 37.
  • 38.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 48.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 60.
  • 61.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 79.
  • 80.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 88.
  • 89.
  • 94.
  • 96.
  • 97.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114.
  • 115.
  • 116.
  • 117.
  • 119.
  • 120.
  • 121.
  • 122.
  • 123.
  • 124.
  • 125. Respect for Autonomy
  • 126.
  • 127.
  • 128.

Notas do Editor

  1. Came hameháááá! from R'eyes cc by
  2. Reach from Nick in exsilio cc by ncsa
  3. guns kill by warein.holgado by nc sa
  4. OK, who gave the monkey a ray gun_! by Don Solo cc by nc sa
  5. starling flock by pastaboy sleeps cc byLangford Winner Autonomous Technology
  6. 12-06 by Daniel*1977 cc by nc sa
  7. What are you looking at? by Enjoy Surveillance cc by nc sa
  8. 1888 - Kodak nr 1 FörstamassproduceradelådkameranEnkelattanvändaBärbarKortexponeringstid
  9. Bismarck on his deathbed: Maybe this is the first example of the works of Paperazzi: Max Priester & Willy Wilcke took this picture secretly without consent; the even managed to shift the body so that the face would be more visible and turned the clock back. They sold the pictures until the Bismarck family confiscated the plates. The pictures later appeared in a.o. the Frankfurter Illustrierte
  10. A reporter for the New York Daily News, Thomas Howard, sat in the front row as a womannamed Ruth Snyder sat in the electric chair, in Sing Sing, in 1928; he had a concealed camera onhis ankle, and he took a picture of Snyder as the electricity surged through her body. The picturesold an incredible amount of newspapers
  11. Louis Brandeis & Samuel Warren "The Right to Privacy," 4 Harvard Law Review 193-220 (1890-91)
  12. Archives des députés allemands from hamadryades cc by nc sa
  13. Home Computer (by unknown) from Stijn Vogels cc by nc sa
  14. Police 1920 from Eridony cc by
  15. Protection 4 from Jasmin Cormier cc by nc THIS IMAGE IS USED TWICE ON THE SAME SLIDE
  16. business person from Tim Morgan cc by nc sa
  17. Pressed into Service from horizontal.integration cc by nc sa
  18. I Know I Have Lost from Kevan cc by nc
  19. Wilbur Likes Leaves from mommamia cc by nc sa
  20. can birds have a dog fight? by threecee cc by ncsa
  21. running after pigeons by wrote cc by ncSchoolkid chipping trial 'a success'http://www.theregister.co.uk/2007/10/22/kid_chipping_doncaster_go/
  22. http://www.spyshops.ca/trackerbackpack.htm
  23. http://www.brickhousesecurity.com/wf200.html
  24. LEGO Gears of War Minifigs by Dunechaser by nc sa
  25. http://www.dpl-surveillance-equipment.com/100611.html
  26. http://www.dpl-surveillance-equipment.com/1006177.html
  27. evil cat from gagilas cc by sa
  28. AIR travellers will be invited to take part in "virtual strip searches" [X-rays] at Australian airports when the Federal Government begins trials of security screening measures this month. The measures include a body scanner [X-rays] that can see what lies under a person's clothes. The Government says the scanner could detect weapons and explosives, but critics say it is an invasion of privacy. "It provides detailed images of a person's body … which many people might find highly embarrassing," said Stephen Blanks, of the NSW Council for Civil Liberties.http://publik18.blogspot.com/2008/10/privacy-health-fears-over-airport-body.html
  29. http://www.infowars.com/exposed-naked-body-scanner-images-of-film-star-printed-circulated-by-airport-staff/
  30. 11-23-17 from code poet cc by nc sa
  31. Torsdag 3 februari
  32. Chinese chess from whitecat singapore cc by nc
  33. Orkut Demographics http://www.orkut.com/MembersAllHabbo http://www.sulake.com/habbo/index.html?navi=2.1
  34. https://secure.wikimedia.org/wikipedia/en/wiki/List_of_virtual_communities_with_more_than_100_million_users
  35. green on green with red from Darwin Bell cc by
  36. is he talking to me from Leonard John Matthews cc by nc sa
  37. capítulo 1 by atzu cc by nc sa
  38. Salt pans from dachalan cc by nc sa
  39. Always Look on the Bright Side of... from Jon McGovern cc by nc
  40. My manta ray's alright... by dachalan cc by ncsa
  41. Looking for gators..... from katieb50 cc by
  42. goldfish from a_trotskyite cc by nc sa
  43. New Scientist is getting wet from gagilas cc by sa
  44. Google automatically scans e-mails to add context-sensitive advertisements to them. Privacy advocates raised concerns that the plan involved scanning their personal, assumed private, e-mails, and that this was a security problem. Allowing e-mail content to be read, even by a computer, raises the risk that the expectation of privacy in e-mail will be reduced. Furthermore, e-mail that non-subscribers choose to send to Gmail accounts is scanned by Gmail as well, even though those senders never agreed to Gmail's terms of service or privacy policy. Google can change its privacy policy unilaterally and Google is technically able to cross-reference cookies across its information-rich product line to make dossiers on individuals. However, most e-mail systems make use of server-side content scanning in order to check for spam.[41][42]Privacy advocates also regard the lack of disclosed data retention and correlation policies as problematic. Google has the ability to combine information contained in a person's e-mail messages with information from Internet searches. Google has not confirmed how long such information is kept or how it can be used. One of the concerns is that it could be of interest to law enforcement agencies. More than 30 privacy and civil liberties organizations have urged Google to suspend Gmail service until these issues are resolved.[43]Gmail's privacy policy contains the clause: "residual copies of deleted messages and accounts may take up to 60 days to be deleted from our active servers and may remain in our offline backup systems". Google points out that Gmail adheres to most industry-wide practices. Google has stated that they will "make reasonable efforts to remove deleted information from our systems as quickly as is practical."[44][45]Google defends its position by citing their use of email-scanning to the user's benefit. Google states that Gmail refrains from displaying ads next to potentially sensitive messages such as those that mention tragedy, catastrophe, or death.[4
  45. Consumer Watchdogs Flog Google's Privacy Policy (2008)http://techdailydose.nationaljournal.com/2008/06/consumer-watchdogs-flog-google.phpGoogle originally placed a cookie on each registered user's computer, which can be used to track that person's search history, and that cookie was not set to expire until 2038.[12] As of 2007, Google's cookie now expires in two years but renews itself when a Google service is used.[12] There is no evidence that Google turns over information to the FBI or the NSA, though some users remain anxious about the possibility.[12] In response, Google claims cookies are necessary to maintain user preferences between sessions and offer other search features. Other popular search engines, such as Yahoo! Search and Microsoft's Bing, use cookies with distant expiration dates as well.Privacy International has raised concerns regarding the dangers and privacy implications of having a centrally-located, widely popular data warehouse of millions of Internet users' searches, and how under controversial existing U.S. law, Google can be forced to hand over all such information to the U.S. government[13]. In early 2005, the United States Department of Justice filed a motion in federal court to force Google to comply with a subpoena for, "the text of each search string entered onto Google's search engine over a one-week period (absent any information identifying the person who entered such query)."[14] Google fought the subpoena, due to concerns about users' privacy.[15] In March 2006, the court ruled partially in Google's favor, recognizing the privacy implications of turning over search terms and refusing to grant access.[16]Steve Ballmer[17], Liz Figueroa[18], Mark Rasch[19], and the editors of Google Watch[20] believe the processing of email message content by Google's Gmail service goes beyond proper use. Google claims that mail sent to or from Gmail is never read by a human being beyond the account holder, and is only used to improve relevance of advertisements.[21] Whether Google is the only one doing this or simply the only one who publicly admits it is unknown, since the privacy policies of other popular email services, like Hotmail and Yahoo, allows for collection and utilizing of personal information for ads when using their services, but do not specify precisely what information and which services[22][23].Google's online map service, "Street View" has been accused of taking pictures and coming too close inside people's private homes and/or people who walk down the street not knowing they are being watched on Google's service.[24][25] Aaron and Christine Boring, a Pittsburgh couple, sued Google for "invasion of privacy". They claimed that Street View made a photo of their home available online, and it diminished the value of their house, which was purchased for its privacy.[26] They lost their case in a Pennsylvania court. "While it is easy to imagine that many whose property appears on Google's virtual maps resent the privacy implications, it is hard to believe that any – other than the most exquisitely sensitive – would suffer shame or humiliation," Judge Hay ruled.[27]In its 2007 Consultation Report, Privacy International ranked Google as "Hostile to Privacy", its lowest rating on their report, making Google the only company in the list to receive that ranking.[28][29]Carl Hewitt noted that intimate personal information is a "toxic asset" in Google datacenters because it will lead to government regulation "analogous to nuclear power plants," Consequently, he recommended that Google should perform semantic integration in clients' clouds so that client information in Google datacenters could be decrypted only by using a client's private key.[30][edit] European UnionEuropean Union (EU) data protection officials (the Article 29 working party who advise the EU on privacy policy) have written to Google asking the company to justify its policy of keeping information on individuals’ internet searches for up to two years. The letter questioned whether Google has “fulfilled all the necessary requirements” on the EU laws concerning data protection.[31] The probe by the EU into the data protection issue, As of 24 May 2007 (2007 -05-24)[update] is continuing. On 1 June Google agreed that its privacy policy is vague, and that they are constantly working at making it clearer to users.[32] The resulting modifications to its privacy policies have been met with praise[33].[edit] NorwayThe Data Inspectorate of Norway (Norway is not a member of the EU) has investigated Google (and others) and has stated that the 18- to 24-month period for retaining data proposed by Google was too long.[34]
  46. Seamour Sheep + MacBook from Andy Woo cc by nc sa
  47. as train goes by... from atzu cc by nc sa
  48. secret by MistoAcrilico secret from MistoAcrilico cc by nc
  49. 070_365 -- War Is Peace from matthileo cc by nc sa
  50. Who Else Has A Bright Idea? by nhuisman cc by nc sa
  51. 01 students in anatomy class in lecture hall by blacque_jacques cc by nc sa
  52. line by Bright Tal cc by nc sa
  53. Lincoln in the light by mr_mayer cc by nc sa
  54. Iceberg from sweart cc by nc sa
  55. Before you go, can you read my... from YamiPaperDreams!.- cc by nc sa
  56. no entry from notsogoodphotography cc by
  57. Shop Local from fabbio cc by sa
  58. Get thee to a nunnery from kevindooley cc byMaríaJesúsGalán, dubbed 'Sister Internet', had almost 600 Facebook 'friends'at the time of her eviction  Photo: FACEBOOKThe Telegraph http://www.telegraph.co.uk/technology/facebook/8333810/Spanish-nun-expelled-from-order-over-Facebook-usage.html
  59. Stella MwangiRita Ormbostad, deputy mayor of Aure County on Norway’s west coast, wrote that she would rather have “Sami, polar bears and muskox” as winners and that “that’s what we should sell, not that we are open to asylum seekers!”Ormbostad later added that she had “sharpened a spear and bought bongo drums” in anticipation of the Eurovision finals where Mwangi will represent Norway. “Maybe I’ll travel to Africa and watch from there, where I can eat wildebeest!”Ormbostad tried to brush off her comments as merely a joke, but also told local newspaper TidensKrav that “I believe something originally Norwegian sells more and is more suitable for the Norwegian Grand Prix than a song that has African tendencies.”
  60. the doctor will see you now from CmdrCord cc by ncsa
  61. I'm working.(1) by purprin cc by ncsa
  62. My tweet was silly, but the police reaction was absurdFor one joke on Twitter I've had my civil liberties trampled on, and have now got a criminal record“Unfortunately,yesterday I was found guilty and ordered to pay £1,000 in fines and legal costs, which I have to find along with my own legal costs of another £1,000. I am considering an appeal, though I have no means, having left my job due to the circumstances.”http://www.guardian.co.uk/commentisfree/libertycentral/2010/may/11/tweet-joke-criminal-record-airport
  63. Two Navy instructor pilots from San Diego have been forever stripped of flying status and two student pilots will have to repeat training because of a September incident in which they dipped two $33 million helicopters into Lake Tahoe while trying to take photos for the squadron’s Facebook page, a Navy official said Wednesday.http://www.signonsandiego.com/news/2010/dec/22/no-punishment-navy-pilots-who-dipped-helos-lake-ta/http://www.youtube.com/watch?v=qYExH8hpgXI&feature=player_embedded
  64. nuts from Ednaar cc by nd, skrevmannenpåFacebooki en pauspåjobbetpå Volvo iSkövde. Detkostadehonomjobbet. Illojalt, ansåg Volvo ochskickade hem mannendirekt. http://gt.expressen.se/nyheter/1.2275866/kallade-jobb-darhus-mannen-far-sparken
  65. I just couldn’t live with myself... from Eric "Claptøn" Nelsøn cc by nc sa
  66. Why do you do this every day? from edmittance cc by ncsa
  67. Forest For The Nails from Brandon Heyer cc by ncsa
  68. Prego from marcodede cc by
  69. [قطرةتفاؤل] from [ALHanouf _ Photography's]²º¹¹ cc by
  70. Untitled from Kennedy Garrett cc by
  71. Barbie And Barbie's Boyfrend Use... from kiewic cc by
  72. Eskatol (8 of 12) from Synne Tonidas cc by nc sa
  73. Fancy Glasses by RobertFrancis cc by ncsa
  74. Graphic by Matt McKeon source http://mattmckeon.com/facebook-privacy/ This image is not CC licensed.
  75. Graphic by Matt McKeon source http://mattmckeon.com/facebook-privacy/ This image is not CC licensed.
  76. Graphic by Matt McKeon source http://mattmckeon.com/facebook-privacy/ This image is not CC licensed.
  77. Graphic by Matt McKeon source http://mattmckeon.com/facebook-privacy/ This image is not CC licensed.
  78. Graphic by Matt McKeon source http://mattmckeon.com/facebook-privacy/ This image is not CC licensed.
  79. black_face by rent-a-moose cc by ncsa
  80. Blyth beach huts from freefotouk cc by nc
  81. and in last place by ...tim cc by ncnd