ENGR_183_W08_13 - Computing and Society II

ENGR_183_W08_13 - Computing and Society II - Engineering...

Info iconThis preview shows pages 1–12. Sign up to view the full content.

View Full Document Right Arrow Icon
Copyright Gershon Weltman, 2006 Engineering and Society: Computing and Society II Dr. Gershon Weltman Engineering 183, UCLA SEAS Lecture 13
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
  2 Ethical Issues of Connectivity New Types of News and Gossip Online worldwide news sources Blogosphere, immediacy + interactivity Standards of truth and accountability Constructive and/or Destructive Behavior Instantaneous effects Widespread effects New Definitions of Manners On-line vs Off-line behaviors Own group vs. other groups loyalties Identified vs. fictitious presence New Definitions of Privacy What YOU hold private What YOU want others to know What OTHERS know anyway What you can DO about it
Background image of page 2
  3 Databases and Surveillance Information will be the main determinant of power, influence and security in the 21 st century Database and surveillance technology will thus be a central societal factor now and in the future How information is acquired, stored, distributed and used will be a major source of ethical and legal controversy
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
  4 Data Acquisition: Data and information acquired on a broadly defined population in the course of normal activities Surveillance: Data and information acquired on selected individuals or groups of individuals for a specifically defined purpose, for example: Investigation of past illegal and/or dangerous activities Prevention of future illegal and/or dangerous actions Recognition of potentially dangerous behavior patterns Not always a clear difference
Background image of page 4
  5 U.S. Constitution 4 th Amendment (1789) “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause , supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized .” The 4 th Amendment was prescient in describing present day privacy issues.
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
  6 Prior Concern George Orwell 1949 Monitoring Newspeak
Background image of page 6
  7 Information Availability Gigantic amount of information available Ultra easy access Impossible to control Many different uses Many chances for abuse and misuse! http://www.fundrace.org/citymap.php?city=la Map of large Democratic & Republican donations in LA
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
  8 Examples: Individual Data “John Doe” “Jane Doe” • Address, Phone • Criminal Record • Lawsuits Judgments • Tax Liens • Bankruptcies Address • Employment • Activities Memberships • Publications • News Events Google.com Zaba.com Zillow.com Home Size • Home Value • Neighborhood
Background image of page 8
  9 Example: Individual Movement
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
  10 Example: Self Supplied Information www.myspace.com
Background image of page 10
  11 Example: Never Too Much Data SenseCam is a badge-sized wearable camera that captures up to 2000 VGA  images per day into 128Mbyte FLASH memory. In addition, sensor data such  as movement, light level and temperature is recorded every second. This is 
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 35

ENGR_183_W08_13 - Computing and Society II - Engineering...

This preview shows document pages 1 - 12. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online