13 - Computing and Society II

13 - Computing and Society II - Engineering and Society:...

Info iconThis preview shows pages 1–12. Sign up to view the full content.

View Full Document Right Arrow Icon
Copyright Gershon Weltman, 2009 Engineering and Society: Computing and Society II Dr. Gershon Weltman Engineering 183EW, UCLA SEAS Lecture 13
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
  2 Ethical Issues of Connectivity New Types of News and Gossip Online worldwide news sources Blogosphere, immediacy + interactivity Standards of truth and accountability Constructive and/or Destructive Behavior New Definitions of Manners On-line vs Off-line behaviors Own group vs. other groups loyalties Identified vs. fictitious presence New Issues of Privacy What YOU HOLD truly private What YOU WANT others to know What OTHERS KNOW anyway What OTHERS ARE DOING with the information What PROTECTION is available What RIGHTS TO INFORMATION exist
Background image of page 2
  3 Databases and Surveillance: Axioms Information will be the main determinant of power, influence and security in the 21 st century Power, influence and security are critical issues in society – therefore, information acquisition from databases and surveillance will be central technologies now and in the future As a corollary, how information is acquired, stored, distributed and used will be a major source of ethical and legal controversy
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
  4 Data Acquisition: Data and information acquired on a broadly defined population in the course of normal activities Surveillance: Data and information acquired on selected individuals or groups of individuals for a specifically defined purpose, for example: Investigation of past illegal and/or dangerous activities Prevention of future illegal and/or dangerous actions Recognition of potentially dangerous behavior patterns Today there is often overlap
Background image of page 4
  5 U.S. Constitution 4 th Amendment (1789) “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause , supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized .” The 4 th Amendment was prescient in framing present day privacy issues
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
  6 Prior Concern George Orwell 1949 Surveillance Newspeak
Background image of page 6
  7 Information Availability Gigantic amount of information available Ultra easy access Impossible to control Many different uses Many chances for abuse and misuse! http://www.fundrace.org/citymap.php?city=la
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
  8 Example: Building an eDossier “John Doe” “Jane Doe” • Address, Phone • Criminal Record • Lawsuits Judgments • Tax Liens • Bankruptcies Address • Employment • Activities Memberships • Publications • News Events Google.com Zaba.com Zillow.com Home Size • Home Value • Neighborhood
Background image of page 8
  9 Example: Tracking Individual Movement
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
  10 Example: Self Supplied Information www.myspace.com
Background image of page 10
  11 Example: Never Too Much Data SenseCam is a badge-sized wearable camera that captures up to 2000 VGA 
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/11/2010 for the course ENGR 183 taught by Professor Weltman during the Winter '08 term at UCLA.

Page1 / 42

13 - Computing and Society II - Engineering and Society:...

This preview shows document pages 1 - 12. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online