SlideShare a Scribd company logo
1 of 8
Download to read offline
To what e xtent has
m odern soc iety killed
privacy?
                                                gel
                     ino Consin g and Jeremy En
By Connor Laurie, Ch
'Privac y is dead'

Is it really?
What is privacy?
How does the idea of privacy play into modern
society?
What are the different parts of society that
affect privacy?
What is privacy?

Dictionary: 'the state or condition of being
free from being observed or disturbed by
other people'

Is there more to it?

How do others
define it?
Mod ern Society

Celebrities: Paparazzi
Technological Advancements
Government: FBI
C elebrities
Problems:
● Paparazzi have invaded personal space and privacy
● Private lives exploited by magazines etc.
● They are watched much more closely
● Their actions are taken much more seriously and and
   they therefore have to act differently than normal.
ological Advancements
     Tech   n

-People announce what they are doing on social networks
(twitter, facebook)
-If your computer was to be stolen or hacked all history
and things your computer has been tracking will be
revealed.
-Everything that is being done on technology is being fed
to a company.
-Phones have GPS meaning you're being tracked at all
times.
G overnment

-With a search warrant police are allowed to invade your
privacy by entering your home or your personal items.
-Government organizations keep your history and what
you have been doing on your computer (CIA, FBI)
-If government is suspicious of you for a crime they may
send someone to spy on you.
n society ha s not killed
    How m   oder
    privacy
-Not everyone use social networks
-People may not use technology
-Government may not be as invasive
-Social norms have changed (Mark Zuckerberg)

Although it takes a lot of effort to have
privacy you can still have privacy in modern
areas.

More Related Content

What's hot

BCIT keynote
BCIT keynoteBCIT keynote
BCIT keynoteLisa Read
 
Internet censorship
Internet censorshipInternet censorship
Internet censorshipmateo davis
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronakRonak Karanpuria
 
Online communication per 4
Online communication per 4Online communication per 4
Online communication per 4MsEisman
 
Obscenity and Indecency
Obscenity and IndecencyObscenity and Indecency
Obscenity and IndecencyMiriam Smith
 
Misuse of internet
Misuse of internetMisuse of internet
Misuse of internetJincy24
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internetryangregory55
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenitysneha164
 
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)Frederick Lane
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Scott Mills
 
A2 Media Project Pitch
A2 Media Project PitchA2 Media Project Pitch
A2 Media Project PitchStrudwick
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorshipbecnicholas
 

What's hot (18)

BCIT keynote
BCIT keynoteBCIT keynote
BCIT keynote
 
Internet censorship
Internet censorshipInternet censorship
Internet censorship
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
 
Online communication per 4
Online communication per 4Online communication per 4
Online communication per 4
 
censorship bme-1
censorship bme-1censorship bme-1
censorship bme-1
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Obscenity and Indecency
Obscenity and IndecencyObscenity and Indecency
Obscenity and Indecency
 
Misuse of internet
Misuse of internetMisuse of internet
Misuse of internet
 
Obscenity on the Web
Obscenity on the WebObscenity on the Web
Obscenity on the Web
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internet
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
 
SENSE AND NONSENSE OF SOCIAL MEDIA
SENSE AND NONSENSE OF SOCIAL MEDIASENSE AND NONSENSE OF SOCIAL MEDIA
SENSE AND NONSENSE OF SOCIAL MEDIA
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
 
Censorship
CensorshipCensorship
Censorship
 
Censorship
CensorshipCensorship
Censorship
 
A2 Media Project Pitch
A2 Media Project PitchA2 Media Project Pitch
A2 Media Project Pitch
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 

Viewers also liked

Andamiodecomputadora 1 f_jessica
Andamiodecomputadora 1 f_jessicaAndamiodecomputadora 1 f_jessica
Andamiodecomputadora 1 f_jessicajessybalderas
 
Paparazzi documentary
Paparazzi documentaryPaparazzi documentary
Paparazzi documentaryNicole Melia
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentialityjlcapel
 
Paparazzi against stars
Paparazzi against starsPaparazzi against stars
Paparazzi against starsJulia
 
Bullying vs entertainment
Bullying vs entertainmentBullying vs entertainment
Bullying vs entertainmentayeceaeph
 
Our group
Our groupOur group
Our groupJulia
 
The strengths & pitfalls of social media fame flipbook
The strengths & pitfalls of social media fame flipbookThe strengths & pitfalls of social media fame flipbook
The strengths & pitfalls of social media fame flipbookRishi Vala
 
Privacy 2011 spring
Privacy 2011 springPrivacy 2011 spring
Privacy 2011 springMiriam Smith
 
Composition Power Point
Composition Power PointComposition Power Point
Composition Power PointSamiroquai
 
The Influence of Social Media on our Ever-Evolving Society
The Influence of Social Media on our Ever-Evolving SocietyThe Influence of Social Media on our Ever-Evolving Society
The Influence of Social Media on our Ever-Evolving SocietyChelsey McCord
 
Paparazzi and their impact
Paparazzi and their impactPaparazzi and their impact
Paparazzi and their impactbuaa92
 
Celebrity endorsements finally ppt
Celebrity endorsements finally pptCelebrity endorsements finally ppt
Celebrity endorsements finally pptMariyam Khan Baloch
 
CELEBRITY ENDORSEMENT
CELEBRITY ENDORSEMENTCELEBRITY ENDORSEMENT
CELEBRITY ENDORSEMENTKHYATI89
 
TOK Sense Perception Presentation
TOK Sense Perception Presentation TOK Sense Perception Presentation
TOK Sense Perception Presentation Filippo Pietrantonio
 

Viewers also liked (20)

Socials reflection
Socials reflectionSocials reflection
Socials reflection
 
Andamiodecomputadora 1 f_jessica
Andamiodecomputadora 1 f_jessicaAndamiodecomputadora 1 f_jessica
Andamiodecomputadora 1 f_jessica
 
Paparazzi
PaparazziPaparazzi
Paparazzi
 
Paparazzi documentary
Paparazzi documentaryPaparazzi documentary
Paparazzi documentary
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
 
Paparazzi - Lady Gaga
Paparazzi - Lady GagaPaparazzi - Lady Gaga
Paparazzi - Lady Gaga
 
Paparazzi against stars
Paparazzi against starsPaparazzi against stars
Paparazzi against stars
 
POSTMODERN FILMS
POSTMODERN FILMSPOSTMODERN FILMS
POSTMODERN FILMS
 
Bullying vs entertainment
Bullying vs entertainmentBullying vs entertainment
Bullying vs entertainment
 
Our group
Our groupOur group
Our group
 
The strengths & pitfalls of social media fame flipbook
The strengths & pitfalls of social media fame flipbookThe strengths & pitfalls of social media fame flipbook
The strengths & pitfalls of social media fame flipbook
 
Privacy 2011 spring
Privacy 2011 springPrivacy 2011 spring
Privacy 2011 spring
 
Composition Power Point
Composition Power PointComposition Power Point
Composition Power Point
 
Celebrity rights
Celebrity rightsCelebrity rights
Celebrity rights
 
The Influence of Social Media on our Ever-Evolving Society
The Influence of Social Media on our Ever-Evolving SocietyThe Influence of Social Media on our Ever-Evolving Society
The Influence of Social Media on our Ever-Evolving Society
 
Paraprofessionals and the Paparazzi—You Think You Know But You Have No Idea!
Paraprofessionals and the Paparazzi—You Think You Know But You Have No Idea!Paraprofessionals and the Paparazzi—You Think You Know But You Have No Idea!
Paraprofessionals and the Paparazzi—You Think You Know But You Have No Idea!
 
Paparazzi and their impact
Paparazzi and their impactPaparazzi and their impact
Paparazzi and their impact
 
Celebrity endorsements finally ppt
Celebrity endorsements finally pptCelebrity endorsements finally ppt
Celebrity endorsements finally ppt
 
CELEBRITY ENDORSEMENT
CELEBRITY ENDORSEMENTCELEBRITY ENDORSEMENT
CELEBRITY ENDORSEMENT
 
TOK Sense Perception Presentation
TOK Sense Perception Presentation TOK Sense Perception Presentation
TOK Sense Perception Presentation
 

Similar to Privacy tok

Privacy with Internet
Privacy with InternetPrivacy with Internet
Privacy with InternetMathias Klang
 
Privacy in social media: so what?
Privacy in social media: so what?Privacy in social media: so what?
Privacy in social media: so what?Mathias Klang
 
Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984Christy Davis
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxwhittemorelucilla
 
Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible? Mathias Klang
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of PrivacyDiane Allen
 
Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma Mathias Klang
 
A Paranoid Peek at Social Media
A Paranoid Peek at Social MediaA Paranoid Peek at Social Media
A Paranoid Peek at Social MediaMathias Klang
 
Failure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human RightsFailure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human RightsMathias Klang
 
Privacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issuePrivacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issueThe PRactice
 
Law, Ethics & Information Systems
Law, Ethics  & Information SystemsLaw, Ethics  & Information Systems
Law, Ethics & Information SystemsMathias Klang
 
Will technology set us free
Will technology set us freeWill technology set us free
Will technology set us freeMathias Klang
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Ryland Sherman
 
Surveillance, Sousveillance, Autoveillance
Surveillance, Sousveillance, AutoveillanceSurveillance, Sousveillance, Autoveillance
Surveillance, Sousveillance, AutoveillanceMathias Klang
 

Similar to Privacy tok (19)

Privacy with Internet
Privacy with InternetPrivacy with Internet
Privacy with Internet
 
Privacy in social media: so what?
Privacy in social media: so what?Privacy in social media: so what?
Privacy in social media: so what?
 
Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
Surveilance documents
Surveilance documentsSurveilance documents
Surveilance documents
 
Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
Digital Surveillance
Digital SurveillanceDigital Surveillance
Digital Surveillance
 
Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma
 
A Paranoid Peek at Social Media
A Paranoid Peek at Social MediaA Paranoid Peek at Social Media
A Paranoid Peek at Social Media
 
Failure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human RightsFailure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human Rights
 
Privacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issuePrivacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issue
 
Law, Ethics & Information Systems
Law, Ethics  & Information SystemsLaw, Ethics  & Information Systems
Law, Ethics & Information Systems
 
Social-Media
Social-MediaSocial-Media
Social-Media
 
Will technology set us free
Will technology set us freeWill technology set us free
Will technology set us free
 
Evgeny Morozov
Evgeny MorozovEvgeny Morozov
Evgeny Morozov
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316
 
Surveillance, Sousveillance, Autoveillance
Surveillance, Sousveillance, AutoveillanceSurveillance, Sousveillance, Autoveillance
Surveillance, Sousveillance, Autoveillance
 

More from gwsis

20150122 isr students workshop
20150122 isr students workshop20150122 isr students workshop
20150122 isr students workshopgwsis
 
Esf island school decant report 100614
Esf island school decant report 100614Esf island school decant report 100614
Esf island school decant report 100614gwsis
 
Intuition tok 2
Intuition tok 2Intuition tok 2
Intuition tok 2gwsis
 
Decant workshop 3.9.13
Decant workshop 3.9.13Decant workshop 3.9.13
Decant workshop 3.9.13gwsis
 
Cas week ppt
Cas week pptCas week ppt
Cas week pptgwsis
 
Pshe cas
Pshe casPshe cas
Pshe casgwsis
 
Pshe project ark eden powerpoint
Pshe project ark eden powerpointPshe project ark eden powerpoint
Pshe project ark eden powerpointgwsis
 
Pshe cas saving the pink dolphins
Pshe cas saving the pink dolphins Pshe cas saving the pink dolphins
Pshe cas saving the pink dolphins gwsis
 
Saving the dogs
Saving the dogsSaving the dogs
Saving the dogsgwsis
 
Pshe
PshePshe
Pshegwsis
 
Tekfishprezi
TekfishpreziTekfishprezi
Tekfishprezigwsis
 
Mothers choice
Mothers choiceMothers choice
Mothers choicegwsis
 
Cas exhibition
Cas exhibitionCas exhibition
Cas exhibitiongwsis
 
Tok prezis 2013
Tok prezis 2013Tok prezis 2013
Tok prezis 2013gwsis
 
Students 8 ways thinking q #1
Students 8 ways thinking q #1Students 8 ways thinking q #1
Students 8 ways thinking q #1gwsis
 
Students 8 ways thinking q #2
Students 8 ways thinking q #2Students 8 ways thinking q #2
Students 8 ways thinking q #2gwsis
 
Thinking questions final
Thinking questions finalThinking questions final
Thinking questions finalgwsis
 
Thinking questions
Thinking questionsThinking questions
Thinking questionsgwsis
 
Mock trial car accident (1) copy
Mock trial car accident (1) copyMock trial car accident (1) copy
Mock trial car accident (1) copygwsis
 
Tok ethics 10.4.13
Tok ethics 10.4.13Tok ethics 10.4.13
Tok ethics 10.4.13gwsis
 

More from gwsis (20)

20150122 isr students workshop
20150122 isr students workshop20150122 isr students workshop
20150122 isr students workshop
 
Esf island school decant report 100614
Esf island school decant report 100614Esf island school decant report 100614
Esf island school decant report 100614
 
Intuition tok 2
Intuition tok 2Intuition tok 2
Intuition tok 2
 
Decant workshop 3.9.13
Decant workshop 3.9.13Decant workshop 3.9.13
Decant workshop 3.9.13
 
Cas week ppt
Cas week pptCas week ppt
Cas week ppt
 
Pshe cas
Pshe casPshe cas
Pshe cas
 
Pshe project ark eden powerpoint
Pshe project ark eden powerpointPshe project ark eden powerpoint
Pshe project ark eden powerpoint
 
Pshe cas saving the pink dolphins
Pshe cas saving the pink dolphins Pshe cas saving the pink dolphins
Pshe cas saving the pink dolphins
 
Saving the dogs
Saving the dogsSaving the dogs
Saving the dogs
 
Pshe
PshePshe
Pshe
 
Tekfishprezi
TekfishpreziTekfishprezi
Tekfishprezi
 
Mothers choice
Mothers choiceMothers choice
Mothers choice
 
Cas exhibition
Cas exhibitionCas exhibition
Cas exhibition
 
Tok prezis 2013
Tok prezis 2013Tok prezis 2013
Tok prezis 2013
 
Students 8 ways thinking q #1
Students 8 ways thinking q #1Students 8 ways thinking q #1
Students 8 ways thinking q #1
 
Students 8 ways thinking q #2
Students 8 ways thinking q #2Students 8 ways thinking q #2
Students 8 ways thinking q #2
 
Thinking questions final
Thinking questions finalThinking questions final
Thinking questions final
 
Thinking questions
Thinking questionsThinking questions
Thinking questions
 
Mock trial car accident (1) copy
Mock trial car accident (1) copyMock trial car accident (1) copy
Mock trial car accident (1) copy
 
Tok ethics 10.4.13
Tok ethics 10.4.13Tok ethics 10.4.13
Tok ethics 10.4.13
 

Privacy tok

  • 1. To what e xtent has m odern soc iety killed privacy? gel ino Consin g and Jeremy En By Connor Laurie, Ch
  • 2. 'Privac y is dead' Is it really? What is privacy? How does the idea of privacy play into modern society? What are the different parts of society that affect privacy?
  • 3. What is privacy? Dictionary: 'the state or condition of being free from being observed or disturbed by other people' Is there more to it? How do others define it?
  • 4. Mod ern Society Celebrities: Paparazzi Technological Advancements Government: FBI
  • 5. C elebrities Problems: ● Paparazzi have invaded personal space and privacy ● Private lives exploited by magazines etc. ● They are watched much more closely ● Their actions are taken much more seriously and and they therefore have to act differently than normal.
  • 6. ological Advancements Tech n -People announce what they are doing on social networks (twitter, facebook) -If your computer was to be stolen or hacked all history and things your computer has been tracking will be revealed. -Everything that is being done on technology is being fed to a company. -Phones have GPS meaning you're being tracked at all times.
  • 7. G overnment -With a search warrant police are allowed to invade your privacy by entering your home or your personal items. -Government organizations keep your history and what you have been doing on your computer (CIA, FBI) -If government is suspicious of you for a crime they may send someone to spy on you.
  • 8. n society ha s not killed How m oder privacy -Not everyone use social networks -People may not use technology -Government may not be as invasive -Social norms have changed (Mark Zuckerberg) Although it takes a lot of effort to have privacy you can still have privacy in modern areas.