SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Surveillance
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Downer declares Wikipedia 'anti-government' By Steve Larkin ( news .com.au) August 24, 2007 03:41pm Article from: AAP THE online encyclopedia Wikipedia is anti-government, Foreign Affairs Minister Alexander Downer says. "My sort of recollection of Wikipedia sites is they are a bit, sort of, a bit anti-government, they are sort of a bit negative about people in the government," Mr Downer said today.  http://www.news.com.au/story/0,23599,22300570-29277,00.html#
http://www.australianit.news.com.au/story/0,24897,22317999-15306,00.html Tax gets tough on privacy Ben Woodhead |  August 28, 2007   FRAUD detection systems have uncovered a rash of privacy breaches at the Australian Taxation Office as employees flout tough data protection rules despite ongoing monitoring and training. The sweeps of data access logs led to three sackings during the 2007 financial year and another nine staff resigned after the ATO detected unauthorised access to taxpayer records.
Student cracks Government's $84m porn filter Article from: By Nick Higginbottom and Ben Packham August 26, 2007 12:30am A MELBOURNE schoolboy has cracked the Federal Government's new $84 million internet porn filter in minutes. Tom Wood, 16, said it took him just over 30 minutes to bypass the Government's filter, released on Tuesday.  Tom, a year 10 student at a southeast Melbourne private school, showed the  Herald Sun  how to deactivate the filter in a handful of clicks.  http://www.news.com.au/heraldsun/story/0,21985,22304224-662,00.html
Hackers steal data from Monster.com users Article from: Agence France-Presse August 23, 2007 12:00am HACKERS have stolen personal details of hundreds of thousands of users of US jobs website Monster.com, according to internet security firm Symantec.   A total of 1.6 million entries, including information such as names, postal addresses and telephone numbers were stolen, the firm said.   http://www.news.com.au/heraldsun/story/0,21985,22293044-11869,00.html
Hi-tech research outpaces law Bernard Lane |  August 22, 2007   RESEARCHERS riding the wave of hi-tech collaboration may leave lawyers and policymakers in their wake, commentators have warned following what is believed to be the first survey of legal issues raised by e-research. http://www.theaustralian.news.com.au/story/0,24897,22285146-12332,00.html
Uni plagiarists risk degrees Brendan O'Keefe |  August 22, 2007   THE University of New England will consider stripping students of their degrees if they are found to have cheated, following a spate of plagiarism in one of its masters programs. http://www.theaustralian.news.com.au/story/0,25197,22285283-12332,00.html
 
Menwith Hill, Photo: Duncan Campbell   http://cyberdelix.net/parvati/6929.html Echelon Echelon is a system used by the United States National Security Agency (NSA) to intercept and process international communications passing via communications satellites.
[object Object]
Image: courtesy University College London Library Jeremy Bentham’s  Panopticon
 
 
 
 
>>   [project proposal] - a live terror service
The panopticon project aims to widen the lens of the electronic eye on the street,  testing the boundaries and invasive nature of surveillance technologies,  questioning if privacy really can exist in the digital age.
 
http://www.efa.org.au/
 
http://www.disinfo.com/site/ http://www.notbored.org/the-scp.html Alternative news organisations and performance groups utilise online spaces and audiences.
Welcome to the Cyber Activists Network - AUSTRALIA Cyber Activism  - What is Cyber Activism?, well it's not being a Hacker or Cracker.  A Hacker  - is someone who maliciously breaks or tampers with things, … merely to disrupt and damage private property . A Cracker  - is someone who employs electronic means … with  intent to breach the security and profit or gain in some way by their actions. A Cyber Activist  -is none of these things previously mentioned. Quite simply a Cyber Activist is merely a description for the method of his/hers form of activism . Through the use of electronic media and communications, Cyber Activists attempt to be heard through e-mails, web sites, data and online communities working cohesively or independently to achieve social change.
Slapper Software , have constructed this web site to facilitate an  Online Cyber Activist's Network , which can greatly assist you in your efforts to bring about  social change . Please visit the Activist's Tools & Download Sections of this web site to learn more about how we can assist you. Internet Resources Activist’s Tools To prepare you better (Cyber Activists), we have provided information about issues such as security, personal privacy and how to automate repetitive tasks…and can greatly improve effectiveness and reduce the amount of time it takes. There are many resources used by a well prepared Cyber Activist, below is a list of these tools and how they can assist you. http://senatorslapper.netfirms.com/tools.htm
Electronic Disturbance Theatre  “ When we do a performance, our performance or our actions are considered symbolic gestures; we are trying to bring attention to a particular event or cause – we are not trying to do any criminal activity”. Conan, N. (2001).  Hacktivism.  The Connection. National Public Radio. Boston July 30.
Chapter 1. Introduction: The Virtual Condition  Chapter 2. Nomadic Power and Cultural Resistance  Chapter 3. Video and Resistance: Against Documentaries  Chapter 4. The Recombinant Theater and the  Performative  Matrix  Chapter 5. Utopian Plagiarism,  Hypertextuality , and Electronic Cultural Production   Chapter 6. Fragments on the Problem of Time   Chapter 7. Paradoxes and Contradictions   This book may be freely pirated and quoted.  The authors and publisher, however, would like to be so informed at the address below. http://www.critical-art.net/books/ted/
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],City of Perth  - recently installed surveillance cameras
http://www.landonline.com.au/
www.deportation.com

Weitere ähnliche Inhalte

Was ist angesagt?

Civic Technology on the Front Lines
Civic Technology on the Front LinesCivic Technology on the Front Lines
Civic Technology on the Front LinesChristopher Whitaker
 
Big Tech, Privacy, and Power
Big Tech, Privacy, and Power Big Tech, Privacy, and Power
Big Tech, Privacy, and Power Dharmendra Rama
 
Bodies and buildings nyu itp 4 8 2013
Bodies and buildings nyu itp 4 8 2013Bodies and buildings nyu itp 4 8 2013
Bodies and buildings nyu itp 4 8 2013Jennifer van der Meer
 
Ch12.global culture
Ch12.global cultureCh12.global culture
Ch12.global cultureBill Kovarik
 
The Future of the Internet
The Future of the InternetThe Future of the Internet
The Future of the Internetsagecast
 
Essay 3 annotated bibliography rough draft 18 july 2012
Essay 3 annotated bibliography rough draft 18 july 2012Essay 3 annotated bibliography rough draft 18 july 2012
Essay 3 annotated bibliography rough draft 18 july 2012rclambert
 
201102 gov 2.0 in australian government
201102   gov 2.0 in australian government201102   gov 2.0 in australian government
201102 gov 2.0 in australian governmentCraig Thomler
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsJyrki Kasvi
 
Public engagement. Public empowerment.
Public engagement. Public empowerment.Public engagement. Public empowerment.
Public engagement. Public empowerment.Stephen Collins
 
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityMetanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityDoug Thompson
 

Was ist angesagt? (20)

Group 1 Project
Group 1 Project Group 1 Project
Group 1 Project
 
Alade
AladeAlade
Alade
 
Civic Technology on the Front Lines
Civic Technology on the Front LinesCivic Technology on the Front Lines
Civic Technology on the Front Lines
 
Big Tech, Privacy, and Power
Big Tech, Privacy, and Power Big Tech, Privacy, and Power
Big Tech, Privacy, and Power
 
Bodies and buildings nyu itp 4 8 2013
Bodies and buildings nyu itp 4 8 2013Bodies and buildings nyu itp 4 8 2013
Bodies and buildings nyu itp 4 8 2013
 
Ch12.global culture
Ch12.global cultureCh12.global culture
Ch12.global culture
 
The Future of the Internet
The Future of the InternetThe Future of the Internet
The Future of the Internet
 
Essay 3 annotated bibliography rough draft 18 july 2012
Essay 3 annotated bibliography rough draft 18 july 2012Essay 3 annotated bibliography rough draft 18 july 2012
Essay 3 annotated bibliography rough draft 18 july 2012
 
10flatteners.20082009
10flatteners.2008200910flatteners.20082009
10flatteners.20082009
 
10flatteners.20082009
10flatteners.2008200910flatteners.20082009
10flatteners.20082009
 
Future Of Internet IV | AAAS
Future Of Internet IV | AAASFuture Of Internet IV | AAAS
Future Of Internet IV | AAAS
 
201102 gov 2.0 in australian government
201102   gov 2.0 in australian government201102   gov 2.0 in australian government
201102 gov 2.0 in australian government
 
5th manheim
5th manheim5th manheim
5th manheim
 
History of the Internet
History of the InternetHistory of the Internet
History of the Internet
 
Polinter11
Polinter11Polinter11
Polinter11
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual Worlds
 
DOPA presentation
DOPA presentationDOPA presentation
DOPA presentation
 
5th Estate at Rhodes House-2012
5th Estate at Rhodes House-20125th Estate at Rhodes House-2012
5th Estate at Rhodes House-2012
 
Public engagement. Public empowerment.
Public engagement. Public empowerment.Public engagement. Public empowerment.
Public engagement. Public empowerment.
 
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityMetanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
 

Andere mochten auch

Philosophy and Social Media 1: I Tweet, Therefore I Am
Philosophy and Social Media 1: I Tweet, Therefore I AmPhilosophy and Social Media 1: I Tweet, Therefore I Am
Philosophy and Social Media 1: I Tweet, Therefore I AmTimothy Rayner
 
Surveillance And Power
Surveillance And PowerSurveillance And Power
Surveillance And PowerMarj Kibby
 
Surveillance, copyright, freedom and privacy:opportunity and risk of video sh...
Surveillance, copyright, freedom and privacy:opportunity and risk of video sh...Surveillance, copyright, freedom and privacy:opportunity and risk of video sh...
Surveillance, copyright, freedom and privacy:opportunity and risk of video sh...Daniele Montemale
 
Protecting Privacy From Aerial Surveillance
Protecting Privacy From Aerial SurveillanceProtecting Privacy From Aerial Surveillance
Protecting Privacy From Aerial Surveillance- Mark - Fullbright
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentationaxnv
 
Postmodernism lesson 3
Postmodernism lesson 3Postmodernism lesson 3
Postmodernism lesson 3MissConnell
 
Surveillance and privacy panel
Surveillance and privacy panelSurveillance and privacy panel
Surveillance and privacy panelNewsquare
 
You Are Watched
You Are WatchedYou Are Watched
You Are WatchedMark Deuze
 
What Is Technocultures
What Is TechnoculturesWhat Is Technocultures
What Is Technoculturespsimm
 
What's Panopticism? Exploring Digital Cultures
What's Panopticism? Exploring Digital CulturesWhat's Panopticism? Exploring Digital Cultures
What's Panopticism? Exploring Digital CulturesNicola Giusto
 
Prof. Hendrik Speck - Privacy and Social Networks
Prof. Hendrik Speck - Privacy and Social NetworksProf. Hendrik Speck - Privacy and Social Networks
Prof. Hendrik Speck - Privacy and Social NetworksHendrik Speck
 
Trust and Reputation on the Social Web
Trust and Reputation on the Social WebTrust and Reputation on the Social Web
Trust and Reputation on the Social WebTimothy Rayner
 
Selfies, Surveillance and the Voluntary Panopticon
Selfies, Surveillance and the Voluntary Panopticon Selfies, Surveillance and the Voluntary Panopticon
Selfies, Surveillance and the Voluntary Panopticon piero scaruffi
 
The digital divide in the post-Snowden era
The digital divide in the post-Snowden eraThe digital divide in the post-Snowden era
The digital divide in the post-Snowden eraIan Clark
 
9 Punishment HANDOUT
9 Punishment HANDOUT9 Punishment HANDOUT
9 Punishment HANDOUTmattyp99
 
social networking sites
social networking sitessocial networking sites
social networking sitesAnant Agarwal
 
Social networking PPT
Social networking PPTSocial networking PPT
Social networking PPTvarun0912
 

Andere mochten auch (20)

Philosophy and Social Media 1: I Tweet, Therefore I Am
Philosophy and Social Media 1: I Tweet, Therefore I AmPhilosophy and Social Media 1: I Tweet, Therefore I Am
Philosophy and Social Media 1: I Tweet, Therefore I Am
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
Surveillance And Power
Surveillance And PowerSurveillance And Power
Surveillance And Power
 
Surveillance, copyright, freedom and privacy:opportunity and risk of video sh...
Surveillance, copyright, freedom and privacy:opportunity and risk of video sh...Surveillance, copyright, freedom and privacy:opportunity and risk of video sh...
Surveillance, copyright, freedom and privacy:opportunity and risk of video sh...
 
Protecting Privacy From Aerial Surveillance
Protecting Privacy From Aerial SurveillanceProtecting Privacy From Aerial Surveillance
Protecting Privacy From Aerial Surveillance
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
 
Postmodernism lesson 3
Postmodernism lesson 3Postmodernism lesson 3
Postmodernism lesson 3
 
Surveillance and privacy panel
Surveillance and privacy panelSurveillance and privacy panel
Surveillance and privacy panel
 
You Are Watched
You Are WatchedYou Are Watched
You Are Watched
 
What Is Technocultures
What Is TechnoculturesWhat Is Technocultures
What Is Technocultures
 
What's Panopticism? Exploring Digital Cultures
What's Panopticism? Exploring Digital CulturesWhat's Panopticism? Exploring Digital Cultures
What's Panopticism? Exploring Digital Cultures
 
Prof. Hendrik Speck - Privacy and Social Networks
Prof. Hendrik Speck - Privacy and Social NetworksProf. Hendrik Speck - Privacy and Social Networks
Prof. Hendrik Speck - Privacy and Social Networks
 
Trust and Reputation on the Social Web
Trust and Reputation on the Social WebTrust and Reputation on the Social Web
Trust and Reputation on the Social Web
 
Selfies, Surveillance and the Voluntary Panopticon
Selfies, Surveillance and the Voluntary Panopticon Selfies, Surveillance and the Voluntary Panopticon
Selfies, Surveillance and the Voluntary Panopticon
 
The digital divide in the post-Snowden era
The digital divide in the post-Snowden eraThe digital divide in the post-Snowden era
The digital divide in the post-Snowden era
 
9 Punishment HANDOUT
9 Punishment HANDOUT9 Punishment HANDOUT
9 Punishment HANDOUT
 
social networking sites
social networking sitessocial networking sites
social networking sites
 
Social networking
Social networkingSocial networking
Social networking
 
Social networking PPT
Social networking PPTSocial networking PPT
Social networking PPT
 
Brand New World
Brand New WorldBrand New World
Brand New World
 

Ähnlich wie LECTURE 5 - Cyberculture

A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethicsUltraUploader
 
051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics TranscriptRemedy Communications
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingCiarán Mc Mahon
 
'Internet' - lecture for MECO 1002
'Internet' - lecture for MECO 1002'Internet' - lecture for MECO 1002
'Internet' - lecture for MECO 1002University of Sydney
 
Freedom in the Days of the Internet
Freedom in the Days of the InternetFreedom in the Days of the Internet
Freedom in the Days of the Internetthinkingeurope2011
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillancecfeutlinske
 
Internet Presentation
Internet PresentationInternet Presentation
Internet Presentationadriana ahner
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policyChris Marsden
 
Short and Long of Data Driven Innovation
Short and Long of Data Driven InnovationShort and Long of Data Driven Innovation
Short and Long of Data Driven InnovationDavid De Roure
 
Essay Writing For Elementary Students. Online assignment writing service.
Essay Writing For Elementary Students. Online assignment writing service.Essay Writing For Elementary Students. Online assignment writing service.
Essay Writing For Elementary Students. Online assignment writing service.Finni Rice
 
Openness and innovation in the information society
Openness and innovation in the information societyOpenness and innovation in the information society
Openness and innovation in the information societyblogzilla
 
Using Data for Science Journalism
Using Data for Science JournalismUsing Data for Science Journalism
Using Data for Science JournalismLiliana Bounegru
 
Using Data for Science Journalism
Using Data for Science JournalismUsing Data for Science Journalism
Using Data for Science JournalismJonathan Gray
 
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Bodyspacesociety Blog
 
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...FecomercioSP
 

Ähnlich wie LECTURE 5 - Cyberculture (20)

A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 
051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
 
'Internet' - lecture for MECO 1002
'Internet' - lecture for MECO 1002'Internet' - lecture for MECO 1002
'Internet' - lecture for MECO 1002
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
Freedom in the Days of the Internet
Freedom in the Days of the InternetFreedom in the Days of the Internet
Freedom in the Days of the Internet
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
 
Internet Presentation
Internet PresentationInternet Presentation
Internet Presentation
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policy
 
Short and Long of Data Driven Innovation
Short and Long of Data Driven InnovationShort and Long of Data Driven Innovation
Short and Long of Data Driven Innovation
 
Cyber security issues part a
Cyber security issues  part a Cyber security issues  part a
Cyber security issues part a
 
Essay Writing For Elementary Students. Online assignment writing service.
Essay Writing For Elementary Students. Online assignment writing service.Essay Writing For Elementary Students. Online assignment writing service.
Essay Writing For Elementary Students. Online assignment writing service.
 
Openness and innovation in the information society
Openness and innovation in the information societyOpenness and innovation in the information society
Openness and innovation in the information society
 
Using Data for Science Journalism
Using Data for Science JournalismUsing Data for Science Journalism
Using Data for Science Journalism
 
Using Data for Science Journalism
Using Data for Science JournalismUsing Data for Science Journalism
Using Data for Science Journalism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
 
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
 

Mehr von Kim Flintoff

TIDES-Education-PowerPoint-WAEDCONNECT2022-.pptx
TIDES-Education-PowerPoint-WAEDCONNECT2022-.pptxTIDES-Education-PowerPoint-WAEDCONNECT2022-.pptx
TIDES-Education-PowerPoint-WAEDCONNECT2022-.pptxKim Flintoff
 
Taking Learning Beyond the School Gate
Taking Learning Beyond the School GateTaking Learning Beyond the School Gate
Taking Learning Beyond the School GateKim Flintoff
 
UN SDG PRIORITIES IN EDUCATION
UN SDG PRIORITIES IN EDUCATIONUN SDG PRIORITIES IN EDUCATION
UN SDG PRIORITIES IN EDUCATIONKim Flintoff
 
Learning with Purpose
Learning with PurposeLearning with Purpose
Learning with PurposeKim Flintoff
 
Student-directed engagement in community-linked STEM integration through coll...
Student-directed engagement in community-linked STEM integration through coll...Student-directed engagement in community-linked STEM integration through coll...
Student-directed engagement in community-linked STEM integration through coll...Kim Flintoff
 
TEDxUWASalon: Symbiosis - Learning with Purpose
TEDxUWASalon: Symbiosis - Learning with PurposeTEDxUWASalon: Symbiosis - Learning with Purpose
TEDxUWASalon: Symbiosis - Learning with PurposeKim Flintoff
 
Schools Innovation Projects
Schools Innovation ProjectsSchools Innovation Projects
Schools Innovation ProjectsKim Flintoff
 
Establishing global connections and being a global educator
Establishing global connections and being a global educatorEstablishing global connections and being a global educator
Establishing global connections and being a global educatorKim Flintoff
 
Challenge-based Learning
Challenge-based LearningChallenge-based Learning
Challenge-based LearningKim Flintoff
 
Learners as Creators
Learners as CreatorsLearners as Creators
Learners as CreatorsKim Flintoff
 
Designing for Global equality
Designing for Global equalityDesigning for Global equality
Designing for Global equalityKim Flintoff
 
Schools Innovation Projects Initiative
Schools Innovation Projects InitiativeSchools Innovation Projects Initiative
Schools Innovation Projects InitiativeKim Flintoff
 
Balance of the Planet
Balance of the PlanetBalance of the Planet
Balance of the PlanetKim Flintoff
 
Learning Futures Network
Learning Futures NetworkLearning Futures Network
Learning Futures NetworkKim Flintoff
 
Future Landscapes for Educational Technology
Future Landscapes for Educational TechnologyFuture Landscapes for Educational Technology
Future Landscapes for Educational TechnologyKim Flintoff
 
Black Swans and the Future of Education
Black Swans and the Future of EducationBlack Swans and the Future of Education
Black Swans and the Future of EducationKim Flintoff
 
Where to from here - GSG closing plenary
Where to from here - GSG closing plenaryWhere to from here - GSG closing plenary
Where to from here - GSG closing plenaryKim Flintoff
 
Transforming learning for relevance and sustainability
Transforming learning for relevance and sustainabilityTransforming learning for relevance and sustainability
Transforming learning for relevance and sustainabilityKim Flintoff
 
Schools Innovation Symposium-2018
Schools Innovation Symposium-2018Schools Innovation Symposium-2018
Schools Innovation Symposium-2018Kim Flintoff
 
Education and Emerging Futures Children's Week 2018
Education and Emerging Futures Children's Week 2018Education and Emerging Futures Children's Week 2018
Education and Emerging Futures Children's Week 2018Kim Flintoff
 

Mehr von Kim Flintoff (20)

TIDES-Education-PowerPoint-WAEDCONNECT2022-.pptx
TIDES-Education-PowerPoint-WAEDCONNECT2022-.pptxTIDES-Education-PowerPoint-WAEDCONNECT2022-.pptx
TIDES-Education-PowerPoint-WAEDCONNECT2022-.pptx
 
Taking Learning Beyond the School Gate
Taking Learning Beyond the School GateTaking Learning Beyond the School Gate
Taking Learning Beyond the School Gate
 
UN SDG PRIORITIES IN EDUCATION
UN SDG PRIORITIES IN EDUCATIONUN SDG PRIORITIES IN EDUCATION
UN SDG PRIORITIES IN EDUCATION
 
Learning with Purpose
Learning with PurposeLearning with Purpose
Learning with Purpose
 
Student-directed engagement in community-linked STEM integration through coll...
Student-directed engagement in community-linked STEM integration through coll...Student-directed engagement in community-linked STEM integration through coll...
Student-directed engagement in community-linked STEM integration through coll...
 
TEDxUWASalon: Symbiosis - Learning with Purpose
TEDxUWASalon: Symbiosis - Learning with PurposeTEDxUWASalon: Symbiosis - Learning with Purpose
TEDxUWASalon: Symbiosis - Learning with Purpose
 
Schools Innovation Projects
Schools Innovation ProjectsSchools Innovation Projects
Schools Innovation Projects
 
Establishing global connections and being a global educator
Establishing global connections and being a global educatorEstablishing global connections and being a global educator
Establishing global connections and being a global educator
 
Challenge-based Learning
Challenge-based LearningChallenge-based Learning
Challenge-based Learning
 
Learners as Creators
Learners as CreatorsLearners as Creators
Learners as Creators
 
Designing for Global equality
Designing for Global equalityDesigning for Global equality
Designing for Global equality
 
Schools Innovation Projects Initiative
Schools Innovation Projects InitiativeSchools Innovation Projects Initiative
Schools Innovation Projects Initiative
 
Balance of the Planet
Balance of the PlanetBalance of the Planet
Balance of the Planet
 
Learning Futures Network
Learning Futures NetworkLearning Futures Network
Learning Futures Network
 
Future Landscapes for Educational Technology
Future Landscapes for Educational TechnologyFuture Landscapes for Educational Technology
Future Landscapes for Educational Technology
 
Black Swans and the Future of Education
Black Swans and the Future of EducationBlack Swans and the Future of Education
Black Swans and the Future of Education
 
Where to from here - GSG closing plenary
Where to from here - GSG closing plenaryWhere to from here - GSG closing plenary
Where to from here - GSG closing plenary
 
Transforming learning for relevance and sustainability
Transforming learning for relevance and sustainabilityTransforming learning for relevance and sustainability
Transforming learning for relevance and sustainability
 
Schools Innovation Symposium-2018
Schools Innovation Symposium-2018Schools Innovation Symposium-2018
Schools Innovation Symposium-2018
 
Education and Emerging Futures Children's Week 2018
Education and Emerging Futures Children's Week 2018Education and Emerging Futures Children's Week 2018
Education and Emerging Futures Children's Week 2018
 

Kürzlich hochgeladen

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 

Kürzlich hochgeladen (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

LECTURE 5 - Cyberculture

  • 2.
  • 3.
  • 4. Downer declares Wikipedia 'anti-government' By Steve Larkin ( news .com.au) August 24, 2007 03:41pm Article from: AAP THE online encyclopedia Wikipedia is anti-government, Foreign Affairs Minister Alexander Downer says. "My sort of recollection of Wikipedia sites is they are a bit, sort of, a bit anti-government, they are sort of a bit negative about people in the government," Mr Downer said today. http://www.news.com.au/story/0,23599,22300570-29277,00.html#
  • 5. http://www.australianit.news.com.au/story/0,24897,22317999-15306,00.html Tax gets tough on privacy Ben Woodhead | August 28, 2007 FRAUD detection systems have uncovered a rash of privacy breaches at the Australian Taxation Office as employees flout tough data protection rules despite ongoing monitoring and training. The sweeps of data access logs led to three sackings during the 2007 financial year and another nine staff resigned after the ATO detected unauthorised access to taxpayer records.
  • 6. Student cracks Government's $84m porn filter Article from: By Nick Higginbottom and Ben Packham August 26, 2007 12:30am A MELBOURNE schoolboy has cracked the Federal Government's new $84 million internet porn filter in minutes. Tom Wood, 16, said it took him just over 30 minutes to bypass the Government's filter, released on Tuesday. Tom, a year 10 student at a southeast Melbourne private school, showed the Herald Sun how to deactivate the filter in a handful of clicks. http://www.news.com.au/heraldsun/story/0,21985,22304224-662,00.html
  • 7. Hackers steal data from Monster.com users Article from: Agence France-Presse August 23, 2007 12:00am HACKERS have stolen personal details of hundreds of thousands of users of US jobs website Monster.com, according to internet security firm Symantec.   A total of 1.6 million entries, including information such as names, postal addresses and telephone numbers were stolen, the firm said. http://www.news.com.au/heraldsun/story/0,21985,22293044-11869,00.html
  • 8. Hi-tech research outpaces law Bernard Lane | August 22, 2007 RESEARCHERS riding the wave of hi-tech collaboration may leave lawyers and policymakers in their wake, commentators have warned following what is believed to be the first survey of legal issues raised by e-research. http://www.theaustralian.news.com.au/story/0,24897,22285146-12332,00.html
  • 9. Uni plagiarists risk degrees Brendan O'Keefe | August 22, 2007 THE University of New England will consider stripping students of their degrees if they are found to have cheated, following a spate of plagiarism in one of its masters programs. http://www.theaustralian.news.com.au/story/0,25197,22285283-12332,00.html
  • 10.  
  • 11. Menwith Hill, Photo: Duncan Campbell http://cyberdelix.net/parvati/6929.html Echelon Echelon is a system used by the United States National Security Agency (NSA) to intercept and process international communications passing via communications satellites.
  • 12.
  • 13. Image: courtesy University College London Library Jeremy Bentham’s Panopticon
  • 14.  
  • 15.  
  • 16.  
  • 17.  
  • 18. >> [project proposal] - a live terror service
  • 19. The panopticon project aims to widen the lens of the electronic eye on the street, testing the boundaries and invasive nature of surveillance technologies, questioning if privacy really can exist in the digital age.
  • 20.  
  • 22.  
  • 23. http://www.disinfo.com/site/ http://www.notbored.org/the-scp.html Alternative news organisations and performance groups utilise online spaces and audiences.
  • 24. Welcome to the Cyber Activists Network - AUSTRALIA Cyber Activism - What is Cyber Activism?, well it's not being a Hacker or Cracker. A Hacker - is someone who maliciously breaks or tampers with things, … merely to disrupt and damage private property . A Cracker - is someone who employs electronic means … with intent to breach the security and profit or gain in some way by their actions. A Cyber Activist -is none of these things previously mentioned. Quite simply a Cyber Activist is merely a description for the method of his/hers form of activism . Through the use of electronic media and communications, Cyber Activists attempt to be heard through e-mails, web sites, data and online communities working cohesively or independently to achieve social change.
  • 25. Slapper Software , have constructed this web site to facilitate an Online Cyber Activist's Network , which can greatly assist you in your efforts to bring about social change . Please visit the Activist's Tools & Download Sections of this web site to learn more about how we can assist you. Internet Resources Activist’s Tools To prepare you better (Cyber Activists), we have provided information about issues such as security, personal privacy and how to automate repetitive tasks…and can greatly improve effectiveness and reduce the amount of time it takes. There are many resources used by a well prepared Cyber Activist, below is a list of these tools and how they can assist you. http://senatorslapper.netfirms.com/tools.htm
  • 26. Electronic Disturbance Theatre “ When we do a performance, our performance or our actions are considered symbolic gestures; we are trying to bring attention to a particular event or cause – we are not trying to do any criminal activity”. Conan, N. (2001). Hacktivism. The Connection. National Public Radio. Boston July 30.
  • 27. Chapter 1. Introduction: The Virtual Condition Chapter 2. Nomadic Power and Cultural Resistance Chapter 3. Video and Resistance: Against Documentaries Chapter 4. The Recombinant Theater and the Performative Matrix Chapter 5. Utopian Plagiarism, Hypertextuality , and Electronic Cultural Production Chapter 6. Fragments on the Problem of Time Chapter 7. Paradoxes and Contradictions This book may be freely pirated and quoted. The authors and publisher, however, would like to be so informed at the address below. http://www.critical-art.net/books/ted/
  • 28.