8. We hold these truths to be self-evident; that all men are created equal, that they are endowed by their creator with certain unalienable rights, that among these are life, liberty and the pursuit of happiness. 8
18. Louis Sebastian Mercier “Tableau de Paris” Freedom of the press is only one form of freedom of expression. It is linked to a certain technology or technique and its importance diminishes with the development of other technologies which replace or complement the printing press.
19. George Orwell “Circus dogs jump when the trainer cracks his whip but the really well-trained dog is the one that turns his somersault when there is no whip.” Newspeak 1st censor
20. At any given moment there is an orthodoxy, a body of ideas which it is assumed that all right-thinking people will accept without question... Anyone who challenges the prevailing orthodoxy finds himself silenced with surprising effectiveness. fear 2nd censor
34. Anything that is in the world when you’re born is normal and ordinary and is just a natural part of the way the world works. Anything that’s invented between fifteen and thirty-five is new and exciting and revolutionary and you can probably get a career in it. Anything invented after you’re thirty-five is against the natural order when you’re of things.
39. Blogger 1999 2001 2003 2005 2000 2002 2004 2006 Wikipedia Google c:a 1998
40. My Space Linkedin Blogger 1999 2001 2003 2005 2000 2002 2004 2006 Second Life Skype Wikipedia Google c:a 1998
41. My Space Digg YouTube Linkedin Blogger 1999 2001 2003 2005 2000 2002 2004 2006 Ning Second Life Skype Facebook Flickr Wikipedia Google c:a 1998
42. My Space Digg Twitter YouTube Linkedin Blogger 1999 2001 2003 2005 2000 2002 2004 2006 Ning Second Life Spotify Flickr Skype Facebook Wikipedia Google c:a 1998
46. The disruption occurs when the technology, which is introduced effects the social arrangements around which we build our lives DISRUPTIVE TECHNOLOGY
52. Latour, B. (1992). “Where are the Missing Masses? Sociology of a Few Mundane Artefacts”Winner, L. (1985) “Do Artefacts have Politics?”
53. HCI people can think of this as the tyranny of affordance* * I want to write an article with this title…
54. What’s wrong with Command and Control? It relies to heavily upon coercion and cooperation.
55. ONLINE OFFLINE “We are forming our own Social Contract. This governance will arise according to the conditions of our world, not yours. Our world is different.” (Barlow 1996)
56. Law Social Rules Contextual & programed Architecture Regulatory Metaphor
63. The Gmail service includes relevant advertising and related links based on the IP address, content of messages and other information related to your use of Gmail. We provide advertisers only aggregated non-personal information such as the number of times one of their ads was clicked. We do not sell, rent or otherwise share your personal information with any third parties except in the limited circumstances described in the Google Privacy Policy, such as when we believe we are required to do so by law.
64.
65.
66. Anything that is in the world when you’re born is normal and ordinary and is just a natural part of the way the world works. Anything that’s invented between when you’re fifteen and thirty-five is new and exciting and revolutionary and you can probably get a career in it. Anything invented after you’re thirty-five is against the natural order of things.
67. Facebook If you are not a paying customer then you are the product
77. Social media…At its most basic sense, social media is a shift in how people discover, read and share news, information and content. It's a fusion of sociology and technology, transforming monologues (one to many) into dialogues (many to many) and is the democratization of information, transforming people from content readers into publishers. (Wikipedia, maj 2009)
83. Privatizing Censorship Censorship Non-technical/self censorship “Public Pledge of Self-Regulation & Professional Ethics for China Internet Industry” Responsibility on the signatories: Inspect & monitor foreign & domestic sites Block harmful information
85. Information All images from/allabilderfrånwww.flickr.com (unless specifically stated), (omejannatanges) Image & licensing info in the notes section of slides/bild & licensinfofinnsianteckningsdelenförvarje slide Presentation licensed/Presentation licensierad under: Creative Commons BY-NC-SA The presentation can be downloaded from/Presentationenkanladdasnerfrån: www.slideshare.net/klang More information about me/förmer information ommig: www.techrisk.se & www.digital-rights.net
Hinweis der Redaktion
Butterfly (Oases Egypt) from Ahron de Leeuw cc by
can birds have a dog fight? by threecee cc by ncsa
Brown Bagged Goof from privatenobby cc by ncsa
communication age by Dom Dada cc by ncnd
Eyes ! (Youth from Antikythera!) by agelakis cc by ncsa
Merry Chistmas(you are being... from atomicjeep cc by
Lake Baikal by f.stroganov cc by ncsa
självständighetsförklaring (1776)Megaphone for Health Care Reform by cobalt123 cc by ncsa
important! by estherase cc by ncsa
truth is god by giobi cc by ncsa
Democracy by _saturnine cc by ncsa
1_365 from SMN cc by ncsa
think monkeys (flickr) think by Arriving at the horizon cc by ncsa
The Wicked Bible, sometimes called The Adulterous Bible or The Sinners' Bible, is a term referring to the Bible published in 1631 by Robert Barker and Martin Lucas, the royal printers in London, which was meant to be a reprint of the King James Bible. The name is derived from the compositors' mistake: in the Ten Commandments (Exodus 20:14) the word "not" in the sentence "Thou shalt not commit adultery" was omitted. This blunder was spread in a number of copies. About a year later, the publishers of the Wicked Bible were fined £300 and were deprived of their printer's license.[citation needed] The fact that this edition of the Bible contained such a flagrant mistake outraged Charles I of England and George Abbot, the Archbishop of Canterbury, who said then:I knew the tyme when great care was had about printing, the Bibles especially, good compositors and the best correctors were gotten being grave and learned men, the paper and the letter rare, and faire every way of the beste, but now the paper is nought, the composers boyes, and the correctors unlearned.[1]Wikipedia
Four friends with their shadows - IMG_1807 BW ed + cr Four friends with their shadows - IMG_1807 BW ed + cr cc by ncsa
Port-42 by Victor Bezrukov cc by ncnd
Früg & Meight by Don Solo cc by ncsa
7-CAPITAL SINS * GLUTTONY-ACOSTA * GULA * DETALLE by juanangeldibuja cc by ncsa
Quote from early preface to George Orwell Animal FarmImage source unknown
The Essence Of Communication by davidjwbailey cc by ncsa
the same horizon by Norma Desmond cc by ncsa
Protesters by mezzoblue (CC by-nc-nd)
12-06 by Daniel*1977 cc by nc sa
Theory of Relaxitivity from zetson cc by ncsa
Google automatically scans e-mails to add context-sensitive advertisements to them. Privacy advocates raised concerns that the plan involved scanning their personal, assumed private, e-mails, and that this was a security problem. Allowing e-mail content to be read, even by a computer, raises the risk that the expectation of privacy in e-mail will be reduced. Furthermore, e-mail that non-subscribers choose to send to Gmail accounts is scanned by Gmail as well, even though those senders never agreed to Gmail's terms of service or privacy policy. Google can change its privacy policy unilaterally and Google is technically able to cross-reference cookies across its information-rich product line to make dossiers on individuals. However, most e-mail systems make use of server-side content scanning in order to check for spam.[41][42]Privacy advocates also regard the lack of disclosed data retention and correlation policies as problematic. Google has the ability to combine information contained in a person's e-mail messages with information from Internet searches. Google has not confirmed how long such information is kept or how it can be used. One of the concerns is that it could be of interest to law enforcement agencies. More than 30 privacy and civil liberties organizations have urged Google to suspend Gmail service until these issues are resolved.[43]Gmail's privacy policy contains the clause: "residual copies of deleted messages and accounts may take up to 60 days to be deleted from our active servers and may remain in our offline backup systems". Google points out that Gmail adheres to most industry-wide practices. Google has stated that they will "make reasonable efforts to remove deleted information from our systems as quickly as is practical."[44][45]Google defends its position by citing their use of email-scanning to the user's benefit. Google states that Gmail refrains from displaying ads next to potentially sensitive messages such as those that mention tragedy, catastrophe, or death.[4
Consumer Watchdogs Flog Google's Privacy Policy (2008)http://techdailydose.nationaljournal.com/2008/06/consumer-watchdogs-flog-google.phpGoogle originally placed a cookie on each registered user's computer, which can be used to track that person's search history, and that cookie was not set to expire until 2038.[12] As of 2007, Google's cookie now expires in two years but renews itself when a Google service is used.[12] There is no evidence that Google turns over information to the FBI or the NSA, though some users remain anxious about the possibility.[12] In response, Google claims cookies are necessary to maintain user preferences between sessions and offer other search features. Other popular search engines, such as Yahoo! Search and Microsoft's Bing, use cookies with distant expiration dates as well.Privacy International has raised concerns regarding the dangers and privacy implications of having a centrally-located, widely popular data warehouse of millions of Internet users' searches, and how under controversial existing U.S. law, Google can be forced to hand over all such information to the U.S. government[13]. In early 2005, the United States Department of Justice filed a motion in federal court to force Google to comply with a subpoena for, "the text of each search string entered onto Google's search engine over a one-week period (absent any information identifying the person who entered such query)."[14] Google fought the subpoena, due to concerns about users' privacy.[15] In March 2006, the court ruled partially in Google's favor, recognizing the privacy implications of turning over search terms and refusing to grant access.[16]Steve Ballmer[17], Liz Figueroa[18], Mark Rasch[19], and the editors of Google Watch[20] believe the processing of email message content by Google's Gmail service goes beyond proper use. Google claims that mail sent to or from Gmail is never read by a human being beyond the account holder, and is only used to improve relevance of advertisements.[21] Whether Google is the only one doing this or simply the only one who publicly admits it is unknown, since the privacy policies of other popular email services, like Hotmail and Yahoo, allows for collection and utilizing of personal information for ads when using their services, but do not specify precisely what information and which services[22][23].Google's online map service, "Street View" has been accused of taking pictures and coming too close inside people's private homes and/or people who walk down the street not knowing they are being watched on Google's service.[24][25] Aaron and Christine Boring, a Pittsburgh couple, sued Google for "invasion of privacy". They claimed that Street View made a photo of their home available online, and it diminished the value of their house, which was purchased for its privacy.[26] They lost their case in a Pennsylvania court. "While it is easy to imagine that many whose property appears on Google's virtual maps resent the privacy implications, it is hard to believe that any – other than the most exquisitely sensitive – would suffer shame or humiliation," Judge Hay ruled.[27]In its 2007 Consultation Report, Privacy International ranked Google as "Hostile to Privacy", its lowest rating on their report, making Google the only company in the list to receive that ranking.[28][29]Carl Hewitt noted that intimate personal information is a "toxic asset" in Google datacenters because it will lead to government regulation "analogous to nuclear power plants," Consequently, he recommended that Google should perform semantic integration in clients' clouds so that client information in Google datacenters could be decrypted only by using a client's private key.[30][edit] European UnionEuropean Union (EU) data protection officials (the Article 29 working party who advise the EU on privacy policy) have written to Google asking the company to justify its policy of keeping information on individuals’ internet searches for up to two years. The letter questioned whether Google has “fulfilled all the necessary requirements” on the EU laws concerning data protection.[31] The probe by the EU into the data protection issue, As of 24 May 2007 (2007 -05-24)[update] is continuing. On 1 June Google agreed that its privacy policy is vague, and that they are constantly working at making it clearer to users.[32] The resulting modifications to its privacy policies have been met with praise[33].[edit] NorwayThe Data Inspectorate of Norway (Norway is not a member of the EU) has investigated Google (and others) and has stated that the 18- to 24-month period for retaining data proposed by Google was too long.[34]
phre⋅nol⋅o⋅gy 6 by Gobble Monster cc by ncsa
Singing in the Dark by {platinum} cc by ncsa
When he found himself stuck in a public restroom stall (male toilets of Yodobashi Camera in Akihabara) without any toilet paper, Twitter user naika_tei did what any clever man would do: He posted a Twitter message pleading for help. It worked.It took 20 minutes from the time aika_tei first voiced his desperation, but someone apparently really brought him a roll of toilet paper. http://gizmodo.com/5535769/twitter-user-brings-toilet-paper-to-desperate-japanese-man
"United Breaks Guitars" is a song by Canadian musician David Carroll and his band, Sons of Maxwell. It chronicles a real-life experience of how his guitar was broken during a trip on United Airlines in 2008, and the subsequent reaction from the airline. The song became an immediate YouTube and ITMS hit upon its release in July 2009.http://en.wikipedia.org/wiki/United_Breaks_Guitars
helli.(sh).ell `๑´ by HadiFooladi cc by ncsa
I just couldn’t live with myself... from Eric "Claptøn" Nelsøn cc by ncsa