DOC PREVIEW
IUB TEL-T 205 - The One Where We Invade Someone's Privacy

This preview shows page 1 out of 3 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 3 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 3 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

TEL-T205 1st Edition Lecture 4The One Where We Invade Someone’s Privacy1) WHY ARE PRIVACY AND PIRACY BIG ISSUES NOW?a) TECHNOLOGICAL DEVELOPMENT TECHNOLOGY DIDN’T CREATE PROBLEMS ABOUT PRIVACY AND PIRACY, HOWEVER MADE IT EASIER AND MORE EFFICIENTi) EASIER TO INVADES SOMEONES PIRACYb) ECONOMIC MODELi) EASIER TO COPY AND DOWNLOAD FILES AND CONTENTS2) PRIVACY a) LOSS OF PRIVACY THROUGH:i) IDENTITY THEFT ii) HIJACKING iii) INFECTIONiv) SELLING INFORMATION-NOT ILLEGAL/ HOWEVER UNFAVORABLE v) SPAM-NOT ILLEGAL/HOWEVER UNFAVORABLE (1) SPAM HAS INCREASED WITH THE TECHNOLOGICAL DEVELOPMENT b) 6TH FORM OF VIOLATION OF PRIVACY: MONITORINGi) OBSERVING, RECORDING, AND LOGGING SOMEONE’S BEHAVIORii) WITHOUT THEIR KNOWLEDGE OR PERMISSIONiii) THE AMOUNT OF INFORMATION ONE CAN COLLECT IS VASTiv) EX: MONROE COUNTY GIS MAJOR INFORMATION GATHERING TOOL(1) LOOK UP PROPERTIES, WHO OWNS THEM, GO TO HER PROPERTY REPORT CARD KNOW WHEN AND WHO SHE BOUGHT IT FROM, HOW MUCH SHE BOUGHT IF FROM COULD THEN GO TO FACEBOOK TO LOOK UP AND CONFIRM ALL OF THESE DETAILS CAN LOOK UP ALL THE DETAILS OF THE HOME, CAN FIND THE BLUE PRINTS OF THE HOUSE, PHOTO OF THE HOUSE(2) CAN ALSO FIND OUT IF THE OWNER IS PAYING THE TAXES AND HOW MUCH THEY ARE, LOOK UP HER MORTGAGE, WHAT KIND OF MORTGAGE AND HOW MUCH IT IS(3) THAT IS JUST A LITTLE BIT OF WHAT WE CAN FIND OUT v) MONITORING ISN’T JUST PERSON TO PERSON CORPORATE MONITORING OF CONSUMER BEHAVIORvi) IS MONITORING/EXCHANGING INFO A PROBLEM?(1) GOOGLE TRACK ANY KIND OF BEHAVIOR THAT GOES ON WITHIN ANY OF THEIR PROPERTIES (a) KEEP TRACK OF ALL GOOGLE ACTIVITIES THAT YOU USE THEY LOG EVERYTHING AND EVERYTHING FROM GOOGLE SEARCHES, GMAIL EMAILS, GPS SIGNALS AND WHERE YOU GO (b) BOTH INCREDIBLY CREEPY HOWEVER VERY AWESOME AND EFFECTIVE (c) MOST USED SEARCH ENGINE BECAUSE IT GIVES YOU A BETTER EXPERIENCE BECAUSE IT KNOWSWHO YOU ARE(d) THIS IS GOOGLES BUSINESS MODEL TO COLLECT AS MUCH INFORMATION ABOUT YOU AS POSSIBLE BECAUSE IT HELPS US GIVE YOU THE BEST EXPERIENCESThese notes represent a detailed interpretation of the professor’s lecture. GradeBuddy is best used as a supplement to your own notes, not as a substitute.c) WHAT IS BEING DONE?i) OPT IN POLICY YOU HAVE TO GIVE A COMPANY PERMISSION TO USE YOUR INFORMATION (1) VERY CONSUMER FRIENDSii) OPT OUT POLICY COMPANY CAN DO WHAT THEY WANT WITH YOUR DATA, CONSUMER HAS TO TELL THE COMPANY NO YOU CAN’T USE THIS INFORMATION (1) BUSINESS FRIENDLY OPT OUT POLICY HAS BECOME THE NORMiii) GOOGLE SAYS YOU DON’T LIKE THAT WE TRACK YOUR INFORMATION? DON’T USE GOOGLE PRODUCTS iv) THE TRADE-OFF PRIVACY OR A BETTER CONSUMER EXPERIENCE 3) PIRACY a) THE TAKING OR DISTRIBUTING OF COPY WRITTEN MATERIALS PRODUCER VS. CONSUMER RIGHTSb) HOW MUCH DO PEOPLE OWN OF THE MATERIAL; HOW MANY RIGHTS DO PEOPLE HAVE TO SELL AND DISTRIBUTE MATERIALSc) IF ECONOMIC MODEL IS BASED ON THE VALUE OF COPIES THAN PIRACY IS A MAJOR PROBLEMi) MUSIC AND MOVIE INDUSTRY d) WHAT’S BEING DONE?i) ANTI-PIRACY CAMPAIGNSii) ANTI-PIRACY TECHNOLOGIES (1) DIGITAL RIGHTS MANAGEMENT SOFTWARE(2) TECHNOLOGY THAT PREVENTS DVD’S FROM BEING COPIEDiii) LEGAL ACTION(1) FINES (2) ONLINE CLASSES(3) LEGISLATION(a) SOPA AND PIPA GIVE THEM THE RIGHT TO SHUT DOWN COMPANIES THAT UPLOAD MATERIALS FOR FREEiv) NOTHING HAS REALLY BEEN WORKING e) CONSUMERS TURNING AGAINST THE INDUSTRY FOR TARGETING THEIR CONSUMERSf) IF YOU UPLOAD IT YOU HAVE BOUGHTEN IT LEGALLY SO DO YOU HAVE THE RIGHT TO UPLOAD IT g) THE AMOUNT OF PIRACY IS INCREASING THEIR STRATEGIES AREN’T WORKING i) THEY NEED TO RETHINK THEIR ECONOMIC MODEL4) HOW SHOULD WE THINK ABOUT THE WEB MOVING FORWARDa) KEVIN KELLY’S “SEMANTIC WEB” CURRENTLY ON WEB 2.0 (PAGE TO PAGE) WE ARE HEADED TO WEB3.0 (IDEA TO IDEA)i) CURRENTLY SO MUCH DUPLICATIONS AND IRRELEVANT INFORMATIONii) MOVING FORWARD THEIR WILL AND IDEA EXISTING ON THE WEB IN ONE PLACE AND EVERYTHING RELATED TO THAT IDEA WILL COME OFF OF THIS EXISTENCEiii) THINK ABOUT THE WEB AS A SINGLE MACHINE USING 5% OF GLOBAL ELECTRICITY ALL CONNECTED iv) THIS IS HOW THE BRAIN ORGANIZES INFORMATION IDEA TO IDEA (1) EVERYTHING THAT RELATES TO THAT IDEA CONNECTS OFF OF ITb) GOOGLE HAS ALREADY EMBRACED 3.0i) GOOGLE INDIANA UNIVERSITY A LOT OF LINKS ON THE LEFT HOWEVER ON THE RIGHT IT HAS INDIANA UNIVERSITY BLOOMINGTON AND UNDER IT IS A LOT OF INFORMATION FROM A BUNCH OF DIFFERENT WEBSITESii) GOOGLE IMAGE IS ALSO HEADING IN THIS DIRECTIONiii) IMPLICATIONS ABOUT PRIVACY AND PIRACY(1) PRIVACY IS IRRELEVANT IN THIS DAY AND AGE IF WEB 3.0 IS GOING TO BE EFFECTIVE WE NEED TO SHARE INFORMATION WITH THE MACHINE  WE CAN HAVE TOTAL PERSONALIZATION ONLY IF WE HAVE TOTAL OPENNESS (2) PIRACY IF WE HAVE A SEMANTIC WEB,SONG DOESN’T EXIST IN DUPLICATES ON THE WEB IT ONLY EXISTS IN ONE PLACE ON THE WEB AND EVERYONE HAS ACCESS TO IT (3) SO HOW DOES RIHANNA MAKE HER MONEY? (4) SO WHAT IS THE ECONOMIC MODEL HERE(a) COPIES HAVE NO VALUE(b) OWNERSHIP IS IRRELEVANT(c) EXPERIENCE IS THE VALUE (d) ATTENTION IS THE CURRENCY(5) HOW DO WE MAKE MONEY WITH THIS?(a) ADVERTISING  THE ECONOMIC MODEL THAT WORKS WHEN THERE IS NO VALUE IN COPIESAND EXPERIENCE IS THE VALUE AND ATTENTION IS THE CURRENCY(b) THIS IS STARTING TO BE ADOPTED AS WE SEE WITH YOUTUBE (c) PIRACY IS NOT AN ISSUE ANYMORE NEW ISSUE, HOW DO WE MAKE ADVERTISING A PROFITABLE ECONOMIC MODEL 5) EXAMa) MULTIPLE CHOICEi) 35-40 QUESTIONSii) GOING TO BE PROPORTIONAL TO THE LECTURE DAYS iii) EXAM IS


View Full Document
Download The One Where We Invade Someone's Privacy
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view The One Where We Invade Someone's Privacy and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view The One Where We Invade Someone's Privacy 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?