Susan D. Ballard Granite State College/USNH Day 1, July 20, 2017, - - PowerPoint PPT Presentation

susan d ballard
SMART_READER_LITE
LIVE PREVIEW

Susan D. Ballard Granite State College/USNH Day 1, July 20, 2017, - - PowerPoint PPT Presentation

The Right to Obscurity vs. The Digital Eye of Sauron Susan D. Ballard Granite State College/USNH Day 1, July 20, 2017, 2:30-3:30 pm Eastern A project of the University of Michigan School of Information, U-M Library, and U-M School of Education.


slide-1
SLIDE 1

The Right to Obscurity vs. The Digital Eye of Sauron

Susan D. Ballard Granite State College/USNH

Day 1, July 20, 2017, 2:30-3:30 pm Eastern

A project of the University of Michigan School of Information, U-M Library, and U-M School of Education. This project was made possible in part by the Institute of Museum and Library Services RE 00-00-15-0113-15.

slide-2
SLIDE 2

Sponsors

slide-3
SLIDE 3

Door Prizes

slide-4
SLIDE 4

Door Prize: 6 Months of Easel.ly Pro

slide-5
SLIDE 5

SCECHs

Log in with your full name Attend all of at least 3 live sessions and up to 8 Scan your form and email to contact.data.literacy@umich.edu by July 24 AND mail it in (mailing is new this year). More information: http://dataliteracy.si.umich.edu/scech

slide-6
SLIDE 6

New in 2017! For those needing certificates …

Follow SCECH instructions (scan and mail). Plus

Go to http://bit.ly/4t-store

Pay $25 there no later than Monday, July 24

slide-7
SLIDE 7

http://dataliteracy.si.umich.edu/conference #4tdl

slide-8
SLIDE 8
slide-9
SLIDE 9

Join us in the chat! Where are you from?

slide-10
SLIDE 10

The Right to Obscurity vs. The Digital Eye of Sauron

Susan D. Ballard Granite State College/USNH

Day 1, July 20, 2017, 2:30-3:30 pm Eastern

A project of the University of Michigan School of Information, U-M Library, and U-M School of Education. This project was made possible in part by the Institute of Museum and Library Services RE 00-00-15-0113-15.

slide-11
SLIDE 11

Susan D. Ballard Presenter @nholb

“I’m wicked gl glad ad to to be be he he-ah.”

Public domain: https://commons.wikimedia.org/wiki/File:J_S_Copley_-_Paul_Revere.jpg

slide-12
SLIDE 12

SL C L Competencies mpetencies an and d Ru Rubr bric ic Ba Base sed d on th n the e PSEL’s

htt ttp:// ://researchg researchguides.a uides.austin ustincc. cc.edu/ edu/ c. c.php hp?g=55 ?g=55436 4360& 0&p= p=38 3891603 91603

slide-13
SLIDE 13

http://www.publicdomainpictures.net/view-image.php?image=151449&picture=the-eye-of-sauron Inside a Hobbit Hole by Rob Chandler (Rob & Jules) (Flickr) [CC BY-SA 2.0 (http://creativecommons.org/licenses/by-sa/2.0)], via Wikimedia Commons

Th The e Ey Eye Of Sa e Of Sauron uron

slide-14
SLIDE 14

Today, we’ll focus on looking at:

  • 1. Privacy vs. Obscurity
  • 2. Obscurity vs. Security
  • 3. Security vs. Surveillance

4.“The Right to be Forgotten”

slide-15
SLIDE 15

http://www.publicdomainpictures.net/view-image.php?image=151449&picture=the-eye-of-sauron

Pri Priva vacy cy vs vs. . Obs Obscur curity ity

slide-16
SLIDE 16

Privacy vs. Obscurity

“Louis Brandeis, the father of privacy in the modern era – as well as the father of the Federal Trade Commission – defined privacy as the “right to be let alone.” Individuals want to be able to share with their friends and business associates on social media, shop online, and use connected devices, but they don’t necessarily want all of these activities monitored, tracked, collected, and used by entities they do not know or with whom they have no relationship. And this is where obscurity fits in. Obscurity means that personal information isn’t readily available to just anyone. It doesn’t mean that information is wiped out or even locked up; rather, it means that some combination of factors makes certain types of information relatively hard to find.”

Julie Brill, Commissioner, Federal Trade Commission 2010-2017

https://www.csmonitor.com/World/Passcode/Passcode-Voices/2015/0415/Why-you-have-the-right-to-obscurity

slide-17
SLIDE 17

Privacy vs. Obscurity

https://pixabay.com/en/statue-camouflage-hidden-discreet-2393168/

slide-18
SLIDE 18

Privacy vs. Obscurity

https://pixabay.com/en/vacuum-cleaner-vacuuming-cleaning-268179/

slide-19
SLIDE 19

Privacy vs. Obscurity

CC BY-NC-ND 2.0 https://www.flickr.com/photos/pittcaleb/2371328829

slide-20
SLIDE 20

http://www.publicdomainpictures.net/view-image.php?image=151449&picture=the-eye-of-sauron

Obs Obscurity curity vs vs. . Se Secur curity ity

slide-21
SLIDE 21

Obscurity vs. Security

https://pixabay.com/en/police-security-safety-protection-869216/

slide-22
SLIDE 22

Obscurity vs. Security

Last Five Years = Breach = Report ID Theft

  • Anthem, Inc.
  • CVS
  • Hannaford Supermarket
  • Michael’s
  • Target
  • Close and Reopen Accounts
  • Federal Trade Commission
  • US Postal Service
  • Credit Reporting Bureaus
  • Manchester PD

https://en.wikipedia.org/wiki/List_of_data_breaches

https://pixabay.com/en/fingerprint-security-privacy-policy-979598/

slide-23
SLIDE 23

Obscurity vs. Security

https://pixabay.com/en/key-hole-earth-by-looking-spannern-2351214

/

slide-24
SLIDE 24

http://www.publicdomainpictures.net/view-image.php?image=151449&picture=the-eye-of-sauron

Se Secur curity ity vs vs. . Su Surv rveillance eillance

slide-25
SLIDE 25

Security vs. Surveillance

I will show how we can use this “metadata” to find key persons involved in terrorist groups at the present time.... I shall also endeavour to show how these methods work in what might be called a relational manner.

slide-26
SLIDE 26

Security vs. Surveillance

I will show how we can use this “metadata” to find key persons involved in terrorist groups

  • perating within the colonies at the

present time I shall also endeavour to show how these methods work in what might be called a relational manner.

slide-27
SLIDE 27

https://kieranhealy.org/blog/archives/2013/06/09/using-metadata-to-find-paul-revere/ https://www.theverge.com/2014/1/17/5319534/paul-revere

https://www.amazon.com/Paul-Reveres-David-Hackett- Fischer/dp/0195098315

A C A Cas ase e in in Po Poin int “Using Meta Data to Find Paul Revere”

slide-28
SLIDE 28

https://commons.wikimedia.org/wiki/File:Henry_Singleton_The_Ale-House_Door_c._1790.jpg https://commons.wikimedia.org/wiki/File:George_III_by_Allan_Ramsay,_1787.png

A C A Cas ase e in in Po Poin int

slide-29
SLIDE 29

http://kieranhealy.org/files/misc/revere-network-reduced.png

Ye Olde Social Networke

St Andrew’s Lodge Loyal Nine North Caucus Long Room Club Tea Party Boston Committee London Enemies St Andrew’s Lodge

  • 1

3 2 3 5 Loyal Nine 1

  • 5

5 8 North Caucus 3 5

  • 8

15 11 20 Long Room Club 2 8

  • 1

5 5 Tea Party 3 5 15 1

  • 5

10 Boston Committee 11 5 5

  • 14

London Enemies 5 8 20 5 10 14

slide-30
SLIDE 30

http://kieranhealy.org/files/misc/revere-network-reduced.png

Ye Olde Social Networke

slide-31
SLIDE 31

http://kieranhealy.org/files/misc/revere-network-reduced.png

Ye Olde Social Networke

slide-32
SLIDE 32

Ye New Social Networke

Paul Revere Silversmith and Citizen Activist Greater Boston Area

Experience Provincial Militia 1756-1757 Self-employed –Silversmith and Engraver 1756-Present Education North Boston Writing School 1741-1747 Apprenticeship with Apollos Rivoire 1747-1754 Memberships St Andrew’s Lodge Loyal Nine North Caucus Long Room Club Tea Party Boston Committee London Enemies Connections: 500+ Connections in Common: John Adams Samuel Adams William Dawes John Hancock James Otis Joseph Warren

slide-33
SLIDE 33

http://www.publicdomainpictures.net/view-image.php?image=151449&picture=the-eye-of-sauron

Th The e Ri Righ ght t to to be be Fo Forgotten rgotten

slide-34
SLIDE 34

The Right to be Forgotten

https://pixabay.com/en/world-europe-map-connections-1264062/

slide-35
SLIDE 35

The Right to be Forgotten

Statement on the Right to be Forgotten

https://www.ifla.org/publications/node/10320

International Federation of Library Associations and Institutions (IFLA)

slide-36
SLIDE 36

Next Stop – The Splinternet

https://pixabay.com/en/earth-planet-space-planet-earth-1003188/ https://pixabay.com/en/cyan-blue-illustration-glass-2013252

slide-37
SLIDE 37

https://pixabay.com/en/identity-mask-disguise-mindset-510866/

slide-38
SLIDE 38

Recap:

  • 1. Privacy vs. Obscurity
  • 2. Obscurity vs. Security
  • 3. Security vs. Surveillance
  • 4. The “Right to be

Forgotten”

Questions?

Susan D. Ballard

sdballard@comcast.net susan.ballard@granite.edu @nholb

slide-39
SLIDE 39

Please take the evaluation (link in chat) to be entered for door prizes!