susan d ballard
play

Susan D. Ballard Granite State College/USNH Day 1, July 20, 2017, - PowerPoint PPT Presentation

The Right to Obscurity vs. The Digital Eye of Sauron Susan D. Ballard Granite State College/USNH Day 1, July 20, 2017, 2:30-3:30 pm Eastern A project of the University of Michigan School of Information, U-M Library, and U-M School of Education.


  1. The Right to Obscurity vs. The Digital Eye of Sauron Susan D. Ballard Granite State College/USNH Day 1, July 20, 2017, 2:30-3:30 pm Eastern A project of the University of Michigan School of Information, U-M Library, and U-M School of Education. This project was made possible in part by the Institute of Museum and Library Services RE 00-00-15-0113-15.

  2. Sponsors

  3. Door Prizes

  4. Door Prize: 6 Months of Easel.ly Pro

  5. SCECHs Log in with your full name Attend all of at least 3 live sessions and up to 8 Scan your form and email to contact.data.literacy@umich.edu by July 24 AND mail it in (mailing is new this year). More information: http://dataliteracy.si.umich.edu/scech

  6. New in 2017! For those needing certificates … Follow SCECH instructions (scan and mail). Plus Go to http://bit.ly/4t-store  Pay $25 there no later than Monday, July 24 

  7. http://dataliteracy.si.umich.edu/conference #4tdl

  8. Join us in the chat! Where are you from?

  9. The Right to Obscurity vs. The Digital Eye of Sauron Susan D. Ballard Granite State College/USNH Day 1, July 20, 2017, 2:30-3:30 pm Eastern A project of the University of Michigan School of Information, U-M Library, and U-M School of Education. This project was made possible in part by the Institute of Museum and Library Services RE 00-00-15-0113-15.

  10. Susan D. Ballard Presenter @nholb “I’m wicked gl glad ad to to be be he he- ah.” Public domain: https://commons.wikimedia.org/wiki/File:J_S_Copley_-_Paul_Revere.jpg

  11. SL C L Competencies mpetencies an and d Ru Rubr bric ic Ba Base sed d on th n the e PSEL’s htt ttp:// ://researchg researchguides.a uides.austin ustincc. cc.edu/ edu/ c. c.php hp?g=55 ?g=55436 4360& 0&p= p=38 3891603 91603

  12. The Th e Ey Eye Of Sa e Of Sauron uron http://www.publicdomainpictures.net/view-image.php?image=151449&picture=the-eye-of-sauron Inside a Hobbit Hole by Rob Chandler (Rob & Jules) (Flickr) [CC BY-SA 2.0 (http://creativecommons.org/licenses/by-sa/2.0)], via Wikimedia Commons

  13. Today, we’ll focus on looking at: 1. Privacy vs. Obscurity 2. Obscurity vs. Security 3. Security vs. Surveillance 4.“The Right to be Forgotten”

  14. Pri Priva vacy cy vs vs. . Obs Obscur curity ity http://www.publicdomainpictures.net/view-image.php?image=151449&picture=the-eye-of-sauron

  15. Privacy vs. Obscurity “ Louis Brandeis, the father of privacy in the modern era – as well as the father of the Federal Trade Commission – defined privacy as the “right to be let alone.” Individuals want to be able to share with their friends and business associates on social media, shop online, and use connected devices, but they don’t necessarily want all of these activities monitored, tracked, collected, and used by entities they do not know or with whom they have no relationship. And this is where obscurity fits in. Obscurity means that personal information isn’t readily available to just anyone. It doesn’t mean that information is wiped out or even locked up; rather, it means that some combination of factors makes certain types of information relatively hard to find .” Julie Brill, Commissioner, Federal Trade Commission 2010-2017 https://www.csmonitor.com/World/Passcode/Passcode-Voices/2015/0415/Why-you-have-the-right-to-obscurity

  16. Privacy vs. Obscurity https://pixabay.com/en/statue-camouflage-hidden-discreet-2393168/

  17. Privacy vs. Obscurity https://pixabay.com/en/vacuum-cleaner-vacuuming-cleaning-268179/

  18. Privacy vs. Obscurity CC BY-NC-ND 2.0 https://www.flickr.com/photos/pittcaleb/2371328829

  19. Obs Obscurity curity vs vs. . Se Secur curity ity http://www.publicdomainpictures.net/view-image.php?image=151449&picture=the-eye-of-sauron

  20. Obscurity vs. Security https://pixabay.com/en/police-security-safety-protection-869216/

  21. Obscurity vs. Security Last Five Years = Breach = Report ID Theft • Anthem, Inc. • Close and Reopen Accounts • CVS • Federal Trade Commission • Hannaford Supermarket • US Postal Service • Michael’s • Credit Reporting Bureaus • Target • Manchester PD https://en.wikipedia.org/wiki/List_of_data_breaches https://pixabay.com/en/fingerprint-security-privacy-policy-979598/

  22. Obscurity vs. Security https://pixabay.com/en/key-hole-earth-by-looking-spannern-2351214 /

  23. Se Secur curity ity vs vs. . Su Surv rveillance eillance http://www.publicdomainpictures.net/view-image.php?image=151449&picture=the-eye-of-sauron

  24. Security vs. Surveillance I will show how we can use this “metadata” to find key persons involved in terrorist groups at the present time.... I shall also endeavour to show how these methods work in what might be called a relational manner.

  25. Security vs. Surveillance I will show how we can use this “metadata” to find key persons involved in terrorist groups operating within the colonies at the present time I shall also endeavour to show how these methods work in what might be called a relational manner.

  26. A Cas A C ase e in in Po Poin int “Using Meta Data to Find Paul Revere” https://kieranhealy.org/blog/archives/2013/06/09/using-metadata-to-find-paul-revere/ https://www.theverge.com/2014/1/17/5319534/paul-revere https://www.amazon.com/Paul-Reveres-David-Hackett- Fischer/dp/0195098315

  27. A Cas A C ase e in in Po Poin int https://commons.wikimedia.org/wiki/File:Henry_Singleton_The_Ale-House_Door_c._1790.jpg https://commons.wikimedia.org/wiki/File:George_III_by_Allan_Ramsay,_1787.png

  28. Ye Olde Social Networke St Andrew’s Loyal Nine North Caucus Long Room Tea Party Boston London Lodge Club Committee Enemies St Andrew’s - 1 3 2 3 0 5 Lodge Loyal Nine 1 - 5 0 5 0 8 North Caucus 3 5 - 8 15 11 20 Long Room 2 0 8 - 1 5 5 Club Tea Party 3 5 15 1 - 5 10 Boston 0 0 11 5 5 - 14 Committee London 5 8 20 5 10 14 - Enemies http://kieranhealy.org/files/misc/revere-network-reduced.png

  29. Ye Olde Social Networke http://kieranhealy.org/files/misc/revere-network-reduced.png

  30. Ye Olde Social Networke http://kieranhealy.org/files/misc/revere-network-reduced.png

  31. Ye New Social Networke Paul Revere Silversmith and Citizen Activist Greater Boston Area Experience Provincial Militia 1756-1757 Self-employed – Silversmith and Engraver 1756-Present Education North Boston Writing School 1741-1747 Apprenticeship with Apollos Rivoire 1747-1754 Connections: 500+ Memberships Connections in Common: St Andrew’s Lodge John Adams Loyal Nine Samuel Adams North Caucus William Dawes Long Room Club John Hancock Tea Party James Otis Joseph Warren Boston Committee London Enemies

  32. Th The e Ri Righ ght t to to be be Fo Forgotten rgotten http://www.publicdomainpictures.net/view-image.php?image=151449&picture=the-eye-of-sauron

  33. The Right to be Forgotten https://pixabay.com/en/world-europe-map-connections-1264062/

  34. The Right to be Forgotten Statement on the Right to be Forgotten https://www.ifla.org/publications/node/10320 I nternational F ederation of L ibrary A ssociations and Institutions (IFLA)

  35. Next Stop – The Splinternet https://pixabay.com/en/earth-planet-space-planet-earth-1003188/ https://pixabay.com/en/cyan-blue-illustration-glass-2013252

  36. https://pixabay.com/en/identity-mask-disguise-mindset-510866/

  37. Recap: Questions? 1. Privacy vs. Obscurity Susan D. Ballard 2. Obscurity vs. Security sdballard@comcast.net susan.ballard@granite.edu 3. Security vs. Surveillance @nholb 4. The “Right to be Forgotten”

  38. Please take the evaluation (link in chat) to be entered for door prizes!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend