online journalism: theory and practice

36
Online Journalism: Theory and Practice Week 12 Lecture 1 Summer 2011 G. F Khan, PhD Dept. of Media & Communication, YeungNam University, South Korea [email protected]

Upload: leone

Post on 24-Feb-2016

43 views

Category:

Documents


0 download

DESCRIPTION

Online Journalism: Theory and Practice. Week 12 Lecture 1 Summer 2011 G. F Khan, PhD Dept. of Media & Communication, YeungNam University, South Korea g [email protected]. Last lecture…. --Web design basics. This class. Surveillance Sensitive Personal Data/Information Privacy - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Online Journalism: Theory and Practice

Online Journalism: Theory and Practice

Week 12Lecture 1

Summer 2011

G. F Khan, PhDDept. of Media & Communication, YeungNam University,

South [email protected]

Page 2: Online Journalism: Theory and Practice

Last lecture…

--Web design basics

Page 3: Online Journalism: Theory and Practice

This class• Surveillance• Sensitive Personal Data/Information• Privacy• Data protection

– Legislation, governance, practice• Dataveillance• Social Sorting• Surveillance Society

Page 4: Online Journalism: Theory and Practice

What is Surveillance?

Page 5: Online Journalism: Theory and Practice

Surveillance

• Surveillance – to watch over – paying close attention to personal details for the purpose of influencing, managing or controlling those under inspection or scrutiny (Lyon)

• Purposeful, Routine, systematic, focused attention paid to personal details for the sake of control, entitlement, management, influence or protection (OIC report 2006)

Page 6: Online Journalism: Theory and Practice

Surveillance (2)

Surveillance involves the use of techniques to gather and use information about individuals – their personal details, their movements and social contacts, their habits and behaviour, their communication – in order to make administrative or business decisions that affect their life chances and those of the groups or categories into which they are construed to fall. (OIC report 2010)

Page 7: Online Journalism: Theory and Practice

Surveillance (3)

Mass SurveillanceSystematic surveillance of everyone

Targeted SurveillanceSurveillance of particular individuals places or

activities

Both can use tools of Internet age, but increasing possibilities for mass surveillance

Page 8: Online Journalism: Theory and Practice

Surveillance (4)Watching each other (p2p), lateral

surveillance

Government surveillance - of individuals and organisations

Commercial surveillance - of individuals and organisations

‘Sousveillance’ of powerful organisationsOrdinary people doing the watching, rather than

higher authorities or architectures doing the watching

Page 9: Online Journalism: Theory and Practice

Surveillance (5)

of individuals

By individuals by organizations

Of organisations

Peer monitoringsurveillance

Sousveillance

Holding to account/ espionage

Page 10: Online Journalism: Theory and Practice

Why surveillance?

Page 11: Online Journalism: Theory and Practice

Theoretical approaches-Surveillance

Enables rationalisation and efficiency in the bureaucratic systems

Productivity and economic efficiency in the capitalist system– not only in production, but in marketing and selling.

Many see surveillance central to the emergence of states, and all the institutions of states.

State does not only use violence, but surveillance, which is a powerful tool in development of dictatorship.

Page 12: Online Journalism: Theory and Practice

What is Privacy?

Page 13: Online Journalism: Theory and Practice

Privacy

Privacy is the interest that individuals have in sustaining a 'personal space', free from interference by other people and organizations. (Clarke, 2005)

http://www.rogerclarke.com/DV/Intro.html

Page 14: Online Journalism: Theory and Practice

Privacy of personal communications. • Individuals claim an interest in being able to

communicate among themselves, using various media, without routine monitoring of their communications by other persons or organisations. This includes what is sometimes referred to as 'interception privacy'; and

Privacy of personal data. • Individuals claim that data about themselves should

not be automatically available to other individuals and organisations, and that, even where data is possessed by another party, the individual must be able to exercise a substantial degree of control over that data and its use. This is sometimes referred to as 'data privacy' and 'information privacy'.

Dimensions of Privacy (by Clarke,2005)

Page 15: Online Journalism: Theory and Practice

Dimensions of Privacy (by Clarke,2005)

Privacy of the person:• Sometimes referred to as 'bodily privacy' This is

concerned with the integrity of the individual's body. Issues include compulsory immunisation, blood transfusion without consent, compulsory provision of samples of body fluids and body tissue, and compulsory sterilisation;

Privacy of personal behaviour:• This relates to all aspects of behaviour, but especially

to sensitive matters, such as sexual preferences and habits, political activities and religious practices, both in private and in public places. It includes what is sometimes referred to as 'media privacy';

Page 16: Online Journalism: Theory and Practice

What is personal data?

Page 17: Online Journalism: Theory and Practice

Personal Data?

Highly contested concept

To be “personal data”, data must be capable of affecting an identifiable person in a material way, and the notion of what is a relevant effect permits various interpretations. (ICO report 2010)

‘Sensitive personal data’

Page 18: Online Journalism: Theory and Practice

Dataveillance (Clarke)

Collection, classification, linking and use of personal and collective information

Creation of information ‘identity’ The individual and their data ‘identity’What makes up your ‘data identity’?Personal Data

Page 19: Online Journalism: Theory and Practice
Page 20: Online Journalism: Theory and Practice

OCI survey of 27 European countries approach to PD (2004)

‘Unique Identifier’ ModelPersonal Data is data which may be uniquely related to an individual. Due to the

uniqueness of the data, it is impossible for it to be anonymised in such a way as to render it impossible for it to continue to be related to an identifiable person. Context is irrelevant.

‘Affects’ Model Personal Data is data which is capable of affecting an individual in a relevant way.

It is possible to anticipate whether data will affect an individual in a relevant way without taking account of context.

‘Context Dependent Identifier’ Model Personal Data is data which may identify an individual. All data is capable of being

personal data, as any data is capable of identifying an individual in the right circumstances.

‘Context Dependent Affects’ Model Personal Data is data which may affect an individual in a relevant way. All data is

capable of being personal data, as any data is capable of affecting an individual in a relevant way in the right circumstances.

Page 21: Online Journalism: Theory and Practice

Personal Data in the Internet?IP address and trailCookiesSpywareWebsite specific personal data – e-government and

ecommerceBank/credit card; Government; Commercial records

Search term logsPosts to bulletin boardsEmails; Chat logsSNS posts etcDesigned into technology

Page 22: Online Journalism: Theory and Practice

Consent and limits of data use

We are not passive ‘data objects’We can give or withhold our consentTypes and use of consent

Informed consentExplicit consentAlso known as express or direct consent —

means that an individual is clearly presented with an option to agree or disagree with the collection, use, or disclosure of personal information.

Implicit consentOpt-in or opt-out

Page 23: Online Journalism: Theory and Practice

How we can protect privacy?

Page 24: Online Journalism: Theory and Practice

Protecting privacy

Law- e.g. Data protection directive of EUPolicy and Policy PracticeTechnologySelf-regulation

Page 25: Online Journalism: Theory and Practice

Protecting privacy, making consent work

The seven principles governing the OECD’s recommendations for protection of personal data were:

Notice—data subjects should be given notice when their data is being collected;

Purpose—data should only be used for the purpose stated and not for any other purposes;

Consent—data should not be disclosed without the data subject’s consent; Security—collected data should be kept secure from any potential abuses; Disclosure—data subjects should be informed as to who is collecting their

data; Access—data subjects should be allowed to access their data and make

corrections to any inaccurate data; and Accountability—data subjects should have a method available to them to

hold data collectors accountable for following the above principles

Page 26: Online Journalism: Theory and Practice

Internet’s threat to personal data (Clarke, 1998)Transmission Insecurity

Data transmitted over the Internet is subject to several risks: it might not reach the intended recipient; it might reach an unintended person or organisation; it might be accessed by an unintended person or

organisation; the contents might change while in transit; a message might be transmitted that purports (claims) to

come from a particular sender, but doesn't; a sender may wrongfully deny that they sent it; and a recipient might wrongfully deny that they received it.

Page 27: Online Journalism: Theory and Practice

Internet’s threat to personal data (Clarke, 1998)More Transaction Trails, of Greater Intensity

Internet transactions enable the automated maintenance of yet more trails of each person's activities and locations, including: logs of email messages sent and received; logs of web-pages visited (referred to by marketers as `the

click-trail'); and logs of transactions using the many other Internet services

(such as FTP, Telnet, IRCs, MUDs, video-phones and video-conferences).

A cookie is a record that is written onto the local drive of the web-browser, as a result of a command issued by a web-server

Page 28: Online Journalism: Theory and Practice

Internet’s threat to personal data (Clarke, 1998)

Personal Profile ExtractionOne extract all your information from your

online profile, even after you delete it. E.g. Facebook

Push-MarketingTracking your online behavior and send you

with ads while your visiting some website.

Page 29: Online Journalism: Theory and Practice

Threats to Personal Identity (Clarke, 1998)

Appropriation of One's IdentityIdentity theft is the acquisition and use of sufficient

evidence of identity relating to a particular person that the thief can operate as though they were that person.

e.g. stealing credit card number, email ID and password etc

Location Services Through GPS and other technology people can know exactly

where are you. Good side V.S bad side?

Page 30: Online Journalism: Theory and Practice

What is Surveillance Society?We live in a surveillance society-every move is watched

every key stroke in recorded. In all the rich countries of the world everyday life is

suffused with surveillance encounters, not merely from dawn to dusk but 24/7.

There are complex infrastructure which assumes that gathering and processing personal data is vital to contemporary living.E.g. CCTV, fingerprints or iris scans, communication

records or the actual content of calls

Page 31: Online Journalism: Theory and Practice

Two sides of Surveillance SocietyBenefit

Efficiency speed control Law and order Coordination, and Reduction of corruption

Drawbacks Privacy-a lot of personal data collected Security- what if this data goes into wrong hands? Large infrastructure large problems- e.g. social security or medical

databases if corrupted or hacked? Who is watching the watcher?

Page 32: Online Journalism: Theory and Practice

Key issues in surveillanceSocial SortingFunction CreepData Flow

Page 33: Online Journalism: Theory and Practice

Social SortingIn government and commerce large personal

information databases are analysed and categorized to define target markets and risky populations

To make sense of personal dataExamples?

Micro targeting in politicsMarketing e.g. Amazon and eBay Suspicious individual behaviourConnivance for customers e.g. easy to find your

product and save time

Page 34: Online Journalism: Theory and Practice

Function Creep

Collected for one purpose, but used for other purpose beyond what was originally understood and considered socially, ethically and legally acceptable

Examples?

Page 35: Online Journalism: Theory and Practice

Data Flow

Data gathered by surveillance technologies flow around computer networks.

Many may consent to giving data in one setting, but what happens if those data are then transferred elsewhere?

Page 36: Online Journalism: Theory and Practice

Thank YouQuestions & Comments