欢迎来到三一文库! | 帮助中心 三一文库31doc.com 一个上传文档投稿赚钱的网站
三一文库
全部分类
  • 研究报告>
  • 工作总结>
  • 合同范本>
  • 心得体会>
  • 工作报告>
  • 党团相关>
  • 幼儿/小学教育>
  • 高等教育>
  • 经济/贸易/财会>
  • 建筑/环境>
  • 金融/证券>
  • 医学/心理学>
  • ImageVerifierCode 换一换
    首页 三一文库 > 资源分类 > PPT文档下载  

    顶级模板欣赏.ppt

    • 资源ID:2637355       资源大小:7.80MB        全文页数:51页
    • 资源格式: PPT        下载积分:8
    快捷下载 游客一键下载
    会员登录下载
    微信登录下载
    三方登录下载: 微信开放平台登录 QQ登录   微博登录  
    二维码
    微信扫一扫登录
    下载资源需要8
    邮箱/手机:
    温馨提示:
    用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)
    支付方式: 支付宝    微信支付   
    验证码:   换一换

    加入VIP免费专享
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    顶级模板欣赏.ppt

    HUMAN RIGHTS & TECHNOLOGY,Mathias Klang,COMMUNICATION,Case 1,TECHNOLOGY & RIGHTS?,Why & What,TECHNOLOGY IS NOT ABOUT DEMOCRACY,Technology = Communication = Society = Democracy,Communication,Organization,Protest,Access,Religion,Privacy,Culture,Education,Press,THERE ARE NO SIDEWALKS ONLINE,LIFE IS ORGANIZED AROUND TECHNOLOGY,and it always has been.,BY CONTROLLING TECHNOLOGY WE CONTROL SOCIETY,Regulation of technology is the regulation of democracy,SO WHAT?,SO WHAT?,DISRUPTIVE TECHNOLOGY,The disruption occurs when the technology, which is introduced effects the social arrangements around which we build our lives,IMPULSE: CONTROL,ANTIDOTE?,Free Software,REGULATION,From Command and Control to Fuller & Lessig,WHATS WRONG WITH COMMAND AND CONTROL?,It relies to heavily upon coercion and cooperation.,ONLINE OFFLINE,“We are forming our own Social Contract. This governance will arise according to the conditions of our world, not yours. Our world is different.” (Barlow 1996),Regulatory Metaphor,Lessig (1999),CASES,Paparazzi (1898),Surveillance,Reklam (1902),Robertson v. Rochester Folding Box Co (1902) The court did not accept Brandeis & Warrens argument of a “common law” right,Surveillance,Hidden camera 1928,Execution of Ruth Snyder 1928,Surveillance,Surveillance,Surveillance,Little brothers,A must for anyone who needs to protect their loved ones, home or business!,Surveillance,SOLIDARITY,Case 4: Green Twitter, Location Tehran, Facebook for Monks,Arik Fraimovich (arikfr)set up helpiranelection.com & seeks support for the protesters in Iran. Support by “greening” the Twitter avatar,ORGANISATION,HSBC FRA & the Bloggquake (bloggbävning),Thank you!,TARGETING TECHNOLOGY,Case 3: The Lufthansa Case,DoS,Denial of Service - examples,1998 DoS attack against the Mexican presidents website. 8,000 hacktivists participated to show their support for the Zapatistas. In 2003 the electrohippies antiwar protest disrupted the PMs webpage (www.number-10.gov.uk/) causing it to be unavailable on several occasions.,DoS,Three way handshake (Gibson: www.grc.com),Denial of Service - technology,DoS,Denial of Service - the players,The Electrohippies Practitioners Now on walkabout The Cult of the Dead Cow Claim the name Hacktivism,DoS,Accountability: “we do not try bury our identities from law enforcement authorities any authority could, if it chose to, track us down in a few hours.” Popular participation: If people don't vote with their modems (rather than voting with their feet) the action would be an abject failure” Symbolism rather than damage,The Arguments: Electohippies,DoS,The Arguments 2: Dead Cow,“No rationale, even in the service of the highest ideals, makes them anything other than what they are - illegal, unethical, and uncivil” (Ruffin 2000).,DoS,SPEECH & CENSORSHIP,Case 1:,Censorship,Information Control,Local Client based (software4parents, matewatcher) Organizational Server based National Backbone/gateway based,Censorship,Filtering methods,Inclusion - whitelist Exclusion - blacklist Content analysis,Censorship,Privatizing Censorship,Non-technical/self censorship “Public Pledge of Self-Regulation & Professional Ethics for China Internet Industry” Responsibility on the signatories: Inspect & monitor foreign & domestic sites Block harmful information,Censorship,SURVEILLANCE,Case 2:,Surveillance,Integrity,That the individual shall have full protection in person and in property is a principle as old as the common law; but it has been necessary from time to time to define anew the exact nature and extent of such protection. Brandeis & Warren 1890,Surveillance,Louis Brandeis & Samuel Warren “The Right to Privacy,“ 4 Harvard Law Review 193-220 (1890-91),Surveillance,Technology 1888,1888 - Kodak nr 1 First mass produced box Simple and portable Shot exposure,Surveillance,

    注意事项

    本文(顶级模板欣赏.ppt)为本站会员(本田雅阁)主动上传,三一文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三一文库(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    经营许可证编号:宁ICP备18001539号-1

    三一文库
    收起
    展开