Watching v. Surveillance: Who, Where, How: Difference between revisions
Jump to navigation
Jump to search
(New page: Watching v. Surveillance: Who, Where, How Various parties watch/surveil various types of online (and offline) activity at various points for various reasons. In this session, we will a...) |
BerkmanSysop (talk | contribs) m (Protected "Watching v. Surveillance: Who, Where, How" [edit=sysop:move=sysop]) |
||
(2 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
Watching v. Surveillance: Who, Where, How | Watching v. Surveillance: Who, Where, How |
Latest revision as of 10:23, 17 June 2010
Watching v. Surveillance: Who, Where, How
Various parties watch/surveil various types of online (and offline) activity at various points for various reasons. In this session, we will at a few differnt sorts of online watching/surveillance and ask: What sorts of axes can we use to draw a line between surveillance and merely watching? Can we classify some forms of watching/surveillance as good and others as bad? Can we enable the good forms of watching/surveillance without necessarily also allowing the bad?
Proposed demos:
- Spouse snooping tool
- Spamming botnet
- Network antivirus tool
- Google adwords api