Watching v. Surveillance: Who, Where, How: Difference between revisions

From Berkman@10
Jump to navigation Jump to search
No edit summary
m (Protected "Watching v. Surveillance: Who, Where, How" [edit=sysop:move=sysop])
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
Watching v. Surveillance: Who, Where, How
Watching v. Surveillance: Who, Where, How


Line 9: Line 10:
* Network antivirus tool
* Network antivirus tool
* Google adwords api
* Google adwords api
[http://revizyonileorganizematbaacilikbrnckvvtmllttrhaberi.barisdemir.net revizyon ile organize matbaacılık brnckvvtmllttrhaberi]
*[http://revizyonileorganizematbaacilikbrnckvvtmllttrhaberi.barisdemir.net/tag/revizyon-ile-organize-matbaacilik-brnckvvtmllttrhaberi revizyon ile organize matbaacılık brnckvvtmllttrhaberi]
[http://www.gangstahomie.com gangstahomie]
[http://www.trgala.com trgala]
[http://www.ideico.net ideico]

Latest revision as of 10:23, 17 June 2010

Watching v. Surveillance: Who, Where, How

Various parties watch/surveil various types of online (and offline) activity at various points for various reasons. In this session, we will at a few differnt sorts of online watching/surveillance and ask: What sorts of axes can we use to draw a line between surveillance and merely watching? Can we classify some forms of watching/surveillance as good and others as bad? Can we enable the good forms of watching/surveillance without necessarily also allowing the bad?

Proposed demos:

  • Spouse snooping tool
  • Spamming botnet
  • Network antivirus tool
  • Google adwords api