SlideShare una empresa de Scribd logo
1 de 60
Descargar para leer sin conexión
Society vs Privacy: the impossible dilemma  ,[object Object]
Three layers of society
 
Law Contextual &  programmed social  rules Architecture
Norms from above
Contextual &  programmed social  rules
privacy ,[object Object]
.Privacy.integrity.Identity.anonymity.pseudonymity.
The Right to Privacy ,[object Object],Warren and Brandeis  The Right to Privacy,  4 Harvard Law Review 193 (1890)
"You have  zero privacy anyway.  Get over it." ,[object Object]
“ Having two identities for yourself is an example of a lack of integrity” ,[object Object]
 
 
 
 
Data/information
Data Spatial
Game changer: storage
Production costs
Musikhistoria är olagrad för 1857
Betydelse?
Mike Welsch Web 2.0 ... The Machine is Us/ing Us  ,[object Object]
Game changer: communication
Digitalization Connectivity Storage Devices
Flickr 2000 2001 2002 2003 2005 2004 2006 Wikipedia Linkedin Blogger 1999 Second Life My Space Skype Digg Facebook Ning YouTube Twitter Spotify Google c:a 1998 2008 2007 2009 Farmville iphone Wikileaks Angry  Birds
Technology changing society,  but social rules slow to evolve…
Surveillance: gaze from above
power ,[object Object]
The state ,[object Object]
 
Sousveillance:  A gaze from below
Social ties ,[object Object]
“ friends”
Autoveillance:  a gaze from within
Exhibitionism? ,[object Object]
We used to leak information
Compartmentalization
Analog social norms
Protection from the outer gaze
Today we have a mix of sur, sous & autoveillance. regulation mainly focuses on surveillance.
End of privacy?
The Hive-mind
If you have  done nothing wrong,  you have nothing to fear
We have (theoretical) control over Big Brother
If you are not paying for it, you're not the customer; you're the product being sold
personalization
The internet is shows us what it thinks that we want to see – not what we need to see ,[object Object]
Identity & Information junk food.
It will be very hard for people to watch or consume something that has not in some sense been tailored for them. ,[object Object]
Technology is not inherently democratic
Law without infrastructure
Problem 1: We are stupid
Problem 2: We don’ t know what we don ’ t know
Problem 3: difference between who I want to be & who I am…
Problem 4: The keepers of algorithms know this
There have always been  gatekeepers.
We have (theoretical) control over Big Brother
A Squirrel Dying In Your Front Yard May Be More Relevant To Your Interests Right Now Than People Dying In Africa ,[object Object]
Thank you.
Information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Government & Social Media
Government & Social MediaGovernment & Social Media
Government & Social MediaMathias Klang
 
Law, Ethics & Information Systems
Law, Ethics  & Information SystemsLaw, Ethics  & Information Systems
Law, Ethics & Information SystemsMathias Klang
 
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)Davide Ceolin
 
emerging technologies for the ass'n of legal administrators
emerging technologies for the ass'n of legal administratorsemerging technologies for the ass'n of legal administrators
emerging technologies for the ass'n of legal administratorsDenise Howell
 
Privacy Culture V 2
Privacy Culture V 2Privacy Culture V 2
Privacy Culture V 2Brian Rowe
 
Privacy Culture
Privacy CulturePrivacy Culture
Privacy CultureBrian Rowe
 
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of WhistleblowingETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of WhistleblowingMichael Heron
 
Tech 621 digital_divide
Tech 621 digital_divideTech 621 digital_divide
Tech 621 digital_dividehockeyisgood
 
UX Australia 2017. No Pressure - We just need you to design reality.
UX Australia 2017.  No Pressure - We just need you to design reality.UX Australia 2017.  No Pressure - We just need you to design reality.
UX Australia 2017. No Pressure - We just need you to design reality.Greg Saxton
 
Flipbook online privacy
Flipbook online privacyFlipbook online privacy
Flipbook online privacyTyler Shackman
 
Digital Citizenship Conversations
Digital Citizenship ConversationsDigital Citizenship Conversations
Digital Citizenship ConversationsDarren Kuropatwa
 
Human In The Net
Human In The NetHuman In The Net
Human In The Netfeng37
 
The problem of online piracy
The problem of online piracyThe problem of online piracy
The problem of online piracyKyle Taksar
 
Info-Activism and Online Dispute Resolution: Strange Bedfellows?
Info-Activism and Online Dispute Resolution: Strange Bedfellows?Info-Activism and Online Dispute Resolution: Strange Bedfellows?
Info-Activism and Online Dispute Resolution: Strange Bedfellows?Bill Warters
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security ThreatsJesse Wilkins
 
Stalking in the Cyberspace
Stalking in the CyberspaceStalking in the Cyberspace
Stalking in the CyberspaceEmil Tan
 
Situational Awareness 2.0 #EMAG2011
Situational Awareness 2.0 #EMAG2011 Situational Awareness 2.0 #EMAG2011
Situational Awareness 2.0 #EMAG2011 Connie White
 
The social networks
The social networksThe social networks
The social networksPaco Carmona
 

La actualidad más candente (20)

Government & Social Media
Government & Social MediaGovernment & Social Media
Government & Social Media
 
Law, Ethics & Information Systems
Law, Ethics  & Information SystemsLaw, Ethics  & Information Systems
Law, Ethics & Information Systems
 
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
 
emerging technologies for the ass'n of legal administrators
emerging technologies for the ass'n of legal administratorsemerging technologies for the ass'n of legal administrators
emerging technologies for the ass'n of legal administrators
 
Privacy Culture V 2
Privacy Culture V 2Privacy Culture V 2
Privacy Culture V 2
 
Privacy Culture
Privacy CulturePrivacy Culture
Privacy Culture
 
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of WhistleblowingETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
 
Tech 621 digital_divide
Tech 621 digital_divideTech 621 digital_divide
Tech 621 digital_divide
 
UX Australia 2017. No Pressure - We just need you to design reality.
UX Australia 2017.  No Pressure - We just need you to design reality.UX Australia 2017.  No Pressure - We just need you to design reality.
UX Australia 2017. No Pressure - We just need you to design reality.
 
Social Media and The Law
Social Media and The LawSocial Media and The Law
Social Media and The Law
 
Flipbook online privacy
Flipbook online privacyFlipbook online privacy
Flipbook online privacy
 
Digital Citizenship Conversations
Digital Citizenship ConversationsDigital Citizenship Conversations
Digital Citizenship Conversations
 
Human In The Net
Human In The NetHuman In The Net
Human In The Net
 
The problem of online piracy
The problem of online piracyThe problem of online piracy
The problem of online piracy
 
Info-Activism and Online Dispute Resolution: Strange Bedfellows?
Info-Activism and Online Dispute Resolution: Strange Bedfellows?Info-Activism and Online Dispute Resolution: Strange Bedfellows?
Info-Activism and Online Dispute Resolution: Strange Bedfellows?
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats
 
Stalking in the Cyberspace
Stalking in the CyberspaceStalking in the Cyberspace
Stalking in the Cyberspace
 
Situational Awareness 2.0 #EMAG2011
Situational Awareness 2.0 #EMAG2011 Situational Awareness 2.0 #EMAG2011
Situational Awareness 2.0 #EMAG2011
 
The social networks
The social networksThe social networks
The social networks
 
Whistleblowing
WhistleblowingWhistleblowing
Whistleblowing
 

Similar a Society vs Privacy: the impossible dilemma

A Paranoid Peek at Social Media
A Paranoid Peek at Social MediaA Paranoid Peek at Social Media
A Paranoid Peek at Social MediaMathias Klang
 
Surveillance, Sousveillance, Autoveillance
Surveillance, Sousveillance, AutoveillanceSurveillance, Sousveillance, Autoveillance
Surveillance, Sousveillance, AutoveillanceMathias Klang
 
Old Rules - New Media: application & interpretation
Old Rules - New Media: application & interpretationOld Rules - New Media: application & interpretation
Old Rules - New Media: application & interpretationMathias Klang
 
Law and Disorder in New & Social Media
Law and Disorder in New & Social MediaLaw and Disorder in New & Social Media
Law and Disorder in New & Social MediaMathias Klang
 
Will technology set us free
Will technology set us freeWill technology set us free
Will technology set us freeMathias Klang
 
Privacy: why should we be concerned?
Privacy: why should we be concerned?Privacy: why should we be concerned?
Privacy: why should we be concerned?Mathias Klang
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
Regulating the Network
Regulating the NetworkRegulating the Network
Regulating the NetworkMathias Klang
 
Expressions in Code and Freedom
Expressions in Code and FreedomExpressions in Code and Freedom
Expressions in Code and FreedomMathias Klang
 
Empowerment or Destruction: copyright & creative commons
Empowerment or Destruction: copyright & creative commonsEmpowerment or Destruction: copyright & creative commons
Empowerment or Destruction: copyright & creative commonsMathias Klang
 
The Censorship Of The Digital Age
The Censorship Of The Digital AgeThe Censorship Of The Digital Age
The Censorship Of The Digital AgeAngie Love
 
The Challenges Of Black Hat Hacking
The Challenges Of Black Hat HackingThe Challenges Of Black Hat Hacking
The Challenges Of Black Hat HackingKatie Parker
 
Truth, Lies & Social Media
Truth, Lies & Social MediaTruth, Lies & Social Media
Truth, Lies & Social MediaMathias Klang
 
Empowered Citizens or Digital Dairy Cows
Empowered Citizens or Digital Dairy Cows Empowered Citizens or Digital Dairy Cows
Empowered Citizens or Digital Dairy Cows Mathias Klang
 
Dangerous Bits of Information - Nokios Trondheim
Dangerous Bits of Information - Nokios TrondheimDangerous Bits of Information - Nokios Trondheim
Dangerous Bits of Information - Nokios TrondheimMathias Klang
 
Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Lutz Schmitt
 
2600 v21 n3 (autumn 2004)
2600 v21 n3 (autumn 2004)2600 v21 n3 (autumn 2004)
2600 v21 n3 (autumn 2004)Felipe Prado
 
Claws to the Weak: internet and rights
Claws to the Weak: internet and rightsClaws to the Weak: internet and rights
Claws to the Weak: internet and rightsMathias Klang
 
Privacy in the digital era
Privacy in the digital eraPrivacy in the digital era
Privacy in the digital eraCHEMISTRY AGENCY
 

Similar a Society vs Privacy: the impossible dilemma (20)

A Paranoid Peek at Social Media
A Paranoid Peek at Social MediaA Paranoid Peek at Social Media
A Paranoid Peek at Social Media
 
Surveillance, Sousveillance, Autoveillance
Surveillance, Sousveillance, AutoveillanceSurveillance, Sousveillance, Autoveillance
Surveillance, Sousveillance, Autoveillance
 
Old Rules - New Media: application & interpretation
Old Rules - New Media: application & interpretationOld Rules - New Media: application & interpretation
Old Rules - New Media: application & interpretation
 
Law and Disorder in New & Social Media
Law and Disorder in New & Social MediaLaw and Disorder in New & Social Media
Law and Disorder in New & Social Media
 
Will technology set us free
Will technology set us freeWill technology set us free
Will technology set us free
 
Privacy: why should we be concerned?
Privacy: why should we be concerned?Privacy: why should we be concerned?
Privacy: why should we be concerned?
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
Regulating the Network
Regulating the NetworkRegulating the Network
Regulating the Network
 
Expressions in Code and Freedom
Expressions in Code and FreedomExpressions in Code and Freedom
Expressions in Code and Freedom
 
Empowerment or Destruction: copyright & creative commons
Empowerment or Destruction: copyright & creative commonsEmpowerment or Destruction: copyright & creative commons
Empowerment or Destruction: copyright & creative commons
 
The Censorship Of The Digital Age
The Censorship Of The Digital AgeThe Censorship Of The Digital Age
The Censorship Of The Digital Age
 
The Challenges Of Black Hat Hacking
The Challenges Of Black Hat HackingThe Challenges Of Black Hat Hacking
The Challenges Of Black Hat Hacking
 
Truth, Lies & Social Media
Truth, Lies & Social MediaTruth, Lies & Social Media
Truth, Lies & Social Media
 
Empowered Citizens or Digital Dairy Cows
Empowered Citizens or Digital Dairy Cows Empowered Citizens or Digital Dairy Cows
Empowered Citizens or Digital Dairy Cows
 
Dangerous Bits of Information - Nokios Trondheim
Dangerous Bits of Information - Nokios TrondheimDangerous Bits of Information - Nokios Trondheim
Dangerous Bits of Information - Nokios Trondheim
 
Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017
 
Persuasive Essay On Privacy
Persuasive Essay On PrivacyPersuasive Essay On Privacy
Persuasive Essay On Privacy
 
2600 v21 n3 (autumn 2004)
2600 v21 n3 (autumn 2004)2600 v21 n3 (autumn 2004)
2600 v21 n3 (autumn 2004)
 
Claws to the Weak: internet and rights
Claws to the Weak: internet and rightsClaws to the Weak: internet and rights
Claws to the Weak: internet and rights
 
Privacy in the digital era
Privacy in the digital eraPrivacy in the digital era
Privacy in the digital era
 

Más de Mathias Klang

Surveillance in the Simulacrum
Surveillance in the SimulacrumSurveillance in the Simulacrum
Surveillance in the SimulacrumMathias Klang
 
Web of Introverts and Selfie Culture
Web of Introverts and Selfie CultureWeb of Introverts and Selfie Culture
Web of Introverts and Selfie CultureMathias Klang
 
Screens & Maps: Is seeing believing?
Screens & Maps: Is seeing believing?Screens & Maps: Is seeing believing?
Screens & Maps: Is seeing believing?Mathias Klang
 
Sharing, oversharing and selfies
Sharing, oversharing and selfiesSharing, oversharing and selfies
Sharing, oversharing and selfiesMathias Klang
 
Copyright & Licensing: The progress of science & useful arts
Copyright & Licensing: The progress of science & useful arts Copyright & Licensing: The progress of science & useful arts
Copyright & Licensing: The progress of science & useful arts Mathias Klang
 
Academic Writing: Things to think about.
Academic Writing: Things to think about. Academic Writing: Things to think about.
Academic Writing: Things to think about. Mathias Klang
 
Civil Disobedience & Technology
Civil Disobedience & TechnologyCivil Disobedience & Technology
Civil Disobedience & TechnologyMathias Klang
 
Regulating Online Public/Private Spaces
Regulating Online Public/Private Spaces Regulating Online Public/Private Spaces
Regulating Online Public/Private Spaces Mathias Klang
 
Public/Private Spaces: Pulling things together
Public/Private Spaces: Pulling things togetherPublic/Private Spaces: Pulling things together
Public/Private Spaces: Pulling things togetherMathias Klang
 
Digital Divides and Net Neutrality
Digital Divides and Net NeutralityDigital Divides and Net Neutrality
Digital Divides and Net NeutralityMathias Klang
 
Design and Access to the city
Design and Access to the cityDesign and Access to the city
Design and Access to the cityMathias Klang
 
Cities, Suburbs & Design
Cities, Suburbs & DesignCities, Suburbs & Design
Cities, Suburbs & DesignMathias Klang
 
Technologies of control & desire
Technologies of control & desireTechnologies of control & desire
Technologies of control & desireMathias Klang
 
Introduction to Civic Media com371
Introduction to Civic Media com371Introduction to Civic Media com371
Introduction to Civic Media com371Mathias Klang
 
Platforms of Restraint: News aggregators, open webs & community
Platforms of Restraint: News aggregators, open webs & communityPlatforms of Restraint: News aggregators, open webs & community
Platforms of Restraint: News aggregators, open webs & communityMathias Klang
 
Is that your book? On content & carriers
Is that your book? On content & carriersIs that your book? On content & carriers
Is that your book? On content & carriersMathias Klang
 

Más de Mathias Klang (20)

Surveillance in the Simulacrum
Surveillance in the SimulacrumSurveillance in the Simulacrum
Surveillance in the Simulacrum
 
Web of Introverts and Selfie Culture
Web of Introverts and Selfie CultureWeb of Introverts and Selfie Culture
Web of Introverts and Selfie Culture
 
Klang PSU
Klang PSUKlang PSU
Klang PSU
 
Screens & Maps: Is seeing believing?
Screens & Maps: Is seeing believing?Screens & Maps: Is seeing believing?
Screens & Maps: Is seeing believing?
 
Sharing, oversharing and selfies
Sharing, oversharing and selfiesSharing, oversharing and selfies
Sharing, oversharing and selfies
 
Copyright & Licensing: The progress of science & useful arts
Copyright & Licensing: The progress of science & useful arts Copyright & Licensing: The progress of science & useful arts
Copyright & Licensing: The progress of science & useful arts
 
FOSS & Society
FOSS & SocietyFOSS & Society
FOSS & Society
 
Academic Writing: Things to think about.
Academic Writing: Things to think about. Academic Writing: Things to think about.
Academic Writing: Things to think about.
 
Civil Disobedience & Technology
Civil Disobedience & TechnologyCivil Disobedience & Technology
Civil Disobedience & Technology
 
Regulating Online Public/Private Spaces
Regulating Online Public/Private Spaces Regulating Online Public/Private Spaces
Regulating Online Public/Private Spaces
 
Public/Private Spaces: Pulling things together
Public/Private Spaces: Pulling things togetherPublic/Private Spaces: Pulling things together
Public/Private Spaces: Pulling things together
 
Digital Divides and Net Neutrality
Digital Divides and Net NeutralityDigital Divides and Net Neutrality
Digital Divides and Net Neutrality
 
Design and Access to the city
Design and Access to the cityDesign and Access to the city
Design and Access to the city
 
Cities, Suburbs & Design
Cities, Suburbs & DesignCities, Suburbs & Design
Cities, Suburbs & Design
 
Control by design
Control by designControl by design
Control by design
 
Technologies of control & desire
Technologies of control & desireTechnologies of control & desire
Technologies of control & desire
 
Introduction to Civic Media com371
Introduction to Civic Media com371Introduction to Civic Media com371
Introduction to Civic Media com371
 
Image by Wikipedia?
Image by Wikipedia?Image by Wikipedia?
Image by Wikipedia?
 
Platforms of Restraint: News aggregators, open webs & community
Platforms of Restraint: News aggregators, open webs & communityPlatforms of Restraint: News aggregators, open webs & community
Platforms of Restraint: News aggregators, open webs & community
 
Is that your book? On content & carriers
Is that your book? On content & carriersIs that your book? On content & carriers
Is that your book? On content & carriers
 

Último

How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 

Último (20)

How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 

Society vs Privacy: the impossible dilemma

Notas del editor

  1. Valeria By Andrea Rinaldi cc by
  2. Singin' in the Rain By Duncan~ cc by
  3. Iceberg from sweart cc by nc sa The answer is only the tip of the iceberg
  4. Part of the The Sistine Chapel ceiling, painted by Michelangelo between 1508 and 1512 http://en.wikipedia.org/wiki/Sistine_Chapel_ceiling
  5. la salière... from Biscarotte cc by Privacy quote from Wikipedia http://en.wikipedia.org/wiki/Privacy 14 September 2011
  6. The Wire From Hryck. cc by
  7. Tuesday, October 4, 2011 Mathias Klang klang@ituniv.se The thing is born… Newhaven Beach 2011 By http-//heatherbuckley.co.uk cc by
  8. CSA-2006-08-10-093402 By The U.S. Army cc by No legal protection?
  9. Mother to Be By seanmcgrath cc by Direct attack…
  10. dreaming hands By TheAlieness GiselaGiardino²³ cc by sa
  11. Mar de Libros Viejos from Bacteriano cc by
  12. Music from naturegeak CC BY
  13. Screenshot from Apple Store 2011 – image not Creative Commons licensed.
  14. FDR's "Fireside Chats" With America By Tony the Misfit cc by
  15. snowbow from jenny downing cc by
  16. goldfish from a_trotskyite cc by nc sa
  17. 241/365 by kennymatic cc by
  18. LESSON #3- ON STARTING SMALL from theshanghaieye cc by sa
  19. Lady in red From Furryscaly cc by sa
  20. Tuesday, October 4, 2011 Mathias Klang klang@ituniv.se Foucault (1926-1984) & Benthams ( 1748 – 1832) ) model prison – The Panopticon Övervakningsarkitektur This shapes how individuals see themselves and leads them to behave differently than they might if they weren ’ t being observed
  21. things are looking up this year from LOLren cc by
  22. Riton et les petits pois... by Biscarotte cc by sa
  23. Kansas Jayhawks 2008 NCAA Basketball National Champions--Street Party from M31. cc by
  24. Introspection. from e³°°° cc by sa
  25. thumbnail By istolethetv cc by
  26. Rugosity From Evil Erin cc by
  27. Salt pans from dachalan cc by nc sa
  28. Generational Fights from Pensiero cc by nc nd
  29. And what are you doing? from San Diego Shooter cc by nc nd
  30. SMILE.....IT'S MONDAY. by Neal. cc by
  31. bench monday // 3 [explored] By {Charlotte.Morrall} cc by
  32. All these images are © but NOT licensed under Creative Commons licenses
  33. Life from gfpeck cc by nd
  34. PESSIMISM OF THE INTELLECT, OPTIMISM OF THE WILL by ruSSeLL hiGGs cc by nc sa
  35. Love twitter by wrote cc by nc
  36. Taking The World By Storm from JD Hancock cc by
  37. I Need to Lose Weight!!! from Benson Kua cc by sa
  38. 1.11.09- CHD, here we come! from thedalogs cc by
  39. empty suits from paul goyette cc by nc sa
  40. Facebook Is The Opium Of The People from tacoekkel cc by sa
  41. Superman in North Dakota from Fonzie's cousin cc by nc sa
  42. Message #1 from fotologic cc by
  43. So sadly, soul survivor from *Seth cc by nc sa
  44. Sound of silence by Daniel Gasienica cc by nc nd
  45. The King from fueg0 cc by
  46. Door - Porta from jordicerda52 cc by sa
  47. PESSIMISM OF THE INTELLECT, OPTIMISM OF THE WILL by ruSSeLL hiGGs cc by nc sa
  48. Funny Lass from Tomi Tapio cc by
  49. Eyes ! (Youth from Antikythera!) by agelakis cc by nc sa