CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.
-
Upload
diane-french -
Category
Documents
-
view
212 -
download
0
Transcript of CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.
![Page 1: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.](https://reader035.fdocuments.in/reader035/viewer/2022072016/56649ee75503460f94bf8328/html5/thumbnails/1.jpg)
CCT 300 Critical Analysis of MediaCCT 300 Critical Analysis of Media
Class 8 Identity and PrivacyClass 8 Identity and Privacy
Identity and PrivacyIdentity and Privacy
bull Mass media - mass audience - isolating perhaps but private
bull New media - emphasis on data structure processing and content manipulation allows for individual expression - but also individual tracking
bull Mass media - mass audience - isolating perhaps but private
bull New media - emphasis on data structure processing and content manipulation allows for individual expression - but also individual tracking
Trust SurveyTrust Surveybull City TV Toronto Star CNN Daily
ShowColbert Report BBC most consulted sources
bull Daily Show most trusted of above () then City Star Colbert BBCCNN
bull Friendsfamily trusted sourcebull Only 4 hoursweek on
newsinformation average ()
bull City TV Toronto Star CNN Daily ShowColbert Report BBC most consulted sources
bull Daily Show most trusted of above () then City Star Colbert BBCCNN
bull Friendsfamily trusted sourcebull Only 4 hoursweek on
newsinformation average ()
Identity and MediaIdentity and Media
bull Mass media - identity constructed in consumer terms often vague
bull Niche media - a bit more structured but also certain identities privileged over others - eg 500 channel universe
bull Mass media - identity constructed in consumer terms often vague
bull Niche media - a bit more structured but also certain identities privileged over others - eg 500 channel universe
Media StereotypingMedia Stereotypingbull Ethnicvisible minoritiesbull (White Male) People of Privilegebull Aboriginal peoplesbull Girls and Womenbull GaysLesbiansbull httpwwwmedia-awarenessca
englishissuesstereotypingindexcfm
bull Ethnicvisible minoritiesbull (White Male) People of Privilegebull Aboriginal peoplesbull Girls and Womenbull GaysLesbiansbull httpwwwmedia-awarenessca
englishissuesstereotypingindexcfm
ActivityActivity
bull What types of stereotypes exist in media portrayal of these groups
bull How do stereotypes influence media representation
bull Examples of stereotype change - how why
bull What types of stereotypes exist in media portrayal of these groups
bull How do stereotypes influence media representation
bull Examples of stereotype change - how why
Identity and New MediaIdentity and New Media
bull Possibility for identity construction and identity play (Turkle)
bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted
bull Possibility for identity construction and identity play (Turkle)
bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted
ButhellipButhellip
bull Stereotypical representations still common
bull Gender stereotypes in video games (similar to comics - Lara Croft ex)
bull Stereotype play in online chat examples
bull Stereotypical representations still common
bull Gender stereotypes in video games (similar to comics - Lara Croft ex)
bull Stereotype play in online chat examples
Privacy and SurveillancePrivacy and Surveillancebull Individuated transactions can be and
are monitored - new media make surveillance more efficient
bull Enforcement haphazard - both panopticon effect and simple logistics
bull Not just government but corporate - workplace surveillance and rights of workers to associate
bull Individuated transactions can be and are monitored - new media make surveillance more efficient
bull Enforcement haphazard - both panopticon effect and simple logistics
bull Not just government but corporate - workplace surveillance and rights of workers to associate
Ex face recognition analysis
Ex face recognition analysis
bull Technologies to scan and detect faces in a crowd
bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence
bull Technologies to scan and detect faces in a crowd
bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence
ProblemsProblemsbull Abuse - who controls information For
what purposes is it collected bull Cross-referencing - links to biometrics
Banking data Advertisingbull Voyeurism from afar - violation of shared
norms of public spacesbull False sense of security - not ldquoneedle in
haystackrdquo technology false positives probability of loopholes
bull Abuse - who controls information For what purposes is it collected
bull Cross-referencing - links to biometrics Banking data Advertising
bull Voyeurism from afar - violation of shared norms of public spaces
bull False sense of security - not ldquoneedle in haystackrdquo technology false positives probability of loopholes
Privacy and 911Privacy and 911bull American reaction to 911 swift and
disturbing - USA Patriot Act Military Commissions Act
bull Surveillance of communication and artefact alike combined with secrecy in name of national security
bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269
bull American reaction to 911 swift and disturbing - USA Patriot Act Military Commissions Act
bull Surveillance of communication and artefact alike combined with secrecy in name of national security
bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269
Next WeekhellipNext Weekhellip
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
- CCT 300 Critical Analysis of Media
- Identity and Privacy
- Trust Survey
- Identity and Media
- Media Stereotyping
- Activity
- Identity and New Media
- Buthellip
- Privacy and Surveillance
- Ex face recognition analysis
- Problems
- Privacy and 911
- Next Weekhellip
-
![Page 2: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.](https://reader035.fdocuments.in/reader035/viewer/2022072016/56649ee75503460f94bf8328/html5/thumbnails/2.jpg)
Identity and PrivacyIdentity and Privacy
bull Mass media - mass audience - isolating perhaps but private
bull New media - emphasis on data structure processing and content manipulation allows for individual expression - but also individual tracking
bull Mass media - mass audience - isolating perhaps but private
bull New media - emphasis on data structure processing and content manipulation allows for individual expression - but also individual tracking
Trust SurveyTrust Surveybull City TV Toronto Star CNN Daily
ShowColbert Report BBC most consulted sources
bull Daily Show most trusted of above () then City Star Colbert BBCCNN
bull Friendsfamily trusted sourcebull Only 4 hoursweek on
newsinformation average ()
bull City TV Toronto Star CNN Daily ShowColbert Report BBC most consulted sources
bull Daily Show most trusted of above () then City Star Colbert BBCCNN
bull Friendsfamily trusted sourcebull Only 4 hoursweek on
newsinformation average ()
Identity and MediaIdentity and Media
bull Mass media - identity constructed in consumer terms often vague
bull Niche media - a bit more structured but also certain identities privileged over others - eg 500 channel universe
bull Mass media - identity constructed in consumer terms often vague
bull Niche media - a bit more structured but also certain identities privileged over others - eg 500 channel universe
Media StereotypingMedia Stereotypingbull Ethnicvisible minoritiesbull (White Male) People of Privilegebull Aboriginal peoplesbull Girls and Womenbull GaysLesbiansbull httpwwwmedia-awarenessca
englishissuesstereotypingindexcfm
bull Ethnicvisible minoritiesbull (White Male) People of Privilegebull Aboriginal peoplesbull Girls and Womenbull GaysLesbiansbull httpwwwmedia-awarenessca
englishissuesstereotypingindexcfm
ActivityActivity
bull What types of stereotypes exist in media portrayal of these groups
bull How do stereotypes influence media representation
bull Examples of stereotype change - how why
bull What types of stereotypes exist in media portrayal of these groups
bull How do stereotypes influence media representation
bull Examples of stereotype change - how why
Identity and New MediaIdentity and New Media
bull Possibility for identity construction and identity play (Turkle)
bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted
bull Possibility for identity construction and identity play (Turkle)
bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted
ButhellipButhellip
bull Stereotypical representations still common
bull Gender stereotypes in video games (similar to comics - Lara Croft ex)
bull Stereotype play in online chat examples
bull Stereotypical representations still common
bull Gender stereotypes in video games (similar to comics - Lara Croft ex)
bull Stereotype play in online chat examples
Privacy and SurveillancePrivacy and Surveillancebull Individuated transactions can be and
are monitored - new media make surveillance more efficient
bull Enforcement haphazard - both panopticon effect and simple logistics
bull Not just government but corporate - workplace surveillance and rights of workers to associate
bull Individuated transactions can be and are monitored - new media make surveillance more efficient
bull Enforcement haphazard - both panopticon effect and simple logistics
bull Not just government but corporate - workplace surveillance and rights of workers to associate
Ex face recognition analysis
Ex face recognition analysis
bull Technologies to scan and detect faces in a crowd
bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence
bull Technologies to scan and detect faces in a crowd
bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence
ProblemsProblemsbull Abuse - who controls information For
what purposes is it collected bull Cross-referencing - links to biometrics
Banking data Advertisingbull Voyeurism from afar - violation of shared
norms of public spacesbull False sense of security - not ldquoneedle in
haystackrdquo technology false positives probability of loopholes
bull Abuse - who controls information For what purposes is it collected
bull Cross-referencing - links to biometrics Banking data Advertising
bull Voyeurism from afar - violation of shared norms of public spaces
bull False sense of security - not ldquoneedle in haystackrdquo technology false positives probability of loopholes
Privacy and 911Privacy and 911bull American reaction to 911 swift and
disturbing - USA Patriot Act Military Commissions Act
bull Surveillance of communication and artefact alike combined with secrecy in name of national security
bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269
bull American reaction to 911 swift and disturbing - USA Patriot Act Military Commissions Act
bull Surveillance of communication and artefact alike combined with secrecy in name of national security
bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269
Next WeekhellipNext Weekhellip
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
- CCT 300 Critical Analysis of Media
- Identity and Privacy
- Trust Survey
- Identity and Media
- Media Stereotyping
- Activity
- Identity and New Media
- Buthellip
- Privacy and Surveillance
- Ex face recognition analysis
- Problems
- Privacy and 911
- Next Weekhellip
-
![Page 3: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.](https://reader035.fdocuments.in/reader035/viewer/2022072016/56649ee75503460f94bf8328/html5/thumbnails/3.jpg)
Trust SurveyTrust Surveybull City TV Toronto Star CNN Daily
ShowColbert Report BBC most consulted sources
bull Daily Show most trusted of above () then City Star Colbert BBCCNN
bull Friendsfamily trusted sourcebull Only 4 hoursweek on
newsinformation average ()
bull City TV Toronto Star CNN Daily ShowColbert Report BBC most consulted sources
bull Daily Show most trusted of above () then City Star Colbert BBCCNN
bull Friendsfamily trusted sourcebull Only 4 hoursweek on
newsinformation average ()
Identity and MediaIdentity and Media
bull Mass media - identity constructed in consumer terms often vague
bull Niche media - a bit more structured but also certain identities privileged over others - eg 500 channel universe
bull Mass media - identity constructed in consumer terms often vague
bull Niche media - a bit more structured but also certain identities privileged over others - eg 500 channel universe
Media StereotypingMedia Stereotypingbull Ethnicvisible minoritiesbull (White Male) People of Privilegebull Aboriginal peoplesbull Girls and Womenbull GaysLesbiansbull httpwwwmedia-awarenessca
englishissuesstereotypingindexcfm
bull Ethnicvisible minoritiesbull (White Male) People of Privilegebull Aboriginal peoplesbull Girls and Womenbull GaysLesbiansbull httpwwwmedia-awarenessca
englishissuesstereotypingindexcfm
ActivityActivity
bull What types of stereotypes exist in media portrayal of these groups
bull How do stereotypes influence media representation
bull Examples of stereotype change - how why
bull What types of stereotypes exist in media portrayal of these groups
bull How do stereotypes influence media representation
bull Examples of stereotype change - how why
Identity and New MediaIdentity and New Media
bull Possibility for identity construction and identity play (Turkle)
bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted
bull Possibility for identity construction and identity play (Turkle)
bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted
ButhellipButhellip
bull Stereotypical representations still common
bull Gender stereotypes in video games (similar to comics - Lara Croft ex)
bull Stereotype play in online chat examples
bull Stereotypical representations still common
bull Gender stereotypes in video games (similar to comics - Lara Croft ex)
bull Stereotype play in online chat examples
Privacy and SurveillancePrivacy and Surveillancebull Individuated transactions can be and
are monitored - new media make surveillance more efficient
bull Enforcement haphazard - both panopticon effect and simple logistics
bull Not just government but corporate - workplace surveillance and rights of workers to associate
bull Individuated transactions can be and are monitored - new media make surveillance more efficient
bull Enforcement haphazard - both panopticon effect and simple logistics
bull Not just government but corporate - workplace surveillance and rights of workers to associate
Ex face recognition analysis
Ex face recognition analysis
bull Technologies to scan and detect faces in a crowd
bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence
bull Technologies to scan and detect faces in a crowd
bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence
ProblemsProblemsbull Abuse - who controls information For
what purposes is it collected bull Cross-referencing - links to biometrics
Banking data Advertisingbull Voyeurism from afar - violation of shared
norms of public spacesbull False sense of security - not ldquoneedle in
haystackrdquo technology false positives probability of loopholes
bull Abuse - who controls information For what purposes is it collected
bull Cross-referencing - links to biometrics Banking data Advertising
bull Voyeurism from afar - violation of shared norms of public spaces
bull False sense of security - not ldquoneedle in haystackrdquo technology false positives probability of loopholes
Privacy and 911Privacy and 911bull American reaction to 911 swift and
disturbing - USA Patriot Act Military Commissions Act
bull Surveillance of communication and artefact alike combined with secrecy in name of national security
bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269
bull American reaction to 911 swift and disturbing - USA Patriot Act Military Commissions Act
bull Surveillance of communication and artefact alike combined with secrecy in name of national security
bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269
Next WeekhellipNext Weekhellip
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
- CCT 300 Critical Analysis of Media
- Identity and Privacy
- Trust Survey
- Identity and Media
- Media Stereotyping
- Activity
- Identity and New Media
- Buthellip
- Privacy and Surveillance
- Ex face recognition analysis
- Problems
- Privacy and 911
- Next Weekhellip
-
![Page 4: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.](https://reader035.fdocuments.in/reader035/viewer/2022072016/56649ee75503460f94bf8328/html5/thumbnails/4.jpg)
Identity and MediaIdentity and Media
bull Mass media - identity constructed in consumer terms often vague
bull Niche media - a bit more structured but also certain identities privileged over others - eg 500 channel universe
bull Mass media - identity constructed in consumer terms often vague
bull Niche media - a bit more structured but also certain identities privileged over others - eg 500 channel universe
Media StereotypingMedia Stereotypingbull Ethnicvisible minoritiesbull (White Male) People of Privilegebull Aboriginal peoplesbull Girls and Womenbull GaysLesbiansbull httpwwwmedia-awarenessca
englishissuesstereotypingindexcfm
bull Ethnicvisible minoritiesbull (White Male) People of Privilegebull Aboriginal peoplesbull Girls and Womenbull GaysLesbiansbull httpwwwmedia-awarenessca
englishissuesstereotypingindexcfm
ActivityActivity
bull What types of stereotypes exist in media portrayal of these groups
bull How do stereotypes influence media representation
bull Examples of stereotype change - how why
bull What types of stereotypes exist in media portrayal of these groups
bull How do stereotypes influence media representation
bull Examples of stereotype change - how why
Identity and New MediaIdentity and New Media
bull Possibility for identity construction and identity play (Turkle)
bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted
bull Possibility for identity construction and identity play (Turkle)
bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted
ButhellipButhellip
bull Stereotypical representations still common
bull Gender stereotypes in video games (similar to comics - Lara Croft ex)
bull Stereotype play in online chat examples
bull Stereotypical representations still common
bull Gender stereotypes in video games (similar to comics - Lara Croft ex)
bull Stereotype play in online chat examples
Privacy and SurveillancePrivacy and Surveillancebull Individuated transactions can be and
are monitored - new media make surveillance more efficient
bull Enforcement haphazard - both panopticon effect and simple logistics
bull Not just government but corporate - workplace surveillance and rights of workers to associate
bull Individuated transactions can be and are monitored - new media make surveillance more efficient
bull Enforcement haphazard - both panopticon effect and simple logistics
bull Not just government but corporate - workplace surveillance and rights of workers to associate
Ex face recognition analysis
Ex face recognition analysis
bull Technologies to scan and detect faces in a crowd
bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence
bull Technologies to scan and detect faces in a crowd
bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence
ProblemsProblemsbull Abuse - who controls information For
what purposes is it collected bull Cross-referencing - links to biometrics
Banking data Advertisingbull Voyeurism from afar - violation of shared
norms of public spacesbull False sense of security - not ldquoneedle in
haystackrdquo technology false positives probability of loopholes
bull Abuse - who controls information For what purposes is it collected
bull Cross-referencing - links to biometrics Banking data Advertising
bull Voyeurism from afar - violation of shared norms of public spaces
bull False sense of security - not ldquoneedle in haystackrdquo technology false positives probability of loopholes
Privacy and 911Privacy and 911bull American reaction to 911 swift and
disturbing - USA Patriot Act Military Commissions Act
bull Surveillance of communication and artefact alike combined with secrecy in name of national security
bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269
bull American reaction to 911 swift and disturbing - USA Patriot Act Military Commissions Act
bull Surveillance of communication and artefact alike combined with secrecy in name of national security
bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269
Next WeekhellipNext Weekhellip
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
- CCT 300 Critical Analysis of Media
- Identity and Privacy
- Trust Survey
- Identity and Media
- Media Stereotyping
- Activity
- Identity and New Media
- Buthellip
- Privacy and Surveillance
- Ex face recognition analysis
- Problems
- Privacy and 911
- Next Weekhellip
-
![Page 5: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.](https://reader035.fdocuments.in/reader035/viewer/2022072016/56649ee75503460f94bf8328/html5/thumbnails/5.jpg)
Media StereotypingMedia Stereotypingbull Ethnicvisible minoritiesbull (White Male) People of Privilegebull Aboriginal peoplesbull Girls and Womenbull GaysLesbiansbull httpwwwmedia-awarenessca
englishissuesstereotypingindexcfm
bull Ethnicvisible minoritiesbull (White Male) People of Privilegebull Aboriginal peoplesbull Girls and Womenbull GaysLesbiansbull httpwwwmedia-awarenessca
englishissuesstereotypingindexcfm
ActivityActivity
bull What types of stereotypes exist in media portrayal of these groups
bull How do stereotypes influence media representation
bull Examples of stereotype change - how why
bull What types of stereotypes exist in media portrayal of these groups
bull How do stereotypes influence media representation
bull Examples of stereotype change - how why
Identity and New MediaIdentity and New Media
bull Possibility for identity construction and identity play (Turkle)
bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted
bull Possibility for identity construction and identity play (Turkle)
bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted
ButhellipButhellip
bull Stereotypical representations still common
bull Gender stereotypes in video games (similar to comics - Lara Croft ex)
bull Stereotype play in online chat examples
bull Stereotypical representations still common
bull Gender stereotypes in video games (similar to comics - Lara Croft ex)
bull Stereotype play in online chat examples
Privacy and SurveillancePrivacy and Surveillancebull Individuated transactions can be and
are monitored - new media make surveillance more efficient
bull Enforcement haphazard - both panopticon effect and simple logistics
bull Not just government but corporate - workplace surveillance and rights of workers to associate
bull Individuated transactions can be and are monitored - new media make surveillance more efficient
bull Enforcement haphazard - both panopticon effect and simple logistics
bull Not just government but corporate - workplace surveillance and rights of workers to associate
Ex face recognition analysis
Ex face recognition analysis
bull Technologies to scan and detect faces in a crowd
bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence
bull Technologies to scan and detect faces in a crowd
bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence
ProblemsProblemsbull Abuse - who controls information For
what purposes is it collected bull Cross-referencing - links to biometrics
Banking data Advertisingbull Voyeurism from afar - violation of shared
norms of public spacesbull False sense of security - not ldquoneedle in
haystackrdquo technology false positives probability of loopholes
bull Abuse - who controls information For what purposes is it collected
bull Cross-referencing - links to biometrics Banking data Advertising
bull Voyeurism from afar - violation of shared norms of public spaces
bull False sense of security - not ldquoneedle in haystackrdquo technology false positives probability of loopholes
Privacy and 911Privacy and 911bull American reaction to 911 swift and
disturbing - USA Patriot Act Military Commissions Act
bull Surveillance of communication and artefact alike combined with secrecy in name of national security
bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269
bull American reaction to 911 swift and disturbing - USA Patriot Act Military Commissions Act
bull Surveillance of communication and artefact alike combined with secrecy in name of national security
bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269
Next WeekhellipNext Weekhellip
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
- CCT 300 Critical Analysis of Media
- Identity and Privacy
- Trust Survey
- Identity and Media
- Media Stereotyping
- Activity
- Identity and New Media
- Buthellip
- Privacy and Surveillance
- Ex face recognition analysis
- Problems
- Privacy and 911
- Next Weekhellip
-
![Page 6: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.](https://reader035.fdocuments.in/reader035/viewer/2022072016/56649ee75503460f94bf8328/html5/thumbnails/6.jpg)
ActivityActivity
bull What types of stereotypes exist in media portrayal of these groups
bull How do stereotypes influence media representation
bull Examples of stereotype change - how why
bull What types of stereotypes exist in media portrayal of these groups
bull How do stereotypes influence media representation
bull Examples of stereotype change - how why
Identity and New MediaIdentity and New Media
bull Possibility for identity construction and identity play (Turkle)
bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted
bull Possibility for identity construction and identity play (Turkle)
bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted
ButhellipButhellip
bull Stereotypical representations still common
bull Gender stereotypes in video games (similar to comics - Lara Croft ex)
bull Stereotype play in online chat examples
bull Stereotypical representations still common
bull Gender stereotypes in video games (similar to comics - Lara Croft ex)
bull Stereotype play in online chat examples
Privacy and SurveillancePrivacy and Surveillancebull Individuated transactions can be and
are monitored - new media make surveillance more efficient
bull Enforcement haphazard - both panopticon effect and simple logistics
bull Not just government but corporate - workplace surveillance and rights of workers to associate
bull Individuated transactions can be and are monitored - new media make surveillance more efficient
bull Enforcement haphazard - both panopticon effect and simple logistics
bull Not just government but corporate - workplace surveillance and rights of workers to associate
Ex face recognition analysis
Ex face recognition analysis
bull Technologies to scan and detect faces in a crowd
bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence
bull Technologies to scan and detect faces in a crowd
bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence
ProblemsProblemsbull Abuse - who controls information For
what purposes is it collected bull Cross-referencing - links to biometrics
Banking data Advertisingbull Voyeurism from afar - violation of shared
norms of public spacesbull False sense of security - not ldquoneedle in
haystackrdquo technology false positives probability of loopholes
bull Abuse - who controls information For what purposes is it collected
bull Cross-referencing - links to biometrics Banking data Advertising
bull Voyeurism from afar - violation of shared norms of public spaces
bull False sense of security - not ldquoneedle in haystackrdquo technology false positives probability of loopholes
Privacy and 911Privacy and 911bull American reaction to 911 swift and
disturbing - USA Patriot Act Military Commissions Act
bull Surveillance of communication and artefact alike combined with secrecy in name of national security
bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269
bull American reaction to 911 swift and disturbing - USA Patriot Act Military Commissions Act
bull Surveillance of communication and artefact alike combined with secrecy in name of national security
bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269
Next WeekhellipNext Weekhellip
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
- CCT 300 Critical Analysis of Media
- Identity and Privacy
- Trust Survey
- Identity and Media
- Media Stereotyping
- Activity
- Identity and New Media
- Buthellip
- Privacy and Surveillance
- Ex face recognition analysis
- Problems
- Privacy and 911
- Next Weekhellip
-
![Page 7: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.](https://reader035.fdocuments.in/reader035/viewer/2022072016/56649ee75503460f94bf8328/html5/thumbnails/7.jpg)
Identity and New MediaIdentity and New Media
bull Possibility for identity construction and identity play (Turkle)
bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted
bull Possibility for identity construction and identity play (Turkle)
bull Creates perception of anonymity (but only perception) where cues invoking stereotypes can be muted
ButhellipButhellip
bull Stereotypical representations still common
bull Gender stereotypes in video games (similar to comics - Lara Croft ex)
bull Stereotype play in online chat examples
bull Stereotypical representations still common
bull Gender stereotypes in video games (similar to comics - Lara Croft ex)
bull Stereotype play in online chat examples
Privacy and SurveillancePrivacy and Surveillancebull Individuated transactions can be and
are monitored - new media make surveillance more efficient
bull Enforcement haphazard - both panopticon effect and simple logistics
bull Not just government but corporate - workplace surveillance and rights of workers to associate
bull Individuated transactions can be and are monitored - new media make surveillance more efficient
bull Enforcement haphazard - both panopticon effect and simple logistics
bull Not just government but corporate - workplace surveillance and rights of workers to associate
Ex face recognition analysis
Ex face recognition analysis
bull Technologies to scan and detect faces in a crowd
bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence
bull Technologies to scan and detect faces in a crowd
bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence
ProblemsProblemsbull Abuse - who controls information For
what purposes is it collected bull Cross-referencing - links to biometrics
Banking data Advertisingbull Voyeurism from afar - violation of shared
norms of public spacesbull False sense of security - not ldquoneedle in
haystackrdquo technology false positives probability of loopholes
bull Abuse - who controls information For what purposes is it collected
bull Cross-referencing - links to biometrics Banking data Advertising
bull Voyeurism from afar - violation of shared norms of public spaces
bull False sense of security - not ldquoneedle in haystackrdquo technology false positives probability of loopholes
Privacy and 911Privacy and 911bull American reaction to 911 swift and
disturbing - USA Patriot Act Military Commissions Act
bull Surveillance of communication and artefact alike combined with secrecy in name of national security
bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269
bull American reaction to 911 swift and disturbing - USA Patriot Act Military Commissions Act
bull Surveillance of communication and artefact alike combined with secrecy in name of national security
bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269
Next WeekhellipNext Weekhellip
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
- CCT 300 Critical Analysis of Media
- Identity and Privacy
- Trust Survey
- Identity and Media
- Media Stereotyping
- Activity
- Identity and New Media
- Buthellip
- Privacy and Surveillance
- Ex face recognition analysis
- Problems
- Privacy and 911
- Next Weekhellip
-
![Page 8: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.](https://reader035.fdocuments.in/reader035/viewer/2022072016/56649ee75503460f94bf8328/html5/thumbnails/8.jpg)
ButhellipButhellip
bull Stereotypical representations still common
bull Gender stereotypes in video games (similar to comics - Lara Croft ex)
bull Stereotype play in online chat examples
bull Stereotypical representations still common
bull Gender stereotypes in video games (similar to comics - Lara Croft ex)
bull Stereotype play in online chat examples
Privacy and SurveillancePrivacy and Surveillancebull Individuated transactions can be and
are monitored - new media make surveillance more efficient
bull Enforcement haphazard - both panopticon effect and simple logistics
bull Not just government but corporate - workplace surveillance and rights of workers to associate
bull Individuated transactions can be and are monitored - new media make surveillance more efficient
bull Enforcement haphazard - both panopticon effect and simple logistics
bull Not just government but corporate - workplace surveillance and rights of workers to associate
Ex face recognition analysis
Ex face recognition analysis
bull Technologies to scan and detect faces in a crowd
bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence
bull Technologies to scan and detect faces in a crowd
bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence
ProblemsProblemsbull Abuse - who controls information For
what purposes is it collected bull Cross-referencing - links to biometrics
Banking data Advertisingbull Voyeurism from afar - violation of shared
norms of public spacesbull False sense of security - not ldquoneedle in
haystackrdquo technology false positives probability of loopholes
bull Abuse - who controls information For what purposes is it collected
bull Cross-referencing - links to biometrics Banking data Advertising
bull Voyeurism from afar - violation of shared norms of public spaces
bull False sense of security - not ldquoneedle in haystackrdquo technology false positives probability of loopholes
Privacy and 911Privacy and 911bull American reaction to 911 swift and
disturbing - USA Patriot Act Military Commissions Act
bull Surveillance of communication and artefact alike combined with secrecy in name of national security
bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269
bull American reaction to 911 swift and disturbing - USA Patriot Act Military Commissions Act
bull Surveillance of communication and artefact alike combined with secrecy in name of national security
bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269
Next WeekhellipNext Weekhellip
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
- CCT 300 Critical Analysis of Media
- Identity and Privacy
- Trust Survey
- Identity and Media
- Media Stereotyping
- Activity
- Identity and New Media
- Buthellip
- Privacy and Surveillance
- Ex face recognition analysis
- Problems
- Privacy and 911
- Next Weekhellip
-
![Page 9: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.](https://reader035.fdocuments.in/reader035/viewer/2022072016/56649ee75503460f94bf8328/html5/thumbnails/9.jpg)
Privacy and SurveillancePrivacy and Surveillancebull Individuated transactions can be and
are monitored - new media make surveillance more efficient
bull Enforcement haphazard - both panopticon effect and simple logistics
bull Not just government but corporate - workplace surveillance and rights of workers to associate
bull Individuated transactions can be and are monitored - new media make surveillance more efficient
bull Enforcement haphazard - both panopticon effect and simple logistics
bull Not just government but corporate - workplace surveillance and rights of workers to associate
Ex face recognition analysis
Ex face recognition analysis
bull Technologies to scan and detect faces in a crowd
bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence
bull Technologies to scan and detect faces in a crowd
bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence
ProblemsProblemsbull Abuse - who controls information For
what purposes is it collected bull Cross-referencing - links to biometrics
Banking data Advertisingbull Voyeurism from afar - violation of shared
norms of public spacesbull False sense of security - not ldquoneedle in
haystackrdquo technology false positives probability of loopholes
bull Abuse - who controls information For what purposes is it collected
bull Cross-referencing - links to biometrics Banking data Advertising
bull Voyeurism from afar - violation of shared norms of public spaces
bull False sense of security - not ldquoneedle in haystackrdquo technology false positives probability of loopholes
Privacy and 911Privacy and 911bull American reaction to 911 swift and
disturbing - USA Patriot Act Military Commissions Act
bull Surveillance of communication and artefact alike combined with secrecy in name of national security
bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269
bull American reaction to 911 swift and disturbing - USA Patriot Act Military Commissions Act
bull Surveillance of communication and artefact alike combined with secrecy in name of national security
bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269
Next WeekhellipNext Weekhellip
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
- CCT 300 Critical Analysis of Media
- Identity and Privacy
- Trust Survey
- Identity and Media
- Media Stereotyping
- Activity
- Identity and New Media
- Buthellip
- Privacy and Surveillance
- Ex face recognition analysis
- Problems
- Privacy and 911
- Next Weekhellip
-
![Page 10: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.](https://reader035.fdocuments.in/reader035/viewer/2022072016/56649ee75503460f94bf8328/html5/thumbnails/10.jpg)
Ex face recognition analysis
Ex face recognition analysis
bull Technologies to scan and detect faces in a crowd
bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence
bull Technologies to scan and detect faces in a crowd
bull Preliminary systems already exist - potential uses in analysis of closed-circuit surveillance forensic science militaryintelligence
ProblemsProblemsbull Abuse - who controls information For
what purposes is it collected bull Cross-referencing - links to biometrics
Banking data Advertisingbull Voyeurism from afar - violation of shared
norms of public spacesbull False sense of security - not ldquoneedle in
haystackrdquo technology false positives probability of loopholes
bull Abuse - who controls information For what purposes is it collected
bull Cross-referencing - links to biometrics Banking data Advertising
bull Voyeurism from afar - violation of shared norms of public spaces
bull False sense of security - not ldquoneedle in haystackrdquo technology false positives probability of loopholes
Privacy and 911Privacy and 911bull American reaction to 911 swift and
disturbing - USA Patriot Act Military Commissions Act
bull Surveillance of communication and artefact alike combined with secrecy in name of national security
bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269
bull American reaction to 911 swift and disturbing - USA Patriot Act Military Commissions Act
bull Surveillance of communication and artefact alike combined with secrecy in name of national security
bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269
Next WeekhellipNext Weekhellip
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
- CCT 300 Critical Analysis of Media
- Identity and Privacy
- Trust Survey
- Identity and Media
- Media Stereotyping
- Activity
- Identity and New Media
- Buthellip
- Privacy and Surveillance
- Ex face recognition analysis
- Problems
- Privacy and 911
- Next Weekhellip
-
![Page 11: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.](https://reader035.fdocuments.in/reader035/viewer/2022072016/56649ee75503460f94bf8328/html5/thumbnails/11.jpg)
ProblemsProblemsbull Abuse - who controls information For
what purposes is it collected bull Cross-referencing - links to biometrics
Banking data Advertisingbull Voyeurism from afar - violation of shared
norms of public spacesbull False sense of security - not ldquoneedle in
haystackrdquo technology false positives probability of loopholes
bull Abuse - who controls information For what purposes is it collected
bull Cross-referencing - links to biometrics Banking data Advertising
bull Voyeurism from afar - violation of shared norms of public spaces
bull False sense of security - not ldquoneedle in haystackrdquo technology false positives probability of loopholes
Privacy and 911Privacy and 911bull American reaction to 911 swift and
disturbing - USA Patriot Act Military Commissions Act
bull Surveillance of communication and artefact alike combined with secrecy in name of national security
bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269
bull American reaction to 911 swift and disturbing - USA Patriot Act Military Commissions Act
bull Surveillance of communication and artefact alike combined with secrecy in name of national security
bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269
Next WeekhellipNext Weekhellip
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
- CCT 300 Critical Analysis of Media
- Identity and Privacy
- Trust Survey
- Identity and Media
- Media Stereotyping
- Activity
- Identity and New Media
- Buthellip
- Privacy and Surveillance
- Ex face recognition analysis
- Problems
- Privacy and 911
- Next Weekhellip
-
![Page 12: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.](https://reader035.fdocuments.in/reader035/viewer/2022072016/56649ee75503460f94bf8328/html5/thumbnails/12.jpg)
Privacy and 911Privacy and 911bull American reaction to 911 swift and
disturbing - USA Patriot Act Military Commissions Act
bull Surveillance of communication and artefact alike combined with secrecy in name of national security
bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269
bull American reaction to 911 swift and disturbing - USA Patriot Act Military Commissions Act
bull Surveillance of communication and artefact alike combined with secrecy in name of national security
bull USA and UK now rank near bottom on privacy and surveillance issues httpwwwprivacyinternationalorgarticleshtmlcmd[347]=x-347-545269
Next WeekhellipNext Weekhellip
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
- CCT 300 Critical Analysis of Media
- Identity and Privacy
- Trust Survey
- Identity and Media
- Media Stereotyping
- Activity
- Identity and New Media
- Buthellip
- Privacy and Surveillance
- Ex face recognition analysis
- Problems
- Privacy and 911
- Next Weekhellip
-
![Page 13: CCT 300: Critical Analysis of Media Class 8: Identity and Privacy.](https://reader035.fdocuments.in/reader035/viewer/2022072016/56649ee75503460f94bf8328/html5/thumbnails/13.jpg)
Next WeekhellipNext Weekhellip
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
bull A closer look at the potential and the hype around the Internet
bull Proposal feedback
- CCT 300 Critical Analysis of Media
- Identity and Privacy
- Trust Survey
- Identity and Media
- Media Stereotyping
- Activity
- Identity and New Media
- Buthellip
- Privacy and Surveillance
- Ex face recognition analysis
- Problems
- Privacy and 911
- Next Weekhellip
-