DELETE: THE VIRTUE OF FORGETTING IN THE DIGITAL AGE By Viktor Mayor-Schonberger.

Slides:



Advertisements
Similar presentations
The Perspective of a Classification Society Mr Stephan Assheuer
Advertisements

Do the anti-circumvention provisions of the Digital Millennium Copyright (DMCA) Act further or harm public interests?
Chapter 1: Computers and Digital Basics 1 Computers and Digital Basics Chapter 1.
Privacy Lost: How Technology is Endangering Your Privacy David H. Holtzman POWERPOINT BY: PETER OLSON.
Judge Rejects Google’s Deal to Digitize Books Rhea McCaslin CSCE390 – Spring 2011.
Introduction to Computer Ethics
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Course Overview CSCI 327 Social Implications of Computing.
Computer Ethics in Information Technology
Online Social Networking By: Sylvia Engdahl ©2007.
1 CS5038 The Electronic Society Lecture 0: Introduction to CS5038 Course Organiser: Frank Guerin Course Website:
Stop cyber bullying  Forms of digital communication and collaboration tools: Blog Online forum Social networking site.
Computer Ethics.
CS 4001Mary Jean Harrold1 Class 9 ŸQuestions about term paper—list of possible topics available on line—proposal due 9/27 ŸCommunications assignment—discuss.
Research using Social Media Challenges & Considerations 11 April 2014 Kelsey Beninger, NatCen Social #NSMNSS.
(Include a suitable picture for the presentation) (Presenter’s video will come in this area during presentation. Do not use this area in any slide) By:
The Dumbest Generation: How the Digital Age Stupifies Young Americans and Jeopordizes Our Future (Or, Don’t Trust Anyone Under 30) By Mark Bauerlein Published.
 In most countries of the world, the “information revolution” has altered many aspects of life significantly: commerce, employment, medicine, security,
Electronic Commerce Semester 2 Term 2 Lecture 8. Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and.
Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking.
13 Intellectual Property 1 Aaron Schiff ECON Reading: Cabral p , Deak p
ETHICS OVERVIEW CS10 Winter Any ethical issues from ICTD discussions?
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Some of the best books of  &mid= A23D2FC75CD A23D2FC75CD7.
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
Security and Ethics Privacy Employment Health Crime Working
Information Systems in Organizations 1.2 What’s in it for you? 1.3 Ethics of analysis and use of systems, data and information.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
CSCI EXTRA CREDIT ASSIGNMENT ASHLEY R. BROADNAX TUESDAY 3:30 CLASS MARCH 11, 2008.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
Henric Johnson1 Network Security Henric Johnson Blekinge Institute of Technology, Sweden
SURVEILLANCE The Fears of the Digital Age. Privacy –Identity –Anonymity Logging –Tracking Hacking Censorship State Security/Anti Terror Online The Discussion.
By: Clive Thompson Published: Divided into nine chapters that focused on the positives and negatives technology has on our lives Used examples,
Ethics. Technology  Technology is not an immutable force – people make decisions about what technologies and products to develop and how to use them.
Computer Law at Erasmus University Rotterdam international (English) post-graduate: LLM Business and Trade Law -specialisation: Law and Management (and.
Mr C Johnston ICT Teacher
Digital citizenship By: Cody Quinn.
Classroom Management, Student Identification and the Digital Age or Who are you again? Rick Shelton Northeastern State University.
J. S. PATIL.  The revolution in internet and technology has made the future much more uncertain than most people assume it to be.  People can make money.
Welcome Topic : Security.
Internet Research Law and Ethics. Consider the Law Legal and ethical issues help us broaden considerably our study of Internet research. Even relatively.
CSE 303 Concepts and Tools for Software Development Richard C. Davis UW CSE – 11/29/2006 Social Implications Discussion 4 – Digital Rights Management.
Society & Computers PowerPoint
Information Technology Issues How has the proliferation of IT impacted society? Adapted from Prof. Brenda Timmerman.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Network Security and Cryptography
Digital access is the equal chance for every country to be able access digital technology. Every person in the world should be able to have access to.
Dialogue on Magna Carta Magna Carta for the Internet.
PIRACY AND COMPUTERS Asad Patel. What is (software) piracy? ■Unauthorized copying of software ■Includes distributing and downloading ■AKA ripping, cracking,
Privacy Lost: How Technology is Endangering Your Privacy CS Final Paper Presentation By: Christina Sulfaro.
Are You a Pirate?. A pirate…. “one who infringes another’s copyright or business rights or who broadcasts without authorization”
Mr C Johnston ICT Teacher BTEC IT Unit 08 - Lesson X P6 – Plan an E-commerce Strategy.
Social Ethical and Legal Issues Web Design. 3.4 Social, Ethical, and Legal Issues Focus on Reading Main Ideas Ethical, social, and legal guidelines govern.
Societal Impact of Computing
CS 2315 review.
SECURITY STANDARDS AND CYBER LAWS
CHAPTER FOUR OVERVIEW SECTION ETHICS
The road ahead This class is only the beginning.
Headline Publishing The challenge What we did The results
Dos of Technology Use Follow the directions of the adult in charge.
6. Politics, Ethics and Law
Learning Area 1 Information And Communication Technology and Society
CHAPTER FOUR OVERVIEW SECTION ETHICS
Pima Medical Institute Online Education

_______ Book Title #1 Here Book Title #1 Book Title #3 Book Title #5 Book Title #2 Book Title #4 This is an example of what the QR Code will look.
ETHICS FOR IT WORKERS AND IT USERS 1 Rifat al mamun Roll : Presented by.
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

DELETE: THE VIRTUE OF FORGETTING IN THE DIGITAL AGE By Viktor Mayor-Schonberger

Overview  Published in 2009  Discussed the importance of forgetting for society  Drunken Pirate  Digital memory strips people of their ability to forget  Responses to prevent the loss of forgetting

Relation to Class Topics  Responses to the loss of forgetting  The privacy rights for intellectual property  Encryption codes for DVDs  Young people freely share software  Hacking into digital rights management systems

Recommendation  I would recommend this book to anyone who wants to learn more about privacy on the internet