The Panoptic Gaze of Web 2.0: How Web 2.0 platforms act as Infrastructures of Dataveillance

Size: px
Start display at page:

Download "The Panoptic Gaze of Web 2.0: How Web 2.0 platforms act as Infrastructures of Dataveillance"

Transcription

1 The Panoptic Gaze of Web 2.0: How Web 2.0 platforms act as Infrastructures of Dataveillance Michael Zimmer Department of Culture and Communication New York University Rhetoric of Web 2.0 Organize and share information Interact within communities Express oneself Empower creativity Democratize media production Celebrate the individual Power of collaboration and social networks 1

2 Externalities 2.0 Increased flow of personal information Aggregation of data across the network Intelligent agents that predict your needs Rise of data mining Placing these tools in hands of all users. Externalities 2.0 Infrastructures of dataveillance Panoptic gaze Search 2.0 Amateur Data Mining P2P Surveillance 2

3 Panoptic Gaze of Dataveillance Panoptic Gaze of Dataveillance 3

4 Panopticon The more constantly the persons to be inspected are under the eyes of the persons who should inspect them, the more perfectly will the purpose of the establishment have been attained. This being impossible, the next thing to be wished for is, that, at every instant, seeing reason to believe as much, and not being able to satisfy himself to the contrary, he [the watched] should conceive himself to be so. Panopticon Perpetual surveillance Minimal effort induce in the inmate a state of conscious and permanent visibility that assures the automatic functioning of power. 4

5 Panoptic Gaze There is no need for arms, physical violence, material constraints. Just a gaze. An inspecting gaze, a gaze which each individual under its weight will end by internalizing to the point that he is his own overseer, each individual thus exercising this surveillance over, and against, himself. A superb formula: power exercised continuously and for what turns out to be a minimal cost. Panoptic Gaze Quintessential disciplinary apparatus of modern, everyday life Home School Workplace Hospital a whole complex mechanism, embracing stricter methods of surveillance [and] more efficient techniques of locating and obtaining information 5

6 Power via Panoptic Gaze Everyday functioning of power Panoptic sort (Gandy) Social sorting (Lyon) Sorting Exercise of power (Foucault; Bowker & Star; Lyon) sorts people into categories, assigning worth or risk, in ways that have real effects on their life-chances. Deep discrimination occurs, thus making sorting not merely a matter of personal privacy, but of social justice Panoptic Gaze of Dataveillance 6

7 Panoptic Gaze of Dataveillance Dataveillance Collection and storage of personal data Systemic use of personal data in investigation or monitoring of individuals Roger Clarke, 1988 Rise of digital dossiers 7

8 Digital Dataveillance Digital networking Data storage Processing power Interconectivity Aggregation Real-time analysis Frequent shopper cards Electronic key cards Intelligent transportation systems RFID tags Biometrics Internet Dataveillance Ideal infrastructure of dataveillance Widespread monitoring and collection of personal information Cookies Spyware DRM Clickstream 8

9 Panoptic Gaze of Dataveillance Panoptic Gaze of Dataveillance 9

10 Panoptic Gaze of Dataveillance Panoptic Gaze of Dataveillance Concrete, material effects Discrimination Social justice Personal freedom [The] impact of dataveillance is a reduction in the meaningfulness of individual actions, and hence in self- reliance and self- responsibility. In general, mass dataveillance tends to subvert individualism and the meaningfulness of human decisions and actions 10

11 Panoptic Gaze of Web 2.0 Search 2.0 Amateur Data Mining P2P Surveillance Panoptic Gaze of Web 2.0 Search 2.0 Amateur Data Mining P2P Surveillance 11

12 Search as Center of Gravity 84% have used a search engine 60 million users send 200 million requests per day (U.S. data) Search engines have become the center of gravity for people s everyday information-seeking activities Search 2.0 Drive towards the perfect search Intuitive results based on past searches and browsing history Perfect recall Like the mind of God 12

13 Dataveillance in Search 2.0 Engage in dataveillance of users online activities Server logs Web cookies User accounts Dataveillance in Search 2.0 Majority of users unaware of dataveillance DOJ v. Google AOL data Some try to avoid dataveillance IP routing Cookie blocking Obfuscation 13

14 Google s Broader Dataveillance Infrastructure Dataveillance across all products & services Intellectual activities across the web as well as the material world Google s Broader Dataveillance Infrastructure General information inquiries: 14

15 Google s Broader Dataveillance Infrastructure Academic research: News & political information: Google s Broader Dataveillance Infrastructure Communication & social networking: 15

16 Google s Broader Dataveillance Infrastructure Personal data : Financial data : Shopping & product interests: Desktop computer files: Google s Broader Dataveillance Infrastructure Internet browsing: 16

17 Google s Broader Dataveillance Infrastructure Over two dozen products & services Interconnected via cookies & Google Accounts Search 2.0 s Gravitational Pull Feedback loop ~ gravitational pull Database of intentions Source of insight into what someone is thinking, not just what that person is doing 17

18 Panoptic Gaze of Search 2.0 Disciplinary power Deleted Gmail messages as evidence Search history neck snap break Storage of records China Brazil Panoptic Gaze of Search 2.0 Panoptic sorting Financial motivations Profile users potential economic value Google knows a lot about the person surfing, especially if they have used personal search or logged into a service such as Gmail 18

19 Panoptic Gaze of Search 2.0 State of consciousness & visibility My goodness, it s my whole personal life I had no idea somebody was looking over my shoulder Tools to circumvent FoxyProxy TrackMeNot Resisting Search 2.0 Expanding the infrastructure of dataveillance: Easy to take at interface value 19

20 Resisting Search 2.0 Collection of personal information becomes a prerequisite of participation oscillates between seemingly rewarding participation and punishing attempts to elect not to divulge personal information Default settings Panoptic Gaze of Search 2.0 Social, political, and technical infrastructure that renders visualization meaningful for the basis of disciplinary social control Emergence of a soft cage of dataveillance Individual freedom Concept of self Social justice 20

21 Panoptic Gaze of Web 2.0 Search 2.0 Amateur Data Mining P2P Surveillance Panoptic Gaze of Web 2.0 Search 2.0 Amateur Data Mining P2P Surveillance 21

22 Don, the Camera Thief Lonelygirl15 22

23 Farrand Field Farrand Field 23

24 Amateur Facial Recognition Riya 24

25 Riya Riya 25

26 Panoptic Gaze of Web 2.0 Amateur Data Mining Peer to Peer Surveillance Search 2.0 Values in technology design 26

THE PANOPTIC GAZE OF WEB 2.0: HOW WEB 2.0 PLATFORMS ACT AS INFRASTRUCTURES OF DATAVEILLANCE

THE PANOPTIC GAZE OF WEB 2.0: HOW WEB 2.0 PLATFORMS ACT AS INFRASTRUCTURES OF DATAVEILLANCE Zimmer 1 THE PANOPTIC GAZE OF WEB 2.0: HOW WEB 2.0 PLATFORMS ACT AS INFRASTRUCTURES OF DATAVEILLANCE Presented at: Social Software and Web 2.0: Critical Perspectives and Challenges for Research and Business

More information

Motivation Self Assessment. Autonomy, Mastery and Purpose

Motivation Self Assessment. Autonomy, Mastery and Purpose Motivation Self Assessment Autonomy, Mastery and Purpose What is Motivation? Human beings are motivated by both extrinsic and intrinsic factors. In the workplace today in which creative, non-routine jobs

More information

THE VALUE OF VIDEO COLLABORATION TOOLS. 1471 Route 9, Suite 202 Clifton Park, NJ 12065 Phone: (518) 371-2295 www.oneconnectinc.com

THE VALUE OF VIDEO COLLABORATION TOOLS. 1471 Route 9, Suite 202 Clifton Park, NJ 12065 Phone: (518) 371-2295 www.oneconnectinc.com THE VALUE OF VIDEO COLLABORATION TOOLS In the past decade the economic climate and therefore the business climate has changed drastically. Markets have become tougher all around, and competition is fierce.

More information

Surveillance Societies and the emerging Anti-Surveillance Movement

Surveillance Societies and the emerging Anti-Surveillance Movement Surveillance Societies and the emerging Anti-Surveillance Movement Ralf Bendrath University of Bremen Colin Bennett University of Victoria Surveillance Society? The usual reports and warnings: UK Information

More information

Protect Your Online Footprint. HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project

Protect Your Online Footprint. HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project Logging on is now one of the first things we do every day. And every time we do, we leave a trace, often without giving a thought to

More information

Shoppers who. do not. enter store. Area with no. Shoppers who. enter store. Area with. products of interest

Shoppers who. do not. enter store. Area with no. Shoppers who. enter store. Area with. products of interest Hitachi Review Vol. 63 (2014), No. 1 30 New Bricks and Mortar Marketing Technique Based on Human Behavior Measurement Makoto Takahashi Masatsugu Nomiya Naohiro Suzuki OVERVIEW: In recent years, internet

More information

How to avoid Five Blind Spots in Internet Filtering

How to avoid Five Blind Spots in Internet Filtering How to avoid Five Blind Spots in Internet Filtering If you re like most managers today, you d like to know what your employees are up to on company time, especially when they re using company PCs and laptops.

More information

BIG DATA: BEHAVIOR IN BEHAVIOR OUT

BIG DATA: BEHAVIOR IN BEHAVIOR OUT BIG DATA: BEHAVIOR IN BEHAVIOR OUT Summerschool - Big Data In Clinical Medicine Grolsch Veste, June 30, 2014 Johnny Hartz Søraker Assistant Professor Dept. of Philosophy University of Twente j.h.soraker@utwente.nl

More information

VIUS Reports 9.2. Faculty Focus Group on LionShare August 2003 Michael J. Dooris. Introduction

VIUS Reports 9.2. Faculty Focus Group on LionShare August 2003 Michael J. Dooris. Introduction VIUS Reports 9.2 Faculty Focus Group on LionShare August 2003 Michael J. Dooris Introduction The Visual Image User Study (VIUS) team held a demonstration of the Penn State LionShare prototype for selected

More information

Digital Marketing Starter Packages. Why use Search Engine Optimization? Creative Design Photography Video Print Websites

Digital Marketing Starter Packages. Why use Search Engine Optimization? Creative Design Photography Video Print Websites Thank you for considering Iconica as a trusted partner to manage your digital marketing. We are excited to work with you and are committed to balacing your vision with industry best practices to help increase

More information

Search Privacy Practices: A Work In Progress

Search Privacy Practices: A Work In Progress Search Privacy Practices: A Work In Progress CDT Report -- August 2007 Many of the top Internet search companies have recently announced new privacy initiatives aimed at giving users greater control over

More information

Unity Error Message: Your voicemail box is almost full

Unity Error Message: Your voicemail box is almost full Unity Error Message: Your voicemail box is almost full Document ID: 111781 Contents Introduction Prerequisites Requirements Components Used Conventions Problem Solution Delete Voice Mail Messages from

More information

Professional Ethics for Computer Science

Professional Ethics for Computer Science Professional Ethics for Computer Science Chapter 4: Privacy Jie Gao Computer Science Department Stony Brook University Privacy Issues Internet privacy consists of privacy over the media of the Internet:

More information

Transactional Vs Transformational Leadership. Transactional Vs Transformational Leadership

Transactional Vs Transformational Leadership. Transactional Vs Transformational Leadership Transactional Vs Transformational Leadership Transactional Leader: approaches followers with an eye to exchanging one thing for another Burns pursues a cost benefit, economic exchange to met subordinates

More information

Just Net Coalition statement on Internet governance

Just Net Coalition statement on Internet governance Just Net Coalition statement on Internet governance (Just Net Coalition is a global coalition of civil society actors working on Internet governance issues) All states should work together to provide a

More information

VISUAL management techniques to support LEADERSHIP standard work

VISUAL management techniques to support LEADERSHIP standard work You won t GET LEAN... until you GET VISUAL! VISUAL management techniques to support LEADERSHIP standard work Promote and reinforce Leadership Standard Work as the way we do work Identify opportunities

More information

www.staticking.com [ CORPORATE PROFILE ] INNOVATIONS REDEFINED

www.staticking.com [ CORPORATE PROFILE ] INNOVATIONS REDEFINED [ CORPORATE PROFILE ] INNOVATIONS REDEFINED www.staticking.com CONTENT 01 Who We Are 02 Our Services 03 Work Process 04 Our Clients 05 Get in Touch 01. Who We Are To introduce our self, Static King TM

More information

ADAPTATION OF EMPLOYEES IN THE ORGANIZATION AND ITS IMPORTANCE IN TERMS OF HUMAN RESOURCE MANAGEMENT

ADAPTATION OF EMPLOYEES IN THE ORGANIZATION AND ITS IMPORTANCE IN TERMS OF HUMAN RESOURCE MANAGEMENT 114 Management and Economics ADAPTATION OF EMPLOYEES IN THE ORGANIZATION AND ITS IMPORTANCE IN TERMS OF HUMAN RESOURCE MANAGEMENT Jaroslav NEKORANEC Jaroslav.Nekoranec@aos.sk Lenka NAGYOVÁ lenka.nagyova@mil.sk

More information

Moving Exchange Message Stores and Transaction Logs to an Alternate Drive

Moving Exchange Message Stores and Transaction Logs to an Alternate Drive Moving Exchange Message Stores and Transaction Logs to an Alternate Drive Document ID: 26520 Contents Introduction Prerequisites Requirements Components Used Conventions Problem Solutions Exchange 5.5

More information

Copyright 2013 Splunk Inc. Introducing Splunk 6

Copyright 2013 Splunk Inc. Introducing Splunk 6 Copyright 2013 Splunk Inc. Introducing Splunk 6 Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future events or the expected performance

More information

Work Together Tools Social Collaboration with Novell Vibe Cloud

Work Together Tools Social Collaboration with Novell Vibe Cloud APR_2011 // Novell Connection Magazine Work Together Tools Social Collaboration with Novell Vibe Cloud by Ken Baker Too often, collaboration tools become the place where documents go to die. Some tools

More information

11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER

11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER 11 THINGS YOUR FIREWALL SHOULD DO a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER 2 THE GUIDE OF BY DALE SHULMISTRA Dale Shulmistra is a Technology Strategist at Invenio IT, responsible for

More information

Know Your Foe. Threat Infrastructure Analysis Pitfalls

Know Your Foe. Threat Infrastructure Analysis Pitfalls Know Your Foe Threat Infrastructure Analysis Pitfalls Who Are We? Founders of PassiveTotal Analysts/researchers with 10+ years of collective experience Interested in Better UX/UI for security systems Improving/re-thinking

More information

Professional ideal. Professional ideal for the Danish Union of Teachers

Professional ideal. Professional ideal for the Danish Union of Teachers Professional ideal The Danish Union of Teachers has adopted a professional ideal at its congress 2-4 October 2002. Before that, the professional ideal has been the subject of a comprehensive member debate

More information

Go Global or Localise?

Go Global or Localise? Go Global or Localise? How Leading Organisations are Making People Programme Decisions 27 November 2013 Aon Hewitt, Performance, Reward & Talent Risk. Reinsurance. Human Resources. Empower Results Agenda

More information

Website Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at julie@juliereisler.com.

Website Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at julie@juliereisler.com. Website Privacy Policy Statement This website juliereisler.com is operated by Empowered Living, LLC and this policy applies to all websites owned, operated, controlled and otherwise made available by Company,

More information

Collaboration. Michael McCabe Information Architect mmccabe@gig-werks.com. black and white solutions for a grey world

Collaboration. Michael McCabe Information Architect mmccabe@gig-werks.com. black and white solutions for a grey world Collaboration Michael McCabe Information Architect mmccabe@gig-werks.com black and white solutions for a grey world Slide Deck & Webcast Recording links Questions and Answers We will answer questions at

More information

Sales & Marketing Tools

Sales & Marketing Tools Discover elearning You need to have your employees trained on the latest security products. But due to time constraints, they may be missing out on vital sales and technical information that can help reduce

More information

Is Web 2.0 Privacy Stuck in 1999, and Can They Do Better?

Is Web 2.0 Privacy Stuck in 1999, and Can They Do Better? Is Web 2.0 Privacy Stuck in 1999, and Can They Do Better? Jon Hyman and Kevin Bombino { jhyman, bombino } @ eecs.harvard.edu The Web 2.0 revolution is in full swing and entirely new classes of interactive

More information

C C T V S E C U R I T Y C A M E R A S : Ten Questions to Ask Yourself Before Buying a New System

C C T V S E C U R I T Y C A M E R A S : Ten Questions to Ask Yourself Before Buying a New System C C T V S E C U R I T Y C A M E R A S : Ten Questions to Ask Yourself Before Buying a New System CCTV Security Cameras: 10 Questions to Ask Yourself Before Buying a New System ARE YOU CONSIDERING A CCTV

More information

ONLINE PRIVACY POLICY

ONLINE PRIVACY POLICY ONLINE PRIVACY POLICY The City of New Westminster is committed to protecting your privacy. Any personal information collected, used or disclosed by the City is in accordance with the Freedom of Information

More information

CivicScience Insight Report

CivicScience Insight Report CivicScience Insight Report Consumer Sentiment Toward Data Privacy Part 1 of 2: Internet-Based Data Sharing and Collection Our lives as consumers in a modern society have become characterized by digitized

More information

Website Privacy Policy Statement

Website Privacy Policy Statement Website Privacy Policy Statement This website ( CRSF Website ) is operated by Cal Ripken, Sr. Foundation, Inc. ( Company ) and this policy applies to all websites owned, operated, controlled and otherwise

More information

1 Which of the following questions can be answered using the goal flow report?

1 Which of the following questions can be answered using the goal flow report? 1 Which of the following questions can be answered using the goal flow report? [A] Are there a lot of unexpected exits from a step in the middle of my conversion funnel? [B] Do visitors usually start my

More information

IBM Smarter Oil and Gas Why Data Matters: Extracting Insights, Making Better Decisions

IBM Smarter Oil and Gas Why Data Matters: Extracting Insights, Making Better Decisions IBM Smarter Oil and Gas Why Data Matters: Extracting Insights, Making Better Decisions Mark Decyk Practice Leader Advanced Analytics and Optimization IBM Global Business Services Something meaningful is

More information

Kwanzoo Lead Generation Ads on Google Display Network (GDN)

Kwanzoo Lead Generation Ads on Google Display Network (GDN) Kwanzoo Lead Generation Ads on Google Display Network (GDN) Introduction Kwanzoo s rich-media based lead generation ads are now certified to be trafficked and run on the Google Display Network (GDN) through

More information

Global Information Society Watch 2014

Global Information Society Watch 2014 Global Information Society Watch 2014 Communications surveillance in the digital age This report was originally published as part of a larger compilation, which can be downloaded from GISWatch.org Association

More information

Personalization of Web Search With Protected Privacy

Personalization of Web Search With Protected Privacy Personalization of Web Search With Protected Privacy S.S DIVYA, R.RUBINI,P.EZHIL Final year, Information Technology,KarpagaVinayaga College Engineering and Technology, Kanchipuram [D.t] Final year, Information

More information

Online Ads: A new challenge for privacy? Jörg Polakiewicz*

Online Ads: A new challenge for privacy? Jörg Polakiewicz* 31st International Conference of Data Protection and Privacy Commissioners, Madrid Thursday 5 November 2009, 15.00-16.30 Parallel Session A Smile! There s a camera behind the ad or Send it to a friend

More information

Transforming Big Data Into Smart Advertising Insights. Lessons Learned from Performance Marketing about Tracking Digital Spend

Transforming Big Data Into Smart Advertising Insights. Lessons Learned from Performance Marketing about Tracking Digital Spend Transforming Big Data Into Smart Advertising Insights Lessons Learned from Performance Marketing about Tracking Digital Spend Transforming Big Data Into Smart Advertising Insights Lessons Learned from

More information

Monitoring and Surveillance System IP TESCo

Monitoring and Surveillance System IP TESCo Monitoring and Surveillance System IP TESCo Thinking about the welfare of the community TESCo last February security camera CCTV system, whose purpose is to monitor continuously the facilities were installed.

More information

1Current. Today distribution channels to the public have. situation and problems

1Current. Today distribution channels to the public have. situation and problems 1Current situation and problems Today distribution channels to the public have proliferated. The time when purchases were made at grocery stores which held all kinds of goods in a small space has long

More information

30 Ways To Do Real-Time Personalization

30 Ways To Do Real-Time Personalization 30 Ways To Do Real-Time Personalization 30 Ways To Do Real-Time Personalization Today s modern marketers must be empowered to act on data any kind of data, from any source to deliver relevant, individualized

More information

RETAIL COMMUNICATIONS

RETAIL COMMUNICATIONS RETAIL SOLUTIONS RETAIL solutions RETAIL COMMUNICATIONS THE CHALLENGES Your employees are busy serving in-store customers, the phones are ringing unanswered; will missed calls result in missed sales opportunities?

More information

DEEPER LEARNING COMPETENCIES April 2013

DEEPER LEARNING COMPETENCIES April 2013 DEEPER LEARNING COMPETENCIES April 2013 Deeper learning is an umbrella term for the skills and knowledge that students must possess to succeed in 21 st century jobs and civic life. At its heart is a set

More information

BAA Peer Tutoring 11. District Number: SD #43. Date Developed: March 2004. Board/Authority Approval Date: April 20, 2004. Board/Authority Signature:

BAA Peer Tutoring 11. District Number: SD #43. Date Developed: March 2004. Board/Authority Approval Date: April 20, 2004. Board/Authority Signature: District name: Coquitlam District Number: SD #43 Developed by: Lasta Graf Date Developed: March 2004 School Name: Principal's Name: Dr. Charles Best Secondary Brian Fichter Board/Authority Approval Date:

More information

Privacy Policy of Dessauer Group II LLC

Privacy Policy of Dessauer Group II LLC Privacy Policy of Dessauer Group II LLC This privacy policy has been compiled to better serve those who are concerned with how their 'Personally identifiable information' (PII) is being used online. PII,

More information

360 FEEDBACK: DEVELOPING AN EFFECTIVE SYSTEM

360 FEEDBACK: DEVELOPING AN EFFECTIVE SYSTEM 360 FEEDBACK: DEVELOPING AN EFFECTIVE SYSTEM 3 PROGRAM OVERVIEW About the Training Program During recent years, organizations have sought new ways to develop performancemanagement systems that help employees

More information

6 Essential Characteristics of a PLC (adapted from Learning by Doing)

6 Essential Characteristics of a PLC (adapted from Learning by Doing) 6 Essential Characteristics of a PLC (adapted from Learning by Doing) 1. Shared mission, vision, values, goals Educators in a PLC benefit from clarity regarding their shared purpose, a common understanding

More information

Facebook Smart Card FB 121211_1800

Facebook Smart Card FB 121211_1800 Facebook Smart Card FB 121211_1800 Social Networks - Do s and Don ts Only establish and maintain connections with people you know and trust. Review your connections often. Assume that ANYONE can see any

More information

Now Seeing is Believing Plan IT. Deliver IT. Prove IT.

Now Seeing is Believing Plan IT. Deliver IT. Prove IT. Now Seeing is Believing Plan IT. Deliver IT. Prove IT. Introducing a revolutionary advancement in the delivery of Outdoor advertising campaigns - The Eyewitness web-based suite of products. Quite simply,

More information

A guide to access control for offices

A guide to access control for offices A guide to access control for offices What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round a building.

More information

National Learning Initiative

National Learning Initiative NLI National Learning Initiative A national skills and learning framework for the voluntary sector A collaborative project of the Association of Canadian Community Colleges and the Coalition of National

More information

Course 6234A: Implementing and Maintaining Microsoft SQL Server 2008 Analysis Services

Course 6234A: Implementing and Maintaining Microsoft SQL Server 2008 Analysis Services Course 6234A: Implementing and Maintaining Microsoft SQL Server 2008 Analysis Services Length: Delivery Method: 3 Days Instructor-led (classroom) About this Course Elements of this syllabus are subject

More information

Social Media Policy For Staff

Social Media Policy For Staff Social Media Policy For Staff 1 Owlswick School and Home Social Media Policy Introduction The Internet provides a range of social media tools that allow users to interact with one another, for example

More information

INFS5991 BUSINESS INTELLIGENCE METHODS

INFS5991 BUSINESS INTELLIGENCE METHODS Australian School of Business School of Information Systems, Technology and Management INFS5991 BUSINESS INTELLIGENCE METHODS Course Outline Semester 1, 2014 Part A: Course-Specific Information Please

More information

Sage 300 Finance. Sage 300 Finance. Industry Solution. Generic to all Industries and Organisations. Target. Business Processes. Business Challenges

Sage 300 Finance. Sage 300 Finance. Industry Solution. Generic to all Industries and Organisations. Target. Business Processes. Business Challenges Sage 300 Finance Ensure you stay competitive in today s global economy with Sage 300 Finance! We offer you far more than simple financial accountability and compliance. Allow your business to evolve with

More information

Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot

Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot www.etidaho.com (208) 327-0768 Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot 3 Days About this Course This course is designed for the end users and analysts that

More information

Get New Customers With YouTube Advertising

Get New Customers With YouTube Advertising Get New Customers With YouTube Advertising What We Do We produce a 30 second video We find your target audience We keep you informed with reports Free of Charge We ensure that the right people see your

More information

Upon completion of the First Year Navigation Competency, students will be able to: Understand the physical and virtual WCSU campus;

Upon completion of the First Year Navigation Competency, students will be able to: Understand the physical and virtual WCSU campus; FIRST YEAR NAVIGATION (FY) COMPETENCY First Year Experience programs take a variety of forms to provide academic and cocurricular support as students begin university life. This competency allows first

More information

Newton s Laws of Motion Project

Newton s Laws of Motion Project Newton s Laws of Motion Project Sir Isaac Newton lived during the 1s. Like all scientists, he made observations about the world around him. Some of his observations were about motion. His observations

More information

Agile for Product Owners

Agile for Product Owners Agile for Product Owners Quickly grasp the keys to Agile practice and become an empowered product owner and a supportive partner of your Agile development team. Utilizing an Agile approach effectively

More information

Race, Gender, Sexuality, Ethnicity, Age, Socioeconomic background

Race, Gender, Sexuality, Ethnicity, Age, Socioeconomic background DIVERSITY UNIT MIKE BERGOLD MEYERS HIGH SCHOOL MISSION STATEMENT: To enlighten students and teachers of Meyers High School about diversity and to help understand and appreciate the differences among all

More information

Leveraging the Internet of Things in Marketing

Leveraging the Internet of Things in Marketing Leveraging the Internet of Things in Marketing Index 3 3 4 4 5 5 6 6 Introduction The Internet of Things outlook IoT and marketing Wearables: Reaching customers anywhere Location-based marketing RFID tags

More information

Binonymizer A Two-Way Web-Browsing Anonymizer

Binonymizer A Two-Way Web-Browsing Anonymizer Binonymizer A Two-Way Web-Browsing Anonymizer Tim Wellhausen Gerrit Imsieke (Tim.Wellhausen, Gerrit.Imsieke)@GfM-AG.de 12 August 1999 Abstract This paper presents a method that enables Web users to surf

More information

Commercial Business Solutions. A fire protection and security company should look at your business from all perspectives

Commercial Business Solutions. A fire protection and security company should look at your business from all perspectives MONITORING ACCESS CONTROL VIDEO SURVEILLANCE INTRUSION DETECTION FIRE & LIFE SAFETY COMMERCIAL SOLUTIONS Commercial Business Solutions A fire protection and security company should look at your business

More information

STEP 5: Giving Feedback

STEP 5: Giving Feedback STEP 5: Giving Feedback Introduction You are now aware of the responsibilities of workplace mentoring, the six step approach to teaching skills, the importance of identifying the point of the lesson, and

More information

WHITEPAPER. Recall Cyber Intelligence

WHITEPAPER. Recall Cyber Intelligence WHITEPAPER Recall Cyber Intelligence Table of Contents isolv Technologies Solves Employee Insider Threats 3 Case Study 3 The Threat 3 The Challenges 4 isolv s Solution: Recall Cyber Intelligence 4 The

More information

Example of Full Systems Training Proposal

Example of Full Systems Training Proposal Example of Full Systems Training Proposal Based on an Actual Proposal PROPOSAL FOR The Department of Social Services DSS Proposal for Training Introduction: Zero Gravity has been providing customized training

More information

A Guide. to Assessment of Learning Outcomes. for ACEJMC Accreditation

A Guide. to Assessment of Learning Outcomes. for ACEJMC Accreditation A Guide to Assessment of Learning Outcomes for ACEJMC Accreditation Accrediting Council on Education in Journalism and Mass Communications, 2012 This guide explains ACEJMC s expectations of an assessment

More information

Workforce Management. The Contact Center s Easy Button? All contents of this document are copyright 2010 CirriusImpact. All rights reserved.

Workforce Management. The Contact Center s Easy Button? All contents of this document are copyright 2010 CirriusImpact. All rights reserved. Workforce Management The Contact Center s Easy Button? Table of Contents Introduction 1 1. Build a Solid Planning Foundation 1 2. Develop a Workforce Management Team 2 3. Get Key Stakeholders to Embrace

More information

REPUTATION MANAGEMENT SURVIVAL GUIDE. A BEGINNER S GUIDE for managing your online reputation to promote your local business.

REPUTATION MANAGEMENT SURVIVAL GUIDE. A BEGINNER S GUIDE for managing your online reputation to promote your local business. REPUTATION MANAGEMENT SURVIVAL GUIDE A BEGINNER S GUIDE for managing your online reputation to promote your local business. About Main Street Hub: Main Street Hub is the voice for more local businesses

More information

Table of Contents. Copyright 2011 Synchronous Technologies Inc / GreenRope, All Rights Reserved

Table of Contents. Copyright 2011 Synchronous Technologies Inc / GreenRope, All Rights Reserved Table of Contents Introduction: Gathering Website Intelligence 1 Customize Your System for Your Organization s Needs 2 CRM, Website Analytics and Email Integration 3 Action Checklist: Increase the Effectiveness

More information

Building a Human Resources Portal Using Business Portal

Building a Human Resources Portal Using Business Portal Building a Human Resources Portal Using Business Portal Published: December 2005 For the latest information, please see http://mbs.microsoft.com/public/gponline Table of contents Introduction...1 What

More information

Refog. Maxim Ananov, REFOG Help Desk

Refog. Maxim Ananov, REFOG Help Desk Refog Maxim Ananov, REFOG Help Desk 1. How does it work? Is it installed locally or does it work in the cloud? System administrator installs Refog Monitor on a computer that is to be used to. Installation

More information

The Definitive Guide to Shift Scheduling. From best practices to inside tips, explore how to become a shift scheduling expert

The Definitive Guide to Shift Scheduling. From best practices to inside tips, explore how to become a shift scheduling expert The Definitive Guide to Shift Scheduling From best practices to inside tips, explore how to become a shift scheduling expert THE ROAD TO BECOMING A SHIFT SCHEDULING EXPERT Effectively planning, managing

More information

Insight into Intelligence: eservices 2.0

Insight into Intelligence: eservices 2.0 Insight into Intelligence: eservices 2.0 Save Time With Intuitive User-Interface and Navigation, Minimizing Clicks View and Filter Reports the Way You Want Them With Custom Tagging English & French Language

More information

Service Management in Microsoft Dynamics CRM 2011

Service Management in Microsoft Dynamics CRM 2011 Course 80292A: Service Management in Microsoft Dynamics CRM 2011 About this Course This course introduces Microsoft Dynamics CRM service management functionality and explains how it helps organizations

More information

Module 1 Personal Vision and Mission Statements for Business Leaders

Module 1 Personal Vision and Mission Statements for Business Leaders Module 1 Personal Vision and Mission Statements for Business Leaders By Michelle Pate, MA, MBA How many times have you worked for a company and many of your co-workers don t know what is happening at the

More information

Measurabl, Inc. Attn: Measurabl Support 1014 W Washington St, San Diego CA, 92103 +1 619.719.1716

Measurabl, Inc. Attn: Measurabl Support 1014 W Washington St, San Diego CA, 92103 +1 619.719.1716 Measurabl, Inc. ( Company ) is committed to protecting your privacy. We have prepared this Privacy Policy to describe to you our practices regarding the Personal Data (as defined below) we collect from

More information

Editorial. Surveillance Studies: Understanding visibility, mobility and the phenetic fix.

Editorial. Surveillance Studies: Understanding visibility, mobility and the phenetic fix. Surveillance & Society 1(1): 1-7 www.surveillance-and-society.org Editorial. Surveillance Studies: Understanding visibility, mobility and the phenetic fix. David Lyon 1 Abstract Surveillance studies is

More information

Visitor Identification Analytics for B2B Lead Generation

Visitor Identification Analytics for B2B Lead Generation Visitor Identification Analytics for B2B Lead Generation A guide to the use of visitor identification analytics and its place in B2B lead generation. Visitor Identification Analytics for B2B Lead Generation.

More information

What is the PYP Perspective on Assessment?

What is the PYP Perspective on Assessment? What is the PYP Perspective on Assessment? Assessment is the gathering and analysis of information about student performance. It identifies what students know, understand, can do and feel at different

More information

Jobsket ATS. Empowering your recruitment process

Jobsket ATS. Empowering your recruitment process Jobsket ATS Empowering your recruitment process WELCOME TO JOBSKET ATS Jobsket ATS is a recruitment and talent acquisition software package built on top of innovation. Our software improves recruitment

More information

IBM Cognos Insight. Independently explore, visualize, model and share insights without IT assistance. Highlights. IBM Software Business Analytics

IBM Cognos Insight. Independently explore, visualize, model and share insights without IT assistance. Highlights. IBM Software Business Analytics Independently explore, visualize, model and share insights without IT assistance Highlights Explore, analyze, visualize and share your insights independently, without relying on IT for assistance. Work

More information

3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India

3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India 3D PASSWORD Tejal Kognule Yugandhara Thumbre Snehal Kognule ABSTRACT 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human

More information

Business Intelligence and intuitive reporting in one comprehensive solution

Business Intelligence and intuitive reporting in one comprehensive solution Business Intelligence and intuitive reporting in one comprehensive solution Business Intelligence Jet Enterprise is Business Intelligence and intuitive reporting in one solution that enables analysis and

More information

COMMUNICATION ASSISTANT BROCHURE

COMMUNICATION ASSISTANT BROCHURE COMMUNICATION ASSISTANT BROCHURE ENHANCE TEAM COLLABORATION Panasonic Communication Assistant is a range of enhanced Unified Communications (UC) productivity applications that converges business telephony

More information

Locke s psychological theory of personal identity

Locke s psychological theory of personal identity Locke s psychological theory of personal identity phil 20208 Jeff Speaks October 3, 2006 1 Identity, diversity, and kinds............................. 1 2 Personal identity...................................

More information

MANAGEMENT SUMMARY INTRODUCTION KEY MESSAGES. Written by: Michael Azoff. Published June 2015, Ovum

MANAGEMENT SUMMARY INTRODUCTION KEY MESSAGES. Written by: Michael Azoff. Published June 2015, Ovum App user analytics and performance monitoring for the business, development, and operations teams CA Mobile App Analytics for endto-end visibility CA Mobile App Analytics WWW.OVUM.COM Written by: Michael

More information

Online Privacy in the Library

Online Privacy in the Library Online Privacy in the Library Mike Robinson Chair, Intellectual Freedom Committee Alaska Library Association http://consortiumlibrary.org/blogs/mcrobinson/ Introduction Need for privacy Threats to privacy

More information

Leveraging Video Analytics to Boost Total In-Store Performance

Leveraging Video Analytics to Boost Total In-Store Performance Retail Store Optimization Leveraging Video Analytics to Boost Total In-Store Performance The Intelligent Store Series Whitepaper Page 1 R etail organizations have been using video surveillance as a valuable

More information

A BETTER WAY TO ADVERTISE. Your guide to SmartAds & Internet Advertising

A BETTER WAY TO ADVERTISE. Your guide to SmartAds & Internet Advertising A BETTER WAY TO ADVERTISE Your guide to SmartAds & Internet Advertising CONTENTS The Basics Of Internet Advertising It all starts with Cookies Segmentation Targeting Re- Targeting Geographic Targeting

More information

MASTER OF ARTS MANAGEMENT

MASTER OF ARTS MANAGEMENT The Master of Arts Management degree is taught at the world renowned Sydney Opera House. MASTER OF ARTS MANAGEMENT COURSE STRUCTURE To become eligible to graduate with a Master of Arts Management degree,

More information

Lesson Plan for Senior Secondary

Lesson Plan for Senior Secondary Lesson Plan for Senior Secondary Introduction Purpose Introduce the National Day of Action against Bullying and Violence (NDA) campaign Explore the role of bystanders to bullying Investigate the theme

More information

Developing Engaging Lessons: Students Work More You Work Less

Developing Engaging Lessons: Students Work More You Work Less Developing Engaging Lessons: Students Work More You Work Less We ten feel we must carry the entire responsibility for students learning a kind Atlas Complex. 1 We do have responsibility to teach but we

More information

The Benefits of Fundraising Software For Nonprofits

The Benefits of Fundraising Software For Nonprofits Raise More Dollars in Less Time - Why the Right Software Matters! There are approximately 1.5 million nonprofits in the US, according to the National Center for Charitable Statistics, and fewer than 100,000

More information

Must have law firm experience. Where are the new ideas coming from?

Must have law firm experience. Where are the new ideas coming from? Must have law firm experience. Where are the new ideas coming from? Same old same old. Must have previous law firm experience. This has to be the most common phrase to appear on job descriptions for marketing

More information

Windows Media Player 10 Mobile: More Music, More Choices

Windows Media Player 10 Mobile: More Music, More Choices Windows Media Player 10 Mobile: More Music, More Choices Windows Media Player 10 Mobile for Windows Mobile -based Smartphones and Pocket PCs is an all-in-one mobile media player that provides a rich media

More information

Emotional Quotient. Michael Sample. CEO Sample Co. 5-22-2013. Your Address Here Your Phone Number Here Your Email Address Here

Emotional Quotient. Michael Sample. CEO Sample Co. 5-22-2013. Your Address Here Your Phone Number Here Your Email Address Here Emotional Quotient CEO Sample Co. 5-22-2013 Introduction The Emotional Quotient report looks at a person's emotional intelligence, which is the ability to sense, understand and effectively apply the power

More information