This class's key points are public & privacy.
We talked surveillance that means close watch kept over someone or something. surveillance's etymology is : French, from surveiller to watch over, from sur- + veiller to watch, from Latin vigilare, from vigil watchful. Some artists and art groups concerned with surveillance. Example of technologies of surveillance is Viisage & Superbowl XXXV. We can see the company homepage(http://www.viisage.com)./
From surveillance to dataveillance. Name change as of may 21, 2003 to mollify congress’ worries about intrusion of the privacy of u.s. citizens. Headed by convicted felon (former admiral) john poindexter. Patriot act and post 9/11. And we see Aclu’s analysis. New powers of surveillance, search and seizure.
Surveillance model versus capture model.
Surveillance model: is built upon visual metaphors and derives from historical experiences of secret police surveillance.
Capture model: is built upon linguistic metaphors and takes as its prototype the deliberate reorganization of industrial work activities to allow computers to track them [the work activities] in real time.
We thought capture (in comparison with surveillance) . linguistic metaphors (e.g., grammars of action).
privacy: a definition
1. The quality or state of being apart from company or observation.
privacy: a definition
1. The quality or state of being apart from company or observation.
SECLUSION: freedom from unauthorized intrusion
2. Archaic : a place of seclusion.
We talked what are the connections between the public and the private. Resistances between private and public.
Lawrence Lessig on the merits of inefficiency. An inefficiency that makes it harder for these technologies to be misused. And of course it is hard to argue that we ought to build in features of the architecture of cyberspace that will make it more difficult for government to do its work. It is hard to argue that less is more.
2. Archaic : a place of seclusion.
We talked what are the connections between the public and the private. Resistances between private and public.
Lawrence Lessig on the merits of inefficiency. An inefficiency that makes it harder for these technologies to be misused. And of course it is hard to argue that we ought to build in features of the architecture of cyberspace that will make it more difficult for government to do its work. It is hard to argue that less is more.
Digital media versus computer science.
Digital media studies: some architectures (e.g., democratic ones) are best designed to be inefficient.
Computer science: efficiency is almost always considered to be a virtue: efficient architectures are usually good architectures.
Lessig on architecture of privacy.
Life where less is monitored is a life more private; and life where less can (legally perhaps) be searched is also a life more private.
Computer science: efficiency is almost always considered to be a virtue: efficient architectures are usually good architectures.
Lessig on architecture of privacy.
Life where less is monitored is a life more private; and life where less can (legally perhaps) be searched is also a life more private.
Architectures of privacy. From doors, windows and fences. To wires, networks, wireless networks, databases and search engines. Example: architecture of the web.
We can monitoring on the web.
We can monitoring on the web.
Cookies are information that a web server stores on the machine running a web browser.
–try clearing all of the cookies in your web browser and the visit web sites that you have been.
Encyption: the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. “data mining” is one form of “elaboration”
Types of data mining.
First, descriptive: compute a relatively concise, description of a large data set. Second, predictive: predict unknown values for a variable for one or more known variables.
–e.g., will this person likely pay their bills on time?
–try clearing all of the cookies in your web browser and the visit web sites that you have been.
Encyption: the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. “data mining” is one form of “elaboration”
Types of data mining.
First, descriptive: compute a relatively concise, description of a large data set. Second, predictive: predict unknown values for a variable for one or more known variables.
–e.g., will this person likely pay their bills on time?
Data mining tasks is regression,classification,clustering,inference of associative rules,inference of sequential patterns.
*comments*
public & privacy
Where is place in which privacy is kept? Room? Bath room?
I think privacy more.
I am interested incapture , data mining and so on.
*