2008년 5월 25일 일요일

10th Summary

20080521 & 20080523

Introduction to information technology
The Global school of Media – Class B (나)






surveillance

close watch kept over someone or something
Etymology: French, from surveiller to watch over, from sur- + veiller to watch, from Latin vigilare, from vigil watchful
“They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.”
Benjamin Franklin, 1759 Historical Review of Pennsylvania




technologies of surveillance

example: Viisage & Superbowl XXXV
the company: www.viisage.com
the technology: Eigenfaces
http://vismod.media.mit.edu/vismod/demos/facerec/basic.html



patriot act and post 9/11

Aclu’s analysis
see http://www.aclu.org/SafeandFree/SafeandFree.cfm?ID=11813&c=207
new powers of surveillance, search and seizure
threat to the first, fourth, fifth, sixth, eighth and fourteenth amendments of the U.S. Constitution




★ surveillance model versus capture model

surveillance model: is built upon visual metaphors and derives from historical experiences of secret police surveillance

capture model: is built upon linguistic metaphors and takes as its prototype the deliberate reorganization of industrial work activities to allow computers to track them [the work activities] in real time
Agre, p. 740





※ privacy: a definition

1.
a. the quality or state of being apart from company or observation
b. SECLUSION: freedom from unauthorized intrusion (one's)
2. archaic : a place of seclusion

source: Merriam Webster

※ privacy: a culturally specific definition

Does the U.S. Bill of Rights define an individual’s “right to privacy”?
Not explicitly, but...
inferrably: e.g., Amendment IV: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
implicitly: e.g., Amendment IX: The enumeration in the Constitution, of certain rights, shall not be construed to deny or disparage others retained by the people.






★ Lessig on architecture

★ Lessig on code and architecture

★ Lessig on architecture of privacy




☆ cookies

cookies are information that a web server stores on the machine running a web browser
try clearing all of the cookies in your web browser and the visit web sites that you have been.


☆ data mining task

☆ data mining applications


※ technologies and architectures of privacy

※ architectures and inefficiencies














My Opinion :)

This Week, We talk about Public & Privacy.

First, I think Privacy is very important thing for every person.
And Everybody think, too.

Actually, I know cookies.
When I was a middle school student, I studied about computer.
I studied about cookies & CPU & RAM & etc at that time.
So I remember cookies that used in internet.

I want to remember many things that I studied at middle school student.
But It is not easy….


Next week,
We leave last topic ‘authorship & ownership’.
I’m studying hard at last!
See you Next week~

댓글 없음: