20080521 & 20080523
Introduction to information technology
The Global school of Media – Class B (나)
surveillance
close watch kept over someone or something
Etymology: French, from surveiller to watch over, from sur- + veiller to watch, from Latin vigilare, from vigil watchful
“They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.”
Benjamin Franklin, 1759 Historical Review of Pennsylvania
technologies of surveillance
example: Viisage & Superbowl XXXV
the company: www.viisage.com
the technology: Eigenfaces
http://vismod.media.mit.edu/vismod/demos/facerec/basic.html
patriot act and post 9/11
Aclu’s analysis
see http://www.aclu.org/SafeandFree/SafeandFree.cfm?ID=11813&c=207
new powers of surveillance, search and seizure
threat to the first, fourth, fifth, sixth, eighth and fourteenth amendments of the U.S. Constitution
★ surveillance model versus capture model
surveillance model: is built upon visual metaphors and derives from historical experiences of secret police surveillance
capture model: is built upon linguistic metaphors and takes as its prototype the deliberate reorganization of industrial work activities to allow computers to track them [the work activities] in real time
Agre, p. 740
※ privacy: a definition
1.
a. the quality or state of being apart from company or observation
b. SECLUSION: freedom from unauthorized intrusion (one's)
2. archaic : a place of seclusion
source: Merriam Webster
※ privacy: a culturally specific definition
Does the U.S. Bill of Rights define an individual’s “right to privacy”?
Not explicitly, but...
inferrably: e.g., Amendment IV: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
implicitly: e.g., Amendment IX: The enumeration in the Constitution, of certain rights, shall not be construed to deny or disparage others retained by the people.
★ Lessig on architecture
★ Lessig on code and architecture
★ Lessig on architecture of privacy
☆ cookies
cookies are information that a web server stores on the machine running a web browser
try clearing all of the cookies in your web browser and the visit web sites that you have been.
☆ data mining task
☆ data mining applications
※ technologies and architectures of privacy
※ architectures and inefficiencies
My Opinion :)
This Week, We talk about Public & Privacy.
First, I think Privacy is very important thing for every person.
And Everybody think, too.
Actually, I know cookies.
When I was a middle school student, I studied about computer.
I studied about cookies & CPU & RAM & etc at that time.
So I remember cookies that used in internet.
I want to remember many things that I studied at middle school student.
But It is not easy….
Next week,
We leave last topic ‘authorship & ownership’.
I’m studying hard at last!
See you Next week~
댓글 없음:
댓글 쓰기