05. 23
surveillance
- close watch kept over someone or something
- Technologies of surveillance
- example: Viisage & Superbowl XXXV
surveillance model versus capture model
- surveillance model is built upon visual metaphors and derives from historical experiences of secret police surveillance
- capture model is built upon linguistic metaphors and takes as its prototype the deliberate reorganization of industrial work activities to allow computers to track them [the work activities] in real time
privacy: a definition
- 1. the quality or state of being apart from company or observation
- 2. archaic : a place of seclusion
digital media versus computer science
- digital media studies: some architectures are best designed to be inefficient.
- computer science: efficiency is almost always considered to be a virtue: efficient architectures are usually good architectures
Lessig on code and architecture
Lessig on architecture of privacy
- Life where less is monitored is a life more private; and life where less can be searched is also a life more private.
data mining task
technologies and architectures of privacy
- technologies and architectures are important influences on the production and change of private and public space;
- but, they do not independently determine what is public and what is private
- sometimes inefficient architectures, inefficient technologies are good technologies because they allow for or facilitate resistance by the less powerful in the face of powerful individuals, corporations and governments
Today I learned about history of surveilance, definition of privacy and etc.
It is applied to my real life whatever monitoring or search.
So I was glad to learn this.
댓글 없음:
댓글 쓰기