2008년 5월 30일 금요일

05. 23

05. 23


surveillance
- close watch kept over someone or something
- Technologies of surveillance
- example: Viisage & Superbowl XXXV


surveillance model versus capture model
- surveillance model is built upon visual metaphors and derives from historical experiences of secret police surveillance
- capture model is built upon linguistic metaphors and takes as its prototype the deliberate reorganization of industrial work activities to allow computers to track them [the work activities] in real time


privacy: a definition

- 1. the quality or state of being apart from company or observation
- 2. archaic : a place of seclusion


digital media versus computer science
- digital media studies: some architectures are best designed to be inefficient.
- computer science: efficiency is almost always considered to be a virtue: efficient architectures are usually good architectures


Lessig on code and architecture



Lessig on architecture of privacy
- Life where less is monitored is a life more private; and life where less can be searched is also a life more private.


data mining task


technologies and architectures of privacy

- technologies and architectures are important influences on the production and change of private and public space;
- but, they do not independently determine what is public and what is private
- sometimes inefficient architectures, inefficient technologies are good technologies because they allow for or facilitate resistance by the less powerful in the face of powerful individuals, corporations and governments

Today I learned about history of surveilance, definition of privacy and etc.
It is applied to my real life whatever monitoring or search.
So I was glad to learn this.

댓글 없음: