I learn privacy and public in information technology class. It is the important key points on this week that History of and surveillance today, review of the capture model, definition of privacy, Lessig on monitoring and serach and Gandy on data mining .
Surveillance is close watch kept over someon or something. Today, the surveillances are with artists and art groups concerned. For example, ZKM show which is [ctr l] space, curated by Tomas Y.Levin, surveillance camera players, institute for applied autonomy, Julia Scher and Steve Mann’s video. Also I learned Technologies of surveillance. FoViiasage 7 SuperbowlXXXV is an example. There is from surveillance to dataveillance. Dataveillacne/spying is carnavor, echelon and total information awareness agency and it is officially ended in September 2003.
There are Aclu’s analysis, new powers of surveillance, search and seizure and threat to the first, fourth, fifth, sixth, eighth and fourteenth amendments of the U.S. Constitution to pariot act and post 9/11.
Surveillance model is built upon visual metaphors and derives from historical experiences of secret police surveillance. Capture model is built upon linguistic metaphors and takes as its prototype the deliberate reorganization of industrial work activities to allow computers to track them [the work activities] in real time. Capture in comparison with surveillance is that linguistic metaphors (e.g., grammars of action),instrumentation and reorganization of existing activities, captured activity is assembled from standardized “parts” from an institutional setting, decentralized and heterogeneous organization and the driving aims are not necessarily political, but philosophical/market driven.
What is privacy? It is the quality or state of being apart from company or observation and the other is a place of seclusion. The connections between the public and the private are social, civil society and economic sphere.
If the digital media versus computer science what is the result? First, digital media studies are some architectures which are best designed to be inefficient. Computer science is efficiency that is almost always considered to be a virtue. Lessig on architecture however, by “architecture” Lessig means, more or less, what computer scientists mean when they say architecture: configuration/assemblages of hardware and software video.
Architecture of privacy is from doors, windows and fences. It is to wires, networks; wireless networks, databases and search engines.For example, the HTTP headers whiche is cookies are the examples of anti and monitoring architectural features of the web.
Descriptive and predictive are types of data mining. Descriptive is to compute a relatively concise, description of a large data set. Predictive is to predict unknown values for a variable for one or more known variables.
Data mining tasks are regression, classification, clustering, inference of associative rules and inference of sequential patterns. Regression is to infer a function that relates a known variable to an unknown variable. Classification is to given a set of categories and a datum, put it into the correct category. Clustering is to given a data set divide it into groups. Inference of sequential patterns is to given a set of series, determine which things often occur before others. Inference of associative rules is to given a set of sets, determine which subsets commonly occur together. Data mining is used for market research and other commercial purposes, science and intelligence gathering. Technologies and architectures are important influences on the production and change of private and public space but, they do not independently determine what is public and what is private (to think they do is called technological determinism). We need to understand not just the machines, but also the people mediated by these technologies: we need to understand the whole as a machination, a heterogeneous network of people and machines; thus Lessig’s mention (in addition to architecture) of laws, norms, and the market.
Surveillance is close watch kept over someon or something. Today, the surveillances are with artists and art groups concerned. For example, ZKM show which is [ctr l] space, curated by Tomas Y.Levin, surveillance camera players, institute for applied autonomy, Julia Scher and Steve Mann’s video. Also I learned Technologies of surveillance. FoViiasage 7 SuperbowlXXXV is an example. There is from surveillance to dataveillance. Dataveillacne/spying is carnavor, echelon and total information awareness agency and it is officially ended in September 2003.
There are Aclu’s analysis, new powers of surveillance, search and seizure and threat to the first, fourth, fifth, sixth, eighth and fourteenth amendments of the U.S. Constitution to pariot act and post 9/11.
Surveillance model is built upon visual metaphors and derives from historical experiences of secret police surveillance. Capture model is built upon linguistic metaphors and takes as its prototype the deliberate reorganization of industrial work activities to allow computers to track them [the work activities] in real time. Capture in comparison with surveillance is that linguistic metaphors (e.g., grammars of action),instrumentation and reorganization of existing activities, captured activity is assembled from standardized “parts” from an institutional setting, decentralized and heterogeneous organization and the driving aims are not necessarily political, but philosophical/market driven.
What is privacy? It is the quality or state of being apart from company or observation and the other is a place of seclusion. The connections between the public and the private are social, civil society and economic sphere.
If the digital media versus computer science what is the result? First, digital media studies are some architectures which are best designed to be inefficient. Computer science is efficiency that is almost always considered to be a virtue. Lessig on architecture however, by “architecture” Lessig means, more or less, what computer scientists mean when they say architecture: configuration/assemblages of hardware and software video.
Architecture of privacy is from doors, windows and fences. It is to wires, networks; wireless networks, databases and search engines.For example, the HTTP headers whiche is cookies are the examples of anti and monitoring architectural features of the web.
Descriptive and predictive are types of data mining. Descriptive is to compute a relatively concise, description of a large data set. Predictive is to predict unknown values for a variable for one or more known variables.
Data mining tasks are regression, classification, clustering, inference of associative rules and inference of sequential patterns. Regression is to infer a function that relates a known variable to an unknown variable. Classification is to given a set of categories and a datum, put it into the correct category. Clustering is to given a data set divide it into groups. Inference of sequential patterns is to given a set of series, determine which things often occur before others. Inference of associative rules is to given a set of sets, determine which subsets commonly occur together. Data mining is used for market research and other commercial purposes, science and intelligence gathering. Technologies and architectures are important influences on the production and change of private and public space but, they do not independently determine what is public and what is private (to think they do is called technological determinism). We need to understand not just the machines, but also the people mediated by these technologies: we need to understand the whole as a machination, a heterogeneous network of people and machines; thus Lessig’s mention (in addition to architecture) of laws, norms, and the market.
댓글 없음:
댓글 쓰기