2008년 5월 24일 토요일

2008.05.21&23

public & privacy
introduction to information technology

-surveillance
“They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” _Benjamin Franklin
-technologies of surveillance
example: Viisage & Superbowl XXXV
#so many things around us.
-capture model
is built upon linguistic metaphors and takes as its prototype the deliberate reorganization of industrial work activities to allow computers to track them [the work activities] in real time.
-digital media versus computer science
digital media studies: some architectures (e.g., democratic ones) are best designed to be inefficient.
computer science: efficiency is almost always considered to be a virtue: efficient architectures are usually good architectures.
-monitoring on the web
Q.what does your web browser reveal about you?
#When you come back long loding image time is more faster...easy.
That is, To convenience, faster.
Q.standard HTTP headers:
From: User’s email address, User-Agent: User’s browser software, Referer: Page user cam from by following a link, Authorization: User name and password, Client-IP: Clien’t IP address, Cookie: Server-generated ID label
-data mining
market research and other commercial purposes , science, intelligence gathering
Q.might data mining be used for the purposes of less powerful citizens?
A.news analysis, government “watch dog” operations
-architectures and inefficiencies
sometimes inefficient architectures, inefficient technologies are good technologies because they allow for or facilitate resistance by the less powerful in the face of powerful individuals, corporations and governments.

댓글 없음: