13,518 research outputs found

    Multiple multimodal mobile devices: Lessons learned from engineering lifelog solutions

    Get PDF
    For lifelogging, or the recording of one’s life history through digital means, to be successful, a range of separate multimodal mobile devices must be employed. These include smartphones such as the N95, the Microsoft SenseCam – a wearable passive photo capture device, or wearable biometric devices. Each collects a facet of the bigger picture, through, for example, personal digital photos, mobile messages and documents access history, but unfortunately, they operate independently and unaware of each other. This creates significant challenges for the practical application of these devices, the use and integration of their data and their operation by a user. In this chapter we discuss the software engineering challenges and their implications for individuals working on integration of data from multiple ubiquitous mobile devices drawing on our experiences working with such technology over the past several years for the development of integrated personal lifelogs. The chapter serves as an engineering guide to those considering working in the domain of lifelogging and more generally to those working with multiple multimodal devices and integration of their data

    Narcissus to a Man: Lifelogging, Technology and the Normativity of Truth

    No full text
    The growth of the practice of lifelogging, exploiting the capabilities provided by the exponential increase in computer storage, and using technologies such as SenseCam as well as location-based services, Web 2.0, social networking and photo-sharing sites, has led to a growing sense of unease, articulated in books such as Mayer-Schönberger's Delete, that the semi-permanent storage of memories could lead to problematic social consequences. This talk examines the arguments against lifelogging and storage, and argues that they seem less worrying when placed in the context of a wider debate about the nature of mind and memory and their relationship to our environment and the technology we use

    Pornography, Coercion, and Copyright Law 2.0

    Get PDF
    The lack of regulation of the production of pornography in the United States leaves pornography performers exposed to substantial risks. Producers of pornography typically respond to attempts to regulate pornography as infringements upon free speech. At the same time, large corporations involved in the production and sale of pornography rely on copyright law\u27s complex regulatory framework to protect their pornographic content from copying and unauthorized distribution. Web 2.0 also facilitates the production and distribution of pornography by individuals. These user-generators produce their own pornography, often looking to monetize their productions themselves via advertising revenues and subscription models. Much like their corporate counterparts, these user-generators may increasingly rely on copyright law to protect their creations in the future. While legal scholars have addressed the copyright law\u27s role in incentivizing the creation and consumption of creative content in general, its effect on the creation and consumption of pornography has largely been ignored. Since pornography performers are at risk of abuse by the creators of pornography, particularly those that are filmed or photographed unknowingly or those who have sexual images of themselves distributed against their wishes, it is important consider what approaches there may be to reduce that risk, including the possibility of altering the copyright framework with respect to pornography. Copyright laws do not provide ownership interests or control mechanisms to the subjects of pornographic material, and instead permits the creators to benefit at the expense of the subjects when their participation has not been consensual. Providing this type of control - namely by requiring the creator to show that the subjects\u27 participation was voluntary as a condition of providing copyright protection - would help reduce the risks faced by pornography performers. Promulgating a moral approach to structuring copyright protections is already one goal that is animating calls for reform of the current system. Copyright law should link the ability to register and enforce copyrights on pornographic works to the creators\u27 compliance with a regulatory scheme designed to promote the safety and well-being of pornographic performers by confirming their consent

    We are archivists, but are we OK?

    Get PDF
    Purpose – The purpose of this paper is to show that the digital environment of the early twenty-first century is forcing the information sciences to revisit practices and precepts built around paper and physical objects over centuries. The training of archivists, records managers, librarians and museum curators has had to accommodate this new reality. Often the response has been to superimpose a digital overlay on existing curricula. A few have taken a radical approach by scrutinising the fundamentals of the professions and the ontologies of the materials they handle. Design/methodology/approach – The article explores a wide range of the issues exposed by this critique through critical analysis of ideas and published literature. Findings – The authors challenge archive and records management educators to align their curricula with contemporary need and to recognise that partnership with other professionals, particularly in the area of technology, is essential. Practical implications – The present generation owe it to future generations of archivists and records managers to ensure that the education that they get to prepare them for professional life is forward-looking in the same way. Originality/value – This paper aims to raise awareness of the educational needs of twenty-first century archives and records professionals

    Electronic governance, premise for implementation of electronic democracy

    Get PDF
    Living in a rapidly changing society, where information travels with great speed and its upgrade is essential, we decided to approach certain aspects of e-democracy, as a dynamic way of citizen participation, using new Information and Communications Technologies. The theme chosen for this research, Electronic governance, premise for implementation of electronic democracy, is a part of Electronic Administration field and identifies the meanings of implementing e-government and e-democracy, the necessity and effects of putting them into practice and the conditions to be fulfilled for the development of electronic services and fostering citizen participation in their use. E-governance as well as edemocracy have a clear contribution in making social progress, thanks to capitalize the most important irreversible resource, the time for achievement of the main administrative operations. The overall objective of the research aims to establish the relationship between governance and electronic democracy. From this perspective, this paper will contain: analyzing the importance of both e-governance and e-democracy, risks and benefits for each one, clarifying the need and implications underlying the implementation of electronic systems and explain the conditions to be met by citizens in order to benefit from these services. To achieve the objectives set, will be dominant the analyzing method of the social phenomena in their evolution. They will also combine harmoniously with practical examples in various member states of the European Union.e-governance, e-democracy

    Algorithms that Remember: Model Inversion Attacks and Data Protection Law

    Get PDF
    Many individuals are concerned about the governance of machine learning systems and the prevention of algorithmic harms. The EU's recent General Data Protection Regulation (GDPR) has been seen as a core tool for achieving better governance of this area. While the GDPR does apply to the use of models in some limited situations, most of its provisions relate to the governance of personal data, while models have traditionally been seen as intellectual property. We present recent work from the information security literature around `model inversion' and `membership inference' attacks, which indicate that the process of turning training data into machine learned systems is not one-way, and demonstrate how this could lead some models to be legally classified as personal data. Taking this as a probing experiment, we explore the different rights and obligations this would trigger and their utility, and posit future directions for algorithmic governance and regulation.Comment: 15 pages, 1 figur
    corecore