8,660 research outputs found

    Filtering, Piracy Surveillance and Disobedience

    Get PDF
    There has always been a cyclical relationship between the prevention of piracy and the protection of civil liberties. While civil liberties advocates previously warned about the aggressive nature of copyright protection initiatives, more recently, a number of major players in the music industry have eventually ceded to less direct forms of control over consumer behavior. As more aggressive forms of consumer control, like litigation, have receded, we have also seen a rise in more passive forms of consumer surveillance. Moreover, even as technology has developed more perfect means for filtering and surveillance over online piracy, a number of major players have opted in favor of “tolerated use,” a term coined by Professor Tim Wu to denote the allowance of uses that may be otherwise infringing, but that are allowed to exist for public use and enjoyment. Thus, while the eventual specter of copyright enforcement and monitoring remains a pervasive digital reality, the market may fuel a broad degree of consumer freedom through the toleration or taxation of certain kinds of activities. This Article is meant largely to address and to evaluate these shifts by drawing attention to the unique confluence of these two important moments: the growth of tolerated uses, coupled with an increasing trend towards more passive forms of piracy surveillance in light of the balance between copyright enforcement and civil liberties. The content industries may draw upon a broad definition of disobedience in their campaigns to educate the public about copyright law, but the market’s allowance of DRM-free content suggests an altogether different definition. The divide in turn between copyright enforcement and civil liberties results in a perfect storm of uncertainty, suggesting the development of an even further division between the role of the law and the role of the marketplace in copyright enforcement and innovation, respectively

    Welcome to the Machine: Privacy and Workplace Implications of Predictive Analytics

    Get PDF
    Privacy is not simply an absence of information about us in the minds of others; rather it is the control we have over information about ourselves. The volume of information that people create themselves—the full range of communications from voice calls, e-mails and texts to uploaded pictures, video, and music—pales in comparison to the amount of digital information created about them each day

    Multiple multimodal mobile devices: Lessons learned from engineering lifelog solutions

    Get PDF
    For lifelogging, or the recording of one’s life history through digital means, to be successful, a range of separate multimodal mobile devices must be employed. These include smartphones such as the N95, the Microsoft SenseCam – a wearable passive photo capture device, or wearable biometric devices. Each collects a facet of the bigger picture, through, for example, personal digital photos, mobile messages and documents access history, but unfortunately, they operate independently and unaware of each other. This creates significant challenges for the practical application of these devices, the use and integration of their data and their operation by a user. In this chapter we discuss the software engineering challenges and their implications for individuals working on integration of data from multiple ubiquitous mobile devices drawing on our experiences working with such technology over the past several years for the development of integrated personal lifelogs. The chapter serves as an engineering guide to those considering working in the domain of lifelogging and more generally to those working with multiple multimodal devices and integration of their data

    10 Strategies for Engaging Learners with Universal Design for Learning and Antiracism

    Get PDF
    This guide shares ideas for applying both the Universal Design for Learning framework and antiracist teaching methods to courses in higher education. The introduction provides definitions of key concepts related to these frameworks followed by 10 strategies

    Switching Partners: Dancing with the Ontological Engineers

    Get PDF
    Ontologies are today being applied in almost every field to support the alignment and retrieval of data of distributed provenance. Here we focus on new ontological work on dance and on related cultural phenomena belonging to what UNESCO calls the “intangible heritage.” Currently data and information about dance, including video data, are stored in an uncontrolled variety of ad hoc ways. This serves not only to prevent retrieval, comparison and analysis of the data, but may also impinge on our ability to preserve the data that already exists. Here we explore recent technological developments that are designed to counteract such problems by allowing information to be retrieved across disciplinary, cultural, linguistic and technological boundaries. Software applications such as the ones envisaged here will enable speedier recovery of data and facilitate its analysis in ways that will assist both archiving of and research on dance

    Digital Image Access & Retrieval

    Get PDF
    The 33th Annual Clinic on Library Applications of Data Processing, held at the University of Illinois at Urbana-Champaign in March of 1996, addressed the theme of "Digital Image Access & Retrieval." The papers from this conference cover a wide range of topics concerning digital imaging technology for visual resource collections. Papers covered three general areas: (1) systems, planning, and implementation; (2) automatic and semi-automatic indexing; and (3) preservation with the bulk of the conference focusing on indexing and retrieval.published or submitted for publicatio

    DRONE AMERICA: THE END OF PRIVACY?

    Get PDF
    Cutting-edge technological innovations have enabled law enforcement agencies to collect data over a geographical area in relatively short amounts of time. Drones (also known as unmanned aerial vehicles) are becoming increasingly acceptable and employed by state and local law enforcement to become force multipliers. While the Federal Aviation Administration has addressed the integration and safety of flight requirements for law enforcement agencies to utilize drones, federal privacy and data collection regulations are unresolved. This thesis argues that federal regulation is required and attempts to highlight the distinction between surveillance technology and delivery platforms to understand how to approach the regulation of data gathering. In doing so, this thesis uses a political, economic, socio-cultural, and technological (PEST) analysis to examine Title III and relative jurisprudence dealing with both surveillance and aerial platforms. The PEST analysis aims to bring forward the salient points in crafting recommendations and expansion in current legislation that support an increase in citizens’ safety and security, but remain within the bounds of constitutional liberty and the Fourth Amendment.Lieutenant Commander, United States NavyApproved for public release. distribution is unlimite

    Big data in epilepsy: Clinical and research considerations. Report from the Epilepsy Big Data Task Force of the International League Against Epilepsy

    Get PDF
    Epilepsy is a heterogeneous condition with disparate etiologies and phenotypic and genotypic characteristics. Clinical and research aspects are accordingly varied, ranging from epidemiological to molecular, spanning clinical trials and outcomes, gene and drug discovery, imaging, electroencephalography, pathology, epilepsy surgery, digital technologies, and numerous others. Epilepsy data are collected in the terabytes and petabytes, pushing the limits of current capabilities. Modern computing firepower and advances in machine and deep learning, pioneered in other diseases, open up exciting possibilities for epilepsy too. However, without carefully designed approaches to acquiring, standardizing, curating, and making available such data, there is a risk of failure. Thus, careful construction of relevant ontologies, with intimate stakeholder inputs, provides the requisite scaffolding for more ambitious big data undertakings, such as an epilepsy data commons. In this review, we assess the clinical and research epilepsy landscapes in the big data arena, current challenges, and future directions, and make the case for a systematic approach to epilepsy big data

    Anonymity, Faceprints, and the Constitution

    Get PDF
    Part I defines anonymity and explains that respect for the capacity to remain physically and psychologically unknown to the government traces back to the Founding. With the advent and expansion of new technologies such as facial recognition technology (“FRT”), the ability to remain anonymous has eroded, leading to a litany of possible harms. Part II reviews the existing Fourth and First Amendment doctrine that is available to stave off ubiquitous government surveillance and identifies anonymity as a constitutional value that warrants more explicit doctrinal protection. Although the Fourth Amendment has been construed to excise surveillance of public and third-party information from its scope, the Court’s recent jurisprudence indicates a growing recognition that constitutional doctrine is out of step with modern surveillance technologies. The Supreme Court has expressly recognized a First Amendment right to anonymous speech, which should be taken into account in assessing the constitutionality of government surveillance systems under the Fourth Amendment. This Part accordingly draws a distinction between cases that arose in the pre-digital age, in which content was often collected through physical trespass or eavesdropping, and those arising in the digital age, in which correlations among disparate points of “big data” are used to make predictions. Part III argues that Fourth and First Amendment doctrine should be reconciled to address the manipulation — versus acquisition — of FRT data to derive new information about individuals which is exceedingly intimate and otherwise out of the government’s reach. This Part suggests that this qualitative shift in information gathering is constitutionally significant under existing doctrine. Part III also offers guidelines gleaned from the intersection of First and Fourth Amendment jurisprudence for consideration by lower courts and legislators as they address the threat of limitless surveillance which big data and new technologies present
    corecore