2008년 5월 25일 일요일

12th weeks's Summary

We learned about Donna Haraway's "cyborg manifesto" last week. Today, we learned history and surveillance, review of the capture model, definition of privacy and lessig on monitoring and search this week. Surveillance is close watch kept over someone or something. "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." And we learned, too. Surveillance model versus capture model → surveillance model is built upon visual metaphors and derives from historical experiences of secret police surveillance.
Then, let's know about privacy's definition. 1. the quality or state of beong apart from company or observation 2. seclusion : freedom from unauthorized intrusion 3. archaic : a place of seclusion
See Lawrence Lessig on the merits of inefficiency! - an inefficiency that makes it harder for these technologies to be misused. It is hard to argue that less is more. data mining systems are designed to facilitate the identification and classification of individuals into distinct groups or segments. profits. unacceptable social consequences.

Lessig on architecture of privacy : Life where less is monitored is a life more private and life where less can legally perhaps be searched is also a life more private. Also, let's see about cookies. Cookies are information that a web server stores on the machine running a web browser. Also, let's see about encyption. Encyption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.

Goals of data mining - data mining efforts are directed toward the generation of reles for the classification of objects, discriminating or distinguishing between two related, but meaningfully distinct classes. Also, let's see about types of data mining. 1. descriptive : compute a relatively concise, description of a large data set. 2. predictive : predict unknown values for a variable for one or more known variables.

Technologies and architectures of privacy-technologies and architectures do not independently determine what is public and what is private technological determinism. Then, we will learn about authorship&ownership next week.
This week's lecture learned that we can adjacent life. It is interesting.

댓글 없음: