Final Project

My final project proposal is derived off of my previous work. Continuing with the theme of modifying user submitted images, I decided to do an experiment with generating ID cards.

A user would enter in relevant information like name and year, then choose a school’s ID format. Lastly they would upload a picture to use for the ID and they would receive back a generated image similar to the ID they would have as a student of that school.

This is for intellectual purposes only. I feel depending on Visual ID checks is a big vulnerability for any institution.

Homework #9

Talk assignment:   Connected, but alone? – Sherry Turkle
Sherry gave a TED talk about a topic that many can relate to. That is the use of technology to communicate. But it’s more specifically using technology to replace traditional methods of connecting like talking or being physically present. She raises the concern about how our society is depending more on digital communication at the cost of us not being able to really have relationships with other people. Relationships have certainly changed over the last twenty something years. I think how and when digital communication is used determines if it’s impact is positive or negative.

 

Homework #8

Reading:
Network Neutrality, Broadband Discrimination – Tim Wu
This article laid the groundwork for what would be a hot button issue over the next decade that followed.
Different parties have their own interests in mind when they argue for or against net neutrality.  Even when groups agree for or against it, there are numerous ways in which each goal can be achieved. I feel the net should be fair and promote innovation as much as possible.
However there needs to be a guiding hand to some extent. This is to ensure that the smallest of entities have some sort of representation when decisions are being made.  Also it would be easier to stop an ISP from getting out of control before it happens.

Homework #7

Reading:
Surveillance and Capture – Two Models of Privacy & Beyond the Mirror World

These two articles of Agre’s approach the theme of privacy in different ways. The first, Surveillance and Capture approaches the topic in a very methodical and repetitive way. He brings up a interesting distinction between the two methods of “monitoring”. They are usually not the same and have different implications. The act of surveillance is proactive in a sense.  It requires someone to watch or to react to being “watched” to be effective.

The capture method is passive in the sense that data is captured, and is essentially meaningless unless reacted upon. So if an employee keeps swiping in late, it doesn’t mean anything unless that data is being used to determine lateness. Agre made a good point about there needing to be some sort of model for the data being recorded. There has to be a correlation with the real world. Otherwise you are just looking at measurements and specific event triggers. Even when there is a real world correlation, it doesn’t prevent errors or obfuscation.

I think at one point in the article the author said that some combination of these two models would be an very effective tool, depending on the intentions of the watcher.

In his writing, Mirror World, he outlines what implication would a virtual world have on privacy. Or more so, what would the requirements be to copy one of more versions of our world into a digital form. Would we have the same privacy as we do in real life? Is that possible when a copy of your life is stored in the Mirror World.

Other things to consider if who will have access to this information? Even if your privacy is maintained, there’s no guarantee this information can’t be stolen from the Mirrow World in real life, or even digitally.

He also goes on to describe how the paradigms of computer science hasn’t changed much over the century. Yes we have faster processing and materials to make similar components like vacuum tubes and transistors. But I think his point is that working systems tend to evolve for better of worse. So it is important to try to use the tools as best as possible.

For example, databases paradigms are old, but there was a important in its history where it had to be established that we are recording the data of a type of person, rather than each individual. This way of thought ensures that the databases are viable and work efficiently.

Homework #3 Draft

HW#2 Message Board Entry
HW#2 Message Board

HW#3 Message Board Template+DB

READING:
John Perry Barlow – A Declaration of the Independence of Cyberspace

It was interesting to see even at the beginning of the “web” explosion, there was already big government trying to get control of what it didn’t fully understand. As a teenager at that time, it really felt like a strange and new world for me to explore. It felt like the Wild West. There didn’t seem to be any rules. People were testing the boundaries of what they could get away with. Some people didn’t understand much of the World Wide Web and were either exploited or hide in whatever corners they were comfortable in.

The article sort of highlights the sense of freedom and rights we thought it gave us. People didn’t want to be monitored and controlled by some faceless entity when they themselves thought they were anonymous. The article does get repetitive but the points I took away from it is that the author wanted to fight for freedom on the internet and motivate other to follow suit.

Unfortunately it looks like what he was fighting against has already won the battle. There is heavier regulation now and privacy on the net is probably worse now with companies able to sell your browsing history. There are entire countries censoring content and making it illegal even to access certain communication and news sites. A consistent theme however is there are always people circumventing the government and technology to free information and access.