It's your future

270 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
270
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

It's your future

  1. 1. Always On Panopticon… Or Cooperation Amplifier?
  2. 2. <ul><li> pan opticon </li></ul><ul><li> everywhere being seen </li></ul><ul><li>PANOPTICON </li></ul><ul><li> Place where everything is being seen </li></ul>
  3. 3. <ul><li>to amplify cooperation </li></ul><ul><li> TECHNOLOGY </li></ul><ul><li>to intensify surveillance </li></ul><ul><li>what we know and do can minimize dangers </li></ul><ul><li>and maximize opportunities </li></ul>
  4. 4. Should We Refuse It?
  5. 5. Smart mob technologies pose at least 3 kinds of potential threats: <ul><li>Threats to liberty </li></ul><ul><li>Threats to quality of life </li></ul><ul><li>Threats to human dignity </li></ul>
  6. 6. Threats to liberty <ul><li>Pervasive computing is converging with ubiquitous surveillance, providing the totalitarian snoop power depicted in Orwell’s 1984 </li></ul>
  7. 7. <ul><li>Everything what we are doing is seen by others </li></ul>
  8. 8. Threats to quality of life <ul><li>From individual angst to deteriorating communities, it isn’t clear whether life in the infomated society delivers conveniences faster than it erodes sanity and civility </li></ul>
  9. 9. <ul><li>Does using technology make us more comfortable? </li></ul>
  10. 10. Threats to human dignity <ul><li>As more people turn more aspects of their lives over to symbiotic interaction with machines, the more mechanical and less humane we become </li></ul>
  11. 11. <ul><li>Machines, human, which is more important? </li></ul>
  12. 12. Can Discipline Evolve?
  13. 13. <ul><li>Every telephone call, credit card transaction, mouse-click, email, automatic bridge toll collection, convenience market video camera, and hotel room electronic key collects and broadcast personal information that is increasingly compiled, compared, sorted and stored by unknown and possibly unknowable assortment of state security agencies and people who want to sell something, we already know about that and let them know </li></ul>
  14. 14. <ul><li>Examples: </li></ul><ul><li>Airport Safety </li></ul><ul><li>Prisoners </li></ul><ul><li>Believing in God </li></ul>
  15. 15. Can discipline change in the future? <ul><li>For some reason, it’s good, and the other is bad </li></ul>
  16. 16. And What Is Happening with User Interface?
  17. 17. <ul><li>Mobile Communication is dangers </li></ul><ul><li>No eye contact </li></ul><ul><li>No facial expression </li></ul><ul><li>No tone of voice </li></ul>
  18. 18. <ul><li>Communicating by e-mail can make misunderstanding because they are not in the real meeting </li></ul><ul><li>Getting information from internet is less accurate than from doing own research </li></ul>
  19. 19. <ul><li>They are in public place but actually they are in other place which is more privately </li></ul><ul><li>less friendly </li></ul><ul><li> pass each other unsmiling </li></ul>
  20. 20. Where is your position? <ul><li>You are controlling technology? </li></ul><ul><li>You are controlled by technology? </li></ul>

×