Always On Panopticon… Or Cooperation Amplifier?
<ul><li>  pan     opticon </li></ul><ul><li>  everywhere   being seen </li></ul><ul><li>PANOPTICON </li></ul><ul><li>  Pla...
<ul><li>to amplify cooperation  </li></ul><ul><li>  TECHNOLOGY </li></ul><ul><li>to intensify surveillance </li></ul><ul><...
Should We Refuse It?
Smart mob technologies pose at least 3 kinds of potential threats: <ul><li>Threats to liberty </li></ul><ul><li>Threats to...
Threats to liberty <ul><li>Pervasive computing is converging with ubiquitous surveillance, providing the totalitarian snoo...
<ul><li>Everything what we are doing is seen by others </li></ul>
Threats to quality of life <ul><li>From individual angst to deteriorating communities, it isn’t clear whether life in the ...
<ul><li>Does using technology make us more comfortable? </li></ul>
Threats to human dignity  <ul><li>As more people turn more aspects of their lives over to symbiotic interaction with machi...
<ul><li>Machines, human, which is more important? </li></ul>
Can Discipline Evolve?
<ul><li>Every telephone call, credit card transaction, mouse-click, email, automatic bridge toll collection, convenience m...
<ul><li>Examples: </li></ul><ul><li>Airport Safety </li></ul><ul><li>Prisoners </li></ul><ul><li>Believing in God </li></ul>
Can discipline change in the future?  <ul><li>For some reason, it’s good, and the other is bad </li></ul>
And What Is Happening with User Interface?
<ul><li>Mobile Communication is dangers </li></ul><ul><li>No eye contact </li></ul><ul><li>No facial expression </li></ul>...
<ul><li>Communicating by e-mail can make misunderstanding because they are not in the real meeting </li></ul><ul><li>Getti...
<ul><li>They  are in public place but actually they are in other place which is more privately </li></ul><ul><li>less frie...
Where is your position? <ul><li>You are controlling technology? </li></ul><ul><li>You are controlled by technology? </li><...
Upcoming SlideShare
Loading in …5
×

Smart Mobs

472 views

Published on

This slides are for my class presentation. We talk about what is going on our next future world.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
472
On SlideShare
0
From Embeds
0
Number of Embeds
49
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Smart Mobs

  1. 1. Always On Panopticon… Or Cooperation Amplifier?
  2. 2. <ul><li> pan opticon </li></ul><ul><li> everywhere being seen </li></ul><ul><li>PANOPTICON </li></ul><ul><li> Place where everything is being seen </li></ul>
  3. 3. <ul><li>to amplify cooperation </li></ul><ul><li> TECHNOLOGY </li></ul><ul><li>to intensify surveillance </li></ul><ul><li>what we know and do can minimize dangers </li></ul><ul><li>and maximize opportunities </li></ul>
  4. 4. Should We Refuse It?
  5. 5. Smart mob technologies pose at least 3 kinds of potential threats: <ul><li>Threats to liberty </li></ul><ul><li>Threats to quality of life </li></ul><ul><li>Threats to human dignity </li></ul>
  6. 6. Threats to liberty <ul><li>Pervasive computing is converging with ubiquitous surveillance, providing the totalitarian snoop power depicted in Orwell’s 1984 </li></ul>
  7. 7. <ul><li>Everything what we are doing is seen by others </li></ul>
  8. 8. Threats to quality of life <ul><li>From individual angst to deteriorating communities, it isn’t clear whether life in the infomated society delivers conveniences faster than it erodes sanity and civility </li></ul>
  9. 9. <ul><li>Does using technology make us more comfortable? </li></ul>
  10. 10. Threats to human dignity <ul><li>As more people turn more aspects of their lives over to symbiotic interaction with machines, the more mechanical and less humane we become </li></ul>
  11. 11. <ul><li>Machines, human, which is more important? </li></ul>
  12. 12. Can Discipline Evolve?
  13. 13. <ul><li>Every telephone call, credit card transaction, mouse-click, email, automatic bridge toll collection, convenience market video camera, and hotel room electronic key collects and broadcast personal information that is increasingly compiled, compared, sorted and stored by unknown and possibly unknowable assortment of state security agencies and people who want to sell something, we already know about that and let them know </li></ul>
  14. 14. <ul><li>Examples: </li></ul><ul><li>Airport Safety </li></ul><ul><li>Prisoners </li></ul><ul><li>Believing in God </li></ul>
  15. 15. Can discipline change in the future? <ul><li>For some reason, it’s good, and the other is bad </li></ul>
  16. 16. And What Is Happening with User Interface?
  17. 17. <ul><li>Mobile Communication is dangers </li></ul><ul><li>No eye contact </li></ul><ul><li>No facial expression </li></ul><ul><li>No tone of voice </li></ul>
  18. 18. <ul><li>Communicating by e-mail can make misunderstanding because they are not in the real meeting </li></ul><ul><li>Getting information from internet is less accurate than from doing own research </li></ul>
  19. 19. <ul><li>They are in public place but actually they are in other place which is more privately </li></ul><ul><li>less friendly </li></ul><ul><li> pass each other unsmiling </li></ul>
  20. 20. Where is your position? <ul><li>You are controlling technology? </li></ul><ul><li>You are controlled by technology? </li></ul>

×