The document discusses different frameworks for understanding the relationship between technology and morality in the context of copyright. It analyzes approaches that view technology in instrumental terms based on its intended use, capabilities-based approaches that consider potential uses, and ideology approaches that see technology as embodying certain values and organizing principles. The document also examines issues around peer-to-peer networks, definitions of infringement, and digital rights management technologies.
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...i_scienceEU
The Network of Excellence in Internet Science aims to achieve a deeper multidisciplinary understanding of the Internet as a societal and technological artefact.
More information: http://internet-science.eu/
Twitter: @i_scienceEU
A presentation covering what I think are the important points behind Freud's "Notes Upon The Mystic Writing Pad" and Murphie and Potts "Technology, Thought and Consciousness"
My Masters thesis on the technological, sociological and policy implications of wearable technologies, and how they can be designed with the humanist goal of enabling witnessed presence.
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...i_scienceEU
The Network of Excellence in Internet Science aims to achieve a deeper multidisciplinary understanding of the Internet as a societal and technological artefact.
More information: http://internet-science.eu/
Twitter: @i_scienceEU
A presentation covering what I think are the important points behind Freud's "Notes Upon The Mystic Writing Pad" and Murphie and Potts "Technology, Thought and Consciousness"
My Masters thesis on the technological, sociological and policy implications of wearable technologies, and how they can be designed with the humanist goal of enabling witnessed presence.
The quality of high-end videoconferencing systems has improved significantly over the last few years
enabling a class of applications known as “telepresence” wherein the users engaged in a communication
session experience a feeling of mutual presence in a shared virtual space. Telepresence systems have
reached a maturity level that seriously challenges the old familiar truism that a face-to-face meeting is
always better than a technology-mediated alternative. To explore the state of the art in telepresence
technology and outline future opportunities, this paper proposes an optimality condition, expressed as a
“Turing Test,” whereby the subjective experience of using a telepresence system is compared to the
corresponding face-to-face situation. The requirements and challenges of designing a system passing such
a Turing Test for telepresence are analyzed with respect to the limits of human perception, and the
feasibility of achieving this goal with currently available or near future technology is discussed
Into the twilight zone innovations for educationCynthia Calongne
Ten Colorado Technical University doctoral students and Dr. Cynthia Calongne presented their paper at the TCC 2011 Worldwide Online Conference April 13, 2011 called Into the Twilight Zone: Innovations for education, virtual worlds and emerging media.
This is really not some NASA space technology stuff, it’s more of a hint on possible improvements of the already implemented technology.
I have a feeling that this presentation is going outdated as it’s being written…
The problem of matchmaking in electronic social networks is formulated as an optimization problem.
In particular, a function measuring the matching degree of fields of interest of a search profile with
those of an advertising profile is proposed.
The report published by Fundraising Technology News (Progressive Media Group), focuses on how technology has allowed fundraising to operate through a myriad of channels.
The quality of high-end videoconferencing systems has improved significantly over the last few years
enabling a class of applications known as “telepresence” wherein the users engaged in a communication
session experience a feeling of mutual presence in a shared virtual space. Telepresence systems have
reached a maturity level that seriously challenges the old familiar truism that a face-to-face meeting is
always better than a technology-mediated alternative. To explore the state of the art in telepresence
technology and outline future opportunities, this paper proposes an optimality condition, expressed as a
“Turing Test,” whereby the subjective experience of using a telepresence system is compared to the
corresponding face-to-face situation. The requirements and challenges of designing a system passing such
a Turing Test for telepresence are analyzed with respect to the limits of human perception, and the
feasibility of achieving this goal with currently available or near future technology is discussed
Into the twilight zone innovations for educationCynthia Calongne
Ten Colorado Technical University doctoral students and Dr. Cynthia Calongne presented their paper at the TCC 2011 Worldwide Online Conference April 13, 2011 called Into the Twilight Zone: Innovations for education, virtual worlds and emerging media.
This is really not some NASA space technology stuff, it’s more of a hint on possible improvements of the already implemented technology.
I have a feeling that this presentation is going outdated as it’s being written…
The problem of matchmaking in electronic social networks is formulated as an optimization problem.
In particular, a function measuring the matching degree of fields of interest of a search profile with
those of an advertising profile is proposed.
The report published by Fundraising Technology News (Progressive Media Group), focuses on how technology has allowed fundraising to operate through a myriad of channels.
In 2003 I took an expedition to the headwaters of the Amazon in Bolivia. This presentation revisits the sights of the rainforest and reflects on leadership lessons learned: re-energizing, keeping it simple, being open to new ideas and recognizing the importance of detail.
Sharing Scientific Data: Legal, Normative and Social IssuesKaitlin Thaney
A look at the legal, normative and social issues surrounding data sharing and the ways we've chosen to address this increasingly complex space.
Presented in Beijing on 25 March 2009.A l
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionIJERA Editor
Cloud Computing is a heavily evolving domain in technology. Many public and private entities are shifting their workstations on the cloud due to its robust, remote, virtual environment. Due to the enormity of this domain, it has become increasingly easier to carry out any sort of malicious attacks on such cloud platforms. There is a very low research done to develop the theory and practice of cloud forensics. One of the main challenges includes the inability to collect enough evidence from each and every subscriber of a Cloud Service Provider(CSP) and thus not being able to trace out the roots of the malicious activity committed. In this paper we compare past research done in this field and address the gaps and loopholes in the frameworks previously suggested. Overcoming these, our system/framework facilitates the collection, organization, and thereby the analysis of the evidence sought, hence preserving the essential integrity of the sensitive and volatile data.
This presentation looks at open licensing initiatives in libraries – open source software and open access publishing – as viable alternatives to subscription products from large corporate software vendors and publishers. With a focus on open source search and discovery software, the presenter will outline the technical, cultural and ethical
advantages of moving away from vendor-controlled products and subscriptions.
Simon Barron
SOAS, University of London
Face the Future: Computing in an Augmented WorldTony Parisi
My Keynote Talk from AWE 2017. http://www.augmentedworldexpo.com/
Pairs best with transcript: https://medium.com/@tonyparisi/face-the-future-58ed3b63d91
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeCSCJournals
Computer Forensics is the science of obtaining, preserving, documenting and presenting digital evidence, stored in the form of encoded information, from digital electronic storage devices, such as computers, Personal Digital Assistance (PDA), digital cameras, mobile phones and various memory storage devices. All must be done in a manner designed to preserve the probative value of the evidence and to assure its admissibility in legal proceeding. The word forensics means “to bring to the court”. Forensics deals primarily with the recovery and analysis of latent evidence. Latent evidence can take many forms, from fingerprints left on a window to deoxyribonucleic acid (DNA) evidence recovered from blood stains to the files on a hard drive. This paper provides a high-level overview on computer forensics investigation phases for both technical and nontechnical audience. Although the term “computer” is used, the concept applies to any device capable of storing digital information.
Program For The Future: The Commons as a collective intelligence meta-innovation
Copyrightcontraband
1. Copyright
Contraband
E d d a n K a t z
E x e c u t i v e D i r e c t o r
I n f o r m a t i o n S o c i e t y P r o j e c t
4 S 2 0 0 7
Va n c o u v e r , C a n a d a
N o v e m b e r 2 , 2 0 0 6
Wednesday, December 29, 2010 1
2. Digital Piracy
Criminalization of Copyright
NET Act
DMCA
Banning of Technology
P2P Networks
Circumvention Devices
Wednesday, December 29, 2010 2
3. The House Report further commented on the novelty of such a
ban, concluding that Congress has "historically advanced th[e]
constitutional objective" of the Copyright Clause of the
Constitution by "regulating the use of information—not the
devices or means by which the information is delivered or
used by information consumers—and by ensuring an
appropriate balance between the interests of copyright owners
and information users."
The Senate Report was also cognizant of the moral agency
problem and the means-ends relationship when it noted that the
circumvention device bans “drafted carefully to target 'black
boxes,' and to ensure that legitimate multipurpose devices can
continue to be made and sold."
Wednesday, December 29, 2010 3
4. Morality in Digital
Network Environments
Entertainment Industry Framing
File-Sharing is Stealing
Hacker Tools as Virus
Technology & Responsibility
Unraveling the Property Paradigm
Misattribution of Moral Agency in Technology
Towards an Ethics of Access to Knowledge
Wednesday, December 29, 2010 4
5. "In a common source epidemic, as where members of a population contract
a non-contagious disease from a poisoned well, the disease spreads only by
exposure to the common source. If one eliminates the common source, or
closes the contaminated well, the epidemic is stopped."
The point of the analogy was to make it apparent that stopping "the source"
of the disease, in this case DeCSS dissemination, will not prevent further
spread; the "disease" can travel from person to person and is not easily
stopped. Judge Kaplan continued in a detailed explanation of how DeCSS and
a communicable disease are similar, likening infringement to a disease
outbreak and presumably the 2600 web site as the poisoned well. Kaplan's
sarcasm is revealed when he notes that the "disease metaphor breaks down
principally at the final point. Individuals infected with the real disease become
sick, usually are driven by obvious self-interest to seek medical attention, and
are cured of the disease if medical science is capable of doing so. Individuals
infected with the 'disease' of capability of circumventing measures controlling
access to copyrighted works in digital form, however, do not suffer from
having that ability … their self-interest will motivate some to misuse the
capability, a misuse that, in practical terms, often will be untraceable."
Wednesday, December 29, 2010 5
6. Isolating Criminal
Copyright
Criminal Law appeals to Moral Justification
Distinguish from deterrence & harm-based
Actus Reus & Mens Rea
Causation - temporal & spatial distances
Intentionality - multiple uses of technology
Copyright Contraband
Penalizing Design & Functionality
Wednesday, December 29, 2010 6
7. technology &
responsibility
Ethical Notion Closely Related to Liability
Provides bright line at copyright contraband
Points of Inquiry: Designer, Distributor, User
Technology as Mediator for Human Action
Three Conceptual Frameworks
Instrumentalist Approach
Capabilities Approach
Ideology Approach
Wednesday, December 29, 2010 7
8. Instrumentalist
Approach
Means-Ends Relationship
Widest Application across Technologies
Clarity of Technology as Value-Neutral
Descriptive Shortcomings in Cyberspace
Causal Distance in Self-Regulating Machines
Interconnectedness of Networks
Fails to account for Designer or Engineer
Wednesday, December 29, 2010 8
9. The causal chain of information-processing
technology is further distributed into three stages
between the design and the action. In the program
design stage, the software engineer encodes a design
into a language that can be translated by the
computer. The second stage consists of the
computer turning the programmed design into a set
of working instructions in machine-readable form.
The final stage is the performance of its functions
according to the instructions.
Wednesday, December 29, 2010 9
10. Capabilities
Approach
General Purpose Technologies
Move from particular ends to potential purpose
define by risk of harm & secondary effects
Actual uses Secondary to potential uses
overburdens ordinary uses
tendency to inflate harms
Between Designer & Functionality
requires anticipation of improper & misuse
Blurs functionality of device & intention of designer
Wednesday, December 29, 2010 10
11. Though it is a thin line between
looking to the functionality to
discern the designer’s intent and
assigning intent to functionality,
the moral implications of the two
are significantly different.
Wednesday, December 29, 2010 11
12. Ideology Approach
Vast Infrastructures Organizing Life
Beyond Means-Ends Relationship
Technological Embodiment of Values
Diffusion of Causation
Networks and Platforms of Information
Technology as Self-Sustaining System
Clash of Ideologies
Evaluation of Overall Impact of Technologies
Open vs. Proprietary Architectures
Wednesday, December 29, 2010 12
13. P2P: the Prosthetics
of Piracy?
Relationship of Users to Technology Design
Distributed File-Sharing Networks
Levels of Participation as Proxy for Action
NET Act: The Network’s Intent
Making Available without Profit Motive
Criminal Liability for Ordinary Users
Intentionality Imputed to the Network Itself
Wednesday, December 29, 2010 13
14. P2P II
Ideology of Peer Production
Alternative Distribution System
Distinct from Piracy Harm
Wednesday, December 29, 2010 14
15. DRM: Ideology of
Permission
Technology Regulating Behavior
TPMs as Para-Copyright
Preempts Unauthorized Uses
DMCA: Second-Hand Infringement
Replaces Betamax Capabilities Approach
Ban on Circumvention Devices
Functionality of Circumvention Separate from Activity
Wednesday, December 29, 2010 15
16. DRM II
Proprietary vs. Open Architectures
Trafficking as Communicable Disease
The Politics of Decrypting Closed Systems
Wednesday, December 29, 2010 16