Managing Your Digital Life | May 2015. By Serge Abiteboul, Benjamin André, Daniel Kaplan Communications of the ACM, Vol. 58 No. 5, Pages 32-35 10.1145/2670528 Comments A typical person today usually has dataa on several devices and in a number of commercial systems that function as data traps where it is easy to check in information and difficult to remove it or sometimes to simply access it. It is also difficult, sometimes impossible, to control data access by other parties. One might consider this an unavoidable price to pay in order to fully take advantage of the ever-increasing amount of available information.
However, this situation is not only unsatisfactory because it requires users to trade privacy against convenience but also, because it limits the value we, as individuals and as a society, can derive from the data. We live in a world where data is considered a vital asset and where most people consider they have little, if any, control over their personal data. Back to Top The Personal Information Management System. Internet Governance, Technical Standards and the “Tree” Antennas | CGCS. Just as soon as I arrived from Brazil in the US, to join the Center for Information Technology Policy Princeton team as graduate fellow, the curious image of cellular antennas disguised as trees caught my attention. It is common to see these “tree” antennas right beside the road while travelling from Princeton to New York, Philly, or Boston.
Aside from the purpose of avoiding visual pollution, this attempt at producing a friendlier landscape is representative of our relation with information and communication infrastructure. The technical and political apparatus that supports the mode of operation of digital technologies is predominantly invisible to the end user. Only the ones who really pay attention can see the antenna behind the fake tree branches.
Fortunately, Edward Snowden’s revelations have shed light on the issue of technology governance, bringing technology into the mainstream of contemporary political discussion. Privacy, security and surveillance. Notes de lecture. Personnalité majeure de la sociologie britannique, tant par ses publications que ses responsabilités institutionnelles, John Urry reste peu connu en France. La traduction (grâce au concours de l’Institut de la Ville en Mouvement) de Sociology beyond societes, ouvrage publié en 2000 en Angleterre, permet donc de prolonger le vif débat suscité par ce livre.
L’ambition principale de Sociologie des mobilités est précisée par le sous-titre. Il s’agit de transformer les questionnements et les méthodes de la sociologie. L’auteur tente de démontrer que la conception de la société qui a présidé à la naissance de la sociologie est désormais caduque. Pour ce faire, il travaille sur les conditions matérielles de la mobilité et sur les pratiques afférentes, en soulignant les imbrications entre acteurs, systèmes sociotechniques et médias. Les flux, les réseaux, rendraient obsolète la vision classique des structures sociales et de leur reproduction.
L’auteur distingue ensuite les fluides des réseaux. Here comes the 'Internet of Self' Two of the biggest trends at International CES this year are the quantified self movement and the Internet of Things (IoT). (Actually, the quantified self gadgets really took CES by storm last year, and the IoT will truly dominate CES next year. Still, both categories had a big presence this year.) But I've noticed a few announcements at CES that suggest a growing mashup between the two. Or, more specifically, the use of quantified self data to control IoT devices.
Call it the "Internet of Self. " The quantified self idea is that biometric sensors harvest data from bodily functions -- heart rate, blood pressure, body temperature, skin surface temperature, blood oxygen, respiratory rate, sleep patterns and potentially hundreds of others -- and that data is analyzed by software to provide useful information. The IoT idea is that objects other than computers have wireless radios, IP addresses and microprocessors and can communicate with each other without conscious human involvement.
Habitele. CAQDAS. Relationship btwn companies & consumers. 9 countries. Legal issues. Attention. Affiliation and membership. Device design. Cultural comparison. Credit card and portable banking services. Containers. ID's technology and history. Personal data ecosystem. Identity issues. Tracking systems and companies.
Market issues. Privacy.