Sie sind auf Seite 1von 6

WEEK 7

!
sousveillance.
!
is most commonly defined as the recording of an activity by a participant in the activity typically by
way of small wearable or portable personal technologies. Sousveillance has also been described as
"inverse surveillance",based on the word surveillance (from the French sur, "from above", and veiller,
"to watch"), and substituting the prefix sous, "from below.

Passive Collecting

Passive data collection occur without any overt consumer interaction and generally includes capturing
user preferences and usage behavior, including location data from personal mobile devices. The bestknown example is the use of cookies on a user's computer to capture Internet browsing history.

!
digital footprint
!

A digital footprint is the trail of data that is left behind by users on digital services.There are two main
classifications for digital footprints: passive and active. A passive digital footprint is created when
data is collected about an action without any client activation, whereas active digital footprints are
created when personal data is released deliberately by a user for the purpose of sharing information
about oneself.

location tagging

the process of adding geographical identification metadata to various media such as a


geotagged photograph or video, websites, SMS messages, QR Codes[1] or RSS feeds and is a
form of geospatial metadata. This data usually consists of latitude and longitude coordinates,
though they can also include altitude, bearing, distance, accuracy data, and place names.

!
gamification
!
Gamification is the use of game thinking and game mechanics in non-game contexts to engage users
in solving problems.Gamification techniques strive to leverage people's natural desires for
competition, achievement, status, self-expression, altruism, and closure.

!
SenseCam
!

Microsoft's SenseCam is a lifelogging camera with fisheye lens and trigger sensors such as
accelerometers, heat sensing and audio, invented by Lyndsay Williams, patent[1] granted in 2009.

Usually worn around the neck, Sensecam is used for the MyLifeBits project, a lifetime storage
database.

!
!

capture/archive/retrieve

Data retrieval, in database management, involves extracting the wanted data from a database. The
two primary forms of the retrieved data are reports and queries.
Automatic identification and data capture (AIDC) refers to the methods of automatically identifying
objects, collecting data about them, and entering that data directly into computer systems (i.e.
without human involvement). Technologies typically considered as part of AIDC include bar codes,
Radio Frequency Identification (RFID), biometrics, magnetic stripes, Optical Character Recognition
(OCR), smart cards, and voice recognition.

!
!
WEEK 8
!
!
consensual hallucination
!In William Gibsons book, Neuromancer, he refers to cyberspace as a consensual hallucination that is
a graphic representation of data abstracted from banks of every computer in the human system.
The phrase is often used to describe virtual reality or cyberspace. "What seems so alluring about the
half-formed promise of VR technologies is the ideal of a world of one's own that one can share with
others through consensus but that one can enter or leave at will ... that brings with it a certain
guarantee of pleasure without danger.

!
meatspace
!

a term, originating from cyberpunk fiction and culture, referring to the real (that is, not virtual) world,
the world of flesh and blood. somewhat tongue-in-cheek. the opposite of cyberspace.

!
disembodied consciousness
!

The phenomenon of disembodied consciousness covers a wide range it could mean things such as
Extra-Sensory Perception, seeing the afterlife and returning again (near death experiences), prophecy
or simply people who claim they can disembody themselves.

!
!
!
information superhighway
!

The information superhighway or infobahn[1][2] was a popular term used through the 1990s to refer
to digital communication systems and the Internet telecommunications network. It is associated with
United States Senator and later Vice-President Al Gore.[3]

!
gibsonian cyberspace
!

"a consensual hallucination experienced daily by billions of legitimate operators, in every nation, by
children being taught mathematical concepts... A graphical representation of data abstracted from
the banks of every computer in the human system. Unthinkable complexity. Lines of light ranged in
the non-space of the mind, clusters and constellations of data

!
barlovian cyberspace

Barlovian cyberspace is a way of naming and describing the ways we experience computers and the
Internet, in recognition that our experiences sit at the intersection of material and symbolic
understandings.

!
!
qualities of cyberspace
!
!

Virtual world Second life space


Cyberspace is a new domain for second life (Wertheim, 1999). Its dierent physical space. A User can
make electronic personality as long as they have a time and energy (Kollock, 2001), because
electronic personality consists of users information. Based on anonymity, Individual in web can
expresses his or her personality. In cyberspace, a user is able to have several electronic personalities,
and acts them (Wertheim, 1999).
Reality of virtual world
A User believes that cyber personality exists and cyberspace is part of real world (Wertheim, 1999).
The confidence can make activities on cyberspace fall into a state of absorption. The more a state of
absorption, a boundary between of cyberspace and physical space disappears. In addition to having
a role, people take part in activities on cyberspace (Hang, 2000). It makes cyberspace feel more
reality.
Interaction
Social interaction and entertainment
Cyberspace is a new domain for social interaction and entertainment (Wertheim, 1999). When its
used as private space, common value or idea makes social network. Social interactions of this kind
are chatting on internet community, on-line game, and club on website, and so on. Through these
activities, people throughout world have cyber social interaction (Hang, 1999; 2001).
Community for common interests
People desire space to share their idea and information for business or work (Wertheim, 1999).
Website or internet network is used for this. A work or information on web is shared and utilized for
everyones each goal.
Public space equality

Web is impartial space. There are not racial or religious or sex prejudice (Wertheim, 1999). Horizontal
relationship (Hang, 1999) exists between members in cyberspace. Activities and benefits (Social
communication and information, and so on) on cyberspace are open to everyone who can use it.
Destruction of public communications (negative)
People in cyberspace give loose to communicate each other. There is not a supervisor or controller. So
public communication can be break and intergenerational communication gap (Jung, 2008) is able to
become serious. So far, there is not a rule or a regulation about cyber communication. And anonymity
makes control of communication in cyberspace impossible.
Cyber egoism (negative)
In fact, nobody can control or regulate actions on cyberspace. There is possibility of cyber egoism and
irresponsible behaviors have a negative eect (Wertheim, 1999; Park 2001) on realities of life. So far,
there is not a rule or a regulation about cyber communication. And nobody can punish a criminal act
on web.
Information Source
Systematizing or structuralizing of information
Information of cyberspace builds up network around nodes (Buchanan, 2002). The node means what
kind of information, which contents, and so on. Information on web is systematized or

structuralized around these nodes (Wertheim, 1999).


User as a knowledge creator
In cyberspace, anybody can be a writer or an author (Jung, 2008), and anybody can show their music
or essay that they have created. Users on web make information as well as take it. A boundary
between user and creator is ambiguous.
Web resource accessibility
Web resource is open to everyone (Wertheim, 1999). In cyberspace, information is shared and
circulated free (Hang, 1999).
Information Standardizing
For more use, Information in cyberspace needs to be standardized (Wertheim, 1999). Currently Most
of web contents are produced as standardized form. So user can apply them without converting.
Hypertext
World Wide Web is huge network that is connected each site as hypertext link (Jung, 2008). Through
hypertext, without map of information, user can get web resource easily.
Meta search engines
Internet provides search engines (Jung, 2008). Web is like a hug sea. In order to surfing successfully,
user needs an implement that can find information.

!
ICT
!

Information and communications technology (ICT) is often used as an extended synonym for
information technology (IT), but is a more specific term that stresses the role of unified
communications[1] and the integration of telecommunications (telephone lines and wireless signals),
computers as well as necessary enterprise software, middleware, storage, and audio-visual systems,
which enable users to access, store, transmit, and manipulate information.[2]

!
!
!

Persona
A persona (plural personae or personas), in the word's everyday usage, is a social role or a character
played by an actor.

Massive Scale Online collaboration

Getting large amounts of data processed quickly and at low cost. Education & Outreach, Bringing data
to the public and allowing them to assist with data processing

crisis of mapping
Crisis mapping is the real-time gathering, display and analysis of data during a crisis, usually a
natural disaster or social/political conflict (violence, elections, etc.).[1] Crisis mapping projects
usually allows large numbers of people, including the public and crisis responders, to contribute
information either remotely or from the site of the crisis. One benefit of the crisis mapping method
over others is that it can increase situational awareness, since the public can report information and
improve data management.[2]

!
dynamics of a community
!

communities are largely driven by environmental fluctuations, and that member populations are, to
dierent extents, regulated through intraspecific interactions, the eects of interspecific interactions
remaining broadly minor. By decomposing the temporal variation in this way, we have been able to
show directly what has been previously inferred indirectly: compensatory dynamics are in fact largely
outweighed by environmental forcing, and the latter tends to synchronize the population dynamics.

!
internet phenomenons

An Internet meme (/mim/ meem) is an idea, style or action which spreads, often as mimicry, from
person to person via the Internet, as with imitating the concept.

Viral

Viral phenomena are objects or patterns able to replicate themselves or convert other objects into
copies of themselves when these objects are exposed to them.

!
!
!
!

Das könnte Ihnen auch gefallen