i like Να έχεις μια όμορφη μέρα και να είσαι ζεστά ☺️you are going to meet.
Σάββατο 1 Απριλίου 2017
Legal protections for users of online sites are
often weak. To access online software and
services, a user is often required to read and
approve a long legal consent form that is
presented on the screen. Because of the
ubiquity of these forms, their length, and their
obscure legal terminology, most Internet users
have formed the habit of immediately
scrolling to the bottom of these forms and
clicking the “I accept these conditions”
button, without reading or understanding the
text. When the software is updated, the user
is often required to indicate their agreement
to a new consent form. It becomes
impractical for the average user carefully to
review everything they agree to in this
manner.
Rather than relying on these online consent
forms, most users probably rely on the
reputation of the service provider as the main
guarantor of honesty and service reliability.
Major software and Internet firms can be
expected to be protective of their reputational
capital, and may therefore choose to refrain
from openly deceiving or exploiting their user
base. However, firms that face decline will
sometimes choose to “harvest” their
reputational capital by reneging on their
implicit contract with their users in order to
eke out as much profit as possible before their
time is up. Again, the ‘shadow of the future’
is a relevant problem: while current values and
practices are acceptable, they might not
remain so.
It is interesting to consider whether the same
need for maintaining openness, accountability
and user rights as holds for governments
applies to social space providers. While it can
be argued they are merely providing a
commercial service controlled by contract
law, the importance of online identities and
social spaces might be growing to such an
extent that they are equivalent to social goods
that must be protected by law. If, for
example, one’s Facebook or Google identity is
necessary for living a normal life in society,
then being deprived of it might be equivalent
to depriving somebody of a driver’s licence or
Social Network Users’ Bill of Rights
“We the users expect social network sites to provide us the following rights in their
Terms of Service, Privacy Policies, and implementations of their system:
1. Honesty: Honor your privacy policy and terms of service
2. Clarity: Make sure that policies, terms of service, and settings are easy to find
and understand
3. Freedom of speech: Do not delete or modify my data without a clear policy and
justification
4. Empowerment: Support assistive technologies and universal accessibility
5. Self-protection: Support privacy-enhancing technologies
6. Data minimization: Minimize the information I am required to provide and
share with others
7. Control: Let me control my data, and don’t facilitate sharing it unless I agree
first
8. Predictability: Obtain my prior consent before significantly changing who can see
my data.
9. Data portability: Make it easy for me to obtain a copy of my data
10. Protection: Treat my data as securely as your own confidential data unless I
choose to share it, and notify me if it is compromised
11. Right to know: Show me how you are using my data and allow me to see who
and what has access to it.
12. Right to self-define: Let me create more than one identity and use pseudonyms.
Do not link them without my permission.
17
bank accounts – acts that properly are surrounded by legal rules and methods of appeal.
Another situation in which users are vulnerable is when the use of a service creates a strong “lock-in”. Identity
providers are often in a situation to create considerable lock-in for their users. Once an individual has invested
years in developing an identity, adding content to their online profile and building a deep network of friends
within the system, it becomes costly for that individual to quit or move to a competitor. Due to natural
monopolies for social spaces there might not even be a competitor16. Governments sometimes seek to protect
their citizens against the dangers of such lock-in and the opportunities for exploitation that it creates. Thus, for
example, there are legal protections for tenants, who could face a degree of lock-in once they have moved their
belongings and settled into a rented property. There is also legislation, aimed at protecting consumers and
stimulating competition, that forces cell phone providers to cooperate with customers who wish to switch
provider, making it possible for the customer to keep their telephone number. With the growing importance of
online identity providers, demands may arise for similar protections for this new sphere of human activity. (An
economic analysis or exploration of possible policy options is, however, beyond the scope of this paper.)
The globalized identity
The potential for alienation from the consequences of our actions is not an issue that pertains specifically to
robotics or mediated interaction, but is rather a ubiquitous feature of modern life. To some extent, it may be
counteracted by the proliferation of reporting and media, including live streaming video from all parts of the
world and social media allowing international social relations. Modern man is tied into a network that spans the
world. Our actions as voters, taxpayers, and consumers have consequences that reverberate across the globe;
and at the same time, we are to an unprecedented degree able to become aware of this fact. The increasingly
common perception of people that they are citizens not just of a city and a nation, but also of an international
community is an important change in the self-perception aspect of identity. It is possible that developments in
media and social networks, as well as ideological movements, will continue to give increasing salience to this
dimension of our existence.
Online identities are often already border-crossing: the identity providers are often foreign companies or
organisations, and the actual data storage and processing increasingly occurs in widely dispersed cloud
computing. This trend will continue and intensify as the world grows more globalized, barriers of language are
weakened by improved automatic translation, and people find new kinds of long-range social relations to fulfil
their needs and desires. However, this poses challenges for the current legal system since it tends to assume that
people have their activities and identities focused in their country of residence. When these become
internationalised many aspects of everyday life fall under foreign or international law, potentially causing hard
problems. Besides having private citizens possibly unknowingly performing legally relevant acts in foreign
jurisdictions (from trade to sedition), a wide variety of identity providers and relying parties will be handling
elements of private identity that in the UK and EU enjoy special legal protections (such as medical information:
both Google and Microsoft are running electronic health record services), quite possibly in jurisdictions where
they lack protection. Recent instances of libel-tourism in the UK where foreign plaintiffs file libel suits in the
UK against people abroad that have only tenuous links to the UK (such as an online publication accessible to the
UK public) illustrate how identities and activities suddenly have become global.
These issues are by no means new, but the rapid increase in globalized identities means they will likely become a
key point in developing future international agreements. It might simply be that a truly transnational internet and
national laws are fundamentally irreconcilable: although some conflicts can be handled (e.g. through country-of-
16 Most social spaces – games, dating sites, networking services - become more appealing the more members can be reached
through them, giving the larger spaces much advantage over smaller ones. The exception is spaces based on exclusivity: here
the appeal lies in being a member of a small club it is hard to get into.
18
destination approaches) the eventual choice will be between globalizing law or breaking up the globalization (and
hence much of the utility) of the Internet17.
Would globalized identities shaped by self-selected peer groups mean weaker loyalties to one’s country? At
present there is no clear evidence for or against this possibility. Modern communications media allow both longdistance
nationalism and transnational lifestyles. Historically nationalism appears to have become a weaker
motivator in Western Europe for most people: while people appear to enjoy identifying with groups more than
ever, this is more about social affiliation and signalling than traditional loyalty to a social group and its
institutions. Everyday life and security is no longer dependent on a strong personal stake in the group, but rather
on impersonal formal rules that rarely impinge on life.
The challenge for the national state might be that it has
to compete with numerous other affiliations on the
emotional and social side, and is reduced to a guarantor
of legal rights and provider of services on the practical
side.
It should be noted that a trend towards weaker
nationalism on average does not mean it declines
evenly. Some groups may become more nationalistic or
loyal to various institutions. The real policy challenge
may be to handle a mixture of nationalisms and
loyalisms rather than a homogeneous population.
The virtual worlds
Virtual worlds have been predicted for a long time, but
unlike the early 90’s visions of full immersion virtual
reality the virtual worlds that are currently expanding in
importance are based on fairly traditional ICT
hardware. Social media, online gaming,
teleconferencing and other software fields are de facto
creating virtual worlds right now, and they are
increasingly playing a key role in peoples’ lives. They
are not so much virtual spaces in the sense of
collections of ‘places’ where one might geometrically
move around, but rather social spaces: shared
environments of interaction. These can be as simple as
the text messages used on online bulletin boards where
people maintain local identities as discussion
participants, over the fanciful characters inhabiting
online games, to business avatars used for
teleconferencing virtual environments (such as Second
Life and Teleplace) or video meetings sustained with teleconferencing (or more cheaply, Skype). In each such
space participants have at least one digital identity, more or less strongly linked to their core identity.
These virtual identities, despite possibly being merely a textual description, can still hold a powerful resonance
with their users. Julian Dibbel’s by now classic essay “A Rape in Cyberspace”18 describes how users of an early
17 Uta Kohl, Jurisdiction and the Internet: , Regulatory Competence over Online Activity, Cambridge University press, 2007
Who sets the Facebook rules?
As a global social space, Facebook is faced with many
conflicting demands. The “Saudis in the US” group, a group
for Saudi Arabian students in the US was split by gender
into a male and a female group after some female members
wanted the extra privacy. However, not all members agreed
on the split and some felt it infringed on their freedom of
expression
http://arabnews.com/saudiarabia/article256543.ece?com
ments=all.
The Facebook decency code bans exposed breasts, which have
led to removing photos of breastfeeding and cancelling the
accounts of mothers posting pictures. This is somewhat ironic
given the less than zealous removal of a paid advertisement
with a topless model.
http://www.dailymail.co.uk/sciencetech/article-
1102950/Mothers-protest-Facebook-ban-offensivebreastfeeding-photos.html
Overall, one of the great challenges to a service such as
Facebook is that it will serve material to people from cultures
that will have significantly different codes of decency, and is
19
text-based virtual environment (a “MUD”) were emotionally violated when another user forced their virtual
characters into humiliating and explicit situations. “…what happens inside a MUD-made world is neither exactly
real nor exactly make-believe, but nonetheless profoundly, compellingly, and emotionally true.” Maltreatment of
virtual characters can matter in the real world, since there is an emotional link to the “real” person.
Virtual worlds have their own rules set by the software and moderators, but also partially emergent from the
social interactions of participants. Rules about identity and presentation are often important: what kind of names
may be used, how easy it is to get the real identity of users, what kind of avatars that can be used and the proper
procedure for dealing with breaches of the rules (Dibbel’s essay also describes the aftermath of the incident,
where the virtual community debates the proper punishment for the perpetrator and the “constitutional”
implications for the virtual environment). Often a good relationship between moderators and users is essential
for a successful system, especially as the users need to view the actions of the moderators and owners as
legitimate. These relationships are local to the particular social space, yet the participants might be widely
dispersed and subjected to numerous conflicting legal, economic and cultural demands.
Online economies are starting to have real-world effects; just as new forms of communication and personal
identity-creation are emerging. Online gaming is becoming a massive industry. People are paying real money for
virtual objects or characters. It has been estimated that virtual goods – useful only within particular digital realms
– were exchanged to the value of over 2 billion dollars in 200919. Due to the demand a secondary market of
“gold farming” has developed: workers in developing countries playing games in order to produce virtual goods
that are then sold for real world money20. People are getting into legal wrangling over the goods – virtual thefts,
property rights, inheritance, currencies and taxation are becoming pertinent issues21. Even outside games we
have a sizeable number of virtual possessions – family photos, emails, texts, blogs, websites, etc.– that have
important emotional value to us and form part of our online and real identities. Many are distributed in social
spaces or the cloud worldwide, vulnerable to what the space providers do to them. Digital property rights will
likely become a matter of popular concern simply because their aggregate value is rapidly increasing.
The augmented world
Current trends in ICT is leading to a world of wireless, global 24/7 broadband connectivity accessible through
portable devices and smart environments where many everyday objects have been supplied with networked
abilities (”the internet of things”).
In the words of author Charles Stross, the generation growing up right now will “never be alone, never lost,
never forget”22--- the connectivity holds together social networks regardless of location, users are always findable
18 Julian Dibbel, A rape in cyberspace, chapter 1., My tiny life: Crime and Passion in a Virtual World, Henry Holt Inc. 1998
http://www.juliandibbell.com/texts/bungle_print.html
19 Tuukka Lehtiniemi, How Big Is the RMT Market Anyway? Virtual Economy Research Network, http://virtualeconomy.org/blog/how_big_is_the_rmt_market_anyw
20 Richard Heeks, Current Analysis and Future Research Agenda on “Gold Farming”: Real- World Production in
Developing Countries for the Virtual Economies of Online Games, in Development Informatics working paper, no. 32
Institute for Development Policy and Management, University of Manchester 2008,
21 See Castronova, Edward (2005). Synthetic Worlds: The Business and Culture of Online Games. Chicago: The University of Chicago Press, as
well as http://blog.practicalethics.ox.ac.uk/2008/10/protectionist-deities-vs-the-economy-of-fun-ownership-of-virtual-possessions/.
22 Charles Stross, LOGIN: 2009 Seattle keynote speech. http://www.antipope.org/charlie/blog-static/2009/05/login-2009-keynotegaming-in-t.html
20
and know where they are thanks to location services such as built-in GPS, and the devices are increasingly
logging and documenting everything that happens.
This later property is powered by three strong trends: our devices are increasingly recording our lives without our
deliberate decision, thanks to the ubiquity of cheap digital sensing and recording mechanisms from digital
cameras and email over the accelerometers and other sensors in smartphones to the automatic logging of most
computer systems. Cheap storage makes it easier to record everything that could ever be of interest than to try to
determine what to store. Retrieval is facilitated by improved technologies for search, analysis, presentation, and
sharing of the data23. The resulting extended memory is likely to have profound effects on personal identity:
parts of identity will reside in a persistent “exoself” of information and software.
Some people have taken up lifelogging, the use of wearable computers to capture continuous data from their
lives – video feeds, location, physiological information, etc. Some lifeloggers also store and share their life events
on public forums, “life caching”24, while others are living the “data-driven life”25 where the ability to measure
and monitor performance allows them to become aware of or to change their habits. When the idea originated
in the 1990’s it required cumbersome and expensive special equipment: today many of these functions can be
done by amateurs using slightly modified smartphones; and by 2025, it will likely be an application anybody who
chooses can activate. Lifelogging offers many benefits: continuous time monitoring of health, a digital memory
that complements the natural memory (being photographic, searchable, and shareable), self-monitoring, and
possibly producing a cognitive inheritance.
23 For a popular overview, see Gordon Bell and Jim Gemmell, Total recall: How the e-memory revolution will change everything, Dutton, 2009
24 http://trendwatching.com/trends/LIFE_CACHING.htm
25 Gary Wolf, The Data-Driven Life, New York Times, April 28 2010, https://www.nytimes.com/2010/05/02/magazine/02selfmeasurement-t.html?_r=1
Living the logged life
The Microsoft research project MyLifeBits is an experiment
in lifetime storage, where Gordon Bell has scanned the
articles, books, cards, CDs, letters, memos, photos,
presentations, home movies, videotaped lectures and voice
recordings and stored them digitally. His ongoing
information flows (phone calls, instant messaging, television
and radio) are being added to this database. The project
aims at develop software methods of managing this kind of
lifetime data, making it easy to capture, annotate, and
integrate it with other software.
Gordon Bell, Jim Gemmell (2009). Total Recall: How the
E-Memory Revolution Will Change Everything. Penguin
21
At present researchers are beginning to study the
“exposome” - the air pollutants, physical activity
and diet of people - using life recording devices26.
Since self-reporting is notoriously unreliable, direct
recording might open new possibilities for
epidemiology and environmental medicine as well
as self-experimentation. A perhaps even more
dramatic example is Professor Deb Roy at the MIT
Media Lab, who used cameras and microphones in
every room in his home to document when and
where every word was said in the vicinity of his
infant son. Using this massive corpus of data he is
able to visualize and annotate the first two years of
the child’s life, demonstrating intriguing aspects of
language development as well as producing a total
home video27.
Life recording will also likely to synergize with
social networking to seamless “life sharing”. The
limits of privacy are likely to be pushed as a
generation grows up with this technology. Even if
the average person in 2025 is not using full
lifelogging many of the functions being explored
today will likely exist in the background of their
technology.
While lifelogging may promise many desirable
forms of personal enhancement and selfknowledge,
it also has serious privacy implications.
It makes personal lives traceable and might
challenge many rules on control over personal and
public information. A lifelogger walking down a
street is making copies of copyrighted information,
silently documenting third parties, and possibly
acting as a sensor in a distributed network of whose existence he might not even be aware. Police and other
authorities might have reason to demand access to part or the whole of life recordings, which might not only
raise privacy concerns but actually correspond in the user’s experience to an invasion of mental privacy.
Employer-mandated (or encouraged) lifelogging during work hours might be required in order to avoid liability.
Issues of ownership, spreading and use of lifelog data will expand from the current problems with public
photography, cellphone tracking, personal data storage and smart meters.
26 Brendan Borrell, Epidemiology: Every bite you take, Nature 470, 320-322 (2011)
http://www.nature.com/news/2011/110216/full/470320a.html
27 http://web.media.mit.edu/~dkroy/
Please turn off your exoself during start or
landing
February 18 2002 Professor Steve Mann at University of
Toronto ran afoul of the tightening of airport security in the
wake of 911. Professor Mann is one of the pioneers of
wearable computing and has for more than 20 years lived
with an extensive rig of sensors, computers, displays, and
wiring he uses to document his life. The security guards at St.
John's International Airport in Newfoundland required a
strip-search that led to electrodes being torn from his skin
and the disassembly of many components of his rig, leading to
the disruption of his “exoself”. This in turn led to
psychological problems such as concentration difficulties and
behaviour changes, according to Professor Mann .
While in this case the conflict was triggered by the
unfamiliarity of his equipment (see also (Borrell 2011) for
police concerns over visible devices for measuring air pollution
in subways) the increasing use and reliance on cameras,
smartphones, RFID-, wifi- and Bluetooth-enabled
equipment is creating struggles over who has authority to
determine the standards of what augmenting technologies are
allowed in a space.
Since many of these technologies are going to be increasingly
important for everyday life and personal identity, restrictions
are going to be experienced as more cumbersome and
i f i i p l lib t th i th p t
Travels of one
Even peopl
dependent t
or the intru
currently are
stretch to gu
extended sel
Identity te
Identity tech
essential par
belonging to
power electr
course in m
parts of the
for example
be automati
data collect
persistent vi
28 US patent ap
29 Li Yang, Am
Technology, IE
30 Bruce Sterl
e of the author
le who are
they have bec
sion of an o
e at backing
uess that the
lves. The dem
echnology
hnologies –
rt of the pos
o a category b
ronics will a
manufacturing
circuits with
e allow object
ically and saf
ting, self-doc
irtual objects
pplication 20080
min Rida, Rushi
EEE transactions
ling (2005). Sh
rs autumn 2010
not consciou
come upon e
fficial reques
up or securi
ere will be nu
mand for bei
technologies
stindustrial in
but also as in
llow very sm
g parts – tagg
inkjet printe
ts to be self-d
fely recycled.
cumenting, e
that can man
0068169, http:/
Vyas, and Mano
s on microwave theo
haping Things. C
0 to spring 2011
usly lifeloggi
xternal system
st (say, for ev
ing their curr
umerous priv
ing able to in
for automat
nfrastructure.
ndividual obj
mall and chea
ging individua
er technology
documenting
In the long
easily manuf
nifest when n
/www.freepaten
os M. Tentzeris,
ory and techniques,
ambridge, Ma
1, automatically
ing might b
ms for their i
verything they
rent digital p
vate data loss
sure digital p
tic detection
. RFID-tags
ects, possibly
ap identificat
al pieces of p
y
29. Besides a
g, stating their
run many ob
factured and
needed30.
ntsonline.com/y
, RFID Tag and
, vol. 55, no. 12,
assachusetts: M
y logged witho
e de facto lif
identities and
experienced
possessions d
ses in the fut
possessions w
and logging
allow marke
y without dir
tion tags that
paper has bee
allowing track
r physical and
bjects might
recycled “s
y2008/0068169.
d RF Structures o
,p. 2894-2901 D
MIT Press.
out his knowled
felogging. Th
d everyday liv
last month).
despite their g
ture as peopl
will likely incre
of who and
d objects to
rect touch. N
t will be inco
en demonstra
king and iden
d chemical pr
become enti
spimes” – le
.html
on a Paper Subs
December 2007
dge by his sma
hey might d
ves when the
. Given how
growing valu
le lose contr
ease.
d what is wh
be identified
Nanotechnolo
orporated as
ated28
, as we
ntifying objec
roperties so
irely trackabl
ess physical
strate Using Ink
22
artphone.
discover how
re is a failure
w bad people
ue, it is not a
rol over their
here – are an
d not just as
ogy and lows
a matter of
ell as printing
cts this might
that they can
le, constantly
things than
kjet-Printing
Εγγραφή σε:
Σχόλια ανάρτησης (Atom)
Δεν υπάρχουν σχόλια:
Δημοσίευση σχολίου