jason: jason (Default)
[personal profile] jason
CFP: Int'l Workshop on Inverse Surveillance: Camphones, 'glogs, and eyetaps

Call for Participation:
----------------------

International Workshop on Inverse Surveillance:
Cameraphones, Cyborglogs, and Computational seeing aids;
exploring and defining a research agenda

2004 April 12th, 12:00noon to 3pm, EST, Toronto.

TOPICS:
Camera phones and pocket organizers with sensors;
Wearable camera phones and personal imaging systems;
Electric eyeglasses and other computational seeing and memory aids;
Recording experiences in which you are a participant;
Portable personal imaging and multimedia;
Wearable technologies and systems;
Ethical, legal, and policy issues;
Privacy and related technosocial issues;
Democracy and emergent democracy (protesters organizing with SMS camphones);
Safety and security;
Technologies of lifelong video capture;
Personal safety devices and wearable "black box" recorders;
Research issues in "people looking at people";
Person-to-person sharing of personal experiences;
Interoperability and open standards;
Algebraic Projective Geometry from a first-person perspective;
Object Detection and Recognition from a first-person perspective;
Computer Vision, egonomotion and way-finding technologies;
Lifelong Image Capture: data organization; new cinematographic genres;
New Devices and Technologies for ultra miniature portable cameras;
Social Issues: fashion, design, acceptability and human factors;
Electronic News-gathering and Journalism.
Psychogeography, location-based wearable computing;
Augmented/Mediated/Diminished Reality.


IWIS will be a small intimate discussion group, limited to 25 participants.

Email your name, the name of your organization, and what you might
add to the meeting, along with a one page extended abstract, outlining
your position on, and proposed contribution to the theme of inverse
surveillance. Submissions should be sent by email to hilab at eyetap.org.
Alternatively, authors may email up to four pages, in IEEE two column
camera-ready format that address the theme of inverse surveillance.
Prospective participants wishing to submit a full paper may also contact
the workshop facilitators prior to submission.

All participants (accepted papers or extended abstracts) will have the
opportunity to contribute to the published proceedings.

PROGRAM COMMITTEE:
Dr. Jim Gemmell, MyLifeBits (lifetime data storage) project with Gordon Bell;
author of various publications on lifelong personal experience capture.
Anastasios Venetsanopoulos, Dean, Faculty of Applied Science and
Engineering, University of Toronto; author on hundreds of publications
on image processing.
John M. Kennedy, Chair, Department of Life Sciences, UTSC;
author of Drawing and the Blind: Pictures to Touch.
Dr. Stefanos Pantagis, Physician, Hackensack University Medical Center;
Geriatrician, doing research on wearable computers to assist the blind,
and clinical work on brainwave EyeTap interfaces for Parkison's patients.
Steve Mann, author of CYBORG: Digital Destiny and Human Possibility
in the Age of the Wearable Computer; 30 years experience inventing,
designing, building, and wearing devices and systems for personal imaging.
Douglas Schuler, former chair, Computing Professionals for Social
Responsibility (CPSR); founding member SCN.
Stephanie Perrin, Former Chief Privacy Officer of Zero-Knowledge Systems;
Former Director of Privacy Policy for Industry Canada's Electronic
Commerce Task Force; responsible for developing domestic privacy
policies, new technologies, legislation, standards and public education;
recipient of the Electronic Frontier Foundation Pioneer Award.
Dr. Jason Nolan, Senior Fellow, Mcluhan Program in Culture and Technology

ORGANIZERS: S. Mann (mann at wearcam.org); S. Martin; and J. Nolan
(smartin at ecf.toronto.edu). IWIS 2004 arises from planning over,
the past 2 years, at Deconference 2002/2003.

Here's a summary of surveillance versus inverse surveillance, to lay the
groundwork for the technologies and issues we hope to discuss:

Surveillance Sousveillance
------------ -------------

God's eye view from above. Human's eye view.
(Authority watching from on-high.) ("Down-to-earth.")

Cameras usually mounted on high Cameras down-to-earth (at
poles, up on ceiling, etc.. (ground level), e.g. at human
eye-level.

Sur-veiller is French for "to Sous-veiller is French for "to
watch from above". watch from below".

Architecture-centered Human-centered
(e.g. cameras usually mounted on (e.g. cameras carried or worn
or in structures). by, or on, people).

Recordings made by authorities, Recordings of an activity
remote security staff, etc.. made by a participant in the
activity.

Note that in most states it's In most states it's legal to
illegal to record a phone record a phone conversation of
conversation of which you are which you are a party. Perhaps
not a party. Perhaps the same the same would apply to an
would apply to an audiovisual audiovisual recording of your own
recording of somebody else's conversations, i.e. conversations
conversation. in which you are a party.

Recordings are usually kept in Recordings are often made public
secret. e.g., on the World Wide Web.

Process usually shrouded in Process, technology, etc., are
secrecy. usually public, open source, etc..

Panoptic origins, as described Community-based origins, e.g.
by Foucault, originally in the a personal electronic diary,
context of a prison in which made public on the World Wide Web.
prisoners were isolated from Sousveillance tends to bring
each other but visible at all together individuals, e.g. it
times by guards. Surveillance tends to make a large city
tends to isolate individuals function more like a small town,
from one another while setting with the pitfalls of gossip, but
forth a one-way visibility to also the benefits of a sense of
authority figures. community participation.

Privacy violation may go Privacy violation is usually
un-noticed, or un-checked. immediately evident. Tends
Tends to not be self-correcting. to be self-correcting.

It's hard to have a heart-to-heart At least there's a chance you can
conversation with a lamp post, talk to the person behind the
on top of which is mounted a sousveillance camera.
surveillance camera.

When combined with computers, we When combined with computers, we
get ubiquitous computing get wearable computing.
("ubiqcomp") or pervasive ("wearcomp"). Wearcomp usually
computing ("pervcomp"). doesn't require the cooperation
Ubiq./perv. comp. tend to rely on of any infrastructure in the
cooperation of the infrastructure environments around us.
in the environments around us.

With surveillant-computing, the With sousveillant-computing, it
locus of control tends to be with is possible for the locus of
the authorities. control to be more distributed.

See also, http://en.wikipedia.org/wiki/Sousveillance

October 2013

S M T W T F S
  12345
67891011 12
13141516171819
20212223242526
2728293031  

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Jan. 19th, 2026 07:57 am
Powered by Dreamwidth Studios