top of page

IMP

Roger Yu

Images, Media, and Privacy Scholarly Sources

Professor Gill-Mayberry

ENG 105 8am-9:50am

“The best writing is re-writing” 1st Draft, 0 Tutorial  

Images, Media, and Privacy Journals

1.

http://web.a.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=1&sid=338503cb-f134-489e-b737-151e4fcf89ea%40sessionmgr4005&hid=4214

Cordaiy, Hunter. "The Evaporating Image." Metro Magazine: Media & Education Magazine, 160 (2009): 121-123.

        The Evaporating Image by Hunter Cordaiy speaks his opinion on how the culture of our society has changed the purposes and functions of the image itself back in the days. In his article, Hunter stated “ If serious literature and fine art have become essentially marginal spectacles, then only the image remains as the keeper of ideas and values, and the time of the image is an unavoidable destiny.” meaning that if anything has changed, the value of an image and its effect on the media has stayed generally the same. However, he also claims that the use if images from the media has invaded privacy of individuals.

 

2.      http://download.springer.com/static/pdf/335/art%253A10.1007%252Fs11528-011-0480-1.pdf?originUrl=http%3A%2F%2Flink.springer.com%2Farticle%2F10.1007%2Fs11528-011-0480-1&token2=exp=1449606143~acl=%2Fstatic%2Fpdf%2F335%2Fart%25253A10.1007%25252Fs11528-011-0480-1.pdf%3ForiginUrl%3Dhttp%253A%252F%252Flink.springer.com%252Farticle%252F10.1007%252Fs11528-011-0480-1*~hmac=2c423ca47aa18d565d4c04faf05833e758cc0b191b237b5e0c88a24d107e8ba1

Callary, Jean. "School Web Sites Require Privacy Rule Upgrade." TechTrends, 55.2 (2011): 28-30.

        Jean Callary in her article School Web Sites Require Privacy Rule Upgrade speaks about the privacy of these young children being exposed in online project where the teachers demand personal information to be provided where any internet surfers can view. She stated “copyright issues have been overshadowed by privacy invasion. School site pictures are being copied for social network and blogging sites.” While some parents use the internet to show off their child’s accomplishments, they have ignored the constant threat of stalkers that roam on the internet, allowing easy access to the child’s whereabouts and personal information.

 

3.

http://download.springer.com/static/pdf/184/art%253A10.1007%252Fs11528-011-0550-4.pdf?originUrl=http%3A%2F%2Flink.springer.com%2Farticle%2F10.1007%2Fs11528-011-0550-4&token2=exp=1449606558~acl=%2Fstatic%2Fpdf%2F184%2Fart%25253A10.1007%25252Fs11528-011-0550-4.pdf%3ForiginUrl%3Dhttp%253A%252F%252Flink.springer.com%252Farticle%252F10.1007%252Fs11528-011-0550-4*~hmac=ed4318e125ee93e611834e56a23346c575a648be9ae969966986b12cd7fdd5c8

Thomas, Kevin, and Christy McGee. "The Only Thing We Have to Fear Is… 120 Characters." TechTrends, 56.1 (2012): 19-33.

The article The Only Thing We Have to Fear is… 120 Characters by Kevin Thomas, Kevin questions the use of cell phone in a classroom setting. He does not see cell phone as a complete negative to the course of the school campus, stating “today’s cell phones are inexpensive, mobile computing devices with a number of applications (assessments, digital images, podcasting, and internet access) that could be beneficial in the classroom. The bonus to these applications found on cell phones is that the majority of teenagers already own one and are efficient in their use.” meaning that there could be a beneficial use of cell phone in classroom settings that will benefit not only the teachers, but also the students.

 

4.

http://delivery.acm.org/10.1145/780000/777319/p93-hart.pdf?ip=134.71.75.111&id=777319&acc=ACTIVE%20SERVICE&key=F26C2ADAC1542D74%2E28950F0B8D9DE0BC%2E4D4702B0C3E38B35%2E4D4702B0C3E38B35&CFID=566719706&CFTOKEN=60659040&__acm__=1449605973_84a1b169acb9481e14450a56e8a016a9

Hart, Peter, and Ziming Liu. "Trust in the Preservation of Digital Information." Communications of the ACM, 46.6 (2003): 93-97

        In Peter Hart and Ziming Liu’s Trust in the Preservation of Digital Information, both stated the idea of preserving information digitally over the internet rather than having them in hard-copies. Both of them argued for the idea of preserving information digitally, stating “Inaccessibility. Lack of accessibility is the most commonly cited reason for the lack of trust in preserving digital documents. Paper has traditionally been the dominant medium for document recording, storage, distribution, and utilization.” meaning that although paper has been used to store majority of the information in the past, it is time for a change as these paper stored information are sometimes inaccessible.

 

5.

http://delivery.acm.org/10.1145/2190000/2184336/p52-crandall.pdf?ip=134.71.75.111&id=2184336&acc=PUBLIC&key=F26C2ADAC1542D74%2E28950F0B8D9DE0BC%2E4D4702B0C3E38B35%2E4D4702B0C3E38B35&CFID=566719706&CFTOKEN=60659040&__acm__=1449606267_2b537650f29b7f3858498257ba189db4

Crandall, David, and Noah Snavely. "Modeling People and Places with Internet Photo Collections."Communications of the ACM, 55.6 (2012): 52-60.

        In David Crandall and Noah Snavely’s Modeling People and Places with Internet Photo Collections, both of them argued for the idea of understanding the world through the technology and methodology of photography and how this perspective had drastically changed their view on the society. In the article, they stated “Internet photo collections pose new challenges to computer vision because of their extreme scale and unstructured nature—they are taken by many different people with many different cameras, from largely unknown viewpoints.” This means although the perspective and viewpoint of some of these photographs are similar, not two will ever has the same story behind it. Each person taking the picture has his or her own ideas, feelings, and mindset when taking the picture.

 

6.

http://delivery.acm.org/10.1145/370000/365184/p33-badler.pdf?ip=134.71.75.111&id=365184&acc=ACTIVE%20SERVICE&key=F26C2ADAC1542D74%2E28950F0B8D9DE0BC%2E4D4702B0C3E38B35%2E4D4702B0C3E38B35&CFID=566719706&CFTOKEN=60659040&__acm__=1449606594_c3e904e6b967c484b4e6a598959228ba

Badler, Norman. "Virtual Beings." Communications of the ACM, 44.3 (2001): 33-35.

        In Norman Badler’s Virtual Beings, Norman argued for the idea of the methodology of photography to replace essentially everything in our everyday life including painting and writings as the photography prints get cheaper and cheaper. Norman emphasized his point by stating “Within 100 years, digital media will replace traditional media, leading to simple, convenient, user-oriented modification and creation of content. Digital cameras, high-resolution TV, video-editing software, MPEG-4 (and beyond), human figure modeling, and animation standards will promote efficient model distribution with client-side rendering, image generation, and compositing”

 

7.

http://delivery.acm.org/10.1145/1410000/1409376/p50-berman.pdf?ip=134.71.75.111&id=1409376&acc=ACTIVE%20SERVICE&key=F26C2ADAC1542D74%2E28950F0B8D9DE0BC%2E4D4702B0C3E38B35%2E4D4702B0C3E38B35&CFID=566719706&CFTOKEN=60659040&__acm__=1449606836_bf54193193eda86cf4826eba80999ef9

Berman, Francine. "Got Data?: A Guide to Data Preservation in the Information Age." Communications of the ACM, 51.12 (2008): 50-56.

        In Francine Berman’s Got Data?: A Guide to Data Preservation in the Information Age, Francine argued the idea of using online internet data to store information rather than having a hard copy for the society to carry around. He stated the fact that using online internet storage will ensure us to access out information and data whenever we need it by stating “It is difficult to imagine the information age without unlimited access to and availability of the digital data that is its foundation.” Francine imagine a world where digital data is to be stored completely online using the internet since it allows easier accessibility and more reliability whenever we need it.

 

8.

http://delivery.acm.org/10.1145/300000/295887/p103-hayes-roth.pdf?ip=134.71.75.111&id=295887&acc=ACTIVE%20SERVICE&key=F26C2ADAC1542D74%2E28950F0B8D9DE0BC%2E4D4702B0C3E38B35%2E4D4702B0C3E38B35&CFID=566719706&CFTOKEN=60659040&__acm__=1449607092_4c8dd392ea63e99e08e433d87b734b63

Hayes-Roth, Barbara, Vaughan Johnson, Robert van Gent, and Keith Wescourt. "Staffing the Web with Interactive Characters." Communications of the ACM, 42.3 (1999): 103-105.

        In Barbara Hayes-Roth, Vaughan Johnson, Robert van Gent, and Keith Wescourt’s Staffing the Web with Interactive Characters, they argued the idea of interactive characters becoming a part in our everyday life. They presented the idea of having interactive characters to “make it easy for people to interact with them through natural forms of conversation and gesture. They will add interest and warmth to the online experience through their distinctive personas, projecting images and styles designed to appeal specifically to the customers they serve.” The idea of total recall of real life human is on the verge when the interactive characters eventually replace them.

 

9.

http://delivery.acm.org/10.1145/2210000/2209263/p38-spiekermann.pdf?ip=134.71.75.111&id=2209263&acc=ACTIVE%20SERVICE&key=F26C2ADAC1542D74%2E28950F0B8D9DE0BC%2E4D4702B0C3E38B35%2E4D4702B0C3E38B35&CFID=566719706&CFTOKEN=60659040&__acm__=1449607576_49521a90a445ef0d599a31e0528c11fe

Spiekermann, Sarah. "The Challenges of Privacy by Design." Communications of the ACM, 55.7 (2012): 38-40.

        In Sarah Spiekermann’s The Challenges of Privacy by Design, Sarah discusses the idea of integrating privacy into the system itself and the inevitable struggle we will have to endure for this to happen. She stated in the article “privacy regulation is not easy. The Internet’s current economics as well as national security management benefit from the collection and use of rich user profiles. Technology constantly changes. And data is like water: it flows and ripples in ways that are difficult to predict.” Integrating privacy into the system will result in a positive outcome; however, the road to getting this happen will take time.

 

10.

http://delivery.acm.org/10.1145/240000/233978/p11-greenberg.pdf?ip=134.71.75.111&id=233978&acc=ACTIVE%20SERVICE&key=F26C2ADAC1542D74%2E28950F0B8D9DE0BC%2E4D4702B0C3E38B35%2E4D4702B0C3E38B35&CFID=566719706&CFTOKEN=60659040&__acm__=1449607470_3090315c9bb5f7a1ea42939a60d56360

Greenberg, L, and S Goodman. "Is Big Brother Hanging by His Bootstraps?" Communications of the ACM, 39.7 (1996): 11-16.

        In Greenberg, L, and S Goodman’s article Is Big Brother Hanging by His Bootstraps? Both Greenberg and Goodman argued for the idea of the government's role in surveillance over the cyber web. They both think the idea of government surveillance over the internet to be a huge possibility, stating “commentators on technology and society argued that IT would enable the development of omniscient, omnipotent central authorities that would control every aspect of civil life.” The possible outcome of the government being allowed to watch their citizens every move on the internet is not far away. When this surveillance is employed, it will only take minutes for the internet to vanish.

 

11.

http://search.proquest.com/docview/1039291547/fulltextPDF?accountid=10357

Moore, Shelley C. "Digital Footprints on the Internet."International Journal of Childbirth Education, 27.3 (2012): 86.

        In Shelley C. Moore’s Digital Footprints on the Internet., Shelley argued for the case of our everyday privacy that we still obtain in this given surveillance society where our every move on or off the internet is being controlled. Shelley stated in her article “The abundance of computers and smartphones, the proliferation of communication, and the explosion of digital information has precipitated people’s disclosure of very personal information online, sometimes unwittingly.” Sometimes these information will get leaked onto the cyber web when the person himself or herself is unaware of it happening, allow easy tracking of a person, making stalking and crimes that much easier for the evil-doers.

 

12.

http://delivery.acm.org/10.1145/650000/641230/p46-cohen.pdf?ip=134.71.75.111&id=641230&acc=ACTIVE%20SERVICE&key=F26C2ADAC1542D74%2E28950F0B8D9DE0BC%2E4D4702B0C3E38B35%2E4D4702B0C3E38B35&CFID=566719706&CFTOKEN=60659040&__acm__=1449608201_b52f74445c4934d3b0fe1081f52988a0

Cohen, Julie. "DRM and Privacy." Communications of the ACM, 46.4 (2003): 46-49.

        In Julie Cohen’s DRM and Privacy, Julie argues the case of the DRM infiltrating and accessing the personal information that is allowed to take control over. She argued for the personal privacy being ignored and the use of our privacy into the internet is being done without our permission stating “DRM initiatives may be viewed as a series of concentric levels of control, each penetrating more deeply into the user’s home electronic and computing environment.”

bottom of page