The Invisible Man in the Digital Age: From Anonymity to Invisibility, A right to remain Unknown

Activity: Participating in or organising an academic or articstic eventConferencesEducation

Paula Bialski - Speaker

    Mysterious Beings: An ethnography of invisibility and secrecy in software development

    The CESICE and the MFO (Maison Française d'Oxford) are pleased to inform you of their forthcoming conference "The Invisible Man in the Digital Age: From Anonymity to Invisibilty, A right to remain Unknown", to take place on 2nd February 2018 from 9:00am to 4pm at the MFO in Oxford

    Through the use of magical artifacts: from the Ring of Gyges mentioned by Plato in his Republic to H.G. Wells' Invisible Man; the desire to become invisible has been ever present in the minds of humankind. Whether it is used for good or evil, invisibility remains a myth that fails to pass the reality test. In the digital world, anonymity and real invisibility has had a lot of appeal since the very beginning of the Web 2.0. The development of enabling anonymous communication software (TOR), encryption (GnuPG) and artificial amnesia systems (Tails) partly enabled the dream of invisibility to come true. Yet, even though this new set of technologies is compellingly useful and beneficial for the protection against privacy invasion from States or malevolent private actors, risks of illegal uses of these new technologies may still exist. The Ring of Gyges epitomizes that invisibility can be a weapon whose ethical value is not inherently attached to it but depends on what it is being used for.
    Is the move into the Big Data Era urging us to acknowledge a fundamental right to anonymity or invisibility? Contrariwise, are we only called to regulate the hazardous uses that might be made of this technology, if ever it becomes technically feasible? Furthermore, should we advocate the complete reframing of the notion of identity in the digital world, while arguing, in the wake of Levinas, that any person should be entitled to a digital visage, both identified with but also distinct from the physical face?
    This scientific event aims at tackling these critical issues by showing both the continuity and persistence of the theme of invisibility. Importantly, speakers will endeavor to cast new light on the new identity-related problems posed by the emerging digital world. This investigation is particularly relevant today: even though digital liberties are gaining traction and progressively finding their way in the democratic pact, risks of serious misuses of new technologies are quite high and may have disastrous consequences. Above all, a good grasp of these issues is a prerequisite for the design of our future economy and its ability to generate wealth and employment whilst taking into account each individual’s identity and need to hide and to be left alone.
    02.02.2018
    The Invisible Man in the Digital Age: From Anonymity to Invisibility, A right to remain Unknown

    Event

    The Invisible Man in the Digital Age: From Anonymity to Invisibility, A right to remain Unknown

    02.02.18 → …

    Oxford, United Kingdom

    Event: Other

    Recently viewed

    Publications

    1. Learning from Erroneous Examples
    2. Reciprocal Relationships Between Dispositional Optimism and Work Experiences
    3. A Framework for Applying Natural Language Processing in Digital Health Interventions
    4. Enhancing EFL classroom instruction via the FeedBook: effects on language development and communicative language use.
    5. A tutorial introduction to adaptive fractal analysis
    6. An approach for dynamic triangulation using servomotors
    7. Control system strategy of a modular omnidirectional AGV
    8. A survey of empirical studies using transaction level data on exports and imports
    9. Modeling of Logistic Processes in Assembly Areas
    10. Learning to rule
    11. PID Controller Application in a Gimbal Construction for Camera Stabilization and Tracking
    12. Top-down contingent feature-specific orienting with and without awareness of the visual input
    13. What can conservation strategies learn from the ecosystem services approach?
    14. Global Finite-Time Stabilization of Planar Linear Systems With Actuator Saturation
    15. Mirrored piezo servo hydraulic actuators for use in camless combustion engines and its Control with mirrored inputs and MPC
    16. Simple saturated PID control for fast transient of motion systems
    17. A Lyapunov based PI controller with an anti-windup scheme for a purification process of potable water
    18. From "cracking the orthographic code" to "playing with language"
    19. Cost effectiveness of guided Internet-based interventions for depression in comparison with control conditions
    20. Topic selection and development in learner-native speaker voice-based telecollaborative discourse
    21. Explaining and controlling for the psychometric properties of computer-generated figural matrix items
    22. »HOW TO MAKE YOUR OWN SAMPLES«
    23. Measuring Learning Styles with Questionnaires Versus Direct Observation of Preferential Choice Behavior in Authentic Learning Situations
    24. Understanding storytelling in the context of information systems
    25. Educational reconstruction as model for the theory-based design of student-centered learning environments in electrical engineering courses
    26. A geometric approach for the design and control of an electromagnetic actuator to optimize its dynamic performance
    27. Foreign bias in institutional portfolio allocation
    28. Preventive Diagnostics for cardiovascular diseases based on probabilistic methods and description logic
    29. Neural correlates of the enactment effect in the brain
    30. A Multilevel Inverter Bridge Control Structure with Energy Storage Using Model Predictive Control for Flat Systems