The Invisible Man in the Digital Age: From Anonymity to Invisibility, A right to remain Unknown

Activity: Participating in or organising an academic or articstic eventConferencesEducation

Paula Bialski - Speaker

    Mysterious Beings: An ethnography of invisibility and secrecy in software development

    The CESICE and the MFO (Maison Française d'Oxford) are pleased to inform you of their forthcoming conference "The Invisible Man in the Digital Age: From Anonymity to Invisibilty, A right to remain Unknown", to take place on 2nd February 2018 from 9:00am to 4pm at the MFO in Oxford

    Through the use of magical artifacts: from the Ring of Gyges mentioned by Plato in his Republic to H.G. Wells' Invisible Man; the desire to become invisible has been ever present in the minds of humankind. Whether it is used for good or evil, invisibility remains a myth that fails to pass the reality test. In the digital world, anonymity and real invisibility has had a lot of appeal since the very beginning of the Web 2.0. The development of enabling anonymous communication software (TOR), encryption (GnuPG) and artificial amnesia systems (Tails) partly enabled the dream of invisibility to come true. Yet, even though this new set of technologies is compellingly useful and beneficial for the protection against privacy invasion from States or malevolent private actors, risks of illegal uses of these new technologies may still exist. The Ring of Gyges epitomizes that invisibility can be a weapon whose ethical value is not inherently attached to it but depends on what it is being used for.
    Is the move into the Big Data Era urging us to acknowledge a fundamental right to anonymity or invisibility? Contrariwise, are we only called to regulate the hazardous uses that might be made of this technology, if ever it becomes technically feasible? Furthermore, should we advocate the complete reframing of the notion of identity in the digital world, while arguing, in the wake of Levinas, that any person should be entitled to a digital visage, both identified with but also distinct from the physical face?
    This scientific event aims at tackling these critical issues by showing both the continuity and persistence of the theme of invisibility. Importantly, speakers will endeavor to cast new light on the new identity-related problems posed by the emerging digital world. This investigation is particularly relevant today: even though digital liberties are gaining traction and progressively finding their way in the democratic pact, risks of serious misuses of new technologies are quite high and may have disastrous consequences. Above all, a good grasp of these issues is a prerequisite for the design of our future economy and its ability to generate wealth and employment whilst taking into account each individual’s identity and need to hide and to be left alone.
    02.02.2018
    The Invisible Man in the Digital Age: From Anonymity to Invisibility, A right to remain Unknown

    Event

    The Invisible Man in the Digital Age: From Anonymity to Invisibility, A right to remain Unknown

    02.02.18 → …

    Oxford, United Kingdom

    Event: Other

    Recently viewed

    Publications

    1. Training effects of two different unstable shoe constructions on postural control in static and dynamic testing situations
    2. Intraspecific trait variation patterns along a precipitation gradient in Mongolian rangelands
    3. Artificial Intelligence in Foreign Language Learning and Teaching
    4. Unraveling Privacy Concerns in Complex Data Ecosystems with Architectural Thinking
    5. A survey of empirical studies using transaction level data on exports and imports
    6. Governing Objects from a Distance
    7. An Outcome-Oriented, Social-Ecological Framework for Assessing Protected Area Effectiveness
    8. Aspect-oriented software development
    9. Web-Based Drills in Maths Using a Computer Algebra System
    10. Effectiveness of a Web-Based Cognitive Behavioural Intervention for Subthreshold Depression
    11. Machine Learning and Data Mining for Sports Analytics
    12. E-stability and stability of adaptive learning in models with private information
    13. Action rate models for predicting actions in soccer
    14. Time Use Research and Time Use Data
    15. Failing and the perception of failure in student-driven transdisciplinary projects
    16. Computational history of knowledge
    17. Increased auditor independence by external rotation and separating audit and non audit duties?
    18. Lost-customers approximation of semi-open queueing networks with backordering
    19. Pushing the Envelope: Creating Public Value in the Labor Market
    20. An Interactive Layers Model of Self-Regulated Learning and Cognitive Load
    21. Knowledge transfer during the integration of knowledge-intensive acquisitions
    22. Deciding between the Covariance Analytical Approach and the Change-Score Approach in Two Wave Panel Data
    23. Dynamic efficiency and path dependencies in venture capital markets
    24. Machine Learning Applications in Convective Turbulence
    25. Anomalous Results in G-Factor Models
    26. Teachers’ temporary support and worked-out examples as elements of scaffolding in mathematical modeling
    27. Timing matters: Distinct effects of nitrogen and phosphorus fertilizer application timing on root system architecture responses
    28. Study of Single Filament Dielectric Barrier Discharge in Argon
    29. Clashing Values
    30. Micro and Macro Perspectives in Organization Theory
    31. Technical concept and evaluation design of the state subsidized project [Level-Q]
    32. Towards a Comprehensive Framework for Environmental Management Accounting