|
Equiveillance is a state of equilibrium, or a desire to attain a state of equilibrium, between surveillance and sousveillance.〔Manders, C. (2013, June). Moving surveillance techniques to sousveillance: Towards equiveillance using wearable computing. In Technology and Society (ISTAS), 2013 IEEE International Symposium on (pp. 19-19). IEEE.〕〔Weber, Karsten, Surveillance, Sousveillance, Equiveillance: Google Glasses (June 30, 2012). Available at SSRN: http://dx.doi.org/10.2139/ssrn.2095355〕〔Mann, S., Fung, J., & Lo, R. (2006, October). Cyborglogging with camera phones: Steps toward equiveillance. In Proceedings of the 14th annual ACM international conference on Multimedia (pp. 177-180). ACM.〕〔Weber, K. (2010). Mobile Devices and a New Understanding of Presence. In Workshop paper from SISSI2010 at the 12th annual ACM international conference on ubiquitous computing (p. 101).〕〔Zedner, L. (2008). The inescapable insecurity of security technologies?. Technologies of InSecurity: The Surveillance of Everyday Life, 257-270.〕〔Fernback, J. (2013). Sousveillance: Communities of resistance to the surveillance environment. Telematics and Informatics, 30(1), 11-21.〕〔Hadjiyanni, T., Papanikolopoulos, N., Gopinath, A., & Willow, D. (2010, June). Socializing Surveillance: An interdisciplinary educational model. In Control & Automation (MED), 2010 18th Mediterranean Conference on (pp. 179-184). IEEE.〕 It is sometimes confused with transparency. This balance (equilibrium) allows the individual to construct their own case from evidence they gather themselves, rather than merely having access to surveillance data that could possibly incriminate them. Sousveillance, in addition to transparency, can be used to preserve the contextual integrity of surveillance data. For example, a lifelong capture of personal experience could provide "best evidence" over external surveillance data, to prevent the surveillance-only data from being taken out of context. ==Ubiquitous computing== Equiveillance represents a situation where all parties of a society or economy are empowered to be able to use the tools of accountability to make beneficial decisions. Humanity has always sought to establish authority relationships: the increasing trend to record information from our environment, and of ourselves creates the need to delineate the relationships between privacy, surveillance, and sousveillance. The emphasis on ubiquitous computing is to be contrasted with wearable computing. As personal cell phones store more information and have the capacity to share it, wearable and mobile computing will make manifest the ability for an individual, or small group of individuals, to monitor larger institutional systems with the goal of developing systems of transparency and accountability. For just as large institutions, such as governments or corporations, store information about the buying habits of the public through an integrated surveillance highway that has a ubiquitous computing infrastructure, individuals can act as consumer activists though a system of inverse surveillance that is based upon a wearable computing infrastructure that assists in maximizing personal privacy and alerting one of information being recorded about the self. Such actions could lead to an equiveillant state, as power and respect are shared. Panoptic surveillance was described by Michel Foucault in the context of a prison in which prisoners were isolated from each other but visible at all times by guards. Surveillance tends to isolate individuals from one another while setting forth a one-way visibility to authority figures. This isolation leads to social fragmentation. Sousveillance has a community-based origin, such as a personal electronic diary (or weblog), made public on the World Wide Web. Sousveillance tends to bring together individuals, by influencing a large city to function more like a small town: with the pitfalls of gossip, but also the benefits of a sense of community participation. There is a greater degree of responsibility in a sousveillance environment. Ubiquitous computing ("ubicomp"), also known as pervasive computing ("pervcomp"), is the integration of computers with the environment. Ubiquitous computing tends to rely on cooperation of the immediate infrastructure in the environment, but also has a tendency to centralize information, and hence, centralize authority structures. It also creates segregation, and has implications for social rights such as education and healthcare. Individuals are sorted and classified within a ubiquitous computing environment, leading to a new form of segregation. Ubiquitous computing also places emphasis on copyright law and undermines creative environments due to the controlling tendencies of authority. Wearable computing ("wearcomp") refers to portable, wearable computing technologies. Wearcomp doesn't require any special infrastructure in the environment, as the computer is self-contained and self-reliant. With sousveillant computing, it is possible for the focus of control to be more distributed rather than centralized. A free society is one which places emphasis on respect and the balance of power: in a democratic society, respect and power are shared and well distributed, whereas in a despotic community, respect and power are not shared and are restricted to the few. Increasingly, our society is confronted with the realization of a ubiquitous computing environment, with the infrastructure predicated upon sensor and surveillance systems to function despite efforts to stop such expansions. How we participate in sharing respect and power will converge with how our society conducts surveillance of its citizens, and how citizens conduct sousveillance. Equiveillance represents a harmonious balance that maximizes human freedom, individual rights as well as communal democracy. The field of personal cybernetics will converge with the fields of personal imaging and glogging (CyborgLogging), as individuals store and archive information for personal use and as a form of self-defense. To have a society within which personal freedoms and justice are equally distributed, transparency is needed. Transparency increasingly will require dealing with the issues of ubiquitous computing and wearable computing, and maintaining a balance between surveillance and inverse surveillance while maximizing personal privacy. 抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)』 ■ウィキペディアで「Equiveillance」の詳細全文を読む スポンサード リンク
|