Surveillance and Capture- Privacy
The article by Philip E. Agre talks about the issue of privacy as well as other issues. It varied the two aspects of privacy; surveillance and capture. It is by varying them that Agre is able to bring out their provisional forms. These issues are modeled by past involvement; they impact on perception of upcoming marvel, and they are created or changed on almost the same manner as other aspect of culture. The cultural concepts concerning privacy are quite vital considering the arising new technologies and growing policy aspects concerning privacy.
Of concern to privacy is the desire to track of people, vehicles, and goods among others. A god example is the badge that is used by staff so as to know their location. The badge is a form of tracking technology that is placed on walls of buildings and interfaced to a database. This progress shows the connection between the surrounding and technology hence a ubiquitous form of computing. Some of these tracking systems use radio-frequency tools in processing and allocation (Agre 1994). For example an American company uses GPS to track its vehicles; the vehicle uses an Apple Macintosh which frequently acquires a reading from the facility and takes a reading to the control center by mail. In countries like Thailand, the database is used by the government to keep a central record system for every citizen.
Surveillance and capture are two privacy models. The surveillance model is composed of the visual aspects just like the “Big Brother is watching you”, the identification with the country, the orchestration using bureaucracy, among others. This brings out the cultural aspect of surveillance. This surveillance model is applied in books and articles in computers.
The capture model is varied in several aspects; the language aspects for human undertakings and composing them into the computer systems language attribution, the assumption that language of parsing of human processes compose of active involvement and arrangement of processes, the decentralized and heterogeneous organization and structural aspects. While the surveillance aspect is related to the classical political aspect of condition of action the capture model is integrated in the practical aspect of computer. The capture model similar to the surveillance model is a metaphor system which may be used in every other company.
In the practical aspect, computers are often applied to keep and send data. The data is defined with no regard for what content is involved. The main objective of the computer is to structure the company so that is keeps a set of data framework which reflects the daily processes of the company. In addition to the tracking system that has been created, there are the mapping sets which have been used in the automation of processes. There is also another representation that is in knowledge acquisition in the area of artificial intelligence. The main objective of this representation is the application of linguistic of linguistic metaphors used for every language for representing human processes.
The capture and its workability compose of systems which make it possible for individuals to record data in computerized text with no regard to grammar. This may later be acquired and interpreted. Mails and hypertext models use this model as well as other more complicated models. These computers engage in what is known as a tradeoff where computers that are well known are able to computer what it captures. The capture model is related to computing research and the intellect.
Every human process has some economic implication; these processes are related to market interaction composing of cost of location ad assessment of the goods and services for transaction in the market. The technologies work to limit the transaction cost in the market.
Consequently, brings about the monitoring of processes are centrally prepared and the data is kept centrally, the surveillance uses visual aspects which applies linguistic aspects, and the surveillance aspect insists on nondestructive form of data collection which handles the instrumentation which involves the re-planning of present processes.
Reference
Agre, Philip E. 1994. “Surveillance and Capture: Two Models of Privacy.” The information Society, Vol. 10, No. 2: 101-128.
