SlideShare a Scribd company logo
Recognition Markets and Visual Privacy Ryan Shaw  UnBlinking Symposium UC Berkeley School of Information  November 4, 2006
Photo by Chance Heath, http://flickr.com/photos/83664946@N00/132100361/
From the  “420 Photo Album” at the CU-Boulder Police Department website
From the  “420 Photo Album” at the CU-Boulder Police Department website
Some definitions Recognition The linking of images to the people, places, things or concept which they depict Recognition markets Socio-technical systems which use “human-in-the-loop” approaches to solve image recognition problems, often modeled as economic systems in which recognition services are exchanged for some capital
Recognition markets and visual privacy High-level overview of recognition systems “ Socio-technical turn” in recognition system design Possible applications and implications for visual privacy Guidelines for ethical design & implementation
Signal-based recognition systems Images are collected and analyzed as collections of signal features These features are used to build a statistical model of the thing to be recognized A new image is provided to the model as input The model provides an answer as to whether the new image depicts that thing
excerpt from LSCOM Lexicon Definitions and Annotations Version 1.0
Peer production requirements (Benkler) Modularity  for asynchronous collaboration Granularity  for lightweight contributions Tools and processes for  quality control Yochai Benkler, “Coase's Penguin,”  Yale Law Journal , 2002
 
Google image labeler
 
Forms of semiotic labor (Warner) Syntactic labor Formal logic, keyword indexing, automated feature extraction Semantic labor High-level description, summarization, synthesis, creation of classification structures Julian Warner, “Forms of labour in information systems,”  Information Research , 2002
http://www.mturk.com/ http://mycroftnetwork.com/
http://www.thesheepmarket.com/
 
Massive Multi-player Border Watch “ I look at this as  no different  than the neighborhood watches that we've had in our communities for years and years.” Texas Governor Rick Perry “ We have to make sure these things are secure and that they can handle the tremendous amount of hits we know we'll have through the servers. You're going to get  millions of people  on it.” Perry campaign spokesman “ Eyes of Texas to be on border,”  Houston Chronicle , June 2, 2006
 
 
Ethical design and implementation Enforcing  contextually appropriate use of metadata Tracking provenance  to combat recognition spam Understanding the  limits of technological protections Defining the  responsibilities of image aggregators Educating  participants in recognition markets
Spam
Limits of technological protections Alexander & Smith, “Engineering Privacy in Public: Confounding Face Recognition,” PET 2003
Ethical design and implementation Enforcing  contextually appropriate use of metadata Tracking provenance  to combat recognition spam Understanding the  limits of technological protections Defining the  responsibilities of image aggregators Educating  participants in recognition markets
“ We’ll have the capability, and it will be up to society to determine how we use it. Society will determine that, not scientists.” Rick Rashid, Senior VP, Microsoft Research “ Computing, 2016: What Won’t Be Possible?”  New York Times , October 31, 2006
Thank you Ryan Shaw UC Berkeley School of Information [email_address] http://aeshin.org/

More Related Content

PDF
Ramz al jehad fitna e wahabiyyah hisotry and masscar of muslim by wahabies
PPS
130412 jpb pour vous faire sourire
DOCX
Diagnostico
PPT
Intéressement comment ça marche
PPT
CYO Summer Tour to Colorado - 2006
ODP
Sistema solar
PDF
Ramz al jehad fitna e wahabiyyah hisotry and masscar of muslim by wahabies
130412 jpb pour vous faire sourire
Diagnostico
Intéressement comment ça marche
CYO Summer Tour to Colorado - 2006
Sistema solar

Viewers also liked (8)

PPT
CYO Band Summer 2007 Preview 1
PDF
09.10.2015 strategically managing mongolia’s sovereign credit and perception ...
PPT
Loi TEPA et Heures Sup
PDF
Guide de l'epargne salariale
PDF
Nouveaux Business Modèles pour votre Entreprise
DOCX
Codigo de hammurabi esclavitud y matrimonio
PDF
JUnit Boot Camp (GeeCON 2016)
CYO Band Summer 2007 Preview 1
09.10.2015 strategically managing mongolia’s sovereign credit and perception ...
Loi TEPA et Heures Sup
Guide de l'epargne salariale
Nouveaux Business Modèles pour votre Entreprise
Codigo de hammurabi esclavitud y matrimonio
JUnit Boot Camp (GeeCON 2016)
Ad

Similar to Recognition Markets and Visual Privacy (20)

PPT
Physical-Cyber-Social Data Analytics & Smart City Applications
PDF
Travel Recommendation Approach using Collaboration Filter in Social Networking
PPTX
Foresight Analytics
DOCX
356 Part II • Predictive AnalyticsMachine LearningFace re.docx
PDF
Image Retrieval for Visual Understanding in Dynamic and Sensor Rich Environments
PDF
Achieving Privacy in Publishing Search logs
PDF
Thomas
PDF
XR for Higher Education: Experiential Design Affordances, Ethical Considerati...
PDF
B13 FIRST REVIEW 2 (1).pdf advanced machine learning
PDF
Black Box Learning Analytics? Beyond Algorithmic Transparency
DOC
Poster Abstracts
PDF
PPTX
Enhancing Soft Power: using cyberspace to enhance Soft Power
PDF
Insider threatsystemdynamics 2
PDF
NIST Privacy Engineering Working Group -- Risk Models
PDF
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
PDF
CSS-Intro-Lecture.pdf
PPTX
Crime Analysis using Data Analysis
PPT
Social Computing
PPT
05 Bronner Richards
Physical-Cyber-Social Data Analytics & Smart City Applications
Travel Recommendation Approach using Collaboration Filter in Social Networking
Foresight Analytics
356 Part II • Predictive AnalyticsMachine LearningFace re.docx
Image Retrieval for Visual Understanding in Dynamic and Sensor Rich Environments
Achieving Privacy in Publishing Search logs
Thomas
XR for Higher Education: Experiential Design Affordances, Ethical Considerati...
B13 FIRST REVIEW 2 (1).pdf advanced machine learning
Black Box Learning Analytics? Beyond Algorithmic Transparency
Poster Abstracts
Enhancing Soft Power: using cyberspace to enhance Soft Power
Insider threatsystemdynamics 2
NIST Privacy Engineering Working Group -- Risk Models
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
CSS-Intro-Lecture.pdf
Crime Analysis using Data Analysis
Social Computing
05 Bronner Richards
Ad

Recently uploaded (20)

PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
PPTX
Astra-Investor- business Presentation (1).pptx
PDF
Comments on Crystal Cloud and Energy Star.pdf
PDF
Technical Architecture - Chainsys dataZap
PDF
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
PDF
Daniels 2024 Inclusive, Sustainable Development
PPTX
operations management : demand supply ch
PPTX
Negotiation and Persuasion Skills: A Shrewd Person's Perspective
PDF
Module 2 - Modern Supervison Challenges - Student Resource.pdf
PDF
How to Get Funding for Your Trucking Business
PDF
Booking.com The Global AI Sentiment Report 2025
PDF
Charisse Litchman: A Maverick Making Neurological Care More Accessible
PDF
How to Get Business Funding for Small Business Fast
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PDF
Keppel_Proposed Divestment of M1 Limited
PPTX
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
PPTX
2025 Product Deck V1.0.pptxCATALOGTCLCIA
PPT
Lecture 3344;;,,(,(((((((((((((((((((((((
PDF
Deliverable file - Regulatory guideline analysis.pdf
PDF
Blood Collected straight from the donor into a blood bag and mixed with an an...
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
Astra-Investor- business Presentation (1).pptx
Comments on Crystal Cloud and Energy Star.pdf
Technical Architecture - Chainsys dataZap
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
Daniels 2024 Inclusive, Sustainable Development
operations management : demand supply ch
Negotiation and Persuasion Skills: A Shrewd Person's Perspective
Module 2 - Modern Supervison Challenges - Student Resource.pdf
How to Get Funding for Your Trucking Business
Booking.com The Global AI Sentiment Report 2025
Charisse Litchman: A Maverick Making Neurological Care More Accessible
How to Get Business Funding for Small Business Fast
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
Keppel_Proposed Divestment of M1 Limited
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
2025 Product Deck V1.0.pptxCATALOGTCLCIA
Lecture 3344;;,,(,(((((((((((((((((((((((
Deliverable file - Regulatory guideline analysis.pdf
Blood Collected straight from the donor into a blood bag and mixed with an an...

Recognition Markets and Visual Privacy

  • 1. Recognition Markets and Visual Privacy Ryan Shaw UnBlinking Symposium UC Berkeley School of Information November 4, 2006
  • 2. Photo by Chance Heath, http://flickr.com/photos/83664946@N00/132100361/
  • 3. From the “420 Photo Album” at the CU-Boulder Police Department website
  • 4. From the “420 Photo Album” at the CU-Boulder Police Department website
  • 5. Some definitions Recognition The linking of images to the people, places, things or concept which they depict Recognition markets Socio-technical systems which use “human-in-the-loop” approaches to solve image recognition problems, often modeled as economic systems in which recognition services are exchanged for some capital
  • 6. Recognition markets and visual privacy High-level overview of recognition systems “ Socio-technical turn” in recognition system design Possible applications and implications for visual privacy Guidelines for ethical design & implementation
  • 7. Signal-based recognition systems Images are collected and analyzed as collections of signal features These features are used to build a statistical model of the thing to be recognized A new image is provided to the model as input The model provides an answer as to whether the new image depicts that thing
  • 8. excerpt from LSCOM Lexicon Definitions and Annotations Version 1.0
  • 9. Peer production requirements (Benkler) Modularity for asynchronous collaboration Granularity for lightweight contributions Tools and processes for quality control Yochai Benkler, “Coase's Penguin,” Yale Law Journal , 2002
  • 10.  
  • 12.  
  • 13. Forms of semiotic labor (Warner) Syntactic labor Formal logic, keyword indexing, automated feature extraction Semantic labor High-level description, summarization, synthesis, creation of classification structures Julian Warner, “Forms of labour in information systems,” Information Research , 2002
  • 16.  
  • 17. Massive Multi-player Border Watch “ I look at this as no different than the neighborhood watches that we've had in our communities for years and years.” Texas Governor Rick Perry “ We have to make sure these things are secure and that they can handle the tremendous amount of hits we know we'll have through the servers. You're going to get millions of people on it.” Perry campaign spokesman “ Eyes of Texas to be on border,” Houston Chronicle , June 2, 2006
  • 18.  
  • 19.  
  • 20. Ethical design and implementation Enforcing contextually appropriate use of metadata Tracking provenance to combat recognition spam Understanding the limits of technological protections Defining the responsibilities of image aggregators Educating participants in recognition markets
  • 21. Spam
  • 22. Limits of technological protections Alexander & Smith, “Engineering Privacy in Public: Confounding Face Recognition,” PET 2003
  • 23. Ethical design and implementation Enforcing contextually appropriate use of metadata Tracking provenance to combat recognition spam Understanding the limits of technological protections Defining the responsibilities of image aggregators Educating participants in recognition markets
  • 24. “ We’ll have the capability, and it will be up to society to determine how we use it. Society will determine that, not scientists.” Rick Rashid, Senior VP, Microsoft Research “ Computing, 2016: What Won’t Be Possible?” New York Times , October 31, 2006
  • 25. Thank you Ryan Shaw UC Berkeley School of Information [email_address] http://aeshin.org/