Ubiquitous Commons

Ubiquitous Commons

Date: 
29.01.2015 11:00
Edition: 
2015
Format: 
Workshop
Location: 
HKW
HKW - Foyer

Open Workshop, from 11:00-14:00 and from 15:00-18:00. What happens when data and information starts being something which describes bodies, places, emotions, opinions, desires, energy, financial transactions, health, in ways which are personalised and ubiquitous?

Open Workshop
From 11:00-14:00 and 15:00-18:00
At Foyer Hub 2

What happens when data and information starts being something which describes bodies, places, emotions, opinions, desires, energy, financial transactions, health, in ways which are personalised and ubiquitous? How can we succeed in expressing our wishes and expectations about how these new forms of data are used and make sure that our freedoms and desires are granted?

Salvatore Iaconesi and Oriana Persico refer to Ubiquitous Commons, when addressing the Commons in the age of ubiquitous technologies. Through this, they are actually defining a philosophical protocol which manifests itself through technological, legal, technical, strategic, tactical, bureaucratic and administrative implementations. The aim is that we, as users and citizens will become able to navigate the current grey area in which we currently find ourselves from cultural, psychological, cognitive and legal points of view and progressively be able to express our rights and defend them.

The first part of the workshop will introduce the concept of Ubiquitous Commons and discuss current scenarios, starting from understanding how some forms of new types of data can be used and protected. Sensors, social networks and biosensors will be used to understand how data and information is generated and where the possible dangers lie; data processes will be explored by combining information in order to predict, infer or fabricate information about people and organisations.

The second part of the workshop will be based on designing a social crypto plugin  that can replace the content, which we generate on social networks with encrypted data, so that we become able to decide who can access it.

Participants for the second part will need to bring their laptops and have Chrome installed.
 

share