AUGMENTED REALITY Arthur Lockman, Ethan Prihar, Phil Baumann, Robert McKenna.

Slides:



Advertisements
Similar presentations
Effective use of blogs in business: How companies can talk to themselves 2 nd December 2004 Olympia The Big Blog Company.
Advertisements

Amanda Shoults and Niki Huffman. WHAT IS IT?! The Sixth Sense technology is a “wearable gestural interface that augments the physical world around us.
Social Media Intro to Business & Marketing. The most three most trusted forms of advertising are: Recommendations from people I know - 90% Consumer opinions.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
BUSINESSES AND THEIR EMPLOYEES 11 April. Employers survey, track, or record all or certain aspects of employee’s behavior or performance Workplace Monitoring.
Chapter 10 Privacy and Security McGraw-Hill
Introduction to Information Systems BUS 782 David Chao.
Introduction to Information Systems ISYS 263 David Chao.
Copyright © 2004 Pearson Education, Inc. Slide 1-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Kurt DeMaagd Michigan State University
Police 3.6 Politics and Government. DNA Data Collection.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Invited Talk Telepresence in the Real World Presented by: Weihong Li --- ACM Multimedia 2004 Conference Workshop on Effective Telepresence (ETP’04) Duffie.
1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Ethics and Information Technology Boris Jukic. Computers and Workplace Helpful automatization of mundane tasks Helpful automatization of mundane tasksvs.
3 Ethics and Privacy.
Surveillance camera in terms of business. Index *surveillance systems * Types of control systems * Elements of control systems * Types of monitoring camera.
Big Brother is watching.  1. Would you ever consider letting a TV crew come into your life to document everything? Why or why not?  Big Brother, Kardashians,
Bus. Computer Applications Supervised by: t. Ahmed Abu msameh Prepared by Mohammed fathi al – amawi ID : CCTV systems.
Chapter 3 Ethics, Privacy & Security
BACKGROUND YouTube, Google Maps, Gmail, Android, and many more services Creativity and innovation Indexed over 1 trillion pages of information on their.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
Why are social networking sites successful? Unsuccessful? Goals – Ability to stick to them Needs/wants of user’s – Making adjustments Secure Large user.
Ethics Applied to Computerized World “Privacy” (Morality and Machines S. L. Edgar) **** CS575 *** Jules R. NYA BAWEU.
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
Arif Fazel School of Molecular and Cellular Biology Academic Advisor IlliAAC Conference 2012 December 14, 2012 Tweet Us, Like Us, Watch US! MCB Goes Viral.
By Chris Versaci CLOUD SECURITY. WHAT IS CLOUD COMPUTING? Cloud computing is a concept that involves a large number of computers connected through a real-time.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
INFORMATION SYSTEMS Overview
 The ability to develop step by step procedures for solving problems  She uses algorithmic thinking by setting up her charts.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Module 3: Business Information Systems Chapter 8: Electronic and Mobile Commerce.
Computers Are Your Future Tenth Edition Spotlight 7: Multimedia Devices Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Monitoring Employees , Social Media, Phones, & GPS Tracking GROUP 4 Peter Rankin, Kayla Roache, Derrick Fulton, Pam Goulais Janet Lavoie, Eric Annala,
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
4G-MOBILE COMMUNICATION D.MANOJ KUMAR III. B.Tech, E.C.E N.B.K.R.Institue of Science and technology P.PALLAVI II. B.Tech, E.C.E Kakatiya Institue of Technology.
Communication Technology
By: Mahmood Arabi.  DNA collection is when the police or any other organization create a database with profiles on people (mostly criminals). Profiles.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
LESSON 2: Internet, Computer Ethics and Security
Surveillance Jeff Saunders Dr. Garrison CSCI 101 Thurs. 12:30.
Chapter 1 An Introduction to Information Systems
LIBRARIES MEET THE GRID: Librarians in Cyberspace Virginia Allen Beth Avery.
INFORMATION TECHNOLOGY, THE INTERNET, AND YOU. -2 Lecture Objectives Basic Computing Concepts Basic Working of a Computer System Introducing a Problem.
By Abanob Khalil CSC 490.  What is a smart phone?  Top Smart Phones 2015  Features, More features  Comparing between the Iphone Vs Galaxy  Negative.
CONTENT FOCUS FOCUS INTRODUCTION INTRODUCTION COMPONENTS COMPONENTS TYPES OF GESTURES TYPES OF GESTURES ADVANTAGES ADVANTAGES CHALLENGES CHALLENGES REFERENCE.
Information Technology Issues How has the proliferation of IT impacted society? Adapted from Prof. Brenda Timmerman.
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Chapter 11 Implementing Social Commerce Systems. Learning Objectives 1.Describe the major issues in the social commerce implementation landscape. 2.Discuss.
1.Why it is important to study and understand information systems. 2.Distinguish data from information. 3.Name the components of an information system.
Tech Tuesday: Facebook 101 People’s Resource Center January 26, 2016.
By Samantha Kozar.  What are social networks?  What is Facebook?  What is Gowalla?  What are the capabilities of these sites?  Privacy Settings 
Christopher Simpson. Road Map Definition of wiretapping Laws concerning wiretapping Legal justifications of wiretapping What wiretapping means to you.
Information Systems Chapter 1 An Introduction to Information Systems.
Google. Android What is Android ? -Android is Linux Based OS -Designed for use on cell phones, e-readers, tablet PCs. -Android provides easy access to.
Internet Privacy Tamarcus Garcia, Doug Stokes
What is Augmented Reality?
Web 2.0 Technologies and Community Building Online by
What is it? The idea is to blend, or augment, primarily location-based data accessed on the web with what we see in the real world. Wireless mobile devices.
9 elemets of digital citizenship
Presentation transcript:

AUGMENTED REALITY Arthur Lockman, Ethan Prihar, Phil Baumann, Robert McKenna

Overview ■What is AR? ■Practical Uses ■Privacy Concerns ■Personal Rights ■Practical Concerns ■Conclusions From

What is Augmented Reality? ■Defines a group of technology that adds to or changes our perception of reality ■Could be through audio, video, touch, etc. Image from

Practical Uses ■Personal Use –More communication –Less need for memorization ■Work –Increased efficiency –Increased quality control ■Crime –Document and solve crimes –Commit crimes more discreetly

Privacy Concerns ■Computer Security –New viruses –New hacking techniques ■Government Surveillance –Easy access to all aspects of life ■Personal Privacy –Ability to record everything –Access to personal information Image from

Freedom of Speech ■With the Integration of AR in society, freedom of speech could be limited. –The NSA has been known to track individual’s social habits on Facebook.[2] –Integration of AR opens a new means in which a government can monitor speech. –If this were to become a norm, individuals may have to censor themselves for fear of who may be watching.

Personal Rights ■AR integration may also help protect personal rights –Contextual data may become a popular new form of sharing experiences. –Real Time data sharing would increase between users. –Using Location tracking technology, Real time, contextual data and news can allow for a new level of information sharing.

Professional Ethics ■Employee Privacy –Companies have been known to monitor data on equipment used by Employees[ 3]. –This includes , word documents, and cellular exchanges. –Company owned AR may allow companies to view what the user is viewing.

Practical Concerns ■Software Reliability –AR headsets run software that could show incorrect objects in a user’s view –Would require extremely vigorous testing ■Intellectual Property –AR headsets usually have cameras –Companies may be uncomfortable with employees wearing headsets around sensitive projects [1]

Conclusion ■1-5 years –Low rate of adoption – in development –Used primarily for entertainment ■7 years+ –Large rates of adoption –Divergent views of reality –Decreased privacy –Targeted to replace smartphones/tablets [6] –Enormous market, $150 billion [6]

References ■[1] Condliffe, Jamie. "Google Glass Is Now Banned From Movie Theaters Across the U.S." Gizmodo. Gizmodo, 30 Oct Web. 22 Apr ■[2] Simpson, David, and Pamela Brown. "NSA Mines Facebook, including Americans' Profiles - CNN.com." CNN. Cable News Network, 30 Sept Web. 23 Apr ■[3] Derene, Glenn. “Is Your Boss Spying on You? Inside New Workplace Surveillance.” Popular Mechanics. N.p., n.d. Web. 20 Apr ■[4] "Mobile Technology Fact Sheet." Pew Research Centers Internet American Life Project RSS. Pew Research Center, 27 Dec Web. 23 Apr ■[5] Lee, Kevin. "Coming Soon: Augmented Reality Goggles for Crime Scene Investigations." TechHive. N.p., 1 Feb Web. 23 Apr ■[6] Gaudiosi, John. "How Augmented Reality and Virtual Reality Will Generate $150 Billion in Revenue By 2020." How Augmented Reality and Virtual Reality Will Generate 150 Billion in Revenue By2020 Comments. Fortune, 25 Apr Web. 26 Apr