Update 'presentation201812.md'

master
Angeliki 6 years ago
parent 3ef0bb3b0a
commit 7ef41ae213

@ -5,19 +5,21 @@
My project proposal was about the intervention of data practices from Google, Facebook, Amazon... into our communication systems and all the human labor happening behind it. I made an annotated diagram that explains that from my perspective. So for example,....(explain one route with listening and transcribing)
I wanted to highlight the human involvement into the training of speech recognition software on which Alexa, Siri and other are based on. And the importance of voice as a unique element of our bodies that is collected into a big pool of trained data. My aim was to make experiments with other people in group sessions where we would discuss about our privacy and at the same time the discussion would become input for a process of activities. Like transcribing, listening, eavesdropping, speaking, recording, repeating. They would immitate the processes of the training of speech recognition tools. Here is a diagram made by somebody else that explains further the exploitation of user's speech data and the free labor for the Amazon echo.
I wanted to highlight the human involvement into the training of speech recognition software on which personal assistants are based on. And the importance of voice as a unique element of our bodies that is collected into a big pool of trained data. My aim was to make experiments with other people in group sessions where we would discuss about our privacy and at the same time the discussion would become input for a process of activities. Like transcribing, listening, eavesdropping, speaking, recording, repeating. They would immitate the processes of the training of speech recognition tools. Here is a diagram made by somebody else that explains further the exploitation of user's speech data and the free labor for the Amazon echo.
**ai-anatomy-map.pdf**
Besides their commercial use these tools are also used by the states to control citizens or the access of refugees in the country. For example Germany wants to use speech analysis tools to verify the claims of origin of refugees. So they collect their voice data through interviews and if the tool finds out that their dialect is not related to their claims of origin then they are banned by asking asylum.
My purpose was to strengthen our awareness for our involvement in the loop and answer in some questions that bother me. Some of these questions is how our bodies are influenced by these systems, what is the control over them, what are the new relation with our voices and how can we appropriate these new technologies more consciously, what new material and tools these experiments produce? It seems to me that the communication platforms are estranged[3] realities where the personal body [cultural, physical, political, gender] disappears realities difficult to understand.
My purpose was to strengthen our awareness for our involvement in the loop and answer in some questions that bother me. Some of these questions is how our bodies are influenced by these systems, what is the control over them, what are the new relation with our voices and how can we appropriate these new technologies more consciously, what new material and tools these experiments produce? It seems to me that the communication platforms are estranged[3] realities where the personal body [cultural, physical, political, gender] disappears realities difficult to understand. I would try first an example at Leeszaal where the visitors and the volunteers are permanent inhabitants of Netherlands and are coming from different countries. I assume that they have different relations to these tools. For example, some people donate their voice to speech recognition tools, others use personal assistants ...
##Workshop
**pyratechnic3_workshop.pdf**
I organised a workshop, part of the pyratechnic sessions, with the first years. I wanted to immitate a loop in which a conversation of two people leakes out to another room, through Jitsi, where participants repeat, transcribe and then read the transcription back to them. So their words come back distorted. Explaining the second diagram.
**video-pyratechnic3.mp4**
I organised a workshop, part of the pyratechnic sessions, with the first years. I wanted to immitate a loop in which a conversation of two people leakes out to another room, through Jitsi, where participants repeat, transcribe and then read the transcription back to them. So their words come back distorted. //Explain the second diagram//
##My research turn - voice in public:
@ -26,17 +28,16 @@ The workshop was missing content and after the feedback I got from the participa
**https://pad.xpub.nl/p/chapter1-speech-recognition**
So my research started to focus on voice in public, public speeches and assemblies with the aid of media. I looked at specific examples of counter communication that I had come accross in a previous research.
So I started to focus my research on voice in public, public speeches and assemblies with the aid of media. I looked at specific examples of counter communication that I had come accross in a previous research.
**examples-speeches.jpg**
**diagram-flows.jpg**
So I annotated again the Shannon diagram for each example. Explain the red one, the green.
So I annotated again the Shannon diagram for each example. //Explain the red one, the green//
Explain the blue
**streaming-assemblies.jpg**
@ -47,7 +48,10 @@ primitive public-hight-tech online
laws and restrictions, surveillnace
http://www.freehouse.nl/files/blg/i_055/Radicalizing_the_Local_LR.pdf
http://www.freehouse.nl/files/blg/i_055/Radicalizing_the_Local_LR.pdf
//Explain the blue//
**occupy-rotterdam.png**

Loading…
Cancel
Save