Marian Stewart Bartlett, Javier R. Movellan, Gwen Littlewort, Bjorn Braathen, Mark G. Frank, and Terrence J. Sejnowski
- Published in print:
- 2005
- Published Online:
- March 2012
- ISBN:
- 9780195179644
- eISBN:
- 9780199847044
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195179644.003.0019
- Subject:
- Psychology, Cognitive Psychology
This chapter presents an approach for developing a fully automatic Facial Action Coding System (FACS). The approach uses state-of-the-art machine learning techniques that can be applied to ...
More
This chapter presents an approach for developing a fully automatic Facial Action Coding System (FACS). The approach uses state-of-the-art machine learning techniques that can be applied to recognition of any facial action. The results of Study I provided guidance as to which image representations, or feature extraction methods, are most effective for facial action recognition. Gabor wavelets and Independent Component Analysis gave best performance. Study II found that machine learning techniques applied directly to the warped images is a promising approach for automatic coding of spontaneous facial expressions. Generally, the data employed hand-labeled feature points for the head pose tracking step. Furthermore, three of the issues are discussed in detail: (1) collection of a database of spontaneous facial expressions, (2) fully automatic face detection and tracking, and (3) fully automatic 3D head pose estimation.Less
This chapter presents an approach for developing a fully automatic Facial Action Coding System (FACS). The approach uses state-of-the-art machine learning techniques that can be applied to recognition of any facial action. The results of Study I provided guidance as to which image representations, or feature extraction methods, are most effective for facial action recognition. Gabor wavelets and Independent Component Analysis gave best performance. Study II found that machine learning techniques applied directly to the warped images is a promising approach for automatic coding of spontaneous facial expressions. Generally, the data employed hand-labeled feature points for the head pose tracking step. Furthermore, three of the issues are discussed in detail: (1) collection of a database of spontaneous facial expressions, (2) fully automatic face detection and tracking, and (3) fully automatic 3D head pose estimation.
Jacob Whitehill, Marian Stewart Bartlett, and Javier R. Movellan
- Published in print:
- 2013
- Published Online:
- January 2014
- ISBN:
- 9780195387643
- eISBN:
- 9780199369195
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195387643.003.0007
- Subject:
- Psychology, Cognitive Models and Architectures, Cognitive Psychology
In this chapter we define the problem space and describe the core components of automatic facial expression recognition systems. In particular, we discuss the most prominent methods of face ...
More
In this chapter we define the problem space and describe the core components of automatic facial expression recognition systems. In particular, we discuss the most prominent methods of face segmentation, face registration, feature extraction, classification, and temporal integration. We then present several practical applications of expression recognition technology. Finally, we comment on the core future challenges to the field, including generalization to multiple poses and ethnicities, collection of better training data, evaluation infrastructure, and commercialization.Less
In this chapter we define the problem space and describe the core components of automatic facial expression recognition systems. In particular, we discuss the most prominent methods of face segmentation, face registration, feature extraction, classification, and temporal integration. We then present several practical applications of expression recognition technology. Finally, we comment on the core future challenges to the field, including generalization to multiple poses and ethnicities, collection of better training data, evaluation infrastructure, and commercialization.
Kelly A. Gates
- Published in print:
- 2011
- Published Online:
- March 2016
- ISBN:
- 9780814732090
- eISBN:
- 9780814733035
- Item type:
- chapter
- Publisher:
- NYU Press
- DOI:
- 10.18574/nyu/9780814732090.003.0001
- Subject:
- Society and Culture, Media Studies
This chapter examines how automated facial recognition and related technologies were envisioned and designed to serve a set of institutional priorities during the period of political-economic ...
More
This chapter examines how automated facial recognition and related technologies were envisioned and designed to serve a set of institutional priorities during the period of political-economic neoliberalization in the United States. In the United States the effort to program computers to identify human faces began in the 1960s in research labs funded by the Department of Defense and intelligence agencies. By the 1990s new companies were formed to commercialize the technology, searching for market especially among institutions operating proprietary computer networks and large-scale identification systems. Across these sectors, biometric identification promised to enable the “securitization of identity,” the intensification of identification practices at a proliferation of sites—a priority that has gone hand in hand with political-economic and governmental neoliberalization.Less
This chapter examines how automated facial recognition and related technologies were envisioned and designed to serve a set of institutional priorities during the period of political-economic neoliberalization in the United States. In the United States the effort to program computers to identify human faces began in the 1960s in research labs funded by the Department of Defense and intelligence agencies. By the 1990s new companies were formed to commercialize the technology, searching for market especially among institutions operating proprietary computer networks and large-scale identification systems. Across these sectors, biometric identification promised to enable the “securitization of identity,” the intensification of identification practices at a proliferation of sites—a priority that has gone hand in hand with political-economic and governmental neoliberalization.
Kelly A. Gates
- Published in print:
- 2011
- Published Online:
- March 2016
- ISBN:
- 9780814732090
- eISBN:
- 9780814733035
- Item type:
- chapter
- Publisher:
- NYU Press
- DOI:
- 10.18574/nyu/9780814732090.003.0005
- Subject:
- Society and Culture, Media Studies
This chapter explores the development of automated facial expression analysis, the effort to program computers to recognize facial expressions as they form on and move across people's faces. While ...
More
This chapter explores the development of automated facial expression analysis, the effort to program computers to recognize facial expressions as they form on and move across people's faces. While facial recognition technology treats the face as a “blank somatic surface” to be differentiated from other faces as an index of identity, automated facial expression analysis treats the dynamic surface of the face as the site of differentiation. In automated facial expression analysis, the dimensions and intensities of facial movements are analyzed as indices of emotion and cognition to determine what people are thinking and feeling. Automation of facial expression analysis promises to accomplish what facial recognition technology fails to do: read the interior of the person off the surface of the face, using the face itself as a field of classifiable information about the individual.Less
This chapter explores the development of automated facial expression analysis, the effort to program computers to recognize facial expressions as they form on and move across people's faces. While facial recognition technology treats the face as a “blank somatic surface” to be differentiated from other faces as an index of identity, automated facial expression analysis treats the dynamic surface of the face as the site of differentiation. In automated facial expression analysis, the dimensions and intensities of facial movements are analyzed as indices of emotion and cognition to determine what people are thinking and feeling. Automation of facial expression analysis promises to accomplish what facial recognition technology fails to do: read the interior of the person off the surface of the face, using the face itself as a field of classifiable information about the individual.
Cristobal Curio, Heinrich H. Bulthoff, and Martin A. Giese (eds)
- Published in print:
- 2010
- Published Online:
- August 2013
- ISBN:
- 9780262014533
- eISBN:
- 9780262289313
- Item type:
- book
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262014533.001.0001
- Subject:
- Psychology, Vision
The recognition of faces is a fundamental visual function that is important for social interaction and communication. Scientific interest in facial recognition has increased dramatically over the ...
More
The recognition of faces is a fundamental visual function that is important for social interaction and communication. Scientific interest in facial recognition has increased dramatically over the last decade. Researchers in such fields as psychology, neurophysiology, and functional imaging have published more than 10,000 studies on face processing. Almost all of these studies focus on the processing of static pictures of faces; however, little attention has been paid to the recognition of dynamic faces, faces as they change over time—a topic in neuroscience that is also relevant to a variety of technical applications, including robotics, animation, and human–computer interfaces. This book offers an interdisciplinary overview of recent work on dynamic faces from the biological and computational perspectives. The chapters cover a range of topics, including the psychophysics of dynamic face perception, results from electrophysiology and imaging, clinical deficits in patients with impairments of dynamic face processing, and computational models that provide insights about the brain mechanisms for the processing of dynamic faces. The book offers neuroscientists and biologists a reference for designing experiments and provides computer scientists with knowledge that will help them improve technical systems for the recognition, processing, synthesizing, and animating of dynamic faces.Less
The recognition of faces is a fundamental visual function that is important for social interaction and communication. Scientific interest in facial recognition has increased dramatically over the last decade. Researchers in such fields as psychology, neurophysiology, and functional imaging have published more than 10,000 studies on face processing. Almost all of these studies focus on the processing of static pictures of faces; however, little attention has been paid to the recognition of dynamic faces, faces as they change over time—a topic in neuroscience that is also relevant to a variety of technical applications, including robotics, animation, and human–computer interfaces. This book offers an interdisciplinary overview of recent work on dynamic faces from the biological and computational perspectives. The chapters cover a range of topics, including the psychophysics of dynamic face perception, results from electrophysiology and imaging, clinical deficits in patients with impairments of dynamic face processing, and computational models that provide insights about the brain mechanisms for the processing of dynamic faces. The book offers neuroscientists and biologists a reference for designing experiments and provides computer scientists with knowledge that will help them improve technical systems for the recognition, processing, synthesizing, and animating of dynamic faces.
Kelly A. Gates
- Published in print:
- 2011
- Published Online:
- March 2016
- ISBN:
- 9780814732090
- eISBN:
- 9780814733035
- Item type:
- chapter
- Publisher:
- NYU Press
- DOI:
- 10.18574/nyu/9780814732090.003.0007
- Subject:
- Society and Culture, Media Studies
This introductory chapter provides an overview of facial recognition technology (FRT). In the post 9/11 context, FRT emerged as an existing, reliable, and high-tech solution to the most pressing ...
More
This introductory chapter provides an overview of facial recognition technology (FRT). In the post 9/11 context, FRT emerged as an existing, reliable, and high-tech solution to the most pressing problem facing the United States. Indeed, new forms of human-machine integration promise to make surveillance systems function more effectively and extend their reach over time and space. However, whether these experimental technologies can or should be made to accomplish these goals remains open to debate, one that often plays out in press and policy discussion as a trade-off between “security” and “privacy.” This book explores the web of cultural practices and ideas, along with the policy programs and institutional priorities, in which automated face perception technologies are embedded.Less
This introductory chapter provides an overview of facial recognition technology (FRT). In the post 9/11 context, FRT emerged as an existing, reliable, and high-tech solution to the most pressing problem facing the United States. Indeed, new forms of human-machine integration promise to make surveillance systems function more effectively and extend their reach over time and space. However, whether these experimental technologies can or should be made to accomplish these goals remains open to debate, one that often plays out in press and policy discussion as a trade-off between “security” and “privacy.” This book explores the web of cultural practices and ideas, along with the policy programs and institutional priorities, in which automated face perception technologies are embedded.
Kelly A. Gates
- Published in print:
- 2011
- Published Online:
- March 2016
- ISBN:
- 9780814732090
- eISBN:
- 9780814733035
- Item type:
- chapter
- Publisher:
- NYU Press
- DOI:
- 10.18574/nyu/9780814732090.003.0002
- Subject:
- Society and Culture, Media Studies
This chapter discusses the idea of “Smart CCTV”—the integration of automated facial recognition with video surveillance. Recognizing a business opportunity, entrepreneurs attempting to commercialize ...
More
This chapter discusses the idea of “Smart CCTV”—the integration of automated facial recognition with video surveillance. Recognizing a business opportunity, entrepreneurs attempting to commercialize facial recognition technology introduced the idea as a potential solution to the problems of surveillance labor and video overload. In June 2001, Visionics Corporation began a project with the Tampa Police Department (TPD) to incorporate the company's automated facial recognition product, called FaceIt, into Ybor City. However, after a two-year free trial period, the Tampa Police abandoned the effort to integrate automated facial recognition with the Ybor City CCTV system, citing its failure to identify a single wanted individual. The failure of this experiment demonstrates that building a functioning Smart CCTV system involves resolving a complex combination of social and technological problems.Less
This chapter discusses the idea of “Smart CCTV”—the integration of automated facial recognition with video surveillance. Recognizing a business opportunity, entrepreneurs attempting to commercialize facial recognition technology introduced the idea as a potential solution to the problems of surveillance labor and video overload. In June 2001, Visionics Corporation began a project with the Tampa Police Department (TPD) to incorporate the company's automated facial recognition product, called FaceIt, into Ybor City. However, after a two-year free trial period, the Tampa Police abandoned the effort to integrate automated facial recognition with the Ybor City CCTV system, citing its failure to identify a single wanted individual. The failure of this experiment demonstrates that building a functioning Smart CCTV system involves resolving a complex combination of social and technological problems.
James Simpson
- Published in print:
- 2019
- Published Online:
- May 2019
- ISBN:
- 9781526129154
- eISBN:
- 9781526141996
- Item type:
- chapter
- Publisher:
- Manchester University Press
- DOI:
- 10.7228/manchester/9781526129154.003.0015
- Subject:
- Literature, Early and Medieval Literature
James Simpson’s central hermeneutic perception for knowledge in the Humanities is that cognition is re-cognition. Before we can know, we must already have known. He examines this paradox with ...
More
James Simpson’s central hermeneutic perception for knowledge in the Humanities is that cognition is re-cognition. Before we can know, we must already have known. He examines this paradox with reference to literary examples of facial recognition from, in particular, Chaucer and his reception in the early modern period. Linking literary face to textual face – the whole text as a kind of face – he applies the lessons learnt from facial recognition to textual recognition; and answers some possible objections to the paradox of knowing being dependent on having already known.Less
James Simpson’s central hermeneutic perception for knowledge in the Humanities is that cognition is re-cognition. Before we can know, we must already have known. He examines this paradox with reference to literary examples of facial recognition from, in particular, Chaucer and his reception in the early modern period. Linking literary face to textual face – the whole text as a kind of face – he applies the lessons learnt from facial recognition to textual recognition; and answers some possible objections to the paradox of knowing being dependent on having already known.
Steven Z. Rapcsak
- Published in print:
- 2013
- Published Online:
- January 2014
- ISBN:
- 9780195395549
- eISBN:
- 9780199369201
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195395549.003.0006
- Subject:
- Psychology, Cognitive Neuroscience, Neuropsychology
Neuropsychological evidence suggests that the recognition of facial identity is mediated by a distributed neural system. Damage to the temporal versus frontal lobe components of this face memory ...
More
Neuropsychological evidence suggests that the recognition of facial identity is mediated by a distributed neural system. Damage to the temporal versus frontal lobe components of this face memory network produces qualitatively different types of recognition impairments. Specifically, whereas temporal lobe lesions result in clinical syndromes characterized by memory loss for familiar faces (prosopagnosia, person recognition disorders), frontal lobe lesions give rise to memory distortions involving false recognition/misidentification of unfamiliar faces. To account for these observations, we propose that dynamic functional interactions between temporal lobe memory and frontal executive systems normally play a critical role in maintaining face recognition accuracy by modulating the relationship between two complementary cognitive operations that involve processing faces at different levels of specificity: individuation and categorization.Less
Neuropsychological evidence suggests that the recognition of facial identity is mediated by a distributed neural system. Damage to the temporal versus frontal lobe components of this face memory network produces qualitatively different types of recognition impairments. Specifically, whereas temporal lobe lesions result in clinical syndromes characterized by memory loss for familiar faces (prosopagnosia, person recognition disorders), frontal lobe lesions give rise to memory distortions involving false recognition/misidentification of unfamiliar faces. To account for these observations, we propose that dynamic functional interactions between temporal lobe memory and frontal executive systems normally play a critical role in maintaining face recognition accuracy by modulating the relationship between two complementary cognitive operations that involve processing faces at different levels of specificity: individuation and categorization.
Kelly A. Gates
- Published in print:
- 2011
- Published Online:
- March 2016
- ISBN:
- 9780814732090
- eISBN:
- 9780814733035
- Item type:
- chapter
- Publisher:
- NYU Press
- DOI:
- 10.18574/nyu/9780814732090.003.0004
- Subject:
- Society and Culture, Media Studies
This chapter examines how social uses of facial recognition and other biometrics are being defined at the level of individual users, and how the securitization of identity is incorporated at the ...
More
This chapter examines how social uses of facial recognition and other biometrics are being defined at the level of individual users, and how the securitization of identity is incorporated at the level of individual practice. While biometric identification systems are being envisioned and designed mainly for large-scale institutional uses, developers have experimented with consumer applications. These consumer applications encourage the cooperation of individual users in the process of biometric system development and institutionalization. Moreover, consumer application of biometrics are designed with the new responsibilities and competencies of the security-conscious, tech-savvy citizen in mind. The chapter then looks at two types of consumer applications: personal security applications and facial recognition software designed for the management of personal photo collections and online photo sharing.Less
This chapter examines how social uses of facial recognition and other biometrics are being defined at the level of individual users, and how the securitization of identity is incorporated at the level of individual practice. While biometric identification systems are being envisioned and designed mainly for large-scale institutional uses, developers have experimented with consumer applications. These consumer applications encourage the cooperation of individual users in the process of biometric system development and institutionalization. Moreover, consumer application of biometrics are designed with the new responsibilities and competencies of the security-conscious, tech-savvy citizen in mind. The chapter then looks at two types of consumer applications: personal security applications and facial recognition software designed for the management of personal photo collections and online photo sharing.
Kelly A. Gates
- Published in print:
- 2011
- Published Online:
- March 2016
- ISBN:
- 9780814732090
- eISBN:
- 9780814733035
- Item type:
- chapter
- Publisher:
- NYU Press
- DOI:
- 10.18574/nyu/9780814732090.003.0003
- Subject:
- Society and Culture, Media Studies
This chapter studies the preoccupation with facial recognition technology (FRT) in the post-9/11 context. It considers claims of its technical neutrality by investigating the cultural logic that ...
More
This chapter studies the preoccupation with facial recognition technology (FRT) in the post-9/11 context. It considers claims of its technical neutrality by investigating the cultural logic that defined the technology and the practical politics that shaped system development. While the promise of facial recognition lay in its potential to individualize the terrorist threat by targeting specifically identified “terrorist” individuals, the effort to define it as a homeland security technology also made use of an implicit classifying logic, including rhetorical moves that reinforced old-fashioned notions of deviant facial types. Thus, the “facialization” of terrorism—defining non-state forms of political violence with recourse to the racist logic of a mythic and demonized facial type—was prevalent in discourse about FRT, appearing alongside claims about its technical neutrality.Less
This chapter studies the preoccupation with facial recognition technology (FRT) in the post-9/11 context. It considers claims of its technical neutrality by investigating the cultural logic that defined the technology and the practical politics that shaped system development. While the promise of facial recognition lay in its potential to individualize the terrorist threat by targeting specifically identified “terrorist” individuals, the effort to define it as a homeland security technology also made use of an implicit classifying logic, including rhetorical moves that reinforced old-fashioned notions of deviant facial types. Thus, the “facialization” of terrorism—defining non-state forms of political violence with recourse to the racist logic of a mythic and demonized facial type—was prevalent in discourse about FRT, appearing alongside claims about its technical neutrality.
Kelly A. Gates
- Published in print:
- 2011
- Published Online:
- March 2016
- ISBN:
- 9780814732090
- eISBN:
- 9780814733035
- Item type:
- book
- Publisher:
- NYU Press
- DOI:
- 10.18574/nyu/9780814732090.001.0001
- Subject:
- Society and Culture, Media Studies
Since the 1960s, a significant effort has been underway to program computers to “see” the human face—to develop automated systems for identifying faces and distinguishing them from one ...
More
Since the 1960s, a significant effort has been underway to program computers to “see” the human face—to develop automated systems for identifying faces and distinguishing them from one another—commonly known as Facial Recognition Technology (FRT). While computer scientists are developing FRT in order to design more intelligent and interactive machines, businesses and states agencies view the technology as uniquely suited for “smart” surveillance—systems that automate the labor of monitoring in order to increase their efficacy and spread their reach. Tracking this technological pursuit, this book identifies FRT as a prime example of the failed technocratic approach to governance, where new technologies are pursued as shortsighted solutions to complex social problems. Culling news stories, press releases, policy statements, PR kits and other materials, the book provides evidence that, instead of providing more security for more people, the pursuit of FRT is being driven by the priorities of corporations, law enforcement and state security agencies, all convinced of the technology's necessity and unhindered by its complicated and potentially destructive social consequences. By focusing on the politics of developing and deploying these technologies, the book argues not for the inevitability of a particular technological future, but for its profound contingency and contestability.Less
Since the 1960s, a significant effort has been underway to program computers to “see” the human face—to develop automated systems for identifying faces and distinguishing them from one another—commonly known as Facial Recognition Technology (FRT). While computer scientists are developing FRT in order to design more intelligent and interactive machines, businesses and states agencies view the technology as uniquely suited for “smart” surveillance—systems that automate the labor of monitoring in order to increase their efficacy and spread their reach. Tracking this technological pursuit, this book identifies FRT as a prime example of the failed technocratic approach to governance, where new technologies are pursued as shortsighted solutions to complex social problems. Culling news stories, press releases, policy statements, PR kits and other materials, the book provides evidence that, instead of providing more security for more people, the pursuit of FRT is being driven by the priorities of corporations, law enforcement and state security agencies, all convinced of the technology's necessity and unhindered by its complicated and potentially destructive social consequences. By focusing on the politics of developing and deploying these technologies, the book argues not for the inevitability of a particular technological future, but for its profound contingency and contestability.
Wheeler Winston Dickson
- Published in print:
- 2013
- Published Online:
- September 2013
- ISBN:
- 9780813142173
- eISBN:
- 9780813142555
- Item type:
- book
- Publisher:
- University Press of Kentucky
- DOI:
- 10.5810/kentucky/9780813142173.001.0001
- Subject:
- Film, Television and Radio, Film
Streaming: Movies, Media and Instant Access is distinctive and commercially viable because it examines the most crucial area in moving image studies today; the way that the image is captured, ...
More
Streaming: Movies, Media and Instant Access is distinctive and commercially viable because it examines the most crucial area in moving image studies today; the way that the image is captured, disseminated, and consumed by contemporary audiences, and the manner in which this process, or series of processes, is constantly being revised. Readers will gain from the book a better understanding of the enormous shift that this switch to digital will make in the habits of viewers, who can now see films on everything from cell phones to conventional theatre screens. Streaming: Movies, Media and Instant Access will chart the ways in which the Hollywood model of embracing digital production is spreading around the world, while still maintaining an almost monolithic grip on the international market. Streaming: Movies, Media and Instant Access will thus focus on Hollywood production, as the model that still informs international film production in both a genre and star-based model, but show how this model is now spreading throughout the planet. In addition, Streaming: Movies, Media and Instant Access will examine how the new digital world impacts how we access music, books, and also how digital culture, through surveillance devices and facial recognition systems, documents every facet of our everyday life.Less
Streaming: Movies, Media and Instant Access is distinctive and commercially viable because it examines the most crucial area in moving image studies today; the way that the image is captured, disseminated, and consumed by contemporary audiences, and the manner in which this process, or series of processes, is constantly being revised. Readers will gain from the book a better understanding of the enormous shift that this switch to digital will make in the habits of viewers, who can now see films on everything from cell phones to conventional theatre screens. Streaming: Movies, Media and Instant Access will chart the ways in which the Hollywood model of embracing digital production is spreading around the world, while still maintaining an almost monolithic grip on the international market. Streaming: Movies, Media and Instant Access will thus focus on Hollywood production, as the model that still informs international film production in both a genre and star-based model, but show how this model is now spreading throughout the planet. In addition, Streaming: Movies, Media and Instant Access will examine how the new digital world impacts how we access music, books, and also how digital culture, through surveillance devices and facial recognition systems, documents every facet of our everyday life.
Michael D. White and Aili Malm
- Published in print:
- 2020
- Published Online:
- September 2020
- ISBN:
- 9781479820177
- eISBN:
- 9781479865864
- Item type:
- chapter
- Publisher:
- NYU Press
- DOI:
- 10.18574/nyu/9781479820177.003.0005
- Subject:
- Sociology, Law, Crime and Deviance
There are two objectives in this chapter. The first is a forward-looking review of the next set of challenges for BWC adopters. These challenges span the factors that can influence diffusion ...
More
There are two objectives in this chapter. The first is a forward-looking review of the next set of challenges for BWC adopters. These challenges span the factors that can influence diffusion (characteristics of the innovation, innovators, and environment) and center on both human and technological elements of a BWC program. The authors assess the next set of human-based challenges with BWCs, such as addressing activation compliance (and dealing with low-end activators), addressing controversies surrounding the public release of video and officers’ authority to review video after a critical incident (i.e., a shooting), managing citizens’ and other nonusers’ expectations of the technology (handling the onset of a “CSI effect” with BWCs, where if there is no video, then it did not happen), and being responsive to changing laws on evidence, privacy, and access to BWC footage. The authors also consider emerging technological innovations such as automatic activation, the integration of BWCs and facial recognition, and the role and use of “big data” with BWCs. The second objective centers on planning and implementation. More specifically, the authors delve into how law enforcement agencies can navigate the well-known and newly emerging challenges surrounding BWCs in order optimize the likelihood of achieving positive outcomes. In particular, they focus on a “best-practice” implementation guide developed by the US Department of Justice, called the “Law Enforcement Implementation Checklist.” The chapter concludes with a few important takeaway messages regarding the future of BWCs in policing.Less
There are two objectives in this chapter. The first is a forward-looking review of the next set of challenges for BWC adopters. These challenges span the factors that can influence diffusion (characteristics of the innovation, innovators, and environment) and center on both human and technological elements of a BWC program. The authors assess the next set of human-based challenges with BWCs, such as addressing activation compliance (and dealing with low-end activators), addressing controversies surrounding the public release of video and officers’ authority to review video after a critical incident (i.e., a shooting), managing citizens’ and other nonusers’ expectations of the technology (handling the onset of a “CSI effect” with BWCs, where if there is no video, then it did not happen), and being responsive to changing laws on evidence, privacy, and access to BWC footage. The authors also consider emerging technological innovations such as automatic activation, the integration of BWCs and facial recognition, and the role and use of “big data” with BWCs. The second objective centers on planning and implementation. More specifically, the authors delve into how law enforcement agencies can navigate the well-known and newly emerging challenges surrounding BWCs in order optimize the likelihood of achieving positive outcomes. In particular, they focus on a “best-practice” implementation guide developed by the US Department of Justice, called the “Law Enforcement Implementation Checklist.” The chapter concludes with a few important takeaway messages regarding the future of BWCs in policing.
Cristóbal Curio, Heinrich H. Bülthoff, and Martin A. Giese
- Published in print:
- 2010
- Published Online:
- August 2013
- ISBN:
- 9780262014533
- eISBN:
- 9780262289313
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262014533.003.0001
- Subject:
- Psychology, Vision
This book discusses developments that have occurred recently in the field of the recognition and modeling of dynamic faces. It discusses the topics in neuroscience that are important for researchers ...
More
This book discusses developments that have occurred recently in the field of the recognition and modeling of dynamic faces. It discusses the topics in neuroscience that are important for researchers in biological science, neuroscience, and computer science, as well as the psychophysics of dynamic face perception and computational models depicting how dynamic faces are processed in the brain. The book emphasizes that the principles used by the brain to recognize dynamic faces help to provide technical solutions in computer vision. Additionally, knowledge required for improving technical systems for the recognition and animation of dynamic faces has significance in the field of computer science.Less
This book discusses developments that have occurred recently in the field of the recognition and modeling of dynamic faces. It discusses the topics in neuroscience that are important for researchers in biological science, neuroscience, and computer science, as well as the psychophysics of dynamic face perception and computational models depicting how dynamic faces are processed in the brain. The book emphasizes that the principles used by the brain to recognize dynamic faces help to provide technical solutions in computer vision. Additionally, knowledge required for improving technical systems for the recognition and animation of dynamic faces has significance in the field of computer science.
Dan Zahavi
- Published in print:
- 2014
- Published Online:
- January 2015
- ISBN:
- 9780199590681
- eISBN:
- 9780191789656
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199590681.003.0013
- Subject:
- Philosophy, Moral Philosophy
This chapter discusses research on facial self-recognition. The ability to recognize one’s own face, for instance by passing the mirror mark test, has often been heralded as providing empirical ...
More
This chapter discusses research on facial self-recognition. The ability to recognize one’s own face, for instance by passing the mirror mark test, has often been heralded as providing empirical evidence for the presence of self-consciousness. A failure to pass the test has also been seen as evidence for the absence of self-consciousness. Some, such as Gallup, have even argued that creatures incapable of passing such a test lack conscious experiences altogether. The latter interpretations are criticized, and the plausibility of an alternative interpretation of mirror self-experience is assessed, one that sees facial self-recognition as testifying to the presence of a rather special kind of self-consciousness, namely, one that in the case of human beings often has a distinctive social dimension to it.Less
This chapter discusses research on facial self-recognition. The ability to recognize one’s own face, for instance by passing the mirror mark test, has often been heralded as providing empirical evidence for the presence of self-consciousness. A failure to pass the test has also been seen as evidence for the absence of self-consciousness. Some, such as Gallup, have even argued that creatures incapable of passing such a test lack conscious experiences altogether. The latter interpretations are criticized, and the plausibility of an alternative interpretation of mirror self-experience is assessed, one that sees facial self-recognition as testifying to the presence of a rather special kind of self-consciousness, namely, one that in the case of human beings often has a distinctive social dimension to it.
Bernadette Wegenstein
- Published in print:
- 2012
- Published Online:
- August 2013
- ISBN:
- 9780262232678
- eISBN:
- 9780262301114
- Item type:
- book
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262232678.001.0001
- Subject:
- Society and Culture, Media Studies
If the gaze can be understood to mark the disjuncture between how we see ourselves and how we want to be seen by others, the cosmetic gaze—in this book’s formulation—is one through which the act of ...
More
If the gaze can be understood to mark the disjuncture between how we see ourselves and how we want to be seen by others, the cosmetic gaze—in this book’s formulation—is one through which the act of looking at our bodies and the bodies of others is already informed by the techniques, expectations, and strategies (often surgical) of bodily modification. It is, the author says, also a moralizing gaze, a way of looking at bodies as awaiting both physical and spiritual improvement. The book charts this synthesis of outer and inner transformation. It shows how the cosmetic gaze underlies the “rebirth” celebrated in today’s makeover culture and how it builds upon a body concept which has collapsed into its mediality. In today’s beauty discourse—on reality TV and websites that collect “bad plastic surgery”—we yearn to experience a bettered self which has been reborn from its own flesh and is now itself, like a digitally remastered character in a classic Hollywood movie, immortal. The author traces the cosmetic gaze from eighteenth-century ideas about physiognomy through television makeover shows and facial-recognition software to cinema—which, like our other screens, never ceases to show us our bodies as they could be, drawing life from the very cosmetic gaze it transmits.Less
If the gaze can be understood to mark the disjuncture between how we see ourselves and how we want to be seen by others, the cosmetic gaze—in this book’s formulation—is one through which the act of looking at our bodies and the bodies of others is already informed by the techniques, expectations, and strategies (often surgical) of bodily modification. It is, the author says, also a moralizing gaze, a way of looking at bodies as awaiting both physical and spiritual improvement. The book charts this synthesis of outer and inner transformation. It shows how the cosmetic gaze underlies the “rebirth” celebrated in today’s makeover culture and how it builds upon a body concept which has collapsed into its mediality. In today’s beauty discourse—on reality TV and websites that collect “bad plastic surgery”—we yearn to experience a bettered self which has been reborn from its own flesh and is now itself, like a digitally remastered character in a classic Hollywood movie, immortal. The author traces the cosmetic gaze from eighteenth-century ideas about physiognomy through television makeover shows and facial-recognition software to cinema—which, like our other screens, never ceases to show us our bodies as they could be, drawing life from the very cosmetic gaze it transmits.
Mahesh K. Joshi and J.R. Klein
- Published in print:
- 2018
- Published Online:
- September 2018
- ISBN:
- 9780198827481
- eISBN:
- 9780191866388
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780198827481.003.0015
- Subject:
- Business and Management, Political Economy
Life-altering technology is not only improving our lifestyle but also creating new business models. Integration of technology into everyday life is a primary driver of changes in lifestyle. Whether ...
More
Life-altering technology is not only improving our lifestyle but also creating new business models. Integration of technology into everyday life is a primary driver of changes in lifestyle. Whether visible or not, today’s technology is everywhere. Consumers come home from work to a smart house that greets them with music, emails them the foods the refrigerator needs, and through spatial phase imaging technology senses their mood. Without human intervention it changes its presentation based on data indicators embedded in everything. The house recognizes mood and compares it with past behaviors, facial reactions, timeline, and acts accordingly. All this happens through a standard security camera with pixelate three-dimensional technology. The same technology can identify the anti-social elements in a crowd, enhance security at any public event venue, and allow doctors to see under our skin without intrusion.Less
Life-altering technology is not only improving our lifestyle but also creating new business models. Integration of technology into everyday life is a primary driver of changes in lifestyle. Whether visible or not, today’s technology is everywhere. Consumers come home from work to a smart house that greets them with music, emails them the foods the refrigerator needs, and through spatial phase imaging technology senses their mood. Without human intervention it changes its presentation based on data indicators embedded in everything. The house recognizes mood and compares it with past behaviors, facial reactions, timeline, and acts accordingly. All this happens through a standard security camera with pixelate three-dimensional technology. The same technology can identify the anti-social elements in a crowd, enhance security at any public event venue, and allow doctors to see under our skin without intrusion.
Kriss Ravetto-Biagioli
- Published in print:
- 2019
- Published Online:
- February 2019
- ISBN:
- 9780190853990
- eISBN:
- 9780190854034
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780190853990.003.0005
- Subject:
- Literature, Film, Media, and Cultural Studies
Uncanny aesthetics examines how the discourse of the uncanny emerged from a reading of E. T. A Hoffmann’s short story “The Sandman,” in the works of Ernst Jentsch and Sigmund Freud, and how these ...
More
Uncanny aesthetics examines how the discourse of the uncanny emerged from a reading of E. T. A Hoffmann’s short story “The Sandman,” in the works of Ernst Jentsch and Sigmund Freud, and how these readings have shaped the way we think about the uncanny as both experiential and aesthetic. These interpretations demonstrate, as Samuel Weber puts it, “a certain indecidability” between what we personally experience and what is predetermined. The uncanny has, however, shifted from a fear of confronting unhuman objects to the fear of being exposed to others beyond the devices and programs with which we have intimate relations, and the existential crisis of not measuring up to the technologies that simulate us.Less
Uncanny aesthetics examines how the discourse of the uncanny emerged from a reading of E. T. A Hoffmann’s short story “The Sandman,” in the works of Ernst Jentsch and Sigmund Freud, and how these readings have shaped the way we think about the uncanny as both experiential and aesthetic. These interpretations demonstrate, as Samuel Weber puts it, “a certain indecidability” between what we personally experience and what is predetermined. The uncanny has, however, shifted from a fear of confronting unhuman objects to the fear of being exposed to others beyond the devices and programs with which we have intimate relations, and the existential crisis of not measuring up to the technologies that simulate us.
Kim L. Fridkin and Patrick J. Kenney
- Published in print:
- 2019
- Published Online:
- May 2019
- ISBN:
- 9780190947569
- eISBN:
- 9780190947606
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780190947569.003.0002
- Subject:
- Political Science, American Politics
Chapter 2 presents the divergent data sets, collected in 2014, 2015, 2016, and 2017 and focusing primarily on the 2014 U.S. Senate campaigns, used to test the tolerance and tactics theory of ...
More
Chapter 2 presents the divergent data sets, collected in 2014, 2015, 2016, and 2017 and focusing primarily on the 2014 U.S. Senate campaigns, used to test the tolerance and tactics theory of negativity. U.S. Senate elections are the ideal laboratory for exploring the impact of negative advertising because senatorial campaigns are characterized by impressive variability in the amount, content, and tone of negativity, the types of candidates, the size of the constituencies, and the characteristics of the media markets. A variety of methods, including surveys, experiments, content analyses, focus groups, and facial recognition software are used to measure people’s tolerance for negativity; the relevance and civility of negative advertisements; and people’s reactions to negative commercials varying in civility and relevance. These various data sets are ultimately used to assess the impact of negative advertisements on people’s assessments of candidates and on their decision to vote on Election Day.Less
Chapter 2 presents the divergent data sets, collected in 2014, 2015, 2016, and 2017 and focusing primarily on the 2014 U.S. Senate campaigns, used to test the tolerance and tactics theory of negativity. U.S. Senate elections are the ideal laboratory for exploring the impact of negative advertising because senatorial campaigns are characterized by impressive variability in the amount, content, and tone of negativity, the types of candidates, the size of the constituencies, and the characteristics of the media markets. A variety of methods, including surveys, experiments, content analyses, focus groups, and facial recognition software are used to measure people’s tolerance for negativity; the relevance and civility of negative advertisements; and people’s reactions to negative commercials varying in civility and relevance. These various data sets are ultimately used to assess the impact of negative advertisements on people’s assessments of candidates and on their decision to vote on Election Day.