Yahoo奇摩 網頁搜尋

  1. 全面監視 相關

    廣告

搜尋結果

  1. Description. Jess Scully: "Taiwan’s civic hackers were organized around a leaderless collective called g0v (pronounced “gov zero.”) Many believed in radical transparency, in throwing opaque processes open to the light, and in the idea that everyone who is affected by a decision should have a say in it.

    • Description
    • Strategy
    • Discussion

    Sutej Hugu: "The fundamental problem is that ICCAs have been deprived of collective land tenure and rights for natural resources in their traditional territories. Self-determination and self-government of ICCAs is the ultimate goal for us to achieve. Before it comes true, keeping a dynamic and adaptive vision of ICCAs is most important for its surv...

    "TICTU Restoration Strategic Action Plan for disrupted ICCAs Following the holistic approach of rights-institution, knowledge-ethic, and livelihood-wellbeing, TICTU freely promotes the restoration strategic action plans on: a. Tribal Participatory GIS for time-space adaptive information and collective memories. This is going along with tribal herit...

    A brief update on the situation of indigenous Taiwan

    Sutej Hugu: "It is clear that once ICCAs are politically governed by the colonial state apparatus and economically controlled by the global market, they have lost their natural sovereignty and integrity to take care of themselves in their traditional territories. Here is a brief report on the situation of indigenous Taiwan after the formal apology for all the colonial crimes in these four hundred years issued by the new President last August and the launch of the Historical and Transitional J...

  2. 2011年1月26日 · The original ATCA -- Asymmetric Threats Contingency Alliance -- is a philanthropic expert initiative founded in 2001 to resolve complex global challenges through collective Socratic dialogue and joint executive action to build a wisdom based global economy.

  3. 2021年3月3日 · 1. Sousveillance is the conscious capture of processes from below, by individual participants; surveillance is from the top down, while participation capture is inscribed in the very protocols of cooperation and is therefore an automatic ‘inscription’ of what we are doing. Sousveillance may lead to the emergence of a Participatory Panopticon.

  4. 2017年12月16日 · ATU develops 130 gongbans annually in areas ranging from smart phones, tablets, smart watches, smart homes, and industrial controls—and distributes the designs for free. WPI then makes money by trading in the boards’ components. "We call this shanzhai in Shenzhen. It’s a mass production artwork,” explains Lawrence Lin head of the ...

  5. "Inverse surveillance is a proper subset of Sousveillance with a particular emphasis on "watchful vigilance from underneath" and a form of surveillance inquiry or legal protection involving the recording, monitoring, study, or analysis of surveillance systems, proponents of surveillance, and possibly also recordings of authority figures and thei...

  6. = an upgrade to the Open PCR URL = http://chaibio.com/openqpcr Description Perfetto: "The original OpenPCR we released 3 years ago is known as an endpoint PCR ...