Skip to topic | Skip to bottom
Home
Agora
Agora.DigitalMer1.13 - 13 May 2019 - 02:06 - GregorioIvanoff

Start of topic | Skip to actions

Scenario 2: ‘Dimitrios’ and the Digital Me’ (D-Me)


It is four o’clock in the afternoon. Dimitrios, a 32 year-old employee of a major food-multinational, is taking a coffee at his office’s cafeteria, together with his boss and some colleagues. He doesn’t want to be excessively bothered during this pause. Nevertheless, all the time he is receiving and dealing with incoming calls and mails.

He is proud of ‘being in communication with mankind’: as are many of his friends and some colleagues. Dimitrios is wearing, embedded in his clothes (or in his own body), a voice activated ‘gateway’ or digital avatar of himself, familiarly known as ‘D-Me’ or ‘Digital Me’. A D-Me is both a learning device, learning about Dimitrios from his interactions with his environment, and an acting device offering communication, processing and decision-making functionality. Dimitrios has partly ‘programmed’ it himself, at a very initial stage. At the time, he thought he would ‘upgrade’ this initial data periodically. But he didn’t. He feels quite confident with his D-Me and relies upon its ‘intelligent‘ reactions.

At 4:10 p.m., following many other calls of secondary importance – answered formally but smoothly in corresponding languages by Dimitrios’ D-Me with a nice reproduction of Dimitrios’ voice and typical accent, a call from his wife is further analysed by his D-Me. In a first attempt, Dimitrios’ ‘avatar-like’ voice runs a brief conversation with his wife, with the intention of negotiating a delay while explaining his current environment. Simultaneously, Dimitrios’ D-Me has caught a message from an older person’s D-Me, located in the nearby metro station. This senior has left his home without his medicine and would feel at ease knowing where and how to access similar drugs in an easy way. He has addressed his query in natural speech to his D-Me. Dimitrios happens to suffer from similar heart problems and uses the same drugs. Dimitrios’ D-Me processes the available data as to offer information to the senior. It ‘decides’ neither to reveal Dimitrios’ identity (privacy level), nor to offer Dimitrios’ direct help (lack of availability), but to list the closest drug shops, the alternative drugs, offer a potential contact with the self-help group. This information is shared with the senior’s D-Me, not with the senior himself as to avoid useless information overload.

Meanwhile, his wife’s call is now interpreted by his D-Me as sufficiently pressing to mobilise Dimitrios. It ‘rings’ him using a pre-arranged call tone. Dimitrios takes up the call with one of the available Displayphones of the cafeteria. Since the growing penetration of D-Me, few people still bother to run around with mobile terminals: these functions are sufficiently available in most public and private spaces and your D-Me can always point at the closest … functioning one! The ‘emergency’ is about their child’s homework. While doing his homework their 9 year-old son is meant to offer some insights on everyday life in Egypt. In a brief 3-way telephone conference, Dimitrios offers to pass over the query to the D-Me to search for an available direct contact with a child in Egypt. Ten minutes later, his son is videoconferencing at home with a girl of his own age, and recording this real-time translated conversation as part of his homework. All communicating facilities have been managed by Dimitrios’ D-Me, even while it is still registering new data and managing other queries. The Egyptian correspondent is the daughter of a local businessman, well off and quite keen on technologies. Some luck (and income…) had to participate in what might become a longer lasting new relation.


Keywords: artificial intelligence governance, extended social network, comparative transaction costs, persistent online identity, decision-making practices, governance in signals, production in signals, signals in price, governance in communication, certification in governance, claims in practice, safety in modeling, level of governance, mobile applications, identity management, dynamic capabilities, filter bubbles, social spheres, ambient intelligence, artificial intelligence, smart home, virtual world, phone line, phone number, virtual identities, ratings behavior, citizen identification, electronic legitimation, digital competence, social networks, world scenario, differing viewpoints, social claims, bot personality, cybersecurity, productivity, medium, glass, scenarios, blockchain, inbox, equity, security, bank, profile, reputation, emptiness, bio, Zygmunt Bauman, Twitter, ResearchGate, BankTrack


Palavras-chave: preferências de notificação no celular, desempenho de contratações, soluções criativas, visibilidade, privacidade, personalização


Outcomes: safe and secure autonomous self digital avatar, Dimitrios


Aplicativos que podem acessar sua conta do Twitter. Disponível em < https://twitter.com/settings/applications >. Acesso em 19 jan. 2017.

HTTP Cookie . Available from < https://en.wikipedia.org/wiki/HTTP_cookie >. access on 18 January 2017.

ISTAG. Scenarios for Ambient Intelligence in 2010. EC - Community Research - IST 2001. Available from < http://www.cordis.lu/ist/istag-reports.htm >.

Localização do Tweet: Adicionar uma localização aos meus Tweets; Quando você tweeta com uma localização, o Twitter a armazena. Você pode ativar/desativar a localização antes de cada Tweet. Excluir informações de localização: Isso excluirá os rótulos de localização que você adicionou aos seus Tweets. Isso pode demorar até 30 minutos. Disponível em < https://twitter.com/settings/security > e < https://support.twitter.com/articles/269519 >. Acesso em 19 jan. 2017.

Menção de pessoas e empresas nas atualizações. LinkedIn. Disponível em < https://www.linkedin.com/help/linkedin/answer/37300/mencao-de-pessoas-e-empresas-nas-atualizacoes-perguntas-frequentes?lang=pt >. Acesso em 19 jan. 2017.

OpenID. Available from < https://en.wikipedia.org/wiki/OpenID >. access on 17 January 2017.

Stephenson, Neal. "My self, my avatar, my rights? Rights of avatar identity and integrity in virtual worlds." Available from < http://www.inter-disciplinary.net/ci/cyber%20hub/visions/v3/De%20Zwart%20and%20Lindsay%20paper.pdf >. access on 18 January 2017.

Twitter Bio Generator. Available from < http://twitterbiogenerator.com/ >. access on 19 January 2017.

Twitter para equipes. Security. Disponível em < https://support.twitter.com/articles/20172475 >. Acesso em 19 jan. 2017.

-- GregorioIvanoff - 17 Jan 2017
to top


You are here: Agora > Dimitrios > DigitalMe

to top

Direitos de cópia © 1999-2019 pelos autores que contribuem. Todo material dessa plataforma de colaboração é propriedade dos autores que contribuem.
Ideias, solicitações, problemas relacionados a Ilanet? Dê sua opinião
Copyright © 1999-2019 by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding Ilanet? Send feedback