Digital Me Scenario (D-Me)
Português - It is four o’clock in the afternoon. Federico, a 32 year-old employee of a major food-multinational,
is taking a coffee at his office’s cafeteria, together with his boss and some colleagues. He doesn’t
want to be excessively bothered during this pause. Nevertheless, all the time he is receiving and
dealing with incoming calls and mails.
He is proud of ‘being in communication with mankind’: as are many of his friends and some
colleagues. Federico is wearing, embedded in his clothes (or in his own body), a voice activated
‘gateway’ or digital avatar of himself, familiarly known as ‘D-Me’ or ‘Digital Me’. A D-Me is both a
learning device, learning about Federico from his interactions with his environment, and an acting
device offering communication, processing and decision-making functionality. Federico has partly
‘programmed’ it himself, at a very initial stage. At the time, he thought he would ‘upgrade’ this
initial data periodically. But he didn’t. He feels quite confident with his D-Me and relies upon its
‘intelligent‘ reactions.
At 4:10 p.m., following many other calls of secondary importance – answered formally but
smoothly in corresponding languages by Federico’s D-Me with a nice reproduction of Federico’s
voice and typical accent, a call from his wife is further analysed by his D-Me. In a first attempt,
Federico’s ‘avatar-like’ voice runs a brief conversation with his wife, with the intention of
negotiating a delay while explaining his current environment. Simultaneously, Federico’s D-Me has
caught a message from an older person’s D-Me, located in the nearby metro station. This senior
has left his home without his medicine and would feel at ease knowing where and how to access
similar drugs in an easy way. He has addressed his query in natural speech to his D-Me.
Federico happens to suffer from similar heart problems and uses the same drugs. Federico’s D-Me
processes the available data as to offer information to the senior. It ‘decides’ neither to reveal
Federico’s identity (privacy level), nor to offer Federico’s direct help (lack of availability), but to list
the closest drug shops, the alternative drugs, offer a potential contact with the self-help group.
This information is shared with the senior’s D-Me, not with the senior himself as to avoid useless
information overload.
Meanwhile, his wife’s call is now interpreted by his D-Me as sufficiently pressing to mobilise
Federico. It ‘rings’ him using a pre-arranged call tone. Federico takes up the call with one of the
available Displayphones of the cafeteria. Since the growing penetration of D-Me, few people still
bother to run around with mobile terminals: these functions are sufficiently available in most
public and private spaces and your D-Me can always point at the closest … functioning one! The
‘emergency’ is about their child’s homework. While doing his homework their 9 year-old son is
meant to offer some insights on everyday life in Egypt. In a brief 3-way telephone conference,
Federico offers to pass over the query to the D-Me to search for an available direct contact with a
child in Egypt. Ten minutes later, his son is videoconferencing at home with a girl of his own age,
and recording this real-time translated conversation as part of his homework. All communicating
facilities have been managed by Federico’s D-Me, even while it is still registering new data and
managing other queries. The Egyptian correspondent is the daughter of a local businessman,
well off and quite keen on technologies. Some luck (and income…) had to participate in what
might become a longer lasting new relation.
Keywords:
extended social network,
comparative transaction costs,
persistent online identity,
decision-making practices,
production in signals,
signals in price,
claims in practice,
safety in modeling,
mobile applications,
identity management,
dynamic capabilities,
filter bubbles,
social spheres,
ambient intelligence,
artificial intelligence,
smart home, virtual world, phone line,
phone number,
virtual identities,
ratings behavior,
citizen identification,
electronic legitimation,
digital competence,
social networks,
world scenario,
differing viewpoints,
social claims,
bot personality,
cybersecurity,
productivity,
governance,
medium,
glass,
scenarios,
blockchain,
inbox,
equity,
security,
profile, reputation,
emptiness,
agency, bank,
bio,
Zygmunt Bauman,
Twitter,
ResearchGate,
BankTrack
Português:
Eu Digital
Outcomes: safe and secure autonomous self digital avatar
HTTP Cookie . Available from <
https://en.wikipedia.org/wiki/HTTP_cookie >. access on 18 January 2017.
ISTAG. Scenarios for Ambient Intelligence in 2010. EC - Community Research - IST 2001. Available from <
https://www.researchgate.net/publication/262007900_Scenarios_for_ambient_intelligence_in_2010 >. access on 5 December 2019.
OpenID. Available from <
https://en.wikipedia.org/wiki/OpenID >. access on 17 January 2017.
Stephenson, Neal. "My self, my avatar, my rights? Rights of avatar identity and integrity in virtual worlds." Available from <
http://www.inter-disciplinary.net/ci/cyber%20hub/visions/v3/De%20Zwart%20and%20Lindsay%20paper.pdf >. access on 18 January 2017.
Twitter Bio Generator. Available from <
http://twitterbiogenerator.com/ >. access on 19 January 2017.
--
GregorioIvanoff - 05 Dec 2019
to top