Privacy, Law, and Ethics in Augmented Reality Panel at AWE 2015 [VIDEO]

awe2015

As AR comes into its own, the legal and ethical issues that come with it can’t be ignored. On June 8, 2015, I had the honor of hosting a 50-minute panel discussion on these topics with Dave Griesbach (Security Expert, Google), Jerri Lynn Hogg (Professor, Fielding University), and Dave Lorenzini (Founder, CEO, EFX). Not only did these[…]

Continue Reading …

What Happens When My Software Provider Disappears?

metaio

Companies go out of business, or get acquired, every day.  Especially in the tech sector.  It’s a fact of life. Still, when it’s a business you’ve come to rely on, it can hurt. A lot. On May 26, 2015, a great number of augmented reality developers got that feeling when Metaio, one of the earliest[…]

Continue Reading …

[VIDEO] Augmented Reality Law, Privacy and Ethics

download

On April 17, 2015, I was a featured speaker at the “Augmented Reality and Perfect Vision By 2020” event hosted by Dave Lorenzini and the Seattle Augmented Reality meetup group. My 45-minute presentation summarized the contents of my book Augmented Reality Law, Privacy and Ethics, published in January 2015 by Elsevier.  [You can get 30%[…]

Continue Reading …

Get $400 Off Augmented World Expo or Win Free Tickets!

awe2015_180x150

This is a special offer for readers of my blog, my social media followers, and members of the AR Detroit Meetup Group. Now in its sixth year, the Augmented World Expo is the premier annual conference for all things in the augmetned world.  USA Today called last year’s AWE “The CES of the Future.” AWE 2015[…]

Continue Reading …

Privacy in Augmented Reality

600_436345112

Earlier this week, I had the opportunity to speak to the Mobile Monday Michigan meetup group on “Privacy in Augmented Reality.” The group also held a drawing for a free copy of my book, Augmented Reality Law, Privacy, and Ethics. A copy of my Prezi slides is embedded below. During the talk, I covered such[…]

Continue Reading …

“Augmented Reality” By Any Other Name: Still as Sweet?

rose - flickr bitsorf

Augmented reality is dead. Long live augmented reality. It has long been predicted by some within the augmented reality community that AR will succeed when people stop calling it “augmented reality.”  By that measure, things are looking up. The last six months has seen a rapid increase in the amount of AR visualization technology entering[…]

Continue Reading …

Top 5 Legal Issues in the Internet of Things, Part 5: Physical Safety

alberto racatumba / flickr

In this series of articles on the Internet of Things, we’ve examined two ways in which IoT devices can be intentionally abused (data security, invasion of privacy), and two systemic limitations that could impede the IoT’s growth (bandwidth overload and lack of interoperability between copyrighted software).  The final topic I will address in this series–physical[…]

Continue Reading …

Top 5 Legal Issues in the Internet of Things, Part 4: Copyright

lego mashup flickr mike chernucha

Imagine a world in which each box of Lego® bricks you buy is a standalone toy–unable to combine with the bricks from any other set. That, of course, is the opposite of the real world. As was brilliantly depicted in 2014’s Lego Movie, actual kids exercise their creativity by combining the bricks from every set[…]

Continue Reading …

Top 5 Legal Issues in the Internet of Things, Part 3: Bandwidth

https://creativecommons.org/licenses/by-nc/2.0/

Over the past two weeks. I’ve written about the privacy implications of the Internet of Things (IoT), with respect to both data security and surreptitious collection of information. Today we consider a more mundane, but no less practical, aspect of the IoT explosion: bandwidth. Consider this: Cisco IBSG predicts there will be 25 billion devices connected to the[…]

Continue Reading …

Top 5 Legal Issues in the Internet of Things, Part 2: Data Collection and Invasion of Privacy

CC BY 2.0 https://creativecommons.org/licenses/by/2.0/

Last week I wrote about the incredibly lax privacy protections used in most Internet of Things (IoT) devices, and how vulnerable they are to hacking. Users are allowing more and more of their health, commercial, and other data to be stored in IoT devices, and the potential of the data being hacked into and misused is ever-present. A closely related,[…]

Continue Reading …