Sunday 13 December 2009



Here are some pictures of a few of my pieces I took in the photo studio at art school. It's amazing how much better these photos are from the origional ones I took.

Tuesday 8 December 2009

Miro inspired brooches





Phew finally got my brooches finished today for my wire project at uni. We had to design and make either a brooch or a neck piece focusing on wire and line.

I choose to design and make two brooches based around a Miro painting. Miro's paintings are very bold and linear so I tried to stick as close to his style as possible. His paintings are also very colourful so I used a mixture of different coloured materials such as silver, copper and brass to try and reflect this.

I also Incorporated the words hopes and dreams into the brooches. I chose the word dreams because Miro's inspiration for many of his paintings often came from his dreams and kept a notebook by his bed so he could record them. As for the word hope well from dreams come hopes or vise verse.

I did originally have a highly polished finished on the brooches but you couldn't see the colours of the different metals very well so I opted for a matt finish which I think works better.

Tomorrow we're going to be getting shown how to photograph our work properly. Will be interesting to see the difference in those photos to the ones I have already taken. Anyway I'll post them as soon as I have them.

Tuesday 24 November 2009

Design Studies Assignment 4

Well here's my first attempt at an essay in about 8 years I think. Scary to even think that.So I can only hope that I've done a half decent job.
This essay was part of our design studies module and so far this is the only assignment that I can really see the point in. Can't say I've been all that enthused by the other ones.
This essay relates to a previous assignment where I had to come up with a product that would help store and keep safe personal information. My essay focuses mainly on I.d fraud, i.d cards and biometric systems. Doing the research for this essay has been quite an eye opener and to be honest I'll never really look at i.d in the same way again.



Karen Smith
Design Studies Assignment 4

The journal I chose to look at more in depth for this assignment is Jain A K, Pankanti, S (Sep 2008) Beyond Fingerprinting, Scientific American, Business Source Premier
This journal examines biometric systems such as fingerprint, face, voice and iris scanning and how these systems are used in combating identity theft. It also looks at how efficient biometric systems are stating that they are far more difficult to abuse than more traditional methods such as using passwords and ID cards.
According to the authors biometrics is not a new phenomenon. In fact it has been around since 1879 when a French police inspector called Alphonse Bertillon discovered that taking body measurements, such as arm and foot lengths, of inmates were helpful when identifying repeat offenders. In 1896 it was also discovered that every fingerprint is unique to the person which prompted Scotland Yard to start collecting fingerprints from every crime scene.
Although this journal is very much in favour of biometric systems it does however touch on the fact that they are actually not 100% accurate and points out that ‘Experts generally agree that neither the false accept rate nor the false reject rate of a biometric authentication system should exceed 0.1 percent’ Jain A K, Pankanti, S (Sep 2008). However it was discovered during an evaluation from 2003-2006 by the National Institute of Standards Technology that ‘error rates for systems based on the fingerprint, face, iris and voice - another commonly used biometric trait - all exceeded the 0.1 percent level’ Jain A K, Pankanti, S (Sep 2008).
People in general have many concerns about biometric systems and I am inclined to agree these concerns do seem to be justified.
This journal does talk about how these systems are more secure method of protection than ID cards and passwords but it also states that there is no iron clad solution as yet to making ID theft a thing of the past. However the authors do think that it’s only a matter of time before a system is developed that will not only be secure but will regulate itself thus eliminating the concern over who actually has access to these files.
My impression of biometric systems is mixed. On one hand they seem a good thing and on the other not so good. I find it quite scary that ID theft is becoming more and more common which leaves society with the constant need to be constantly developing new methods to try and tackle this major problem. Anyone can be affected and now it can and does happen almost anywhere.
It’s also scary that no matter what new technology has been developed to combat this problem there always seems to be some clever person somewhere who is able to hack into and abuse this information for their own end and profit. It kind of makes you wonder whether or not the battle of ID theft will eventually be won or even can be won. This also leads to the question will identity no longer truly exist?

The book I chose to look at more in depth was David Lyon’s ‘Identifying Citizens, ID cards and Surveillance.’
This book examines how today’s society is constantly striving to establish a national id system and also the current status of identity systems and looks in great detail at surveillance systems - CCTV, biometrics, intelligent transportation systems, smart cards, on-line profiling and examines what is the potential future for biometrics in this day and age. It covers various angles such as historical, technical, political and sociological.
Lyons believes identification is the first step towards surveillance and points out ‘New ID card systems are a species of surveillance but they also share a key characteristic of much contemporary surveillance in that they facilitate forms of social sorting. This is a large-scale and far-reaching trend, enabled in fine-grain form by the use of searchable databases and associated techniques such as data mining, characterized by the classifying and profiling of groups in order to provide different levels of treatment, conditions or services to groups that have thus been distinguished from one another.’ Lyon D (2009) p41
In other words the intention of using ID cards is not only to prevent identity fraud but also to provide us with a better, more personalised service in our daily lives such as personal tastes, places we like to shop, better deals etc.
The rise of e-government, the 9/11 atrocities and global mobility has caused an upsurge in concerns over identity theft thus creating a need for a more secure form of ID system. However Lyons does conclude that the current system of ID needs a total re-think and a total re-think which will become a long term process.
I found this book really interesting especially the part about ID cards not only serving as purely for ID purposes but also this whole notion about companies being able to tap into your personal information i.e. spending habits in order to offer you better deals. Lyons seems very for ID surveillance and I do agree that the world we live in with all its current problems begs some form of identification for safety reasons alone. However I also admit to finding this a bit scary and in my comments earlier about the journal ‘Beyond Fingerprinting’ I felt it necessary to ask whatever happened to anonymity? Surely it should be a person’s right whether they would want to be part of this or not? Surely individual choice should remain an important part of any society or is this becoming unattainable in the current and developing situation?
This journal and book were very similar in the fact that all the authors were very much in favour for some kind of identity biometric system. Both also agree that there are inconsistencies with these systems and as yet they are not 100% reliable.
The other journals I previously referenced were also all in favour of biometric systems. In fact during my research I only came across one journal,(Wagner, P (Apr-June 99) Technology for anonymity: names by other nyms, Information society, Taylor and Francis), that focused more on the negatives of biometrics. The author of this journal was in favour of anonymity and pointed out how the systems that are currently in place to protect it are not entirely reliable. Most of them however did admit that people have major concerns with the biometric and before they can really be fully integrated into society there has to be a lot more research done into this area.
Another of the journals I looked at (Cohn, L (jul 2009) What you need to know about identity theft, Kiplinger’s personal finance, business source premier) looked at how to prevent identity theft in other ways such as always shredding personal documents with a cross shredder. This journal also gave statistical information on how much ID theft costs the consumer each year.
I always knew that ID fraud was a major and ever growing problem. However doing this research has opened my eyes even more to how wide scale and enormous ID theft really is. It’s also brought to light the pros and cons of biometric systems and raises a lot of questions which I’m sure the majority of people would have. I suspect they would ask if biometric systems can ever be 100% secure and reliable? Or will biometrics inadvertently open the door further for fraudsters to assume other people identities more readily?
It also makes you wonder what is wrong with society when we have to go to such lengths just to protect our identity?
Although we live in a technology obsessed society and technology is evolving at a rapid speed when it comes to ID fraud and biometric systems there needs to be more research done before it can be successfully used in everyday life.
Like David Lyon the author of the book ‘Identifying Citizens’ mentioned this will be a long term process. I also have concerns over how much information these identity systems should hold for example holding information on spending habits and personal tastes seems a bit extreme to me.
The main problem seems to be as technology advances so does the skills of the hackers so it poses the question whether biometrics will ever really be completely safe from corruption?
From my reading I am inclined to accept that society is currently placed between a rock and a hard place with a need to ensure safety, protect personal finance and information against fraud, misuse, etc. plus the problem of ever more personal invasion which will almost certainly be resisted by many people.

Bibliography
Cohn, L (jul 2009), What you need to know about identity theft, Kiplinger’s personal finance, Business source premier Jain A K, Pankanti, S (Sep 2008)
Beyond Fingerprinting, Scientific American, Business Source PremierLyon D,(2009),
Identifying Citizens i.d cards as surveillance, Polity PressWagner, P (Apr-June 99) Technology for anonymity: Names by other nyms, Information society, Taylor and Francis

Monday 9 November 2009

Harvard Style

For this design studies assignment we had to gather information from books and journals relating to the spider diagram from the previous assignment. My spider diagram was based on i.d cards so I looked further into this subject also gathering information on i.d theft and biometric systems such as fingerprint, iris and face recognition.
Once this information was gathered we had to compile a list of around 6 texts and present them using Harvard style with a short paragraph outlining what the text is about.
I actually found gathering the information extremely time consuming and more difficult than I thought. I used the online cross-search system to find journals. This took me ages and to be honest almost made me cross eyed starring at a computer screen for so long! I also went to the main library today to see what I could find in the way of books relating to this subject.
So here are my findings.

1 Cohn, L (jul 2009)What you need to know about identity theft, Kiplinger's personal finance, business source premier


This article examines identity theft and tips on how to prevent it such as always shredding documents with a cross shredding machine.
Also gives statistics on how much i.d theft costs the consumer each year.


2 Jain, A K (Sep 2008) Beyond finger printing, Scientific American, Business source premier

This article examines the development in biometric systems such as fingerprinting, face, voice and iris scanning in i.d theft prevention.
Also raises issues concerning privacy and biometric systems i.e where is the data stored and who has access to it.

3 Lyon, D (2009) Identifying Citizens. I.d cards as surveillance, Polity Press

In this book David Lyon examines i.d cards and the new technologies such as biometric systems and how they work. It also raises issues people have with i.d cards and how finding a more stable way of identifying an individual will be a long term process.

4 Quain, J R (21/02/2005) The password is fingertips, U.S News and world report, business source premier (EBSCO)

This article examines biometric fingerprint readers for computers in an attempt to combat i.d fraud. Gives details of various biometric fingerprint readers, how much they cost, how they work and the issues which arise when using such a device.

5 Wayman, J, Jain, A, Maltoni, D, Maio D (2005) Biometric systems technology, design and performance evaluation, Springer- Verlag London Limited

This book explores the current biometric systems and is meant as a reference book for anyone in design and management of biometric systems.
It concentrates on 3 types of biometric systems such as testing protocols and results, the legal and system considerations of biometric systems and also the key features such as fingerprints, speaker, iris and face recognition.

6 Wayner, P (Apr-June 99) Technology of anonymity : Names by other nyms, Information society, Taylor and Francis

This article examines why anonymity is important and how technology can help safe guard it.
It also identifies problems with the technology that is used to protect anonymity.


As part of this assignment we were also asked to compile a top 5 websites keeping us up to date in our discipline, in my case jewellery, and also a list of the top 5 websites out with our discipline. So here they are.

Top 5 Jewellery related websites

1 www.ganoskin.com

2 www.klimt02.net

3 www.objectfetish.com

4 www.whoswhoingoldandsilver.com

5 www.metalcyberspace.com


Top 5 websites out with my discipline

1 http://www.craftscotland.org/

2http://www.paperscissorsstone.info/

3 www.designweek.co.uk

4 www.vam.ac.uk

5http://www.spookyland.com/

Friday 23 October 2009

Tree Teapot















Finally completed my first piece at art school. We had to design and make a vessel drawing inspiration from anything that interested you. I ended up basing my design on nature inparticular trees, bark, leaves,etc. Not the most exciting subject but I think I managed to inject a little bit of humour into my piece.
I decided to make a teapot and tried to make it look like a tree stump.I made it out of copper and then oxidized and used steel wool on it too give the piece a more tree like appearance. I used the idea of tree roots as the feet for the teapot which I think add a little bit of humour. Almost looks like it's going to scurry away.
Have added some photos of various stages of the making process. Hope you enjoy. First one's a bit blurry I'm afraid it was taken with my mobile.








Brainstorming The Tipping Point





As part of our Design Studies Module we were asked to brainstorm a section of the book The Tipping Point.
My group choose the chapter The Power of Context. These photos show our findings from our brainstorming session.
(Sorry my photos are a bit out of sequence. Haven't managed to figured out how to organise them properly on this yet).
We then had to take this information and individually come up with a spider diagram showing the connection between jewellery design and The Power of Context.
I've also included a picture of the spider diagram I came up with. I chose to focus on ID which then led me into coming up with a bracelet that could hold personal information. It would have a usb memory stick in it and information could only be accessed using a password. If the bracelet was stolen or someone else other than the owner tried to wear it the information on the bracelet would be wiped as it would be able to identify the owners own unique smell.
A little far fetched I'm sure you would agree but we were told to think outside the box and think that anything is possible so hopefully that's what I have done.

Saturday 3 October 2009

The Tipping Point






Well that's me been back a week at uni after being ill with tonsillitis and flu. Kinda takes freshers flu to a whole new extreme don't you think? Not a good start to my uni experience. Missed almost 2 weeks so now I'm trying to catch up on everything I missed & I'm a little stressed out right now!
Had my first ever life drawing class this week. Really enjoyed it and for the first time in the week I actually managed to relax & forget about the mountain of work I still have to do!!
I also had my first ever Design studies lecture which was really interesting and wasn't at all what I expected. The lecturer also explained how a blog works and why it is useful. This was really helpful as I'm a bit of a technophobe and to be honest when I found out we had to set up a blog I wasn't too keen on the idea but know I'm coming round to the blogging thing.
As part of Design Studies we were asked to read the book 'The Tipping Point' by Malcolm Gladwell, and then make a mind map on the tipping point focusing on the different sections of the book, and then going into more detail on a particular part. I chose to go into more detail on the chapter 'The Law of the Few'. This particular chapter was really interesting as it describes certain types of people that either connect us in some way or can help us. Gladwell mentions 3 different types, a connector, a maven & a salesman. He also goes into great detail about each types characteristics which helps you identify people you may already know with these qualities.
Anyway the pictures in this post are of the mind map I made on 'The tipping Point'. It was a little too big so I tried to zoom in on different sections so I hope you can read it ok.