User:Andre Castro/2/Transmedial/spam transmedial: Difference between revisions
Andre Castro (talk | contribs) |
Andre Castro (talk | contribs) (→plan) |
||
(10 intermediate revisions by the same user not shown) | |||
Line 5: | Line 5: | ||
=Questions= | =Questions= | ||
* How can spam be re-published whiles maintaining its networked aspect? | * '''How can spam be re-published whiles maintaining its networked aspect?''' | ||
* | ** Bestiary: can these characters forge any type of relation? Can the relationships they had in the spam be preserved when entered into the book? | ||
* What publishing strategies allow for | |||
* | |||
** | * '''Can the other renditions of spam make its characteristic elements more apparent? Can the re-published forms guide our attention to look at spam as more than junk? | ||
''' | |||
* '''What publishing strategies best allow for both the networked and the formal nature of spam to be present? | |||
''' | |||
* '''why is spam interesting?''' | |||
** Spam uses artistic (literary) strategies to enticing and captivating the reader. However no artistic recognition is expected, but a monetary reward. '''Literature as a money making machine''' | |||
** Employed literary strategies are both unexpected and unusual: case of misspellings | |||
** is quite formal: functions can be isolated that than filled with characters and their actions | |||
** mixes fiction and reality, but all is presented as factual. | |||
*** real existing characters, often referred in the mass-media are often chosen to fulfill the role of the character who dies living behind a large sum of money | |||
*** the spam message in which they are mentioned often adds clues to the relationships and history of this deceased character. | |||
=Expectations= | =Expectations= | ||
Line 20: | Line 32: | ||
=Workshop= | |||
==plan== | |||
Structure for the 2 hours 12-14 | |||
* '''20min introduction''' | |||
* 20min introduction | |||
** Quick and broad presentation of the workshop | ** Quick and broad presentation of the workshop | ||
** Silvio | ** Silvio examples of art projects that deal with spam | ||
** Andre introduction to the spam-database, and some of his points of interest in spam | ** Andre introduction to the spam-database, and some of his points of interest in spam | ||
* 40min | * '''40min browse the spam db/junk mail folder; (Rule 1,2)''' | ||
** | ** Identifying aspects that will help you in the portrait; | ||
* | * '''20min hear participants about their choice and implementation idea''' | ||
* | * '''30min implement the portrait''' | ||
* | * '''10min for feedback''' | ||
* 15 - pipe mail system will be working. | |||
http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/ | |||
---- | ---- | ||
=The Bestiary= | ==The Bestiary== | ||
===Technical necessities=== | ===Technical necessities=== | ||
* scanner - andre's friend boroughs 1 | * scanner - andre's friend boroughs 1 | ||
* printer - Eleanor asked for 1 (has to check in printing doesn't conflict) | * printer - Eleanor asked for 1 (has to check in printing doesn't conflict) | ||
* | * pen knife - buy 1 | ||
* ruler - andre's friend boroughs 1 | |||
Line 142: | Line 99: | ||
=== | =Other workshop possibilities= | ||
==spammers give away spam and resort to postcards== | |||
Participants take the role of spammers who decided on embrace a different medium for their scams: Postcards | |||
Based on existing spam messages the participant will write postcards that try to lure the recipient into providing them personal data or money. | |||
The existing database will be used a resource for: | |||
* detection of the strategies used by spammers to succeed in their scams: | |||
** employment of actual individuals as character of their messages | |||
** creation believable scenarios, intimate and confessional mode of address | |||
** resource to one's greed or compassion, employment of stereotypes, such as African's being corrupt, poor, or extremely religious) | |||
* rich characters to be found | |||
** '''+ about characters ...''' | |||
* catchy and convincing sentences ready to be written into a postcard. | |||
==the narratives described in spam, through their characters=== | |||
* As the same character might appear in a more than 1 one email | * As the same character might appear in a more than 1 one email | ||
* As characters are often actual living(or dead) characters | * As characters are often actual living(or dead) characters | ||
Line 156: | Line 132: | ||
* could this be a final published object or it could be a intermediary to another publication. | * could this be a final published object or it could be a intermediary to another publication. | ||
==the formulistic nature of spam== | |||
Spam's language and structure is quite identifiable. It reaffirms and repeats itself in almost every spam email. | Spam's language and structure is quite identifiable. It reaffirms and repeats itself in almost every spam email. | ||
Line 174: | Line 150: | ||
''' | ''' | ||
* create head-body-and-legs with these sentences | * create head-body-and-legs with these sentences | ||
For example: | For example: | ||
Line 198: | Line 157: | ||
** draw a portrait of that character, either by images, texts (found or created then) | ** draw a portrait of that character, either by images, texts (found or created then) | ||
** how can this portraits be assembled together, as one whole? Into a pdf?</span> | ** how can this portraits be assembled together, as one whole? Into a pdf?</span> | ||
Latest revision as of 08:48, 30 January 2013
How to create writing and hybrid media publications from your junk mail folder.
Drawing from a spam database, create a work that highlights characteristic aspects of spam emails.
Questions
- How can spam be re-published whiles maintaining its networked aspect?
- Bestiary: can these characters forge any type of relation? Can the relationships they had in the spam be preserved when entered into the book?
- Can the other renditions of spam make its characteristic elements more apparent? Can the re-published forms guide our attention to look at spam as more than junk?
- What publishing strategies best allow for both the networked and the formal nature of spam to be present?
- why is spam interesting?
- Spam uses artistic (literary) strategies to enticing and captivating the reader. However no artistic recognition is expected, but a monetary reward. Literature as a money making machine
- Employed literary strategies are both unexpected and unusual: case of misspellings
- is quite formal: functions can be isolated that than filled with characters and their actions
- mixes fiction and reality, but all is presented as factual.
- real existing characters, often referred in the mass-media are often chosen to fulfill the role of the character who dies living behind a large sum of money
- the spam message in which they are mentioned often adds clues to the relationships and history of this deceased character.
Expectations
What do we intend to get out of the workshop?
- new insights of what elements are specific to spam.
- concepts/prototypes for spam publishing that:
- avoid its crystallization
- are able to put forward and networked and evolving nature.
- end the workshop with a tangible outcome,: a pdf to be printed on demand
Workshop
plan
Structure for the 2 hours 12-14
- 20min introduction
- Quick and broad presentation of the workshop
- Silvio examples of art projects that deal with spam
- Andre introduction to the spam-database, and some of his points of interest in spam
- 40min browse the spam db/junk mail folder; (Rule 1,2)
- Identifying aspects that will help you in the portrait;
- 20min hear participants about their choice and implementation idea
- 30min implement the portrait
- 10min for feedback
- 15 - pipe mail system will be working.
http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/
The Bestiary
Technical necessities
- scanner - andre's friend boroughs 1
- printer - Eleanor asked for 1 (has to check in printing doesn't conflict)
- pen knife - buy 1
- ruler - andre's friend boroughs 1
Meeting w/ florian
pipe mail system
A pipe mailing system that will be in place in TM. This is based on a system for exchange of messages that existed in Berlin in 1950s.
Spam can circulate through this system.
- email - Lukas Grundmann - tech person - email him about wanting to use the pipe mail system;
Sugestions
- make it a bit of competive element to make it speed up
Other workshop possibilities
spammers give away spam and resort to postcards
Participants take the role of spammers who decided on embrace a different medium for their scams: Postcards Based on existing spam messages the participant will write postcards that try to lure the recipient into providing them personal data or money. The existing database will be used a resource for:
- detection of the strategies used by spammers to succeed in their scams:
- employment of actual individuals as character of their messages
- creation believable scenarios, intimate and confessional mode of address
- resource to one's greed or compassion, employment of stereotypes, such as African's being corrupt, poor, or extremely religious)
- rich characters to be found
- + about characters ...
- catchy and convincing sentences ready to be written into a postcard.
the narratives described in spam, through their characters=
- As the same character might appear in a more than 1 one email
- As characters are often actual living(or dead) characters
- As they are often famous and with a large presence in the media
- They are related to other characters outside the spam narratives
Characters' profiles can be drawn in great detail. And they can be interconnected to those related to them (both in spam narratives and in real-life). Such well web of strong characters opens up the possibility for re-writing the narrative between this characters
Questions
- what form to publish this network of characters so that their interconnections become apparent?
- how does it allow expansion, speculation, for narratives to emerge from the vision of characters' relations?
- could this be a final published object or it could be a intermediary to another publication.
the formulistic nature of spam
Spam's language and structure is quite identifiable. It reaffirms and repeats itself in almost every spam email.
With All Due Respect My name is morgan ashante am the manager of auditing and accounting department International commercial bank
I pray this proposal meet your kind co-operation. I am Mr. Mphilo Dlamini, the service Director/ Account Unit of First National Bank of South Africa.
My name is Mrs.Sonia Murphy am the manager of auditing and accounting department International commercial bank
My Name is Mrs.Janet Andrea. I am a dying woman who has decided to donate all that I have to charity through you.
My Name is Mr. Peter i am writing you this short note based on the latest development at my bank
What could be a publishing solution that would put a focus on this formulistic aspect o spam?
- create head-body-and-legs with these sentences
For example:
- Head-chest-legs book - idea is already too specific. It doesn't allow much development.
- A character investigation/narrative a broader proposal:
- the proposal could be: pick a character referred to in spam emails;
- draw a portrait of that character, either by images, texts (found or created then)
- how can this portraits be assembled together, as one whole? Into a pdf?