User:Michaela/thesis: Difference between revisions
No edit summary |
No edit summary |
||
Line 57: | Line 57: | ||
Barbrook. Richard / | Barbrook. Richard / | ||
[[http://constantvzw.org/verlag/spip.php?page=article&id_article=20&mot_filtre=9&id_lang=0]] | [[http://constantvzw.org/verlag/spip.php?page=article&id_article=20&mot_filtre=9&id_lang=0 The Regulation of Liberty: free speech, free trade and free gifts on the Net]] | ||
'''notes on :''' <br> | '''notes on :''' <br> |
Revision as of 15:51, 4 March 2014
Useful links:
A Guide to Essay Writing
Draft_ thesis skeleton:
ABSTRACT
The traces of digital information are exponential ...
They contain various sources...
They travel, scattered, being trade - transacted or serve as a found footage for an artistic
interventions...
Traces of digital data are tangible. Events or evidences, which meant to be deleted from a system...
they serve as a subject of recovery, revisit and exposure...
INTRO
This text will departure from the notion of property and ownership to digital property/ digital rights and digital ownership.
The definition of property according to history, law, cultural studies ( intellectual property / copyright ad copyleft regimes) and art in order to examine the question of the digital property.
New Skeleton Grad Thesis:
< ctrl + C / ctrl +V chapter :.
- use value the power of the copy or hard to distinguish from the original ( +, - )
argument: digital object allows multiple copies of one single file, reproducing an accurate / exact copy of the original. Comparing with the analog object where every copy modifies the original. Moreover each copying of the copy introduce / induce noise to the copy and the original itself.
<Enter chapter :.
- share value or the digital object inherit the distribution value
argument: tangible and intangible properties of the digital object or the lost of the physicality, so it makes it difficult to apply the same laws.
<Del chapter:.
- expanded storage / the impossibility to delete the digital file / missing erase button
the extend of the storage / memory capacity to save, preserve and archive.
<Shift chapter:.
revisit the copyright law and break the myth of the ownership of digital object.
argument: Copyright enclosure is build on top of the laws, applied to physical property.
It can not be applied to the digital objects because of the nature of the digital and the listed properties.
<?
Owned by nobody, the web could become the common property of all. (R.B)
argument: The digital / digitization made us believe that the knowledge can be free / share and common for all.
Investigate cloud services and the private corporations entering into the public domain.
<conclusion :.
Bibliography (so far):
Kleiner. Dmytri / The Telekommunist Manifesto
Hyves. Lewis // Common as air
Banner. Stuart / American Property: A History of How, Why, and What We Own (Harvard) University Press, 2011); Who Owns the Sky?
Barbrook. Richard / [The Regulation of Liberty: free speech, free trade and free gifts on the Net]
notes on :
Blackstone. William
Locke. John / Of property
===========
possible entry ???
I will map a research from art practices as appropriation, DADA, ready-made and SI applied to my own practice or the current grad project retrieving hard drives and using the information out of them for my own purpose.
===========
old version:
<chapter#1 ownership
<<The story of Ghana digital trash camps:
<<< e-waste, data remanence, data thief
or how the data can be recovered and serve as an evidence
Questions about e-waste and digital recycling, digital trash and data recycling.
<<<'data erasure' term - or the only way to erase data permanently is physically to destroy a hard disk drive. In the past shredders were used to destroy confidential, secret papers now there are replaces by data shredders.
<chapter#2 memory
This chapter will be about the technical aspect of data recovery process more specifically: clusters, partitions, Gutmann method etc.
<chapter#3 code
This chapter is about the performative aspect of the code.
Code as Language
<chapter#4 space
This chapter will be about the final work. Description/ set up etc.
links:
Ghana digital dumping ground article
Illegal e-waste dumped in Ghana includes unencrypted hard drives full of US security secrets
Legend of multiple passes of overwriting:
http://grot.com/wordpress/?p=154
http://www.pcworld.com/article/209418/how_do_i_permanently_delete_files_from_my_hard_disk.html
https://ssd.eff.org/tech/deletion
[http://www.theguardian.com/world/video/2014/jan/31/snowden-files-computer-destroyed-guardian-gchq-basement-video
theguardian_snowden-files-computer-destroyed]