User:Michaela/thesis: Difference between revisions

From XPUB & Lens-Based wiki
No edit summary
No edit summary
Line 47: Line 47:
'''argument''': Copyright enclosure is build on top of laws, applied to physical property. <br>
'''argument''': Copyright enclosure is build on top of laws, applied to physical property. <br>
It can not be applied to the digital objects because of the nature of the digital and the listed properties.<br>
It can not be applied to the digital objects because of the nature of the digital and the listed properties.<br>
Case_study : >[http://www.seditionart.com/ Sedition] – an online art platform for selling art where an edition of a hundred unique digital copies are offered for sell. <br>
'''Case_study:''' >[http://www.seditionart.com/ Sedition] – an online art platform for selling art where an edition of a hundred unique digital copies are offered for sell. <br>
"Limited edition of art for your digital life"<br>
"Limited edition of art for your digital life"<br>


Line 56: Line 56:
This chapter will investigate “ cloud services” and fairness of access. Who is the actual owner of the content available online? Does it became a common property of all, pointed by Richard Barbrook or it is hold by the other entity?<br>
This chapter will investigate “ cloud services” and fairness of access. Who is the actual owner of the content available online? Does it became a common property of all, pointed by Richard Barbrook or it is hold by the other entity?<br>
What if there is a time-based service that provides the users to obtain certain control over or expiration time on their content or applying a delete key?<br>
What if there is a time-based service that provides the users to obtain certain control over or expiration time on their content or applying a delete key?<br>
'''Case_study''': [http://vanish.cs.washington.edu/ Vanish] project is a software bundle and research project initiated by ,  
'''Case_study''': [http://vanish.cs.washington.edu/ Vanish] project is a research project and a software bundle, initiated by Roxana Geambasu, Amit Levy and Yoshi Kohno
which aims to help users to preserve some control, by ensuring that the electronic data, posted on the web such as emails, massages, photos, as well as text becomes permanently unavailable after a specified period of time.
which aims to help users to preserve some control, by ensuring that the electronic data, posted on the web such as emails, massages, photos, as well as text becomes permanently unavailable after a specified period of time.


Line 97: Line 97:
=======================
=======================


 
'''links ( to be moved from this dir ) :<br>'''
 
'''old version: <br>'''
 
 
 
==== '''<chapter#1 ownership''' ====
<<The story of Ghana digital trash camps:
<<< e-waste, data remanence, data thief
or how the data can be recovered and serve as an evidence
Questions about e-waste and digital recycling, digital trash and data recycling.<br>
<<<'data erasure' term - or the only way to erase data permanently is physically to destroy a hard disk drive. In the past shredders were used to destroy confidential, secret papers now there are replaces by data shredders.<br>
<br>
 
===='''<chapter#2 memory'''====
This chapter will be about the technical aspect of data recovery process 
more specifically:  clusters, partitions, Gutmann method etc.
 
===='''<chapter#3 code''' ====
This chapter is about the performative aspect of the code.<br>
Code as Language
 
==== '''<chapter#4 space'''  ====
This chapter will be about the final work. Description/ set up etc.
 
'''links:<br>'''


[http://www.pbs.org/frontlineworld/stories/ghana804/video/video_index.html Ghana digital dumping ground article]
[http://www.pbs.org/frontlineworld/stories/ghana804/video/video_index.html Ghana digital dumping ground article]

Revision as of 20:39, 9 March 2014

Useful links:
A Guide to Essay Writing

Thesis Guidelines

Draft_ thesis skeleton:

ABSTRACT

The traces of digital information are exponential ...
They contain various sources...
They travel, scattered, being trade - transacted or serve as a found footage for an artistic interventions...
Traces of digital data are tangible. Events or evidences, which meant to be deleted from a system...
they serve as a subject of recovery, revisit and exposure...

INTRO

temporary unavailable will be filled soon!


CHAPTERS

Grad_Skeleton: PART #1

             <ctrl + C / ctrl +V  chapter :.

question: digital object and its properties what has change from the analog to digital ?
argument: tangible and intangible properties of the digital object or the lost of the physicality makes it difficult to apply the same principles.
use value and the power of copy makes hard to distinguish the copy from the original argument: digital object allows multiple copies of one single file, reproducing an accurate / exact copy of the original. Comparing with the analog object where every copy modifies the original. Moreover each copying of the copy introduce / induce noise to the copy and the original itself. The digital object inherited share and distribution value.

            <Del chapter :.

expanded storage / the impossibility to delete the digital file / missing erase button
the extend of the storage / memory capacity to save, preserve and archive.
Where the story of recovery of data from hard drives comes along ...
analog with the anecdote about Ghana disclosure of data.

PART#2
<Shift:.
question: How the copyright low is used to constrain and mimic the properties of analog? For example a digital file ( pdf ) is threaten the same way as a book. revisit the copyright law and break the myth of the ownership of digital file.
argument: Copyright enclosure is build on top of laws, applied to physical property.
It can not be applied to the digital objects because of the nature of the digital and the listed properties.
Case_study: >Sedition – an online art platform for selling art where an edition of a hundred unique digital copies are offered for sell.
"Limited edition of art for your digital life"


              <Ctrl :.

argument: The digital / digitization made us believe that the knowledge can be free / share and common for all.
This chapter will investigate “ cloud services” and fairness of access. Who is the actual owner of the content available online? Does it became a common property of all, pointed by Richard Barbrook or it is hold by the other entity?
What if there is a time-based service that provides the users to obtain certain control over or expiration time on their content or applying a delete key?
Case_study: Vanish project is a research project and a software bundle, initiated by Roxana Geambasu, Amit Levy and Yoshi Kohno which aims to help users to preserve some control, by ensuring that the electronic data, posted on the web such as emails, massages, photos, as well as text becomes permanently unavailable after a specified period of time.

Please see the annotation on Vanish project -->


Bibliography (so far)

Kleiner. Dmytri / The Telekommunist Manifesto

Hyves. Lewis / Common as air

Banner. Stuart / American Property: A History of How, Why, and What We Own (Harvard) University Press, 2011); Who Owns the Sky?

Jefrey. Rosen.The end of forgetting

Mayer-Schönberger. Viktor/ Delete:The Virtue of Forgetting in the Digital Age

Barbrook. Richard / http://constantvzw.org/verlag/spip.php?page=article&id_article=20&mot_filtre=9&id_lang=0

notes: Blackstone. William //
Locke. John // Of property





===========

possible entry ???

I will map a research from art practices as appropriation, DADA, ready-made and SI applied to my own practice or the current grad project retrieving hard drives and using the information out of them for my own purpose.

===========

links ( to be moved from this dir ) :

Ghana digital dumping ground article

Illegal e-waste dumped in Ghana includes unencrypted hard drives full of US security secrets

Legend of multiple passes of overwriting:

http://grot.com/wordpress/?p=154

http://www.pcworld.com/article/209418/how_do_i_permanently_delete_files_from_my_hard_disk.html

https://ssd.eff.org/tech/deletion

http://security.stackexchange.com/questions/10464/why-is-writing-zeros-or-random-data-over-a-hard-drive-multiple-times-better-th

[http://www.theguardian.com/world/video/2014/jan/31/snowden-files-computer-destroyed-guardian-gchq-basement-video theguardian_snowden-files-computer-destroyed]