User:Andre Castro/2/Transmedial/spam transmedial: Difference between revisions

From XPUB & Lens-Based wiki
 
(19 intermediate revisions by the same user not shown)
Line 1: Line 1:
'''How to create writing and hybrid media publications from your junk mail folder.'''
'''How to create writing and hybrid media publications from your junk mail folder.'''


''Drawing from a spam database, create a narrative[?work? shall we keep it more broad??] that highlights specific aspects of spam emails.''
''Drawing from a spam database, create a work that highlights characteristic aspects of spam emails.''




=Questions=
=Questions=
* How can spam be re-published whiles maintaining its networked aspect?
* '''How can spam be re-published whiles maintaining its networked aspect?'''
* How can the characteristic elements of spam become apparent, when re-published?
** Bestiary: can these characters forge any type of relation? Can the relationships they had in the spam be preserved when entered into the book?
* What publishing strategies allow for those 2 aspects to be present?
 
* <span style="color:green">why it makes sense to re-mediate/republish spam, under a different form?
 
** why is spam interesting?</span> <span style="color:red">(Andre)...</span>
* '''Can the other renditions of spam make its characteristic elements more apparent? Can the re-published forms guide our attention to look at spam as more than junk?  
'''
 
* '''What publishing strategies best allow for both the networked and the formal nature of spam to be present?
'''
 
* '''why is spam interesting?'''
** Spam uses artistic (literary) strategies to enticing and captivating the reader. However no artistic recognition is expected, but a monetary reward. '''Literature as a money making machine'''
** Employed literary strategies are both unexpected and unusual: case of misspellings
** is quite formal: functions can be isolated that than filled with characters and their actions
** mixes fiction and reality, but all is presented as factual.  
*** real existing characters, often referred in the mass-media are often chosen to fulfill the role of the character who dies living behind a large sum of money 
*** the spam message in which they are mentioned often adds clues to the relationships and history of this deceased character.


=Expectations=
=Expectations=
What do we intend to get out of the workshop?
''What do we intend to get out of the workshop?''
* new insights of what elements are specific to spam.
* new insights of what elements are specific to spam.
* concepts/prototypes for spam publishing that:  
* concepts/prototypes for spam publishing that:  
** avoid its crystallization
** avoid its crystallization
** are able to put forward and networked and evolving nature.
** are able to put forward and networked and evolving nature.
* end the workshop with a '''tangible outcome,''' such as:
* end the workshop with a '''tangible outcome,''': a pdf to be printed on demand
 
 
 
 
 


=Workshop=


The workshop will cross-fade to Consent to Print, that will use it as the raw material to explore consensus/dissent based editorial practice.'''Question is what will Consent to Print use? The spam itself, or the strategies? How do you think to go on about it?'''
==plan==


=Plan=
Structure for the 2 hours 12-14


Structure for the 2 hours
* '''20min introduction'''
* 20min introduction  
** Quick and broad presentation of the workshop
** Silvio 5/6 examples of art projects that deal with spam
** Silvio examples of art projects that deal with spam
** Andre introduction to the spam-database, and some of his points of interest in spam
** Andre introduction to the spam-database, and some of his points of interest in spam
    
    
* 40min browsing the spam db; collecting/generating material about the chosen character - ''How would you like to portrait the character'';
* '''40min browse the spam db/junk mail folder; (Rule 1,2)'''  
* 20min group sees portrait draw by participants and discusses how they can be combined into one object
** Identifying aspects that will help you in the portrait;
* 30min group work on a prototype implementation of the material into an object ;
 
* '''20min hear participants about their choice and implementation idea'''
 
* '''30min implement the portrait'''
 
* '''10min for feedback'''
 


Work in pairs


==Introduction==
* 15 - pipe mail system will be working.
* Our interest in spam
 
* Our motivation to  run the workshop
 
* Art projects based on spam
http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/
* the material(database): http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/
   
   
----


==The Bestiary==




===Examples of possible publishing materials and strategies===


<span style="color:green">
 
====spammers give away spam and resort to post cards====
===Technical necessities===
* scanner - andre's friend boroughs 1
* printer - Eleanor asked for 1 (has to check in printing doesn't conflict) 
* pen knife - buy 1
* ruler - andre's friend boroughs 1
 
 
----
 
=Meeting w/ florian=  
==pipe mail system==
A pipe mailing system that will be in place in TM.
This is based on a system for exchange of messages that existed in Berlin in  1950s.
 
Spam can circulate through this system.
 
* email -  Lukas Grundmann - tech person - email him about wanting to use the pipe mail system;
 
==Sugestions==
* make it a bit of competive element to make it speed up
 
 
 
 
 
 
 
 
 
=Other workshop possibilities=
 
==spammers give away spam and resort to postcards==


Participants take the role of spammers who decided on embrace a different medium for their scams: Postcards
Participants take the role of spammers who decided on embrace a different medium for their scams: Postcards
Based on existing spam messages the participant will write postcards that try to lure the recipient into providing them personal data or money.
Based on existing spam messages the participant will write postcards that try to lure the recipient into providing them personal data or money.
The existing database will be used a resource for:  
The existing database will be used a resource for:  


Line 64: Line 116:


* catchy and convincing sentences ready to be written into a postcard.
* catchy and convincing sentences ready to be written into a postcard.
</span>
 






====the narratives described in spam, through their characters====
==the narratives described in spam, through their characters===
* As the same character might appear in a more than 1 one email
* As the same character might appear in a more than 1 one email
* As characters are often actual living(or dead) characters
* As characters are often actual living(or dead) characters
Line 83: Line 132:
* could this be a final published object or it could be a intermediary to another publication.
* could this be a final published object or it could be a intermediary to another publication.


===the formulistic nature of spam===
==the formulistic nature of spam==
Spam's language and structure is quite identifiable. It reaffirms and repeats itself in almost every spam email.  
Spam's language and structure is quite identifiable. It reaffirms and repeats itself in almost every spam email.  


Line 101: Line 150:
'''
'''
* create head-body-and-legs with these sentences
* create head-body-and-legs with these sentences
==browsing the spam db and discussion of possible prototypes==
* Take a look at the spam emails collected at  http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/
* See if there is something there that arouses your interest.
* How could that aspect of this raw material manifest itself in a publication?
* What form would that publication take? Paper? Digital? Sound
==group listens to the participants ideas==
* description of the ideas for publishing spam
* how would you go and execute it?
* is a prototype doable? If not a description of how the prototype could be built?
If in the end there is a interested to continue with some of the proposals outside the workshop that should be fine. The following days can be used to prototype something out form the the ideas for spam publishing resulting from the workshop.
=Reflections=
Although I'd like to finish the workshop with a tangible outcome. And it appeals more to me the idea of producing one object collaboratively. I don't want to dictate the method for the participants. I'd like that prototype to allow for each-one's inventiveness and ideas in approaching this material.


For example:
For example:
Line 125: Line 157:
** draw a portrait of that character, either by images, texts (found or created then)
** draw a portrait of that character, either by images, texts (found or created then)
** how can this portraits be assembled together, as one whole? Into a pdf?</span>
** how can this portraits be assembled together, as one whole? Into a pdf?</span>
=Requirements=
* Beamer
* internet connection
* computers (shouldn't worry too much. Ours and some of participant's laptop should be enough). But should ask "Participants are asked to bring their laptops (but it is not essential"

Latest revision as of 08:48, 30 January 2013

How to create writing and hybrid media publications from your junk mail folder.

Drawing from a spam database, create a work that highlights characteristic aspects of spam emails.


Questions

  • How can spam be re-published whiles maintaining its networked aspect?
    • Bestiary: can these characters forge any type of relation? Can the relationships they had in the spam be preserved when entered into the book?


  • Can the other renditions of spam make its characteristic elements more apparent? Can the re-published forms guide our attention to look at spam as more than junk?

  • What publishing strategies best allow for both the networked and the formal nature of spam to be present?

  • why is spam interesting?
    • Spam uses artistic (literary) strategies to enticing and captivating the reader. However no artistic recognition is expected, but a monetary reward. Literature as a money making machine
    • Employed literary strategies are both unexpected and unusual: case of misspellings
    • is quite formal: functions can be isolated that than filled with characters and their actions
    • mixes fiction and reality, but all is presented as factual.
      • real existing characters, often referred in the mass-media are often chosen to fulfill the role of the character who dies living behind a large sum of money
      • the spam message in which they are mentioned often adds clues to the relationships and history of this deceased character.

Expectations

What do we intend to get out of the workshop?

  • new insights of what elements are specific to spam.
  • concepts/prototypes for spam publishing that:
    • avoid its crystallization
    • are able to put forward and networked and evolving nature.
  • end the workshop with a tangible outcome,: a pdf to be printed on demand




Workshop

plan

Structure for the 2 hours 12-14

  • 20min introduction
    • Quick and broad presentation of the workshop
    • Silvio examples of art projects that deal with spam
    • Andre introduction to the spam-database, and some of his points of interest in spam
  • 40min browse the spam db/junk mail folder; (Rule 1,2)
    • Identifying aspects that will help you in the portrait;
  • 20min hear participants about their choice and implementation idea
  • 30min implement the portrait
  • 10min for feedback


  • 15 - pipe mail system will be working.


http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/


The Bestiary

Technical necessities

  • scanner - andre's friend boroughs 1
  • printer - Eleanor asked for 1 (has to check in printing doesn't conflict)
  • pen knife - buy 1
  • ruler - andre's friend boroughs 1



Meeting w/ florian

pipe mail system

A pipe mailing system that will be in place in TM. This is based on a system for exchange of messages that existed in Berlin in 1950s.

Spam can circulate through this system.

  • email - Lukas Grundmann - tech person - email him about wanting to use the pipe mail system;

Sugestions

  • make it a bit of competive element to make it speed up





Other workshop possibilities

spammers give away spam and resort to postcards

Participants take the role of spammers who decided on embrace a different medium for their scams: Postcards Based on existing spam messages the participant will write postcards that try to lure the recipient into providing them personal data or money. The existing database will be used a resource for:

  • detection of the strategies used by spammers to succeed in their scams:
    • employment of actual individuals as character of their messages
    • creation believable scenarios, intimate and confessional mode of address
    • resource to one's greed or compassion, employment of stereotypes, such as African's being corrupt, poor, or extremely religious)
  • rich characters to be found
    • + about characters ...
  • catchy and convincing sentences ready to be written into a postcard.


the narratives described in spam, through their characters=

  • As the same character might appear in a more than 1 one email
  • As characters are often actual living(or dead) characters
  • As they are often famous and with a large presence in the media
  • They are related to other characters outside the spam narratives

Characters' profiles can be drawn in great detail. And they can be interconnected to those related to them (both in spam narratives and in real-life). Such well web of strong characters opens up the possibility for re-writing the narrative between this characters

Questions

  • what form to publish this network of characters so that their interconnections become apparent?
  • how does it allow expansion, speculation, for narratives to emerge from the vision of characters' relations?
  • could this be a final published object or it could be a intermediary to another publication.

the formulistic nature of spam

Spam's language and structure is quite identifiable. It reaffirms and repeats itself in almost every spam email.

With All Due Respect My name is morgan ashante am the manager of auditing and accounting department International commercial bank

I pray this proposal meet your kind co-operation. I am Mr. Mphilo Dlamini, the service Director/ Account Unit of First National Bank of South Africa.

My name is Mrs.Sonia Murphy am the manager of auditing and accounting department International commercial bank

My Name is Mrs.Janet Andrea. I am a dying woman who has decided to donate all that I have to charity through you.

My Name is Mr. Peter i am writing you this short note based on the latest development at my bank

What could be a publishing solution that would put a focus on this formulistic aspect o spam?

  • create head-body-and-legs with these sentences

For example:

  • Head-chest-legs book - idea is already too specific. It doesn't allow much development.
  • A character investigation/narrative a broader proposal:
    • the proposal could be: pick a character referred to in spam emails;
    • draw a portrait of that character, either by images, texts (found or created then)
    • how can this portraits be assembled together, as one whole? Into a pdf?