User:Michaela/thesis: Difference between revisions
No edit summary |
No edit summary |
||
Line 7: | Line 7: | ||
=ABSTRACT= | =ABSTRACT= | ||
<center> | |||
''The traces of digital information are exponential ...<br> | |||
They contain various sources...<br> | |||
They travel, scattered, being trade - transacted or serve as a found footage for an artistic | |||
interventions...<br> | |||
Traces of digital data are tangible. Events or evidences, which meant to be deleted from a system...<br> | |||
they serve as a subject of recovery, revisit and exposure...''<br> | |||
</center> | |||
==QUESTIONS I WANT TO ADDRESS IN MY ESSAY== | ==QUESTIONS I WANT TO ADDRESS IN MY ESSAY== | ||
Line 14: | Line 22: | ||
MAIN THEME: OWNERSHIP/ DIGITAL PROPERTY/ PROPERTY RIGHTS <br> | MAIN THEME: OWNERSHIP/ DIGITAL PROPERTY/ PROPERTY RIGHTS <br> | ||
the following themes will appear and be revealed further in the text as a sub_themes | the following themes will appear and be revealed further in the text as a sub_themes: | ||
<br> | <br> | ||
'''#problem_aspect #2'''<br> | '''#problem_aspect #2'''<br> | ||
Line 27: | Line 35: | ||
<<The story of Ghana digital trash camps: | <<The story of Ghana digital trash camps: | ||
<<< e-waste, data remanence, data thief | <<< e-waste, data remanence, data thief | ||
or how the data can be recovered and serve as an evidence | or how the data can be recovered and serve as an evidence | ||
Line 33: | Line 40: | ||
<<<'data erasure' term - or the only way to erase data permanently is physically to destroy a hard disk drive. In the past shredders were used to destroy confidential, secret papers now there are replaces by data shredders.<br> | <<<'data erasure' term - or the only way to erase data permanently is physically to destroy a hard disk drive. In the past shredders were used to destroy confidential, secret papers now there are replaces by data shredders.<br> | ||
<br> | |||
===='''<memory'''==== | ===='''<memory'''==== | ||
This chapter will be about the technical aspect of data recovery process | This chapter will be about the technical aspect of data recovery process | ||
Line 47: | Line 52: | ||
This chapter will be about the final work. Description/ set up etc. | This chapter will be about the final work. Description/ set up etc. | ||
links:<br> | '''links:<br>''' | ||
[http://www.pbs.org/frontlineworld/stories/ghana804/video/video_index.html Ghana digital dumping ground article] | [http://www.pbs.org/frontlineworld/stories/ghana804/video/video_index.html Ghana digital dumping ground article] | ||
Revision as of 13:54, 12 February 2014
Useful links:
A Guide to Essay Writing
Draft_ thesis skeleton:
ABSTRACT
The traces of digital information are exponential ...
They contain various sources...
They travel, scattered, being trade - transacted or serve as a found footage for an artistic
interventions...
Traces of digital data are tangible. Events or evidences, which meant to be deleted from a system...
they serve as a subject of recovery, revisit and exposure...
QUESTIONS I WANT TO ADDRESS IN MY ESSAY
#problem_aspect #1
MAIN THEME: OWNERSHIP/ DIGITAL PROPERTY/ PROPERTY RIGHTS
the following themes will appear and be revealed further in the text as a sub_themes:
#problem_aspect #2
SUB_THEME: PRIVACY IN DIGITAL REALM
The ethical issue I want to address is: who has the right to withdrawal someone's data and how this data could be used, reused or misused?
#problem_aspect #3
SUB_THEME: AUTHORSHIP/CO-AUTHORSHIP/ MULTIPLE - AUTHORS
The problematic aspect of the recovered data: who is the actual author of the final work?
<ownership
<<The story of Ghana digital trash camps:
<<< e-waste, data remanence, data thief
or how the data can be recovered and serve as an evidence
Questions about e-waste and digital recycling, digital trash and data recycling.
<<<'data erasure' term - or the only way to erase data permanently is physically to destroy a hard disk drive. In the past shredders were used to destroy confidential, secret papers now there are replaces by data shredders.
<memory
This chapter will be about the technical aspect of data recovery process more specifically: clusters, partitions, Gutmann method etc.
<code
This chapter is about the performative aspect of the code.
Code as Language
<space
This chapter will be about the final work. Description/ set up etc.
links:
Ghana digital dumping ground article
Illegal e-waste dumped in Ghana includes unencrypted hard drives full of US security secrets
Legend of multiple passes of overwriting:
http://grot.com/wordpress/?p=154
http://www.pcworld.com/article/209418/how_do_i_permanently_delete_files_from_my_hard_disk.html
https://ssd.eff.org/tech/deletion
[http://www.theguardian.com/world/video/2014/jan/31/snowden-files-computer-destroyed-guardian-gchq-basement-video
theguardian_snowden-files-computer-destroyed]