User:Andre Castro/2/Transmedial/spam transmedial: Difference between revisions
Andre Castro (talk | contribs) No edit summary |
Andre Castro (talk | contribs) (→Plan) |
||
Line 29: | Line 29: | ||
Structure for the 2 hours | Structure for the 2 hours | ||
* 20min introduction | * 20min introduction | ||
** Quick and broad presentation of the workshop | ** Quick and broad presentation of the workshop | ||
** Silvio | ** Silvio examples of art projects that deal with spam | ||
** Andre introduction to the spam-database, and some of his points of interest in spam | ** Andre introduction to the spam-database, and some of his points of interest in spam | ||
* 40min | * 40min browse the spam db/junk mail folder; (Rule 1,2) | ||
** Identifying aspects that will help you in the portrait; | |||
** | |||
* 20min | * 20min hear participants about their choice and implementation idea: | ||
* 30min | * 30min implement the portrait | ||
* 10min for feedback | * 10min for feedback | ||
Revision as of 15:18, 29 January 2013
How to create writing and hybrid media publications from your junk mail folder.
Drawing from a spam database, create a work that highlights characteristic aspects of spam emails.
Questions
- How can spam be re-published whiles maintaining its networked aspect?
- How can the characteristic elements of spam become apparent, when re-published?
- What publishing strategies allow for those 2 aspects to be present?
- why it makes sense to re-mediate/republish spam, under a different form?
- why is spam interesting? (Andre)...
Expectations
What do we intend to get out of the workshop?
- new insights of what elements are specific to spam.
- concepts/prototypes for spam publishing that:
- avoid its crystallization
- are able to put forward and networked and evolving nature.
- end the workshop with a tangible outcome,: a pdf to be printed on demand
The workshop will cross-fade to Consent to Print.
Maybe Consent to Print will use it as the raw material to explore consensus/dissent based editorial practice.
This might be difficult, and doesn't have to happen.
workshop
Plan
Structure for the 2 hours
- 20min introduction
- Quick and broad presentation of the workshop
- Silvio examples of art projects that deal with spam
- Andre introduction to the spam-database, and some of his points of interest in spam
- 40min browse the spam db/junk mail folder; (Rule 1,2)
- Identifying aspects that will help you in the portrait;
- 20min hear participants about their choice and implementation idea:
- 30min implement the portrait
- 10min for feedback
Introduction
- Our interest in spam
- Our motivation to run the workshop
- Art projects based on spam
- the material(database): http://pzwart3.wdka.hro.nl/django/acastro/collect_spam/spam/
The Bestiary
Andre feedback
- loved the bestiary idea
- also liked very much that rules are given to participants. The plan is layout very well.
- I'd like to, still keeping the bestiary, bring in the postcards possibility.
Perhaps this could be done by: ( more incline to OPTION C )
- A) Create and represent the characters of the bestiary.
Put them into the book, but also print there (we have a printer) unto potscards. One side would have the portrait. The other an empty space for the message
- B) Print the database onto 30 postcards. Participants can read from these. In the end they'd have the possibility to send them inside the house.
- C) Working in pairs produce a PORTRAIT and a MESSAGE (from the character portrayed):
- person 1)
- investigate a spam character. Drawing information not only from that the email mentions, but also using other found traces of this character.
- Sketch a profile of this character.
- person 1)
- person 2)
- investigates the characteristic elements of spam: reoccuring structure, intimate tone, persuasive discourse and its elements
- Based on the character information gathered by your partner, and employing the spam writing strategies you came across, write a spam messages from the perspective of this character
- person 2)
Both portrait and message can work by using text and/or images, employ materials found online.
The resulting portraits and messages will included side-by-side, in the bestiary, and in postcards (so your characters can start spamming straight away the HKW using the pneumatic pipe mail OCTO station)
Technical necessities
- scanner - andre's friend boroughs 1
- printer - Eleanor asked for 1 (has to check in printing doesn't conflict)
- pen knife - buy 1
- ruler - andre's friend boroughs 1
Meeting w/ florian
pipe mail system
A pipe mailing system that will be in place in TM. This is based on a system for exchange of messages that existed in Berlin in 1950s.
Spam can circulate through this system.
- email - Lukas Grundmann - tech person - email him about wanting to use the pipe mail system;
Sugestions
- make it a bit of competive element to make it speed up
Other workshop possibilities
spammers give away spam and resort to postcards
Participants take the role of spammers who decided on embrace a different medium for their scams: Postcards Based on existing spam messages the participant will write postcards that try to lure the recipient into providing them personal data or money. The existing database will be used a resource for:
- detection of the strategies used by spammers to succeed in their scams:
- employment of actual individuals as character of their messages
- creation believable scenarios, intimate and confessional mode of address
- resource to one's greed or compassion, employment of stereotypes, such as African's being corrupt, poor, or extremely religious)
- rich characters to be found
- + about characters ...
- catchy and convincing sentences ready to be written into a postcard.
the narratives described in spam, through their characters=
- As the same character might appear in a more than 1 one email
- As characters are often actual living(or dead) characters
- As they are often famous and with a large presence in the media
- They are related to other characters outside the spam narratives
Characters' profiles can be drawn in great detail. And they can be interconnected to those related to them (both in spam narratives and in real-life). Such well web of strong characters opens up the possibility for re-writing the narrative between this characters
Questions
- what form to publish this network of characters so that their interconnections become apparent?
- how does it allow expansion, speculation, for narratives to emerge from the vision of characters' relations?
- could this be a final published object or it could be a intermediary to another publication.
the formulistic nature of spam
Spam's language and structure is quite identifiable. It reaffirms and repeats itself in almost every spam email.
With All Due Respect My name is morgan ashante am the manager of auditing and accounting department International commercial bank
I pray this proposal meet your kind co-operation. I am Mr. Mphilo Dlamini, the service Director/ Account Unit of First National Bank of South Africa.
My name is Mrs.Sonia Murphy am the manager of auditing and accounting department International commercial bank
My Name is Mrs.Janet Andrea. I am a dying woman who has decided to donate all that I have to charity through you.
My Name is Mr. Peter i am writing you this short note based on the latest development at my bank
What could be a publishing solution that would put a focus on this formulistic aspect o spam?
- create head-body-and-legs with these sentences
For example:
- Head-chest-legs book - idea is already too specific. It doesn't allow much development.
- A character investigation/narrative a broader proposal:
- the proposal could be: pick a character referred to in spam emails;
- draw a portrait of that character, either by images, texts (found or created then)
- how can this portraits be assembled together, as one whole? Into a pdf?