User:Michaela/thesis: Difference between revisions
No edit summary |
No edit summary |
||
Line 12: | Line 12: | ||
'''#problem_aspect #1'''<br> | '''#problem_aspect #1'''<br> | ||
THEME: OWNERSHIP/ DIGITAL PROPERTY/ PROPERTY RIGHTS <br> | MAIN THEME: OWNERSHIP/ DIGITAL PROPERTY/ PROPERTY RIGHTS <br> | ||
the following themes will appear and be revealed further in the text as a sub_themes. | |||
<br> | |||
'''#problem_aspect #2'''<br> | '''#problem_aspect #2'''<br> | ||
SUB_THEME: PRIVACY IN DIGITAL REALM <br> | SUB_THEME: PRIVACY IN DIGITAL REALM <br> | ||
The ethical issue I want to address is: who has the right to withdrawal someone's data and how this data could be used, reused or misused?<br> | The ethical issue I want to address is: who has the right to withdrawal someone's data and how this data could be used, reused or misused?<br> | ||
<br> | |||
'''#problem_aspect #3'''<br> | '''#problem_aspect #3'''<br> | ||
SUB_THEME: AUTHORSHIP/CO-AUTHORSHIP/ MULTIPLE - AUTHORS<BR> | SUB_THEME: AUTHORSHIP/CO-AUTHORSHIP/ MULTIPLE - AUTHORS<BR> | ||
The problematic aspect of the recovered data: who is the actual author of the final work? <br> | The problematic aspect of the recovered data: who is the actual author of the final work? <br> | ||
<br> | |||
==== '''<ownership''' ==== | ==== '''<ownership''' ==== | ||
<<The story of Ghana digital trash camps: | <<The story of Ghana digital trash camps: | ||
<br> | |||
<<< e-waste, data remanence, data thief | <<< e-waste, data remanence, data thief | ||
or how the data can be recovered and serve as an evidence | or how the data can be recovered and serve as an evidence | ||
Questions about e-waste and digital recycling, digital trash and data recycling.<br> | Questions about e-waste and digital recycling, digital trash and data recycling.<br> | ||
<<<'data erasure' term - or the only way to erase data permanently is physically to destroy a hard disk drive. In the past shredders were used to destroy confidential, secret papers now there are replaces by data shredders.<br> | <<<'data erasure' term - or the only way to erase data permanently is physically to destroy a hard disk drive. In the past shredders were used to destroy confidential, secret papers now there are replaces by data shredders.<br> | ||
[http://www.theguardian.com/world/video/2014/jan/31/snowden-files-computer-destroyed-guardian-gchq-basement-video | [http://www.theguardian.com/world/video/2014/jan/31/snowden-files-computer-destroyed-guardian-gchq-basement-video | ||
theguardian_snowden-files-computer-destroyed]<br> | theguardian_snowden-files-computer-destroyed]<br> | ||
===='''<memory'''==== | ===='''<memory'''==== | ||
Line 43: | Line 40: | ||
more specifically: clusters, partitions, Gutmann method etc. | more specifically: clusters, partitions, Gutmann method etc. | ||
''' | ===='''<code''' ==== | ||
This chapter is about the performative aspect of the code.<br> | |||
Code as Language | |||
==== '''<space''' ==== | |||
This chapter will be about the final work. Description/ set up etc. | |||
links:<br> | |||
[http://www.pbs.org/frontlineworld/stories/ghana804/video/video_index.html Ghana digital dumping ground article] | |||
[http://boingboing.net/2009/06/25/illegal-e-waste-dump.html Illegal e-waste dumped in Ghana includes unencrypted hard drives full of US security secrets] | |||
Legend of multiple passes of overwriting:<br> | Legend of multiple passes of overwriting:<br> | ||
Line 54: | Line 62: | ||
http://security.stackexchange.com/questions/10464/why-is-writing-zeros-or-random-data-over-a-hard-drive-multiple-times-better-th | http://security.stackexchange.com/questions/10464/why-is-writing-zeros-or-random-data-over-a-hard-drive-multiple-times-better-th | ||
--- | [http://www.theguardian.com/world/video/2014/jan/31/snowden-files-computer-destroyed-guardian-gchq-basement-video | ||
theguardian_snowden-files-computer-destroyed]<br> | |||
Revision as of 13:50, 12 February 2014
Useful links:
A Guide to Essay Writing
Draft_ thesis skeleton:
ABSTRACT
!!! missing !!!
QUESTIONS I WANT TO ADDRESS IN MY ESSAY
#problem_aspect #1
MAIN THEME: OWNERSHIP/ DIGITAL PROPERTY/ PROPERTY RIGHTS
the following themes will appear and be revealed further in the text as a sub_themes.
#problem_aspect #2
SUB_THEME: PRIVACY IN DIGITAL REALM
The ethical issue I want to address is: who has the right to withdrawal someone's data and how this data could be used, reused or misused?
#problem_aspect #3
SUB_THEME: AUTHORSHIP/CO-AUTHORSHIP/ MULTIPLE - AUTHORS
The problematic aspect of the recovered data: who is the actual author of the final work?
<ownership
<<The story of Ghana digital trash camps:
<<< e-waste, data remanence, data thief
or how the data can be recovered and serve as an evidence
Questions about e-waste and digital recycling, digital trash and data recycling.
<<<'data erasure' term - or the only way to erase data permanently is physically to destroy a hard disk drive. In the past shredders were used to destroy confidential, secret papers now there are replaces by data shredders.
[http://www.theguardian.com/world/video/2014/jan/31/snowden-files-computer-destroyed-guardian-gchq-basement-video
theguardian_snowden-files-computer-destroyed]
<memory
This chapter will be about the technical aspect of data recovery process more specifically: clusters, partitions, Gutmann method etc.
<code
This chapter is about the performative aspect of the code.
Code as Language
<space
This chapter will be about the final work. Description/ set up etc.
links:
Ghana digital dumping ground article
Illegal e-waste dumped in Ghana includes unencrypted hard drives full of US security secrets
Legend of multiple passes of overwriting:
http://grot.com/wordpress/?p=154
http://www.pcworld.com/article/209418/how_do_i_permanently_delete_files_from_my_hard_disk.html
https://ssd.eff.org/tech/deletion
[http://www.theguardian.com/world/video/2014/jan/31/snowden-files-computer-destroyed-guardian-gchq-basement-video
theguardian_snowden-files-computer-destroyed]