User:Michaela/thesis: Difference between revisions

From XPUB & Lens-Based wiki
No edit summary
Line 39: Line 39:
        
        
<Shift <br>
<Shift <br>
revisit the copyright law and break the myth of the ownership of digital file.<br>
revisit the copyright law and break the myth of the ownership of digital object.<br>
'''argument:''' Copyright enclosure is build on top of the laws, applied to physical property.  
'''argument:''' Copyright enclosure is build on top of the laws, applied to physical property.  
It can not be applied to the digital objects because of the nature of the digital and the listed properties.
It can not be applied to the digital objects because of the nature of the digital and the listed properties.

Revision as of 12:05, 4 March 2014

Useful links:
A Guide to Essay Writing

Thesis Guidelines

Draft_ thesis skeleton:

ABSTRACT

The traces of digital information are exponential ...
They contain various sources...
They travel, scattered, being trade - transacted or serve as a found footage for an artistic interventions...
Traces of digital data are tangible. Events or evidences, which meant to be deleted from a system...
they serve as a subject of recovery, revisit and exposure...

INTRO


This text will departure from the notion of property and ownership to digital property/ digital rights and digital ownership. The definition of property according to history, law culture studies and art ( intellectual property / copyright ad copyleft regimes) in order to examine the question of the digital property.
The following theme will be revealed in the text as providing supporting arguments:
MAIN THEME: OWNERSHIP/ DIGITAL PROPERTY/ PROPERTY RIGHTS


New Skeleton Grad Thesis:

< ctrl + C / ctrl +V chapter :.

  • use value the power of the copy or hard to distinguish from the original ( +, - )

argument: digital object allows multiple copies of one single file, reproducing an accurate / exact copy of the original. Comparing with the analog object where every copy modifies the original. Moreover each copying of the copy introduce / induce noise to the copy and the original itself.
<Enter chapter :.

  • share value or the digital object inherit the distribution value

argument: tangible and intangible properties of the digital object or the lost of the physicality, so it makes it difficult to apply the same laws.

<Del chapter:.

  • expanded storage / the impossibility to delete the digital file / missing erase button

the extend of the storage / memory capacity to save, preserve and archive.

<Shift
revisit the copyright law and break the myth of the ownership of digital object.
argument: Copyright enclosure is build on top of the laws, applied to physical property. It can not be applied to the digital objects because of the nature of the digital and the listed properties.

<?
Owned by nobody, the web could become the common property of all. (R.B)
argument: The digital / digitization made us believe that the knowledge can be free / share and common for all. Investigate cloud services and the private corporations entering into the public domain.

conclusion :.

Bibliography:
Kleiner. Dmytri / The Telekommunist Manifesto

Hyves. Lewis // Common as air

Banner. Stuart / American Property: A History of How, Why, and What We Own (Harvard) University Press, 2011); Who Owns the Sky?

Barbrook. Richard / [[ http://constantvzw.org/verlag/spip.php?page=article&id_article=20&mot_filtre=9&id_lang=0]]

notes on :
Blackstone. William
Locke. John / Of property






old version:


I will map a research from art practices as DADA, ready-made and SI applied to my own practice or the current grad project retrieving hard drives and using the information out of them for my own purpose.

<chapter#1 ownership

<<The story of Ghana digital trash camps: <<< e-waste, data remanence, data thief or how the data can be recovered and serve as an evidence Questions about e-waste and digital recycling, digital trash and data recycling.
<<<'data erasure' term - or the only way to erase data permanently is physically to destroy a hard disk drive. In the past shredders were used to destroy confidential, secret papers now there are replaces by data shredders.

<chapter#2 memory

This chapter will be about the technical aspect of data recovery process more specifically: clusters, partitions, Gutmann method etc.

<chapter#3 code

This chapter is about the performative aspect of the code.
Code as Language

<chapter#4 space

This chapter will be about the final work. Description/ set up etc.

links:

Ghana digital dumping ground article

Illegal e-waste dumped in Ghana includes unencrypted hard drives full of US security secrets

Legend of multiple passes of overwriting:

http://grot.com/wordpress/?p=154

http://www.pcworld.com/article/209418/how_do_i_permanently_delete_files_from_my_hard_disk.html

https://ssd.eff.org/tech/deletion

http://security.stackexchange.com/questions/10464/why-is-writing-zeros-or-random-data-over-a-hard-drive-multiple-times-better-th

[http://www.theguardian.com/world/video/2014/jan/31/snowden-files-computer-destroyed-guardian-gchq-basement-video theguardian_snowden-files-computer-destroyed]