User:Michaela/thesis: Difference between revisions

From XPUB & Lens-Based wiki
No edit summary
No edit summary
Line 7: Line 7:


=ABSTRACT=
=ABSTRACT=
!!! missing !!!
<center>
''The traces of digital information are exponential ...<br>
They contain various sources...<br>
They travel, scattered, being trade - transacted or serve as a found footage for an artistic
interventions...<br>
Traces of digital data are tangible. Events or evidences, which meant to be deleted from a system...<br>
they serve as a subject of recovery, revisit and exposure...''<br>
</center>
 
==QUESTIONS I WANT TO ADDRESS IN MY ESSAY==
==QUESTIONS I WANT TO ADDRESS IN MY ESSAY==


Line 14: Line 22:
MAIN THEME: OWNERSHIP/ DIGITAL PROPERTY/ PROPERTY RIGHTS <br>
MAIN THEME: OWNERSHIP/ DIGITAL PROPERTY/ PROPERTY RIGHTS <br>


the following themes will appear and be revealed further in the text as a sub_themes.
the following themes will appear and be revealed further in the text as a sub_themes:
<br>
<br>
'''#problem_aspect #2'''<br>
'''#problem_aspect #2'''<br>
Line 27: Line 35:


<<The story of Ghana digital trash camps:
<<The story of Ghana digital trash camps:
<br>
<<< e-waste, data remanence, data thief  
<<< e-waste, data remanence, data thief  
or how the data can be recovered and serve as an evidence  
or how the data can be recovered and serve as an evidence  
Line 33: Line 40:


<<<'data erasure' term - or the only way to erase data permanently is physically to destroy a hard disk drive. In the past shredders were used to destroy confidential, secret papers now there are replaces by data shredders.<br>
<<<'data erasure' term - or the only way to erase data permanently is physically to destroy a hard disk drive. In the past shredders were used to destroy confidential, secret papers now there are replaces by data shredders.<br>
[http://www.theguardian.com/world/video/2014/jan/31/snowden-files-computer-destroyed-guardian-gchq-basement-video
<br>
theguardian_snowden-files-computer-destroyed]<br>
 
===='''<memory'''====
===='''<memory'''====
This chapter will be about the technical aspect of data recovery process   
This chapter will be about the technical aspect of data recovery process   
Line 47: Line 52:
This chapter will be about the final work. Description/ set up etc.
This chapter will be about the final work. Description/ set up etc.


links:<br>
'''links:<br>'''
 
[http://www.pbs.org/frontlineworld/stories/ghana804/video/video_index.html Ghana digital dumping ground article]
[http://www.pbs.org/frontlineworld/stories/ghana804/video/video_index.html Ghana digital dumping ground article]



Revision as of 14:54, 12 February 2014

Useful links:
A Guide to Essay Writing

Thesis Guidelines

Draft_ thesis skeleton:

ABSTRACT

The traces of digital information are exponential ...
They contain various sources...
They travel, scattered, being trade - transacted or serve as a found footage for an artistic interventions...
Traces of digital data are tangible. Events or evidences, which meant to be deleted from a system...
they serve as a subject of recovery, revisit and exposure...

QUESTIONS I WANT TO ADDRESS IN MY ESSAY

#problem_aspect #1

MAIN THEME: OWNERSHIP/ DIGITAL PROPERTY/ PROPERTY RIGHTS

the following themes will appear and be revealed further in the text as a sub_themes:
#problem_aspect #2
SUB_THEME: PRIVACY IN DIGITAL REALM
The ethical issue I want to address is: who has the right to withdrawal someone's data and how this data could be used, reused or misused?

#problem_aspect #3
SUB_THEME: AUTHORSHIP/CO-AUTHORSHIP/ MULTIPLE - AUTHORS
The problematic aspect of the recovered data: who is the actual author of the final work?

<ownership

<<The story of Ghana digital trash camps: <<< e-waste, data remanence, data thief or how the data can be recovered and serve as an evidence Questions about e-waste and digital recycling, digital trash and data recycling.

<<<'data erasure' term - or the only way to erase data permanently is physically to destroy a hard disk drive. In the past shredders were used to destroy confidential, secret papers now there are replaces by data shredders.

<memory

This chapter will be about the technical aspect of data recovery process more specifically: clusters, partitions, Gutmann method etc.

<code

This chapter is about the performative aspect of the code.
Code as Language

<space

This chapter will be about the final work. Description/ set up etc.

links:

Ghana digital dumping ground article

Illegal e-waste dumped in Ghana includes unencrypted hard drives full of US security secrets

Legend of multiple passes of overwriting:

http://grot.com/wordpress/?p=154

http://www.pcworld.com/article/209418/how_do_i_permanently_delete_files_from_my_hard_disk.html

https://ssd.eff.org/tech/deletion

http://security.stackexchange.com/questions/10464/why-is-writing-zeros-or-random-data-over-a-hard-drive-multiple-times-better-th

[http://www.theguardian.com/world/video/2014/jan/31/snowden-files-computer-destroyed-guardian-gchq-basement-video theguardian_snowden-files-computer-destroyed]