A Digital Janus: Looking Forward, Looking Back

Total Page:16

File Type:pdf, Size:1020Kb

A Digital Janus: Looking Forward, Looking Back A Digital Janus: Looking Forward, Looking Back Item Type Book Authors Moser, Dennis; Dun, Susan Publisher Inter-Disciplinary Press Download date 06/10/2021 02:37:47 Link to Item http://hdl.handle.net/11122/5300 A Digital Janus Critical Issues Series Editors Dr Robert Fisher Lisa Howard Dr Ken Monteith Advisory Board Karl Spracklen Simon Bacon Katarzyna Bronk Stephen Morris Jo Chipperfield John Parry Ann-Marie Cook Ana Borlescu Peter Mario Kreuter Peter Twohig S Ram Vemuri Kenneth Wilson John Hochheimer A Critical Issues research and publications project. http://www.inter-disciplinary.net/critical-issues/ The Cyber Hub ‘Cybercultures: Exploring Critical Issues’ 2014 A Digital Janus: Looking Forward, Looking Back Edited by Dennis Moser and Susan Dun Inter-Disciplinary Press Oxford, United Kingdom © Inter-Disciplinary Press 2014 http://www.inter-disciplinary.net/publishing/id-press/ The Inter-Disciplinary Press is part of Inter-Disciplinary.Net – a global network for research and publishing. The Inter-Disciplinary Press aims to promote and encourage the kind of work which is collaborative, innovative, imaginative, and which provides an exemplar for inter-disciplinary and multi-disciplinary publishing. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means without the prior permission of Inter-Disciplinary Press. Inter-Disciplinary Press, Priory House, 149B Wroslyn Road, Freeland, Oxfordshire. OX29 8HR, United Kingdom. +44 (0)1993 882087 ISBN: 978-1-84888-305-5 First published in the United Kingdom in eBook format in 2014. First Edition. Table of Contents Introduction A Digital Janus: Looking Forward, Looking Back ix Dennis Moser Part 1: Community, Memory, History, Art and Culture in Cyberspace Section 1.1 Theories and Concepts of Cyberspace and Cyberculture The Virtual Leash: Connected at Every Intersection Teigan Kollosche 5 The Digital Lives of the Dead: YouTube as a Practice of Cybermourning 15 Margaret Gibson and Marga Altena Section 1.2 Cyber-Subcultures The Arpeggio of Fragmentation: Music Bricolage in the Tracker Scene 31 Alberto José Viralhadas Ferreira 24 People Do Not Like the Horse Dance: YouTube as Community? 43 Kyong James Cho Section 1.3 Digital Memories: Concepts in Digitising Individual and Community Memory Virtual Communities and Identity Reconfiguration 55 Elena-Alis Costescu Section 1.4 Digital Memories: History and (Digital) Memory ‘Memories Are Just Dead Men Makin’ Trouble’: Digital Objects, Digital Memory, Digital History 67 Dennis Moser Encoding through Digital Memory and Our Remembrances 77 Segah Sak The Member’s a Virtual Gentleman 87 Patrick McEntaggart and Paul Wilson Section 1.5 Digital Memories: Cyber-Archaeology HyperScreens: The Presentation of Audiovisual Cultural Heritage through Interactive Media Platforms 99 Asen O. Ivanov Section 1.6 New Designs, Platforms and Art Practices Interface: The Actual Story 111 Funda Şenova Tunalı The Virtualisation of Architecture in the Digital Era 119 Vassilis Papalexopoulos and Artemis Psaltoglou Part 2 Places, Spaces, Politics, Society and Cyberculture Section 2.1 Emerging Practices in Social Networking Still a Long Way to Go: Media Branding in Social Network Sites 135 Sabine Baumann and Ulrike Rohn From Trolling for Newbs to Trolling for Cheezburger: An Analysis of the Transformation of Trolling 153 Catherine van Reenen Crowdfunded Film Campaigns: Drivers of Success 165 Jake Hobbs Section 2.2 Data Analysis Big Data and Governance 185 Maude Bonenfant, Marc Ménard, André Mondoux and Maxime Ouellet Section 2.3 Cyber-Policy and Cyber-Democracy and Their Impact on National and Global Politics Is Political Participation Online Effective? A Case Study of the Brazilian Federal Chamber of Representatives’ E-Democracy Initiative 199 Patrícia Gonçalves C. Rossini The Apparatus of Mobility and the Restriction from Cyberspace 209 Harris Breslow and Ilhem Allagui Cyber-Popular Pressure Can Improve Society 221 Miquel Rubio Domínguez Section 2.4 Narrative Architectures Filthy Lucre and Test Audiences: Fan Debates about Publishing Fan Fiction 231 Jennifer Roth and Monica Flegel Digital Literacy in Arabic Speakers: The Role of Bilingualism in Effective Use of Web Resources 243 Susan Dun and Dina Mutassem Section 2.5 New Media Literacies New Media Documentary: Playing with Documentary Film within the Database Logic and Culture 255 Ersan Ocak Visit(s) to the Museum: Visitors and Official Information Available on the Web 263 Olga Cristina Sousa and Abílio Oliveira Introduction A Digital Janus: Looking Forward, Looking Back Dennis Moser With each year, cyberculture and cyberspace become an increasingly integrated part of our realities. Their digital technologies have come to underpin many aspects of our lives, and ever more importantly, our history and our future. This is of concern to us as it has begun, and will increasingly continue, to exert considerable influence upon the institutions and structure of our societies, including those that define our future concepts of art and aesthetics, of our social interactions, of societal and individual remembrance, even how we will govern and be governed. As scholars and critics observing these changes, we seek out opportunities to discuss how to understand them, to ask questions about them, and to share our research about them. And these phenomena have been around long enough, and we have been discussing them long enough now, that an historical record has begun to emerge around the discussions and the phenomena themselves. But even at this stage of our existence, memory is itself imperfectly understood and history, too, is the subject of its own long-standing discussions. When our embrace of technology suggests that we can save ‘everything’ and that human memory can be enhanced, if not supplanted, by the use of that technology, then we must look carefully and try to understand what the implications are. To remember everything, indeed, to SAVE everything – is it a blessing or a curse? Is the ‘perfect’ memory of the history of armed conflict a desirable thing, if the breaches within the society so affected are to heal? Is the promise of digital ‘immortality’ possible, and if so, is it even desirable? When do we cease our time of mourning, if the dead are memorialised in digital perpetuity? And we must also consider the impact of cyberculture’s ubiquity – its reach raises questions of our concepts of being and aloneness. How can we experience solitude if we are all connected? Is the natural state of being soon to be ‘always on, always connected?’ These are but a few of the questions and considerations that presenters and attendees addressed at the 8th Global Conference, Cybercultures – Exploring Critical Issues, held in Prague, Czech Republic, in May, 2013. The conference also included a number of papers previously selected for the previously scheduled, but cancelled, 5th Global Conference, Digital Memories, that was to have been held earlier in the year. While that conference’s cancellation was unfortunate, the inclusion of a number of the scheduled papers fortunately made for a broader range than might previously have been possible. What follows, then, are the selected papers that effectively represented both conferences and present the even broader intellectual range covered. The book has been arranged into two parts along lines of intellectual focus that reveal the inter-connectedness within the conference. Part 1 entitled ‘Community, x Introduction __________________________________________________________________ Memory, History, Art and Culture in Cyberspace,’ comprises eleven chapters and consists of six subsections: 1. Theories and Concepts of Cyberspace and Cyberculture 2. Cyber-Subcultures 3. Digital Memories: Concepts in Digitising Individual and Community Memory 4. Digital Memories: History and (Digital) Memory 5. Digital Memories: Cyber-Archaeology 6. New Designs, Platforms and Art Practices Part 1 examines the relations that continue to develop between those who collect, create, curate, care for, and provide access to the manifestations of memory and history in our cultures today and the evolving digital technologies that offer new ways of working with the sources of that history and memory. It also explores what we are learning about memory and history, as the digital technologies of cyberculture give us the ability to capture events, seemingly in perpetuity. We begin with a subsection entitled ‘Theories and Concepts of Cyberspace and Cyberculture.’ In her chapter, ‘The Virtual Leash: Connected at Every Intersection’ Teigan Kollosche considers the impact of ubiquitous connectivity on navigation and travel and just how we may see less while being connected more. How does this new ‘virtual leash’ play out when the traveler is using social media networks and technology to traverse the globe? We continue by considering a different kind of journey as Margaret Gibson and Marga Altena explore the idea of ‘cybermourning’ in their chapter entitled ‘The Digital Lives of the Dead: YouTube as a Practice of Cybermourning.’ Investigating numerous videos on YouTube, they explore the idea of YouTube as a public place of mourning in a way that makes us reconsider our concepts of how we choose to memorialise the passing of other lives in a context that is filled with commercials and advertisers. They suggest that there changes taking place in how we deal with grief in public and how this space may serve to empower those who might have previously been
Recommended publications
  • The Changing Face of American White Supremacy Our Mission: to Stop the Defamation of the Jewish People and to Secure Justice and Fair Treatment for All
    A report from the Center on Extremism 09 18 New Hate and Old: The Changing Face of American White Supremacy Our Mission: To stop the defamation of the Jewish people and to secure justice and fair treatment for all. ABOUT T H E CENTER ON EXTREMISM The ADL Center on Extremism (COE) is one of the world’s foremost authorities ADL (Anti-Defamation on extremism, terrorism, anti-Semitism and all forms of hate. For decades, League) fights anti-Semitism COE’s staff of seasoned investigators, analysts and researchers have tracked and promotes justice for all. extremist activity and hate in the U.S. and abroad – online and on the ground. The staff, which represent a combined total of substantially more than 100 Join ADL to give a voice to years of experience in this arena, routinely assist law enforcement with those without one and to extremist-related investigations, provide tech companies with critical data protect our civil rights. and expertise, and respond to wide-ranging media requests. Learn more: adl.org As ADL’s research and investigative arm, COE is a clearinghouse of real-time information about extremism and hate of all types. COE staff regularly serve as expert witnesses, provide congressional testimony and speak to national and international conference audiences about the threats posed by extremism and anti-Semitism. You can find the full complement of COE’s research and publications at ADL.org. Cover: White supremacists exchange insults with counter-protesters as they attempt to guard the entrance to Emancipation Park during the ‘Unite the Right’ rally August 12, 2017 in Charlottesville, Virginia.
    [Show full text]
  • Northeasthistoricfilmcarlson 39
    NortheastHistoricFilmCarlson 1/29 Please review the Application Guidelines for details about the information requested in this proposal. Fields marked with an asterisk are required. Eligibility To be eligible for a Digitizing Hidden Collections grant in 2016, applicant projects must meet the following requirements: Minimum allowable request for 2016: $50,000 Maximum allowable request for 2016: single-institution projects: $250,000 / collaborative projects: $500,000 Minimum allowable project term: 12 months Maximum allowable project term: single-institution projects: 24 months / collaborative projects: 36 months Projects must begin between January 1 and June 1, 2017 Single-institution projects must be completed by May 31, 2019 Collaborative projects must be completed by May 31, 2020 Is this a collaborative project? Yes/No Yes What is the size of the request? NOTE: The minimum acceptable request in this program, for all projects, is $50,000. Single-institution projects can request no more than $250,000. Collaborative projects can request no more than $500,000. Amount Requested $322,092 Provide the proposed project length in whole months, and list the project start and end dates. NOTE: All projects must begin between January 1 and June 1, 2017. The minimum project length, for all projects, is 12 months. Single-institution projects can last up to 24 months and must end by May 31, 2019. Collaborative projects can last up to 36 months and must end by May 31, 2020. Project length (months) 18 Project Start Date 01/01/2017 Project End Date 06/30/2018 NortheastHistoricFilmCarlson 2/29 A note regarding principal investigators: An individual may not be named as a principal investigator (PI) on more than one proposal, and may not serve as PI on two funded projects simultaneously.
    [Show full text]
  • POPULAR SOCIAL MEDIA SITES Below Is a List of Some of the Most Commonly Used Youth and Teen Social Networking Sites and Tools
    POPULAR SOCIAL MEDIA SITES Below is a list of some of the most commonly used youth and teen social networking sites and tools. Ask.fm (http://ask.fm) Participants log on, post a question anonymously and anyone may answer anonymously. “Do you think I am fat?” or “Would you date me?” are examples of questions posted in the past. There have also been examples in which individuals were encouraged to kill themselves. The site has courted controversy by not having workable reporting, tracking or parental control processes, which have become the norm on other social media websites. Twitter (https://twitter.com) An online social networking and microblogging service that enables users to send and read "tweets", which are text messages limited to 140 characters. Instagram (http://instagram.com) A photo-sharing app for iPhone. Kik (http://kik.com) Kik is as an alternative to email or text messaging and its popularity has grown in the last two years. Kik is accessible on smartphones and supports over 4 million users, called “Kicksters.” Users are not restricted to sending text messages with Kik. Images, videos, sketches, emoticions and more may be sent. A user can block users on Kik from contacting them. Wanelo (http://wanelo.com) Wanelo (from Want, Need, Love) sells unique products online, all posted by users. Products posted for sale range from dishes, clothing, intimate wear and other potentially “R-Rated” products. Vine (https://vine.co) Vine is used to create and share free and instant six-second videos. Topic and content ranges. Snapchat (http://www.snapchat.com) A photo messaging application.
    [Show full text]
  • On the Emergence of Sinophobic Behavior on Web Communities In
    “Go eat a bat, Chang!”: On the Emergence of Sinophobic Behavior on Web Communities in the Face of COVID-19 Fatemeh Tahmasbi Leonard Schild Chen Ling Binghamton University CISPA Boston University [email protected] [email protected] [email protected] Jeremy Blackburn Gianluca Stringhini Yang Zhang Binghamton University Boston University CISPA [email protected] [email protected] [email protected] Savvas Zannettou Max Planck Institute for Informatics [email protected] ABSTRACT KEYWORDS The outbreak of the COVID-19 pandemic has changed our lives in COVID-19, Sinophobia, Hate Speech, Twitter, 4chan unprecedented ways. In the face of the projected catastrophic conse- ACM Reference Format: quences, most countries have enacted social distancing measures in Fatemeh Tahmasbi, Leonard Schild, Chen Ling, Jeremy Blackburn, Gianluca an attempt to limit the spread of the virus. Under these conditions, Stringhini, Yang Zhang, and Savvas Zannettou. 2021. “Go eat a bat, Chang!”: the Web has become an indispensable medium for information ac- On the Emergence of Sinophobic Behavior on Web Communities in the quisition, communication, and entertainment. At the same time, Face of COVID-19. In Proceedings of the Web Conference 2021 (WWW ’21), unfortunately, the Web is being exploited for the dissemination April 19–23, 2021, Ljubljana, Slovenia. ACM, New York, NY, USA, 12 pages. of potentially harmful and disturbing content, such as the spread https://doi.org/10.1145/3442381.3450024 of conspiracy theories and hateful speech towards specific ethnic groups, in particular towards Chinese people and people of Asian 1 INTRODUCTION descent since COVID-19 is believed to have originated from China.
    [Show full text]
  • The Uses of Animation 1
    The Uses of Animation 1 1 The Uses of Animation ANIMATION Animation is the process of making the illusion of motion and change by means of the rapid display of a sequence of static images that minimally differ from each other. The illusion—as in motion pictures in general—is thought to rely on the phi phenomenon. Animators are artists who specialize in the creation of animation. Animation can be recorded with either analogue media, a flip book, motion picture film, video tape,digital media, including formats with animated GIF, Flash animation and digital video. To display animation, a digital camera, computer, or projector are used along with new technologies that are produced. Animation creation methods include the traditional animation creation method and those involving stop motion animation of two and three-dimensional objects, paper cutouts, puppets and clay figures. Images are displayed in a rapid succession, usually 24, 25, 30, or 60 frames per second. THE MOST COMMON USES OF ANIMATION Cartoons The most common use of animation, and perhaps the origin of it, is cartoons. Cartoons appear all the time on television and the cinema and can be used for entertainment, advertising, 2 Aspects of Animation: Steps to Learn Animated Cartoons presentations and many more applications that are only limited by the imagination of the designer. The most important factor about making cartoons on a computer is reusability and flexibility. The system that will actually do the animation needs to be such that all the actions that are going to be performed can be repeated easily, without much fuss from the side of the animator.
    [Show full text]
  • Doxxing, Swatting and the New Trends in Online Harassment 22 April 2015, by Andrew Quodling
    Doxxing, swatting and the new trends in online harassment 22 April 2015, by Andrew Quodling citizens about "swatting" (see below) since 2008. It has become common to see articles about how these attacks have affected politicians (both Republican and Democrat in the US), celebrities, journalists, businesses, video game streamers and public servants. What is doxxing? Doxxing – named for "documents" or "docs" – is the act of release of someone's personal and/or When the SWAT team bursts into your bedroom, it’s not identifiable information without their consent. This only unpleasant but potentially deadly. Credit: Jason can include things like their full legal name, social Eppink/Flickr, CC BY security numbers, home or work addresses and contact information. There's no set format for a "dox"; the doxxer simply Imagine this: there's a knock at your door. "Pizza publishes whatever information they've managed to delivery!" It's the fifth time in the last hour that turn up in their searches. Sometimes this even you've had to say to a delivery-person: "No, I really includes the names and details of their target's didn't order anything." That's irritating. family or close friends. Half an hour later, there's another noise at the As a tactic of harassment, doxxing serves two door. This time it's forced open as your house is purposes: it intimidates the people targeted by stormed by the heavily armed and aggressive invading and disrupting their expectations of special response unit of your local police force. privacy; and it provides an avenue for the They're responding to a tip off that warned them of perpetuation of that person's harassment by a hostage situation at your address.
    [Show full text]
  • Videotape and Home Movie Day
    Videotape and Home Movie Day Incorporating video into a Home Movie Day event presents a host with technological and curatorial challenges. You’ll need to bring even more equipment including numerous decks, cables galore, and something to show tapes on, either a video projector or a large enough monitor. Since videotapes can go on for hours, you’ll need to set time limits in advance so no one person takes up more time than other attendees. But with a little planning you can easily be showing families’ histories recorded on tape alongside those on good ol’ small gauge film. Equipment Needs There is a daunting number of consumer-level videotape and optical video formats. But just as you can't expect to have a projector for every film format, you shouldn't expect to support every video format. In our experience, the most popular formats are VHS and Video8. DVD is also common format for people bringing in already-transferred home movies. You’ll need to balance your expectations of what video formats your particular audience will be bringing in with how much effort it will be to bring in a particular format. Other video formats to consider include, but are not limited to, Hi8, Digital8, Betamax, DV, SHS, and VHS-C. And don’t forget the difference between PAL, NTSC, and SECAM. Also, don’t forget to have enough cords and adapters to connect video decks to the monitor/projector. Depending on how many decks you are bringing to your HMD event, you might want to consider getting a video switcher.
    [Show full text]
  • The Christchurch Attack Report: Key Takeaways on Tarrant’S Radicalization and Attack Planning
    The Christchurch Attack Report: Key Takeaways on Tarrant’s Radicalization and Attack Planning Yannick Veilleux-Lepage, Chelsea Daymon and Amarnath Amarasingam i The Christchurch Attack Report: Key Takeaways on Tarrant’s Radicalization and Attack Planning Yannick Veilleux-Lepage, Chelsea Daymon and Amarnath Amarasingam ICCT Perspective December 2020 ii About ICCT The International Centre for Counter-Terrorism – The Hague (ICCT) is an independent think and do tank providing multidisciplinary policy advice and practical, solution- oriented implementation support on prevention and the rule of law, two vital pillars of effective counterterrorism. ICCT’s work focuses on themes at the intersection of countering violent extremism and criminal justice sector responses, as well as human rights-related aspects of counterterrorism. The major project areas concern countering violent extremism, rule of law, foreign fighters, country and regional analysis, rehabilitation, civil society engagement and victims’ voices. Functioning as a nucleus within the international counter-terrorism network, ICCT connects experts, policymakers, civil society actors and practitioners from different fields by providing a platform for productive collaboration, practical analysis, and exchange of experiences and expertise, with the ultimate aim of identifying innovative and comprehensive approaches to preventing and countering terrorism. Licensing and Distribution ICCT publications are published in open access format and distributed under the terms of the Creative Commons
    [Show full text]
  • How Existing Social Norms Can Help Shape the Next Generation of User-Generated Content
    Everything I Need To Know I Learned from Fandom: How Existing Social Norms Can Help Shape the Next Generation of User-Generated Content ABSTRACT With the growing popularity of YouTube and other platforms for user-generated content, such as blogs and wikis, copyright holders are increasingly concerned about potential infringing uses of their content. However, when enforcing their copyrights, owners often do not distinguish between direct piracy, such as uploading an entire episode of a television show, and transformative works, such as a fan-made video that incorporates clips from a television show. The line can be a difficult one to draw. However, there is at least one source of user- generated content that has existed for decades and that clearly differentiates itself from piracy: fandom and “fan fiction” writers. This note traces the history of fan communities and the copyright issues associated with fiction that borrows characters and settings that the fan-author did not create. The author discusses established social norms within these communities that developed to deal with copyright issues, such as requirements for non-commercial use and attribution, and how these norms track to Creative Commons licenses. The author argues that widespread use of these licenses, granting copyrighted works “some rights reserved” instead of “all rights reserved,” would allow copyright holders to give their consumers some creative freedom in creating transformative works, while maintaining the control needed to combat piracy. However, the author also suggests a more immediate solution: copyright holders, in making decisions concerning copyright enforcement, should consider using the norms associated with established user-generated content communities as a framework for drawing a line between transformative work and piracy.
    [Show full text]
  • Orca.Cf.Ac.Uk/118366
    This is an Open Access document downloaded from ORCA, Cardiff University's institutional repository: http://orca.cf.ac.uk/118366/ This is the author’s version of a work that was submitted to / accepted for publication. Citation for final published version: Smith, Daniel R. 2016. "Imagining others more complexly": celebrity and the ideology of fame among YouTube's "Nerdfighteria". Celebrity Studies 7 (3) , pp. 339-353. 10.1080/19392397.2015.1132174 file Publishers page: http://dx.doi.org/10.1080/19392397.2015.1132174 <http://dx.doi.org/10.1080/19392397.2015.1132174> Please note: Changes made as a result of publishing processes such as copy-editing, formatting and page numbers may not be reflected in this version. For the definitive version of this publication, please refer to the published source. You are advised to consult the publisher’s version if you wish to cite this paper. This version is being made available in accordance with publisher policies. See http://orca.cf.ac.uk/policies.html for usage policies. Copyright and moral rights for publications made available in ORCA are retained by the copyright holders. “Imagining others more complexly”: Celebrity and the ideology of fame among YouTube’s ‘Nerdfighteria’ ABSTRACT: YouTube has witnessed the growth of a celebrity culture of its own. This article explores the celebritification of online video-bloggers in relation to their own discursive community. Focusing on the VlogBrothers (John and Hank Green) and their community ‘Nerdfighters’, this article demonstrates how their philosophy of “Imagining Others More Complexly” (IOMC) is used to debate ‘celebrity’ and its legitimacy. Their vision of celebrity is egalitarian and democratic, rooted in Western culture’s ‘expressive turn’ (Taylor, 1989).
    [Show full text]
  • Radium: a Music Editor Inspired by the Music Tracker
    Radium: A Music Editor Inspired by the Music Tracker Kjetil Matheussen Norwegian Center for Technology in Music and the Arts. (NOTAM) Sandakerveien 24D, Bygg F3 N-0473 Oslo Norway [email protected] Abstract Musical events are defined with pure text. Radium is a new type of music editor inspired by The event C#3 5-32-000 plays the note C the music tracker. Radium's interface differs from sharp at octave 3 using instrument number 5 at the classical music tracker interface by using graphi- volume 32. The last three zeroes can be used cal elements instead of text and by allowing musical for various types of sound effects, or to set new events anywhere within a tracker line. tempo. Chapter 1: The classical music tracker interface The tables are called patterns, and a song and how Radium differs from it. Chapter 2: Ra- usually contains several patterns. To control dium Features: a) The Editor; b) The Modular the order patterns are playbed back, we use a Mixer; c) Instruments and Audio Effects; d) In- strument Configuration; e) Common Music Nota- playlist. For example, if we have three patterns, tion. Chapter 3: Implementation details: a) Paint- a typical song could have a playlist like this: ing the Editor; b) Smooth Scrolling; c) Embed- 1, 2, 1, 2, 3, 1, 2. ding Pure Data; d) Collecting Memory Garbage in C and C++. Chapter 4: Related software. 1.1 How Radium Differs from the Classical Tracker Interface Keywords Radium4 differs from the music tracker inter- Radium, Music Tracker, GUI, Pure Data, Graphics face by using graphical elements instead of text Programming.
    [Show full text]
  • Computer Demos—What Makes Them Tick?
    AALTO UNIVERSITY School of Science and Technology Faculty of Information and Natural Sciences Department of Media Technology Markku Reunanen Computer Demos—What Makes Them Tick? Licentiate Thesis Helsinki, April 23, 2010 Supervisor: Professor Tapio Takala AALTO UNIVERSITY ABSTRACT OF LICENTIATE THESIS School of Science and Technology Faculty of Information and Natural Sciences Department of Media Technology Author Date Markku Reunanen April 23, 2010 Pages 134 Title of thesis Computer Demos—What Makes Them Tick? Professorship Professorship code Contents Production T013Z Supervisor Professor Tapio Takala Instructor - This licentiate thesis deals with a worldwide community of hobbyists called the demoscene. The activities of the community in question revolve around real-time multimedia demonstrations known as demos. The historical frame of the study spans from the late 1970s, and the advent of affordable home computers, up to 2009. So far little academic research has been conducted on the topic and the number of other publications is almost equally low. The work done by other researchers is discussed and additional connections are made to other related fields of study such as computer history and media research. The material of the study consists principally of demos, contemporary disk magazines and online sources such as community websites and archives. A general overview of the demoscene and its practices is provided to the reader as a foundation for understanding the more in-depth topics. One chapter is dedicated to the analysis of the artifacts produced by the community and another to the discussion of the computer hardware in relation to the creative aspirations of the community members.
    [Show full text]