RFID) That Can Be "Read" When Close to a Sensor

Total Page:16

File Type:pdf, Size:1020Kb

RFID) That Can Be PRESS RELEASE, Immediate distribution__ We are working on a new release of materials that includes the audio files of the press conference. Thanks to all the people interested in following up the case, we will keep you informed. We are translating the report to different languages, we have translated already to english, spanish and swedish. Mail us if you can translate the information presented in this website. Thanks! THE PHYSICAL ACCESS SECURITY TO WSIS: A PRIVACY THREAT FOR THE PARTICIPANTS. [IN PICTURES] PRESS RELEASE, Immediate distribution URL: http://www.contra.info/wsis | [email protected] PRESS CONFERENCE Friday 12th December 2003 at 11.30 am à « La Pastorale », Route de Ferney 106 à Genève http://www.pressclub.ch/archives/events_2003/event_121203_1130.htm [Press Release English PDF] - [Nota Prensa en Castellano] - Ass. Prof. Dr. Alberto Escudero-Pascual, Researcher in Computer Security and Privacy, Royal Institute of Technology, Stockholm, Sweden (EN, SP) Tel: + 41786677843 , +46 702867989 - Stephane Koch, President Internet Society Geneva, Executive Master of Economic Crime Investigations, Geneva, Switzerland. (FR, EN) Tel: +41 79 607 57 33 - George Danezis, Researcher in Privacy Enhancing Technologies and Computer Security, Cambridge University, UK. (FR, EN, GR) GENEVA, 10th DEC 2003 An international group of independent researchers attending the Word Summit on the Information Society (WSIS) has revealed important technical and legal flaws, relating to data protection and privacy, in the security system used to control access to the UN Summit. The system not only fails to guarantee the promised high levels of security but also introduces the very real possibility of constant surveillance of the representatives of the civil society. During the course of our investigation we were able to register for the Summit and obtain an official pass by “just” showing a fake plastic identity card and being photographed (via a webcam), with no other document or registration number required to obtain the pass. The limited personal data required to produce the fake ID and thus register was easily obtained - a name from the WSIS website of attendees. However this is only half of the story. http://www.nodo50.org/wsis/ (1 of 4)15.03.2004 19:07:32 PRESS RELEASE, Immediate distribution__ More photos of the WSIS Access Control The official Summit badges, which are plastic and the size of a credit card, hide a “RF smart card” [1] - a hidden chip that can communicate its information via radio frequency. It carries both a unique identifier associated with the participant, and a radio frequency tag (RFID) that can be "read" when close to a sensor. These sensors can be located anywhere, from vending machines to the entrance of a specific meeting room allowing the remote identification and tracking of participants, or groups of participants, attending the event. The data relating to the card holder (personal details, access authorization, account information, photograph etc.) is not stored on the smart card itself, but instead managed by a centralized relational database. This solution enables the centralized system to monitor closely every movement of the participants at the entrance of the conference center, or using data mining techniques, the human interaction of the participants and their relationship. The system can potentially be extended to track participants' movements within the summit and detect their presence at particular session. Because all of the personal data is stored in a centralized database, any part of the database can be replicated locally, or transferred to future events - for example the next WSIS Summit hosted by the Tunisian authorities in 2005. During the registration process we requested information about the future use of the picture and other information that was taken, and the built-in functionalities of the seemingly innocent plastic badge. No public information or privacy policy was available upon our demands, that could indicate the purpose, processing or retention periods for the data collected. The registration personnel were obviously not properly informed and trained. Our main concern is not only that the Summit participants lack information about the functionalities of this physical access system implemented, or that no one was able to answer questions of how the personal data would be treated after the Summit. The big problem is that system also fails to guarantee the promised high levels of security while introducing the possibility of constant surveillance of the representatives of civil society, many of whom are critical of certain governments and regimes. Sharing this data with any third party would be putting civil society participants at risk, but this threat is made concrete in the context of WSIS by considering the potential impact of sharing the data collected with the Tunisian government in charge of organizing the event in 2005. That a system like this gets implemented without a transparent and open discussion amounts to a real threat for the participants themselves, and for our Information Society as a whole. More information is available at: http://www.contra.info/wsis [email protected] NOTES TO EDITORS http://www.nodo50.org/wsis/ (2 of 4)15.03.2004 19:07:32 PRESS RELEASE, Immediate distribution__ • The World Summit of Information Society has contracted SportAccess, a Company of Kudelski Group, as the main responsible of an integrated solution for physical access control solution during the United Nations Summit of Information Society. The MultiSAK system has already been deployed in other meetings as the World Economic Forum in previous years and was globally designed and developed by NagraCard and NagraID. • The procedures of how personal data is being handled during WSIS break the principles of the Swiss Federal Law on Data Protection of June 1992 [2], the European Union Data Protection Directive 95/46/EC [3] and the United Nation guidelines concerning Computerized personal data files adopted by the General Assembly on December 1990. • The Electronic Privacy Information Center [1] has an extensive news archive and background material on the subject of privacy threats and RFtags. Usage of RFtags in supermarkets, to tag products for purposes of stock management and security, has already attracted oppositions on privacy grounds by CASPIAN (Consumers Against Supermarket Privacy Invasion and Numbering) [5] and has lead to campaigns for customer boycott of tagged products [6]. REFERENCES [1] Electronic Privacy Information Center Website about RFID Identification http://www.epic.org/privacy/rfid/ [2] Swiss Federal Law on Data Protection, http://www.edsb.ch/e/gesetz/schweiz/index.htm [3] European Union Data Protection Directive, http://europa.eu.int/comm/internal_market/privacy/index_en.htm [4] Guidelines for the Regulation of Computerized Personal Data Files, http://www.unhchr.ch/html/menu3/b/71.htm [5] - http://www.nocards.org/AutoID/overview.shtml [6]The Boycott Gillette Campaign - http://www.boycottgillette.org/ RELATED NEWS News in the following languages: Spanish, English, French, Dutch, German, Portuguese, Catalan, Galego... http://www.nodo50.org/wsis/ (3 of 4)15.03.2004 19:07:32 PRESS RELEASE, Immediate distribution__ ● 2003-12-10 [SP] WSIS hackeado ● 2003-12-10 [GA, PT] O WSIS foi hackeado!! ● 2003-12-10 [SP] El WSIS ha sido hackeado!! ● 2003-12-11 [SP] Burlada la seguridad de la Cumbre Mundial de la Sociedad de la Información ● 2003-12-11 [EN] What summit security? ● 2003-12-12 [EN] WSIS Physical Security Craked - Slashdot ● 2003-12-12 [EN] WSIS Security system violtes the data protection guidelines ● 2003-12-12 [EN] More info and pictures of the physical security at WSIS ● 2003-12-12 [CAT] Han hackejat la WSIS ● 2003-12-12 [FR] La sécurité du forum mondial sur la société de l'information aurait été piratée ! ● 2003-12-12 [SP] Amenaza a la privacidad de los participantes ● 2003-12-13 [NL] Inbraak in toegangssysteem WSIS-conferentie ● 2003-12-13 [SP]Entrevista con Alberto Escudero-Pascual, investigador de seguridad de ordenadores del Instituto Politécnico de Estocolmo, Suecia y miembro fundador del portal telemático Nodo50. 3609 KB MP3 (Red con Voz) ● 2003-12-13 [FR] La sécurité de l'accès physique au SMSI ● 2003-12-14 [EN] MIT's Furd Log ● 2003-12-14 [EN] Officials secretly RFID'd at Internet Summit - Slashdot ● 2003-12-14 [EN] Bug devices track officials at summit - Washington Times ● 2003-12-14 [EN] Officials bugged at international summit ● 2003-12-15 [EN] Why did WSIS bug delegates? - The Feature ● 2003-12-16 [IT] WSIS, i delegati erano spiati ● 2003-12-18 [EN] Summit group confirms use of ID chip - Washington Times ● 2003-12-23 [FR] RFID: les badges du sommet de Genève avaient des effets seconds More related articles ● RFID: les badges du sommet de Genève avaient des effets seconds AFNET. Association Francophone des Utilisateurs du net http://www.nodo50.org/wsis/ (4 of 4)15.03.2004 19:07:32 OBTAINING A WSIS BADGE IN PICTURES THE PERSONAL DATA COLLECTION AT WSIS VIOLATES THE SWISS, EU AND UN DATA PROTECTION GUIDELINES Here we describe the process we followed to obtained a secure badge of one of the participants. A high resolution of the pictures is available here Every participant to WSIS follow the signs to the registration desk. The participants were requested to carry the LETTER OF INVITATION that includes a REGISTRATION NUMBER and an IDENTITY CARD. The participants stand in a queue and provide a REGISTRATION NUMBER. The REGISTRATION NUMBER is checked against a database. The participants show an ID Card and a picture is taken of them via a Webcam. In our case we "only" provided the name of an existing participant that we obtained from the WSIS website and show a plastic card (as a secure ID Card) that contain the name of the participant and our picture. http://www.nodo50.org/wsis/pictures/ (1 of 5)16.03.2004 02:20:36 OBTAINING A WSIS BADGE IN PICTURES While we asked about the WSIS PRIVACY POLICY concerning the collection of personal data and what the badge contained, we did even have time to picture all the cameras.
Recommended publications
  • Violent Victimization in Cyberspace: an Analysis of Place, Conduct, Perception, and Law
    Violent Victimization in Cyberspace: An Analysis of Place, Conduct, Perception, and Law by Hilary Kim Morden B.A. (Hons), University of the Fraser Valley, 2010 Thesis submitted in Partial Fulfillment of the Requirements for the Degree of Master of Arts IN THE SCHOOL OF CRIMINOLOGY FACULTY OF ARTS AND SOCIAL SCIENCES © Hilary Kim Morden 2012 SIMON FRASER UNIVERSITY Summer 2012 All rights reserved. However, in accordance with the Copyright Act of Canada, this work may be reproduced, without authorization, under the conditions for “Fair Dealing.” Therefore, limited reproduction of this work for the purposes of private study, research, criticism, review and news reporting is likely to be in accordance with the law, particularly if cited appropriately. Approval Name: Hilary Kim Morden Degree: Master of Arts (School of Criminology) Title of Thesis: Violent Victimization in Cyberspace: An Analysis of Place, Conduct, Perception, and Law Examining Committee: Chair: Dr. William Glackman, Associate Director Graduate Programs Dr. Brian Burtch Senior Supervisor Professor, School of Criminology Dr. Sara Smyth Supervisor Assistant Professor, School of Criminology Dr. Gregory Urbas External Examiner Senior Lecturer, Department of Law Australian National University Date Defended/Approved: July 13, 2012 ii Partial Copyright Licence iii Abstract The anonymity, affordability, and accessibility of the Internet can shelter individuals who perpetrate violent acts online. In Canada, some of these acts are prosecuted under existing criminal law statutes (e.g., cyber-stalking, under harassment, s. 264, and cyber- bullying, under intimidation, s. 423[1]). However, it is unclear whether victims of other online behaviours such as cyber-rape and organized griefing have any established legal recourse.
    [Show full text]
  • Metaphors of Big Data
    International Journal of Communication 8 (2014), 1690–1709 1932–8036/20140005 Metaphors of Big Data CORNELIUS PUSCHMANN Humboldt University of Berlin, Germany JEAN BURGESS Queensland University of Technology, Australia Metaphors are a common instrument of human cognition, activated when seeking to make sense of novel and abstract phenomena. In this article we assess some of the values and assumptions encoded in the framing of the term big data, drawing on the framework of conceptual metaphor. We first discuss the terms data and big data and the meanings historically attached to them by different usage communities and then proceed with a discourse analysis of Internet news items about big data. We conclude by characterizing two recurrent framings of the concept: as a natural force to be controlled and as a resource to be consumed. Keywords: data, big data, conceptual metaphor, semantics, science, technology, discourse analysis Introduction The media discourse around big data is rife with both strong claims about its potential and metaphors to illustrate these claims. The opening article of a 2011 special issue of the magazine Popular Science reads: “A new age is upon us: the age of data” (”Data Is Power,” 2011). On the magazine’s cover, the headline “Data Is Power” appears next to a Promethean hand bathed in light. In this and similar accounts, big data is suggested to signal the arrival of a new epistemological framework, a Kuhnian paradigm shift with the potential to displace established models of knowledge creation and do away with scientific tenets such as representative sampling and the notion of theory (Anderson, 2008; Mayer- Schönberger & Cukier, 2013; Weinberger, 2012).
    [Show full text]
  • Metaphors of the World Wide Web
    . Metaphors of the World Wide Web .......... ‘The Web … is limited only by mans’ imagination’ User 3: 249 Amy Hogan [email protected] www.amyhogan.com . Metaphors of the World Wide Web AMY LOUISE HOGAN A dissertation submitted for the degree of Bachelor of Science University of Bath Department of Psychology June 2002 COPYRIGHT Attention is drawn to the fact that copyright of this dissertation rests with its author. This copy of the dissertation has been supplied on condition that anyone who consults it is understood to recognise that its copyright rests with its author and that no quotation from the dissertation and no information derived from it may be published without the prior written consent of the author. Preface . Metaphors of the World Wide Web ACKNOWLEDGEMENTS The greatest thing by far is to be a master of metaphor. It is the one thing that cannot be learned from others; it is also a sign of genius, since a good metaphor implies an eye for resemblance. -Aristotle, De Poetica, 322 B.C. Many thanks are extended to my dissertation supervisor, Professor Helen Haste – a true master of metaphor. Thanks are also extended to Dr. Anne Beaulieu for her insightful comments when the research was in its early stages. Finally, thanks go to all the participants who found time to detangle themselves from the Web. Preface . Metaphors of the World Wide Web Abstract In just nine years since its debut, the ‘Web’ has generated a wide variety of metaphorical expressions. Metaphor, a powerful linguistic device, is used when users try to make sense of the Web’s foreign environment by describing the unfamiliar in terms of the familiar.
    [Show full text]
  • Cybercommunities, Postmodern Aesthetics, and Political Musicking of Multimedia Mashups
    THE CREATION AND MEDIATION OF POLITICAL TEXTS IN VIRTUAL SPACES: CYBERCOMMUNITIES, POSTMODERN AESTHETICS, AND POLITICAL MUSICKING OF MULTIMEDIA MASHUPS M.A. THESIS Presented in Partial Fulfillment of the Requirements for the Degree Master of Arts in the Graduate School of The Ohio State University By Lindsay M. Bernhagen, B.A., M.A. ***** The Ohio State University 2008 Master‘s Thesis Committee: Professor Danielle Fosler-Lussier, Adviser Approved by Professor Daniel Avorgbedor Professor David Staley ______________________ Adviser Music Graduate Program ABSTRACT In the face of increasing consolidation of the radio market, a more conservative political climate, and growing sensitivity to public dissent in the wake of the Patriot Act, there has been a dearth of anti-war music in the mass music market since 2001. While country radio has provided a platform for the musical articulation of pro-war positions, YouTube, a video-sharing website, has become a place where the increasingly individual experience of listening to anti-war music can be supplemented with more communal listening. On YouTube, users on both sides of the war debate can create their own political mashups, a medium comprised of mixed audio samples and/or mixed video samples preserved for public consumption. Observing the behavior as a silent participant on the message boards corresponding to mashups of Toby Keith‘s ―Courtesy of the Red, White, and Blue (The Angry American)‖ and John Lennon‘s ―Imagine,‖ I demonstrate that political communities with specific communication and aesthetic values are being formed around these multimedia signs. Online communities offer a somewhat more democratic alternative for public articulation of political positions; however, the rhetoric of the online communities and of the larger musical-political climate post-9/11 is considerably parallel.
    [Show full text]
  • Marianne Van Den Boomen Trans Coding the Digital How Metaphors Matter in New Media
    MARIANNE VAN DEN BOOMEN TRANS CODING THE DIGITAL HOW METAPHORS MATTER IN NEW MEDIA A SERIES OF READERS PUBLISHED BY THE INSTITUTE OF NETWORK CULTURES ISSUE NO.: 14 MARIANNE VAN DEN BOOMEN TRANSCODING THE DIGITAL HOW METAPHORS MATTER IN NEW MEDIA Theory on Demand #14 Transcoding the Digital: How Metaphors Matter in New Media Author: Marianne van den Boomen Editorial support: Miriam Rasch Design and DTP: Katja van Stiphout Publisher: Institute of Network Cultures, Amsterdam 2014 Printer: ‘Print on Demand’ First 200 copies printed at Drukkerij Steenman, Enkhuizen ISBN: 978-90-818575-7-4 Earlier and different versions of Chapter 2 has been published in 2008 as ‘Interfacing by Iconic Metaphors’, in Configurations 16 (1): 33-55, and in 2009 as ‘Interfacing by Material Metaphors: How Your Mailbox May Fool You’, in Digital Material: Tracing New Media in Everyday Life and Technology, edited by Marianne van den Boomen, Sybille Lammes, Ann-Sophie Lehmann, Joost Raessens, and Mirko Tobias Schäfer. Amsterdam: Amsterdam University Press, p. 253-266. An earlier and different version of Chapter 6 has been published in 2006 as ‘Transcoding Metaphors after the Mediatic Turn’, in SPIEL 25 (h.1): 47-58. Contact Institute of Network Cultures Phone: +31 20 5951865 Email: [email protected] Web: http://www.networkcultures.org This publication is available through various print on demand services. For more information, and a freely downloadable PDF: http://networkcultures.org/publications This publication is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-SA 4.0). TRANSCODING THE DIGITAL 3 TRANSCODING THE DIGITAL HOW METAPHORS MATTER IN NEW MEDIA De transcodering van het digitale Hoe metaforen ertoe doen in nieuwe media (met een samenvatting in het Nederlands) PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Universiteit Utrecht op gezag van de rector magnificus, prof.dr.
    [Show full text]
  • Judicial Use of Metaphors for New Technologies
    “A ROSE BY ANY OTHER NAME”: JUDICIAL USE OF METAPHORS FOR NEW TECHNOLOGIES Stephanie A. Gore* It is now fairly established in cognitive science and linguistics that metaphors are an essential tool used to organize thought. It is human nature to reach for metaphors when trying to comprehend new concepts. Metaphors, however, may also selectively guide, or misguide, our cognitive processes. By emphasizing one aspect of a concept, a metaphor may blind us to other aspects that are inconsistent with the metaphor. The power of metaphor raises particular concerns in legal disputes wherein the resolution depends on comprehending new or developing technology. First, concerns have been raised regarding the judiciary’s ability to understand complex technology. Second, fear is a powerful barrier to learning, and fear of technology is a common phenomenon. Third, metaphors can be seductive, and may lead a person to end efforts to understand a new (perhaps daunting) concept too quickly. Finally, metaphors play a particularly powerful role in the law, since a court may inherit as precedent metaphors chosen by another court. All of this leads to the potential for the creation of precedents in which courts substitute poorly fitting metaphors for true comprehension of the technology at issue. This Article examines the use of metaphors by courts to comprehend new and developing technologies. It further examines the danger in the selection of definitional metaphors for new and changing technology, and how courts can avoid such dangers through recognition of both the limits of metaphors and the need to keep the metaphorical door open to information—and even * Assistant Professor of Law, Florida State University College of Law; J.D., University of Chicago Law School, 1994; M.S., Computer and Information Sciences, Georgia Institute of Technology, 1989; B.S., Computer Science, Stanford University, 1988.
    [Show full text]
  • Metaphoric Interaction with the Internet
    USERS’ METAPHORIC INTERACTION WITH THE INTERNET AMY LOUISE HOGAN A thesis submitted for the degree of Doctor of Philosophy University of Bath Department of Psychology March 2008 COPYRIGHT Attention is drawn to the fact that copyright of this thesis rests with its author. This copy of the thesis has been supplied on condition that anyone who consults it is understood to recognise that its copyright rests with its author and that no quotation from the thesis and no information derived from it may be published without the prior written consent of the author. This thesis may be made available for consultation within the University Library and may be photocopied or lent to other libraries for the purposes of consultation. .................................................................................. TABLE OF CONTENTS TABLE OF CONTENTS _____________________________________________ ii LIST OF TABLES __________________________________________________ xi LIST OF FIGURES ________________________________________________ xvi ACKNOWLEDGEMENTS __________________________________________ xix ABSTRACT ______________________________________________________ xxi STRUCTURE OF THESIS _________________________________________ xxii DEFINITIONS ___________________________________________________ xxvi CHAPTER 1. INTRODUCTION TO THE RESEARCH _________________1 1.1 OVERVIEW _____________________________________________________ 2 1.2 THE INTERNET _________________________________________________ 7 1.2.1 The contemporary Internet: 2001-2004 ____________________________
    [Show full text]
  • Imagining Afghanistan: Global Fiction and Film of the 9/11 Wars
    Purdue University Purdue e-Pubs Purdue University Press Books Purdue University Press Fall 9-16-2019 Imagining Afghanistan: Global Fiction and Film of the 9/11 Wars Alla Ivanchikova Hobart and William Smith Colleges Follow this and additional works at: https://docs.lib.purdue.edu/purduepress_ebooks Part of the Comparative Literature Commons, and the English Language and Literature Commons Recommended Citation Ivanchikova, Alla, Imagining Afghanistan: Global Fiction and Film of the 9/11 Wars. (2019). Purdue University Press. (Knowledge Unlatched Open Access Edition.) This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information. Comparative Cultural Studies Ari Ofengenden, Series Editor The series examines how cultural practices, especially contemporary creative media, both shape and themselves are shaped by current global developments such as the digitization of culture, virtual reality, global interconnectedness, increased people flows, transhumanism, environ- mental degradation, and new forms of subjectivities. We aim to publish manuscripts that cross disciplines and national borders in order to provide deep insights into these issues. Alla Ivanchikova Purdue University Press West Lafayette, Indiana Copyright 2019 by Purdue University. Printed in the United States of America. Cataloging-in-Publication data is on file with the Library of Congress. Paperback ISBN: 978-1-55753-846-8 An electronic version of this book is freely available, thanks to the support of libraries working with Knowledge Unlatched. KU is a collaborative initiative designed to make high-quality books Open Access for the public good. The Open Access ISBN for this book is 978-1-55753-975-5.
    [Show full text]
  • Kirk Lynn Cv
    KIRK LYNN Department of Theatre and Dance Playwriting and Directing Program University of Texas at Austin 1 University Station D3900 Austin, TX 78712 [email protected] RESEARCH INTERESTS AND FIELDS Writing for contemporary performance, fiction, screenwriting, the anthropology of play EDUCATION 2004 Master of Fine Arts in Playwriting, James A. Michener Center for Writers, The University of Texas at Austin • Secondary Concentration: Fiction 1993 Bachelor of Arts in English, The University of Texas at Austin • Graduated Cum Laude EMPLOYMENT Appointments at The University of Texas at Austin 2008-present The University of Texas at Austin, Department of Theatre and Dance • 2017-Present: Associate Professor, Head of Playwriting • 2016-2017: Associate Professor, Performance Production Division Head (incl. Design, Playwriting, Directing, Production) • 2013-2016: Assistant Professor, Head of Playwriting/Directing Program • 2010-2013: Lecturer • 2008-2010: Adjunct Professor Other Appointments 2014-present Lecturer in Playwriting, Yale University, School of Drama 2005 Guest Artist, Florida State University, Tallahassee Additional Professional Employment 1995-present Founding Co-producing Artist Director, Rude Mechs, Austin, TX • 2004-2008: Development Director HONORS AND AWARDS 2018 Inducted into the Texas Institute of Letters Herb Alpert Award Nomination 2017 Howlround National Convening for the Committee of the Jubilee Lynn CV 1 2017 New Harmony Project, Writer in Full Development 2016 National Endowment for the Arts, Project Grant, Key Artist, Perverse Results: Not Every Mountain ($12,000) 2016 Writers' League of Texas Book Awards Discovery Prize Winner for Fiction for Rules for Werewolves 2015 Kenyon Playwrights Conference Commission of a new play entitled The Cabin ($15,000) Faculty Fellow, College of Fine Arts, The University of Texas at Austin College of Fine Arts, Summer Stipend, The University of Texas at Austin 2014 Herb Alpert Award Nomination 2013 Map Fund Grant, Key Artist, Stop Hitting Yourself ($23,000) B.
    [Show full text]
  • Marianne Van Den Boomen Transcoding the Digital How Metaphors Matter in New Media Transcoding the Digital 3
    MARIANNE VAN DEN BOOMEN TRANSCODING THE DIGITAL HOW METAPHORS MATTER IN NEW MEDIA TRANSCODING THE DIGITAL 3 Theory on Demand #14 TRANSCODING THE DIGITAL Transcoding the Digital: How Metaphors Matter in New Media HOW METAPHORS MATTER IN NEW MEDIA Author: Marianne van den Boomen Editorial support: Miriam Rasch De transcodering van het digitale Design and DTP: Katja van Stiphout Hoe metaforen ertoe doen in nieuwe media Publisher: Institute of Network Cultures, Amsterdam 2014 (met een samenvatting in het Nederlands) Printer: ‘Print on Demand’ First 200 copies printed at Drukkerij Steenman, Enkhuizen ISBN: 978-90-818575-7-4 Earlier and different versions of Chapter 2 has been published in 2008 as ‘Interfacing by Iconic PROEFSCHRIFT Metaphors’, in Configurations 16 (1): 33-55, and in 2009 as ‘Interfacing by Material Metaphors: How Your Mailbox May Fool You’, in Digital Material: Tracing New Media in Everyday Life and ter verkrijging van de graad van doctor aan de Universiteit Utrecht Technology, edited by Marianne van den Boomen, Sybille Lammes, Ann-Sophie Lehmann, Joost op gezag van de rector magnificus, prof.dr. G.J. van der Zwaan, ingevolge Raessens, and Mirko Tobias Schäfer. Amsterdam: Amsterdam University Press, p. 253-266. het besluit van het college voor promoties in het openbaar te verdedigen An earlier and different version of Chapter 6 has been published in 2006 as op woensdag 12 februari 2014 des middags te 12.45 uur ‘Transcoding Metaphors after the Mediatic Turn’, in SPIEL 25 (h.1): 47-58. Contact door Institute of Network Cultures Marianne Veronica Theresia van den Boomen Phone: +31 20 5951865 geboren op 28 november 1955 te Den Haag Email: [email protected] Web: http://www.networkcultures.org This publication is available through various print on demand services.
    [Show full text]
  • Jamet, University of Lyon (Jean Moulin – Lyon 3) ([email protected])
    What do Internet metaphors reveal about the perception of the Internet?1 Denis L. Jamet, University of Lyon (Jean Moulin – Lyon 3) ([email protected]) Abstract The objective of this article is to throw light on what Internet metaphors – i.e. the metaphors used every day by English and French native speakers – reveal about their perception of the Internet. Within the framework of cognitive linguists such as Lakoff & Johnson, Sweetser, Turner, etc., I will analyze Internet metaphors to bring out the conceptual metaphors generating the various Internet metaphors, in English and in French. The main aim of this paper is to examine Internet linguistic metaphors a.k.a. Internet metaphorical expressions used to conceptualize the Internet, and try and see what conceptual metaphor(s) structure(s) the everyday metaphors we use to refer to the Internet, as well as the changing perception we have of it. Dieser Artikel untersucht Metaphern, mit denen die Technologie des Internet durch englische und französische Muttersprachler konzeptualisiert wird. Theoretischer Ausgangspunkt ist die kognitive Metapherntheorie, die von Lakoff & Johnson entwickelt sowie von Sweetser und Turner weiterentwickelt wurde. Ziel der Untersuchung ist es, die unterschiedlichen sprachlichen und konzeptuellen Metaphern aufzudecken und zu analysieren sowie Überlegungen dahingehend anzustellen, inwiefern ein konzeptuell metaphorischer Wandel im Zusammenhang mit einem Wahrnehmungswandel des Internet steht. 1. Introduction Any cognitive linguist is sure to know Lakoff and Johnson’s famous statement about the omnipresence of metaphor in human cognition and human life: [M]etaphor is pervasive in everyday life, not just in language but in thought and action. Our ordinary conceptual system, in terms of which we both think and act, is fundamentally metaphorical in nature.
    [Show full text]
  • Princeton University Press, 2000
    JRN 449 Writing About War: Seeking Narratives in Conflict Prof. Thanassis Cambanis (MPA *00, former New York Times and Boston Globe correspondent) Spring 2009, Thursdays, 1:30 to 4:20, Henry House Contact professor at [email protected]. Catalogue Description: This course will teach students how to extract gripping and precise narratives from the fog of war, and how to cover with perspective the diffuse political decision-making that leads to war. We will learn about the mechanics of covering conflict. We will read journalistic, literary and philosophical accounts of war. Students will produce original reported narrative journalism, culminating in a piece of reporting they may try to place for publication. Seminar participants will visit The New York Times newsroom, and either Human Rights Watch or the International Rescue Committee. Goals and structure of course: This course will explore how to write about conflict and war. We will examine and practice journalism at either end, beginning with the political process of war-making and ending with the visceral experience of war itself. We will learn what makes a narrative compelling; we will also refine techniques to keep war reporting in balance – critical, truth-speaking, and contextual – under the distorting pressure of wartime. Today, the Iraq war and the post-9/11 “Global War on Terror” have lent urgency to the need for better conflict journalism. The same quandaries arise in other crucial hotspots: nuclear Iran, roiling Israel-Palestine, resurgent Russia. But the same questions and principles inform the low-ebb, never-ending conflicts that receive less notice but touch much of the world.
    [Show full text]