The Most Popular Thing You've Probably Never Heard Of
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations
UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations Title A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Permalink https://escholarship.org/uc/item/6w76f8x7 Author Swift, Kathy Publication Date 2017 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Santa Barbara A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Education by Kathleen Anne Swift Committee in charge: Professor Richard Duran, Chair Professor Diana Arya Professor William Robinson September 2017 The dissertation of Kathleen Anne Swift is approved. ................................................................................................................................ Diana Arya ................................................................................................................................ William Robinson ................................................................................................................................ Richard Duran, Committee Chair June 2017 A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Copyright © 2017 by Kathleen Anne Swift iii ACKNOWLEDGEMENTS I would like to thank the members of my committee for their advice and patience as I worked on gathering and analyzing the copious amounts of research necessary to -
Sample Iis Publication Page
https://doi.org/10.48009/1_iis_2012_133-143 Issues in Information Systems Volume 13, Issue 1, pp. 133-143, 2012 HACKERS GONE WILD: THE 2011 SPRING BREAK OF LULZSEC Stan Pendergrass, Robert Morris University, [email protected] ABSTRACT Computer hackers, like the group known as Anonymous, have made themselves more and more relevant to our modern life. As we create and expand more and more data within our interconnected electronic universe, the threat that they bring to its fragile structure grows as well. However Anonymous is not the only group of hackers/activists or hacktivists that have made their presence known. LulzSec was a group that wreaked havoc with information systems in 2011. This will be a case study examination of their activities so that a better understanding of five aspects can be obtained: the Timeline of activities, the Targets of attack, the Tactics the group used, the makeup of the Team and a category which will be referred to as The Twist for reasons which will be made clear at the end of the paper. Keywords: LulzSec, Hackers, Security, AntiSec, Anonymous, Sabu INTRODUCTION Information systems lie at the heart of our modern existence. We deal with them when we work, when we play and when we relax; texting, checking email, posting on Facebook, Tweeting, gaming, conducting e-commerce and e- banking have become so commonplace as to be nearly invisible in modern life. Yet, within each of these electronic interactions lies the danger that the perceived line of security and privacy might be breached and our most important information and secrets might be revealed and exploited. -
Hard-Coded Censorship in Open Source Mastodon Clients — How Free Is Open Source?
Proceedings of the Conference on Technology Ethics 2020 - Tethics 2020 Hard-coded censorship in Open Source Mastodon clients — How Free is Open Source? Long paper Juhani Naskali 0000-0002-7559-2595 Information Systems Science, Turku School of Economics, University of Turku Turku, Finland juhani.naskali@utu.fi Abstract. This article analyses hard-coded domain blocking in open source soft- ware, using the GPL3-licensed Mastodon client Tusky as a case example. First, the question of whether such action is censorship is analysed. Second, the licensing compliance of such action is examined using the applicable open-source software and distribution licenses. Domain blocking is found to be censorship in the literal definition of the word, as well as possibly against some the used Google distribu- tion licenses — though some ambiguity remains, which calls for clarifications in the agreement terms. GPL allows for functionalities that limit the use of the software, as long as end-users are free to edit the source code and use a version of the appli- cation without such limitations. Such software is still open source, but no longer free (as in freedom). A multi-disciplinary ethical examination of domain blocking will be needed to ascertain whether such censorship is ethical, as all censorship is not necessarily wrong. Keywords: open source, FOSS, censorship, domain blocking, licensing terms 1 Introduction New technologies constantly create new challenges. Old laws and policies cannot al- ways predict future possibilities, and sometimes need to be re-examined. Open source software is a licensing method to freely distribute software code, but also an ideology of openness and inclusiveness, especially when it comes to FOSS (Free and Open-source software). -
Deciphering L33tspeak
Ghent University Faculty of Arts and Philosophy Thesis Deciphering L33t5p34k Internet Slang on Message Boards Supervisor: Master Paper submitted in partial fulfilment of Prof. Anne-Marie Simon-Vandenbergen the requirements for the degree of ―Master in de Taal- en Letterkunde – Afstudeerrichting: Engels‖ By Eveline Flamand 2007-2008 i Acknowledgements I would like to thank my promoter, professor Anne-Marie Vandenbergen, for agreeing on supervising this perhaps unconventional thesis. Secondly I would like to mention my brother, who recently graduated as a computer engineer and who has helped me out when my knowledge on electronic technology did not suffice. Niels Cuelenaere also helped me out by providing me with some material and helping me with a Swedish translation. The people who came up to me and told me they would like to read my thesis, have encouraged me massively. In moments of doubt, they made me realize that there is an audience for this kind of research, which made me even more determined to finish this thesis successfully. Finally, I would also like to mention the members of the Filologica forum, who have been an inspiration for me. ii Index 1. Introduction .......................................................................................................................... 1 2. Methodology ......................................................................................................................... 1 2.1 4chan ............................................................................................................................... -
Speaking in Lolcats
Transcribed text of an address to the Educational Computing Organization of Ontario, Richmond Hill, Ontario, November 12, 2009. Audio and slides available at http://www.downes.ca/presentation/232 Thanks everyone, and people online you should be hearing me OK, if not just say something in the chat area. Your chat area is being viewed by an audience here in Richmond Hill, which I had never really heard of before I came here, so I’m kind of… that’s good Christina, excellent. Now some of the people in the room may be joining you and anything you say in the chat area can be viewed by people in the room. We’re recording the Elluminate session – I’m not going to press my luck and try for video. Elluminate does support video and it supports it rather well, but I have to be standing right here the entire time because it would use the iSight monitor (I don’t have a video camera hooked up) and I don’t want to do the entire presentation like this, so I won’t. This is the second of two presentations today, and as I said in the first presentation, when you do two presentations in a day, there’s a good one and a bad one – this is the good one. It’s a fairly sweeping and ambitious presentation. It’s probably not the sort of presentation you’ll see in any of the other sessions. I’m trying to go someplace a bit different. 2 Stephen Downes It’s the first time I’ve tried this material, though I’ve tried bits and pieces of it, and it’s something I’ve been thinking about for a long time. -
I Give Permission for Public Access to My Thesis and for Any Copying to Be Done at the Discretion of the Archives Librarian And/Or the College Librarian
1 I give permission for public access to my thesis and for any copying to be done at the discretion of the archives librarian and/or the College librarian. Emily Merritt 06/22/12 An Analysis of the Discourse of Internet Trolling: A Case Study of Reddit.com Student presenter: Emily Rose Merritt Project advisor: Esther Castro-Cuenca With the proliferation of social media and community discussion and forum websites, interest in understanding and explaining communication on the Internet (with an emphasis on language-based communication) is on the rise. Over time, new genres of interaction have developed that take place primarily or exclusively in online communication, and with them has developed the need to investigate the structure of these interactions, what their function is within conversations and communities, what their place is within certain Internet discourses, and over time what effects they have on communication on and offline. Thus far many of these genres have been deemed at best disruptive and at worst anti-social, but when studied from a judgment-free point of view show high levels of complexity and offer us excellent opportunities to understand how the Internet is shaping and being shaped by new kinds and contexts of communication. One of these genres of interaction that has gained significant fame on some very popular forums and discussion sites is called trolling. Trolling occurs on discussion sites or message boards when a user intentionally posts erroneous or inflammatory information with the intention of provoking a strong reaction out of other users. The objective of this study is to understand the complexities of trolling, as well as some of its functions and outcomes in anonymous online communication. -
An Instance of Hybrid Cryptography
EsoCipher: An Instance of Hybrid Cryptography Neel Adwani University of Petroleum and Energy Studies Dehradun, Uttarakhand [email protected] ABSTRACT esoteric language is Brainfuck [5], which became notable for its This paper proposes a whole new concept in the field of Cryptog- minimalistic expressions. The whole language constitutes 8 simple raphy, i.e., EsoCiphers. Short for Esoteric Cipher, EsoCipher is an commands and an instruction pointer. LOLCODE [8] is yet another algorithm, which can be understood by a few, who have the knowl- esoteric language, which is based on the lolcat meme. So, its files edge about its backend architecture. The idea behind this concept are generated of the extensions .lol and .lols. Since its inspiration is derived from esoteric programming languages, but EsoCiphers comes from memes over the internet, the syntax contains keywords will be having a practical use in the future, as more research is done like HAI, BTW, GTFO, KTHXBYE. on the topic. Although the algorithm is quite simple to understand, While there’s no intended practical use of esoteric languages, Es- the complexity of the output will indeed prove to be difficult to oCipher may be considered obfuscated but it can be proven useful in bruteforce if a secret is embedded to it. It uses a hybrid cryptog- some fields. Since a lot of exploration hasn’t been done around this raphy based technique, which combines ASCII, Binary, Octal and topic, it is hard to determine the usability of the given algorithms in ROT 13 ciphers. The implementation and similarity index has been this paper, but intentionally EsoCiphers can be useful in preventing provided to show that it can be implemented practically. -
"Is There a Translator in Teh [Sic] House?": Cultural and Discourse
Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2005 "Is there a translator in teh [sic] house?": cultural and discourse analysis of a virtual speech community on an internet message board Tracy Rene LeBlanc Louisiana State University and Agricultural and Mechanical College Follow this and additional works at: https://digitalcommons.lsu.edu/gradschool_theses Part of the Social and Behavioral Sciences Commons Recommended Citation LeBlanc, Tracy Rene, ""Is there a translator in teh [sic] house?": cultural and discourse analysis of a virtual speech community on an internet message board" (2005). LSU Master's Theses. 4112. https://digitalcommons.lsu.edu/gradschool_theses/4112 This Thesis is brought to you for free and open access by the Graduate School at LSU Digital Commons. It has been accepted for inclusion in LSU Master's Theses by an authorized graduate school editor of LSU Digital Commons. For more information, please contact [email protected]. “IS THERE A TRANSLATOR IN TEH HOUSE?”: CULTURAL AND DISCOURSE ANALYSIS OF A VIRTUAL SPEECH COMMUNITY ON AN INTERNET MESSAGE BOARD A Thesis Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment of the requirements for the degree of Master of Arts In The Department of Geography and Anthropology by Tracy Rene LeBlanc B.A. University of Louisiana at Lafayette, 1999 May 2005 ACKNOWLEDGMENTS So many people have contributed to my success, both as a student and as a human being. My mother and father have been steadfast in their support and encouragement throughout my successes and my not so wise decisions. -
Post-Digital Cultures of the Far Right
Maik Fielitz, Nick Thurston (eds.) Post-Digital Cultures of the Far Right Political Science | Volume 71 Maik Fielitz, Nick Thurston (eds.) Post-Digital Cultures of the Far Right Online Actions and Offline Consequences in Europe and the US With kind support of Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Na- tionalbibliografie; detailed bibliographic data are available in the Internet at http://dnb.d-nb.de This work is licensed under the Creative Commons Attribution-NonCommercial-No- Derivatives 4.0 (BY-NC-ND) which means that the text may be used for non-commer- cial purposes, provided credit is given to the author. For details go to http://creativecommons.org/licenses/by-nc-nd/4.0/ To create an adaptation, translation, or derivative of the original work and for com- mercial use, further permission is required and can be obtained by contacting [email protected] Creative Commons license terms for re-use do not apply to any content (such as graphs, figures, photos, excerpts, etc.) not original to the Open Access publication and further permission may be required from the rights holder. The obligation to research and clear permission lies solely with the party re-using the material. © 2019 transcript Verlag, Bielefeld Cover layout: Kordula Röckenhaus, Bielefeld Typeset by Alexander Masch, Bielefeld Printed by Majuskel Medienproduktion GmbH, Wetzlar Print-ISBN 978-3-8376-4670-2 PDF-ISBN 978-3-8394-4670-6 https://doi.org/10.14361/9783839446706 Contents Introduction | 7 Stephen Albrecht, Maik Fielitz and Nick Thurston ANALYZING Understanding the Alt-Right. -
Pivot to Coronavirus: How Meme Factories Are Crafting Public Health Messaging 28 July 2020, by Crystal Abidin
Pivot to coronavirus: How meme factories are crafting public health messaging 28 July 2020, by Crystal Abidin Through this, they can have a huge influence in shaping social media. And—using the language of internet visual pop culture—meme factories can shift public opinion. When meme factories were born The first mention of meme factories seems to have been a slide in a 2010 TED talk by Christopher Poole, the founder of the controversial uncensored internet forum 4chan. 4chan, said Poole, was "completely raw, completely unfiltered." He introduced his audience to the new internet phenomenon of "memes" coming out of the forum, including LOLcats and Rickrolling – the largest memes to have emerged in the 2000s. ‘LOLcats’ were one of the meme forms of the 2000s. Credit: Clancy Ratliff/Wikimedia Commons, CC BY-SA Today, corporate meme factories systematically churn out posts to hundreds of millions of followers. Memes might seem like they emerge "naturally," They commissioned artists to "live-GIF" the 2012 circulated by like-minded social media users and US Presidential Election debates in an assembly independently generating momentum. But line of soft political content. They congregated on a successful memes often don't happen by accident. closed Facebook group to decide who could "take credit" for a school shooting. They created I've spent the past two years studying the history sponsored political posts for Michael Bloomberg's and culture of "meme factories," especially in Presidential campaign. Singapore and Malaysia. On reddit's gaming communities, activating a meme Meme factories are a coordinated network of factory (sincerely or in jest) requires willing creators or accounts who produce and host members to react with coordinated (and at times, memes. -
Studies on the Cross-Platform Relations Between Radical Political Web Subcultures
Selected Papers of #AoIR2020: The 21st Annual Conference of the Association of Internet Researchers Virtual Event / 27-31 October 2020 TRANSCODING BETWEEN HYPER-ANTAGONISTIC MILIEUS: STUDIES ON THE CROSS-PLATFORM RELATIONS BETWEEN RADICAL POLITICAL WEB SUBCULTURES Sal Hagen University of Amsterdam Emillie de Keulenaar Simon Fraser University Kings College London Stijn Peeters University of Amsterdam Marc Tuters University of Amsterdam Tom Willaert Vrije Universiteit Brussel Jack Wilson University of Warwick This panel brings together research into the hyper-antagonistic politics and cross- platform relations of radical Web subcultures, focused primarily on the U.S. context in the mid to late 2010’s. The papers share a concern with vernacular practices of “fringe” platforms favoured by an insurgent far-right movement and their relations to more “mainstream” social media. These fringe platforms engage in the production and propagation of vernacular artefacts often described as “memes”. Derived from an earlier and arguably outdated paradigm in evolutionary biology, the meme metaphor is not particularly attuned to the relationality of the material “milieus” in which they are developed, adopted, and used. In an effort to describe these practices without falling Hagen, S, de Keulenaar, E, Peeters, S, Tuters, M, Willaert, T, Wilson, J. (2020, October). Transcoding between Hyper-Antagonistic Milieus: Studies on the Cross-Platform Relations between Radical Political Web Subcultures. Panel presented at AoIR 2020: The 21th Annual Conference of the Association of Internet Researchers. Virtual Event: AoIR. Retrieved from http://spir.aoir.org. back on biological or epidemiological metaphors, the papers in this panel engage with the concept of “transcoding between milieus” (Deleuze & Guattari 1987, p. -
Media Manipulation and Disinformation Online Alice Marwick and Rebecca Lewis CONTENTS
Media Manipulation and Disinformation Online Alice Marwick and Rebecca Lewis CONTENTS Executive Summary ....................................................... 1 What Techniques Do Media Manipulators Use? ....... 33 Understanding Media Manipulation ............................ 2 Participatory Culture ........................................... 33 Who is Manipulating the Media? ................................. 4 Networks ............................................................. 34 Internet Trolls ......................................................... 4 Memes ................................................................. 35 Gamergaters .......................................................... 7 Bots ...................................................................... 36 Hate Groups and Ideologues ............................... 9 Strategic Amplification and Framing ................. 38 The Alt-Right ................................................... 9 Why is the Media Vulnerable? .................................... 40 The Manosphere .......................................... 13 Lack of Trust in Media ......................................... 40 Conspiracy Theorists ........................................... 17 Decline of Local News ........................................ 41 Influencers............................................................ 20 The Attention Economy ...................................... 42 Hyper-Partisan News Outlets ............................. 21 What are the Outcomes? ..........................................