Digital Intimacies : Doing Digital Media Differently

Total Page:16

File Type:pdf, Size:1020Kb

Digital Intimacies : Doing Digital Media Differently Digital Intimacies Doing Digital Media Differently Helga Sadowski Linköping Studies in Arts and Science No. 691 Faculty of Arts and Sciences Linköping 2016 Linköping Studies in Arts and Science No. 691 At the Faculty of Arts and Sciences at Linköping University, research and doctoral studies are carried out within broad problem areas. Research is organized in interdisciplinary research environments and doctoral studies mainly in graduate schools. Jointly, they publish the series Linköping Studies in Arts and Science. This thesis comes from Unit of Gender Studies at the Department of Thematic Studies. Distributed by: Department of Thematic Studies Linköping University 581 83 Linköping Helga Sadowski Digital Intimacies Doing Digital Media Differently Edition 1:1 ISBN 978-91-7685-718-2 ISSN 0282-9800 © Helga Sadowski Department of Thematic Studies 2016 Covert art: Helga Sadowski Artwork chapter title pages: Sarah Hornikel & Carmen Geduhn Printed by: LiU-Tryck, Linköping 2016 Acknowledgements The past years as a PhD student have been very insightful, eventful and exciting, and I am very thankful to all the people that affected me, this thesis and its formation process in uncountable, most versatile and in- timate ways. Firstly, my deepest gratitude goes out to my amazing supervisors Cecilia Åsberg and Jenny Sundén. Thank you Cissi for your optimism, for always believing in me and for probably being my biggest cheer- leader. That helped a lot. Thank you for helping me to develop my pro- ject in this friendly feminist setting of unconventional and interdisci- plinary (post-) humanities. Thank you for all the creative input, for the laughs, and for introducing me to so many helpful and mind-bending academic texts (No worries, I will return the pile of books that you lent me soon ;-). Thank you also for occasionally taking me out of my com- fort zone, which for example made me find myself networking at the other end of the world. Every time you (gently) pushed me out of that comfort zone, it proved to be incredibly useful for me and the develop- ment of my work. Thank you so much for all your help and support, Jenny. I am su- per impressed by your ability to somehow know what I want to say when I am still struggling to find the words or to organize my thoughts. Your feedback has been indispensable and always inspiring. Thank you also for not minding (too much I hope) feeling like a broken record, when you had to explain certain things to me multiple times ;-). I al- ways enjoyed visiting you at Södertörn Högskola a lot, or when we met up in one of Stockholm’s Cafés. I always felt more hopeful afterwards. I also would like to thank Jeff Hearn who accompanied me in very early stages of the PhD process, when my project was very different from what it is now. Thank you for your dedication and kind support, for ‘showing me the academic ropes’, and for your great humor. Thanks also to the fantastic five, which are my co-PhD students starting also in September 2011. I am in awe when I see your incredible transformations into the brilliant and passionate scholars that you are, Tara Mehrabi, Line Henriksen, Marie-Louise Holm, Marietta Ra- domska and Desireé Ljungcrantz. Thank you for all your encouraging words, PhD student survival tips, cozy dinners and occasional crazi- ness. You are definitely ready to take over the world. Warm thanks go also out to all who have participated in my 60% seminar and final seminar, and offered thoughtful and enlightening comments. Thank you Jette Koefoed for providing much needed advice in how to structure my text at a point when it was still rather messy. Thank you Lissa Holloway-Attaway for engaging with my text in such a thorough manner. Thank you also Anna Lundberg for acting as a dis- cussant for my dissertation back then and now, and for pointing out the appearances of irony in some of my material as well as their entan- glement with neoliberal market logics. Thank you also Bodil Axelsson for your insightful comments, for welcoming me so warmly during my brief, but intense, interludes at and with Tema Q und ACSIS, and ena- bling and facilitating the exchange with the ICS at the University at Western Sydney. Thank you also Karin Fast for your extensive and con- siderate comments during and after the final seminar, and for the amazing course on mediatization processes. A big thanks also to the PhD student discussants at those seminars, Lisa “Simpson” Lindén and Marietta Radomska, you are walking encyclopedias of awesome knowl- edges to me. My gratitude also goes out to all who acted as (more or less) vol- untary proofreaders of my text during different stages of messiness. Thank you Carmen Geduhn, Daniel Sadowski, Jami Weinstein, Hanne Fjelde and Reinert Huseby Karlsen for fighting fearlessly through the chaos and offering thoughtful advice on how to get a grip on it. Thanks go also out to Sarah Hornikel and Carmen Geduhn for the artwork on the separation pages (I love it!), and to Liz Sourbut for the English lan- guage check and working ‘outside the office hours’ in order to help me meeting the deadline. I am grateful for all my wonderful colleagues who made and make Tema Genus such an extraordinary place and for all the things that you taught me over the years. Thank you Alma Persson (also for you help with the Swedish abstract), Alp Biricik, Anna Wahl, Anne-Charlott Callerstig, Anne-Li Lindgren, Åsa-Karin Engstrand, Berit Starkman, Björn Pernrud, Dag Balkmar, Edyta Just, Elisabeth Samuelsson, Emma Strollo, Frida Beckman, Jami Weinstein, Justin Makii, Kathe- rine Harrison, Klara Goedecke, Linn Sandberg, Lotta Callerstig, Madina Tlostanova, Magda Górska, Malena Gustavson, Margrit Shil- drick, Marianna Szcyzgielska, Monica Obreja, Nina Lykke, Olga Cielemęcka, Pat Treusch, Pia Laskar, Redi Koobak, Roger Klinth, Silje Lundgren, Stina Backman, Tanja Joelsson, Tanya Bureychak, Ulrica Engdahl, Victoria Kawesa, Wera Grahn, Wibke Straube, and others in various degrees of attachment to the Tema G universe. Thank you also Ian Dickson, Eva Danielson, Carin Ennergård, Barbro Axelsson, Camilla Jungström Hammar, Micke Brandt, Beatrice Rågard, and Anne-Christine Lindvall for technical and administrative support, and your patience with me. Big thanks also go out to all involved at the Posthumanities hub for all the though-provoking discussions (Thank you Cissi and all visit- ing scholars!), and to Iris van der Tuin and all involved in the on ‘How Matter Comes to Matter’ COST action. In particular, the ‘New Materi- alism Embracing the Creative Arts’ work group and Marie-Luise An- gerer who facilitated my short research stay at the Academy of Media Arts Cologne which influenced my take on affect and ASMR. Above this, I would also like to acknowledge some people who con- stantly have backed me up and reminded me of the pleasurable sides of life during a sometimes bumpy PhD ride: Thank you Annekatrin, Colin, Hanne, Holly, Ida, JM, Josefin and Magnus for unforgettable Midsommar celebrations, wild Thanksgivings, and long-lasting ‘After- works’. You made me grown attached to Uppsala. Thank you Agnes, Bea, Diana, Marc, Martin and the rest of the crew for the Sarek trek, dinner parties in the company of many quadrupled friends, and for car- rying boxes up and down the stairs every time we moved. Thanks also to the Huseby Karlsens for always welcoming me so warmly to their home and for the wonderful cross-country skiing excursions including barbequing in the snow. Thank you also Tove, Veronica, Elisabeth, Camilla, and Carin: It still brings back a smile to my face when I think of our Oxford adven- tures and the puffins. Thank you also to Mina, Måns and Tintin for be- ing such great short-term flatmates. My deepest gratitude furthermore goes out to my dearest friends Carm, Tine, Julia, Doro, Katha, Nadine and Stefan: you will always be my role models for life. I admire you for being so strong, independ- ent and groovy at the same time, and I will forever be grateful that I can be a part of your lives. You will be always in my heart. I am sending out big love also to my Amsterdam/Utrecht crowd: Kathrin, Olli, Nina, Robin, Fidel, Marlenchen: Hanging out with you on Nootje or at Roest are my idea of ‘a happy place’. I miss you very much! I thank my parents and brother for unconditional love and support all my life. It means everything to me! Last but not least I want to thank my partner Reinert. I could not have done this without you. You made the past nine years the best of my life and I am looking so much forward to the adventures to come. Everything is better when you are around. Linköping, 3rd November 2016 Helga Sadowski Table of Contents 1 Introduction: Digital Intimacies in Everyday Internet Cultures .................................................................... 15 1.1 Aims and Research Questions .................................................. 18 1.2 Hate and Hostility Online ......................................................... 23 Hatr: Countering Online Hate .............................................. 27 1.3 Women in Tech 2.0 ................................................................... 28 Women*-Centered Coding Initiatives ................................... 30 1.4 The Whispering Women of ASMR ........................................... 32 On Whispering and Gazing .................................................... 34 1.5 Digital Inimicalities and Doing Digital Media Differently ...... 35 Outline of the Book ................................................................ 37 2 Theories of Intimacy
Recommended publications
  • Transnational Social Spaces and Diasporic Publics. How Diasporic Connections Online Contribute to the Digital Transformation of the Public Sphere
    Selected Papers of #AoIR2017: The 18th Annual Conference of the Association of Internet Researchers Tartu, Estonia / 18-21 October 2017 TRANSNATIONAL SOCIAL SPACES AND DIASPORIC PUBLICS. HOW DIASPORIC CONNECTIONS ONLINE CONTRIBUTE TO THE DIGITAL TRANSFORMATION OF THE PUBLIC SPHERE Sara Marino School of Journalism, English and Communication Bournemouth University Paper proposal This paper investigates how diasporic connections online contribute to the digital transformation of the public sphere through an analysis of the impact of connectivity on the way diasporic identities and communities are formed, and of the role of digital media on the development of transnational publics as mediated and discursive arenas of (political) conversation. Theoretical Framework Research on the relationship between migrant practises and digital networks returns a broad spectrum of insights into how migrants use digital technologies to form and transform networks (Karatzogianni et al. 2016; Dekker & Engbersen 2014; Diminescu & Loveluck 2014; Georgiou 2006; Levitt 2001). This includes the debate around the emergence of so-called ‘transnational public spheres’ and ‘diasporic public spheres’ as discursive arenas that overflow the boundaries of nations and states (Volkmer 2003, 2014; Laguerre 2006; Parham 2005; Appadurai 1996). However, this discussion seems to raise a problem. The concept of the public sphere - and I am here referring to Habermas’s theoretical framework - was developed not simply to understand how people communicate, but to contribute a theory of democracy, which proposed the public sphere as a space for the production of public opinion through territorially delimited processes of communication conducted in the national language (Fraser 2007). As Couldry and Dreher pointed out (2007), this framework fails to address the complexity of today’s global mobility, which is characterised by the emergence of counter-public spheres, indigenous public spheres, and diasporic public spheres, which Marino, S.
    [Show full text]
  • The Work Behind the Representation a Qualitative Study on the Strategic Work of the Communicators Behind Political Social Media Accounts
    The work behind the representation A qualitative study on the strategic work of the communicators behind political social media accounts. Arbetet bakom representationen En kvalitativ studie om kommunikatörers strategiska arbete bakom sociala medier. Erik Holm Andersson Linn Lyngen Humaniora Medie- och kommunikationsvetenskap 15 hp Theo Röhle 05/02-16 Abstract Social media has given politicians another platform to perform campaigning in. This essay has been a study on the relationships between politicians, social media, communicators and their mutual work behind what is published. Has this relatively new form of media channel affected the way that politicians market themselves online? How does the work behind the social media channels look, what strategies are planned behind the representation for the party leader to stand for an entire ideology with its values? The research questions of this study: - Do the strategic work from a communicator affect what is published on the politicians personal account and the official party account, and to what extent? - How do the communicators of Swedish political representatives use social media? Do they express their communication in a personalized manner or focus mainly on the professional part of their assignment? - What are the most important aspects in communicating through social media? A personalization within political campaigning has increased during the past time, much because of the new media channels working together with the traditional media channels, leaving not much to be hidden about the person that is the representative for the ideology at hand. Personalization does not mean what the person is but what qualities that this person shows. How much personalization is presented is dependent on the political climate that is in the country at hand, but this study focuses on the Swedish political climate, where personalization has become a more important part of campaigning, whether on social media or physical campaigning.
    [Show full text]
  • Interweaving Digitality in the Fabric of Design
    INTERNATIONAL CONFERENCE ON ENGINEERING AND PRODUCT DESIGN EDUCATION 6 & 7 SEPTEMBER 2012, ARTESIS UNIVERSITY COLLEGE, ANTWERP, BELGIUM INTERWEAVING DIGITALITY IN THE FABRIC OF DESIGN Dries DE ROECK 1, Achiel STANDAERT 1, Robert A PAAUWE 2, Stijn VERWULGEN 1, Christiaan BAELUS 1, Pieter Jan STAPPERS 2 1Artesis University College of Antwerp, Department of Design Sciences 2ID-StudioLab, Faculty of Industrial Design Engineering, Delft University of Technology ABSTRACT Products that embrace and integrate an invisible, digital world are appearing around us in a rapid pace. This emerging type of products introduces a new dynamic between people, objects and the context or use. The integration of embedded, pervasive and digital technologies in products imposes several challenges for the industrial designer. Designing in a world where an increasing amount of objects are becoming digital and digitally connected opens up a lot of design possibilities on the one hand, but challenges several established tools and methods industrial designers have been using in the past on the other hand. In this paper, technology abstraction methods are used in a creative process in order to engage industrial design students (not necessarily technologically skilled) in the design of products that operate in a digitally connected world. We present a process that was evaluated during a weeklong workshop. During this workshop, the potential of technology abstraction methods and how they can aid industrial designers to better communicate ideas that crossover between digital and non-digital worlds were evaluated. The eventual goal of this process is to provide industrial design students, practitioners and/or educators with an open, yet structured platform complementary to established tools and methods.
    [Show full text]
  • The Early Bird Catches the News: Nine Things You Should Know About Micro-Blogging
    Business Horizons (2011) 54, 105—113 www.elsevier.com/locate/bushor The early bird catches the news: Nine things you should know about micro-blogging Andreas M. Kaplan *, Michael Haenlein ESCP Europe, Avenue de la Re´publique, F-75011 Paris, France KEYWORDS Abstract Micro-blogs (e.g., Twitter, Jaiku, Plurk, Tumblr) are starting to become an Web 2.0; established category within the general group of social media. Yet, while they rapidly User-generated gain interest among consumers and companies alike, there is no evidence to explain content; why anybody should be interested in an application that is limited to the exchange of Social media; short, 140-character text messages. To this end, our article intends to provide some Micro-blogging; insight. First, we demonstrate that the success of micro-blogs is due to the specific set Twitter; of characteristics they possess: the creation of ambient awareness; a unique form of Ambient awareness push-push-pull communication; and the ability to serve as a platform for virtual exhibitionism and voyeurism. We then discuss how applications such as Twitter can generate value for companies along all three stages of the marketing process: pre- purchase (i.e., marketing research); purchase (i.e., marketing communications); and post-purchase (i.e., customer services). Finally, we present a set of rules–—TheThree Rs of Micro-Blogging: Relevance; Respect; Return–—which companies should consider when relying on this type of application. # 2010 Kelley School of Business, Indiana University. All rights reserved. 1. The hare and the hedgehog: When requests from a computer virus or spyware applica- Twitter’s ‘already here’ tion.
    [Show full text]
  • Prism Vol. 9, No. 2 Prism About Vol
    2 021 PRISMVOL. 9, NO. 2 | 2021 PRISM VOL. 9, NO. 2 NO. 9, VOL. THE JOURNAL OF COMPLEX OPER ATIONS PRISM ABOUT VOL. 9, NO. 2, 2021 PRISM, the quarterly journal of complex operations published at National Defense University (NDU), aims to illuminate and provoke debate on whole-of-government EDITOR IN CHIEF efforts to conduct reconstruction, stabilization, counterinsurgency, and irregular Mr. Michael Miklaucic warfare operations. Since the inaugural issue of PRISM in 2010, our readership has expanded to include more than 10,000 officials, servicemen and women, and practi- tioners from across the diplomatic, defense, and development communities in more COPYEDITOR than 80 countries. Ms. Andrea L. Connell PRISM is published with support from NDU’s Institute for National Strategic Studies (INSS). In 1984, Secretary of Defense Casper Weinberger established INSS EDITORIAL ASSISTANTS within NDU as a focal point for analysis of critical national security policy and Ms. Taylor Buck defense strategy issues. Today INSS conducts research in support of academic and Ms. Amanda Dawkins leadership programs at NDU; provides strategic support to the Secretary of Defense, Chairman of the Joint Chiefs of Staff, combatant commands, and armed services; Ms. Alexandra Fabre de la Grange and engages with the broader national and international security communities. Ms. Julia Humphrey COMMUNICATIONS INTERNET PUBLICATIONS PRISM welcomes unsolicited manuscripts from policymakers, practitioners, and EDITOR scholars, particularly those that present emerging thought, best practices, or train- Ms. Joanna E. Seich ing and education innovations. Publication threshold for articles and critiques varies but is largely determined by topical relevance, continuing education for national and DESIGN international security professionals, scholarly standards of argumentation, quality of Mr.
    [Show full text]
  • Impact of Viral Marketing in India
    www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 Volume-5, Issue-2, April-2015 International Journal of Engineering and Management Research Page Number: 653-659 Impact of Viral Marketing in India Ruchi Mantri1, Ankit Laddha2, Prachi Rathi3 1Researcher, INDIA 2Assistant Professor, Shri Vaishnav Institute of Management, Indore, INDIA 3Assistant Professor, Gujrati Innovative College of Commerce and Science, Indore, INDIA ABSTRACT the new ‘Mantra’ to open the treasure cave of business Viral marketing is a marketing technique in which success. In the recent past, viral marketing has created a lot an organisation, whether business or non-business of buzz and excitement all over the world including India. organisation, tries to persuade the internet users to forward The concept seems like ‘an ultimate free lunch’- rather a its publicity material in emails usually in the form of video great feast for all the modern marketers who choose small clips, text messages etc. to generate word of mouth. In the number of netizens to plant their new idea about the recent past, viral marketing technique has achieved increasing attention and acceptance all over the world product or activity of the organisation, get it viral and then including India. Zoozoo commercials by Vodafone, Kolaveri watch while it spreads quickly and effortlessly to millions Di song by South Indian actor Dhanush, Gangnam style of people. Zoozoo commercials of Vodafone, Kolaveri Di- dance by PSY, and Ice Bucket Challenge with a twister Rice the promotional song sung by South Indian actor Dhanush, Bucket Challenge created a buzz in Indian society. If certain Gangnam style dance by Korean dancer PSY, election pre-conditions are followed, viral marketing technique can be canvassing by Narendra Modi and Ice Bucket Challenge successfully used by marketers of business organisations.
    [Show full text]
  • Unraveling the Impact of Social Media on Extremism: Implications for Technology Regulation and Terrorism Prevention
    SUSARLA | PROGRAM ON EXTREMISM UNRAVELING THE IMPACT OF SOCIAL MEDIA ON EXTREMISM: IMPLICATIONS FOR TECHNOLOGY REGULATION AND TERRORISM PREVENTION This paper, part of the Legal Perspectives on Tech Series, was commissioned in ANJANA SUSARLA conjunction with the Congressional Counterterrorism Caucus SEPTEMBER 2019 UNRAVELING THE IMPACT OF SOCIAL MEDIA ON EXTREMISM 1 SUSARLA | PROGRAM ON EXTREMISM on Knowledge Discovery and Data About the Program Mining, Information Systems Research, on Extremism International Conference in Information Systems, Journal of Management Information Systems, Management The Program on Extremism at George Science and MIS Quarterly. She has Washington University provides served on and serves on the editorial analysis on issues related to violent boards of Electronic Commerce and non-violent extremism. The Research and Applications, Information Program spearheads innovative and Systems Research, MIS Quarterly and thoughtful academic inquiry, the Journal of Database Management. producing empirical work that strengthens extremism research as a Anjana Susarla has been a recipient of distinct field of study. The Program the William S. Livingston Award for aims to develop pragmatic policy Outstanding Graduate Students at the solutions that resonate with University of Texas, a Steven Schrader policymakers, civic leaders, and the Best Paper Finalist at the Academy of general public. Management, the Association of Information Systems Best Publication Award, a Runner-Up for Information About the Author Systems Research Best Published Paper Award 2012 and the Microsoft Prize by Anjana Susarla is an Associate Professor the International Network of Social at the Eli Broad School of Business, Networks Analysis Sunbelt Conference. Michigan State University. She has worked in consulting and led experiential projects with several Anjana Susarla earned an undergraduate companies.
    [Show full text]
  • ASD-Covert-Foreign-Money.Pdf
    overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology ��������������������������������������������������������������������������������������������������
    [Show full text]
  • Gnu Smalltalk Library Reference Version 3.2.5 24 November 2017
    gnu Smalltalk Library Reference Version 3.2.5 24 November 2017 by Paolo Bonzini Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover Texts, and with no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License". 1 3 1 Base classes 1.1 Tree Classes documented in this manual are boldfaced. Autoload Object Behavior ClassDescription Class Metaclass BlockClosure Boolean False True CObject CAggregate CArray CPtr CString CCallable CCallbackDescriptor CFunctionDescriptor CCompound CStruct CUnion CScalar CChar CDouble CFloat CInt CLong CLongDouble CLongLong CShort CSmalltalk CUChar CByte CBoolean CUInt CULong CULongLong CUShort ContextPart 4 GNU Smalltalk Library Reference BlockContext MethodContext Continuation CType CPtrCType CArrayCType CScalarCType CStringCType Delay Directory DLD DumperProxy AlternativeObjectProxy NullProxy VersionableObjectProxy PluggableProxy SingletonProxy DynamicVariable Exception Error ArithmeticError ZeroDivide MessageNotUnderstood SystemExceptions.InvalidValue SystemExceptions.EmptyCollection SystemExceptions.InvalidArgument SystemExceptions.AlreadyDefined SystemExceptions.ArgumentOutOfRange SystemExceptions.IndexOutOfRange SystemExceptions.InvalidSize SystemExceptions.NotFound SystemExceptions.PackageNotAvailable SystemExceptions.InvalidProcessState SystemExceptions.InvalidState
    [Show full text]
  • “Electronic Wastelands? Information Management, Cultural Memory, and the Challenges of Digitality”
    H-HistBibl CfP: Electronic Wastelands? Information Management, Cultural Memory, and the Challenges of Digitality Discussion published by Manuela Neuwirth on Saturday, September 4, 2021 Type: Call for Papers Date: September 12, 2021 Location: Spain Subject Fields: American History / Studies, Communication, Cultural History / Studies, Digital Humanities, Journalism and Media Studies CALL FOR PAPERS 34TH EUROPEAN ASSOCIATION FOR AMERICAN STUDIES CONFERENCE “WASTELANDS” Madrid, 6-8 April 2022 Panel organized by the EAAS Digital Studies Network Stefan Brandt (University of Graz, Austria), Frank Mehring (Radboud Universiteit, Nijmegen, NL), Tatiani Rapatzikou (Aristotle University of Thessaloniki, Greece) “Electronic Wastelands? Information Management, Cultural Memory, and the Challenges of Digitality” Abstract: The Digital Era has produced countless venues for distributing and managing information, in electronic databases, the social media, and other easily available repositories of cultural exchange. These virtual ‘catalogues,’ that encompass diligently developed academic archives as well as dubious websites with biased mappings of historical and social events, offer a cornucopia of materials often Citation: Manuela Neuwirth. CfP: Electronic Wastelands? Information Management, Cultural Memory, and the Challenges of Digitality. H-HistBibl. 09-04-2021. https://networks.h-net.org/node/14775/discussions/8200078/cfp-electronic-wastelands-information-management-cultural-memory Licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. 1 H-HistBibl consumed without any filters or regulatory mechanisms. In these ‘electronic wastelands,’ infinite amounts of data are amassed and made available for undemanding – and uncritical – consumption. It is this process that makes it possible for crucial reference points of recent history to be transformed into mirror images of wild speculations and conspiracy theories.
    [Show full text]
  • OPP-Iot an Ontology-Based Privacy Preservation Ap- Proach for the Internet of Things
    THÈSE Pour obtenir le grade de DOCTEUR DE la Communauté UNIVERSITÉ GRENOBLE ALPES Spécialité : Informatique Arrêté ministériel : 27 Janvier 2017 Présentée par Thiago Moreira da Costa Thèse dirigée par Hervé Martin et codirigée par Nazim Agoulmine préparée au sein LIG - Laboratoire d’Informatique de Grenoble et de l’EDMSTII - l’Ecole Doctorale Mathématiques, Sciences et Tech- nologies de l’Information, Informatique OPP-IoT An ontology-based privacy preservation ap- proach for the Internet of Things Thèse soutenue publiquement le 27 Janvier 2017, devant le jury composé de : M, Didier DONZES Docteur, Pr. à l’Université Grenoble Alpes, Président MME, Karine ZEITOUNI Docteur, Pr. à l’Université de Versailles-Saint-Quentin-en-Yvelines, Rapporteur MME, Maryline LAURENT Docteur, Pr. à l’Université Telecom SudParis, Rapporteur M, Reinaldo BRAGA Docteur, Pr. à l’Institut Fédéral du Ceará, Examinateur Thiago Moreira da Costa: OPP-IoT, An ontology-based privacy preservation approach for the Internet of Things, © 27 Janvier 2017 To my beloved parents... ABSTRACT The spread of pervasive computing through the Internet of Things (IoT) represents a challenge for privacy preservation. Privacy threats are directly related to the capacity of the IoT sensing to track indi- viduals in almost every situation of their lives. Allied to that, data mining techniques have evolved and been used to extract a myriad of personal information from sensor data stream. This trust model relies on the trustworthiness of the data consumer who should infer only intended information. However, this model exposes personal in- formation to privacy adversary. In order to provide a privacy preser- vation for the IoT, we propose a privacy-aware virtual sensor model that enforces privacy policy in the IoT sensing.
    [Show full text]
  • GNU MP the GNU Multiple Precision Arithmetic Library Edition 6.2.1 14 November 2020
    GNU MP The GNU Multiple Precision Arithmetic Library Edition 6.2.1 14 November 2020 by Torbj¨ornGranlund and the GMP development team This manual describes how to install and use the GNU multiple precision arithmetic library, version 6.2.1. Copyright 1991, 1993-2016, 2018-2020 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, with the Front-Cover Texts being \A GNU Manual", and with the Back-Cover Texts being \You have freedom to copy and modify this GNU Manual, like GNU software". A copy of the license is included in Appendix C [GNU Free Documentation License], page 132. i Table of Contents GNU MP Copying Conditions :::::::::::::::::::::::::::::::::::: 1 1 Introduction to GNU MP ::::::::::::::::::::::::::::::::::::: 2 1.1 How to use this Manual :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 2 2 Installing GMP ::::::::::::::::::::::::::::::::::::::::::::::::: 3 2.1 Build Options:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 3 2.2 ABI and ISA :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 8 2.3 Notes for Package Builds:::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 11 2.4 Notes for Particular Systems :::::::::::::::::::::::::::::::::::::::::::::::::::::: 12 2.5 Known Build Problems ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 14 2.6 Performance
    [Show full text]