Digital Intimacies : Doing Digital Media Differently
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Transnational Social Spaces and Diasporic Publics. How Diasporic Connections Online Contribute to the Digital Transformation of the Public Sphere
Selected Papers of #AoIR2017: The 18th Annual Conference of the Association of Internet Researchers Tartu, Estonia / 18-21 October 2017 TRANSNATIONAL SOCIAL SPACES AND DIASPORIC PUBLICS. HOW DIASPORIC CONNECTIONS ONLINE CONTRIBUTE TO THE DIGITAL TRANSFORMATION OF THE PUBLIC SPHERE Sara Marino School of Journalism, English and Communication Bournemouth University Paper proposal This paper investigates how diasporic connections online contribute to the digital transformation of the public sphere through an analysis of the impact of connectivity on the way diasporic identities and communities are formed, and of the role of digital media on the development of transnational publics as mediated and discursive arenas of (political) conversation. Theoretical Framework Research on the relationship between migrant practises and digital networks returns a broad spectrum of insights into how migrants use digital technologies to form and transform networks (Karatzogianni et al. 2016; Dekker & Engbersen 2014; Diminescu & Loveluck 2014; Georgiou 2006; Levitt 2001). This includes the debate around the emergence of so-called ‘transnational public spheres’ and ‘diasporic public spheres’ as discursive arenas that overflow the boundaries of nations and states (Volkmer 2003, 2014; Laguerre 2006; Parham 2005; Appadurai 1996). However, this discussion seems to raise a problem. The concept of the public sphere - and I am here referring to Habermas’s theoretical framework - was developed not simply to understand how people communicate, but to contribute a theory of democracy, which proposed the public sphere as a space for the production of public opinion through territorially delimited processes of communication conducted in the national language (Fraser 2007). As Couldry and Dreher pointed out (2007), this framework fails to address the complexity of today’s global mobility, which is characterised by the emergence of counter-public spheres, indigenous public spheres, and diasporic public spheres, which Marino, S. -
The Work Behind the Representation a Qualitative Study on the Strategic Work of the Communicators Behind Political Social Media Accounts
The work behind the representation A qualitative study on the strategic work of the communicators behind political social media accounts. Arbetet bakom representationen En kvalitativ studie om kommunikatörers strategiska arbete bakom sociala medier. Erik Holm Andersson Linn Lyngen Humaniora Medie- och kommunikationsvetenskap 15 hp Theo Röhle 05/02-16 Abstract Social media has given politicians another platform to perform campaigning in. This essay has been a study on the relationships between politicians, social media, communicators and their mutual work behind what is published. Has this relatively new form of media channel affected the way that politicians market themselves online? How does the work behind the social media channels look, what strategies are planned behind the representation for the party leader to stand for an entire ideology with its values? The research questions of this study: - Do the strategic work from a communicator affect what is published on the politicians personal account and the official party account, and to what extent? - How do the communicators of Swedish political representatives use social media? Do they express their communication in a personalized manner or focus mainly on the professional part of their assignment? - What are the most important aspects in communicating through social media? A personalization within political campaigning has increased during the past time, much because of the new media channels working together with the traditional media channels, leaving not much to be hidden about the person that is the representative for the ideology at hand. Personalization does not mean what the person is but what qualities that this person shows. How much personalization is presented is dependent on the political climate that is in the country at hand, but this study focuses on the Swedish political climate, where personalization has become a more important part of campaigning, whether on social media or physical campaigning. -
Interweaving Digitality in the Fabric of Design
INTERNATIONAL CONFERENCE ON ENGINEERING AND PRODUCT DESIGN EDUCATION 6 & 7 SEPTEMBER 2012, ARTESIS UNIVERSITY COLLEGE, ANTWERP, BELGIUM INTERWEAVING DIGITALITY IN THE FABRIC OF DESIGN Dries DE ROECK 1, Achiel STANDAERT 1, Robert A PAAUWE 2, Stijn VERWULGEN 1, Christiaan BAELUS 1, Pieter Jan STAPPERS 2 1Artesis University College of Antwerp, Department of Design Sciences 2ID-StudioLab, Faculty of Industrial Design Engineering, Delft University of Technology ABSTRACT Products that embrace and integrate an invisible, digital world are appearing around us in a rapid pace. This emerging type of products introduces a new dynamic between people, objects and the context or use. The integration of embedded, pervasive and digital technologies in products imposes several challenges for the industrial designer. Designing in a world where an increasing amount of objects are becoming digital and digitally connected opens up a lot of design possibilities on the one hand, but challenges several established tools and methods industrial designers have been using in the past on the other hand. In this paper, technology abstraction methods are used in a creative process in order to engage industrial design students (not necessarily technologically skilled) in the design of products that operate in a digitally connected world. We present a process that was evaluated during a weeklong workshop. During this workshop, the potential of technology abstraction methods and how they can aid industrial designers to better communicate ideas that crossover between digital and non-digital worlds were evaluated. The eventual goal of this process is to provide industrial design students, practitioners and/or educators with an open, yet structured platform complementary to established tools and methods. -
The Early Bird Catches the News: Nine Things You Should Know About Micro-Blogging
Business Horizons (2011) 54, 105—113 www.elsevier.com/locate/bushor The early bird catches the news: Nine things you should know about micro-blogging Andreas M. Kaplan *, Michael Haenlein ESCP Europe, Avenue de la Re´publique, F-75011 Paris, France KEYWORDS Abstract Micro-blogs (e.g., Twitter, Jaiku, Plurk, Tumblr) are starting to become an Web 2.0; established category within the general group of social media. Yet, while they rapidly User-generated gain interest among consumers and companies alike, there is no evidence to explain content; why anybody should be interested in an application that is limited to the exchange of Social media; short, 140-character text messages. To this end, our article intends to provide some Micro-blogging; insight. First, we demonstrate that the success of micro-blogs is due to the specific set Twitter; of characteristics they possess: the creation of ambient awareness; a unique form of Ambient awareness push-push-pull communication; and the ability to serve as a platform for virtual exhibitionism and voyeurism. We then discuss how applications such as Twitter can generate value for companies along all three stages of the marketing process: pre- purchase (i.e., marketing research); purchase (i.e., marketing communications); and post-purchase (i.e., customer services). Finally, we present a set of rules–—TheThree Rs of Micro-Blogging: Relevance; Respect; Return–—which companies should consider when relying on this type of application. # 2010 Kelley School of Business, Indiana University. All rights reserved. 1. The hare and the hedgehog: When requests from a computer virus or spyware applica- Twitter’s ‘already here’ tion. -
Prism Vol. 9, No. 2 Prism About Vol
2 021 PRISMVOL. 9, NO. 2 | 2021 PRISM VOL. 9, NO. 2 NO. 9, VOL. THE JOURNAL OF COMPLEX OPER ATIONS PRISM ABOUT VOL. 9, NO. 2, 2021 PRISM, the quarterly journal of complex operations published at National Defense University (NDU), aims to illuminate and provoke debate on whole-of-government EDITOR IN CHIEF efforts to conduct reconstruction, stabilization, counterinsurgency, and irregular Mr. Michael Miklaucic warfare operations. Since the inaugural issue of PRISM in 2010, our readership has expanded to include more than 10,000 officials, servicemen and women, and practi- tioners from across the diplomatic, defense, and development communities in more COPYEDITOR than 80 countries. Ms. Andrea L. Connell PRISM is published with support from NDU’s Institute for National Strategic Studies (INSS). In 1984, Secretary of Defense Casper Weinberger established INSS EDITORIAL ASSISTANTS within NDU as a focal point for analysis of critical national security policy and Ms. Taylor Buck defense strategy issues. Today INSS conducts research in support of academic and Ms. Amanda Dawkins leadership programs at NDU; provides strategic support to the Secretary of Defense, Chairman of the Joint Chiefs of Staff, combatant commands, and armed services; Ms. Alexandra Fabre de la Grange and engages with the broader national and international security communities. Ms. Julia Humphrey COMMUNICATIONS INTERNET PUBLICATIONS PRISM welcomes unsolicited manuscripts from policymakers, practitioners, and EDITOR scholars, particularly those that present emerging thought, best practices, or train- Ms. Joanna E. Seich ing and education innovations. Publication threshold for articles and critiques varies but is largely determined by topical relevance, continuing education for national and DESIGN international security professionals, scholarly standards of argumentation, quality of Mr. -
Impact of Viral Marketing in India
www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 Volume-5, Issue-2, April-2015 International Journal of Engineering and Management Research Page Number: 653-659 Impact of Viral Marketing in India Ruchi Mantri1, Ankit Laddha2, Prachi Rathi3 1Researcher, INDIA 2Assistant Professor, Shri Vaishnav Institute of Management, Indore, INDIA 3Assistant Professor, Gujrati Innovative College of Commerce and Science, Indore, INDIA ABSTRACT the new ‘Mantra’ to open the treasure cave of business Viral marketing is a marketing technique in which success. In the recent past, viral marketing has created a lot an organisation, whether business or non-business of buzz and excitement all over the world including India. organisation, tries to persuade the internet users to forward The concept seems like ‘an ultimate free lunch’- rather a its publicity material in emails usually in the form of video great feast for all the modern marketers who choose small clips, text messages etc. to generate word of mouth. In the number of netizens to plant their new idea about the recent past, viral marketing technique has achieved increasing attention and acceptance all over the world product or activity of the organisation, get it viral and then including India. Zoozoo commercials by Vodafone, Kolaveri watch while it spreads quickly and effortlessly to millions Di song by South Indian actor Dhanush, Gangnam style of people. Zoozoo commercials of Vodafone, Kolaveri Di- dance by PSY, and Ice Bucket Challenge with a twister Rice the promotional song sung by South Indian actor Dhanush, Bucket Challenge created a buzz in Indian society. If certain Gangnam style dance by Korean dancer PSY, election pre-conditions are followed, viral marketing technique can be canvassing by Narendra Modi and Ice Bucket Challenge successfully used by marketers of business organisations. -
Unraveling the Impact of Social Media on Extremism: Implications for Technology Regulation and Terrorism Prevention
SUSARLA | PROGRAM ON EXTREMISM UNRAVELING THE IMPACT OF SOCIAL MEDIA ON EXTREMISM: IMPLICATIONS FOR TECHNOLOGY REGULATION AND TERRORISM PREVENTION This paper, part of the Legal Perspectives on Tech Series, was commissioned in ANJANA SUSARLA conjunction with the Congressional Counterterrorism Caucus SEPTEMBER 2019 UNRAVELING THE IMPACT OF SOCIAL MEDIA ON EXTREMISM 1 SUSARLA | PROGRAM ON EXTREMISM on Knowledge Discovery and Data About the Program Mining, Information Systems Research, on Extremism International Conference in Information Systems, Journal of Management Information Systems, Management The Program on Extremism at George Science and MIS Quarterly. She has Washington University provides served on and serves on the editorial analysis on issues related to violent boards of Electronic Commerce and non-violent extremism. The Research and Applications, Information Program spearheads innovative and Systems Research, MIS Quarterly and thoughtful academic inquiry, the Journal of Database Management. producing empirical work that strengthens extremism research as a Anjana Susarla has been a recipient of distinct field of study. The Program the William S. Livingston Award for aims to develop pragmatic policy Outstanding Graduate Students at the solutions that resonate with University of Texas, a Steven Schrader policymakers, civic leaders, and the Best Paper Finalist at the Academy of general public. Management, the Association of Information Systems Best Publication Award, a Runner-Up for Information About the Author Systems Research Best Published Paper Award 2012 and the Microsoft Prize by Anjana Susarla is an Associate Professor the International Network of Social at the Eli Broad School of Business, Networks Analysis Sunbelt Conference. Michigan State University. She has worked in consulting and led experiential projects with several Anjana Susarla earned an undergraduate companies. -
ASD-Covert-Foreign-Money.Pdf
overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology �������������������������������������������������������������������������������������������������� -
Gnu Smalltalk Library Reference Version 3.2.5 24 November 2017
gnu Smalltalk Library Reference Version 3.2.5 24 November 2017 by Paolo Bonzini Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover Texts, and with no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License". 1 3 1 Base classes 1.1 Tree Classes documented in this manual are boldfaced. Autoload Object Behavior ClassDescription Class Metaclass BlockClosure Boolean False True CObject CAggregate CArray CPtr CString CCallable CCallbackDescriptor CFunctionDescriptor CCompound CStruct CUnion CScalar CChar CDouble CFloat CInt CLong CLongDouble CLongLong CShort CSmalltalk CUChar CByte CBoolean CUInt CULong CULongLong CUShort ContextPart 4 GNU Smalltalk Library Reference BlockContext MethodContext Continuation CType CPtrCType CArrayCType CScalarCType CStringCType Delay Directory DLD DumperProxy AlternativeObjectProxy NullProxy VersionableObjectProxy PluggableProxy SingletonProxy DynamicVariable Exception Error ArithmeticError ZeroDivide MessageNotUnderstood SystemExceptions.InvalidValue SystemExceptions.EmptyCollection SystemExceptions.InvalidArgument SystemExceptions.AlreadyDefined SystemExceptions.ArgumentOutOfRange SystemExceptions.IndexOutOfRange SystemExceptions.InvalidSize SystemExceptions.NotFound SystemExceptions.PackageNotAvailable SystemExceptions.InvalidProcessState SystemExceptions.InvalidState -
“Electronic Wastelands? Information Management, Cultural Memory, and the Challenges of Digitality”
H-HistBibl CfP: Electronic Wastelands? Information Management, Cultural Memory, and the Challenges of Digitality Discussion published by Manuela Neuwirth on Saturday, September 4, 2021 Type: Call for Papers Date: September 12, 2021 Location: Spain Subject Fields: American History / Studies, Communication, Cultural History / Studies, Digital Humanities, Journalism and Media Studies CALL FOR PAPERS 34TH EUROPEAN ASSOCIATION FOR AMERICAN STUDIES CONFERENCE “WASTELANDS” Madrid, 6-8 April 2022 Panel organized by the EAAS Digital Studies Network Stefan Brandt (University of Graz, Austria), Frank Mehring (Radboud Universiteit, Nijmegen, NL), Tatiani Rapatzikou (Aristotle University of Thessaloniki, Greece) “Electronic Wastelands? Information Management, Cultural Memory, and the Challenges of Digitality” Abstract: The Digital Era has produced countless venues for distributing and managing information, in electronic databases, the social media, and other easily available repositories of cultural exchange. These virtual ‘catalogues,’ that encompass diligently developed academic archives as well as dubious websites with biased mappings of historical and social events, offer a cornucopia of materials often Citation: Manuela Neuwirth. CfP: Electronic Wastelands? Information Management, Cultural Memory, and the Challenges of Digitality. H-HistBibl. 09-04-2021. https://networks.h-net.org/node/14775/discussions/8200078/cfp-electronic-wastelands-information-management-cultural-memory Licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. 1 H-HistBibl consumed without any filters or regulatory mechanisms. In these ‘electronic wastelands,’ infinite amounts of data are amassed and made available for undemanding – and uncritical – consumption. It is this process that makes it possible for crucial reference points of recent history to be transformed into mirror images of wild speculations and conspiracy theories. -
OPP-Iot an Ontology-Based Privacy Preservation Ap- Proach for the Internet of Things
THÈSE Pour obtenir le grade de DOCTEUR DE la Communauté UNIVERSITÉ GRENOBLE ALPES Spécialité : Informatique Arrêté ministériel : 27 Janvier 2017 Présentée par Thiago Moreira da Costa Thèse dirigée par Hervé Martin et codirigée par Nazim Agoulmine préparée au sein LIG - Laboratoire d’Informatique de Grenoble et de l’EDMSTII - l’Ecole Doctorale Mathématiques, Sciences et Tech- nologies de l’Information, Informatique OPP-IoT An ontology-based privacy preservation ap- proach for the Internet of Things Thèse soutenue publiquement le 27 Janvier 2017, devant le jury composé de : M, Didier DONZES Docteur, Pr. à l’Université Grenoble Alpes, Président MME, Karine ZEITOUNI Docteur, Pr. à l’Université de Versailles-Saint-Quentin-en-Yvelines, Rapporteur MME, Maryline LAURENT Docteur, Pr. à l’Université Telecom SudParis, Rapporteur M, Reinaldo BRAGA Docteur, Pr. à l’Institut Fédéral du Ceará, Examinateur Thiago Moreira da Costa: OPP-IoT, An ontology-based privacy preservation approach for the Internet of Things, © 27 Janvier 2017 To my beloved parents... ABSTRACT The spread of pervasive computing through the Internet of Things (IoT) represents a challenge for privacy preservation. Privacy threats are directly related to the capacity of the IoT sensing to track indi- viduals in almost every situation of their lives. Allied to that, data mining techniques have evolved and been used to extract a myriad of personal information from sensor data stream. This trust model relies on the trustworthiness of the data consumer who should infer only intended information. However, this model exposes personal in- formation to privacy adversary. In order to provide a privacy preser- vation for the IoT, we propose a privacy-aware virtual sensor model that enforces privacy policy in the IoT sensing. -
GNU MP the GNU Multiple Precision Arithmetic Library Edition 6.2.1 14 November 2020
GNU MP The GNU Multiple Precision Arithmetic Library Edition 6.2.1 14 November 2020 by Torbj¨ornGranlund and the GMP development team This manual describes how to install and use the GNU multiple precision arithmetic library, version 6.2.1. Copyright 1991, 1993-2016, 2018-2020 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, with the Front-Cover Texts being \A GNU Manual", and with the Back-Cover Texts being \You have freedom to copy and modify this GNU Manual, like GNU software". A copy of the license is included in Appendix C [GNU Free Documentation License], page 132. i Table of Contents GNU MP Copying Conditions :::::::::::::::::::::::::::::::::::: 1 1 Introduction to GNU MP ::::::::::::::::::::::::::::::::::::: 2 1.1 How to use this Manual :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 2 2 Installing GMP ::::::::::::::::::::::::::::::::::::::::::::::::: 3 2.1 Build Options:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 3 2.2 ABI and ISA :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 8 2.3 Notes for Package Builds:::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 11 2.4 Notes for Particular Systems :::::::::::::::::::::::::::::::::::::::::::::::::::::: 12 2.5 Known Build Problems ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 14 2.6 Performance