8,811 research outputs found

    The LDBC social network benchmark: Business intelligence workload

    Get PDF
    The Social Network Benchmark’s Business Intelligence workload (SNB BI) is a comprehensive graph OLAP benchmark targeting analytical data systems capable of supporting graph workloads. This paper marks the finalization of almost a decade of research in academia and industry via the Linked Data Benchmark Council (LDBC). SNB BI advances the state-of-the art in synthetic and scalable analytical database benchmarks in many aspects. Its base is a sophisticated data generator, implemented on a scalable distributed infrastructure, that produces a social graph with small-world phenomena, whose value properties follow skewed and correlated distributions and where values correlate with structure. This is a temporal graph where all nodes and edges follow lifespan-based rules with temporal skew enabling realistic and consistent temporal inserts and (recursive) deletes. The query workload exploiting this skew and correlation is based on LDBC’s “choke point”-driven design methodology and will entice technical and scientific improvements in future (graph) database systems. SNB BI includes the first adoption of “parameter curation” in an analytical benchmark, a technique that ensures stable runtimes of query variants across different parameter values. Two performance metrics characterize peak single-query performance (power) and sustained concurrent query throughput. To demonstrate the portability of the benchmark, we present experimental results on a relational and a graph DBMS. Note that these do not constitute an official LDBC Benchmark Result – only audited results can use this trademarked term

    The Viability and Potential Consequences of IoT-Based Ransomware

    Get PDF
    With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested. As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed. For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim. Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research

    Examining the Cyber Skills Gap: An Analysis of Cybersecurity Positions by Sub-Field

    Get PDF
    While demand for cybersecurity professionals is high, the field is currently facing a workforce shortage and a skills gap. Thus, an examination of current cybersecurity position hiring requirements may be advantageous for helping to close the skills gap. This work examines the education, professional experience, industry certification, security clearance, and programming skill requirements of 935 cybersecurity positions categorized by sub-field. The nine sub-fields are: architecture, auditing, education, GRC (governance, risk, and compliance), management, operations, penetration testing, software security, and threat intelligence / research. Prior work experience and higher education degrees in technical fields were found to be frequently required across all sub-fields. Over 48% of positions listed an industry cybersecurity certification, while 19% of positions required a security clearance. In addition, 25% of positions listed knowledge of a programming language as a requirement for employment. There were notable differences in certain position requirements between sub-fields. On average, management positions required three years of additional work experience than positions in the auditing, operations, and penetration testing sub-fields. Security clearance requirements were relatively similar across all other sub-fields, with the GRC sub-field having the highest percentage of positions requiring a security clearance. Programming skills were desired most prevalently in positions within the architecture, software security, and penetration testing sub-fields. Demand for industry certifications varied by sub-field, although the Certified Information Systems Security Professional (CISSP) certification was the most frequently desired certification. Cybersecurity education programs should consider the diverse nature of the cybersecurity field and develop pathways to prepare future cybersecurity professionals for success in any sub-field

    Norsk rÄ kumelk, en kilde til zoonotiske patogener?

    Get PDF
    The worldwide emerging trend of eating “natural” foods, that has not been processed, also applies for beverages. According to Norwegian legislation, all milk must be pasteurized before commercial sale but drinking milk that has not been heat-treated, is gaining increasing popularity. Scientist are warning against this trend and highlights the risk of contracting disease from milkborne microorganisms. To examine potential risks associated with drinking unpasteurized milk in Norway, milk- and environmental samples were collected from dairy farms located in south-east of Norway. The samples were analyzed for the presence of specific zoonotic pathogens; Listeria monocytogenes, Campylobacter spp., and Shiga toxin-producing Escherichia coli (STEC). Cattle are known to be healthy carriers of these pathogens, and Campylobacter spp. and STEC have a low infectious dose, meaning that infection can be established by ingesting a low number of bacterial cells. L. monocytogenes causes one of the most severe foodborne zoonotic diseases, listeriosis, that has a high fatality rate. All three pathogens have caused milk borne disease outbreaks all over the world, also in Norway. During this work, we observed that the prevalence of the three examined bacteria were high in the environment at the examined farms. In addition, 7% of the milk filters were contaminated by STEC, 13% by L. monocytogenes and 4% by Campylobacter spp. Four of the STEC isolates detected were eaepositive, which is associated with the capability to cause severe human disease. One of the eae-positive STEC isolates were collected from a milk filter, which strongly indicate that Norwegian raw milk may contain potential pathogenic STEC. To further assess the possibilities of getting ill by STEC after consuming raw milk, we examined the growth of the four eae-positive STEC isolates in raw milk at different temperatures. All four isolates seemed to have ability to multiply in raw milk at 8°C, and one isolate had significant growth after 72 hours. Incubation at 6°C seemed to reduce the number of bacteria during the first 24 hours before cell death stopped. These findings highlight the importance of stable refrigerator temperatures, preferable < 4°C, for storage of raw milk. The L. monocytogenes isolates collected during this study show genetic similarities to isolates collected from urban and rural environmental locations, but different clones were predominant in agricultural environments compared to clinical and food environments. However, the results indicate that the same clone can persist in a farm over time, and that milk can be contaminated by L. monocytogenes clones present in farm environment. Despite testing small volumes (25 mL) of milk, we were able to isolate both STEC and Campylobacter spp. directly from raw milk. A proportion of 3% of the bulk tank milk and teat milk samples were contaminated by Campylobacter spp. and one STEC was isolated from bulk tank milk. L monocytogenes was not detected in bulk tank milk, nor in teat milk samples. The agricultural evolvement during the past decades have led to larger production units and new food safety challenges. Dairy cattle production in Norway is in a current transition from tie-stall housing with conventional pipeline milking systems, to modern loose housing systems with robotic milking. The occurrence of the three pathogens in this project were higher in samples collected from farms with loose housing compared to those with tiestall housing. Pasteurization of cow’s milk is a risk reducing procedure to protect consumers from microbial pathogens and in most EU countries, commercial distribution of unpasteurized milk is legally restricted. Together, the results presented in this thesis show that the animal housing may influence the level of pathogenic bacteria in the raw milk and that ingestion of Norwegian raw cow’s milk may expose consumers to pathogenic bacteria which can cause severe disease, especially in children, elderly and in persons with underlying diseases. The results also highlight the importance of storing raw milk at low temperatures between milking and consumption.Å spise mat som er mindre prosessert og mer «naturlig» er en pĂ„gĂ„ende trend i Norge og i andre deler av verden. Interessen for Ă„ drikke melk som ikke er varmebehandlet, sĂ„kalt rĂ„ melk, er ogsĂ„ Ăžkende. I Norge er det pĂ„budt Ă„ pasteurisere melk fĂžr kommersielt salg for Ă„ beskytte forbrukeren mot sykdomsfremkallende mikroorganismer. Fagfolk advarer mot Ă„ drikke rĂ„ melk, og pĂ„peker risikoen for Ă„ bli syk av patogene bakterier som kan finnes i melken. I denne avhandlingen undersĂžker vi den potensielle risikoen det medfĂžrer Ă„ drikke upasteurisert melk fra Norge. I tillegg til Ă„ samle inn tankmelk- og speneprĂžver fra melkegĂ„rder i sĂžrĂžst Norge, samlet vi ogsĂ„ miljĂžprĂžver fra de samme gĂ„rdene for Ă„ kartlegge forekomst og for Ă„ identifisere potensielle mattrygghetsrisikoer i melkeproduksjonen. Alle prĂžvene ble analysert for de zoonotiske sykdomsfremkallende bakteriene Listeria monocytogenes, Campylobacter spp., og Shiga toksin-produserende Escherichia coli (STEC). Kyr kan vĂŠre friske smittebĂŠrere av disse bakteriene, som dermed kan etablere et reservoar pĂ„ gĂ„rdene. Bakteriene kan overfĂžres fra gĂ„rdsmiljĂžet til melkekjeden og dermed utfordre mattryggheten. Disse bakteriene har forĂ„rsaket melkebĂ„rne sykdomsutbrudd over hele verden, ogsĂ„ i Norge. Campylobacter spp. og STEC har lav infeksiĂžs dose, som vil si at man kan bli syk selv om man bare inntar et lavt antall bakterieceller. L. monocytogenes kan gi sykdommen listeriose, en av de mest alvorlige matbĂ„rne zoonotiske sykdommene vi har i den vestlige verden. Resultater fra denne oppgaven viser en hĂžy forekomst av de tre patogenene i gĂ„rdsmiljĂžet. I tillegg var 7% av melkefiltrene vi testet positive for STEC, 13% positive for L. monocytogenes og 4% positive for Campylobacter spp.. Fire av STEC isolatene bar genet for Intimin, eae, som er ansett som en viktig virulensfaktor som Ăžker sjansen for alvorlig sykdom. Ett av de eae-positive isolatene ble funnet i et melkefilter, noe som indikerer at norsk rĂ„ melk kan inneholde patogene STEC. For Ă„ videre vurdere risikoen for Ă„ bli syk av STEC fra rĂ„ melk undersĂžkte vi hvordan de fire eae-positive isolatene vokste i rĂ„ melk lagret ved forskjellige temperaturer. For alle isolatene Ăžkte antall bakterier etter lagring ved 8°C, og for et isolat var veksten signifikant. Etter lagring ved 6°C ble antallet bakterier redusert de fĂžrste 24 timene, deretter stoppet reduksjonen i antall bakterier. Disse resultatene viser hvor viktig det er Ă„ ha stabil lav lagringstemperatur for rĂ„ melk, helst < 4°C. L. monocytogenes isolatene som ble samlet inn fra melkegĂ„rdene viste genetiske likheter med isolater samlet inn fra urbane og rurale miljĂžer rundt omkring i Norge. Derimot var kloner som dominerte i landbruksmiljĂžet forskjellige fra kliniske isolater og isolater fra matproduksjonslokaler. Videre sĂ„ man at en klone kan persistere pĂ„ en gĂ„rd over tid og at melk kan kontamineres av L. monocytogenes kloner som er til stede i gĂ„rdsmiljĂžet. Til tross for smĂ„ testvolum av tankmelken (25 mL) fant vi bĂ„de STEC og Campylobacter spp. i melkeprĂžvene. 3% av tankmelkprĂžvene og speneprĂžvene var positive for Campylobacter spp. og ett STEC isolat ble funnet i tankmelk. L. monocytogenes ble ikke funnet direkte i melkeprĂžvene. Landbruket i Norge er i stadig utvikling der besetningene blir stĂžrre, men fĂŠrre. Melkebesetningene er midt i en overgang der tradisjonell oppstalling med melking pĂ„ bĂ„s byttes ut med lĂžsdriftssystemer og melkeroboter. Forekomsten av de tre patogenene funnet i denne studien var hĂžyere i besetningene med lĂžsdrift sammenliknet med besetningene som hadde melkekyrne oppstallet pĂ„ bĂ„s. Pasteurisering er et viktig forebyggende tiltak for Ă„ beskytte konsumenter fra mikrobielle patogener, og i de fleste EU-land er kommersielt salg av rĂ„ melk juridisk begrenset. Denne studien viser at oppstallingstype kan pĂ„virke nivĂ„ene av patogene bakterier i gĂ„rdsmiljĂžet og i rĂ„ melk. Inntak av rĂ„ melk kan eksponere forbruker for patogene bakterier som kan gi alvorlig sykdom, spesielt hos barn, eldre og personer med underliggende sykdommer. Resultatene underbygger viktigheten av Ă„ pasteurisere melk for Ă„ sikre mattryggheten, og at det er avgjĂžrende Ă„ lagre rĂ„ melk ved kontinuerlig lave temperaturer for Ă„ forebygge vekst av zoonotiske patogener

    DIN Spec 91345 RAMI 4.0 compliant data pipelining: An approach to support data understanding and data acquisition in smart manufacturing environments

    Get PDF
    Today, data scientists in the manufacturing domain are confronted with a set of challenges associated to data acquisition as well as data processing including the extraction of valuable in-formation to support both, the work of the manufacturing equipment as well as the manufacturing processes behind it. One essential aspect related to data acquisition is the pipelining, including various commu-nication standards, protocols and technologies to save and transfer heterogenous data. These circumstances make it hard to understand, find, access and extract data from the sources depend-ing on use cases and applications. In order to support this data pipelining process, this thesis proposes the use of the semantic model. The selected semantic model should be able to describe smart manufacturing assets them-selves as well as to access their data along their life-cycle. As a matter of fact, there are many research contributions in smart manufacturing, which already came out with reference architectures or standards for semantic-based meta data descrip-tion or asset classification. This research builds upon these outcomes and introduces a novel se-mantic model-based data pipelining approach using as a basis the Reference Architecture Model for Industry 4.0 (RAMI 4.0).Hoje em dia, os cientistas de dados no domĂ­nio da manufatura sĂŁo confrontados com vĂĄrias normas, protocolos e tecnologias de comunicação para gravar, processar e transferir vĂĄrios tipos de dados. Estas circunstĂąncias tornam difĂ­cil compreender, encontrar, aceder e extrair dados necessĂĄrios para aplicaçÔes dependentes de casos de utilização, desde os equipamentos aos respectivos processos de manufatura. Um aspecto essencial poderia ser um processo de canalisação de dados incluindo vĂĄrios normas de comunicação, protocolos e tecnologias para gravar e transferir dados. Uma solução para suporte deste processo, proposto por esta tese, Ă© a aplicação de um modelo semĂąntico que descreva os prĂłprios recursos de manufactura inteligente e o acesso aos seus dados ao longo do seu ciclo de vida. Muitas das contribuiçÔes de investigação em manufatura inteligente jĂĄ produziram arquitecturas de referĂȘncia como a RAMI 4.0 ou normas para a descrição semĂąntica de meta dados ou classificação de recursos. Esta investigação baseia-se nestas fontes externas e introduz um novo modelo semĂąntico baseado no Modelo de Arquitectura de ReferĂȘncia para IndĂșstria 4.0 (RAMI 4.0), em conformidade com a abordagem de canalisação de dados no domĂ­nio da produção inteligente como caso exemplar de utilização para permitir uma fĂĄcil exploração, compreensĂŁo, descoberta, selecção e extracção de dados

    Digital asset management via distributed ledgers

    Get PDF
    Distributed ledgers rose to prominence with the advent of Bitcoin, the first provably secure protocol to solve consensus in an open-participation setting. Following, active research and engineering efforts have proposed a multitude of applications and alternative designs, the most prominent being Proof-of-Stake (PoS). This thesis expands the scope of secure and efficient asset management over a distributed ledger around three axes: i) cryptography; ii) distributed systems; iii) game theory and economics. First, we analyze the security of various wallets. We start with a formal model of hardware wallets, followed by an analytical framework of PoS wallets, each outlining the unique properties of Proof-of-Work (PoW) and PoS respectively. The latter also provides a rigorous design to form collaborative participating entities, called stake pools. We then propose Conclave, a stake pool design which enables a group of parties to participate in a PoS system in a collaborative manner, without a central operator. Second, we focus on efficiency. Decentralized systems are aimed at thousands of users across the globe, so a rigorous design for minimizing memory and storage consumption is a prerequisite for scalability. To that end, we frame ledger maintenance as an optimization problem and design a multi-tier framework for designing wallets which ensure that updates increase the ledger’s global state only to a minimal extent, while preserving the security guarantees outlined in the security analysis. Third, we explore incentive-compatibility and analyze blockchain systems from a micro and a macroeconomic perspective. We enrich our cryptographic and systems' results by analyzing the incentives of collective pools and designing a state efficient Bitcoin fee function. We then analyze the Nash dynamics of distributed ledgers, introducing a formal model that evaluates whether rational, utility-maximizing participants are disincentivized from exhibiting undesirable infractions, and highlighting the differences between PoW and PoS-based ledgers, both in a standalone setting and under external parameters, like market price fluctuations. We conclude by introducing a macroeconomic principle, cryptocurrency egalitarianism, and then describing two mechanisms for enabling taxation in blockchain-based currency systems

    In her own words: exploring the subjectivity of Freud’s ‘teacher’ Anna von Lieben

    Get PDF
    This project is inspired by Roy Porter (1985), who draws attention to the patient-shaped gap in medical history, and Rita Charon (2006), who emphasises the need to bring the patient’s narrative to the fore in the practice of medicine. The principal aim was to devise a means of accessing the lived experience of a patient who is no longer alive in order to gain an understanding of her narrative. Anna von Lieben was identified as a suitable subject as she wrote a substantial quantity of autopathographical poetry suitable for analysis and her status as Freud’s patient makes her a person of significant interest to the history of medicine. The poems were analysed using Interpretative Phenomenological Analysis (IPA), an idiographic and inductive method of qualitative research, based on Heideggerian hermeneutic phenomenology, which explores the lived experience of individuals and is committed to understanding the first-person perspective from the third-person position. The main findings from the IPA study reveal that Anna experienced a prolonged period of malaise, starting in late adolescence which she believed to result, at least partly, from a traumatic experience which occurred at that time. The analysis also indicates that Anna suffered from deep and lasting feelings of guilt and shame. The discovery of additional family documentation enabled me to contextualise and add substance to the findings of the IPA study. Anna’s husband’s diaries in particular reveal that Anna: ‱ had a severe and longstanding gynaecological disorder ‱ suffered from severe morphinism ‱ did not benefit from Freud’s treatment which seemed neither to ease her symptoms nor identify any cause ‱ was treated in Paris, not by Jean-Martin Charcot as previously supposed, but by a French hydrotherapist, Theodore Keller, who appears to have become a person of considerable significance in her life. The above findings led me to investigate Anna’s comorbidities (gynaecological disease and morphinism) and to show how those could be responsible for much of the symptomatology identified by Freud as ‘hysteria’. I then explore the possibility that her psychotic-like experiences could have been iatrogenically induced by her treatment first by Keller and then by Freud. Finally, I propose a fourfold set of hypotheses as an alternative to Freud’s diagnosis of hysteria

    Investigating illicit drug use in adolescent students in England

    Get PDF
    Abstract The Smoking Drinking Drug Use Survey of adolescents aged 11 to 15 years living in England shows that lifetime drug use by adolescents aged 11 to 15 years has increased (15% to 24%) from 2014 to 2018 (NHS Digital, 2017, 2021b). This upward trend is despite the implementation of drug policies focused on reducing supply, possession, and manufacture of illicit drugs. Based on the premise that drug use is a socially learnt behaviour, the main objective of this research is to investigate whether social learning factors (imitation, parental reinforcement, peer association and attitudes to drug use) mediate drug use in adolescents aged 11 to 15 years living in England. The second objective is to identify which social learning factors mediate drug use by ages, region, and gender. Using the Social Structure Social Learning (SSSL) theory as a framework for the research, this study contributes to the literature by identifying a) the strongest social learning behaviour for each age, gender and region in England and b) the mechanism (mediation) by which social learning affects drug use. This research employs rich data on drug use drawn from the Smoking Drinking Drug Use Survey 2016, a cross-sectional survey of adolescents aged 11-15 years across England (as of October 2021 the data for the most recent survey 2018 was not available for analysis). Mediation analysis was used to evaluate which social learning factors mediate the association between age, gender, region and drug use. The results showed that there were differences in learning behaviours that were specific to age, gender and region. For example, the most significant social learning behaviour for drug use among boys was “imitation of friends”, whilst for females, it was “peer association” among females (i.e. having a perception that peers are using drugs). In addition, having “positive attitudes to glue” (i.e. “it is ok to try glue”) was the strongest learning behaviour for drug use among younger individuals (i.e. at ages 11 to 13). Furthermore, whilst in Northern England, the strongest learning behaviour was having “positive attitudes to cannabis”, in London peer association was found to be the strongest learning pathway to drug use. Family disapproval of drug use (“persuade me not to take drugs”) was found to be a protective factor against drug use for all ages except for age 11 and 12 years and those living in the East Midlands and London. In these cases, more authoritarian parenting –– strong parental disapproval (“stop me from taking drugs”) was found to be a protective factor. This research offers two main contributions to the literature. First, it shows empirical linkages between constructs built using SSSL theory that have not been previously explored within a population of young adolescents in England. Second, it identifies the effects and degree to which social learning affects the relationship between drug use and social structure. Overall, this research also contributes to an improved theoretical rationale for existing SSSL associations; that is, social learning can behave as a mediator or a moderator depending on the context. The evidence produced by this thesis could also have potentially relevant policy implications. More specifically, the differences in the social learning behaviours may suggest the need to implement more targeted prevention policies aimed by age, gender and regional groups of young adolescents

    Managing global virtual teams in the London FinTech industry

    Get PDF
    Today, the number of organisations that are adopting virtual working arrangements has exploded, and the London FinTech industry is no exception. During recent years, FinTech companies have increasingly developed virtual teams as a means of connecting and engaging geographically dispersed workers, lowering costs, and enabling greater speed and adaptability. As the first study in the United Kingdom regarding global virtual team management in the FinTech industry, this DBA research seeks answers to the question, “What makes for the successful management of a global virtual team in the London FinTech industry?”. Straussian grounded-theory method was chosen as this qualitative approach lets participants have their own voice and offers some flexibility. It also allows the researcher to have preconceived ideas about the research undertaking. The research work makes the case for appreciating the voice of people with lived experiences. Ten London-based FinTech Managers with considerable experience running virtual teams agreed to take part in this study. These Managers had spent time working at large, household-name firms with significant global reach, and one had recently become founder and CEO of his own firm, taking on clients and hiring contract staff from around the world. At least eight of the other participants were senior ‘Heads’ of various technology teams and one was a Managing Director working at a ‘Big Four’ consultancy. They had all (and many still did) spent years running geographically distributed teams with members as far away as Pacific Asia and they were all keen to discuss that breadth of experience and the challenges they faced. Results from these in-depth interviews suggested that there are myriad reasons for a global virtual team, from providing 24 hour, follow-the-sun service to locating the most cost-effective resources with the highest skills. It also confirmed that there are unique challenges to virtual management and new techniques are required to help navigate virtual managers through them. Managing a global virtual team requires much more than the traditional management competencies. Based on discussion with the respondents, a set of practical recommendations for global virtual team management was developed and covered a wide range of issues related to recruitment and selection, team building, developing standard operating procedures, communication, motivation, performance management, and building trust

    Platform protocol place: a practice-based study of critical media art practice (2007-2020)

    Get PDF
    This practice-based research project focuses on critical media art practices in contemporary digital culture. The theoretical framework employed in this inquiry draws from the work of the Frankfurt School, in particular Theodor Adorno and Max Horkheimer’s The Culture Industry: Enlightenment as Mass Deception. Using Adorno & Horkheimer’s thesis as a theoretical guide, this research project formulates the concept of the digital culture industry - a concept that refers to the contemporary era of networked capitalism, an era defined by the unprecedented extraction, accumulation and manipulation of data and the material and digital infrastructures that facilitate it. This concept is used as a framing mechanism that articulates certain techno-political concerns within networked capitalism and responds to them through practice. The second concept formulated within this research project is Platform Protocol Place. The function of this second concept is to frame and outline the body of practice-based work developed in this study. It is also used to make complex technological issues accessible and to communicate these issues through public exhibition and within this written thesis. The final concept developed in this research project is tactical media archaeology. This concept describes the techniques and approaches employed in the development of the body of practice-based work that are the central focus of this research project. This approach is a synthesis of two subfields of media art practice and theory, tactical media and media archaeology. Through practice, tactical media archaeology critiques the geopolitical machinations and systems beneath the networked devices and interfaces of the digital culture industry
    • 

    corecore