8,811 research outputs found
The LDBC social network benchmark: Business intelligence workload
The Social Network Benchmarkâs Business Intelligence workload (SNB BI) is a comprehensive graph OLAP benchmark targeting analytical data systems capable of supporting graph workloads. This paper marks the finalization of almost a decade of research in academia and industry via the Linked Data Benchmark Council (LDBC). SNB BI advances the state-of-the art in synthetic and scalable analytical database benchmarks in many aspects. Its base is a sophisticated data generator, implemented on a scalable distributed infrastructure, that produces a social graph with small-world phenomena, whose value properties follow skewed and correlated distributions and where values correlate with structure. This is a temporal graph where all nodes and edges follow lifespan-based rules with temporal skew enabling realistic and consistent temporal inserts and (recursive) deletes. The query workload exploiting this skew and correlation is based on LDBCâs âchoke pointâ-driven design methodology and will entice technical and scientific improvements in future (graph) database systems. SNB BI includes the first adoption of âparameter curationâ in an analytical benchmark, a technique that ensures stable runtimes of query variants across different parameter values. Two performance metrics characterize peak single-query performance (power) and sustained concurrent query throughput. To demonstrate the portability of the benchmark, we present experimental results on a relational and a graph DBMS. Note that these do not constitute an official LDBC Benchmark Result â only audited results can use this trademarked term
The Viability and Potential Consequences of IoT-Based Ransomware
With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested.
As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed.
For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim.
Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research
Examining the Cyber Skills Gap: An Analysis of Cybersecurity Positions by Sub-Field
While demand for cybersecurity professionals is high, the field is currently facing a workforce shortage and a skills gap. Thus, an examination of current cybersecurity position hiring requirements may be advantageous for helping to close the skills gap. This work examines the education, professional experience, industry certification, security clearance, and programming skill requirements of 935 cybersecurity positions categorized by sub-field. The nine sub-fields are: architecture, auditing, education, GRC (governance, risk, and compliance), management, operations, penetration testing, software security, and threat intelligence / research. Prior work experience and higher education degrees in technical fields were found to be frequently required across all sub-fields. Over 48% of positions listed an industry cybersecurity certification, while 19% of positions required a security clearance. In addition, 25% of positions listed knowledge of a programming language as a requirement for employment. There were notable differences in certain position requirements between sub-fields. On average, management positions required three years of additional work experience than positions in the auditing, operations, and penetration testing sub-fields. Security clearance requirements were relatively similar across all other sub-fields, with the GRC sub-field having the highest percentage of positions requiring a security clearance. Programming skills were desired most prevalently in positions within the architecture, software security, and penetration testing sub-fields. Demand for industry certifications varied by sub-field, although the Certified Information Systems Security Professional (CISSP) certification was the most frequently desired certification. Cybersecurity education programs should consider the diverse nature of the cybersecurity field and develop pathways to prepare future cybersecurity professionals for success in any sub-field
Norsk rÄ kumelk, en kilde til zoonotiske patogener?
The worldwide emerging trend of eating ânaturalâ foods, that has not been
processed, also applies for beverages. According to Norwegian legislation, all
milk must be pasteurized before commercial sale but drinking milk that has
not been heat-treated, is gaining increasing popularity. Scientist are warning
against this trend and highlights the risk of contracting disease from milkborne
microorganisms. To examine potential risks associated with drinking
unpasteurized milk in Norway, milk- and environmental samples were
collected from dairy farms located in south-east of Norway. The samples
were analyzed for the presence of specific zoonotic pathogens; Listeria
monocytogenes, Campylobacter spp., and Shiga toxin-producing Escherichia
coli (STEC). Cattle are known to be healthy carriers of these pathogens, and
Campylobacter spp. and STEC have a low infectious dose, meaning that
infection can be established by ingesting a low number of bacterial cells. L.
monocytogenes causes one of the most severe foodborne zoonotic diseases,
listeriosis, that has a high fatality rate. All three pathogens have caused milk
borne disease outbreaks all over the world, also in Norway.
During this work, we observed that the prevalence of the three examined
bacteria were high in the environment at the examined farms. In addition, 7%
of the milk filters were contaminated by STEC, 13% by L. monocytogenes and
4% by Campylobacter spp. Four of the STEC isolates detected were eaepositive,
which is associated with the capability to cause severe human
disease. One of the eae-positive STEC isolates were collected from a milk
filter, which strongly indicate that Norwegian raw milk may contain potential
pathogenic STEC.
To further assess the possibilities of getting ill by STEC after consuming raw
milk, we examined the growth of the four eae-positive STEC isolates in raw milk at different temperatures. All four isolates seemed to have ability to multiply in raw milk at 8°C, and one isolate had significant growth after 72 hours. Incubation at 6°C seemed to reduce the number of bacteria during the
first 24 hours before cell death stopped. These findings highlight the
importance of stable refrigerator temperatures, preferable < 4°C, for storage
of raw milk.
The L. monocytogenes isolates collected during this study show genetic
similarities to isolates collected from urban and rural environmental
locations, but different clones were predominant in agricultural
environments compared to clinical and food environments. However, the
results indicate that the same clone can persist in a farm over time, and that
milk can be contaminated by L. monocytogenes clones present in farm
environment.
Despite testing small volumes (25 mL) of milk, we were able to isolate both
STEC and Campylobacter spp. directly from raw milk. A proportion of 3% of
the bulk tank milk and teat milk samples were contaminated by
Campylobacter spp. and one STEC was isolated from bulk tank milk. L
monocytogenes was not detected in bulk tank milk, nor in teat milk samples.
The agricultural evolvement during the past decades have led to larger
production units and new food safety challenges. Dairy cattle production in
Norway is in a current transition from tie-stall housing with conventional
pipeline milking systems, to modern loose housing systems with robotic
milking. The occurrence of the three pathogens in this project were higher in
samples collected from farms with loose housing compared to those with tiestall
housing.
Pasteurization of cowâs milk is a risk reducing procedure to protect
consumers from microbial pathogens and in most EU countries, commercial
distribution of unpasteurized milk is legally restricted. Together, the results
presented in this thesis show that the animal housing may influence the level
of pathogenic bacteria in the raw milk and that ingestion of Norwegian raw
cowâs milk may expose consumers to pathogenic bacteria which can cause
severe disease, especially in children, elderly and in persons with underlying
diseases. The results also highlight the importance of storing raw milk at low
temperatures between milking and consumption.Ă
spise mat som er mindre prosessert og mer «naturlig» er en pÄgÄende
trend i Norge og i andre deler av verden. Interessen for Ă„ drikke melk som
ikke er varmebehandlet, sÄkalt rÄ melk, er ogsÄ Þkende. I Norge er det pÄbudt
Ă„ pasteurisere melk fĂžr kommersielt salg for Ă„ beskytte forbrukeren mot
sykdomsfremkallende mikroorganismer. Fagfolk advarer mot Ä drikke rÄ
melk, og pÄpeker risikoen for Ä bli syk av patogene bakterier som kan finnes i
melken.
I denne avhandlingen undersĂžker vi den potensielle risikoen det medfĂžrer Ă„
drikke upasteurisert melk fra Norge. I tillegg til Ă„ samle inn tankmelk- og
speneprÞver fra melkegÄrder i sÞrÞst Norge, samlet vi ogsÄ miljÞprÞver fra
de samme gÄrdene for Ä kartlegge forekomst og for Ä identifisere potensielle
mattrygghetsrisikoer i melkeproduksjonen. Alle prĂžvene ble analysert for de
zoonotiske sykdomsfremkallende bakteriene Listeria monocytogenes,
Campylobacter spp., og Shiga toksin-produserende Escherichia coli (STEC).
Kyr kan vĂŠre friske smittebĂŠrere av disse bakteriene, som dermed kan
etablere et reservoar pÄ gÄrdene. Bakteriene kan overfÞres fra gÄrdsmiljÞet
til melkekjeden og dermed utfordre mattryggheten. Disse bakteriene har
forÄrsaket melkebÄrne sykdomsutbrudd over hele verden, ogsÄ i Norge.
Campylobacter spp. og STEC har lav infeksiĂžs dose, som vil si at man kan bli
syk selv om man bare inntar et lavt antall bakterieceller. L. monocytogenes
kan gi sykdommen listeriose, en av de mest alvorlige matbÄrne zoonotiske
sykdommene vi har i den vestlige verden.
Resultater fra denne oppgaven viser en hĂžy forekomst av de tre patogenene i
gÄrdsmiljÞet. I tillegg var 7% av melkefiltrene vi testet positive for STEC, 13%
positive for L. monocytogenes og 4% positive for Campylobacter spp.. Fire av
STEC isolatene bar genet for Intimin, eae, som er ansett som en viktig
virulensfaktor som Ăžker sjansen for alvorlig sykdom. Ett av de eae-positive
isolatene ble funnet i et melkefilter, noe som indikerer at norsk rÄ melk kan
inneholde patogene STEC. For Ă„ videre vurdere risikoen for Ă„ bli syk av STEC
fra rÄ melk undersÞkte vi hvordan de fire eae-positive isolatene vokste i rÄ
melk lagret ved forskjellige temperaturer. For alle isolatene Ăžkte antall
bakterier etter lagring ved 8°C, og for et isolat var veksten signifikant. Etter
lagring ved 6°C ble antallet bakterier redusert de fÞrste 24 timene, deretter
stoppet reduksjonen i antall bakterier. Disse resultatene viser hvor viktig det
er Ä ha stabil lav lagringstemperatur for rÄ melk, helst < 4°C.
L. monocytogenes isolatene som ble samlet inn fra melkegÄrdene viste
genetiske likheter med isolater samlet inn fra urbane og rurale miljĂžer rundt
omkring i Norge. Derimot var kloner som dominerte i landbruksmiljĂžet
forskjellige fra kliniske isolater og isolater fra matproduksjonslokaler. Videre
sÄ man at en klone kan persistere pÄ en gÄrd over tid og at melk kan
kontamineres av L. monocytogenes kloner som er til stede i gÄrdsmiljÞet.
Til tross for smÄ testvolum av tankmelken (25 mL) fant vi bÄde STEC og
Campylobacter spp. i melkeprĂžvene. 3% av tankmelkprĂžvene og
speneprĂžvene var positive for Campylobacter spp. og ett STEC isolat ble
funnet i tankmelk. L. monocytogenes ble ikke funnet direkte i melkeprĂžvene.
Landbruket i Norge er i stadig utvikling der besetningene blir stĂžrre, men
fĂŠrre. Melkebesetningene er midt i en overgang der tradisjonell oppstalling
med melking pÄ bÄs byttes ut med lÞsdriftssystemer og melkeroboter.
Forekomsten av de tre patogenene funnet i denne studien var hĂžyere i
besetningene med lĂžsdrift sammenliknet med besetningene som hadde
melkekyrne oppstallet pÄ bÄs.
Pasteurisering er et viktig forebyggende tiltak for Ă„ beskytte konsumenter fra
mikrobielle patogener, og i de fleste EU-land er kommersielt salg av rÄ melk
juridisk begrenset. Denne studien viser at oppstallingstype kan pÄvirke
nivÄene av patogene bakterier i gÄrdsmiljÞet og i rÄ melk. Inntak av rÄ melk
kan eksponere forbruker for patogene bakterier som kan gi alvorlig sykdom,
spesielt hos barn, eldre og personer med underliggende sykdommer.
Resultatene underbygger viktigheten av Ă„ pasteurisere melk for Ă„ sikre
mattryggheten, og at det er avgjÞrende Ä lagre rÄ melk ved kontinuerlig lave
temperaturer for Ă„ forebygge vekst av zoonotiske patogener
DIN Spec 91345 RAMI 4.0 compliant data pipelining: An approach to support data understanding and data acquisition in smart manufacturing environments
Today, data scientists in the manufacturing domain are confronted with a set of challenges associated to data acquisition as well as data processing including the extraction of valuable in-formation to support both, the work of the manufacturing equipment as well as the manufacturing processes behind it.
One essential aspect related to data acquisition is the pipelining, including various commu-nication standards, protocols and technologies to save and transfer heterogenous data. These circumstances make it hard to understand, find, access and extract data from the sources depend-ing on use cases and applications.
In order to support this data pipelining process, this thesis proposes the use of the semantic model. The selected semantic model should be able to describe smart manufacturing assets them-selves as well as to access their data along their life-cycle.
As a matter of fact, there are many research contributions in smart manufacturing, which already came out with reference architectures or standards for semantic-based meta data descrip-tion or asset classification. This research builds upon these outcomes and introduces a novel se-mantic model-based data pipelining approach using as a basis the Reference Architecture Model for Industry 4.0 (RAMI 4.0).Hoje em dia, os cientistas de dados no domĂnio da manufatura sĂŁo confrontados com vĂĄrias normas, protocolos e tecnologias de comunicação para gravar, processar e transferir vĂĄrios tipos de dados. Estas circunstĂąncias tornam difĂcil compreender, encontrar, aceder e extrair dados necessĂĄrios para aplicaçÔes dependentes de casos de utilização, desde os equipamentos aos respectivos processos de manufatura.
Um aspecto essencial poderia ser um processo de canalisação de dados incluindo vårios normas de comunicação, protocolos e tecnologias para gravar e transferir dados. Uma solução para suporte deste processo, proposto por esta tese, é a aplicação de um modelo semùntico que descreva os próprios recursos de manufactura inteligente e o acesso aos seus dados ao longo do seu ciclo de vida.
Muitas das contribuiçÔes de investigação em manufatura inteligente jĂĄ produziram arquitecturas de referĂȘncia como a RAMI 4.0 ou normas para a descrição semĂąntica de meta dados ou classificação de recursos. Esta investigação baseia-se nestas fontes externas e introduz um novo modelo semĂąntico baseado no Modelo de Arquitectura de ReferĂȘncia para IndĂșstria 4.0 (RAMI 4.0), em conformidade com a abordagem de canalisação de dados no domĂnio da produção inteligente como caso exemplar de utilização para permitir uma fĂĄcil exploração, compreensĂŁo, descoberta, selecção e extracção de dados
Digital asset management via distributed ledgers
Distributed ledgers rose to prominence with the advent of Bitcoin, the first provably secure protocol to solve consensus in an open-participation setting. Following, active research and engineering efforts have proposed a multitude of applications and alternative designs, the most prominent being Proof-of-Stake (PoS). This thesis expands the scope of secure and efficient asset management over a distributed ledger around three axes: i) cryptography; ii) distributed systems; iii) game theory and economics. First, we analyze the security of various wallets. We start with a formal model of hardware wallets, followed by an analytical framework of PoS wallets, each outlining the unique properties of Proof-of-Work (PoW) and PoS respectively. The latter also provides a rigorous design to form collaborative participating entities, called stake pools. We then propose Conclave, a stake pool design which enables a group of parties to participate in a PoS system in a collaborative manner, without a central operator. Second, we focus on efficiency. Decentralized systems are aimed at thousands of users across the globe, so a rigorous design for minimizing memory and storage consumption is a prerequisite for scalability. To that end, we frame ledger maintenance as an optimization problem and design a multi-tier framework for designing wallets which ensure that updates increase the ledgerâs global state only to a minimal extent, while preserving the security guarantees outlined in the security analysis. Third, we explore incentive-compatibility and analyze blockchain systems from a micro and a macroeconomic perspective. We enrich our cryptographic and systems' results by analyzing the incentives of collective pools and designing a state efficient Bitcoin fee function. We then analyze the Nash dynamics of distributed ledgers, introducing a formal model that evaluates whether rational, utility-maximizing participants are disincentivized from exhibiting undesirable infractions, and highlighting the differences between PoW and PoS-based ledgers, both in a standalone setting and under external parameters, like market price fluctuations. We conclude by introducing a macroeconomic principle, cryptocurrency egalitarianism, and then describing two mechanisms for enabling taxation in blockchain-based currency systems
In her own words: exploring the subjectivity of Freudâs âteacherâ Anna von Lieben
This project is inspired by Roy Porter (1985), who draws attention to the patient-shaped gap in medical history, and Rita Charon (2006), who emphasises the need to bring the patientâs narrative to the fore in the practice of medicine. The principal aim was to devise a means of accessing the lived experience of a patient who is no longer alive in order to gain an understanding of her narrative. Anna von Lieben was identified as a suitable subject as she wrote a substantial quantity of autopathographical poetry suitable for analysis and her status as Freudâs patient makes her a person of significant interest to the history of medicine.
The poems were analysed using Interpretative Phenomenological Analysis (IPA), an idiographic and inductive method of qualitative research, based on Heideggerian hermeneutic phenomenology, which explores the lived experience of individuals and is committed to understanding the first-person perspective from the third-person position.
The main findings from the IPA study reveal that Anna experienced a prolonged period of malaise, starting in late adolescence which she believed to result, at least partly, from a traumatic experience which occurred at that time. The analysis also indicates that Anna suffered from deep and lasting feelings of guilt and shame. The discovery of additional family documentation enabled me to contextualise and add substance to the findings of the IPA study. Annaâs husbandâs diaries in particular reveal that Anna:
âą had a severe and longstanding gynaecological disorder
âą suffered from severe morphinism
âą did not benefit from Freudâs treatment which seemed neither to ease her symptoms nor identify any cause
âą was treated in Paris, not by Jean-Martin Charcot as previously supposed, but by a French hydrotherapist, Theodore Keller, who appears to have become a person of considerable significance in her life.
The above findings led me to investigate Annaâs comorbidities (gynaecological disease and morphinism) and to show how those could be responsible for much of the symptomatology identified by Freud as âhysteriaâ. I then explore the possibility that her psychotic-like experiences could have been iatrogenically induced by her treatment first by Keller and then by Freud. Finally, I propose a fourfold set of hypotheses as an alternative to Freudâs diagnosis of hysteria
Investigating illicit drug use in adolescent students in England
Abstract The Smoking Drinking Drug Use Survey of adolescents aged 11 to 15 years living in England shows that lifetime drug use by adolescents aged 11 to 15 years has increased (15% to 24%) from 2014 to 2018 (NHS Digital, 2017, 2021b). This upward trend is despite the implementation of drug policies focused on reducing supply, possession, and manufacture of illicit drugs. Based on the premise that drug use is a socially learnt behaviour, the main objective of this research is to investigate whether social learning factors (imitation, parental reinforcement, peer association and attitudes to drug use) mediate drug use in adolescents aged 11 to 15 years living in England. The second objective is to identify which social learning factors mediate drug use by ages, region, and gender. Using the Social Structure Social Learning (SSSL) theory as a framework for the research, this study contributes to the literature by identifying a) the strongest social learning behaviour for each age, gender and region in England and b) the mechanism (mediation) by which social learning affects drug use. This research employs rich data on drug use drawn from the Smoking Drinking Drug Use Survey 2016, a cross-sectional survey of adolescents aged 11-15 years across England (as of October 2021 the data for the most recent survey 2018 was not available for analysis). Mediation analysis was used to evaluate which social learning factors mediate the association between age, gender, region and drug use. The results showed that there were differences in learning behaviours that were specific to age, gender and region. For example, the most significant social learning behaviour for drug use among boys was âimitation of friendsâ, whilst for females, it was âpeer associationâ among females (i.e. having a perception that peers are using drugs). In addition, having âpositive attitudes to glueâ (i.e. âit is ok to try glueâ) was the strongest learning behaviour for drug use among younger individuals (i.e. at ages 11 to 13). Furthermore, whilst in Northern England, the strongest learning behaviour was having âpositive attitudes to cannabisâ, in London peer association was found to be the strongest learning pathway to drug use. Family disapproval of drug use (âpersuade me not to take drugsâ) was found to be a protective factor against drug use for all ages except for age 11 and 12 years and those living in the East Midlands and London. In these cases, more authoritarian parenting ââ strong parental disapproval (âstop me from taking drugsâ) was found to be a protective factor. This research offers two main contributions to the literature. First, it shows empirical linkages between constructs built using SSSL theory that have not been previously explored within a population of young adolescents in England. Second, it identifies the effects and degree to which social learning affects the relationship between drug use and social structure. Overall, this research also contributes to an improved theoretical rationale for existing SSSL associations; that is, social learning can behave as a mediator or a moderator depending on the context. The evidence produced by this thesis could also have potentially relevant policy implications. More specifically, the differences in the social learning behaviours may suggest the need to implement more targeted prevention policies aimed by age, gender and regional groups of young adolescents
Managing global virtual teams in the London FinTech industry
Today, the number of organisations that are adopting virtual working arrangements has exploded, and the London FinTech industry is no exception. During recent years, FinTech companies have increasingly developed virtual teams as a means of connecting and engaging geographically dispersed workers, lowering costs, and enabling greater speed and adaptability.
As the first study in the United Kingdom regarding global virtual team management in the FinTech industry, this DBA research seeks answers to the question, âWhat makes for the successful management of a global virtual team in the London FinTech industry?â. Straussian grounded-theory method was chosen as this qualitative approach lets participants have their own voice and offers some flexibility. It also allows the researcher to have preconceived ideas about the research undertaking.
The research work makes the case for appreciating the voice of people with lived experiences. Ten London-based FinTech Managers with considerable experience running virtual teams agreed to take part in this study. These Managers had spent time working at large, household-name firms with significant global reach, and one had recently become founder and CEO of his own firm, taking on clients and hiring contract staff from around the world. At least eight of the other participants were senior âHeadsâ of various technology teams and one was a Managing Director working at a âBig Fourâ consultancy. They had all (and many still did) spent years running geographically distributed teams with members as far away as Pacific Asia and they were all keen to discuss that breadth of experience and the challenges they faced.
Results from these in-depth interviews suggested that there are myriad reasons for a global virtual team, from providing 24 hour, follow-the-sun service to locating the most cost-effective resources with the highest skills. It also confirmed that there are unique challenges to virtual management and new techniques are required to help navigate virtual managers through them.
Managing a global virtual team requires much more than the traditional management competencies. Based on discussion with the respondents, a set of practical recommendations for global virtual team management was developed and covered a wide range of issues related to recruitment and selection, team building, developing standard operating procedures, communication, motivation, performance management, and building trust
Platform protocol place: a practice-based study of critical media art practice (2007-2020)
This practice-based research project focuses on critical media art practices in contemporary digital culture. The theoretical framework employed in this inquiry draws from the work of the Frankfurt School, in particular Theodor Adorno and Max Horkheimerâs The Culture Industry: Enlightenment as Mass Deception. Using Adorno & Horkheimerâs thesis as a theoretical guide, this research project formulates the concept of the digital culture industry - a concept that refers to the contemporary era of networked capitalism, an era defined by the unprecedented extraction, accumulation and manipulation of data and the material and digital infrastructures that facilitate it. This concept is used as a framing mechanism that articulates certain techno-political concerns within networked capitalism and responds to them through practice.
The second concept formulated within this research project is Platform Protocol Place. The function of this second concept is to frame and outline the body of practice-based work developed in this study. It is also used to make complex technological issues accessible and to communicate these issues through public exhibition and within this written thesis.
The final concept developed in this research project is tactical media archaeology. This concept describes the techniques and approaches employed in the development of the body of practice-based work that are the central focus of this research project. This approach is a synthesis of two subfields of media art practice and theory, tactical media and media archaeology. Through practice, tactical media archaeology critiques the geopolitical machinations and systems beneath the networked devices and interfaces of the digital culture industry
- âŠ