752 research outputs found

    FinBook: literary content as digital commodity

    Get PDF
    This short essay explains the significance of the FinBook intervention, and invites the reader to participate. We have associated each chapter within this book with a financial robot (FinBot), and created a market whereby book content will be traded with financial securities. As human labour increasingly consists of unstable and uncertain work practices and as algorithms replace people on the virtual trading floors of the worlds markets, we see members of society taking advantage of FinBots to invest and make extra funds. Bots of all kinds are making financial decisions for us, searching online on our behalf to help us invest, to consume products and services. Our contribution to this compilation is to turn the collection of chapters in this book into a dynamic investment portfolio, and thereby play out what might happen to the process of buying and consuming literature in the not-so-distant future. By attaching identities (through QR codes) to each chapter, we create a market in which the chapter can ‘perform’. Our FinBots will trade based on features extracted from the authors’ words in this book: the political, ethical and cultural values embedded in the work, and the extent to which the FinBots share authors’ concerns; and the performance of chapters amongst those human and non-human actors that make up the market, and readership. In short, the FinBook model turns our work and the work of our co-authors into an investment portfolio, mediated by the market and the attention of readers. By creating a digital economy specifically around the content of online texts, our chapter and the FinBook platform aims to challenge the reader to consider how their personal values align them with individual articles, and how these become contested as they perform different value judgements about the financial performance of each chapter and the book as a whole. At the same time, by introducing ‘autonomous’ trading bots, we also explore the different ‘network’ affordances that differ between paper based books that’s scarcity is developed through analogue form, and digital forms of books whose uniqueness is reached through encryption. We thereby speak to wider questions about the conditions of an aggressive market in which algorithms subject cultural and intellectual items – books – to economic parameters, and the increasing ubiquity of data bots as actors in our social, political, economic and cultural lives. We understand that our marketization of literature may be an uncomfortable juxtaposition against the conventionally-imagined way a book is created, enjoyed and shared: it is intended to be

    Area-throughput trade-offs for SHA-1 and SHA-256 hash functions’ pipelined designs

    Get PDF
    High-throughput designs of hash functions are strongly demanded due to the need for security in every transmitted packet of worldwide e-transactions. Thus, optimized and non-optimized pipelined architectures have been proposed raising, however, important questions. Which is the optimum number of the pipeline stages? Is it worth to develop optimized designs or could the same results be achieved by increasing only the pipeline stages of the non-optimized designs? The paper answers the above questions studying extensively many pipelined architectures of SHA-1 and SHA-256 hashes, implemented in FPGAs, in terms of throughput/area (T/A) factor. Also, guides for developing efficient security schemes designs are provided. Read More: https://www.worldscientific.com/doi/abs/10.1142/S021812661650032

    Location Privacy and Its Applications: A Systematic Study

    Full text link
    © 2013 IEEE. This paper surveys the current research status of location privacy issues in mobile applications. The survey spans five aspects of study: the definition of location privacy, attacks and adversaries, mechanisms to preserve the privacy of locations, location privacy metrics, and the current status of location-based applications. Through this comprehensive review, all the interrelated aspects of location privacy are integrated into a unified framework. Additionally, the current research progress in each area is reviewed individually, and the links between existing academic research and its practical applications are identified. This in-depth analysis of the current state-of-play in location privacy is designed to provide a solid foundation for future studies in the field

    Multi-algorithmic Cryptography using Deterministic Chaos with Applications to Mobile Communications

    Get PDF
    In this extended paper, we present an overview of the principal issues associated with cryptography, providing historically significant examples for illustrative purposes as part of a short tutorial for readers that are not familiar with the subject matter. This is used to introduce the role that nonlinear dynamics and chaos play in the design of encryption engines which utilize different types of Iteration Function Systems (IFS). The design of such encryption engines requires that they conform to the principles associated with diffusion and confusion for generating ciphers that are of a maximum entropy type. For this reason, the role of confusion and diffusion in cryptography is discussed giving a design guide to the construction of ciphers that are based on the use of IFS. We then present the background and operating framework associated with a new product - CrypsticTM - which is based on the application of multi-algorithmic IFS to design encryption engines mounted on a USB memory stick using both disinformation and obfuscation to ‘hide’ a forensically inert application. The protocols and procedures associated with the use of this product are also briefly discussed

    Artists Re:Thinking the Blockchain

    Get PDF
    This book is the result a 12 month research process, in which editors commissioned new works and sought out a range of active international practitioners addressing the question: what does the blockchain mean to art? and how can artists shape and intervene in this emerging technology? Contributions from a range of world-leading and emerging voices in the fields of blockchain theory and art practice were newly commissioned by editors and developed in conversations held at Furtherfield gallery in London during 2016 and 2017. It is the first book of its kind, addressing the meaning of nascent blockchain technologies to art production and dissemination. Continuing Torque Edition's commitment to hybridity in their published editions, the book's thirty chapters are split into three sections: "Documents" presents a range of extant landmark artworks and events; "Fictions" presents newly commissioned creative text and image works; and "Theories" which opens with a essay by Hito Steyerl, includes a number of original essays addressing how blockchain is, and can be, used and thought. The book's release was accompanied by a newly commissioned digital portal developed by Design Informatics at Edinburgh University: using the unique "Finbook" portal, readers can interact with Financial bots based on chapters within the book as they "trade themselves". In their introduction to the book (c. 5000 words) Jones and Skinner place a focus on the "janus faced" quality of the blockchain, as a speculative tool with liberating potential, and an already hyper-financialised entity. They frame the book's unique importance as presenting an alternative range of discourse around the blockchain -- outside of from Fin-tech disciplines -- and express an intention that the contents of the book will open the way for newer and more progressive uses of this technology. This purpose has been widely referenced and acknowledged in reviews and profiles of the book. The book is on its third printed edition, and has been released as a free PDF available on the Torque Editions website. It has been reviewed and profiled in a number of specialist industry and public journals and magazines, including Art Review, Art Monthly, Hyperallergic, We Make Money Not Art, Rhizome and the 2P2Foundation. Further impact for the project includes launch events and invited talks at ArtReview in London, Foundation for Art and Creative Technology in Liverpool, Transmediale in Berlin and Institute of Network Cultures in Amsterdam, each of which Jones has prepared new material for. It was funded by the European Union via the State Machines project, The Culture Capital Exchange, and Arts Council England

    Algorithmic Authenticity: An Overview

    Get PDF
    What makes information feel true or compelling in our contemporary digital societies? This book brings together different disciplinary understandings of "authenticity" in order to find alternative ways to approach mis- and disinformation that go beyond contemporary fact-checking and its search for the "authentic" truth. Patterned under the algorithmic flows of digital capitalism, authenticity itself is subject to variation, iteration, and outside influence. Linking cross-disciplinary research on the history and practices of algorithmic authenticity points to new research questions to understand the impact of algorithmic authenticity on social life and its role in contemporary information disorder
    corecore