1,700 research outputs found

    Videogame art: remixing, reworking and other interventions

    Get PDF
    This chapter explores some of the areas of intersection between videogames and both digital and non-digital art practice. By looking at examples of art practice drawn from videogames, it outlines some of the categories and so provides an overview of this area, placing it within the wider context of contemporary and historical art practice. The chapter explores the tendency for mucyh of this work to have elements of subversion or "détournement" whilst also identifying areas of tension in the appropriation of videogames as material for art practice

    Can Cyberspace Be Just?

    Get PDF
    The capacity and availability of computers has been increasing exponentially, and people are connected with others around the world in ways unparalleled in history. The web is J.S. Mill's dream machine to the extent that it enhances people's freedom of expression, pursuit of projects, and interaction with others. But, freedom can come at a cost to justice, and we need to be cautious when confronting concentrations of power and limitations of access in cyberspace as well as understanding some special features of cyberspace such as the invisibility factor and the unreality factor. Ultimately, the freedom of cyberspace may provide the best defense of justice in cyberspace

    Gender as a Trouble in Angela Carter's the Nights at the Circus

    Get PDF
    This paper will focus on Judith Butler's work on gender and performativity. It will use Butler's example of drag queen and gender parody as a way to understand the reality of female gender from unreal one. It will explore that the reality of gender is not fixed as we generally assume it to be and the purpose to this paper is to expose the weakness of gender reality to create a true model of gender. This essay is examined the works of Angela Carter. The novel under the study is Nights at the Circus (1984) Understood through the lens of Butler’s theory of gender performativity, Fevvers, the main    character of the novel dramatizes the idea that gender identity is not fixed in nature but it relies on culturally constructed signification. He will emphasize that gender is something that is attached onto the body through socialization, and not something that is ?xed at birth. Keywords: Gender, Performativity, Carter, Butler, Identit

    THE ANALYSIS OFCYBER CRIME THREAT RISK MANAGEMENT TO INCREASE CYBER DEFENSE

    Get PDF
    Abstrak – Kemajuan teknologi dan informasi menimbulkan ancaman baru di ruang siber yakni kejahatan siber. Kejahatan siber merupakan kejahatan yang lahir sebagai suatu dampak negatif dari perkembangan aplikasi pada internet. Dalam menganalisis dampak kejahatan siber terhadap pertahanan sebuah negara, diperlukan identifikasi manajemen risiko yang dapat mengetahui seberapa besar probabilitas dan konsekuensi yang ditimbulkan dari kejahatan siber. Risiko yang dihadapi dalam mengatasi ancaman kejahatan siber tidak kalah dengan perang konvensional. Hal ini menyebabkan risiko yang diidentifikasi harus bisa menghasilkan strategi pertahanan negara dalam menghadapi ancaman kejahatan siber.Kata kunci: kejahatan siber, manajemen risiko, strategi, pertahanan negaraAbstract – Increasing technology and information caused new threat in cyberspace called cyber crime. Cyber crime is a crime that emerge as a negative impact of applications development on the internet. In analyzing the impact of cyber crime towards a state defense, it is necessary to identify risk management that can know how big the probability and consequences caused by cyber crime. The risks faced in overcoming the threat of cyber crime is not inferior to conventional wars. This causes the identified risks has to be able to produce a state defense strategy in the face of cyber crime threat.Keywords: cyber crime, risk management, strategy, state defens

    The New Performer

    Get PDF

    The Amorphous Nature of Hackers: An Exploratory Study

    Get PDF
    In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s perception of hackers? To answer these questions in a systematic manner, we created two hypotheses. The first hypothesis tested participants’ response in 9 scenarios whereas the second hypothesis tested the participants’ response based on their scores on the Neuroticism-Extraversion-Openness Inventory (NEO) personality subscale. In brief, our results were indicative of how personality traits could influence perceptions of hackers and hacktivism. Possibilities for future research and implications for legal and criminal justice policy are discussed

    Between law and the nation state:Novel representations of the refugee

    Get PDF
    Given the degraded profile of the refugee in contemporary discourse, it is tempting to seek alternatives from a rich tradition of literary tropes of exile. However, this article argues that the romanticized figure of the literary exile ends up denying, albeit in positive terms, a genuine refugee voice, as much as the current impersonal hegemonic concept of the refugee as found in law. Ultimately, the spell in which refugees find themselves trapped today can be broken only by opening up a space of politics in which the refugee herself can be heard
    • …
    corecore