32,907 research outputs found

    Rethinking affordance

    Get PDF
    n/a – Critical survey essay retheorising the concept of 'affordance' in digital media context. Lead article in a special issue on the topic, co-edited by the authors for the journal Media Theory

    Understanding the social in a digital age

    Get PDF
    Datafication, algorithms, social media and their various assemblages enable massive connective processes, enriching personal interaction and amplifying the scope and scale of public networks. At the same time, surveillance capitalists and the social quantification sector are committed to monetizing every aspect of human communication, all of which threaten ideal social qualities, such as togetherness and connection. This Special Issue brings together a range of voices and provocations around ‘the social’, all of which aim to critically interrogate mediated human connection and their contingent socialities. Conventional methods may no longer be adequate, and we must rethink not only the fabric of the social but the very tools we use to make sense of our changing social formations. This Special Issue raises shared concerns with what the social means today, unpicking and rethinking the seams between digitization and social life that characterize today’s digital age

    New media art, participation, social engagement and public funding

    Get PDF
    This article investigates the current condition of new media art in Britain, examining how cuts to arts funding have affected the art form's infrastructure and capacity for survival and growth. It considers media art in relation to other contemporary art practices, particularly in relation to its inherent capacity for enhanced and sustained user participation, and asks why it is that, though government agendas favour participatory art as ‘socially useful', media art appears to have been hit harder than other art forms. The article puts forward four reasons that could explain this paradox, and argues the importance of the survival of new media art, not as isolated practices invited to exist within mainstream contexts, but as a distinct art form

    Experimental and Creative Approaches to Collecting and Distributing New Media Art within Regional Arts Organisations

    Get PDF
    This article is an overview of preliminary research undertaken for the creation of a framework for collecting and distributing new media art within regional art galleries in the U.K. From the 1960s, artists have experimented using computers and software as production tools to create artworks ranging from static, algorithmic drawings on paper to installations with complex, interactive and process-oriented behaviours. The art-form has evolved into multiple strands of production, presentation and distribution. But are we, as collectors, researchers, artists and enthusiasts facing an uncertain future concerning the integration of new media art into institutional cultural organisations? Recently, concerns have been raised by curators regarding the importance of learning how to collect new media art if there is to be any hope of preserving the artworks as well as their histories. Traditional collections management approaches must evolve to take into account the variable characteristics of new media artworks. As I will discuss in this article, although regarded as a barrier to collecting new media artworks, artists and curators at individual institutions have recently taken steps to tackle curatorial and collections management activities concerning the often unpredictable and unstable behaviours of new media artworks by collaboration and experimentation. This method has proved successful with some mainstream, university and municipal galleries prior to acquiring or commissioning new artworks into their collections. This paper purports that by collaboration, experimentation and the sharing of knowledge and resources, these concerns may be conquered to preserve and make new media art accessible for future generations to enjoy and not to lament over its disappearance

    Rethinking De-Perimeterisation: Problem Analysis And Solutions

    Get PDF
    For businesses, the traditional security approach is the hard-shell model: an organisation secures all its assets using a fixed security border, trusting the inside, and distrusting the outside. However, as technologies and business processes change, this model looses its attractiveness. In a networked world, “inside” and “outside” can no longer be clearly distinguished. The Jericho Forum - an industry consortium part of the Open Group – coined this process deperimeterisation and suggested an approach aimed at securing data rather than complete systems and infrastructures. We do not question the reality of de-perimeterisation; however, we believe that the existing analysis of the exact problem, as well as the usefulness of the proposed solutions have fallen short: first, there is no linear process of blurring boundaries, in which security mechanisms are placed at lower and lower levels, until they only surround data. To the contrary, we experience a cyclic process of connecting and disconnecting of systems. As conditions change, the basic trade-off between accountability and business opportunities is made (and should be made) every time again. Apart from that, data level security has several limitations to start with, and there is a big potential for solving security problems differently: by rearranging the responsibilities between businesses and individuals. The results of this analysis can be useful for security professionals who need to trade off different security mechanisms for their organisations and their information systems

    Using assignment data to analyse a blended information literacy intervention: a quantitative approach

    Get PDF
    This research sought to determine whether a blended information literacy learning and teaching intervention could statistically significantly enhance undergraduates’ information discernment compared to standard face-to-face delivery. A mixture of face-to-face and online activities, including online social media learning, was used. Three interventions were designed to develop the information literacies of first-year undergraduates studying Sport and Exercise at Staffordshire University and focused on one aspect of information literacy: the ability to evaluate source material effectively. An analysis was devised where written evaluations of found information for an assessment were converted into numerical scores and then measured statistically. This helped to evaluate the efficacy of the interventions and provided data for further analysis. An insight into how the information literacy pedagogical intervention and the cognitive processes involved in enabling participants to interact critically with information is provided. The intervention which incorporated social media learning proved to be the most successful learning and teaching approach. The data indicated that undergraduate students’ information literacy can be developed. However, additional long-term data is required to establish whether this intervention would have a lasting impact

    After the Gold Rush: The Boom of the Internet of Things, and the Busts of Data-Security and Privacy

    Get PDF
    This Article addresses the impact that the lack of oversight of the Internet of Things has on digital privacy. While the Internet of Things is but one vehicle for technological innovation, it has created a broad glimpse into domestic life, thus triggering several privacy issues that the law is attempting to keep pace with. What the Internet of Things can reveal is beyond the control of the individual, as it collects information about every practical aspect of an individual’s life, and provides essentially unfettered access into the mind of its users. This Article proposes that the federal government and the state governments bend toward consumer protection while creating a cogent and predictable body of law surrounding the Internet of Things. Through privacy-by-design or self-help, it is imperative that the Internet of Things—and any of its unforeseen progeny—develop with an eye toward safeguarding individual privacy while allowing technological development

    Control responsibility : the discursive construction of privacy, teens, and Facebook in Flemish newspapers

    Get PDF
    This study explores the discursive construction of online privacy through a critical discourse analysis of Flemish newspapers' coverage of privacy, teens, and Facebook between 2007 and 2018 to determine what representation of (young) users the papers articulate. A privacy-as-control discourse is dominant and complemented by two other discourses: that of the unconcerned and reckless teenager and that of the promise of media literacy. Combined, these discourses form an authoritative language on privacy that we call "control responsibility." Control responsibility presents privacy as an individual responsibility that can be controlled and needs to be learned by young users. We argue that the discourses contribute to a neoliberal rationality and have a disciplinary effect that strengthens various forms of responsibilization

    Privacy, Visibility, Transparency, and Exposure

    Get PDF
    This essay considers the relationship between privacy and visibility in the networked information age. Visibility is an important determinant of harm to privacy, but a persistent tendency to conceptualize privacy harms and expectations in terms of visibility has created two problems. First, focusing on visibility diminishes the salience and obscures the operation of nonvisual mechanisms designed to render individual identity, behavior, and preferences transparent to third parties. The metaphoric mapping to visibility suggests that surveillance is simply passive observation, rather than the active production of categories, narratives, and, norms. Second, even a broader conception of privacy harms as a function of informational transparency is incomplete. Privacy has a spatial dimension as well as an informational dimension. The spatial dimension of the privacy interest, which the author characterizes as an interest in avoiding or selectively limiting exposure, concerns the structure of experienced space. It is not negated by the fact that people in public spaces expect to be visible to others present in those spaces, and it encompasses both the arrangement of physical spaces and the design of networked communications technologies. U.S. privacy law and theory currently do not recognize this interest at all. This essay argues that they should
    • 

    corecore