Skip to main content

Home/ Writing about Literature in the Digital Age/ Group items tagged Appropriation

Rss Feed Group items tagged

Audrey B

Electronic Civil Disobedience and the World Wide Web of Hacktivism: - 1 views

  • In the spring of 1998, a young British hacker known as "JF" accessed about 300 web sites and placed anti-nuclear text and imagery. He entered, changed and added HTML code. At that point it was the biggest political hack of its kind. Since then, and increasingly over the course of the year, there were numerous reports of web sites being accessed and altered with political content.
  • By no means was 1998 the first year of the browser wars, but it was the year when electronic civil disobedience and hacktivism came to the fore, evidenced by a front page New York Times article on the subject by the end of October. Since then the subject has continued to move through the media sphere.
  • computerized activism, grassroots infowar, electronic civil disobedience, politicized hacking, and resistance to future war
  • ...47 more annotations...
  • these five portals seem to provide a useful starting point for a more in-depth, yet to come, examination of the convergence of activism, art, and computer-based communication and media.
  • PeaceNet enabled - really for the first time - political activists to communicate with one another across international borders with relative ease and speed.
  • The international role of email communication, coupled to varying degrees with the use of the Fax machine, was highlighted in both the struggles of pro-democracy Chinese students and in broader trans-national movements that lead to the dissolution of the Soviet Union.
  • the role of international email communication in linking together the world.
  • an overarching dominant paradigm that privileges discourse, dialogue, discussion and open and free access.
  • So the first portal of Computerized Activism is important for understanding the roots of today’s extraparliamentarian,
  • Computerized activism, defined more purely as the use of the Internet infrastructure as a means for activists to communicate with one another, across international borders or not, is less threatening to power than the other types of uses we see emerging in which the Internet infrastructure is not only a means toward or a site for communication, but the Internet infrastructure itself becomes an object or site for action.
    • Audrey B
       
      Twitter, YouTube, other forms of social networking that provide communication within the Internet infrastructure to become an "object or site for action"...
  • Infowar here refers to a war of words, a propaganda war. Grassroots infowar is the first step, the first move away from the Internet as just a site for communication and the beginning of the transformation from word to deed.
  • emerge fully cognizant they are on a global stage, telepresent across borders, in many locations simultaneously.
  • a desire to push words towards action. Internet media forms become vehicles for inciting action as opposed to simply describing or reporting.
  • war of words
  • war of words
  • war of words
  • lists, newsgroups, discussion lists, and web sites
  • A primary distinction, then, between earlier forms of computerized activism and forms of grassroots infowar is in the degree of intensity. Coupled with that is the degree to which the participants are noticed and seen as a force.
  • in grassroots infowar comes the desire to incite action and the ability to do so at a global scale.
  • Within a matter of days there were protests and actions at Mexican consulates and embassies all over the world
  • At the end of 1997, news of the Acteal massacre in Chiapas, in which 45 indigenous people were killed, quickly spread through global pro-Zapatista Internet networks.
  • following there has been a shift, the beginning of the move toward accepting the Internet infrastructure as both a channel for communication and a site for action.
    • Audrey B
       
      channel for communication=computerized activism. a Site for action= grassroots infowar...Combining the two leads to Electronic Civil Disobedience
  • tactics of trespass and blockade from these earlier social movements and are experimentally applying them to the Internet.
  • A typical civil disobedience tactic has been for a group of people to physically blockade, with their bodies, the entranceways of an opponent's office or building or to physically occupy an opponent's office -- to have a sit-in.
  • utilizes virtual blockades and virtual sit-ins
  • an ECD actor can participate in virtual blockades and sit-ins from home, from work, from the university, or from other points of access to the Net.
  • a theoretical exploration of how to move protests from the streets onto the Internet.
  • street protest, on-the-ground disruptions and disturbance of urban infrastructure and they hypothesize how such practices can be applied to the Internet infrastructure
  • after the 1997 Acteal Massacre in Chiapas, there was a shift toward a more hybrid position that views the Internet infrastructure as both a means for communication and a site for direct action.
  • Electronic Civil Disobedience is the first transgression, making Politicized Hacking the second transgression and Resistance to Future War the third.
  • The realization and legitimization of the Internet infrastructure as a site for word and deed opens up new possibilities for Net politics, especially for those already predisposed to extraparliamentarian and direct action social movement tactics.
  • In early 1998 a small group calling themselves the Electronic Disturbance Theater had been watching other people experimenting with early forms of virtual sit-ins. The group then created software called FloodNet and on a number of occasions has invited mass participation in its virtual sit-ins against the Mexican government.
  • FloodNet to direct a "symbolic gesture" against an opponent's web site.
  • it launched a three-pronged FloodNet disturbance against web sites of the Mexican presidency, the Frankfurt Stock Exchange, and the Pentagon, to demonstrate international support for the Zapatistas, against the Mexican government, against the U.S. military, and against a symbol of international capital.
  • hacks into Mexican government web sites where political messages have been added to those sites.
  • the young British hacker named "JF" who hacked into around 300 web sites world wide and placed anti-nuclear imagery and text. This method has been tried by a number of groups.
  • while ECD actors don’t hide their names, operating freely and above board, most political hacks are done by people who wish to remain anonymous. It is also likely political hacks are done by individuals rather than by specific groups.
  • As already stated there are critiques aimed at the effectiveness and the appropriateness of cyber-protests. In terms of effectiveness, three closely related types of questions have appeared regarding political, tactical, and technical effectiveness. Concerning appropriateness there are ethical questions, that may be also considered as political questions, and of course there are legal questions. Some of the legal concerns raise issues of enforceability and prosecuteability.
  • Are these methods of computerized activism effective?
  • If the desired goal of hacktivism is to draw attention to particular issues by engaging in actions that are unusual and will attract some degree of media coverage, then effectiveness can be seen as being high.
  • Rather hacktivism appears to be a means to augment or supplement existing organizing efforts, a way to make some noise and focus attention.
  • a period of expansion, rather than contraction.
  • To judge blocking a web site, or clogging the pipelines leading up to a web site, is to take an ethical position. If the judgement goes against such activity, such an ethical position is likely to be derived from an ethical code that values free and open access to information.
  • While it is true that some forms of hacktivity are fairly easy to see as being outside the bounds of law - such as entering into systems to destroy data - there are other forms that are more ambiguous and hover much closer to the boundary between the legal and the illegal. Coupled with this ambiguity are other factors that tend to cloud the enforceability or prosecuteability of particular hacktivist offenses. Jurisdictional factors are key here. The nature of cyberspace is extraterritorial. People can easily act across geographic political borders, as those borders do not show themselves in the terrain. Law enforcement is still bound to particular geographic zones. So there is a conflict between the new capabilities of political actors and the old system to which the law is still attached. This is already beginning to change and legal frameworks, at the international level, will be mapped on to cyberspace.
  • It seems that hacktivity has met and will meet resistance from many quarters. It doesn't seem as if opposition to hacktivist ideas and practices falls along particular ideological lines either.
  • hacktivism represents a spectrum of possibilities that exists in some combination of word and deed.
  • What remains unclear about hacktivism emerges when we start to ask questions like: what does this mean and where is this going?
    • Audrey B
       
      Twitter. At 3:30 people log/hack on to Twitter and form blockades so that Iranians can voice their beliefs and feelings towards the government in 140 characters. People are also hacking and creating proxy sites that allow Iranians to get online.
  • Theorizing about grassroots or bottom-up Information Warfare doesn't nearly get as much attention as the dominant models and as a consequence there is not much written on the subject. 11 The case of the global pro-Zapatista networks of solidarity and resistance offers a point of departure for further examination of grassroots infowar. One feature of Zapatista experience over the course of the last 5 years is that it has been a war of words, as opposed to a prolonged military conflict. This is not to say there isn't a strong Mexican military presence in the state of Chiapas. Quite the contrary is true. But fighting technically ended on January 12, 1994 and since then there has been a ceasefire and numerous attempts at negotiation.12 What scholars, activists, and journalists, on both the left and the right, have said is that the Zapatistas owe their survival at this point largely to a war of words. This war of words, in part, is the propaganda war that has been successfully unleashed by Zapatista leaders like Subcommandante Marcos as well as non-Zapatista supporters throughout Mexico and the world. Such propaganda and rhetoric has, of course, been transmitted through more traditional mass communication means, like through the newspaper La Jornada. 13 But quite a substantial component of this war of words has taken place on the Internet. Since January 1, 1994 there has been an explosion of the Zapatista Internet presence in the forms of email Cc:
  • Because of the more secret, private, low key, and anonymous nature of the politicized hacks, this type of activity expresses a different kind of politics. It is not the politics of mobilization, nor the politics that requires mass participation. This is said not to pass judgement, but to illuminate that there are several important forms of direct action Net politics already being shaped.
  • hackers' desires to make information free.
  •  
    Concrete article for paper
becca_hay

The Effects of Family and Community Violence on Children - Annual Review of Psychology,... - 0 views

  • Children are potentially quite vulnerable to the effects of violence because violence exposure may alter the timing of typical developmental trajectories (Boney-McCoy & Finkelhor 1995). That is, violence initially may result in primary effects, such as anxiety, depression, or PTSD symptoms, which cause secondary reactions by disrupting children’s progression through age-appropriate developmental tasks. For example, exposure to violence in young children can result in regressive symptoms, such as increased bedwetting, decreased verbalization, or separation anxiety (Osofsky 1995). These symptoms secondarily may affect children’s socialization skills or ability to concentrate in school. Moreover, at a time when children may have difficulty with typical developmental tasks, exposure to violence can result in having to acknowledge and cope with adult issues. As Garbarino and colleagues note, “in Western culture, childhood is regarded as a period of special protection and rights” (1992:1). The home and the neighborhood, generally considered the primary safe havens for the child, lose those protective and comforting qualities in the aftermath of family or neighborhood violence
Gideon Burton

Academic Evolution: Scholarly Communications will Transform via Cybermetrics - 3 views

    • Gideon Burton
       
      Note the features of this online writing: -situates itself relative to ongoing discussion (via explicit reference and links) -contains an explicit thesis statement early in the post -includes headings to make subsections easier to navigate and the longer post easier to read -includes appropriate images to draw interest, break up the text, and illustrate the argument -includes mild use of formatting options for emphasis (highlighting in this case) -includes hyperlinks to references -quotes and cites both traditional and online sources (uses the blockquote formatting for a longer quote) -links not only to sources for quotations, but to relevant entities or organizations, or to discussions of the issue (maybe less scholarly, but timely and relevant) -rhetorically, it lays out a story about the past, situates a phenomenon in the present, and discusses the impact for the future of these ideas within our more mediated digital environment -includes relevant tags -has received comments from others (due in part to the author "pinging" or announcing that he'd published a post on his blog via Twitter or other social media
Ben M

The Nameless Mormon Blogosphere | Times & Seasons - 1 views

  • Latter Day Blogs is pretty good, but the strength of St. Blog’s is that it suggests a place in which this online community exists.
  • They used to refer to on-line LDS posters as members of the virtual ward.
  • Some object on the grounds that a choir is a better analogy than a space. Note that the founding metaphor of the blog community is spacial–the blogosphere. Note also that a choir is rather more directed and harmonious than we expect to be, that admission to it is controlled by the choir whereas admission to the sacred precincts of a tabernacle is at least in conception controlled by God. While singing ought to be an act of praise, we tend to think of it as entertainment, whereas we are always aware of our presence before God in a tabernacle. Getting down to specifics, the Mormon Tabernacle Choir is a somewhat unhip public relations gesture. It serves to present an friendly face to an antipathetic world, and is thus at root defensive. The tabernacle, on the other hand, is the sacred space that conceptually contains the world; it is at root expansive.
  • ...1 more annotation...
  • I thought about that, Jim. Here’s my response: first, if we were calling ourselves the Tabernacle I think I’d object. Bloggernacle tones down the sacred meaning enough, I think, while still keeping some of those overtones of acting before the eyes of God. Also, in Mormonism, the Tabernacle isn’t exactly a temple. It’s a holy building and holy space, true, but one in which musical concerts and Journal of Discourse talks on farming methods can still be appropriate. It’s almost the Mormon Public Square.
  •  
    This is the blog post where the "bloggernacle" got its name back in 2004
Weiye Loh

Why I Am Teaching a Course Called "Wasting Time on the Internet" - The New Yorker - 0 views

  • The vast amount of the Web’s language is perfect raw material for literature. Disjunctive, compressed, decontextualized, and, most important, cut-and-pastable, it’s easily reassembled into works of art.
  • What they’ve been surreptitiously doing throughout their academic career—patchwriting, cutting-and-pasting, lifting—must now be done in the open, where they are accountable for their decisions. Suddenly, new questions arise: What is it that I’m lifting? And why? What do my choices about what to appropriate tell me about myself? My emotions? My history? My biases and passions? The critiques turn toward formal improvement: Could I have swiped better material? Could my methods in constructing these texts have been better? Not surprisingly, they thrive. What I’ve learned from these years in the classroom is that no matter what we do, we can’t help but express ourselves.
  •  
    "Web surfing as a form of self-expression. Every click is indicative of who we are: indicative of our likes, our dislikes, our emotions, our politics, our world view. Of course, marketers have long recognized this, but literature hasn't yet learned to treasure-and exploit-this situation. The idea for this class arose from my frustration with reading endless indictments of the Web for making us dumber. I've been feeling just the opposite. We're reading and writing more than we have in a generation, but we are reading and writing differently-skimming, parsing, grazing, bookmarking, forwarding, retweeting, reblogging, and spamming language-in ways that aren't yet recognized as literary."
Weiye Loh

Balderdash: Anne Rice on writing about Others - 0 views

  •  
    "The bottom line is, you go where the intensity is for you as a writer; you give birth to characters for deep, complex reasons. And this should never be politicized by anyone. Your challenge is to do a fine and honest and effective job. Don't ever let anyone insist you give up without even trying. Two of the greatest novels about women that I've ever read, Anna Karenina and Madame Bovary were written by men. One of the finest novels about men that I've ever read, The Last of the Wine, was written by a woman. That was Mary Renault. And her novel, The Persian Boy, about a Persian eunuch is a classic. The vital literature we possess today was created by men and women of immense imagination, personal courage and personal drive. Ignore all attempts to politicize or police your imagination and your literary ambition."
  •  
    It's actually pretty cool, and I found out about a lot of interesting literature on a number of subjects, including geography. I discovered an cheap essay writing service https://order.studentshare.org/ , which you may peruse, study, and, of course, strive to improve as much as possible. I already know that these articles are superb, and that you will gain a lot from them, both academically and in terms of your personal development in this or that field.
  •  
    To write even an ordinary essay is not enough effort. And at the university there are quite voluminous tasks. So I decided to turn for help with capstone project https://www.capstoneproject.net/ and my dissertation. I can imagine if I was given the task to write a book. It would be a nightmare. I wouldn't have done it.
1 - 6 of 6
Showing 20 items per page