In: Computer Science
7 The Internet Bill of Rights
8 The Yes Men
9 Theseus
10 Title II (1934 Telecommunications Act)
11 Vannevar Bush
12 Viewer Society
13 Virtual Sit-in
14 Memex
15 Immediacy / Hypermediacy
16 IMP
17 Information bubble
18 Floodnet
19 Cultural jamming
answer questions
1 What is/are materiality of the digital? Discuss how materiality of the digital informs current debates on the Internet. (Brown, Starosielski, Holt & Vonderau)
2 How do digital media contribute to contemporary forms of surveillance? What are the events that have shaped digital surveillance? (Lyon, Andrejevic)
Question 7)
Answer:
The Internet Bill of Rights is comprehensive. Its main goals are to
make sure net neutrality, protection of citizens from warrantless
government mass surveillance, and providing more control to
consumers and users over their personal data. The Internet Bill of
Rights is necessary so it safeguards consumers or users making sure
fairness, human dignity, and openness. It thus has six main
principles:
* The right of a user or a consumer to universal web access.
* The right of a user or a consumer to net neutrality.
* The right of a user or a consumer so they are free from the
metadata collection carried out without any warrant.
* The right of a user or consumer for disclosing the nature,
amount, and dates of secret government data requests.
* The right of a user or consumer of him/her being fully informed
of the scope of use of data.
* The right of a user or consumer of him/her being fully informed
as and when there are changes of control over data.
Question 13)
Answer:
A virtual sit-in is an electronic civil disobedience form. Its name
is derived from the sit-ins that were popular in the 1960s during
the civil rights movement. It makes an attempt for recreating that
same action, but digitally using a Distributed Denial-of-Service
attack (DDOS). Activists in hundreds all, attempt for accessing a
target or victim's website all, at the same time and repetitively,
during a virtual sit-in. If successful, it will make the target or
victim's website run slowly, rendering webpages slowly, or even
collapse the website entirely, thus making it unavailable for
others, and preventing everyone else from accessing it.
Question 17)
Answer:
An information bubble, which is also called a media bubble or
filter bubble is basically a pop-up image, graphics, video, or
window on a website providing supplementary information. The
gallery website would have information bubbles with advertisements,
offers, banners, artist biographies, events, and many other
interesting facts. These would appear when a user hovers his
computer mouse pointer over a related another advertisement, offer,
event, banner, or painting. An example, an information bubble with
author biographies when a user is hovering over a book or reading
it online. It is a state of intellectual isolation. It supposedly
results from personalized searches when an algorithm of a website
selectively guesses and predicts what information a user may want
or like to see next depending on the information about the user,
his demographic details, such as location, his online activities,
and behavior, his previous searches made, visits to websites, or
past click-behavior.
Question 18)
Answer:
FloodNet is basically a computer-based program. It was created by
the Electronic Disturbance theater company's members. It is a flood
warning system. It was developed as a device. It was software
developed for orchestrating collective electronic civil
disobedience, indulging in the disruption of access to the targeted
or victim's website flooding the host server with requests for that
website.
FloodNet was a tool meant for empowered net citizens for participating and indulging in non-violent electronic civil disobedience digital action in solidarity with the Zapatistas.
Question 19)
Answer:
Culture jamming is a form of activism carried out politically and
socially . It is a performative or a visual protest tactic. It is
carried out through hoax news stories, fake advertisements,
imitation or parody of company product labels and logos, computer
hacking, etc., drawing attention to and simultaneously subverting
the media, governments, and large corporations power for distorting
and controlling the information they provide to the public for
promoting militarism, consumerism, etc.