SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
28	
  Mar,	
  2017	
  @	
  Aarhus	
  University	
  
Winnie	
  Soon	
  |	
  siusoon.net	
  
	
  
Execu?ng	
  Tasks:	
  Spam	
  as	
  Automated	
  Agents	
  
What	
  is	
  par?cipa?on?	
  
Google	
  image	
  search	
  as	
  of	
  22	
  Mar	
  2017	
  	
  
What	
  is	
  par?cipa?on?	
  
Google	
  image	
  search	
  as	
  of	
  22	
  Mar	
  2017	
  	
  
the	
  ac?on	
  of	
  taking	
  part	
  in	
  something	
  
Involvement	
  |	
  taking	
  part	
  |	
  engagement	
  |	
  contribu?on	
  …	
  
[W]hat	
  was	
  trash	
  becomes	
  things,	
  what	
  was	
  an	
  
instrument	
  becomes	
  a	
  par?cipant,	
  what	
  was	
  
foodstuff	
  becomes	
  agent,	
  what	
  was	
  
adaman?ne	
  becomes	
  intensity.	
  We	
  see	
  how	
  an	
  
animal,	
  plant,	
  mineral,	
  or	
  ar?fact	
  can	
  
some?mes	
  catalyze	
  a	
  public,	
  and	
  we	
  might	
  
then	
  see	
  how	
  to	
  devise	
  more	
  effec?ve	
  
[experimental]	
  tac?cs…	
  
	
  
	
   	
   	
   	
   	
  (BenneU	
  2010,	
  p.	
  107)	
  
an	
  actant	
  is	
  a	
  source	
  of	
  ac?on	
  that	
  can	
  be	
  
either	
  human	
  or	
  nonhuman;	
  it	
  is	
  that	
  which	
  
has	
  efficacy,	
  can	
  do	
  things,	
  has	
  sufficient	
  
coherence	
  to	
  make	
  a	
  difference,	
  produce	
  
effects,	
  alter	
  course	
  of	
  events.	
  
	
  
	
   	
   	
   	
   	
  	
  
	
  	
  	
  (BenneU	
  2010,	
  p.	
  viii)	
  
SPAM	
  Email	
  
Sent	
  by	
  Gary	
  Thuerk,	
  a	
  marketer	
  for	
  the	
  Digital	
  Equipment	
  Corpora?on,	
  in	
  1978	
  
et	
  citat	
  
	
  
ngelige	
  	
  
t	
  vælge	
  
ayout’	
  i	
  	
  
menuen	
  
The	
  term	
  spamming	
  was	
  applied	
  to	
  a	
  few	
  different	
  
behaviours.	
  One	
  was	
  to	
  flood	
  the	
  computer	
  with	
  too	
  
much	
  data	
  in	
  order	
  to	
  crash	
  it.	
  Another	
  was	
  to	
  “spam	
  
the	
  database”	
  by	
  having	
  a	
  program	
  create	
  a	
  huge	
  
number	
  of	
  objects,	
  rather	
  than	
  crea?ng	
  them	
  by	
  hand.	
  	
  
	
  
	
   	
   	
   	
   	
  	
  	
  (Templeton,	
  n.d)	
  
Digital	
  
Consump?on	
  
Spam	
  
Produc?on	
  
Muta?ng	
  
iden??es	
  
[SITE	
  OF	
  YOU]	
  
	
  
	
  
Hey	
  I	
  like	
  your	
  page,	
  but	
  you	
  have	
  no	
  control!	
  
	
  
Hi,	
  my	
  name	
  is	
  Yvonne	
  and	
  I'm	
  the	
  webmaster	
  of	
  
“Crack	
  the	
  Code."	
  
	
  
It’s	
  is	
  open	
  to	
  all	
  and	
  is	
  fun	
  way	
  to	
  substan?al	
  money.	
  
	
  
This	
  is	
  Yvonne	
  Zain	
  Bin	
  Abidin.	
  	
  
	
  
Let’s	
  collaborate	
  together.	
  I	
  made	
  this	
  to	
  help.	
  	
  
[JUST	
  RENT	
  THE	
  DATA]	
  
	
  
Can	
  it	
  forensic?	
  	
  
The	
  apple	
  is	
  too	
  full?	
  	
  
Carrier	
  loca?ons	
  arise	
  from	
  what?	
  
When	
  was	
  it	
  sent?	
  	
  
Which	
  encrypted	
  customers?	
  	
  
IQ's	
  up	
  the	
  what?	
  	
  
	
  
Configure	
  this.	
  Just	
  rent	
  the	
  data.	
  
(Berry	
  2011:17)	
  
	
  
“We	
  wander	
  around	
  the	
  network,	
  	
  seamlessly	
  and	
  mindlessly,	
  and	
  you	
  wanted	
  to	
  trash	
  us,	
  
but	
  we	
  are	
  s?ll	
  everywhere.	
  We	
  are	
  just	
  the	
  children	
  of	
  your	
  economic	
  and	
  social	
  system,	
  
but	
  you	
  ignore	
  and	
  avoid	
  us.	
  	
  
We	
  are	
  not	
  dead,	
  we	
  write,	
  we	
  create.”	
  
Sending…	
  
Receiving…	
  
Computer	
  code	
  is	
  not	
  solely	
  technical	
  though,	
  and	
  must	
  be	
  
understood	
  with	
  respect	
  to	
  both	
  the	
  'cultures	
  of	
  souware'	
  that	
  
produce	
  it,	
  but	
  also	
  the	
  cultures	
  of	
  consump?on	
  that	
  surround	
  it	
  
(Berry	
  2011:17)	
  
	
  
(Berry	
  2011:17)	
  
	
  
Sending…	
  
Souware	
  Art	
  Prac?ce:	
  
	
  
-­‐  Make	
  inquiries	
  
-­‐  Express	
  crea?ve	
  thoughts	
  
-­‐  Perform	
  interven?on	
  
-­‐  See/imagine	
  phenomena	
  in	
  new	
  ways	
  
-­‐  Invite	
  unfinished	
  thinking	
  
-­‐  Inform	
  academic	
  wri?ng	
  
-­‐  Cons?tute	
  research	
  outcome	
  	
  
	
  
et	
  citat	
  
	
  
ngelige	
  	
  
t	
  vælge	
  
ayout’	
  i	
  	
  
menuen	
  
Ar?s?c	
  prac?ce	
  is	
  not	
  only	
  the	
  result	
  of	
  the	
  research,	
  
but	
  also	
  its	
  methodological	
  vehicle,	
  when	
  the	
  research	
  
unfolds	
  in	
  and	
  through	
  the	
  acts	
  of	
  crea?ng	
  and	
  
performing.	
  
	
  
(Borgdorff	
  2011,	
  p.	
  46)	
  	
  
Opportuni?es:	
  	
  
	
  
-­‐  How	
  to	
  inves?gate	
  infrastructure/technical	
  systems?	
  	
  
-­‐  How	
  may	
  we	
  understand	
  cultural	
  system	
  via	
  reading/wri?ng	
  code?	
  
-­‐  As	
  an	
  artwork,	
  how	
  to	
  get	
  a	
  balance	
  of	
  control	
  and	
  make	
  sense	
  of	
  
the	
  use	
  of	
  language?	
  	
  
	
  
Thank	
  You	
  
Winnie	
  Soon	
  |	
  siusoon.net	
  

Weitere ähnliche Inhalte

Ähnlich wie Executing tasks: Spam as Automated Agents

Part 1 Information networking as technology tools, uses, and soci.docx
Part 1  Information networking as technology tools, uses, and soci.docxPart 1  Information networking as technology tools, uses, and soci.docx
Part 1 Information networking as technology tools, uses, and soci.docxherbertwilson5999
 
Human-machine Inter-agencies
Human-machine Inter-agenciesHuman-machine Inter-agencies
Human-machine Inter-agenciesmo-seph
 
Web Science Session 2: Social Media
Web Science Session 2: Social MediaWeb Science Session 2: Social Media
Web Science Session 2: Social MediaStefanie Panke
 
Ljubljana 15.10.2019
Ljubljana 15.10.2019Ljubljana 15.10.2019
Ljubljana 15.10.2019Verke
 
Social Machines Oxford Hendler
Social Machines Oxford HendlerSocial Machines Oxford Hendler
Social Machines Oxford HendlerJames Hendler
 
The Role of IT for Social Change
The Role of IT for Social ChangeThe Role of IT for Social Change
The Role of IT for Social ChangeNetcetera
 
The Ethics of Structured Information
The Ethics of Structured InformationThe Ethics of Structured Information
The Ethics of Structured InformationNicholas Poole
 
Assignment presentation final 130222
Assignment presentation final 130222Assignment presentation final 130222
Assignment presentation final 130222pauline_s
 
Corso pisa-2 dh-2017
Corso pisa-2 dh-2017Corso pisa-2 dh-2017
Corso pisa-2 dh-2017Luca De Biase
 
Be here when - communities and how they use technology to design themselves
Be here when - communities and how they use technology to design themselvesBe here when - communities and how they use technology to design themselves
Be here when - communities and how they use technology to design themselvesJohn David Smith
 
TL_Thompson.pptx.ppt
TL_Thompson.pptx.pptTL_Thompson.pptx.ppt
TL_Thompson.pptx.pptRGowthamRao
 
Learning with Technology - week 2 lecture-social media
Learning with Technology - week 2 lecture-social mediaLearning with Technology - week 2 lecture-social media
Learning with Technology - week 2 lecture-social mediaCharles Darwin University
 
Computer science for children
Computer science for childrenComputer science for children
Computer science for childrenPaul Burdell
 
The World Is The Screen
The World Is The ScreenThe World Is The Screen
The World Is The ScreenAndrew Hinton
 

Ähnlich wie Executing tasks: Spam as Automated Agents (20)

Part 1 Information networking as technology tools, uses, and soci.docx
Part 1  Information networking as technology tools, uses, and soci.docxPart 1  Information networking as technology tools, uses, and soci.docx
Part 1 Information networking as technology tools, uses, and soci.docx
 
Human-machine Inter-agencies
Human-machine Inter-agenciesHuman-machine Inter-agencies
Human-machine Inter-agencies
 
Web Science Session 2: Social Media
Web Science Session 2: Social MediaWeb Science Session 2: Social Media
Web Science Session 2: Social Media
 
Essay Information
Essay InformationEssay Information
Essay Information
 
In the wake
In the wakeIn the wake
In the wake
 
Ljubljana 15.10.2019
Ljubljana 15.10.2019Ljubljana 15.10.2019
Ljubljana 15.10.2019
 
Social Machines Oxford Hendler
Social Machines Oxford HendlerSocial Machines Oxford Hendler
Social Machines Oxford Hendler
 
The Role of IT for Social Change
The Role of IT for Social ChangeThe Role of IT for Social Change
The Role of IT for Social Change
 
Community as an Asset
Community as an AssetCommunity as an Asset
Community as an Asset
 
The Ethics of Structured Information
The Ethics of Structured InformationThe Ethics of Structured Information
The Ethics of Structured Information
 
Assignment presentation final 130222
Assignment presentation final 130222Assignment presentation final 130222
Assignment presentation final 130222
 
Essays About Internet
Essays About InternetEssays About Internet
Essays About Internet
 
Big6 intro
Big6 introBig6 intro
Big6 intro
 
Corso pisa-2 dh-2017
Corso pisa-2 dh-2017Corso pisa-2 dh-2017
Corso pisa-2 dh-2017
 
Be here when - communities and how they use technology to design themselves
Be here when - communities and how they use technology to design themselvesBe here when - communities and how they use technology to design themselves
Be here when - communities and how they use technology to design themselves
 
TL_Thompson.pptx.ppt
TL_Thompson.pptx.pptTL_Thompson.pptx.ppt
TL_Thompson.pptx.ppt
 
Learning with Technology - week 2 lecture-social media
Learning with Technology - week 2 lecture-social mediaLearning with Technology - week 2 lecture-social media
Learning with Technology - week 2 lecture-social media
 
Cs unplugged os_2015_v3.1
Cs unplugged os_2015_v3.1Cs unplugged os_2015_v3.1
Cs unplugged os_2015_v3.1
 
Computer science for children
Computer science for childrenComputer science for children
Computer science for children
 
The World Is The Screen
The World Is The ScreenThe World Is The Screen
The World Is The Screen
 

Mehr von Aarhus University

Unerasable Characters in Machine Learning
Unerasable Characters in Machine LearningUnerasable Characters in Machine Learning
Unerasable Characters in Machine LearningAarhus University
 
Humanistic and Computational Thinking Through Practice
Humanistic and Computational Thinking Through PracticeHumanistic and Computational Thinking Through Practice
Humanistic and Computational Thinking Through PracticeAarhus University
 
n.a.g/the inexecutable query
n.a.g/the inexecutable queryn.a.g/the inexecutable query
n.a.g/the inexecutable queryAarhus University
 
What is Coding in University in Practice?
What is Coding in University in Practice?What is Coding in University in Practice?
What is Coding in University in Practice?Aarhus University
 
Screen shots : Critical Codes of Capture
Screen shots : Critical Codes of CaptureScreen shots : Critical Codes of Capture
Screen shots : Critical Codes of CaptureAarhus University
 
Why Code? Why Program? Why Create?
Why Code? Why Program? Why Create? Why Code? Why Program? Why Create?
Why Code? Why Program? Why Create? Aarhus University
 
Digital Surveillance in China: From the Great Firewall to the Social Credit S...
Digital Surveillance in China: From the Great Firewall to the Social Credit S...Digital Surveillance in China: From the Great Firewall to the Social Credit S...
Digital Surveillance in China: From the Great Firewall to the Social Credit S...Aarhus University
 
Executing Queries as a form of artistic practice
Executing Queries as a form of artistic practiceExecuting Queries as a form of artistic practice
Executing Queries as a form of artistic practiceAarhus University
 
Interfacing with questions: The unpredictability of live queries in the work...
Interfacing with questions:  The unpredictability of live queries in the work...Interfacing with questions:  The unpredictability of live queries in the work...
Interfacing with questions: The unpredictability of live queries in the work...Aarhus University
 
Microtemporality: At The Time When Loading-in-progress
Microtemporality: At The Time When Loading-in-progressMicrotemporality: At The Time When Loading-in-progress
Microtemporality: At The Time When Loading-in-progressAarhus University
 
Software art and design: computational thinking through programming practice ...
Software art and design: computational thinking through programming practice ...Software art and design: computational thinking through programming practice ...
Software art and design: computational thinking through programming practice ...Aarhus University
 
Network materiality and temporality: Things flow 'non-continuously' in networ...
Network materiality and temporality: Things flow 'non-continuously' in networ...Network materiality and temporality: Things flow 'non-continuously' in networ...
Network materiality and temporality: Things flow 'non-continuously' in networ...Aarhus University
 
Discussing Software through the art of the Hong Kong Umbrella Movement
Discussing Software through the art of the Hong Kong Umbrella MovementDiscussing Software through the art of the Hong Kong Umbrella Movement
Discussing Software through the art of the Hong Kong Umbrella MovementAarhus University
 
Nonhuman Participation: a materialist perspective on execution from agency o...
Nonhuman Participation: a materialist perspective on execution from agency o...Nonhuman Participation: a materialist perspective on execution from agency o...
Nonhuman Participation: a materialist perspective on execution from agency o...Aarhus University
 
Artist Talk: From net art to software art
Artist Talk: From net art to software artArtist Talk: From net art to software art
Artist Talk: From net art to software artAarhus University
 
Collaborative and Collective [Artistic] Research
Collaborative and Collective [Artistic] ResearchCollaborative and Collective [Artistic] Research
Collaborative and Collective [Artistic] ResearchAarhus University
 
Net Art: Data Hacking, Coding and Critical Thinking
Net Art: Data Hacking, Coding and Critical ThinkingNet Art: Data Hacking, Coding and Critical Thinking
Net Art: Data Hacking, Coding and Critical ThinkingAarhus University
 

Mehr von Aarhus University (20)

Unerasable Characters in Machine Learning
Unerasable Characters in Machine LearningUnerasable Characters in Machine Learning
Unerasable Characters in Machine Learning
 
Humanistic and Computational Thinking Through Practice
Humanistic and Computational Thinking Through PracticeHumanistic and Computational Thinking Through Practice
Humanistic and Computational Thinking Through Practice
 
n.a.g/the inexecutable query
n.a.g/the inexecutable queryn.a.g/the inexecutable query
n.a.g/the inexecutable query
 
What is Coding in University in Practice?
What is Coding in University in Practice?What is Coding in University in Practice?
What is Coding in University in Practice?
 
Screen shots : Critical Codes of Capture
Screen shots : Critical Codes of CaptureScreen shots : Critical Codes of Capture
Screen shots : Critical Codes of Capture
 
Why Code? Why Program? Why Create?
Why Code? Why Program? Why Create? Why Code? Why Program? Why Create?
Why Code? Why Program? Why Create?
 
Digital Surveillance in China: From the Great Firewall to the Social Credit S...
Digital Surveillance in China: From the Great Firewall to the Social Credit S...Digital Surveillance in China: From the Great Firewall to the Social Credit S...
Digital Surveillance in China: From the Great Firewall to the Social Credit S...
 
Executing Liveness
Executing LivenessExecuting Liveness
Executing Liveness
 
Executing Queries as a form of artistic practice
Executing Queries as a form of artistic practiceExecuting Queries as a form of artistic practice
Executing Queries as a form of artistic practice
 
Interfacing with questions: The unpredictability of live queries in the work...
Interfacing with questions:  The unpredictability of live queries in the work...Interfacing with questions:  The unpredictability of live queries in the work...
Interfacing with questions: The unpredictability of live queries in the work...
 
Microtemporality: At The Time When Loading-in-progress
Microtemporality: At The Time When Loading-in-progressMicrotemporality: At The Time When Loading-in-progress
Microtemporality: At The Time When Loading-in-progress
 
Software art and design: computational thinking through programming practice ...
Software art and design: computational thinking through programming practice ...Software art and design: computational thinking through programming practice ...
Software art and design: computational thinking through programming practice ...
 
Executing Queries
Executing QueriesExecuting Queries
Executing Queries
 
Life and Death in Software
Life and Death in SoftwareLife and Death in Software
Life and Death in Software
 
Network materiality and temporality: Things flow 'non-continuously' in networ...
Network materiality and temporality: Things flow 'non-continuously' in networ...Network materiality and temporality: Things flow 'non-continuously' in networ...
Network materiality and temporality: Things flow 'non-continuously' in networ...
 
Discussing Software through the art of the Hong Kong Umbrella Movement
Discussing Software through the art of the Hong Kong Umbrella MovementDiscussing Software through the art of the Hong Kong Umbrella Movement
Discussing Software through the art of the Hong Kong Umbrella Movement
 
Nonhuman Participation: a materialist perspective on execution from agency o...
Nonhuman Participation: a materialist perspective on execution from agency o...Nonhuman Participation: a materialist perspective on execution from agency o...
Nonhuman Participation: a materialist perspective on execution from agency o...
 
Artist Talk: From net art to software art
Artist Talk: From net art to software artArtist Talk: From net art to software art
Artist Talk: From net art to software art
 
Collaborative and Collective [Artistic] Research
Collaborative and Collective [Artistic] ResearchCollaborative and Collective [Artistic] Research
Collaborative and Collective [Artistic] Research
 
Net Art: Data Hacking, Coding and Critical Thinking
Net Art: Data Hacking, Coding and Critical ThinkingNet Art: Data Hacking, Coding and Critical Thinking
Net Art: Data Hacking, Coding and Critical Thinking
 

Kürzlich hochgeladen

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 

Kürzlich hochgeladen (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 

Executing tasks: Spam as Automated Agents

  • 1. 28  Mar,  2017  @  Aarhus  University   Winnie  Soon  |  siusoon.net     Execu?ng  Tasks:  Spam  as  Automated  Agents  
  • 2. What  is  par?cipa?on?   Google  image  search  as  of  22  Mar  2017    
  • 3. What  is  par?cipa?on?   Google  image  search  as  of  22  Mar  2017     the  ac?on  of  taking  part  in  something   Involvement  |  taking  part  |  engagement  |  contribu?on  …  
  • 4. [W]hat  was  trash  becomes  things,  what  was  an   instrument  becomes  a  par?cipant,  what  was   foodstuff  becomes  agent,  what  was   adaman?ne  becomes  intensity.  We  see  how  an   animal,  plant,  mineral,  or  ar?fact  can   some?mes  catalyze  a  public,  and  we  might   then  see  how  to  devise  more  effec?ve   [experimental]  tac?cs…              (BenneU  2010,  p.  107)  
  • 5. an  actant  is  a  source  of  ac?on  that  can  be   either  human  or  nonhuman;  it  is  that  which   has  efficacy,  can  do  things,  has  sufficient   coherence  to  make  a  difference,  produce   effects,  alter  course  of  events.                      (BenneU  2010,  p.  viii)  
  • 7. Sent  by  Gary  Thuerk,  a  marketer  for  the  Digital  Equipment  Corpora?on,  in  1978  
  • 8. et  citat     ngelige     t  vælge   ayout’  i     menuen   The  term  spamming  was  applied  to  a  few  different   behaviours.  One  was  to  flood  the  computer  with  too   much  data  in  order  to  crash  it.  Another  was  to  “spam   the  database”  by  having  a  program  create  a  huge   number  of  objects,  rather  than  crea?ng  them  by  hand.                    (Templeton,  n.d)  
  • 9.
  • 10. Digital   Consump?on   Spam   Produc?on   Muta?ng   iden??es  
  • 11.
  • 12.
  • 13. [SITE  OF  YOU]       Hey  I  like  your  page,  but  you  have  no  control!     Hi,  my  name  is  Yvonne  and  I'm  the  webmaster  of   “Crack  the  Code."     It’s  is  open  to  all  and  is  fun  way  to  substan?al  money.     This  is  Yvonne  Zain  Bin  Abidin.       Let’s  collaborate  together.  I  made  this  to  help.    
  • 14. [JUST  RENT  THE  DATA]     Can  it  forensic?     The  apple  is  too  full?     Carrier  loca?ons  arise  from  what?   When  was  it  sent?     Which  encrypted  customers?     IQ's  up  the  what?       Configure  this.  Just  rent  the  data.  
  • 16. “We  wander  around  the  network,    seamlessly  and  mindlessly,  and  you  wanted  to  trash  us,   but  we  are  s?ll  everywhere.  We  are  just  the  children  of  your  economic  and  social  system,   but  you  ignore  and  avoid  us.     We  are  not  dead,  we  write,  we  create.”  
  • 19. Computer  code  is  not  solely  technical  though,  and  must  be   understood  with  respect  to  both  the  'cultures  of  souware'  that   produce  it,  but  also  the  cultures  of  consump?on  that  surround  it   (Berry  2011:17)    
  • 20. (Berry  2011:17)     Sending…  
  • 21. Souware  Art  Prac?ce:     -­‐  Make  inquiries   -­‐  Express  crea?ve  thoughts   -­‐  Perform  interven?on   -­‐  See/imagine  phenomena  in  new  ways   -­‐  Invite  unfinished  thinking   -­‐  Inform  academic  wri?ng   -­‐  Cons?tute  research  outcome      
  • 22. et  citat     ngelige     t  vælge   ayout’  i     menuen   Ar?s?c  prac?ce  is  not  only  the  result  of  the  research,   but  also  its  methodological  vehicle,  when  the  research   unfolds  in  and  through  the  acts  of  crea?ng  and   performing.     (Borgdorff  2011,  p.  46)    
  • 23. Opportuni?es:       -­‐  How  to  inves?gate  infrastructure/technical  systems?     -­‐  How  may  we  understand  cultural  system  via  reading/wri?ng  code?   -­‐  As  an  artwork,  how  to  get  a  balance  of  control  and  make  sense  of   the  use  of  language?      
  • 24. Thank  You   Winnie  Soon  |  siusoon.net