首页 > 最新文献

Internet Histories最新文献

英文 中文
Wikipedia @ 20, Stories of an Incomplete Revolution, edited by Joseph Reagle and Jackie Koerner, The MIT Press, Cambridge, MA, 2020. U.S. $27.95 维基百科@ 20,《不完全革命的故事》,由约瑟夫·雷格尔和杰基·科尔纳编辑,麻省理工学院出版社,剑桥,马萨诸塞州,2020年。美国27.95美元
IF 1.3 Q3 COMMUNICATION Pub Date : 2021-06-02 DOI: 10.1080/24701475.2021.1932273
Helen Hockx-Yu
Wikipedia @ 20 is an edited volume put together by Joseph Reagle and Jackie Koerner to celebrate Wikipedia’s 20th birthday, taking advantage of this significant milestone to pause and reflect on th...
维基百科@20是由Joseph Reagle和Jackie Koerner为庆祝维基百科20岁生日而编辑的一卷,利用这一重要里程碑来暂停和反思。。。
{"title":"Wikipedia @ 20, Stories of an Incomplete Revolution, edited by Joseph Reagle and Jackie Koerner, The MIT Press, Cambridge, MA, 2020. U.S. $27.95","authors":"Helen Hockx-Yu","doi":"10.1080/24701475.2021.1932273","DOIUrl":"https://doi.org/10.1080/24701475.2021.1932273","url":null,"abstract":"Wikipedia @ 20 is an edited volume put together by Joseph Reagle and Jackie Koerner to celebrate Wikipedia’s 20th birthday, taking advantage of this significant milestone to pause and reflect on th...","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"6 1","pages":"257 - 261"},"PeriodicalIF":1.3,"publicationDate":"2021-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2021.1932273","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48164400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
From RangKoM and JARING to the Internet: visions and practices of electronic networking in Malaysia, 1983–1996 从RangKoM和JARING到互联网:马来西亚电子网络的愿景和实践,1983-1996
IF 1.3 Q3 COMMUNICATION Pub Date : 2021-05-26 DOI: 10.1080/24701475.2021.1920126
Hallam Stevens
Abstract Early electronic networks were established for a variety of purposes, to serve different kinds of people and needs, and in vastly different political, social, and economic contexts. Examining some of the earliest electronic networks established in Southeast Asia provides us with a glimpse of the contrasting and diverse aims for which they were established and used. At the time electronic networking began to be developed in Malaysia (during the 1980s) its potential was far more open-ended. Although networking pioneers in Southeast Asia were influenced by North American experiences, they quickly developed their own ideas about what networks could be, could do, and how they could serve national or local purposes. This essay uses the concept of a “networking imaginary” to conceptualise the ways in which networks became associated with particular ideals, goals, and futures. The pioneers of electronic networking in Malaysia articulated a unique networking imaginary that anticipated networks playing a critical role in Malaysia’s developing economy. Networking, in the vision of its Malaysian founders, would play a key role in propelling Malaysia forward as a wealthy, stable, and harmonious society. These visions continue to impact the ways in which networks are imagined and used in Malaysia today.
摘要早期的电子网络是为了各种目的而建立的,为不同类型的人和需求提供服务,并在截然不同的政治、社会和经济环境中提供服务。通过研究东南亚最早建立的一些电子网络,我们可以一窥它们建立和使用的目的是截然不同的。在马来西亚开始发展电子网络的时候(20世纪80年代),它的潜力要大得多。尽管东南亚的网络先驱受到了北美经验的影响,但他们很快就形成了自己的想法,即网络可以是什么,可以做什么,以及如何为国家或地方服务。本文使用“网络想象”的概念来概念化网络与特定理想、目标和未来的联系方式。马来西亚电子网络的先驱们提出了一个独特的网络想象,预计网络将在马来西亚发展中的经济中发挥关键作用。在马来西亚创始人的愿景中,网络将在推动马来西亚成为一个富裕、稳定和和谐的社会方面发挥关键作用。这些愿景继续影响着当今马来西亚对网络的想象和使用方式。
{"title":"From RangKoM and JARING to the Internet: visions and practices of electronic networking in Malaysia, 1983–1996","authors":"Hallam Stevens","doi":"10.1080/24701475.2021.1920126","DOIUrl":"https://doi.org/10.1080/24701475.2021.1920126","url":null,"abstract":"Abstract Early electronic networks were established for a variety of purposes, to serve different kinds of people and needs, and in vastly different political, social, and economic contexts. Examining some of the earliest electronic networks established in Southeast Asia provides us with a glimpse of the contrasting and diverse aims for which they were established and used. At the time electronic networking began to be developed in Malaysia (during the 1980s) its potential was far more open-ended. Although networking pioneers in Southeast Asia were influenced by North American experiences, they quickly developed their own ideas about what networks could be, could do, and how they could serve national or local purposes. This essay uses the concept of a “networking imaginary” to conceptualise the ways in which networks became associated with particular ideals, goals, and futures. The pioneers of electronic networking in Malaysia articulated a unique networking imaginary that anticipated networks playing a critical role in Malaysia’s developing economy. Networking, in the vision of its Malaysian founders, would play a key role in propelling Malaysia forward as a wealthy, stable, and harmonious society. These visions continue to impact the ways in which networks are imagined and used in Malaysia today.","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"230 - 247"},"PeriodicalIF":1.3,"publicationDate":"2021-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2021.1920126","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42392598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital cynical romanticism: Japan’s 2channel and the precursors to online extremist cultures 数字愤世嫉俗的浪漫主义:日本的2频道和网络极端主义文化的先驱
IF 1.3 Q3 COMMUNICATION Pub Date : 2021-05-07 DOI: 10.1080/24701475.2021.1919966
Brett J. Fujioka, J. DeCook
Abstract In the West, the concern surrounding the rise of online harassment, trolling and other malicious and antisocial behaviors tend to be hyper focused on websites like 4chan, 8chan and reddit. However, the rise of online hate culture that laid the groundwork for movements like Gamergate and the alt right has a precedent in Japan – specifically, the culture that was borne out of the 2channel text board, which was the inspiration for the American 4chan. As society decayed around many Japanese in the 1990s (an economic recession, terrorist attacks, earthquakes, to name a few events), the Internet came to prominence in the form of Bulletin Board Systems. Despite its lasting impact and influence on digital culture more globally, it is understudied and ignored in larger discussions around trolling, harassment, and online hate. Using a case study of the anti-Korean manga Kenkanryu and through the lens of Cynical Romanticism, this essay examines the ways that 2channel and the netto uyoku (the Japanese extreme far right) created a digital subculture that has had a lasting impact on global online hate. Though the netto uyoku never achieved significant successes in terms of actual societal and political change, what they did leave behind is a blueprint for online reactionaries.
摘要在西方,人们对网络骚扰、网络钓鱼和其他恶意反社会行为增多的担忧往往过于集中在4chan、8chan和reddit等网站上。然而,为Gamergate和另类右翼等运动奠定基础的网络仇恨文化的兴起在日本有先例——特别是源于2频道文字板的文化,这是美国4chan的灵感来源。20世纪90年代,随着许多日本人的社会衰退(经济衰退、恐怖袭击、地震等事件),互联网以公告板系统的形式崭露头角。尽管它对全球数字文化产生了持久的影响和影响,但在围绕网络钓鱼、骚扰和网络仇恨的更大讨论中,它却被低估和忽视。本文以反韩漫画《Kenkanryu》为个案研究,通过犬儒主义浪漫主义的视角,探讨了2channel和日本极右翼的netto uyoku如何创造了一种对全球网络仇恨产生持久影响的数字亚文化。尽管netto uyoku从未在实际的社会和政治变革方面取得重大成功,但他们留下的是网络反动派的蓝图。
{"title":"Digital cynical romanticism: Japan’s 2channel and the precursors to online extremist cultures","authors":"Brett J. Fujioka, J. DeCook","doi":"10.1080/24701475.2021.1919966","DOIUrl":"https://doi.org/10.1080/24701475.2021.1919966","url":null,"abstract":"Abstract In the West, the concern surrounding the rise of online harassment, trolling and other malicious and antisocial behaviors tend to be hyper focused on websites like 4chan, 8chan and reddit. However, the rise of online hate culture that laid the groundwork for movements like Gamergate and the alt right has a precedent in Japan – specifically, the culture that was borne out of the 2channel text board, which was the inspiration for the American 4chan. As society decayed around many Japanese in the 1990s (an economic recession, terrorist attacks, earthquakes, to name a few events), the Internet came to prominence in the form of Bulletin Board Systems. Despite its lasting impact and influence on digital culture more globally, it is understudied and ignored in larger discussions around trolling, harassment, and online hate. Using a case study of the anti-Korean manga Kenkanryu and through the lens of Cynical Romanticism, this essay examines the ways that 2channel and the netto uyoku (the Japanese extreme far right) created a digital subculture that has had a lasting impact on global online hate. Though the netto uyoku never achieved significant successes in terms of actual societal and political change, what they did leave behind is a blueprint for online reactionaries.","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"287 - 303"},"PeriodicalIF":1.3,"publicationDate":"2021-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2021.1919966","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47407427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The mediated and mediatised justice-seeking: Chinese digital vigilantism from 2006 to 2018 调解与调停的司法诉求:2006年至2018年的中国数字私刑
IF 1.3 Q3 COMMUNICATION Pub Date : 2021-04-29 DOI: 10.1080/24701475.2021.1919965
Qian Huang
Abstract The Chinese Internet has developed rapidly in the past decade and given rise to many online phenomena, including digital vigilantism (DV). It refers to citizens’ practice of weaponising online visibility for retaliation when collectively offended. In China, since the Cat Torture Case in 2006, DV has been widely adopted by citizens to defend social norms and values. With recent technological developments and socio-political changes in China, how Chinese citizens conduct DV and its influence have also changed along various dimensions. This research, therefore, identifies the historical changes of DV in China and situates these changes in relation to contemporary Chinese technological and socio-political development. The study constructs a database of 1265 Chinese DV cases that receive media coverage between 2006 to 2018 and conducts a thematic analysis to identify characteristics, changes, and trends of DV in China. The author argues that these developments demonstrate the mediation and more importantly, the mediatisation of justice-seeking on the Chinese Internet conditioned by the ubiquitous state power.
摘要中国互联网在过去十年中发展迅速,并引发了许多网络现象,包括数字私刑。它指的是公民在集体受到冒犯时,将网络可见性武器化以进行报复的做法。在中国,自2006年虐猫案以来,DV已被公民广泛采用,以捍卫社会规范和价值观。随着近年来中国科技的发展和社会政治的变化,中国公民如何进行DV及其影响也发生了多方面的变化。因此,本研究确定了DV在中国的历史变化,并将这些变化与当代中国技术和社会政治发展联系起来。本研究构建了一个包含2006年至2018年间接受媒体报道的1265例中国DV病例的数据库,并进行了主题分析,以确定中国DV的特征、变化和趋势。作者认为,这些发展表明了调解,更重要的是,在无处不在的国家权力的制约下,中国互联网上寻求正义的调解。
{"title":"The mediated and mediatised justice-seeking: Chinese digital vigilantism from 2006 to 2018","authors":"Qian Huang","doi":"10.1080/24701475.2021.1919965","DOIUrl":"https://doi.org/10.1080/24701475.2021.1919965","url":null,"abstract":"Abstract The Chinese Internet has developed rapidly in the past decade and given rise to many online phenomena, including digital vigilantism (DV). It refers to citizens’ practice of weaponising online visibility for retaliation when collectively offended. In China, since the Cat Torture Case in 2006, DV has been widely adopted by citizens to defend social norms and values. With recent technological developments and socio-political changes in China, how Chinese citizens conduct DV and its influence have also changed along various dimensions. This research, therefore, identifies the historical changes of DV in China and situates these changes in relation to contemporary Chinese technological and socio-political development. The study constructs a database of 1265 Chinese DV cases that receive media coverage between 2006 to 2018 and conducts a thematic analysis to identify characteristics, changes, and trends of DV in China. The author argues that these developments demonstrate the mediation and more importantly, the mediatisation of justice-seeking on the Chinese Internet conditioned by the ubiquitous state power.","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"304 - 322"},"PeriodicalIF":1.3,"publicationDate":"2021-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2021.1919965","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43882785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
If Then: How the Simulmatics Corporation Invented the Future 《如果那时:模拟公司如何创造未来
IF 1.3 Q3 COMMUNICATION Pub Date : 2021-02-05 DOI: 10.1080/24701475.2021.1878651
Dan M. Kotliar
{"title":"If Then: How the Simulmatics Corporation Invented the Future","authors":"Dan M. Kotliar","doi":"10.1080/24701475.2021.1878651","DOIUrl":"https://doi.org/10.1080/24701475.2021.1878651","url":null,"abstract":"","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"204 - 206"},"PeriodicalIF":1.3,"publicationDate":"2021-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2021.1878651","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46371611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Interview with Aleksandra Kaminska Aleksandra Kaminska访谈
IF 1.3 Q3 COMMUNICATION Pub Date : 2021-01-22 DOI: 10.1080/24701475.2021.1878650
Maria Eriksson, Guillaume Heuguet
Aleksandra Kaminska is an Assistant Professor in the Department of Communication at the Universit e de Montr eal, Canada, where she also co-directs the Artefact Lab and the Bricolab. Her research is based in media studies and aesthetics, and the history of technology. She is currently preparing High-Tech Paper: Security Printing and the Aesthetics of Trust, a monograph that examines the making of authentic paper for circulation in secure systems and infrastructures. She situates security printing within media and printing histories, but also as it intersects with art, craft, and design. Her work on authentication devices includes the production of Nano-verses (nano-verses.com), an art-sci collaboration that explored how the technology of nano-optical authentication can be rethought as artistic media. The articles discussed in the following interview are: “Storing Authenticity at the Surface and into the Depths: Securing Paper with Humanand Machine-Readable Devices” (Interm edialit es, 2018); “‘Don’t Copy That’: Security Printing and the Making of High-Tech Paper” (Convergence, 2019); and “The Intrinsic Value of Valuable Paper: On the Infrastructural Work of Authentication Devices” (Theory, Culture & Society, 2020). She recently co-edited an issue of PUBLIC: Art/Culture/Ideas on “Biometrics: Mediating Bodies” (2020), and is currently finalizing a co-edited volume of the Canadian Journal of Communication on the theme of “Materials and Media of Infrastructure.” In 2020–2021 she is co-organizing the online series Paperology: A Reading and Activity Group on Knowing and Being with Paper. Your work centers on efforts to secure the authenticity and identity of things and highlights how material standards contribute to the ordering of the world. In much of your writings, you place focus on techniques for identifying analog objects such as money and documents/valuable paper but we have also found your work to be highly stimulating for thinking about efforts to identify digital content like moving images and sounds. In “Storing Authenticity at the Surface and into the Depths” you introduce the concept of “authentication devices” to discuss the role and function of identification techniques. Could you explain a bit more about what you mean by this concept and how/ why you think it is useful for thinking about strategies of identification?
Aleksandra Kaminska是加拿大蒙特利尔大学传播系的助理教授,也是Artefact实验室和Bricolab的联合主任。她的研究以媒体研究、美学和技术史为基础。她目前正在编写《高科技论文:安全印刷与信任美学》,这是一本研究在安全系统和基础设施中流通的真实纸张制作的专著。她将安全印刷置于媒体和印刷历史中,但也与艺术、工艺和设计相交叉。她在认证设备方面的工作包括制作Nano-verses.com,这是一项艺术与科学的合作,探索了如何将纳米光学认证技术重新思考为艺术媒介。以下采访中讨论的文章是:“将真实性储存在表面和深处:用人和机器可读设备保护纸张”(Intermedialites,2018);“‘不要复制’:安全印刷与高科技纸张的制作”(Convergence,2019);以及“有价值论文的内在价值:论认证设备的基础设施工作”(理论、文化与社会,2020)。她最近联合编辑了一期《公共:艺术/文化/思想》关于“生物识别:中介机构”(2020)的文章,目前正在敲定《加拿大传播杂志》主题为“基础设施的材料和媒体”的联合编辑卷。2020-2021年,她正联合组织在线系列论文:一个关于认识和与纸相处的阅读和活动小组。你的工作重点是确保事物的真实性和身份,并强调材料标准如何有助于世界的秩序。在你的大部分作品中,你都把重点放在识别类似物体的技术上,如金钱和文件/贵重纸张,但我们也发现你的作品对识别运动图像和声音等数字内容的努力非常有启发性。在“将真实性存储在表面和深度”中,您介绍了“身份验证设备”的概念,以讨论身份验证技术的作用和功能。你能进一步解释一下你所说的这个概念是什么意思,以及你认为它如何/为什么对思考识别策略有用吗?
{"title":"Interview with Aleksandra Kaminska","authors":"Maria Eriksson, Guillaume Heuguet","doi":"10.1080/24701475.2021.1878650","DOIUrl":"https://doi.org/10.1080/24701475.2021.1878650","url":null,"abstract":"Aleksandra Kaminska is an Assistant Professor in the Department of Communication at the Universit e de Montr eal, Canada, where she also co-directs the Artefact Lab and the Bricolab. Her research is based in media studies and aesthetics, and the history of technology. She is currently preparing High-Tech Paper: Security Printing and the Aesthetics of Trust, a monograph that examines the making of authentic paper for circulation in secure systems and infrastructures. She situates security printing within media and printing histories, but also as it intersects with art, craft, and design. Her work on authentication devices includes the production of Nano-verses (nano-verses.com), an art-sci collaboration that explored how the technology of nano-optical authentication can be rethought as artistic media. The articles discussed in the following interview are: “Storing Authenticity at the Surface and into the Depths: Securing Paper with Humanand Machine-Readable Devices” (Interm edialit es, 2018); “‘Don’t Copy That’: Security Printing and the Making of High-Tech Paper” (Convergence, 2019); and “The Intrinsic Value of Valuable Paper: On the Infrastructural Work of Authentication Devices” (Theory, Culture & Society, 2020). She recently co-edited an issue of PUBLIC: Art/Culture/Ideas on “Biometrics: Mediating Bodies” (2020), and is currently finalizing a co-edited volume of the Canadian Journal of Communication on the theme of “Materials and Media of Infrastructure.” In 2020–2021 she is co-organizing the online series Paperology: A Reading and Activity Group on Knowing and Being with Paper. Your work centers on efforts to secure the authenticity and identity of things and highlights how material standards contribute to the ordering of the world. In much of your writings, you place focus on techniques for identifying analog objects such as money and documents/valuable paper but we have also found your work to be highly stimulating for thinking about efforts to identify digital content like moving images and sounds. In “Storing Authenticity at the Surface and into the Depths” you introduce the concept of “authentication devices” to discuss the role and function of identification techniques. Could you explain a bit more about what you mean by this concept and how/ why you think it is useful for thinking about strategies of identification?","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"57 - 70"},"PeriodicalIF":1.3,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2021.1878650","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46486460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Genealogies of online content identification - an introduction 在线内容识别的家谱-简介
IF 1.3 Q3 COMMUNICATION Pub Date : 2021-01-21 DOI: 10.1080/24701475.2021.1878649
Maria Eriksson, Guillaume Heuguet
In today’s digital landscape, cultural content such as texts, films, images, and recorded sounds are increasingly subjected to automatic (or semi-automatic) processes of identification and classification. On a daily basis, spam filters scan swaths of emails in order to separate legit and illegitimate textual messages (Brunton, 2013), algorithms analyze years of user-uploaded film on YouTube in search for copyright violations (Heuguet, 2019), and software systems are deployed to scrutinize millions of images on social media sites in order to detect sexually offensive content (Liao, 2018). These examples reveal how machines and algorithmic systems are increasingly utilized to make complex judgments regarding cultural content. Indeed, it could be argued that the wideranging adoption of content identification systems is constructing new ontologies of culture and regimes of truth in the online domain. When put to action, content identification systems are trusted with the ability to separate good/bad and legal/illegal forms of communication and used to secure the singularity, value, authenticity, origin, and ownership of content. Such efforts are deeply embedded in constructions of knowledge, new forms of political governance, and not least global market transactions. Content identification tools now make up an essential part of the online data economy by protecting the interests of rights holders and forwarding the mathematization, objectification, and commodification of cultural productions. Parallel to their increased pervasiveness and influence, however, content identification systems have also been increasingly contested. Debates regarding automatic content identification tools recently gained momentum due to the European Union’s decision to update its copyright laws. A newly adopted EU directive encourages all platform owners to implement automatic content filters to safeguard copyrights (Spangler, 2019) and critics have argued that such measures run the risk of seriously hampering the freedom of speech and stifling cultural expressions online (e.g., Kaye, 2018). A wide range of high profile tech figures (such as Tim Berners Lee, commonly known as one of the founders of the World Wide Web) have even warned that the widespread adoption of pre-emptive content identification systems could effectively destroy the internet as we know it (Cerf et al., 2018). Content identification systems, then, are not neutral devices but key sites where the moral, juridical, economical, and
在当今的数字环境中,文本、电影、图像和录音等文化内容越来越多地受到自动(或半自动)识别和分类过程的影响。垃圾邮件过滤器每天都会扫描大量电子邮件,以区分合法和非法的文本信息(Brunton,2013),算法分析用户在YouTube上上传的多年电影,以寻找侵犯版权的行为(Heuguet,2019),并部署软件系统来审查社交媒体网站上的数百万张图像,以检测性攻击内容(Liao,2018)。这些例子揭示了机器和算法系统如何越来越多地被用来对文化内容做出复杂的判断。事实上,可以说,内容识别系统的广泛采用正在构建网络领域新的文化本体和真相制度。当内容识别系统投入使用时,人们相信它能够区分好/坏和合法/非法的通信形式,并用于确保内容的独特性、价值、真实性、来源和所有权。这些努力深深植根于知识建设、新形式的政治治理,尤其是全球市场交易。内容识别工具现在通过保护权利持有人的利益和促进文化产品的数学化、物化和商品化,构成了在线数据经济的重要组成部分。然而,在其日益普及和影响力的同时,内容识别系统也受到了越来越多的质疑。由于欧盟决定更新其版权法,关于自动内容识别工具的争论最近愈演愈烈。一项新通过的欧盟指令鼓励所有平台所有者实施自动内容过滤器以保护版权(Spangler,2019),批评者认为,这些措施有严重阻碍言论自由和扼杀在线文化表达的风险(例如,Kaye,2018)。许多知名科技人士(如Tim Berners-Lee,通常被称为万维网的创始人之一)甚至警告说,先发制人的内容识别系统的广泛采用可能会有效地摧毁我们所知的互联网(Cerf等人,2018)。因此,内容识别系统不是中立的设备,而是道德、司法、经济和
{"title":"Genealogies of online content identification - an introduction","authors":"Maria Eriksson, Guillaume Heuguet","doi":"10.1080/24701475.2021.1878649","DOIUrl":"https://doi.org/10.1080/24701475.2021.1878649","url":null,"abstract":"In today’s digital landscape, cultural content such as texts, films, images, and recorded sounds are increasingly subjected to automatic (or semi-automatic) processes of identification and classification. On a daily basis, spam filters scan swaths of emails in order to separate legit and illegitimate textual messages (Brunton, 2013), algorithms analyze years of user-uploaded film on YouTube in search for copyright violations (Heuguet, 2019), and software systems are deployed to scrutinize millions of images on social media sites in order to detect sexually offensive content (Liao, 2018). These examples reveal how machines and algorithmic systems are increasingly utilized to make complex judgments regarding cultural content. Indeed, it could be argued that the wideranging adoption of content identification systems is constructing new ontologies of culture and regimes of truth in the online domain. When put to action, content identification systems are trusted with the ability to separate good/bad and legal/illegal forms of communication and used to secure the singularity, value, authenticity, origin, and ownership of content. Such efforts are deeply embedded in constructions of knowledge, new forms of political governance, and not least global market transactions. Content identification tools now make up an essential part of the online data economy by protecting the interests of rights holders and forwarding the mathematization, objectification, and commodification of cultural productions. Parallel to their increased pervasiveness and influence, however, content identification systems have also been increasingly contested. Debates regarding automatic content identification tools recently gained momentum due to the European Union’s decision to update its copyright laws. A newly adopted EU directive encourages all platform owners to implement automatic content filters to safeguard copyrights (Spangler, 2019) and critics have argued that such measures run the risk of seriously hampering the freedom of speech and stifling cultural expressions online (e.g., Kaye, 2018). A wide range of high profile tech figures (such as Tim Berners Lee, commonly known as one of the founders of the World Wide Web) have even warned that the widespread adoption of pre-emptive content identification systems could effectively destroy the internet as we know it (Cerf et al., 2018). Content identification systems, then, are not neutral devices but key sites where the moral, juridical, economical, and","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"1 - 7"},"PeriodicalIF":1.3,"publicationDate":"2021-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2021.1878649","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49367129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Google’s Post-IPO Development: risks, rewards, and shareholder value b谷歌上市后的发展:风险、回报和股东价值
IF 1.3 Q3 COMMUNICATION Pub Date : 2021-01-06 DOI: 10.1080/24701475.2020.1864959
Paško Bilić, Toni Prug
Abstract Internet history shows that states, military, universities and other public institutions were essential drivers of innovation in the early stages of network development. However, once risky stages pass, commercialisation starts and investors often reap disproportionate rewards from technological innovation. In this paper, we use the risk-reward nexus (RRN) approach (Lazonick & Mazzucato, 2013; Mazzucato, 2013, 2018; Mazzucato & Shipman, 2014) to understand the imbalance between risky public investment and private allocation of rewards regulated by financial markets. We analyse risk reporting in Form 10-K market reports submitted to the Securities and Exchange Commission (SEC) by Google Inc. (Alphabet Inc.) for the period between 2005 and 2019. We detected 58 organisational, marketing and advertising, technological, legal, competitive, and macroeconomic risks. Based on changes in risk reporting three stages of Google’s development can be discerned: post-IPO growth and expansion (2005-2008), growth management and investment diversification (2009-2013), legal struggles and regulatory scrutiny (2014-2019). Reported risks are primarily directed at shareholders, omitting risks relating to internet users, courts, regulators, and nation states. Such an approach is historically rooted in the construction of financial regulation in the name of public interests and markets, with public interests largely interpreted as a proxy for investors’ interests.
互联网历史表明,在网络发展的早期阶段,国家、军队、大学和其他公共机构是创新的重要驱动力。然而,一旦风险阶段过去,商业化就开始了,投资者往往会从技术创新中获得不成比例的回报。在本文中,我们使用风险-回报关联(RRN)方法(Lazonick & Mazzucato, 2013;Mazzucato, 2013, 2018;Mazzucato & Shipman, 2014),以理解风险公共投资与金融市场监管下的私人回报分配之间的不平衡。我们分析了b谷歌Inc. (Alphabet Inc.)在2005年至2019年期间提交给美国证券交易委员会(SEC)的10-K表格市场报告中的风险报告。我们发现了58个组织、营销和广告、技术、法律、竞争和宏观经济风险。根据风险报告的变化,b谷歌的发展可以分为三个阶段:ipo后的增长和扩张(2005-2008),增长管理和投资多元化(2009-2013),法律斗争和监管审查(2014-2019)。报告的风险主要针对股东,忽略了与互联网用户、法院、监管机构和民族国家有关的风险。这种做法的历史根源在于以公共利益和市场的名义构建金融监管,公共利益在很大程度上被解释为投资者利益的代理人。
{"title":"Google’s Post-IPO Development: risks, rewards, and shareholder value","authors":"Paško Bilić, Toni Prug","doi":"10.1080/24701475.2020.1864959","DOIUrl":"https://doi.org/10.1080/24701475.2020.1864959","url":null,"abstract":"Abstract Internet history shows that states, military, universities and other public institutions were essential drivers of innovation in the early stages of network development. However, once risky stages pass, commercialisation starts and investors often reap disproportionate rewards from technological innovation. In this paper, we use the risk-reward nexus (RRN) approach (Lazonick & Mazzucato, 2013; Mazzucato, 2013, 2018; Mazzucato & Shipman, 2014) to understand the imbalance between risky public investment and private allocation of rewards regulated by financial markets. We analyse risk reporting in Form 10-K market reports submitted to the Securities and Exchange Commission (SEC) by Google Inc. (Alphabet Inc.) for the period between 2005 and 2019. We detected 58 organisational, marketing and advertising, technological, legal, competitive, and macroeconomic risks. Based on changes in risk reporting three stages of Google’s development can be discerned: post-IPO growth and expansion (2005-2008), growth management and investment diversification (2009-2013), legal struggles and regulatory scrutiny (2014-2019). Reported risks are primarily directed at shareholders, omitting risks relating to internet users, courts, regulators, and nation states. Such an approach is historically rooted in the construction of financial regulation in the name of public interests and markets, with public interests largely interpreted as a proxy for investors’ interests.","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"171 - 189"},"PeriodicalIF":1.3,"publicationDate":"2021-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2020.1864959","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48728738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The media epistemic value of sonic analytics tools. A commentary 声音分析工具的媒介认知价值。一篇评论
IF 1.3 Q3 COMMUNICATION Pub Date : 2020-12-14 DOI: 10.1080/24701475.2020.1862528
W. Ernst
Abstract While automatized content identification of audio data, in critical discourse analysis, is bound to the symbolic order of monitoring, control, surveillance, censorship and copyright protection, the very tools and algorithms which have been developed for such purposes can be turned into instruments of knowledge production in the scientific sense. Audio content identification is not simply an extension of cultural taxonomies to machine listening, but an operation with its own eigen knowledge. Audio content identification is not simply a continuation of analog techniques for monitoring sonic objects. From a media-epistemological perspective, new forms of audio content identification open different orders of the sonic archive. What is practiced in the online domain has been preceded by experimental investigations of archival storage. The real l'archive, though, are the technological (hardware) and mathematical (software) criteria defining content identification. A media archaeology of audio content identification reveals the technological l'archive governing such forms of enunciation.
摘要尽管在批判性话语分析中,音频数据的自动内容识别与监控、监视、审查和版权保护的象征性秩序息息相关,但为此目的开发的工具和算法可以转化为科学意义上的知识生产工具。音频内容识别不仅仅是文化分类法对机器听力的延伸,而是一种具有自身特征知识的操作。音频内容识别不仅仅是用于监测声音对象的模拟技术的延续。从媒体认识论的角度来看,新形式的音频内容识别打开了声音档案的不同秩序。在网络领域进行实践之前,对档案存储进行了实验研究。然而,真正的档案是定义内容识别的技术(硬件)和数学(软件)标准。音频内容识别的媒体考古揭示了控制这种表达形式的技术档案。
{"title":"The media epistemic value of sonic analytics tools. A commentary","authors":"W. Ernst","doi":"10.1080/24701475.2020.1862528","DOIUrl":"https://doi.org/10.1080/24701475.2020.1862528","url":null,"abstract":"Abstract While automatized content identification of audio data, in critical discourse analysis, is bound to the symbolic order of monitoring, control, surveillance, censorship and copyright protection, the very tools and algorithms which have been developed for such purposes can be turned into instruments of knowledge production in the scientific sense. Audio content identification is not simply an extension of cultural taxonomies to machine listening, but an operation with its own eigen knowledge. Audio content identification is not simply a continuation of analog techniques for monitoring sonic objects. From a media-epistemological perspective, new forms of audio content identification open different orders of the sonic archive. What is practiced in the online domain has been preceded by experimental investigations of archival storage. The real l'archive, though, are the technological (hardware) and mathematical (software) criteria defining content identification. A media archaeology of audio content identification reveals the technological l'archive governing such forms of enunciation.","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"48 - 56"},"PeriodicalIF":1.3,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2020.1862528","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41595063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Little history of CAPTCHA 关于验证码的一些历史
IF 1.3 Q3 COMMUNICATION Pub Date : 2020-11-02 DOI: 10.1080/24701475.2020.1831197
B. Justie
Abstract This article traces the early history of CAPTCHA, the now ubiquitous cybersecurity tool that prompts users to “confirm their humanity” by solving word- and image-based puzzles before accessing free online services. CAPTCHA, and its many derivatives, are presented as content identification mechanisms: the user is asked to identify content in order for the computer to determine the identity of the user. This twofold process of content identification, however, has evolved significantly since CAPTCHA’s inception in the late 1990s. Pivoting away from a realist framework, largely dependent on the standard tenets [of] cryptography, toward a relational framework premised on aesthetic contingency and social consensus, CAPTCHA’s arc uniquely illustrates how contested notions of both “content” and “identity” become materialized in contemporary internet infrastructure. Inspired by Walter Benjamin’s exegetical study of early photography, this critical historicization aims to foreground CAPTCHA as a particularly fraught juncture of humans and computers, which, as with Benjamin’s intervention, productively troubles received ideas of humanism and automation, mediation and materiality.
本文追溯了CAPTCHA的早期历史,现在无处不在的网络安全工具,在访问免费在线服务之前,通过解决基于文字和图像的谜题,提示用户“确认自己的人性”。CAPTCHA和它的许多衍生产品都是作为内容识别机制呈现的:要求用户识别内容,以便计算机确定用户的身份。然而,自从CAPTCHA在20世纪90年代末出现以来,这种双重的内容识别过程已经发生了重大变化。从现实主义框架(主要依赖于密码学的标准原则)转向以美学偶然性和社会共识为前提的关系框架,CAPTCHA的弧独特地说明了“内容”和“身份”这两个有争议的概念如何在当代互联网基础设施中实现。受到沃尔特·本雅明对早期摄影的训诂研究的启发,这种批判性的历史化旨在将CAPTCHA作为人类和计算机的一个特别令人担忧的接合点,在本雅明的干预下,生产性的麻烦接受了人文主义和自动化、调解和物质性的思想。
{"title":"Little history of CAPTCHA","authors":"B. Justie","doi":"10.1080/24701475.2020.1831197","DOIUrl":"https://doi.org/10.1080/24701475.2020.1831197","url":null,"abstract":"Abstract This article traces the early history of CAPTCHA, the now ubiquitous cybersecurity tool that prompts users to “confirm their humanity” by solving word- and image-based puzzles before accessing free online services. CAPTCHA, and its many derivatives, are presented as content identification mechanisms: the user is asked to identify content in order for the computer to determine the identity of the user. This twofold process of content identification, however, has evolved significantly since CAPTCHA’s inception in the late 1990s. Pivoting away from a realist framework, largely dependent on the standard tenets [of] cryptography, toward a relational framework premised on aesthetic contingency and social consensus, CAPTCHA’s arc uniquely illustrates how contested notions of both “content” and “identity” become materialized in contemporary internet infrastructure. Inspired by Walter Benjamin’s exegetical study of early photography, this critical historicization aims to foreground CAPTCHA as a particularly fraught juncture of humans and computers, which, as with Benjamin’s intervention, productively troubles received ideas of humanism and automation, mediation and materiality.","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"30 - 47"},"PeriodicalIF":1.3,"publicationDate":"2020-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2020.1831197","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"60126662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Internet Histories
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1