Open Access. Powered by Scholars. Published by Universities.®
Communication Technology and New Media Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Art and Design (3)
- Arts and Humanities (3)
- Interactive Arts (3)
- Library and Information Science (3)
- Art Practice (2)
-
- Computer Sciences (2)
- Information Literacy (2)
- Interdisciplinary Arts and Media (2)
- Physical Sciences and Mathematics (2)
- Social Influence and Political Communication (2)
- Social Media (2)
- Critical and Cultural Studies (1)
- Curriculum and Instruction (1)
- Digital Humanities (1)
- Education (1)
- Education Law (1)
- Education Policy (1)
- Educational Administration and Supervision (1)
- Elementary Education and Teaching (1)
- Elementary and Middle and Secondary Education Administration (1)
- Fine Arts (1)
- First Amendment (1)
- Graphics and Human Computer Interfaces (1)
- International Relations (1)
- Journalism Studies (1)
- Junior High, Intermediate, Middle School Education and Teaching (1)
- Law (1)
- Keyword
-
- Donald J. Trump (2)
- Joel Slayton (2)
- Secrecy (2)
- 2016 U.S. election (1)
- Algorithms (1)
-
- Alt-right (1)
- Artificial intelligence (1)
- CA. (1)
- CADRE (1)
- CIPA (1)
- Children's Internet Protection Act (1)
- Christine Tamblyn (1)
- Collaboration (1)
- Computer art (1)
- Computer conversation systems (1)
- Conduits (1)
- Conspiracy (1)
- Conspiracy theories (1)
- Dirk Paesmans (1)
- Disinformation (1)
- DoWhatDo (1)
- E-government web content (1)
- Ellipsis (1)
- Fake news (1)
- Filtering software (1)
- Filtering technology (1)
- Gary Quinonez (1)
- Georgia Institute of Technology (1)
- Geri Wittig (1)
- Guy Marsden (1)
Articles 1 - 9 of 9
Full-Text Articles in Communication Technology and New Media
Review, Democracy And Fake News: Information Manipulation And Post-Truth Politics, Peter Krapp
Review, Democracy And Fake News: Information Manipulation And Post-Truth Politics, Peter Krapp
Secrecy and Society
No abstract provided.
Designing Human-Computer Conversational Systems Using Needs Hierarchy, Souvick Ghosh
Designing Human-Computer Conversational Systems Using Needs Hierarchy, Souvick Ghosh
School of Information Student Research Journal
No abstract provided.
The Rhetorical Algorithm: Wikileaks And The Elliptical Secrets Of Donald J. Trump, Atilla Hallsby
The Rhetorical Algorithm: Wikileaks And The Elliptical Secrets Of Donald J. Trump, Atilla Hallsby
Secrecy and Society
Algorithms were a generative force behind many of the leaks and secrets that dominated the 2016 election season. Taking the form of the identity-anonymizing Tor software that protected the identity of leakers, mathematical protocols occupied a prominent place in the secrets generated during the presidential campaign. This essay suggests that the rhetorical trope of ellipsis offers an equally crucial, algorithmic formula for explaining the public production of these secrets and leaks. It then describes the 2016 DNC leak and Donald Trump’s “I love Wikileaks” moment using the trope of ellipsis, which marks a discursive omission or gap in official executive …
#Whitegenocide, The Alt-Right And Conspiracy Theory: How Secrecy And Suspicion Contributed To The Mainstreaming Of Hate, Andrew F. Wilson
#Whitegenocide, The Alt-Right And Conspiracy Theory: How Secrecy And Suspicion Contributed To The Mainstreaming Of Hate, Andrew F. Wilson
Secrecy and Society
This article considers the relationship between “hashtag activism” as it is currently being used by the alt-right and the tendency to draw on conspiracy theory that Richard Hofstadter identified as being prevalent among what he termed “pseudo-conservatives” half a century earlier. Both the alt-right and Hofstadter’s “pseudo-conservatives” can be characterised by a pronounced populist nationalism that understands its aims as protecting a particular way of life whilst drawing on an aggrieved sense of injustice at being conspired against by an unseen enemy. That this “enemy” is typically foreign in actuality or in spirit confirms the cultural dimension on which their …
Website Blocked: Filtering Technology In Schools And School Libraries, Jennifer M. Overaa
Website Blocked: Filtering Technology In Schools And School Libraries, Jennifer M. Overaa
School of Information Student Research Journal
This paper investigates the impact of filtering software in K-12 schools and school libraries. The Children's Internet Protection Act, or CIPA, requires that public schools and school libraries use filtering technology in order to receive discounted rates on technology. As a result, nearly all public elementary and secondary schools today use filtering technology. While the provisions of CIPA narrowly define the content to be blocked, filters are often set to block much more than is required. Filtering technology is often ineffective, and many unobjectionable sites end up being blocked, including Web 2.0 sites and tools needed to educate students in …
An Exploratory Study Of Online Information Regarding Colony Collapse Disorder, Meredith K. Boehm
An Exploratory Study Of Online Information Regarding Colony Collapse Disorder, Meredith K. Boehm
School of Information Student Research Journal
The cause or causes of Colony Collapse Disorder (CCD) are uncertain. CCD defines specific characteristics of the nationwide deaths of honey bee colonies in the last decade. Adult bees often disappear from the hive and die, leaving the colony weak and vulnerable to disease. Environmental scientists and agriculturalists have developed many different theories about CCD and its origins. The different theories create challenges regarding the effective dissemination of information about CCD to the different realms of public information seekers. There is a need for an exploration of the online communication of CCD information using federal environmental agency web resources. CCD …
Currents: Art Review, Jason Challas
Currents: Art Review, Jason Challas
SWITCH
A review of the exhibition "Currents", on view at Holmes Fine Arts Gallery Feb. 11th- April 28th 1995. Works reviewed include two by Bruce Cannon, “Comfort Zone” and “Donation Box,” as well as Tim Ryan's relief paintings and sculptures. It is noted that the exhibition also incorporates work by Joan Heemskerk, Dirk Paesmans, Joel Slayton, Jack Fulton, Gary Quinonez, Guy Marsden, Christine Tamblyn, Geri Wittig, and Joe Delappe.
Vrware Beware: Vr At Siggraph, P.D. Quick
Vrware Beware: Vr At Siggraph, P.D. Quick
SWITCH
The article uses the author’s experiences from the event of Siggraph ‘95 to comment on upcoming products using virtual or augmented reality. The article includes further discussion on the products’ effects on the psychology and physiology of consumers. Some examples include the “i-Glasses” from Virtual I/O, the “Smart Model” from Multigen, as well as the nanomanipulator created by University of North Carolina Chapel Hill Department of Computer Science, and the Phobia Project developed by the Georgia Tech Graphics Visualization and Usability Center. The article also covers not only the products of this event, but also the courses, panels, papers, and …
Interview: Joel Slayton, Christine Laffer
Interview: Joel Slayton, Christine Laffer
SWITCH
Interview with Joel Slayton, Professor of Computers in Fine Art at San José State University, and Director of the CADRE Institute. Slayton discusses the history of the Cadre Institute and details his views on the relationship between art and new technology. Slayton describes the role of artists in exploring the possibilities and ethical implications of emerging technologies such as genetic engineering, nano-techology, robotics, and artificial life. He describes installations and in-progress work focused on ubiquitous video surveillance. The interview concludes with a discussion of Slayton’s use of the DoWhatDo model for artistic collaboration and of his piece "Conduits," presented in …