Internet Histories最新文献

筛选
英文 中文
“I am an engineer and therefore a radical”: an interview with Lee Felsenstein, from Free Speech Movement technician to Homebrew Computer Club moderator “我是一名工程师,因此也是一名激进分子”:采访李·费尔森斯坦(Lee Felsenstein),他曾是自由言论运动(Free Speech Movement)的技术员,现在是家酿电脑俱乐部(Homebrew Computer Club)的主持人
IF 1.3
Internet Histories Pub Date : 2021-06-09 DOI: 10.1080/24701475.2021.1917903
Julie Momméja
{"title":"“I am an engineer and therefore a radical”: an interview with Lee Felsenstein, from Free Speech Movement technician to Homebrew Computer Club moderator","authors":"Julie Momméja","doi":"10.1080/24701475.2021.1917903","DOIUrl":"https://doi.org/10.1080/24701475.2021.1917903","url":null,"abstract":"Abstract The following interview delves into Lee Felsenstein's upbringing in a bohemian communist family and his path as an engineer and technologist in the San Francisco Bay Area. He discusses his role as technician of the Berkeley Free Speech Movement, co-creator of Community Memory and moderator of the Homebrew Computer Club. Felsenstein also shares his vision of “community”, “convivial tools” as defined by Ivan Illich and technology as an “invisible force”. He proves how his political activism has guided his technological creative process, making and sharing tools that will contribute to build convivial, open and informed communities.","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"190 - 203"},"PeriodicalIF":1.3,"publicationDate":"2021-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2021.1917903","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48849459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wikipedia @ 20, Stories of an Incomplete Revolution, edited by Joseph Reagle and Jackie Koerner, The MIT Press, Cambridge, MA, 2020. U.S. $27.95 维基百科@ 20,《不完全革命的故事》,由约瑟夫·雷格尔和杰基·科尔纳编辑,麻省理工学院出版社,剑桥,马萨诸塞州,2020年。美国27.95美元
IF 1.3
Internet Histories Pub Date : 2021-06-02 DOI: 10.1080/24701475.2021.1932273
Helen Hockx-Yu
{"title":"Wikipedia @ 20, Stories of an Incomplete Revolution, edited by Joseph Reagle and Jackie Koerner, The MIT Press, Cambridge, MA, 2020. U.S. $27.95","authors":"Helen Hockx-Yu","doi":"10.1080/24701475.2021.1932273","DOIUrl":"https://doi.org/10.1080/24701475.2021.1932273","url":null,"abstract":"Wikipedia @ 20 is an edited volume put together by Joseph Reagle and Jackie Koerner to celebrate Wikipedia’s 20th birthday, taking advantage of this significant milestone to pause and reflect on th...","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"6 1","pages":"257 - 261"},"PeriodicalIF":1.3,"publicationDate":"2021-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2021.1932273","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48164400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
From RangKoM and JARING to the Internet: visions and practices of electronic networking in Malaysia, 1983–1996 从RangKoM和JARING到互联网:马来西亚电子网络的愿景和实践,1983-1996
IF 1.3
Internet Histories Pub Date : 2021-05-26 DOI: 10.1080/24701475.2021.1920126
Hallam Stevens
{"title":"From RangKoM and JARING to the Internet: visions and practices of electronic networking in Malaysia, 1983–1996","authors":"Hallam Stevens","doi":"10.1080/24701475.2021.1920126","DOIUrl":"https://doi.org/10.1080/24701475.2021.1920126","url":null,"abstract":"Abstract Early electronic networks were established for a variety of purposes, to serve different kinds of people and needs, and in vastly different political, social, and economic contexts. Examining some of the earliest electronic networks established in Southeast Asia provides us with a glimpse of the contrasting and diverse aims for which they were established and used. At the time electronic networking began to be developed in Malaysia (during the 1980s) its potential was far more open-ended. Although networking pioneers in Southeast Asia were influenced by North American experiences, they quickly developed their own ideas about what networks could be, could do, and how they could serve national or local purposes. This essay uses the concept of a “networking imaginary” to conceptualise the ways in which networks became associated with particular ideals, goals, and futures. The pioneers of electronic networking in Malaysia articulated a unique networking imaginary that anticipated networks playing a critical role in Malaysia’s developing economy. Networking, in the vision of its Malaysian founders, would play a key role in propelling Malaysia forward as a wealthy, stable, and harmonious society. These visions continue to impact the ways in which networks are imagined and used in Malaysia today.","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"230 - 247"},"PeriodicalIF":1.3,"publicationDate":"2021-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2021.1920126","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42392598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital cynical romanticism: Japan’s 2channel and the precursors to online extremist cultures 数字愤世嫉俗的浪漫主义:日本的2频道和网络极端主义文化的先驱
IF 1.3
Internet Histories Pub Date : 2021-05-07 DOI: 10.1080/24701475.2021.1919966
Brett J. Fujioka, J. DeCook
{"title":"Digital cynical romanticism: Japan’s 2channel and the precursors to online extremist cultures","authors":"Brett J. Fujioka, J. DeCook","doi":"10.1080/24701475.2021.1919966","DOIUrl":"https://doi.org/10.1080/24701475.2021.1919966","url":null,"abstract":"Abstract In the West, the concern surrounding the rise of online harassment, trolling and other malicious and antisocial behaviors tend to be hyper focused on websites like 4chan, 8chan and reddit. However, the rise of online hate culture that laid the groundwork for movements like Gamergate and the alt right has a precedent in Japan – specifically, the culture that was borne out of the 2channel text board, which was the inspiration for the American 4chan. As society decayed around many Japanese in the 1990s (an economic recession, terrorist attacks, earthquakes, to name a few events), the Internet came to prominence in the form of Bulletin Board Systems. Despite its lasting impact and influence on digital culture more globally, it is understudied and ignored in larger discussions around trolling, harassment, and online hate. Using a case study of the anti-Korean manga Kenkanryu and through the lens of Cynical Romanticism, this essay examines the ways that 2channel and the netto uyoku (the Japanese extreme far right) created a digital subculture that has had a lasting impact on global online hate. Though the netto uyoku never achieved significant successes in terms of actual societal and political change, what they did leave behind is a blueprint for online reactionaries.","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"287 - 303"},"PeriodicalIF":1.3,"publicationDate":"2021-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2021.1919966","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47407427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The mediated and mediatised justice-seeking: Chinese digital vigilantism from 2006 to 2018 调解与调停的司法诉求:2006年至2018年的中国数字私刑
IF 1.3
Internet Histories Pub Date : 2021-04-29 DOI: 10.1080/24701475.2021.1919965
Qian Huang
{"title":"The mediated and mediatised justice-seeking: Chinese digital vigilantism from 2006 to 2018","authors":"Qian Huang","doi":"10.1080/24701475.2021.1919965","DOIUrl":"https://doi.org/10.1080/24701475.2021.1919965","url":null,"abstract":"Abstract The Chinese Internet has developed rapidly in the past decade and given rise to many online phenomena, including digital vigilantism (DV). It refers to citizens’ practice of weaponising online visibility for retaliation when collectively offended. In China, since the Cat Torture Case in 2006, DV has been widely adopted by citizens to defend social norms and values. With recent technological developments and socio-political changes in China, how Chinese citizens conduct DV and its influence have also changed along various dimensions. This research, therefore, identifies the historical changes of DV in China and situates these changes in relation to contemporary Chinese technological and socio-political development. The study constructs a database of 1265 Chinese DV cases that receive media coverage between 2006 to 2018 and conducts a thematic analysis to identify characteristics, changes, and trends of DV in China. The author argues that these developments demonstrate the mediation and more importantly, the mediatisation of justice-seeking on the Chinese Internet conditioned by the ubiquitous state power.","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"304 - 322"},"PeriodicalIF":1.3,"publicationDate":"2021-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2021.1919965","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43882785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
If Then: How the Simulmatics Corporation Invented the Future 《如果那时:模拟公司如何创造未来
IF 1.3
Internet Histories Pub Date : 2021-02-05 DOI: 10.1080/24701475.2021.1878651
Dan M. Kotliar
{"title":"If Then: How the Simulmatics Corporation Invented the Future","authors":"Dan M. Kotliar","doi":"10.1080/24701475.2021.1878651","DOIUrl":"https://doi.org/10.1080/24701475.2021.1878651","url":null,"abstract":"","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"204 - 206"},"PeriodicalIF":1.3,"publicationDate":"2021-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2021.1878651","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46371611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Interview with Aleksandra Kaminska Aleksandra Kaminska访谈
IF 1.3
Internet Histories Pub Date : 2021-01-22 DOI: 10.1080/24701475.2021.1878650
Maria Eriksson, Guillaume Heuguet
{"title":"Interview with Aleksandra Kaminska","authors":"Maria Eriksson, Guillaume Heuguet","doi":"10.1080/24701475.2021.1878650","DOIUrl":"https://doi.org/10.1080/24701475.2021.1878650","url":null,"abstract":"Aleksandra Kaminska is an Assistant Professor in the Department of Communication at the Universit e de Montr eal, Canada, where she also co-directs the Artefact Lab and the Bricolab. Her research is based in media studies and aesthetics, and the history of technology. She is currently preparing High-Tech Paper: Security Printing and the Aesthetics of Trust, a monograph that examines the making of authentic paper for circulation in secure systems and infrastructures. She situates security printing within media and printing histories, but also as it intersects with art, craft, and design. Her work on authentication devices includes the production of Nano-verses (nano-verses.com), an art-sci collaboration that explored how the technology of nano-optical authentication can be rethought as artistic media. The articles discussed in the following interview are: “Storing Authenticity at the Surface and into the Depths: Securing Paper with Humanand Machine-Readable Devices” (Interm edialit es, 2018); “‘Don’t Copy That’: Security Printing and the Making of High-Tech Paper” (Convergence, 2019); and “The Intrinsic Value of Valuable Paper: On the Infrastructural Work of Authentication Devices” (Theory, Culture & Society, 2020). She recently co-edited an issue of PUBLIC: Art/Culture/Ideas on “Biometrics: Mediating Bodies” (2020), and is currently finalizing a co-edited volume of the Canadian Journal of Communication on the theme of “Materials and Media of Infrastructure.” In 2020–2021 she is co-organizing the online series Paperology: A Reading and Activity Group on Knowing and Being with Paper. Your work centers on efforts to secure the authenticity and identity of things and highlights how material standards contribute to the ordering of the world. In much of your writings, you place focus on techniques for identifying analog objects such as money and documents/valuable paper but we have also found your work to be highly stimulating for thinking about efforts to identify digital content like moving images and sounds. In “Storing Authenticity at the Surface and into the Depths” you introduce the concept of “authentication devices” to discuss the role and function of identification techniques. Could you explain a bit more about what you mean by this concept and how/ why you think it is useful for thinking about strategies of identification?","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"57 - 70"},"PeriodicalIF":1.3,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2021.1878650","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46486460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Genealogies of online content identification - an introduction 在线内容识别的家谱-简介
IF 1.3
Internet Histories Pub Date : 2021-01-21 DOI: 10.1080/24701475.2021.1878649
Maria Eriksson, Guillaume Heuguet
{"title":"Genealogies of online content identification - an introduction","authors":"Maria Eriksson, Guillaume Heuguet","doi":"10.1080/24701475.2021.1878649","DOIUrl":"https://doi.org/10.1080/24701475.2021.1878649","url":null,"abstract":"In today’s digital landscape, cultural content such as texts, films, images, and recorded sounds are increasingly subjected to automatic (or semi-automatic) processes of identification and classification. On a daily basis, spam filters scan swaths of emails in order to separate legit and illegitimate textual messages (Brunton, 2013), algorithms analyze years of user-uploaded film on YouTube in search for copyright violations (Heuguet, 2019), and software systems are deployed to scrutinize millions of images on social media sites in order to detect sexually offensive content (Liao, 2018). These examples reveal how machines and algorithmic systems are increasingly utilized to make complex judgments regarding cultural content. Indeed, it could be argued that the wideranging adoption of content identification systems is constructing new ontologies of culture and regimes of truth in the online domain. When put to action, content identification systems are trusted with the ability to separate good/bad and legal/illegal forms of communication and used to secure the singularity, value, authenticity, origin, and ownership of content. Such efforts are deeply embedded in constructions of knowledge, new forms of political governance, and not least global market transactions. Content identification tools now make up an essential part of the online data economy by protecting the interests of rights holders and forwarding the mathematization, objectification, and commodification of cultural productions. Parallel to their increased pervasiveness and influence, however, content identification systems have also been increasingly contested. Debates regarding automatic content identification tools recently gained momentum due to the European Union’s decision to update its copyright laws. A newly adopted EU directive encourages all platform owners to implement automatic content filters to safeguard copyrights (Spangler, 2019) and critics have argued that such measures run the risk of seriously hampering the freedom of speech and stifling cultural expressions online (e.g., Kaye, 2018). A wide range of high profile tech figures (such as Tim Berners Lee, commonly known as one of the founders of the World Wide Web) have even warned that the widespread adoption of pre-emptive content identification systems could effectively destroy the internet as we know it (Cerf et al., 2018). Content identification systems, then, are not neutral devices but key sites where the moral, juridical, economical, and","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"1 - 7"},"PeriodicalIF":1.3,"publicationDate":"2021-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2021.1878649","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49367129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Google’s Post-IPO Development: risks, rewards, and shareholder value b谷歌上市后的发展:风险、回报和股东价值
IF 1.3
Internet Histories Pub Date : 2021-01-06 DOI: 10.1080/24701475.2020.1864959
Paško Bilić, Toni Prug
{"title":"Google’s Post-IPO Development: risks, rewards, and shareholder value","authors":"Paško Bilić, Toni Prug","doi":"10.1080/24701475.2020.1864959","DOIUrl":"https://doi.org/10.1080/24701475.2020.1864959","url":null,"abstract":"Abstract Internet history shows that states, military, universities and other public institutions were essential drivers of innovation in the early stages of network development. However, once risky stages pass, commercialisation starts and investors often reap disproportionate rewards from technological innovation. In this paper, we use the risk-reward nexus (RRN) approach (Lazonick & Mazzucato, 2013; Mazzucato, 2013, 2018; Mazzucato & Shipman, 2014) to understand the imbalance between risky public investment and private allocation of rewards regulated by financial markets. We analyse risk reporting in Form 10-K market reports submitted to the Securities and Exchange Commission (SEC) by Google Inc. (Alphabet Inc.) for the period between 2005 and 2019. We detected 58 organisational, marketing and advertising, technological, legal, competitive, and macroeconomic risks. Based on changes in risk reporting three stages of Google’s development can be discerned: post-IPO growth and expansion (2005-2008), growth management and investment diversification (2009-2013), legal struggles and regulatory scrutiny (2014-2019). Reported risks are primarily directed at shareholders, omitting risks relating to internet users, courts, regulators, and nation states. Such an approach is historically rooted in the construction of financial regulation in the name of public interests and markets, with public interests largely interpreted as a proxy for investors’ interests.","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"171 - 189"},"PeriodicalIF":1.3,"publicationDate":"2021-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2020.1864959","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48728738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The media epistemic value of sonic analytics tools. A commentary 声音分析工具的媒介认知价值。一篇评论
IF 1.3
Internet Histories Pub Date : 2020-12-14 DOI: 10.1080/24701475.2020.1862528
W. Ernst
{"title":"The media epistemic value of sonic analytics tools. A commentary","authors":"W. Ernst","doi":"10.1080/24701475.2020.1862528","DOIUrl":"https://doi.org/10.1080/24701475.2020.1862528","url":null,"abstract":"Abstract While automatized content identification of audio data, in critical discourse analysis, is bound to the symbolic order of monitoring, control, surveillance, censorship and copyright protection, the very tools and algorithms which have been developed for such purposes can be turned into instruments of knowledge production in the scientific sense. Audio content identification is not simply an extension of cultural taxonomies to machine listening, but an operation with its own eigen knowledge. Audio content identification is not simply a continuation of analog techniques for monitoring sonic objects. From a media-epistemological perspective, new forms of audio content identification open different orders of the sonic archive. What is practiced in the online domain has been preceded by experimental investigations of archival storage. The real l'archive, though, are the technological (hardware) and mathematical (software) criteria defining content identification. A media archaeology of audio content identification reveals the technological l'archive governing such forms of enunciation.","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"48 - 56"},"PeriodicalIF":1.3,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2020.1862528","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41595063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信