Search

Search content of the knowledge base.

The search found 11 results in 0.009 seconds.

Search results

  1. Spamology

    Spamology is a live audiovisual representation of word frequencies in spam e-mail messages.

    The visualization is based on analysis of a private archive of spam messages which were collected during 10 years (1998-2007), containing up to 2,000,000 emails originated from various parts of the world. Spam data is visualized in a 3D landscape, where popular words are represented as rectangular structures of various heights, illustrating the occurrence rate of each word in the archive year. Next to the visual representation, each word generates an audio signal with a frequency related to the number of times it occurred during a certain year. Words of various frequencies flow through the 3D landscape simultaneously, forming a constantly-changing sonic texture.

    Spamology is a part of ongoing research examining the nature of Spam as a digital-cultural phenomenon. The project aims at visualizing the links and interrelationships between the contents of spam, the user/ individual and the society, by revealing patterns which may reflect cultural and social trends, behaviors and variations. 

    Scott Rettberg - 11.10.2011 - 13:43

  2. Urgent Request

    The work Urgent Request tells the story of a man, Kim, who left society and money behind to live an ascetic life in Seoul. By telling this story Young-hae Chang Heavy Industries asks the reader for money, as then the reader will have learned a valuable lesson and helped YHCHI at the same time. At the end of the work it is possible to click donate and the reader is directed to Paypal.

    The style of the work resembles that of a spam mail which promises a better life in exchange for a sum of money.

    Meri Alexandra Raita - 12.10.2011 - 22:06

  3. Typeoms

    Author's description:

    TYPEOMS are generated from code tht conjoins fragments and spam.

    Every TYPEOM includes one typo I made in the last 6 months.

    Each typo is provided with a plausible definition.

    (Source: Typeom project page)

    Scott Rettberg - 25.08.2012 - 13:23

  4. What Spam Means to Network Situationism

    In this essay we describe and theorize upon a spam data set hidden in the source code of HTML pages at the Bureau of Public Secrets, a website housing English translations of the Situationist manifestos and communiqués.

    We attempt to build upon a fruitful coincidence: what happens when internet interventionists, “code taggers” on a lucrative Spam mission, meet interventionists of the analog era, Situationist "wall taggers”? The textuality of both groups is aimed at reaching efficiency in a networked structure, be it socially or algorithmically coded; both engage a material and performative inscription so as to activate their discourse (i.e. to make it more efficient).

    We witness the action of a mode of writing modeled on graffiti and following the Situationist axiom: “Slogans To Be Spread Now By Every Means.” By focusing on the comparable gesture of verbal propagation (slogans and spam lexicon as social viruses) and the instructional performativity of these texts, we trace a set of theories based on the fiction that Spammers and Situationists have appropriated one another’s tactics.

    (Source: Authors' introduction)

    Scott Rettberg - 30.01.2013 - 21:06

  5. Spam Heart

    This generative poem is built from “spam, code, thesis work, and a little bit of language’s heart.” Each part of the poem is organized into three strophes: the first one uses a larger font, the second one consists of a single word, and the third uses three words. Upon opening the poem, the first strophe is selected randomly from a dataset, after which it begins a sequence that reads coherently from one textual generation to the next. The second and third strophes are always independently randomly selected from their datasets, creating new textual combinations with the constant sequence in the first strophe. (Source: Leonardo Flores, I ♥ E-Poetry)

    Hannelen Leirvåg - 08.02.2013 - 15:32

  6. Spam Poem for Paul Graham

    his poem is inspired on spam (unsolicited commercial mail), the “wars” that have developed around them, their impact on language generated for distribution in digital environments, and the poetry that can result from such dynamics. The poem’s paratext links to a 2002 essay by Graham that proposes “naive Bayesian filters” to identify language patterns in spam and produce effective filters with low false positives. Poundstone notes that the response from spammers was to shift tactics to generating more “poetic” messages, along with mining literary texts for human generated language and language patterns. (Source: Leonardo Flores, I ♥ E-Poetry)

    Hannelen Leirvåg - 08.02.2013 - 19:50

  7. SP_/\_M s.o.n.n.e.t

    Teo Spiller new net.art project "SP/\\M sonnet" enters those subjects and the names of spam mail senders into a database and writes sonnets. They are composed from junk mail subjects, listed by order, depending on time of visit and of your personal and technical data, received by visiting SP/\\M Sonnet. The result is a real surprise! taken from http://www.furtherfield.org/reviews/spm-sonnet-2004

    Dan Kvilhaug - 18.03.2013 - 15:21

  8. Failure, A Writer's Life

    Failure, A Writer’s Life is a catalogue of literary monstrosities. Its loosely organized vignettes and convolutes provide the intrepid reader with a philosophy for the unreadable, a consolation for the ignored, and a map for new literary worlds. "The unfinished, unreadable, unpublishable — the scribbled and illegible, the too slowly published, the countless unpublished, all that does not seem to count at all. . . . here lie all manner of ruins. From Marguerite Duras to Google Maps, Henri Bergson to H.P. Lovecraft, Orson Welles to Walter Benjamin to a host of literary ambulance drivers (not to mention the FBI, UFOs, and UbuWeb), _Failure, A Writer's Life_ charts empty spaces and occupied libraries, searches databases bereft of filters, files spam and porn and weather reports into their respective _konvoluts_, and realizes the full potential of cultural inscription. In a series of snapshots concatenated in the best surrealist mode, Milutis has curated a catalogue of curiosities as essential to understanding our current cultural condition as they are eccentric.

    Joe Milutis - 06.11.2014 - 10:23

  9. Trust, representation and use of storytelling in online scams

    Andreas Zingerle, from the University of Linz, visited Digital Culture at the University of Bergen on an Erasmus teacher exchange in week 8 of 2015. Zingerle presented his research on February 16 and also gave a workshop on February 18.

    Zingerle writes:

    My work focuses on human computer and computer mediated human-human interaction with a special interest in transmedia and interactive storytelling. Since 2010 I collaborate with Linda Kronman as the artist group 'kairus.org'. We have worked with the thematic of internet fraud and online scams, constantly shifting our focus and therefore approaching the theme from a number of perspectives like: data security, ethics of vigilante communities, narratives of scam e-mails, scam & technologies. Research subjects are online scammers, vigilante communities of scambaiters and their use of storytelling and technology.

    Alvaro Seica - 17.02.2015 - 14:46

  10. Zombification: The Living Dead in Spam

    Zombification describes computational processes of production, addressing the mutable quality of automation. Spam consists of mutating identities. It is continuously and seamlessly produced yet temporarily exists in the network through computation. This temporal existence of the living dead, as I argue, encompasses code automation – an undead and repetitive writing process where a parameters’ value is constantly mutating. However, zombification does not only examine the technical dimension of computational processes. This paper tries to articulate the mutable quality at the coding layer, examining its surrounding forces, such as the interface format of a mail server and an email address, the consumption techniques of email addresses, the parameters and values of a software program, and the repetitiveness and undeadness of writing. Thinking from such material and technical aspects of spam, particularly mutability, we gain a better understanding of spam culture that is associated with its mutating identity, including regulatory controls, loopholes, labour practices, digital consumption and datafication.

    Alvaro Seica - 25.02.2015 - 12:03

Pages