SlideShare uma empresa Scribd logo
1 de 15
Baixar para ler offline
Digital Aspects
                             CCR 747 ::: S13




Wednesday, March 6, 13
Collin Brooke



Wednesday, March 6, 13
I assume this scholar
                               needs little
                              introduction.



Wednesday, March 6, 13
solitude



Wednesday, March 6, 13
material aspects



Wednesday, March 6, 13
...anyone can be an author, if the understanding of
                  publishing is limited to the admittedly narrow criterion
                  of “making public.” ... Anyone can be an author, but not
                  everyone can be an Author. (93)




Wednesday, March 6, 13
authoring metadata (95-97)



Wednesday, March 6, 13
readers writing the text



Wednesday, March 6, 13
In these various screen-based textualities, authorship is
               less a matter of asserting a thesis or a plot than it is of
               providing a range of possibilities. In this way, the act of
               reading becomes more akin to actualization (and
               choice) rather than simple consumption.
               Correspondingly, the author of such text is responsible
               for a range of possibilities, a range that might be judged
               according to variety or flexibility instead of clarity,
               brevity, or sincerity. And texts themselves are
               performed processes of interactions rather than
               objects. (98)




Wednesday, March 6, 13
Jessica Reyman
                         Associate Professor
                         Northern Illinois University




Wednesday, March 6, 13
user-generated metadata



Wednesday, March 6, 13
User data, then, is not seen as created by an author-
               user, but rather as a by-product of technological
               algorithms and aggregation formulas. The means, terms,
               and applications of user contributions are not
               controlled by the authors of those contributions, but by
               technology companies that seek to harness them for
               commercial ends... Current data-mining practices
               prevent author-users from controlling the creation,
               distribution, and uses of their work. ...




Wednesday, March 6, 13
The data itself isn’t viewed as the result of human
               creativity or effort. Technology companies and data
               brokers, in this sense, are taking something that has
               little or no value as separate, individual data points and
               creating something of commercial value by aggregating
               and interpreting it. Such appropriation is based on the
               assumptions that data as property is separable and
               unique from individual users’ creative activities on the
               social and participatory web and further that data is a
               technology-generated by product. As authorless
               objects, the argument goes, data has little value until it
               is aggregated and transformed into massive data sets
               and applied toward target marketing and customization
               of services (524)


Wednesday, March 6, 13
Feist Publications vs Rural Telephone
                         (data vs content)




Wednesday, March 6, 13
Understanding data as objective facts, and, further, as
               unowned property, works to remove users from a
               creative role in its production. What such a distinction
               neglects to address, however, is that user data is a form
               of user contribution that is inextricably bound to an
               author-user’s content creations: the generation of data
               is tied--by user, time, activity, and technology--to the
               production of content, and vice versa (525).




Wednesday, March 6, 13

Mais conteúdo relacionado

Semelhante a Authorship: Digital and Database

‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...eraser Juan José Calderón
 
Big Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for ActionBig Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for ActionThe Rockefeller Foundation
 
The Role of Social Networking in Securing Cyberspace
The Role of Social Networking in Securing CyberspaceThe Role of Social Networking in Securing Cyberspace
The Role of Social Networking in Securing CyberspaceJoe Billingsley
 
Databanking
DatabankingDatabanking
Databankingpubly
 
Designing for Usable Security and Privacy
Designing for Usable Security and PrivacyDesigning for Usable Security and Privacy
Designing for Usable Security and PrivacyCori Faklaris
 
Don't let data get in the way of a good story
Don't let data get in the way of a good storyDon't let data get in the way of a good story
Don't let data get in the way of a good storymark madsen
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online socialijsptm
 
sxsw-interactive-festival-2013)
sxsw-interactive-festival-2013)sxsw-interactive-festival-2013)
sxsw-interactive-festival-2013)Kristin Milburn
 
Multimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorMultimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorIAEME Publication
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsTimothy Holborn
 
Data provenance - world in 2030
Data provenance -  world in 2030Data provenance -  world in 2030
Data provenance - world in 2030Future Agenda
 
Data Anonymization for Privacy Preservation in Big Data
Data Anonymization for Privacy Preservation in Big DataData Anonymization for Privacy Preservation in Big Data
Data Anonymization for Privacy Preservation in Big Datarahulmonikasharma
 
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...g8briel
 
Telling stories about (re)search: research practices reconfigured by digital ...
Telling stories about (re)search: research practices reconfigured by digital ...Telling stories about (re)search: research practices reconfigured by digital ...
Telling stories about (re)search: research practices reconfigured by digital ...Berber Hagedoorn
 
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...IJITE
 
LyonALMProposal20041018.doc
LyonALMProposal20041018.docLyonALMProposal20041018.doc
LyonALMProposal20041018.docbutest
 

Semelhante a Authorship: Digital and Database (20)

Seeing and talking about Big Data, Farida Vis, AHRC Subject Assocations
Seeing and talking about Big Data, Farida Vis, AHRC Subject AssocationsSeeing and talking about Big Data, Farida Vis, AHRC Subject Assocations
Seeing and talking about Big Data, Farida Vis, AHRC Subject Assocations
 
‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...
 
Big Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for ActionBig Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for Action
 
CSS-Intro-Lecture.pdf
CSS-Intro-Lecture.pdfCSS-Intro-Lecture.pdf
CSS-Intro-Lecture.pdf
 
The Role of Social Networking in Securing Cyberspace
The Role of Social Networking in Securing CyberspaceThe Role of Social Networking in Securing Cyberspace
The Role of Social Networking in Securing Cyberspace
 
Databanking
DatabankingDatabanking
Databanking
 
Designing for Usable Security and Privacy
Designing for Usable Security and PrivacyDesigning for Usable Security and Privacy
Designing for Usable Security and Privacy
 
Don't let data get in the way of a good story
Don't let data get in the way of a good storyDon't let data get in the way of a good story
Don't let data get in the way of a good story
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online social
 
sxsw-interactive-festival-2013)
sxsw-interactive-festival-2013)sxsw-interactive-festival-2013)
sxsw-interactive-festival-2013)
 
Multimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorMultimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behavior
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
 
Data provenance - world in 2030
Data provenance -  world in 2030Data provenance -  world in 2030
Data provenance - world in 2030
 
Data Anonymization for Privacy Preservation in Big Data
Data Anonymization for Privacy Preservation in Big DataData Anonymization for Privacy Preservation in Big Data
Data Anonymization for Privacy Preservation in Big Data
 
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
 
Telling stories about (re)search: research practices reconfigured by digital ...
Telling stories about (re)search: research practices reconfigured by digital ...Telling stories about (re)search: research practices reconfigured by digital ...
Telling stories about (re)search: research practices reconfigured by digital ...
 
2053951715611145
20539517156111452053951715611145
2053951715611145
 
Abreu portfolio
Abreu portfolioAbreu portfolio
Abreu portfolio
 
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
 
LyonALMProposal20041018.doc
LyonALMProposal20041018.docLyonALMProposal20041018.doc
LyonALMProposal20041018.doc
 

Mais de Krista Kennedy

Authorship: Appropriation
Authorship: AppropriationAuthorship: Appropriation
Authorship: AppropriationKrista Kennedy
 
The Copyright Thing Doesn't Work Here, 2
The Copyright Thing Doesn't Work Here, 2The Copyright Thing Doesn't Work Here, 2
The Copyright Thing Doesn't Work Here, 2Krista Kennedy
 
The Copyright Thing Doesn't Work Here, Part 1
The Copyright Thing Doesn't Work Here, Part 1The Copyright Thing Doesn't Work Here, Part 1
The Copyright Thing Doesn't Work Here, Part 1Krista Kennedy
 
Distributed Collaboration
Distributed CollaborationDistributed Collaboration
Distributed CollaborationKrista Kennedy
 
Authorship: Copyleft Basics
Authorship: Copyleft BasicsAuthorship: Copyleft Basics
Authorship: Copyleft BasicsKrista Kennedy
 
Authorship Seminar: Intellectual Property Basics
Authorship Seminar:  Intellectual Property BasicsAuthorship Seminar:  Intellectual Property Basics
Authorship Seminar: Intellectual Property BasicsKrista Kennedy
 
Authorship Seminar: The Signature
Authorship Seminar:  The SignatureAuthorship Seminar:  The Signature
Authorship Seminar: The SignatureKrista Kennedy
 
Authorship Seminar: Bot-Written Texts
Authorship Seminar: Bot-Written TextsAuthorship Seminar: Bot-Written Texts
Authorship Seminar: Bot-Written TextsKrista Kennedy
 
Intellectual property basics
Intellectual property basicsIntellectual property basics
Intellectual property basicsKrista Kennedy
 
Authorship: Rhet/Comp Perspectives
Authorship: Rhet/Comp PerspectivesAuthorship: Rhet/Comp Perspectives
Authorship: Rhet/Comp PerspectivesKrista Kennedy
 
Authorship: Feminist Perspectives
Authorship: Feminist PerspectivesAuthorship: Feminist Perspectives
Authorship: Feminist PerspectivesKrista Kennedy
 
Social Bookmarking w/ Diigo
Social Bookmarking w/ DiigoSocial Bookmarking w/ Diigo
Social Bookmarking w/ DiigoKrista Kennedy
 
Authorship belletristic modern
Authorship belletristic modernAuthorship belletristic modern
Authorship belletristic modernKrista Kennedy
 
Basic project management
Basic project managementBasic project management
Basic project managementKrista Kennedy
 
18c Perspectives on Authorship, Part III
18c Perspectives on Authorship, Part III18c Perspectives on Authorship, Part III
18c Perspectives on Authorship, Part IIIKrista Kennedy
 
18c Perspectives on Authorship, Part II
18c Perspectives on Authorship, Part II18c Perspectives on Authorship, Part II
18c Perspectives on Authorship, Part IIKrista Kennedy
 
Second Sophistic, Medieval, and Renaissance Views on Authorship
Second Sophistic, Medieval, and Renaissance Views on AuthorshipSecond Sophistic, Medieval, and Renaissance Views on Authorship
Second Sophistic, Medieval, and Renaissance Views on AuthorshipKrista Kennedy
 
Crowdsourcing and the Future of Work
Crowdsourcing and the Future of WorkCrowdsourcing and the Future of Work
Crowdsourcing and the Future of WorkKrista Kennedy
 

Mais de Krista Kennedy (20)

Authorship: Appropriation
Authorship: AppropriationAuthorship: Appropriation
Authorship: Appropriation
 
The Copyright Thing Doesn't Work Here, 2
The Copyright Thing Doesn't Work Here, 2The Copyright Thing Doesn't Work Here, 2
The Copyright Thing Doesn't Work Here, 2
 
The Copyright Thing Doesn't Work Here, Part 1
The Copyright Thing Doesn't Work Here, Part 1The Copyright Thing Doesn't Work Here, Part 1
The Copyright Thing Doesn't Work Here, Part 1
 
Distributed Collaboration
Distributed CollaborationDistributed Collaboration
Distributed Collaboration
 
Authorship: Copyleft Basics
Authorship: Copyleft BasicsAuthorship: Copyleft Basics
Authorship: Copyleft Basics
 
Authorship Seminar: Intellectual Property Basics
Authorship Seminar:  Intellectual Property BasicsAuthorship Seminar:  Intellectual Property Basics
Authorship Seminar: Intellectual Property Basics
 
Authorship Seminar: The Signature
Authorship Seminar:  The SignatureAuthorship Seminar:  The Signature
Authorship Seminar: The Signature
 
Authorship Seminar: Bot-Written Texts
Authorship Seminar: Bot-Written TextsAuthorship Seminar: Bot-Written Texts
Authorship Seminar: Bot-Written Texts
 
Intellectual property basics
Intellectual property basicsIntellectual property basics
Intellectual property basics
 
Authorship: Rhet/Comp Perspectives
Authorship: Rhet/Comp PerspectivesAuthorship: Rhet/Comp Perspectives
Authorship: Rhet/Comp Perspectives
 
Authorship: Feminist Perspectives
Authorship: Feminist PerspectivesAuthorship: Feminist Perspectives
Authorship: Feminist Perspectives
 
Social Bookmarking w/ Diigo
Social Bookmarking w/ DiigoSocial Bookmarking w/ Diigo
Social Bookmarking w/ Diigo
 
Authorship belletristic modern
Authorship belletristic modernAuthorship belletristic modern
Authorship belletristic modern
 
Authorship 20c
Authorship 20cAuthorship 20c
Authorship 20c
 
Basic project management
Basic project managementBasic project management
Basic project management
 
18c Perspectives on Authorship, Part III
18c Perspectives on Authorship, Part III18c Perspectives on Authorship, Part III
18c Perspectives on Authorship, Part III
 
18c Perspectives on Authorship, Part II
18c Perspectives on Authorship, Part II18c Perspectives on Authorship, Part II
18c Perspectives on Authorship, Part II
 
Info arch
Info archInfo arch
Info arch
 
Second Sophistic, Medieval, and Renaissance Views on Authorship
Second Sophistic, Medieval, and Renaissance Views on AuthorshipSecond Sophistic, Medieval, and Renaissance Views on Authorship
Second Sophistic, Medieval, and Renaissance Views on Authorship
 
Crowdsourcing and the Future of Work
Crowdsourcing and the Future of WorkCrowdsourcing and the Future of Work
Crowdsourcing and the Future of Work
 

Authorship: Digital and Database

  • 1. Digital Aspects CCR 747 ::: S13 Wednesday, March 6, 13
  • 3. I assume this scholar needs little introduction. Wednesday, March 6, 13
  • 6. ...anyone can be an author, if the understanding of publishing is limited to the admittedly narrow criterion of “making public.” ... Anyone can be an author, but not everyone can be an Author. (93) Wednesday, March 6, 13
  • 8. readers writing the text Wednesday, March 6, 13
  • 9. In these various screen-based textualities, authorship is less a matter of asserting a thesis or a plot than it is of providing a range of possibilities. In this way, the act of reading becomes more akin to actualization (and choice) rather than simple consumption. Correspondingly, the author of such text is responsible for a range of possibilities, a range that might be judged according to variety or flexibility instead of clarity, brevity, or sincerity. And texts themselves are performed processes of interactions rather than objects. (98) Wednesday, March 6, 13
  • 10. Jessica Reyman Associate Professor Northern Illinois University Wednesday, March 6, 13
  • 12. User data, then, is not seen as created by an author- user, but rather as a by-product of technological algorithms and aggregation formulas. The means, terms, and applications of user contributions are not controlled by the authors of those contributions, but by technology companies that seek to harness them for commercial ends... Current data-mining practices prevent author-users from controlling the creation, distribution, and uses of their work. ... Wednesday, March 6, 13
  • 13. The data itself isn’t viewed as the result of human creativity or effort. Technology companies and data brokers, in this sense, are taking something that has little or no value as separate, individual data points and creating something of commercial value by aggregating and interpreting it. Such appropriation is based on the assumptions that data as property is separable and unique from individual users’ creative activities on the social and participatory web and further that data is a technology-generated by product. As authorless objects, the argument goes, data has little value until it is aggregated and transformed into massive data sets and applied toward target marketing and customization of services (524) Wednesday, March 6, 13
  • 14. Feist Publications vs Rural Telephone (data vs content) Wednesday, March 6, 13
  • 15. Understanding data as objective facts, and, further, as unowned property, works to remove users from a creative role in its production. What such a distinction neglects to address, however, is that user data is a form of user contribution that is inextricably bound to an author-user’s content creations: the generation of data is tied--by user, time, activity, and technology--to the production of content, and vice versa (525). Wednesday, March 6, 13