Difference between revisions of "User:Jeanine Verloop/minor q14 research"

From DigitalCraft_Wiki
Jump to navigation Jump to search
 
(200 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
<center><br/><br/><br/>
 
<center><br/><br/><br/>
'''<span style='color:white; font-size:30px; background:black;'> >>> research <<< </span>'''<br><br>
+
'''<span style='color:white; font-size:30px; background:black;'> >>> research paper <<< </span>'''<br><br>
<span style='color:black; font-size:30px;'>echo chamber</span>
+
<span style='color:black; font-size:30px;'>weapons of data destruction</span>
 
<br/><br/>
 
<br/><br/>
  
'''<span style='font-size:16px;'> QUARTER 14 <br><br>[[User:Jeanine_Verloop/minor_q14_research |  research]] <br>[[User:Jeanine_Verloop/minor_q14_experiment | experiments ]] <br>[[User:Jeanine_Verloop/minor_q14_result | RESULTS ]]'''
+
'''<span style='font-size:16px;'> QUARTER 14 <br><br>[[User:Jeanine_Verloop/minor_q14_research |  paper]] <br>[[User:Jeanine_Verloop/minor_q14_experiment | references ]] <br>[[User:Jeanine_Verloop/minor_q14_result | PICTURES ]]'''
 
<br/><br><br/>
 
<br/><br><br/>
 
'''Collaborators<br><br> THARIM CORNELISSE<br>Major // illustration <br>[[User:Tharim | PAGE THARIM]]<br><br><br>JEANINE VERLOOP<br> Major // illustration <br>[[User:Jeanine | PAGE JEANINE]]<br>'''
 
'''Collaborators<br><br> THARIM CORNELISSE<br>Major // illustration <br>[[User:Tharim | PAGE THARIM]]<br><br><br>JEANINE VERLOOP<br> Major // illustration <br>[[User:Jeanine | PAGE JEANINE]]<br>'''
Line 12: Line 12:
  
 
==Forward/Introduction==
 
==Forward/Introduction==
<span style='width:40em;display:block;'>
+
<br>
(tell us about yourself and your practice)
+
<span style='width:40em;display:block; font-size:18px;'>
 +
'''Tharim is the digital, Jeanine is the craft.'''
 
</span>
 
</span>
  
 +
<span style='width:40em;display:block;'>
 +
Where Jeanine is running in material stations, Tharim likes to stare at his screen for hours.
 +
We teamed up because we complement each others flaws and because of our shared view on art, aesthetics and technology.
 +
We don't consider ourselves classic illustrators and feel a strong urge to work with interesting techniques and materials.
 +
<br>
 +
<br>
 +
Based on these shared ideals we worked as a team on this project.
 +
<span style='width:40em;display:block;'>
 +
<br>
  
 
==Abstract==
 
==Abstract==
<span style='width:50em;display:block;'>
+
<span style='width:40em;display:block; font-size:18px;'>
 +
<br>
 +
'''Social media is getting more and more accurate in showing you what it thinks you want and believe. It creeps us out because the algorithm used is under the surface, we see no physical explanation. Because of this people are feeling watched and not safe. And so we gather around the campfire, telling stories of the modern boogieman lurking in the shadows of our devices, spying and gathering information.
 +
'''
 +
<br>
 
<br>
 
<br>
'''In sharing our voices, the physical and the abstract, we search for echoes of ourselves. We locate our position by bouncing our thoughts on fellow people.  In this landscape a truth is created when enough people say so. Things are not to be understood, but to be believed.'''
+
'''Within this conflict we fought a small battle. Our weapons of choice: tactile and understandable devices, which create dirty data.'''
<br><br>
 
'''Social media is getting more and more accurate in showing you what you want and believe. It creeps us out because there is no physical explanation. People are feeling watched and not save. And so we gather around the campfire, telling stories of the modern boogieman lurking in the shadows of our devices, spying and gathering information. Creating and corrupting our echoes.'''
 
<br><br>
 
'''In light of this we created several, tactile and understandable, devices which confirm specific allegations against social media.'''
 
 
</span>
 
</span>
 
<br>
 
<br>
Line 30: Line 40:
 
==Central Question==
 
==Central Question==
 
<br/><br/><br/>
 
<br/><br/><br/>
'''<span style='color:white; font-size:30px; background:black;'> What is the authenticity and, or plausibility <br><br> of the Echo Chamber and it’s solutions? </span>'''<br><br><br>
+
'''<span style='color:white; font-size:30px; background:black;'> How does the individual cope with data farming <ref name="Data farming"> reference, data farming, [http://digitalcraft.wdka.nl/wiki/User:Jeanine_Verloop/minor_q14_experiment#Data_as_currency wiki reference page]</ref>? </span>'''<br><br><br>
  
 
==Relevance of the Topic==
 
==Relevance of the Topic==
 +
 
<span style='width:50em;display:block;'>
 
<span style='width:50em;display:block;'>
(why is this worth pursuing? explain the urgency of your project)
+
Data farming is a very present-day subject. We are on a critical point of learning how to deal with it. People are afraid of it just like every other time in the past when technology makes a jump <ref name="Peter-Paul Verbeek">Peter-Paul Verbeek, Wij hebben geen klauwen en dus hebben we ’n iPhone, [https://www.nrc.nl/nieuws/2017/10/06/wij-hebben-geen-klauwen-en-dus-hebben-we-n-iphone-13362323-a1576272/ website]</ref>.
</span>
 
 
 
  
 
<span style='width:50em;display:block;'>
 
<span style='width:50em;display:block;'>
We feel a connection with the subject because it is a part of our lives. We encounter the consequences of it everyday. We create an opinion about it and we react in a certain way to it.
+
Data is the new opportunity and businesses are in a race to be on top of it. As JoAnn Stonier says in her article, Data is the new currency: “We’re running out of time.  What we decide today will create the future.” <ref name="Data is the new currency"> JoAnn Stonier, Data is the new currency, [http://www.businessinnovationfactory.com/summit/story/data-new-currency article]</ref>.
The echo chamber is a very present-day subject. We are on a critical point of learning how to deal with it. People are afraid of it just like every other time in the past when technology makes a jump <ref name="Peter-Paul Verbeek">Peter-Paul Verbeek, Wij hebben geen klauwen en dus hebben we ’n iPhone, [https://www.nrc.nl/nieuws/2017/10/06/wij-hebben-geen-klauwen-en-dus-hebben-we-n-iphone-13362323-a1576272/ website]</ref>.
+
</span>
  
==Hypothesis==
 
 
<span style='width:50em;display:block;'>
 
<span style='width:50em;display:block;'>
(what do you think will happen or what will the effect be of your work?)
+
This affects both, the individual and the society. Data is a new currency with a lot of people unknowingly providing it.
 
</span>
 
</span>
  
<span style='width:50em;display:block;'>
+
==Hypothesis==
Our work (hopefully) is going to make people think, reflect and laugh. Half of the work will be a solution to problems people encounter within the echo chamber and the other half will critique this way of looking at things. We want people to think about their own way of dealing with the echo chamber.
 
  
 
<span style='width:50em;display:block;'>
 
<span style='width:50em;display:block;'>
We hope to make people more aware of the complexity of the whole thing. There is not one person to blame and not one solution to it all.
+
Our collection will not have a real effect, in the sense that it does not help to blur the data on a scale that makes it unusable. Our weapons will send a positive message, positive in the sense that we are in control and not the technique. That there is a face behind the technology that we can disrupt through minimal adjustments.
 +
<br><br>
 +
We hope that our weapons radiate reliability through operation, design and material choices. We want to achieve this by working with solid, recognizable and natural materials.
 +
<br><br>
 +
Last but not least, we hope our work is going to make people think, reflect and laugh.  
 +
</span>
  
 
==Research Approach==
 
==Research Approach==
 
<span style='width:50em;display:block;'>
 
<span style='width:50em;display:block;'>
(how do you define and design your research? what activities/approaches/methods will you pursue while conducting your research?)
+
'''During the project we have shifted between different themes, because the research was asking for this or because our interests were leading us into new directions. The project could be divided in three different parts. The voice, the echo chamber and data farming. Within these subjects we have performed different forms of research. We read articles, looked up other works, did material experiments, discussed the subject with fellow students and built different kinds of objects and machines. The research we did for the first two subjects, the voice and the echo chamber, were a big part of the framework that we have built around our final work.'''
<br>
 
<br>
 
'''The subject is very actual. There are hundreds of news articles to read about it, and thousand times more individual opinions to find on the internet. All of these sources were valuable to us to form our own opinion and to make a sketch of the human reaction to the echo chamber.'''
 
 
</span>
 
</span>
  
==Key References==
+
===Key References===
 
 
 
<span style='width:50em;display:block;'>
 
<span style='width:50em;display:block;'>
 
<br>
 
<br>
'''Thero Privacy control, Roman Torre and Angeles Angulo'''
+
Some of the things we found out while doing our research were always in the back of our heads. They connected themes or acted as inspiration for our final work.
 +
<br>
 +
<br>
 +
'''Acoustic Location and Sound Mirrors, The Museum of Retro Technology<ref name="Acoustic location and Sound Mirrors">Acoustic Location and Sound Mirrors, The Museum of Retro Technology [http://www.douglas-self.com/MUSEUM/COMMS/ear/ear.htm website]</ref>''''''
 +
<br>
 +
<br>
 +
'' 'Before the advent of the aeroplane, acoustic location was applied to determining the presence and position of ships in fog. However little faith was placed in this because the apparent direction of sounds in fog at sea was known to be sometimes deceptive. …the technology was rendered obsolete before and during WW2 by the introduction of radar, which was far more effective.' ''
 +
<br>
 +
<br>
 +
Acoustic locators were a big inspiration for us because of two reasons. The other worldly aesthetic of the objects we found interesting and were throughout the project an inspiration for our design choices. The other reason is that just like our final objects the acoustic locator was an analog devious solution to a, then, new problem. The technique used wasn’t very trustworthy, but it was the only thing they could rely on at that time.
 +
<br>
 +
<br>
 +
[[File:Acoustic_locator1-Tharim.jpg | 650px]]
 +
<br>
 +
<br>
 +
'''Instagram is listening to you, Damián Le Nouaille <ref name="Instagram is listening to you">Damián Le Nouaille, Instagram is listening to you [https://medium.com/@damln/instagram-is-listening-to-you-97e8f2c53023 blogpost]</ref>'''
 +
<br>
 +
<br>
 +
'''<span style='color:white; font-size:20px; background:black;'>Please Instagram, explain to me how you’re doing this. I’m a developer, I know how iOS and networks work, and I’m still very curious about the technology you’re using.</span>
 +
<br>
 +
<br>
 +
Damián Le Nouaille’s blogposts on Instagram spying on him were a catalyst for our project. His blogposts made hundreds of people come forward with similar stories. To hear from an actual web developer that a company like instagram is probably monitoring your conversations via your phone really amplifies this feeling of “the individual” versus “the faceless big companies”. His story is in a way very emotional, he experiences something that he doesn’t understand and makes up a plausible sounding reason for the event. Which is a very human way of reacting.
 +
<br>
 +
<br>
 +
'''Thero Privacy control, Roman Torre and Angeles Angulo'''<ref name="THERO: A Physical Device for Internet Privacy Control">Jeremy S. Cook, THERO : A Physical Device for Internet Privacy Control [https://blog.hackster.io/thero-a-physical-device-for-internet-privacy-control-f1aa8b1c1314 website]</ref>
 
<br>
 
<br>
 
<br>
 
<br>
Line 71: Line 103:
 
<br>
 
<br>
 
<br>
 
<br>
'' 'To address this issue, Roman Torre and Angeles Angulo have come up with a Raspberry Pi 3-based physical device called THERO that lets you manage security settings with the turn of a dial.' '' <ref name="THERO: A Physical Device for Internet Privacy Control">Jeremy S. Cook, THERO : A Physical Device for Internet Privacy Control [https://blog.hackster.io/thero-a-physical-device-for-internet-privacy-control-f1aa8b1c1314 website]</ref>
+
'' 'To address this issue, Roman Torre and Angeles Angulo have come up with a Raspberry Pi 3-based physical device called THERO that lets you manage security settings with the turn of a dial.' ''
 
<br>
 
<br>
 
<br>
 
<br>
[[File:tharim jeanine 1.jpg | 500px]]</span>
+
Thero is addressing the exact same themes as we are. Roman Torre and Angeles Angulo have come up with a physical solution for a digital problem. The only problem we had with the Thero is that it is still very unclear, for someone who doesn’t know how computers work, what it does and how it works.
 
+
<br>
==References==
+
<br>
 +
[[File:tharim jeanine 1.jpg | 650px]]
 +
</span>
  
 +
===Literature===
 
<span style='width:50em;display:block;'>
 
<span style='width:50em;display:block;'>
  
===The bubble===
+
“I produce my voice, but my voice also produces me.”
<span style='width:50em;display:block;'>
+
<br>
‘So comfortable, we’re living in a bubble, a bubble, so comfortable, we cannot see the trouble,’ sings Katy Perry. In a short period of time the bubble has become the metaphor for everything that is wrong in our society. They are everywhere, we have filterbubbles <ref name="filterbubbles">Eli Pariser, The Filter Bubble: What the Internet is Hiding From You, [http://www.economist.com/node/18894910/ website]</ref> , mediabubbles <ref name="mediabubbles">,Karin Peusens ,HÉT NIEUWS BESTAAT NIET MEER VOOR JONGEREN, [http://www.youngworks.nl/het-nieuws-bestaat-niet-meer-voor-jongeren/ website]</ref> , a bubble in Brussel <ref name ="a bubble in brussel"> Gabriella Adèr, Schouderklopjes en high fives, [https://www.groene.nl/artikel/schouderklopjes-en-high-fives website]</ref> elite bubbles <ref name="elite bubbles">  
+
'''RESONANT BODIES VOICES MEMORIES - Johanna Biľak'''
Damon Darlin, A Question About Friends Reveals a Lot About Class Divides, [https://www.nytimes.com/2016/09/01/upshot/a-question-about-friends-reveals-a-lot-about-class-divides.html?_r=0 website]</ref> and political bubbles <ref name="political bubbles">Jesse Beentjes, Politieke chatroulette Waaromkiesjij.nl: 'De bubbels doorbreken', [https://www.parool.nl/binnenland/politieke-chatroulette-waaromkiesjij-nl-de-bubbels-doorbreken~a4463302/ website] </ref>.
+
<br>
 +
<br>
 +
“And what is voice if it is not simply an instrument for self-expression and self-realisation we can
 +
command?”
 +
<br>
 +
'''Steven Connor, Dumbstruck: A Cultural History of Ventriloquism. pp. 3 - 5 and pp. 342 - 346 '''
 +
<br>
 +
<br>
 +
''' Jean-Peul Sartre - Being and Nothingness <ref name="Being and nothingness"> Jean-Paul Sartre, Being and Nothingness [http://www.thinkphilosophy.org/uploads/6/1/0/9/6109978/jeanpaul-sartre-being-and-nothingness-1.pdf book]</ref>
 
</span>
 
</span>
  
===Liquid modernity===
+
===Experiments===
 
<span style='width:50em;display:block;'>
 
<span style='width:50em;display:block;'>
Individualization, privatization and flexibilization: the new world order, little was solid, solid or heavy. Fluidity, mobility and volatility characterized everything from our individual identity to the labor market, from our understanding of time and space to our communities. <ref name="Het woord bubble doorgeprikt">Lynn Berger,
+
'''As we informed you in the research approach, we can divide our process in three parts/subjects. The voice and lying to yourself, the echo chamber and data farming. The experiments we did in each field, even though not visible in the physical result, contributed to the development of our collection of weapons.''' <br>
Het woord bubbel doorgeprikt, [https://decorrespondent.nl/6340/het-woord-bubbel-doorgeprikt/211242460-d8178132 website]</ref> Sociologisch Zygmunt Bauman introduced the term ‘liquid modernity’, fixed structures and anchored institutions that had largerly determined our identity and course of life, bauman wrote, had disappeared. Fluide is the returning theme, gender is ‘fluid’ and art is ‘hybride’. The bubble metaphor thrives at a time when everything seems liquid. “Underneath the polished surface it flows, swirls and bubbles: we are surrounded by algorithms that are as mysterious as directing, by data clouds that we can not see, information in which we drown, lies and truths that can no longer be distinguished from each other, and by transparency that makes blind.<ref name="Het woord bubble doorgeprikt">Lynn Berger,
+
<br>
Het woord bubbel doorgeprikt, [https://decorrespondent.nl/6340/het-woord-bubbel-doorgeprikt/211242460-d8178132 website]</ref>
+
'''LYING TO SELF'''
<span>
+
<br>
 
+
At the start of our project we did a few experiments on lying to yourself. We made up small experiments in which we tricked ourselves in a lie.
===Nature as metaphor===
+
<br>
<span style='width:50em;display:block;'>
+
<br>
We’ve always know the concept of the bubble. Half a century ago we had the ‘zuilen’, the ‘echo chambers’ of the internet, the ‘information silos’ inside companies, the ‘ivoren torens’ of universities and the ‘kaasstolpen’ of politics.  
+
''Lyrebird.ai''
We use nature as a way of explain abstract concepts. Just like trees, the economy has to grow. The way we talk about computer technology is in biological terms. We are on the ‘web’ , we protect ourselves against ‘bugs’ and ‘virusses’. We can ‘drown’ in information. Big data is described as a natural resource which we can ‘mine’. Our own data is in the ‘cloud’. This is the context we use, a context that we make understandable by interpreting it in terms of biology, the weather and the water world.
+
<br>
 +
Lyrebird.ai is a website were you can teach an ai to speak with your voice. You train the machine by recording certain sentences. We recorded our voices in the sound station at the WDKA and used the machine to tell lies about ourselves in our own voice. <ref name="Lyrebird.ai"> Lyrebird.ai [https://lyrebird.ai/ website]</ref>
 +
<br>
 +
<br>
 +
''Stickers''
 +
<br>
 +
We made food information stickers with false facts, so you would trick yourself with the idea that you are being healthy.
 +
<br>
 +
<br>
 +
''Autocorrect''
 +
<br>
 +
Using autocorrect on our phones, we were changing the way we speak. We wanted to sound more educated and intelligent, so we changed words like: "yessss" to "akkoord".
 +
<br>
 +
<br>
 +
'''MATERIALS AND TECHNIQUES'''
 +
<br>
 +
During our project we experimented with different techniques and materials to find out which worked the best for us.
 +
<br>
 +
<br>
 +
We did a lot of experimentation with the ''arduino''. We worked with servomotors, mp3 boards, sound processing and touch sensors. The experiments were mainly altering the code of the arduino and testing out different settings and placements. We used the arduino because of its user friendliness and because we worked with it before.
 +
<br>
 +
<br>
 +
''We worked with two different main materials.''
 +
Because we wanted to work with rough materials and because the both of us always have wanted to work with this material we chose to work with ''concrete''. The other material was ''wood'', which we cut up in the lasercutter, this was a nice way of making quick prototypes and make small adjustments to things that we already had.
 +
<br>
 +
<br>
 +
We made positive molds out of clay and used the vacuum press in the ceramics workplace to make negative molds from plastic. Within the molds we put wooden skeletons to give the structures extra strength and to make room for an arduino (if necessary). After this we filled the molds with concrete and let them dry for one or two days.
 +
<br>
 +
<br>
 +
''Chladni figures''
 +
<br>
 +
A side experiment we did was using a speaker and a laser to show certain sound characteristics. We added a piece of mirror to a speaker and pointed a laser at it. The reflection of the laser created patterns on the wall where the speaker pointed towards.<ref name="Chladni figures"> Wikipedia, Chladni figures [https://en.wikipedia.org/wiki/Ernst_Chladni#Chladni_figures website]</ref> We played with the frequency, panning and resonance of the sound and created a lot of different patterns. We thought we might use this technique later on in the project, but we ended up using other techniques.
 +
<br>
 +
<br>
 +
'''SHAPES'''
 +
<br>
 +
During our project we thought a lot about shapes. Our shape has to be trustworthy and feel natural. Again, because of the not humanness of the algorithm we wanted to create something natural. Strong hard edges are mostly man made, in contrast with the circular shapes we find in nature. Next to that we, as humans, have loads of ancient associations with the sun, moon and the earth. <ref name="The Psychological Meanings Behind Familiar Shapes (And How to Use Them)"> Christiana Wang, The Psychological Meanings Behind Familiar Shapes (And How to Use Them), [https://www.shutterstock.com/blog/psychological-meaning-shapes-use article]</ref>
 +
<br>
 +
<br>
 +
'''Product sketch below'''
 +
[[File:Difcraf product schets overview weapons of data destruction.jpg|650px]]
 
</span>
 
</span>
  
===The echo chamber of the internet===
+
==Insights from Experimentation==
 
<span style='width:50em;display:block;'>
 
<span style='width:50em;display:block;'>
The internet provides us with a system where the echo chamber can exist. An echo chamber is a situation in which information, ideas, or beliefs are amplified or reinforced by communication and repetition inside a defined system. <ref name="Echo chamber (media)"> [[https://en.wikipedia.org/wiki/Echo_chamber_(media) website]</ref> The echo chamber effect reinforces a person’s own present world view.  
+
'''LYING TO SELF'''
The echo chamber is something that has always existed. Everything around you is a reaction on your own behaviour, taste, opinion and values. But with the arrival of the internet the echo chamber has taken a new form. The virtual echo chamber is something new, not because it exists on your computer, but because the virtual echo chamber is very visible and also brought to existence by others than yourself.  
+
<br>
 +
After the lying to self experiments we felt like we wanted to make something more concrete. We liked looking into these geeky techniques, but we didn’t see enough potential to make a full project based on these experiments. Also we got a bit stuck of existential part of it: what is truth and what is a lie.
 +
<br>
 +
We enjoyed the experiment with Lyrebird because it was a quick result. We could only use the website, which did not make it that useable in the project. We developed it a bit further by letting two laptops dictate to each other. As a result the text degraded quickly to something we could not recognize as a sentence.  
 +
<br>
 +
<br>
 +
'''MATERIALS AND TECHNIQUES'''
 
<br>
 
<br>
 +
Working with concrete was a good choice, but it took a lot of time to master. We had to redo the process a few times, because we had to learn a lot about the material. The concrete would get stuck in the mold, would have too much water in the mixture or would break too quick. Next to that we found out, a bit too late, that we wanted to make some very concrete unfriendly shapes.
 
<br>
 
<br>
All of the sudden all the things you say and do get magnified and analysed by algorithms, or we feel like they do, and we can see this as direct reaction on our screens.
 
 
<br>
 
<br>
 +
Because of the time consuming process of making the concrete structures and because we wanted to keep the objects user-friendly we had to use more wood than we originally wanted to. We used a varnish and sandpapered the wood to make it look more authentic and natural. In the end we tried to find a balance between the wood and concrete.
 
<br>
 
<br>
 +
<br>
 +
After a talk with Jon we realised that we put our work in the wrong context. We were showing one thing; the destruction of data, but we were saying another thing; a way of getting out of the echo chamber. We felt that our work had more power in the context of a battle being fought, where the tools would act as weapons.
 
</span>
 
</span>
  
===Cultural tribalism===
+
==Artistic/Design Principles==
 
<span style='width:50em;display:block;'>
 
<span style='width:50em;display:block;'>
>>>>>>>>
+
The objects that we want to make have to be raw. They have to be the opposite of the smart and futuristic algorithms and computers. The tools should have one function and this function should be clear when you see the tool. We want to work with sturdy and natural materials that amplify the primitive touch of the tools.
 +
<br/><br/>
 +
The objects that we want to make will present devious solutions. By doing so we hope to bring a positive side to a heavy problem. We want to put a grin on people their face while they use our tools.
 +
<br/><br/>
 +
Our weapons will have specific targets. We want to bring the battle to a personal level. The faceless machine that we encounter on the internet is so much easier too fight when we attach a face to it.
 +
<br/><br/>
 +
From the start we had some shared basic principles. The objects had to work smoothly, look like finished objects and we should be able to put it in our portfolio.
 
</span>
 
</span>
  
===Boogieman===
+
==Artistic/Design Proposal==
 +
<br>
 
<span style='width:50em;display:block;'>
 
<span style='width:50em;display:block;'>
>>>>>>>> instagram microfoon verhalen
+
<span style='color:white; font-size:20px; background:black;'>'''We are going to make 5 analog weapons to fight a digital battle.'''
 +
<br>
 +
'''These weapons are objects which dirty up the trail of data which you leave behind on the internet.'''
 
</span>
 
</span>
 
==Literature==
 
<span style='width:50em;display:block;'>
 
 
<br>
 
<br>
 
<br>
 
<br>
“I produce my voice, but my voice also produces me.
+
'''Keyboard'''
 +
<br>
 +
This object is supposed to be used while writing mails. When the object is put over the keyboard you won’t be able to use certain symbols while typing your mail. The data that previously was interesting is now useless because the typed words are now unreadable.
 +
<br>
 +
'''Target:''' [https://www.linkedin.com/in/daniel-yehdego-phd-09262042 Daniel Yehdego], senior data & applied scientist at Microsoft.
 +
<br>
 +
<br>
 +
'''Mouse'''
 +
<br>
 +
To randomise your behaviour on Facebook you put your mouse in this device. A disk underneath the mouse will start rotating which will make the mouse hover across the screen. After the disk has stopped turning a little motor will press the left button on the mouse. These actions repeat itself with different degrees of rotation from the disk every time the loop starts again. The movements of the two motors are being controlled by a hidden Arduino board.
 +
<br>
 +
'''Target:''' [https://www.facebook.com/tsumer22?ref=br_rs Timur Sumer], data scientist analytics at Facebook.
 +
<br>
 +
<br>
 +
'''Kaleidoscope'''
 +
<br>
 +
The kaleidoscope can be put over the webcam while making a Skype call. The transferred data shows a lot less details than it normally would. Your face, surroundings and other information is being covered.
 +
<br>
 +
'''Target:''' [https://www.linkedin.com/in/gorm-kroeger-3b85532a Gorm Kroeger], data analyst at Microsoft / Skype.
 +
<br>
 +
<br>
 +
'''Speaker'''
 
<br>
 
<br>
'''RESONANT BODIES VOICES MEMORIES - Johanna Biľak'''
+
This device contains a speaker which starts to talk to your phone when you lay it on top of it. It says words that will trigger instagram algorithms to show other advertisements.
 
<br>
 
<br>
 +
'''Target:''' [https://www.linkedin.com/in/ting-pan-65991455 Ting Pan], data scientist at Instagram.
 
<br>
 
<br>
“And what is voice if it is not simply an instrument for self-expression and self-realisation we can
 
command?”
 
 
<br>
 
<br>
'''Steven Connor, Dumbstruck: A Cultural History of Ventriloquism. pp. 3 - 5 and pp. 342 - 346 '''
+
'''Tank'''
 
<br>
 
<br>
 +
The final object will be targeted at google. An aquarium under which you can put your phone. When you run an electric current through the water in the tank the signal from and to your phone will be blocked. Your location can’t be tracked this way.
 
<br>
 
<br>
''' Jean-Peul Satre - Being and Nothingness <ref name="Being and nothingness"> Jean-Paul Satre, Being and Nothingness [http://www.thinkphilosophy.org/uploads/6/1/0/9/6109978/jeanpaul-sartre-being-and-nothingness-1.pdf book]</ref>
+
'''Target:''' [https://plus.google.com/+VanessaSchneider Vanessa Schneider], geo media program manager at Google.
 
</span>
 
</span>
  
==Experiments==
+
==Realised work==
 +
<span style='width:50em;display:block;'>
 +
'''We made a collection of non-weapons made to target a specific person who works with your data at a big social media company. <br><br>
 +
'''We started a small resistance with a wink. <br><br>
 +
'''Without realising we also started a little revolution among friends and family, by causing commotion about data farming.'''
 +
 
 +
===Exposition Set Up===
 +
[[File:jeaninetharimpres.jpg|650px]]
 +
<br>
 +
<br>
 
<span style='width:50em;display:block;'>
 
<span style='width:50em;display:block;'>
(what are you going to test out and why)
+
Because of the time pressure we presented four weapons instead of five. During the exposition we presented the four weapons, with pictures and names of our targets, on pedestals as if they were the solution to data farming. We chose to not present in an IKEA style set up (for example a work station). Because the weapons are not made to sold, or to be used at a desk. The weapons are made out of resistance as a statement and reminder. We showed a video ([[https://vimeo.com/247946847 click here for the link]]) of the weapons in action and we set up the mouse to clarify how the objects function. We opened Facebook in the web browser en let the weapon do it's thing. At the end of the exposition we got some nice results, as you can see in the screenshot below and on the picture page.
 +
<br>
 +
<br>
 +
After our final presentation with Jon and Tim at S/ash we decided to make the targets more visible. We did this by printing out a "wanted poster" with the picture and some background information, and put them at the pedestals.
 
</span>
 
</span>
 +
<br>
 +
[[File:Weapons of data destruction 11.jpg|650px]]
  
 +
==Final Conclusions==
 +
===What is the point?===
 +
<span style='width:50em;display:block;'>
 +
The point we made is that control can be taken back. The monstrous companies are not as faceless as you might think. 
 +
<br>
 +
<br>
 +
We live in a time where populism is everywhere. One person can be the solution, also one person can be blamed. We took our targets not as the one person to blame, but as an example that the computer is not working with your data, a human being is. 
 +
</span>
  
==Insights from Experimentation==
+
===What do we take away?===
 +
<span style='width:50em;display:block;'>
 +
Next to all the technical stuff, such as arduino and working with different materials. We never stopped thinking, discussing and adjusting our concept. Maybe we took it a bit to far. We learned a lot about the theoretical side and contextualization. we definitely will take this to our final project.
 +
<br>
 +
<br>
 +
We struggled during our talk with Tim and Jon before the exposition. Mainly because we switched so much that we were flooded with shreds of information. During the exposition we talked with all kind of people that helped with their feedback. We used the break to take some distance. Now, while finishing our research paper, things are becoming clear. We see now how all the different ideas contribute to our final work. All the ideas serve as background, and strengthen our context.
 +
<br>
 +
<br>
 +
In general, we are very happy with what we accomplished in the time we had with this concept. After reflection we can conclude that we should have focused more on quality of one product, instead of the quantity of a collection. With the insights we have now, we would focus on researching and perfection one item, the mouse. The mouse is the strongest artifact we made. It is the strongest for several reasons, it is the one item that works and has an immediate visual effect. Also it is the strongest because we can make a lot of steps in the development area. Those steps would for instance be the development of a software that would prevent from closing the browser.
 +
<br>
 +
<br>
 +
</span>
 +
====keyboard====
 
<span style='width:50em;display:block;'>
 
<span style='width:50em;display:block;'>
(what have you pulled from your hands on practice based research?)
+
The keyboard is the odd one out. Where the other artifacts have a potential of working, the keyboard has none. The keyboard cover makes your data useless not only for the target, but also for yourself.
 +
<br>
 +
<br>
 +
Aesthetically the keyboard is very successful. The mahogany stain makes the cheap lasercut wood more refined.
 
</span>
 
</span>
 
+
====mouse====
 
 
==Artistic/Design Principles==
 
 
<span style='width:50em;display:block;'>
 
<span style='width:50em;display:block;'>
(what is your own criteria for designing?)
+
The mouse is the strongest artifact we made, it has an immediate visual effect. Also it is the strongest because of the potential it has for further development.
 +
<br>
 +
<br>
 +
We tested the mouse for just short periods of time. When used for a longer time the mouse would not limit itself to Facebook, the mouse would close the browser, edit browser setting ed. A next step would be to develop background software to prevent the browser from closing.
 
</span>
 
</span>
  
 
+
====kaleidoscope====
==Artistic/Design Proposal==
 
 
<span style='width:50em;display:block;'>
 
<span style='width:50em;display:block;'>
(what do you propose to make)
+
The kaleidoscope brought a nice visual effect, but was after the keyboard the least effective object / weapon.
 +
<br>
 +
The analog solution that we came up with wasn't as strong as we thought it would be.
 +
If we would redo the kaleidoscope we would make a digital solution and make it look analog.
 
</span>
 
</span>
  
 
+
====speaker====
==Realised work==
 
 
<span style='width:50em;display:block;'>
 
<span style='width:50em;display:block;'>
(what did you actually make)
+
The speaker is bringing a, to us, very clear solution for the instagram eavesdropping story, but next to the other objects it became unclear.
 +
When all of the objects were brought together the specific target of the object got lost a bit.
 +
<br>
 +
<br>
 +
We could have made the object more clear by adding a stand for your phone or by putting a instagram logo on the machine.
 
</span>
 
</span>
  
 
+
===Insights from exposition===
==Final Conclusions==
 
 
<span style='width:50em;display:block;'>
 
<span style='width:50em;display:block;'>
(what was the point? what do you take away?)
+
As we mentioned, with the information we have we would only develop and thus exhibit one artifact. That would have been the mouse. If we had made that choice our set up would have been more clear. Now the  collection caused noise between themselves. Our communication could have been more clearer, now it was more a presentation of nice objects.
 +
<br>
 +
<br>
 +
The video was a nice touch and well made, but in the end caused for more noise. Less is more.
 +
<br>
 +
<br>
 +
Also mentioned earlier, we made the targets more visible. We did this by printing out a "wanted poster" with the picture and some background information, and put them at the pedestals.
 
</span>
 
</span>
  
 
==Bibliography==
 
==Bibliography==
  
(what did you reference in this text (other texts, images, films, exhibitions)? Remember to use proper in-text citing!!!!!!!!!!
 
 
Click to see reference edit <ref name="Working with Mediawiki">Yaron Koren, Working with Mediawiki, p. 2 [http://workingwithmediawiki.com/ website]</ref>
 
 
<references/>
 
<references/>
 
</span>
 
</span>

Latest revision as of 10:52, 15 January 2018




>>> research paper <<<

weapons of data destruction

QUARTER 14

paper
references
PICTURES



Collaborators

THARIM CORNELISSE
Major // illustration
PAGE THARIM


JEANINE VERLOOP
Major // illustration
PAGE JEANINE


Forward/Introduction


Tharim is the digital, Jeanine is the craft.

Where Jeanine is running in material stations, Tharim likes to stare at his screen for hours. We teamed up because we complement each others flaws and because of our shared view on art, aesthetics and technology. We don't consider ourselves classic illustrators and feel a strong urge to work with interesting techniques and materials.

Based on these shared ideals we worked as a team on this project.

Abstract


Social media is getting more and more accurate in showing you what it thinks you want and believe. It creeps us out because the algorithm used is under the surface, we see no physical explanation. Because of this people are feeling watched and not safe. And so we gather around the campfire, telling stories of the modern boogieman lurking in the shadows of our devices, spying and gathering information.

Within this conflict we fought a small battle. Our weapons of choice: tactile and understandable devices, which create dirty data.

Central Question




How does the individual cope with data farming [1]?


Relevance of the Topic

Data farming is a very present-day subject. We are on a critical point of learning how to deal with it. People are afraid of it just like every other time in the past when technology makes a jump [2].

Data is the new opportunity and businesses are in a race to be on top of it. As JoAnn Stonier says in her article, Data is the new currency: “We’re running out of time. What we decide today will create the future.” [3].

This affects both, the individual and the society. Data is a new currency with a lot of people unknowingly providing it.

Hypothesis

Our collection will not have a real effect, in the sense that it does not help to blur the data on a scale that makes it unusable. Our weapons will send a positive message, positive in the sense that we are in control and not the technique. That there is a face behind the technology that we can disrupt through minimal adjustments.

We hope that our weapons radiate reliability through operation, design and material choices. We want to achieve this by working with solid, recognizable and natural materials.

Last but not least, we hope our work is going to make people think, reflect and laugh.

Research Approach

During the project we have shifted between different themes, because the research was asking for this or because our interests were leading us into new directions. The project could be divided in three different parts. The voice, the echo chamber and data farming. Within these subjects we have performed different forms of research. We read articles, looked up other works, did material experiments, discussed the subject with fellow students and built different kinds of objects and machines. The research we did for the first two subjects, the voice and the echo chamber, were a big part of the framework that we have built around our final work.

Key References


Some of the things we found out while doing our research were always in the back of our heads. They connected themes or acted as inspiration for our final work.

Acoustic Location and Sound Mirrors, The Museum of Retro Technology[4]'

'Before the advent of the aeroplane, acoustic location was applied to determining the presence and position of ships in fog. However little faith was placed in this because the apparent direction of sounds in fog at sea was known to be sometimes deceptive. …the technology was rendered obsolete before and during WW2 by the introduction of radar, which was far more effective.'

Acoustic locators were a big inspiration for us because of two reasons. The other worldly aesthetic of the objects we found interesting and were throughout the project an inspiration for our design choices. The other reason is that just like our final objects the acoustic locator was an analog devious solution to a, then, new problem. The technique used wasn’t very trustworthy, but it was the only thing they could rely on at that time.

Acoustic locator1-Tharim.jpg

Instagram is listening to you, Damián Le Nouaille [5]

Please Instagram, explain to me how you’re doing this. I’m a developer, I know how iOS and networks work, and I’m still very curious about the technology you’re using.

Damián Le Nouaille’s blogposts on Instagram spying on him were a catalyst for our project. His blogposts made hundreds of people come forward with similar stories. To hear from an actual web developer that a company like instagram is probably monitoring your conversations via your phone really amplifies this feeling of “the individual” versus “the faceless big companies”. His story is in a way very emotional, he experiences something that he doesn’t understand and makes up a plausible sounding reason for the event. Which is a very human way of reacting.

Thero Privacy control, Roman Torre and Angeles Angulo[6]

'Privacy and security on the Internet is a hotly debated topic. On the one hand, there’s a possible need to be able to track and find people that would like to to others harm. On the other, there’s the idea that it’s no one else’s business what you search for, or what websites you visit. Still another faction would simply like to sell and use this data for profit in exchange for the use of their services. All of these issues come together to make security choices complicated for computer-savvy individuals, and likely nearly impossible for those that aren’t.'

'To address this issue, Roman Torre and Angeles Angulo have come up with a Raspberry Pi 3-based physical device called THERO that lets you manage security settings with the turn of a dial.'

Thero is addressing the exact same themes as we are. Roman Torre and Angeles Angulo have come up with a physical solution for a digital problem. The only problem we had with the Thero is that it is still very unclear, for someone who doesn’t know how computers work, what it does and how it works.

Tharim jeanine 1.jpg

Literature

“I produce my voice, but my voice also produces me.”
RESONANT BODIES VOICES MEMORIES - Johanna Biľak

“And what is voice if it is not simply an instrument for self-expression and self-realisation we can command?”
Steven Connor, Dumbstruck: A Cultural History of Ventriloquism. pp. 3 - 5 and pp. 342 - 346

Jean-Peul Sartre - Being and Nothingness [7]

Experiments

As we informed you in the research approach, we can divide our process in three parts/subjects. The voice and lying to yourself, the echo chamber and data farming. The experiments we did in each field, even though not visible in the physical result, contributed to the development of our collection of weapons.

LYING TO SELF
At the start of our project we did a few experiments on lying to yourself. We made up small experiments in which we tricked ourselves in a lie.

Lyrebird.ai
Lyrebird.ai is a website were you can teach an ai to speak with your voice. You train the machine by recording certain sentences. We recorded our voices in the sound station at the WDKA and used the machine to tell lies about ourselves in our own voice. [8]

Stickers
We made food information stickers with false facts, so you would trick yourself with the idea that you are being healthy.

Autocorrect
Using autocorrect on our phones, we were changing the way we speak. We wanted to sound more educated and intelligent, so we changed words like: "yessss" to "akkoord".

MATERIALS AND TECHNIQUES
During our project we experimented with different techniques and materials to find out which worked the best for us.

We did a lot of experimentation with the arduino. We worked with servomotors, mp3 boards, sound processing and touch sensors. The experiments were mainly altering the code of the arduino and testing out different settings and placements. We used the arduino because of its user friendliness and because we worked with it before.

We worked with two different main materials. Because we wanted to work with rough materials and because the both of us always have wanted to work with this material we chose to work with concrete. The other material was wood, which we cut up in the lasercutter, this was a nice way of making quick prototypes and make small adjustments to things that we already had.

We made positive molds out of clay and used the vacuum press in the ceramics workplace to make negative molds from plastic. Within the molds we put wooden skeletons to give the structures extra strength and to make room for an arduino (if necessary). After this we filled the molds with concrete and let them dry for one or two days.

Chladni figures
A side experiment we did was using a speaker and a laser to show certain sound characteristics. We added a piece of mirror to a speaker and pointed a laser at it. The reflection of the laser created patterns on the wall where the speaker pointed towards.[9] We played with the frequency, panning and resonance of the sound and created a lot of different patterns. We thought we might use this technique later on in the project, but we ended up using other techniques.

SHAPES
During our project we thought a lot about shapes. Our shape has to be trustworthy and feel natural. Again, because of the not humanness of the algorithm we wanted to create something natural. Strong hard edges are mostly man made, in contrast with the circular shapes we find in nature. Next to that we, as humans, have loads of ancient associations with the sun, moon and the earth. [10]

Product sketch below Difcraf product schets overview weapons of data destruction.jpg

Insights from Experimentation

LYING TO SELF
After the lying to self experiments we felt like we wanted to make something more concrete. We liked looking into these geeky techniques, but we didn’t see enough potential to make a full project based on these experiments. Also we got a bit stuck of existential part of it: what is truth and what is a lie.
We enjoyed the experiment with Lyrebird because it was a quick result. We could only use the website, which did not make it that useable in the project. We developed it a bit further by letting two laptops dictate to each other. As a result the text degraded quickly to something we could not recognize as a sentence.

MATERIALS AND TECHNIQUES
Working with concrete was a good choice, but it took a lot of time to master. We had to redo the process a few times, because we had to learn a lot about the material. The concrete would get stuck in the mold, would have too much water in the mixture or would break too quick. Next to that we found out, a bit too late, that we wanted to make some very concrete unfriendly shapes.

Because of the time consuming process of making the concrete structures and because we wanted to keep the objects user-friendly we had to use more wood than we originally wanted to. We used a varnish and sandpapered the wood to make it look more authentic and natural. In the end we tried to find a balance between the wood and concrete.

After a talk with Jon we realised that we put our work in the wrong context. We were showing one thing; the destruction of data, but we were saying another thing; a way of getting out of the echo chamber. We felt that our work had more power in the context of a battle being fought, where the tools would act as weapons.

Artistic/Design Principles

The objects that we want to make have to be raw. They have to be the opposite of the smart and futuristic algorithms and computers. The tools should have one function and this function should be clear when you see the tool. We want to work with sturdy and natural materials that amplify the primitive touch of the tools.

The objects that we want to make will present devious solutions. By doing so we hope to bring a positive side to a heavy problem. We want to put a grin on people their face while they use our tools.

Our weapons will have specific targets. We want to bring the battle to a personal level. The faceless machine that we encounter on the internet is so much easier too fight when we attach a face to it.

From the start we had some shared basic principles. The objects had to work smoothly, look like finished objects and we should be able to put it in our portfolio.

Artistic/Design Proposal


We are going to make 5 analog weapons to fight a digital battle.
These weapons are objects which dirty up the trail of data which you leave behind on the internet.


Keyboard
This object is supposed to be used while writing mails. When the object is put over the keyboard you won’t be able to use certain symbols while typing your mail. The data that previously was interesting is now useless because the typed words are now unreadable.
Target: Daniel Yehdego, senior data & applied scientist at Microsoft.

Mouse
To randomise your behaviour on Facebook you put your mouse in this device. A disk underneath the mouse will start rotating which will make the mouse hover across the screen. After the disk has stopped turning a little motor will press the left button on the mouse. These actions repeat itself with different degrees of rotation from the disk every time the loop starts again. The movements of the two motors are being controlled by a hidden Arduino board.
Target: Timur Sumer, data scientist analytics at Facebook.

Kaleidoscope
The kaleidoscope can be put over the webcam while making a Skype call. The transferred data shows a lot less details than it normally would. Your face, surroundings and other information is being covered.
Target: Gorm Kroeger, data analyst at Microsoft / Skype.

Speaker
This device contains a speaker which starts to talk to your phone when you lay it on top of it. It says words that will trigger instagram algorithms to show other advertisements.
Target: Ting Pan, data scientist at Instagram.

Tank
The final object will be targeted at google. An aquarium under which you can put your phone. When you run an electric current through the water in the tank the signal from and to your phone will be blocked. Your location can’t be tracked this way.
Target: Vanessa Schneider, geo media program manager at Google.

Realised work

We made a collection of non-weapons made to target a specific person who works with your data at a big social media company.

We started a small resistance with a wink.

Without realising we also started a little revolution among friends and family, by causing commotion about data farming.

Exposition Set Up

Jeaninetharimpres.jpg

Because of the time pressure we presented four weapons instead of five. During the exposition we presented the four weapons, with pictures and names of our targets, on pedestals as if they were the solution to data farming. We chose to not present in an IKEA style set up (for example a work station). Because the weapons are not made to sold, or to be used at a desk. The weapons are made out of resistance as a statement and reminder. We showed a video ([click here for the link]) of the weapons in action and we set up the mouse to clarify how the objects function. We opened Facebook in the web browser en let the weapon do it's thing. At the end of the exposition we got some nice results, as you can see in the screenshot below and on the picture page.

After our final presentation with Jon and Tim at S/ash we decided to make the targets more visible. We did this by printing out a "wanted poster" with the picture and some background information, and put them at the pedestals.

Weapons of data destruction 11.jpg

Final Conclusions

What is the point?

The point we made is that control can be taken back. The monstrous companies are not as faceless as you might think.

We live in a time where populism is everywhere. One person can be the solution, also one person can be blamed. We took our targets not as the one person to blame, but as an example that the computer is not working with your data, a human being is.

What do we take away?

Next to all the technical stuff, such as arduino and working with different materials. We never stopped thinking, discussing and adjusting our concept. Maybe we took it a bit to far. We learned a lot about the theoretical side and contextualization. we definitely will take this to our final project.

We struggled during our talk with Tim and Jon before the exposition. Mainly because we switched so much that we were flooded with shreds of information. During the exposition we talked with all kind of people that helped with their feedback. We used the break to take some distance. Now, while finishing our research paper, things are becoming clear. We see now how all the different ideas contribute to our final work. All the ideas serve as background, and strengthen our context.

In general, we are very happy with what we accomplished in the time we had with this concept. After reflection we can conclude that we should have focused more on quality of one product, instead of the quantity of a collection. With the insights we have now, we would focus on researching and perfection one item, the mouse. The mouse is the strongest artifact we made. It is the strongest for several reasons, it is the one item that works and has an immediate visual effect. Also it is the strongest because we can make a lot of steps in the development area. Those steps would for instance be the development of a software that would prevent from closing the browser.

keyboard

The keyboard is the odd one out. Where the other artifacts have a potential of working, the keyboard has none. The keyboard cover makes your data useless not only for the target, but also for yourself.

Aesthetically the keyboard is very successful. The mahogany stain makes the cheap lasercut wood more refined.

mouse

The mouse is the strongest artifact we made, it has an immediate visual effect. Also it is the strongest because of the potential it has for further development.

We tested the mouse for just short periods of time. When used for a longer time the mouse would not limit itself to Facebook, the mouse would close the browser, edit browser setting ed. A next step would be to develop background software to prevent the browser from closing.

kaleidoscope

The kaleidoscope brought a nice visual effect, but was after the keyboard the least effective object / weapon.
The analog solution that we came up with wasn't as strong as we thought it would be. If we would redo the kaleidoscope we would make a digital solution and make it look analog.

speaker

The speaker is bringing a, to us, very clear solution for the instagram eavesdropping story, but next to the other objects it became unclear. When all of the objects were brought together the specific target of the object got lost a bit.

We could have made the object more clear by adding a stand for your phone or by putting a instagram logo on the machine.

Insights from exposition

As we mentioned, with the information we have we would only develop and thus exhibit one artifact. That would have been the mouse. If we had made that choice our set up would have been more clear. Now the collection caused noise between themselves. Our communication could have been more clearer, now it was more a presentation of nice objects.

The video was a nice touch and well made, but in the end caused for more noise. Less is more.

Also mentioned earlier, we made the targets more visible. We did this by printing out a "wanted poster" with the picture and some background information, and put them at the pedestals.

Bibliography

  1. reference, data farming, wiki reference page
  2. Peter-Paul Verbeek, Wij hebben geen klauwen en dus hebben we ’n iPhone, website
  3. JoAnn Stonier, Data is the new currency, article
  4. Acoustic Location and Sound Mirrors, The Museum of Retro Technology website
  5. Damián Le Nouaille, Instagram is listening to you blogpost
  6. Jeremy S. Cook, THERO : A Physical Device for Internet Privacy Control website
  7. Jean-Paul Sartre, Being and Nothingness book
  8. Lyrebird.ai website
  9. Wikipedia, Chladni figures website
  10. Christiana Wang, The Psychological Meanings Behind Familiar Shapes (And How to Use Them), article