The time a 13 year old committed identity theft…ON ME

While there are plenty of stories to draw on about serious cyber crime and hacking, such as the Julian Assange saga, documents leaked by Edward Snowden and morally wrong ransomeware, I'm going to focus on a more simpler narrative. This is my experience having my identity replicated by someone else online. And no, I didn't …

iFeudalism

Online Feudalism is an interesting concept that entails patterns of internet/program/application use in a feudal manor. This is a concept that online industries have adopted and implemented to ensure control. Feudal control is evident in a multitude of platforms like Facebook, numerous apple applications and a further abundance of social networking sites. The emergence of …

Wrapping my head around Attention as a Commodity & the Long Tail Effect

Our attention is so valuable – that’s the one main point I drew from this weeks lecture. With the mass amount of social networking sites fighting for your attention, views, shares, likes and comments a new form of economy has formed. An economy of attention, which trades and grows with your likes, shares, comments, along …

WEEK 4

Half way through listening to Ted's Lecture: Distribution of immaterial labour across networks Information flows  Breaking of borders in fixed time and space We are the surplus value – we are the distributed nodes in that network we add value to them - Serves as connectors. We are essentially doing the work for different site, producing …

CyberSpace in a Nutshell

“ A consensual hallucination experienced daily by billions of legitimate operators… A graphic representation of data abstracted from banks of every computer in the human system. Unthinkable complexity. Lines of light ranged in the nonspace of the mind, clusters and constellations of data. Like city lights, receding” - William Gibson. I tried my best to …