Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Border hacking: una conversione artistica dei confini nazionali nella società delle reti

View through CrossRef
Through the category of ‘border hack’ (proposed by Rita Raley) and the analysis of three meaningful artworks (Transborder Immigrant Tool by Electronic Disturbance Theatre 2.0 and b.a.n.g. lab, BorderXing Guide by Heath Bunting and Shadows from Another Place by Paula Levine), the aim of this article is to investigate the aesthetic-political practices around the notion of transnational border. These are works of a performative nature and are linked to the networked environment of the Internet. They exemplify a brand-new season of New Media Art, in which the electromagnetic armamentarium of satellite positioning systems and mobile devices takes on a tactical dimension of confrontation with the equally technological governmental-military strategies of border surveillance and identity control.
Edizioni Ca Foscari
Title: Border hacking: una conversione artistica dei confini nazionali nella società delle reti
Description:
Through the category of ‘border hack’ (proposed by Rita Raley) and the analysis of three meaningful artworks (Transborder Immigrant Tool by Electronic Disturbance Theatre 2.
0 and b.
a.
n.
g.
lab, BorderXing Guide by Heath Bunting and Shadows from Another Place by Paula Levine), the aim of this article is to investigate the aesthetic-political practices around the notion of transnational border.
These are works of a performative nature and are linked to the networked environment of the Internet.
They exemplify a brand-new season of New Media Art, in which the electromagnetic armamentarium of satellite positioning systems and mobile devices takes on a tactical dimension of confrontation with the equally technological governmental-military strategies of border surveillance and identity control.

Related Results

Life hacking
Life hacking
<p>This dissertation intervenes in the larger academic and popular discussion of hacking by looking at life hacking. In essence, life hacking presumes that your life is amena...
The Economics of Hacking
The Economics of Hacking
Hacking is becoming more common and dangerous. The challenge of dealing with hacking often comes from the fact that much of our wisdom about conventional crime cannot be directly a...
Morpho-functionality of the toothed whale external ear canal
Morpho-functionality of the toothed whale external ear canal
While marine, anthropogenic noise pollution is a scientific and societal matter of concern, there is limited knowledge on how sea animals, particularly cetaceans, perceive their en...
Essere Cives Christiani sotto Traiano e Marco Aurelio: clandestini in patria?
Essere Cives Christiani sotto Traiano e Marco Aurelio: clandestini in patria?
La domanda nasce dall’idea di accostare in maniera provocatrice il termine clandestinus, nella sua valenza contemporanea negativa e dispregiativa, al civis romanus christianus nel ...
A Network Defense System for Detecting and Preventing Hacking
A Network Defense System for Detecting and Preventing Hacking
Many computing systems have recently suffered significantly from hacking and preventing hacking is important in protecting business, sensitive information and every day network com...
Informatizzazione di un Servizio di Neuroradiologia
Informatizzazione di un Servizio di Neuroradiologia
Presso il Servizio di Neuroradiologia dell'Ospedale Bellaria è stato implementato ed avviato un sistema RIS/PACS per la archiviazione e gestione dei dati anagrafici dei pazienti, d...
Il narcisismo. Un'interpretazione sociologica
Il narcisismo. Un'interpretazione sociologica
Quantunque abbia una matrice psicoanalitica, la categoria di narcisismo si dimostra feconda anche in ambito sociologico. Invero, i tratti della fisionomia narcisista espressi dal m...

Back to Top