The internet of things: from networked objects to anticipatory spaces

BCM206, Uncategorized

“In simple terms, the IoT stands for the connection of usually trivial material objects to the internet – ranging from tooth brushes, to shoes or umbrellas” (Mitew, T. 2014).

We could describe the regular household as a representation of the impact of “The Internet of Things,” which is a term to describe the “ability to transfer data over a network without requiring human-to-human or human-to-computer interaction” (Wikipedia. 2019).

Companies are now single-handedly using the IoT as an advantage to connect households with multiple devices from the same brand.

Chet Pipkin, the CEO and founder of Belkin has a very positive outlook on the future of connecting technologies in the house, stating “The world is made up of trillions of things — cars, planes, jet engines, exercise equipment, the items on my desk. And then there’s the Internet. This category is about all of these things and the Internet, as we know it, coming together. Anything I can do over the Internet blended with my things” (Forbes, 2014).

As technology becomes more and more integrated into our networked home, we find that everything can be connected, making home-life just a little bit more easy to control. Is that such a bad thing?




Forbes. 2014. Everything Is Connected: What ‘The Internet Of Things’ Means Now. Available at: [Accessed 1 September 2019].

Mitew, T. (2014) ‘Do Objects Dream of an Internet of Things?’, Fibreculture Journal, 2014 (23), 1-25.

Wikipedia. 2019. Internet of Things. Available at: [Accessed 1 September 2019].

Dark fiber: hackers, botnets, cyberwar

BCM206, Uncategorized

The phenomena of hacking and cybercrime from their origins in the very beginning of the internet have grown exponentially. The future trajectory of cyberwarfare has us all concerned about the safety of our private information.


Hackers are individuals who without authorization use their skills to break into your computer system and collect and destroy information or install dangerous malware without your consent.


Botnets can be used to steal data, send spam, and allows the attacker to access the device and its connection. A ‘malicious’ botnet refers to when it can use illegal and dangerous coding to hack your machine. It can also be known as a “spider”, as it crawls the internet looking for holes in security to exploit. (Norton, 2019).

Ways that we can ultimately improve our privacy online from hackers and botnets include:

  1. Check your social privacy settings
  2. Don’t use public storages for private information
  3. Evade tracking
  4. Keep your main e-mail address and phone number private
  5. Use messaging apps with end-to-end encryption
  6. Use secure passwords
  7. Review permissions for mobile apps and browser extensions

(Kaspersky Daily, 2019).


My remediation is a youtube clip on the dangers of botnets, including tips on how to improve your privacy online:


Norton. 2019. What is a botnet?. Available at: [Accessed 8 October 2019].

Kaspersky Daily. 2019. 10 tips to improve your Internet privacy. vailable at: [Accessed 8 October 2019].

Digital resistance: hacktivists, whistleblowers, #AfterSnowden

BCM206, Uncategorized

What was the Wikileaks case?

Wikileaks is an organisation founded by Julian Assange that anonymously leaked information that was regarded secret through its website.
Some information that was leaked included internal documents from the Church of Scientology, leaked emails from Sarah Palin and classified military videos.
A former Army intelligence analyst by the name of Chelsea Manning was convicted and sentenced to 35 years in prison for violating the Espionage Act in 2013.

Digital resistance online

WikiLeaks ‘‘established a powerful brand identity as a technologically sophisticated service capable of distributing purloined data anonymously and publicizing its release.’’ (Fenster, 2011, p.7).
This use of global information networks for political retribution explores the ways in which we can use global online networks for purposes other than communication. It can be used for political digital resistance that can ultimately enforce change in our governments and in our social systems.
My remediation this week is a play on words – exploring how leaking information online can have a global impact.
CNN. 2019. WikiLeaks Fast Facts. Available at: [Accessed 30 September 2019].
Fenster, M. (2011, 28 March). Disclosure’s effects: WikiLeaks and transparency. SSRN Working Paper Series. Accessed 28 May 2013 from [Accessed 30 September 2019].

BCM206 Project Beta!

BCM206, Uncategorized

For the last year on Instagram, I have been developing my digital art page and hopes to make an actual business out of it. Now that I have a particular style I have decided I want to monetise my works.


In my video, I explore a couple of ways that I have been able to make money off my art. These included;

  1. Commissions


I have been increasingly eager in advertising my commissions to my followers in hopes that I can profit off my works. I profited off Father’s day by selling commissions as gifts. I believe this has worked out really well and I am looking forward to making more. I also offer physical prints, which will cost more than just a commission itself, however, I have not sold one yet.


Enter a caption

  1. Merchandise

A week or so ago I dropped new merchandise. I have not made a tee since last year in #BCM114 which I still have to this day. Inspired by the popular 2000s movie Superbad, my McLovin’ tees have become a popular part of my page and it has been incredibly positive for engagement and reach for new followers. Having my friends promote my work has allowed for real followers of closer-proximity that are willing to buy my work.







Through my analytics, you can tell that engaging with the art community online is a successful way to make your own page known – even if it is just liking another page’s photos. Little things like this are what will have a bigger impact on my page later down the track.


Increase profile visits with ‘follower experiment’

Originally, I focused solely on romantic comedies. This semester I have decided not to focus on genres but on the popularity of the films I post – and I can tell people are engaging better because of this.

Untitled_Artwork 7.JPGIMG_0579.JPG

Instagram: @rwfreckled

Twitter: rachelmayweisz

The social network revolutions: #arabspring

BCM206, Uncategorized

Social media can no longer be seen as only a way to contact friends and family online. It has the power to now be used to implement social change, raise awareness of certain global events and even have political ramifications. It can be seen as a way to bring different types of people together to negotiate a change in places where it is needed.

“The role of social media in the “Arab Spring, a revolutionary wave of demonstrations and protests in the Middle East and North Africa between 2010 and 2012, remains a highly debated subject.”

Below is a video that explores the impact of social media on the events with the Arab Spring:

Ways in which social media can be used as a form of protest include:

  • To organize demonstrations (both pro- and anti-governmental)
  • To disseminate information about their activities
  • To raise local and global awareness of ongoing events.

The Arab Spring was just one of many protests that were profoundly impacted by the use of social media to raise awareness and impact change – and it is something that will continue to grow rapidly.


Memes are just one example of how even something so little can become a worldwide phenomenon where even someone who is on the other side of the world is aware of what you’re talking about or referring to.



Wikipedia. 2019. Social media and the Arab Spring. [ONLINE] Available at: [Accessed 22 September 2019].


Bridges made of pebbles: social media and the transformation of journalism

BCM206, Uncategorized

We will discuss the implications of the long tail, data aggregation, and citizen journalism for traditional news media outlets, and concentrate on issues of editing, filtering, access and political engagement.

“As the industrial age makes way for the information age, and as its hierarchical and centralised structures for the organisation of production, distribution, and market economies transform towards a networked, heterarchical environment characterised by many-to-many information flows, the conventional models of media production, distribution, and consumption are no longer relevant” (Bruns, A. 2009).

With easy accessibility to research in our globally networked society, Citizen journalism has become more widespread which can ultimately create issues of editing, filtering, access and political engagement. Citizen journalism involves individuals who generate their own news content. Ultimately, they are creating user-generated content, which could risk the necessity of professional journalism as these ‘citizens’ do the job for them. 

What risks does this create in an environment where information is easily accessible, easily digestible and easily misunderstood?


I wanted this weeks remediation to pose a question; if we are digesting information that we find online and then digitally posting about it, can this be considered journalism?



ThoughtCo.. 2019. Understanding Citizen Journalism. Available at: [Accessed 13 September 2019].

Bruns, A., 2009. New Directions for e-Journalism. News Blogs and Citizen Journalism. 1, 2/20. Available at: [Accessed 13 September 2019].

iFeudals: big data, surveillance, permission control

BCM206, Uncategorized

iFeudalism is a term that explores the passing of information that is ultimately bundled up and used for other means, which is a big example of control in the networked world.

An example of this would be websites such as Youtube and Facebook that collect your information, analyse and use it to preselect content that they think you may enjoy. This is clearly seen on our feeds where content that is similar to what we have “liked” or “viewed” previously has popped up.

This could be seen as a process that creates “meta-data” which allows the owners of these platforms to make more of a profit flow, as the consumers are ultimately being shown content that could possibly be relevant to them.

Could this be seen as a disruption of privacy? Ultimately as consumers we did click “agree” to the terms and conditions, so is it wrong to consider this process a disruption of privacy? Let me know in the comments!


I wanted to create my remediation this week with a big of a joke behind it. We are all scared of losing our privacy, but can this be considered self-sabotage seeing as we are the ones who agreed to the terms and conditions?


The Attention Economy and the Long Tail Effect

BCM206, Uncategorized

Let’s break down this week’s topic with some definitions;

What does the Attention Economy refer to?

Attention economics explores the approach that human attention can be seen as a scarce commodity that needs to be applied to profit the modern economy. Matthew Crawford from the NY Times referred to attention as “a resource – a person only has so much of it.” (New York Times, 2015).

What is the Long Tail Effect?

The long tail effect theory was composed by Chris Anderson and suggests that the Internet drives demand away from hit products with mass appeal, and directs that demand to more obscure niche offerings (Wharton, 2009).

To compare to the networked life we live today and the rise of large media companies, the long tail provides the opportunity for media to be expended on a large scale – larger than our old media outlets e.g. Netflix in comparison to old video stores.

Here is a really well-explained video regarding the long-tail theory where she compares the online shopping network Amazon to regular shopping markets;

My Remediation:

My remediation this week refers to the large amounts of advertisements companies use to gain audiences attention – however, because we are being marketed so much information at one time – sometimes it can come across as just noise. Check it out:


The New York Times. 2015. The Cost of Paying Attention. Available at: [Accessed 3 September 2019].

Wharton. 2009. Rethinking the Long Tail Theory: How to Define ‘Hits’ and ‘Niches’. Available at: [Accessed 3 September 2019].