Category Archives: Panel: Surveillance, Control, Sovereignty

Circulation Model

Speculative Security: Modeling Future Diseases and Climates

Presentation by Lindsay Thomas (UC Santa Barbara). Through surveying contemporary governmental simulation systems, this paper considers the interrelation of epidemic and climate/weather modeling and the ways in which such living networks imagine and build possible futures. I turn to both

Circulation Model

Speculative Security: Modeling Future Diseases and Climates

Presentation by Lindsay Thomas (UC Santa Barbara). Through surveying contemporary governmental simulation systems, this paper considers the interrelation of epidemic and climate/weather modeling and the ways in which such living networks imagine and build possible futures. I turn to both

The Distributed Sovereign: Political Affect and Network Protocols

Presentation by Jen Boyle (Coastal Carolina University). This presentation excavates a more textured understanding of the concept of “the protocol.” In contemporary networks and network studies, protocols refer to the horizontal and vertical translations that make possible the material enactments

The Distributed Sovereign: Political Affect and Network Protocols

Presentation by Jen Boyle (Coastal Carolina University). This presentation excavates a more textured understanding of the concept of “the protocol.” In contemporary networks and network studies, protocols refer to the horizontal and vertical translations that make possible the material enactments

Networks of Surveillance: Big Brother and Big Data go Digital

Presentation by Heidi McKee (Miami University). In this presentation I will analyze the laws (mostly U.S., but some international) governing the surveillance, collection, and use of personal data and communication— laws that often predate the development of the Web (e.g., ECPA,

Networks of Surveillance: Big Brother and Big Data go Digital

Presentation by Heidi McKee (Miami University). In this presentation I will analyze the laws (mostly U.S., but some international) governing the surveillance, collection, and use of personal data and communication— laws that often predate the development of the Web (e.g., ECPA,

The Politics and Economics of Public (Rhetoric) Spaces

Presentation by James Porter (Miami University).  Most of the rhetorics of the traditional Western academic canon assume that the rhetor has access to the podium: securing the right to speak is not an issue. The implied audience for the major

The Politics and Economics of Public (Rhetoric) Spaces

Presentation by James Porter (Miami University).  Most of the rhetorics of the traditional Western academic canon assume that the rhetor has access to the podium: securing the right to speak is not an issue. The implied audience for the major