Archive
Search
Artist Index
Institution Index
Thesaurus
[Default Title]
ADA Help
About
(current)
Magazine
Tools
Community
Feedback
Join
Theme
Theme
Light
Dark
Auto
Login
Login
Archive Search
Search
Date
1979–1989
1990–1995
1996–2000
2001–2005
2006–2010
2011–2015
2016–2020
2021–now
Genre
Digital Animation
Digital Graphics
Net Art
Social Network
Database Art
Bio Art
Digital Performance
Nano Art
Robotics
Telematics
Installations
Game Art
Glitch Art
Digital Activism
Events
Festival
Exhibition
Other
Conference
Reset
Artist
Scholar
Work
Work with Video
Literature
Institution
Event
Feature
All Categories
1
…
(more)
2
3
4
5
(current)
6
sort by relevancy (down)
Sort by Alphabeth (up)
sort by date (up)
sort by category (up)
How we Became Metadata
2010
-
2010
... knowledge. It shapes our sense of privacy, identity,
security
, civic-ness, labour, sharing, peer to peer-ness, being...
COMBATscience Augmented II
2022
... accompanies it, touches on fundamental legal, ethical, and
security
issues.
Transitional Spaces
1999
-
1999
... The image becomes more focused as people move closer to the
security
turnstiles. Continued non-moving presence under the...
Homefront
2005
-
2005
... these representations. // Within the climate of contemporary
security
discourses, I am interested in the mechanisms of desire,...
A Planetary Order (Terrestrial Cloud Globe)
2008
-
2009
... Babel of satellites, radio signals, text messages and
security
frequencies vibrate with an invisible stream of man-made...
Crack it !
2000
... controversies surrounding privacy, the public domain and data
security
would have been brought closer - metaphorically and literally...
Plasm: Not a Crime
1998
-
1998
... with 100base-T cabling. They can be near each other if
security
is an issue, but would also work well spread out among the...
PUBLIC DOMAIN
2008
-
2008
... In further research environmental monitoring technologies and
security
based technologies are used to question audiences experiences...
Sonicity
2000
-
2009
... The project uses environmental monitoring technologies and
security
based technologies, to question audiences experiences of the...
s t i l l a l i v e
2022
video
... Many give up privacy and data protection for promises of
security
. Manipulation is achieved through scaremongering. In this...
1
…
(more)
2
3
4
5
(current)
6