In December 2012, the exuberant video “Gangnam Style” became the first YouTube clip to be viewed more than one billion times. Thousands of its viewers responded by creating and posting their own variations of the video—“Mitt Romney Style,” “NASA Johnson Style,” “Egyptian Style,” and many others. “Gangnam Style” (and its attendant parodies, imitations, and derivations) is one of the most famous examples of an Internet meme: a piece of digital content that spreads quickly around the web in various iterations and becomes a shared cultural experience. In this book, Limor Shifman investigates Internet memes and what they tell us about digital culture.
Shifman discusses a series of well-known Internet memes—including “Leave Britney Alone,” the pepper-spraying cop, LOLCats, Scumbag Steve, and Occupy Wall Street's “We Are the 99 Percent.” She offers a novel definition of Internet memes: digital content units with common characteristics, created with awareness of each other, and circulated, imitated, and transformed via the Internet by many users. She differentiates memes from virals; analyzes what makes memes and virals successful; describes popular meme genres; discusses memes as new modes of political participation in democratic and nondemocratic regimes; and examines memes as agents of globalization.
Memes, Shifman argues, encapsulate some of the most fundamental aspects of the Internet in general and of the participatory Web 2.0 culture in particular. Internet memes may be entertaining, but in this book Limor Shifman makes a compelling argument for taking them seriously.
This book is for those who are new to the Raspberry Pi Zero ,Raspberry Pi 2 or Raspberry Pi 3 and have some experience with the original Raspberry Pi models, and even for those budding secret agents who would like to use Pi Zero as a secret agent toolbox. No programming experience is assumed. Suitable for the novice and expert alike, each topic provides a fast and easy way to get started with exciting applications, with practical examples in every chapter.What You Will LearnInstall and configure the Raspbian Jessie operating system for maximum mischiefDetect an intruder with motion detection or a laser trip wire and set off an alarmListen in to conversations from a distance over BluetoothDistort your voice in weird and wonderful waysTrack the Pi's whereabouts using GPSConnect your Pi to the mobile Internet using a 3G dongle and make yourself anonymous on the netDisplay secret messages and codes to fellow agents on a LED displayIn Detail
This book is for all mischievous Raspberry Pi owners who'd like to see their computer transform into a neat spy gadget to be used in a series of practical pranks and projects. No previous skills are required to follow along, and if you're completely new to Linux, you'll pick up much of the basics for free.
We'll help you set up your Raspberry Pi Zero , Raspberry Pi 2 and Raspberry Pi 3 and guide you through a number of pranks and secret agent techniques that are so inconspicuous yet high on mischief. You'll learn how to configure your operating system for maximum mischief and start exploring audio, video, or Wi-Fi techniques. We'll show you how to record, listen, or talk to people from a distance and how to set up your own phone network. Then, you'll plug in your webcam and set up a motion detector with an alarm and find out what the other computers on your Wi-Fi network are up to. Once you've mastered the techniques, we'll combine them with a battery pack and GPS for the ultimate off-road spy kit.Style and Approach
This easy-to-follow guide is for budding secret agents who want to create tools for mischief, stealth, and reconnaissance. It's full of fun, practical examples and easy-to-follow recipes, guaranteeing maximum mischief for all skill levels.
Fresh from a party, a teen posts a photo on Facebook of a friend drinking a beer. A college student repurposes an article from Wikipedia for a paper. A group of players in a multiplayer online game routinely cheat new players by selling them worthless virtual accessories for high prices. In Disconnected, Carrie James examines how young people and the adults in their lives think about these sorts of online dilemmas, describing ethical blind spots and disconnects.
Drawing on extensive interviews with young people between the ages of 10 and 25, James describes the nature of their thinking about privacy, property, and participation online. She identifies three ways that young people approach online activities. A teen might practice self-focused thinking, concerned mostly about consequences for herself; moral thinking, concerned about the consequences for people he knows; or ethical thinking, concerned about unknown individuals and larger communities. James finds, among other things, that youth are often blind to moral or ethical concerns about privacy; that attitudes toward property range from “what's theirs is theirs” to “free for all”; that hostile speech can be met with a belief that online content is “just a joke”; and that adults who are consulted about such dilemmas often emphasize personal safety issues over online ethics and citizenship.
Considering ways to address the digital ethics gap, James offers a vision of conscientious connectivity, which involves ethical thinking skills but, perhaps more important, is marked by sensitivity to the dilemmas posed by online life, a motivation to wrestle with them, and a sense of moral agency that supports socially positive online actions.