Skip to main navigation menu Skip to main content Skip to site footer
University of the Arts London

Here today, virtual tomorrow: Future proofing your digital presence

Abstract

Art and design students growing up with the Internet could justifiably believe that it has a certain persistence. Students are educated to build their digital career and concomitant digital identity, using a digital portfolio, and could feel that their work is secure. However, even a cursory review of the past fifty years of information technology would suggest that this confidence could be misplaced. What happens if the companies that host these services go out of business, or outdated file formats make files inaccessible? Issues related to privacy, security, access and preservation could result in student anxiety.

Keywords

anxiety, security, privacy, access, preservation, e-portfolio

HTML PDF

Author Biography

Dr Pete Rive

Dr Pete Rive teaches and researches in creative technologies at AUT CoLab in New Zealand. His research interests include design innovation, entrepreneurship and creative collaboration with a specialism in virtual reality and virtual worlds. The former Chairman of Film Auckland, Co-Chair of Auckland Screen and Digital Content Strategy, and President of the Chinese animation company Mili Pictures, he has worked in a number of roles in the screen industry over 30 years, including producer, director, writer and editor.


References

  1. Ainsa, T. (2016) ‘College students’ digital identity: perceptions towards employment and career’, College Student Journal, 50(1), pp.47-52.
  2. Atzori, L., Iera, A. and Morabito, G. (2010) ‘The Internet of things: a survey’, Computer Networks, 54(15), pp.2787-2805. https://doi.org/10.1016/j.comnet.2010.05.010.
  3. BBC News (2016) ‘Osram Lightify light bulbs “vulnerable to hack”’, BBC News: Technology, 27 July. Available at: http://www.bbc.co.uk/news/technology-36903274 (Accessed: 23 March 2017).
  4. Bowell, T. and Kemp, G. (2015) Critical thinking: a concise guide. 4th edn. New York: Routledge.
  5. Bratton, B.H. (2015) The stack - on software and sovereignty. Cambridge, Mass.; London: MIT Press.
  6. Church, G.M. and Regis, E. (2012) Regenesis: how synthetic biology will reinvent nature and ourselves. New York: Basic Books.
  7. Colab (2016) Student Powerpoint Presentation. Auckland University of Technology.
  8. DeLisio, J.E. (n.d.). Developing your professional portfolio [student guide]. Interdisciplinary Studies programme, Towson University. Available at: www.ufh.ac.za/tlc/sites/default/files/PortfolioPrep.pdf (Accessed: 23 March 2017).
  9. Dlodlo, N. and Mahlangu, H.B. (2013) ‘Usage of mobile-devices for recreation among the millennial generation’, African Journal for Physical, Health Education, Recreation and Dance, 19(4.1), pp.874-890.
  10. Dumitrica, D. and Gaden, G. (2009) ‘Knee-high boots and six-pack abs: autoethnographic reflections on gender and technology in second life’, Journal of Virtual Worlds Research, 1(3), pp.3-23. Available at: http://journals.tdl.org/jvwr/article/viewArticle/323 (Accessed: 23 March 2017).
  11. Fang, Y.H. and Tang, K. (2017) ‘Involuntary migration in cyberspaces: the case of MSN messenger discontinuation’, Telematics and Informatics, 34(1), pp.177-193. https://doi.org/10.1016/j.tele.2016.05.004.
  12. Fornas, J. (ed.) (2002) Digital borderlands: cultural studies of identity and interactivity on the Internet. New York: Peter Lang.
  13. Gibbs, P. (ed.) (2015) Transdisciplinary professional learning and practice. Cham: Springer.
  14. Gilbert, R.L. and Forney, A. (2015) ‘Can avatars pass the Turing test? Intelligent agent perception in a 3D virtual environment’, International Journal of Human-Computer Studies, 73, pp.30-36. https://doi.org/10.1016/j.ijhcs.2014.08.001.
  15. Gribbin, J. (2013) Computing with quantum cats: from colossus to qubits. London: Bantam Press.
  16. Guthrie, K.L. and McCracken, H.J. (2014) ‘Reflection: the importance of making meaning in e-service-learning courses’, Journal of Computing in Higher Education, 26(3), pp.238-252. https://doi.org/10.1007/s12528-014-9087-9.
  17. Haraway, D. (1993) ‘A cyborg manifesto’ in During, S. (ed.) The Cultural Studies Reader. London: Routledge, pp.271-291.
  18. Haraway, D. (1992) ‘The promises of monsters: a regenerative politics for inappropriate/d others’ in Grossberg, L., Nelson, C. and Treichler, P.A. (eds.) Cultural Studies. New York: Routledge, pp. 295-337.
  19. Kaplan, M. (2012) ‘DNA has a 521-year half-life’, Nature International Weekly Journal of Science, 10 October. Available at: http://www.nature.com/news/dna-has-a-521-year-half-life-1.11555 (Accessed: 23 March 2017).
  20. Kurzweil, R. (2005) The singularity is near: when humans transcend biology. New York: Viking.
  21. Levy, P. (1998) Becoming virtual: reality in the digital age. New York: Plenum Trade.
  22. Microsoft (n.d,), ‘Opening Word for DOS files in a modern Microsoft Word’. Available at: http://fileformats.archiveteam.org/wiki/DOC#Opening_Word_for_DOS_files_in_a_modern_Microsoft_Word (Accessed: 30 March 2017).
  23. Poerksen, B. (2013) Certainty of uncertainty: dialogues introducing constructivism. Exeter: Imprint Academic.
  24. Prensky, M. (2001) ‘Digital natives, digital immigrants part 1’, On the Horizon, 9(5), pp.1-6. http://dx.doi.org/10.1108/10748120110424816.
  25. Ramirez, E. (2015), ‘FTC Report on Internet of Things Urges Companies to Adopt Best Practices to Address Consumer Privacy and Security Risks’. Available at: https://www.ftc.gov/news-events/press-releases/2015/01/ftc-report-internet-things-urges-companies-adopt-best-practices (Accessed 30 March 2017).
  26. Rhodes, T.L. (2010) ‘Making learning visible and meaningful through electronic portfolios’, Change: The Magazine of Higher Learning, 43(1), pp.6-13. https://doi.org/10.1080/00091383.2011.538636.
  27. Rifkin, J. (2014). The Zero Marginal Cost Society: The Internet of Things, the Collaborative Commons, and the Eclipse of Capitalism (Reprint edition). New York: St. Martin’s Press.
  28. Rushkoff, D. (2016) Throwing rocks at the Google bus: how growth became the enemy of prosperity. New York: Portfolio.
  29. Shapiro, C. and Varian, H.R. (1999) Information rules: a strategic guide to the network economy. Boston, Mass: Harvard Business School Press.
  30. Smith, W.P. and Kidder, D.L. (2010) ‘You’ve been tagged! (Then again, maybe not): employers and Facebook’, Business Horizons, 53(5), pp.491-499. https://doi.org/10.1016/j.bushor.2010.04.004.
  31. Szefer, J., Jamkhedkar, P., Perez-Botero, D. and Lee, R.B. (2014) ‘Cyber defenses for physical attacks and insider threats in cloud computing’, in ASIA CCS 2014– Proceedings of the 9th ACM symposium on Information, computer and communications security. New York: ACM Press, pp.519-524. https://doi.org/10.1145/2590296.2590310
  32. Tapscott, D. and Williams, A.D. (2006) Wikinomics: how mass collaboration changes everything. New York: Portfolio.
  33. Tsosie, C. (2016) ‘Will the Yahoo breach compromise credit cards?’, CBS Money Watch: NerdWallet, 26 September. Available at: http://www.cbsnews.com/news/will-the-yahoo-breach-compromise-credit-cards/ (Accessed: 23 March 2017).
  34. Tucker, P. (2014) The naked future: what happens in a world that anticipates your every move. New York: Current.
  35. Ward, C. and Moser, C. (2008) ‘E-portfolios as a hiring tool: do employers really care?’, EDUCAUSE Quarterly, 31(4), pp.13-14. Available at: http://er.educause.edu/~/media/files/articles/2008/11/eqm0842.pdf?la=en (Accessed: 23 March 2017).
  36. Yoon, A. (2013) ‘Defining what matters when preserving web-based personal digital collections: listening to bloggers’, International Journal of Digital Curation, 8(1), pp.173-192. https://doi.org/10.2218/ijdc.v8i1.240.
  37. Zittrain, J. (2012), ‘Meme Patrol: “When something online is free, you’re not the customer, you’re the product.”’, The Future of the Internet. Available at: http://blogs.harvard.edu/futureoftheinternet/2012/03/21/meme-patrol-when-something-online-is-free-youre-not-the-customer-youre-the-product/ (Accessed: 23 March 2017).