Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
D E S I G N I M P L I C AT I O N S O N 3 D R E N D E R I N G S O F T WA R E S ’
INTRODUCTION
I used auto ethnography method and put myself at the center of the
research. As a Turkish citizen living in London, during my daily interactions
with people, I noticed that people have a prejudicial thinking on people
2
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
3
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
4
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
5
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
Firstly, Roman Empire used the word “Europe” to identify the ge-
ographical boundaries rather than the cultural values (2014, P. 4, Bake-
mans). After the fall of the Western Roman Empire, this geographical iden-
tity is used to unify Christians against the common enemy Arabs (2014,
P.5). With the fall of Constantinople, the conflict between Europe who
adopted Christianity and part of Asia who adopted Islam became more
visible (2014, P.4). In the history, European identity is emerged to preserve
the sense of belonging in the region and bring unity to the region. Besides
that, European identity is positioned and defined itself against Arabian
identity in both geographical and cultural context (2014, P. 6).
6
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
7
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
8
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
1 . D I G I T I S AT I O N O F T H E B O D Y
9
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
The reader of the RFID, powers and reveals the data stored inside the tag.
Today, passive RFIDs are being used to track pets, elder people, employees
at work and individuals’ who are travelling (2011, P.40, Bostrom and Sand-
berg).
10
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
is stored is not visible to the passport holder (P.145, Keshavarz). The known
databases that regulate and stores the data are Shengen Visa Center,
These databases sort people in a social manner depending on who is to be
considered as a possible threat for the state. A specific example is EURO-
DAC where, regulates the fingerprint database for illegal entries to EU.
The data base created for the purpose of detecting whether an individual
is asylum seeker or passed the border illegally (P.25).This regulations main
concern is the outsiders or the possible threats.
11
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
The use of NFC by privatized companies carries high risk of data sharing
without any notification to the individual. The RFID is introduced to our
daily lives by credit-card companies and the governments embraced it to
be used for a different purpose and this had problematic implications on
moving bodies.
Parts of the human body such as eye, finger, and face are being used
in the verification process and the data provided exists in connected da-
tabases. These processes and designed systems treat human body as the
source of information to verify the credibility of each person. This verifica-
tion process shows how exclusion, inclusion and power relations depend on
the presentation of the body parts (297, Lyon). The developments on em-
bedded RFID tags, that treat individuals as the source of data, are blurring
the line between our body and digital fingerprint. Becoming the artefact
and being connected to multiple information systems lead individuals to
become more visible and open to the authorities and privatized companies
by data sharing and control over data.
A single designed artefact, like a passport, contains all further con-
nections within the networks and has the capability of reflecting the possi-
ble political and economical outcomes between nations. The main reason
is that the artefact designed or the person it is designed for is a conse-
quence of political events or how nations are socially constructed (p.106,
Keshawarz). However, the designated use of it is to allow people
12
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
to pass the border blocks further questioning of the artefact itself and its
implications (p.106, Keshawarz). Next part of the research questions how
3D software and critical design can be used to investigate an artefact
such as a passport and reveal its further connections with the history and
todays networks.
13
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
14
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
15
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
embedding data inside them, she creates a further connection with the
artefacts identity. Those destroyed artefacts were existed in a specific loca-
tion; after they were modeled by using rendering software, they started to
carry a history.
The first approach, Rendering Borders allows an understanding
on how borders, current political situation of countries affect our way of
existence. Material Speculation ISIS treats the process of 3d modeling,
rendering and the printed artefact as giving life to a destroyed object.
Considering these approaches through the research process, I played with
the rendering software to deconstruct pieces of a passport. Each piece
contains a different story, meaning, and a purpose and as a whole it is
designed to communicate with the border agent. These pieces and their
further connections with the history and databases are hidden from the
passport holder (2016, Keshavarz). However rendering software, can be
used to communicate and visualize the connected networks built around
the passport.
16
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
4 . . R E S E ARC H M E TH O D O LO GY
17
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
His other point is asking questions, which are intended for humans,
to objects (2005, P.75). At the beginning of this research, I asked myself
“Who am I? Am I European or Asian? Why do I have to be something? “
By following Kopytoff’s methodology, I asked above questions to the ob-
jects designed to identify me. The reason why I asked these questions is
to explore and reveal the purpose behind what it is designed, why it is
designed in a specific way to identify individuals and what are the further
implications of the design (2005, P.80, Hoskins).
18
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
19
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
PINAR
In what conditions?
I was born in Antalya, Turkey on 01.02.1995. My National ID Card was
issued a couple of weeks after my birth and without my consent my religion
was depicted as Muslim.
How does it move from hand to hand and what other contexts and uses
can it has?
As a citizen, I am supposed not to express my political opinions in Turkey
because of the current tension. As an immigrant, I am supposed to behave
well, do the right things, contribute to the economy and eventually go back
20
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
21
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
L AY E R S O F A N E L E C T R O N I C P A S S P O R T
22
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
COVE R
23
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
BIOMETRIC SYMBOL
24
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
25
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
UK VISA
26
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
UK VISA- SYMBOLS
27
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
28
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
6. CONCLUSION
29
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
adaptation to border passing process carries the risk of data sharing and
invasion of privacy. With the embedded RFIDs being connected to multiple
databases and giving authorization to access to data generated allows
a visibility, which may encourage the states’ claim on moving bodies and
may allow use of data by the privatized companies.
People are not fully aware that the use of technologies such as RFIDs
embedded into an human body open to dilemmas in terms of ethics and
security and brings many issues such as the breach of individual’s privacy
depending on the purpose of use and the control mechanism on the data.
30
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
a re-interpretation of material.
31
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
REFERENCES
13. Guibernau, M.(2013), Belonging: Solidarity and Division in Modern Societies. Cam
bridge: Polity Press. 240 pp., Journal of Social Policy. Cambridge University Press,
43(4), pp. 852–854. doi: 10.1017/S0047279414000452.
14. Spry, T. (2001) ‘Performing Autoethnography: An Embodied Methodological Praxis’,
Qualitative Inquiry, 7(6), pp. 706–732. doi: 10.1177/107780040100700605.
15. Brubaker and Cooper(2000), Beyond Indetity, Theory and Society 29: 1-47. Kluwer Aca-
demic Publishers.
16. Bostrom N. and Sandberg A. (2011), The Future of Identity, Report, Commissioned by the
UK’s Government Office for Science, Oxford University, 1-54
17. Torpey, J. C. (2018) The Invention of the Passport: Surveillance, Citizenship and the
State. 2nd edn. Cambridge: Cambridge University Press (Cambridge Stud
ies in Law and Society). doi: 10.1017/9781108664271.
18. Dark Net. (2016). [film] Directed by M. Kochavi. USA: Mati Kochavi.
19.Revell, T. (2016). The Potential for Radical Politics in Rendering at From Paper to Pixels..
[online] Blog.tobiasrevell.com. Available at: http://blog.tobiasrevell.com/2016/12/
the-potential-for-radical-politics-in.html [Accessed 24 Sep. 2018].
20. Nufüs ve vatandaslık isleri genel müdürlügü. 2018. TC Iç Iseri Bakanlıgı. [Online].
[18 November 2018]. Available from: https://www.nvi.gov.tr/hakkimizda/projeler/
pasaport-bilgi/pasaport-sss
21. Lindsay, C. (2018). Watch our talk on the politics of passport design live from the V&A.
[online] Dezeen. Available at: https://www.dezeen.com/2017/08/25/watch-talk-
polics-passport-design-facebook-live-stream-va-friday-lates/
[Accessed 18 Nov. 2018].
33
CRITICAL CONTEXT REPORT | PINAR APAYDIN | IDC 2018
22. Richards, R. (2008) ‘Writing the Othered Self: Autoethnography and the Problem of
Objectification in Writing About Illness and Disability’, Qualitative Health, Research,
18(12), pp. 1717–1728. doi: 10.1177/1049732308325866.
23. Allahyari, M. (2018). portfolio. [online] Morehshin.com. Available at: http://www.more
hshin.com/ [Accessed 3 Nov. 2018].
24. http://royalcentral.co.uk/blogs/history/the-royal-coat-of-arms-explained-82173
34