The Internet, Information Architecture and Community Memory

This article reviews current technological developments, particularly Peer-to-Peer technologies and Distributed Data Systems, and their value to community memory projects, particularly those concerned with the preservation of the cultural, literary and administrative data of cultures which have suffered genocide or are at risk of genocide. It draws attention to the comparatively good representation online of genocide denial groups and changes in the technological strategies of holocaust denial and other far-right groups. It draws on the author's work in providing IT support for a UK-based Non-Governmental Organization providing support for survivors of genocide in Rwanda.

[1]  Matthew Collin This Is Serbia Calling : Rock 'N' Roll Radio and Belgrade's Underground Resistance , 2001 .

[2]  Richard E. Hayes,et al.  Information Warfare and Deterrence , 1996 .

[3]  Michael Whine,et al.  Cyberspace-A New Medium for Communication, Command, and Control by Extremists , 1999 .

[4]  Charles F. Goldfarb,et al.  The XML Handbook , 1998 .

[5]  Aviel D. Rubin,et al.  Publius: a robust, tamper-evident, censorship-resistant web publishing system , 2000 .

[6]  Elizabeth D. Zwicky,et al.  Building Internet firewalls (2nd ed.) , 2000 .

[7]  Gérard Prunier The Rwanda crisis, 1959-1994 : history of a genocide , 1995 .

[8]  Thomas Muhr Increasing the Reusability of Qualitative Data with XML , 2000 .

[9]  John Arquilla,et al.  Looking Ahead: Preparing for Information-Age Conflict , 1997 .

[10]  John Arquilla,et al.  The Advent Of Netwar , 1996 .

[11]  Women's Rights Shattered lives : sexual violence during the Rwandan genocide and its aftermath , 1996 .

[12]  J. E. Young At Memory's Edge: After-Images of the Holocaust in Contemporary Art and Architecture , 2001 .

[13]  Patrick Carmichael Extensible Markup Language and Qualitative Data Analysis , 2002 .

[14]  Andrew V. Goldberg,et al.  Towards an archival Intermemory , 1998, Proceedings IEEE International Forum on Research and Technology Advances in Digital Libraries -ADL'98-.

[15]  Ben Y. Zhao,et al.  OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.

[16]  J. Wack,et al.  Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls , 1994 .

[17]  Stephen Northcutt,et al.  Network Intrusion Detection: An Analyst's Hand-book , 1999 .

[18]  S. D. Brunn,et al.  SMALL STATES AND CYBERBOOSTERISM , 1997 .

[19]  African Rights Rwanda : death, despair and defiance , 1995 .

[20]  Philip Gourevitch,et al.  We Wish to Inform You That Tomorrow We Will Be Killed with Our Families: Stories from Rwanda , 1999 .