Skip to main content Link Menu Expand (external link) Left Arrow Right Arrow Document Search Copy Copied

Sonification Demo 2

View original here.

Example 2 intentionally distorts nearly all sounds that could be recognized as traditional instruments, amplifying their effects to levels often heard in experimental genres. This distortion is a deliberate attempt to push the technological boundaries, resulting in new sounds that aim to place listeners in unexpected emotional states. The intentional distortion and amplification of the synthesized instrument sounds reflect the often overwhelming and disruptive nature of data breaches. The occasional ‘pop out’ sonic moments represent sudden shifts in how language was used to describe breach events, often coinciding with particular cultural or geopolitical moments in the West.

After months of experimenting with the dataset in TwoTone, I decided it was time to choose a key to work within. I selected D minor. The notes in the D minor scale are D, E, F, G, A, Bb, C, and D. Traditionally, D minor is associated with emotions such as melancholy, introspection, anxiety, uncertainty, and despondence.

Before the 20th century, it was common to associate musical keys with specific emotional or qualitative characteristics. This understanding was part of the shared cultural experience among those who created, performed, and listened to music. For example, when composers like Mozart, Beethoven, or Schubert wrote a piece in Ab major, known as the ‘key of the grave’, many in their audience would recognize this association.1

The tonality of D minor in classical music is often linked with somber, melancholic, or even dark “humors.” It can convey a sense of tragedy or sorrow, while in rock and pop music, D minor has been used to create emotional intensity. Songs like The Beatles’ Come Together (1969), Phil Collins’ In the Air Tonight (1981), New Order’s Blue Monday (1983), Wham!’s Careless Whisper (1984), Sade’s Smooth Operator (1984), Beastie Boys’ Root Down (1994), Radiohead’s I Might Be Wrong (2001), Beyonce’s Crazy in Love (2003), and Drake’s Hotline Bling (2015) are all in the key of D minor.

In the context of sonifying data, this historical practice of key association can enhance the emotional and qualitative impact of the auditory representation. By carefully selecting musical keys that align with the desired emotional response, data sonification can become a more powerful and intuitive tool for conveying complex information. In this example, D minor was an appropriate choice for the dataset because it could amplify and potentially distort the themes and observations that emerged from the discourse analysis. We observed many tensions in how data breaches were framed as crises and concluded that D minor could offer a heightened perception of these tensions, intensities, and harmonies in the dataset.

As a first step, I considered which data would be assigned to which key and sound/instrument and why, how to represent linear and nonlinear data, and whether to stay within or defy certain conventions. I decided to remove the ‘Year’ and ‘Date’ fields after importing the dataset into TwoTone, as I was not particularly interested in having this temporal data represented in the sonification. This allowed me to focus on the core narratives and themes that emerged from the discourse analysis.

For example 2, I chose a limited number of instruments to work with: the trumpet, harp, and double bass. Based on my previous experiments documented in examples 1 to 4, I wanted to continue manipulating some of the instruments to produce distortions. For instance, setting the track tempo to 12x for the trumpet and harp resulted in a droning sound. I isolated the ‘perpetrators’ and ‘breach’ variables as the core narratives. Both are represented by double bass in D minor with a 2-octave range. The primary difference is that the perpetrators track has a tempo of 2x, and the breach track has a tempo of 3x to produce variation and tension between the two. Together, the tracks produce the following:

‘Perpetrators’ and ‘breach’ served as the foundation of the sonification, creating a melody that helped map the other variables to specific instruments, keys, scales, octaves, and tempos. I deliberately avoided using arpeggios to reduce ornamentation. These initial decisions were crucial in structuring the sonification.

Below is a detailed explanation of the reasoning behind the choices made for specific tracks. Following this section is the complete sonification.

EXAMPLE 2.1 SIZE

View original here.

The trumpet is at 12x tempo to represent size. When set to 12x, the trumpet emits a consistent low drone, transitioning to a higher pitch to signify large data breaches without overwhelming the sound.

EXAMPLE 2.2 PERPETRATORS

View original here.

Because the perpetrators and breach were the anchor narratives of the sonification, the double bass was chosen to represent them. While the bass, along with drums, typically provides the backbone of a composition, here, this relatively quiet instrument was used to amplify the melody. The track uses 2 octaves to enhance the pitch or the range of ways language is used to describe perpetrators, without it overly dominating the sonification.

EXAMPLE 2.3 COMPANY NAMED

View original here.

The harp at 12x tempo represents the variable company named. At this speed, the harp produces a machine-like sound, resembling drilling at a lower pitch and hammering at a higher pitch. It is set within a 1-octave range to align with the binary coding (yes or no) used in the scoring framework. The continuous droning in the background highlights the lack of corporate accountability in news stories.

EXAMPLE 2.4 BREACH

View original here.

As the companion narrative to the perpetrators track, breach is is represented by a double bass in D minor with a 2-octave range. The breach track is set to a 3x tempo, while the perpetrators track is at 2x tempo, to distinguish between the two. Like the perpetrators track, the breach track is set within 2 octaves to enhance the variation in the levels of intensity used to describe the breach.

EXAMPLE 2.5 DATA

View original here.

Data is represented by a double bass in A minor with a 1-octave range and a 2x tempo. These settings were chosen to create the backbone of the sonification. The track features noticeable sections of the same pitch with discernible variations. The data variable acts as the backbone of the sonification, reflecting how many aspects of contemporary life are defined by and through data.

EXAMPLE 2.6 RISK

View original here.

Like size, risk is represented by a trumpet at a 12x tempo, but in the key of E minor. The trumpet was chosen to highlight the variability in how risk is depicted in the research data. Additionally, since risks and crises such as data breaches are understood not as exceptions but as outcomes of datafication, the persistent droning reflects the persistent risk.

EXAMPLE 2.7 COMPANY RISK

View original here.

As the companion narrative to company named, company risk is represented by a harp at a 12x tempo but in F minor to complement and differentiate it from company named. Although this variable has more variation than company named, it remains relatively monotonous. Consequently, the sections that sonify a documented risk to a company are distinct and discernible.

  1. Steblin, R. (1983). A history of key characteristics in the 18th and early 19th centuries. UMI Research Press.