Peter Langmar's Cultural Sphere and Public Interest

Reading and enjoying Peter Langmar‘s masters thesis Cultural Sphere and Public Interest: Combining Free and Participatory Culture, Cultural Democracy and Critiques of Value Regimes to Rethink Policy, Artistic and Institutional Practices

Here is part of the abstract:

The thesis aims at a holistic and multidisciplinary redefinition of public interest in the cultural sphere, contextualised in the democratic and cosmopolitan era. The thesis reveals various problems and weaknesses of the cultural sphere by combining a wide variety of concepts and discourses such as critiques of: high and mass culture, aesthetics, monopolistic competition, hegemonic value and copyrights regimes. In other words the thesis merges the critiques of the oligopolistic actors, of the hegemonic copyright and value regimes of the cultural sphere.

Peter’s work is theoretically a bit heavy – it even includes a section on future research in the form of a PhD research proposal – but its highly readable and is well worth the time. So far I am most pleased with the ways in which he connects free culture, cultural democracy and participatory culture.

As it’s licensed under Creative Commons BY NC SA I have added it to the texts of interests in my growing open licensed collection of works of interest.

Wikipedia Reader: new free book

Another book has been added to my growing hoard of CC licensed works that are somehow relevant to my research area.

The Critical Point of View: A Wikipedia Reader is an interesting work featuring research from a large group of exciting and original thinkers. It is, as the blurb states:

About the book: For millions of internet users around the globe, the search for new knowledge begins with Wikipedia. The encyclopedia’s rapid rise, novel organization, and freely offered content have been marveled at and denounced by a host of commentators. Critical Point of View moves beyond unflagging praise, well-worn facts, and questions about its reliability and accuracy, to unveil the complex, messy, and controversial realities of a distributed knowledge platform.

Right now the chapters which have my interest are

The Argument Engine by Joseph Reagle, What is an Encyclopedia? From Pliny to Wikipedia by Dan O’Sullivan
A Brief History of the Internet from the 15th to the 18th Century by Lawrence Liang, Questioning Wikipedia by Nicholas Carr, The Missing Wikipedians by Heather Ford, and The Right to Fork: A Historical Survey of De/centralization in Wikipedia by Andrew Famiglietti. But this is only a small fraction of the topics covered in this work.

So check out: Geert Lovink and Nathaniel Tkacz (eds), Critical Point of View: A Wikpedia Reader, Amsterdam: Institute of Network Cultures, 2011. Its available in online, pdf, or good old dead tree versions!

Also if there are other titles of CC licensed books which should be included in the list please let me know…

schlemiel or schlemihl or shlemiel

One of the main benefits of the web is the mass of totally meaningless information that is just waiting to be discovered. It could be used for amusement, procrastination or actual meaningful use (whatever that is…)

A fantastic resource is the old fashioned A.Word.A.Day mailing list administered by Anu Garg. It’s a daily email with an interesting word, with its background, meaning, etymology, pronounciation and more. Just check out some excerpts from the information about today’s word: schlemiel

MEANING:
noun: An inept, clumsy person: a habitual bungler.
ETYMOLOGY:
From Yiddish shlemil, from Hebrew Shelumiel, a Biblical and Talmudic figure who met an unhappy end, according to the Talmud. Earliest documented use: 1892.
NOTES:
No discussion of schlemiel would be complete without mentioning schlimazel, one prone to having bad luck. In a restaurant, a schlemiel is the waiter who spills soup, and a schlimazel is the diner on whom it lands.
What’s not to love?

Dangerous Bits of Information: Notes from a lecture

Last week was an intense week of lecturing, which means that I have fallen behind with other work – including writing up lecture notes. One of the lectures was Dangerous bits of information and was presented at the NOKIOS conference in Trondheim Norway. Unfortunately I did not have much time in the city of Trondheim but what I saw was wonderful sunny city with plenty of places to sit and relax by the river that flows through the center. But there was not much sitting outside on this trip.

The lecture was part of the session “Ny teknologi i offentlig forvaltning – sikkerhet og personvern” (New Technology and Public Administration – security and data security). In the same session was Bjørn Erik Thon, Head of the Norwegian and Storm Jarl Landaasen, Chief Security Officer Market Divisions, Telenor Norge.

My lecture began with an introduction to the way in which many organizations fail to think about the implications of cloud technology. As an illustration I told of the process that surrounded my universities adoption of a student email system. When the university came to the realization that they were not really excellent at maintaining a student email system they decided to resolve this.

The resolution was not a decision of letting individuals chose their system. But the technical group (it was after all seen as a tech problem) was convened and decided in an either – or situation. The decision placed before the group was whether we go with Google or with Microsoft. The group chose Google out of a preference for the interface.

When I wrote a critique of this decision I was told that the decision was formally correct since all the right people (i.e. representatives) where present at the meeting. My criticism was, however, not based on the formality of the process but rather about the way in which the decision was framed and the lack of information given to the students who would be affected by the system.

My critique is based on four dangers of cloud computing (especially by public bodies) and the lack of discussion. The first issue is one of surveillance. Swedish FRA legislation, which allows the state to monitor all communication, was passed with the explicit (though rather useless) understanding that only cross border communication will be monitored. The exception is rather useless as most Internet communication crosses borders even if both sender and receiver is within the same small state. But this cross-border communication becomes even more certain when the email servers are based abroad – as those of gmail are.

The second problem is that some of the communication between student and lecturer is sensitive data. Also the lecturer in Sweden is a government official. This is a fact most of us often forget but should not. Now we have sensitive data being transferred to a third party. This is legal since the users (i.e. the students) have all clicked that they agree the licensing agreements that gmail sets. The problem is that the students have no choice (or very little & uninformed – see below) but to sign away their rights.
The third problem is that nothing is really deleted. This is because – as the important quote states – “If you are not paying for it you are not the customer but the product being sold” – the business model is to collect, analyze and market the data generated by the users.

But for me the most annoying of the problems is the lack of interest public authorities has in protecting citizens from eventual integrity abuses arising from the cloud. My university, a public authority, happily delivered 40000 new customers (and an untold future number due to technology lock-in) to Google and, adding insult to injury, thanking Google for the privilege.

Public authorities should be more concerned about their actions in the cloud. People who chose to give away their data need information about what they are doing. Maybe they even need to be limited. But when public bodies force users to give away data to third parties – then something is wrong. Or as I pointed out – smart people do dumb things.

The lecture continued by pointing out that European Privacy Law has a mental age of pre-1995 (the year of the Data Protection Directive). But do you remember the advice we gave and took about integrity and the Internet in the early days? They contained things like:

  • Never reveal your identity
  • Never reveal your address
  • Never reveal your age
  • Never reveal your gender

Post-Facebook points such as these become almost silly. Our technology has developed rapidly but our society and law is still based on the older analogue norms – the focus in law remains on protecting people from an outer gaze looking in. This becomes less important when the spreading of information is from us individuals and our friends.

The problem in this latter situation is that it extremely difficult to create laws to protect against the salami-method (i.e. where personal data is given away slice by slice instead of all at once).

At this stage I presented research carried out by Jan Nolin and myself on social media policies in local municipalities. We studied 26 policies ranging between < 1 page to 20 pages long. The policies made some interesting points but their strong analogue bias was clear throughout and there were serious omissions. They lacked clear definitions of social media, they confused social media carried out during work or free time. More importantly the policies did not address issues with cloud or topics such as copyright. (Our work is published in To Inform or to Interact, that is the question: The role of Freedom of Information & Disciplining social media: An analysis of social media policies in 26 Swedish municipalities)

Social media poses an interesting problem for regulators in that it is not a neutral infrastructure and it does not fall under the control of the state. The lecture closed with a discussion on the dangers of social media – in particular the increase in personalization, which leads to the Pariser Filter Bubble. In this scenario we see that the organizations are tailoring information to suit our needs or rather our wants. We are increasingly getting what we want rather than what we need. If we take a food analogy we want food with high fat and high sugar content – but this is not what our bodies need. The same applies to information. I may want entertainment but I probably need less of it than I want. Overdosing in fatty information will probably harm me and make me less of a balanced social animal.

Is there an answer? Probably not. The only way to control this issue is to limit individual’s autonomy. In much the same way as we have been forced to wear seat belts for our own security we may need to do the same with information. But this would probably be a political disaster for any politician attempting to suggest it.

Powerpoint and kittens

Not for the first time during a conference I sit thinking about Edward Tuft. He was a critic of slideshow presentations and it is easy to understand why. Most of the time you find intelligent people failing to interact with their audience – not because the audience lacks the ability to comprehend but the technology used acts as a inhibitor rather than an enabler: The short version from Wikipedia

In his essay “The Cognitive Style of PowerPoint”, Tufte criticizes many properties and uses of the software:

  • It is used to guide and to reassure a presenter, rather than to enlighten the audience;
  • It has unhelpfully simplistic tables and charts, resulting from the low resolution of early computer displays;
  • The outliner causes ideas to be arranged in an unnecessarily deep hierarchy, itself subverted by the need to restate the hierarchy on each slide;
  • Enforcement of the audience’s linear progression through that hierarchy (whereas with handouts, readers could browse and relate items at their leisure);
  • Poor typography and chart layout, from presenters who are poor designers and who use poorly designed templates and default settings (in particular, difficulty in using scientific notation);
  • Simplistic thinking, from ideas being squashed into bulleted lists, and stories with beginning, middle, and end being turned into a collection of disparate, loosely disguised points. This may present an image of objectivity and neutrality that people associate with science, technology, and “bullet points”.

It is also easy to remember Edward Tufte from this wonderful illustration by Mark Goetz:

I have many kittens on my conscious – did Dante have a level for powerpoint abusers?

Information Science and Social Media

TGIF! It’s not that this week has been heavier than usual but it is nice to have the weekend to unwind and … well let’s be honest work on a paper that’s due soon. Sad but true.

The good news is that next week its time for ISSOME (Information Science and Social Media) in Turku, Finland. Check out the program. The papers look really good:

– Behavioural Traces and Indirect User-to-User Mediation in the Participatory Library / Lennart Björneborn

– How to study social media practises in converging library spaces. Making the case for deploying co-presence ethnography in studies of 2.0-libraries / Hanna Carlsson

– Implications of the Web 2.0 Technologies for Public Libraries intending to Facilitate Alternative Public Discourse / Leif Kajberg

– Geo-encoding of local services and information: Virtuaalipolku.fi / Samppa Rohkimainen

– The use of social media technologies in the work practices of information professionals / Sally Burford

– Examining the use of Internet and social media among men at military conscription age / Heidi Enwald, Noora Hirvonen and Tim Luoto

– To Inform or to Interact, that is the question: The role of Freedom of Information in Social Media Policies / Mathias Klang and Jan Nolin

– Designing Games for Testing Information Behavior Theories / J. Tuomas Harviainen

– Critical about clustering of tags: An intersectional perspective on folksonomies / Isto Huvila and Kristin Johannesson

– The creation of a personal space on the Internet: self presentation and self-disclosure in blogging / Jenny Bronstein

– On social media and document theory: an exploratory and conceptual study / Olle Sköld

– Linguistic and Cultural Differences in Content Management – Indexing and titling in multilingual and multicultural blogosphere / Susanna Nykyri

– Writing for Wikipedia as a learning task in the school’s information literacy instruction / Eero Sormunen, Leeni Lehtio and Jannica Heinström

– The Use of Weblogs and Microblogs in LIS Online Courses: A Case Study / Lu Xiao and Diane Neal

– Teaching social media in LIS: a bridging approach / Monica Lassi and Hanna Maurin Söderholm

– A Community-based Learning Approach towards Training Librarian 2.0 / Lu Xiao

– Author disambiguation for enhanced science-2.0 services / Jeffrey Demaine

– A Comparison of Different User-Similarity Measures as Basis for Research and Scientific Cooperation / Tamara Heck

– WikiLeaks Comments: A Qualitative Investigation / Noa Aharony

Looking for Love in All the Right Places: Defining Success in the World of Online Dating / Christopher Mascaro, Rachel Magee and Sean Goggins

Anyone know what to do in Turku? Anything that shouldn’t be missed?

Great idea: Nordic Techpolitics

Thanks to the hard work of people like Bente Kalsnes the first Nordic Techpolitics conference will be held in Oslo on Friday 2 September. The event

…is a must-attend conference for everyone interested in how technology is changing politics, government and societies in the Nordic countries.

What:

Technological changes affect every aspects of society, and institutions and policy makers are struggling to catch up with the latest tools and possibilities. This conference will explore how we can use technology to improve politics and governance, increase participation and create smarter solutions in everyday life. We will also peek into some of the dark sides of how technology is changing society for worse.

Expect to learn about how transparency, innovation and collaboration are the driving forces for change in modern societies.

Check out the schedule here.

Death, Internet & Law PhD

This is so cool! Almost makes me want to do a second PhD… More info here.

PhD Studentship in

Law

University of Strathclyde – Faculty of Humanities and Social Sciences – School of Law -– Legal Aspects of Transmission of Digital Assets on Death

The School of Law in the University of Strathclyde invites applications for a PhD studentship which will research the area of how the law regulates the transmission of digital assets on death, including notions of access, control, propertisation, and ownership. These assets might include: Facebook profiles, photos on Flickr, tweets, virtual assets in online game worlds such as Second Life, e-money, blog texts, eBay trading accounts, etc. This is a novel area where the student will be expected to research independently into appropriate areas of private law (eg property, succession, probate, contract) as well as intellectual property law, personality law and privacy law. A back ground in technology law is not essential, nor a technology qualification, but an interest in the information society is probably essential.

Applicants from any jurisdiction (including non-UK EU jurisdictions) are welcomed but English law will most likely form one of the jurisdictions of the study. Applicants should hold a first or upper second class Honours degree or equivalent in an appropriate discipline. A Masters qualification may be helpful. The studentship is funded by the Horizon Digital Economy Research Hub (https://www.horizon.ac.uk/) who are a major interdisciplinary centre for study of the Internet and ubiquitous computing funded by the RCUK Digital Economy programme and based at Nottingham University; the successful candidate will be based within the expanding Centre for Internet Law and Policy at Strathclyde Law School, but will have opportunities to participate in Horizons activities. The student will be supervised by the Director of CILP, Professor Lilian Edwards.

Applicants should submit, by SEPTEMBER 16 2011, a full CV, two academic references, evidence of academic qualifications to date and a covering letter detailing interest in the area of research to:

Janet Riddell (Horizon Digital Economy Scholarship), Graduate School Manager, Faculty of Humanities and Social Science, Room LT205, Livingstone Tower, 26 Richmond Street, Glasgow, G1 1XH

Or by e-mail to: hass-postgrad@strath.ac.uk

Successful applicants will have their fees at home/EU rates only ((sadly)) waived for three years together with an annual maintenance award for three years of £13,590. The scholarship is for one year in the first instance and subject to satisfactory progress, will normally be renewed up to the maximum of a further 2 years.

Visit www.strath.ac.uk/postgrad for general information on postgraduate research study at the University of Strathclyde and http://www.strath.ac.uk/humanities/courses/law/courses/lawbyresearch/ for further information on research degrees in the Law School.

Informal enquiries may be addressed to: lilian.edwards@strath.ac.uk

Pirate Bay torrent for 33 GiB Scientific papers

An huge collection of Papers (18,592) from Philosophical Transactions of the Royal Society has been made available on The Pirate Bay. The torrent includes this information:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

  This archive contains 18,592 scientific publications totaling
33GiB, all from Philosophical Transactions of the Royal Society
and which should be  available to everyone at no cost, but most
have previously only been made available at high prices through
paywall gatekeepers like JSTOR.

Limited access to the  documents here is typically sold for $19
USD per article, though some of the older ones are available as
cheaply as $8. Purchasing access to this collection one article
at a time would cost hundreds of thousands of dollars.

Also included is the basic factual metadata allowing you to
locate works by title, author, or publication date, and a
checksum file to allow you to check for corruption.

ef8c02959e947d7f4e4699f399ade838431692d972661f145b782c2fa3ebcc6a sha256sum.txt

I've had these files for a long time, but I've been afraid that if I
published them I would be subject to unjust legal harassment by those who
profit from controlling access to these works.

I now feel that I've been making the wrong decision.

On July 19th 2011, Aaron Swartz was criminally charged by the US Attorney
General's office for, effectively, downloading too many academic papers
from JSTOR.

Academic publishing is an odd systemΓΓé¼ΓÇ¥the authors are not paid for their
writing, nor are the peer reviewers (they're just more unpaid academics),
and in some fields even the journal editors are unpaid. Sometimes the
authors must even pay the publishers.

And yet scientific publications are some of the most outrageously
expensive pieces of literature you can buy. In the past, the high access
fees supported the costly mechanical reproduction of niche paper journals,
but online distribution has mostly made this function obsolete.

As far as I can tell, the money paid for access today serves little
significant purpose except to perpetuate dead business models. The
"publish or perish" pressure in academia gives the authors an impossibly
weak negotiating position, and the existing system has enormous inertia.

Those with the most power to change the system--the long-tenured luminary
scholars whose works give legitimacy and prestige to the journals, rather
than the other way around--are the least impacted by its failures. They
are supported by institutions who invisibly provide access to all of the
resources they need. And as the journals depend on them, they may ask
for alterations to the standard contract without risking their career on
the loss of a publication offer. Many don't even realize the extent to
which academic work is inaccessible to the general public, nor do they
realize what sort of work is being done outside universities that would
benefit by it.

Large publishers are now able to purchase the political clout needed
to abuse the narrow commercial scope of copyright protection, extending
it to completely inapplicable areas: slavish reproductions of historic
documents and art, for example, and exploiting the labors of unpaid
scientists. They're even able to make the taxpayers pay for their
attacks on free society by pursuing criminal prosecution (copyright has
classically been a civil matter) and by burdening public institutions
with outrageous subscription fees.

Copyright is a legal fiction representing a narrow compromise: we give
up some of our natural right to exchange information in exchange for
creating an economic incentive to author, so that we may all enjoy more
works. When publishers abuse the system to prop up their existence,
when they misrepresent the extent of copyright coverage, when they use
threats of frivolous litigation to suppress the dissemination of publicly
owned works, they are stealing from everyone else.

Several years ago I came into possession, through rather boring and
lawful means, of a large collection of JSTOR documents.

These particular documents are the historic back archives of the
Philosophical Transactions of the Royal SocietyΓΓé¼ΓÇ¥a prestigious scientific
journal with a history extending back to the 1600s.

The portion of the collection included in this archive, ones published
prior to 1923 and therefore obviously in the public domain, total some
18,592 papers and 33 gigabytes of data.

The documents are part of the shared heritage of all mankind,
and are rightfully in the public domain, but they are not available
freely. Instead the articles are available at $19 each--for one month's
viewing, by one person, on one computer. It's a steal. From you.

When I received these documents I had grand plans of uploading them to
Wikipedia's sister site for reference works, WikisourceΓΓé¼ΓÇ¥ where they
could be tightly interlinked with Wikipedia, providing interesting
historical context to the encyclopedia articles. For example, Uranus
was discovered in 1781 by William Herschel; why not take a look at
the paper where he originally disclosed his discovery? (Or one of the
several follow on publications about its satellites, or the dozens of
other papers he authored?)

But I soon found the reality of the situation to be less than appealing:
publishing the documents freely was likely to bring frivolous litigation
from the publishers.

As in many other cases, I could expect them to claim that their slavish
reproductionΓΓé¼ΓÇ¥scanning the documentsΓΓé¼ΓÇ¥ created a new copyright
interest. Or that distributing the documents complete with the trivial
watermarks they added constituted unlawful copying of that mark. They
might even pursue strawman criminal charges claiming that whoever obtained
the files must have violated some kind of anti-hacking laws.

In my discreet inquiry, I was unable to find anyone willing to cover
the potentially unbounded legal costs I risked, even though the only
unlawful action here is the fraudulent misuse of copyright by JSTOR and
the Royal Society to withhold access from the public to that which is
legally and morally everyone's property.

In the meantime, and to great fanfare as part of their 350th anniversary,
the RSOL opened up "free" access to their historic archivesΓΓé¼ΓÇ¥but "free"
only meant "with many odious terms", and access was limited to about
100 articles.

All too often journals, galleries, and museums are becoming not
disseminators of knowledgeΓΓé¼ΓÇ¥as their lofty mission statements
suggestΓΓé¼ΓÇ¥but censors of knowledge, because censoring is the one thing
they do better than the Internet does. Stewardship and curation are
valuable functions, but their value is negative when there is only one
steward and one curator, whose judgment reigns supreme as the final word
on what everyone else sees and knows. If their recommendations have value
they can be heeded without the coercive abuse of copyright to silence
competition.

The liberal dissemination of knowledge is essential to scientific
inquiry. More than in any other area, the application of restrictive
copyright is inappropriate for academic works: there is no sticky question
of how to pay authors or reviewers, as the publishers are already not
paying them. And unlike 'mere' works of entertainment, liberal access
to scientific work impacts the well-being of all mankind. Our continued
survival may even depend on it.

If I can remove even one dollar of ill-gained income from a poisonous
industry which acts to suppress scientific and historic understanding,
then whatever personal cost I suffer will be justifiedΓΓé¼ΓÇ¥it will be one
less dollar spent in the war against knowledge. One less dollar spent
lobbying for laws that make downloading too many scientific papers
a crime.

I had considered releasing this collection anonymously, but others pointed
out that the obviously overzealous prosecutors of Aaron Swartz would
probably accuse him of it and add it to their growing list of ridiculous
charges. This didn't sit well with my conscience, and I generally believe
that anything worth doing is worth attaching your name to.

I'm interested in hearing about any enjoyable discoveries or even useful
applications which come of this archive.

- ----
Greg Maxwell - July 20th 2011
gmaxwell@gmail.com  Bitcoin: 14csFEJHk3SYbkBmajyJ3ktpsd2TmwDEBb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk4nlfwACgkQrIWTYrBBO/pK4QCfV/voN6IdZRU36Vy3xAedUMfz
rJcAoNF4/QTdxYscvF2nklJdMzXFDwtF
=YlVR
-----END PGP SIGNATURE-----

via Papers from Philosophical Transactions of the Royal Society, fro download torrent – TPB.

Is the age of integrity over?

Today I am doing something different – stepping out of my comfort zone (but not too far). I was invited to give a short presentation (10 minutes) to spark a debate among young people between 12-19. Most of them turned out to be around fifteen. So I know I can talk to adults but the question was whether I could be relevant to teenagers.

The question I put forward was whether the need to protect integrity was a thing of the past.

So I began by presenting the question and then started with a bit of integrity orientation. The position I presented was that previously the way in which we protected our integrity was not necessarily by keeping information secret but rather giving different pieces of information to different groups of people. I called this a strategy of compartmentalization.

What this basically means is that you present different images of yourself to different people. What you did on Saturday is a constant – but you may present different stories of Saturday to your mother, girlfriend, boss, sister, friend and a total stranger (indeed you may even attempt to tell yourself a different story).

In a world where compartmentalization strategy is implemented the greatest fear is that the different groups will share information or that a body from above has access to different versions and will be able to question the truth of your stories.

Then along comes Social Media and the constant sharing of masses of low level unimportant data about what we are doing, where we are doing it, with whom – and sometimes even why.

The problem is no longer that of different compartments knowing what you did but rather attempting to handle the fact that the compartments probably do know several versions of your truth. What we are forming here is a hive-mind. In a hive mind where everyone knows everything about you the question is no longer one of maintaining boundaries between groups. For examples of hive minds I showed them The Borg from Star Trek, The Protoss from Starcraft, The Agents from the Matrix films and The Warewolves from Twilight.

The question becomes one of handling total openness. The question becomes one of: what is the point of attempting to maintain integrity regulation? In a world were we know everything about each other the question of wanting integrity becomes suspicious. And the old idiot saying: You have nothing to fear, if you have nothing to hide becomes downright ominous.

The discussion that followed was interesting, exciting and creative. The kids touched upon the meaning of truth, the nature of evil, the importance of secrets and the meaning of life. I was very impressed.