Social and Technological Determinism

It’s been a long time since I had a real good discussion on determinism but recent discussions online and off have brought determinism back in focus. In particular the differences between technological and social determinism.

As a brief recap technological determinist believes “the uses made of technology are largely determined by the structure of the technology itself, that is, that its functions follow from its form” (Neil Postman). On the opposite side of the spectrum is social determinism which, as Langdon Winner states, “What matters is not the technology itself, but the social or economic system in which it is embedded”. Basically that society is not controlled by technology but innovation and the consequences of technology are shaped through the influences of things like culture, politics, economic arrangements and regulation.

What really annoys me with both these positions is their lack of flexibility. In order to make their positions work both the social and technological determinist attempts to be blind to facts which do not support their pet theory.

Look at file sharing – yes I know that this is a big target.

The regulation of file sharing through social, economic, political and moral attempts have been a failure in attempting to change the way in which certain social groups behave. Given fixed price, high bandwidth Internet connections and high storage – low cost mp3 players there is a high incentive to file share. Technology alone is not enough. The low chance of getting caught is also an incentive to copy.

But being either/or in attempting to explain the reason for file sharing is too narrow minded since it can only provide a limited view of the problem. So when the legislator attempts to regulate the problem it is indispensible to see both the social and technical forces which drive social changes related to technology.

A nasty comment

During the Christmas rush I have not been in sync with my online life but I have been doing the necessary maintanence. This is mostly typical stuff such as making sure spam does not get through. On the 22 December I recieved the nastiest comment ever on this blog.

The comment was to a post on the Fourth Nordic Conference on Scholarly Communication and made nasty, arrogant, vulgar, abusive & sexual comments about one of the persons mentioned. The comment was a nasty type of Cyberstalking and I simply removed it. But I am still wondering what the correct response should be. Removal from the visible side of the blog was an obvious step, but should I be contacting someone? Maybe the victim? Or the police?

The comment was signed but I rather doubt that the name was a real name. The comment came from IP number 63.117.244.62 which according to the ARIN WHOIS Database may narrow the search done a bit. Beyond that there is not much more information.

James Boyle on the Public Domain

James Boyle has published a new book. And it’s on the public domain. This is a must read affair. And if you dont believe me then you can download it first to check it out!

The Public Domain: Enclosing the Commons of the Mind is licensed under a Creative Commons Attribution-Noncommercial-Share Alike License.

If you like it, please consider buying a copy.

Why am I allowing you to copy the book for free?  And why is Yale University Press letting me?   To understand why I am doing it, watch this video by Jesse Dylan.  And if you want to  understand why it  makes economic sense to my publisher, read this short article.

Download the book as a pdf. (1.5Mb)

A year in New York

Oo! Imagine spending a year in New York. Well Helen Nissenbaum, who does interesting and cool computer ethics (focus on privacy work), is looking to fill a research fellowship:

Areas of focus: Multidisciplinary study of privacy, security, social dimensions of digital networks, values in computing and information system design

The NYU Department of Media, Culture, and Communication is pleased to announce a Research Fellowship/Scientist opportunity in the philosophy and politics of computing, digital media, and information systems, with a special focus on NSF funded research in privacy, security, and social dimensions of networking.

This one-year postdoctoral position is renewable for a second year and carries a teaching load of one course per year, or possibly two, as preferred.

Thanks Michael Zimmer for the heads-up!

Is a bad attempt an attempt?

Yesterday this email arrived

Bäste Göteborgs universitet webmail Ägare,
Det här meddelandet är från Göteborgs universitet meddelande Meddelanden Center till alla Göteborgs universitet webmail owners.We för närvarande uppgradera vår
databas och e-post center.We vill ta bort alla oanvända Göteborgs universitet webbmail för att skapa mer utrymme för nya one.To förhindra att ditt konto från stängning
måste du uppdatera den nedan så att vi vet att det är en
närvarande används konto.
Bekräfta din e-postadress nedan
Webbmejladress ……..
Användarnamn :…………………..
lösenord ……………
Födelsedatum: ……………..
Land eller område: ……….
Varning! E-ägare som vägrar att uppdatera sin
E-post, inom sju dagar efter mottagandet av denna varning kommer att förlora sin
webmail permanent.
Tack,
Göteborgs universitet Team.

For those of you who do not read Swedish – don’t worry! The writers of the email could not write Swedish. The email was sent to most (all?) employees’ email accounts at Göteborg University. It is so badly written, it contains a mix of Swedish and English and cultural clues to it’s falseness – not to mention that the reply-to address was @hotmail !!

Despite this the IT department sent a warning this morning that we should not reply to these emails – did anyone, even for a second believe this email?

So is this an attempted phishing attack? Is this an attempt at identity theft?

Since the email is so badly written the “attempt” is bound to fail. Does an attempt to steal someones password need to at least be in the realm of possibly succeeding to be a criminal act?

Open debate, free speech & copying

On Thursday last week a group of Swedish artists and writers spoke up in an op-ed on the topic of file sharing. Their motives and point of view are clear. Their timing is also to act out in support of the coming parliamentary vote that will create a harsher environment around illegal file sharing.

The op-ed begins with the idea that they [the artists/writers] had been too silent in their opposition to file sharing. The reason they state for this silence is the fear of “hate attacks from notorious file sharers” (my translation from: “hatattackerna från notoriska fildelare”).

This is an incredibly interesting position. These artists/writers are public figures and as such have a position from which they can easily publicise any and all opinions they may have. They are the media elite – when they talk reports listen. And yet they are asking for sympathy from the public since they are the victims of a group which does not have the same platform. The very fact that they have written and published an op-ed in one of Sweden’s largest and most important newspaper should suffice to prove this point.

This false humility, this wringing of hands, this wearing of sack-cloth and ashes is irritating but it could also be seen as a rhetorical move. Even so, the position of the poor-little-me-I-am-just-a-pop-star attitude is patently false and more provocative than they seem to understand.

The group of artists/writers who signed the op-ed seem to desire a world where they have the ear of the media, the platform to publish and to be discussed (in polite terms) but are not ready to meet criticism from the broader public – from those who they are selling to!

Whether it is culture or whether it is hamburgers the seller must be able to accept the criticism and choices of the buyers. I am a vegetarian and I will criticize any attempts meat sellers make to portray happy livestock. If an artist/writer makes an uniformed/stupid statement from the platform of fame and position of importance they have achieved, then I have the right to criticize them from below – without this being referred to as a hate-attack. If you speak out in public you must expect a reply. You may not like that reply but if you are unable to cope with the reply then you should not have entered the public arena.

This post was going to be about the content of the opt-ed but as you may have noticed I got stuck on the introduction and could not move beyond. So I take the easy way out and quote from the Industrial IT Group and a blog post they entitle: Stupidity in the age of information

…digital products are, by definition, open for being copied. This is the essence of the notion of digital. While some see this as a curse many of us see this as a blessing. Reinforcing laws surrounding filesharing comes at a prize and I see it as neither possible nor desireable to fight filesharing.

To this I would just like to add the schizofrenic position of encouraging and praising the importance is consumerism through digital gadgets and widgets while attempting to limit their use…

To the politicians about to vote on the coming legal proposals, a question: When you give your child an 120GB ipod – what are you expecting that they will do with it?

Obama as tech user

What you understand about technology is intimately related to the way in which you tend to use technology. This is why it always concerns me when non-tech users are put to regulate technology use. It’s a question of understanding.

President-elect Obama is on Flickr and uses a Creative Commons license for his photographs. Naturally this may be someone who works for him but at least he has the knowledge to hire people who “get” technology use.