Digital Resistance Call for Papers

Digital Resistance: Call for papers

Special thematic issue of the Journal of Resistance Studies

Editors: Nora Madison & Mathias Klang

This call as a pdf is available here

In many spaces, mobile digital devices and social media are ubiquitous. These devices and applications provide the platforms with which we create, share and consume information. Many obtain much of their news and social information via the personal screens we constantly carry with us. It is therefore unsurprising that these devices also become integral to acts of social activism and resistance.

This digital resistance is most visible in the virtual social movements found behind hashtags such as #BlackLivesMatter, #TakeAKnee, and #MeToo. However, it would be an oversimplification to limit digital resistance to its most popular expressions. Video sharing on YouTube, Twitter, and Facebook have revealed abuses of police power, racist attacks, and misogyny. The same type of device is used to both record, share, and view instances of abuse. The devices and platforms are also used to organize and coordinate responses, ranging from online naming and shaming, online protests, physical protests. The devices and the platforms are then used to share the protests and their results. More and more the device and the platform are the keyhole through which resistance must fit.

Our devices and access to platforms enable the creation of self-forming and self-organizing resistance movements capable of sharing alternative discourses in advocating for diverse social agendas. This freedom shapes both the individual’s relationship to both power and resistance, in addition to their identities and awareness as activists. It is somewhat paradoxical that something so central to the activist identity and the performance of resistance is in essence created and run as a privatized surveillance machine.

Digital networked resistance has received a great deal of media attention recently. The research field is developing, but more needs to be understood about the role of technology in the enactment of resistance. Our goal is to explore both the role of digital devices and platforms in the processes of resistance.

This special edition aims to understand the role of technology in enabling and subverting resistance. We seek studies on the use of technology in the acts of protesting official power, as well as the use of technology in contesting power structures inherent in the technology or the technological platforms. Contributions are welcome from different methodological approaches and socio-cultural contexts.

We are looking for contributions addressing resistance, power, and technology. This call is interested in original works addressing, but not limited to:

  • Problems with the use of Digital Resistance
  • Powerholders capacity to map Digital Resistance-activists through surveillance
  • How does Digital Resistance differ and/or function compared with Non-digital Resistance?
  • Problems and advantages with combinations of Digital Resistance and non- Digital Resistance?
  • Resistance to platforms
  • Hashtag activism & hijacking
  • Online protests & movements
  • The use of humor/memes as resistance
  • Selfies as resistance
  • Globalization of resistance memes
  • Ethical implications of digital resistance
  • Online ethnography (testimonials/narratives provided by online participants)
  • Issues concerning, privacy, surveillance, anonymity, and intellectual property
  • Effective rhetorical strategies and aesthetics employed in digital resistance
  • Digital resistance: Research methods and challenges
  • The role of technology activism in shaping resistance and political agency
  • Shaping the digital protest identity
  • Policing digital activism
  • Digital resistance as culture
  • Virtual resistance communities
  • The affordances and limitations of the technological tools for digital resistance

Abstracts should be 500 – 750 words (references not included).

Send abstracts to noramadison@gmail.com

Important Dates

Abstracts by 15 January 2019

Notification of acceptance 15 February 2019

Submission of final papers 1 April 2019

  • Max 12000 words (all included)

What is platform literacy?

Anyone who is trying to think about platforms and their impact should be following Mark Carrigan. His Platform Capitalism Reading Group includes key readings and is a discussion I wish I could have attended. And then their is this simple text What is platform literacy? in connection with a call for reading materials. This is why this is a fascinating question:

“In the last couple of years, I’ve found myself returning repeatedly to the idea of platform literacy. By this I mean a capacity to understand how platforms shape the action which takes place through them, sometimes in observable and explicit ways but usually in unobservable and implicit ones. It concerns our own (inter)actions and how this context facilitates or frustrates them, as well as the unseen ways in which it subtly moulds them and the responses of others to them.”

Nothing is more beautiful (and frustrating) to an academic to read a simple paragraph that nails the questions rattling around in your own mind. Thanks Mark!

The goal of platform literacy is to be able to identify the subtle ways in which actions are directed, controlled, regulated and censored in the online environment. To mangle the great “Whereof one cannot speak, thereof one must be silent.” (Wittgenstein) – We cannot protest that which prevents us from protesting.

Surveillance in the Simulacrum Notes From a Lecture

This lecture was about the ways in which the Simulacrum is a model for surveillance. The idea was to present the ways in which surveillance can be seen as beginning with juridical power of classical liberalism. This is best illustrated by the ways in which the power of the monarch was all about the right to use power over life and death to enforce commands. An illustration of this can be seen in Bentham’s model prison. This classic surveillance was built into the architecture and focused on reducing the cost of surveillance of the prisoners. In Bentham’s prison the efficiency was maximized when the few could easily and efficiently monitor the many. The norms we live by create the prison. Foucault writes in Volume One of History of Sexuality:

Power was exercised mainly as a means of deduction, a subtraction mechanism, a right to appropriate a portion of the wealth, a tax of products, goods and services, labor and blood, levied on subjects… a right of seizure… it culminated in the privilege to seize hold of life in order to suppress it.

This is, of course, Foucault’s starting point when he sees the prison as a metaphor of control and power. In the panopticon it was the prisoner’s role to internalize their own surveillance and become their own guards. In the wider society this can be seen by the ways in which we all become our own guards as we have internalized the social rules around us.

In order to illustrate this, I used the art history in order to illustrate the shift from the single dominant explanatory model to the complexity of regulatory and surveillance models. I started with showing them Diego Velazquez’s Las Melinas from 1656. After describing what the image portrayed we spoke of the positioning of the artist, the royal couple, the courtiers, dwarves and dog. The meaning increased with the understanding of who everyone was. The next image was Thomas Gainsborough’s Mr and Mrs Andrews

(1750) which portrayed the wealthy couple showing off their wealth. It reminds me of the boastful elements of social media. The next portrait was John Singleton Copley’s Portrait of Sam Adams (1772). This shows Adams slightly disheveled, holding a petition and demanding change. His head is oddly sized to his body and its hardly a flattering portrait. The image captures the high point of his activism rather than his physical prowess and wealth.

 

 

A major technological development is the camera. Now that mechanical reproduction was possible the question of what could be done in art was open for experimentation. From this point we see the development of different styles from the expressionism of Edvard Munch’s The Scream (1893), to the dadism of Marcel Duchamp’s Fountain, Jackson Pollock’s abstract expressionism, and the pop art of Andy Warhol.

These forms of art are often criticized for being simple and hardly worthy of the praise and attention they receive. The goal was to explain the ways in which we have moved from the dominant explanations of the world and begun to accept that multiple models of explanations that overlap and co-exist. The earlier forms of art are representations of a single idea and people. Later art has nothing so simple models of explanation but they are there to be interpreted and can offer different answers to different people. It was a fun exercise.

In particular asking the students whether something was art or not. Along with these famous images I also showed them an image of the joke that some people played when they put a pair of glasses on the floor in a gallery and people began taking photos of them.

Asking the students if this was art led to an interesting discussion. Could Marcel Duchamp exhibit a urinal and everyone called it art then what was different with the eyeglasses?

The goal was to discuss the world of surveillance without a dominant narrative and how power is redefined. Instead of the (juridical) centralized power we are left to our norms and this comes into a form of control by desire. The desire to belong to, and follow a group of norms. I had the students post questions on the readings in advance. Some of the questions were:

So is Bogard saying that being able to predict the actions of a population is a more effective form of control than making the population think it is constantly being watched?

Do you believe that people want to be ‘private’ in certain aspects of their life because of over-surveillance or has there always been an innate feeling that we are being watched?

Does constant surveillance morph people’s personalities over time?

if simulations are truly a way of surveilling, or something else? Are simulations a violation of privacy if they are not technically real?

With this I moved on to explaining the simulacrum as envisioned by Baudrillard who asserted that,

as simulation ascends to a dominant position in postmodern societies, the sign’s traditional function of representation, i.e. its power to “mirror reality” and separate it from false appearances, comes to an end, along with its role in the organization of society.

and

The utopian goal of simulation…is not to reflect reality, but to reproduce it as artifice; to “liquidate all referentials” and replace them with signs of the real. The truth of the sign henceforth is self-referential and no longer needs the measure of an independent reality for its verification.

In explaining the simulacrum I turned to The Idea Chanel and Mike Rugnetta to help illustrate the concept. His video “How Is Orphan Black An Illustration of the Simulacrum?” is a great and popular way to introduce the concept.

So Baudrillard shares Foucault’s sense that the panoptic model of enclosure and its disciplinary logic are historically finished. They are not enough to explain the ways in which norms are used as control and surveillance.

The discipline enforced by panoptic surveillance evolves into a general “system of deterrence,” in which submission to a centralized gaze becomes a general codification of experience that allows no room for deviation from its model. In post-panoptic society, subjectivity is not produced by surveillance in the conventional sense of hierarchical observation, but by codes intended to reproduce the subject in advance.

Not to mention that…

…power does not vanish, but becomes simulated power, no longer instantiated and invested in the real, but rather reproduced in codes and models.

In order to help explain the ways in which norms are used in enforcing I used Judith Butler’s ideas that its not that we are determined by norms – but rather that we are determined by the repeated performance of norms. In Gender Trouble she writes

In a sense, all signification takes place within the orbit of the compulsion to repeat; ‘agency’, then, is to be located within the possibility of a variation on that repetition.

The next step was to introduce the concept of biopower. This is becoming more and more interesting with the increasing use of wearable devices and fitness apps. This mode of surveillance comes with the idea of measurement through ideas of normal. Once we introduce concepts such as IQ, standardized testing, and BMI we instantly measure ourselves against them. They are the basis for creating a “correct” way to be. After the readings, some of the questions asked by the students were:

Is invisibly guiding people towards information that reinforces their biases (presumably what they want) a form of corporate efficiency, informational slavery, or both?

Does this type of surveillance bother us? Why not?

How does personal technology increase the constant surveillance of our bodies?

But how can we really trust algorithms in surveillance?

Here are the powerpoint slides I used in the class.

Privacy in the Past: Woman & Contraception

Kristofer Nelson writes about Privacy, autonomy, and birth control in America, 1860-1900, its a fascinating article on the ways in which gender and privacy have historically played out. This becomes particularly problematic when dealing with birth control. While access to contraception and abortion are still highly discussed today, they are not discussed in this way. What is interesting is the ways in which the private and public domains have been mapped and their borders re-drawn over time. Indeed

Access to birth control became, controversially, protected by the “right to privacy” in 1965;1 a hundred years before, “procreation was a matter of public concern.”2 Yet, contradictorily and confusingly, Victorian women — and their bodies — were protected (and limited) by a powerful social division between private and public spheres.

The rights of woman to her body was viewed in relation to other rights and needs. She was either “property” of her father or husband, or a national commodity as it was the women who would bear the American children. Therefore her use of contraception conflicted with a public interest:

A woman’s body was both a private and a national commodity. If she took steps to control her fertility she entered into the public domain and came into conflict with laws governed by public interest. If she interfered with her husband’s right to her body, she offended him as a man and a potential father.9

The latter quote is from Annegret S. Ogden, The Great American Housewife: From Helpmate to Wage Earner, 1776-1986, Contributions in Women’s Studies, no. 61 (Westport, Conn: Greenwood Press, 1986).

 

Seduction rather than policing

“The great majority of people – men as well as women – are today integrated through seduction rather than policing, advertising rather than indoctrinating, need- creation rather than normative regulation.”

Bauman, Z. (1998) On Postmodern Uses of Sex p.23

Jaywalking – who owns the city?

This thoughtful quote comes from the thoughtful essay The End of Walking by Antonia Malchik

Making jaywalking illegal gave the supremacy of mobility to those sitting behind combustion engines. Once upon a time, the public roads belonged to everyone. But since the ingenious invention of jaywalking we’ve battered pedestrianism in one of those silent culture wars where the only losers are ourselves.

After reading this you may enjoy reading The forgotten history of how automakers invented the crime of “jaywalking” by . And the great podcast 99% Invisible’s has an episode on jaywalking.

In the end it’s about what our public space is for. Who has the right of way. Of course we need to prevent people from getting killed but how much space should the road take from us?

Being Passive Aggressive on Facebook

How do you know when you’ve made a faux pas on a social network? If you let slip a politically incorrect comment in real life you should be able to tell that you have crossed a line by the pained expressions and the nervous squirms – but how do people squirm on social media?

This social squirming is important. It is a way in which we are schooled and taught the social boundaries of our world. Naturally some overly boorish person may actually say “we don’t accept that behavior here” but this is really unnecessary. We are usually good at picking up cues, the squirms are enough.

So how do people squirm on Facebook? Well they do so in the most passive aggressive way. Rarely do you find the boorish reproachful comment. Most often what we are met with is silence. Sure, offscreen it silence is a passive aggressive strategy but online it is the most commonly used.

Try it! Say something incorrect on FB and you will be frozen out of the social circle. Keep it up and people may begin to block you. Of course this means that the time nobody liked your post… it could have been that you crossed a social line.

Disobedience Technology: Notes on a lecture

This lecture had the goal of introducing theories and methodologies behind civil disobedience in order to give the class the tools to identify legitimate acts of civil disobedience compared to lawlessness.

We began with the example of Socrates whose principled stand was that the law must be obeyed. In Plato’s text Crito we find Socrates in jail awaiting execution. His friends argue that he should escape.

But Socrates argues that the Laws exist as one entity, to break one would be to break them all. He cannot chose to obey the rules that suit him and disregard those which he doesn’t approve of.

The citizen is bound to the Laws like a child is bound to a parent, and so to go against the Laws would be like striking a parent. Rather than simply break the Laws and escape, Socrates should try to persuade the Laws to let him go. These Laws present the citizen’s duty to them in the form of a kind of social contract. By choosing to live in Athens, a citizen is implicitly endorsing the Laws, and is willing to abide by them. (Wikipedia)

This principled stand cost Socrates his life. However, most proponents of civil disobedience argue that there must be a way of following some rules while disobeying others. This disobedience must find legitimacy in other sources.

Greek mythology dealt with this issue in the story of Antigone where at one stage after a battle King Creon decreed that the dead were not to be buried. Antigone defied the law and buried her brother. She knew of the law and defied it knowingly arguing that she was bound by a superior divine law.

Continuing on this theme we looked at some of the classics of disobedience. Thoreau’s arguments that we are sometimes obliged to defy the government, Gandhi’s belief that we have a duty to disobey the unjust leader (and the example of the salt march), and Martin Luther King’s words that an unjust law is against God’s law.

“For years now I have heard the word ‘Wait!’…We must come to see…that ‘justice too long delayed is justice denied.’…One may well ask, ‘How can you advocate breaking some laws and obeying others?’ The answer is found in the fact that there are two types of laws: just and unjust…One has not only a legal but a moral responsibility to obey just laws. Conversely, one has a moral responsibility to disobey unjust laws.” (King Letter from Birmingham Jail)

These positions all argue that there is a higher moral authority that would make it legitimate to disobey rules. Indeed, King underscores that disobedience in such cases is a moral responsibility.

The argument against disobedience remains in the area of the social contract and the question about who could legitimately argue for the rules to be held or broken? In his Theory of Justice, John Rawles agreed that that there are situations where laws should not be followed and attempts to prevent “simple” lawlessness by stressing that disobedience is:

…a public, nonviolent, conscientious yet political act contrary to the law usually done with the aim of bringing about a change in the law or policies of the government.

H. A. Bedau argued in Civil Disobedience in Focus that in order for disobedience to be legitimate it should be

“committed openly…non-violently…and conscientiously…within the framework of the rule of law…with the intention of frustrating or protesting some law, policy or decision…of the government.”

While Peter Singer stressed

…if the aim of disobedience is to present a case to the public, then only such disobedience as is necessary to present this case is justified…if disobedience for publicity purposes is to be compatible with fair compromise, it must be non-violent.

These positions can be summed up with the idea that certain acts of disobedience are necessary in order to bring a minority position to the attention of the majority. However, in order to maintain its legitimacy, acts of disobedience must be carried out openly, non-violently, purposely, aimed at a specific rule or policy, by people prepared to accept the consequences.

Despite this, there are still critiques aimed at groups that attempt to disrupt via acts of civil disobedience. Often the arguments against disobedience are:

  • CD is not defensible in a democracy as the social contract is established and maintained by the people for the people.
  • CD is illegitimate as it subverts the equality embedded in the democratic process itself.
  • CD can only be acceptable if ALL other (democratic) methods have been exhausted

These critiques are easily enough met if we look at the American civil rights movement. The activists chose not to entrust the democratic process since the process is an endless one and does not necessarily promote change, but can be used to re-enforce established ideas. As King writes: ‘justice too long delayed is justice denied.’ The outlook for social change, brought about from within the system was bleak. By challenging the rules it became more and more clear to the majority that the rules were harmful and needed to be changed.

We then spoke of moving disobedience online. Discussing the ways in which technology can be used to support activism. At the same time our technology use has also created a system in which our activism has been trivialised and subverted. Social media is efficiently used to promote and spread information about injustice. However, social media is also used to trivialize political acts. We click on LIKE icons, re-Tweet links, and share videos but what does it all mean?

Is this Postman‘s dystopia (Amusing ourselves to Death) in action?

The slides

Regulating Online Public/Private Spaces: Notes from a lecture

The presentation yesterday dealt with moving regulation from the physical world to the digital environment. My goal was to show the ways in which regulation occurs and in particular to go beyond the simplistic “wild west” ideology online – at the same time I wanted to demonstrate that online behavior is controlled by more elements than the technological boundaries.

In order to do this, I wanted to begin by demonstrating that the we have used tools for a long period of time and that these tools enable and support varying elements of control. And since I was going to take a historic approach I could not resist taking the scenic route.

In the beginning was the Abacus. Developed around 2400 BCE in Mesapotamia this amazing tool for extending the power of the brain to calculate large numbers (which is basically what your smartphone does but much much more…). The fascinating thing with the abacus is that despite the wide range of digital devices it remains in use today (but it is in deep decline).

The decline of the Chinese abacus the Suanpan

Suanpan arithmetic was still being taught in school in Hong Kong as recently as the late 1960s, and in Republic of China into the 1990s. However, when hand held calculators became readily available, school children’s willingness to learn the use of the suanpan decreased dramatically. In the early days of hand held calculators, news of suanpan operators beating electronic calculators in arithmetic competitions in both speed and accuracy often appeared in the media. Early electronic calculators could only handle 8 to 10 significant digits, whereas suanpans can be built to virtually limitless precision. But when the functionality of calculators improved beyond simple arithmetic operations, most people realized that the suanpan could never compute higher functions – such as those in trigonometry – faster than a calculator. Nowadays, as calculators have become more affordable, suanpans are not commonly used in Hong Kong or Taiwan, but many parents still send their children to private tutors or school- and government- sponsored after school activities to learn bead arithmetic as a learning aid and a stepping stone to faster and more accurate mental arithmetic, or as a matter of cultural preservation. Speed competitions are still held. Suanpans are still being used elsewhere in China and in Japan, as well as in some few places in Canada and the United States.

Continuing on the story of ancient technology pointed to the Antikythera Mechanism an analogue computer from 100BCE designed to predict astronomical positions and eclipses. The knowledge behind this machinery would be lost for centuries.

In the 17th century Wilhelm Schickard & Blaise Pascal developed mechanical addition and subtraction machines but the more durable development was that of the slide rule

The Reverend William Oughtred and others developed the slide rule in the 17th century based on the emerging work on logarithms by John Napier. Before the advent of the pocket calculator, it was the most commonly used calculation tool in science and engineering. The use of slide rules continued to grow through the 1950s and 1960s even as digital computing devices were being gradually introduced; but around 1974 the electronic scientific calculator made it largely obsolete and most suppliers left the business.

Despite its almost 3 centuries of dominance few of us today even remember the slide rule, let along know how to use one.

While the analogue calculating devices were both useful and durable most of the machines were less so. This is because they were built with a fixed purpose in mind. The early addition and subtraction machines were simply that. Addition and subtraction machines. They could not be used for other tasks without needing to be completely rebuilt.

The first examples of programmable machinery came with the Jacquard loom first demonstrated in 1801. Using a system of punch cards the loom could be programmed to weave patterns. If the pattern needed to be changed then the program was altered. The punch cards were external memory systems which were fed into the machine. The machine did not need to be re-built for changes to occur.

The looms inspired both Charles Babbage and Herman Hollerith to use punch cards as a method for imputing data in their calculating machines. Babbage is naturally the next famous point in our history. His conceptual Difference Engine and Analytical Engine have made him famous as the father of the programmable computer.

But as his devices remained to the largest part theoretical constructs I believe that the more important person of this era is Ada Lovelace who not only saw the potential in these machines but, arguably, saw an even greater potential than Babbage himself envisioned. She was the first computer programmer and a gifted mathematician.

Few scientists understood Babbage’s breakthrough, but Ada wrote explanations of the Analytical Engine’s function, its advantage over the Difference Engine, and included a method for using the machine in calculating a sequence of Bernoulli numbers.

The next step in this story Hollerith’s tabulating machine. While the level of computing is not a major step the interesting part is the way it came to be and the solutions that were created. The American census of 1880 took 8 years to conduct and it was predicted that the 1890 census would take 13 years to conduct. This was unacceptable and the census bureau looked for technical solutions. Hollerith built machines under contract for the Census Office, which used them to tabulate the 1890 census in only one year.

Hollerith’s business model was ingenious. He did not sell the machines, he sold his services. The governments and corporations around the world that came to rely on his company had no control but had to pay the price for his technical expertise. Hollerith’s company eventually became the core of IBM.

The point being that Hollerith positioned his company as holding the key role between the user and the data.

The progress in machinery and thoughts around machinery moved forward at a steady pace. Then making rapid progress during the second world war with names like Bletchley Park, the Colossus (the world’s first programmable digital electronic computer) and Alan Turing.

While most people could hardly comprehend the power of a computer, Vannevar Bush wrote his famous article on the Memex As We May Think in 1945. Here were visions of total information digitization and retrieval. Ideas that are now possible after half a century of modern computing history.

And with this we leap into the modern era, first with the Internet, then personal computers, and the advent of the world wide web.

The fascinating thing here is the business model becomes more clearly what Hollerith envisioned it. It was about becoming the interface between the user and the data. This is where the power lay.

When IBM was at it’s height Bill Gates persuaded them to begin using his operating system. He also persuaded them to allow him not to be exclusive to them. The world realized that it wasn’t the hardware that was important – it was what we could do with it that counted. Other manufacturers came in and IBM lost its hold of the computer industry.

When Tim Berners Lee developed the web and the first web browser and released them both freely online he created a system which everyone could use without needing licenses or payment. The web began to grow at an incredible rate.

Windows was late in the game. They still believed in the operating system but the interface between the user and the data was shifting. No matter which operating system or hardware you used it was all about accessing data online.

With Windows95 Microsoft took up the fight for the online world against the then biggest competitor Netscape. Microsoft embedded their browser Internet Explorer in the operating system and made it increasingly difficult for users to remove it. This was the beginning of the browser wars, a fight for control of the interface between the user and the data.

The wars eventually lost their relevance with the development of a new type of company offering a new version of a search engine. When Google came on the scene it had to compete with other search engines but after a relatively quick battle it became the go-to place where Internet users began their online experiences. It had become the interface between the users and the data. It didn’t matter which hardware, software, or browser you used… everyone began with Google.

At this point I introduced the four modalities of regulation used by Lawrence Lessig and presented in his work The Code from 1999.

modalitiesContrary to what many believe, regulation takes many forms. We regulate with social norms, with market solutions and with architecture (as well as laws). Naturally none of these modalities occur in isolation but we often tend to forget that much of our regulation is embedded in social, economic and physical contexts. If any of these contexts change then the law must adapt to encompass this change.

Using the offline problem of slowing down traffic I pointed to the law which hangs out speed signs, the market regulation of the price of a speeding ticket and the time it takes to negotiate its payment. Social attempts to slow traffic occur when people in the neighborhood hang signs warning drivers of children in the area. They are appealing to the drivers better nature.

And the architecture of the road. If we want to slow down cars it is much more efficient to change the road than to hang up a sign. Make it curvy, make it bumpy, change its colors there are an array of things that can be done to limit or slow access. The problem with using technology (or architecture) is that it is absolute. If we put speed bumps in the road then not even someone driving with good cause can speed. Even someone attempting to drive a heart attack victim to the hospital must slow down.

triangle The more we move from the analogue into the digital world the less control that is afforded through the law and the more ability we have to change the realities in which we live. Architecture or technology is more pliable as a form of regulation.

In closing I asked the class to list regulatory examples which occur when attempting to access information online via their smartphones. The complex interface between them and the data included new levels like the apps they use, the apps that their phones allow, their payment plans, social control online, social control offline and a whole host of other regulatory elements.

And here are the slides I used:

Public/Private Spaces: Notes on a lecture

The class today was entitled Public/Private Spaces: Pulling things together, and had the idea of summing up the physical city part of the Civic Media course.

But before we could even go forward I needed to add an update to the earlier lectures on racial segregation. The article The Average White American’s Social Network is 1% Black is fascinating and not a little sad because of its implications.

In the meantime, whites may be genuinely naive about what it’s like to be black in America because many of them don’t know any black people.  According to the survey, the average white American’s social network is only 1% black. Three-quarters of white Americans haven’t had a meaningful conversation with a single non-white person in the last six months.

The actual beginning of class was a response to the students assignment to present three arguments for and three arguments against the Internet as a Human Right. In order to locate the discussion in the context of human rights I spoke of Athenian democracy and the death of Socrates, and the progression from natural rights to convention based rights. The purpose was both to show some progression in rights development – but also to show that rights are not linear and indeed contain exceptions from those the words imply. The American Declaration of Independence (1776) talks of all men

We hold these truths to be self-evident; that all men are created equal, that they are endowed by their creator with certain unalienable rights, that among these are life, liberty and the pursuit of happiness.

but we know that this was not true. Athenian democracy included “all” people with the exception of slaves, foreigners and women. So we must see rights for what they are without mythologizing their power.

In addition they cannot seen in isolation. For example the Declaration of the Rights of Man and of the Citizen (1789) came as a result of the French Revolution include many ideas that appear in similar rights documents

  • Men are born and remain free and equal in rights.
  • Liberty consists in the freedom to do everything which injures no one else.
  • Law is the expression of the general will
  • No punishment without law
  • Presumtion of innocence
  • Free opinions, speech & communication

The similarities are unsurprising as they emerge from international discussions on the value of individuals and a new level of thought appearing about where political power should lie.

The discussion then moved to the concept of free speech and the modern day attempts to limit speech by using the concept of civility, and interesting example of this is explained in the article Free speech, ‘civility,’ and how universities are getting them mixed up

When someone in power praises the principle of free speech, it’s wise to be on the lookout for weasel words. The phrase “I favor constructive criticism,” is weaseling. So is, “You can express your views as long as they’re respectful.” In those examples, “constructive” and “respectful” are modifiers concealing that the speaker really doesn’t favor free speech at all.

Free speech is there to protect speech we do not like to hear. We do not need protection from the nice things in life. Offending people may be a bi-product of free speech, but a bi-product that we must accept if we are to support free speech. Stephen Fry states it wonderfully:

fryAt this point we returned to the discussion of private/public spaces in the city and how these may be used. We have up until this point covered many of the major points and now it was time to move on to the more vague uses. Using Democracy and Public Space: The Physical Sites of Democratic Performance by John Parkinson we can define public as

1.Freely accessible places where ‘everything that happens can be observed by anyone’, where strangers are encountered whether one wants to or not, because everyone has free right of entry

2.Places where the spotlight of ‘publicity’ shines, and so might not just be public squares and market places, but political debating chambers where the right of physical access is limited but informational access is not.

3.‘common goods’ like clean air and water, public transport, and so on; as well as more particular concerns like crime or the raising of children that vary in their content over time and space, depending on the current state of a particular society’s value judgments.

4.Things which are owned by the state or the people in and paid for out of collective resources like taxes: government buildings, national parks in most countries, military bases and equipment, and so on.

and we can define private as:

1.Places that are not freely accessible, and have controllers who limit access to or use of that space.

2.Things that primarily concern individuals and not collectives

3.Things and places that are individually owned, including things that are cognitively ‘our own’, like our thoughts, goals, emotions, spirituality, preferences, and so on

In the discussion of Spaces we needed to get into the concept of The Tragedy of the Commons (Hardin 1968) which states that individuals all act out of self-interest and any space that isn’t regulated through private property is lost forever. This ideology has grown to mythological proportions and it was very nice to be able to use Nobel prize winning economist Elinor Ostrom to critique it:

The lack of human element in the economists assumptions are glaring but still the myth persists that common goods are not possible to sustain and that government regulation will fail. All that remains is private property. In order to have a more interesting discussion on common goods I introduced David Bollier

A commons arises whenever a given community decides that it wishes to manage a resource in a collective manner, with a special regard for equitable access, use and sustainability. It is a social form that has long lived in the shadows of our market culture, but which is now on the rise

We will be getting back to his work later in the course.

In closing I wanted to continue the problematizing the public/private discussion – in particular the concepts of private spaces in public and public spaces in private. In order to illustrate this we looked at these photos:

2953558475_b092ca8193_m

Just a Kiss by Shutterpal CC BY NC SA

The outdoor kiss is an intensely private moment and it has at different times and places been regulated in different manners. The use of headphones and dark glasses is also a way in which private space can be enhanced in public. These spaces are all around us and form a kind of privacy in public.

The study of these spaces is known as Proxemics: the study of nonverbal communication which Wikipedia defines as:

Prominent other subcategories include haptics (touch), kinesics (body movement), vocalics (paralanguage), and chronemics (structure of time). Proxemics can be defined as “the interrelated observations and theories of man’s use of space as a specialized elaboration of culture”. Edward T. Hall, the cultural anthropologist who coined the term in 1963, emphasized the impact of proxemic behavior (the use of space) on interpersonal communication. Hall believed that the value in studying proxemics comes from its applicability in evaluating not only the way people interact with others in daily life, but also “the organization of space in [their] houses and buildings, and ultimately the layout of [their] towns.

The discussions we have been having thus far have been about cities and the access and use of cities. How control has come about and who has the ability and power to input and change things in the city. Basically the “correct” and “incorrect” use of the technology. Since we are moving on to the public/private abilities inside our technology I wanted to show that we are more and more creating private bubbles in public via technology (our headphones and screens for example) and also bringing the public domain into our own spaces via, for example, Facebook and social networking.

We ended the class with a discussion on whether Facebook is a public or private space? If it is a private space what does it mean in relation to law enforcement and governmental bodies? If it is a public space when is it too far to stalk people? And finally what is the responsibility of the platform provider in relation to the digital space as public or private space?

here are the slides I used: