Crash Test Dummy

I don’t have a car and my main form of transportation is my bike (& feet). My vanity did not make wearing a helmet an option which I cared to consider. But a couple of years ago I realised that I would be very, very annoyed if I was injured in a bike accident since I knew that the smart thing to do is to wear a helmet. So this annoyance made me wear bike helmetsâ?¦

Today I want to thank Bell Helmets for their work. It was raining, I attempted to cross a wet tramway rail, I slipped and ate asphalt – big time.

The pain, humilation and torn clothes are nothing when I look at the damage my helmet took. My head is safe (minor headache) my helmet needs to be replaced. In five days I will have the opportunity to defend my PhD – I don’t know what I would be doing if I had not worn my helmet.

Thanks Bell…

Eight Years Old

It’s Google’s 8th birthday & they celebrate with this party graphic.

It’s amazing to think how radically they have changed the online world in only eight years. The Google graphics are designed by Dennis Hwang and a collection can be seen here.

Neutrality and Objectivity (or the beginning of a brawl)

In 2000 a report on IT related crime was released by the BRÃ?. BRÃ? is the Swedish National Council for Crime Prevention (Brottsförebyggande rÃ¥det – BrÃ¥). Since first reading this report I have been very critical of its presentation of gender in relation to computer crime.

When I began this blog in 2005 it was only natural that I would quote this report in an entry and air my criticism at the same time. So in a post entitled Boys, girls & computers (in November 2005) you can read:

In a report on IT related Crime (XXX & XXX) from The Swedish National Council for Crime Prevention from the year 2000 we find the wierd and wonderful quote:

â??Män misstänks för dataintrÃ¥ng, de manipulerar, raderar och stjäl program, filer eller data. När kvinnor misstänks som gärningsmän handlar det mestadels om interna dataintrÃ¥ng â?? obehörig registerupplysning och radering av filer, program eller data. Endast tre kvinnor misstänks för databedrägeri.â??

Källa: IT-relaterad brottslighet, BR�-rapport 2000:2

Loosely translated: Men are suspected of breaking into computer systems, they manipulate, erase and steal programs, files or data. When women are suspected it is mostly internally accessing computer systems – unauthorised looking at files and erasing files, programs or data. Only three women are suspected of computer fraud.

The authors therefore state that men are actively carrying out manly tasks of destruction while women are driven by curiousity to peek into files. Men â??break, manipulate, erase and stealâ?? while women look and erase. Even to the most untrained this is a joke. Men are doers who do macho stuff while women are either driven by curiousity or erase (by incompetence?).

I realise that the report is from 2000 butâ?¦ come on!! Can they have written this with a straight face?

Since then the post has been peacefully hanging around the database waiting for a reader. Today it solicited a reaction. An email arrived from someone claiming to be one of the authors of the report (it is not an official BRÃ? email address). I will reproduce the email in Swedish so as not to be accused of interpreting the content.

Hej Klang!
Jag såg att du hade citerat våran Brå-rapport på ituniv.se för ungefär ett år sedan. Jag blev en aning fundersam över ditt sätt att tolka vad vi skrivit i rapporten. Så jag tänkte att jag kanske kunde förklara hur du ska tolka det du citerade.

Vi påstår inget, vi redovisar ett resultat från en undersökning av polisanmäld brottslighet. Det vill säga den delen av brottsligheten som kommer till polisens kännedom. En del av dessa polisanmälningar innehöll uppgifter om en misstänkt gärningsmän. Vi sammanställde dessa uppgifter och fick fram ett antal kvinnor som misstänktes för brott. Så vad vi skriver är endast ett resultat av vad som framkom i undersökningen.
Således gör vi inga slustater om skillnader mellan mäns och kvinnors brottslighet, det råkade bara falla sig så att de kvinnor som fanns med i undersökning misstänktes för interna dataintrång.

Jag hoppas att jag förklarat så att du förstår vad du har läst. Och du, när du citerar något bör du ta med allt som står i avsnitt du tanker citera.

Mvh

The letter begins â??Hello Klangâ?? and goes on to explain that I have misinterpreted the report and the quote. The writer goes on to explain that the authors of the report were not drawing any conclusions but simply reporting. It ends with on a condescending note explaining how one should handle quotes.

To which I replied:

Din förklaring hjälper inte alltför mycket. Min kritik dÃ¥ – och nu – handlar om det vinklade sättet ni okritiskt presenterar er data.

I detta stycke som jag citerar kan man läsa att kvinnor begår brott på grund av nyfikenhet eller okunskap medans männens brottslighet är aktiv och kunnigt.

När en undersökning visar resultat som verkar helt skumma har man ett ansvar som forskare/författare/utredare att problematisera de resultat man får. Erat sätt att presentera siffrorna ger den oreflekterande läsaren en felaktig könsbild i relation till brottslighet.

Tonen i ert sprÃ¥kbruk i rapporten förstärker tydligt budskapet om kvinnans tekniska inkompetens. Du skriver i ditt mail: “Vi pÃ¥stÃ¥r inget, vi redovisar ett resultat…” jag hÃ¥ller inte med. Genom att skriva pÃ¥stÃ¥r man (i detta fall ni) nÃ¥got. Genom att citatet finns i en BRÃ? rapport sÃ¥ är det inte lösa ord utan semi-officiell sanning. Era ord skapar en verklighet som andra förhÃ¥ller sig till. Det sistnämnda kanske lÃ¥ter dramatiskt och överdrivet – framförallt i detta fall – men som utredare bör man inte anse att man endast rapporterar neutralt och sakligt.

Neutralitet och saklighet är något man strävar efter men det kan knappast uppnår.

Jag anser att ni har fel, att ni borde tänkt igenom vad siffrorna betyder och, framför allt, att ni borde uttryckt er på ett helt annat sätt.

Basically I criticise the authors again for their gender-biased report which shows men as active and knowledgeable, while women are ignorant, passive and nosey. I go on to state:
1) Researchers must question and problematise results which seem odd.
2) Presenting results without questioning creates, in this case, a slanted or biased view of gender in relation to IT crime.
3) The tone in the report re-enforces the gender bias.
4) The claim in the email that they are not interpreting but simply reporting is both wrong and harmful. Every time one writes anything it is an act of interpretation.
5) The presentation or interpretation in a report issued by BRÃ? ensures that the words are taken seriously.
6) Neutrality and objectivity are things writers should strive for but are not attainable goals.

I conclude by saying that I believe they are wrong in their report, they should have reflected upon what the numbers meant and, above all else, expressed themselves in a completely different manner.

I have edited out personal names so to enhance the principle discussion rather than those involved. Besides the important lack of gender understanding, the point I want to push across is the idea that a report can be neutral. All writing is an act of interpretation. All reading is an act of interpretation. The fact that one of the authors contacts me to “teach” me how to interprete his work demonstrates a serious lack of understanding of the role of the official report as a political and social artefact. If this had come from the writer of a lesser work I would have ignored it. But when the admonishment to interprete official sources in the “correct” manner comes from an official source my feeling of concern grows rapidly.

There is a danger when we accept at face value what we read (even in official sources). This danger becomes even more serious when the author attempts to lecture, teach or scold the reader for his or her interpretation.

GPLv3 info from FSF

The Free Software Foundation wishes to clarify a few factual points about the Second Discussion Draft of GNU GPL version 3, on which recent discussion has presented inaccurate information.

1. The FSF has no power to force anyone to switch from GPLv2 to GPLv3 on their own code.  We intentionally wrote GPLv2 (and GPLv1) so we would not have this power.  Software developers will continue to have the right to use GPLv2 for their code after GPLv3 is published, and we will respect their decisions.

2. In order to honor freedom 0, your freedom to run the program as you wish, a free software license may not contain “use restrictions” that would restrict what you can do with it. Contrary to what some have said, the GPLv3 draft has no use restrictions, and the final version won’t either.

GPLv3 will prohibit certain distribution practices which restrict users’ freedom to modify the code.  We hope this policy will thwart the ways some companies wish to “use” free software — namely, distributing it to you while controlling what you can do with it.  This policy is not a “use restriction”: it doesn’t restrict how they, or you, can run the program; it doesn’t restrict what they, or you, can make the program do.  Rather it ensures you, as a user, are as free as they are.

3. Where GPLv2 relies on an implicit patent license, which depends on US law, GPLv3 contains an explicit patent license that does the same job internationally.

Contrary to what some have said, GPLv3 will not cause a company to “lose its entire [software] patent portfolio”.  It simply says that if someone has a patent covering XYZ, and distributes a GPL-covered program to do XYZ, he can’t sue the program’s subsequent users, redistributors and improvers for doing XYZ with their own versions of that program.  This has no effect on other patents which that program does not implement.

Software patents attack the freedom of all software developers and users; their only legitimate use is to deter aggression using software patents.  Therefore, if we could abolish every entity’s entire portfolio of software patents tomorrow, we would jump at the chance.  But it isn’t possible for a software license such as the GNU GPL to achieve such a result.

We do, however, hope that GPL v3 can solve a part of the patent problem.  The FSF is now negotiating with organizations holding substantial patent inventories, trying to mediate between their conflicting “extreme” positions.  We hope to work out the precise details of the explicit patent license so as to free software developers from patent aggression under a substantial fraction of software patents.  To fully protect software developers and users from software patents will, however, require changes in patent law.

Demonstrate against DRM before 40

Lists are popular. One such list is the things one is supposed to do before turning 40 (for example this book). I don’t know what the book includes but I don’t think it contains what I have recently done… I have applied for, and received, a permit to carry out a public demonstration.

On 3 October between 08.30-10.15 we will be standing outside Chalmers University. Between 11.30-13.15 we will be standing near the statue called Kopparmärra (the copper mare).
We will be wearing yellow overalls and masks while handing out leaflets against DRM. Join us for the Day Against DRM.

GPL Violations

GPL Violations wins case against D-Link. D-Link had argued that the GPL was not legally binding.

On September 6, 2006 the district court issued its judgement, confirming the claims by gpl-violations.org, specifically its rights on the subject-matter source code, the violation of the GNU GPL by D-Link, the validity of the GPL under German law, and D-Links obligation to reimburse gpl-violations.org for legal expenses, test purchase and cost of re-engineering. Only the amount of the legal expenses was considered too high by some insignificant amount of 300 EUR. Therefore, this decision marks a clear-cut victory for gpl-violations.org. D-Link may file an appeal against the judgement.

(Via Cyberlaw)

Crappy IT Service

It seems that my universityâ??s idea of good IT service includes the fact that the web is down at least one weekend a month. This is:

Annoying, irritating, frustrating, infuriating, appalling, alarming, displeasing, distressing, galling, disturbing, aggravating, exasperating,

Not to mention:

Unpleasant, disagreeable, cumbersome, inconvenient, unwieldy, offensive, bothersome, incommodious, tiresome, troublesome, vexatious

Why donâ??t I move off-campus? The blog revolves around my research interests (vaguely and broadly defined) so I do like the fact that it is connected to my workplace. But if this continues I shall take my frustration elsewhere.

But the service (?) is back so at least I should stop abusing the thesaurus…

Social Informatics Day 1.5

After having attended too many conferences where the attitude is all about presenting it is very, very nice to be at a conference which emphasis discussion. In addition to this I have been able to present my own paper yesterday so today my focus is on listening to, and discussing with, others. The general â??feelingâ?? of the IFIP-TC9 is friendly and the members are really interested in the issues that are the focus of the conference.

Besides receiving probing questions on my own presentation I have listed to presentations by many of the people I read. In addition to this I have had the opportunity discuss informally with lots of interesting people.

Unhappy Powerbook

Something scary is happening with my computer at the moment. For no apparent reason my Powerbook (G4) has become extremely slow. Some startups just do not start but seem to get stuck. The successful starts take longer than Windows (remember NT?)… Its very frustrating and in particular when I am far away from efficient backup possibilities.

I'm Sorry Microsoft (only a bit)

In an earlier post (What is wrong with DRM?) I wrote that Microsoft’s new Zune wrapped all content in DRM mechanisms. This was based on this announcement. Apparently this is wrong. Only content which has DRM mechanisms attached is wrapped with the Zune DRM limitation. This means that the Zune does not interfere with the CC anti-DRM clause. Sorry about that Microsoft.

However this does not go against the arguments in the post. The use of DRM has the effect of both limiting legal uses of content and of narrowing our understanding of what is permissable – we move slowly to a society where the default concept is that everything innovative must be illegal…