The beauty of open data

Some news is tweetworthy and some is bloggable but the Live train map for the London Underground is definitely both!

Its a map that shows all trains on the London Underground network in approximately real time. How does it work

Live departure data is fetched from the TfL API, and then it does a bit of maths and magic. It’s surprisingly okay given this was done in only a few hours at Science Hackday and the many naming/location issues encountered, some unresolved. A small number of stations are misplaced or missing; occasional trains behave oddly; some H&C stations are missing in the TfL feed.

This is a beautiful example of the strength of open data. Its created by Matthew Somerville (with helpful hinderances from Frances Berriman and James Aylett). The Source code is available.

This is a static shot. But look at it live. Its a work of art… hypnotic!

The three hurdles in the path of free culture

Social advances (albeit unequally distributed) have granted people the leisure time to focus on the production of non-essential products and services. Advances in technology have radically reduced the costs for preserving and communicating these cultural artifacts beyond the boundaries of time and space. However it was not until the last 150 years where we have seen the technical and social advances necessary to enable widespread dispersion of the tools of cultural creation and communication to a wider group of users – the amateurs.
The oldest of these technologies is the art of reading and writing which challenged the status of memory. Plato was aware of the conflict and wrote about the art of writing in Phaedrus:

“…for this discovery of yours [writing] will create forgetfulness in the learners’ souls, because they will not use their memories; they will trust to the external written characters and not remember of themselves. The specific which you have discovered is an aid not to memory, but to reminiscence, and you give your disciples not truth, but only the semblance of truth; they will be hearers of many things and will have learned nothing; they will appear to be omniscient and will generally know nothing; they will be tiresome company, having the show of wisdom without the reality.”

This criticism tends to repeat itself with each new technology that redresses the shift of power among those who create culture and those who create culture with the aid of new technology. Arguments similar to those presented by Plato were used in the discussions of the relationships between photography and copyright. Mediating culture with technology brings about discussions on which of the forms of culture are more valuable and deserve protection.

In USA, after Congress amended the Copyright Act to include photography in 1865 the case of Burrow-Giles Lithographic Co. v. Sarony discussed whether the photographer Sarony could have sole rights to his portrait of Oscar Wilde. The United States Supreme Court ruled that photographs could be “representatives of original intellectual conceptions of an author.” While in the UK the courts stated in the Graves’ Case (1869) LR 4 QB 715 (a case under the Fine Arts Copyright Act 1862 dealing with a photograph of an engraving) that it was “…difficult to say what can be meant by an original photograph. All photographs are copies of some object.”

From these illustrations it is my intention to show that the discussions of culture, technology, value and protection are under constant discussion and movement and therefore are neither fixed nor moving in a linear development from one stage to the next. With the widespread dissemination of a cheap and simple (both terms to be take relatively) technology of digitalization coupled with an open communications infrastructure further barriers to amateur production of culture were removed.

This leads us up until today when the hurdles facing the individual wishing to become a cultural producer are no longer issues of time, economy or technical know-how. What are left are the two major barriers of creativity and copyright. Since it is beyond my ability to discuss the creativity of others I shall limit myself to developing what is meant by the limiting factor of copyright on the creativity of individuals by presenting the three main copyright related hurdles to free culture. The three hurdles are FUD, DRM & copyfraud. The common factor for these three hurdles is that they prevent the free use of cultural material in the development of new cultural artifacts and since our common cultural heritage provides the “raw material” in cultural production the means to develop new material is seriously curtailed.

Fear Uncertainty & Doubt (FUD)
The complexities of copyright have created a great deal of uncertainty among those actors attempting to create cultural artifacts while remaining within the limits of the law. The results of FUD favor inactivity since the perceived risks of violating copyright are seen as too great to risk. FUD is an important factor in different situations, for example: (1) where the creator intends to expose his/her product in a more formal setting e.g. a young film maker may easily add music or images to his/her film without permission but this will limit his/her ability to display the works to the public. (2) Orphaned works i.e. when the author of a work has been “lost” it becomes impossible to ask permission to reproduce and valuable cultural information is lost to the world. (3) The ability of museum and archives to reproduce or present their material to the world. At present the conflict between the National Gallery and Wikipedia provides an excellent illustration of this point. The latter is a great source of concern to many public cultural heritage institutions.

Digital Restrictions Management (DRM)
In an attempt to ensure control over intellectual property many organizations and individuals are implementing digital protection measures. The goal of these measures is to ensure that the copying and spreading of copyrightable material is prevented. However these digital measures tend to create rights for the owners that often go beyond the fair use rights of those attempting to consume the cultural artifacts. In addition to this, legislation intended to prevent users from circumventing digital protection measures have been enacted in most jurisdictions. The effect of such legislation is to make moot whether or not the user has fair use rights under copyright since he/she is illegally circumventing a digital protection measure.

Copyfraud
The general state of confusion surrounding the extent of protection granted by copyright is being used (intentionally and unintentionally) to claim copyright over material which either may not be copyrightable or material for which the period of copyright protection has passed. These illegitimate limitations to the public domain may of course be contested in court but such actions are costly, entail an element of risk and favor the party with better lawyers. Therefore material, which under copyright legislation is available to all, is prevented from becoming part of our common cultural raw material that may be freely used.

Can a license be too ethical?

The Gnu General Public License (GPL) holds an amazing position as the premier free and open source software license but this position may be slipping since its move to version 3 in 2007. In an article entitled Does GPL still matter? Yahoo Tech News reports:

A June study conducted by Black Duck Software, an open source development tools vendor, shows that the Free Software Foundation‘s GPL — although far and away still the dominant open source licensing platform — could be starting to slide. The survey found that despite strong growth in GPLv3 adoption, the percentage of open source projects using GPL variants dropped from 70 to 65 percent from the previous year.

This is interesting. But the question is what does this decrease (if it should be seen as a decrease) mean? The GPL has been in controversies before during its history (Wikipedia historical background) – in fact it’s monunmental position in free and open source software is built upon its unflinching ideological stance which has often been the root of controversy.

The question is whether the GPL has gone too far and is losing its position or if this should be seen as the GPL taking a new moral stance and waiting for the rest of the world to realise the wisdom of its position?

It's just a browser?

In less than three weeks from its launch Firefox 3.0 has been downloaded 28 million times (BBC report). Stop for a while and let that number sink in. 28 million downloads in three weeks. That translates to a lot of passionate users. But why? Why did so many people bother to download a new browser?

So OK, I downloaded a copy. But that still leaves almost 28 million others. Even if we subtract a decent number for the groupies, nerds, early adopters, tecchies and Open Source aficionados that still leaves a very, very, very large number of users who want to be among the first to use 3.0.

But why? It’s just a browser? Or is it? Obviously the tools with which we view the world have a great impact on the way in which the world is presented but it is doubtful that too many users consider this. And yet, can it be that even this group considers Firefox to be more than just a browser. Even though I doubt that all these users are ideologically motivated it is interesting to try to figure out why a browser arouses such interest and activity among users.

The browsers arriving at this blog are:

Internet Explorer 49%
Firefox 41%
Others 10%

Two New OA Books (+1)

This has been a busy week for books on Open Access. On Wednesday I blogged about the book Understanding Open Access in the Academic Environment: A Guide for Authors by Kylie Pappalardo. Today Open Access News wrote about two more new Open Access books:

E. Canessa and M. Zennaro at the Science Dissemination Unit of the Abdus Salam International Centre for Theoretical Physics (ICTP) in Trieste have put together an edited book Science Dissemination using Open Access.

From today’s announcement:

The book is a compendium of selected literature on Open Access, both on the technical and organizational levels, and was written in an effort to guide the scientific community on the requirements of Open Access, and the plethora of low-cost solutions available. The book also aims to encourage decision makers in academia and research centers to adopt institutional and regional Open Access Journals and Archives to make their own scientific results public and fully searchable on the Internet. Discussions on open publishing via Academic Webcasting are also included.

The other book is a 144 pp. collection of articles on OA by 38 authors, edited by Barbara Malina entitled Open Access Opportunities and Challenges: A Handbook, the German UNESCO Commission, July 2008. This is an English translation of Open Access: Chancen und Herausforderungen – ein Handbuch (2007).

Open Access Guide

The Oak Law project has produced an Open Access guide.

The book Understanding Open Access in the Academic Environment: A Guide for Authors by Kylie Pappalardo (with the assistance of Professor Brian Fitzgerald, Professor Anne Fitzgerald, Scott Kiel-Chisholm, Jenny Georgiades and Anthony Austin) aims to provide practical guidance for academic authors interested in making their work more openly accessible to readers and other researchers.

The guide provides authors with an overview of the concept of and rationale for open access to research outputs and how they may be involved in its implementation and with what effect. In doing so it considers the central role of copyright law and publishing agreements in structuring an open access framework as well as the increasing involvement of funders and academic institutions.

The guide also explains different methods available to authors for making their outputs openly accessible, such as publishing in an open access journal or depositing work into an open access repository. Importantly, the guide addresses how open access goals can affect an author’s relationship with their commercial publisher and provides guidance on how to negotiate a proper allocation of copyright interests between an author and publisher. A Copyright Toolkit is provided to further assist authors in managing their copyright.

The work is licensed under an Australian Creative Commons Attribution-NonCommercial-ShareAlike
2.5 License
.

HCC8

IFIP-TC9 HCC8
8th International Conference on Human Choice and Computers
on
Social Dimensions of ICT Policy

University of Pretoria
25-26 September 2008

Thursday 25 September

9:00 – 9:30 Opening session
Welcome speeches by conference organizers at the University of Pretoria

9:30 – 10:30 Plenary session: keynote speech
Communication, Information and ICT Policy: Towards enabling research frameworks, Robin Mansell

10:30 – 11:00 coffee break

11:00 – 12:30 Plenary session: Issues of governance of the information society
• 15 Years of Ways of Internet Governance: towards a new agenda for action, Jacques Berleur
• Free and Open Source Software in low-income countries: emergent properties? (panel): Gianluca Miscione (chair), Dorothy K. Gordon, Kevin Johnston

12:30 – 14:00 lunch break

14:00 – 15:30 Track 1: Harnessing the empowering capacity of ICT
• Government policies for ICT diffusion and the governance of grassroots movements, Magda Hercheui
• Egyptian women artisans: ICTs are not the entry to modern markets, Leila Hassanin
• Digital divides and the role of policy and regulation: a qualitative study of Greece, Panayiota Tsatsou

Track 2: National information systems infrastructures
• Institutional strategies towards improving health information systems in Sub-Saharan Africa, Solomon B. Bishaw
• Technology, globalization and governance: research perspectives and prospects, Diego Navarra and Tony Cornford
• Globalization and national security issues for the state: implications for national ICT policies, Jackie Phahlamohlaka

15:30 – 16:00 coffee break

16:00 – 17:30 Track 1: ICT and development in Africa
• Examining trust in mobile banking transactions: the case of M-PESA in Kenya, Olga Morawczynski and Gianluca Miscione
• Next generation ICT policy in South Africa: towards a human development-based ICT policy, Walter Brown and Irwin Brown
• Challenges of ICT policy for rural communities: a case study from South Africa, Mpostol Jeremia Mashinini

Track 2: ICT in education
• A human environmentalist approach to diffusion in ICT policies, Elaine Byrne and Lizette Weilbach
• ICT and socio-economic development: a university’s engagement in a rural community in Yola, Nigeria, Jainaba M.L. Kah and Muhammadou M.O. Kah
• Lessons from a dropped ICT curriculum design project: a retrospective view, Roohollah Honarvar

Friday 26 September

9:00 – 10:00 Plenary session: keynote speech Dorothy Gordon

10:00 – 10:30 coffee break

10:30 – 11:30 Plenary session: panel on the policy implications of a UK mega-programme in the health sector
Evaluating ‘Connecting for Health’: policy implications of a UK mega-programme, Kathy McGrath (chair) Jane Hendy, Ela Klekun, Leslie Willcocks, Terry Young

11:30 – 12:30 Plenary session: panel on ICT and women’s empowerment
Gender research in Africa into ICTs for empowerment (GRACE), Ineke Buskens and Anne Webb (co-chairs), Gertrudes Macueve, Ibou Sane

12:30 – 14:00 lunch break

14:00 – 16:00 Track 1: European Union and national ICT policies
• Empowerment through ICT: a critical discourse analysis of the Egyptian ICT policy, Bernd Carsten Stahl
• American and African geospatial myths: the argumentative structure of spatial data infrastructure initiatives, Yola Georgiadou and Vincent Homburg
• ICT policy as a governable domain: the case of Greece and the European Commission, Ioanna Chini
• National variations of the information society: evidence from the Greek case, Dimitris Boucas

Track 2: Challenging two fundamental institutions of modernity: IPR and measurement
• Social networks within filtered ICT networks: internet usage within Iran, Farid Shirazi
• No-IPR model as solution to reuse and understanding of information systems, Kai K. Kimppa
• Measuring ICT for development, Anouk Mukherjee
• Open Access and Action Research, Mathias Klang

16:00 – 16:30 coffee break

16:30 – 17:30 Closing plenary session: Discussion of emerging issues on ICT policy research, Chrisanthi Avgerou (chair)

Frenchmen risk being banned from the Internet

The French have gone and done it! Times Online reports:

Anyone who persists in illicit downloading of music or films will be barred from broadband access under a controversial new law that makes France a pioneer in combating internet piracy.

“There is no reason that the internet should be a lawless zone,” President Sarkozy told his Cabinet yesterday as it endorsed the “three-strikes-and-you’re-out” scheme that from next January will hit illegal downloaders where it hurts.

This is, as I have argued earlier (last time in January), a really bad idea. Why is banning people from the Internet a bad idea?

The Internet has been promoted and become our most basic communications infrastructure (my focus here is Europe since this is where the the French are).

1. The punishment does not fit the crime: We have changed the way Banks, Post Offices, ticket sales, hotel booking, insurance (etc, etc) work and banning someone from the Internet will be tantamount to branding a symbol of guilt onto the person. Not to mention the increased costs involved in time and money. Indeed why should copyright violation prevent me from online banking?

2. Group punishment: If an Internet connection is involved in copyright violation this does not mean that all those dependent upon that connection should be punished. The actual violator may be underage or the network may be open to others.

3. Privatizing the law: The ability to punish copyright violators should not be delegated to private bodies. Internet providers are not equipped to mete out legal punishments.

Earlier, when arguing against proposals such as these I wrote:

The proposals seen above are simplistic, naive and dangerous they show a fundamental lack of understanding not only of technology or its role in society but also a lack of understanding of the role of communication in a democratic society. The actions of the politicians proposing such measures show that they are not acting in the interests of the individuals they are there to serve.

Even if the French have chosen to go the other way – I still believe that they are wrong…

Activist Wifi

Stealing wifi is an old subject but it remains an interesting one. That some people have been prosecuted for stealing wifi in different parts of the world is also old news.* Still most of us have no problem checking for open networks when we need to access. I have also known users to be on their neighbours wifi without knowing or meaning to – they just don’t understand the difference. But this may be a minorty.

The availablity of open networks is either intentional, unintentional or even accidental. Accidental occurs when people don’t know about wifi and unintentional happens when people don’t know what they are doing. Then there is the group who intentionally shares their wifi.**

Some would prefer to share because sharing is good. Bruce Schneier has written about the added good of openness.

Similarly, I appreciate an open network when I am otherwise without bandwidth. If someone were using my network to the point that it affected my own traffic or if some neighbor kid was dinking around, I might want to do something about it; but as long as we’re all polite, why should this concern me? Pay it forward, I say.

The attitudes about freeloading and sharing vary. Some are scared of intrusion, some support the openness and others could not care less. Unfortunately the latter group is growing. I say unfortunately since the default settings on more wireless routers, especially those provided by ISPs, are closed.

This is the equivalent of the house advantage in roulette. Slowly and surely their will be no openness left other than those few activists who strive to ensure open networks. This means that the struggle for openness will go from the commonplace to the realm of the activists.

* Arstechnica reports that an Illinois man was arrested and fined $250 in 2006 & in Michigan man who parked his car in front of a café and snarfed its free WiFi was charged this past May [2007] with “Fraudulent access to computers, computer systems, and computer networks.” In a similar case from Singapore (Engadget) a 17-year old recieved 18 months of probation under the Computer Misuse Act for stealing his neighbours wifi. In the UK one man was been arrested and two people have been cautioned for WiFi theft or “dishonestly obtaining electronic communications services with intent to avoid payment.”

** Sharing wifi will in most cases violate the contract terms for most internet service providers.

The Swedish Surveillance State

I am almost ashamed for not blogging and discussing this in more detail. There have been plenty of media, discussions, and a blogging frenzy in the past two weeks…

Short of actually doing the work myself I simplified life – or gave way to my laziness and re-post this post from the EFF

A proposed new law in Sweden (voted on this week, after much delay) will, if passed, allow a secretive government agency ostensibly concerned with signals intelligence to install technology in twenty public hubs across the country. There it will be permitted to conduct a huge mass data-mining project, processing and analysing the telephony, emails, and web traffic of millions of innocent individuals. Allegedly these monitoring stations will be restricted to data passing across Sweden’s borders with other countries for the purposes of monitoring terrorist activity: but there seems few judicial or technical safeguards to prevent domestic communications from being swept up in the dragnet. Sound familiar?

The passing of the FRA law (or “Lex Orwell”, as the Swedish are calling it) next week is by no means guaranteed. Many Swedes are up in arms over its provisions (the protest Facebook group has over 5000 members; the chief protest site links to thousands of angry commenters across the Web). With the governing alliance managing the barest of majorities in the Swedish Parliament, it would only take four MPs in the governing coalition opposing this bill to effectively remove it from the government’s agenda.

As with the debate over the NSA warrantless wiretapping program in the United States, much of this domestic Swedish debate revolves around how much their own nationals will be caught up with this dragnet surveillance. But as anyone who has sat outside the US debate will know, there is a wider international dimension to such pervasive spying systems. No promise that a dragnet surveillance system will do its best to eliminate domestic traffic removes the fact that it *will* pick up terabytes of the innocent communications of, and with, foreigners – especially those of Sweden’s supposed allies and friends.

Sweden is a part of the European Union: a community of states which places a strong emphasis on the values of privacy, proportionality, and the mutual defence of those values by its members. But even as the EU aspires to being a closer, borderless community, it seems Sweden is determined to set its spies on every entry and exit to Sweden. When the citizens of the EU talk to their Swedish colleagues, what happens to their private communications then?

When revelations regarding the United Kingdom’s involvement in a UK-US surveillance agreement emerged in 2000, the European Parliament produced a highly critical report (and recommended that EU adopt strong pervasive encryption to protect its citizens’ privacy).

Back then, UK’s cavalier attitude to European communications, and its willingness to hand that data to the United States and other non-EU countries, greatly concerned Europe’s elected legislators. Already questions are being asked in the European Parliament about Sweden’s new plans and their effect on European citizen’s personal data. Commercial companies like TeliaSonera have moved servers out of Sweden to prevent their customers from being wiretapped by the Swedish Department of Defence. Sweden’s own business community have expressed concern that companies may move out of Sweden to protect their private financial data.

Sweden has often led the charge for government openness and consumer advocacy, and has, understandably, much national pride in seeing its past policies exported and reflected in Europe and beyond. Before Sweden’s MPs vote next week to allow its government surveillance access to whole Net, they should certainly consider its effect on their Swedish citizens’ privacy. But it should also ponder exactly how their vote will be seen by their closest neighbors. If the Lex Orwell passes, Sweden may not need something so sophisticated as a supercomputer to hear what the rest of the world thinks about their new values.