Black day to remember

Seventy years ago today:

At 0445 Central European Time, the German battleship Schleswig-Holstein opens bombardment on the Westerplatte, a Polish military base outside Danzig, firing what are, according to many sources, the first shots of World War II. At the same time, regular Wehrmacht troops begin crossing the border into Poland. (wikipedia)

It is interesting to note that on the very same day Norway, Finland, Sweden, and Switzerland declare their neutrality. Spain and Ireland followed the next day. On the 3rd September The United Kingdom, France, New Zealand and Australia declare war on Germany. Obviously declaring war is a longer process than declaring neutrality.

But declaring neutrality on the very day of the attack, what does that say? No protest, no moral judgment simply a quick raising of the hands and a shout of “not my problem”?

HCC8

IFIP-TC9 HCC8
8th International Conference on Human Choice and Computers
on
Social Dimensions of ICT Policy

University of Pretoria
25-26 September 2008

Thursday 25 September

9:00 – 9:30 Opening session
Welcome speeches by conference organizers at the University of Pretoria

9:30 – 10:30 Plenary session: keynote speech
Communication, Information and ICT Policy: Towards enabling research frameworks, Robin Mansell

10:30 – 11:00 coffee break

11:00 – 12:30 Plenary session: Issues of governance of the information society
• 15 Years of Ways of Internet Governance: towards a new agenda for action, Jacques Berleur
• Free and Open Source Software in low-income countries: emergent properties? (panel): Gianluca Miscione (chair), Dorothy K. Gordon, Kevin Johnston

12:30 – 14:00 lunch break

14:00 – 15:30 Track 1: Harnessing the empowering capacity of ICT
• Government policies for ICT diffusion and the governance of grassroots movements, Magda Hercheui
• Egyptian women artisans: ICTs are not the entry to modern markets, Leila Hassanin
• Digital divides and the role of policy and regulation: a qualitative study of Greece, Panayiota Tsatsou

Track 2: National information systems infrastructures
• Institutional strategies towards improving health information systems in Sub-Saharan Africa, Solomon B. Bishaw
• Technology, globalization and governance: research perspectives and prospects, Diego Navarra and Tony Cornford
• Globalization and national security issues for the state: implications for national ICT policies, Jackie Phahlamohlaka

15:30 – 16:00 coffee break

16:00 – 17:30 Track 1: ICT and development in Africa
• Examining trust in mobile banking transactions: the case of M-PESA in Kenya, Olga Morawczynski and Gianluca Miscione
• Next generation ICT policy in South Africa: towards a human development-based ICT policy, Walter Brown and Irwin Brown
• Challenges of ICT policy for rural communities: a case study from South Africa, Mpostol Jeremia Mashinini

Track 2: ICT in education
• A human environmentalist approach to diffusion in ICT policies, Elaine Byrne and Lizette Weilbach
• ICT and socio-economic development: a university’s engagement in a rural community in Yola, Nigeria, Jainaba M.L. Kah and Muhammadou M.O. Kah
• Lessons from a dropped ICT curriculum design project: a retrospective view, Roohollah Honarvar

Friday 26 September

9:00 – 10:00 Plenary session: keynote speech Dorothy Gordon

10:00 – 10:30 coffee break

10:30 – 11:30 Plenary session: panel on the policy implications of a UK mega-programme in the health sector
Evaluating ‘Connecting for Health’: policy implications of a UK mega-programme, Kathy McGrath (chair) Jane Hendy, Ela Klekun, Leslie Willcocks, Terry Young

11:30 – 12:30 Plenary session: panel on ICT and women’s empowerment
Gender research in Africa into ICTs for empowerment (GRACE), Ineke Buskens and Anne Webb (co-chairs), Gertrudes Macueve, Ibou Sane

12:30 – 14:00 lunch break

14:00 – 16:00 Track 1: European Union and national ICT policies
• Empowerment through ICT: a critical discourse analysis of the Egyptian ICT policy, Bernd Carsten Stahl
• American and African geospatial myths: the argumentative structure of spatial data infrastructure initiatives, Yola Georgiadou and Vincent Homburg
• ICT policy as a governable domain: the case of Greece and the European Commission, Ioanna Chini
• National variations of the information society: evidence from the Greek case, Dimitris Boucas

Track 2: Challenging two fundamental institutions of modernity: IPR and measurement
• Social networks within filtered ICT networks: internet usage within Iran, Farid Shirazi
• No-IPR model as solution to reuse and understanding of information systems, Kai K. Kimppa
• Measuring ICT for development, Anouk Mukherjee
• Open Access and Action Research, Mathias Klang

16:00 – 16:30 coffee break

16:30 – 17:30 Closing plenary session: Discussion of emerging issues on ICT policy research, Chrisanthi Avgerou (chair)

The Kindness of Strangers

In Tennessee Williams‘ “A Streetcar Named Desire” the tragic figure of Blanche Dubois has the great line: Whoever you are— I have always depended on the kindness of strangers. While this is an apt line for Blanche it is not really a seniment I share. This attitude may be cynical but it makes the moment when I experience the kindness of strangers all the more important.

Today when I got to the office a brown envelope was waiting for me. The address was printed on a computer, the stamps were Swedish but otherwise no identifying marks. Inside the envelope was a copy of Elias Canetti’s The Voices of Marrakesh.

I have no idea who sent me the book, it is a new copy without any identifying marks or inscriptions. Very mysterious and what a wonderful gesture. I have not read it and I am looking forward to begining on it later this evening – thank you!

Flickr Growth

Media Culpa is an interesting media blog which also includes following Flickr. Since I use Flickr in lectures I find this very helpful. Here is the latest on Flickr growth from Media Culpa.

On May 17, 2008, the 2,500,000,000th photo was uploaded to Flickr (photo here). If we look at previous milestones, it appears that the growth of Flickr could be slowing down. In November last year I wrote that the first billion photos took three and a half years while the second billion took three months. Now we can assume that it took six months to get the next half a billion photos.

I have compiled the graph below out of data directly from Flickr by checking a series of photos to find the date they were uploaded and hopefully they are correct. Regarding the growth, we know that much of the explosive increase during mid 2007 (from June and three months forward) was due to the migration of photos from Yahoo Photos. But despite the fact that Yahoo Photos supposedly had 2 billion photos, the figures suggest that far less than 1 billion were migrated into Flickr.

So, while I don’t have any official figures from Flickr, it does not seem that the organic growth is keeping the same pace as it did in the fall last year. It will be interesting to keep an eye on the development the coming six months for Flickr.

flickr photos

Footnote: The series of data I used was the following:

22-okt-04 1000000
20-apr-05 10000000
15-feb-06 100000000
22-sep-06 250000000
15-maj-07 500000000
19-jul-07 850000000
20-aug-07 1180000000
06-okt-07 1500000000
13-nov-07 2000000000
17-may-08 2500000000

Activist Wifi

Stealing wifi is an old subject but it remains an interesting one. That some people have been prosecuted for stealing wifi in different parts of the world is also old news.* Still most of us have no problem checking for open networks when we need to access. I have also known users to be on their neighbours wifi without knowing or meaning to – they just don’t understand the difference. But this may be a minorty.

The availablity of open networks is either intentional, unintentional or even accidental. Accidental occurs when people don’t know about wifi and unintentional happens when people don’t know what they are doing. Then there is the group who intentionally shares their wifi.**

Some would prefer to share because sharing is good. Bruce Schneier has written about the added good of openness.

Similarly, I appreciate an open network when I am otherwise without bandwidth. If someone were using my network to the point that it affected my own traffic or if some neighbor kid was dinking around, I might want to do something about it; but as long as we’re all polite, why should this concern me? Pay it forward, I say.

The attitudes about freeloading and sharing vary. Some are scared of intrusion, some support the openness and others could not care less. Unfortunately the latter group is growing. I say unfortunately since the default settings on more wireless routers, especially those provided by ISPs, are closed.

This is the equivalent of the house advantage in roulette. Slowly and surely their will be no openness left other than those few activists who strive to ensure open networks. This means that the struggle for openness will go from the commonplace to the realm of the activists.

* Arstechnica reports that an Illinois man was arrested and fined $250 in 2006 & in Michigan man who parked his car in front of a café and snarfed its free WiFi was charged this past May [2007] with “Fraudulent access to computers, computer systems, and computer networks.” In a similar case from Singapore (Engadget) a 17-year old recieved 18 months of probation under the Computer Misuse Act for stealing his neighbours wifi. In the UK one man was been arrested and two people have been cautioned for WiFi theft or “dishonestly obtaining electronic communications services with intent to avoid payment.”

** Sharing wifi will in most cases violate the contract terms for most internet service providers.

Torture Established

CNN reports that the organization Physicians for Human Rights have conducted clinical evaluations of 11 former detainees from the Abu Ghraib prison in Iraq, at Guantanamo Bay, Cuba, and in Afghanistan. The report from Physicians for Human Rights shows that the prisoners have been tortured

“We found clear physical and psychological evidence of torture and abuse, often causing lasting suffering,” said Dr. Allen Keller, a medical evaluator for the study.

In a 121-page report, the doctors’ group said that it uncovered medical evidence of torture, including beatings, electric shock, sleep deprivation, sexual humiliation, sodomy and scores of other abuses.

The report is prefaced by retired U.S. Major Gen. Antonio Taguba, who led the Army’s investigation into the Abu Ghraib prisoner abuse scandal in 2003. “There is no longer any doubt that the current administration committed war crimes,” Taguba says. “The only question is whether those who ordered torture will be held to account.”

The rights group demands:

• “Repudiate all forms of torture and cruel, inhuman or degrading treatment”;

• Establish an independent commission to investigate and report publicly the circumstances of detention and interrogation at U.S.-run prisons in Afghanistan, Iraq and Guantanamo Bay;

• Hold individuals involved in torturing detainees accountable through criminal and civil processes; and

• Monitor thoroughly the conditions at U.S.-run prisons all over the world.

The Swedish Surveillance State

I am almost ashamed for not blogging and discussing this in more detail. There have been plenty of media, discussions, and a blogging frenzy in the past two weeks…

Short of actually doing the work myself I simplified life – or gave way to my laziness and re-post this post from the EFF

A proposed new law in Sweden (voted on this week, after much delay) will, if passed, allow a secretive government agency ostensibly concerned with signals intelligence to install technology in twenty public hubs across the country. There it will be permitted to conduct a huge mass data-mining project, processing and analysing the telephony, emails, and web traffic of millions of innocent individuals. Allegedly these monitoring stations will be restricted to data passing across Sweden’s borders with other countries for the purposes of monitoring terrorist activity: but there seems few judicial or technical safeguards to prevent domestic communications from being swept up in the dragnet. Sound familiar?

The passing of the FRA law (or “Lex Orwell”, as the Swedish are calling it) next week is by no means guaranteed. Many Swedes are up in arms over its provisions (the protest Facebook group has over 5000 members; the chief protest site links to thousands of angry commenters across the Web). With the governing alliance managing the barest of majorities in the Swedish Parliament, it would only take four MPs in the governing coalition opposing this bill to effectively remove it from the government’s agenda.

As with the debate over the NSA warrantless wiretapping program in the United States, much of this domestic Swedish debate revolves around how much their own nationals will be caught up with this dragnet surveillance. But as anyone who has sat outside the US debate will know, there is a wider international dimension to such pervasive spying systems. No promise that a dragnet surveillance system will do its best to eliminate domestic traffic removes the fact that it *will* pick up terabytes of the innocent communications of, and with, foreigners – especially those of Sweden’s supposed allies and friends.

Sweden is a part of the European Union: a community of states which places a strong emphasis on the values of privacy, proportionality, and the mutual defence of those values by its members. But even as the EU aspires to being a closer, borderless community, it seems Sweden is determined to set its spies on every entry and exit to Sweden. When the citizens of the EU talk to their Swedish colleagues, what happens to their private communications then?

When revelations regarding the United Kingdom’s involvement in a UK-US surveillance agreement emerged in 2000, the European Parliament produced a highly critical report (and recommended that EU adopt strong pervasive encryption to protect its citizens’ privacy).

Back then, UK’s cavalier attitude to European communications, and its willingness to hand that data to the United States and other non-EU countries, greatly concerned Europe’s elected legislators. Already questions are being asked in the European Parliament about Sweden’s new plans and their effect on European citizen’s personal data. Commercial companies like TeliaSonera have moved servers out of Sweden to prevent their customers from being wiretapped by the Swedish Department of Defence. Sweden’s own business community have expressed concern that companies may move out of Sweden to protect their private financial data.

Sweden has often led the charge for government openness and consumer advocacy, and has, understandably, much national pride in seeing its past policies exported and reflected in Europe and beyond. Before Sweden’s MPs vote next week to allow its government surveillance access to whole Net, they should certainly consider its effect on their Swedish citizens’ privacy. But it should also ponder exactly how their vote will be seen by their closest neighbors. If the Lex Orwell passes, Sweden may not need something so sophisticated as a supercomputer to hear what the rest of the world thinks about their new values.

Gender & Technology

Most of us (should) know that the net is not a particularly nice place. It is a neutral tool that allows all users to go out there and be themselves. Unfortunately the technology also offers people pseudo-anonymity or the illusion of real anonymity. I say unfortunately because this really brings the weirdos out of the woodwork. One of the most casual forms is the misogynist – but racism may be more common.

In an article on Women on the Web, Caitlin Fitzsimmons writes about the way in which men use technology to spread fear against women and approaches ways in which to deal with the issue. Many tend to think that the best approach is to ignore those who behave badly. This approach can be justified in different ways:

1. The simplest reason many ignore the problem is by claiming to be too tired/busy to react. This is usually connected to arguments that there are simply too many things to react to. So in general I agree with this argument except for the problem that too many people use this as an excuse all the time and react to nothing. If you cannot fight against everything then at least pick one injustice and fight against that!

2. Social shunning as punishment. In real life when someone behaves badly we often do not tell them or make a big fuss. Often it is enough to ignore what has happened, in particular if we ignore it visibly. We can, for example, create an embarrassing silence. This is the social equivalent of banishment and the socially aware individual recognizes that boundaries have been crossed and will adjust his/her behavior in the future. The problem with attempting this online is that the offender must feel the need to belong to the group for this to work. Also embarrassing silences only work when the whole social group falls unnaturally silent. This does not work online.

3. The third approach is the concept of the marketplace of ideas. This basically means that it is actually good for the weirdo’s to get out in the open and test their ideas since this will only encourage the opposition to develop better arguments and convince the weirdo’s that they are wrong. In an offline world this may work in theory in an open debate but it is hardly likely to work in practice.  In an online environment this approach is misguided. It also gives the weirdo’s way too much leeway and opportunity to cause pain to others.

Fitzsimmons writes:

The question is then how to tackle the problem. The panellists agreed that while there was no point in engaging directly with hateful comments, ignoring them was not really a viable option. Feministing.com’s Valenti said online misogyny was different to offline abuse in two key respects. “Unlike someone coming up to you on the street, it can be really hard to assess what kind of danger you’re in,” she added. “You don’t know if it’s a 15 year-old in Idaho spouting off or a really scary guy who really is likely to come around and rape you.”

The online/offline worlds are different and attempting to apply theoretical approaches to handling uncomfortable/threatening/harmful situations in the online world may only cause more harm. No I do not have a solution but I really like the way in which blogs like Feministing are using  technology to reach new readers – or actually viewers since Feministing uses YouTube videos (check out their channel here).

Confused Politicians on Copyright

Without being too cynical it is easy to see that politicians are struggling with online copyright violation. Even the terminology is confused – copyright violation is too difficult and most people will talk about file sharing and thereby confusing technology with law.

In Sweden, where computer literacy is high and fixed price broadband is the norm, intentional copyright violation through filesharing is rife. In addition to this the moral concepts surrounding these acts have been fundamentally re-interpreted. Due to its relative ease, low cost and widespread acceptance – illegal file sharing is not considered by many to be morally wrong. Some not insignificant numbers also argue that it should not even be illegal.

Naturally politicians are concerned. Not all are cynically using the debate to forward their own popularity – some are sincerely concerned about the rift between law and morality in this question. Swedes, believe it or not, are a rather moral bunch. Sure we have reputations for free sex, expensive alcohol and high suicide rates but this is no longer a true picture if you compare Sweden to the rest of Europe. What I mean by being moral is that Swedes are relatively honest and prefer not to cheat – so when the rift between morality and law is apparent it is a greater reflection of a problem in Sweden than in some other countries.

So the Pirate Party wants to abolish copyright, The Swedish Left Party recently decided to strive to legalize online file sharing. Now the Centre Party are calling for change in a recent report by their spokesman on Copright Annie Johansson (report in Swedish Pdf) on the future of copyright.

Their report is interesting in that they want to attempt a re-evaluation of copyright in order to make it into a fair balance of rights. The report is also heavily influenced by the concept of Fair Use and the Creative Commons system which is good on the one hand but unfortunately the concepts are misunderstood in the
report. The fair use system is not easily applied in the Swedish concept due to different legal cultures and histories. And the Creative Commons licensing system cannot go beyond the legislation in hand.

Are politicians weary about talking to experts?

Despite these minor misunderstandings there seems to be growing political will to discuss the purpose of copyright. This could become very interesting.