Thursday, July 29, 2010

Open Science : A Sociology of Information Topic par excellence

Conference at Berkeley this weekend on changing the way we think about scientific knowledge http://opensciencesummit.com.

From the conference website

Open Science Summit 2010: Updating the Social Contract for Science

July 29-31 International House Berkeley
Synthetic Biology, Gene Patents, Open Data, Open Access, Microfinance for Science, DIY science, DIY Biology, Alternative Funding for Science, Open Source Drugs, Patent Pools, Open Health/Medicine, Patient Advocacy for Innovation

"Ready for a rapid, radical reboot of the global innovation system for a truly free and open 21st century knowledge economy? Join us at the first Open Science Summit, an attempt to gather all stakeholders who want to liberate our scientific and technological commons to enable an new era of decentralized, distributed innovation to solve humanity's greatest challenges."

Tuesday, July 27, 2010

A Few Limits on Copyright

Until a few days ago, most of us did not know that the Digital Millenium Copyright Act of 1998 empowers/requires the Librarian of Congress to "determine whether there are any classes of works that will be subject to exemptions from the statute’s prohibition against circumvention of technology that effectively controls access to a copyrighted work" (U.S. Copyright Office 2010). But it does.

And here's what's changed as a result of James H. Billington's tri-ennial interpretation.

(1) College professors (in general) and students (in film and media studies, at least) can circumvent DVD security measures to include snippets of motion pictures into new works for the purpose of criticism or comment for educational purposes. A similar exemption exists for documentary filmmaking and noncommercial videos.

(2) You can hack programs on your phone if the purpose is to get programs you have legally obtained to work together. This is interpreted to mean you can "jailbreak" an iPhone and load non-Apple apps.

(3) You can hack programs on your phone if the purpose is connect it to a telecommunications network you are authorized to connect to. In other words, you can hack your Iphone so it works on Verizon.

(4) You can hack a video game you own if it's just for testing or fixing security flaws as long as you don't use the information you get from the process to help folks violate copyright.

Dongle
(5) If you own software that's protected by a dongle and you can't use it because the dongle is broken and no replacement available then you can hack the software to get around the dongle.

(6) If you have an ebook and all existing ebook editions disable read-aloud, then you can hack it to make it read-aloud. In other words, if the copyright owner doesn't offer to sell a read-aloud enabled version then you can break the controls that prevent read-aloud on a copy you own. Note that it seems that the publisher could offer for sale a million dollar read-aloud-enabled version to get around this. Presumably, the exception won't unravel retroactively -- the question will be was the read-aloud-enabled version available on the day you hacked the control.

Sources

U.S. Copyright Office. 2010. "Statement of the Librarian of Congress Relating to Section 1201 Rulemaking."

Wortham, Jenna. 2010. "In Ruling on iPhones, Apple Loses a Bit of Its Grip," New York Times July 26.

Friday, March 12, 2010

Regulating the Supply of Law

From the "Friends and Relatives of the Department" Files...
The ways that states regulate professions is a topic of sociological interest.  The degree to which citizens have access to legal services to solve legal problems is a topic of sociological interest. As argued previously on this blog("Equality, Information and the Courts Redux," "Democracy and the Information Order," "Courts and the Information Order," "Suing for Information"), the way the courts work is a topic of sociology of information interest. In this op-ed, these issues come together in a sociologically interesting way. You may recognize the author of the piece as my sometime co-author (and wife).
-- Dan.

A case for legal aid at Wal-Mart

By Gillian Hadfield
Friday, March 12, 2010

The United States stands largely alone in advanced-market democracies in drastically restricting where and how people can get help with their legal problems. In all states, under rules created by bar associations and state supreme courts, only people with law degrees and who are admitted to the state bar can provide legal advice and services of any kind. [Read More]

Friday, February 05, 2010

Technologically Induced Social Alzheimers

David Pogue has a nice little piece called "Why We Make Home Videos" on the NYT website. It's basically a personal tale in defense of home videos, but he starts out reminding readers of something he's written about a number of times, data rot.

Data rot is the tendency for technology to evolve so fast that we are all left with lots of information stored on media for which there no longer exist a device to play it. The implication of this is that society as a whole "has" lots of information that it might have no way of accessing. Hence the title of this post. Of course the ironic thing is that the social problem is hardware outstripping the memory while in the personal case its sort of the hardware failing the memory.

But it points to an interesting idea: perhaps the explosion of information -- and our general capacity to store, move, and process it -- comes with some self limiting counter tendencies. One is complexity -- too much information, no one has the synoptic view or cleverness to understand what it means. Another is the connect the dots problem I've written about here. Yet another is data rot -- backwards compatibility always has its limits.  I wonder if anyone has sat down to map out what sorts of information are likely to move into the darkness of rot when.  Are all the data on punch cards gone from the social memory yet?  How about all those 24 inch fixed disk platters we used to get mounted on our System/370 machine?  I know my college thesis on it's 8 inch IBM Series/1 diskette is basically lost to time.  What else?



Related Posts
"The More Information the Better"?
What Society Knows

Sunday, January 31, 2010

Three Kinds of Information Sensitivity

OK, a naive meditation on three modes of paying attention to the world.

Pretend you are a politician, perhaps a senator or member of congress. What do you pay attention to?

Some would have us believe that poll numbers are the most important. You open your mouth, emit a sound bite, the media disseminates it, people react and respond to polls, and you adjust accordingly. Depending on your point of view, that's either democracy in action or appalling pandering. In either case, the opinions/reactions of "the people" are aggregated via some presumably reliable and accurate method.

Another theory would be that you are listening to powerful interests who have your ear and who donate to your campaign. Your comments are probably a little more proactive than reactive -- they've let you know what they want to hear and so you make sure you say it. But as above the whole thing is a cycle -- we get the initial attention by saying things and then it cycles from there. In this case, though, the method for aggregating the reactions (and pre-actions) of donors is harder to suss out. Tally up the dollars? Is there a pecking order? Or a "one topic each" rule?

A third approach would be that you apply accepted methods of policy analysis and make use of trustworthy data to decide what policies would best achieve desired aims. Here information is aggregated and decisions made using generally accepted (and open) methods. Of course, deciding on those aims is an information problem that can bring us right back into one of the first two approaches, but we'll set that aside for the moment.

My guess is that a system COULD run on any of these three approaches to information processing. What presents a challenge to govern-ability, though, is when one or more of these is the public face of what's going on while another one is what's going on behind the scenes. Or, worse, when the actors themselves don't really have a handle on when they are using one or another to try to ascertain how to govern.

And yes, this could be seen as an attempt to translate direct democracy, some variation on aristocratic pluralist democracy, and technocracy (help me on the terms, polisci friends) into information terms.

Tuesday, January 19, 2010

New Digital News Outlet from KALW

This week KALW is launching its new local digital magazine to complement their broadcast work.  The new site has a way for community leaders to plug in and help them do a better job of reporting on the arts and other community events and issues.  Users can become "community correspondents".  Check it out, help them tell others about it and together we can do a better job of becoming the media we want to create.

Here's the magazine: http://www.kalwnews.org/

This is the community page: http://www.kalwnews.org/community

And here's their FB group to stay in touch: http://www.facebook.com/pages/KALW-News/195280839624

Friday, January 08, 2010

Great Info Blog and Interesting Sounding Conference (NY Feb)

Check out Graham Webster's excellent blog for some insightful essays on topics not unrelated to those I'm writing about here. It's called:infopolitics/

While reading through that blog, came across mention of an interesting conference to be held in February at the New School in NYC: Conference on Information Flow Restrictions at the New School. It actually had me looking at plane ticket prices and thinking "whom do I know that I could stay with...." If you know how little I like to travel during the semester, you get the idea that I was intrigued.

Wednesday, January 06, 2010

Those damn unconnected dots again (rough draft)

An article in the Times, under the headline "Obama Says Plot Could Have Been Disrupted," reprises the metaphor of "connecting the dots" to describe different pieces of information having been in different heads, but never getting put together in one head that could make sense of them.

It is reassuring that Obama's speaking bluntly about organizational performance rather than riding roughshod over the constitution, but, as argued in an earlier piece ("Mind the Gap"), the idea that it's a simple problem of dot connecting is a basic misconception.

How do you hear "connect the dots"?  One version is reminiscent of a detective show or Agatha Christie novel; the challenge is to assemble hints -- pieces of information that, alone, are not conclusive proof of anything -- in such a way that the "answer" emerges as a sort of logical necessity.  The "logic" is in the mind of the beholder, but that's all.

A different version is reminiscent of the we draw lines between stars and come up with "constellations."  Two things are important.  One, the stars are not really next to one another -- the viewer is the one who sees them as points on a plane and interpolates and extrapolates the other vertices of the figure.  Two, there's no there there -- the crab in cancer or the warrior in Orion has to be brought to the observation by us.









The first requires us to have all the pieces on the table and be open to what they "tell us" when seen together.  The challenge for intelligence agencies is to put the information from various sources onto the same table.

The second requires us to decide what to pay attention to and what to ignore (left), how to connect and not connect (middle), and what to add that's not there (right).

If we increase the degree of information sharing we fill up our field of view with more and more points and the dots get harder and harder to connect.

On the other hand, if we ask the different agencies to filter the information then we are back in hot water because none of them know what they are looking for.

The president was furious about the failure of the system to see "the red flags" and intelligence agencies are reported to have said that the information they had was "vague but available."  The problem is that flags are not, in general, a priori red.  Presumably, some smart people are thinking about how systems see and things like that; hopefully, they don't just think of it as "connect the dots."

We observe with some irony that the actual policy response to the problem -- at least the response that's been announced -- is in fact to gather more information via increased screening.

Oh, and if we look up "connect the dots" in Wikipedia you get a short article about a children's game. It bears a Wiki-warning: "This article may require cleanup to meet Wikipedia's quality standards."

Wednesday, December 23, 2009

Who Uses That?


As the year wraps up I'm going over unpublished drafts of posts.  Came across this one from September that hints at (or at least resonates with) the posts on "infermation."

In our bathroom stands a toothbrush stand and in that toothbrush stand stands a gum stimulator.  It is/was mine, but I rarely use it.  It's basically abandoned property -- to the point that I sometimes look at it and wonder whose it is.

I was looking at it today and had a "take the role of the other" moment.  I wondered what other members of my household made of the gum stimulator.  I felt pretty sure that they (OK, I'm talking about one person in particular, so "she") took it to be mine;  she knows it as "Dan's gum stimulator."  There is no way she can detect the change in the object's status -- the fact that it's become an abandoned artifact, that I look at it and don't know whose it is (but at some level I remember because I haven't yet thought it was hers)  -- because if it is used, or rather when it was used, it was used in private.  Her access to the object is the same as it ever was: "not mine, only one other person routinely uses this bathroom, must be his.").

This started me thinking about the general category of things that are in plain sight, but about which one has no direct, experience based knowledge of who uses them or what they are used for because they are used by whoever it is that uses them out of our purview.

Those keyboxes at various locations in office buildings.  The number tags on utility poles.  Spray painted numbers on streets.  

This brings up a series of related socio-epistemological categories.  Equipment that's used out of sight and generally kept out of sight, is closely related to the above.  Perhaps we need a distinction between the mysterious (stuff that you just don't know who uses it how for what) about which one could become curious, but usually does not, and stuff that you presume is used by particular others for perhaps known purposes (though, in fact, like my gum stimulator it might be used for nothing by no one).  Then there are the things that I know are yours but I have no idea what you do with them (tools, perhaps) and am just comfortably ignorant.  Another category might be things that are superficially shared but that embody some of the secret side of the other.  And so on.

The point, I think, is related to Simmel's observation that one can never know the other entirely.  That's one of his a prioris of the human social condition.  This extends to objects which we know (or suspect) to be objectifications of subjectivity (made by, used by, related to) without fully grasping the subjectivity they embody.

More...

Information about Infermation

Alas, it turns out that I (and my Bangalore colleague) may not be able to claim coinage of the term "infermation" as introduced in a recent post.  The term shows up in 2004 in LexiconWiki, a wiki for playing a variant of the Lexicon Game.  The initial definition there is different from ours:
Infermation is what we can know about something from reports of that thing.
since our definition distinguished three categories: (1)  information derived from experience,  (2) information derived from the experience of others (and reported to us and taken as the case because of trust in the provenance), and finally, (3) that which can be inferred from either of these by the application of some sort of logic -- infermation

But they add an interesting twist as their definition continues:
Infermation is most commonly available about long lost texts, and the pattern of human history means that many sources of Infermation are several generations removed from the thing under examination.
You may rightly be getting suspicious of this source as it is starting to sound odd (and it gets odder), but, let's do note that there are some things that would fit both definitions.  Two examples that come to mind are proto-languages and "ur-texts."  For historical linguists, known languages and the logic of linguistics allow us to infer the existence of proto-indoeuropean, even though no examples have ever been found.  Similarly, we sometimes posit the existence of a never found "ur-text" that must have preceded some known text.  So far so good, but their definition starts to head off into other directions after this,  progressively verging on nonsense (in the conventional, not Wittgensteinian, sense):
Sources may, obviously, vary a great deal, ranging from direct assessments, both academic and popular, of the thing in question, to notes and references, index lists, bibliographies, catalogues and assorted general remarks. The acceptance of Infermation as valid and valuable has allowed academics to make many advances that would otherwise have been impossible. The Infermatic industry, which first flourished on Alphas, has grown throughout the academic community, promoting and assessing the use of Infermation and producing dedicated Infermatics for both academic and general consumption. [read more]
From there the 2004 source veers more and more off the road.  After intense scrutiny, my confidence in our (re-)coinage has returned.  Maybe I should have typed "infermation tm"

Stop! What's going on in your head right now??

Noted with interest: "Taking Mental Snapshots to Plumb Our Inner Selves*."  A UNLV psych professor, R. Hurlburt, tries to do some systematic phenomenology by having research subjects report on their "inner states" at randomly chosen moments.

His critics say you can't expect research subjects to be honest, that they "twist" responses to conform to their biases or what they think the researcher's expects, and that the problem is you can't capture these inner state "as they happen" but only in retrospect (even if relatively short amounts of retro).  The most illuminating comment was "The experience sampling work is a reasonable first step, but only that; the claims need to be followed up and backed up by objective studies."

Objective studies these days usually means brain-imaging studies.  Another expert interviewed for the article noted "[t]he brain imaging setting is very sterile." 

What's in it for us as sociologists of information?  Nice concrete example of the epistemological clash between objectivity and introspection and question of "know-ability."  One scientist quoted in the story noted that there might be "no good way to study [the] question [of inner experience content]." Hurlburt himself notes that he may be up to what William James described as "turning up the gas to see what darkness looks like."


Tuesday, December 15, 2009

Infermation : A New Concept

My tracking software tells me that a reader from Bangalore arrived here this morning from a google search for cricles and infermation. After a chuckle at the misspellings, I was intrigued by the fact that one of my posts was the second search result until I noticed that I'd engaged in a bit of SEOing by introducing the same typo into that post's title last February :"Notificational Webs in Cricles of Friends".

More importantly, though, this little bit of synergistic finger slippage has led me to (collaboratively, I'd have to say) formulate a new concept: infermation.

What is "infermation"? All that I know about the world that is neither from direct experience nor from reports from trusted sources, but is implied by all that stuff when operated on by whatever tools of logic and entailment I have at hand. These of course, will be context dependent (framing) and "mood" dependent (am I feeling hyper-rational just now?) and so on. Gives us a nice taxonomy of "my world": experience based information, received information, a set of inferential tools, and all of my "infermation."

Still lots to work out on this (and some hard thinking to do about what existing concepts it recapitulates) but it looks promising. So, thanks to that provocative mis-typer on the other side of the world.

Sexting: New Info about an Info Behavior

Pew Internet and American Life Project came out with a new report on "sexting" today. The basic findings: prevalence of sexting "ever" among teens overall is in the 10-20% range. Sexting seems to be an evolving element in teen "courtship behavior."

I was disappointed, though, with the "just-this-side-of-moral-crusading" feel of the report. The tone is not explicitly alarmist, but it is a soft ball pitch to those who will turn it into media hoo-ha.  Expect a number of misleading articles to appear in the media to be followed by researchers decrying media distortion.  But whose fault: consider the flaws in just this one report in terms of what we give the media to work with.

A Hesitance to Criticize Previous Research
As background they describe previous surveys, done by The National Campaign to Prevent Teen and Unplanned Pregnancy and National Center for Missing and Exploited Children and others. One found ~20% of teen participants had sent and ~30% had recieved a sexually suggestive picture or video of themselves to someone via email, cell phone or by another mode. In another 9% had sent, 3% had forwarded one, and 17% had received. All of these surveys seemed to have some methodological problems that would put wide-error bars on these numbers but the report just hints at these.

Slightly Fuzzy Numbers
This report is based on a survey of 800 young people plus focus groups.In the new study, the acknowledged margin of error for the full sample of 800 is about +/- 4%. For subgroups, it will be higher -- for the 1/6 sample of each age year, for example, it's about +/- 8%.

And then the report says
4% of all cell-owning teens ages 12-17 report sending a sexually suggestive nude or nearly-nude photo or video of themselves.... [among t]he oldest teens in our sample – those aged 17 – ... 8% ... hav[e] sent one, compared to 4% of those age 12.....
But given the margin of error, all we can say is that somewhere between 0 and 8% of all teens and somewhere between 0 and 16% of 17 year olds have sent a suggestive picture of themselves.  The authors do a great job of including background on the survey and footnoting margins of error and such but they leave it up to the savvy reader to make something of these.  All these numbers are pretty small -- this reader, at least, thinks responsible researchers should do a little more to drive home this point than this report does.

A Missing "Network" Angle
The authors don't make much of the fact that the number of folks who have sent is consistently lower than the number who have received. This implies, and their qualitative data seems not to deny, that the practice is not informally controlled by a norm of "just between you and me babe" and that the ease of distribution and the difficulty of detection and potential for sheer high volume make the transaction costs of informal control prohibitive.  Obvious, but important.

Percentaging in the Wrong Direction
The media pitch is furthered by doing percentages in arguably the wrong way. Consider this paragraph:
Teens who receive sexually suggestive images on their cell phones are more likely to say that they use the phone to entertain themselves when bored; 80% of sexting recipients say they use their phones to combat boredom, while 67% of teens who have not received suggestive images on their phone say the same. Teens who have received these images are also less likely to say that they turn off their phones when it is not otherwise required – 68% of receiving teens say they generally do not turn off their phones when they do not have to, and 46% of teens who have not received suggestive images by text report the same “always on” behavior (page 6).
As is, it risks being parody: those who receive naughty pictures are more likely to use their phones to combat boredom than those who do not! But presumably the point here is to compare types of cell phone users and so the percentages should be done the other way round: among boredom combatters, what percent get baudy pictures? A quick, back of the envelope recalculation* suggests it would look like this:









Use vs.
Boredom
Not vs.
Bordedom
Received ~108
(20%)
~27
(11%)

No Received ~445
(80%)
~221
(89%)


====
~553
====
~247




That's actually a little more compelling (and certainly easier to make sense of). The rate is twice as high among the "I use my phone to combat boredom" group. But both are relatively low.

A similar methods 101 error is made when reporting what interventions make sense:
One parental intervention that may relate to a lower likelihood of sending of sexually suggestive images was parental restriction of text messaging. Teens who sent sexually suggestive nude or nearly nude images were less likely to have parents who reported limiting the number of texts or other messages the teen could send. Just 9% of teens who sent sexy images by text had parents who restricted the number of texts or other messages they could send; 28% of teens who didn’t send these texts had parents who limited their child’s texting (page 12).






It is unlikely that the authors are thinking that sexting causes parental restrictions -- the sense is just the opposite -- and so the percentaging should be within the categories of parental behavior and comparison across these.  This should look like this (again, based on quick, back of the envelope, calculations*).






Parental
Restriction
No Parental
Restriction

Ever Sent ~3
(1.4%)
~29
(5%)

Never Sent
~215
(98.6%)
~553
(95%)


====
~218
====
~572




Again, this doesn't overturn the take-away -- it might even be argued that it strengthens it: lack of parental cell phone restriction associated with a 3 to 4 fold increase in the behavior -- but we researchers should put our best practices forward to as we dump our results and findings into the information environment around us.

Wednesday, November 11, 2009

Mind the Gap

Slatest passes along a story, "Military Wasn't Told of Fort Hood Shooter's E-Mails," that appeared in today's Wall Street Journal as "Agencies See Gaps in Sharing."

The Slatest post is a great example of saying "OHMYGOD...actually might not be much of a story here," the WSJ article is a little less so. Both make out the story to be "we spent millions after 9/11 to improve information sharing but here's a clear case where information wasn't shared just like in olden days" (with the implication (though the articles admit this is not a sure thing) that things might have turned out differently if information had been shared).

Some sociology of information fundamentals at work here. The WSJ article actually describes what sounds like a pretty thorough process of assessing whether or not to pass along information. For what sound like good reasons, the decision was not to. Now, maybe they need to revisit the structure of their decision process (and this is not necessarily true as no one appears to have shown that the information would have made a difference), but that's different from the story being that agencies are not sharing information.

A senate official is quoted saying "[a]ll signs are indicating that something wasn't put together." But this might be misleading. The article uses a favorite phrase from 2001, "connecting the dots," and speaks of "intelligence gaps." I think both of these are uttered too glibly and unanalytically. These sorts of events bring out massive displays of "hindsight bias" -- the tendency to see things after the fact as a lot more predictable than they really were.

There is probably also a problem with the geometric metaphor of intelligence gaps. We might be able to distinguish topological gaps (information in one place does not reach another place) from topographical gaps (the empty spots in information that any particular knower has access to). When an event like Fort Hood occurs, we start to fantasize about a world in which the gaps pointed to by hindsight would have been bridged over. But to guarantee that we probably need to posit a world in which there are no gaps, but that's a world in which everyone knows everything and without a division of informational labor, the whole thing grinds to a halt.

We need to zero in on how humans share relevant information with those for whom the information is relevant. Competent nodes in an information network have good working models of the relevance systems of the nodes they are connected with. We don't want to eliminate intelligence gaps, we want to make the gaps (read links) more intelligent. And that probably comes most from interaction. And that's something that organizations and agencies are not naturally prone to. What the analysts should look at is what we've spent the millions of dollars on in our quest to fix the intelligence gaps rather than just implying that the effort has been wasted.

Saturday, November 07, 2009

Information Abhors a Vacuum?

Great essay today by Scott Simon on NPR's Weekend Edition. He called it "The Bombastic Fog Engulfs Fort Hood."

Long story short: very quickly after the events at Ft. Hood on Thursday afternoon there were items appearing in the media providing all manner of explanation of things that might or might not have anything to do with those events.

Simon's initial diagnosis is the structure of modern mass communication itself "...in these days where almost anyone can find some kind of audience." A certain kind of event, such as mass killings on the U.S. Army post, "encourages people to analyze and speculate in advance of a lot of actual facts."

He goes on to give a few other examples and then zeroes in on how journalists ran with the idea of pilot fatigue when some airline pilots missed their destination a few weeks back, making the jump from the speculation of experts in the absence of direct knowledge of the circumstances and details of an event to research on the science and politics of pilot fatigue. Any number of stories along this line were produced only to be proven irrelevant (in Simon's on-the-mark characterization) when, upon investigation, it turns out the pilots were playing with their laptop computers.

This reminds me of a few things. One is the propensity of some journalists (and some social scientists, too) to decide very early on "what the story is." That's what your editor wants to know as soon as you pitch an idea -- what's the story, what's the angle? We've all been contacted by a reporter looking for a quote that confirms a particular line they've decided to take in the story or a student who is looking for some research that supports a particular conclusion she wants to draw.

The second thing is that competition for eyeballs and ears forces people who talk and write for a living to talk and write whether or not they have anything to add to our collective knowledge.  Dead air is bad.

Those are professional errors, malpractice, if you will, even if of a mundane sort.

There's probably something else going on too -- something more at the "information order" level than the professional practice level. It is fundamentally difficult for a community to learn of an "untethered" fact (unconnected, that is, to a story that grounds it in the web of our taken-for-granted worldview (Weltanschauung)) without someone stepping up to tell a story that does ground it in the known. 

And so, the urge that insiders sometimes have to not announce something prematurely "because it will lead to speculation" is probably not nearly the pathology we often make it out to be. 

After listening to the essay I began to think about thought experiments in how to balance the incentives.  If, as Simon says (that phrase was going to come up in this essay sooner or later), it's because its so easy to "find some kind of an audience" (or at least a soapbox around which there could be an audience), then maybe we (members of the chattering classes -- both amateur and professional) should give some consideration to what we'd say if there were a word tax as well as a word rate.  If what you have to say turns out to be irrelevant, not only do you not get your $2 per word, you actually have to pay the rest of us for the bit of our information universe you filled up with worthless drivel.

Notification on TV

Once you start thinking about notification, you see it everywhere. Just in the last few days, it's figured centrally in episodes of PBS's "Masterpiece Mystery: Inspector Lewis" and AMC's "Madmen" (see also 9.20.2008 and 9.8.2008).

In episode 12, "The Grownups," Pete chats with Harry with the TV turned down. The audience can see Walter Cronkite talking about a news flash from Dallas but Pete and Harry are too engrossed in their conversation. We cringe knowing what they don't know but are about to find out. Other characters then crowd into Harry's office to watch the news. Don emerges from his boss's office to see the main work area basically empty but all the phones ringing. He's beside himself trying to figure out what's going on. Then he does. Later a few of the characters talk about the fact that they "just had to call" so and and so (this even though news of the assassination was one of the most quickly diffused messages in history up to that point.

And, of course, about half of the dramatic tension of the entire show is generated by all the secrets kept by characters from one another (with the audience tipped off and forced to watch painfully as characters they care about remain in the dark).

SPOILER ALERT. In the "Inspector Lewis" episode titled "The Quality of Mercy," Lewis' Sergeant discovers some information about Lewis' wife's death a few years earlier. He gets the info on a phone call while Lewis is sitting next to him but says "oh, nothing" when Lewis asks him what it was about. When he eventually tells Lewis later that day, Lewis is furious and takes it as a sign that their relationship is really quite flawed. Sergeant Hathaway explains that he withheld the information because of their relationship, but Lewis pretty much says "we don't even have one if you thought it was O.K. to wait to tell me."

Saturday, October 31, 2009

Information Forms in Everyday Life

News in recent years have featured a wide-array of "information problems" as background story. Setting a few of these side-by-side lets us get a sense of what I mean by "informational forms."

"Stove-piping" happens when "raw information" is inappropriately transmitted directly to higher-ups without being "vetted" which refers to systematic "sifting, disambiguating, analyzing" (Wikipedia).

In news organizations and financial organizations information can threaten conflicts of interest and so "firewalls" or "Chinese walls" are maintained : an information barrier that prevents members in one part of the organization from knowing what's going on in another part (news and advertising in journalism, analysis and investment in banking).

When this effect is generated inadvertently we have "information silos" -- situations in which entities have information that one, the other, or both could benefit from sharing that does not occur because of ignorance, lack of compatible systems, or organizational jealousies.

There are also cases where the problem is neither a deficit of information in a particular organizational location nor disregard for standard procedures but variations on information overload or "too much information" (see post from 20080915). In these situations we have real world phenomena generating so much information that it's nearly impossible to construct an apparatus that is up to the task of figuring out what it means. At one extreme we have issues of transparency and democracy -- is there a point at which more information does not help voters make informed decisions because they simply can't expend the energy necessary to make sense of the information? At the other is information -- and here the financial industry is the example -- that's simply too difficult for those who need to understand it to understand.

Next, I'll work on turning these preliminary examples into a typology of information forms -- identifying the underlying dimensions along which they are arrayed with hope of completing the typology with as yet unexamined forms.

Friday, October 09, 2009

The Social Organization of Collective Blindspots

Floyd Norris has a piece in the NYT under the headline "When Law Obscures The Facts."  In it he describes a -- fill in a word that is the opposite of a loophole -- in the 1995 Private Securities Litigation Reform Act.  The law was passed at the urging of corporations to limit what they saw as "frivolous" investor lawsuits.  One of its provisions, according to Norris, is investor lawsuits that allege fraud must be highly specific and concrete about what the fraud was or be subject to summary dismissal.

This means the suit can be dismissed before the plaintiff gets to do any discovery.  And so there's this Catch-22: you can't sue unless you can detail the fraud, but you can't detail the fraud unless you can force the defendant to disclose information.

The irony that drives Norris' article is that in the wake of the 2008 collapse of the auction-rate securities market a lot of corporate investors that had purchased these securities are being excluded from settlements in which Wall Street is reimbursing other investors.

There are various theories about what happened in this market.  The guy who invented it, Ron Gallatin, thinks it was a matter of salespersons simply not understanding what they were selling.  Others think it was more explicitly fraud that led to investors buying things that they didn't know what they were.

As Norris puts it:
If there ever is a wide-ranging trial, we might get to see which issues of auction-rate securities were owned by Wall Street firms in the summer and fall of 2007, and how much they sold before the collapse. We might learn if the firms understood risks they did not mention to customers.

But that will not happen if judges continue to prevent such cases from proceeding even to the discovery process. Corporations that cheered the 1995 law may discover it keeps them from having a chance to recover their own losses.
This episode goes into the file for my chapter on "the social organization of ignorance" -- another example of  how institutions and structures can systematically reduce the amount of information available in the social world.  It's related to "democracy and the information order," as Gillian Hadfield and I have written about (also the subject of several other posts in this blog: here and here),  reminds us a bit of Robert Proctor's concept of "agnotology," and resonates at least a little  with some points raised by Mark Danner in an NYRB article about torture last spring (where he argued that we need to know the answer to the question "did it work?" in order to have a responsible political discussion)

Works Mentioned
  1. Danner, Mark.  2009.  "US Torture: Voices from the Black Sites: ICRC Report on the Treatment of Fourteen "High Value Detainees" in CIA Custody by the International Committee of the Red Cross" New York Review of Books Volume 56, Number 6 · April 9, 2009
  2. Hadfield, Gillian and Dan Ryan.  2008.  "Democracy and the Information Order"
  3. Proctor, Robert N. and Londa Schiebinger (eds.).  2008. Agnotology: The Making and Unmaking of Ignorance.  Stanford University Press.

Friday, September 18, 2009

Surveilance Raised to the Second Power

The following article appear about a week ago over the AP business wire. It turns out that parents who "spy" on their children may be unwittingly helping corporations to spy on them too. It's very valuable to folks in marketing to know what kids are talking about. If you believe the companies that make/sell the child surveillance software to parents, the information being collected is not associated with the kids' names but it is tagged with information about the kid (ironically, often entered by the parent when s/he sets the software up in the first place).

One easy take-away is the idea that norms about spying on kids are highly dependent on who is doing the spying and why. If you have legal custody of the kid and you are trying to protect her from predators, spy away. If you are a commercial entity who wants to listen in to the kids' chats, you're crossing the line.

Bunch of sociology of information questions emerge in what looks in the article to be real mishmosh of thinking about this phenomenon. We see talk of "targeting children" (by marketers), "putting the children's information at risk" (not really sure what that means), legal issues of collecting data from kids and having parents' permission implied if software is installed, and so on. What doesn't get thematized is that this is yet another example of trading a service for your information. In pure economic terms it can be written off as an exchange, that, if people do it, must be identifying an equivalence in value (as in, "it's worth it to me to play this game at the cost of the provider can observe what kind of music I like"). In fact, though, I suspect that these dimensions of value are more orthogonal than is being pretended. It works because of multiple slights of hand -- one isn't really sure what information one is giving up or what is happening to it or one doesn't get to evaluate those questions until after certain commitments have been made or it's just plain too complicated to find out.

Look for another post soon about FaceBook applications and quizzes and the kinds of information give-aways and grab-ups that they involve.

Web-monitoring software gathers data on kid chats

* By DEBORAH YAO, AP Business Writer - Fri Sep 4, 2009 5:16PM EDT

Parents who install a leading brand of software to monitor their kids' online activities may be unwittingly allowing the company to read their children's chat messages — and sell the marketing data gathered.

Software sold under the Sentry and FamilySafe brands can read private chats conducted through Yahoo, MSN, AOL and other services, and send back data on what kids are saying about such things as movies, music or video games. The information is then offered to businesses seeking ways to tailor their marketing messages to kids.

"This scares me more than anything I have seen using monitoring technology," said Parry Aftab, a child-safety advocate. "You don't put children's personal information at risk." [Read More...]

Wednesday, September 02, 2009

The "Is More Information Always Better?" File

Monica Davey's article "Case Shows Limits of Sex Offender Alert Programs" in the NYT (2 Sept 2009)raises a number of interesting sociology of information issues.

The basic story is that sex offender registration policies did not seem to do much good in the case of a California man found out last week to have kidnapped a young girl and held her for 19 years in his back yard. The alleged perpetrator was a registered sex offender, reported regularly to a parole officer, and wore a GPS tracking device, and law enforcement officials had visited and looked around his home.

It is, I think, a bit of a red herring to argue that this case shows a weakness of the registry system as it exists. But the conversation does point to some important issues about the mechanisms by which we expect "public information" to produce "public goods."

So what are the questions here? The most obvious one, expressed in general terms, is how much prevention does tracking actually provide? Another is whether or not the zealous inclusion of every minor sex-related offense (the article cites, as an example, a one-time flasher) over-taxes law enforcement and blinds society to "the real problems." A proponent of registries who was quoted in the article said
“Look, nobody ever suggested that registering sex offenders is going to remove sex offenders from the planet, but let’s at least make sure they’re not working in your elementary school or coaching the soccer team.”
I don't think the research is entirely clear as to whether the law accomplishes this or not, but it points to an interesting question. The registries are online and searchable, with the idea that this amounts to information empowerment that keeps state officials accountable -- a kind of open-government move: if the official don't do their job, the public will find out. But, of course, "the public" suffers from the same information overload that police departments do. Knowing that there are 1500 registered sex offenders in your county may not be all that helpful in terms of making decisions about where to live, send your kids to school or how high a fence to build around your pool. Some "experts" say we should make some distinctions and prioritize rather than lumping teenage sex in the same category as a violent rape and kidnapping. But that raises 5he challenging problem of where to draw the line. I'll bet the equilibrium in that game is always over on the side of TMI -- too much information to be really useful. In other words, most collectives would opt for more information than they can "make sense of" even if it means they will "see" less than if they had less information.