Sunday, March 06, 2011
radio + internet + letter to your senator = democracy in action
They ask listeners across the country to write their senator asking whether s/he placed a particular anonymous hold and then to submit the response. To date they collected 96 written denials and four "it's none of your business!". Step two is to reword the question and have residents of four states pose them in writing. Rather brilliant.
I also love the implicit claim to inequality in the "it is our privilege to keep secrets from our constituents" stance. This is what Gillian and I are writing about in our paper "Democracy and the Information Order."
Monday, February 21, 2011
Sociology of Information in the News
- "Book Lovers Fear Dim Future for Notes in the Margins" In a digital world, scholars see an uncertain fate for an old and valued practice.
- "Blogs Wane as the Young Drift to Sites Like Twitter" Long-form blogs were once the outlet of choice, but now sites like Facebook, Twitter and Tumblr are favored.
- "TV Industry Taps Social Media to Keep Viewers’ Attention" As more and more people chat on Facebook and Twitter while watching TV, networks are trying to figure out how to capitalize.
- "100 Years Later, the Roll of the Dead in a Factory Fire Is Complete" For the first time, the names of all the victims in the 1911 Triangle Waist Company fire will be read after a researcher’s identification of six unknown victims.
Information and the Humanities
- A Digital Future for the Founding Fathers." January 30, 2011. The University of Virginia Press is in the process of putting the published papers of Washington, Jefferson, John Adams, James Madison, Alexander Hamilton and Benjamin Franklin on a free Web site.
- "Scholars Recruit Public for Project." December 27, 2010. A project in London is using crowd-sourcing to transcribe 40,000 unpublished manuscripts of the Enlightenment philosopher Jeremy Bentham.
- "In 500 Billion Words, New Window on Culture." December 16, 2010. A Google-backed project allows the frequency of specific words and phrases to be tracked in centuries of books.
- "Digital Keys for Unlocking the Humanities’ Riches." November 16, 2010. Digitally savvy scholars are exploring how technology can enhance understanding of the liberal arts.
- "Analyzing Literature by Words and Numbers." December 3, 2010. A computer-generated process gives scholars a view into Victorian thought.
Tuesday, December 28, 2010
Outflanking "the Human" with Information
The brain research takes thin slices of brain tissue and maps connections between neurons in a really BIG (petabyte per mm3) data mining operation. The research is in the infancy stage, but eventually one can imagine having a full circuit diagram of a brain. Interesting implications possibly grasped by either researchers or the articles author:
Neuroscientists say that a connectome could give them myriad insights about the brain’s function and prove particularly useful in the exploration of mental illness. For the first time, researchers and doctors might be able to determine how someone was wired — quite literally — and compare that picture with “regular” brains.Experts quoted in the article debate whether the research is promising enough to spend millions on. But this comment about defining normal or regular brains is not one of the concerns they mention. What are the informational implications of having a data set that describes the connections of a "normal" person?
The second article, "Cheaters Find an Adversary in Technology," reads as a shameful bit of commercial promotion masquerading as journalism, but does usefully illuminate the worldview of the standardized test industry. The story is about a company that uses statistics to detect cheaters. Their algorithms are designed to detect things like similar patterns of wrong answers, changed answers, and big improvements in test scores. If a group of students all misunderstood something in the same way it would look like cheating. And a test taker who "saw the light" at one point and went back and changed several answers will look like a cheater. And the thing we do most in school, attempt to teach people stuff, if successful would lead to big improvements in test scores. But that too, according to the experts, would look like cheating.
There is an arrogance about testers (the gentleman profiled calls himself (unselfconsciously, notes the journalist) "an icon" -- (those who have never heard of him are poorly informed)) that consistently rankles. And their self-promotion as agents of fairness and meritocracy (recall The Big Test) is simple hypocrisy. More problematic, though, is the influence on teaching, learning, and scholarship of a regime that bases its authority and legitimacy on science and objectivity, but that shrouds itself in secrecy and lives OFF rather than FOR education.
Why these two articles together? They suggest a sort of pincer maneuver against "the human" based in information -- on one flank, structure, define the normal brain to a (particular) giant matrix of ones and zeros, while on the other, behavior, treat statistically unusual patterns of activity as morally suspect. "Super Crunching
Source Mentions and Allusions
- Ayres, Ian. 2008. Super Crunchers: Why Thinking-By-Numbers is the New Way To Be Smart
- Foucault, Michel. 1995 (1975). Discipline and Punish: The Birth of the Prison
- Gabriel, Trip. 2010. "Cheaters Find an Adversary in Technology." New York Times, December 27, 2010
- Swedberg, Richard. 2000. Max Weber and the idea of economic sociology
- Vance, Ashlee. 2010. "In Pursuit of a Mind Map, Slice by Slice." New York Times, December 27, 2010
Tuesday, December 14, 2010
Wikileaks Mirror Servers Geographic Visualization
Monday, December 13, 2010
An Interesting Web Book "App"
I just stumbled across a web resource, http://www.librarything.com/, that implements this as a combination of a personal library catalog and a social network. It allows you, virtually, to surf your own library and connect from books you know to books that are related to it. Users "tag" books creating a interesting way to slice through the database. Try these, for example: sociology, history, philosophy, economics. And it keeps an eye on where a given book is available -- libraries, bookstores, online digital sources, used book networks (like abebooks.com).
When I played around with it looking for books on the sociology of information I got a bookshelf that nearly mirrored my the books in front of me on my study's shelves, but with a few titles I was unfamiliar with :
Wednesday, December 08, 2010
Wikileaks Conversation Continues
The entry includes the YouTube "manifesto" of the group (or, rather, decentralized network) "Anonymous" that claims to be at the center of this backlash.
The Times Blog gives a list of related posts:
Sunday, December 05, 2010
An Old Idea Wikileaks has Gotten Me Thinking About Again
It starts from Simmel's observation (in "How is Society Possible?" -- a brilliant essay, BTW) that a starting point for understanding social interaction has to be the recognition that the human condition involves awareness that one can never completely know the mind of the other. No matter how intimate the relationship, there is material held back.
So, imagine this. One day, god gets a funny idea. S/he suddenly makes people's mental content available to those around them. All the fleeting thoughts, the quick little zigs and zags our minds make (making a cake with my mom, talking with her while I washed the dishes about her mother's death, stealing wet cement from that construction site where I smoked my first cigar, Denise my "girlfriend" in seventh grade though I liked Kim better, that pad Thai tonight was tasty if a bit heavy, I can't believe I mistakenly bought 2% milk the other day -- all that between these two sentences and this report highly censored) fully audible to anyone around us. Everyone her own Ulysses. How exactly it would work, I'm not sure -- but imagine that there's some way that the cacophony of it all would be sorted out and we'd be privy to the internal conversations of those around us (and they ours -- and both of us privy to our reactions to what we were hearing).
So, god does this for maybe 15 minutes and then shuts it down. This would I think, have a profound effect on us. God would be amused. But the s/he gets another idea: before heading off to other realms, s/he announces "that was so much fun, I think I'll do it again sometime."
That, I propose, could be the end of social life as we know it.
Friday, December 03, 2010
Wikileaks and Protecting Your Sources
A Chinese intellectual, who spoke in return for customary anonymity, said the disclosures had left those like him who had contact with United States diplomats “nervous” about the possibility of exposure and persecution by authorities who have already blocked access in China to the WikiLeaks Web site.I don't want to equate journalistic secrecy with government secrecy, but I'm surprised, as I suggested in a previous post, that there's been no commentary (or at least none I've seen -- anyone have a reference?) on the irony of the secrecy and confidentiality given sources (as above) by the media vs. the ones revealed in the leaks.
NOTE: it appears that in a lot of the material that's been put online by media organizations some redaction of source information has been carried out.
Wednesday, December 01, 2010
FTC Proposes "Do Not Track" Option for Consumer Privacy
A few weeks ago E. Wyatt and T. Vega wrote of the then forthcoming FTC report on net privacy in "Stage Set for Showdown on Online Privacy" (NYT November 9, 2010):
"Consumer advocates worry that the competing agendas of economic policy makers in the Obama administration, who want uniform international standards, and federal regulators, who are trying to balance consumer protection and commercial rights, will neglect the interests of people most affected by the privacy policies. “I hope they realize that what is good for consumers is ultimately good for business,” said Susan Grant, director of consumer protection at the Consumer Federation of America."The report contains what look like some good, balanced, and practical guidelines for how consumers and information collecting entities interact on the web and elsewhere.
I'd like to propose, as a thought experiment, a more radical approach. What if we started from the premise that everyone owns her own information. You own you opinions, your attitudes, and the traces your behavior might create. If this information is valuable to another entity, they are free to bid on it. We don't need privacy protections, we just need an infrastructure that will allow for a market for private information to operate.
A website or a retailer can have an offer, right at the front door: if you want to browse here, I want to know your name and take note of what you look at. The consumer, in return, can say, you can watch me, for 5 dollars. Consumers can make money by moving around the net and generating value. The entities who host websites on which behavior turns into information turns into value would also be entitled to a share.
Now take the idea a step further. Suppose rather than selling my information I agree to license it. This time I say, you can watch me for $5 but down the road, if any value accrues to you by virtue of you aggregating my information with that of others, I want a cut. As my information goes upstream, up the aggregation pyramid, it becomes a component in something valuable: I deserve a share.
Of course, we'll be told this is completely impractical. Retailers and other entities would just build in the cost. And the transaction costs would be too high. Maybe. But we've got micro-credits worked out at the level of single click-throughs. I don't think the barriers would be technical.
From Information Superhighway to Information Metrosystem
| From http://www.ftc.gov/os/2010/12/101201privacyreport.pdf. |
The genre mixing in the diagram invites, on the one hand, a critical look at where the FTC is coming from in the report (which, in my limited experience of digesting FTC output looks relatively well done) and, on the other, points toward a need to better conceptualize the various components and categories.
Under "collectors," for example, we have public, internet, medical, financial and insurance, telecommunications and mobile, and retail. The next level (brokers) includes affiliates, information brokers, websites, media archives, credit bureaus, healthcare analytics, ad networks and analytics, catalog coops, and list brokers. Finally, on the info users front we have employers, banks, marketers, media, government, lawyers and private investigators, individuals, law enforcement, and product and service delivery.
It's a provocative diagram that helps to focus our attention on the conceptual complexity of "personal information" in an information economy/society. More on this to follow.
Tuesday, November 30, 2010
Leaking Irony
Apparently, several news organizations have had the material recently made public since August. Editors and reporters have been meeting in secret to develop protocols about what would be reported, when, and how. Fortunately for their work, it appears that these journalists managed to do all of this while maintaining the kind of secrecy necessary for them to be able to process the information and to consider its meaning and its implications out of public view. The public, media, and official reaction of the last few days make clear why this secrecy was necessary.
One thing that would be interesting to hear a story on would be what measures were taken to ensure the security of the process. What sorts of technological tools were employed? What sorts of social tools? Did participants have to sign confidentiality agreements? What prevented a rogue reporter from reporting on the reporters reporting?
Friday, November 12, 2010
Work Slowdown in Soc of Info
Have been swamped with teaching and administrative work of late, and trying to spend two days a week at the Center for Advanced Study in the Behavioral Sciences has me on a slow blogging output these days.
Am working on pieces on forms (the kind you fill out) as rationalizing filters and "information interaction protocols," the assumptions behind pending online-privacy proposals (from Commerce and FTC), the soc of info implications of the story of the CIA official knew that a Jordanian contact was a problem (a la double agent -- he later blew himself up at a remote CIA location), and what it means when we make moral judgments about people's ignorance of some thing (as in, "she didn't even know what hip-hop was!").
Meanwhile, thanks for reading. Would love to read any comments you might have -- are there there?
Cheers,
Dan
Sunday, October 17, 2010
Peer to Peer Education: Can Students Teach One Another?
There are lots of interesting experiments going on in and around the university connected with its various fundamental information functions (e.g., opentextbook.org, wikibooks, OpenCourseWare, and, of course, all manner of distance learning). Each of these experiments plays with changing how we think about one piece of the education equation.
I've just come across one that takes the university itself out of the picture: The Peer 2 Peer University (P2PU). P2PU is structured as an online community of open study groups whose members engage one another in short university-level courses. Their model is to connect open educational resources and small groups of motivated learners. P2PU supports the endeavor with a course infrastructure that facilitates course design by an "organizer," interaction among participants, access to materials, and methods for recognition of students' and tutors' work. Initially focused on more technical skills, the organization seems very committed to making sure that P2PU is an ongoing, distributed research project on the topic of new ways to organize learning.
The video below is a bit amateurish on the production side, but gives some idea of the why and the how behind P2PU. The project also maintains a wiki that gives you a sense of how they do what they do.
Monday, August 09, 2010
Do Organizations that 'Fess Up Do Better?
He notes that the risk manager will say "don't disclose" and "don't apologize" because these could put the organization at legal or financial risk. A culture of safety and organizational improvement, though, would say "fully disclose," not because it will help the patient, but because it is a necessary component of organizational change. The organization has to admit the error if is going to avoid repeating it, he asserts.
This suggests a number of sociology of information connections, but we'll deal with just one here. This example points to an alternative to the conventional economic analysis of the value of information. The usual approach is to "price" the information in terms of who controls it and who could do what with it (akin to the risk manager's thinking above). But here we see a process value -- the organization itself might change if it discloses the information (independent, perhaps, of the conventional value of disclosure or non-disclosure). One could even imagine an alternative pricing scheme that says "sure, Mr. X might sue us, but by disclosing the information we are more likely to improve our systems in a manner that lets us avoid this mistake in the future (along with the risk it poses to us and the costs it might impose on society). Why pour resources into hiding the truth rather than into using the information to effect change?
One rebuttal to this says that an organization can do both, and maybe so. Another would say that this is just mathematically equivalent to what would happen in litigation (perhaps through punitive damages).
But I think that Mr. McCarthy is onto something in terms of "information behaviors." There are, I expect, a whole bunch of "internal externalities" associated with what we decide to do with information. In other places I've examined the relational implications of information behavior. This points to another family of effects: organizational. More to come on this.
Information and Educational Assessment I
My stroke neurologists and I have decided that if treatment does not yet depend on the results, these tests should not be done outside the context of a clinical trial, no matter how beautiful and informative the images are. At our center, we have therefore not jumped on the bandwagon of routine CT perfusion tests in the setting of acute stroke, possibly sparing our patients the complications mentioned.
This raises an important, if nearly banal, point: if you don't have an action decision that depends on a piece of information, don't spend resources (or run risks) to obtain the information. The exception, as he suggests, is when you are doing basic science of some sort.
Now consider, for a moment, the practice of "assessment" in contemporary higher education. An industry has built up around the idea of measuring educational outcomes in which a phenomenal amount of energy (and grief) is invested to produce information that is (1) of dubious validity and (2) does not, in general, have a well articulated relationship to decisions.
Now the folks who work in the assessment industry are all about "evidence based change," but they naively expect that they can, a priori, figure out what information will be useful for this purpose.
They fetishize the idea of "closing the loop" -- bringing assessment information to bear on curriculum decisions and practices -- but they confuse the means and the ends. To show that we are really doing assessment we have to find a decision that can be based on the information that has been collected. Not quite the "garbage can model of decision-making," but close.
Perhaps a better approach (and one that would demonstrate an appreciation of basic critical thinking skills) to improving higher education would be to START by identifying opportunities for making decisions about how things are done and THEN figuring out what information would allow us to make the right decision and THEN how we would best collect said information. Such an approach would involve actually understanding both the educational process and the way educational organizations work. My impression is that it is precisely a lack of understanding and interest in these things on the part of the assessment crowd that leads them to get the whole thing backwards. Only time will tell whether these scientist-manqués manage to mediocritize higher education or not.
Thursday, July 29, 2010
Open Science : A Sociology of Information Topic par excellence
From the conference website
Synthetic Biology, Gene Patents, Open Data, Open Access, Microfinance for Science, DIY science, DIY Biology, Alternative Funding for Science, Open Source Drugs, Patent Pools, Open Health/Medicine, Patient Advocacy for Innovation
"Ready for a rapid, radical reboot of the global innovation system for a truly free and open 21st century knowledge economy? Join us at the first Open Science Summit, an attempt to gather all stakeholders who want to liberate our scientific and technological commons to enable an new era of decentralized, distributed innovation to solve humanity's greatest challenges."
Tuesday, July 27, 2010
A Few Limits on Copyright
And here's what's changed as a result of James H. Billington's tri-ennial interpretation.
(1) College professors (in general) and students (in film and media studies, at least) can circumvent DVD security measures to include snippets of motion pictures into new works for the purpose of criticism or comment for educational purposes. A similar exemption exists for documentary filmmaking and noncommercial videos.
(2) You can hack programs on your phone if the purpose is to get programs you have legally obtained to work together. This is interpreted to mean you can "jailbreak" an iPhone and load non-Apple apps.
(3) You can hack programs on your phone if the purpose is connect it to a telecommunications network you are authorized to connect to. In other words, you can hack your Iphone so it works on Verizon.
(4) You can hack a video game you own if it's just for testing or fixing security flaws as long as you don't use the information you get from the process to help folks violate copyright.
| Dongle |
(6) If you have an ebook and all existing ebook editions disable read-aloud, then you can hack it to make it read-aloud. In other words, if the copyright owner doesn't offer to sell a read-aloud enabled version then you can break the controls that prevent read-aloud on a copy you own. Note that it seems that the publisher could offer for sale a million dollar read-aloud-enabled version to get around this. Presumably, the exception won't unravel retroactively -- the question will be was the read-aloud-enabled version available on the day you hacked the control.
Sources
U.S. Copyright Office. 2010. "Statement of the Librarian of Congress Relating to Section 1201 Rulemaking."
Wortham, Jenna. 2010. "In Ruling on iPhones, Apple Loses a Bit of Its Grip," New York Times July 26.
Friday, March 12, 2010
Regulating the Supply of Law
The ways that states regulate professions is a topic of sociological interest. The degree to which citizens have access to legal services to solve legal problems is a topic of sociological interest. As argued previously on this blog("Equality, Information and the Courts Redux," "Democracy and the Information Order," "Courts and the Information Order," "Suing for Information"), the way the courts work is a topic of sociology of information interest. In this op-ed, these issues come together in a sociologically interesting way. You may recognize the author of the piece as my sometime co-author (and wife).-- Dan.
A case for legal aid at Wal-Mart
The United States stands largely alone in advanced-market democracies in drastically restricting where and how people can get help with their legal problems. In all states, under rules created by bar associations and state supreme courts, only people with law degrees and who are admitted to the state bar can provide legal advice and services of any kind. [Read More]
Friday, February 05, 2010
Technologically Induced Social Alzheimers
Data rot is the tendency for technology to evolve so fast that we are all left with lots of information stored on media for which there no longer exist a device to play it. The implication of this is that society as a whole "has" lots of information that it might have no way of accessing. Hence the title of this post. Of course the ironic thing is that the social problem is hardware outstripping the memory while in the personal case its sort of the hardware failing the memory.
But it points to an interesting idea: perhaps the explosion of information -- and our general capacity to store, move, and process it -- comes with some self limiting counter tendencies. One is complexity -- too much information, no one has the synoptic view or cleverness to understand what it means. Another is the connect the dots problem I've written about here. Yet another is data rot -- backwards compatibility always has its limits. I wonder if anyone has sat down to map out what sorts of information are likely to move into the darkness of rot when. Are all the data on punch cards gone from the social memory yet? How about all those 24 inch fixed disk platters we used to get mounted on our System/370 machine? I know my college thesis on it's 8 inch IBM Series/1 diskette is basically lost to time. What else?
Related Posts
"The More Information the Better"?
What Society Knows
