8,564 research outputs found

    Cyberspace As/And Space

    Get PDF
    The appropriate role of place- and space-based metaphors for the Internet and its constituent nodes and networks is hotly contested. This essay seeks to provoke critical reflection on the implications of place- and space-based theories of cyberspace for the ongoing production of networked space more generally. It argues, first, that adherents of the cyberspace metaphor have been insufficiently sensitive to the ways in which theories of cyberspace as space themselves function as acts of social construction. Specifically, the leading theories all have deployed the metaphoric construct of cyberspace to situate cyberspace, explicitly or implicitly, as separate space. This denies all of the ways in which cyberspace operates as both extension and evolution of everyday spatial practice. Next, it argues that critics of the cyberspace metaphor have confused two senses of space and two senses of metaphor. The cyberspace metaphor does not refer to abstract, Cartesian space, but instead expresses an experienced spatiality mediated by embodied human cognition. Cyberspace in this sense is relative, mutable, and constituted via the interactions among practice, conceptualization, and representation. The insights drawn from this exercise suggest a very different way of understanding both the spatiality of cyberspace and its architectural and regulatory challenges. In particular, they suggest closer attention to three ongoing shifts: the emergence of a new sense of social space, which the author calls networked space; the interpenetration of embodied, formerly bounded space by networked space; and the ways in which these developments alter, instantiate, and disrupt geographies of power

    Pervasively Distributed Copyright Enforcement

    Get PDF
    In an effort to control flows of unauthorized information, the major copyright industries are pursuing a range of strategies designed to distribute copyright enforcement functions across a wide range of actors and to embed these functions within communications networks, protocols, and devices. Some of these strategies have received considerable academic and public scrutiny, but much less attention has been paid to the ways in which all of them overlap and intersect with one another. This article offers a framework for theorizing this process. The distributed extension of intellectual property enforcement into private spaces and throughout communications networks can be understood as a new, hybrid species of disciplinary regime that locates the justification for its pervasive reach in a permanent state of crisis. This hybrid regime derives its force neither primarily from centralized authority nor primarily from decentralized, internalized norms, but instead from a set of coordinated processes for authorizing flows of information. Although the success of this project is not yet assured, its odds of success are by no means remote as skeptics have suggested. Power to implement crisis management in the decentralized marketplace for digital content arises from a confluence of private and public interests and is amplified by the dynamics of technical standards processes. The emergent regime of pervasively distributed copyright enforcement has profound implications for the production of the networked information society

    Would Kitty Genovese have been murdered in Second Life? Researching the "bystander effect" using online technologies

    Full text link
    The increasing use of online technologies, including &lsquo;virtual worlds&rsquo; such as Second Life, provides sociology with a transformed context within which to ply creative research approaches to ongoing social issues, such as the &lsquo;bystander effect&rsquo;. While the &lsquo;bystander effect&rsquo; was coined following a real-life incident, the concept has been researched primarily through laboratory-based experiments. The relationship between &lsquo;virtual&rsquo; and &lsquo;real&rsquo; world environments and human behaviours are, however, unclear and warrant careful attention and research.In this paper we outline existing literature on the applicability of computer-simulated activity to real world contexts. We consider the potential of Second Life as a research environment in which &lsquo;virtual&rsquo; and &lsquo;real&rsquo; human responses are potentially more blurred than in real-life or a laboratory setting. We describe preliminary research in which unsolicited Second Life participants faced a situation in which they could have intervened. Our findings suggest the existence of a common perception that formal regulators were close at hand, and that this contributed to the hesitation of some people to personally intervene in the fraught situation. In addition to providing another angle on the &lsquo;bystander effect&rsquo;, this research contributes to our understanding of how new technologies might enable us to conduct social research in creative ways.<br /

    Lex Informatica: The Formulation of Information Policy Rules through Technology

    Get PDF
    Historically, law and government regulation have established default rules for information policy, including constitutional rules on freedom of expression and statutory rights of ownership of information. This Article will show that for network environments and the Information Society, however, law and government regulation are not the only source of rule-making. Technological capabilities and system design choices impose rules on participants. The creation and implementation of information policy are embedded in network designs and standards as well as in system configurations. Even user preferences and technical choices create overarching, local default rules. This Article argues, in essence, that the set of rules for information flows imposed by technology and communication networks form a “Lex Informatica” that policymakers must understand, consciously recognize, and encourage

    Metaphor, Objects, and Commodities

    Get PDF
    This article is a contribution to a symposium that focuses on the ideas of Margaret Jane Radin as a point of departure, and particularly on her analyses of propertization and commodification. While Radin focuses on the harms associated with commodification of the person, relying on Hegel's idea of alienation, we argue that objectification, and in particular objectification of various features of the digital environment, may have important system benefits. We present an extended critique of Radin's analysis, basing the critique in part on Gadamer's argument that meaning and application are interrelated and that meaning changes with application. Central to this interplay is the speculative form of analysis that seeks to fix meaning, contrasted with metaphorical thought that seeks to undermine some fixed meanings and create new meanings through interpretation. The result is that speculative and metaphorical forms are conjoined in an interactive process through which new adaptations emerge. Taking this critique an additional step, we use examples from contemporary intellectual property law discourse to demonstrate how an interactive approach, grounded in metaphor, can yield important insights

    Power and multistakeholderism in internet global governance. Towards a synergetic theoretical framework

    Get PDF
    With the advancement of multistakeholder collaboration as a governance principle in theglobal Internet Governance, how to investigate the political process in a ‘shared power’environment emerges as a challenging methodological issue. In this paper, a synergetic theoretical approach is proposed to the study of Internet governance political process, which focuses on the concept of power, and crosses the boundaries of three academic fields, namely, Political Philosophy, Political Science and International Relations, and Organization Studies. This approach aggregates, in a descending analytical manner, concepts intrinsically linked to the contemporary shifting governance paradigm (i.e. governmentality, global governance, global public-policy networks, shared power, multistakeholder collaboration). In addition, such an approach brings the collaborative process into focus (rather than the decisions it leads to) by accentuating the productive potential of a collaboration based on the ‘shared power’ formula. Each of those theoretical reflections on shifting power relations provides building elements for a synergetic theoretical framework that can be, and has been, applied to the investigation of the emergent Internet governance regime. As a result, stakeholder alliances can be mapped, instances of power dynamics can be discerned, and some longitudinal tangible and intangible outcomes of the multistakeholder collaboration can be envisioned

    Lawyers and cyberspace: Seeing the elephant?

    Get PDF
    This paper considers the problem of Internet regulation, and how it has been exacerbated by poor theoretical models for cyberspace. Furthermore, it considers how the conceptual difficulties with regard to the nature of cyberspace have been replicated in formulation of regulation. Having identified the key areas of difficulty,this paper then explores a potential solution building on the regulatory work of Chris Reed and Christopher Marsden. Using autopoietic theory to fuse their understandingof both the human, and technological aspects of Internet regulation, this paper aims to generate one coherent theory that would offer a flexible, responsive and effectiveregulatory model for cyberspace

    Scaling Up Deliberative Democracy as Dispute Resolution in Healthcare Reform: A Work in Progress

    Get PDF
    Simultaneous Localisation and Mapping (SLAM) denotes the problem of jointly localizing a moving platform and mapping the environment. This work studies the SLAM problem using a combination of inertial sensors, measuring the platform's accelerations and angular velocities, and a monocular camera observing the environment. We formulate the SLAM problem on a nonlinear least squares (NLS) batch form, whose solution provides a smoothed estimate of the motion and map. The NLS problem is highly nonconvex in practice, so a good initial estimate is required. We propose a multi-stage iterative procedure, that utilises the fact that the SLAM problem is linear if the platform's rotations are known. The map is initialised with camera feature detections only, by utilising feature tracking and clustering of  feature tracks. In this way, loop closures are automatically detected. The initialization method and subsequent NLS refinement is demonstrated on both simulated and real data

    Do we Need a Political Economy of Surveillance? The Case of the GDPR: A Critical Account of the Norms Governing Cyberspace

    Get PDF
    This study examines the General Data Protection Regulation of the European Union from a critical perspective. By doing so, it aims to generate a comprehensive account of online surveillance practices for commercial purposes, and how public policy in this field is normatively conceived. In order to untangle the normative elements of this highly contested and complex regulation, which took more than five years to be signed under intense lobbying, this paper concentrates on the topics of Consent, Data Ownership and Profiling. These three interrelated elements constitute the primary sources of power asymmetries in the Web between users and providers of online services. By employing the proposed theoretical perspective of a political economy of surveillance, this paper draws from concepts of Foucauldian panoptic surveillance and of Marxist political economics, in order to draw a picture of current surveillance practices by major, quasi- monopolistic IT corporations such as Google and Facebook. The analysis then tests this framework with regard to the normative stance taken by the GDPR, the first major initiative aimed at regulating cyberspace. Deconstructing regulation in this way helps to understand the normative and ideological lines of action of the EU in the newly emerged policy area of the Common Digital Market
    • 

    corecore