26 research outputs found

    Capital, State, Empire

    Get PDF
    The United States presents the greatest source of global geo-political violence and instability. Guided by the radical political economy tradition, this book offers an analysis of the USA’s historical impulse to weaponize communication technologies. Scott Timcke explores the foundations of this impulse, then demonstrates how the militarization of digital society creates structural injustices and social inequalities. He analyses how new digital communication technologies support and fund indirect and informal means that ensures American paramountcy, in turn sustaining enduring conditions for worldwide capital accumulation. Identifying selected features of contemporary American society, Capital, State, Empire undertakes a materialist critique of this digital society and assesses the impact of The New American Way of War, understood here as an outcome of a capitalist state’s military budgets priorities under imperial strategy

    Privacy And The Digital Divide: Investigating Strategies For Digital Safety By People Of Color

    Get PDF
    People of color are becoming increasingly concerned with digital privacy. They are concerned about the obfuscated data collection and sharing practices of major social media plat- forms and the strong entitlement of other users in the online space to their content. This study examines how people of color conceptualize and behave to produce safety in the online space, or, in other words, digital privacy. This study challenges notions that people are not purposeful about privacy in the online space and highlights the voices of people of color, whom are not of- ten included in theorizing or decision making about the online space. This qualitative study reveals generational differences in the digital privacy strategies of people of color. Participants who are Millennials and Generation X are influenced by intergener- ational knowledge when they conceptualize and seek to create privacy. Participants who are from Generation Z lack this knowledge, and, therefore, approach privacy differently. This difference is revealed in the choice of participants that are Millennials and Generation X to self-deplatform from major social media. Instead, Younger participants, who belong to Generation Z, practice strict curation of their online selves. The aim of this strategy is to endure. They believe that future economic and social benefits wait on the other side of disprivacy

    Governing Privacy in Knowledge Commons

    Get PDF
    Scholars from various disciplines explore privacy governance using the Governing Knowledge Commons framework. Case studies drawn from contexts such as academia, social media, mental health, and IoT provide insights into how privacy shapes community knowledge production. This title is also available as Open Access on Cambridge Core

    Pandemic Exposures

    Get PDF
    For people and governments around the world, the onset of the COVID-19 pandemic seemed to place the preservation of human life at odds with the pursuit of economic and social life. Yet this simple alternative belies the complexity of the entanglements the crisis has created and revealed not just between health and wealth but also around morality, knowledge, governance, culture, and everyday subsistence. Didier Fassin and Marion Fourcade have assembled an eminent team of scholars from across the social sciences conducting research on six continents to reflect on the multiple ways the coronavirus has entered, reshaped, or exacerbated existing trends and structures in every part of the globe. The contributors show how the disruptions caused by the pandemic have both hastened the rise of new social divisions and hardened old inequalities and dilemmas. An indispensable volume, Pandemic Exposures provides an illuminating analysis of this watershed moment and its possible aftermath

    Hackers gonna hack: investigating the effect of group processes and social identities within online hacking communities.

    Get PDF
    Hacking is an ethically and legally ambiguous area, often associated with cybercrime and cyberattacks. This investigation examines the human side of hacking and the merits of understanding this community. This includes group processes regarding: the identification and adoption of a social identity within hacking, and the variations this may cause in behaviour; trust within in the social identity group; the impact of breaches of trust within the community. It is believed that this research could lead to constructive developments for cybersecurity practices and individuals involved with hacking communities by identifying significant or influencing elements of the social identity and group process within these communities. For cybersecurity, the positive influence on individual security approaches after the hacker social identity adoption, and the subsequent in-group or out-group behaviours, could be adapted to improve security in the work place context. For individuals involved in the communities, an increase in the awareness of the potential influences from their adopted social identities and from other members could help those otherwise vulnerable to manipulation, such as new or younger members. Further discussion on such information, as well as historical examples, will lead to informed behaviour by these communities. Whilst this may not cause the group behaviour to change, it would ensure there would be understanding and acceptance of consequences to unethical or illegal actions, which is hoped to discourage cybercriminal behaviour. The research employed a mixed methods approach, with online questionnaires and individual participant interviews. This approach primarily utilised the netnographic approach (Kozinets, 2015), with the results providing more qualitative information than originally anticipated. Informal data collection for this research included observation of relevant websites and forum discussions as well as observation at hacking related conferences; the subsequent surveys and interviews were conducted with volunteers from these communities. Formal data collection was initiated through a pilot study, carried out in early 2016, with 44 participants. This was followed by the first study survey in early 2017, completed by 155 participants. The second study was individual interviews, conducted with 14 participants throughout 2017. These interviews were analysed in the context of Social Identity Theory (Tajfel, 1974). The third and final study was another survey, conducted early 2018 with 197 participants. Thematic analysis was conducted on all data. There was limited evidence of manipulation of group process or trust observed in forums or reported by participants. The adoption of a specific social identity does have strong and influential behavioural norms; however, the adoption of a specific social identity category does not prevent individuals from identifying and confirming to multiple categories which may use or accept different behaviours. The majority of particiapnts in these studies appeared to position themselves as positive deviants, acknowledging past or minor “black-hat” behaviour. This work contributes to the development and improvement of methodologies in online environments: this research was exploratory in accessing a hard to reach demographic that is often untrusting of outsiders. Adaptions to ethical procedures ensured complete anonymity for the participants, improving the participant recruitment rate. Key findings from this research demonstrate that hacking communities can be very positive and supportive for their members, functioning primarily as meritocracies. This is regarded by the communities as an important positive trait, in conjunction with online anonymity. The conclusions of this research consistently support the findings of previous studies

    The ethical issues of additive manufacturing

    Get PDF
    Additive manufacturing (3D printing) has brought industrial manufacturing capabilities to the desktop, allowing the seamless transition from consumer-to-manufacturer-to-retailer and enabling anyone to use the technology outside of traditionally regulated spaces. This creates new challenges for information technology governance. The potential societal risks of additive manufacturing (AM) are not well known and there is a policy vacuum on how the technology should be used responsibly. As 3D printers become mainstream and are increasingly being used in homes, garages, SME’s, educational institutions, large enterprises etc, this study explores the ethical issues promoted by the technology. Considering that 3D printing has mainly been advanced by activities of DIY hacker groups and the sharing economy, this thesis is framed in the context of users from DIY hacker collectives like hackspaces, makerspaces, and FabLabs. The research investigates the ethical concerns of experts who are closely associated with such collectives to understand the types of issues they are concerned about. The study was also an attempt to understand the implications of expert participation in knowledge-making in terms of ethics. An interpretive hermeneutic approach was followed in the collection and analysis of data from the experts that participated in this research. This approach helped the researcher to recognise how personal prejudices can be the basis of developing an understanding and to reflect critically on the cultural and historical background of 3D printing, the participants, and the researchers own historicity in a bid to derive meaning from the study. The study has found that participants were able to identify several ethical issues which have been broken down into 26 subthemes. The main themes, however, are environment, health and safety, intellectual property rights, jobs, 3D printed guns, business ethics, offensive items, data security, and liability. Nevertheless, a closer inspection of these findings also indicates that individually, the participants have limited knowledge of the societal concerns of 3D printing. For example, when participants are split into academics and SME’s to reflect their professional background, academics identified an average of 1.7 of the 26 subthemes, as opposed to an average of 3.7 issues by those from SMEs. This raises important questions about the reliability and validity of expert participation in knowledge-making for ethics-related studies. The findings also show that the hacking culture has had a double-edged effect on 3D printing. It has actively promoted the democratisation of the 3D printing by enabling anyone and everyone to participate and benefit equally. However, it has also passively promoted societal concerns by enabling the use of 3D printers in spaces outside of institutional control where ethical approval isn’t required
    corecore