998 research outputs found

    Book review: The crowdsourced panopticon: conformity and control on social media by Jeremy Weissman

    Get PDF
    In The Crowdsourced Panopticon: Conformity and Control on Social Media, Jeremy Weissman explores the role of ‘peer-to-peer’ surveillance through social media and how this is increasingly shaping our behaviour. This is a welcome addition to the scholarly work on surveillance and privacy, writes Matt Bluemink, with a clear, approachable writing style and a wealth of empirical examples. This review ... Continue

    Pervasively Distributed Copyright Enforcement

    Get PDF
    In an effort to control flows of unauthorized information, the major copyright industries are pursuing a range of strategies designed to distribute copyright enforcement functions across a wide range of actors and to embed these functions within communications networks, protocols, and devices. Some of these strategies have received considerable academic and public scrutiny, but much less attention has been paid to the ways in which all of them overlap and intersect with one another. This article offers a framework for theorizing this process. The distributed extension of intellectual property enforcement into private spaces and throughout communications networks can be understood as a new, hybrid species of disciplinary regime that locates the justification for its pervasive reach in a permanent state of crisis. This hybrid regime derives its force neither primarily from centralized authority nor primarily from decentralized, internalized norms, but instead from a set of coordinated processes for authorizing flows of information. Although the success of this project is not yet assured, its odds of success are by no means remote as skeptics have suggested. Power to implement crisis management in the decentralized marketplace for digital content arises from a confluence of private and public interests and is amplified by the dynamics of technical standards processes. The emergent regime of pervasively distributed copyright enforcement has profound implications for the production of the networked information society

    The political imaginaries of blockchain projects: discerning the expressions of an emerging ecosystem

    Get PDF
    There is a wealth of information, hype around, and research into blockchain’s ‘disruptive’ and ‘transformative’ potential concerning every industry. However, there is an absence of scholarly attention given to identifying and analyzing the political premises and consequences of blockchain projects. Through digital ethnography and participatory action research, this article shows how blockchain experiments personify ‘prefigurative politics’ by design: they embody the politics and power structures which they want to enable in society. By showing how these prefigurative embodiments are informed and determined by the underlying political imaginaries, the article proposes a basic typology of blockchain projects. Furthermore, it outlines a frame to question, cluster, and analyze the expressions of political imaginaries intrinsic to the design and operationalization of blockchain projects on three analytic levels: users, intermediaries, and institutions.</p

    The use of mobile phones for human rights protection: the experiences of Zimbabwean Human Rights Non-Governmental Organisations

    Get PDF
    New technologies are emerging as a key part of the struggles for social change. In Africa, social change activists are increasingly relying on mobile phones to organise and mobilise protests for social change and to protect citizens from violence. Zimbabwe has experienced a long history of human rights violations stretching from the times of Rhodesia to post-coalition years. The violations have been in various forms, including the use of physical force and the constriction of political, media and electoral spaces. Human Rights NGOs, as part of civil society, have challenged the state over the violations in various ways, including through traditional and new media channels. Using case studies, namely the Zimbabwe Peace Project, (ZPP), Zimbabwe Lawyers for Human Rights (ZLHR), the Media Institute of Southern Africa (MISA, Zimbabwe) and the Election Resource Centre (ERC), the research investigates the potential of the mobile phone as a tool for contesting the constriction of media freedom, information access, freedom of expression and citizens’ right to human dignity, to life, political choice and free movement and association. The research is based on findings from interviews conducted between 2014 and 2016 with Zimbabwean human rights activists as well as from document analysis. The study established that the phone is a key tool through which NGOs and community activists (or volunteers) are offering protection to citizens by documenting, reporting and disseminating evidence of violence. It is also playing a significant role in legal interventions for victims of violence. Further, the device is empowering citizens to educate themselves about voting and mobilising for elections. Mobile technology is also facilitating the production of community media which is giving marginalised communities voices and opportunities to contribute towards, or participate in local and national dialogue and development. Equally important, it is opening pathways through which NGOs and human rights defenders are able to challenge state institutions that undermine the rule of law and justice. Finally, the study also established that in the face of legal, surveillance, interception and censorship strategies by the state, NGOs are mobilising networks, collaborative campaigns and circumvention and mobile-phone-mediated education and information tools to counter these strategies and tactics. The research is thus significant in terms of struggles from below in the context of new technologies for human rights and democratisation

    Network Awareness for Wireless Peer-to-Peer Collaborative Environments

    Get PDF
    Presentation to the 37th Hawaii International Conference on System Science. Hilton Waikoloa Village, Island of Hawaii, 5-8 January 2004.The implications of using mobile wireless communications are significant for emerging peer-to-peer (P2P) collaborative environments. From a networking perspective, the use of wireless technologies to support collaboration may impact bandwidth and spectrum utilization. This paper explores the effects of providing feedback to system users regarding wireless P2P network behavior on the performance of collaboration support applications. We refer to this operational feedback as "network awareness." The underlying premise is that providing feedback on the status of the network will enable users to self-organize their behavior to maintain quality of data sharing. Results achieved during an experiment conducted at the Naval Postgraduate School demonstrate significant effects of roaming on application sharing performance and integration with client-server applications. A solution for improving network aware P2P collaboration, identified in the experiment, is discussed

    Piensa globalmente, actúa localmente: mapeo de la cultura libre en un sistema mediático híbrido

    Get PDF
    From the nineties, the Internet has been providing new political hybrid action forms. At the same time, some communities make a disruptive use of technologies aiming to subvert network power relationships at the current capitalized and centralized cyberspace. Addressing a collaborative mapping, we identified 290 free culture communities in Spain. Their characteristics suggest the relevance of offline spaces and local areas to deliberate, propose and perform political participation towards a neutral, centralised and free Internet.Desde los años noventa, el ciberespacio ha propuesto formas acción política híbrida. Asimismo, algunos colectivos realizan un uso disruptivo de las tecnologías para subvertir las relaciones de poder en la Red. Mediante un mapeo colaborativo, identificamos 290 grupos relacionados con la cultura libre en España. Sus características sugieren la relevancia de los espacios offline y de los territorios locales para deliberar y activarse políticamente a favor de un Internet libre

    Three Under-recognized Hazards of Digital Recording

    Get PDF

    Needs Assessment for an Information System to Support a TB Control Program in Indonesia

    Get PDF
    Tuberculosis (TB) is still a burden in Indonesia, including in Sukoharjo Regency. The wide gap between the estimated TB cases and those found, and the number of fluctuating cases since 2013 are problems for the Sukoharjo Health Office. Various programs have been created and carried out but Sukoharjo is still ranked low in TB case identification. The aim of this study was to map the information requirements to support the the identification of TB cases by the district health office. This research was a needs assessment, based on the system development life cycle (SDLC) approach. Qualitative data were obtained from in-depth interviews, including with the head of the TB program in the Puskesmas public health center, a TB program supervisor, a head of communicable disease control, a head of disease control, and a head of health systems in Sukoharjo, Central Java, Indonesia. Several programs were identified such as knock-on programs, screening of cross-sectorial TB suspects including Aisyiah TB-HIV care, and strengthening of PISPK (Healthy Indonesia Program With a Family Approach). Strengthening of TB health volunteers was still being carried out, but the achievement of TB screening was still low. Informants were still looking for ways to improve screening for suspected TB. The health agency had not yet developed a decision support system that could be used to help plan TB screening programs, but the health office wanted one to be developed. An information system is needed to help make evidence-based programs to find TB cases. Keywords: needs assessment, system, TB control, Indonesi

    Three Under-recognized Hazards of Digital Recording

    Get PDF

    Architecture and Applications of IoT Devices in Socially Relevant Fields

    Full text link
    Number of IoT enabled devices are being tried and introduced every year and there is a healthy competition among researched and businesses to capitalize the space created by IoT, as these devices have a great market potential. Depending on the type of task involved and sensitive nature of data that the device handles, various IoT architectures, communication protocols and components are chosen and their performance is evaluated. This paper reviews such IoT enabled devices based on their architecture, communication protocols and functions in few key socially relevant fields like health care, farming, firefighting, women/individual safety/call for help/harm alert, home surveillance and mapping as these fields involve majority of the general public. It can be seen, to one's amazement, that already significant number of devices are being reported on these fields and their performance is promising. This paper also outlines the challenges involved in each of these fields that require solutions to make these devices reliableComment: 1
    • …
    corecore