297 research outputs found

    A Provisional Phenomenology of the Audiobook

    Get PDF
    In this preliminary phenomenology of the experience of an audiobook, I compare the engagement with language with that of reading and listening to a present speaker, as well as approaching the particularities of embodied audiobook listening on its own terms. The process of constructing meaning at the level of individual sentences is treated exhaustively, while the remainder is approached only in its general contours. We see that the audiobook contains its own temporal structure and forms a context in which physical and social experiences become background

    Human Alchemy and the Deadly Sins of Capitalism

    Get PDF

    Technology and Discrimination

    Get PDF
    This chapter develops a full theory of discriminatory technologies grounded in Heideggerian, Latourian, and Ihdean theoretical structures and demonstrates its applicability to a wide and widening range of forms of normativity, exclusion, and discrimination, taking place across intersections of race, ethnicity, gender, sexual orientation, trans/cisgender identity, disability, and religious identity. Technologies, technical systems, and artifacts considered are wide-ranging, and include algorithms, adhesive bandages, human resource management policies, calendars, VR systems, carpentry, strollers, photographic film formulation and printing, video game character classes, and stairs

    Against Strong Copyright in E-Business

    Get PDF
    As digital media give increasing power to users—power to reproduce, share, remix, and otherwise make use of content—businesses based on content provision are forced to either turn to technological and legal means of disempowering users, or to change their business models. By looking at Lockean and Kantian theories as applied to intellectual property rights, we see that business is not justified in disempowering users in this way, and that these theories obligate e-business to find new business models. Utilitarian considerations support disempowering users in this way in some circumstances and for the time being, but also show that there is a general obligation to move to new business models. On these moral bases, as well as on practical bases, e-business ought to refrain from using the legally permitted strong copyright protections, and should instead find ways of doing business which support, value, and respect the technical capabilities that users have gained

    Revolutionary Industry and Digital Colonialism

    Get PDF
    Copyright-based industries have become revolutionary. That is, the machinery of production of digital wares has itself taken on the role of the revolutionary class within the political economy of digital production. The progress of capitalist production in this industry has undermined the conditions of its own possibility, not because it has driven the proletariat to rise against an oppressive system, but because the means of production, through digital media, have simultaneously made communist production possible, and the continued separation of the means of production from the laborer impracticable

    Method Against Method: Swarm and Interdisciplinary Research Methodology

    Get PDF
    Part of a special issue on “swarm methodology,” this paper, written by a swarm participant, reflects upon the purpose and value of this kind of interdisciplinary research methodology. First, by way of a recognition of the interdisciplinary status of this paper itself, the question of what we hope to accomplish when we engage in conversations across disciplinary boundaries is broached. Second, a discussion of the practice of peer-review provides an approximate view of one paradigmatic understanding of how we produce a “conversation” within a given established research methodology. We are then, third, able to consider a number of possible related ways in which we might understand the value of a conversation between research methodologies. Finally, the common intuition that there is a concrete value specifically within a “holistic” or “synergistic approach” is addressed, and the swarm methodology put forth as a very likely place for such a value to emerge, if it is to emerge anywhere

    Principles of Anti-Discriminatory Design

    Get PDF
    Technical design can produce exclusionary and even discriminatory effects for users. A lack of discriminatory intent is insufficient to avoid discriminatory design, since implicit assumptions about users rarely include all relevant user demographics, and in some cases, designing for all relevant users is actually impossible. To minimize discriminatory effects of technical design, an actively anti-discriminatory design perspective must be adopted. This article provides examples of discriminatory user exclusion, then defining exclusionary design in terms of disaffordances and dysaffordances. Once these definitions are in place, principles of anti-discriminatory design are advanced, drawing upon a method of phenomenological variation employed in the context of standpoint epistemology

    Making Connections Between General Education Information Literacy Classes and Upper Level Writing Courses: An Exploration of Faculty and Student Perceptions

    Get PDF
    This presentation will describe a collaborative project between University faculty and a librarian that connected faculty who teach general education information literacy courses to those who teach upper-level writing intensive courses. The project provided an opportunity for these faculty to participate in a focus group discussion to explore how the courses are aligned and how information literacy courses can support and prepare students for upper-level writing courses. Following the focus group discussion the presenters provided an opportunity for writing and information literacy faculty to take action on what they learned from each other by participating in an assignment redesign workshop. The assignment redesign workshop followed the Assignment-Design Charrette format. The Assignment-Design Charrette is a style of workshop introduced by the National Institute for Learning Outcomes Assessment in which faculty first reflect on their assignment, bring the assignment and the reflection to the workshop and present their assignment to the group. This presentation will share the outcomes from the workshop. Finally, the presenters will share results from survey research conducted to gather information about student perceptions of how information literacy and writing-intensive course content is aligned and will compare student perceptions to faculty perceptions

    Boredom on Facebook

    Get PDF

    Lurkers, Creepers, and Virtuous Interactivity: From Property Rights to Consent to Care as a Conceptual Basis for Privacy Concerns and Information Ethics

    Get PDF
    Exchange of personal information online is usually conceptualized according to an economic model that treats personal information as data owned by the persons these data are ‘about.’ This leads to a distinct set of concerns having to do with data ownership, data mining, profits, and exploitation, which do not closely correspond to the concerns about privacy that people actually have. A post-phenomenological perspective, oriented by feminist ethics of care, urges us to figure out how privacy concerns arrive in fundamentally human contexts and to speak to that, rather than trying to convince people to care about privacy as it is juridically conceived and articulated. By considering exchanges of personal information in a human-to-human online informational economy — being friends on social networking sites — we can identify an alternate set of concerns: consent, respect, lurking, and creepiness. I argue that these concerns will provide a better guide to both users and companies about prudence and ethics in information economies than the existing discourse around ‘privacy.
    • 

    corecore