3 research outputs found

    Facebooking in "face": Complex identities meet simple databases

    Get PDF
    Online systems often struggle to account for the complicated self-presentation and disclosure needs of those with complex identities or specialized anonymity. Using the lenses of gender, recovery, and performance, our proposed panel explores the tensions that emerge when the richness and complexity of individual personalities and subjectivities run up against design norms that imagine identity as simplistic or one-dimensional. These models of identity not only limit the ways individuals can express their own identities, but also establish norms for other users about what to expect, causing further issues when the inevitable dislocations do occur. We discuss the challenges in translating identity into these systems, and how this is further marred by technical requirements and normative logics that structure cultures and practices of databases, algorithms and computer programming

    Lit up and left dark: Failures of imagination in urban broadband networks

    Get PDF
    The design and deployment of urban broadband infrastructures inscribe particular imaginations of Internet access onto city streets. The different manifestations and locations of these networks, their uses, and access points often expose material excesses of urban broadband networks, as well as failures of Internet service providers, urban planners, and public officials to imagine the diverse ways that people incorporate Internet connection into their everyday lives. We approach the study of urban broadband networks through the juxtaposition of invisible networks that are buried under the streets and have always been “turned off” (dark fiber) versus hypervisible that are “turned on” and prominently displayed on city streets (LinkNYC). In our analysis of these two case studies, we critique themes of visibility and invisibility as indexes of power and access. Our findings are meant to provide a critical analysis of urban technology policy as well as theories of infrastructure, visibility, and access
    corecore