Author Archives: jennydavis

#ShirtStorm: On Forgiving Taylor but not The Internet

Via ESA http://www.esa.int/Our_Activities/Space_Science/Rosetta/The_Rosetta_lande

 

Earlier this month, Science had a big victory. The Rosetta Project landed their spacecraft, Philae, on a comet.  This was a billion Euro and entire careers in the making. This was a huge step in space exploration. The accomplishment is unprecedented and data gleaned from this project are entirely unique. Good job, Science.

Meanwhile down on earth, a #ShirtStorm broke loose. Rosetta Scientist Dr. Matt Taylor gave a television interview about the project. His choice of attire—a naked-lady shirt—was ill conceived. Moreover, he described the project as the “sexiest mission,” feminizing and then validating the probe as “sexy” but not “easy.”

Thank goodness women don’t have a science problem!! Oh, wait…

Quickly, Atlantic writer Rose Eveleth posted this tweet: (more…)

Identity Prosumption GeekOut

ProcessProsumption is something of a buzzword here at Cyborgology. It refers to the blurring of production and consumption, such that consumers are entwined in the production process. Identity prosumption is a spin-off of this concept, and refers to the ways prosumptive activities act back upon the prosuming self. Identity prosumption is a neat and simple analytic tool, particularly useful in explaining the relationship between social media users and the content they create and share.

If you’ll stick with me through some geekery, I would like to think through some of the nuances of this humble bit of theory.   (more…)

Commodifying Voice: The Net Neutrality Debate

InternetSlowdown_Day

Net neutrality is back in the news. It’s been a minute, so in case you forgot, some broadband providers want to speed up high traffic services (e.g. Netflix), creating a tiered model of delivery speed. In turn, proponents of net neutrality have lobbied the FCC to classify broadband companies as “common carriers,” requiring that all Internet traffic receive equal treatment (i.e., equal speed of delivery).

In light of overwhelming public support for net neutrality, conflicting with strong lobbies from broadband companies, the FCC is still working towards a solution. Some of this work was leaked last week, revealing a sort of hybrid plan, in which broadband companies could sometimes establish “fast lanes” for service providers, but only when they deem it is “just and reasonable” (whatever “just and reasonable” means).

Whitney Erin Boesel does a fantastic job laying out the policy and delineating a strong argument in support of Open Internet. I want to take a bit of a simpler approach, and address one issue which underlies the debate in its entirety: the relationship between speech and money. (more…)

BuzzFeed’s Halloween #RaceFail

“It’s okay, see? There’s a black guy in the picture with me!!”

After my annual in-class Race and Halloween conversation, one of my students sent me  this BuzzFeed link. Check it out, and then see below for commentary.

(more…)

Technologies of Violence

Swedish Non-Violence Sculpture by Carl Fredrik Reuterswärd

Swedish Non-Violence Sculpture by Carl Fredrik Reuterswärd

As a social scientist and theorist of technology, I follow some general rules in my thoughts and writings. One such rule is that I make no claims about the nature of people or the nature of things. Below, I do both. I then put these rule-breaking claims to use in beginning to make sense of the Washington school shooting, in which a reportedly “popular” and “normal” 15 year old boy shot 5 classmates before killing himself.

I begin with two claims about human nature: (more…)

Hey Hun, can you stick those eggs in the freezer for a few?

eggs

 

Facebook and Apple are offering  women employees the opportunity to “lean in,” which is great…right?

Humans both make and use technologies. Because of this, technologies themselves are imbued with politics, and the way people employ technologies have political implications. Untangling what those politics are, is sometimes a tricky process, as technological potentialities in both design and use are multiple and sometimes contradictory. Such is the case with egg-freezing technologies and the offer from Apple and Facebook to cover this procedure for women employees.

Since their announcement—a clear response to criticisms over Silicon Valley’s disproportionately dude populated work force—commentators have tried to discern the political implications. While the move certainly offers an opportunity for women who want to delay childbirth, it also presents a pressure to do so. (more…)

An Ethic of Prosumptive Sharing

Share

The contemporary information economy is made up of prosumers—those who simultaneously produce and consume. This is exciting, as we lay-folk become micro-journalists, creating content and spreading what others create. However, such a system poses serious questions about the ethics of sharing practices.

In what follows, I offer a skeleton guideline for the ethics of sharing. It is purposely broad so as to remain flexible. I offer three key guiding principles: Who always matters; Intention always matters; and The law is a really good suggestion. (more…)

Accessibility in Higher Education: The TEACH Act

AccessibleIconVector-1

Pic via: The Accessible Icon Project

Let me start by saying, accessibility is a human rights issue, not an afterthought. Frankly, it’s an insult to people with disabilities that access is even a subject of debate. And yet…

The Technology, Equality, and Accessibility in College and Higher Education Act (i.e., the TEACH Act) is currently under debate in congress. The legislation requires that technologies used in college classrooms be accessible to all students, including students with disabilities. It is entirely possible that you have not heard of the TEACH Act, but for those who it most affects—students with bodies that deviate from the norm—the stakes are quite high. The bill has some strong support, but also strong opposition, from surprising sources.   (more…)

Why I Black Out Twitter Handles on Blog Posts

u22

Blacked out Twitter image from my post last week

Netiquette. I seriously hate that word. BUT an issue of internet-based-etiquette (blogger etiquette, specifically) recently came to my attention, and I’m interested in others’ practices and thoughts.

As a blogger, I often analyze content from Facebook and Twitter. In doing so, I usually post images of actual tweets, comments, and status updates. These are forms of data, and are useful in delineating the public tenor with regard to a particular issue, the arguments on opposing sides of a debate, and the ‘voice’ with which people articulate their relevant thoughts and sentiments.

As a common practice, I black out all identifying information when reposting this content. Last week, I posted some tweets with the names and images redacted. A reader commented on my post to ask why I did so, given that the tweets were public. We had a quick discussion, but, as I mentioned in that discussion, this issue deserves independent treatment. (more…)

When a Gift is Really a Data Breach

Can a gift be a data breach? Lots of Apple product users think so, as evidenced by the strong reaction against the company for their unsolicited syncing of U2’s latest album songs of innocence to 500 million iCloud accounts. Although part of the negative reaction stems from differences of musical taste, what Apple shared with customers seems less important than the fact that they put content on user accounts at all.

u2-apple-eventWith a proverbial expectant smile, Apple gifted the album’s 11 songs to unsuspecting users. A promotional move, this was timed with the launch of the iPhone6 and Apple iWatch. And much like teenagers who find that their parents spent the day reorganizing their bedrooms, some customers found the move invasive rather than generous.

Sarah Wanenchack has done some great work on this blog with regards to device ownership—or more precisely, our increasing lack of ownership over the devices that we buy. That Apple can, without user permission, add content to our devices, highlights this lack of ownership. Music is personal. Devices are personal. And they should be. We bought them with our own money. And yet, these devices remain accessible to the company from which they came; they remain alterable; they remain—despite a monetary transaction that generally implies buyer ownership—nonetheless shared. And this, for some people, is offensive.   (more…)