As Jenny’s post last week discussed, Facebook lets us identify our gender in very specific ways. But this blog post suggests that Facebook may also be a medium for performing gender. The post’s title suggests that “suspension” from Facebook is a “status symbol”–but I wonder if it’s not a gendered, nationalist/racialized status symbol, a symbol of a specific type of Indian masculinity?
Sometimes it feels that to be a good surveillance theorist you are also required to be a good storyteller. Understanding surveillance seems to uniquely rely on metaphor and fiction, like we need to first see another possible world to best grasp how watching is happening here. Perhaps the appeal to metaphor is evidence of how quickly watching and being watched is changing – as a feature of modernity itself in general and our current technological moment in particular. The history of surveillance is one of radical change, and, as ever, it is fluctuating and rearranging itself with the new, digital, technologies of information production and consumption. Here, I’d like to offer a brief comment not so much on these new forms of self, interpersonal, cultural, corporate, and governmental surveillance as much as on the metaphors we use to understand them.
#review features links to, summaries of, and discussions around academic journal articles and books.
Today, guest contributor Rob Horning reviews: Life on automatic: Facebook’s archival subject by Liam Mitchell. First Monday, Volume 19, Number 2 – 3 February 2014 http://firstmonday.org/ojs/index.php/fm/article/view/4825/3823 doi: http://dx.doi.org/10.5210/fm.v19i2.4825
If, like me, you are skeptical of research on social media and subjectivity that takes the form of polling some users about their feelings, as if self-reporting didn’t raise any epistemological issues, this paper, steeped in Baudrillard, Derrida, and Heidegger, will come as a welcome change. It’s far closer to taking the opposite position, that whatever people say about their feelings should probably be discounted out of hand, given that what is more significant is the forces that condition the consciousness of such feelings. That approach is sometimes dismissed as failing to take into account individual agency; it’s implicitly treated as an affront to human dignity to presume that people’s use of technology might not be governed by full autonomy and voluntarism, that it’s tinfoil-hat silly to believe that something as consumer-friendly and popular as Facebook could be coercive, that the company could be working behind users’ backs to warp their experience of the world for the sake of Facebook’s bottom line.
Mitchell is not so overtly conspiratorial in this paper; (more…)
Concepts like “the male gaze” and “controlling images” are Gender Studies 101 material: they’re the basic terms in which many feminists understand the media’s oppression of white women (in the case of the male gaze) and black women (in the case of controlling images). The gaze and controlling images are how white supremacist patriarchy subject women to its control.
But I think contemporary social media and big-data political economies are using different devices to control women, especially black women. Social media and big data facilitate a specific form of sexist racism, one that controls women through racialized discourses of toxicity and unhealthy behavior patterns. Instead of turning women into objects and/or erasing their agency, social media and big data let non-white women do and say whatever they want, because their so-called “aggressive bullying” produces the damage against which white women demonstrate their resilience. A similar claim has been (in)famously leveled against “feminism,” especially “intersectional feminism”: it vampirically drains the lifeblood of the progressive, radical left.
What’s specific to the construction of WOC, particularly black women, as “toxic”? Or feminism itself (often represented by ‘intersectional’/WOC feminism) as ‘vampiric’? What about social media, and perhaps even to Twitter, makes the unruliness/threat posed by WOC to white women/white feminist culture industry function in a very particular way, i.e., as toxicity and vampirism? How is the construction of women on social media as toxic/vampiric related to economies of viral upworthiness?
Playing with my own gender identity
The Internet is officially abuzz about Facebook Inc.’s newly expanded gender categories. Here’s the story in brief: Facebook now allows users to select from over 50 gender identifications, such as genderqueer, cisgender, agender etc. (here is a glossary of the options). The move has drawn the expected responses from all of the usual suspects. The deep conservatives are annoyed, the liberals are elated, and the critical progressives appreciate the gesture, realize its significance, but remain dissatisfied with any form of identification confined to a box. I’m of the critical progressive camp, and happy to defer you readers to all of the smart things written by other people.
Meanwhile, I want to focus on another piece of the gender-identity expansion, a piece of great significance which has nonetheless snuck by in light of the jubilation, fighting, and intellectualism surrounding our new opportunity to bend the gender binary. Namely, I want to talk about privacy, and Facebook’s shifting discourse about identity and power. (more…)
In preparing to write this post, I found myself going back over Whitney Erin Boesel’s post a couple of months back on death and digital/social media mediation, and I found myself running into a lot of the same issues she discusses. She suffered from massive uncertainty regarding how to talk about what she had experienced, or whether to talk about it at all. I’m going through the same. I’m not sure I should even be writing this, or what it will mean when I have. At the same time, I’m not sure how not to write about it, and that in itself is part of what I want to talk about.
Note: this is not going to be particularly organized, or particularly intellectual. It’s in part personal Livejournal-esque navel-gazing, part working through some disparate observations regarding how we deal with traumatic life events on social media, part general flailing around. Please bear with me. Or, you know, don’t.
As a professional sociologist, I maintain membership in several listservs and social networking site groups centered around my areas of study. Every now and then, someone will post a request for a particular academic article to which they do not have access at their home university. Quickly, another member of the group provides the article, and we all go about our business.
Not having access to one article, for a connected professional, is no big deal. But imagine if that same professional never had access to academic articles unless they were willing to pay—exorbitantly—to get beyond publishers’ paywalls. Were that the case, it would be incredibly difficult, if not impossible, for that professional to conduct research. (more…)
When you search for Foucault on AcademicTorrents
The Social Sciences –despite the widely held notion that we’re all a bunch of Marxists that will turn your children into pinkos– are incredibly conservative when it comes to their own affairs. Our conferences are pretty traditional, we took a really long time getting around to noticing that the Internet was A Thing, and if you take a Social Theory 101 course you’re more likely to read Durkheim than bell hooks. You can blame it on tenure, fear of action, or simple lack of imagination, but the analysis remains the same: rarely do our articles’ prescriptive conclusions make it into our day-to-day practice. When I read that a couple of students from the University of Massachusetts had launched a torrent site to share data I knew it wouldn’t be social scientists. Not necessarily because we don’t have the expertise, (more on that later) but because we so rarely seem to have the will to act. Its always the engineers and the natural scientists that come up with faster, cheaper, and more egalitarian methods of sharing data and promoting their work. What gives? (more…)
Like many Americans, I spent Sunday evening watching the Super Bowl. This entailed tasty snacks, a comfy couch, and lots of head shaking because, well, the Denver Broncos. It also involved Facebook and Twitter. The day of, day before, and day after were full of commentary, predictions, snarkiness, and declarations of various sorts. Indeed, Sunday’s Super Bowl, like all media events, incorporated multiple media. One item, within one piece of this media ecology, keenly sparked my interest: The Twitter feed of @YesYoureRacist. (more…)
If you follow me on Twitter, you almost certainly know of my propensity to livetweet the talks I attend (which is either the best or the worst thing about following me on Twitter, depending on your interests and whether or not you know how to use hashtag muting). In the spirit of Cyborgology‘s new #review feature, which looks at conversations surrounding academic articles, I thought I’d try summarizing my tweets from the talk I attended last night: “Defending an Unowned Internet” at the Berkman Center for Internet and Society at Harvard University.
“Defending an Unowned Internet” was a spirited conversation between Yochai Benkler, Ebele Okobi, Bruce Schneier, and Benjamin Wittes, plus moderator Johnathan Zittrain (you can find links to bios for all five participants here). Zittrain opened the panel by suggesting that what, exactly, an “unowned Internet” is was up for debate, and also used Wittes’s blog Lawfare in a cautionary tale: Someone(s) out there really, really doesn’t like Lawfare, which has experienced several outages in recent months as a result of “cyberattacks.” Lawfare‘s hosting service has done everything it can to keep Lawfare up and running, but beyond determining that the attacks are coming from IP addresses in the Netherlands, there isn’t much to be done.
Zittrain, therefore, posed the following question: What if this type of attack on speech meant that, in the future, everyone would move their web content to one of four major web hosting services—say, behemoths like Amazon Web Services—which are harder to overwhelm with DoS or DDoS attacks? (more…)