commentary

The way in which information is shared in the digital age is headlining the news around many different issues. WikiLeaks is distributing thousands of classified State Department documents; the FFC Chairman is attempting to preserve net neutrality (i.e., the dictum that Internet service providers cannot limit the rate that users access different kinds of legal content); Facebook users are sharing more and more private details of their lives online.  Arguably, the same cultural debate is playing out in all of these cases: Is society best served when all information is free, or are we better off if some information remains private?

Silicon Valley has become a magnet for evangelists of the “information wants to be free” movement, what has come to be known as “cyberlibertarianism.”  Supporters often argue that the free flow of information is fundamental to democracy.  This is, in fact, the justification behind WikiLeaks’ distribution of confidential, proprietary, or otherwise secret information.

However, it is important to note that many of the most high-profile supporters of a transparent society, where information is free, are Internet companies, like Facebook and Google, that seek profit by collecting and sharing information about their users. Alternatively, companies who would benefit from restricting the flow of information (ISPs like, Comcast and Verizon) tend to oppose the principle that information should be free.

Cyberlibertarianism has range of other critics.  Clearly, the government has argued that state interests are threatened by the leaking of information. On a more micro level, many sociologists (including the authors of this post) are concerned that the pressure to constantly share more, and more personal information can be detrimental to individual users of Google, Facebook, and other social-networking sites. more...

In the social sciences, we often hear about, talk about, and preach about the relationship between theory and methods. Here, I present a poignant example their interconnectedness.

In a recent post, I argued that the accomplishment of authenticity in a cyborg era is particularly difficult. Drawing on Goffman, Turkle, and others, I argued that we live in a time of constant documentation, exposing the identity work that is supposed to remain hidden in the so-called “back stage.” I purported that our online and offline selves are not only mutually influential, but that we also engage in preemptive behavior in order to accurately present our ideal selves through multiple mediums.

Overall my theoretical point is this: As social actors we expect authenticity in others, and in ourselves. In a time of constant documentation, our online personas become our reflections, and they must not only be ideal, but also truthful. As such, we do not document falsehoods, but preemptively create documentable situations in an effort to present a self that is simultaneously ideal and authentic.

Here is the methodological conundrum: If the constructed nature of selves and identities must remain hidden not only from others, but also from ourselves, then how can we get people to talk about the labor involved in the identity construction process? In other words, how do we support the theoretical assertion? more...

Advertising on social media is more than those segregated paid-for-spaces that display ads paid for by companies (e.g., on the far-right of your Facebook screen). This sort of paid-advertising has been shown to be so highly ineffective that some have predicted it will be the downfall of the social web. However, these predictions do not understand that the fundamental point of the social web (2.0) is that users are prosumers; they are simultaneously both consumers and producers of content. And advertising is no different. Advertisements that we simply consume worked in a consumer medium, like television. However, social media is a prosumer medium, and today we are the ones doing the advertising work of integrating corporate logos and branding into our profiles and news feeds.

Facebook’s ubiquitous “like” button reflects our modern task of self-presentation (and distinction) based on our taste in just about anything and everything, documented and compared to the various “likes” of any other visitor to your profile (and remember: what someone “likes” may not be what they actually like but what they want others to see that they like). In modern consumer culture, this collection of displayed “likes” will include corporate brands that one identifies with. This might mean clicking “like” on the Starbucks or Victoria’s Secret pages, which then becomes a part of your profile. more...

Facebook and other social-networking sites subsist on information, though not just any information. These sites have an insatiable appetite for the intimate details of their users’ lives. In fact, your personal information is a sine qua non for social-networking sites on two levels: 1.) People, primarily, use the Web to learn about the people and things they care about (like you). 2.) The same information that draws people to your profile, is useful in targeting advertisements to both you and your visitors.

Because these sites feed on personal information, they develop strategies to elicit such information from users.  For example, you may have to register and build a profile before accessing content.  The result as a sort of pay-to-play system where information is the common currency.  And, in order for this information economy to grow and intensify, it must continuously solicit new information and make more of the existing content public. more...

In the future, we will all probably have some Facebook skeletons. They might be regrettable pictures in various states of inebriation and/or undress, unfortunate status updates, etc. I’ve argued that the media has overblown these risks because, as the digital dirt on our collective hands becomes more commonplace, the stigma it carries will erode. However, the 2010 midterm elections in the United States suggest a point that I previously neglected: the stigmatization of digital dirt may be eroding, but eroding for whom?

It seems clear that the acceptance of a little digital dirt is occurring much faster for men than for women. And, what the 2010 elections made clear is that there is a double standard for women to keep a perfect online presence, while men are more easily forgiven. more...

Body modification, a growing practice and subculture that now spans the world, has made extensive gains in merging the body with technology. Stretched earlobes, facial tattooing, and dermal implants have become more conspicuous as of late in many urban locales, and it is no longer surprising to find people going to greater lengths to modify their bodies in sometimes unique and shocking ways. For more examples, spend some time on one of the most popular online body modification community websites, Body Modification Ezine.com. The site documents the diverse array of practices that members engage in to explore, test, stretch, and construct their bodies in new ways. (Warning: The content is not for the squeamish).

Particularly, I want to focus in on a few keen examples of the merging of body and technology, or as I call it, the new cyborg body. more...

photo by John Hill

For all those folks whose only impediment to climbing Mount Everest has been their inability to Tweet updates while on the journey: your excuses are now dried up. Representatives from Ncell, Nepal’s main mobile network, announced recently that they have installed cellular service that reaches all the way to the top of Mount Everest, the world’s highest point. According to the Reuters report:

“The installation could help the tens of thousands of mountain climbers and trekkers who visit the Mount Everest region in the Solukhumbu district every year. They have to depend on expensive satellite phones to remain in touch with their families as the remote region lacks proper communication facilities.”

This development has interesting implications for the Cyborgology blog’s ongoing discussion of augmented reality and the limits of material experience. When we think about the material world being augmented by virtual content, we tend to think about it in an urban context, usually in tandem with marketing or networking efforts. But how do we begin to think about augmenting the reality that exists in the remotest and most dangerous of regions, like the summit of Mount Everest?

The statistics aren’t entirely clear, but best estimates say that the number of climbers who have successfully reached the summit of Everest only goes into the low two thousands, and at least two hundred of those who have attempted the climb have perished. Most of those who the mountain has claimed remain where they died, frozen into the rock for all time. Some of those bodies are plainly visible from established routes up the mountainside, mummified by the dry air and harsh wind at that altitude. That’s some pretty real reality right there. So how augmented could it get? more...

While we do not necessarily use the term “cyborg” in the way Donna Haraway used it in her famous 1985 “Cyborg Manifesto,” Haraway’s work is of great importance to many of the topics covered on the Cyborgology blog.

As I see it, the primary takeaway from Haraway is the existence of a recursive relationship between technology and social organization.  More importantly, as each iteration of this relationship unfolds, there opens a new field across which power relations operate.  Haraway is far more optimistic than Foucault or Baudrillard, however, who opine about our inability to escape the techno-social system.  For Haraway, we become empowered by figuring out, and, subsequently learning to manipulate, the code that organizes society in any given technological milieu. more...

Last week, Kokoro Co. Ltd. released video of the latest iteration of its work in robotics, taking another step in the process of bridging the “uncanny valley”—the idea that the closer that robots and other non-human objects approach to looking authentically human, the stronger a reaction of revulsion, fear, or mistrust they inspire in their human observers. Kokoro is well-known in the robotics field for creating lifelike humanoid robots capable of recognizing and mimicking human facial expressions and body language. You may recognize the Kokoro name in reference to the I-Fairy, a humanoid robot that presided over a wedding in Japan last summer, and the Geminoid project, where customers can have themselves reproduced in silicone and wire.

The Actroid-F (the ‘F’ stands for female) robot was built and programmed to monitor patients in a hospital setting. Currently, programmers are teaching the robot to mimic patients’ facial expressions, and to recognize the differences in their smiles and grimaces. The result is a very lifelike robo-nurse that can be used to monitor the feelings and needs of hospitalized patients. On the surface, this seems like a good idea; we already use machines to monitor patient vital signs and administer life-saving medicines, so why not use machines to monitor patient morale? more...

The self is a tricky thing to accomplish. Who we are is signified by a seemingly infinite number of factors: our physical appearance, the groups we belong to, the events we attend, the things that we say, how we say the things that we say, the friends that we keep, the work that we do, the way that we spend our leisure time, the amount of leisure time we allow ourselves etc. Each of these factors reflects the decisions that social actors have to make about who they are, and about the lines of action they will take in order to be defined in a particular way.  In short, social actors are required to engage in significant amounts of “identity work”.

This work, however, must remain hidden. The “catch” in constructing a self that will be accepted by others, is that the self must come across as authentic. The self must appear to be spontaneous, uncalculated, and effortless. Said differently, identity work must remain invisible, it must be strictly relegated to the backstage (Goffman 1959).

more...