Stacks of Kente and cotton cloth sit in piles, waiting to be stamped with Adinkra patterns. Note the “pixelated” patterns in the center stack.

In part 1 I opened with a run down of the different kinds of “digital divides” that dominate the public debate about low income access to technology. Digital divide rhetoric relies on a deficit model of connectivity. Everyone is compared against the richest of the rich western norm, and anything else is a hinderance. If you access Twitter via text message or rely on an internet cafe for regular internet access, your access is not considered different, unique, or efficient. Instead, these connections are marked as deficient and wanting. The influence of capitalist consumption might drive individuals to want nicer devices and faster connections, but who is to say faster, always on connections are the best connections? We should be looking for the benefits of accessing the net in public, or celebrating the creativity necessitated by brevity. In short, what kinds of digital connectivity are western writers totally blind to seeing? The digital divide has more to do with our definitions of the digital, than actual divides in access. What we recognize as digital informs our critiques of technology and extends beyond access concerns and into the realms of aesthetics, literature and society. I think it is safe to say that most readers of this blog think they know better: Fetishizing the real is for suckers. The New Aesthetic, a nascent artistic network, is all about crossing the boarder between the offline and the online. Pixelated paint jobs confuse computer scanners and malfunctioning label makers print code on Levis. The future isn’t rocket-powered, its pixelated. Just as the rocket-fueled future of the 50s was painstakingly crafted by cold warriors, the New Aesthetic of today is the product of a very particular worldview. The New Aesthetic needs to be situated within its global context and reconsidered as the product of just one kind of future. more...

Discussing the relative strengths and weaknesses of education as it occurs on and offline, in and outside of a classroom, is important. Best pedagogical practices have not yet emerged for courses primarily taught online. What opportunities and pitfalls await both on and offline learning environments? Under ideal circumstances, how might we best integrate face-to-face as well as online tools? In non-ideal teaching situations, how can we make the best of the on/offline arrangement handed to us? All of us teaching, and taking, college courses welcome this discussion. What isn’t helpful is condemning a medium of learning, be it face-to-face or via digital technologies, as less real. Some have begun this conversation by disqualifying interaction mediated by digitality (all interaction is, by the way) as less human, less true and less worthy, obscuring the path forward for the vast majority of future students.

This is exactly the problem with the op-ed in yesterday’s New York Times titled, “The Trouble With Online Education.more...

Documentary consciousness entails the ever-present sense of a looming future failure.

In Part I this essay, I considered the fact that we are always connected to digital social technologies, whether we are connecting through them or not. Because many companies collect what I call second-hand data (data about people other than those from whom the data is collected), whether we leave digital traces is not a decision we can make autonomously. The end result is that we cannot escape being connected to digital social technologies anymore than we can escape society itself.

In Part II, I examined two prevailing privacy discourses to show that, although our connections to digital social technology are out of our hands, we still conceptualize privacy as a matter of individual choice and control. Clinging to the myth of individual autonomy, however, leads us to think about privacy in ways that mask both structural inequalities and larger issues of power.

In this third and final installment, I consider one of the many impacts that follow from being inescapably connected in a society that still masks issues of power and inequality through conceptualizations of ‘privacy’ as an individual choice. I argue that the reality of inescapable connection and the impossible demands of prevailing privacy discourses have together resulted in what I term documentary consciousness, or the abstracted and internalized reproduction of others’ documentary vision. Documentary consciousness demands impossible disciplinary projects, and as such brings with it a gnawing disquietude; it is not uniformly distributed, but rests most heavily on those for whom (in the words of Foucault) “visibility is a trap.” I close by calling for new ways of thinking about both privacy and autonomy that more accurately reflect the ways power and identity intersect in augmented societies. more...

This is part of a series of posts highlighting the Theorizing the Web conference, April 14th, 2012 at the University of Maryland (inside the D.C. beltway). It was originally posted on 3.30.12 and was updated to include video on 7.19.12. See the conference website for

Presider: Kari Kraus (@karikraus)

Drawing on a diverse range of approaches–from media archaeology and ethnography to queer theory and critical code studies–the “Politics of Design” panel will collectively consider where and how power pools and collects in the designed, value-laden spaces of the internet. Individual panelists will take up digital networks and anonymity (Moesch); established and proposed internet architectures (Shilton and Neal); slick Web 2.0 and grungy “dirt style” interfaces (Kane); and the failed rhetoric of the digital sublime by the founders of Google and Second Life (Chia).  Not content to dwell on surface design features, each speaker unearths hidden variables–whether technological, social, or historical–that affect the systems, platforms, and communication structures under discussion. In the process, they expose the faultlines in those structures that allow us to envision them otherwise; the politics of design, that is to say, ultimately point–directly or indirectly–to alt-design and re-design.

Please join us on 4/14 for what promises to be a fabulous #TtW12 panel!

[Paper titles and abstracts are after the jump.] more...

In each of the past two Theorizing the Web conferences, I have been present to see an audience member—concerned about the fleeting popularity of online platforms and rapid technological development— question the pervasive use of Facebook as a study site. This is an important question, and one to which panelists (including myself) have not adequately responded.  Absent the pressure of probing eyes and a ticking clock, I work here to craft the kind of response that the question deserves.

more...

The New York Times recently published a piece titled “At Times, Obama and His Cyberself Differ on Tactics” that opens with the passage:

For a moment on Friday, the cyber-Barack Obama was perfectly at odds with the flesh-and-blood version… Speaking to 1,400 supporters at a high school… President Obama voiced his familiar lament that “there is so much negativity and so much cynicism” in politics that he could understand if voters tuned out the election. Minutes earlier on Twitter, he had written, “Why Mitt Romney’s end date at his buyout firm matters,” linking to a blog post about the tempest over his Republican challenger’s departure from Bain Capital.

The article doesn’t really offer any deeper analysis of the topic raised in its headline, but the notion of this sort of technologically-mediated, or even, post-human, presidency is so provocative that it’s worth additional reflection. I can’t begin such a reflection, however, without first critiquing some of the vocabulary used in the article. The article contrasts “cyber-Barack Obama” (or Barack Obama’s “cyberself”) with “the flesh-and-blood version.” This problematically implies that there are two Barack Obamas: the real Obama and the Obama out there in cyberspace (cue creepy space music). Of course, once we even state such a claim, it becomes immediately apparent that it has zero face validity. Arguing that the Barack Obama who signs the messages he personally posts to Twitter with the initials “bo” is different than the Barack Obama out there giving the speeches makes about as much sense as arguing that when I call my mom on telephone, I’m talking to a different person than when I drive over for a visit. more...

Just some of my favorite quotes from what I read this past week on tech&society:

there’s blood dripped from fast-clouding retinas onto all of our computer chips

Why is it that, unlike buildings, old websites never have any prestige?

What is lost when we’re building a social Web that only caters to a select few options in the vast, vast catalog of human emotions?

society’s farcical inability to accept the fluidity of a new paradigm. A paradigm represented by technologies it is constantly told are disruptive and fractious

Do templated spaces of identity construction necessarily do violence to experience?

using social media the same way a rat in the maze “uses” the scientists to get cheese

 There is rarely any point speaking of [the Web] as if it was separate from the rest of the world – which is a cyberspace too

will [drones] deliver through technology the “post-gender world” Donna Haraway describes in her “Cyborg Manifesto”?

How does the documentation of my life change my experience of my present and my imagination of my future?

Our idea of “nature” owes something to the advance of technology

now the novelty isn’t being online, it’s being offline

Friendship’s path,” a 1937 AT&T ad declared, “often follows the trail of the telephone wire.

what’s the point of doing something awesome if you can’t brag about it online?

Kids don’t as deeply distinguish between online & offline bullying

anything that you see in the real world needs to be in our database

A little over a year ago, I found myself conducting a focus group session with a handful of middle school students. As part of a research project looking to better understand how Internet safety programs conceptualize youth and Internet technologies, I became increasingly surprised – and at least somewhat frustrated – that cyberbullying rarely came during dozens of conversations with students, parents and school administrators. This particular focus group session was no different. Nearing the end of the session, I finally asked the students if they used the word cyberbullying when they talked to their friends. Their response, looking at me as if I was the most out-of-touch idiot they had ever spoken with, was a unanimous “Nooo!” I then asked them: If you do not use the word, who does? Various students replied with disgusted exclamations of “Parents!” or “Teachers!” and in what would be one of the defining moments of the project, a student said “It’s an old lady word” quietly under her breath. Looking beyond some problematic ageism and sexism that may be implied in her response, there is an element of truth behind what she was saying: children are using a very different interpretive frame than parents when it comes to so-called “cyber-bullying.” more...

An Ashanti enstooling ceremony, recorded (and presumably shared) through cell phone cameras (marked).

The “digital divide” is a surprisingly durable concept. It has evolved through the years to describe a myriad of economic, social, and technical disparities at various scales across different socioeconomic demographics. Originally it described how people of lower socioeconomic status were unable to access digital networks as readily or easily as more privileged groups. This may have been true a decade ago, but that gap has gotten much smaller. Now authors are cooking up a “new digital divide” based on usage patterns. Forming and maintaining social networks and informal ties, an essential practices for those of limited means, is described as nothing more than shallow entertainment and a waste of time. The third kind of digital divide operates at a global scale; industrialized or “developed” nations have all the cool gadgets and the global south is devoid of all digital infrastructures (both social and technological). The artifacts of digital technology are not only absent, (so the myth goes) but the expertise necessary for fully utilizing these technologies is also nonexistent. Attempts at solving all three kinds of digital divides (especially the third one) usually take a deficit model approach.The deficit model assumes that there are “haves” and “have nots” of technology and expertise. The solution lies in directing more resources to the have nots, thereby remediating the digital disparity. While this is partially grounded in fact, and most attempts are very well-intended, the deficit model is largely wrong. Mobile phones (which are becoming more and more like mobile computers) have put the internet in the hands of millions of people who do not have access to a “full sized” computer. More importantly, computer science, new media literacy, and even the new aesthetic can be found throughout the world in contexts and arrangements that transcend or predate their western counterparts. Ghana is an excellent case study for challenging the common assumptions of technology’s relationship to culture (part 1) and problematizing the historical origins of computer science and the digital aesthetic (part 2). more...

Art teacher Gregory Euclide did something interesting to the nature of his art when he decided to release prints of it.

Using sumi ink, Euclide had made a practice of creating fantastically complex images on his classroom’s whiteboard during lunch breaks in order, he says, to show students what someone skilled could create in a very short amount of time. But the duration of the process wasn’t the only point at which time came into play in these works: Euclide would then simply erase the images, often shocking his students by doing so. It was this shock — which was frequently mixed with dismay — that prompted him to release more permanent forms of some of his images (one of which has already graced the cover of Bon Iver’s self-titled album).

more...