The Organizations, Occupations, and Work blog (associated with the American Sociological Association) organized an interesting panel discussion between Chris Prener, Christopher Land, Steffen Böehm and myself. I’ll summarize/critique the positions here and provide links for further reading.

Chris Prener initiated the conversation by asking “Is Facebook “Using” Its Members?” Prener claims that, though the company gives users “access to networks of friends and other individuals as well as social organizations and associations,” Facebook—with it’s advertising revenue “somewhere in the neighborhood of $3.2 billion”—” benefits far more in this somewhat symbiotic relationship.” He concludes that Facebook, and social media more broadly, represent “a [new] space where even unpaid, voluntary leisure activities can be exploited for the commercial gain of the entities within which those activities occur.” more...

Is this an Oxymoron?

Most of our interactions with technology are rather mundane. We flip a light switch, buckle our seat belts, or place a phone call. We have a tacit knowledge of how these devices work. In other words, we have relatively standard, institutionalized, ways of interacting with familiar technologies. For example: if I were to drive someone else’s car, even if it is an unfamiliar model, I do not immediately consult the user manual. I look around for the familiar controls, maybe flick the blinkers on while the car is still in the drive way, and off I go. Removal of these technologies (or even significant alterations) can cause confusion. This is immediately evident if you are trying to meet a friend who does not own a cell phone. Typical conventions for finding the person in a crowded public space (“Yeah, I’m here. Near the stage? Yeah I see you waving.”) are not available to you. In years prior to widespread cell phone adoption, you might have made more detailed plans before heading out (“We’ll meet by the stage at 11PM.”) but now we work out the details on the fly. Operating cars and using cell phones are just a few mundane examples of how technologies shape social behavior beyond the actions needed to operate and maintain them. The widespread adoption of technologies, and the decisions by individual groups to utilize technologies can have a profound impact on the social order of communities. This second part of the Tactical Survey will help academics, activists, and activist academics assess the roll of information technology in a movement and make better decisions on when and how to use tools like social media, live video, and other forms of computer-mediated communication. more...

As Langdon Winner aptly points out, artifacts have politics. They have politics built into them, are used with political intention, and interpreted through political lenses. Often times, however, the politics of an artifact are hidden from view, disguised, or misleading.  As per thecloverbeautyclinic.com ,people often deconstruct the political meanings and implications of different kinds of artifacts. Today, I want to deconstruct two artifacts that operate with the potential for, and under the guise of, technologically facilitated feminist liberation. Specifically, I look at the Fuck Skinny Bitches internet memes, and the now vastly present and prevalent female-coded masturbation devices (i.e. vibrators and dildos)[i]. I argue that these artifacts, rather than dissolving hierarchical gendered boundaries of bodily control and sexual pleasure, surreptitiously trace over these boundaries with invisible ink, only to be revealed under the light of critical sociological analysis.

Recently, we have seen in influx of internet memes that attempt to provide a feminist rejection of hegemonic standards of the beautiful body. These memes contrast images of curvaceous women to very slender women and include text that preferences the larger body/bodies. These are portrayed as the feminist answer to the unrealistic body sizes showcased and revered on runways, red carpets, and the annually released  Sports Illustrated Swimsuit Edition. I call these Fuck Skinny Bitches memes. A couple of examples are pictured below. more...

Roger Boisjoly has died.

The name may not ring a bell, but Boisjoly’s place in history certainly will: He was the engineer who tried in vain to persuade NASA that it was unsafe to launch the space shuttle Challenger on January 28, 1986.

The Challenger explosion remains today one of our most evocative images of technology gone wrong. This is due in part to the personal nature of the tragedy – the schoolteacher onboard, the family members watching – and in part to the subsequent revelations that NASA proceeded with the launch despite Boisjoly’s warnings.

My intention here is not to rehash the chain of events that led to the Challenger’s demise, but to show how some of those events demonstrate patterns of error that are commonplace – indeed, almost inevitable – in the operation of complex technological systems. more...

Below is Part 3 of a three part essay (Part 1 is available here; Part 2 is available here) I will be presenting at the 2012 Southwest Texas Popular Culture Association meetings in Albuquerque, New Mexico on February 9th. I will be presenting alongside several other scholars for a series of panels titled “The Apocalypse in Popular Culture.” A (much) earlier version of this paper can be found on the Sociological Images sister blog. Part 3 discusses the “Zombie Renaissance” after 9/11 and concludes briefly on the importance of the zombie as a cultural artefact.
Jim being pursued by a feral "rage"-infected zombie in Boyle's now classic film 28 Days Later (2002).
Scholars have called the post-9/11 era the “Zombie Renaissance” due to the torrent of zombie films produced at this time and the paradigmatic changes introduced to the zombie as movie monster (Bishop 2010). The first blockbuster film of this era, Danny Boyle’s 28 Days Later (2002) is often credited to raising the stakes in zombie films. This film became a powerful drama oriented around the zombie apocalypse, something that has since been mimicked in recent films and especially in AMC’s recent television series The Walking Dead. more...

This piece is posted in cooperation with the Organization, Occupations, and Work Blog.

Facebook’s IPO announcement has stirred much debate over the question of whether Facebook is exploiting/using/taking advantage of its users. The main problem with the recent discussion of this subject is that no one really seems to have taken the time to actually define what exploitation is. Let me start by reviewing this concept before proceeding to examine its relevance to Facebook.

Defining exploitation. The concept of exploitation came to prominence about a century and a half ago through the writings of Karl Marx, and he gave it a specific, objectively calculable definition—though, I’ll spare you the mathematical expressions. Marx starts from the assumption that value is created though labor (most people today acknowledge that value is contingent on other factors as well, but we need merely to accept that labor is one source of value for Marx’s argument to work). According to Marx, humans have an important natural relationship to the fruits of our labor, and our work is a definitive part of who we are. Modern capitalist society is unique from other periods in history because workers sell their labor time in exchange for wages (as opposed to, say, creating objects and bartering them for other objects). Capitalists accumulate money by skimming off some of the value created by worker’s labor and, so that the wages a worker receives is only a fraction of the total value he or she has created. The portion of the value created by a worker that is not returned back to that worker (after operating costs are covered) is called the rate of exploitation. more...

What is an identity worth? According to PhoneDog, a ‘personality-driven’ tech-review site, Noah Kravitz’s identity is valued at $42,500 per month. A former employee of PhoneDog, Kravitz successfully acquired a large following on the microblogging site Twitter—17,000 at the time of his leaving. In an attention economy, each follower becomes a valuable and tangible asset. The legal dispute between Kravitz and PhoneDog is over ownership of these 17,000 assets.

When Kravitz left the company, he changed his Twitter handle from @PhoneDog_noah to @noahkravitz and took his growing list of followers with him (I became his 24,390th follower/asset today). Complicating the issue further, he now writes  for TechnoBuffalo, a competing tech news site which presumably benefits from Kravitz’s vast following. Last week, a federal judge granted permission for the case to move forward. The existence of such a case, as well as its outcome (which remains yet unseen) both demonstrates and further constructs the shifting relationship between identity, labor, private rights, and worker obligations.

PhoneDog argues that Kravitz’s extensive network was built on the company’s foundation—and on the company’s dime. The notoriety of the site and the legitimacy of the name (i.e. the attachment of PhoneDog to his Twitter handle) facilitated the growth of Noah’s online persona. Moreover, they invested in a sizeable PR campaign to grow PhoneDog’s social media presence, and promoted Noah as the representative. Not only did this help raise Noah to micro-celebrity status, but made him an influencer—or someone who has enough influence to sell ad space. In short, PhoneDog argues that Kravitz gained his followers under the PhoneDog name and under the PhoneDog payroll, making these followers the property of the company. They estimate that each of his followers is worth $2.50 per month, and they seek reparations. In a message to readers dated January 3rd 2012, PhoneDog describes Noah’s rise to fame as follows: more...

Not long after the release of Google’s widely discussed and hotly contested privacy policy, which shares user data across its websites, the company is now offering to compensate customers for the data that they provide. Closely resembling the television tracking techniques used by  Nielsen, Google offers users who participate in the screenwise program up to $25 in Amazon gift cards for allowing Google to monitor their online activities. Users can even opt to be more extensively surveilled and earn up to $100.  While some (in particular, those in the comments section of the article linked above) view this as a cheap payoff for strong privacy violations, others are happy to receive monetary compensation for engaging in everyday leisure activities. This latter group is evidenced by a temporary hold on signups for the new program due to overwhelming interest.

Debates will likely ensue over the cost of privacy, the blurry line between labor and leisure, and the degree to which surveillance can—or should—be resisted.

[Editor’s comment: while this is only a small test, might we envision a model where users are paid for their data? Would it work? What are the implications? ~nathan]

Academics usually do not talk about “tactics.” There are theories, methods, critiques, but we -as professionals-rarely feel comfortable advocating for something as unstable or open to interpretation as a tactic. In the latest edition of the Science, Technology, and Human Values (The flagship journal for Society for Social Studies of Science) three authors threw caution to the wind and published the paper “Postcolonial Computing: A Tactical Survey” [over-priced subscription required]. While the content of the paper is excellent, what excited me the most was their decision to describe their new “bag of tools” as a set of tactics. Kavita Philip, Lilly Irani, and Paul Dourish take a moment in their conclusion to reflect on their decision:

We call our results tactics, rather than methodologies, strategies, or universal guarantors of truth. Tactics lead not to the true or final design solution but to the contingent and collaborative construction of other narratives. These other narratives remain partial and approximate, but they are irrevocably opened up to problematization.

I will employ the language and approach of the “tactical survey” to offer a new set of conceptual tools for understanding augmented protest and revolution. It is my aim that they prove useful for activists as well as academics and journalists following Occupy Wall Street and similar movements. This first part focuses on the intersections of transparency, social media, privilege, and public depictions of protest. Part 2 will cover the utilization of corporate technological systems (e.g. Apple productsTwitter) and building alternatives to those systems (e.g. Vibe, Diaspora). These tactics are forged from observations (first hand and otherwise) of the #OWS movement. They are intentionally abstract, because they are menat to apply to a wide range of instances and scenarios.  more...

YouTube Preview Image