{"id":12706,"date":"2012-10-25T08:47:25","date_gmt":"2012-10-25T12:47:25","guid":{"rendered":"http:\/\/thesocietypages.org\/cyborgology\/?p=12706"},"modified":"2012-10-26T08:28:46","modified_gmt":"2012-10-26T12:28:46","slug":"book-review-invisible-users-youth-in-the-internet-cafes-of-urban-ghana","status":"publish","type":"post","link":"https:\/\/thesocietypages.org\/cyborgology\/2012\/10\/25\/book-review-invisible-users-youth-in-the-internet-cafes-of-urban-ghana\/","title":{"rendered":"[Book Review] Invisible Users: Youth in the Internet Caf\u00e9s of Urban Ghana"},"content":{"rendered":"<p><a href=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/10\/9780262017367.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-12710\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/10\/9780262017367.jpeg\" alt=\"\" width=\"270\" height=\"400\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/10\/9780262017367.jpeg 270w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/10\/9780262017367-202x300.jpeg 202w\" sizes=\"auto, (max-width: 270px) 100vw, 270px\" \/><\/a><\/p>\n<p>The theory and policy of Internet connectivity has not kept pace with the increasing\u00a0diversity\u00a0of network access. The full variety of access points, social practices, and meaning created by networked individuals has not been critically engaged by most authors. \u00a0Jenna Burrell&#8217;s new book\u00a0<a href=\"http:\/\/www.indiebound.org\/book\/9780262017367\">Invisible Users: Youth in the Internet Cafe&#8217;s of Urban Ghana<\/a> is the start of a major corrective in the social sciences&#8217; treatment of the Internet. For &#8220;nonelite urban youth&#8221; the internet caf\u00e9 provides an opportunity to extend one&#8217;s social network outside of the\u00a0<em>zongo<\/em> (colloquial term for slum) that they grew up in, and gain access to resources and contacts they would otherwise never acquire. A majority of Burrell&#8217;s work takes place in these caf\u00e9s but we are also treated to a discussion of global ewaste streams, international\u00a0consortiums on the &#8220;information society&#8221; and the collective reputation and shared meaning of Ghanaians\u00a0\u00a0on the Internet. Burrell provides a broad, but at times penetratingly deep look at the Internet from the margins.\u00a0<!--more-->Burrell describes internet caf\u00e9&#8217;s as &#8220;indeterminate\u00a0spaces&#8221; that refused to &#8220;appropriate&#8221; the internet by making a uniquely Ghanian space, nor did it attempt to transport the patrons to a totally new world. The space was part of a &#8220;particular strategy of handling the distance between imagination and action.&#8221; The internet caf\u00e9 was not neutral per se, but it did offer a new space that was relatively free from the control of older family members. In a culture where older generations have unquestioned authority over youth, the Internet caf\u00e9 offered a domain of relative freedom of expression and action. She is careful to note that these spaces are probably not &#8220;destined to become the sort of caf\u00e9-as-third-place thought to play a role in civil society formation, rather the expense of timed access and the allure of foreign contacts means everyone pays attention to their screen with rare invitations to check out an offer for free CDs or the transcript of a Yahoo! messenger conversation.<\/p>\n<p>The\u00a0acquisition\u00a0and \u00a0collection of goods and personal connections from over-seas is particularly important for many young Ghanaians. From computer games to T-shirts, Ghanaians\u00a0\u00a0displayed a &#8220;fascination with abroad and with whatever evoked travel and connectivity with\u00a0foreign\u00a0lands. Airline membership cards and CDs or books by mail personalized with a name and address\u00a0provided\u00a0this sense of global interconnectivity that was far more compelling to young people than the gambling games the CDs contained.&#8221; Whereas most authors describe the Internet as a geography-annihilating force, Burrell&#8217;s account of internet caf\u00e9s explicitly rejects the &#8220;unwarranted assumptions about the homogeneity of\u00a0receiving\u00a0populations&#8221; and demonstrates how the Internet can be seen as a &#8220;foreign commodity.&#8221; For young Ghanaians\u00a0\u00a0the Internet brings the world &#8220;closer&#8221; but it also makes place\u00a0<em>more<\/em> important, not less.<\/p>\n<p>Young Ghanaians\u00a0\u00a0are not only looking for\u00a0foreign\u00a0goods, but contacts as well. Establishing regular contact with fellow Internet users across was a main component in &#8220;enacting a more cosmopolitan self.&#8221; Burrell opens her book with an interview between a young woman and her new Canadian husband. The couple met online and due to visa complications their relationship has largely remained computer-mediated. This long distance relationship, while not ideal, is a minor success story both romantically and financially. Foreign contacts, while having a very pragmatic dimension to them, were also meant to be sincere and durable.<\/p>\n<p>The reactions many Ghanaians\u00a0receive\u00a0when they attempt to reach out are hostile and suspicious. Part of it is warranted- the infamous &#8220;<a href=\"http:\/\/www.youtube.com\/watch?v=qiHZb0kkqQk\">Nigerian prince<\/a>&#8221; scams are not limited to their namesake country. C\u00f4te D&#8217;ivoire, Ghana and the rest of Western Africa is associated with internet fraud. In Ghana, such practices are &#8220;referred to locally as 419 (Nigerian police code for fraud) or <em>sakawa <\/em>(a vernacular term from the Hausa language)&#8230;&#8221; The scams occupy a very complicated role in Ghanaian youth culture. While 419 scams rarely work, the rumors of successes make them very popular. Many Ghanaians\u00a0\u00a0hope to pull off one successful scam so that they may parlay the winnings into a legitimate business. A few thousand dollars is enough to buy a truck or another expensive resource that can be used to start up a new business.\u00a0419 scams have consequences for Ghanaians\u00a0\u00a0not actively involved in criminal behavior. Popular travel sites like Expedia and Travelocity will not sell tickets to Accra and Ghanaians in search of contacts and goods are often rudely turned away.<\/p>\n<p>Much to the chagrin of well-meaning penpal seekers, the scammers reinforce the Western perception of Africans as needy poor people, greedy scam artists, or corrupt politicians. Potential connections end before they begin as soon as Ghanaians\u00a0\u00a0reveal their &#8220;real&#8221; identity. Burrell concludes her chapter on internet scams by saying:<\/p>\n<blockquote><p>&#8220;In the end, the potential for the empowerment of marginalized groups through new media technologies relies on producers who represent themselves in authentic as well as strategic ways. The problem of authenticity and its\u00a0seeming\u00a0incompatibility\u00a0with persuasive self-performance was significant to Accra&#8217;s nonelite Internet users&#8230;The question thereforeis what conditions facilitate empowering self-expression and\u00a0what\u00a0conversely provokes individuals to become complicit in their own damaging self-representations?<\/p><\/blockquote>\n<p>This is one of the central points of the book. As the unmarked category, Western internet users have significantly\u00a0less influence on one-another. In other words, my actions online do not affect another American as much as one Ghanian&#8217;s scamming activities effect another&#8217;s search for a foreign penpal. Ignorance of such differences was on full display at the World Summit on the Information Society (WSIS) held in Accra in February of 2005. Burrell spends a chapter reviewing the conference and comparing it to her own observations. She notes that &#8220;speaking about Africa through the lens of poverty and development has\u00a0consequences\u00a0for representations of Africans.&#8221; Burrell rightly points out that this paternalistic attitude toward African countries misunderstands the realities of Internet use and gets in the way of productive work. The way she describes the WSIS sounds\u00a0eerily\u00a0familiar to the way the New York Times described the &#8220;<a href=\"http:\/\/www.nytimes.com\/2012\/05\/30\/us\/new-digital-divide-seen-in-wasting-time-online.html?pagewanted=all&amp;_r=0\">New Digital Divide<\/a>.&#8221; Burrell&#8217;s critique of this language is similar to the ones that <a title=\"Critiquing the \u201cDigital Divide\u201d Rhetoric\" href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/05\/31\/critiquing-the-digital-divide-rhetoric\/\">Nathan Jurgenson<\/a>\u00a0and the rest of us have levied\u00a0in the past. She writes, &#8220;Avoiding this black hole of thought is an effort to avoid the analytical\u00a0impoverishment\u00a0that such insistence on a presupposed normative order imposed by conventional models of development [demands].&#8221;<\/p>\n<p>While many Western authors see the internet as a force for <a title=\"Sherry Turkle\u2019s Chronic Digital Dualism Problem\" href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/04\/23\/sherry-turkles-chronic-digital-dualism-problem\/\">dividing and individuating<\/a>, the Internet appears to be competing with major religions for the same sorts of tangible and pragmatic necessities. Burrell writes, &#8220;Much like Internet use, religious practices were\u00a0perceived as a set of techniques allowing individuals to extend themselves exerting a more powerful force of influence over broader social terrain.&#8221; Computers had the same metaphysical properties (and geographic origins) as the contemporary Christian and Muslim faiths that offered connections to international networks and the promise of economic prosperity.<\/p>\n<p>Ghana and Ghanaians relationship to the Internet does not end (or even begin) at internet caf\u00e9s. Ghana is one of the major global sites of ewaste in the world. The physical artifacts that bring the internet to millions have an excellent change of eventually ending up in Ghana, either as repurposed caf\u00e9 computers or as scrap that is dismantled and sold <a href=\"http:\/\/www.sciencedaily.com\/releases\/2012\/07\/120706164159.htm\">for precious metals<\/a> and parts. The industry is large and continues to grow as more computers are thrown out at a faster pace. This unique relationship with the &#8220;information economy&#8221; means that while Westerners can enjoy a &#8220;post-industrial&#8221; economy, many nations in the Global South must deal with its the toxic, lead-filled byproducts. For Ghanaians\u00a0\u00a0the information economy (or the\u00a0information\u00a0society, or the post-industrial economy, or whatever you want to call it) has a very real and present material component.<\/p>\n<p>Burrell titles her final chapter &#8220;Becoming Visible&#8221; and catalogues the ways in which marginal users, are both deeply affected by Internet policy in the United States. Internet neutrality debates mean just as much, if not more, to Ghanaians as they do to North Americans or Europeans. Creating a tiered Internet could mean shutting out those users that have just gained access to the world wide web. She also calls for &#8220;scholarship on technology development and diffusion and on the construction of &#8216;the user&#8217; to encompass the full diversity of political-economic processes.&#8221; I would like to add to her call by also noting that the mobile web (something that has risen astronomically since Burrell completed her field work) is not subject to the same net neutrality regulations as the wired net. As <a href=\"http:\/\/www.issues.org\/28.2\/p_odumosu.html\">Tolu Odumosu and Venkatesh Narayanamurti have noted<\/a>, the burgeoning LTE market could be a series of walled gardens and not the digital agora we are used to. In many ways, net neutrality was defeated by providing a slightly different service through a totally different physical infrastructure. Again, Burrell&#8217;s focus on the materiality of the Internet becomes useful here: the hardware is not incidental nor does it disappear as users interact in a realm of bits. The Internet has very physical components to it, and this\u00a0characteristic\u00a0becomes more\u00a0noticeable (and important)\u00a0as your connection becomes more tenuous and marginal.<\/p>\n<p>Jenna Burrell&#8217;s &#8220;Invisible Users&#8221; is one of the few texts explicitly dealing with the Interent that will not feel dated in five years. Her approach, focusing on the social action that is enabled and constrained by and through the technology, will keep her book relevant until the challenges she poses are solved or new challenges\u00a0supersede\u00a0them. While the content is excellent, they way she approaches the subject matter both methodologically and conceptually is her greatest\u00a0achievement.\u00a0There are no long ruminations about the constraints of the Yahoo!\u00a0messenger\u00a0interface. Science and Technology Studies and related fields would be well served by taking up Burrell&#8217;s call for pluralizing the concepts of users and the net. In so doing, we will move beyond a\u00a0privileged and shallow\u00a0depiction of what digital devices are capable of and finally begin talking about what it means to live in a digitally augmented world.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The theory and policy of Internet connectivity has not kept pace with the increasing\u00a0diversity\u00a0of network access. The full variety of access points, social practices, and meaning created by networked individuals has not been critically engaged by most authors. \u00a0Jenna Burrell&#8217;s new book\u00a0Invisible Users: Youth in the Internet Cafe&#8217;s of Urban Ghana is the start of [&hellip;]<\/p>\n","protected":false},"author":1512,"featured_media":12710,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[9968],"tags":[1716,581,249,140,12741,10296,10250,18320],"class_list":["post-12706","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-reviews","tag-book-review","tag-digital-divide","tag-ghana","tag-internet","tag-materiality","tag-self-expression","tag-social-network","tag-yahoo"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/10\/9780262017367.jpeg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/12706","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/users\/1512"}],"replies":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/comments?post=12706"}],"version-history":[{"count":8,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/12706\/revisions"}],"predecessor-version":[{"id":12722,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/12706\/revisions\/12722"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/media\/12710"}],"wp:attachment":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/media?parent=12706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/categories?post=12706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/tags?post=12706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}