Monday, April 26, 2010

Diigo 04/26/2010

Posted from Diigo. The rest of my favorite links are here.

Saturday, April 24, 2010

Diigo 04/24/2010

Posted from Diigo. The rest of my favorite links are here.

Thursday, April 22, 2010

Diigo 04/22/2010

Posted from Diigo. The rest of my favorite links are here.

Wednesday, April 21, 2010

Diigo 04/21/2010

Posted from Diigo. The rest of my favorite links are here.

Thursday, April 15, 2010

Diigo 04/15/2010

Posted from Diigo. The rest of my favorite links are here.

Wednesday, April 14, 2010

The Internet Architecture of Gender / Decoding the Layers

The internet, like any new technology, has a disruptive effect on society and governance. As Milton Mueller of the Internet Governance Project says, “For a while, when its effects are new and unanticipated, it empowers in a relative sense some actors at the expense of others. This relative empowerment alters the composition of interest groups, further promoting political change.” (1)

The rise of the internet economy has occurred at a time when the gender gap has actually been increasing in many indicators of highly developed countries, which is somewhat of a surprise to those who believed that the second wave of feminism in the 60s and 70s had born legitimate fruit.

It seems, on reflection, that legislation of equal opportunity and the rhetoric of empowerment has failed to have any effect in some crucial areas, most noticeably computer science, ICTs and engineering, where the numbers of women in higher education and employment have actually declined since the 1970s. (2) 

an example of gender division by workplace from The Guardian, UK.

Technology is not gender neutral although much of the rhetoric, like the end to end principle, simplicity and net neutrality, obscures this. Technology is socially shaped. As Hrynyshyn says, ‘values are embedded in a technology through a social process of the interaction of different groups of relevant actors who are involved in the process of design…. Often what is not recognized is that the decision about the development of technology are made by agents with different locations in structures of social power, and the different locations create differences in the extent to which different agents are able to participate successfully in the process of social shaping.’ (3)

I am taking a social shaping of technology approach to this situation (as described by Mackenzie and Wajcman, Williams and Edge), where at every stage in the development of a new technology a decision is made, a fork in the branching logic paths is taken that incrementally changes the direction of development, and of necessity excludes some directions. As Lessig puts it in Code 2.0, 'The ‘nature” of the Internet is not God’s will. Its nature is simply the product of its design. That design could be different.’ (4)

I am using the Layers Principle as adapted by Solum and Chung from Lessig’s work, and endorsed by the WSIS in 2005, for my analytic framework. The six layers that constitute the Internet are:

• The Content Layer—the symbols and images that are communicated.
• The Application Layer—the programs that use the Internet, e.g. the Web.
• The Transport Layer—TCP, which breaks the data into packets.
• The Internet Protocol Layer—IP, handles the flow of data over the network.
• The Link Layer—the interface between users’ computers and the physical layer.
• The Physical Layer—the copper wire, optical cable, satellite links, etc. (5)

These layers were defined for internet governance but also serve as a way of examining how different structures have evolved in seemingly comparative isolation from other layers and how these isolated instances are part of the interrelated whole. How the internet has created a society in which women, in many important areas, are further from equality and self determination than they were in 1960. How we can decode the layers of gender discrimination to see how the architecture of the internet limits our global society.

(The Internet Architecture of Gender / to be continued....)

2. Maria Klawe, Telle Whitney, Caroline Simard, "Women in Computing - take 2" (February, 2009). Communications of the ACM. Volume 52, Issue 2. Inspiring Women in Computing. Pages 68-76. ISSN:0001-07682. Available at

3. Hrynyshyn, D, "Globalization, nationality and commodification: the politics of the social construction of the internet" (2008) New Media and Society. Volume 10 (5): 751-770. Available from

4. Lessig, L. "Code 2.0. Chapter 4: Architectures of Control" (2006) Available at:

5. Solum, Lawrence B. and Chung, Minn, "The Layers Principle: Internet Architecture and the Law" U San Diego Public Law Research Paper No. 55. Available at SSRN:

Diigo 04/14/2010

  • Interesting story about how internet fuelled media changed the global SwineFlu pandemic response. Specifically, persuading people that they probably didn't need to vaccinate, (market mechanisms) causing many countries to now be overstocked with millions of dollars worth of unwanted serums!

    ""It emerged that the media timescale was far shorter than the political and administrative timescale, which may have complicated national decision making," a French delegate told the panel."

    tags: #ARIN6902, internet, pandemic, market, feedback, media, nation

  • PJFenwick is doing a PhD on facebook privacy and his explorations have shown that even when you lock up your settings, your friends (and friends of) can leak your information all over the place.

    "But by far the most interesting part of all of this have been dark users. Like dark matter, these users are not directly observable, usually because they've completely disabled API access. In fact, some of these users are completely dark unless you're a friend. They don't show up in search results. They don't show up on friends' lists. You can't send them messages. If you try to navigate to their user page (assuming you know it exists), you get redirected back to your homepage. These users have their privacy settings turned up real high, and are supposed to be hard to find.

    However like dark matter, dark users are observable due to their effects on the rest of the universe. If a dark user comments on a stream entry, I can see that comment. More importantly, I can see their user-ID, and I can generate a URL to a page that will contain their name. I can then watch for their activities elsewhere. Granted, I can't directly search for their activity, but I can observe their effects on my friends. For want of a better term, I've been calling this "dark stalking".

    What makes this all rather chilling is that I'm doing all of this via the application API. If your friend has installed an application, then it can access quite a lot of information about you, unless you turn it off. If your friend has granted the application the read_stream privilege, then it can read your status stream. Even if a friend of a friend has done this, and you comment on your friend's status entries, it's possible to infer your existence and retrieve those discussions through dark stalking."

    tags: #ARIN6902, internet, privacy, facebook

  • Everyone's probably bookmarked this article already! Sentencing senior Google execs on the grounds of profiting from illegal acts is probably also technically correct. Google's defense is the neutrality of the internet, which is questionable as Google do adjust content to suit, for their own profit. Which layer is this issue on? Will increasing controls on content change our internet beyond recognition?

    Marcuse says that tolerance can not tolerate hateful speech and acts or it is no longer truly tolerant. That's quite a conundrum!

    tags: #ARIN6902, internet, governance, infrastructure, technology, google, privacy, legislation

Posted from Diigo. The rest of my favorite links are here.

Sunday, April 4, 2010

AutoPost 04/04/2010

Posted from Diigo. The rest of my favorite links are here.

Thursday, April 1, 2010

AutoPost 04/01/2010

Posted from Diigo. The rest of my favorite links are here.