Categories
Aside Quotations

2013.5.22

Our symposium was also interested in the differences between writing a journal article and writing an extended monograph of up to 100,000 words. The sheer challenge of constructing a sustained argument over this many words clearly prepared the PhD for the book in ways that writing journal articles might not. So was there also something here, we wondered, about the PhD by journal publication being a way of preparing the audit ready scholar, already primed to turn out articles for high status journals, as opposed to what might appear as the increasingly less audit valued process of producing a monograph?

It is important to put on record that our symposium wasn’t suggesting that the solution to this increasing diversity should be some kind of monolithic pan-European doctorate, an extension of the Bologna process that would involve massive amounts of moderation, record keeping and audit. This would be the simple knee jerk bureaucratic response to emergent diversity. We did think that there might be a set of questions to discuss about the criteria used to evaluate/examine doctorates, and some work at the edges of what were reasonable expectations and what were not. We were very clear that there ought to be a conversation among the scholarly community at large about diversity and equity – it wasn’t something just for national policy-makers to think about.

The changes we were addressing are of course not the only changes in the doctorate. There are also increasing pressures on narrow nineteenth century definitions of the thesis by monograph brought about via digital and arts informed scholarship, and these too need to be taken into account in any discussions.

Pat Thomson, “the PhD and publication/by publication – a very peculiar practice? part one

Anecdotally, I can personally say that each type of writing a scholar engages in will be different. A manuscript is different from an article, which are both different from a report, review, book chapter, or submission to government. And each is independently valuable insofar as each teaches discrete writing skills.

I know that there is a shift away from manuscripts, and towards PhD by publishing in the social sciences. I can certainly appreciate how this publication approach enhances CVs for postdoctoral fellowships (e.g. demonstrates a track record of publishing) but it also seems to take away from learning a key skill: book writing. While many people who receive a PhD won’t continue on into the academy there is a certain discipline associated with building, and sustaining, and argument over 80-100 thousand words.

Categories
Aside Quotations

Government photograph databases form the basis of any police facial recognition system. They’re not very good today, but they’ll only get better. But the government no longer needs to collect photographs. Experiments demonstrate that the Facebook database of tagged photographs is surprisingly effective at identifying people. As more places follow Disney’s lead in fingerprinting people at its theme parks, the government will be able to use that to identify people as well.

In a few years, the whole notion of a government-issued ID will seem quaint. Among facial recognition, the unique signature from your smart phone, the RFID chips in your clothing and other items you own, and whatever new technologies that will broadcast your identity, no one will have to ask to see ID. When you walk into a store, they’ll already know who you are. When you interact with a policeman, she’ll already have your personal information displayed on her Internet-enabled glasses.

Soon, governments won’t have to bother collecting personal data. We’re willingly giving it to a vast network of for-profit data collectors, and they’re more than happy to pass it on to the government without our knowledge or consent.

Bruce Schneider, “The Public/Private Surveillance Partnership

It’s the ability for government to prospectively combine public and private data that makes American laws such as CISPA, which would permit the disclosure of private information to public bodies without absent warrant requirements, so significant. Privacy legislation serves as a necessary friction to delay, limit, and prevent governments from accessing citizens’ and resident aliens’ personal information unless such access is absolutely necessary: we need to strengthen such laws to preserve basic democratic freedoms, not weaken or erode them.

Categories
Quotations

2013.5.21

In 2010 and 2011, many discounted and differentiated Julian Assange from mainstream journalists by comparing him to a spy or foreign agent, despite the fact that he was just doing what every major US journalism organization does: publishing leaked classified information in the public interest.

Well, the government alleges in Rosen’s case that he acted “much like an intelligence officer would run a clandestine intelligence source” and communicated his “clandestine communications plan.” This is reminiscent of a disturbing House Judiciary hearing last year where the committee’s lead witness compared the New York Times’ David Sanger to a spy, saying he “systematically penetrating the Obama White House as effectively as any foreign agent.”

By that language, the government is arguing journalism is now akin to spying, no matter if its WikiLeaks or the mainstream press.

Trevor Timm, “Virtually Everything the Government Did to WikiLeaks is Now Being Done to Mainstream US Reporters
Categories
Quotations

2013.4.20

We’re living in hard times, we’re not living in jolly boom dotcom times. And that’s why guys like Evgeny Morozov, who comes from the miserable country of Belarus, gets all jittery, and even fiercely aggressive, when he hears you talking about “technological solutionism.”

“There’s an app to make that all better.” Okay, a billion apps have been sold. Where’s the betterness?

Things do not always progress, and the successes of progress become thorny problems for the next generation. They don’t stay permanently “better.” Our value judgments about what are better are temporary. They are time-bound. When you overuse the word “better,” it’s like a head-fake, it’s a mantra.

You don’t have a better-o-meter. You can’t measure the length and breadth and duration of the “betterness.” “Better” is a metaphysical value judgement. It’s not a scientific quality like mass or velocity.

You can’t test it experimentally. We don’t know what’s “better.” We don’t even know what’s “worse.” Which is good. Every cloud has a silver lining.

Google doesn’t want to be “evil,” but they don’t have an evilometer. They don’t have an evil avoidance algorithm.

Bruce Sterling, Closing Remarks at SXSW2013
Categories
Aside Quotations

2014.4.19

As many I was deeply shocked by the tragedy that occurred in Boston earlier this month. It was a stark reminder of the fact that any of us could be a victim of senseless violence anywhere at any moment.

As more information on the origin of the alleged perpetrators is coming to light, I am concerned to note in the social media a most unfortunate misunderstanding in this respect. The Czech Republic and Chechnya are two very different entities – the Czech Republic is a Central European country; Chechnya is a part of the Russian Federation.

As the President of the Czech Republic Miloš Zeman noted in his message to President Obama, the Czech Republic is an active and reliable partner of the United States in the fight against terrorism. We are determined to stand side by side with our allies in this respect, there is no doubt about that.

Petr Gandalovič, Ambassador of the Czech Republic, “Statement of the Ambassador of the Czech Republic on the Boston terrorist attack

That an ambassador has to clarify where his nation is – and isn’t – in the face of incorrect American media and social media statements is….disturbing. Moreover, it raises serious doubts about scholarly arguments that the teaching of ‘facts’ is no longer necessary in an era of Google and the crowd.

Categories
Quotations

2013.4.19

While much is made of digital activism and the ability afforded us by the Internet to help, little is made of its costs on those who do help. Because of one’s extreme virtual proximity, intense feelings of inadequacy and of “not doing enough” emerge. You’re doing what you can, to the detriment of your own health – the people you support and whose digital security depends on you are there facing all of the risks you experience by proxy. You recognize the seriousness yet at the same time the absurdity, as even mundane annoyances, such as being stuck in traffic, become extraordinary moments where you see what is “truly important” in the world. Constantly focusing on what is “truly important” means you often neglect the mundane side of what is “truly important” – your mental health, relationships with family and friends, and fun time to relax. The pleasure of normal conversations, the absurdities of daily life, the sun, stars, hugs, all slowly dissolve as you begin to live the crisis and realities of others thousands of miles away. Those anxieties become internalized and externalized in anger, irritation, lashing out – all of which I did.

It is “the cause,” after all. That movement which will make the world right, which will correct the horrific injustices you were privy to on a daily basis. It will avenge the friends arrested, tortured, or killed. You live, breathe, eat, feel, touch, anything related to it. The moments away from the computer are engaged in phone calls, texts, or in-person meetings and events. My body was in Los Angeles, but my mind was in Iran.

Cameran Ashraf, “The Psychological Strains of Digital Activism
Categories
Aside Quotations

2013.4.14

Several years ago the college where I teach created an electronic “quick mail” system to reduce paper use and to increase our efficiency. Electronic communication is now standard throughout most organizations. The results, however, are mixed at best. The obvious result is the large increase in the sheer volume of stuff communicated, much of which is utterly trivial. There is also a manifest decline in the grammar, literary style, and civility of communication. People stroll down the hall or across campus to converse less frequently than before. Students remain transfixed before computer screens for hours, often doing no more than playing computer games. Our conversations, thought patterns, and institutional speed are increasingly shaped to fit the imperatives of technology. Not surprisingly, more and more people feel overloaded by the demands of incessant communication. But to say so publicly is to run afoul of the technological fundamentalism now dominant virtually everywhere.

David W. Orr | “The Nature of Design” (via indigenousdialogues)

I appreciate the sentiment embedded in this quotation. What’s most significant, I think, is that it speaks to a reduced degree of mindfulness in communications because the analoge barriers of communication (e.g. the physical act of penning and sending and delivering a message) have plummeted. In the process of reducing the physical barriers of communication we fail to appreciate the intellectual demands of reading and responding remain the same; in the absence of physical reminders, it seems as though we more pervasively ‘forget’ the intellectual and temporal resources required to communicate. This forgetfulness is (at least in part) what’s to blame for communication overload today

Categories
Quotations

2013.4.13

Lawyers are trained in reading, understanding, interpreting and advising on laws and legal compliance programs, and defending their clients from litigants and regulators. Privacy laws, everywhere in the world, are vague, so they leave much room for legal interpretations. The lawyers’ skill set is becoming more and more central to the role of privacy leadership. Moreover, lawyers benefit from attorney-client privileged communications internally, which is becoming an absolutely essential mechanism for privacy lawyers to have deep, unfettered, unfiltered exchanges of information and advice with their clients.

Of course, non-legal disciplines will always play an essential role in safeguarding privacy at companies, e.g., the vital role played by security engineers. Privacy will always be a cross-disciplinary project. I’m not saying that the rise of the lawyer-privacy-leader is necessarily the best thing for “privacy”. Yet in the face of rampant litigation, discovery orders, vague laws, political debates, regulatory actions, threats of billion dollar fines, companies will be looking to their privacy lawyers for a lot more than drafting a privacy policy. It’s a great profession, if you like stretch goals.

Peter Fleischer, “Stretch Goals for Privacy Lawyers
Categories
Aside Quotations

2013.4.11

CryptDB, a project out of MIT’s Computer Science and Artificial Intelligence Lab, (CSAIL) may be a solution for this problem. In theory, it would let you glean insights from your data without letting even your own personnel “see” that data at all, said Dr. Sam Madden, CSAIL director, on Friday.

“The goal is to run SQL on encrypted data, you don’t even allow your admin to decrypt any of that data and that’s important in cloud storage, Madden said at an SAP-sponsored event at Hack/reduce in Cambridge, Mass.

Barb Darrow, “You want to crunch top-secret data securely? CryptDB may be the app for that

This is super interesting work that, if successful, could open a lot of sensitive data to mining. However, it needs to be extensively tested.

One thing that is baked into this product, however, is the assumption that large-scale data mining is good or appropriate. I’m not taking a position that it’s wrong, but note that there isn’t any discussion – that I can find – where journalists are thinking through whether such sensitive information should even be mined in the first place. We (seemingly) are foreclosing this basic and very important question and, in the process, eliding a whole series of important social and normative questions.

Categories
Aside Quotations

2013.4.8

Although some of the core supporters of that group are prone to violence and criminal behaviour, Catt has never been convicted of criminal conduct in connections to the demonstrations he attended. Nonetheless, Catt’s personal information was held on the National Domestic Extremism Database that is maintained by the National Public Order Intelligence Unit. The information held on him included his name, age, description of his appearance and his history of attending political demonstrations. The police had retained a photograph of Mr Catt but it had been destroyed since it was deemed to be unnecessary. The information was accessible to members of the police who engage in investigations on “Smash EDO”.

In the ruling the Court of Appeal departs from earlier judgments by mentioning that the “reasonable expectation of privacy” is not the only factor to take into account in determining whether an individual’s Article 8 (1) right has been infringed. In surveying ECtHR case law, the Court noted that it is also important to check whether personal data has been subjected to systematic processing and if it is entered in a database. The rationale to include consideration of the latter two categories is that in this way authorities can recover information by reference to a particular person. Therefore, “the processing and retention of even publicly available information may involve an interference with the subject’s article 8 rights.” Since in the case of Catt, personal data was retained and ready to be processed, the Court found a violation of Article 8 (1) that requires justification.

Carolin Moeller, “Peaceful Protester’s personal data removed from extremism database

The removal of Mr. Catt’s data from these databases is a significant victory for him and all those involved in fighting for citizens’ rights. However, the case acts as a clear lens through which we can see how certain facets of the state are actively involved in pseudo-criminalizing dissent: you’re welcome to say or do anything, so long as you’re prepared to be placed under perpetual state suspicion.