You are here

Internet Technologies

The Problematic Rise of Read Receipts in Social Media

The final presenter at "Compromised Data" is Kamilla Pietrzyk, whose interest is in the user experience of social media platforms which provide read receipts - as in Facebook chat, iMessage, or Snapchat. Very little research has been done about this so far, but there is growing unease about this functionality, which notifies the sender of a message that the message was opened and (presumably) read.

Email offers this functionality as well, but here the read receipt is a per-case opt-in facility; recipients can choose not to send read receipts as they read the email. Underlying this, though, there are also message delivery notifications in email, which confirm that the email was delivered to the recipient's mailserver, although this does not guarantee that the recipient themself will have read the message.

Bottom-Up Measurements of Network Performance

The next session at "Compromised Data" starts with Fenwick McKelvey, who begins with a reference to the emergence of digitised methods for the study of the Web during the mid-2000s. This was the time around which the latest generation of social media emerged, enabling us to begin thinking about society through the study of the Internet, requiring the development of new research methods by repurposing computer science methods for social science research.

In Toronto, Infoscape Labs developed a number of tools for the exploration of political discourse in Web 2.0, including the Blogometer. This is the emergence of platform studies, paying attention to the platform itself - but this also introduces challenges about how to study the platform, as the core object of research itself intervenes in its study, e.g. through the politics of APIs. This work also required compromises around data access and utilisation, and a growing bifurcation between scholarly and commercial research activities emerged.

Studying the Processes of Media Production

The final speaker in this AoIR 2013 plenary is Gina Neff, who notes that the study of online practices and texts can only provide a limited perspective on resistance to capitalism. The political and economic affordances of the Internet are less open to resisting capitalist models than we might have thought; it tends to subsume resistant practices into online capitalism in the end.

This leads Gina to suggest that the era of the amateur is over. Capitalist dynamics privilege the platform developers, policy makers, proprietors and others over users; the Net is tool for and symbol of the reproduction of this set of power relations. Through it, proto-, pseudo-, and not-quite-yet-professional media makers are subsumed into the system.

The Emancipatory Potential of Tech Activism

The final speaker in this first AoIR 2013 plenary is Christina Dunbar-Hester, whose focus is on activist technical projects - such as micropower radio stations or community wifi networks. The activists describe such activities with the Amish term of barnraising, highlighting the community empowerment and self-sufficiency aspects of such initiatives. The hope is to demystify technology and generate political engagement through further hands-on knowledge sharing.

There is a big difference in this in how technical expertise is seen as empowering (through sharing) rather than disempowering (through the emergence of knowledge elites). But there remains a strong white middle-class basis to this - such sharing continues to speak largely to a male white addressee, and the involvement of women or minorities in these initiatives remains rare.

Online Racism Isn't Just a Glitch

Next up in this plenary at AoIR 2013 is Lisa Nakamura, whose interest is in racism online - an issue which is often downplayed as a minor problem or an irrelevant distraction. But what drives online racism - is it a product of the greater levels of anonymity online (and thus an inevitable, natural, normal effect of the Net)? Does this mean that humans are fundamentally, inherently driven to racism, which the Net enables us to live out? Does the Net enable us to indulge in glitchy behaviour, in other words?

But the machine of the Internet is not a separate, animate entity with its own agency, but is co-created with or by us. The idea that the Net has its own, separate nature is merely a convenient excuse - as in Ian Bogost's statement that it's not gamer culture that's racist, but the Internet itself. If online racism is seen as a glitch in the system, this places it alongside other (e.g. hacker) exploits of glitches - it legitimises and excuses racism as merely off-topic and a failure of protective mechanisms.

Participation and Exclusion on the Global Net

The first full day of AoIR 2013 is about to get underway - and it starts with a series of plenary talks. Jenna Burrell is the first speaker, taking an ethnographic angle. Her recent focus has been on youth in the Internet cafés or urban Ghana - a sign of the global reality of the contemporary Internet. But this global Internet does not eradicate personal identity, contrary to some of the cyberutopian claims of the early 1990s which have now become unfashionable - the Net's userbase is increasingly diverse, but in different ways than originally envisaged.

What motivates young Internet users in Ghana, then? As it turns out, a key driver of Internet café use (as of 2005) was to find penpals in other countries - at the time, mainly through Yahoo! chatrooms. Such penpals might be friends, peers, potential romantic interests, patrons, sponsors, business partners, or philanthropists - following previous mail-based practices, which were translated online and became a way to envisage what the Net was for.

Making Sense of Anonymous's Hacker Trickery

Back from my visit to Project EPIC in Boulder, and right to the opening keynote of the 2013 Association of Internet Researchers conference. The keynote speaker is Gabriella Coleman, whose focus is on cyberactivism. Computer hacking has taken an increasingly prominent role in society in recent years - hackers have engaged in disrupting communication through DDoS attacks as well as in increasing transparency through leaking information.

But what are hackers? Some programme software, some develop hardware; some promote transparency (e.g. through the free software movement), some operate from the anonymous underground. Put simply, hacking is where craft and craftiness converge, Gabriella says - often with a great deal of humour and subversion. Hackers are quintessential craftsmen (men, most often); they enjoy the performance of circumventing the rules by using the weapons of the geek.

The Corporate Hijacking of Internet Blackout Protests

The next speaker in this ECREA 2012 session is Tessa Houghton, who begins by noting the 2009 New Zealand blackout of Websites and avatars, in protest against new copyright legislation. This is a form of spectacular viral publicity, and has been repeated in a number of national contexts over the past years – variously protesting copyright or Internet regulations. The anti-SOPA/PIPA blackout of early 2012 is another example for this.

Online Activism and Transparency

The next speaker in this AoIR 2012 session is Constance Kampf, whose interest is in online activism. There are a number of different forms and levels of activism, of course – from a general expression of support for specific causes to radical and potentially dangerous interventions. Much online activism has been driven by issues of transparency, but that term is ill-defined: does it just mean the openness and availability of information about known phenomena, or also an absence of unknowns?

Internet Studies without Shame

The final speaker in this AoIR 2012 plenary is Terri Senft, who argues for a department of Shameless Studies. Is anyone actually shameless? We all constantly negotiate our shame, for all sorts of reasons; we are in solidarity with one another where we share a specific form of shame.

Pages

Subscribe to RSS - Internet Technologies