Introduction to Information Studies: Winter 2006. Dr. Ramesh Srinivasan

Monday, March 27, 2006

Final Grade

I received an "A" for this course.

Sunday, March 12, 2006

Week Nine Weblog

Indexes, Algorithms, Ranking, Oh my!

It is obvious to me, after reading Nissenbaum & Introna's article Shaping the Web: Why the Politics of Search Engines Matters that the only real way to ensure that the original vision of the internet as a democratizing force is to expose the methods and algorithms that are search engine foundations. This type of policy, which is suggested by the article itself, would allow users to have much more meaningful results when searching for information and/or work around/with the biases inherent to the search engine. More importantly, it would allow for an increase of types of algorithms and ranking systems that would be more representative of an author's social, political and moral persuasions. Understanding this would allow for a user to decide whether or not to continue using that particular system or to find/author a different one that is more aligned with his/her inquiries.

Suppose that this ideal exists and then try to imagine what it means as far as constructing broad social values. This task may not be so easy. Will these values manifest through users' habits? How will anyone commit to these values when they can easily find another system to represent opposing value system with a few clicks of the mouse? In other words, will the "truthful disclosure of the underlying rules (or algorithms) governing indexing, searching, and prioritizing" (Nissenbaum, p. 181) unleash anarchy within the internet that will become the end of any type of representation of a value system? I think that at first, yes. But over time, values would manifest through user habits and be committed to the same way they have been throughout history. The only downside is wading through the leftover algorithms that would, no doubt, have to be done by future generations of users.

Saturday, March 11, 2006

Response Paper Four

The Challenge of Ontological Represention

The quest to represent an array of diverse knowledge communities within the realm of IT will never be complete. The fact alone that cultures and knowledge are not static is a basis for such a claim. Therefore, their ontological representation in any medium can never be fully realized. Also, any attempt at meta-analysis of a specific subject within a knowledge community, albeit to more accurately represent its ontology, might stimulate cultural transformation, thereby creating a recursive framework for all involved in the process of representation. When a community is engaged in such a representation it is essential that they understand (as well as those who might be assisting them with information systems technical support) culture is dynamic and that reflection upon their "digital" ontology can stimulate cultural change. Once this is understood, the community must then be willing to continually "update" their ontological representation throughout time. This will ensure an accurate cultural representation as interconnectivity and interoperability of multiple ontological representations are achieved.

The suggestion that culture is dynamic (not static) can be supported by historical and anthropological data beyond the scope of this paper. Within the discussion of ontological representation in information systems, specifically on the internet, "individuals within a given community attach different descriptions to shared phenomena, and they need to continue to describe the world differently" (Srinivasan, p. 13). Individual descriptions of shared phenomena create "contrasting and fluid ontologies" (Srinivasan, p.13) which act as competing memes (units of cultural information) to construct an encompassing community domain ontology. Any representation at a given time of a community's ontology, therefore, is a result of a synergy between individual descriptions of shared phenomena. These descriptions will change as shared phenomena change over time. The work of accurate ontological representation through IT is therefore neverending.

A community engaged in their ontological representation will be experiencing a new shared phenomenon that is self-reflective. Over time, the ability to view an ontology objectively (or even slightly objectively) can expose knowledge (the lack of) that was previously undetectable. Such a realization might be an impetus for those engaged to provide descriptions that would not have been brought forth without the ontological representation. These descriptions might then enter the realm of a type of critical cultural literacy, or meta-analysis of a subset of knowledge. As has been experienced through post-modern theory of culture in the West, critical cultural-literacy has proved to transform overall ontology and representation of ontologies (for example: Standardization, Objectivity, and User Focus: A Meta-Analysis of Subject Access Critiques by Olsen & Schlegl, 2001). If Indigenous groups around the world who are engaged in ontological representation experience a similar cultural literacy, it is unknown how they will change. Perhaps they will be able to strengthen their community and cultural identity through a multiplicity of descriptions. On the other hand, various fluid ontologies within a community may "fork" away from each other to create unique ontological representations. How this will play out is of concern in the same way previous introduction of foreign technology by ethnographers/anthropologists been shown to disrupt indigenous communities. Ontological representation through IT is a far cry from an introduction of simple tool; it is more aligned with the introduction of literacy to a primarily oral culture.

The introduction of communities knowledge into information systems is a never ending process and will have unforeseen results for those engaged. The increase of continual changing, merging, or splitting representation of various ontologies will provide an environment that will have the challenge of establishing interconnectivity and interoperability. The providers of IT into communities who wish to participate will have the burden of allowing each community to take their ontological representation to whatever ends they wish to. This may result in a strengthened or weakened cultural identity. Fluid community ontologies will ebb and flow throughout time as it always has through whatever medium it has in the past: from the Australian Aboriginal Dreamtime to the West's Postmodernism.

Sunday, March 05, 2006

Week Eight Weblog

The first Postmaster General, in 1775, was Benjamin Franklin who signed both the Declaration of Independence and The Constitution of the United States. He is perhaps one of the most revered figures in all of the US History. Only two years after the signing of the Constitution, the US’s first Post Office opened (1789). The fact that such a prominent leader in the formation of the nation was also involved in the inception of the USPO gives weight to the argument that this institution is essential to the preservation of the ideals of what the US stands for. The USPO was a part of the foundation of democracy in America.

The Post Office is an example of a US government agency that has been a direct victim of deregulation and privatization trends. The increase of Representative International Government Organizations (IGOs) and Non-Government Organizations (NGOs) after the formation of the US Post Office (USPO) is the direct cause of the Postal Reorganization Act of 1970. Perhaps one of the most devestating blows to the fabric of democracy in America was the removal of the Postmaster General from the President's Cabinet. This Act also led to competition with an organization that is an essential pillar of the US infrastructure. The function of the USPO was to ensure the fair and efficient transmission of parcels, paper mail and telegraphs which, in turn, carries the ethos of democracy. Instead of depleting the power of the USPO, the US should have given it more breadth of influence and attention in the national debate of evolving communication technologies.

Response Paper Three

Music Will Never Be Caught in Any Net

The notion of copyright as it pertains to music deals with a very slippery area of intellectual property. Music was only recently recordable. In 1877, Thomas Edison recorded the first human voice and not long after did music begin to be a profitable business. In 1914 the American Society of Composers, Authors and Publishers (ASCAP) was founded to "assure that music creators are fairly compensated for the public performance of their works, and that their rights are properly protected" in accordance with the 1914 Copyright Act. Live performances are the ethos of musical sound, whereas the record of music is the ethos of the music business. The notion that music is to be shared freely for the benefit of all society has always been, until recently, tied to the event of music; from ancient drum circle traditions to the Woodstock Music Festival of 1969. The freedom of access to recorded music through the internet though, combines that notion of freely sharing music to the record of music. Being as it is that music is shared freely and this notion is embedded within its very nature, it will never be fully tied down to any regulation of performance or recording.

The Napster affair brings out this very argument to life. Barlow argues that Napster represents the "real Internet" or one that "endows any acne-faced kid with a distributive power of Time Warner's" (page 1). In short, Napster allowed free sharing of recorded music (known as peer-to-peer sharing by use of MP3 files) that put the music business in jeopardy. But the business of music is not rooted in the manufacture and distribution of records of music as much as it is the performance of music. Therefore, it makes sense that freely shared records of music would only stimulate the music business further. As Barlow describes, the Grateful Dead were able to continue to sell out live performances as well as have studio albums go platinum based on the fact that their freely shared recordings of previous performances attracted new fans (pg. 2). Is it not surprising that "during the two years since MP3 music began flooding the Net, CD sales have risen 20 percent?" (Barlow, pg. 2).

Therefore, those concerned with the music copyright (such as ASCAP) should not be thinking that all is lost. Rather, they should embrace the fact that music is intended, by its nature, to be shared freely. If there is to be any new approach to the developed notion of copyright and music it should be to incorporate the understanding that it can be freely shared within both spheres of the event and the record. All the attempts to "no longer excuse personal use copying of digital works, either as fair use or under any other rationale" or develop sophisticated encryption technology (Cohen, p. 98) should be set aside. Any business of transaction that results in profit for the entrepreneurs of musical art should be considered a secondary benefit to the inherent patronage to music itself.

Monday, February 27, 2006

Interesting Links Found By Surfing ALA Webpage for Week 8 Discussion

Policing Porn Is Not Part of Job Description
Montgomery Homeland Security Officers Reassigned After Library Incident
http://courses.gseis.ucla.edu/mod/resource/view.php?id=1703

City won’t appeal Nees ruling (w/court order)
Western student wins public records battle over e-mail list
http://www.kokomotribune.com/local/local_story_052161104.html

FEINGOLD BLASTS FAILURE TO INVESTIGATE DOMESTIC SURVEILLANCE PROGRAM
http://feingold.senate.gov/~feingold/releases/06/02/20060216.html

Sunday, February 26, 2006

Week Seven Weblog

Myspace.com, Facebook.com, and Surveillance

This week's readings take a significant turn in subject matter from the previous weeks. The topic covers surveillance and privacy in the information age. As written by Nissenbaum: "In contemporary, technologically advaced societies, it is commonplace for large sectors of populations to participate, in varying degrees, in electronically networked interactions" (p. 562). Two of these types of networks, Myspace and Facebook, are extremely popular--especially with teenagers and young adults. Both of these networks have been surveilled by outside agencies resulting in hiring rejections, arrests, and pranks to deceive police. I describe and give my opinion of each below:

Facebook Becomes Tool For Employers
http://www.yaledailynews.com/article.asp?AID=31948

In this article, there is a quote by Yale Undergraduate Career Services Director Philip Jones: "The Facebook issue is the latest in a string of 'invasions of privacy' that students would do well to guard against," Jones said. "Everything you do that is in prthe public domain may be used by an employer as a way of evaluating you." Facebook is used by students (either high school or college) to post personal information. By using pictures and blogs, students commonly (daily) update their activities--some of which are very revealing in the nature of their behavior for recreation. Pictures and descriptions of certain activities (such as heavy, habitual drinking) have led prospective employers to decide not to hire individuals who partake in them. Personally, I believe this type of surveillance is justified. Take for instance a situation where an individual in interviewed and then is later seen in public by the possible employers in a public bar, completely intoxicated and behaving in a very disconcerting manner. This might sway the decision to hire such a person. If this same individual is seen through Facebook instead in a public bar, the medium has only changed. On the other hand, assume that an employer finds out through Facebook that an interviewee is homosexual and then makes a decision not to hire them based on that information. There are already laws in place that prevent this and they would need to be applied in this case. I agree with Jones that students should be careful of how information they make available on networks like Facebook. In a more general sense, students should be careful not to behave in ways that might jeapardize their employment prospects in all public domains, whether in a night club, bar or in the ether world. As James Rachels is explained by Nissenbaum (p. 583), "In having the power to share information discriminately, people are able to define the nature and degree of intimacy of various relationships."

Web Site Helps Police Track Down Stoughton Vandals
http://cbs4boston.com/topstories/local_story_011133721.html

AND

MySpace Not Exactly Private
http://dailybeacon.utk.edu/showarticle.php?articleid=49522

These two articles describe how the Stoughton Police Department (Massachusetts) used the network Myspace to identify three teenagers who posted pictures of their grafitti on their profiles. In this case, a government agency has caught criminals through surveillance. There are probably many people who would argue that an advanced version of this technique of surveillance is being applied by Homeland Security and the Information Awareness Office (DARPA) to prevent terrorist attacks. The Patriot Act has given broad powers to agencies who use surveillance. In any case, I think the police were innovative in their pursuit of the criminals. Using Myspace is a far cry from tracking a person's Google search behavior to prevent a crime though. These police officers did not prevent anything. I think that Myspace falls in the category of a public domain. Much like the example in Nessenbaum's article of "red sweater," an individual can not suppress the information they make available in a public space. In my opinion, following the one I presented above, an individual must be selective of the type of behavior they make available in the public arena. If you want to make some type of information available--then be prepared to take responsibility for it and put it in context!

Also, I believe that if this type of surveillance is continued and the police come to rely on it, they should be very careful to do other types of research on the individuals before arresting them. I believe, to be completely ethical, the police should have engaged in further investigation/surveillance of the individuals they suspected of creating the graffiti. Only after catching the individuals in the act of the crime should they arrested them. This would allow for an assurance that the Myspace profiles were legitimately created and maintained by the criminals and not by a third party attempting to remain unknown to the authorities. This leads to the next article.

Guess Who's Looking on Facebook
http://www.advancetitan.com/story.asp?issue=11218&story=4633

This article covers the previous ones posted here, but I find it very interesting that a certain group of George Washington University (GWU) students planned an event that police came to only to find "no alcohol, just 40 students with cake and cookies decorated with the word 'beer.'" Aside from anything humorous, this deception is very revealing. The nature of networks like Myspace and Facebook are typically considered to be maintained only by individuals who create credible sources of information (and so this connects to our readings a few weeks ago). But obviously, this example shows explicitly that the information can be deceptive to authorities. GWU Police Cheif Mike Melland says (quoted in the article), "It’s a good source of intelligence for illegal activity...I am unaware of any law enforcement that doesn’t use it—it’s common knowledge.” In my opinion, Melland has been proven wrong. This opens the very disconcerting issue of the production of misinformation. It also demands that police not solely rely on these types of networks for their surveillance. I do think the police were innovative in their attempts to stop illegal consumption of alcohol, but I think there are more traditional methods such as random checks of places where these types of activities commonly occur (like fraternity houses and dorm halls). But maybe now police department budgets fund better internet connections rather than pay for officers to be active social beings in their communities.



Friday, February 24, 2006

Interesting Article on Blackberries

"Bunsow also pointed to a number of critical users who would not be exempted — including hospitals, large government contractors, energy companies and financial institutions. Over the years, he said, BlackBerry use has become so prevalent that the device has become part of the country's infrastructure."


From: (2/24/2006)
http://news.yahoo.com/s/ap/20060224/ap_on_hi_te/blackberry_battle