Introduction 1

Total Page:16

File Type:pdf, Size:1020Kb

Introduction 1 NOTES Introduction 1. Rasha Abdullah, Egypt’s Media in the Midst of the Revolution (Washington, D.C.: Car ne gie Endowment for International Peace, 2014). 2. An Xiao Mina, “Hashtag Memes: Breaking the Single Story through Humour,” Al Jazeera, March 2013, http:// www . aljazeera . com / indepth / opinion / 2013 / 03 / 2013326132026281740 . html. 3. Ian Hutchby, “Technologies, Texts and Affordances,” Sociology 35, no. 2 (2001): 441–56; and Sandra K. Evans, Katy E. Pearce, Jessica Vitak, and Jeffrey W. Treem, “Explicating Affordances: A Conceptual Framework for Understanding Affordances in Communication Research,” Journal of Computer- Mediated Com- munication, December 2016. 4. Yochai Benkler, The Wealth of Networks: How Social Production Transforms Mar- kets and Freedom (New Haven, Conn.: Yale University Press, 2006). 5. Thomas Schelling, The Strategy of Conflict (Cambridge, Mass.: Harvard Univer- sity Press, 1960), 69; Medhi Shadmehr and Dan Bernhardt, “Collective Action with Uncertain Payoffs: Coordination, Public Signals, and Punishment Dilem- mas,” American Po litical Science Review 105, no. 4 (2011): 829–51. 6. David A. Snow, E. Burke Rochford, Steven K. Worden, and Robert D. Benford, “Frame Alignment Pro cesses, Micromobilization, and Movement Participa- tion,” American So cio log i cal Review 51, no. 4 (1986): 464–81, doi:10.2307/2095581; David A. Snow and Robert D. Benford, “Ideology, Frame Resonance, and Par- ticipant Mobilization,” International Social Movement Research 1, no. 1 (1988): 197–217; Robert D. Benford and David A. Snow, “Framing Pro cesses and Social Movements: An Overview and Assessment,” Annual Review of Sociology 26, no. 1 (2000): 611–39, doi:10.1146/annurev.soc.26.1.611. 7. Mancur Olson, The Logic of Collective Action: Public Goods and the Theory of Groups (Cambridge, Mass.: Harvard University Press, 1965); Pamela Oliver, Gerald 279 280 NOTES TO PAGES xxvi–10 Marwell, and Ruy Teixeira, “A Theory of the Critical Mass. I. Interdependence, Group Heterogeneity, and the Production of Collective Action,” American Jour- nal of Sociology 91, no. 3 (1985): 522–56. 8. Jennifer Earle, “Po liti cal Repression: Iron Fists, Velvet Gloves, and Diffuse Con- trol,” Annual Review of Sociology 37 (2011): 261–84. 9. An Xiao Mina, “#Hashtagging the Streets,” The Civic Beat, December 5, 2014, https:// medium . com / the - civic - beat / hashtagging - the - streets - 7fb8ca777076# . ru8632wdl. 10. Malcolm Gladwell, “Small Change,” New Yorker, October 4, 2010, http:// www . newyorker . com / magazine / 2010 / 10 / 04 / small - change - malcolm - gladwell. 11. Keith N. Hampton, Inyoung Shin, and Weixu Lu, “Social Media and Po liti cal Discussion: When Online Presence Silences Offline Conversation,” Informa- tion, Communication and Society 0, no. 0 (2016): 1–18. Chapter 1. A Networked Public 1. Benedict Anderson, Imagined Communities: Reflections on the Origin and Spread of Nationalism (London: Verso, 1991). 2. Meltem Ahiska, “Occidentalism: The Historical Fantasy of the Modern,” South Atlantic Quarterly 102, nos. 2–3 (2003): 351–79. 3. Anderson, Imagined Communities. 4. Anthony Giddens, The Consequences of Modernity (Stanford, Calif.: Stanford University Press, 1990). 5. Jürgen Habermas, The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society (Cambridge, Mass.: MIT Press, 1989). 6. Gerard A. Hauser, “Vernacular Dialogue and the Rhetoricality of Public Opin- ion,” Communication Monographs 65, no. 2 (1998): 83–107, doi:10.1080/0363775 9809376439.86. 7. Nancy Fraser, Rethinking the Public Sphere: A Contribution to the Critique of Actually Existing Democracy (Milwaukee: University of Wisconsin– Milwaukee, Center for Twentieth- Century Studies, 1990). 8. Habermas, Structural Transformation of the Public Sphere. 9. Manuel Castells, The Rise of the Network Society (Chichester: Wiley- Blackwell, 2011). 10. Jim Dwyer, “When Official Truth Collides with Cheap Digital Technology,” New York Times, July 30, 2008, http:// www . nytimes . com / 2008 / 07 / 30 / nyregion / 30 about . html. 11. Walter J. Ong, Orality and Literacy: The Technologizing of the Word (London: Methuen, 1982). 12. Michael Rapport, Year of Revolution (New York: Basic Books, 2008). 13 . Fraser, Rethinking the Public Sphere. 14. Miller McPherson, Lynn Smith- Lovin, and James M. Cook, “Birds of a Feather: Homophily in Social Networks,” Annual Review of Sociology 27 (2001): 415–44. 15. Anthony Giddens, Modernity and Self- Identity: Self and Society in the Late Mod- ern Age (Stanford, Calif.: Stanford University Press, 1991); Ulrich Beck and Mark NOTES TO PAGES 11–17 281 Ritter, Risk Society: Towards a New Modernity (London: Sage Publications, 1992); Harrison Rainie and Barry Wellman, Networked: The New Social Operating Sys- tem (Cambridge, Mass.: MIT Press, 2012). 16. Theda Skocpol and Vanessa Williamson, The Tea Party and the Remaking of Re- publican Conservatism (Oxford: Oxford University Press, 2012); Andreas Mades- tam, Daniel Shoag, Stan Veuger, and David Yanagizawa- Drott, “Do Po liti cal Protests Matter? Evidence from the Tea Party Movement,” Quarterly Journal of Economics 128, no. 4 (2013): 1633–85, doi:10.1093/qje/qjt021. 17. Madestam et al., “Do Po liti cal Protests Matter?” 18. Marc Lynch, Voices of the New Arab Public: Iraq, Al- Jazeera, and Middle East Poli- tics Today (New York: Columbia University Press, 2010). 19. Amnesty International, “Tunisia: Journalist Faces Imprisonment for Covering Gafsa Unrest,” February 2010, https:// www . amnesty . org / en / documents / mde30 / 006 / 2010 / en / . 20 . Eric Gobe, “The Gafsa Mining Basin between Riots and a Social Movement: Meaning and Significance of a Protest Movement in Ben Ali’s Tunisia” (work- ing paper, 2010), https:// halshs . archives - ouvertes . fr / halshs - 00557826. 21 . Jamai Al- Gasimi, “Ben Ali Rescues Facebook from Censorship,” Middle East Online, September 3, 2008, http:// www . middle - east - online . com / english / ? id = 27687. 22 . Evgeny Morozov, The Net Delusion: The Dark Side of Internet Freedom (New York: PublicAffairs, 2011); Evgeny Morozov, “From Slacktivism to Activism,” Foreign Policy, September 5, 2009, http:// foreignpolicy . com / 2009 / 09 / 05 / from - slacktivism - to - activism / . My criticism of The Net Delusion here is about the concept of slacktivism. There was much else about the book to recommend, though I found it too internet- centric in its analy sis of politics in the digital age. My full review can be found at Zeynep Tufekci, “Delusions Aside, the Net’s Potential Is Real,” Atlantic, January 12, 2011, http:// www . theatlantic . com / technology / archive / 2011 / 01 / delusions - aside - the - nets - potential - is - real / 69370 / . 23 . Doug McAdam and Ronnelle Paulsen, “Specifying the Relationship between Social Ties and Activism,” American Journal of Sociology 99, no. 3 (1993): 640– 67, doi:10.1086/230319. 24. Henry Farrell, “The Tech Intellectuals,” Democracy Journal 30 (2013), http:// democracyjournal . org / magazine / 30 / the - tech - intellectuals / . 25 . Tim Wu, “Book Review: ‘To Save Every thing, Click Here’ by Evgeny Morozov,” Washington Post, April 12, 2013, https:// www . washingtonpost . com / opinions / book - review - to - save - everything - click - here - by - evgeny - morozov / 2013 / 04 / 12 / 0e82400a - 9ac9 - 11e2 - 9a79 - eb5280c81c63 _ story . html ? utm _ term = . d0ab73ff3c64. 26 . For in- depth explorations of “real ity” in the digital age and online spaces, see pioneering work by Annette N. Markham, Life Online: Researching Real Expe- rience in Virtual Space, 1st ed. (Walnut Creek, Calif.: AltaMira Press, 1998); An- nette Markham and Nancy K. Baym, eds., Internet Inquiry: Conversations about Method, 1st ed. (Los Angeles: Sage, 2008); N. K. Baym, “The Emergence of 282 NOTES TO PAGES 18–27 Community in Computer- Mediated Interaction,” in Cyber society: Computer- Mediated Communication and Community, ed. S. G. Jones (Thousand Oaks, Calif.: Sage, 1995), 138–63. For the term “digital dualism” see Nathan Jurgen- son, “When Atoms Meet Bits: Social Media, the Mobile Web and Augmented Revolution,” Future Internet 4, no. 1 (2012): 83–91, doi:10.3390/fi4010083. 27. Racha Mourtada and Fadi Salem, “Facebook Usage: Factors and Analy sis” (Arab Social Media Report, Dubai School of Government, 2011), http:// unpan1 . un . org / intradoc / groups / public / documents / dsg / unpan044212 . pdf. 28 . Marc Lynch, The Arab Uprising: The Unfinished Revolutions of the New Middle East (New York: Public Affairs, 2012). 29. Rasha A. Abdulla, “The Revolution Will Be Tweeted,” The Cairo Review of Global Affairs, Special Report on the Internet, 2011, p. 3, http:// www . aucegypt . edu / GAPP / CairoReview / Pages / articleDetails . aspx ? aid = 89. 30. Ethan Zuckerman, “Cute Cats to the Rescue? Participatory Media and Po liti cal Expression,” 2013, http:// ethanzuckerman . com / papers / cutecats2013 . pdf. 31 . Mike Isaac, “Facebook Said to Create Censorship Tool to Get Back into China,” New York Times, November 22, 2016, http:// www . nytimes . com / 2016 / 11 / 22 / technology / facebook - censorship - tool - china . html. 32 . Mark S. Granovetter, “The Strength of Weak Ties,” American Journal of Sociol- ogy 78, no. 6 (1973): 1360–80. 33. Eytan Bakshy, Solomon Messing, and Lada A. Adamic, “Exposure to Ideologi- cally Diverse News and Opinion on Facebook,” Science 348, no. 6239 (2015): 1130, http:// science . sciencemag . org / content / 348 / 6239 / 1130. 34 . Michael Suk- Young Chwe, Rational Ritual: Culture, Coordination, and
Recommended publications
  • The Social Internet: Frustrating, Enriching, but Not Lonely
    Public Culture The Social Internet: Frustrating, Enriching, but Not Lonely Zeynep Tufekci The “lonely world of cyberspace” is a curious example of the vast gap that every so often opens between an idea’s popularity among pun- dits (considerable) and its basis in empirical research (very little). In the past few years the New York Times has run multiple op- eds suggesting social media or our phones are eroding human connections (for example, Cohen 2012; Egan 2013; Foer 2013; Franzen 2011; Fredrickson 2013); the Atlantic ran a cover story ask- ing, “Is Facebook Making Us Lonely?” (Marche 2012); Massachusetts Institute of Technology psychologist Sherry Turkle wrote a book titled Alone Together (2011) that is partly about social media damaging “real world” human connections; and Pope Benedict warned youngsters not to replace their real friends with virtual ones (Benedict XVI 2011, 2009). In the meantime, a growing pile of empirical research shows that, if anything, the relationship runs the other way — Internet users are more social and less isolated. This curious “Freddy Krueger effect” — the inability of data to kill the endur- ing attractiveness of a theme — deserves unpacking that goes beyond an indication of its lack of empirical basis and appeal to moral panic. The Internet’s integration into sociality happened with such impressive speed that it is at once mundane, all around us, and yet also barely examined. In addition, the Internet’s qualitative and subjective impacts are harder to measure than simple indicators like use or penetration. Further, a technology as multifaceted and complex as the Internet not only will not produce a “main effect” — a single, homogeneous impact that applies to everyone and every type of use — but it may well have different consequences at systemic, individual, and historical scales.
    [Show full text]
  • Opinion | Youtube, the Great Radicalizer - the New York Times 03/11/2018, 0924
    Opinion | YouTube, the Great Radicalizer - The New York Times 03/11/2018, 0924 SUNDAY REVIEW SUNDAY REVIEW | YouTube, the Great Radicalizer Please disable your ad blocker. Advertising helps fund Times journalism. YouTube, the Great Radicalizer By Zeynep Tufekci March 10, 2018 At one point during the 2016 presidential election campaign, I watched a bunch of videos of Donald Trump rallies on YouTube. I was writing an article about his appeal to his voter base and wanted to confirm a few quotations. Soon I noticed something peculiar. YouTube started to recommend and “autoplay” videos for me that featured white supremacist rants, Holocaust denials and other disturbing content. Since I was not in the habit of watching extreme right-wing fare on YouTube, I was curious whether this was an exclusively right-wing phenomenon. So I created another YouTube account and started watching videos of Hillary Clinton and Bernie Sanders, letting YouTube’s recommender algorithm take me wherever it would. https://www.nytimes.com/2018/03/10/opinion/sunday/youtube-politics-radical.html Page 1 of 5 Opinion | YouTube, the Great Radicalizer - The New York Times 03/11/2018, 0924 Before long, I was being directed to videos of a leftish conspiratorial cast, including arguments about the existence of secret government agencies and allegations that the United States government was behind the attacks of Sept. 11. As with the Trump videos, YouTube was recommending content that was more and more extreme than the mainstream political fare I had started with. Please disable your ad blocker. Advertising helps fund Times journalism. Intrigued, I experimented with nonpolitical topics.
    [Show full text]
  • Empirical Assessment of Risk Factors: How Online and Offline Lifestyle, Social Learning, and Social Networking Sites Influence Crime Victimization Ashley Bettencourt
    Bridgewater State University Virtual Commons - Bridgewater State University Master’s Theses and Projects College of Graduate Studies 12-2014 Empirical Assessment of Risk Factors: How Online and Offline Lifestyle, Social Learning, And Social Networking Sites Influence Crime Victimization Ashley Bettencourt Follow this and additional works at: http://vc.bridgew.edu/theses Part of the Criminology and Criminal Justice Commons Recommended Citation Bettencourt, Ashley. (2014). Empirical Assessment of Risk Factors: How Online and Offline Lifestyle, Social Learning, And Social Networking Sites Influence Crime Victimization. In BSU Master’s Theses and Projects. Item 10. Available at http://vc.bridgew.edu/theses/10 Copyright © 2014 Ashley Bettencourt This item is available as part of Virtual Commons, the open-access institutional repository of Bridgewater State University, Bridgewater, Massachusetts. Empirical Assessment of Risk Factors: How Online and Offline Lifestyle, Social Learning, and Social Networking Sites Influence Crime Victimization By: Ashley Bettencourt Thesis Submitted in fulfillment of the requirements for the degree of Master of Science in Criminal Justice in the Graduate College of Bridgewater State University, 2014 Bridgewater, Massachusetts Thesis Chair: Dr. Kyung-Shick Choi 2 Empirical Assessment of Risk Factors: How Online and Offline Lifestyle, Social Learning, and Social Networking Sites Influence Crime Victimization Thesis By Ashley Bettencourt Approved as to style and content by: ______________________________ Kyung-shick
    [Show full text]
  • Youtube, the Great Radicalizer, Zeynep Tufekci. New York Times, March 10, 2018
    YouTube, the Great Radicalizer, Zeynep Tufekci. New York Times, March 10, 2018. Zeynep Tufekci is an associate professor at the School of Information and Library Science at the University of North Carolina at Chapel Hill and the author of “Twitter and Tear Gas: The Power and Fragility of Networked Protest.” At one point during the 2016 presidential election campaign, I watched a bunch of videos of Donald Trump rallies on YouTube. I was writing an article about his appeal to his voter base and wanted to confirm a few quotations. Soon I noticed something peculiar. YouTube started to recommend and “autoplay” videos for me that featured white supremacist rants, Holocaust denials and other disturbing content. Since I was not in the habit of watching extreme right-wing fare on YouTube, I was curious whether this was an exclusively right-wing phenomenon. So I created another YouTube account and started watching videos of Hillary Clinton and Bernie Sanders, letting YouTube’s recommender algorithm take me wherever it would. Before long, I was being directed to videos of a leftish conspiratorial cast, including arguments about the existence of secret government agencies and allegations that the United States government was behind the attacks of Sept. 11. As with the Trump videos, YouTube was recommending content that was more and more extreme than the mainstream political fare I had started with. Intrigued, I experimented with nonpolitical topics. The same basic pattern emerged. Videos about vegetarianism led to videos about veganism. Videos about jogging led to videos about running ultramarathons. It seems as if you are never “hard core” enough for YouTube’s recommendation algorithm.
    [Show full text]
  • JULIAN ASSANGE: When Google Met Wikileaks
    JULIAN ASSANGE JULIAN +OR Books Email Images Behind Google’s image as the over-friendly giant of global tech when.google.met.wikileaks.org Nobody wants to acknowledge that Google has grown big and bad. But it has. Schmidt’s tenure as CEO saw Google integrate with the shadiest of US power structures as it expanded into a geographically invasive megacorporation... Google is watching you when.google.met.wikileaks.org As Google enlarges its industrial surveillance cone to cover the majority of the world’s / WikiLeaks population... Google was accepting NSA money to the tune of... WHEN GOOGLE MET WIKILEAKS GOOGLE WHEN When Google Met WikiLeaks Google spends more on Washington lobbying than leading military contractors when.google.met.wikileaks.org WikiLeaks Search I’m Feeling Evil Google entered the lobbying rankings above military aerospace giant Lockheed Martin, with a total of $18.2 million spent in 2012. Boeing and Northrop Grumman also came below the tech… Transcript of secret meeting between Julian Assange and Google’s Eric Schmidt... wikileaks.org/Transcript-Meeting-Assange-Schmidt.html Assange: We wouldn’t mind a leak from Google, which would be, I think, probably all the Patriot Act requests... Schmidt: Which would be [whispers] illegal... Assange: Tell your general counsel to argue... Eric Schmidt and the State Department-Google nexus when.google.met.wikileaks.org It was at this point that I realized that Eric Schmidt might not have been an emissary of Google alone... the delegation was one part Google, three parts US foreign-policy establishment... We called the State Department front desk and told them that Julian Assange wanted to have a conversation with Hillary Clinton...
    [Show full text]
  • Council of Europe Study Algorithms and Human Rights
    DGI(2017)12 STUDY ON THE HUMAN RIGHTS DIMENSIONS OF AUTOMATED DATA PROCESSING TECHNIQUES (IN PARTICULAR ALGORITHMS) AND POSSIBLE REGULATORY IMPLICATIONS PREPARED BY THE COMMITTEE OF EXPERTS ON INTERNET INTERMEDIARIES (MSI-NET) ALGORITHMS AND HUMAN RIGHTS Study on the human rights dimensions of automated data processing techniques and possible regulatory implications English edition The opinions expressed in this work are the responsibility of the authors and do not necessarily reflect the official policy of the Council of Europe. All rights reserved. No part of this publication may be translated, reproduced or transmitted in any form or by any means without the prior permission in writing from the Directorate of Communications (F-67075 Strasbourg Cedex or [email protected]). Cover page photo: Shutterstock Published by the Council of Europe F-67075 Strasbourg Cedex, www.coe.int © Council of Europe, March 2018 Council of Europe study Algorithms and Human Rights TABLE OF CONTENTS COMPOSITION OF THE MSI-NET ............................................................. 2 I. INTRODUCTION .............................................................................. 3 II. THE SCOPE OF THE STUDY .............................................................. 5 1. AUTOMATION ................................................................................................ 5 2. DATA ANALYSIS ............................................................................................ 6 3. ADAPTABILITY..............................................................................................
    [Show full text]
  • Lessons and Recommendations from the 2020 General Election
    S T R E N G T H E N I N G O U R E L E C T I O N S A N D P R E V E N T I N G E L E C T I O N C R I S E S : Lessons and Recommendations from the 2020 General Election Executive Summary The 2020 election was defined by paradox and contradiction. Thanks to millions of poll workers, election officials, and citizens who stepped up to make our democracy work, the election was secure and free from systemic or significant fraud. A record 160 million Americans voted and had their voices heard. Yet still, voter intimidation and racial disparities in access to the ballot continued, our election system was revealed to be aging and unnecessarily confusing, Americans weathered a wave of disinformation and, of course, there were unprecedented efforts to delegitimize and overturn the election results—ultimately leading to a crisis the likes of which we’ve not experienced in modern history. In the end, Congress counted all of the electoral votes, but only after President Trump sought to both coerce federal and state officials to overturn the results, and incited a violent insurrection. This attack on our democracy culminated with white supremacist rioters attacking the Capitol seeking to not only overturn the Constitutional order, but also to take hostages and assassinate members of Congress and the Vice President. While American democracy has survived this crisis so far, we will only be able to prevent the next one if we both 1) ensure accountability for all those who incited, abetted, and participated in the insurrection, and 2) adopt preventative reforms based on the lessons we learned in this election.
    [Show full text]
  • Regulating Electronic Identity Intermediaries: the Soft Eid Conundrum
    Regulating Electronic Identity Intermediaries: The "Soft elD" Conundrum TAL Z. ZARSKY* & NORBERTO NuNo GOMES DE ANDRADEt TABLE OF CONTENTS 1. INTRODUCTION: THE RISE OF THE DIGITAL IDENTITY INTERMEDIARY .......................................... 1336 II. IDENTITY INTERMEDIATION: "HARD" EIDS/"SOFT" EIDS...............1342 A. From IDs to elDs ......................... ....1 342 B. Soft eiDs: Definitions, Roles, and Tasks .............. 1345 1. Incidental .......................... ...... 1346 2. Remote Verification ................... ...... 1348 3. Lightly RegulatedIndustries .............. ..... 1348 III. SOFT EIDs: COMMON VARIATIONS AND KEY EXAMPLES ............... 1349 A. The Ipse/Idem Distinction ........................ 1349 B. Real Names Versus Stable Pseudonyms .............. 1351 1. Real Name IDs ............................. 1351 a. Mandatory Versus Voluntary? ...................1352 b. Verification Methods ...........................1353 c. Real Name elDs: Unique Benefits and Uses............. 1354 2. Stable Pseudonyms ..................... ..... 1357 IV. THE BENEFITS AND PITFALLS OF SOFT EID INTERMEDIATION ......................................... 1359 A. The Benefits of Soft elDs: Economic, Personal, and Social .................................. 1359 B. Identity-Related Harms and Soft Identity Intermediaries .................................. 1362 1. Identity, "Virtual Identity" Theft andFraud, and the PossibleRole and Responsibility of the Intermediary. ............................... 1363 2. Virtual PropertyRights, Publicity,
    [Show full text]
  • Alexis Lothian | [email protected] | 310-436-5727 Writing Sample
    Alexis Lothian | [email protected] | 310-436-5727 Writing Sample Submission to International Journal of Cultural Studies Submitted September 8, 2011 Archival Anarchies: Online Fandom, Subcultural Conservation, and the Transformative Work of Digital Ephemera Abstract: This essay explores the politics of digital memory and traceability, drawing on Jacques Derrida’s Archive Fever and on queer theories of performance and ephemerality. Its primary example is the Organization for Transformative Works, a successful advocacy group for creative media fans whose main project has been an online fan fiction archive. I am concerned both with this public face and with the activities that fans would prefer to keep out of the official record. For scholars of subcultural artistic and cultural production, the mixed blessings of conservation and legitimacy are necessary considerations for the archiving and meaning-making work of cultural theory. Paying attention to the technological and social specificities that contextualize fandom as a digital archive culture, I trace contradictions and contestations around what fannish and scholarly archivable content is and should be: what’s trivial, what’s significant, what legally belongs to whom, and what deserves to be preserved. Keywords: subculture, fandom, archive, ephemera, memory, digital, queer Word count: 8,053 including all notes and references Lothian 2 1. Introduction: Legitimacy [W]hat is no longer archived in the same way is no longer lived in the same way. (Derrida 1996: 18) In 2011, Google’s decision to delete apparently pseudonymous accounts on its new social networking service, Google Plus, caused enormous online controversy. The hashtag #nymwars indexed online disagreements over whether individuals’ participation in online social networking should be connected to the names on their credit cards.
    [Show full text]
  • February 2021 PDC Newsletter
    Newsletter of the Pass Democratic Club—February 2021 Visit the Pass Democratic Club website: www.passdems.org and the Pass Democratic Club on Facebook and Twitter (@DemocraticPass) We’re sending postcards to voters who live in the districts of the Sedition Caucus members, starting with the seven Californians - House Republican Leader Kevin McCarthy and Congressmen Mike Garcia, Doug LaMalfa, Jay Obernolte, Devin Nunes, Ken Calvert, and Darrell Issa. These men betrayed their oath to defend the U.S. Constitution against enemies foreign and domestic. Voters in these districts need to know how extreme their representatives have become. https://www.mobilize.us/flipthewest/event/370202/ President Biden’s Executive Actions https://www.whitehouse.gov/briefing-room/presidential-actions/ BUT OTHER THAN THAT...A LITANY OF TRUMP SINS http://passdems.org/2021/02/but-other-than-that/ Don't forget to pay your 2021 Membership Dues Please pay your dues at www.passdems.org or mail check now to P.O. Box 724, Banning 92220 Democrats of the Desert are pleased to announce that Dr. th Raul Ruiz, 36 Congressional District, will join their virtual meeting this Saturday, February 27. They are inviting all Democrats in this region to join them. Register here: https://myemail.constantcontact.com/OnZoom-Meeting-this -Saturday.html?soid=1103123348260&aid=5EjDH6DlfM8 America’s Next Authoritarian Will Be Much More Competent Trump was ineffective and easily beaten. A future strongman won’t be. NOVEMBER 7, 2020, Zeynep Tufekci Now that Joe Biden has won the presidency, we can expect debates over whether Donald Trump was an aber- ration (“not who we are!”) or another instantiation of America’s pathologies and sins.
    [Show full text]
  • Social Media Monopolies and Their Alternatives 2
    EDITED BY GEERT LOVINK AND MIRIAM RASCH INC READER #8 The Unlike Us Reader offers a critical examination of social media, bringing together theoretical essays, personal discussions, and artistic manifestos. How can we understand the social media we use everyday, or consciously choose not to use? We know very well that monopolies control social media, but what are the alternatives? While Facebook continues to increase its user population and combines loose privacy restrictions with control over data, many researchers, programmers, and activists turn towards MIRIAM RASCH designing a decentralized future. Through understanding the big networks from within, be it by philosophy or art, new perspectives emerge. AND Unlike Us is a research network of artists, designers, scholars, activists, and programmers, with the aim to combine a critique of the dominant social media platforms with work on ‘alternatives in social media’, through workshops, conferences, online dialogues, and publications. Everyone is invited to be a part of the public discussion on how we want to shape the network architectures and the future of social networks we are using so intensely. LOVINK GEERT www.networkcultures.org/unlikeus Contributors: Solon Barocas, Caroline Bassett, Tatiana Bazzichelli, David Beer, David M. Berry, Mercedes Bunz, Florencio Cabello, Paolo Cirio, Joan Donovan, EDITED BY Louis Doulas, Leighton Evans, Marta G. Franco, Robert W. Gehl, Seda Gürses, Alexandra Haché, Harry Halpin, Mariann Hardey, Pavlos Hatzopoulos, Yuk Hui, Ippolita, Nathan Jurgenson, Nelli Kambouri, Jenny Kennedy, Ganaele Langlois, Simona Lodi, Alessandro Ludovico, Tiziana Mancinelli, Andrew McNicol, Andrea Miconi, Arvind Narayanan, Wyatt Niehaus, Korinna Patelis, PJ Rey, Sebastian SOCIAL MEDIA MONOPOLIES Sevignani, Bernard Stiegler, Marc Stumpel, Tiziana Terranova, Vincent Toubiana, AND THEIR ALTERNATIVES Brad Troemel, Lonneke van der Velden, Martin Warnke and D.E.
    [Show full text]
  • From Protest to Reform a Study of Social Movements’ Success Contents
    From protest to reform A study of social movements’ success Contents Introduction 4 About this report 7 At a glance: selected features of social movements 8 Setting the context: what triggers 9 protest movements? Armenia’s Velvet Revolution (2018) 9 Pro-impeachment protests in Brazil (2015-2016) 10 The October Revolution in Lebanon (2019) 11 End SARS protests in Nigeria (2020) 12 There’s no success like failure: 13 debunking spontaneity The risks and pitfalls of leaderlessness 17 and over-reliance on strong leadership Measuring success and failure 24 Conclusions 30 2 Foreword From the Jasmine Revolution in Tunisia to military coup in Myanmar, undermining civil the Taksim protests in Turkey and the Maidan disobedience and nonviolent resistance. protests in Ukraine, social upheavals can gain strength seemingly suddenly, often around Sometimes, the threat to a protest movement’s a single event, and then go on to challenge success comes from within. When movement deeply entrenched power structures. leadership is weak, or overly rigid and centralised, movements have a hard time What makes these protests so powerful is realising their goals. Equally, when movement activists’ and movement members’ willingness structures are not built for the long haul, it to risk life and liberty in their urgent desire to becomes hard to build and sustain momentum work against— against an oppressive regime, for lasting political change. discriminatory legislation, or a systemic lack of justice. But after these early chaotic moments, Importantly, even when protests “succeed”, disruptive movements too often fade away long-term reforms are not a given. Activists can without creating the long-term changes that lack a long-term vision for change which goes they sought.
    [Show full text]