Constitutive Surveillance and Social Media’, in Hunsinger, J., Allen

Total Page:16

File Type:pdf, Size:1020Kb

Constitutive Surveillance and Social Media’, in Hunsinger, J., Allen Constitutive Surveillance and Social Media by Ryan Tippet A thesis submitted for the degree of Doctor of Philosophy at the University of Otago New Zealand ABSTRACT Starting from the premise that surveillance is the ‘dominant organising practice’ of our time (Lyon et al 2012: 1), this thesis establishes a framework of ‘constitutive surveillance’ in relation to social media, taking Facebook as its key example. Constitutive surveillance is made up of four forms: economic, political, lateral, and oppositional surveillance. These four surveillance forms – and the actors who undertake them – intersect, compound, and confront one another in the co-production of social media spaces. The framework of constitutive surveillance is structured around a Foucauldian understanding of power, and the thesis shows how each surveillance form articulates strategies of power for organising, administering, and subjectifying populations. After outlining the four surveillance forms, each chapter unpacks the relationship of one form to social media, building throughout the thesis an extensive critical framework of constitutive surveillance. i ii ACKNOWLEDGEMENTS Thanks first of all to my supervisor, Dr Brett Nicholls, for his insight, support, and guidance on this project, which was invaluable in helping me to identify and pursue some of the thesis’ most interesting questions and ideas. Thank you also to my many inspiring postgraduate colleagues in the Department of Media, Film and Communication, especially George, Paul, Chloe, Chris, Lewis, Edmund, Kevin, Thaera, Massi, David, and Alex. And to Peter – your bottomless reserve of cheer and goodwill will always be missed, and never forgotten. Thanks to other department faculty, past and present, for your generous feedback and support, especially Holly, Rosie, Anne, and Vijay. A special shout-out must be made to my self-anointed ‘best friend’, Amie, whose infectious good nature filled the postgraduate suite with (obnoxious) laughter and (off- colour) humour. Personal thanks to mum and dad, and to Simon and Sylvie, for your unquestioning support and understanding, and equally to friends who have sat through presentation rehearsals and proofed draft papers. Thanks most of all, of course, to Ellena, without whom I’m not sure where I’d be – but probably not finishing this thesis. Thank you for your love, support, understanding, patience, your gentle reminders, and your belief. iii TABLE OF CONTENTS Abstract ................................................................................................................................ i Acknowledgements ............................................................................................................ iii Table of Contents ............................................................................................................... iv List of Figures .................................................................................................................... vi Introduction ......................................................................................................................... 1 1 | Economic Surveillance ................................................................................................. 22 1.1 | Foucault, Deleuze, and Economic Surveillance ..................................................... 25 1.1.1 | Power, Governmentality, Neoliberalism ......................................................... 26 1.1.2 | Control and Assemblage ................................................................................. 40 1.1.3 | Critiques of Economic Surveillance ................................................................ 58 1.1.4 | Logics of Economic Surveillance .................................................................... 80 1.2 | Constitutive Economic Surveillance ..................................................................... 85 1.2.1 | Assemblage ..................................................................................................... 90 1.2.2 | Capitalisation ................................................................................................. 101 1.2.3 | Dividuation .................................................................................................... 117 1.2.4 | Modulation ................................................................................................... 123 1.2.5 | Simulation .................................................................................................... 134 1.3 | Economic Surveillance Expansion ...................................................................... 146 1.3.1 | Internet.org ................................................................................................... 149 1.3.2 | Economic Surveillance Logics of Internet.org .............................................. 157 Conclusion ................................................................................................................... 171 2 | Political Surveillance .................................................................................................. 174 2.1 | Categories of Risk and Exclusion on Social Media .............................................. 176 2.1.1 | Security & Biopolitics .....................................................................................178 2.1.2 | Bare Life & Risk ............................................................................................ 194 2.1.3 | The Snowden Revelations ............................................................................ 214 2.1.4 | Logics of Political Surveillance ..................................................................... 228 iv 2.2 | Constitutive Political Surveillance ...................................................................... 233 2.2.1 | Biopolitical Suspicion ................................................................................... 235 2.2.2 | Exceptional Veridiction................................................................................ 249 2.2.3 | Hegemonic Insecurity .................................................................................. 264 2.2.4 | Public-Private Assemblage .......................................................................... 272 2.2.5 | Simulative Risk management ...................................................................... 276 2.3 | Political and Economic Surveillance .................................................................. 283 Conclusion .................................................................................................................. 288 3 | Lateral Surveillance ................................................................................................... 292 3.1 | Locating the Panopticon in Modern Surveillance ............................................... 295 3.1.1 | The Panopticon ............................................................................................. 296 3.1.2 | Confession, Consumption, and Synopticism ................................................ 309 3.1.3 | Lateral Surveillance Theory .......................................................................... 322 3.2 | Constitutive Lateral Surveillance........................................................................ 334 3.2.1 | Watching on Facebook ................................................................................. 336 3.2.2 | Being Watched on Facebook ........................................................................ 347 3.3 | Political and Economic Uses of Lateral Surveillance ......................................... 362 Conclusion .................................................................................................................. 365 4 | Oppositional Surveillance ......................................................................................... 369 4.1 | Everyday Resistance to Surveillance ................................................................... 374 4.1.1 | Power, Resistance, and the Everyday ........................................................... 376 4.1.2 | Theorising Oppositional Surveillance .......................................................... 389 4.2 | Constitutive Oppositional Surveillance .............................................................. 414 4.2.1 | User Opposition ............................................................................................ 414 4.2.2 | Platform Modulation.................................................................................... 431 Conclusion .................................................................................................................. 437 Conclusion ...................................................................................................................... 441 References list ..................................................................................................................451 v LIST OF FIGURES Figure 1: A cropped promotional example of a peer-to-peer payment made over Facebook Messenger......................................................................................................... 93 Figure 2: Facebook's authorization API allows third party services such as Duolingo to tap into its social map. Google offers the same option through its own platform. .......... 98 Figure 3: Facebook's profile page invites the user to add more information. ............. 106 Figure 4: A banner on Facebook reminds the user to update their profile information. .......................................................................................................................................
Recommended publications
  • State of Mobile Data 2019 Report by Nendo
    A Nendo Publication THE STATE OF MOBILE DATA 2019 Context, Consumption, Control Contents ACKNOWLEDGEMENTS 03 CONSUMPTION CONTROL BACKGROUND 03 THE 5 S'S OF KENYAN INTERNET USE 24 SOFTWARE 39 THE ATTENTION ECONOMY 04 MINIMISING USAGE 39 SEARCH 25 THE 3 C'S OF THE INTERNET 04 MONITORING 42 SOCIAL 26 ZERO-RATING 42 SPORT 27 CONTEXT WI-FI AND ALTERNATIVE MEANS OF 44 SEX 28 CONNECTIVITY THE MOBILE PHONE AND THE 10 STORIES 28 INFORMATION SUPERHIGHWAY LITE-APPS OVER FULL APPS 46 IN THE BEGINNING WAS THE CYBER CAFÉ 10 INTERNET & MOBILE DATA BUNDLE 30 SWITCHING TO ANDROID GO-EDITION 46 THE MODERN CYBER CAFÉ - TYPE, 12 PRICING - AFFORDABILITY AND 30 TRANSSION & BOOMPLAY 47 REGISTER, PRINT OPTIONS IS THE WEB OPTIMISED FOR 48 BILLING & BYTES: THE CYBER CAFÉ VS 13 THE COST OF ACCESS 31 PREMIUM EXPERIENCES RATHER THE SMARTPHONE ADVERTISING TECHNOLOGY’S 35 THAN MEGABYTECONSTRAINTS? SMARTPHONES, FEATURE PHONES & 13 CONSUMING EFFECT ON MEGABYTES IN BASIC PHONES KENYA RECOMMENDATIONS HOW SMARTPHONES WORK 18 CAVEAT 50 HOW MANY KENYANS ARE ON THE 09 DISCLOSURES 53 INTERNET? END NOTES 54 State of Mobile Data 2019: Introduction 02 About Author Acknowledgements Mark Kaigwa is the Founder of Nendo - a digital My appreciation goes to Wanjiru Kaigwa for her growth consultancy delivering Advisory, Academy support in bringing this report to life and being a and Agency services. As a speaker, he has travelled sounding board throughout the writing process. My to over 37 countries around the world in a quest to thanks to Makena Onjerika for her editorial deliver projects, workshops and insights about assistance.
    [Show full text]
  • A Public Accountability Defense for National Security Leakers and Whistleblowers
    A Public Accountability Defense For National Security Leakers and Whistleblowers The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Yochai Benkler, A Public Accountability Defense For National Security Leakers and Whistleblowers, 8 Harv. L. & Pol'y Rev. 281 (2014). Published Version http://www3.law.harvard.edu/journals/hlpr/files/2014/08/ HLP203.pdf Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:12786017 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Open Access Policy Articles, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#OAP A Public Accountability Defense for National Security Leakers and Whistleblowers Yochai Benkler* In June 2013 Glenn Greenwald, Laura Poitras, and Barton Gellman be- gan to publish stories in The Guardian and The Washington Post based on arguably the most significant national security leak in American history.1 By leaking a large cache of classified documents to these reporters, Edward Snowden launched the most extensive public reassessment of surveillance practices by the American security establishment since the mid-1970s.2 Within six months, nineteen bills had been introduced in Congress to sub- stantially reform the National Security Agency’s (“NSA”) bulk collection program and its oversight process;3 a federal judge had held that one of the major disclosed programs violated the
    [Show full text]
  • September 15, 2014 Dear Members of Congress, We, the Undersigned
    September 15, 2014 Dear Members of Congress, We, the undersigned civil liberties advocates, organizations, and whistleblowers, are alarmed that Senator Leahy's recently introduced bill, the USA FREEDOM Act (S. 2685), legalizes currently illegal surveillance activities, grants immunity to corporations that collaborate to violate privacy rights, reauthorizes the PATRIOT Act for an additional 2.5 years, and fails to reform EO 12333 or Section 702, other authorities used to collect large amounts of information on Americans. For these reasons, we encourage both the House and the Senate to oppose this legislation in its current form. Governmental security agencies' zeal for collecting Americans' personal information without regard for cost, efficacy, legality, or public support necessitates that Congress act to protect the rights of residents across the United States and around the globe. Our fundamental civil rights – the human rights we hold dear – are not adequately protected by either the Senate or House versions of the USA FREEDOM Act. The reckless actions of top officials charged with ensuring national security – from lying to Congress to secretly weakening security standards to hacking the communications of our allies – has undermined global confidence that the United States can act as an ethical Internet steward. The 11th-hour gutting of the USA FREEDOM Act in the House of Representatives and the CIA’s recent illegal spying on the U.S. Senate underscore just how powerful and out of control this surveillance regime has become. Time and again, these agencies have relied on aggressive manipulation of legal loopholes to thoroughly undermine safeguards and checks and balances. As just one example of why clarity in law is now necessary, the collection of information on all domestic phone calls was justified under the “relevancy” standard in the PATRIOT Act.
    [Show full text]
  • 1- 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
    1 ELECTRONIC FRONTIER FOUNDATION CINDY COHN (145997) 2 [email protected] LEE TIEN (148216) 3 [email protected] KURT OPSAHL (191303) 4 [email protected] KEVIN S. BANKSTON (217026) 5 [email protected] CORYNNE MCSHERRY (221504) 6 [email protected] JAMES S. TYRE (083117) 7 [email protected] 454 Shotwell Street 8 San Francisco, CA 94110 Telephone: 415/436-9333 9 415/436-9993 (fax) 10 TRABER & VOORHEES BERT VOORHEES (137623) 11 [email protected] THERESA M. TRABER (116305) 12 [email protected] 128 North Fair Oaks Avenue, Suite 204 13 Pasadena, CA 91103 Telephone: 626/585-9611 14 626/ 577-7079 (fax) Attorneys for Plaintiffs 15 [Additional counsel appear following the signature page.] 16 17 UNITED STATES DISTRICT COURT 18 NORTHERN DISTRICT OF CALIFORNIA 19 TASH HEPTING, GREGORY HICKS, ) No. C-06-0672-VRW 20 CAROLYN JEWEL and ERIK KNUTZEN on ) Behalf of Themselves and All Others Similarly ) CLASS ACTION 21 Situated, ) ) DECLARATION OF MARK KLEIN IN 22 Plaintiffs, ) SUPPORT OF PLAINTIFFS’ MOTION FOR ) PRELIMINARY INJUNCTION 23 vs. ) ) Date: June 8, 2006 24 AT&T CORP., AT&T INC. and DOES 1-20, ) Time: 2:00 p.m. inclusive, ) Court: Courtroom 6, 17th Floor 25 ) Judge: The Hon. Vaughn R. Walker, Defendants. ) 26 ) Chief United States District Judge 27 [REDACTED] 28 DECLARATION OF MARK KLEIN C-06-0672-VRW -1- 1 I, Mark Klein, declare under penalty of perjury that the following is true and correct: 2 1. I am submitting this Declaration in support of Plaintiffs' Motion for a 3 Preliminary Injunction. I have personal knowledge of the facts stated herein, unless stated 4 on information and belief, and if called upon to testify to those facts I could and would 5 competently do so.
    [Show full text]
  • Zero-Rating Practices in Broadband Markets
    Zero-rating practices in broadband markets Report by Competition EUROPEAN COMMISSION Directorate-General for Competition E-mail: [email protected] European Commission B-1049 Brussels [Cataloguenumber] Zero-rating practices in broadband markets Final report February 2017 Europe Direct is a service to help you find answers to your questions about the European Union. Freephone number (*): 00 800 6 7 8 9 10 11 (*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you). LEGAL NOTICE The information and views set out in this report are those of the author(s) and do not necessarily reflect the official opinion of the Commission. The Commission does not guarantee the accuracy of the data included in this study. Neither the Commission nor any person acting on the Commission’s behalf may be held responsible for the use which may be made of the information contained therein. Les informations et opinions exprimées dans ce rapport sont ceux de(s) l'auteur(s) et ne reflètent pas nécessairement l'opinion officielle de la Commission. La Commission ne garantit pas l’exactitude des informations comprises dans ce rapport. La Commission, ainsi que toute personne agissant pour le compte de celle-ci, ne saurait en aucun cas être tenue responsable de l’utilisation des informations contenues dans ce rapport. More information on the European Union is available on the Internet (http://www.europa.eu). Luxembourg: Publications Office of the European Union, 2017 Catalogue number: KD-02-17-687-EN-N ISBN 978-92-79-69466-0 doi: 10.2763/002126 © European Union, 2017 Reproduction is authorised provided the source is acknowledged.
    [Show full text]
  • Mobile Zero Rating: the Economics and Innovation Behind Free Data
    Mobile Zero Rating: The Economics and Innovation Behind Free Data BY DOUG BRAKE | MAY 2016 Zero-rating programs, which allow consumers to access certain Internet The FCC should content and services without it counting against their monthly data plans, announce that have proven polarizing, being met with reactions ranging from derision to nonexclusive zero- praise. The crux of the controversy is whether the practice of zero rating rating programs are in violates the spirit of network neutrality principles. Strictly speaking, zero- the public interest. rated data is treated differently than other data in a way that influences consumer behavior. But adhering to such a strict interpretation of net neutrality would be misguided. Zero-rating products are unlikely to harm the open Internet; instead they are a sign of healthy product differentiation that more efficiently allocates scarce resources in a competitive market, ultimately improving consumer value. The Federal Communications Commission—along with other regulators around the world—is examining zero rating, and while its case-by-case approach to overseeing these programs is sound, telecom regulators should make it clear that they believe nonexclusive zero-rating programs are in the public interest. INTRODUCTION Mobile carriers across the world have been rolling out what are called zero-rated or free data products, which allow consumers to access to certain Internet traffic without it counting against their monthly data plan. The motivations for these services vary in different markets, but, at least in the United States, mobile carriers are trying to differentiate their services in a competitive fight over who can best meet consumers’ ever-increasing demand for streaming video.
    [Show full text]
  • Statement of Condemnation of U.S. Mass-Surveillance Programs, and a Reminder of Our Ethical Responsibilities As Computer Scientists
    Statement of Condemnation of U.S. Mass-Surveillance Programs, and a Reminder of Our Ethical Responsibilities as Computer Scientists We have all been hearing about the NSA’s mass-surveillance programs, which go by names like PRISM, BULLRUN, Boundless Informant, and X-Keyscore. The extent of these systems, and of corporate cooperation in U.S. mass-surveillance efforts, have been made public due to disclosures by whistle-blowers like William Binney, Mark Klein, and Edward Snowden, and by authors/journalists like James Bamford, Siobhan Gorman, and Glenn Greenwald. As a scientist who has spent his career studying cryptography—the “mathematical” study of privacy and security—I herein condemn and assert my repugnance of the USA’s mass- surveillance programs, and those of all other countries. Mass-surveillance is intimidating, abuse-prone, and anti-democratic. It is likely to engender a dystopian future. I assert that: Surveillance data should be collected only on specific targets and for specific cause; entire populations should never be surveilled. It is contrary to the ethical obligations of cryptographers, computer scientists, and engineers to participate in the development of technologies for mass surveillance. It is also a violation of professional codes of conduct. It is contrary to corporate responsibility for a company to develop, sell, or support systems, either hardware or software, intended for mass surveillance. Cryptographic protections must never be intentionally subverted by bulk provisioning of private keys or plaintexts to any authority. If such compromise is ordered by a court, users must be informed. If the court order forbids disclosure, it lacks ethical legitimacy.
    [Show full text]
  • Boosting Sales with Social Media
    BOOSTING SALES WITH SOCIAL MEDIA Planning a Social Media Campaign Social Trends Globally Social Trends Globally Social Trends Globally Social Trends Globally Your plan answers... WHO WHAT Who is the target for What can you do now? your campaign or offer? Content planning WHERE WHEN Channels you are going Your timeline for to use to communicate getting the message out your message HOW What tactics are going to be employed to get you the results you want and need. Summer 2020 Campaign OVERALL GOAL: Generate 100 Sales for our Activity Centre (Epic Adventures) by the end of July and total revenue of €5000 ▪ The offer – 3 offers targeted at different personas ▪ Define the budget for this campaign - €600 for paid promotion ▪ Who you are targeting - 24-34 couples / families ▪ What content is required: great outdoors / fun & adventure / packages / testimonials ▪ Where to publish / promote your content: Instagram / Facebook ▪ When? 1 week prepare, 3-week ad campaign ▪ How – Paid campaign, organic posting WHERE Social Trends in Ireland Since 2017 up 7% up 7% up 5% up 15% WHO Example of a Persona Late 20’s couple who’ve been living at home saving for a mortgage. Or a group of friends ▪ Know now? Need to get out of the house! ▪ Tomorrow? What will they be able to do? Safety? ▪ Location - top level info on attractions in the area. ▪ Blocker? Will things be open? Cancellation policy? ▪ Emotion? Boredom ▪ Platform? Instagram Persona Builder Template is available as a download with this video WHAT Content that would appeal WHAT Content that would appeal
    [Show full text]
  • SURVEILLE NSA Paper Based on D2.8 Clean JA V5
    FP7 – SEC- 2011-284725 SURVEILLE Surveillance: Ethical issues, legal limitations, and efficiency Collaborative Project This project has received funding from the European Union’s Seventh Framework Programme for research, technological development and demonstration under grant agreement no. 284725 SURVEILLE Paper on Mass Surveillance by the National Security Agency (NSA) of the United States of America Extract from SURVEILLE Deliverable D2.8: Update of D2.7 on the basis of input of other partners. Assessment of surveillance technologies and techniques applied in a terrorism prevention scenario. Due date of deliverable: 31.07.2014 Actual submission date: 29.05.2014 Start date of project: 1.2.2012 Duration: 39 months SURVEILLE WorK PacKage number and lead: WP02 Prof. Tom Sorell Author: Michelle Cayford (TU Delft) SURVEILLE: Project co-funded by the European Commission within the Seventh Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services) Commission Services) Executive summary • SURVEILLE deliverable D2.8 continues the approach pioneered in SURVEILLE deliverable D2.6 for combining technical, legal and ethical assessments for the use of surveillance technology in realistic serious crime scenarios. The new scenario considered is terrorism prevention by means of Internet monitoring, emulating what is known about signals intelligence agencies’ methods of electronic mass surveillance. The technologies featured and assessed are: the use of a cable splitter off a fiber optic backbone; the use of ‘Phantom Viewer’ software; the use of social networking analysis and the use of ‘Finspy’ equipment installed on targeted computers.
    [Show full text]
  • Schuchardt V. Obama
    Case 2:14-cv-00705-CB Document 19 Filed 11/24/14 Page 1 of 30 IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF PENNSYLVANIA ELLIOTT J. SCHUCHARDT, CIVIL DIVISION individually and doing business as the Schuchardt Law Firm, on behalf Case No. 2:14-cv-00705-CB of himself and all others similarly situated, COMPLAINT – CLASS ACTION Plaintiffs, v. CLAIM OF UNCONSTITUTIONALITY BARACK H. OBAMA, in his capacity as President of the United States; JAMES JURY TRIAL DEMANDED R. CLAPPER, in his official capacity as Director of National Intelligence; ADM. MICHAEL S. ROGERS, in his official capacity as Director of the National Security Agency and Chief of the Central Security Service; and JAMES B. COMEY, in his official capacity as Director of the Federal Bureau of Investigation, Defendants. SECOND AMENDED COMPLAINT The Plaintiff, Elliott J. Schuchardt, individually and doing business as the Schuchardt Law Firm, files this Amended Complaint against the above-captioned Defendants, on behalf of himself and all those similarly situated. Parties 1. The Plaintiff, Elliott J. Schuchardt, is an attorney having an office located at United States Steel Building, Suite 660, 600 Grant Street, Pittsburgh, PA 15219. 2. Defendant Barack H. Obama is President of the United States. As such, he has ultimate authority over the actions of the United States federal government. President Obama maintains an address at The White House, 1600 Pennsylvania Avenue, Washington, DC 20500. Case 2:14-cv-00705-CB Document 19 Filed 11/24/14 Page 2 of 30 3. Defendant James R. Clapper is the Director of National Intelligence (“DNI”).
    [Show full text]
  • Big Data Surveillance and Security Intelligence the Canadian Case
    Big Data Surveillance and Security Intelligence The Canadian Case Edited by David Lyon and David Murakami Wood Sample Material © UBC Press 2021 © UBC Press !"!# All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without prior written permission of the publisher. Library and Archives Canada Cataloguing in Publication Title: Big data surveillance and security intelligence : the Canadian case / edited by David Lyon and David Murakami Wood. Names: Lyon, David, editor. | Wood, David Murakami, editor. Description: Includes bibliographical references and index. Identi$ers: Canadiana (print) !"!""%%%#&% | Canadiana (ebook) !"!""%%%''( | ISBN )('"((&'*&#(* (hardcover) | ISBN )('"((&'*&#)" (PDF) | ISBN )('"((&'*&!"* (EPUB) Subjects: LCSH: Electronic surveillance – Canada. | LCSH: Intelligence service – Canada. | LCSH: Cyber intelligence (Computer security) – Canada. | LCSH: National security – Canada. | LCSH: National security – International cooperation. | LCSH: Data protection – Canada. Classi$cation: LCC JL'*.I+' B+& !"!" | DDC %!(.#!(#—dc!% UBC Press gratefully acknowledges the $nancial support for our publishing program of the Government of Canada (through the Canada Book Fund) and the British Columbia Arts Council. Set in Helvetica Condensed and Minion by Apex CoVantage, LLC Copy editor: Francis Chow Proofreader: Judith Earnshaw Indexer: Delano Aragão Vaz Cover designer: Alexa Love UBC Press ,e University of British Columbia !"!) West Mall Vancouver,
    [Show full text]
  • Efficiency and Madness Using Data and Technology Environmental to Solve Social, and Political Problems
    Efficiency and Madness Madness Efficiencyand More and more, digital technologies and data are being relied upon to solve the world’s biggest pro- Efficiency anda M dness blems. Sometimes referred to as ‘technofixes’, these Using Data and Technology to Solve Social, Environmental data-driven technologies are applied to social, and Political Problems political and environmental challenges around the world. But their implementation can create both triumphs and disasters. Using Data and Technology to Solve Solve to Technology and Data Using We need to find a constructive way to critique these technofixes – one that acknowledges both their utopian and dystopian potential and the trade-offs they present. This is a call to action, for techies and non-techies alike, to find new ways of thinking about data-driven technologies and how they are changing our societies. Social, Environmental and Political Problems Political and Social, Environmental Stephanie Hankey and Marek Tuszynski Rz_Cover_Efficiency and Madness.indd 1 02.10.17 11:57 Efficiency and Madness Using Data and Technology to Solve Social, Environmental and Political Problems by Stephanie Hankey & Marek Tuszynski Supported by the Heinrich Böll Foundation With contributions from Etienne Turpin Support by Gary Wright Copy editing by Christy Lange Cover design by Ingo Diekhaus With special thanks to Christine Chemnitz, Susanne Diehr, Lili Fuhr, Jörg Haas, Annette Kraus, Heike Löschmann, Linda Schneider and Barbara Unmüßig. Interior_pages.indd 2 02/10/2017 10:46 Efficiency and Madness Using Data and Technology to Solve Social, Environmental and Political Problems Interior_pages.indd 3 02/10/2017 10:46 Interior_pages.indd 4 02/10/2017 10:46 5 Introduction Technology as Magic and Loss Technologies help us do more with less, they defy boundaries of space, time and self.
    [Show full text]