CeliaDiederichsFirstEssay 5 - 17 Jan 2020 - Main.CeliaDiederichs
|
|
META TOPICPARENT | name="FirstEssay" |
| |
< < | Allocating Power and Assigning Responsibility in the Internet Society | > > | A Failed Gateway to Informed Political Opinion | | -- By CeliaDiederichs - 11 Oct 2019
Introduction | |
< < | The original purpose of the Internet was to empower the individual by giving decentralized groups an immense ability of self-education through obtaining and sharing information. | > > | Ever since the mid-1990s, when the Internet became publicly accessible, it promised a revolutionary impact for society by empowering groups lacking means of representing their interests effectively. The unforeseen ability of self-education through obtaining and sharing information, instant communication and public fora for interaction of likeminded people hold the potential of empowering society and giving politically marginalized groups a stage to be seen and heard. An optimistic prediction of the consequences of almost constant Internet use could have been a higher ability of the citizen to scrutinize governmental action and an increased frequency of doing so. | | | |
< < |
A reference would be helpful. So far as I know the sources, to attribute to the "original" efforts to build a network of network, individual users were less the focus of design than organizations, like the US military and the research community, that needed to interconnect large numbers of computers (long before personal computers were a technological reality) regardless of their hardware and software architectures in a design that didn't create critical points of failure in hierarchically-privileged nodes.
| > > | However, today it seems that those who glare at their eye-phone screens the most, are those least informed on current events. Whilst observing fellow subway riders on trips of around an hour, I learnt to understand that smartphone addiction mostly means the constant refreshing off videos off cats, photos of potential online dating partners, or food porn... to name a few. The majority of Internet users I was surrounded by whilst living in Germany, the USA or China spend an outrageous amount of time indulging in graphic redundancies on the cyberspace. This trend renders a large part of society uninformed on political trends and increasingly ignorant of potentially contentious practices of their government favourable to those in power. Contrary to an idealist's use of the internet to increase political debate within society, technological lures to discontent and omnipresent advertising leave many politically immature. How could this happen? | | | |
< < | Today the source of power in the digital era is data that is produced by us. Yet we claim to be powerless in regaining freedom in the digital era. | > > | End-user Responsibility and the Current Design of the Internet
Convinced of end-user responsibility, [[https://www.nytimes.com/2019/10/06/technology/phone-screen-addiction-tech-nir-eyal.html[Nir Eyal argues that users owe themselves protection by changing their Internet habits]]. Nir Eyal is dedicated to designing addictive techniques to manipulate users into staying on the web. Yet he claims to be convinced that ultimately, it is the user who chooses to stay on specific web content or not. Whilst acknowledging that there is an unhealthy sense of carelessness in how we allow the network to rule over our daily habits, I believe that responsibility of the end-user can only go as far as the architecture of the web allows informed individual choice over online practices. | | | |
< < |
Who are the "we" here who are "claiming" to be powerless?
| > > | The internet is designed in such a way that its layers may not be unraveled by the ordinary user. Microsoft's power in designing the web rested entirely on its proprietary software, ensuring that the specific mechanisms of the web are hidden from the user. Nearly a monopoly, Microsoft was not interested in fortifying diversity by creating an open user experience but instead concentrated on designing a web that keeps users away from free and open software. From the very introduction of personal computers, users were not supposed to understand how software functions and how it could be altered to better serve society. Proprietary software does not only rob the individual end-user of the possibility to understand who is watching their online behavior and for what purpose, but also makes it impossible for the user to understand why they see certain recommendations, news or targeted advertising in the first place. Only Internet operated by open source allows end-user to understand the operative system of the infrastructure they have become addicted to. | | | |
> > | Today's end-user online experience is a result of the emergence of the online web as designed by few but large companies. Dominant technological corporations used the network's underlying architecture to create a business model of capitalizing our data. To optimize data collection, their space on the network is designed in such a manner that users stay hooked. Persuasive web-design will leave the user navigating through proprietary algorithm leaving a trail of behavioral data on online searches, communication partners, sites read and content viewed. This data will then be sold and implemented to exercise influence and control over the Internet community. The extent of influence Big Tech exercises over society is alarming even to governments. For instance, Germany saw national sovereignty over monetary policy threatened by the release of Facebook's digital currency libra and Denmark welcomes Big Tech on the stage of global diplomacy with its appointment of a unique ambassador to the technology industry. | | | |
< < | This paper analyzes how effective power in the Internet is allocated between the people, the private sector and governmental institutions and how this power may be measured and utilized. | > > | Most Internet users have given up autonomy in online behavior to the few players in the private sector, who now dictate the online life and keep their audience predominantly occupied with questions of consumer choice. Additionally, the typically code-illiterate user will struggle to employ the Internet as a means of liberation from suppressive regimes. Specifically authoritarian regimes instrumentalize the accessible cyberspace to establish an Orwellian system of mass surveillance and a covert propaganda machine. For instance, instead of using airborne leaflet propaganda, the Chinese 50c army uses social media bots to fabricate approximately 448 million propaganda posts every year cloaked as private posts. Without knowledge of the origin of any online content, the viewer may not obtain freedom, but instead find him or herself manipulated in accordance to the interests of the designer of each site. | | | |
< < | Empowering and Exploiting the People
There is no evidence to believe the people are no longer empowered but exploited by the Internet. Convinced of end-user responsibility, Eyal argues that users owe themselves protection by changing their Internet habits.
What makes Nir Ayal an authority whose name gives weight to an opinion? If it is something about who he is or what he does, you should convey that.
With this I agree, acknowledging that there is an unhealthy sense of carelessness in how we allow the Internet dictate our lives. We cannot allow ourselves to dwell in the illusion that infringements upon our individual privacy rights are without consequence or outweighed by the convenience of technological tools. Cambridge Analytica proves that this is pure pretense.
The explanation for our passivity may lie within our fondness of the precise tools that threaten our dignity. Our readiness to surrender privacy rights in exchange for comfort is discomforting to say the least. Whilst the Bystander Effect may offer an explanation, it does not exculpate us from enslaving ourselves to technology by accepting default configuration, arbitrary terms of service or unknown backdoors. Most citizens will reason their innocence with a lack of the necessary tools to lead change within the Internet Society. Abstinence is supposedly the only but socially unacceptable mean of self-protection. In light of the many ways in which the Internet has empowered citizens, this reasoning seems circular. However leveraging the power of technology requires IT expertise that most do not have and in battling for our data we face resourceful monopolies.
Who is "us" and "our"? If we are reading an analysis of "how effective power in the Internet is allocated between the people, the private sector and governmental institutions and how this power may be measured and utilized," which is the commitment you've given, shouldn't the sociology be precise?
The Rise of Big Tech
The dominant players of Big Tech have created a net that is not designed to be unraveled by its ordinary user.
But they don't create the Net: they use the underlying architecture and therefore they have changed effective power, your ostensible subject, but they have not altered the consensus-based structure of governance over design, which you haven't mentioned yet, and which is the distinguishing political characteristic of the system.
The business model of capitalizing our data would crumble if we and not the private sector actually remain in control of our data. Measured by the volume of data within the private sector and the value of human resource within Big Tech, this area beholds the most power over the Internet society.
This assumes that the valuable data is "ours," in the sense that someone possessed it before the platform company did. But that's not true about aggregations and inferences. Those they created, and a simple approach to data ownership will have the reverse result from the one you assert here. This complexity in the analysis cannot be ignored.
The rise of power of the private sector is also demonstrated by the various ways in which private companies begin to resemble sovereign nations or how they are addressed by national sovereigns on eye-level. Zuckerberg has become the creator of his own version of what he names a "Supreme Court" for content moderation on Facebook. Just one month before that, Germany saw national sovereignty over monetary policy threatened by the release of Facebook's digital currency libra. The appointment of a unique ambassador to the technology industry by Denmark welcomes Big Tech on the stage of global diplomacy.
Which part of this is actually different from the existing role of the fossil fuel companies in the geopolitical environment, and how? The political analysis needs to be conducted on a factual rather than rhetorical basis. That means comparison between the political facts and arrangements under discussion and other similar arrangements or states of fact, so that both similarities and differences can focus our thinking.
No matter how closely private institutions mirror governmental bodies in name or function, one essential difference remains: private bodies are not bound but protected by the constitution. Whilst profiting from certain laws, private organs will circumvent regulatory burden by tactically maneuvering through the cyber-sphere. Nor are they bound by any ethical code.
Which of these points actually differentiates private from state power? Or is it the similarity rather than the difference that is being asserted, despite the grammar?
Despite their immense power and capability to cause change they are not equals in global politics.
Governmental Institutions and Surveillance
Traditionally a fundamental tool for an increase of power through technology attributed pre-dominantly to the government is mass surveillance.
What does "traditionally" mean? Where is the "tradition" of mass surveillance?
In Western democratic societies surveillance is commonly regarded as the biggest threat to individual freedom. However, the idea that we shall limit surveillance to regain power from the government is not shared universally. A glance at more authoritarian regimes enjoying wide-spread and unquestioned support proves that power obtained through surveillance, even if as far-reaching as China's social credit system, is power not everyone wants to take from the government.
The words above are not a sentence. The idea communicated by the paragraph is not clear. It seems to be that authoritarian societies are more enthusiastic about surveillance than democratic ones, which is truism rather than analysis. Rewriting is needed.
Whilst governments may strongly compete for power with the private sector, they have more consequential means to exercise their power due to their police power. However, governmental action is often hindered by bureaucracy, regulations, rigorous procedure and is exposed to scrutiny. This inflexible framework and the slow pace of institutional power might be most detrimental to its utilization. The disruptive character of technology allocates most power to those who have the highest adoption rate to technological development.
Although the Internet was intended to liberate us from authoritarian regimes, we have no serious advantage over the government through the Internet. This is because Internet tools accessible to the vast majority of the citizens are also instruments of the government. Instead of using airborne leaflet propaganda, the Chinese 50c army now uses social media to fabricate approximately 448 million propaganda posts every year.
Interaction and Isolation
There is an unequal access to sources of power in and over the Internet society and an imbalanced array of means to employ power amongst the people, private entities and the government.
That's a definition of the existence of politics. What else is the paragraph meant to contribute?
The most powerful figure is one arising from interactive pairing of cross-sectoral tools. So far we observe the potential of such partnership between the private and public sector for instance in Xinjiang, where the government employs face-recognition algorithms from A.I. companies to suppress minority groups. We also but less frequently encounter an immense power of disruption where two sectors unite in one person such as Snowden, who utilized governmental knowledge to act in his capacity as a member of a democratic society.
The above examples show that two-party collaboration will leave the third in dangerous isolation. We need alliances. Our biggest bargaining power in finding one will come from the threat, if serious, of abandoning precisely those machines through which we empower the other sectors.
This draft sets out an ambition it does not achieve, to explain "how effective power in the Internet is allocated between the people, the private sector and governmental institutions and how this power may be measured and utilized." That would involve explaining how the Internet is governed. But the draft says nothing about the institutions of network governance. As I mentioned at the beginning of the course, a network made of pipes and switches is "made" of the behavior of the piping entities, which we generally call "telecommunications services providers." Effective power in the Net is thereby allocated in substantial part by the politics of telecommunications, which the draft does not discuss either. The behavior of switches, the other primary component of the Net, is determined by software; the draft says nothing about the politics of the software structures in the Net, though that has been a large element in the course.
So it seems to me that the primary route to improvement is to decide whether the draft's ambition or its current contents should be kept, while the other is removed. To write about the declared subject is to reduce most of the existing discussion and add other elements that are more germane to the topic. To retain the current discussion is to pursue a different goal, which should be clearly stated at the outset. My interlinear comments were directed at the gap between what was promised and what was delivered, which means they may not be particularly useful if the next draft is fundamentally redesigned. But whichever direction you choose, it will be important to look closely at sentences in the first person plural: "we" and "our" will almost always need careful definition on the occasions when there are useful at all in political analysis.
| | | |
> > | Gaining Autonomy in the Web
A look at the design of the Internet reveals that end-users alone are neither fully responsible nor apt to protect themselves from undue influence, exploitation within the web and gaining autonomy over choices on their online behavior and the way in which the net is used to circulate information. The Internet itself has not lost its promises but still possesses the ability to become an open, transparent and free stage of global discourse and education. The Internet certainly has had a revolutionary effect for the purposes of those who designed it. Only where the Internet is operated by open source, transparent and possibly even understood by the user, the user may understand to use the Internet in his or her best interest only. | |
You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable.
To restrict access to your paper simply delete the "#" character on the next two lines: |
|
CeliaDiederichsFirstEssay 4 - 26 Nov 2019 - Main.EbenMoglen
|
|
META TOPICPARENT | name="FirstEssay" |
Allocating Power and Assigning Responsibility in the Internet Society | |
Introduction | |
< < | The original purpose of the Internet was to empower the individual by giving decentralized groups an immense ability of self-education through obtaining and sharing information. Today the source of power in the digital era is data that is produced by us. Yet we claim to be powerless in regaining freedom in the digital era. This paper analyzes how effective power in the Internet is allocated between the people, the private sector and governmental institutions and how this power may be measured and utilized. | > > | The original purpose of the Internet was to empower the individual by giving decentralized groups an immense ability of self-education through obtaining and sharing information.
A reference would be helpful. So far as I know the sources, to attribute to the "original" efforts to build a network of network, individual users were less the focus of design than organizations, like the US military and the research community, that needed to interconnect large numbers of computers (long before personal computers were a technological reality) regardless of their hardware and software architectures in a design that didn't create critical points of failure in hierarchically-privileged nodes.
Today the source of power in the digital era is data that is produced by us. Yet we claim to be powerless in regaining freedom in the digital era.
Who are the "we" here who are "claiming" to be powerless?
This paper analyzes how effective power in the Internet is allocated between the people, the private sector and governmental institutions and how this power may be measured and utilized. | | Empowering and Exploiting the People | |
< < | There is no evidence to believe the people are no longer empowered but exploited by the Internet. Convinced of end-user responsibility, Eyal argues that users owe themselves protection by changing their Internet habits. With this I agree, acknowledging that there is an unhealthy sense of carelessness in how we allow the Internet dictate our lives. We cannot allow ourselves to dwell in the illusion that infringements upon our individual privacy rights are without consequence or outweighed by the convenience of technological tools. Cambridge Analytica proves that this is pure pretense. | > > | There is no evidence to believe the people are no longer empowered but exploited by the Internet. Convinced of end-user responsibility, Eyal argues that users owe themselves protection by changing their Internet habits.
What makes Nir Ayal an authority whose name gives weight to an opinion? If it is something about who he is or what he does, you should convey that.
With this I agree, acknowledging that there is an unhealthy sense of carelessness in how we allow the Internet dictate our lives. We cannot allow ourselves to dwell in the illusion that infringements upon our individual privacy rights are without consequence or outweighed by the convenience of technological tools. Cambridge Analytica proves that this is pure pretense. | | The explanation for our passivity may lie within our fondness of the precise tools that threaten our dignity. Our readiness to surrender privacy rights in exchange for comfort is discomforting to say the least. Whilst the Bystander Effect may offer an explanation, it does not exculpate us from enslaving ourselves to technology by accepting default configuration, arbitrary terms of service or unknown backdoors. Most citizens will reason their innocence with a lack of the necessary tools to lead change within the Internet Society. Abstinence is supposedly the only but socially unacceptable mean of self-protection. In light of the many ways in which the Internet has empowered citizens, this reasoning seems circular. However leveraging the power of technology requires IT expertise that most do not have and in battling for our data we face resourceful monopolies. | |
> > |
Who is "us" and "our"? If we are reading an analysis of "how effective power in the Internet is allocated between the people, the private sector and governmental institutions and how this power may be measured and utilized," which is the commitment you've given, shouldn't the sociology be precise?
| | The Rise of Big Tech | |
< < | The dominant players of Big Tech have created a net that is not designed to be unraveled by its ordinary user. The business model of capitalizing our data would crumble if we and not the private sector actually remain in control of our data. Measured by the volume of data within the private sector and the value of human resource within Big Tech, this area beholds the most power over the Internet society. | > > | The dominant players of Big Tech have created a net that is not designed to be unraveled by its ordinary user.
But they don't create the Net: they use the underlying architecture and therefore they have changed effective power, your ostensible subject, but they have not altered the consensus-based structure of governance over design, which you haven't mentioned yet, and which is the distinguishing political characteristic of the system.
The business model of capitalizing our data would crumble if we and not the private sector actually remain in control of our data. Measured by the volume of data within the private sector and the value of human resource within Big Tech, this area beholds the most power over the Internet society.
This assumes that the valuable data is "ours," in the sense that someone possessed it before the platform company did. But that's not true about aggregations and inferences. Those they created, and a simple approach to data ownership will have the reverse result from the one you assert here. This complexity in the analysis cannot be ignored.
| | The rise of power of the private sector is also demonstrated by the various ways in which private companies begin to resemble sovereign nations or how they are addressed by national sovereigns on eye-level. Zuckerberg has become the creator of his own version of what he names a "Supreme Court" for content moderation on Facebook. Just one month before that, Germany saw national sovereignty over monetary policy threatened by the release of Facebook's digital currency libra. The appointment of a unique ambassador to the technology industry by Denmark welcomes Big Tech on the stage of global diplomacy. | |
< < | No matter how closely private institutions mirror governmental bodies in name or function, one essential difference remains: private bodies are not bound but protected by the constitution. Whilst profiting from certain laws, private organs will circumvent regulatory burden by tactically maneuvering through the cyber-sphere. Nor are they bound by any ethical code. Despite their immense power and capability to cause change they are not equals in global politics. | > > |
Which part of this is actually different from the existing role of the fossil fuel companies in the geopolitical environment, and how? The political analysis needs to be conducted on a factual rather than rhetorical basis. That means comparison between the political facts and arrangements under discussion and other similar arrangements or states of fact, so that both similarities and differences can focus our thinking.
No matter how closely private institutions mirror governmental bodies in name or function, one essential difference remains: private bodies are not bound but protected by the constitution. Whilst profiting from certain laws, private organs will circumvent regulatory burden by tactically maneuvering through the cyber-sphere. Nor are they bound by any ethical code.
Which of these points actually differentiates private from state power? Or is it the similarity rather than the difference that is being asserted, despite the grammar?
Despite their immense power and capability to cause change they are not equals in global politics. | | Governmental Institutions and Surveillance | |
< < | Traditionally a fundamental tool for an increase of power through technology attributed pre-dominantly to the government is mass surveillance. In Western democratic societies surveillance is commonly regarded as the biggest threat to individual freedom. However, the idea that we shall limit surveillance to regain power from the government is not shared universally. A glance at more authoritarian regimes enjoying wide-spread and unquestioned support proves that power obtained through surveillance, even if as far-reaching as China's social credit system, is power not everyone wants to take from the government. | > > | Traditionally a fundamental tool for an increase of power through technology attributed pre-dominantly to the government is mass surveillance.
What does "traditionally" mean? Where is the "tradition" of mass surveillance?
In Western democratic societies surveillance is commonly regarded as the biggest threat to individual freedom. However, the idea that we shall limit surveillance to regain power from the government is not shared universally. A glance at more authoritarian regimes enjoying wide-spread and unquestioned support proves that power obtained through surveillance, even if as far-reaching as China's social credit system, is power not everyone wants to take from the government.
The words above are not a sentence. The idea communicated by the paragraph is not clear. It seems to be that authoritarian societies are more enthusiastic about surveillance than democratic ones, which is truism rather than analysis. Rewriting is needed.
| | Whilst governments may strongly compete for power with the private sector, they have more consequential means to exercise their power due to their police power. However, governmental action is often hindered by bureaucracy, regulations, rigorous procedure and is exposed to scrutiny. This inflexible framework and the slow pace of institutional power might be most detrimental to its utilization. The disruptive character of technology allocates most power to those who have the highest adoption rate to technological development.
Although the Internet was intended to liberate us from authoritarian regimes, we have no serious advantage over the government through the Internet. This is because Internet tools accessible to the vast majority of the citizens are also instruments of the government. Instead of using airborne leaflet propaganda, the Chinese 50c army now uses social media to fabricate approximately 448 million propaganda posts every year.
Interaction and Isolation | |
< < | There is an unequal access to sources of power in and over the Internet society and an imbalanced array of means to employ power amongst the people, private entities and the government. The most powerful figure is one arising from interactive pairing of cross-sectoral tools. So far we observe the potential of such partnership between the private and public sector for instance in Xinjiang, where the government employs face-recognition algorithms from A.I. companies to suppress minority groups. We also but less frequently encounter an immense power of disruption where two sectors unite in one person such as Snowden, who utilized governmental knowledge to act in his capacity as a member of a democratic society. | > > | There is an unequal access to sources of power in and over the Internet society and an imbalanced array of means to employ power amongst the people, private entities and the government.
That's a definition of the existence of politics. What else is the paragraph meant to contribute?
The most powerful figure is one arising from interactive pairing of cross-sectoral tools. So far we observe the potential of such partnership between the private and public sector for instance in Xinjiang, where the government employs face-recognition algorithms from A.I. companies to suppress minority groups. We also but less frequently encounter an immense power of disruption where two sectors unite in one person such as Snowden, who utilized governmental knowledge to act in his capacity as a member of a democratic society. | | The above examples show that two-party collaboration will leave the third in dangerous isolation. We need alliances. Our biggest bargaining power in finding one will come from the threat, if serious, of abandoning precisely those machines through which we empower the other sectors. | |
> > |
This draft sets out an ambition it does not achieve, to explain "how effective power in the Internet is allocated between the people, the private sector and governmental institutions and how this power may be measured and utilized." That would involve explaining how the Internet is governed. But the draft says nothing about the institutions of network governance. As I mentioned at the beginning of the course, a network made of pipes and switches is "made" of the behavior of the piping entities, which we generally call "telecommunications services providers." Effective power in the Net is thereby allocated in substantial part by the politics of telecommunications, which the draft does not discuss either. The behavior of switches, the other primary component of the Net, is determined by software; the draft says nothing about the politics of the software structures in the Net, though that has been a large element in the course.
So it seems to me that the primary route to improvement is to decide whether the draft's ambition or its current contents should be kept, while the other is removed. To write about the declared subject is to reduce most of the existing discussion and add other elements that are more germane to the topic. To retain the current discussion is to pursue a different goal, which should be clearly stated at the outset. My interlinear comments were directed at the gap between what was promised and what was delivered, which means they may not be particularly useful if the next draft is fundamentally redesigned. But whichever direction you choose, it will be important to look closely at sentences in the first person plural: "we" and "our" will almost always need careful definition on the occasions when there are useful at all in political analysis.
| |
You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable.
To restrict access to your paper simply delete the "#" character on the next two lines: |
|
CeliaDiederichsFirstEssay 3 - 11 Oct 2019 - Main.CeliaDiederichs
|
|
META TOPICPARENT | name="FirstEssay" |
Allocating Power and Assigning Responsibility in the Internet Society | | The original purpose of the Internet was to empower the individual by giving decentralized groups an immense ability of self-education through obtaining and sharing information. Today the source of power in the digital era is data that is produced by us. Yet we claim to be powerless in regaining freedom in the digital era. This paper analyzes how effective power in the Internet is allocated between the people, the private sector and governmental institutions and how this power may be measured and utilized.
Empowering and Exploiting the People | |
< < | There is no evidence to believe the individual is no longer empowered but mainly exploited by the Internet. Convinced of end-user responsibility, Eyal argues that users owe themselves protection by changing their Internet habits. With this I agree, acknowledging that there is an unhealthy sense of carelessness in how we allow the Internet dictate our lives. We cannot allow ourselves to dwell in the illusion that infringements upon our individual privacy rights are without consequence or outweighed by the convenience of technological tools. Cambridge Analytica proves that this is pure pretense. | > > | There is no evidence to believe the people are no longer empowered but exploited by the Internet. Convinced of end-user responsibility, Eyal argues that users owe themselves protection by changing their Internet habits. With this I agree, acknowledging that there is an unhealthy sense of carelessness in how we allow the Internet dictate our lives. We cannot allow ourselves to dwell in the illusion that infringements upon our individual privacy rights are without consequence or outweighed by the convenience of technological tools. Cambridge Analytica proves that this is pure pretense. | | | |
< < | The explanation for our passivity may lie within our fondness of the precise tools that threaten our dignity. Our readiness to surrender privacy rights in exchange for comfort is discomforting to say the least. Whilst the Bystander Effect may offer an explanation, it does not exculpate us from enslaving ourselves to technology by accepting default configuration, arbitrary terms of service or unknown backdoors. Most citizens will reason their innocence with a lack of the necessary tools to lead change within the Internet. Abstinence is supposedly the only but socially unacceptable mean of self-protection. In light of the many ways in which the Internet has empowered citizens, this reasoning seems circular. However leveraging the power of technology requires IT expertise that most don’t have and in battling for our data we face gigantic monopolies. | > > | The explanation for our passivity may lie within our fondness of the precise tools that threaten our dignity. Our readiness to surrender privacy rights in exchange for comfort is discomforting to say the least. Whilst the Bystander Effect may offer an explanation, it does not exculpate us from enslaving ourselves to technology by accepting default configuration, arbitrary terms of service or unknown backdoors. Most citizens will reason their innocence with a lack of the necessary tools to lead change within the Internet Society. Abstinence is supposedly the only but socially unacceptable mean of self-protection. In light of the many ways in which the Internet has empowered citizens, this reasoning seems circular. However leveraging the power of technology requires IT expertise that most do not have and in battling for our data we face resourceful monopolies. | | The Rise of Big Tech | |
< < | The dominant players of Big Tech have created a net that is not designed to be unraveled its ordinary user. The business model of capitalizing our data would crumble if we and not the private sector actually remain in control of our data. Measured by the volume of data within the private sector and the value of human resource within Big Tech, this area beholds the most power over the Internet society.
The rise of power of the private sector is also demonstrated by the various ways in which private companies begin to resemble sovereign nations and how they are addressed by national sovereigns on eye-level. Zuckerberg has become the creator of his own version of what he names a "Supreme Court" for content moderation on Facebook. Just one month before that, Germany saw national sovereignty over monetary policy threatened by the release of Facebook's digital currency libra. The appointment of a unique ambassador to the technology industry by Denmark welcomes Big Tech on the stage of global diplomacy. | > > | The dominant players of Big Tech have created a net that is not designed to be unraveled by its ordinary user. The business model of capitalizing our data would crumble if we and not the private sector actually remain in control of our data. Measured by the volume of data within the private sector and the value of human resource within Big Tech, this area beholds the most power over the Internet society.
The rise of power of the private sector is also demonstrated by the various ways in which private companies begin to resemble sovereign nations or how they are addressed by national sovereigns on eye-level. Zuckerberg has become the creator of his own version of what he names a "Supreme Court" for content moderation on Facebook. Just one month before that, Germany saw national sovereignty over monetary policy threatened by the release of Facebook's digital currency libra. The appointment of a unique ambassador to the technology industry by Denmark welcomes Big Tech on the stage of global diplomacy. | | | |
< < | No matter how closely private institutions mirror governmental bodies in name or function, there remains one essential difference: private bodies are not bound but protected by the constitution. Whilst profiting from certain laws, private organs will circumvent regulatory schemes by tactically maneuvering through the cyber-sphere. Nor are they bound by any ethical code. Despite their immense power and capability to cause change they are not equals in global politics. | > > | No matter how closely private institutions mirror governmental bodies in name or function, one essential difference remains: private bodies are not bound but protected by the constitution. Whilst profiting from certain laws, private organs will circumvent regulatory burden by tactically maneuvering through the cyber-sphere. Nor are they bound by any ethical code. Despite their immense power and capability to cause change they are not equals in global politics. | | Governmental Institutions and Surveillance | |
< < | Traditionally a fundamental tool for an increase of power through technology attributed pre-dominantly to the government is mass surveillance. In Western democratic societies, characterized by a strong sense of individual freedom, this is often regarded as the biggest threat to our freedom. However, the idea that we shall limit surveillance to regain power from the government is not shared universally. A glance at more authoritarian regimes that enjoy wide-spread and unquestioned support proves that power obtained through surveillance, even if as far-reaching as China's social credit system, is power not everyone wants to take from the government.
Whilst governments may strongly compete for power with the private sector, they have the most consequential means to exercise their power due to their police power. However, governmental action is often hindered by bureaucracy, regulations and rigorous procedure as well as exposed to scrutiny. This rigorous framework and the slow pace of institutional power might be most detrimental to its utilization. The disruptive character of technology allocates most power to those who have the highest adoption rate to technological development.
Although the Internet was intended to liberate us from authoritarian regimes, we have no serious advantage over the government through the Internet. This is because Internet tools accessible to the vast majority of the citizens are also instruments of the government. As an example, instead of using airborne leaflet propaganda, the Chinese 50c army now uses social media to fabricate approximately 448 million propaganda posts every year. | > > | Traditionally a fundamental tool for an increase of power through technology attributed pre-dominantly to the government is mass surveillance. In Western democratic societies surveillance is commonly regarded as the biggest threat to individual freedom. However, the idea that we shall limit surveillance to regain power from the government is not shared universally. A glance at more authoritarian regimes enjoying wide-spread and unquestioned support proves that power obtained through surveillance, even if as far-reaching as China's social credit system, is power not everyone wants to take from the government.
Whilst governments may strongly compete for power with the private sector, they have more consequential means to exercise their power due to their police power. However, governmental action is often hindered by bureaucracy, regulations, rigorous procedure and is exposed to scrutiny. This inflexible framework and the slow pace of institutional power might be most detrimental to its utilization. The disruptive character of technology allocates most power to those who have the highest adoption rate to technological development.
Although the Internet was intended to liberate us from authoritarian regimes, we have no serious advantage over the government through the Internet. This is because Internet tools accessible to the vast majority of the citizens are also instruments of the government. Instead of using airborne leaflet propaganda, the Chinese 50c army now uses social media to fabricate approximately 448 million propaganda posts every year. | | Interaction and Isolation | |
< < | There is an unequal access to sources of power in and over the Internet society and an imbalanced array of means to employ power amongst the people, private entities and the government. The most powerful figure is one arising from interactive pairing of cross-sectoral tools. So far we observe the power of such partnership between the private and public sector for instance in Xinjiang, where the government employs face-recognition algorithms from A.I. companies to suppress minority groups. We also but less frequently encounter an immense power for social change where two sectors unite in one person such as Snowden, who utilized governmental knowledge to act in his capacity as a member of a democratic society. | > > | There is an unequal access to sources of power in and over the Internet society and an imbalanced array of means to employ power amongst the people, private entities and the government. The most powerful figure is one arising from interactive pairing of cross-sectoral tools. So far we observe the potential of such partnership between the private and public sector for instance in Xinjiang, where the government employs face-recognition algorithms from A.I. companies to suppress minority groups. We also but less frequently encounter an immense power of disruption where two sectors unite in one person such as Snowden, who utilized governmental knowledge to act in his capacity as a member of a democratic society. | | The above examples show that two-party collaboration will leave the third in dangerous isolation. We need alliances. Our biggest bargaining power in finding one will come from the threat, if serious, of abandoning precisely those machines through which we empower the other sectors. |
|
CeliaDiederichsFirstEssay 2 - 11 Oct 2019 - Main.CeliaDiederichs
|
|
META TOPICPARENT | name="FirstEssay" |
| |
< < |
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted. | | Allocating Power and Assigning Responsibility in the Internet Society
-- By CeliaDiederichs - 11 Oct 2019 | | The original purpose of the Internet was to empower the individual by giving decentralized groups an immense ability of self-education through obtaining and sharing information. Today the source of power in the digital era is data that is produced by us. Yet we claim to be powerless in regaining freedom in the digital era. This paper analyzes how effective power in the Internet is allocated between the people, the private sector and governmental institutions and how this power may be measured and utilized.
Empowering and Exploiting the People | |
< < | There is no evidence to believe the individual is no longer empowered but mainly exploited by the Internet. Convinced of end-user responsibility, Eyal argues that users owe themselves protection by changing their Internet habits (https://www.nytimes.com/2019/10/06/technology/phone-screen-addiction-tech-nir-eyal.html). With this I agree, acknowledging that there is an unhealthy sense of carelessness in how we allow the Internet dictate our lives. We cannot allow ourselves to dwell in the illusion that infringements upon our individual privacy rights are without consequence or outweighed by the convenience of technological tools. Cambridge Analytica proves that this is pure pretense. | > > | There is no evidence to believe the individual is no longer empowered but mainly exploited by the Internet. Convinced of end-user responsibility, Eyal argues that users owe themselves protection by changing their Internet habits. With this I agree, acknowledging that there is an unhealthy sense of carelessness in how we allow the Internet dictate our lives. We cannot allow ourselves to dwell in the illusion that infringements upon our individual privacy rights are without consequence or outweighed by the convenience of technological tools. Cambridge Analytica proves that this is pure pretense. | | The explanation for our passivity may lie within our fondness of the precise tools that threaten our dignity. Our readiness to surrender privacy rights in exchange for comfort is discomforting to say the least. Whilst the Bystander Effect may offer an explanation, it does not exculpate us from enslaving ourselves to technology by accepting default configuration, arbitrary terms of service or unknown backdoors. Most citizens will reason their innocence with a lack of the necessary tools to lead change within the Internet. Abstinence is supposedly the only but socially unacceptable mean of self-protection. In light of the many ways in which the Internet has empowered citizens, this reasoning seems circular. However leveraging the power of technology requires IT expertise that most don’t have and in battling for our data we face gigantic monopolies.
The Rise of Big Tech
The dominant players of Big Tech have created a net that is not designed to be unraveled its ordinary user. The business model of capitalizing our data would crumble if we and not the private sector actually remain in control of our data. Measured by the volume of data within the private sector and the value of human resource within Big Tech, this area beholds the most power over the Internet society. | |
< < | The rise of power of the private sector is also demonstrated by the various ways in which private companies begin to resemble sovereign nations. Mark Zuckerberg has become the creator of his own version of what he names a "Supreme Court" for content moderation on Facebook (https://verfassungsblog.de/difficult-times-ahead-for-the-facebook-supreme-court/). Just one month before that, Germany's chancellor saw national sovereignty over monetary policy threatened by the release of Facebook's digital currency libra (https://cointelegraph.com/news/german-govt-approves-new-plan-to-block-private-parallel-currencies). The appointment of a unique ambassador to the technology industry by Denmark welcomes Big Tech on the stage of global diplomacy (https://www.nytimes.com/2019/09/03/technology/denmark-tech-ambassador.html). | > > | The rise of power of the private sector is also demonstrated by the various ways in which private companies begin to resemble sovereign nations and how they are addressed by national sovereigns on eye-level. Zuckerberg has become the creator of his own version of what he names a "Supreme Court" for content moderation on Facebook. Just one month before that, Germany saw national sovereignty over monetary policy threatened by the release of Facebook's digital currency libra. The appointment of a unique ambassador to the technology industry by Denmark welcomes Big Tech on the stage of global diplomacy. | | | |
< < | No matter how closely private institutions mirror governmental bodies in name or function, there remains one essential difference: private bodies are not bound but protected by the constitution. Whilst profiting from certain laws, private organs will circumvent regulatory schemes by tactically maneuvering through the cyber-sphere. Nor are they bound by any ethical code. Despite their immense power and capability to cause change, we must be careful in allowing multinational for-profit corporation enter the stage of global politics. | > > | No matter how closely private institutions mirror governmental bodies in name or function, there remains one essential difference: private bodies are not bound but protected by the constitution. Whilst profiting from certain laws, private organs will circumvent regulatory schemes by tactically maneuvering through the cyber-sphere. Nor are they bound by any ethical code. Despite their immense power and capability to cause change they are not equals in global politics. | | Governmental Institutions and Surveillance | |
< < | Traditionally a fundamental tool for an increase of power through technology attributed pre-dominantly to the government is mass surveillance. In Western democratic societies, characterized by a strong sense of individual freedom, this is often regarded as the biggest threat to our freedom. However, the idea that we shall limit surveillance to regain power from the government is not shared universally. A glance at more authoritarian regimes that enjoy wide-spread and unquestioned support proves that power obtained through surveillance, even if as far-reaching as China's social credit system, is power not everyone wants to take from the government (https://www.bloomberg.com/opinion/articles/2019-01-24/why-china-s-social-credit-systems-are-surprisingly-popular).
Whilst governments may strongly compete for power with the private sector, they have the most consequential means to exercise their power due to their police power. However, governmental action is often hindered by bureaucracy, regulations and rigorous procedure as well as exposed to scrutiny. This rigorous framework and the slow pace of institutional power might be most detrimental to its utilization. The disruptive character of technology allocates most power to those who have the highest adoption rate to technological development (https://www.theatlantic.com/technology/archive/2013/10/the-battle-for-power-on-the-internet/280824/).
Although the Internet was intended to liberate us from authoritarian regimes, we have no serious advantage over the government through the Internet. This is because Internet tools accessible to the vast majority of the citizens are also instruments of the government. As an example, instead of using airborne leaflet propaganda, the Chinese 50c army now uses social meda to fabricate approximately 448 million propaganda posts every year (https://gking.harvard.edu/files/gking/files/50c.pdf?m=1463587807). | > > | Traditionally a fundamental tool for an increase of power through technology attributed pre-dominantly to the government is mass surveillance. In Western democratic societies, characterized by a strong sense of individual freedom, this is often regarded as the biggest threat to our freedom. However, the idea that we shall limit surveillance to regain power from the government is not shared universally. A glance at more authoritarian regimes that enjoy wide-spread and unquestioned support proves that power obtained through surveillance, even if as far-reaching as China's social credit system, is power not everyone wants to take from the government.
Whilst governments may strongly compete for power with the private sector, they have the most consequential means to exercise their power due to their police power. However, governmental action is often hindered by bureaucracy, regulations and rigorous procedure as well as exposed to scrutiny. This rigorous framework and the slow pace of institutional power might be most detrimental to its utilization. The disruptive character of technology allocates most power to those who have the highest adoption rate to technological development.
Although the Internet was intended to liberate us from authoritarian regimes, we have no serious advantage over the government through the Internet. This is because Internet tools accessible to the vast majority of the citizens are also instruments of the government. As an example, instead of using airborne leaflet propaganda, the Chinese 50c army now uses social media to fabricate approximately 448 million propaganda posts every year. | | Interaction and Isolation | |
< < | There is an unequal access to sources of power in and over the Internet society and an imbalanced array of means to employ power amongst the people, private entities and the government. The most powerful figure is one arising from interactive pairing of cross-sectoral tools. So far we observe the power of such partnership between the private and public sector for instance in Xinjiang, where the government employs face-recognition algorithms from A.I. companies to suppress minority groups (https://www.nytimes.com/2019/04/14/technology/china-surveillance-artificial-intelligence-racial-profiling.html). We also but less frequently encounter an immense power for social change where two sectors unite in one person such as Snowden, who utilized governmental knowledge to act in his capacity as a member of a democratic society. | > > | There is an unequal access to sources of power in and over the Internet society and an imbalanced array of means to employ power amongst the people, private entities and the government. The most powerful figure is one arising from interactive pairing of cross-sectoral tools. So far we observe the power of such partnership between the private and public sector for instance in Xinjiang, where the government employs face-recognition algorithms from A.I. companies to suppress minority groups. We also but less frequently encounter an immense power for social change where two sectors unite in one person such as Snowden, who utilized governmental knowledge to act in his capacity as a member of a democratic society. | | The above examples show that two-party collaboration will leave the third in dangerous isolation. We need alliances. Our biggest bargaining power in finding one will come from the threat, if serious, of abandoning precisely those machines through which we empower the other sectors. |
|
CeliaDiederichsFirstEssay 1 - 11 Oct 2019 - Main.CeliaDiederichs
|
|
> > |
META TOPICPARENT | name="FirstEssay" |
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.
Allocating Power and Assigning Responsibility in the Internet Society
-- By CeliaDiederichs - 11 Oct 2019
Introduction
The original purpose of the Internet was to empower the individual by giving decentralized groups an immense ability of self-education through obtaining and sharing information. Today the source of power in the digital era is data that is produced by us. Yet we claim to be powerless in regaining freedom in the digital era. This paper analyzes how effective power in the Internet is allocated between the people, the private sector and governmental institutions and how this power may be measured and utilized.
Empowering and Exploiting the People
There is no evidence to believe the individual is no longer empowered but mainly exploited by the Internet. Convinced of end-user responsibility, Eyal argues that users owe themselves protection by changing their Internet habits (https://www.nytimes.com/2019/10/06/technology/phone-screen-addiction-tech-nir-eyal.html). With this I agree, acknowledging that there is an unhealthy sense of carelessness in how we allow the Internet dictate our lives. We cannot allow ourselves to dwell in the illusion that infringements upon our individual privacy rights are without consequence or outweighed by the convenience of technological tools. Cambridge Analytica proves that this is pure pretense.
The explanation for our passivity may lie within our fondness of the precise tools that threaten our dignity. Our readiness to surrender privacy rights in exchange for comfort is discomforting to say the least. Whilst the Bystander Effect may offer an explanation, it does not exculpate us from enslaving ourselves to technology by accepting default configuration, arbitrary terms of service or unknown backdoors. Most citizens will reason their innocence with a lack of the necessary tools to lead change within the Internet. Abstinence is supposedly the only but socially unacceptable mean of self-protection. In light of the many ways in which the Internet has empowered citizens, this reasoning seems circular. However leveraging the power of technology requires IT expertise that most don’t have and in battling for our data we face gigantic monopolies.
The Rise of Big Tech
The dominant players of Big Tech have created a net that is not designed to be unraveled its ordinary user. The business model of capitalizing our data would crumble if we and not the private sector actually remain in control of our data. Measured by the volume of data within the private sector and the value of human resource within Big Tech, this area beholds the most power over the Internet society.
The rise of power of the private sector is also demonstrated by the various ways in which private companies begin to resemble sovereign nations. Mark Zuckerberg has become the creator of his own version of what he names a "Supreme Court" for content moderation on Facebook (https://verfassungsblog.de/difficult-times-ahead-for-the-facebook-supreme-court/). Just one month before that, Germany's chancellor saw national sovereignty over monetary policy threatened by the release of Facebook's digital currency libra (https://cointelegraph.com/news/german-govt-approves-new-plan-to-block-private-parallel-currencies). The appointment of a unique ambassador to the technology industry by Denmark welcomes Big Tech on the stage of global diplomacy (https://www.nytimes.com/2019/09/03/technology/denmark-tech-ambassador.html).
No matter how closely private institutions mirror governmental bodies in name or function, there remains one essential difference: private bodies are not bound but protected by the constitution. Whilst profiting from certain laws, private organs will circumvent regulatory schemes by tactically maneuvering through the cyber-sphere. Nor are they bound by any ethical code. Despite their immense power and capability to cause change, we must be careful in allowing multinational for-profit corporation enter the stage of global politics.
Governmental Institutions and Surveillance
Traditionally a fundamental tool for an increase of power through technology attributed pre-dominantly to the government is mass surveillance. In Western democratic societies, characterized by a strong sense of individual freedom, this is often regarded as the biggest threat to our freedom. However, the idea that we shall limit surveillance to regain power from the government is not shared universally. A glance at more authoritarian regimes that enjoy wide-spread and unquestioned support proves that power obtained through surveillance, even if as far-reaching as China's social credit system, is power not everyone wants to take from the government (https://www.bloomberg.com/opinion/articles/2019-01-24/why-china-s-social-credit-systems-are-surprisingly-popular).
Whilst governments may strongly compete for power with the private sector, they have the most consequential means to exercise their power due to their police power. However, governmental action is often hindered by bureaucracy, regulations and rigorous procedure as well as exposed to scrutiny. This rigorous framework and the slow pace of institutional power might be most detrimental to its utilization. The disruptive character of technology allocates most power to those who have the highest adoption rate to technological development (https://www.theatlantic.com/technology/archive/2013/10/the-battle-for-power-on-the-internet/280824/).
Although the Internet was intended to liberate us from authoritarian regimes, we have no serious advantage over the government through the Internet. This is because Internet tools accessible to the vast majority of the citizens are also instruments of the government. As an example, instead of using airborne leaflet propaganda, the Chinese 50c army now uses social meda to fabricate approximately 448 million propaganda posts every year (https://gking.harvard.edu/files/gking/files/50c.pdf?m=1463587807).
Interaction and Isolation
There is an unequal access to sources of power in and over the Internet society and an imbalanced array of means to employ power amongst the people, private entities and the government. The most powerful figure is one arising from interactive pairing of cross-sectoral tools. So far we observe the power of such partnership between the private and public sector for instance in Xinjiang, where the government employs face-recognition algorithms from A.I. companies to suppress minority groups (https://www.nytimes.com/2019/04/14/technology/china-surveillance-artificial-intelligence-racial-profiling.html). We also but less frequently encounter an immense power for social change where two sectors unite in one person such as Snowden, who utilized governmental knowledge to act in his capacity as a member of a democratic society.
The above examples show that two-party collaboration will leave the third in dangerous isolation. We need alliances. Our biggest bargaining power in finding one will come from the threat, if serious, of abandoning precisely those machines through which we empower the other sectors.
You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable.
To restrict access to your paper simply delete the "#" character on the next two lines:
Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list. |
|
|
|
This site is powered by the TWiki collaboration platform. All material on this collaboration platform is the property of the contributing authors. All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
|
|