1,199 Matching Annotations
  1. Nov 2016
    1. Much of the resources of digital preservation have been devoted to preparing for formats to go obsolete and require migration. I’ve been arguing for a long time that this isn’t a good use of resources. Before the web, formats used to go obsolete quickly, but since the advent of the web in 1995, it is very hard to find any widely used format that has gone obsolete. The techniques we have had for a long time, such as open source renderers and emulation, work well enough to cope with format obsolescence if and when it eventually happens; further work in this low-leverage area is a waste of resources. The most important aspect of the way that format obsolescence became not worth working on is that digital preservation had nothing to do with it. Formats stopped going obsolete for very fundamental reasons, not because digital preservation prevented it. Virtual machines and open source became part of mainstream IT for reasons that had nothing to do with preservation.

      Open Source considered helpful for digital preservation...at least for rendering.

    1. A model gives us acommon language to talk about the world.

      Is language a model?

    Annotators

    1. They are, in Pickering’s sense, part of the mangle.

      Who is this Pickering character?

    2. he concludes: “Realism is not about repre sen ta-tions of an in de pen dent reality, but about the real consequences, interventions, creative possibilities, and responsibilities of intra- acting within the world”

      Seems to have a lot in common with pragmatism.

    3. arad turns to the work of Niels Bohr. Bohr’s theoretical position is centered around what he calls “agential reality.”

      The ultimate model :-)

    4. austo- Sterling argues for sci-entifi c analysis that can answer the question how does the social become mate-rial? The strength of her perspective is revealed in her insightful analysis of what may seem an unlikely topic: bones.

      sociomateriality?

    Annotators

  2. Oct 2016
    1. Index contains more than a billion terms collected from over 400 billion hyperlinks to the homepages of websites

      If I'm reading this right it seems that they indexed all the text of hyperlinks that points at the base URL for a website?

    1. Uber has heretofore effectively controlled its workforce without necessarily being responsible for them in the eyes of legal and regulatory authorities

      Control without responsibility.

    2. Drivers risk “deactivation” (being suspended or removed permanently from the system) for cancelling unprofitable fares.

      Wow, I had no idea that drivers had no choice in who they pick up...

    3. Yet in the Uber system, the labor drivers do is actually shaped by two primary factors: the employer’s use of surveillant practices to effect “soft control” (Deleuze, 1990; Boltanski & Chiapello, 2007) over otherwise flexible independent contractors, and corresponding practices of resistance developed by those workers in the system (Ball, 2010; Levy, 2014).

      Interesting to see the connection to Deleuze here.

    4. Griswold, 2014; Hill, 2015; Hockstein, 2015; Johnson, 2014; Porter, 2015; White, 201

      All of these are Uber related.

    5. However, while these accounts might not describe every driver’s experience, the collected evidence nonetheless reveals several structural features of the Uber system that could potentially affect any driver employed.

      Interesting way of acknowledging limits without compromising the methodology.

    6. Approximately 1350 total archival items were collected, documenting the activities and conversations of drivers through forum posts, interviews, and other personal contacts, including email correspondence with Uber Community Support Representatives (CSRs), selected out of thousands of posts made over a nine-month period.

      How were they selected?

    7. Uber relies heavily on the evolving rhetoric of the algorithm to justify these information asymmetries to drivers, riders, as well as regulators and outlets of public opinion

      The rhetoric of algorithm is an interesting way of describing it -- it is discourse.

    Annotators

    1. Consider, for example, fictions whose duration is measured indecades to millennia, such as fundamental operating system design,the graphical user interface for human-computer interaction, NorthropFrye’s archetypes of literature, Galilean science, great literature and thecultural envelopes of mythology.65These, in varying ways and tovarying degrees, show the independence of the fictional in their abilityto create imaginative spaces that become the reality within whichpeople live productively and create other fictions.

      Are these fictions or are they forms?

    2. computing would furnish no more than convenient access to data andcommunication among colleagues, as ‘just a tool’

      but isn't that all a computer is? a tool?

    3. fixed structures of knowledge.

      do these even exist?

    4. Clifford Geertz’

      Anthropology

    5. I argue here that the point of all modelling exercises, as ofscholarly research generally, is the process seen in and by means of adeveloping product, not the definitive achievement.

      Ok, a process, I'm down with that.

    6. Alan Perlis asked in one of hisdelightful epigrams, ‘that software is not like anything else, that it ismeant to be discarded: that the whole point is to always see it as soapbubble?’

      Why is this like anything else? Isn't everything really this way?

    Annotators

    1. Payload manifests only include the pathnames of files. Because of this, a payload manifest cannot reference empty directories. To account for an empty directory, a bag creator may wish to include at least one file in that directory; it suffices, for example, to include a zero-length file named ".keep".

      If there's an empty directory a BagIt manifest won't record it unless an intervention is made.

  3. Sep 2016
    1. er. The ethnographic seduction by victims and perpetrators of violence became, therefore, a font of, rather than an obstruction to, insi

      The seduction itself is a useful thing to analyze.

    2. The association of the words victim and seduction makes me vulnerable to the unwanted charge that I somehow imply the victim brought upon himself or herself the pain that was inflicted, while the mere proposition that victims of violence might mold what they tell us could contribute to their victimization and, ulti- mately, might cast a shadow on my moral standards. How can I question the horror stories I have bee

      showing reflexivity here

    Annotators

    1. It is hard to say how generalizable our findings might be.

      hahahahaha

    2. Patton (2002), for example, outlined sixteen types of purposive samples

      Wow, that's a lot of types of purposive samples!

    Annotators

    1. These forms of organizational cooperation, that Engeströmet al.(1999)call‘knotworking’, are based on the weaving together of different activitiesaround the emergence of a partially shared object of work which keeps themtogether while also keeping them distinct.

      ❤️ the term Knotworking .. it reminds me of Jackson and Tarleton Gillespie's "Policy Knot". I wonder what the provenance of this knot metaphor is.

    2. Activity systems are, in fact, by defin-ition internally fragmented and inconsistent. The tensions and conflictsemerging from such contradictions constitute the origin and the source of

      This fragmentation and brokenness aligns nicely with broken world thinking, repair and seems very relevant for analyzing web archive systems.

    3. post-functionalist theories ofthe social

      What is postfunctionalism here?

    4. Rather than starting with the technology and examining how actors appropri-ate its embodied structures, or starting with actors and their rules and re-sources, this view starts with human practice, thus avoiding the dualityaltogether. The aim is then to examine how the practice enacts emergentstructures through recurrent interaction with the technology at hand.

      There could be some useful lessons for the study of algorithms here.

    5. making social rules accessible through discourse requires ne-cessarily that we interpret them

      Perhaps this is where some of the controversy comes in. Whether the rules can be inscribed?

    6. The idea that actors areknowledgeable and reflexive agents is fundamental to structuration theory

      How does this mesh with Latour's idea of actants?

    7. rules describe the regularitiesand generalized procedures used in the production of social practices whichare to be expected from those involved in them

      It might be interesting to consider what rules in this sense have in common with Algorithms. Who follow the rules in each case? Do people who use algorithmic systems follow the rules without knowing them? Do the rules become visible on breakdown?

    8. The hammer as such acquires a separate‘existence’only when it breaks or islost: that is, when its unreflective use becomes problematic

      This idea that infrastructure only becomes visible in breakdown has its roots here in Heidegger?

    9. The elevation of the value of theory and contemplation are infact an expression of the will of intellectuals to preserve their position among theruling class; as such, the priority of theory is based on material reasons and thehierarchy between the two is the result of a fraud

      💥

    10. the aim of science is not that of producing theoretical knowledge butmore of obtaining practical mastery of the world in order to satisfy the practicalneeds of mankind

      This sounds like pragmatism.

    11. Within a couple of centuries of his death, the political dimension of ethics, andthe status and legitimacy that Aristotle had granted topraxiswere forgottenand replaced with an idea of knowledge and virtue as only the result ofcontemplative life.

      And perhaps scholarship? It strikes me that my interest in practice theory may stem from what I would like to do when I finish my PhD: return to practice.

    12. Nussbaum 1986, p. 395

      Nicolini is drawing heavily on Nussbaum's work here.

    13. Practices need to bestudied analytically rather than descriptively (Llewellyn 2008). Advocates ofany of the strong programmes thus look with suspicion at the idea that work,activity, and practice can be described using lay categories and withoutreference to a specific theoretical tradition.

      Description is not enough, there needs to be analysis.

    14. we thus need to take a further step and commit,in one form or another, to a practice-based ontology—that is, the belief thatmany social and organizational phenomena occur within, and are aspects orcomponents of, thefield of practices (Schatzki 2001, p. 2). We also need toconduct our analysis on the basis of such premises.

      the link between practices and social & organizational phenomena is important -- it's important to frame analyses this way -- perhaps this could be a good guiding principle for my tagging?

    15. Feldman andOrlikowski 2011, p. 1241

      Could be useful to look at, for examples of strong practice theory.

    16. While the two share an interest in the mundane and often unsungdetails of organizational life, the strong programme strives toexplainorgan-izational matters in terms of practices instead of simply registering them.

      What does it mean to explain a practice instead of merely describing it?

    17. According to Corradiet al.(2010), the starting point of the current band-wagon of practice-based organizational studies can be traced back to thecontributions of three specific research streams.

      Some of the theoretical background for practice theories use in organizational studies.

    18. Choosing one example or another is, however, highlyconsequential. Naming, defining, and exemplifying practices is already theor-izing them.

      This seems like a really important point. That the framing of a research question has a hidden theory that needs to be unearthed.

    19. Practice theories are fundamentally ontologicalprojects in the sense that they attempt to provide a new vocabulary to describethe world and to populate the world with specific‘units of analysis’; that is,practices

      Interesting use of ontology here. The units of analysis are practices.

    20. it also steers away from views thatunderstand social affairs as mere symbolic exchanges between humans (as inthe symbolic interactionism tradition)

      It's interesting to see what theoretical perspectives practice theory argues against.

    21. The contribution of a practice approach is to uncover that behind all theapparently durable features of our world there is always the work and effort ofsomeone

      Hidden work.

    22. So, staging a free election hasto do not only with ideas and principles of free choice and determination butalso, for example, with how the practice of voting is carried out and whethersuch apparently mundane things such as anonymity of the ballot, whetherpolling stations are open long enough for everyone to vote, and how the votesare counted, are guaranteed

      How ideas are enacted in activity is important. The ideas aren't enough themselves.

    Annotators

    1. Jeff Lemieux pointed out the single most significant factor many people point to: the surrounding roads are far too car-oriented.

      Jeff Lemieux is an avid cyclist http://greatergreaterwashington.org/jlemieux/

    1. Our mission is to really create a top university community here,” says Eric Olson, a former Prince George’s County Council member who directs the College Park City University Partnership, a town/gown group that includes high-placed university officials, the mayor, and state senator Jim Rosapepe.

      Possible people to interview?

    1. An advisor once challenged me to interrogate precisely the things that immobilize my imagination; I’ve never seen such paralysis as when we talk about assault.  Why is it that the conditions we choose are good to think with, while the things that happen to us are not?

      Choice requires power. When we are studying up things may happen to us, and these are the things that must be studied.

    2. Being watched made me watchful, obsessively engaged.  Preparing for a trial, a police report, a confrontation, I was aggressively attuned to my surroundings.  Hungry for detail, I filed facts away: the shifting clientele of downtown establishments; the quality of ice encasing different streets.  The exact setting time of the sun. 

      How is this state of watchfulness heightened. Are the ways or reasons for its heightening significant for what is observed?

  4. Aug 2016
    1. Grint, K., and S. Woolgar. 1992. Computers, guns, and roses: what's social about being shot? Science, Technology, and Human Values:366-380

      Important for the debate of social vs technical construction. Used in social informatics theory.

    2. Actor-networks reach stability when they become irreversible. Irreversibility iswhen it would be either too costly to reverse the relationships or doingso becomes improbable. Reaching network stability requires: (1) successfully negotiating the enrollment of participants,followed by the (2) translation of an (3) obligatory passage point (when the sets of relations and those enrolled become (4) irreversible)(Latour 1987). Mobilization of network members ensues as a result of irreversibility and stability where social investment in the network reaches a point at which withdrawal would be unthinkable. The durability of a network is matter of the robustness of the translation. Networks collapse or undergo changes if the translation processes whichbrought the networks to their current state can revertor if the networks cannot resist alternative translations

      This could align nicely with Latour's ideas about actants.

    3. Callon, M. 1986. The sociology of an Actor Network'in M. Callon. J. Law & A. Rip (editors) Mapping the Dynamics of Science and Technology. London: Macmillan

      Reminds of "assemblage" from Deleuze. This could be interesting to look at.

    4. Social informaticsis a perspective, a way of framing,the particular dynamics of IS and ICT in social and organizational worlds.

      This approach could be useful for thinking about web archiving organizations. Not simply individuals acting with technology...

    5. Orlikowski, WJ. 2002. Knowing in practice: Enacting a collective capability in distributed organizing. Organization Science13 (3):249-273.

      Practice theory!

    6. This process of making something (like a commodity technology or a particular artifact) personal is a ‘taming’ or training that take place over time. This may not lead to success (or a desired outcome) and domestication scholarship often highlights the churning or seemingly cyclical patterns of non-progress towards full acceptance/belonging. In studying this process, domestication emphasizes the relationships among the object, individuals and the larger social milieu in which this process unfolds (and often grants agency to the media messages and opinion leaders for framing the roles, uses and expectations of ICT).

      Domestication might be an interesting lens to look at web archival work & software.

    7. To date, ANT’s conceptual vocabularyand methodological demands have beenused eclectically in ISresearch(Walsham 1997; e.g., Pouloudi and Whitley 2000).Numerous case studies inspired by ANT serve as a means to improve the understanding of IS researchers of the design and use of ICT, which is of significance for IS (Hanseth, Aanestad, and Berg 2004). And, there existsa prominent and meticulous adoption of ANT in the literature on information infrastructure. The size and complexity of infrastructural technologies such as groupware, and the characteristic that they generally build upon existing technologies, make researchers direct their focus from ICT or isolated technological artifacts to a more complex notion of IT infrastructure (Hanseth, Monteiro, and Hatling 1996). Several researchers have drawn upon ANT to account for the sociotechnicalnature of the information infrastructure which not only includes artifact but also human habits, norms, and roles, that may prove its most intractable elements (Jackson et al. 2007). For example, building on ANT’s conceptual vocabulary, Hanseth and Monteiro (1996)investigate how any given elements of information infrastructure constrain others, and how these elements inscribe certain patterns of use. To do so, they identify explicit anticipations of use by various actors during use, and the way these anticipations are translated and inscribed into standards

      All these studies could be useful to look at for ANT's use in IS research.

    8. Akrich, M. 1992. The de-scription of technical objects. In Shaping technology/building society: Studies in Socioteclmical Change, edited by J. Law. Cambridge, MA: MIT Press

      For a description of ANT.

    9. Rooted in a “...ruthless application of semiotics” (Latour 1999, , p. 3), ANT’s first premise isthat entities have no inherent qualities: theyacquire their form and functionality only through their relations with other entities9

      I know it's trendy, but this approach seems to have a lot of merit. I wonder what insights it could offer?

    10. The shift from technology as an embedded structure toward agency of humans reached its apex with the practice lens of Orlikowski ((Orlikowski 2000; Schultze and Orlikowski 2004). She proposes the notion of technology-in-practice, which refers to the structure of technology use enacted by social actors while they interact recurrently with a particular technology artifact. Seen this way, technology-in-practice is emergent and enacted, not embodied or appropriated

      A recommended article that crtiiques strong social constructivism. Affordances of objects are important too.

    11. Woolgar, S. 1991. The turn to technology in social studies of science. Science, Technology & Human Values16 (1):20

      Overview of STS in IS.

    12. Orlikowski, W. J. 2000. Using technology and constituting structures: A practice lens for studying technology in organizations. Organization Science11 (4):404-428.

      Used as a foundation by Orlikowski in her SCOT work.

    13. Orlikowski, W. J., and D. C. Gash. 1994. Technological frames: making sense of information technology in organizations. ACM Transactions on Information Systems (TOIS)12 (2):174-207.

      A key study for the Social Construction of Technology (SCOT).

    14. To do so, researchers must pay due attention to the process and content of technology itself. Shifting away from “the impact” of technology, this body of research tends to highlight how technology is constructed during research, development and innovation phases, and how structural and political circumstances of its development are reflected in technology. Over time,STS scholars have embraced severaltheoretical approaches. Three of the most prominent are:the socialconstruction of technology (SCOT), focusing on constructs like interpretive flexibility and relevant actors; thesocial shaping of technology (SST) drawing on concepts like configurationand trajectories;and,actor-network theory (ANT) which introducesnetworks, enrollment, translation and irreversibility

      Three possible ways of looking at technology with STS.

    15. Latour, B. 2005. Reassembling the social: An introduction to actor-network-theory: Oxford University Press, USA.

      Maybe it would be good to read this one again?

    16. Woolgar, S. 1991. The turn to technology in social studies of science. Science, Technology & Human Values16 (1):20

      Overview of STS use in IS research.

    17. MacKenzie, D., and J. Wajcman. 1985. The social shaping of technology. Buckingham. Open University Press.

      Seminal STS work for studying ITC.

    18. Arguably, critical social theory in these studies is mostlyrooted in the work of Jurgen Habermas and Michel Foucault.

      Two key social theorists used by IS folks.

    19. meta-theory:

      Meta-theory could be interesting, but difficult to use.

    20. What this “relation to machines” might be, and how it affects social actors’ practices, however, is not elaborated in structuration theoryand analysis of these properties remains largely underdeveloped (Jones and Orlikowski 2007).

      This could make it problematic for looking at web archiving systems and archivists.

    21. Schultze, U., and W. J. Orlikowski. 2004. A practice perspective on technology-mediated network relations: the use of internet-based self-serve technologies. Information Systems Research15 (1):87.

      Practice!

    22. DeSanctis, G., and M. S. Poole. 1994. Capturing the complexity in advanced technology use: Adaptive structuration theory. Organization Science:121-147.

      First citation for adaptive structuration.

    23. Mumford, E. 2006. The story of socio-technical design: reflections on its successes, failures and potential. Information Systems Journal16 (4):317

      Could be a useful historical overview from one of the key theorists.

    24. Lower status positions (service, support and administration) were often outsourced or transferred to temporary employment and given far less voice or status in the contemporary firm.

      I wonder if it could be useful to think about archival work in this context?

    25. Carr, N.G. 2008. The big switch: Rewiring the world, from Edison to Google. New York: WW Norton & Company.

      The trend away from participatory design.

    26. However,the sociotechnicalideals of the Tavistock Institute found fertile ground in Scandinavian countries. In the late1960s, “the Norwegian Industrial Democracy Projects” introduced the principle that technology innovation should improve work practices along with productivity measures(Thorsrud 1970). This was meant to empower employees to organize their own jobs. In the 1970s, figures like Kristen Nygaard–and more recently Bo Dahlbom, Pelle Ehn, Erik Stolterman andtheir students –pioneered the Scandinavianapproaches to the social analyses of computing.

      Connection between Tavistock Institute and Norwegian participatory design principles.

    27. Theessence of the early sociotechnicaldiscoursein ISisfoundin the proceedings of the “Human Choice and Computers” conference (Mumford andSackman(1975).

      Could provide some useful information on early forumulations in sociotechnical theory.

    28. The second attribute of the Tavistock approach was the importance of worker involvement. At its core, Tavistock’s sociotechnical approach was interventionistand activist. As we notebelow, thisorientation to worker’s interests andactivism underlies the action-research orientation of Enid Mumford’s ETHICS and Peter Checkland’s Soft-Systems Method (SSM)(Checkland 1995; Mumford and Weir 1979), the participatory design principles that characterize the Scandinavian and Nordic scholarship , and perhaps some of the more contemporary design-centric approaches to IS

      The connection to participatory design is interesting here. I suspected, but didn't know that sociotechnical approaches had something in common with participatory design.

    29. Tavistock scholars advocatedequal attention should be paid to providing a satisfactory work environment for employees. In this regard, the main innovation of the Tavistock research was the design of technology-supported work arrangements that could enrich work practices using multi-skilled jobs with workers organized intoteams.

      The focus on environmental concerns was new -- fitting technologies to their social situation, rather than the other way around.

    30. In contrast to a-contextualizedand de-temporalizedapproaches, the sociotechnical perspective is premised on the embedding of the ICT/IS into the morecomplex worldof situated action: a world that is tightly tied to the characteristics of where the actions occur.

      Is situated action a pre-existing field of work that STS draws on?

    31. The underlying premise of mutual constitution isco-evolution among that which is technological and that which is social. Thefocusoninterdependency amongtechnology and human organizationis done by attending to material triggers, actions of social groups, pressures from contextual influences, and the complexprocesses of development, adoption, adaptation, and use of new (digital) technologies in people’s social worlds(Jones and Orlikowski 2007).

      A nice definition of mutual constitution in sociotechnical theory. The reference might be good to follow up on.

    1. The poem is something seen, not just conceived

      It is discovered more than created?

    1. “There is no one ‘magic algorithm’ for identifying terrorist content on the Internet,” the company said. But it deploys technologies such as proprietary spam-fighting tools to supplement reports from the public to help identify people who violate Twitter’s user policies. During the past six months, these tools have helped the firm to automatically identify more than one-third of the accounts that were ultimately suspended for promoting terrorism, the company said.

      It would be interesting to know more about how Twitter is doing this work. If anyone has any tips or leads I'd love to hear from you.

    1. Or so I thought! After deleting about 3200 tweets, however, I started hitting the end of the road. I couldn’t go back any further. I was super confused–why wouldn’t I be able to see my new 3200 most recent tweets, now that all the other crud had been deleted? Was it a caching issue? Had I hit a speed limit? Then I read the documentation more closely: The value of count is best thought of as a limit to the number of tweets to return because suspended or deleted content is removed after the count has been applied. Meaning: Twitter doesn’t actually delete your tweets, I guess. I suppose they just mark them as deleted, but keep those tweets you don’t want anymore to themselves. If that’s the case, that’s pretty creepy to me–and also kind of hilarious, since I’m pretty sure not deleting deleted tweets is against their TOS. Here’s what Twitter said while talking about Politiwoops, a service that showed politician’s deleted tweets that Twitter shut down:

      This is a really interesting finding, that content is not deleted but simply blocked for access. What are the implications for things like right to be forgotten?

    1. the perfect web archive does not exist

      I totally agree. I think you could remove "web" from this sentence and it would still work.

    1. How can we extend the same care and attention to the billion or so people who post to Facebook each day?

      Does this question even make sense? What does it mean to extend care & attention to a billion people? The only thing that can feasibly do that is computation isn't it?

    2. The Facebook user and the amateur intelligence agent are both enmeshed in a “neoliberal system of free labor,” voluntarily producing value for others — NATO, Facebook, whomever — while expecting no formal commitment or compensation in return.

      What a weird world we live in.

    3. Not only did institutional power survive the coming of the network society, it appeared to be thriving.

      This arc from the techno-liberation to techo-surveillance was so jarring. It's hard to imagine it not being at play the whole time.

  5. dev.twitter.com dev.twitter.com
    1. Utility used to post the Tweet, as an HTML-formatted string. Tweets from the Twitter website have a source value of web.

      Interesting to see how this was used as part of http://varianceexplained.org/r/trump-tweets/

    1. The Left needs a vocabulary, and a self-understanding, that highlights and foregrounds the importance of constructing and expanding anti-systemic movements that aim to defeat systems of oppressive and exploitative power.

      I find this language of defeat problematic. I guess I'd prefer overcome, sidestep, dismantle, etc.

    2. Moreover, the way we challenge everyday impacts should be informed by our understanding that they are not produced simply by individual actions, but by the operation of large-scale systems

      I'm confused: is it possible to understand the systems without considering the individual acts that comprise them?

    3. But if we are to defeat colonialism and capitalism, we cannot do so one person at a time, or one interaction or relationship at a time.

      Reminds me of the old "think global, act local".

    4. It seems clear that the attentiveness in today’s Left activist subcultures to interpersonal dynamics within the movement reflects a genuine learning process. It is a step toward beginning to address problems that were, in effect, glossed over and ignored by phrases like “the people” and a complacent view of the prospects for building genuine “solidarity” and “alliances.”

      I wonder how much feminist ethics is at play here with the shift to focusing on interpersonal dynamics?

    1. These archiving endeavours were initiated by institutions such as the American University in Cairo, media initiatives such as Mosireen, by artists and citizens.

      It would be interesting to learn more about how these projects came to be, and their methods/tools.

    2. And so, new distribution networks appeared. Art as we knew it not only left the gallery spaces for the streets but also for online platforms, that is, for platforms of knowledge and spaces of resistance. Online projects, web-platforms and communities (Facebook groups) supporting the revolution were also in full bloom.

      I like this idea of looking at these Web spaces as new distribution networks for art & activism.

    3. The present reason for this silence is obvious, and serious: that speaking out can put people in danger, in particular those who are legally responsible for NGOs or who are authors of even marginally critical work.

      Chilling effects.

    4. While surveillance systems have always been an integral part of Egypt's governance, if this is true, it is the first time that such an extensive system as the Deep Packet Inspection technology – enabling geo-location, tracking, and combing through Facebook, Skype, Twitter, among other social networks – is being used in Egypt (and most certainly like in many more countries in the world.) Since 2014, the crackdown on the Internet has been relentless.

      Social Media is a tool now for the activists and the state.

    5. Can we imagine a deed or gift for digital archives? Can activists/archivists negotiate consent between the owner of the content, creator of the content and subject of the content of the archives in the digital age?

      A key question for those of us working on the Documenting the Now project!

    1. Meanwhile, we who build digital libraries (which we hope future researchers will utilize) are designing new trauma archives. The open source software we build enables discovery for the collections of the United States Holocaust Memorial Museum, and archival collections at Stanford like the records of the STOP AIDS Project. One should not attempt to engage with these collections without a sense of embodiment and advocacy. We need to push back against the notion of the dispassionate researcher, the dispassionate archivist.

      Verne Harris is a good read in this vein.

    2. From listening to historians like Davis, and from our understanding of psychology, it is clear that design decisions which divorce scholarship from emotional response are not in the best interests of our users

      Makes me wonder the degree to which this attention to emotion is aligned with what people are talking about when they talk about impact.

    3. because they represent a single majority-rules point-of-view masquerading as neutrality

      Are they really masquerading as neutrality, or are they limited by the affordances offered by the list of things? What alternatives are there to a list of things?

    4. Try Google searches on every variation you can think of for women’s and girls’ identities and you will see many of the ways in which commercial interests have subverted a diverse (or realistic) range of representations

      Maybe things have improved? I tried african american girls learn use internet which seemed to work reasonably well?

    5. Although Google’s exact search algorithms are trade secrets and shift over time, we do know that they are based on a patented and published algorithm called PageRank, and that they work by defining relevance and significance by looking at what pages on the Internet are linked to most often on a given subject (https://en.wikipedia.org/wiki/PageRank). This creates a majority-rules definition of relevance that masquerades as neutrality.

      Isn't writing a paper about the algorithm and publishing it actually not a bad example of self-disclosure of the bias built into the system that is (or was) Google search?

  6. Jul 2016
    1. The techniques and software of surveillance are freely shared between practitioners on both sides.

      http://www.orbooks.com/catalog/when-google-met-wikileaks/ to be taken with some Assange flavored grains of salt.

    2. We obsess over these fake problems while creating some real ones. In our attempt to feed the world to software, techies have built the greatest surveillance apparatus the world has ever seen. Unlike earlier efforts, this one is fully mechanized and in a large sense autonomous. Its power is latent, lying in the vast amounts of permanently stored personal data about entire populations.

      Once you see what Maciej is saying here it's impossible to unsee it. It's frightening, but so important.

    1. I’mparticularly drawn to the meso-levels of infra-structures, where people create and rely uponnew forms of data as information. It is at themeso-level where ethnographers who exam-ine information systems (such as Peter Botti-celli,36Kalpana Shankar,37and Susan Leigh

      This focus appeals to me too ; getting at the everyday practices, and building theory based up on observed activity.

    2. Micro refers to the individual orpersonal level, the day-to-day practices thatmake up our lives. The meso-scale is theorganizational or institutional change that weseewithgroupsofpeopleacrossweeksandyears. Finally, the macro-scale refers to infra-structure over long periods of time, decades oreven centuries (what some have called the“long now”

      Useful to think about these different levels. I've found my own work getting muddled without thinking about them.

    3. To my mind, data’s impact on soci-ety and studies of data have reached a point forwhich it is now time for historians of comput-ing to historicize data directly.

      It's an interesting that computing has reached this inflection point where it can now be the subject of history.

    Annotators

    1. However, if Twitter does not prominently describe how its Trending Topic algorithm works, then Zelda’s informational power is entirely dependent on the accuracy of other sources she may (or may not) have used to build her understanding of the information flows on Twitter.

      Information power can be used by a variety of actors, including those that may use that power in ways that are at odds with the organizational goals of the platform.

    2. What is important is that access to information about how this part of the platform works creates the possibility for the individual to make a choice. Choice creates the possibility for the expression of informational power. These possibilities are closed off when users do not have the basis of informational power from which to enter these fields of action.

      Being able to recognize choices that can be made, and being able to make them is an elegantly simple indicator of information power.

  7. May 2016
    1. The restrictions that arise from authorita-tive management of knowledge can be minimized with theparticipatory, inclusive, and representative knowledgeecology that is fostered by social, community tools,although an approach that is too decentralized runs the riskof having a chaotic approach to standards, or no standardsat all.

      Balancing decentralized and centralized models is difficult. Now that we have WARC is a chaotic approach to standards that much of a problem?

    2. As outlined, there are several approaches to building webarchives—some developing from institutional mission state-ments, some from frustration with existing resources, and allfrom limited understanding of the end users’ needs. Tempo-rary ad-hoc practices that are developed to circumventobstacles were discussed in several interviews. All respon-dents described similar obstacles whatever their disciplinarybackground. The ways in which these obstacles are handleddetermines, among many things, the character of the result-ing archive, the limitations of use as set by access points tothe resulting archive, and ultimately the perceived value theresulting web archive offers to different communities ofresearchers

      Seems like the ad-hoc solutions aren't being seen as potential sources of innovation.

    3. But we just found that there was no proper solution to do it. Welooked at Archive-It (the one from archive.org) but it uses Javaand has to be installed on a TomCat server and there aren’tmany web hosting companies that do that. We also talked toHanzo and it was just way too expensive. So we realized wewould have to build something ourselves and that meant gettingfunding. But no one was interested, they didn’t get why wewanted to archive something that was happening right then.

      Tooling sucks and is expensive.

    4. Beyond the public viewsof web archiving are those of funding institutions andresearch communities that do not see the purpose of archivingsomething that is happening now on the web.

      kind of funny in light of the funding mellon provided for docnow

    5. Col-laboration and partnership are complex issues that are essen-tial to the success of large-scale web archiving projects

      Why are they essential? I understand the spirit of this, but it also seems to be operating from a given position.

    6. The more we isolateaccess to web archives from other archives, the less attentionthey will receive, and the less progress will be made.

      the need to mainstream web archives into archival collections -- it's interesting that archives have struggled to do this with other materials before the Web though.

    7. but through each themethe conceptual and methodological differences betweenstakeholders can be seen as a foundational rift.

      rift between people doing things, which doesn't account for the sociotechnical system that they are a part of?

    8. ethical guides

      Interesting that lack of ethical guidance was a problem. I guess it is unclear what can be collected from the Web, and how it can be used.

    9. The lack of shared practices, accessible tools, and clearlegal and ethical guides were repeatedly named as obstaclesto advancing web archiving

      One thing that has happened since is the emergence of Archive-It as the de facto accessible tool.

    10. For instance, several interviewees spokeabout what could be categorized as ontological and episte-mological approaches to web artifacts and identified theirinvolvement in both concrete local decisions and morewide-ranging professional debates on how best to integratearchives of such objects into existing collections

      Here's that ontology again, this time with epistemology. What's going on here?

    11. hey all spoke about obstacles to advancingweb archiving, reasons for those obstacles, and potentialsolutions to overcome those obstacles in different ways

      problems and solutions -- possibly similar to breakdown?

    12. Each inter-view aimed to solicit opinions, ideas and reflection from therespondent based specifically on his or her own personalexperience with web archiving.

      Could be useful to add information to my article that indicated that the goal was to hone in stories about the seed list.

    13. Of the 17 people interviewed, 4are researchers in the social sciences and humanities, 9 arearchivists or librarians working on digital preservation proj-ects at their institutions, and 4 are technicians or softwareengineers building tools to support digital preservation

      It would be useful to characterize the people in my study as well.

    14. Since the webarchiving community is relatively small, we used a purpo-sive sampling method to identify some of the key experts inweb archiving

      Important to show how my study is different because it does not focus on experts so much as it does working archivists who build seedlists.

    15. The risk, of course, is that without an ontological under-standing of those methods and collection development poli-cies, these collections may be difficult for other researchersto use. Furthermore, because these archives are built on ashoestring budget by a researcher who may have little tono understanding of archiving procedures, and no real tech-nological infrastructure to rely on, they are often inacces-sible to others, residing on the hard drives of individualresearchers

      The problems with subject based collections. The use of ontological here is interesting.

    16. Approaches to web archiving tend tofall into three categories: large-scale collections, smaller-scale thematic collections, and idiosyncratic collections(Dougherty, Meyer, Madsen, van den Heuvel, Thomas, &Wyatt, 2010).

      This looks like a useful characterization of web archive work. Could be useful to add to my literatures review.

    17. (Cho & Garcia-Molina, 2000; Fetterly, Manasse, Najork, &Wiener, 2004),

      These might be good sources for the rate of change on the Web.

    18. Although these pages are updated and refreshed continu-ously, older versions are rarely archived by content produc-ers

      Just because there is change doesn't mean (necessarily) that content is disappearing.

    19. There is currently a wide gap between the researchers whoneed archival data sets to support their studies of onlinephenomena, and the archivists and other practitioners whohave the expertise to build such collections and the tools tomanage and access them

      Gap between researchers and archivists. This is the space that Ian Milligan is working in.

    Annotators

    1. HALL: For the most part, the rules were basically you have to collaborate. So what they did was create kind of an internal Facebook page - for a lack of a better reference - where we all created groups. We joined groups, and then we would post as we researched, so we had one system in which we did the research, another where we posted what we were finding. And what was remarkable about it - this was what - in the truest sense collaboration. If I found something from India or Russia that I thought looked of interest, you know, you'd find somebody. You'd spend a little time looking at it. You'd go do an Internet search and see if you can find a footprint of this person anywhere. And then if you found that you'd post it. You might post some corresponding links. And particularly in some of the Latin American countries where resources are pretty slim and many of them are under threat, we are able to do a lot of the groundwork for them that then they could run with.

      I wonder what this system is that allowed the journalists to collaborate in groups on the documents: sharing links, notes, etc. I didn't see it detailed in the writeup at The Source.

      Perhaps it's Nuix, but it sounds like more than a system for ocr, indexing, etc.

      Just an aside, it's kind of weird that the Source article doesn't even mention Nuix. Perhaps there were different teams working with different technologies?

      https://www.youtube.com/watch?v=31suMWkgdo4

    1. A recorded album can be just the same 20 years later, but software has to change
    1. How do wedemonstrate that the digitized evidence of human rights abuse contributes in the dispensa-tion of justice or in preventing or ending injustice? In what ways do efforts to provide access todigital surrogates contribute positively toward social equity and access to life opportunities?Furthermore, what infrastructure must be in place so that this is achieved?

      Putting records to use to effect social change.

    2. Moreover, while data collection strategies thatrecord numbers of visits and frequency of requests or borrowing may provide useful informa-tion, these data do not offer reliable measures of institutional impact or nuanced portraits ofaudience engagement (Saracevic 2009). Recent studies have noted the inability of a significantportion of institutions to demonstrate the value of their work beyond simple usage statistics andfrequency of visits (Davies 2002; Fraser et al. 2002; Lakos and Phipps 2004; Duff et al. 2008;Franklin and Plum 2010; Carter 2012; Chapman and Yakel 2012; Hughes 2012; Duff et al. 2013).

      What are ways to measure impact absent these superficial and mass appeal driven statistics?

    3. Projects such as the InuvialuitLiving History (http://www.inuvialuitlivinghistory.ca) and the Plateau Peoples’Web Portal(http://plateauportal.wsulibs.wsu.edu) provide platforms that support Indigenous knowledgesystems and values over digital access to the archival holdings of various institutions (Christen2011)

      Need to follow up on these.

    4. Meanwhile, corporations have stepped in to partiallyfill the economic void by offeringfunding and labor for digitization projects in exchange for control of information, causingthe increased privatization of public records.

      Public Private Partnerships.

    5. As funding has been slashed for professional positions, repositories haveincreasingly relied on unpaid intern and volunteer labor, raising serious challenges for stu-dents and new professionals and lingering questions about the sustainability of the profes-sion

      Sad and true.

    6. Here, the challenge is not just how to get more faces of color at the table but to interrogate thecultural foundations and accompanying power structures upon which the table is built.

      Nice metaphor.

    7. For example, widespread professional resistance toIndigenous ways of knowing, as evidenced by the debate surrounding the Protocols for theNative American Archival Materials and the ultimate failure of the Society of American Archi-vists to endorse them, reveals how much more work is needed to open up pathways forpluralism in mainstream archival practice.

      I'm not familiar with this story. Seems like a pretty important thing to know about.

    8. Furthermore, archival studiescannot continue to ignore burgeoning critiques of“human rights”as a neocolonial industryemerging from otherfields for much longer (Posner 2014

      I hadn't quite considered how human rights could reinscribe the problems it is trying to redress.

    9. from the psychologicalimpact that processing records of violence may have on archivists

      Diane's research interest.

    10. How would the archival conversation shift if we abandoned the rights-based model in favorof a feminist ethics of care? What happens when we begin to think of record keepers andarchivists less as enforcers or violators of human rights and more as caregivers, bound to re-cords creators, subjects, and users through a web of mutual responsibility?

      This is a much more attractive and fruitful seeming approach.

    11. an“ethics of care,”which stresses the ways people are linked to each other and larger communitiesthrough webs of responsibilities, is a more inclusive and apt model for envisioning and enactinga more just society (Gilligan 1982; Card 1991; Cole and Coultrap-McQuin 1992; Frazer, Hornsby,and Lovibond 1992)

      good stuff to read

    12. At its core is the activeacknowledgment of cultural difference, Indigenous epistemologies, and multiple ways of know-ing as equally valid perspectives of knowledge creation (Christen 2011; McKemmish, Faulkhead,and Russell 2011; PACG 2011

      How do multiple ways of knowing impact the archive? Are there multiple archives?

    13. To encourage larger societalparticipation in archival endeavors, archivists are called to relinquish their role as authorita-tive professionals in order to assume a more facilitative role in crucial archival practices of ap-praisal, description, and development of access systems.

      This is an interesting idea. Reminds me of what Sam has been trying to do in Wisconsin.

    14. provenance has been recast as a dynamic concept that includes not only the initial creators ofthe records, who might be agents of a dominant colonial or oppressive institution, but moreimportantly the subjects of the records themselves, the archivists who processed those re-cords, and the various instantiations of their interpretation and use by researchers.

      provenance has a broader application than just to the record creators

    15. Wallace (2010) writes that the term can appear so broad that itsmeaning can be elusive at best and, at worst, is watered down or co-opted by the very powersit seeks to critique.

      I can relate.

    Annotators

  8. Apr 2016
    1. sci-fi’s outsider heroes interrogate systems of power.

      What does it mean to interrogate power?

    1. Ethnography in this dynamic arena eventu-ally necessitates a ‘technologized’ researcher (Lash, 2002, Lunenfeld, 2000).

      Reminds me of issues/concerns from the digital humanities.

    2. I will argue in this article that everyday life takes place on the internet: there is no difference between online and offline interpersonal communica-tion (IC).

      This is an odd claim, given that it seems like it's easy to imagine differences between offline interpersonal communication.

    Annotators

    1. It is a disservice to users and ourselves to ask only how much or how often and to avoid understanding why or how. User research methods work best as an accumulation of triangulation points of data in a mutually supportive, on-going inquiry. More data points from multiple methods mean deeper insights and a deeper understanding.

      Qualitative and quantitative methods are mutually reinforcing. Love the diagram.

    2. In other words, we only know what we know and can only ask questions framed about what we know.

      This seems to highlight how important it is to have looseness built into the methods like interviews -- so there is space for surprise.

    3. The most exciting part of my own work is feeling surprised with a new insight or observation of what our users do, say, and believe. In research on various topics, we’ve seen and heard so many surprising answers.

      How do these moments of surprise registe? What constitutes them?

    4. This is all to say that insights, answers, and explanations are limited by the breadth of a researcher’s understanding of users’ behaviors

      This seems like the key insight. We must acknowledge the limits of our own understanding of the world, and how they frame our study of the world.

    1. He also splurged on the very best fake Twitter profiles; they’d been maintained for at least a year, giving them a patina of believability.

      Curation gone wrong.

  9. Mar 2016
    1. recursion, mixed-media or combinations of text-and-image, and virtual reality invention

      ok, this sounds interesting and revisionist

    2. What makes a DH project experimental now? How do the digital humanities benefit from experimental projects? And within the parameters of DH work that is now recognized as scholarship that counts, how can we make room for experimentation, for projects that might and sometimes do fail?

      This idea that an archive isn't radical or experimental kinda irks me a bit.

    1. Insum,documentsprovidebackgroundandcontext,additionalquestionstobeasked,supplementarydata,ameansoftrackingchangeanddevelopment,andverificationoffindings

      nice summary of the uses of document analysis

    Annotators

    1. Understandingthepoliticalpreferenceofanaudiencecanbeimportantforpresentingtailoredinformation(includingorexcludinginformationtotheuser’stastes

      UGH! ECHO CHAMBER!

    2. Inourcase,theseareRepresentativesusingTwitter

      So these are the House of Representatives and Senators that are on Twitter?

    3. liberal/conservativebias

      Are political preferences really a single axis?

    4. removedforanonymity

      Huh?

    5. Wepresentamethodforcom-putingthepoliticalpreferenceofanaudiencebyanalyzingtheir“following”behaviorandillustratethisapproachwithmediaout-lets,government,andinterestgroupsandthinktanks.

      Where political preference becomes a coke vs pepsi type of decision?

    Annotators

    1. In follow-on research, we seek to collectground truth on PPD in new mothers, wherein we can empirically validate the relationship between the measures we predict and blues and deeper depressionexperienced by somemothers

      It is kind of astounding that they could publish this paper without the ground truth, isn't it?

      I wonder if they have done it?

    2. The ability to predict significant changes in behavior and mood postpartum has broad implications.Thepostpartum behavioral markers exhibited bythesubset of mothers who we identified as showing extreme changes, resonate with the feelings ofhopelessness, dejection, anddepressive tendenciesseen in postpartum depression

      This seems like the main cognitive leap that they are making.

    3. We conjecture that the general social and psychologicaldistancing characterizing the circumstances of new motherhood is linked tosuch high attentional focuson oneself, and turns out to be a strong predictor of postpartum change for the extreme-changing mothersfor these measures of linguistic style

      And what does this have to do with depression again?

    4. We compareseveral different parametric and non-parametric classifiers to empirically determine the best suitable classification technique, including linear, quadratic, discriminant classifiers, naïve Bayes, k-nearest neighbor, decision trees, and Support Vector Machineswith a radial-basisfunction(RBF) kernel[10]. Thebest performing classifier was found to be the SVM across all measures, which outperformed the other methods with prediction accuracy improvements in the rangeof10-35%.

      I'm still confused about how they know if the prediction is correct.

    5. uchdecreases indicate that these women are posting less, suggesting a possible loss of social connectedness following childbirth.

      Couldn't it also mean the mother is kinda busy taking care of a baby, and social media seems kind of unimportant?

    6. We filter the Twitter Firehose stream (made available to us via a contract with Twitter)

      Wow, ok.

    7. We chose Twitter because it is public and provides a longitudinal record of the events, thoughts,and emotions experienced in daily life.

      Twitter is public.

    8. 71% when we leverage behavioraldata from only the prenatal period

      This is surprising, that it can be predicted based on messages from before the birth.

    9. training data

      Where did the training data come from?

    10. Within this context, we investigate the feasibility of forecastingfuture behavioral changes of mothers following the important life event of childbirth.

      Who will use the forecasts?

    Annotators

    1. Im-portantly, given the ever-increasing amount of digital traces peopleleave behind, it becomes difficult for individuals to control which oftheir attributes are being revealed. For example, merely avoidingexplicitly homosexual content may be insufficient to prevent othersfrom discovering one’s sexual orientation

      Why is this framed as if homosexuality is something to be hidden?

    2. given appropriatetraining data, it may be possible to reveal other attributes as well.

      and pigs might fly

      ... and pigs might possibly fly ...

    3. moderately indicative of being gay

      What the heck does this mean? Didn't Kinsey show that pretty much everyone is moderately gay?

    4. best predictorsof high intelligence

      What does intelligence mean hear.

    5. AfricanAmericans and Caucasian Americans were correctly classified in95% of cases, and males and females were correctly classified in93% of cases

      How did the verify the predictions?

    6. 58,466volunteers

      Is this is a significant sample?

    7. obtainedthroughthemyPersonality Facebookapplication

      An app.

    8. were obtained from users’Facebook profiles

      Scraping public profiles?

    9. 52,700

      This is a lot people!

    10. In contrast tothese other sources of information, Facebook Likes are unusual inthat they are currently publicly available by default.

      Is this still the case?

    11. The analysis presented is based on a datasetof over 58,000 volunteers who provided their Facebook Likes,detailed demographic profiles, and the results of several psychomet-ric tests.

      If they know the demographics then aren't some of those properties known: gender, age, race, etc.

    1. However, with the exception of the group of academicsworking with King’s College Archives, it became clear that it was easier, faster andmore productive to get focus group members to respond to visual material.

      Visual material more useful in focus groups.

    2. uch of the content is veryemotive so may not be appropriate and also safeguarding issues at the College limitour use of student comments and their names

      Interesting that the very thing that makes these descriptions of value is what could exclude them from the record.

    3. The responses East Sussexencountered at the Chailey School were similarly powerful, often angry anddisturbing, always revealing and creative

      juxtaposition of angry & disturbing with revealing & creative is interesting

    4. required to think about records in a more lateral way

      broadening perspectives -- possibly from hearing other voices.

    5. A relationship of trust has developed betweenthe group and the record office that will be revisited in the future.

      I wonder if the focus group methodology helped foster that?

    6. The evaluation of the pilots showed that the focus group model gave an effectiveframework within which record offices could work with a variety of diverseindividuals and groups.

      Focus groups seemed to work?

    7. other offices were keen to explore the expertise orexperiences of people who had worked with or been subject to the records.

      Bring in people who had used the archives or were themselves in the archive in some fashion.

    8. Certainly, some of the archive pilots usedthis approach in choosing collections of records and focus groups: the RoyalGeographical Society sought the expertise of a group of Tanzanians on its EastAfrican collections.

      Purposefully selecting focus groups.

    9. imilarly, after the cataloguing event, most archivists arehappy to accept, though not always to incorporate, a correction, amplification orcomment about an existing catalogue.

      How do we even know this? It sounds like wishful thinking to me.

    10. RC’s majordeparture from earlier practice was that the resulting user-generated contributionswere moderated and added to the museum catalogue.

      An important step, that is probably not taken that often.

    11. This participationcan manifest itself in our website comments, Wikipedia entries and online reviews;we contribute to consultation processes, we are interviewed for our opinions and weblog, tweet or otherwise share them across our social networks

      The influence of the Web and Social Media on archival expectations.

    12. If we step outside the archival goldfish bowl to look at the larger picture we can seeother powerful influences aligning with some of these ideas

      An important step!

    13. So, citingHayden White, he argued that the archive should be used ‘not merely as a storagetechnique but primarily as a force for de-legitimation of mythified and tradi-tionalized memories’

      Wow, so actively working against the grain of the past.

    14. ‘It might mean providing space for researchers to embed their ownstories of use within the descriptive layerings...Itwould require engagement withthe marginalized and silenced. Space would be given to the sub-narratives andcounter-narratives...Itwould embrace a ‘politics of ambiguity and multiplicity’

      emphasis on those not typically represented in archives -- the marginalized

    Annotators