Control and Code: Privacy Online: Difference between revisions

From Technologies of Politics and Control
Jump to navigation Jump to search
No edit summary
No edit summary
Line 1: Line 1:
[http://piratepad.net/berkman-privacy-online Class participation and discussion (etherpad)]
Code is law; the architecture of the Internet and the software that runs on it will determine to a large extent how the Net is regulated in a way that goes far deeper than legal means could ever achieve (or at least ever achieve alone). Technological advances have also produced many tempting options for regulation and surveillance that may severely alter the balance of privacy, access to information and sharing of intellectual property. By regulating behavior, technological architectures or codes embed different values and political choices. Yet code is often treated as a technocratic affair, or something best left to private economic actors pursuing their own interests.  If code is law, then control of code is power. If important questions of social ordering are at stake, shouldn't the design and development of code be brought within the political process? In this class we delve into the technological alternatives that will shape interactions over the Internet, as well as the implications of each on personal freedom, privacy and combating cyber-crime.  
Code is law; the architecture of the Internet and the software that runs on it will determine to a large extent how the Net is regulated in a way that goes far deeper than legal means could ever achieve (or at least ever achieve alone). Technological advances have also produced many tempting options for regulation and surveillance that may severely alter the balance of privacy, access to information and sharing of intellectual property. By regulating behavior, technological architectures or codes embed different values and political choices. Yet code is often treated as a technocratic affair, or something best left to private economic actors pursuing their own interests.  If code is law, then control of code is power. If important questions of social ordering are at stake, shouldn't the design and development of code be brought within the political process? In this class we delve into the technological alternatives that will shape interactions over the Internet, as well as the implications of each on personal freedom, privacy and combating cyber-crime.  


Line 8: Line 6:
* [http://www.bitsbook.com/excerpts/ Abelson, Ledeen, Lewis, Blown to Bits, Chapter 2: Naked in the Sunlight: Privacy Lost, Privacy Abandoned]
* [http://www.bitsbook.com/excerpts/ Abelson, Ledeen, Lewis, Blown to Bits, Chapter 2: Naked in the Sunlight: Privacy Lost, Privacy Abandoned]


==Additional Resources==
==Optional Readings==


==Topical Links==
* [http://www.onthemedia.org/episodes/2010/04/02/segments/152890 NPR On the Media Story "Anonymous Justice"]
* [http://www.onthemedia.org/episodes/2010/04/02/segments/152890 NPR On the Media Story "Anonymous Justice"]
"The Cleveland Plain Dealer sparked an ethical controversy when a front-page story alleged that one of its legions of anonymous online commenters was a local judge, and that the judge had posted controversial comments about at least three cases over which she presided. Plain Dealer editor Susan Goldberg talks about the expectation of privacy on the internet and why the newspaper decided to publish the judge’s online identity."
* [http://www.danah.org/papers/talks/2010/SXSW2010.html "Making Sense of Privacy and Publicity." Transcript of talk given by Danah Boyd at SXSW. Austin, Texas, March 13, 2010]
* http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html
* http://en.wikipedia.org/wiki/Human_flesh_search_engine


*[http://www.danah.org/papers/talks/2010/SXSW2010.html "Making Sense of Privacy and Publicity." Transcript of talk given by Danah Boyd at SXSW. Austin, Texas, March 13, 2010]
== Class Discussion ==
 
==Links from Class Discussion==
 
http://datamarketplace.com/
 
http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html
 
http://en.wikipedia.org/wiki/Human_flesh_search_engine
 
http://videogames.yahoo.com/events/plugged-in/warcraft-helps-catch-a-crook/1383804 --[[User:Erin Golden|Erin Golden]] 22:50, 13 April 2010 (UTC)


http://theangryblackwoman.wordpress.com/2008/05/28/what-rachel-moss-did --[[User:Erin Golden|Erin Golden]] 22:50, 13 April 2010 (UTC)
== Links ==
== Class Discussion ==

Revision as of 16:39, 21 November 2010

Code is law; the architecture of the Internet and the software that runs on it will determine to a large extent how the Net is regulated in a way that goes far deeper than legal means could ever achieve (or at least ever achieve alone). Technological advances have also produced many tempting options for regulation and surveillance that may severely alter the balance of privacy, access to information and sharing of intellectual property. By regulating behavior, technological architectures or codes embed different values and political choices. Yet code is often treated as a technocratic affair, or something best left to private economic actors pursuing their own interests. If code is law, then control of code is power. If important questions of social ordering are at stake, shouldn't the design and development of code be brought within the political process? In this class we delve into the technological alternatives that will shape interactions over the Internet, as well as the implications of each on personal freedom, privacy and combating cyber-crime.

Readings

Optional Readings

Class Discussion

Links