Digital Civil Rights (Bits of Freedom)

2,458 views

Published on

A presentation about the fact that IT is not just a tool and that technology isn't neutral and how this relates to digital civil rights. This was a guest lecture at the university of Leiden on October 20th, 2011.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,458
On SlideShare
0
From Embeds
0
Number of Embeds
888
Actions
Shares
0
Downloads
5
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Digital Civil Rights (Bits of Freedom)

  1. 1. Digital Civil Rights Hans de Zwart – 20 Oct. 2011
  2. 2. I am a learning technologist
  3. 3. and a volunteer guest speaker at Bits of Freedom
  4. 4. I love to talk about:how technology affects society, books, juggling and ... The Big Lebowksi
  5. 5. I want you to remember 2 things at the end of this lecture
  6. 6. 1Technology is not just a tool, it is not “neutral”
  7. 7. “In The Second Self I waswriting against the commonview that the computer wasjust a tool, arguing for usto look beyond all the thingsthe computer does for us [..]to what using it does to usas a people.Sherry Turkle in The Second Self
  8. 8. “Technology createsfeasibility spaces forsocial practice.”Yochai Benkler in The Wealth of Networks
  9. 9. “Only by understanding the biases of themedia through which we engage with theworld can we differentiate between what weintend, and what the machines we’re usingintend for us”Douglas Rushkoff in Program or be Programmed
  10. 10. “[..] the affordances of networkedtechnologies present new challengesthat inflect the social dynamics thatplay out in networked publics”danah boyd in Social Privacy in Networked Publics
  11. 11. PersistenceReplicability ScalabilitySearchability
  12. 12. Some examples...
  13. 13. April 2009: Google and theChamber of Commerce
  14. 14. Megans Law (from 1994)
  15. 15. You “give away” moreinformation than you might be aware of
  16. 16. Who has aFacebook or Hyves account?
  17. 17. Have you filled in your“Sexual Orientation”?
  18. 18. Back in 2006: wanted to help scientific progress
  19. 19. What would I know about you if I had access to your search history?
  20. 20. 17556639 how to kill your wife 17556639 how to kill your wife 17556639 wife killer 17556639 how to kill a wife 17556639 poop 17556639 dead people 17556639 pictures of dead people 17556639 killed people 17556639 dead pictures 17556639 dead pictures 17556639 dead pictures 17556639 murder photo 17556639 steak and cheese 17556639 photo of death 17556639 photo of death 17556639 death 17556639 dead people photos 17556639 photo of dead people17556639 www.murderdpeople.com 17556639 decapatated photos 17556639 decapatated photos 17556639 car crashes3 17556639 car crashes3 17556639 car crash photo
  21. 21. 17556639 how to kill your wife 17556639 how to kill your wife 17556639 wife killer 17556639 how to kill a wife 17556639 poop 17556639 dead people 17556639 pictures of dead people 17556639 killed people 17556639 dead pictures 17556639 dead pictures 17556639 dead pictures 17556639 murder photo 17556639 steak and cheese 17556639 photo of death 17556639 photo of death 17556639 death 17556639 dead people photos 17556639 photo of dead people17556639 www.murderdpeople.com 17556639 decapatated photos 17556639 decapatated photos 17556639 car crashes3 17556639 car crashes3 17556639 car crash photo
  22. 22. There are commercial parties that want to use your data“If something is free, assume that you are the product”
  23. 23. The Wall Street Journal did a research project: “What They Know”
  24. 24. 234 files on your PC after 1 visit
  25. 25. “Just like Intel with Mooreslaw, our development is guidedby the idea that every year, theamount that people want toadd, share, and express isincreasing”Mark Zuckerberg at f8 2011
  26. 26. en de
  27. 27. A personal data policy(reverse terms of service)
  28. 28. See http://hdez.nl/fdp
  29. 29. 2 things,remember?
  30. 30. 2 You can help changetechnology for the better
  31. 31. How can you prevent peopledriving cars from speeding?
  32. 32. “The trouble with trafficengineers is that when there’sa problem with a road, theyalways try to add something. Tomy mind, it’s much better toremove things.”Hans Monderman on designing for negotiation
  33. 33. “And if in the middle of the nineteenth centurythe threat to liberty was norms, and at the startof the twentieth it was state power, and duringmuch of the middle twentieth it was the market,then my argument is that we must come tounderstand how in the twenty-first century it is adifferent regulator—code—that should be ourcurrent concern.”Lawrence Lessig in Code 2.0
  34. 34. Our choice is not between regulation and noregulation. The code regulates. It implementsvalues, or not. It enables freedoms, or disablesthem. It protects privacy, or promotes monitoring.People choose how the code does these things.People write the code. Thus the choice is notwhether people will decide how cyberspaceregulates. People—coders—will. The only choice iswhether we collectively will have a role in theirchoice—and thus in determining how these valuesregulate—or whether collectively we will allow thecoders to select our values for us.”Lawrence Lessig in Code is Law
  35. 35. This is why Bits of Freedom is important
  36. 36. Net neutrality
  37. 37. Name and shame operatorsrestricting access to the Internet http://respectmynet.eu
  38. 38. Privacy
  39. 39. The yearlyBig Brother Awards
  40. 40. And more: black book data breaches, privacy insight machine, digital freedom voting advice (incl. Manifest), freedomof speech, content and copyright, ...
  41. 41. You can do your bit...
  42. 42. Donate
  43. 43. Agitate
  44. 44. http://www.bof.nl
  45. 45. Questions, comments, discussion?
  46. 46. My blog is at:http://hdez.nl/blog
  47. 47. Creative Commons Attribution 2.0 Generic Yochai Benkler by Joi Ito, http://en.wikipedia.org/wiki/File:YochaiBenklerJI6.jpg Douglas Rushkoff by FRONT, http://en.wikipedia.org/wiki/File:Douglas_Rushkoff.jpg Lawrence Lessig by Joi Ito, http://en.wikipedia.org/wiki/File:Lessig_portrait.jpg Creative Commons Attribution-Share Alike 2.0 Generic Sherry Turkle by jeanbaptisteparis, http://en.wikipedia.org/wiki/File:Sherry_Turkle.jpg Creative Commons Attribution-ShareAlike 2.5 License Regulating forces from Code 2.0 by Lawrence Lessig, http://codev2.cc/Image credits Shared space in Brighton by DeFacto, http://en.wikipedia.org/wiki/File:New_Road,_Brighton_-_shared_space.jpg Creative Commons Attribution-NonCommercial-NoDerivs 2.0 Generic Camera bird at Big Brother Awards by Hanneke Wetzer, http://www.flickr.com/photos/hannekewetzer/5514665857/in/set-72157626112636419/ Creative Commons Attribution-ShareAlike 3.0 Pedophile free zone sign by Bill Whittaker, http://en.wikipedia.org/wiki/File:Wapello_sign.jpg Creative Commons Attribution-NonCommercial 2.0 Generic Shell logo by Gerard Stolk, http://www.flickr.com/photos/20762304@N00/3330807311/ Public domain in the United States Zuckerberg meets Obama, http://en.wikipedia.org/wiki/File:Zuckerberg_meets_Obama.jpg Unknown license Danay Boyd by Robert Scoble, http://www.danah.org/images/danah/ScobleDavos.jpg Sexual offender map and person, http://www.familywatchdog.us AOL logo TomTom logo Politie logo Facebooks data policy KPN logo All rights reserved (I claim fair use!) Facebook as "Gaydar", Copyright © 2011 Mansueto Ventures LLC, http://www.fastcompany.com/blog/dan-macsai/popwise/mits-facebook-gaydar-it-homophibic Insurance companies trying to predict lifespans, Copyright ©2011 Dow Jones & Company, http://online.wsj.com/article/SB10001424052748704648604575620750998072986.html

×