Configuring the Networked Self: Law, Code, and the Play of Everyday Practice CC licensed
What is privacy? Autonomy Control Secrecy/Solitude Intimacy versus Reserve Julie E. Cohen 20142
How are networked selves configured? Cultural and Technical Shaping: –Situated within cultural and social networks –Perception mediated by artifacts and tools –Naturalization of mediated information flows Agency: The play of everyday practice –Tactical play –Serendipity Julie E. Cohen 20143
What is privacy? Functional: Breathing room for self- development Structural: Interstitial spaces within cultural and technical frameworks Julie E. Cohen 20144
What is data sharing? Research Participation Surveillance –Observation that is purposeful, routine, systematic, and focused –Purposes: Efficient administration, security, modulation, surplus extraction (Cohen 2013) Julie E. Cohen 20145
Political economy of surveillance Great transformations (Polanyi 1957) require resources –18 th century: land, labor, money Transformation to informational capitalism (Castells (1996)) requires different resources –Information, attention, personality, ability –Surveillance as bioprospecting Julie E. Cohen 20146
Politics of surveillance Users: Sharing; playing and gamification Developers: Crowd-sourcing and crowds as resources Regulators: Surveillance as innovation States: Securitization (multiple meanings) Julie E. Cohen 20147
Some empirics of surveillance Function creep Aggregation and inference “Big Data” and “the end of theory” Technical affordances Julie E. Cohen 20148
What does this have to do with ethics? Ethical precepts must align with fundamental commitments to effectively constrain behavior –First, do no harm? The surveillance-innovation complex aligns with other commitments –Science as religion: (almost) nothing forbidden; equal access to knowledge –Technical design: seamlessness, scalability Julie E. Cohen 20149