
ISIS Summit Vienna 2015—The Information Society at the Crossroads
Part of the International Society for Information Studies series
3–7 Jun 2015, Vienna, Austria
- Go to the Sessions
-
- I. Invited Speech
- S1. Conference Stream DTMD 2015
- S2. Conference Stream ICPI 2015
- S3. Conference Stream ICTS 2015
- T1. Conference Track: (Big) history of information
- T1.0. Conference Track: Advanced hair-splitting (combinatorics)
- T1.0.1. Conference Track: Andrew Feenberg's technical politics and ICTs
- T1.1. Conference Track: As we may teach
- T1.2. Conference Track: China and the global information society
- T1.3. Conference Track: Communication, information and reporting
- T1.4. Conference Track: Cyberpeace
- T2. Conference Track: Emancipation or disempowerment of man?
- T2.1. Conference Track: Emergence of and in (self-)organizing work systems
- T2.2. Conference Track: Emergent systems, information and society
- T3. Conference Track: Empowering patients
- T3.0. Conference Track: Homo informaticus
- T3.1. Conference Track: Human resilience and human vulnerability
- T3.2. Conference Track: ICT and literature
- T3.3. Conference Track: ICTs and power relations
- T4. Conference Track: Information in the exact sciences and symmetry
- T5. Conference Track: Informational warfare
- T6. Conference Track: Multi-level semiosis
- T7. Conference Track: Music, information and symmetry
- T7.1. Conference Track: Natural disasters
- T7.2. Conference Track: Progress in Information Studies in China
- T8. Conference Track: Searching to create a humanized civilization
- T8.1. Conference Track: The ethics of foundations
- T9. Conference Track: The Global Brain
- T9.1. Conference Track: Transdisciplinary response and responsibility
- T9.2. Conference Track: Triangular relationship
- T9.3. Conference Track: Weaving the understanding of information
- Event Details
Conference Chairs
Wolfgang Hofkirchner
[Not defined]
[email protected]
Dietrich Rordorf
MDPI AG
[email protected]
Sessions
I. Invited SpeechS1. Conference Stream DTMD 2015
S2. Conference Stream ICPI 2015
S3. Conference Stream ICTS 2015
T1. Conference Track: (Big) history of information
T1.0. Conference Track: Advanced hair-splitting (combinatorics)
T1.0.1. Conference Track: Andrew Feenberg's technical politics and ICTs
T1.1. Conference Track: As we may teach
T1.2. Conference Track: China and the global information society
T1.3. Conference Track: Communication, information and reporting
T1.4. Conference Track: Cyberpeace
T2. Conference Track: Emancipation or disempowerment of man?
T2.1. Conference Track: Emergence of and in (self-)organizing work systems
T2.2. Conference Track: Emergent systems, information and society
T3. Conference Track: Empowering patients
T3.0. Conference Track: Homo informaticus
T3.1. Conference Track: Human resilience and human vulnerability
T3.2. Conference Track: ICT and literature
T3.3. Conference Track: ICTs and power relations
T4. Conference Track: Information in the exact sciences and symmetry
T5. Conference Track: Informational warfare
T6. Conference Track: Multi-level semiosis
T7. Conference Track: Music, information and symmetry
T7.1. Conference Track: Natural disasters
T7.2. Conference Track: Progress in Information Studies in China
T8. Conference Track: Searching to create a humanized civilization
T8.1. Conference Track: The ethics of foundations
T9. Conference Track: The Global Brain
T9.1. Conference Track: Transdisciplinary response and responsibility
T9.2. Conference Track: Triangular relationship
T9.3. Conference Track: Weaving the understanding of information
Instructions for Authors
Procedure for Submission, Peer-Review, Revision and Acceptance of Extended Abstracts
The conference will accept extended abstracts only. The accepted abstracts will be available online on Sciforum.net during and after the conference. Papers based on the extended abstracts can be published by authors in the journal of their choice later on. The conference will not publish a proceedings volume.
Submissions of abstracts should be done by the authors online. If you do not already have an user account with this website, please create one by registering with sciforum.net. After registration, please log in to your user account, and use the Submit New Abstract. Please chose the ISIS Summit Vienna 2015 conference in the first step. In the second step, choose the appropriate conference stream or conference session. In the third step you will be asked to type in the title, abstract and optionally keywords. In the fourth and last step, you will be asked to enter all co-authors, their e-mail addresses and affiliations.
- Scholars interested in participating in paper sessions of the Summit can submit their extended abstract (about 750 to 2'000 words) online on this website until 27 February 2015.
- The International Program Committee will review and decide about the suitability of abstracts for the ISIS Summit Vienna 2015. All authors will be notified by 20 March 2015 about the acceptance of their extended abstract.
- If the abstract is accepted for this conference, the authors will be asked to send the a formatted version of the extended abstract as a PDF file by end of May 2015.
- Please register with the conference before or once your abstract is accepted. Please note that the acceptance of an abstract will not automatically register you with the conference. The abstract submission and conference registration are two separate processes.
Please use the abstract template. The formatted version of the extended abstracts must have the following organization:
- Title
- Full author names
- Affiliations (including full postal address) and authors' e-mail addresses
- Extended Abstract (750 to 2'000 words)
- References
- Paper Format: A4 paper format, the printing area is 17.5 cm x 26.2 cm. The margins should be 1.75 cm on each side of the paper (top, bottom, left, and right sides).
- Paper Length: The manuscript should be about 3 pages long (incl. references).
- Formatting / Style: Please use the template to prepare your abstract (see on top of this page).
- References & Citations: The full titles of cited papers and books must be given. Reference numbers should be placed in square brackets [ ], and placed before the punctuation; for example [4] or [1-3], and all the references should be listed separately and as the last section at the end of the manuscript.
- Authors List and Affiliation Format: Authors' full first and last names must be given. Abbreviated middle name can be added. For papers written by various contributors a corresponding author must be designated. The PubMed/MEDLINE format is used for affiliations: complete street address information including city, zip code, state/province, country, and email address should be added. All authors who contributed significantly to the manuscript (including writing a section) should be listed on the first page of the manuscript, below the title of the article. Other parties, who provided only minor contributions, should be listed under Acknowledgments only. A minor contribution might be a discussion with the author, reading through the draft of the manuscript, or performing English corrections.
- Figures, Schemes and Tables: Authors are encouraged to prepare figures and schemes in color. Figure and schemes must be numbered (Figure 1, Scheme I, Figure 2, Scheme II, etc.) and a explanatory title must be added. Tables should be inserted into the main text, and numbers and titles for all tables supplied. All table columns should have an explanatory heading. Please supply legends for all figures, schemes and tables. The legends should be prepared as a separate paragraph of the main text and placed in the main text before a table, a figure or a scheme.
Copyright to the extended abstracts will stay with the authors of the paper. Authors will be asked to grant MDPI AG (Publisher of the Sciforum platform) and ISIS (organizer of the conference) a non-exclusive, non-revokable license to publish the abstracts online and possibly in print under a Creative Commons Attribution (CC-BY) license. As authors retain the rights to their abstracts and papers, papers can be published elsewhere later.
List of accepted submissions (217)
Id | Title | Authors | Presentation | ||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
sciforum-001391 | Enterprise Social Media Under the Pretext of Voluntariness - An Unexplored Dimension of Digital Labor | N/A |
Show Abstract |
||||||||||||||||||||||||||||||||||||||
Introduction Enterprise Social Media (ESM) have become increasingly popular over the last 5 years and promise to increase knowledge sharing, facilitate global collaboration and simplify work through quicker access to information. ESM afford visibility and persistence of content, as well as editability allowing ESM users to retain some control over content produced [5]. Yet, when implementing Social Media in corporate settings, employees are often reluctant to use such new platforms and only little is known about the actual adoption and use of ESM in corporate environments. From the few examples that exist to date [2] we know that many employees consider ESM as a waste of time and yet another tool of surveillance. In addition, and in the light of the existing social media boom of recent years, many employers take successful ESM implementation within their companies for granted. And in fact, the existing literature on digital labor has demonstrated that often individuals are willing to expense efforts and time to participate and contribute to Social Media platforms without any monetary compensation [3-4]. For many Social Media users the mere participation, socialization and the chance of building up a reputation online are reward enough [1]. Encouraged by such voluntarily given online activity, corporate managers often expect that employees will start to actively utilize ESM in addition to their daily work, without critically reflecting that using Enterprise Social Media requires both time and effort on part of the employee that is neither listed in job descriptions nor performance targets. I argue instead that employees are expected to contribute to ESM platforms under the pretext of voluntariness, meaning that the managerial communication of the platform is explicitly voluntary yet when looked more closely signs of pressure, dependency and lack of choice surface. I therefore propose that this adds a new dimension to the digital labor literature, which so far has not yet explored the effects of Enterprise Social Media in relation to digital labor. Methods This research draws on data collected between March 2014 and January 2015 in which I intensively studied the implementation of a new Enterprise Social Media system in a large multinational technology company based in Germany. Using a mixed methods approach I gathered both qualitative and quantitative data. Firstly I conducted ethnographic work offline in the corporate headquarters, secondly I carried out ethnographic work online using the ESM platform implemented at the studied company. Finally I conducted a large survey carried out in the 28 biggest employee communities of the company using the new platform, resulting in a final N of 2690 employees. The offline ethnographic work mainly comprised of dozens of informal conversations I had during visits to the four different company sites to which I had access during the research period. The online ethnographic work consisted of participant observation on the platform where I actively contributed to the content created on the ESM platform, and started and participated in existing conversations online. The sample for the survey was randomly drawn after having obtained an excel list of all potential employees with access to the new ESM tool and narrowing it down to employee communities with at least 1000 employees leaving me with the 28 biggest countries. By drawing on these different methods I was able to achieve data triangulation, allowing a comprehensive picture to emerge that combined both statistical as well as in-depth qualitative insights. Results and Discussion From my research a complex situation surfaced, revealing an existing tension between the apparent social functions of ESM, a rigid legal context forbidding any private use of the platform and a management body caught up in the struggle to provide Social Media to employees in order to reap ESM’s often proclaimed benefits and management’s unwillingness to invest time and human resources into the success of the platform. Furthermore, the data showed that the concept of voluntariness of Social Media in a private setting does not automatically translate into corporate surroundings, where such voluntariness turned out to be a mere illusion. Instead, it became clear that ESM much rather add a new dimension of exploitation to the existing employer-employee relationship by expecting employees 1) to use Enterprise Social Media on top of their normal work duties, 2) to utilize skills that have been acquired during leisure time and 3) by deriving value from employees long after they have left the organization as their once intangible knowledge becomes manifest and permanent online. Conclusions In conclusion, I argue that to date the digital labor literature has left one crucial dimension unexplored, namely corporate digital labor, that is, extra and uncompensated labor in corporate settings that is increasingly expected of employees contributing to both an intensification and extension of work. In addition, as the data showed, while on the surface the corporate dimension of digital labor differs significantly from the digital labor on conventional Social Media platforms, as employees have agreed to a contractual and monetary relationship; a closer look revealed that ESM encroach on employees’ leisure time in multiple ways allowing employers to reap value from their employees during work, after work and even beyond an employee’s exit of the company. This research presents a first step in better understanding digital labor in corporate settings, yet more research in different organizations will be necessary to investigate this new dimension further. In particular, future research will be necessary to understand if and how these currently exploitative dynamics will change once ESM have become more widely used by employees. References and Notes
|
|||||||||||||||||||||||||||||||||||||||||
sciforum-003673 | Informational Cognitive Exploitation, Digital Labour and the Double Freedom of Knowledge: On the Capitalist Exploitation of Non-For Profit Software, Contents and Data Producers | N/A |
Show Abstract |
||||||||||||||||||||||||||||||||||||||
During the last decades, Capitalism has been undergoing a metamorphosis, resulting in a change of stage, from Industrial Capitalism to Cognitive (Boutang, 2000; Vercellone, 2012) or Informational (Castells, 1996; Fuchs, 2013) Capitalism. Within this context, the widespread opposition to the dramatic expansion of intellectual property -and particularly to the copyright transmogrification- helped to boost the diffusion and legitimacy of concepts such as “free knowledge”, “intellectual commons”, “open access”, “p2p production”. Along with the emergence and growth of the General Public License (GPL), Creative Commons (CC), and other licenses, this phenomenon has had a well-known consequence: the growth of a quasi-public sphere of non-commercial informational goods (Benkler, 2005; Ostrom and Hess, 2006; Bauwens, 2006). Nevertheless, the flows of “free knowledge” also enabled the development of a (partially) unexplored region of the private and for-profit sphere. A new kind of business method is being shaped, and the management literature has already offered a warm welcome to this novelty (Tapscott& Williams, 2005; Leadbeater, 2007; Anderson, 2009). Somehow, it is based on the disguised exploitation of unpaid digital labour, carried out mostly during leisure time, with non-commercial purposes. This `exploitation side´ has only received specific attention recently (Pasquinelli, 2008; Petersen, 2008; Van Dijck and Nieborg, 2009; 2006; Langlois et. al., 2009; Lovink & Rossiter, 2010; Fuchs, 2013, Scholz, 2013). However, the critical literature has not stabilized yet a name and a definition of the phenomenon, a sound theoretical foundation and an empirical description of its varieties. Thus, this contribution tries to shed some light in these three regards by:
i) Cognitive Exploitation is a form of capitalist exploitation. However it is different from the traditional Marxist notion of exploitation, which depends on the appropriation of the labour time or the energy of the worker. On the contrary, cognitive exploitation is based on the appropriation of knowledge and information flows (in both labour and leisure time). In this particular presentation we are concerned just with a subtype of cognitive exploitation, which is informational cognitive expoitation (ICE) –that related to the exploitation of digital labour carried out in order to produce informational goods. Other forms of cognitive exploitation have been studied [1]. Thus, informational cognitive exploitaion refers to an appropriability mechanism by which capitalist firms exploit the double freedom of knowledge regarding informational goods (i.e., those made of digital information). Since ICE appears as an alternative to business methods based on the privative exercise of copyright, the comparison may be useful. Both mechanisms try to increase profits in a context of high sunk costs and tending to 0 marginal costs. But while the privative model fights to pull up the price of outputs, ICE focuses on pushing down (close to 0) the price of inputs. In other words, privative scheme rests on creating scarcity of knowledge flows and charging for the access to them. In contrast, ICE harnesses the abundance of knowledge, without charging directly for access, and collects money from targeted advertisement, data selling and related businesses [2]. Whereas copyright-based production processes exploit the workers within the labor time, ICE is to a great extent based on the exploitation of workers leisure time. This, of course, agrees with one of the main thesis of Italian Autonomism and Cognitive Capitalism theory. Certainly, the privative model rests on respecting copyright, and its practitioners are not all ashamed of saying so. ICE, instead, depends on circumventing –or directly violating- copyright law. More interestingly, it resorts on other intellectual property rights (trademarks, patents, industrial secrets). Hiding both procedures is a part of the ICE model. The ideological base is also different: where copyright is based on rhetoric of individuals, property and exclusion, inclusive appropriation talks about communities, inclusion and freedom. ii) What does the aforementioned “double freedom of knowledge” mean? At a first glance, the idea is quite simple: whereas the usual voices (from management literature to hackers) emphasize one freedom, we think we are unwittingly discussing about two very different but inseparable freedoms. Here is where Marx comes back. One of the key factors for the birth of Capitalism has been what Marx called the double freedom of labor power. On the one hand, the worker is freed from the feudal order, free to move and free to sell his labor-power where, when and how he wants to. By the time of Marx, this had been the only freedom mentioned by Political Economy, Contractualism and Liberalism. But, on the other hand, as it is well known, the worker is also freed from the means of production. What matters for this paper is the Hegelian reasoning: Marx underlines the necessity of two contradictory freedoms. In the first case, freedom refers to empowerment; in the second, to the lack of power. Now, we want to bring this type of reasoning by advancing the concept of double freedom of knowledge. Knowledge translated to digital information licensed with GPL, CC, or simply shared voluntarily without licensing is free, on the one hand, because it can be copied, modified, shared, etc. But, on the other hand, it is also free from any obligation of paying for it. As in the case of labor power, we see the two sides of the coin. One is widely promoted; the other is, in some cases, silently exploited [3]. To be sure, knowledge which has the double freedom can follow two (non-exclusive) paths: if it is not used for profit, it enlarges the quasi-public sphere. If it is used for profit, it ends up as a piece of the ICE machine. iii) This paper presents empirical information regarding three types of ICE. The first is related to Free Software. We show how companies such IBM and HP have benefited from the unpaid work of thousands of workers who developed Linux. The second type concerns contents (music, texts, videos). Here we resort to the cases of YouTube, Flickr and some blogs to illustrate how voluntarily shared videos, pictures and texts are used as a part of a business strategy. The third type deals with data. Not surprisingly, we have chosen Google as the best example of collecting data of user activities freely and earning money from them. Of course, the three types of ICE have their own peculiarities. Therefore, the paper will not only describe, but also compare the various examples involved. References Anderson, C. (2009) Free: The Future of a Radical Price, Nueva York: Hyperion. Bauwens,M. (2006)“The Political Economy of Peer Production” Post-autistic economics review, issue no. 37, 28 April 2006, article 3, pp. 33-44. http://www.paecon.net/PAEReview/issue37/Bauwens37.htm Benkler, Y. (2006) The Wealth of Networks: How Social Production Transforms Markets and Freedom. Yale University Press: Boston. Boutang, Y. M. (1999), ¨Riqueza, propiedad, libertad y renta en el capitalismo cognitivo¨, en Rodríguez, Emanuel y Sánchez, Raúl (Compiladores) Capitalismo cognitivo, propiedad intelectual y creación colectiva, Madrid: Traficantes de Sueños. Fuchs, Ch. (2013) Class and exploitation on the Internet. In Digital labor.The Internet as playground and factory,ed'Trebor'Scholz,211-224.New'York: Routledge. Lazzarato, M., (1996), ¨Inmaterial Labor¨ en Virno y Hardt (comps) Radical Thought in Italy, Minneapolis, University of Minnesota Press. Lazzarato, M., (2006) Políticas del acontecimiento, Buenos Aires Tinta Limón. Lazzarato, M. y Negri, A. (2001) Trabajo inmaterial Formas de vida y producción de subjetividad DP&A Editora, Río de Janeiro. Marx, K. (1996) [1873] El Capital, siglo XXI, México, Tomos I, II, III, volúmenes 1 a 8. Ostrom, Elinor & Hess, Charlotte (Ed)(2006) Understanding Knowledge as a Commons: From Theory to Practice The MIT Press, Cambridge, Massachusetts. Petersen,Søren Mørk(2008) Loser Generated Content: From Participation to Exploitation, First Monday, Volume 13, Number 3 - 3 March 2008; http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/viewArticle/2141/, 1948. Rullani, E. (2000) ¨El capitalismo cognitivo ¿un déjà- vu?,¨ Rodríguez, Emanuel y Sánchez, Raúl (Ed.) Capitalismo cognitivo, propiedad intelectual y creación colectiva, Madrid: Traficantes de Sueños. Scholz, Trebor, ed. 2013. Digital Labor. The Internet as Playground and Factory. New York: Routledge. Tapscott, D. and Williams, A. (2005) Wikinomics La nueva economía de las multitudes inteligentes, Barcelona: Paidós Empresa. Van Dijck, J & Nieborg, D ( 2009)Wikinomics and its discontents: a critical analysis of Web 2.0 business manifestos, New Media Society 11; 855. Zizek, S.(2003) El sublime objeto de la ideología, Siglo XXI, Buenos Aires.
[1] In previous work we have discussed three additional forms, based on the kinf of knowledge involved: labour, traditional and scientific) |
|||||||||||||||||||||||||||||||||||||||||
sciforum-004011 | The Social Interaction Characteristics of Mobil-Mediated Communication:An Exploration Study of Interpersonal Communication Behavior in Mobile Channel | , , | N/A |
Show Abstract |
|||||||||||||||||||||||||||||||||||||
The digital technology has changed the efficiency of communication and affected people’s communication pattern as well. In the early days of internet usage, the concerns of academic research of interpersonal communication from the past face to face communication, change to the evolution of the computer-mediated communication (CMC). Nowadays, the popularity of smart phones generates a new interpersonal communication pattern - mobil-mediated communication (MMC). This change involves not only different communication device, but also function expansion, contact efficiency and economy. The communication relationship and social interaction, along with the technology transition result new models. Mobil-mediated communication in the academic field is still a new topic, relevant researches mainly focus on the technic innovation of communication technology or message properties. However, there are more and more studies direct to the social relations of communication. Yuan (2012) studied mobile phones for social relations in Chinese society which provide many practical observations of communication behavior. On indirect and high-context patterns of Chinese social interaction, mobile phones play an important role and develop relation-oriented cultural norms. Communication through mobile phones are used to define and mediate group members, maintain social cohesion and harmony. Chinese society highly values social relationship. In this study, mobile phone is regarded as intermediary vehicle which links people’s social relationship netwok. On one hand, people interaction through moble phone, the social media, can establish contact and strengthen each others’ affection connection. On the other hand, instead of face to face communication, smart phone’s mediated effect omit the social context clues so that interpersonal relationship possess the flexibility of avoidance. Therefore, this study analyze the characteristics of social reaction in the mobile-mediated situation. There are two research questions developed . First, how people use mobile phone to proceed interpersonal communication and establish positive effect of warm feeling? Second, , how people use mobile phone to take the avoid effect for buffering emotional conflict? The research adopts quality method of focus group interview to examine communication exerperience of smart phone usage. There are six business professionals as focus group interviewers. The discussion focuses on the phenomenas of positive and advoid effect in mobile-mediated situation. The research found that smart phone offers many communication convenience, allowing users able to have a positive emotional warming effect, then bring a better interactive experience. Common experiences of respondents believe that smart phones not only provide basic voice calls, but also have important advantages to facilitate communication. For example, all users installed Line or FB community communication APP, which can replace the voice dialoge so that the contact become more economical and convenient. Some APP stickers even improve the texts communication to a more lively type and increase the pleasure of communication behavior. Respondents also reveal mobile-mediated communication can lower the interpersonal relation stress and avoid psychological burden. Precisely the avoid effects come from smartphone’s powerful functions. For example, response time has considerable flexibility when phone call. Receiver does not have to bear the direct communication of pressure, and take easy to read message. In conclusion, mobile-mediated communication provides a convenient channel for interpersonal contact. It towards a very positive impact on the development of social relationship. Especially mobile phones with a variety of affiliated functions, users can adopt it for different situations and communication purposes. It contributes to human interaction with a positive and conflict avoidance effect. Without physical contact like face to face interaction, mobile-mediated communication create a new social relation pattern and helps to strengthen the development of the collective consciousness and social cohesion. |
|||||||||||||||||||||||||||||||||||||||||
sciforum-004676 | What Is Information? Why Is It Relativistic and What Is Its Relationship to Materiality, Meaning and Organization | N/A |
Show Abstract |
||||||||||||||||||||||||||||||||||||||
We are swimming in a sea of information but do we really understand what is information. A project that I engaged in with a number of systems biologists provided an interesting perspective on this question. In a paper entitled Propagating Organization: An Enquiry by Stuart Kauffman, Robert K. Logan, Robert Este, Randy Goebel, David Hobill and Ilya Shmulevich that appeared in Biology & Philosophy 23: 27-45 we wrote, “Our broad aim was to understand propagating organization as exemplified by the vast organization of the coevolving biosphere.” The cell operates as an information processing unit, receiving information from its environment, propagating that information through complex molecular networks, and using the information stored in its DNA and cell-molecular systems to mount appropriate responses. We argue that Shannon information does not apply to the evolution of the biosphere because one cannot prestate all possible Darwinian preadaptations or the ensemble of possibilities and hence their entropy cannot be calculated. According to the Shannon definition of information a structured set of numbers like the set of even numbers has less information than a set of random numbers because one can predict the sequence of even numbers. By this argument a random soup of organic chemicals would have more information that a structured biotic autonomous agent. The biotic agent has more meaning than the soup, however. The living organism with more structure and more organization has less Shannon information. This is counterintuitive to a biologist’s understanding of a living organism. We therefore conclude that the use of Shannon information to describe a biotic system would not be valid. Shannon information for a biotic system is simply a category error. A living organism has meaning because it is an autonomous agent acting on its own behalf. A random soup of organic chemicals has no meaning and no organization. We may therefore conclude the meaning of life is organization—organization that propagates. The Relativity of Information You may legitimately ask the question “isn’t information just information?”, i.e., an invariant like the speed of light. Our response to this question is no, it is relative. Instructional or biotic information is a useful definition for biotic systems just as Shannon information was useful for telecommunication channel engineering. Thus we identify the information in living organisms with the organization of constraints that allow an organism to capture energy from the environment for their growth and replication. A living organism propagates its organization, which constitutes its information. We therefore conclude that constraints are information and information is constraints, which we term as instructional information because this is its function and we want to distinguish it from Shannon information. The constraints are the organization of the living organism and therefore the organization is the information and vice versa. We next note that biotic information is not symbolic but is embedded in the biomoleules of which the living organism is composed. Biotic information cannot be separated from the medium in which it is instantiated. DNA does not symbolize RNA but rather catalyzes its creation. And likewise RNA does not symbolize proteins but rather catalyzes its creation. And the same with proteins they are not symbols but enzymes. One of the characteristics of biotic information is that it is instantiated materially whereas symbolic information and Shannon info can move from one medium to another. For biotic information the medium is the message in the McLuhan sense and it is also the content. The medium is the content and the content is the medium. Whereas for symbolic info the medium and its content are separate. We humans deal with 3 kinds of information: genetic, percepts , and concepts (symbolic). |
|||||||||||||||||||||||||||||||||||||||||
sciforum-003937 | Opening the 'Black Box' of User Agency: A Critical Cultural Studies Approach to Web 2.0 | N/A |
Show Abstract |
||||||||||||||||||||||||||||||||||||||
Introduction Citizen empowerment is one of the great promises of the ‘digital age’, often framed as a tale of emancipation and liberation in a digitally enabled democracy. The vigorously emerging field of critical internet studies has begun to interrogate the celebratory and unreflected assumptions about the unequivocally emancipatory essence of the ‘participatory’ web and expose the ideological nature of these discourses that conceals the various forms of domination and exploitation online e.g. [1-10]. However, what has unevenly progressed is the theorization of the structure-agency dialectics in ways that would enable a critical understanding and empirical study of user agency in the contemporary online ecology. Attempting to respond to the need for a renewal of critical cultural studies to understand web 2.0, this paper addresses the following questions: how can we understand user agency and where do we have to look for forms of resistance in web 2.0 spaces, taking into account the multiple layers in which these online environments structure, condition and curtail users’ activity? Are the concepts of semiotic power and resistance, inherited by traditional cultural studies, adequate to account for the structure-agency dialectics in today’s complex and multifaceted online media? To begin answering these questions, this paper outlines a conceptual framework that identifies the distinct levels on which network power operates, drawing on recent critical studies of the internet and web 2.0. At the same time, thinking of (network) power and (user) agency as a continuum, it draws on fundamental traditions within social and cultural theory to identify the various modes of resistance that could be meaningful in the contemporary media ecology. The ultimate aim of this paper is to introduce a nuanced conceptualization of user agency and provide a conceptual roadmap for critical empirical analysis. The organization of online networks’ power Drawing on recent critical accounts of how corporate online networks and platforms exert power over users, we identify the following six axes: 1) Economic-structural power: Web 2.0 environments are socio-economic structures that encompass certain ownership, governance and business model configurations, which demarcate the forms of usage, content and social relations within these environments (corporate ownership, targeted advertising and interpersonal marketing, unpaid user labour, monetization of user data and social relations [9, 7]. 2) Algorithmic power: New media environments function as mediators actively shaping the performance of social act [7]. By the use of algorithms, they come to ‘produce’ everyday life, structuring and sorting people, relations, places and things in often unseen and concealed ways [2]. The operation of software without the users’ awareness of its structuring power has led to the notion of power being ‘post-hegemonic’ in the information era, as domination works ontologically instead of discursively [11, 2]. The decision-making power of algorithms often eludes reflective thinking, being perceived as neutral mediators reflecting instead of organizing and thus producing everyday life (e.g. the perception of search engines as neutral mechanisms rather than as powerful agents operating with opaque and complex rules, making some aspects of the world visible but concealing others altogether). The ‘post-hegemonic’ nature of algorithmic power creates a substantial challenge for human agency, rendering the possibility of resistance at the same level at which power operates all the more difficult. 3) Institutional power: Content management systems consist also of social protocols, which take the form of consolidated and complicated policies that govern and regulate user behavior. Most often, control over these rules is primarily in the hands of owners who can adjust conditions at any time, without the users’ prior consent [7]. 4) (Post)discursive/semiotic power: Unlike traditional media industries, in web 2.0 the content is either co-produced by professionals and users or produced entirely by users (e.g. social media). Although the opening up of the sphere of symbolic production to amateurs or ‘ordinary’ voices has transformed the public space formerly dominated by cultural industries, early promises about the ‘liberation’ of content and informational diversity are mitigated by several factors. To take the example of ‘participatory’ journalism, user-generated content does not seem to dismantle traditional hierarchies and open up user engagement in the spheres that matter mostly e.g. news-making and constitution of journalistic values [12, 13]. In social media, similar trends can be observed: (a) the standardization of content so that it becomes manageable and sellable [7]; (b) the commodification of huge amounts of content through data mining technics; (c) the steering of users’ behavior toward consumer activities that legitimizes consumer culture and constitutes citizens as capitalist subjects [14]; (d) the diminishing of information diversity as users are locked in ‘filter bubbles’ [16]; (e) the unequal distribution of online attention and visibility, often directing users toward corporate sources, promoting more “valuable” people and filtering out less popular contributions (8, 14]. Most importantly, because corporate actors translate all content into manageable and sellable data, it can be argued that they acquire a form of post-discursive or post-semiotic power, rendering content as meaning almost irrelevant, in the sense that even user-generated discourses that subvert dominant ideas are subjected to the same treatment and principles, neutralizing their dissident potential. 5) Socio-cultural power: Sociality and collective will formation is at the heart of social media. At this level, the main stakes can be summarized in three points: first, a significant commodity in online ‘social’ media are social relations themselves, as almost all kinds of sociality are coded into proprietary algorithms and are moved from public to corporate space [7]. Second, the notion of sociality itself is transformed to what van Dijck [7] calls the “culture of connectivity”, a form of online sociality resting on coded structures and neoliberal economic principles, such as hierarchy, competition, a winner-takes-all mindset and the resetting of boundaries between private, corporate and public domains (p. 20). This logic affects also the alternative media realm, as traditional grassroots media do not have the resources to ‘play the Facebook game’ in their own terms1. Third, despite the fact that social media can function as mobilization conduits for collective action, their capacity to sustain networked communities capable of political action is seriously disputed: networked communities in commercial online platforms are seen as mainly being about achieving one’s own individual needs and interests in post-political, post-antagonistic forms of community, offering "pacifying modes" of existence and absorbing potentially resistant energies in fantasies of action [14]. 6) Ideological power: All these forms of power cannot be sustained without a sixth axis, that of ideology, namely the consolidation of a hegemonic, common-sense meaning regarding the very nature of web 2.0 and its profound necessity in everyday life. The rise of web 2.0 was accompanied by myths related to collaboration and social interaction, built on the core concepts of ‘sharing’, ‘community’, ‘user participation’, transparency and openness, and online sociality as the prevalent and inescapable form of establishing social relations [15]. These narratives, dissipated through popular and academic discourses, operate to conceal the ideological tenets from which commercial online platforms operate and the multiple aspects of pseudo-participation and exploitation defining the reality of many web 2.0 environments [8]. Dimensions of user agency The approaches highlighted above substantiate the exploitative nature of web 2.0 but leave little room for understanding emerging forms of user agency. As van Dijck [7] argues, “it is functional to regard user agency not as an actor distinct from technology, but as an analytical category that requires delineation on its own terms” (p. 32). From a critical cultural perspective, we need to identify the axes on which resistance and counter-power can be built, taking into account the forces that structure, condition or curtail user agency. Such an approach requires a combination of culturalism and structuralism in cultural studies [8], similar to the encoding/decoding model advanced by Stuart Hall [17]. However, in web 2.0 environments, production and reception ‘moments’ are no longer distinct processes and the structured tempospatial breaks between production and reception [18] take on different meanings. Furthermore, the multifunctional nature of new media renders a sole emphasis on content inadequate as a critical analytical framework. That said, we draw on fundamental critical theories to outline a nuanced conceptualization of user agency and a theoretical framework for the empirical analysis of web 2.0 users. The proposed conception of user agency consists of six dimensions, analogous to the six axes of network power identified above. Each dimension is placed on a continuum, with two opposing poles: a pole where agency is minimal (or non-existent) and a pole where agency is maximal. 1) Socio-economic agency can be defined as the capacity of users to become aware of, resist, oppose or subvert the dominant economic logic from which the commercial web 2.0 operates. An empirical inquiry at this level involves the study of knowledge, attitudes and practices of users regarding the role and implications of current ownership models in web 2.0 spaces in terms of data privacy and data mining, economic and state surveillance, unpaid user labour, the commodification of relations through user recommendation systems, and the role of targeted advertising as a business model. User agency can thus be operationalized along a continuum between awareness, resistance/appropriation, opposition and subversion. Empirical studies of users’ attitudes and practices can show which positions users occupy along this continuum, e.g. whether users are conscious of how commercial media shape their experiences and exploit economically their labour (awareness), whether and how they are involved in active resistance (e.g. by using applications to block or bypass advertisements), whether they take part in campaigns aiming at limiting companies’ invasive practices or put forth claims to partial ownership of contributed content (opposition), and their readiness to opt-out and embrace alternatives currently being created online (subversion). 2) Informational or algorithmic agency signifies the capacity of users to become aware of, refuse, resist or actively challenge the ways in which power is embedded in technical structures, codes and rules of ‘participatory’ spaces and interfaces. At the level of awareness, a question to explore is the extent to which the ‘technological unconscious’ becomes conscious, that is, if the rule-making power of software becomes evident, perceptible or transparent to users. Implicit participation [15], which is usually unconscious as it is built-in in the system, can turn into active resistance if it becomes conscious. Changing a default setting or filling out false profiling information can be considered mild acts of resistance [7]. Reflexive and skilled users may play with algorithmic power to their own advantage, actively shaping the content they produce so as to direct the way the software reacts to them, anticipating the effects and steering things in the direction they wish ([2], p. 997). Oppositional agency can be manifested in hackactivist practices, such as the modification of software to change or deconstruct existing rules and the design of subversive apps. Maximalist forms of technological agency refer to the development of alternative software and technical infrastructures for creating online spaces outside of corporate or state control. 3) Institutional or communicative agency: To explore user agency at the institutional level (the sphere of rule-making or governance) we draw on participatory and deliberative democracy theories. Participatory democracy theorists (Held, 1996; Macpherson, 1973; Pateman, 1970) stress the ability of individuals to take part in decision-making, have an equal chance to affect outcomes and thus acquire control over the structures in the various systems that concern and affect them (in [8], p. 260). The Habermasian notion of communicative rationality and discourse ethics is also revelant here as a normative yardstick, as it stresses the rational-critical, instead of instrumental, criteria for the process of decision-making which is essentially dialogical in character. That said, institutional or communicative agency can be defined as the capacity of users to equally participate in rule-making processes and act as deliberating agents (namely, being able to introduce any issue, express any attitude or need, question any assertion, and engage in argumentative discussion). In conditions of maximal agency, we would expect to encounter conditions for inclusion of all, discursive mechanisms for decision-making with user control over the rules of discussion, and an orientation toward rational-critical argumentation and public-oriented concerns. Examples of oppositional agency at this level can be found in the various organized protest actions and confrontations between users and powerful industries (the early anti-Microsoft and the current anti-Facebook campaigns), which may lead to political awareness, as users start acting like citizens and claim civil rights for their actions (e.g. Pirate Parties) (see [15] pp. 130-133). 4) Representational and semiotic agency: The fourth axis is related to the duality of users as content producers and recipients. The notion of representational agency is informed by post-Marxist discourse theory, articulated mainly by Laclau and Mouffe, and signifies the capacity of users to engage in discursive political struggles, disrupt dominant discourses, develop counterdiscourses, negotiate and reconstitute identities and subject positions, and develop autonomous self-representations. When researching agency at this level, the main question is whether social actors, especially those classes most vulnerable to exclusion and exploitation, find ways to bypass the steering mechanisms of web 2.0 environments to articulate subversive discourses that can acquire visibility and become influential in the broader public sphere. An interesting example tapping on gender relations, which stands at the intersection between algorithmic and representational agency, is the hacking of the video game ‘Legend of Zelda’ to reverse the roles of male and female characters in order to make Princess Zelda the hero and Link (the male hero character) the imprisoned damsel. Such practices challenge hegemonic gender discourses and thematize the broader issues of male dominance in software development and modification. Many users, however, continue to be content consumers rather than ‘produsers’. Semiotic agency operates at the level of reception and refers, first, to the power to make meanings, the ability to think differently [19] or produce oppositional readings [17]. Second, an additional layer of semiotic activity should be added in the context of web 2.0, noticeable in the commenting culture of most mainstream media online spaces. Here, users mediate content produced by mainstream media or other authoritative sources, inserting a new layer of meaning between the original messages and the recipients of these messages. A question that needs to be asked in this context is the extent to which the forms of expression allowed to users in ‘participatory’ online spaces render them able to influence other users’ readings of messages through interjecting oppositional readings between media and audiences. 5) Collective agency: The mediation of collective action by communication technologies is of great significance and the relation between new media and protest/movement activity is a complex issue which cannot be discussed here. Looking for collective agency in web 2.0 environments entails an inquiry on the capacity of users to horizontally develop social relations, discover common positions, establish collective identities, form politicized communities and affinity groups, and mobilize collectively for online or offline action. We suggest that such activity would stand in contrast to the kind of individualism (even if it is networked) typically promoted by commercial online platforms, the type of pseudo- or consumer communities brought together by automated processes and interaction with technology without social interaction [15] or phenomena of ‘slacktivism’ considered by critics a form of inconsequential online political action (e.g. [20]). 6) Counter-ideological agency: Last but not least, an empirical inquiry on user agency needs to tap into the capacity of users to deconstruct naturalized meanings and popular myths about the nature and effects of web 2.0, for instance, regarding the unlimited and equal opportunities offered to everyone (especially less privileged actors) to acquire visibility, receive attention and exert political influence [21]. Recent developments (e.g. the Snowden revelations, the European Privacy Class Action against Facebook) have thematized issues of surveillance and privacy resulting in a heightened level of concern among users (see [22]. However, other aspects of exploitation and control remain largely unaddressed among common users (e.g. the issue of user labour, the perceived impossibility of opting-out). The empirical study on attitudes and cultures needs also to extend to counter-cultures of users that have quitted corporate platforms and moved to non-commercial alternatives. Conclusion Empirical research is urgently needed in critical internet studies, in order to open the ‘black box’ of user agency. The multilayered nature of web 2.0 calls for an equally multifaceted analytical approach, combining political economy, cultural studies and the critical analysis of technical infrastructures. The conceptualization of user agency laid out above is intended to contribute to the renewal of critical cultural studies regarding web 2.0, in order to identify repertoires of resistance and ultimately strengthen emerging oppositional user attitudes and cultures. Notes 1 The closing down in 2014 of the alternative weekly Schnews in the UK is attributed, among other factors, to the detrimental effect of corporate social media: In their own words, “playing the Facebook game demands a huge amount of energy […] With complex advertising deals and algorithms determining what you do or don't see, maintaining an impact on social media requires hours and hours per week of social networking. For us, that hasn't been feasible” (http://www.schnews.org.uk/stories/AND-FINALLY/). References
|
About This Conference
Conference Schedule
Travel & Registration Information
Please refer to the official ISIS Summit page for travel and accommodation information. Below is the list of available registration rates. Please use the registration form to register with the ISIS Summit Vienna 2015.
- Early Bird academics: 400.00 EUR
- Regular academics: 500.00 EUR
- Early Bird non-academics: 530.00 EUR
- Regular non-academics: 700.00 EUR
- Students: 120.00 EUR
- Retired persons: 120.00 EUR
- Unemployed: 120.00 EUR
- Persons with special needs: 120.00 EUR
- Citizens of BRICS, newly independent countries, developing countries: 120.00 EUR
- ISIS members (special offer): 120.00 EUR
- Early Bird ISIS member: 120.00 EUR
- Early Bird DTMD workshop participant with presentation: 120.00 EUR
- Early Bird FIS group mailing list member: 120.00 EUR
- Early Bird ICTs-and-Society Network member: 120.00 EUR
- Early Bird International Center for Philosophy of Information affiliate: 120.00 EUR
- Early Bird B.S.Lab affiliate: 320.00 EUR
- Early Bird BCSSS member: 320.00 EUR
- Early Bird Communications Engineering (University of Linz) co-worker: 320.00 EUR
- Early Bird Department of Communication (University of Vienna) co-worker: 320.00 EUR
- Early Bird Department of Systems Analysis (University of Economics Prague) co-worker: 320.00 EUR
- Early Bird Global Brain Institute affiliate: 320.00 EUR
- Early Bird IACAP member: 320.00 EUR
- Early Bird IANES affiliate: 320.00 EUR
- Early Bird ICIE member: 320.00 EUR
- Early Bird Institut für Design Science München member: 320.00 EUR
- Early Bird Institute for Sustainable Economic Development (BOKU) co-worker: 320.00 EUR
- Early Bird ISA member: 320.00 EUR
- Early Bird ISBS member: 320.00 EUR
- Early Bird ITA (OAW) co-worker: 320.00 EUR
- Early Bird ITHEA member: 320.00 EUR
- Early Bird KHG member: 320.00 EUR
- Early Bird Leibniz-Sozietät member: 320.00 EUR
- Early Bird Media, Technology & Research Group affiliate: 320.00 EUR
- Early Bird Moscow Conservatory affiliate: 320.00 EUR
- Early Bird OCG member: 320.00 EUR
- Early Bird SFU co-worker: 320.00 EUR
- Early Bird Szeged Information History Workshop affiliate: 320.00 EUR
- Early Bird FIfF member: 320.00 EUR
- Invited speaker, chair, convenor, moderator, curator: 0.00 EUR
- Staff: 0.00 EUR
- Press: 0.00 EUR
- Sponsored: 0.00 EUR
- TU Wien course student: 0.00 EUR
- Accompanying participant: 200.00 EUR
- I intend to take part in the eve reception on 3 June 2015 in Vienna: 0.00 EUR
- I intend to take part in the social dinner at the floating Summit on 7 June 2015: 0.00 EUR
Call for Participation
I. Invited Speech
Session Chair
Dr. Wolfgang Hofkirchner
S1. Conference Stream DTMD 2015
Chair of the stream: David Chapman. Please see the Instructions for Authors for a template, instructions for preparation and information on the submission of extended abstracts.
Session Chair
Dr. David Chapman
Show all published submissions (8) Hide published submissions (8)
Submissions
List of Papers (8) Toggle list
S2. Conference Stream ICPI 2015
Chair of the stream: Joseph Brenner. Please see the Instructions for Authors for a template, instructions for preparation and information on the submission of extended abstracts.
Session Chair
Dr. Joseph Brenner, International Center for Transdisciplinary Research, Paris
S3. Conference Stream ICTS 2015
Chair of the stream: Christian Fuchs. Please see the Instructions for Authors for a template, instructions for preparation and information on the submission of extended abstracts.
Session Chair
Dr. Christian Fuchs
T1. Conference Track: (Big) history of information
Session Chair
Dr. László Z. Karvalics
T1.0.1. Conference Track: Andrew Feenberg's technical politics and ICTs
Session Chair
Professor Graeme Kirkpatrick
T1.1. Conference Track: As we may teach
Chair of the stream: Kristof Fenyvesi. Please see the Instructions for Authors for a template, instructions for preparation and information on the submission of extended abstracts.
Session Chair
Dr. Kristof Fenyvesi, University of Jyväskylä
T1.2. Conference Track: China and the global information society
Session Chair
Dr. Robert Bichler
T1.3. Conference Track: Communication, information and reporting
Session Chair
Dr. Gandolfo Dominici
T1.4. Conference Track: Cyberpeace
Session Chair
Dr. Kai Nothdurft
T2. Conference Track: Emancipation or disempowerment of man?
Session Chair
Dr. Tomáš Sigmund
T2.1. Conference Track: Emergence of and in (self-)organizing work systems
Session Chair
Dr. Christian Stary
T2.2. Conference Track: Emergent systems, information and society
Session Chair
Dr. Wolfgang Hofkirchner
T3. Conference Track: Empowering patients
Chair of the stream: Mary Jo Deering. Please see the Instructions for Authors for a template, instructions for preparation and information on the submission of extended abstracts.
Session Chair
Dr. Mary Jo Deering
T3.0. Conference Track: Homo informaticus
T3.1. Conference Track: Human resilience and human vulnerability
Session Chair
Dr. Brigitte Sindelar
Show all published submissions (1) Hide published submissions (1)
Submissions
List of Papers (1) Toggle list
T3.2. Conference Track: ICT and literature
Session Chair
Mr. Giovanna Di Rosario
Show all accepted abstracts (1) Hide accepted abstracts (1)
List of Accepted Abstracts (1) Toggle list
T3.3. Conference Track: ICTs and power relations
Session Chair
Mr. Stefan Strauß
T4. Conference Track: Information in the exact sciences and symmetry
Chair of the stream: Gyorgy Darvas. Please see the Instructions for Authors for a template, instructions for preparation and information on the submission of extended abstracts.
Session Chair
Dr. György Darvas, IRO Hungarian Academy of Sciences; and the Symmetrion
T5. Conference Track: Informational warfare
Chair of the stream: Mariarosaria Taddeo. Please see the Instructions for Authors for a template, instructions for preparation and information on the submission of extended abstracts.
Session Chair
Dr. Mariarosaria Taddeo
T6. Conference Track: Multi-level semiosis
Chair of the stream: Luis Emilio Bruni. Please see the Instructions for Authors for a template, instructions for preparation and information on the submission of extended abstracts.
Session Chair
Dr. Luis Emilio Bruni
T7. Conference Track: Music, information and symmetry
Session Chair
Dr. Konstantin Zenkin
T7.1. Conference Track: Natural disasters
Session Chair
Dr. Marianne Penker
T7.2. Conference Track: Progress in Information Studies in China
Session Chair
Professor Xue-Shan Yan, Peking University
T8. Conference Track: Searching to create a humanized civilization
Chair of the stream: Elohim Jimenez-Lopez. Please see the Instructions for Authors for a template, instructions for preparation and information on the submission of extended abstracts.
Session Chair
Dr. Elohim Jimenez Lopez
Show all accepted abstracts (1) Hide accepted abstracts (1)
List of Accepted Abstracts (1) Toggle list
T8.1. Conference Track: The ethics of foundations
Session Chair
Professor Rainer E. Zimmermann, Lehrgebiet Philosophie
T9. Conference Track: The Global Brain
Chair of the stream: David R. Weinbaum. Please see the Instructions for Authors for a template, instructions for preparation and information on the submission of extended abstracts.
Session Chair
Dr. David R. Weinbaum (Weaver)
T9.1. Conference Track: Transdisciplinary response and responsibility
Session Chair
Dr. Søren Brier
T9.2. Conference Track: Triangular relationship
Chair of the stream: Marcin J. Schröder. Please see the Instructions for Authors for a template, instructions for preparation and information on the submission of extended abstracts.
Session Chair
Dr. Marcin Jan Schroeder, Akita International University
T9.3. Conference Track: Weaving the understanding of information
Session Chair
Dr. José María Díaz Nafría