As the title suggests the guide doesn’t guarantee complete protection – all you can do is get better at it. The guide is also clear that it is not for protection against government surveillance. For those worried about government harassment they provide links to other resources like the Workbook on Security.
In her blog entry announcing the guide, Anita Sarkeesian explains the need for this guide thus and costs of harassment thus:
Speak Up & Stay Safe(r): A Guide to Protecting Yourself From Online Harassment was made necessary by the failure of social media services to adequately prevent and deal with the hateful targeting of their more marginalized users. As this guide details, forcing individual victims or potential targets to shoulder the costs of digital security amounts to a disproportionate tax of in time, money, and emotional labor. It is a tax that is levied disproportionately against women, people of color, queer and trans people and other oppressed groups for daring to express an opinion in public.
How did we get to this point? What happened to the dreams of internet democracy and open discourse? What does it say about our society that such harassment has become commonplace? What can we do about it?
The hacker culture, and STEM in general, are under ideological attack. Recently I blogged a safety warning that according to a source I consider reliable, a “women in tech” pressure group has made multiple efforts to set Linus Torvalds up for a sexual assault accusation. I interpreted this as an attempt to beat the hacker culture into political pliability, and advised anyone in a leadership position to beware of similar attempts.
See his “safety warning” at From kafkatrap to honeytrap. His evidence for this ideological attack seems to be gossip from trusted sources – gossip that confirms his views about “women in tech” and pressure groups and so on. This sort of war rhetoric closes any opportunity for discussion around the issues of women in technology. For Raymond it is now a (culture) war between those on the side of hacker culture and STEM, against “Social Justice Warriors” and what is at stake is the “entire civilization that we serve.”
Why are these important issues being militarized instead of aired respectfully? When did the people we live with and love become the other? Just how confident are we that we objectively know what merit is in the hurly burly of life? What civilization is this really about?
Jeremie alerted me to a strange debate raging about Dead or Alive Xtreme 3, a sexist beach volleyball game that Koei Tecmo decided not to release in the West, apparently because of concerns about a feminist backlash according to an employee’s comments on Facebook:
Do you know many issues happening in video game industry with regard to how to treat female in video game industry? We do not want to talk those things here. But certainly we have gone through in last year or two to come to our decision. Thank you.
Needless to say, this has animated the SJW (Social Justice Warrior) discussion around the representation of women in games and censorship of games. (I should note that it isn’t censorship if a publisher decides to not publish something.) Interestingly, this is not the first time we have had this debate about Japanese adult games across cultures. Brian Ashcraft has an article in Kotaku on Why Is CNN Talking About Rapelay? which documented how the Japanese publishers of adult games were adapting to attention from the West by changing titles and not localizing titles. What has changed is how the West is arguing with itself through Japan. The Japanese seem to be trying desperately not to be part of our culture war.
Agencies that fund social science and humanities (SSH) research should move towards requiring a Data Management Plan (DMP) as part of their application processes in cases where research data will be gathered, generated, or curated. In developing policies, funding agencies should consult the community on the values of stewardship and research that would be strengthened by requiring DMPs. Funding agencies should also gather examples and data about reuse of archived data in the social sciences and humanities and encourage due diligence among researchers to make themselves aware of reusable data.
On the surface the recommendation seems rather bland. SSHRC has required the deposit of research data they fund for decades. The problem, however, is that few of us pay attention because it is one more thing to do, and something that shares hard-won data with others that you may want to continue milking for research. What we lack is a culture of thinking of the deposit of research data as a scholarly contribution the way the translation and edition of important cultural texts is. We need a culture of stewardship as a TC3+ (tri-council) document put it. See Capitalizing on Big Data: Toward a Policy Framework for Advancing Digital Scholarship in Canada (PDF).
Given the potential resistance of colleagues it is important that we understand the arguments for requiring planning around data management and that is one of the things we do in this report. Another issue is how to effectively require at the funding proposal end something (like a Data Management Plan) that would show how the researchers are thinking through the issue. To that end we document the approaches of other funding bodies. The point is that this is not actually that new and some research communities are further ahead.
At the end of the day, what we really need is a recognition that depositing data so that it can be used by other researchers is a form of scholarship. Such scholarship can be assessed like any other scholarship. What is the data deposited and what is its quality? How is the data deposited? How is it documented? Can it have an impact?
I blog about this now as I just finished a day-long meeting of the Leadership Council for Digital Infrastructure where we discussed a submission to Industry Canada that calls for coordinated digital research infrastructure. While the situation is different, we need to learn from projects like Bamboo when we imagine massive investment in research infrastructure. We all know it is important, but doing it right is not as easy as it sounds.
Which brings me back to failure. There are three types of failure:
The simple type we are happy to talk about where you ran an experiment based on a hypothesis and didn’t get positive results. This type is based on a simplistic model of the scientific process which pretends to value negative results as much as positive ones. We all know the reality is not that simple and, for that matter, that the science model doesn’t really apply to the humanities.
The messy type where you don’t know why you failed or what exactly failed. This is the type where you promised something in a research or infrastructure proposal and didn’t deliver. This type is harder to report because it reflects badly on you. It is an admission that you were confused or oversold your project.
The third and bitter type is the project that succeeds on its own terms, but is surpassed by the disciplines. It is when you find your research isn’t current any longer and no one is interested in your results. It is when you find yourself ideologically stranded doing something that someone important has declared critically flawed. It is a failure of assumptions, or theory, or positioning and no one wants to hear about this failure, they just want to avoid it.
When people like Willard McCarty and John Unsworth call for a discussion of failure in the digital humanities they describe the first type, but often mean the second. The idea is to describe a form of failure reporting similar to negative results – or to encourage people to describe their failure as simply negative results. What we need, however, is honest description of the second and third types of failure, because those are expensive. To pretend some expensive project that slowly disappeared in missunderstanding was simply an experiment is missing what was at stake. This is doubly true of infrastructure because infrastructure is not supposed to be experimental. No one pays for roads and their maintenance as an experiment to see if people will take the road. You should be sure the road is needed before building.
Panopticonopolis (try saying it) by Misha Lepetic has mostly entries on cities, some of which appear in 3 Quarks Daily. Another article on The Forgotten Archipelago asks what happened to the Soviet ZATP cities – the special purpose, closed and hidden cities set up for secret research. What happened when the Soviet Union collapsed and the federal government could no longer fund these single-purpose cities?
I was led to the panopticonopolis from an article on Blob Justice, Part 1 which looks at the herd shaming that is taking place on the Internet starting with Cecil the lion. I can’t help wondering if this sort of Internet stampede is related to gamergate and Anonymous.
Reading a paper by Lev Manovich I came across a reference to the web site WorldWideWebSize.com which graphs the size of the World Wide Web. The web site searches Google and Bing daily for different words from a corpus and then uses the total results to estimate the size of the web.
When you know, for example, that the word ‘the’ is present in 67,61% of all documents within the corpus, you can extrapolate the total size of the engine’s index by the document count it reports for ‘the’. If Google says that it found ‘the’ in 14.100.000.000 webpages, an estimated size of the Google’s total index would be 23.633.010.000.
In the screen grab above you can see that the estimated size can change dramatically over time. Hard to tell why.
In the past, advertising proceeds that could be received for videos that included Nintendo-copyrighted content (such as gameplay videos) went to Nintendo, according to YouTube rules. Now, through this service, Nintendo will send you a share of these advertising proceeds for any YouTube videos or channels containing Nintendo-copyrighted content that you register.
This program is only for “copyrighted content related to game titles specified by Nintendo”. This is probably because Nintendo has to be careful to not be seen as making money off playthroughs of other publisher’s games.
This new policy/program raises interesting issues around:
Fair use. Is a screen shot or a whole series of them that make up a playthrough covered by “fair use”? My read is that the publishers think not.
Publicity from Playthroughs. YouTuber’s like PewDiePie who post Let’s Play videos (and make money off their popular channels) argue that these videos provide free exposure and publicity.
New Economic Models for Gaming. Is Nintendo exploring new economic models tied to their copyright? Nintendo has been suffering so it makes sense that they would try to find ways to monetize their significant portfolio of popular game franchises and characters.
Doxing and other troll tactics seem to be entering the mainstream. Gabriella Coleman in Hacker, Hoaxer, Whistleblower, Spy writes about Anonymous and their use of various tactics for often admirable causes. She goes further and suggests that trolling may be form of resistance suited to the emerging surveillance state,
Anonymous is emblematic of a particular geography of resistance. Composed of multiple competing groups, short-term power is achievable for brief durations, while long-term dominance by any single group or person is virtually impossible. In such a dynamic landscape, it may be “easy to co-opt, but impossible to be co-opted,” (location 5691 of 8131)
She also sees in Anonymous and trolling the tradition of the trickster. “Trickster tales are not didactic and moralizing but reveal their lessons playfully.” (Location 511 of 8131) It wasn’t long before the tricksters got attacked as the tactics spread. See Dox everywhere: LulzSec under attack from hackers, law enforcement.
The GamerGate controversy showed a much darker side to trolling and how these tactics could be used to bully as much as to resist. The people doxed were mostly women and so-called “social justice warriors” who annoyed certain gamers. Those doxed were hardly the powerful or Big Brother watching us. Now (women) academics who study gaming are being identified. How long before we have to train our graduate students in Anti-doxing strategy as part of preparation for research into games?