ABSTRACT:One of the most powerful ideas behind the potential of computer technology is that it could revolutionize education. To understand this idea historically, this article brings together computer science researchers with theories of education and childhood development. These researchers—Seymour Papert at MIT and Alan Kay and Adele Goldberg at Xerox’s Palo Alto Research Center—drew on a group of midtwentiethcentury education theorists. These cases offer a window into how computer researchers have read and interpreted scientific theories about education and childhood development that then make their way into computer technology or fail to do so entirely.
{"title":"Turtles, Tablets, and Boxes: Computer Technology and Education in the 1970s","authors":"Elizabeth Petrick","doi":"10.7560/ic58303","DOIUrl":"https://doi.org/10.7560/ic58303","url":null,"abstract":"ABSTRACT:One of the most powerful ideas behind the potential of computer technology is that it could revolutionize education. To understand this idea historically, this article brings together computer science researchers with theories of education and childhood development. These researchers—Seymour Papert at MIT and Alan Kay and Adele Goldberg at Xerox’s Palo Alto Research Center—drew on a group of midtwentiethcentury education theorists. These cases offer a window into how computer researchers have read and interpreted scientific theories about education and childhood development that then make their way into computer technology or fail to do so entirely.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139295380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ABSTRACT:In 2021 China passed the Personal Information Protection Law. One of the most important features of the law is its regulation of sensitive personal information processing. This article examines how Chinese legal frameworks treat sensitive personal information and analyzes how the Personal Information Protection Law protects sensitive personal information by creating general rules for personal information processing and specific rules for sensitive information. This article also analyzes three obstacles to sensitive personal information protection: context sensitivity, the influence of widespread use of digital technologies, and the balance among various interests. In response, this article proposes three solutions: (1) a contextual strategy for risk governance, including contextual risk analysis and resilience; (2) algorithm compliance, including the algorithmic impact assessment and algorithmic supervision; and (3) a two-step test for balancing various interests.
{"title":"Examining Sensitive Personal Information Protection in China: Framework, Obstacles, and Solutions","authors":"Qian Li, Tao Jiang, Xijian Fan","doi":"10.7560/ic58302","DOIUrl":"https://doi.org/10.7560/ic58302","url":null,"abstract":"ABSTRACT:In 2021 China passed the Personal Information Protection Law. One of the most important features of the law is its regulation of sensitive personal information processing. This article examines how Chinese legal frameworks treat sensitive personal information and analyzes how the Personal Information Protection Law protects sensitive personal information by creating general rules for personal information processing and specific rules for sensitive information. This article also analyzes three obstacles to sensitive personal information protection: context sensitivity, the influence of widespread use of digital technologies, and the balance among various interests. In response, this article proposes three solutions: (1) a contextual strategy for risk governance, including contextual risk analysis and resilience; (2) algorithm compliance, including the algorithmic impact assessment and algorithmic supervision; and (3) a two-step test for balancing various interests.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139300972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ABSTRACT:New media and new applications of existing media are typically seen as ways of distributing knowledge more effectively, often with hopes that this process will strengthen democracy. Adopting a history-of-knowledge approach, the authors analyze methods of knowledge circulation attending early print, nineteenth-century mechanics’ institutes and public libraries, early radio broadcasting, and explanatory journalism, providing a comparative historical framework for a recent new-media platform for distributing knowledge, The Conversation network. Appealing to a socially broad audience has consistently been a challenge. Efforts to distribute knowledge also reflected differences in prevailing media ecosystems, national systems of political economy, and contemporary social/political concerns.
{"title":"(New) Media and the Circulation of Knowledge: A Historical Framework for The Conversation Canada","authors":"Gene Allen, Nathan Lucky","doi":"10.7560/ic58301","DOIUrl":"https://doi.org/10.7560/ic58301","url":null,"abstract":"ABSTRACT:New media and new applications of existing media are typically seen as ways of distributing knowledge more effectively, often with hopes that this process will strengthen democracy. Adopting a history-of-knowledge approach, the authors analyze methods of knowledge circulation attending early print, nineteenth-century mechanics’ institutes and public libraries, early radio broadcasting, and explanatory journalism, providing a comparative historical framework for a recent new-media platform for distributing knowledge, The Conversation network. Appealing to a socially broad audience has consistently been a challenge. Efforts to distribute knowledge also reflected differences in prevailing media ecosystems, national systems of political economy, and contemporary social/political concerns.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139297237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ABSTRACT:This research offers a critical context-sensitive discourse-historical analysis of a speech by James E. Shepard, the Black president and founder of North Carolina Central University. Shepard’s speech negotiated his identity as an educated Black man in the Jim Crow South by using perspectivation to switch between the point of view of an African American and that of a North Carolinian, thus establishing a bond with white members of his audience based on locational loyalty. A better understanding of how language is used by oppressed populations contributes to LIS scholars’ understandings of the usage of information in society.
ABSTRACT:This research offers a critical context-sensitive discourse-historical analysis of a speech by James E. Shepard, the Black president and founder of North Carolina Central University.谢泼德在演讲中运用视角转换法,在非裔美国人的视角和北卡罗来纳州人的视角之间切换,从而在地域忠诚的基础上与听众中的白人建立了联系,以此来协商他作为吉姆-克劳南方受过教育的黑人的身份。更好地理解受压迫人群如何使用语言有助于 LIS 学者理解信息在社会中的使用。
{"title":"Legitimate Language: James E. Shepard’s Use of Mitigation Strategies to Advance Black Education","authors":"Latesha Velez","doi":"10.7560/ic58304","DOIUrl":"https://doi.org/10.7560/ic58304","url":null,"abstract":"ABSTRACT:This research offers a critical context-sensitive discourse-historical analysis of a speech by James E. Shepard, the Black president and founder of North Carolina Central University. Shepard’s speech negotiated his identity as an educated Black man in the Jim Crow South by using perspectivation to switch between the point of view of an African American and that of a North Carolinian, thus establishing a bond with white members of his audience based on locational loyalty. A better understanding of how language is used by oppressed populations contributes to LIS scholars’ understandings of the usage of information in society.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139304620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
abstract:New ideas and theories continue to emerge in the fast-changing field of translation studies. This article attempts to conceptualize translation beyond the linguistic confinement. It begins by reviewing the mainstream translation conceptualizations. It adopts information as the fundamental concept underlying translation and reveals concepts like source and target text, meaning transfer, and language to be more of special cases of the information-based concept of translation; translation is, as a result, expanded to include not only human actions of creation and behaviors, but also actions of other life forms, inanimate or artificial substances that are capable of meaning-making. The article thus proposes the information theory of translation (ITT). It defines translation as a meaning-making process of an agent within its specific informational boundary and time limit to achieve goals. Finally, key problems in translation studies are discussed.
{"title":"The Information Theory of Translation","authors":"Qiang Pi","doi":"10.7560/ic58203","DOIUrl":"https://doi.org/10.7560/ic58203","url":null,"abstract":"abstract:New ideas and theories continue to emerge in the fast-changing field of translation studies. This article attempts to conceptualize translation beyond the linguistic confinement. It begins by reviewing the mainstream translation conceptualizations. It adopts information as the fundamental concept underlying translation and reveals concepts like source and target text, meaning transfer, and language to be more of special cases of the information-based concept of translation; translation is, as a result, expanded to include not only human actions of creation and behaviors, but also actions of other life forms, inanimate or artificial substances that are capable of meaning-making. The article thus proposes the information theory of translation (ITT). It defines translation as a meaning-making process of an agent within its specific informational boundary and time limit to achieve goals. Finally, key problems in translation studies are discussed.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45231452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
abstract:This article presents a taxonomy of the information practices apparent in an imageboard discussion thread that was influential in jump-starting the worldwide QAnon movement. After introducing QAnon with a review of literature, the author examines 4Chan /pol/ thread #147547939 (key in introducing multiple key elements of the QAnon narrative) to enumerate and classify the information practices deployed by discussion participants. In conclusion, the article expands beyond existing research's previous focus on outright fabrication, showing that early QAnon participants' information practices are also defined in large part by suspicious and idiosyncratic modes of reading authentic sources, not simply the propagation of falsehoods.
{"title":"Taxonomizing Information Practices in a Large Conspiracy Movement: Using Early QAnon as a Case Study","authors":"J. Hodges","doi":"10.7560/ic58201","DOIUrl":"https://doi.org/10.7560/ic58201","url":null,"abstract":"abstract:This article presents a taxonomy of the information practices apparent in an imageboard discussion thread that was influential in jump-starting the worldwide QAnon movement. After introducing QAnon with a review of literature, the author examines 4Chan /pol/ thread #147547939 (key in introducing multiple key elements of the QAnon narrative) to enumerate and classify the information practices deployed by discussion participants. In conclusion, the article expands beyond existing research's previous focus on outright fabrication, showing that early QAnon participants' information practices are also defined in large part by suspicious and idiosyncratic modes of reading authentic sources, not simply the propagation of falsehoods.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48219654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
abstract:Predictive algorithms today share more than just semantics with the divinatory practices of the past. This article will map the parallels, contending that the similarities between the two practices are true "propositions" that radically question the way we apprehend the world, the way we draw our knowledge from it, and the way we then act within and upon it. Mindful of the limitations of such a comparative method, it will nevertheless attempt it by deploying a twofold approach. On the one hand, the article questions the epistemological nature of predictive analytics and examines their truth claims with regard to how they represent the future. On the other hand, it focuses on the ontological dimension of predictive analytics and investigates how they shape the world by bringing about the presence of the future in the here and now.
{"title":"Algorithmic Divination: From Prediction to Preemption of the Future","authors":"Christopher Lazaro","doi":"10.7560/ic58202","DOIUrl":"https://doi.org/10.7560/ic58202","url":null,"abstract":"abstract:Predictive algorithms today share more than just semantics with the divinatory practices of the past. This article will map the parallels, contending that the similarities between the two practices are true \"propositions\" that radically question the way we apprehend the world, the way we draw our knowledge from it, and the way we then act within and upon it. Mindful of the limitations of such a comparative method, it will nevertheless attempt it by deploying a twofold approach. On the one hand, the article questions the epistemological nature of predictive analytics and examines their truth claims with regard to how they represent the future. On the other hand, it focuses on the ontological dimension of predictive analytics and investigates how they shape the world by bringing about the presence of the future in the here and now.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47705533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
abstract:The promise of an open cyberspace driven by an empowered generation of "digital natives" has collapsed, due to the corporate capture of the internet and the psychosocial immiseration of youngsters caused by the instrumental manipulation of them at the screen interface. Certain strands in the twentieth-century philosophy of technology can throw light on these developments in terms of (1) Martin Heidegger's suggestion that the expanding influence of 'Technik' tends toward the treatment of persons as exploitable things, or "standing reserve," and (2) Jacques Ellul's contention that humans would in time and of necessity assimilate themselves to vast and autonomous technological system. Young people are now being largely shaped by "social physics," as big data–derived fodder for the creation of a hive mind in the interests of technocratic social control and corporate profiteering.
{"title":"Big Nihilism: Generation Z, Surveillance Capitalism, and the Emerging Digital Technocracy","authors":"G. Robson","doi":"10.7560/ic58204","DOIUrl":"https://doi.org/10.7560/ic58204","url":null,"abstract":"abstract:The promise of an open cyberspace driven by an empowered generation of \"digital natives\" has collapsed, due to the corporate capture of the internet and the psychosocial immiseration of youngsters caused by the instrumental manipulation of them at the screen interface. Certain strands in the twentieth-century philosophy of technology can throw light on these developments in terms of (1) Martin Heidegger's suggestion that the expanding influence of 'Technik' tends toward the treatment of persons as exploitable things, or \"standing reserve,\" and (2) Jacques Ellul's contention that humans would in time and of necessity assimilate themselves to vast and autonomous technological system. Young people are now being largely shaped by \"social physics,\" as big data–derived fodder for the creation of a hive mind in the interests of technocratic social control and corporate profiteering.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47764983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
abstract:Archives represent one of the physical components of the country's heritage. They represent an important living memory containing both the past and the present upon which a country can foresee its future based on available data in order to design sound policies. The richer a country is in its heritage, the more valuable its archives will be to all of humanity, representing an accumulation of valuable experiences and information that help construct and explain both human psychology and the environment. Iraqi archives reflect the diversity of a civilization that goes back more than eight thousand years in the span of human history. The destruction and theft of Iraq's archives have impoverished humanity's shared heritage and, at the same time, resulted in an international-level cultural genocide as global and regional instruments concerned with this shared heritage compete to strengthen its protection.
{"title":"The Cultural Genocide of the Iraqi Archives and Iraqi Jewish Archive and International Responsibility","authors":"Husam Abdul Ameer Khalaf, Amanda Raquel Dorval","doi":"10.7560/ic58105","DOIUrl":"https://doi.org/10.7560/ic58105","url":null,"abstract":"abstract:Archives represent one of the physical components of the country's heritage. They represent an important living memory containing both the past and the present upon which a country can foresee its future based on available data in order to design sound policies. The richer a country is in its heritage, the more valuable its archives will be to all of humanity, representing an accumulation of valuable experiences and information that help construct and explain both human psychology and the environment. Iraqi archives reflect the diversity of a civilization that goes back more than eight thousand years in the span of human history. The destruction and theft of Iraq's archives have impoverished humanity's shared heritage and, at the same time, resulted in an international-level cultural genocide as global and regional instruments concerned with this shared heritage compete to strengthen its protection.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46587324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
abstract:This article contributes to the ongoing conversation about information history. The article argues for reformulating and pinpointing legitimacy and relevance as core issues characterizing information history and for drawing on theoretical input from historical disciplines such as conceptual history and microhistory. Different notions about history reflect how the individual historian approaches information as an object for historical scrutiny that ultimately allows for multiple research strategies. Information history also deals with traditional history topics such as structures versus actors, change versus continuity, and context. The article argues for seeing information history as histories of information.
{"title":"Present and Past: The Relevance of Information History","authors":"Laura Skouvig","doi":"10.7560/ic58101","DOIUrl":"https://doi.org/10.7560/ic58101","url":null,"abstract":"abstract:This article contributes to the ongoing conversation about information history. The article argues for reformulating and pinpointing legitimacy and relevance as core issues characterizing information history and for drawing on theoretical input from historical disciplines such as conceptual history and microhistory. Different notions about history reflect how the individual historian approaches information as an object for historical scrutiny that ultimately allows for multiple research strategies. Information history also deals with traditional history topics such as structures versus actors, change versus continuity, and context. The article argues for seeing information history as histories of information.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42620531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}