abstract:This article looks at the phenomenon of computer dating through its appearance in the classified ads of the Village Voice. Popular between the late 1960s and mid-1970s, computer dating services used questionnaire data to match singles. Highlighting new perspectives drawn from the classifieds, this article offers a cultural history of computer dating in the United States, charting its rise and fall and the shifting public sentiments around it. The article argues that computer dating should be understood as a media phenomenon and demonstrates how computer dating ads complicate teleological narratives about contemporary dating technologies, offering an alternative history of how computers became "personal."
{"title":"Computer Dating in the Classifieds: Complicating the Cultural History of Matchmaking by Machine","authors":"Bonnie Ruberg","doi":"10.7560/ic57301","DOIUrl":"https://doi.org/10.7560/ic57301","url":null,"abstract":"abstract:This article looks at the phenomenon of computer dating through its appearance in the classified ads of the Village Voice. Popular between the late 1960s and mid-1970s, computer dating services used questionnaire data to match singles. Highlighting new perspectives drawn from the classifieds, this article offers a cultural history of computer dating in the United States, charting its rise and fall and the shifting public sentiments around it. The article argues that computer dating should be understood as a media phenomenon and demonstrates how computer dating ads complicate teleological narratives about contemporary dating technologies, offering an alternative history of how computers became \"personal.\"","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"57 1","pages":"235 - 254"},"PeriodicalIF":0.6,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42116983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
abstract:Infrastructure power announces the priorities of a state: who and what is authorized to move and act, whose lives and what materials have significance. In the colonial context of the Uyghur region in Northwest China, surveillance systems—checkpoints, cameras, digital forensic tools, and nearly sixty thousand low-level "grid workers"—build forms of infrastructure power that make hidden or resistant populations appear legible, decoded, and editable as "enemy intelligence." Drawing on a recently obtained internal police database of thousands of Chinese-language digital files, ethnographic observations, and interviews with Muslims who recently fled from China to Kazakhstan, this article argues that in this location at the frontier of the neoliberal and illiberal East, a smart city functions in part as a neo-Taylorist assembly line that employs an army of grid workers to produce Muslim enemies and non-Muslim friends.
{"title":"Producing \"Enemy Intelligence\": Information Infrastructure and the Smart City in Northwest China","authors":"Darren Byler","doi":"10.7560/ic57205","DOIUrl":"https://doi.org/10.7560/ic57205","url":null,"abstract":"abstract:Infrastructure power announces the priorities of a state: who and what is authorized to move and act, whose lives and what materials have significance. In the colonial context of the Uyghur region in Northwest China, surveillance systems—checkpoints, cameras, digital forensic tools, and nearly sixty thousand low-level \"grid workers\"—build forms of infrastructure power that make hidden or resistant populations appear legible, decoded, and editable as \"enemy intelligence.\" Drawing on a recently obtained internal police database of thousands of Chinese-language digital files, ethnographic observations, and interviews with Muslims who recently fled from China to Kazakhstan, this article argues that in this location at the frontier of the neoliberal and illiberal East, a smart city functions in part as a neo-Taylorist assembly line that employs an army of grid workers to produce Muslim enemies and non-Muslim friends.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"57 1","pages":"197 - 216"},"PeriodicalIF":0.6,"publicationDate":"2022-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47824700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
abstract:This special issue asks what digital state-making means in border zones, cities, and landscapes. As a complement to discussions of such processes in cyberspace and virtual territory, we elaborate by exploring connections to physical territory. Authors provide firsthand accounts from a number of global locations where tech surveillance is especially apparent: the US-Mexico border; the city of Los Angeles; and the Uyghur borderlands of Northwest China. In these contexts, physical territory is important as a crucial linking point between massive databases in the cloud and technical systems on the land. It is where the state can surveil bodies and movements in order to identify them, codify them, and enter their features as data to be used later. This is happening at multiple levels of governance from national, regional, to city departments. And the differential impact on marginalized groups is evident throughout.
{"title":"Introduction: Digitizing Borders, Cities, and Landscapes","authors":"Winifred R Poster","doi":"10.7560/ic57201","DOIUrl":"https://doi.org/10.7560/ic57201","url":null,"abstract":"abstract:This special issue asks what digital state-making means in border zones, cities, and landscapes. As a complement to discussions of such processes in cyberspace and virtual territory, we elaborate by exploring connections to physical territory. Authors provide firsthand accounts from a number of global locations where tech surveillance is especially apparent: the US-Mexico border; the city of Los Angeles; and the Uyghur borderlands of Northwest China. In these contexts, physical territory is important as a crucial linking point between massive databases in the cloud and technical systems on the land. It is where the state can surveil bodies and movements in order to identify them, codify them, and enter their features as data to be used later. This is happening at multiple levels of governance from national, regional, to city departments. And the differential impact on marginalized groups is evident throughout.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"57 1","pages":"111 - 122"},"PeriodicalIF":0.6,"publicationDate":"2022-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41554560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
abstract:Drawing on a two-year ethnographic study of data-driven governance in Los Angeles, this study shows that while much is made of using smart, data-driven approaches to make better, more sustainable, and more connected city futures, the everyday practices of data-driven governance are instead wrapped around efforts to prevent unwanted futures. Put another way, while the rhetoric of the smart city promises a utopia of transparency, efficiency, and well-being, the practical application of smart city tools is cast through their opposites: preventing waste, crime, disaster, and so on. Detailing two administrative projects that aim to prevent through prediction—crime prevention and homelessness prevention—this study asks, What does the coupling of prevention logics and predictive analytics do? I suggest that rendering preferable futures by avoiding unwanted ones expands the epistemic infrastructure of the smart city and, with it, reliance on surveillance.
{"title":"The Everyday of Future-Avoiding: Administering the Data-Driven Smart City","authors":"Leah Horgan","doi":"10.7560/ic57204","DOIUrl":"https://doi.org/10.7560/ic57204","url":null,"abstract":"abstract:Drawing on a two-year ethnographic study of data-driven governance in Los Angeles, this study shows that while much is made of using smart, data-driven approaches to make better, more sustainable, and more connected city futures, the everyday practices of data-driven governance are instead wrapped around efforts to prevent unwanted futures. Put another way, while the rhetoric of the smart city promises a utopia of transparency, efficiency, and well-being, the practical application of smart city tools is cast through their opposites: preventing waste, crime, disaster, and so on. Detailing two administrative projects that aim to prevent through prediction—crime prevention and homelessness prevention—this study asks, What does the coupling of prevention logics and predictive analytics do? I suggest that rendering preferable futures by avoiding unwanted ones expands the epistemic infrastructure of the smart city and, with it, reliance on surveillance.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"57 1","pages":"169 - 196"},"PeriodicalIF":0.6,"publicationDate":"2022-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48927973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
abstract:This article uses border modernization programs, including the Automated Virtual Agent for Truth Assessments in Real-Time (AVATAR) and the Secure Border Initiative Network (SBInet), to examine how race and labor have been central to high-tech border enforcement strategies. While I discuss specific technologies and programs, I am less interested in the machines and much more concerned with the work they allow humans to do. By "work" I mean the epistemic and manual labor that is required to imagine, produce, and use border enforcement technologies. I integrate approaches from critical ethnic studies and geography to broaden how the mostly white fields of STS (science and technology studies) and military studies have treated border-making and enforcement technologies. Consequently, I argue that the machines, data networks, and human agents that constitute the modern border apparatus function as a sociotechnical articulation of the settler-colonial state.
{"title":"Race, Algorithms, and the Work of Border Enforcement","authors":"Juan De Lara","doi":"10.7560/ic57203","DOIUrl":"https://doi.org/10.7560/ic57203","url":null,"abstract":"abstract:This article uses border modernization programs, including the Automated Virtual Agent for Truth Assessments in Real-Time (AVATAR) and the Secure Border Initiative Network (SBInet), to examine how race and labor have been central to high-tech border enforcement strategies. While I discuss specific technologies and programs, I am less interested in the machines and much more concerned with the work they allow humans to do. By \"work\" I mean the epistemic and manual labor that is required to imagine, produce, and use border enforcement technologies. I integrate approaches from critical ethnic studies and geography to broaden how the mostly white fields of STS (science and technology studies) and military studies have treated border-making and enforcement technologies. Consequently, I argue that the machines, data networks, and human agents that constitute the modern border apparatus function as a sociotechnical articulation of the settler-colonial state.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"57 1","pages":"150 - 168"},"PeriodicalIF":0.6,"publicationDate":"2022-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48092046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
abstract:The US-Mexico border-lands are disproportionately targeted by detection technologies, data tracing, and policing. Such technologies are applied to a population of millions who largely are racialized as Mexican in the United States. Geoffrey Bowker and Susan Leigh Star have explored how technologies of classification and applications stemming from them embody important racial divides in their study of apartheid in South Africa. This article moves the examination of racialized technologies from the microscale to the macroscale by looking at the framing of a distinctive region and the people most characteristic of it as a surveillance and enforcement target.
{"title":"Who Is Watched? Racialization of Surveillance Technologies and Practices in the US-Mexico Borderlands","authors":"J. Heyman","doi":"10.7560/ic57202","DOIUrl":"https://doi.org/10.7560/ic57202","url":null,"abstract":"abstract:The US-Mexico border-lands are disproportionately targeted by detection technologies, data tracing, and policing. Such technologies are applied to a population of millions who largely are racialized as Mexican in the United States. Geoffrey Bowker and Susan Leigh Star have explored how technologies of classification and applications stemming from them embody important racial divides in their study of apartheid in South Africa. This article moves the examination of racialized technologies from the microscale to the macroscale by looking at the framing of a distinctive region and the people most characteristic of it as a surveillance and enforcement target.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"57 1","pages":"123 - 149"},"PeriodicalIF":0.6,"publicationDate":"2022-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43569154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
abstract:Museums are participating in the capturing of global data for the perceived benefit of improved relationships with the public. This article proposes a framework for critically analyzing the datafication of museum visitors and visitor engagement, combining a critical lens from data studies with a social view of datafication as practice—a set of practices within a sociotechnical assemblage that is continuously reproduced by the choices made within and outside the museum. Museums are situated at the intersection of Pierre Bourdieu's economic, cultural, and political fields; thus, I highlight some of the external social and technological pressures driving datafication in museums. Relying on public accounts and previous case studies, I argue that datafication of visitor engagement is made to work through data loops: circular processes between institutional practices of museums and social practices of audiences where data are collected, processed, and decided upon.
{"title":"Datafying Museum Visitors: A Research Agenda","authors":"P. Pruulmann-Vengerfeldt","doi":"10.7560/ic57105","DOIUrl":"https://doi.org/10.7560/ic57105","url":null,"abstract":"abstract:Museums are participating in the capturing of global data for the perceived benefit of improved relationships with the public. This article proposes a framework for critically analyzing the datafication of museum visitors and visitor engagement, combining a critical lens from data studies with a social view of datafication as practice—a set of practices within a sociotechnical assemblage that is continuously reproduced by the choices made within and outside the museum. Museums are situated at the intersection of Pierre Bourdieu's economic, cultural, and political fields; thus, I highlight some of the external social and technological pressures driving datafication in museums. Relying on public accounts and previous case studies, I argue that datafication of visitor engagement is made to work through data loops: circular processes between institutional practices of museums and social practices of audiences where data are collected, processed, and decided upon.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"57 1","pages":"63 - 81"},"PeriodicalIF":0.6,"publicationDate":"2022-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45524741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
abstract:This study explores how marginalized groups negotiate the past and partake in building collective memory online. Using examples drawn from a large-scale ethnographic study, I show how members of the Persian community in Israel (Israelis of Iranian origin) reaffirm and oppose excluding dominant Israeli collective memory narratives of the Holocaust through rereading historic Iranian-related stories of Holocaust occurrences. The article thus aims to both discuss the ongoing struggle of Mizrahi communities to criticize exclusionary practices within Israeli sociocultural discourses and reflect on the research opportunities and limitations social media create in studying collective memory construction online as a whole and in the context of minority groups in particular.
{"title":"Negotiating the Past Online: Holocaust Commemoration between Iran and Israel","authors":"Aya Yadlin","doi":"10.7560/ic57104","DOIUrl":"https://doi.org/10.7560/ic57104","url":null,"abstract":"abstract:This study explores how marginalized groups negotiate the past and partake in building collective memory online. Using examples drawn from a large-scale ethnographic study, I show how members of the Persian community in Israel (Israelis of Iranian origin) reaffirm and oppose excluding dominant Israeli collective memory narratives of the Holocaust through rereading historic Iranian-related stories of Holocaust occurrences. The article thus aims to both discuss the ongoing struggle of Mizrahi communities to criticize exclusionary practices within Israeli sociocultural discourses and reflect on the research opportunities and limitations social media create in studying collective memory construction online as a whole and in the context of minority groups in particular.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"57 1","pages":"46 - 62"},"PeriodicalIF":0.6,"publicationDate":"2022-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42588301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
abstract:This case study uses a triangulation of methods to analyze how visitors use their phones on-site at two lesser-known Washington, DC, memorials. While individuals frequently used phones to engage with the sites, they did not use the affordances of their internetconnected devices: they took many pictures for themselves but infrequently shared them, and they did not consume additional online information to compensate for a lack thereof on-site because they believed it should have been provided at the memorial. Overall, the lack of online interaction was caused by few incentives: the sites are not recognizable enough as sites of tourism, which is why photographs are not shared, and there are no prompts on-site to consume additional information, which is why individuals do not research online. This article shows that visitors' full interactive engagement with the sites, employing online and offline modalities, does not seem to occur without incentives.
{"title":"No Incentives to Interact: A Case Study of Mobile Phone Interactions with Martin Luther King Jr. Memorials in Washington, DC","authors":"Larissa Hugentobler","doi":"10.7560/ic57102","DOIUrl":"https://doi.org/10.7560/ic57102","url":null,"abstract":"abstract:This case study uses a triangulation of methods to analyze how visitors use their phones on-site at two lesser-known Washington, DC, memorials. While individuals frequently used phones to engage with the sites, they did not use the affordances of their internetconnected devices: they took many pictures for themselves but infrequently shared them, and they did not consume additional online information to compensate for a lack thereof on-site because they believed it should have been provided at the memorial. Overall, the lack of online interaction was caused by few incentives: the sites are not recognizable enough as sites of tourism, which is why photographs are not shared, and there are no prompts on-site to consume additional information, which is why individuals do not research online. This article shows that visitors' full interactive engagement with the sites, employing online and offline modalities, does not seem to occur without incentives.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"57 1","pages":"26 - 6"},"PeriodicalIF":0.6,"publicationDate":"2022-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42097358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
abstract:Much of humanity's most important digital heritage is under corporate control, which poses several threats to its longevity and authenticity. However, public institutions have little authority to intervene and preserve it, and their doing so is not always a desirable alternative. The goal of this article is to propose a mitigation of this dilemma. I do so in three steps. First, I introduce the concept of digital world heritage, which denotes digital artifacts with a value beyond their utility to any single individual or community. Second, I specify three ways commercial management threatens digital world heritage. Third, I argue that many of these threats may be mitigated by the introduction of a digital world heritage label. This proposal, I contend, does not interfere with the integrity of private data controllers since it does not involve the donation of data archives, yet it does support the long-term preservation of digital heritage.
{"title":"The Case for a Digital World Heritage Label","authors":"Carl Öhman","doi":"10.7560/ic57106","DOIUrl":"https://doi.org/10.7560/ic57106","url":null,"abstract":"abstract:Much of humanity's most important digital heritage is under corporate control, which poses several threats to its longevity and authenticity. However, public institutions have little authority to intervene and preserve it, and their doing so is not always a desirable alternative. The goal of this article is to propose a mitigation of this dilemma. I do so in three steps. First, I introduce the concept of digital world heritage, which denotes digital artifacts with a value beyond their utility to any single individual or community. Second, I specify three ways commercial management threatens digital world heritage. Third, I argue that many of these threats may be mitigated by the introduction of a digital world heritage label. This proposal, I contend, does not interfere with the integrity of private data controllers since it does not involve the donation of data archives, yet it does support the long-term preservation of digital heritage.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"57 1","pages":"82 - 95"},"PeriodicalIF":0.6,"publicationDate":"2022-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45693140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}