Pub Date : 2021-06-02DOI: 10.1080/24701475.2021.1932273
Helen Hockx-Yu
Wikipedia @ 20 is an edited volume put together by Joseph Reagle and Jackie Koerner to celebrate Wikipedia’s 20th birthday, taking advantage of this significant milestone to pause and reflect on th...
{"title":"Wikipedia @ 20, Stories of an Incomplete Revolution, edited by Joseph Reagle and Jackie Koerner, The MIT Press, Cambridge, MA, 2020. U.S. $27.95","authors":"Helen Hockx-Yu","doi":"10.1080/24701475.2021.1932273","DOIUrl":"https://doi.org/10.1080/24701475.2021.1932273","url":null,"abstract":"Wikipedia @ 20 is an edited volume put together by Joseph Reagle and Jackie Koerner to celebrate Wikipedia’s 20th birthday, taking advantage of this significant milestone to pause and reflect on th...","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"6 1","pages":"257 - 261"},"PeriodicalIF":1.3,"publicationDate":"2021-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2021.1932273","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48164400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-26DOI: 10.1080/24701475.2021.1920126
Hallam Stevens
Abstract Early electronic networks were established for a variety of purposes, to serve different kinds of people and needs, and in vastly different political, social, and economic contexts. Examining some of the earliest electronic networks established in Southeast Asia provides us with a glimpse of the contrasting and diverse aims for which they were established and used. At the time electronic networking began to be developed in Malaysia (during the 1980s) its potential was far more open-ended. Although networking pioneers in Southeast Asia were influenced by North American experiences, they quickly developed their own ideas about what networks could be, could do, and how they could serve national or local purposes. This essay uses the concept of a “networking imaginary” to conceptualise the ways in which networks became associated with particular ideals, goals, and futures. The pioneers of electronic networking in Malaysia articulated a unique networking imaginary that anticipated networks playing a critical role in Malaysia’s developing economy. Networking, in the vision of its Malaysian founders, would play a key role in propelling Malaysia forward as a wealthy, stable, and harmonious society. These visions continue to impact the ways in which networks are imagined and used in Malaysia today.
{"title":"From RangKoM and JARING to the Internet: visions and practices of electronic networking in Malaysia, 1983–1996","authors":"Hallam Stevens","doi":"10.1080/24701475.2021.1920126","DOIUrl":"https://doi.org/10.1080/24701475.2021.1920126","url":null,"abstract":"Abstract Early electronic networks were established for a variety of purposes, to serve different kinds of people and needs, and in vastly different political, social, and economic contexts. Examining some of the earliest electronic networks established in Southeast Asia provides us with a glimpse of the contrasting and diverse aims for which they were established and used. At the time electronic networking began to be developed in Malaysia (during the 1980s) its potential was far more open-ended. Although networking pioneers in Southeast Asia were influenced by North American experiences, they quickly developed their own ideas about what networks could be, could do, and how they could serve national or local purposes. This essay uses the concept of a “networking imaginary” to conceptualise the ways in which networks became associated with particular ideals, goals, and futures. The pioneers of electronic networking in Malaysia articulated a unique networking imaginary that anticipated networks playing a critical role in Malaysia’s developing economy. Networking, in the vision of its Malaysian founders, would play a key role in propelling Malaysia forward as a wealthy, stable, and harmonious society. These visions continue to impact the ways in which networks are imagined and used in Malaysia today.","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"230 - 247"},"PeriodicalIF":1.3,"publicationDate":"2021-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2021.1920126","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42392598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-07DOI: 10.1080/24701475.2021.1919966
Brett J. Fujioka, J. DeCook
Abstract In the West, the concern surrounding the rise of online harassment, trolling and other malicious and antisocial behaviors tend to be hyper focused on websites like 4chan, 8chan and reddit. However, the rise of online hate culture that laid the groundwork for movements like Gamergate and the alt right has a precedent in Japan – specifically, the culture that was borne out of the 2channel text board, which was the inspiration for the American 4chan. As society decayed around many Japanese in the 1990s (an economic recession, terrorist attacks, earthquakes, to name a few events), the Internet came to prominence in the form of Bulletin Board Systems. Despite its lasting impact and influence on digital culture more globally, it is understudied and ignored in larger discussions around trolling, harassment, and online hate. Using a case study of the anti-Korean manga Kenkanryu and through the lens of Cynical Romanticism, this essay examines the ways that 2channel and the netto uyoku (the Japanese extreme far right) created a digital subculture that has had a lasting impact on global online hate. Though the netto uyoku never achieved significant successes in terms of actual societal and political change, what they did leave behind is a blueprint for online reactionaries.
{"title":"Digital cynical romanticism: Japan’s 2channel and the precursors to online extremist cultures","authors":"Brett J. Fujioka, J. DeCook","doi":"10.1080/24701475.2021.1919966","DOIUrl":"https://doi.org/10.1080/24701475.2021.1919966","url":null,"abstract":"Abstract In the West, the concern surrounding the rise of online harassment, trolling and other malicious and antisocial behaviors tend to be hyper focused on websites like 4chan, 8chan and reddit. However, the rise of online hate culture that laid the groundwork for movements like Gamergate and the alt right has a precedent in Japan – specifically, the culture that was borne out of the 2channel text board, which was the inspiration for the American 4chan. As society decayed around many Japanese in the 1990s (an economic recession, terrorist attacks, earthquakes, to name a few events), the Internet came to prominence in the form of Bulletin Board Systems. Despite its lasting impact and influence on digital culture more globally, it is understudied and ignored in larger discussions around trolling, harassment, and online hate. Using a case study of the anti-Korean manga Kenkanryu and through the lens of Cynical Romanticism, this essay examines the ways that 2channel and the netto uyoku (the Japanese extreme far right) created a digital subculture that has had a lasting impact on global online hate. Though the netto uyoku never achieved significant successes in terms of actual societal and political change, what they did leave behind is a blueprint for online reactionaries.","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"287 - 303"},"PeriodicalIF":1.3,"publicationDate":"2021-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2021.1919966","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47407427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-29DOI: 10.1080/24701475.2021.1919965
Qian Huang
Abstract The Chinese Internet has developed rapidly in the past decade and given rise to many online phenomena, including digital vigilantism (DV). It refers to citizens’ practice of weaponising online visibility for retaliation when collectively offended. In China, since the Cat Torture Case in 2006, DV has been widely adopted by citizens to defend social norms and values. With recent technological developments and socio-political changes in China, how Chinese citizens conduct DV and its influence have also changed along various dimensions. This research, therefore, identifies the historical changes of DV in China and situates these changes in relation to contemporary Chinese technological and socio-political development. The study constructs a database of 1265 Chinese DV cases that receive media coverage between 2006 to 2018 and conducts a thematic analysis to identify characteristics, changes, and trends of DV in China. The author argues that these developments demonstrate the mediation and more importantly, the mediatisation of justice-seeking on the Chinese Internet conditioned by the ubiquitous state power.
{"title":"The mediated and mediatised justice-seeking: Chinese digital vigilantism from 2006 to 2018","authors":"Qian Huang","doi":"10.1080/24701475.2021.1919965","DOIUrl":"https://doi.org/10.1080/24701475.2021.1919965","url":null,"abstract":"Abstract The Chinese Internet has developed rapidly in the past decade and given rise to many online phenomena, including digital vigilantism (DV). It refers to citizens’ practice of weaponising online visibility for retaliation when collectively offended. In China, since the Cat Torture Case in 2006, DV has been widely adopted by citizens to defend social norms and values. With recent technological developments and socio-political changes in China, how Chinese citizens conduct DV and its influence have also changed along various dimensions. This research, therefore, identifies the historical changes of DV in China and situates these changes in relation to contemporary Chinese technological and socio-political development. The study constructs a database of 1265 Chinese DV cases that receive media coverage between 2006 to 2018 and conducts a thematic analysis to identify characteristics, changes, and trends of DV in China. The author argues that these developments demonstrate the mediation and more importantly, the mediatisation of justice-seeking on the Chinese Internet conditioned by the ubiquitous state power.","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"304 - 322"},"PeriodicalIF":1.3,"publicationDate":"2021-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2021.1919965","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43882785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-05DOI: 10.1080/24701475.2021.1878651
Dan M. Kotliar
{"title":"If Then: How the Simulmatics Corporation Invented the Future","authors":"Dan M. Kotliar","doi":"10.1080/24701475.2021.1878651","DOIUrl":"https://doi.org/10.1080/24701475.2021.1878651","url":null,"abstract":"","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"204 - 206"},"PeriodicalIF":1.3,"publicationDate":"2021-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2021.1878651","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46371611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-22DOI: 10.1080/24701475.2021.1878650
Maria Eriksson, Guillaume Heuguet
Aleksandra Kaminska is an Assistant Professor in the Department of Communication at the Universit e de Montr eal, Canada, where she also co-directs the Artefact Lab and the Bricolab. Her research is based in media studies and aesthetics, and the history of technology. She is currently preparing High-Tech Paper: Security Printing and the Aesthetics of Trust, a monograph that examines the making of authentic paper for circulation in secure systems and infrastructures. She situates security printing within media and printing histories, but also as it intersects with art, craft, and design. Her work on authentication devices includes the production of Nano-verses (nano-verses.com), an art-sci collaboration that explored how the technology of nano-optical authentication can be rethought as artistic media. The articles discussed in the following interview are: “Storing Authenticity at the Surface and into the Depths: Securing Paper with Humanand Machine-Readable Devices” (Interm edialit es, 2018); “‘Don’t Copy That’: Security Printing and the Making of High-Tech Paper” (Convergence, 2019); and “The Intrinsic Value of Valuable Paper: On the Infrastructural Work of Authentication Devices” (Theory, Culture & Society, 2020). She recently co-edited an issue of PUBLIC: Art/Culture/Ideas on “Biometrics: Mediating Bodies” (2020), and is currently finalizing a co-edited volume of the Canadian Journal of Communication on the theme of “Materials and Media of Infrastructure.” In 2020–2021 she is co-organizing the online series Paperology: A Reading and Activity Group on Knowing and Being with Paper. Your work centers on efforts to secure the authenticity and identity of things and highlights how material standards contribute to the ordering of the world. In much of your writings, you place focus on techniques for identifying analog objects such as money and documents/valuable paper but we have also found your work to be highly stimulating for thinking about efforts to identify digital content like moving images and sounds. In “Storing Authenticity at the Surface and into the Depths” you introduce the concept of “authentication devices” to discuss the role and function of identification techniques. Could you explain a bit more about what you mean by this concept and how/ why you think it is useful for thinking about strategies of identification?
Aleksandra Kaminska是加拿大蒙特利尔大学传播系的助理教授,也是Artefact实验室和Bricolab的联合主任。她的研究以媒体研究、美学和技术史为基础。她目前正在编写《高科技论文:安全印刷与信任美学》,这是一本研究在安全系统和基础设施中流通的真实纸张制作的专著。她将安全印刷置于媒体和印刷历史中,但也与艺术、工艺和设计相交叉。她在认证设备方面的工作包括制作Nano-verses.com,这是一项艺术与科学的合作,探索了如何将纳米光学认证技术重新思考为艺术媒介。以下采访中讨论的文章是:“将真实性储存在表面和深处:用人和机器可读设备保护纸张”(Intermedialites,2018);“‘不要复制’:安全印刷与高科技纸张的制作”(Convergence,2019);以及“有价值论文的内在价值:论认证设备的基础设施工作”(理论、文化与社会,2020)。她最近联合编辑了一期《公共:艺术/文化/思想》关于“生物识别:中介机构”(2020)的文章,目前正在敲定《加拿大传播杂志》主题为“基础设施的材料和媒体”的联合编辑卷。2020-2021年,她正联合组织在线系列论文:一个关于认识和与纸相处的阅读和活动小组。你的工作重点是确保事物的真实性和身份,并强调材料标准如何有助于世界的秩序。在你的大部分作品中,你都把重点放在识别类似物体的技术上,如金钱和文件/贵重纸张,但我们也发现你的作品对识别运动图像和声音等数字内容的努力非常有启发性。在“将真实性存储在表面和深度”中,您介绍了“身份验证设备”的概念,以讨论身份验证技术的作用和功能。你能进一步解释一下你所说的这个概念是什么意思,以及你认为它如何/为什么对思考识别策略有用吗?
{"title":"Interview with Aleksandra Kaminska","authors":"Maria Eriksson, Guillaume Heuguet","doi":"10.1080/24701475.2021.1878650","DOIUrl":"https://doi.org/10.1080/24701475.2021.1878650","url":null,"abstract":"Aleksandra Kaminska is an Assistant Professor in the Department of Communication at the Universit e de Montr eal, Canada, where she also co-directs the Artefact Lab and the Bricolab. Her research is based in media studies and aesthetics, and the history of technology. She is currently preparing High-Tech Paper: Security Printing and the Aesthetics of Trust, a monograph that examines the making of authentic paper for circulation in secure systems and infrastructures. She situates security printing within media and printing histories, but also as it intersects with art, craft, and design. Her work on authentication devices includes the production of Nano-verses (nano-verses.com), an art-sci collaboration that explored how the technology of nano-optical authentication can be rethought as artistic media. The articles discussed in the following interview are: “Storing Authenticity at the Surface and into the Depths: Securing Paper with Humanand Machine-Readable Devices” (Interm edialit es, 2018); “‘Don’t Copy That’: Security Printing and the Making of High-Tech Paper” (Convergence, 2019); and “The Intrinsic Value of Valuable Paper: On the Infrastructural Work of Authentication Devices” (Theory, Culture & Society, 2020). She recently co-edited an issue of PUBLIC: Art/Culture/Ideas on “Biometrics: Mediating Bodies” (2020), and is currently finalizing a co-edited volume of the Canadian Journal of Communication on the theme of “Materials and Media of Infrastructure.” In 2020–2021 she is co-organizing the online series Paperology: A Reading and Activity Group on Knowing and Being with Paper. Your work centers on efforts to secure the authenticity and identity of things and highlights how material standards contribute to the ordering of the world. In much of your writings, you place focus on techniques for identifying analog objects such as money and documents/valuable paper but we have also found your work to be highly stimulating for thinking about efforts to identify digital content like moving images and sounds. In “Storing Authenticity at the Surface and into the Depths” you introduce the concept of “authentication devices” to discuss the role and function of identification techniques. Could you explain a bit more about what you mean by this concept and how/ why you think it is useful for thinking about strategies of identification?","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"57 - 70"},"PeriodicalIF":1.3,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2021.1878650","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46486460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-21DOI: 10.1080/24701475.2021.1878649
Maria Eriksson, Guillaume Heuguet
In today’s digital landscape, cultural content such as texts, films, images, and recorded sounds are increasingly subjected to automatic (or semi-automatic) processes of identification and classification. On a daily basis, spam filters scan swaths of emails in order to separate legit and illegitimate textual messages (Brunton, 2013), algorithms analyze years of user-uploaded film on YouTube in search for copyright violations (Heuguet, 2019), and software systems are deployed to scrutinize millions of images on social media sites in order to detect sexually offensive content (Liao, 2018). These examples reveal how machines and algorithmic systems are increasingly utilized to make complex judgments regarding cultural content. Indeed, it could be argued that the wideranging adoption of content identification systems is constructing new ontologies of culture and regimes of truth in the online domain. When put to action, content identification systems are trusted with the ability to separate good/bad and legal/illegal forms of communication and used to secure the singularity, value, authenticity, origin, and ownership of content. Such efforts are deeply embedded in constructions of knowledge, new forms of political governance, and not least global market transactions. Content identification tools now make up an essential part of the online data economy by protecting the interests of rights holders and forwarding the mathematization, objectification, and commodification of cultural productions. Parallel to their increased pervasiveness and influence, however, content identification systems have also been increasingly contested. Debates regarding automatic content identification tools recently gained momentum due to the European Union’s decision to update its copyright laws. A newly adopted EU directive encourages all platform owners to implement automatic content filters to safeguard copyrights (Spangler, 2019) and critics have argued that such measures run the risk of seriously hampering the freedom of speech and stifling cultural expressions online (e.g., Kaye, 2018). A wide range of high profile tech figures (such as Tim Berners Lee, commonly known as one of the founders of the World Wide Web) have even warned that the widespread adoption of pre-emptive content identification systems could effectively destroy the internet as we know it (Cerf et al., 2018). Content identification systems, then, are not neutral devices but key sites where the moral, juridical, economical, and
{"title":"Genealogies of online content identification - an introduction","authors":"Maria Eriksson, Guillaume Heuguet","doi":"10.1080/24701475.2021.1878649","DOIUrl":"https://doi.org/10.1080/24701475.2021.1878649","url":null,"abstract":"In today’s digital landscape, cultural content such as texts, films, images, and recorded sounds are increasingly subjected to automatic (or semi-automatic) processes of identification and classification. On a daily basis, spam filters scan swaths of emails in order to separate legit and illegitimate textual messages (Brunton, 2013), algorithms analyze years of user-uploaded film on YouTube in search for copyright violations (Heuguet, 2019), and software systems are deployed to scrutinize millions of images on social media sites in order to detect sexually offensive content (Liao, 2018). These examples reveal how machines and algorithmic systems are increasingly utilized to make complex judgments regarding cultural content. Indeed, it could be argued that the wideranging adoption of content identification systems is constructing new ontologies of culture and regimes of truth in the online domain. When put to action, content identification systems are trusted with the ability to separate good/bad and legal/illegal forms of communication and used to secure the singularity, value, authenticity, origin, and ownership of content. Such efforts are deeply embedded in constructions of knowledge, new forms of political governance, and not least global market transactions. Content identification tools now make up an essential part of the online data economy by protecting the interests of rights holders and forwarding the mathematization, objectification, and commodification of cultural productions. Parallel to their increased pervasiveness and influence, however, content identification systems have also been increasingly contested. Debates regarding automatic content identification tools recently gained momentum due to the European Union’s decision to update its copyright laws. A newly adopted EU directive encourages all platform owners to implement automatic content filters to safeguard copyrights (Spangler, 2019) and critics have argued that such measures run the risk of seriously hampering the freedom of speech and stifling cultural expressions online (e.g., Kaye, 2018). A wide range of high profile tech figures (such as Tim Berners Lee, commonly known as one of the founders of the World Wide Web) have even warned that the widespread adoption of pre-emptive content identification systems could effectively destroy the internet as we know it (Cerf et al., 2018). Content identification systems, then, are not neutral devices but key sites where the moral, juridical, economical, and","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"1 - 7"},"PeriodicalIF":1.3,"publicationDate":"2021-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2021.1878649","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49367129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-06DOI: 10.1080/24701475.2020.1864959
Paško Bilić, Toni Prug
Abstract Internet history shows that states, military, universities and other public institutions were essential drivers of innovation in the early stages of network development. However, once risky stages pass, commercialisation starts and investors often reap disproportionate rewards from technological innovation. In this paper, we use the risk-reward nexus (RRN) approach (Lazonick & Mazzucato, 2013; Mazzucato, 2013, 2018; Mazzucato & Shipman, 2014) to understand the imbalance between risky public investment and private allocation of rewards regulated by financial markets. We analyse risk reporting in Form 10-K market reports submitted to the Securities and Exchange Commission (SEC) by Google Inc. (Alphabet Inc.) for the period between 2005 and 2019. We detected 58 organisational, marketing and advertising, technological, legal, competitive, and macroeconomic risks. Based on changes in risk reporting three stages of Google’s development can be discerned: post-IPO growth and expansion (2005-2008), growth management and investment diversification (2009-2013), legal struggles and regulatory scrutiny (2014-2019). Reported risks are primarily directed at shareholders, omitting risks relating to internet users, courts, regulators, and nation states. Such an approach is historically rooted in the construction of financial regulation in the name of public interests and markets, with public interests largely interpreted as a proxy for investors’ interests.
{"title":"Google’s Post-IPO Development: risks, rewards, and shareholder value","authors":"Paško Bilić, Toni Prug","doi":"10.1080/24701475.2020.1864959","DOIUrl":"https://doi.org/10.1080/24701475.2020.1864959","url":null,"abstract":"Abstract Internet history shows that states, military, universities and other public institutions were essential drivers of innovation in the early stages of network development. However, once risky stages pass, commercialisation starts and investors often reap disproportionate rewards from technological innovation. In this paper, we use the risk-reward nexus (RRN) approach (Lazonick & Mazzucato, 2013; Mazzucato, 2013, 2018; Mazzucato & Shipman, 2014) to understand the imbalance between risky public investment and private allocation of rewards regulated by financial markets. We analyse risk reporting in Form 10-K market reports submitted to the Securities and Exchange Commission (SEC) by Google Inc. (Alphabet Inc.) for the period between 2005 and 2019. We detected 58 organisational, marketing and advertising, technological, legal, competitive, and macroeconomic risks. Based on changes in risk reporting three stages of Google’s development can be discerned: post-IPO growth and expansion (2005-2008), growth management and investment diversification (2009-2013), legal struggles and regulatory scrutiny (2014-2019). Reported risks are primarily directed at shareholders, omitting risks relating to internet users, courts, regulators, and nation states. Such an approach is historically rooted in the construction of financial regulation in the name of public interests and markets, with public interests largely interpreted as a proxy for investors’ interests.","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"171 - 189"},"PeriodicalIF":1.3,"publicationDate":"2021-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2020.1864959","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48728738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-14DOI: 10.1080/24701475.2020.1862528
W. Ernst
Abstract While automatized content identification of audio data, in critical discourse analysis, is bound to the symbolic order of monitoring, control, surveillance, censorship and copyright protection, the very tools and algorithms which have been developed for such purposes can be turned into instruments of knowledge production in the scientific sense. Audio content identification is not simply an extension of cultural taxonomies to machine listening, but an operation with its own eigen knowledge. Audio content identification is not simply a continuation of analog techniques for monitoring sonic objects. From a media-epistemological perspective, new forms of audio content identification open different orders of the sonic archive. What is practiced in the online domain has been preceded by experimental investigations of archival storage. The real l'archive, though, are the technological (hardware) and mathematical (software) criteria defining content identification. A media archaeology of audio content identification reveals the technological l'archive governing such forms of enunciation.
{"title":"The media epistemic value of sonic analytics tools. A commentary","authors":"W. Ernst","doi":"10.1080/24701475.2020.1862528","DOIUrl":"https://doi.org/10.1080/24701475.2020.1862528","url":null,"abstract":"Abstract While automatized content identification of audio data, in critical discourse analysis, is bound to the symbolic order of monitoring, control, surveillance, censorship and copyright protection, the very tools and algorithms which have been developed for such purposes can be turned into instruments of knowledge production in the scientific sense. Audio content identification is not simply an extension of cultural taxonomies to machine listening, but an operation with its own eigen knowledge. Audio content identification is not simply a continuation of analog techniques for monitoring sonic objects. From a media-epistemological perspective, new forms of audio content identification open different orders of the sonic archive. What is practiced in the online domain has been preceded by experimental investigations of archival storage. The real l'archive, though, are the technological (hardware) and mathematical (software) criteria defining content identification. A media archaeology of audio content identification reveals the technological l'archive governing such forms of enunciation.","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"48 - 56"},"PeriodicalIF":1.3,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2020.1862528","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41595063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-02DOI: 10.1080/24701475.2020.1831197
B. Justie
Abstract This article traces the early history of CAPTCHA, the now ubiquitous cybersecurity tool that prompts users to “confirm their humanity” by solving word- and image-based puzzles before accessing free online services. CAPTCHA, and its many derivatives, are presented as content identification mechanisms: the user is asked to identify content in order for the computer to determine the identity of the user. This twofold process of content identification, however, has evolved significantly since CAPTCHA’s inception in the late 1990s. Pivoting away from a realist framework, largely dependent on the standard tenets [of] cryptography, toward a relational framework premised on aesthetic contingency and social consensus, CAPTCHA’s arc uniquely illustrates how contested notions of both “content” and “identity” become materialized in contemporary internet infrastructure. Inspired by Walter Benjamin’s exegetical study of early photography, this critical historicization aims to foreground CAPTCHA as a particularly fraught juncture of humans and computers, which, as with Benjamin’s intervention, productively troubles received ideas of humanism and automation, mediation and materiality.
{"title":"Little history of CAPTCHA","authors":"B. Justie","doi":"10.1080/24701475.2020.1831197","DOIUrl":"https://doi.org/10.1080/24701475.2020.1831197","url":null,"abstract":"Abstract This article traces the early history of CAPTCHA, the now ubiquitous cybersecurity tool that prompts users to “confirm their humanity” by solving word- and image-based puzzles before accessing free online services. CAPTCHA, and its many derivatives, are presented as content identification mechanisms: the user is asked to identify content in order for the computer to determine the identity of the user. This twofold process of content identification, however, has evolved significantly since CAPTCHA’s inception in the late 1990s. Pivoting away from a realist framework, largely dependent on the standard tenets [of] cryptography, toward a relational framework premised on aesthetic contingency and social consensus, CAPTCHA’s arc uniquely illustrates how contested notions of both “content” and “identity” become materialized in contemporary internet infrastructure. Inspired by Walter Benjamin’s exegetical study of early photography, this critical historicization aims to foreground CAPTCHA as a particularly fraught juncture of humans and computers, which, as with Benjamin’s intervention, productively troubles received ideas of humanism and automation, mediation and materiality.","PeriodicalId":52252,"journal":{"name":"Internet Histories","volume":"5 1","pages":"30 - 47"},"PeriodicalIF":1.3,"publicationDate":"2020-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24701475.2020.1831197","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"60126662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}