logo
EverydayChaos
Everyday Chaos
Too Big to Know
Too Big to Know
Cluetrain 10th Anniversary edition
Cluetrain 10th Anniversary
Everything Is Miscellaneous
Everything Is Miscellaneous
Small Pieces cover
Small Pieces Loosely Joined
Cluetrain cover
Cluetrain Manifesto
My face
Speaker info
Who am I? (Blog Disclosure Form) Copy this link as RSS address Atom Feed

February 5, 2009

Good news coming on national CTO?

The National Journal says that Obama has picked Vivek Kundra, DC’s CTO, to fill the national post. This would be fantastic news. Vivek is all about transparency.

It’s just a rumor. But it’s a rumor that makes me happy.

[Tags: national_cto vivek_kundra obama transparency e-gov egov e-government ]

Tweet
Follow me

Categories: Uncategorized Tagged with: digital culture • digital rights • e-gov • e-government • egov • obama • policy • transparency Date: February 5th, 2009 dw

Be the first to comment »

February 4, 2009

I for one welcome our new Berkman overlord

Urs Gasser has officially been announced as the new executive director of the Berkman Center.

This is excellent news. Urs has been a fellow at the Center, as well as the head of an Internet research center in Switzerland. There’s thus no period of wondering if he shares our values, what do we think of him, etc. We know his, values and many of us have already had the pleasure of working with him and learning from him. Urs, in a word or two, is completely at home in the Berkman’s admirable ethos of smarts and kindness. I’m very, very happy that Urs has taken up this role. [Disclosure: Yes, Urs is in some sense my boss. But that’s not really how the Center runs.]

Urs steps into the Bunyon-esque shows left by John Palfrey, who remains a faculty co-director but is now Vice Dean of Library and Information Resources at Harvard Law. Colin Maclay, managing director of the Center — so smart, so kind — served in the interregnum.

You can hear an interview with Urs (by, um, me) as part of the continuing Radio Berkman podcast series…

[Tags: berkman urs_gasser ]

Tweet
Follow me

Categories: misc Tagged with: berkman • misc Date: February 4th, 2009 dw

Be the first to comment »

Daily [intermittent] Open-Ended Puzzle (DOEP): Fill in the filesharer

In a conversation with Gene Koo, a mishearing turned into a pun minus one term. I twittered a request for people to fill in the following blank:

Turning _____ into filesharers.

Unfortunately, I added that the blank should rhyme with “plows” instead of “swords” because I made a mistake. Here are some of the tweets I received:

fanf: the copyright lobby want to shove swords into filesharers

cfigallo: Beating hoarders into filesharers

digiphile: “Beating Boards into filesharers”?

davidgammel: How about ‘Beating Cabinet Appointees into Tax Filers’?

winemad: hordes?

dhmspector: “Lawyers” … obviously.

You are encouraged to best the Twitterers.

[Tags: puzzles filesharing doep ]

Tweet
Follow me

Categories: Uncategorized Tagged with: digital culture • doep • filesharing • puzzles Date: February 4th, 2009 dw

4 Comments »

February 3, 2009

Google declares itself world menace

Wendy Seltzer has a screen capture that proves that Google is harmful to the Internet.

This is a reference to the 40-minute Google outage a couple of days ago. More about StopBadware here. And here’s an example of a site Google lists as malware.

[Tags: google stopbadware ]

Tweet
Follow me

Categories: misc Tagged with: google • misc • stopbadware Date: February 3rd, 2009 dw

1 Comment »

[berkman] Internet Safety Technical Task Force

danah boyd, John Palfrey, and Dena Sacco, three co-authors of the recent Internet Safety Technical Task Force are giving a Berkman lunch. (Laura Debonis, chair of the technical advisory board, steps in a minute late because of the snow.) (You can hear a podcast with JP and here. You can read the report here.) [Note: I’m liveblogging, whch means I’m getting things wrong, putting in typos, missing stuff, abbreviating, paraphrasing, getting meanings backwards, etc. Posted un-proofed]

JP gives the background. The ISTTF was created in Feb. 2008 by 49 state attorneys general (not Texas) and MySpace who, in a joint statement, agreed to report on the extent of unwanted contact and content (i.e., sexual predation and porn) among young folk, initially focusing on social networking sites. Thirty organizations were involved, ncluding social networking sites, Google, Microsoft, policy groups, and companies that make technology to protect kids. There was a research advisory board (chaired by danah) to make this a data-driven process. The aim of the Task Force was to assess the actual data, and then evaluate solutions. The technical advisory board advised on solutions.

dr. danah: The task force collected research. Sexual predation has been tracked over the years. “The number of online predation pale compared to the numbers for off line sexual harm.” That doesn’t negate it, but the harm is rarely stranger-related. The studies looked at studies of sexual solicitation online and of studies of cases in which someone was arrested. Most messages are not repeated, and the most common response is that the kid’s ignore it. The repeated ones are, of course, more likely to be reported. There are very few number of cases where online solicitation leads to offline contact. (This is about all Internet activity, danah says, not just SNS (social networking site/s).) Sexual solicitation has gone down over the years. It’s primarily high school age. They primarily know that they’re meeting up with someone for sexual purposes. 70% repeat the meet. “This is not the Dateline model.” The kids know what they’re doing, although “huge power issues are at play” of course. The published material says that the online chat rooms are far more likely to be connected with these cases. The SNS are much less likely. Of the kids who received sexual solicitations (one-off or repeated), what are the factors at play? The kids who are at risk are not representative of the entire population. “They’re much more likely to be at risk off line”: more likely to have been sexually abused, to have drug and alcohol issues. The online and offline behavior are closely connected.

JP: Some people disagree very strongly with what you’ve said. Some of the AGs who commissioned think our report downplays the danger and is outdated. If you create a profile page for a 14 year old girl, the AGs say you’re bombarded with sexual solicitations immediately.

danah: The research we’ve tracked goes all the way up through the Fall of 2008. Very consistent pattern. To confirm that the pattern is continuing, I called up the researchers and asked them to check their latest data sets, but they see consistent patterns.

danah: The AGs say the arrest record data is different, but they haven’t provided that data. We are publicly begging for that data. One researcher looked at all the press releases about arrests in PA, and called up PA reporting systems for sexual harm. Even in the 2008 data for PA, almost all of the cases of arrests are for when a police officer pretends to be a youngster, in a sting. Most are chat room and IM. There were three on SNS, and all fit the pattern of an older teen meeting up and thinking she’s in a relationship. WRT stings: If you go one line as a 12 yr old and put up naked photos and ask for sex, you will be solicited. But kids aren’t doing that. They’re at SNS to talk with their friends, not to the creeps. Again, you still have to worry about the exceptions. And if a 12 yr old puts up a page to attract older men, those kids desperately need our help. But if we assume that’s typical, you miss the kids who must need our help.

JP: What are the relative risks of predation and peer-to-peer (= bullying)?

danah: Almost half of sexual solicitation comes from other minors. 30-40% come from 18-24 year olds. There’s bullying wrapped up with sexual solicitation. There are various definitions of bullying, so you get radically different numbers in the research. Regardless of the definition, far more are victims of it online than are victims of sexual solicitation. There are lots of ramifications of bullying. For an average, you should be much more concerned about peer-to-peer sexual solicitation in the schools and p2p bullying. The sexual solicitation needs to involve police, social workers, etc. Parents are the best intervention point for bullying.

danah: Content solicitation hasn’t changed much. Porn numbers are relatively consistent. The primary unwanted exposures are searching for the wrong thing and email spam; SNS don’t seem to be a primary source. Violent content is well under-researched. We’re beginning to see youth-generated problematic content; a lot more work needs to be done on this. E.g., photos of self-harm (cutting, etc.), homemade porn, etc.

JP: Laura, are there technologies we should be using?

Laura: All 40 of the techs we looked at had something to recommend them, but none were 100% accurate all of the time. There were also privacy and security issues. MySpace uses Sentinel age verification. Parents use net nanny tech with reasonable degrees of success. But our mandate was to find the tech that could be used across the board, and we couldn’t find one.

JP: The SNS told us what tech they’re currently using. So now we have a sense of who’s using what. There’s promise in what’s coming out of labs.

Dena: The Task Force made a series of recommendations, for the Internet community, for parents, and where additional researches might be best spent. Overall, our recommendation was that while the tech we reviewed is promising, the AGs should not endorse any one tech or set of techs. Such an endorsement could inhibit development in this area. Also, we need more research: more resources, more data from law enforcement. Also, ISPs, AGs, academics, educators, social services, law enforcement etc., all should continue to collaborate on this problem. Also, education is important! The report includes specific recommendations.

Dena: How do you lower the risk while keeping the Net open and anonymous?

Q: [gene] The risk is context dependent. Maybe the AGs think it’s riskier because the risks are higher for those who are at risk. The damage may be higher…
A: [dana] The Internet makes access to the social world more pervasive. It’s not clear the Net has made such a strong impact, but it makes at risk kids more visible to those who can help them…more visible to educators, law enforcement, social workers. Before the Net, a lot of parents couldn’t see their kids being bullied. Now they can see some of the ramifications of it.

Q: Do you think that’s why your research is being attacked?
A: [danah] When I interviewed teenagers about predators, they’d point to Dateline. There’s consensus on these images. “On the Death of the Public Space” makes the case that we’ve begun to fear public spaces. There are also some political issues behind this.
JP: Of all the things I’ve done as a researcher, this was the meanest. So, danah, let’s say you’re right that we have burned into our minds a higher degree of risk, maybe that’s ok. Maybe we should have a higher degree of caution. What’s wrong with the fears being overblown if it keeps our kids away from harm?
danah: Looking kids away from risks does them a disservice. We need to educate them so they can make wise decisions. We also rupture trust: Kids are being hemmed in but don’t see the problems they’re parents are referring to. Also, this has been about a hierarchical dissemination, rather than parents reaching out to kids whose parents are not looking out for them. We need to work collectively, not just assume hierarchically delivered services.

[Eszter Hargittai] I too get frustrated by those who say the data must have changed. Things generally don’t change that quickly.
JP: The primary pushback from AGs is that they’ve put pup profiles and have been immediately solicited.
Eszter: How American is this? The fear? The response? How might other countries be dealing with these issues?
danah: We focused on the US but we did look out at the world. We also showed the research to researchers outside of US. The UK has similar dynamics. Europe does not. In part this is because kids’ mobility is different. The further you get out from the US and UK, the more meeting people online is acceptable and not tainted with risk. It’s assumed to be how you meed people with shared interests. And it doesn’t raise the numbers of sexual harm.
JP: There are studies in Canada and the UK and a EU Commission process. There’s great consistency across these reports.

Q: [sarah] I work with groups dealing with domestic violence. Research in that field shows that the vast majority of abuse comes from people in the home. Perhaps people object to your report because they find it more comfortable to think that abuse comes from people outside the family? Also, what contradiction between profiles and arrest records were you referring to?
A: [danah] The arrest record for online-related sex crimes shows the abuser and the victim. One scary thing we’ve seen: Family members targeting others over the Net so other family members won’t know it.

[scott macleod, via net] What do kids say they want for protection?
A: [danah] The most common thing you hear from them is what they hear from parents and teachers. So they’ll you the way to be safe is not to put up identifying info and to report other kids. Doesn’t mean they do it. Classic statement: “Just don’t be stupid.” WRT to bullying they don’t always identify it as bullying.
[dena] There’s an org that has kids present to kids.

Q: A lawyer’s question: To protect rights, isn’t it the parent’s job, not the government’s, to take care of what their kids do and see online.
A: [jp] The Communications Decency Act only affects content. In Born Digital, we say Section 230 should be amended. It provides immunity to intermediaries. It’s very important in the defamation space. It’s been interpreted as extending far beyond its intention so that “Julie Doe” was unable to sue MySpace after she was hurt by a sexual predator. MySpace probably wasn’t liable in that case, but they should have had to face the music. This is a very unpopular position. [I’ll say!] You could also mandate tech, such as age verification, and the fact that the report doesn’t say that might account for some of the resistance. Changing 230 would give sites an incentive to compete on safety.

Q: Privately funded report? And could you recommend a standard any hypothetical tech would have to meet?
JP: I wasn’t paid a penny to write this. This was on top of my job. My only incentive was to protect my children. WRT standards: I think the next best step would be for the companies to talk about standards, about data sharing. There should be ap ublished best practices for protecting kids in different environments.

In Brazil the public defense people ask the ISPs to comply with best practices. Parallel, we just changed the law to put a lot of responsibility on the ISPs, e.g., data retention. Are there emerging best practices?
A: [dena] People have said that the report says there’s no problem and we oughtn’t do anything. That’s backwards. The report says what the risks are and suggests what we ought to do. [Tags: berkman isttf sexual_predation child_safety bullying anonymity ]

Tweet
Follow me

Categories: Uncategorized Tagged with: anonymity • berkman • bullying • digital culture • digital rights • isttf Date: February 3rd, 2009 dw

3 Comments »

February 2, 2009

The gun markets of Pakistan

Here’s a 7 min travelogue of a trip to a gun market in the Khyber Pass. It does make you wonder if there’s a solution that doesn’t require outgunning ’em.

[Tags: pakistan agfhanistan guns ]

Tweet
Follow me

Categories: Uncategorized Tagged with: agfhanistan • guns • pakistan • peace Date: February 2nd, 2009 dw

2 Comments »

GrowUpDaddy

I wish I used Godaddy.com so I could switch my sites off of it. Last night’s Superbowl ads weren’t “edgy” or “irreverent.” They were sexist.

KD Paine posts about twittering for alternatives in real time.

If you want to see what the twitterverse thought of the ad as it unspooled, check this time-constrained search at twitter.

The ads apparently get GoDaddy new users. But:

1. We don’t know how many more new users GoDaddy would get if they ran better ads that didn’t write off at least half of their market

2. Low-cost providers ought to worry about making their customers embarrassed to admit that they’re customers. How much squirming will customers with little loyalty take?

3. GoDaddy is hurting our daughters, and making our world worse. So, screw ’em.

[Tags: godaddy superbowl superbowl_ads cluetrain ]

Tweet
Follow me

Categories: Uncategorized Tagged with: cluetrain • godaddy • marketing • superbowl Date: February 2nd, 2009 dw

4 Comments »

February 1, 2009

Isenberg enacts his freedom to disconnect and Freedom to Connect

David Isenberg, exercising his freedom to disconnect, has posted photos from his trip to Antarctica here, here, and here.

Meanwhile, there’s still time to sign up for David’s Freedom to Connect conference, March 30-31, in Silver Spring MD (a subway ride from DC). It’s a terrific get-together and learning-fest for those who think that pervasive access to an open Internet is important and do-able. It attracts a whole bunch of the do-ers. I try not to miss it.

[Tags: antarctica david_isenberg isen freedom_to_connect net_neutrality broadband ]

Tweet
Follow me

Categories: Uncategorized Tagged with: antarctica • broadband • conference coverage • isen • net neutrality • policy • travel Date: February 1st, 2009 dw

Be the first to comment »

Yochai Benkler on the broadband stimulus

Yochai Benkler, who wrote the seminal book on the new collaborative economics (and of course posted it for free), and is also a Harvard Law professor and holder of the Berkman Chair at the Berkman Center (and is also one of the sweetest people ever) … I got lost in my benkleration, so let’s just start again …

Yochai Benkler has posted at Talking Points Memo his analysis of the Senate and House versions of the stimulus package for broadband. (Thanks for the link to David Isenberg, who provides his own, usual insightful analysis.)

[Tags: yochai_benkler berkman broadband stimulus net_neutrality david_isenberg ]

Tweet
Follow me

Categories: Uncategorized Tagged with: berkman • broadband • digital rights • net neutrality • policy • stimulus Date: February 1st, 2009 dw

1 Comment »

« Previous Page


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
TL;DR: Share this post freely, but attribute it to me (name (David Weinberger) and link to it), and don't use it commercially without my permission.

Joho the Blog uses WordPress blogging software.
Thank you, WordPress!