DIAGNOSING VULNERABILITY, EMERGENT PHENOMENA, and VOLATILITY in MANMADE NETWORKS
Networks of Care & Vulnerability
-
Upload
bonnie-stewart -
Category
Education
-
view
2.870 -
download
3
description
Transcript of Networks of Care & Vulnerability
![Page 1: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/1.jpg)
NETWORKED IDENTITY: Networks of Care & Vulnerability !
!!!!!!!
Bonnie Stewart
University of Prince Edward Island
![Page 2: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/2.jpg)
![Page 3: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/3.jpg)
What do you want to be when you grow up?
h"p://www.flickr.com/photos/1nker-‐tailor/8378048032/
![Page 4: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/4.jpg)
Wrong question.
!
![Page 5: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/5.jpg)
What do you want to contribute?
![Page 6: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/6.jpg)
![Page 7: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/7.jpg)
![Page 8: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/8.jpg)
Twitter = currently the most open network
![Page 9: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/9.jpg)
Networked identities differ from roles
![Page 10: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/10.jpg)
Always Multiple
http://www.flickr.com/photos/thuanygabriela/4754591985/
![Page 11: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/11.jpg)
Always Hybrid
![Page 12: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/12.jpg)
Always Connected
![Page 13: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/13.jpg)
What are those connections made of?
SIGNALS
![Page 14: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/14.jpg)
http://www.flickr.com/photos/tmesis/21126825/
Social networks are made of people. And signals.
![Page 15: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/15.jpg)
Digital Communication Signals
• Persistant – automatically recorded & archived
• Replicable – can be duplicated with minimal cost & effort
• Scalable – can be amplified & go viral
• Searchable – automatically tagged with metadata - boyd (2010)
![Page 16: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/16.jpg)
Vulnerabilities in how signals are shared
![Page 17: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/17.jpg)
Context Collapse
…that awkward moment when you remember you friended your grandma on Facebook.
Or that your students – or your VP, or your new boss – follow you on Twitter.
![Page 18: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/18.jpg)
Quantified self
![Page 19: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/19.jpg)
“The internet is on principle a system that you reveal yourself to in order to fully
enjoy, which differentiates it from, say, a music player. It is a TV that watches you.”
- Edward Snowden, in The Washington Post
![Page 20: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/20.jpg)
Identity theft
![Page 21: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/21.jpg)
(+ teasing from friends)
![Page 22: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/22.jpg)
Vulnerabilities in how signals are heard
![Page 23: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/23.jpg)
![Page 24: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/24.jpg)
![Page 25: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/25.jpg)
Technical + societal vulnerabilities + scale =
BOOM
h"p://www.flickr.com/photos/rowan72/8672846415/
![Page 26: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/26.jpg)
“You’re doing it wrong”
![Page 27: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/27.jpg)
“The more dangerous social-web-fueled gamification of trolling is the unofficial troll/
hate leader-board. The attacks on you are often less about scoring points
against you than that they’re trying to out-do one another. They’re trying to
out-troll, out-hate, out-awful the other trolls.”
- Sierra (2014)
“You do not deserve attention”
![Page 28: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/28.jpg)
“You do not deserve to live”
![Page 29: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/29.jpg)
Platforms default to powerful voices
![Page 30: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/30.jpg)
So, just stay home and hide?
![Page 31: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/31.jpg)
![Page 32: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/32.jpg)
Digital signals are basic communications, in our time.
![Page 33: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/33.jpg)
‘He said, "I'm going to give you the same advice that I give to everyone else with this problem: Stop
using social media and get rid of your computer.”
Nicole replied that she wasn't the one who had a problem with the computer—it was Adam who had
that problem.’
- Beaumont (2014)
![Page 34: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/34.jpg)
Resistance requires reconceptualization
![Page 35: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/35.jpg)
Networked Identities l Aware of being
watched
l Aware of scale of attention
l Build identity by repetition
l Build ties by visible communications
![Page 36: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/36.jpg)
h"p://www.flickr.com/photos/cambodia4kidsorg/10728008326
Networks of Care
![Page 37: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/37.jpg)
Hyperpersonal communications
Communications via limited-cues channels allows selective self-presentation and
increased sense of commonality without the interference of non-verbal cues, limited
cognitive resources, or temporal constraints.
![Page 38: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/38.jpg)
Professional value
![Page 39: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/39.jpg)
Learning value
![Page 40: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/40.jpg)
Teaching value
![Page 41: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/41.jpg)
Immersion value
![Page 42: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/42.jpg)
Accountability value
![Page 43: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/43.jpg)
Support value
![Page 44: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/44.jpg)
Connection value
![Page 45: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/45.jpg)
Recognition value
![Page 46: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/46.jpg)
Visibility value
![Page 47: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/47.jpg)
Caring value
![Page 48: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/48.jpg)
![Page 49: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/49.jpg)
![Page 50: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/50.jpg)
Two sides of the attention economy
“The attention economy…isn't just about clicks and eyeballs, but also about the
ways in which we selectively tend towards each other, and tend each other's thoughts -- it's an economy of care, not just a map to
markets.”
- Bowles (2014)
![Page 51: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/51.jpg)
![Page 52: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/52.jpg)
A way to contribute and speak back
![Page 53: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/53.jpg)
Networked contributions > individual
![Page 54: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/54.jpg)
Be the signal you want to see in the world
![Page 55: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/55.jpg)
• Signal intentionally • Signal to build up others, not just
yourself • Signal broadly • Signal patiently
• Signal what you want to contribute
![Page 56: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/56.jpg)
Understanding networked identity signals = key literacy for
21st century citizens.
![Page 57: Networks of Care & Vulnerability](https://reader034.fdocuments.us/reader034/viewer/2022042715/557d58a3d8b42ae1438b4849/html5/thumbnails/57.jpg)