- Announcing the Omni project!
- Give us your examples: How did we do X before Y?
- How did we do X before Y?
- Tech relationship similes
- Adrian Hon: Illustrate a better future
- And then there were themes: Secondary research results
- the Omni project welcomes Kristine Ng
- Stories behind the themes: Personal Exposure
- Stories behind the themes: Relational Connections
- Stories behind the themes: Transformation
- Stories behind the themes: Biological
- Stories behind the themes: Wonderland
- Molly Wright Steenson: Shifting time
- Omni Quickies
- Julian Bleecker: Creating Wily Subversions
- Lucy Kimbell: Expanding the visible and sayable
- Nicolas Nova: Scanning for signals
- Omni Quickies
- From Us, To Steve: The techno present
We recently shared some of the themes emerging from our secondary research for the Omni project. In lieu of a bibliographic deluge, over the next few days we are offering up a sprinkling of the articles, art, commentaries, presentations and other miscellany that contributed to the pool from which our themes were drawn. You will likely find (as we have) that many of these items are illustrative of more than one theme.
First up is the theme of personal exposure and how technology is impacting our identities and behavior. Our participation involves a sacrifice of personal autonomy and control as various technologies require us to respond, reply, reveal, disclose, like, comment, protect, sign-in, sign up, secure, backup, manage, mitigate, translate and aggregate. We are making new choices about old behaviors and developing new rituals to replace outdated interfaces. The boundaries are blurring between private and public, at the same time we have more options than ever before for qualifying and segregating all of the different “I”s that we wish to be, depending on the context. Within this theme we are seeing the topics of identity, trust, consumption, production, control, privacy, regulation, and the facts and myths that capture (and perpetuate) it all.
Tiger Moms and Digital Media [psychologytoday.com] - A psychotherapist who specializes in Internet and video game addiction offers 9 guidelines for raising children who have “a healthy relationship to digital media.” This starts to point at issues of control and autonomy within families and raises questions about the role of the parent (and technology) in childhood development.
For reasons I cannot explain, I saw the approaching flood, when internet addiction was only a trickle. Now, that flood is upon us. Statistics tell us that between 6 and 13% of the general population meets criteria for Internet Addiction. In the college age population, that number stands between 13 and 19%! That’s a lot of young adults who are addicted to digital technology. In S. Korea and China, the problem is growing so rapidly that those governments have declared Internet Addiction to be their #1 public health threat. Think about it.
Internet Privacy: Is it overrated? [fortune.com] - A book review of “How Sharing in the Digital Age Improves the Way We Work and Live” by Jeff Jarvis that dives into the challenges of defining the messy term ‘privacy’ and the even messier obstacles associated with information sharing, regulation, and ‘publicness’. Starting to unpack the tangled web of identity and privacy, including expectations of control that accompany acts of exposure.
Facebook founder Mark Zuckerberg has tried to recast the desire for privacy as a desire for control over our digital identities. He argues that people want to share information, but we want to determine who gets to see and use it. Jarvis says this definition is too tidy. Privacy is much messier. We live in relationship with other people, after all. How do we even define what qualifies as our own information? If I share information that implicates you, who gets to control that? …. His book is not so much a rallying cry for tweeting your breakfast choices and blogging your company financials as it is a field guide for how to navigate this new technology with optimism rather than fear.
Where an Internet Joke Is Not Just a Joke [nytimes.com] – In light of increasing numbers of detained internet artists and government critics in China, a discussion of censorship and egao (“mischeivous mockery”) that is employed by many to subvert the internet patrols. Example of governmental control and how it is responded to (i.e. averted) through subversive collective channels. Challenges assumptions of exposure as a privilege rather than a right and describes some consequences for individual identity in that scuffle.
No government in the world pours more resources into patrolling the Web than China’s, tracking down unwanted content and supposed miscreants among the online population of 500 million with an army of more than 50,000 censors and vast networks of advanced filtering software. Yet despite these restrictions — or precisely because of them — the Internet is flourishing as the wittiest space in China. “Censorship warps us in many ways, but it is also the mother of creativity,” says Hu Yong, an Internet expert and associate professor at Peking University. “It forces people to invent indirect ways to get their meaning across, and humor works as a natural form of encryption.”
Russian ATM can detect when users are lying [springwise.com] – Depictions of technology can create distorted views of the future and the present; the notion is that this technology exists but it’s in the lab and it may never make it to the market in a reliable consumable form. The mere suggestion of its potential existence raises a number of questions about current practices involving consumer data. How does disclosure of possible futures impact individual understandings of who we are and how our information is managed, regulated and protected from fraudulent misappropriation?
Though the new ATM design is still in the prototype stages, Sberbank plans to install such machines in malls and bank branches around the country, the NYT reports. Financial institutions elsewhere in the world: time to think about introducing something similar?
My Emergency Contact Information [mcsweeneys.net] – Delicious little piece on how to contact someone in the event of an emergency. It’s fantatsically and unnecessarily complex with hints on how to guess neighbor’s wifi passwords. Unravels the many ways we have learned to be protected, (dis)connected and affected (by easily consumable disasters around the globe).
First, if possible, try me on my cell phone. You should all have the number. I’d really prefer an emergency text message instead of a phone call, especially if the incidenct occurs before 8:00 p.m. on a weekday. Also, I don’t have a data plan, so please do not text images, regardless of the scale of devastation. Instead, Tweet or post pictures to your Flickr or Instagram photostreams and I will download or view them later, when I pass through a hotspot. Don’t forget to geo-tag them so I can determine your location.