Week 5 Discussion

Summaries: I. II. Boyd argues that the life stages of a human are not simply biological but are also implications of society on a social level. Boyd discusses how throughout each of our four life stages, we have a series of wants and needs in a certain order that we maintain throughout that stage. Boyd goes into detail about how technology has become a part of each life stage and is soaking itself into our society in not a pure negative or positive way. Boyd wraps up the argument by stating that with the evident increase in media and technology, we must be aware as the creators to focus on the good but to consider the bad and ugly.

The internet was started with very utopian ideas. It was supposed to be an equalizer and bring even corporate power to the same level. This unrealistic and, as can be observed now, view came from a number of places. Cyberculture scholars examined history to find that this brought about the hacker culture. While some may think that this culture lives and acts with no patter or sense of rules, the readings suggest otherwise. The theory is that hackers go by what is referred to as “hacker ethics”. Different hackers react accordingly to the dilemmas that they face. This reading therefore concludes that, that those who came to the event were only one part of the hacker culture. While the hackers who attended were unable to agree, it is still important to continue to look at cyberlibertarianism and cyberculture as a whole.

Discussion Questions: Article I. 1. What were your preconceived notions about hackers? a. Does your perception of hackers still remain the same after reading Turner’s essay? 2. How do you think cyber culture has developed society? What are some examples? 3. What correlations are there between culture and cyber ideology? 4. What are you thoughts on cyberlibertarianism? 5. Do you agree with Turner’s assessment that hackers are cultural rebels? Why? II. 1.  How do we keep corporate technological advances from disrupting the “magic” of people? 2.  What are possible consequences of the monetization of technology? 3.  How will technological advances change future generations? Main Ideas: Article I.

  •  Connect online activity and the Internet’s ideological effects
  1. 2 dominant approaches to explain the rise of digital libertarianism
  • New technology always encouraged utopian hopes
  • Internet/web ≠ the first revolutionary technology
  • Emerging virtual class
  • Social groups are turning networks into a system of ideals that represent other symbols
  1. One must backtrack to identify social work
  2. What caused digital technology and libertarian political ideals to join?
  3. Trace beginnings by finding integration of technology and social/cultural transformation
  • Hackers’ Conference
  1. 1980s hackers seen as antisocial, potential criminals
  2. Mid 1990s hackers seen as “liberated information workers”
  3. Changed from deviant to genius
  4. Hackers’ personality
  •  Being a hacker = valuable (something everyone agreed on)
  • “Don’t avoid the word ‘hackers.’ Don’t let somebody else define you. No apologies: we’re hackers. We define what a hacker is…nobody else.” Lee Felsenstein
  •  Result: no agreement on an approach to handle the challengers of the software industry
  • Steven Levy author of Hackers: Heroes of the Computer Revolution
  1. Generations of innovators
  2. Levy believed all generations shared 6 values = Hacker Ethic
  • Common themes
  1. Definition of Hacker Ethic
  2.  Description of emerging business forms in the computer industry
  •  Economic paradox, Stewart Brand
  1.  Information is expensive because of its value
  2.  Information is free because the actual cost is decreasing all the time
  3.  Most agreed that free information is idea, but only an idea
  • Conclusion
  1.  “Anyone attending would instantly have realized that the stereotype of computer hackers as isolated individuals is nowhere near accurate.” John Markoff
  2.  Hackers=cultural rebels
  3.  Hackers’ computers=”tools of utopian cultural change”
  4.  Hackers and cultural entrepreneurs bring about countercultural ideals
  5.  Opportunity to make cyber culture a study of society
  • Cyber culture studies

1. Identify forums where technologists and cultural entrepreneurs can join to understand the rise of cyberlibertarianism and future ideologies 2. Online collaborations and forums and the way they help generate symbols and ideology II. Engage in technology * Understanding the social practices that make technology flourish. Life Stages * Life stages are socially constructed. * Generalizations that are “normative” in society. * Identity formation * Integration * Societal Contribution * Reflection and Storytelling Identity Formation * Deeply situated in social milieu. * Artificially constructed sub-society Integration and Coupling * Seek companionship Societal Contribution * Attaining status Reflection and Storytelling * Ideally retired people are proud of what they did. Technology’s Role * Technology inspires people to create change * Problem- technology is often seen as property instead of a passion. * Happy users= profitable companies * We should prioritize people’s desires with societal goals. * Corporations go for the most monetizable demographic focusing on a product need instead of love. * Passionate startups are more interested in technology than money but often don’t make it. The Magic of People * The magic of connection * Technology serves everyday life by bringing people and ideas together. Technology Shifts Architecture * Persistence- what you say sticks around. * Searchability- if you are in a public network you are searchable. * Replicability- you can copy and paste but what is original? * As technology advances we continue to change the architecture. Additional Readings:  Hackers convention ask government to stay away over Snowden by Jim Finkle http://www.reuters.com/article/2013/07/11/us-hackers-feds-idUSBRE96A08120130711 At hacker conferences, government surveillance takes center stage by Chenda Ngak http://www.cbsnews.com/news/at-hacker-conferences-government-surveillance-takes-center-stage/


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s