Brian Fitzsimmons MDST 2010 Exam 2 1. The Kony 2012 video

advertisement
Brian Fitzsimmons
MDST 2010 Exam 2
1.
The Kony 2012 video quickly became a global phenomenon, reaching millions of
viewers with its heart-wrenching tale of kidnapped children, torn families, and child soldiers.
The movement responsible, Invisible Children, now invites us to gather and make 2012 Kony’s
last year at large. With this message, “Kony 2012” enters the realm of digital activism, where
people make use of boyd’s “mediated publics” to congregate, coordinate, and take action for a
specific cause. But how effective is it really? To Shirky, the video embodies “ridiculously easy
group-forming” (Shirky, 2008, pg 54) that can hopefully translate into collective action. But as
Morozov demonstrated in The Net Delusion, just because we can gather does not mean we can
act. This essay takes a pro-Morozov stance on the Kony phenomenon – as a means of digital
activism, the video suffers from oversimplification, encouraging “slacktivism,” and
overestimating the power of mobilization.
Oversimplification is not a crime – it just happens to be embedded in our current “media
environment,” as McLuhan called it. Americans see it everywhere, from movies to the news to
Kim Kardashian’s love life (which is probably most important to many citizens). However, we
must take issue when we apply oversimplification to external environments not our own, such as
Uganda (this issue does not only pertain to media studies; International Relations must tread
carefully when it tries to simplify contexts for genocide, for example). Invisible Children
portrays the conflict in terms the West can understand – good versus evil – because “socially
embedded messages are more valuable” (Shirky, 184). But in doing so, it erases crucial contexts,
not unlike Baym’s social cues, which provide critical information needed to communicate
(Baym, 2010). When it expunges such cues – like Uganda’s abysmal economy and corrupt
government, Kony’s absence from Uganda, the LRA’s pitiful state, and the Ugandans’ own
voices – Invisible Children takes on an “internetcentric” position (similar to Baym’s
technological determinism, but focused on the Internet), placing the technology higher than the
environment (Morozov, 2010). For comparison, consider Hillary Clinton’s Internet Freedom
speech: she preaches “internet freedom” for oppressed populations, but ignores the political,
economic, and social contexts of those populations. An open internet might mean free expression
to Americans, but easier surveillance for oppressed societies – this contradiction, born from
oversimplification and internetcentrism, undermines her entire platform (Morozov, 2010). Kony
suffers from something similar: by manipulating the context or, as John Lanier put it, “reducing”
the situation (Smith, 2010, pg 7), the video may resonate more with Western viewers, but if
action ensues, we will target the wrong factors. Stopping Kony will not bring Uganda into the
light – battling government corruption, ethnic conflict, and economic disparity might. In
Shirkyan terms, the “promise” of Kony 2012 is in fact quite shallow.
Of course, this assumes that the masses would take action at all. Shirky would certainly
see the infinitesimal “transaction costs” of forming a Kony movement as an invitation to
“collective action,” bolstered by the power of social media (Shirky, 2008). Morozov and
Gladwell, on the other hand, would see it as most Americans would: a notification on their
Facebook walls. Enter slacktivism. Slacktivism comes from the idea that, “given enough tweets,
the world’s problems are solvable” (Morozov, 190). It is the shallower, uncommitted, low-risk
cousin of traditional activism, as seen in the Civil Rights Movement (Gladwell, 2010). Kony
2012 exudes slacktivistic themes with its final message: “above all, share this movie online. It’s
free.” If we merely pass this video along, are we actually improving the situation? Sure, we are
perpetuating Shirky’s “shared awareness” of the subject, or knowing that everybody else knows
that everybody else knows, but does that translate into collective action? Coupled with digital
media’s emphasis on narcissism (Times Magazine’s 2006 Person of the Year, after all, was
“You”), it does not. One of the main tenets of collective action is that it “creates shared
responsibility, by tying the user’s identity to the identity of the group” (Shirky, 51). But in our
narcissistic media environment, or as Jean Twenge calls it, the “Age of Entitlement”, we want
our individual identities to shine (Morozov, 187). As Ito et al demonstrated, online genres of
participation are friendship-driven or interest-driven, not morally-driven. In connection with
Baym, our online interactions are shaped by our social identity, and sharing a popular video such
as Kony could definitely boost our credibility. Hence, we spread the video because we want to
show others that we “care” about kids in Africa. If the cute girl next door sees an Invisible
Children banner on your Facebook wall, she will dream of your heroic endeavors to save Uganda
– which is exactly what you want her to think. Slacktivism enters because once Ito’s genres of
participation have been fulfilled, your commitment to the initial cause declines – we think that
Liking the video has actually done something for Uganda, when subconsciously, it has done
something for our ego. It is a win-win for you, not Uganda.
Kony 2012 perpetuates slacktivism in other ways too, most notably in its advocacy of
horizontal organization (Shirky, 2008), where, instead of a ladder, we have a level playing field
of peer production. Henry Jenkins pointed out how effective such organization was in the Civil
Rights Movement (Jenkins, 2010), but back then, they did not have to deal with the temptations
of social technology. When we do, a horizontal structure marvels at its ability to connect more
than its ability to take action – as Angela Davis said, “mobilization [displaces] organization”
(Morozov, 196). Unfortunately, marveling at the technology reduces Shirky’s “motivation,
energy, and talent” needed to produce results, and with less motivation, we start free-riding on
the Tragedy of the Commons - our commitment to stopping Kony shallows, as Gladwell and
Carr said, because we bet that someone else in the horizontal structure will do it (Shirky, 2008).
But when everyone thinks that, we have 10 million Likes, and no saved Ugandan children.
This connects to our third point: Kony 2012 overestimates the power of mobilization.
Again, this reeks of internetcentrism because it “puts the internet…before the environment in
which [it] operates” (Morozov, 111). Invisible Children thinks that if we simply gather online,
our digital presence will translate into physical action. Clinton makes the same mistake – online
expression in itself does not topple dictatorships and bring democracy, because “bits move faster
than thought” (Abelson et al, 2008, pg 12). In other words, online expression may seem
progressive, but our offline cultures and consciousness have yet to catch up. This connects to
Zadie Smith, who demonstrated that what we say online may not resonate with what we say
offline. When we post “Down with Kony!” we never consider the contextual, real-world
ramifications involved; when those ramifications become clear, we are not ready to tackle them.
We only post it to seem progressive. In addition, by sharing the video, we are only creating
“weak ties” (Baym, 2010), whereas activism according to Gladwell is a “strong-tie
phenomenon.” And the more people that mobilize, the less tightly-bound the group is – their ties
are diffused, much like their commitment. With such weak-ties, action is less likely.
Summarily, while ambitious, Kony 2012 suffers from serious setbacks. Its
oversimplification of the issue erases crucial contextual factors that will eventually harm the
campaign. The odor of slacktivism is pungent when its number one priority is to “share the
movie” and perpetuate horizontal organization. And finally, it overstresses mobilization, in the
hopes that somewhere among the crowd, action will brew. As a serious campaign, it could take a
few pointers from the excellent meme of slacktivism shown below.
2.
Now that the Internet has penetrated authoritarian states, Western governments and media
alike are predicting a new wave of democratization. They believe that with the Internet,
information will flow unhindered and bring enlightenment to oppressed peoples – they will feel
“empowered,” as York puts it, and naturally call for popular sovereignty. Of course, such a line
of thinking exudes internetcentrism, or the placing of the Internet above its contextual
environment (Morozov, 111). Worse, it even delves into Morozov’s cyberutopianism, or the
belief that digital technology can do no wrong. Secretary Clinton unfortunately joins the ranks of
cyberutopianists with her Internet Freedom speech, which praises the Internet as the bane of
dictators, the harbinger of democracy. What she and the media do not consider, though, is the
social shaping perspective (Baym, 2010) needed to form an Internet foreign policy. We must
look at the distinct political, economic, and cultural “microhabitats” involved (Bogost, 2011, pg
6) and the reciprocal relationship they have with technology. Internet Freedom is simply too
vague and contradictory to be effective, and it is laced with Western technonarcissism
(Vaidhyanathan). Thus, as they stand, Clinton’s policies will not bring the expected wave of
democracy because they are too incongruous, technonarcissistic, and deterministic. The
government needs to take a social shaping stance on such issues, for the Internet is not a tool for
anything, democracy or otherwise – it is merely a tool that adapts to and alters the environment
in which it is embedded.
First, Clinton’s proposals detract from the goal of Internet Freedom when they leave too
much to speculation; her policies need to be what McLuhan called “hot media,” giving copious
amounts of detail so as to minimize viewer participation and interpretation. (Policies that have
blanks to fill will certainly fail, for a dictator might fill them differently than a Congressman.)
The main inconsistency is simply: what is “internet freedom?” Is it the freedom to connect, as
Shirky might say? To “hang out, mess around, or geek out” in the words of Ito et al? Or is it the
freedom to censor, propagandize, and conduct surveillance, all three of which the Internet has
certainly abetted (Morozov, 2011). When looking at different microhabitats, of course the
microecology, or the method of studying it, will differ – in the same way, the uses of media in
disparate contexts will differ depending on cultural history and politics, and so we must alter our
method of studying them accordingly. As Kira Allmann said, you cannot generalize the use of
social technology (Allmann, 2012). For example, Mark Zuckerberg proclaimed that “privacy is
an evolving social norm,” and that transparency is best (Vargas, The New Yorker, 2010). In the
American microhabitat, maybe. But to a dissident blogger in Iran, transparency equates to
imprisonment or worse. Furthermore, if we instill “internet freedom” in, say, Belarus, thanks to
Baym’s storage and reach, the government would have even more data investigate and more
people to propagandize. Dictators are not as inept as the West believes – they know how to adapt
to new methods of control. For example, “governments have learned that they can still
manipulate online conversations,” with techniques like the “Spinternet,” which turns supposed
“internet freedom” into mediated publics of half truths and cants (Morozov, 116). Hugo Chavez
embodies this idea perfectly, who uses his far reaching and interactive Twitter account to
connect with the masses and spread his word – internet freedom at its most democratic, as the
people of Venezuela believe. In other words, it is true that “there are more ways to spread more
ideas to more people than at any moment in history” (Clinton, 2010), but authoritarians know
that too. Per the Streisand Effect, or the idea that blocking something only fuels curiosity, they
are merely guiding online discussion, not censoring it. Just look at China’s “fifty centers,” for
example, who manipulate the online discourse to favor the Party (Morozov, 130). Clinton does
not realize that dictators know how to use internet freedom to their own advantage: “after all, it is
Hugo Chavez, not Hillary Clinton, who is tweeting” (Morozov, 122). Ignoring the social and
political factors of authoritarian states, believing that since the Internet is our invention, it will
follow our will, just shows how inept we are.
The problem is that the web is a “collective intelligence” (O’Reilly, 2005), and because
dictators have much more time and money to spend “messing around” with web technologies
than domestic dissidents (Ito et al, 2008), they can add their own “intelligence” to the collective
and utilize the internet as they see fit. As Morozov said, “in virtually all cases, the state…is
better positioned to take advantage of this new decentralized environment” (136). This is why
social shaping is so detrimental to an internet freedom policy – just as technology empowers
bloggers and dissidents, dictators can morph the Internet into their own Spinternet for fifty
centers to fuel their regimes.
Our next points illustrate America’s cybernaiveté, technonarcissism, and
internetcentrism. “Internet Freedom” has its own American bias - we believe we can simply
transfer our democratic ideals to technology and drop it in a vacuum. For example, even when
Nicholas Thompson cautioned against assuming Twitter was responsible for the 2009 Green
Movement, CNN had the headline “Twitter Revolution” written beneath him (Lecture, 4/5). We
employ Vaidhyanathan’s “confirmation bias,” or the seeking of familiar patterns in data, when
dealing with internet freedom because we want it to succeed. American ideals gave birth to this
“decentralized, organic growth of ideas” (Burners-Lee, 2000), so naturally, we think the Internet
will spread those ideas. This embodies Morozov’s cybernaiveté.
Moreover, per social shaping, we all know that what one country makes of the Web,
another will not. When we believe that the Internet will bring democracy to oppressed peoples,
we consider the tool above the environment (internetcentrism). Collective action requires a
balanced bargain, promise, and tool usage (Shirky, 2008) but internetcentrism puts the tool above
all else. Ignoring the Internet’s environment is like studying an Anglerfish in broad daylight – we
may marvel at its bioluminescence, but we will never understand why or how it functions. To her
credit, Clinton acknowledges that digital “tools are also being exploited to undermine human
progress and political rights” and that “on their own, new technologies do not take sides in the
struggle for freedom and progress” (2010). But to her discredit, she insists that the United States
does. In other words, because the US proclaims internet freedom for all, naturally, its own
invention will make it so. This is technonarcissism at its worst. We cannot delude our policies
will such thinking if we hope to infuse democracy abroad. This completely ignores the
environment’s ability to shape the technology. Only when we accept that not every society is as
democratically inclined as ours, that not every population demands sovereignty, will we have a
chance to spread Western ideals. To not do so would create resentment and conflict – as it
already has in the Middle East. The best conditions for democracy occur when we
“educate…those running websites that oppose the government” of the social shaping involved
(Morozov, 141). They too need to realize that technology itself will not bring democracy. After
all, as Mona Eltahaway made clear, revolutions end with people (Lecture, 4/5).
In essence, having contradictory policies that ignore context and place the tool above the
environment will not promote democracy. Internet Freedom is simply too ambiguous to be taken
seriously. Internet freedom for whom? Ahmadinejad? And until we realize that the web is not
inherently democratic, does not spread American ideals, we will simply supply regimes with
further ammunition to censor and propagandize. Revolution only occurs when the tool is
domesticated (Shirky, 2008), but each society domesticates the tool in different ways.
3.
Facebook, Google, Apple, and Microsoft are locked in a deadly battle over who will
become the operating system of our lives, or the invisible platform on which we perform our
everyday activities. Already, each contestant has significant advantages in certain microhabitats,
or “small, specialized environments within the lager ecosystem” of media (Bogost, 2011, pg 6).
For example, Facebook dominates in connectivity and social networking; Google reigns supreme
in Web navigation; Apple has cornered the market of increasing “appliancization” (Zittrain,
2008), or non-generative devices; and Microsoft rules over 90% of PC computation. While
successful in their own niches, these companies seek to control the entire digital ecosystem, akin
to AT&T and the telephone ecosystem in the 20th century (Wu, 2010). However, because digital
media are now so engrained within our culture (Digital Nation), having one provider for the
operating system of our lives would be deeply unsettling. Should a clear winner emerge, we
would be forced to see the world through its lens, and the Internet would enter the “closedness”
era of Tim Wu’s infamous “Cycle,” becoming more appliancized (Zittrain, 2008) and thus
inhibiting the “messing around” and “geeking out” that has characterized the Web for so long
(Ito et al, 2008). To mitigate the demise of smaller businesses and generativity, government
should ensure that both net neutrality and Zittrain’s “endpoint-to-endpoint” argument stay alive,
while keeping somewhat aloof under Wu’s “Separation Principle,” which I will describe later on.
These steps will ensure that one of the four competitors does not become the “Master Switch”
that can determine our coexistence with the digital landscape (Wu, 2010).
The first worrisome concept of having a sole operating system is that it would control the
lens through which we view the world. This is one of the main concerns of Vaidhyanathan’s The
Googlization of Everything, which purports that the growing “trust bias” in these companies (he
of course focuses on Google, but his ideas apply to the others as well) will desensitize us to other
ways of knowing (Vaidhyanathan, 2011, pg 59). In essence, Google’s algorithms feed us what
we want to see – but because it is Google, we consequently think the results are the truth
(Vaidhyanathan, 44). For example, Jenna McCarthy thinks vaccinations cause Autism because
she found such as result on Google, even though many scientists have said otherwise.
Unfortunately, an operating system would accentuate our “confirmation biases,” giving us
patterns of data that only fit our modes of thinking because it wants to placate us, making us
better shoppers. As a result, we lose perspectives that challenge our way of knowing and force us
to be more open-minded. We reduce our ideologies to “techno-fundamentalism,” or the belief
that technology is always right and can fix everything (Vaidhyanathan, 40) – similar to Baym’s
technological determinism, which accredits technology as the impetus for social change. But
both ideologies fail to see the human factors involved, for behind each line of code are the
“affordances,” or inherent biases, given to it by the programmer (Morozov, 296). When we do
not consider these affordances, we come to accept the company’s views as true, thus
homogenizing cultural perspectives.
We have to consider who distorts the lens too, for technology is not a separate entity
itself, but instead a tool that responds to human input – some more than others. Paul Lazarsfeld
labeled such a class as “opinion leaders:” elite who influence our views of the media and world
around us (like Rush Limbaugh or Jon Stewart, for example, who ironically are now part of the
media). Following the Power-Law Distribution though, only a few actually influence opinions
and distort the lens, so we must wonder how their biases are involved. For example, Google’s
algorithms follow registered Google users (Gmailers, Youtubers, etc) more, so their impact on
search results is greater (Vaidhyanathan, 67). Resultantly, “when the major channels for moving
information are loyal to one party, its effects, while often invisible” will shape the lens to the
singular party’s biases (Wu, 24). As McLuhan might say, whoever controls the medium controls
the message.
The distortive biases usually come out as the company’s default settings, which boyd and
Hargittai posit are rarely changed by users (2009-2010). The “choice architecture,” or structure
and order of choices, greatly influences our decisions (Vaidhyanathan, 88), so if we see that all
the default settings are already bubbled in, we are less likely to change them. For example, as a
hacker, Zuckerberg lauds openness and transparency (Vargas, The New Yorker, 2010).
Consequently, Facebook’s default settings maximize publicity. Of course, anyone could change
them, but easier said than done, for “if a system is designed to privilege a particular
choice…people will tend to choose that option more…” (Vaidhyanathan, 88). Again, this
reduces to techno-fundamentalism, or even better, humanitechno-fundamentalism, for who are
we to argue with the makers of Facebook? If these are the default settings, they must be there for
a reason, right? Unfortunately, this thinking plays into the hands of whoever distorts the lens,
thus enhancing their control over our perspectives.
Next, with only one operating system, the Internet would enter the closed portion of Wu’s
Cycle (the oscillation of openness and closedness of new technology (Wu, 2010)). In fact, we
have already seen this to some extent with Apple, which has championed appliancized devices
like the iPhone and iPad (Zittrain, 2008). Essentially, if the Internet becomes appliancized,
“those who control the tethered appliance can then control the behaviour undertaken with the
device” (Zittrain, 107). Updates and improvements would no longer come from the peripheral
endpoints, but from the central server (Zittrain, 106). As the sole disseminator of improvement
then, the company would have a monopoly on the progress of technology (Wu, 2010). For
example, with little to no user input, imagine having a “Beacon” fiasco every year. Not only that,
but the company would vigilantly squash any attempts to replace them per the Kronos Effect
(Wu, 2010). Furthermore, closedness implies less privacy because “tethered appliances have the
capacity to relay information about their uses back to the manufacturer” (Zittrain, 109).
Googlization of Everything describes privacy as the method of how we manage our reputations
(87), so not only would the operating system have more data about us, but it would effectively
control how we handle it. And since offline now equates to online (Baym, 2010), this effect
would seep over the digital edge (i.e. with Loyalty Cards and Supersaver memberships).
This is certainly disconcerting, which is why government needs to be a guiding force.
First, it needs to ensure that net neutrality remains intact – certain packets of data should not be
able to pay their way to the top. Should net neutrality fail, Shirky’s “Long Tail” would diminish,
for those with the money (media conglomerates) could effectively crowd out smaller packets and
lessen their viewership and perspectives. In addition, the victorious company would undoubtedly
try to prioritize its packets, thus imposing its distortive lens even further. The government also
needs to keep Zittrain’s “endpoint-to-endpoint” argument alive (31). This will let users add their
own improvements, retaining generativity and acting as a check against appliancization and
central updates. For example, if the company imposes something like TiVo, we should be able to
create something like Skype (Zittrain, 59). This effectively promotes peer production and
editing, keeping the Internet’s important horizontal structure.
But the government cannot overstep its bounds – it needs to follow Wu’s Separations
Principle, which keeps the winning company from vertically integrating all three layers of the
Internet – the cables, protocols, and applications – and the government from favoring a certain
contestant (like Google, for example, which is unsettlingly close to Obama) (Wu, 304). This
would ensure that the Long Tail still has a fighting chance while minimizing the monopolistic
effects of having one operating system.
Of course, any regulation may harm different Internet features, but we cannot rely on the
firms to do the right thing – their main goal is to make money (Vaidhyanathan, 40). Having a
single operating system of our lives would certainly be more convenient, but the costs would be
too great.
4.
Analog media read signals as continuous waves, as they were when they were emitted by
the object being recorded. Digital media break these waves into discreet 1s and 0s, which
represent components of the wave that can then be manipulated by computers.
Works Cited:
Abelson, Hal, Ken Ledeen, and Harry Lewis. Blown to Bits: Your Life, Liberty, and Happiness
Boston, MA: Addison-Wesley, 2008. Print.
after the Digital Explosion.
Baym, Nancy. Personal Connections in the Digital Age: Digital Media and Society Series. Cambridge, UK: Polity Press, 2010.
Print.
Bogost, Ian. How To Do Things With Videogames. Minneapolis, MN: University of Minnesota Press, 2011. Print.
boyd, Dana. "Social Network Sites: Public, Private, or What?" The Knowledge Tree 2007. Web. 26 Feb. 2012.
<http://kt.flexiblelearning.net.au/tkt2007/edition-13/social-network-sites-public-private-or-what/>.
Ito, Mizuko, Matteo Bittanti, danah boyd, Becky Herr-Stephenson, and Patricia G. Lange. "Living and Learning with New
Media: Summary of Findings from the Digital Youth Project." The John D. and Catherine T. MacArthur Foundation Nov.
(2008). Web. 26 Feb. 2012. <https://collab.itc.virginia.edu/access/content/group/c2ed6514-0c90-4af8-b5ab5b82e3bd7c89/digitalyouth-WhitePaper.pdf>.
Morozov, Evgeny. The Net Delusion. New York: Public Affairs, 2011. Print.
O'Reilly, Tim. "What Is Web 2.0?." O'Reilly.com. O'Reilly, 30 Sept. 2005. Web. 26 Feb. 2012.
<http://oreilly.com/web2/archive/what-is-web-20.html>.
Rushkoff, Douglas, and Rachel Dretzin, writ. Frontline: Digital Nation. PBS, 2010. Web. 26 Feb. 2012.
<http://www.pbs.org/wgbh/pages/frontline/digitalnation/view/>.
Shirkey, Clay. Here Comes Everybody. New York: Penguin Books, 2008. Print.
Smith, Zadie. "Generation Why?" The New York Review of Books 25 Nov. 2005. Web. 26 Feb. 2012.
<http://www.nybooks.com/articles/archives/2010/nov/25/generation.>.
Vaidhyanathan, Siva. The Googlization of Everything (and why we should worry). Berkeley: University of California Press,
2011. Print.
Vargas, Jose A. "The Face of Facebook: Mark Zuckerberg Opens Up." The New Yorker 20 Sept. 2010. Print.
Wu, Tim. The Master Switch. New York: Random House, 2010. Print.
Zittrain, Jonathan. The Future of the Internet and How to Stop It. New Haven: Yale University Press, 2008. Print.
Download