Gribben-Ballentine-Session-1

advertisement
Day: Writing, Hacking, and Intellectual Property: Navigating New Composition Spaces
Session 1: Navigating New Terms: Writing, Hacking, and Intellectual Property
Session 2: Applications of Writing, Hacking, and Intellectual Property
Session 3: Introducing Legal and Ethical Dilemmas into Composition Spaces
Session 1:
When I was looking over the past brochures for the Gribben Lecture my initial reaction
was some blend of humility and intimidation. Chris Thais, Becky Moore Howard, Susan
McLeod, Mike Palmquist, Chris Anson, David Jolliffe, Cheryl Glenn, Kathy Yancey,
Cindy Selfe. So, it is a huge honor for me to be here. And, it is a nice bonus that I get to
see some old friends. Thank you.
There’s a lot to talk about so let’s get started… You may be asking yourself why you’re
about to engage in a discussion on intellectual property and hacking? What do those two
things, whatever they may be exactly, have to do with writing? Fair questions, certainly,
and the ones I’d expect (hope) you to have. So, the first order of business is to provide a
little history and a little definition for two terms you’re perhaps less familiar with – IP
and hacking – and then I’ll say just a little bit about how writing fits into the mix.
If there is one, large, overarching claim for the day it would be that among the
disconnects between writing in the classroom and writing in the workplace intellectual
property and the sanctioned and unsanctioned modifications to that property (i.e.,
hacking) represent important, unexplored teaching opportunities for writing instructors.
Why does IP represent a disconnect? Because while it remains critical to teach research
and citation methods in writing courses as well as engage students in a productive
dialogue about plagiarism, these things are not the same as developing, protecting, and
profiting from an IP portfolio – in the second session, I’ll demonstrate some specific
relationships between writing and IP generation. And, not only do I hope to persuade you
of this claim in the morning sessions, I’d like to invite you to participate in a few writing
activities this afternoon that ask you to engage with intellectual property law, ethics, and
hacks – in this specific case counterfeit hacks.
IP
To clarify, the “property” that intellectual property law protects is unlike a car or a
bicycle, for example. Unique characteristics distinguish IP from other tangible goods. As
defined by the World Intellectual Property Organization, “Intellectual property relates
to items of information or knowledge, which can be incorporated in tangible objects at
the same time in an unlimited number of copies at different locations anywhere in the
world. The property is not in those copies but in the information or knowledge reflected
in them.” In the instance of a car, within the design of the vehicle there may be
engineering concepts protected by intellectual property that make it more fuel efficient.
As the car and its design are mass produced, intellectual property law does not prevent a
buyer from dismantling, modifying, or reselling the car but it does stop a competitor from
copying, manufacturing, and profiting from the “information or knowledge” enabling the
car to be more fuel efficient. So, to be clear, if you buy a bike, like this one – a regular
Schwinn bike – there is nothing stopping you from doing this to it. We’ll get to
1
definitions of hacking in a minute but for the record, this definitely counts. And, despite
the limited market for boot bikes, there is nothing stopping this hacker/creator/inventor
from selling his modification and profiting from it. The same goes for any tangible good
like, say, a book.
The dilemma, according to legal scholars, is that, “It is especially difficult physically to
exclude people from using others' intangible ideas, and sometimes even the physical
embodiment of those ideas and to arrange necessary compensation for creators” (Nard,
Barnes & Madison, 2006, p. 14). Here we need to pause on a couple of key IP terms.
Non-rivalrous
One of two distinct features of information goods. Non-rivalrous goods are those that
many people can use without interfering in the pleasure or benefit others get from the
same information. E.g., one person’s use of the creative ideas embodied in a poem does
not interfere with another’s use of those ideas.
Non-exclusive
The second distinct feature of information goods. Once information or an idea is
disclosed, it is very difficult to start excluding people from using that information.
The problem is exacerbated when the property in question can be digitized. Computers
facilitate the copying of works protected by intellectual property laws to the point of
effortlessness. The speed and connectivity of the internet means a potentially enormous
distribution of that property. In the case of the car, a competitor stealing ideas will at the
very least incur engineering and production costs that may or may not deter infringement
(plus they had to buy an actual car). This is not to disregard the costs associated with
computers and connectivity but for many the cost of access to technology continues to
decrease to the point where it is no longer a deterrent. There is a long line of legal
scholars claiming that our emergent technologies have “caused the law to lose its
bearings” and that there exists "an extreme disparity between the cost of creation and the
cost of making and distributing copies, which indeed approaches zero whenever the copy
is made electronically and is distributed over the Internet.” As a result, corporations
clamor for increased legal regulation. That clamor is heard the loudest from organizations
such as the Recording Industry Association of America (RIAA) and the Motion Picture
Association of America (MPAA) but it also comes from any number of sources including
pharmaceutical and chemical companies, publishing houses, engineering firms, and, as
we’ll see later, spaces where there isn’t much IP protection like fashion. When
physicality and materiality no longer provide protection against unwanted copying and
distribution of intellectual property, disciplinary values will be at odds with one another.
THESE ARE THE COMPANIES THAT WILL EMPLOY OUR STUDENTS – THE
ONES WE ARE TEACHING TO WRITE.
Among the types of intellectual property law including patents, trademarks, and trade
secrets, copyright law, thanks to our digital age, has the center stage for contestation. Can
someone tell me where copyright law comes from? That is, where, how, or in what
document is it grounded in?
2
Copyright law in the United States can be traced back to Article 1, Section 8, Clause 8
of the Constitution which reads, “The Congress shall have Power…To promote the
Progress of Science and useful Arts, by securing for limited Times to Authors and
Inventors the exclusive Right to their respective Writings and Discoveries.” The term
"Writings" has been interpreted broadly to encompass creative works such as music,
drama, film, graphics, novels, sculpture, and now computer code. Copyright law has
undergone numerous revisions to not only make it easier for creative works to receive
protection but also to extend the length of protection. Does anyone know how long
creators hold onto copyright?
Creative works produced after January 1, 1978 “are protected by copyright for 70 years
past the death of the last surviving author. If a work was made for hire after that date, the
term is 95 years from first publication” (ASME, 2001, p. 24). Copyright protection takes
effect when an intangible idea takes on a fixed form of some kind. Once in a fixed form,
protection is automatic and a creator is not required to register for the copyright unless he
or she is going to litigate (see copyright.gov, an office of the Library of Congress). As
copyright protects an enormous array of human creative works, that fixed format may be
a piece of paper, canvas, sculpted stone, or a computer drive. Whether we agree with the
length of the term or not, copyright is designed to incentivize creators to invent by
promising protection for their works.
Patent
How about patents? They have their origin in the Constitution as well and are also
designed to incentivize. But, they afford different protections. The proper subject matter
is very broad – in the words of the U.S. Supreme Court, “anything under the sun and
made by humans.” OK, that’s not very helpful but patents do include "any new and useful
process, machine, manufacture, or composition of matter, or any new and useful
improvement thereof.” Those compositions include living materials such as genetically
engineered bacteria, plants, or animals. Primary criteria for a patentable invention are that
it must be useful, novel, and non-obvious. How long are patents valid? Most patents are
valid 20 years from the time of filing. Patents and our next topic, trademarks, are
managed through the USPTO.
Trademark
But, unlike patents, trademark doesn’t originate with the Constitution but the passing of
the Federal Trademark Act or what is often called the Lanham Act. Here trademark is
defined as…any word, name, symbol, or device or any combination thereof which is used
by a person…to identify and distinguish his or her goods, including a unique product,
from those manufactured or sold by others and to indicate their source.
If copyrights and patents are thought to provide a social good by incentivizing inventors
to create more stuff – what is the social good behind trademark?
Trademarks provide consumers with a method of distinguishing goods or services of one
company from another. If you like the quality of the product, you generally will want to
3
buy it again. This favorable acceptance is an intangible benefit to the company called
‘good will.’ Established good will is often difficult to attach a dollar amount to. But, there
is a long history of trademark litigation and most of it falls under the category of
trademark infringement.
Trademark Infringement
An unauthorized, conflicting use of a trademark that confuses consumers about the
source of the goods or services. Unauthorized uses can damage good will and dilute a
brand. We’ll see infringement this afternoon when we look at some counterfeit goods.
Remember McDowell’s from Coming to America?
Finally, how long does trademark last? As long as the company or individual works to
use or protect the brand, trademark can last forever.
Trade Secret
Last one! Trade secrets can also last forever so long as the company or person does a
good job protecting that IP. That is, trade secret protects secret business information
against unauthorized use or disclosure by anyone who has obtained it. Most of you are
probably familiar with non-compete or non-disclosure agreements that employees are
asked to sign when joining a company or receiving access to sensitive IP. These
agreements certainly do hold up in court but trade secret is still understood as the weakest
of the four IP categories. Can anyone think of the two most well-known (yet unknown)
trade secrets out there? Coke and KFC.
HACKING
What is hacking? Where have you seen the word ‘hacking?’
Hollywood, certainly promotes a particular image. I don’t want to call a 1995 Sandra
Bullock movie prescient but…the tag line still seems quite relevant.
Hacking was taken up by composition folks or I should say, hacking came to composition
folks when Lawrence Lessig gave the key note at the 4Cs conference in 2005. This
concept of remix, a title of one his books, is a term many of us have embraced as a means
for discussing what Howard calls patch-writing. So, hacking here has evolved into remix
and that has turned into mash-ups or even multimodal composition. My colleague has coauthored a textbook on it – maybe you’ve seen it.
Prof. Hacker, where the word hacker takes on meaning of a move toward efficiency.
How can you manipulate a tool, process, or organization to improve performance as a
teacher or researcher?
And the term has exploded elsewhere on the web. Search for a term like ‘daily hacks,’
and you’ll get a dozen or so sites on how to hack just about anything. Many of these sites,
like lifehack.org – their menu items are on screen – offer broad categories with
hacks/modifications for your personal life, finances, health, and overall productivity.
4
A few years ago I wrote an article for Computers and Composition Online on hacker
ethics and I began with the open source advocate Eric Raymond’s definition: An expert
or enthusiast of any kind. One might be an astronomy hacker, for example. According to
Raymond, a hacker also: “enjoys the intellectual challenge of creatively overcoming or
circumventing limitations.” And it is the enjoyment found in the activity – the pleasure
gained from tinkering, manipulating, making, creating, or, gasp, even counterfeiting or
forging, is where I’d like to focus our attention for a definition. Pekka Himanen’s
marvelous book, The Hacker Ethic: A Radical Approach to the Philosophy of Business
offers hacking as “the dedication to an activity that is intrinsically interesting, inspiring,
and joyous.” Of course that’s how we hope all of our students feel about their writing and
even if they don’t, it is a nice goal for us to keep in mind.
Himanen’s book is especially interesting because it pits a new work ethic, the hacker
ethic that espouses individual interests, inspiration, and joy against what is typically
understood as our historic roots in a Protestant work ethic – or the tradition of the moral
value of hard work, frugality, and diligence as a means to success or for the devout,
salvation. According to Max Weber, that work ethic also underpins capitalism.
So, what we’re left with is an ethic versus an ethic. Before moving on I should pause and
define what I mean when I say ethics – emphasis on the ‘s’. Broadly, we understand
ethics as the well-established standards of right and wrong that influence what humans
ought to do, usually in terms of honesty, fairness, obligations, and benefits to society/our
fellow citizens. Of course this begs the question, well-established for whom? Social
standards and norms have obviously evolved quite differently over the course of history
and now in online communities the rise of the hacker ethic makes for some interesting
debate as we’ll see this afternoon.
WRITING
So, finally, let’s turn to writing. When I was putting together my notes for the talk I
initially was going to skip over ‘writing’ as a term. I mean it’s writing, that’s what we do,
so, next slide please. But…then I realized that might be a bad idea for several reasons.
I’m not going to pretend to surprise this experienced crowd of composition teachers with
definitions of writing but I want to make sure I’m as clear as I can be about what’s going
through my head when I say ‘writing.’
My field of professional and technical communication inherited definitions of writing
from the 1940s (primarily from the engineering and science communities) and has
struggled to shake off definitions of writing that cast it as mechanistic and in service to
objective representations of the Truth (capital ‘T’) discovered out here in the ‘real’ world.
‘Good’ writing does its best to get out of the way of obscuring the Truth –
metaphorically, writing is a vehicle for unerringly transporting meaning or elsewhere a
signal transferring a message with the least amount of noise or distortion. Back in 1979
(yes, 1979), Carolyn Miller published her now famous “A Humanistic Rationale for
Technical Writing,” in which she borrowed James Kinneavy’s “windowpane theory of
language” as her preferred metaphor for objective and positivistic approaches to writing.
5
Good writing means a clear, clean window through which we see reality. No streaks on
the glass. This is indicative of a positivistic view of science and engineering. Positivism,
Miller reminds us, “is the conviction that sensory data are the only permissible basis for
knowledge; consequently, the only meaningful statements are those which can be
empirically verified” (612).
This view discards rhetoric by assuming not just that Truth is findable but that science
and engineering communities are somehow a-rhetorical – that scientists and engineers
don’t write and communicate in socially constructed, deliberative spaces. Writing and
rhetoric scholars have pushed past such definitions but it is worth reminding ourselves
that…
All writing…technical, professional, business, legal, scientific, cookbooks, grocery lists,
has humanistic value – all writing has rhetorical qualities. Why is that an important
reminder? Of course it is important for our composition students when we’re talking
about the situated, purposeful, audience-focused, and strategic writing that we ask of
them in the classroom (and that will be asked of them in the workplace). But…
I’d also like to focus on another quality or rather another claim for rhetoric and writing
dating back this time to the 60s. I wasn’t there but I’m told a lot of fun stuff happened in
the 60s…
Including, in 1967 Robert Scott publishing… On Viewing Rhetoric as Epistemic. And
what he wanted to showcase was the knowledge producing powers of rhetoric. That in
the absence of truth, we use the deliberative powers of rhetoric to arrive at what we call
knowledge. And, because it is the 60s we also have sexist language and no gestures
toward gender equality – my apologies on behalf of Scott but:
Man must consider truth not as something fixed or final but as something to be created
moment by moment in the circumstances in which he finds himself and with which he
must cope…In human affairs, then, rhetoric perceived in the frame herein discussed, is a
way of knowing; it is epistemic.
I want to prove to my students that their writing makes things happen. We can theorize
about epistemology with our students, even have them debate the merits of Scott’s
articles and the many others that have com after it, but it is another thing to throw them
into the mix and show them writing at work. So, this afternoon I hope not to bore you
with some specific stories about how writing in the workplace shows off its epistemic
qualities and how that writing generates knowledge that can receive IP protection in the
form of trademarks, patents, and of course copyright. Questions and comments…
6
Download