Tuesday, December 10, 2019

Analysis of Computing News Story Actor Network Theory

Question: Describe about the Analysis of Computing News Story for Actor Network Theory. Answer: Introduction Throughout hominid history, the use of tools to amplify our physical abilities and subsequent mechanization enabled us to dominate the planet. In the process, we have been able to amplify our intellect and use our minds more effectively through the use of language and writing. However, the invention of computers heralded the birth of the ultimate mental amplifier-computing. As Edsger Dijkstra elucidated (Evans, 2011); In their capacity as a tool, computers will be but a ripple on the surface of our culture. In their capacity as intellectual challenge, they are without precedent in the cultural history of mankind. Edsger Dijkstra, 1972 Turing Award Lecture With computers able to mechanize any process imaginable and solving problems beyond human comprehension, computing is perhaps the most significant invention of the past decade. Computing involves designing and building hardware systems that process and manage a variety of information. According to (Computing Curricula, 2005) the definition is sometimes contextual sometimes involving making computer systems behave more intelligently or creating algorithmic processes that describe and transform information. For the above computing scenarios to be feasible, we need an assortment of computer software working in tandem with a collection of hardware systems. Software refers to an assemblage of computer programs and related data that give commands to the computer on what tasks to complete and how to complete them. A software is comprised of algorithms, procedures, programs and a set of documentation with regard to the operation of a specific data processing unit fragmenting software further into application software and system software. The former includes enterprise software, accounting software and media players that are essentially designed to aid the user perform a specific task whereas the latter are designed to manage and integrate the computers capabilities by controlling or operating the computer hardware. Hardware on the other hand refers to all the physical components of a computer system that are physically tangible and act as a collective in the computers operation (Denning, 1989 ). The Actor-Network Theory The Actor Network Theory (ANT) is a social theory developed by Bruno Latour, John Law and Michel Cohen that treats objects as part of a social network and seeks to map relations that are perceived as simultaneously material and semiotic. Controversially, it also holds that nonhuman entities are cable of participating and acting on networks or systems contradicts conventional and critical sociology. Its material-semiotic technical approach stresses linkages between materials/things or between concepts (Latour, 1987). The theorys relentless diffusion into various disciplines has not eased ANTs intimidating ontological complexity. Truth and falsehood. Large and small. Agency and structure. Human and non-human. Before and after. Knowledge and power. Context and content. Materiality and sociality. Activity and passivityall of these divides have been rubbished in work undertaken in the name of actor-network theory (Law, 1999). For instance, the theorys name Actor-Network Theory is an oxymoron that contradicts conventional understandings of agency and structure that have traditionally guided social thought. It also considers both human and non-human components in a network system as equal actants, thus an analyst will prescribe the same analytical and descriptive structure when handling either text objects, humans or machines. An actor in ANT is a semiotic definition an actant that is something that acts or to which activity is granted by anotheran actant can literally be anything provided it is granted to be the source of action (Latour, 1996) However, this approach presents an obstacle in creating evaluation frameworks for networks given the unique characteristics of individual network systems. This translates to disposing lists of inputs and outputs in favor of finding out what transpires in between the inputs and outputs which is counter-intuitive. On the other hand, ANT can has the potential to offer new methods of network appraisal by scrutinizing the diverse associations that establish networks and monitoring how networks are performed rather than only providing a list of inputs and outputs (Rogers, et al., 2001). Analysis Of Computing News Story Using Actor Network Theory STORY 1: Facebook's internet.org initiative aims to connect 'the next 5 billion people' In a bid to sustainably provide free access to basic internet services, the worlds leading social media network Facebook embarked on its most ambitious project yet-Internet.org. The initiative backed by the likes of Nokia and Samsung aims to connect the remaining 5 billion people to the internet for free. Launched in 2013, the global partnership has received acclaim and criticism in equal measure with the tech-giants intentions for the drive being the main point of concern to industry stakeholders(Zuckerberg, 2013). Internet.org now rebranded as Free Basics has of today been successfully rolled out in Tanzania, Kenya, Ghana and Columbia. However, its presence in India was met with condemnation particularly from net neutrality activists who flagged it as a shrouded proxy for the Facebook Economically Disadvantaged User Acquisition Department prompting the countrys telecoms regulator to block Facebooks Free Basics App. On the political scale, net neutrality is registered as an actant within the network system by acting on supporters of net-neutrality, who keep in check the government and Internet.org to sustain a non-regulated internet. (BBC NEWS, 2016). Since ANT explores the relationships between actants on a network, in Facebooks internet.org project, there is a disparity between the users and the system itself. Firstly, global internet access is non-existent in many developing countries despite being labelled a basic human right. Statistically for instance, about 12% of Ghanaians had access to the internet in 2013 compared to 84% of Americans during the same period. A vast majority of the unconnected people reside in developing countries in parts of Asia, Latin America and Africa which presents an obstacle to the success of Internet.orgs initiative (Nath, 2015). Moreover, (Talbot , 2013) elucidates that viewing Facebooks Free Basics plan as the ultimate saviour of the developing world is in the least suspicious and impractical. Although Talbot lauds the efforts to make internet access cheaper, he draws focus onto the complicated realities facing the unconnected. For instance, the social media networks roll outs since 2013 tend to deliver more data to people who already have internet access rather than improving and extending telecommunications connectivity to those who lack internet access. In essence, the company should first invest in network extension infrastructure in developing countries. The current model has obligated Internet Service Providers in the participating countries to incur extra costs at the expense of free internet access by users. Taking into account developing countries, although Facebook has a major online presence in Africa, Facebook has not set up data centers there, which translates the extra cost of channelling the data offshore via fibre-optic cable to the ISPs. Therefore, ISPs incur at least $100 every month for every megabit of traffic and to cut costs, they subsequently, transfer this surcharge to the consumer. Essentially, in a continent where only 16% of the people have access to the internet, Zuckerbergs ambition seems ingenuous(Talbot , 2013). In conclusion, the feasibility of Facebooks free internet access initiative suffers setbacks in its material-semiotic linkages. The exclusion of a majority of websites and social networking sites from the Free Basics initiative may discourage users from participating. Furthermore, Facebooks autonomous control of information raises questions on Free Basics net-neutrality whereas the absence of encryption protocols brings to light concerns on user data privacy and security. STORY 2: Yahoo Exec Shows Encrypted Email at SXSW In recent years, impact of encryption protocols, a digital actant, on computing has been a matter of concern to internet users, governments and ISPs. These computer assemblages have many levels, on which an actant can act upon at the practical level in the linkages by rendering a message (E-mail/SMS) readable only to the intended addressee. The Yahoo story reveals the technical obstacles of encryption protocols to, for instance in the Yahoo encrypted email, disconnect other actants. In this case, the encryption used is counterproductive as it inhibits the digital actant -email message" (if the date and time is also encrypted) from moving through the Internet. Moreover, human actants will have difficulties with the search option as encryption complicates the work of the algorithm used to search for text in the users email.(Yadron, 2015). On a cultural scale, we are able to identify from the story how encryption protocols and non-human actants have the capacity to change email culture in both desktop browsers and smartphone apps.Politically and economically on the other hand, the encryption protocol (non-human element) helps to connect humans (human element) to Yahoos business plan thus affecting how many customers are willing to sign up for a Yahoo account. They could respond positively given the recent privacy concerns arising from increased ability by the state and businesses to spy on peoples data illegaly. the WikiLeaks scandals, Snowden emails and Benghazi emails. In the age of big data, technologies like Microsofts differential privacy mathematically guarantees anonymity even in online social contributions. Apple built it into their new mobile operating system and almost immediately pitted the tech giant against the United States government. However, this technique has failed to gain traction among other tech giants. This could be due to the fact that these privacy-Sensitive Artificial intelligence systems are not completely impermeable. Peoples obsession with privacy saw the introduction of end-to-end encryption in messaging services, a phenomenon unusual for use in mass-market software before (Simonite, 2016). In both stories, user privacy stands out as a major determinant in the uptake of big data technologies. Socially, human actants will enjoy more connectivity whereas the digital actants face continuous improvements to their design thereby bettering connectivity and privacy in the long run. However, politically, governments may infringe on internet privacy through policy implementation and regulation further discouraging the use of the internet. References BBC NEWS, 2016. BBC.COM. [Online] Available at: https://www.bbc.com/news/technology-35522899 [Accessed August 2016]. Computing Curricula, 2005. The Overview Report:A volume of the Computing Curricula Series. United States: The Association for Computing Machinery (ACM). Denning, P. J., 1989. "Computing as a Discipline", s.l.: Association for Computing Machinery. Evans, D., 2011. Introduction to computing: Explorations in Language, Logic and Machines. Virginia: University of Virginia. Latour, B., 1987. Science in Action: How to Follow Scientists and Engineers Through Society. s.l.:Open University Press. Latour, B., 1996. On Actor-Network Theory: A Few Clarifications. Soziale Welt, p. 337. Law, J., 1999. After ANT: Complexity, Naming and Topology. In: . J. Hassard J. Law, eds. Actor-Network Theory and After. Oxford: Blackwell Publishers., p. 3. Nath, T., 2015. Internet.org: What It Is and How It Works. [Online] Available at: https://www.investopedia.com/articles/investing/021315/internetorg-what-it-and-how-it-works.asp [Accessed August 2016]. Rogers, J., Bozeman, B. Chompalov, I., 2001. Obstacles and Opportunities in the Application of Network Analysis to the Evaluation of R D. Research Policy, pp. 161-172. Simonite, T., 2016. MIT Technology Review: Apples New Privacy Technology May Pressure Competitors to Better Protect Our Data. [Online] Available at: https://www.technologyreview.com/s/602046/apples-new-privacy-technology-may-pressure-competitors-to-better-protect-our-data/ [Accessed August 2016]. Talbot , D., 2013. MIT Technology Review. [Online] Available at: https://www.technologyreview.com/s/522671/facebooks-two-faces/ [Accessed 2016]. Yadron, D., 2015. Yahoo Exec Shows Encrypted Email at SXSW. [Online] Available at: https://blogs.wsj.com/digits/2015/03/15/yahoo-exec-shows-encrypted-email-at-sxsw/ [Accessed August 2015]. Zuckerberg, M., 2013. Is Connectivity a Human Right?. [Online] Available at: https://scontent.xx.fbcdn.net/t39.2365-6/12057105_1001874746531417_622371037_n.pdf [Accessed 2016].

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.