Duality and Recognition of Liberation Technology as Applied to Western Democracies

Liberation Technology is a double-sided blade. We laud it for it’s ability to keep dissidents connected, to document and keep record of atrocities, but it can be turned against us so easily. Governments have the ability to use our reliance on ICTs for their own purposes. The same technology that frees us can be used to censor the Internet, create filters, track our Internet usages and criminalize us. Larry Diamond describes, “[l]iberation technology [as] any form of information and communication technology (ICT) that can expand political, social, and economic freedom” (70). Diamond focuses on the use of Liberation Technology in the “other-ed” part of the world, meaning the non-western world. His examples are rooted in the Middle East and Asia where, without a doubt, human right violations are far higher. But to imagine oppression and injustice as taking place only in places seen as “distant”, physically and politically, is damaging.

While we in the west have no issue imagining a Chinese dissident being hauled away to a detention center for posting an anti-authoritarian tweet, we are hard pressed to call up the image of our own government agencies serving subpoenas and summons to Twitter, “seeking records including the phone number, mailing addresses, and IP addresses associated” with dissident accounts (Wong). But why? We know the NSA keeps tabs on us. Every other week a new story breaks about the FBI demanding our social data. Most recently, the Department of Justice served DreamHost, a website-hosting company, with a search warrant, “for every piece of information it possessed that was related” to www.disruptj20.org, the website, “that was used to coordinate protests during Donald Trump’s inauguration” (Wong).

The J20 demonstrations are the perfect example of the duality of Liberation Technology within a Western Democratic country. J20 was the name given to the demonstration that took place to protest the inauguration of the 45th president of the United States. Before the demonstration, people used Facebook pages to organize smaller groups to meet and protest together under common banners, used its messenger service to coordinate transportation to and room, and their own personal pages to post general protest safety guides. During, people used Twitter to provide live updates about what was happening on the ground in real time and alerted people to first aid stations. After, hundreds of videos are uploaded to YouTube, photos posted to Instagram, and blog articles spread across the Internet providing factual accounts of the rampant police brutality and the systematic suppression of the protestor’s rights to assemble. This is seen as the positive side of liberation technology, ICTs bringing people together to, “enable citizens to report news, expose wrongdoings, express opinions, mobilize protest, monitor elections, scrutinize government, deepen participation, and expand the horizons of freedom” (Diamond 70).

The more daunting side of Liberation Technology that gets overlooked are the instances when it is used against us. For example, the D.C. police subpoenaing Facebook for, “the social data of several protesters” who participated in the J20 demonstration (Daileda). Or facial recognition software scanning Instagram photos of the protest to track down those in attendance, and tweet’s being used as evidence in court to convict protestors of felony charges of ‘conspiracy’ (Higgins). Law enforcement is already infiltrating Twitter and Facebook creating fake profiles, setting up traps, and generally using social media to gather intelligence to use against groups it deems a ‘terror-threat’ all in the name of keeping America safe. Just as authoritarian dictators are able to use ICTs to track down dissidents in their countries, so does the government of the United States.

Diamond makes the statement, “[t]here is now a technological race underway between democrats seeking to circumvent Internet censorship and dictatorships that want to extend and refine it” (81). Which is immediately followed up by the contradictory statement that Iran has made “significant gains in repression” because western companies have happened because, “Western companies like Nokia-Siemens are willing to sell them advanced surveillance and filtering technologies” (81). Diamond even concludes his article with ways Western countries can support those citizens in Authoritarian countries. He even concludes his paper with a quote from then Secretary of State Hillary Clinton supporting free access to the Internet.

The atrocities that occur in other parts of the world are horrific by comparison, but minimizing the violations perpetrated by our own government puts us all at risk for it’s continuation and escalation. We cannot continue to delude ourselves that our democracy is above surveillance. We cannot be so naïve to think these companies are only selling to “other-ed” countries, that they’re not using these technologies on their own citizens. Especially, because we do know that they are. We have proof that our civilized western democracy is spying on us, collecting data, and using our Internet use as a means to sustain their version of a civilized western democracy. We must remember, when she was Secretary of State Hillary Clinton ordered for more intensive surveillance of American Citizens in the name of safety and freedom.

The good and bad side of Liberation Technology exists here in America and other Anglo countries and it must be recognized. Human right’s violations and oppression don’t happen solely “over-there” in those “uncivilized” and “un-democratic” regions of the world that most American’s can’t point out on the map. Turning injustice into a solely ‘other-worldly’ occurrence makes it easier to gloss over it when happens here, in our civilized western democracy.

 

Diamond, Larry. “Liberation Technology.” Journal of Democracy, vol. 21, no. 3, July 2010, pp. 69–83.

 

Levin, Sam. “FBI terrorism unit says ‘black identity extremists’ pose a violent threat.” The Guardian, Guardian News and Media, 7 Oct. 2017, www.theguardian.com/us-news/2017/oct/06/fbi-black-identity-extremists-racial-profiling.

 

Daileda, Colin. “D.C. police demand Facebook hand over data on Trump protesters.” Mashable, Mashable, 6 Feb. 2017, mashable.com/2017/02/06/dc-police-subpoena-facebook-inauguration-protests/#k_Vkiy6miaq1.

 

Wong, Julia Carrie. “US government demands details on all visitors to anti-Trump protest website.” The Guardian, Guardian News and Media, 15 Aug. 2017, www.theguardian.com/world/2017/aug/14/donald-trump-inauguration-protest-website-search-warrant-dreamhost.

 

Higgins, Eoin. “Hundreds Face Conspiracy Charges For Actions Of A Few During Inauguration Day Protests.” The Intercept, 25 Oct. 2017, theintercept.com/2017/10/25/trump-inauguration-protest-j20-trial/. https://theintercept.com/2017/10/25/trump-inauguration-protest-j20-trial/

 

 

Edward Tufte’s Beautiful Evidence

“We must have an endless commitment to finding, showing, and telling the truth”- Edward Tufte

ET open

 

Edward Tufte is a professor emeritus of political science, statistics, and computer science at Yale University. He is also the closest thing we’ve got to a household name in the field of information design, devoted equally to the data and its display, its function and its form. His beautiful, self-published books are loaded with rich visuals covering all sorts of graphs, charts, and maps, many historic and some new. He has worked as a consultant to NASA and The United States government, among many others. He is also an artist and has developed a sculpture park of 234 acres in Woodbury, Connecticut. He periodically gives a one-day seminar course on “Presenting Data and Information” which, though the title sounds impossibly dry, draws attendees from around the globe.

 

A ripple ran through the crowd as Edward Tufte, “The Leonardo da Vinci of data,” (Shapley, 1998) “The Galileo of Graphics,” (Aston, 2009) took the stage to introduce a music visualization as the opener to his seminar in Washington DC on November 6, 2017. The lights went out completely and I could no longer even see the note paper in front of me. Color bars pass on a screen, pulsing in coordination with the musical notes of a recording of Chopin, part of the Music Animation Machine by Stephen Malinowski.

 

But before we even got to the beautiful music, we had quiet reading time. Edward Tufte begins all of his presentations with “Study Hall” where he provides a devoted segment of silent time to read a written document, of 3-4 narrative pages, that describes the concepts and information of the materials that are about to be presented. He is known for his disdain of typical Powerpoint presentations and describes the study hall segment as the first step in a successful presentation by placing control (physically) in the hands of the audience. He is devoted to the user as the priority when setting out to provide education, evidence, and information. His position is that the viewer has the best capabilities to scan the materials for what interests them, skip what they don’t want, and have the option of holding onto the hard copy for future reference. In this way the presentation may be customized and personalized by the viewer and not just the presenter. The meeting begins by empowering the ones who are there to learn and makes them active participants right from the start, rather than passive observers. This “silent start” study hall strategy is also used by Jeff Bezos at Amazon for all company meetings as an efficiency measure that his team swears by. (Bariso, 2017) Attendees have time first to learn and time to think, and then to be more engaged in the meeting.

Frederic Chopin, Barceuse, Opus 57, depicted by Stephen Malinowski's Music Animation Machine
Frederic Chopin, Barceuse, Opus 57, depicted by Stephen Malinowski’s Music Animation Machine

Tufte describes the Powerpoint presentation as “stacked in time.” The concepts and data are dribbled out over time and there is no way for the audience to gather the whole in a cohesive context. It may be the easiest to create and show, but it is not the best way to clearly and accurately inform the viewer. When a presenter subjects his/her viewers to the passive experience of sitting through the traditional Powerpoint slide deck, they are entirely at the mercy of the presenter’s pace and choices. “For all of the disruption we have seen from the tech industry, there is a complete lack of creativity.” (Tufekci, 2017) Powerpoint has enjoyed the default presentation position for years. Tufte compares it to voicemail menus where a listener must wait through a list of options to find out what to press–another interface that is stacked in time and inconvenient for the audience. A “focus on the person… a shift towards a ‘person-centred’ approach, rather than a ‘system-centred’ approach. This has been accompanied by a switch from quantitative methods to qualitative methods.” (Wilson, 2000) Tufte very decisively advocates for a human- and user-centered process, that addresses quantitative and qualitative measures, when sharing data and presenting information.

 

Besides the study hall beginning, Tufte describes the optimal way for users to consume information as “adjacent in space.” Using methods that allow the integration of different types of data–numbers, words, pictures, etc. in the same space creates context for a richer, comprehensive understanding. He shared Charles Joseph Minard’s data map tracking the French invasion of Russia in 1812. The visual creates a rich story by including numbers of troops lost, over time, as it relates to deployments, the terrain, and the weather. It provides lots of context to explain the devastating loss of life due to multiple factors. “Taking context seriously means finding oneself in the thick of the complexities of particular situations at particular times with particular individuals.” (Nardi, 1996, p35)

Charles Joseph Minard's data map of Napoleaon's Russian invasion in 1812. 422,000 troops at the beginning. Only 100,000 survived.
Charles Joseph Minard’s data map of Napoleaon’s Russian invasion in 1812. 422,000 troops at the beginning. Only 100,000 survived.

Tufte had plenty of jabs for 3-D pie charts, drop shadows, bright colors, and “datajunk.” His directive is to first consider the data that you must convey, leave as much information intact as possible, and present it in as clear and uncluttered a format as possible. Visual clutter is the signature of the designer, the coder, the editor, and will only impede the learning process for the viewer. Just as Lessig describes his concept of Open Evolution as it relates to coding: “Build a platform, or set of protocols, so that it can evolve in any number of ways; don’t play god; don’t hardwire any single path of development; don’t build into it a middle that can meddle with its use” (Lessig, 1999, p110), Tufte is a strong proponent of keeping as much of the data itself available for the audience to interpret for themselves. There is no such thing as information overload, only bad design.

 

“Evidence is evidence, whether words, numbers, images, diagrams, still or moving. It is all information after all. For readers and viewers, the intellectual task remains constant regardless of the particular mode of evidence: to understand and to reason about the materials at hand, and to appraise their quality, relevance, and integrity.” (Tufte, 2006, p83)

 

The more data that is there, the more accurate and believable it will be. He raises significant concern around integrity in data analysis. Specifically, in the process of selecting data, he recognizes the broad practice of “cherry picking and lemon dropping” data to suit one’s biases. Akin to James Moor’s Invisibility Factor in computer calculations: “Answers chosen will build certain values into the program…This becomes a significant ethical issue as the consequences grow in importance.” (Moor, 1985, p274) Gathering data appropriately and then showing it accurately takes skill and mindful discipline. Many data visualizations can skew the viewer’s understanding simply by using larger font sizes for some bullet points–and the more important the data, the higher the stakes. Tufte shared a presentation from his evaluation of the Space Shuttle Columbia flight that imparted information in a way that led to dangerous decisions and ultimately may have contributed to the loss of life for 7 crew members. The Powerpoint format was too simple, inappropriately edited, and did not show the important, complex data that needed to be considered. He argues the world is complex and multi-variate and we must display the data to encompass this. Don’t dumb it down–have faith in the viewer.

 

Tufte warns us all, as creators and as users, to question the data we see and to think carefully about the relationship between the evidence and the conclusion. Start with an open question and do the research. Taking data from one project and appropriating it to something else will often lead to inaccuracy. Every step, from how the data is collected (is the scientist paddling over to a cleaner area of the lake to gather his sample for water pollutants?) to how the designer lays it out (are they removing some data to make it fit nicely in their grid?) is suspect. “In the political and philosophical sense in which I use the term here, neutrality is impossible. In any situation, there exists a distribution of power.” (Jensen, 2006, p91) He also urges us to question our own biases and to cultivate self-awareness about what we see.

 

Tufte urges us to always assume equality across a room. Give every idea a chance. Meet the challenge to see things in a neutral way rather than through the lens of our own bias. Always source alternative and divergent views. Create the environment for truth to be sought and revealed.

 

The last visual of Tufte’s talk asked:

 

How do they know that?

How do you know that?

How do I know that?

 

“When we turn over the provision of knowledge to others, we are left vulnerable to their choices, methods, and subjectivities. Sometimes this is a positive, providing expertise, editorial acumen, refined taste. But we are also wary of the intervention, of human failings and vested interests, and find ourselves with only secondary mechanisms of social trust by which to vouch for what is true and relevant.” (Gillespie, 2014, p187)

 

In the field of data analysis and visualization we must be accurate with sources, provide more than less information, and show it in the most logical and digestible way to our viewers. Ultimately we are seeking the truth, which Edward Tufte proselytizes can be found through evidence. If the evidence is shown properly, the right conclusion will be found.

 

Sources:

Aston, Adam (June 10, 2009) “Tufte’s Invisible Yet Ubiquitous Influence” Bloomberg.com https://www.bloomberg.com/news/articles/2009-06-10/tuftes-invisible-yet-ubiquitous-influencebusinessweek-business-news-stock-market-and-financial-advice (retrieved on November 9, 2017)

Bariso, Justin (2017) “Silent Start: The Brilliant and Surprising Meeting Method I learned from Jeff Bezos,”  Inc.com.  https://www.inc.com/justin-bariso/amazons-jeff-bezos-uses-a-brilliant-and-surprising.html  (retrieved on November 9, 2017)

Gillespie T. (2014), “The relevance of algorithms” in Media Technologies: Essays on Communication, Materiality, and Society, eds. T. Gillespie, P. Boczkowski, and K. Foot. Cambridge: MIT Press, 167–194. http://www.tarletongillespie.org/essays/ Gillespie%20-%20The%20Relevance%20of%20Algorithms.pdf with Shapin, Steven. 1995. “Trust, honesty, and the authority of science.” In Society’s Choices: Social and Ethical Decision Making in Biomedicine.

Jensen, R. (2006). “The myth of the neutral professional” in Questioning Library Neutrality, ed. A. Lewis. Library Juice, 89–96.

Lessig, L. (1999). “Open code and open societies: values of internet governance,” Chicago-Kent Law Review 74, 101–116. http://cyber.law.harvard.edu/works/lessig/ final.PDF.

Moor, J. H. (1985). “What is computer ethics?” Metaphilosophy 16(4): 266–275.

Nardi, B.A. (1996). “Studying context: a comparison of activity theory, situated action models and distributed cognition” in Nardi, B. (ed.) Context and Consciousness: Activity Theory and Human-Computer Interaction. MIT Press.

Shapley, Deborah (March 30, 1998) “The da Vinci of Data” The New York Times. (retrieved on November 11, 2017)

Tufekci, Zeynep (Nov 2, 2017) Confronting Surveillance Capitalism with Zeynep Tufekci, Civic Hall, New York City event.

Tufte, Edward (2006). Beautiful Evidence: 83-127.

Wilson, T. D. (2000). “Human information behavior.” Informing Science 3(2): 35.

 

 

 

 

 

 

ASIS&T Speakeasy: Assistive Learning Technologies

Staircase picture

“The world is disabling to people in a wheelchair only if the people building it are filling it with stairs.” – Marc Castellini, Pratt Institute student

 

The way we design our physical and digital worlds can promote social inclusion if done well, or social exclusion if done poorly. It may not always be a designer’s intent to purposefully exclude certain people, but even ignorance is a choice. If a designer doesn’t consider accessibility or universality to be a part of their approach, more often than not, the resultant products restrict people in unanticipated ways.

On Tuesday, November 7, the ASIS&T student organization at Pratt Institute sponsored a speakeasy on Assistive Learning Technologies. Three students in the Information Technologies core curriculum class –Marc Castellini, Arushi Jaiswal, and Hanyu Zhang— presented a research-based web guide on assistive learning technologies, geared towards universities. I think that much of what they discussed can be applied more broadly to libraries, and to UX design principles for any product.

 

Why LIS professionals need to care

First, let’s highlight the problem in more detail. As Library and Information Science students, we have a responsibility to promote equity and inclusion. Social exclusion, after all, is just another form of powerlessness. (Gehner 41) Compound this with the ALA’s official position: in December 2006, the ALA implemented the “Library Services for People with Disabilities Policy,” a policy that recognized that “many people with disabilities face economic inequity, illiteracy, cultural isolation, and discrimination in employment and the broad range of societal activities” (ALA 2006). As part of the policy, it recommends proactive integration of assistive technology in libraries. A wonderful sentiment, only, there are two issues afoot here:

  • The policy was approved and published 10 years after the Americans with Disabilities Act. This is not a matter to ignore; it tells us much about the prioritization of assisting those with disabilities.  And of all organizations, why would the ALA, an organization devoted to equal, unfettered access to information, respond in such a latent manner? This surprised me greatly.
  • The policy states that library staff “should be aware of how available technologies address disabilities and know how to assist all users with library technology.” (ALA 2006) “Should” is always hard to implement and track – “must” is usually much more effective, as it implies some sort of consequence. But surely there are guidebooks on the ALA website to assist librarians with their education and integration of assistive technologies? Well, the only tool on the ALA website dedicated to serving adults with disabilities is the “ASCLA Professional Tools – Standards and Guidelines – Resource List” link, and when selected, it returned a ‘404 – Page Cannot Be Found’ error. There are two other resource links, but these serve a very specific audience: children with disabilities that affect their ability to read print materials.
  • This resources page was last updated in 2007. March 29, 2007. I’m sure I don’t need to tell all of you how much technology has changed in 10 years.

It all begs the question: as a profession, how serious are we about providing services to people of all ages with all kinds of disabilities? How serious can we be when our own flagship organization offers this level of service?

 

How big is this problem, anyway?

I know, I know, in principle, it shouldn’t matter how many people this issue impacts, but it seems to matter nonetheless. ADA-PARC (ADA Participatory Action Research Consortium) made 2014 American Community Survey data available in interactive format.  (ADA-PARC 2014) It shows us that 12.3% of the total U.S. population self-declares as having a disability of some kind. That equates to approximately 43.5 million people. I don’t know about you, but it’s hard for me to conceptualize a picture of how many people that figure truly represents. What if I told you that 43.5 million people is the number of people living in the entire country of Canada…. if it had 10 million more people! The level of social exclusion here is huge by any means – whether you’re measuring by numbers or principle.

 

Equalizing power through assistive technology tools

Our responsibility as LIS professionals escalates when you consider that, “Social exclusion is not simply a result of ‘bad luck’ or personal inadequacies, but rather a product of flaws in the system that create disadvantages for certain segments of the population.” (Gehner 2010) So what can we do? What Castellini, Jaiswal, and Zhang have created is a great start. The web toolkit provides a wide overview of cognitive and physical impairments and maps them to the specific LT (low-tech) and HT (high-tech) assistive technologies that can help. Low-tech can include things that are low-cost, and low-barrier of entry: highlighters, pencil grips, raised line paper. High-tech is the cool stuff we read about in Wired: speech-to-text programs or voice recognition are good examples, both of which limit the need for a keyboard. For dyslexic students, it’s even possible to use symbol-based learning, such as Widget symbols on SymbolWorld, or Makaton symbols, to improve understanding and absorption. Last but not least, web accessibility is another area that incurs massive reward without incurring massive expense. Simple changes can include: using the W3C’s HTML tag best practices to assist with read-aloud services, avoiding dropdown menus, and eliminating Javascript use. There are many, many ways to get started, and I encourage you to view their site to learn more.

 

Looking ahead

So, how can we escalate this issue to more LIS professionals’ attention? Here are a few things I’ve done so far, and a few thoughts of what else we might do:

  • I’ve privately corresponded with the student group that created the Assistive Learning Technologies site, and asked if they would consider submitting their work to the ALA for linking. Considering the paucity of information on the site, I felt that it would be a worthy contribution to the ALA Diversity group’s page. Even if they don’t include the site itself, my hope is that it brings to the ALA’s attention the lack of updated information available on their site.
  • I’ve emailed the Diversity committee at ALA to request that the broken link to their outreach toolkit is addressed, and that they consider updating their page to reflect current resources and technologies.
  • Next time you’re at an industry event or surfing a group’s website, get curious. See what you can find about assistive technology integration, or accessibility issues in general. How is the group addressing these issues? Do you agree with their approach? How can it be improved? If you can’t find anything at all, what a great opportunity to begin the conversation!
  • If you are an information professional currently working in an organization, assess the ways in which your organization (its website, its programs, etc.) are inclusive or exclusive of people with disabilities. If it can do better (and it usually can), can you adopt some of these technologies or re-design the website in a way that facilitates universal use?

Last but not least, look at the world around you with a critical eye. Sometimes all it takes to start moving things in the right direction is the different point of view.

 

Sources

ADA-PARC. (2014). “Percentage of Total Population with Disabilities.” Retrieved from http://centerondisability.org/ada_parc/utils/indicators.php?id=43&palette=3

American Library Association. (2006 December 4). “Library Services for People with Disabilities Policy.” Retrieved on November 8, 2017 from http://www.ala.org/ascla/resources/libraryservices

American Library Association. (2007 March 29). “Outreach Resources for Services to People with Disabilities.” Retrieved from http://www.ala.org/advocacy/diversity/outreachtounderservedpopulations/servicespeopledisabilities

Castellini, M., Jaiswal, A., Zhang, Hanyu. (2017). “Assistive Learning Technologies.” Retrieved from http://mysite.pratt.edu/~ajaiswal/homepage.html

Gehner, John. (2010). “Libraries, Low-Income People, and Social Exclusion.” Public Library Quarterly, 29:1, 39-47

Analyzing the Effects of Data Collection on Endangered Animal Populations

Bloomberg's Data For Good Exchange 2017
Bloomberg’s Data For Good Exchange 2017

On September 24, 2017 Bloomberg hosted the fourth annual Data For Good Exchange. According to Bloomberg, the conference enables data scientists from academia, industry and public sector actors from government and NGOs to build relationships, share insights and progress, and encourages them to work together on applying modern machine learning and data science methods to challenges in the public and non-profit sectors (Data for Good Exchange 2017). The event held panels that addressed novel methods for collecting data; collaborations to address the global refugee crisis; utilizing data to aid vulnerable and youth populations; and the effects of big data and judicial bias in the criminal justice system. Throughout the different panels, major themes appeared regarding the ethics of data collection and research. Specifically, panelists touched upon the possible unintended consequences of research. Although various panels and papers discussed these effects, an organization called Wildbook presented the most concrete consequences.

Wildbook is an initiative that merges crowdsourcing, computer vision and data science for conservation efforts to combat animal extinction. It aggregates photographs and videos of animals to provide information regarding endangered animal populations across the world. Wild book’s technology merges algorithms and machine learning to identify animals through their physical characteristics such as cheetah spots or whale flukes. According to Wildbook, the organization combines vision and user interaction design to create a quick and accurate edge mapper to identify animals by their individual characteristics (Services).

Wildbook - Cheetah Marking Area
Wildbook – Cheetah Marking Area

According to a data scientist at Wildbook, the team launched the organization in order more accurately count populations of endangered species. Prior to Wildbook, scientists estimated animal populations throughout the world utilizing satellite imagery, a measurement practice that has proven to be imprecise and costly. Now through the usage of Wildbook’s technology, tourist photography and YouTube videos can be scraped according to their dates and geo-location. The blending of algorithms and machine learning can then detect the animal’s specific physical characteristics to collect information on the animal’s network, travel patterns and population size.

Although some benefits of Wildbook include the ability to more accurately gauge the number of certain endangered species, other benefits involve tracking mobility patterns, animal social networks, and individual animal wellbeing. Through the use of embedded geo-tagging properties in cameras and videography, scientists can track a population’s or an individual animal’s movement patterns. For example, the software allows scientists to research and track humpback whale travel patterns across the Atlantic and giraffe migrations in Africa. Although beneficial for animal behavior research, capturing movement patterns also allows scientists to observe the effects of severe weather conditions such as hurricanes and floods on animal populations.

Wildbook also allows scientists to observe an animal’s social network. It derives the information from photographs and videos where animals appear together, as well as through similar geo-tag location. Collecting information on an animal’s social network may be beneficial for studying animals’ behavioral patterns and species interactions. Scientists also benefit by tracking an animal at the individual level. For example, Wildbook can identify the exact animal depicted in a photograph by name and can present the animal’s history, including when they first appeared on Wildbook, what other animals comprise its network and where it was last seen. Providing information on an individual animal allows researchers to check into how the animal is living and examine its wellbeing.

Although Wildbook provides a collection of beneficial information that can influence scientist’s ability to study animal populations, the organization discovered impactful unintended consequence for the animals represented through the software. Wildbook’s population estimation, location and network capabilities facilitate the tracking of these animals, a feature poachers have began exploiting. Due to the software’s ease of use, location precision and it’s benefit of being up to date with scraping occurring daily, poachers can more easily find the geographical location of the animals they wish to hunt through the use of the software. According to the Program for Ethnographic Research & Community Studies (PERCS), a dilemma may arise in which the software pits the interests of the researcher against the interests of the community (Merz, 1998). In this case, the “interests of the community” lie in the wellbeing of the animals themselves, who most certainly don’t care about being assessed or tracked, but do suffer due to poaching activities.

Wildbook - Spotting Giant Sea Bass
Wildbook – Spotting Giant Sea Bass

During the conference, Wildbook researchers stated that they had not yet devised a solution to poachers exploiting the software. Although the organization pride’s itself on being accessible to everyone through open-access software, this makes it easier for poachers to obtain geo-location information on the animals. According to PERCS, careful consideration should also be given to publication and distribution channels when presenting research and data collection. They state that as we think about methods of reporting, we must also think about the locations of that reporting (Merz, 1998) as they may be impactful to subject of the research.

Overall, although scientists generally choose to perform research in order to raise awareness or solve problems facing individuals or populations, the research they perform carries weight and might sometimes have unpredictable effects. In the case of Wildbook, the benefit the software provides is important, but the consequences to wildlife are significantly impactful and might create greater repercussions for the populations being studied—endangered species throughout the world. Wildbook should weigh both the benefits and negative implications of their research as well as their information dissemination methods in order to ensure that their research subjects are not being disproportionately disadvantaged.

 

References

Data for Good Exchange 2017. (n.d.). http://www.bloomberg.com/company/d4gx/.

Services. (n.d.). http://www.wildme.org/services/

Merz, T. (1998). The Ethics of Fieldwork. http://www.elon.edu/docs/e-web/org/percs/EthicsModuleforWeb.pdf.

 

 

 

Future of Storytelling Festival Event

The future of storytelling (FoST) festival is an immersive storytelling event covers exhibits, panels conversations, lectures from thinkers and practitioners from diverse fields, interactive performance about how to use the cutting-edge technologies, media and communication ways to telling stories in the future. [FoST] On October 6th, I went to Staten Island for experience interesting people’s projects and explorations of storytelling.

Processed with VSCO with g3 preset

The consequence beyond my thought, I was excepted to just see some VR or AR shows and immerse in a thrill of the chase. It was thrilling and also meaningful when I finish the lecture about “Refining Identity through the lens of the media”.

IMG_0557

The talker contains Wendy Calhoun, a writer, and producer of TV-serous; Joe Lewis, head of comedy, drama & VR Amazon studios and Jose Antonio Vargas, Kay Wilson Stallings. Wendy said she refuses to tell “color-blind” [2008] stories, for colorblind stories encourages the writers to be generic in their choice. In fact, the choice of giving a person or actor a cultural specificity could bring the character to life in a much more authentic way. [FoST] The reason why we avoid to express our true thought is that we could not be accepting the situation or the status quo of bias, prejudice and people’s thoughts based on their culture, community, and faith. [2004] She then pointed out that diversity is so much more than race and gender “When we talk about diversity, we say the female, people with color…Diversity is also height, weight…So many different things in the world.” That reminds me to think of Vinopal’s article [2006] about workforce diversity, the homogenization of gender, color and social category, generation, diversity covers so board range of society. We may see the importance of co-operating, for the enterprise culture, better serve the diverse community. but the reason why we still could not see the diversification may not only for the pipeline issues but the dishonesty. The dishonesty causes the ignorance of bias, that could not be measured by any questionnaire or interview. When information professional arranges the records, empathy matters, know the story and emotion of others and really put ourselves in their shoes. What I agree with is the importance of take action, no matter in gender realm or others, like Wajcman’s article let more female get into science, not only talk about what we should deserve and do nothing, only if the situation been changed, fewer judgement about what kind of job should what kind of people do. [2010] Annevar Bush’s As We May Think said scientific reasoning should not only limit to logical processes, that could impede our way for understanding the world. [1945] If we see technology as physical devices, it’s hard to create substantial technology progress. Yochai Benkler [2006] mentions social production in his book. If discards the threaten of intellectual property, people transact knowledge by lower cost, highly effective and board way. We are already breaking through the wall of disciplines, more identity conscious needs breakthrough.

The information heritage needs authentic, research and scrutiny, by achieves, librarians, writers…, Wendy Calhoun than describes her experience of research, once she needs to write a chapter about Kentucky, and she never been there before, so she went there and talked with Kentucky’s police officer, asked them questions. One officer named Walt told her she’s real-life bullet. She said, “Compare actually see where she lived, actually heard what she did, plus, the little more stories as we walk into the room and pitch it.”[FoST], that could be the real passion of doing the job. People were doing that have the extraordinary responsibility to make sure that all stories authentic as possible. You have to do the research. Do it right, not to not do it.

 

 

Work Citing

“FoST FESTIVAL.” Future of StoryTelling | Reinventing the Way Stories Are Told, futureofstorytelling.org/fest.

Burdman, Pamela (2008). “Exposing the truth and fiction of racial data” (PDF). California Magazine. Cal Alumni Association: 40–46. Retrieved 18 January 2008.

Jennifer Vinopal(2006). “The Quest for Diversity in Library Staffing: From Awareness to Action” In the Library with the Lead Pipe, www.inthelibrarywiththeleadpipe.org quest-for-diversity, 2006.

Robert Jensen(), “The Myth of the Neutral Professional” Progressive Librarian No. 24, 2004.

Judy Wajcman (2010). “Feminist theories of technology” Cambridge Journal of Economics, Volume 34, Issue 1, Pages 143–152, 1 January 2010.

Bush, Vannevar (1945). “As We May Think” Atlantic Monthly 176, pp. 101-108, July 1945.

Pawley, C. (2003). “INFORMATION LITERACY: A CONTRADICTORY COUPLING” Library Quarterly73(4), 422-452.

Benkler, Y. (2006). “Introduction: a moment of opportunity and challenge” in The Wealth of Networks: How Social Production Transforms Markets and Freedom. Yale University Press, 1–18.

SLA New York Conference and Expo 2017

On Friday October 20th I attended the 2017 SLA NY chapter’s conference and expo at Baruch College in New York City. This year’s theme was Resilience: Navigating the Information Landscape. They had a lineup of fantastic speakers from all areas of information professions, all of whom have been resilient and successful in their careers in the ever-changing information world. The conference hosted two keynote speakers, and eight panels throughout the day. Although each panel held noteworthy speakers with much insight on career paths and the growth of information professionals, this article will focus on the two keynote speakers and a panel on fake news and how to combat misinformation.

The conference kicked off with our morning keynote speaker, CEO of Sterling Talent Solutions, Clare Hart, talking about opportunity, resilience, and success. Hart started by congratulating the audience, most of which have obtained or are in the process of obtaining a master’s degree, a degree held by less than ten percent of adults over the age of 25 in the United States. A Master’s of Library and Information Science can open up many opportunities to individuals seeking professions in libraries, information, data, and increasingly in the technology fields. There is an opinion by some that there will be less of a need for information professionals in the future, as more information is accessible to the public. Hart retaliates by discussing just a few information/data jobs that will be seeing a growth in the near future, such as: Market Research Analyst, Data Scientist, Operations Research Analysis, and Data Governance/Data Domain Curator. At a time of societal change, where some doors close others will open, and there will always be a need for information professionals in the digital shift. We are in an age of acceleration, and “we can’t escape these accelerations. We have to dive into them, take advantage of their energy and flows where possible, move with them, use them to learn faster, design smarter, and collaborate deeper.” Hart addresses the need to retool our educational systems to maximize skills and attributes that will prepare people with top employability skills, placing an emphasis on the communication and planning skillsets. Referencing her own transitional stages between jobs, Hart gives us a list of things to write down during times of transition: write down what you did well, what you could’ve done better or differently, where you want to go/what kind of company or organization you want to work for, research that job and write down the top choices while weighing the pros and cons. These lists will serve as lessons in self-awareness, one of the major components of being a successful and resilient information professional. It’s important to remember that we are all unique, and with a master’s in LIS we already have or are working towards “fabulous credentials,” that will help us take advantage of the many opportunities that are being created in the market today. We must remember that it’s our attitude that will help us get the most out of lifelong learning, and that being self-aware will lead to positive transitions. Hart concluded her presentation with those key takeaways to carry with us into our future professions.

With the rise of social media and the growing access of information and opinions to the public, fake news has become a buzzword. One of the morning panels, In-Credible Sources: Fake News in the Info Age, addresses the fake news of today and how journalists and researchers can combat it.  The panel was hosted by Brandy Zadrozny and Kathy Deveny. Zadrozny is a researcher and reporter for the Daily Beast, and previously worked as a news librarian at ABC News and Fox News. Deveny is a managing director at Kekst, a leading strategic, corporate, and financial communications firm, and previously worked as an editor and writer, including deputy editor of Newsweek. Both speakers focused on the topic of misinformation in an overly-saturated information society. News outlets like Fox employed news librarians to help with research and fact-checking, but now with the cutting of many news librarian jobs, the reporters are in charge of doing their own research and fact-checking. Zadrozny points out that many people are just simply over fact-checks and will continue to read what they want to read. A popular culprit of misinformation is what is known as the “sexy press releases.” In science and health research, scientists need funding, and they get funding by writing articles. The articles are boosted by press releases that feed the public snippets of facts that are easily misconstrued into untruths. Deveny talks about fake news in the corporate realm. A lot of fake news on corporations comes from competitors causing chaos. A company’s reputation is more in danger now than ever as people take to social media and the emergence of online boycotts. How do we combat fake news in the media when people just aren’t skeptical enough? This is the challenge for information professionals like Zadrozny and Deveny, how do we teach people to be more skeptical? A short answer lies somewhere in feeding the public what they want, turning fact-checks into something easily digestible by telling a story in a fun and entertaining way. To combat fake news and get beneath the lies and untruths of misinformation, we need to follow through on skepticism, going with our gut feelings. If a story doesn’t sound right, we need to get interested in checking things out, we need to start poking holes. By contradicting things and being more skeptical, we create controversy and garner more attention. Journalists and reporters can also start by putting out factual videos to combat fake news. But as people are flooded with an abundance of information through Twitter, Facebook, and dark areas of the internet, the challenge on how to get people to this level of skepticism still remains.

The challenges that information professionals are facing, how to bridge the gap between information producers and information consumers, how to teach people to be more skeptical, or how to make our transitions into the growing technological society positive ones, are hard issues. Our afternoon keynote speaker Cynthia Cheng Correia, author, adjunct professor at Simmons College, and member of the Council of Competitive Intelligence Fellows, gave us some thoughts on how to address these challenges in her presentation, How Strong is your Professional Resilience? Correia teaches her students about competitive intelligence and how to prepare for the newer information landscape with tools to look at indicators in foresight. The questions she aims to tackle revolve around building a collective resilience. By combining professional preparation and personal resilience, we can create professional resilience in mindset and perspective. Resilience means being able to persist and adapt in the face of changes. It’s not just about fixing problems, but learning from them. In regard to the changes in information tools, Correia states that we need to keep up, that we need to think about how to respond, and that we need to anticipate. So how do we do this? We start with ourselves, our own independent resilience. It’s important to foster healthy relationships, through friends, family, colleagues, mentorships, and professional networks. These will give us a foundation of support, validation, empathy, and perspective. We also must be able to make a plan, this will aid in focus, problem-solving, foresight, and compartmentalizing. While making plans we must also remember to be positive in outlook (adjusting our approach to the problem at hand), realism (looking at the situation as it is), and a constant forward-looking attitude. Correia further goes into the importance of fostering our passions and growing with them, stating that the growth process isn’t about overcoming, it’s about enjoying the process and learning from it. She addresses the barriers to resilience: denial, habits, biases, silos (walls that we put up as “safe spaces”), behaviors, fear of failure, lack of self-awareness, and life’s challenges. These barriers aren’t just in individuals but in whole professions as well. In order to keep up with the changing information landscape, we must move past these barriers, strengthening our resilience, and re-evaluating our educational system to provide the proper tools for successfully navigation an information-heavy society.

The world of information is constantly changing and technologies are providing new ways of accessing and analyzing data and information. The information professions must keep up with these changes, following the latest news and trends in technology and building resilience in the workplace. This year’s SLA conference addressed some of these issues we are facing in current shifts, and provided stepping stones as to how to navigate them.

 

http://newyork.sla.org/events-2/slany-expo-2017/

Response to “The Quest for Diversity in Library Staffing”

After reading Jennifer Vinopal’s article, “The Quest for Diversity in Library Staffing: From Awareness to Action” (2016), I have to admit I wasn’t surprised at the lack of diversity in the American Library system, but I did feel nonetheless a deep sense of disappointment. After reviewing the latest numbers published by the American Library Association (2009-2010), 88% of the credentialed librarians in this country are white. Of the 22% in our field that represent African Americans, Asian and Pacific Islanders (API), Native Americans, including Alaskan, Two or more races, and Latinos, there are only 138 active African American library directors in the US, according to Michael Kelley in “Diversity Never Happens: The Story of Minority Hiring Doesn’t Seem To Change Much.” He also notes that “African Americans and Hispanics are some of the strongest supporters of libraries, and yet they continue to be thinly represented among the ranks of librarians.” All of these figures are very disturbing, to say the least, and left me asking myself the same question, what can we do to effectively challenge the current racial and power structures that exist in our profession? (Hudson, 2017) I don’t believe that I have an answer, not just yet, but I want to be part of the conversation and take a stand.

fullsizeoutput_5c4

In “The myth of the neutral professional” (2006), Jensen challenges us to stand up and take a side because “neutrality is impossible.” He continues, “[i]n any situation, there exists a distribution of power…To take no explicit position by claiming to be neutral is also a political choice, particularly when one is given the resources that make it easy to evaluate the consequences of that distribution of power and, at least potentially, affect its distribution.” We as LIS students have the resources. So now it is time for us to choose a side. Are we to stand by and idly watch as this lack of diversity continues to repeat itself, or do we choose to use our privilege and resources to affect change? We need to look at the failures of past diversity programs and not allow ourselves to repeat those failures by “diversifying without dismantling power differentials” (Vinopal, 2016) that currently exist.

These racial and power structures are not limited to the LIS profession, they are deeply entrenched in every area of our society today. But who will we be tomorrow? In “Why Diversity Matters: A Roundtable Discussion on Racial And Ethnic Diversity in Librarianship,” Juleah Swanson, Head of Acquisition Services at the University of Colorado Boulder, gives us a great place to start by asking ourselves, “What innovative ways can we educate and teach colleagues and students about complex issues like microaggressions, institutional racism, and privilege, reflecting both traditional means of teaching such as lectures and readings, and through learned experiences?” It is our responsibility as LIS students to continue to research and try to understand why these racial and power systems exist and lead the change that will diversify and better our profession.

“ ‘Diversity’ is named and defined in places of great power.” – Sandra Ríos Balderrama

—————–

References

Balderrama, S. (2000). This Trend Called Diversity. Library Trends: Ethnic Diversity in Library and Information Science 49 (1): 194-214.

http://www.ala.org/aboutala/sites/ala.org.aboutala/files/content/diversity/diversitycounts/diversitycountstables2012.pdf

Hudson, D. J. (2017). On “Diversity” as Anti-Racism in Library and Information Studies: A Critique. Journal of Critical Library and Information Studies 1(1). DOI: 10.24242/jclis.v1i1.6

Jensen, R. (2006). The myth of the neutral professional. Questioning Library Neutrality, ed. A. Lewis. Library Juice, 89–96. http://jonah.eastern.edu/emme/2006fall/jensen.pdf

Kelley, M. (2013). Diversity Never Happens: The Story of Minority Hiring Doesn’t Seem To Change Much | Editorial. http://lj.libraryjournal.com/2013/02/opinion/editorial/diversity-never-happens-the-story-of-minority-hiring-doesnt-seem-to-change-much/#_ .

Swanson, J., Damasco, I., Gonzalez-Smith, I., Hodges, D., Honma, T., and Tanaka, A. (2015) Why Diversity Matters: A Roundtable Discussion on Racial And Ethnic Diversity in Librarianship. http://www.inthelibrarywiththeleadpipe.org/2015/why-diversity-matters-a-roundtable-discussion-on-racial-and-ethnic-diversity-in-librarianship/ .

Vinopal, J. (2016). The Quest for Diversity in Library Staffing: From Awareness to Action. Lead Pipehttp://www.inthelibrarywiththeleadpipe.org/2016/quest-for-diversity