2 Matching Annotations
- Oct 2017
-
Local file Local file
-
Cohenreferstoblockingas‘architecturesofcontrol’and‘regimesofauthorization’thatareauthoritarianinthegenericsensethattheyfavourcompliantobediencetoauthority.[11]Ratherthanexperiencingrules—whichneednotbeexplainedordisclosed—shearguesthatusersexperiencetheireffects,whichconsistofpossibilitiesforactionthatnetworkscreate.Sowhileconcernsaboutthesurveillanceandcollectionofdigitaltracesaremostcontroversial(discussedbelow),thetransparencyofnetworkprocessesandhowaccesstoknowledgeisbeingfilteredarelessvisibleandcontrollable.Filteringalsooccursthroughtheauthorizationsattachedtocontentanddevices
[...] So while sharing is a calling, it is increasingly only within certain regimes of authorization that sharing operates, and in this regard it can be understood as a form of submission.
-
Thatthesedemandshaveemergedinthespanofonlyafewyearsatteststowhatwecallthe‘closings’ofcyberspace.ThesedemandsandtheirclosingsareeffectsofthewayinwhichactingthroughtheInternethasresignifiedquestionsofvelocity,extensity,anonymity,andtraceability.Velocitycallsforregularandongoingvigilanceaboutrapidlychangingtechnologies,protocols,practices,platforms,andrulesaboutbeingdigital;extensitycallsforawarenessofwhereandtowhomdigitalactionsreach;anonymitycallsforlimitingandprotectingexposureandbeingcautiousaboutthepresumedidentitiesofothers;andtraceabilitycallsformanaginghowactionsaretracked,analysed,manipulated,andsortedbyunknownothersandforunknowablepurposes.Allofthesedemandsspringnotfromparticipating,connecting,andsharingalonebuttherelationsbetweenandamongbodiesactingthroughtheInternet,whichismadeupofconventionsconfiguredbytheactionsofdispersedanddistributedauthorities.Itistotheseconfiguringactions,whichwecalltheclosingsofcyberspace,thatweturntointhenextchapter,withafocusonfiltering,tracking,andnormalizing.
-