Explore our articles
View All Results

Stefaan Verhulst

Blogpost by Titus Alexander: “The natural sciences comprise of a set of institutions and methods designed to improve our understanding of the physical world. One of the most powerful things science does is to produce theories – models of reality – that are used by others to change the world. The benefits of using science are so great that societies have created many channels to develop and use research to improve the human condition.

Social scientists also seek to improve the human condition. However, the channels from research to application are often weak and most social research is buried in academic papers and books. Some will inform policy via think tanks, civil servants or pressure groups but practitioners and politicians often prefer their own judgement and prejudices, using research only when it suits them. But a working example – the institution as the method – has more influence than a research paper. The evidence is tangible, like an experiment in natural science, and includes all the complexities of real life. It demonstrates its reliability over time and provides proof of what works.

Reflexivity is key to social science

In the physical sciences the investigator is separate from the subject of investigation and she or he has no influence on what they observe. Generally, theories in the human sciences cannot provide this kind of detached explanation, because societies are reflexive. When we study human behaviour we also influence it. People change what they do in response to being studied. They use theories to change their own behaviour or the behaviour of others. Many scholars and practitioners have explored reflexivity, including Albert BanduraPierre Bourdieu and the financier George Soros. Anthony Giddens called it the ‘double hermeneutic’.

The fact that society is reflexive is the key to effective social science. Like scientists, societies create systematic detachment to increase objectivity in decision-making, through advisers, boards, regulators, opinion polls and so on. Peer reviewed social science research is a form of detachment, but it is often so detached to be irrelevant….(More)”.

Institutions as Social Theory

Joseph Cox at Motherboard: ” In January, Motherboard revealed that AT&T, T-Mobile, and Sprint were selling their customers’ real-time location data, which trickled down through a complex network of companies until eventually ending up in the hands of at least one bounty hunter. Motherboard was also able to purchase the real-time location of a T-Mobile phone on the black market from a bounty hunter source for $300. In response, telecom companies said that this abuse was a fringe case.

In reality, it was far from an isolated incident.

Around 250 bounty hunters and related businesses had access to AT&T, T-Mobile, and Sprint customer location data, with one bail bond firm using the phone location service more than 18,000 times, and others using it thousands or tens of thousands of times, according to internal documents obtained by Motherboard from a company called CerCareOne, a now-defunct location data seller that operated until 2017. The documents list not only the companies that had access to the data, but specific phone numbers that were pinged by those companies.

In some cases, the data sold is more sensitive than that offered by the service used by Motherboard last month, which estimated a location based on the cell phone towers that a phone connected to. CerCareOne sold cell phone tower data, but also sold highly sensitive and accurate GPS data to bounty hunters; an unprecedented move that means users could locate someone so accurately so as to see where they are inside a building. This company operated in near-total secrecy for over 5 years by making its customers agree to “keep the existence of CerCareOne.com confidential,” according to a terms of use document obtained by Motherboard.

Some of these bounty hunters then resold location data to those unauthorized to handle it, according to two independent sources familiar with CerCareOne’s operations.

The news shows how widely available Americans’ sensitive location data was to bounty hunters. This ease-of-access dramatically increased the risk of abuse….(More)”.

Hundreds of Bounty Hunters Had Access to AT&T, T-Mobile, and Sprint Customer Location Data for Years

Report by Congressional Research Service: “Artificial intelligence (AI) is a rapidly growing field of technology with potentially significant implications for national security. As such, the U.S. Department of Defense (DOD) and other nations are developing AI applications for a range of military functions. AI research is underway in the fields of intelligence collection and analysis, logistics, cyber operations, information operations, command and control, and in a variety of semi-autonomous and autonomous vehicles.

Already, AI has been incorporated into military operations in Iraq and Syria. Congressional action has the potential to shape the technology’s development further, with budgetary and legislative decisions influencing the growth of military applications as well as the pace of their adoption.

AI technologies present unique challenges for military integration, particularly because the bulk of AI development is happening in the commercial sector. Although AI is not unique in this regard, the defense acquisition process may need to be adapted for acquiring emerging technologies like AI.

In addition, many commercial AI applications must undergo significant modification prior to being functional for the military. A number of cultural issues also challenge AI acquisition, as some commercial AI companies are averse to partnering with DOD due to ethical concerns, and even within the department, there can be resistance to incorporating AI technology into existing weapons systems and processes.

Potential international rivals in the AI market are creating pressure for the United States to compete for innovative military AI applications. China is a leading competitor in this regard, releasing a plan in 2017 to capture the global lead in AI development by 2030. Currently, China is primarily focused on using AI to make faster and more well-informed decisions, as well as on developing a variety of autonomous military vehicles. Russia is also active in military AI development, with a primary focus on robotics. Although AI has the potential to impart a number of advantages in the military context, it may also introduce distinct challenges.

AI technology could, for example, facilitate autonomous operations, lead to more informed military decisionmaking, and increase the speed and scale of military action. However, it may also be unpredictable or vulnerable to unique forms of manipulation. As a result of these factors, analysts hold a broad range of opinions on how influential AI will be in future combat operations.

While a small number of analysts believe that the technology will have minimal impact, most believe that AI will have at least an evolutionary—if not revolutionary—effect….(More)”.

Artificial Intelligence and National Security

Book edited by Nathalie Behnke, Jörg Broschek and Jared Sonnicksen: “This edited volume provides a comprehensive overview of the diverse and multi-faceted research on governance in multilevel systems. The book features a collection of cutting-edge trans-Atlantic contributions, covering topics such as federalism, decentralization as well as various forms and processes of regionalization and Europeanization. While the field of multilevel governance is comparatively young, research in the subject has also come of age as considerable theoretical, conceptual and empirical advances have been achieved since the first influential works were published in the early noughties. The present volume aims to gauge the state-of-the-art in the different research areas as it brings together a selection of original contributions that are united by a variety of configurations, dynamics and mechanisms related to governing in multilevel systems….(More)”.

Configurations, Dynamics and Mechanisms of Multilevel Governance

Paper by Anna Wilson and Stefano De Paoli at First Monday: “Social and socioeconomic interactions and transactions often require trust. In digital spaces, the main approach to facilitating trust has effectively been to try to reduce or even remove the need for it through the implementation of reputation systems. These generate metrics based on digital data such as ratings and reviews submitted by users, interaction histories, and so on, that are intended to label individuals as more or less reliable or trustworthy in a particular interaction context. We undertake a disclosive archaeology (Introna, 2014) of typical reputation systems, identifying relevant figuration agencies including affordances and prohibitions, (cyborg) identities, (cyborg) practices and discourses, in order to examine their ethico-political agency.

We suggest that conventional approaches to the design of such systems are rooted in a capitalist, competitive paradigm, relying on methodological individualism, and that the reputation technologies themselves thus embody and enact this paradigm within whatever space they operate. We question whether the politics, ethics and philosophy that contribute to this paradigm align with those of some of the contexts in which reputation systems are now being used, and suggest that alternative approaches to the establishment of trust and reputation in digital spaces need to be considered for alternative contexts….(More)”.

On the ethical and political agency of online reputation systems

Paper by Alvaro Gonzalez Rivas, Mariya Tsyganova and Eliza Mik: “Many expect Smart Contracts (SC’s) to disrupt the way contracts are done implying that SC have the potential to affect all commercial relationships. SC’s are automatization tools; therefore, proponents claim that SC’s can reduce transaction costs through disintermediation and risk reduction.

This is an over-simplification of the role of relationships, contract law, and risk. We believe there is a gap in the understanding of the capabilities of SC’s. With that in mind we seek to define an amorphous term and clarify the capabilities of SC’s, intending to facilitate future SC research. We’ve examined the legal, technical, and IS views from an academic and practitioner’s perspective. We conclude that SC’s have taken many forms, becoming a suitcase word for any sort of code stored on a blockchain, including the embodiment of contractual terms; and that the immutable nature of SC’s is a barrier to their adoption in uncertain and multi-contextual environments….(More)”.

Smart Contracts and Their Identity Crisis

Book by Neil Selwyn: “The rise of digital technology is transforming the world in which we live. Our digitalized societies demand new ways of thinking about the social, and this short book introduces readers to an approach that can deliver this: digital sociology.

Neil Selwyn examines the concepts, tools and practices that sociologists are developing to analyze the intersections of the social and the digital. Blending theory and empirical examples, the five chapters highlight areas of inquiry where digital approaches are taking hold and shaping the discipline of sociology today. The bookexplores key topics such as digital race and digital labor, as well as the fast-changingnature of digital research methods and diversifying forms of digital scholarship.

Designed for use in advanced undergraduate and graduate courses, this timely introduction will be an invaluable resource for all sociologists seeking to focus their craft and thinking toward the social complexities of the digital age….(More)”.

What is Digital Sociology?

Dissertation by Chia-Fang Chung: “Many people collect and analyze data about themselves to improve their health and wellbeing. With the prevalence of smartphones and wearable sensors, people are able to collect detailed and complex data about their everyday behaviors, such as diet, exercise, and sleep. This everyday behavioral data can support individual health goals, help manage health conditions, and complement traditional medical examinations conducted in clinical visits. However, people often need support to interpret this self-tracked data. For example, many people share their data with health experts, hoping to use this data to support more personalized diagnosis and recommendations as well as to receive emotional support. However, when attempting to use this data in collaborations, people and their health experts often struggle to make sense of the data. My dissertation examines how to support collaborations between individuals and health experts using personal informatics data.

My research builds an empirical understanding of individual and collaboration goals around using personal informatics data, current practices of using this data to support collaboration, and challenges and expectations for integrating the use of this data into clinical workflows. These understandings help designers and researchers advance the design of personal informatics systems as well as the theoretical understandings of patient-provider collaboration.

Based on my formative work, I propose design and theoretical considerations regarding interactions between individuals and health experts mediated by personal informatics data. System designers and personal informatics researchers need to consider collaborations occurred throughout the personal tracking process. Patient-provider collaboration might influence individual decisions to track and to review, and systems supporting this collaboration need to consider individual and collaborative goals as well as support communication around these goals. Designers and researchers should also attend to individual privacy needs when personal informatics data is shared and used across different healthcare contexts. With these design guidelines in mind, I design and develop Foodprint, a photo-based food diary and visualization system. I also conduct field evaluations to understand the use of lightweight data collection and integration to support collaboration around personal informatics data. Findings from these field deployments indicate that photo-based visualizations allow both participants and health experts to easily understand eating patterns relevant to individual health goals. Participants and health experts can then focus on individual health goals and questions, exchange knowledge to support individualized diagnoses and recommendations, and develop actionable and feasible plans to accommodate individual routines….(More)”.

Using Personal Informatics Data in Collaboration among People with Different Expertise

DemocracyLab: “Today’s most significant problems are being addressed primarily by governments, using systems and tools designed hundreds of years ago. From climate change to inequality, the status quo is proving inadequate, and time is running out.

The role of our democratic institutions is analogous to breathing — inhaling citizen input and exhaling government action. The civic technology movement is inventing new ways to gather input, make decisions and execute collective action. The science fiction end state is an enlightened collective intelligence. But in the short term, it’s enough to seek incremental improvements in how citizens are engaged and government services are delivered. This will increase our chances of solving a wide range of problems in communities of all scales.

The match between the government and tech sectors is complementary. Governments and nonprofits are widely perceived as lagging in technological adoption and innovation. The tech sector’s messiah complex has been muted by Cambridge Analytica, but the principles of user-centered design, iterative development, and continuous learning have not lost their value. Small groups of committed technologists can easily test hypotheses about ways to make institutions work better. Trouble is, it’s really hard for them to earn a living doing it.

The Problem for Civic Tech

The unique challenge facing civic tech was noted by Fast Forward, a tech nonprofit accelerator, in a recent report that aptly described the chicken and egg problem plaguing tech nonprofits:

Many foundations will not fund a nonprofit without signs of proven impact. Tech nonprofits are unique. They must build their product before they can prove impact, and they cannot build the tech product without funding.

This is compounded by the fact that government procurement processes are often protracted and purchasers risk averse. Rather than a thousand flowers blooming in learning-rich civic experiments, civic entrepreneurs are typically frustrated and ineffectual, finding that their ideas are difficult to monetize, met with skepticism by government, and starved for capital.

These challenges are described well in the Knight and Rita Allen Foundations’ report Scaling Civic Tech. The report notes the difference between “buyer” revenue that is earned from providing services, and “builder” capital that is invested to increase organizations’ capacities. The report calls for more builder capital investment and better coordination among donors. Other recommendations made in the report include building competencies within organizations by tapping into knowledge sharing resources and skilled volunteerism, measuring and communicating impact, and nurturing infrastructure that supports collaboration….(More)”.

The Untapped Potential of Civic Technology

WeDialogue: “… is a global experiment to test new solutions for commenting on news online. The objective of weDialogue is to promote humility in public discourse and prevent digital harassment and trolling.

What am I expected to do?

The task is simple. You are asked to fill out a survey, then wait until the experiment begins. You will then be given a login for your platform. There you will be able to read and comment on news as if it was a normal online newspaper or blog. We would like people to comment as much as possible, but you are free to contribute as much as you want. At the end of the experiment we would be very grateful if you could fill in a final survey and provide us with feedback on the overall experience.

Why is important to test new platforms for news comments?

We know the problems of harassment and trolling (see our video), but the solution is not obvious. Developers have proposed new platforms, but these have not been tested rigorously. weDialogue is a participatory action research project that aims to combine academic expertise and citizens’ knowledge and experience to test potential solutions.

What are you going to do with the research?

All our research and data will be publicly available so that others can build upon it. Both the Deliberatorium and Pol.is are free software that can be reused. The data we will create and the resulting publications will be released in an open access environment.

Who is weDialogue?

weDialogue is an action research project led by a team of academics at the University of Westminster (UK) and the University of Connecticut (USA).  For more information about the academic project see our academic project website.…(More)”.

WeDialogue

Get the latest news right in you inbox

Subscribe to curated findings and actionable knowledge from The Living Library, delivered to your inbox every Friday