Society and the Internet, 2nd Edition

It is such a pleasure to see the publication today of the second edition of Society and the Internet by Oxford University Press. My co-editor, Mark Graham, and I worked long and hard to assemble a wonderful set of authors to build on the first edition. The success of the original volume led to this new edition. The pace and scale of changes in the issues surrounding the Internet led to almost a completely new set of chapters. Information about the 2nd edition is available on the OUP web site for the paperback edition here, and the hardback here.

Society and the Internet, 2nd Edition

Our thanks to OUP and the many professional staff who helped us produce this new 2nd edition, and particularly to my friend Steve Russell for the brilliant art work on the cover. Thanks as well to the OII, which inspired our lecture series that led to these volumes, and OII colleagues who launched much of the research that informs them. I hope you can read the acknowledgements in full as we owe thanks to so many individuals and institutions, such as MSU’s Quello Center, which together with the Global Cyber Security Capacity Centre, supported my own contributions to this second edition.

We owe incredible thanks to our colleague Manuel Castells for his insightful foreword and all the authors of the book’s 24 chapters. These colleagues endured our many requests and most importantly accepted our call to contribute to what we hope will be a perfect reader for courses on Internet studies, digital technology and society, new media, and many other courses dealing with society and the Internet. The authors include junior and senior researchers from around the world. To all, we send our appreciation. No more deadlines, we promise. The authors are:

Maria Bada, Cambridge Cybercrime Centre
Grant Blank, University of Oxford
Samantha Bradshaw, University of Oxford
David A. Bray, People-Centered Internet
Antonio A. Casilli, Paris Institute of Technology
Manuel Castells, University of Southern California
Vint Cerf, Google
Sadie Creese, University of Oxford
Matthew David, Durham University
Laura DeNardis, American University, Washington, DC
Martin Dittus, University of Oxford
Elizabeth Dubois, University of Ottawa
Sandra González-Bailón, University of Pennsylvania 
Scott A. Hale, University of Oxford
Eszter Hargittai, University of Zurich
Philip N. Howard, University of Oxford
Peter John, King’s College London 
Sílvia Majó-Vázquez, University of Oxford
Helen Margetts, University of Oxford
Marina Micheli, European Commission
Christopher Millard, Queen Mary University of London
Lisa Nakamura, University of Michigan
Victoria Nash, University of Oxford
Gina Neff, University of Oxford
Eli Noam, Columbia Business School 
Sanna Ojanperä, University of Oxford
Julian Posada, University of Toronto
Anabel Quan-Haase, University of Western Ontario
Jack Linchuan Qiu, The Chinese University of Hong Kong
Lee Rainie, Pew Research Center
Bianca C. Reisdorf, University of North Carolina at Charlotte
Ralph Schroeder, University of Oxford
Limor Shifman, The Hebrew University of Jerusalem
Ruth Shillair, Michigan State University 
Greg Taylor, University of Oxford
Hua Wang, University at Buffalo, The State University of New York
Barry Wellman, NetLab
Renwen Zhang, Northwestern University

So, if you are seriously interested in the societal implications of the Internet and related social media and the mobile Internet, please consider this reader. You will see a variety of methods, data, and theoretical perspectives in play to address important issues in ways that challenge conventional wisdom and punditry about the Internet. You can get a paperback edition from OUP here or from your favourite bookstore.

The Internecine Politics Undermining the Civility of Political Discourse?


Brexit has spawned a form of internecine politics in the UK that is a lose-lose for all – the politicians, parties, and the nations, and very likely, the public interest. Conservatives have referred to ‘blue on blue’ attacks on one’s own party members, but not as in military parlance, accidental. These are really intentional efforts to destroy other members of the parliament, and often in one’s own political party.

This blue-on-blue warfare was mentioned in the debate on 9 July 2019 between Boris Johnson and Jeremy Hunt, but that is but one example of a daily dose of hyper-personal, destructive, political, hatchet jobs that leaves everyone diminished. Today, the former PM John Major threatened to take the next UK PM to court if he were to try to force a no-deal Brexit. He did not simply express his view on a ‘no deal’ Brexit, but threatened the next PM.

Of course, politics in the USA is as vicious, if not more so – consider the warfare between the late John McCain and Donald Trump. All are diminished in such exchanges.

Has politics become more hyper-personal, vicious and internecine, or has the media and social media, as claimed by some, not only a cause of this dysfunctional communication, but is it also or primarily making normal politics more visible?

Optimistically, maybe it is the latter. Perhaps politics has always be as personal and corrosive, and what we see is a social media example of what was called by Joshua Meyrowitz a ‘no sense of place‘ of the mass media. Every insult, threat, or attack is immediately tweeted, blogged, leaked, and/or reported on the mainstream 24-hour news channels. No politician can escape the constant gaze of the media (often via social media) today. A positive outcome, arguably, is that we know too much to hold any politician on a pedestal. Politicians are very human with many faults.

So maybe it is the latter n – a media impact. That might mean there is hope that politicians, the press, and media can learn to hold their fire in the public interest. But the search for followers, likes, ratings, and viewers make this unlikely.

While this is unlikely, given that such internecine conflicts generate listeners, readers, and viewers, it is also in the self-interest of any politician to not indulge in, or try their best to avoid, these political attacks. So it may be down to the politicians to address this problem.

In earlier times, one was advised to go ahead and write the angry memo to your boss or colleague to get your grievance off your chest, but then put it in your desk drawer, and read it the next day. In the light of the next day, the logic goes, the overly vituperous memos or letters would be shredded and forgotten. Well, memos are rare today, as are desk drawers, and tweets work best in live action, so restraint will be more difficult in these times. But this is possible. Draft a tweet on any other media than Twitter, and then send it the next day!

All parties need to realise that clicks, views, and news coverage are not indicators of agreement or support of a comment. This member of the public is becoming exhausted and disappointed by these internecine, hyper-personal political hatcket jobs. Sadly, they alienate many of others among the public. Surely it may seem naive, but in everyone’s interest to be more civil, less personal, more restrained, and more empathetic. Politics is the art of compromise, and not war carried on by other means.

Coda

I was pleased to see some aspects of my concerns reflected in what might have been PM Teresa May’s last major speech as Prime Minister. She spoke about the decline of public discourse, talking about what she called the “coarsening [of] our public debate”, noting that “Some are losing the ability to disagree without demeaning the views of others.” While she attributes some aspects of this to online media, she did not put all the blame on digital or social media, but on an increasing factionalism and what she called an ‘absolutism’, which for example is so apparent in debates over Brexit. I find support in her voicing some of my concerns with public discourse albeit she has put these points across much better and to a far larger audience. 

Society and the Internet’s 2nd Edition

The 2nd Edition of Society and the Internet should be out in July 2019. You can access information about the book from OUP here: https://global.oup.com/academic/product/society-and-the-internet-9780198843504?lang=en&cc=de

With the academic year fast approaching, we are hoping that the book will be useful for many courses around Internet studies, new media, and media and society. If you are teaching in this area, Mark and I hope you might consider this reader for your courses, and let your colleagues know about its availability. Authors of our chapters range from senior luminaries in our field, such as Professor Manuel Castels, who has written a brilliant foreword, to some promising graduate students.

Society and the Internet
2nd Edition.

How is society being reshaped by the continued diffusion and increasing centrality of the Internet in everyday life and work? Society and the Internet provides key readings for students, scholars, and those interested in understanding the interactions of the Internet and society. This multidisciplinary collection of theoretically and empirically anchored chapters addresses the big questions about one of the most significant technological transformations of this century, through a diversity of data, methods, theories, and approaches. 

Drawing from a range of disciplinary perspectives, Internet research can address core questions about equality, voice, knowledge, participation, and power. By learning from the past and continuing to look toward the future, it can provide a better understanding of what the ever-changing configurations of technology and society mean, both for the everyday life of individuals and for the continued development of society at large. 

This second edition presents new and original contributions examining the escalating concerns around social media, disinformation, big data, and privacy. Following a foreword by Manual Castells, the editors introduce some of the key issues in Internet Studies. The chapters then offer the latest research in five focused sections: The Internet in Everyday Life; Digital Rights and Human Rights; Networked Ideas, Politics, and Governance; Networked Businesses, Industries, and Economics; and Technological and Regulatory Histories and Futures. This book will be a valuable resource not only for students and researchers, but for anyone seeking a critical examination of the economic, social, and political factors shaping the Internet and its impact on society.

Available for Courses in 2019

Nominate an Early Career Research to Become a TPRC Junior Fellow

The TPRC is seeking to select up to 6 TPRC Junior Fellows – early-career researchers engaged in research on the Internet, telecommunication and media policy in the digital age. Please nominate individuals whom you think might make outstanding fellows. Those who have wond student paper awards at the TPRC conference as well as those who served Benton Award winners could be candidates, but we are open to anyone you feel to have the potential to do outstanding research on key issues for the TPRC, and engage other early-career researchers in our activities.

The TPRC Junior Fellows Program was designed in part to award excellence but also tobring new members into the TPRC community. Those appointed will be honoured and serve as ambassadors for TPRC, working pro bono and appointed to two-year terms by the Board. Junior Fellows will be emerging scholars with good connections to their peers, including but not limited to successful TPRC paper presenters and alumni of the Graduate Student Consortium and Benton Award.

TPRC hopes that Junior Fellows will help broaden the TPRC community, and improve the participation of underrepresented groups, such as young academics, certain disciplines not traditionally involved in telecom research who are engaged in new media and digitial policy, and those engaged in new research areas, as well as those who bring greater diversity to our community, including women, minorities, and under-represented groups.

The TPRC Board anticipates that Fellows will disseminate information about TPRC on their personal networks, and identify and engage 1-1 with prospective attendees and encourage them to participate in TPRC. In return, TPRC will recognize Fellows on the TPRC web site, and publicly welcome new appointees during the conference, and provide material and mentoring to support their outreach mission. Of course, the Early Career Fellows will be able to list this service on their resumes. Each Fellow will have a designated Board liaison, who will check in periodically to discuss support needed and progress made. TPRC will aim to support your career.

Desiderata

We’re looking for people that meet as many of the following criteria as possible. None of them are required qualifications; we don’t expect that anyone will check all the boxes.

  • From under-represented groups, including women and minorities
  • Working in new research areas and those under-represented at TPRC
  • Academic talent and promise
  • Good network of contacts, e.g. active on social media
  • Able and willing to advocate for TPRC

For information about the TPRC, see: http://www.tprcweb.com/

If you have ideas, you may contact me on this site, or by email at william.dutton@gmail.com

The Chatham House Rule Should be the Exception

Can We Make the Chatham House Rule the Exception?

gargoyleBalliol
May I quote you?

It is common to debate the definition and correct implementation of the Chatham House Rule. My issue is with its over-use. It should be used in exceptional cases, rather than being routinized as a norm for managing communication about meetings.

To be clear, the Chatham House Rule (singular) is: “When a meeting, or part thereof, is held under the Chatham House Rule, participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed.”*

One of the central rationales of this rule was to enable more transparency by freeing governmental and other officials to speak without attribution.** Clearly, there are cases in which individuals cannot speak publicly about an issue given their position. Think about the many cases in which news sources do not wish to be identified by journalists. Similar situations arise in meetings, and it is good that The Chatham House Rule exists to use in just such occasions to promote greater transparency.

However, it is arguable that The Chatham House Rule is used in ways that do not promote transparency. For example, it is often misunderstood and used to prevent members of a meeting from conveying information provided at the meeting. Clearly, the original rule left participants ‘free to use the information’, just without identifying the source. This expansion of the Rule runs counter to the aim of the rule’s establishment.

In addition, all too often the Rule is invoked not because the content of a meeting is particularly sensitive, but because it creates a sense of tradition, and an aura of importance. It conveys the message that something important will be discussed at this meeting. However, the function of this is more in marketing a meeting rather than creating a safe setting for revealing secret, confidential, or new information.

A related rationale is that it is just ‘the way we do things’ – the tradition. In this case, there is likely to be no need for less transparency, but a case of blindly following tradition, resulting in information being inadvertently suppressed.

In many ways, the times are making The Chatham House Rule more problematic.

First, history is pushing us toward more transparency, not less. The spirit of the Rule should lead us to apply it only when necessary to open communication, such as around a sensitive issue, not to routinely regulate discussion of what was said in a meeting.

Secondly, the authenticity of information that comes out of a meeting is often enhanced by knowing more information about its source. If a new idea or piece of information is attributed to an individual, that individual can become a first source for authenticating what was said, and for follow up questions.

Thirdly, technical advances are making it less and less realistic to keep the source of information confidential. Leaks, recordings, live blogging and more are making transparency the norm of nearly every meeting. That is, it is better to assume that any meeting is public than to assume any meeting is confidential.

Over a decade ago, I once organized and chaired a meeting that included the UK’s Information Commissioner (the privacy commissioner, if you will), and it was conducted under The Chatham House Rule. At the break, I checked with my IT group about how the recording was going, as we were recording the meeting for preparing a discussion paper to follow. Lo and behold, the meeting was being Webcast! This made for a good laugh by the Commissioner and all when we reconvened, but it also reminded me that everyone should assume the default of a meeting in the digital world is that all is public rather than private.

Finally, there are better ways to handle information in today’s technical and political contexts. Personally, I usually record meetings that are about academic or applied matters, as opposed to meetings about personnel issues, for example. So if we convene a group to discuss a substantive issue, such as a digital policy issue like net neutrality, we let all participants know that presentations and discussions will be recorded. We do not promise that anything will be confidential, as it is not completely under our control, but we promise that our recording will be used primarily for writing up notes of the meeting, and that if anyone is quoted, they will be asked to approve the quote before it is distributed publicly.

Of course, when individuals request that something remains confidential, or confined to those present, then we do everything we can to ensure that confidentiality. (As with The Chatham House Rule, much relies on trust among the participants in a meeting.) But this restriction is the exception, rather than the rule. This process tends to ensure more accurate reports of meetings, enable us to quote individuals, who should get credit or attribution, and support transparency.

The Chatham House Rule was established in 1927 with Chatham House being the UK’s Royal Institute of International Affairs. The worries at that time were more often about encouraging government officials to participate in a discussion about sensitive international concerns by assuring anonymity. Today there are still likely to be occasions when this rule could be useful in bringing people around the table, but that is likely to be exception and not the rule in the era of the Internet, distributed electronic conferencing, and live Tweeting.

th
Chatham House, London

Notes

* https://www.chathamhouse.org/about/chatham-house-rule

** As noted by Chatham House: “The Chatham House Rule originated at Chatham House with the aim of providing anonymity to speakers and to encourage openness and the sharing of information. It is now used throughout the world as an aid to free discussion.” https://www.chathamhouse.org/about/chatham-house-rule

 

Notes to Pundits of the Trump-Russia Stories: If you were my students …

Sorry if this sounds patronizing, as you are stellar journalists and politicians, but if you were my students, writing a paper for a college class, what would I say?

th
teaching commons.stanford.edu

I would definitely give you points for effort, and creativity, but would mark your work down on its analytical precision. Happy for you to come in during an office hour, but briefly, let me give you a few examples of my concerns. Apologies in advance for these quick notes.

First, take your vague attributions, which change over time. Who is responsible for meddling with the 2016 US Presidential election? Is it hackers in Russia, Russian oligarchs, Russian nationals, Russians, government hackers, agent’s of the government, the government, the highest levels of government, or President Putin? Your essays keep veering across these various actors. You must see that it makes a difference, so you must be more precise to be credible.

Likewise, what did they do – what was the meddling? Did they hack into email of the DNC, RNC, John Podesta, or others; gain access to county voter registration files; change voter registration files; meet with members of the campaign; loan money (at some point in the past) to members of the campaign; compromise members of the campaign; pass material to WikiLeaks, or one or more of the above? Your discussions keep shifting from one to another accusation as if this were a shell game.

When did this happen? Was it during the 2016 elections, happening now, or is it something that is likely to happen in the future? When you sometimes veer toward the future, it undermines your case.

Where is the evidence? Is it simply based on authority, the intelligence agencies, all of whom happen to agree, even when they seldom or ever confirm or deny anything? Is there evidence beyond hearsay? [By the way, you should not equate the heads of intelligence agencies with scientists, or doubts over Russian interference with climate change denial, as the analogy so flawed that it further undermines your credibility.]

Finally, in line with a major problem with undergraduate writing today, is it something that you often just feel is right? As you would have heard me say in class time and again, your feelings don’t count.

So you can see that given all the possible permutations of who did what, when and where, and all without strong evidence, the essays end up in an analytical muddle. You’ve constructed a wicked problem out of a set of vague accusations that are not critically assessed.

This would be funny if your work did not have such serious consequences. [I should add you do get high marks for impact.] And the impact will last decades and shape governmental institutions in the US in major ways, such as with respect to the role of Congress in foreign policy.

Finally, it would have been good to focus on some things that could be done to avoid the risks you identify, such as shoring up cyber security in all aspects of campaigns and elections, and not moving to electronic voting – a plea that has been made for well over a decade. [See Barbara Simons’ work, for example, who has been warning people about the difficulties of securing electronic voting systems for decades.] You might also reinforce the wisdom of how decentralized voting systems are in the US, meaning that there is no one system, even in a single state, and the need to keep it that way.

That said, great effort, well written, and convincingly spoken, but I regret to say that I cannot give you high marks on your work. And apologies for not addressing every individual journalist and politician talking about the Trump-Russia story, as that would not be possible given the number of you that chose this topic. Nevertheless, as a group, try to focus on developing a more analytically rigorous argument, and ensure that your evidence drives your conclusions rather than the opposite.

 

Should Tweeting Politicians be able to Block Users?

An interesting debate has been opened up by lawyers who have argued that President Trump should not block Twitter users from posting on Twitter. I assume this issue concerns his account @realDonaldTrump (32M followers) but the same issue would arise over his newer and official account as President @realDonaldTrump (almost 19M followers).

th

Apparently, the President has blocked users who may have made rude or critical comments to one or more of his Twitter posts. Regardless of the specifics of Donald Trump’s tweets, and specific individuals blocked, the general question is: Should any American politician who tweets be able to block any user without violating the user’s first amendment rights? I would say, yes, but others, including the lawyers posing this question, would disagree.

I would think that any user has a right to block any other user, particularly if they appear to be a malicious user, bot, or simply obnoxious. I’d argue this on the basis that these are the affordances of Twitter, and the rules of the site are – or should be – known by users. Moreover, the potential for blocking is a means of maintaining some level of civility on one’s social media. Having rude or obnoxious users posting harassing comments could frighten other users off the site, and thereby undermine a space for dialogue and the provision of information. If there is no way for a social media site to moderate its users, its very survival is at risk.

I actually argued this in the mid-1990s, when the issue surrounded electronic bulletin boards, and some of the first public forums, such as Santa Monica, California’s Public Electronic Network (PEN).* Essentially, I maintained that any democratic forum is governed by rules, such as Robert’s Rules of Order for many face-to-face meetings. Such rules evolved in response to difficulties in conducting meeting without rules. Some people will speak too long and not take turns. Some will insult or talk over the speaker. Democratic communication requires some rules, even thought this may sound somewhat ironic. As long as participants know the rules in advance, rules of order seem legitimate to enabling expression. Any rule suppresses some expression in order to enable more equitable, democratic access to a meeting. Obviously, limiting a tweet to 140 characters is a restriction on speech, but it has fostered a rich medium for political communication.

In this sense, blocking a Twitter user is a means for moderation, and if known in advance, and not used in an arbitrary or discriminatory way, it should be permitted. That said, I will post a Twitter poll and let you know what respondents believe. Bryan M. Sullivan (2017), an attorney, seems to argue a very different position in his Forbes article.** I respectively disagree, but wonder what the Twitter community thinks, while it is easy to guess that they will be on the side of not being blocked. But please think about it, before you decide.

Reference

*Dutton, W. H. (1996), ‘Network Rules of Order: Regulating Speech in Public Electronic Fora,’ Media, Culture, and Society, 18 (2), 269-90. Reprinted in David, M., and Millward, P. (2014) (eds), Researching Society Online. (London: Sage), pp. 269-90.

**Sullivan, B. (2017), ‘Blocked by the President: Are Trump’s Twitter Practices Violating Free Speech?’, Forbes, available here: https://www.forbes.com/sites/legalentertainment/2017/06/08/blocked-by-the-president-are-trumps-twitter-practices-violating-free-speech/#40fe73043d57