A new book edited by Mark Graham and myself is in print and available for courses: Society and the Internet: How Networks of Information and Communication are Changing Our Lives. It is published by Oxford University Press, and material about the book is available on their website at: http://ukcatalogue.oup.com/product/9780199662005.do
How is society being shaped by the diffusion and increasing centrality of the Internet in everyday life and work? By bringing together leading research that addresses some of the most significant cultural, economic, and political roles of the Internet, this volume introduces students to a core set of readings that address this question in specific social and institutional contexts.
Internet Studies is a burgeoning new field, which has been central to the Oxford Internet Institute (OII), an innovative multi-disciplinary department at the University of Oxford. Society and the Internet builds on the OII’s evolving series of lectures on society and the Internet. The series has been edited to create a reader to supplement upper-division undergraduate and graduate courses that seek to introduce students to scholarship focused on the implications of the Internet for networked societies around the world.
The chapters of the reader are rooted in a variety of disciplines, but all directly tackle the powerful ways in which the Internet is linked to political, social, cultural, and economic transformations in society. This book will be a starting point for anyone with a serious interest in the factors shaping the Internet and its impact on society. The book begins with an introduction by the editors, which provides a brief history of the Internet and Web and its study from multi-disciplinary perspectives. The chapters are grouped into five focused sections: (I) Internet Studies of Everyday Life, (II) Information and Culture on the Line, (III) Networked Politics and Government, (IV) Networked Businesses, Industries, and Economies, and (V) Technological and Regulatory Histories and Futures.
A full table of contents is below:
Society and the Internet How Networks of Information and Communication are Changing Our Lives
Manuel Castells: Foreword
Mark Graham and William H. Dutton: Introduction
Part I. Internet Studies Of Everyday Life
1: Aleks Krotoski: Inventing the Internet: Scapegoat, Sin Eater, and Trickster
2: Grant Blank And William Dutton: Next Generation Internet Users: A New Digital Divide
3: Bernie Hogan And Barry Wellman: The Conceptual Foundations of Social Network Sites and the Emergence of the Relational Self-Portrait
4: Victoria Nash: The Politics of Children s Internet Use
5: Lisa Nakamura: Gender and Race Online
Part II. Information And Culture On The Line
6: Mark Graham: Internet Geographies: Data Shadows and Digital Divisions of Labour
7: Gillian Bolsover, William H. Dutton, Ginette Law, And Soumitra Dutta: China and the US in the New Internet World: A Comparative Perspective
8: Nic Newman, William H. Dutton, And Grant Blank: Social Media and the News: Implications for the Press and Society
9: Sung Wook Ji And David Waterman: The Impact of the Internet on Media Industries: An Economic Perspective
10: Ralph Schroeder: Big Data: Towards a More Scientific Social Science and Humanities?
Part III. Networked Politics And Governments
11: Miriam Lips: Transforming Government by Default?
12: Stephen Coleman And Jay Blumler: The Wisdom of Which Crowd? On the Pathology of a Digital Democracy Initiative for a Listening Government
13: Sandra Gonzalez-Bailon: Online Social Networks and Bottom-up Politics
14: Helen Margetts, Scott A. Hale, Taha Yasseri: Big Data and Collective Action
15: Elizabeth Dubois And William H. Dutton: Empowering Citizens of the Internet Age: The Role of a Fifth Estate
Part IV: Networked Businesses, Industries AND Economies
16: Greg Taylor: Scarcity of Attention for a Medium of Abundance: An Economic Perspective
17: Richard Susskind: The Internet in the Law: Transforming Problem-Solving and Education
18: Laura Mann: The Digital Divide and Employment: The Case of the Sudanese Labour Market
19: Mark Graham: A Critical Perspective on the Potential of the Internet at the Margins of the Global Economy
Part V. Technological And Regulatory Histories And Futures
20: Eli M. Noam: Next-Generation Content for Next-Generation Networks
21: Christopher Millard: Data Privacy in the Clouds
22: Laura Denardis: The Social Media Challenge to Internet Governance
23: Yorick Wilks: Beyond the Internet and Web
Let us know what you think of our reader, and thanks for your interest.
Modernizing and Inspiring a “Startup Mentality” in Legacy Information Technology Organizations
Speakers: David A. Bray, Oxford Martin Associate and CIO of the U.S. FCC, Yorick Wilks, and Greg Taylor
19 June 2014 from 4-5 pm
OII Seminar Room, 1 St Giles’, Oxford
By some estimates, 70% of IT organization budgets are spent on maintaining legacy systems. These costs delays needed transitions to newer technologies. Moreover, this cost estimate only captures those legacy processes automated by IT; several paper-based, manual processes exist and result in additional hidden, human-intensive costs that could benefit from modern IT automation.
This interactive discussion will discuss the opportunities and challenges with inspiring a “startup mentality” in legacy information technology organizations. Dr. David Bray, will discuss his own experiences with inspiring a “startup mentality” in legacy IT organizations as well as future directions for legacy organizations confronted with modernization requirements. The discussion will be chaired by OII’s Dr. Greg Taylor, and Yorick Wilks, an OII Research Associate, and Professor of Artificial Intelligence in the Department of Computer Science at the University of Sheffield, will offer his comments and responses to David’s ideas before opening the discussion to participation from the audience.
Information about the speakers:
David A. Bray: http://www.oxfordmartin.ox.ac.uk/cybersecurity/people/575
Yorick Wilks: http://www.oii.ox.ac.uk/people/?id=31
Greg Taylor: http://www.oii.ox.ac.uk/people/?id=166
The 6th ACM Web Science Conference will be held 23-26 June 2014 on the beautiful campus of Indiana University, Bloomington. Web Science continues to focus on the study of information networks, social communities, organizations, applications, and policies that shape and are shaped by the Web.
The WebSci14 program includes 29 paper presentations, 35 posters with lightening talks, a documentary, and keynotes by Dame Wendy Hall (U. of Southampton), JP Rangaswami (Salesforce.com), Laura DeNardis (American University) and Daniel Tunkelang (LinkedIn). Several workshops will be held in conjunction with the conference on topics such as Altmetrics, computational approaches to social modeling, the complex dynamics of the Web, the Web of scientific knowledge, interdisciplinary coups to calamities, Web Science education, Web observatories, and Cybercrime and Cyberwar. Conference attendees will have an opportunity to enjoy the exhibit Places & Spaces: Mapping Science, meant to inspire cross-disciplinary discussion on how to track and communicate human activity and scientific progress on a global scale. Finally, we will award prizes for the most innovative visualizations of Web data. For this data challenge, we are providing four large datasets that will remain publicly available to Web
For more information on the program, registration, and a full schedule please visit http://WebSci14.org and follow us on Twitter (@WebSciConf) or like us on Facebook
The World Economic Forum has released a set of complementary reports, including one written by an OII team, entitled ‘The Internet Trust Bubble: Global Values, Beliefs and Practices’, by William H. Dutton, Ginette Law, Gillian Bolsover, and Soumitra Dutta. Our report is a follow up to our earlier WEF study entitled ‘The New Internet World’. Both are based on global Web-based surveys of Internet users, and conducted by the OII in collaboration with the WEF, comScore, and with support from ictQATAR.
Our survey research was conducted in 2012, prior to the Snowden revelations, so what we found to be a potential risk to trust in the Internet can only be greater than what we found pre-Snowden. That said, there is no certainty that the concerns raised over Snowden will reach the general public, or that Internet users will not adapt to risks to personal data and surveillance in order to enjoy the convenience and other benefits of Internet use. There is clearly a need for continuing research on attitudes, beliefs, and practices in related areas of security, privacy, authenticity and trust in the Internet, but also greater efforts to support public awareness campaigns, such as is a current focus of work in our Global Cyber Security Capacity Center at the Oxford Martin School.
We found strong support for the values and attitudes underpinning freedom of expression on the Internet. Users in the emerging nations of the Internet world are in some respects more supportive of freedom of expression online than are users in the nations of the Old Internet World. In fact, in 2012, users from the nations more recently moving online, those who compose the New Internet World, are more likely to support norms underpinning freedom of expression online than do users from nations of the Old Internet World, who were early to adopt the Internet, as well as reporting higher levels of perceived freedom in expressing themselves on the Internet.
However, there is concern worldwide over the privacy of personal information, but this is not evenly distributed. Users in nations that have more recently embraced the Internet appeared somewhat less aware of the risks and more trusting in their use of the Internet. Moreover, many users around the world indicate that they are not taking measures designed to protect their privacy and security online. In addition, there is evidence of large proportions of the online world lacking trust in the authenticity and appropriateness of information on the Internet, often looking towards the government to address problems in ways that could put values of the Internet at risk, such as freedom of expression. At the same time, there is a surprisingly high proportion of users that take governmental monitoring and surveillance of the Internet for granted, even before the disclosures of Edward Snowden and his claims about US and other governmental surveillance initiatives. These are illustrations of a pattern of attitudes and beliefs that might well signal a looming crisis of trust in the freedom, privacy, security and value of the Internet as a global information and communication resource.
Building on the theme of trust, A. T. Kearney prepared a related WEF report, entitled ‘Rethinking Personal Data: A New Lens for Strengthening Trust’. In many respects, it moves forward to identify steps that could be taken to address growing concerns over trust in the Internet.
The third report was prepared by a team of researchers at Microsoft, who also build on issues of personal data and trust. All are part of the World Economic Forum’s multi-year ‘Rethinking Personal Data’ initiative.
Links to all three reports are below:
Coincidentally, I gave a keynote on the ‘Internet trust bubble’ in Shenzhen, China, at the Huawei Strategy and Technology Workshop today, with the release of this report, 13 May 2014. I am doubtful that our data convinced many in the audience that there was reason for concern, as most discussion was rather optimistic about the future of mobile and the Internet, but I do believe there is international recognition of
After 12 great years at Oxford, I am delighted to be joining MSU as their new Quello Professor. Not sure how my former USC Trojan colleagues will react to me joining the Spartans! The current Director of the Quello Center, Professor Steve Wildman, a recent Chief Economist at the FCC, posted a much appreciated announcement of the appointment. I’ll be joining MSU in August 2014 and look forward to staying in touch with you over this and related blogs in the future. One of my goals will be to put the Internet and Web into the center of a forward strategy for building the Quello Center’s role in the new digital world of communication research, policy and regulation. My work as a co-principal on the Global Cyber Security Capacity Centre will continue at MSU, as will my work on the Fifth Estate, partly through the support of a project on collaboration at the DTU (Danmarks Tekniske Universitet) as well as through support of the Quello Center. At MSU, I will hold the James H. Quello Chair of Media and Information Policy.
I have been quite interested in the Internet of Things since participating in a ‘roadmapping’ workshop organized by the TSB SIG on the topic. I chaired a group focused on the social science aspects of the IoT, which led to a working paper that is available online, entitled ‘A Roadmap for Interdisciplinary Research on the Internet of Things: Social Sciences’.
This eventually evolved into published article in Info, an Emerald journal: William Dutton, (2014) “Putting things to work: social and policy challenges for the internet of things”, info, Vol. 16 Iss: 3 Available soon at: http://www.emeraldinsight.com/journals.htm?issn=1463-6697&volume=16&issue=3&articleid=17108501&show=pdf
I’ve also spoken about the IoTs in a short video produced by VOX (Voices from Oxford) focused on my edited book with Mark Graham, entitled Society and the Internet (OUP 2014). The interview is conducted by Prof Christine Borgman, Professor and Presidential Chair in Information Studies, UCLA. The interview is primarily about the edited book, with an example drawn from the Internet of Things. You can see the video at: http://www.voicesfromoxford.org/video/society-and-the-internet-of-things/423
Hope springs eternal. Wonderful to learn that the FT has opted out of both the new Independent Press Standards Organisation (Ipso), as well as the Parliament-backed Royal Charter system, which threatens to undermine the independence of the press in Britain. The paper is creating its own self-regulatory system through a new ‘editorial complaints commissioner’, according to The Independent (18 April 2014) and PressGazette, see: http://www.pressgazette.co.uk/financial-times-opts-out-ipso-favour-its-own-system-regulation The FT might continue to play a role in the Fourth Estate if it continues to guard its independence. Hopefully other papers will follow its lead.
Dutton, William H. with the assistance of Elizabeth Dubois (2014) (ed.) Politics and the Internet. London and New York: Routledge. See: http://www.routledge.com/books/details/9780415561501/
Delighted to see the first pre-publication copy of the four volume set on Politics and the Internet, edited by me with the assistance of Elizabeth Dubois. It is within a larger set of books published in the Critical Concepts in Political Science series by Routledge. Designed as a reference for libraries and scholars within this area, eighty four chapters reprint work that is foundational to the study of politics and the Internet, comprising four volumes:
I. Politics in Digital Age – Reshaping Access to Information and People
II. Compaigns and Elections
III. Netizens, Networks and Political Movements
IV. Networked Institutions and Governance
A common complaint of the Internet age is that we have little time to look back, and therefore risk giving inordinate attention to the most recent work. It is certainly the case that the study of politics and the Internet is developing at such a pace that it will be far more difficult to reflect the full range of research over the coming decades. However, this collection is designed to be of value well into the future by capturing key work in this burgeoning and increasingly important field and making it accessible to a growing international body of scholars who can build on its foundations. I hope you suggest this reference for your library.
We have volunteered to help CDEC find expertise in areas key to its work. One of the first areas we’ve considered is cybersecurity. Where does expertise lie in cybersecurity research in the UK, but also internationally. We asked six cybersecurity researchers in the UK to indicate the locus of the most important contemporary work. While we would not claim to have done a comprehensive study, we found a good deal of convergence through this reputational review of the field.
The top five sites that these experts identified (not in order of priority) were:
• Cambridge University’s Security Group in the Computer Laboratory: one of the longest running security programmes in UK universities.
Contact: Ross Anderson at Ross.Anderson@cl.cam.ac.uk
• Oxford University’s Cyber Security Centre, which brings together relevant Oxford departments, and associated centres beyond Oxford, such as in the Cybersecurity Capacity Building Project.
• Centre for Secure Information Technologies (CSIT) at Queen’s University Belfast, founded in 2008 in the Institute of Electronics, Communications and Information Technology, and claimed to be the UK’s largest university cyber security research lab.
Contact: Professor John McCanny, Principal Investigator firstname.lastname@example.org
• Royal Holloway’s Information Security Group, University of London
Contact: ISG Administrator email@example.com
• UCL’s Academic Centre of Excellence for Cyber Security Research, set up in 2012, by GCHQ in partnership with the Research Councils’ Global Uncertainties Programme (RCUK) and the Department for Business Innovation and Skills (BIS).
Contact: Professor Angela Sasse firstname.lastname@example.org
Other UK programmes that were mentioned, but not by multiple experts, were:
• Bristol Security Centre, University of Bristol
• Institute for Security Science and Technology, Imperial College London
• Security Lancaster, Lancaster University
• Academic Centre of Excellence in Cybersecurity, University of Southampton
All of the above centres have been awarded Centre of Excellence status in cyber security research under the BIS/RCUK/EPSRC scheme. While they were not mentioned by our sample of experts, two other centres are among those awarded Centre of Excellence status in cybersecurity research: Centre for Cybercrime and Computer Security, Newcastle University and the School of Computer Science, University of Birmingham.
In response to more international programmes, all of the nominations by our reviewers identified US programmes as the most significant, including:
• Belfer Center for Science and International Affairs in the Harvard Kennedy School. This centre has launched a Cyber Security Initiative as part of a project known as Project Minerva, a joint effort of the Department of Defense, Massachusetts Institute of Technology, and Harvard University.
• CyLab at Carnegie Mellon University, perhaps the largest cyber security group in the US, joining researchers across more than six departments.
• Cornell University’s Department of Computer Science that lists security as one of the major strengths of the department
• .Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University
• The Institute for Security, Technology, and Society (ISTS), Dartmouth
• Cyber Security Policy and Research Institute (CSPRI) at The George Washington University
• .Stanford Security Laboratory, Stanford University
• Pacific Northwest National Laboratory (PNNL) National Security Directorate, Cybersecurity
We hope this list stimulates discussion about where relevant expertise on cyber security for the CDEC lies in the UK and abroad. This represents work in progress, and any feedback on our list to date would be very welcome. If there are centres omitted or where you wish to provide information about specific areas of strengths or contacts, please comment or email.
Thanks to our students Elizabeth Dubois, Gillian Bolsover and Heather Ford, who helped conduct, review and collate this research, and to the experts in the field for their supporting input in this area.
Bill Dutton and Bill Imlah
This morning’s paper had yet another wonderful complaint by a spouse who has been plagued by a workaholic partner who cannot curtail his email connections with the office. This spouse said her holiday experience had been turned into a “take your family to work” week. OK. That’s funny and I understand. I actually knew a former top manager at an R&D laboratory in the UK who would (really) have his spouse reading and answering email while he drove the car, as described in this anonymous opinion piece in The Independent. It can go over the top.
However, I hope many of these annoyed families realize that they would not be on a beach or in the Alps were it not for email and being able to stay connected to the office. As I have said before, and others have documented in research, the Internet enables people to be where they want to be for face-to-face, inter-personal interaction. Work can go on despite the boss being away on holiday.
Well, not always, and not for most people.
August is almost over, but what a time of a particular type of spam email – the vacation auto-reply. It often goes something like: “Thank you for your email, but I am away relaxing on holiday. If you really want to contact me, email me when I am back.” To someone who is not on holiday, and very likely working hard on behalf of this holidaymaker, this is truly annoying. Personally, I would rather not get a reply, and assume I’ll hear when I hear, than be told that my colleague is having fun, and that I have been wasting my time trying to complete a task that will be stopped in its tracks because someone is on holiday and can’t reply, “Yes, go ahead”, or “No, let’s talk when I am back”. Easy.
I find any auto-reply to be annoying, but if you want advice from one who is regularly tortured by this spam, here are a few tips:
First, act disappointed that you cannot immediately reply. Apologize that you are traveling and do not have access to the Internet for a time, and will get back as soon as possible. You are important, and your message is important. The corollary, is that you should not suggest that you – our holidaymaker – are too important to be bothered by email from anyone, or that you really deserve a holiday, as if the bloke working while you are on holiday does not.
Secondly, don’t activate your vacation auto-rely 2 seconds after 5pm on the Friday of a long holiday weekend. If you really have to have a vacation auto-reply, maybe wait a respectable amount of time before you check out of the real world.
Finally, if you must leave a vacation email, use them to begin drafting your final vacation email for when you pass away. That will get you in the right frame of mind to tell people how you really wish you could respond, but you are so pleased they thought of you in any case.
William H. Dutton (B.A. University of Missouri; M.A., PhD. SUNYBuffalo, 1974) is Professor of Internet Studies, Oxford Internet Institute, University of Oxford, and Fellow of Balliol College.
- Society and the Internet: a new reader for courses
- Inspiring a Startup Mentality in Legacy IT Organizations – FCC CIO at the OII on 19 June, 4-5pm
- Web Science 2014: CALL FOR PARTICIPATION
- The Internet Trust Bubble Amid Rising Concern over Personal Data: WEF Report
- New Position as Quello Chair at MSU
- Internet of Things: a social perspective
- Financial Times Opts for Independence from Press Regulation
- Politics and the Internet
- Identifying centres of cybersecurity research expertise – results to date
- Deliver Us from Vacation Email Replies