Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Regulability & Tech Diffusion: Lessig's Code Theory & Tech Dialectic - Prof. Colin Potts, Study notes of Computer Science

Various concepts related to regulability and technology diffusion, including lessig’s code theory, everett m. Rogers’s research on diffusion of innovations, and the technological dialectic as proposed by hegel and marx. It also touches upon the characteristics of early adopters and legacy systems. Useful for computer science students and professionals who want to understand the complex relationship between technology and society.

Typology: Study notes

Pre 2010

Uploaded on 08/05/2009

koofers-user-evc
koofers-user-evc 🇺🇸

10 documents

1 / 6

Toggle sidebar

Related documents


Partial preview of the text

Download Regulability & Tech Diffusion: Lessig's Code Theory & Tech Dialectic - Prof. Colin Potts and more Study notes Computer Science in PDF only on Docsity! CS 4001: Regulability and Technology Diffusion a) Definition of some terms  Technological utopianism  Technological dystopianism  Luddites  Technological determinism b) Lessig’s “Code” Theory i) How is individual behavior regulated by a powerful agency (Government, corporation, community, etc.)? ACTIVITYRestrict class lateness Suppose we wanted to start class on time and prevent anyone from arriving late? What could we do?  Law. o (No entry by order of management.)  Custom. o (I wouldn’t go in there if I were you.)  Market. o (Free entry before 2:40; $5 before 3pm., $20 after….)  Architecture. o (Lock the door. Barricade.) ii) Lessig on the Internet.  The doctrine that the Internet promotes democratization and freedom from coercion. Breaking down of authority/special interests. (E.g. self-publishing, open-source, freedom of information, primacy of content over appearance.)  This is an argument that Internet’s architecture resists regulation.  May be true of Internet 1990, but isn’t really true of Internet 2000. Isn’t a necessary truth.  Regulation of Internet could easily happen through regulation of intermediaries: o Quote: p.50.  “It’s all politics:: Quote p. 58. c) Diffusion of innovations i) Characteristics of adopted innovations  Everett M. Rogers’s research (Diffusion of Innovations, 4 th Edition , New York, NY: Free Press, 1995) o Relative advantage o Compatibility with existing technology o Simplicity (and therefore to explain to those who aren’t early adopters but whose approval may be necessary) o “Trialability” (e.g. typically, not an all-or-nothing infrastructure replacement) o Observability (sometimes “transparency”).  Computer science research has had mixed success in developing adopted technologies. o Consider program verification using logical proof techniques and theorem provers.  But these have had some success in VLSI CAD. Why? o But contrast this with compiler-compilers like yacc/bison. ii) Characteristics of early adopters  No younger or older than later adopters.  More formal education and are more literate. features, just as its features have been largely shaped by market requirements.  Hutchinson: o Complex skills become embedded in technology artifacts and practices.  Navigation and maps, charts and Polynesian navigation practices. iii) Tenner  How technology bites back: Fixes to acute problems often introduce new chronic problems. Especially case with measurement or safety technologies. o Tenner, Edward. Why Things Bite Back: Technology and the Revenge of Unintended Consequences. New York, NY: Vintage, 1996.  E.g. creative subversion of measurements and displacement of danger to other hazards. Examples: o Use of lines of code per day as measure of programmer productivity detracts from reviewing and testing; o Office automation products make typing pools unnecessary but cause salaried professionals to spend more time polishing the layout of their documents/slide presentations. o Domestic equipment (e.g. washing machines) reduced the drudgery of housework but instead of giving home-makers more free time increased expectations of quality (e.g. the daily wash instead of the weekly wash). o Pesticides increase agricultural yield, but cause long-term environmental harm; o Antibiotics save lives by curing infectious diseases, but lead to evolution of resistant strains of parasites, making some hospitals unhygienic places to be treated for infections. iv) Fifty years of telephone evolution  Anton and Potts (2003) counted features in different categories in subscriber telephone services from 1940s to 1990s. o Obviously, telephones help you communicate with other people. o But they also help other people communicate with you.  And so eventually, they came to help you stop other people communicating with you (such as call screening and caller id)  And to help you work out what was going on (such as, who it was who was trying to communicate with you) o It’s almost like a biological arms race.  What does this mean for computing professionals? o Basic features always come first, but their potential quickly gets exhausted. o Secondary features that help users marshal the power of the basic features are necessary if the technology isn’t to bog people down.  Consider what’s happened with spam and the development of spam filters.
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved