Abstract
Chapter 5, “Designing Use with Youth,” considers the formal and informal ways young people are taught to use digital media and how this learning process has been shaped by corporate and state interests. The participatory design of a social network through the MyDF Project is further unpacked to discuss how modes of informational development, such as the U.S. national security doctrine of cyberdominance, were reproduced, reworked, and resisted by interviewees and co-researchers alike. Extrapolating from research and design interventions, such as the YDRC’s development of a Terms of Use policy for their social network, this chapter also discusses how young people and their communities can design digital environments and research relationships that help reproduce what Sarah Ahmed (What’s the Use? On the Uses of Use. Durham, NC: Duke University Press, 2019) has described as a “queer use.”
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
As discussed in Chap. 4, all youth co-researchers consented to the audio recording of these workshops but collectively decided that any direct quotes used in this analysis were to be attributed simply to “member(s) of the YDRC,” “youth co-researcher(s),” or just “the YDRC.” Asmaou, Kaitlin, Rose, Saif, and Yvonne all felt comfortable publicly identifying themselves as members of the YDRC, but they did not want to have to have individual quotes or actions attributed specifically to their name.
- 2.
The Digital Millennium Copyright Act (DMCA), passed in 1998, is a U.S. copyright law that largely focuses on digital rights management (DRM) to criminalize both copyright infringement and the circumvention of copyright controls.
- 3.
The monitoring and throttling of a user’s bandwidth typically occur when an ISP customer is downloading and/or uploading above-average amounts of data through his technically “unlimited” internet connection. In such cases an ISP might restrict how much bandwidth the user can use, thus increasing considerably the time it takes to upload and download content.
- 4.
As of 2009, iTunes began selling music files without DRM encryption layers at the same time they began moving to a tiered pricing system. Previously, all song files were ninety-nine cents, but most came with DRM restrictions. This can be seen as a shift away from encryption in environments where greater surveillance is possible. Now that Apple, and by extension record companies, can assess what music a user has stored in her local or cloud-based iTunes Library, whether she purchased this content or not, there is less desire to encrypt these files before distribution.
- 5.
The comments of Randi Zuckerberg, Facebook’s marketing director, were widely reported; the YDRC and I read the Daily Mail’s reporting of the comments during a roundtable on cyberbullying hosted by Marie Claire magazine. The article compared Zuckerberg’s statement to similar ones made by Google CEO Eric Schmidt. According to the article, Zuckerberg stated, “I think anonymity on the Internet has to go away. People behave a lot better when they have their real names down.… I think people hide behind anonymity and they feel like they can say whatever they want behind closed doors.” This article was accessed on February 26, 2011, from http://www.dailymail.co.uk/news/article-2019544/Facebook-director-Randi-Zuckerberg-calls-end-internet-anonymity.html#ixzz2HCxSvfTa.
- 6.
Joint Publication 1-02, “DOD Dictionary of Military and Associated Terms,” dated November 8, 2010, and amended through November 15, 2012; accessed on November 23, 2012, at: http://www.dtic.mil/doctrine/new_pubs/jp1_02.pdf.
- 7.
Banhof AB and the Banhof Bunker where its servers are located can be viewed at: http://www.bahnhof.net.
- 8.
For a more detailed description of how BGPs can be used to shut down connections to the internet within specific borders, see Cloud Flare’s analysis of how Syria shut down the internet at: http://blog.cloudflare.com/how-syria-turned-off-the-internet.
- 9.
Casey Anthony was tried in Florida for the premeditated murder of her two-year-old daughter, Caylee, but was ultimately found innocent by a jury of her peers. Google search records from a computer accessible to Casey were presented as evidence against her during the trial. Among the searches made on Google were “neck breaking” and “how to make chloroform.”
- 10.
Billig’s (1995) theorization of “banal nationalism” extends broadly to everyday practices of nationalism, such as raising a national flag and singing the national anthem, that foster geopolitical identity configurations where individuals affiliate with certain nations and/or homelands.
- 11.
I draw the term “securitization” from international relations literature (cf. Buzan et al. 1998) to account for the process of framing a given matter in terms of national, corporate, or personal security. As such, the securitization of cyberspace is the making of cyberspace a matter of security that must then be addressed through surveillance, censorship, policing, and other security practices.
- 12.
Transcribed from http://www.youtube.com/watch?v=f99PcP0aFNE.
- 13.
BGP is a software that affords the decentralized facilitation of internet-based communication.
- 14.
At the time, the bill being considered was the Cybersecurity Act of 2009. Although this bill did not pass, it continues to be proposed with various modifications during each legislative session.
- 15.
The “Parents. The Ant-Drug” site is now defunct, but a February 15, 2009, archive of its section dedicated to “Teens and Technology” can be found via the Internet Archive’s Way Back Machine at: http://web.archive.org/web/20090215014608/http://www.theantidrug.com/E-Monitoring/index.asp.
- 16.
The Children’s Online Privacy Protection Act can be found at: http://www.ftc.gov/ogc/coppa1.htm.
- 17.
The Children’s Internet Protection Act can be found at: http://www.ifea.net/cipa.pdf. The Neighborhood Children’s Internet Protection Act can be found at: http://thomas.loc.gov/cgi-bin/query/z?c106:S.1545.
- 18.
Concerned that CIPA would worsen the digital divide within the U.S. and that the censorship required by the law would regulate free speech, the American Library Association challenged the constitutionality of CIPA. On June 23, 2003, the Supreme Court of the United States upheld CIPA.
- 19.
The Child Online Protection Act (COPA) can be found at: http://www.law.cornell.edu/uscode/html/uscode47/usc_sec_47_00000231%2D%2D%2D%2D000-.html.
- 20.
The Child Pornography Prevention Act (CPPA) can be found on the Internet at: http://www.politechbot.com/docs/cppa.text.html.
- 21.
The syllabus of Ashcroft v. Free Speech Coalition, which led the Supreme Court to strike down the Child Pornography Prevention Act (CPPA), can be found at: http://en.wikisource.org/wiki/Ashcroft_v._Free_Speech_Coalition?oldid=420606.
- 22.
Judge Lowell A. Reed Jr.’s full opinion was accessed on March 23, 2012, from http://www.paed.uscourts.gov/documents/opinions/07D0346P.pdf.
- 23.
The following quote is from LifeLock’s official website and was retrieved on December 1, 2007, from http://www.lifelock.com/lifelock-for-people/how-we-do-it/how-can-lifelock-protect-my-kids-and-family.
- 24.
On July 3, 1995, Time magazine published a front cover article titled, “On a Screen Near You: Cyberporn,” that was later found to be based on a report containing several errors. An Electronic Frontier Foundation response to Time magazine’s decision to publish this story can be found here: http://w2.eff.org/Misc/Publications/Declan_McCullagh/www/rimm/time.html.
References
Ahmed, S. 2019. What’s the Use? On the Uses of Use. Durham, NC: Duke University Press.
Billig, M. 1995. Banal Nationalism. London: SAGE.
Böhme, R., and S. Köpsell. 2010. Trained to Accept? A Field Experiment on Consent Dialogs. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (April): 2403–2406.
Browne, S. 2015. Dark Matters: On the Surveillance of Blackness. Durham, NC: Duke University Press.
Buzan, B., O. Waever, and J. De Wilde. 1998. Security: A New Framework for Analysis. Boulder, CO: Lynne Rienner.
Cai, X., W. Gantz, N. Schwartz, and X. Wang. 2003. Children’s Website Adherence to the FTC’s Online Privacy Protection Rule. Journal of Applied Communication Research 31 (4): 346–362.
CNN. 2004. 12-year-old Settles Music Swap Lawsuit. February 18. https://www.cnn.com/2003/TECH/internet/09/09/music.swap.settlement/
Fine, M., and J. Ruglis. 2009. Circuits and Consequences of Dispossession: The Racialized Realignment of the Public Sphere for U.S. Youth. Transforming Anthropology 17 (1): 20–33.
Foucault, M. 1991. The Foucault Effect: Studies in Governmentality. Chicago: University of Chicago Press.
George, F.H. 1965. Cybernetics and Biology. London: Oliver & Boyd.
Gibson, W. 1984. Neuromancer. New York: Ace.
Gray, K.L. 2017. ‘They’re Just Too Urban’: Black Gamers Streaming on Twitch. In Digital Sociologies, ed. J. Daniels, K. Gregory, and T. McMillan Cottom, 355–368. Bristol, UK: Policy Press.
Greenhow, C., and C. Lewin. 2016. Social Media and Education: Reconceptualizing the Boundaries of Formal and Informal Learning. Learning, Media and Technology 41 (1): 6–30.
Hunter, D. 2003. Cyberspace as Place and the Tragedy of the Digital Anticommons. California Law Review 91 (2): 439–519. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=306662.
Jeffrey, C. 2013. Geographies of Children and Youth III: Alchemists of the Revolution? Progress in Human Geography 37 (1): 145–152.
Karaganis, J. 2011. Copyright Infringement and Enforcement in the US. American Assembly. Columbia University. http://piracy.ssrc.org/wp-content/uploads/2011/11/AA-Research-Note-Infringement-and-Enforcement-November-2011.pdf.
Katz, C. 2001. The State Goes Home: Local Hypervigilance and the Global Retreat from Social Reproduction. Social Justice 28 (3): 47–56.
———. 2006. Power, Space, and Terror: Social Reproduction and the Public Environment. In The Politics of Public Space, ed. S. Low and N. Smith, 105–122. New York: Routledge.
———. 2007. Banal Terrorism: Spatial Fetishism and Everyday Insecurity. In Violent Geographies: Fear, Terror, and Political Violence, ed. D. Gregory and A. Pred, 349–361. New York: Routledge.
———. 2008. Me and My Monkey: What’s Hiding in the Security State. In Indefensible Space: The Architecture of the National Insecurity State, ed. M. Sorkin, 305–323. New York: Routledge.
Lemley, M.A. 2003. Place and Cyberspace. California Law Review 91 (2): 521–542.
Lippmann, W. 1913. A Preface to Politics. New York: Free Press.
McDonald, A.M., and L.F. Cranor. 2008. The Cost of Reading Privacy Policies. I/S: A Journal of Law and Policy 4 (3): 543–568.
Mills, S., and P. Kraftl. 2014. Introduction: Geographies, Histories and Practices of Informal Education. In Informal Education, Childhood and Youth, 1–18. London: Palgrave Macmillan.
Mohapatra, M., and A. Hasty. 2012. Mobile Apps for Kids: Disclosures Still Not Making the Grade. Federal Trade Commission Staff Report.
Monahan, T. 2006. The Surveillance Curriculum: Risk Management and Social Control in the Neoliberal School. In Surveillance and Security: Technological Politics and Power in Everyday Life, ed. T. Monahan. New York: Routledge.
Mongelli, L. 2003. Music Pirate: N.Y. Girl, 12, Sued for Web Songs Theft. New York Post. September 9.
Montgomery, K.C. 2007. Generation Digital: Politics, Commerce, and Childhood in the Age of the Internet. Cambridge, MA: MIT Press.
Obar, J.A., and A. Oeldorf-Hirsch. 2018. The Biggest Lie on the Internet: Ignoring the Privacy Policies and Terms of Service Policies of Social Networking Services. Information, Communication & Society 23: 1–20.
Parikka, J. 2005. Digital Monsters, Binary Aliens—Computer Viruses, Capitalism and the Flow of Information. Fibreculture 4. http://journal.fibreculture.org/issue4/issue4_parikka.html.
Postman, N. 1992. Technopoly: The Surrender of Culture to Technology. New York: Vintage.
Pratt, G., and V. Rosner. 2006. Introduction: The Global & the Intimate. Women’s Studies Quarterly 34 (1/2): 13–24.
Roth, S., and O. Erstad. 2013. Networked Lives for Learning: Digital Media and Young People across Formal and Informal Contexts. In Using Network and Mobile Technology to Bridge Formal and Informal Learning, 119–152. Oxford: Chandos.
Sandvine. 2014. The Global Internet Phenomena Report: 2H 2014. https://www.sandvine.com/hubfs/downloads/archive/2014-2h-global-internet-phenomena-report.pdf
Singel, R. 2010. Check the Hype—There’s No Such Thing as ‘Cyber.’ Wired. http://www.wired.com/threatlevel/2010/03/cyber-hype/.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 The Author(s)
About this chapter
Cite this chapter
Donovan, G.T. (2020). Designing Use with Youth. In: Canaries in the Data Mine. Palgrave Macmillan, Singapore. https://doi.org/10.1007/978-981-15-7289-0_5
Download citation
DOI: https://doi.org/10.1007/978-981-15-7289-0_5
Published:
Publisher Name: Palgrave Macmillan, Singapore
Print ISBN: 978-981-15-7288-3
Online ISBN: 978-981-15-7289-0
eBook Packages: Social SciencesSocial Sciences (R0)