Skip to main content

Designing Use with Youth

  • Chapter
  • First Online:
Canaries in the Data Mine
  • 65 Accesses

Abstract

Chapter 5, “Designing Use with Youth,” considers the formal and informal ways young people are taught to use digital media and how this learning process has been shaped by corporate and state interests. The participatory design of a social network through the MyDF Project is further unpacked to discuss how modes of informational development, such as the U.S. national security doctrine of cyberdominance, were reproduced, reworked, and resisted by interviewees and co-researchers alike. Extrapolating from research and design interventions, such as the YDRC’s development of a Terms of Use policy for their social network, this chapter also discusses how young people and their communities can design digital environments and research relationships that help reproduce what Sarah Ahmed (What’s the Use? On the Uses of Use. Durham, NC: Duke University Press, 2019) has described as a “queer use.”

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    As discussed in Chap. 4, all youth co-researchers consented to the audio recording of these workshops but collectively decided that any direct quotes used in this analysis were to be attributed simply to “member(s) of the YDRC,” “youth co-researcher(s),” or just “the YDRC.” Asmaou, Kaitlin, Rose, Saif, and Yvonne all felt comfortable publicly identifying themselves as members of the YDRC, but they did not want to have to have individual quotes or actions attributed specifically to their name.

  2. 2.

    The Digital Millennium Copyright Act (DMCA), passed in 1998, is a U.S. copyright law that largely focuses on digital rights management (DRM) to criminalize both copyright infringement and the circumvention of copyright controls.

  3. 3.

    The monitoring and throttling of a user’s bandwidth typically occur when an ISP customer is downloading and/or uploading above-average amounts of data through his technically “unlimited” internet connection. In such cases an ISP might restrict how much bandwidth the user can use, thus increasing considerably the time it takes to upload and download content.

  4. 4.

    As of 2009, iTunes began selling music files without DRM encryption layers at the same time they began moving to a tiered pricing system. Previously, all song files were ninety-nine cents, but most came with DRM restrictions. This can be seen as a shift away from encryption in environments where greater surveillance is possible. Now that Apple, and by extension record companies, can assess what music a user has stored in her local or cloud-based iTunes Library, whether she purchased this content or not, there is less desire to encrypt these files before distribution.

  5. 5.

    The comments of Randi Zuckerberg, Facebook’s marketing director, were widely reported; the YDRC and I read the Daily Mail’s reporting of the comments during a roundtable on cyberbullying hosted by Marie Claire magazine. The article compared Zuckerberg’s statement to similar ones made by Google CEO Eric Schmidt. According to the article, Zuckerberg stated, “I think anonymity on the Internet has to go away. People behave a lot better when they have their real names down.… I think people hide behind anonymity and they feel like they can say whatever they want behind closed doors.” This article was accessed on February 26, 2011, from http://www.dailymail.co.uk/news/article-2019544/Facebook-director-Randi-Zuckerberg-calls-end-internet-anonymity.html#ixzz2HCxSvfTa.

  6. 6.

    Joint Publication 1-02, “DOD Dictionary of Military and Associated Terms,” dated November 8, 2010, and amended through November 15, 2012; accessed on November 23, 2012, at: http://www.dtic.mil/doctrine/new_pubs/jp1_02.pdf.

  7. 7.

    Banhof AB and the Banhof Bunker where its servers are located can be viewed at: http://www.bahnhof.net.

  8. 8.

    For a more detailed description of how BGPs can be used to shut down connections to the internet within specific borders, see Cloud Flare’s analysis of how Syria shut down the internet at: http://blog.cloudflare.com/how-syria-turned-off-the-internet.

  9. 9.

    Casey Anthony was tried in Florida for the premeditated murder of her two-year-old daughter, Caylee, but was ultimately found innocent by a jury of her peers. Google search records from a computer accessible to Casey were presented as evidence against her during the trial. Among the searches made on Google were “neck breaking” and “how to make chloroform.”

  10. 10.

    Billig’s (1995) theorization of “banal nationalism” extends broadly to everyday practices of nationalism, such as raising a national flag and singing the national anthem, that foster geopolitical identity configurations where individuals affiliate with certain nations and/or homelands.

  11. 11.

    I draw the term “securitization” from international relations literature (cf. Buzan et al. 1998) to account for the process of framing a given matter in terms of national, corporate, or personal security. As such, the securitization of cyberspace is the making of cyberspace a matter of security that must then be addressed through surveillance, censorship, policing, and other security practices.

  12. 12.

    Transcribed from http://www.youtube.com/watch?v=f99PcP0aFNE.

  13. 13.

    BGP is a software that affords the decentralized facilitation of internet-based communication.

  14. 14.

    At the time, the bill being considered was the Cybersecurity Act of 2009. Although this bill did not pass, it continues to be proposed with various modifications during each legislative session.

  15. 15.

    The “Parents. The Ant-Drug” site is now defunct, but a February 15, 2009, archive of its section dedicated to “Teens and Technology” can be found via the Internet Archive’s Way Back Machine at: http://web.archive.org/web/20090215014608/http://www.theantidrug.com/E-Monitoring/index.asp.

  16. 16.

    The Children’s Online Privacy Protection Act can be found at: http://www.ftc.gov/ogc/coppa1.htm.

  17. 17.

    The Children’s Internet Protection Act can be found at: http://www.ifea.net/cipa.pdf. The Neighborhood Children’s Internet Protection Act can be found at: http://thomas.loc.gov/cgi-bin/query/z?c106:S.1545.

  18. 18.

    Concerned that CIPA would worsen the digital divide within the U.S. and that the censorship required by the law would regulate free speech, the American Library Association challenged the constitutionality of CIPA. On June 23, 2003, the Supreme Court of the United States upheld CIPA.

  19. 19.

    The Child Online Protection Act (COPA) can be found at: http://www.law.cornell.edu/uscode/html/uscode47/usc_sec_47_00000231%2D%2D%2D%2D000-.html.

  20. 20.

    The Child Pornography Prevention Act (CPPA) can be found on the Internet at: http://www.politechbot.com/docs/cppa.text.html.

  21. 21.

    The syllabus of Ashcroft v. Free Speech Coalition, which led the Supreme Court to strike down the Child Pornography Prevention Act (CPPA), can be found at: http://en.wikisource.org/wiki/Ashcroft_v._Free_Speech_Coalition?oldid=420606.

  22. 22.

    Judge Lowell A. Reed Jr.’s full opinion was accessed on March 23, 2012, from http://www.paed.uscourts.gov/documents/opinions/07D0346P.pdf.

  23. 23.

    The following quote is from LifeLock’s official website and was retrieved on December 1, 2007, from http://www.lifelock.com/lifelock-for-people/how-we-do-it/how-can-lifelock-protect-my-kids-and-family.

  24. 24.

    On July 3, 1995, Time magazine published a front cover article titled, “On a Screen Near You: Cyberporn,” that was later found to be based on a report containing several errors. An Electronic Frontier Foundation response to Time magazine’s decision to publish this story can be found here: http://w2.eff.org/Misc/Publications/Declan_McCullagh/www/rimm/time.html.

References

  • Ahmed, S. 2019. What’s the Use? On the Uses of Use. Durham, NC: Duke University Press.

    Book  Google Scholar 

  • Billig, M. 1995. Banal Nationalism. London: SAGE.

    Google Scholar 

  • Böhme, R., and S. Köpsell. 2010. Trained to Accept? A Field Experiment on Consent Dialogs. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (April): 2403–2406.

    Google Scholar 

  • Browne, S. 2015. Dark Matters: On the Surveillance of Blackness. Durham, NC: Duke University Press.

    Book  Google Scholar 

  • Buzan, B., O. Waever, and J. De Wilde. 1998. Security: A New Framework for Analysis. Boulder, CO: Lynne Rienner.

    Google Scholar 

  • Cai, X., W. Gantz, N. Schwartz, and X. Wang. 2003. Children’s Website Adherence to the FTC’s Online Privacy Protection Rule. Journal of Applied Communication Research 31 (4): 346–362.

    Article  Google Scholar 

  • CNN. 2004. 12-year-old Settles Music Swap Lawsuit. February 18. https://www.cnn.com/2003/TECH/internet/09/09/music.swap.settlement/

  • Fine, M., and J. Ruglis. 2009. Circuits and Consequences of Dispossession: The Racialized Realignment of the Public Sphere for U.S. Youth. Transforming Anthropology 17 (1): 20–33.

    Article  Google Scholar 

  • Foucault, M. 1991. The Foucault Effect: Studies in Governmentality. Chicago: University of Chicago Press.

    Google Scholar 

  • George, F.H. 1965. Cybernetics and Biology. London: Oliver & Boyd.

    Google Scholar 

  • Gibson, W. 1984. Neuromancer. New York: Ace.

    Google Scholar 

  • Gray, K.L. 2017. ‘They’re Just Too Urban’: Black Gamers Streaming on Twitch. In Digital Sociologies, ed. J. Daniels, K. Gregory, and T. McMillan Cottom, 355–368. Bristol, UK: Policy Press.

    Google Scholar 

  • Greenhow, C., and C. Lewin. 2016. Social Media and Education: Reconceptualizing the Boundaries of Formal and Informal Learning. Learning, Media and Technology 41 (1): 6–30.

    Article  Google Scholar 

  • Hunter, D. 2003. Cyberspace as Place and the Tragedy of the Digital Anticommons. California Law Review 91 (2): 439–519. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=306662.

  • Jeffrey, C. 2013. Geographies of Children and Youth III: Alchemists of the Revolution? Progress in Human Geography 37 (1): 145–152.

    Google Scholar 

  • Karaganis, J. 2011. Copyright Infringement and Enforcement in the US. American Assembly. Columbia University. http://piracy.ssrc.org/wp-content/uploads/2011/11/AA-Research-Note-Infringement-and-Enforcement-November-2011.pdf.

  • Katz, C. 2001. The State Goes Home: Local Hypervigilance and the Global Retreat from Social Reproduction. Social Justice 28 (3): 47–56.

    Google Scholar 

  • ———. 2006. Power, Space, and Terror: Social Reproduction and the Public Environment. In The Politics of Public Space, ed. S. Low and N. Smith, 105–122. New York: Routledge.

    Google Scholar 

  • ———. 2007. Banal Terrorism: Spatial Fetishism and Everyday Insecurity. In Violent Geographies: Fear, Terror, and Political Violence, ed. D. Gregory and A. Pred, 349–361. New York: Routledge.

    Google Scholar 

  • ———. 2008. Me and My Monkey: What’s Hiding in the Security State. In Indefensible Space: The Architecture of the National Insecurity State, ed. M. Sorkin, 305–323. New York: Routledge.

    Google Scholar 

  • Lemley, M.A. 2003. Place and Cyberspace. California Law Review 91 (2): 521–542.

    Article  Google Scholar 

  • Lippmann, W. 1913. A Preface to Politics. New York: Free Press.

    Google Scholar 

  • McDonald, A.M., and L.F. Cranor. 2008. The Cost of Reading Privacy Policies. I/S: A Journal of Law and Policy 4 (3): 543–568.

    Google Scholar 

  • Mills, S., and P. Kraftl. 2014. Introduction: Geographies, Histories and Practices of Informal Education. In Informal Education, Childhood and Youth, 1–18. London: Palgrave Macmillan.

    Chapter  Google Scholar 

  • Mohapatra, M., and A. Hasty. 2012. Mobile Apps for Kids: Disclosures Still Not Making the Grade. Federal Trade Commission Staff Report.

    Google Scholar 

  • Monahan, T. 2006. The Surveillance Curriculum: Risk Management and Social Control in the Neoliberal School. In Surveillance and Security: Technological Politics and Power in Everyday Life, ed. T. Monahan. New York: Routledge.

    Chapter  Google Scholar 

  • Mongelli, L. 2003. Music Pirate: N.Y. Girl, 12, Sued for Web Songs Theft. New York Post. September 9.

    Google Scholar 

  • Montgomery, K.C. 2007. Generation Digital: Politics, Commerce, and Childhood in the Age of the Internet. Cambridge, MA: MIT Press.

    Book  Google Scholar 

  • Obar, J.A., and A. Oeldorf-Hirsch. 2018. The Biggest Lie on the Internet: Ignoring the Privacy Policies and Terms of Service Policies of Social Networking Services. Information, Communication & Society 23: 1–20.

    Google Scholar 

  • Parikka, J. 2005. Digital Monsters, Binary Aliens—Computer Viruses, Capitalism and the Flow of Information. Fibreculture 4. http://journal.fibreculture.org/issue4/issue4_parikka.html.

  • Postman, N. 1992. Technopoly: The Surrender of Culture to Technology. New York: Vintage.

    Google Scholar 

  • Pratt, G., and V. Rosner. 2006. Introduction: The Global & the Intimate. Women’s Studies Quarterly 34 (1/2): 13–24.

    Google Scholar 

  • Roth, S., and O. Erstad. 2013. Networked Lives for Learning: Digital Media and Young People across Formal and Informal Contexts. In Using Network and Mobile Technology to Bridge Formal and Informal Learning, 119–152. Oxford: Chandos.

    Chapter  Google Scholar 

  • Sandvine. 2014. The Global Internet Phenomena Report: 2H 2014. https://www.sandvine.com/hubfs/downloads/archive/2014-2h-global-internet-phenomena-report.pdf

  • Singel, R. 2010. Check the Hype—There’s No Such Thing as ‘Cyber.’ Wired. http://www.wired.com/threatlevel/2010/03/cyber-hype/.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gregory T. Donovan .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Donovan, G.T. (2020). Designing Use with Youth. In: Canaries in the Data Mine. Palgrave Macmillan, Singapore. https://doi.org/10.1007/978-981-15-7289-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-7289-0_5

  • Published:

  • Publisher Name: Palgrave Macmillan, Singapore

  • Print ISBN: 978-981-15-7288-3

  • Online ISBN: 978-981-15-7289-0

  • eBook Packages: Social SciencesSocial Sciences (R0)

Publish with us

Policies and ethics