{"id":58,"date":"2008-04-17T12:00:40","date_gmt":"2008-04-17T01:00:40","guid":{"rendered":"http:\/\/scriptorum.imagicity.com\/2008\/04\/17\/the-soft-computer\/"},"modified":"2008-04-17T12:00:40","modified_gmt":"2008-04-17T01:00:40","slug":"the-soft-computer","status":"publish","type":"post","link":"https:\/\/village-explainer.kabisan.com\/index.php\/2008\/04\/17\/the-soft-computer\/","title":{"rendered":"The Soft Computer"},"content":{"rendered":"<p>Let\u2019s forget about technology for a moment. Let\u2019s quit thinking about contraptions that rattle more than they hum, often alarmingly. Let\u2019s not talk about technology at all.<\/p>\n<p>Let\u2019s talk about people instead.<\/p>\n<p>\u2018What a piece of work is a man!\u2019 says Hamlet. \u2018How noble in reason! How infinite in faculty! In form and moving how express and admirable! In action how like an angel! In apprehension how like a god!\u2019<\/p>\n<p>This speech has always puzzled me, because many of the human beings I know may qualify as a \u2018piece of work\u2019, but lack somewhat in the expressive, admirable, angelic and god-like categories. It only follows, therefore, that if humans are less than angelic in their actions, the things they do with technology might likewise be flawed.<br \/>\n<!--more--><br \/>\nThe Australian government announced this week that they wanted to extend the temporary anti-terrorist powers granted to them following September 11, 2001. They proposed allowing employers to intercept their employees\u2019 emails and other Internet communications without their consent. The justification they used was that the nation\u2019s IT infrastructure could be used to attack its financial systems, power grid and even its transport.<\/p>\n<p>Attorney-General Robert McClelland used the example of recent attacks on Estonia\u2019s Internet services, which brought communications to a halt for days. Such a gambit, he warned, \u2018would reap far greater economic damage than would be the case of a physical [terrorist] attack.\u2019 He neglected to mention that it\u2019s since been determined that the Estonian attack was the work of a single rogue hacker against a particularly vulnerable and poorly constructed communications system.<\/p>\n<p>Security and privacy are often portrayed as a zero-sum game. Put plainly, this means that 100% security implies 0% privacy. Knowing what we know of human nature, such an assertion has alarming implications.<\/p>\n<p>People are gossips and busybodies by nature. There are few, if any, exceptions to this rule. So it\u2019s not difficult at all to imagine countless scenarios where a nosey boss might use the legally mandated right to snoop on his staff for any number of reasons other than fighting terrorism.<\/p>\n<p>More to the point, it\u2019s difficult to imagine how this attack on privacy could have any effect whatsoever in diminishing terror. Who but the most inept of terrorists would ever use the company email account to talk with his partners in crime?<\/p>\n<p>Privacy and respect in the workplace are always in contention with the employer\u2019s right to ensure that operations are smoothly conducted, that customer service is maintained at a high level, and that the company is not seen to be anything less than the paragon of corporate citizenship. On accepting employment within a given organisation, people willingly surrender some modicum of their individuality in pursuit of the company\u2019s goals. But it\u2019s a poor manager indeed who doesn\u2019t recognise that staff will thrive through empowerment and responsibility. Constant scrutiny and mistrust have exactly the opposite effect.<\/p>\n<p>Technology feeds the constant temptation to peer into other people\u2019s lives. And people\u2019s lack of understanding of the implications of a world-wide network often lead them to expose themselves far more than they would by other means.<\/p>\n<p>A question: If you knew for a fact that the person taking a photo of you at a party, tipsy and laughing in a silly hat, would post it to Facebook, would you let them go ahead? What if you knew that prospective employers, contractors, media types \u2013 even police \u2013 would be able to see that photo for years to come? Would you still let that photo be taken?<\/p>\n<p>Or what about that angry, poorly considered statement that you spurted out in a momentary fit of pique? What if you knew for a fact that it would be seen by someone you wanted to date? Would you be prepared to be judged by it for the rest of your life?<\/p>\n<p>Very few people truly understand the vastly public nature of the Internet. The majority of people have trouble understanding how exposed they are to the scrutiny of others because they compose their missives in the relative privacy of their home or office. As far as they can tell, it\u2019s something between them and their computer screen.<\/p>\n<p>Others vastly underrate the impact of their snooping. Once again, because there\u2019s no one there but them and the screen, they have trouble visualising how deeply uncomfortable it would be for both if the object of their curiousity were present in the room at the time.<\/p>\n<p>Among those whose job it is to think about these things, there are two dominant responses. One side advocates an approach that can be summarised as Full Disclosure. They say, let\u2019s accept that the information genie is out of the bottle and learn to live our entire lives in the open. Let\u2019s not grant anyone the right or the ability to monopolise information. Let\u2019s do that by making it visible to everyone.<\/p>\n<p>Succinctly, Full Disclosure advocates assume that what\u2019s good for the goose is what\u2019s good for the gander. If I know something embarrassing about you and want to capitalise on it, I need to consider that you could just as easily find something embarrassing about me. As long as we all live our lives with the proper level of transparency and respect however, we can achieve an entente that will be acceptable to everyone.<\/p>\n<p>At the other end of the privacy argument are those who advocate strict controls on access to information for anyone entrusted with it. The basic assumption here is that respecting individual privacy is a sacred trust that must not be abused. Advocates of this approach want strict limits placed on all entities with access to potentially compromising information.<\/p>\n<p>There are compelling aspects to both these perspectives there is not enough space here to amplify on either. All this humble writer can do is implore you to consider how best to balance these considerations at the workplace, in policy and in your day-to-day life.<\/p>\n<p>In Vanuatu the cornerstone of Kastom is respect. The vast majority here live as they have for over 3000 years. The Internet is in many ways a more fully realised rendition of Marshall McLuhan\u2019s metaphor of the global village. McLuhan intended the image to be derogatory, ridiculing modern humanity\u2019s embrace of television and mass culture. He imagined a world returned to a primitive state, staring dumbly at the flickering light of the TV screen, as he imagined villagers once gazed into the communal fire.<\/p>\n<p>He was wrong, of course, to assume that village life was one iota less complex than in the 21st century. He was wrong to assume that village life lacked subtlety, nuance, even byzantine political and social machinations.<\/p>\n<p>He was right, though, about one crucial thing. We all live in the same place now. Just as we weigh our words around the camp fire, just as we weigh the respect we show others in the nakamal against what we expect in return, we need to think carefully about what we say and do on the Internet.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Let\u2019s forget about technology for a moment. Let\u2019s quit thinking about contraptions that rattle more than they hum, often alarmingly. Let\u2019s not talk about technology at all. Let\u2019s talk about people instead. \u2018What a piece of work is a man!\u2019 says Hamlet. \u2018How noble in reason! How infinite in faculty! In form and moving how [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,5,10],"tags":[240,264,482],"class_list":["post-58","post","type-post","status-publish","format-standard","hentry","category-geek","category-journamalism","category-soft-core","tag-global-village","tag-human-factors","tag-privacy"],"_links":{"self":[{"href":"https:\/\/village-explainer.kabisan.com\/index.php\/wp-json\/wp\/v2\/posts\/58","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/village-explainer.kabisan.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/village-explainer.kabisan.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/village-explainer.kabisan.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/village-explainer.kabisan.com\/index.php\/wp-json\/wp\/v2\/comments?post=58"}],"version-history":[{"count":0,"href":"https:\/\/village-explainer.kabisan.com\/index.php\/wp-json\/wp\/v2\/posts\/58\/revisions"}],"wp:attachment":[{"href":"https:\/\/village-explainer.kabisan.com\/index.php\/wp-json\/wp\/v2\/media?parent=58"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/village-explainer.kabisan.com\/index.php\/wp-json\/wp\/v2\/categories?post=58"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/village-explainer.kabisan.com\/index.php\/wp-json\/wp\/v2\/tags?post=58"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}