2015
DOI: 10.15307/fcj.26.196.2015
|View full text |Cite
|
Sign up to set email alerts
|

FCJ-196 Let’s First Get Things Done! On Division of Labour and Techno-political Practices of Delegation in Times of Crisis

Abstract: Abstract:During particular historical junctures, characterised by crisis, deepening exploitation and popular revolt, hegemonic hierarchies are simultaneously challenged and reinvented, and in the process of their reconfiguration in due course subtly reproduced. It is towards such 'sneaky moments' in which the ongoing divide between those engaged in struggles of social justice and those struggling for just technologies have been reshaped that we want to lend our attention. The paradoxical consequences of the di… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(23 citation statements)
references
References 7 publications
0
23
0
Order By: Relevance
“…Much resistance to surveillance following the Snowden leaks has centred on these latter strategies – particularly on developing and ‘mainstreaming’ alternative technologies alongside campaigns for tighter policies on the protection of personal data. To start with, forums to provide secure digital infrastructures to activists have proliferated, with ‘numerous digital rights and internet freedom initiatives seizing the moment to propose new communication methods for activists (and everyday citizens) that are strengthened through encryption.’ (Aouragh et al., 2015: 213). These have included renewed focus on privacy-enhancing tools such as the TOR browser, the GPG email encryption system and the encrypted phone and text messaging software Signal.…”
Section: Anti-surveillance and Techno-legal Resistancementioning
confidence: 99%
See 1 more Smart Citation
“…Much resistance to surveillance following the Snowden leaks has centred on these latter strategies – particularly on developing and ‘mainstreaming’ alternative technologies alongside campaigns for tighter policies on the protection of personal data. To start with, forums to provide secure digital infrastructures to activists have proliferated, with ‘numerous digital rights and internet freedom initiatives seizing the moment to propose new communication methods for activists (and everyday citizens) that are strengthened through encryption.’ (Aouragh et al., 2015: 213). These have included renewed focus on privacy-enhancing tools such as the TOR browser, the GPG email encryption system and the encrypted phone and text messaging software Signal.…”
Section: Anti-surveillance and Techno-legal Resistancementioning
confidence: 99%
“…How, then, might we address this disconnect? Aouragh et al (2015) argue that the 'division of labour' between what they label 'tech justice' and 'social justice' activists emerges partly from the socio-technical practices that have been advanced in secure communication campaigns in which there is a distinct user-developer dichotomy that places the onus on the (individual) 'user' to protect themselves (identifying risks using 'threat modelling') with tools provided by the 'developer'. Similarly, Kazansky (2016) found, based on her experience with providing information security training for human rights activists, that training is often designed towards the individual user rather than as a collective project that considers the enabling social structures needed for secure communication to become an integrated activist practice.…”
Section: 'Data Justice' and The Bridging Of Activism(s)mentioning
confidence: 99%
“…Amid these developments, affected communities have tried to make sense of risk in their daily practices, continuously assessing their environment, engaging in “threat modeling,” and adapting practices accordingly (Myers West, 2017). “Tech activists” (Aouragh et al, 2015; Milan, 2013) and civil society organizations have sought to raise awareness of emerging issues of concern and have developed technological interventions in response (Daskal, 2018; Dencik et al, 2016). These activities have resulted in a plethora of software projects which undergo a continued iteration in response to shifting concerns and priorities.…”
Section: Capturing Shifting Counter-imaginaries: a Heuristicmentioning
confidence: 99%
“…Civil society actors have sought to “pour as much sand into this machine of suspicion as we possibly can” (Milan, 2013: 156), engaging in subversive or defensive individual practices, civil disobedience against unfair laws, policy advocacy and the creation of resistant infrastructure (cf. Aouragh et al, 2015). The ubiquity and extraordinary pervasiveness of datafication, however, presents today’s activists with ever-newer challenges.…”
Section: Introductionmentioning
confidence: 99%
“…The target audience of the applications, especially those born post-Snowden, is far from being limited to tech-savvy and activist groups; several projects are aimed at widespread use. A majority of members of the technical crypto community consider user-friendliness and usability as the main issue that stands between the wish for large-scale adoption and its realization in practice, although this take has been challenged by scholars as a 'forced responsabilisation' of users to the detriment of the development of resilient collective digital security strategies (Kazansky, 2015) and as a ' delegation' of technical matters 4 Borrowing from the conclusions of a survey conducted within the first year of the NEXTLEAP project, partly summarized in (Ermoshina et al, 2016) to 'progressive techies' despite a widespread societal desire to develop technologies for social justice (Aouragh et al, 2015). End-to-end encrypted messaging tools are currently at the centre of a powerful ' double' narrative.…”
Section: Secure Messaging Tools: a Field In The Makingmentioning
confidence: 99%