TACTICAL MEMORY: THE POLITICS OF OPENNESS IN THE CONSTRUCTION OF MEMORY

Autores

  • Sandra Braman

DOI:

https://doi.org/10.21728/logeion.2017v4n1.p129-153

Resumo

Those in the openness movement believe that access to information is inherently democratic, and assume the effects of openness will all be good from the movement’s perspective. But means are not ends, nothing is inevitable, and just what will be done with openly available information once achieved is rarely specified. One implicit goal of the openness movement is to create and sustain politically useful memory in situations in which official memory may not suffice, but to achieve this, openness is not enough. With the transition from a panopticon to a panspectron environment, the production of open information not only provides support for communities but also contributes to surveillance. Proprietary ownership of information is being challenged, but there is erosion of ownership in the sense of being confident in what is known. Some tactics currently in use need to be re–evaluated to determine their actual effects under current circumstances. Successfully achieving tactical memory in the 21st century also requires experimentation with new types of tactics, including those of technological discretion and of scale as a medium. At the most abstract level, the key political battle of the 21st century may not be between particular political parties or ideologies but, rather, the war between mathematics and narrative creativity.

Downloads

Não há dados estatísticos.

Biografia do autor

Sandra Braman

Mestranda em Ciência da Informação no Programa de Pós-Graduação em Ciência da Informação do Instituto Brasileiro de Informação em Ciência e Tecnologia/ Universidade Federal do Rio de Janeiro. Possui graduação em Biblioteconomia pela Universidade Federal do Estado do Rio de Janeiro (2013), hab. em Gestão da Informação. Trabalha como analista de informação na Promon Engenharia LTDA (desde 2004). Participa do Grupo de Pesquisa Economias Colaborativas e Produção P2P no Brasil do Instituto Brasileiro de Informação em Ciência e Tecnologia – IBICT. Participa de projetos de avaliação e análise de requisitos para sistemas de gerenciamento eletrônico de documentos e projetos de inovação em organizações. Experiência em gestão de informação, documentação técnica de engenharia e sistemas de gestão eletrônica de documentos. Áreas de interesse: estudos humanísticos da informação; organização do conhecimento; comunicação e inovação.

http://lattes.cnpq.br/0786948390376844

Referências

Janet Abbate, 1999. Inventing the Internet. Cambridge, Mass.: MIT Press.

Rakesh Agrawal and Ramakrishnan Srikant, 2000. “Privacy–preserving data mining,”Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, volume 29, number 2, pp. 439–450.

Almeida–Sanchez v. United States, 413 U.S. 266, 272–73 (1973).

J. Andersson and J. Rönnberg. 1996. “Collaboration and memory: Effects of dyadic retrieval on different memory tasks,” Applied Cognitive Psychology, volume 10, number 2, pp. 171–81.

Roger A. Beaumont, 1994. War, chaos, and history. New York: Praeger.

Ulrich Beck, 1992. Risk society: Towards a new modernity. Translated by Mark Ritter. London: Sage.

Jeremy Bentham, 1787. “Panopticon,” In: Miran Bozovic (editor). The panopticon writings. London: Verso, 1995, pp. 29–95.

Bruce Bower, 1997. “Partners in recall: Elderly spouses build better memories,” Science News, volume 11 (13 September), pp. 174–175.

Sandra Braman, 1989. “Defining information: An approach for policy-makers,” Telecommunications Policy, volume 13, number 3, pp. 233–242.

Craig Calhoun, 1991. “Indirect relationships and imagined communities: Large–scale social integration and the transformation of everyday life,” In: Pierre Bourdieu and James S. Coleman (editors). Social theory for a changing society. Boulder, Colo.: Westview Press, pp. 95–120.

Shuchi Chawla, Cynthia Dwork, Frank McSherry, Adam Smith, and Hoeteck Wee, 2005. “Toward privacy in public databases,” presented to the Second Theory of Cryptography Conference, Cambridge (February), at http://theory.lcs.mit.edu/~asmith/PS/sdb-tcc-2005-almost-final-proceedings.pdf, accessed 9 August 2006.

Manuel De Landa, 1991. War in the age of intelligent machines. New York: Zone Books.

Christopher Dewdney, 1998. Last flesh: Life in the transhuman era. Toronto: McClelland and Stewart.

Cynthia Dwork, 2006. “Differential privacy,” presented to the 33rd International Colloquium on Automata, Languages and Programming, S.

Servolo, Venice (July), and at http://research.microsoft.com/research/sv/DatabasePrivacy/dwork.pdf, accessed 9 August 2006.

E.I. duPont de Nemours Powder Co. v. Masland, 244 U.S. 100 (1917). Federal Register, 2003, pp. 14140–14141 (24 March).

Michel Foucault, 1979. “Panopticism,” In: Discipline and punish: The birth of the prison. Translated by Alan Sheridan. New York: Vintage Books, pp. 195–230.

David Garcia and Geert Lovink, 1997. “The ABC of tactical media,” first distributed via the nettime listserv; now available online at http://subsol.c3.hu/subsol_2/contributors2/garcialovinktext. html, accessed 9 August 2006.

Clifford Geertz, 1983. “Fact and law in comparative perspective,” In: Local knowledge: Further essays in interpretive anthropology. New York: Basic Books, pp. 167–234.

James Jerome Gibson, 1966. The senses considered as perceptual systems. Boston: Houghton Mifflin.

Wilbur A. Glahn and Cameron G. Shilling, 2002. “The cutting edge of trade secret law,” Findlaw.com, at http://library.findlaw.com/2002/Dec/20/132443.html, accessed 9 August 2006.

Nathan Hamler, 2000. “The impending merger of the inevitable disclosure doctrine and negative trade secrets: Is trade secret law heading in the right direction?” Journal of Corporate Law, volume 25 (Winter), pp. 383–405.

Branden Hookway, 2000. Pandemonium: The rise of predatory locales in the postwar world. Princeton, N.J.: Princeton Architectural Press.

Yasunori Ishihara, Shuichiro Ako, and Toru Fujiwara, 2005. “Security against inference attacks on negative information in object–oriented databases,” IEICE Transactions on Information and Systems, volume E88–D, number 12, pp. 2767–2776.

Judith B. Ittig, 1973. “The rites of passage: Border searches and the Fourth Amendment,” 40 Tennessee Law Review 329 (Spring).

Vijay S. Iyengar, 2002. “Transforming data to satisfy privacy constraints,” Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery (New York: ACM Press), pp. 279–288.

Hillol Kargupta, Souptik Datta, Qi Wang and Krashanmoorthy Sivakumar, 2003. “On the privacy preserving properties of random data pertubation techniques,” ICDM 2003: Third IEEE International Conference on Data Mining (New York: IEEE), pp. 99–106.

Saket Kaushik, Wijesekera Duminda, and Paul Ammann, 2005. “Policy based dissemination of partial Web ontologies,” SWS ’05: Proceedings of the 2005 ACM Workshop on Secure Web Services (New York: ACM Press),pp. 43–62.

Kewanee Oil Company v. Bicron Corporation, 416 U.S. 470 (1974).

Jack Kloppenburg and Beth Burrows, 1996. “Biotechnology to the rescue? Twelve reasons why biotechnology is incompatible with sustainable agriculture,” Ecologist, volume 26, number 2, pp. 61–68.

G. Lawson–Borders and R. Kirk, 2005. “Blogs in campaign communication,” American Behavioral Scientist, volume 49, number 4, pp. 548–559.

A.D. Lee, 1993. Information and frontiers: Roman foreign relations in late antiquity. Cambridge: Cambridge University Press.

Edward Levi, 1949. An introduction to legal reasoning. Chicago: University of Chicago Press.

Suellen Lowry, 1988. “Inevitable disclosure trade secret disputes: Dissolution of concurrent property interests,” Stanford Law Review, volume 40 (January), pp. 519–544.

Benoit B. Mandelbrot, 1977. Fractals: Form, chance, and dimension. New York: W.H. Freeman.

Prasenjit Mitra, ChiChun Pan, and Peng Liu, 2006. “Privacy preserving semantic dinteroperation and access control of heterogeneous databases,” Proceedings of the 2006 ACM Symposium on Information, Communication, and Computer Security (New York: ACM Press), pp. 66–77.

Alberto Melucci, 1997. Challenging codes: Collective action in the information age. Cambridge: Cambridge University Press.

Ian Molho, 1997. The economics of information: Lying and cheating in markets and organizations. Oxford: Blackwell.

Morlife, Inc. v. Lloyd Perry, 56 Cal. App. 4th 1514 (1st Dist. Aug. 14, 1997).

Graham Murdock, 2004. “Popular representation and postnormal science: The struggle over genetically modified foods,” In: Sandra Braman (editor). Biotechnology and communication: The meta–technologies of information. Mahwah, N.J.: Lawrence Erlbaum Associates, pp. 227–260.

Bonnie A. Nardi and Vicki L. O’Day, 1999. “Information ecologies: Using technology with heart,” First Monday, volume 4, number 5 (May), at http://www.firstmonday.org/issues /issue4_5/nardi_contents.html, accessed 9 August 2006.

Helen Nissenbaum, 2004. “Privacy as contextual integrity,” Washington Law Review, volume 79, pp. 119–157.

Richard A. Posner, 2002. The problematics of moral and legal theory.

Cambridge, Mass.: Harvard University Press.

Douglas L. Rogers, 2003. “The SCO litigation: Maintaining walls around trade secrets or attacking the knowledge of those outside the walls?” Intellectual Property & Technology Law Journal, volume 15, pp. 1–15.

Jennifer L. Saulino, 2002. “Locating inevitable disclosure’s place in trade secret analysis,” Michigan Law Review, 2002 (March): pp. 1184–1214.

Christina Schwenkel, 2006. “Recombinant history: Transnational practices of memory and knowledge production in contemporary

Vietnam,” Cultural Anthropology, volume 21, number 1, pp. 3–30.

SCO v. IBM, case #2:03cv00294 DAK in the U.S. District Court Central

Division, District of Utah (trial scheduled for 2007).

Harriet J. Sims, 1977. “Recent Developments,” George Washington Law Journal, volume 65, p. 1641.

Robert David Steele, 1990. “Intelligence in the 1990’s: Recasting national security in a changing world,” American Intelligence Journal, volume 11, number 3, pp. 29–36.

Lee S. Strickland, 2005. Secure information sharing: Balancing classification policies in an electronic era with new adversaries. College Park: Center for Information Policy, University of Maryland; prepared for the Information Security Oversight Office, National Archives and Record Administration, at http://www.cip.umd.edu/reports/ISOO_report_final.pdf, accessed 9 August 2006.

Cass R. Sunstein, 1996. Legal reasoning and political conflict. New York: Oxford University Press.

Donald F. Theall, 1999. “The carnivalesque, the Internet and control of content: Satirizing knowledge, power and control,” Continuum: Journal of

Media & Cultural Studies, volume 13, number 2, pp. 153–164.

Martin L. Van Creveld, 1991. Technology and war: From 2000 BC to the present. Revised and expanded edition. New York: Free Press.

Lloyd L. Weinreb, 2005. Legal reason: The use of analogy in legal argument. Cambridge: Cambridge University Press.

Downloads

Publicado

10/10/2017

Como citar

BRAMAN, S. TACTICAL MEMORY: THE POLITICS OF OPENNESS IN THE CONSTRUCTION OF MEMORY. Logeion: Filosofia da Informação, Rio de Janeiro, RJ, v. 4, n. 1, p. 129–153, 2017. DOI: 10.21728/logeion.2017v4n1.p129-153. Disponível em: https://revista.ibict.br/fiinf/article/view/4006. Acesso em: 23 abr. 2024.

Edição

Seção

Artigos