Cyberactivism in HCI

 

Cyberactivism in HCI

 

http://sites.jmu.edu/madisonparlor/the-parlor-and-cyber-activism/
http://sites.jmu.edu/madisonparlor/the-parlor-and-cyber-activism/

 

 

 

 

  1. Overview

The ubiquity of technology around us made it urgent to create digital forms of every aspect of our life. As the need for digital artefacts grows, so does the need for understanding human. Therefore, the field of HCI has appeared to respond to both human issues and technical issues.

In this blog, I will focus on activism (as a human element) and HCI technologies (as a technical aspect). First I will review the term ‘cyberactivism’ and explore the different technologies used in cyberactivism. Secondly, I will review and discuss two types of HCI technologies: namely social computing and personal informatics by focusing on their use in the context of social justice. In social computing, I discuss two main point; the power of ‘digital storytelling’ and ‘positive activism’. Then, in personal informatics, I introduce the area of ‘soci-feedback technologies’ and current technologies that could serve as the foundation on which socio-feedback technology can be based.  Finally, I conclude by highlighting the need to leverage the use of HCI’s technologies to expand the field of cyberactivism.

 

Keywords: –

Cyberactivism, social justice, HCI, digital civics, social computing, personal informatics, digital storytelling, socio-feedback technologies, sousveillance

 

 

 

  1. Human Computer Interaction (HCI)

Throughout the last semester, we have been attempting to establish a solid understanding of what ‘Human Computer Interaction’ is. I would like to start off by comparing what I used to think this term was and what I think it is now, after finishing the HCI module. Coming from a business studies background, where “clients’ needs” were the core of establishing (designing) any business, I used to think of HCI in a similar way, as a field where the needs of the system’s users are the core of designing any system.

Now, I believe that for a design to be based on users’ needs and perceptions is fundamental in this field which could be referred to as ‘usability’ but it is not what HCI is all about, and it is not a goal but rather a mean to gain a higher level of achievements.

I have realized that there are many emerging concerns of HCI beyond finding technical solutions to usability problems. As a cross-disciplinary, area, HCI is concerned with different psychological, social and even political issues, beyond narrow technical concerns. Moreover, HCI is not only about individual use of a computer, but also about communities and cultures and the role of technology in building and improving them [14]. Table (1) summarises this comparison.

Table 1

  what why who Where when
Before Usability (merely ease of use) and the impact of cognitive and physical constraints Good Artefacts/ technologies Individual/user Computer science 

( in desktops)

At work/ specific situations
After good artefacts/ technologies Real life impacts/ Improving/ empowering in different aspects of human life, activities and experience. 

(political, social, economical)

communities 

(social and organizational computing)

Human-human interaction through computers

Every where Everyday experience

 

 

 

2.1. Digital Civics

Digital Civics is mainly concerned with digitally empowering citizens to allow them enhance their communities and address their emerging challenges. While developing communities has been mostly a top down process, Digital civics is concerned with using technology to make it a bottom up process. I would say that this is the main point that distinguishes Digital Civics from HCI. HCI is concerned generally about enhancing human experience and activities through technology, whereas Digital Civics is specifically concerned with enhancing/empowering the role citizens paly in their communities through the use of technology.

The core topics in Digital Civics such as democracy, collectivism, activism and social justice have been rapidly emerging in HCI research and practice. Many of these topics, however, have been covered by “Cyberactivism” which is concerned with using the cyber (digital) world to practice different types of activism for social, political and economical causes. This area, as well, is a rapidly emerging concern in HCI. [2]

 

 

 

  1. Cyberactivism

3.1 Activism

Activism, in its simplest definition, is the act of taking actions, either individually or collectively, to push for social changes. These changes could be related to environmental, political, social or ideological issues; or broadly classified into two categories: environmental/ecological sustainability and social justice issues [12]. The call for these changes can either be “Demanding solutions to contemporary problems” or “Creating alternatives to the dominant system” [12]. Thus the focus could be the problem or the solution (alternatives).

When such actions occur online, either they are internet-enhanced or internet-based,  that is, whether technology support or provide alternatives to on-ground activism, it is referred to as Cyberactivism. It could also be referred to as online activism, digital activism, computer-mediated activism and so on. [16]. However, in this blog I will adopt the term ‘cyberactivism’.

 

3.2 Cyberactivism

 From its earliest days, cyberspace has been about networking and communication among different groups of people with shared aspects. Activists as well, have made use of this cyber space to practice their activism and mobilize people around specific causes. Thus, researchers and practitioners, either intentionally or not, have been developing more tools and techniques for Cyberactivism spanning from its most peaceful (passive) tool “slacktivism”, to the most violent one, “hacktivism”.

To categorize these techniques, I will use Vegh’s classification of online activism [16]. Vegh has classified forms of online activism into three forms. First, awareness and advocacy, which is about drawing public attention and support on specific issues. Second, organization and mobilization, which is about the call and organization for collective offline actions and movements. Third, action and reaction, which is about initiating an action or reacting to one, such as the online attacks “Hacktivism”.

Adopting this classification, I developed a model by which I could categorize the different HCI technologies used in Cyberactivism as presented in Table 2.

Table 2

classification of activism awareness and advocacy organization and mobilization action and reaction
Type of activism
Environmental 

 

Personal informatics 

 

Social computing 

(Slactivism and social media)

 

Social justice 

 

Social computingDigital storytelling 

Slacktivism

Signing petitions

 

Providing Alternative (e.g. alternative media)Hacktivism 

 

 

From the table above, it is evident that the dominant form of activism in all areas is “awareness and advocacy”. This form however, should be the first step for any other form of activism, as it is crucial to raise awareness and gain advocacy before, during and after mobilizing people and taking actions. On the other hand, the techniques used for the “organization and mobilization” and “action and reaction” could also be deemed as raising awareness techniques. For instance, hacktivism can be used as a tool to raise awareness around a specific cause. Thus, in this blog, my focus will be around “raising awareness” as a form of activism in cyberspace. I will discuss the dominant tool in each type of activism; which are: social computing and personal informatics, focusing on how to leverage them in social justice context.

 

 

  1. Social computing as a tool for Cyberactivism

The roots of social computing appeared in the 1960’s, when computers were not only used for computation but also for communications. However, it was not until the late 1990s and early 2000s when the modern forms of social computing started to emerge by processing user-generated content and producing new functionalities and values out of this content. [5]

When we use the term social computing we do not necessarily refer to direct online interaction; such as instant messaging, exchanging email, collaborative workspaces, , social networking, online forums and online groups and communities; The term could also refer to any collective and collaborative activities; such as wikis, blogs, social bookmarking and tagging services, media spaces, recommender and collaborative filtering systems, online auctions, reputation systems, soft sensors, following someone on Twitter and crowd sourcing. [5]

When it comes to cyberactivism, due to the lack of technologies made to support activism, cyberactivism has resided mostly in social media, which has been used widely to mobilize people to take actions against various causes [19]. Although social media has been successfully used as a tool for cyberactivism, the use of other emerging technologies could not only support the use of social media but also generate new independent tools for cyberactivism.

Thus, in the next section, I would like to explore the power of ‘digital storytelling’ as an element of social computing which is increasingly used in cyberactivism. Then, I would like to highlight the need for a positive cyberactivism and a focus on a half full glass rather than a half empty one.

 

 

4.1 Cyberactivism through storytelling

Digital storytelling is essentially about telling and sharing stories that are either personal or recounting of historical events, through the use of computer-based tools including a variety of multimedia such as text, photos, audio, videos or a combination of some or all of them [23]. It is also referred to as digital documentaries, computer-based narratives, digital essays, electronic memoirs, and interactive storytelling [23].

Digital storytelling has been widely used as an effective technique in education [8]. Since activism usually aims at raising awareness, which is a part of “educating people” about a cause, digital storytelling could be used as well as a cyberactivism technique. Thus, it has been an emerging tool in cyberactivism and has been used in different forms such as signing online petitions (e.g. change.org) [22], location-based reports and reviews(e.g harassment map) [9], text stories (e.g. Hollaback!) [3] and personal informatics [7].

The power of storytelling lies in the fact that it is directly related to people’ real life. And according to Iriberri and Leroy, relating online communities to real-life events plays a significant role in creating self-sustaining community [13], and thus more likely to create a sustained cyberactivism in online communities. Additionally, we practice listening to and telling storytelling everyday even if we are not aware of it by watching movies, reading novels, following friends’ stories on Snapchat and texting gossips to friends and so on [11]. Kelly Sawyers explains this in her Ted Talk in the video below:

“How Young Women Change the World Through Digital Storytelling”.

 

 

Moreover, the fact that it is ‘digital’ storytelling implies that it is supported with visual means such as photos and films. Thus, it is a ripe opportunity in cyberactivism to explore the digital storytelling in photography, drawings and film making.

 

4.2 Positive Cyberactivism

Generally, social justice activists rarely speak of love in the context of their activism [27]. A quick review on current cyberactivism shows that it is mostly an “angry activism” driven by anger or even hate, which could not be an effective and sustainable way in the long term [21]. Therefore, there is a need for a positive activism that is filled with love and positive energy and based on constructive engagement rather than negative criticism [24][27].

Similarly, Fuller has described this notion in his popular quote:

http://www.goodreads.com/quotes/13119-you-never-change-things-by-fighting-the-existing-reality-to

 

 

Thus when fighting the system to change we are actually wasting time we could spend inventing other models [17]. Another element we should also take in consideration is the non-violent approach of activism which focuses on what we have in common with our opponents rather than what we do not [12].

 

 

 

  1. Personal informatics as a tool for Cyberactivism

Personal informatics is a term that refers to the type of technology by which users can collect information about their personal behaviour, habits, and thoughts in order to gain self-reflection and self-monitoring. It is also referred to as ‘living by numbers’, ‘quantified self’, ‘personal analytics’ and ‘self-tracking’ [18]. Personal informatics technology has been widely used in different areas and purposes such as health, education, energy consumptions, finance and social web. Although it has been used as well in activism context but it seems to be exclusive in environmental activism (or environmentalism), thus, a sub-area appeared which is ‘Eco-feedback technology’ which is a class of technology that capture users’ activities in order to raise their awareness about their behavioural impacts on environment [6].

 

5.1 Eco-feedback technology 

Personal informatics as an environmentalist tool has an increasingly high profile. It has been used to raise awareness of various environmental issues such as air pollution, water usage, gas consumption, waste disposal practices, transportations and recycling [4]. The design of these technologies departs from one of two models; first, rational choice model, which suggests that self-interests are the main factor that drives environmental behaviour, second, norm-activation model which suggests that the collective community goods drive individuals’ behaviour towards environment even if that is not the same as their own interests [6]. Thus, a successful design might consider both models to achieve wider impacts. Moreover, these philosophies might be applicable as well to different areas of activism such ‘social justice’. Thus, in the next section, I will introduce the area of ‘socio-feedback technology’ for ‘social justice’ as an analogy for Eco-feedback technology for environment.

 

 5.2 Socio-feedback technology

The effective use of personal informatics in environmentalism made me think whether we can use these tools in different area of activism or not? Before attempting to answer this question, I will start by adopting the previous definition of ‘eco-feedback technology’ to define the socio-feedback technology. Thus, socio-feedback technology is a type of technology that aims at raising users’ awareness about their social behavioural impacts on their community. Now, to answer the question, we need to consider the technologies that enable us to capture our social behaviour either manually or automatically.

Taking this consideration into account, In the next section I will discuss two emerging topics I have found in HCI that could possibly play a significant role as ‘Socio-feedback technology’. The first one, is a manual way which relies on user’s inputs and reflection on their social behaviour, which makes it both like ‘personal informatics’ and ‘storytelling’ at the same time, thus I will refer to it in this blog as ‘narrating personal informatics’ [10]. The second one is automatic, by employing wearable technology to capture and record (or mentor) user’s activities, which is referred to as ‘Sousveillance’ [1].

 

  • Narrating personal informatics (NPI)

As discussed in section (4), some personal informatics technologies rely on the user’s manual input, especially when it requires writing extended descriptions or diaries, which means it could use storytelling as well. This notion has been used in a few technologies in environmentalism context (eco-feedback technologies) such as ‘Food Waste Diary’. However, it seems to be possible to use similar techniques in social context. Actually, according to Hilviu and Rapp [10], it is suggested that the use of digital storytelling is a more effective way to present data than numbers and graphics due to the fact that some

users might not be comfortable reading and interpreting this type of data. Moreover, Hilviu and Rapp [10] argue that although in the field of Big Data, there has been some attempts to present data as natural language in order to make them easier to read, this is not enough for gaining more insights as in narration.

Another powerful aspect of NPI is that it is more likely to be interpersonal informatics technique at the same time. The term ‘term personal informatics’ was introduced by Bales and Griswold [26] which refers to a class of tools that allows the collective use, share, aggregation and analytics of personal informatics among different groups of users. Bales and Griswold [26] based their argument in favour of these tools to the fact that people’s behaviour is affected by those around them. This role, as discussed in section (4) can well be played by digital storytelling.

Therefore, digital storytelling can be used through personal informatics technologies to serve as tool for cyberactivism, however I would emphasize the need to explore its potentials and impacts in the context of social justice activism.

 

 

 

  • Sousveillance (and inverse-surveillance)

The ubiquity of technologies has resulted in a ubiquitous surveillance [28]. Although this ubiquity of surveillance is usually justified by being applied for moral and decent organizational purposes, anti-surveillance activists, however, have reacted to it by calling for both stopping mass surveillance, and developing technologies that work as “counter surveillance” to prevent surveillance [25].

As this type of activism might not be pragmatic due to the increasing need for surveillance as a national security strategy, another reaction to surveillance has emerged with more social justice oriented purposes, which is the so called “sousveillance”.

Sousveillance is the use of wearable technologies for the purpose of collecting data for inverse-surveillance as a opposed to organizational surveillance [28]. Steve Mann [15] has coined and derived this term from ‘surveillance’ which he summarised as follow:

 “sur.veillance: French, from surveiller to watch over, 

from sur- + veiller to watch, from vigil

vig.il: from Latin, wakefulness, watch, from vigil awake, watchful; akin to Latin vigEre to be vigorous, vegEre to enliven

2 : the act of keeping awake at times when sleep is customary;

3 : an act or period of watching or surveillance : WATCH

Thus, loosely speaking, sousveillance is watchful vigilance from underneath.”

 

Unlike anti-surveillance activism, sousveillance does not seek stopping surveillance but rather making use of it to ensure social justice by not only applying it on mass but also on those in power (authorities). The latter is referred to by Mann et. al. [28] as: Surveilling the Surveillers.

It is believed that sousveillance evokes counter-performance, particularly by those whose jobs involves direct surveillance with people [28]. For instance, the Rialto study [20] aimed at examining the effectiveness of cameras worn by police officers when interacting with civilians [figure 1]. The study yielded in striking results, as there was an 88% decline in the number of complaints against officers compared with the previous 12 months [20].

07-DIGI2-articleLarge
Figure 1 : A police officer wearing the cameras on his sunglasses [20]

Thus The juxtaposition of sousveillance with surveillance may play a significant role in enhancing the surveillance experience to all involved parties [28]

This combination can be used (or imposed on) by authorities in order to ensure both their safety and civilians’ safety when interacting with each another. Yet, we still need to expand the use of sousveillance in the ubiquitous computing world to examine its impacts in different contexts of democracy and social justice.

6. Conclusion

In this blog, I synthesized my knowledge in HCI, digital civics and cyberactivism to discuss the technical potentials we have in order to expand the field of cyberactivism. I have found that there are mainly three technical approaches for cyberactivism which are: ‘personal informatics’, ‘social computing’ and ‘hacktivism’. Thus, I have attempted to elaborate on the first two approaches by discussing how to leverage them. However, I have not discussed leveraging ‘hacktivism’ as it conflicts with the underlying philosophy behind my approach which is “positive activism”. In both ‘personal informatics’ and ‘social computing’, I found that digital storytelling can be a good technique to combine both technologies so we could have “narrating interpersonal informatics” on which “socio-feedback technology” could be based. Finally, another technique I suggested to be used in “socio-feedback technology” is “sousveillance” which I believe it could replace a previous type of activism which is “anti-surveillance activism”.

 

To sum up, first, I would like to highlight the need to expand the field of cyberactivism in HCI by conducting further investigation of the effectiveness of “socio-feedback technology” as a cyberactivism tool, particularly, combined with the use of digital storytelling, and leveraging sousveillance in cyberactivism context.

Second, I would like to raise a couple of questions for further research:

  • Apart from ‘personal informatics’, ‘social computing’ and ‘hacktivism’, what other technologies do we have we could use in cyberactivism?
  • What are the potential alternatives to social media that can serve as platforms for activists? What advantages and disadvantages social media have as a cyberactivism platforms and do we really need alternatives?
  • How could we develop the area of “socio-feedback technologies”, apart from the use of digital storytelling and sousveillance technologies?
  • How to leverage sousveillance in cyberactivism context?

  1. References :
  1. Brito, J. (2013, November 18). Sousveillance Turns the Tables on the Surveillance State. Retrieved January 8, 2016, from https://reason.com/archives/2013/11/18/sousveillance-turns-the-tables-on-the-su
  2. Digital Civics. (n.d.). Retrieved January 8, 2016, from http://digitalcivics.org.uk
  3. Dimond, J., Dye, M., Larose, D., & Bruckman, A. (2013). Hollaback!: The role of storytelling online in a social movement organization. Retrieved from http://dl.acm.org/citation.cfm?id=2441831&CFID=741210193&CFTOKEN=89455475
  4. Retrieved January 8, 2016, from http://ecofeedback.ca/?cat=16
  5. Erickson, T. (n.d.). Social Computing. Retrieved January 8, 2016, from https://www.interaction-design.org/literature/book/the-encyclopedia-of-human-computer-interaction-2nd-ed/social-computing
  6. Froehlich, J., Findlater, L., & Landay, J. (2010). The design of eco-feedback technology. Retrieved from http://dl.acm.org/citation.cfm?id=1753629&CFID=741210193&CFTOKEN=89455475
  7. Ganglbauer, E., Fitzpatrick, G., Gu ̈ldenpfennig, F. (2015). Why and what did we throw out? Probing on Reflection through the Food Waste Diary. Retrieved from http://dl.acm.org/citation.cfm?id=2702284&CFID=741210193&CFTOKEN=89455475
  8. Garzotto, F., Herrero, E., & Salgueiro, F. (2010). One tool-many paradigm: Creativity and regularity in youngsters’ hyperstories. ACM. Retrieved from http://dl.acm.org/citation.cfm?id=1926508
  9. HarassMap | Creating an environment that does not tolerate sexual harassment. (n.d.). Retrieved January 8, 2016, from http://harassmap.org/en/
  10. Hilviu, D., & Rapp, A. (2015). Narrating the quantified self. Retrieved from http://dl.acm.org/citation.cfm?id=2800959&CFID=741210193&CFTOKEN=89455475
  11. How Young Women Change the World Through Digital Storytelling | Kelly Sawyers | TEDxHarkerSchool. (n.d.). Retrieved January 8, 2016, from https://www.youtube.com/watch?v=1eOwECPeHU0
  12. Introduction to Activism – Permanent Culture Now. (n.d.). Retrieved January 8, 2016, from http://www.permanentculturenow.com/what-is-activism/
  13. Iriberri, A., & Leroy, G. (2009). A life-cycle perspective on online community success. Retrieved from http://dl.acm.org/citation.cfm?id=1459356&CFID=741210193&CFTOKEN=89455475
  14. Carroll, J. (n.d.). Human Computer Interaction – brief intro. Retrieved January 8, 2016, from https://www.interaction-design.org/literature/book/the-encyclopedia-of-human-computer-interaction-2nd-ed/human-computer-interaction-brief-intro
  15. Mann, S. (2002, March 1). Sousveillance, not just surveillance, in response to terrorism. Retrieved January 8, 2016, from http://wearcam.org/metalandflesh.htm
  16. McCaughey, M., & Ayers, M. (2003). Cyberactivism: Online activism in theory and practice. New York: Routledge
  17. MCELROY, D. (2013, August 15). We can’t defeat the existing system; we must build a better one instead. Retrieved January 8, 2016, from http://www.davidmcelroy.org/?p=18991
  18. Personal Informatics. (n.d.). Retrieved January 8, 2016, from http://www.personalinformatics.org/
  19. RUIZ SEGOVIA, C. (2014, November 4). Political Hashtagging: Is Online Activism Effective? Retrieved January 8, 2016, from http://www.brownpoliticalreview.org/2014/11/political-hashtagging-is-online-activism-effective
  20. Stross, R. (2013, April 6). Wearing a Badge, and a Video Camera. Retrieved January 8, 2016, from http://www.nytimes.com/2013/04/07/business/wearable-video-cameras-for-police-officers.html?_r=1
  21. The Nonviolent Conflict Transformation Program. (n.d.). Retrieved January 8, 2016, from http://www.nonviolentconflicttransformation.org/program-rationale/positive-activism/
  22. The world’s platform for change. (n.d.). Retrieved January 8, 2016, from http://www.change.org/
  23. What is Digital Storytelling? (n.d.). Retrieved January 8, 2016, from http://digitalstorytelling.coe.uh.edu/page.cfm?id=27&cid=27
  24. What is positive activism? (2006, August 31). Retrieved January 8, 2016, from http://itisthequestion.blogspot.co.uk/2006/08/what-is-positive-activism.html
  25. Amir, W. (2015, December 13). These Anti-Surveillance Tools Will Protect Activists and Their Privacy. Retrieved January 11, 2016, from https://www.hackread.com/anti-surveillance-tools-to-protect-activists-privacy/
  26. Bales E. and Griswold W. (Nov 2011). Interpersonal Informatics: Making Social Influence Visible. http://dl.acm.org/citation.cfm?id=1979924&CFID=741210193&CFTOKEN=89455475
  27. Lyubansky, M. (2013, July 27). What If We Choose To Do It With Love? Retrieved January 11, 2016, from https://www.psychologytoday.com/blog/between-the-lines/201307/what-if-we-choose-do-it-love
  28. Mann S., Nolan J, Wellman B. (2003). Sousveillance: Inventing and Using Wearable Computing Devices for Data Collection in Surveillance Environments.

Leave a Reply