May 7th, 2007 — 12:00am
Direct connections between the war in Iraq and the realm of user experience are rare, so I was surprised when one popped up today in an article by the New York Times, titled 2 Car Bombings in Iraq Kill 25.
The article quotes an Iraqi, reacting to the destruction of a house containing a cache of munitions by American soldiers. “The Americans are lying,” said Ali Jabbar, 28, one of several men digging through the rubble, where bicycle handlebars could be seen poking out. “If there were weapons there, they should have taken pictures to prove it.” But in a sign of the challenge Americans face here, Mr. Jabbar said that even if he saw such pictures, he would not be convinced that the destruction was justified. “The Americans can make it up with Photoshop,” he said.
It’s simultaneously terrible and fascinating that a tool I use regularly would appear in this sort of context. And yet it’s not unreasonable, given the ways that many futurists envision and describe warfare centered on information.
Here’s Alvin Toffler, from How will future wars be fought?
Above all, the full implications of what we termed Third Wave “knowledge warfare” have not yet been digested – even in the United States. The wars of the future will increasingly be prevented, won or lost based on information superiority and dominance. And that isn’t just a matter of taking out the other guy’s radar. It means waging the kind of full-scale cyber-war we described in War and Anti-War. Cyber-war involves everything from strategic deception and perception management down to tactical disruption of an adversary’s information systems. It also means understanding the role played by the global media in any conflict today. It means enhancing all your knowledge assets from intelligence, to research and development, training, and communication.
Comment » | The Media Environment, Tools, User Experience (UX)
March 22nd, 2006 — 12:00am
I just read Dan Brown’s posting Web 2.0, reframing Web 1.0 on metaphors for the new Web.
I had three thoughts when I read this (nicely done) piece for the first time:
- Web itself is or implies a metaphor — I’d start with this when considering any of the potential metaphors of Web 2.0
- I think many metaphors will be necessary to give us some set of (barely) adequate linguistic tools for sharing our thinking about something as emergent, complex, and interconnected with daily life as Web 2.0
- How about: WEB AS ENVIRONMENT (“the circumstances, objects, or conditions by which one is surrounded”)
Comment » | Ideas
June 23rd, 2005 — 12:00am
Found via via, originating in an article titled Social Informatics: Overview, Principles and Opportunities from the ASIST Bulletin special issue on Social Informatics, which, incidentally is one of those very interesting disciplines I don’t have enough time to keep up with, but that has much to offer practicing information architects.
On computerization, Sawyer says, “Computerization, to paraphrase sociologist Beverly Burriss, is the implementation of computerized technology and advanced information systems, in conjunction with related socioeconomic changes, leading to a fundamental restructuring of many social organizations and institutions.“
Add in a client management clause, and this is essentially my job description as an architect / designer / creator of information environments that solve business problems. I don’t know Burriss’ work — does anyone else?
Directly addressing the role of a constructed problem Sawyer says, “…social informatics is problem-oriented. This work is defined by its interest in particular issues and problems with computerization and not by its adherence to certain theories or particular methods (as is operations research).“
In what looks like a neatly phrased snapshot of user research, Sawyer says, “The strong empirical basis of social informatics work, however, is combined with both methodological and theoretical plurality. Social informatics work typically includes an array of data collection approaches, sophisticated large-scale analyses and complex conceptualizations.“
Here’s a longer excerpt:
The Common Findings of Social informatics
More than 30 years of careful empirical research exists in the social informatics tradition. As noted, this work is found in a range of academic disciplines, reflects a mix of theories and methods, and focuses on different issues and problems with computerization. Here I highlight five observations that are so often (re)discovered that they take on the notion of common findings relative to computerization.
1. Uses of ICT lead to multiple and sometimes paradoxical effects. Any one ICT effect is rarely isolatable to a desired task. Instead, effects of using an ICT spread out to a much larger number of people through the socio-technical links that comprise context. An examination of this larger context often reveals multiple effects, rather than one all-encompassing outcome, and unexpected as well as planned events. For example, peer-to-peer file sharing may help some musicians and hurt others.
2. Uses of ICT shape thought and action in ways that benefit some groups more than others. People live and work together in powered relationships. Thus, the political, economic and technical structures they construct include large-scale social structures of capital exchange, as well as the microstructures that shape human interaction. An examination of power often shows that a system’s implementations can both reinforce the status quo and motivate resistance. That is, the design, development and uses of ICTs help reshape access in unequal and often ill-considered ways. Thus, course management systems may provide added benefits to some students, put added pressure on some faculty and allow some administrators to use the system to collect additional evidence regarding the performances of both students and faculty.
3. The differential effects of the design, implementation and uses of ICTs often have moral and ethical consequences. This finding is so often (re)discovered in studies across the entire spectrum of ICTs and across various levels of analysis that ignorance of this point borders on professional naïveté. Social informatics research, in its orientation towards critical scholarship, helps to raise the visibility of all participants and a wider range of effects than do other approaches to studying computerization. For example, characterizing errors in diagnosing illnesses as a human limitation may lead to the belief that implementing sophisticated computer-based diagnostic systems is a better path. When these systems err, the tendency may be to refocus efforts to improve the computerized system rather than on better understanding the processes of triage and diagnosis.
4. The design, implementation and uses of ICTs have reciprocal relationships with the larger social context. The larger context shapes both the ICTs and their uses. Moreover, these artifacts and their uses shape the emergent contexts. This can be seen in the micro-scale adaptations that characterize how people use their personal computers and in the macro-scale adaptations evident in both the evolving set of norms and the changing designs of library automation systems. Library automation is not simply about recent developments of applications with sophisticated librarianship functionality; it is also about patrons’ differential abilities to use computers, library budget pressures, Internet access to libraries and the increasing visibility of the Internet and searching.
5. The phenomenon of interest will vary by the level of analysis. Because networks of influence operate across many different levels of analysis, relevant data on computerization typically span formal and informal work groups; formal organizations; formal and informal social units like communities or professional occupation/associations; groups of organizations and/or industries; nations, cultural groups and whole societies. This common finding is exemplified by the tremendous positive response by younger users to peer-to-peer file sharing, the absolute opposite response by music industry leaders and the many approaches taken by organizational and civic leaders regarding the legalities and responses to use.
No related posts.
Comment » | User Research