Sunteți pe pagina 1din 5

Book Reviews

Ink into Bits: A Web of Converging Media. Charles T. Meadow. music? This chapter ends with a prediction that could have serious
Lanham, MD: The Scarecrow Press; 1998; 292 pp. Price: $24.50 repercussions—the standardization of messages in electronic form.
(ISBN: 0-8108-3508-8.) All digital messages would be encoded with instructions on what the
message contains and how it is structured. In addition, all electronic
Some believe that the “death of the book” or the “paperless messages would be in a standard format so the message would be
office” is imminent. If so, what would a world without books on generic enough to be suited for presentation on most, if not all, media.
printed paper be like? How would people communicate or gather The end result would be that the receiver would “decide how to read,
information in such an environment? Charles Meadow addresses see, hear, or maybe even feel, a message and . . . decide what kinds of
these and other issues by providing the reader with a rational view receiving equipment to have in the home or office” (p. 24). The user
of the dynamics between print and electronic media. could view it as a news cast, hear it as a radio announcement, or read
Charles Meadow has over 40 years of experience in the fields of it as a press release. What would this standardization do to creativity
computer science and communication, and has written nine books and self-expression?
plus many scholarly articles and papers. He has worked in both Chapter 4 takes a look at “The Special Place of Books and Writing
government and corporate arenas, and is currently professor emeritus in Our Culture.” The physical form of the book has been gradually
at the University of Toronto’s Faculty of Information Studies. changing from its origin to the present with the help of Gutenberg,
The primary aim of the author is to get readers thinking about indexers, and technology. There is not any reason to think that the
the future of the word and to ponder upon the changes affecting book’s evolution will end. “New materials and their costs, the costs of
media and communications due to the shift from print to electronic production, social changes, and consequent changes in user demand”
publishing. This is no small task, for the import is great. As will continue to impact the book as an artifact (p. 42).
Meadow notes “[b]ooks have had a tremendous role in transmit- Potential problems arise when there are changes in the physical
ting culture. Changing books too fast may have consequences we organization of a book, especially those that encourage the forfei-
cannot foresee now” (p. xv). ture of linear, sequential reading. Ivan Illich wrote about “the need
I had a difficult time drawing the line at what to include in this for discipline in reading . . . the discipline of paying respect to the
review. The book has so much substance in it worthy of comment. author—that we owe it to the author to follow the intended
Therefore, I will only touch upon parts of certain chapters that sequence in order to follow the author’s line of thought” (pp.
struck me as significant. 47– 48). When the environment cultivates lessened reader disci-
In Chapter 2 “Media and Information,” Meadow discusses the pline, the possibility arises that “future generations would become
relationship of information and the media that communicates it. snippers of items, rather than comprehenders and deep thinkers
Information is “evaluated, validated, or useful data . . . data that about what they read” (p. 48).
changes the state of a system that perceives it” or as Claude Not too long ago, letter writing was considered an art form.
Shannon wrote “a measure of the absence of uncertainty” (pp. 16 Today we have “while you were away” note pads, voice mail, and
and 17, emphasis in the original). Some people remark that society e-mail. Meadow observes:
is in the midst of an information explosion or is experiencing If people do not learn to express their feelings in writing, they cannot
information overload. In promoting either of these views, the do so. If people are not used to the written word, as opposed to the
speaker falsely assumes that the mounds of data that are being video or cinematic word, to convey feelings to themselves, they might
continually produced possess some sort of meaning to all people. not be able to extract the emotional content from a text. (p. 49)
If someone is not affected by the string of symbols swirling around
them, “[i]f more messages arrive or are available than one can This chapter concludes with a look at the book as a permanent
assimilate, that which is not taken in and digested is not informa- record. A major benefit of a book is its archival nature— once
tion! . . . A stream of data is just a stream of data” (p. 20). thoughts are recorded, they stay recorded. This staying power has
Media are in the middle of the communication of potential allowed those who discuss the thoughts in a book to draw upon and
information. Here, one may flash back to Marshall McLuhan’s refer back to the text in question. Debaters have access to the same record.
aphorism “the medium is the message.” Media can affect the Now we have the ability to continually update and edit re-
manner in which messages are conveyed, therefore influencing corded material. This benefit carries with it a potentially significant
how the recipient understands them. Yet, it should be plainly problem. We may “lose the very concept of original or canoni-
understood that the message is not the medium. Medium “does not cal. . . [a] document, whether text, graphic, or sound recording,
make or constitute the message” (p. 5, emphasis in the original). could become only what it is at the moment, not the same for all
Meadow states that the “most used and most influential” media in time” (p. 54, emphasis in the original). For example, a text may be
human communications are “voice and language, writing and print- quoted in a scientific paper. The original document’s author may
ing, graphic art including photography, telephone, radio, cinema, then change the quoted source to reflect new insights or correct
television, and the new computer-based communication forms” (p. faulty results. If the quoting author does not know this, the quoting
22). He then goes on to say that “other media” include plastic art, source remains unchanged, and misinformation is spread to all that
architecture, music, and dance. While I agree that oral-based commu- refer to this document. Scientific research in particular could be
nication is probably the most used media, I tend to question his label greatly impacted by continual document editing.
of “most influential” in regard to the other media. Personally, I would Chapter 6 “Linear Text and Hypertext” presents some pros and
place music in the “most influential” list over graphic art. It is rather cons about the use of hypertext. One major benefit of this elec-
difficult to imagine radio, television, or cinema without a musical tronic medium is its ability to aid the user in coming up to speed
presence. How influential would these be without the addition of faster on a particular subject. By being able to follow links at will,
the user can “quickly build up a comprehensive mental model of
the subject and its relationship to other subjects” (p. 76).
Critics of hypertext also point to this ability to jump around
© 1999 John Wiley & Sons, Inc. links as a potential cause of superficiality. Hypertext allows one to

JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE. 50(7):629 – 633, 1999 CCC 0002-8231/99/070629-05
keep moving about the text without stopping and absorbing the numerate. The ability to read and understand materials that present
material presented. If and when an answer is found, users may data quantitatively and to be able to express data quantitatively.
assume that there is no further need to search any further. This computer literate. Essentially, able to use a computer, or plan for
could result in a situation in which the user “missed important its use, productively . . .
correlative material upon which to base true understanding” (p. graphicate. (Not a word in your dictionary.) The ability to com-
prehend and appreciate information presented in graphic form
78). The user may also face the danger of losing those special and to present ideas in this form. Graphic form means not just
pearls serendipity casts ones way. graphs of quantitative data, but “art,” as well.
Students can transcend passive roles in acquiring information information literate. Knowing how to deal with information,
by active participation in using hypertext to seek the answers to particularly how to evaluate it and be adept at searching for it
their questions. Yet, problems arise of a financial nature due to the (p. 223, emphasis in the original).
cost of computers to read hypertext. Many but not all schools can
afford to purchase computers. More importantly, what about those
students who do not have access to a computer? We could see an Chapter 17 “Conclusions” contains a list of potential outcomes
ever widening gulf between the have and have nots. we may see in a digital environment. “Good things” involve a
Chapter 13 “Markets” discusses the marketing of electronic diverse selection of products and services; the ability to commu-
publishing. Publishers who produce reference or instructional nicate easily across geographic boundaries; a greater opportunity
items or material for children are more inclined to promote elec- for individualized learning; easier dissemination to the public of
tronic products than those publishers that deal with adult fiction, new productions; and increasing technology that will allow us to
essay, or narrative-type works. accomplish new and better things.
Meadow sees six major obstacles to the promotion of electronic The use of multiple media by all classes of literature will be
media. First and probably the greatest obstacle is that there is no real seen as a “neutral thing.” Meadow also labels neutral the gradual
contender for a good, highly portable computer reader. Second, au- disappearance over “many, many years” of the need for print. This
thors lack experience and skills with the new media. The third is neutral, because the people of the future will not really notice
obstacle is that there are no clear models of what electronic publica- any major change because communication will have evolved be-
tions should be, due to people transferring likes and dislikes of past yond the written word.
media to new media. Copyright protection and the threat of piracy is “Bad things” include the economic fact that technology costs
the fourth obstacle to overcome. Inertia is fifth, and involves not only money, and some people will not be able to access these “bless-
resistance to change, but also wariness concerning the benefits of a ings”; society possibly bankrupt due to technological obsoles-
mad rush towards change. Last and probably least on the list of cence; increased uniformity and decreased creativity; students who
obstacles is the lack of electronic media quality and substance. only browse, retrieve, and report what others have already said and
Chapter 15 “Thinking about Change” looks at what character- done; and ease in disseminating to the public created material.
istics any new media should possess. First on the list is ease of use, (The latter depends on what is produced and who accesses it. This
or better stated “ease of initial use as well as at the maximum level access could also be a good thing.)
of intended use” (p. 200). Ease of use is not synonymous with the Meadow ends this chapter and book with a final conclusion,
phrase “user friendly.” The latter expression Meadow finds “hor- remarking that “electronic publishing is not something to fear. It
rible . . . [because] it tends to concentrate only on ease of use and has at least as much promise as threat. It does, however, call for
usually on ease of the first use. It does not take into account some intelligent thought before jumping into the next glib an-
performance or what the entity under consideration can accom- nouncement from the marketers. But then, what doesn’t?” (p. 238).
plish” (p. 200). Other properties new media should possess include Ink into Bits includes an appendix of 17 statistical charts noting
interactivity, versatility, accessibility and connectivity, portability changes and trends in electronic publishing. The charts are time
and capacity, durability, and clarity and resolution. series showing various factors like demographics, economic, ed-
A final characteristic is the trait of cultural continuity. Meadow ucation, and cultural data, print and disk publication, and nonprint
puts it best: media like telephones, radios, cable TV, etc. There are also a
section of notes, a bibliography (of cited sources I believe), a
To a significant extent, a culture is defined by its literature, which reading list by subject (with some sources not noted in the bibli-
is not limited to the written word, but can include oral tradition, ography), and an index.
music, and graphic art. The more media we have and the more I found this book to be very thought provoking. It more than lived
variant forms of literature we produce, the less do we, members of
up to its stated intent. The writing was engaging and quite fluid. This
a community or culture, share the experience of the same songs,
stories, poems, pictures, and novels. (p. 207) book should easily find a place in most libraries, be they academic,
secondary, public, or special in setting. It is must reading for anyone
concerned about social informatics, the future of communication and
I believe this characteristic has the most potential for being
media, and issues surrounding new technology.
overlooked. This omission could result in serious repercussions,
not only within ones own culture, but in the ability to interact with In conclusion, I can not refrain from quoting Meadow one last
other cultures. If we do not know what a particular society values time. I feel it is a fitting remark about our profession and humanity
and how that group communicates, how are we to engage in in general:
emphatic and effective dialog?
Within Chapter 16 “Thinking about the Future,” Meadow offers Only future people will be able to judge how we did in the pursuit
his view of libraries in the digital future. The library as an entity will of wisdom. Perhaps human adaptability is far greater than we give
not be a physical structure with granite walls and shelves of paper it credit for and, machines or no machines, we will continue to
materials. Somewhere, there would be an inexpensive storage space thrive, think, invent, and feel. If we can continue to do those things,
for the electronic file collection. The library itself would essentially be that would not be a bad future for the human race. (p. 230)
a reference service “par excellence” that assists users in accessing the
file collection. This chapter also includes skills an “educated” person
in the future electronic environment would need to prosper. These
success factors entail a person being: Jeff White
Medical Group Management Association
literate. 1. Able to read and comprehend written material and to 104 Inverness Terrace East
completely express thoughts in written form. 2. Having a good Englewood, CO 80112-5306
knowledge of the best of printed works. E-mail: jsw@mgma.com

630 JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE—May 15, 1999
Technology and Privacy: The New Landscape. Philip E. Agre attributes of those things and the dream is of a vast computer
and Marc Rotenberg, eds. Cambridge, MA: The MIT Press; 1998; system that contains a complete “mirror image” of reality. Agre
325 pp. Price: $15.00. (ISBN: 0-262-51101-0.) argues this metaphor is just the flip side of the industrial metaphor,
and it negates content as surely as the earlier metaphor. What we
need, Agre asserts, are new metaphors based on new technologies.
Privacy is dead; long live privacy. The 10 contributors to this
These new technologies, privacy-enhancing technologies for
book on the shifting relationship between technology and privacy
instance, create the promise of new ways of imagining information
do not agree on prognosis or cure, but that is not their intent. They
set out to report on the frontline skirmishes between the two or data and perhaps new ways of imagining ourselves. Privacy-
kingdoms of Hide and Seek. With a few exceptions, they succeed enhancing technology, based at least in part upon user-controlled
in providing an excellent, accessible overview that should stimu- pseudonyms, might help create new models that grant content to
late discussion and debate. Privacy needs its protectors, the authors data or information, and that would allow us to separate data
claim, and two more steadfast watchdogs would be hard to find records from personal identity. Agre recognizes, however, that
than the two editors of this volume—Philip E. Agre and Marc those with a pecuniary interest in using personal information
Rotenberg. But these two are no junkyard dogs: they’re pedigreed, would not be enthusiastic about these new privacy-enhancing
indeed. techniques. One wonders, then, would they allow Agre’s wished-
Agre is an associate professor of information studies at UCLA. for metaphors to bloom?
With a doctorate from MIT’s department of electrical engineering Another contributor, Viktor Mayer-Schonberger, recognizes
and computer science, he has written mostly in computer science, metaphor as a driving force in privacy policy as well. In his
but has some recent work in “information science” as well. Ro- historical overview of European privacy law, he recommends that
tenberg, on the other hand, has written extensively on privacy law we hang on to the old “data protection” metaphor, even though the
and policy. A graduate of Harvard and of Stanford Law School, he phrase is a misnomer because it is “not ‘data’ that is in need of
teaches privacy law at Georgetown’s Law Center, and is the protection; it is the individual to whom the data relates” (p. 219).
Director of the Electronic Privacy Information Center (EPIC) in Abandoning the phrase though would be foolish because it is a
Washington, DC. EPIC tends a widely touted website concerning revered “metaphor” that has proven a useful tool in public dis-
the diverse concerns under the rubric of privacy. course. His article identifies four waves of data protection that
The technology and policy divide represented by the two edi- have corresponded with the technology extant at the time the
tors is represented in their volume as well, not only in its title, but policy was developed.
in its content, too. Four articles focus on policy, four on new The first wave, engendered by centralized databanks, resulted
technology, and two are lodged between. Although the book tells in institutions set up to supervise computers and information
us irritatingly little about these contributors, we can glean from the processing. The second wave was brought on by the proliferation
skeletal list of contributors that two reside in Europe, two in of smaller computers and a “broad, blurry picture of a constellation
Canada, and the rest in the United States. The names of the of distinct and novel potential data-protection offenders” (p. 225).
contributors are likely to be familiar to readers with an interest in This scene resulted in an emphasis on individual privacy rights and
these issues. The policy group includes Viktor Mayer-Schon- a shift away from specialized institutions. The third wave, corre-
berger, Robert Gellman, Colin J. Bennett, and David H. Flaherty. sponding to an even greater decentralization of technology, in-
Firmly in the technology camp are Victoria Bellotti, Herbert Berk- sisted upon a “more participatory right to informational self-
ert, David J. Phillips, and Rohan Samarajiva. Bridging the two determination” (p. 229). Today, privacy activists in the fourth
groups conceptually are Simon G. Davies and Philip Agre himself. wave are attempting to recognize and rectify the disjunction in
Agre’s introduction to these 10 pieces attempts to place them bargaining power between the individual and the potential privacy
into some broad conceptual scheme. Unfortunately, it is similar to invaders, especially through the use of privacy-enhancing technol-
a friend fresh from a film festival wanting to tell you in detail how ogies. But Mayer-Schonberger thinks that governmental policy
each film fit into its genre and the history of film generally. Done and institutions must still be involved to protect privacy. This
briefly, it might whet one’s appetite for popcorn; done too late into sentiment is shared by his United States counterpart in the volume,
the night, it doesn’t. But before you abandon the introduction and Robert Gellman, a privacy and information policy consultant in
run to see the films yourself, first note the fundamental distinction Washington, DC.
that Agre makes between two models of computing. Gellman surveys familiar territory in U.S. law: that the Con-
The early model was of a single, centralized database and a stitutional right to privacy is a creation of the courts because the
state-run mainframe: Orwell’s Big Brother. But today’s model, if word privacy does not appear anywhere in the Constitution; that
you’re buying, is a computer world of atomized, autonomous statutory law is at best a patchy protector of privacy; and that civil
entities only potentially, though likely, tied together, for better or law protections under tort theories are limited. The most interest-
worse. The change inherent in the shift from the Old Monolithic ing service Gellman provides is analyzing the statutory frame-
(OM) to the New Ubiquitous Model (NUM) is a theme of every work—particularly the Privacy Act of 1974 — by comparing it to
contributor to this volume. It is, in fact, the collection’s raison the principles of fair information practices developed several de-
d’etre: the new computer technology, networked and not just in the cades ago. Gellman poses the question of whether privacy law
box, but out of the box and inconspicuously lodged in the little “works” and, after some equivocating, concludes that it would
cubbyholes of your life, is both the promise and the peril of the work if the public had a greater interest in ensuring that the laws
“new landscape” that serves as the subtitle for the book. were enforced and had a greater awareness of the dangers tech-
This promise and peril is what Agre takes up in the book’s nology might bring.
opening article, and the article is everything the introduction was Colin Bennett would not agree completely that privacy law or
not. It is informative, interesting, even enlightening. His central data-protection law works, especially in the United States. His
claim is that the metaphors we use to describe “information”— article reviews both European and North American privacy law,
historically conditioned but still operative—affect how we view and finds that protections diverge in three major aspects: whether
the gathering and dissemination of that information. An early both private and public threats to privacy are covered; whether
metaphor, “information processing,” was based on an industrial protections apply only to data gathered electronically or gathered
analog. Information is just so much grist for the mill in this model, by any means; and whether there are adequate “policy instruments
and information scientists are to attend to the process, not to the to enforce, oversee, and administer the implementation of privacy
informational grist or that the grist is “about” anything, or anyone. legislation” (pp. 100 –101). On this latter point, he finds the Eu-
A later metaphor arose as databases came into prominence. In that ropean Union’s recently issued Data Protection Directive to be
model, rows correspond to things in the world and columns to especially heartening, in that it begins to codify a consensus about

JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE—May 15, 1999 631
the most effective ways to implement data-protection law. It is also venscroft Audio-Video Environment (RAVE) at the Rand Xerox
on this latter point—the instruments to enforce and oversee pri- EuroPARC research laboratory in Cambridge. Such environments
vacy protection—that he finds the United States most lacking and can include networked audio–video communications, device track-
lagging behind the rest of the world. He finds U.S. protections ing, image processing, and on-line activity monitoring. Although
reactive, incremental, and fragmented, with no oversight agency we should take her seriously that she hopes that her article pro-
and few effective remedies, leaving a lot of law but “not much vides guidance to designers to design “to support privacy for their
protection” (p.113). users,” there are too many disturbing aspects to her article. About
One contributor to the book who is charged with such oversight RAVE in particular, she says, “privacy, while an initial concern,
and implementation is British Columbia’s commissioner for Infor- came to be something people did not worry about very much” (p.
mation and Privacy, David H. Flaherty. After he had written a 71). This is precisely what Davies would be most worried about:
book as an academic and consultant on privacy in 1989, he set out when people stop worrying about privacy. And later, in her “de-
to be appointed to an oversight position. In 1993, he got his wish, sign for privacy” framework, Bellotti suggests that one of the
but his article here on his current role is far from an apologia. He solutions to privacy concerns for people is to “behave appropri-
is, surprisingly, refreshingly candid about the shortcomings of both ately,” that is, “to behave as if they might be being photographed”
his role and privacy law in general. He states that due to the (p. 88). No thanks. Let’s look for better solutions.
bewildering scope and pace of technology a “full-fledged surveil- Unfortunately, one of the other technology entrants here is not
lance state” is “almost impossible to prevent in the long term, much help either. Herbert Burkert’s article must fulfill some law
whatever the prodigious efforts of data protectors and their allies” that says for every 10 articles there is bound to be a clinker. His is.
(p. 170). He notes, too, that neither government nor the private Although he initially makes some helpful points, including distin-
sector really like the privacy issue because it gets in the way of guishing between privacy-enhancing technologies and data-secu-
business-as-usual’s use of personal information. He argues that rity technologies, it drops off after that, as the reader is likely to do.
especially in the United States, as Bennett had noted, there is a The chapter is a revised version of a presentation, and it might
need for more oversight and enforcement, but he recognizes that have succeeded orally where the blank stares of the live audience
the task of privacy protection is daunting “in a market-driven would have provided an opportunity for clarification, but in a
capitalistic society that treats personal information as simply one book, the best one can do is to turn the page.
more tradable commodity” (p. 174). He concludes by stating that When one does happily turn the page, there are two more
he is less optimistic about privacy protection than he was in 1989 excellent efforts with a technology focus to bring the book to a
largely “because of the ongoing explosion of the digital economy satisfying close. David J. Phillips writes well and without code
and online Internet services” (p. 190). about cryptography, or data scrambling, a technology that has
This dark conclusion is echoed by one contributor who bridges arisen in the context of networked computers. At stake, he reminds
the gap between policy and technology, Simon G. Davies. He us, is power, the power to keep secrets. Because of this, struggles
writes about the reengineering of privacy, and finds that if privacy over cryptography are “struggles over the social structure of se-
is not dead, it’s at least on life support. He attributes this demise to crecy, trust, and power” (p. 244). The bulk of his article discusses
five factors: the discourse on privacy has changed in favor of five past and two nascent “socio-technical” contexts in which this
security; partnerships have been formed among stakeholders that struggle has been carried out. One is the Data Encryption Standard
mask disparate interests behind a façade of unity; surveillance (DES), a systematic cipher developed and certified by the U.S.
schemes have learned to make submission to surveillance appear government. A second is the Rivest-Shamir-Adleman (RSA) al-
voluntary; privacy rights have been transformed into consumer gorithm, which was the first efficient and reliable implementation
issues where privacy is purchasable; and the concept of the public of a public-key system. The third, the Clipper chip, is a chip
interest has been wildly expanded to justify privacy invasions. The designed by the U.S. National Security Agency for encrypting
technological focus of the Davies piece is on surveillance cameras, voice messages. The fourth, the “pretty good privacy” implemen-
and he is thus one of the few writers here to take us beyond the tation, or PGP, is a public-domain implementation of the RSA
box—the computer terminal—as the sole source of privacy con- algorithm that simplifies the encryption of e-mail. The fifth exam-
cerns. He is also one of the few to see the privacy and technology ple is Anonymous Remailers. These send encrypted messages
tug-of-war from a broader societal perspective: when times are across jurisdictional boundaries, and not only prevent eavesdrop-
good, economically and otherwise, then privacy is less threatened pers from deciphering the message content, as PGP does, but also
than when times turn bad. He is most distressed about the public hide who is talking to whom. The two new ones are DigiCash, a
learning to love its loss of privacy in the name of fighting crime, system for “electronic cash,” and SET, the Secure Electronic
or internal security, or the public interest. He notes that while polls Transaction specification developed by MasterCard and Visa.
throughout the world show a great popular concern over privacy Although the discussion is a bit technical here and there,
and surveillance, citizens are all too eager to welcome cameras in Phillips resurfaces periodically to remark upon the societal import
and on every corner. Given this distress, Davies would surely find of what he is describing. For instance, in describing the hegemony
his worst nightmare in the contribution to this volume by Victoria over encryption that the U.S. National Security Agency has at-
Bellotti. tempted, he notes that the interest that private firms have shown in
Bellotti’s promising start makes a distinction between public cryptography has threatened the control that the U.S. military has
and private spaces, and so one is hopeful that this will lead her to enjoyed over expertise in the area. He ends by restating his
argue that there are some spaces where computer technology is purpose: to review the contests and conflicts inherent in the trust
inappropriate. But instead, she ends up sticking little happy faces and power relationships implicated in cryptographic systems. He
on all the monitors and digital cameras. Though she deftly sets out reminds us that the U.S. government continues to seek to retain its
the consequences of the New Ubiquity Model (NUM) of computer dominant position in these relationships, and he urges that suc-
technology— dissociation, disembodiment, the breakdown of so- cessfully contesting invasive technologies and hegemonic crypto-
cial and behavioral norms and practices—she then proceeds to graphic systems “will depend on historical circumstance, applica-
rearrange the deck chairs into a really nice design, rather than tion of resources, and strategic alignments” (p. 274).
sounding the alarm on the good ship NUM. Rohan Samarajiva initially appears to take on a narrower slice
In fact, design is her game, as we find out a third of the way of the privacy pie than most in this volume: the collection and use
through her article when she shifts to the personal pronoun to tell of “transaction-generated information,” or TGI in the abbreviation-
us about her role in designing a ubiquitous computer environment happy world of IT, IS, & IM. But this narrow focus quickly takes
at the Apple company’s “Virtual Café.” She reviews that experi- in the whole world. He claims our economy has changed from a
ment and another ubiquitous computer environment, the Ra- mass-production economy to a mass-customization economy. The

632 JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE—May 15, 1999
mass-production economy depended upon mass media to do mass for protection of privacy in the context of exploiting the tremen-
marketing; it was a one-size-fits-all consumer economy. The mass- dous interactivity potential of technology. He is not blind to UBI’s
customization economy depends, instead, upon customizing prod- limitations and dangers, but he, nevertheless, finds in it a positive
ucts and services for spatially dispersed consumers who must be counterpoint to the “one-sided analyses” of unspecified “dystopian
differentiated into distinct audiences for customized marketing prognostications” pertaining to surveillance and interactive net-
messages. This economy presupposes an interactive media system, works.
requiring information-communication technologies and, necessar- Thus, even though it first appears that TGI and UBI are very
ily, customer surveillance. “Customized production goes with cus- narrow concerns, Samarajiva’s article is broad based and serves as
tomized marketing, which goes with customer surveillance. This is a welcome antidote to the “after a while you’ll learn to just love
the surveillance imperative” (p. 279). This surveillance is accom- being on camera all the time” nonsense of the Bellotti article.
plished through TGI, but Samarajiva is able to extract from this Compared to that, Samarajiva serves as a thundering, foot-stomp-
dark cloth a thread of optimism. ing climax to the entire volume, although truthfully, any surveil-
That thread is the UBI (Universal, Bidirectional, Interactivity)
lance camera would show that I wasn’t fully out of my chair and
network, an interactive media system currently under construction
standing at the end. But his and Agre’s essays, the alpha and
in Quebec. The UBI network draws revenues from vendors and
information-service providers in exchange for access to 80% of the omega of the volume, its bookends, justify the whole enterprise.
households in a spatially defined market. The households get
access, most for free, and UBI seeks to create an “electronic mall”
with a range of commercial, banking, financial, government, and
information services. What Samarajiva finds encouraging is that Marc Lampson, J.D.
UBI found it necessary to create and enforce a privacy code, which Seattle University School of Law
he explores, in recognition of the public’s widespread privacy Tacoma, WA 98402-4470
concerns. He finds this a positive development for those looking E-mail: mlampson@u.washington.edu

JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE—May 15, 1999 633

S-ar putea să vă placă și