service

Access to Technology

Pattern number within this pattern set: 
1
Group Name: 
Urban Gardening
Peter Lyle
Queensland University of Technology
Marcus Foth
Queensland University of Technology
Jaz Hee-jeong Choi
Queensland University of Technology
Problem: 

Gardeners can come from any background, and as such have a wide variety of access to existing technology. Access to technology refers to whether an audience has a particular gadget or service, and their ability or willingness to use it as part of gardening practice.

Context: 

This problem applies to individuals and communities, whenever the intent is to design interactive technology. The context varies depending on the available resources of a community, and the target demographic of design.

Discussion: 

When designing for a known person or group, infrastructure and access to technology may be prescribed. Typically the context must be understood in order to know what is suitable. For example Australia has a high level of smartphone market penetration, and if targeting residential gardens, there are a likelihood of highcspeed Internet access. This would allow for the use of rich media and high levels of interconnectivity.

Communities on the other hand, such as Northey Street City Farm or Permablitz Brisbane, are limited in time and money to invest in additional technology or infrastructure. In these instances it is important to understand what technology community members already use or what infrastructure is already in place, and how is it currently used. With this understanding, the ability to repurpose, or make use of technology as part of a design, will become clear. Understanding the role technology plays in the lives of gardeners, and when they have access to technology, will result in a more inclusive design (Heitlinger et al., 2013).

Solution: 

Designers need to consider: the existing infrastructure; time and money to invest in new technology; and attitudes of gardeners to different technologies, and incorporate these preferences accordingly.

Community Oriented Social Media

Pattern ID: 
138
Rudyard
Discussion: 

Access to information and connections is essential to be successful in the 21st century. There is talk in many cities across the country of establishing municipal broadband- for example the grassroots organization “Upgrade Seattle” wants to “make the internet a city-owned and operated utility.” in Seattle.

 

A possible step further would be to create a publicly owned, operated and funded Social Network that would fill a role similar to that of radio and TV public broadcasting. The first and most obvious benefit would be the same one that comes from public broadcasting, that is- providing an alternative to the corporately owned, commercially funded media platforms, with a greater emphasis on community issues.

 

The services that companies like Facebook provide are valuable, and many of us willing give up a lot of equally valuable information in exchange for those services. The personal data Facebook mines from us is sold to other companies and used for market analysis, as well for generating personally targeted advertisements. A great wealth of information is produced thru all the clicks and likes and views from the users. All this data could go to good uses the private sector is not likely to be concerned with. Collection of census data and statistics for aiding scientific research are some of the immediate possibilities.

 

There is a need for people to have greater control over their information and how it is used. Perhaps not only a need, but a right. Then, beyond the issue of how our information is used, there’s the issue of how information filters to us through our “feeds.” The posts we see from our friends and the pages we follow (as well as advertisers) are sifted and prioritized based on hidden algorithms. There should be concern about how this system can create personal bubbles and opinion echo-chambers. Not to mention how it could influence people’s mental states (based on whether they see more police shootings or puppy videos, for example).

Categories: 
organization
Categories: 
social
Themes: 
Community Action
Pattern status: 
Draft

Profit-motivated Health Care

Pattern number within this pattern set: 
25
Version: 
3
Verbiage for pattern card: 

Pharmaceutical and health insurance companies profit off of disease and injury, and so it is in their fiscal interest to keep patients ill and/or injured.  Band-aid "solutions" and expensive procedures target symptoms, instead than causes of diseases in this pattern.  Health through prevention should be studiously avoided as it leads to "prevention" in profits as well.

Environmental Degradation

Pattern number within this pattern set: 
3
Version: 
3
Verbiage for pattern card: 

The natural environment; including but not limited to soil, water, air, flora, and fauna, has a natural balance. Through pollution, over usage, and lack of stewardship, the balance is broken causing the natural networks that sustain life on this planet to suffer.

Neighborhood based Community Health Workers

Pattern ID: 
913
Michael O'Neill
Healthy Living Collaborative
Version: 
1
Problem: 

Fragmented systems of service delivery that are intended to deliver health, social wellbeing, and safety are in need of course correction to address severe disparities in health and welbeing that exist.  The mandate of health care reform from the Affordable Care Act is to improve care, improve population health outcomes, and lower costs. In Washington State the timeline to accomplish this is five years.

 

How can organizations that have traditionally delivered units of care shift towards providing access to wellness for a population which creates health equity, increases local capacity, and transforms payment and delivery systems?

Solution: 

Community Health Workers are an emerging solution to this problem as shown by a case study of the Healthy Living Collaborative project in Southwest Washington and other similar projects which it is modeled after.  Community Health Workers (CHWs) are trusted community members among the people they serve who can fill a variety of culturally appropriate roles.  These roles increase access for the CHWs friends, family, neighbors, and peers to resources, knowledge, and skills that promote wellness.  CHWs are a credible voice for the lived experience of local needs and play a critical role in translating this information across cultural, social, and organizational boundaries.

Verbiage for pattern card: 

Community Health Workers are an emerging solution to this problem as shown by a case study of the Healthy Living Collaborative project in Southwest Washington and other similar projects which it is modeled after.  Community Health Workers (CHWs) are trusted community members among the people they serve who can fill a variety of culturally appropriate roles.  These roles increase access for the CHWs friends, family, neighbors, and peers to resources, knowledge, and skills that promote wellness.  CHWs are a credible voice for the lived experience of local needs and play a critical role in translating this information across cultural, social, and organizational boundaries.

Pattern status: 
Draft

Transformative Holidays

Version: 
1
Discussion: 

Suggestions by Gerald Dillenbeck: I imagine living in a U.S. culture that celebrates "Vocation Day," inclusive of Labor; "Nurturance Day," inclusive of Mothers; "Interdependence Day," inclusive of Independence and Freedom and Security; "Creativity Day," inclusive of Christmas, "Regeneration Day," inclusive of Easter, "New Seasons Day," inclusive of New Years, "Visioning Day," inclusive of Memorial, "Gratitude Day," inclusive of Thanksgiving, "Mentors Day," inclusive of Presidents, and maybe even the perennial kids' favorite "Enlightenment Day," inclusive of Halloween.

Categories: 
organization
Categories: 
social
Themes: 
Education
Themes: 
Social Movement

Inteligencia Cívica

Group Name: 
Spanish translations of Liberating Voices card verbiage
Version: 
1
Verbiage for pattern card: 

Inteligencia cívica describe que tan bien grupos de personas persiguen fines cívicos a través de medios cívicos.  Inteligencia Cívica hace la pregunta crítica: Es la sociedad suficientemente inteligente para afrontar los desafíos que se le presentan?  La inteligencia cívica requiere aprendizaje y enseñanza. También requiere meta-cognición – el pensar y realmente mejorar como pensamos y trabajamos juntos.

Street Music

Douglas Schuler
The Public Sphere Project
Celebration of Public Music
Version: 
1
Problem: 

(note that the Problem Statement is still in work.....)

Music, including singing as well as the playing of instruments, has been a key element of the human condition for millennia. Unfortunately -- at least in the United States -- music has become more of a commodity, to be enjoyed passively and non-interactively. 

The rise of mass media is probably at least one of the culprits. 

Context: 

(note that the Context Statement is still in work.....)

Discussion: 

(note that the Discussion is still in work.....)

Street Music blurs the distinction between producer and consumer of music as well as the distinction between formal and informal venues for music production and consumption. 

Although street bands, including many of those found at Honk Fests, can be found at protests (including the Infernal Noise Machine (image below) that supported the demonstrations against the World Trade Organization in Seattle in 1999), their actions are often political to a large degree by virtue of their publicness in an era of electronic or other formalized or mediated forms of music consumption. 

See http://www.youtube.com/watch?v=i-MLvzLlou4 for Environmental Encroachment's performance of Hashia.

 

Thanks to a member of the Bucharest Drinking Team and to Bob of Environmental Encroachment for their thoughts on the current breed of "new street bands" including their history and motivation. 

Solution: 

 

Solution in work:

something about establishing and supporting street music. More and more and more of it....

Categories: 
orientation
Categories: 
engagement
Categories: 
social
Categories: 
products
Themes: 
Social Critique
Themes: 
Community Action
Themes: 
Social Movement
Themes: 
Media Critique
Information about introductory graphic: 
Photo of Church, a marching band from Santa Rosa, California. Shot by Douglas Schuler, June 1, 2012. Georgetown (Seattle, WA)
Information about summary graphic: 

Infernal Noise Machine, Seattle Washington

Circumvention

Bryan
Version: 
1
Problem: 

Censorship and deliberate misinformation plague the modern media, the internet access of many countries, and traditional news sources. The ultimate challenge to a power structure comes from the ability of people under it to understand it. Without understanding and knowledge of a power, one cannot mount the offense needed to dismantle or change it.

Context: 

Any system of power, society, or decision-making apparatus that aims to maintain power or govern and anybody who is affected by it.

Discussion: 

Those in power have become quite adept at hiding information from public view that could threaten their ability to retain it. Governments and corporations worldwide engage in efforts to censor the flow of this information and the ability of people to discuss and act on it. Because circumvention is an inevitable by-product of censorship, they also work to plant misinformation to satisfy the inherent human need to know.

Misinformation, on its own, is not dangerous. To take an example, a conspiracy theorist's views or slanted media coverage are not particularly dangerous as the marketplace of ideas should be able to neutralize them and give people better options. Unfortunately, the marketplace of ideas among traditional media sources is severely weakened. According to FAIR (Fairness and Accuracy in Reporting), "Almost all media that reach a large audience in the United States are owned by for-profit corporations--institutions that by law are obligated to put the profits of their investors ahead of all other considerations. The goal of maximizing profits is often in conflict with the practice of responsible journalism." According to Ben Bagdikian who published "The Media Monopoly" which analyzes increasing consolidation of media ownership in the United States, less than six companies own over 90% of media in the country. Misinformation is easily discredited and neutralized by having access to alternative viewpoints but with less than 10% of media outlets being independent, how can people really have access to those viewpoints?

When combined with censorship, misinformation becomes incredibly dangerous. Censorship aims to prevent people from accessing information. The censor becomes the sole decider as to who can access what information. The posterchild of this problem are nations controlled by totalitarian regimes such as North Korea. In North Korea, the independent press is simply outlawed and the average person is not even allowed to use the internet. Those reporting accounts which differ from the official government stance are often imprisoned, sent to "re-habilitation" camps, killed, or simply "disappeared" in the night. When censorship is combined with misinformation, the market of ideas is simply killed.

Circumvention is both a tactic and a strategy for reviving the marketplace of ideas, exposing corruption, and re-enabling the free flow of information. While most people think of circumvention as being a technological measure, it doesn't necessarily need to involve a modem, an internet connection, or a computer. Circumvention simply needs a method to access an uncensored repository of information. This repository could be a person from a foreign country who brings in contraband documents with them or an illicit billboard exposing government misinformation.

Technological circumvention is perhaps the most widespread and useful type of circumvention. As more and more nations decide to censor the internet and place limits on what people can do online, the ability to bypass firewalls and remain anonymous becomes more and more important. Technological circumvention tools include proxies, peer-to-peer networks, and rogue websites which operate outside the jurisdiction of their censors.

Rogue websites are perhaps the simplest form of technological circumvention. By hosting websites outside of the jurisdiction of the censorsing country, the censor loses the ability to control access to these websites. Many blogs critical of the Chinese government, for example, are hosted in the United States where they are safe from censors.

Peer-to-peer networks enable people to bypass censorship and access media content that might not be available through traditional means such as web access. They can exist solely within a nation, circumventing the need to go through a government firewall. Because of the diversity of peer-to-peer networks and the difficulty in indexing them for censorship purposes, they are powerful tools for distributing archives of documents, videos, photos, circumvention tools, and other static content. Unfortunately, they are difficult to use for web browsing or interactive communication. Examples of peer-to-peer networks include BitTorrent, GNUNet, and Freenet.

Proxies and proxy networks are the most versatile technological circumvention tools. They give people under censorship the ability to connect to peer-to-peer networks which they are barred from accessing, browse the web, use the internet anonymously, and, in some cases, host websites and online services of their own. Many one-hop proxies and Virtual Private Networks such as Xerobank exist, but they only protect ones anonymity and circumvention abilities to the extent that they can continue to operate and stand by their users. As they hold the keys to de-masking users and disabling their internet access, these providers often roll over under government pressure. Proxy networks are different as they route a user through several different proxy servers which do not have the ability to single-handedly betray the user. The most technologically advanced proxy network at this time is Tor. It routes a user's connection through three different proxy servers none of which can demask the user without the collusion of the others. The connections are all encrypted making them too difficult to eavesdrop on and the network makes efforts to hide it's "network signature" meaning even the most sophisticated firewall can't block it as there is no way to differentiate between Tor and other services such as online bakning. As an added feature, it also provides the ability to people to anonymously host websites in a 'darknet' where every user is anonymous. Another example of a proxy network is I2P which contains many similar features but it not as popular or useful as Tor.

Solution: 

People must build tools and networks to make it easier to engage in circumvention and these tools must be widespread enough to be useful in times of social unrest and crisis. New methods for building these tools must be discovered as circumvention is ultimately a cat-and-mouse game.

Pattern status: 
Draft

Sousveillance

Pattern ID: 
386
Pattern number within this pattern set: 
386
Bryan
Douglas Schuler
Public Sphere Project
Version: 
1
Problem: 

"One of the fundamental contrasts between free democratic societies and totalitarian systems is that the totalitarian government [or other totalitarian organization] relies on secrecy for the regime but high surveillance and disclosure for all other groups, whereas in the civic culture of liberal democracy, the position is approximately the reverse." -- Professor Geoffrey de Q Walker, now dean of law at Queensland University in Australia.

Over the past two decades, surveillance has permeated society in ways that only Orwell could have imagined. The increasingly low costs of electronics and data storage coupled with scare tactics like terrorism have given governments worldwide the green light to put public and private spaces under their eye. During 2008 alone, Sprint gave location data of their users over to law enforcement a total of eight million times.  The surveillance infrastructure is owned and controlled primarily by those with political and class privilege. This creates a situation where people can be watched but cannot "watch the watchers". As a result, the accountability of police, politicians, and other authority figures decreases.

Context: 

In any political / social context, from a liberal democracy to an authoritarian government. Sousveillance in a democratiic (or quasi-democratic) country is particularly important in times of overzealous governmental secrecy, propensity towards surveillance, and increasing political repression.

Discussion: 

"Steve Mann presents the notion of sousveillance as a method for the public to monitor the establishment and provide a new level of transparency. This has been the role of the press, but with its strong orientation toward positive feedback, the media has tended to focus on less relevant issues, which get an inordinate amount of attention. One such example was the media's fascination with Gennifer Flowers and her claim that she had had an affair with President Clinton." -- From Joichi Ito's discussion of Emergent Democracy. One of the first thing that George W. Bush did when he became president of the US was to place his father's writings (which by law were supposed to be made public) into secrecy.

We live in an age where ever-increasing portions of the population have turned to social networking where they divulge the most personal and private details of their life to their friends, their co-workers, and most anybody who cares to look. Facebook, Google, and other advertising giants track every website a person goes to with an ad or a 'like' button on it. People scan their loyalty cards at grocery stories and give their entire purchase history, name, number, and address to the highest bidder in exchange for a few dollars off their bill. Those who run their surveillance infrastructure have not been blind to this and have begun investing significant resources into monitoring social networking sites and rich sources of user-generated information.

No matter where one turns, they can find information on their fellow citizen that they would rather not have revealed. Security cameras, credit cards, and RFID-enabled identification cards track our every movement. Normal activities which one might not want the world to know about like visits to the pharmacy, an alleyway make-out session, and a visit to Planned Parenthood all become a spectacle for those on the other end of the camera to enjoy.

While some of the information garnered by dragnet surveillance is available to the public or those of small financial stature, most of it is locked in databases and storage systems run by the rich and powerful. In 2005, it was revealed that for the past five years the National Security Agency had been collecting wholesale internet traffic, call records, and other private information from millions of Americans without warrants, subpoenas, or any judicial oversight. In a 2001 report, the European Union validated a theory that the United States, in conjunction with allies such as the UK, operated a global surveillance network called ECHELON which could intercept most worldwide communications. It is said that through publicly and privately operated surveillance cameras, the average Londoner is photographed 300 times per day. The majority of people are watched with intense scrutiny throughout the entirety of their lives while the minority of people who commit the biggest crimes sit behind closed doors where they can execute their plans for financial and social dominance in privacy and without interruption. People no longer seem to be surprised to hear that the dash-cam of a police car was mysteriously off when the officer flew off the handle or that the video from a jail beating is missing.

How can we change this dynamic? How can surveillance systems actually be used for widespread social accountability instead of preserving the interests of those who own them?

Study after study shows that surveillance does not actually reduce crime or make the average person safer and a steady stream of news stories show that surveillance abilities are used improperly by those who have them. A study conducted by Hull University showed that one in ten women were targeted for 'voyeuristic' reasons by male camera operators. Norris, C. and Armstrong, G. "The unforgiving Eye: CCTV surveillance in public space" Centre for Criminology and Criminal Justice, Hull University, 1997. Seeing this, the simple solution seems to be to outlaw surveillance equipment entirely or create rules to hold its owners accountable. To some extent, this has already been done. The government is barred from using surveillance and search powers without obtaining necessary legal justification and corporations have similar but less stringent limitations. Nonetheless and unsuprisingly, these rules have not stopped widespread abuse as those who own surveillance systems are often the same ones who fare better in courts and the media due to societal privilege.

Solution: 

People must have the means to watch the watchers. Steve Mann's term "sousveillance" captures this idea. As the age of surveillance is here to stay (at least until we live in a world where people's privacy is put above the sanctity of property), there must be a way to change the dynamic of surveillance. Sousveillance requires tools which are easy for laypeople to use, a network for communicating among those who use them, and a method for spreading information that comes from sousveillance. There are many some tools such as Freedom of Information Laws, cell-phone cameras, and independent media networks which help facilitate sousveillance but there are not nearly enough and they are not as widely adopted as necessary. People must make these tools easier to use, put them into the hands of more people, and make their use ubiquitous enough to truly scare those who they are meant to keep an eye on.

Pattern status: 
Released
Syndicate content