This is the repository for the online module Bots as Digital Infrapuncture, commissioned by the Utrecht University
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

39 lines
5.6 KiB

4 years ago
Title: Introduction: Seda Gürses
Slug: 02-s2-introduction
Date: 2020-11-01 12:01
4 years ago
Summary: Seda Gürses, computational infrastructures & *POTs (Protective Optimization Technologies)*
4 years ago
Seda Gürses is currently an Associate Professor in the Department of Multi-Actor Systems at TU Delft at the Faculty of Technology Policy and Management, and an affiliate at the COSIC Group at the Department of Electrical Engineering (ESAT), KU Leuven. Beyond her academic work, she also collaborated with artistic initiatives including Constant vzw, Bootlab, De-center, ESC in Brussels, Graz and Berlin.
Gürses's work provides us with handles to study computational infrastructures. Specifically in the paper she co-wrote on *POTs (Protective Optimization Technologies)*[^pots], she proposes forms of critical *optimization* [what is critical optimisation?]. Here, she is questioning the notion of "fair" technologies, the limits of such practices and who is involved in reviewing their impact. An important factor in this paper is the proposal to approach computational infrastructures as systems, thus shifting focus from the algorithm itself to the economical, political and social context in which the algorithm operates.
By questioning how *protective* technologies [what are protective technologies, how does she define them?] could *optimize* their mode of operation in a truly fair way, it provides means for affected parties to address negative impacts of digital systems. The work departs from a thorough consideration of multiple forms of *harm* framed as *externalities* [what are externalities? maybe they need a separate sentence if we want to unpack this term] caused by computational infrastructures, such as privacy, discrimination, low wages, surveillance and exploration risks [what is exploration risks?]. How a *POT* could possible engage with these externalities is furthermore illustrated through a range of activist and artistic deployed examples of repurposed optimization technologies that correct [does she use the term correct?], shift of expose these harms.
<!-- They effect different externalities, operate on the basis of specific embedded values and define restrictions of what can be built on top of the infrastructure and what not. -->
<!-- Through the work of Seda we can understand computational infrastructures as complex entities. -->
<!-- The introduction to a seminar on *Programmable Infrastructures* points out how infrastructural work is becoming more and more mouldable, resulting in clouds and network providers that offer all sorts of flexible forms of *infrastructures-as-a-service*. And finally, the work around the unfolding of *The Institute for Technology in the Public Interest* create space for the articulation of what technologies for a “public interest” might be when “public interest” is always in-the-making. Links to these works are included at the bottom of this page. -->
<!-- Three of her works that particulary connect to the notion of *digital infrapunctures* are *POTs (Protective Optimization Technologies)*[^pots], *Programmable Infrastructures*[^progammableinfrastructures] and *The Institute for Technology in the Public Interest*[^titipi]. The work on *POTs* provides means for affected parties to address negative impacts of digital systems. It departs from a thorough consideration of multiple forms of harm caused by computational infrastructures. The work introduces a range of activistic, artistic and deployed examples of repurposed technologies that operate as (actual) optimization techniques, trying to correct, shift of expose these harms. -->
<!-- > PROGRAMMABLE INFRASTRUCTURES: Our concern is that the computational infrastructures are far more than a technological ecosystem alone. Like all infrastructure, they incentivize us to embed their values, and therewith much of their politics in the lower layers of the technology stack. Comparable to the cables and control equipment in electrical networks that determine what can and cannot be connected to it, computational infrastructures embed constraints on what can and cannot be built on top of it, as well as what is accessible to those needing to audit or validate its functionality.[^progammableinfrastructures] -->
<!-- POTS: We propose Protective Optimization Technologies (POTs). POTs, provide means for affected parties to address the negative impacts of systems in the environment, expanding avenues for political contestation. POTs intervene from outside the system, do not require service providers to cooperate, and can serve to correct, shift, or expose harms that systems impose on populations and their environments. We illustrate the potential and limitations of POTs in two case studies: countering road congestion caused by traffic-beating applications, and recalibrating credit scoring for loan applicants. -->
<!-- TITIPI: We want to create space for the articulation of what technologies for a “public interest” might be when “public interest” is always in-the-making. -->
<!-- How can we recognize harm in these digital systems? -->
<!-- And how to possibly correct, shift or expose these harms? -->
# Footnotes
4 years ago
[^pots]: Bogdan Lulynych, Rebekah Overdorf, Carmela Troncoso, Seda Gürses "POTs: Protective Optimization Technologies" (2020). <https://arxiv.org/pdf/1806.02711.pdf>
[^progammableinfrastructures]: Seda Gürses, Roel Dobbe, Martha Poon "Seminar on Programmable Infrastructures" (2020). <https://www.tudelft.nl/tbm/programmable-infrastructures/>
[^titipi]: Miriyam Aouragh, Seda Gürses, Femke Snelting, Helen Pritchard "The Institute for Technology in the Public Interest" (accessed on 2020) <http://titipi.org/>