Browse Source

'content/Section 2 - Harm in Computational Infrastructures/2-introduction-seda.md' updaten

master
Karin van Es 4 years ago
parent
commit
0af91075c3
  1. 8
      content/Section 2 - Harm in Computational Infrastructures/2-introduction-seda.md

8
content/Section 2 - Harm in Computational Infrastructures/2-introduction-seda.md

@ -3,13 +3,13 @@ Slug: 02-s2-introduction
Date: 2020-11-01 12:01
Summary: *Computational infrastructures* and *POTs (Protective Optimization Technologies)*
Seda Gürses is currently an Associate Professor in the Department of Multi-Actor Systems at TU Delft at the Faculty of Technology Policy and Management, and an affiliate at the COSIC Group at the Department of Electrical Engineering (ESAT), KU Leuven. Beyond her academic work, she also collaborated with artistic initiatives including Constant vzw, Bootlab, De-center, ESC in Brussels, Graz and Berlin.
Seda Gürses is currently [delete currently] an Associate Professor in the Department of Multi-Actor Systems at TU Delft at the Faculty of Technology Policy and Management, and an affiliate at the COSIC Group at the Department of Electrical Engineering (ESAT), KU Leuven. Beyond her academic work, she also collaborated with artistic initiatives including Constant vzw, Bootlab, De-center, ESC in Brussels, Graz and Berlin.
Gürses' work provides us with handles to study computational infrastructures. The paper on *POTs (Protective Optimization Technologies)*[^pots] she co-wrote, for example, proposes forms of critical *optimization* practices. Such practices "aim at addressing risks and harms that cannot be captured from the fairness perspective and cannot be addressed without a cooperative service provider". The paper questions current "fairness" approaches, by questioning their limitations and creating space for community-inclusive ways to review them. Following Michael A. Jackson’s theory of requirements engineering, the paper also proposes to approach computational infrastructures as being far more than a technological system alone, thus shifting focus from the system itself to the economical, political and social context in which it operates.
Gürses' work provides us with handles to study computational infrastructures. The paper on *POTs (Protective Optimization Technologies)*[^pots] she co-wrote, for example, proposes forms of critical *optimization* practices. Such practices "aim at addressing risks and harms that cannot be captured from the fairness perspective and cannot be addressed without a cooperative service provider"[add page number]. The paper questions current "fairness" approaches, by questioning their limitations and creating space for community-inclusive ways to review them. Following Michael A. Jackson’s theory of requirements engineering, the paper [repetitive language use, perhaps "it"] also proposes to approach computational infrastructures as being far more than a technological system alone, thus shifting focus from the system itself to the economical, political and social context in which it operates.
By questioning how technologies could *optimize* their mode of operation in a truly just way, *POTs* provide "means for affected parties to address negative impacts of digital systems". The work departs from a thorough consideration of multiple forms of *harm* caused by computational infrastructures framed as *externalities*[^externalities]. Examples of such externalities include lack of privacy, discrimination, low wages and surveillance. How a *POT* could possible engage with them is furthermore illustrated through a range of activist, artistic and deployed examples of repurposed optimization technologies that "correct, shift or expose these harms".
By questioning how technologies could *optimize* their mode of operation in a truly just way, *POTs* provide "means for affected parties to address negative impacts of digital systems" [page number]. The work departs from a thorough consideration of multiple forms of *harm* caused by computational infrastructures framed as *externalities*[^externalities]. Examples of such externalities include lack of privacy, discrimination, low wages and surveillance. How a *POT* could possible engage with them is furthermore illustrated through a range of activist, artistic and deployed examples of repurposed optimization technologies that "correct, shift or expose these harms".
We will introduce the work of Seda Gürses and dive with her into the following questions:
We will introduce the work of Seda [delete first name to be consistent with elsewhere] Gürses and dive with her into the following questions:
* What are computational infrastructures?
* What are elements that shape (or are shaped by) computational infrastructures?

Loading…
Cancel
Save