update section 2

This commit is contained in:
manetta 2020-10-16 15:55:31 +02:00
parent 61f9e3301c
commit 15333ca310
7 changed files with 16 additions and 14 deletions

View File

@ -3,8 +3,6 @@ Slug: 01-s2-introduction
Date: 2020-11-01 12:00 Date: 2020-11-01 12:00
Summary: How to correct, shift or expose harms in computational infrastructures? Summary: How to correct, shift or expose harms in computational infrastructures?
<!-- > Our concern is that the computational infrastructures are far more than a technological ecosystem alone. Like all infrastructure, they incentivize us to embed their values, and therewith much of their politics in the lower layers of the technology stack. Comparable to the cables and control equipment in electrical networks that determine what can and cannot be connected to it, computational infrastructures embed constraints on what can and cannot be built on top of it, as well as what is accessible to those needing to audit or validate its functionality.[^progammableinfrastructures] -->
<!-- What are computational infrastructures? --> <!-- What are computational infrastructures? -->
<!-- Who designs them? What values do they embed into digital systems? --> <!-- Who designs them? What values do they embed into digital systems? -->
@ -21,6 +19,5 @@ We will introduce the work of Seda Gürses and dive with her into the following
<!-- Her work focuses on privacy enhancing and protective optimization technologies (PETs and POTs), privacy engineering, as well as questions around software infrastructures, social justice and political economy as they intersect with computer science. --> <!-- Her work focuses on privacy enhancing and protective optimization technologies (PETs and POTs), privacy engineering, as well as questions around software infrastructures, social justice and political economy as they intersect with computer science. -->
<!-- We propose Protective Optimization Technologies (POTs). POTs, provide means for affected parties to address the negative impacts of systems in the environment, expanding avenues for political con- testation. POTs intervene from outside the system, do not require service providers to cooperate, and can serve to correct, shift, or expose harms that systems impose on populations and their environments. We illustrate the potential and limitations of POTs in two case studies: countering road congestion caused by traffic-beating applications, and recalibrating credit scoring for loan applicants. -->

View File

@ -1,7 +1,7 @@
Title: Question 1: What are computational infrastructures? Title: Introduction: Seda Gürses
Slug: 02-s2-question-1 Slug: 01-s2-introduction
Date: 2020-11-01 12:01 Date: 2020-11-01 12:01
Summary: A video contribution by Seda Gürses. Summary: Seda Gürses, computational infrastructures & *POTs (Protective Optimization Technologies)*
The work of Seda Gürses provides us with handles to XXX [unpack, look closer into, study, explore] computational infrastructures. Throughout her work she has questioned the notion of "fair" technologies, the limits of such practices and who is involved in reviewing their impact. An important factor in her work is to approach computational infrastructures as systems that are far more than a technological ecosystems alone. The work of Seda Gürses provides us with handles to XXX [unpack, look closer into, study, explore] computational infrastructures. Throughout her work she has questioned the notion of "fair" technologies, the limits of such practices and who is involved in reviewing their impact. An important factor in her work is to approach computational infrastructures as systems that are far more than a technological ecosystems alone.
@ -27,10 +27,6 @@ Seda is currently an Associate Professor in the Department of Multi-Actor System
<!-- And how to possibly correct, shift or expose these harms? --> <!-- And how to possibly correct, shift or expose these harms? -->
<video>
<source src="https://vvvvvvaria.org/archive/2018-02-16-Extratonality/dennis-not-supercut-yet.mp4" type="video/mp4">
</video>
# Footnotes # Footnotes
[^pots]: Bogdan Lulynych, Rebekah Overdorf, Carmela Troncoso, Seda Gürses "POTs: Protective Optimization Technologies" (2020). <https://arxiv.org/pdf/1806.02711.pdf> [^pots]: Bogdan Lulynych, Rebekah Overdorf, Carmela Troncoso, Seda Gürses "POTs: Protective Optimization Technologies" (2020). <https://arxiv.org/pdf/1806.02711.pdf>
@ -38,3 +34,4 @@ Seda is currently an Associate Professor in the Department of Multi-Actor System
[^progammableinfrastructures]: Seda Gürses, Roel Dobbe, Martha Poon "Seminar on Programmable Infrastructures" (2020). <https://www.tudelft.nl/tbm/programmable-infrastructures/> [^progammableinfrastructures]: Seda Gürses, Roel Dobbe, Martha Poon "Seminar on Programmable Infrastructures" (2020). <https://www.tudelft.nl/tbm/programmable-infrastructures/>
[^titipi]: Miriyam Aouragh, Seda Gürses, Femke Snelting, Helen Pritchard "The Institute for Technology in the Public Interest" (accessed on 2020) <http://titipi.org/> [^titipi]: Miriyam Aouragh, Seda Gürses, Femke Snelting, Helen Pritchard "The Institute for Technology in the Public Interest" (accessed on 2020) <http://titipi.org/>

View File

@ -0,0 +1,8 @@
Title: Question 1: What are computational infrastructures?
Slug: 02-s2-question-1
Date: 2020-11-01 12:02
Summary: A video contribution by Seda Gürses.
<video>
<source src="https://vvvvvvaria.org/archive/2018-02-16-Extratonality/dennis-not-supercut-yet.mp4" type="video/mp4">
</video>

View File

@ -1,6 +1,6 @@
Title: Question 2: What are elements that shape (or are shaped by) computational infrastructures? Title: Question 2: What are elements that shape (or are shaped by) computational infrastructures?
Slug: 03-s2-question-2 Slug: 03-s2-question-2
Date: 2020-11-01 12:02 Date: 2020-11-01 12:03
Summary: A video contribution by Seda Gürses. Summary: A video contribution by Seda Gürses.
<video> <video>

View File

@ -1,6 +1,6 @@
Title: Question 3: How can we understand the harm caused by computational infrastructures and the systems which deploy them? Title: Question 3: How can we understand the harm caused by computational infrastructures and the systems which deploy them?
Slug: 04-s2-question-3 Slug: 04-s2-question-3
Date: 2020-11-01 12:03 Date: 2020-11-01 12:04
Summary: A video contribution by Seda Gürses. Summary: A video contribution by Seda Gürses.
<video> <video>

View File

@ -1,6 +1,6 @@
Title: Question 4: What interventions are possible to mitigate or eliminate this harm? Title: Question 4: What interventions are possible to mitigate or eliminate this harm?
Slug: 05-s2-question-4 Slug: 05-s2-question-4
Date: 2020-11-01 12:04 Date: 2020-11-01 12:05
Summary: A video contribution by Seda Gürses. Summary: A video contribution by Seda Gürses.
<video> <video>

View File

@ -1,6 +1,6 @@
Title: QUESTION 5: What kind of limitations do you see in the realisation of these interventions? Title: QUESTION 5: What kind of limitations do you see in the realisation of these interventions?
Slug: 06-s2-question-5 Slug: 06-s2-question-5
Date: 2020-11-01 12:05 Date: 2020-11-01 12:06
Summary: A video contribution by Seda Gürses. Summary: A video contribution by Seda Gürses.
<video> <video>