Archives for posts with tag: U Chicago

Joseph Westfall’s article What is cyberwoman?: The Second Sex in cyberspace (Ethics and Information Technology, 2000) presents an interesting point that is often glossed over in discussions of online space:

Cyberspace is not a place. Although interactions occur in cyberspace, there is not ‘there’ at which the interactors can find themselves together. Cyberspace only exists for anyone communicating in cyberspace. (Westfall, 2000: p161)

The first reaction to this is probably a resounding “Duh! Of course cyberspace doesn’t actually exist.” But I think there is a lot to unpack here.

Human beings are taught to be “completers” from birth. Scott McCloud insightfully points out in Understanding Comics that early games such as “peek-a-boo” help teach infants that while a person might disappear from view, they still exist. He goes on to point out that while we can’t see the world behind us, or lets say Tokyo for that matter, we know that both are there. We complete the unseen world. And that completion is an act of projection of our imagined ideas of how that world should be.

We do the same thing in most of our technology mediated communications. When I call someone on the phone, the simultaneity of conversation invokes images of the individual on the other end of the line and some rough approximation of their surroundings. And these images impact the overall phone interaction. For example, should the person I am speaking with become mad, typically my image of them displays the anger on its face. Typically sections of the conversation are geared to helping create these images. I often ask, during the course of a conversation questions like “Where are you?” or “What are you doing?” Each of these betters refines the image I form of my partner in conversation.

So why would it be any different in the online space? While the chat room is only a mediator, its interface and the related language of chat causes it to be conceptualized as a quasi-physical local. Tackling the latter first, we need look no further than the common parlance of referring to the chat environment as a “room.” The room metaphor immediate conjures the notion of a physical space, invariably four walls, a door, possibly a window or two. Further the use of phrases like “switching rooms” or “I’m in X room” further reinforces this notion.

The software interface also serves as a constant reminder of the simultaneity of interaction. Most chat programs display the usernames of all other visible chatters who are also in the room with you at the same time. So, before any text appears within the actual chat window you are already aware of the presence of other chatters. Obviously, the flow of conversation within the window further instantiates the copresence of other chatters, as do public notifications of chatters entering or exiting the room.

All of this creates the image of a shared space that we then fill with imagined images of the people that we are chatting with. And it is this desire to create these imagined images that bots, and other chatters for that matter, rely on. The mechanics of idenity, however, is a subject for another, soon to come, post.

One of the reasons for trying this format of fieldnotes is the chance to get immediate feedback. This is going to become increasingly important as I approach both Michicago and completing my thesis. What I’m saying is that questions are good. Please feel free to ask them, because they help me to construct my ideas. For example, this was a comment that was submitted about the previous post:

Have you considered using the typical “Subject A”, “Subject B” progression in place of the usernames?

Also, analyzing a user’s username for its meaning would be rather invasive to the individual. It’s sort of like publicly analyzing the names people chose for their sons and daughters and then publishing it, thusly divulging their identity.

The question of how to handle Usernames is a tricky one. The IRB doesn’t want Usernames used verbatim because in many cases they can be linked to an e-mail address. It is my responsibility to protect my subjects anonymity (within limits) to ensure that they do not come to harm as a result of their participation in my research. In more traditional forms of ethnography that would be done by simply assigning them a pseudomyn or referring to them as a subject as suggested in the comment. However there are subtle differences between a username and a given name that problemitize that strategy.

First and foremost, usernames (screennames, handles, etc.), unlike given names (here in refered to simply as name(s) for the sake of simplicity), are almost always self selected. Therefore there is data to unpack in what someone calls themselves online. For example, on forums that I’m active on, my username is “Matt Bernius”, because I feel that if I’m going to express an opinion then I should be confident enough to connect my name with every post that I make. That’s just one, albeit simple, reading of name selection.

It’s also something that a typical name doesn’t lend itself to. While it is the case that you can analyze why my parents chose to name me Matt, the fact that I’m named Matt tells you very little about me. I’m sure that some Freudians would suggest that being given the same name as my father has profound effects on me. But that’s the type of unsubstantiatable claptrap that gives the social sciences a bad name.

The analysis of usename becomes more important when you consider the interaction genre the usename is used in. In chat rooms, every time you speak your username is displayed. This means that the username is a fundamental part of the interaction, marking each of your comments. Thus, that name is constantly reinstantiating something in the mind of the viewer. Here’s an example that has popped up in my research (mom, you may want to skip the next section). I was in a room once with a guy (I’m assuming) whose username was something like: “8InchesForYou1.” So 8, as I’ll refer to him from this point on, was hitting on everything that moved, including the bots. His username was clearly chosen to get an idea across. And that idea both reinforces and is reinforced by every post that he makes.

This means that simply neutering the username to “subject a” for example is an unsatisfactory solution. Doing that removes contextual information from the interaction. So instead what I will do is create a close enough name that the subtext isn’t lost.

1. In keeping with IRB regs I’m protecting the names of the innocent (or guilty in this particular case).

Ok. While there have been few updates to the blog for the last few weeks, it’s going to get worse before it gets better. I have just found out that my abstract was accepted to the Michicago Linguistic Anthropology conference. I personally do not know what drugs they were taking.

There’s only one sticking point… the paper doesn’t currently exist. So the next few weeks are going to be dedicated to pulling together my paper (which is also my thesis).

As such, I’m going into a “lock down mode” which means very little activity outside of class, researching and writing. However, expect a lot of Headnotes postings, as I need to work out a lot of theory quickly.

Its already week two of the final quarter. Amazingly, it’s less than ten weeks until classes end. I’m overwhelmed with work. Posts to this blog are going to get shorter and shorter. Posts to headnotes will increase in size as I’m going to be constucting part of my thesis online.

My IRB cleared. So I can actually begin human research if I can find the time.

Stupidly I’m taking a full course load and auditing two classes. However, I’m definitely getting my money’s worth. And the audited classes are helping me better situate antropological practices.

All that being said, I’m not ready to be at the point I am. And I’m in sort of a low level panic attack state. The positive side of this is it’s keeping me really alert.

For the moment, I press on. The accompanying picture is of the Harper (Undergraduate) Library on campus. Its one of the spots on campus that always reminds me of Hogwarts.

My application was rejected/deferred. For those interested attached are the following reasons and accompanying vent:

b) Recruitment: Please provide additional information on the procedures that will be used to recruit subjects for the research. Please also submit a copy of the scripts/email messages that will be used to recruit participants (as outlined in the recruitment section of the protocol) and note that the IRB generally requires that recruitment materials/scripts include any age restrictions on participation.

my original entry
After observing subjects, in environments including discussion boards and chat rooms, I will privately approach them via either e-mail or instant messenger and ask if they are interested in participating. This contact will include information on my research and an overview of IRB protections.

If they response positively, we will discuss in what form the interview will take (phone, instant messenger, e-mail). I will then send the full consent form to them and have it returned before proceeding further.

Matt’s Comments
Oy! Recruitment scripts? I mean people will have to sign their lives away if they agree. And in that document everything is painfully explained. Why the heck do I need to script out every freakin’ encounter with people? I can just see it… I’m in the flow of a dialog and then I have to announce “give me a moment while I find the exact script that I will need to say in order to ensure that I don’t damage your obviously fragile psyche.” Yeah… that’s natural.

The larger implied issue here is what constituted a dialog online? Is an email exchange a online proxy for conversation? Or is the equivalent of a mass blanketing or requests for participation in a study?

d) Data storage: Please provide additional information on data storage and coding procedures for the comments collected from chat rooms. Specifically, please indicate whether screen names or any other identifiers will be linked to the chat room comments.

Matt’s comment
The issue of Usernames is really tough. Since they are able to be linked back to e-mail addresses they’re considered identifying information. Like keeping someone’s name.

The problem is that unlike most names, people specifically choose screennames. And they have pretty significant meaning (which I’ll post more on soon). So I’m planning to analyze them as part of the study.

Still the IRB considers this a dangerous thing as someone could, in theory, get a hold of them and do “evil” things (though in this case I don’t know what constitutes evil). So I need to keep them locked down. And then if I want to use my findings, I must create pseudonyms to ensure everything is cool.

This process is going to kill me. Or make me stronger. Sadly I fear it will be the former before the latter.