Best Practices for Achieving a 4.0 GPA


 

honors-college.previewWhen I started my undergraduate work at Colorado State University, I committed myself to trying to maintain a 4.0 GPA.  At the time, I didn’t understand what it would take to maintain that level of excellence for the duration of the coursework, nor did I find much in the way of best practices to light the way.  Now that I have completed my coursework and graduated with a 4.0, I though it would be worthwhile to document those practices that helped me reach my goal for other students who choose to commit themselves to academic excellence.  I have organized the practices into three categories, a) building a support system, b) organization, and c) intellectual curiosity.

Building a Support System

Every journey in life is worth sharing, and the decision to pursue a college education is no different.  It’s a journey, and as such, requires a support system to help along the way.  A strong support system includes family, friends, employers, and the university.  In addition, it is important to seek out a mentor that can guide you through the journey.

I began by talking with my family, to make sure they understood the value I placed on academic excellence and the sacrifices that we would have to make as a family.  In addition, I used Facebook, Twitter, and a WordPress blog to communicate my progress to extended family and friends, finding the social network tools a great way to keep everyone informed of my progress and share my work.  After each term, I posted the grades for my classes and a credit countdown.  In turn, friends and family gave me the encouragement I needed to keep going when things got tough.

In addition, I talked to my boss and co-workers about what I was doing and learning throughout the journey.  My employer was incredibly supportive and allowed me to use what I learned in the work environment, helping me to synthesize the knowledge.

I also made extensive use of the University support system, including the librarian, professors, the administrative staff, and my academic advisor.  Colorado State’s staff was excellent, insofar as they appeared to care as much about my success as I did.

Finally, I had an excellent mentor.  Tom Tonkin, a friend and colleague of mine was pursuing his doctorate while I was working on my undergraduate degree.  I was able to bounce ideas off of him, run my rough drafts by him, get guidance on research, or simply vent.  His support and guidance was invaluable.

Building a viable support system was likely the most important step I took, and there is little doubt in my mind that they were critical to my success.

Organization

Staying organized is another critically important practice that includes planning for success, time management, understanding expectations, and keeping your research, citations, and academic work managed and accessible for future assignments.  Staying organized assures that you understand what needs to happen, and build the infrastructure and tools that support your academic efforts.

The first step in getting organized is to work with your academic advisors to build a realistic degree plan, that takes into account all of your obligations and responsibilities.  Of course, the plan is simply that, a plan.  As such, you should be comfortable adjusting it to changing life circumstances.

Second, I recommend using calendar tools to build a schedule that includes assignments, writing time, and research time.  Pad the schedule with extra time.

Third, go through the ALL of the course material before starting, paying particular attention to the syllabus, rubrics, and the grading scheme.  The grading scheme will tell you a lot about where to spend your time and energy.

Finally, keep your work organized, including research, citations, and all of your academic work.  I use End Note, a software package made by Thompson Reuters to managing citations and research.  I organize the End Note library by class and then citation.  I also make sure every citation includes a hyperlink to the material where possible.  This way I can always come back to it.  In addition, I post all assignments on my blog.  This is important because it makes it easy to cite myself (which you need to do to avoid plagiarism); thus, I am able to build on my earlier ideas in future work.  Finally, I save all of the original assignment documents in a local folder structure.

Intellectual curiosity and engagement

The most important advice I can give is to engage seriously.  It starts with an intellectual curiosity.  I try to provoke my curiosity by suspending my natural attitude—the ideas we take for granted—to look upon a subject with fresh eyes.  In addition, I always go to original sources rather than simply using the text.  The texts are typically great summaries, but the original material is much richer.  Finally, I try to be provocative—not for provocations sake—to engage in positions that I may not normally take or that nobody would take, to explore other positions in the spirit of intellectual inquiry.  Unpopular positions make for great debate, the soul of interaction.  It isn’t about beliefs, rather the point is to learn and grow.

In summary, I attribute my undergraduate success to more than just hard work.  Hard work is necessary, but not sufficient condition.  Graduating with a 4.0GPA also requires a great support system, great organization, and a genuine curiosity for how people and things work.


2012 in review


The WordPress.com stats helper monkeys prepared a 2012 annual report for this blog.

Here’s an excerpt:

600 people reached the top of Mt. Everest in 2012. This blog got about 2,700 views in 2012. If every person who reached the top of Mt. Everest viewed this blog, it would have taken 5 years to get that many views.

Click here to see the complete report.


Improv Everywhere: Culture Jamming and the Allure of Consumerism


Since 2001, Improv Everywhere, a prank collective based in New York, have pranked their way into the media spotlight, by riding the subway without pants, hacking the public’s reality with clandestine performances in the streets, parks, and subways of the city, and flash mobbing public and commercial spaces (Improv Everywhere, 2012g).  The comedy troupe’s missions grew popular on You Tube, but have increasingly become a staple of New York culture and the mainstream media.  Indeed, the troupe’s pranks occupy a unique place in New York culture, owing to how their pranks challenge popular conceptions of the use of public space and consumerism at large using culture jamming techniques (Rodriguez, 2010).  In this paper, the author traces the evolution of Improv Everywhere, from a small group of pranksters to a media phenomenon, to examine how media technology influences the creation of counter-cultural media products that are ultimately co-opted by the economic logic of commercialism.  The author’s analysis will proceed in four parts.  Part I will provide an overview of Improv Everywhere and their missions, and provide a detailed analysis of the Best Buy Uniform prank.  Part II describes how the Best Buy Uniform prank demonstrates culture-jamming techniques that challenge the dominant ideology of consumerism through alternative conceptions of the public’s use of time and space.  Part III analyzes the influence of media technology and economic processes in the evolution and rise of Improv Everywhere.  Finally, in Part IV the author provides a critical analysis of Improv Everywhere’s success and argues that the comedy troupe has evolved into a paragon of the very ideology they criticize, yet remains an important social phenomenon, offering an opposing voice in contrast to the allure of consumerism.

Part I: Improv Everywhere and the Best Buy Mission

According to Improv Everywhere (2012b), their mission is to cause scenes of chaos and joy for the entertainment of participants and audiences.  Indeed, the collective has staged more than one hundred missions since 2001 that have been viewed on You Tube nearly 250 million times (Improv Everywhere, 2012e).   Agents, the term for participants that are in on the prank, perform each mission, in front of an unsuspecting public audience, typically in a public or commercial space, like parks, subways, streets, and stores in New York City.  The number of agents can range from several to several thousand depending upon the prank.  In addition, some pranks, like the No Pants Subway Rides, are replicated in dozens of cities around the world.  While each prank is unique in terms of setting, participants, and approach, this author as identified several commonalities.  First, the group conducts the pranks in public space, conceiving of public or commercial space as a venue for performance and play.  Second, the performers include agents aware of the pranks, and an unsuspecting public.  Third, agents record the mission with numerous digital video cameras from a variety of vantage points, and distribute the video to the audience on You Tube.  Moreover, there appears to be three distinct styles of mission, including a) flash mobs, b) clandestine performances by agents, and c) audience performances where the audience members are the actors.  Of the missions conducted between 2006 and 2012, more than fifty-four percent were flash mobs, forty-one percent were clandestine performances, and a mere five percent were crowd performances (Rock, 2012).   Given the majority of missions use flash mobs, this author chose a flash mob mission for detailed analysis.

The media text for the Best Buy Uniform prank on Improv Everywhere’s website, includes a produced video, a text narrative, and agent reports (Improv Everywhere, 2012a).  Simply stated, the mission was to organize a flash mob of eighty agents dressed in an approximation of the uniform worn by Best Buy employees, and have them descend upon a Best Buy store in Manhattan, while four agents not in uniform captured the scene on digital video (Improv Everywhere, 2012a).  The agents were instructed to enter the store one or two at a time, disperse into different sections, and face away from store merchandise (Improv Everywhere, 2012a).  In addition, the organizers instructed agents to be helpful when approached by customers, and to state they were waiting for a friend and disavow knowledge of the other agents when confronted by store employees (Improv Everywhere, 2012a).   The video footage begins by showing the agents entering Best Buy, loitering in different store locations, and even straightening up disorganized merchandise (Improv Everywhere, 2012a).  However, the footage quickly shifted to the reaction from store employees.  While some employees appeared bemused by the spectacle, others were clearly alarmed.  In particular, store security and managers, in black and yellow shirts respectively, were concerned that the flash mob represented a sophisticated heist of some sort, and called 911 (Improv Everywhere, 2012a).  The next scene captures the arrival of the irritated policemen as they tell store managers that they cannot arrest people for wearing khakis and blue shorts, and that the only thing the store can do is ask them to leave (Improv Everywhere, 2012a).  Finally, the video shows the agents leaving the premises.

It is worth noting, that the music accompanying the video sounds like the MIDI-style sounds from video games of earlier decades, giving the video a sense of playfulness that was clearly not universally shared during the experience (Improv Everywhere, 2012a).  It appears the music selection is oriented to highlight the playfulness of the scene, rather than the tension.  Indeed, emphasizing play is a notable tactic of culture jammers.

Part II: Culture Jamming at Best Buy

According to Dery (2010), cultural jamming was first introduced to the public in 1984 by the band Negativland, notable for their criticism of media, politics, and society.  Jamming, originates from the illegal practice of interfering with the transmission of citizen band radios, whereas “culture jamming, by extension, is artistic ‘terrorism’ directed against the information society in which we live” (Dery, 1990, p. 1), an information society dominated by consumer ideology and brand images.  Moreover, Harold (2004) suggests culture jamming “usually implies an interruption, a sabotage, hoax, prank, banditry, or blockage of what are seen as the monolithic power structures governing cultural life” (p. 192).  For certain, as the Best Buy Uniform prank demonstrates, Improv Everywhere used the prank to interrupt or block the routine employee and consumer behavior at Best Buy.  Moreover, the video recording of the prank is itself, a critique of the power structures governing consumerism, demonstrating how the police and commercial interests work in concert when social norms of consumer behavior are broken.  Accordingly, Improv Everywhere agents demonstrate a sophisticated understanding of culture jamming tactics, given they were able to accomplish their mission without repercussion.  What specific tactics did Improv Everywhere use during the prank to navigate the boundaries between critique and protest?

Some scholars and observers of culture jammers suggest their ideas and tactics have origins in the French Situationist movement of the 1960s (Dery, 1990; Goldstein, 2003; Harold, 2007).  The Situationist movement built upon critical culture theory, concerning itself with how cultural products were commoditized, providing “illusory notions of our place in the world, often resulting in the obscuration of the real structure of society and our subordination in it” (McQuail, 2010).  In short, the Situationist movement decried the Spectacle, the subjugation of social life to mediated consumerism, where “the commodity has attained the total occupation of social life [where] the relation to the commodity is not only visible, but one no longer sees anything but it” (Debord, 1994, p. para. 42).  Of importance to the discussion of Improv Everywhere’s culture jamming techniques, is their similarity to the two tactics used by Situationists to bring about a postmodern world, détournement, and dérive.

Détournement is the French word for rerouting, diversion, or hijacking (Wiktionary, 2012).  Debord described détournement as the language of anti-ideology and used it to describe the technique of rerouting expressions of capitalist media culture to subvert their meaning, and thus reclaim them (Harold, 2007).  According to Harold (2007), examples of the détournement technique include:

Rewording conversations between popular comic-strip characters, reworking the sign on a storefront, making subversive collages out of familiar advertising images, and ‘hijacking’ a public sermon, where a Situationist dressed as a priest declares that ‘God is dead’.  (p. 8)

Of course, there is a distinct similarity between Harold’s examples of détournement and the Best Buy prank, given Improv Everywhere agents dressed as Best Buy employees and faced away from the merchandise in a subtle alteration of typical norms associated with consumerism.

The second tactic of Situationists was dérive, a behavior where one or more persons would stop work or leisure activity and drift through urban terrains in search of experiences afforded by the city (Harold, 2007).  In addition, Lasn (2000) suggests “the Situationists believed the dérive could largely replace the old twin occupations of work and entertainment, and become a model for the ‘playful creation’ of a new way of life” (p. 103).  In this sense, the dérive was a rejection of capitalist and consumerist notions of work and entertainment, offering an alternative for the creation of happiness.  Again, there are similarities between the Situationists’ use of dérive and the techniques employed by Improv Everywhere.  As noted earlier, nearly every one of the group’s mission conceive public space as a place of performance and play, rather than consumption.  Indeed, spontaneous musicals erupt in grocery stores and malls, subways are transformed into art galleries and theatres, and the streets, parks, and stores of Manhattan become places for flash mobs to experiment and play (Improv Everywhere, 2012g).  Moreover, all of these diversions occur without participants exchanging money for happiness.

It is clear that Improv Everywhere uses the techniques of détournement and dérive in their pranks.  Moreover, culture jammers typically use these tools to help people question the assumed, but not discussed, norms, roles, and constraints of consumerist ideology.  For instance, is it safe for this author to go into a Best Buy with khaki pants and blue shirt?  On the other hand, can this author go into a store, face away from the merchandise, and not buy anything?

It is important to note that Improv Everywhere makes no claim to be part of a counter-culture or social movement of any kind, rather they distance themselves from such notions (Improv Everywhere, 2012b).  Nor does the comedy group link their pranks to the Situationist movement.  Indeed, according to Improv Everywhere founder Charlie Todd, “There is no point and…there doesn’t have to be a point.  We don’t need a reason.  As long as it’s fun” (TedxBloomington, 2011).  However, their emphasis on joy, happiness, and fun belie their sophisticated use of détournement, and derive.  Indeed, it is difficult to ascertain whether the group is operating meta-prank intended to further subvert consumerism through greater media popularity, or whether they are simply out to have fun.  Perhaps a third option is an economic motive.

Part III:  Media Technology and Production Economics of Improv Everywhere

Charlie Todd founded Improv Everywhere in 2001 after he and a friend pretended he was Ben Folds, of the Ben Folds Five musical group at a Manhattan bar (Plummer, 2011).   Beginning with that first mission, this author catalogued the collective’s rise and evolution based on information available on the Internet.  In addition, this author analyzed each mission, tracing the collective’s evolution from obscure beginnings characterized by simple pranks, to a media darling using increasingly inventive and unique pranks.  The analysis is useful to identify major inflection points, and begin to infer how the group operates, produces, distributes, and generates revenue from their pranks.

To identify major inflection points and trends in the group’s evolution, this author created a chronological sequence of events in Figure 2 in the appendix, that includes substantive changes in prank techniques, production and distribution changes, media appearances, notable pranks, and commercial ventures.  The first major inflection point occurred in 2003 with the introduction of the first flash mob for the No Pants Subway Ride 2K3, where a team of 40 agents rode the subway in their underwear.  The next inflection point occurs when the media begins to focus on the group, beginning in 2004.  By 2006, Improv Everywhere began posting videos of their missions on You Tube, and by 2008, the Frozen Grand Central mission had gone viral with more than thirty-one million views.  The period between 2007 and 2012 demonstrated increased commercialization with joint ventures and corporate sponsorship of the MP3 experiment project.  Furthermore, increased national media coverage is coincident with greater commercial success.  In addition, it appears that the use of flash mobs, coupled with the use of You Tube as a distribution channel, caused many of the pranks to go viral, which in turn, caused the national media to take notice.  Indeed, according to Juno, Vale, and Ballard (1987):

The media can never deny coverage to a good spectacle.  No matter how ridiculous, absurd, insane or illogical something is, if it achieves a certain identity as a spectacle, the media has to deal with it.  They have no choice.  They’re hamstrung by their own needs.  (p. 14)

While the rise in commercialization of Improv Everywhere appears to go hand-in-hand with the growing media spectacle, there is little evidence to suggest the group’s goals turned exclusively commercial.  In fact, the group draws a distinction between Improv Everywhere projects and commercial efforts, however the members are open to appearances, conference bookings, media consulting, and other ventures (Improv Everywhere, 2012b).  Despite the lack of public information on the group’s finances, it is possible to infer the major elements of the business model using publicly available information.  This author built a process model showing the production, distribution, and monetization of Improv Everywhere content outline in Figure 1 below:

Figure 1.

Process model of the production, distribution, and monetization of Improv Everywhere content.

Business Model

 

 

 

 

 

Figure 1.  Business process model for the production, distribution, and monetization of Improv Everywhere content.

Production and Distribution

As Figure 2 outlines, Improv Everywhere conceives, produces, and organizes each mission, although it should be noted that ideas for missions are occasionally crowd sourced.  During the organization of the mission, Improv Everywhere recruits agents to participate.  Agent recruitment is enabled by electronic communication.  Agents record the mission using digital video and still cameras, where both agents and an unsuspecting public are the subject of the work.  In fact, this author’s analysis of the missions, show that in more than twenty percent of missions, authority figures are the subject.

Improv Everywhere edit and post the video to You Tube, after the mission is completed.  In addition, the video, a mission overview, digital photographs, and agent notes are distributed on the group’s website (Improv Everywhere, 2012g).   It appears that You Tube is the primary distribution vehicle for Improv Everywhere content, although the group also has a Facebook page and Twitter account that are used to connect and update audiences (O’Neill, 2010).  In fact, Improv Everywhere has almost one million subscribers on You Tube, while only two-hundred and eighty thousand Facebook likes, and thirty thousand Twitter followers, demonstrating the importance of You Tube to the group success (Improv Everywhere, 2012c, 2012d, 2012e).  Founder, Charlie Todd acknowledged the importance of You Tube during an interview (O’Neill, 2010):

YouTube has been incredible for us– it’s enabled us to reach an international audience of millions.  YouTube has enabled us to communicate directly with our audience without the need of a television network.  If we had been doing these projects in the 1990s our only option for exposure would have been the greenlight from an executive at somewhere like MTV or Comedy Central.  (p. 1)

Indeed, without the availability of digital recording and production technology, or distribution channels like You Tube, it appears unlikely that Improv Everywhere would have become so popular.  In fact, their entire business model is predicated upon the use of social media.

Monetization

While there is no public data on the group’s finances, their revenue sources are apparent to a casual observer.  First, each audience click of the You Tube video triggers an advertisement, and You Tube shows additional advertisements while the video plays.  In fact, one of the commercials that aired frequently during the author’s analysis was a Trident commercial that mimicked Improv Everywhere, showing riders in subway car spontaneously bursting into song.  In addition, the group sells merchandise, books, and DVDs on their website (Improv Everywhere, 2012f), and solicits public appearances, event engagements, and corporate sponsorship for missions (Improv Everywhere, 2012b).  Furthermore, the group raised more than $125,000 to develop a documentary film scheduled to be released in June 2013 (Matt & Andrew, 2012).  On the surface, the group appears to operate as a marketing collective that benefits the top tier of performers, although it is unclear whether the producers share the proceeds with the agents.  Of course, the business model leads to an important ethical question related to the use or abuse of free labor.  To what extent is Improv Everywhere harnessing the free labor of others for private profit?  According to Croteau, Hoynes, and Milan (2012), business models dependent on the free labor of individuals “undermine the integrity of the individual by emphasizing a ‘hive’ mentality in which independent thought and achievement is neglected and undervalued in favor of the faceless—and easily replaceable—micro-contributions of many” (p. 314).  In truth, agents are easily replaceable with virtually anyone, as is the unsuspecting crowd that is the primary subject of the mission videos.  It is doubtful that Improv Everywhere shares profits with the agents, and nigh impossible for them to share profits with the subjects of the videos.

In short, Improv Everywhere is dependent upon media technology for the production, distribution, and monetizing of their work.  In addition, like most media concerns, the group generates revenue by selling their audience to advertisers, in addition to selling their media products directly to audiences.  Moreover, the group has a symbiotic relationship with the mainstream media, providing them with a spectacle in exchange for coverage that creates awareness for their content, which in turn creates revenues.  Of course, the ethics of Improv Everywhere’s business model are concerning, insofar as the producers of the content appear to accrue the majority of the benefit, even though the content requires the labor of the crowd.  However, in the use of the crowd, the group’s business model is little different from most modern media concerns.

Part IV: Critical Analysis

There is little question that Improv Everywhere’s missions have tremendous popular appeal.  The group created a media spectacle with more than 250 million views on You Tube, replicated around the world, and commercialized by traditional media outlets.  In addition, the group has enjoyed considerable commercial success with their media products, generating revenue from a variety of sources, including media products, merchandise, and advertising.  Of course, there is one critical question that remains unanswered; what are the intentions of the group?  Are the members of the group ideologues seeking to lift the veil of consumer ideology, using Situationist techniques, to help the public glimpse the possibility of a life beyond the false consciousness of consumerism?  Is the group simply using the tools of culture jammers to create commercial success?  Alternatively, should the public take the group at face value, assuming the group is intent on making the public happy by creating scenes of joy and chaos?

The first proposition argues that the group is operating in the tradition of Situationists, seeking to show the public a glimpse of the possibilities of a postmodern era not dominated by consumerism, where happiness is a function of play rather than consumption.  Certainly, the group appears to use Situationist techniques, but differs from Situationists and even other culture jammers like Adbusters, insofar as they have not made public any desire for social change.  In fact, the group largely disavows such notions, instead opting to emphasize play.  On the other hand, is there a possibility that the entire public view of the group is a meta-prank, designed to use their growing popularity to expose consumer ideology to the largest possible audience.  While there is no evidence to suggest this is the case, the idea is consistent with Situationist thought.  According to Harold (2007), the Situationists were ever concerned with the Spectacle’s sophisticated ability to appropriate the rhetoric of revolution and repackage it for consumers as image.  Indeed, Harold (2007) criticized détournement precisely because the use of consumerist conventions also confirms those same conventions.

Is this the reason that Improv Everywhere never includes a reveal moment in their missions, instead opting to let the audience wonder at the experience, in effect, continuing the prank indefinitely, and resisting the appropriation of its form?  Might the larger prank simply be the purposeful withholding of Situationist-like aims?  Alternatively, is Improv Everywhere’s use of Situationist techniques a demonstration of the worst fear of Situationist thought, that their rhetoric was appropriated for consumer ends?  In absence of a reveal moment, the public may never know.  However, this author believes that the commercial logic of Improv Everywhere’s business model is an alluring motive.

Of course, the domination of commercial logic in the public sphere makes economic motives perhaps the easiest to understand.  It is clear that Improv Everywhere is generating revenue, although the amount of revenue and its distribution are not clear.  Furthermore, irrespective of the amount of revenue generated, the business model socializes labor costs, while privatizing profits.  While companies the world over have similar business models, most do not have the dilemma of filming an unsuspecting public as they grapple with the fear and uncertainty of mob behavior.  Indeed, despite the joy created by Improv Everywhere’s missions, they each carry a darker side, insofar as their missions use the public’s emotions as the fodder that feeds their business model.  In addition to ethical concerns, equally, this author has moral concerns.  To what extent is it moral to appropriate détournement and dérive for purely commercial concerns given their origin?

If the public takes the group at face value, meaning commercial success is not the primary motive, rather the group chooses to create spectacles of chaos and joy for the public good, moral, and ethical questions remain, because the pranks have been commercialized.  Therefore, irrespective of the group’s motives, the simple fact remains that their pranks have been co-opted by commercial logic.  As such, the group has become a paragon of the very consumerist ideology criticized in their missions.

However, when all arguments are considered, and the group is viewed in equal parts as cultural critics, merry pranksters, and a commercial success, perhaps that is enough.  Perhaps it is enough to critique the system from within the system, while allowing commercial success to fund the ongoing critique.  Perhaps, when viewed through the lens of an ongoing contrast between the Spectacle and the joy of dérive, the movement remains a viable alternative to consumerism in the public’s consciousness, avoiding the fate of earlier revolutions, simply by remaining present as an oppositional force.

Conclusion

            Retracing the journey presented in this paper, the author has detailed how Improv Everywhere has captured the public eye with pranks that are a relevant counterforce to consumerism.  Indeed, using Situationist techniques, Improv Everywhere helps the public find joy and happiness outside of the twin occupation of work and leisure.  In addition, without digital media technology, and the socioeconomic structures of the media industry, it is highly unlikely that Improv Everywhere would have the reach and durability they enjoy today.  Despite being co-opted by commercial logic, Improv Everywhere remains an important social phenomenon, offering an opposing voice in contrast to the allure of consumerism.

References

Croteau, D., Hoynes, W., & Milan, S. (2012). Media/society : Industries, images, and audiences (4th ed.). Thousand Oaks, CA: SAGE.

Debord, G. (1994). The society of the spectacle. New York: Zone Books.

Dery, M. (1990). The Merry Pranksters And the Art of the Hoax. Arts. Retrieved from http://www.nytimes.com/1990/12/23/arts/the-merry-pranksters-and-the-art-of-the-hoax.html

Dery, M. (2010). Culture Jamming:  Hacking, Slashing, and Sniping in the Empire of Signs.  Retrieved from http://markdery.com/?page_id=154

Goldstein, L. (2003). The mob rules. Time, 176.

Harold, C. (2004). Pranking Rhetoric: “Culture Jamming” as Media Activism. Critical Studies in Media Communication, 21(3), 189-211.

Harold, C. (2007). OurSpace : resisting the corporate control of culture. Minneapolis: University of Minnesota Press.

Improv Everywhere. (2012a). Best Buy | Improve Everywhere. Retrieved from http://improveverywhere.com/2006/04/23/best-buy/

Improv Everywhere. (2012b). FAQ | Improve Everywhere. Retrieved from http://improveverywhere.com/faq/

Improv Everywhere. (2012c). Improv Everywhere. Retrieved from http://www.facebook.com/improv.everywhere

Improv Everywhere. (2012d). Improv Everywhere (ImprovEvery) on Twitter. Retrieved from https://twitter.com/ImprovEvery

Improv Everywhere. (2012e). Improv Everywhere | You Tube. Retrieved from http://www.youtube.com/user/ImprovEverywhere?feature=g-all-u

Improv Everywhere. (2012f). Merch | Improve Everywhere. Retrieved from http://improveverywhere.com/merch/

Improv Everywhere. (2012g). Missions | Improve Everywhere. Retrieved from http://improveverywhere.com/missions/

Juno, A., Vale, V., & Ballard, J. G. (1987). Pranks! San Francisco, CA: Re/Search Publications.

Lasn, K. (2000). Culture jam: The uncooling of America. New York: Quill.

Matt & Andrew. (2012). Improv Everywhere Film. Retrieved from http://www.kickstarter.com/projects/improveverywherefilm/improv-everywhere-film?ref=live

McQuail, D. (2010). Mcquail’s mass communication theory (6th ed.). London; Thousand Oaks, CA: Sage Publications.

O’Neill, M. (2010). Interview: Prankster Charlie Todd on YouTube & The Success Of Improv Everywhere. Retrieved from http://socialtimes.com/interview-prankster-charlie-todd-on-youtube-the-success-of-improv-everywhere_b18037

Plummer, W. (2011). Charlie Todd of Improv Everywhere Tells Us About His Latest Experiment, Favorite Pranks, and Future Plans.  Retrieved from http://blogs.villagevoice.com/runninscared/2011/07/charlie_todd_improv_everywhere.php

Rock, R. (2012). Improv Everywhere Analysis. Retrieved https://docs.google.com/open?id=0B5nQSd5ycZwGOTFzQWpmVm9KLUE

Rodriguez, A. (2010). Performing in the public sphere: Flash mobs and their participants. University of North Texas, Denton Texas. Retrieved from http://web3.unt.edu/honors/eaglefeather/wp-content/2010/08/Rodriguez-Atilano-081210-SE.pdf

TedxBloomington (Producer). (2011). Charlie Todd: The shared experience of absurdity. Retrieved from http://www.ted.com/talks/charlie_todd_the_shared_experience_of_absurdity.html

Wiktionary. (2012). détournement – Wiktionary. Retrieved from http://en.wiktionary.org/wiki/d%C3%A9tournement

 

 

 

 

Figure 2.

The evolution of Improve Everywhere between 2001 and 2012.

Timeline

 

 

 

 

 

 

 

 

Figure 2.  This figure charts the substantive events that characterize the evolution of Improv Everywhere between 2001 and 2012, including changes in approach, notable pranks, media coverage, and commercialization.


Facebook and the Value of Free Data


The information technology market is undergoing a major shift towards cloud computing.  While cloud computing only represents 2.8% of the $3.6 trillion information technology market today, analysts expect it to more than double over the next two years (Cantu, 2011).   Moreover, the economics of the cloud are so compelling this author thinks that all compute services will be delivered via the cloud in the decades to come.  Given the clear shift to the cloud, it is worthwhile to explore what cloud computing is, how it works, and potential implications of the cloud for Internet consumers and producers of content.  However, an overarching analysis of the cloud is overly ambitious given the size and scope of the market, therefore, this author will analyze the cloud using the narrow confines of a case study on Facebook, the largest social Internet application in the world.  Therefore, this author compared Facebook to the cloud market in general, and specifically explored the implications of content usage, labor, and privacy in a cloud application, like Facebook.   This author found that Facebook has remarkably similar issues with cloud vendors, and profits from user-generated data while providing only limited privacy protections, in exchange for the use value of the application.

What is Cloud Computing?

            Cloud computing is the result of advances in information technology over the last forty years, and specifically is the result of the Internet architecture.  Whereas, in the era before the network, computing power was largely in the hands of government and large corporations, the coincident revolutions of personal computers and private networks, led to a client server architecture, where application processing occurred on a client computer, and data was stored on a network server.  With the development of the Internet, a global computing network, came the possibility of a new architecture, where every layer of the architecture is centralized, including the application logic, and the network end-points are simply dumb terminals in essence.  While this description is necessarily an oversimplification, it is generally correct.

            As the Internet architecture has matured, increasingly corporations are seeking ways to improve efficiency and reduce the costs of doing business over the network.  Indeed, cost and efficiency gains have led to the advancements necessary to make cloud computing possible.  Important advancements in the shift to cloud computing include autonomic computing, service-oriented architecture, web services, virtualization, and grid computing (Cantu, 2011).  These technologies allow technology professionals to deliver each compute layer as a service, including storage, database, middleware, and applications.  Moreover, as the cloud market has matured, so has the definition.  The National Institute of Standards and Technology (2011) recently released the final draft of the cloud computing definition, conceived of as:

A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. (p. 1)

In the strictest sense, an application like Facebook cannot be conceived of as cloud computing, because the application is not provisioned for different entities, rather it is simply an application that is available for end users.  While admittedly, the distinction is minor, it remains important.  However, Facebook is similar enough to a cloud application to warrant further analysis.  Specifically, the application logic, the infrastructure, user credentials, user information, user-generated content, and user relationship data are centralized behind Facebook’s corporate firewall.  This architecture gives rise to a number of important questions for both cloud applications and Internet applications.  For instance, what are the implications for user generated content?  Whose data is it?  Who profits from the data?  Who is both responsible and liable for data protection and privacy?  It is these questions that this author will attempt to address in the rest of the paper.

Whose Data Is It?

            When a user registers for a Facebook account, the user is required to load their name, email address, birthday, and gender (Facebook, 2012a).  No other information is required.  However, the application is of limited value without providing additional data.  Typically, users will add personally identifiable information, relationship data, preference data, status updates, location data, photos, and videos to make the application valuable.  Legally, each user is the owner of their data in the application, however the matter is complicated by the social nature of the application (Facebook, 2012b).  For example, if one user posts a photo of another user, the data is owned by the user that posted the photo, an important implication for those concerned about privacy (Facebook, 2012a).   Moreover, through the terms of agreement between Facebook and a user, users assign Facebook a “non-exclusive, transferable, sub-licensable, royalty-free, worldwide license to use any IP content [posted] on or in connection with Facebook” (Facebook, 2012b, p. 1).  Therefore, while users own the data, Facebook has the right to profit from it.

Of course, the problem with storing user data in Facebook is that like most cloud applications, the application is analogous to a roach motel, it is easy to check data in, but much tougher to check it out.  While Facebook provides a number of application programming interfaces to retrieve data (Facebook, 2012c), it requires technical expertise to access the data through anything but the native Facebook application interface.  Therefore, outside the confines of Facebook, the data is of limited use.  Moreover, the limitations of the application interface make it difficult for non-technical users to substantially transform the data to produce new works. In effect, the structure serves to constrain people from profiting from their data.

Who Profits from User Data on Facebook?

            As made clear in the previous section, while users own their data, Facebook has both the right and the architecture to assure that they are in a position to profit from user data.  In fact, the data only has value when considered in the aggregate.  For example, few would care to pay this author for knowing of a recent ski vacation.  However, a skiing manufacturer might pay a considerable sum to target active adult skiers across the country with targeted advertising for a new line of high performance skis.  Thus, Facebook profits from the free labor of 800 million users.  Indeed, with Facebook’s recent initial public offering, their finances came under intense scrutiny from the investment community.  In 2011, Facebook generated more than $3.7 billion in revenue, 82% of which came from advertising (Boorstin, 2012).  With more than 500 million monthly active users, and 125 billion friend connections, Facebook provides advertisers a platform with reach, relevance, and most importantly, a social context for product recommendations (Boorstin, 2012).  For example, if this author creates a post highlighting the purchase of a set of high-performance skis, the ski manufacturer might send targeted advertising to other skiers in the author’s network.

Croteau, Hoynes, and Milan (2012) point out that firms like Facebook “harvest and harness the free labor of others to generate profits for themselves” (p. 314).  However, that perspective includes only one side of the transaction.  Facebook simply enables a transaction to occur, where users providing content receive a use value, while Facebook creates exchange value from the commodification of users.  In this sense, Facebook is simply following the business model of traditional mass media who provided television content for consumers, in exchange for commodification of consumers into an audience to bring in advertising revenue; new media indeed.  Therefore, in the case of Facebook, is there really exploitation of free labor?  Or are Facebook users receiving value from the use of the application?  This author thinks it is the latter.  In what other way can people stay connected and share their lives with friends and family as efficiently as on Facebook?  Therein lies Facebook’s use value for users.  While the exchange relationship between Facebook users, the company, and advertisers captures the essence of the business model, the business model itself raises significant concerns over the security and privacy of the data that fuels Facebook’s revenue.

Debates over data security and privacy have raged over the last two decades as society has attempted to come to terms with the implications of the growing amount of data.  Facebook in particular, has come under intense public scrutiny for a series of data privacy policy changes over the last six years that erode data privacy for users (Electronic Privacy Information Center, 2012).  Moreover, Facebook recently stands accused of matching Facebook data with data from Datalogix to improve ad targeting, in potential violation of a recent privacy settlement with the FTC (Electronic Privacy Information Center, 2012).  In fact, Facebook no longer has a privacy policy, rather they express their point of view in a data use policy (Facebook, 2012a).  While Facebook has taken steps to improve data security by adopting HTTPS as an optional user setting, the company increasingly is altering their data use policy to introduce new capabilities that grow revenue at the expense of user privacy (Electronic Privacy Information Center, 2012).  In short, until users decide that costs, in the form of privacy loss, outweigh the use value, it is unlikely Facebook will change their data use policy in a way that favors improved privacy protection.


 

Conclusion

            Technology companies like Facebook have an amazing business model.  The company has figured out how to generate immense revenues from the data that people provide about themselves, their friends, and their family, in exchange for a more efficient way to keep in touch.  By locking the user data into the Facebook application, Facebook assures that the data is only useful to Facebook.  Moreover, given the legal terms associated with use of the application, users readily grant Facebook the license to profit from the invasion of their privacy.  Future research should explore whether the development of open standards for social relationship data portability could spur the company to provide greater privacy protection based on the threat of customer churn, in much the same way that cell phone number portability enabled greater choice and competition in the wireless industry.

References

Boorstin, J. (2012). Inside Facebook’s money machine. Techbiz.  Retrieved from http://money.msn.com/technology-investment/post.aspx?post=869a1b6c-0bb7-47b3-ac0a-25d10f6a5404

Cantu, A. (2011). The History and Future of Cloud Computing. Retrieved from http://www.forbes.com/sites/dell/2011/12/20/the-history-and-future-of-cloud-computing/2/

Croteau, D., Hoynes, W., & Milan, S. (2012). Media/society : Industries, images, and audiences (4th ed.). Thousand Oaks, CA: SAGE.

Electronic Privacy Information Center. (2012). Facebook Privacy. Retreived from http://epic.org/privacy/facebook/

Facebook. (2012a). Data Use Policy. Retrieved from http://www.facebook.com/about/privacy/your-info

Facebook. (2012b). Facebook Terms. Retrieved from http://www.facebook.com/legal/terms

Facebook. (2012c). Graph API – Facebook Developers. Retrieved from http://developers.facebook.com/docs/reference/api/

National Institute of Standards and Technology. (2011). Final Version of NIST Cloud Computing Definition Published. Retrieved from http://www.nist.gov/itl/csd/cloud-102511.cfm


Why This Republican Voted For Obama (Again)


Following Obama’s re-election, it is clear that the GOP is doing some soul-searching, trying to figure out what went wrong.  There are several dominant narratives in the mainstream press, including a) Republicans failed to recognize the changing ethnic makeup of the country, b) Governor Romney was out of touch with the working class, or c) President Obama’s campaign had a better ground game, doing a better job of mobilizing Democratic voters.  It appears likely that all three narratives played some part in the election results.

Indeed, this long-time Republican voted for Obama again, continuing a trend that started with a vote for Vice-President Gore.  If you believe the political rhetoric coming from disappointed conservatives on Twitter or Facebook, my vote, along with the votes of more than 61 million other Americans, is going to result into a descent into economic depression, communism, or civil war.  Of course, I didn’t vote for economic failure, communism, civil war, or any other such thing.  Rather, I voted for the Democratic candidate for a variety of reasons I felt were important for America.

  1. The Economy
  2. Tax Policy
  3. Freedom and Liberty
  4. The Environment
  5. Foreign Policy
  6. Character and Leadership

The Economy and Jobs

Of course, the economy dominated the election discourse.  The key differences between the candidates centered on the size of government debt.  Romney appeared to favor decreasing government deficit spending, arguing that economic growth in the private sector is the result of decreased regulation.  In addition, in an either-or argument, Romney suggested that the private sector created jobs rather than government.  On the other hand, President Obama favored deficit spending to spur the economy and create jobs.  As a voter, I rejected the either-or proposition as an overly simplistic argument.  Indeed, I was offended that both parties underestimated the intelligence of the American people.  Of course, the budget deficit and the size of U.S. debt needs to be reduced, because too much government debt crowds out private investment.  However, it is largely a question of timing.  As a proponent of Keynesian economics, I understand how short-run government spending can stabilize the amplitude of economic cycles.  The $700B stimulus package was the right thing to do for the economy.  To argue that the deficit we now must reconcile with was somehow the fault of President Obama when it was the only way to prevent the economy from going into depression is not only divisive, it is stupid.  Had Governor Romney been in a similar position, he would have had to use the same tools of fiscal and monetary policy to prevent the collapse of our economic system.  Moving backwards at this stage in the game is simply an ill-conceived idea.  Moreover, it suggested to this voter that Governor Romney either a) didn’t understand the economy, or b) was simply pandering to the views of the Republican base, knowing his policy response would have had to be the same in a similar situation.

Tax Policy

As noted earlier, government debt crowds out private investment.  We simply must reduce our deficits while growing the economy.  There are two ways to reduce our debt, increase revenue and cut spend.  President Obama focused on raising revenue through higher taxes.  Governor Romney favored cutting taxes and reducing spend on entitlements.  In an ideal scenario, the government will do both, finding opportunities to raise tax revenue and cut spending.  Again, the candidate’s positions forced an either-or mentality when the answer is likely both.  For my part, I believe that U.S. tax policy harms the economy by overwhelmingly favoring those with wealth over income-earners.

Indeed, according to the U.S. Census Bureau, household median income in 2011 is roughly $50K annually, the same as it was in 1989 when adjusted for inflation.  Of course, in the same period, the U.S. GDP has grown 60%, from $7.8 trillion to more than $13 trillion in constant dollars.  So where did the money go?  The money overwhelming is going to those with wealth.  In 1989, the bottom 60% of households shared roughly 30% of U.S. income, whereas the top 40% shared 70%.  Today, the ratio is 25% for the bottom 60% and 75% for the top 40%.  Moreover, the top 5%’s share increased from 18% to 22%.  It is clear that our tax policy favors wealth.

Of course, we don’t need economic analysis to tell us what is happening.  We are all feeling the pinch as energy, healthcare, and education costs rise, while median income remains the same.  The question is what to do about it.  There are two schools of thought coming from our political parties.  The Republican plan is to lower tax rates on wealth and businesses, while the Democratic plan is to raise taxes on wealth and businesses.  Concurrently, the Republicans favor cutting government spending, while the Democrats favor continued spending to spur the economy.  This leaves voters with an imperfect choice.  It comes down to this: do we believe in trickle-down economics, where greater wealth results in greater investment, or income equality, where greater income for the middle-class results in higher consumption and the resulting investment from those with wealth?

For my own part, I believe that more income in the hands of the middle class will increase consumption and thus grow the economy.  Let’s face it, our economy is geared towards consumption.  Our mortgage interest deduction favors the purchase of houses.  We use tax credits to spur consumption for everything from energy efficient appliances to new cars.  Indeed, just how many cars will a billionaire buy compared to healthy middle class?  If you’re Jay Leno, perhaps you’ll buy a hundred or so, but otherwise, it is unlikely you will buy much more than you need, whereas the same amount of money in the hands of the middle class would create far more demand. I should note that I do not believe in the redistribution of wealth.  However, that is exactly what is happening when a tax policy favors wealth.  It assures that income earners have difficulty accumulating wealth, while those who make their money from wealth grow wealthier.  Rather, our tax policy should reverse the current trend to create a more level playing field between the wealthy and income-earners.

Freedom and Liberty

I have to be honest.  The Republican agenda against gay marriage is a problem for me.  The Declaration of Independence is quite clear, “We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness”.  How then, should we legislate less than equal rights to some of our population, simply because they are different?  Moreover, how much has the party of President Lincoln changed, that they have departed from the basics of our democracy?  The Republicans are simply on the wrong side of history in the argument against gay marriage.

Furthermore, the argument against gay marriage appears to be a moral argument with origins in Christian thought and influence.  Because of the 1st amendment to the Constitution, which protects the rights of the people by preventing Congress from abridging freedom of religious worship, equally so, it prevents Congress of forcing the values of any one religion on the people.  Indeed, as Jefferson wrote, “I contemplate with sovereign reverence that act of the whole American people which declared that their legislature should ‘make no law respecting an establishment of religion, or prohibiting the free exercise thereof”, thus building a wall of separation between Church & State”.  As such, freedom of religion is also freedom from religion.  Accordingly, and consistent with our founders, the idea that Christians should implement their moral agenda on the free people of these United States is abhorrent to me, despite my personal faith.

The Environment

While climate change was not a topic during the Presidential debates, the candidate’s policy positions were relatively clear.  Governor Romney had no policy position on climate change, while President Obama favors investment in clean energy.  Indeed, the general position of Republicans on climate change seems to be evolving from denial, to an argument questioning the relationship between cause and effect.  Is climate change happening?  There is no longer any question, it is simply physics.  Carbon dioxide stores the sun’s energy radiated from the earth’s surface.  Burning fossil fuels increases the amount of carbon dioxide in the atmosphere.  More carbon dioxide in the atmosphere increases the amount of heat stored in the atmosphere.  More heat in the atmosphere increases the melting of the ice caps and glaciers, decreasing the amount of the sun’s energy reflected out to space.  Ipso facto, burning fossil fuels increases the temperature of the atmosphere causing changes to our climate.  How long can we continue to ignore this issue?

Moreover, as Hurricane Sandy showed, the economic impact of climate change is staggering.  Should we continue to protect the energy and automotive industry given such high social costs?  Or should we invest to spur innovation and reverse the current warming trend?  Like President Obama, I believe we have to innovate now.  Of course, there will be failures.  Failure is a part of innovation.  However, the risks of doing nothing far outweigh the risks of doing something.

Foreign Policy

After entitlement spending, the defense budget is the largest line item in the federal budget.  We need to have a strong defense, but when it comes to killing people, it should be defensive, not offensive.  I do not believe President Obama will get us into a frivolous war, like Iraq.  Moreover, Bin Laden is dead and you cannot fight a war against a concept like terrorism.  You can destroy terrorist organizations.  However, that does not require spending more than $1 trillion dollars.  Intelligence, international cooperation, police action, and limited military action are far more efficient means to prevent terrorism and destroy the capabilities of terrorist organizations, than is war.

Character and Leadership

Leader’s share their vision and inspire people to achieve great things.  While some can argue President Obama’s leadership, the President was remarkably consistent in his beliefs and policy positions.  I struggled with Governor Romney’s character.  He appeared to change his policy positions quite often, particularly between the Republican primaries and the Presidential debates.  The Governor initially pandered to the extreme elements in the Republican party in order to get nominated and then attempted to appear as a centrist to be more electable.  If he so willingly abandoned his positions, how do you know what he stands for?  Was Governor Romney a conservative extremist or simply an opportunist?  Moreover, what would happen when he got into office?  I simply had a very difficult time understanding how our country would be governed under Governor Romney.  In addition, President Obama, with all of his faults, appears to behave as an honest man.  Character mattered to me.

After reading this, some might argue that I am not a Republican.  However, I would argue that I am a Republican, but my party left me behind long ago.  By pandering to social conservatives and growing government during the Bush years, the Republicans left a sizable number of fiscal conservatives, like me, behind.  I remain committed to the power of free markets (with some caveats), strong defense, and freedom for all of us.  However, the party has changed.  The free market philosophy appears to be irrevocably attached to policies that deride smart regulation, and favor income inequality and special interests.  Moreover, strong defense has become strong offense.  Finally, liberty and freedom for all have reverted to liberty and freedom only for those that look and act the same as the majority.  When the Republican party comes back, I’ll still be here.  Perhaps I can even vote for one again.

 

 


Emotional intelligence: Value and limitations in leadership communication


Presentation on the use of Emotional Intelligence instruments for leadership development.

ORG423 Week 7 Critical Thinking Richard Rock


Preventing Network Discrimination


In the last decade, and coincident with the advent of broadband Internet technology, Internet regulation has been the subject of intense public debate over network neutrality, a legislative concept designed to provide Internet consumer/producers the right to open and non-discriminatory access to the network.  At the heart of the debate is the determination of whether the Internet constitutes a commons, and if so, whether the commons needs to be regulated to protect equal and anti-discriminatory access in what is now, a largely privatized network.  Of course, the Internet is not the first privatized network that engendered the commons debate.  Arguably, while the Internet is a unique infrastructure in many respects, it also has significant similarities to earlier networks, such as roads, railroads, the telegraph, telephone networks, radio networks, and television networks (Blondheim, 2004).  Indeed, many of these networks created positive network externalities that constituted public goods, and as such were considered commons subjected to common carriage law, a form of regulating the network infrastructure to protect the public good.  Therefore, examining the Internet network neutrality debate through the lens of common carriage, while not new, is useful insofar as it centers the discussion on the firm foundation of historical precedent, and captures the essence of what is at stake.  As such, this paper will cover a brief historical background of common carriage, describe the application of common carriage principles in the early Internet, compare and contrast proposed network neutrality legislation with common carriage principles, and conclude with a considered recommendation advocating for network neutrality legislation.

Common Carriage Background

            Common carriage is a legal principle that intends “to guarantee that no customer seeking service upon reasonable demand, willing and able to pay the established price, however set, would be denied lawful use of the service or would otherwise be discriminated against (Noam, 1994, p. 436).  The origins of common carriage law predate English law and whose precursors “go back to the Roman Empire and the legal obligations of shipowners, innkeepers and stable keepers” (Noam, 1994, p. 437).  English common law supports the notion of common carriage, beginning with the 1701 case, Lane versus Cotton, in which Justice Holt asserted “that one in the public employment can not refuse the duty incumbent upon him and that there would thus be causes of action for a postmaster refusing a letter, inn keeper refusing a guest or blacksmith refusing to shoe a horse” (Moglen, 2009, p. 1).  As such, common carriage’s core principal is that of anti-discrimination.

Common carriage was applied in the United States initially as common law, most notably to regulate the activity of the railroads, in absence of specific congressional legislation governing interstate commerce (“Western Union Telegraph Co. v. Call Pub. Co.,” 1901).  In addition, common carriage was applied to the first U.S. telecommunications infrastructure, the telegraph network, as a result of discriminatory behavior by Western Union (“Western Union Telegraph Co. v. Call Pub. Co.,” 1901).  Western Union’s discriminatory practices extended far beyond choosing winners and losers in the open market; the company went so far as to practice censorship by choosing political sides and only offering the perspectives of candidates whose policies favored Western Union (Rock, 2012; Wu, 2006a).  As a result of this and other corporate abuses of monopoly power over the telecommunications network, common carriage over telecommunications was codified into law with Title II of the 1934 Communications Act (Noam, 1994).  Since then, regulated telephone companies have been generally referred to as ‘common carriers’ and as such, have the obligation to provide non-discriminatory access to telephone service across the nation, and in exchange are not held liable for the content of traffic across the network.

The Internet and Common Carriage

            To say that the Internet was created as a result of the common carriage principle of non-discrimination is not an overstatement.  There was a time, prior to the 1980s, when consumers had to purchase their telephones from a Bell company and were not allowed to attach any other device to their phone line (Wu, 2006b).  However, a series of court decisions, including the Hush-A-Phone and Carterfone decisions, led to the FCC to enact “a strong non-discrimination rule for consumer network equipment, and even blocked the regional Bell operating companies from offering such equipment” (Wu, 2006b, p. 33).  The rule sparked a new wave of commercial innovations that saw the development of fax machines and modems, antecedents of modern networking.

Moreover, principles of non-discrimination were built into the very architecture of the Internet.  According to Lessig and Lemley (2001), the design of both the Internet and it’s predecessor ARPANET were based on the end-to-end design principle which organizes the placement of intelligence at the ends, while making the communications protocols simple. “One consequence of this design is a principle of non-discrimination among applications” (Lessig & Lemley, 2001, p. 927).  In essence, the network is a highly sophisticated set of dumb pipes, in the sense that any network or device can interconnect to the Internet by following the basic communication protocols.  Of course, the last thing that cable and DSL providers want to be are ‘dumb pipes’ and therefore, many use a variety of strategies, including discrimination, to avoid becoming a commodity (Knowledge@Wharton, 2009).  Indeed, there is little to prevent broadband providers from using their monopoly power over the network to introduce discriminatory behaviors that favor their commercial interests.

The Internet and Net Neutrality

            The advent of the Internet has ushered in new era of debate over non-discrimination on the network, partly because with the Telecommunications Act of 1996, the FCC designated cable and DSL as ‘information services’, rather than telecommunications (United States. Congress., 1996), and as such, they are not designated as common carriers.  Moreover, freed from constraint, telecommunications providers have used their network power to discriminate against perceived threats.  For example, Telus Corporation blocked subscriber access to a Union website critical of their labor practices (CBC News, 2005).  In addition, Madison River Communications, a DSL provider, blocked subscriber access to Vonage, a company with voice-over-IP technology that allows subscribers to place calls over the Internet, rather than paying for traditional phone service (Sandvig, 2007).  Finally, Comcast Corporation intentionally blocked subscriber access to Bit Torrent, a popular peer-to-peer file sharing protocol (Weiser, 2009).  Nor is the discrimination likely to end any time soon.

For example, former AT&T Chairman and CEO Whitacre (BusinessWeek, 2005) described the motivation for AT&T to discriminate against Internet upstarts like Google, Vonage, and MSN, noting:

Now what they would like to do is use my pipes free, but I ain’t going to let them do that because we have spent this capital and we have to have a return on it. So there’s going to have to be some mechanism for these people who use these pipes to pay for the portion they’re using. Why should they be allowed to use my pipes? (p. 1)

It is not surprising, that when freed from the constraint of common carrier classification, broadband providers use discriminatory practices to create and sustain competitive advantage; it is in their nature to do so.

However, the Federal Communications Commission (2010) recently passed a set of Open Internet rules to address broadband discriminatory practices.  The Open Internet rules force broadband providers to be transparent about their network management practices, prevent the blocking of legal content, applications, services, or devices, and prevent unreasonable network discrimination (Federal Communications Commission, 2010).  While the rules appear to provide a basis for the FCC to deal with discriminatory practices, there are several problems worth exploring.

First, the FCC treats fixed broadband and wireless broadband differently, providing far more leeway for cellular providers to discriminate, particularly against competing services.  Second, there remains considerable question as to whether the FCC has the legal authority to enforce such rules, particularly given the FCC’s original classification of broadband as an ‘information service’.  In fact, the DC Court of Appeals, ruling on the Comcast and BitTorrent FCC decision, recently “struck down a federal rule that required broadband providers to keep their networks open” (Puzzanghera & Guynn, 2010, p. 1).  Furthermore, Senate Republicans recently attempted to put a bill on the floor to overturn the FCC’s Open Internet rules, however the bill was narrowly rejected (Puzzanghera, 2011).   It appears likely that the FCC Open Internet rules will continue to be challenged in the legislature and the judiciary until the Internet is treated legally as a commons.

Of course, the critical issue with the Open Internet rules is the lack of legal recognition of the Internet as a commons.  Instead, the emphasis is on the Internet is as an important commercial platform for innovation and growth that must be protected with administrative rules rather than law.  While the Open Internet rules are an important step in anti-discrimination, they fall short of common carriage law insofar as they fail to treat the Internet as a legal commons that produces a public good.  Moreover, the Open Internet rules are not a legislative solution and remain dependent on the support of the FCC.  This author suggests that the anti-discrimination principles inherent in network neutrality proposals come largely from the common carriage principles of earlier legislation.  Moreover, the current Open Internet rules contain important anti-discrimination principles, but lack the force of law.  This author recognizes that despite the progress inherent in the FCC rules, net neutrality legislation is required to assure a lasting solution that recognizes the importance of the Internet to public good.

Conclusion

            From the telegraph to the Internet, each new communication technology creates a similar debate.  To what degree does the network constitute a public good and require regulation as a commons?  In the past, common carriage laws have been used to assure that corporations are unable to use their network ownership to discriminate.  However, the recent net neutrality rules enacted by the FCC, while providing an administrative basis to prevent the worst forms of discrimination, falls far short of common carriage legislation of the past, and continues to be challenged by lawmakers and the judiciary.  Therefore, this author suggests that the fight against network discrimination has only just begun, until such a time where anti-discrimination law for the Internet is a reality.

 

 

 

References

Blondheim, M. (2004). Rehearsal for media regulation: Congress versus the telegraph-news monopoly, 1866-1900. Federal Communications Law Journal, 56(2), 300-328.

BusinessWeek, B. (2005). Online Extra: At SBC, It’s All About “Scale and Scope”, from http://www.businessweek.com/stories/2005-11-06/online-extra-at-sbc-its-all-about-scale-and-scope

CBC News. (2005, July 24). Telus cuts subscriber access to pro-union website, from http://www.cbc.ca/news/canada/story/2005/07/24/telus-sites050724.html

Federal Communications Commission. (2010). Report and Order: In the Matter of Preserving the Open Internet Broadband Indusrty Practices.  Washington, DC: FCC, Retrieved from http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-10-201A1_Rcd.pdf.

Knowledge@Wharton. (2009, December 9). Comcast-NBC Universal: Will the Marriage of Cable and Content Work?  , from http://knowledge.wharton.upenn.edu/article.cfm?articleid=2401

Lessig, L., & Lemley, M. (2001). The end of end-to-end: Preserving the architecture of the Internet in the broadband era. UCLA Law Review, 48, 925-987.

Moglen, E. (2009, February 2). Lane v. Cotton, from http://moglen.law.columbia.edu/twiki/bin/view/EngLegalHist/LanevCotton

Noam, E. M. (1994). Beyond liberalization II: The impending doom of common carriage. Telecommunications Policy, 18(6), 435-452.

Puzzanghera, J. (2011). Senate rejects attempt to overturn FCC’s net neutrality, from http://latimesblogs.latimes.com/technology/2011/11/senate-net-neutrality-vote-.html

Puzzanghera, J., & Guynn, J. (2010). Appeals court overturns FCC rule on net neutrality, from http://articles.latimes.com/2010/apr/07/business/la-fi-fcc-comcast7-2010apr07

Rock, R. (2012). What Hath God Wrought: Commonality Between the Telegraph and the Internet [1-6]. Essay Retrieved from https://journey24pointoh.com/2012/09/05/what-hath-god-wrought-commonality-between-the-telegraph-and-the-internet/

Sandvig, C. (2007). Network neutrality is the new common carriage. info, 9(2/3), 136-147.

United States. Congress. (1996). Telecommunications Act of 1996. (0160534887). Washington DC: U.S. G.P.O. : For sale by the U.S. G.P.O., Supt. of Docs., Congressional Sales Office Retrieved from http://transition.fcc.gov/Reports/tcom1996.pdf.

Weiser, P. J. (2009). The future of Internet regulation. University of California, Davis Law Review, 43, 529-590.

Western Union Telegraph Co. v. Call Pub. Co., No. 181 U.S. 92  (U.S. Supreme Court 1901).

Network neutrality: Competition, innovation, and nondiscriminatory access, United States Congress 1-7 (2006a).

Wu, T. (2006b). Why have telecommunications law? Anti-discrimination norms in communications. Journal on Telecom and High Tech, 5(7), 15-46.