Radio and TV Broadcast commentary Archive

The generation gap has its own digital divide

Article

Old lady making a video call at the dinner table press picture courtesy of NBNCo

Making the idea of new technologies familiar to the older generation needs to be done at a pace they are comfortable with.

Smartphones creating generational and income divide | ABC News

Broadcast

“Living On The Wrong Side Of The ‘Digital Divide’” – ABC Radio AM (Monday 18 November 2019 8:00am)
MP3 audio file

My Comments

The recent ABC Australia Talks National Survey looked at a wide range of issues including climate change and social respect. But one of the issues that is relevant to this Website is the issue of the digital divide.

This highlights how pervasive personal computing including use of online services and mobile computing devices like smartphones is amongst certain parts of the community. It also includes the issue of missing out on essential services due to not being able to or comfortable about using them the online way.

As it is often discovered, the digital divide potently affects the older generations but also affects people based on income due to access to the necessary technology. What has never been called out was whether the kind of work people do during their working life had affected their risk of falling victim to the digital divide.

The ubiquity of new technologies through one’s productive life

Dell XPS 13 2-in-1 Ultrabook at Rydges Melbourne

It has taken a significant amount of time through the 1980s to the 2000s for the computer to be a mainstream tool in one’s productive life

A key factor that I have noticed is how much of one’s school or working life was spent using the technology and how quickly one adapted to newer technologies as they came in to being through their productive life. This is underscored through the evolution of personal computing technology including networked and online computing that took place through the 1980s to the 2000s. As well, the 2000s and 2010s brought about the idea of mobile personal computing thanks to smartphones and tablet computers used both personally and in the workplace.

The workplace

It became more potent in the workplace through the 1990s as computing power moved to the desktop in an affordable form and this brought about the change from the manual office that is based around typewriters, ledger books and card files to the highly-computerised office based around on-site desktop and server computers which handled word-processing, record-keeping and accounting tasks using computer software.

After the Australia Talks show, I had a follow-up conversation with an older man who worked in an office that was facing this transition revealed that his workplace’s accountant took a long time to adapt his accountancy skills to the highly-computerised office. Here, it was about being able to use the computer software to maintain an electronic equivalent of the ledger books.

Let’s not forget that a significant amount of blue-collar or public-facing work didn’t involve the use of computer technology. In some workplaces, specially-employed staff would collect or provide data to the blue-collar or public-facing workers as they needed it. If the worker ran their own business, they would be performing most of the record-keeping for their business the manual way.

The school

The same situation can be underscored through one’s school life before the 1990s where personal computing tended to play second fiddle. This would be about practices like a separate computer-studies lesson that would be taught in a computer lab equipped with personal computers. Other subjects typically required students to present their work in a handwritten form while teachers engaged in “talk and chalk” presentation techniques for most of their classes.

As well, investment in computer education tended to depend upon the whims of the powers that be that oversee the school, whether they be the school board or the government-based or church-based education authority that the school was accountable to. In some cases, it required private enterprise to “chip in” to provide the necessary capital for this kind of study.

After the 1990s, most schools encouraged the use of office software like word-processors, spreadsheets and presentation software as a teaching tool. This is along with the idea of seeing the computer as a tool to facilitate integrated learning and online research.

Being able to adapt to newer technologies

Let’s not forget that different people adapt to the newer technologies at a different pace. It includes whether they will deploy and encourage the use of that new technology to an area that they have oversight of and with what level of enthusiasm. This may be driven by factors including confidence, financial abilities or whether there is much support for that technology.

Some of use may be more keen in implementing newer technologies in our personal and productive lives, such as being “early adopters” of newer technology. Here, they will typically be interested in what new technologies come their way such as through reading journals, magazines and other material on that subject. This is typically said of younger people who tend to adapt very easily to newer social and other trends.

Similarly, some users have demonstrably wanted to adapt to the newer technologies using various methods such as class-based or self-paced training; and / or playing video games based on the new platform in order to make themselves comfortable with it.

Then there are others who will take a slower approach towards handling anything that is new. This may be due to avoiding being stuck with a trend that may be a “rooster one day, feather duster the next”. Similarly, it may be about waiting for the technology to become mature and affordable for most people before they take it up. Some users may even be very skeptical of any new trend that comes along especially if it is pushed on them. This is often said of mature or older people who are more settled in their ways regarding life.

Conclusion

There are many different reasons why there will be a generation-specific digital divide with the core one being about how much exposure they have to newer information technology through their school and working life.

To assist with this digital divide, there will need to be people within their family and community who can help them understand and utilise the various newer technologies that come their way. It can also be through the use of courses and other computer-literacy education tools that are pitched to this generation and its IT needs.

Send to Kindle

How can social media keep itself socially sane?

BroadcastFacebook login page

Four Corners (ABC Australia) – Inside Facebook

iView – Click to view

Transcript

My Comments

I had just watched the Four Corners “Inside Facebook” episode on ABC TV Australia which touched on the issues and impact that Facebook was having concerning content that is made available on that platform. It was in relationship to recent questions concerning the Silicon Valley social-media and content-aggregation giants and what is their responsibility regarding content made available by their users.

I also saw the concepts that were raised in this episode coming to the fore over the past few weeks with the InfoWars conspiracy-theory site saga that was boiling over in the USA. There, concern was being raised about the vitriol that the InfoWars site was posting up especially in relationship to recent school shootings in that country. At the current time, podcast-content directories like Spotify and Apple iTunes were pulling podcasts generated by that site while

The telecast highlighted how the content moderation staff contracted by Facebook were handling questionable content like self-harm, bullying and hate speech.

For most of the time, Facebook took a content-moderation approach where the bare minimum action was required to deal with questionable content. This was because if they took a heavy-handed approach to censoring content that appeared on the platform, end-users would be drifting away from it. But recent scandals and issues like the Cambridge Analytica scandal and the allegations regarding fake news have been bringing Facebook on edge regarding this topic.

Drawing attention to and handling questionable content

At the moment, Facebook are outsourcing most of the content-moderation work to outside agencies and have been very secretive about how this is done. But the content-moderation workflow is achieved on a reactive basis in response to other Facebook users using the “report” function in the user-interface to draw their attention to questionable content.

This is very different to managing a small blog or forum which is something one person or a small number of people could do thanks to the small amount of traffic that these small Web presences could manage. Here, Facebook is having to engage these content-moderation agencies to be able to work at the large scale that they are working at.

The ability to report questionable content, especially abusive content, is compounded by a weak user-experience that is offered for reporting this kind of content. It is more so where Facebook is used on a user interface that is less than the full Web-based user experience such as some native mobile-platform apps.

This is because, in most democratic countries, social media unlike traditional broadcast media is not subject to government oversight and regulation. Nor is it subject to oversight by “press councils” like what would happen with traditional print media.

Handling content

When a moderator is faced with content that is identified as having graphic violence, they have the option to ignore the content – leave it as is on the platform, delete the content – remove it from the platform, or mark as disturbing – the content is subject to restrictions regarding who can see the content and how it is presented including a warning notice that requires the user to click on the notice before the content is shown. As well, they can notify the publisher who put up the content about the content and the action that has been done with it. In some cases, the content being “marked as disturbing” may be a method used to raise common awareness about the situation being portrayed in the content.

They also touched on dealing with visual content depicting child abuse. One of the factors raised is that the the more views that content depicting abuse multiplies the abuse factor against the victim of that incident.

As well, child-abuse content isn’t readily reported to law-enforcement authorities unless it is streamed live using Facebook’s live-video streaming function. This is because the video clip could be put up by someone at a prior time and on-shared by someone else or it could be a link to content already hosted somewhere else online. But Facebook and their content-moderating agencies engages child-safety experts as part of their moderating team to determine whether it should be reported to law enforcement (and which jurisdiction should handle it).

When facing content that depicts suicide, self-harm or similar situations, the moderating agencies treat these as high-priority situations. Here, if the content promotes this kind of self-destructive behaviour, it is deleted. On the other hand, other material is flagged as to show a “checkpoint” on the publisher’s Facebook user interface. This is where the user is invited to take advantage of mental-health resources local to them and are particular to their situation.

But it is a situation where the desperate Facebook user is posting this kind of content as a personal “cry for help” which isn’t healthy. Typically it is a way to let their social circle i.e. their family and friends know of their personal distress.

Another issue that has also been raised is the existence of underage accounts where children under 13 are operating a Facebook presence by lying about their age, But these accounts are only dealt with if a Facebook user draws attention to the existence of that account.

An advertising–driven platform

What was highlighted in the Four Corners telecast was that Facebook, like the other Silicon Valley social-media giants make most of their money out of on-site advertising. Here, the more engagement that end-users have with these social-media platforms, the more the advertising appears on the pages including the appearance of new ads which leads to more money made by the social media giant.

This is why some of the questionable content still exists on Facebook and similar platforms so as to increase engagement with these platforms. It is although most of us who use these platforms aren’t likely to actively seek this kind of content.

But this show hadn’t even touched on the concept of “brand safety” which is being raised in the advertising industry. This is the issue of where a brand’s image is likely to appear next to controversial content which could be seen as damaging to the brand’s reputation, and is a concept highly treasured by most consumer-facing brands maintaining the “friendly to family and business” image.

A very challenging task

Moderating staff will also find themselves in very mentally-challenging situations while they do this job because in a lot of cases, this kind of disturbing content can effectively play itself over and over again in their minds.

The hate speech quandary

The most contentious issue that Facebook, like the rest of the Social Web, is facing is hate speech. But what qualifies as hate speech and how obvious does it have to be before it has to be acted on? This broadcast drew attention initially to an Internet meme questioning “one’s (white) daughter falling in love with a black person” but doesn’t underscore an act of hatred. The factors that may be used as qualifiers may be the minority group, the role they are having in the accusation, the context of the message, along with the kind of pejorative terms used.

They are also underscoring the provision of a platform to host legitimate political debate. But Facebook can delete resources if a successful criminal action was taken against the publisher.

Facebook has a “shielded” content policy for highly-popular political pages, which is something similarly afforded to respected newspapers and government organisations; and such pages could be treated as if they are a “sacred cow”. Here, if there is an issue raised about the content, the complaint is taken to certain full-time content moderators employed directly by Facebook to determine what action should be taken.

A question that was raised in the context of hate speech was the successful criminal prosecution of alt-right activist Tommy Robinson for sub judice contempt of court in Leeds, UK. Here, he had used Facebook to make a live broadcast about a criminal trial in progress as part of his far-right agenda. But Twitter had taken down the offending content while Facebook didn’t act on the material. From further personal research on extant media coverage, he had committed a similar contempt-of-court offence in Canterbury, UK, thus underscoring a similar modus operandi.

A core comment that was raised about Facebook and the Social Web is that the more open the platform, the more likely one is to see inappropriate unpleasant socially-undesirable content on that platform.

But Facebook have been running a public-relations campaign regarding cleaning up its act in relation to the quality of content that exists on the platform. This is in response to the many inquiries it has been facing from governments regarding fake news, political interference, hate speech and other questionable content and practices.

Although Facebook is the common social-media platform in use, the issues draw out regarding the posting of inappropriate content also affect other social-media platforms and, to some extent, other open freely-accessible publishing platforms like YouTube. There is also the fact that these platforms can be used to link to content already hosted on other Websites like those facilitated by cheap or free Web-hosting services.

There may be some issues that I have covered in this article that may concern you or someone else using Facebook. Here are some

Australia

Lifeline

Phone: 13 11 14
http://lifeline.org.au

Beyond Blue

Phone: 1300 22 46 36
http://beyondblue.org.au

New Zealand

Lifeline

Phone: 0800 543 354

Depression Helpline

Phone: 0800 111 757

United Kingdom

Samaritans

Phone: 116 123
http://www.samaritans.org

SANELine

Phone: 0300 304 7000
http://www.sane.org.uk/support

Eire (Ireland)

Samaritans

Phone: 1850 60 90 90
http://www.samaritans.org

USA

Kristin Brooks Hope Center

Phone: 1-800-SUICIDE
http://imalive.org

National Suicide Prevention Lifeline

Phone: 1-800-273-TALK
http://www.suicidepreventionlifeline.org/

Send to Kindle

Spirit Internet to provide infrastructure-level competition in Geelong

Article – From the horse’s mouth

Cunningham Pier, Geelong, Australia by Bernard Spragg. NZ from Christchurch, New Zealand (Cunningham Pier. Geelong Vic.) [CC0], via Wikimedia Commons

Spirit Telecom to introduce infrastructure-level competition for next-generation broadband to Geelong

Spirit Telecom

Hey Geelong – Did you hear us on the radio? (Interview broadcast on Radio Bay FM)

My Comments

Recently, Radio Bay FM in Geelong broadcast an interview about Spirit Telecom setting up shop in this regional boom-city. Here, Roxie Bennett interviewed Spirit Telecom’s managing director Geoff Neate about the pending arrival of their independent infrastructure setup as part of her lifestyle segment broadcast.

Spirit Telecom ahs been established since 2005 and has provided infrastructure-level competition for broadband Internet service in some of Melbourne’s inner neighbourhoods. Here, households and businesses who sign up with Spirit have access to simultaneous ultra-high-speed bandwidth thanks to use of Ethernet cabling within the buildings and a fibre-optic network for the last-mile connection to the building.

But Spirit is intending to roll this infrastructure out to Geelong with the first development that will benefit being the Federal Mills regional technology hub, an example of the new economic direction for that city. Let’s not forget that Geelong is starting to take on high-rise development within its CBD, which could open the door for Spirit Telecom to wire up the new developments for Ethernet-based FTTB next-generation broadband. It is in conjunction with Spirit Telecom’s other efforts to reach other Australian cities to provide developers, building owners and businesses a viable high-quality alternative to the NBN.

This broadcast is a sign of the times because it has highlighted the slowpoke effort that NBN has taken with providing a reliable next-generation broadband service in most of built-up Australia. There was even an on-air “dig” cast at NBN because of the delay in rolling out broadband in to that city.

Personally, I see Spirit Telecom’s effort in running their own infrastructure and high-quality next-generation broadband Internet as something that will “put a rocket up” NBN to roll out infrastructure in to that city/

Send to Kindle

The issue of cybercrime now reaches the national level

Article (Broadcast transcript)

HACKED! – Four Corners (ABC) Video and transcript through this link

Previous coverage on HomeNetworking01.info

Interview and Presentation–Security Issues associated with cloud-based computing (Interview with Alastair MacGibbon and Brahman Thyagalingham )

Symantec Symposium 2012 – My Observations From This Event

My Comments

I had watched the Four Corners “Hacked” broadcast concerning data security and cyber espionage, which encompassed the issue of the cyber attacks affecting nations as a whole.

The show had touched on a few key points, some of which were raised in the previous events that I attended. Here, it underscored the factor of hacking being part of espionage by nation-states like China. The targets of this espionage were intellectual-property belonging to private-sector companies or government departments, especially where military information was involved.

Example incidents include the recent theft of blueprints for ASIO’s new offices along with a cyber attack against Codan who is an electronics supplier to Australian and allied defence forces. The tactics that were used against Codan included use of a public-access Wi-Fi network to install malware on a laptop belonging to a representative of that company when they visited China, along with a “spear-phishing” attack on their email. It also underscored the fact that it is not the entity’s computer networks that are at risk but the “crown jewels” i.e. the key intellectual property that belongs to the entity.

The same show also underscored the use of malware to target essential-services systems like a nuclear enrichment plant in Iran and an Indian telecommunications satellite. Here, they raised the spectre of electricity grids, telecommunications backbones and similar infrastructure being targeted by sophisticated cyber attacks. This becomes more real as most essential-services systems become computer-controlled and connected to the Internet and I would like to see the issue of these systems designed with fail-safe operation in mind such as working offline and providing the core services at known specifications if things go wrong online.

Later on in this show, Alastair MacGibbon had called for the Australian government to require businesses and other organisations to publicly disclose cyber attacks and wanted this across the board for all entities. This was previously underscored by him through the interview and presentation where he described Australia’s data protection laws as being careless as typical of the “She’ll Be Right” nation.

The Australian Government had improved their data-protection laws by tabling bills that require cyber-attack disclosure on the larger public companies rather than all companies.

As well, the issue of cyber espionage by nation-states was being considered as the equivalent of wartime activities like nuclear war and treatment of civillians and needed to be tackled on an international level in a similar way that other similar wartime activities have been dealt with. Personally, I see the latest cyber-attacks, especially those emanating from countries that were behind the Iron Curtain, as the makings of another “Cold War” and these have to be treated accordingly.

Send to Kindle