Wednesday, April 22, 2015

Achievement Motivation and Behaviour: Basic Personality Dispositions Related to Approach and Avoidance

Eysenck described in 1951 three criteria to identify fundamental traits: they should have a biological basis, be at least partly genetic, and be observable in other primates.
Two traits that fit this bill are extraversion and neuroticism: in his view, extraversion was linked to general cortical arousability and neuroticism was linked to a lower threshold for activation in the limbic system.
Even thought these physiological views have been proven simplistic, extraversion and neuroticism have shown up time and again as important traits in several taxonomies, probably because they predict a wide collection of important social behaviors, including tendencies to approach or avoid specific classes of stimuli like positive (extraversion) and negative (neuroticism) affect.

There is lots of evidence that these two orthogonal dimensions (positive and negative affect) are a good representation of emotion.
On the positive affect (PA) dimension you find positive hedonic stimuli, safety, rewards; these can be experienced as enthusiasm, interest, pleasantness, relief.
On the orthogonal NA (negative affect) dimension you find negative hedonic stimuli, punishment and threat which can be experienced as anxiety, anger, frustration, disgust. PA emotions are related to approach motivation, NA emotions, to avoidance.
Proponents of the dimensional view of emotion in opposition to discrete categorical emotions have observed, for example, that people who are frequently angry are also frequently sad, but rarely people are sad and angry at the same time, which is consistent with an underlying dimension of general NA instead of discrete categories of emotions. At least when it comes to dispositional affect, the dimensional view of emotions wins.

Dispositional affect can be thought of as an average of all of a person's emotions over time - a person's typical amount of a certain emotion, regardless of stimuli.
People with high NA are "complainers": they will frequently experience distress, anxiety, annoyance, irritability, hostility, worry, anxiety, fear, dissatisfaction, and tend to focus on unpleasant characteristics - of themselves, the world, the future, and other people.
People with high PA are seen as enthusiastic, optimistic, and actively involved with life, tending to have optimistic expectations about the future and being highly sociable.
Some studies suggest levels of genetic inheritability between 40% (PA) and 55% (NA) for these traits, supporting Eusenck's biological basis criteria.

Over a dozen studies correlate extraversion with PA and neuroticism with NA. These links are considered as emotional reactivity: extraverts and people with high-neuroticism respond more intensely to stimuli than introverts and people with low-neuroticism.
However, there is no experimental evidence that extraversion and neuroticism represent differential reactivity to PA and NA stimuli, yet. The most important theory relating personality to affect comes from Gray's Reinforcement Sensitivity Theory, by which two separate brain mechanisms are responsible for sensitivity to cues of reward and punishment.

Gray suggests that extraversion is related to an enhanced sensitivity to cues of reward. Extraverts are motivated by pleasure and so have a strong tendency to approach. They expect rewards and are vigilant for possible sources of reward in the environment. The hypothesized neurological substrate for this individual difference is called the behavioral approach system (BAS).
On the other hand, neuroticism is responsible for differences in response to punishment or frustration. These individuals are motivated to avoid punishment and have a tendency to inhibit their behavior. His hypothesized neurological substrate for this is called the behavioral inhibition system (BIS). Strong BIS makes one vigilant for signs of punishment or frustration in the environment and sensitive to aversive stimuli.

Monday, December 22, 2014

Task 8: Reflection on project work

After all's said and done, my ethnographic study of a team prior to toolset migration is finished. It took me quite a few hours of work, many of those comprised of simply sitting quietly while writing furiously everything people were doing. Interpreting hours of scribbling proved challenging and the fact I knew what most of those people were doing made the notes a lot more biased than I'd hoped for an academic document, but in the end it's fine for its pragmatic application.
Shadowing alone didn't do the trick, which was an unexpected result. Since I had prior knowledge of how the team is structured and how it theoretically relates - I was even partially responsible for the training of some of the newer members of the team - I was able to build a good theoretical map of the relationships between sub-teams and the toolset, but shadowing revealed behavioral quirks, technical misconceptions, work vices and other work characteristics that needed clarification. Therefore, a couple of short interviews were executed to better understand what was actually going on.
The result was a much more complex relationship map than previously anticipated. That was a sobering experience and I'll try to remember not to assume I understand how a team works only by superficial observation. This is the most important lesson I expect to carry into future field research projects. The good news is that I left the endeavor with a great understanding of how each sub-team uses the tool differently, how previous assumptions shaped current work vices and how to prevent these during the migration to the new tool.
It has also taught me an important lesson that I tried to convey in the final document - that while people are fixated on what functions tool A possesses and how to achieve the exact same function in tool B, the really important thing is that both tools allow for the same workflow, even if functions are not exactly analogous. Less focus on functions and a more holistic view of how work revolves around the tool will help us shape not only the migration effort, but also training for the new tool.

Thursday, December 11, 2014

Different People, Digital World

The task at hand is a rather touchy one for me - discussing how a minority group can or uses the internet to reduce alienation and prejudice. It's touchy because it is, but also personally, because I'm a huge advocate for equality. I'd state I'm a feminist, but my girlfriend being a radical feminist, I know this is anathema as radfem declare that the oppressor cannot be a feminist, which is a view that I respect (but of course, I politely disagree with. But that can be my white male heterosexual privilege talking. Enough of that).

That said, I'd like to hijack this post not to talk about how women use the internet to reduce alienation and prejudice but instead how they use it to mobilize and support each other. I'm a great admirer of the many times extremely ad-hoc but always fantastic mobilization power or Brazilian radfem, how they are massacred by every side, including liberal feminists, how they're deviled and called feminazis and still when their sisters are in trouble, be they other radfem or libfem or not really feminists at all, it's always a huge support network of radfem organizing through social networks and mobile chats who get shit done.

While libfem are worried about including men in the debate or organizing polls or whatnot, radfem go and flashmob wherever there's trouble brewing and clash with authority and give their blood (sometimes quite literally) to keep sorority alive and kicking. I admire not only their spirit, but their non-tech savvy, patched together approach that gets great results even if most of them have no idea of the underlying tech that's enabling them to fight the good fight.

And maybe that's one of the beauties of living in the times we live today - you don't need to be a techie, you don't really need to read an RFC on how to implement a protocol or a big manual on how to configure a server to run a top-notch support network for your social movement. You just need to have a need and will to set things right.

Fun times.

Browsing the Jargon File

It always brings a smile to my face every time a link begins with http://www.catb.org/~esr/jargon/
So much of how we communicated in Internet Relay Chat could be traced back to the Jargon File, though we didn't know back in the day. I'm still a great user of language hacks like soundalikes - no one gets by me running Microsoft's browser without me exclaiming how I hate Internet Exploder and no day goes by without me making fun of my girlfriend being disclexy.

But my favorite story in the Jargon File is A Story About ‘Magic'. In the best tradition of laziness or respect for the original content (you'll never know which), I'll quote it integrally instead of discussing:

Some years ago, I (GLS) was snooping around in the cabinets that housed the MIT AI Lab's PDP-10, and noticed a little switch glued to the frame of one cabinet. It was obviously a homebrew job, added by one of the lab's hardware hackers (no one knows who).

You don't touch an unknown switch on a computer without knowing what it does, because you might crash the computer. The switch was labeled in a most unhelpful way. It had two positions, and scrawled in pencil on the metal switch body were the words ‘magic' and ‘more magic'. The switch was in the ‘more magic' position.

I called another hacker over to look at it. He had never seen the switch before either. Closer examination revealed that the switch had only one wire running to it! The other end of the wire did disappear into the maze of wires inside the computer, but it's a basic fact of electricity that a switch can't do anything unless there are two wires connected to it. This switch had a wire connected on one side and no wire on its other side.

It was clear that this switch was someone's idea of a silly joke. Convinced by our reasoning that the switch was inoperative, we flipped it. The computer instantly crashed.

Imagine our utter astonishment. We wrote it off as coincidence, but nevertheless restored the switch to the ‘more magic’ position before reviving the computer.

A year later, I told this story to yet another hacker, David Moon as I recall. He clearly doubted my sanity, or suspected me of a supernatural belief in the power of this switch, or perhaps thought I was fooling him with a bogus saga. To prove it to him, I showed him the very switch, still glued to the cabinet frame with only one wire connected to it, still in the ‘more magic’ position. We scrutinized the switch and its lone connection, and found that the other end of the wire, though connected to the computer wiring, was connected to a ground pin. That clearly made the switch doubly useless: not only was it electrically nonoperative, but it was connected to a place that couldn't affect anything anyway. So we flipped the switch.

The computer promptly crashed.

This time we ran for Richard Greenblatt, a long-time MIT hacker, who was close at hand. He had never noticed the switch before, either. He inspected it, concluded it was useless, got some diagonal cutters and diked it out. We then revived the computer and it has run fine ever since.

We still don't know how the switch crashed the machine. There is a theory that some circuit near the ground pin was marginal, and flipping the switch changed the electrical capacitance enough to upset the circuit as millionth-of-a-second pulses went through it. But we'll never know for sure; all we can really say is that the switch was magic.

I still have that switch in my basement. Maybe I'm silly, but I usually keep it set on ‘more magic’.

1994: Another explanation of this story has since been offered. Note that the switch body was metal. Suppose that the non-connected side of the switch was connected to the switch body (usually the body is connected to a separate earth lug, but there are exceptions). The body is connected to the computer case, which is, presumably, grounded. Now the circuit ground within the machine isn't necessarily at the same potential as the case ground, so flipping the switch connected the circuit ground to the case ground, causing a voltage drop/jump which reset the machine. This was probably discovered by someone who found out the hard way that there was a potential difference between the two, and who then wired in the switch as a joke.

The values of hacker ethic in the new century

Hacker ethics arguably have had as much influence on the last few years of the 21st century as Protestant work ethics have shaped the spirit of Capitalism. Many an entrepreneur, inventor or maintainer of some of the cornerstones of modern society were greatly influenced or completely guided by hacker ethics.

Freedom, for instance, is one such value which can be found in many of the technologies we use today, or which defines one of several famous dichotomies from which there are still no clear winners. One such dichotomy is the iOS versus Android battle, which once seemed lost to the hordes of proprietary software married to Digital Rights Restriction Management wrapped in a walled garden of curated content of Apple Inc., but nowadays it seems more and more like the open-source (if not entirely Free Software), free-for-all and laissez-faire Android alternative has been winning this battle, which is still far from over.

Hackers' approach to money and profit has had a tremendous influence on the current world - from the open standards that enable the web to be what it is today to Free/Libre software to producing content for free for projects like Wikipedia. Money is good and no hacker (ok, few hackers) is preaching Communism, but a challenge is much more important to a hacker - the paycheck he gets for cracking those challenges is just the icing in the cake. Also, "the right way" is not something that appeals to hackers much - "burn the manual, lets have an intellectually stimulating debate about this" has a lot more value. It's this painting outside the lines habit that has given us some amazingly weird stuff like location sharing services or ephemeral chat tools.

Caring is an interesting quirk of hackers which has been migrating to the mainstream through one of the least predictable of sources - hipsters. Those cappuccino-sipping, Apple loving, fashion-oriented skinny people who are otherwise the antithesis of hackers are great at caring and passion. While Gen-Xers at this age were fighting for BMWs and high-rise apartments and cocaine, hispters buy local, ride their bikes to work, integrate into the community, subvert capitalism, work smart and not more. I almost feel disgusted with myself for saying this, but hipsters are direct descendants of hacker culture.

Last but not least, network ethic is now a basic tenet of society. You're not an island anymore, what with your constantly connected smartphone and smartwatch and who-knows how many social network accounts. People no longer expect news to come from the media (and the media is suffering dearly for its nearsightedness in recognizing this trend) and now trust the free flow of information between peers more than anything. This distrust of established top-down hierarchies is and will remain shaping society for years to come.

Stay tuned.

Wednesday, December 10, 2014

Public Wifi: Security and Privacy - a review

This is a review of the wiki article on Public Wifi: Security and Privacy located at http://ethandlawpubwifi.wikidot.com/

Phishing over the air
Interesting section, but the rhythm is kind of weird - it spends a huge amount of time exploring what email phishing is, its history and estimated social costs, but it then flies over what phishing over the air is (which admittedly has little to do with email phishing) and sprinkles it with technicalities (OpenWRT, PHP, HTTPD) while explaining very little. Special bogus points for "Fig. 1" with no accompanying image ;)

Viruses over the air
More to-the-point than the previous section, but it confused me - if Chameleon doesn't change the router's firmware, how does it infect it? So I Googled Chameleon and ended up on the Malwarebytes blog, where they were perfectly non-informative as well, so maybe those University of Liverpool researchers have some bad publicists. I still don't know what Chameleon does.

Wifi Sniffing
Interesting section with no major flaws but it rubbed me the wrong way - do the authors think public Wi-Fi in intrinsically good or bad? Or do they avoid going the black-and-white route on purpose? My two cents is that people should encrypt any sensitive data anyway, so the fact that the Wi-Fi network they are accessing is unencrypted becomes immaterial. And unencrypted Wi-Fi makes for more universal access so I'm all for it.

Packet Sniffing technology
Very well written albeit overly long section - I'll avoid breaking down every single packet sniffer they've listed because a) there are so many sniffers around so either you cover every single one of them or make a generic post about all of them and they went for a middle ground solution and b) TL;DR

What can be done to protect yourself and your network?
Last but not least, a very interesting section on practical recommendations for a safe Wi-Fi network, though it starts with a bullshit suggestion - setting up a readable set of rules people have to agree to to access the network is a waste of time because TL;DR people won't read it and will do whatever they please so if you don't want people to do something, enforce it with good network configuration (to their credit, they do recommend that anyway). All in all a very sane list of recommendations but it lacked what in my opinion is the sanest of options for a safe work environment over wireless networks - have two separate Wi-Fi networks, one free-for-all open SSID so people can BYOB (Bring Your Own Device, which they'll do anyway) and another, restricted, encrypted, password protected SSID and if possible use a MAC Address Filter so only devices that were previously approved by the IT department can have access to this second network where all sensitive information resides.

My (rather long) two cents, given ;)

Monday, December 8, 2014

A Constructive Proposal For Copyright Reform - The Pirate Party's approach

It's no secret that copyright is a mess: between impossibly long copyright terms to draconian rules that treat corporations and natural people the same, the laws that rule over our right to intellectual property are outdated, eschewed and sometimes just plain wrong. The Pirate Party, which was born out of the PiratbyrĂ„n of Pirate Bay fame, has some very interesting proposals on copyright reform that I'd like to discuss here.

First, they'd like all non-commercial sharing to be free, meaning that if you're not basing your business around making copies of other people's intellectual property, your copies are not illegal. That seems a bit broad at first glance, but it's actually a very sane proposal - we have made personal copies before copyright was even defined and have since been protected by fair use rules. But 1976 was a greedy year (remember Bill Gates' Open Letter to Hobbyists?)  - Walt Disney and friends managed to get US law to protect copyright for the life of the holder + 50 years (to be fair, the Berne convention had already done so in 1886) and Universal tried to stop fair use by suing Sony into copyright violation by manufacturing VCRs. From then on, corporations have been working very hard to reduce the reach of fair use and to restrict it through non-legal means, like Digital Rights Restrictions Management. My take? Fair use should get proper legislation - the fact that there's no proper written definition of the limits of fair use makes it more of a nuisance than a right.

Which brings us to the next proposal, which is reducing commercial monopoly to 20 years. Again, we've been giving life + 50 years as the standard copyright term for most of the world for almost 130 years, so this sounds harsh at first glance. But corporations have been working very hard to extend copyright indefinitely, not coincidentally passing new laws as soon as Mickey Mouse's copyright protection is about to expire - 50 became 70 and in some cases protection can go to 120 years or more(!) The Pirate Party has a very fair point - no investor in their right mind expects a return on investment of 120 years, so why are we giving copyright protection of over a century (in fact, it goes against the spirit of copyright, which is to protect the creator, to give rights that extend after their death). So here's my take personal spin on their proposal - copyright protection should last the life of the creator OR 20 years, whichever comes latest.

Next issue is orphan works - copyright starts counting at the moment of creation, but the fact that it counts automatically creates a legal issue in that since the creator doesn't need to register his creation to be protected, some never will so you have a whole universe of orphaned works whose copyright protection is fuzzy because no one knows if the author is dead or alive or even who (s)he is, so you never know if this has reached the public domain or if you're in violation of copyright. Their proposal is very sane - copyright counts automatically from the moment of creation and if you have any commercial interest in protecting it, you have five whole years - not from the moment of creation but actually from the first publication, which can come many years later - to register. If at the end of this period you have not tried to protect your work by registering it with the proper authorities, it goes into the public domain. Sounds fair enough and I have nothing to add to it.

Then comes free sampling, which is the right to make derivative works, to cite existing works and to parody. I point to my original take early on that the limits to fair use needs to be properly codified and should contain these rights. Which brings us to the last important part, which is the banning of Digital Rights Restrictions Management. I say good riddance, as the law should be all protection that copyright needs and any external restriction to hard-coded legal rights should be illegal in the first place. While they're at it, they should also ban clickwrap/shrinkwrap agreements (where you enter into a licensing contract simply by installing a piece of software) and End User License Agreements which restrict user rights further than what's in the law, like the 'newish' trend between commercial software developers to state that you don't own the software you paid for, but merely have a license to use it which can't be transferred, sold or even moved between two of your own machines.
So yes, the Pirate Party has my vote, definitely ;)

Monday, December 1, 2014

The Uneasy Alliance: Free Software vs Open Source

To most people, Free and Open Source Software are the same thing. Some for over-simplification, some for ignorance. But Free Software is a philosophical approach as old as software itself, as most of the software in the 50s and 60s was written within academia and shared freely like all proper scientific discoveries should. Even as early as 1953 the operating system for the UNIVAC version A-2 was fully FOSS (free and open source software). It was only in the late 60s that the cost of development became high enough that software began to be seen as a market in itself and the first proprietary software came to be. In 1976 Bill Gates wrote the first treatise in defense of proprietary software (the Open Letter to Hobbyists), where he argued that copying Micro-Soft's Altair BASIC without a license was stealing.

The fact is people kept sharing and proprietary software never had 100% of acceptance, but it became a huge business model nonetheless. So in 1985 Richard Stallman published his own treatise, the GNU Manifesto, with views of getting rid of AT&T's grip on UNIX and creating a new operating system that was free to use and modify (which of course implied that the source code should also be fully open). The following year the Free Software Foundation would be created and, with it, the Free Software Definition - software that ensures that the end users have freedom in using, studying, sharing and modifying it.

1992 would see the creation of Stallman's dream when Linus Torvalds decided to publish his Linux kernel, which he had open sourced as soon as created, under the GNU General Public License. This was the first time that GNU was a complete software stack, as it finally had a free, open kernel to run on. GNU/Linux (simply Linux to most of us) was born.

This is when things became confusing.

GNU/Linux was too interesting to pass and would soon attract commercial interest. But Free Software was "tainted" by Stallman's license, which, by being nonrestrictive, restricted commercial usage of it (or so went the argument by 1997/1998). When Netscape decided to publish their Communicator openly, a few members of the Free Software movement saw this as a decisive moment to jump in and come up with a more pragmatic/less broad definition that could appeal to commercial software while still making the source code fully available. this Open Source Definition would give birth to the Netscape Public License, effectively the first Open Source License. Stallman objected that the focus on Open Source meant most philosophical debate was being ignored (and he was right) - but an uneasy alliance would soon form - 1998 was also the year of the infamous Halloween Documents - once again, Microsoft (no dash by now) would seriously attack the Free/Open Source scene.

In the end, both pragmatic and idealistic approaches have their own merits - Open Source attracted many players to the field and Free Software has kept it honest - but both have their shortcomings. The debate will not go away anytime soon - GPL 3 and its push against DRM has made some interesting enemies likes Linus Torvalds himself - but all have to gain with Free/Libre Open Source Software, whatever narrow or broad definition you want to give it.

Monday, November 24, 2014

The Digital Enforcement - The Trouble with DRM and Other Such ̶c̶r̶a̶p̶

As I've discussed already when analyzing the future of licensing, corporate interest has been running the show, to disastrous results. It might be time to make licensing and other rights' restriction schemes outright illegal. One such system is Digital Rights Restriction Management, which is a "technology" created by digital publishers in the 90s to make sure that, if governments didn't play by their rules (which they mostly did, either by extending copyright again and again or by allowing them to play their shenanigans with End User License Agreements) they would simply take matters into their own hands and make sure their own definition of the rules was followed, by force.

DRM comes in many different forms - CSS, which was one of the first such schemes and was used to encrypt DVDs, uses a cipher that makes reading a movie stream impossible without the key. Obtaining the key is a jump-through-hoops process where the player needs to have a key (which was paid for in form of a license) to decrypt a key (which is physically present in the disc) which is then used to decrypt yet another key which they allows the system to read the actual bits and bytes of the movie stream.

If it sounds overly complicated and stupid, then you've understood DRM and my job is done.

One of the many things that CSS ignores is one tiny little thing called Inalienable Human Rights like the right to Free Speech and the right to make Fair Use of copyrighted works, which is fine for evil corporations because fuck Human Rights, right? But as governments let corporations play their dirty game they get more and more daring and DRM gets more brazen. Nowadays it's common practice to keep part of the DRM process physically separate from the rest, so you need internet access (either prior or constant) to have access to content you paid for and rightfully own (at least as far as the law goes).

Nowadays such shenanigans have been having lots of backlash, especially from consumers buying music from online stores (most if not all migrated away from DRM because of negative customer feedback) and from players being locked away from games because of draconian DRM (as #GamerGate has taught us, Hell hath no fury like a gamer scorned), so hopefully sometime soon there will be a shift in legislation that either seriously restricts DRM and EULAs or outright eliminates them.

One can dream, right?

The World of Proprietary Software or How could the software licensing landscape look like in 2020

So it's undeniable that proprietary software has a place in the market - we're long past the age where all software came free as part of a hardware sale and way too early in the evolution of the media to have all software be free/libre for good and, most of all, there are billions (maybe trillions) of dollars behind proprietary software models right now that won't easily shift to better formats anytime soon, so we better learn to deal with it. But if current trends in proprietary software aren't curbed soon, the licensing landscape can look very ugly in a few years, as I wish to explore in this text.

First comes the "pig in a bag" issue (or "gato por lebre" in my native Portuguese) where what you buy and what you get can be completely different things. The fact that End User License Agreements have never been tested in court and are so far regarded to be valid from the moment you click "Install" has been breeding constant contractions of user rights, some which would be outright illegal if analysed by any sane optic. Buying software used to mean you owned it and therefore could resell it or move it to a new computer once the one you're using to read this blog post on goes South or whatever, but a cursory glance on an EULA these days will show you otherwise - you're merely a licensee and that copy of Windows or Photoshop you paid for still belongs to the publisher. Not only that, but it's probably restricted to one install, to the current machine you own. Not only that, but it's perfectly legal for the publisher to test your hardware and, should it ever change, accuse you of having moved it to a different machine and disabling your license. Not only that, but you might have to ping a licensing server every few days (during such visit they'll probably pull some usage information "for marketing purposes") so you can remain licensed - just ask Adobe Creative Suite users what it feels like when Adobe goes offline and they can't use Photoshop. Not only that, but it might be simply impossible to use your software without internet connection, even if there's no need for you to be online at all - many videogame publishers have seen the online gaming experience as a nice way to curb piracy and now think it's fair to stop you from playing offline even if it's a single player game.

So what's next? Subscription is already a thing - Microsoft Office and Creative Suite are now available in a yearly version along with the "bought" version (which with every restriction they add gets shittier until it finally feels like paying for a subscription is no longer such a stupid deal). Digital Rights Restriction Management already makes pirating games easier than playing the version you paid for and for every new restriction they get away with, they'll come up with a more outlandish one, so soon you'll be jumping through extra hoops to use proprietary software that you paid for. But there's a silver lining, which is mobile software. Mobile users (especially Android users) are profoundly less tolerant to bullshit pricing schemes and they expect the software they bought for their phone to run on their tablet or their next phone and so on, so it's entirely possible that, as mobile becomes more important than workstations, proprietary software vendors get pushed back harder and come up with saner licensing schemes, and with Chromebooks and convertibles and etc the category as a whole may well cease to exist and everything we call mobile may simply be the personal computers of the future.

Time will tell.