Category Archives: Social Media

Maps, Activism and Technology: Check-In’s with a Purpose

“Having a real-time map, complete with satellite photos, of where everyone is at any one moment is almost as good as having your own helicopter overhead — maybe better, if you can distract the crew of the helicopter.”

As recently announced on the Ushahidi blog, the group is launching a check-in service a la Foursquare called “Crowdmap : Check-In’s” or just CI for short. I’m excited by the different applications that a free and open-source check-in-with-a-purpose platform can have for social impact. In this blog post, I’ll share some ideas on how activists might use CI for popular nonviolent movements when the service is launched next month at SxSW 2011. I will also highlight another very cool project called Sukey, which was just launched in the UK.

Services like Foursquare provide a location-based mobile social networking platform that allows users to check-in at different venues to earn points and connect with friends. CI will work in a similar way but will allow users to create their very own “Foursquares”. This means that CI’s can be project- or group-specific, i.e., bounded to certain networks. Users will decide themselves where and what kind of points and badges to award to members of their CI network.

This quick check-in service has obvious applications for students coordinating nonviolent protests, especially when they need to rapidly adapt to a changing situation. I this saw again recently in Egypt when pro-Mubarak thugs were swarming certain avenues of downtown Cairo. I recall seeing a picture shared on Twitter with tactical drawings suggesting where anti-Mubarak protestors should position themselves as a result. This was drawn on a screenshot taken from satellite imagery of an area in the center of Cairo. (I spent an hour trying to find the original picture again but to no avail, so if you know which one I’m referring to, please get in touch. The one below is for illustration only).

With Internet and cell phone networks back up, protesters could use a check-in service to let others know where the thugs are being sighted and to recommend different locations to retreat or advance to. This would be a like a geo-tagged status update that could also be shared on your Facebook page or Twitter feed (minding the security implications). In addition, one could have pre-designated tags like “Thugs here”, “Don’t go here”, “Evacuate” etc., to avoid having to type when checking in. Call it the Q-CI feature, quick check-in’s.

These alerts or status updates could then be embedded geographically, something like geo-caching. So if I happen to check in within a hundred meters of someone who just recently updated their CI status as “evacuate”, I would get an immediate pop-up message showing me these nearby updates. Someone helping to coordinate the protests remotely from a laptop could quickly embed areas (rather than points) as  no-go zones if one or more updates show up with the tag “evacuate” at a given venue. Integrating Ushahidi’s new geometry mapping feature would make this possible.

A related project that I really like comes from the same student group in the UK that used live tactical mapping for protest swarming last year. The team has since designed and launched their very own mobile check-in platform to facilitate tactical maneuvering during demonstrations, keep protesters safe and avoid kettling:

“Kettling, also known as containment or corralling, is a police tactic for the management of large crowds during demonstrations or protests. It involves the formation of large cordons of police officers who then move to contain a crowd within a limited area. Protesters are left only one choice of exit, determined by the police, or are completely prevented from leaving” (1).

The project, called Sukey, is an excellent example of Maptivism. The name comes from the nursery rhyme: “Polly put the kettle on, Sukey take it off again.”

All you have to do is point your smart phone browser (it doesn’t have to be an iPhone!) to http://www.sukey.org/a to access the tactical map. The screenshot above is from their entertaining and helpful tutorial which you can access here. I really like the use of their simple “safety compass” which gives you immediate situational awareness about which direction safety (and danger) lies. The compass is specific to your GPS location and is updated in real-time as new reports are submitted by activists. These reports can be shared with all the other protesters and appear in the red box below the map.

If you don’t have a smart phone, Sukey relays updates via their Twitter feed which users can subscribe to via SMS thanks to Twitter’s SMS-following service. All you need to do is text “follow @sukeysms” to 8644. What if you forgot your phone at home? One protester noted that “Everyone who was getting the Sukey updates was telling everyone who wasn’t what was happening.”

As an unhappy security analyst recently noted,

“The proliferation of highly capable handheld ‘smartphones’ now makes it easy for protest organizers to communicate by voice, text and images, even with real-time video. The protesters may have more watchers and observation points than the police, and actually outpace the police in quantity and quality of intelligence. Having this kind of information available has made it possible for disrupters to create decoy incidents to draw resources away from where they are needed most. Having a real-time map, complete with satellite photos, of where everyone is at any one moment is almost as good as having your own helicopter overhead — maybe better, if you can distract the crew of the helicopter.”

Protesters claim they successfully avoided police kettling this week by using Sukey. If you’d like to learn more, I highly recommend this excellent piece by the UK Guardian on the project. I think Ushahidi can learn a lot from this group so I will be meeting with the team in London next month. In the meantime, I’m really looking forward to SxSW and Sukey II. In a future post, I’ll describe how check-in’s-with-a-purpose platforms can also be used for humanitarian relief and disaster response.

Using a Map to Bear Witness in Egypt #Jan25

[Cross-posted from the Ushahidi blog]

The Cairo-based Development and Institutionalization Support Center (DISC) has just launched their #U-Shahid map below. DISC previously used the Ushahidi platform to monitor the country’s Parliamentary Elections last November and December  (see this post for more info). This means they already know the technology and have a trained network of active crisis mappers that can verify reports before they are mapped.

The events in Egypt over the past two weeks have been nothing short of unprecedented. The Mubarak regime clamped down on many forms of communication including the Internet, cell phones and SMS. There were also reports of landline phones being blocked. The word still go out, however. And with Internet access now restored, the map will get out as well just as it did in the Sudan over the past few days.

DISC has mapped some 50 reports based on events that took place over the past week. Take this report below, for example, which includes a YouTube video of protests. The map includes dozens of categories, including Riots, Breaking and looting, Arrests, Violence against protesters, Spraying water and Firing tear gas, for example.

Notice how DISC has made it very easy to share information on individual events by allow direct Tweeting, Facebook posting, etc.

The group has also enabled the subscribe to alerts feature, which allows individuals to automatically get reports sent to their email and cell phone.

Since Egypt just got back online, we expect the map to receive more reports in the coming days. Perhaps the group may also end up using the dedicated Ushahidi smart phone apps to distribute the mapping further.

The Arabic Network for Human Rights Information (ANHRI) launched this Jan 25th CrowdMap in Cairo days before the regime shut down Internet access. It hasn’t been updated since but there are now discussions about reactivating the map to provide information on the location of ATMs, for example.

An ongoing and pressing concern about these maps (and others) is of course security. Crisis maps can depict important information that can be used for good and ill. We hope local groups that use these tools in non-permissive environments take every precaution possible when doing so as repressive regimes are becoming more sophisticated in electronic surveillance.  To learn more about communicating safely in such situations, we recommend some of the following links:

Crisis mapping is redefining the way we think about maps. Today’s maps are alive and dynamic. They are not hard copy static objects like this historical map of Ancient Egypt dating from 1,450 BC. Maps, like books, were written by the winners, the elite. They reflected and projected power. They depicted a fixed reality through one lens.

Today’s crisis maps can give voice to the distributed voiceless. They integrate tools like email, SMS, Twitter, Facebook, YouTube, Flickr, etc. What does this all add up to? “Will the triangulated crisis map be regarded as the new first draft of history?” asks New York Times journalist Anand Giridharadas. He considers some of the implications in this excellent piece,

“They say that history is written by the victors. But now, before the victors win, there is a fresh chance to scream out, with a text message that will not vanish. What we would know about what passed between Turks and Armenians, between Germans and Jews — and indeed would it have happened at all — if each of them had had a chance to declare and be heard saying: ‘I was here, and this is what happened to me?'”

Facebook https is now live for Sudan

A very big thank you to the team at Facebook for allowing users in the Sudan to access Facebook securely. Instead of using the regular http:// access to the site, using https:// means that your connection is securely encrypted. This prevents malicious users from spying on your account and seeing your password, for example. This is why all online banking websites use https, as does Google with gmail. Tunisia in many ways set the precedent. Read this excellent account on the inside story of how Facebook responded to Tunisian hacks.

As we have seen in many situations, Facebook is often used by activists to schedule and coordinate mass action. This is equally true of the Sudan, with this Jan30 Facebook group, which now has over 17,000 members. However, in my recent Skype conversations with a number of Sudanese activists, I’ve realized that many of them didn’t know that the Tunisian government (for example) had been able to hack into Facebook accounts. While using https is not a complete panacea, it definitely is a step in the right direction re communicating securely in repressive environments. I’ve also encouraged colleagues to switch to using Hushmail for email communication.

So for colleagues in the Sudan, to set up https:// access, go to “My Account” then “Settings” and then “Account Security.” Here’s the equivalent in the Arabic interface:

You should click on “Browse Facebook on a secure connection (https) whenever possible” and also on “Send me an email” that way you get sent an automated email when a new computer or mobile phone logs into your account. If you have any questions, feel free to add them in the comments section of this blog.

Here are some other steps you can take to use Facebook more securely:

1. Do not share sensitive info on FB
2. User passphrases instead of passwords
3. Change you name, or at least do not provide your full name on FB*
4. Do not use a picture of yourself for your FB profile picture
5. Logout of FB when not using the site

* Use this with caution as it violates FB’s terms of service and if someone is targeting you, they can report you to FB. Also do not give FB your identification if asked (@JillianYork).

Again, using https and following these five steps is no guarantee that your account won’t be hacked, but it maximizes your chances of using Facebook more safely. If you have any security tips to share, please add them in the comments section of this blog post.

A big thank you once again to Facebook. I emailed them (via another colleague) with my concerns regarding Sudanese activists and they responded in a just a matter of hours. Facebook is also in the process of rolling this https option out for all their users worldwide.

Crisis Mapping Sudan: Protest Map of Khartoum

Unlike the many maps of the #Jan25 protests in neighboring Egypt there is but this one map for the #Jan30 protests taking place in the Sudan and Khartoum in particular. The map was requested by Sudanese colleagues in Khartoum who in their own words wanted a public map for the world to see what is happening in their own country.

Some 70 individual reports have been mapped thus far. These capture a range of incidents including the following:

  • Police use gas bombs against medical students [View Report]
  • Peaceful gatherings and demonstrations [View1 View2]
  • Sudanese security harassing foreign journalists [View1 View2]
  • Picture of police beating protesters on Palace Street [View]
  • Videos of protest in Khartoum [View]

While all eyes of the media are on Egypt, few are sharing the developments in the Sudan. This makes the Sudan map even more important. As Philip Howard has found in his comprehensive new study on “The Digital Origins of Dictatorship and Democracy: Information Technology and Political Islam,” the presence of a comparatively active online civil society appears to be one of the key ingredients for democratic transition. Compared to the online civil society in Egypt, the one in the Sudan is far smaller. But activists in Khartoum have reached out to digital activists outside the country for support. And this joint effort has  resulted in more than just a map.

Sudanese contacts have been sharing relevant information via email  and Skype throughout the day, some of which is mapped, and some which is included in the News section of the map. In addition, digital activists have provided training on Twitter and have set up a Flickr account for the Sudanese activists (at their request). See this DigiActive guide on how to use Twitter for activism, also available in Arabic (PDF).

The group has also been trying hard to set up a local FrontlineSMS number for activists to text their reports directly to the map. The first phone they tried didn’t work, so they’re looking to use a GSM modem in the coming days. (Update: an international number has been set up). Once a number is set up, the activists want to share it widely, including the 16,000+ members of the Jan30 Facebook group. Local activists hope this will help them overcome some of the coordination challenges that cropped up today when there was confusion over where and when the demonstrations were meant to take place. This resulted in smaller dispersed protests instead of mass action. You can read more on first hand accounts of this in the News section which includes an email written by Sudanese activist about what they saw today.

Despite the constraints in organization, activists still took to the streets but did face higher risks by being in smaller more dispersed groups. I’m hoping they’ll be able to regroup and plan their future protests in such a way that there is less confusion. The activists do have a full copy of the mass action strategy guide used by Egyptian protesters this week. This may serve them well if they can circulate it widely in the country.

Crisis Mapping Egypt: Collection of Protest Maps (Updated)

The CrisisMappers Twitter feed has shared a number of maps depicting the ongoing protests in Egypt. Here is a collection of them. Do let me know if we’re missing any. To learn more about crisis mapping, read this blog post: What is Crisis Mapping? and join www.CrisisMappers.net. For a protest map of the demonstrations in Khartoum, Sudan, see this link.

Update: The Cairo-based Development and Institutionalization Support Center (DISC) has launched the Ushahidi map below. DISC has previously used the platform to monitor the country’s Parliamentary Elections last November and December  (see this post for more info).

Update: These Twitter maps Hypercities provide another way to visualize the event unfolding across the country.

Update: Storyful has this Google Map of the protests in downtown Cairo:

Update: OpenEgypt, an independent group of volunteers have set up the Open Egypt Crowdmap below:

The Arabic Network for Human Rights Information (ANHRI) has put up this Jan 25th CrowdMap:

The company ESRI has produced the following Web Map of Egypt:

The New York Times has also put this protest map together:

Finally, the LA Times has this map up on their website:

How I’m following the developments in Egypt (Updated)

How to follow a 21st century revolution. What sources am I missing?

Twitter

Live Video

Live Stream

Aggregator

What is Crisis Mapping? An Update on the Field and Looking Ahead

I last updated my piece on A Brief History of Crisis Mapping some two years ago, well before the first International Conference on Crisis Mapping was held (ICCM 2009). So a brief update on the past 24 months may be in order, especially for a field that continues to grow so rapidly. When I Googled the term “crisis mapping” in September 2009, I got 8,680 hits. Today, one gets over 200,000. If you’re curious about the origins of the field and what happened before 2009, my original blog post still serves as a useful intro. I also recommend this recent video on Changing the World One Map at a Time and this earlier blog post on Proposing the Field of Crisis Mapping (also from 2009).

Clearly a full update on the past 24 months would constitute at least an MA thesis (if you’re a grad student and looking for a topic, email me!). So what is Crisis Mapping? “Dots on a map” is often the tongue-in-cheek reply. Crisis Mapping is of course a lot more than that. To place Crisis Mapping into context, it helps to think of the field as a subset of the “Live Mapping” space. I also often use the following analogy, crisis mapping platforms are to crises zones what MRI’s are to emergency rooms. Static, paper-based maps would be the equivalent of X-rays in this analogy. Crisis Mapping is thus live mapping focused on crises, and the term crisis here is deliberately broad, from slow-burn crises to sudden-onset disasters. Crisis Mapping is certainly not restricted to political crises but may include social and environmental crises, for example.

Crisis Mapping can be described as combining the following 3 components: information collection, visualization and analysis. Of course, all these elements are within the context of a dynamic, interactive map. So I typically use the following taxonomy:

  1. Crisis Map Sourcing
  2. Crisis Map Visualization
  3. Crisis Map Analysis

On Crisis Map Sourcing, there are multiple methodologies and technologies that one can use for information collection. These range from the traditional paper-based survey approaches and Walking-Papers to crowdsourcing reports via SMS and automatically parsing social media data on the web. Visualization is about rendering the information collected on a dynamic, interactive map in such a way that the rendering provides maximum insight on the data collected and any potential visual patterns. This is of course nothing new to the field of cartography and geographic information systems. What is perhaps new is that the technologies used for the visualization are free or open source or both, and that they don’t require much in the way of prior training. Some have referred to this as neogeography.

Crisis Map Analysis is also nothing new and simply entails the application of statistical techniques to spatial data for pattern or “signature” detection. What is perhaps novel is that the analysis is now happening more and more on the fly, i.e., in real-time. The point of doing this kind of analysis is to provide in-the-moment decision-support to users of a given Crisis Mapping platform. Thus the interface of said platforms should allow users to easily query the map and test out different scenarios to identify the best course of action given a changing or evolving environment. Ideally, a Crisis Mapping platform should also allow you to assess the impact of your actions.

So these are the terms and concepts that one can use to talk about the field of Crisis Mapping. But what exactly has changed over the two years?

I’d say the increasing use of free and open source crisis mapping software, for one. There has also been a lot more interest in the use of social media and up-to-date satellite imagery as a source of information. The same goes with using crowdsourcing to collect crisis information. The rise of online volunteers engaged in crisis mapping is another new and important development which holds much potential. This is particularly true as formal humanitarian organizations are now taking important steps to interface with these volunteer communities.

Perhaps what I am most excited about is the recent use of Crisis Mapping not just to identify problems but also existing solutions; the idea is to combine crowdsourcing with crowdfeeding to create a crowdsourcing “market place” that matches needs with resources. The basic idea is to help other help themselves. Professional disaster responders may not always be there to help but the crowd is always there. To learn more about this approach, please see this blog post.

One interesting impact of Crisis Mapping that hadn’t occurred to me two years ago is the social connectivity aspect. What do I mean by that? Simply this: the value of Crisis Mapping may at times have less to do with the actual map and more with the conversations and new collaborative networks catalyzed by launching a Crisis Mapping project. Indeed, this in part explains why the Standby Volunteer Task Force exists in the first place. So Collaborative Crisis Mapping can generate both weak and strong-ties.

Where do I see the field going over the next 24 months? I think we’ll see more focus on solutions to process large volumes of geo-data in real time, especially of the social media and SMS type. By process I  mean automated data-mining, entity-extraction, geo-location, categorization and language translation combined with human-driven curation tools. The application of “Mechanical Turk” services may also become more common place.

What else? Existing Crisis Mapping platforms are highly limited because the majority are only available in the English language. So I expect this to change in the near future if platforms are really to scale. The role of mobile technologies will remain center stage, of course, with more multimedia content appearing on crisis maps along with live video feeds. As a result, I also expect (and hope) to see more examples of Maptivism, i.e., tactical live mapping.

In addition, I’d like to see more on-the-fly mashups of live data. Take the flood mapping in Queensland, Australia, for example. I hope to see future live maps like this one include live traffic and weather updates (and forecasts) as dynamics layers. Colleagues Anahi Ayala and Helena Puig have also been playing around with the idea of combining geo-referenced crowdsourced SMS reports with cell phone coverage maps to identify potential areas of “over-” and “under-reporting.” One could then develop simple algorithms to potentially identify unusual gaps in SMS reporting.

Finally, I’d like to see more “check-in” (and check-out) features integrated into Crisis Mapping platforms, i.e., simple one-click updates on one’s location and activity has many use-cases in crisis response, particularly if this can be combined with alternative uses of geo-caching, e.g., pre-formulated messages that are automatically activated upon checking-in at given locations and points in time. So instead of  the traditional message “In case of an emergency, break glass” you’d have “In case of emergency, check-in for info on how to survive.”

What are your thoughts? Where do you see the field of Crisis Mapping going over the next 12-24 months?

ICTs, Democracy, Activism and Dictatorship: Comprehensive Literature Review

Building on my previous post with respect to Howard Philip’s “Origin of Dictatorship and Democracy,” I’ve completed a draft of my dissertation chapter which comprises a comprehensive literature on the impact of Information and Communication Technologies (ICTs) on Democracy, Activism and Dictatorship. This is a 54-page document (17,000+ words)  which I believe represents the most up-to-date and in-depth review of the literature currently available. The chapter reviews both the quantitative and qualitative literature in this space.

You can download the chapter here (PDF).

I’m actively looking for feedback to make the chapter even stronger and more useful to scholars and practitioners interested in this space. So please do add any recommendations you may have in the comments section below. Thank you very much!

The Digital Origins of Dictatorship and Democracy

I defended my dissertation proposal in early 2008 but the majority of the literature most relevant and helpful to my doctoral research surfaced in 2009 and 2010. So I’m rather grateful to the PhD program at The Fletcher School for letting me run with my chosen dissertation topic given the limited empirical literature to draw on back then.

The best new book I’ve come across since my proposal is Philip Howard’s “The Digital Origins of Dictatorship and Democracy: Information Technology and Political Islam,” which was published just a few months ago. Howard seeks to answer the following question: “What is the causal recipe for democratization, and are information technologies an important ingredient?” More specifically, “The goal of this book is to analyze the ways in which new information technologies have contributed to democratic entrenchment or transition in countries with large Muslim communities.”

Howard demonstrates that “technology diffusion has had a crucial causal role in improvements in democratic institutions” and “that technology diffusion has become, in combination with other factors, both a necessary and sufficient cause of democratic transition or entrenchment.” Howard concludes: “Clearly the Internet and cell phones have not on their own caused a single democratic transition, but it is safe to conclude that today, no democratic transition is possible without information technologies.”

The book is getting superb reviews, and that is absolutely no surprise. This is truly the best book I’ve read on the topic of my dissertation thus far. Why? Howard’s research design and mixed-methods approach is by far the most rigorous one in the literature to date. I therefore plan to dedicate a few blog posts to summarize Howard’s approach and findings, starting here with the book’s prologue: “The Revolution in the Middle East will be Digitized,” which focuses on the Green Revolution in Iran. Below are some excerpts and commentary that reflect some of the key arguments from this first section of the book.

One of the main roles that information and communication technologies (ICTs) played in Iran was dissemination, which had a second-order effect on increasing levels of participation both in the streets and online.

“Opposition campaign managers in Iran consistently say that such Internet applications allow them to get messages out as never before and thereby organize bigger and bigger campaign rallies. Without access to broadcast media, savvy opposition campaigners turned social media applications like Facebook from minor pop culture fads into a major tool of political communication.”

“During the protests, even the most apolitical bloggers covered the demonstrations, and traffic at the dominant blogs swelled [and] social networking applications […] allowed even small enclaves to create content and reconnect with friends and family in Iran.”

“It does not matter that the number of bloggers, twitterers, or internet users may seem small, because in a networked social moment only a few ‘brokers’ need to be using these tools to keep everyone up to date.”

“These are the communication tools for the wealthy, urban, educated elites whose loyalties or defection will make or break authoritarian rule. Indeed, it is probably more useful to evaluate applications such as Twitter through the communities they support, rather than through tool features. […] Social movement scholars write that elite defection usually marks the end of an authoritarian regime.”

“In some ways the regime’s response was decidedly old media: expelling foreign correspondents, blocking phone lines, preventing the publication of daily newspapers, and accusing enemy governments of spreading misinformation.”

“They did not count on the large number of Iranians eager to submit their own content to international news agencies, and, perhaps more important, they did not realize that large numbers of Iranians would use social media to share their own personal stories of beatings, tear gas inhalation, and protest euphoria with each other.”

“Cyberactivism is no longer the unique provenance of isolated, politically motivated hackers. It is instead deeply integrated with contemporary social movement strategy and accessible to computer and mobile phone users with only basic skills: it is a distinguishing feature of modern political communication and a means of creating the élan that marks social change.”

Like Malcom Gladwell, Howard also addresses the role of strong and weak-ties in digital activism. To learn more about Gladwell’s point of view (and mine) regarding the question of social ties, please see my previous blog post here.

“Millions of people took to the streets in the week after the election results were announced and certainly not all were using Twitter. The majority of them, however, were responding to both strong and weak network ties and to the digital technologies designed to maintain those ties.”

“The unprecedented activation of weak social ties brought the concerns of disaffected youth, cheated voters, and beaten protesters to the attention of the mullahs. The result was a split within the ruling establishment on how to deal with the insurgency, how to proceed with counting ballots, and how to credibly authorize Ahmadinejad to take power.”

Howard’s balanced approach to the impact of ICTs on democracy is one of the main strengths of his book.

“So the country has one of the world’s most vibrant social media communities and the most concentrated broadcast media system in the Muslim world. Why, then, has the digital revolution in Iran not had the type of clear political outcomes or institutional consequences seen in other authoritarian regimes?”

“The answer, in part, is that while such information technologies have become a fundamental infrastructure for journalists and civil society groups, they are a necessary but not sufficient causal condition for contemporary regime change. So based on real-world experience, what is the causal recipe for democratization, and are information technologies an important ingredient?”

“In the language of fuzzy sets ways, Iran’s postelection insurgency was almost an example of a digital revolution. In is unlikely that protests would have lasted as long, raised so much international support, and had such an impact on domestic politics had it not been for mobile phones and the internet. The internet did not cause the insurgency, and it is probably a truism to say that no contemporary democratic revolution in the Middle East will happen without the internet. In times of political crisis, banal tools for wasting time, like Twitter and YouTube, become the supporting infrastructure of social movements. As one ethnic Azeri blogger told me, the regime has learned that the Internet makes collective action possible.”

“Technology alone does not cause political change—it did not in Iran’s case. But it does provide new capacities and impose new constraints on political actors. New information technologies do not topple dictators; they are used to catch dictators off-guard.”

That last paragraph resonates with me and relates to this idea of information cascades that Dan Drezner has written about here. The momentary window of opportunity that reversals information cascades offer can be used to catch dictators off-guard. This explains why preparedness and training is important.

So what ultimately was the actual impact of the 2009 protests? According to Howard,

“Digital media sustained protests well beyond what pundits expected. Indeed, this new information infrastructure gave social movement leaders the capacity not only to reach out to sympathetic audiences overseas but also to reach two important domestic constituencies: rural, conservative voters who had few connections to the urban chaos; and the clerical establishment.”

“Most important, the Internet gave the social movement access to the clerical establishment through weak ties of social networks that connected mullahs to Iranians on the street.”

“Iran’s street protests failed to topple their government. But just as important, the world’s most technologically advanced censors failed to manage the government’s election crisis. And the region’s dictators have a new concern: their own tech-savvy, disaffected youth.”

“The world has seen interest in change expressed from within Iran, and this may prove to be the most destabilizing outcome of the protests. The regime’s brutalities streamed around the globe. The world saw the dissent; the regime knows the world saw the dissent.”

This idea of shared awareness appeals to me a lot, not least because of my work on the Ushahidi platform since the tool—when used correctly—can generate shared awareness. But why is shared awareness even important in this context?

As Shirky recently noted here, “social media tools provides participants with ’shared awareness,’ the ability of each member of a group to not only understand the situation at hand but also understand that everyone else does, too.” Dan Drezner takes it one step further, arguing here that, “the ability of the state to repress can evaporate […] at moments when a critical mass off citizens recognizes their mutual dissatisfaction with their government.”

For me, one of the most salient points that Howard makes in the prologue to this book is this: “The initial conditions for social movement organizing are very different from those of the pre-internet era.” Here are some other key take-aways:

“In contemporary systems of political communication, citizens turn to the Internet as a source of news and information in times of political crisis. It is not only that online social networking services are influential as a communications media; rather, they are now also a fundamental infrastructure for social movements. And the Internet globalizes local struggles.”

“Information and communication technologies are the infrastructure for transposing democratic ideals from community to community. They support the process of learning new approaches to political representation, of testing new organizational strategies, and of cognitively extending the possibilities and prospects for political transformation from one context to another.”

“But it would be a mistake to tie any theory of social change to a particular piece of software. In the summer of 2009 the Iranian insurgency was very much shaped by several digital communication tools, which allowed social movements within the country to organize protests and exchange information and made it possible for those groups to maintain contact with the rest of the world.”

“Traditional radio and televised appeals did not figure in the mobilization, and they are not very important to understanding what happened in Iran last summer.”

“If new information technologies such as mobile phones and the Internet provided the communications infrastructure for mobiliza- tion, was the lack of democratic transition a technological or social failing?”

This last question is spot on and for me the correct way to phrase the debate on digital activism in repressive environments. The question can also be applied to deployments of the Ushahidi platform, i.e., is the lack of impact of an Ushahidi deployment a technological or social failing?

Howard makes a number of points in his prologue that made me think about the Ushahidi and SwiftRiver platforms. For example,

“Authoritarian regimes always conduct propaganda battles over broadcast media. But what is the regime countermeasure for the chilling effects of a plea from someone in your social network who has been a victim of police brutality?”

“Rafsanjani developed a plan for ad hoc exit polling by mobile phones. Deliberative democracy theorists argue that independent exit polling is a key logistical feature of healthy election practices. This probably explains why disabling mobile phone services is so important for discouraging any organized measurement of how rigged a contemporary election may be.”

“Specialty Persian news channels in Los Angeles received hundreds of digital videos daily, and YouTube became the repository for the digitally captured, lived experiences of the chaotic streets of Tehran. On June 20, Neda Agha-Soltan was shot dead at a demonstration, and her death was caught on several mobile phone cameras.”


Impact of Technology on Democracy and Activism: Findings from Multiple Statistical Studies

Chapter 2 of my dissertation consists of a literature review on the impact of the Internet and mobile phones on democracy and activism. The first part of this literature view focuses specifically on analyzing the results from all the peer-reviewed quantitative studies that currently exist on the topic. The second part reviews more micro-level qualitative research. Part 1 is available here as a 7-page PDF. Part 2 will be available shortly.

Here is the list of studies reviewed in Part 1:

Eyck, Toby. 2001. “Does Information Matter? A research note on information technologies and political protest,” Social Science Journal, 38(2001): 147-160.

Howard, Philip. 2010. The Digital Origins of Dictatorship and Democracy: Information Technology and Political Islam. (Oxford University Press: Oxford, England).

Groshek, Jacob. 2010. “A Time-Series, Multinational Analysis of Democratic Forecasts and Internet Diffusion,” International Journal of Communication, 4(2010): 142-174.

Groshek, Jacob. 2009. “The Democratic effects of the Internet, 1994-2003: A Cross-National Inquiry of 152 countries,” The International Communication Gazette, 71(3): 115-136.

Meier, Patrick. 2011. “The Impact of the Information Revolution on Protest Frequency in Repressive Contexts,” doctoral dissertation, The Fletcher School, Tufts University.

Miard, Fabien. 2009. “Call for Power: Mobile Phones as Facilitators of Political Activism,” paper presented at the 50th Annual Convention of the International Studies Association (ISA), February 2009, New York.

I’m particularly keen on getting feedback on my draft, especially if you think I’ve missed a statistical study or find any errors in my analysis. Thank you.