Tactical memory: The politics of openness in the construction of memory

Those in the openness movement believe that access to information is inherently democratic, and assume the effects of openness will all be good from the movement’s perspective. But means are not ends, nothing is inevitable, and just what will be done with openly available information once achieved is rarely specified. One implicit goal of the openness movement is to create and sustain politically useful memory in situations in which official memory may not suffice, but to achieve this, openness is not enough. With the transition from a panopticon to a panspectron environment, the production of open information not only provides support for communities but also contributes to surveillance. Proprietary ownership of information is being challenged, but there is erosion of ownership in the sense of being confident in what is known. Some tactics currently in use need to be re–evaluated to determine their actual effects under current circumstances. Successfully achieving tactical memory in the 21st century also requires experimentation with new types of tactics, including those of technological discretion and of scale as a medium. At the most abstract level, the key political battle of the 21st century may not be between particular political parties or ideologies but, rather, the war between mathematics and narrative creativity.

[1]  Jerker Rönnberg,et al.  Collaboration and Memory: Effects of Dyadic Retrieval on Different Memory Tasks , 1996 .

[2]  J. Kloppenburg,et al.  Biotechnology to the rescue? Twelve reasons why biotechnology is incompatible with sustainable agriculture , 1996 .

[3]  R. Posner Legal Reason: The Use of Analogy in Legal Argument , 2006 .

[4]  Qi Wang,et al.  On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.

[5]  Jennifer L. Saulino Locating Inevitable Disclosure's Place in Trade Secret Analysis , 2002 .

[6]  C. Dewdney Last Flesh: Life in the Transhuman Era , 1998 .

[7]  Gracie Lawson-Borders,et al.  Blogs in Campaign Communication , 2005 .

[8]  Toru Fujiwara,et al.  Security against Inference Attacks on Negative Information in Object-Oriented Databases , 2002, ICICS.

[9]  Gunter Dueck Panopticon , 2006, Informatik-Spektrum.

[10]  J. Abbate,et al.  Inventing the Internet , 1999 .

[11]  Ramakrishnan Srikant,et al.  Privacy-preserving data mining , 2000, SIGMOD '00.

[12]  Craig Calhoun Indirect Relationships and Imagined Communities: Large-Scale Social Integration and the Transformation of Everyday Life , 2019, Social Theory for a Changing Society.

[13]  Sandra Braman Defining information: An approach for policymakers , 1989 .

[14]  Christina Schwenkel Recombinant History: Transnational Practices of Memory and Knowledge Production in Contemporary Vietnam , 2006 .

[15]  Sue Lowry Inevitable Disclosure Trade Secret Disputes: Dissolutions of Concurrent Property Interests , 1988 .

[16]  N. Hamler The Impending Merger of the Inevitable Disclosure Doctrine and Negative Trade Secrets: Is Trade Secrets Law Headed in the Right Direction? , 2000 .

[17]  Wright Professor Stephen,et al.  Rites of Passage , 2010 .

[18]  Duminda Wijesekera,et al.  Policy-based dissemination of partial web-ontologies , 2005, SWS '05.

[19]  I. Good,et al.  Fractals: Form, Chance and Dimension , 1978 .

[20]  Bonnie A. Nardi,et al.  Information Ecologies: Using Technology with Heart , 1999 .

[21]  I. Molho,et al.  The Economics of Information: Lying and Cheating in Markets and Organizations , 1997 .

[22]  Hoeteck Wee,et al.  Toward Privacy in Public Databases , 2005, TCC.