Malala Yousafzai, along with many other fine candidates, may not have won the Nobel Prize for Peace. But that does not make her quest or the others less worthy.
Most ideas for promoting peace are common-sense outlines for fairness and justice, and these ideals begin in the home, and such is the case about education as the basis for any endeavor. Motivation to improve one's self and one's community is an existential force. Yet, one individual's motivation can also be viewed as criticism of the status quo, an entire community or society, by the many others who think differently and fear change. Each individual must balance internal motivation, his or her own recognition of essential truths, with the ability to absorb the suggestions and understand the motivations of others. Critics can never be sure if their heated denial deters or strengthens the internal motivation of the other.
And how to assess such competing motivations? Motivation is notable when an individual has no personal stake or gain in the battle, no connection to the result, and instead fights for the many others who have no voice. Education can stir or restrain such motivations.
The challenge is formidable for the Nobel Prize Selection Committee. It's wise for the rest of us to assess and reassess our own motivations and the characters about whom we write. To truly win at life, we must form and understand our own motivation, and not simply accept a set of plans or ideology.
Photo of outdoor classroom in Bamozai, Afghanistan, courtesy of Capt. John Severns, US Air Force and Wikimedia Commons.
Wednesday, October 23
Tuesday, October 15
A word
Censorship and religious extremism go hand in hand. Fearful of free thought and the opinions voiced by other, the extremists are desperate to control others. The efforts to censor typically backfire and demean the religion or system of governance by suggesting it cannot bear scrutiny from others.
An appeals court in Malaysia has ruled that the term "Allah" is exclusive to Islam and use by others to refer to another god "could cause public disorder," reports the BBC News. Christians and people of other faiths in Malaysia often use the word to refer to their respective higher power. "Although religious freedom is guaranteed by Malaysian law, the country's Christian, Buddhist and Hindu minorities have long complained that the government infringes on their constitutional right to practice religion freely — accusations the government denies," explains Al Jazeera.
Allah is not a Malay word. The origin of the word is Arabic and a contraction of al-'il‘h, or "the god," according to the Oxford Dictionaries. Arab and Christian Muslims alike rely on the word to refer to the higher power.
The court ruling does not address use of the word by non-Muslims to refer to the central figure of Islam.
Fear of Beauty relies on the word at least 75 times, and, no, the censors in Malaysia would not enjoy the plot. The novel criticizes the constant pressure and bullying from those in our communities who try to censor and control others - and deny cooperation and commonality. Adherents who must control others are deeply insecure.
Photo of St. Paul's Church in Malacca, courtesy of Wikimedia Commons and Bjørn Christian Tørrissen.
An appeals court in Malaysia has ruled that the term "Allah" is exclusive to Islam and use by others to refer to another god "could cause public disorder," reports the BBC News. Christians and people of other faiths in Malaysia often use the word to refer to their respective higher power. "Although religious freedom is guaranteed by Malaysian law, the country's Christian, Buddhist and Hindu minorities have long complained that the government infringes on their constitutional right to practice religion freely — accusations the government denies," explains Al Jazeera.
Allah is not a Malay word. The origin of the word is Arabic and a contraction of al-'il‘h, or "the god," according to the Oxford Dictionaries. Arab and Christian Muslims alike rely on the word to refer to the higher power.
The court ruling does not address use of the word by non-Muslims to refer to the central figure of Islam.
Fear of Beauty relies on the word at least 75 times, and, no, the censors in Malaysia would not enjoy the plot. The novel criticizes the constant pressure and bullying from those in our communities who try to censor and control others - and deny cooperation and commonality. Adherents who must control others are deeply insecure.
Photo of St. Paul's Church in Malacca, courtesy of Wikimedia Commons and Bjørn Christian Tørrissen.
Labels:
censorship,
Malaysia,
religion
Monday, September 30
Storytelling
Breaking Bad offered lessons on life and storytelling.
Trust is fleeting. Does anyone ever know who they can trust? Trust entails imagining what others say and think about you. Imagine the worst and then how they might describe you to others, whether they will will stop to listen or interrupt what they're doing to lend a hand.
What’s left unsaid can shape opinions as much as what’s said.
Any individual character has the potential for surprise. Do not make the mistake of dismissing others. They can guess what you’re thinking and will react.
You can’t escape family. The bonds may vary, and the attachments will annoy, even enrage others who don’t have similar bonds.
Characters are invincible when they are calm and stop caring.
The ordinary can be extraordinary, and it’s up to you not to overlook it.
Your life is a story and, believe me, you want to shape the telling with the choices you make every day. Stories can go awry when choices are no longer made, when characters stop living deliberately and let events slide out of control. Confidence can slip into panic and resignation and back again. Yet characters who practice observation, patience, secrets, and other forms of cautious deliberation, their stories are suspenseful and no less meaningful.
Photo of Bryan Cranston as Walter White, courtesy of AMC's Breaking Bad and Wikimedia.
Labels:
character,
storytelling,
writing
Wednesday, September 11
How we read news
Anyone who loves newspapers hopes that Jeff Bezos can innovate and revive interest in the Washington Post, the newspaper industry and daily habits of reading news. Yet the motivation behind the purchase could be to protect the status quo of the internet rather than innovate.
You see, it's in the interest of internet titans to protect newspapers. The loss of newspapers as a trusted source of news would eventually weaken most search engines, blogs, investment guidance and many other online offerings. Internet readers who devour news expect articles and opinion essays to be grounded in fact and research.
The news industry has ignored the demand side of the business and customer trends. Pricing models for digital news rely on old habits and not new ones. Newspapers like The New York Times continue to fund news reporting with targeted ads and digital subscriptions that offer access to the entire newspaper for a lump sum.
But that's not how we read anymore, at least on the internet. Few internet users limit their reading to a single newspaper anymore. Few limit the activity to a half hour in the morning or evening, scanning headlines and then methodically reading most articles. Instead, we scan headlines throughout the day, bouncing about from newspaper to newspaper. And digital news services deliver indices based on our careers, political leanings, and geographic location - and we proceed to read a story from Hong Kong, then one from New York or London, before moving on to India.
A digital subscription for the New York Times runs about 3.75 per week, or about 53 cents per day (and includes a Smartphone App - annoying for subscribers who don't own smartphones; internet customershave come to expect custom-tailored services and products, and refuse to pay for unwanted "extras," but that's another story ...) Like many readers, I also want to read stories from the Washington Post, Asia Sentinel, Los Angeles Times, Miami Herald, New Haven Register, Telegraph, Daily Sentinel, Financial Times, Wall Street Journal, Der Spiegel, the Guardian and many more. Of course, the cost of so many subscriptions - offering so few options would add up. Few readers will purchase more than several subscriptions, and a news hound who purchased three subscriptions would feel uninformed.
In the meantime, most newspapers offer a selection of articles for free, and adequate summaries can be found on blogs. And many sites are a source of free opinion essays like Project Syndicate, YaleGlobal Online, Reuters, Bloomberg and more. Publishers of the New York Times and other newspapers aren't clueless and recognize all this - they should also realize that most subscription offers are absolute turn-offs. Circulation analysts should know, too, how many articles readers actually click, the length of time spent per article, along with traffic sources. I'd guess that plenty of entry and exit sites are other newspapers. Finally, newspaper subscription sites that offer special prices for the first 12 weeks and do not explain long-term pricing are not encouraging or expecting customer loyalty.
If anything, newspapers should find ways to reward loyal, long-time customers rather than gouge them.
Newspapers must develop pricing models based on customer perceptions of value. Publishers could charge a small fee for each story, perhaps a penny or two, perhaps more for must-read stories. And eventually publishers might even charge a small fee for scanning all headlines. For the most loyal readers, publishers could offer package deals, say 20 articles a month, again for a small fee. Smart publishers would cap the weekly fee at $5 or so, giving those willing to pay that much complete access.
Yes, each reader will likely read a few articles, but more readers overall will click. With more tailored pricing models, title and content would become more powerful. The number of popular journalists would become more concentrated as some stories are irresistible and many readers would pay.
In setting prices, newspaper publishers focus too much on supply and not enough on customer demand. "The theory of price says that the point at which the benefit gained from those who demand the entity meets the seller's marginal costs is the most optimal market price for the good/service." John Naughton of the Observer touches on this basic economic principal and transaction costs in an article that remembers economist Ronald Coase:
"If the costs of making an exchange are greater than the gains which that exchange would bring," Coase wrote, "that exchange would not take place and the greater production that would flow from specialisation would not be realised. In this way, transaction costs affect not only contractual arrangements, but also what goods and services are produced. Not to include transaction costs in the theory leaves many aspects of the workings of the economic system unexplained, including the emergence of the firm, but much else besides."
- An online newspaper could distribute work from individual journalists or beats as blogs. Front pages and section content of newspapers are in constant flux, updated minute by minute, defeating the notion of a single newspaper edition. Deadlines come with every passing minute.
- Editors may invite more readers to contribute articles and opinions, earn and interact – much like Kindle Publishing Platform.
- Advertisers could be given more choice on ad placement, not just with sections but specific articles or journalists. The publisher could also pass along detailed metrics on reader behavior. Online ad sales must offer paying customers more for their money.
- Expect more partnerships. Newspapers already collaborate with Reuters or Associated Press. They could also could collaborate and bundle online delivery services, similar to the distribution of cable television shows.
- The Post may distribute Kindles or other devices to subscribers at a low fee, which would increase dependence on the hardware and expand the market for other services from companies like Amazon. The company's model has foreshadowed such connections, suggested analyst Ben Bajarin in Tech.pinions before the purchase, “Namely, how hardware as an extension of a service may represent the ideal way to consume said service.”
The best content online depends on newspapers and their journalists. Most stories in broadcasting start out from a newspaper report, and the most informed analysis in television discussions and blogs often relies on the solid, original reporting provided by print publications. Regular, organized delivery of information informs cultural, government, business and social trends, too, often percolating from grassroots reporting. Strong communities are well informed with the help of strong, independent newspapers that are in the business of observing communities, making decisions about what to cover, and pushing readers to venture into new territory and react and think on their own. People who read their local newspapers are smarter consumers.
The online titans - and citizens - cannot afford for newspapers to go down.
The 1891 painting of Woman Reading a Newspaper, courtesy of Norman Garstin and Wikimedia Commons.Garstin was born in Ireland and raised by grandparents. "He first set out to be an engineer, then an architect, and then sought his fortune prospecting for diamonds in South Africa n the company of Cecil Rhodes," notes the bio from Penlee House Gallery and Museum.
Susan Froetschel is a journalist and author of the novel Fear of Beauty.
Labels:
publishing,
reading
Monday, September 2
Pranksters
Dutch-Iranian filmmaker Bahram Sadeghi called the National Security Agency for assistance in tracking down an email that had been accidentally deleted, as described by Brian Fung in the Washington Post. The first NSA staffer was professional, going beyond the call of duty, patiently explaining that the agency could not help.
"We're not going to be able to retrieve something that you deleted. That's not what we do." He then goes on to explain that he was born in Iran, and perhaps is "a person of interest for NSA." She insisted that is not what NSA does, and repeatedly asked for the caller's name and server. When Sadeghi requests additional assistance, the next NSA staffer is stern, no-nonsense and quickly disconnects the prank call.
Expect other pranksters, comedians or the loose-knit members of Anonymous to soon pile on with ridiculous calls and emails. Jokers claiming to be Iranian, Pakistani or Ohioan will include phrases designed to capture attention, with the hopes of overwhelming the surveillance machine. A small group working non-stop for a few hours, could send out thousands of notes to other email users with a cryptic phrase along the lines, "The attack begins 5 pm Friday..," referring to a marketing campaign, party or some other event. While it might be regarded as sedition for citizens to thwart their own nation's security apparatus, in a global world of communications, those opposed to surveillance could organize - US citizens prank-calling Britain's M16 or GCHQ or China's MSS just as a Dutch-Iranian filmmaker reached out to the NSA.
Recipients of calls or emails would have to be friends or acquaintances, at least in the United States. For example, the terms of agreement for most ISP accounts prohibit spam. "Federal law says that some spam may be lawful," according to attorney Timothy Walton on Internet Law Radio. "Congress, in passing the CAN-Spam Act [of 2003], said that it is lawful to send spam if it does not run afoul of the specifics of the law, which generally means that it’s not deceptive, false or misleading." Successful suits by the internet service providers or the FTC could impose penalties per message sent, though the law is not widely enforced.
We can expect the NSA debacle to lead to new enforcement, language, secretive behaviors and efforts to maintain privacy of email addresses, along the lines of do-not-email lists, such as the US Do-Not-Call Registry, started in 2003 and already used by many telephone customers or unlisted numbers. Businesses will emerge to provide - or claim to provide - the desired phone numbers or emails.
Federal law in the United States allows recording of phone calls and other electronic communications with the consent of at least one party to the call, according to a fact sheet on "Wiretapping and Eavesdropping on Telephone Calls" from the Privacy Rights Clearinghouse. Telephone company and employers can listen to and record your calls as well. "To stay within the law, you may wish to refrain from taping calls you make, but be aware that in certain situations others may be recording your conversations with them," the fact sheet advises.
Who's at risk for illegal wiretapping? According to the fact sheet, those who are "in a position where others might benefit from listening" to the calls: high-stakes corporate, political or legal organizers or planners.
The Can-Spam Act of 2003 and Do Not Call Registry offer guidelines on sending behavior compliance but neglect receiver compliance. In July of 2003, I described the public frustration with telemarketing calls and spam in an opinion essay for the Hartford Courant, "Running Rings Around Telemarketers":
One day, after our family dinner was interrupted by the third telemarketing call, I recognized an opportunity. At first, I let my voice catch, telling the telemarketer that I was unemployed and losing my home But I quickly realized the need for a better line after the eager salesman assured me that my credit was still in good standing....
'Every telemarketer has their favorite story about the tough customer, the funny customer,' says Tim Searcy, executive director of the American Telemarketers Association.... Searcy also says that telemarketers are trained to handle difficult calls with a polite farewell and an end to the connection.
I was cut from the list of companies selling long-distance telephone services, after callers asked to speak to the decison-maker of the household and I explained that our decision-maker was Bimp, the cat. My offer to translate was politely declined.
At the time, I wrote that consumers can't depend on lists and laws to protect them. Lists are ignored and laws are broken.
Many are determined to prove that mass surveillance is pointless and a waste of money. As Chris Chambers warns in the Guardian, "a warning: indiscriminate intelligence-gathering presents a grave risk to our mental health, productivity, social cohesion, and ultimately our future."
Citizens irritated about telemarketing or surveillance will find ways to needle the unwanted callers, spammers or listeners with uncivil language or acts of civil disobedience.
"We're not going to be able to retrieve something that you deleted. That's not what we do." He then goes on to explain that he was born in Iran, and perhaps is "a person of interest for NSA." She insisted that is not what NSA does, and repeatedly asked for the caller's name and server. When Sadeghi requests additional assistance, the next NSA staffer is stern, no-nonsense and quickly disconnects the prank call.
Expect other pranksters, comedians or the loose-knit members of Anonymous to soon pile on with ridiculous calls and emails. Jokers claiming to be Iranian, Pakistani or Ohioan will include phrases designed to capture attention, with the hopes of overwhelming the surveillance machine. A small group working non-stop for a few hours, could send out thousands of notes to other email users with a cryptic phrase along the lines, "The attack begins 5 pm Friday..," referring to a marketing campaign, party or some other event. While it might be regarded as sedition for citizens to thwart their own nation's security apparatus, in a global world of communications, those opposed to surveillance could organize - US citizens prank-calling Britain's M16 or GCHQ or China's MSS just as a Dutch-Iranian filmmaker reached out to the NSA.
Recipients of calls or emails would have to be friends or acquaintances, at least in the United States. For example, the terms of agreement for most ISP accounts prohibit spam. "Federal law says that some spam may be lawful," according to attorney Timothy Walton on Internet Law Radio. "Congress, in passing the CAN-Spam Act [of 2003], said that it is lawful to send spam if it does not run afoul of the specifics of the law, which generally means that it’s not deceptive, false or misleading." Successful suits by the internet service providers or the FTC could impose penalties per message sent, though the law is not widely enforced.
We can expect the NSA debacle to lead to new enforcement, language, secretive behaviors and efforts to maintain privacy of email addresses, along the lines of do-not-email lists, such as the US Do-Not-Call Registry, started in 2003 and already used by many telephone customers or unlisted numbers. Businesses will emerge to provide - or claim to provide - the desired phone numbers or emails.
Federal law in the United States allows recording of phone calls and other electronic communications with the consent of at least one party to the call, according to a fact sheet on "Wiretapping and Eavesdropping on Telephone Calls" from the Privacy Rights Clearinghouse. Telephone company and employers can listen to and record your calls as well. "To stay within the law, you may wish to refrain from taping calls you make, but be aware that in certain situations others may be recording your conversations with them," the fact sheet advises.
Who's at risk for illegal wiretapping? According to the fact sheet, those who are "in a position where others might benefit from listening" to the calls: high-stakes corporate, political or legal organizers or planners.
The Can-Spam Act of 2003 and Do Not Call Registry offer guidelines on sending behavior compliance but neglect receiver compliance. In July of 2003, I described the public frustration with telemarketing calls and spam in an opinion essay for the Hartford Courant, "Running Rings Around Telemarketers":
One day, after our family dinner was interrupted by the third telemarketing call, I recognized an opportunity. At first, I let my voice catch, telling the telemarketer that I was unemployed and losing my home But I quickly realized the need for a better line after the eager salesman assured me that my credit was still in good standing....
'Every telemarketer has their favorite story about the tough customer, the funny customer,' says Tim Searcy, executive director of the American Telemarketers Association.... Searcy also says that telemarketers are trained to handle difficult calls with a polite farewell and an end to the connection.
I was cut from the list of companies selling long-distance telephone services, after callers asked to speak to the decison-maker of the household and I explained that our decision-maker was Bimp, the cat. My offer to translate was politely declined.
At the time, I wrote that consumers can't depend on lists and laws to protect them. Lists are ignored and laws are broken.
Many are determined to prove that mass surveillance is pointless and a waste of money. As Chris Chambers warns in the Guardian, "a warning: indiscriminate intelligence-gathering presents a grave risk to our mental health, productivity, social cohesion, and ultimately our future."
Citizens irritated about telemarketing or surveillance will find ways to needle the unwanted callers, spammers or listeners with uncivil language or acts of civil disobedience.
Labels:
prank calls,
surveillance
Tuesday, August 27
Legacy
The Linda Norgrove Foundation, based in Scotland, will partner with Canadian Women for Women in Afghanistan to develop literacy programs for girls and women and expand the Afghan library network.
"Some 840 women will receive literacy classes and more than 20,000 people are expected to use the community libraries being set up by Afghanistan Reads, a community literacy project supported by the Norgrove Foundation," reports David Ross for HeraldScotland.com.
USAID has contributed funds for the programs. Norgrove, an aidworker in Afghanistan, was kidnapped and later killed during a failed rescue attempt.
John Norgrove, her father, maintains that education is "fundamental to the future of Afghanistan."
Photo of Afghan girl reading from a comic book distributed by Afghan soldiers, courtesy of US Sgt. Daniel P. Shook and Wikimedia Commons.
"Some 840 women will receive literacy classes and more than 20,000 people are expected to use the community libraries being set up by Afghanistan Reads, a community literacy project supported by the Norgrove Foundation," reports David Ross for HeraldScotland.com.
USAID has contributed funds for the programs. Norgrove, an aidworker in Afghanistan, was kidnapped and later killed during a failed rescue attempt.
John Norgrove, her father, maintains that education is "fundamental to the future of Afghanistan."
Photo of Afghan girl reading from a comic book distributed by Afghan soldiers, courtesy of US Sgt. Daniel P. Shook and Wikimedia Commons.
Wednesday, August 21
Privacy
At least one major telecommunications firm - the one I depend on - has changed its privacy policy to advise customers that they must comply with government requests to collect our connections and data. The privacy policy was updated soon after a former National Security Agency contract worker exposed secret surveillance programs involving telecommunications firms.
Siobahn Gorman and Jennifer Valentino-DeVries report for the Wall Street Journal:
"The National Security Agency - which possesses only limited legal authority to spy on U.S. citizens - has built a surveillance network that covers more Americans' Internet communications than officials have publicly disclosed, current and former officials say. The system has the capacity to reach roughly 75% of all U.S. Internet traffic in the hunt for foreign intelligence.... The programs, code-named Blarney, Fairview, Oakstar, Lithium and Stormbrew, among others, filter and gather information at major telecommunications companies. Blarney, for instance, was established with AT&T Inc., T -0.92%former officials say."
So I called AT&T today, introduced myself as a customer and asked if my data had been passed on to the NSA. My call was forwarded to the president's office and customer service.
"Customer service has no way of finding this out," responded the young man. "This is way beyond the scope of customer service." He added it was his understanding that the company was complying to "a legal request" of a government agency. "The company has no choice but to participate and we can't share with you the level of participation."
As explained in previous blog entries, a mystery author who researches and writes about Afghanistan and terrorism and women's rights has reason to be concerned about compromised data and content. Notably, the new contract with my publisher prohibits submission of manuscripts by email and requests submission by physical disk and mail. Authors, business owners and anyone who prepares creative content can no longer trust that their trade and creative secrets are safe from government prying or abuse of unscrupulous government employees.
The privacy policy is an eyeopener:
We may provide Personal Information to non-AT&T companies or other third parties for purposes such as:
The policy also allows the company to keep "information about you in our business records while you are a customer, or until it is no longer needed for business, tax, or legal purposes." We cannot say we weren't warned, and we deserve as much for years of ignoring terms of agreement for software and services.
One contradictory aspect of the policy, though, is under the section on Customer Privacy Controls and Choices: "You can review and correct your Personal Information collected by us." But how can we manage that if the company is prohibited from telling us what is being collected and how it is interpreted?
In calling AT&T corporate offices, the phone message responds: "Our vision is to connect people with their world and to do it better than anyone else."
AT&T: Your World Delivered. To the NSA?
Siobahn Gorman and Jennifer Valentino-DeVries report for the Wall Street Journal:
"The National Security Agency - which possesses only limited legal authority to spy on U.S. citizens - has built a surveillance network that covers more Americans' Internet communications than officials have publicly disclosed, current and former officials say. The system has the capacity to reach roughly 75% of all U.S. Internet traffic in the hunt for foreign intelligence.... The programs, code-named Blarney, Fairview, Oakstar, Lithium and Stormbrew, among others, filter and gather information at major telecommunications companies. Blarney, for instance, was established with AT&T Inc., T -0.92%former officials say."
So I called AT&T today, introduced myself as a customer and asked if my data had been passed on to the NSA. My call was forwarded to the president's office and customer service.
"Customer service has no way of finding this out," responded the young man. "This is way beyond the scope of customer service." He added it was his understanding that the company was complying to "a legal request" of a government agency. "The company has no choice but to participate and we can't share with you the level of participation."
As explained in previous blog entries, a mystery author who researches and writes about Afghanistan and terrorism and women's rights has reason to be concerned about compromised data and content. Notably, the new contract with my publisher prohibits submission of manuscripts by email and requests submission by physical disk and mail. Authors, business owners and anyone who prepares creative content can no longer trust that their trade and creative secrets are safe from government prying or abuse of unscrupulous government employees.
The privacy policy is an eyeopener:
We may provide Personal Information to non-AT&T companies or other third parties for purposes such as:
- Responding to 911 calls and other emergencies;
- Complying with court orders and other legal process;
- To assist with identity verification, and to prevent fraud and identity theft;
- Enforcing our agreements and property rights; and
- Obtaining payment for products and services that appear on your AT&T billing statements
- We collect some information on an anonymous basis. We also may anonymize the personal information we collect about you.
- We obtain aggregate data by combining anonymous data that meet certain criteria into groups.
- When we employ non-AT&T companies to anonymize or aggregate data on our behalf, the requirements for sharing Personal Information with non-AT&T companies apply.
- We may share aggregate or anonymous information in various formats with trusted non-AT&T entities, and may work with those entities to do research and provide products and services.
The policy also allows the company to keep "information about you in our business records while you are a customer, or until it is no longer needed for business, tax, or legal purposes." We cannot say we weren't warned, and we deserve as much for years of ignoring terms of agreement for software and services.
One contradictory aspect of the policy, though, is under the section on Customer Privacy Controls and Choices: "You can review and correct your Personal Information collected by us." But how can we manage that if the company is prohibited from telling us what is being collected and how it is interpreted?
In calling AT&T corporate offices, the phone message responds: "Our vision is to connect people with their world and to do it better than anyone else."
AT&T: Your World Delivered. To the NSA?
Labels:
privacy,
self-censorship,
surveillance
Subscribe to:
Posts (Atom)