232
Views
3
CrossRef citations to date
0
Altmetric
Original Articles

Seeing mobility: how software engineers produce unequal representations

Pages 27-47 | Received 20 Dec 2014, Accepted 05 Feb 2016, Published online: 23 Mar 2016
 

ABSTRACT

Data produced by mobile networks are frequently presented as useful to understanding social phenomena related to human behavior. The risks associated with making use of massive datasets are often framed in terms of privacy, security, intellectual property, or liability. I show that the risks of mobile data sensing are not reducible to privacy, but are also related to how software engineers produce representations of individuals or populations. I characterize software engineering as a practice of producing abstractions and categorizations by articulating discursive and material elements. These may contribute to rendering certain groups of individuals invisible. If unaddressed, these risks can have consequences at least as serious as privacy violations.

Acknowledgements

The author would like thank all the people behind this project, specially Markus Bylund and Eric Oluf Svee, who also helpfully commented and reviewed early drafts of the manuscript. He would also like to thank those who contributed with discussions and comments on early drafts of the analysis, especially Magnus Boman and Nina Wormbs. Finally, the author would like to thank those who reviewed and commented on final drafts of the manuscript in particular the anonymous reviewers of Engineering Studies, Kacey Beddoes, and especially Gary Downey, whose comments helped improve and clarify this manuscript. This research was partially funded by FCT (Fundação para a Ciência e a Tecnologia) with the grant SFRH/BD/60803/2009.

Notes

1Anderson, “The End of Theory,” 2008.

2Laurila et al., “The Mobile Data Challenge,” 2012; González, Hidalgo, and Barabási, “Understanding Individual Human Mobility Patterns,” 2008.

3Martin, “How Docomo Plans to Use Mobile Data for City Planning & Earthquake Preparation,” 2011.

4Becker et al., “Human Mobility Characterization from Cellular Network Data,” 2013; Nanni et al., “Advanced Knowledge Discovery on Movement Data with the GeoPKDD System,” 2010.

5Friedman and Nissenbaum, “Bias in Computer Systems,” 1996.

6Latour, Circulating Reference, 1999.

7Giannotti et al., “Unveiling the Complexity of Human Mobility by Querying and Mining Massive Trajectory Data,” 2011.

8Giannotti and Pedreschi, “Mobility, Data Mining and Privacy,” 2008, pp. 4–9.

9Ratti et al., “Mobile Landscapes,” 2006.

10Laurila et al., “The Mobile Data Challenge,” 2012.

11Lane et al., “A Survey of Mobile Phone Sensing,” 2010.

12Manyika et al., “Big Data,” 2011.

13Floridi, “Big Data and Their Epistemological Challenge,” 2012; boyd and Crawford, “Critical Questions for Big Data,” 2012; Andrejevic, “Big Data, Big Questions,” 2014.

14Berry, “The Computational Turn,” 2011.

15boyd and Crawford, “Critical Questions for Big Data,” 2012.

16Floridi, “Big Data and Their Epistemological Challenge,” 2012.

17Andrejevic, “Big Data, Big Questions,” 2014.

18boyd and Crawford, “Critical Questions for Big Data”, 2012.

19Pinch and Bijker, “The Social Construction of Facts and Artefacts,” 1984, pp. 105–128.

20Doing, “Applying Ethnographic Insight to Engineering Ethics,” 2012.

21Star, “The Politics of Formal Representations,” 1995; Vinck, “Taking Intermediary Objects and Equipping Work into Account in the Study of Engineering Practices,” 2011; Star, “The Ethnography of Infrastructure,” 1999; Doing, “Applying Ethnographic Insight to Engineering Ethics,” 2012; Downey, The Machine in Me, 1998.

22Abbate, Recoding Gender, 2012, pp. 73–111; ISO, IEEE, Systems and Software Engineering, 2010.

23French, “Gaps in the Gaze,” 2014.

24Latour, Circulating Reference, 1999.

25Juhl and Lindegaard, “Representations and Visual Synthesis in Engineering Design,” 2013.

26Latour, Pandora's Hopes, 1999, p. 306.

27Carlile and Langley, How Matter Matters, 2013.

28Lethbridge, Sim, and Singer, “Studying Software Engineers,” 2005; Easterbrook et al., “Selecting Empirical Methods for Software Engineering Research,” 2008.

29Clegg, The Observation of Human Systems, 2011.

30Orlikowski, “Sociomaterial Practices,” 2007; Vinck, “Taking Intermediary Objects and Equipping Work into Account in the Study of Engineering Practices,” 2011.

31SICS Swedish ICT, http://www.sics.se.

32Espinoza et al., “Geonotes,” 2001.

33de Montjoye et al., “Unique in the Crowd,” 2013.

34Hägerstrand, “What about People in Regional Science?” 1970.

35Bylund, Sanches, and Svee, “Collecting and Associating Data,” 2010, p. 1.

36Vinck, “Taking Intermediary Objects and Equipping Work into Account in the Study of Engineering Practices,” 2011.

37Cakici and Boman, “A Workflow for Software Development Within Computational Epidemiology,” 2011.

38At the time of development, 2008, we did not have access to GPS equipped phones.

39Latour, Science in Action, 1978, p. 227.

40Other similar proofs had been presented earlier in workshops, such as the comparison between trains and cars navigating through Sweden: Svee, Sanches, and Bylund, “Time Geography Rediscovered,” 2009.

41Sanches et al., “Knowing Your Population,” 2013.

42Ratti et al., “Mobile Landscapes,” 2006.

43Ratti et al., “Mobile Landscapes,” 2006; Kang et al., “Analyzing and Geo-visualizing Individual Human Mobility Patterns Using Mobile Call Records,” 2010; Benitez, “Review of Traffic Data Estimations Extracted from Cellular Networks,” 2008.

44Burrows and Gane, “Geodemographics, Software and Class,” 2006.

45Andrejevic, “Big Data, Big Questions,” 2014.

46Edwards et al., “The Infrastructure Problem in HCI,” 2010.

47Legeby and Marcus, “Does the Urban Structure of Swedish Cities Inhibit the Sharing of Public Space?” 2008.

48Bunch, “GIS for Marginalization or Empowerment in Environmental Management,” 2001.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.