ArticlePDF Available

Information Infrastructure as Rhetoric: Tools for Analysis

Authors:

Abstract

From Poroi: Our lived worlds are saturated in information infrastructure, the systematized technologies that organize the information that publics use to inform themselves about subjects as diverse as politics or energy consumption (Bowker & Star, 1999). Infrastructure provides the invisible scaffolding for discovery, dissemination, and access to information. Since information is concomitant with knowledge, criticality, and awareness, the form of infrastructure has real consequences for the forms of public communication, knowledge, and political life that are already being studied by rhetoricians.
Poroi
http://ir.uiowa.edu/poroi/
Volume 8, Issue 1 2012 Article 10
Information Infrastructure as Rhetoric: Tools
for Analysis
Nathan R. Johnson
Purdue University
Copyright c
2012 by the authors. This paper is posted at Iowa Research Online.
http://ir.uiowa.edu/poroi/vol8/iss1/10
Communication: Inquiry, Energy, and Risk
ARST Reports
Information
as Rhetoric:
Analysis
Nathan R. Johnson
Department of English, Purdue University
Lafayette, IN USA
Poroi
8, 1 (April 2012)
Our lived world
s are
systematized technologies that organize the information that
to inform themselves about subjects as diverse as politics or energy
consumption
(Bowker & Star, 1999)
scaffolding for discovery, dissemination, and access t
information is concomitant
the form of infrastructure has real consequences
communication,
knowledge, and political life that are already being
studied by rhetoricians.
own knowledge
technologies
to the scholarship of our peers
benefit
from their ability to organize academic
access to
the work of scholars. The intellectual work of creating these
databases builds in
should be organize
d. For instance, many database vendors provide access
to their content through subject heading lists that were originally
constructed at the turn of the 20
Infrastructure materializes
uses it to organize the present and future. The work of building
infrastructure builds tec
public information
The construction of these technological monsters
rhetorical intervention.
infrastructure can
outwardly seem
when discussing
infrastructure, we begin by listing the numerous
expressions of technology that hang together as
(Bowker et al., 2010)
the numerous computer systems, classifications, wiring, software, and
interfaces that provide access to scholarly work.
condenses at
only a handful
monster to work as
Information infrastructure consists of the classifications, standards,
protocols, and algorithms that
Communication: Inquiry, Energy, and Risk
-
Information
Infrastructure
as Rhetoric:
Tools for
Nathan R. Johnson
Department of English, Purdue University
8, 1 (April 2012)
s are
saturated in information infrastructure, the
systematized technologies that organize the information that
publics use
to inform themselves about subjects as diverse as politics or energy
(Bowker & Star, 1999)
. Infrastructure provides
the invisible
scaffolding for discovery, dissemination, and access t
o information. Since
information is concomitant
with
knowledge, criticality, and awareness,
the form of infrastructure has real consequences
for the forms of
public
knowledge, and political life that are already being
studied by rhetoricians.
A notable example of infrastructural significance
lives
in one of our
technologies
: the academic databases that
provide
to the scholarship of our peers
(Borgman, 2007). Database
vendors
from their ability to organize academic
journals that
provide
the work of scholars. The intellectual work of creating these
assumptions about how the world of
scholarship
d. For instance, many database vendors provide access
to their content through subject heading lists that were originally
constructed at the turn of the 20
th
century by Librarians of C
ongress
Infrastructure materializes
the situated knowledge work of the
past and
uses it to organize the present and future. The work of building
infrastructure builds tec
hnological momentum that constructs
regime
(Hughes, 1994).
The construction of these technological monsters
should be a site of
rhetorical intervention.
Because of its apparent vastness, though,
outwardly seem
to be a daunting object
for study. Often
infrastructure, we begin by listing the numerous
expressions of technology that hang together as
a working system
(Bowker et al., 2010)
. A vendor’s database infrastructure could include
the numerous computer systems, classifications, wiring, software, and
interfaces that provide access to scholarly work.
Yet infrastructure
only a handful
of technological points that enable
the entire
monster to work as
a whole. These technological points aid
analysis.
Information infrastructure consists of the classifications, standards,
protocols, and algorithms that
organize information and communication
publics use
to inform themselves about subjects as diverse as politics or energy
the invisible
o information. Since
knowledge, criticality, and awareness,
public
knowledge, and political life that are already being
in one of our
provide
access
vendors
provide
the work of scholars. The intellectual work of creating these
scholarship
d. For instance, many database vendors provide access
ongress
.
past and
regime
s of
should be a site of
for study. Often
. A vendors database infrastructure could include
the numerous computer systems, classifications, wiring, software, and
Yet infrastructure
the entire
analysis.
Information infrastructure consists of the classifications, standards,
organize information and communication
Johnson Poroi 8, 1 (April 2012) 2
practices. Subject heading lists organize content areas in fairly
straightforward ways. They mediate the discovery of journal articles and
books. But as digital systems have become more complex, so have the
forms of infrastructural control. Search algorithms designed by Google
limit the intellectual world of novice searchers. Metadata standards
devised for information sharing via Twitter refract the information
sharing messages of its users, and while growing bodies of research are
investigating the potentials of using Twitter as a communication tool,
much less work is being done to look at information infrastructures like
Twitter as an object of study.
Communication scholars need to start looking at infrastructure
instead of through it. Investigating the rhetoric of classifications,
standards, protocols, and algorithms is an important part of
understanding modern rhetorics.
I offer three different approaches to rhetorically intervening in
information infrastructure. The first is through genealogies (Foucault,
1980; Johnson, 2009). By conducting detailed historical investigations
into the construction of infrastructure, scholars can gain an
understanding of the situated rhetorics that become embodied
technologies. This type of work would chronicle the work of
infrastructural developers who build infrastructure. For instance, one
might chart the trajectories involved in the user studies that inform the
algorithms of Google’s search.
The second approach involves rhetorical ethnography. By self-
reflectively becoming a part of the lifeworld of an infrastructure, scholars
can better understand what it means to live within infrastructure. This
type of investigation involves entering into perhaps familiar territory with
new eyes. This type of study would combine the rich analytic tools of the
rhetorical tradition with the ethnographic tools popular in anthropology.
A study might consist of using infrastructure like Twitter while
interrogating how its organizing mechanisms alter interactions that may
have been shared through other means.
The third approach involves protocological hacking (Galloway, 2004).
By becoming builders of infrastructure, rhetoricians productively take the
affirmative position of understanding the classificatory, standardizing,
protocological, and algorithmic concepts built into information
infrastructuring. We build our own infrastructural rhetorics to better
understand infrastructure. For instance, consider the value of
reimagining the scholarship of rhetorical studies through infrastructure
adapted to understanding the contemporary state of the discipline instead
of serving the needs of academic database vendors. Consider the value of
search and discovery technologies built from the disciplinary vantage
point of a rhetorician rather than an information scientist.
Work within the rhetoric of science and technology currently exists
that comes close to an investigation of infrastructure. Foundational
studies of citation, statistics, and mathematics are already investigating
the components of infrastructure (Bazerman, 1988; R. Connors, 1998; R.
J. Connors, 1999; McCloskey, 1998; Reyes M., 2004). The related
discipline of Science Studies also teems with similar studies. The rich
Johnson Poroi 8, 1 (April 2012) 3
amalgam of these previous studies can serve as the foundations for a
rhetorical study of information infrastructure. In the “age of information”
when “cyberinfrastructure” has become a significant source of power for
modern institutions, rhetoricians can do important work to describe the
tropes of infrastructure. This essay is a call for rhetorical intervention into
that information infrastructure.
References
Bazerman, C. 1988. Shaping written knowledge: The genre and activity
of the experimental article in science. Madison, WI: University of
Wisconsin Press.
Borgman, C. L. 2007. Scholarship in the digital age: Information,
infrastructure, and the internet. Cambridge: MIT Press.
Bowker, G. C., & Star, S. L. 1999. Sorting things out: Classification and
its consequences. Cambridge: MIT Press.
Bowker, G.C., Baker, K., Millerand, F. & Ribes, D. 2010. Toward
information infrastructure studies: Ways of knowing in a networked
environment. In J. Hunsinger, L. Klastrup, & M. Allen (Eds.),
International handbook of Internet research. Dordrecht; Springer,
97-117.
Connors, R.J. 1998. The rhetoric of citation systems, Part I: The
development of annotation structures from the renaissance to 1900.
Rhetoric Review, 17(1), 6-48.
Connors, R. J. 1999. The rhetoric of citation systems—Part II: Competing
epistemic values in citation. Rhetoric Review, 17(2), 219-245.
Foucault, M. 1980. Nietzsche, Genealogy, History. In D.F. Bouchard (Ed.),
Language, counter-memory, practice: Selected essays and
interviews. Ithaca: Cornell University Press, 139-165.
Galloway, A.R. 2004. Protocol: How control exists after decentralization.
Cambridge: MIT Press.
Hughes, T. P. 1994. Technological Momentum. In M.R. Smith & L. Marx
(Eds.), Does technology drive history? The dilemma of technological
determinism. Cambridge: MIT Press, 101-113.
Johnson, N. R. 2009. Technical documents as rhetorical agency. Archival
Science, 8(3), 199-215.
McCloskey, D. 1998. The Rhetoric of Economics. Madison, WI: University
of Wisconsin Press.
Reyes M. 2004. The rhetoric in mathematics: Newton, Leibniz, the
calculus, and the rhetorical force of the infinitesimal. Quarterly
Journal of Speech, 90(2), 163-188.
... "Infrastructure provides the invisible scaffolding for discovery, dissemination, and access to information. Since information is concomitant with knowledge, criticality, and awareness, the form of infrastructure has real consequences for the forms of communication, knowledge and public life" (Johnson 2012) To explore the infrastructure on which the housing market and the collection and production of housing market statistics rests is, therefore, to address both the oft invisible role of land registration and to question the position of elites within this structure. The LR, which facilitates the buying, selling and owning, of all real estate in England and Wales, is one such system. ...
Thesis
Full-text available
This Thesis presents a sociology of the development of land registration in England and examines its relationship to understandings of the housing market, statistics, and elites. Through approaching land registration as an information infrastructure, this research prioritizes the previously overlooked foundations of the housing market, that underpin how it operates and through which it becomes known. To do so, this Thesis combines historical methodologies with computational methods utilising contemporary big data. It seeks to track how land registration in England from its 19th century origins, solidified into an information infrastructure and by utilising this understanding to ask questions of the modern land registration, highlighting these ongoing legacies of elite power, through an analysis of its transactional data. This Thesis is split into three cases. Firstly, an examination of the early land registry, its legal and socio-material organization and standardization, addressing the context of elite aristocratic power in which the system arose. Secondly, an analysis of housing market statistics in the UK, addresses how their relationship to the information infrastructure of land registration has allowed for the exclusion of elite housing practices from official statistics. The third case study, through utilising computational methods, paints a different picture of the UK housing market by adding back in the ‘missing’ houses of contemporary elites, which are owned through offshore shell companies. This research therefore contributes to the study of inequality in the UK through revealing the extent of elite housing wealth held in offshore jurisdictions. Arguing that in order to better identify the relationship between the housing market and elite power the importance of understanding land registration as an information infrastructure underpinning it, cannot be understated.
... These things often differ in detail as well as in scope. According to (Johnson 2012) an "information infrastructure consists of the classifications, standards, protocols, and algorithms that organize information and communication", thus emphasizing software and standards. In (Pironti 2006), in contrast, an information infrastructure is defined as all of the people, processes, procedures, tools, facilities, and technology which supports the creation, use, transport, storage, and destruction of information. ...
Technical Report
Full-text available
It is an important part of the Armed Forces’ activities to monitor Norwegian land areas, the airspace, the sea and cyberspace. This surveillance supports both traditional tasks such as defending sovereignty or crisis and conflict management, as well as civil-military tasks such as rescue services and environmental preparedness. The overall response time of the Armed Forces, as well as the quality of its operational decisions, depend on the ability to perceive a situation, interpret it and understand it, that is, on the level of situational awareness. New communication technologies and the ever-increasing availability of computing power today make it possible to utilize data of a variety and volume that can significantly enrich situational awareness in the future. From a computational point of view, progress in this area depends on whether we have computational models that are able to translate data into relevant real time intelligence, and whether we are able to coordinate machine clusters that, working together, are capable of adapting to potentially very large spikes in the quantity or complexity of available information (complexity being understood as the amount of processing power it takes to convert data into actionable intelligence). In this report we take a closer look at some general properties such a machine cluster could reasonably be expected to have, as well as the matching characteristics a surveillance algorithm must have in order to exploit it efficiently. Although it is not reasonable to assume that all types of surveillance tasks and information needs can be served with identical system support, the working hypothesis in this report is that some general systemic properties will be sufficient for most cases. Examples include, loose coupling, scalability, fault tolerance and parallelizability. We do not claim to have proved or refuted this hypothesis (i.e. that some general systemic properties will be sufficient for most cases), but will be content for now to adduce some experimental evidence in support of it. In other words, the method we adopt is empirical. More specifically, we do an experimental case study of high velocity stream reasoning supported by a scalable coordinated machine cluster running a variety of software components and algorithms. The various components and algorithms will be described in more detail as we go. By stream reasoning, we shall mean the operation of turning continuously incoming data into actionable intelligence in real time. The case study, more specifically, attempts to detect illegal, unreported, and unregulated fishing from a stream of AIS reports, supplemented with geographic information as well as with additional on- and offline information about ships, landing bills and more. The experiment was designed to see to what extent standard software components can be utilised to build a stream processing infrastructure meeting the identified requirements. The outcome of the experiment was a confirmation that the chosen core components essentially provided a streaming infrastructure with the desired properties, mainly due to the characteristics of the core component Apache Kafka. The main deviation was the infrastructure’s fault tolerance ability: During the experiment, further study of Kafka’s handling of network partitioning casted doubt over its ability to handle such situations. As this experiment was conducted on a robust network, the infrastructure’s tolerance for network partitioning was not tested. This is, however, an interesting avenue for further work, as network partitioning is a characteristic of tactical networks.
Article
Using assignments drawn from a first-year composition course that centers the Southern Life Histories Collection, part of the New Deal’s Federal Writers’ Project, this paper argues for a pedagogical approach that teaches students digital literacy through archival rhetorics by converting archival texts into data.
Article
This essay contributes to scholarship on precarity and rhetoric by exploring how participatory epideictic rhetorics, data, and infrastructure contribute to precarity. We concentrate on how shared data practices (i.e., systems for archiving, storing, distributing, and communicating information) produce and sustain human/material vulnerabilities for users, developers, and systems with observational research of VirtualLearners, a business that created, aggregated, and sold data (i.e., videos, texts, and games) to educators. We argue that VirtualLearners’s glitching online ratings system and its associated data nurtured user precarity by encouraging barriers to education, the basis of economic and social mobility. In this essay, we expose VirtualLearners’s backstage computational techniques and tactics that transformed the rhetorical capacities made available to students and teachers. As part of this study, we introduce the concept of affective data technologies to explain how publics are encouraged to become invested in data practices that can make them complicit in their own precarity.
Chapter
Insofar as algorithms are digital problem-solving operations that follow a set of rules or processes to arrive at a result, they are constrained by the rules that determine their parameters for operating. While an algorithm can only operate according to its instructions, however, the potential rules that might govern an algorithm are inexhaustible. An algorithm’s design thus makes rhetorical choices that privilege the importance of some information or desired outcomes over others. This chapter argues for a way of thinking about algorithmic rhetoric as macro-, meso-, and micro-rhetorical. Along these lines, it would be beneficial to think more about algorithms as digital rhetorics with terrific power to sway what counts as knowledge, truth, and material reality in the everyday lives of people across an astonishing range of global communities in the twenty-first century.
Article
Infrastructures support and shape our social world, but they do so in often invisible ways. In few cases is that truer than with various documents that serve infrastructural functions. This article takes one type of those documents—technical standards—and uses analysis of one specific standard to develop theory related to the infrastructural function of writing. The author specifically analyzes one of the major infrastructures of the Internet of Things—the 126-page Tag Data Standard (TDS)—to show how rethinking writing as infrastructure can be valuable for multiple conversations occurring with writing studies, including research on material rhetoric, research that expands the scope of what should be studied as writing, and research in writing studies that links with emerging fields. The author concludes by developing a model for future research on the infrastructural functions of writing.
Article
Full-text available
New materialist theories of agency challenge notions of the autonomous human rhetor at the helm of a rhetorical act (i.e., Quintilian’s good man speaking well) (McIntyre 10-11). Instead, “agency does not belong to any single actor, whether human or nonhuman; rather agency is the product of the relationship between actors and exists only at their point of contact. These points of contact … are rhetorical acts” (McIntyre 12). Indeed, others have successfully demonstrated that agency is a relational act between humans and vibrant matter (see Bennett 24-28 for her work on electrical blackouts). In addition to affirming that claim, this article makes three unique contributions: (1) we analyze new materialist theories of agency through the lens of infrastructure theory, an underutilized theoretical apparatus; (2) we consider the rhetorical agency of a glitching, quantifying object; and (3) we introduce terminology for describing these developments, including infrastructural monsters and critical mass agency.
Article
Furthering the field’s attention to the rhetoric of archives, this article offers an extended consideration of archival description as an information infrastructure that provides powerful, although often invisible, orientations to the past. This article examines three stages of the archival process—selection, organization, and labeling—by focusing on a handful of historical objects, held in two separate collections, that depict transgressive gender presentations. Taken together, these examples demonstrate that archival description functions not only for bureaucratic and access purposes, but for epistemological ones as well.
Article
Full-text available
This research argues that documents can become intermediaries which affect the relationships between disparate groups. Through a critical analysis of materials distributed during an online protest, the author traces the life of a single technical document, simultaneously describing how it was described during deliberation between several groups. Marcusean critical theory and rhetorical criticism framed the analysis. It is suggested that certain documents act as a locus between otherwise unaffiliated groups and that those documents become agents who can mediate deliberation. Further, it is suggested that document analysis can become an important aspect for interpreting group relationships. Future research examining the agency of documents is suggested.
Chapter
Full-text available
This article presents Information Infrastructure Studies, a research area that takes up some core issues in digital information and organization research. Infrastructure Studies simultaneously addresses the technical, social, and organizational aspects of the development, usage, and maintenance of infrastructures in local communities as well as global arenas. While infrastructure is understood as a broad category referring to a variety of pervasive, enabling network resources such as railroad lines, plumbing and pipes, electrical power plants and wires, this article focuses on information infrastructure, such as computational services and help desks, or federating activities such as scientific data repositories and archives spanning the multiple disciplines needed to address such issues as climate warming and the biodiversity crisis. These are elements associated with the internet and, frequently today, associated with cyberinfrastructure or e-science endeavors. We argue that a theoretical understanding of infrastructure provides the context for needed dialogue between design, use, and sustainability of internet-based infrastructure services. This article outlines a research area and outlines overarching themes of Infrastructure Studies. Part one of the paper presents definitions for infrastructure and cyberinfrastructure, reviewing salient previous work. Part two portrays key ideas from infrastructure studies (knowledge work, social and political values, new forms of sociality, etc.). In closing, the character of the field today is considered. KeywordsCyberinfrastructure-Cyberscholarship-Information infrastructure-Social analysis information systems
Article
This essay investigates the rhetoric surrounding the appearance of the concept of the infinitesimal in the seventeenth‐century Calculus of Sir Isaac Newton and Gottfried Wilhelm Leibniz. Although historians often have positioned rhetoric as a supplemental discipline, this essay shows that rhetoric is the “material” out of which a new and powerful mathematical system emerges. At the height of empiricism, the infinitesimal, thought by Newton and Leibniz to be evanescent or nascent, made available no recourse to empirical or geometric verification. Instead, the infinitesimal found its “substance” in the rhetorical arguments surrounding it, which ultimately precipitated an epistemic shift in scientific and mathematical practice.
Book
A revealing and surprising look at how classification systems can shape both worldviews and social interactions. What do a seventeenth-century mortality table (whose causes of death include "fainted in a bath," "frighted," and "itch"); the identification of South Africans during apartheid as European, Asian, colored, or black; and the separation of machine- from hand-washables have in common? All are examples of classification—the scaffolding of information infrastructures. In Sorting Things Out, Geoffrey C. Bowker and Susan Leigh Star explore the role of categories and standards in shaping the modern world. In a clear and lively style, they investigate a variety of classification systems, including the International Classification of Diseases, the Nursing Interventions Classification, race classification under apartheid in South Africa, and the classification of viruses and of tuberculosis. The authors emphasize the role of invisibility in the process by which classification orders human interaction. They examine how categories are made and kept invisible, and how people can change this invisibility when necessary. They also explore systems of classification as part of the built information environment. Much as an urban historian would review highway permits and zoning decisions to tell a city's story, the authors review archives of classification design to understand how decisions have been made. Sorting Things Out has a moral agenda, for each standard and category valorizes some point of view and silences another. Standards and classifications produce advantage or suffering. Jobs are made and lost; some regions benefit at the expense of others. How these choices are made and how we think about that process are at the moral and political core of this work. The book is an important empirical source for understanding the building of information infrastructures.