SlideShare una empresa de Scribd logo
1 de 14
Descargar para leer sin conexión
User resistance and repurposing:
a look at the iOS ‘jailbreaking’ scene in
Brazil
Adriana Amaral
University of Vale do Rio dos Sinos - Brazil

Rosana Vieira de Souza
University of Vale do Rio dos Sinos - Brazil

The 14th Annual Conference of the Association of Internet
October 23 - 26, 2013, Denver, CO - USA
• The mobile environment
• Jailbreaking as resistance
• Purpose
• Methods
• Discussion: motivations and critical incidents
• Conclusions

Quick Overview

3
• The rise of “closed spaces” in the mobile environment
(Benkler, 2006; Galloway, 2006 and Zittrain, 2008)
• Computer-mediated platforms and the role of mobile
operating systems (e.g. iOS, Android)
• Apple iOS devices (iPod, iPhone, iPad) as highly controlled
spaces
• Handsets tied to a specific carrier
• Third-party apps not allowed

• Users’ strategies to unlock the handset and the desire to run
unofficial apps (out of the official App Store).

The Mobile Environment

4
• The practice called ‘jailbreaking’ has emerged in 2007 as
an alternative to Apple’s restrictions

• Jailbreaking allows users to change a device’s operating
system to run a number of applications not approved by
Apple or to open up additional features
• The procedure includes the download of free computer
software that installs a hack onto the device and the
installation of an alternative store called Cydia
• Around 22.8 million jailbroken iOS devices running Cydia
Store (Perez, 2013)

Jailbreaking as Resistance

5
• Tools and the iOS hacker communities:
• Redsn0w (by the iPhone Dev Team)
• Spirit and “JailbreakMe 2.0” (by Comex)
• Evasi0n (by Evad3rs)
• Absinthe (by Chronic Dev Team)

Jailbreaking as Resistance

6
“JailbreakMe is the easiest way to free your device. Experience
iOS as it could be, fully customizable, themeable, and with every
tweak you could possibly imagine. Jailbreaking gives you control
over the device you own”.

Source: Google
images

7
• To discuss the growth of mobile platforms and
the emergence of user counter-power in these
environments;
• To reflect upon jailbreaking practices from the
users’ point of view.

Purpose

8
• Qualitative approach and data collected by
• observation of discussion forums (iPhoneMod Brasil Forum);
• in-depth interviews with jailbreakers;

• This preliminary phase of interviews was conducted from
April to June 2013 (24 critical incidents from 12
interviewers):
• motivations for jailbreaking;
• critical events perceived as highly significant for either
success or failure of the practice (Critical Incident Technique,
Flanagan, 1954).

Methods

9
• CIT:
Think of a recent situation regarding the jailbreaking
experience with your mobile phone. Describe the
situation and exactly what happened.
1. When did the incident happen?
2. What specific circumstances led up to this
situation?
3. What did you do? (coping strategy do deal with
the event)

Methods

10
Source: data
collection

Discussion

Screenshot of jailbroken iPhone Home screen with
personalization app

11
1. Users motivations to engage in jailbreaking practices
• High performance handset + freedom to optimization =
experience that resembles the flexibility provided by the
internet;
• Need to extend the device capabilities in order to keep it more
personalized;
• Trade-off: concerns about the high costs of the iOS devices in
the Brazilian market:
• too expensive to risk vs. too expensive for not expanding their
capabilities;
“You stop and think that you pay a lot for something that is not what you
expected, and since Apple does not allow you to perform a ‘test drive’ for
apps, then it is complicated” (Camila, 19)

Discussion

12
1.

Critical Incidents
• iOS updates
“I’m always running an older version of the iOS cause it takes time for them [the hacker
community] to crack the program. iTunes keep on asking me for updating but if I
update the version I have in my device I will lose my jailbreak and Cydia” (Breno, 26)

• App failure and unexpected outcomes
“In the jailbreaking world you can never know for sure (…) when I know the app is very
important for my presentations, I need to buy it ‘cause I cannot take the risk of having
an unstable app” (James, 23)
“I consider myself experienced in jailbreaking and it was like a chock” (Camila, 19)

• Now I can, too
“Now I can, too, ‘cause I spent months seeing the games they could play in the US and I
could not” (Alexandre, 17)

“Now I can play the same game as the girls, otherwise, I could not ‘cause my parents do
not allow me to pay for apps” (Laila, 15)

Discussion

13
• iOS devices and their networks do not invite user innovation;

• Jailbreaking works as a social counter-power and indicates a
resistance to negative aspects of the market restrictions (control,
lack of flexibility, customization and reinvention);
• It emerges from a free culture logic that legitimates the freedom
to access, distribute or modify content and creative work;
• However, there is a permanent tension and feeling of ambivalence
• In the paradoxical nature of technology (e.g. new / obsolete)
• In the trade-offs the iOS users need to cope with (e.g. stability,
security and control vs. risk of instability and freedom)

Conclusions

14

Más contenido relacionado

Similar a User resistance and repurposing: a look at the iOS ‘jailbreaking’ scene in Brazil

Mobile App Testing: The Good, the Bad, and the Ugly
Mobile App Testing: The Good, the Bad, and the UglyMobile App Testing: The Good, the Bad, and the Ugly
Mobile App Testing: The Good, the Bad, and the UglyTechWell
 
Getting Going with Mobile (What Your Users Really Want!)
Getting Going with Mobile (What Your Users Really Want!)Getting Going with Mobile (What Your Users Really Want!)
Getting Going with Mobile (What Your Users Really Want!)Forum One
 
Media presentation
Media presentationMedia presentation
Media presentationweberjoel
 
On the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for SmartphonesOn the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for SmartphonesCSCJournals
 
Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter AppsSara Dow
 
Forensics_1st_Presentation.pptx
Forensics_1st_Presentation.pptxForensics_1st_Presentation.pptx
Forensics_1st_Presentation.pptxFatemaAkter78
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docxmayank272369
 
Glass' evolution, some suggestions
Glass' evolution, some suggestionsGlass' evolution, some suggestions
Glass' evolution, some suggestionsRussell Sullivan
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securitysiswarren
 
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyTom Eston
 
IoTA : Where IoT Meets Social Network
IoTA : Where IoT Meets Social NetworkIoTA : Where IoT Meets Social Network
IoTA : Where IoT Meets Social NetworkSetareh Sarachi, MSc.
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
 
Mobile Learning Guide App: Webinar for Training MagazineLearned
Mobile Learning Guide App: Webinar for Training MagazineLearnedMobile Learning Guide App: Webinar for Training MagazineLearned
Mobile Learning Guide App: Webinar for Training MagazineLearnedadlmobile
 
Security and risk in a mobile world
Security and risk in a mobile worldSecurity and risk in a mobile world
Security and risk in a mobile worldBrian Katz
 
Report: A Model For Remote Parental Control System Using Smartphones
Report: A Model For Remote Parental Control System Using SmartphonesReport: A Model For Remote Parental Control System Using Smartphones
Report: A Model For Remote Parental Control System Using SmartphonesIJCI JOURNAL
 
Media presentation
Media presentationMedia presentation
Media presentationweberjoel
 
UI Dark Patterns and Where to Find Them: A Study on Mobile Applications and U...
UI Dark Patterns and Where to Find Them: A Study on Mobile Applications and U...UI Dark Patterns and Where to Find Them: A Study on Mobile Applications and U...
UI Dark Patterns and Where to Find Them: A Study on Mobile Applications and U...ivaderivader
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 

Similar a User resistance and repurposing: a look at the iOS ‘jailbreaking’ scene in Brazil (20)

Mobile App Testing: The Good, the Bad, and the Ugly
Mobile App Testing: The Good, the Bad, and the UglyMobile App Testing: The Good, the Bad, and the Ugly
Mobile App Testing: The Good, the Bad, and the Ugly
 
Getting Going with Mobile (What Your Users Really Want!)
Getting Going with Mobile (What Your Users Really Want!)Getting Going with Mobile (What Your Users Really Want!)
Getting Going with Mobile (What Your Users Really Want!)
 
Media presentation
Media presentationMedia presentation
Media presentation
 
On the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for SmartphonesOn the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for Smartphones
 
Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter Apps
 
Forensics_1st_Presentation.pptx
Forensics_1st_Presentation.pptxForensics_1st_Presentation.pptx
Forensics_1st_Presentation.pptx
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
 
Glass' evolution, some suggestions
Glass' evolution, some suggestionsGlass' evolution, some suggestions
Glass' evolution, some suggestions
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
IoT in Social Media
IoT in Social MediaIoT in Social Media
IoT in Social Media
 
IoTA
IoTAIoTA
IoTA
 
IoTA : Where IoT Meets Social Network
IoTA : Where IoT Meets Social NetworkIoTA : Where IoT Meets Social Network
IoTA : Where IoT Meets Social Network
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
Mobile Learning Guide App: Webinar for Training MagazineLearned
Mobile Learning Guide App: Webinar for Training MagazineLearnedMobile Learning Guide App: Webinar for Training MagazineLearned
Mobile Learning Guide App: Webinar for Training MagazineLearned
 
Security and risk in a mobile world
Security and risk in a mobile worldSecurity and risk in a mobile world
Security and risk in a mobile world
 
Report: A Model For Remote Parental Control System Using Smartphones
Report: A Model For Remote Parental Control System Using SmartphonesReport: A Model For Remote Parental Control System Using Smartphones
Report: A Model For Remote Parental Control System Using Smartphones
 
Media presentation
Media presentationMedia presentation
Media presentation
 
UI Dark Patterns and Where to Find Them: A Study on Mobile Applications and U...
UI Dark Patterns and Where to Find Them: A Study on Mobile Applications and U...UI Dark Patterns and Where to Find Them: A Study on Mobile Applications and U...
UI Dark Patterns and Where to Find Them: A Study on Mobile Applications and U...
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 

Más de Adriana Amaral

Reconfigurações das praticas de consumo musical
Reconfigurações das praticas de consumo musicalReconfigurações das praticas de consumo musical
Reconfigurações das praticas de consumo musicalAdriana Amaral
 
As redes sociais e as patrulhas do gosto
As redes sociais e as patrulhas do gostoAs redes sociais e as patrulhas do gosto
As redes sociais e as patrulhas do gostoAdriana Amaral
 
S2, S2: Estrategias do Happy Rock Gaucho nas Midias Socias
S2, S2: Estrategias do Happy Rock Gaucho nas Midias SociasS2, S2: Estrategias do Happy Rock Gaucho nas Midias Socias
S2, S2: Estrategias do Happy Rock Gaucho nas Midias SociasAdriana Amaral
 
Curadoria de Informacao no Ciberjornalismo
Curadoria de Informacao no CiberjornalismoCuradoria de Informacao no Ciberjornalismo
Curadoria de Informacao no CiberjornalismoAdriana Amaral
 
Posfácio Neuromancer 2008
Posfácio Neuromancer 2008Posfácio Neuromancer 2008
Posfácio Neuromancer 2008Adriana Amaral
 
Ebook Blogs.com Estudos sobre blogs e comunicação
Ebook Blogs.com Estudos sobre blogs e comunicaçãoEbook Blogs.com Estudos sobre blogs e comunicação
Ebook Blogs.com Estudos sobre blogs e comunicaçãoAdriana Amaral
 
Metodos de Pesquisa para Internet
Metodos de Pesquisa para InternetMetodos de Pesquisa para Internet
Metodos de Pesquisa para InternetAdriana Amaral
 
Performance e representação Guitar Hero e DJ Hero
Performance e representação Guitar Hero e DJ HeroPerformance e representação Guitar Hero e DJ Hero
Performance e representação Guitar Hero e DJ HeroAdriana Amaral
 
Aula Aberta Convergência - Jenkins
Aula Aberta Convergência - JenkinsAula Aberta Convergência - Jenkins
Aula Aberta Convergência - JenkinsAdriana Amaral
 
Amaral Guitar Hero DJ Hero
Amaral Guitar Hero DJ HeroAmaral Guitar Hero DJ Hero
Amaral Guitar Hero DJ HeroAdriana Amaral
 
Pesquisa em Cibercultura BR EUA
Pesquisa em Cibercultura BR EUAPesquisa em Cibercultura BR EUA
Pesquisa em Cibercultura BR EUAAdriana Amaral
 
Palestra Fansourcing II Musicom
Palestra Fansourcing II MusicomPalestra Fansourcing II Musicom
Palestra Fansourcing II MusicomAdriana Amaral
 
Pesquisa em Cibercultura no Brasil
Pesquisa em Cibercultura no BrasilPesquisa em Cibercultura no Brasil
Pesquisa em Cibercultura no BrasilAdriana Amaral
 
Consumption Practices And Uses Of Social Tagging By Last.Fms Brazilian Users ...
Consumption Practices And Uses Of Social Tagging By Last.Fms Brazilian Users ...Consumption Practices And Uses Of Social Tagging By Last.Fms Brazilian Users ...
Consumption Practices And Uses Of Social Tagging By Last.Fms Brazilian Users ...Adriana Amaral
 
Mesa epistemologia Sandra Montardo
Mesa epistemologia Sandra MontardoMesa epistemologia Sandra Montardo
Mesa epistemologia Sandra MontardoAdriana Amaral
 
Epistemologia em cibercultura Abciber 2009
Epistemologia em cibercultura Abciber 2009Epistemologia em cibercultura Abciber 2009
Epistemologia em cibercultura Abciber 2009Adriana Amaral
 

Más de Adriana Amaral (20)

Reconfigurações das praticas de consumo musical
Reconfigurações das praticas de consumo musicalReconfigurações das praticas de consumo musical
Reconfigurações das praticas de consumo musical
 
As redes sociais e as patrulhas do gosto
As redes sociais e as patrulhas do gostoAs redes sociais e as patrulhas do gosto
As redes sociais e as patrulhas do gosto
 
Withchouse
WithchouseWithchouse
Withchouse
 
S2, S2: Estrategias do Happy Rock Gaucho nas Midias Socias
S2, S2: Estrategias do Happy Rock Gaucho nas Midias SociasS2, S2: Estrategias do Happy Rock Gaucho nas Midias Socias
S2, S2: Estrategias do Happy Rock Gaucho nas Midias Socias
 
Curadoria de Informacao no Ciberjornalismo
Curadoria de Informacao no CiberjornalismoCuradoria de Informacao no Ciberjornalismo
Curadoria de Informacao no Ciberjornalismo
 
Aula1 apresentaçao
Aula1 apresentaçaoAula1 apresentaçao
Aula1 apresentaçao
 
Posfácio Neuromancer 2008
Posfácio Neuromancer 2008Posfácio Neuromancer 2008
Posfácio Neuromancer 2008
 
Ebook Blogs.com Estudos sobre blogs e comunicação
Ebook Blogs.com Estudos sobre blogs e comunicaçãoEbook Blogs.com Estudos sobre blogs e comunicação
Ebook Blogs.com Estudos sobre blogs e comunicação
 
Metodos de Pesquisa para Internet
Metodos de Pesquisa para InternetMetodos de Pesquisa para Internet
Metodos de Pesquisa para Internet
 
dissertacao
dissertacaodissertacao
dissertacao
 
Performance e representação Guitar Hero e DJ Hero
Performance e representação Guitar Hero e DJ HeroPerformance e representação Guitar Hero e DJ Hero
Performance e representação Guitar Hero e DJ Hero
 
Aula Aberta Convergência - Jenkins
Aula Aberta Convergência - JenkinsAula Aberta Convergência - Jenkins
Aula Aberta Convergência - Jenkins
 
Amaral Guitar Hero DJ Hero
Amaral Guitar Hero DJ HeroAmaral Guitar Hero DJ Hero
Amaral Guitar Hero DJ Hero
 
Pesquisa em Cibercultura BR EUA
Pesquisa em Cibercultura BR EUAPesquisa em Cibercultura BR EUA
Pesquisa em Cibercultura BR EUA
 
Steampunk
SteampunkSteampunk
Steampunk
 
Palestra Fansourcing II Musicom
Palestra Fansourcing II MusicomPalestra Fansourcing II Musicom
Palestra Fansourcing II Musicom
 
Pesquisa em Cibercultura no Brasil
Pesquisa em Cibercultura no BrasilPesquisa em Cibercultura no Brasil
Pesquisa em Cibercultura no Brasil
 
Consumption Practices And Uses Of Social Tagging By Last.Fms Brazilian Users ...
Consumption Practices And Uses Of Social Tagging By Last.Fms Brazilian Users ...Consumption Practices And Uses Of Social Tagging By Last.Fms Brazilian Users ...
Consumption Practices And Uses Of Social Tagging By Last.Fms Brazilian Users ...
 
Mesa epistemologia Sandra Montardo
Mesa epistemologia Sandra MontardoMesa epistemologia Sandra Montardo
Mesa epistemologia Sandra Montardo
 
Epistemologia em cibercultura Abciber 2009
Epistemologia em cibercultura Abciber 2009Epistemologia em cibercultura Abciber 2009
Epistemologia em cibercultura Abciber 2009
 

Último

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Último (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

User resistance and repurposing: a look at the iOS ‘jailbreaking’ scene in Brazil

  • 1.
  • 2. User resistance and repurposing: a look at the iOS ‘jailbreaking’ scene in Brazil Adriana Amaral University of Vale do Rio dos Sinos - Brazil Rosana Vieira de Souza University of Vale do Rio dos Sinos - Brazil The 14th Annual Conference of the Association of Internet October 23 - 26, 2013, Denver, CO - USA
  • 3. • The mobile environment • Jailbreaking as resistance • Purpose • Methods • Discussion: motivations and critical incidents • Conclusions Quick Overview 3
  • 4. • The rise of “closed spaces” in the mobile environment (Benkler, 2006; Galloway, 2006 and Zittrain, 2008) • Computer-mediated platforms and the role of mobile operating systems (e.g. iOS, Android) • Apple iOS devices (iPod, iPhone, iPad) as highly controlled spaces • Handsets tied to a specific carrier • Third-party apps not allowed • Users’ strategies to unlock the handset and the desire to run unofficial apps (out of the official App Store). The Mobile Environment 4
  • 5. • The practice called ‘jailbreaking’ has emerged in 2007 as an alternative to Apple’s restrictions • Jailbreaking allows users to change a device’s operating system to run a number of applications not approved by Apple or to open up additional features • The procedure includes the download of free computer software that installs a hack onto the device and the installation of an alternative store called Cydia • Around 22.8 million jailbroken iOS devices running Cydia Store (Perez, 2013) Jailbreaking as Resistance 5
  • 6. • Tools and the iOS hacker communities: • Redsn0w (by the iPhone Dev Team) • Spirit and “JailbreakMe 2.0” (by Comex) • Evasi0n (by Evad3rs) • Absinthe (by Chronic Dev Team) Jailbreaking as Resistance 6
  • 7. “JailbreakMe is the easiest way to free your device. Experience iOS as it could be, fully customizable, themeable, and with every tweak you could possibly imagine. Jailbreaking gives you control over the device you own”. Source: Google images 7
  • 8. • To discuss the growth of mobile platforms and the emergence of user counter-power in these environments; • To reflect upon jailbreaking practices from the users’ point of view. Purpose 8
  • 9. • Qualitative approach and data collected by • observation of discussion forums (iPhoneMod Brasil Forum); • in-depth interviews with jailbreakers; • This preliminary phase of interviews was conducted from April to June 2013 (24 critical incidents from 12 interviewers): • motivations for jailbreaking; • critical events perceived as highly significant for either success or failure of the practice (Critical Incident Technique, Flanagan, 1954). Methods 9
  • 10. • CIT: Think of a recent situation regarding the jailbreaking experience with your mobile phone. Describe the situation and exactly what happened. 1. When did the incident happen? 2. What specific circumstances led up to this situation? 3. What did you do? (coping strategy do deal with the event) Methods 10
  • 11. Source: data collection Discussion Screenshot of jailbroken iPhone Home screen with personalization app 11
  • 12. 1. Users motivations to engage in jailbreaking practices • High performance handset + freedom to optimization = experience that resembles the flexibility provided by the internet; • Need to extend the device capabilities in order to keep it more personalized; • Trade-off: concerns about the high costs of the iOS devices in the Brazilian market: • too expensive to risk vs. too expensive for not expanding their capabilities; “You stop and think that you pay a lot for something that is not what you expected, and since Apple does not allow you to perform a ‘test drive’ for apps, then it is complicated” (Camila, 19) Discussion 12
  • 13. 1. Critical Incidents • iOS updates “I’m always running an older version of the iOS cause it takes time for them [the hacker community] to crack the program. iTunes keep on asking me for updating but if I update the version I have in my device I will lose my jailbreak and Cydia” (Breno, 26) • App failure and unexpected outcomes “In the jailbreaking world you can never know for sure (…) when I know the app is very important for my presentations, I need to buy it ‘cause I cannot take the risk of having an unstable app” (James, 23) “I consider myself experienced in jailbreaking and it was like a chock” (Camila, 19) • Now I can, too “Now I can, too, ‘cause I spent months seeing the games they could play in the US and I could not” (Alexandre, 17) “Now I can play the same game as the girls, otherwise, I could not ‘cause my parents do not allow me to pay for apps” (Laila, 15) Discussion 13
  • 14. • iOS devices and their networks do not invite user innovation; • Jailbreaking works as a social counter-power and indicates a resistance to negative aspects of the market restrictions (control, lack of flexibility, customization and reinvention); • It emerges from a free culture logic that legitimates the freedom to access, distribute or modify content and creative work; • However, there is a permanent tension and feeling of ambivalence • In the paradoxical nature of technology (e.g. new / obsolete) • In the trade-offs the iOS users need to cope with (e.g. stability, security and control vs. risk of instability and freedom) Conclusions 14