Journal articles: 'Television relay systems' – Grafiati (2024)

  • Bibliography
  • Subscribe
  • News
  • Referencing guides Blog Automated transliteration Relevant bibliographies by topics

Log in

Українська Français Italiano Español Polski Português Deutsch

We are proudly a Ukrainian website. Our country was attacked by Russian Armed Forces on Feb. 24, 2022.
You can support the Ukrainian Army by following the link: https://u24.gov.ua/. Even the smallest donation is hugely appreciated!

Relevant bibliographies by topics / Television relay systems / Journal articles

To see the other types of publications on this topic, follow the link: Television relay systems.

Author: Grafiati

Published: 4 June 2021

Last updated: 6 February 2022

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Consult the top 40 journal articles for your research on the topic 'Television relay systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Vahid oğlu Nasiyev, Müslim. "Research and application of satellite communication networks as an alternative to modern communication systems." SCIENTIFIC WORK 68, no.07 (July22, 2021): 78–83. http://dx.doi.org/10.36719/2663-4619/68/78-83.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Research work has been devoted to show how satellite technology can meet a variety of human needs and the ultimate measure of its effectiveness. Communication satellites, whether in geostationary Earth orbit (GEO) or non GEO, provide an effective platform to relay radio signals between points on the ground. The users who employ these signals enjoy a broad spectrum of telecommunication services on the ground, at sea, and in the air. In recent years, such systems have become practical to the point where a typical household can have its own satellite dish. That dish can receive a broad range of television programming and provide broadband access to the Internet. Key words: satellite, antenna, Earth orbit (GEO), transponder, VHF, frequency modulation (FM)10.36719/2663-4619/68/78-83 Müslim Vahid oğlu Nasiyev Azərbaycan Texniki Universiteti magistrant mnesiyev@gmail.com MÜASİR RABİTƏ SİSTEMLƏRİNƏ ALTERNATİV OLARAQ, PEYK RABİTƏ ŞƏBƏKƏLƏRİNİN ARAŞDIRILMASI VƏ TƏTBİQİ Açar sözlər: Peyk, antena, yer orbiti (GEO), transponder, VHF, tezlik modulyasiyası (FM) Research and application of satellite communication networks as an alternative to modern communication systems Summary Research work has been devoted to show how satellite technology can meet a variety of human needs and the ultimate measure of its effectiveness. Communication satellites, whether in geostationary Earth orbit (GEO) or non GEO, provide an effective platform to relay radio signals between points on the ground. The users who employ these signals enjoy a broad spectrum of telecommunication services on the ground, at sea, and in the air. In recent years, such systems have become practical to the point where a typical household can have its own satellite dish. That dish can receive a broad range of television programming and provide broadband access to the Internet. Key words: satellite, antenna, Earth orbit (GEO), transponder, VHF, frequency modulation (FM)

2

Lamarre, Thomas. "Regional tv: Affective Media Geographies." Asiascape: Digital Asia 2, no.1-2 (January15, 2015): 93–126. http://dx.doi.org/10.1163/22142312-12340021.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The rise of what has been called ‘new television’ or ‘media regionalism’ in East Asia has occurred in a context in which the production of media networks ‒ both infrastructures (broadcast and relay stations, satellites, cable systems) and media devices or platforms (tvsets,vcr,vcd, and mobile phones) ‒ outstrips the production of contents. The essay considers the question: what is coming into common through this emerging sense of media regionalism? Looking at the highly popular seriesHana yori dangoor ‘Boys over Flowers’, which has been formatted across media forms (such as manga, animatedtvseries, animated films, television dramas, and theatrical release cinema) and across nations (Japan, Taiwan, Korea, China, and the Philippines), this essay finds that the feeling of media regionalism is related to both the gap between infrastructures (of distribution and production) and the gap within media distribution (between mobility and privatization).

3

Coughlan, Felicity, and Renette Jarman. "Can the Intermediary System Work for Child Victims of Sexual Abuse?" Families in Society: The Journal of Contemporary Social Services 83, no.5 (October 2002): 541–46. http://dx.doi.org/10.1606/1044-3894.52.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

In South Africa, an intermediary system is attempting to reduce the trauma and secondary abuse often experienced by child witnesses in court cases involving sexual abuse. By separating the child from the formal courtroom and allowing an intermediary to relay questions and answers to the child via closed circuit television, it was hoped that the stress of the experience for these children would be reduced while retaining the rights of the accused to cross-examine witnesses and to a fair trial. This article reports on a major urban court in South Africa where intermediaries (social workers) have refused to continue offering their services. It also reports on the challenges and difficulties associated with offering the services. The authors further argue that immediate action is required if the system is to be saved. They also suggest how to address the needs and concerns of the intermediaries, thus further developing and improving the existing system. The authors close with recommendations for systems in other locations that might be considering the use of intermediaries in similar situations.

4

Авдєєнко, Гліб Леонідович, Сергій Георгійович Бунін, and Теодор Миколайович Наритник. "ТЕРАГЕРЦОВІ ТЕХНОЛОГІЇ В ТЕЛЕКОМУНІКАЦІЙНИХ СИСТЕМАХ. ЧАСТИНА 2. ДОСЛІДЖЕННЯ ТА МОДЕЛЮВАННЯ ПЕРЕДАВАННЯ ТЕЛЕВІЗІЙНИХ СИГНАЛІВ СТАНДАРТУ DVB-C І ІМПУЛЬСНОГО НАДШИРОКОСМУГОВОГО СИГНАЛУ РАДІОЛІНІЄЮ ТЕРАГЕРЦОВОГО ДІАПАЗОНУ." RADIOELECTRONIC AND COMPUTER SYSTEMS, no.3 (October30, 2018): 80–96. http://dx.doi.org/10.32620/reks.2018.3.09.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The laboratory testbed of a digital simplex radio-relay system of the terahertz range has been studied for the first time in practical terms. It consists of the receiver and transmitter parts of 130÷134 GHz frequency range and a digital modem with a channel data transmission of up to 1200 Mbps for a communication point-to-point distance under normal conditions within 1 km. It is shown that the proposed telecommunication system, which implements the concept of the creation of software-defined radio systems based on Wi-Fi technology, can be highly productive in the next generation mobile communication networks providing the appropriate transmission speeds, reliability, and security. It is studied the parameters of multichannel digital TV signal DVB-C standard when it is transmitted through the testbed of the transmitter and receiver parts of 130 GHz band. The results of the research showed that the application of lower part of terahertz frequency band (130 GHz) with a bandwidth of 24 MHz allows the transmission of three DVB-C television broadcasting channels with a total transport speed of 125 Mbit/s with a high subjective quality of TV programs. The results of the simulation of impulse ultrawideband (IR-UWB) signal transmission by the wireless link of terahertz band are presented. The results of researches of changes of IR-UWB Gaussian monocycle in the transmitter part and its reception by the receiver part of 130.4÷131.5 GHz terahertz band are presented for the first time. On the basis of the results of the research, the requirements for parameters of terahertz wireless link are formulated to ensure acceptable quality of ultrawideband impulse signals receiving. Development of the transmitter and receiver parts of radio relay system of the terahertz range has no direct current analogs in Ukraine. It can provide a significant breakthrough in the development of the telecommunications industry. The obtained research results will also contribute to the development of telecommunications-related industries, in particular: radio astronomy, inter-satellite communication, radar systems, medicine, etc.

5

Ali, Christopher. "A broadcast system in whose interest? Tracing the origins of broadcast localism in Canadian and Australian television policy, 1950–1963." International Communication Gazette 74, no.3 (March28, 2012): 277–97. http://dx.doi.org/10.1177/1748048511432608.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The television systems of Canada and Australia are often assumed to be similar if not synonymous. Both are dominated by American imports; rely on a networking of stations; and trace their media systems to a combination of American and British influence. Moreover, in the past decade, both have implemented tremendous changes to their broadcast policies, particularly with regard to local television. Yet despite these similarities, scholars have never critically reflected on the evolution of these countries’ local television policies. As such, this article concentrates on how Canada and Australia have historically framed, defined, and implemented the concept of localism in broadcast policy. Through an analysis of policy documents from 1950 to 1963, the argument is made that when compared with Australia, localism was not an immediate priority, but rather a taken-for-granted assumption by Canadian policy-makers. Thus, the nationalism debate in Canadian television was fought at the expense of the local.

6

Boehmer, Jan. "Does the Game Really Change? How Students Consume Mediated Sports in the Age of Social Media." Communication & Sport 4, no.4 (July24, 2016): 460–83. http://dx.doi.org/10.1177/2167479515595500.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Social media have been said to rival traditional media in the realm of sports. Actual evidence for a change in consumption patterns, though, remains scarce. This study investigates college students’ use of multiple distribution systems in the context of sports. More specifically, the relative importance of Twitter in relation to television is assessed. In addition, variables potentially predicting a greater reliance on Twitter are analyzed. Results indicate that television remains the primary distribution system for sports and that the importance of Twitter might have been overstated. The use of social media does not diminish the consumption of traditional sports broadcasts but is positively correlated. Finally, results of a regression analysis find that a subset of individuals is more likely to rely on Twitter depending on their tendency to engage in parasocial interactions, their Twitter use patterns, and their perceived expertise in sports.

7

Blumenthal-Barby, Martin. "Counter-Music: Harun Farocki's Theory of a New Image Type." October 151 (January 2015): 128–50. http://dx.doi.org/10.1162/octo_a_00207.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Harun Farocki's 2004 installation Counter-Music explores the issue of surveillance. It probes different kinds of surveillance and, in so doing, delineates historical trajectories, juxtaposing, for instance, state surveillance under Louis XIV in late-seventeenth-century France (through public streetlights) with more recent modes of observation via surveillance cameras (through closed-circuit-television systems). The tacit epicenter of Farocki's installation is the novel form of surveillance in which cameras are linked with automatic-recognition systems that no longer rely on human beings as observers: Human beings have been replaced by software designed to surveil. This new kind of surveillance, in which images are recorded and then “viewed” by automatic “eyes”—that is, analyzed by algorithmic software—generates what Farocki calls “operational images” to be used within systemic surveillance operations.

8

Ghali, Abdulrahman Aminu, Rohiza Ahmad, and Hitham Alhussian. "A Framework for Mitigating DDoS and DOS Attacks in IoT Environment Using Hybrid Approach." Electronics 10, no.11 (May27, 2021): 1282. http://dx.doi.org/10.3390/electronics10111282.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The Internet of Things (IoT) has gained remarkable acceptance from millions of individuals. This is evident in the extensive use of intelligent devices such as smartphones, smart television, speakers, air conditioning, lighting, and high-speed networks. The general application area of IoT includes industries, hospitals, schools, homes, sports, oil and gas, automobile, and entertainment, to mention a few. However, because of the unbounded connection of IoT devices and the lack of a specific method for overseeing communication, security concerns such as distributed denial of service (DDoS), denial of service (DoS), replay, botnet, social engineering, man-in-the-middle, and brute force attacks have posed enormous challenges in the IoT environment. Regarding these enormous challenges, this study focuses on DDoS and DoS attacks. These two attacks have the most severe consequences in the IoT environment. The solution proposed in this study can also help future researchers tackle the expansion of IoT security threats. Moreover, the study conducts rigorous experiments to assess the efficiency of the proposed approach. In summary, the experimental results show that the proposed hybrid approach mitigates data exfiltration caused by DDoS and DoS attacks by 95.4%, with average network lifetime, energy consumption, and throughput improvements of 15%, 25%, and 60%, respectively.

9

Yasin, Bahar, Fakhri Baghirov, and Ye Zhang. "The role of travel experience and gender on travel information source selection." Journal of Hospitality and Tourism Technology 8, no.2 (June12, 2017): 296–310. http://dx.doi.org/10.1108/jhtt-01-2017-0002.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Purpose This paper aims to identify the most popular travel information sources used among tourists and investigates how travel information selection differs across travel experience and gender. Design/methodology/approach This study used convenient and quota sampling strategy, questionnaires were distributed to 270 respondents at Sultanahmet and Grand Bazaar areas. A screening question was used to classify respondents. Findings First, past travel experience, travel agent, travel websites and hotel websites are generally the most frequently used travel information sources in destination selection due to conveniences and reliability. Second, first-timers prefer to use external information sources such as Facebook, guidebooks, travel agents and newspapers to gather information about destinations, whereas repeat visitors prefer to use internal information sources such as friends’ suggestions and past travel experience. Lastly, female visitors rely more on internal information sources such as friends’ suggestions and past travel experience. However, males prefer to use external information sources like Facebook, television, blog, travel agents, newspaper and guidebooks in choosing Turkey as a destination. Research limitations/implications Because factors studied, travel information sources selected, number of respondents and questionnaire distribution area are limited, future studies can expand to a bigger area so more respondents could get more reliable results. Practical implications This paper could help tourism industries understand searching behaviours among different types of tourists better to promote businesses in convenient sources and reach target customers easily. Originality/value This paper fulfils an identified need to study how travel information searching behaviours differ among tourists.

10

Steck,SibylleD., and HanspeterA.Mallot. "The Role of Global and Local Landmarks in Virtual Environment Navigation." Presence: Teleoperators and Virtual Environments 9, no.1 (February 2000): 69–83. http://dx.doi.org/10.1162/105474600566628.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

In visual navigation, landmarks can be used in a number of different ways. In this paper, we investigate the role of global and local landmarks in virtual environment navigation. We performed an experiment in a virtual environment called “Hexatown”, consisting of a regular hexagonal grid of streets and junctions. Each junction was identified by the presence of distinct local landmarks (buildings, phone box, and so on). Additionally, compass information or a global frame of reference was provided by global landmarks (hilltop, television tower, and city skyline). According to participants' movement decisions, egomotion was simulated, and displayed on a 180 deg. projection screen. Participants learned the route back and forth between two local landmarks. In the test phase, individual junctions were approached and the participant's movement decision was recorded. We performed two experiments involving landmark changes after learning. In the first, we used conflicting cues by transposing landmarks. In the second experiment, we reduced either local or global landmark information. Results show that both local and global landmarks are used in wayfinding decisions. However, different participants rely on different strategies. In the first experiment (cue conflict) for example, some of the participants used only local landmarks while others relied exclusively on global landmarks. Other participants used local landmarks at one location and global landmarks at the other. When removing one landmark type in the second experiment, the other type could be used by almost all participants, indicating that information about the neglected landmark type was present in memory.

11

Kinder, Marsha. "Face to Face: facial close-ups and joint attention in Science and the Visual Arts." Lumina 11, no.2 (August30, 2017): 36–59. http://dx.doi.org/10.34019/1981-4070.2017.v11.21444.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

This essay examines the contrasting visions of the expressive powers of the human face—both from neuroscientific approaches rooted in Darwin which argue for a codified system of six basic emotions universally recognized (happiness, sadness, anger, fear, disgust, surprise) and from the visual arts of cinema, television and portraiture painting that rely on facial close-ups to represent an emotional fluidity that is always subjective. As a means of reconciling the two approaches, it turns to the current study of infants by developmental psychologists (like Peter Mundy and Daniel Stern) who stress the importance of an infant’s ability to read the mother’s face, which facilitates joint attention, the acquisition of verbal language and social interactions with the world. Although Stern’s imaginative dialogues sound literary and subjective, his description of the infant’s encounter with the mother’s face is actually consistent with the explanation by neuroscientist Antonio Damasio (1999) of how consciousness is first launched in the “core self.” By treating the mother’s face as the crucial object in the infant’s early development and by perceiving this encounter awash in reflective feelings (which Damasio distinguishes from basic emotions shared with other species), he helps explain the dichotomy between the two systems of emotive facial expressions: reading the specific codified emotions (in humans and other species) versus experiencing the flow of (what Damasio calls) “background feelings” that continuously play across the human face. By emphasizing the theories of Béla Balázs and films of Ingmar Bergman and Chick Strand, which literally teach us how to read these background feelings moving across the human face, this essay claims facial close-ups do not distract us from our social circ*mstances or political action as Walter Benjamin argued. Instead they can have an ideological edge in a wide range of genres as they enable us to see this emotional engagement in joint attention both as a form of interpellation and as a means of survival—not only for infants but for all those engaged with the visual narrative arts.

12

Duarte, Rodrigo. "From Adorno’s Critique of Culture Industry to the Critical Evaluation of Digital Media." Zeitschrift für Ästhetik und Allgemeine Kunstwissenschaft 62, no.1 (2017): 14–24. http://dx.doi.org/10.28937/1000107633.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Als Adorno und Horkheimer Anfang der vierziger Jahre ihren kritischen Begriff Kulturindustrie gebildet haben, dachten sie überwiegend an Kino und Radio als zentrale Medien. Das Fernsehen war damals nicht genug entwickelt, um als wichtiger Teil der Massenkultur jener Zeit berücksichtigt werden zu können. Die kritischen Aspekte ihres Beitrags waren aber so stark und gut strukturiert, dass man diese auch heutzutage nicht verwerfen kann, wenn es um eine faire Bewertung eines so wichtigen Phänomens der gegenwärtigen Kultur geht. Allerdings haben sich seit der Zeit von Adornos und Horkheimers Kritik eine Menge Modelle der Kritik der Massenkultur ergeben, die die Entwicklung der technischen Apparate berücksichtigen, von den analogischen Videosystemen zu den jüngsten Entwicklungen der digitalen Medien. Da deren Betrachtung nicht immer den genannten kritischen Standpunkt bewahrt hat, könnte ein Kriterium für die Wahl einer kritischen Betrachtungsweise sein, die Art und Weise zu reflektieren, in der die Beziehung zwischen Kunstwerken und Kulturwaren entworfen wird. Dementsprechend wählt der Autor Villem Flussers Theorie der »Posthistoire« als eine zeitgemäße Gegenposition zu Horkheimer und Adorno, besonders in seiner Zugangsweise zu den Themen von Kommunikation, Unterhaltung und Kunst überhaupt. When Adorno and Horkheimer constructed in the early forties the critical concept of culture industry they had in mind mainly movies and radio as its main media. Even television broad- casting was not developed enough at that time to be considered as an important player in the scene of mass culture. Nevertheless the critical aspects of their contribution were so strong and well structured that even today they cannot be discarded in a fair evaluation of such an import- ant phenomenon of contemporary culture. However there have been since the time of Adorno and Horkheimer’s criticism many models of mass culture critique that took into account the evolution of the technological devices, from analogical video systems to the more recent developments of digital media. Since the consideration of the latter does not always rely on the maintenance of the aforementioned critical point of view, a criterion guiding the choice of a theoretical approach could be the way in which the relation between artworks and cultural commodities is conceived. According to this criterion the author chooses as an updated counterpoint to Adorno and Horkheimer’s mass culture critique Vilém Flusser’s theory of what he calls “post-history,” especially in its approach on communication, entertainment and art tout court.

13

Vázquez-Barrio, Tamara, Teresa Torrecillas-Lacave, and Rebeca Suárez-Álvarez. "Percepción sobre la televisión en el ecosistema audiovisual de la convergencia digital." El profesional de la información, January5, 2021. http://dx.doi.org/10.3145/epi.2020.nov.40.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Traditional television coexists with formats that originated on the internet, as well as on-demand consumption, paid television, and other audio-visual content distribution platforms. Audience data reveal a steady decline in television viewership, and digital technologies now allow any citizen to produce audio-visual content and distribute it for mass consumption through the internet. Given this new audio-visual ecosystem, the aim of this research is to ascertain whether there are any signs of a crisis regarding the dominance of television as a means of disseminating the products of the culture industry. Disinterest or indifference toward conventional programming by users would reveal a danger to the broadcast industry. In contrast, the consumption of television products through other channels would imply the retention of television audiences through the internet. This study analyzes perceptions regarding television through five online discussion groups. Three conclusions can be drawn: Firstly, television holds a prominent place in the daily lives of those who use it, including the youngest participants, despite the fact that audiences have declined in recent years. The second conclusion states that the perception of television is positive and associated with disengagement, relaxation, and family gatherings, which can be combined with individual consumption at other times of the day. As a third conclusion, this study reveals the high degree of compatibility between the internet and television screens, as new forms of consumption are emerging, yet there is still a predominant interest in content on television and from the mass culture industry. Resumen La televisión tradicional convive con formatos originados en internet, con el consumo bajo demanda, con la televisión de pago y con otras plataformas de distribución de contenido audiovisual. Los datos de audiencias muestran un descenso continuado de telespectadores y las tecnologías digitales permiten a cualquier ciudadano producir contenidos audiovisuales y distribuirlos para el consumo masivo a través de la Red. Ante este nuevo ecosistema audiovisual, el objetivo de esta investigación es comprobar si se pueden advertir signos de una crisis de la supremacía del televisor como medio de difusión de industria cultural. El desapego o indiferencia de los usuarios hacia la programación convencional evidenciaría un peligro para la televisión. Al contrario, el consumo de productos televisivos a través de otras pantallas implicaría el mantenimiento de las audiencias televisivas a través de internet. La investigación analiza las percepciones sobre la televisión mediante cinco grupos de discusión online. Se extraen tres conclusiones. La primera, que la televisión ocupa una posición relevante en la cotidianeidad de los participantes, incluidos los más jóvenes, a pesar de que las audiencias han descendido en los últimos años. La segunda, que la percepción sobre la televisión es positiva y se asocia a la desconexión, el relax y a un momento de reunión familiar compaginable con consumos individualizados en otros momentos del día. Tercera, el estudio demuestra el alto grado de compatibilidad entre internet y la pantalla del televisor porque surgen nuevas formas de consumo, pero se mantiene un interés predominante por los contenidos televisivos y de la gran industria cultural.

14

Ehiabhili,JohnC., AduragbemiO.Oke, Olusayo Olubosede, and DamilareO.Olobatuyi. "An Android Based Home Electrical Appliance Control System." FUOYE Journal of Engineering and Technology 5, no.2 (September20, 2020). http://dx.doi.org/10.46792/fuoyejet.v5i2.528.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Electric bulbs, television sets, fans and other home appliances are usually controlled largely with human effort using mechanical switches. However, over the past decade, there has been drastic improvement and advancement in consumer electronics and embedded systems. This has ensured a home environment where appliances can be connected and controlled using wireless technology and an Android smart phone. This study demonstrates the design of an automated system to assist and provide support in order to fulfill the needs of the physically disabled and elderly ones in controlling electrical appliances in homes. The heart of the control system is the wireless Bluetooth technology which provide remote access from a smart phone to a Bluetooth module and then to a control and switching unit. Bluetooth wireless connection enables the system to communicate with a Java application on an Android smart phone without cable. The user can easily touch on the phone screen to control the home appliances linked to the system. This method which requires minimal human effort is able to assist the disabled, sick and elderly people who have difficulties with locomotion. Thus, a control system has been designed which offer a low design, installation ease, quick response time and a user friendly interface in controlling home electrical appliances.Keywords - Android Phone, Bluetooth, Microcontroller, Relay and Switching

15

Mizrach, Steven. "Natives on the Electronic Frontier." M/C Journal 3, no.6 (December1, 2000). http://dx.doi.org/10.5204/mcj.1890.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction Many anthropologists and other academics have attempted to argue that the spread of technology is a global hom*ogenising force, socialising the remaining indigenous groups across the planet into an indistinct Western "monoculture" focussed on consumption, where they are rapidly losing their cultural distinctiveness. In many cases, these intellectuals -– people such as Jerry Mander -- often blame the diffusion of television (particularly through new innovations that are allowing it to penetrate further into rural areas, such as satellite and cable) as a key force in the effort to "assimilate" indigenous groups and eradicate their unique identities. Such writers suggest that indigenous groups can do nothing to resist the onslaught of the technologically, economically, and aesthetically superior power of Western television. Ironically, while often protesting the plight of indigenous groups and heralding their need for cultural survival, these authors often fail to recognise these groups’ abilities to fend for themselves and preserve their cultural integrity. On the other side of the debate are visual anthropologists and others who are arguing that indigenous groups are quickly becoming savvy to Western technologies, and that they are now using them for cultural revitalisation, linguistic revival, and the creation of outlets for the indigenous voice. In this school of thought, technology is seen not so much as a threat to indigenous groups, but instead as a remarkable opportunity to reverse the misfortunes of these groups at the hands of colonisation and national programmes of attempted assimilation. From this perspective, the rush of indigenous groups to adopt new technologies comes hand-in-hand with recent efforts to assert their tribal sovereignty and their independence. Technology has become a "weapon" in their struggle for technological autonomy. As a result, many are starting their own television stations and networks, and thus transforming the way television operates in their societies -– away from global monocultures and toward local interests. I hypothesise that in fact there is no correlation between television viewing and acculturation, and that, in fact, the more familiar people are with the technology of television and the current way the technology is utilised, the more likely they are to be interested in using it to revive and promote their own culture. Whatever slight negative effect exists depends on the degree to which local people can understand and redirect how that technology is used within their own cultural context. However, it should be stated that for terms of this investigation, I consider the technologies of "video" and "television" to be identical. One is the recording aspect, and the other the distribution aspect, of the same technology. Once people become aware that they can control what is on the television screen through the instrumentality of video, they immediately begin attempting to assert cultural values through it. And this is precisely what is going on on the Cheyenne River Reservation. This project is significant because the phenomenon of globalisation is real and Western technologies such as video, radio, and PCs are spreading throughout the world, including the "Fourth World" of the planet’s indigenous peoples. However, in order to deal with the phenomenon of globalisation, anthropologists and others may need to deal more realistically with the phenomenon of technological diffusion, which operates far less simply than they might assume. Well-meaning anthropologists seeking to "protect" indigenous groups from the "invasion" of technologies which will change their way of life may be doing these groups a disservice. If they turned some of their effort away from fending off these technologies and toward teaching indigenous groups how to use them, perhaps they might have a better result in creating a better future for them. I hope this study will show a more productive model for dealing with technological diffusion and what effects it has on cultural change in indigenous societies. There have been very few authors that have dealt with this topic head-on. One of the first to do so was Pace (1993), who suggested that some Brazilian Indians were acculturating more quickly as a result of television finally coming to their remote villages in the 1960s. Molohon (1984) looked at two Cree communities, and found that the one which had more heavy television viewing was culturally closer to its neighboring white towns. Zimmerman (1996) fingered television as one of the key elements in causing Indian teenagers to lose their sense of identity, thus putting them at higher risk for suicide. Gillespie (1995) argued that television is actually a ‘weapon’ of national states everywhere in their efforts to assimilate and socialise indigenous and other ethnic minority groups. In contrast, authors like Weiner (1997), Straubhaar (1991), and Graburn (1982) have all critiqued these approaches, suggesting that they deny subjectivity and critical thinking to indigenous TV audiences. Each of these researchers suggest, based on their field work, that indigenous people are no more likely than anybody else to believe that the things they see on television are true, and no more likely to adopt the values or worldviews promoted by Western TV programmers and advertisers. In fact, Graburn has observed that the Inuit became so disgusted with what they saw on Canadian national television, that they went out and started their own TV network in an effort to provide their people with meaningful alternatives on their screens. Bell (1995) sounds a cautionary note against studies like Graburn’s, noting that the efforts of indigenous New Zealanders to create their own TV programming for local markets failed, largely because they were crowded out by the "media imperialism" of outside international television. Although the indigenous groups there tried to put their own faces on the screen, many local viewers preferred to see the faces of J.R. Ewing and company, and lowered the ratings share of these efforts. Salween (1991) thinks that global media "cultural imperialism" is real -– that it is an objective pursued by international television marketers -– and suggests a media effects approach might be the best way to see whether it works. Woll (1987) notes that historically many ethnic groups have formed their self-images based on the way they have been portrayed onscreen, and that so far these portrayals have been far from sympathetic. In fact, even once these groups started their own cinemas or TV programmes, they unconsciously perpetuated stereotypes first foisted on them by other people. This study tends to side with those who have observed that indigenous people do not tend to "roll over" in the wake of the onslaught of Western television. Although cautionary studies need to be examined carefully, this research will posit that although the dominant forces controlling TV are antithetical to indigenous groups and their goals, the efforts of indigenous people to take control of their TV screens and their own "media literacy" are also increasing. Thus, this study should contribute to the viewpoint that perhaps the best way to save indigenous groups from cultural eradication is to give them access to television and show them how to set up their own stations and distribute their own video programming. In fact, it appears to be the case that TV, the Internet, and electronic 'new media' are helping to foster a process of cultural renewal, not just among the Lakota, but also among the Inuit, the Australian aborigines, and other indigenous groups. These new technologies are helping them renew their native languages, cultural values, and ceremonial traditions, sometimes by giving them new vehicles and forms. Methods The research for this project was conducted on the Cheyenne River Sioux Reservation headquartered in Eagle Butte, South Dakota. Participants chosen for this project were Lakota Sioux who were of the age of consent (18 or older) and who were tribal members living on the reservation. They were given a survey which consisted of five components: a demographic question section identifying their age, gender, and individual data; a technology question section identifying what technologies they had in their home; a TV question section measuring the amount of television they watched; an acculturation question section determining their comparative level of acculturation; and a cultural knowledge question section determining their knowledge of Lakota history. This questionnaire was often followed up by unstructured ethnographic interviews. Thirty-three people of mixed age and gender were given this questionnaire, and for the purposes of this research paper, I focussed primarily on their responses dealing with television and acculturation. These people were chosen through strictly random sampling based on picking addresses at random from the phone book and visiting their houses. The television section asked specifically how many hours of TV they watched per day and per week, what shows they watched, what kinds of shows they preferred, and what rooms in their home had TVs. The acculturation section asked them questions such as how much they used the Lakota language, how close their values were to Lakota values, and how much participation they had in traditional indigenous rituals and customs. To assure open and honest responses, each participant filled out a consent form, and was promised anonymity of their answers. To avoid data contamination, I remained with each person until they completed the questionnaire. For my data analysis, I attempted to determine if there was any correlation (Pearson’s coefficient r of correlation) between such things as hours of TV viewed per week or years of TV ownership with such things as the number of traditional ceremonies they attended in the past year, the number of non-traditional Lakota values they had, their fluency in the Lakota language, their level of cultural knowledge, or the number of traditional practices and customs they had engaged in in their lives. Through simple statistical tests, I determined whether television viewing had any impact on these variables which were reasonable proxies for level of acculturation. Findings Having chosen two independent variables, hours of TV watched per week, and years of TV ownership, I tested if there was any significant correlation between them and the dependent variables of Lakota peoples’ level of cultural knowledge, participation in traditional practices, conformity of values to non-Lakota or non-traditional values, fluency in Lakota, and participation in traditional ceremonies (Table 1). These variables all seemed like reasonable proxies for acculturation since acculturated Lakota would know less of their own culture, go to fewer ceremonies, and so on. The cultural knowledge score was based on how many complete answers the respondents knew to ‘fill in the blank’ questions regarding Lakota history, historical figures, and important events. Participation in traditional practices was based on how many items they marked in a survey of whether or not they had ever raised a tipi, used traditional medicine, etc. The score for conformity to non-Lakota values was based on how many items they marked with a contrary answer to the emic Lakota value system ("the seven Ws".) Lakota fluency was based on how well they could speak, write, or use the Lakota language. And ceremonial attendance was based on the number of traditional ceremonies they had attended in the past year. There were no significant correlations between either of these TV-related variables and these indexes of acculturation. Table 1. R-Scores (Pearson’s Coefficient of Correlation) between Variables Representing Television and Acculturation R-SCORES Cultural Knowledge Traditional Practices Modern Values Lakota Fluency Ceremonial Attendance Years Owning TV 0.1399 -0.0445 -0.4646 -0.0660 0.1465 Hours of TV/Week -0.3414 -0.2640 -0.2798 -0.3349 0.2048 The strongest correlation was between the number of years the Lakota person owned a television, and the number of non-Lakota (or ‘modern Western’) values they held in their value system. But even that correlation was pretty weak, and nowhere near the r-score of other linear correlations, such as between their age and the number of children they had. How much television Lakota people watched did not seem to have any influence on how much cultural knowledge they knew, how many traditional practices they had participated in, how many non-Lakota values they held, how well they spoke or used the Lakota language, or how many ceremonies they attended. Even though there does not appear to be anything unusual about their television preferences, and in general they are watching the same shows as other non-Lakota people on the reservation, they are not becoming more acculturated as a result of their exposure to television. Although the Lakota people may be losing aspects of their culture, language, and traditions, other causes seem to be at the forefront than television. I also found that people who were very interested in television production as well as consumption saw this as a tool for putting more Lakota-oriented programs on the air. The more they knew about how television worked, the more they were interested in using it as a tool in their own community. And where I was working at the Cultural Center, there was an effort to videotape many community and cultural events. The Center had a massive archive of videotaped material, but unfortunately while they had faithfully recorded all kinds of cultural events, many of them were not quite "broadcast ready". There was more focus on showing these video programmes, especially oral history interviews with elders, on VCRs in the school system, and in integrating them into various kinds of multimedia and hypermedia. While the Cultural Center had begun broadcasting (remotely through a radio modem) a weekly radio show, ‘Wakpa Waste’ (Good Morning CRST), on the radio station to the north, KLND-Standing Rock, there had never been any forays into TV broadcasting. The Cultural Center director had looked into the feasibility of putting up a television signal transmission tower, and had applied for a grant to erect one, but that grant was denied. The local cable system in Eagle Butte unfortunately lacked the technology to carry true "local access" programming; although the Channel 8 of the system carried CRST News and text announcements, there was no open channel available to carry locally produced public access programming. The way the cable system was set up, it was purely a "relay" or feed from news and channels from elsewhere. Also, people were investing heavily in satellite systems, especially the new DBS (direct broadcast satellite) receivers, and would not be able to pick up local access programmes anyway. The main problem hindering the Lakotas’ efforts to preserve their culture through TV and video was lack of access to broadcast distribution technology. They had the interest, the means, and the stock of programming to put on the air. They had the production and editing equipment, although not the studios to do a "live" show. Were they able to have more local access to and control over TV distribution technology, they would have a potent "arsenal" for resisting the drastic acculturation their community is undergoing. TV has the potential to be a tool for great cultural revitalisation, but because the technology and know-how for producing it was located elsewhere, the Lakotas could not benefit from it. Discussion I hypothesised that the effects if TV viewing on levels of indigenous acculturation would be negligible. The data support my hypothesis that TV does not seem to have a major correlation with other indices of acculturation. Previous studies by anthropologists such as Pace and Molohon suggested that TV was a key determinant in the acculturation of indigenous people in Brazil and the U.S. -– this being the theory of cultural imperialism. However, this research suggests that TV’s effect on the decline of indigenous culture is weak and inconclusive. In fact, the qualitative data suggest that the Lakota most familiar with TV are also the most interested in using it as a tool for cultural preservation. Although the CRST Lakota currently lack the means for mass broadcast of cultural programming, there is great interest in it, and new technologies such as the Internet and micro-broadcast may give them the means. There are other examples of this phenomenon worldwide, which suggest that the Lakota experience is not unique. In recent years, Australian Aborigines, Canadian Inuit, and Brazilian Kayapo have each begun ambitious efforts in creating satellite-based television networks that allow them to reach their far-flung populations with programming in their own indigenous language. In Australia, Aboriginal activists have created music television programming which has helped them assert their position in land claims disputes with the Australian government (Michaels 1994), and also to educate the Europeans of Australia about the aboriginal way of life. In Canada, the Inuit have also created satellite TV networks which are indigenous-owned and operated and carry traditional cultural programming (Valaskakis 1992). Like the Aborigines and the Inuit, the Lakota through their HVJ Lakota Cultural Center are beginning to create their own radio and video programming on a smaller scale, but are beginning to examine using the reservation's cable network to carry some of this material. Since my quantitative survey included only 33 respondents, the data are not as robust as would be determined from a larger sample. However, ethnographic interviews focussing on how people approach TV, as well as other qualitative data, support the inferences of the quantitative research. It is not clear that my work with the Lakota is necessarily generalisable to other populations. Practically, it does suggest that anthropologists interested in cultural and linguistic preservation should strive to increase indigenous access to, and control of, TV production technology. ‘Protecting’ indigenous groups from new technologies may cause more harm than good. Future applied anthropologists should work with the ‘natives’ and help teach them how to adopt and adapt this technology for their own purposes. Although this is a matter that I deal with more intensively in my dissertation, it also appears to me to be the case that, contrary to the warnings of Mander, many indigenous cultures are not being culturally assimilated by media technology, but instead are assimilating the technology into their own particular cultural contexts. The technology is part of a process of revitalisation or renewal -- although there is a definite process of change and adaptation underway, this actually represents an 'updating' of old cultural practices for new situations in an attempt to make them viable for the modern situation. Indeed, I think that the Internet, globally, is allowing indigenous people to reassert themselves as a Fourth World "power bloc" on the world stage, as linkages are being formed between Saami, Maya, Lakota, Kayapo, Inuit, and Aborigines. Further research should focus on: why TV seems to have a greater acculturative influence on certain indigenous groups rather than others; whether indigenous people can truly compete equally in the broadcast "marketplace" with Western cultural programming; and whether attempts to quantify the success of TV/video technology in cultural preservation and revival can truly demonstrate that this technology plays a positive role. In conclusion, social scientists may need to take a sidelong look at why precisely they have been such strong critics of introducing new technologies into indigenous societies. There is a better role that they can play –- that of technology ‘broker’. They can cooperate with indigenous groups, serving to facilitate the exchange of knowledge, expertise, and technology between them and the majority society. References Bell, Avril. "'An Endangered Species’: Local Programming in the New Zealand Television Market." Media, Culture & Society 17.1 (1995): 182-202. Gillespie, Marie. Television, Ethnicity, and Cultural Change. New York: Routledge, 1995. Graburn, Nelson. "Television and the Canadian Inuit". Inuit Etudes 6.2 (1982): 7-24. Michaels, Eric. Bad Aboriginal Art: Tradition, Media, and Technological Horizons. Minneapolis: U of Minnesota P, 1994. Molohon, K.T. "Responses to Television in Two Swampy Cree Communities on the West James Bay." Kroeber Anthropology Society Papers 63/64 (1982): 95-103. Pace, Richard. "First-Time Televiewing in Amazonia: Television Acculturation in Gurupa, Brazil." Ethnology 32.1 (1993): 187-206. Salween, Michael. "Cultural Imperialism: A Media Effects Approach." Critical Studies in Mass Communication 8.2 (1991): 29-39. Straubhaar, J. "Beyond Media Imperialism: Asymmetrical Interdependence and Cultural Proximity". Critical Studies in Mass Communication 8.1 (1991): 39-70. Valaskakis, Gail. "Communication, Culture, and Technology: Satellites and Northern Native Broadcasting in Canada". Ethnic Minority Media: An International Perspective. Newbury Park: Sage Publications, 1992. Weiner, J. "Televisualist Anthropology: Representation, Aesthetics, Politics." Current Anthropology 38.3 (1997): 197-236. Woll, Allen. Ethnic and Racial Images in American Film and Television: Historical Essays and Bibliography. New York: Garland Press, 1987. Zimmerman, M. "The Development of a Measure of Enculturation for Native American Youth." American Journal of Community Psychology 24.1 (1996): 295-311. Citation reference for this article MLA style: Steven Mizrach. "Natives on the Electronic Frontier: Television and Cultural Change on the Cheyenne River Sioux Reservation." M/C: A Journal of Media and Culture 3.6 (2000). [your date of access] <http://www.api-network.com/mc/0012/natives.php>. Chicago style: Steven Mizrach, "Natives on the Electronic Frontier: Television and Cultural Change on the Cheyenne River Sioux Reservation," M/C: A Journal of Media and Culture 3, no. 6 (2000), <http://www.api-network.com/mc/0012/natives.php> ([your date of access]). APA style: Steven Mizrach. (2000) Natives on the electronic frontier: television and cultural change on the Cheyenne River Sioux Reservation. M/C: A Journal of Media and Culture 3(6). <http://www.api-network.com/mc/0012/natives.php> ([your date of access]).

16

Goggin, Gerard. "‘mobile text’." M/C Journal 7, no.1 (January1, 2004). http://dx.doi.org/10.5204/mcj.2312.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Mobile In many countries, more people have mobile phones than they do fixed-line phones. Mobile phones are one of the fastest growing technologies ever, outstripping even the internet in many respects. With the advent and widespread deployment of digital systems, mobile phones were used by an estimated 1, 158, 254, 300 people worldwide in 2002 (up from approximately 91 million in 1995), 51. 4% of total telephone subscribers (ITU). One of the reasons for this is mobility itself: the ability for people to talk on the phone wherever they are. The communicative possibilities opened up by mobile phones have produced new uses and new discourses (see Katz and Aakhus; Brown, Green, and Harper; and Plant). Contemporary soundscapes now feature not only voice calls in previously quiet public spaces such as buses or restaurants but also the aural irruptions of customised polyphonic ringtones identifying whose phone is ringing by the tune downloaded. The mobile phone plays an important role in contemporary visual and material culture as fashion item and status symbol. Most tragically one might point to the tableau of people in the twin towers of the World Trade Centre, or aboard a plane about to crash, calling their loved ones to say good-bye (Galvin). By contrast, one can look on at the bathos of Australian cricketer Shane Warne’s predilection for pressing his mobile phone into service to arrange wanted and unwanted assignations while on tour. In this article, I wish to consider another important and so far also under-theorised aspect of mobile phones: text. Of contemporary textual and semiotic systems, mobile text is only a recent addition. Yet it is already produces millions of inscriptions each day, and promises to be of far-reaching significance. Txt Txt msg ws an acidnt. no 1 expcted it. Whn the 1st txt msg ws sent, in 1993 by Nokia eng stdnt Riku Pihkonen, the telcom cpnies thought it ws nt important. SMS – Short Message Service – ws nt considrd a majr pt of GSM. Like mny teks, the *pwr* of txt — indeed, the *pwr* of the fon — wz discvrd by users. In the case of txt mssng, the usrs were the yng or poor in the W and E. (Agar 105) As Jon Agar suggests in Constant Touch, textual communication through mobile phone was an after-thought. Mobile phones use radio waves, operating on a cellular system. The first such mobile service went live in Chicago in December 1978, in Sweden in 1981, in January 1985 in the United Kingdom (Agar), and in the mid-1980s in Australia. Mobile cellular systems allowed efficient sharing of scarce spectrum, improvements in handsets and quality, drawing on advances in science and engineering. In the first instance, technology designers, manufacturers, and mobile phone companies had been preoccupied with transferring telephone capabilities and culture to the mobile phone platform. With the growth in data communications from the 1960s onwards, consideration had been given to data capabilities of mobile phone. One difficulty, however, had been the poor quality and slow transfer rates of data communications over mobile networks, especially with first-generation analogue and early second-generation digital mobile phones. As the internet was widely and wildly adopted in the early to mid-1990s, mobile phone proponents looked at mimicking internet and online data services possibilities on their hand-held devices. What could work on a computer screen, it was thought, could be reinvented in miniature for the mobile phone — and hence much money was invested into the wireless access protocol (or WAP), which spectacularly flopped. The future of mobiles as a material support for text culture was not to lie, at first at least, in aping the world-wide web for the phone. It came from an unexpected direction: cheap, simple letters, spelling out short messages with strange new ellipses. SMS was built into the European Global System for Mobile (GSM) standard as an insignificant, additional capability. A number of telecommunications manufacturers thought so little of the SMS as not to not design or even offer the equipment needed (the servers, for instance) for the distribution of the messages. The character sets were limited, the keyboards small, the typeface displays rudimentary, and there was no acknowledgement that messages were actually received by the recipient. Yet SMS was cheap, and it offered one-to-one, or one-to-many, text communications that could be read at leisure, or more often, immediately. SMS was avidly taken up by young people, forming a new culture of media use. Sending a text message offered a relatively cheap and affordable alternative to the still expensive timed calls of voice mobile. In its early beginnings, mobile text can be seen as a subcultural activity. The text culture featured compressed, cryptic messages, with users devising their own abbreviations and grammar. One of the reasons young people took to texting was a tactic of consolidating and shaping their own shared culture, in distinction from the general culture dominated by their parents and other adults. Mobile texting become involved in a wider reworking of youth culture, involving other new media forms and technologies, and cultural developments (Butcher and Thomas). Another subculture that also was in the vanguard of SMS was the Deaf ‘community’. Though the Alexander Graham Bell, celebrated as the inventor of the telephone, very much had his hearing-impaired wife in mind in devising a new form of communication, Deaf people have been systematically left off the telecommunications network since this time. Deaf people pioneered an earlier form of text communications based on the Baudot standard, used for telex communications. Known as teletypewriter (TTY), or telecommunications device for the Deaf (TDD) in the US, this technology allowed Deaf people to communicate with each other by connecting such devices to the phone network. The addition of a relay service (established in Australia in the mid-1990s after much government resistance) allows Deaf people to communicate with hearing people without TTYs (Goggin & Newell). Connecting TTYs to mobile phones have been a vexed issue, however, because the digital phone network in Australia does not allow compatibility. For this reason, and because of other features, Deaf people have become avid users of SMS (Harper). An especially favoured device in Europe has been the Nokia Communicator, with its hinged keyboard. The move from a ‘restricted’, ‘subcultural’ economy to a ‘general’ economy sees mobile texting become incorporated in the semiotic texture and prosaic practices of everyday life. Many users were already familiar with the new conventions already developed around electronic mail, with shorter, crisper messages sent and received — more conversation-like than other correspondence. Unlike phone calls, email is asynchronous. The sender can respond immediately, and the reply will be received with seconds. However, they can also choose to reply at their leisure. Similarly, for the adept user, SMS offers considerable advantages over voice communications, because it makes textual production mobile. Writing and reading can take place wherever a mobile phone can be turned on: in the street, on the train, in the club, in the lecture theatre, in bed. The body writes differently too. Writing with a pen takes a finger and thumb. Typing on a keyboard requires between two and ten fingers. The mobile phone uses the ‘fifth finger’ — the thumb. Always too early, and too late, to speculate on contemporary culture (Morris), it is worth analyzing the textuality of mobile text. Theorists of media, especially television, have insisted on understanding the specific textual modes of different cultural forms. We are familiar with this imperative, and other methods of making visible and decentring structures of text, and the institutions which animate and frame them (whether author or producer; reader or audience; the cultural expectations encoded in genre; the inscriptions in technology). In formal terms, mobile text can be described as involving elision, great compression, and open-endedness. Its channels of communication physically constrain the composition of a very long single text message. Imagine sending James Joyce’s Finnegan’s Wake in one text message. How long would it take to key in this exemplar of the disintegration of the cultural form of the novel? How long would it take to read? How would one navigate the text? Imagine sending the Courier-Mail or Financial Review newspaper over a series of text messages? The concept of the ‘news’, with all its cultural baggage, is being reconfigured by mobile text — more along the lines of the older technology of the telegraph, perhaps: a few words suffices to signify what is important. Mobile textuality, then, involves a radical fragmentation and unpredictable seriality of text lexia (Barthes). Sometimes a mobile text looks singular: saying ‘yes’ or ‘no’, or sending your name and ID number to obtain your high school or university results. Yet, like a telephone conversation, or any text perhaps, its structure is always predicated upon, and haunted by, the other. Its imagined reader always has a mobile phone too, little time, no fixed address (except that hailed by the network’s radio transmitter), and a finger poised to respond. Mobile text has structure and channels. Yet, like all text, our reading and writing of it reworks those fixities and makes destabilizes our ‘clear’ communication. After all, mobile textuality has a set of new pre-conditions and fragilities. It introduces new sorts of ‘noise’ to signal problems to annoy those theorists cleaving to the Shannon and Weaver linear model of communication; signals often drop out; there is a network confirmation (and message displayed) that text messages have been sent, but no system guarantee that they have been received. Our friend or service provider might text us back, but how do we know that they got our text message? Commodity We are familiar now with the pleasures of mobile text, the smile of alerting a friend to our arrival, celebrating good news, jilting a lover, making a threat, firing a worker, flirting and picking-up. Text culture has a new vector of mobility, invented by its users, but now coveted and commodified by businesses who did not see it coming in the first place. Nimble in its keystrokes, rich in expressivity and cultural invention, but relatively rudimentary in its technical characteristics, mobile text culture has finally registered in the boardrooms of communications companies. Not only is SMS the preferred medium of mobile phone users to keep in touch with each other, SMS has insinuated itself into previously separate communication industries arenas. In 2002-2003 SMS became firmly established in television broadcasting. Finally, interactive television had arrived after many years of prototyping and being heralded. The keenly awaited back-channel for television arrives courtesy not of cable or satellite television, nor an extra fixed-phone line. It’s the mobile phone, stupid! Big Brother was not only a watershed in reality television, but also in convergent media. Less obvious perhaps than supplementary viewing, or biographies, or chat on Big Brother websites around the world was the use of SMS for voting. SMS is now routinely used by mainstream television channels for viewer feedback, contest entry, and program information. As well as its widespread deployment in broadcasting, mobile text culture has been the language of prosaic, everyday transactions. Slipping into a café at Bronte Beach in Sydney, why not pay your parking meter via SMS? You’ll even receive a warning when your time is up. The mobile is becoming the ‘electronic purse’, with SMS providing its syntax and sentences. The belated ingenuity of those fascinated by the economics of mobile text has also coincided with a technological reworking of its possibilities, with new implications for its semiotic possibilities. Multimedia messaging (MMS) has now been deployed, on capable digital phones (an instance of what has been called 2.5 generation [G] digital phones) and third-generation networks. MMS allows images, video, and audio to be communicated. At one level, this sort of capability can be user-generated, as in the popularity of mobiles that take pictures and send these to other users. Television broadcasters are also interested in the capability to send video clips of favourite programs to viewers. Not content with the revenues raised from millions of standard-priced SMS, and now MMS transactions, commercial participants along the value chain are keenly awaiting the deployment of what is called ‘premium rate’ SMS and MMS services. These services will involve the delivery of desirable content via SMS and MMS, and be priced at a premium. Products and services are likely to include: one-to-one textchat; subscription services (content delivered on handset); multi-party text chat (such as chat rooms); adult entertainment services; multi-part messages (such as text communications plus downloads); download of video or ringtones. In August 2003, one text-chat service charged $4.40 for a pair of SMS. Pwr At the end of 2003, we have scarcely registered the textual practices and systems in mobile text, a culture that sprang up in the interstices of telecommunications. It may be urgent that we do think about the stakes here, as SMS is being extended and commodified. There are obvious and serious policy issues in premium rate SMS and MMS services, and questions concerning the political economy in which these are embedded. Yet there are cultural questions too, with intricate ramifications. How do we understand the effects of mobile textuality, rewriting the telephone book for this new cultural form (Ronell). What are the new genres emerging? And what are the implications for cultural practice and policy? Does it matter, for instance, that new MMS and 3rd generation mobile platforms are not being designed or offered with any-to-any capabilities in mind: allowing any user to upload and send multimedia communications to other any. True, as the example of SMS shows, the inventiveness of users is difficult to foresee and predict, and so new forms of mobile text may have all sorts of relationships with content and communication. However, there are worrying signs of these developing mobile circuits being programmed for narrow channels of retail purchase of cultural products rather than open-source, open-architecture, publicly usable nodes of connection. Works Cited Agar, Jon. Constant Touch: A Global History of the Mobile Phone. Cambridge: Icon, 2003. Barthes, Roland. S/Z. Trans. Richard Miller. New York: Hill & Wang, 1974. Brown, Barry, Green, Nicola, and Harper, Richard, eds. Wireless World: Social, Cultural, and Interactional Aspects of the Mobile Age. London: Springer Verlag, 2001. Butcher, Melissa, and Thomas, Mandy, eds. Ingenious: Emerging youth cultures in urban Australia. Melbourne: Pluto, 2003. Galvin, Michael. ‘September 11 and the Logistics of Communication.’ Continuum: Journal of Media and Cultural Studies 17.3 (2003): 303-13. Goggin, Gerard, and Newell, Christopher. Digital Disability: The Social Construction of Digital in New Media. Lanham, MA: Rowman & Littlefield, 2003. Harper, Phil. ‘Networking the Deaf Nation.’ Australian Journal of Communication 30. 3 (2003), in press. International Telecommunications Union (ITU). ‘Mobile Cellular, subscribers per 100 people.’ World Telecommunication Indicators <http://www.itu.int/ITU-D/ict/statistics/> accessed 13 October 2003. Katz, James E., and Aakhus, Mark, eds. Perpetual Contact: Mobile Communication, Private Talk, Public Performance. Cambridge: Cambridge U P, 2002. Morris, Meaghan. Too Soon, Too Late: History in Popular Culture. Bloomington and Indianapolis: U of Indiana P, 1998. Plant, Sadie. On the Mobile: The Effects of Mobile Telephones on Social and Individual Life. < http://www.motorola.com/mot/documents/0,1028,296,00.pdf> accessed 5 October 2003. Ronell, Avital. The Telephone Book: Technology—schizophrenia—electric speech. Lincoln: U of Nebraska P, 1989. Citation reference for this article MLA Style Goggin, Gerard. "‘mobile text’" M/C: A Journal of Media and Culture <http://www.media-culture.org.au/0401/03-goggin.php>. APA Style Goggin, G. (2004, Jan 12). ‘mobile text’. M/C: A Journal of Media and Culture, 7, <http://www.media-culture.org.au/0401/03-goggin.php>

17

Tsampiras, Carla. "“Hot Chicks on Board” – Gender, Meat, and Violence in Food Marketing in, and from, South Africa." Gender Questions 9, no.1 (March18, 2021). http://dx.doi.org/10.25159/2412-8457/7408.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

From local wholesale delivery trucks that transport the flesh of chickens, to sexist adverts by South African-owned fast-food chains with national and international reach, the gendered nature of the marketing and consumption of meat in South Africa is evident in multiple media. This article analyses vehicle livery and television and printed adverts devised to sell meat to consumers, and argues that the representations of bodies – those of womxn and the bodies of other species – as being available for consumption (visual or otherwise), is an expression of the gendered social processes associated with food “production” and consumption (visual and physical) and the patriarchal capitalocene. The representations and production of food are innately linked to multiple forms of violence, including the repetitive visual aggressions associated with the female form being constantly under scrutiny and available for consumption. In the visual representations of convenience foods, the food and the absent referents they rely on deploy stereotypes of heteromasculinities and (hyper)femininities and are used to reinforce hierarchies of gender, species, and economic systems (and the violence associated with them). These images and food items thus act as “ordinary” indexes of patriarchal, capitalocene power relations.

18

"Calibrating an area-detector diffractometer: imaging geometry." Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences 425, no.1868 (September8, 1989): 129–67. http://dx.doi.org/10.1098/rspa.1989.0102.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

All commercially available electronic area-detector cameras and diffractometers need to be calibrated. The single most important calibration is that of the distortions in the imaging geometry of the detector. The author has written three generations of computer code to do this for a television detector, which are described here. The first has been widely released, and is used on every ENRAF-NONIUS fast system, which is a commercially available area-sensitive X-ray diffractometer. All of them rely on the use of bivariate power-series expansions of the detector-plane positions of the diffraction-spots. They are capable of very high accuracy of determination, and the later versions can also accommodate short-term variations caused by fluctuations in thermal or magnetic conditions, even during dynamic operation of the machine. The third version also allows interpolation between calibrations to allow the detectors to be used in non -calibrated positions, and at non-calibrated gain settings. Fitting distortions is a general problem, and some of the techniques used may be applicable to other unstable or distorting imaging systems. A reconstruction of the conjugate-gradient algorithm of least-squares optimization applicable to real-time tracking procedures is presented here. The use of an amorphous fluorescent-scatterer to illuminate the entire area of the detector relatively uniformly with intense X-rays is also described.

19

Trifiro, Briana, Chris Wells, and Alexander Rochefort. "THE DISINFECTANT DIVERSION: FRAMING STRATEGIES OF PARTISAN MEDIA IN INTERPRETING THE COVID-19 PANDEMIC." AoIR Selected Papers of Internet Research, September15, 2021. http://dx.doi.org/10.5210/spir.v2021i0.12253.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Following the rise of Donald Trump leading up to the 2016 US presidential election, political communication scholars have turned a critical eye towards the role of conservative media outlets in the construction of an overarching meta-narrative, largely referred to in the existing literature as the “deep story” (Hochschild, 2016). The aim of the present study to extend this seminal work to analyze how mainstream, conservative, and liberal outlets rely on meta-narratives to construct meaning in their coverage of the COVID-19 pandemic. Employing qualitative methods, we analyze the coverage that six American news outlets afforded the April 23rd 2020 Coronavirus Task Force news briefing, where President Trump insinuated injections of disinfectant could be a useful way to fight COVID-19. Our analysis includes 115 news articles, 41 Facebook posts and 87 television clips from these outlets. Our results reveal that both the left and right wing media systems employed overarching narratives in their coverage. The left-wing media heavily emphasized the tendency to deny or argue scientific fact among conservatives. In contrast, we observed that the right-wing media constantly used similar framing strategies in an attempt to vilify the left-wing media and liberals. Considering the existing literature (Kreiss, 2018: Poletta & Callahan, 2019), we observed many instances where right-wing pundits and journalists relied on previously established heuristics, cuing audiences to perceive the left-wing media as elitist out to discredit Trump. Our findings provide an in-depth analysis of how partisan media relies on meta-narratives to convey meaning to their audiences.

20

Caluya, Gilbert. "The Architectural Nervous System." M/C Journal 10, no.4 (August1, 2007). http://dx.doi.org/10.5204/mcj.2689.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

If the home is traditionally considered to be a space of safety associated with the warm and cosy feeling of the familial hearth, it is also continuously portrayed as a space under threat from the outside from which we must secure ourselves and our families. Securing the home entails a series of material, discursive and performative strategies, a host of precautionary measures aimed at regulating and ultimately producing security. When I was eleven my family returned home from the local fruit markets to find our house had been ransacked. Clothes were strewn across the floor, electrical appliances were missing and my parents’ collection of jewellery – wedding rings and heirlooms – had been stolen. Few things remained untouched and the very thought of someone else’s hands going through our personal belongings made our home feel tainted. My parents were understandably distraught. As Filipino immigrants to Australia the heirlooms were not only expensive assets from both sides of my family, but also signifiers of our homeland. Added to their despair was the fact that this was our first house – we had rented prior to that. During the police interviews, we discovered that our area, Sydney’s Western suburbs, was considered ‘high-risk’ and we were advised to install security. In their panic my parents began securing their home. Grills were installed on every window. Each external wooden door was reinforced by a metal security door. Movement detectors were installed at the front of the house, which were set to blind intruders with floodlights. Even if an intruder could enter the back through a window a metal grill security door was waiting between the backroom and the kitchen to stop them from getting to our bedrooms. In short, through a series of transformations our house was made into a residential fortress. Yet home security had its own dangers. A series of rules and regulations were drilled into me ‘in case of an emergency’: know where your keys are in case of a fire so that you can get out; remember the phone numbers for an emergency and the work numbers of your parents; never let a stranger into the house; and if you need to speak to a stranger only open the inside door but leave the security screen locked. Thus, for my Filipino-migrant family in the 1990s, a whole series of defensive behaviours and preventative strategies were produced and disseminated inside and around the home to regulate security risks. Such “local knowledges” were used to reinforce the architectural manifestations of security at the same time that they were a response to the invasion of security systems into our house that created a new set of potential dangers. This article highlights “the interplay of material and symbolic geographies of home” (Blunt and Varley 4), focusing on the relation between urban fears circulating around and within the home and the spatial practices used to negotiate such fears. In exploring home security systems it extends the exemplary analysis of home technologies already begun in Lynn Spigel’s reading of the ‘smart home’ (381-408). In a similar vein, David Morley’s analysis of mediated domesticity shows how communications technology has reconfigured the inside and outside to the extent that television actually challenges the physical boundary that “protects the privacy and solidarity of the home from the flux and threat of the outside world” (87). Television here serves as a passage in which the threat of the outside is reframed as news or entertainment for family viewing. I take this as a point of departure to consider the ways that this mediated fear unfolds in the technology of our homes. Following Brian Massumi, I read the home as “a node in a circulatory network of many dimensions (each corresponding to a technology of transmission)” (85). For Massumi, the home is an event-space at the crossroads of media technologies and political technologies. “In spite of the locks on the door, the event-space of the home must be seen as one characterized by a very loose regime of passage” (85). The ‘locked door’ is not only a boundary marker that defines the inside from the outside but another technology that leads us outside the home into other domains of inquiry: the proliferation of security technologies and the mundane, fearful intimacies of the home. In this context, we should heed Iris Marion Young’s injunction to feminist critics that the home does provide some positives including a sense of privacy and the space to build relationships and identities. Yet, as Colomina argues, the traditional domestic ideal “can only be produced by engaging the home in combat” (20). If, as Colomina’s comment suggests, ontological security is at least partially dependent on physical security, then this article explores the ontological effects of our home security systems. Houses at War: Targeting the Family As Beatriz Colomina reminds us, in times of war we leave our homelands to do battle on the front line, but battle lines are also being drawn in our homes. Drawing inspiration from Virilio’s claim that contemporary war takes place without fighting, Colomina’s article ‘Domesticity at War’ contemplates the domestic interior as a “battlefield” (15). The house, she writes, is “a mechanism within a war where the differences between defense [sic] and attack have become blurred” (17). According to the Home Security Precautions, New South Wales, October 1999 report conducted by the Australian Bureau of Statistics, 47% of NSW dwellings were ‘secure’ (meaning that they either had a burglar alarm, or all entry points were secured or they were inside a security block) while only 9% of NSW households had no home security devices present (Smith 3). In a similar report for Western Australia conducted in October 2004, an estimated 71% of WA households had window security of some sort (screens, locks or shutters) while 67% had deadlocks on at least one external door (4). An estimated 27% had a security alarm installed while almost half (49%) had sensor lights (Hubbard 4-5). This growing sense of insecurity means big business for those selling security products and services. By the end of June 1999, there were 1,714 businesses in Australia’s security services industry generating $1,395 million of income during 1998-99 financial year (McLennan 3; see also Macken). This survey did not include locksmith services or the companies dealing with alarm manufacturing, wholesaling or installing. While Colomina’s article focuses on the “war with weather” and the attempts to control environmental conditions inside the home through what she calls “counterdomesticity” (20), her conceptualisation of the house as a “military weapon” (17) provides a useful tool for thinking the relation between the home, architecture and security. Conceiving of the house as a military weapon might seem like a stretch, but we should recall that the rhetoric of war has already leaked into the everyday. One hears of the ‘war on drugs’ and the ‘war on crime’ in the media. ‘War’ is the everyday condition of our urban jungles (see also Diken and Lausten) and in order to survive, let alone feel secure, one must be able to defend one’s family and home. Take, for example, Signal Security’s website. One finds a panel on the left-hand side of the screen to all webpages devoted to “Residential Products”. Two circular images are used in the panel with one photograph overlapping the other. In the top circle, a white nuclear family (stereotypical mum, dad and two kids), dressed in pristine white clothing bare their white teeth to the internet surfer. Underneath this photo is another photograph in which an arm clad in a black leather jacket emerges through a smashed window. In the foreground a black-gloved hand manipulates a lock, while a black balaclava masks an unrecognisable face through the broken glass. The effect of their proximity produces a violent juxtaposition in which the burglar visually intrudes on the family’s domestic bliss. The panel stages a struggle between white and black, good and bad, family and individual, security and insecurity, recognisability and unidentifiability. It thus codifies the loving, knowable family as the domestic space of security against the selfish, unidentifiable intruder (presumed not to have a family) as the primary reason for insecurity in the family home – and no doubt to inspire the consumption of security products. Advertisem*nts of security products thus articulate the family home as a fragile innocence constantly vulnerable from the outside. From a feminist perspective, this image of the family goes against the findings of the National Homicide Monitoring Program, which shows that 57% of the women killed in Australia between 2004 and 2005 were killed by an intimate partner while 17% were killed by a family member (Mouzos and Houliaras 20). If, on the one hand, the family home is targeted by criminals, on the other, it has emerged as a primary site for security advertising eager to exploit the growing sense of insecurity – the family as a target market. The military concepts of ‘target’ and ‘targeting’ have shifted into the benign discourse of strategic advertising. As Dora Epstein writes, “We arm our buildings to arm ourselves from the intrusion of a public fluidity, and thus our buildings, our architectures of fortification, send a very clear message: ‘avoid this place or protect yourself’” (1997: 139). Epstein’s reference to ‘architectures of fortification’ reminds us that the desire to create security through the built environment has a long history. Nan Ellin has argued that fear’s physical manifestation can be found in the formation of towns from antiquity to the Renaissance. In this sense, towns and cities are always already a response to the fear of foreign invaders (Ellin 13; see also Diken and Lausten 291). This fear of the outsider is most obviously manifested in the creation of physical walls. Yet fortification is also an effect of spatial allusions produced by the configuration of space, as exemplified in Fiske, Hodge and Turner’s semiotic reading of a suburban Australian display home without a fence. While the lack of a fence might suggest openness, they suggest that the manicured lawn is flat so “that eyes can pass easily over it – and smooth – so that feet will not presume to” (30). Since the front garden is best viewed from the street it is clearly a message for the outside, but it also signifies “private property” (30). Space is both organised and lived, in such a way that it becomes a medium of communication to passers-by and would-be intruders. What emerges in this semiotic reading is a way of thinking about space as defensible, as organised in a way that space can begin to defend itself. The Problematic of Defensible Space The incorporation of military architecture into civil architecture is most evident in home security. By security I mean the material systems (from locks to electronic alarms) and precautionary practices (locking the door) used to protect spaces, both of which are enabled by a way of imagining space in terms of risk and vulnerability. I read Oscar Newman’s 1972 Defensible Space as outlining the problematic of spatial security. Indeed, it was around that period that the problematic of crime prevention through urban design received increasing attention in Western architectural discourse (see Jeffery). Newman’s book examines how spaces can be used to reinforce human control over residential environments, producing what he calls ‘defensible space.’ In Newman’s definition, defensible space is a model for residential environments which inhibits crime by creating the physical expression of a social fabric that defends itself. All the different elements which combine to make a defensible space have a common goal – an environment in which latent territoriality and sense of community in the inhabitants can be translated into responsibility for ensuring a safe, productive, and well-maintained living space (3). Through clever design space begins to defend itself. I read Newman’s book as presenting the contemporary problematic of spatialised security: how to structure space so as to increase control; how to organise architecture so as to foster territorialism; how to encourage territorial control through amplifying surveillance. The production of defensible space entails moving away from what he calls the ‘compositional approach’ to architecture, which sees buildings as separate from their environments, and the ‘organic approach’ to architecture, in which the building and its grounds are organically interrelated (Newman 60). In this approach Newman proposes a number of changes to space: firstly, spaces need to be multiplied (one no longer has a simple public/private binary, but also semi-private and semi-public spaces); secondly, these spaces must be hierarchised (moving from public to semi-public to semi-private to private); thirdly, within this hierarchy spaces can also be striated using symbolic or material boundaries between the different types of spaces. Furthermore, spaces must be designed to increase surveillance: use smaller corridors serving smaller sets of families (69-71); incorporate amenities in “defined zones of influence” (70); use L-shaped buildings as opposed to rectangles (84); use windows on the sides of buildings to reveal the fire escape from outside (90). As he puts it, the subdivision of housing projects into “small, recognisable and comprehensible-at-a-glance enclaves is a further contributor to improving the visual surveillance mechanism” (1000). Finally, Newman lays out the principle of spatial juxtaposition: consider the building/street interface (positioning of doors and windows to maximise surveillance); consider building/building interface (e.g. build residential apartments next to ‘safer’ commercial, industrial, institutional and entertainment facilities) (109-12). In short, Newman’s book effectively redefines residential space in terms of territorial zones of control. Such zones of influence are the products of the interaction between architectural forms and environment, which are not reducible to the intent of the architect (68). Thus, in attempting to respond to the exigencies of the moment – the problem of urban crime, the cost of housing – Newman maps out residential space in what Foucault might have called a ‘micro-physics of power’. During the mid-1970s through to the 1980s a number of publications aimed at the average householder are printed in the UK and Australia. Apart from trade publishing (Bunting), The UK Design Council released two small publications (Barty, White and Burall; Design Council) while in Australia the Department of Housing and Construction released a home safety publication, which contained a small section on security, and the Australian Institute of Criminology published a small volume entitled Designing out Crime: Crime prevention through environmental design (Geason and Wilson). While Newman emphasised the responsibility of architects and urban planners, in these publications the general concerns of defensible space are relocated in the ‘average homeowner’. Citing crime statistics on burglary and vandalism, these publications incite their readers to take action, turning the homeowner into a citizen-soldier. The householder, whether he likes it or not, is already in a struggle. The urban jungle must be understood in terms of “the principles of warfare” (Bunting 7), in which everyday homes become bodies needing protection through suitable architectural armour. Through a series of maps and drawings and statistics, the average residential home is transformed into a series of points of vulnerability. Home space is re-inscribed as a series of points of entry/access and lines of sight. Simultaneously, through lists of ‘dos and don’ts’ a set of precautionary behaviours is inculcated into the readers. Principles of security begin codifying the home space, disciplining the spatial practices of the intimate, regulating the access and mobility of the family and guests. The Architectural Nervous System Nowadays we see a wild, almost excessive, proliferation of security products available to the ‘security conscious homeowner’. We are no longer simply dealing with security devices designed to block – such as locks, bolts and fasteners. The electronic revolution has aided the production of security devices that are increasingly more specialised and more difficult to manipulate, which paradoxically makes it more difficult for the security consumer to understand. Detection systems now include continuous wiring, knock-out bars, vibration detectors, breaking glass detectors, pressure mats, underground pressure detectors and fibre optic signalling. Audible alarm systems have been upgraded to wire-free intruder alarms, visual alarms, telephone warning devices, access control and closed circuit television and are supported by uninterruptible power supplies and control panels (see Chartered Institution of Building Service Engineers 19-39). The whole house is literally re-routed as a series of relays in an electronic grid. If the house as a security risk is defined in terms of points of vulnerability, alarm systems take these points as potential points of contact. Relays running through floors, doors and windows can be triggered by pressure, sound or dislocation. We see a proliferation of sensors: switching sensors, infra-red sensors, ultrasonic sensors, microwave radar sensors, microwave fence sensors and microphonic sensors (see Walker). The increasing diversification of security products attests to the sheer scale of these architectural/engineering changes to our everyday architecture. In our fear of crime we have produced increasingly more complex security products for the home, thus complexifying the spaces we somehow inherently feel should be ‘simple’. I suggest that whereas previous devices merely reinforced certain architectural or engineering aspects of the home, contemporary security products actually constitute the home as a feeling, architectural body capable of being affected. This recalls notions of a sensuous architecture and bodily metaphors within architectural discourse (see Thomsen; Puglini). It is not simply our fears that lead us to secure our homes through technology, but through our fears we come to invest our housing architecture with a nervous system capable of fearing for itself. Our eyes and ears become detection systems while our screams are echoed in building alarms. Body organs are deterritorialised from the human body and reterritorialised on contemporary residential architecture, while our senses are extended through modern security technologies. The vulnerable body of the family home has become a feeling body conscious of its own vulnerability. It is less about the physical expression of fear, as Nan Ellin has put it, than about how building materialities become capable of fearing for themselves. What we have now are residential houses that are capable of being more fully mobilised in this urban war. Family homes become bodies that scan the darkness for the slightest movements, bodies that scream at the slightest possibility of danger. They are bodies that whisper to each other: a house can recognise an intrusion and relay a warning to a security station, informing security personnel without the occupants of that house knowing. They are the newly produced victims of an urban war. Our homes are the event-spaces in which mediated fear unfolds into an architectural nervous system. If media plug our homes into one set of relations between ideologies, representations and fear, then the architectural nervous system plugs that back into a different set of relations between capital, fear and the electronic grid. The home is less an endpoint of broadcast media than a node in an electronic network, a larger nervous system that encompasses the globe. It is a network that plugs architectural nervous systems into city electronic grids into mediated subjectivities into military technologies and back again, allowing fear to be disseminated and extended, replayed and spliced into the most banal aspects of our domestic lives. References Barty, Euan, David White, and Paul Burall. Safety and Security in the Home. London: The Design Council, 1980. Blunt, Alison, and Ann Varley. “Introduction: Geographies of Home.” Cultural Geographies 11.1 (2004): 3-6. Bunting, James. The Protection of Property against Crime. Folkestone: Bailey Brothers & Sinfen, 1975. Chartered Institution of Building Service Engineers. Security Engineering. London: CIBSE, 1991. Colomina, Beatriz. “Domesticity at War.” Assemblage 16 (1991): 14-41. Department of Housing and Construction. Safety in and around the Home. Canberra: Australian Government Publishing Service, 1981. Design Council. The Design Centre Guide to Domestic Safety and Security. London: Design Council, 1976. Diken, Bülent, and Carsten Bagge Lausten. “Zones of Indistinction: Security and Terror, and Bare Life.” Space and Culture 5.3 (2002): 290-307. Ellin, Nan. “Shelter from the Storm or Form Follows Fear and Vice Versa.” Architecture of Fear. Ed. Nan Ellin. New York: Princeton Architectural Press, 1997. Epstein, Dora. “Abject Terror: A Story of Fear, Sex, and Architecture.” Architecture of Fear. Ed. Nan Ellin. New York: Princeton Architectural Press, 1997. Fiske, John, Bob Hodge, and Graeme Turner. Myths of Oz: Reading Australian Popular Culture. Sydney: Allen & Unwin, 1987. Geason, Susan, and Paul Wilson. Designing Out Crime: Crime Prevention through Environmental Design. Canberra: Australian Institute of Criminology, 1989. Hubbard, Alan. Home Safety and Security, Western Australia. Canberra: Australian Bureau of Statistics, 2005. Jeffery, C. Ray. Crime Prevention through Environmental Design. Beverley Hills: Sage, 1971. Macken, Julie. “Why Aren’t We Happier?” Australian Financial Review 26 Nov. 1999: 26. Mallory, Keith, and Arvid Ottar. Architecture of Aggression: A History of Military Architecture in North West Europe, 1900-1945. Hampshire: Architectural Press, 1973. Massumi, Brian. Parables of the Virtual: Movement, Affect, Sensation. Durham: Duke University Press, 2002. McLennan, W. Security Services, Australia, 1998-99. Canberra: Australian Bureau of Statistics, 2000. Morley, David. Home Territories: Media, Mobility and Identity. London and New York: Routledge, 2000. Mouzos, Jenny, and Tina Houliaras. Homicide in Australia: 2004-05 National Homicide Monitoring Program (NHMP) Annual Report. Research and Public Policy Series 72. Canberra: Australian Institute of Criminology, 2006. Newman, Oscar. Defensible Space: Crime Prevention through Urban Design. New York: Collier, 1973. Puglini, Luigi. HyperArchitecture: Space in the Electronic Age. Basel: Bikhäuser, 1999. Signal Security. 13 January 2007 http://www.signalsecurity.com.au/securitysystems.htm>. Smith, Geoff. Home Security Precautions, New South Wales, October 1999. Canberra: Australian Bureau of Statistics, 2000. Spigel, Lynn. Welcome to the Dreamhouse: Popular Media and Postwar Suburbs. Durham and London: Duke University Press, 2001. Thomsen, Christian W. Sensuous Architecture: The Art of Erotic Building. Munich and New York: Prestel, 1998. Walker, Philip. Electronic Security Systems: Better Ways to Crime Prevention. London: Butterworths, 1983. Young, Iris Marion. “House and Home: Feminist Variations on a Theme.” Feminist Interpretations of Martin Heidegger. Eds. Nancy J. Holland and Patricia Huntington. University Park, Pennsylvania: Pennsylvania State UP, 2001. Citation reference for this article MLA Style Caluya, Gilbert. "The Architectural Nervous System: Home, Fear, Insecurity." M/C Journal 10.4 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0708/05-caluya.php>. APA Style Caluya, G. (Aug. 2007) "The Architectural Nervous System: Home, Fear, Insecurity," M/C Journal, 10(4). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0708/05-caluya.php>.

21

Rocavert, Carla. "Aspiring to the Creative Class: Reality Television and the Role of the Mentor." M/C Journal 19, no.2 (May4, 2016). http://dx.doi.org/10.5204/mcj.1086.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction Mentors play a role in real life, just as they do in fiction. They also feature in reality television, which sits somewhere between the two. In fiction, mentors contribute to the narrative arc by providing guidance and assistance (Vogler 12) to a mentee in his or her life or professional pursuits. These exchanges are usually characterized by reciprocity, the need for mutual recognition (Gadamer 353) and involve some kind of moral question. They dramatise the possibilities of mentoring in reality, to provide us with a greater understanding of the world, and our human interaction within it. Reality television offers a different perspective. Like drama it uses the plot device of a mentor character to heighten the story arc, but instead of focusing on knowledge-based portrayals (Gadamer 112) of the mentor and mentee, the emphasis is instead on the mentee’s quest for ascension. In attempting to transcend their unknownness (Boorstin) contestants aim to penetrate an exclusive creative class (Florida). Populated by celebrity chefs, businessmen, entertainers, fashionistas, models, socialites and talent judges (to name a few), this class seemingly adds authenticity to ‘competitions’ and other formats. While the mentor’s role, on the surface, is to provide divine knowledge and facilitate the journey, a different agenda is evident in the ways carefully scripted (Booth) dialogue heightens the drama through effusive praise (New York Daily News) and “tactless” (Woodward), humiliating (Hirschorn; Winant 69; Woodward) and cruel sentiments. From a screen narrative point of view, this takes reality television as ‘storytelling’ (Aggarwal; Day; Hirschorn; “Reality Writer”; Rupel; Stradal) into very different territory. The contrived and later edited (Crouch; Papacharissi and Mendelson 367) communication between mentor and mentee not only renders the relationship disingenuous, it compounds the primary ethical concerns of associated Schadenfreude (Balasubramanian, Forstie and van den Scott 434; Cartwright), and the severe financial inequality (Andrejevic) underpinning a multi-billion dollar industry (Hamilton). As upward mobility and instability continue to be ubiquitously portrayed in 21st century reality entertainment under neoliberalism (Sender 4; Winant 67), it is with increasing frequency that we are seeing the systematic reinvention of the once significant cultural and historical role of the mentor. Mentor as Fictional Archetype and Communicator of ThemesDepictions of mentors can be found across the Western art canon. From the mythological characters of Telemachus’ Athena and Achilles’ Chiron, to King Arthur’s Merlin, Cinderella’s Fairy Godmother, Jim Hawkins’ Long John Silver, Frodo’s Gandalf, Batman’s Alfred and Marty McFly’s Doc Emmett Brown (among many more), the dramatic energy of the teacher, expert or supernatural aid (Vogler 39) has been timelessly powerful. Heroes, typically, engage with a mentor as part of their journey. Mentor types range extensively, from those who provide motivation, inspiration, training or gifts (Vogler), to those who may be dark or malevolent, or have fallen from grace (such as Michael Douglas’ Gordon Gekko in Wall Street 1987, or the ex-tribute Haymitch in The Hunger Games, 2012). A good drama usually complicates the relationship in some way, exploring initial reluctance from either party, or instances of tragedy (Vogler 11, 44) which may prevent the relationship achieving its potential. The intriguing twist of a fallen or malevolent mentor additionally invites the audience to morally analyze the ways the hero responds to what the mentor provides, and to question what our teachers or superiors tell us. In television particularly, long running series such as Mad Men have shown how a mentoring relationship can change over time, where “non-rational” characters (Buzzanell and D’Enbeau 707) do not necessarily maintain reciprocity or equality (703) but become subject to intimate, ambivalent and erotic aspects.As the mentor in fiction has deep cultural roots for audiences today, it is no wonder they are used, in a variety of archetypal capacities, in reality television. The dark Simon Cowell (of Pop Idol, American Idol, Britain’s Got Talent, America’s Got Talent and The X-Factor series) and the ‘villainous’ (Byrnes) Michelin-starred Marco Pierre White (Hell’s Kitchen, The Chopping Block, Marco Pierre White’s Kitchen Wars, MasterChef Australia, New Zealand, South Africa) provide reality writers with much needed antagonism (Rupel, Stradal). Those who have fallen from grace, or allowed their personal lives to play out in tabloid sagas such as Britney Spears (Marikar), or Caitlyn Jenner (Bissinger) provide different sources of conflict and intrigue. They are then counterbalanced with or repackaged as the good mentor. Examples of the nurturer who shows "compassion and empathy" include American Idol’s Paula Abdul (Marche), or the supportive Jennifer Hawkins in Next Top Model (Thompson). These distinctive characters help audiences to understand the ‘reality’ as a story (Crouch; Rupel; Stradal). But when we consider the great mentors of screen fiction, it becomes clear how reality television has changed the nature of story. The Karate Kid I (1984) and Good Will Hunting (1998) are two examples where mentoring is almost the exclusive focus, and where the experience of the characters differs greatly. In both films an initially reluctant mentor becomes deeply involved in the mentee’s project. They act as a special companion to the hero in the face of isolation, and, significantly, reveal a tragedy of their own, providing a nexus through which the mentee can access a deeper kind of truth. Not only are they flawed and ordinary people (they are not celebrities within the imagined worlds of the stories) who the mentee must challenge and learn to truly respect, they are “effecting and important” (Maslin) in reminding audiences of those hidden idiosyncrasies that open the barriers to friendship. Mentors in these stories, and many others, communicate themes of class, culture, talent, jealousy, love and loss which inform ideas about the ethical treatment of the ‘other’ (Gadamer). They ultimately prove pivotal to self worth, human confidence and growth. Very little of this thematic substance survives in reality television (see comparison of plots and contrasting modes of human engagement in the example of The Office and Dirty Jobs, Winant 70). Archetypally identifiable as they may be, mean judges and empathetic supermodels as characters are concerned mostly with the embodiment of perfection. They are flawless, untouchable and indeed most powerful when human welfare is at stake, and when the mentee before them faces isolation (see promise to a future ‘Rihanna’, X-Factor USA, Season 2, Episode 1 and Tyra Banks’ Next Top Model tirade at a contestant who had not lived up to her potential, West). If connecting with a mentor in fiction has long signified the importance of understanding of the past, of handing down tradition (Gadamer 354), and of our fascination with the elder, wiser other, then we can see a fundamental shift in narrative representation of mentors in reality television stories. In the past, as we have opened our hearts to such characters, as a facilitator to or companion of the hero, we have rehearsed a sacred respect for the knowledge and fulfillment mentors can provide. In reality television the ‘drama’ may evoke a fleeting rush of excitement at the hero’s success or failure, but the reality belies a pronounced distancing between mentor and mentee. The Creative Class: An Aspirational ParadigmThemes of ascension and potential fulfillment are also central to modern creativity discourse (Runco; Runco 672; United Nations). Seen as the driving force of the 21st century, creativity is now understood as much more than art, capable of bringing economic prosperity (United Nations) and social cohesion to its acme (United Nations xxiii). At the upper end of creative practice, is what Florida called “the creative class: a fast growing, highly educated, and well-paid segment of the workforce” (on whose expertise corporate profits depend), in industries ranging “from technology to entertainment, journalism to finance, high-end manufacturing to the arts” (Florida). Their common ethos is centered on individuality, diversity, and merit; eclipsing previous systems focused on ‘shopping’ and theme park consumerism and social conservatism (Eisinger). While doubts have since been raised about the size (Eisinger) and financial practices (Krätke 838) of the creative class (particularly in America), from an entertainment perspective at least, the class can be seen in full action. Extending to rich housewives, celebrity teen mothers and even eccentric duck hunters and swamp people, the creative class has caught up to the more traditional ‘star’ actor or music artist, and is increasingly marketable within world’s most sought after and expensive media spaces. Often reality celebrities make their mark for being the most outrageous, the cruelest (Peyser), or the weirdest (Gallagher; Peyser) personalities in the spotlight. Aspiring to the creative class thus, is a very public affair in television. Willing participants scamper for positions on shows, particularly those with long running, heavyweight titles such as Big Brother, The Bachelor, Survivor and the Idol series (Hill 35). The better known formats provide high visibility, with the opportunity to perform in front of millions around the globe (Frere-Jones, Day). Tapping into the deeply ingrained upward-mobility rhetoric of America, and of Western society, shows are aided in large part by 24-hour news, social media, the proliferation of celebrity gossip and the successful correlation between pop culture and an entertainment-style democratic ideal. As some have noted, dramatized reality is closely tied to the rise of individualization, and trans-national capitalism (Darling-Wolf 127). Its creative dynamism indeed delivers multi-lateral benefits: audiences believe the road to fame and fortune is always just within reach, consumerism thrives, and, politically, themes of liberty, egalitarianism and freedom ‘provide a cushioning comfort’ (Peyser; Pinter) from the domestic and international ills that would otherwise dispel such optimism. As the trials and tests within the reality genre heighten the seriousness of, and excitement about ascending toward the creative elite, show creators reproduce the same upward-mobility themed narrative across formats all over the world. The artifice is further supported by the festival-like (Grodin 46) symbology of the live audience, mass viewership and the online voting community, which in economic terms, speaks to the creative power of the material. Whether through careful manipulation of extra media space, ‘game strategy’, or other devices, those who break through are even more idolized for the achievement of metamorphosing into a creative hero. For the creative elite however, who wins ‘doesn’t matter much’. Vertical integration is the priority, where the process of making contestants famous is as lucrative as the profits they will earn thereafter; it’s a form of “one-stop shopping” as the makers of Idol put it according to Frere-Jones. Furthermore, as Florida’s measures and indicators suggested, the geographically mobile new creative class is driven by lifestyle values, recreation, participatory culture and diversity. Reality shows are the embodiment this idea of creativity, taking us beyond stale police procedural dramas (Hirschorn) and racially typecast family sitcoms, into a world of possibility. From a social equality perspective, while there has been a notable rise in gay and transgender visibility (Gamson) and stories about lower socio-economic groups – fast food workers and machinists for example – are told in a way they never were before, the extent to which shows actually unhinge traditional power structures is, as scholars have noted (Andrejevic and Colby 197; Schroeder) open to question. As boundaries are nonetheless crossed in the age of neoliberal creativity, the aspirational paradigm of joining a new elite in real life is as potent as ever. Reality Television’s Mentors: How to Understand Their ‘Role’Reality television narratives rely heavily on the juxtaposition between celebrity glamour and comfort, and financial instability. As mentees put it ‘all on the line’, storylines about personal suffering are hyped and molded for maximum emotional impact. In the best case scenarios mentors such as Caitlyn Jenner will help a trans mentee discover their true self by directing them in a celebrity-style photo shoot (see episode featuring Caitlyn and Zeam, Logo TV 2015). In more extreme cases the focus will be on an adopted contestant’s hopes that his birth mother will hear him sing (The X Factor USA, Season 2, Episode 11 Part 1), or on a postal clerk’s fear that elimination will mean she has to go back “to selling stamps” (The X Factor US - Season 2 Episode 11 Part 2). In the entrepreneurship format, as Woodward pointed out, it is not ‘help’ that mentees are given, but condescension. “I have to tell you, my friend, that this is the worst idea I’ve ever heard. You don’t have a clue about how to set up a business or market a product,” Woodward noted as the feedback given by one elite businessman on The Shark Tank (Woodward). “This is a five million dollar contract and I have to know that you can go the distance” (The X Factor US – Season 2 Episode 11, Part 1) Britney Spears warned to a thirteen-year-old contestant before accepting her as part of her team. In each instance the fictitious premise of being either an ‘enabler’ or destroyer of dreams is replayed and slightly adapted for ongoing consumer interest. This lack of shared experience and mutual recognition in reality television also highlights the overt, yet rarely analyzed focus on the wealth of mentors as contrasted with their unstable mentees. In the respective cases of The X Factor and I Am Cait, one of the wealthiest moguls in entertainment, Cowell, reportedly contracts mentors for up to $15 million per season (Nair); Jenner’s performance in I Am Cait was also set to significantly boost the Kardashian empire (reportedly already worth $300 million, Pavia). In both series, significant screen time has been dedicated to showing the mentors in luxurious beachside houses, where mentees may visit. Despite the important social messages embedded in Caitlyn’s story (which no doubt nourishes the Kardashian family’s generally more ersatz material), the question, from a moral point of view becomes: would these mentors still interact with that particular mentee without the money? Regardless, reality participants insist they are fulfilling their dreams when they appear. Despite the preplanning, possibility of distress (Australia Network News; Bleasby) and even suicide (Schuster), as well as the ferocity of opinion surrounding shows (Marche) the parade of a type of ‘road of trials’ (Vogler 189) is enough to keep a huge fan base interested, and hungry for their turn to experience the fortune of being touched by the creative elite; or in narrative terms, a supernatural aid. ConclusionThe key differences between reality television and artistic narrative portrayals of mentors can be found in the use of archetypes for narrative conflict and resolution, in the ways themes are explored and the ways dialogue is put to use, and in the focus on and visibility of material wealth (Frere-Jones; Peyser). These differences highlight the political, cultural and social implications of exchanging stories about potential fulfillment, for stories about ascension to the creative class. Rather than being based on genuine reciprocity, and understanding of human issues, reality shows create drama around the desperation to penetrate the inner sanctum of celebrity fame and fortune. In fiction we see themes based on becoming famous, on gender transformation, and wealth acquisition, such as in the films and series Almost Famous (2000), The Bill Silvers Show (1955-1959), Filthy Rich (1982-1983), and Tootsie (1982), but these stories at least attempt to address a moral question. Critically, in an artistic - rather than commercial context – the actors (who may play mentees) are not at risk of exploitation (Australia Network News; Bleasby; Crouch). Where actors are paid and recognized creatively for their contribution to an artistic work (Rupel), the mentee in reality television has no involvement in the ways action may be set up for maximum voyeuristic enjoyment, or manipulated to enhance scandalous and salacious content which will return show and media profits (“Reality Show Fights”; Skeggs and Wood 64). The emphasis, ironically, from a reality production point of view, is wholly on making the audience believe (Papacharissi and Mendelson 367) that the content is realistic. This perhaps gives some insight as to why themes of personal suffering and instability are increasingly evident across formats.On an ethical level, unlike the knowledge transferred through complex television plots, or in coming of age films (as cited above) about the ways tradition is handed down, and the ways true mentors provide altruistic help in human experience; in reality television we take away the knowledge that life, under neoliberalism, is most remarkable when one is handpicked to undertake a televised journey featuring their desire for upward mobility. The value of the mentoring in these cases is directly proportionate to the financial objectives of the creative elite.ReferencesAggarwal, Sirpa. “WWE, A&E Networks, and Simplynew Share Benefits of White-Label Social TV Solutions at the Social TV Summit.” Arktan 25 July 2012. 1 August 2014 <http://arktan.com/wwe-ae-networks-and-simplynew-share-benefits-of-white-label-social-tv-solutions-at-the-social-tv-summit/>. Andrejevic, Mark. “The Work of Being Watched: Interactive Media and the Exploitation of Self-Disclosure.” Critical Studies in Media Communication 19.2 (2002): 230–48.Andrejevic, Mark, and Dean Colby. “Racism and Reality TV: The Case of MTV's Road Rules”. How Real Is Reality TV? Essays on Representation and Truth. Ed. David. S. Escoffery. Jefferson: McFarland and Company, 2006. 195–210. Balasubramanian, Savina, Clare Forstie, and Lisa-Jo K. van den Scott. “Shining Stars, Blind Sides, and 'Real' Realities: Exit Rituals, Eulogy Work, and Allegories in Reality Television.” Journal of Contemporary Ethnography 44.4 (2015): 417-49. Bissinger, Buz. “Caitlyn Jenner: The Full Story.” Vanity Fair 25 June 2015. 13 April 2016 <http://www.vanityfair.com/hollywood/2015/06/caitlyn-jenner-bruce-cover-annie-leibovitz>. Bleasby, Tom. “You Are Literally Watching on TV the Worst Experience of My Life.” Twitter @TomBleasby 12 Oct. 2015.Boorstin, Daniel J. The Image: A Guide to Pseudo-Events in America. 25th anniversary ed. New York: Vintage Books, 1987 (1962). Booth, William. “Reality Is Only an Illusion, Writers Say: Hollywood Scribes Want a Cut of Not-So-Unscripted Series.” The Washington Post 10 Aug. 2004. 10 April 2016 <http://www.washingtonpost.com/wp-dyn/articles/A53032-2004Aug9.html>.Buzzanell, Patrice, and Suzy D’Enbeau. “Intimate, Ambivalent and Erotic Mentoring: Popular Culture and Mentor–Mentee Relational Processes in Mad Men.” Human Relations 67.6 (2014): 695–714.Byrnes, Holly. “Michelin-Starred Mentor Marco Pierre White Says He’s No MasterChef Villain”. The Daily Telegraph 11 July 2015. 11 April 2016 <http://www.dailytelegraph.com.au/entertainment/michelinstarred-mentor-marco-pierre-white-says-hes-no-masterchef-villain/news-story/88c0f5df8390ddd07c4a67cdf8c9ea66>. “Caitlyn Jenner & Zeam | Beautiful as I Want to Be.” Logo TV 28 Oct. 2015. 8 Jan. 2016 <https://www.youtube.com/watch?v=R0mDFzBEYOY>.Creative Economy Report: The Challenge of Assessing the Creative Economy: Towards Informed Policy Making. Geneva: United Nations; UNCTAD, 2008. 5 Jan. 2015 <http://unctad.org/en/Docs/ditc20082cer_en.pdf>.Creative Economy Report: A Feasible Development Option. Geneva: United Nations; UNCTAD, 2010. 5 Jan. 2015 <http://unctad.org/en/Docs/ditctab20103_en.pdf>.Crouch, Michael. “13 Secrets Reality TV Show Producers Won’t Tell You.” Readers Digest 21 Feb. 2016. 15 Mar. 2016 <http://www.rd.com/culture/13-secrets-reality-tv-show-producers-wont-tell-you/>. Cartwright, Martina. “Tantalized by Train Wreck Reality Television.” Psychology Today 31 Jan. 2013. 1 June 2014 <https://www.psychologytoday.com/blog/food-thought/201301/tantalized-train-wreck-reality-television>. Day, Elizabeth. “Why Reality TV Works.” The Guardian (UK) 21 Nov. 2010. 14 July 2014 <http://www.theguardian.com/tv-and-radio/2010/nov/21/why-reality-tv-works> Darling-Wolf, Fabienne. “World Citizens ‘a la francaise’: Star Academy and the Negotiation of ‘French Identities’.” The Politics of Reality Television: Global Perspectives. Eds. Marwan M. Kraidy and Katherine Sender. New York: Routledge, 2011. 127-39. Eisinger, Peter. “Richard Florida, The Rise of the Creative Class.” Political Science 55 (2003): 82-83. Frere-Jones, Sasha. “Idolatry: Everybody’s a Critic.” New Yorker Magazine 19 May 2008. 10 Jan. 2016 <http://www.newyorker.com/magazine/2008/05/19/idolatry>.Gadamer, Hans-Georg. Truth and Method. Trans. Joel Weinsheimer and Donald D. Marshall. 2nd ed. London: Continuum Publishing Group, 2004 (1975). Gallagher, Brenden. “The 10 Weirdest Reality TV Shows of All Time.” VH1 28 Aug 2015. 10 Jan. 2016 <http://www.vh1.com/news/200027/10-weirdest-reality-tv-shows/>.Greenwood, Carl. “Simon Cowell Returns to X Factor after Signing £25 Million Deal Making Him the Highest Paid Entertainer Ever.” Mirror Online 19 Dec. 2013. 5 Jan 2016 <http://www.mirror.co.uk/tv/tv-news/simon-cowell-returns-x-factor-2935811>.Gamson, Joshua. “Reality Queens.” Contexts (Meditations) 12.2 (2013): 52-54. Good Will Hunting. Directed by Gus Van Sant. Laurence Bender Productions, 1998. Grodin, Jean. “Play, Festival, and Ritual in Gadamer: On the Theme of the Immemorial in His Later Works.” Language and Linguisticality in Gadamer’s Hermeneutics. Trans. Ed. Lawrence K. Schmidt. Maryland: Lexington Books, 2001. 43-50. Hamilton, Peter. “The Unreal Rise of Reality Television.” Huffington Post Entertainment 25 Sep. 2013. 5 Jun. 2015 <http://www.documentarytelevision.com/commissioning-process/the-unreal-rise-of-reality-television/ Page>. Hill, Annette. Reality TV: Audiences and Popular Factual Television. Oxon: Routledge, 2005. Hirschorn, Michael. “The Case for Reality TV: What the Snobs Don’t Understand.” The Atlantic May 2007. 16 April 2015 <http://www.theatlantic.com/magazine/archive/2007/05/the-case-for-reality-tv/305791/>. I Am Cait. Bunim Murray Productions and E! Entertainment. 26 Jul. 2015. The Karate Kid. Directed by John G. Avilsden. Columbia Pictures, 1984. Krätke, Stefan. “‘Creative Cities’ and the Rise of the Dealer Class: A Critique of Richard Florida’s Approach to Urban Theory.” International Journal of Urban and Regional Research 34 (2010): 835-53. Mad Men. Matthew Weiner. Weiner Bros. 19 Jul. 2007. Maslin, Janet. “Good Will Hunting (1997) FILM REVIEW; Logarithms and Biorhythms Test a Young Janitor.” New York Times 5 Dec. 1997.Marche, Stephen. “How Much Do We Owe Simon Cowell?” Esquire.com 11 Jan. 2010. 7 Feb. 2016 <http://www.esquire.com/news-politics/a6899/simon-cowell-leaving-american-idol-0110/>. Marikar, Sheila. “Bald and Broken: Inside Britney’s Shaved Head.” American Broadcasting Corporation 19 Feb. 2007. 13 Apr. 2016 <http://abcnews.go.com/Entertainment/Health/story?id=2885048>.Nair, Drishya. “Britney Spears to Join X Factor for $15 Million to Be the Highest Paid Judge Ever? Other Highly Paid Judges in Reality Shows.” International Business Times 12 Apr. 2012. 7 Feb. 2016 <http://www.ibtimes.com/britney-spears-join-x-factor-15-million-be-highest-paid-judge-ever-other-highly-paid-judges-reality>. New York Daily News. “Reality Bites: 'American Idol' Judges, Especially Ellen, Overly Praise Tim Urban for 'Hallelujah'.” New York Daily News 12 Mar. 2010. 11 April 2016 <http://www.nydailynews.com/entertainment/tv-movies/reality-bites-american-idol-judges-ellen-overly-praise-tim-urban-hallelujah-article-1.176978>. Orbe, Mark. “Representations of Race in Reality TV: Watch and Discuss.” Critical Studies in Media Communication 25.4 (2008) 345-52. Papacharissi, Zizi, and Andrew L. Mendelson. “Exploratory Study of Reality Appeal: Uses and Gratifications of Reality Shows.” Journal of Broadcasting and Electronic Media 51.2 (2007): 355-70. Pavia, Lucy. “Kardashian Net Worth: How Much Money Do They All Have Individually?” Instyle.co.uk 4 Dec. 2015. 6 Jan. 2016 <http://www.instyle.co.uk/celebrity/news/the-kardashian-rich-list-what-are-they-all-worth-individually#XkRy3pjE5mo1sxfG.99>.Pesce, Nicole. “Jenner's Gold! Caitlyn 'Could Be Worth over $500 Million' in Coming Years.” New York Daily News 3 June 2015. 6 Jan. 2016 <http://www.nydailynews.com/entertainment/gossip/caitlyn-jenner-richer-kardashians-experts-article-1.2244402>.Peyser, Marc. “AMERICAN IDOL.” Newsweek 13 Dec. 2008. 5 Jan. 2016 <http://europe.newsweek.com/american-idol-82867?rm=eu>.Pinter, Harold. “Art, Truth & Politics". Nobelprize.org. Nobel Lecture. Stockholm: Nobel Media AB, 2014. 13 Apr 2016 <http://www.nobelprize.org/nobel_prizes/literature/laureates/2005/pinter-lecture-e.html>. “Reality Show Fights.” American Broadcasting Corporation 30 Mar. 2011. 24 July 2014 <https://www.youtube.com/watch?v=X8bhnTfxWz8>.“Reality Writer.” WGAW Writer’s Guild of America West, n.d. 25 April 2014 <http://www.wga.org/organizesub.aspx?id=1092>. Runco, Mark A. “Everyone Has Creative Potential.” Creativity: From Potential to Realization. Washington DC: American Psychological Association, 2004. 21-30. ———. “Creativity.” Annual Review Psychology 55 (2004): 657–87. Rupel, David. “How Reality TV Works.” WGAW Writer’s Guild of America West, n.d. 15 May 2014 <http://www.wga.org/organizesub.aspx?id=1091>.Sender, Katherine. “Real Worlds: Migrating Genres, Travelling Participants, Shifting Theories.” The Politics of Reality Television: Global Perspectives. Eds. Marwan M. Kraidy and Katherine Sender. New York: Routledge, 2011. 1-13. Skeggs, Beverly, and Helen Wood. Reacting to Reality Television: Performance, Audience and Value. New York: Routledge, 2012. Stradal, Ryan. J. “Unscripted Does Not Mean Unwritten.” WGAW Writer’s Guild of America West, n.d. 15 May 2014 <http://www.wga.org/organizesub.aspx?id=1096>. Schroeder E.R. “‘Sexual Racism’ and Reality Television: Privileging the White Male Prerogative on MTV’s The Real World: Philadelphia.” How Real Is Reality TV?: Essays on Representation and Truth. Ed. D.S. Escoffery. Jefferson, NC: McFarland, 2006. 180–94. Schuster, Dana. “Dying for Fame: 21 Reality Stars Committed Suicide in a Decade.” New York Post 28 Feb. 2016. 11 April 2016 <http://nypost.com/2016/02/28/dying-for-fame-21-reality-stars-commit-suicide-in-past-decade/>.The X Factor (UK). TV show. ITV 4 Sep. 2004 to present. Thompson, Bronwyn. “FAST TRACK TO THE FINAL 12.” Fox 8 TV, 2015. 11 Apr. 2016 <http://www.fox8.tv/shows/australias-next-top-model/show/news>. Vogler, Chris. The Writer’s Journey: Mythic Structure for Writers. 3rd ed. Studio City: Michael Wiese Productions, 2007.West, Latoya. “INTERVIEW: Top Model's Tiffany Talks about Being Yelled At by Tyra Banks.” About Entertainment: Reality TV. 20 Feb. 2016. 13 Apr. 2016 <http://realitytv.about.com/od/thelatestinterviews/a/TiffanyChat.htm>. Winant, Gabriel. “Dirty Jobs, Done Dirt Cheap: Working in Reality Television.” New Labor Forum 23.3 (2014): 66-71. Woodward, Gary C. “Is Mentoring Out of Fashion?” The Perfect Response 6 Mar. 2015. 11 Apr. 2016 <https://theperfectresponse.pages.tcnj.edu/2015/03/06/is-mentoring-out-of-fashion/>. Wyatt, Daisy. “I Am Cait: Caitlyn Jenner 'Paid a Record-Breaking $5 Million' for E! Reality TV Show.” Independent 12 June 2015. 5 Feb. 2016 <http://www.independent.co.uk/arts-entertainment/tv/news/caitlyn-jenner-paid-record-5m-to-front-e-reality-tv-show-i-am-cait-10315826.html>. “‘X Factor’ UK 2015 Dark Secrets: ‘Horrific’ & Like ‘Prison’ Says Contestant.” Australia Network News 19 Nov. 2015. 1 Nov. 2015 <http://www.australianetworknews.com/x-factor-uk-2015-dark-secrets-horrific-like-prison-says-contestant/>.

22

Bruns, Axel. "What's Pop, and What's Not?" M/C Journal 2, no.4 (June1, 1999). http://dx.doi.org/10.5204/mcj.1766.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Have you noticed the proliferation of access statistics icons on your favourite bands' Websites? How do you feel about being told you're visitor number 10870 to the Star Wars hate page? Have you wondered why you don't gain weight from all the cookies you seem to be getting from your Internet music retailer? Did you sign a complete stranger's online guestbook? Are you annoyed with the dozens of pop-up windows that keep asking you to 'RATE THIS SITE!!!'? Don't worry: it's not you, it's them. You're witnessing the symptoms of existential angst. In most media, to be seen, read, or heard is everything. To have an audience, preferably a large and loyal one, is crucial: in the mass media's views, audience size and share determines popularity, and popularity attracts private and/or public funding. 'Popular', for these media, doesn't mean much active intervention from the people (in contrast to the way the word is often used in cultural studies): 'popularity' means a solid base of dedicated and continuous users, preferably larger than that of their competitors. Commercial Websites must similarly justify their setup and running costs by the amount of visitors they attract, but not-for-profit and private Webmasters, too, usually need that knowledge to justify and reward the effort that has gone into the site. A Website without visitors might just as well not exist at all. The problem is that on the Web this form of popularity is almost impossible to determine with any accuracy -- despite the multitude of measuring methods you're likely to be subjected to within just an hour of heavy Web browsing. That's not to say that some major sites on the Web aren't quite obviously major sites: the Amazons, CDnows and Yahoo!s of the Web are clearly visited by thousands, even millions of users each day. But for the majority of medium and minor content providers, the situation is far from clear, especially if the attention is focussed on the relative audience shares between a number of comparable services. These providers have a hard time determining whether they're amongst the leading sites in their field, and whether they're known to and enjoyed by a sufficient share of their target audience. Such difficulties largely are a continuation of similar problems in other media, and so it's worth taking a brief tour through the depths of audience measurement elsewhere. Audience research has become an important industry, but what's often overlooked in the endless battle for better ratings is that those ratings are often quite misleading -- the more so the less material a medium appears. While for culture that is linked to material artefacts (books, CDs, videos, newspapers) some relatively credible circulation, sales and unsold returns figures can usually be obtained (although magazines often multiply these figures by a set number to generate more impressive 'readership' figures), there is no direct-feedback way of gauging how many listeners tune in to a particular radio programme, or watch a certain television show. The amount of 'hits' (to borrow a Web term) to a programme cannot be monitored by a station itself; instead, it relies on peoplemeters placed in a selection of supposedly representative households to log such accesses. Additionally, there is the general question of what consumers do with any product, and whether every access to it can honestly be counted towards its popularity: I may buy the weekend newspaper only for the personal ads, disregarding its editorial content; you may channel-surf across the available TV programmes without really watching any of them attentively -- and alternatively, I may make copies of a CD I've bought for any number of friends; and you may tape a radio programme to listen to (repeatedly, even) at a later time. This real-life context of accesses will usually either escape or confuse peoplemeter devices: they may keep a record of what channels the family TV was tuned in to at any particular time -- but what they cannot record was if a viewer has fallen asleep, turned the sound off while talking on the phone, or gone to the kitchen to fix dinner; or indeed if the VCR is at the same time recording another show. Additionally, it is also highly doubtful that households with peoplemeters accurately represent the viewing habits of the wider population: the anecdote that current affairs shows regularly rate extraordinarily well if they include a story about families with peoplemeters is only an obvious example here. The more diverse the range of situational settings for the consumption of a particular medium, the less likely is it that any sample group of consumers can accurately represent the audience as a whole -- and the more we study consumption contexts, the more individualised they appear, as Ang has pointed out for television: "emphasis on the situational embeddedness of audience practices and experiences inevitably undercuts the search for generalisations" which audience research with its scientific approach engages in (164). Above a certain level of situational diversity such generalisations can only find a lowest common denominator which is trivial and largely useless: a certain size of audience may have been tuned in at one time or another, but for how long or with what degree of satisfaction remains unclear. Recent developments in the mass media have only increased the diversity of access situations, however. First, there is the ongoing expansion in available media channels. Where in Australia there used to be only a handful of television networks, for example, the introduction of pay-TV has added dozens more channels, few of which are available to all viewers; and where there used to be only a few daily newspapers, the rise of carrier media such as the World Wide Web now means that readers can make the New York Times or the Süddeutsche Zeitung rather than the Sydney Morning Herald or, heaven forbid, the Courier-Mail their preferred morning paper, if they so desire. Such developments further underline the point that for example "the boundaries of 'television audience', even in the most simple, one dimensional terms, are impossible to define. Those boundaries are blurred rather than sharply demarcated, precarious rather than absolute" (Ang 154). This raises the general problem of defining the exact boundaries of a media market, and the channels through which this market is accessed by producers and consumers. A cultural product's 'popularity', if expressed in the number of accesses to the product, can only possibly be measured with any degree of accuracy at the bottlenecks through which products must pass into and out of the market: for material goods, this is the distribution process, where the number of products (newspapers, books, CDs, etc.) shipped can be listed against the number of unsold products returned, and circulation figures can be calculated. (Whatever the means of measurement at these bottlenecks, it is clear that the measurement itself must be automatic, and cannot rely on the users themselves: survey-based audience research results are questionable ab initio, since they are drawn only from that part of the audience that is willing to participate, and thus rule out those users which may variously be less active or less interested, or conversely more suspicious or more active -- and thus too busy to fill in a survey.) For less 'material' cultural products, the bottlenecks reside in the equipment needed to send and receive them: radio and TV sets, for example -- but as we have seen, this bottleneck can be bypassed with the help of sound and video recorders, and new media forms such as the Internet, which provide additional access channels to the older media; it is also a bottleneck that is less accessible to researchers than that on the distributors' side. How many peoplemeters are there next to PCs with TV tuner cards? How should accesses to online editions be figured into the circulation numbers of newspapers? Ironically, unlike electronic broadcast media the Internet does appear to offer a way to directly measure audience access to content, of course: as a 'pull' medium which requires the user to request content individually rather than the provider to send programming indiscriminately, such individual accesses (predominantly to Web pages) can be monitored. But for the same reason that peoplemeter statistics are fundamentally inaccurate, so are Web counter data: accesses ('hits') don't equal readers, since Web browsers may jump elsewhere without having read a whole page, and since proxy servers may access a page once, but redistribute that page to any number of clients. Again, the situational context of access cannot be monitored with such relatively simplistic measures -- and it can be argued that the range of diversity for Web access situations is even greater than it is for other electronic mass media; while TV access (with any degree of attention), for example, remains largely in recreational settings, engaged Web access spreads from these to offices, laboratories, libraries, and cafés. Ironically, unlike electronic broadcast media the Internet does appear to offer a way to directly measure audience access to content, of course: as a 'pull' medium which requires the user to request content individually rather than the provider to send programming indiscriminately, such individual accesses (predominantly to Web pages) can be monitored. But for the same reason that peoplemeter statistics are fundamentally inaccurate, so are Web counter data: accesses ('hits') don't equal readers, since Web browsers may jump elsewhere without having read a whole page, and since proxy servers may access a page once, but redistribute that page to any number of clients. Again, the situational context of access cannot be monitored with such relatively simplistic measures -- and it can be argued that the range of diversity for Web access situations is even greater than it is for other electronic mass media; while TV access (with any degree of attention), for example, remains largely in recreational settings, engaged Web access spreads from these to offices, laboratories, libraries, and cafés. Ironically, unlike electronic broadcast media the Internet does appear to offer a way to directly measure audience access to content, of course: as a 'pull' medium which requires the user to request content individually rather than the provider to send programming indiscriminately, such individual accesses (predominantly to Web pages) can be monitored. But for the same reason that peoplemeter statistics are fundamentally inaccurate, so are Web counter data: accesses ('hits') don't equal readers, since Web browsers may jump elsewhere without having read a whole page, and since proxy servers may access a page once, but redistribute that page to any number of clients. Again, the situational context of access cannot be monitored with such relatively simplistic measures -- and it can be argued that the range of diversity for Web access situations is even greater than it is for other electronic mass media; while TV access (with any degree of attention), for example, remains largely in recreational settings, engaged Web access spreads from these to offices, laboratories, libraries, and cafés. Cultural producers can still take some information from their access statistics, of course -- no matter how inaccurate the figures, a thousand hits per day are still better than ten, and while page reloads and browsing durations may indicate technical problems or extraneous distractions just as much as attentive engagement, such data too may be useful to some extent. Web publishers may even try to compare their figures with those of other Websites which they regard as competitors in the field. It has become impossible, though, to claim market and audience shares with any degree of accuracy: when the total size of the audience cannot be determined, no percentages can be calculated; ratings-based systems will fail. This is a major shift especially for the entertainment industry, where ratings battles have become notorious; it is a shift directly related to the unregulated, unlimited nature of the online market, where no limits on the number of competitors exist or can be enforced (a situation markedly different from that in the practically closed TV and radio markets in many countries), and it is a shift which may lead to some deal of paranoia on the part of the established media outlets: on the Web, there is always a danger that upstart competitors could snatch a share of the market (a development, moreover, which wouldn't show early on in any ratings figures). While popularity ratings weren't an exact science at the best of times, then, they are becoming hopelessly inaccurate as media and audiences change -- not just in the case of the Web, but (as we gradually move towards a much-anticipated media convergence) in the case of many others as well. Few media forms will remain unaffected by these developments: as 'pop' music fragments into multitudes of sub-genres, for example, each with their own radio stations (terrestrial as well as online), publications, record labels, CD shops, or even online distribution schemes, does it still make sense to speak of 'popular' music? As we gain access to a global media market with Thai newspapers, Brazilian radio stations, and German TV programmes only a click of the mouse away, is there still a point to local or national ratings figures? Such questions haven't necessarily stopped ratings users from relying on them in the past, of course -- Ang's critique of TV audience ratings was published in 1991, but the ratings appear no less important to TV stations now than they did then. Ang expected this: "television institutions ... are likely to continue the quest for encompassing, objectified constructions of 'television audience' -- as the continued search for the perfect audience measurement technology suggests" (155). For newer media like the Web, though, this troubled experience with audience measurement in television and elsewhere, and the many impracticalities of accurately measuring Web audiences, may serve to tame the desire for similarly "conveniently objectified information" (Ang 152) on audience participational patterns -- information which fails to take note of the context of such participation -- before that desire develops into a TV-style obsession with one's own popularity as expressed through ratings and audience sizes. Indeed, once the novelty of Website access statistics has worn off, perhaps this is where we return to a different conception of 'popularity'. As the mass media splinter into collections of specialty channels, as the audience differentiates into individuals belonging to and moving through any number of interest groups in the course of a single day, with each group gradually gaining access to their own channels, and as many-to-many media give certain people (though not everybody) the ability to communicate without the need to subject themselves to mediation by any existing media institution, perhaps the translation of 'popular' as 'from the people' is once again on the ascendancy. And at the very least, as the ratings' accuracy continues to deteriorate, so will their relevance and importance, and cultural producers may feel less strongly the need to appeal to the lowest common taste denominator. That can't be a bad thing. References Ang, Ien. Desperately Seeking the Audience. London: Routledge, 1991. Citation reference for this article MLA style: Axel Bruns. "What's Pop, and What's Not? Measuring Popularity in the Many-to-Many Age." M/C: A Journal of Media and Culture 2.4 (1999). [your date of access] <http://www.uq.edu.au/mc/9906/what.php>. Chicago style: Axel Bruns, "What's Pop, and What's Not? Measuring Popularity in the Many-to-Many Age," M/C: A Journal of Media and Culture 2, no. 4 (1999), <http://www.uq.edu.au/mc/9906/what.php> ([your date of access]). APA style: Axel Bruns. (1999) What's pop, and what's not? Measuring popularity in the many-to-many age. M/C: A Journal of Media and Culture 2(4). <http://www.uq.edu.au/mc/9906/what.php> ([your date of access]).

23

Burns, Alex. "Oblique Strategies for Ambient Journalism." M/C Journal 13, no.2 (April15, 2010). http://dx.doi.org/10.5204/mcj.230.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Alfred Hermida recently posited ‘ambient journalism’ as a new framework for para- and professional journalists, who use social networks like Twitter for story sources, and as a news delivery platform. Beginning with this framework, this article explores the following questions: How does Hermida define ‘ambient journalism’ and what is its significance? Are there alternative definitions? What lessons do current platforms provide for the design of future, real-time platforms that ‘ambient journalists’ might use? What lessons does the work of Brian Eno provide–the musician and producer who coined the term ‘ambient music’ over three decades ago? My aim here is to formulate an alternative definition of ambient journalism that emphasises craft, skills acquisition, and the mental models of professional journalists, which are the foundations more generally for journalism practices. Rather than Hermida’s participatory media context I emphasise ‘institutional adaptiveness’: how journalists and newsrooms in media institutions rely on craft and skills, and how emerging platforms can augment these foundations, rather than replace them. Hermida’s Ambient Journalism and the Role of Journalists Hermida describes ambient journalism as: “broad, asynchronous, lightweight and always-on communication systems [that] are creating new kinds of interactions around the news, and are enabling citizens to maintain a mental model of news and events around them” (Hermida 2). His ideas appear to have two related aspects. He conceives ambient journalism as an “awareness system” between individuals that functions as a collective intelligence or kind of ‘distributed cognition’ at a group level (Hermida 2, 4-6). Facebook, Twitter and other online social networks are examples. Hermida also suggests that such networks enable non-professionals to engage in ‘communication’ and ‘conversation’ about news and media events (Hermida 2, 7). In a helpful clarification, Hermida observes that ‘para-journalists’ are like the paralegals or non-lawyers who provide administrative support in the legal profession and, in academic debates about journalism, are more commonly known as ‘citizen journalists’. Thus, Hermida’s ambient journalism appears to be: (1) an information systems model of new platforms and networks, and (2) a normative argument that these tools empower ‘para-journalists’ to engage in journalism and real-time commentary. Hermida’s thesis is intriguing and worthy of further discussion and debate. As currently formulated however it risks sharing the blind-spots and contradictions of the academic literature that Hermida cites, which suffers from poor theory-building (Burns). A major reason is that the participatory media context on which Hermida often builds his work has different mental models and normative theories than the journalists or media institutions that are the target of critique. Ambient journalism would be a stronger and more convincing framework if these incorrect assumptions were jettisoned. Others may also potentially misunderstand what Hermida proposes, because the academic debate is often polarised between para-journalists and professional journalists, due to different views about institutions, the politics of knowledge, decision heuristics, journalist training, and normative theoretical traditions (Christians et al. 126; Cole and Harcup 166-176). In the academic debate, para-journalists or ‘citizen journalists’ may be said to have a communitarian ethic and desire more autonomous solutions to journalists who are framed as uncritical and reliant on official sources, and to media institutions who are portrayed as surveillance-like ‘monitors’ of society (Christians et al. 124-127). This is however only one of a range of possible relationships. Sole reliance on para-journalists could be a premature solution to a more complex media ecology. Journalism craft, which does not rely just on official sources, also has a range of practices that already provides the “more complex ways of understanding and reporting on the subtleties of public communication” sought (Hermida 2). Citizen- and para-journalist accounts may overlook micro-studies in how newsrooms adopt technological innovations and integrate them into newsgathering routines (Hemmingway 196). Thus, an examination of the realities of professional journalism will help to cast a better light on how ambient journalism can shape the mental models of para-journalists, and provide more rigorous analysis of news and similar events. Professional journalism has several core dimensions that para-journalists may overlook. Journalism’s foundation as an experiential craft includes guidance and norms that orient the journalist to information, and that includes practitioner ethics. This craft is experiential; the basis for journalism’s claim to “social expertise” as a discipline; and more like the original Linux and Open Source movements which evolved through creative conflict (Sennett 9, 25-27, 125-127, 249-251). There are learnable, transmissible skills to contextually evaluate, filter, select and distil the essential insights. This craft-based foundation and skills informs and structures the journalist’s cognitive witnessing of an event, either directly or via reconstructed, cultivated sources. The journalist publishes through a recognised media institution or online platform, which provides communal validation and verification. There is far more here than the academic portrayal of journalists as ‘gate-watchers’ for a ‘corporatist’ media elite. Craft and skills distinguish the professional journalist from Hermida’s para-journalist. Increasingly, media institutions hire journalists who are trained in other craft-based research methods (Burns and Saunders). Bethany McLean who ‘broke’ the Enron scandal was an investment banker; documentary filmmaker Errol Morris first interviewed serial killers for an early project; and Neil Chenoweth used ‘forensic accounting’ techniques to investigate Rupert Murdoch and Kerry Packer. Such expertise allows the journalist to filter information, and to mediate any influences in the external environment, in order to develop an individualised, ‘embodied’ perspective (Hofstadter 234; Thompson; Garfinkel and Rawls). Para-journalists and social network platforms cannot replace this expertise, which is often unique to individual journalists and their research teams. Ambient Journalism and Twitter Current academic debates about how citizen- and para-journalists may augment or even replace professional journalists can often turn into legitimation battles whether the ‘de facto’ solution is a social media network rather than a media institution. For example, Hermida discusses Twitter, a micro-blogging platform that allows users to post 140-character messages that are small, discrete information chunks, for short-term and episodic memory. Twitter enables users to monitor other users, to group other messages, and to search for terms specified by a hashtag. Twitter thus illustrates how social media platforms can make data more transparent and explicit to non-specialists like para-journalists. In fact, Twitter is suitable for five different categories of real-time information: news, pre-news, rumours, the formation of social media and subject-based networks, and “molecular search” using granular data-mining tools (Leinweber 204-205). In this model, the para-journalist acts as a navigator and “way-finder” to new information (Morville, Findability). Jaron Lanier, an early designer of ‘virtual reality’ systems, is perhaps the most vocal critic of relying on groups of non-experts and tools like Twitter, instead of individuals who have professional expertise. For Lanier, what underlies debates about citizen- and para-journalists is a philosophy of “cybernetic totalism” and “digital Maoism” which exalts the Internet collective at the expense of truly individual views. He is deeply critical of Hermida’s chosen platform, Twitter: “A design that shares Twitter’s feature of providing ambient continuous contact between people could perhaps drop Twitter’s adoration of fragments. We don’t really know, because it is an unexplored design space” [emphasis added] (Lanier 24). In part, Lanier’s objection is traceable back to an unresolved debate on human factors and design in information science. Influenced by the post-war research into cybernetics, J.C.R. Licklider proposed a cyborg-like model of “man-machine symbiosis” between computers and humans (Licklider). In turn, Licklider’s framework influenced Douglas Engelbart, who shaped the growth of human-computer interaction, and the design of computer interfaces, the mouse, and other tools (Engelbart). In taking a system-level view of platforms Hermida builds on the strength of Licklider and Engelbart’s work. Yet because he focuses on para-journalists, and does not appear to include the craft and skills-based expertise of professional journalists, it is unclear how he would answer Lanier’s fears about how reliance on groups for news and other information is superior to individual expertise and judgment. Hermida’s two case studies point to this unresolved problem. Both cases appear to show how Twitter provides quicker and better forms of news and information, thereby increasing the effectiveness of para-journalists to engage in journalism and real-time commentary. However, alternative explanations may exist that raise questions about Twitter as a new platform, and thus these cases might actually reveal circ*mstances in which ambient journalism may fail. Hermida alludes to how para-journalists now fulfil the earlier role of ‘first responders’ and stringers, in providing the “immediate dissemination” of non-official information about disasters and emergencies (Hermida 1-2; Haddow and Haddow 117-118). Whilst important, this is really a specific role. In fact, disaster and emergency reporting occurs within well-established practices, professional ethics, and institutional routines that may involve journalists, government officials, and professional communication experts (Moeller). Officials and emergency management planners are concerned that citizen- or para-journalism is equated with the craft and skills of professional journalism. The experience of these officials and planners in 2005’s Hurricane Katrina in the United States, and in 2009’s Black Saturday bushfires in Australia, suggests that whilst para-journalists might be ‘first responders’ in a decentralised, complex crisis, they are perceived to spread rumours and potential social unrest when people need reliable information (Haddow and Haddow 39). These terms of engagement between officials, planners and para-journalists are still to be resolved. Hermida readily acknowledges that Twitter and other social network platforms are vulnerable to rumours (Hermida 3-4; Sunstein). However, his other case study, Iran’s 2009 election crisis, further complicates the vision of ambient journalism, and always-on communication systems in particular. Hermida discusses several events during the crisis: the US State Department request to halt a server upgrade, how the Basij’s shooting of bystander Neda Soltan was captured on a mobile phone camera, the spread across social network platforms, and the high-velocity number of ‘tweets’ or messages during the first two weeks of Iran’s electoral uncertainty (Hermida 1). The US State Department was interested in how Twitter could be used for non-official sources, and to inform people who were monitoring the election events. Twitter’s perceived ‘success’ during Iran’s 2009 election now looks rather different when other factors are considered such as: the dynamics and patterns of Tehran street protests; Iran’s clerics who used Soltan’s death as propaganda; claims that Iran’s intelligence services used Twitter to track down and to kill protestors; the ‘black box’ case of what the US State Department and others actually did during the crisis; the history of neo-conservative interest in a Twitter-like platform for strategic information operations; and the Iranian diaspora’s incitement of Tehran student protests via satellite broadcasts. Iran’s 2009 election crisis has important lessons for ambient journalism: always-on communication systems may create noise and spread rumours; ‘mirror-imaging’ of mental models may occur, when other participants have very different worldviews and ‘contexts of use’ for social network platforms; and the new kinds of interaction may not lead to effective intervention in crisis events. Hermida’s combination of news and non-news fragments is the perfect environment for psychological operations and strategic information warfare (Burns and Eltham). Lessons of Current Platforms for Ambient Journalism We have discussed some unresolved problems for ambient journalism as a framework for journalists, and as mental models for news and similar events. Hermida’s goal of an “awareness system” faces a further challenge: the phenomenological limitations of human consciousness to deal with information complexity and ambiguous situations, whether by becoming ‘entangled’ in abstract information or by developing new, unexpected uses for emergent technologies (Thackara; Thompson; Hofstadter 101-102, 186; Morville, Findability, 55, 57, 158). The recursive and reflective capacities of human consciousness imposes its own epistemological frames. It’s still unclear how Licklider’s human-computer interaction will shape consciousness, but Douglas Hofstadter’s experiments with art and video-based group experiments may be suggestive. Hofstadter observes: “the interpenetration of our worlds becomes so great that our worldviews start to fuse” (266). Current research into user experience and information design provides some validation of Hofstadter’s experience, such as how Google is now the ‘default’ search engine, and how its interface design shapes the user’s subjective experience of online search (Morville, Findability; Morville, Search Patterns). Several models of Hermida’s awareness system already exist that build on Hofstadter’s insight. Within the information systems field, on-going research into artificial intelligence–‘expert systems’ that can model expertise as algorithms and decision rules, genetic algorithms, and evolutionary computation–has attempted to achieve Hermida’s goal. What these systems share are mental models of cognition, learning and adaptiveness to new information, often with forecasting and prediction capabilities. Such systems work in journalism areas such as finance and sports that involve analytics, data-mining and statistics, and in related fields such as health informatics where there are clear, explicit guidelines on information and international standards. After a mid-1980s investment bubble (Leinweber 183-184) these systems now underpin the technology platforms of global finance and news intermediaries. Bloomberg LP’s ubiquitous dual-screen computers, proprietary network and data analytics (www.bloomberg.com), and its competitors such as Thomson Reuters (www.thomsonreuters.com and www.reuters.com), illustrate how financial analysts and traders rely on an “awareness system” to navigate global stock-markets (Clifford and Creswell). For example, a Bloomberg subscriber can access real-time analytics from exchanges, markets, and from data vendors such as Dow Jones, NYSE Euronext and Thomson Reuters. They can use portfolio management tools to evaluate market information, to make allocation and trading decisions, to monitor ‘breaking’ news, and to integrate this information. Twitter is perhaps the para-journalist equivalent to how professional journalists and finance analysts rely on Bloomberg’s platform for real-time market and business information. Already, hedge funds like PhaseCapital are data-mining Twitter’s ‘tweets’ or messages for rumours, shifts in stock-market sentiment, and to analyse potential trading patterns (Pritchett and Palmer). The US-based Securities and Exchange Commission, and researchers like David Gelernter and Paul Tetlock, have also shown the benefits of applied data-mining for regulatory market supervision, in particular to uncover analysts who provide ‘whisper numbers’ to online message boards, and who have access to material, non-public information (Leinweber 60, 136, 144-145, 208, 219, 241-246). Hermida’s framework might be developed further for such regulatory supervision. Hermida’s awareness system may also benefit from the algorithms found in high-frequency trading (HFT) systems that Citadel Group, Goldman Sachs, Renaissance Technologies, and other quantitative financial institutions use. Rather than human traders, HFT uses co-located servers and complex algorithms, to make high-volume trades on stock-markets that take advantage of microsecond changes in prices (Duhigg). HFT capabilities are shrouded in secrecy, and became the focus of regulatory attention after several high-profile investigations of traders alleged to have stolen the software code (Bray and Bunge). One public example is Streambase (www.streambase.com), a ‘complex event processing’ (CEP) platform that can be used in HFT, and commercialised from the Project Aurora research collaboration between Brandeis University, Brown University, and Massachusetts Institute of Technology. CEP and HFT may be the ‘killer apps’ of Hermida’s awareness system. Alternatively, they may confirm Jaron Lanier’s worst fears: your data-stream and user-generated content can be harvested by others–for their gain, and your loss! Conclusion: Brian Eno and Redefining ‘Ambient Journalism’ On the basis of the above discussion, I suggest a modified definition of Hermida’s thesis: ‘Ambient journalism’ is an emerging analytical framework for journalists, informed by cognitive, cybernetic, and information systems research. It ‘sensitises’ the individual journalist, whether professional or ‘para-professional’, to observe and to evaluate their immediate context. In doing so, ‘ambient journalism’, like journalism generally, emphasises ‘novel’ information. It can also inform the design of real-time platforms for journalistic sources and news delivery. Individual ‘ambient journalists’ can learn much from the career of musician and producer Brian Eno. His personal definition of ‘ambient’ is “an atmosphere, or a surrounding influence: a tint,” that relies on the co-evolution of the musician, creative horizons, and studio technology as a tool, just as para-journalists use Twitter as a platform (Sheppard 278; Eno 293-297). Like para-journalists, Eno claims to be a “self-educated but largely untrained” musician and yet also a craft-based producer (McFadzean; Tamm 177; 44-50). Perhaps Eno would frame the distinction between para-journalist and professional journalist as “axis thinking” (Eno 298, 302) which is needlessly polarised due to different normative theories, stances, and practices. Furthermore, I would argue that Eno’s worldview was shaped by similar influences to Licklider and Engelbart, who appear to have informed Hermida’s assumptions. These influences include the mathematician and game theorist John von Neumann and biologist Richard Dawkins (Eno 162); musicians Eric Satie, John Cage and his book Silence (Eno 19-22, 162; Sheppard 22, 36, 378-379); and the field of self-organising systems, in particular cyberneticist Stafford Beer (Eno 245; Tamm 86; Sheppard 224). Eno summed up the central lesson of this theoretical corpus during his collaborations with New York’s ‘No Wave’ scene in 1978, of “people experimenting with their lives” (Eno 253; Reynolds 146-147; Sheppard 290-295). Importantly, he developed a personal view of normative theories through practice-based research, on a range of projects, and with different creative and collaborative teams. Rather than a technological solution, Eno settled on a way to encode his craft and skills into a quasi-experimental, transmittable method—an aim of practitioner development in professional journalism. Even if only a “founding myth,” the story of Eno’s 1975 street accident with a taxi, and how he conceived ‘ambient music’ during his hospital stay, illustrates how ambient journalists might perceive something new in specific circ*mstances (Tamm 131; Sheppard 186-188). More tellingly, this background informed his collaboration with the late painter Peter Schmidt, to co-create the Oblique Strategies deck of aphorisms: aleatory, oracular messages that appeared dependent on chance, luck, and randomness, but that in fact were based on Eno and Schmidt’s creative philosophy and work guidelines (Tamm 77-78; Sheppard 178-179; Reynolds 170). In short, Eno was engaging with the kind of reflective practices that underpin exemplary professional journalism. He was able to encode this craft and skills into a quasi-experimental method, rather than a technological solution. Journalists and practitioners who adopt Hermida’s framework could learn much from the published accounts of Eno’s practice-based research, in the context of creative projects and collaborative teams. In particular, these detail the contexts and choices of Eno’s early ambient music recordings (Sheppard 199-200); Eno’s duels with David Bowie during ‘Sense of Doubt’ for the Heroes album (Tamm 158; Sheppard 254-255); troubled collaborations with Talking Heads and David Byrne (Reynolds 165-170; Sheppard; 338-347, 353); a curatorial, mentor role on U2’s The Unforgettable Fire (Sheppard 368-369); the ‘grand, stadium scale’ experiments of U2’s 1991-93 ZooTV tour (Sheppard 404); the Zorn-like games of Bowie’s Outside album (Eno 382-389); and the ‘generative’ artwork 77 Million Paintings (Eno 330-332; Tamm 133-135; Sheppard 278-279; Eno 435). Eno is clearly a highly flexible maker and producer. Developing such flexibility would ensure ambient journalism remains open to novelty as an analytical framework that may enhance the practitioner development and work of professional journalists and para-journalists alike.Acknowledgments The author thanks editor Luke Jaaniste, Alfred Hermida, and the two blind peer reviewers for their constructive feedback and reflective insights. References Bray, Chad, and Jacob Bunge. “Ex-Goldman Programmer Indicted for Trade Secrets Theft.” The Wall Street Journal 12 Feb. 2010. 17 March 2010 ‹http://online.wsj.com/article/SB10001424052748703382904575059660427173510.html›. Burns, Alex. “Select Issues with New Media Theories of Citizen Journalism.” M/C Journal 11.1 (2008). 17 March 2010 ‹http://journal.media-culture.org.au/index.php/mcjournal/article/view/30›.———, and Barry Saunders. “Journalists as Investigators and ‘Quality Media’ Reputation.” Record of the Communications Policy and Research Forum 2009. Eds. Franco Papandrea and Mark Armstrong. Sydney: Network Insight Institute, 281-297. 17 March 2010 ‹http://eprints.vu.edu.au/15229/1/CPRF09BurnsSaunders.pdf›.———, and Ben Eltham. “Twitter Free Iran: An Evaluation of Twitter’s Role in Public Diplomacy and Information Operations in Iran’s 2009 Election Crisis.” Record of the Communications Policy and Research Forum 2009. Eds. Franco Papandrea and Mark Armstrong. Sydney: Network Insight Institute, 298-310. 17 March 2010 ‹http://eprints.vu.edu.au/15230/1/CPRF09BurnsEltham.pdf›. Christians, Clifford G., Theodore Glasser, Denis McQuail, Kaarle Nordenstreng, and Robert A. White. Normative Theories of the Media: Journalism in Democratic Societies. Champaign, IL: University of Illinois Press, 2009. Clifford, Stephanie, and Julie Creswell. “At Bloomberg, Modest Strategy to Rule the World.” The New York Times 14 Nov. 2009. 17 March 2010 ‹http://www.nytimes.com/2009/11/15/business/media/15bloom.html?ref=businessandpagewanted=all›.Cole, Peter, and Tony Harcup. Newspaper Journalism. Thousand Oaks, CA: Sage Publications, 2010. Duhigg, Charles. “Stock Traders Find Speed Pays, in Milliseconds.” The New York Times 23 July 2009. 17 March 2010 ‹http://www.nytimes.com/2009/07/24/business/24trading.html?_r=2andref=business›. Engelbart, Douglas. “Augmenting Human Intellect: A Conceptual Framework, 1962.” Ed. Neil Spiller. Cyber Reader: Critical Writings for the Digital Era. London: Phaidon Press, 2002. 60-67. Eno, Brian. A Year with Swollen Appendices. London: Faber and Faber, 1996. Garfinkel, Harold, and Anne Warfield Rawls. Toward a Sociological Theory of Information. Boulder, CO: Paradigm Publishers, 2008. Hadlow, George D., and Kim S. Haddow. Disaster Communications in a Changing Media World, Butterworth-Heinemann, Burlington MA, 2009. Hemmingway, Emma. Into the Newsroom: Exploring the Digital Production of Regional Television News. Milton Park: Routledge, 2008. Hermida, Alfred. “Twittering the News: The Emergence of Ambient Journalism.” Journalism Practice 4.3 (2010): 1-12. Hofstadter, Douglas. I Am a Strange Loop. New York: Perseus Books, 2007. Lanier, Jaron. You Are Not a Gadget: A Manifesto. London: Allen Lane, 2010. Leinweber, David. Nerds on Wall Street: Math, Machines and Wired Markets. Hoboken, NJ: John Wiley and Sons, 2009. Licklider, J.C.R. “Man-Machine Symbiosis, 1960.” Ed. Neil Spiller. Cyber Reader: Critical Writings for the Digital Era, London: Phaidon Press, 2002. 52-59. McFadzean, Elspeth. “What Can We Learn from Creative People? The Story of Brian Eno.” Management Decision 38.1 (2000): 51-56. Moeller, Susan. Compassion Fatigue: How the Media Sell Disease, Famine, War and Death. New York: Routledge, 1998. Morville, Peter. Ambient Findability. Sebastopol, CA: O’Reilly Press, 2005. ———. Search Patterns. Sebastopol, CA: O’Reilly Press, 2010.Pritchett, Eric, and Mark Palmer. ‘Following the Tweet Trail.’ CNBC 11 July 2009. 17 March 2010 ‹http://www.casttv.com/ext/ug0p08›. Reynolds, Simon. Rip It Up and Start Again: Postpunk 1978-1984. London: Penguin Books, 2006. Sennett, Richard. The Craftsman. London: Penguin Books, 2008. Sheppard, David. On Some Faraway Beach: The Life and Times of Brian Eno. London: Orion Books, 2008. Sunstein, Cass. On Rumours: How Falsehoods Spread, Why We Believe Them, What Can Be Done. New York: Farrar, Straus and Giroux, 2009. Tamm, Eric. Brian Eno: His Music and the Vertical Colour of Sound. New York: Da Capo Press, 1995. Thackara, John. In the Bubble: Designing in a Complex World. Boston, MA: The MIT Press, 1995. Thompson, Evan. Mind in Life: Biology, Phenomenology, and the Science of Mind. Boston, MA: Belknap Press, 2007.

24

Maybury, Terrence. "The Literacy Control Complex." M/C Journal 7, no.2 (March1, 2004). http://dx.doi.org/10.5204/mcj.2337.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Usually, a literature search is a benign phase of the research regime. It was, however, during this phase on my current project where a semi-conscious pique I’d been feeling developed into an obvious rancour. Because I’ve been involved in both electronic production and consumption, and the pedagogy surrounding it, I was interested in how the literate domain was coping with the transformations coming out of the new media communications r/evolution. This concern became clearer with the reading and re-reading of Kathleen Tyner’s book, Literacy in a Digital World: Teaching and Learning in the Age of Information. Sometimes, irritation is a camouflage for an emerging and hybridised form of knowledge, so it was necessary to unearth this masquerade of discord that welled-up in the most unexpected of places. Literacy in a Digital World makes all the right noises: it discusses technology; Walter Ong; media literacy; primary, secondary, and tertiary schooling; Plato’s Phaedrus; psychoanalysis; storytelling; networks; aesthetics; even numeracy and multiliteracies, along with a host of other highly appropriate subject matter vis-à-vis its object of analysis. On one reading, it’s a highly illuminating overview. There is, however, a differing interpretation of Literacy in a Digital World, and it’s of a more sombre hue. This other more doleful reading makes Literacy in a Digital World a superior representative of a sometimes largely under-theorised control-complex, and an un.conscious authoritarianism, implicit in the production of any type of knowledge. Of course, in this instance the type of production referenced is literate in orientation. The literate domain, then, is not merely an angel of enlightened debate; under the influence and direction of particular human configurations, literacy has its power struggles with other forms of representation. If the PR machine encourages a more seraphical view of the culture industry, it comes at the expense of the latter’s sometimes-tyrannical underbelly. It is vital, then, to question and investigate these un.conscious forces, specifically in relation to the production of literate forms of culture and the ‘discourse’ it carries on regarding electronic forms of knowledge, a paradigm for which is slowly emerging electracy and a subject I will return to. This assertion is no overstatement. Literacy in a Digital World has concealed within its discourse the assumption that the dominant modes of teaching and learning are literate and will continue to be so. That is, all knowledge is mediated via either typographic or chirographic words on a page, or even on a screen. This is strange given that Tyner admits in the Introduction that “I am an itinerant teacher, reluctant writer, and sometimes media producer” (1, my emphasis). The orientation in Literacy in a Digital World, it seems to me, is a mask for the authoritarianism at the heart of the literate establishment trying to contain and corral the intensifying global flows of electronic information. Ironically, it also seems to be a peculiarly electronic way to present information: that is, the sifting, analysis, and categorisation, along with the representation of phenomena, through the force of one’s un.conscious biases, with the latter making all knowledge production laden with emotional causation. This awkwardness in using the term “literacy” in relation to electronic forms of knowledge surfaces once more in Paul Messaris’s Visual “Literacy”. Again, this is peculiar given that this highly developed and informative text might be a fine introduction to electracy as a possible alternative paradigm to literacy, if only, for instance, it made some mention of sound as a counterpoint to textual and visual symbolisation. The point where Messaris passes over this former contradiction is worth quoting: Strictly speaking, of course, the term “literacy” should be applied only to reading and writing. But it would probably be too pedantic and, in any case, it would surely be futile to resist the increasingly common tendency to apply this term to other kinds of communication skills (mathematical “literacy,” computer “literacy”) as well as to the substantive knowledge that communication rests on (historical, geographic, cultural “literacy”). (2-3) While Messaris might use the term “visual literacy” reluctantly, the assumption that literacy will take over the conceptual reins of electronic communication and remain the pre-eminent form of knowledge production is widespread. This assumption might be happening in the literature on the subject but in the wider population there is a rising electrate sensibility. It is in the work of Gregory Ulmer that electracy is most extensively articulated, and the following brief outline has been heavily influenced by his speculation on the subject. Electracy is a paradigm that requires, in the production and consumption of electronic material, highly developed competencies in both oracy and literacy, and if necessary comes on top of any knowledge of the subject or content of any given work, program, or project. The conceptual frame of electracy is herein tentatively defined as both a well-developed range and depth of communicative competency in oral, literate, and electronic forms, biased from the latter’s point of view. A crucial addition, one sometimes overlooked in earlier communicative forms, is that of the technate, or technacy, a working knowledge of the technological infrastructure underpinning all communication and its in-built ideological assumptions. It is in this context of the various communicative competencies required for electronic production and consumption that the term ‘literacy’ (or for that matter ‘oracy’) is questionable. Furthermore, electracy can spread out to mean the following: it is that domain of knowledge formation whose arrangement, transference, and interpretation rely primarily on electronic networks, systems, codes and apparatuses, for either its production, circulation, or consumption. It could be analogue, in the sense of videotape; digital, in the case of the computer; aurally centred, as in the examples of music, radio or sound-scapes; mathematically configured, in relation to programming code for instance; visually fixated, as in broadcast television; ‘amateur’, as in the home-video or home-studio realm; politically sensitive, in the case of surveillance footage; medically fixated, as in the orbit of tomography; ambiguous, as in the instance of The Sydney Morning Herald made available on the WWW, or of Hollywood blockbusters broadcast on television, or hired/bought in a DVD/video format; this is not to mention Brad Pitt reading a classic novel on audio-tape. Electracy is a strikingly simple, yet highly complex and heterogeneous communicative paradigm. Electracy is also a generic term, one whose very comprehensiveness and dynamic mutability is its defining hallmark, and one in which a whole host of communicative codes and symbolic systems reside. Moreover, almost anyone can comprehend meaning in electronic media because “electric epistemology cannot remain confined to small groups of users, as oral epistemologies have, and cannot remain the property of an educated elite, as literate epistemologies have” (Gozzi and Haynes 224). Furthermore, as Ulmer writes: “To speak of computer literacy or media literacy may be an attempt to remain within the apparatus of alphabetic writing that has organized the Western tradition for nearly the past three millennia” (“Foreword” xii). The catch is that the knowledge forms thus produced through electracy are the abstract epistemological vectors on which the diverse markets of global capitalism thrive. The dynamic nature of these “multimodal” forms of electronic knowledge (Kress, “Visual” 73), then, is increasingly applicable to all of us in the local/global, human/world conglomerate in which any polity is now framed. To continue to emphasise literacy and alphabetic consciousness might then be blinding us to this emerging relationship between electracy and globalisation, possibly even to localisation and regionalisation. It may be possible to trace the dichotomy outlined above between literate and electrate forms of knowledge to larger political/economic and cultural forces. As Saskia Sassen illustrates, sovereignty and territoriality are central aspects in the operation of the still important nation-state, especially in an era of encroaching globalisation. In the past, sovereignty referred to the absolute power of monarchs to control their dominions and is an idea that has been transferred to the nation-state in the long transition to representative democracy. Territoriality refers to the specific physical space that sovereignty is seen as guaranteeing. As Sassen writes, “In the main … rule in the modern world flows from the absolute sovereignty of the state over its national territory” (3). Quite clearly, in the shifting regimes of geo-political power that characterise the global era, sovereign control over territory, and, equally, control over the ideas that might reconfigure our interpretation of concepts such as sovereignty and territoriality, nationalism and literacy, are all in a state of change. Today’s climate of geo-political uncertainty has undoubtedly produced a control complex in relation to these shifting power bases, a condition that arises when psychic, epistemological and political certainties move to a state of unpredictable flux. In Benedict Anderson’s Imagined Communities another important examination of nationalism there is an emphasis on how literacy was an essential ingredient in its development as a political structure. Operational levels of literacy also came to be a key component in the development of the idea of the autonomous self that arose with democracy and its use as an organising principle in citizenship rituals like voting in some nation-states. Eric Leed puts it this way: “By the sixteenth century, literacy had become one of the definitive signs — along with the possession of property and a permanent residence — of an independent social status” (53). Clearly, any conception of sovereignty and territoriality has to be read, after being written constitutionally, by those people who form the basis of a national polity and over whom these two categories operate. The “fundamental anxiety” over literacy that Kress speaks of (Before Writing 1) is a sub-component of this larger control complex in that a quantum increase in the volume and diversity of electronic communication is contributing to declining levels of literacy in the body politic. In the current moment there is a control complex of almost plague proportions in our selves, our systems of knowledge, and our institutions and polities, because it is undoubtedly a key factor at the epicentre of any turf war. Even my own strident anxieties over the dominance of literacy in debates over electronic communication deserve to be laid out on the analyst’s couch, in part because any manifestation of the control complex in a turf war is aimed squarely at the repression of alternative ways of being and becoming. The endgame: it might be wiser to more closely examine this literacy control complex, possible alternative paradigms of knowledge production and consumption such as electracy, and their broader relationship to patterns of political/economic/cultural organisation and control. Acknowledgements I am indebted to Patrice Braun and Ros Mills, respectively, for editorial advice and technical assistance in the preparation of this essay. Note on reading “The Literacy Control Complex” The dot configuration in ‘un.conscious’ is used deliberately as an electronic marker to implicitly indicate the omni-directional nature of the power surges that dif.fuse the conscious and the unconscious in the field of political action where any turf war is conducted. While this justification is not obvious, I do want to create a sense of intrigue in the reader as to why this dot configuration might be used. One of the many things that fascinates me about electronic communication is its considerable ability for condensation; the sound-bite is one epistemological example of this idea, the dot, as an electronic form of conceptual elision, is another. If you are interested in this field, I highly recommend perusal of the MEZ posts that crop up periodically on a number of media related lists. MEZ’s posts have made me more cognisant of electronic forms of written expression. These experiments in electronic writing deserve to be tested. Works Cited Anderson, Benedict. Imagined Communities: Reflections on the Origin and Spread of Nationalism. rev. ed. London and New York: Verso, 1991. Gozzi Jr., Raymond, and W. Lance Haynes. “Electric Media and Electric Epistemology: Empathy at a Distance.” Critical Studies in Mass Communication 9.3 (1992): 217-28. Messaris, Paul. Visual “Literacy”: Image, Mind, and Reality. Boulder: Westview Press, 1994. Kress, Gunther. “Visual and Verbal Modes of Representation in Electronically Mediated Communication: The Potentials of New Forms of Text.” Page to Screen: Taking Literacy into the Electronic Era. Ed. Ilana Snyder. Sydney: Allen & Unwin, 1997. 53-79. ---. Before Writing: Rethinking the Paths to Literacy. London: Routledge, 1997. Leed, Eric. “‘Voice’ and ‘Print’: Master Symbols in the History of Communication.” The Myths of Information: Technology and Postindustrial Culture. Ed. Kathleen Woodward. Madison, Wisconsin: Coda Press, 1980. 41-61. Sassen, Saskia. Losing Control? Sovereignty in an Age of Globalization. New York: Columbia UP, 1996. Tyner, Kathleen. Literacy in a Digital World: Teaching and Learning in the Age of Information. Mahwah, NJ: Lawrence Erlbaum Associates, 1998. Ulmer, Gregory. Teletheory: Grammatology in the Age of Video. New York: Routledge, 1989. ---. Heuretics: The Logic of Invention. New York: Johns Hopkins U P, 1994. ---. “Foreword/Forward (Into Electracy).” Literacy Theory in the Age of the Internet. Ed. Todd Taylor and Irene Ward. New York: Columbia U P, 1998. ix-xiii. ---. Internet Invention: Literacy into Electracy. Boston: Longman, 2003. Citation reference for this article MLA Style Maybury, Terrence. "The Literacy Control Complex" M/C: A Journal of Media and Culture <http://www.media-culture.org.au/0403/05-literacy.php>. APA Style Maybury, T. (2004, Mar17). The Literacy Control Complex. M/C: A Journal of Media and Culture, 7, <http://www.media-culture.org.au/0403/05-literacy.php>

25

Piatti-Farnell, Lorna. "What’s Hidden in Gravity Falls: Strange Creatures and the Gothic Intertext." M/C Journal 17, no.4 (July24, 2014). http://dx.doi.org/10.5204/mcj.859.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Discussing the interaction between representation and narrative structures, Anthony Mandal argues that the Gothic has always been “an intrinsically intertextual genre” (Mandal 350). From its inception, the intertextuality of the Gothic has taken many and varied incarnations, from simple references and allusions between texts—dates, locations, characters, and “creatures”—to intricate and evocative uses of style and plot organisation. And even though it would be unwise to reduce the Gothic “text” to a simple master narrative, one cannot deny that, in the midst of re-elaborations and re-interpretations, interconnections and interpolations also appear, a collective gathering of ideas and writing practices that construct what is known as “the Gothic intertext” (Mishra 235). As far as storytelling, characterisation, and symbolism are concerned, the Gothic finds strength in its ability to develop as well as negate expectation, re-moulding the culturally known and the aesthetically acceptable in order to present its audience with a multi-faceted and multi-layered narrative. Although the Gothic has traditionally found fertile ground in literary works—a connection that is now a legacy as much as an origin—other contemporary media, such as animation, have offered the Gothic a privileged chance for growth and adaptation. An evocative example of the mergence between the Gothic mode and the animated medium is Alex Hirsch’s Gravity Falls. This visual text provides an example of the reach of the Gothic within popular culture, where intersecting hideous creatures and interconnected narrative structures, although simple and “for children” on the surface, reveal the presence of a dense and intertextual Gothic network. Those interlacings are, of course, never disconnected from the wider cultural framework, and clearly occupy an important part in unravelling the insidious aspects of human nature, from the difficulties of finding “oneself” to the loneliness of the everyday. Gravity Falls is an animated television series created by Alex Hirsch. It premiered on the Disney Channel in the United States on 15 June 2012. Now scheduled for its second season of running, Gravity Falls follows the adventures of 12-year-old twin siblings Dipper and Mabel Pines while on their summer vacation in the small town of Gravity Falls, Oregon. The choice of “twins” as main characters reveals, even at such an embryonic level, a connection to Gothicised structures, as the mode itself, as Vijay Mishra suggests, finds an affinity with doublings and “specular identifications” that “confuse the norm” (63). The presence of twins makes the double nature of character, traditionally a metaphorical and implicit idea in the Gothic, a very obvious and explicit one. Dipper and Mabel are staying with their eccentric and money-grabbing Great Uncle Stan—often referred to as “Grunkle Stan”—who runs the local curiosity shop known as the Mystery Shack. It becomes very obvious from the very beginning that an air of mystery truly surrounds the Shack, which quickly lives up to its name, and the eponymous town. In an aptly Gothic manner, things are definitely not what they seem and the twins are caught in odd plots, eerily occurrences, and haunted/haunting experiences on a daily basis. The instigator for the twins’ interest in the odd manifestations is the finding of a mysterious journal, a manual the relays detailed descriptions of the creatures that inhabit the forest in the town of Gravity Falls. The author of the journal remains unknown, and is commonly known only as “3”, an unexplained number that marks the cover of the book itself. Although the connection between the Gothic and animation may be obscure, it is in fact possible to identify many common and intersecting elements—aesthetically, narratively, and conceptually—that highlight the two as being intrinsically connected. The successful relation that the Gothic holds with animation is based in the mode’s fundamental predilection for not only subversion, excess and the exploration of the realm of the “imagination”, but also humour and self-reflexivity. These aspects are shared with animation which, as a medium, is ideally placed for exploring and presenting the imaginative and the bizarre, while pushing the boundaries of the known and the proper. Julia Round suggests that the Gothic “has long been identified as containing a dual sense of play and fear” (7). The playfulness and destabilisation that are proper to the mode find a fertile territory in animation in view of not only its many genres, but also its style and usually sensational subject matter. This discourse becomes particularly relevant if one takes into consideration matters of audienceship, or, at least, receivership. Although not historically intended for younger viewers, the animation has evolved into a profoundly children-orientated medium. From cinema to television, animated features and series are the domain of children of various ages. Big production houses such as Disney and Warner Bros have capitalised on the potential of the medium, and established its place in broadcasting slots for young viewers. Not unlike comics—which is, in a way, its ancestral medium—animation is such a malleable and contextual form that it requires a far-reaching and inclusive approach, one that is often interdisciplinary in scope; within this, where the multi-faceted nature of the Gothic opens up the way for seeing animated narratives as the highly socio-historical mediums they are. And not unlike comics, animation shares a common ground with the Gothic in requiring a vast scope of analysis, one that is intrinsically based on the conceptual connections between “texts”. Round has also aptly argued that, like comics, animated series lend themselves to malleable and mouldable re-elaboration: “from the cultural to the aesthetic, the structural to the thematic”, graphic media always reflect the impact of “intertextual and historical references” (8). Animation’s ability to convey, connect, and revolutionise ideas is, therefore, well-matched to the aesthetic and conceptual idiosyncrasies of Gothic tropes. Dipper and Mabel’s vacation in the town of Gravity Falls is characterised by the appearance of numerous super- and preter-natural creatures. The list of “monsters” encountered by the twins is long and growing, from gnomes, goblins, mermaids and zombies, to ghosts, clones, and a wide and colourful variety of demons. And although, at first glance, this list would appear to be a simple and simplistic grouping of bizarre and creatively assembled creatures, it is made quickly apparent that these “monsters” are all inspired, often very directly, by “existing”—or, at least, well-known—Gothic creatures, and their respective contexts of development. Indeed, the links to the Gothic in contemporary popular culture are unavoidable. The creatures in Gravity Falls are presented with subtle references to Gothic literature and cinema, from John Carpenter’s Halloween (1978) and Joe Dante’s Gremlins (1984), to Stephen King’s The Shining (1977) and Needful Things (1991). Borrowing from these texts, the creatures in the series all have strange names that rely on play-on-words and re-inventions, and the rubric twists that they undertake are part of a system of both homage and conceptual interdependency. One can find, for instance, “Manotaurs”—creatures that are half-bull and half-man, and that value “manliness” in their society above all else—and the “Gremlobin” – a gigantic monster somewhere in between, we are told, a “gremlin” and a “goblin”, whose eyes can show “your worst nightmares”. But the range extends to other bizarre “creatures” that are clearly very spooky, such as the “Summewrween Trickster”—a large, shadowy, purple/orange monster with a “jack-o’-melon” mask – the living “mailbox”—a sentient and omniscient object—and the truly haunting Bill Cipher—a mind demon that can be summoned through an incantation and enter a person’s subconscious. The connection to the Gothic in popular culture is instrumental for the construction of the Gothic intertext in Gravity Falls. In episode One, “Tourist Trapped” (1.01), Mabel is kidnapped by a tribe of gnomes, who are set on making her their queen. The gnomes are incongruous creatures: on the one hand, they are vengeful and spiteful, recalling the horror monsters found in movies such as the questionable Blood Gnome (2004). On the other, however, they wear red pointy hats and white beards, and their friendly smiles recall the harmless appearance of actual garden gnomes. When the gnomes grow upset, they throw up rainbows; this strange fact destroys their potential as a Gothic horror icon, and makes them accessible and amusing. This subversion of iconography takes place with a number of other “creatures” in Gravity Falls, with the Summerween Trickster—subverting the “terror” of Hallowe’en—being another fitting example. When the gnomes are attempting to woe Mabel, they do not appear to her in their real form: they camouflage themselves into a teenage boy— one who is moody, brooding, and mysterious—and become Mabel’s boyfriend; the “boy’s” interest in her, however, is so intense, that Dipper suspects him to be a member of “The Undead”, a category of monster that is closely described in 3’s journal: due to their “pale skin” and “bad attitudes”, they are often mistaken for “teenagers”. Clues to Dipper’s doubts include the teenage boy’s hand “falling off” while he is hugging Mabel, a clear sign—it would seem—that the boy is obviously a decaying, zombie corpse. The intertextual connection to several horror visual narratives where limbs “fall off” the undead and the monstrous is clear here, with apt film examples being Dawn of the Dead (1978), The Fly (1986), horror comedy Army of Darkness (1992), and, more recently, television’s The Walking Dead (2010-). The references to well-known horror films are scattered throughout the series, and comprise the majority of the lampooned cultural context in which the creatures appear. In spite of Dipper’s suspicions, the situation is revealed to have a rather different outcome. When the boyfriend tells Mabel he has a big secret to reveal, her mind wanders into another direction, choosing a different type of undead, as she expectantly thinks: “Please be a vampire…please be a vampire”. It is not difficult to spot the conceptual connection here to narratives such as Stephenie Meyer’s Twilight saga (2005-2008), both in its literary and cinematic variations, where brooding and mysterious teenage boys find ideal incarnations as the undead creature. The romanticised nature of teenage fictional narratives such as the Twilight saga is also mirrored in Mabel’s distinctive love-centred interest in the potential vampire, revealing an intertextual and highly contextual association to seeing the creature as part of an amorous relationship, as opposed to a blood-thirsty murderer. Mabel’s dreams of vampric love are unfortunately shattered when the boyfriend is revealed to be several gnomes carefully assembled to operate a human-like body, rather than one immortal lover. Irrespective of its desire to parody the Gothic, however, Gravity Falls still maintains unavoidable links to the notion of terror. Clear evidence of this is to be found in the fact that all “creatures” in the series present a level of anthropomorphism about them, and this is interpreted by the characters—and the viewers—as one of their scariest aspects. Leigh Blackmore suggests that a special brand of terror can be found in “anthropomorphic beings” that are in fact not human (Blackmore 95). Most of the creatures in the series are humanoid in shape, and can speak like humans. From gnomes to mermaids, mailboxes and demons, the creatures act as humans, but they are in fact something “other”, something that only recalls the human itself. This idea of being “almost human”, but “not quite”, is disturbing in itself, and connects the presentation of the creatures to the Gothic via the notion of the uncanny: “a crisis of the natural, touching upon everything that one might have thought was ‘part of nature’ […] human nature, the nature of reality and the world” (Royle 1). The uncanny nature of the creatures in Gravity Falls is maintained through their profound inhumanity, and their simultaneous links to human ways of acting, speaking, and even thinking. Indeed, most of the creatures are presented as petty, bitter, and childish, and often seen as greedy and sulking. In a way, the creatures lampoon some of the most intrinsic qualities of the human species, what separates us from animals. The supernatural creatures operate here as a critique of the humans themselves, exposing, as the Gothic often does, the most disturbing parts of humanity. The creatures are presented initially as scary, recalling—albeit very briefly—notions of terror and horror, but that façade is quickly destroyed as their “real nature” is exposed. They are de-terrorised by not only making them common, but also ridiculing their habits and de-constructing their thinly-veiled Gothic personas. The creatures in Gravity Falls are a subversion of the subversion, a re-thinking of the Gothic through parody that allows their conceptual, and culturally relevant, function to be rapidly exposed. The impact of the Gothic intertext in Gravity Falls is not only visible in its representational forms—its monsters and “creatures”—but also extends to its structural organisation. Jerrold Hogle has argued that, although they maintain a heterogeneous construction of texts and contexts, there are certain qualities applicable to “Gothic texts”: an antiquated space (often decaying); a concealed secret from the historical past; a physical or psychological haunting; and an oscillation between “reality” and the “supernatural” (3). Although Hogle’s pinpointing of what he calls the “Gothic matrix” (3) is mainly focused on the literary world, a broader and more wide-reaching understanding of the Gothic text allows these qualities to be clearly identifiable in other narrative mediums, such as an animated series. Indeed, Gravity Falls presents the main elements of the “Gothic matrix”: the Mystery Shack is an old and isolated place, physically crumbling and in constant state of disrepair; it is made clear that the Shack harbours many secrets—filled as it is with hidden passageways and underground vaults—connected to the shady past of Grunkle Stan and its unresolved connections to mysticism and magic; there are plenty of hauntings to be found in the series: from physical ones—in the form of demons and ghosts—to psychological ones, condensed in Dipper and Mabel’s difficulties with their approaching puberties and “growing up”; finally, the line between reality and supernatural is constantly challenged by the appearance of multiple creatures that are clearly not of this world, and even though several characters doubt their existence within the story, their very presence challenges the stability of the boundaries between real and unreal. On the surface, the series is presented as a standard linear narrative, where the linear journey of each 20-minute episode culminates with the resolution of the main “haunting”, and the usual destruction or appeasing of the “creature”. And while the series’ use of cliff-hangers is, in true television style, a common presence, they also expose and recall the unresolved nature of the narrative. Indeed, the story’s structure in Gravity Falls is reliant on narrative undertellings and off-shoots that often lie underneath the logical “line” of the plot. Sub-plots reign supreme, and multiple motives for the characters’ actions are introduced but not expanded upon, leaving the series impregnated with an aura of uncertainty and chaos. The focus of the storytelling is also denied; one moment, it appears to be Dipper’s desire to discover the “secrets” of the forest; the other, it is Grunkle Stan’s long-time battle with his arch-nemesis Gideon over the ownership of the Shack. This plot confusion in Gravity Falls continues to expose its narrative debt to the Gothic intertext, since “structural multiplicity”, as Round suggests, is “a defining feature of the Gothic” (19). The series’ narrative structure is based on numerous multiplicities, an open denial of linear journeys that is dependant, paradoxically, on the illusion of resolution. The most evocative example of Gravity Falls’ denial of clear-cut structures is arguably to be found in the narrative underlayers added by 3’s monster manual. It is obvious from the beginning that 3’s stay in the town of Gravity Falls was riddled with strange experiences, and that his sojourn intersected, at one point or the other, with the lives and secrets of Grunkle Stan and his enemies. It is also made clear that 3’s journal is not a solitary presence in the narrative, but is in fact only one in a triad of mystical books—these books, it is suggested, have great power once put together, but the resolution to this mystery is yet to be revealed. As Grunkle Stan and Gideon fight (secretly) over the possession of the three books, it is openly suggested that several uncovered stories haunt the main narrative in the series and, unknown Dipper and Mabel, are responsible for many of the strange occurrences during their stay at the Shack. Jean-Jacques Lecercle has long argued that one of the defining characteristics of the Gothic, and its intertextual structure, is the presence of “embedded narratives” (72). In Gravity Falls, the use of 3’s manual as not only an initiator of the plot, but also as a continuous performative link to the “haunted” past, uncovers the series’ re-elaboration of the traditional structure of Gothic narratives. As a paratextual presence in the story—one that is, however, often responsible for the development of the main narrative—3’s manual draws attention to the importance of constructing layered stories in order to create the structures of terror, and subsequent horror, that are essential to the Gothic itself. Although it often provides Dipper with information for solving the mysteries of the Shack, and subduing the supernatural creatures that overtake it, 3’s manual is, in reality, a very disruptive presence in the story. It creates confusion as it begins storytelling without concluding it, and opens the way to narrative pathways that are never fully explored. This is of course in keeping with the traditional narrative structures of the Gothic mode, where ancient books and stories— belonging to “antiquity”—are used as a catalyst for the present narrative to take place, but are also strangely displaced from it. This notion recalls Victor Sage’s suggestion that, in Gothic narratives, ancient books and stories paradoxically “disrupt” the main narrative, starting a separate dialogue with a storytelling structure that is inevitably unexplored and left unanswered (86). Canonical examples such as Ann Radcliffe’s The Mysteries of Udolpho (1794) and Emily Brontë’s Wuthering Heights (1847) inevitably come to mind here, but also more recent cinematic examples such as the Evil Dead franchise (1978-), where ancient books and old storytellers uncover hoary secrets that instigate, as well as obscure, the main narrative. In Gravity Falls, the interaction with 3’s manual is inherently performative, and continuously intertextual, but it is also deeply confusing, adding to the feeling of strangeness and mystery that is the conceptual basis for the series itself. The intertextual connections that drive the narrative in Gravity Falls construct lampooned versions of both the traditional concepts of Gothic horror and Gothic terror. Hogle has suggested that Gothic terror is apparent in the construction of suspense, achieved through an exploration of psychological hauntings, human nature and its un/limitations, and that which is kept out sight, the expected “hidden secrets” (3). Gothic horror, on the other hand, is characterised by the consequences of these occurrences; the physical manifestation of the “haunting”, so to speak, is achieved through the presentation of something repulsive and horrific, the monstrous in its various incarnations (Hogle 3). In Gravity Falls, the connection to the traditional Gothic intertext is made clear through both elicitations of “terror”, and subsequent manifestations of “horror”. Indeed, the “hidden secrets” of the Shack, and to some extent, the fears and insecurities of the characters, are mediated through the appearance of horrific machinery and creatures. The Shack always conceals something hidden, a magical element of sort that is kept secret by intricate passageways. The shadowy nature of the building – evoking the psychological hauntings of Gothic terror – inevitably causes the appearance of something physically disturbing, finding its apogee in a Gothic horror experience. A clear example of this can be found in the episode “Double Dipper” (1.07). Desperate to impress his co-worker and secret love-interest Wendy, and “haunted” by his lack of self-worth, Dipper roams the rooms of the Shack and discovers a very old and enchanted photocopier machine; the machine copies “people”, making clones of the original. The “clones” themselves are a manifestation of horror, a presence that breaks the boundaries of propriety, and worries its viewers in view of its very existence. The cloning copy machine is strongly intertextual as it not only provides conceptual links to numerous cinematic and literary examples where a “haunted machine” threats to destroy humanity— in examples such as Stephen King’s Christine (1983) —but also evokes the threat of “doubles”, another powerfully Gothic conduit (Royle). As it is often the case in Gravity Falls, Dipper loses control of the situation, and the dozens of clones he unwittingly created take over his life and threaten to annihilate him. Dipper must destroy the “horror” —the clones—and confront the “terror”—his haunting insecurities and personal secrets—in order to restore the original balance. This intertextual dynamic validates Hogle’s contention that, in Gothic narratives, both the physical and the psychological “hauntings” rise from view “within the antiquated space” and “manifest unresolved conflicts that can no longer be successfully buried from view” (Hogle 2). The “hidden secrets” of Gravity Falls, and their manifestations through both Gothic horror and terror, are clearly connected to explorations of human nature and deeply existentialist crises that are put forward through humour and parody. These range from Grunkle Stan’ inability to commit to a relationship—and his feeling that life is slipping away in his old age—to the twins’ constant insecurities about pre-teen amorous encounters. Not to mention the knowledge that, in reality, Dipper and Mabel were “abandoned” by their mother in the care of Stan, as she had other plans for the summer. As Round has argued, the Gothic’s most significant development seems to have been the “transvaluation of moral issues”, as notions of “monsters have become less clear cut” (18). The series’ successful engagement with the wider “monstrous” intertext, and its connection to moral issues and “hidden” preoccupations, uncovers the ability of the Gothic, as Catherine Spooner puts it, to act as “commodity”, no longer a marginalised cultural presence, but a fully purchasable item in consumer-capitalist systems (Spooner 2007). The evocations of both horror and terror in Gravity Falls are, naturally, unavoidably diluted, a homage as much as a direct encounter. The use of the monstrous and the haunted in the series is domesticated, made accessible so that it can be presented to a younger and more commercial audience. The profound interlacings with the Gothic intertext remain, however, unchanged, as the series reconciles its subversive, uncanny elements with the inevitably conventional, Disney-fied context in which it is placed. References Blackmore, Leigh. “Marvels and Horrors: Terry Dowling’s Clowns at Midnight”. 21st Century Gothic: Great Gothic Novels Since 2000, ed. Danel Olson. Lanham: Rowman & Littlefield, 2011. 87-97. Gravity Falls. Disney Television. Disney Channel, Los Angeles. 2012-2014. Hogle, Jerrold. “Introduction: The Gothic in Western Culture”. The Cambridge Companion of Gothic Fiction, ed. Jerrold Hogle. Cambridge: Cambridge University Press, 2002. 1-20. Lecercle, Jean-Jacques. “The Kitten’s Nose: Dracula and Witchcraft”. The Gothic, ed. Fred Botting. D.S Brewer: Cambridge, 2001. 71-86. Mandal, Anthony. “Intertext”. The Encyclopaedia of the Gothic, ed. David Punter, Bill Hughes and Andrew Smith. Basingstoke: Wiley, 2013. 350-355. Mishra, Vijay. The Gothic Sublime. Albany: State University of New York Press, 1994. Round, Julia. Gothic in Comics and Graphic Novels. Jefferson: McFarland, 2014. Royle, Nicholas. The Uncanny. Manchester: Manchester University Press, 2003. Sage, Victor. “Irish Gothic: C.R. Maturin and J.S. LeFanu. A Companion to the Gothic, ed. David Punter. Oxford; Blackwell, 2001. 81-93. Spooner, Catherine. Contemporary Gothic. London: Reaktion, 2007.

26

Rothenberger, Liane, and Valerie Hase. "Sources (Terrorism Coverage)." DOCA - Database of Variables for Content Analysis, March26, 2021. http://dx.doi.org/10.34778/2w.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Sources describe the actors quoted by journalists to support or refute their argumentation or to introduce new aspects into a discussion. Sources might be used for direct or indirect quotes and can be attributed to a variety of actors, such as government officials, witnesses or PR sources. In terrorism coverage, the media tends to mostly rely on official sources such as the government or police officials. Field of application/theoretical foundation: Content analyses focus on journalistic sources beyond terrorism coverage. Such analyses are often based on “Agenda-Setting” theories (McCombs & Shaw, 1972), models conceptualizing the relationship between journalists and PR, power hierarchies, or studies on working routines of journalists. References/combination with other methods of data collection: Similar analyses in the context of “Automated Content Analysis” try to grasp news “Actors”, of which news sources might be one, automatically (for example Burggraaf & Trilling, 2020). In addition, interviews with journalists can shed light on their sourcing routines (Larsen, 2018). Two studies are of particular value when analyzing sources used in terrorism coverage since they analyze a large variety of different sources and will hence be discussed in the following section. Example studies: Larsen (2019); Venger (2019) Information on Larsen, 2019 Author: Larsen (2019) Research question: How are radicalization and violent extremism framed in the news, including the sources used in these articles? Object of analysis: Online news from four Norwegian news outlets (Aftenposten, NRK, TV2, and VG) Time frame of analysis: 2014–2015 Info about variables Variable name/definition: Sources Level of analysis: News stories Variables and values: 27 different values, namely (1) no source, (2) police, (3) security services, (4) national politician in position, (5) national politician in opposition, (6) local politician, (7) bureaucracy/administration, (8) lawyer, (9) military/intelligence, (10) expert/researcher, (11) journalist/editor, (12) “extreme Islamist”, (13) “right-wing extremist”, (14) acquaintances, (15) NGOs, (16) international organizations, (17) religious leaders/spokespersons, (18) members of the public, (19) health, (20) education/school, (21) private sector/business, (22) prison administration, (23) affiliation not mentioned (i.e. anonymous), (24) think tank, (25) public prosecutors, (26) judge/court of Justice, (27) other Reliability: Cohen’s kappa: .895 Information on Venger, 2019 Authors: Venger (2019) Research question: How did the use of sources in news on the London bombings differ across newspapers published in countries with different media systems? Object of analysis: Newspaper coverage in the UK (The Guardian, The Times), the US (The Washington Post, The New York Times), and Russia (Izvestiya) Time frame of analysis: July–August 2005 Info about variables Variable name/definition8 different values, including (1) local government officials of the newspaper’s country, (2) foreign government officials, including officials of international agencies, (3) local experts, (4) international experts, (5) foreigners not associated with any government, (6) private citizens (of the newspaper’s country), (7) citations for local newspapers, (8) citations for international newspapers. Reliability: Rust and Cohen’s PRL reliability index, minimal value of any variable in study: .85 Table 1. Measurement of “Sources” in terrorism coverage. Author(s) Sample Manifestations Reliability Codebook Bennett (2016) Online news articles 12 different sources, ranging from “domestic media” to “eyewitnesses” Not reported Not available Douai & Lauricella (2014) Newspaper articles 5 different sources, ranging from “Western media sources” to “official/government Muslim sources” Percent agreement across all variables: 94.25 Not available Du & Li (2017) Online news articles 7 different sources, ranging from “NGOs” to “laws, orders, and documents” Scott’s pi for all variables in study: between .798 and 1 Not available Fahmy & Al Emad (2011) Online news articles 5 different sources, ranging from “US sources” to “Al Qaeda sources” Scott’s pi: .92 Available Gardner (2007) Newspaper articles 7 different sources, ranging from “analyst/academic” to “friends and family of the terrorist” Holsti across all variables: .87 Not available Larsen (2019) Broadcasting programs and online news articles 27 different sources, ranging from “security/intelligence” to “religious spokespersons” Cohen’s kappa: .895 Available Li (2007) Broadcasting programs 10 different sources, ranging from “airlines officials” to “witnesses” Scott’s pi: .84 Not available Matthews (2013) Newspaper articles 16 different sources, ranging from “police sources” to “experts” Minimal value for all variables in study: .8 Available Matthews (2016) Newspaper articles 7 different sources, ranging from “friends” to “survivors and witnesses” Not reported Not available Venger (2019) Newspaper articles 8 different sources, ranging from “local experts” to “citations for international newspapers” Rust and Cohen’s PRL reliability index, minimal value of any variable in study: 85 Not available Zhang & Hellmüller (2016) Online news articles 10 different sources, ranging from “ISIS/insurgent groups” to “ordinary people” Krippendorf’s alpha: .8 Available References Bennett, D. (2016). Sourcing the BBC’s live online coverage of terror attacks. Digital Journalism, 4(7), 861–874. doi:10.1080/21670811.2016.1163233 Burggraaff, C., & Trilling, D. (2020). Through a different gate: An automated content analysis of how online news and print news differ. Journalism, 21(1), 112–129. doi:10.1177/1464884917716699 Douai, A., & Lauricella, S. (2014). The ‘terrorism’ frame in ‘neo-Orientalism’: Western news and the Sunni–Shia Muslim sectarian relations after 9/11. International Journal of Media & Cultural Politics, 10(1), 7–24. doi:10.1386/macp.10.1.7_1 Du, Y. R., & Li, L. (2017). When press freedom meets national interest: How terrorist attacks are framed in the news in China and the US. Global Media and China, 2(3–4), 284–302. doi:10.1177/2059436418755761 Fahmy, S. S., & Al Emad, M. (2011). Al-Jazeera vs Al-Jazeera: A comparison of the network’s English and Arabic online coverage of the US/Al Qaeda conflict. International Communication Gazette, 73(3), 216–232. doi:10.1177/1748048510393656 Gardner, E. (2007). Is there method to the madness?: Worldwide press coverage of female terrorists and journalistic attempts to rationalize their involvement. Journalism Studies, 8(6), 909–929. doi:10.1080/14616700701556799 Larsen, A. H. (2018). Newsworthy actors, illegitimate voices: Journalistic strategies in dealing with voices deemed anti-democratic and violent. Journalism. Advanced online publication. doi:10.1177/1464884918760865 Larsen, A. G. (2019). Threatening criminals and marginalized individuals: Frames and news conventions in reporting of radicalization and violent extremism. Media, War & Conflict, 12(3), 299–316. doi:10.1177/1750635218769331 Li, X. (2007). Stages of a crisis and media frames and functions: U.S. television coverage of the 9/11 incident during the first 24 hours. Journal of Broadcasting & Electronic Media, 51(4), 670–687. doi:10.1080/08838150701626578 Matthews, J. (2013). News narratives of terrorism: Assessing source diversity and source use in UK news coverage of alleged Islamist plots. Media, War & Conflict, 6(3), 295–310. doi:10.1177/1750635213505189 Matthews, J. (2016). Media performance in the aftermath of terror: Reporting templates, political ritual and the UK press coverage of the London Bombings, 2005. Journalism, 17(2), 173–189. doi:10.1177/1464884914554175 McCombs, M.E., & Shaw, D. L. (1972). The agenda-setting function of mass media. Public Opinion Quarterly, 36(2), 176–187. doi:10.1086/267990 Venger, O. (2019). The use of experts in journalistic accounts of media events: A comparative study of the 2005 London Bombings in British, American, and Russian newspapers. Journalism, 20(10), 1343–1359. doi:10.1177/1464884919830479 Zhang, X., & Hellmüller, L. (2016). Transnational Media Coverage of the ISIS Threat: A Global Perspective? International Journal of Communication, 10, 766–785.

27

Holloway, Donell Joy, Lelia Green, and Danielle Brady. "FireWatch: Creative Responses to Bushfire Catastrophes." M/C Journal 16, no.1 (March19, 2013). http://dx.doi.org/10.5204/mcj.599.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

IntroductionBushfires have taken numerous lives and destroyed communities throughout Australia over many years. Catastrophic fire weather alerts have occurred during the Australian summer of 2012–13, and long-term forecasts predict increased bushfire events throughout several areas of Australia. This article highlights how organisational and individual responses to bushfire in Australia often entail creative responses—either improvised responses at the time of bushfire emergencies or innovative (organisational, strategic, or technological) changes which help protect the community from, or mitigate against, future bushfire catastrophes. These improvised or innovative responses include emergency communications systems, practices, and devices. This article reports on findings from a research project funded by the Australian Research Council titled Using Community Engagement and Enhanced Visual Information to Promote FireWatch Satellite Communications as a Support for Collaborative Decision-making. FireWatch is a Web-based public information product based on near real time satellite data produced by the West Australian (WA) Government entity, Landgate. The project researches ways in which remote and regional publics can be engaged and mobilised through the development of a more user-friendly FireWatch site to make fire information accessible and usable, allowing a community-focused response to risk.The significance of the research project is evident both in how it addresses the important and life-threatening challenge of bushfires; and also in how Australia’s increasingly hot, dry, long summers are adding to historically-established risks. This innovative project uses an iterative, participatory design process incorporating action-research practices. This will ensure that the new Firewatch interface is redesigned, tested, observed, and reflected upon multiple times—and will incorporate the collective creativity of users, designers, and researchers.The qualitative findings reported on in this article are based on 19 interviews with community members in the town of Kununurra in the remote Kimberley region of WA. The findings are positioned within a reconceptualised framework in which creativity is viewed as an essential component of successful emergency responses. This includes, we argue, two critical aspects of creativity: improvisation during a catastrophic event; and ongoing innovation to improve future responses to catastrophes—including communication practices and technologies. This shifts the discourse within the literature in relation to the effective management and community responses to the changing phenomenon of fire catastrophes. Findings from the first round of interviews, and results of enquiries into previous bushfires in Australia, are used to highlight how these elements of creativity often entail a collective creativity on the part of emergency responders or the community in general. An additional focus is on the importance of the critical use of communication during a bushfire event.ImprovisationThe notion of "improvisation" is often associated with artistic performance. Nonetheless, improvisation is also integral to making effectual responses during natural catastrophes. “Extreme events present unforeseen conditions and problems, requiring a need for adaptation, creativity, and improvisation while demanding efficient and rapid delivery of services under extreme conditions” (Harrald 257).Catastrophes present us with unexpected scenarios and require rapid, on the spot problem solving and “even if you plan for a bushfire it is not going to go to plan. When the wind changes direction there has to be a new plan” (Jeff. Personal Interview. 2012). Jazz musicians or improvisational actors “work to build their knowledge across a range of fields, and this knowledge provides the elements for each improvisational outcome” (Kendra and Wachendorf 2). Similarly, emergency responders’ knowledge and preparation can be drawn “upon in the ambiguous and dynamic conditions of a disaster where not every need has been anticipated or accounted for” (Kendra and Wachtendorf 2). Individuals and community organisations not associated with emergency services also improvise in a creative and intuitive manner in the way they respond to catastrophes (Webb and Chevreau). For example, during the 9/11 terrorism catastrophe in the USA an assorted group of boat owners rapidly self-organised to evacuate Lower Manhattan. On their return trips, they carried emergency personnel and supplies to the area (Kendra and Wachendorf 5). An interviewee in our study also recalls bush fire incidents where creative problem solving and intuitive decision-making are called for. “It’s like in a fire, you have to be thinking fast. You need to be semi self-sufficient until help arrives. But without doing anything stupid and creating a worse situation” (Kelly. Personal Interview. 2012). Kelly then describes the rapid community response she witnessed during a recent fire on the outskirts of Kununurra, WA.Everyone had to be accounted for, moving cars, getting the tractors out, protecting the bores because you need the water. It happens really fast and it is a matter of rustling everyone up with the machinery. (2012)In this sense, the strength of communities in responding to catastrophes or disasters “results largely from the abilities of [both] individuals and organisations to adapt and improvise under conditions of uncertainty” (Webb and Chevreau 67). These improvised responses frequently involve a collective creativity—where groups of neighbours or emergency workers act in response to the unforseen, often in a unified and self-organising manner. InnovationCatastrophes also stimulate change and innovation for the future. Disasters create a new environment that must be explored, assessed, and comprehended. Disasters change the physical and social landscape, and thereby require a period of exploration, learning, and the development of new approaches. (Kendra and Wachtendorf 6)These new approaches can include organisational change, new response strategies, and technologies and communication improvements. Celebrated inventor Benjamin Franklin, for instance, facilitated the formation of the first Volunteer Fire department in the 1850s as a response to previous urban fire catastrophes in the USA (Mumford 258). This organisational innovation continues to play an instrumental part in modern fire fighting practices. Indeed, people living in rural and remote areas of Australia are heavily reliant on volunteer groups, due to the sparse population and vast distances that need to be covered.As with most inventions and innovations, new endeavours aimed at improving responses to catastrophes do not occur in a vacuum. They “are not just accidents, nor the inscrutable products of sporadic genius, but have abundant and clear causes in prior scientific and technological development” (Gifillian 61). Likewise, the development of our user-friendly and publically available FireWatch site relies on the accumulation of preceding inventions and innovations. This includes the many years spent developing the existing FireWatch site, a site dense in information of significant value to scientists, foresters, land managers, and fire experts.CommunicationsOften overlooked in discussions regarding emergency communications is the microgeographical exchanges that occur in response to the threat of natural disasters. This is where neighbours fill the critical period before emergency service responders can appear on site. In this situation, it is often local knowledge that underpins improvised grassroots communication networks that inform and organise the neighbourhood. During a recent bushfire on peri-rural blocks on the outskirts of Kununurra, neighbours went into action before emergency services volunteers could respond.We phoned around and someone would phone and call in. Instead of 000 being rung ten times, make sure that one person rang it in. 40 channel [CB Radio] was handy – two-way communication, four wheelers – knocking on doors making sure everyone is out of the house, just in case. (Jane. Personal Interview. 2012) Similarly, individuals and community groups have been able to inform and assist each other on a larger scale via social network technologies (SNTs). This creative application of SNTs began after the 9/11 terror attacks in 2001 when individuals created wikis in order to find missing persons (Palen and Lui). Twitter has experienced considerable growth and was used freely during the 2009 Black Saturday fires in Australia. Studies of tweeting activity during these fires indicate that “tweets made during Black Saturday are laden with actionable factual information which contrasts with earlier claims that tweets are of no value made of mere random personal notes” (Sinnappan et al. n.p.).Traditionally, official alerts and warnings have been provided to the public via television and radio. However, several inquiries into the recent bushfires within Australia show concern “with the way in which fire agencies deliver information to community members during a bushfire...[and in order to] improve community safety from bushfire, systems need to be implemented that enable community members to communicate information to fire agencies, making use of local knowledge” (Elsworth et al. 8).Technological and social developments over the last decade mean the public no longer relies on a single source of official information (Sorensen and Sorensen). Therefore, SNTs such as Twitter and Facebook are being used by the media and emergency authorities to make information available to the public. These SNTs are dynamic, in that there can be a two-way flow of information between the public and emergency organisations. Nonetheless, there has been limited use of SNTs by emergency agencies to source information posted by in situ residents, in order to help in decision-making (Freeman). Organisational use of multiple communication channels and platforms to inform citizens about bushfire emergencies ensures a greater degree of coverage—in case of communication systems breakdowns or difficulties—as in the telephone alert system breakdown in Kelmscott-Roleystone, WA or a recent fire in Warrnambool, Victoria which took out the regional telephone exchange making telephone calls, mobiles, landlines, and the Internet non-operational (Johnson). The new FireWatch site will provide an additional information option for rural and remote Australians who, often rely on visual sightings and on word-of-mouth to be informed about fires in their region. “The neighbour came over and said - there is a fire, we’d better get our act together because it is going to hit us. No sooner than I turned around, I thought sh*t, here it comes” (Richard. Personal Interview. 2012). The FireWatch ProjectThe FireWatch project involves the redevelopment of an existing FireWatch website to extend the usability of the product from experts to ordinary users in order to facilitate community-based decision-making and action both before and during bushfire emergencies. To this purpose, the project has been broken down to two distinct, yet interdependent, strands. The community strand involves collaboration within a community (in this case the Kununurra community) in order to carry out a community-centred approach to further development of the site. The design strand involves the development of an intuitive and accessible Web presentation of complex information in clear, unambiguous ways to inform action in stressful circ*mstances. At this stage, a first round of 19 semi-structured interviews with stakeholders has been conducted in Kununurra to determine fire-related information-seeking behaviours, attitudes to mediated information services in the region, as well as user feedback on a prototype website developed in the design strand of the project. Stakeholders included emergency services personnel (payed and volunteer), shire representatives, tourism operators, small business operators (including tourism operators), a forest manager, a mango farmer, an Indigenous ranger team manager as well as general community members. Interviewees reported dissatisfaction with current information systems. They gave positive feedback about the website prototype. “It’s very much, very easy to follow” (David. Personal Interview. 2012). “It looks so much better than [the old site]. You couldn’t get in that close on [the other site]. It is fantastic” (Lance. Personal Interview. 2012). They also added thought-provoking contributions to the design of the website (to be discussed later).Residents of Kununurra who were interviewed for this research project found bushfire warning communications unsatisfactory, especially during a recent fire on the outskirts of town. People who called 000 had difficulties passing the information on, having to explain exactly where Kununurra was and the location of fires to operators not familiar with the area. When asked how the Kununurra community gets their fire information a Shire representative explained: That is not very good at the moment. The only other way we can think about it is perhaps more updates on things like Facebook, perhaps on a website, but with this current fire there really wasn’t a lot of information and a lot of people didn’t know what was going on. We [the shire] knew because we were talking to the [fire] brigades and to FESA [Fire and Emergency Services Authority] but most residents didn’t have any idea and it looks pretty bad. (Ginny. Personal Interview. 2012) All being well, the new user-friendly FireWatch site will add another platform through which fire information messages are transmitted. Community members will be offered continuously streamed bushfire location information, which is independent of any emergency services communication systems. In particular, rural and remote areas of Australia will have fire information at the ready.The participatory methodology used in the design of the new FireWatch website makes use of collaborative creativity, whereby users’ vision of the website and context are incorporated. This iterative process “creates an equal evolving participatory process between user and designer towards sharing values and knowledge and creating new domains of collective creativity” (Park 2012). The rich and sometimes contradictory suggestions made by interviewees in this project often reflected individual visions of the tasks and information required, and individual preferences regarding the delivery of this information. “I have been thinking about how could this really work for me? I can give you feedback on what has happened in the past but how could it work for me in the future?” (Keith. Personal Interview. 2012). Keith and other community members interviewed in Kununurra indicated a variety of extra functions on the site not expected by the product designers. Some of these unexpected functions were common to most interviewees such as the great importance placed on the inclusion of a satellite view option on the site map (example shown in Figure 1). Jeremy, a member of an Indigenous ranger unit in the Kununurra area, was very keen to incorporate the satellite view options on the site. He explained that some of the older rangers:can’t use GPSs and don’t know time zones or what zones to put in, so they’ll use a satellite-style view. We’ll have Google Earth up on one [screen], and also our [own] imagery up on another [screen] and go that way. Be scrolling in and see – we’ve got a huge fire scar for 2011 around here; another guy will be on another computer zoning in and say, I think it is here. It’s quite simplistic but it works. (Personal Interview. 2012) In the case above, where rangers are already switching between computer screens to incorporate a satellite view into their planning, the importance of a satellite view layer on the FireWatch website makes user context an essential part of the design process. Incorporating many layers on one screen, as recommended by participants also ensures a more elegant solution to an existing problem.Figure 1: Satellite view in the Kununurra area showing features such as gorges, rivers, escarpments and dry riverbedsThis research project will involve further consultation with participants (both online and offline) regarding bushfire safety communications in their region, as well as the further design of the site. The website will be available over multiple devices (for example desktops, smart phones, and hand held tablet devices) and will be launched late this year. Further work will also be carried out to determine if social media is appropriate for this community of users in order to build awareness and share information regarding the site.Conclusion Community members improvise and self-organise when communicating fire information and organising help for each other. This can happen at a microgeographical (neighbourhood) level or on a wider level via social networking sites. Organisations also develop innovative communication systems or devices as a response to the threat of bushfires. Communication innovations, such as the use of Twitter and Facebook by fire emergency services, have been appropriated and fine-tuned by these organisations. Other innovations such as the user-friendly Firewatch site rely on previous technological developments in satellite-delivered imagery—as well as community input regarding the design and use of the site.Our early research into community members’ fire-related information-seeking behaviours and attitudes to mediated information services in the region of Kununurra has found unexpectedly creative responses, which range from collective creativity on the part of emergency responders or the community in general during events to creative use of existing information and communication networks. We intend to utilise this creativity in re-purposing FireWatch alongside the creative work of the designers in the project.Although it is commonplace to think of graphic design and new technology as incorporating creativity, it is rarely acknowledged how frequently these innovations harness everyday perspectives from non-professionals. In the case of the FireWatch developments, the creativity of designers and technologists has been informed by the creative responses of members of the public who are best placed to understand the challenges posed by restricted information flows on the ground in times of crisis. In these situations, people respond not only with new ideas for the future but with innovative responses in the present as they communicate with each other to deal with the challenge of a fast-moving and unpredictable situation. Such improvisation, honed through close awareness of the contours and parameters of both community and communication, are one of the ways through which people help keep themselves and each other safe in the face of dramatic developments.ReferencesElsworth, G., and K. Stevens, J. Gilbert, H. Goodman, A Rhodes. "Evaluating the Community Safety Approach to Bushfires in Australia: Towards an Assessment of What Works and How." Biennial Conference of the Eupopean Evaluation Society, Lisbon, Oct. 2008. Freeman, Mark. "Fire, Wind and Water: Social Networks in Natural Disasters." Journal of Cases on Information Technology (JCIT) 13.2 (2011): 69–79.Gilfillan, S. Colum. The Sociology of Invention. Chicago: Follett Publishing, 1935.Harrald, John R. "Agility and Discipline: Critical Success Factors for Disaster Response." The Annals of the American Academy of Political and Social Science 604.1 (2006): 256–72.Johnson, Peter. "Australia Unprepared for Bushfire”. Australian Broadcasting Corporation 17 Dec. 2012. 3 Jan. 2013 ‹http://www.abc.net.au/environment/articles/2012/12/17/3654075.htm›.Keelty, Mick J. "A Shared Responsibility: the Report of the Perth Hills Bushfires February 2011". Department of Premier and Cabinet, Government of Western Australia, Perth.Kendra, James, and Tricia Wachtendorf. "Improvisation, Creativity, and the Art of Emergency Management." NATO Advanced Research Workshop on Understanding and Responding to Terrorism: A Multi-Dimensional Approach. Washington, DC, 8-9 Sep. 2006.———. "Creativity in Emergency Response after the World Trade Centre Attack". Amud Conference of the International Emergency Management Society. University of Delaware. 14-17 May 2002. Mumford, Michael D. "Social Innovation: Ten Cases from Benjamin Franklin." Creativity Research Journal 14.2 (2002): 253–66.Palen, Leysia, and Sophia.B. Liu. "Citizen Communications in Crisis: Anticipating a Future of ICT-Supported Public Participation." Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. San Jose, 28 Apr. - 3 May 2007.Park, Ji Yong. "Design Process Excludes Users: The Co-Creation Activities between User and Designer." Digital Creativity 23.1 (2012): 79–92. Sinnappan, Suku, Cathy Farrell, and Elizabeth Stewart. "Priceless Tweets! A Study on Twitter Messages Posted During Crisis: Black Saturday." Proceedings of 21st Australasian Conference on Information Systems (ACIS 2010). Brisbane, Australia, 1-3 Dec 2010.Sorensen, John H., and Barbara Vogt Sorensen. "Community Processes: Warning and Evacuation." Handbook of Disaster Research. Eds. Havidán Rodríguez, Enrico Louis Quarantelli, and Russell Rowe Dynes. New York: Springer, 2007. 183–99.Webb, Gary R., and Francois-Regis Chevreau. "Planning to Improvise: The Importance of Creativity and Flexibility in Crisis Response." International Journal of Emergency Management 3.1 (2006): 66–72.

28

Holloway, Donell Joy, Lelia Green, and Kylie Stevenson. "Digitods: Toddlers, Touch Screens and Australian Family Life." M/C Journal 18, no.5 (August20, 2015). http://dx.doi.org/10.5204/mcj.1024.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction Children are beginning to use digital technologies at younger and younger ages. The emerging trend of very young children (babies, toddlers and pre-schoolers) using Internet connected devices, especially touch screen tablets and smartphones, has elicited polarising opinions from early childhood experts. At present there is little actual research about the risks or benefits of tablet and smartphone use by very young children. Current usage recommendations, based on research into passive television watching which claims that screen time is detrimental, is in conflict with advice from education experts and app developers who commend interactive screen time as engaging and educational. Guidelines from the health professions typically advise strict time limits on very young children’s screen-time. Based for the most part on policy developed by the American Academy of Paediatrics, it is usually recommended that children under two have no screen time at all (Brown), and children over this age have no more than two hours a day (Strasburger, et al.). On the other hand, early childhood education guidelines promote the development of digital literacy skills (Department of Education). Further, education-based research indicates that access to computers and the Internet in the preschool years is associated with overall educational achievement (Bittman et al.; Cavanaugh et al; Judge et al; Neumann). The US based National Association for Education of Young Children’s position statement on technology for zero to eight year-olds declares that “when used intentionally and appropriately, technology and interactive media are effective tools to support learning and development” (NAEYC). This article discusses the notion of Digitods—a name for those children born since the introduction of the iPhone in 2007 who have ready access to touchscreen technologies since birth. It reports on the limited availability of evidence-based research about these children’s ICT use concluding that current research and recommendations are not grounded in the everyday life of very young children and their families. The article then reports on the beginnings of a research project funded by the Australian Research Council entitled Toddlers and Tablets: exploring the risks and benefits 0-5s face online. This research project recognises that at this stage it is parents who “are the real experts in their toddlers’ use of screen technologies. Accordingly, the project’s methodological approach draws on parents, pre-schoolers and their families as communities of practice in the construction of social meaning around toddlers’ use of touch screen technology. Digitods In 2000 Bill Gates introduced the notion of Generation I to describe the first cohort of children raised with the Internet as a reality in their lives. They are those born after the 1990s and will, in most cases; have no memory of life without the Net. [...] Generation I will be able to conceive of the Internet’s possibilities far more profoundly than we can today. This new generation will become agents of change as the limits of the Internet expand to include educational, scientific, and business applications that we cannot even imagine. (Gates)Digitods, on the other hand, is a term that has been used in education literature (Leathers et al.) to describe those children born after the introduction of the iPhone in 2007. These children often begin their lives with ready access to the Internet via easily usable touch screen devices, which could have been designed with toddlers’ touch and swipe movements in mind. Not only are they the youngest group of children to actively engage with the Internet they are the first group to grow up with a range of mobile Internet devices (Leathers et al.). The difference between Digitods and Gates’s Generation I is that Digitods are the first pre-verbal, non-ambulant infants to have ready access to digital technologies. Somewhere around the age of 10 months to fourteen months a baby learns to point with his or her forefinger. At this stage the child is ready to swipe and tap a touch screen (Leathers et al.). This is in contrast to laptops and PCs given that very young children often need assistance to use a mouse or keyboard. The mobility of touch screen devices allows very young children to play at the kitchen table, in the bedroom or on a car trip. These mobile devices have, of course, a myriad of mobile apps to go with them. These apps create an immediacy of access for infants and pre-schoolers who do not need to open a web browser to find their favourite sites. In the lives of these children it seems that it has always been possible to touch and swipe their way into games, books and creative and communicative experiences (Holloway et al. 149). The interactivity of most pre-school apps, as opposed to more passive screen activities such as watching television shows or videos (both offline or online), requires toddlers and pre-schoolers to pay careful attention, think about things and act purposefully (Leathers et al.). It is this interactivity which is the main point of difference, one which holds the potential to engage and educate our youngest children. It should be noted within this discussion about Digitods that, while the trope Digital Natives tends to hom*ogenise an entire generation, the authors do not assume that all children born today are Digitods by default. Many children do not have the same privileged opportunities as others, or the (parental) cultural capital, to enable access, ease of use and digital skill development. In addition to this it is not implied that Digitods will be more tech savvy than their older siblings. The term is used more to describe and distinguish those children who have digital access almost since birth—in order to differentiate or tease out everyday family practices around these children’s ICT use and the possible risks and benefits this access affords babies, toddlers and pre-schoolers. While the term Digital Native has also been criticised as being a white middle class phenomenon this is not necessarily the case with Digitods. In the Southeast Asia and the Pacific region developed countries like Japan, Korea, New Zealand and Singapore have extremely high rates of touchscreen use by very young children (Child Sciences; Jie; Goh; Unantenne). Other countries such as the Philippines and Indonesia have moved to a high smart phone usage by very young children while at the same time have only nascent ICT access and instruction within their education systems (Unantenne). The Digitod Parent Parents of Digitods are usually experienced Internet users themselves, and many are comfortable with their children using these child-friendly touch screen devices (Findahl). Digital technologies are integral to their everyday lives, often making daily life easier and improving communication with family and friends, even during the high pressure parenting years of raising toddlers and pre-schoolers. Even though many parents and caregivers are enabling very young children’s use of touch screen technologies, they are also concerned about the changes they are making. This is because very young children’s use of touch screen devices “has become another area where they fear possible criticism and in which their parental practices risk negative evaluation by others” (Holloway et al). The tensions between expert advice regarding young children’s screen-time and parents’ and caregivers’ own judgments are also being played out online. Parenting blogs, online magazines and discussion groups are all joining in the debate: On the one hand, parents want their children to swim expertly in the digital stream that they will have to navigate all their lives; on the other hand, they fear that too much digital media, too early, will sink them. Parents end up treating tablets like precision surgical instruments, gadgets that might perform miracles for their child’s IQ and help him win some nifty robotics competition—but only if they are used just so. (Rosin)Thus, with over 80 000 children’s apps marketed as educational in the Apple App Store alone, parents can find it difficult to choose apps that are worth purchasing (Yelland). Nonetheless, recent research regarding Australian children shows that three to five year olds who access touch screen devices will typically have five or more specific apps to choose from (5.23 on average) (Neumann). With little credible evidence or considered debate, parents have been left to make their own choices about the pros and cons of their young children’s access to touch screens. Nonetheless, one immediate benefit that comes to mind is toddlers and pre-schoolers video chatting with dispersed family member—due to increased globalisation, guest worker arrangements, FIFO (fly-in fly-out) workforces and family separation or divorce. Such clear benefits around sociability and youngsters’ connection with significant others make previous screen-related guidelines out of date and no longer contextually relevant. Little Research Attention Family ownership of tablet devices as well as touch screen phones has risen dramatically in the last five years. With very young children being loaned these technologies by mum or dad, and a tendency in Australia to rely on market-orientated research regarding ownership and usage, there is very little knowledge about touch screen usage rates for very young Australian children. UK and US usage figures indicate that over the last few years there has been a five-fold increase in tablet uptake by zero to eight year olds (Ofcom; Rideout). Although large scale, comparative Australian data is not available, previous research regarding older children indicates that Australia is similar to high use countries like some Scandinavian nations and the UK (Green et al.). In addition to this, two small research projects in Australia, with under 160 participant families each, indicate that two thirds of these children (0-5) use touchscreen devices (Neumann; Coenenna et. al.). Beyond usage figures, there is also very limited evidence-based research about very young children’s app use. Interactive technologies available via touch screen technologies have been available domestically for a very short time. Consequently, “valid scientific research has not been completed and replicated due to [the lack of] available time” (Leathers el al. 129) and longitudinal studies which rely on an intervention group (in this case exposure to children’s apps) and a control group (no exposure) are even fewer and more time-consuming. Interestingly, researchers have revisited the issue of passive screen viewing. A recent 2015 review of previous 2007 research, which linked babies watching videos with poor language development, has found that there was statistical and methodological issues with the 2007 study and that there are no strong inferences to be drawn between media exposure and language development (Ferguson and Donellan). Thus, there seems to be no conclusive evidence-based research on which to inform parents and educators about the possible downside or benefits of touch screen use. Nonetheless, early childhood experts have been quick to weigh in on the possible effects of screen usage, some providing restrictive guidelines and recommendations, with others advocating the use of interactive apps for very young children for their educational value. This knowledge-gap disguises what is actually happening in the lives of real Australian families. Due to the lack of local data, as well as worldwide research, it is essential that Australian researchers obtain a comprehensive understanding about actual behaviour around touch screen use in the lives of children aged between zero and five and their families. Beginning Research While research into very young children’s touch screen use is beginning to take place, few results have been published. When researching two to three year olds’ learning from interactive versus non-interactive videos Kirkorian, Choi and Pempek found that “toddlers may learn more from interactive media than from non-interactive video” (Kirkorian et al). This means that the use of interactive apps on touch screen devices may hold a greater potential for learning than passive video or television viewing for children in this age range. Another study considered the degree to which the young children could navigate to and use apps on touch screen devices by observing and analysing YouTube videos of infants and young children using touch screens (Hourcade et al.). It was found that between the ages of 12 months and 17 months the children filmed seemed to begin to “make meaningful use of the tablets [and] more than 90 per cent of children aged two [had] reached this level of ability” (1923). The kind of research mentioned above, usually the preserve of psychologists, paediatricians and some educators, does not, however, ground very young children’s use in their domestic context—in the spaces and with those people with whom most touch screen usage takes place. With funding from the Australian Research Council Australian, Irish and UK researchers are about to adopt a media studies (domestication) approach to comprehensively investigate digital media use in the everyday lives of very young children. This Australian-based research project positions very young children’s touch screen use within the family and will help provide an understanding of the everyday knowledge and strategies that this cohort of technology users (very young children and their parents) have already developed—in the knowledge vacuum left by the swift appropriation and incorporation of these new media technologies into the lives of families with very young children. Whilst using a conventional social constructionist perspective, the project will also adopt a co-creation of knowledge approach. The co-creation of knowledge approach (Fong) has links with the communities of practice literature (Wegner) and recognises that parents, care-givers and the children themselves are the current experts in this field in terms of the everyday uses of these technologies by very young children. Families’ everyday discourse and practices regarding their children’s touch screen use do not necessarily work through obvious power hierarchies (via expert opinions), but rather through a process of meaning making where they shape their own understandings and attitudes through experience and shared talk within their own everyday family communities of practice. This Toddlers and Tablets research is innovative in many ways. It seeks to capture the enthusiasm of young children’s digital interactions and to pioneer new ways of ‘beginnings’ researching with very young children, as well as with their parents. The researchers will work with parents and children in their broad domestic contexts (including in and out-of-home activities, and grandparental and wider-family involvement) to co-create knowledge about young children’s digital technologies and the social contexts in which these technologies are used. Aspects of these interactions, such as interviews and observations of everyday digital interactions will be recorded (audio and video respectively). In addition to this, data collected from media commentary, policy debates, research publications and learned articles from other disciplinary traditions will be interrogated to see if there are correlations, contrasts, trends or synergies between parents’ construction of meaning, public commentary and current research. Critical discourse tools and methods (Chouliaraki and Fairclough) will be used to analyse verbatim transcripts, video, and all written materials. Conclusion Very young children are uniquely dependent upon others for the basic necessities of life and for the tools they need, and will need to develop, to claim their place in the world. Given the ubiquitous role played by digital media in the lives of their parents and other caregivers it would be a distortion of everyday life for children to be excluded from the technologies that are routinely used to connect with other people and with information. In the same way that adults use digital media to renew and strengthen social and emotional bonds across distance, so young children delight in ‘Facetime’ and other technologies that connect them audio-visually with friends and family members who are not physically co-present. Similarly, a very short time spent in the company of toddlers using touch screens is sufficient to demonstrate the sheer delight that these young infants have in developing their sense of agency and autonomy (https://www.youtube.com/watch?v=aXV-yaFmQNk). Media, communications and cultural studies are beginning to claim a space for evidence based policy drawn from everyday activities in real life contexts. Research into the beginnings of digital life, with families who are beginning to find a way to introduce these technologies to the youngest generation, integrating them within social and emotional repertoires, may prove to be the start of new understandings into the communication skills of the preverbal and preliterate young people whose technology preferences will drive future development – with their parents likely trying to keep pace. Acknowledgment This research is supported under Australia Research Council’s Discovery Projects funding scheme (project number DP150104734). References Bittman, Michael, et al. "Digital Natives? New and Old Media and Children's Outcomes." Australian Journal of Education 55.2 (2011): 161-75. Brown, Ari. "Media Use by Children Younger than 2 Years." Pediatrics 128.5 (2011): 1040-45. Burr, Vivien. Social Constructionism. 2nd ed. London: Routledge, 2003. Cavanaugh, Cathy, et al. "The Effects of Distance Education on K–12 Student Outcomes: A Meta-Analysis." Naperville, Ill.: Learning Point Associates, 2004. 5 Mar. 2009 ‹http://www.ncrel.org/tech/distance/index.html›. Child Sciences and Parenting Research Office. Survey of Media Use by Children and Parents (Summary). Tokyo: Benesse Educational Research and Development Institute, 2014. Coenena, Pieter, Erin Howiea, Amity Campbella, and Leon Strakera. Mobile Touch Screen Device Use among Young Australian Children–First Results from a National Survey. Proceedings 19th Triennial Congress of the IEA. 2015. Chouliaraki, Lilie and Norman Fairclough. Discourse in Late Modernity: Rethinking Critical Discourse Analysis. Edinburgh: Edinburgh UP, 1999. Department of Education. "Belonging, Being and Becoming: The Early Years Learning Framework for Australia." Australian Government, 2009. Ferguson, Christopher J., and M. Brent Donnellan. "Is the Association between Children’s Baby Video Viewing and Poor Language Development Robust? A Reanalysis of Zimmerman, Christakis, and Meltzoff (2007)." Developmental Psychology 50.1 (2014): 129. Findahl, Olle. Swedes and the Internet 2013. Stockholm: The Internet Infrastructure Foundation, 2013. Fong, Patrick S.W. "Co-Creation of Knowledge by Multidisciplinary Project Teams." Management of Knowledge in Project Environments. Eds. E. Love, P. Fong, and Z. Irani. Burlington, MA: Elsevier, 2005. 41-56. Gates, Bill. "Enter 'Generation I': The Responsibility to Provide Access for All to the Most Incredible Learning Tool Ever Created." Instructor 109.6 (2000): 98. Goh, Wendy W.L., Susanna Bay, and Vivian Hsueh-Hua Chen. "Young School Children’s Use of Digital Devices and Parental Rules." Telematics and Informatics 32.4 (2015): 787-95. Green, Lelia, et al. "Risks and Safety for Australian Children on the Internet: Full Findings from the AU Kids Online Survey of 9-16 Year Olds and Their Parents." Cultural Science Journal 4.1 (2011): 1-73. Holloway, Donell, Lelia Green, and Carlie Love. "'It's All about the Apps': Parental Mediation of Pre-Schoolers' Digital Lives." Media International Australia 153 (2014): 148-56. Hourcade, Juan Pablo, Sarah Mascher, David Wu, and Luiza Pantoja. Look, My Baby Is Using an iPad! An Analysis of YouTube Videos of Infants and Toddlers Using Tablets. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 2015. Jie S.H. "ICT Use Statistics of Households and Individuals in Korea." 10th World Telecommunication/ICT Indicators Meeting (WTIM-12). Korea Internet & Security Agency (KISA), 25-7 Sep. 2012.Judge, Sharon, Kathleen Puckett, and Sherry Mee Bell. "Closing the Digital Divide: Update from the Early Childhood Longitudinal Study." The Journal of Educational Research 100.1 (2006): 52-60. Kirkorian, H., K. Choi, and Pempek. "Toddlers' Word Learning from Contingent and Non-Contingent Video on Touchscreens." Child Development (in press). Leathers, Heather, Patti Summers, and Desollar. Toddlers on Technology: A Parents' Guide. Illinois: AuthorHouse, 2013. NAEYC. Technology and Interactive Media as Tools in Early Childhood Programs Serving Children from Birth through Age 8 [Position Statement]. Washington: National Association for the Education of Young Children, the Fred Rogers Center for Early Learning and Children’s Media at Saint Vincent College, 2012. Neumann, Michelle M. "An Examination of Touch Screen Tablets and Emergent Literacy in Australian Pre-School Children." Australian Journal of Education 58.2 (2014): 109-22. Ofcom. Children and Parents: Media Use and Attitudes Report. London, 2013. Rideout, Victoria. Zero to Eight: Children’s Media Use in America 2013. San Francisco: Common Sense Media, 2013. Rosin, Hanna. "The Touch-Screen Generation." The Atlantic, 20 Apr. 2013. Strasburger, Victor C., et al. "Children, Adolescents, and the Media." Pediatrics 132.5 (2013): 958-61. Unantenne, Nalika. Mobile Device Usage among Young Kids: A Southeast Asia Study. Singapore: The Asian Parent and Samsung Kids Time, 2014. Wenger, Etienne. Communities of Practice: Learning, Meaning, and Identity. New York: Cambridge University Press, 1998. Wenger, Etienne. "Communities of Practice and Social Learning Systems." Organization 7.2 (2000): 225-46. Yelland, Nicola. "Which Apps Are Educational and Why? It’s in the Eye of the Beholder." The Conversation 13 July 2015. 16 Aug. 2015 ‹http://theconversation.com/which-apps-are-educational-and-why-its-in-the-eye-of-the-beholder-37968›.

29

Ibrahim, Yasmin. "Commodifying Terrorism." M/C Journal 10, no.3 (June1, 2007). http://dx.doi.org/10.5204/mcj.2665.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction Figure 1 The counter-Terrorism advertising campaign of London’s Metropolitan Police commodifies some everyday items such as mobile phones, computers, passports and credit cards as having the potential to sustain terrorist activities. The process of ascribing cultural values and symbolic meanings to some everyday technical gadgets objectifies and situates Terrorism into the everyday life. The police, in urging people to look out for ‘the unusual’ in their normal day-to-day lives, juxtapose the everyday with the unusual, where day-to-day consumption, routines and flows of human activity can seemingly house insidious and atavistic elements. This again is reiterated in the Met police press release: Terrorists live within our communities making their plans whilst doing everything they can to blend in, and trying not to raise suspicions about their activities. (MPA Website) The commodification of Terrorism through uncommon and everyday objects situates Terrorism as a phenomenon which occupies a liminal space within the everyday. It resides, breathes and co-exists within the taken-for-granted routines and objects of ‘the everyday’ where it has the potential to explode and disrupt without warning. Since 9/11 and the 7/7 bombings Terrorism has been narrated through the disruption of mobility, whether in mid-air or in the deep recesses of the Underground. The resonant thread of disruption to human mobility evokes a powerful meta-narrative where acts of Terrorism can halt human agency amidst the backdrop of the metropolis, which is often a metaphor for speed and accelerated activities. If globalisation and the interconnected nature of the world are understood through discourses of risk, Terrorism bears the same footprint in urban spaces of modernity, narrating the vulnerability of the human condition in an inter-linked world where ideological struggles and resistance are manifested through inexplicable violence and destruction of lives, where the everyday is suspended to embrace the unexpected. As a consequence ambient fear “saturates the social spaces of everyday life” (Hubbard 2). The commodification of Terrorism through everyday items of consumption inevitably creates an intertextuality with real and media events, which constantly corrode the security of the metropolis. Paddy Scannell alludes to a doubling of place in our mediated world where “public events now occur simultaneously in two different places; the place of the event itself and that in which it is watched and heard. The media then vacillates between the two sites and creates experiences of simultaneity, liveness and immediacy” (qtd. in Moores 22). The doubling of place through media constructs a pervasive environment of risk and fear. Mark Danner (qtd. in Bauman 106) points out that the most powerful weapon of the 9/11 terrorists was that innocuous and “most American of technological creations: the television set” which provided a global platform to constantly replay and remember the dreadful scenes of the day, enabling the terrorist to appear invincible and to narrate fear as ubiquitous and omnipresent. Philip Abrams argues that ‘big events’ (such as 9/11 and 7/7) do make a difference in the social world for such events function as a transformative device between the past and future, forcing society to alter or transform its perspectives. David Altheide points out that since September 11 and the ensuing war on terror, a new discourse of Terrorism has emerged as a way of expressing how the world has changed and defining a state of constant alert through a media logic and format that shapes the nature of discourse itself. Consequently, the intensity and centralisation of surveillance in Western countries increased dramatically, placing the emphasis on expanding the forms of the already existing range of surveillance processes and practices that circ*mscribe and help shape our social existence (Lyon, Terrorism 2). Normalisation of Surveillance The role of technologies, particularly information and communication technologies (ICTs), and other infrastructures to unevenly distribute access to the goods and services necessary for modern life, while facilitating data collection on and control of the public, are significant characteristics of modernity (Reiman; Graham and Marvin; Monahan). The embedding of technological surveillance into spaces and infrastructures not only augment social control but also redefine data as a form of capital which can be shared between public and private sectors (Gandy, Data Mining; O’Harrow; Monahan). The scale, complexity and limitations of omnipresent and omnipotent surveillance, nevertheless, offer room for both subversion as well as new forms of domination and oppression (Marx). In surveillance studies, Foucault’s analysis is often heavily employed to explain lines of continuity and change between earlier forms of surveillance and data assemblage and contemporary forms in the shape of closed-circuit television (CCTV) and other surveillance modes (Dee). It establishes the need to discern patterns of power and normalisation and the subliminal or obvious cultural codes and categories that emerge through these arrangements (Fopp; Lyon, Electronic; Norris and Armstrong). In their study of CCTV surveillance, Norris and Armstrong (cf. in Dee) point out that when added to the daily minutiae of surveillance, CCTV cameras in public spaces, along with other camera surveillance in work places, capture human beings on a database constantly. The normalisation of surveillance, particularly with reference to CCTV, the popularisation of surveillance through television formats such as ‘Big Brother’ (Dee), and the expansion of online platforms to publish private images, has created a contradictory, complex and contested nature of spatial and power relationships in society. The UK, for example, has the most developed system of both urban and public space cameras in the world and this growth of camera surveillance and, as Lyon (Surveillance) points out, this has been achieved with very little, if any, public debate as to their benefits or otherwise. There may now be as many as 4.2 million CCTV cameras in Britain (cf. Lyon, Surveillance). That is one for every fourteen people and a person can be captured on over 300 cameras every day. An estimated £500m of public money has been invested in CCTV infrastructure over the last decade but, according to a Home Office study, CCTV schemes that have been assessed had little overall effect on crime levels (Wood and Ball). In spatial terms, these statistics reiterate Foucault’s emphasis on the power economy of the unseen gaze. Michel Foucault in analysing the links between power, information and surveillance inspired by Bentham’s idea of the Panopticon, indicated that it is possible to sanction or reward an individual through the act of surveillance without their knowledge (155). It is this unseen and unknown gaze of surveillance that is fundamental to the exercise of power. The design and arrangement of buildings can be engineered so that the “surveillance is permanent in its effects, even if it is discontinuous in its action” (Foucault 201). Lyon (Terrorism), in tracing the trajectory of surveillance studies, points out that much of surveillance literature has focused on understanding it as a centralised bureaucratic relationship between the powerful and the governed. Invisible forms of surveillance have also been viewed as a class weapon in some societies. With the advancements in and proliferation of surveillance technologies as well as convergence with other technologies, Lyon argues that it is no longer feasible to view surveillance as a linear or centralised process. In our contemporary globalised world, there is a need to reconcile the dialectical strands that mediate surveillance as a process. In acknowledging this, Giles Deleuze and Felix Guattari have constructed surveillance as a rhizome that defies linearity to appropriate a more convoluted and malleable form where the coding of bodies and data can be enmeshed to produce intricate power relationships and hierarchies within societies. Latour draws on the notion of assemblage by propounding that data is amalgamated from scattered centres of calculation where these can range from state and commercial institutions to scientific laboratories which scrutinise data to conceive governance and control strategies. Both the Latourian and Deleuzian ideas of surveillance highlight the disparate arrays of people, technologies and organisations that become connected to make “surveillance assemblages” in contrast to the static, unidirectional Panopticon metaphor (Ball, “Organization” 93). In a similar vein, Gandy (Panoptic) infers that it is misleading to assume that surveillance in practice is as complete and totalising as the Panoptic ideal type would have us believe. Co-optation of Millions The Metropolitan Police’s counter-Terrorism strategy seeks to co-opt millions where the corporeal body can complement the landscape of technological surveillance that already co-exists within modernity. In its press release, the role of civilian bodies in ensuring security of the city is stressed; Keeping Londoners safe from Terrorism is not a job solely for governments, security services or police. If we are to make London the safest major city in the world, we must mobilise against Terrorism not only the resources of the state, but also the active support of the millions of people who live and work in the capita. (MPA Website). Surveillance is increasingly simulated through the millions of corporeal entities where seeing in advance is the goal even before technology records and codes these images (William). Bodies understand and code risk and images through the cultural narratives which circulate in society. Compared to CCTV technology images, which require cultural and political interpretations and interventions, bodies as surveillance organisms implicitly code other bodies and activities. The travel bag in the Metropolitan Police poster reinforces the images of the 7/7 bombers and the renewed attempts to bomb the London Underground on the 21st of July. It reiterates the CCTV footage revealing images of the bombers wearing rucksacks. The image of the rucksack both embodies the everyday as well as the potential for evil in everyday objects. It also inevitably reproduces the cultural biases and prejudices where the rucksack is subliminally associated with a specific type of body. The rucksack in these terms is a laden image which symbolically captures the context and culture of risk discourses in society. The co-optation of the population as a surveillance entity also recasts new forms of social responsibility within the democratic polity, where privacy is increasingly mediated by the greater need to monitor, trace and record the activities of one another. Nikolas Rose, in discussing the increasing ‘responsibilisation’ of individuals in modern societies, describes the process in which the individual accepts responsibility for personal actions across a wide range of fields of social and economic activity as in the choice of diet, savings and pension arrangements, health care decisions and choices, home security measures and personal investment choices (qtd. in Dee). While surveillance in individualistic terms is often viewed as a threat to privacy, Rose argues that the state of ‘advanced liberalism’ within modernity and post-modernity requires considerable degrees of self-governance, regulation and surveillance whereby the individual is constructed both as a ‘new citizen’ and a key site of self management. By co-opting and recasting the role of the citizen in the age of Terrorism, the citizen to a degree accepts responsibility for both surveillance and security. In our sociological imagination the body is constructed both as lived as well as a social object. Erving Goffman uses the word ‘umwelt’ to stress that human embodiment is central to the constitution of the social world. Goffman defines ‘umwelt’ as “the region around an individual from which signs of alarm can come” and employs it to capture how people as social actors perceive and manage their settings when interacting in public places (252). Goffman’s ‘umwelt’ can be traced to Immanuel Kant’s idea that it is the a priori categories of space and time that make it possible for a subject to perceive a world (Umiker-Sebeok; qtd. in Ball, “Organization”). Anthony Giddens adapted the term Umwelt to refer to “a phenomenal world with which the individual is routinely ‘in touch’ in respect of potential dangers and alarms which then formed a core of (accomplished) normalcy with which individuals and groups surround themselves” (244). Benjamin Smith, in considering the body as an integral component of the link between our consciousness and our material world, observes that the body is continuously inscribed by culture. These inscriptions, he argues, encompass a wide range of cultural practices and will imply knowledge of a variety of social constructs. The inscribing of the body will produce cultural meanings as well as create forms of subjectivity while locating and situating the body within a cultural matrix (Smith). Drawing on Derrida’s work, Pugliese employs the term ‘Somatechnics’ to conceptualise the body as a culturally intelligible construct and to address the techniques in and through which the body is formed and transformed (qtd. in Osuri). These techniques can encompass signification systems such as race and gender and equally technologies which mediate our sense of reality. These technologies of thinking, seeing, hearing, signifying, visualising and positioning produce the very conditions for the cultural intelligibility of the body (Osuri). The body is then continuously inscribed and interpreted through mediated signifying systems. Similarly, Hayles, while not intending to impose a Cartesian dichotomy between the physical body and its cognitive presence, contends that the use and interactions with technology incorporate the body as a material entity but it also equally inscribes it by marking, recording and tracing its actions in various terrains. According to Gayatri Spivak (qtd. in Ball, “Organization”) new habits and experiences are embedded into the corporeal entity which then mediates its reactions and responses to the social world. This means one’s body is not completely one’s own and the presence of ideological forces or influences then inscribe the body with meanings, codes and cultural values. In our modern condition, the body and data are intimately and intricately bound. Outside the home, it is difficult for the body to avoid entering into relationships that produce electronic personal data (Stalder). According to Felix Stalder our physical bodies are shadowed by a ‘data body’ which follows the physical body of the consuming citizen and sometimes precedes it by constructing the individual through data (12). Before we arrive somewhere, we have already been measured and classified. Thus, upon arrival, the citizen will be treated according to the criteria ‘connected with the profile that represents us’ (Gandy, Panoptic; William). Following September 11, Lyon (Terrorism) reveals that surveillance data from a myriad of sources, such as supermarkets, motels, traffic control points, credit card transactions records and so on, was used to trace the activities of terrorists in the days and hours before their attacks, confirming that the body leaves data traces and trails. Surveillance works by abstracting bodies from places and splitting them into flows to be reassembled as virtual data-doubles, and in the process can replicate hierarchies and centralise power (Lyon, Terrorism). Mike Dee points out that the nature of surveillance taking place in modern societies is complex and far-reaching and in many ways insidious as surveillance needs to be situated within the broadest context of everyday human acts whether it is shopping with loyalty cards or paying utility bills. Physical vulnerability of the body becomes more complex in the time-space distanciated surveillance systems to which the body has become increasingly exposed. As such, each transaction – whether it be a phone call, credit card transaction, or Internet search – leaves a ‘data trail’ linkable to an individual person or place. Haggerty and Ericson, drawing from Deleuze and Guattari’s concept of the assemblage, describe the convergence and spread of data-gathering systems between different social domains and multiple levels (qtd. in Hier). They argue that the target of the generic ‘surveillance assemblage’ is the human body, which is broken into a series of data flows on which surveillance process is based. The thrust of the focus is the data individuals can yield and the categories to which they can contribute. These are then reapplied to the body. In this sense, surveillance is rhizomatic for it is diverse and connected to an underlying, invisible infrastructure which concerns interconnected technologies in multiple contexts (Ball, “Elements”). The co-opted body in the schema of counter-Terrorism enters a power arrangement where it constitutes both the unseen gaze as well as the data that will be implicated and captured in this arrangement. It is capable of producing surveillance data for those in power while creating new data through its transactions and movements in its everyday life. The body is unequivocally constructed through this data and is also entrapped by it in terms of representation and categorisation. The corporeal body is therefore part of the machinery of surveillance while being vulnerable to its discriminatory powers of categorisation and victimisation. As Hannah Arendt (qtd. in Bauman 91) had warned, “we terrestrial creatures bidding for cosmic significance will shortly be unable to comprehend and articulate the things we are capable of doing” Arendt’s caution conveys the complexity, vulnerability as well as the complicity of the human condition in the surveillance society. Equally it exemplifies how the corporeal body can be co-opted as a surveillance entity sustaining a new ‘banality’ (Arendt) in the machinery of surveillance. Social Consequences of Surveillance Lyon (Terrorism) observed that the events of 9/11 and 7/7 in the UK have inevitably become a prism through which aspects of social structure and processes may be viewed. This prism helps to illuminate the already existing vast range of surveillance practices and processes that touch everyday life in so-called information societies. As Lyon (Terrorism) points out surveillance is always ambiguous and can encompass genuine benefits and plausible rationales as well as palpable disadvantages. There are elements of representation to consider in terms of how surveillance technologies can re-present data that are collected at source or gathered from another technological medium, and these representations bring different meanings and enable different interpretations of life and surveillance (Ball, “Elements”). As such surveillance needs to be viewed in a number of ways: practice, knowledge and protection from threat. As data can be manipulated and interpreted according to cultural values and norms it reflects the inevitability of power relations to forge its identity in a surveillance society. In this sense, Ball (“Elements”) concludes surveillance practices capture and create different versions of life as lived by surveilled subjects. She refers to actors within the surveilled domain as ‘intermediaries’, where meaning is inscribed, where technologies re-present information, where power/resistance operates, and where networks are bound together to sometimes distort as well as reiterate patterns of hegemony (“Elements” 93). While surveillance is often connected with technology, it does not however determine nor decide how we code or employ our data. New technologies rarely enter passive environments of total inequality for they become enmeshed in complex pre-existing power and value systems (Marx). With surveillance there is an emphasis on the classificatory powers in our contemporary world “as persons and groups are often risk-profiled in the commercial sphere which rates their social contributions and sorts them into systems” (Lyon, Terrorism 2). Lyon (Terrorism) contends that the surveillance society is one that is organised and structured using surveillance-based techniques recorded by technologies, on behalf of the organisations and governments that structure our society. This information is then sorted, sifted and categorised and used as a basis for decisions which affect our life chances (Wood and Ball). The emergence of pervasive, automated and discriminatory mechanisms for risk profiling and social categorising constitute a significant mechanism for reproducing and reinforcing social, economic and cultural divisions in information societies. Such automated categorisation, Lyon (Terrorism) warns, has consequences for everyone especially in face of the new anti-terror measures enacted after September 11. In tandem with this, Bauman points out that a few suicidal murderers on the loose will be quite enough to recycle thousands of innocents into the “usual suspects”. In no time, a few iniquitous individual choices will be reprocessed into the attributes of a “category”; a category easily recognisable by, for instance, a suspiciously dark skin or a suspiciously bulky rucksack* *the kind of object which CCTV cameras are designed to note and passers-by are told to be vigilant about. And passers-by are keen to oblige. Since the terrorist atrocities on the London Underground, the volume of incidents classified as “racist attacks” rose sharply around the country. (122; emphasis added) Bauman, drawing on Lyon, asserts that the understandable desire for security combined with the pressure to adopt different kind of systems “will create a culture of control that will colonise more areas of life with or without the consent of the citizen” (123). This means that the inhabitants of the urban space whether a citizen, worker or consumer who has no terrorist ambitions whatsoever will discover that their opportunities are more circ*mscribed by the subject positions or categories which are imposed on them. Bauman cautions that for some these categories may be extremely prejudicial, restricting them from consumer choices because of credit ratings, or more insidiously, relegating them to second-class status because of their colour or ethnic background (124). Joseph Pugliese, in linking visual regimes of racial profiling and the shooting of Jean Charles de Menezes in the aftermath of 7/7 bombings in London, suggests that the discursive relations of power and visuality are inextricably bound. Pugliese argues that racial profiling creates a regime of visuality which fundamentally inscribes our physiology of perceptions with stereotypical images. He applies this analogy to Menzes running down the platform in which the retina transforms him into the “hallucinogenic figure of an Asian Terrorist” (Pugliese 8). With globalisation and the proliferation of ICTs, borders and boundaries are no longer sacrosanct and as such risks are managed by enacting ‘smart borders’ through new technologies, with huge databases behind the scenes processing information about individuals and their journeys through the profiling of body parts with, for example, iris scans (Wood and Ball 31). Such body profiling technologies are used to create watch lists of dangerous passengers or identity groups who might be of greater ‘risk’. The body in a surveillance society can be dissected into parts and profiled and coded through technology. These disparate codings of body parts can be assembled (or selectively omitted) to construct and represent whole bodies in our information society to ascertain risk. The selection and circulation of knowledge will also determine who gets slotted into the various categories that a surveillance society creates. Conclusion When the corporeal body is subsumed into a web of surveillance it often raises questions about the deterministic nature of technology. The question is a long-standing one in our modern consciousness. We are apprehensive about according technology too much power and yet it is implicated in the contemporary power relationships where it is suspended amidst human motive, agency and anxiety. The emergence of surveillance societies, the co-optation of bodies in surveillance schemas, as well as the construction of the body through data in everyday transactions, conveys both the vulnerabilities of the human condition as well as its complicity in maintaining the power arrangements in society. Bauman, in citing Jacques Ellul and Hannah Arendt, points out that we suffer a ‘moral lag’ in so far as technology and society are concerned, for often we ruminate on the consequences of our actions and motives only as afterthoughts without realising at this point of existence that the “actions we take are most commonly prompted by the resources (including technology) at our disposal” (91). References Abrams, Philip. Historical Sociology. Shepton Mallet, UK: Open Books, 1982. Altheide, David. “Consuming Terrorism.” Symbolic Interaction 27.3 (2004): 289-308. Arendt, Hannah. Eichmann in Jerusalem: A Report on the Banality of Evil. London: Faber & Faber, 1963. Bauman, Zygmunt. Liquid Fear. Cambridge, UK: Polity, 2006. Ball, Kristie. “Elements of Surveillance: A New Framework and Future Research Direction.” Information, Communication and Society 5.4 (2002): 573-90 ———. “Organization, Surveillance and the Body: Towards a Politics of Resistance.” Organization 12 (2005): 89-108. Dee, Mike. “The New Citizenship of the Risk and Surveillance Society – From a Citizenship of Hope to a Citizenship of Fear?” Paper Presented to the Social Change in the 21st Century Conference, Queensland University of Technology, Queensland, Australia, 22 Nov. 2002. 14 April 2007 http://eprints.qut.edu.au/archive/00005508/02/5508.pdf>. Deleuze, Gilles, and Felix Guattari. A Thousand Plateaus. Minneapolis: U of Minnesota P, 1987. Fopp, Rodney. “Increasing the Potential for Gaze, Surveillance and Normalization: The Transformation of an Australian Policy for People and Homeless.” Surveillance and Society 1.1 (2002): 48-65. Foucault, Michel. Discipline and Punish: The Birth of the Prison. London: Allen Lane, 1977. Giddens, Anthony. Modernity and Self-Identity. Self and Society in the Late Modern Age. Stanford: Stanford UP, 1991. Gandy, Oscar. The Panoptic Sort: A Political Economy of Personal Information. Boulder, CO: Westview, 1997. ———. “Data Mining and Surveillance in the Post 9/11 Environment.” The Intensification of Surveillance: Crime, Terrorism and War in the Information Age. Eds. Kristie Ball and Frank Webster. Sterling, VA: Pluto Press, 2003. Goffman, Erving. Relations in Public. Harmondsworth: Penguin, 1971. Graham, Stephen, and Simon Marvin. Splintering Urbanism: Networked Infrastructures, Technological Mobilities and the Urban Condition. New York: Routledge, 2001. Hier, Sean. “Probing Surveillance Assemblage: On the Dialectics of Surveillance Practices as Process of Social Control.” Surveillance and Society 1.3 (2003): 399-411. Hayles, Katherine. How We Became Posthuman: Virtual Bodies in Cybernetics, Literature and Informatics. Chicago: U of Chicago P, 1999. Hubbard, Phil. “Fear and Loathing at the Multiplex: Everyday Anxiety in the Post-Industrial City.” Capital & Class 80 (2003). Latour, Bruno. Science in Action. Cambridge, Mass: Harvard UP, 1987 Lyon, David. The Electronic Eye – The Rise of Surveillance Society. Oxford: Polity Press, 1994. ———. “Terrorism and Surveillance: Security, Freedom and Justice after September 11 2001.” Privacy Lecture Series, Queens University, 12 Nov 2001. 16 April 2007 http://privacy.openflows.org/lyon_paper.html>. ———. “Surveillance Studies: Understanding Visibility, Mobility and the Phonetic Fix.” Surveillance and Society 1.1 (2002): 1-7. Metropolitan Police Authority (MPA). “Counter Terrorism: The London Debate.” Press Release. 21 June 2006. 18 April 2007 http://www.mpa.gov.uk.access/issues/comeng/Terrorism.htm>. Pugliese, Joseph. “Asymmetries of Terror: Visual Regimes of Racial Profiling and the Shooting of Jean Charles de Menezes in the Context of the War in Iraq.” Borderlands 5.1 (2006). 30 May 2007 http://www.borderlandsejournal.adelaide.edu.au/vol15no1_2006/ pugliese.htm>. Marx, Gary. “A Tack in the Shoe: Neutralizing and Resisting the New Surveillance.” Journal of Social Issues 59.2 (2003). 18 April 2007 http://web.mit.edu/gtmarx/www/tack.html>. Moores, Shaun. “Doubling of Place.” Mediaspace: Place Scale and Culture in a Media Age. Eds. Nick Couldry and Anna McCarthy. Routledge, London, 2004. Monahan, Teri, ed. Surveillance and Security: Technological Politics and Power in Everyday Life. Routledge: London, 2006. Norris, Clive, and Gary Armstrong. The Maximum Surveillance Society: The Rise of CCTV. Oxford: Berg, 1999. O’Harrow, Robert. No Place to Hide. New York: Free Press, 2005. Osuri, Goldie. “Media Necropower: Australian Media Reception and the Somatechnics of Mamdouh Habib.” Borderlands 5.1 (2006). 30 May 2007 http://www.borderlandsejournal.adelaide.edu.au/vol5no1_2006 osuri_necropower.htm>. Rose, Nikolas. “Government and Control.” British Journal of Criminology 40 (2000): 321–399. Scannell, Paddy. Radio, Television and Modern Life. Oxford: Blackwell, 1996. Smith, Benjamin. “In What Ways, and for What Reasons, Do We Inscribe Our Bodies?” 15 Nov. 1998. 30 May 2007 http:www.bmezine.com/ritual/981115/Whatways.html>. Stalder, Felix. “Privacy Is Not the Antidote to Surveillance.” Surveillance and Society 1.1 (2002): 120-124. Umiker-Sebeok, Jean. “Power and the Construction of Gendered Spaces.” Indiana University-Bloomington. 14 April 2007 http://www.slis.indiana.edu/faculty/umikerse/papers/power.html>. William, Bogard. The Simulation of Surveillance: Hypercontrol in Telematic Societies. Cambridge: Cambridge UP, 1996. Wood, Kristie, and David M. Ball, eds. “A Report on the Surveillance Society.” Surveillance Studies Network, UK, Sep. 2006. 14 April 2007 http://www.ico.gov.uk/upload/documents/library/data_protection/ practical_application/surveillance_society_full_report_2006.pdf>. Citation reference for this article MLA Style Ibrahim, Yasmin. "Commodifying Terrorism: Body, Surveillance and the Everyday." M/C Journal 10.3 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0706/05-ibrahim.php>. APA Style Ibrahim, Y. (Jun. 2007) "Commodifying Terrorism: Body, Surveillance and the Everyday," M/C Journal, 10(3). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0706/05-ibrahim.php>.

30

Daspit, Toby. "The Noisy Mix of Hip Hop Pedagogies." M/C Journal 4, no.2 (April1, 2001). http://dx.doi.org/10.5204/mcj.1901.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

"(W)hen you look at the historic angle of what’s going on, DJ culture is the future, everything is a mix. Whether it’s video, electronic sh*t, studio sh*t, painting, you name it, the psychology is in place. It’s the DJ." – Paul D. Miller, AKA DJ Spooky, qtd. in Tobin "Turn it up! Bring the noise." – Public Enemy, "Bring the Noise "Turn down that damned noise!!!" Thus began the nightly negotiation with my father during my adolescence — him firmly rooted in his recliner as he stared at the television, me locked in my bedroom, fingers nudging the stereo knobs to experiment with acceptable volumes. It was never, "turn down the music," or "lower that Boogie Down Productions album," it was always, "turn down that damned noise!!!" I hear his words echoed daily in the attitudes of many of the pre-service teachers that I work with as they navigate the tumultuous maelstrom of education in postmodern culture. Perhaps my students merely reveal legacies of their own educational experiences, or perhaps they embody the transitional dissonance of an epochal shift. Regardless of the "origin" of their discomfort, they seem to turn to those of us engaged in preparing them as teachers to sanitise the "mess" they encounter in schools. They desire Skinnerian behaviorist reductionism (if "x" then "y"). They seek to tame the "noise" of the extraordinarily complex endeavor of teaching and learning. I fiddle with the volume knob of my own teaching, crank it up, and offer them hip hop pedagogies.1 By hip hop pedagogies I do not mean simply the inclusion of hip hop culture (e.g., DJing, rapping, graffiti art, dancing) as objects of study in the classroom, although these are indeed worthwhile curricular considerations. Instead of dominant modes of schooling which are informed by a factory model of efficiency and knowledge transmission (Adams et al.), I suggest a fundamental reorientation to pedagogies guided by the aesthetics of hip hop culture, particularly the power of recombinant textuality embodied in hip hop’s "noisy mix." Dick Hebdige locates the origins, as diffuse as they are, of hip hop music in the fundamental nature of the mix, noting that "(r)ap is DJ (disc jockey) and MC (Master of Ceremonies or Microphone Controller) music . . . (I)t relies on pre-recorded sounds. . . . The hip hoppers "stole" music off air and cut it up. Then they broke it down into its component parts and remixed it on tape" (141). Paul Miller identifies the possibilities inherent in such processes: DJ culture – urban youth culture – is all about recombinant potential. It has as a central feature a eugenics of the imagination. Each and every source is fragmented and bereft of prior meaning – kind of like a future without a past. The samples are given meaning only when re-presented in the assemblage of the mix (7) In hip hop, mixing occurs within discursive realities of "noise." Tricia Rose notes that the "sonic power" of hip hop, with its "distinctive bass-heavy, enveloping sound does not rest outside of its musical and social power" (63). She summarizes the significance of this sonic barrage: "Noise" on the one hand and communal countermemory on the other, rap music conjures and razes in one stroke. Rap's rhythms . . . are its most powerful effect. Rap's primary focus is sonic . . . Rap music centers on the quality and nature of rhythm and sound, the lowest, "fattest beats" being the most significant and emotionally charged . . . The arrangement and selection of sounds rap musicians have invented via samples, turntables, tape machines, and sound systems are at once deconstructive (in that they actually take apart recorded musical compositions) and recuperative (because they recontextualise these elements creating new meanings for cultural sounds that have been relegated to commercial wastebins) . . . (64-65 Herein lies one of the most transformative possibilities of hip hop pedagogies – the model it offers as a recombinant text, as a mix. Miller explains: It is in this singularly improvisational role of "recombiner" that the DJ creates what I like to call a "post symbolic mood sculpture," or the mix; a disembodied and transient text . . . The implications of this style of creating art are three fold: 1) by its very nature it critiques the entire idea of intellectual property and copyright law, 2) it reifies a communal art value structure in contrast to most forms of art in late capitalist social contexts, 3) it interfaces communications technology in a manner that anthropomorphisizes it. (12-13 If we were to begin thinking of our classrooms/schools as a mix, as recombinant, fluid texts where the copyrighting privilege of authority in the guise of "teacher" is challenged, where the entire process of teaching and learning becomes communal, and where human/technological cyborgs are valued, we can see how hip hop pedagogies might be transformative. The classroom might become, in my favorite image of postmodern education that William Doll borrows from Milan Kundera and Richard Rorty, a "fascinating imaginative realm where no one owns the truth and everyone has the right to be understood" (151). Such pedagogical orientations toward the mix invite students to reject modernist attempts to channel and control learning – to "school" the body and mind. Instead, as Potter notes, "hip-hop aims for a world made hole, aporic, fracturing the fragmented, graffiti on graffiti" (8, emphasis in original). Instead of the master narratives of modernity, it "offers us a model . . . as it produces knowledge in the active consumption of the everyday materials the world makes available . . . it is a work which instructs in its process, indeed, by its process" (Block 339). Is this not a better way to envision our work in schools, which Pinar et al. see as ultimately an engagement with larger conversations of what it means to prepare the next generation (847)? Such mixing infuses life into pedagogies as meanings are reassembled, and acknowledges a "new paradigm" that does "not necessarily require new data, but rather (is) characterized by clever and substantively different ways of recasting what we already know" (Samples 187). "The previous meanings," Miller concludes, are "corralled into a space where the differences in time, place, and culture, are collapsed to create a recombinant text or autonomous zone of expression" (14). Hip hop pedagogies offer such "zones" of hybrid selves, hybrid cultures, and hybrid conversations that are recombined continually through collisions with cultures, histories, and technologies. So that’s the noisy mix I share with my students as most salient to postmodern education – cacophonous, turbulent, and sure to infuriate my father, even now. Notes 1. I follow Gore in her use of the plural form of pedagogy: "(Pedagogies) use is important to signify the multiple approaches and practices that fall under the pedagogy umbrella" whereas "rely(ing) on the singular form is to imply greater unity and coherence than is warranted" (7). References Adams, Natalie et al. Learning to Teach: A Critical Approach to Field Experiences. Mahwah, N.J.: Lawrence Erlbaum, 1998. Block. Alan. (1998). "Curriculum as Affichiste: Popular Culture and Identity." Curriculum: Toward New Identities. Ed. William F. Pinar. New York: Garland, 325-341. Doll, William E., Jr. A Postmodern Perspective on Curriculum. New York: Teachers College, 1993. Gore, J. The Struggle for Pedagogies: Critical and Feminist Discourses as Regimes of Truth. New York: Routledge, 1993. Hebdige, Dick. Cut-n-Mix: Culture, Identity and Caribbean Music. London: Methuen, 1987. Miller, Paul D. "Flow My Blood the DJ Said." Liner notes from Song of a Dead Dreamer. New York: Asphodel, 1995. Pinar, William F. et al. Understanding Curriculum: An Introduction to the Study of Historical and Contemporary Curriculum Discourses. New York: Peter Lang, 1995. Potter Russell A. Spectacular Vernaculars: Hip-Hop and the Politics of Postmodernism. Albany: SUNY, 1995. Public Enemy. It Takes A Nation Of Millions To Hold Us Back. New York: Def Jam Recordings, 1988. Rose, Tricia. Black Noise: Rap Music and Black Culture in Contemporary America. Hanover, N.H.: UP of New England, 1994. Samples, Bob. "Learning as Transformation." Education, Information, and Transformation: Essays on Learning and Thinking. Ed. Jeffrey Kane. Upper Saddle River, N.J.: Merrill, 1999. Tobin, Sam. "Permutations: A Conversation with Paul D. Miller, AKA DJ Spooky." Digress Magazine. [12, March 2001].<http://www.digressmagazine.com/1spooky.php>

31

Bucher, Taina. "About a Bot: Hoax, Fake, Performance Art." M/C Journal 17, no.3 (June7, 2014). http://dx.doi.org/10.5204/mcj.814.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction Automated or semi-automated software agents, better known as bots, have become an integral part of social media platforms. Reportedly, bots now generate twenty-four per cent of all posts on Twitter (Orlean “Man”), yet we know very little about who these bots are, what they do, or how to attend to these bots. This article examines one particular prominent exemplar: @Horse_ebooks, a much beloved Twitter bot that turned out not to be a “proper” bot after all. By examining how people responded to the revelations that the @Horse_ebooks account was in fact a human and not an automated software program, the intention here is not only to nuance some of the more common discourses around Twitter bots as spam, but more directly and significantly, to use the concept of persona as a useful analytical framework for understanding the relationships people forge with bots. Twitter bots tend to be portrayed as annoying parasites that generate “fake traffic” and “steal identities” (Hill; Love; Perlroth; Slotkin). According to such news media presentations, bots are part of an “ethically-questionable industry,” where they operate to provide an (false) impression of popularity (Hill). In a similar vein, much of the existing academic research on bots, especially from a computer science standpoint, tends to focus on the destructive nature of bots in an attempt to design better spam detection systems (Laboreiro et.al; Weiss and Tscheligi; Zangerle and Specht). While some notable exceptions exist (Gehl; Hwang et al; Mowbray), there is still an obvious lack of research on Twitter bots within Media Studies. By examining a case of “bot fakeness”—albeit in a somewhat different manner—this article contributes an understanding of Twitter bots as medium-specific personas. The case of @Horse_ebooks does show how people treat it as having a distinct personality. More importantly, this case study shows how the relationship people forge with an alleged bot differs from how they would relate to a human. To understand the ambiguity of the concept of persona as it applies to bots, this article relies on para-social interaction theory as developed by Horton and Wohl. In their seminal article first published in 1956, Horton and Wohl understood para-social interaction as a “simulacrum of conversational give and take” that takes place particularly between mass media users and performers (215). The relationship was termed para-social because, despite of the nonreciprocal exposure situation, the viewer would feel as if the relationship was real and intimate. Like theater, an illusory relationship would be created between what they called the persona—an “indigenous figure” presented and created by the mass media—and the viewer (Horton and Wohl 216). Like the “new types of performers” created by the mass media—”the quizmasters, announcers or ‘interviewers’” —bots too, seem to represent a “special category of ‘personalities’ whose existence is a function of the media themselves” (Horton and Wohl 216). In what follows, I revisit the concept of para-social interaction using the case of @Horse_ebooks, to show that there is potential to expand an understanding of persona to include non-human actors as well. Everything Happens So Much: The Case of @Horse_ebooks The case of the now debunked Twitter account @Horse_ebooks is interesting for a number of reasons, not least because it highlights the presence of what we might call botness, the belief that bots possess distinct personalities or personas that are specific to algorithms. In the context of Twitter, bots are pieces of software or scripts that are designed to automatically or semi-automatically publish tweets or make and accept friend requests (Mowbray). Typically, bots are programmed and designed to be as humanlike as possible, a goal that has been pursued ever since Alan Turing proposed what has now become known as the Turing test (Gehl; Weiss and Tschengeli). The Turing test provides the classic challenge for artificial intelligence, namely, whether a machine can impersonate a human so convincingly that it becomes indistinguishable from an actual human. This challenge is particularly pertinent to spambots as they need to dodge the radar of increasingly complex spam filters and detection algorithms. To avoid detection, bots masquerade as “real” accounts, trying to seem as human as possible (Orlean “Man”). Not all bots, however, pretend to be humans. Bots are created for all kinds of purposes. As Mowbray points out, “many bots are designed to be informative or otherwise useful” (184). For example, bots are designed to tweet news headlines, stock market quotes, traffic information, weather forecasts, or even the hourly bell chimes from Big Ben. Others are made for more artistic purposes or simply for fun by hackers and other Internet pundits. These bots tell jokes, automatically respond to certain keywords typed by other users, or write poems (i.e. @pentametron, @ProfJocular). Amidst the growing bot population on Twitter, @Horse_ebooks is perhaps one of the best known and most prominent. The account was originally created by Russian web developer Alexey Kouznetsov and launched on 5 August 2010. In the beginning, @Horse_ebooks periodically tweeted links to an online store selling e-books, some of which were themed around horses. What most people did not know, until it was revealed to the public on 24 September 2013 (Orlean “Horse”), was that the @Horse_ebooks account had been taken over by artist and Buzzfeed employee Jacob Bakkila in September 2011. Only a year after its inception, @Horse_ebooks went from being a bot to being a human impersonating a bot impersonating a human. After making a deal with Kouznetsov, Bakkila disabled the spambot and started generating tweets on behalf of @Horse_ebooks, using found material and text strings from various obscure Internet sites. The first tweet in Bakkila’s disguise was published on 14 September 2011, saying: “You will undoubtedly look on this moment with shock and”. For the next two years, streams of similar, “strangely poetic” (Chen) tweets were published, slowly giving rise to a devoted and growing fan base. Over the years, @Horse_ebooks became somewhat of a cultural phenomenon—an Internet celebrity of sorts. By 2012, @Horse_ebooks had risen to Internet fame; becoming one of the most mentioned “spambots” in news reports and blogs (Chen). Responses to the @Horse_ebooks “Revelation” On 24 September 2013, journalist Susan Orlean published a piece in The New Yorker revealing that @Horse_ebooks was in fact “human after all” (Orlean “@Horse_ebooks”). The revelation rapidly spurred a plethora of different reactions by its followers and fans, ranging from indifference, admiration and disappointment. Some of the sadness and disappointment felt can be seen clearly in the many of media reports, blog posts and tweets that emerged after the New Yorker story was published. Meyer of The Atlantic expressed his disbelief as follows: @Horse_ebooks, reporters told us, was powered by an algorithm. [...] We loved the horse because it was the network talking to itself about us, while trying to speak to us. Our inventions, speaking—somehow sublimely—of ourselves. Our joy was even a little voyeuristic. An algorithm does not need an audience. To me, though, that disappointment is only a mark of the horse’s success. We loved @Horse_ebooks because it was seerlike, childlike. But no: There were people behind it all along. We thought we were obliging a program, a thing which needs no obliging, whereas in fact we were falling for a plan. (Original italics) People felt betrayed, indeed fooled by @Horse_ebooks. As Watson sees it, “The internet got up in arms about the revelation, mostly because it disrupted our desire to believe that there was beauty in algorithms and randomness.” Several prominent Internet pundits, developers and otherwise computationally skilled people, quickly shared their disappointment and even anger on Twitter. As Jacob Harris, a self-proclaimed @Horse_ebooks fan and news hacker at the New York Times expressed it: Harris’ comparisons to the winning chess-playing computer Deep Blue speaks to the kind of disappointment felt. It speaks to the deep fascination that people feel towards the mysteries of the machine. It speaks to the fundamental belief in the potentials of machine intelligence and to the kind of techno-optimism felt amongst many hackers and “webbies.” As technologist and academic Dan Sinker said, “If I can’t rely on a Twitter bot to actually be a bot, what can I rely on?” (Sinker “If”). Perhaps most poignantly, Sinker noted his obvious disbelief in a blog post tellingly titled “Eulogy for a horse”: It’s been said that, given enough time, a million monkeys at typewriters would eventually, randomly, type the works of Shakespeare. It’s just a way of saying that mathematically, given infinite possibilities, eventually everything will happen. But I’ve always wanted it literally to be true. I’ve wanted those little monkeys to produce something beautiful, something meaningful, and yet something wholly unexpected.@Horse_ebooks was my monkey Shakespeare. I think it was a lot of people’s…[I]t really feels hard, like a punch through everything I thought I knew. (Sinker “Eulogy”) It is one thing is to be fooled by a human and quite another to be fooled by a “Buzzfeed employee.” More than anything perhaps, the question of authenticity and trustworthiness seems to be at stake. In this sense, “It wasn’t the identities of the feed’s writers that shocked everyone (though one of the two writers works for BuzzFeed, which really pissed people off). Rather, it was the fact that they were human in the first place” (Farago). As Sinker put it at the end of the “Eulogy”: I want to believe this wasn’t just yet another internet buzz-marketing prank.I want to believe that @Horse was as beautiful and wonderful today as it was yesterday.I want to believe that beauty can be assembled from the randomness of life all around us.I want to believe that a million monkeys can make something amazingGod.I really, really do want to believe.But I don’t think I do.And that feels even worse. Bots as Personae: Revisiting Horton and Wohl’s Concept of Para-Social Relations How then are we to understand and interpret @Horse_ebooks and peoples’ responses to the revelations? Existing research on human-robot relations suggest that machines are routinely treated as having personalities (Turkle “Life”). There is even evidence to suggest that people often imagine relationships with (sufficiently responsive) robots as being better than relationships with humans. As Turkle explains, this is because relationships with machines, unlike humans, do not demand any ethical commitments (Turkle “Alone”). In other words, bots are oftentimes read and perceived as personas, with which people forge affective relationships. The term “persona” can be understood as a performance of personhood. In a Goffmanian sense, this performance describes how human beings enact roles and present themselves in public (Goffman). As Moore puts it, “the persona is a projection, a puppet show, usually constructed by an author and enlivened by the performance, interpretation, or adaptation”. From Marcel Mauss’ classic analysis of gifts as objects thoroughly personified (Scott), through to the study of drag queens (Stru¨bel-Scheiner), the concept of persona signifies a masquerade, a performance. As a useful concept to theorise the performance and doing of personhood, persona has been used to study everything from celebrity culture (Marshall), fiction, and social networking sites (Zhao et al.). The concept also figures prominently in Human Computer Interaction and Usability Studies where the creation of personas constitutes an important design methodology (Dong et al.). Furthermore, as Marshall points out, persona figures prominently in Jungian psychoanalysis where it exemplifies the idea of “what a man should appear to be” (166). While all of these perspectives allow for interesting analysis of personas, here I want to draw on an understanding of persona as a medium specific condition. Specifically, I want to revisit Horton and Wohl’s classic text about para-social interaction. Despite the fact that it was written almost 60 years ago and in the context of the then emerging mass media – radio, television and movies – their observations are still relevant and useful to theorise the kinds of relations people forge with bots today. According to Horton and Wohl, the “persona offers, above all, a continuing relationship. His appearance is a regular and dependable event, to be counted on, planned for, and integrated into the routines of daily life” (216). The para-social relations between audiences and TV personas are developed over time and become more meaningful to the audience as it acquires a history. Not only are devoted TV audiences characterized by a strong belief in the character of the persona, they are also expected to “assume a sense of personal obligation to the performer” (Horton and Wohl 220). As Horton and Wohl note, “the “fan” - comes to believe that he “knows” the persona more intimately and profoundly than others do; that he “understands” his character and appreciates his values and motives (216). In a similar vein, fans of @Horse_ebooks expressed their emotional attachments in blog posts and tweets. For Sinker, @Horse_ebooks seemed to represent the kind of dependable and regular event that Horton and Wohl described: “Even today, I love @Horse_ebooks. A lot. Every day it was a gift. There were some days—thankfully not all that many—where it was the only thing I looked forward to. I know that that was true for others as well” (Sinker “Eulogy”). Judging from searching Twitter retroactively for @Horse_ebooks, the bot meant something, if not much, to other people as well. Still, almost a year after the revelations, people regularly tweet that they miss @Horse_ebooks. For example, Harris tweets messages saying things like: “I’m still bitter about @Horse_ebooks” (12 November 2013) or “Many of us are still angry and hurt about @Horse_ebooks” (27 December 2013). Twitter user @third_dystopia says he feels something is missing from his life, realizing “horse eBooks hasn’t tweeted since September.” Another of the many messages posted in retrospect similarly says: “I want @Horse_ebooks back. Ever since he went silent, Twitter hasn’t been the same for me” (Lockwood). Indeed, Marshall suggests that affect is at “the heart of a wider persona culture” (162). In a Deleuzian understanding of the term, affect refers to the “capacity to affect and be affected” (Steward 2). Borrowing from Marshall, what the @Horse_ebooks case shows is “that there are connections in our culture that are not necessarily coordinated with purposive and rational alignments. They are organised around clusters of sentiment that help situate people on various spectra of activity and engagement” (162). The concept of persona helps to understand how the performance of @Horse_ebooks depends on the audience to “contribute to the illusion by believing in it” (Horton and Wohl 220). “@Horse_ebooks was my monkey” as Sinker says, suggests a fundamental loss. In this case the para-social relation could no longer be sustained, as the illusion of being engaged in a relation with a machine was taken away. The concept of para-social relations helps not only to illuminate the similarities between how people reacted to @Horse_ebooks and the way in which Horton and Wohl described peoples’ reactions to TV personas. It also allows us to see some crucial differences between the ways in which people relate to bots compared to how they relate to a human. For example, rather than an expression of grief at the loss of a social relationship, it could be argued that the responses triggered by the @Horse_ebooks revelations was of a more general loss of belief in the promises of artificial intelligence. To a certain extent, the appeal of @Horse_ebooks was precisely the fact that it was widely believed not to be a person. Whereas TV personas demand an ethical and social commitment on the part of the audience to keep the masquerade of the performer alive, a bot “needs no obliging” (Meyer). Unlike TV personas that depend on an illusory sense of intimacy, bots do “not need an audience” (Meyer). Whether or not people treat bots in the same way as they treat TV personas, Horton and Wohl’s concept of para-social relations ultimately points towards an understanding of the bot persona as “a function of the media themselves” (Horton and Wohl 216). If quizmasters were seen as the “typical and indigenous figures” of mass media in 1956 (Horton and Wohl 216), the bot, I would suggest, constitutes such an “indigenous figure” today. The bot, if not exactly a “new type of performer” (Horton and Wohl 216), is certainly a pervasive “performer”—indeed a persona—on Twitter today. While @Horse_ebooks was somewhat paradoxically revealed as a “performance art” piece (Orlean “Man”), the concept of persona allows us to see the “real” performance of @Horse_ebooks as constituted in the doing of botness. As the responses to @Horse_ebooks show, the concept of persona is not merely tied to beliefs about “what man should appear to be” (Jung 158), but also to ideas about what a bot should appear to be. Moreover, what the curious case of @Horse_ebooks shows, is how bots are not necessarily interpreted and judged by the standards of the original Turing test, that is, how humanlike they are, but according to how well they perform as bots. Indeed, we might ultimately understand the present case as a successful reverse Turing test, highlighting how humans can impersonate a bot so convincingly that it becomes indistinguishable from an actual bot. References Chen, Adrian. “How I Found the Human Being Behind @Horse_ebooks, The Internet's Favorite Spambot.” Gawker 23 Feb. 2012. 20 Apr. 2014 ‹http://gawker.com/5887697/how-i-found-the-human-being-behind-horseebooks-the-internets-favorite-spambot›. Dong, Jianming, Kuldeep Kelkar, and Kelly Braun. “Getting the Most Out of Personas for Product Usability Enhancements.” Usability and Internationalization. HCI and Culture Lecture Notes in Computer Science 4559 (2007): 291-96. Farago, Jason. “Give Me a Break. @Horse_ebooks Isn’t Art.” New Republic 24 Sep. 2013. 2 Apr. 2014 ‹http://www.newrepublic.com/article/114843/horse-ebooks-twitter-hoax-isnt-art›. Gehl, Robert. Reverse Engineering Social Media: Software, Culture, and Political Economy in New Media Capitalism. Temple University Press, 2014. Goffman, Erwin. The Presentation of Self in Everyday Life. New York: Anchor Books, 1959. Harris, Jacob (harrisj). “For a programmer like me who loves whimsical code, it’s a bit like being into computer chess and finding out Deep Blue has a guy inside.” 24 Sep. 2013, 5:03. Tweet. Harris, Jacob (harrisj). “I’m still bitter about ?@Horse_ebooks.” 12 Nov. 2013, 00:15. Tweet. Harris, Jacob (harrisj). “Many of us are still angry and hurt about ?@horse_ebooks.” 27 Dec. 2013, 6:24. Tweet. Hill, Kashmir. “The Invasion of the Twitter Bots.” Forbes 9 Aug. 2012. 13 Mar. 2014 ‹http://www.forbes.com/sites/kashmirhill/2012/08/09/the-invasion-of-the-twitter-bots›. Horton, Donald, and Richard Wohl. “Mass Communication and Para-Social Interaction: Observations on Intimacy at a Distance.” Psychiatry 19 (1956): 215-29. Isaacson, Andy. “Are You Following a Bot? How to Manipulate Social Movements by Hacking Twitter.” The Atlantic 2 Apr. 2011. 13 Mar. 2014 ‹http://www.theatlantic.com/magazine/archive/2011/05/are-you-following-a-bot/308448/›. Jung, Carl. Two Essays on Analytical Psychology, 2nd ed. London: Routledge, 1992. Laboreiro, Gustavo, Luís Sarmento, and Eugénio Oliveira. “Identifying Automatic Posting Systems in Microblogs.” Progress in Artificial Intelligence. Ed. Luis Antunes and H. Sofia Pinto. Berlin: Springer Verlag, 2011. Lee, Kyumin, B. David Eoff, and James Caverlee. “Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter.” Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, 2011. Lockwood, Alex (heislockwood). “I want @Horse_ebooks back. Ever since he went silent, Twitter hasn’t been the same for me.” 7 Jan. 2014, 15:49. Tweet. Love, Dylan. “More than One Third of Web Traffic Is Fake.” Slate 24 Mar. 2014. 20 Apr. 2014 ‹http://www.slate.com/blogs/business_insider/2014/03/24/fake_online_traffic_36_percent_of_all_web_traffic_is_fraudulent.html›. Marshall, P. David. “Persona Studies: Mapping the Proliferation of the Public Self”. Journalism 15.2 (2014): 153–70. Meyer, Robinson. “@Horse_ebooks Is the Most Successful Piece of Cyber Fiction, Ever.” The Atlantic 24 Sep. 2013. 2 Apr. 2014 ‹http://www.theatlantic.com/technology/archive/2013/10/an-amazing-new-twitter-account-that-sort-of-mimics-your-tweets/280400›. Moore, Chris. “Personae or Personas: the Social in Social Media.” Persona Studies 13 Oct. 2011. 20 Apr. 2014 ‹http://www.personastudies.com/2011/10/personae-or-personas-social-in-social.html›. Mowbray, Miranda. “Automated Twitter Accounts.” Twitter and Society. Eds. Katrin Weller, Axel Bruns, Jean Burgess, Merja Mahrt and Cornelius Puschmann. New York: Peter Lang, 2014. 183-94. Orlean, Susan. “Man and Machine: Playing Games on the Internet.” The New Yorker 10 Feb. 2014. 13 Mar. 2014 ‹http://www.newyorker.com/reporting/2014/02/10/140210fa_fact_orlean›. Orlean, Susan. “@Horse_ebooks Is Human after All.” The New Yorker 24 Sep. 2013. 15 Feb. 2013 ‹http://www.newyorker.com/online/blogs/elements/2013/09/horse-ebooks-and-pronunciation-book-revealed.html›. Pearce, Ian, Max Nanis, and Tim Hwang. “PacSocial: Field Test Report.” 15 Nov. 2011. 2 Apr. 2014 ‹http://pacsocial.com/files/pacsocial_field_test_report_2011-11-15.pdf›. Perlroth, Nicole. “Fake Twitter Followers Become Multimillion-Dollar Business.” The New York Times 5 Apr. 2013. 13 Mar. 2014 ‹http://bits.blogs.nytimes.com/2013/04/05/fake-twitter-followers-becomes-multimillion-dollar-business/?_php=true&_type=blogs&_php=true&_type=blogs&_r=1›. Scott, Linda. “The Troupe: Celebrities as Dramatis Personae in Advertisem*nts.” NA: Advances in Consumer Research. Vol. 18. Eds. Rebecca H. Holman and Michael R. Solomon. Provo, UT: Association for Consumer Research, 1991. 355-63. Sinker, Dan. “Eulogy for a Horse.“ dansinker.com 24 Sep. 2013. 22 Apr. 2014 ‹http://web.archive.org/web/20140213003406/http://dansinker.com/post/62183207705/eulogy-for-a-horse›. Sinker, Dan (dansinker). “If I can’t rely on a Twitter bot to actually be a bot. What can I rely on?” 24 Sep. 2013, 4:36. Tweet. Slotkin, Jason. “Twitter ‘Bots’ Steal Tweeters’ Identities.” Marketplace 27 May 2013. 20 Apr. 2014 ‹http://www.marketplace.org/topics/tech/twitter-bots-steal-tweeters-identities›. Stetten, Melissa (MelissaStetten). “Finding out @Horse_ebooks is a Buzzfeed employee’s “performance art” is like Banksy revealing that he’s Jared Leto.” 25 Sep. 2013, 4:39. Tweet. Stewart, Kathleen. Ordinary Affects. Durham: Duke University Press, 2007. Strübel-Scheiner, Jessica. “Gender Performativity and Self-Perception: Drag as Masquerade.” International Journal of Humanities and Social Science 1.13 (2011): 12-19. Turkle, Sherry. Alone Together: Why We Expect More from Technology and Less from Each Other. New York: Basic Books, 2011. Tea Cake (third_dystopia). “I felt like something was missing from my life, and then I realized horse eBooks hasn't tweeted since September.” 9 Jan. 2014, 18:40. Tweet. Turkle, Sherry. Life on the Screen: Identity in the Age of the Internet. New York: Touchstone, 1995. Watson, Sara. “Else 9:30: The “Monkeys with Typewriter” Algorithm.” John Battelle’s searchblog 30 Sep. 2013. 23 Mar. 2014 ‹http://battellemedia.com/archives/2013/09/else-9-30-believing-in-monkeys-with-typewriters-algorithms.php›. Weiss, Astrid, and Manfred Tscheligi.”Rethinking the Human–Agent Relationship: Which Social Cues Do Interactive Agents Really Need to Have?” Believable Bots: Can Computers Play Like People? Ed. Philip Hingston. Berlin: Springer Verlag, 2012. 1-28. Zhao, Shanyang, Sherri Grasmuck, and Jason Martin. “Identity Construction on Facebook: Digital Empowerment in Anchored Relationships.” Computers in Human Behavior 24.5 (2008): 1816-36. Zangerle, Eva, and Günther Specht. “‘Sorry, I Was Hacked’: A Classification of Compromised Twitter Accounts.” Proceedings of ACM Symposium on Applied Computing, Gyeongju, Republic of Korea, 2014.

32

Jones, Steve. "Seeing Sound, Hearing Image." M/C Journal 2, no.4 (June1, 1999). http://dx.doi.org/10.5204/mcj.1763.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

“As the old technologies become automatic and invisible, we find ourselves more concerned with fighting or embracing what’s new”—Dennis Baron, From Pencils to Pixels: The Stage of Literacy Technologies Popular music is firmly rooted within realist practice, or what has been called the "culture of authenticity" associated with modernism. As Lawrence Grossberg notes, the accelleration of the rate of change in modern life caused, in post-war youth culture, an identity crisis or "lived contradiction" that gave rock (particularly) and popular music (generally) a peculiar position in regard to notions of authenticity. Grossberg places rock's authenticity within the "difference" it maintains from other cultural forms, and notes that its difference "can be justified aesthetically or ideologically, or in terms of the social position of the audiences, or by the economics of its production, or through the measure of its popularity or the statement of its politics" (205-6). Popular music scholars have not adequately addressed issues of authenticity and individuality. Two of the most important questions to be asked are: How is authenticity communicated in popular music? What is the site of the interpretation of authenticity? It is important to ask about sound, technology, about the attempt to understand the ideal and the image, the natural and artificial. It is these that make clear the strongest connections between popular music and contemporary culture. Popular music is a particularly appropriate site for the study of authenticity as a cultural category, for several reasons. For one thing, other media do not follow us, as aural media do, into malls, elevators, cars, planes. Nor do they wait for us, as a tape player paused and ready to play. What is important is not that music is "everywhere" but, to borrow from Vivian Sobchack, that it creates a "here" that can be transported anywhere. In fact, we are able to walk around enveloped by a personal aural environment, thanks to a Sony Walkman.1 Also, it is more difficult to shut out the aural than the visual. Closing one's ears does not entirely shut out sound. There is, additionally, the sense that sound and music are interpreted from within, that is, that they resonate through and within the body, and as such engage with one's self in a fashion that coincides with Charles Taylor's claim that the "ideal of authenticity" is an inner-directed one. It must be noted that authenticity is not, however, communicated only via music, but via text and image. Grossberg noted the "primacy of sound" in rock music, and the important link between music, visual image, and authenticity: Visual style as conceived in rock culture is usually the stage for an outrageous and self-conscious inauthenticity... . It was here -- in its visual presentation -- that rock often most explicitly manifested both an ironic resistance to the dominant culture and its sympathies with the business of entertainment ... . The demand for live performance has always expressed the desire for the visual mark (and proof) of authenticity. (208) But that relationship can also be reversed: Music and sound serve in some instances to provide the aural mark and proof of authenticity. Consider, for instance, the "tear" in the voice that Jensen identifies in Hank Williams's singing, and in that of Patsy Cline. For the latter, voicing, in this sense, was particularly important, as it meant more than a singing style, it also involved matters of self-identity, as Jensen appropriately associates with the move of country music from "hometown" to "uptown" (101). Cline's move toward a more "uptown" style involved her visual image, too. At a significant turning point in her career, Faron Young noted, Cline "left that country girl look in those western outfits behind and opted for a slicker appearance in dresses and high fashion gowns" (Jensen 101). Popular music has forged a link with visual media, and in some sense music itself has become more visual (though not necessarily less aural) the more it has engaged with industrial processes in the entertainment industry. For example, engagement with music videos and film soundtracks has made music a part of the larger convergence of mass media forms. Alongside that convergence, the use of music in visual media has come to serve as adjunct to visual symbolisation. One only need observe the increasingly commercial uses to which music is put (as in advertising, film soundtracks and music videos) to note ways in which music serves image. In the literature from a variety of disciplines, including communication, art and music, it has been argued that music videos are the visualisation of music. But in many respects the opposite is true. Music videos are the auralisation of the visual. Music serves many of the same purposes as sound does generally in visual media. One can find a strong argument for the use of sound as supplement to visual media in Silverman's and Altman's work. For Silverman, sound in cinema has largely been overlooked (pun intended) in favor of the visual image, but sound is a more effective (and perhaps necessary) element for willful suspension of disbelief. One may see this as well in the development of Dolby Surround Sound, and in increased emphasis on sound engineering among video and computer game makers, as well as the development of sub-woofers and high-fidelity speakers as computer peripherals. Another way that sound has become more closely associated with the visual is through the ongoing evolution of marketing demands within the popular music industry that increasingly rely on visual media and force image to the front. Internet technologies, particularly the WorldWideWeb (WWW), are also evidence of a merging of the visual and aural (see Hayward). The development of low-cost desktop video equipment and WWW publishing, CD-i, CD-ROM, DVD, and other technologies, has meant that visual images continue to form part of the industrial routine of the music business. The decrease in cost of many of these technologies has also led to the adoption of such routines among individual musicians, small/independent labels, and producers seeking to mimic the resources of major labels (a practice that has become considerably easier via the Internet, as it is difficult to determine capital resources solely from a WWW site). Yet there is another facet to the evolution of the link between the aural and visual. Sound has become more visual by way of its representation during its production (a representation, and process, that has largely been ignored in popular music studies). That representation has to do with the digitisation of sound, and the subsequent transformation sound and music can undergo after being digitised and portrayed on a computer screen. Once digitised, sound can be made visual in any number of ways, through traditional methods like music notation, through representation as audio waveform, by way of MIDI notation, bit streams, or through representation as shapes and colors (as in recent software applications particularly for children, like Making Music by Morton Subotnick). The impetus for these representations comes from the desire for increased control over sound (see Jones, Rock Formation) and such control seems most easily accomplished by way of computers and their concomitant visual technologies (monitors, printers). To make computers useful tools for sound recording it is necessary to employ some form of visual representation for the aural, and the flexibility of modern computers allows for new modes of predominately visual representation. Each of these connections between the aural and visual is in turn related to technology, for as audio technology develops within the entertainment industry it makes sense for synergistic development to occur with visual media technologies. Yet popular music scholars routinely analyse aural and visual media in isolation from one another. The challenge for popular music studies and music philosophy posed by visual media technologies, that they must attend to spatiality and context (both visual and aural), has not been taken up. Until such time as it is, it will be difficult, if not impossible, to engage issues of authenticity, because they will remain rootless instead of situated within the experience of music as fully sensual (in some cases even synaesthetic). Most of the traditional judgments of authenticity among music critics and many popular music scholars involve space and time, the former in terms of the movement of music across cultures and the latter in terms of history. None rely on notions of the "situatedness" of the listener or musicmaker in a particular aural, visual and historical space. Part of the reason for the lack of such an understanding arises from the very means by which popular music is created. We have become accustomed to understanding music as manipulation of sound, and so far as most modern music production is concerned such manipulation occurs as much visually as aurally, by cutting, pasting and otherwise altering audio waveforms on a computer screen. Musicians no more record music than they record fingering; they engage in sound recording. And recording engineers and producers rely less and less on sound and more on sight to determine whether a recording conforms to the demands of digital reproduction.2 Sound, particularly when joined with the visual, becomes a means to build and manipulate the environment, virtual and non-virtual (see Jones, "Sound"). Sound & Music As we construct space through sound, both in terms of audio production (e.g., the use of reverberation devices in recording studios) and in terms of everyday life (e.g., perception of aural stimuli, whether by ear or vibration in the body, from points surrounding us), we centre it within experience. Sound combines the psychological and physiological. Audio engineer George Massenburg noted that in film theaters: You couldn't utilise the full 360-degree sound space for music because there was an "exit sign" phenomena [sic]. If you had a lot of audio going on in the back, people would have a natural inclination to turn around and stare at the back of the room. (Massenburg 79-80) However, he went on to say, beyond observations of such reactions to multichannel sound technology, "we don't know very much". Research in psychoacoustics being used to develop virtual audio systems relies on such reactions and on a notion of human hardwiring for stimulus response (see Jones, "Sense"). But a major stumbling block toward the development of those systems is that none are able to account for individual listeners' perceptions. It is therefore important to consider the individual along with the social dimension in discussions of sound and music. For instance, the term "sound" is deployed in popular music to signify several things, all of which have to do with music or musical performance, but none of which is music. So, for instance, musical groups or performers can have a "sound", but it is distinguishable from what notes they play. Entire music scenes can have "sounds", but the music within such scenes is clearly distinct and differentiated. For the study of popular music this is a significant but often overlooked dimension. As Grossberg argues, "the authenticity of rock was measured by its sound" (207). Visually, he says, popular music is suspect and often inauthentic (sometimes purposefully so), and it is grounded in the aural. Similarly in country music Jensen notes that the "Nashville Sound" continually evoked conflicting definitions among fans and musicians, but that: The music itself was the arena in and through which claims about the Nashville Sound's authenticity were played out. A certain sound (steel guitar, with fiddle) was deemed "hard" or "pure" country, in spite of its own commercial history. (84) One should, therefore, attend to the interpretive acts associated with sound and its meaning. But why has not popular music studies engaged in systematic analysis of sound at the level of the individual as well as the social? As John Shepherd put it, "little cultural theoretical work in music is concerned with music's sounds" ("Value" 174). Why should this be a cause for concern? First, because Shepherd claims that sound is not "meaningful" in the traditional sense. Second, because it leads us to re-examine the question long set to the side in popular music studies: What is music? The structural hom*ology, the connection between meaning and social formation, is a foundation upon which the concept of authenticity in popular music stands. Yet the ability to label a particular piece of music "good" shifts from moment to moment, and place to place. Frith understates the problem when he writes that "it is difficult ... to say how musical texts mean or represent something, and it is difficult to isolate structures of musical creation or control" (56). Shepherd attempts to overcome this difficulty by emphasising that: Music is a social medium in sound. What [this] means ... is that the sounds of music provide constantly moving and complex matrices of sounds in which individuals may invest their own meanings ... [however] while the matrices of sounds which seemingly constitute an individual "piece" of music can accommodate a range of meanings, and thereby allow for negotiability of meaning, they cannot accommodate all possible meanings. (Shepherd, "Art") It must be acknowledged that authenticity is constructed, and that in itself is an argument against the most common way to think of authenticity. If authenticity implies something about the "pure" state of an object or symbol then surely such a state is connected to some "objective" rendering, one not possible according to Shepherd's claims. In some sense, then, authenticity is autonomous, its materialisation springs not from any necessary connection to sound, image, text, but from individual acts of interpretation, typically within what in literary criticism has come to be known as "interpretive communities". It is not hard to illustrate the point by generalising and observing that rock's notion of authenticity is captured in terms of songwriting, but that songwriters are typically identified with places (e.g. Tin Pan Alley, the Brill Building, Liverpool, etc.). In this way there is an obvious connection between authenticity and authorship (see Jones, "Popular Music Studies") and geography (as well in terms of musical "scenes", e.g. the "Philly Sound", the "Sun Sound", etc.). The important thing to note is the resultant connection between the symbolic and the physical worlds rooted (pun intended) in geography. As Redhead & Street put it: The idea of "roots" refers to a number of aspects of the musical process. There is the audience in which the musician's career is rooted ... . Another notion of roots refers to music. Here the idea is that the sounds and the style of the music should continue to resemble the source from which it sprang ... . The issue ... can be detected in the argument of those who raise doubts about the use of musical high-technology by African artists. A final version of roots applies to the artist's sociological origins. (180) It is important, consequently, to note that new technologies, particularly ones associated with the distribution of music, are of increasing importance in regulating the tension between alienation and progress mentioned earlier, as they are technologies not simply of musical production and consumption, but of geography. That the tension they mediate is most readily apparent in legal skirmishes during an unsettled era for copyright law (see Brown) should not distract scholars from understanding their cultural significance. These technologies are, on the one hand, "liberating" (see Hayward, Young, and Marsh) insofar as they permit greater geographical "reach" and thus greater marketing opportunities (see Fromartz), but on the other hand they permit less commercial control, insofar as they permit digitised music to freely circulate without restriction or compensation, to the chagrin of copyright enthusiasts. They also create opportunities for musical collaboration (see Hayward) between performers in different zones of time and space, on a scale unmatched since the development of multitracking enabled the layering of sound. Most importantly, these technologies open spaces for the construction of authenticity that have hitherto been unavailable, particularly across distances that have largely separated cultures and fan communities (see Paul). The technologies of Internetworking provide yet another way to make connections between authenticity, music and sound. Community and locality (as Redhead & Street, as well as others like Sara Cohen and Ruth Finnegan, note) are the elements used by audience and artist alike to understand the authenticity of a performer or performance. The lived experience of an artist, in a particular nexus of time and space, is to be somehow communicated via music and interpreted "properly" by an audience. But technologies of Internetworking permit the construction of alternative spaces, times and identities. In no small way that has also been the situation with the mediation of music via most recordings. They are constructed with a sense of space, consumed within particular spaces, at particular times, in individual, most often private, settings. What the network technologies have wrought is a networked audience for music that is linked globally but rooted in the local. To put it another way, the range of possibilities when it comes to interpretive communities has widened, but the experience of music has not significantly shifted, that is, the listener experiences music individually, and locally. Musical activity, whether it is defined as cultural or commercial practice, is neither flat nor autonomous. It is marked by ever-changing tastes (hence not flat) but within an interpretive structure (via "interpretive communities"). Musical activity must be understood within the nexus of the complex relations between technical, commercial and cultural processes. As Jensen put it in her analysis of Patsy Cline's career: Those who write about culture production can treat it as a mechanical process, a strategic construction of material within technical or institutional systems, logical, rational, and calculated. But Patsy Cline's recording career shows, among other things, how this commodity production view must be linked to an understanding of culture as meaning something -- as defining, connecting, expressing, mattering to those who participate with it. (101) To achieve that type of understanding will require that popular music scholars understand authenticity and music in a symbolic realm. Rather than conceiving of authenticity as a limited resource (that is, there is only so much that is "pure" that can go around), it is important to foreground its symbolic and ever-changing character. Put another way, authenticity is not used by musician or audience simply to label something as such, but rather to mean something about music that matters at that moment. Authenticity therefore does not somehow "slip away", nor does a "pure" authentic exist. Authenticity in this regard is, as Baudrillard explains concerning mechanical reproduction, "conceived according to (its) very reproducibility ... there are models from which all forms proceed according to modulated differences" (56). Popular music scholars must carefully assess the affective dimensions of fans, musicians, and also record company executives, recording producers, and so on, to be sensitive to the deeply rooted construction of authenticity and authentic experience throughout musical processes. Only then will there emerge an understanding of the structures of feeling that are central to the experience of music. Footnotes For analyses of the Walkman's role in social settings and popular music consumption see du Gay; Hosokawa; and Chen. It has been thus since the advent of disc recording, when engineers would watch a record's grooves through a microscope lens as it was being cut to ensure grooves would not cross over one into another. References Altman, Rick. "Television/Sound." Studies in Entertainment. Ed. Tania Modleski. Bloomington: Indiana UP, 1986. 39-54. Baudrillard, Jean. Symbolic Death and Exchange. London: Sage, 1993. Brown, Ronald. Intellectual Property and the National Information Infrastructure: The Report of the Working Group on Intellectual Property Rights. Washington, DC: U.S. Department of Commerce, 1995. Chen, Shing-Ling. "Electronic Narcissism: College Students' Experiences of Walkman Listening." Annual meeting of the International Communication Association. Washington, D.C. 1993. Du Gay, Paul, et al. Doing Cultural Studies. London: Sage, 1997. Frith, Simon. Sound Effects. New York: Pantheon, 1981. Fromartz, Steven. "Starts-ups Sell Garage Bands, Bowie on Web." Reuters newswire, 4 Dec. 1996. Grossberg, Lawrence. We Gotta Get Out of This Place. London: Routledge, 1992. Hayward, Philip. "Enterprise on the New Frontier." Convergence 1.2 (Winter 1995): 29-44. Hosokawa, Shuhei. "The Walkman Effect." Popular Music 4 (1984). Jensen, Joli. The Nashville Sound: Authenticity, Commercialisation and Country Music. Nashville, Vanderbilt UP, 1998. Jones, Steve. Rock Formation: Music, Technology and Mass Communication. Newbury Park, CA: Sage, 1992. ---. "Popular Music Studies and Critical Legal Studies" Stanford Humanities Review 3.2 (Fall 1993): 77-90. ---. "A Sense of Space: Virtual Reality, Authenticity and the Aural." Critical Studies in Mass Communication 10.3 (Sep. 1993), 238-52. ---. "Sound, Space & Digitisation." Media Information Australia 67 (Feb. 1993): 83-91. Marrsh, Brian. "Musicians Adopt Technology to Market Their Skills." Wall Street Journal 14 Oct. 1994: C2. Massenburg, George. "Recording the Future." EQ (Apr. 1997): 79-80. Paul, Frank. "R&B: Soul Music Fans Make Cyberspace Their Meeting Place." Reuters newswire, 11 July 1996. Redhead, Steve, and John Street. "Have I the Right? Legitimacy, Authenticity and Community in Folk's Politics." Popular Music 8.2 (1989). Shepherd, John. "Art, Culture and Interdisciplinarity." Davidson Dunston Research Lecture. Carleton University, Canada. 3 May 1992. ---. "Value and Power in Music." The Sound of Music: Meaning and Power in Culture. Eds. John Shepherd and Peter Wicke. Cambridge: Polity, 1993. Silverman, Kaja. The Acoustic Mirror. Bloomington: Indiana UP, 1988. Sobchack, Vivian. Screening Space. New York: Ungar, 1982. Young, Charles. "Aussie Artists Use Internet and Bootleg CDs to Protect Rights." Pro Sound News July 1995. Citation reference for this article MLA style: Steve Jones. "Seeing Sound, Hearing Image: 'Remixing' Authenticity in Popular Music Studies." M/C: A Journal of Media and Culture 2.4 (1999). [your date of access] <http://www.uq.edu.au/mc/9906/remix.php>. Chicago style: Steve Jones, "Seeing Sound, Hearing Image: 'Remixing' Authenticity in Popular Music Studies," M/C: A Journal of Media and Culture 2, no. 4 (1999), <http://www.uq.edu.au/mc/9906/remix.php> ([your date of access]). APA style: Steve Jones. (1999) Seeing Sound, Hearing Image: "Remixing" Authenticity in Popular Music Studies. M/C: A Journal of Media and Culture 2(4). <http://www.uq.edu.au/mc/9906/remix.php> ([your date of access]).

33

Lukas,ScottA. "Nevermoreprint." M/C Journal 8, no.2 (June1, 2005). http://dx.doi.org/10.5204/mcj.2336.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Perhaps the supreme quality of print is one that is lost on us, since it has so casual and obvious an existence (McLuhan 160). Print Machine (Thad Donovan, 1995) In the introduction to his book on 9/11, Welcome to the Desert of the Real, Slavoj Zizek uses an analogy of letter writing to emphasize the contingency of post-9/11 reality. In the example, Zizek discusses the efforts of writers to escape the eyes of governmental censors and a system that used blue ink to indicate a message was true, red ink to indicate it was false. The story ends with an individual receiving a letter from the censored country stating that the writer could not find any red ink. The ambiguity and the duplicity of writing, suggested in Zizek’s tale of colored inks, is a condition of the contemporary world, even if we are unaware of it. We exist in an age in which print—the economization of writing—has an increasingly significant and precarious role in our lives. We turn to the Internet chat room for textual interventions in our sexual, political and aesthetic lives. We burn satanic Harry Potter books and issue fatwas against writers like Salman Rushdie. We narrate our lives using pictures, fonts of varying typeface and color, and sound on our personalized homepages. We throw out our printed books and buy audio ones so we can listen to our favorite authors in the car. We place trust of our life savings, personal numbers, and digital identity in the hands of unseen individuals behind computer screens. Decisively, we are a print people, but our very nature of being dependent on the technologies of print in our public and private lives leads to our inability to consider the epistemological, social and existential effects of print on us. In this article, I focus on the current manifestations of print—what I call “newprint”—including their relationships to consumerism, identity formation and the politics of the state. I will then consider the democratic possibilities of print, suggested by the personalization of print through the Internet and home publishing, and conclude with the implications of the end of print that include the possibility of a post-print language and the middle voice. In order to understand the significance of our current print culture, it is important to situate print in the context of the history of communication. In earlier times, writing had magical associations (Harris 10), and commonly these underpinnings led to the stratification of communities. Writing functioned as a type of black box, “the mysterious technology by which any message [could] be concealed from its illiterate bearer” (Harris 16). Plato and Socrates warned against the negative effects of writing on the mind, including the erosion of memory (Ong 81). Though it once supplemented the communicational bases of orality, the written word soon supplanted it and created a dramatic existential shift in people—a separation of “the knower from the known” (Ong 43-44). As writing moved from the inconvenience of illuminated manuscripts and hand-copied texts, it became systemized in Gutenberg print, and writing then took on the signature of the state—messages between people were codified in the technology of print. With the advent of computer technologies in the 1990s, including personal computers, word processing programs, printers, and the Internet, the age of newprint begins. Newprint includes the electronic language of the Internet and other examples of the public alphabet, including billboards, signage and the language of advertising. As much as members of consumer society are led to believe that newprint is the harbinger of positive identity construction and individualism, closer analysis of the mechanisms of newprint leads to a different conclusion. An important context of new print is found in the space of the home computer. The home computer is the workstation of the contemporary discursive culture—people send and receive emails, do their shopping on the Internet, meet friends and even spouses through dating services, conceal their identity on MUDs and MOOs, and produce state-of-the-art publishing projects, even books. The ubiquity of print in the space of the personal computer leads to the vital illusion that this newprint is emancipatory. Some theorists have argued that the Internet exhibits the spirit of communicative action addressed by Juergen Habermas, but such thinkers have neglected the fact that the foundations of newprint, just like those of Gutenberg print, are the state and the corporation. Recent advertising of Hewlett-Packard and other computer companies illustrates this point. One advertisem*nt suggested that consumers could “invent themselves” through HP computer and printer technology: by using the varied media available to them, consumers can make everything from personalized greeting cards to full-fledged books. As Friedrich Kittler illustrates, we should resist the urge to separate the practices of writing from the technologies of their production, what Jay David Bolter (41) denotes as the “writing space”. For as much as we long for new means of democratic and individualistic expression, we should not succumb to the urge to accept newprint because of its immediacy, novelty or efficiency. Doing so will relegate us to a mechanistic existence, what is referenced metaphorically in Thad Donovan’s “print machine.” In multiple contexts, newprint extends the corporate state’s propaganda industry by turning the written word into artifice. Even before newprint, the individual was confronted with the hegemony of writing. Writing creates “context-free language” or “autonomous discourse,” which means an individual cannot directly confront the language or speaker as one could in oral cultures (Ong 78). This further division of the individual from the communicational world is emphasized in newprint’s focus on the aesthetics of the typeface. In word processing programs like Microsoft Word, and specialized ones like TwistType, the consumer can take a word or a sentence and transform it into an aesthetic formation. On the word processing program that is producing this text, I can choose from Blinking Background, Las Vegas Lights, Marching Red or Black Ants, Shimmer, and Sparkle Text. On my campus email system I am confronted with pictorial backgrounds, font selection and animation as an intimate aspect of the communicational system of my college. On my cell phone I can receive text messages, and I can choose to use emoticons (iconic characters and messages) on the Internet. As Walter Ong wrote, “print situates words in space more relentlessly than writing ever did … control of position is everything in print” (Ong 121). In the case of the new culture of print, the control over more functions of the printed page, specifically its presentation, leads some consumers to believe that choice and individuality are the outcomes. Newprint does not free the writer from the constraints imposed by the means of traditional print—the printing press—rather, it furthers them as the individual operates by the logos of a predetermined and programmed electronic print. The capacity to spell and write grammatically correct sentences is abated by the availability of spell- and grammar-checking functions in word processing software. In many ways, the aura of writing is lost in newprint in the same way in which art lost its organic nature as it moved into the age of reproducibility (Benjamin). Just as filters in imaging programs like Photoshop reduce the aesthetic functions of the user to the determinations of the software programmer, the use of automated print technologies—whether spell-checking or fanciful page layout software like QuarkXpress or Page Maker—will further dilute the voice of the writer. Additionally, the new forms of print can lead to a fracturing of community, the opposite intent of Habermas’ communicative action. An example is the recent growth of specialized languages on the Internet. Some of the newer forms of such languages use combinations of alphanumeric characters to create a language that can only be read by those with the code. As Internet print becomes more specialized, a tribal effect may be felt within our communities. Since email began a few years ago, I have noticed that the nature of the emails I receive has been dramatically altered. Today’s emails tend to be short and commonly include short hands (“LOL” = “laugh out loud”), including the elimination of capitalization and punctuation. In surveying students on the reasons behind such alterations of language in email, I am told that these short hands allow for more efficient forms of communication. In my mind, this is the key issue that is at stake in both print and newprint culture—for as long as we rely on print and other communicational systems as a form of efficiency, we are doomed to send and receive inaccurate and potentially dangerous messages. Benedict Anderson and Hannah Arendt addressed the connections of print to nationalistic and fascist urges (Anderson; Arendt), and such tendencies are seen in the post-9/11 discursive formations within the United States. Bumper stickers and Presidential addresses conveyed the same simplistic printed messages: “Either You are with Us or You are with the Terrorists.” Whether dropping leaflets from airplanes or in scrolling text messages on the bottom of the television news screen, the state is dependent on the efficiency of print to maintain control of the citizen. A feature of this efficiency is that newprint be rhetorically immediate in its results, widely available in different forms of technology, and dominated by the notion of individuality and democracy that is envisioned in HP’s “invent yourself” advertsiements. As Marshall McLuhan’s epigram suggests, we have an ambiguous relationship to print. We depend on printed language in our daily lives, for education and for the economic transactions that underpin our consumer world, yet we are unable to confront the rhetoric of the state and mass media that are consequences of the immediacy and magic of both print and new print. Print extends the domination of our consciousness by forms of discourse that privilege representation over experience and the subject over the object. As we look to new means of communicating with one another and of expressing our intimate lives, we must consider altering the discursive foundations of our communication, such as looking to the middle voice. The middle voice erases the distinctions between subjects and objects and instead emphasizes the writer being in the midst of things, as a part of the world as opposed to dominating it (Barthes; Tyler). A few months prior to writing this article, I spent the fall quarter teaching in London. One day I received an email that changed my life. My partner of nearly six years announced that she was leaving me. I was gripped with the fact of my being unable to discuss the situation with her as we were thousands of miles apart and I struggled to understand how such a significant and personal circ*mstance could be communicated with the printed word of email. Welcome to new print! References Anderson, Benedict. Imagined Communities: Reflections on the Origin and Spread of Nationalism. London: Verso, 1991. Arendt, Hannah. The Origins of Totalitarianism. San Diego: Harcourt Brace, 1976. Barthes, Roland. “To Write: An Intransitive Verb?” The Languages of Criticism and the Sciences of Man: The Structuralist Controversy. Ed. Richard Macksey and Eugenio Donato. Baltimore: Johns Hopkins UP, 1970. 134-56. Benjamin, Walter. “The Work of Art in the Age of Its Technological Reproducibility: Second Version.” Walter Benjamin: Selected Writings, Volume 3: 1935-1938. Cambridge: Belknap/Harvard, 2002. Bolter, Jay David. Writing Space: The Computer, Hypertext, and the History of Writing. Hillsdale, NJ: Lawrence Erlbaum, 1991. Habermas, Jürgen. The Theory of Communicative Action. Vol. I. Boston: Beacon Press, 1985. Harris, Roy. The Origin of Writing. La Salle, IL: Open Court, 1986. Kittler, Friedrich A. Discourse Networks 1800/1900. Stanford: Stanford UP, 1990. McLuhan, Marshall. Understanding Media: The Extensions of Man. Cambridge: MIT P, 1994. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London: Routledge, 1991. Tyler, Stephen A. “The Middle Voice: The Influence of Post-Modernism on Empirical Research in Anthropology.” Post-modernism and Anthropology. Eds. K. Geuijen, D. Raven, and J. de Wolf. Assen, The Neatherlands: Van Gorcum, 1995. Zizek, Slavoj. Welcome to the Desert of the Real. London: Verso, 2002. Citation reference for this article MLA Style Lukas, Scott A. "Nevermoreprint." M/C Journal 8.2 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0506/04-lukas.php>. APA Style Lukas, S. (Jun. 2005) "Nevermoreprint," M/C Journal, 8(2). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0506/04-lukas.php>.

34

Cinque, Toija. "A Study in Anxiety of the Dark." M/C Journal 24, no.2 (April27, 2021). http://dx.doi.org/10.5204/mcj.2759.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction This article is a study in anxiety with regard to social online spaces (SOS) conceived of as dark. There are two possible ways to define ‘dark’ in this context. The first is that communication is dark because it either has limited distribution, is not open to all users (closed groups are a case example) or hidden. The second definition, linked as a result of the first, is the way that communication via these means is interpreted and understood. Dark social spaces disrupt the accepted top-down flow by the ‘gazing elite’ (data aggregators including social media), but anxious users might need to strain to notice what is out there, and this in turn destabilises one’s reception of the scene. In an environment where surveillance technologies are proliferating, this article examines contemporary, dark, interconnected, and interactive communications for the entangled affordances that might be brought to bear. A provocation is that resistance through counterveillance or “sousveillance” is one possibility. An alternative (or addition) is retreating to or building ‘dark’ spaces that are less surveilled and (perhaps counterintuitively) less fearful. This article considers critically the notion of dark social online spaces via four broad socio-technical concerns connected to the big social media services that have helped increase a tendency for fearful anxiety produced by surveillance and the perceived implications for personal privacy. It also shines light on the aspect of darkness where some users are spurred to actively seek alternative, dark social online spaces. Since the 1970s, public-key cryptosystems typically preserved security for websites, emails, and sensitive health, government, and military data, but this is now reduced (Williams). We have seen such systems exploited via cyberattacks and misappropriated data acquired by affiliations such as Facebook-Cambridge Analytica for targeted political advertising during the 2016 US elections. Via the notion of “parasitic strategies”, such events can be described as news/information hacks “whose attack vectors target a system’s weak points with the help of specific strategies” (von Nordheim and Kleinen-von Königslöw, 88). In accord with Wilson and Serisier’s arguments (178), emerging technologies facilitate rapid data sharing, collection, storage, and processing wherein subsequent “outcomes are unpredictable”. This would also include the effect of acquiescence. In regard to our digital devices, for some, being watched overtly—through cameras encased in toys, computers, and closed-circuit television (CCTV) to digital street ads that determine the resonance of human emotions in public places including bus stops, malls, and train stations—is becoming normalised (McStay, Emotional AI). It might appear that consumers immersed within this Internet of Things (IoT) are themselves comfortable interacting with devices that record sound and capture images for easy analysis and distribution across the communications networks. A counter-claim is that mainstream social media corporations have cultivated a sense of digital resignation “produced when people desire to control the information digital entities have about them but feel unable to do so” (Draper and Turow, 1824). Careful consumers’ trust in mainstream media is waning, with readers observing a strong presence of big media players in the industry and are carefully picking their publications and public intellectuals to follow (Mahmood, 6). A number now also avoid the mainstream internet in favour of alternate dark sites. This is done by users with “varying backgrounds, motivations and participation behaviours that may be idiosyncratic (as they are rooted in the respective person’s biography and circ*mstance)” (Quandt, 42). By way of connection with dark internet studies via Biddle et al. (1; see also Lasica), the “darknet” is a collection of networks and technologies used to share digital content … not a separate physical network but an application and protocol layer riding on existing networks. Examples of darknets are peer-to-peer file sharing, CD and DVD copying, and key or password sharing on email and newsgroups. As we note from the quote above, the “dark web” uses existing public and private networks that facilitate communication via the Internet. Gehl (1220; see also Gehl and McKelvey) has detailed that this includes “hidden sites that end in ‘.onion’ or ‘.i2p’ or other Top-Level Domain names only available through modified browsers or special software. Accessing I2P sites requires a special routing program ... . Accessing .onion sites requires Tor [The Onion Router]”. For some, this gives rise to social anxiety, read here as stemming from that which is not known, and an exaggerated sense of danger, which makes fight or flight seem the only options. This is often justified or exacerbated by the changing media and communication landscape and depicted in popular documentaries such as The Social Dilemma or The Great Hack, which affect public opinion on the unknown aspects of internet spaces and the uses of personal data. The question for this article remains whether the fear of the dark is justified. Consider that most often one will choose to make one’s intimate bedroom space dark in order to have a good night’s rest. We might pleasurably escape into a cinema’s darkness for the stories told therein, or walk along a beach at night enjoying unseen breezes. Most do not avoid these experiences, choosing to actively seek them out. Drawing this thread, then, is the case made here that agency can also be found in the dark by resisting socio-political structural harms. 1. Digital Futures and Anxiety of the Dark Fear of the darkI have a constant fear that something's always nearFear of the darkFear of the darkI have a phobia that someone's always there In the lyrics to the song “Fear of the Dark” (1992) by British heavy metal group Iron Maiden is a sense that that which is unknown and unseen causes fear and anxiety. Holding a fear of the dark is not unusual and varies in degree for adults as it does for children (Fellous and Arbib). Such anxiety connected to the dark does not always concern darkness itself. It can also be a concern for the possible or imagined dangers that are concealed by the darkness itself as a result of cognitive-emotional interactions (McDonald, 16). Extending this claim is this article’s non-binary assertion that while for some technology and what it can do is frequently misunderstood and shunned as a result, for others who embrace the possibilities and actively take it on it is learning by attentively partaking. Mistakes, solecism, and frustrations are part of the process. Such conceptual theorising falls along a continuum of thinking. Global interconnectivity of communications networks has certainly led to consequent concerns (Turkle Alone Together). Much focus for anxiety has been on the impact upon social and individual inner lives, levels of media concentration, and power over and commercialisation of the internet. Of specific note is that increasing commercial media influence—such as Facebook and its acquisition of WhatsApp, Oculus VR, Instagram, CRTL-labs (translating movements and neural impulses into digital signals), LiveRail (video advertising technology), Chainspace (Blockchain)—regularly changes the overall dynamics of the online environment (Turow and Kavanaugh). This provocation was born out recently when Facebook disrupted the delivery of news to Australian audiences via its service. Mainstream social online spaces (SOS) are platforms which provide more than the delivery of media alone and have been conceptualised predominantly in a binary light. On the one hand, they can be depicted as tools for the common good of society through notional widespread access and as places for civic participation and discussion, identity expression, education, and community formation (Turkle; Bruns; Cinque and Brown; Jenkins). This end of the continuum of thinking about SOS seems set hard against the view that SOS are operating as businesses with strategies that manipulate consumers to generate revenue through advertising, data, venture capital for advanced research and development, and company profit, on the other hand. In between the two polar ends of this continuum are the range of other possibilities, the shades of grey, that add contemporary nuance to understanding SOS in regard to what they facilitate, what the various implications might be, and for whom. By way of a brief summary, anxiety of the dark is steeped in the practices of privacy-invasive social media giants such as Facebook and its ancillary companies. Second are the advertising technology companies, surveillance contractors, and intelligence agencies that collect and monitor our actions and related data; as well as the increased ease of use and interoperability brought about by Web 2.0 that has seen a disconnection between technological infrastructure and social connection that acts to limit user permissions and online affordances. Third are concerns for the negative effects associated with depressed mental health and wellbeing caused by “psychologically damaging social networks”, through sleep loss, anxiety, poor body image, real world relationships, and the fear of missing out (FOMO; Royal Society for Public Health (UK) and the Young Health Movement). Here the harms are both individual and societal. Fourth is the intended acceleration toward post-quantum IoT (Fernández-Caramés), as quantum computing’s digital components are continually being miniaturised. This is coupled with advances in electrical battery capacity and interconnected telecommunications infrastructures. The result of such is that the ontogenetic capacity of the powerfully advanced network/s affords supralevel surveillance. What this means is that through devices and the services that they provide, individuals’ data is commodified (Neff and Nafus; Nissenbaum and Patterson). Personal data is enmeshed in ‘things’ requiring that the decisions that are both overt, subtle, and/or hidden (dark) are scrutinised for the various ways they shape social norms and create consequences for public discourse, cultural production, and the fabric of society (Gillespie). Data and personal information are retrievable from devices, sharable in SOS, and potentially exposed across networks. For these reasons, some have chosen to go dark by being “off the grid”, judiciously selecting their means of communications and their ‘friends’ carefully. 2. Is There Room for Privacy Any More When Everyone in SOS Is Watching? An interesting turn comes through counterarguments against overarching institutional surveillance that underscore the uses of technologies to watch the watchers. This involves a practice of counter-surveillance whereby technologies are tools of resistance to go ‘dark’ and are used by political activists in protest situations for both communication and avoiding surveillance. This is not new and has long existed in an increasingly dispersed media landscape (Cinque, Changing Media Landscapes). For example, counter-surveillance video footage has been accessed and made available via live-streaming channels, with commentary in SOS augmenting networking possibilities for niche interest groups or micropublics (Wilson and Serisier, 178). A further example is the Wordpress site Fitwatch, appealing for an end to what the site claims are issues associated with police surveillance (fitwatch.org.uk and endpolicesurveillance.wordpress.com). Users of these sites are called to post police officers’ identity numbers and photographs in an attempt to identify “cops” that might act to “misuse” UK Anti-terrorism legislation against activists during legitimate protests. Others that might be interested in doing their own “monitoring” are invited to reach out to identified personal email addresses or other private (dark) messaging software and application services such as Telegram (freeware and cross-platform). In their work on surveillance, Mann and Ferenbok (18) propose that there is an increase in “complex constructs between power and the practices of seeing, looking, and watching/sensing in a networked culture mediated by mobile/portable/wearable computing devices and technologies”. By way of critical definition, Mann and Ferenbok (25) clarify that “where the viewer is in a position of power over the subject, this is considered surveillance, but where the viewer is in a lower position of power, this is considered sousveillance”. It is the aspect of sousveillance that is empowering to those using dark SOS. One might consider that not all surveillance is “bad” nor institutionalised. It is neither overtly nor formally regulated—as yet. Like most technologies, many of the surveillant technologies are value-neutral until applied towards specific uses, according to Mann and Ferenbok (18). But this is part of the ‘grey area’ for understanding the impact of dark SOS in regard to which actors or what nations are developing tools for surveillance, where access and control lies, and with what effects into the future. 3. Big Brother Watches, So What Are the Alternatives: Whither the Gazing Elite in Dark SOS? By way of conceptual genealogy, consideration of contemporary perceptions of surveillance in a visually networked society (Cinque, Changing Media Landscapes) might be usefully explored through a revisitation of Jeremy Bentham’s panopticon, applied here as a metaphor for contemporary surveillance. Arguably, this is a foundational theoretical model for integrated methods of social control (Foucault, Surveiller et Punir, 192-211), realised in the “panopticon” (prison) in 1787 by Jeremy Bentham (Bentham and Božovič, 29-95) during a period of social reformation aimed at the improvement of the individual. Like the power for social control over the incarcerated in a panopticon, police power, in order that it be effectively exercised, “had to be given the instrument of permanent, exhaustive, omnipresent surveillance, capable of making all visible … like a faceless gaze that transformed the whole social body into a field of perception” (Foucault, Surveiller et Punir, 213–4). In grappling with the impact of SOS for the individual and the collective in post-digital times, we can trace out these early ruminations on the complex documentary organisation through state-controlled apparatuses (such as inspectors and paid observers including “secret agents”) via Foucault (Surveiller et Punir, 214; Subject and Power, 326-7) for comparison to commercial operators like Facebook. Today, artificial intelligence (AI), facial recognition technology (FRT), and closed-circuit television (CCTV) for video surveillance are used for social control of appropriate behaviours. Exemplified by governments and the private sector is the use of combined technologies to maintain social order, from ensuring citizens cross the street only on green lights, to putting rubbish in the correct recycling bin or be publicly shamed, to making cashless payments in stores. The actions see advantages for individual and collective safety, sustainability, and convenience, but also register forms of behaviour and attitudes with predictive capacities. This gives rise to suspicions about a permanent account of individuals’ behaviour over time. Returning to Foucault (Surveiller et Punir, 135), the impact of this finds a dissociation of power from the individual, whereby they become unwittingly impelled into pre-existing social structures, leading to a ‘normalisation’ and acceptance of such systems. If we are talking about the dark, anxiety is key for a Ministry of SOS. Following Foucault again (Subject and Power, 326-7), there is the potential for a crawling, creeping governance that was once distinct but is itself increasingly hidden and growing. A blanket call for some form of ongoing scrutiny of such proliferating powers might be warranted, but with it comes regulation that, while offering certain rights and protections, is not without consequences. For their part, a number of SOS platforms had little to no moderation for explicit content prior to December 2018, and in terms of power, notwithstanding important anxiety connected to arguments that children and the vulnerable need protections from those that would seek to take advantage, this was a crucial aspect of community building and self-expression that resulted in this freedom of expression. In unearthing the extent that individuals are empowered arising from the capacity to post sexual self-images, Tiidenberg ("Bringing Sexy Back") considered that through dark SOS (read here as unregulated) some users could work in opposition to the mainstream consumer culture that provides select and limited representations of bodies and their sexualities. This links directly to Mondin’s exploration of the abundance of queer and feminist p*rnography on dark SOS as a “counterpolitics of visibility” (288). This work resulted in a reasoned claim that the technological structure of dark SOS created a highly political and affective social space that users valued. What also needs to be underscored is that many users also believed that such a space could not be replicated on other mainstream SOS because of the differences in architecture and social norms. Cho (47) worked with this theory to claim that dark SOS are modern-day examples in a history of queer individuals having to rely on “underground economies of expression and relation”. Discussions such as these complicate what dark SOS might now become in the face of ‘adult’ content moderation and emerging tracking technologies to close sites or locate individuals that transgress social norms. Further, broader questions are raised about how content moderation fits in with the public space conceptualisations of SOS more generally. Increasingly, “there is an app for that” where being able to identify the poster of an image or an author of an unknown text is seen as crucial. While there is presently no standard approach, models for combining instance-based and profile-based features such as SVM for determining authorship attribution are in development, with the result that potentially far less content will remain hidden in the future (Bacciu et al.). 4. There’s Nothing New under the Sun (Ecclesiastes 1:9) For some, “[the] high hopes regarding the positive impact of the Internet and digital participation in civic society have faded” (Schwarzenegger, 99). My participant observation over some years in various SOS, however, finds that critical concern has always existed. Views move along the spectrum of thinking from deep scepticisms (Stoll, Silicon Snake Oil) to wondrous techo-utopian promises (Negroponte, Being Digital). Indeed, concerns about the (then) new technologies of wireless broadcasting can be compared with today’s anxiety over the possible effects of the internet and SOS. Inglis (7) recalls, here, too, were fears that humanity was tampering with some dangerous force; might wireless wave be causing thunderstorms, droughts, floods? Sterility or strokes? Such anxieties soon evaporated; but a sense of mystery might stay longer with evangelists for broadcasting than with a laity who soon took wireless for granted and settled down to enjoy the products of a process they need not understand. As the analogy above makes clear, just as audiences came to use ‘the wireless’ and later the internet regularly, it is reasonable to argue that dark SOS will also gain widespread understanding and find greater acceptance. Dark social spaces are simply the recent development of internet connectivity and communication more broadly. The dark SOS afford choice to be connected beyond mainstream offerings, which some users avoid for their perceived manipulation of content and user both. As part of the wider array of dark web services, the resilience of dark social spaces is reinforced by the proliferation of users as opposed to decentralised replication. Virtual Private Networks (VPNs) can be used for anonymity in parallel to TOR access, but they guarantee only anonymity to the client. A VPN cannot guarantee anonymity to the server or the internet service provider (ISP). While users may use pseudonyms rather than actual names as seen on Facebook and other SOS, users continue to take to the virtual spaces they inhabit their off-line, ‘real’ foibles, problems, and idiosyncrasies (Chenault). To varying degrees, however, people also take their best intentions to their interactions in the dark. The hyper-efficient tools now deployed can intensify this, which is the great advantage attracting some users. In balance, however, in regard to online information access and dissemination, critical examination of what is in the public’s interest, and whether content should be regulated or controlled versus allowing a free flow of information where users self-regulate their online behaviour, is fraught. O’Loughlin (604) was one of the first to claim that there will be voluntary loss through negative liberty or freedom from (freedom from unwanted information or influence) and an increase in positive liberty or freedom to (freedom to read or say anything); hence, freedom from surveillance and interference is a kind of negative liberty, consistent with both libertarianism and liberalism. Conclusion The early adopters of initial iterations of SOS were hopeful and liberal (utopian) in their beliefs about universality and ‘free’ spaces of open communication between like-minded others. This was a way of virtual networking using a visual motivation (led by images, text, and sounds) for consequent interaction with others (Cinque, Visual Networking). The structural transformation of the public sphere in a Habermasian sense—and now found in SOS and their darker, hidden or closed social spaces that might ensure a counterbalance to the power of those with influence—towards all having equal access to platforms for presenting their views, and doing so respectfully, is as ever problematised. Broadly, this is no more so, however, than for mainstream SOS or for communicating in the world. References Bacciu, Andrea, Massimo La Morgia, Alessandro Mei, Eugenio Nerio Nemmi, Valerio Neri, and Julinda Stefa. “Cross-Domain Authorship Attribution Combining Instance Based and Profile-Based Features.” CLEF (Working Notes). Lugano, Switzerland, 9-12 Sep. 2019. Bentham, Jeremy, and Miran Božovič. The Panopticon Writings. London: Verso Trade, 1995. Biddle, Peter, et al. “The Darknet and the Future of Content Distribution.” Proceedings of the 2002 ACM Workshop on Digital Rights Management. Vol. 6. Washington DC, 2002. Bruns, Axel. Blogs, Wikipedia, Second Life, and Beyond: From Production to Produsage. New York: Peter Lang, 2008. Chenault, Brittney G. “Developing Personal and Emotional Relationships via Computer-Mediated Communication.” CMC Magazine 5.5 (1998). 1 May 2020 <http://www.december.com/cmc/mag/1998/may/chenault.html>. Cho, Alexander. “Queer Reverb: Tumblr, Affect, Time.” Networked Affect. Eds. K. Hillis, S. Paasonen, and M. Petit. Cambridge, Mass.: MIT Press, 2015: 43-58. Cinque, Toija. Changing Media Landscapes: Visual Networking. London: Oxford UP, 2015. ———. “Visual Networking: Australia's Media Landscape.” Global Media Journal: Australian Edition 6.1 (2012): 1-8. Cinque, Toija, and Adam Brown. “Educating Generation Next: Screen Media Use, Digital Competencies, and Tertiary Education.” Digital Culture & Education 7.1 (2015). Draper, Nora A., and Joseph Turow. “The Corporate Cultivation of Digital Resignation.” New Media & Society 21.8 (2019): 1824-1839. Fellous, Jean-Marc, and Michael A. Arbib, eds. Who Needs Emotions? The Brain Meets the Robot. New York: Oxford UP, 2005. Fernández-Caramés, Tiago M. “From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things.” IEEE Internet of Things Journal 7.7 (2019): 6457-6480. Foucault, Michel. Surveiller et Punir: Naissance de la Prison [Discipline and Punish—The Birth of The Prison]. Trans. Alan Sheridan. New York: Random House, 1977. Foucault, Michel. “The Subject and Power.” Michel Foucault: Power, the Essential Works of Michel Foucault 1954–1984. Vol. 3. Trans. R. Hurley and others. Ed. J.D. Faubion. London: Penguin, 2001. Gehl, Robert W. Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P. Cambridge, Massachusetts: MIT Press, 2018. Gehl, Robert, and Fenwick McKelvey. “Bugging Out: Darknets as Parasites of Large-Scale Media Objects.” Media, Culture & Society 41.2 (2019): 219-235. Gillespie, Tarleton. Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media. London: Yale UP, 2018. Habermas, Jürgen. The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society. Trans. Thomas Burger with the assistance of Frederick Lawrence. Cambridge, Mass.: MIT Press, 1989. Inglis, Ken S. This Is the ABC: The Australian Broadcasting Commission 1932–1983. Melbourne: Melbourne UP, 1983. Iron Maiden. “Fear of the Dark.” London: EMI, 1992. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. Lasica, J. D. Darknet: Hollywood’s War against the Digital Generation. New York: John Wiley and Sons, 2005. Mahmood, Mimrah. “Australia's Evolving Media Landscape.” 13 Apr. 2021 <https://www.meltwater.com/en/resources/australias-evolving-media-landscape>. Mann, Steve, and Joseph Ferenbok. “New Media and the Power Politics of Sousveillance in a Surveillance-Dominated World.” Surveillance & Society 11.1/2 (2013): 18-34. McDonald, Alexander J. “Cortical Pathways to the Mammalian Amygdala.” Progress in Neurobiology 55.3 (1998): 257-332. McStay, Andrew. Emotional AI: The Rise of Empathic Media. London: Sage, 2018. Mondin, Alessandra. “‘Tumblr Mostly, Great Empowering Images’: Blogging, Reblogging and Scrolling Feminist, Queer and BDSM Desires.” Journal of Gender Studies 26.3 (2017): 282-292. Neff, Gina, and Dawn Nafus. Self-Tracking. Cambridge, Mass.: MIT Press, 2016. Negroponte, Nicholas. Being Digital. New York: Alfred A. Knopf, 1995. Nissenbaum, Helen, and Heather Patterson. “Biosensing in Context: Health Privacy in a Connected World.” Quantified: Biosensing Technologies in Everyday Life. Ed. Dawn Nafus. 2016. 68-79. O’Loughlin, Ben. “The Political Implications of Digital Innovations.” Information, Communication and Society 4.4 (2001): 595–614. Quandt, Thorsten. “Dark Participation.” Media and Communication 6.4 (2018): 36-48. Royal Society for Public Health (UK) and the Young Health Movement. “#Statusofmind.” 2017. 2 Apr. 2021 <https://www.rsph.org.uk/our-work/campaigns/status-of-mind.html>. Statista. “Number of IoT devices 2015-2025.” 27 Nov. 2020 <https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/>. Schwarzenegger, Christian. “Communities of Darkness? Users and Uses of Anti-System Alternative Media between Audience and Community.” Media and Communication 9.1 (2021): 99-109. Stoll, Clifford. Silicon Snake Oil: Second Thoughts on the Information Highway. Anchor, 1995. Tiidenberg, Katrin. “Bringing Sexy Back: Reclaiming the Body Aesthetic via Self-Shooting.” Cyberpsychology: Journal of Psychosocial Research on Cyberspace 8.1 (2014). The Great Hack. Dirs. Karim Amer, Jehane Noujaim. Netflix, 2019. The Social Dilemma. Dir. Jeff Orlowski. Netflix, 2020. Turkle, Sherry. The Second Self: Computers and the Human Spirit. Cambridge, Mass.: MIT Press, 2005. Turkle, Sherry. Alone Together: Why We Expect More from Technology and Less from Each Other. UK: Hachette, 2017. Turow, Joseph, and Andrea L. Kavanaugh, eds. The Wired Homestead: An MIT Press Sourcebook on the Internet and the Family. Cambridge, Mass.: MIT Press, 2003. Von Nordheim, Gerret, and Katharina Kleinen-von Königslöw. “Uninvited Dinner Guests: A Theoretical Perspective on the Antagonists of Journalism Based on Serres’ Parasite.” Media and Communication 9.1 (2021): 88-98. Williams, Chris K. “Configuring Enterprise Public Key Infrastructures to Permit Integrated Deployment of Signature, Encryption and Access Control Systems.” MILCOM 2005-2005 IEEE Military Communications Conference. IEEE, 2005. Wilson, Dean, and Tanya Serisier. “Video Activism and the Ambiguities of Counter-Surveillance.” Surveillance & Society 8.2 (2010): 166-180.

35

Pedersen, Isabel, and Kirsten Ellison. "Startling Starts: Smart Contact Lenses and Technogenesis." M/C Journal 18, no.5 (October14, 2015). http://dx.doi.org/10.5204/mcj.1018.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

On 17 January 2013, Wired chose the smart contact lens as one of “7 Massive Ideas That Could Change the World” describing a Google-led research project. Wired explains that the inventor, Dr. Babak Parviz, wants to build a microsystem on a contact lens: “Using radios no wider than a few human hairs, he thinks these lenses can augment reality and incidentally eliminate the need for displays on phones, PCs, and widescreen TVs”. Explained further in other sources, the technology entails an antenna, circuits embedded into a contact lens, GPS, and an LED to project images on the eye, creating a virtual display (Solve for X). Wi-Fi would stream content through a transparent screen over the eye. One patent describes a camera embedded in the lens (Etherington). Another mentions medical sensing, such as glucose monitoring of tears (Goldman). In other words, Google proposes an imagined future when we use contact lenses to search the Internet (and be searched by it), shop online, communicate with friends, work, navigate maps, swipe through Tinder, monitor our health, watch television, and, by that time, probably engage in a host of activities not yet invented. Often referred to as a bionic contact, the smart contact lens would signal a weighty shift in the way we work, socialize, and frame our online identities. However, speculative discussion over this radical shift in personal computing, rarely if ever, includes consideration of how the body, acting as a host to digital information, will manage to assimilate not only significant affordances, but also significant constraints and vulnerabilities. At this point, for most people, the smart contact lens is just an idea. Is a new medium of communication started when it is launched in an advertising campaign? When we Like it on Facebook? If we chat about it during a party amongst friends? Or, do a critical mass of people actually have to be using it to say it has started? One might say that Apple’s Macintosh computer started as a media platform when the world heard about the famous 1984 television advertisem*nt aired during the American NFL Super Bowl of that year. Directed by Ridley Scott, the ad entails an athlete running down a passageway and hurling a hammer at a massive screen depicting cold war style rulers expounding state propaganda. The screen explodes freeing those imprisoned from their concentration camp existence. The direct reference to Orwell’s 1984 serves as a metaphor for IBM in 1984. PC users were made analogous to political prisoners and IBM served to represent the totalitarian government. The Mac became a something that, at the time, challenged IBM, and suggested an alternative use for the desktop computer that had previously been relegated for work rather than life. Not everyone bought a Mac, but the polemical ad fostered the idea that Mac was certainly the start of new expectations, civic identities, value-systems, and personal uses for computers. The smart contact lens is another startling start. News of it shocks us, initiates social media clicks and forwards, and instigates dialogue. But, it also indicates the start of a new media paradigm that is already undergoing popular adoption as it is announced in mainstream news and circulated algorithmically across media channels. Since 2008, news outlets like CNN, The New York Times, The Globe and Mail, Asian International News, United News of India, The Times of London and The Washington Post have carried it, feeding the buzz in circulation that Google intends. Attached to the wave of current popular interest generated around any technology claiming to be “wearable,” a smart contact lens also seems surreptitious. We would no longer hold smartphones, but hide all of that digital functionality beneath our eyelids. Its emergence reveals the way commercial models have dramatically changed. The smart contact lens is a futuristic invention imagined for us and about us, but also a sensationalized idea socializing us to a future that includes it. It is also a real device that Parviz (with Google) has been inventing, promoting, and patenting for commercial applications. All of these workings speak to a broader digital culture phenomenon. We argue that the smart contact lens discloses a process of nascent posthuman adaptation, launched in an era that celebrates wearable media as simultaneously astonishing and banal. More specifically, we adopt technology based on our adaptation to it within our personal, political, medial, social, and biological contexts, which also function in a state of flux. N. Katherine Hayles writes that “Contemporary technogenesis, like evolution in general, is not about progress ... rather, contemporary technogenesis is about adaptation, the fit between organisms and their environments, recognizing that both sides of the engagement (human and technologies) are undergoing coordinated transformations” (81). This article attends to the idea that in these early stages, symbolic acts of adaptation signal an emergent medium through rhetorical processes that society both draws from and contributes to. In terms of project scope, this article contributes a focused analysis to a much larger ongoing digital rhetoric project. For the larger project, we conducted a discourse analysis on a collection of international publications concerning Babak Parviz and the invention. We searched for and collected newspaper stories, news broadcasts, YouTube videos from various sources, academic journal publications, inventors’ conference presentations, and advertising, all published between January 2008 and May 2014, generating a corpus of more than 600 relevant artifacts. Shortly after this time, Dr. Parviz, a Professor at the University of Washington, left the secretive GoogleX lab and joined Amazon.com (Mac). For this article we focus specifically on the idea of beginnings or genesis and how digital spaces increasingly serve as the grounds for emergent digital cultural phenomena that are rarely recognized as starting points. We searched through the corpus to identify a few exemplary international mainstream news stories to foreground predominant tropes in support of the claim we make that smart contacts lenses are a startling idea. Content producers deliberately use astonishment as a persuasive device. We characterize the idea of a smart contact lens cast in rhetorical terms in order to reveal how its allure works as a process of adaptation. Rhetorician and philosopher, Kenneth Burke writes that “rhetorical language is inducement to action (or to attitude)” (42). A rhetorical approach is instrumental because it offers a model to explain how we deploy, often times, manipulative meaning as senders and receivers while negotiating highly complex constellations of resources and contexts. Burke’s rhetorical theory can show how messages influence and become influenced by powerful hierarchies in discourse that seem transparent or neutral, ones that seem to fade into the background of our consciousness. For this article, we also concentrate on rhetorical devices such as ethos and the inventor’s own appeals through different modes of communication. Ethos was originally proposed by Aristotle to identify speaker credibility as a persuasive tactic. Addressed by scholars of rhetoric for centuries, ethos has been reconfigured by many critical theorists (Burke; Baumlin Ethos; Hyde). Baumlin and Baumlin suggest that “ethos describes an audience’s projection of authority and trustworthiness onto the speaker ... ethos suggests that the ethical appeal to be a radically psychological event situated in the mental processes of the audience – as belonging as much to the audience as to the actual character of a speaker” (Psychology 99). Discussed in the next section, our impression of Parviz and his position as inventor plays a dramatic role in the surfacing of the smart contact lens. Digital Rhetoric is an “emerging scholarly discipline concerned with the interpretation of computer-generated media as objects of study” (Losh 48). In an era when machine-learning algorithms become the messengers for our messages, which have become commodity items operating across globalized, capitalist networks, digital rhetoric provides a stable model for our approach. It leads us to demonstrate how this emergent medium and invention, the smart contact lens, is born amid new digital genres of speculative communication circulated in the everyday forums we engage on a daily basis. Smart Contact Lenses, Sensationalism, and Identity One relevant site for exploration into how an invention gains ethos is through writing or video penned or produced by the inventor. An article authored by Parviz in 2009 discusses his invention and the technical advancements that need to be made before the smart contact lens could work. He opens the article using a fictional and sensationalized analogy to encourage the adoption of his invention: The human eye is a perceptual powerhouse. It can see millions of colors, adjust easily to shifting light conditions, and transmit information to the brain at a rate exceeding that of a high-speed Internet connection.But why stop there?In the Terminator movies, Arnold Schwarzenegger’s character sees the world with data superimposed on his visual field—virtual captions that enhance the cyborg’s scan of a scene. In stories by the science fiction author Vernor Vinge, characters rely on electronic contact lenses, rather than smartphones or brain implants, for seamless access to information that appears right before their eyes. Identity building is made to correlate with smart contact lenses in a manner that frames them as exciting. Coming to terms with them often involves casting us as superhumans, wielding abilities that we do not currently possess. One reason for embellishment is because we do not need digital displays on the eyes, so the motive to use them must always be geared to transcending our assumed present condition as humans and society members. Consequently, imagination is used to justify a shift in human identity along a future trajectory.This passage above also instantiates a transformation from humanist to posthumanist posturing (i.e. “the cyborg”) in order to incent the adoption of smart contact lenses. It begins with the bold declarative statement, “The human eye is a perceptual powerhouse,” which is a comforting claim about our seemingly human superiority. Indexing abstract humanist values, Parviz emphasizes skills we already possess, including seeing a plethora of colours, adjusting to light on the fly, and thinking fast, indeed faster than “a high-speed Internet connection”. However, the text goes on to summon the Terminator character and his optic feats from the franchise of films. Filmic cyborg characters fulfill the excitement that posthuman rhetoric often seems to demand, but there is more here than sensationalism. Parviz raises the issue of augmenting human vision using science fiction as his contextualizing vehicle because he lacks another way to imbricate the idea. Most interesting in this passage is the inventor’s query “But why stop there?” to yoke the two claims, one biological (i.e., “The human eye is a perceptual powerhouse”) and one fictional (i.e. Terminator, Vernor Vinge characters). The query suggests, Why stop with human superiority, we may as well progress to the next level and embrace a smart contact lens just as fictional cyborgs do. The non-threatening use of fiction makes the concept seem simultaneously exciting and banal, especially because the inventor follows with a clear description of the necessary scientific engineering in the rest of the article. This rhetorical act signifies the voice of a technoelite, a heavily-funded cohort responding to global capitalist imperatives armed with a team of technologists who can access technological advancements and imbue comments with an authority that may extend beyond their fields of expertise, such as communication studies, sociology, psychology, or medicine. The result is a powerful ethos. The idea behind the smart contact lens maintains a degree of respectability long before a public is invited to use it.Parviz exhumes much cultural baggage when he brings to life the Terminator character to pitch smart contact lenses. The Terminator series of films has established the “Arnold Schwarzenegger” character a cultural mainstay. Each new film reinvented him, but ultimately promoted him within a convincing dystopian future across the whole series: The Terminator (Cameron), Terminator 2: Judgment Day (Cameron), Terminator 3: Rise of the Machines (Mostow), Terminator Salvation (McG) and Terminator Genisys (Taylor) (which appeared in 2015 after Parviz’s article). Recently, several writers have addressed how cyborg characters figure significantly in our cultural psyche (Haraway, Bukatman; Leaver). Tama Leaver’s Artificial Culture explores the way popular, contemporary, cinematic, science fiction depictions of embodied Artificial Intelligence, such as the Terminator cyborgs, “can act as a matrix which, rather than separating or demarcating minds and bodies or humanity and the digital, reinforce the symbiotic connection between people, bodies, and technologies” (31). Pointing out the violent and ultimately technophobic motive of The Terminator films, Leaver reads across them to conclude nevertheless that science fiction “proves an extremely fertile context in which to address the significance of representations of Artificial Intelligence” (63).Posthumanism and TechnogenesisOne reason this invention enters the public’s consciousness is its announcement alongside a host of other technologies, which seem like parts of a whole. We argue that this constant grouping of technologies in the news is one process indicative of technogenesis. For example, City A.M., London’s largest free commuter daily newspaper, reports on the future of business technology as a hodgepodge of what ifs: As Facebook turns ten, and with Bill Gates stepping down as Microsoft chairman, it feels like something is drawing to an end. But if so, it is only the end of the technological revolution’s beginning ... Try to look ahead ten years from now and the future is dark. Not because it is bleak, but because the sheer profusion of potential is blinding. Smartphones are set to outnumber PCs within months. After just a few more years, there are likely to be 3bn in use across the planet. In ten years, who knows – wearables? smart contact lenses? implants? And that’s just the start. The Internet of Things is projected to be a $300bn (£183bn) industry by 2020. (Sidwell) This reporting is a common means to frame the commodification of technology in globalized business news that seeks circulation as much as it does readership. But as a text, it also posits how individuals frame the future and their participation with it (Pedersen). Smart contacts appear to move along this exciting, unstoppable trajectory where the “potential is blinding”. The motive is to excite and scare. However, simultaneously, the effect is predictable. We are quite accustomed to this march of innovations that appears everyday in the morning paper. We are asked to adapt rather than question, consequently, we never separate the parts from the whole (e.g., “wearables? smart contact lenses? Implants”) in order to look at them critically.In coming to terms with Cary Wolf’s definition of posthumanism, Greg Pollock writes that posthumanism is the questioning that goes on “when we can no longer rely on ‘the human’ as an autonomous, rational being who provides an Archimedean point for knowing about the world (in contrast to “humanism,” which uses such a figure to ground further claims)” (208). With similar intent, N. Katherine Hayles formulating the term technogenesis suggests that we are not really progressing to another level of autonomous human existence when we adopt media, we are in effect, adapting to media and media are also in a process of adapting to us. She writes: As digital media, including networked and programmable desktop stations, mobile devices, and other computational media embedded in the environment, become more pervasive, they push us in the direction of faster communication, more intense and varied information streams, more integration of humans and intelligent machines, and more interactions of language with code. These environmental changes have significant neurological consequences, many of which are now becoming evident in young people and to a lesser degree in almost everyone who interacts with digital media on a regular basis. (11) Following Hayles, three actions or traits characterize adaptation in a manner germane to the technogenesis of media like smart contact lenses. The first is “media embedded in the environment”. The trait of embedding technology in the form of sensors and chips into external spaces evokes the onset of The Internet of Things (IoT) foundations. Extensive data-gathering sensors, wireless technologies, mobile and wearable components integrated with the Internet, all contribute to the IoT. Emerging from cloud computing infrastructures and data models, The IoT, in its most extreme, involves a scenario whereby people, places, animals, and objects are given unique “embedded” identifiers so that they can embark on constant data transfer over a network. In a sense, the lenses are adapted artifacts responding to a world that expects ubiquitous networked access for both humans and machines. Smart contact lenses will essentially be attached to the user who must adapt to these dynamic and heavily mediated contexts.Following closely on the first, the second point Hayles makes is “integration of humans and intelligent machines”. The camera embedded in the smart contact lens, really an adapted smartphone camera, turns the eye itself into an image capture device. By incorporating them under the eyelids, smart contact lenses signify integration in complex ways. Human-machine amalgamation follows biological, cognitive, and social contexts. Third, Hayles points to “more interactions of language with code.” We assert that with smart contact lenses, code will eventually govern interaction between countless agents in accordance with other smart devices, such as: (1) exchanges of code between people and external nonhuman networks of actors through machine algorithms and massive amalgamations of big data distributed on the Internet;(2) exchanges of code amongst people, human social actors in direct communication with each other over social media; and (3) exchanges of coding and decoding between people and their own biological processes (e.g. monitoring breathing, consuming nutrients, translating brainwaves) and phenomenological (but no less material) practices (e.g., remembering, grieving, or celebrating). The allure of the smart contact lens is the quietly pressing proposition that communication models such as these will be radically transformed because they will have to be adapted to use with the human eye, as the method of input and output of information. Focusing on genetic engineering, Eugene Thacker fittingly defines biomedia as “entail[ing] the informatic recontextualization of biological components and processes, for ends that may be medical or nonmedical (economic, technical) and with effects that are as much cultural, social, and political as they are scientific” (123). He specifies, “biomedia are not computers that simply work on or manipulate biological compounds. Rather, the aim is to provide the right conditions, such that biological life is able to demonstrate or express itself in a particular way” (123). Smart contact lenses sit on the cusp of emergence as a biomedia device that will enable us to decode bodily processes in significant new ways. The bold, technical discourse that announces it however, has not yet begun to attend to the seemingly dramatic “cultural, social, and political” effects percolating under the surface. Through technogenesis, media acclimatizes rapidly to change without establishing a logic of the consequences, nor a design plan for emergence. Following from this, we should mention issues such as the intrusion of surveillance algorithms deployed by corporations, governments, and other hegemonic entities that this invention risks. If smart contact lenses are biomedia devices inspiring us to decode bodily processes and communicate that data for analysis, for ourselves, and others in our trust (e.g., doctors, family, friends), we also need to be wary of them. David Lyon warns: Surveillance has spilled out of its old nation-state containers to become a feature of everyday life, at work, at home, at play, on the move. So far from the single all-seeing eye of Big Brother, myriad agencies now trace and track mundane activities for a plethora of purposes. Abstract data, now including video, biometric, and genetic as well as computerized administrative files, are manipulated to produce profiles and risk categories in a liquid, networked system. The point is to plan, predict, and prevent by classifying and assessing those profiles and risks. (13) In simple terms, the smart contact lens might disclose the most intimate information we possess and leave us vulnerable to profiling, tracking, and theft. Irma van der Ploeg presupposed this predicament when she wrote: “The capacity of certain technologies to change the boundary, not just between what is public and private information but, on top of that, between what is inside and outside the human body, appears to leave our normative concepts wanting” (71). The smart contact lens, with its implied motive to encode and disclose internal bodily information, needs considerations on many levels. Conclusion The smart contact lens has made a digital beginning. We accept it through the mass consumption of the idea, which acts as a rhetorical motivator for media adoption, taking place long before the device materializes in the marketplace. This occurrence may also be a sign of our “posthuman predicament” (Braidotti). We have argued that the smart contact lens concept reveals our posthuman adaptation to media rather than our reasoned acceptance or agreement with it as a logical proposition. By the time we actually squabble over the price, express fears for our privacy, and buy them, smart contact lenses will long be part of our everyday culture. References Baumlin, James S., and Tita F. Baumlin. “On the Psychology of the Pisteis: Mapping the Terrains of Mind and Rhetoric.” Ethos: New Essays in Rhetorical and Critical Theory. Eds. James S. Baumlin and Tita F. Baumlin. Dallas: Southern Methodist University Press, 1994. 91-112. Baumlin, James S., and Tita F. Baumlin, eds. Ethos: New Essays in Rhetorical and Critical Theory. Dallas: Southern Methodist University Press, 1994. Bilton, Nick. “A Rose-Colored View May Come Standard.” The New York Times, 4 Apr. 2012. Braidotti, Rosi. The Posthuman. Cambridge: Polity, 2013. Bukatman, Scott. Terminal Identity: The Virtual Subject in Postmodern Science Fiction. Durham: Duke University Press, 1993. Burke, Kenneth. A Rhetoric of Motives. Berkeley: University of California Press, 1950. Cameron, James, dir. The Terminator. Orion Pictures, 1984. DVD. Cameron, James, dir. Terminator 2: Judgment Day. Artisan Home Entertainment, 2003. DVD. Etherington, Darrell. “Google Patents Tiny Cameras Embedded in Contact Lenses.” TechCrunch, 14 Apr. 2014. Goldman, David. “Google to Make Smart Contact Lenses.” CNN Money 17 Jan. 2014. Haraway, Donna. Simians, Cyborgs and Women: The Reinvention of Nature. London: Free Association Books, 1991. Hayles, N. Katherine. How We Think: Digital Media and Contemporary Technogenesis. Chicago: University of Chicago, 2012. Hyde, Michael. The Ethos of Rhetoric. Columbia: University of South Carolina Press, 2004. Leaver, Tama. Artificial Culture: Identity, Technology, and Bodies. New York: Routledge, 2012. Losh, Elizabeth. Virtualpolitik: An Electronic History of Government Media-Making in a Time of War, Scandal, Disaster, Miscommunication, and Mistakes. Boston: MIT Press. 2009. Lyon, David, ed. Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination. New York: Routledge, 2003. Mac, Ryan. “Amazon Lures Google Glass Creator Following Phone Launch.” Forbes.com, 14 July 2014. McG, dir. Terminator Salvation. Warner Brothers, 2009. DVD. Mostow, Jonathan, dir. Terminator 3: Rise of the Machines. Warner Brothers, 2003. DVD. Parviz, Babak A. “Augmented Reality in a Contact Lens.” IEEE Spectrum, 1 Sep. 2009. Pedersen, Isabel. Ready to Wear: A Rhetoric of Wearable Computers and Reality-Shifting Media. Anderson, South Carolina: Parlor Press, 2013. Pollock, Greg. “What Is Posthumanism by Cary Wolfe (2009).” Rev. of What is Posthumanism?, by Cary Wolfe. Journal for Critical Animal Studies 9.1/2 (2011): 235-241. Sidwell, Marc. “The Long View: Bill Gates Is Gone and the Dot-com Era Is Over: It's Only the End of the Beginning.” City A.M., 7 Feb. 2014. “Solve for X: Babak Parviz on Building Microsystems on the Eye.” YouTube, 7 Feb. 2012. Taylor, Alan, dir. Terminator: Genisys. Paramount Pictures, 2015. DVD. Thacker, Eugene “Biomedia.” Critical Terms for Media Studies. Eds. W.J.T Mitchell and Mark Hansen, Chicago: Chicago Press, 2010. 117-130. Van der Ploeg, Irma. “Biometrics and the Body as Information.” Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination. Ed. David Lyon. New York: Routledge, 2003. 57-73. Wired Staff. “7 Massive Ideas That Could Change the World.” Wired.com, 17 Jan. 2013.

36

Nair,LekhaaA. "Self-Tracking Technology as an Extension of Man." M/C Journal 22, no.5 (October9, 2019). http://dx.doi.org/10.5204/mcj.1594.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

“Man has, as it were, become a kind of prosthetic God. When he puts on all his auxiliary organs he is truly magnificent; but those organs have not grown on to him and they still give him much trouble at times” (Freud 37-39).Introduction and Background Self-tracking is not a new phenomenon. For centuries, people have used self-examination and monitoring as a means to attain knowledge and understanding about themselves. People would often record their daily activities (like food consumption, sleep and physical exercise) and write down accompanying thoughts and reflections. However, the advent of digital technology in the past decades has drastically changed the self-tracking sphere. In fact, the popularisation of self-tracking technology (STT) in mobile applications and wearable devices has allowed users to track daily activities on a closer and more accurate scale than previously affordable. Gary Wolf, the founder of a niche movement called the ‘Quantified Self’, suggested that “if you want to replace the vagaries of intuition with something more reliable, you first need to gather data. Once you know the facts, you can live by them” (Wolf). This reveals that STT has the capacity to guide users by virtue of the data collected and insights provided by the technology. Thus, instead of using intuition, which is potentially unreliable and subjective, data – finite and objective by nature – can be used to guide the process by providing definitive facts, figures and patterns. Arguably, this technologises users, allowing them to enhance their performance and capabilities by using STTs to regulate and monitor their behaviour. Hence, in this article, I position self-tracking technology (STT) as an interactive media technology, a tool for surveillance and regulation, and an “extension of man”. However, the use of and reliance on STT can compromise personal autonomy, and this journal article will investigate how users’ personal autonomy has been affected due to STT’s function as an extension of man, or a “prosthetic”. I use case study vignettes to investigate impacts on personal autonomy in three spheres: the workspace, relationships and the physical environment. Extending ManSTTs reconfigure our bodies in data form and implicate our personhood and autonomy. Human physicality has changed now that technology and data have become so integral to how we experience and view our bodies. STTs technologise human bodies, transforming them into data bodies, augmented and reliant on digital media. As Marshall McLuhan (63) put it: “In this electric age we see ourselves being translated more and more into the form of information, moving toward the technological extension of consciousness”. With the integration of STT into our daily lives, consumers increasingly rely on cues from their devices and applications to inform them about their bodies. This potentially affects the autonomy of an individual – since STT becomes an extension of the human body. In the 1960s, when the mass media was burgeoning, Marshal McLuhan proposed the idea that the media acted as an extension of man. STTs similarly act as an extension of users’ embodied capabilities and senses, since the data collected by these technologies is shared with users, allowing them to alter their bodies and minds, aiming to be as productive and effective as possible. In Understanding Media, McLuhan’s interpretation of electronic media was prescient. He anticipated the development of so-called “smart” devices, noting that, in the information age man “wears [his] brain outside [his] skull and [his] nerves outside [his] hide” (63). This is reflective of STT’s heavy reliance on sensor technology and smart technology. Simply examining how a Fitbit – a popular wearable self-tracking device – operates is illustrative. For instance, some Fitbits have an altimeter sensor that detects when the wearer is elevated, and hence counts floors. Fitbits also count steps using a three-axis accelerometer, which turns the wearer’s movements into data. Furthermore, Fitbit devices are capable of analysing and interpreting this acceleration data to provide insights about “frequency, duration, intensity, and patterns of movement to determine [users’] steps taken, distance travelled, calories burned, and sleep quality” (“Fitbit”). Fitbit relies on sensor technologies (“nerves”) to detect and interpret activities, and such insights are then transmitted to users’ smart devices (“brains”) for storage, to be analysed at a time of convenience. This modus operandi is not exclusive to Fitbit, and in fact, is the framework for many STTs. Hence, STTs have the potential to extend the natural capabilities of the human body to regulate behaviour.The WorkplaceThis notion of STT as a regulatory prosthetic is seen in its ability to enforce standardised norms on individuals by using surveillance as a disciplinary measure. STTs can enforce norms on users by transforming the workplace into a panopticon, which is an institutional structure that allows a watchman to observe individuals without them knowing whether they are being watched or not. STTs are used to gather data about performance and behaviour, and users are monitored constantly. As a result, they adjust their behaviouraccordingly. US retail titan Amazon has repeatedly raised concerns over the past years because of its use of wearables to survey workers during shifts. Adam Littler, an Amazon employee, came forward in 2013 accusing his employers of forcing him to walk 11 miles during a single work shift. His distance travelled was measured and tracked using a pedometer, while a handheld scanner guided him around the warehouse and notified him if he was meeting his targets (Aspinall). Amazon also recently designed and patented a wristband that is capable of tracking wearers’ (employees’) movements, including hand placement (Kelly). The reliance on such tracking technology to guide actions and supplement users with information to increase productivity reveals how STT can serve as a prosthetic that is used to enhance man’s abilities and performance However, the flipside of such enhancement is exploitation – employers augment users with technology and force them to adhere to standards of performance that are difficult to achieve. For instance, documents have recently surfaced that suggest Amazon terminates employees based on productivity statistics. It was reported that around 300 full-time employees were fired for “failing to meet productivity quotas”. According to the documents, “Amazon’s system tracks the rates of each individual associate’s productivity and automatically generates any warnings or terminations regarding quality or productivity without input from supervisors” (Lecher). This is reflective of how actors that are in power, like employers, can impose self-tracking practises onto employees that compromise their personal autonomy. Foucault finds that the panopticon’s utility and potency as a discipline mechanism lies in its efficiency as enforcers do not have to constantly survey people to ensure they conform. Thus, it manoeuvres existing power structures to achieve a particular goal – for instance, higher productivity or economic growth. Foucault also notes: The discipline of the workshop, while remaining a way of enforcing respect for the regulations and authorities, of preventing thefts and losses, tends to increase aptitudes, speeds, output and therefore profits; it still exerts a moral influence over behaviour, but more and more it treats actions in terms of their results, introduces bodies into a machinery, forces into an economy. (210) STTs in the workspace (or workshop) can act as prostheses, allowing employers to enhance their employee’s capabilities. Such technology creates an environment in which workers feel pressured to perform in adherence to certain set standards. Thus, employees are disciplined by STTs, and by the surveillance of their employers that follows. Arguably, such surveillance is detrimental to personal autonomy, as the surveyed feel that they have to behave in compliance to standards enforced by those in power (ie. their employers). Physical Environment With the aim of productivity and efficiency in mind, users grow dependant on devices to augment their realities with helpful technology. As mentioned earlier, McLuhan (90) ideates that “technologies are extensions of our physical and nervous systems to increase power and speed” is particularly significant. The iPhone is an example that illustrates this point very clearly as they are inbuilt with complex technology that includes a variety of sensors. The iPhone 7, for example, has a range of sensors including an accelerometer, a gyroscope, a magnetometer, a GPS, a barometer, and an ambient light sensor (Nield). These gather information about users’ surroundings and feed it back to them, and they are then able to make informed decisions. Hence, if a user wants to travel to a certain place, the phone has the ability to point out the quickest route possible, or which route to take if they would like to stop by a certain location along the way. This cultivates a reliance on navigational technologies that use automated self-tracking to direct users’ daily lives, functioning as an extension and enhancement of their geographical memory and sense of direction. However, using these technologies may in fact be dulling our body’s abilities. For instance, anthropologist Tim Ingold posits that relying on navigation technology has reduced humans’ inborn wayfaring capabilities (Ingold). These satellite navigation technologies are one of the most popular ways in which people track their movements and move through space; for instance, a whole market of rideshare applications like Uber and OlaCabs rely on this technology. Using this technology has allowed people to navigate and travel with ease. However, this can be seen to lead to a lack of “spatial awareness and cartographic literacy”. Essentially, traditional maps skills are viewed as redundant and it can encourage an over-reliance on technology (Speake and Axon). According to McKinlay navigation is a “use-it-or-lose-it skill” and “automatic wayfinding” was reducing natural navigation abilities. A UCL neuroscience study found that licensed London taxi drivers have a larger than average hippocampus in their brains, as they are capable of storing a mental map of the city in their minds, by learning street layouts and locations of places of interest. The hippocampus is the part of the brain that is linked to spatial memory and navigation skills (Maguire, Woollett and Spiers 1093). Dr Eleanor Maguire, the neuroscientist who led the study, noted that if the taxi drivers started “using GPS, that knowledge base will be less and possibly affect the brain changes we are seeing” (Dobson). In turn, an increasing reliance on GPS and navigation technologies in self-tracking devices may result in a diminishing hippocampus, according to neuroscientist Veronique Bohbot of McGill University. The atrophy of the hippocampus has also been linked to the risk of dementia (Weeks), which reveals how the technologies that augment space may atrophy the “natural abilities” (McKinlay) and thus, the autonomy of users. RelationshipsAs with areas like the workspace and spatial environments, sociality and intimacy are increasingly being mediated by technology – the digital capabilities of new media have expanded users’ options and provided a variety of technological tools that allow us to streamline and reflect on social interactions and behaviour, serving as a social prosthetic. This is especially significant in the sphere of self-tracking. However, relying on STT to gain insight into sociality may alter the ways in which we think of intimacy and communication, and may also have an impact on users’ independence and trust. Hasinoff (497-98) notes that using tracking technologies within families and intimate relationships can have potentially harmful effects, such as a loss of trust. In particular, children who are pushed into self-tracking by their families may suffer from a loss of independence as well as an inability to perceive and react to risk. In such a situation, STT serves as a prosthetic that aims to ensure safety, however, surveillance through STTs enforces power disparities and simultaneously creates a dependency between the watched and watchers, and this would affect users’ personal autonomy as they are viewed under a panoptic lens. In fact, Hasinoff finds that “[family tracking and monitoring apps] exaggerate risks, offer illusory promises of safety, and normalize surveillance and excessive control in familial relationships”. I argue that this is the consequence of pushed self-tracking in the sphere of sociality and intimacy. Users may feel pressure from their families or partners to participate in self-tracking and allow their data to be accessed by them. However, the process of participating in such a mediated and monitored relationship could create “asymmetrical relations of visibility” (Trottier 320), as this sharing of information may not always be two sided. For instance, on the app Life360, parents can enforce that their children share their locations at all times, while they are able to conceal their own locations. This intensifies the watcher’s control and diminishes the watched’s privacy and autonomy. Quite ironically, Life360’s tagline is “feel free, together”. As an app geared at family safety, Life360 assumes that the family is a safe space – however, families too may pose a significant risk to vulnerable users’ (such as young children and women) autonomy and privacy. User complaints about inaccurate location information reveal “controlling, asymmetrical, and potentially abusive uses of the app” that can aggravate dysfunctional power dynamics in intimate and familial relationships. For instance, jealous partners or overprotective parents could grow increasingly suspicious or even aggressive (Hasinoff 504). Critical users who reviewed the app claimed that the app “ruined [their] social life” and enabled their “family to stalk [them] 24/7”. In another case, a user claimed the app was “toxic”, noting it would “destroy their [children’s] trust” (App Store; Life360). While the app asserts that each user does have control over the extent of location sharing, they may feel the need to remain visible because of familial pressure and expectations, since their family relies visibility on the app as an indicator of safety. This too, is problematic – self-tracking one’s locations provides just that – a geolocation pin, which is not a clear measure or indicator of the well-being or safety of the user. Simpson argues that constructing location information as safety information is not reliable because it could “promote a false sense of security based on the sense that if you know where your child is then that means they are safe” (277). Additionally, this also sets an imperative that users need to be monitored or monitor themselves at all times to ensure safety, and such a use of surveillance technology could result in users being hyperalert and anxious (Hasinoff 497). Extending man’s awareness to this degree and engaging in such surveillance may create a false sense of security and dependency, that ultimately puts everyone’s autonomy at risk.ConclusionSTT performs as an informational prosthetic for man. We conventionally tend to think of prostheses as extensions of our physical and sensory abilities, used to enhance or replace missing functions. In the case of STT, they have inbuilt decision-making and guidance capabilities, enhancing humans’ ability to process and understand information. This is a new type of digital prosthetic that has not existed before. It thus seems that the new generation of prostheses are no longer just physical and material – they operate as intellectual and cognitive extensions of our bodies. However, when users’ decision-making processes are increasingly displaced by informational prostheses, it is important to determine the extent to which they are impairing our organic capacity for orienting, sense-making and intimacy. ReferencesApp Store. Mobile app. Apple Inc. Accessed 1 Jun. 2019.Aspinall, Adam. “Amazon Forces Warehouse Staff to Walk 11 Miles per Shift Says Former Employee.” Mirror 25 Nov. 2013. <https://www.mirror.co.uk/money/city-news/amazon-worker-rights-retail-giant-2851079>.Dobson, Roger. “Cabbies Really Do Have More Grey Matter to Store All That Information, Scientists Say.” Independent 17 Dec. 2006. <https://www.independent.co.uk/life-style/health-and-families/health-news/taxi-drivers-knowledge-helps-their-brains-grow-428834.html>.Fitbit. “How Does My Fitbit Device Calculate My Daily Activity?” 1 June 2019 <https://help.fitbit.com/articles/en_US/Help_article/1141>.Foucault, Michel. Discipline and Punish: The Birth of the Prison. London: Penguin, 1977. Freud, Sigmund. Civilization and Its Discontents. New York: Picador, 1930.Hasinoff, Amy Adele. “Where Are You? Location Tracking and the Promise of Child Safety.” Television & New Media 18.6 (2016): 496-512. DOI: 10.1177/1527476416680450.Ingold, Tim. Being Alive: Essays on Movement, Knowledge and Description. London: Routledge, 2011.Kelly, Heather. “Amazon's Idea for Employee-Tracking Wearables Raises Concerns.” CNN Business 2 Feb. 2018. <https://money.cnn.com/2018/02/02/technology/amazon-employee-tracker/index.html>. Lecher, Colin. “How Amazon Automatically Tracks and Fires Warehouse Workers for ‘Productivity’.” The Verge 25 Apr. 2019. <https://www.theverge.com/2019/4/25/18516004/amazon-warehouse-fulfillment-centers-productivity-firing-terminations>.Life360. “Life360 – Feel Free, Together.” 1 June 2019 <https://www.life360.com/>.Lupton, Deborah. The Quantified Self. Malden: Polity, 2016.Maguire, Eleanor, Katherine Woollett, and Hugo Spiers. “London Taxi Drivers and Bus Drivers: A Structural MRI and Neuropsychological Analysis.” Wiley Interscience 16.12 (2006): 1091-1101. DOI: 10.1002/hipo.20233.McLuhan, Marshall. Understanding Media: The Extensions of Man. London: Routledge & Kegan Paul, 1964.McKinlay, Roger. “Technology: Use or Lose Our Navigation Skills.” Nature 30 Mar. 2016. <https://www.nature.com/news/technology-use-or-lose-our-navigation-skills-1.19632>.Nield, David. “All the Sensors in Your Smartphone, and How They Work.” Gizmodo Australia 28 July 2017. <https://www.gizmodo.com.au/2017/07/all-the-sensors-in-your-smartphone-and-how-they-work/>.Satariano, Adam. “Would You Wear a FitBit So Your Boss Could Track Your Weight Loss?” Daily Herald 9 Jan. 2014. <https://www.dailyherald.com/article/20140901/business/140909985/>.Simpson, Brian. “Tracking Children, Constructing Fear: GPS and the Manufacture of Family Safety.” Information & Communications Technology Law 23.3 (2014): 273–285. DOI: 10.1080/13600834.2014.970377.Speake, Janet, and Stephen Axon. “‘I Never Use ‘Maps’ Anymore’: Engaging with Sat Nav Technologies and the Implications for Cartographic Literacy and Spatial Awareness.” The Cartographic Journal 49.4 (2013): 326-336. DOI: 10.1179/1743277412Y.0000000021.Trottier, Daniel. “Interpersonal Surveillance on Social Media.” Canadian Journal of Communication 37.2 (2012): 319–332. DOI: 10.22230/cjc.2012v37n2a2536.Weeks, Linton. “From Maps to Apps: Where Are We Headed?” NPR 4 May 2010. <https://www.npr.org/templates/story/story.php?storyId=124608376>.Wolf, Gary. “The Data-Driven Life.” The New York Times Magazine 28 Apr. 2010. <https://www.nytimes.com/2010/05/02/magazine/02self-measurement-t.html>.

37

Williams, Deborah Kay. "Hostile Hashtag Takeover: An Analysis of the Battle for Februdairy." M/C Journal 22, no.2 (April24, 2019). http://dx.doi.org/10.5204/mcj.1503.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

We need a clear, unified, and consistent voice to effect the complete dismantling, the abolition, of the mechanisms of animal exploitation.And that will only come from what we say and do, no matter who we are.— Gary L. Francione, animal rights theoristThe history of hashtags is relatively short but littered with the remnants of corporate hashtags which may have seemed a good idea at the time within the confines of the boardroom. It is difficult to understand the rationale behind the use of hashtags as an effective communications tactic in 2019 by corporations when a quick stroll through their recent past leaves behind the much-derided #qantasluxury (Glance), #McDstories (Hill), and #myNYPD (Tran).While hashtags have an obvious purpose in bringing together like-minded publics and facilitating conversation (Kwye et al. 1), they have also regularly been the subject of “hashtag takeovers” by activists and other interested parties, and even by trolls, as the Ecological Society of Australia found in 2015 when their seemingly innocuous #ESA15 hashtag was taken over with p*rnographic images (news.com.au). Hashtag takeovers have also been used as a dubious marketing tactic, where smaller and less well-known brands tag their products with trending hashtags such as #iphone in order to boost their audience (Social Garden). Hashtags are increasingly used as a way for activists or other interested parties to disrupt a message. It is, I argue, predictable that any hashtag related to an even slightly controversial topic will be subject to some form of activist hashtag takeover, with varying degrees of success.That veganism and the dairy industry should attract such conflict is unsurprising given that the two are natural enemies, with vegans in particular seeming to anticipate and actively engage in the battle for the opposing hashtag.Using a comparative analysis of the #Veganuary and #Februdairy hashtags and how they have been used by both pro-vegan and pro-dairy social media users, this article illustrates that the enthusiastic and well-meaning social media efforts of farmers and dairy supporters have so far been unable to counteract those of well-organised and equally passionate vegan activists. This analysis compares tweets in the first week of the respective campaigns, concluding that organisations, industries and their representatives should be extremely wary of engaging said activists who are not only highly-skilled but are also highly-motivated. Grassroots, ideology-driven activism is a formidable opponent in any public space, let alone when it takes place on the outspoken and unstructured landscape of social media which is sometimes described as the “wild West” (Fitch 5) where anything goes and authenticity and plain-speaking is key (Macnamara 12).I Say Hashtag, You Say Bashtag#Februdairy was launched in 2018 to promote the benefits of dairy. The idea was first mooted on Twitter in 2018 by academic Dr Jude Capper, a livestock sustainability consultant, who called for “28 days, 28 positive dairy posts” (@Bovidiva; Howell). It was a response to the popular Veganuary campaign which aimed to “inspire people to try vegan for January and throughout the rest of the year”, a campaign which had gained significant traction both online and in the traditional media since its inception in 2014 (Veganuary). Hopes were high: “#Februdairy will be one month of dairy people posting, liking and retweeting examples of what we do and why we do it” (Yates). However, the #Februdairy hashtag has been effectively disrupted and has now entered the realm of a bashtag, a hashtag appropriated by activists for their own purpose (Austin and Jin 341).The Dairy Industry (Look Out the Vegans Are Coming)It would appear that the dairy industry is experiencing difficulties in public perception. While milk consumption is declining, sales of plant-based milks are increasing (Kaiserman) and a growing body of health research has questioned whether dairy products and milk in particular do in fact “do a body good” (Saccaro; Harvard Milk Study). In the 2019 review of Canada’s food guide, its first revision since 2007, for instance, the focus is now on eating plant-based foods with dairy’s former place significantly downgraded. Dairy products no longer have their own distinct section and are instead placed alongside other proteins including lentils (Pippus).Nevertheless, the industry has persevered with its traditional marketing and public relations activities, choosing to largely avoid addressing animal welfare concerns brought to light by activists. They have instead focused their message towards countering concerns about the health benefits of milk. In the US, the Milk Processing Education Program’s long-running celebrity-driven Got Milk campaign has been updated with Milk Life, a health focused campaign, featuring images of children and young people living an active lifestyle and taking part in activities such as skateboarding, running, and playing basketball (Milk Life). Interestingly, and somewhat inexplicably, Milk Life’s home page features the prominent headline, “How Milk Can Bring You Closer to Your Loved Ones”.It is somewhat reflective of the current trend towards veganism that tennis aces Serena and Venus Williams, both former Got Milk ambassadors, are now proponents for the plant-based lifestyle, with Venus crediting her newly-adopted vegan diet as instrumental in her recovery from an auto-immune disease (Mango).The dairy industry’s health focus continues in Australia, as well as the use of the word love, with former AFL footballer Shane Crawford—the face of the 2017 campaign Milk Loves You Back, from Lion Dairy and Drinks—focusing on reminding Australians of the reputed nutritional benefits of milk (Dawson).Dairy Australia meanwhile launched their Legendairy campaign with a somewhat different focus, promoting and lauding Australia’s dairy families, and with a message that stated, in a nod to the current issues, that “Australia’s dairy farmers and farming communities are proud, resilient and innovative” (Dairy Australia). This campaign could be perceived as a morale-boosting exercise, featuring a nation-wide search to find Australia’s most legendairy farming community (Dairy Australia). That this was also an attempt to humanise the industry seems obvious, drawing on established goodwill felt towards farmers (University of Cambridge). Again, however, this strategy did not address activists’ messages of suffering animals, factory farms, and newborn calves being isolated from their grieving mothers, and it can be argued that consumers are being forced to make the choice between who (or what) they care about more: animals or the people making their livelihoods from them.Large-scale campaigns like Legendairy which use traditional channels are of course still vitally important in shaping public opinion, with statistics from 2016 showing 85.1% of Australians continue to watch free-to-air television (Roy Morgan, “1 in 7”). However, a focus and, arguably, an over-reliance on traditional platforms means vegans and animal activists are often unchallenged when spreading their message via social media. Indeed, when we consider the breakdown in age groups inherent in these statistics, with 18.8% of 14-24 year-olds not watching any commercial television at all, an increase from 7% in 2008 (Roy Morgan, “1 in 7”), it is a brave and arguably short-sighted organisation or industry that relies primarily on traditional channels to spread their message in 2019. That these large-scale campaigns do little to address the issues raised by vegans concerning animal welfare leaves these claims largely unanswered and momentum to grow.This growth in momentum is fuelled by activist groups such as the People for the Ethical Treatment of Animals (PETA) who are well-known in this space, with 5,494,545 Facebook followers, 1.06 million Twitter followers, 973,000 Instagram followers, and 453,729 You Tube subscribers (People for the Ethical Treatment of Animals). They are also active on Pinterest, a visual-based platform suited to the kinds of images and memes particularly detrimental to the dairy industry. Although widely derided, PETA’s reach is large. A graphic video posted to Facebook on February 13 2019 and showing a suffering cow, captioned “your cheese is not worth this” was shared 1,244 times, and had 4.6 million views in just over 24 hours (People for the Ethical Treatment of Animals). With 95% of 12-24 year olds in Australia now using social networking sites (Statista), it is little wonder veganism is rapidly growing within this demographic (Bradbury), with The Guardian labelling the rise of veganism unstoppable (Hancox).Activist organisations are joined by prominent and charismatic vegan activists such as James Aspey (182,000 Facebook followers) and Earthling Ed (205,000 Facebook followers) in distributing information and images that are influential and often highly graphic or disturbing. Meanwhile Instagram influencers and You Tube lifestyle vloggers such as Ellen Fisher and FreeLee share information promoting vegan food and the vegan lifestyle (with 650,320 and 785,903 subscribers respectively). YouTube video Dairy Is Scary has over 5 million views (Janus) and What the Health, a follow-up documentary to Cowspiracy: The Sustainability Secret, promoting veganism, is now available on Netflix, which itself has 9.8 million Australian subscribers (Roy Morgan, “Netflix”). BOSH’s plant-based vegan cookbook was the fastest selling cookbook of 2018 (Chiorando).Additionally, the considerable influence of celebrities such as Miley Cyrus, Beyonce, Alicia Silverstone, Zac Efron, and Jessica Chastain, to name just a few, speaking publicly about their vegan lifestyle, encourages veganism to become mainstream and increases its widespread acceptance.However not all the dairy industry’s ills can be blamed on vegans. Rising costs, cheap imports, and other pressures (Lockhart, Donaghy and Gow) have all placed pressure on the industry. Nonetheless, in the battle for hearts and minds on social media, the vegans are leading the way.Qualitative research interviewing new vegans found converting to veganism was relatively easy, yet some respondents reported having to consult multiple resources and required additional support and education on how to be vegan (McDonald 17).Enter VeganuaryUsing a month, week or day to promote an idea or campaign, is a common public relations and marketing strategy, particularly in health communications. Dry July and Ocsober both promote alcohol abstinence, Frocktober raises funds for ovarian cancer, and Movember is an annual campaign raising awareness and funds for men’s health (Parnell). Vegans Matthew Glover and Jane Land were discussing the success of Movember when they raised the idea of creating a vegan version. Their initiative, Veganuary, urging people to try vegan for the month of January, launched in 2014 and since then 500,000 people have taken the Veganuary pledge (Veganuary).The Veganuary website is the largest of its kind on the internet. With vegan recipes, expert advice and information, it provides all the answers to Why go vegan, but it is the support offered to answer How to go vegan that truly sets Veganuary apart. (Veganuary)That Veganuary participants would use social media to discuss and share their experiences was a foregone conclusion. Twitter, Facebook, and Instagram are all utilised by participants, with the official Veganuary pages currently followed/liked by 159,000 Instagram followers, receiving 242,038 Facebook likes, and 45,600 Twitter followers (Veganuary). Both the Twitter and Instagram sites make effective use of hashtags to spread their reach, not only using #Veganuary but also other relevant hashtags such as #TryVegan, #VeganRecipes, and the more common #Vegan, #Farm, and #SaveAnimals.Februdairy Follows Veganuary, But Only on the CalendarCalling on farmers and dairy producers to create counter content and their own hashtag may have seemed like an idea that would achieve an overall positive response.Agricultural news sites and bloggers spread the word and even the BBC reported on the industry’s “fight back” against Veganuary (BBC). However the hashtag was quickly overwhelmed with anti-dairy activists mobilising online. Vegans issued a call to arms across social media. The Vegans in Australia Facebook group featured a number of posts urging its 58,949 members to “thunderclap” the Februdairy hashtag while the Project Calf anti-dairy campaign declared that Februdairy offered an “easy” way to spread their information (Sandhu).Februdairy farmers and dairy supporters were encouraged to tell their stories, sharing positive photographs and videos, and they did. However this content was limited. In this tweet (fig. 1) the issue of a lack of diverse content was succinctly addressed by an anti-Februdairy activist.Fig. 1: Content challenges. (#Februdairy, 2 Feb. 2019)MethodUtilising Twitter’s advanced search capability, I was able to search for #Veganuary tweets from 1 to 7 January 2019 and #Februdairy tweets from 1 to 7 February 2019. I analysed the top tweets provided by Twitter in terms of content, assessed whether the tweet was pro or anti Veganuary and Februdairy, and also categorised its content in terms of subject matter.Tweets were analysed to assess whether they were on message and aligned with the values of their associated hashtag. Veganuary tweets were considered to be on message if they promoted veganism or possessed an anti-dairy, anti-meat, or pro-animal sentiment. Februdairy tweets were assessed as on message if they promoted the consumption of dairy products, expressed sympathy or empathy towards the dairy industry, or possessed an anti-vegan sentiment. Tweets were also evaluated according to their clarity, emotional impact and coherence. The overall effectiveness of the hashtag was then evaluated based on the above criteria as well as whether they had been hijacked.Results and FindingsOverwhelmingly, the 213 #Veganuary tweets were on message. That is they were pro-Veganuary, supportive of veganism, and positive. The topics were varied and included humorous memes, environmental facts, information about the health benefits of veganism, as well as a strong focus on animals. The number of non-graphic tweets (12) concerning animals was double that of tweets featuring graphic or shocking imagery (6). Predominantly the tweets were focused on food and the sharing of recipes, with 44% of all pro #Veganuary tweets featuring recipes or images of food. Interestingly, a number of well-known corporations tweeted to promote their vegan food products, including Tesco, Aldi, Iceland, and M&S. The diversity of veganism is reflected in the tweets. Organisations used the hashtag to promote their products, including beauty and shoe products, social media influencers promoted their vegan podcasts and blogs, and, interestingly, the Ethiopian Embassy of the United Kingdom tweeted their support.There were 23 (11%) anti-Veganuary tweets. Of these, one was from Dr. Jude Capper, the founder of Februdairy. The others expressed support for farming and farmers, and a number were photographs of meat products, including sausages and fry-ups. One Australian journalist tweeted in favour of meat, stating it was yummy murder. These tweets could be described as entertaining and may perhaps serve as a means of preaching to the converted, but their ability to influence and persuade is negligible.Twitter’s search tool provided access to 141 top #Februdairy tweets. Of these 82 (52%) were a hijack of the hashtag and overtly anti-Februdairy. Vegan activists used the #Februdairy hashtag to their advantage with most of their tweets (33%) featuring non-graphic images of animals. They also tweeted about other subject matters, including environmental concerns, vegan food and products, and health issues related to dairy consumption.As noted by the activists (see fig. 1 above), most of the pro-Februdairy tweets were images of milk or dairy products (41%). Images of farms and farmers were the next most used (26%), followed by images of cows (17%) (see fig. 2). Fig. 2: An activist makes their anti-Februdairy point with a clear, engaging image and effective use of hashtags. (#Februdairy, 6 Feb. 2019)The juxtaposition between many of the tweets was also often glaring, with one contrasting message following another (see fig. 3). Fig. 3: An example of contrasting #Februdairy tweets with an image used by the activists to good effect, making their point known. (#Februdairy, 2 Feb. 2019)Storytelling is a powerful tool in public relations and marketing efforts. Yet, to be effective, high-quality content is required. That many of the Februdairy proponents had limited social media training was evident; images were blurred, film quality was poor, or they failed to make their meaning clear (see fig. 4). Fig. 4: A blurred photograph, reflective of some of the low-quality content provided by Februdairy supporters. (#Februdairy, 3 Feb. 2019)This image was tweeted in support of Februdairy. However the image and phrasing could also be used to argue against Februdairy. We can surmise that the tweeter was suggesting the cow was well looked after and seemingly content, but overall the message is as unclear as the image.While some pro-Februdairy supporters recognised the need for relevant hashtags, often their images were of a low-quality and not particularly engaging, a requirement for social media success. This requirement seems to be better understood by anti-Februdairy activists who used high-quality images and memes to create interest and gain the audience’s attention (see figs. 5 and 6). Fig. 5: An uninspiring image used to promote Februdairy. (#Februdairy, 6 Feb. 2019) Fig. 6: Anti-Februdairy activists made good use of memes, recognising the need for diverse content. (#Februdairy, 3 Feb. 2019)DiscussionWhat the #Februdairy case makes clear, then, is that in continuing its focus on traditional media, the dairy industry has left the battle online to largely untrained, non-social media savvy supporters.From a purely public relations perspective, one of the first things we ask our students to do in issues and crisis communication is to assess the risk. “What can hurt your organisation?” we ask. “What potential issues are on the horizon and what can you do to prevent them?” This is PR101 and it is difficult to understand why environmental scanning and resulting action has not been on the radar of the dairy industry long before now. It seems they have not fully anticipated or have significantly underestimated the emerging issue that public perception, animal cruelty, health concerns, and, ultimately, veganism has had on their industry and this is to their detriment. In Australia in 2015–16 the dairy industry was responsible for 8 per cent (A$4.3 billion) of the gross value of agricultural production and 7 per cent (A$3 billion) of agricultural export income (Department of Agriculture and Water Resources). When such large figures are involved and with so much at stake, it is hard to rationalise the decision not to engage in a more proactive online strategy, seeking to engage their publics, including, whether they like it or not, activists.Instead there are current attempts to address these issues with a legislative approach, lobbying for the introduction of ag-gag laws (Potter), and the limitation of terms such as milk and cheese (Worthington). However, these measures are undertaken while there is little attempt to engage with activists or to effectively counter their claims with a widespread authentic public relations campaign, and reflects a failure to understand the nature of the current online environment, momentum, and mood.That is not to say that the dairy industry is not operating in the online environment, but it does not appear to be a priority, and this is reflected in their low engagement and numbers of followers. For instance, Dairy Australia, the industry’s national service body, has a following of only 8,281 on Facebook, 6,981 on Twitter, and, crucially, they are not on Instagram. Their Twitter posts do not include hashtags and unsurprisingly they have little engagement on this platform with most tweets attracting no more than two likes. Surprisingly they have 21,013 subscribers on YouTube which featured professional and well-presented videos. This demonstrates some understanding of the importance of effective storytelling but not, as yet, trans-media storytelling.ConclusionSocial media activism is becoming more important and recognised as a legitimate voice in the public sphere. Many organisations, perhaps in recognition of this as well as a growing focus on responsible corporate behaviour, particularly in the treatment of animals, have adjusted their behaviour. From Unilever abandoning animal testing practices to ensure Dove products are certified cruelty free (Nussbaum), to Domino’s introducing vegan options, companies who are aware of emerging trends and values are changing the way they do business and are reaping the benefits of engaging with, and catering to, vegans. Domino’s sold out of vegan cheese within the first week and vegans were asked to phone ahead to their local store, so great was the demand. From their website:We knew the response was going to be big after the demand we saw for the product on social media but we had no idea it was going to be this big. (Domino’s Newsroom)As a public relations professional, I am baffled by the dairy industry’s failure to adopt a crisis-based strategy rather than largely rely on the traditional one-way communication that has served them well in the previous (golden?) pre-social media age. However, as a vegan, persuaded by the unravelling of the happy cow argument, I cannot help but hope this realisation continues to elude them.References@bovidiva. “Let’s Make #Februdairy Happen This Year. 28 Days, 28 Positive #dairy Posts. From Cute Calves and #cheese on Crumpets, to Belligerent Bulls and Juicy #beef #burgers – Who’s In?” Twitter post. 15 Jan. 2018. 1 Feb. 2019 <https://twitter.com/bovidiva/status/952910641840447488?lang=en>.Austin, Lucinda L., and Yan Jin. Social Media and Crisis Communication. New York: Routledge, 2018.Bradbury, Tod. “Data Shows Major Rise in Veganism among Young People.” Plant Based News 12 Oct. 2018. 10 Feb. 2019 <https://www.plantbasednews.org>.BBC. “Februdairy: The Dairy Industry Fights Back against Veganuary.” BBC.com 8 Feb. 2018. 1 Feb. 2019 <https://www.bbc.com/news/newsbeat-42990941>.Campaign Brief. “Shane Crawford Stars in ‘Milk Loves You Back’ Work for Lion Dairy & Drinks via AJF Partnership.” Campaign Brief Australia 1 Jun. 2017. 12 Feb. 2019 <http://www.campaignbrief.com/2017/06/shane-crawford-stars-in-milk-l.html>.Chiorando, Maria. “BOSH!’s Vegan Cookbook Is Fastest Selling Cookery Title of 2018.” Plant Based News 26 April 2018. 18 Feb. 2019 <https://www.plantbasednews.org/post/bosh-s-vegan-cookbook-is-fastest-selling-cookery-title-of-2018>.Cowspiracy: The Sustainability Secret. Dir. Kip Anderson, and Keegan Kuhn. Appian Way, A.U.M. Films, First Spark Media, 2014.Dairy Australia. “About Legendairy Capital.” Legendairy.com.au, 2019. 12 Feb. 2019 <http://www.legendairy.com.au/dairy-talk/capital-2017/about-us>.Dawson, Abigail. “Lion Dairy & Drinks Launches Campaign to Make Milk Matter Again.” Mumbrella 1 Jun. 2017. 10 Feb 2019 <https://mumbrella.com.au/lion-dairy-drinks-launches-campaign-make-milk-matter-448581>.Department of Agriculture and Water Resources. “Dairy Industry.” Australian Government. 21 Sep. 2018. 20 Feb. 2019 <http://www.agriculture.gov.au/abares/research-topics/surveys/dairy>.Domino’s Newsroom. “Meltdown! Domino’s Set to Run Out of Vegan Cheese!” Domino’s Australia 18 Jan. 2018. 10 Feb. 2019 <https://newsroom.dominos.com.au/home/2018/1/17/meltdown-dominos-set-to-run-out-of-vegan-cheese>.Fitch, Kate. “Making Friends in the Wild West: Singaporean Public Relations Practitioners’ Perceptions of Working in Social Media.” PRism 6.2 (2009). 10 Feb. 2019 <http://www.prismjournal.org/fileadmin/Praxis/Files/globalPR/FITCH.pdf>.Francione, Gary L. “Animal Rights: The Abolitionist Approach.” Animal Rights: The Abolitionist Approach 10 Feb. 2019. <https://www.abolitionistapproach.com/quotes/>.Glance, David. “#QantasLuxury: A Qantas Social Media Disaster in Pyjamas.” The Conversation 23 Nov. 2011. 10 Feb. 2019 <http://theconversation.com/qantasluxury-a-qantas-social-media-disaster-in-pyjamas-4421>.Hancox, Dan. “The Unstoppable Rise of Veganism: How a Fringe Movement Went Mainstream.” The Guardian 1 Apr. 2018. 10 Feb. 2019 <https://www.theguardian.com/lifeandstyle/2018/apr/01/vegans-are-coming-millennials-health-climate-change-animal-welfare>.“Harvard Milk Study: It Doesn’t Do a Body Good.” HuffPost Canada 25 Jul. 2013. 12 Feb. 2019 <https://www.huffingtonpost.ca/2013/07/05/harvard-milk-study_n_3550063.html>.Hill, Kashmir. “#McDStories: When a Hashtag Becomes a Bashtag.” Forbes.com 24 Jan. 2012. 10 Feb. 2019 <https://www.forbes.com/sites/kashmirhill/2012/01/24/mcdstories-when-a-hashtag-becomes-a-bashtag/#1541ef39ed25>.Howell, Madeleine. “Goodbye Veganuary, Hello Februdairy: How the Dairy Industry Is Taking the Fight to Its Vegan Critics.” The Telegraph 9 Feb. 2018. 10 Feb. 2019 <https://www.telegraph.co.uk/food-and-drink/features/goodbye-veganuary-hello-februdairy-dairy-industry-taking-fight/>.Janus, Erin. “DAIRY IS SCARY! The Industry Explained in 5 Minutes.” Video. 27 Dec. 2015. 12 Feb. 2019 <https://www.youtube.com/watch?v=UcN7SGGoCNI&t=192s>.Kaiserman, Beth. “Dairy Industry Struggles in a Sea of Plant-Based Milks.” Forbes.com 31 Jan. 2019. 20 Feb. 2019 <https://www.forbes.com/sites/bethkaiserman/2019/01/31/dairy-industry-plant-based-milks/#7cde005d1c9e>.Kwye, Su Mon, et al. “On Recommending Hashtags in Twitter Networks.” Proceedings of the Social Informatics: 4th International Conference, SocInfo. 5-7 Dec. 2012. Lausanne: Research Collection School of Information Systems. 337-50. 12 Feb. 2019 <https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=2696&context=sis_research>.Lockhart, James, Danny Donaghy, and Hamish Gow. “Milk Price Cuts Reflect the Reality of Sweeping Changes in Global Dairy Market.” The Conversation 12 May 2016. 12 Feb. 2019 <https://theconversation.com/milk-price-cuts-reflect-the-reality-of-sweeping-changes-in-global-dairy-market-59251>.Macnamara, Jim. “‘Emergent’ Media and Public Communication: Understanding the Changing Mediascape.” Public Communication Review 1.2 (2010): 3–17.Mango, Alison. “This Drastic Diet Change Helped Venus Williams Fight Her Autoimmune Condition.” Health.com 12 Jan. 2017. 10 Feb. 2019 <https://www.health.com/nutrition/venus-williams-raw-vegan-diet>.McDonald, Barbara. “Once You Know Something, You Can’t Not Know It. An Empirical Look at Becoming Vegan.” Foodethics.univie.ac.at, 2000. 12 Feb. 2019 <https://foodethics.univie.ac.at/fileadmin/user_upload/inst_ethik_wiss_dialog/McDonald__B._2000._Vegan_...__An_Empirical_Look_at_Becoming_Vegan..pdf>.Milk Life. “What Is Milk Life?” 20 Feb. 2019 <https://milklife.com/what-is-milk-life>.News.com.au. “Twitter Trolls Take over Conference Hashtag with p*rn.” News.com.au 30 Nov. 2015. 12 Feb. 2019 <https://www.news.com.au/national/twitter-trolls-take-over-ecology-conference-hashtag-with-p*rn/news-story/06a76d7ab53ec181776bdb11d735e422>.Nussbaum, Rachel. “Tons of Your Favorite Drugstore Products Are Officially Cruelty-Free Now.” Glamour.com 9 Oct. 2018. 21 Feb. 2019 <https://www.glamour.com/story/dove-cruelty-free-peta>.Parnell, Kerry. “Charity Theme Months Have Taken over the Calendar.” Daily Telegraph.com 26 Sep. 2015. 18 Feb. 2019 <https://www.dailytelegraph.com.au/rendezview/charity-theme-months-have-taken-over-the-calendar/news-story/1f444a360ee04b5ec01154ddf4763932>.People for the Ethical Treatment of Animals. “This Cow Was Suffering on Dairy Farm and the Owner Refused to Help Her.” Facebook post. 13 Feb. 2019. 15 Feb. 2019 <https://www.facebook.com/official.peta>.Pippus, Anna. “Progress! Canada’s New Draft Food Guide Favors Plant-Based Protein and Eliminates Dairy as a Food Group.” Huffington Post 7 Dec. 2017. 10 Feb. 2019 <https://www.huffingtonpost.com/entry/progress-canadas-new-food-guide-will-favor-plant_us_5966eb4ce4b07b5e1d96ed5e>.Potter, Will. “Ag-Gag Laws: Corporate Attempts to Keep Consumers in the Dark.” Griffith Journal of Law and Human Dignity (2017): 1–32.Roy Morgan. “Netflix Set to Surge beyond 10 Million Users.” Roy Morgan 3 Aug. 2018. 20 Feb. 2019 <http://www.roymorgan.com/findings/7681-netflix-stan-foxtel-fetch-youtube-amazon-pay-tv-june-2018-201808020452>.———. “1 in 7 Australians Now Watch No Commercial TV, Nearly Half of All Broadcasting Reaches People 50+, and Those with SVOD Watch 30 Minutes Less a Day.” Roy Morgan 1 Feb. 2016. 10 Feb. 2019 <http://www.roymorgan.com/findings/6646-decline-and-change-commercial-television-viewing-audiences-december-2015-201601290251>.Saccaro, Matt. “Milk Does Not Do a Body Good, Says New Study.” Mic.com 29 Oct. 2014. 12 Feb. 2019 <https://mic.com/articles/102698/milk-does-not-do-a-body-good#.o7MuLnZgV>.Sandhu, Serina. “A Group of Vegan Activists Is Trying to Hijack the ‘Februdairy’ Month by Encouraging People to Protest at Dairy Farms.” inews.co.uk 5 Feb. 2019. 18 Feb. 2019 <https://inews.co.uk/news/uk/vegan-activists-hijack-februdairy-protest-dairy-farms-farmers/>.Social Garden. “Hashtag Blunders That Hurt Your Social Media Marketing Efforts.” Socialgarden.com.au 30 May 2014. 10 Feb. 2019 <https://socialgarden.com.au/social-media-marketing/hashtag-blunders-that-hurt-your-social-media-marketing-efforts/>.Statista: The Statista Portal. Use of Social Networking Sites in Australia as of March 2017 by Age. 2019. 10 Feb. 2019 <https://www.statista.com/statistics/729928/australia-social-media-usage-by-age/>.Tran, Mark. “#myNYPD Twitter Callout Backfires for New York Police Department.” The Guardian 23 Apr. 2014. 10 Feb. 2019 <https://www.theguardian.com/world/2014/apr/23/mynypd-twitter-call-out-new-york-police-backfires>.University of Cambridge. “Farming Loved But Misunderstood, Survey Shows.” Cam.uc.uk 23 Aug. 2012. 10 Feb. 2019 <https://www.cam.ac.uk/research/news/farming-loved-but-misunderstood-survey-shows>.Veganuary. “About Veganuary.” 2019. 21 Feb. 2019 <https://veganuary.com/about/>.———. “Veganuary: Inspiring People to Try Vegan!” 2019. 10 Feb. 2019 <https://veganuary.com/>.What the Health. Dir. Kip Anderson, and Keegan Kuhn. A.U.M. Films, 2017.Worthington, Brett. “Federal Government Pushes to Stop Plant-Based Products Labelled as ‘Meat’ or ‘Milk’.” ABC News 11 Oct. 2018. 20 Feb. 2019 <https://www.abc.net.au/news/2018-10-11/federal-government-wants-food-standards-reviewed/10360200>.Yates, Jack. “Farmers Plan to Make #Februdairy Month of Dairy Celebration.” Farmers Weekly 20 Jan. 2018. 10 Feb. 2019 <https://www.fwi.co.uk/business/farmers-plan-make-februdairy-month-dairy-celebration>.

38

Hackett,LisaJ. "Dreaming of Yesterday: Fashioning Liminal Spaces in 1950s Nostalgia." M/C Journal 23, no.1 (March18, 2020). http://dx.doi.org/10.5204/mcj.1631.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The 1950s era appears to hold a nostalgic place in contemporary memories and current cultural practices. While the 1950s is a period that can signify a time from the late 1940s to the early 1960s (Guffey, 100), the era is often represented as a liminal space or dream world, mediated to reflect current desires. It is a dream-like world, situated half way between the mediated vision of the 1950s and today. Modern participants of 1950s culture need to negotiate what is authentic and what is not, because as Piatti-Farnell and Carpenter remind us ‘history is what we want it to be’ (their emphasis). The world of the 1950s can be bent to suit differing interpretations, but it can never be broken. This is because nostalgia functions as a social emotion as well as a personal one (Davis, vii). Drawing on interviews conducted with 27 women and three men, this article critically examines how the 1950s are nostalgically reimagined in contemporary culture via fashion and car festivals. This article asks: in dreaming of the past, how authentic is the 1950s reimagined today from the point of view of the participants?Liminal spaces exist for participants to engage in their nostalgic reimagining of 1950s culture. Throughout Australia, and in several other countries, nostalgic retro festivals have become commonplace. In Australia prominent annual events include Cooly Rocks On (Coolangatta, Qld.), Chromefest (The Entrance, NSW) and Greazefest (Brisbane, Qld.). Festivals provide spaces where nostalgia can be acted out socially. Bennett and Woodward consider festivals such as these to be giving individuals an “opportunity to participate in a gathering of like-minded individuals whose collective investment in the cultural texts and artefacts on display at the festival are part of their ongoing lifestyle project” (Bennett and Woodward, 15). Festivals are important social events where fans of the 1950s can share in the collective re-imagining of the 1950s.MethodologyEthnographic interviews with 30 participants who self-identified as wearers of 1950s style fashion. The interviews were conducted in person, via telephone and Skype. The participants come from a range of communities that engage with 1950s retro culture, including pin-up, rockabilly, rock'n'roll dancers and car club members. Due to the commonality of the shared 1950s space, the boundaries between the various cohorts can be fluid and thus some participants were involved with multiple groups. The researcher also immersed herself in the culture, conducting participant observation at various events such as retro festivals, pin-up competitions, shopping excursions and car club runs. Participants were given the option to have their real names used with just a few choosing to be anonymised. The participants ranged in age from 23 to their 60s.NostalgiaOur relationship with past eras is often steeped in nostalgia. Fred Davis (16-26) identified three orders of nostalgia: simple, reflexive and interpreted. Simple nostalgia “harbors the common belief that THINGS WERE BETTER (MORE BEAUTIFUL) (HEALTHIER) (HAPPIER) (MORE CIVILIZED) (MORE EXCITING) THEN THAN NOW” (Davis, 18, his emphasis). This is a relatively straightforward depiction of a halcyon past that is uncritical in its outlook. The second order, reflexive nostalgia, sees subjects question if their view of the past is untainted: “was it really that way?” (21). The third and final order sees the subject question the reasons behind the feelings of nostalgia, asking “why am I feeling nostalgic?” (24).Davis argues that nostalgia “must in some fashion be a personally experienced psst” rather than knowledge acquired second-hand (Davis, 8). Others dispute this, noting a vicarious or second-hand nostalgia can be experienced by those who have no direct experience of the past in question (Goulding, “Exploratory”). Christina Goulding’s work at heritage museums found two patterns of nostalgic behaviour amongst visitors whom she termed the existentials and the aesthetics (Goulding, “Romancing”). For the existentials, experiencing the liminal space of a heritage museum validated their nostalgia “because of their ability to construct their own values and ideologies relating to a particular time period in history and then to transpose these values to a time belonging to their own experiences, whether real or partially constructed” (Goulding “Romancing”, 575). This attitude is similar to Davis’s first order or simple nostalgia. In comparison, aesthetics viewed history differently; their nostalgia was grounded in an interest in history and its authentic reconstruction, and a desire to escape into an imaginary world, if only for an hour or two. However, they were more critical of the realism presented to them and aware of the limits of accuracy in reconstruction.Second-Hand NostalgiaFor the participants interviewed for this research, second-hand nostalgia for the 1950s was apparent for many. This is not very surprising given the time and distance between now and then. That is, a majority of the participants had not actually lived in the 1950s. For many their interest in the 1950s connected them to key family members such as mothers, fathers and grandparents. Two participants, Noel and Charlie, discussed fathers who were keen listeners of 1950s rock'n'roll music. Women often discussed female family members whose 1950s fashion sense they admired. Statements such as “I look back at the photos now and I think it would have been awesome if I had grown up in that era” (Noel) were common in interviews; however, many of them later qualified this with a more critical analysis of the time.For some, the 1950s represented a time when things were ‘better’. The range of indicators ran from the personal to the social:Curves and shapeliness were celebrated a little bit more in that era than they are now … when you look at the 50s woman they were a little bit curvier, when you think of pin-up and that kind of stuff, like Marilyn Monroe and Betty Page and all that sort of style, whereas for so long that hasn’t been where fashion has been at. So the average woman is bigger, or is curvier, or… So that’s kind of, it just works with my body shape in a way that modern stuff just doesn’t necessarily. (Ashleigh)I get treated differently when I wear Rockabilly as opposed to modern clothes. People will treat me more like a lady, will open doors for me … . I think people respect more people that dress like ladies than girls that let it all show. People have respect for people who respect themselves and I think Rockabilly allows you to do that. Allows you to be pretty and feminine without letting it all show. (Becky)For others, their fascination with the 1950s was limited to the aesthetic as they drew a more critical analysis of the era:There’s a housewife’s guide. I’m sure you’ve read that a housewife is expected to have a bow in her hair when her husband gets home from work. And should have the children in bed or silent. And we should be appreciating that he’s had a very hard day at work, so he should come home and put his feet up and we should rub his feet and provide him with a hot meal … . The mindset was different between then and now, and it’s not really that big a gap in history. (Belinda)The majority of women interviewed noted that they would be unwilling to relinquish modern social attitudes towards women to return to an era where women were expected to remain in the domestic sphere. They cited a number of differences, including technology (modern washing machines, dishwashers, etc.), gender relations (one participant noted rape in marriage), expectations to marry and have children young, careers, own finances etc.Nooooo! Absolutely not. Nooooo! No way! Oh my gosh! The labour in housework. Almost daily I’m grateful for the dishwasher and the stick Dyson for the floors and I don’t know, the steam iron. So many of the conveniences that you know, you go down stairs in the rush before the walk to school, throw the clothes into the washing machine and know that in 30 minutes it’s done. … No way would I go back. I absolutely would not want to live in the 50s regarding the social mores. It’s a little bit too repressive … . Love the look though! (Anna)Despite this, ‘outsiders’ (those who do not participate in 1950s subcultures) will often assume that since adherents are dressed in fifties style they obviously wish they could return there:And it sometimes will open a conversation where people will say “you should have been born earlier” or “I bet you wished you lived in the 50s” and I always say “no, I’m glad I live in an era where there’s less racism and sexism and I can work. (Emma)In contrast, men who were interviewed had expressed fewer barriers to living in the 1950s. Both Charlie and Noel were quick to say yes when asked if they would be happy to live in the actual 1950s. Even Ashley, a hom*osexual man who dresses in 1950s drag as a woman on the weekends would “give it a go”. This perhaps reflects the privileged position that white heterosexual men enjoyed in the era. Ashley could, like many hom*osexual men at the time, easily disguise his sexual orientation in order to fit into this privileged position, keeping his overt drag behaviour to “safe gay spaces” (Cole, 45). Further, all three men are white, although Charlie, being from a Cypriot background, may experience a different social response if he was to return to the actual 1950s. Immigrants from southern Europe were not welcomed by all Australians, with some openly hostile to the immigrants (Murphy, 156-64). Women, on the other hand, would experience a retrograde transformation of their position within society; women of colour even more so. This echoes other studies of historically based cohorts where women in particular hold progressive modern views and are reluctant to return to time periods such as the 1960s (Jenss) and the 1970s (Gregson, Brooks, and Crewe).Popular Cultures as a Conduit to the PastNostalgia is often mediated through popular culture, with many participants referencing popular icons of the fifties such as Elvis, Rita Hayworth, and Marilyn Monroe. This was complicated by references to popular culture films and music which were themselves a product of 1950s nostalgia, such as the movie Grease (1978) and the band the Stray Cats (1979-present). The 1950s has been the ongoing subject of revivalism since at least the late 1960s (Reynolds, 277), and this layering complicates social understandings of the decade. One participant, Charlie (in his late 50s), notes how the 1950s revival in the 1970s gave him the opportunity to immerse himself in the culture he admired. For Charlie, popular culture gave him the opportunity to wear authentic 1950s clothing and surround himself with 1950s memorabilia, music, and cars.Alternative clothing allows people to create an identity outside the parameters of contemporary fashion. For women, the thin body, replete with small breasts and hips, has been held up as the ideal in both mass media and fashion from advent of Twiggy in the 1960s to the present day (Hackett and Rall). Yet, 1950s style clothing allows wearers the freedom to create a fashionable identity that presents a different body ideal; that of the hyper-feminine woman who is characterised by her exaggerated hour-glass figure. This body shape has recently become fashionable again with influencers such as Kim Kardashian promoting this as an alternate to the thin body ideal. For men, the clothes represent the complimentary ideal of the hyper-masculine man: tight shirts, worker jeans, working class suits. Some participants, like Charlie, wear original 1950s clothing. I’ve got my dad’s sports coat, and I still wear it today … that song … [Marty Robins – ‘A white sport coat and a pink carnation’] … it explains that coat. My dad had it when he first came to Australia … I’ve still got it today and I still wear it proudly. (Charlie)However, due to the age of available authentic clothing, complicated by the fact that many garments from that era have already been recycled, there remains limited supply of true 1950s clothing for today’s fans. Most rely upon reproduction clothing which varies in its level of authenticity. Some reproduction brands remake styles from the fifties, whereas others are merely inspired by the era. In her study of costume, Valerie Cumming argued that it was “rare for clothing from previous eras to be worn in an unaltered state as it offered an alternative construction of identity” (Cumming, 109). Contemporary body sizes and shapes are different from their mid-century counterparts due to range of issues, particularly the average increase in body size. Women’s bust and waist measurements, for example, have increased by about ten percent over the last century (Etchells, Kinkade, and Henneberg). Further, technological advances in fabric coupled with changing social mores around undergarments mean that the body upon which garments sit is shaped differently. Most of the women in this study feel no need to wear restrictive, body modifying undergarments such as girdles or merry widows beneath their clothes. This echoes other research which reports that re-enactors wear clothes that are not really authentic, but “approximations created for twenty-first century” fans (Kiesel). Despite this diluting of 1950s style to suit modern sensibilities, the superficial look of the clothes are, for the participants, strongly reminiscent of the 1950s.I have a very Rubensesque body shape, so when I was younger that was the sort of styles that was better on me. So I like the pencil skirts enhanced a bit that weren’t supposed to be enhanced because I came from a very conservative Christian background. But then the A-line skirts were what my mom put me in to go to church and everything. Anyway it just looked really nice. As I watched television and saw those styles on some of those older shows that my parents let me watch, that is what I got drawn too, that sort of silhouette. (Donna, early 40s)The act of dressing in this way separates participants from the mainstream. Here fashion, in particular, differentiates this look from subcultural style. Dick Hebdige argued that subcultures are rooted in working class struggles, creating an alternate society away from the mainstream, where clothing becomes a critical identifier of group membership. Some participants extend their consumption of 1950s goods into areas such as homewares, cars and music. 1950s cars, particularly large American cars such as Cadillacs and Australian-made Holdens, are lovingly restored. Charlie, a mechanic by trade, has restored numerous cars for both himself and other people. Restoring cars can often be an expensive endeavour, locking out many would-be owners. A number of participants spoke of their desire to own an original car, even if it was out of their budget.Cars too are often modified from their original incarnation. Sometimes this is due to comfort, such as having modern day air-conditioning systems or power-steering installed. Other times this is due to legal requirements. It is not uncommon to see cars at festivals installed with child safety seats, when children during the actual 1950s often rode in cars without seatbelts even installed. Like clothing, it appears for cars that if the aesthetic is strongly reminiscent of the 1950s, then the underlying structural changes are acceptable.Identities and SpacesRetro festivals as liminal spaces provide the opportunity for participants to play at being in the actual 1950s. As a shared space they rely upon a critical mass of people to create and maintain this illusion. Participants who attended these events expressed a lot of enthusiasm for them:I just love the atmosphere, looking around, looking at the stalls and other people’s outfits. Listening to the music and having a dance. (Kathleen, early 20s)Oh, that’s my favourite weekend of the year … I’ve been to every single one since the first one. Yeah, I think this is the nineteenth year … And we all kind of, there’s a bunch of us that go and we stay near there and we are there for the whole thing. Yeah, and I’ve already started sewing my wardrobe. Planning my outfits. I don’t know, we just love it. There’s people that I only see once a year at Greazefest and I get to catch up with people. And I flit around like a social butterfly, like I’m running around, and I also have a thing where I call it the weekend of a thousand selfies. So I just take hundreds of selfies with people and myself and I do a big thing up every year. Yeah. But I love it, I love the music mainly. But it’s a good excuse, another good excuse, to make some nice outfits and get dressed up in something different. (Vicki, early 40s)So I’m at shows basically every weekend. Shows, swap meets and in the garage, there’s always something. And when you get into this car life, it drags the 50s in with you, if that is your decade. It just follows you in. (Ashleigh, early 20s)The festival space becomes liminal as it is not truly part of the past, but it is not of the present either. As Valerie Cumming's statement above notes, clothes from the past that are worn today are usually altered to suit modern sensibilities. So too are festivals which are designed and enacted within our contemporary paradigm. This can be seen in Pin-Up competitions which are present at many of the festivals. Rather than a parade of young beauties, modern interpretations feature a diverse vision of womanhood, representing a range of ages, body sizes, genders, and beauty ideals. For some participants this is an empowering liminal space.I went through a stage where I had severe depression and I found the thing that was making me happy was when I put on my 50s clothes and it’s an entire separate personality, because there is me, I’m a very quiet, normal person and there is Chevy Belle … and it’s this whole extra style, this extra confidence that I have and that was helping me through depression. (Ashleigh, early 20s)A Contested DreamIf the liminal space of a re-imagined 1950s is to succeed, members must negotiate, whether explicitly or implicitly, what constitutes this space. When is someone bending the rules, and when is someone breaking them? Throughout the interviews there was an undercurrent of controversy as to certain elements.The Pin-Up community was the most critiqued. Pin-Up style often references styles from both the forties and fifties, merging the two eras into one. Vicki questioned if their style was even 1950s at all:I don’t really understand where some of the pin-up looks come from. Like, sort of like, that’s not 50s. That’s not really 50s looking, so don’t call it 50s if it’s not … some of the hairstyles I sort of go “I don’t know what, what that is”. I’m not quite sure why everybody’s got victory … like got victory rolls when they’re not 1950s … I get a bit funny and I know it sounds really pretentious when I say it out loud. Yeah, I don’t know. I sound pretentious, I don’t want to sound pretentious. (Vicki, early 40s)Here Vicki is conflicted by her wish to be inclusive with her desire to be authentic. The critique continues into the use of tattoos and the type of people who entered these competitions:I found the pin-up competitions seem to be more for people, for the bigger ladies that wanted to wear the tattoos … rather than something that was just about the fashion ... (Simone, early 50s)Coinciding with Corrie Kiesel’s findings about Jane Austen festivals, “what constitutes the authentic for the festival community is still under negotiation”. The 1950s liminal space is a shared dream and subject to evolution as our changing contemporary norms and the desire for authenticity come into conflict and are temporarily resolved, before being challenged again.ConclusionVia 1950s fashion, cars, music, and festivals, the participants of this study show that there exist multiple liminal spaces in which identity and social boundaries are made malleable. As a result, there exists mostly inclusive spaces for the expression of an alternative social and cultural aesthetic. While engagement with 1950s culture, at least in this research, is predominantly feminine, men do participate albeit in different ways. Yet for both men and women, both are dreaming of a past that is constantly imaged and re-imagined, both on a personal level and on a social level.As the temporal distance between now and the actual 1950s expands, direct experience of the decade diminishes. This leaves the era open to re-interpretation as contemporary norms and values affect understandings of the past. Much of the focus in the interviews were upon the consumption of nostalgic goods rather than values. This conflict can be most strongly seen in the conflicted responses participants gave about pin-up competitions. For some participants the pin-ups were lacking in an essential authenticity, yet the pin-ups with their tattoos and reinterpretation of the past demonstrate how fluid and malleable a culture based on a past era can be. The 1950s scene promises to become more fluid as it undergoes further evolutionary steps in the future.ReferencesBennet, Andy, and Ian Woodward. “Festival Spaces, Identity, Experience and Belonging.” The Festivalization of Culture. Eds. Jodie Taylor and Andy Bennett. New York: Routledge, 2014. 25-40.Cole, Shaun. “Don We Now Our Gay Apparel”: Gay Men’s Dress in the Twentieth Century. Oxford: Berg, 2000.Cumming, Valerie. Understanding Fashion History. London: Batsford, 2004.Davis, Fred. Yearning for Yesterday: A Sociology of Nostalgia. New York: Free Press, 1979.Etchells, Nick, Lynda Kinkade, and Maciej Henneberg. "Growing Pains: We've All Heard about Australia's Obesity Crisis But the Truth Is, We're Getting Bigger in More Ways than One. 2014.Goulding, Chrintina. "Romancing the Past: Heritage Visiting and the Nostalgic Consumer." Psychology and Marketing 18.6 (2001). DOI: 10.1002/mar.1021.Goulding, Christina. “An Exploratory Studiy of Age Related Vicarious Nostalgia and Aesthetic Consumption.” NA-Advances in Consumer Research. Eds. Susan M. Broniarczyk and Kent Nakamoto. Valdosta, GA: Association for Consumer Research, 2002. 542-46.Gregson, Nicky, Kate Brooks, and Louise Crewe. “Bjorn Again? Rethinking 70s Revivalism through the Reappropriation of 70s Clothing.” Fashion Theory 5.1 (2001). DOI: 10.2752/136270401779045716.Hackett, Lisa J., and Denise N Rall. “The Size of the Problem with the Problem of Sizing: How Clothing Measurement Systems Have Misrepresented Women’s Bodies from the 1920s – Today.” Clothing Cultures 5.2 (2018): 263-83.Hebdige, Dick. Subculture: The Meaning of Style. Florence: Florence Taylor and Francis, 1979.Jenss, Heike. “Sixties Dress Only! The Consumption of the Past in a Retro Scene.” Old Clothers, New Looks: Second-Hand Fashion. Eds. Alexandra Palmer and Hazel Clark. Michigan: Bloomsbury Academic, 2005. 177-197.Kiesel, Corrie. “‘Jane Would Approve’: Gender and Authenticity at Louisiana’s Jane Austen Literary Festival.” Persuasions: The Jane Austen Journal 33.1 (2012). 1 Mar. 2020 <http://jasna.org/persuasions/on-line/vol33no1/kiesel.html>.Murphy, John. Imagining the Fifties: Private Sentiment and Political Cultre in Menzies’ Australia. Sydney: Pluto Press, 2000.Piatti-Farnell, Lorna, and Lloyd Carpenter. “Intersections of History, Media and Culture.” M/C Journal 20.5 (2017). 1 Mar. 2020 <http://journal.media-culture.org.au/index.php/mcjournal/article/view/1323>.Reynolds, Simon. Retromania: Pop Culture’s Addition to Its Own Past. London: Faber & Faber, 2011.FundingLisa J. Hackett is supported by the Commonwealth of Australia through the Research Training Programme.

39

Broderick, Mick, Stuart Marshall Bender, and Tony McHugh. "Virtual Trauma: Prospects for Automediality." M/C Journal 21, no.2 (April25, 2018). http://dx.doi.org/10.5204/mcj.1390.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Unlike some current discourse on automediality, this essay eschews most of the analysis concerning the adoption or modification of avatars to deliberately enhance, extend or distort the self. Rather than the automedial enabling of alternative, virtual selves modified by playful, confronting or disarming avatars we concentrate instead on emerging efforts to present the self in hyper-realist, interactive modes. In doing so we ask, what is the relationship between traumatic forms of automediation and the affective impact on and response of the audience? We argue that, while on the one hand there are promising avenues for valuable individual and social engagements with traumatic forms of automediation, there is an overwhelming predominance of suffering as a theme in such virtual depictions, comingled with uncritically asserted promises of empathy, which are problematic as the technology assumes greater mainstream uptake.As Smith and Watson note, embodiment is always a “translation” where the body is “dematerialized” in virtual representation (“Virtually” 78). Past scholarship has analysed the capacity of immersive realms, such as Second Life or online games, to highlight how users can modify their avatars in often spectacular, non-human forms. Critics of this mode of automediality note that users can adopt virtually any persona they like (racial, religious, gendered and sexual, human, animal or hybrid, and of any age), behaving as “identity tourists” while occupying virtual space or inhabiting online communities (Nakamura). Furthermore, recent work by Jaron Lanier, a key figure from the 1980s period of early Virtual Reality (VR) technology, has also explored so-called “homuncular flexibility” which describes the capacity for humans to seemingly adapt automatically to the control mechanisms of an avatar with multiple legs, other non-human appendages, or for two users to work in tandem to control a single avatar (Won et. al.). But this article is concerned less with these single or multi-player online environments and the associated concerns over modifying interactive identities. We are principally interested in other automedial modes where the “auto” of autobiography is automated via Artificial Intelligences (AIs) to convincingly mimic human discourse as narrated life-histories.We draw from case studies promoted by the 2017 season of ABC television’s flagship science program, Catalyst, which opened with semi-regular host and biological engineer Dr Jordan Nguyen, proclaiming in earnest, almost religious fervour: “I want to do something that has long been a dream. I want to create a copy of a human. An avatar. And it will have a life of its own in virtual reality.” As the camera followed Nguyen’s rapid pacing across real space he extolled: “Virtual reality, virtual human, they push the limits of the imagination and help us explore the impossible […] I want to create a virtual copy of a person. A digital addition to the family, using technology we have now.”The troubling implications of such rhetoric were stark and the next third of the program did little to allay such techno-scientific misgivings. Directed and produced by David Symonds, with Nguyen credited as co-developer and presenter, the episode “Meet the Avatars” immediately introduced scenarios where “volunteers” entered a pop-up inner city virtual lab, to experience VR for the first time. The volunteers were shown on screen subjected to a range of experimental VR environments designed to elicit fear and/or adverse and disorienting responses such as vertigo, while the presenter and researchers from Sydney University constantly smirked and laughed at their participants’ discomfort. We can only wonder what the ethics process was for both the ABC and university researchers involved in these broadcast experiments. There is little doubt that the participant/s experienced discomfort, if not distress, and that was televised to a national audience. Presenter Nguyen was also shown misleading volunteers on their way to the VR lab, when one asked “You’re not going to chuck us out of a virtual plane are you?” to which Nguyen replied “I don't know what we’re going to do yet,” when it was next shown that they immediately underwent pre-programmed VR exposure scenarios, including a fear of falling exercise from atop a city skyscraper.The sweat-inducing and heart rate-racing exposures to virtual plank walks high above a cityscape, or seeing subjects haptically viewing spiders crawl across their outstretched virtual hands, all elicited predictable responses, showcased as carnivalesque entertainment for the viewing audience. As we will see, this kind of trivialising of a virtual environment’s capacity for immersion belies the serious use of the technology in a range of treatments for posttraumatic stress disorder (see Rizzo and Koenig; Rothbaum, Rizzo and Difede).Figure 1: Nguyen and researchers enjoying themselves as their volunteers undergo VR exposure Defining AutomedialityIn their pioneering 2008 work, Automedialität: Subjektkonstitution in Schrift, Bild und neuen Medien, Jörg Dünne and Christian Moser coined the term “automediality” to problematise the production, application and distribution of autobiographic modes across various media and genres—from literary texts to audiovisual media and from traditional expression to inter/transmedia and remediated formats. The concept of automediality was deployed to counter the conventional critical exclusion of analysis of the materiality/technology used for an autobiographical purpose (Gernalzick). Dünne and Moser proffered a concept of automediality that rejects the binary division of (a) self-expression determining the mediated form or (b) (self)subjectivity being solely produced through the mediating technology. Hence, automediality has been traditionally applied to literary constructs such as autobiography and life-writing, but is now expanding into the digital domain and other “paratextual sites” (Maguire).As Nadja Gernalzick suggests, automediality should “encourage and demand not only a systematics and taxonomy of the constitution of the self in respectively genre-specific ways, but particularly also in medium-specific ways” (227). Emma Maguire has offered a succinct working definition that builds on this requirement to signal the automedial universally, noting it operates asa way of studying auto/biographical texts (of a variety of forms) that take into account how the effects of media shape the kinds of selves that can be represented, and which understands the self not as a preexisting subject that might be distilled into story form but as an entity that is brought into being through the processes of mediation.Sidonie Smith and Julia Watson point to automediality as a methodology, and in doing so emphasize how the telling or mediation of a life actually shapes the kind of story that can be told autobiographically. They state “media cannot simply be conceptualized as ‘tools’ for presenting a preexisting, essential self […] Media technologies do not just transparently present the self. They constitute and expand it” (Smith and Watson “Virtually Me” 77).This distinction is vital for understanding how automediality might be applied to self-expression in virtual domains, including the holographic avatar dreams of Nguyen throughout Catalyst. Although addressing this distinction in relation to online websites, following P. David Marshall’s description of “the proliferation of the public self”, Maguire notes:The same integration of digital spaces and platforms into daily life that is prompting the development of new tools in autobiography studies […] has also given rise to the field of persona studies, which addresses the ways in which individuals engage in practices of self-presentation in order to form commoditised identities that circulate in affective communities.For Maguire, these automedial works operate textually “to construct the authorial self or persona”.An extension to this digital, authorial construction is apparent in the exponential uptake of screen mediated prosumer generated content, whether online or theatrical (Miller). According to Gernalzick, unlike fictional drama films, screen autobiographies more directly enable “experiential temporalities”. Based on Mary Anne Doane’s promotion of the “indexicality” of film/screen representations to connote the real, Gernalzick suggests that despite semiotic theories of the index problematising realism as an index as representation, the film medium is still commonly comprehended as the “imprint of time itself”:Film and the spectator of film are said to be in a continuous present. Because the viewer is aware, however, that the images experienced in or even as presence have been made in the past, the temporality of the so-called filmic present is always ambiguous” (230).When expressed as indexical, automedial works, the intrinsic audio-visual capacities of film and video (as media) far surpass the temporal limitations of print and writing (Gernalzick, 228). One extreme example can be found in an emergent trend of “performance crime” murder and torture videos live-streamed or broadcast after the fact using mobile phone cameras and FaceBook (Bender). In essence, the political economy of the automedial ecology is important to understand in the overall context of self expression and the governance of content exhibition, access, distribution and—where relevant—interaction.So what are the implications for automedial works that employ virtual interfaces and how does this evolving medium inform both the expressive autobiographical mode and audiences subjectivities?Case StudyThe Catalyst program described above strove to shed new light on the potential for emerging technology to capture and create virtual avatars from living participants who (self-)generate autobiographical narratives interactively. Once past the initial gee-wiz journalistic evangelism of VR, the episode turned towards host Nguyen’s stated goal—using contemporary technology to create an autonomous virtual human clone. Nguyen laments that if he could create only one such avatar, his primary choice would be that of his grandfather who died when Nguyen was two years old—a desire rendered impossible. The awkward humour of the plank walk scenario sequence soon gives way as the enthusiastic Nguyen is surprised by his family’s discomfort with the idea of digitally recreating his grandfather.Nguyen next visits a Southern California digital media lab to experience the process by which 3D virtual human avatars are created. Inside a domed array of lights and cameras, in less than one second a life-size 3D avatar is recorded via 6,000 LEDs illuminating his face in 20 different combinations, with eight cameras capturing the exposures from multiple angles, all in ultra high definition. Called the Light Stage (Debevec), it is the same technology used to create a life size, virtual holocaust survivor, Pinchas Gutter (Ziv).We see Nguyen encountering a life-size, high-resolution 2D screen version of Gutter’s avatar. Standing before a microphone, Nguyen asks a series of questions about Gutter’s wartime experiences and life in the concentration camps. The responses are naturalistic and authentic, as are the pauses between questions. The high definition 4K screen is photo-realist but much more convincing in-situ (as an artifact of the Catalyst video camera recording, in some close-ups horizontal lines of transmission appear). According to the project’s curator, David Traum, the real Pinchas Gutter was recorded in 3D as a virtual holograph. He spent 25 hours providing 1,600 responses to a broad range of questions that the curator maintained covered “a lot of what people want to say” (Catalyst).Figure 2: The Museum of Jewish Heritage in Manhattan presented an installation of New Dimensions in Testimony, featuring Pinchas Gutter and Eva SchlossIt is here that the intersection between VR and auto/biography hybridise in complex and potentially difficult ways. It is where the concept of automediality may offer insight into this rapidly emerging phenomenon of creating interactive, hyperreal versions of our selves using VR. These hyperreal VR personae can be questioned and respond in real-time, where interrogators interact either as casual conversers or determined interrogators.The impact on visitors is sobering and palpable. As Nguyen relates at the end of his session, “I just want to give him a hug”. The demonstrable capacity for this avatar to engender a high degree of empathy from its automedial testimony is clear, although as we indicate below, it could simply indicate increased levels of emotion.Regardless, an ongoing concern amongst witnesses, scholars and cultural curators of memorials and museums dedicated to preserving the history of mass violence, and its associated trauma, is that once the lived experience and testimony of survivors passes with that generation the impact of the testimony diminishes (Broderick). New media modes of preserving and promulgating such knowledge in perpetuity are certainly worthy of embracing. As Stephen Smith, the executive director of the USC Shoah Foundation suggests, the technology could extendto people who have survived cancer or catastrophic hurricanes […] from the experiences of soldiers with post-traumatic stress disorder or survivors of sexual abuse, to those of presidents or great teachers. Imagine if a slave could have told her story to her grandchildren? (Ziv)Yet questions remain as to the veracity of these recorded personae. The avatars are created according to a specific agenda and the autobiographical content controlled for explicit editorial purposes. It is unclear what and why material has been excluded. If, for example, during the recorded questioning, the virtual holocaust survivor became mute at recollecting a traumatic memory, cried or sobbed uncontrollably—all natural, understandable and authentic responses given the nature of the testimony—should these genuine and spontaneous emotions be included along with various behavioural ticks such as scratching, shifting about in the seat and other naturalistic movements, to engender a more profound realism?The generation of the photorealist, mimetic avatar—remaining as an interactive persona long after the corporeal, authorial being is gone—reinforces Baudrillard’s concept of simulacra, where a clone exists devoid of its original entity and unable to challenge its automedial discourse. And what if some unscrupulous hacker managed to corrupt and subvert Gutter’s AI so that it responded antithetically to its purpose, by denying the holocaust ever happened? The ethical dilemmas of such a paradigm were explored in the dystopian 2013 film, The Congress, where Robyn Wright plays herself (and her avatar), as an out of work actor who sells off the rights to her digital self. A movie studio exploits her screen persona in perpetuity, enabling audiences to “become” and inhabit her avatar in virtual space while she is limited in the real world from undertaking certain actions due to copyright infringement. The inability of Wright to control her mimetic avatar’s discourse or action means the assumed automedial agency of her virtual self as an immortal, interactive being remains ontologically perplexing.Figure 3: Robyn Wright undergoing a full body photogrammetry to create her VR avatar in The Congress (2013)The various virtual exposures/experiences paraded throughout Catalyst’s “Meet the Avatars” paradoxically recorded and broadcast a range of troubling emotional responses to such immersion. Many participant responses suggest great caution and sensitivity be undertaken before plunging headlong into the new gold rush mentality of virtual reality, augmented reality, and AI affordances. Catalyst depicted their program subjects often responding in discomfort and distress, with some visibly overwhelmed by their encounters and left crying. There is some irony that presenter Ngyuen was himself relying on the conventions of 2D linear television journalism throughout, adopting face-to-camera address in (unconscious) automedial style to excitedly promote the assumed socio-cultural boon such automedial VR avatars will generate.Challenging AuthenticityThere are numerous ethical considerations surrounding the potential for AIs to expand beyond automedial (self-)expression towards photorealist avatars interacting outside of their pre-recorded content. When such systems evolve it may be neigh impossible to discern on screen whether the person you are conversing with is authentic or an indistinguishable, virtual doppelganger. In the future, a variant on the Turning Test may be needed to challenge and identify such hyperreal simulacra. We may be witnessing the precursor to such a dilemma playing out in the arena of audio-only podcasts, with some public intellectuals such as Sam Harris already discussing the legal and ethical problems from technology that can create audio from typed text that convincingly replicate the actual voice of a person by sampling approximately 30 minutes of their original speech (Harris). Such audio manipulation technology will soon be available to anybody with the motivation and relatively minor level of technological ability in order to assume an identity and masquerade as automediated dialogue. However, for the moment, the ability to convincingly alter a real-time computer generated video image of a person remains at the level of scientific innovation.Also of significance is the extent to which the audience reactions to such automediated expressions are indeed empathetic or simply part of the broader range of affective responses that also include direct sympathy as well as emotions such as admiration, surprise, pity, disgust and contempt (see Plantinga). There remains much rhetorical hype surrounding VR as the “ultimate empathy machine” (Milk). Yet the current use of the term “empathy” in VR, AI and automedial forms of communication seems to be principally focused on the capacity for the user-viewer to ameliorate negatively perceived emotions and experiences, whether traumatic or phobic.When considering comments about authenticity here, it is important to be aware of the occasional slippage of technological terminology into the mainstream. For example, the psychological literature does emphasise that patients respond strongly to virtual scenarios, events, and details that appear to be “authentic” (Pertaub, Slater, and Barker). Authentic in this instance implies a resemblance to a corresponding scenario/activity in the real world. This is not simply another word for photorealism, but rather it describes for instance the experimental design of one study in which virtual (AI) audience members in a virtual seminar room designed to treat public speaking anxiety were designed to exhibit “random autonomous behaviours in real-time, such as twitches, blinks, and nods, designed to encourage the illusion of life” (Kwon, Powell and Chalmers 980). The virtual humans in this study are regarded as having greater authenticity than an earlier project on social anxiety (North, North, and Coble) which did not have much visual complexity but did incorporate researcher-triggered audio clips of audience members “laughing, making comments, encouraging the speaker to speak louder or more clearly” (Kwon, Powell, and Chalmers 980). The small movements, randomly cued rather than according to a recognisable pattern, are described by the researchers as creating a sense of authenticity in the VR environment as they seem to correspond to the sorts of random minor movements that actual human audiences in a seminar can be expected to make.Nonetheless, nobody should regard an interaction with these AIs, or the avatar of Gutter, as in any way an encounter with a real person. Rather, the characteristics above function to create a disarming effect and enable the real person-viewer to willingly suspend their disbelief and enter into a pseudo-relationship with the AI; not as if it is an actual relationship, but as if it is a simulation of an actual relationship (USC). Lucy Suchman and colleagues invoke these ideas in an analysis of a YouTube video of some apparently humiliating human interactions with the MIT created AI-robot Mertz. Their analysis contends that, while it may appear on first glance that the humans’ mocking exchange with Mertz are mean-spirited, there is clearly a playfulness and willingness to engage with a form of AI that is essentially continuous with “long-standing assumptions about communication as information processing, and in the robot’s performance evidence for the limits to the mechanical reproduction of interaction as we know it through computational processes” (Suchman, Roberts, and Hird).Thus, it will be important for future work in the area of automediated testimony to consider the extent to which audiences are willing to suspend disbelief and treat the recounted traumatic experience with appropriate gravitas. These questions deserve attention, and not the kind of hype displayed by the current iteration of techno-evangelism. Indeed, some of this resurgent hype has come under scrutiny. From the perspective of VR-based tourism, Janna Thompson has recently argued that “it will never be a substitute for encounters with the real thing” (Thompson). Alyssa K. Loh, for instance, also argues that many of the negatively themed virtual experiences—such as those that drop the viewer into a scene of domestic violence or the location of a terrorist bomb attack—function not to put you in the position of the actual victim but in the position of the general category of domestic violence victim, or bomb attack victim, thus “deindividuating trauma” (Loh).Future work in this area should consider actual audience responses and rely upon mixed-methods research approaches to audience analysis. In an era of alt.truth and Cambridge Analytics personality profiling from social media interaction, automediated communication in the virtual guise of AIs demands further study.ReferencesAnon. “New Dimensions in Testimony.” Museum of Jewish Heritage. 15 Dec. 2017. 19 Apr. 2018 <http://mjhnyc.org/exhibitions/new-dimensions-in-testimony/>.Australian Broadcasting Corporation. “Meet The Avatars.” Catalyst, 15 Aug. 2017.Baudrillard, Jean. “Simulacra and Simulations.” Jean Baudrillard: Selected Writings. Ed. Mark Poster. Stanford: Stanford UP, 1988. 166-184.Bender, Stuart Marshall. Legacies of the Degraded Image in Violent Digital Media. Basingstoke: Palgrave Macmillan, 2017.Broderick, Mick. “Topographies of Trauma, Dark Tourism and World Heritage: Hiroshima’s Genbaku Dome.” Intersections: Gender and Sexuality in Asia and the Pacific. 24 Apr. 2010. 14 Apr. 2018 <http://intersections.anu.edu.au/issue24/broderick.htm>.Debevec, Paul. “The Light Stages and Their Applications to Photoreal Digital Actors.” SIGGRAPH Asia. 2012.Doane, Mary Ann. The Emergence of Cinematic Time: Modernity, Contingency, the Archive. Cambridge: Harvard UP, 2002.Dünne, Jörg, and Christian Moser. “Allgemeine Einleitung: Automedialität”. Automedialität: Subjektkonstitution in Schrift, Bild und neuen Medien. Eds. Jörg Dünne and Christian Moser. München: Wilhelm Fink, 2008. 7-16.Harris, Sam. “Waking Up with Sam Harris #64 – Ask Me Anything.” YouTube, 16 Feb. 2017. 16 Mar. 2018 <https://www.youtube.com/watch?v=gMTuquaAC4w>.Kwon, Joung Huem, John Powell, and Alan Chalmers. “How Level of Realism Influences Anxiety in Virtual Reality Environments for a Job Interview.” International Journal of Human-Computer Studies 71.10 (2013): 978-87.Loh, Alyssa K. "I Feel You." Artforum, Nov. 2017. 10 Apr. 2018 <https://www.artforum.com/print/201709/alyssa-k-loh-on-virtual-reality-and-empathy-71781>.Marshall, P. David. “Persona Studies: Mapping the Proliferation of the Public Self.” Journalism 15.2 (2014): 153-170.Mathews, Karen. “Exhibit Allows Virtual ‘Interviews’ with Holocaust Survivors.” Phys.org Science X Network, 15 Dec. 2017. 18 Apr. 2018 <https://phys.org/news/2017-09-virtual-holocaust-survivors.html>.Maguire, Emma. “Home, About, Shop, Contact: Constructing an Authorial Persona via the Author Website” M/C Journal 17.9 (2014).Miller, Ken. More than Fifteen Minutes of Fame: The Evolution of Screen Performance. Unpublished PhD Thesis. Murdoch University. 2009.Milk, Chris. “Ted: How Virtual Reality Can Create the Ultimate Empathy Machine.” TED Conferences, LLC. 16 Mar. 2015. <https://www.ted.com/talks/chris_milk_how_virtual_reality_can_create_the_ultimate_empathy_machine>.Nakamura, Lisa. “Cyberrace.” Identity Technologies: Constructing the Self Online. Eds. Anna Poletti and Julie Rak. Madison, Wisconsin: U of Wisconsin P, 2014. 42-54.North, Max M., Sarah M. North, and Joseph R Coble. "Effectiveness of Virtual Environment Desensitization in the Treatment of Agoraphobia." International Journal of Virtual Reality 1.2 (1995): 25-34.Pertaub, David-Paul, Mel Slater, and Chris Barker. “An Experiment on Public Speaking Anxiety in Response to Three Different Types of Virtual Audience.” Presence: Teleoperators and Virtual Environments 11.1 (2002): 68-78.Plantinga, Carl. "Emotion and Affect." The Routledge Companion to Philosophy and Film. Eds. Paisley Livingstone and Carl Plantinga. New York: Routledge, 2009. 86-96.Rizzo, A.A., and Sebastian Koenig. “Is Clinical Virtual Reality Ready for Primetime?” Neuropsychology 31.8 (2017): 877-99.Rothbaum, Barbara O., Albert “Skip” Rizzo, and JoAnne Difede. "Virtual Reality Exposure Therapy for Combat-Related Posttraumatic Stress Disorder." Annals of the New York Academy of Sciences 1208.1 (2010): 126-32.Smith, Sidonie, and Julia Watson. Reading Autobiography: A Guide to Interpreting Life Narratives. 2nd ed. Minneapolis: U of Minnesota P, 2010.———. “Virtually Me: A Toolbox about Online Self-Presentation.” Identity Technologies: Constructing the Self Online. Eds. Anna Poletti and Julie Rak. Madison: U of Wisconsin P, 2014. 70-95.Suchman, Lucy, Celia Roberts, and Myra J. Hird. "Subject Objects." Feminist Theory 12.2 (2011): 119-45.Thompson, Janna. "Why Virtual Reality Cannot Match the Real Thing." The Conversation, 14 Mar. 2018. 10 Apr. 2018 <http://theconversation.com/why-virtual-reality-cannot-match-the-real-thing-92035>.USC. "Skip Rizzo on Medical Virtual Reality: USC Global Conference 2014." YouTube, 28 Oct. 2014. 2 Apr. 2018 <https://www.youtube.com/watch?v=PdFge2XgDa8>.Won, Andrea Stevenson, Jeremy Bailenson, Jimmy Lee, and Jaron Lanier. "Homuncular Flexibility in Virtual Reality." Journal of Computer-Mediated Communication 20.3 (2015): 241-59.Ziv, Stan. “How Technology Is Keeping Holocaust Survivor Stories Alive Forever”. Newsweek, 18 Oct. 2017. 19 Apr. 2018 <http://www.newsweek.com/2017/10/27/how-technology-keeping-holocaust-survivor-stories-alive-forever-687946.html>.

40

Wark, McKenzie. "Toywars." M/C Journal 6, no.3 (June1, 2003). http://dx.doi.org/10.5204/mcj.2179.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

I first came across etoy in Linz, Austria in 1995. They turned up at Ars Electronica with their shaved heads, in their matching orange bomber jackets. They were not invited. The next year they would not have to crash the party. In 1996 they were awarded Arts Electronica’s prestigious Golden Nica for web art, and were on their way to fame and bitterness – the just rewards for their art of self-regard. As founding member Agent.ZAI says: “All of us were extremely greedy – for excitement, for drugs, for success.” (Wishart & Boschler: 16) The etoy story starts on the fringes of the squatters’ movement in Zurich. Disenchanted with the hard left rhetorics that permeate the movement in the 1980s, a small group look for another way of existing within a commodified world, without the fantasy of an ‘outside’ from which to critique it. What Antonio Negri and friends call the ‘real subsumption’ of life under the rule of commodification is something etoy grasps intuitively. The group would draw on a number of sources: David Bowie, the Sex Pistols, the Manchester rave scene, European Amiga art, rumors of the historic avant gardes from Dada to Fluxus. They came together in 1994, at a meeting in the Swiss resort town of Weggis on Lake Lucerne. While the staging of the founding meeting looks like a rerun of the origins of the Situationist International, the wording of the invitation might suggest the founding of a pop music boy band: “fun, money and the new world?” One of the – many – stories about the origins of the name Dada has it being chosen at random from a bilingual dictionary. The name etoy, in an update on that procedure, was spat out by a computer program designed to make four letter words at random. Ironically, both Dada and etoy, so casually chosen, would inspire furious struggles over the ownership of these chancey 4-bit words. The group decided to make money by servicing the growing rave scene. Being based in Vienna and Zurich, the group needed a way to communicate, and chose to use the internet. This was a far from obvious thing to do in 1994. Connections were slow and unreliable. Sometimes it was easier to tape a hard drive full of clubland graphics to the underside of a seat on the express train from Zurich to Vienna and simply email instructions to meet the train and retrieve it. The web was a primitive instrument in 1995 when etoy built its first website. They launched it with a party called etoy.FASTLANE, an optimistic title when the web was anything but. Coco, a transsexual model and tabloid sensation, sang a Japanese song while suspended in the air. She brought media interest, and was anointed etoy’s lifestyle angel. As Wishart and Bochsler write, “it was as if the Seven Dwarfs had discovered their Snow White.” (Wishart & Boschler: 33) The launch didn’t lead to much in the way of a music deal or television exposure. The old media were not so keen to validate the etoy dream of lifting themselves into fame and fortune by their bootstraps. And so etoy decided to be stars of the new media. The slogan was suitably revised: “etoy: the pop star is the pilot is the coder is the designer is the architect is the manager is the system is etoy.” (Wishart & Boschler: 34) The etoy boys were more than net.artists, they were artists of the brand. The brand was achieving a new prominence in the mid-90s. (Klein: 35) This was a time when capitalism was hollowing itself out in the overdeveloped world, shedding parts of its manufacturing base. Control of the circuits of commodification would rest less on the ownership of the means of production and more on maintaining a monopoly on the flows of information. The leading edge of the ruling class was becoming self-consciously vectoral. It controlled the flow of information about what to produce – the details of design, the underlying patents. It controlled the flows of information about what is produced – the brands and logos, the slogans and images. The capitalist class is supplanted by a vectoral class, controlling the commodity circuit through the vectors of information. (Wark) The genius of etoy was to grasp the aesthetic dimension of this new stage of commodification. The etoy boys styled themselves not so much as a parody of corporate branding and management groupthink, but as logical extension of it. They adopted matching uniforms and called themselves agents. In the dada-punk-hiphop tradition, they launched themselves on the world as brand new, self-created, self-named subjects: Agents Zai, Brainhard, Gramazio, Kubli, Esposto, Udatny and Goldstein. The etoy.com website was registered in 1995 with Network Solutions for a $100 fee. The homepage for this etoy.TANKSYSTEM was designed like a flow chart. As Gramazio says: “We wanted to create an environment with surreal content, to build a parallel world and put the content of this world into tanks.” (Wishart & Boschler: 51) One tank was a cybermotel, with Coco the first guest. Another tank showed you your IP number, with a big-brother eye looking on. A supermarket tank offered sunglasses and laughing gas for sale, but which may or may not be delivered. The underground tank included hardcore photos of a sensationalist kind. A picture of the Federal Building in Oklamoma City after the bombing was captioned in deadpan post-situ style “such work needs a lot of training.” (Wishart & Boschler: 52) The etoy agents were by now thoroughly invested in the etoy brand and the constellation of images they had built around it, on their website. Their slogan became “etoy: leaving reality behind.” (Wishart & Boschler: 53) They were not the first artists fascinated by commodification. It was Warhol who said “good art is good business.”(Warhol ) But etoy reversed the equation: good business is good art. And good business, in this vectoral age, is in its most desirable form an essentially conceptual matter of creating a brand at the center of a constellation of signifiers. Late in 1995, etoy held another group meeting, at the Zurich youth center Dynamo. The problem was that while they had build a hardcore website, nobody was visiting it. Agents Gooldstein and Udatny thought that there might be a way of using the new search engines to steer visitors to the site. Zai and Brainhard helped secure a place at the Vienna Academy of Applied Arts where Udatny could use the computer lab to implement this idea. Udatny’s first step was to create a program that would go out and gather email addresses from the web. These addresses would form the lists for the early examples of art-spam that etoy would perpetrate. Udatny’s second idea was a bit more interesting. He worked out how to get the etoy.TANKSYSTEM page listed in search engines. Most search engines ranked pages by the frequency of the search term in the pages it had indexed, so etoy.TANKSYSTEM would contain pages of selected keywords. p*rn sites were also discovering this method of creating free publicity. The difference was that etoy chose a very carefully curated list of 350 search terms, including: art, bondage, cyberspace, Doom, Elvis, Fidel, genx, heroin, internet, jungle and Kant. Users of search engines who searched for these terms would find dummy pages listed prominently in their search results that directed them, unsuspectingly, to etoy.com. They called this project Digital Hijack. To give the project a slightly political aura, the pages the user was directed to contained an appeal for the release of convicted hacker Kevin Mitnick. This was the project that won them a Golden Nica statuette at Ars Electronica in 1996, which Gramazio allegedly lost the same night playing roulette. It would also, briefly, require that they explain themselves to the police. Digital Hijack also led to the first splits in the group, under the intense pressure of organizing it on a notionally collective basis, but with the zealous Agent Zai acting as de facto leader. When Udatny was expelled, Zai and Brainhard even repossessed his Toshiba laptop, bought with etoy funds. As Udatny recalls, “It was the lowest point in my life ever. There was nothing left; I could not rely on etoy any more. I did not even have clothes, apart from the etoy uniform.” (Wishart & Boschler: 104) Here the etoy story repeats a common theme from the history of the avant gardes as forms of collective subjectivity. After Digital Hijack, etoy went into a bit of a slump. It’s something of a problem for a group so dependent on recognition from the other of the media, that without a buzz around them, etoy would tend to collapse in on itself like a fading supernova. Zai spend the early part of 1997 working up a series of management documents, in which he appeared as the group’s managing director. Zai employed the current management theory rhetoric of employee ‘empowerment’ while centralizing control. Like any other corporate-Trotskyite, his line was that “We have to get used to reworking the company structure constantly.” (Wishart & Boschler: 132) The plan was for each member of etoy to register the etoy trademark in a different territory, linking identity to information via ownership. As Zai wrote “If another company uses our name in a grand way, I’ll probably shoot myself. And that would not be cool.” (Wishart & Boschler:: 132) As it turned out, another company was interested – the company that would become eToys.com. Zai received an email offering “a reasonable sum” for the etoy.com domain name. Zai was not amused. “Damned Americans, they think they can take our hunting grounds for a handful of glass pearls….”. (Wishart & Boschler: 133) On an invitation from Suzy Meszoly of C3, the etoy boys traveled to Budapest to work on “protected by etoy”, a work exploring internet security. They spent most of their time – and C3’s grant money – producing a glossy corporate brochure. The folder sported a blurb from Bjork: “etoy: immature priests from another world” – which was of course completely fabricated. When Artothek, the official art collection of the Austrian Chancellor, approached etoy wanting to buy work, the group had to confront the problem of how to actually turn their brand into a product. The idea was always that the brand was the product, but this doesn’t quite resolve the question of how to produce the kind of unique artifacts that the art world requires. Certainly the old Conceptual Art strategy of selling ‘documentation’ would not do. The solution was as brilliant as it was simple – to sell etoy shares. The ‘works’ would be ‘share certificates’ – unique objects, whose only value, on the face of it, would be that they referred back to the value of the brand. The inspiration, according to Wishart & Boschsler, was David Bowie, ‘the man who sold the world’, who had announced the first rock and roll bond on the London financial markets, backed by future earnings of his back catalogue and publishing rights. Gramazio would end up presenting Chancellor Viktor Klima with the first ‘shares’ at a press conference. “It was a great start for the project”, he said, “A real hack.” (Wishart & Boschler: 142) For this vectoral age, etoy would create the perfect vectoral art. Zai and Brainhard took off next for Pasadena, where they got the idea of reverse-engineering the online etoy.TANKSYSTEM by building an actual tank in an orange shipping container, which would become etoy.TANK 17. This premiered at the San Francisco gallery Blasthaus in June 1998. Instant stars in the small world of San Francisco art, the group began once again to disintegrate. Brainhard and Esposito resigned. Back in Europe in late 1998, Zai was preparing to graduate from the Vienna Academy of Applied Arts. His final project would recapitulate the life and death of etoy. It would exist from here on only as an online archive, a digital mausoleum. As Kubli says “there was no possibility to earn our living with etoy.” (Wishart & Boschler: 192) Zai emailed eToys.com and asked them if them if they would like to place a banner ad on etoy.com, to redirect any errant web traffic. Lawyers for eToys.com offered etoy $30,000 for the etoy.com domain name, which the remaining members of etoy – Zai, Gramazio, Kubli – refused. The offer went up to $100,000, which they also refused. Through their lawyer Peter Wild they demanded $750,000. In September 1999, while etoy were making a business presentation as their contribution to Ars Electronica, eToys.com lodged a complaint against etoy in the Los Angeles Superior Court. The company hired Bruce Wessel, of the heavyweight LA law firm Irell & Manella, who specialized in trademark, copyright and other intellectual property litigation. The complaint Wessel drafted alleged that etoy had infringed and diluted the eToys trademark, were practicing unfair competition and had committed “intentional interference with prospective economic damage.” (Wishart & Boschler: 199) Wessel demanded an injunction that would oblige etoy to cease using its trademark and take down its etoy.com website. The complaint also sought to prevent etoy from selling shares, and demanded punitive damages. Displaying the aggressive lawyering for which he was so handsomely paid, Wessel invoked the California Unfair Competition Act, which was meant to protect citizens from fraudulent business scams. Meant as a piece of consumer protection legislation, its sweeping scope made it available for inventive suits such as Wessel’s against etoy. Wessel was able to use pretty much everything from the archive etoy built against it. As Wishart and Bochsler write, “The court papers were like a delicately curated catalogue of its practices.” (Wishart & Boschler: 199) And indeed, legal documents in copyright and trademark cases may be the most perfect literature of the vectoral age. The Unfair Competition claim was probably aimed at getting the suit heard in a Californian rather than a Federal court in which intellectual property issues were less frequently litigated. The central aim of the eToys suit was the trademark infringement, but on that head their claims were not all that strong. According to the 1946 Lanham Act, similar trademarks do not infringe upon each other if there they are for different kinds of business or in different geographical areas. The Act also says that the right to own a trademark depends on its use. So while etoy had not registered their trademark and eToys had, etoy were actually up and running before eToys, and could base their trademark claim on this fact. The eToys case rested on a somewhat selective reading of the facts. Wessel claimed that etoy was not using its trademark in the US when eToys was registered in 1997. Wessel did not dispute the fact that etoy existed in Europe prior to that time. He asserted that owning the etoy.com domain name was not sufficient to establish a right to the trademark. If the intention of the suit was to bully etoy into giving in, it had quite the opposite effect. It pissed them off. “They felt again like the teenage punks they had once been”, as Wishart & Bochsler put it. Their art imploded in on itself for lack of attention, but called upon by another, it flourished. Wessel and eToys.com unintentionally triggered a dialectic that worked in quite the opposite way to what they intended. The more pressure they put on etoy, the more valued – and valuable – they felt etoy to be. Conceptual business, like conceptual art, is about nothing but the management of signs within the constraints of given institutional forms of market. That this conflict was about nothing made it a conflict about everything. It was a perfectly vectoral struggle. Zai and Gramazio flew to the US to fire up enthusiasm for their cause. They asked Wolfgang Staehle of The Thing to register the domain toywar.com, as a space for anti-eToys activities at some remove from etoy.com, and as a safe haven should eToys prevail with their injunction in having etoy.com taken down. The etoy defense was handled by Marcia Ballard in New York and Robert Freimuth in Los Angeles. In their defense, they argued that etoy had existed since 1994, had registered its globally accessible domain in 1995, and won an international art prize in 1996. To counter a claim by eToys that they had a prior trademark claim because they had bought a trademark from another company that went back to 1990, Ballard and Freimuth argued that this particular trademark only applied to the importation of toys from the previous owner’s New York base and thus had no relevance. They capped their argument by charging that eToys had not shown that its customers were really confused by the existence of etoy. With Christmas looming, eToys wanted a quick settlement, so they offered Zurich-based etoy lawyer Peter Wild $160,000 in shares and cash for the etoy domain. Kubli was prepared to negotiate, but Zai and Gramazio wanted to gamble – and raise the stakes. As Zai recalls: “We did not want to be just the victims; that would have been cheap. We wanted to be giants too.” (Wishart & Boschler: 207) They refused the offer. The case was heard in November 1999 before Judge Rafeedie in the Federal Court. Freimuth, for etoy, argued that federal Court was the right place for what was essentially a trademark matter. Robert Kleiger, for eToys, countered that it should stay where it was because of the claims under the California Unfair Competition act. Judge Rafeedie took little time in agreeing with the eToys lawyer. Wessel’s strategy paid off and eToys won the first skirmish. The first round of a quite different kind of conflict opened when etoy sent out their first ‘toywar’ mass mailing, drawing the attention of the net.art, activism and theory crowd to these events. This drew a report from Felix Stalder in Telepolis: “Fences are going up everywhere, molding what once seemed infinite space into an overcrowded and tightly controlled strip mall.” (Stalder ) The positive feedback from the net only emboldened etoy. For the Los Angeles court, lawyers for etoy filed papers arguing that the sale of ‘shares’ in etoy was not really a stock offering. “The etoy.com website is not about commerce per se, it is about artist and social protest”, they argued. (Wishart & Boschler: 209) They were obliged, in other words, to assert a difference that the art itself had intended to blur in order to escape eToy’s claims under the Unfair Competition Act. Moreover, etoy argued that there was no evidence of a victim. Nobody was claiming to have been fooled by etoy into buying something under false pretences. Ironically enough, art would turn out in hindsight to be a more straightforward transaction here, involving less simulation or dissimulation, than investing in a dot.com. Perhaps we have reached the age when art makes more, not less, claim than business to the rhetorical figure of ‘reality’. Having defended what appeared to be the vulnerable point under the Unfair Competition law, etoy went on the attack. It was the failure of eToys to do a proper search for other trademarks that created the problem in the first place. Meanwhile, in Federal Court, lawyers for etoy launched a counter-suit that reversed the claims against them made by eToys on the trademark question. While the suits and counter suits flew, eToys.com upped their offer to settle to a package of cash and shares worth $400,000. This rather puzzled the etoy lawyers. Those choosing to sue don’t usually try at the same time to settle. Lawyer Peter Wild advised his clients to take the money, but the parallel tactics of eToys.com only encouraged them to dig in their heels. “We felt that this was a tremendous final project for etoy”, says Gramazio. As Zai says, “eToys was our ideal enemy – we were its worst enemy.” (Wishart & Boschler: 210) Zai reported the offer to the net in another mass mail. Most people advised them to take the money, including Doug Rushkoff and Heath Bunting. Paul Garrin counseled fighting on. The etoy agents offered to settle for $750,000. The case came to court in late November 1999 before Judge Shook. The Judge accepted the plausibility of the eToys version of the facts on the trademark issue, which included the purchase of a registered trademark from another company that went back to 1990. He issued an injunction on their behalf, and added in his statement that he was worried about “the great danger of children being exposed to profane and hardcore p*rnographic issues on the computer.” (Wishart & Boschler: 222) The injunction was all eToys needed to get Network Solutions to shut down the etoy.com domain. Zai sent out a press release in early December, which percolated through Slashdot, rhizome, nettime (Staehle) and many other networks, and catalyzed the net community into action. A debate of sorts started on investor websites such as fool.com. The eToys stock price started to slide, and etoy ‘warriors’ felt free to take the credit for it. The story made the New York Times on 9th December, Washington Post on the 10th, Wired News on the 11th. Network Solutions finally removed the etoy.com domain on the 10th December. Zai responded with a press release: “this is robbery of digital territory, American imperialism, corporate destruction and bulldozing in the way of the 19th century.” (Wishart & Boschler: 237) RTMark set up a campaign fund for toywar, managed by Survival Research Laboratories’ Mark Pauline. The RTMark press release promised a “new internet ‘game’ designed to destroy eToys.com.” (Wishart & Boschler: 239) The RTMark press release grabbed the attention of the Associated Press newswire. The eToys.com share price actually rose on December 13th. Goldman Sachs’ e-commerce analyst Anthony Noto argued that the previous declines in the Etoys share price made it a good buy. Goldman Sachs was the lead underwriter of the eToys IPO. Noto’s writings may have been nothing more than the usual ‘IPOetry’ of the time, but the crash of the internet bubble was some months away yet. The RTMark campaign was called ‘The Twelve Days of Christmas’. It used the Floodnet technique that Ricardo Dominguez used in support of the Zapatistas. As Dominguez said, “this hysterical power-play perfectly demonstrates the intensions of the new net elite; to turn the World Wide Web into their own private home-shopping network.” (Wishart & Boschler: 242) The Floodnet attack may have slowed the eToys.com server down a bit, but it was robust and didn’t crash. Ironically, it ran on open source software. Dominguez claims that the ‘Twelve Days’ campaign, which relied on individuals manually launching Floodnet from their own computers, was not designed to destroy the eToys site, but to make a protest felt. “We had a single-bullet script that could have taken down eToys – a tactical nuke, if you will. But we felt this script did not represent the presence of a global group of people gathered to bear witness to a wrong.” (Wishart & Boschler: 245) While the eToys engineers did what they could to keep the site going, eToys also approached universities and businesses whose systems were being used to host Floodnet attacks. The Thing, which hosted Dominguez’s eToys Floodnet site was taken offline by The Thing’s ISP, Verio. After taking down the Floodnet scripts, The Thing was back up, restoring service to the 200 odd websites that The Thing hosted besides the offending Floodnet site. About 200 people gathered on December 20th at a demonstration against eToys outside the Museum of Modern Art. Among the crowd were Santas bearing signs that said ‘Coal for eToys’. The rally, inside the Museum, was led by the Reverend Billy of the Church of Stop Shopping: “We are drowning in a sea of identical details”, he said. (Wishart & Boschler: 249-250) Meanwhile etoy worked on the Toywar Platform, an online agitpop theater spectacle, in which participants could act as soldiers in the toywar. This would take some time to complete – ironically the dispute threatened to end before this last etoy artwork was ready, giving etoy further incentives to keep the dispute alive. The etoy agents had a new lawyer, Chris Truax, who was attracted to the case by the publicity it was generating. Through Truax, etoy offered to sell the etoy domain and trademark for $3.7 million. This may sound like an insane sum, but to put it in perspective, the business.com site changed hands for $7.5 million around this time. On December 29th, Wessel signaled that eToys was prepared to compromise. The problem was, the Toywar Platform was not quite ready, so etoy did what it could to drag out the negotiations. The site went live just before the scheduled court hearings, January 10th 2000. “TOYWAR.com is a place where all servers and all involved people melt and build a living system. In our eyes it is the best way to express and document what’s going on at the moment: people start to about new ways to fight for their ideas, their lifestyle, contemporary culture and power relations.” (Wishart & Boschler: 263) Meanwhile, in a California courtroom, Truax demanded that Network Solutions restore the etoy domain, that eToys pay the etoy legal expenses, and that the case be dropped without prejudice. No settlement was reached. Negotiations dragged on for another two weeks, with the etoy agents’ attention somewhat divided between two horizons – art and law. The dispute was settled on 25th January. Both parties dismissed their complaints without prejudice. The eToys company would pay the etoy artists $40,000 for legal costs, and contact Network Solutions to reinstate the etoy domain. “It was a pleasure doing business with one of the biggest e-commerce giants in the world” ran the etoy press release. (Wishart & Boschler: 265) That would make a charming end to the story. But what goes around comes around. Brainhard, still pissed off with Zai after leaving the group in San Francisco, filed for the etoy trademark in Austria. After that the internal etoy wranglings just gets boring. But it was fun while it lasted. What etoy grasped intuitively was the nexus between the internet as a cultural space and the transformation of the commodity economy in a yet-more abstract direction – its becoming-vectoral. They zeroed in on the heart of the new era of conceptual business – the brand. As Wittgenstein says of language, what gives words meaning is other words, so too for brands. What gives brands meaning is other brands. There is a syntax for brands as there is for words. What etoy discovered is how to insert a new brand into that syntax. The place of eToys as a brand depended on their business competition with other brands – with Toys ‘R’ Us, for example. For etoy, the syntax they discovered for relating their brand to another one was a legal opposition. What made etoy interesting was their lack of moral posturing. Their abandonment of leftist rhetorics opened them up to exploring the territory where media and business meet, but it also made them vulnerable to being consumed by the very dialectic that created the possibility of staging etoy in the first place. By abandoning obsolete political strategies, they discovered a media tactic, which collapsed for want of a new strategy, for the new vectoral terrain on which we find ourselves. Works Cited Negri, Antonio. Time for Revolution. Continuum, London, 2003. Warhol, Andy. From A to B and Back Again. Picador, New York, 1984. Stalder, Felix. ‘Fences in Cyberspace: Recent events in the battle over domain names’. 19 Jun 2003. <http://felix.openflows.org/html/fences.php>. Wark, McKenzie. ‘A Hacker Manifesto [version 4.0]’ 19 Jun 2003. http://subsol.c3.hu/subsol_2/contributors0/warktext.html. Klein, Naomi. No Logo. Harper Collins, London, 2000. Wishart, Adam & Regula Bochsler. Leaving Reality Behind: etoy vs eToys.com & Other Battles to Control Cyberspace Ecco Books, 2003. Staehle, Wolfgang. ‘<nettime> etoy.com shut down by US court.’ 19 Jun 2003. http://amsterdam.nettime.org/Lists-Archives/nettime-l-9912/msg00005.html Links http://amsterdam.nettime.org/Lists-Archives/nettime-l-9912/msg00005.htm http://felix.openflows.org/html/fences.html http://subsol.c3.hu/subsol_2/contributors0/warktext.html Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Wark, McKenzie. "Toywars" M/C: A Journal of Media and Culture< http://www.media-culture.org.au/0306/02-toywars.php>. APA Style Wark, M. (2003, Jun 19). Toywars. M/C: A Journal of Media and Culture, 6,< http://www.media-culture.org.au/0306/02-toywars.php>

To the bibliography
Journal articles: 'Television relay systems' – Grafiati (2024)
Top Articles
Latest Posts
Article information

Author: Trent Wehner

Last Updated:

Views: 6527

Rating: 4.6 / 5 (56 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Trent Wehner

Birthday: 1993-03-14

Address: 872 Kevin Squares, New Codyville, AK 01785-0416

Phone: +18698800304764

Job: Senior Farming Developer

Hobby: Paintball, Calligraphy, Hunting, Flying disc, Lapidary, Rafting, Inline skating

Introduction: My name is Trent Wehner, I am a talented, brainy, zealous, light, funny, gleaming, attractive person who loves writing and wants to share my knowledge and understanding with you.